Presentation is loading. Please wait.

Presentation is loading. Please wait.

Warfighting Functions: Reconnaissance and Counterreconnaissance

Similar presentations


Presentation on theme: "Warfighting Functions: Reconnaissance and Counterreconnaissance"— Presentation transcript:

1 Warfighting Functions: Reconnaissance and Counterreconnaissance

2 Enemy Descriptor Basics
Review the basics—Why is surveillance and reconnaissance so essential? How does the Threat collect, analyze, and develop intelligence? Enemy Forces Dispositions Some key questions: What do you know and what do you not know about the enemy? How will you identify the enemy strengths and weaknesses? How does the threat think and act?..the same…similar..or is the threat different? Do you know the U.S. Army doctrinal process to identify and confirm your knowledge or your gaps about the enemy? [Consider discussing what is universal or what may be different dependent on culture, forms of governance, or abnormal ”rules of engagement.” For example, a culture may not have the same value on human life as does the USA. A current governing authority may have very different ways of maintaining order and obedience. The Law of War or similar international conventions on the humane conduct of warfare may have no recognition by a regular and/or irregular force. Think of how ISIL conducted operations and the ways that they treated captured military members, law enforcement members, and civilians. So—another “what”: Identify what capabilities and possible or probable courses of action. Per FM 2-0 (2014): Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities (JP 3-0). Army targeting uses the functions decide, detect, deliver, and assess (D3A) as its methodology. Find, fix, finish, exploit, analyze, and disseminate (F3EAD) provides maneuver leaders at all levels with a methodology that enables them to organize resources and array forces. While the targeting aspect of F3EAD is consistent with D3A methodology. Composition Strength Capabilities Courses of Action Determine: what you know… and what you don’t know about the enemy.

3 Threat Key Definitions
RE: TC , 8-1 and 2-49. Who is the “who”? X Reconnaissance force a unit composed of specialized reconnaissance units. An example is a reconnaissance brigade (separate) in threat force structure. (See TC /TC ) Reconnaissance element any unit or task organization assigned a reconnaissance mission, regardless of the type(s) of units involved. An example is a company detachment (CDET) assigned a reconnaissance mission in a higher headquarters zone of reconnaissance responsibility (ZORR). (TC ) Reconnaissance unit refers to a unit composed of specialized reconnaissance troops. An example is a threat reconnaissance brigade in threat force structure. In contrast, the term reconnaissance element refers to any unit or task organization given a specific reconnaissance mission, regardless of the type(s) of troops involved. The latter is a functional designation that describes the function an organization is performing. The threat has units task-organized for reconnaissance and/or counterreconnaissance. One example is a motorized infantry company, task-organized as a detachment. An additional special note on definition of threat terms is― The threat uses the term force and element in threat tactical doctrine. These are functional terms: At brigade or BTG and above echelon, units are called forces. At battalion or BDET and lower echelon, units are called elements. force and element in threat tactical doctrine are functional terms: = At brigade or BTG and above echelon, units are forces. = At battalion or BDET and lower echelon, units are elements.

4 Organizational Echelons
RE: TC TC FM (See ATN— Threat Force Structure) Operational Strategic Command (OSC) …examples include Special Purpose Forces (SPF) Brigade Reconnaissance Brigade (Separate) RISTA Command Information Warfare Brigade Division Tactical Group (DTG) Brigade Tactical Group (BTG) For TTC focus―primarily “battalion and below…” Brigade Tactical Group Battalion Detachment (BDET) Company Detachment (CDET) …other capabilities can include― Guerrilla Brigade (Affiliated) Insurgent Organization Criminal The basic organizational echelons are: Operational Strategic Command (OSC). At this echelon, you may find forces with reconnaissance/counterreconnaissance missions such as: Special Purpose Forces (SPF) Brigade Reconnaissance Brigade (Separate) Recon, Intelligence, Surveillance, and Target Acquisition (RISTA) Command Information Warfare (INFOWAR) Brigade Divisions and Division Tactical Group s(DTG) (TC , 2-10—2-22.) Brigades and Brigade Tactical Group s(BTG) (TC , 2-17—2-22.) Now--for TTC focus―the primarily course discussion within a BTG is “battalion and below…” This will often include assets from a higher headquarters. As “battalion and below” in a brigade tactical group —you will often see one or more task-organized elements titled: Battalion Detachment (BDET) Company Detachment (CDET) Other elements operating with the threat at these levels can include elements from within a― Guerrilla Brigade (Affiliated), Insurgent Organization(Affiliated), Criminal Organization (Affiliated), and/or willing or coerced supporters in the relevant population. or CRD

