Use of a BHL in a Rearward Passage of Lines. Both first-echelon divisions also deployed in two echelons. 8-120. (See Figure 8-10.) A defending unit may have a series of subsequent positions. This tends to reduce the chance for enemy interference with the resupply process but also tends to lengthen the amount of time it takes to complete the process. He does not want to give the enemy force time to prepare for the defense. Location of enemy electronic warfare units. The forward edge of the battle area (FEBA) is the foremost limits of a series of areas in which ground combat units are deployed, excluding the areas in which the covering or screening forces are operating, designated to coordinate fire support, the positioning of forces, or the maneuver of units (JP 1-02). The ideal candidate will have experience or demonstrated aptitude in operations research, political science, and/or international affairs. In a mobile defense, transitioning to the offense generally follows the striking force's attack. The defensive plan contains procedures for timely response by fire support teams and maneuver forces. Artificial Intelligence in Defense Market Grow At A Healthy CAGR Of 10.8% by 2028: The Insight Partners, - Unmanned aerial vehicles (UAVs) are used in multiple applications, and they are growing in popularity. It only has to destroy the enemy's ability to synchronize his combined arms team or his will to fight. If so, share your PPT presentation slides online with PowerShow.com. He maneuvers to place the enemy in a position of disadvantage and attacks him at every opportunity, using his direct and indirect fires. 8-33. (Chapter 11 discusses the delay.). It conducts spoiling attacks to disrupt the enemy's troop concentrations and attack preparations. The unit must do everything it can to avoid an attack in the first place, but if it is attacked, it uses cover and dispersion to limit the amount of damage. We are able to assist homeowners in all 50 states. The defending force does not have to kill every enemy soldier, squad, or combat system to be successful. Compensation may impact where the Sponsored Schools appear on our websites, including whether they appear as a match through our education matching services tool, the order in which they appear in a listing, and/or their ranking. This may shift to providing priority air defense coverage of his ground combat arms units and combat engineers. In response to shallow enemy penetrations, artillery commanders normally reposition their systems laterally, away from that point. The need to hold or protect featuressuch as bridges, airfields, or LZsfrom enemy observation and fires may restrict the positioning of units within a perimeter. 8-121. (FMs 3-11 and 3-12 detail NBC defense operations.). Such planning addresses the need to control the tempo of operations, maintain contact with both enemy and friendly forces, and keep the enemy off balance. Rear area security operations, such as containment of an enemy airborne or helicopter assault. As the enemy's attacking force assumes a protective posture, the defending commander rapidly coordinates and concentrates all effects of his fires against unprepared and unsupported segments of the enemy force in rapid sequence. Additionally, the psychological shock on enemy soldiers will be greater if they suddenly find themselves desperately defending on new and often unfavorable terms while the commander's own soldiers will enjoy a psychological boost by going on the offense. About Sixteenth Air Force (Air Forces Cyber) The Sixteenth Air Force (Air Forces Cyber), headquartered at Joint Base San Antonio-Lackland, Texas, is the first-of-its-kind Numbered Air Force. Movement To Contact An offensive operation conducted to develop the situation and to establish or regain contact with the enemy. Indirect fires have the greatest impact on the enemy when they are synchronized with direct fires and the use of obstacles, defensive positions, and counterattack plans. Existing roads, railways, and waterways used for military LOCs and civilian commerce. 8-60. Subsequent positions can also have primary, alternate, and supplementary positions associated with them. If you would like to find more information about benefits offered by the U.S. Department of Veteran Affairs, please visit the official U.S. government web site for veterans benefits at http://www.va.gov. endobj He must ensure that the leaders and soldiers understand the purpose and intent of the operation and their role in accomplishing the mission. Similarly, the commander may order units inadvertently bypassed by the enemy not to break out immediately so that he may capitalize on their position to destroy the enemy. 