Army - fm-7-100 - Opposing Force Doctrinal Framework
Army - fm-7-100 - Opposing Force Doctrinal Framework
OPFOR
Opposing Force
Doctrinal Framework
and Strategy
MAY 2003
MAXIE L. MCFARLAND
Deputy Chief of Staff for Intelligence
U.S. Army Training and Doctrine Command
FM 7-100
Opposing Force
Doctrinal Framework and Strategy
Contents
Page
i
FM 7-100 _________________________________________________________________________________
GLOSSARY .................................................................................................Glossary-1
BIBLIOGRAPHY.................................................................................... Bibliography-0
INDEX ............................................................................................................... Index-1
ii
Preface
This manual is one of a series that describes a contemporary Opposing Force
(OPFOR) for training U.S. Army commanders, staffs, and units. See the Refer-
ence section for a list of the manuals in this series. Together, these manuals out-
line an OPFOR than can cover the entire spectrum of military and paramilitary
capabilities against which the Army must train to ensure success in any future
conflict.
Applications for this series of manuals include field training, training simula-
tions, and classroom instruction throughout the Army. All Army training venues
should use an OPFOR based on these manuals, except when mission rehearsal or
contingency training requires maximum fidelity to a specific country-based
threat. Even in the latter case, trainers should use appropriate parts of the
OPFOR manuals to fill information gaps in a manner consistent with what they
do know about a specific threat.
The proponent for this publication is HQ TRADOC. Send comments and recom-
mendations on DA Form 2028 directly to the OPFOR and Threat Integration Di-
rectorate of the TRADOC Office of Deputy Chief of Staff for Intelligence at the
following address: Director, OPFOR and Threat Integration Directorate, ATTN:
ATIN-T (Bldg 53), 700 Scott Avenue, Fort Leavenworth, KS 66027-1323.
This publication is available on the Reimer Digital Library at
http://www.adtdl.army.mil. Readers should monitor that site and also the
TRADOC DCSINT-Threats World Wide Web (WWW) site at
http://www.leavenworth.army.mil/threats/index for the status of this manual and
information regarding updates. Periodic updates, subject to the normal approval
process, will occur as a result of the normal production cycle in accordance with
TRADOC regulation 25-36, paragraphs 2-17 and 4-7. The date on the cover and
title page of the electronic version will reflect the latest update.
Unless this publication states otherwise, masculine nouns or pronouns do not re-
fer exclusively to men.
iii
Introduction
This manual is the capstone document for the FM 7-100 series, which describes a
contemporary Opposing Force (OPFOR) that exists for the purpose of
training U.S. forces for potential combat operations. This OPFOR reflects the
characteristics of military and paramilitary forces that may be present in the
contemporary operational environment (COE). Like those real-world
threats, the OPFOR will continue to present new and different challenges for
U.S. forces. The COE is constantly changing, and it is important for U.S. Army
training environments to keep pace with real-world developments.
iv
______________________________________________________________________________ Introduction
CRITICAL VARIABLES
Any OE, in the real world or in the
training environment, can be defined in Critical Variables of COE
terms of eleven critical variables. While • Nature and Stability of the State.
these variables can be useful in • Regional and Global Relationships.
describing the overall (strategic) • Economics.
environment, they are most useful in • Sociological Demographics.
defining the nature of specific OEs.
• Information.
Each of these “conditions, circumstances,
• Physical Environment.
and influences” and their possible
• Technology.
combinations will vary according to
• External Organizations.
the specific situation. In this sense,
• National Will.
they are “variables.” These variables
• Time.
are interrelated and sometimes
overlap. Different variables will be • Military Capabilities.
more or less important in different
situations. Each OE is different, because the content of the variables is different.
Only by studying and understanding these variablesand incorporating them
into its trainingwill the U.S. Army be able to keep adversaries from using them
against it or to find ways to use them to its own advantage.
v
FM 7-100 _________________________________________________________________________________
Economics
The economic variable establishes the boundaries between the “haves” and the
“have-nots.” This gap of economic differences among nation-states and other ac-
tors can cause conflict. Economic superiority, rather than military superiority,
may be the key to power or dominance within a region. However, economic posi-
tion often represents a nation or non-state actor’s ability to buy military technol-
ogy or to conduct prolonged operations.
Economics help define the relationship between a nation or non-state actor and
other actors at the regional or global level. These regional or global economic re-
lationships could result in military or political assistance.
Sociological Demographics
The demographics variable includes the cultural, religious, and ethnic makeup of
a given region, nation, or non-state actor. Extreme devotion to a particular cause
or significant hatred of a particular group may provide an enemy with an un-
shakable will and a willingness to die for the cause. U.S. forces may also find
that large segments of the population around them are sympathetic to the same
cause as the enemy force. The needs of the local population can create heavy de-
mands on U.S. military units, particularly their supply and medical systems.
Refugees and internally displaced persons may increase the complexity of the
environment. The enemy may use civilians as shields or obstacles or as cover for
hostile intelligence services.
Information
Media and other information means can make combat operations transparent to
the world, visible to all who have access to data. Various actors seek to use per-
ception management to control and manipulate how the public sees things. They
will exploit U.S. mistakes and failures and use propaganda to sway the local
population to support their cause. Media coverage can impact on U.S. political
decision making, international opinion, or the sensitivities of coalition members.
Even without sophisticated sensors and information systems, actors native to the
area or region often have greater situational awareness than U.S. forces. Various
actors are able to access commercial systems (such as satellite communications
and imagery) for the larger picture. For a more detailed view, they can use hu-
man networks operating over normal telephone lines or with cellular telephones
to maintain situational awareness.