5 Recon/CR Principles Focus Continuity Aggressiveness Timeliness
RE: TC , 8-1, 2-5, 8-3. TC , para. 2-5 to 2-9. TC , p. 1-8. Tactical Principles include― Focus Continuity Aggressiveness Timeliness Camouflage, Concealment, Cover, and Deception (C3D) Accuracy and Reliability Reconnaissance is a mission. typically― Combined arms Task-organized: Regular forces …and C2 Constituent Dedicated Supporting and can include― Irregular forces Affiliated Active supporters [Relevant population] …willing and/or coerced On the left side, you see―Reconnaissance is a mission. Actions are typically― Combined arms Task-organized Regular forces have command and control relationships: (Review definitions in TC , para. 2-5 to 2-9) Constituent Dedicated Supporting and can include― Affiliated Irregular forces are normally affiliated. ≈ No command relationship. Consider Active Supporters in a relevant population also. Principles are another consideration in understanding the threat. They include― Focus Continuity Aggressiveness Timeliness Camouflage, Concealment, Cover, and Deception (C3D) Accuracy and Reliability Q: Are other principles important? Name several. [See TC , p. 1-8] A: Surprise …to create advantage by unexpected actions. Protection …to preserve effectiveness. Concentration …to mass effects in time and space to achieve aim. Adaptability …to think and act with initiative, risk-taking, mission focus, and overarching intent .

6 Reconnaissance is a Mission
Definition of key terms creates the base plate for discussion & analysis. To understand the “problem,” you must have a common ground start point. TACTICAL TASK 5.0 RECONNAISSANCE Reconnaissance represents all measures associated with organizing, collecting, and studying information on the enemy, terrain, and weather in the area of upcoming battles. 5.1 Fix Enemy Security Forces 5.2 Find Employ reconnaissance element(s) to locate selected reconnaissance targets. 5.3 Contact Gain sensor contact between reconnaissance element(s) and their designated reconnaissance target(s). 5.4 Report Provide accurate information on reconnaissance targets in a timely manner. The “5 W’s” -- WHO-WHAT-WHERE-WHEN-WHY…and HOW. Throughout this class, use the “5 W’s” to identify the purpose and concept of how recon and CR support the overarching mission of a higher headquarters. Know the definitions: Reconnaissance is offensive action that includes all measures to acquire continuous, timely, and accurate information on designated aspects in an operational environment (OE); integrate collection analysis; and detect, identify, and locate reconnaissance objectives in order to permit effective threat operations. Your principle references for this week’s course are HQDA training circulars TC , Opposing Force Tactics (2011) TC , Irregular Opposing Forces (2014) TC 7-100, Hybrid Threat (2010) TC 7-101, Exercise Design (2010) FM , and FM , and TRADOC G2 Worldwide Equipment Guide Counterreconnaissance is the continuous combined arms action to locate, track, and destroy all enemy reconnaissance operating in a designated area of responsibility (AOR). Notice the final task within this threat definition—destroy.

