Presentation is loading. Please wait.

Presentation is loading. Please wait.

Functional Analysis Diagram Methodology

Similar presentations


Presentation on theme: "Functional Analysis Diagram Methodology"— Presentation transcript:

1 Functional Analysis Diagram Methodology
Functional Tactics Functional Analysis Diagram Methodology

2 Terminal Learning Objective
Action: Understand the core concepts and actions of threat functional tactics Understand functional tactics. Condition: Given a professional education seminar; threat training literature (U.S. Army TC series); tactical vignettes that illustrate operational environment (OE) conditions and PMESII-PT variables; motivations, behavior, and characteristics of a threat; and probable-possible functional actions and enablers to achieve a mission task. Standard: Understand how the threat conducts functional tactics in the conduct of military operations.

3 How Threat Doctrine Developed
Studied and analyzed─ Recent and key historical combat and operational actions. Current doctrinal publications of several nations. Interviews with international officer representatives. After action reviews (AARs) of CTC battles and engagements. Removed culture-specific differences for a composite. Identified formations and groupings by function. Distilled “best practices” Basic functions are universal. Then―built a doctrine that described these functions, and a manner to employ them based on best observed practices. This process started in 1999 with the writing of the first OE White paper. While the white paper was being written, a group of people (Jon C. one of them) started working the tactics manual problem. The reviewed the various sources of data to rid the Army of the former Soviet based threat model. -Recent and historical key combat actions (ex: ) -Current doctrinal pubs: The CGSC class at the time had 90-some foreign officers that not only participated in this process but were happy to do so. The grunt work happened in the basement of BLDG 63 on post. There were tables covered with big terrain maps. The Tactics team would invite foreign officers to the basement and ask them to draw how they would conduct tactical actions. The key here is that they asked them to DRAW first then DESCRIBE. This accounted for different terms being used to describe the same actions. The team then distilled all of this information and created a composite model representation of the threat. Unfortunately work was stalled on this process with the events surround 9/11 and the directorate shifted focus to providing products focused on Iraq and Afghanistan. However, Army leadership knew these wars would draw down and re-started work on what become the “Hybrid Threat” nearly 10 years after work first started. This work resulted in what is now called Functional Tactics. = 1 2

4 How is OPFOR Different From US?
Threat not likely to have air superiority. Threat likely to be able to utilize criminal networks. Threat not willing to surrender initiative to build combat power. Threat seeks to fix and isolate over contend. Threat will accept high or complete casualty loss rate. Threat will routinely decentralize command and control (C2). Threat will fight to obtain or protect information. And here we

5 How OPFOR Thinks and Acts
Threats are not casualty averse. Information warfare may be a purpose of combat action. Noncombatants are not “off limits” and may coerced to support. Fix combat power―Kill sustainment. Human solutions are often better than technical solutions. Reconnaissance is an offensive operation. And here we If you find yourself in a fair fight, you didn't plan your mission properly. - COL David Hackworth

6 Questions?

7 Seeing differently DOCTEMP dangers Block Methodology
Functional Analysis Seeing differently DOCTEMP dangers Block Methodology This is an introductory orientation on Analysis and Control Element (ACE) Threats Integration resources Processes and Products… and access to the “who” is at Analysis and Control Element (ACE) Threats Integration for― Subject Matter Expertise. ..And if we cannot answer your issue, we will assist you in finding someone who can. Our mission is to support YOU.

8 Actors in OE Across entire Spectrum of conflict The Enemy Cause
Extremist Sympathetic (but not-supporting) Actively Supporting Lawful & Unlawful Enemy Combatants Across entire Spectrum of conflict The Enemy Cause U.S. & Host Country Goals Coerced Participating Purposefully & Materially Supporting Engaged in Hostilities Possibly Co-optable/ persuadable Radical Fanatical Cadre Diehard Combatants Note: These categories are very general and the boundaries vague. Individuals and/or organizations may be placed in several categories at any given time. The category(ies) they occupy are generally fluctuating and may be fleeting, mission dependent, event- or agenda-oriented, or for any other reasons, affiliations, alliances, motivations or opportunity. Neutral Regional, National, and International Players Witting and Unwitting Noncombatants Locals Ambiguous Vacillating Opportunistic Impressionable Disinterested Armed and/or Unarmed Criminals

9 Analysis by Function Functional Actions CAN BE PREDICTED, but not with templates. Functional tactics is the idea that threat tactical action is best understood and described by the functions each actor or sub-element performs in order to bring about mission accomplishment. Functional analysis is an intelligence analysis methodology that uses the concepts of functional tactics to predict enemy courses of action. Functional analysis is designed to result in a graphic depiction of how an adversary or enemy might or is likely to conduct its operations in capabilities, dispositions, and actions in order to accomplish a particular type of mission. “a graphic depiction of how” sounds like DOCTYPE, right?

