fm34 130
fm34 130
fm34 130
INTELLIGENCE PREPARATION
OF THE BATTLEFIELD
I ****?
II
FINAL DRAFT
JULY 1993
Task Number
Distribution/Availability Statement
Approved for public release, distribution unlimited
Supplementary Notes
Abstract
Subject Terms
"IATAC COLLECTION"
Number of Pages
348
Form Approved
REPORT DOCUMENTATION PAGE OMB No. 074-0188
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA
22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503
1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED
7/1/93 Report
4. TITLE AND SUBTITLE 5. FUNDING NUMBERS
Intelligence Preparation of the Battlefield
6. AUTHOR(S)
US Army Intelligence Center and Fort Huachuca Fort
Huachuca, AZ
17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT
OF REPORT OF THIS PAGE OF ABSTRACT
Unclassified UNCLASSIFIED UNCLASSIFIED None
*FM 34-130
i
t
FM 34-130
3
CHAPTER 5. TACTICAL, OPERATIONAL, AND STRATEGIC
INTELLIGENCE PREPARATION OF THE BATTLEFIELD.....S-1
Define the Battlefield Environment............5-1
Describe the Battlefield's Effects............5-3 i
Evaluate the Threat...........................5-6
Determine Threat Courses of Action............5-8
r
CHAPTER 6. INTELLIGENCE PREPARATION OF THE BATTLEFIELD
FOR OPERATIONS OTHER THAN WAR...................6- 1
Humanitarian Assistance and Disaster Relief...6- 1
Support to CounterDrug Operations.............6- 5
Peacekeeping Operations.......................6- 8
Shows of Force................................6-14
Attacks and Raids ........................... ..6-18
Non-Combatant Evacuation Operations...........6-19
Peace Enforcement.............................6-2 3
Support for Insurgencies and
Counterinsurgencies.............;...........6-2 5
Support to Domestic Civil Authorities.........6-2 8
ii
*FM 34-130
APPENDIX A. INTELLIGENCE PREPARATION OF THE BATTLEFIELD,
WARGAMING, AND INTELLIGENCE.SYNCHRONIZATION.....A- 1
General Rules ................................. A-2
Prepare for Wargaming.........................A- 3
Conduct the Wargame...........................A- 4
Record the Results of Wargaming...............A- 6
Conduct the Targeting Conference..............A- 9
Compare Friendly Courses of Action............A- 9
Synchronize Intelligence......................A-10
Execute the Battle............................A-12
An Example Application....:...................A-14
Summary ....................................... A-19
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..Glossary-1
REFERENCES.........................................References-l
iii
FM 34-130
Preface
The purpose of this manual is to describe the fundamentals
of Intelligence Preparation of the Battlefield (IPB). It
describes IPB, its use in directing the intelligence effort, and
its role in driving the staff's planning for contingency or
combat operations. It prescribes the procedures followed in
performing IPB and illustrates the application of IPB in various
situations.
This manual is intended to serve.as a guide for the use of
IPB by units of all types, at all echelons, across the entire
spectrum of conflict, and during the conduct of any mission, It
does not contain all the data required to conduct IPB, such as
specific information on threat doctrine or equipment
capabilities. Rather, it is intended as a guide to applying the
fundamentals of the IPB process to any situation which a unit
might face.
No part of this document should be construed as limiting
commanders' freedom of action or committing commanders to a
fixed or particular course of action (COA). Nor should it be
construed to imply that all IPB products must be prepared by all
commands in all situations. Commanders should apply the
doctrine and information presented in this manual in any manner
appropriate to their particular situation and mission.
This manual is intended for Army commanders and staffs at
all echelons. It applies equally to the Active Army (AC), Army
Reserve, and Army National Guard (ARNG). It is also intended to
be of use to commanders and staffs of joint and combined
commands; Marine and Naval forces; units of the Air Force; and
the military forces of allied countries.
The proponent of this publication is the United States Army
Intelligence Center and Fort Huachuca, Fort Huachuca, Arizona.
Send comments and recommendations for improvement on DA
Form 2028 (Recommended Changes to Publications and Blank Forms)
directly to Commander, US Army Intelligence Center and Fort
Huachuca, ATTN: ATZS-TDL-D, Fort Huachuca, AZ 85613-6000.
This manual does not implement any international
standardization agreements.
Unless this publication states otherwise, masculine nouns
and pronouns do not refer exclusively to men.
V
FM 34-130
CHAPTER 1
INTRODUCTION
::::::::::::::::::
;;;:;t:;;;:;;;;:;; What is Intelligence Preparation of the Battlefield? mfi
IPB is a ~systematic, continuous process of analyzing the
threat and environment in a specific geographic area. It is
designed to support staff estimates and military decision
making. Applying the IPB process helps the commander
selectively apply and maximize his combat power at critical
points in time and space on the battlefield by--
o determining the threat's likely courses of action.
o describing the environment your unit is operating within
and the effects of the environment on your unit.
IPB is a continuous process which consists of four functions
which you perform each time you conduct IPB:
o Define the battlefield environment.
o Describe the battlefield's effects.
o Evaluate the threat.
o Determine threat courses of action.
The IPB process is continuous. You conduct IPB prior to and
during the command's initial planning for an operation, but you
also continue to perform IPB during the conduct of the
operation. Each function in the process is performed
continuously to ensure that the products of IPB remain complete
and valid, providing support to the commander and direction to
the intelligence system through to completion of the current
mission and into preparation for the next.
l-1
FM 34-130
l-2
FM 34-130
In step three the G2/S2 and his staff analyze the command's
intelligence holdings to determine how the threat normally
organizes for combat and conducts operations under similar
circumstances. When facing a well-known threat, the G2/S2
can rely on his historical databases and well developed
l-3
FM 34-130
threat models. When operating against a new or less
well-known threat, he may need to develop his intelligence
databases and threat models concurrently.
The G2/S2's evaluation is portrayed in a threat model that
includes doctrinal templates which depict how the threat
operates when unconstrained by the effects of the
battlefield environment. Although th~ey usually emphasize
graphic depictions (doctrinal templates), threat models
sometimes emphasize matrices or simple narratives.
..
Determine Threat Courses of Action:
l-4
FM 34-130
:::::::::::::::::: ...................................................................................................................
~~~~~~~~~~~~~~~~~~ Who Conducts IPB .7 iiiiillilllliiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~m~~~~~~~~~
.............................................................................................................
Everyone in the US Army conducts some form of IPB. For
example:
o A rifleman in an infantry fire team considers the possible
actions of the enemy soldier he is about to engage. He
also considers how the local terrain and weather affect
both himself and his adversary.
o An armor company commander considers the possible actions
of the'enemy battalion that he-is about to engage. He
also considers how terrain affects the enemy's courses of
action and the accomplishment of his own mission. _
Both of these examples illustrate an informal application of
IPB; that is, describe the effects of the battlefield and
determine the threat's courses of action. It is the application
of battlefield common sense. At this level it requires little
formal education beyond realistic field training exercises
against a savvy enemy.
As the size of the unit increases, the level of detail
required in the IPB effort increases significantly. An armor
company commander's informal IPB produces little more than an
appreciation of what the threat is most likely to do during
their engagement. A division staff's IPB can produce--
o Detailed terrain analysis products.
0 Climatic summaries.
o Detailed studies of the threat, his equipment, and his
doctrine.
o A comprehensive set of enemy course of action models
depicting a broad range of possible threat COAs.
Any unit large enough to have a staff (Sl, 52, 53, and 54)
develops at least some of the formal IPB products described in
this manual. The G2lS.2 has staff responsibility for the
command's IPB--that IPB which directly supports the decision
making process. The G2/S2, however, is not the only one who
conducts or needs to understand and use IPB.
Every commander and everv member of the staff needs to
understand and aoolv IPB during the staff nlannina vrocess. IPB
identifies the facts and assumptions about the battlefield and
the threat that allow effective staff planning. IPB forms the
basis for defining the courses of action available to the
friendly command and drives the wargaming process that selects
and refines them.
1-5
E
FM 34-130
The G2/S2 is responsible for facilitating the unit IPB L
effort, but he and his staff cannot provide all the IPB the unit
requires. Every commander and staff officer needs to think
through the effects the environment has on both threat and
friendly operations.
Furthermore, every staff officer should prepare detailed IPB
products tailored for his own functional area. For example:
0 A division electronic warfare officer will expand and
refine the division all-source production section's IPB II)
products to include electronic preparation of the
battlefield.
i
0 The engineer liaison for a brigade staff refines and
customizes the S2!s enemy course of action models to show
threat options for the employment of obstacles or
breaching equipment. i
:::::::::::::::::: . . . . . . . . .
iiiiiliiliiiiliill What IpB Accomplishes iiiiil!iifiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
::::::::::::::::::::::::
iliiiiiiiiiiiltiliiiilii IPB and the Intelligence Estimate Ifii.;ifil!i!ff!!!liititt;ltffl;fiilfff!
l-7
FM 34-130
process. The products of IPB are the basis of the intelligence
estimate. In fact, if the G2/S2 lacks the time required to
prepare a written estimate he can usually substitute graphics
that depict the results of his IPB evaluations and analysis. -
. . . . . . . . . . . . . . ,...
jiJIiHIJilJiillll IPB and the Decision Making Process i;j;ilHilJ!li!Jijli!l^
Commanders and staffs use the decisionmaking process to
select a course of action and develop an operations plan,
operations order, or fragmentary orders that implement it. The i
results and products of IPB, conveyed in the intelligence
estimate, are essential elements of the decision making
process. Accordingly, the major IPB effort occurs before and m
during the first step of the decision making process.
The decision making process is a dynamic and continuous
process. The staff continues to estimate the situation as the w
operation progresses, adapting the command's course of action to
unforeseen changes in the situation. The IPB which supports the
decision making process must also remain dynamic, constantly
integrating new information into the initial set of facts and
assumptions.
l-8
FM 34-130
Mission Analysis:
,--
5 graphics to
OPORO 99-a
--m-
3
>;o8j
Analyze OPORD,
Mission COAs OPLAN,
Develop
Analysis
Analysis COAs
(Wargame) or lll>(BJ
and FRAGO
Decision
>(OBJ
^
A
ft ft ftl
XXX
>
5 4-
Partner Refined, prioritized Collection
Throat Threat COAs and Plan
COAs Draft Event Template
Intelligence
Synchronization
=LLH+4|I
l-9
FM 34-130
friendly and threat forces will interact on the battlefield.
The description of the battlefield's effects identifies
constraints on potential friendly courses of action and may
reveal impl~ied missions. It also identifies opportunities
the battlefield environment presents, such as avenues of
approach, engagement areas, zones of entry, etc., which the
staff integrates into potential friendly courses of action w
and their staff estimates.
Enemy capabilities and vulnerabilities identified during
evaluation of:the threat allow the commander and staff to
make assumptions about the relative capabilities of the
friendly command. Threat evaluation also provides the r
detailed information on the threat's current dispositions, -
recent activities, equipment and organizational capabilities
the staff need to complete their own staff estimates and
planning. i
l-10
FM 34-130
conferences follow or accompany the wargaming session to
refine selected high value targets (HVTs) from the enemy
course of action models into high payoff targets (HPTs) that
support the friendly COA. (See Figure 2-l)
Based on the results of wargaming, for each potential
friendly course of action the staff--
o Construct's decision support template (DST) and its
associated synchronization matrix.
o Identifv suvvortina intelligence reauirements.
t
BLUE RED
COR/XO
tt
SO/EWO
(Leads the We/gaming effort)
ttALO
tt
ENGR
t
t t
S2
-. _ - . _.
tlgure i-z. wargammg.
l-11
r
1
FM 34-130
o Refine the friendly course of action, to include I
identifying the need for branches and sequels.
o Determine the probability of success of the friendly
course of action.
The results of wargaming each potential friendly course of
I
action against the set of enemy course of action models
allows the staff to make a recommendation on the best
friendly course of action. The G2/S2's recommendation
includes an evaluation of the intelligence system's ability I
to provide the intelligence needed to, support each course of
action.
J
Appendix A of this manual discusses the relationship between -
IPB and wargaming in more detail.
Execution:
l-12
FM 34-130
..................
:::::::::::::::::: IpBandtheTargetingprocessiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
:::::::::::::::::: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . .. . . ii.:::::::
As part of course of action analysis and comparison, or
immediately after, the staff generally starts the targeting
process with a targeting conference. The targeting process
results in targeting guidance that supports the command's course
of action. The relationship of the IPB process to each step in
the targeting-~ process
~. -. -..- is
-~ discussed below.
_._~__._.__
6 (RISTA) 103.105 EW
7 (RECON) 111,112 P N
Accuracy 0 IO 200 meters: TDA
8 (NUKE/CHEMICAL) I D required
9 (POL) A D
----,.--. .
10 (AMMO) A II
LEGEND:
1 * Immediate N = Neutralize
P Planned S Suppress
A * As acquired D = Destroy
1-13
FM 34-130
Using the list of high value targets that form part of each
enemy course of action model, developed in step four of the
IPB process, the staff determine which targets should be
acquired and engaged as part of the friendly course of
action. The resulting list of high payoff targets generates
additional refinement of the event templates and matrices
during the targeting process as the staff wargames the
command's selected COA ~to ensure the RPT are acquired during
execution of the friendly course of action.
. . . . . . . . .
iiiiii;jiii;E#;E IPB and the Collection Management Process il~~B~l~iiiii;;iiiiiiiiijiiiiiiiifi
Collection management synchronizes the activities of
organizations and systems to provide intelligence the commander
needs to accomplish his course of action and targeting efforts.
IPB helps the commander identify his intelligence requirements
and provides the focus and direction needed to satisfy them.
l-14
.
FM 34-130
During staff wargaming the G2/S2 uses the enemy course of
action models developed in step fcur of the IPB process to
portray the enemy. The remainder of the staff '*fightsl' each
potential ~friendly CGA and note where and when in its execution
decisions are required to make the COA successful. They also
determine the specific intelligence required'to support each
decision and record it onto the list of proposed intelligence
requirements. When the commander selects a particular friendly
course of action he also approves and prioritizes the supporting
intelligence requirements.
DPs = Decision
Criteria
CTrigger).
DP #7
I
TW H+4
BOS
Synch Decision Criieria MRR CATK
-f--g-g
Matrix (Enemy Action) (Tk Co)
8
s <
Attack Helos
to TAI 7 at
Maneuver
H+5
Q
z
UJ
Fire Support H+S DPICM to
E TAI 7
&Ew 2
Jam MRR c
1-15
FM 34-130
IPB supports further development of requirements by
identifying the activity which will satisfy each requirement and
where and when the activity is expected to occur.' The event
template identifies the named areas of interest where.the
activity will occur. The event matrix describes the indicators
associated with the activity. Both the event template and event
matrix depict the times during which the activity is expected to
occur. The details these tools provide are the basis of an
effective' intelligence collection plan.
IPB products also contribute to the development of staff
synchronization tools such as the decision support template
(DST) and battlefield operating system (BOS) synchronization
matrix (see Figure 2-3). The collection manager uses these
additional tools to .ensure that the collection plan stays
c
synchronized with the command's operations. The resulting
intelligence synchronization matrix depicts the collection
strategies which support the command's course of action (see
Figure 2-4).
S2 processing WHEN decision maker
time. needs the intelligence.
H 1
2- CAV
HUMINT
COLLECTION
IUINT STHATEGY
&
DEADLINES
SIGINT
1-16
FM 34-130
:::::::::::::::::: ...................
;~:;z::;;;;;;z;;: IPB and the Command and Staff, Execution of Battle iii:jjiiii;ziiii
IPB provides the G2/S2 the tools he needs to quickly
evaluate incoming information and intelligence as it relates to
the.command's synchronization matrix and DST. This supports the
commander's decisions during course of action execution and
helps him to quickly confirm or deny the assumptions used during
course of action development.
During battle, the commander and staff track the DST and the
synchronization matrix against incoming reports. As the staff
nears each decision point they look to the G2/S2 for the
intelligence that supports that decision.
Sometimes the battle will progress in a direction
unanticipated during the initial IPB and wargaming. The enemy
is following his own plans and time lines; those determined
during staff wargaming are only estimates. Therefore, staffs
should ensure they use IPB, wargaming, and intelligence
synchronization as dynamic tools rather than as one-time
events. As the operation unfolds and the enemy's intentions
become more clear reinitiate the IPB and decision making
processes as needed.
This requires key members of the staff to "huddle" or
conduct "mini-wargaming." During these sessions, the G2/S2
reviews and modifies the initial IPB. The battle staff then
wargames the best friendly response or preemptive action based
on the updated set of IPB predictions. New decisions and COAs
lead to updating and refining the collection plan, intelligence
synchronization, and new decision support tools.
. . . . . .
How IPB Relates to Everything Else
IPB is an essential element of the intelligence cycle. The
products developed during IPB are so critical to this cycle and
the staff planning effort that it is a distinct function. There
are six intelligence and electronic warfare (IEW) tasks
described in FM 34-1, the Army's intelligence principles
manual. They are to develop-
o IPB products.
o Situation development products.
o Indications and warnings (I&W) products.
o Target development and target acquisition products.
o Battle damage assessment (BDA) products.
o Force protection products.
1-17
FM 34-130
These IEW functions are accomplished within the intelligence I
system of systems (ISOS) to operate in this cycle and respond to
the commander's intelligence needs. The ISOS is the flexible
architecture of procedures, organizations and equipment that I
collect, process, store and disseminate intelligence. The G21.52
uses IPB products to process volumes of information provided by
the ISOS and the intelligence Cycle.
IPB products also enable staffs to exploit the modern
technology of the ISOS by~focusing collection systems that now
provide near-real-time information in sufficient accuracy to 3
conduct direct targeting. IPB not only enables a staff to put
steel on target, but helps prioritize and maximize the effects
of targeting. IPB plays a critical role in the decision.making
process. Finally, the commander leads the IPB effort. The .-
entire staff executes the IPB process.
The military intelligence (MI) unit commander is not
responsible for the supported command's IPB. However, the MI
unit commander will use the IPB process to support his own
unique planning requirements. Some of these involve employment
of the ISOS assets under his control.
1-18
FM 34-130
CHAPTER 2
CONDUCTING INTELLIGENCE PREPARATION OF THE BATTLEFIELD
:::::::::::::::::::::
iiiiiiiiiliiiiiiiiiii How To -&,ndu& IPB iiiiiiiiiiiiiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ::.:: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2-2
FM 34-130
1 What is it? 1
Definition:
Identifying for further analysis specific features of the
environment or activities within it, and the physical
space.-where they exist, that may influence available
courses of action or the commander's decisions.
Two Short Examales:
During planning for a humanitarian assistance operation
the J2 identifies the activity of local armed factions as
a feature influencing available courses of action and his
commander's decisions. The J2 expands the area of
interest to encompass the area within the neighboring
country where these groups have established safe havens.
He examines the data bases and determines that they do not
contain the information he needs to estimate the different
courses of action each faction might adopt. He identifies
for collection information about the areas where they are
located and their past operations to complete his data
bases. ,Realizing that the information will probably
arrive too late to support initial planning, the J2
discusses with the commander reasonable assumptions for
use during planning. As the intelligence arrives, he
confirms his initial assumptions and incorporates the new
information into his ongoing IPB process.
During planning for a mounted attack the S2 identifies the
enemy's divisional attack helicopters as a major threat to
accomplishment of the brigade's mission. The 52 expands
the brigade's area of interest to encompass the reported
location of the enemy's attack helicopter battalion and
the zone where it will probably establish forward
operating bases and forward area arming and refueling
sites. He reviews his intelligence holdings to determine
the types of intelligence he will need about the terrain,
weather, and enemy helicopter operations to identify
potential helicopter locations and courses of action. He
builds an initial R & S plan to provide the intelligence
he needs to complete his IPB. As the reports come in, he
uses them to update or validate the results of his initial
2-3
FM 34-130
1 So what? 1
I
1 How to do it: 1
2-4
FM 34-130
GAPS (N KNOWLEDGE
UNCERTAINTIES'
I I
Figure 2-l. The common understanding of the battlefield.
2-5
FM 34-130
2-6 i
FM 34-130
2-J
FM 34-130
FLOT PL RED
OPERATfONS
AntA :
OF
FLOT
I
PL RED
.
2-8
FM 34-130
2-9
FM 34-130
1
Define the battlefield environment (cant)
How to do it (cant)
Establish the limits of the area of interest (cant)
What is it?
I
Definition:
3
The determination of how the battlefield environment
affects both threat and friendly operations.
A Short Example:
"General Eisenhower, after the Pas de Calais area, the I
best available landing sites are along the coast of
Normandy. Our best chances of a favorable combination of
moon light, tides, and weather is in late May and early i
June."
An 52 tells his commander, "Sir, terrain and weather best
accommodate offensive operations in the western part of
the region. The best avenue of approach ,is number 3, but
avenues 1 and 4 are also good. Avenue of approach 2 is
unsuitable since it requires use of terrain within the
neutral province. The region's best defensive terrain is
along PL TOM, but suitable terrain is also available near
PL JONELL and PL GARY."
