WEG MediaWiki

TC 7-100.4 Hybrid Threat Force Structure Organization Guide

This training circular (TC) is one of a series that describes the Hybrid Threat Force Structure (HTFS) for training U.S. Army commanders, staffs, and units. See the References section for a list of other publications in this series. (Other publications in the former Field Manual [FM] 7-100 series will be converted to TCs as well.) Together, these TCs outline a Hybrid Threat than can cover the entire spectrum of military and irregular capabilities against which the Army must train to ensure success in any future conflict.
Applications for this series of TCs include field training, training simulations, and classroom instruction throughout the Army. All Army training venues should use a HTFS based on these TCs, except when mission rehearsal or contingency training requires maximum fidelity to a specific country-based threat or enemy. Even in the latter case, trainers should use appropriate parts of the Hybrid Threat TCs to fill information gaps in a manner consistent with what they do know about a specific threat or enemy.
This publication applies to the Active Army, the Army National Guard (ARNG) /Army National Guard of the United States (ARNGUS), and the United States Army Reserve (USAR) unless otherwise stated.
Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is the proponent for this publication. The preparing agency is the TRADOC G-2, ACE-Threats . Send comments and suggested improvements on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to ACE-Threats at the following address: Director, Threats , TRADOC G-2, ACE, ATTN: ATIN-T (Bldg 467), TRADOC Intelligence Support Activity 801 Harrison Drive, Fort Leavenworth, Kansas 66027-2308.
This publication is available at Army Publishing Directorate (APD) at http://www.apd.army.mil and on the Army Training Network (ATN) at http://www.atn.army.mil. Readers should monitor those sites and also the TRADOC G2, ACE, Threats (ACE-Threats) Websites listed below for the status of this TC and information regarding updates. The TC is also available (after AKO login) in AKO files under Organizations/DoD Organizations/Army/Army Command/TRADOC/HQ Staff/DCS, G-2 (Intelligence)/TRISA/TRISA- CTID/Hybrid Threat Doctrine at or https://www.us.army.mil/suite/files/11318389 (for ACE Threats folder) or https://www.us.army.mil/suite/files/30837459 (for Hybrid Threat Doctrine folder). Periodic updates, subject to the normal approval process, will occur as a result of the normal production cycle. The date on the cover and title page of the electronic version will reflect the latest update.
Unless this publication states otherwise, masculine nouns or pronouns do not refer exclusively to men.

Introduction

This manual is part of the 7-100 series, which describes the Hybrid Threat that exists for the purpose of training U.S. forces for potential combat operations. The Hybrid Threat reflects the characteristics of military and irregular forces that may be present in the operational environment (OE). Like those real- world threats, the Threat will continue to present new and different challenges for U.S. forces. The OE is constantly changing, and it is important for U.S. Army training environments to keep pace with real-world developments. This manual differs from others in the 7-100 series in that it includes both Threat doctrine regarding organization (Threat force structure and task-organized fighting force structure) and training- related issues from a U.S. viewpoint.

This organization guide also differs from other publications in the fact that it is linked to online organizational directories. TRADOC G2, ACE, Threats (ACE-Threats) maintains these directories and continuously updates them, as necessary, to represent contemporary and emerging capabilities. In order to provide a comprehensive menu of the numerous types of Threat organizations in the detail required for the Army’s live, virtual, and constructive training environments, these directories exceed the scope and size that can be accommodated within a traditional printed format. The directories contain over 10,000 pages detailing Threat organizations. From this menu, users can select and download just those parts needed to build the appropriate HTFS for a particular exercise. Task-organizing an exercise order of battle also requires that users have the ability to use downloaded organizations in an interactive manner. For these reasons, it is necessary for this TC to be linked to organizational diagrams and associated equipment inventories made available in electronic form that users can download and manipulate as necessary in order to create task organizations capable of fighting in adaptive ways that typify the OE.