10 DOCTEMP Dangers Dangers Not functionally based
Abstraction of disposition No task organization Not matched to an enemy Can be used to mislead No Counter-Visualization… No explanation of “why” km

11 DOCTEMP Artillery Example
1 2 3 4 5km Why is the artillery here? Why grouped like this? Why is the artillery here? Approx 1/3 of D-30 range (15.3) from assumed FLOT (main system of USSR when this was developed) Why grouped like this? Likely for graphic convenience/simplicity Disposition of Arty is a trade-off of convenience (C2, SUST) versus survivability Q: Did the Russians deploy this way in Ukraine? (yes, sort of – UKR has minimal Ctr-Btry capability) Q: Would they deploy like this against the US? (probably not – too easily killed) DOCTEMPS are inherently incomplete. They show the WHAT without the WHY.

12 Functional Tactics Determine Functions 1 Allocate resources 2 Synchronize 3 This seems really simple. Deceptively so. , Challenge them by asking them to draw tactics. Jon’s opinion is that this skill is lacking across the Army and that it demonstrates an inability to understand tactics at a basic level. History on Blue: Summer 2008, Gen Casey is CoS, he sees the future of drawing down in Iraq and Afghanistan and knows units will still need to train: What will CTC training rotation look like after the draw down? Came to TRISA and TRISA participated in the process to determine this, created ‘blue prints’. CTID took the Blue representation from BLUE DOCTRINE, chose an HBCT at Erwin and drew six blue-prints: MCO defense, offense, and stability AND IW defense, offense, AND stability. This brought up significant blue doctrinal issues before the Army. This issue has still not been addressed. CTID is today working on FM 3-96 with the Army to show a strong threat representation where the Blue doctrinal tactics can’t fight well. WE DON’T TALK CONTROL MEASURES AS TACTICS. We talk people and actions for tactics. No phase lines, no axes of defense, no objectives etc. Ex. Tell a blue guy to draw an attack and they will ID an objective and plan their attack without EVER DESCRIBING THE THREAT. Jon is visiting Huachuca to fix this issue. The HT employs functional tactics. The COMMANDER determines the functions that need to be performed as part of an action to bring about its success. Then it allocates appropriate actors to each function and synchronizes the effort (see bullets #1-3). A number of different functions must be executed each time an HT force attempts to accomplish a mission. An HT commander identifies the specific functions (listed under ‘functions’) he intends his various subordinate forces or elements to perform. The functions do not change, regardless of where the force or element might happen to be located on the battlefield. However, the function of a particular force or element may change during the course of the battle. While the various functions required to accomplish any given mission can be quite diverse, they can be broken down into two very broad categories: action and enabling. Key element of Functional tactics is the HOW….HOW is the threat operating? What is their function? List of functions was derived from this analysis of HOW. Action Force or Element―responsible to performing primary function or task that accomplishes the overall mission goal or objective of an action such as but not limited to: Attack, Ambush, Raid, Exploitation, and/or Main Defense, Shielding, Contact…Counterattack Enabling Force or Element―in relation to the action force or element, provides enabling functions which may include but are not limited to: Disruption and/or Security, Fixing, Deception, and Support and Specialist…e.g., C2, CSS, Reserve…