Desired End Effect:
Identify how the battlefield environment influences the I
operations and courses of action of threat and friendly
forces.
2-12
FM 34-130
So what?
How to do it:
TERRAIN ANALYSIS
I
The best'terrain analysis is based on a
reconnaissance of the A0 and AI. Identify gaps in
knowledge of the terrain which a map analysis cannot W
satisfy. Use the gaps you identify as a guide for
reconnaissance planning. Because of time constraints
focus reconnaissance on the areas of most importance
to the commander and his mission. For example, when I
conducting terrain analysis for a signal unit you
might focus on identifying locations from which the
unit's assets can best support the force commander W
while also identifying the best locations for the
threat's EW assets that might target friendly Signal
systems.
-
Similarly, a counterintelligence analysis section
might focus on locations that best support employment
of threat intelligence collection systems and W
locations that best protect friendly elements from
their collection activities. See chapter 4 for
additional considerations in tailoring terrain i
analysis.
2-14
W
FM 34-130
2-17
FM 34-130
2-18 r
FM 34-130 P
/
MASKED AREA
2-20
..-
W
FM 34-130
\\\-/
7
Figure 2-6. Example of a horizontal line-of-sight template.
-:
Describe the battlefield's effects (cant) !
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (COnt) -1
Analyze the military aspects of terrain
observation and fields of fire (cant)
2-23
FM 34-130
2-24
FM 34-130
2-25
TREE SPACING
SLOPE
,...n
SOIL CHARACTERISTICS
COMBINED OBSTACLES
X. A
FM 34-130
2-27
FM 34-130
J
Describethe battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Obstacles (cant)
2-29
.
1
FM 34-130
2-31
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Key terrain (cant)
;
,-a
2-32
.
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Key terrain (cant)
2-33
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Avenues of approach (cant)
2-34
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Avenues of approach (cant)
LEGEND:
ffi) = NO-GO
.
2-36
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Avenues of approach (cant)
2-37
I
FM 34-130 I
2-38
r
FM 34-130
1
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Analyze the military aspects of terrain
Avenues of approach (cant)
2-39
FM 34-130
c
Describe the battlefield's effects (cant)
How to do it (cant) i
Analyze the battlefield environment (cant)
Terrain analysis (COnt)
Analyze the military aspects of terrain
Avenues of approach (cant)
I
avenues of approach are generally as
direct as possible inorder to minimize
risk to the aircraft and maximize the
. aircraft's payload. i
2-40
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Evaluate the terrain's effects on military
operations (cant)
2-41
i
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Evaluate the terrain's effects on military r
operations (cant)
i
0 intelligence and target acquisition system
positions;
o Forward area arming and refueling positions;
I
o'- landing or drop zones;
0 infiltration lanes;
0 etc.
I
See chapter four for additional considerations.
The terrain rarely favors one type of operation m
throughout the width and breadth of the battlefield.
Within a given area certain sub-sectors will affect
various operations to varying degrees. Based on the
m
location and nature of potential engagement areas,
battle positions, etc., determine which areas of the
battlefield favor each broad course of action.
Disseminate the results of terrain analysis in the
analysis of the AO, the intelligence estimate, and in -
graphic products that will aid the staff in the m
completion of their own estimates and plans. A common
and effective technique is the use of a modified
combined obstacle overlay (MCOO).
r
To construct a MC00 start with the combined obstacle
overlay and consider adding--
0 Cross countrv mobilitv classifications. Mark
areas of RESTRICTED and SEVERELY RESTRICTED cross
country mobility with easily distinguishable
symbology.
0 Avenues of aooroach and mobilitv corridors.
Tailor these to the type force under 5
consideration, basing them on factors other than
mobility as required. Categorize them by the size
force they accommodate and rank them in priority
order if justified. While it is possible to put
2-42
i
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
Evaluate the terrain's effects on military
operations (cant)
J
2-43
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Terrain analysis (cant)
2-45
FM 34-130 il)
i
Describe the battlefield's effects (cant)
How to do it (cant) r
Analyze the battlefield environment (cant)
Weather analysis (cant)
Analyze the military aspects of weather
I
Visibility (cant)
0 Sun rise; I
0 Suns set;
'- 0 End'evening nautical twilight (EENT-see
glossary);
0 .~ Moon rise; and, r
0 Moon set.
6
Winds:
Winds of sufficient speed can reduce the
;
combat effectiveness of a force downwind as
the result of blowing dust, smoke, sand, or
precipitation. The upwind force usually has
better visibility. NBC operations usually i
favor the upwind force.
Strong winds and wind turbulence limit I
airborne, air assault, and aviation
operations. Evaluation of weather in support
of these operations requires information on
the wind at the surface as well as at varying I
altitudes. High winds near the ground
increase turbulence and may inhibit maneuver.
High winds at greater altitudes can improve or I
reduce fuel consumption.
Wind generated blowing sand, dust, rain or
snow can reduce the effectiveness of radars
and communication systems. Strong winds can
also hamper the efficiency of directional
antenna systems by inducing antenna wobble. I
Precioitation:
Precipitations affects soil trafficability,
visibility, and the functioning of many
electro-optical systems. Heavy precipitation
.
2-46
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze. the battlefield environment (cant)
Weather analysis (cant)
Analyze the military aspects of weather
Precipitation (cant)
2-47
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Weather analysis (cant)
Evaluate the weather's effects on military
operations
2-48
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Weather analysis (cant)
Evaluate the weather's effects on military
operations (cant)
2-49
FM 34-130
=
I FORECAST TIME PERIOD (1992)
MISSION AREA OR USE 6 Oct | 7 Oct | B Oct j 9 Oct |
6 12 18 24 6 12 18 24 6 12 18 24 6 12 18 24
Mobility (ground)
Airmobile Operations
(Landing Lanes)
NBC
W//Y//A
33:
:AVORABLE (No shading-Green) UNFAVORABLE (I:-Red) MARGINAL (m -Yellow)
2-50
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Analysis of other characteristics of the
battlefield
2-51
i
FM 34-130
Describe the battlefield's effects (cant) I
How to do it (cant)
Analyze the battlefield environment (cant)
Analysis of other characteristics of the
battlefield (cant) r
2-52
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Analyze the battlefield environment (cant)
Analysis of other characteristics of the
battlefield (cant)
2-53
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Describe the battlefield's effects on threat
and friendly capabilities and broad courses
of action
2-54
.
FM 34-130
Describe the battlefield's effects (cant)
How to do it (cant)
Describe the battlefield's effects on threat
and friendly capabilities and broad courses
of action (cant)
2-55
FM 34-130 :
Describe the battlefield% effects (cant) I
How to do it (cant)
Describe the battlefield's effects on threat
and friendly capabilities and broad courses
of action (cant) i
2-56 I
FM 34-130
Evaluate the threat (cant)
What is it? (cant)
1 So What? )
2-57
FM 34-130
3
*k A( J Approximately 10 to 20v
?::?S5:S& .->:-:$:-;.-:-: guerillas open fire on
iyJ^Lead" vehicle' is*
:;g;>:;>destroyed by
^S$:cmd-detonated
x&z^frig^fSffiear vehicle
>:^K::>>X>:?^<x destroyed
reinforcing
HN/US troops
....*Im*I.
Antipersonnel mines and booby traps have been established on the
0 natural survivability positions to kill HN/US troops seeking cover.
Figure 2-11. Doctrinal templates depict the enemys normal or preferred tactics.
2-59
FM 34-130 c
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
Doctrinal templates
Doctrinal Temolates:
Doctrinal templates illustrate the deployment pattern I
and disposition preferred by the threat's normal
tactics when not constrained by the effects of the
battlefield environment. They are usually scaled I
graphic depictions of threat dispositions for a
particular type of standard operation, such as a
battalion movement to contact, an insurgent ambu'sh, or
a terrorist kidnapping. Figure 2-11 shows one such d
doctrinal template.
Construct doctrinal templates through an analysis of r
the intelligence data base and an evaluation of the
threat's past operations. Determine how the threat
normally organizes for combat and how he deploys and i
employs his units and the various battlefield
operating system (BOS) assets. Look for patterns in
task organization of forces, timing, distances,
relative locations, groupings, or use of the terrain I
or weather. Focus on major elements as well as
individual high value targets.
Even unconventional operations lend themselves to
graphic depiction. For example, an evaluation of the
database might indicate that when.robbing banks the
i
threat always sends four guerrillas inside with at
least two remaining outside. The four who move inside
the bank usually take up positions at distinct
locations within the bank. This type of information i
can easily be converted into a graphic representation,
although not necessarily to a standard map scale.
I
Doctrinal templates can ~also portray the threat's
normal organization for combat, typical supporting
elements available from higher commands, frontages,
depths, boundaries, engagement areas, objective I
depths, and other, control measures. Whenever
possible, convert these patterns into graphic
representations such as overlays or sketches.
2-60
i
1
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
Doctrinal templates (cant)
2-61
I
FM 34-130 I
2-62
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
High value targets (cant)
2-63
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant).
High value targets (cant)
2-64
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
High value targets (cant)
2-65
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
,
2 - 6 6
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Update or create threat models (cant)
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Identify threat capabilities (cant)
2 - 6 8
FM 34-130
Evaluate the threat (cant)
HOW to do it (cant)
Identify threat capabilities (cant)
Most situations will not present the threat with the ideal
conditions envisioned by his doctrine and TTP. He will
usually be under-strength in terms of personnel or
equipment. He may be short of logistical support. He may
not enjoy air superiority. His troops may be
inexperienced or poorly trained. As a result, the
threat's actual capabilities usually will not mirror the
ideal/capabilities represented by the complete set of
threat models. For example,--
0 The threat's doctrine may call for penetration att&ks
whenever possible. Your evaluation of his current
strength, however, may indicate that the threat lacks
the force ratio he normally considers adequate for a
penetration attack.
0 A terrorist group's normal tactics may call for the
use of car bombs or similar devices to tie down
emergency services while they conduct raids in other
parts of town. Your evaluation of the threat's
current logistics status, however, might indicate a
critical shortage of explosive materials.
Additional considerations
0 Use all available intelligence sources in the
evaluation of the threat's current situation. FOCUS
on the effects each incident or fact has on threat
capabilities rather than simply enumerate details.
2-69
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Identify threat capabilities (cant)
I
0 Use the OB files for the particular threat force you
are evaluating. Most forces differ from the ideal
portrayed in threat doctrine or tables of organization 7
and equipment. They may be equipped or organized d
differ,ently, train for special.missions, or have a
particular record of combat experiences that give them
a u.nique set, of capabilities. r
0 In addition to identifying actual threat capabilities,
the evaluation may identify additional threat '-~ r
strengths or vulnerabilities caused by the current
situation. Ensure you incorporate them into the
threat models, the intelligence estimate, and the
threat courses of action you develop in the next step i
of the IPB process.
0 Consider the threat's ability to operate in darkness I
or adverse weather. This is more than the technical
capability of selected items of threat equipment. For
example, the threat's tank fleet may be equipped with
the latest in night vision devices but the supporting i
infantry and other arms may not be.
0 Also consider training levels. A force that i
frequently trains in night combat may have a better
capability for such operations than a better equipped
force that seldom trains at night. A force that has
never trained in large scale troop movements may have
a limited capability to conduct large offensive
maneuvers.
i
0 Consider the time element when evaluating
capabilities. For example, the threat's forces may be
currently dispersed to the point where he is not i
capable of offensive action. Given time, however, he
can mas.s his forces. Similarly, the threat's current
logistical stockage may permit offensive operations i
for only a limited amount of time before his
stockpiles are exhausted.
r
2-70
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Identify threat capabilities (cant)
2-71
FM 34-130
Evaluate the threat (cant)
How to do it (cant)
Identify threat capabilities (cant)
Definition:
The identification and development 'of likely threat
courses of action that will influence accomplishment of
the friendly mission.
A Short ExamDle:
A Boer S2 tells his commander, "Sir, the enemy platoon
leader's likely
. objective is to retain control of the only
crossing point suitable for wheeled traffic over the
Silliaasvogel River. He can defend the crossing, known as
Duffer's Drift, with his 50 soldiers in any one of the
following ways:
(1) "He can leave it undefended until tomorrow (being
inexperienced and thinking that we'will not arrive
until the next day);
2-72
FM 34-130
Determine threat courses of action (COnt)
What is it? (cant)
(2) "He can dig his platoon into a small enclosure just on
the other side of the drift. A variant of this COA
would be for him to establish a trenchline astride the
main road;
(3) "He can occupy and fortify the Xraal village that
overlooks the drift;
(4) "He can occupy the river bed itself with only a small
outpost in the Kraal village. This goes against every
canon in British doctrine, however, we must consider.
this COA because it is so dangerous to the
accomplishment of our mission.
"Sir, I think the platoon leader will adopt one of these
COAs, in order of probability as I gave them. We need to
conduct reconnaissance of the riverbed and the Kraal in
order to find out which of these COAs he has chosen."
(Note: The Defence of Duffer's Drift, by MG Sir Ernest
Swinton, is a classic vignette illustrating the proper use
of tactics, IPB, and the practical application of
doctrine)
Desired End Effect:
Replicate the set of COAs that the threat commander and
staff are considering.
Identify all COAs that will influence the friendly
command's mission.
Identify those areas and activities that when observed
will discern which COA the threat commander has chosen.
2-73
FM 34-130
Determine threat courses of action (cant)
So what? (cant)
2-74
~,~
FM 34-130
i
Determine threat courses of action (cant)
How to do it (cant)
Identify the threat's likely objectives and
desired end state
Additional considerations
0 The situation may require you to start at more than
one level above your command, particularly in
operations other than war. "
0 Only in rare cases will you have the intelligence you
need to state the threat's objectives and intended end
state as facts. You will usually state them ,as
assumptions. As with all assumptions, ensure that-you
discuss them with the commander and the remainder of
the staff. Ensure that you identify assumptions as
such.
0 Especially during operations other than war it is
important that you consider more than the conventional
objectives of terrain or friendly forces. This is
also true at higher levels of command where the
threat's political and economic objectives have a
direct influence on his courses of action.
0 Terrain related objectives (intermediate and final)
often focus on key terrain features. Force related
objectives usually focus on reserve forces.
0 Even during defensive operations the threat will have
objectives, such as retain control of a piece of
terrain, defeat or delay a friendly force, etc. YOU
must also identify likely counterattack objectives
such as terrain features or friendly reserve forces.
0 It is possible that the threat's intent and objectives
may not interfere with the accomplishment of the
friendly mission. This is more likely during
operati'ons other than war.
IDENTIFY THE FULL SET OF COURSES OF ACTION AVAILABLE TO THE
THREAT
To ensure that you consider the full set of courses of
action available to the enemy you must at least consider--
0 The courses of action the threat's doctrine believes
appropriate to the current situation and the likely
2-75
FM 34-130
Determine threat courses of action (cant)
How to do it (cant) m
Identify the full set of courses of action
available to the threat (cant)
2-76
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify the full set of courses of action
available to the threat (cant)
.
2-77
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify the full set of courses of action
available to the threat (cant)
Criteria for courses of action (cant)
i
2-79
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify the full set of courses of action
available to the threat (cant)
2-80
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify the full set of courses of action
available to the threat (cant)
.
2-81
FM 34-130
Determine threat courses of action (cant)
How to do it (cant) m
Evaluate and prioritize each course of action (cant)
I
0 Compare each COA to the others and determine if the
threat is more likely to prefer one over the others.
Most forces will choose the COA that offers the
greatest advantages while minimizing risk. d
0 Consider the possibility that the threat may choose
the second or third "best" COA while attempting a
deception operation portraying acceptance of the
l'best" COA.
i
0 Analyze the threat's recent activity to determine if
there are indications that one COA is already being
adopted. Does his current disposition favor one COA
over others?
Use judgment to rank the threat's courses of action in
their likely order of adoption. Modify the list as needed
to account for changes in the current situation. For
example, the ~initial priority order of threat courses of
action does not account for the friendly course of action,
since one has not yet been selected. Friendly
dispositions may change as the command moves to adopt its
own COA. How will that change the likelihood of each
threat COA? Given time, you could develop several 1
different versions of the prioritized list of threat
courses of action: a different order for each potential
friendly course of action. Alternatively, after the ai
commander has selected the friendly course of action,
reprioritize the initial list of threat courses of action
to reflect changed friendly dispositions and activities.
i
DEVELOP EACH COURSE OF ACTION IN THE AMOUNT OF DETAIL TIME
ALLOWS
i
Once you have identified the complete set of threat COAs
develop each course of action into as much detail as the
situation requires and time available allows. Base the
order in which you develop each COA on its probability of i
adoption and the commander's guidance. To ensure
completeness, each course of action must answer five
questions: G
o What - the type of operation, such as attack, defend,
etc.
.
2-82
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
2-83
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the.amount of
detail time allows (cant)
Situation template (cant)
ENVIRONMENT
(Weather, terrain,
population, etc.)
i---L
ENEMY COAs
(Situation templates)
Figure 2-13. Consider the effects of the env-r nment on the enemys
doctrine to develop enemy &~As.
2-84
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
Situation template (cant)
.xx
c-
r-. \ .,. [MS
c- <J3
c-
a
c-
c-
AP
c- <5
-
Figure 2-l 4. Situation templates depict enemy COA.
.
2 - 8 6
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
Situation template (cant)
.
2-88
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
Course of action description and options (cant)
2-89
34-130
Determine threat courses of action,(cont)
r
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
High value targets (cant)
2-90
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Develop each course of action in the amount of
detail time allows (cant)
2-91
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify initial collection requirements (cant)
Event template (cant)
.
2-92
FM 34-130
SIT TEMPUTE 1
CJ> c_^
SIT TEMPLATE
O o
SIT TEMPLATE
V
cO/ CONSOLIDATED
SIT TEMPLATE
AD
JLNAI 1 fm
f'WAI A /
JAT7 X
v
EVENT TEMPLATE
/ \Hh\
1
^,
2-93
FM 34-130
13 1 or 2 Bdes attack S
2-94
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
Identify initial collection requirements (cant)
Event matrix (cant)
.
2-95
:
FM 34-130
Determine threat courses of action (cant)
How to do it (cant)
2-96
FM 34-130
The abbreviated IPB process (cant)
Work ahead (cant)
2-97
FM 34-130
I
THE MINIMUM ESSENTIALS
In a pinch you can get by with just a good set of threat
course of action models and a good event template and I
matrix. To save time and materials, you can combine all
threat course of action models templates and the event
template on a single map overlay or use cartoons and I
sketches as a map substitute.
If you have not yet described the battlefield I
environment's effects, work directly from the map'or a -.
sketch of major terrain features. Start by identifying
the set of threat courses of action and briefly comparing
them to determine which is most likely and which is most i
dangerous, considering the current situation and your
command's mission. Rank the remainder in order of likely
adoption. I
2-98
FM 34-130
The abbreviated IPB process (cant)
The minimum essentials (cant)
2-99
FM 34-130
CHAPTER 3'
EXAMPLE APPLICATIONS OF INTELLIGENCE
PREPARATION OF THE BATTLEFIELD
FM 34-130
25 X X X/fLOA-------
1 PL wasp
3-2
FM 34-130
DEFINE THE BATTLEFIELD ENVIRONMENT
The operations graphics from corps specify the division's AO. 4
It lies within the current boundaries and extends out to the LOA
fFiaure 3-l-11.
3-3
FM 34-130
XXX
l * LOA
XX
A^
PLWASP ---I
Figure 3-l -2. Expand the Al to include potential threats affecting friendly COAs.
3-4
FM 34-l :0
LEGEND:
^^ - NO-GO **+H*
<^ - SLOW-GO
, _I
Y_-- ______ \------AL.
I LOA
-
Figure 3-13. The combined obstacle overlay depicts effects on mobility.
The engineer (terrain) detachment conducts an analysis of the
various terrain factors that constitute obstacles to movement to
produce a base graphic depicting the environment's effects on
mobility. Because of the availability of logging roads and the
lack'of dense undergrowth, the woods are passable. Some branches
of the river system are fordable and pose no real obstacle to
maneuver. The Kald River, however, is a major obstacle that will
require the division to conduct river crossing operations if the
bridges cannot be taken, intact.
3-5
FM 34-130
3-6
FM 34-130
3-7
FM 34-130
- NO-GO
- SLOW-GO
e
+Hm - obstacles
LOA
3-9
FM 34-130
w
-C 3
LEGEND:
^^ - Infiltration lane
| 12 J - Landing zone
-- x x------- _---.----___
LOA
3-10
FM 34-130
-~
2555 Y. .--.----.--- I /
-s.... xx .----.--- - ---.- _- -....-- ;;t;---
\.1 UUM
3-11
.
FM 34-130
3-12
FM 34-130
xx
E3l.
xxx
llsl
I PL WASP
3-13
FM 34-130
v- XXX
XX /
XX / L
1
Bl -^> I
3
LD/LC
I
-.-.-...~---~---__~~~~ ~.~~~ _~ ~-.