Physical Environment
The main elements in the physical environment are terrain and weather. Poten-
tial enemies clearly understand that less complex and open environments favor a
U.S. force with its long-range, precision-guided weapons and sophisticated re-
connaissance capability. So they will try to avoid the types of operations and en-
vironments for which such U.S. forces are optimized. They will try to operate in
urban areas and other complex terrain and in weather conditions that may ad-
versely affect U.S. military operations and mitigate technological advantages.
vi
______________________________________________________________________________ Introduction
Technology
The technology that nations or non-state actors can bring to the OE includes
what they can develop and produce, as well as what they could import. Access to
technological advances available on the global market is slowly eating away at
the technological advantage the United States has enjoyed in the past.
It is likely that some high-end forces in a particular region of the world could
field a few systems that are more advanced than those of the U.S. force deployed
there. Easy access to new technology allows potential adversaries to achieve
equality or even overmatch U.S. systems in selected niche areas. Many countries
are trying to acquire relatively low-cost, high-payoff, new technologies. In addi-
tion, upgrades and hybridization allow older systems to compete with more mod-
ern capabilities, thus neutralizing the technical advantage of many modern
forces. In urban areas or other complex terrain, less advanced systems may still
find effective uses. Various actors may find adaptive and innovative ways of us-
ing systems for other than their originally intended applications.
External Organizations
When the U.S. Army goes into a failed state or into areas torn by conflict, it is
likely to find international humanitarian relief organizations at work there.
These external organizations continue to grow in influence and power, as well as in
willingness to become involved in crisis situations that were previously purely mili-
tary operations. These external organizations can have both stated and hidden in-
terests and objectives that can either assist or hinder U.S. mission accomplishment.
The presence of transnational corporations operating in a country or region can also
place added pressure on U.S. forces to avoid collateral damage to civilian life and
property. U.S. forces may have to divert troops and resources from their assigned
missions to conduct rescues or provide security for various external organizations.
National Will
The variable of national will reflects how much each country’s people and gov-
ernment are behind what the military or paramilitary forces are doing. This can
influence the objectives of a conflict, its duration, and the conditions for ending it.
A country will try to attack its opponent’s national will and still preserve its own.
Clearly, most foreign countries view U.S. national will as a point of vulnerability.
Thus, a potential adversary may perceive the collective will of his people as a
comparative advantage against the United States.
History has proven that battlefield victory does not always go to the best-trained,
best-equipped, and most technologically advanced force. Victory often goes to the
side that most wants to win, needs to win, and is willing to sacrifice to do so.
Time
In most cases, potential opponents of the United States view time as being in
their advantage. When U.S. forces have to deploy into the area over long time
and distance, the opponent can use this time to adjust the nature of the conflict
to something for which the U.S. forces are not prepared.
First, the opponent will try to control the entry of U.S. forces into the area. If ac-
cess control fails, the enemy still has the opportunity to oppose lightly equipped
vii
FM 7-100 _________________________________________________________________________________
U.S. early-entry units and try to prevent full deployment of the rest of the force.
The opponent will try to speed up the tempo, to rapidly defeat its local or re-
gional enemy or to defeat U.S. early-entry forces before the United States can
deploy overwhelming military power. If that fails, the opponent will try to pro-
long the conflict and to outlast the U.S. will to continue.
Military Capabilities
Military capabilities of a nation-state or non-state actor are measured in relative
terms, in comparison to the capabilities of other actors against which they might
be applied. Most of the military forces in the world continue to operate in conven-
tional ways, which remain sufficient against other local and regional actors.
However, once the United States becomes involved, these same military forces
may have to use adaptive or asymmetric approaches. Various nations and
other foreign entities around the world study the United States and its military
forces. They generally view the United States as a major power—the world’s only
superpower—with an overall advantage in technology and warfighting capabil-
ity. Despite these strengths, other actors see some weaknesses that they may be
able to exploit. They can use these perceptions as a guide to optimizing the effec-
tiveness of their own forces and to find ways to negate current U.S. advantages.
Military capabilities may be the most critical and the most complex variable that
affects military operations. However, the military variable does not exist in isolation
from the other variables that help determine the overall OE. It interacts with the
other variables, and all the other variables can affect military capabilities. Potential
enemies can use any or all of these factors against the Army as it tries to accomplish
its missions in various parts of the world or in various training environments.
REAL WORLD
In the real world, the COE is the entire set of conditions, circumstances, and influ-
ences that U.S. Armed Forces can expect to face when conducting military opera-
tions to further the national interests of the United States, its friends, and allies.
The COE is “contemporary” in the sense that it does not represent conditions that
existed only in the past or that might exist only in the remote future, but rather
those conditions that exist today and in the clearly foreseeable, near future. This
COE consists not only of the military and/or paramilitary capabilities of potential
real-world adversaries, but also of the manifestations of the ten other variables that
help define any OE.
TRAINING
In training environments, the COE is the OE created to approximate the demands
of the real-world COE and to set the conditions for desired training outcomes. This
involves the appropriate combination of an OPFOR (with military and/or paramili-
tary capabilities representing a composite of a number of potential adversaries) and
other OE variables in a realistic, feasible, and plausible manner. The purpose of the
COE in training simulations is to produce the necessary training outcomes.1
1
The same type of COE conditions can be created to support some combat development activities that do not re-
quire simulation of a specific real-world potential adversary. However, some combat development activities may
require portrayal of an OE that extends further into the future than is typical for the COE.
viii
______________________________________________________________________________ Introduction
Even in the COE for training, it is possible to speak of an overall COE that ad-
dresses the qualities of virtually any OE in which the units or individuals being
trained might be called upon to operate. In this sense, there are the same
“constants” as in the real-world COE.
ENEMY
The U.S. Army defines enemy as “the individual, group of individuals (organized
or not organized), paramilitary or military force, national entity, or national alli-
ance that is in opposition to the United States, its allies, or multinational partners.”
In other words, the enemy is whoever is actually opposing the United States in a
particular conflict.2 Thus, this term is synonymous with adversary or opponent.
