11.07.2015 Views

FM 100-5 Operations - Survival Ebooks Military Manuals Survival ...

FM 100-5 Operations - Survival Ebooks Military Manuals Survival ...

FM 100-5 Operations - Survival Ebooks Military Manuals Survival ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WWW.SURVIVALEBOOKS.COMOPERATIONSAt times, commanders may be required to deny orhold key terrain, if the friendly situation gives the defenderno other option or friendly forces are fightingoutnumbered. In such situations, the key to success ismaking wise use of all resources in the time availableto prepare positions and to ensure troops are fit andready. This is a continuing process that ends only whenthe defender is ordered to give up the terrain. Thefactors of METT-T drive the tasks to be done and theirpriority, making maximum use of obstacle and barrierplans. Engagement areas and control and distributionof fires are keys to a successful area defense.To make maximum use of the depths of their AO,commanders weigh all the factors of METT-T and usethe defense pattern that offers the best advantage. Aposition defense in depth provides positions throughoutthe battlefield that provide mutual support and forcethe attacker to expose his force in the attack of oneposition after another. While such a forward defensemay be necessary, it is more difficult to execute thanan in-depth defense. Mobile defenses require considerabledepth, but area defenses vary in depth accordingto the situation.Commanders position their forces in platoon, company,or battalion battle positions on suitable terrain,with a specific orientation and direction or sector offire. On occasion, commanders may also direct theconstruction of a strongpoint in order to deny key terrainto the enemy and force his movement in a differentdirection. The construction of a strongpoint requiresconsiderable time and combat engineer support.In some cases, because of terrain restrictions, requirementsto hold specific terrain, or when enemy forcesare weak and disorganized, area defenses without muchdepth may be necessary, requiring the main effort tobe well forward. See Figure 9-2.OPERATIONS IN DEPTHA concise and comprehensive in-depth concept ofoperations is the basis for a successful defense. Simultaneousapplication of combat power—throughoutthe depth of the battle area—that defeats the enemyrapidly with minimum friendly casualties is preferableto the attrition nature of sequential operations.Quick, violent, and simultaneous action throughout thedepth of the defender’s battle space can hurt, confuse,and even paralyze an enemy just as he is most exposedand vulnerable. Such actions weaken theenemy’s will and do not allow his early successes tobuild confidence. <strong>Operations</strong> in depth prevent theenemy from gaining momentum in the attack. Suddenstrikes by both fire and maneuver from a varietyof directions—synchronized with other disruptive effectson the enemy such as jamming, smoke, and deception—canstall and overwhelm an attack even beforeit has begun. Commanders synchronize threecomplementary elements to defensive actions whenexecuting their defensive plan: deep, close, and rearoperations.Although deep, close, and rear operations may notbe contiguous to one another, commanders do not allowenemy forces freedom of movement within thegaps formed by extended, noncontiguous battles. Theydominate their battle space throughout the depth ofoperations, designating responsibilities for unoccupiedground and providing the combat power as needed toattack the enemy wherever he ventures. Security ofthe force is a continuous concern of the command, andcommanders must clearly designate this responsibility.Regardless of the proximity or separation of variouselements, command-ers see their defense as a continuouswhole. They fight deep, close, and rear operationsas one battle, synchronizing simultaneous operationsto a single purpose—the defeat of the enemy’sattack and early transition to the offense.DEEP OPERATIONSCommanders design deep operations to achievedepth and simultaneity in the defense and to secureadvantages for future operations. Deep operations disruptthe enemy’s movement in depth, destroy highpayofftargets vital to the attacker, and interrupt or denyvital enemy operating systems such as command, logistics,or air defense at critical times. As deep operationssucceed, they upset the attacker’s tempo and synchronizationof effects as the defender selectively suppressesor neutralizes some of the enemy’s operatingsystems to exploit the exposed vulnerability. Individualtargets in depth are only useful as they relate to thedestruction of a critical enemy operating system suchas air defense or CSS. As the defender denies freedomof maneuver to the attacker with deep operations,he also seeks to set the terms for the friendly forcetransition to offense.Deep operations provide protection for the forceas they disrupt, delay, or destroy the enemy’s abilityto bring combat power to bear on friendly close combat9-4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!