WEG MediaWiki

Appendix B: TC 7-101 OPFOR Tactical Task List

This page is a section of TC 7-101 Exercise Design.

The OPFOR Tactical Task List is a listing of tactical tasks that are specific to the OPFOR. OPFOR tactical organizations and individuals perform these tasks instead of the comparable tasks in the Army Universal Task List (AUTL). OPFOR organizations and individuals perform tactical tasks in order to provide challenging conditions for the execution or attempted execution of mission essential tasks by training units.

The OPFOR Tactical Task List serves as the primary source for most tasks the OPFOR must perform. Exercise planners reference this list first when conducting countertask analysis. Only if the OPFOR Tactical Task List does not contain an appropriate task is one selected for the OPFOR from the AUTL.

The format of providing the OPFOR Tactical Task List will be to first define the tactical task and then list its subtasks (and in some cases, sub-subtasks). This will be followed by a table which shows the associated measures of performance for the overall task (or for major subtasks that have sub-subtasks). Each tactical task will numbered in order to provide a standard reference for easier identification.

Tactical Task 1.0 Assault

An assault is an attack that destroys an enemy force through firepower and the physical occupation and/or destruction of his position. An assault is the basic form of OPFOR tactical offensive combat. Assaults at any level of command and with any type forces have the same basic subtasks:

  • 1.1 Isolate
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Continue to provide early warning.
    • Prevent the enemy from gaining further information.
    • Prevent enemy maneuver.
  • 1.2 Suppress
    • Provide lethal and nonlethal suppression.
    • Suppress the enemy force to permit the assault element to move against the enemy position without receiving destructive fire.
  • 1.3 Assault
    • From the direction where least return fire is possible, the assault element employs surprise, limited visibility, complex terrain, and camouflage, concealment, cover, and deception (C3D) to attain the enemy position while remaining combat effective.
    • Maneuver to and seize the enemy position, destroying any forces there.
TACTICAL TASK 1.0 ASSAULT
No. Scale Measure
01 Yes/No Unit isolates enemy from assistance.
02 Time To suppress enemy.
03 Time To execute assault.
04 Yes/No Enemy position seized.
05 Percent Of friendly forces available to continue mission.
06 Percent Combat effectiveness of enemy forces.

Tactical Task 2.0 Raid

A raid is an attack against a stationary target for the purposes of its capture or destruction that culminates in the withdrawal of the raiding detachment to safe territory. Raids can also be used to secure information and to confuse or deceive the enemy. The keys to the successful accomplishment of any are raid surprise, firepower, and violence. The raid ends with a planned withdrawal upon completion of the assigned mission. The subtasks for a raid are—

  • 2.1 Infiltrate
    • Conduct undetected movement through and/or into an area occupied by enemy forces to occupy a position of advantage.
  • 2.2 Isolate
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Continue to provide early warning.
    • Prevent the enemy from gaining further information.
    • Prevent enemy maneuver.
  • 2.3 Seize or Destroy
    • Attack to destroy or seize personnel or equipment.
  • 2.4 Exfiltrate
    • Conduct undetected movement from areas under enemy control by stealth, deception, surprise, or clandestine means.
TACTICAL TASK 2.0 RAID
No. Scale Measure
01 Yes/No Unit infiltrates without detection.
02 Yes/No Unit isolates enemy from assistance.
03 Time To seize or destroy raid target.
04 Time To extract/exfiltrate.
05 Percent Of friendly forces available to continue mission.

Tactical Task 3.0 Ambush (Annihilation)

An ambush is a surprise attack from a concealed position, used against moving or temporarily halted targets. The purpose of an annihilation ambush is to destroy the enemy force. These are violent attacks designed to ensure the enemy’s return fire, if any, is ineffective. Generally, this type of ambush uses the terrain to the attacker’s advantage and employs mines and other obstacles to halt the enemy in the kill zone. The goal of the obstacles is to keep the enemy in the kill zone throughout the action. The subtasks for an annihilation ambush are—

  • 3.1 Occupy Ambush Site
  • 3.2 Isolate Kill Zone
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Continue to provide early warning.
    • Prevent the enemy from gaining further information.
    • Prevent enemy maneuver.
  • 3.3 Contain Enemy
    • Stop, hold, or surround enemy forces and prevent them from withdrawing any element for use elsewhere.
  • 3.4 Destroy
    • Render the enemy combat ineffective and/or damage selected element(s) of his combat system to the point of uselessness.
  • 3.5 Exfiltrate
    • Conduct undetected movement from areas under enemy control by stealth, deception, surprise, or clandestine means.
TACTICAL TASK 3.0 AMBUSH (ANNIHILATION)
No. Scale Measure
01 Yes/No Unit moves to and occupies ambush site without detection.
02 Yes/No Unit isolates kill zone from assistance.
03 Time To execute ambush.
04 Yes/No Enemy in kill zone during projected time window.
05 Yes/No Enemy contained in kill zone.
06 Percent Friendly forces available to continue mission.
07 Percent Combat effectiveness of enemy force.

Tactical Task 4.0 Reconnaissance Attack

A reconnaissance attack is a tactical offensive action that locates moving, dispersed, or concealed enemy elements and either fixes or destroys them. It may also be used to gain information. The reconnaissance attack may involve multiple security and assault elements. The subtasks for a reconnaissance attack are—

  • 4.1 Find
    • Employ reconnaissance element(s) to locate target systems or units.
  • 4.2 Isolate
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Continue to provide early warning.
    • Prevent enemy maneuver.
    • Prevent the enemy from gaining further information.
  • 4.3 Fix
    • Prevent the enemy from moving any part of his force from a specific location for a specific period of time.
    • The security element(s) making contact fix the enemy. (Security elements become fixing elements.)
    • Security element(s) continue to provide early warning of approaching enemy forces and prevent them from gaining further information on the rest of the OPFOR force.
  • 4.4 Destroy
    • Render the enemy combat ineffective and/or damage selected element(s) of his combat system to the point of uselessness.
TACTICAL TASK 4.0 RECONNAISSANCE ATTACK
No. Scale Measure
01 Percent Of enemy elements requiring destruction found.
02 Yes/No Enemy elements isolated from outside assistance.
03 Time To find and destroy enemy elements.
04 Percent Of friendly forces available to continue mission.
05 Percent Combat effectiveness of enemy force.

Tactical Task 5.0 Reconnaissance

Reconnaissance represents all measures associated with organizing, collecting, and studying information on the enemy, terrain, and weather in the area of upcoming battles. The subtasks for a reconnaissance are—

  • 5.1 Fix Enemy Security Forces
    • Prevent the enemy from moving any part of his security force from a specific location for a specific period of time.
    • The security element(s) making contact fix the enemy. (Security elements become fixing elements.)
    • Security element(s) continue to provide early warning of approaching enemy forces and prevent them from gaining further information on the rest of the OPFOR force.
  • 5.2 Find
    • Employ reconnaissance element(s) to locate selected reconnaissance targets.
  • 5.3 Contact
    • Gain sensor contact between reconnaissance element(s) and their designated reconnaissance target(s).
  • 5.4 Report
    • Provide accurate information on reconnaissance targets in a timely manner.
TACTICAL TASK 5.0 RECONNAISSANCE
No. Scale Measure
01 Percent Of reconnaissance targets found.
02 Percent Of reconnaissance elements able to contact tar­ gets.
03 Time To find and report on all reconnaissance targets.
04 Percent Of friendly forces available to continue mission.