7 Counter-Recon is a Mission
Definition of key terms creates the base plate for discussion & analysis. To understand the “problem,” you must have a common ground start point. TACTICAL TASK 6.0 COUNTERRECONNAISSANCE A continuous combined arms action to locate, track and destroy all enemy reconnaissance operating in a given AOR. 6.1 Predict Determine likely types and locations of critical enemy reconnaissance elements. 6.2 Find Employ reconnaissance elements to locate enemy reconnaissance elements. 6.3 Report Provide accurate information on reconnaissance targets in a timely manner. 6.4 Neutralize Destroy, deceive, or obscure enemy reconnaissance elements. The “5 W’s” -- WHO-WHAT-WHERE-WHEN-WHY…and HOW. Throughout this class, use the “5 W’s” to identify the purpose and concept of how recon and CR support the overarching mission of a higher headquarters. Know the definitions: Reconnaissance is offensive action that includes all measures to acquire continuous, timely, and accurate information on designated aspects in an operational environment (OE); integrate collection analysis; and detect, identify, and locate reconnaissance objectives in order to permit effective threat operations. Your principle references for this week’s course are HQDA training circulars TC , Opposing Force Tactics (2011) TC , Irregular Opposing Forces (2014) TC 7-100, Hybrid Threat (2010) TC 7-101, Exercise Design (2010) FM , and FM , and TRADOC G2 Worldwide Equipment Guide Counterreconnaissance is the continuous combined arms action to locate, track, and destroy all enemy reconnaissance operating in a designated area of responsibility (AOR). Notice the final task within this threat definition—destroy.

8 Recon/CR Methods RE: TC 7-100.2, 8-21—8-37; 8-2.
Keys: Flexibility, capability Ground: Mounted Dismounted Aerial: Fixed-wing Aircraft Rotary-wing Aircraft Unmanned Aerial System (UAS) At battalion and lower echelon levels—typical methods include: Ground: Mounted: wheel, to include motorcycle, and tracked Dismounted Stationary—can be permanent, semi-permanent, objective-focused. Aerial: Fixed-wing Aircraft Rotary-winged Aircraft Unmanned Aerial Vehicles (UAV) Note. Images are: BMPs; “technical” with heavy weapons; guerrilla with laser designator-range finder; insurgent cell with automatic rifles; dismounted reconnaissance patrol; “MD 600 Defender” [light helicopter with weapons]; “Skylark IV” UAV, and, high-mobility motorcycle team. Task focus examples can include― Signals—identify and disrupt or destroy C2 links. Target Acquisition– find and report critical enemy asset. Air Defense—seek the types of AD coverage and report and/or destroy. Engineer—locate type and extent of obstacles along axes. CBRN—verify if contamination exists in designated areas. Special—mission tasks as required by higher HQ. Tasks can be assigned to higher echelon recon forces or elements operating in the same AOR as a lower echelon tactical unit. C2 may be connected directly among recon elements or may route information through HQs.

9 Recon/CR Focus Examples
RE: TC , 8-21—8-37; 8-2. Task focus examples can include― Signals: Identify and disrupt or destroy C2 links. Target Acquisition: Find and report critical enemy asset. Air Defense: Seek the types of AD coverage and report and/or destroy. Engineer: Locate type and extent of obstacles along axes. CBRN: Verify if contamination exists in designated areas. Special: Tasks can be assigned to higher echelon recon forces or elements operating in the same AOR as a lower echelon tactical unit. At battalion and lower echelon levels—typical methods include: Ground: Mounted: wheel, to include motorcycle, and tracked Dismounted Stationary—can be permanent, semi-permanent, objective-focused. Aerial: Fixed-wing Aircraft Rotary-winged Aircraft Unmanned Aerial Vehicles (UAV) Note. Images are: BMPs; “technical” with heavy weapons; guerrilla with laser designator-range finder; insurgent cell with automatic rifles; dismounted reconnaissance patrol; “MD 600 Defender” [light helicopter with weapons]; “Skylark IV” UAV, and, high-mobility motorcycle team. Task focus examples can include― Signals—identify and disrupt or destroy C2 links. Target Acquisition– find and report critical enemy asset. Air Defense—seek the types of AD coverage and report and/or destroy. Engineer—locate type and extent of obstacles along axes. CBRN—verify if contamination exists in designated areas. Special—mission tasks as required by higher HQ. Tasks can be assigned to higher echelon recon forces or elements operating in the same AOR as a lower echelon tactical unit. C2 may be connected directly among recon elements or may route information through HQs.