8-30. The commander should plan to destroy those stocks if necessary as part of denial operations. For example, in Figure 8-16, the two units defending on the reverse slope cannot engage half of the hill to their direct front because of line of sight restrictions caused by small forests, but they can cover each other using oblique defilade. Success in any concealment effort hinges on strict concealment discipline by units and individual soldiers. The commander normally assigns combat vehicles supporting the defense firing positions on the perimeter to cover the most likely mounted avenues of approach. Aviation assets are particularly valuable in the defense because of their speed, mobility, and versatility. Smoke makes target acquisition much more difficult for the attacker. A commander uses an oblique defilade to protect his defending systems from enemy frontal and flanking fires and from fires coming from above. He allows his subordinate commanders some flexibility in selecting the exact positioning of obstacles. The common defensive planning considerations addressed in the following paragraphs apply to all types of defensive operations. The commander may choose to shape the battlefield by defending one area to deny terrain to the enemy while delaying in another area to deceive the enemy commander into believing he has achieved success. Examples include applying face paint to the exposed areas of skin, and adding burlap, paint, and live vegetation to helmets and clothing to closely resemble or blend into the background. In noncontiguous operations, the commander positions his CSS facilities within the perimeters of his combat units to provide security and avoid interrupting support services. He should select and prepare alternate and supplemental firing positions and routes to and from them. 2 0 obj Use of Terrain. Responsiveness. Fire plans, to include employing AT systems, illumination, and smoke. To control indirect fires in the defense, the commander uses those common FSCM introduced in Chapter 2. Forward Edge of the Battle Area, 8-14. stream The commander distributes his similar functional CSS units throughout his defensive area in both environments. If the enemy force is too large for the TCF to reduce, the commander may need to commit his reserve. This provides early warning of enemy air infiltration and allows timely engagement of enemy aerial platforms attempting to insert dismounted reconnaissance, infantry, and antiarmor teams. The defending commander may change his task organization to respond to the existing or projected situation, such as forming a detachment left in contact prior to conducting a withdraw. He may also choose this technique when the enemy is likely to use weapons of mass destruction. Friendly forces within the perimeter must be capable of providing mutual support. ?.?>:8H UlPWYn?L|Z}Wg8Ckd.z'!LsVX`tU-5R@TCe9vP)nC]k*CL}n'MO@7t/?hu+ j : Units at all echelons can conduct an area defense. Battle positions are not normally held at all costs. Without defense, support cannot happen. Phase Line JOANN is a disengagement line in Figure 8-9. 8-97. ), 8-144. Created by SPC Jason Blanchard, USA in 1998, this site has been providing free and subscription pre-made PowerPoint classes to Army members for over 20-years. 8-88. At the onset of the attack, the defending commander yields the initiative to the enemy. In some situations it may be better to wait to execute a counterfire mission until the fighting begins in the MBA. Rapid reinforcement of a threatened position. The commander must integrate the defensive fire and obstacle plans from the beginning. Fire support to destroy, disrupt, and attrit enemy forces on the forward slope. IRAQI FREEDOM. Dispersed troops and vehicles force the attacker to concentrate on a single small target that he will likely miss. Controlling land areas surrounding the perimeter to a range beyond that of enemy mortars and rockets and also controlling water approaches. Provides his intent for transitioning from the defense to the offense to his commanders and soldiers. Normally, the commander's priorities for air defense protection in the defense begin with his C2 facilities. Security operations seek to confuse the enemy about the location of the commander's main battle positions, prevent enemy observation of preparations and positions, and keep the enemy from delivering observed fire on the positions. Effects of weather and terrain on current and projected operations. Selecting boundary locations that do not increase the coordination problem. Therefore, the commander positions air defense assets to protect the reserve or striking force, whether it is stationary or moving. Another way he can generate the effects of mass is through committing his reserve. As in other operations, the commander's concept of operations and intent drive planning for retrograde operations. 8-76. The defender can study the ground and select defensive positions that mass the effects of his fires on likely approaches. The commander also establishes a strong point when he anticipates that enemy actions will isolate a defending force retaining terrain critical to the defense. (FM 2-0 provides an overview of the intelligence process and the capabilities of technical surveillance systems. 