Tactical Task 6.0 Counterreconnaissance

Counterreconnaissance (CR) is a continuous combined arms action to locate, track and destroy all enemy reconnaissance operating in a given AOR. CR is conducted at all times and during all types of operations. The subtasks for CR are—

  • 6.1 Predict
    • Determine likely types and locations of critical enemy reconnaissance elements.
  • 6.2 Find
    • Employ reconnaissance elements to locate enemy reconnaissance elements.
  • 6.3 Report
    • Provide accurate information on reconnaissance targets in a timely manner.
  • 6.4 Neutralize
    • Destroy, deceive, or obscure enemy reconnaissance elements.
TACTICAL TASK 6.0 COUNTERRECONNAISSANCE
No. Scale Measure
01 Percent Of enemy reconnaissance elements found.
02 Percent Of enemy reconnaissance elements unable to con­ tact targets.
03 Time To find and report on all critical enemy reconnais­ sance elements.

Tactical Task 7.0 Defend From Simple Battle Position

A simple battle position (SBP) is a defensive location oriented on the most likely enemy avenue of approach or objective area. SBPs are not necessarily tied to restrictive terrain but will employ as much engineer effort as possible to restrict enemy maneuver. Defenders of SBPs will take all actions necessary to prevent enemy penetration of their position, or defeat a penetration once it has occurred. Unlike a complex battle position, which is typically independent, an SBP may form a larger integrated defense with other SBPs. The subtasks for defense from a SBP are—

  • 7.1 Control
    • Orient on enemy avenue of approach.
  • 7.2 Gain Advantage
    • Employ terrain, survivability, and C3D to provide an advantage over attackers.
TACTICAL TASK 7.0 DEFEND FROM SIMPLE BATTLE POSITION
No. Scale Measure
01A Yes/No Attacking enemy force destroyed/position retained.
01B Yes/No Position retained for time specified by commander.
02 Percent Of friendly forces available to continue mission.
03 Percent Combat effectiveness of enemy force.

Tactical Task 8.0 Defend From Complex Battle Position

Complex battle positions (CBPs) are designed to protect the units within them from detection and attack while denying their seizure and occupation by the enemy. They are not necessarily tied to an avenue of approach. CBPs protect forces while providing sanctuary from which to launch local attacks. The subtasks for defense from a CBP are—

  • 8.1 Protect
    • Employ complex terrain, survivability, and C3D to protect the defending force from destruction.
  • 8.2 Degrade
    • Retain ability to conduct systems warfare actions from protected positions.
TACTICAL TASK 8.0 DEFEND FROM COMPLEX BATTLE POSITION
No. Scale Measure
01 Yes/No Position retained for time specified by commander.
02 Percent Of friendly forces available to continue mission.
03 Yes/No Able to conduct specified systems warfare missions.

Tactical Task 9.0 Actions On Contact

Actions on contact are designed to ensure OPFOR units retain the initiative and fight under circumstances of their choosing. Actions on contact are also designed to provide the commander with the flexibility to either continue with the planned course of action or rapidly adopt a new course of action more suited to changed conditions. The subtasks for actions on contact are—

  • 9.1 Fix
    • Prevent the enemy from moving any part of his force from a specific location for a specific period of time.
    • Security element(s) making contact fix the enemy.
    • Security element(s) continue to provide early warning of approaching enemy forces and prevent them from gaining further information on the rest of the OPFOR force.

Note. Security element(s) performing a fixing function are then known as fixing element(s). Fixing elements often make use of terrain chokepoints, obstacles, ambushes and other techniques to fix a larger force. When an element that is not a security element makes contact with the enemy, the commander will designate that element as a fixing element.

  • 9.2 Assess and Report
    • Commander makes an assessment of the tactical situation and determines whether or not making contact in this manner and with this enemy constitutes a change in his course of action.
    • Commander reports to the chain of command the form of contact he has made, to include critical details of its composition and his assessment.
  • 9.3 Isolate
    • Maneuver and deploys security element(s) to ensure additional enemy forces do not join the battle unexpectedly.
  • 9.4 Maintain Freedom to Maneuver
    • Make contact with the minimum force necessary to fix the enemy.
    • Make use of C3D and the break contact battle drill to prevent the OPFOR force from becoming decisively engaged.
    • Determine safe maneuver avenues to employ.
    • Freedom to maneuver is also maintained by dominating avenues of approach into the battle zone and determining the location of enemy flanks or exposed areas of weakness.
  • 9.5 Execute Course of Action
    • Contacting unit either continues with its original course of action if deemed appropriate or executes a new one that suits the situation.
    • New course of action given to the unit based on the assessment it provides to its higher command or one chosen by the commander in absence of time or guidance.
    • Unit making contact ensures follow-on units are aware of the contact and deconflict positioning, typically through the use of a standard marking system.
TACTICAL TASK 9.0 ACTIONS ON CONTACT
No. Scale Measure
01 Yes/No Unit fixes enemy.
02 Yes/No Unit leader assesses situation without main body being in contact with the enemy.
03 Time To report.
04 Yes/No Unit isolates enemy from assistance.
05 Time To choose course of action (COA).
06 Time To execute selected COA.
07 Time To recommend a COA to the higher commander.
08 Time To return to previous mission.
09 Percent Of friendly forces available to continue previous mission.
10 Percent Combat effectiveness of enemy force that made contact.
11 Percent Correctness of initial assessment of enemy.

Tactical Task 10.0 Situational Breach

A situational breach is the reduction of and passage through an obstacle encountered in the due course of executing another tactical task. The unit conducting a situational breach may have expected an obstacle or not, but in either case conducts a situational breach with the resources at hand and does not wait for specialized equipment and other support. The subtasks for situational breach are—

  • 10.1 Isolate
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Continue to provide early warning.
    • Prevent enemy from gaining further information.
    • Prevent enemy maneuver.
  • 10.2 Secure
    • Unit takes action to ensure enemy defending the obstacle are neutralized.
  • 10.3 Penetrate
    • Clearing element neutralizes the obstacle such that the action element and/or a follow-on force can complete its mission.
  • 10.4 Execute Course of Action
    • Breaching unit continues with its original course of action if deemed appropriate or executes a new one that suits the situation.
    • New course of action given to the unit based on the assessment it provides to its higher command or one chosen by the commander in absence of time or guidance.
    • Breaching unit ensures follow-on units are aware of the obstacle facilitates movement, typically through the use of a standard marking system.
TACTICAL TASK 10.0 SITUATIONAL BREACH
No. Scale Measure
01 Yes/No Unit isolates breach site from contact.
02 Time To secure breach site.
03 Time To penetrate obstacle.
04 Time To return to previous mission.
05 Percent Of friendly forces available to continue previous mission.

Tactical Task 11.0 Breaking Contact

The primary consideration in breaking contact is to remove the enemy’s ability to place destructive or suppressive fires on the greater portion of the OPFOR force. This is accomplished by fixing the enemy, regaining freedom to maneuver and employing fires, counter-mobility and camouflage, concealment, cover, and deception (C3D). The subtasks for break contact are—

  • 11.1 Protect
    • Take immediate steps to protect the unit from this form of contact.
    • Direct fire: fix, C3D, terrain use.
    • Sensor collection: C3D, terrain use, alternate assembly areas/positions.
    • Emplaced obstacles and chemical, biological, radiological, and nuclear (CBRN): alternate assembly areas/positions.
    • Air, indirect fires, and electronic warfare: C3D, terrain use, alternate assembly areas/positions.
  • 11.2 Retain Freedom to Maneuver
    • Commander reduces his elements in contact to only security element(s).
    • Commander selects one or more routes from his current location that enable his detachment to remain out of contact while permitting him to maneuver in support of his mission.
  • 11.3 Assess and Report
    • Commander reports to the chain of command the form of contact he has made and critical details of its composition and his assessment.
  • 11.4 Continue or Change in Course of Action
    • Commander makes an assessment of the tactical situation to determine whether or not making contact in this manner and with this enemy constitutes a change in the course of action (COA).
TACTICAL TASK 11.0 BREAK CONTACT
No. Scale Measure
01 Time To implement appropriate protective measures.
02 Yes/No Unit leader assesses situation without main body being in contact.
03 Time To report.
04 Time To retain/choose COA.
05 Percent Of friendly forces available to continue.
06 Percent Correctness of initial assessment of contact.

Tactical Task 12.0 Fixing

Fixing is a tactical task intended to prevent the enemy from moving any part of his force from a specific location for a period of time. The ability to fix the enemy at crucial points is the fundamental way units maintain the freedom to maneuver and retain the initiative. An enemy becomes fixed in one of three basic ways: he cannot physically move, he does not want to move, or he does not think he can move. Suppressive fires, information warfare (INFOWAR) and countermobility are the primary methods by which an enemy is fixed in this way. The subtasks for fixing are—

  • 12.1 Prevent Enemy Movement
    • Physically prevent enemy from moving.
    • Make the enemy believe he cannot move.
    • Make the enemy believe he does not want to move.
  • 12.2 Execute Fixing Method or Action
    • Suppressive fires.
    • INFOWAR.
    • Countermobility.
TACTICAL TASK 12.0 FIXING
No. Scale Measure
01 Yes/No Enemy was fixed.
02 Time To select fixing action/method.
03 Time To execute fixing action/method.
04 Percent Of friendly force able to continue mission.

Tactical Task 13.0 Tactical Movement

Tactical movement is the method by which OPFOR units move on the battlefield. It is employed in any situation where enemy contact is possible. It is most often used in offensive operations, to move from attack position to the point of attack. The subtasks for tactical movement are—

  • 13.1 Organize
    • Fighting patrols.
    • Security elements.
    • Security detachment.
    • Main body.
    • Routes, axes, attack zones, firing lines.
  • 13.2 Maintain Freedom to Maneuver
    • Make contact with the minimum force necessary to fix the enemy.
    • Make use of C3D and the break contact battle drill to prevent the moving force from becoming decisively engaged.
    • Security element(s) determine safe maneuver avenues to employ.
TACTICAL TASK 13.0 TACTICAL MOVEMENT
No. Scale Measure
01 Yes/No Fighting patrol/security element fixes enemy.
02 Yes/No Unit leader assesses situation without main body being in contact with the enemy.
03 Time To report.
04 Time To choose and move to alternate route(s).
05 Time To return to previous mission.
06 Percent Of friendly forces available to continue previous mission.
07 Percent Combat effectiveness of enemy force that made contact.

Tactical Task 14.0 Disruption

Disrupt is a tactical task intended to upset an enemy’s formation or tempo, interrupt the enemy’s timetable, cause the enemy to commit his forces prematurely, and/or cause him to attack in piecemeal fashion. The purpose of a disruption force is to significantly degrade the enemy’s combat capability and to prevent the enemy from conducting an effective operation. The primary task of the disruption force is to initiate the attack against the enemy’s combat system. The subtasks for disruption are—

  • 14.1 Destroy or Deceive Enemy Reconnaissance
  • 14.2 Gain and Maintain Reconnaissance Contact with Key Enemy Elements
  • 14.3 Contain the Enemy
    • Stop, hold, or surround enemy forces.
    • Prevent the enemy from withdrawing any element for use elsewhere.
  • 14.4 Destroy the Enemy
    • Render the enemy combat ineffective and/or damage elements of the enemy’s combat system to the point of uselessness.
  • 14.5 Exfiltrate
    • Conduct undetected movement from areas under enemy control by stealth, deception, surprise, or clandestine means.
TACTICAL TASK 14.0 DISRUPTION
No. Scale Measure
01 Yes/No Enemy reconnaissance able to locate friendly high- value targets (HVTs) destroyed or deceived.
02 Percent Enemy HVTs identified, tracked, destroyed.
03 Time Enemy delayed.
04 Yes/No Enemy forced to deploy to friendly time schedule.
05 Yes/No Enemy main body contained.
06 Percent Of friendly forces available to continue mission.
07 Percent Combat effectiveness of enemy force.

Tactical Task 15.0 Integrated Attack

Integrated attack is an offensive action where the OPFOR seeks military decision by destroying the enemy’s will and/or ability to continue fighting through the application of combined arms effects. Integrated attack is often employed when the OPFOR enjoys overmatch with respect to its opponent and is able to bring all elements of offensive combat power to bear. It may also be employed against a more sophisticated and capable opponent, if the appropriate window of opportunity is created or available. The subtasks for integrated attack are—

  • 15.1 Planning
    • Determine decisive points.
    • Backwards plan from destruction of critical enemy combat service support and command and control (C2) organizations back to the current time.
      • Destruction of objective.
      • Maneuver of exploitation force to objective.
      • Use of assault force to enable exploitation force.
      • Fixing force isolates decisive points.
      • Disruption force executes disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
  • 15.2 Preparation
    • Create task organization and C2 of disruption force, fixing force, assault force, exploitation force, reserves, and deception force.
    • Execute deception and disruption.
  • 15.3 Rehearsal
  • 15.4 Execution
    • Disruption force executes disruption of enemy; focuses on preventing detection of exploitation force.
    • Fixing force(s) maneuver and fire to ensure the decisive point is isolated.
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing forces.)
    • Assault force conducts action to set conditions for exploitation force success.
    • Exploitation force destroys target enemy or seizes objective.
TACTICAL TASK 15.0 INTEGRATED ATTACK
No. Scale Measure
01 Yes/No Mission accomplished.
02 Yes/No Assault forces created correct conditions for exploi­ tation forces’ success.
03 Time To complete mission.
04 Yes/No Fixing forces isolated decisive points.
05 Yes/No Disruption forces accomplished mission.
06 Percent Of friendly forces available to continue previous mission.
07 Percent Combat effectiveness of enemy force.
08 Percent Correctness of initial assessment of enemy.

