Military Decision Making Process (Mar 08) 2
Click here to load reader
-
Upload
thomas-cleary -
Category
Education
-
view
95 -
download
6
description
Transcript of Military Decision Making Process (Mar 08) 2
Disposition
Location
Tactical deployment
Where they are & What they are doing
Includes:
Who they are & What they have
24 134/10
1 2
2/28/134
Unit Identification
Organization
I
X
Composition
Strength
Includes:
Personnel
Equipment
Weapon Systems
Threat Capabilities
• Tactics
• Combat Effectiveness
• Training
• Sustainment
• Tech Data
• Misc Data
Order of Battle Factors
The Enemy – Big to Small
3 14 15 23
21 22 23 24
1 2 3 4
xx xx xx xx
III III III III
II II II II
10 T-8029 BMP
10 T-8029 BMP
10 T-8029 BMP
10 T-8029 BMP
5th OSC
40 x T80116 x BMP212 x AT56 x AT5(D)6 x 2A45M100 Inf (Air Insert)100 Inf (Truck)100 Inf (FD)6 x 2S63 x SA-184 x MSD
FSD
AT COMOD
2/24
1/24
(+)
24
III
14 x T8035 x BMP26 x AT53 x 2A45M100 Inf (FD)3 x 2S61 x MSD
10 x T8029 x BMP23 x AT53 x 2A45M1-2 x 2S61 x MSD
3 x T808 x BMP21 x AT5
3 x 2A45M2 x AT51 x UMZ1 x GMZ
9 x T8027 x BMP21 x 2S61 x MSD
7 x T8022 x BMP21 x 2S61 x MSD
3/24
I I (-)
4/24
I I (-)
The Enemy – Total Combat Power
Enemy Strengths/Weaknesses
WFF Strength WeaknessIntel Effective ground based recon Heavily reliant upon ground based recon
M2 Modern T-80 tanks (2500m MG,
AT-8) equipped w/ thermal imaging
BMP-2 - All are TIS equip & stab
FS Counter-fire radar (45km range)
Dedicated sensor-to-shooter link at MID
75% rounds fired RAP/ext
Limited available artillery systems; targeting
reliant upon HUMINT
Protection Dedicated engineer support at all levels; Significant mobile ADA either
self-propelled or shoulder-fired;
night capable ADA.
Limited range of ADA systems; minimal threat
to fixed-wing aircraft
Sustainment Critical shortage of POL; limited repair parts for
tanks; limited ammunition for tanks and artillery
C2 Heavily reliant upon retrans due to terrain
FM Single Channel Encrypted
From Order of Battle Data and Threat Model
Threat Capabilities - what the threat can
accomplish
Identify Threat Capabilities(Can the enemy dance?)
• Four tactical COAs open to military forces in
conventional operations: – Attack
– Defend
– Reinforce
– Conduct a retrograde
• Broad COAs can be divided into a variety of
more specific COAs.
WFF Capabilities (Equipment and Capabilities)
• Examples of these types of capabilities are--– Use of NBC weapons. – Use of supporting air assets. – Intelligence collection. – Electronic Warfare. – Engineering operations. – Air assault or airborne operations. – Amphibious assaults. – Psychological operations (PSYOP). – Deception operations.
Doctrinal Template
• Illustrate the deployment pattern and disposition preferred by the threat's normal tactics when not constrained by the effects of the battlefield environment.
• Usually scaled graphic depictions of threat dispositions for a particular type of standard operation
Depicts how the enemy would like to fight without terrain restriction
EA
... ...
Doctrinal Template
Unconventional Doctrinal Templates
• Unconventional operations can also be depicted using a doctrinal template.
• For example a drug trafficking ring that transports large amounts of drugs my use certain convoy procedures, such as the distance between vehicles, how many vehicles, where security forces are placed and how many are in the convoy, and how the security force will react to a police force
Examples Include:
• Integrated Attack • Dispersed Attack• Limited Objective
Attacks– Sophisticated
Ambush– Spoiling Attack– Counterattack– Raid
Doctrinal Template
• Maneuver Defense• Area Defense
– Integrated – Decentralized
• Strike
Description of Tactics and Options
• Operations of the major units or elements
portrayed on the template
• Activities of the different battlefield operating
systems
• Listing or description of options available to
the threat should the operation fail
(branches), or subsequent operations if it
succeeds (sequels)
Determine Threat COAs
• Identification and development of likely threat COAs that will influence accomplishment of the friendly mission
• Identification of those areas and activities that, when observed, will discern which COA the threat commander has chosen
Determine Threat COAs [Situation Templates & Event Template]– Identify the threats likely objectives and desired end state– Identify the full set of COAs available to the threat– Evaluate and prioritize each COA– Develop each COA in the amount of detail time allows– Identify initial collection requirements
FM 34-130, 1994, p. 2-39 thru 2-40
IPB Step 4
Identify Threat’s Likely Objectives and Endstate
• Strategic: The level of war at which a nation, group of nations, or an international organization, determine security objectives and guidance.