8-79. Five Kinds of Battle Positions. Adding natural materials to blend with the surrounding terrain augments this type of concealment. The commander rapidly musters and commits available heavy units and combat systems to take advantage of enemy light forces' vulnerabilities to attack by armored vehicles while they remain concentrated in the insertion area. He can also adjust the defensive boundaries of subordinate units so entire units can withdraw and concentrate for the attack. To accomplish this, the defending force must employ its fire support system throughout its AO. With limited assets, the commander must establish priorities among countermobility, mobility, and survivability efforts. All defensive operations are a mix of static and dynamic actions. This exposes portions of the enemy force for destruction without giving up the advantages of fighting from protected positions. The commander places his overwatching elements forward of the topographic crest and on the flanks of the position in a valley or depression. .;7WEQ uKO::vx7$)~s5Cg. 8-29. For example, terrain with a limited road net that canalizes the defending force allows the enemy to predict its movement and take steps to interdict that movement. It does this by allowing subordinate units to simultaneously plan and prepare for subsequent operations. The reverse slope defense pursues offensive opportunities through surprise and deceptive actions. Safety Requirements: General: Fire Exits Risk: The risk assessment level is low Mortars, artillery, tanks, and antiarmor missile systems from within the perimeter engage the enemy at long ranges. 8-2 . Additionally, enemy ISR systems are likely to detect the arrival of significant reinforcements. The commander should not overlook the transportation and manpower required in obtaining, moving, and uncrating barrier material and associated obstacle creating munitions, such as demolition charges and mines. The commander must plan to augment his available ambulances if a mass-casualty situation develops. He has flown in over 100 large-force employment exercises that linked joint air and surface counterair forces at Red Flag, Defensive control measures within a commander's AO include designating his security area, the battle handover line (BHL), and the main battle area (MBA) with its associated forward edge of the battle area (FEBA). Once security elements withdraw, the enemy can advance largely unimpeded until he has crested the high ground in front of the main defensive positions. process where rehearsed operations set conditions that lead to structured occupation of a BSA site. 8-34. This eliminates the need to request supplies and reduces the chance that a lapse in communications will interrupt the supply flow and jeopardize the integrity of the defense. It also defuses the enemy's combat power by forcing him to contain bypassed friendly defensive positions in addition to continuing to attack positions in greater depth. Then you can share it with your target audience as well as PowerShow.coms millions of monthly visitors. Speed also results from not having to conduct a forward passage of lines and perform liaison necessary to establish a common operational picture that includes knowledge of the enemy force's patterns of operation. (See Figure 8-4.) 1 The division fights. The commander must emphasize supply economy and protect existing supply stocks since aerial resupply is vulnerable to weather and enemy fires. Using a brigade assembly area as an example, the commander places two companies in each battalion task force along the outer perimeter and one company in reserve along the inner perimeter. Blending. commanders integrate NBC defense, smoke, flame, and recon elements throughout this framework. The commander maintains constant communications with his subordinates within the perimeter and provides them the information necessary to maintain a common operational picture among all units located within the perimeter. Enemy forces start to deploy before encountering friendly forces. All Rights Reserved. ), 8-159. Providing as much depth as the diameter of the perimeter to allow the proper placement of security elements and the reserve and the designation of secondary sectors of fire for antiarmor weapons. The key factors that affect the organization of these areas are mutually supporting covered and concealed positions, numerous existing and reinforcing obstacles, the ability to bring devastating fires from all available weapons onto the crest, and a counterattack force. number status date title proponent; fm 1-0: active: 08/25/2021: human resources support: tradoc: fm 1-02.1: active: 03/9/2021: operational terms: tradoc: fm 1-02.2 . 8-71. He supports the security force by planning the delivery of the effects of fires at appropriate times and places throughout his area of influence to slow and canalize the enemy forces as they approach the security area. Maintaining and improving routes and creating bypass or alternate routes at critical points are major engineering tasks because movement routes are subjected to fires from enemy artillery and air support systems. Their tasks can include. The commander must be careful that he is not the target of enemy information operations designed to tempt him to abandon the advantages of fighting from prepared defensive positions. Because of its mobility and potential reaction speed, an air assault force is often well-suited for a reserve role during defensive operations.