Tactical Task 16.0 Dispersed Attack

Dispersed attack is the primary manner in which the OPFOR conducts offensive action when threatened by a superior enemy and/or when unable to mass or provide integrated C2 to an attack. This is not to say that the dispersed attack cannot or should not be used against peer forces, but as a rule integrated attack will more completely attain objectives in such situations. Dispersed attack relies on INFOWAR and dispersion of forces to permit the OPFOR to conduct tactical offensive actions while overmatched by precision standoff weapons and imagery and signals sensors. The dispersed attack is continuous and comes from multiple directions. It employs multiple means working together in a very interdependent way. The attack can be dispersed in time as well as space. The subtasks for dispersed attack are—

  • 16.1 Planning
    • Determine decisive points.
    • Determine need for window of opportunity and/or multiple exploitation forces.
    • Backwards plan from destruction of key elements of the enemy’s combat system back to the current time.
      • Destruction of objective(s).
      • Maneuver of exploitation forces to objective(s).
      • Use of assault force(s) to enable exploitation force.
      • Fixing force(s) isolate decisive points.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
  • 16.2 Preparation
    • Create task organization and C2 of disruption force(s), fixing force(s), assault force(s), exploitation force(s), reserves, and deception force.
    • Execute deception and disruption.
  • 16.3 Rehearsal
  • 16.4 Execution
    • Disruption force(s) execute disruption of enemy.
    • Focus on preventing detection of exploitation forces.
    • Fixing forces maneuver and fire to ensure the decisive point is isolated.
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
    • Assault force(s) conduct action to set conditions for exploitation forces’ success.
    • Exploitation force(s) destroys target enemy or seize objectives.
TACTICAL TASK 16.0 DISPERSED ATTACK
No. Scale Measure
01 Yes/No Mission accomplished.
02 Yes/No Assault forces created correct conditions for exploi­ tation forces’ success.
03 Time To complete mission.
04 Yes/No Fixing forces isolated decisive points.
05 Yes/No Disruption forces accomplished their mission.
06 Percent Of friendly forces available to continue previous mission.
07 Percent Combat effectiveness of enemy force.
08 Percent Correctness of initial assessment of enemy.

Tactical Task 17.0 Fire And Maneuver

Fire and maneuver is the way in which OPFOR small units move while in contact with the enemy. When required to move while in contact with the enemy, the OPFOR commander selects a part of his force to be the support (or firing) element and part to be the action (or moving) element. The support element then directs suppressing fire against any enemy that has the ability to influence the movement of the action element. The action element then moves either to a firing line or to the objective. Once it reaches its new position, it becomes the new support element, and the former support element becomes the new moving element.


Note. The critical aspect of executing fire and maneuver is the commander’s selection of the right amount of combat power and resources to assign to each of the elements of his force. If the support element does not have the ability to significantly reduce the effectiveness of the enemy, the action element will be destroyed. If the action element does not have the combat power to take the objective or assume its new role as support element, the mission will fail.

The subtasks for fire and maneuver are—

  • 17.1 Make Contact
  • 17.2 Fix
    • Prevent the enemy from moving any part of his force from a specific location for a specific period of time.
    • Commander selects a part of his force to be the support (or firing) element and part to be the action (or moving) element.
    • Support element directs suppressing fire against any enemy that has the ability to influence the movement of the action element.
    • Security element(s) continue to provide early warning of approaching enemy forces and prevents them from gaining further information on the rest of the OPFOR force.

Note. A support element that prevents other parts of the enemy force from influencing the movement of the action force is then known as a fixing element. Fixing elements often make use of terrain chokepoints, obstacles, ambushes and other techniques to fix a larger force. When contact is made with an element that is not a support element, the commander will designate that element as a fixing element.

  • 17.3 Isolate
    • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
  • 17.4 Maneuver
    • Action element maneuvers to new position of advantage with respect to the enemy.
    • On order, action element assumes role as new support element or assaults the enemy.
    • If further maneuver is required, continue alternation of fixing the enemy and maneuvering against enemy.
TACTICAL TASK 17.0 FIRE AND MANEUVER
No. Scale Measure
01 Yes/No Unit fixes enemy.
02 Yes/No Unit leader correctly structures his force quickly into support and action elements.
03 Yes/No Support element suppresses enemy.
04 Yes/No Security element isolates enemy from assistance.
05 Yes/No Action element maneuvers to position of advan­ tage.
06 Time To make each maneuver.
07 Time To assault and destroy enemy.
08 Percent Of friendly forces available to continue previous mission.
09 Percent Combat effectiveness of enemy force that made contact.
10 Percent Correctness of initial assessment of enemy.

Tactical Task 18.0 All-arms Air Defense

All-arms air defense is the simultaneous employment of several arms, in some cases including air defense systems, to achieve an effect against the enemy air threat that will render greater results than the use of air defense assets and systems alone. Thus, all OPFOR units possess some type of an organic air defense capability to differing degrees, depending on the type and size of the unit. The extent to which this capability can be applied is limited only by the commander and staff’s knowledge of the enemy air threat, capabilities of their own systems, and their ability to apply that knowledge to come up with innovative solutions. The subtasks for all-arms air defense are—

  • 18.1 Planning
    • Locate or predict enemy airfields; forward arming and refueling points (FARPs); flight routes; drop, landing, and pickup zones (DZ/LZ/PZ); and helicopter firing positions.
    • Determine need for window of opportunity.
    • Backwards plan from destruction of aircraft back to the current time.
      • Destruction of aircraft.
      • Detection of aircraft.
      • Maneuver to firing position and/or placement of obstacles.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) executes disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Look for new and adaptive ways of employing existing capabilities (not only air defense systems but also systems not traditionally associated with air defense) to damage and/or destroy enemy aircraft when within range.
    • Identify complex terrain in the vicinity of identified targets and potential cache sites.
    • Identify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) that can perform air defense functions.
    • Determine potential means and routes of infiltration and potential sources of supply.
    • Determine the decisive point for aircraft destruction.
      • On the ground (using indirect fire, WMD, direct action, or precision munitions).
      • In flight, but before entering the airspace over OPFOR ground maneuver forces (using air defense weapons, directed energy weapons, or direct fire).
      • In the airspace above OPFOR battle positions (using air defense weapons, other ground force weapons, obstacles, or anti-helicopter mines).
  • 18.2 Preparation
    • All units incorporate the use of their weapons to engage tactical aircraft into their tactics, techniques, and procedures.
    • All units routinely train in techniques for engaging enemy aircraft.
    • All units execute deception and disruption.
  • 18.3 Rehearsal
  • 18.4 Execution
    • All units post air observers.
    • Detect and report the presence of enemy aircraft (on the ground or in the air).
    • Destroy enemy aircraft.
    • Prevent aerial observation.
    • Force the aircraft to expend their munitions before reaching the optimum or effective range.
    • Divert enemy aircraft before reaching their targets.
    • Force the enemy to break off and/or discontinue the air attack.
    • Mitigate the effectiveness of the enemy air attack.
TACTICAL TASK 18.0 ALL-ARMS AIR DEFENSE
No. Scale Measure
01 Yes/No Prevented enemy aircraft from interfering with OPFOR missions.
02 Yes/No Defended the unit from aerial observation and air attack.
03 Percent Destroyed enemy aircraft.
04 Yes/No Forced enemy aircraft to expend their munitions before reaching the optimum or effective range.
05 Yes/No Diverted enemy aircraft before reaching their tar­ gets.
06 Yes/No Forced the enemy to break off and/or discontinue the air attack.
07 Percent Mitigated the effectiveness of the enemy air attack.
08 Percent Combat effectiveness of enemy aircraft.