Operational Environment

In planning a training scenario and its road to war, trainers need to take into consideration the entire operational environment (OE) and its impact on the Threat’s order of battle (OB). The DOD officially defines an operational environment as "a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander" (JP 1-02 and JP 3-0). The operational environment (OE) is the synergistic combination of all the critical variables and actors that create the conditions, circumstances, and influences that can affect military operations today and in the near- and mid-term.

The OE has a direct impact on the architecture and capabilities of Threat organizations. Proper task- organizing can either mitigate or exploit the environment by the proper selection of organization and/or equipment. This enables the appropriate HTFS to perform countertasks that challenge the ability of U.S. units to perform the tasks in their mission essential task list (METL) in training environments.

The OE is the holistic view of the environment in the near- and mid-term that comprises the conditions, circumstances, and influences that affect the training and employment of military forces. Analysis of the OE focuses on eight interrelated variables:

  • Political.
  • Military.
  • Economic.
  • Social.
  • Information.
  • Infrastructure.
  • Physical environment.
  • Time.

An assessment of these critical variables and their relationships helps to understand any OE and its impact on the Army.

The OE is particularly valuable in training. In order to develop adaptive leaders capable of operating in any OE, the Army requires challenging training scenarios, a Threat model, and Threat doctrine. This provides an adaptive, asymmetric Hybrid Threat in order to train, develop, and prepare Soldiers and leaders to overcome threats in a complex and adaptive OE. It also provides a benchmark to measure training effectiveness and combat development activities. See ADP 3-0 Unified Land Operations for further discussion of the OE and its application to training.

Real World

In the real world, the OE is the entire set of conditions, circumstances, and influences that U.S. Armed Forces can expect to face when conducting military operations to further the interests of the United States, its friends, and allies. The OE is “contemporary” in the sense that it does not represent conditions that existed only in the past or that might exist only in the remote future, but rather those conditions that exist today and in the clearly foreseeable near- and mid-term future. This OE consists not only of the military and/or paramilitary capabilities of potential real-world adversaries, but also of the manifestations of the seven other variables that help define any OE.

Training

In training environments, the OE is the environment created to approximate the demands of the real-world and to set the conditions for desired training outcomes. This involves the appropriate combination of a Hybrid Threat (with regular and, irregular capabilities representing a composite of a number of potential adversaries) and other OE variables in a realistic, feasible, and plausible manner. The purpose of the OE in training simulations is to produce the necessary training outcomes.


Note. The same type of OE conditions can be created to support some combat development activities that do not require simulation of a specific real-world potential adversary. However, some combat development activities may require portrayal of an environment that extends further into the future than is typical for the OE; in that case, they are dealing with the future operational environment (FOE).


Threat Force

As a training tool, the Threat must be a challenging, uncooperative sparring partner capable of stressing any or all warfighting functions and mission-essential tasks of the U.S. force. Training for the OE requires a Hybrid Threat that is “a plausible, flexible regular and/or irregular force representing a composite of varying capabilities of actual worldwide forces, used in lieu of a specific threat force, for training and developing U.S. forces” (AR 350-2). This manual introduces the baseline organizational structures of a flexible, thinking, adaptive Hybrid Threat.

As the real-world conditions and capabilities change over time, threat doctrine, organizations, and equipment capabilities will evolve along with them, to continue to provide the Army a threat appropriate for the OE. Thus, the threat will remain capable of presenting realistic and relevant challenges that are appropriate to meet evolving training requirements at any given point in time given current conditions in the OE.

Chapter 1: Hybrid Threat Roles and Relationships in Training

A Hybrid Threat Force Structure is a training tool that should allow the U.S. Army to train against a challenging and plausible sparring partner that represents the range of possible opponents the Army could face in actual conflict. It enables training of all arms of the Army and prepares the Army for potential combat operations.

Chapter 2: Hybrid Threat Force Structure

This chapter and the organizational directories to which it is linked provide the Hybrid Threat Force Structure (HTFS) to be used as the basis for a threat organization in all Army training, except real-world-oriented mission rehearsal exercises. This includes the forces of Threat actors as well as key non-state actors. In most cases, the organizations found in the HTFS will require task-organizing (see chapter 3) in order to construct a threat order of battle appropriate for a training event.