PL WASP
3-14
FM 34-130
IWect fire target acquisition 1 Vis >2 miles Vis 0.5 to 2 miles ViscO.5 mile
Templl -iO Temp<-10
I4irmobile (K) CIG/vis X100 and CIG/vis 1300 and C$/vis < 200 and l/Z
1 -l/2 miles. 1-i/2 miles but>200
and f/2 mile
No icing or turbulence Moderate icing and
Surface winds Light icing and turbulence
at ~120 knots turbulence
Surface wind > 30
Surface wind> 20 knots
knots but < 30 knots
Night
Jight vision goggles Sky clear Scattered clouds Overcast clouds or
(PVS-5)
PVS-5) and starlight scope Moon>one quarter New moon to one new moon
Elevation > 3oD quarter
3-15
FN 34-130
NBC
-. - ._.
rlgure a-l-14. Weather effects charts and matrices present
the resutts of weather analysis.
3-16
FM 34-130
,. 2400
1800 0600
1200
3-17
FM 34-130
_-, ___ ~
I._._ xx.- _---.--- __----. --- 1----
3-18
m
FM 34-130
LOA
3-19
FM 34-130
.x x -
AA
I=
Main
X X
3-20
FM 34-130
(DAG)
d>
J||l
3-21
FM 34-130
Failure Options:
- Local counterattacks.
- Withdraw.
3-22
.
FM 34-130
D : I Command centers 1
coordinate move and
LDL
I I I I commitment of reserves.
RE I RELATIVE Central FS centers nearby. +
u I L I M I TARGET SET WORTH
PA I
TI Y I T I I LOC allow raoid move of
reserves and continued
resuppty.
FS
MANEUVER Reserve units critical to
*+!--I success of defense. j
AHA
ENGINEER
RISTA FS masses fires to assist
defense and commitment
REC of reserves.
NUKE/CHEMICAL
CLASS ill POL Acquire deep targets to
CLASS V AMMO disrupt friendly attack.
/ 1 CLASS IX MAINT 1
LIFT Stockpiles vulnerable,
important for continued
LOC anti-armor and FS fires.
3-23
FM 34-130
3-24 i -
FM 34-130
iwi^
4*tf
'^Vftx^Mmyfc^'" *"*
- Defensible terrain
3-25
FM 34-130
V. L^=^y
l^-CTf ''c
3-26
FM 34-130
3-27
FM 34-130
Obviously, the enemy has the optioti to weight the south more
heavilv than the north. We depict this option as'COA 3
(Figure 3-1-26)
5hl f-LoA
II /
^ *^^_ V.- .W.WA .-- X^J . . mm m*J .'. \ OBJ * W>J j/tf)
3-28
FM 34-130
The enemy also has the option of withdrawing from his current
positions and taking up defensive positions east of the Kald
River. However, the description of the battlefield's effects
indicated a lack of suitable positions on the east bank of the
river and the enemy's TTP discourages the "sacrifice" of terrain
in this manner. It is, however, a feasible COA that the enemy
could adopt if faced with overwhelming friendly strength. A
defense on the east bank of the river'; even without suitable
positions would force our division to conduct an opposed
crossing, significantly slowing the attack. Conversely, if
friendly forces catch the enemy during his withdrawal over the
river they co'uld readily destroy any opposition to our attack.
Based on these considerations we add enemy withdrawal to
positions east of the river as COA 4 and highlight potential. _.
crossing sites as target areas of interest and potential
engagement areas.
figure 3-l-27
new figure
3-29
I
FM 34-130
Figure 3-l -28. Develop situation templates to include TPLs and HVTs.
FM 34-130
Using the description of tactics from the threat model as a
guide, we mentally wargame each situation template. This allows
us to tailor the description of the tactics associated ,with the
COA to the specific situation. We focus on activities that are
associated with the enemy's adoption of each option open to him
or those likely to lead to a friendly decision. In this case, we
use a matrix style format (Figure 3-l-29). The matrix addresses
each of the enemy's battlefield operating systems in as much
,~,.. detail as necessary to support friendly planning. Like the
situation templates, we will update and refine,it during staff
wargaming.
Figure 3-l -29. Each situation template includes a description of the COA.
3-31
FM 34-130 \
NUKE/CHEMICAL
1
CLASS III POL Acquire deep targets to
CLASS V AMMO disrupt friendly attack.
1
/ / ClASS IX MAINT I
LIFT Stockpiles vulnerable,
important for continued
LOC anti-armor and FS fires.
Figure 3-l -30. Doctrinal HVTs are refined and included in the description of the enemy COA.
.
3-32
FM 34-130
To establish initial collection requirements designed to tell
us which COA the enemy will adopt, we,compare the four situation
templates and identify differences among them. The unique
locations and events associated with each COA, if detected, serve
as reliable indicators of adoption of the COA. The event
template focuses on the locations where events unique to each COA
are expected to occur. We extract the named areas of interest
depicting unique events from each situation template and
consolidate them on a single overlay.(Figure 3-1-31). The
resulting event ,template allows us to focus collection planning
on confirming the "set" of the enemy's defenses. This, however,
is just the s,tart of the event template.
t-- 6h --I .'/ / ,tOA
- --_-----
a...
--
/
I
LOA
Figure 3-l 31. Base the event template on the set of enemy COAs.
3-33
FM 34-130
jAiSO.
r^^^^ft^Ov
LEGEND:
^^ - NAl
Figure 3-l-32. Refine the event template to include key events in each enemv COA
3-34
FM 34-130
We turn next to the COAs available to the two armored
divisions. After identifying likely counterattack objectives, in
priority order, we identify available avenues of approach. We
evaluate each COA for NAIs that will provide confirmation or
denial of its adoption by the enemy. We include these NAIs on
the event template, along with the TPLs associated with the
armored divisions' movement (Figure 3-l-33).
,J'" J
5km
.A4A /'tOA '
I!!
I
7
';.iti .',
.^dffS^?| 2
C
*M3" ?'*&? >A ^
5?
x;-*> 1 *"YV^ \ \
LEGEND:
{ J - Objective
I -NAl .I -.
C<-r^_)
I -- x x------A (tte~r
-_-_.,- IAll/
.r. I
I .- .I. --.---. --
3-35
FM 34-130
We evaluate the COA available to the air assault brigade in
the same way. Because of friendly air superiority, enemy air
assaults into the friendly rear are unlikely. Accordingly we
concentrate on COAs that use air assault assets to block friendly
penetrations. We identify NAIs associated with each COA and
transfer them to the event template .(Figure 3-l-34).
/ /
___.-----
TX7 -LOA-----
, .>
.- .-
A XX
., 2
5 XX
o
LEGEND:
; J - Objective and NAI ea
I I -NAI LD/LC
1~. PL WASP
Figure S-l -34. NAls associated with the air assault brigades COAs.
3-36
FM 34-130
TIME i
NAI EVENT INDICATES COA
EARLIEST LATEST
; 1 Covering force 1
2 Covering force 1
3 Covering force 3
Battalion defense 1
3-37
FM 34-130
DISSEMINATE, USE, AND REFINE IPB PRODUCTS
Completing the event template and event matrix does not end
the IPB process. As we receive new information and
intelligence, we re-evaluate the IPB products to ensure they are
still accurate. If intelligence indicates the need, we
reinitiate the IPB process to include information that changes
initial assumptions and evaluations..
We disseminate the results of IPB to other staff sections and
Units to use in their own IPB efforts. Subordinat~e units and
other staff sections take the results of our IPB and refine and
adapt them tomeet their own needs. (See Figures 3-l-36 through
3-l-39.)
~~
For example, among other things, the Fire Support Element -
uses the results of describing the battlefield's effects to
identify areas that are not suited to the large-scale deployment
of friendly artillery units (Figure 3-l-36). Notice that the
Fire Support Element has included areas inhabited by a large
number of enemy sympathizers in this category.
__---.,
I Y. A;.- x x. ------- ----_.--_ il---
LOA
Figure 3-l -37. Templated locations of HVTs.
3-39
FM 34-130
The Electronic Warfare Officer uses the situation templates
as a starting point for his own situation templates that depict
enemy communication nodes. Here, he uses a segmented wheel to
depict the locations of the various communication sites. The
letters within each seament correspond to a matrix that further
defines the communication systems associated with each node
(Figure 3-l-3.3).
+ 5km ---/ .- ;' /
- XX 1
-.-- - ..~~~._--. : ._ - LOA
Q
3-40
3
FM 34-130
The Counterintelligence analysis section uses the situation
templates as a starting point forits own templates that focus
on the enemy's electronic attack and collection assets
(Figure 3-l-39). In turn, the counterintelligence analysis
section passes its IPB products on to the Deception and
-~Targeting
~. -~~Cell for their own use.
- am ---I \......
y /<?-+A/~ / Hi n i
- --. .i~
^wrm /''
"11 JWW(.,m. \
3-41
e
FM 34-130 -?
figure 3-l-40
new figure
chemical school input
3-42
3
FM 34-130
xx
1109
xx------@
Fordable
rv- River= International border (fordable)
Figure 3-2. Scenario 2, general situation.
Because of the uncertain political situation, with the threat
of imminent hostilities, we conduct the IPB process as quickly
as prudence allows. This is an example of abbreviated IPB.
. 3-43
FM 34-130
DEFINE THE BATTLEFIELD ENVIRONMENT
We define our AI to include all probable threats to the
brigade's defensive mission. We consider concentration for an
attack in our sector as well as the risk of attacks from
adjacent sectors (Figure 3-2-l).
-\\
\
i1
xx
lroll
iAl'
----~alional border (fordable)
3-44
FM 34-130
DESCRIBE THE BATTLEFIELD'S EFFECTS
We examine the map for the various terrain factors that
create obstacles to mobility within the AI. Rather than create
separate overlays for each factor, we record the end results
(mobility corridors and avenues of approach) on a single graphic
product (Figure 3-Z-2). To determine avenues of approach, we
must first identify likely objectives. To keep the graphic from
getting too cluttered, we put air avenues of approach on a
separate overlay.
X X
X X
)ISI
LEGEND:
3-45
FM 34-130
There are few obstacles to flight within the AI. Accordingly
our evaluation of threat air avenues of approaches focuses on
direct routes that offer some protection to aircraft
(Figure 3-2-3). - .~ 7
I
I
3-46
FM 34-130
We next identify defensible terrain within the brigade's
sector. We identify potential defensive positions for both the
heavy and light forces within our brigade, oriented on the
threat's likely avenues of approach (Figure 3-2-4).
xx
JZL
AAA X X
Isl
"TO 1 S3 X X
:GEND:
^S Defensible te/^n
xx--
[ Tofdabio border (fordable:
3-47
FM 34-130
RVALUAT.E THE THREAT
Our evaluation of the threat model reveals the ,threat's
similarity to our own forces in doctrine and organization
(Figure 3-2-5). In this case, even their equipment is
identical. Accordingly, since the entire staff is familiar with
US style operations, we save time by using mental doctrinal
templates for ground forces instead of creating physical
products. .
t^d
- EU A X
GSAC
A -A A A AH-64s UH-60S
(Including
XX
A = A A A A OH-58Ds)
QE3 A
XX
A=A A A A f~?$-!&FS
=
<0 A = A A A I 14 soniesof
m =,--,
A-10 ,-, n n CAS.
-A A A
Available Avn - Corps
XX
-a E3
- ED A 00
-A A A E3
-A A A A
D4< C><]
CH-47S
AH-64S
3-48
FM 34-130
We can not count on air superiority during the opening stages
of the conflict and therefore must pay special attention to the
threat's air support capabilities. Evaluation of the threat
model indicates we can expect up to 14 fighter/bomber sorties
against targets in the brigade's sector each day. We extract
the appropriate doctrinal template from the threat model.
figure 3-2-6
new figure
3-49
FM 34-130
During the fight for air superiority the threat will probably
pass deep strike aircraft over the brigade sector en route to
deeper targets. The threat model indicates that the threat may
attack air defense assets deployed in the brigade sector in
order to create the necessary air corridors. Accordingly, we
examine the template that depicts threat force large scale air
operations.
figure 3-2-7
new figure.
3-50
FM 34-130
DETERMINE THREAT COURSES OF ACTION
Overlaying our mental doctrinal templates on the evaluation
of the terrain's effects, we create a graphic depiction of the
set of threat COAs. This serves as our situation template
(Figure 3-2-8). For the moment, we put off developing the COAs
in detail.
m
Ali
3-51
FM 34-130
We create a matrix to describe each COA within the set
(Figure 3-2-9). This helps us to.visualize the conduct of each
threat COA during wargaming and aids collection planning.
Note that the matrix reads from right to left in'order to
match the flow of action on the graphic (see Figure 3-2-8).
This is one acceptable technique.
13 1 or 2 Bdes attack S
3-52
FM 34-130
Using the situation template and the matrix describing the
COAs, we prepare an event template. We focus on NAIs that will
confirm or deny adoption of each COA within the set. The nature
of the terrain causes some of the NAIs to take untraditional
shapes (Figure 3-2-10).
LEGEND:
3-53
FM 34-130
We prepare an event matrix to describe the activities we
expect to find in each NAI if the'threat adopts its associated
COA (Figure 3-2-11).
13 1 or 2 Bdes attack S
3-54
FM 34-130
incorporate it into the initial IPB. If incoming intelligence
denies assumptions made during planning, we reinitiate the IPB
process to identify the impact on current plans. If necessary,
we recommend to the commander that he reinitiate the decision
making process in order to change or modify the friendly plan.
::::::::::::::::::::: ..........
~~~.zzE~:~~ Scenario Three: Counterinsurgency Operations ffiiiliiiiii;;;;;;;;;;;;;;;;;;i
The 2d Battalion, 9th Infantry (Light [L]), is conducting
counterinsurgency,operations within the rural country of
Forgotonia. The host nation is plagued bye an insurgency which
is sponsored by Metropolania, the country that neighbors
Forgotonia to the east.
The advance party for the 2d Battalion, 9th Infantry, has
just arrived at the capital city staging base. The staff of thk
9th Regimental Combat Team has issued an OPORD at the arrival
airfield.
The battalion executive officer (X0) initiates the command
estimate process. The X0 informs the 52 that he must present
the initial set of IPB products to the battalion staff in
6 hours.
The regimental 52 and several intelligence experts from the
host nation present the battalion S2 section with a 15-minute
overview of the division and regimental level intelligence
situations. They also leave several boxes of intelligence
reports that may be pertinent to the battalion mission.
The 52 reflects upon the briefings he has received. He
realizes that the regimental 52 developed good IPB products for
the regimental level of focus. However, their level of detail
will not support planning at the battalion level of focus. As
he sifts through the stack of intelligence reports, he realizes
that these files contain raw information in enough detail to
support battalion planning, but they must first be analyzed
within the context of the battalion's mission.
In order to produce the IPB products necessary to support
staff wargaming, which starts in 5-l/2 hours, the 52 sets the
following schedule for the section:
0 10 Minutes: Define the Battlefield: Determine the types
of information that need to be extracted from the
intelligence files and define the limits of the
battlefield.
3-55
FM 34-130
0 2 Hours: Process the stack of intelligence using the
filter procedures established in ,define the battlefield.
0 30 Minutes: Describe the Battlefield's Effects:
Evaluate the battlefield's effects on military
operations. Develop overlays that depict the effects of
the battlefield on enemy and friendly COAs within the TAO.
0 30 Minutes: Evaluate <the Threat: Identify the
organization, composition, and tactics of the enemy that
the 2d Battalion,, Sth'Infantry (L), ':is likely to face
within the AO.
,.
0 1 Hour: Determine Threat COAs: :Although he has studied
the "doctrine" of insurgents operating in this region
and the tactics of light infantry, the 52 will "bounce". -
the IPB products against the battalion personnel who best
understand the tactics of dismounted infantry; that is,
the S3, the C Company commander, the A Company first
sergeant (lSG), and the scout platoon sergeant (PSG).
These "second opinions" help the S2 ensure that he has
considered all possibilities. Meanwhile, the remainder
of the S2 section will re-process the stack of
intelligence reports to find any pertinent information
they may have overlooked during the initial processing.
0 20 Minutes: Determine the most effective methods for
presenting the IPB products to the battalion staff.
Conduct rehearsal briefing.
Using the resulting time schedule, the S2 section jumps into
the IPB process.
DEFINE THE BATTLEFIELD ENVIRONMENT
As usual, the A0 is established by higher headquarters. The
S2 examines the characteristics of the battlefield and
determines that the populace as well as terrain and weather will
have a significant effect on friendly and threat force options
and operations. He also determines that the complicated rules
of engagement included in the brigade's operation order are a
significant characteristic of the environment. Not only will
they affect friendly options but, once the threat learns of
their nature, they are likely to influence threat courses of
action as well.
3-56
FM 34-130
Because the insurgents are getting some assistance from
Metropolanian military units (the .otNuevo Metropolanio
Ejercito8'-NHE), the S2 notes the nearby NME regiment as an
additional significant characteristic of the battlefield.
Based on these considerations the S2 recommends the area of
interest depicted in Figure 3-3.
mmm
-V^-A -^^M^^ River=International boundary
3-57
FM 34-130
DESCRIBE THE BATTLEFIELD'S EFFECTS
The 52 decides that the population is one of the most
important characteristics of the battlefield, likely to have a
major influence on both friendly and enemy COAs. Accordingly,
he prepares a population status overlay depicting their
political sympathies (Figure 3-3-l). He will use it later in
determining enemy COAs. Other staff sections will use it while
developing potential friendly COAs.
tj i f .:>J
[ff &.
mSB,
3-58
m
FM 34-130
Although unusual, the 52 decidesto prepare a legal status
overlay (Figure 3-3-2) that considers rules of engagement. In
this case, the host nation has established an elaborate status
of forces agreement which drastically alters the.rights and
authority of the 2d Battalion, 9th Infantry (L), as it moves
through the AO. This varying sets of restrictions and rules of
engagement obviously affect the COAs open to the friendly
command. Similarly, since the enemy will no doubt learn of
these restrictions on the friendly force, they will probably
influence enemy COAs as well. The SZ will use this overlay to
integrate the effects of friendly rules of engagement on threat
COAs as he .develops them.
~.---~-~---- .._~~ .._...
! i j \.y 4 S I f, / --
' ....!
^- 'teM^^^v'
V-K-; /. /
IS!
uJ!
x. *
./-.
-:/.-.
IS!
Mgff4?'?!^\v' (R*flMl"'S) "\
LEGEND:
- ROE sat 1
. ROE set 2
Unmarked - ROE set 3
*fti@tf*w^3|fr> ^ River internatioi
International oounaary -'*
A
Figurs3-3-2 Legal ~~AIUO OVWI~Y.
3-59
FM 34-130
The S2 section then prepared an overlay depicting LOC within
the AI. After evaluating the effkts of the various military
aspects of terrain, the S2 section identified the' areas along
each MC that best lend themselves for use as ambushes sites
(Figure 3-3-5).
V
/
*W:
'SU WJEL^'fB
:>"x^
S WAK:***--:
ll ...>. A
\ vK
\y?k>
-.. 7r*"->^'^- \\\./ "V.<>
M \\ ^K ,^^rJJ-~'
<&
:#ra#*
L:-;
33Era
<//*
&$*
SI
XN Vfl Sxfc^S
-v.'.->.-?vvv. ^ LEGEND:
>*^AWMMV ?$^H -Ambushsites - Roads
yi i?
>
-A; - Favors
- -Trails
insurgents
f^^S'v^y ,#/? RivercInternationalboundary -' : '"''-V:;.
Flgure 3-3-5. LOC and likely ambush sltes.
3-62
FM 34-130
EVALUATE THE THHEAT
The S2 section begins evaluating the threat by.reviewing the
common understanding of the battlefield. They examine the
organizations of the nearby NME infantry
. regiment as well as
that of the insurgents operating within the A0 (Figure 3-3-6).
Neither the insurgents or the Metrolpolanians have any
sisnificant air Dower canabilities..
lxl
M Ml Ml > 9 Ml
Appox 1 | ' | 60
60mm
mm ' J unk
1*1 Hi EE
4.2- inch I ' nk
Approx moaarc unk
6 pax * monarc
monars W
Apprax M60MG. 20 'mules'
20 men a LAWS a + 4 lo 5
M16sand appro* specialist ea
AK-47S 20 pax
ai r,m
81 mm *
LM* unk
monan
Each:
wmen
/M16s al-id NC.475
60mnmvr
--
Figure 3-3-6. Enemy organuarlons.
3-63
P
FM 34-130
I
The S2 section started to plot a SITMAP in order to record
the mass of available information, but realized that a time
event chart described the general intelligence situation in the
A0 more effectively (Figure 3-3-7). Instead of a SITMAP they
decided to use coordinates registers to track activity within
selected areas.
h 1 h
1
N.LM (local)
A qm
_l----- b,eaceful
Local training reported
HN activates Cl -
- 8-7s ,.: + in the Monmouth-
methoda,lullll
A insurgency----
r;ulllpany.
Beardstown-Bushnell program.
triangle.
I
1
J
1
Reinforcina trooos U
Reinforcing HN troops
1 ambushedi&&& m arnbushedinMcCimb. p
U; Blood Day': 7 x local
politicians loyal to HN
I
the area.