Tactical Task 19.0 Antilanding Actions

Antilanding actions are those methods used to prevent landings by airborne or heliborne troops or to destroy enemy landing forces on the ground as soon after landing as possible. Antilanding actions can and will be executed by any force with the capability to affect the aircraft or the landing forces. However, this is a combined arms action that primarily falls to the antilanding reserve (ALR) for execution. The subtasks for antilanding actions are—

  • 19.1 Planning
    • Locate and predict drop and landing zones (DZs or LZs).
    • Determine need for window of opportunity.
    • Backwards plan from destruction of landing forces back to the current time.
      • Destruction of landing forces.
      • Detection of landing forces.
      • Maneuver to firing position and/or placement of obstacles.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Identify complex terrain in the vicinity of identified targets and potential cache sites.
    • Identify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups and criminal organizations) that can perform or support antilanding functions.
    • Determine potential means and routes of infiltration and potential sources of supply.
    • Determine the decisive point for destruction of landing forces.
      • On the ground, before air transport (using indirect fire, WMD, direct action, or precision munitions).
      • En route to or in the vicinity of LZs or DZs (using air defense weapons, directed energy weapons, direct fire, obstacles, or anti-helicopter mines).
      • In an LZ or DZ (using indirect fire, WMD, direct fire, direct action, precision munitions, or infantry with antitank weapons).

Note. The OPFOR prefers to prevent landings by airborne or heliborne troops through the destruction of the troop transport aircraft in flight. Failing that, it will take significant actions to destroy landing forces on the ground as soon after landing as possible. Antilanding forces are given their own attack zone to control their actions against landing forces. Such an attack zone may only be activated for the duration of an antilanding action or may be assigned to the ALR permanently. Kill zones are used to control both ground and air defense engagements.

  • 19.2 Preparation
    • Create one or more ALRs.
    • Create task organization and C2 of action element(s), support element(s), security element(s), and deception force.
    • Assign attack zone(s) and kill zone(s).
  • 19.3 Rehearsal
    • The ALR rehearses actions in the vicinity of the LZs or DZs as well as movement between assembly areas, hide positions, and attack positions, and between LZs or DZs.
  • 19.4 Execution
    • Transmit early warning from the main command post to the ALR.
    • ALR moves to positions in the attack zone from which it can engage transport aircraft and destroy landing forces on the ground.
      • Disruption force(s) execute disruption of the enemy; focus on preventing detection of action element(s).
      • Security element(s) maneuver and fire to ensure the decisive point is isolated to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
      • Support element(s) conduct action to set conditions for action elements’ success.
      • Action element(s) destroy targeted enemy.
TACTICAL TASK 19.0 ANTILANDING ACTIONS
No. Scale Measure
01 Yes/No Mission accomplished.
02 Yes/No Support element(s) created correct conditions for action elements’ success.
03 Time To complete mission.
04 Yes/No Security element(s) isolated decisive points.
05 Yes/No Disruption force(s) accomplished their mission.
06 Percent Of friendly forces available to continue previous mission.
07 Percent Combat effectiveness of enemy force.
08 Percent Correctness of initial assessment of enemy.

Tactical Task 20.0 Sophisticated Ambush

A sophisticated ambush is the linking in time and task of RISTA, attacking forces, and window of opportunity to destroy key enemy systems or cause politically unacceptable casualties. What makes a sophisticated ambush “sophisticated” is not the actual attack means. In fact, the actual ambush is executed by tactical-level forces. What makes it “sophisticated” is the linking of sensor, ambusher, window of opportunity, and a target that affects an enemy center of gravity. This may require sophisticated ambushes to be planned, coordinated, and resourced at the operational level. (See chapter 3, FM 7-100.1.) The subtasks and sub-subtasks for the sophisticated ambush are—

  • 20.1 Planning
    • Choose the target enemy force or system. (In a system’s warfare approach, this force or system is typically chosen for its role in the enemy’s combat system.)
    • Locate and predict target locations.
    • Determine need for window of opportunity.
    • Backwards plan from destruction of target back to the current time.
      • Destruction of target.
      • Tracking of target.
      • Maneuver to firing position and/or placement of obstacles.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Identify complex terrain in the vicinity of identified targets and potential cache sites.
    • Identify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, as well as individual sympathizers, terrorist groups, and criminal organizations) that can participate or assist in the sophisticated ambush.
    • Identify potential means and routes of infiltration and potential sources of supply.
    • Determine the decisive point.
    • Establish attack zone and kill zone(s).

Note. Sophisticated ambushes can be executed by any force with the capability to destroy the target. Forces or elements conducting sophisticated ambushes are given their own attack zone to control their actions. Such an attack zone is only activated for the duration of the action. Kill zones are used to control both ground and air engagements.

  • 20.2 Preparation
    • Create task organization and C2 of action element(s), support element(s), security element(s), disruption force(s), and deception force.
    • Execute deception and disruption.
  • 20.3 Rehearsal
    • Ambushing detachment rehearses actions in the vicinity of the kill zone as well as movement between assembly areas, hide positions, and attack positions.
  • 20.4 Execution
    • Occupy the Ambush Site 20.4.1
    • Isolate the Kill Zone 20.4.1
      • Maneuver and deploy security element(s) to ensure additional enemy forces do not join the battle unexpectedly. (Security elements may become fixing elements.)
      • Security element(s) continue to provide early warning.
      • Prevent the enemy from gaining further information.
      • Prevent enemy maneuver.
    • Contain the Enemy 20.4.2
      • Stop, hold, or surround enemy forces.
      • Prevent the enemy from withdrawing any element for use elsewhere.
    • Destroy the Enemy 20.4.3
      • Render the enemy combat ineffective and/or damage selected element(s) of his combat system to the point of uselessness.
    • Exfiltrate 20.4.4
      • Conduct undetected movement from areas under enemy control by stealth, deception, surprise, or clandestine means.
TACTICAL TASK 20.0 SOPHISTICATED AMBUSH
No. Scale Measure
01 Yes/No Unit moves to and occupies ambush site without detection.
02 Yes/No Unit isolates kill zone from assistance.
03 Time To execute ambush.
04 Yes/No Enemy in kill zone during projected time window.
05 Yes/No Enemy contained in kill zone.
06 Percent Of friendly forces available to continue previous mission.
07 Percent Combat effectiveness of enemy force.

