22.03.2013 Views

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction<br />

describing the threats the <strong>Army</strong> is likely to face, adversaries may use any or all of these challenges in<br />

combination to achieve the desired effect against the U.S. A good example of a threat that employs all four<br />

categories is North Korea: it has large conventional and irregular forces, is a nuclear threat, has been linked<br />

to clandestine arms, and exports drugs. The four major categories of threats are traditional, irregular,<br />

catastrophic, and disruptive.<br />

TRADITIONAL<br />

1-42. Traditional threats emerge from states employing recognized military capabilities and forces in<br />

understood forms of military competition and conflict. To counter these threats, U.S. forces would employ<br />

conventional weapons in primarily offensive and defensive operations.<br />

IRREGULAR<br />

1-43. Irregular threats are those posed by an opponent employing unconventional, asymmetric methods<br />

and means to counter traditional U.S. advantages. A weaker enemy often uses irregular warfare to exhaust<br />

the U.S. collective will through protracted conflict. Irregular warfare includes such means as terrorism,<br />

insurgency, and guerrilla warfare. United States forces are currently involved in countering irregular<br />

threats.<br />

1-44. Threatening or extremist forces and organizations can be expected to use the environment and<br />

rapidly adapt. They will use the media, technology, and their position within a state’s political, military,<br />

and social infrastructures to their advantage. Their operations combine conventional, unconventional,<br />

irregular, and criminal tactics. They focus on creating conditions of instability, seek to alienate legitimate<br />

forces from the population, and employ global networks to expand local operations. The threat employs<br />

advanced information operations and is bound by conventional limits on the use of violence.<br />

1-45. Current and future conflicts are much more likely to be fought “among the people” instead of<br />

“around the people.” This fundamentally alters the manner in which Soldiers can apply force to achieve<br />

success in a conflict. Enemies seek populations to hide in as protection against the proven attack and<br />

detection means of U.S. forces. Once secure within the population, these threat forces prepare and conduct<br />

attacks against communities and friendly forces while drawing resources from the population. Conflicts<br />

often take place in areas in which people are concentrated and require U.S. security dominance to extend<br />

across the population.<br />

1-46. Some of the most effective tools that threat forces currently use against U.S. forces are improvised<br />

explosive devices (IEDs), mines, car bombs, unexploded ordnance (UXO), and suicide bombers.<br />

Infantrymen at all levels must know about these hazards. Additionally, they must know how to identify,<br />

avoid, and react to them properly. Newly assigned leaders and Soldiers should read everything they can<br />

find on current local threats. In addition, they should learn the unit's policies such as those found in the<br />

unit's TACSOP and in locally produced Soldier handbooks and leader guidebooks.<br />

CATASTROPHIC<br />

1-47. Catastrophic threats involve the acquisition, possession, and use of weapons of mass destruction. The<br />

proliferation of related technology has made this threat more likely than in the past.<br />

DISRUPTIVE<br />

1-48. Disruptive threats involve an enemy using new technologies that reduce U.S. advantages in key<br />

operational domains.<br />

16 November 2010 ATTP 3-20.97 1-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!