Beardstown is proclaimed
Reinforcing HN troops independent/ Insur- HN barracks in
ambushed in McComb. gents declare marshal Bushneil is raided.
law. HN troops kill 35 killed.
approx 15 guerillas.
3-64
r
FM 34-130
While processing the stack of intelligence reports, the S2
section noticed certain recurring 'names. The S2 section
established an activities matrix to quickly display which
prominent personnel within the A0 were related to each
organization or type of activity (Figure 3-3-S).
~~ --.~~~-~ .-_
People's Democratic
(unk peasant group)
order (right wingers)
>.
Movement (political
LEGEND: c
Society (peaceful
New Liberation
# - Confirmed 0 Probable
preservation of
Society for the
E
0 - Possible o
U
moderate)
ui . Name of
Remarks 3
s Individual -
C z
Leader in the insurgent Johnston, S.D.
Warrant co. Possible pit cdr alias
The Red'
Possibly linked to
death squad activities. O Garra, NA 1
g.
Mayor, ineffective due Mulvihill.P. 3"
to war-torn town.
o o o Seipel, B.
Leader in the insurgent
co. Pit leader or XO. 0 0 o o Trollinger,L
Possible head of 01
intelligence. 0 Ahearn, E. o
0 0 0 Martinez, E.
3-65
FM 34-130
^v loh nstc
LEGEND:
A
3ar 'a l - Confirmed
\l dulvihill b - Possible
Suspected
0 0 0
^ taniels 0 ~- Probable I-
0 0 o 0 ^Jenkins
0
VCormier
D 0 0 ^Vebb
y 1 Seipel
0 0
0 0 0 V rollinger
0 o 0 V/toeam
0 0 0 0 0 V flmc
0 0 0 0 0 VT
Thompson
1 o Bridgeford
3 moo o o o .
moo0
B 000000000 I
3-66
FM 34-130
Using all of the information shown in the products above, the
section then developed a link diagram to show the
interrelationship of individuals, organizations, and activities
(Figure 3-3-10).
N ,M,C. ."' '' *-'A '*" '- '/ "x "" "'"' - -
: I'M m ^I^V^II!^
Wpn Ptt Intel Spt Inf Pit InlPtt Inf Pit unk
N.LM.
N.M.E.
3-67
FM 34-130
To better illustrate the events that have occurred within the
AO, the S2 section established a set of coordinates registers.
Coordinates registers aid in pattern analysis and'help build
doctrinal templates from scanty intelligence databases: This
coordinates register page shows activities around the town of
Macomb, one of the biggest @hot spotsNB (Figure 3-3-11).
i
3-68
FM 34-130
The S2 section also constructed a time pattern analysis
worksheet to record the date and time of each serious incident.
The rings depict days of,the month, the segments depict hours of
the day. Similar tools help distinguish patterns in activity
that are tied to particular days, dates, or times.
figure 3-3-12
new figure
3-69
FM 34-130
After studying the coordinates registers, time pattern
analysis worksheets and the associated intelligence reports, the
analysts realize that the insurgent techniques for conducting
ambushes have evolved over time. Each operation is more
sophisticated than those that preceded it as the insurgents
learn from their mistakes. To reflect the most current
sstandardll techniques, the section prepares doctrinal
templates. The doctrinal template at Figure 3-3-13 shows the
section's best asses,sment of the current procedures used by the
insurgents during ambushes.
06 Pla&s E&E on
preplanned routes ft
reinforcing
HN/US troop
catches
?inforcements
mines and booby traps have been established on the
natural survivability positions to kill HN/US troops seeking cover.
3-70
FM 34-130
The section does the same for insurgent raids. The result is
a doctrinal template that depicts current O1standardlB techniques
for raids on facilities or installations (Figure 3-3-14).
_.. ~~-~~-----~~~~ __- -
LTAA
i DDDD
Snipers kilt:
a Guard.
tx
c.
Key peraonnei.
QRF forces, defenders.
DDDD DDDD
DD DDD
Ambushes kill reinforcing units
and personnel trying to escape.
L
Fi&re33-14. Doctrinal template for insurgent raid.
3-71
FM 34-130
To study the Metropolanian threat the S.2 section only
received an a-year-old Defense Intelligence Agency handbook,
some sketchy reports on recent training exercises,, and some
educated assessments by analysts at the division and re,gimental
levels., The battalion S2 integrated the results of his analysis
of these products into the doctrinal template (Figure 3-3-15).
3-72
FM 34-130
DETERMINE THREAT COURSES OF ACTION
Having finished the initial three steps of IPB, the S2
section turned to determining enemy,COAs. The section focused
its efforts around a reliable and.credible intelligence report
that narrowed guerrilla targets down to incoming .US Army
personnel and government forces within areas sympathetic to the
host nation.
The S2 prepared a situation template depicting likely
insurgent COAs. He did this by integrating his IPB products
depicting population status, availability of concealment and
cover, and potential ambush sites with,,,the threat model
developed in the previous step.
In this case, the situation template takes the form of a key
facilities and targets overlay, sometimes known as,a Itrap map,"
which shows likely targets for the insurgents (Figure 3-3-16).
The S2 also included in the situation template the areas most
likely to be used by an assembling insurgent company, and the
infiltration routes between the objective sites and the assembly
areas. This situation template also shows the safehouses that
V'wantedV* personnel will probably use between insurgent
operations.
12 3 4
*=4m*xL /
//>/ \vfs^'
$>
v-v'vyl
<;vSr
*^V>
>^r*z;:
S&.
;am / Hfif JE3
7NS
fc- x /V
* N/ /:r=y=
&
;-xv
..v *;... V^
<RftfiMirn-tf) \
^/l O
. Ukely
LEGEND:
^ Likely safe
'*. ^r^. ambushes XS houses
A' SjJ. Raid objectives . infiltration
.'V .<? . Ukely assembly ' lanes
^ areas
11
>^^^>:^^^^>rYy /;/'' River = International boundary \
Figure 3-3-16. Situation template for insurgent ambushes.
.
FM 34-130
Although an attack by the Metropolania~n infantry regiment is
unlikely, the 52 must evaluate all reasonable threats to mission
accomplishment. He develops a situation template.showing three
COAs available to the NME infantry regiment should it decide to
attack (Figure 3-3-17). All three COAs are predicated on the
assumption that the friendly battalion will locate itself in one
of the three objective areas and that the destruction of the
battalion will be the Metropolanian objective (Figure 3-3-17).
In all three COAs the Metropolanian attack will be preceded
by the infiltration of 'one battalion to establish !anvil"
blocking positions. The remaining two battalions will attack
abreast as the "hammer I1 to destroy the 2d Dattalion,
9th Infantry (L), forces within the objective areas.
r
_L1
ill II
//_._ *x:.:.?"'' ,/* (HeyuJi:
V / ../ffiiVI I ":'?
3-74
FM 34-130
The S2 section develops an event ,template that supports
intelligence collection against the insurgent COAs and those of
the Metropolanian infantry regiment (Figure 3-3-18). The
relatively limited number of NAIs made this possible.
Alternatively, the S2 could have used a separate event template
for each type of enemy threat.
ft ft I . .'
i i 7 ' ...' M
IS
;,.(^u|yu-> \
- - J'* *^lMi^0mm:mr^
i
luri I.
LEGEND:
f"A - Area NAI
""5?" " ^-% Linear NAJ
.:<i>yyy^i^^:^X" /'/? River International boundary -'': \
Figure 3-3-l 8. Event template.
3-75
FM 34-130
To further aid collection planning, the 52 developed an event
matrix indicating the type of activity in each NAI
(Figure 3-3-19). Cross-reference to the COA that.each NAI and
activity indicates allows the S2 to quickly determine which COA
- 1 ;he enemy has adQDted *.
EXPECTATION
1 Insurgent TAA -
3 I lnfiltrationlexfiftration l2nes I I
4 I TAA I
5 InWatWexfiltration lanes
i
6 Inriltration/exfiltration lanes
7 Movement corridor for attack on obiective 2
I
8 I hfikration/exfiltration lanes I
9 1 Movement corridor for assemblina olatoons I Movement corridor for attack on objective 2
10 TAA .m
11 InNtration/exfiitration lanes
I
3-76
FM 34-130
:::::::::::::::::::::
:;;i;i;i;c;;;ii; Scenario Four: Nonco*atant Evacuation iiiijiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii~~~
...................................................
Following intense political debate over an issue of regional
politics, civil war has broken out on the island nation of
Lilliput. -With most of the is.land divided between them, the two
rebel factions now confront each other--and the remaining
government police forces --over control of the capital city of
Gulliver (Figure 3-4). Fighting has died down while
negotiations aimed~.at a peaceful transfer of the governmental
center open. But all sides involved in,,the conflict patrol the
fringes of the contested area, and ~there are still.occasional
armed clashes.
Hemmed in by~the two warring factions, the otherwise
ineffectual government forces have thus far managed to hold -the
capital city and safeguard the American citizens living there.
The Lillipution president has requested US evacuation of its
citizens because he feels his forces will surrender to the first
of the two factions to make a renewed assault on the city
center, should negotiations collapse.
SCALE: Ocman
25 50 75
3-77
FM 34-130
Our division has been ordered to evacuate American citizens
from the capital of the island nation.
Neither of the two warring factions has displayed any openly
anti-American sentiment. The.greatest threat to the
noncombatant evacuation operation (NEO) is posed by the
resumption of fighting between the two factions. There is also
a risk of interference by groups of anti-American student
activists-from the"city's university.
DEFINE THE BATTLEFIELD ENVIRONMENT .
.*
Our brigade (the 1st Brigade) is assigned responsibility for
the center of the city itself. The brigade's boundary '. _
identifies the limits of its A0 (Figure 3-4-l).
p.'MiOTAi'.' vMwmmm.
j LEGEND:
: mm Donse, random
3-78
FM 34-130
The AI includes our routes of ingress and egress in addition
to any likely threats to the mission (Figure 4-4-2). Due to the
nature of the operation and the battlefield environment, most of
the city is included in the AI.
SCALE:
(kilometer) 0
3-79
FM 34-130
DESCRIBE THE @ATTLEFIELD'S EFFECTS
The nature of the operation requires a focus on the populace
of the city and their political affiliations. This form of
population status overlay allows us to identify areas where US
citizens may be more or less at risk (Figure 3-4-3).
3-80
FM 34-130
We examine how the battlefield environment will affect our
courses of action as those of the Vzhreat*'. We start with an
evaluation of potential zones of entry (helicopter landing zones
(Figure 3-4~-4). With this we integrate an evaluation of areas
suitable for use as assembly or @1holding81 areas for large
numbers of civilians while they await evacuation.
$ LEGEND:
Dense, random
' construction
3-81
FM 34-130
In urbanized terrain, the buildings themselves are the most
dominating aspect of the terrain. We evaluate the type of
building construction within our AI to determine its likely
effects onoperations (Figure 3-4-5). Building construction
affects mobility, concealment and cover, and observation and
fields of fire.
3-82
FM 34-130
Although both rebel forcesare now using roads to conduct
their patrolling activities, we evaluate other suitable avenues
of approach. The areas with densely constructed woodframe
buildings offer the best general avenues of approach for
dismounted-infantry (Figure 3-4-6). The nature of,the
construction type in these areas may permit the rebels to form
their own infiltration lanes by knocking holes in the walls of
adjoining buildings; allowing them easy movement under cover.
Additionally, the dense construction also makes the use of
rooftop avenues'of approach possible. Should full-scale
hostilities break out, these areas may be the focus, of a rebel.
faction's operations aimed at securing control of areas under
the control of the opposing faction.,
Should the government's police forces collapse, other avenues
of approach might be used by either faction in a Q'dash*l to seize
the governmental center. These areas, such as the recreational
parks, offer little cover but facilitate rapid movement by both
dismounted infantry or the light trucks used by both rebel
factions.
Control of the high-rise buildings in the city center will
give our forces the best observation points within our A0 and
over the areas contested
- by the two rebel facttins.
figure 3-4-7
,. new figure
subways and sewers
3-84
FM 34-130
EVALUATE THE THREAT
We begin with an examination of the little we know about the
rebel forces and activist student organizations within the
country (Figure 3-4-8).
rh
4.2 inch, unk
cb
4.2
81 mm
inch, unk
81 mm
Mortars mortars
ME%% Mzii&
Organization-unknown.
..
3-85
FM 34-130
3-86
FM 34-130
figure 3-4'10
new figure
time pattern wheel
3-87
FM 34-130
Evaluating the information.available, we construct a
doctrinal template for the operations of both rebel groups,,
which are similar (Figure 3-4-11). In the margins we include a
description of their normal tactics and reactions, as well as
HVTs to camnlete the threat model.
Molotov cocktails. -
Demonstration Zone
(Speakers/Protesters) Overturning cars.
\ \ \ I
Dipping Americans in
maple syrup
(Lilliipufs No. 2 export)
and then covering
with chicken feathers.
3-89
FN 34-130
DETERMINE THREAT COURSES OF ACTION
We construct a situation template based on the threat models
and patterns of recent activity (Figure 3-4-13). It focuses on
likely clashes between the two rebel factions and possible
demonstrations by the student activists, the most likely threats
to accomplishment of our mission. Like a more traditional
situation template, the staff uses it during wargaming to
evaluate friendly COAs against the potential threats to mission
accomplishment.
__ .~___~~~~_~_
Area of likely
demonstrations.
Area contested
by Big End-ttla
End military
factions.
3-90
FM 34-130
The situation template forms the.basis for the event
template. In this case, the event template depicts NAIs that
will alert us of impending clashes between the rival military
factions or demonstrations by the students (Figure 3-4-14). The
status of the negotiations within.the governmental center are
included on the event template and in our collection planning,
since progress or failure there has a direct bearing on the
|
act i v i t y
LEGEND:
o f . . . t f t e t wo rebel factions.
- _ _ - _ _ _ _ - _ - - -
-_
As the st esfhecommandemi.
begins planning and executing of the friendly COA, we evaluate
incoming intelligence against the event and situation templates-
to quickly identify developing threats. As incoming
intelligence confirms or denies the accuracy of our initial
assessments and evaluations, we continue to refine and update
our IPB.
3-91
FM 34-130
CHAPTER 4
INTELLIGENCE PREPARATION OF THE BATTLEFIELD FOR
SPECIAL STAFF AND SUPPORT UNITS
The products of IPB prepared by a division or corps G2 will
only partially satisfy the requirements of most other staff
sections and subordinate units. At the-very least these
products must be refined to meet the particular needs of the
staff or unit that 'will use them. In many cases they will be
supplemented by the user's own IPB products.
This is especially true in special staff sections and units
outside the combat arms. The particular needs of these,elements
require a slightly different focus in the application of the IPB-
process to their mission requirements. Although the following
lists are not all-inclusive, they provide example considerations
in applying the IPB process to the needs of some of these units
and staff sections. They do not replace the considerations
presented in chapter 2; always consider the full set of
battlefield characteristics. The following lists are intended
as guides to areas on which to focus.
liljjjill!! Air Defense I
Define the
Battlefield Environment
.
4-l
FM 34-130
Describe the
Battlefieldfs Effects
4-2
FM 34-130
In addition to the broad range of,OB factors and threat
capabilities air defense staffs and units evaluate--
0 Flight operations tactics.
o Ordnance types and availability.
o Ordnance delivery techniques such as standoff ranges,
release speeds and altitudes, and guidance system.
o Technical capabilities of aircraft such as all-weather or
night capability as well as maximum and minimum speeds,
ceilings, range, payloads (in terms of ordnance, numbers
of types of equipment, or passengers), and aerial
refueling capability.
o Target selection priorities for air strikes or attack by
air assaults.
A'r strike allocation procedures.
"0 C3 procedures and techniques.
0 Navigation capabilities.
o Threats to friendly ADA assets, including threat ground
forces and EW assets.
Determine Threat
Courses of Action
4-3
FM 34-130
o Where do friendly air defense assets fit into the threat
course of action? Do they need to be destroyed or
suppressed to ensure the operation's success?
o Threat ground CO&i that might require movement of
friendly ADA assets.
:::::::::::::::::::::
iiiliiiiiiiiliiiIiiii Artillery iiiii~i~~::=~~~~~~~~~~~~~~~~~~~~~~~~~~~~.~~~~~
. . . . . . - . . . ..-.. -...-. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ** . . . . . . . . . . . . **....
Define the
Battlefield Environment
Describe the
Battlefield's Effects I
Terrain
When evaluating the terrain's effects on operations,
consider--
0 Areas best suited to artillery deployments, such as--
- Accessibility to ammunition carriers.
- Defilading and masking effects of terrain.
- Security from Levels I, II, and III rear area
threats.
0 Potential sites for target acquisition assets, both
threat and friendly. Request or conduct
line-of-sight studies as required.
0 Effects of terrain on munitions'effectiveness, such
as soft sand, dense trees, or shallow bedrock.
0 Areas suitable for delivery of special purpose
munitions such as artillery delivered mines, etc.
Weather
When conducting weather analysis, consider effects on
target acquisition systems, target activity, and munition
accuracy.
).
4-4
FM 34-130
Other Characteristics
Consider factors that are associated with rear area
operations. See the sections on Counterintelligence and
Rear Area and Combat Service Support in this chapter.
Determine Threat
Courses of Action
4-5
FM 34-130
0 Focus on threat COAs relevant to your commander, not the
supported force commander (his G2jS2 will do that). The
COAs you focus on should deal primarily with counter-fire
against your assets, force protection, and activities
that will require your units to displace.
Define the
Battlefield Environment
[
Describe the Battlefield's
Effects on COAs
I
Terrain
When evaluating the terrain, identify--
0 Potential battle positions. Consider:
- Potential engagement areas.
- "Danger areas" that optimize threat ADA system
fields of fire.
- Areas that mask threat radar and air defense
systems.
- Areas that provide good terrain background
(ground clutter) effects.
- Terrain shadowing effects.
0 Potential locations for landing or pickup zones,
forward area arming and refueling positions, and
forward assembly areas.
0 Avenues,of approach. Consider:
- Obstacles to flight such as power lines, towers,
or rapidly rising terrain features.
- Areas where birds gather.
- Contaminated areas or other man-made obstacles.
4-6
FM 34-130
- Areas that give threat air defense systems
distinct advantages in covering air avenues of
approach.
- Concealed and covered routes into potential
battle positions.
- Routes that provide for ease of navigation.
- Potential safe areas for downed pilots. Evaluate
infiltration corridors.
- Other effects on Army Aviation Command and
Control planning.
0 Bear in mind that pilots usually think in terms of
feet of altitude and degree of slope (instead of
meters and percentage). Make the conversions for
them.
Weather
Focus on conditions that affect flight in general and
aircraft systems in particular. Do not overlook factors
that affect target acquisition and night vision
capabilities. Consider--
Density altitude effects on performance and payload.
Weather effects on threat air defense systems.
Effects of wind speed and turbulence on flight
operations, especially in close terrain.
How.wind speed and turbulence will affect target
acquisition
0 Weather effects on target acquisition systems (for
example, laser or infrared).
0 Restricting effects of low ceilings in air avenues of
approach.
0 Conditions that may cause "white out" or "brown out.l'
0 Probability of icing.
0 Precipitation effects on forward area arming and
refueling activities.
Other Characteristics
Consider any other aspects of the battlefield environment
that may affect flight operations, such as--
0 Restrictions imposed by air space managers.
o High intensity radiation transmission areas.
4-7
FM 34-130
Determine Threat
+,
Courses of Action
4-8
FM 34-130
::::::::::::::::::
;ii;~i:~:~:;;;;; Counterintelligence and Counter-reconnaissance iiiiiilltiiiitittiiiiilitiiiii
Refer to FM 34-60 for a full discussion of the
multi-discipline counterintelligence (MDCI) analysis process.
Define the
Battlefield Environment
Describe the
Battlefield's Effects
4-9
FM 34-130
0 Identify political, legal, and moral constraints upon
collection efforts. For example, are there unique legal
or religious circumstances that might inhibit collection
operations? I
o Identify the effect of local culture upon collection.
For example, HDMINT collection efforts might be
ineffective against a closed, ethnically distinct I
community.
-
Evaluate the Threat
.^
4-10
FM 34-130
Determine Threat
Courses of Action
4-11
FM 34-130
Define the
Battlefield Environment
Describe the
Battiefield's Effects
Terrain
Evaluate the terrain from two perspectives:
0 How it enhances and supports communications and
target acquisition.
0 How it can be used to protect communications and
target acquisition systems from exploitation or
disruption.
Evaluate the terrain's effects on both threat and
friendly systems. Consider: i
4-12
FM 34-130
Weather
Evaluate the effects of weather on both threat and
friendly systems. Consider:
0 Effects of extreme weather conditions on sensitive
electronic equipment. Do not overlook high humidity
or large amounts of dust in this evaluation.
0 Electrical storms and other electromagnetic
phenomenon.
0 Effects of high winds or obscurants, such as
.precipitation or blowing,.dust, on antennas and
line-of-sight systems.
o Weather effects on flight operations of .ES nor Efi
aircraft.
4-13
FM 34-130
Determine Threat
Courses of Action
(1
r
Define the
Battlefield Environment
The A0 and the AI for an engineer unit are generally the same
as that of the supported maneuver unit.