Tactical Task 21.0 Maneuver Defense

A maneuver defense is a type of defensive action designed to achieve tactical decision by skillfully using fires and maneuver to destroy key elements of the enemy’s combat system and deny enemy forces their objective, while preserving the friendly force. Within the enemy’s combat system, the OPFOR would often target the enemy’s C2 or logistics forces rather than his less vulnerable combat and combat support forces. Maneuver defenses cause the enemy to continually lose effectiveness until he can no longer achieve his objectives. They can also economize force in less important areas while the OPFOR moves additional forces onto the most threatened axes. The subtasks for maneuver defense are—

  • 21.1 Planning
    • Plan a succession of defensive lines throughout the area of responsibility (AOR).
    • Plan successive battle positions and repositioning routes throughout the AOR.
    • Identify high-value targets and kill zones.
    • Identify complex terrain in the vicinity of identified targets.
    • Determine decisive points.
    • Backwards plan from destruction of key element(s) of the enemy’s combat system back to the current time.
      • Destruction of objective(s).
      • Repositioning of forces to expose objective to attack.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
  • 21.2 Preparation
    • Create task organization and C2 of disruption force, main defense force (contact force and shielding force), reserves, deception force(s), and counterattack force(s.)
    • Execute deception and disruption.
  • 21.3 Rehearsal
  • 21.4 Execution
    • Disruption force executes disruption of enemy; focus on preventing interference with repositioning forces and detection and attack of high-value targets.
    • Contact and shielding forces maneuver and fire to ensure the decisive point is isolated.
    • Counterattack forces destroy key element(s) of the enemy’s combat system or seize objective.
TACTICAL TASK 21.0 MANEUVER DEFENSE
No. Scale Measure
01 Yes/No Mission accomplished.
02 Yes/No Disruption force(s) created correct conditions for main defense force (contact and shielding forces) success.
03 Time To complete mission.
04 Yes/No Contact and shielding forces isolated decisive points.
05 Percent Of friendly forces available to continue previous mission.
06 Percent Combat effectiveness of enemy force.
07 Percent Correctness of initial assessment of enemy.

Tactical Task 22.0 Area Defense

Area defense is a type of defensive action designed to achieve a decision by either—

  • Forcing the enemy’s offensive operations to culminate before he can achieve his objectives or
  • Denying the enemy his objectives while preserving combat power until decision can be achieved through strategic operations or operational mission accomplishment.

The area defense does not surrender the initiative to the attacking forces, but takes action to create windows of opportunity that permit forces to attack key elements of the enemy’s combat system and cause unacceptable casualties. The subtasks for area defense are—

  • 22.1 Planning
    • Establish locations for complex battle positions within the battle zone.
    • Determine key terrain throughout the battle zone.
    • Develop a counterreconnaissance plan.
    • Locate and predict target locations.
    • Develop an integrated fires plan.
    • Determine decisive points.
    • Establish kill zone(s).
    • Backwards plan from destruction of key elements of the enemy’s combat system back to the current time.
      • Enemy attack culminates before he can achieve his objective or before the protected force is destroyed.
      • Reconnaissance fires and disruption conduct systems warfare on the enemy.
      • Disruption force executes disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
  • 22.2 Preparation
    • Create task organization and C2 of disruption force(s), main defense force, reserves, deception force(s), and counterattack force(s).
    • Designate the protected force (if any).
    • Execute deception and disruption.
  • 22.3 Rehearsal
  • 22.4 Execution
    • Disruption force executes disruption of enemy; focus on preventing interference with repositioning forces and detection/attack of high-value targets.
    • Main defense forces conduct reconnaissance fires and disruption to ensure the enemy culminates his attack before the protected force is destroyed.
    • Counterattack forces destroy key element(s) of the enemy’s combat system (often targeting C2 or logistics) or seize objective.
TACTICAL TASK 22.0 AREA DEFENSE
No. Scale Measure
01 Yes/No Mission accomplished.
02 Yes/No Disruption force created correct conditions for main defense force success.
03 Time To complete mission.
04 Yes/No Protected force is combat effective.
05 Percent Of friendly forces available to continue previous mission.
06 Percent Combat effectiveness of enemy force.
07 Percent Correctness of initial assessment of enemy.

Tactical Task 23.0 Information Warfare

Information warfare (INFOWAR) is defined as specifically planned and integrated actions taken to achieve an information advantage at critical points and times. The goal is to influence an enemy’s decisionmaking through his collected and available information, information systems, and information-based processes, while retaining the ability to employ friendly information, information-based processes, and systems. The seven elements or subtasks for INFOWAR are—

  • Deception.
  • Electronic warfare.
  • Perception management.
  • Computer warfare.
  • Information attack.
  • Protection and security measures.
  • Physical destruction.

Tactical Subtask 23.1 Deception

Deception includes measures designed to mislead the enemy by manipulation, distortion, or falsification of information. The OPFOR integrates these deception measures into every tactical action; it does not plan deception measures and activities in an ad hoc manner. A deception plan is always a major portion of the overall INFOWAR plan. The OPFOR formulates its plan of action, overall INFOWAR plan, and deception plan concurrently. It attempts to deceive the enemy concerning the exact strength and composition of its forces, their deployment and orientation, and their intended manner of employment. When successfully conducted, deception activities ensure that the OPFOR achieves tactical surprise, while enhancing force survivability. All deception measures and activities are continuously coordinated with deception plans and operations at higher levels. The sub-subtasks for deception are—

  • 23.1.1 Planning
    • Choose the target enemy force or system. This force or system is typically chosen for its role in the enemy’s combat system.
    • Locate and predict target location.
    • Determine need for window of opportunity.
    • Backwards plan from influence of deception target back to the current time.
      • Deception of target.
      • Tracking of target.
      • Maneuver to place deception resources in effective position as necessary.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) executes disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Identify complex terrain in the vicinity of identified targets necessary to support deception.
    • Identify potential cache sites required.
    • Identify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) that may be required to participate or assist in the deception.
    • Determine potential means and routes of infiltration and potential sources of supply.
    • Choose method(s) of deception that best affect the deception target. This may be a combination of methods and must consider the characteristics of the operational environment and the nature of the larger ongoing operation. Such methods include—
      • Electronic deception (manipulative, simulative, imitative).
      • Physical deception (decoys [physical signature], thermal, acoustic).
      • Influence operations (radio, TV/video, print, Internet).
      • Military deception (feint, demonstration, ruse).
  • 23.1.2 Preparation
    • Create task organization and C2 of action element(s), support element(s), security element(s), and deception force(s) or element(s).
    • Execute disruption.

Note. The battle plan and/or INFOWAR plan may call for the creation of one or more deception forces or elements. This means that nonexistent or partially existing formations attempt to present the illusion of real or larger units. When the INFOWAR plan requires forces to take some action (such as a feint or demonstration), these forces are designated as deception forces or elements in close-hold executive summaries of the plan. Wide-distribution copies of the plan make reference to these forces according to the functional designation given them in the deception story.

  • 23.1.3 Rehearsal
    • The deception force rehearses actions in a concealed location. This includes any military actions such as movement between assembly areas, hide positions, and attack positions.
  • 23.1.4 Execution
    • Verify deception target.
    • Execute deception actions.
    • Monitor and assess deception effectiveness.
Tactical Subtask 23.1 Deception
No. Scale Measure
01 Yes/No Deception target takes desired action.
02 Yes/No Deception is not discovered.
03 Time Target is deceived.

