Functional Tactics: Walk-through Victory Starts Here!

UNCLASSIFIED
TRADOC G2: ACE Threats – Integration
Threat Tactics Course
Functional Tactics
Functional Analysis
Diagram Methodology
US Army TRADOC G2: ACE Threats - Integration
Distribution authorized to DoD and DoD contractors. Further dissemination only as directed by ACE
Threats-Integration, TRADOC G2 or higher DoD authority, as determined on 12 February 2015.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Terminal Learning Objective
 Action: Understand the core concepts and actions of threat
functional tactics Understand functional tactics.
 Condition: Given a professional education seminar; threat
training literature (U.S. Army TC 7-100 series); tactical vignettes
that illustrate operational environment (OE) conditions and
PMESII-PT variables; motivations, behavior, and characteristics
of a threat; and probable-possible functional actions and
enablers to achieve a mission task.
 Standard: Understand how the threat conducts functional
tactics in the conduct of military operations.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
How Threat Doctrine Developed
 Studied and analyzed─
 Recent and key historical combat and operational actions.
 Current doctrinal publications of several nations.
 Interviews with international officer representatives.
 After action reviews (AARs) of CTC battles and engagements.
 Removed culture-specific differences for a composite.
 Identified formations and groupings by function.
 Distilled “best practices”

= Basic functions are universal. Then―built
1 a doctrine that described these functions, and
2 a manner to employ them based on best observed practices.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
How is OPFOR Different From US?
 Threat not likely to have air superiority.
 Threat likely to be able to utilize criminal networks.
 Threat not willing to surrender initiative to build combat power.
 Threat seeks to fix and isolate over contend.
 Threat will accept high or complete casualty loss rate.
 Threat will routinely decentralize command and control (C2).
 Threat will fight to obtain or protect information.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
How OPFOR Thinks and Acts
 Threats are not casualty averse.
 Information warfare may be a purpose of combat action.
 Noncombatants are not “off limits” and may coerced to support.
 Fix combat power―Kill sustainment.
 Human solutions are often better than technical solutions.
 Reconnaissance is an offensive operation.
If you find yourself in a fair
fight, you didn't plan your
mission properly.
- COL David Hackworth
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
TRADOC G2: ACE Threats – Integration
Threat Tactics Course
Functional Analysis
Seeing differently
DOCTEMP dangers
Block Methodology
US Army TRADOC G2: ACE Threats - Integration
Distribution authorized to DoD and DoD contractors. Further dissemination only as directed by ACE
Threats-Integration, TRADOC G2 or higher DoD authority, as determined on 12 February 2015.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Actors in OE
Across entire Spectrum of conflict
The Enemy Cause
Actively
Supporting
Neutral
Sympathetic
(but not-supporting)
• Participating
• Purposefully &
Materially Supporting
• Engaged in Hostilities
• Possibly Co-optable/
persuadable
Lawful & Unlawful
Enemy Combatants
Extremist
• Radical
• Fanatical
• Cadre
• Diehard
U.S. & Host Country Goals
•
•
•
•
•
Sympathetic
(but not-supporting)
Actively
Supporting
Ambiguous
Vacillating
Opportunistic
Impressionable
Disinterested
Combatants
Coerced
Armed and/or Unarmed
Criminals
Locals
Noncombatants
Witting and Unwitting
Regional, National, and International Players
Note:
These categories are very general and the boundaries vague. Individuals and/or organizations may be placed in
several categories at any given time. The category(ies) they occupy are generally fluctuating and may be
fleeting, mission dependent, event- or agenda-oriented, or for any other reasons, affiliations, alliances,
motivations or opportunity.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Analysis by Function
 Functional Actions CAN BE PREDICTED, but not with
templates.
 Functional tactics is the idea that threat tactical action
is best understood and described by the functions
each actor or sub-element performs in order to bring
about mission accomplishment.
 Functional analysis is an intelligence analysis
methodology that uses the concepts of functional
tactics to predict enemy courses of action.
Functional analysis is designed to result in a graphic
depiction of how an adversary or enemy might or is
likely to conduct its operations in capabilities,
dispositions, and actions in order to accomplish a
particular type of mission.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
DOCTEMP Dangers
 Dangers