10 Recon/CR Tactical Tasks
RE: TC 7-101, APP B. Recon & CR are mutually supporting actions. Lower echelon offense is typically: ambush-ASLT-raid-recon ATK. TC 7-101, Exercise Design, lists the 24 threat tactical tasks used by the opposing force for training. [These tasks are in review at TRISA-CTID for a refined set of tasks, subtasks, and purpose. CTID will announce publication of this revised task list in 2015.] When the threat plans to conduct an action and it is not addressed in this threat tactical task list at Appendix B in TC 7-101, the unit training may use a task from the Army Universal Task List (AUTL). This illustration presents the inseparable linkages between the tasks of― Reconnaissance and Counterreconnaissance. The four offensive tasks that can be associated with both actions are: Ambush Assault Raid Reconnaissance attack. Other tasks can and are often used in support of these tasks; however, for a small tactical element, these are the four primary offensive actions. Subsequent discussion will focus on small unit actions that may apply tasks of ambush-assault-raid-reconnaissance attack. A reconnaissance attack is the most ambitious of these four tasks and is typically conducted by at least a task-organized company or larger element.

11 Forms of Recon Operations
Route Recon Focuses along a specific line of communication, such as a road, railway, or cross-country mobility corridor. Zone Recon Involves a directed effort to obtain detailed information on all routes, obstacles, terrain, and forces within a defined zone. Area Recon Focuses on obtaining detailed information about the terrain or enemy activity within a prescribed area Recon in Force A deliberate combat operation designed to discover or test the enemy's strength, dispositions, and reactions or to obtain other information NOTE: This is different than the Recon Attack

12 Five Forms of Security Operations
Screen: Primarily provides early warning to the protected force. Guard: Protect the main body by fighting to gain time while also observing and reporting information and preventing enemy ground observation of and direct fire against the main body. Units conducting a guard mission cannot operate independently because they rely upon fires and combat support assets of the main body. Cover: Similar to Guard, but more independent. Area security: Protect friendly forces, installations, routes, and actions within a specific area. Local security: Low-level security operations conducted near a unit to prevent surprise by the enemy. These are the general reasons why a force conducts offensive action. Not meant to be exclusive, but covers the important and rational reasons why. From FM 3-90

13 Tactical Recon Examples
Screening to isolate battlefield X UAV Aerial Recon Ground Infiltration I INFOWAR operations are executed using complex layered attacks that involve many INFOWAR functions. In this example computer attack capabilities at the OSC level support tactical actions by targeting vulnerable enemy systems. Additionally SPF and INFOWAR units conduct operations designed to seize control and repurpose existing media infrastructure Finally INFOWAR EW assets are used to isolate enemy QRF in order to ensure that enemy decision makers are unable to gain situational awareness and react to activities in the AOR Observation Posts II I Counter Recon to prevent penetration • • • IN

14 Questions? Integrated Area Defenses may be employed at all levels. This form of defense seeks to take advantage of complex terrain and tends to reduce the effectiveness of strike efforts by opponents as a consequence of dispersion. The OPFOR does not orient the Area Defenses on retaining terrain rather the defense is oriented imposing delay and inflicting casualties. Fundamentally, an Integrated Area Defense consists of non-contiguous defensive positions that may not be within direct fire support range of each other but are integrated in C2 and purpose. Substantial physical gaps may, in fact exist. In these gaps the OPFOR uses precision long-range fires, Special Purpose Forces, insurgent and militia forces to destroy key systems, cause politically unacceptable casualties, harass the enemy and maintain contact. Some defensive positions in area defenses may include Complex Battle Positions or heavily defended spaces that are able to fight in all directions within the limitation of the terrain. These defenses are generally tied to complex or urban terrain. OPFOR conducts counterattacks at all levels in the gaps or inside defensive positions to impose delay, inflict casualties or preserve critical points in the defense. This form of defense requires extensive planning, preparation and pre-positioning of forces and critical C2 systems. Success is dependent on the two critical factors—Transition Operations that allow the OPFOR to occupy defensive positions and a coalition driven by a timeline for completion.


Download ppt "Warfighting Functions: Reconnaissance and Counterreconnaissance"

Similar presentations


Ads by Google