Chapter 3: Task-Organizing

The concept of task-organizing for combat is not unique to the Threat. It is universally, performed at all levels, and has been around as long as combat. The U.S. Army defines a task organization as “A temporary grouping of forces designed to accomplish a particular mission” and defines task-organizing as “The process of allocating available assets to subordinate commanders and establishing their command and support relationships” (ADRP 1-02). Task-organizing of the Hybrid Threat must follow Hybrid Threat doctrine (see TC 7-100, FM 7-100.1, and TC 7- 100.2) and reflect requirements for stressing U.S. units’ mission essential task list (METL) in training.

Chapter 4: Equipment Options

The Hybrid Threat Force Structure (HTFS) organizational directories provide example equipment types and the numbers of each type typically found in specific organizations. The purpose is to give trainers and training planners a good idea of what a Threat Force Structure should look like. However, training requirements may dictate some modifications to this baseline. Therefore, training planners have several options by which they can modify equipment holdings to meet particular training requirements.

Appendix A: Threat Force Structure Organizational Directories Listing

The organizational directories of the Hybrid Threat Force Structure (HTFS) are contained on the Army Training Network (ATN) at https://atn.army.mil/dsp_template.aspx?dpID=311. The folders and unit files in these directories serve as the menu for Threat baseline units. The Threat Force Structure are continually updated on the ATN. Therefore, the listing below is dynamic. Although the list of Hybrid Threat units in the directories might change over time, the basic architecture of the menu remains.

Appendix B: Building a Hybrid Threat Task Organization

Chapter 3 describes the process of task-organizing for combat and its role in matching the appropriate OPFOR task organization to the training objectives of the unit to be trained. This appendix explains in more detail how trainers and training planners modify a Hybrid Threat organization from the Hybrid Threat Force Structure (HTFS) listed in the organizational directories on the Army Training Network (ATN) into a Hybrid Threat Force Structure for countering the tasks listed in FM 7-15, Army Universal Task List (AUTL). For illustrative purposes, the appendix describes a particular example based on hypothetical tasks and OPFOR countertasks. Then, it provides detailed guidance on how to task-organize Threat units from the bottom up.

Appendix C: Local Insurgent Organization from the HTFS Organizational Directories

This appendix provides an example of the information for a local insurgent organization found in the threat force structure (HTFS) organizational directories. It also describes various cells within such an organization.

Appendix D: Motorized Infantry Company from the HTFS Organizational Directories

This appendix provides an example of the information for an infantry company and its subordinates, as found in the Hybrid Threat Force Structure (HTFS) organizational directories under the motorized infantry battalion. It also includes the spreadsheet for the personnel and equipment in the motorized infantry battalion as a whole.

Appendix E: Guerrilla Hunter/Killer Company from the HTFS Organizational Directories

This appendix provides an example of the information for a guerrilla hunter/killer company and its subordinates, as found in the Hybrid Threat Force Structure (HTFS) organizational directories under the guerrilla battalion. It also includes the spreadsheets for the personnel and equipment in the guerrilla hunter/killer company and for the guerrilla battalion as a whole.

Glossary

References

Required Publications

These documents must be available to the intended users of this publication.

ADRP 1-02, Terms and Military Symbols, 2 February 2015.

JP 1-02, Department of Defense Dictionary of Military and Associated Terms; 8 November 2010.

Related Publications

These sources contain relevant supplemental information. These sources available online on the Army Publishing Directorate Web site (www.apd.army.mil).

Army Publications

Most Army doctrinal publications are available online on the Army Publishing Directorate Web site (www.apd.army.mil).

ADRP 2-0, Intelligence, 31 August 2012.

ADRP 3-90, Offense and Defense, 31 August 2012.

ADRP 4-0, Sustainment, 31 July 2012.

ADRP 5-0, The Operations Process, 17 May 2012.