Describe the
Battlefield1s Effects
)I
Terrain
When evaluating the terrain's effects on engineer
operations--
o Analyze the defensible terrain within each avenue of
approach to determine locations which lend themselves
to the use of obstacles.
0 Further identify where the terrain lends itself to
breaching operations at each loc~ations. This
includes concealed and covered routes towards-the
breach site and terrain that supports suppressing
fire during the breaching operation.
0 Analyze streams and rivers within the AO. Focus on
bridges, ford sites, and areas that lend themselves
to river-crossing operations.
0 Identify other man-made or natural obstacles within
the AO, such as railroad tracks with steep
embankments. Identify the effect of each obstacle
upon the movement of different type units. Further
analyze the locations where these obstacles can be
;\
easily traversed or crossed.
4-14
FM 34-130
Weather
When conducting weather analysis for engineer operations
determine--
The visibility constraints for each obstacle system,
particularly around areas likely to be breached.
How weather affects the performance of each type of
obstacle for the local terrain. For example, how
does recurring rain change the effectiveness of a
standard antitank ditch in this particular soil type?
How does weather affect trafficability?
How does weather affect dust control?
The effects of weather upon survivability positions,
The:.effect of precipitation upon rivers and'streams.
During winter, also estimate the degree to which each
water source would be frozen and its subsequent load
capacity.
Logistics Infrastructure of the Battlefield
When evaluating the logistics infrastructure of the
battlefield--
0 Identify local sources of potable water.
0 Identify local sources of barrier material.
o Analyze the ability of the local road network to
support anticipated traffic. Are immediate repairs
required? How much maintenance will each road
require to support sustained operations?
0 Do local airfields require repairs or maintenance?
Economics
When considering economics, identify the engineer
projects which would most help the local population if
time permits. Such projects are especially pertinent for
nation assistance and counterinsurgency operations.
Projects could include building roads, school houses,
power generation facilities, water sanitation, or other
public buildings and services.
Treaties, Agreements and legal Restrictions
During peacekeeping and peacemaking operations, the unit
should determine legal constraints for engineer
operations.
4-15
e
FM 34-130
4-16
FM 34-130
0 Typical employment of combined arms units during
river or gap crossing operations.
o Descriptions of mine warfare doctrine, marking
systems, and standard patterns.
o Technical information on obstacle system material,
mine fuses, delivery systems (air, artillery, etc.),
and details of construction.
Determine Threat
Courses of Action
4-17
FM 34-130
Decision Support
Decision points (DPs) for engineer units should focus on
decisions such as--
~0 Forward deployment of breaching teams.
o The employment of artillery scatterable mines.
0 Shifting the priority of engineer missions (mobility
to counter-mobility, etc.).
o Redirecting direct support or general support
engine.er assets.
0 Closing lanes in obstacle systems (to support battle
handover during a rearward passage of lines).
0 Forward deployment of obstacle teams to close.~
breaches between the first and second echelons. '.
Intelligence jiyiJljjjJDHIHi;!^
Intelligence units perform a wide variety of missions. For
considerations that apply to some of these functions, see
relevant sections throughout this chapter. For example:
0 For aerial exploitation assets, including unmanned aerial
vehicles, refer to the section on AVIATION.
0 For units involved in EW, refer to the section on
ELECTRONIC WARFARE.
0 For units that operate in the rear area, refer to the
sections on COUNTERINTELLIGENCE and REAR AREA AND COMBAT
SERVICE SUPPORT.
Define the
Battlefield Environment
4-18
FM 34-130
Describe the
Battlefields Effects
Terrain
Evaluate the terrain from two, perspective:
o How it enhances and supports communications and
target acquisition
o How it can be used to protect communications and
target acquisition systems from exploitation or
disruption.
Evaluate-the terrain's effects on both threat and
friendly systems. Consider:
0 Line-of-sight characteristics of the terrain, to
include both communications and noncommunications
emitters.
0 Vegetation and its effects on radio wave absorption
and antenna height requirements.
0 Locations of high power lines and their interference
with radio waves.
0 Large vertical objects, such as buildings or cliffs,
that will influence radio waves.
0 Effects of soil types on the electrical grounding of
equipment.
0 Areas best suited to deployment of your systems, such
as--
- Accessibility.
- Defilading and masking effects of terrain.
- Security from Levels I, II, and III rear area
threats.
Weather
Evaluate weather effects on both threat and friendly
systems. Consider:
0 Effects of extreme weather conditions on sensitive
electronic equipment. Do not overlook high humidity
or large amounts of dust in this evaluation.
0 Electrical storms and other electromagnetic
phenomenon.
o Effects of high winds or obscurants, such as
precipitation or blowing dust, on antennas and
line-of-sight systems.
0 Weather effects on flight operations of your
collection aircraft.
4-19
FM 34-130
Determine Threat
Courses of Action
4-20
i
FM 34-130
:::::::::::::::::::::
iiifiiiiiiiiiiiiiiiii Nuclear, Biological , and Chemical !!f!!ffitfif.fftf!!lffilillilii!i!!i!ii
Chemical units perform decontamination, obscurant, and NBC
reconnaissance missions. NBC staffs are,interested in both
friendly and threat capabilities to employ nuclear weapons and
obscurants, friendly and threat vulnerability to nuclear
weapons, and friendly vulnerability to chemical and biological
weapons.
Define the
Battlefield Environment
Describe the'
Battlefield's Effects
Terrain
When evaluating the terrain's effects on NBC operations:
0 Identify critical terrain features (e.g., defiles,
choke points, rivers, key terrain).
o Analyze the avenues of approach and mobility
corridors developed by the G2/S2 for areas of
vulnerability to NBC weapons or areas that are
especially suitable for the use of obscurants.
Weather
When conducting weather analysis for NBC operations:
0 Identify critical weather information needed to
determine ,the effects of weather on NBC weapons or
4-21
FM 34-130
obscurants. Refer to FM 3-6, Field Behavior of NBC
Agents, for more information.
Logistics Infrastructure of the Battlefield
When evaluating the infrastructure of the battlefield:
0 Identify local sources of water suitable for
decontamination operations. Consider natural and
industrial or civic sources.
Determine Threat
Courses of Action
4-22
...
FM 34-130
Define the
Battlefield Environment
Describe the
Battlefield's Effects
Terrain
When evaluating the terrain's effects on signal
operations--
0 Evaluate location of customers and communication
density.
0 Evaluate best lines-of-sight for required
communication links.
0 Identify locations that provide line-of-sight
defilade from potential threat collection or jamming
systems.
0 Identify site access and escape routes.
0 Evaluate sites for tenability.
Weather
When conducting weather analysis for signal operations--
0 Evaluate effects of forecasted weather on
frequencies. Identify optimal frequencies for use.
0 Identify potential communication degradation caused
by high winds (antenna wobble) or precipitation.
0 Evaluate weather effects on site access or
tenability.
4-23
FM 34-130
Other factors
Other factors to consider in signal operations:
0 Frequency deconfliction.
0 Identify host nation frequency restrictions.
o Identify any host nation or local restrictions on
terrain use.
i
Determine Threat
Courses of Action
4-24
i
FM 34-130
:t:::
Special Operations
Define the
Battlefield Environment
Describe the
Battlefield's Effects
Terrain
When evaluating the terrain's effects on special
operations--
0 Include all potential zones of entry and
infiltration corridors. Do not overlook waterborne
access routes or rooftop zones of entry.
0 Identify sources of food and potable water.
0 Evaluate slopes as obstacles to fast rope assault
operations.
0 Identify ultra-low level flight corridors.
Other Characteristics
Other characteristics to consider are--
0 Conduct "factor analysis" to evaluate--
- Density and distribution of population groups.
- Composite groups based on political behavior and
the strengths of each.
- Issues motivating political, economic, social, or
military behaviors of groups.
4-25
FM 34-130
0 Evaluate economic infrastructure.
0 Identify economic programs which can cause desired
changes in population behavior.
0 Evaluate the formal and informal political structure
of the government.
0 Identify legal and illegal political parties.
0 Identify nonparty political organizations and special
interest groups.
0 Evaluate the independence of the judiciary.
0 Evaluate the independence of the mass media.
0 Evaluate the administrative competence of the
bureaucracy.
0 Identify the origin of the incumbent government.
0 Evaluate the history of political violence inthe
country..,
Determine Threat
Courses of Action
4-26
FM 34-130
Define the
Battlefield Environment
4-27
FM 34-130
Threat Model
Threat models should include--
P
0 Pursuit and exploitation procedures for conventional
forces.
0 Air assault, airborne, and light infantry techniques
for deep attack.
0 unconventional warfare techniques for deep
operations.'
o Standard, procedures for insurgent raids and ambushes.
standard pr<
o Typical:procedures
Typical pro< for terrorist attacks.
Determine Threat
p&&q
Courses of Action
4-30
FM 34-130
Event Template
In event templates--
o The rear command post of the supported unit should
establish NAIs for levels I, II, and III rear area
threats.
0 The individual combat service support units should
establish NAIs for levels I and II threats against
their ,specific areas.
Decision Support for the rear command post
This should focus on decisions, such as--
o Request for commitment of the level III tactical
combat force.
0 Commitment of level II response forces.
0 Request for fire support to preplanned TAIs.
Decision Support for combat service support Units
This should focus on decisions, such as--
0 "Pushing forward" support packages that the supported
unit will require given anticipated operations.
0 Request for commitment of Level II response forces or
the level III tactical combat force.
o Commitment of the local quick reaction force for the
base or base cluster.
0 Request for fire support to preplanned TAIs.
0 "Jumping" to a new location.
4-31
FM 34-130
CHAPTER 5
TACTICAL, OPERATIONAL, AND STRATEGIC INTELLIGENCE
PREPARATION OF THE BATTLEFIELD
( TACTICAL
0 The AI is almost always confined to the physical
location and avenues of approach of threat units that
have the time and mobility to enter the AO.
0 Significant characteristics of the battlefield during
war are usually limited to--
Influence of the terrain and weather on military
operations.
Ability of the local infrastructure to support
operations.
5-1
FM 34-130
OPERATIONAL
5-2
FM 34-130
STRATEGIC I
::::::::::::::::::::::::
iiiiiiiiiiIIiiiiiiiiiiii Describe the Battlefield I s Effects ~r~iiiiiiiiiiiiiiiiiriiiiiii~~~~~
. . . . . . . . ::::: . . . . . . . . . . . ::::::: . . . . . . . . . . . . . :::::::
TACTICAL
5-3
FM 34-130
OPERATIONAL
5-4
FM 34-130
Other significant characteristics of the battlefield gain
importance at the operational level. Express their
influence in terms of their effect on threat and friendly
COAs . Examples are--
0 "The Kuntz tribe will resist any attempt to establish
military lines of operation through their land. They do
not have the military means ~to significantly interfere
with our lines, but two international treaties make
operations in this region inadvisable for either side."
0 "The Neroth TruffleWald supplies 100 percent of the
truffles for both the Good Duchy of Fenwick and the Evil
Emirate of Vulgaria. The truffle harvest from this
region is valued so highly by both countries-that -.
off-road maneuver will not be tolerated. Except for, the
paved roads, it is considered SEVERELY RESTRICTED
terrain."
STRATEGIC I
5-5
FM 34-130
"The enemy can prosecute the war only as long as the oil
shipments continue from the west. Any significant
interdiction of the oil flow will render the enemy
immobile at the strategic and operational levels."
"At the moment, popular support for the enemy government
is very precarious. However, friendly advances further
into the vital northern region will rally the people
around the war effort. This would probably enable the
enemy to mobilize more strategic reserves.8V
"The Montreal Treaty, designed to maintain the regional
balance of power, forbids us to conduct any operation
without the consent of all six nations."
"The probability of Chinese intervention increases as we
approach the Yalu River."
"The sea lines of communication best support opening the
second front in northern France. However, the second
front could still be well supplied through southern
France, and marginally through Yugoslavia.V1
"The winter climate in this region is too severe for an
army of southern Europe to endure in the field.
Napoleon must either destroy the Russian army before
winter, or conduct a strategic withdrawal.
5-6
FM 34-130
STRATEGIC I
5-7
FM 34-130
o Non-military methods of exerting power and influence. m
::::::::::::::::::::::::
iiiiiiiitiiiiiiiiiiiilii Determine Threat Courses of Action iiiiiiiiijiiiiiiiiiiiiiiiiiiiiiiiiiiiiii~~~~::~~~:~~~:::~~:: . . . . . . . . . . . . ..
. : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ::...:...:::::::
i
5-8
FM 34-130
1 OPERATIONAL
5-9
.
FM 34-130
1 STRATEGIC 1
5-10
FM 34-130
CHAPTER 6
INTELLIGENCE PREPARATION OF THE BATTLEFIELD FOR
OPERATIONS OTHER THAN WAR
t
::::::::::::::::::
iiiiiiliiiiiiiliii Humanitarian Assistance and Disaster Relief ~~~~~~~~~~~~~~~
6-l
FM 34-130
Define the
Battlefield Environment I
Describe the
Battlefield's Effects I
6-2
I
FM 34-130
0 Focus on demographics. Consider the effects of--
population distribution patterns;
ethnic divisions;
religious beliefs;
language divisions;
tribe, clan, and sub-clan loyalties;
health hazards;
political sympathies;
etc.
0 Consider the effects of the logistic infrastructure--
location, activity, and capability of care
distribution points (food, health care, etc.);
sources of food and water;
housing availability;
hospital capabilities;
utility services (water, electricity, etc.);
law enforcement agencies and capabilities;
emergency services (fire department, etc.).
0 Determine if the environment is permissive or hostile to
the introduction of US forces. While governmental
agencies may welcome US forces, other elements of the
population may not.
0 Use non-Department of Defense assets and host nation
resources to fill voids in the data base and map coverage
of the AO. For example, census data can provide
demographic data, law enforcement and emergency service
organizations can provide information on local
infrastructure.
0 Identify the limits of your commander's authority. Can
he financially obligate the government? Does he have the
authority to enforce laws? To assist law enforcement
agencies?
6-3
FM 34-130
0 The environment may pose threats to the health of both
mission and host nation personnel in the forms of
waterborne diseases, spoiled or contaminated foodstuffs,
and other environmental hazards.
0 Identify and evaluate the threat posed by any groups that
may oppose friendly force operations. Consider groups
that may clandestinely oppose the-operation even though
they publicly pledge support.
0 Consider initially neutral groups and personnel that may
become hostile as the operation progresses. What action
is necessary to keep them neutral?
0 During support to law enforcement agencies, elements of
the population may pose significant threats. Use the
traditional OB factors, with modifications to fit the
specific situation, to evaluate the threat posed by gangs
or similar "organized" groups. Adhere to legal
restriction on intelligence operations against US
citizens; coordinate with law enforcement agencies for
assistance.
0 When confronted with riots or similar threats identify I
"opinion makers" and other influential members of the
local population. Identify potential trouble spots and
contentious issues. Adhere to legal restrictions on
intelligence.operations against US citizens. I
Determine Threat m
Courses of Action
I
Start with threat objectives and develop courses of
action from there. Consider all courses .of action. For
example, if the threat objective is to get US forces out
of the host nation, one course of action could be to S
allow the US force to complete its mission quickly. Do
not focus on strictly confrontational courses of action.
I
Consider the effect the threat's perception of US forces
has on potential courses of action. If US forces appear
overwhelmingly powerful, non-confrontational COAs may be r
preferred. .If US forces project only minimal power, the
threat may pursue higher risk COAs.
Consider the interaction of each group if faced with
multiple threats. Will they cooperate against US
forces? Will they.engage each other?
i
6-4
I
,
FM 34-130
0 Evaluate the threat imposed by a degradation of the
capabilities of law enforcement agencies.
0 Identify likely targets of looting and vandalism.
0 Use MDCI for force protection. It provides you with
vulnerability assessments and will assess all threats
whether actual or potential.~ As they are identified,
pursue them accordingly.
Define the
Battlefield Environment
6-5
FM 34-130
I Describe the
Battlefield's Effects I
6-6
FM 34-130
Determine Threat
Courses of Action
6-7
FM 34-130
Peacekeeping Operations
I
Peacekeeping operations support diplomatic efforts to
maintain peace inareas of potential conflict. They stabilize
conflict between two or more belligerent nations and as such
require the consent of all parties involved in the dispute. The.-
US may participate in peacekeeping operations when requested by
the United Nations, with a regional affiliation of nations, with
other unaffiliated countries or unilaterally. US personnel may I
function as observers, as part of an international peacekeeping
force, or in a supervisory and assistance role. Peacekeeping
operations follow diplomatic negotiations that establish the
mandate for the peacekeeping force. The mandate describes the
scope of the peacekeeping mission in detail.
As outlined in Joint Publication 3-07.3, "Intelligence" is i
not conducted during peacekeeping operations. Instead, there
will be an information section which performs many of the duties
and functions normally associated with intelligence sections. I
Define the
Battlefield Environment I
6-8
FM 34-130
Describe the
Battlefields Effects
0 Demographics.
- What are the root causesof the conflict? Analyze
this from the perspective of both belligerents.
- What would cause (or caused): each side to agree to
peace?
- Are there any new issuesthat have increased tensions
since peace was initiated?
- How committed is each belligerent to keeping the
peace? How much trust and faith do the belligerents
have in each other to keep the peace?
- How capable is each belligerent of keeping the
peace? Can the leadership which negotiated the peace
enforce discipline throughout the belligerent
parties?
- How do these factors affect the COAs of each
belligerent? How do they affect the COAs available
to the peacekeeping force?
0 Legal. What legitimate COAs are available to the
belligerents and the peacekeeping force? How likely is
each belligerent to obey the laws and provision of treaty
agreements?
0 Terrain.
- Does terrain lend itself to military operations?
Conduct terrain analysis. Identify good infiltration
lanes, engagement areas, defensive positions, attack
routes, and staging areas.
- Does the terrain lend itself to peacekeeping
operations? Can the peacekeepers see and be seen?
If so, the belligerents may be less likely to violate
the peace. If necessary, where can the peacekeeping
force establish blocking positions to blunt possible
violations of the peace?
- Identify the terrain that allows all belligerents
equal access to the peacekeepers.
- Analyze the terrain to identify likely current
dispositions of belligerent forces.
o Weather.
- Analyze the affect of weather on visibility among all
parties, including the peacekeepers.
6-9
FM 34-130
- Consider the influence of weather on mobility and
operations. (See FM 34-81-1.)
- Weather may affect the turnout at activities such as
demonstrations.
0 Other. Identify and analyze government, military, and
agency support available to the peacekeeping force.
Determine Threat
Courses of Action
I
0 Template or describe the actions of the belligerents that
would violate the peace. Crossing borders, entering
demilitarized zones, and initiating hostilities are
examples of violations. I
6-10
FM 34-130
Define the
Battlefield Environment
AI: Consider--
0 Known terrorist activity.
0 Terrorist activities in nations that sponsor terrorist
groups.
0 International and national support to the terrorists.
Include sources of moral, physical, and financial
support.
6-11
FM 34-130
0 If US presence, or potential presence, by itself could be
a catalyst for terrorist activity.
0 The identity of recent worldwide anti-US terrori,st
activity, or intent to conduct such activity.
Types of activity to consider:
0 Identify the demographic issues that make protected areas
or personnel attractive to terrorists<:~
0 Identify any time constraints that might limit the
availability of a target,.
I
0 Coordinate with supporting MP and MI activities when
preparing initial threat analyses and their updates.
m
Describe the
Battlefield's Effects
,i
o Demographics.
- What demographic issues make a target attractive to
terrorists? I
- How do these demographic issues shape terrorist
COAs? For example, the political grievances of a
terrorist organization might make some targets more I
attractive than others. Religious convictions might
cause terrorists to disregard assassinations in favor
of kidnaping. I
0 Targets and routes.
- Identify the susceptibility of targets to terrorists.
- Identify infiltration routes and avenues of approach. r
6-12
FM 34-130
Internal discipline.
Long- and short-range goals.
Dedication (willingness to kill or die for the
cause).
Religious, political, and ethnic affiliations of the
groups.
The identity of leaders, trainers, opportunists, and
idealists.
Group skills and specialties of each organization
such'as sniping, demolition;:air or water operations,
electronic surveillance, tunneling.
Describe the preferred tactics of each organization.
These might include assassination, arson, bombing,
hijacking, hostage-taking, kidnaping, maiming; raids',-
seizure,- sabotage, hoaxes, or use of chemical or
biological weapons. Consider the international writings
on terrorist and insurgent operations such as Mao or Che
Guevarra.
Describe or template demonstrated terrorist activity over
a perrod of time in the local area.
Determine Threat
Courses of Action
6-13
FM 34-130
:::::::::::::::::::::
iiiiiiiiiiiiiiiiiiiii Shows of Force iiiiiiii~iiitiiieirirjiiiiiiiiiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
..-.A.....::::::::::,: .,,..,......... ::::::.:....::...::.:.....::::::::::::i:::::::::::::::::::::::::::::::::::::::::::
A show of force is a mission carried out to demonstrate US
resolve in which the US forces deploy to defuse a situation that
may be detrimental to US interests or national objectives.