Tactical Subtask 23.2 Electronic Warfare

Electronic warfare (EW) is activities conducted to control or deny the enemy’s use of the electromagnetic spectrum, while ensuring its use by the OPFOR. EW capabilities allow an actor to exploit, deceive, degrade, disrupt, damage, or destroy sensors, processors, and C2 nodes. At a minimum, the goal of EW is to control the use of the electromagnetic spectrum at critical locations and times in an OE or to attack a specific system. The OPFOR realizes that it cannot completely deny the enemy’s use of the spectrum. Thus, the goal of OPFOR EW is to control (limit or disrupt) his use or selectively deny it at specific locations and times on the battlefield, at the OPFOR’s choosing. In this way, the OPFOR intends to challenge the enemy’s goal of information dominance. For the OPFOR, EW consists of two main activities:

  • Signals reconnaissance is action taken to detect, identify, locate, and track high-value targets (HVTs) through the use of the electromagnetic spectrum. (Thus, signals reconnaissance is essentially the same as the U.S. task Provide Signals Intelligence on Specified Targets in the Universal Joint Task List. Therefore, it is not covered in detail here in the OPFOR Tactical Task List.)
  • Electronic attack (EA) supports the disaggregation of enemy forces, primarily through jamming. The EA-related sub-subtasks for EW are—
  • 23.2.1 Planning
    • Choose the target enemy force(s) and system(s). (In a systems warfare approach, this force or system is typically chosen for its role in the enemy’s combat system.)
    • Locate or predict target location.
    • Determine need for window of opportunity.
    • Backwards plan from attack on target back to the current time.
      • Electronic attack (EA) on target.
      • Tracking of target location and activity.
      • Maneuver to place EA resources in effective position as necessary.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Identify complex terrain in the vicinity of identified targets necessary to support EA.
    • Identify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and even criminal organizations) that can participate in support of the EA.
    • Determine potential means and routes of infiltration and potential sources of supply.
    • Choose method(s) of EA that best affect the target.
  • 23.2.2 Preparation
    • Create task organization and C2 of action element(s), support element(s), security element(s), disruption force, and deception force.
  • Conduct target location.
  • Execute disruption.
  • 23.2.3 Rehearsal
    • Action element(s) rehearse actions in a concealed location. This includes any military actions such as movement between assembly areas and hide positions.
  • 23.2.4 Execution
    • Verify the target audience (organization or population).
    • Conduct EA.
    • Monitor and assess EA effectiveness.
Tactical Subtask 23.2 Electronic Warfare
No. Scale Measure
01 Yes/No EA has desired effect.
02 Yes/No Action and support elements not discovered.
03 Time Target is affected.
04 Time To place EA into effect.
05 Percent Of assessment of effectiveness that is correct.
06 Percent Of friendly forces available to continue mission.
07 Percent Combat effectiveness of enemy force.

Tactical Subtask 23.3 Perception Management

Perception management involves measures aimed at creating a perception of truth that best suits OPFOR objectives. It integrates a number of widely differing activities that use a combination of true, false, misleading, or manipulated information. Targeted audiences range from enemy forces, to the local populace, to world popular opinion. The sub-subtasks for perception management are—

  • 23.3.1 Planning
    • Choose the target audience.
    • Coordinate required communications media support.
    • Backwards plan from influence of target back to the current time.
      • Execute perception management actions.
      • Verify the target audience (organization or population).
      • Rehearsals.
      • Preparation.
      • Planning.
    • Indentify affiliated forces (such as insurgent groups, groups with ethnic ties to the OPFOR or others that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) that can participate or assist in perception management functions.
    • Choose the method(s) of perception management that best affect the target audience. This may be a combination of methods and must consider the characteristics of the operational environment and the nature of the larger ongoing operation. Such methods include—
      • Psychological warfare (PSYWAR).
      • Direct action.
      • Public affairs.
      • Media manipulation (radio, TV/video, print, Internet).
  • 23.3.2 Preparation
    • Create task organization and C2 of action element(s), support element(s), security element(s), disruption force, and deception force.
    • Study the target audience.
    • Execute disruption.
  • 23.3.3 Rehearsal
    • PSYWAR and direct action forces rehearse actions in a concealed location. This includes any military actions such as movement between assembly areas, hide positions, and attack positions.
  • 23.3.4 Execution
    • Verify the target audience (organization or population).
    • Execute perception management actions (PSYWAR, direct action, public affairs, and/or media manipulation).
    • Monitor and assess perception management effectiveness.
Tactical Subtask 23.3 Perception Management
No. Scale Measure
01 Yes/No Perception management has desired effect.
02 Time Target is affected.
03 Percent Of assessment of effectiveness that is correct.

Tactical Subtask 23.4 Computer Warfare and Information Attack

Computer warfare (CW) consists of attacks that focus specifically on the computer systems, networks, and/or nodes. This includes a wide variety of activities, ranging from unauthorized access (hacking) of information systems for intelligence-collection purposes, to the insertion of malicious software (viruses, worms, logic bombs, or Trojan horses). Such attacks concentrate on the denial, disruption, or manipulation of the integrity of the information infrastructure. The OPFOR may attempt to accomplish these activities through the use of agents or third-party individuals with direct access to enemy information systems. It can also continually access and attack systems at great distances via communications links such as the Internet. Information attack (IA) is the intentional disruption or distortion of information in a manner that supports accomplishment of the mission. Unlike computer warfare attacks that target the information systems, IAs target the information itself. Attacks on the commercial Internet by civilian hackers have demonstrated the vulnerability of cyber and information systems to innovative and flexible penetration, disruption, or distortion techniques. The sub-subtasks for CW and IA are—

  • 23.4.1 Planning
    • Choose the target enemy information technology system. (In a systems warfare approach, this system is typically chosen for its role in the enemy’s combat system.)
    • Locate or predict target location.
    • Determine need for window of opportunity.
    • Plan backwards from attack on target back to the current time.
      • Attack on target.
      • Tracking of target.
      • Maneuver to place CW and IA resources in effective position as necessary.
      • Use of C3D and window(s) of opportunity.
      • Disruption force(s) executes disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
  • Identify complex terrain in the vicinity of identified targets necessary to support CW.
  • Identify affiliated forces (such as sympathetic insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) that can participate in support of CW or IA.
  • Identify potential means and routes of infiltration and potential sources of supply.
  • Choose the method(s) of CW and IA that best affect the target, such as—
    • Destructive intrusion.
    • Manipulative intrusion.
    • Electromagnetic pulse (EMP).
    • Physical destruction.
    • Power spike or denial.
    • Undetected information acquisition.
  • 23.4.2 Preparation
    • Create task organization and C2 of disruption force(s), action element(s), support element(s), security element(s), and deception force.
    • Execute disruption.
  • 23.4.3 Rehearsal
    • The forces and elements rehearse actions in a concealed location. This includes any military actions such as movement between assembly areas, hide positions, and attack positions.
  • 23.4.4 Execution
    • Verify the target information or information system(s).
    • Execute CW and IA (destructive intrusion, manipulative intrusion, EMP, physical destruction, power spike or denial, denial of service, and/or undetected information acquisition).
Tactical Subtask 23.4 Computer Warfare and Information Attack
No. Scale Measure
01 Yes/No CW/IA has desired effect.
02 Yes/No CW/IA and support elements not discovered.
03 Time Target is affected.
04 Time To place CW/IA into effect.
05 Percent Of assessment of effectiveness that is correct.
06 Percent Of friendly forces available to continue mission.
07 Percent Combat effectiveness of enemy force.