• Operational: The level of war at which campaigns and major operations are planned and executed (OSC and DTG).
• Tactical: The level of war at which battles and engagements are planned and executed (BTG and IMG). Activities at this level focus on the maneuver of combat elements in relation to each other and the enemy.
Identify Threat’s Likely Objectives and End State
• What does the enemy seek to do to us?
• How does the enemy define success?
• How can we deny him success?
Identify Threat COAs
• Brainstorm all possible options for the enemy
• Analyze recent activities -- what does it mean?
• Analyze battlefield environment impact
• An Enemy COA must meet the following criteria:– suitable: has the potential to accomplish the mission and meet
the enemy commander’s intent
– feasible: capability to accomplish mission – physical resources
– acceptable: level of risk
– distinguishable: significantly different from other COAs; by use of reserves, task organization, Scheme of Maneuver or Scheme of Defense
– Consistent with doctrine
Identify Threat COAs• Identify:
– task task - Enemy’s mission– purposepurpose - Commander’s Intent– method method – by BOS– endstateendstate – what the enemy has done to friendly forces and their status
• Analyze how COA address 8 forms of contact: visual, direct, indirect, non-hostile, obstacles, aircraft, CBRNE, EW
• Define vulnerabilities• Define center of gravity, decisive point, and culminating point• Define main and supporting efforts• Capabilities• HVTs
THREAT COA MODEL
Threat COA Model – A model of one COA available to the threat. It consists of a graphic depiction (situational template); a description (narrative or matrix); and a listing of assets important to the success of the COA (HVTs). The degree of detail in the model depends on available time.
At a minimum, the COA models address the five standard elements of a COA:
WHAT (the type of operation), WHEN (the earliest time the operation can begin), WHERE (boundaries, axis) , HOW (the use of assets), and WHY (the desired end-state).
Prepare COA Statements and Sketches
Sketch: visualization product
• At a minimum sketch should include:- Planning HQs, and subordinate unit boundaries- Allocated forces- Ground and air avenues of approach- Zones of attack of defense sectors- AAs, BPs, OBJs, obstacles- FEBA or LD/LC- Provide terrain for clarity
ENEMY COURSE OF ACTIONMISSION: INTENT: TASK ORG: TASK & PURPOSE:
Decision to execute COA 2 based on read by DTG Recon of defensive prep on AA3B.
Reconstitute assault force upon its destruction in battalion on Route White has not been defeated.
The 202 BTG attacks to destroy friendly forces NLT XX2100JUN01 in order to fix enemy and prevent the BDE from counter-attacking the DTG exploitation force.
Move rapidly through the AOR to gain contact with the enemy. Fix enemy forces in prepared defensive positions. Assault force defeats northern battalion in east while exploitation force destroys battalion in west IVO Kill Zone 2.
IE
I I
18 X 2S1
I I
18 X 2S3
X
202 22
I I I IDISRUPTION ZONE
Recon Det:
T: ID enemy defensive positions
P: ID HPTs and determine best route for exploitation force.
BATTLE ZONE
Fixing Force:
T: Destroy enemy forces on AA 3C & 4B.
P: Prevent enemy forces from attacking BTG main effort the exploitation force.
Assault Force
T: Defeat enemy forces in east.
P: Prevent action against the exploitation force and attrit enemy forces in the battle zone.
Exploitation Force
T: Destroy enemy battalion IVO Kill Zone 2.
P: Fix enemy BCT and prevent attack on DTG exploitation force.
Initially set to support Recon Fires. Facilitate movement of recon det. and destroy Q36 or Q37 Radar. O/O shift to destroy enemy in contact w/ assault force. O/O shift to destruction fires ISO exploitation force.
Identify MDL to facilitate commitment of ME.
Identify HPTs for destruction w/ reconnaissance fires.
Identify reserve for disruption by fire support assets.
RECON: FS:C2:
XX
XX
XIIX
PL ZINC
PL GOLD
X
Kill Zone 2
Kill Zone 1
I I (+)
X
PL SILVER
I I (+) I I (-)
KALMAL
I
I (+)
I
ASSAULT
EXPLOITATION
Kill Zone 3
BTG Attack Zone
BTG Battle Zone
Situation Template
Depicts how the Enemy may deploy, employ and
operate within constraints of battlefield
conditions. A snap shot in time of a critical event.