Shows of force lend credibility to the nation's commitments,
increase regional influence, and demonstrate resolve. They can
take the form of combined training exercises, rehearsals,
forward deployment of military forces, or introduction and
buildup of military forces in a region. Shows of force may
transition into combat operations; be prepared for the
transition.
Define the
Battlefield Environment
-1
6-14
FM 34-130
politicians affect mission success, or should friendly
concern be confined to decision makers at the national
level?
0 Which economic issues influence the crisis?
Describe the
Battlefield1s Effects
6-15
FM 34-130
- Consider that the show of force could escalate to
war. Conduct a standard OCORA analysis to determine
terrain which best supports offensive and defensive
operations. =
6-16
FM 34-130
successfully fight US Forces should the crisis
escalate? What friendly actions would help the US
gain moral ascendancy over the target nation
military?
Determine Threat
Courses of Action
6-17
FM 34-130
::::::::::::::::::::: ...............
iiiiiiiiiiiiiiiiiiiii Attacks and Raids iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii~~~~~~~~~~~~~~~~
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . :.:::::. . . . . . . . . . . . . * . . . . .
Define the
Battlefield Environment
m
Describe the
Battlefield's Effects
6-18
i
FM 34-130
Determine Threat
Courses of Action
Define the
Battlefield Environment
AI:
0 Within the nation where noncombatants will be evacuated,
identify the locations of all groups that might influence
operations.
6-19
FM 34-130
0 Check which countries might accept evacuees.
0 Which countries might assist or hinder the operation?
Types of activity to consider:
0 Identify whether evacuation is expected to be permissive
or forced.
0 Identify the operational time sensitivity.
0 Fully identify the scope of the demographic situation
that has prompted the evacuation. Consider the
political, social, economic, legal, and religious
situations. Look at the government, military, and
population, in general.
Describe the
Battlefield's Effects
Determine Threat
Courses of Action
Peace Enforcement
Peace enforcement operations are military operations in
support of diplomatic efforts to restore peace between hostile
factions which may not be consenting to intervention and'may .be
engaged in combats activities. Peace enforcement implies the use
of force or its threat to coerce hostile factions to cease and
desist from violent actions.
Define the
Battlefield Environment
AI:
0 Identify third-nation support for any of the belligerent
parties.
0 Identify other outside influences, such as world
organizations and news media.
Significant characteristics of the battlefield includes almost
every demographic factor (religion, politics, ethnic"
differences, etc.).
Describe the
Battlefield's Effects
Determine Threat
Courses of Action
::::::::::::::::::::: :::::::::::.:::::::::
:~;;i;;~;;i;ii;:i: Support for Insurgencies and Counterinsurgencies ;;;;~;;;~&~~;~~;:~
At the direction of the National Command Authority, US
military forces may assist either insurgent movements or host
nation governments opposing an insurgency. In both instances,
US military forces predominantly support political, economic and
informational objectives.
The US supports selected insurgencies opposing oppressive
regimes that work against US interests. The feasibility of
effective support and the compatibility of US,and insurgent
interests are major considerations. Because support for
insurgencies is often covert, special operations forces are
frequently involved. General purpose forces may also be called
upon when the situation requires their particular specialties or
when the scope of operations is so vast that conventional forces
are required.
6-25
FM 34-130
Define the
Battlefield Environment
AI:
0 Consider strategic location: neighboring countries,
boundaries, and frontiers.
- The use of, coastal waterways.
- Third-country support for the insurgency.
I
0 Types of relevant activity:
- Analyze host nation population, government, military,
demographics, and threat.
- Evaluate political structure, economics, foreign
policy and relations, policies on military use.
Describe the
Battlefield's Effects
6-26
FM 34-130
Determine Threat
Courses of Action
........................
::::::::::::::::::::: Support to Domestic Civil Authorities ~j~jjiiiji~j~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cii;i;;;i~i;ii;:i:;i
When appropriate governmental authority directs the armed
forces to assist in domestic emergencies within the continental
United States, the Army has primary responsibility. Army units
support disaster relief, humanitarian assistance, and similar
operations. Federal law also authorizes the use of military
force to suppress domestic violence or insurrection.
6-28
FM 34-130
Techniques for applying IPB in operations that provide
support to domestic authorities are determined primarily by the
type of operation undertaken. For example, during support to
law enforcement agencies engaged in counterdrug operations, use
the considerations put forth for counterdrug operations. If
supporting disaster relief, use the considerations described
under Humanitarian Assistance and Disaster Relief earlier in
this chapter.
6-29
FM 34-130
APPENDIX A
INTELLIGENCE PREPARATION OF THE BATTLEFIELD,
WARGAMING, AND INTELLIGENCE SYNCHRONIZATION
Staffs use wargaming to refine and compare potential friendly
courses of action. Comparing potential courses of action, based
on the results of wargaming, allows the staff to identify the
best course of action for recommendation to the commander.
Wargaming is a conscious attempt to visualize the flow of an
operation, given friendly strengths and dispositions, threat
assets and probable courses of action, and a given battlefield
environment. Wargaming attempts to foreseethe action,
reaction, counteraction dynamics of operations. As a result the
staff--
0 Develops a shared vision of the operation.
0 Anticipates events.
0 Determines the conditions and resources required for
success.
0 Identifies a course of action's strengths and weaknesses.
0 Identifies the coordination requirements to produce
synchronized results.
0 Determines decision points.
0 Determines information required to plan and execute the
course of action.
0 'Identifies branches and sequels for further planning.
.z:::::::::::::::::::
. . . . . . . . . . General Rules iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
::::::::::::::::::::: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . :.:.::::::::::::::::::::::::::::::::.::...: . . . . . . . . :..::.:.:::::::::::.:::
I
The reliability and quality of the products that result from
wargaming are dependent on adherence to a few basic rules. The
general rules that follow are designed to avoid introducing bias
into the wargaming process. I
A-2
FM 34-130
A-3
FM 34-130
Identify a 'Vbattlemaster" to referee and facilitate the
wargaming session. The battlemaster is usually the commander,
deputy commander, chief of staff, or executive officer. The
battlemaster must remain impartial. Impartiality is best I
accomplished if the battlemaster does not also control the
friendly forces during the wargame.
Identify the recording techniques to be used and a recorder. I
The recorder is usually the assistant G3/S3 or G2/S2. The
recorder prepares the decision support template, BOS
synchronization matrix, and any other records of the wargame.
Select a wargaming method. Common techniques are the belt,
avenue-in-depth, box, adversarial, narrative, and sketch and.
note techniques. See FM 101-5 for an indepth discussion of each--
technique.
Establish time limits for wargaming each part of the battle.
If time limits are not established, staffs often find that they
plan one part of the battle in extraordinary detail at the
expense of other areas. The battlemaster might even consider
limiting the amount of time each participant has to speak. In
any event the staff should discipline itself to avoid long,
fruitless discussions.
A-4
FM 34-130
A-5
FM 34-130
Similarly, the G2 or 52 uses the wargame to identify
modifications and refinements to the threat COA models. As
critical events become apparent, the G2 or 52 prepares situation
templates to @8capture*8 threat dispositions during the event. He
identifies any necessary modifications or refinements to the
threat COA models as the wargame progresses, either making them
immediately or noting the necessary changes for later.
The G2 or S2 should ensure that the staff considers all
threat COAs and other, options available to the threat. The
staff should NEVER wargame~against only one threat COA. As a
minimum, the staff-should wargame against the most likely and
the most dangerous threat COAs.
The battlemaster should ensure that all decisions identified
are ones that his staff or commander will make during battle.
Do not waste time wargaming the decisions of a higher or
subordinate unit.
:::::::::::::::::::::
Iillilllilliiiiiiliii Record +-he Results of Wargaming ~~iilii~iiiiiififiiifiiiiiilfiifiiifif
i
A-6
r
FM 34-130
time and geographic location of the DP. The staff
ensures they select DPs which allow decisions in time to
properly synchronize the resulting friendly actions.
When placing DPs, consider time for--
,Intelligence collection.
Processing and disseminating the intelligence to the
commander or other decision maker.
Preparation and movement time of friendly forces or
assets that will execute the mission.
Activities or movement of the target or threat during
the time elapsed between decision and execution.
0 Target areas of interest (TAI). '~This is the location
where the effects of friendly actions are synchronized.
TAIs are often engagement areas or sets of targets: The
staff ensures that the physical distance between a DP and
its associated TAI allows for the time delays involved in
collecting, processing, and communicating intelligence;
the movement of threat forces; and the time lines
associated with friendly activities.
0 Update the high payoff target (HPT) list. If the
friendly action involves engaging a threat HVT, the
recorder adds the HVT to the list of high payoff targets
for the COA under consideration. If there is a time
element involved (i.e., if the HPT is only high payoff
during a particular phase of the battle) he makes the
appropriate notations.
0 Named areas of interest (NAI) that support the DP. The
G2 or S2 usually records the NAI, but some staffs make it
the responsibility of the recorder. The DP is almost
always the only NAI associated with a particular
decision. Sometimes, however, the G2 or S2 needs
information from more than one NAI in order to confirm or
deny that the decision criteria has occurred.
If time permits, the battlestaff may also discuss and record
the synchronization of friendly actions not related to decision
points (i.e., which will occur regardless of events on the
battlefield). Examples include--
0 Crossing the line of departure (LD) or line of contact
WC) *
0 Initiating prepatory fires.
0 Shifting preparatory fires.
A-7
FM 34-130
Croaa Cro
PL S*idd PL Troll
12th MecfL Moving
73d ID Moving
SP
AA Smyth
3d AD
4P
Figure A-l. The two-rlded time Ilne.
SP AA Campbelh
ENEMY
Moon
73% ILLUM S.t BMNT Sunrli
FRIENDLY
SPI Moving
RESERVE
r
,,,
FM 34-130
If the interaction of anticipated friendly and threat events
is particularly complicated the staff might prepare a two-sided
time line. The two-sided time line serves as a quick reference
tool for planning the synchronization of effects in fluid
situations. The example shown in Figure A-l depicts the
reaction of enemy reserve forces to an envelopment by friendly
forces. In this example, the time line depicts enemy options
(DPs) and anticipated critical events, such as the covering
force battle, a refueling-on-the-move -operation, etc. Friendly
DPs and options, though not shown in thisexample, are also
included on the time line.
After the primary wargaming session-distinct members of the
battlestaff may initiate specialized sessions for their function
areas. For example, the G4 or S4 support operations staffs may
want to wargame logistics activities throughout the operation.
:::::::::::::::::::::
iiiliiiiiiiIiiiiiiiii Compare Friendly Courses of A&-on ff;fflilliiliiiiliiiiitftftftftftiilf
A-9
FM 34-130
criteria for comparing the friendly COAs in his own staff area I
of responsibi.lity. The G2 or S2 compares friendly courses of
action based on their ability to defeat the threat's COA and his
ability to support the command with the intelligence required to
-
execute each friendly COA.
Led by the G3 or 53, each staff officer presents his findings
to the remainder of the staff. Together they determine which I
friendly COA they will recommend to the commander. In the event
they cannot reach a conclusion, the chief of staff or executive
officer will determine which COA to recommend to the commander.
..
::::::::::::::::::
iiiiiiiiiiiiiiiili Synchronize Intelligence iiiiiiiiiiiiiiiiiiiijijiijiiiiiiiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
. . . . . . . . . . . . . . . . . . . . . . ,...,....,....................................~.......................
I
The staff then presents its recommendation to the commander.
The G3 or 53 briefs each COA, including any branches and
sequels, using the results and records of wargaming such as the I
DST and BOS synchronization matrix. He highlights the
advantages and disadvantages of each COA.
I
The commander decides upon a COA and announces his concept of
the operation. Using the results of wargaming associated with
the selected COA, the staff prepares plans and orders that
implement the commander's decision. I
Decisions made during wargaming form the basis for the "Be
Prepared" and "On Order" tasks specified in operations order and I
fragmentary orders. ,The decision criteria associated with each
DP accompanies the task as it is written into paragraph 3 of the
operations order. For example: "On order, Task Force HONABACH
will attack to destroy enemy forces vicinity objective HEAD. r
This order will be given if the 32d Division turns southwest
onto Highway 34."
Prioritizing Intelligence
Requirements
The Intelligence
Synchronization Matrix
A-11
.~ -
FM 34-130 \
I
0 Location of the NAI collected against.
0 Time lines associated with the expected threat activity.
I
The collection strategies, which are designed not only'to
collect the intelligence but to deliver it on time, are then
entered onto the intelligence synchronization matrix. The 52 or
collection manager then develops a detailed collection plan
using the intelligence synchronization matrix,,as the basic
structure.
,~
:::::::::::::::::::::
iiiliiiiiliiiiiiiiiii Execute ,-he Battle iiiiiiiii~ii~i~ii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I
As the staff tracks the battle, they refer to the DST and"BOS _
synchronization matri-x to determine which decisions are
becoming due. The G2 or S2 then looks at the intelligence
synchronization matrix to determine which collection agencies
owe the information and intelligence which will enable the
decision to be made in a timely manner. The G2 or 52 may have
tom re-prompt the collection asset to the upcoming intelligence 5
requirement. This is especially true if the course of the
battle is occurring faster than anticipated.
As the collection assets report, the intelligence section
conducts analysis to determine if decision criteria have been
met. If not, the collection manager must retask the collector I
or the intelligence section must make an educated guess based on
available information. As each decision criteria is satisfied,
the 52 or collection manager refers to the DST and BOS
synchronization matrix to ensure that all decision makers r
Mini-Wargaming and
the Dynamic,
Recurring Nature of IPB
I
i
A-12
FM 34-130
In order to anticipate the changes such eventualities
dictate, the staff uses mini-wargaming to continually
re-evaluate their assumptions, re-initiating the IPB and
decision making processes as necessary. When any member of the
staff identifies conditions which require revalidation or
refinement of the plan, he initiates a mini-wargame. The G2 or
52 prompts mini-wargame sessions whenever he develops
intelligence that runs counter to planning assumptions.
The G2 or 52 usually begins by discussing the current state
of the common understanding of the battlefield:
0 He reviews the IPB predictions .that have been confirmed,
denied, and are yet to be confirmed. These are usually
assumptions about threat COAs but might also be.
assumptions about the terrain or other factors. -~
0 He follows this with a full report of the unanticipated
intelligence that led to the mini-warqame. He emphasizes
the significance of the intelligence in terms of the
threat COAs that it indicates or fails to indicate.
The G2 or 52 should then present an informal, revised set of
threat COAs that account for the new intelligence. The revised
COAs usually result from an abbreviated IPB process that may
have been executed in only a few minutes.
If the new intelligence is too contrary to the original IPB,
the commander may want to initiate a completely new planning
session. Otherwise the personnel present at the mini-wargame
modify the current plan based on the revised IPB. Because time
during conduct of the operation is usually limited, the staff
follows an abbreviated form of the warqaminq and intelligence
synchronization techniques discussed above.
The G3 or 53 usually prepares a fragmentary order to
incorporate new tasks to subordinate units. .The G2 or S2 should
use this opportunity to retask collection assets in accordance
with the revised collection plan.
The staff should conduct numerous mini-wargame sessions
during the course of an operation. A good technique is to
pre-schedule mini-wargame sessions every 2 to 6 hours. At each
session the staff reviews the current situation and the V'health88
of its current plans.
A-13
FM 34-130
.iiiiiilliiiiIiiiillil
. ..*
. . . .. .. .. .. .. .. .. .. .. ....*.*..
. . . . . . . An Example Application ijljiiliilniiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
i.:.::::::::::::::::::::::::::::::::::~:~::~:::::::::::::::::::::::::::::::~::::::::::::::::::::
1 SCENARIO 1
Bn Ai .^_
/IS!Insurgent
Currant AO for COIN operation!
i
^ regulars
--_---mm ----
^^ Expected InAO
from the NW 1 / .\ i
!
within 72 Hrs
If3 \
t
\
\
\
\
\
\
Bn Al
A-14
FM 34-130
0 Key facilities and targets overlay (potential targets for
the insurgents).
0 Infiltration and exfiltration routes.
0 Likely base camps within the AO.
0 Probable logistics, intelligence, and security activities
within the AO.
Pressed for time, the commander selected a friendly COA
immediately after conducting mission analysis. The friendly
plan includes.two phases:
0 Phase I: Establish platoon-sized ambushes along the 5
likely infiltration routes while conducting _
reconnaissance of the 11 possible base camp areas.
0 Phase II: Destroy the insurgent company in its base
camp.
During both phases the battalion will accept risk at
insurgent target areas identified on the key facilities and
targets overlay.
The battalion will also retain a company (-) as a mobile
reserve for the entire mission. The division has given the
battalion operational control of enough air assault assets to
conduct immediate lift of one platoon for the duration of the
mission.
The 52 and S3 have verified that the commander's plan should
succeed against all the threat COAs developed during IPB.
Wargaming 1
A-15
FM 34-130
0 Defense and security system. I
0 Their evacuation and exfiltration procedures.
Due to the proximity of the three base camps and other common
features identified .during IPB, the 53 decides to use the same
control measures for actions against any of the three base
camps. The staff synchronizes their plan for phase II of the I
operation in this box of the battlefield:
0 When the insurgent company is located in any of these
three NAIs,,A Company will immediately occupy tactical
assembly area BEAUTY~while C Company will immediately
occupy tactical assembly area LOGIC.
_~. -__---__ __-~ - - - - .--.-. I
I
>
OT
A-16
FM 34-130
On Order A Company will conduct movement to contact
along AXIS KEN as the battalion main effort to
destroy insurgents vicinity objectives in NAI 1 or
NAI 3.
o If the insurgents are in base camp 2:
C Company receives 3d platoon of B Company.
On Order A Company will occupy battle positions 1, 2,
and 3 in order to block the.northern and eastern
evacuation routes.
On Order B Company (-) will conduct air assault to
occupy battle positions 4 and 5 in order to block the
southern evacuation routes.
On Order C Company will conduct movement to contact
along AXIS LANCE as the battalion main effort,to
destroy insurgents vicinity objectives in NAI ~2. .~
The battle staff then plans appropriate support from each BbS
for each scheme of maneuver.
While the staff synchronizes the concept of operations for
this part of the battlefield, the recorder enters information
into the DST and BOS synchronization matrix. For purposes of
clarity he decides to combine the operations graphics and the
i. DST (see Figure A-4).
5
After wargaming, the S2 translates the decision criteria for
each decision from the BOS synchronization matrix into an
intelligence requirement (see Figure A-5). As the S2
prioritizes the list, he places intelligence requirements number
1 and 2 at the top of the list as his recommended PIR. The
commander agrees and the new PIR are--
0 PIR 1: Has the insurgent company established a base camp
in NAIs 1 or 3?
0 PIR 2: Has the insurgent company established a base camp
in NAI 2?
As part of his collection strategy, the 52 decides to use the
battalion scouts to answer PIR 1 and a patrol from B Company to
answer PIR 2. The insurgent company is expected to occupy the
base camp only for a limited time. Maneuver and OPSEC
constraints narrow the window even further. The 52 records all
this information into his intelligence synchronization matrix
(see Figure A-6).
A-17
FM 34-130
1
Figure A-4. Declslon support template.
Fs Priority: A, B, C Priority: C, B, A
A-18
FM 34-130
Scouta: __ -X xx
A Co
B Co ~~~~~~~~~~~~~---x
c co
Bde ______ L ____ x X,
l Scouts will not proceed to P3/14 if they find the insurgent company in NAI No. 1 -(Pm 1)
.g;i;ix;ig;
. . . . . . . . . . . . . . . . summary ftiii;i.ii;;iiiiiiii;ili!!!flflffiifi;~~~~~~~~~~:~~
. .. .. . .. . .. . . . . . . . . . . . .. . . . . . . . . , .. . . . . . . . . . . . . .. . . . . . . . . . . . . .. . . . . . . . . . . . . .. . . . . . . . . . . . .
A-20
FM 34-130
I
APPENDIX B
GENERAL GUIDELINES FOR USE DURING
INTELLIGENCE PREPARATION OF THE BATTLEFIELD
AREA OF INTEREST
COMMAND ECHELON (HOURS)
Battalion up lo 1~2
Brigade Up to 24
Dhision Up lo 72
corps Up 10 96
E4C Over 96
B-2
FM 34-130
::::::::::::::::::::::::
iiiiliiiiiliiis;iiiiii Describe the Battlefield 1 s Effects Ifffti;:iii!illtft:fii;f;;;iilttfliiiii
B-3
FM 34-130
The final product prepared to support planning for a
conventional defense by a light infantry battalion (threat or
friendly) should include--
0 Chokepoints along the mechanized or armor avenues of
approach that allow for strongpoints that would not be
easily bypassed.
0 Close terrain (usually RESTRICTEDj within the mechanized
or armor aven,ues of approach that allow large amounts of
light infantry to achieve flank and rear shoots against
armored vehicles
.. ate ranges of 100 meters or less.