13 4-ways of Seeing Tactical Threat
How you View yourself How You View the Enemy How the Enemy Views Himself How the Enemy Views You Where are the unit’s logistics? Key systems? Enemy system’s ranges, Tactics and Techniques (comms or warfighting functions) What systems are the biggest threat to the enemy’s objectives? (OE dependent) Time? Resources? •How X views itself. This must be the first step of any cross cultural analysis. What are our fundamental beliefs about our motives, our values, and ourselves? •How Y views itself. The next critical step is to identify what our “sample group believes about themselves.” Collaboration members must be careful not to allow personal judgment to color this analysis. •How X views Y. The next step is ‘how we view them’ as well as identifying disconnects between ‘how we view them’ and ‘how they view themselves’ –these critical friction points must be addressed through cultural analysis and planning. •How Y views X. In turn, we must understand how they view us vice how we view our actions and ourselves. Closing the gap between these two perspectives should be a goal in the planning process. What key systems will the enemy target with enabling and action elements? What is the main objective of the enemy’s tactical action? Where are the (friendly) assets? (coordination with S-3)

14 Summary Function is an action or series and/or group of actions that cause an effect or effects with the expectation of a predictable outcome. Functional analysis is an intelligence analysis methodology that uses the concepts of functional tactics to predict enemy courses of action…why the enemy acts the way it does. Functional analysis is designed to result in a graphic depiction of how an adversary or enemy might or is likely to conduct its operations in capabilities, dispositions, and actions in order to accomplish a particular type of mission. And here we The threat is a composite representation of realistic, robust, and relevant adversaries and/or enemies that may confront U.S. Army forces in varied OEs in an era of persistent conflict.

15 Questions?

16 Functional Tactics Design – Block Methodology
This is an introductory orientation on Analysis and Control Element (ACE) Threats Integration resources Processes and Products… and access to the “who” is at Analysis and Control Element (ACE) Threats Integration for― Subject Matter Expertise. ..And if we cannot answer your issue, we will assist you in finding someone who can. Our mission is to support YOU.

17 Functional Tactics: Methods
Build Forward Starts with indicators, first thing someone may see on the ground Follows Appendix B OPFOR Tactical Task List subtask sequence Enabling Element(s) first; Action Element second ID action form, executable task, and purpose Build Backward Facilitate Functional Tactics and/or Analysis discussion Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Mission: What is the end state? Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Step 2: Allocate Resources Who can do this? What do they need? Instructor Walk-Through Guide: This flow chart is designed to facilitate the class’s first discussion on functional tactics. Display this flow chart and remind students that they have a copy of the Threat Tactics Taxonomy to reference as you walk them through the concept of functional tactics. Now that you’ve been introduced to the concept of functional tactics, we are going to do a mental exercise to begin changing our thought process in the way we approach discussions on tactics. In order to facilitate this, we are going to walk through a threat action and plan the action as though we are the Red commander. [Refer to Flow Chart] The first thing the class must consider is the Threat Action you as the commander must perform. For this exercise discuss SEIZE AIRFIELD. Step 1: ID Functions The three functions are Action, Enable, and Support. This is a good opportunity to remind students that support technically falls under enable in doctrine but it is important enough when planning a threat action that it must be addressed separately. Action: How do I seize? 1xassault element as the Action Element Enabling : How do I assist seizure 1xBreech the airfield perimeter 1x security element conducting screening to isolate the battlefield 1x ambush element prepared to execute a containment ambush on the enemy QRF to isolate the battlefield 1x assault element to engage external airfield security forces to fix them 1x fires element to engage internal airfield security to fix them Step 2: Allocate Resources Who can do this and what do they need? Step 3: Synchronize Where do I have to be to employ my capability? In this example we show synchronization or the “where” by identifying a zone on the battlefield that function would be located Example Step 3: Synchronize Where do I have to be to employ capability?

18 Functional Tactics: Walk-through
And here we RES Keep focus on the mission T: Destroy SUST P: Gain key terrain

19 Functional Tactics: Walk-through
Keep focus on the mission Mission: Destroy SUST Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Work through the WHYs before WHATs Step 2: Allocate Resources Who can do this? What do they need? Instructor Walk-Through Guide: This flow chart is designed to facilitate the class’s first discussion on functional tactics. Display this flow chart and remind students that they have a copy of the Threat Tactics Taxonomy to reference as you walk them through the concept of functional tactics. Now that you’ve been introduced to the concept of functional tactics, we are going to do a mental exercise to begin changing our thought process in the way we approach discussions on tactics. In order to facilitate this, we are going to walk through a threat action and plan the action as though we are the Red commander. [Refer to Flow Chart] The first thing the class must consider is the Threat Action you as the commander must perform. For this exercise discuss SEIZE AIRFIELD. Step 1: ID Functions The three functions are Action, Enable, and Support. This is a good opportunity to remind students that support technically falls under enable in doctrine but it is important enough when planning a threat action that it must be addressed separately. Action: How do I seize? 1xassault element as the Action Element Enabling : How do I assist seizure 1xBreech the airfield perimeter 1x security element conducting screening to isolate the battlefield 1x ambush element prepared to execute a containment ambush on the enemy QRF to isolate the battlefield 1x assault element to engage external airfield security forces to fix them 1x fires element to engage internal airfield security to fix them Step 2: Allocate Resources Who can do this and what do they need? Step 3: Synchronize Where do I have to be to employ my capability? In this example we show synchronization or the “where” by identifying a zone on the battlefield that function would be located Step 3: Synchronize Where do I have to be to employ capability?