AR 525-21, (C) Army Military Deception (MILDEC) Program (U), 28 October

ATP 3-09.34, Kill Box Multi-Service Tactics, Techniques, and Procedures for Kill Box Planning and Employment, 16 April 2014.

ATP 3-11.50, Battlefield Obscuration, 15 May 2014.

ATP 3-20.15, Tank Platoon, 13 December 2012.

FM 3-07.31, Peace Operations Multi-Service Tactics, Techniques, and Procedures for Conducting Peace Operations, 26 October 2003.

FM 3-18, Special Forces Operations, 28 May 2014.

FM 3-24, Insurgencies and Countering Insurgencies, 13 May 2014.

FM 3-60, The Targeting Process, 26 November 2010.

FM 3-90-1, Offense and Defense Volume 1, 22 March 2013.

FM 3-90-2, Reconnaissance, Security, and Tactical Enabling Tasks Volume 2, 22 March 2013.

FM 3-90.5, The Combined Arms Battalion, 7 April 2008. FM 7-15,The Army Universal Task List. 27 February 2009

FM 7-100.1. Opposing Force Operations. 27 December 2004.

TC 7-100. Hybrid Threat. 26 November 2010.

TC 7-100.2. Opposing Force Tactics. 9 December 2011

TC 7-100.3. Irregular Opposing Forces. 17 January 2014.

TC 7-101. Exercise Design. 26 November 2010.

TC 18-01, Special Forces Unconventional Warfare, 28 January 2011.

TC 33-02, (S) Psychological Operations Targeting Handbook (U), 1 August 2008.

Department of Defense Publications

Unless otherwise indicated, DOD publications are available on the Defense Technical Information Center Web site (http://www.dtic.mil/whs/directives/corres/dir.html).

DODD 3000.07, Irregular Warfare (IW), 28 August 2014.

Joint Publications

Most JPs are available online at www.dtic.mil/doctrine/new_pubs/jointpub.htm.

Commanders Handbook for Security Force Assistance, 14 July 2008.

JP 1, Doctrine for the Armed Forces of the United States, 25 March 2013. JP 2-0, Joint Intelligence, 22 October 2013.

JP 2-01.2, Counterintelligence and Human Intelligence in Joint Operations, 7 October 2014.

JP 3-0, Joint Operations, 11 August 2011.

JP 3-05, Special Operations, 16 July 2014.

JP 3-24, Counterinsurgency, 22 November 2013.

JP 3-26, Counterterrorism, 24 October 2014.

JP 3-40, Countering Weapons of Mass Destruction, 31 October JP 3-57, Civil-Military Operations, 11 September 2013.

JP 3-60, Joint Targeting, 31 January 2013.

JP 3-68, Noncombatant Evacuation Operations, 23 December 2010.

JP 4-0, Joint Logistics, 16 October 2013.

JP 5-0, Joint Operation Planning, 11 August 2011.

Other Publications

Chairman of the Joint Chiefs of Staff instructions are available on the Defense Technical Information Center  Web site  (http://www.dtic.mil/cjcs_directives/cjcs/instructions.htm).

CJCSI 3110.05E, Military Information Support Operations Supplement to the Joint Strategic Capabilities Plan, 30 September 2011.

CJCSI 3211.01E, (S) Joint Policy for Military Deception (U), 25 October 2010. Title 10, United States Code, Armed Forces. http://uscode.house.gov

Other Documents

AR 350-2, Opposing Force (OPFOR) Program, 9 April 2004. Army Publishing Directorate Web site (www.apd.army.mil).

Prescribed Forms

This section has no entries.

Referenced Forms

Department of the Army Forms

Unless otherwise indicated, DA forms are  available  on  the  Army  Publishing  Directorate (APD)  Web  site (www.apd.army.mil).

DA Form 2028, Recommended Changes to Publications and Blank Forms.

Retrieved from "http://odin.ttysg.us/mediawiki/index.php?title=TC_7-100.4_Hybrid_Threat_Force_Structure_Organization_Guide&oldid=11418"