Not functionally based

Abstraction of disposition

No task organization

Not matched to an enemy

Can be used to mislead

No Counter-Visualization…

No explanation of “why”
Victory Starts Here!
0
UNCLASSIFIED
1
2
3 km
UNCLASSIFIED
DOCTEMP Artillery Example
 Why is the artillery here?
 Why grouped like this?
0
1
2
3
4
5km
DOCTEMPS are inherently incomplete. They show the WHAT without the WHY.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics
1
Determine Functions
2
3
Allocate resources
Synchronize
Action Force or Element―responsible to performing primary function
or task that accomplishes the overall mission goal or objective of
an action such as but not limited to:
Attack, Ambush, Raid, Exploitation, and/or
Main Defense, Shielding, Contact…Counterattack
Enabling Force or Element―in relation to the action force or element,
provides enabling functions which may include but are not limited to:
Disruption and/or Security, Fixing, Deception, and
Support and Specialist…e.g., C2, CSS, Reserve…
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
4-ways of Seeing Tactical Threat
Where are the
unit’s logistics?
Key systems?
How you
View
yourself
How You
View the
Enemy
(OE dependent)
Time? Resources?
How the
Enemy
Views
Himself
How the
Enemy
Views You
Enemy system’s ranges,
Tactics and Techniques
(comms or warfighting
functions)
What systems are the
biggest threat to the
enemy’s objectives?
 What key systems will the enemy target with enabling and
action elements?
 What is the main objective of the enemy’s tactical action?
 Where are the (friendly) assets? (coordination with S-3)
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Summary
 Function is an action or series and/or group of actions that
cause an effect or effects with the expectation of a predictable
outcome.
 Functional analysis is an intelligence analysis methodology
that uses the concepts of functional tactics to predict enemy
courses of action…why the enemy acts the way it does.
 Functional analysis is designed to result in a graphic depiction
of how an adversary or enemy might or is likely to conduct its
operations in capabilities, dispositions, and actions in order to
accomplish a particular type of mission.
The threat is a composite representation of realistic, robust,
and relevant adversaries and/or enemies that may confront U.S.
Army forces in varied OEs in an era of persistent conflict.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
TRADOC G2: ACE Threats – Integration
Threat Tactics Course
Functional Tactics Design –
Block Methodology
US Army TRADOC G2: ACE Threats - Integration
Distribution authorized to DoD and DoD contractors. Further dissemination only as directed by ACE
Threats-Integration, TRADOC G2 or higher DoD authority, as determined on 12 February 2015.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Methods
Mission: What is the end state?
Step 1: Identify Functions
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
Build Forward
Build Backward
Starts with indicators, first thing
someone may see on the ground
Follows Appendix B OPFOR
Tactical Task List subtask sequence
Enabling Element(s) first; Action
Element second
ID action form, executable task,
and purpose
Facilitate Functional Tactics
and/or Analysis discussion
Start with success
Action Element first; Enabling
Element(s) second
ID action form, executable
task, and purpose
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Example
Step 3: Synchronize
• Where do I have to be to employ
capability?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
RES
Keep focus on the mission
•T: Destroy SUST
• P: Gain key terrain
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
Mission: Destroy SUST
Keep focus on the mission
Step 1: Identify Functions
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
Work through the WHYs
before WHATs
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Step 3: Synchronize
• Where do I have to be to employ
capability?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
RES
Keep focus on the mission
•T: Destroy SUST
• P: Gain key terrain
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
Mission: Destroy SUST
Step 1: Identify Functions
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Action
• Accomplishes the mission
• How do I seize?
Assault Element
• T: Destroy SUST
• P: Gain key terrain
This is what accomplishes
the mission
Step 3: Synchronize
• Where do I have to be to employ
capability?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
IDF
RES
D
F
These make it possible for
the Action Element to
accomplish the Mission
Victory Starts Here!
F
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
Mission: Destroy SUST
Step 1: Identify Functions
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
Action
• Accomplishes the mission
• How do I seize?
Assault Element
• T: Destroy SUST
• P: Gain key terrain
Enabling
• Assists mission accomplishment
• How do assist seizure?
Fixing Element
• T: Fix
• P: Enable FOM
Fixing Element
• T: Fix and Disrupt
• P: Enable FOM
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Fires Element
These make it possible for
the Action Element to
accomplish the Mission
Step 3: Synchronize
• T: Suppress
• P: Enable FOM
Fires Element
• T: Suppress
• P: Restrict FOM
Security Element
• Where do I have to be to employ
capability?
• T: Screen
• P: Isolate Battlefield
Security Element
• T: Screen
• P: Isolate Battlefield
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
Mission: Destroy SUST
Step 1: Identify Functions
Action
• Accomplishes the mission
• How do I seize?
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
Enabling
• Assists mission accomplishment
• How do assist seizure?
Assault Element
• T: Destroy SUST
• P: Gain key terrain
• 1X Mech. INF PLT
Fixing Element
• T: Fix
• P: Enable FOM
• 1X Mech. INF SQD
Fixing Element
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Can this still accomplish
the mission?
• T: Fix and Disrupt
• P: Enable FOM
• 2X Mech. INF SQD
Fires Element
• T: Suppress
• P: Enable FOM
Step 3: Synchronize
• Where do I have to be to employ
capability?
• 3x120mm Mortar
Security Element
Security Element
• T: Screen
• P: Isolate Battlefield
• T: Screen
• P: Isolate Battlefield
• 1X Mech. INF SQD
• 1X Mech. INF SQD
Fires Element
• T: Suppress
• P: Restrict FOM
• 1X UAV 54x Cutlass
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics: Walk-through
Security Zone
IDF
RES
Support Zone
D
F
Are the elements where
they need to be to meet
their function?
Disruption Zone
F
Security Zone
Victory Starts Here!
UNCLASSIFIED
Battle Zone
UNCLASSIFIED
Functional Tactics: Walk-through
Step 2: Allocate Resources
• Who can do this?
• What do they need?
Step 3: Synchronize
• Where do I have to be to employ
capability?
• Assists mission accomplishment
• How do assist seizure?
Fixing Element
Assault Element
• T: Destroy SUST
• P: Gain key terrain
• 1X Mech. INF PLT
Are the elements where
they need to be to meet
their function?
DISRUPTION ZONE
Security Element
Security Element
• T: Screen
• P: Isolate Battlefield
• T: Screen
• P: Isolate Battlefield
• 1X Mech. INF SQD
• 1X Mech. INF SQD
DISRUPTION ZONE
• Start with success
• Action Element first; Enabling
Element(s) second
• ID action form, executable task,
and purpose
• Accomplishes the mission
• How do I seize?
Enabling
• T: Fix
• P: Enable FOM
• 1X Mech. INF SQD
Fixing Element
• T: Fix and Disrupt
• P: Enable FOM
• 2X Mech. INF SQD
SUPPORT ZONE
Step 1: Identify Functions
Action
BATTLE ZONE
Mission: Destroy SUST
Fires Element
• T: Suppress
• P: Enable FOM
• 3x120mm Mortar
Fires Element
• T: Suppress
• P: Restrict FOM
• 1X UAV 54x Cutlass
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED