Download presentation
Presentation is loading. Please wait.
Published byArchibald Hines Modified over 7 years ago
1
Class Administrative Information & Course Orientation
Welcome! Class Administrative Information & Course Orientation
2
Administrative Geographic orientation Parking Latrines
Emergency rally point Security & Badges Student local contact information Cadre contact information
3
Course Schedule Monday Tuesday Wednesday Thursday Friday Themes Concepts/Warfighting Functions Offense and Warfighting Functions Defense Capstone Admin and Hybrid Threat Introduction Reading and small group discussion 0900- 1000 ACE-TI Products Warfighting functions- Continued (INFOWAR, ADA, Air) Defensive Tactics Real World Threat Examples (Russia’s attack into Georgia) 1000- 1050 Hybrid Threat Systems Real World Threat Examples (Syria and the battle for Aleppo) 1100- 1155 Hybrid Threat Concepts (Strategic Environment, Threat Designs, Threat Actors) Offensive Tactics Functional Tactics Board Demonstration 1200 Lunch 1300- 1400 Hybrid Threat Concepts (Strategic Environment, Threat Designs, Threat Actors) – continued Offensive Tactics Check on learning (group discussion) Defensive Tactics Check on learning (group discussion) Functional Tactics (Functional Analysis Diagram Methodology) Offense PE Defensive PE 1600 Warfighting functions (Recon, Indirect Fire, Engineer, check on learning) 1730 Release The course is broken up into four blocks. They are Hybrid Threat concepts, actors, tactics, and operations. The concepts and actors portions are the building blocks needed to set the foundation for the meat of the course, actions and operations. Key Take-away: Have patience. Day one and two provide conceptual information designed to provide a foundation of knowledge that will then be applied during days 3-5.
4
Class Introduction Name cards Who are you? Where are you from?
What are you hoping to learn from this course?
5
Threat Tactics Course This course is intended to help you…
Understand and describe the concepts and products relating to the OPFOR Hybrid Threat IAW approved doctrine. Conceptualize the Hybrid Threat unconstrained by US doctrine. Describe the functions and systems of OPFOR tactics using a structured analytical methodology, which then allows you to... Analyze real-world threats through functional and systems-based thinking
6
“Don’t We Already Teach Tactics?”
Usually not until ILE, War College (some taught at MI schools) Learning methods often use only historical example with discussion. Little emphasis on functional tactics We are taught Clausewitz and Sun Tzu, but our likely enemies are playing “Machiavelli – The Home Game” - MAJ Jay Hunt
7
Terminal Learning Objective
Action: Become familiar with the TRADOC G2’s ACE Threats-Integration mission and its role in developing and describing the Hybrid Threat to meet military training requirements. Condition: Provide a classroom environment to support training, professional education, and leader development with in-class discussion and Army Training Network (ATN) and/or All Partners Access Network (APAN) website access. Standard: Understand the mission of ACE Threats-Integration and the basic nature of the Hybrid Threat in training.
8
TRADOC G2 OE Support http://tradoc.army.mil/g2/oetsc/
UNCLASSIFIED TRADOC G2 OE Support Exercise Design & Support Tools Virtual OPFOR Academy Information Operations Network Land Navigation Trainer UNCLASSIFIED
9
ACE TI Role in the TRADOC G2
Determine OE Requirements Conduct OE Validation Create OE Products & Processes Conduct OE Training & Education Exercise/Leader Development Support Institutional and Operational Domain Support Answer OE/OPFOR RFIs As mentioned, ACE Threats - Integration is a member of the OEE. Specific tasks that ACE Threats - Integration accomplishes on behalf of the OEE are: Exercise OE Support Institutional OE Support Create OE Products Conduct OE Training Conduct OE Validation Determine OE Requirements Answer OE RFIs Key Take-away: ACE Threats - Integration is THE LEAD/SOURCE of OE and Threat related topics for training and leader development.
10
ACE Threats-Integration Purpose
ACE Threats-Integration, a member of the TRADOC G2 Operational Environment Enterprise (OEE) is the Army's lead to study, design, document, validate, and apply― Hybrid Threat Operational Environment (OE) conditions that support all US Army and joint training and leader development programs. This is ACE Threats - Integration’s purpose statement. Key Take-aways: ACE Threats - Integration is subordinate to TRADOC G2 and is a member of the OEE. ACE Threats - Integration is THE Army’s LEAD agency for validating and applying the Hybrid Threat AND OE conditions for all Army training and leader development programs. Keep in mind: Actions ― CONDITIONS ― Standard.
11
What it the “OPFOR?” Composite training threats, based on real-world actors Best practice equipment, organizations, tactics Not country-specific Customizable, tailorable to training needs Combined Training Centers (CTC) represent composite operational environments, with selected threat actors The Decisive Action Training Environment (DATE) is a fictional composite model of the real-world environment Real conditions, fictitious region & countries Environment to portray full range of potential threat capabilities Mission Command Training Program (MCTP) Ft. Leavenworth, KS Joint Multinational Readiness Center (JMRC) Hohenfels, Germany National Training Center (NTC) Ft. Irwin, CA Joint Readiness Training Center (JRTC) Ft. Polk, KS
12
Define the Threat for Training
Opposing Force (OPFOR): The use of OPFOR in training events is intended to improve realistic training by enabling operations against a non-cooperative, free-thinking, and capability-based adversary or enemy. The OPFOR uses tactics, doctrine, and equipment representative of a composite of forces that could be encountered in expected OEs. Army Regulation 350-2, Opposing Force (OPFOR) Program When ? SPF ? W DRUG C ? I G Armor SPF Insurgents Aviation Criminals Reconnaissance Infantry (Mechanized) Terrorists Artillery Guerrillas Passive Supporters Infantry (Motorized) Active Supporters Independent Actors
13
ACE Threats-Integration Tasks
ACE-TI has responsibilities outlined in these regulations: AR 350-2, AR , TR , TR ACE-TI is a participant/stakeholder in these processes: ATSII, ATSIII, ALC, ALM, ATLDC, ACP, ITE, CTCQR ACE-TI is a part of every Decisive Action exercise’s development (wherever conducted) and observes exercises for feedback. ACE-TI provides Hybrid Threat Mobile Training and Threat Tactics Courses and manages an online OE Training Course. ACE-TI visits every school and Center of Excellence. ACE-TI provides, on request, OE and Hybrid Threat Mobile Training Teams.
14
Operational Environment Variables
Political Describes the distribution of responsibility and power at all levels of governance – formally constituted authorities, as well as informal or covert political powers. Military Explores the military and paramilitary capabilities of all relevant actors (enemy, friendly, and neutral) in a given operational environment. Economic Encompasses individual and group behaviors related to producing, distributing, and consuming resources. Social Describes the cultural, religious, and ethnic makeup within an operational environment and the beliefs, values, customs, and behaviors of society members. Informational Describes the nature, scope, characteristics, and effects of individuals, organizations, and systems that collect, process, dissemination, or act on information. Infrastructure Is composed of the basic facilities, services, and installations needed for the functioning of a community or society. Physical Environment Includes the geography and manmade structures, as well as the climate and weather in the area or operations. Time Describes the timing and duration of activities, events, or conditions within an operational environment, as well as how the timing and duration are perceived by various actors in the operational environment. These define the OE. They are encapsulated in the DATE for training purposes.
15
OE Variable Impact on Tactical Actions
Cold War Era Could focus mostly on (USSR) military variable Minimal impact of other variables Hybrid Threats Range of actors, motivations Impacting other variables may be the actual objective “Strategic Corporal”
16
The Hybrid Threat Hybrid Threats
Regulated by International Law, Military Tradition and Custom (REGULAR) Hybrid CONVENTIONALLY ARMED AND ORGANIZED UNIQUELY ARMED AND ORGANIZED Criminal So What makes up a hybrid threat? A combination of two or more different entities usually combined for a shared purpose. -Regular forces belonging to a nation state that can organize conventionally or unconventionally -Irregular forces who are not members of a regular armed force yet can organize conventionally or conventionally -Other organizations with the OE motivated by personal gain (shadow political group, criminal element, private corporation) -Unified in purpose. Forces can align either temporary or for longer periods to achieve mutually benefiting goals. Unified purpose does not necessarily imply formal agreements. -Following historical examples of hybrid threats Criminal Threats Unregulated by International Law, Military Tradition and Custom (IRREGULAR)
17
Actors in OE Across entire Spectrum of conflict The Enemy Cause
Extremist Sympathetic (but not-supporting) Actively Supporting Lawful & Unlawful Enemy Combatants Across entire Spectrum of conflict The Enemy Cause U.S. & Host Country Goals Coerced Participating Purposefully & Materially Supporting Engaged in Hostilities Possibly Co-optable/ persuadable Radical Fanatical Cadre Diehard Combatants Note: These categories are very general and the boundaries vague. Individuals and/or organizations may be placed in several categories at any given time. The category(ies) they occupy are generally fluctuating and may be fleeting, mission dependent, event- or agenda-oriented, or for any other reasons, affiliations, alliances, motivations or opportunity. Neutral Regional, National, and International Players Witting and Unwitting Noncombatants Locals Ambiguous Vacillating Opportunistic Impressionable Disinterested Armed and/or Unarmed Criminals
18
Hybrid Threat Hybrid Threat: The diverse and dynamic combination of regular forces, irregular forces, terrorist forces, and/or criminal elements unified to achieve mutually benefitting effects. Unified Land Operations, ADRP 3-0 The threat is adaptive, globally connected, and networked… Embedded in local populations and possesses a wide range of old, adapted, and advanced technologies—possibly WMD. Challenges US access—directly and indirectly—AOR and Homeland. Attacks national and political resolve with sophisticated information campaigns—as well as seeks physical attacks. TC is the lead publication in the Hybrid Threat series. It describes the hybrid threat and lays out all key HT concepts.
19
Hybrid Threats Are Not New!
1754–1763, French and Indian War, British and French forces among irregular Colonialists fighting for the British, and American Indians fighting for both sides. 1814, Peninsula War ends after conventional and irregular forces from Portugal, Spain, and Britain prevent Napoleon's control of the Iberian Pen. Following examples are certainly not conclusive but illustrate the concept that the enemy will organize in a manner that he feels will give him the best chance at avoiding defeat. 1861–1865, vicious guerrilla warfare consumes Kansas and Missouri. Militias with near equal conventional tactical formations and skills.
20
Hybrid Threats Are Not New!
1954–1976, Viet Cong and People’s Army of Vietnam combine irregular and regular forces in fighting the French and US. Viet Cong would organize into conventional and unconventional units. 2008, Russian and Ossetian mixed regular and irregular forces invade Georgia, with significant information warfare and illegal activities aiding the operation.
21
TTP – Words Matter Example Ambush IED-Initiated Ambush IED Emplacement
Tactics is the employment of units in combat. Techniques are the general and detailed methods used to perform assigned missions and functions. Procedures are standard and detailed courses of action that describe how to perform tasks. Example Ambush IED-Initiated Ambush IED Emplacement FM 3-0, Ch 1
22
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.