(SITEMP)
I I I
Fire Sac
II I
Fire Sac
Enemy SOP
(Threat Model)
Environment
(Terrain Weather)
Enemy COA (SITEMP)
Products of IPB
High Value High Value TargetsTargets
Define the Define the Battlefield Battlefield
EnvironmentEnvironment
Describe the Describe the Battlefield’s Battlefield’s
EffectsEffects
Determine Threat Determine Threat Courses of ActionCourses of Action
EventEventTemplateTemplate
SituationSituationTemplateTemplate
ModifiedModifiedCombinedCombinedObstacleObstacleOverlayOverlay
Doctrinal Doctrinal TemplateTemplate
Evaluate the Evaluate the ThreatThreat
Situation Templates
• Depiction of assumed threat dispositions, based on threat doctrine and the effects of the battlefield
• Normally, the situation template depict threat units two levels of command below the friendly force as well as the expected location of high value targets
• Situation templates use time phase lines (TPLs) to indicate movement of forces and the expected flow of the operation
• Prepare as many graphics as necessary to depict the COA in enough detail to support staff war gaming and collection planning
• Tailor the situation templates to your needs by focusing on the factors that are important to the commander or mission area
• A situation might focus only on the treat’s reconnaissance assets, depicting details such as location and movement routes of these assets, their likely employment area, and their likely NAIs
FM 34-130, 1994, p. 2-45 & G-10
Time - Phase Lines
• Graphic means of comparing the enemy’s mobility capability along multiple avenues of approach / mobility corridors
• Based on doctrinal rates of movement and battlefield environment
• Initial TPL indicated as “H” at enemy FLOT• Assist in tracking actual and potential enemy movement
FM 34-130, 1994, p. 2-45 & G-10
Time Phase Lines
• Lines that provide a graphic means of comparing the enemy’s mobility along
avenues of approach.
• Defined by doctrinal rates of movement
• Influenced by terrain, weather, and combat operations (enemy forces)
• Define deviations of doctrinal maneuver
• Assists in tracking the enemy and directing collection assets
• Rates of movement found in FM 34-130 App b4
Situation KM / Hour
Unopposed 20-30 KM Ideal Conditions
5-10 WX/terrain restricts
Covering Force Area 6
Main Battle Area 2
Rear Area 5
Reverse BOS IPBThe entire staff contributes expertise to ECOA development and ISR planning and integration:
•Air Defense– Evaluates likely air corridors.– Likely timing of air strikes or air assault operations– Likely targets and objectives of enemy air operations– How enemy ADA will position to protect its forces
•Fire Support– Where will the enemy deploy his artillery– Where are enemy target acquisition assets (radars)– Determine High Value Targets (HVT) – How deep can his indirect fires range
Reverse BOS IPB•Engineer
– Where will enemy emplace obstacles– Time required to emplace each type of obstacle– Time required to breach obstacles– Time required to entrench a mechanized company– Ability to bridge different size obstacles and time required
•NBC– Threat capabilities to employ NBC weapons– Threat NBC protection capabilities– Types of delivery systems, including min and max range– Indicators of preparations to employ NBC weapons– Existing contaminated areas that may indicate a ECOA– Friendly assets the enemy may target with NBC weapons
Reverse BOS IPB
•Signal– Ability to locate or intercept friendly systems– Speed that the enemy can collect, process and target C4I– Ability to link collection systems to indirect fires– Deployment patterns of SIGINT collection systems– Techniques of electronic deception or network attack
•Civil Affairs– What is the political situation in the AO– What factions are friendly, neutral or threat– Where are areas that civilians gather to protest or
demonstrate– Who or where is information gained on particular AOs?
Event Template
• A guide for collection and ISR planning• Depicts where to collect the information that will indicate which COA
the threat has adopted• Differences between the NAIs, indicators, and TPLs associated with
each COA form the basis of the event template– Named area of interest (NAI) - the specific point, route, or area
where key events are expected to occur; where information that will satisfy a specific information requirement can be collected; usually selected to capture indications of threat COAs but also may be related to conditions of the battlefield
– Indicator - positive or negative evidence of threat activity; activities which reveal the selected COA
• The initial event template focuses on identifying which of the predicted COAs the threat has adopted
FM 34-130, 1994, p. 2-50, G-7 & G-8
Event Template
1
22
2
1 1
1 11 & 22
2N
AI 2
NAI 3
NAI 4NAI 1
SITEMP 1
SITEMP 2
ConsolidatedSITEMP
EVENTTEMPLATE
Example Event TempH-Hr
H-Hr
H + 30
H + 60
H + 90
H +120 H +150
H + 30
H + 60H + 90
H +120H +150
NAI 8
NAI 9NAI 6
NAI 2
NAI 4
NAI 1
NAI 5
NAI 3
NAI 7
Ea Smash
NAI LOCATION EN COA INDICATOR NET/NLT
PRIORITY PRIMARY/ALTERNATE
CONFIRMATION REMARKS
EVENT MATRIX (S2) ISR MATRIX (S3)
1. Start with Situation Template2. Determine Time Phase Lines (TPLs) and Mobility Corridors3. Determine where events will occur that differentiate between EN COAs (these become NAIs)4. Determine what action confirms or denies a particular EN COA (Indicators)5. Determine when events will occur (NET/NLT)
EVENT TEMPLATE
1 FL 123456 1 BridgingOperations
H+30H+1.5
2 FL 123456 1 ArmorAssets
H+15H+2
3 FL 123456 2 BridgingOperations
H+45H=1.5