Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Introduction<br />
describing the threats the <strong>Army</strong> is likely to face, adversaries may use any or all of these challenges in<br />
combination to achieve the desired effect against the U.S. A good example of a threat that employs all four<br />
categories is North Korea: it has large conventional and irregular forces, is a nuclear threat, has been linked<br />
to clandestine arms, and exports drugs. The four major categories of threats are traditional, irregular,<br />
catastrophic, and disruptive.<br />
TRADITIONAL<br />
1-42. Traditional threats emerge from states employing recognized military capabilities and forces in<br />
understood forms of military competition and conflict. To counter these threats, U.S. forces would employ<br />
conventional weapons in primarily offensive and defensive operations.<br />
IRREGULAR<br />
1-43. Irregular threats are those posed by an opponent employing unconventional, asymmetric methods<br />
and means to counter traditional U.S. advantages. A weaker enemy often uses irregular warfare to exhaust<br />
the U.S. collective will through protracted conflict. Irregular warfare includes such means as terrorism,<br />
insurgency, and guerrilla warfare. United States forces are currently involved in countering irregular<br />
threats.<br />
1-44. Threatening or extremist forces and organizations can be expected to use the environment and<br />
rapidly adapt. They will use the media, technology, and their position within a state’s political, military,<br />
and social infrastructures to their advantage. Their operations combine conventional, unconventional,<br />
irregular, and criminal tactics. They focus on creating conditions of instability, seek to alienate legitimate<br />
forces from the population, and employ global networks to expand local operations. The threat employs<br />
advanced information operations and is bound by conventional limits on the use of violence.<br />
1-45. Current and future conflicts are much more likely to be fought “among the people” instead of<br />
“around the people.” This fundamentally alters the manner in which Soldiers can apply force to achieve<br />
success in a conflict. Enemies seek populations to hide in as protection against the proven attack and<br />
detection means of U.S. forces. Once secure within the population, these threat forces prepare and conduct<br />
attacks against communities and friendly forces while drawing resources from the population. Conflicts<br />
often take place in areas in which people are concentrated and require U.S. security dominance to extend<br />
across the population.<br />
1-46. Some of the most effective tools that threat forces currently use against U.S. forces are improvised<br />
explosive devices (IEDs), mines, car bombs, unexploded ordnance (UXO), and suicide bombers.<br />
Infantrymen at all levels must know about these hazards. Additionally, they must know how to identify,<br />
avoid, and react to them properly. Newly assigned leaders and Soldiers should read everything they can<br />
find on current local threats. In addition, they should learn the unit's policies such as those found in the<br />
unit's TACSOP and in locally produced Soldier handbooks and leader guidebooks.<br />
CATASTROPHIC<br />
1-47. Catastrophic threats involve the acquisition, possession, and use of weapons of mass destruction. The<br />
proliferation of related technology has made this threat more likely than in the past.<br />
DISRUPTIVE<br />
1-48. Disruptive threats involve an enemy using new technologies that reduce U.S. advantages in key<br />
operational domains.<br />
16 November 2010 ATTP 3-20.97 1-11