2
This definition of enemy is from the U.S. point of view. After this Introduction, the chapters of this manual address
their topics from the OPFOR point of view. So, friendly refers to the OPFOR and its allies, and enemy refers to the
enemy of the OPFOR, which may be an opponent within its own country or region or an extraregional opponent
(normally the United States or a U.S.-led coalition).
ix
FM 7-100 _________________________________________________________________________________
THREAT
A potential adversary is sometimes designated as a threat. In this sense, the
Army defines threat as “any specific foreign nation or organization with inten-
tions and military capabilities that suggest it could become an adversary or chal-
lenge the national security interests of the United States or its allies.” Once hos-
tilities actually begin, the threat becomes the enemy.
OPPOSING FORCE
An Opposing Force (OPFOR) is a training tool that should allow the U.S. Army to
train against a challenging and plausible sparring partner that represents the wide
range of possible opponents the Army could face in actual conflict. It enables train-
ing of all arms of the Army and prepares the Army for potential combat operations.3
During the road to war leading up to events in a training scenario, the OPFOR
may play the role of a “threat” (potential enemy) that is on the verge of becoming
an enemy. However, the actual training event usually deals with a state of hos-
tilities. Thus, once hostilities begin in the training event, the OPFOR acts as the
“enemy” of the U.S. force in the training environment.4
During the Cold War period, the Army employed OPFORs based on specific real-
world threats. However, the Army needs a different type of OPFOR to meet its
training requirements for the COE.
3
Although the OPFOR is primarily a training tool, it may be used for other purposes. For example, some combat de-
velopment activities that do not require simulation of a specific real-world potential adversary may use an OPFOR to
portray the “threat” or “enemy.”
4
From the OPFOR point of view, its leadership plans and develops forces and methods to deal with one or more
threats to its own interests, goals, or survival.
x
______________________________________________________________________________ Introduction
Contemporary OPFOR
Training U.S. forces for the COE
requires a different kind of OPFOR Contemporary OPFOR
from that of the past. The contemporary
OPFOR must be less predictable and A plausible, flexible military and/or
not based on the armed forces of a par- paramilitary force representing a
ticular country. In today’s world, the composite of varying capabilities of
U.S. Army must be prepared to go into actual worldwide forces, used in
any OE and perform its full range of lieu of a specific threat force, for
missions. It must be ready to do so in training and developing U.S. forces.
the face of a wide variety of possible
threats and at the same time be prepared to deal with third-party actors that
may have other interests. Not all threats are purely military in nature. There-
fore, the U.S. Army now defines an OPFOR as “a plausible, flexible military
and/or paramilitary force representing a composite of varying capabilities of ac-
tual worldwide forces, used in lieu of a specific threat force, for training and de-
veloping U.S. forces.”
Thus, in some training environments, a military force alone may be the OPFOR.
In other cases, military forces may have paramilitary forces acting in loose af-
filiation with them, or acting separately from them within the same training en-
vironment. These relationships depend on the scenario, which is driven by train-
ing requirements.
Various agencies and experts have different lists of real-world threats the United
States might have to face. If the U.S. Army were to pick any one of these threats
as the threat against which to train, that threat would almost certainly not be
the one it would actually fight. What is needed is a composite that is representa-
tive of the full range and variety of possible threats and OEs. It must have a bit
of everythingit could be virtually anybody, anywhere. Therefore, this manual
defines this representative composite in a way that is flexible enough to fit the
most demanding U.S. Army training requirements and provides a framework for
training that creates the leaders, soldiers, and unit skills necessary for success
on the next battlefield.
xi
FM 7-100 _________________________________________________________________________________
NATION-STATE ACTORS
Nation-states fall into four basic categories according to their roles in the inter-
national community. The categories are core states, transition states, rogue
states, and failed or failing states.
The category of core states includes more than half of the nearly 200 countries in
the world today. These are basically democratic (although to varying degrees)
and share common values and interests. Within this larger group, there is an
“inner core” of major powers. These are the advanced countries, including the
United States, that generally dominate world politics. Most conflict with global
consequences will involve the core states in some fashion or another.
Transition states are other larger, industrial-based countriesmostly emerging
regional powersthat are striving to become major powers. High-end transition
states are moving from an industrial-based society to an information-based soci-
ety. Low-end transition states are seeking to move from an agricultural-based so-
ciety to an industrial base. As states try to make this transition, there are cycles
of political stability and instability, and the outcome of the transition is uncer-
tain. Some transition states may successfully join the ranks of core states and
even become major powers within that context; others may become competitors.
Rogue states are those that are hostile to their neighbors or to core states’ inter-
ests. These countries can sponsor international terrorism or even confront U.S.
military forces operating in the region. Failed or failing states are fragmented in
such a way that a rule of law is absent; their instability is a threat to their neigh-
bors and the core states.
Countries can move from one category to another, as conditions change. Some-
times countries join together in multinational alliances and coalitions. Together,
they have more strength and can become a power to be reckoned with.
NON-STATE ACTORS
Non-state actors are those that do not represent the forces of a particular nation-
state. Such non-state elements include rogue actors as well as third-party actors.
Like rogue states, rogue actors are hostile to other actors; however, they may be
present in one country or extend across several countries. Examples include in-
surgents, guerrillas, mercenaries, and transnational or subnational political
movements. Particular sources of danger are terrorists and drug-trafficking or
criminal organizations, since they may have the best technology, equipment, and
weapons available, simply because they have the money to buy them. These non-
state rogue actors may use terror tactics and militarily unconventional methods
to achieve their goals.
Third-party actors may not be hostile to other actors. However, their presence,
activities, and interests can affect the ability of military forces to accomplish
their mission when operating in a foreign country. These third-party actors can
be refugees, internally displaced persons, and other civilians on the battlefield,
including international humanitarian relief agencies, transnational corporations,
and the news media. These individuals and groups bring multiple sources of mo-
tivation, ideology, interests, beliefs, or political affiliations into consideration.
They may be sources of civil unrest. Their presence may require military forces to
xii
______________________________________________________________________________ Introduction
CONTEMPORARY OPFOR
This manual describes the doctrinal framework and strategy of a flexible, think-
ing, adaptive, contemporary OPFOR that applies its doctrine with considerable
initiative. (See the definition of contemporary OPFOR above.) It is applicable to
the entire training community, including the OPFORs at all of the combat train-
ing centers (CTCs), the TRADOC schools, and units in the field. It provides an
OPFOR that believes that, through adaptive use of all available forces and capa-
bilities, it can create opportunities that, properly leveraged, can allow it to fight
and win, even against a technologically superior opponent such as the United
States.
BASELINE
As a baseline for developing specific OPFORs for specific training environments,
this manual describes an OPFOR that is representative of contemporary nation-
states. This composite of the characteristics of real-world military and paramili-
tary forces provides a framework for the realistic and relevant portrayal of capa-
bilities and actions that U.S. armed forces might face in the COE.
For this composite of real-world threats, the manual refers to the country in
question as “the State.”5 It describes this artificial country in terms of the eleven
critical variables of the COE. As the baseline for the contemporary OPFOR that
is representative of real-world forces, the State is not a peer competitor of the
United States. However, it is a dominant power in its region of the world and is
capable of challenging U.S. interests there. The general characteristics of the
State could fit a number of different types of potential adversaries in a number of
different scenarios.
Like most countries in the world, the State does not design its forces just to fight
the United States. It designs them principally to deal with regional threats and
to take advantage of regional opportunities. Therefore, the State’s national secu-
rity strategy (including its doctrine, force design, and investment strategy) fo-
cuses primarily on maintaining and expanding its position as a regional power. It
develops its military forces in a way that ensures conventional power superiority
over any of its regional neighbors. These forces, together with the State’s other
instruments of power, make it a dominant force in its region.
5
In specific U.S. Army training environments, the generic name of the State may give way to other (fictitious)
country names such as Atlantis, Upper Flambokia, or Westland.
xiii
FM 7-100 _________________________________________________________________________________
At the same time, the State is aware that aggressive pursuit of its regional goals
might lead to intervention by a major power, such as the United States, from out-
side the region. To the extent possible, therefore, it invests in technologies and
capabilities that have utility against both regional and extraregional opponents.
The basic force structure of the OPFOR is the same for either type of threat. The
State must go to waror continue the war after extraregional inter-
ventionwith whatever it had going into the war.
When an extraregional power intervenes with sufficient force to overmatch the
State’s, the State has to adapt its patterns of operation. It realizes that the forces
and technology that allow it to dominate its neighbors may not be a match for the
modern, high-technology forces of a wealthy extraregional power like the United
Statesat least not in a head-to-head conventional confrontation. However, it
can use those means in creative and adaptive ways. To the maximum extent pos-
sible, the State plans and trains for adaptive operations and how it will make the
transition to them. It is the combination of the State’s capabilities and its adap-
tive strategy, operations, and tactics that make it believe it can take on such an
extraregional force and win.
At the strategic level, the State’s ability to challenge U.S. interests includes
not only the military and paramilitary forces of the State, but also the State’s
diplomatic-political, informational, and economic instruments of power. Rarely
would any country engage the United States or a U.S.-led coalition with purely
military means. It is also possible that the State could be part of an alliance or
coalition, in which case the OPFOR could include allied forces. These nation-
state forces may also operate in conjunction with non-state actors such as insur-
gents, terrorists, and drug or criminal organizations.
The FM 7-100 series, as a whole, covers not only the military and paramilitary
forces of the State, but also other, non-state paramilitary and nonmilitary organiza-
tions present in the State’s region of the world. An extraregional power becoming in-
volved in that region may have to deal with any or all of these types of military, pa-
ramilitary, and nonmilitary elements. It might encounter these elements individu-
ally or, more likely, in combination with other such elements. Whether these ele-
ments operate in concert or independently, they are an important part of the COE.
Trainers need to consider the total OE and all instruments of power at the disposal
of the State and the OPFORnot just the military element, but also diplomatic-
political, informational, and economic means. For a nation-state, these are in-
struments of national power. For non-state actors whose forces are paramilitary
in nature, the other three instruments of power are generally present to one de-
gree or another. Together, these instruments represent the power that actors can
bring to bear against the United States.
FLEXIBILITY
As a training tool, the OPFOR must be a challenging, uncooperative sparring
partner, capable of stressing any or all battlefield operating systems of the U.S.
force. However, it also must be tailored to meet training requirements.
In the OPFOR baseline presented in this manual, the FM authors often say that
the State or the OPFOR “may” be able to do something or “might” or “could” do
something. They often use the progressive forms of verbs to say that the State
xiv
______________________________________________________________________________ Introduction
THINKING
This manual describes how the OPFOR thinks, especially how it thinks about
fighting its regional neighbors and/or the United States. This thinking deter-
mines basic OPFOR strategyas well as operations and tactics, which are the
subjects of other manuals in this series. It drives OPFOR organizational struc-
tures and equipment acquisition or adaptation. It also determines how the na-
tion-state OPFOR that represents the armed forces of the State would interact
with other, non-state actors that may be present in the COE.
Just because the U.S. force knows something about how the OPFOR has fought
in the past does not mean that the OPFOR will always continue to fight that
way. A thinking OPFOR will learn from its own successes and failures, as well as
those of its potential enemies. It will adapt its thinking, its makeup, and its way
of fighting to accommodate these lessons learned. It will continuously look for
innovative ways to deal with the United States and its armed forces.
ADAPTABILITY
Like all military forces, the OPFOR has a basic, conventional design for dealing
with forces with capabilities equal to or inferior to its own. Prior to a U.S. force
becoming involved, therefore, the OPFOR can use the application or threat of ap-
plication of that conventional design to dominate or influence its regional
neighbors. The OPFOR plans these operations well in advance and tries to exe-
cute them as rapidly as possible, in order to preclude regional alliances or outside
intervention.
The OPFOR has developed its doctrine, force structure, and capabilities with an
eye toward employing them against both regional and extraregional opponents, if
necessary. It has thought about and trained for how to adapt once an extrare-
gional force becomes engaged. It has included this adaptability in its doctrine in
the form of general principles, based on its perceptions of the United States and
other threats to its goals and aspirations. It will seek to avoid types of operations
and environments for which U.S. forces are optimized. During the course of con-
flict, it will make further adaptations, based on experience and opportunity.
xv
FM 7-100 _________________________________________________________________________________
When a U.S. force or a U.S.-led coalition first begins to deploy into theater, the
OPFOR will seek to disrupt the deployment and thus create opportunity. In such
cases, the conventional design the OPFOR used in regionally-focused operations
may still provide the framework for military operations against an advanced ex-
traregional force. The OPFOR will not shy away from the use of military means
against such an opponent, so long as the risk is commensurate with potential
gains. As a U.S. or coalition force builds up power in the region, the OPFOR must
rely on adaptive applications of its basic design in order to mitigate its disadvan-
tages and exploit its advantages compared to this new opponent.
In general, the contemporary OPFOR will be less predictable than OPFORs in
the past. It will be difficult to template as it adapts and attempts to create oppor-
tunity. Its patterns of operation will change as it achieves success or experiences
failure. OPFOR doctrine might not change, but its way of operating will.
INITIATIVE
Like U.S. Army doctrine, OPFOR doctrine must allow sufficient freedom for bold,
creative initiative in any situation. OPFOR doctrine is descriptive, but not pre-
scriptive; authoritative, but not authoritarian; definitive, but not dogmatic. The
OPFOR that U.S. units encounter in various training venues will not apply this
doctrine blindly or unthinkingly, but will use its experience and assessments to
interpolate from this baseline in light of specific situations. Thus, U.S. units can
no longer say that the OPFOR has to do certain things and cannot do anything
that is not expressly prescribed in established OPFOR doctrine. Doctrine guides
OPFOR actions in support of the State’s objectives; OPFOR leaders apply it with
judgment and initiative.
xvi
Chapter 1
The State
The purpose of this chapter is to introduce the reader to the State. This
country is a dominant power in its region of the world. However, it has
ambitions of increasing its status in the region and in the global arena.
Given the right conditions, the State could challenge the national inter-
ests of the United States and its allies. However, the diplomatic-political,
informational, economic, and military strengths of the State could be ad-
versely affected by circumstances such as internal strife, economic down-
turn, or natural disaster. These internal struggles and potential weak-
nesses within the State could thwart its expansionary goals or even lead
to its becoming a failing or failed state in which the government ceases to
meet all the needs of the people and at least parts of the country become
virtually ungovernable.
This chapter first describes the general characteristics of the State, then
the perceived threats to the State’s security and national interests. The
State regards the United States (or any other wealthy extraregional
power) as a potential threat to its regional and global aspirations. There-
fore, this chapter also outlines the State’s perceptions of the United
States, including the State’s views of U.S. strengths and vulnerabilities.
1-1
FM 7-100 _________________________________________________________________________________
ECONOMICS
1-4. While not among the world’s leading nations economically, the State
does maintain a favorable trade balance and possesses a strong industrial
base that continues to expand. The State participates in the global market
and has been developing an information-age technical base to further its
ability to interface with the more developed nations and gain benefit from
1-2
_________________________________________________________________________________Chapter 1
DEMOGRAPHICS
1-5. The population of the State comprises an upper class, a growing middle
class, and a very large lower class. The upper or ruling class, as well as the
growing middle class, possesses the same ethnic, cultural, and religious foun-
dations. However, the lower class consists of several large minority groups of
different ethnic, religious, and cultural backgrounds. The lower-class minori-
ties do not mix and maintain a strong dislike for each other. While they also
dislike the ruling class, they are generally supportive of the national govern-
ment. Most members of the upper class possess university degrees, while
most members of the lower class receive vocational training at the high
school level. Over 80 percent of the population is literate. Focused public edu-
cation is directed by the Ministry of Education, in coordination with the Min-
istry of Finance and Economic Affairs that is charged with ensuring the right
work force for future national needs. Even though the population is trained
and employed, it is still exploited in order to gain overall economic advantage
within the world industrial sector. This leads to lower-class tension and some
tension in the middle and upper classes.
INFORMATION
1-6. The State enjoys tight control over broadcast and print media, and
Internet access. The Ministry of Public Information is keenly aware of the
role media and information play in international events, diplomatic actions,
and military operations. The public has a moderate level of access to open in-
formation (radio, television, and news services). The State is an industrial-
based society, but it is striving to become an information-based society. It
recognizes the value of military and civilian applications of information tech-
nology and strives to continuously upgrade its capabilities. Typically, per-
sonal computer use has been limited to the elites and members of the mili-
tary. However, the access to information technology is spreading to the mid-
dle class and may present a challenge to the State control of information and its
control over Internet access.
PHYSICAL ENVIRONMENT
1-7. The State has a wide range of topographical features ranging from vast,
barren plains to rugged mountains and dense forests. It has several areas
that contain large urban centers, and in these areas it has a well established
and very robust infrastructure. It also has several wilderness areas that have
a very scattered population with an immature road and communications
network. The State has several large ports, numerous inland waterways, and
a very robust rail network supporting its industrial centers. The climate has
extremes of both heat and cold, depending upon the geographic area.
TECHNOLOGY
1-8. The State’s first priority for development or acquisition of technology is
to support infrastructure, economic development, and information architecture.
1-3
FM 7-100 _________________________________________________________________________________
The second priority is for dual-use technology that can serve both the civilian
and military sectors. The third priority is uniquely military technologies.