20 Functional Tactics: Walk-through
And here we RES Keep focus on the mission T: Destroy SUST P: Gain key terrain

21 Functional Tactics: Walk-through
Action Accomplishes the mission How do I seize? Mission: Destroy SUST Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Assault Element T: Destroy SUST P: Gain key terrain This is what accomplishes the mission Step 2: Allocate Resources Who can do this? What do they need? Step 3: Synchronize Where do I have to be to employ capability?

22 Functional Tactics: Walk-through
IDF D And here we RES F These make it possible for the Action Element to accomplish the Mission F

23 Functional Tactics: Walk-through
Action Accomplishes the mission How do I seize? Enabling Assists mission accomplishment How do assist seizure? Mission: Destroy SUST Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Fixing Element T: Fix P: Enable FOM Assault Element T: Destroy SUST P: Gain key terrain These make it possible for the Action Element to accomplish the Mission Fixing Element T: Fix and Disrupt P: Enable FOM Step 2: Allocate Resources Who can do this? What do they need? Fires Element T: Suppress P: Enable FOM Fires Element T: Suppress P: Restrict FOM Step 3: Synchronize Where do I have to be to employ capability? Security Element T: Screen P: Isolate Battlefield Security Element T: Screen P: Isolate Battlefield

24 Functional Tactics: Walk-through
Action Accomplishes the mission How do I seize? Enabling Assists mission accomplishment How do assist seizure? Mission: Destroy SUST Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Fixing Element T: Fix P: Enable FOM Assault Element T: Destroy SUST P: Gain key terrain 1X Mech. INF SQD 1X Mech. INF PLT Step 2: Allocate Resources Who can do this? What do they need? Fixing Element T: Fix and Disrupt P: Enable FOM Can this still accomplish the mission? 2X Mech. INF SQD Fires Element T: Suppress P: Enable FOM Step 3: Synchronize Where do I have to be to employ capability? 3x120mm Mortar Security Element T: Screen P: Isolate Battlefield Security Element T: Screen P: Isolate Battlefield Fires Element T: Suppress P: Restrict FOM 1X Mech. INF SQD 1X Mech. INF SQD 1X UAV 54x Cutlass

25 Functional Tactics: Walk-through
Security Zone IDF D And here we RES Support Zone F Are the elements where they need to be to meet their function? Disruption Zone Battle Zone F Security Zone

26 Functional Tactics: Walk-through
Action Accomplishes the mission How do I seize? Enabling Assists mission accomplishment How do assist seizure? Mission: Destroy SUST Step 1: Identify Functions Start with success Action Element first; Enabling Element(s) second ID action form, executable task, and purpose Fixing Element T: Fix P: Enable FOM BATTLE ZONE Assault Element T: Destroy SUST P: Gain key terrain DISRUPTION ZONE 1X Mech. INF SQD 1X Mech. INF PLT Step 2: Allocate Resources Who can do this? What do they need? Fixing Element T: Fix and Disrupt P: Enable FOM DISRUPTION ZONE Are the elements where they need to be to meet their function? 2X Mech. INF SQD SUPPORT ZONE Fires Element T: Suppress P: Enable FOM Step 3: Synchronize Where do I have to be to employ capability? 3x120mm Mortar Security Element T: Screen P: Isolate Battlefield Security Element T: Screen P: Isolate Battlefield Fires Element T: Suppress P: Restrict FOM 1X Mech. INF SQD 1X Mech. INF SQD 1X UAV 54x Cutlass

27 Questions?


Download ppt "Functional Analysis Diagram Methodology"

Similar presentations


Ads by Google