Tactical Subtask 23.5 Protection And Security Measures

Protection and security measures is an element of INFOWAR that encompass a wide range of activities, incorporating the elements of deception and EW. Successfully conducted protection and security measures significantly enhance tactical survivability and preserve combat power. The OPFOR will attempt to exploit the large number, and apparently superior technology, of the enemy’s sensors. For example, it employs software at the tactical level that allows it to analyze the enemy’s satellite intelligence collection capabilities and warn friendly forces of the risk of detection. The use of signature-reducing and signature-altering devices, along with diligent application of operations security measures, supports deception activities in addition to denying information. At the tactical level, protection and security measures focus primarily on counterreconnaissance (see Tactical Task 6.0), C3D, and information security. The sub-subtasks for protection/security measures are—

  • 23.5.1 Planning
    • Identify friendly information system(s) that are potential targets for attack. (This system is typically chosen for its significant role in current OPFOR operations and its value to enemy plans.)
    • Identify complex terrain in the vicinity of identified targets, which could support enemy computer warfare or information attacks.
    • Backwards plan from execution of protection and security measures to the current time.
      • Execute information protection and security measures.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Identify affiliated forces (such as sympathetic insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) that can assist or participate in support of the enemy attack.
    • Determine potential means and routes of enemy infiltration.
    • Identify vulnerabilities with respect to—
      • Destructive intrusion.
      • Manipulative intrusion.
      • EMP.
      • Physical destruction.
      • Power spike or denial.
      • Information theft.
  • 23.5.2 Preparation
    • Create task organization and C2 of information protection and security forces and elements.
    • Execute disruption.
  • 23.5.3 Rehearsal
    • Conduct rehearsals in a concealed location.
  • 23.5.4 Execution
    • Verify information system(s) to be protected.
    • Execute information protection and security measures.
      • Counterreconnaissance.
      • C3D measures.
      • Information security procedures.
      • Physical security procedures.
      • Personnel security procedures.
      • Pre-emptive actions.
      • Deception.
    • Monitor and assess effectiveness or protection and security measures.
Tactical Subtask 23.5 Protection and Security Measures
No. Scale Measure
01 Yes/No Enemy successful.
02 Percent Of assessment of effectiveness that is correct.
03 Percent Of friendly forces available to continue mission.
04 Percent Combat effectiveness of enemy force.

Tactical Subtask 23.6 Physical Destruction

Physical destruction as an element of INFOWAR is those physical measures taken to destroy critical components of the enemy force. C2 nodes and target acquisition sensors are a major part of the fire support plan during physical destruction action. The OPFOR integrates all types of conventional and precision weapon systems to conduct the destructive fires, to include fixed- and rotary-wing aviation, cannon artillery, multiple rocket launchers, and surface-to-surface missiles. It can also utilize other means of destruction, such as explosives delivered by special-purpose forces (SPF), insurgents, terrorists, or other affiliated forces. Priority targets typically include target acquisition sensors, tactical command posts, and major communication and C2 systems. The sub-subtasks for physical destruction are—

  • 23.6.1 Planning
    • Develop a priority target list.
    • Locate or predict target locations.
    • Develop a comprehensive fire support plan.
    • Identify affiliated forces (such as sympathetic insurgent groups, groups with ethnic ties to the OPFOR, groups that sympathize with the OPFOR for political reasons, individual sympathizers, terrorist groups, and criminal organizations) can participate in support of physical destruction.
    • Determine potential means and routes of infiltration.
    • Develop a deception plan.
  • 23.6.2 Preparation
    • Create task organization and C2 of action element(s), support element(s), security element(s), and deception force(s) to execute physical destruction of prioritized target list.
  • 23.6.3 Rehearsal
    • Conduct rehearsals in a concealed location. This includes any military actions such as movement between assembly areas, hide positions, and attack or firing positions.
  • 23.6.4 Execution
    • Verify location, activity, and dispositions of the target list.
    • Execute physical destruction of target enemy assets.
    • Monitor and assess physical destruction effectiveness.
Tactical Subtask 23.6 Physical Destruction
No. Scale Measure
01 Yes/No Enemy successful.
02 Percent Of assessment of effectiveness that is correct.
03 Percent Of friendly forces available to continue mission.
04 Percent Combat effectiveness of enemy force.

Tactical Task 24.0 Insurgency

Insurgent forces are groups that conduct irregular or unconventional warfare within the borders or their country in order to undermine or overthrow a constituted government or civil authority. An insurgent organization may use more than one form of tactics and, based on its strategy, its actions could cut across the entire spectrum of warfare—employing terror, guerrilla, and conventional military tactics to achieve its goals. The subtasks for insurgent forces are—

  • 24.1 Planning
    • Determine decisive points.
    • Backwards plan from destruction of critical enemy systems and organizations back to the current time.
      • Destruction of objective.
      • Maneuver of action element (s) or exploitation force to objective.
      • Use of enabling force(s) or element(s) to create opportunity for the exploitation force or action element(s).
      • Fixing force(s) or element(s) isolate decisive points.
      • Disruption force(s) execute disruption of enemy.
      • Rehearsals.
      • Preparation.
      • Planning.
    • Task-organize insurgent cells to accomplish all functions while being resistant to enemy counterinsurgency or law enforcement actions.
  • 24.2 Preparation
    • Create task organization and C2 for disruption force(s), action element(s), exploitation force, support element(s), security element(s), and deception force(s).
    • Conduct continuous disruption in order to—
      • Destroy or deceive enemy reconnaissance.
      • Gain and maintain reconnaissance contact with key enemy elements.
      • Prevent the enemy from moving without exposure to continuous attack.
      • Damage key elements of the enemy’s combat system to the point of uselessness.
      • Prevent the enemy from constructing a reliable sanctuary.
  • 24.3 Rehearsal
    • Rehearse all actions, as practicable, in locations that are not detectable by the enemy.
  • 24.4 Execution
    • Maintain support of the local population through perception management operations.
    • Conduct counterintelligence, information protection and security measures, and force protection to prevent disruption by enemy operations.
    • Integrate ethnic, tribal, cultural, and religious characteristics of the operational environment to support insurgent operations and ensure the local populace remains hostile to enemy goals.
    • Secure sanctuary and funding from outside the area of influence of the enemy.
    • Infiltrate and exfiltrate. (Ensure all movement is undetected through the use of stealth, deception, local population, surprise, or clandestine means.)
    • Employ all means necessary:
      • Conventional: assault, raid, reconnaissance attack, and ambush.
      • Unconventional: bombing/improvised explosive device (IED), kidnapping, shelling, WMD, hijacking, and sabotage.
      • Information warfare: deception, perception management, electronic warfare, computer warfare, information attack, protection and security measures, and physical destruction.
TACTICAL TASK 24.0 INSURGENCY
No. Scale Measure
01 Yes/No Reconnaissance able to locate enemy high-value targets (HVTs) destroyed or deceived.
02 Percent Enemy HVTs identified, tracked, and destroyed.
03 Time Enemy delayed.
04 Yes/No Enemy forced to deploy to friendly time schedule.
05 Yes/No Mission accomplished.
06 Percent Of friendly forces available to continue mission.
07 Percent Combat effectiveness of enemy force.
08 Yes/No Insurgent sanctuary penetrated.
09 Yes/No Insurgent funds and supplies disrupted by enemy operations.
Retrieved from "http://odin.ttysg.us/mediawiki/index.php?title=Appendix_B:_TC_7-101_OPFOR_Tactical_Task_List&oldid=19144"