1-9. The State is aggressively developing the industrial and technological
base necessary to support indigenous technological research, development,
and growth. Meanwhile, it is dependent on foreign resources and imports to
sustain many critical research efforts. It invites transnational corporations to
establish research and manufacturing facilities in the State as a means of
building infrastructure. The State and its wealthy families also own busi-
nesses located abroad that can use human and natural resources of other
countries to produce desired technology or generate revenues with which the
State can buy the technology. The State aggressively seeks to acquire high-
technology weapon systems and system upgrades. However, it is aware that
it cannot match a technologically advanced opponent and is focusing its ef-
forts on more adaptive and creative uses of technology.
EXTERNAL ORGANIZATIONS
1-10. The State recognizes that the international environment is a dynamic,
changing entity including many types of external organizations that may be-
come involved in regional affairs. For example, humanitarian relief organiza-
tions come into the region and the State to deal with natural disasters or the
results of civil unrest or armed conflict. These nongovernmental organiza-
tions (NGOs) and private volunteer organizations (PVOs) each have their
own agendas, which may positively or negatively impact the State. The State
attempts to keep out of its territory those external organizations whose inter-
ests do not agree with its own. Those that are allowed in are heavily infil-
trated and controlled by the State. The State constantly seeks ways to exploit
such groups for its own benefit.
1-11. With globalization of economies, the State must also take into account
transnational corporations conducting business in the State or its region. If
the State’s actions adversely affect these foreign enterprises, it could invite
outside intervention. However, the presence of foreign business interests and
assets in the State may also put additional pressure on an extraregional en-
emy to avoid collateral damage to civilian life and property if it intervenes
there.
1-12. Various transnational groups exist within the State and its region.
These groups are often based on demographic, economic, or political issues
that transcend national boundaries. Some of these groups are overtly or cov-
ertly sponsored by the State. Others the State attempts to infiltrate and ma-
nipulate to support its own interests or minimize their negative impact on
those interests.
NATIONAL WILL
1-13. The State projects and promotes a sense of strong unified support for
its political leadership, government entities, and its military. It expects and
demands such support from its military leaders, elected officials, and general
population. The State continuously works to solidify national determination
and resolve. Overall, the State’s populace possesses a strong willingness to
accept hardship and prolonged demands in order to support the agenda of the
1-4
_________________________________________________________________________________Chapter 1
State. However, there are factions and groups within the State that do not
support this unified position and might, at times, challenge the goals and
policies of the State.
1-14. Despite internal differences, the State leadership remains confident
that the collective will of the State and its people can give it an advantage
over a regional or extraregional enemy. When necessary, it believes it can
outlast the opponent’s will to continue the conflict. Thus, it is willing and
prepared to accept long timelines for strategic campaigns and would seek to
use this willingness against a potential opponent.
TIME
1-15. The State’s goals of expanding its influence within the region and the
global community are long-term goals. The State is aggressive, but patient. It
is willing to spend however much time is necessary to achieve its goals and is
satisfied as long as it continues to make progress toward them.
1-16. In the State’s view, its long-term goals would be only temporarily
thwarted by intervention by an outside force in regional affairs. Accordingly,
its planning for dealing with such intervention focuses on effects over time.
The State believes that patience is its ally and an enemy of the extraregional
force. This gives the State an advantage over an enemy with a short timeta-
ble for achieving the goals of his intervention.
MILITARY CAPABILITIES
1-17. Overall, the State’s Armed Forces are well-trained and capable of con-
ducting combined arms and joint operations. Limited to regional power-
projection capabilities, the Armed Forces have well-defined acquisition proc-
esses and logistics methodologies. The State generally organizes its forces
into six service components: the Army, Navy, Air Force, Strategic Forces,
Special-Purpose Forces (SPF) Command, and Internal Security Forces. The
Army is the dominant partner among the services, but relies on the mobi-
lization of reserve and militia forces to conduct sustained operations.
These additional forces are not as well-trained and -equipped as the
standing Army.
1-18. The State is beginning to recognize and develop capabilities for the
military dimensions of space and information warfare (IW). At this point,
however, it has only limited indigenous space capabilities and relies on lever-
aging commercially available capabilities, while investigating technologies for
possible future development.
PERCEIVED THREATS
1-19. The State faces serious challenges from internal friction, its regional
neighbors, and possible intervention by an extraregional power. These
threats drive the State’s force design and investment strategies.
INTERNAL
1-20. The State does not have a homogeneous society, but has a variety of re-
ligious, ethnic, and cultural factions. Even within the dominating upper class,
1-5
FM 7-100 _________________________________________________________________________________
there can be friction between the State government and the wealthy families.
The State may have to deal with terrorist activities, from either internal fac-
tions, transnational groups, or international terrorist groups. Drug and
criminal organizations within the State or extending into the State can be
threats or, under certain circumstances, may become allied with the State’s
ruling elite.
1-21. As a result of the State’s developing a strong industrial base, there is a
growing economic gap between “haves” and “have nots” in the State popula-
tion. The “have nots” of the lower class do not have the same ethnic, cultural,
and religious background as the ruling elite or the growing middle class.
While the middle class generally supports the State government, some of
its members advocate a more democratic form of government, not domi-
nated by the elite of the upper class. Members of the lower class also gen-
erally support the State government, partly because most of them work in
the factories owned by a few wealthy families, who also control the State
government.
1-22. However, many in the lower and middle classes have some mistrust of
the government because of the ruling class’s alliances with other nations and
transnational organizations. In particular, they feel betrayed by this outside
influence, from which primarily the upper class profits. Without real voting
power, the lower and middle classes believe that the primary tools they can
use to influence the government are street riots, demonstrations, and work
stoppages.