0 Defensible terrain along light infantry avenues of
approach. Ideally the defense is comprised of a network' -.
of ambushes. .~
See Chapters 4 through 6 for ideas on conducting IPB under
conditions not listed above. Figures B-3 through B-21 provide
some rules of thumb for describing the battlefield's effects.
M48 M60
VEHICLE Ml M60A1 M109 M113 N35A2 M151 T62 T72 M2 M3 AVLB AVLB MLR!
Maximum road
speed (kph) 71 48 56 48 56 50 50 (60) 66 66 48 51 64
Maximum on-
road gridability
(%) 68.7 60 60 60 64 60 62 (62) 60 60 30 30 60
Maximum off-
road gradability
(%) 53 45 45 45 30 28 (45) (45)
Vehicle width
(m) 3.65 3.63 3.10 2.69 e43 1.69 3.37 3.38 6.2 6.2 4.3 4.3 2.97
Override diameter
at breast height
(m) .25 .15 (.12) .10 .06 .04 (.15) .18
Vehicle cone
index 1 pass
(VCh) 25 20 25 17 26 19 21 (25) 15 15 26 22
Vehicle cone
index 50 passes
(VCIso) 58 48 57 40 59 44 49 35
(60) 35 60 51
Minimum turning
radius (m) 9.9 9.4 6.6 4.8 5.3 5.8 9.33 9.2 6.2 6.2 9.6 9.6 6.97
Vehicle length
(m) 9.9 9.4 6.6 4.8 6.7 3.35 9.33 9.2 6.2 6.2 9.6 9.6 6.97
Military load class 60 54 24 12 10 NA 42 45 24 24 62 63 28
FM 34-130
t 3
SLOPE STREAMS VEGETATION
DEPlH CURRENT wlom SPACING TRUNK ROADS/TRAILS
w-4 (fPS) (feet) (few DfAMETER (per km)
(Inches)
t t
GO <30 <2 ..--- <5 ~>20 <2 2l4
Canopy closure 40
FAIR Roof coverage** 201040
Slope Cl0
POOR Non-forested
Roof coverage** <20
I ROOF COVERAGE
(percentage)
I
CATEGORY
I CONCEALMENT
75 to loo EXC&llt
50 to 75 Good
I
25 to 50 Modmte Fair
5 to 25 Sparse Poor
0 to 5 Open None
Figure B-6. Concealment from aerfal detectlon end percentage of roof coverage.
B-5
e
FM 34-130
-
1
WATER DEPTH OTHER
CATEGORY VESSEL (meters) (meters)
Deep draft * NiWal 10
cqltalner 10 to 15
Bulk carrier 12 to 18
Tankers 10 to 28
Shallow draft l * lish i 3
Seabee 3.4 31
h9e 38 33
1 Each vessel hatch re&ires 30 meten 01 wharf space, with the wharf at least 30 meters wide.
l * The wharf length must be 12 meters.
B-6
FM 34-130
--
Height
(feet)
N6utlc6l
mllsa mllrs (IWil)
iiziz
mllca statute
mllaa
Helghl
(feel)
NtlUlhl
mllea
statute
mlle6
l 7
1.6
1.3
1.9
120 (2.5 7
14.7
940 36.1 40.4
2
3 2 . 0
2.3
2.3
2.6
t
:zi
136
:z 15.0
15.3
Ei 35.6 35.4 2::
4
5 2.6 2.9 140 ::ls 16.6 ::z 37.9 36.2 :::;
145 15.9 1200
6
7
8
::o"
32
3.2
3.5
3.7
160
160
2:
14:5
16.1
16.7
I.300 m.; ::::
9 3.4 4.0 170 14.9 17.2 :Gfi 43.8 44.6 49.6 52.0
10 3.6 4.2 160 15.3 17.7 1:6w 45.6 52.8
It 3.6 4.4 190 15.6 1.7M 47.2
12 4.0 162 :i:: ::z 49.9 46.5 57.8
2::
13 4.1 4.6
4.7 E 19.1
14 43~ ;;:t g:; 51.2 58.9
15 4.4 5.1
4.9 i% 17.3 z% 52.4 50.4
16 4.6 17.7 M.4 2.200 53.7 61.8
17 4.7 5.3
5.4 ;: 18.1 2.300 54.9 63.2
ia 4.9 5.6 18.4 2: 2.400 56.0 64.8"
19 5.0 5.7 E 18.8 21.6 2,500 57.2 65.8
20 5.1 5.9 260 19.1 22.0 2,600 56.3 67.2
21 5.2 19.5 22.4 2,700 59.4 66.4 1
22 5.4 6.0
6.2 z 19.8 22.8 2,600 60.6 69.7
23 5.5 6.3 310 20.1 239 2,900 61.6 70.9
24 5.6 23.6 3,000 62.7 72.1
25 5.7 2: 52 $2: 23.9 3.100 63.7 73.3
26 5.8 21.1 24.3 3,200 64.7 74.5
27 5.9 6.7
6.6 E 21.4 24.6 3.300 65.7 75.7
28 6.1 7.0 360 21.7 25.0 3,400 66.7 76.8
29 6.2 7.1 370 25.3 3,500 67.7 77.8
30 6.3 7.2 300 2: 25.7 3600 66.6 79.0
31 6.4 7.3 390 22.6 26.0 3,700 69.6 80.1
32 6.5 7.5
33 6.6 7.6 it-i E:Z % :Ei 70.5 71.4 61.3 62.3
34 6.7 7.7 420 23.4 27.0 4:M0 72.4 63.3
35 6.6 7.8 430 23.7 27.3 4.100 73.3 04.3
36 6.9 7.9 440 24.0 27.6 4.Mo 74.1 85.4
37 8.0 459 24.3 27.9 4.300 75.0 06.4
36 ::: 8.1 460 24.5 26.2 ,.ao 75.9 87.4
39 7.1 8.2 470 24.6 26.6 4.m 76.7 88.8
t 25.1 28.9 4.600 T1.6 89.3
40 7.2 6.3 460
41 7.3 6.4 493 25.3 4.703 78.4 90.3
42 25.6 z::
43 ;I; 8.5
6.6 E 26.1 30.0 %z 79.3
80.1 91.2 92.2
44 8.7 540 26.6 30.6 5:Ow 80.9 93.1
45 7.7 6.6 560 27.1 31.2 WJW ea.6 102.0
46 7.6 27.6 31.7
47 7.6 6.0
9.0 iti xci 102.3 95.7 x
46 7.9 9.1 m ;::i 5: 9:aw 108.5 124:6
49 8.0 26.9 lo.m 114.4 131.7
SO 6.1 9.3
9.2 z 29.4 ii:; 15,wo 140.1 161.3
55 a.5 9.8 34.3 zg8i ;%:i 206.2 186.3
60 6 . 9 10.2 E $2 24.8
65 9.2 30.7 35.3 19&, P&l
70 9.6 10.6
11.0 E 31.1 35.6 $?E
75 a.9 11.4 31.5 35.3 &Gil 214.0
22tl.8 246.4 263.8
60 10.2 11.6 :t 31.9 36.6 45,ooo 242.7 279.4
85 '10.5 12.1 32.4 37.3 z%i 255.8 294.5
90 iii 37.7
95 :::; ;::i 2 70:OM EP2:: iZ:
100 11.4 33:s $1: 322.6 372.5
105 11.7 :::: E
880 33.9 39.1 l&W
%E ii::; 395.1
110 13.8 600 34.3 39.5
115 :;:i 14.1 92-a 34.7 39.9 2wMQ 511.6 2%
B-7
I
FM 34-130
Hover,
Hellpsd or Shoulder Lsnr Shoulder
Heliport Length Width Wldlh Wldlh Length Width Wldlh
TLPO (feet) (itet) (feet) (feel) (feet) (feet) (feet)
Forward Ares I)
OH-6A 12 12 NA 75 NA NA NA
UH-1H 20 20 NA 140 NA NA NA
CH-47 50 25 NA 180 NA NA NA
CH-54 50 50 NA 200 NA NA NA
Support Area
OWSA 12 12 10 100 NA NA NA
LJtl.lH NA NA NA
cf-l-47 z 4.50 10
Cli-5.4 250 450 10
Rear Area
OH-6A 25 25 25 100 NA NA NA
UH-1H 40 40 25 200 NA NA NA
CH-47 100 50 25 240 450 40 25
CH-54 100 100 25 250 450 60 25
1 I 1 I I I I
i Taxi/hover lane Is used for rakeoh and tending where provided; lenglh is variable.
Where runway Is not shown, takeoff and landiio are oh laxkhover lane.
B-g
. I
FM 34-130
Runw8y Total
Runwily funwsy Shoulder Aircraft
Length Width Width Trofflc Area*
Alrileld Type (feet) (feet) (feet) i ,000 6q n
Battle Area:
Lighl Lift and Medium Lilt ewe 60 10 223
Fowrrd Area: :
Liaison 1,ooa NA 37.5
Surveillance 2.500 iTi 10 337
Lighl tih and Meaium Liit: 2soLl Ml 10 358
Support Area:
LS60n law0 50 NA 50 .~
Surveillance
Light Lilt and Medium Lift i%z 60 10 E.5
Heavy Lib 6:ooo 100 10 1.421
Tactical 5.oco 60 4 1,071
IR e a r A r e a : I I I I
Army 3,fJ@J 72 10 882
IMedium Liil 6,330 72 ii 2,362
IHeavy Lih 10,ow 156 3,926
racticar 8,~ 108 20 1.999
B-9
FM 34-130
DEGREE OF SLOPE CALCULATOR
Many slope calculators have been made by various terrain
detachments. These calculators show different contour densities
to be used on maps at various scales with various contour
intervals.' They are usually reproduced on transparent plastic
by photography laboratories. Figure B-12 is an example of a
slope calculator.
Ill Mll 1 I I I
45 25 10
SCALE SCALE
0 USEWfTH D
RF. with CONTOUR INTERVAL
1:25.000 25 FEET
1.50.000 50 -
1:100.000 100
1:125.000 125
1,250.000 _ 25Q -
B-10
FM 34-130
I METERS FEET I
UNIT WIDTH
Division 6km
Brigade or Regiment 3km
Battalion 1.5 km
Company 500 m
Figure B-14. Widths of mobility corridora.
B-11
FM 34-130
/Soldier on fool
LOAD
LOAD
MINIMUM ICE
THICKNESS (CENTIMETER
5
I~- M!NIMUM DISTANCE
BETWEEN
LOAD IMETERS)
Vehicles:
l/4-Ion truck ~!a
3HOrl IluCk 25
1 l/4-IOn Uutk 25
2 l/4-Ion lruck 2 25
2 1,2-lorl truck 40 25
5.Ion lruck 55 60 .:
&Ion lanker 90 . 80
5401-1 lraclor w/loaded lreiler 90 80
hi561 Cargo carrier 25 20
MS.ln bSllls lank aa
t&8 recovery vehicle 65 :,
MlOfl HOW, Sr: l&mm 50 40
Ml09 HOW, Sp. 155mm 53 40
M1l0HOW.SP:sin 55
Ml13APC
hi548 cargo carrier
45
45
E25
M577 carrier command post 45 25
M578 recovecy vehicle 60
av209 susv .E 15
B-12
FM 34-130
ATTACK + 0 . 0 . 0 + 1 + -1 + 0 0 0
DEFEND 0 2 0 -2 0 0 0 0
REINFORCE + 0 0 0 0 +/-a * 0 0 0
VITHDRAW + 0 0 0 + W-3 + 0 0 0
ARTILLERY 0 0 0 0 0 0
AIRMOBIUTY . 0 . 0 0 X X X + +
AIRBORNE 0 .0 0 X * 0 *
CAS 0 0 0 0 X X X X f
CHEMICAL 0 + 0 + + * 0 0 0 +
uw 0 0 0 0 + + - 0 - + + 0 -
INTELCOL - 0 - 0 - 0 - - - . . - - 0
N/COMMO - 0 . 0 . 0 0 -, * . . 0 0 0
+ - FAVORS 0 - NEITHER FAVORS NOR OEQRADES
- - DISFAVORS X - STRONQLY DISFAVORS/PRECLUDES
+/- - MAY FAVOR OR DISFAVOR DEFENDINO ON CIRCUMSTANCES
NOTES: 1. Doi not favor any military operation; (vor attack ralativ to delaneo.
2. Do not favor moat military operations; favor d(na relativ to attack.
3. Hindar mobility but increa* concJmnt.
WEATHER EFFECTS DEPEND ON TACTICAL SiTL!ATlON. USE CHART AS A OENER4L GUIDE ONLY
NOTE EFFECTS ON AlTACK AND DEFENSE ARE SHOWN IN ISOUITION, RATHER THAN AS RELATIVE
TO EACH OTHER
B-13
FM 34-130
B-14
FM 34-130
B-15
FM 34-130
::::::::::::::::::::::::
........................ Evaluate +-he Threat iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
:::::::::::::::::::::::: :..: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i......:: . . . . . . . . . .
B-16
FM 34-130
0 Develop a doctrinal narrative--describe the tasks that
each subordinate unit will accomplish during the
operation. The written narrative can be expressed
either in paragraph form or in a standard
synchronization matrix that has subordinate units on one
axis and time duration on the other axis.
0 Develop HVTs based on doctrine--what are the tactical
systems that the threat depends upon for the successful
accomplishment of the procedure?
Fortunately, there are certain constants affecting the
operations of the military forces of any nationality. These
fundamentals of tactics can be learned through--
0 Effectivebattle-focused training.
0 The study of military history.
0 Mentoring by battle-seasoned soldiers.
You will discover that sustained pursuit of "battlefield
common sense" greatly simplifies the development of threat
models.
Learn the tactics of your own forces. This gives you a
common framework that enables you to communicate with your
commander and understand how best to support his operations. It
also provides you with a basis against which to compare the
doctrine of any threat you may face:
0 How is it different from US doctrine?
0 How is it the same?
0 What does the threat do to minimize the vulnerabilities
associated with any given operation?
0 How do the details of the threat model relate to
doctrine and TTP? For example, how does the spacing of
units relate to weapon range capabilities? If range
capabilities increase will units deploy further apart?
For more ideas on developing threat models, refer to the
techniques on building threat COAs in the final section of this
appendix. Remember that threat models are generalized
procedures; they do not depend upon the specific battlefield
environment. Threat COAs are tied to specific METT-T
situations.
Figures B-22 through ****** offer some guidelines for use in
evaluating the threat.
B-17
FM 34-130
DIV . REGT EN CD
Tanks may deploy 200 to 300 meters apart and APCs up to 200 maters apart. Antitank obstacles
are placed so that they are covered by direct fire.
IMMEDIATE OBJECTIVE
DEPTH 100t0150 201030 5to15 2104
SUBSEQUENT OBJECTIVE
DEPTH 250to350 501070 20to30 BtO15
NOTE: These figures will vary with the tactical situation and terrain.
B-18
FM 34-130
ELEMENT DEPLOYMENT
DIVISION FIRST ECHELON Concentrated to attack on two OI three axes each several kilometers wide.
DIVISION SECOND ECHELON OR Moves by bounds 15 to 30 km behind the first echelon until committed.
COMBINED ARMS RESERVE
DIVISIONAL ANTITANK RESERVE Between fii and second echelotu oruhe axis of the main snack or on a
threatened flank.
DIVISION REAFt AREA CP Up to 30 km from the FESA and located near the rear service elements.
I
REGIMENTAL MAIN CP . Up to 5 km from the FESA.
LOGISTIC UNITS The divisional medical post, togehter with repair and avacuation elements.
moves behind the fist echelon The rest of the divisional logislic units
will be some 5 to 10 km bahind the second echelon.
aan~llon
Mciorlzed Ma regiment SOlO
25 lo 69 minutes mlo45mlnutsr
[reinforced)
B-19
FM 34-130
Between regiments on the same route. StolOkm Can vary as contact becomes imminent.
B-20
r
FM 34-130
9
UNIT DIESEL ,GAS I TOTAL
I
67,860 59,990 127,859 liters
MRR (BTR EOUIPPED)
57.7 45.0 102.7 metric tons
NOTE: A unils refill Is the total requlremenl for sll vehicles h the unil.
B-25
FM 34-130
- --__-.
- - m
FOOT MARCHES
NOTE: Foot marches will vary with the tactical situation: normal formation is a column of twos
vith a file on either side of the road and staggered, much like US Forces. However, columns of
hrees and fours may be employed where conditions permit.
i
ass Time. To determine the pass time in minutes ior a dismounted unit, multiply the length
,I the column by the appropriate (actor lor the estimated or known rate of march.
i
PASS TIME FACTORS, FOOT MARCHES
B-21
. I
ucyrcc wi RED DEFENSE ^ w^
'*"' ^i
6 Rates greater than 6 lo 1 will result In advances between lhese and Ihe unopposed rales.
Degree of PREPARED DEFENSE3 | HASTY DEFENSE/DELAY4
Resistance
Attacker to GO SLOW-GO NO-GO GO SLOW-GO NO-GO
| Defender TERRAIN TERRAIN TERRAIN TERRAIN TERRAIN TERRAIN
Radio
Armor/Mech Inf Armor/Mech Inf Armor/Mech Inf Armor/Mech Inf Armor/Mech Inf Armor/Mech Inf
CO
Intense
Li I Resistance .6 .5 .5 .3 .15 .1 1.0 .8 .8 .5 .4 .2
1:1
Very Heavy .4 .3
tfl .9 .6 .6 .2 1.5 1.0 1.0 .7 .6 .3
2:1
Heavy
Q 1.2 .7 .75 .5 .5 .3 2.0 1.2 1.3 .9 .8 .5
0 3:1
a
Medium . 1.4 .8 1.0 .6 .5 .5 2.4 1.4
in 1.75 1.1 .9 .8
4:1
P
Ught .7 .6
1.5 .9 11 .5 2.6 1.6 2.0 1.2 1.0 .9
a 5:1
tr Negligible
1.7+ 1.0+ 1.3+ .8+ .6+ .6+ 3.0+ 1.7+ 2.3+ 1.3+ 1.1 + 1.0
6+:1
o
4
;ource: Adapted from CACDA Jiffy Ill War Game, Vol II, Methodology.
o
Unils cannd sustain these rates for 24 hours. These rates are reduced by l/2 at night.
O
w
ro 2 The relative combal power ratio must be computed for Ihe unil under consideration:
a
When there is surprise, mullipty lhese figures by a surprise factor as follows:
DJ - Complete Surprise x 5 (e.g.. Germans at the A:dennes in 1944. Arabs in 1973).
ft - Substanllal Surprise x 3 (e,g. German invasion ol Russia in 1941. Israeli Invasion oi Sinai in 1967).
fO
W - Minor Surprise x 1.3 (e.g., Allied Normandy landing in 1944. Pakislani allack on India in 1971).
The effects of surprise ksl for 3 days, being reduced by one-third on day 2 and lw&thirds on day 3.
O
H>
Prepared defense is based on defender in prepared posi(ions (24 hours or more).
Ql
a 5 Hasty defense Is based on 2 lo 12 hours preparaiion lime.
<
a
3 6 The ralios used here are lo determine Ihe degree of resisiance. There Is no direcl relationship between advance rates and force ratios,
o
However, l uslalned advances probably are not possible wkhoul a 3 lo 1. ratio. Advance is possiblO againsi super&forces bu( canno, be
sustained.
Rales greater lhan 6 lo 1 Will resull in advances between these and the unopposed rates.
FM 34-130
I
MULTIPLE ROCKET
DISTANCES MORTARS GUNS I HOWIRERS LAUNCHERS
. Mortarbattery , , . . . . , . . . . , , , lto1.5
Artillery battalion . . . . . . . , . . . . . 2103
MRL battery . . . . . . . . . . . . . . . 4
RAG . . . . . . . . . . . . . . . . . . . 4
OAG . . . , . . . . . . . . . . . . . . . 5
B-24
P
FM 34-130
:::::::::::::::::::::::: ... . . . . . . . . . . .
iiiiiiiii;i~~i~iiiiii Determine Threat Courses of Action ~lll~iiiiiiji~~~~~~~~~~~~~~~~~~~~~~~~~~~
As mentioned in the previous section, threat models are
generalized procedures. Threat COAs are the situational
application of the threat model. Furthermore, one threat model
may generate a number of threat COAs when-applied to a specific
battlefield environment. For example, a "typical guerrilla
ambush" threat model,may spawn several ambush threat COAs along
a specific route.
,.
A threat course of action model has three components:
I
0 Situational template --a graphic portrayal of the '-
employment oft threat subordinate units and assets during
execution of the COA.
0 Situational narrative--a written description of threat
actions during the COA. This can be in the form of a
paragraph or a synchronization matrix. I
1 Defense )
B-26
FM 34-130
0 Linear defenses versus defenses in depth.
0 Mixed defensive system.
0 Delaying defenses.
0 Use of battle positions, strongpoints, and defenses in
sector.
For each threat COA identified, situationally template (in
order):
0 Engagement areas and supporting obstacle systems.
0 Unit range fans covering engagement areas with.:direct.
fire weapons. Template units two echelons below-the _
level of the major defending unit.
B-27
FM 34-130
For each threat COA, situationally narrate or depict in a
matrix the timing and sequencing of--
0 Initial engagements by covering force, artillery, and
the main battle forces.
0 Withdrawal of the covering force.
0 Commitment of threat reserves.
0 Possibility of repositioning defending forces from the
supporting attack area to the main attack area.
0 Failure options statement for the main battle forces.
Offense
i
B-28
FM 34-130
0 Combined arms operations. Consider mixing heavy and
light forces, for example, using air assaults to seize
key terrain, using special forces for deep objectives,
or amphibious operations to turn flanks.
0 Defeat mechanisms via forms of maneuver, such as
infiltration, frontal attack, envelopment, turning
movement, penetration.
For each threat COA, situationally template:
0 Axis of advance.
0 Objectives.
0 Control measures. _~
B-29
FM 34-130
I
Event
Templates I
B-30
FM 34-130
B-31'
.
FM 34-130
GLOSSARY
AA - see Avenue of Approach.
ADA - Air Defense Artillery.
AI - see Area of Interest.
A0 - see Area of Operations.
Area of Interest (AI) - The geographical area from which
information and intelligence are required,:to permit planning or
successful conduct of the command's operation. The area of
interest is usually larger than the command's area of operations
(q.v.) and battle space (q.v.). The area of interest includes
any threat forces or characteristics of the battlefield
environment that will significantly influence accomplishment of'
the command's mission.
Area of Operations (AO) - That portion of an area of conflict
necessary for military operations. Areas of operations are
geographical areas assianed to commanders for which they have
responsibility and in which they have the authority to conduct
military operations.
Assumptions - Information used to replace missing facts (q.v.)
necessary for command and staff planning, estimating, and
decision making. Assumptions may also be required for facts that
change due to the time difference between receipt of the mission
and the time of execution, such as threat dispositions.
Assumptions should be confirmed or denied by intelligence
collection whenever practical.
Avenue of Approach (AA) - An air or ground route of an attacking
force of a given size leading to its objective or to key terrain
in its path. Avenues of approach are based on the capabilities
and opportunities offered by the battlefield environment and may
not necessarily form part of a course of action. Defensive
avenues of approach support counterattacks and the commitment of
reserves. Note the difference between avenues of approach, axis
of advance (q.v.) and direction of attack (q.v.).
Axis of Advance - A general route of advance, assigned for
purposes of control, which extends toward the enemy. An axis of
advance symbol graphically portrays a commander's intention, such
as avoidance of built-up areas or envelopment of an enemy force.
Glossary-l
FM 34-130
Glossary-2
FM 34-130
Beginning Morning Nautical Twilight (BMNT) - Morning nautical
twilight begins when the sun is 12 degrees below the eastern
horizon. It is the start of that period where, in good
conditions and in the absence of other illumination, enough light
is available to identify the general outlines of ground objects,
conduct limited military operations, and engage in most types of
ground movement without difficulty. See End Evening Nautical
Twilight.
BMNT - see Beginning Morning Nautical Twilight.
Boer - A Dutch colonist or a descendant of a Dutch colonist in
Southern Africa. The Boers created several independent states in
Southern Africa in the early 19th century after the British
annexed their lands in South Africa. Economic competition, the
discovery of gold an< diamonds, and other factors led to
increased hostility between the Boers and the British, resulting
in the Boer War (1899-1902).
BOS - see Battlefield Operating Systems.
BOS Synchronization Matrix - A written record of wargaming. The
BOS synchronization matrix depicts the criteria that generate
each anticipated friendly decision and the resulting action by
each friendly BOS (q.v.). Other information required to execute
a specific friendly course of action may also be included.
BP - see Battle Position.
Branch - A contingency plan (an option built into the basic plan)
for changing the disposition, orientation, or direction of
movement of the force.
Capability - The ability to successfully perform an operation or
accomplish an objective. The evaluation of capabilities includes
an assessment of a force's current situation as well as its
organization, doctrine and normal tactics, 'techniques and
procedures. Capabilities are stated in terms of broad courses of
action and supporting operations. Generally, only capabilities
that will influence accomplishment of the friendly command's
mission are addressed.
COA - see Course of Action.
Common Understanding of the Battlefield - How the commander and
staff perceive the battlefield environment. It includes the sum
of all that is known or perceived of friendly and threat forces
and the effects of the battlefield environment.
Glossary-3
FM 34-130
Confirmed - Confirmed intelligence is information or intelligence I
reported by three independent sources. The test for independence
is certainty that the information report of one source was not
derived from either of the two other sources, usually resulting
in reliance on original reporting. Analytical judgment counts as I
one source-. Ensure that no more than one source is based solely
on analytical judgment.
Course of Action (COA) - A possible plan open to an individual or
commander that would accomplish or is related to accomplishment
of the mission. A course of action is initially stated in broad
I
terms with the details determined during staff wargaming. To
develop courses of action the staff must focus on key information
and intelligence necessary to make decisions. ~1 Courses of action
include five elements: what (the type of operation), when (the I
time the action will begin), where (boundaries; axis, etc.),. how
(the use of assets), and why (the purpose or desired end-state).
Culminating Point - The point in time and space when the .' '~ -
attacker's combat power no longer exceeds that of the defender or
when the defender no longer has the capability to defend
successfully.
Decision Point (DP) - The point in space and time where the
commander or staff anticipates making a decision concerning a
specific friendly course of action. Decision points are usually
associated with threat force activity or the battlefield
environment and are therefore associated with one or more NAI
(q-v.). Decision points also may be associated with the friendly
force and the status of ongoing operations.
Decision Support Template (DST) - A graphic record of wargaming. i
The decision support template depicts decision points (q.v.),
timelines associated with movement of forces and the flow of the
operation, and other key items of information required to execute
a specific friendly course of action.
Defensible Terrain - Terrain that offers some concealment and
cover to defending forces while also providing observation and
fields of fire into potential engagement areas. Ideal defensible
terrain is difficult to bypass, offers-concealed and covered
battle positions, covered withdrawal routes, and overlooks
engagement areas that allow the defending force to use all of
their weapon systems at their maximum ranges. Defensible terrain
must defend a likely objective or avenue of approach (otherwise, i
why defend it?).
Glossary-4
FM 34-130
Delaying Operation - An operation usually conducted when the
commander needs time to concentrate or withdraw forces, to
establish defenses in greater depth, to economize in an area, or
to complete offensive actions elsewhere. In the delay, the
destruction of the enemy force is secondary to slowing his
advance to gain time. Delay missions are delay in sector, or
delay forward of a specified line for a specified time or
specified event (see FM 101-5-l).
Direction of Attack - A specific direction or route that the main
attack or the main body of the force will follow. If used, it is
normally at battalion and lower levels. Direction of attack is a
more restrictive control measure than axis of advance, and units
are not free to maneuver off the assigned~route. It usually is
associated with infantry units conducting night attacks, or units
involved in limited visibility operations, and in counterattack.
In NATO terminology it is referred to .as an Attack Route. Note
that directions of attack are control measures that are assisned
as part of a course of action; the term is not synonymous withy
avenue of approach (q.v.). See also Axis of Advance.
DMA - Defense Mapping Agency.
Doctrinal Template - A model based on postulated threat
doctrine. Doctrinal templates illustrate the disposition and
activity of threat forces and assets (high value targets)
conducting a particular operation unconstrained by the effects of
the battlefield environment. They represent the application of
threat doctrine under ideal conditions. Ideally, doctrinal
templates depict the threat's normal organization for combat,
frontages, depths, boundaries and other control measures, assets
available from other commands, objective depths, engagement
areas, battle positions, etc. Doctrinal templates are usually
scaled to allow ready use on a map background. They are one part
of a threat model (q.v.).
DP - see Decision Point.
Drift - A colloquial expression for a ford; a shallow place in a
stream or river that can be crossed by ~walking or riding on
horseback.
DST - see Decision Support Template.
Duffer - British colloquial expression for an incompetent,
awkward, or stupid person.
EA - Electronic Attack; a sub-component of Electronic Warfare,
formerly known as Electronic Counter Measures (ECM).
EA - see Engagement Area.
Glossary-5
FM 34-130
EAC - Echelon(s) Above Corps.
I
Glossary-6
FM 34-130
High Payoff Target (HPT) - High value targets (q.v.) whose loss
to the threat will contribute to the success of the friendly
course of action.
High Value Target (HVT) - Assets that the threat commander
requires for the successful completion of a specific course of
action.
HUMINT - Human Intelligence.
I&W - Indications and Warning; one of the six IEW (q.v.) tasks
(see FM 34-l).
IEW - Intelligence and Electronic Warfare,
IMINT - Imagery Intelligence.
Indicators - Positive or negative evidence of threat activity or
any characteristic of the area of operation which pointsl+oward~
threat vulnerabibities or the adoption or rejection by the threat
of a particular capability, or which may influence the
commander's selection of a course of action. Indicators may
result from previous actions or from threat failure to take
action.
ISOs - Intelligence System of Systems (see FM 34-l).
HPT - see High Payoff Target.
HVT - see High Value Target
Infiltration Lane - A route used by forces to infiltrate through
or into an area or territory. The movement is usually conducted
in small groups or by individuals. 'Normally, infiltrating forces
avoid contact with the enemy until arrival at the objective
area. Because of the emphasis on surprise, infiltration lanes
usually make use of terrain that offers concealment and cover,
even if some sacrifice in mobility results.
Information Requirement (IR) - An intelligenc,e requirement (q.v.)
of lower priority than the PIR (q.v.) of lowest priority.
Intelligence Preparation of the Battlefield (IPB) - The
systematic, continuous process of analyzing the threat and
environment in a specific geographic area. IPB is designed to
support the staff estimate and military decision making process.
Most intelligence requirements (q.v.) are generated as a result
of the IPB process and its inter-relation with the decision
making process.
Glossary-7
FM 34-130
Intelligence Requirement - A requirement for intelligence to fill
a gap in the command's knowledge and understanding of the
battlefield or threat forces. Intelligence requirements are
designed to reduce the uncertainties associated with successful
completion of a specific friendly course of action; a change in
the course of action usually leads to a change in intelligence
requirements. Intelligence requirements that support decisions
which affect the overall mission accomplishment (such as choice I
of a course of action, branch, or sequel) are designated as
priority intelligence requirements (PIR-q.v.). Less important
intelligence requirements are designated as information
requirements (IR-q.v.). I
Glossary-8
FM 34-130
Line of Departure (LD) - A line designated to coordinate the
commitment of attackinq units or scouting elements at a specified
time. A start line. -
LOA - see Limit of Advance.
LOC - see Lines of Communication.
LTIOV - Latest Time Information of Value; the time by which
information must be delivered to the requestor in order to
provide decision makers with timely intelligence. Sometimes the
LTIOV is the expected time of a decision anticipated during staff
wargaming and planning. If someone other than the decision maker
must first proces,s the information, the LTIOV is earlier than the
time associated with the decision point. The time difference
accounts for delays in processing and communicating the final
intelligence to the decision maker. :
MASINT - Measurement and Signature Intelligence. .~
MC00 - Modified Combined Obstacle 0verlay;~a product used to
depict the battlefield's effects on military operations. It is
normally based on a product depicting all obstacles to mobility
modified to also depict:
o Cross country mobility classifications (Restricted, etc.)
o Avenues of approach and mobility corridors.
o Likely locations of counter-mobility obstacle systems.
o Defensible terrain.
o Likely engagement areas.
o Key terrain.
The list is not prescriptive or inclusive.
METT-T - Commonly used acronym for "mission, enemy, terrain,
troops, and time available," used to describe the factors that
must be considered during the planning or execution of a tactical
operation. Since these factors vary in any given situation, the
term "METT-T dependent" is a common way of denoting that the
proper approach to a problem in any situation depends on these
factors and their interrelationship in that specific situation.
MI - Military Intelligence; a branch of the United States Army.
Mile - A unit of linear measure equal to 5,280 feet, 1,760 yards,
or 1.60934 kilometers. To convert kilometers to miles multiply
the number of kilometers by a factor of 0.62137.
Mobility Corridor - Areas where a force will be canalized due to
terrain restrictions. They allow military forces to capitalize
on the principles of mass and speed and are therefore relatively
free of obstacles.
Glossary-9
FM 34-130
MRR - Motorized Rifle Regiment; name of a soviet-style maneuver
unit normally consisting of three mechanized infantry battalions,
one tank battalion, one artillery battalion, and enough combat
support and combat service support assets to make it capable of
independent action for at least limited periods of time. The
term motorized dates from World War II when most units depended
on trucks for transportation. Today most units with this name
are actually mechanized.
NAI - see Named Area of Interest
Named Area of Interest (NAI) - The geographical area where
information that will satisfy a specific information requirement
can be collected. NAI are usually selected to capture
indications of threat courses of action but also may be related
to conditions of the battlefield.
Nautical Mile - a unit of linear measure equal to 1.852
kilometers or approximately 1.15 miles. Nautical miles are
commonly used in sea end air navigation.
NBC - Nuclear, Biological, and Chemical; used to denote weapons
or operations which depend on nuclear, biological, or chemical
warheads or agents for their casualty producing effects; or which
protect or defend against or react to their use.
NLT - Not later than; the time by which something must be
accomplished.
NME - Nuevo Metropolanio Ejercito; a fictitious organization
created for purposes of illustrating the application of the
doctrinal principles,put forth in this manual.
OB - see Order of Battle.
OCOKA - A commonly used acronym and mnemonic for the factors of
terrain analysis. The acronym does not dictate the order in
which the factors are evaluated; use the order best suited to the
situation at hand. The factors of terrain analysis are
observation and fields of fire, concealment and cover, obstacles,
key terrain, and avenues of approach.
Order of Battle (OB) - Intelligence pertaining to identification,
strength, command structure, and disposition of personnel, units,
and equipment of any military force. The order of battle factors
form the framework for analyzing military forces and their
capabilities, building threat models, and hence, course of action
models. See FM 34-3.
Glossary-10
FM 34-130
Pattern Analysis - Deducing the doctrine, tactics, techniques,
and procedures of a force by careful observation and evaluation
of patterns in its activities. Pattern analysis leads to the
development of threat models and hence to course of action
models.
Penetration - A form of offensive maneuver that seeks to break
through the enemy's defensive position, widen the gap created,
and destroy the continuity of his positions.
Phase Line (PL) - A line used for control and coordination of
military operations. It is usually a recognizable terrain
feature extending across the zone of action. Units normally
report crossing PLs, but do not halt unless specifically
directed. PLs often are used to prescribe the timing of delay
operations.
PIR - see Priority Intelligence Requirement.
PL - see Phase Line.
Possible - Information or intelligence reported by only one
independent source is classified as possibly true. The test for
independence is certainty that the information report of a source
was not derived from some other source, usually resulting in
reliance on original reporting. A classification of possibly
true cannot be based on analytical judgment alone.
Priority Intelligence Requirement (PIR) - An intelligence
requirement (q.v.) associated with a decision that will affect
the overall success of the command's mission. PIR are a subset
of intelligence requirements of a higher priority than
information requirements (q.v.). PIR are prioritized among
themselves and may change in priority over the course of the
operation's conduct.
Probable - Information or intelligence reported by two
independent sources is classified as probably true. The test for
independence is certainty that the information report of one
source was not derived from the other source,, usually resulting
in reliance on original reporting. Analytical judgment counts as
one source. Ensure that no more than one source is based solely
on analytical judgment.
R & S - see Reconnaissance, see also Surveillance.
REC - Radio Electronic Combat; a term sometimes used to denote
electronic warfare (q.v.) operations in non-NATO armed forces.
Glossary-11
FM 34-130
Reconnaissance - A mission under taken to obtain information by
visual observation, or other detection methods, about the
activities and resources of an enemy or potential enemy, or about
the meteorologic, hydrographic, or geographic characteristics of
a particular area. Reconnaissance differs from surveillance
(q.v.) primarily in duration of the mission.
Restricted - A classification indicating terrain that hinders
movement. Little effort is needed to enhance mobility through
restricted terrain but units may have difficulty maintaining
preferred speeds, moving in combat formations or transitioning
from one formation to another.
Retirement - A retrograde operation in which a force out of
contact moves away from the enemy.
Retrograde - An or'ganized movement to the rear or away from the
enemy. It may be forced by the enemy or may be made
voluntarily. Such movements may be classified as withdrawal-~ - i
(q.v.), retirement (q;v.) , or delaying operations (q.v.).
Sequel - Major operations that follow an initial major
operation. Plans for sequels are based on the possible
outcome-victory, stalemate, or defeat-of the current operation.
Severely Restricted - A classification indicating terrain that
severely hinders or slows movement in combat formations unless
some effort is made to enhance mobility. Severely restricted
terrain includes man-made obstacles~, such as minefields, cities,
etc., as well as natural barriers.
SIGINT - Signals Intelligence.
SIR - see Specific Information Requirement
m
SITMAP - Situation Map; a recording device used as an aid in
situation development and pattern analysis. See FM 34-3.
.s
Situation Template - Depictions of assumed threat dispositions, m
.,
Glossary-12
I
FM 34-130
well as the expected locations of high value targets. Situation
templates use time-phase lines (q.v.) to indicate movement of
forces and the expected flow of the operation. Usually, the
situation template depicts a critical point in the course of
action. Situation templates are one part of a threat course of
action model (q.v.). Models may contain more than one situation
template.
SOR - see Specific Order or Request
Sortie - One aircraft making one takeoff and one landing; an
operational flight by one aircraft. Hence, six sorties may be
one flight each by six different aircraft, or six flights by a
single aircraft. Threat air capabilitiesare often stated in
terms of the number of sorties per day by a particular type of
aircraft. They are based on an evaluation of the available
number of aircraft and aircrews (ideally more than one crew per
aircraft), and the threat's maintenance, logistics, and training
status.
Specific Information Requirement (SIR) - Specific information
requirements describe the information required to answer all or
part of an intelligence requirement. A complete SIR describes
the information required, the location where the required
information can be collected, and the time during which it can be
collected. Generally, each intelligence requirement (q.v.)
generates sets of SIR.
Specific Order or Request (SOR) - The order or request that
generates planning and execution of a collection mission or
analysis of data base information. SORs sent to subordinate
commands are orders. SORs sent to other commands are requests.
SORs often use system-specific message formats but also include
standard military operations and fragmentary orders.
Surveillance - The systematic observation of airspace or surface
areas by visual, aural, photographic, or other means.
Surveillance differs from reconnaissance (q.v.) primarily in
duration of the mission.
TAI - see Target Area of Interest.
Target Area of Interest (TAI) - The geographical area where high
value targets (q.v.) can be acquired and engaged by friendly
forces. Not all TAI will form part of the friendly course of
action; only TAI associated with high payoff targets (q.v.) are
of interest to the staff. These are identified during staff
planning and wargaming. TAIs differ from engagement areas (q.v.)
in degree. Engagement areas plan for the use of ,a11 available
weapons; TAIs might be engaged by a single weapon.
. Glossary-13
FM 34-130
TECHINT - Technical Intelligence.
Threat Course of Action Model - A model of one course of action
available to the threat. It consists of a graphic depiction
(situation template - q.v.); a description (narrative or matrix),
and a listing of assets important to the success of the course of
action (high value targets - q.v.). The degree of detail in the
model depends on available time. Ideally, threat course of
action models address all battlefield operating systems'. At a
minimum, threat course of action models address the five standard
elements of a course of action: what (the type of operation),
when (in this case, the earliest time the-action can begin),
where (boundaries, axis, etc.), how (the use of assets), and why
(the purpose or desired end-state). Threat course of action
models should also meet the tests of suitability, feasibility,
acceptability, uniqueness, and consistency with doctrine (see
chapter two). Threat courses of action are derived from
capabilities (q.v.).
Threat Model - A model of the threat force's doctrine and
tactics, techniques, and procedures for the conduct of a
particular operation. Threat models are based on a study of all
available information, structured by the order of battle (q.v.)
factors, of the particular threat force under consideration.
Ideally, threat models consider all battlefield operating systems
(q.v.) in detail. Threat models are normally prepared prior to
deployment.
Time Phase Line (TPL) - A line used to represent the movement of
forces or the flow of an operation over time. It usually
represents the location of forces at various increments of time,
such as lines that show unit locations at two hour intervals.
TPLs should account for the effects of the battlefield
environment and the anticipated effects of contact with other
forces. For example, TPLs depicting threat movement through an
area occupied by friendly forces should use movement rates based
on a force in contact with the enemy rather than convoy movement
speeds.
TPL - see Time Phase Line.
TR - Tank Regiment; name of a soviet-style maneuver unit normally
consisting of three tank battalions, one mechanized infantry
battalion, one artillery battalion, and enough combat support and
combat service support assets to make it capable of independent
action for at least limited periods of time.
Glossary-14
_' FM 34-130
Unrestricted - A classification indicating terrain that is free
of restrictions to movement.
USAF - United States Air Force.
UTM - Universal Transverse Mercator; the geographical coordinate
system used by Army and Marine ground forces. Named for the
Flemish cartographer Gerhardus Mercator (1512-1594).
Withdrawal - A retrograde operation in which a force in contact
with the enemy frees itself for a new mission.
Glossary-15
.
FM 34-130
References-2