1-23. The more disaffected members of the middle and lower classes have
from time to time attempted to launch insurgent movements. However, these
antigovernment groups are fragmented due to ethnic, cultural, and religious
differences between the middle and lower classes and the mutual dislike
among the various large minority groups in the lower class. The most suc-
cessful insurgent groups receive backing from populations of neighboring
countries with similar ethnic, religious, or cultural heritage.
1-24. There is a growing trade in illegal narcotics. While the State govern-
ment officially condemns the drug trafficking, the wealthy families of the rul-
ing elite actually control and profit from the narcotics business. Members of
the lower class (particularly in rural areas lacking factory jobs) rely on the
drug organizations for their livelihoods. The drug organizations’ operations
are not confined to the State, where some such organizations enjoy unofficial
government protection. A drug organization can protect its personnel and as-
sets by maintaining its own paramilitary and security forces, outfitted with
modern arms purchased with drug money.
REGIONAL
1-25. The State develops all its instruments of national power with the
goal of regional dominance. For example, it designs its military forces and
employs an investment strategy in military materiel that ensures its
Armed Forces conventional power superiority over any of its regional
neighborsindividually, if not collectively.
1-26. Rarely are only two sides involved in conflict. It is far more likely that
a coalition of actors with similar interests opposes another coalition or
1-6
_________________________________________________________________________________Chapter 1
other actors. The regional environment can also include neutral parties and
subnational or transnational actors with interests that support or conflict
with those of the State.
1-27. The State can deter other regional actors from actions hostile to the
State’s interests by maintaining a trained and ready military force. When
necessary, the State conducts conventional operations that form the core of
its ability to dominate regional adversaries or to compel such adversaries to
yield to the State’s will. Military force, or its threatened use, is a key element
of the State’s status as a power within the region. However, the State sel-
dom applies military power alone; such power is most effective when ap-
plied in combination with informational, economic, and diplomatic-
political means.
EXTRAREGIONAL
1-28. The State sees intervention by an extraregional power (such as the
United States) as a threat to its aspirations and influence within the region.
It fears that international sanctions may set back its economic growth and
regional influence. Therefore, it attempts to keep any regional conflict be-
low the threshold that would invite outside intervention. Nevertheless, an
extraregional power may find it necessary to intervene in regional affairs.
It may do so unilaterally or, more likely, as part of a coalition under
United Nations mandate.
1-29. In order to deal with extraregional intervention, the State will use all
means necessary (diplomatic-political, informational, economic, and military).
The same investment strategy that gives the State military superiority over
its regional neighbors can assist it in deterring an extraregional power from
entering the region or dealing with that power if intervention does occur. The
State must go to war or continue the war after extraregional intervention
with whatever means it has. However, it must use those means in adaptive
ways.
1-30. Realizing that its regional aspirations and actions may trigger extrare-
gional intervention, the State may invest in certain high-payoff technological
niches that offset the advantages of an extraregional power. Examples
could be investment in a more robust air defense capability than would be
necessary to deal with air threats from regional adversaries or in GPS
jammers that are effective only against a force relying on GPS. However,
most investments will address both regional and extraregional threats.
The basic force structure of the Armed Forces is the same for either type
of threat.
1-31. Once an extraregional force deploys into the region, the State uses an
integrated aggregate of all the forces and means that were already available
to it for internal and regional threats. For example, Internal Security Forces
take firmer control of the population because of the impending attack on the
homeland. These security forces may also be called upon to fight enemy forces
while simultaneously trying to preserve the regime and the instruments of
national power.
1-7
FM 7-100 _________________________________________________________________________________
VULNERABILITY OF COALITIONS
1-34. In extraregional intervention, the United States usually acts within the
confines of a political and/or military coalition. This is particularly true in to-
day’s world of economic interdependence and political interaction that require
a nation’s military forces to coordinate and work with allies, NGOs, and other
governmental agencies and services during the conduct of operations. Estab-
lishing and maintaining command and control (C2) of all the players may
prove difficult. Compared to a long-term alliance, a coalition formed for a spe-
cific purpose is likely to have problems with interoperability, language, and
lack of a common operational framework. There may also be mistrust and
problems in sharing classified information.
1-35. A coalition is normally only as strong as its weakest member. The State
understands the weakness of coalitions and alliances and will seek to force its
regional neighbors or the United States to create alliances with nations who
are more sympathetic to its own cause. It will try to create or highlight differ-
ences among coalition members and use this to cause a split or to hamper
coalition objectives.
1-8
_________________________________________________________________________________Chapter 1
1-9
FM 7-100 _________________________________________________________________________________
PREDICTABLE OPERATIONS
1-48. The U.S. military conducts operations that are rather predictable and
templatable. This can allow the State to avoid the intended effects of U.S. op-
erations and to maximize the effectiveness of its own forces and weapons
against U.S. forces. U.S. planners often apply templates from one region or
area to another without considering the differences in terrain, economic de-
velopment, or social culture. To a certain extent, U.S. reliance on technology
contributes to predictability of U.S. operations.
1-10
_________________________________________________________________________________Chapter 1
1-49. U.S. soldiers and noncommissioned officers (NCOs) are well trained
and show a great deal of initiative, aggressiveness, and self-reliance. U.S.
officers, however, may be less aggressive and are tied to a chain of command
that often takes over the fight from its company- and field-grade officers. U.S.
field-grade officers have difficulty coordinating their diverse combat elements
in order to apply maximum combat power in a timely manner.
1-11
FM 7-100 _________________________________________________________________________________
for hostile forces. U.S. forces may have to provide force protection for contrac-
tor personnel, thus decreasing combat power. Threat conditions may increase
to a level where contractors can no longer be used, placing greater strain on
limited U.S. organic sustainment assets. Contractors and the host nation
network through which they must work increase the vulnerability for infor-
mation exploitation and sabotage.
1-12
Chapter 2
2-1
FM 7-100 _________________________________________________________________________________
Geography
2-3. Geography sets the conditions and provides the resources for the gen-
eration of power. The State uses its geography and physical infrastructure to
its advantage. Its natural ports and inland waterways, coupled with its ex-
tensive rail network, allow it to import those goods and services that it does
not produce in its industrial centers but are necessary for the conduct and
sustainment of wars. The State can nationalize all public and private
transportation networks in order to exert the maximum amount of control
over them.
Population
2-4. As the State grows in population, it may have a manpower advantage
over a less populous neighboring country. Its people are industrious and
creative and generally support the State government. Support of the popu-
lace enables the State to exert its power, influence, and control within its
own boundaries and within its region. The State believes that collective
will of the people can give it an advantage over a regional or extraregional
opponent.
Economy
2-5. A nation’s economic level directly affects that nation’s ability to operate
competitively in an international environment. The State takes advantage of
its strong economic base to develop a favorable balance of trade. Its strong,
expanding industrial base allows it to conduct sustained military operations.
By participating in the global market and fostering transnational ties, the
State has developed favorable relationships with critical trading partners
who can help support it during peacetime and during times of war.
National Will
2-6. National will is an intangible but very important source of national
power. As a nondemocratic nation, the State demands hegemony within its
borders. An elite group of former military officers and wealthy families who
share the same tribal or cultural background control the State’s government.
The State manipulates its people’s ideas and values, promoting those that
agree with the government’s and suppressing those that do not. It demands
total support from its populace and will not tolerate antigovernment senti-
ment. The populace is forced to support State policies.
National Direction
2-7. The State’s government and military provide unity of effort and develop
a clear vision for the State’s future policy goals, commitments, and programs.
The degree of centralized government control, coupled with the small size of
the ruling elite, allows the State to unite all organizations and bureaucracies
to support its common aims. In times of war or crisis, the State can task its
Internal Security Forces to monitor potentially troublesome groups or fac-
tions and to rally the political support of the general population.
2-2
_________________________________________________________________________________Chapter 2
Diplomatic-Political
2-11. The State has a diplomatic corps that promotes its goals and protects
its national interests within the international environment. These diplomatic
means support its national security strategy regionally and internationally.
The State utilizes all possible international or diplomatic channels to imple-
ment its foreign policy or to support any conflicts. When possible, it estab-
lishes alliances and coalitions to assist it in meeting its goals. It maximizes
its use of negotiations, recognition of new governments, treaties, and alliances.
2-12. While diplomatic power applies to external relations, the political as-
pect is internal to the State. The State tasks all internal government agen-
cies to support the national security strategy. In times of war or crisis, it uses
these agencies to convince the population to follow its policies.
Informational
2-13. The State communicates and controls information in order to inform its
own population and foreign nations about its policies and actions and to cre-
ate a favorable response. By implementing a well-organized internal media
campaign and information warfare (IW) effort, the State can control dissemi-
nation of all information within its borders. It can control and manipulate
the content and flow of international information as well as domestic infor-
mation. Since the control of all information is critical to the State, all State
agencies and departments follow strict guidelines to ensure the total control
and appropriate dissemination of information.
2-3
FM 7-100 _________________________________________________________________________________
2-14. The State can wage offensive IW against another nation's computer
systems and can target assets ranging from telecommunications and power
to safety and banking. Such attacks undermine the more advanced aspects of
an adversary's economy, interrupt his mobilization of military power and, by
affecting the integrity of highly visible services to the population, create al-
most immediate pressure on all levels of government.
Economic
2-15. The State promotes an aggressive use of economic means to achieve its
national objectives. Such means may include regional or international economic
aid, trade agreements, or economic sanctions that aid or support the State’s
goals. The State can employ well-orchestrated plans of economic action to impair
or cripple the war-making potential of an adversary or to generate economic
support from a friendly power. The State is prepared to carry out any necessary
internal changes in the organization and functioning of the national economy to
provide for the most effective use of resources in a national emergency.
2-16. Economic superiority, rather than military superiority, may be the key
to the State’s dominance over some regional neighbors. Gaining economic
power is also a key to international recognition. The strength and vitality of
its economy provide the State the capacity to influence the foreign policy be-
havior of other nations.
Military
2-17. The military is the State’s most powerful and most effective instrument
of power. Governmental control over military leadership, demanding and rig-
orous training, a well-defined acquisition concept, an excellent logistics infra-
structure, and clearly defined goals and missions all contribute to the mili-
tary’s effectiveness. The State can use its military to support and attain its
tactical, operational, and strategic goals and, thus, support its national secu-
rity strategy.
2-18. Never hesitating to use force, the State intends to meet every threat to
its national interests with a show of force or actual military aggression. It
will not hesitate to use its military forces to maintain internal order. The
State may respond to other nations’ acts against it or may be the aggressor
against nations it perceives as threatening its own self-interests.
2-19. By controlling civilian industry and infrastructure, the State ensures
that its industrial base directly supports its military operations. It continues
to prioritize its military modernization efforts and spends up to 20 percent of
its gross national product on its Armed Forces. Mandatory conscription en-
sures that high-priority units are manned at 100 percent. Maintaining large
reserve and militia forces ensures manning of the remaining units after mo-
bilization. The threat of mass casualties does not deter the State from
embarking on a military operation. Should a soldier lose his life in support of
the State’s goals, the State will bestow honor and financial remuneration upon
his family.
2-4
_________________________________________________________________________________Chapter 2
PRESIDENT
MINISTER OF
NATIONAL
SECURITY
STRATEGIC
INTEGRATION
DEPARTMENT
GENERAL
STAFF
SUPREME
HIGH COMMAND
2-5
FM 7-100 _________________________________________________________________________________
and military relations; and attempts to foster support and cooperation from
other nations. In particular, the Ministry of Foreign Affairs cultivates useful
relationships with other nations in the region. It also strives for recognition
of the State as a participant in global affairs. (See Figure 2-2).
MINISTRY OF
FOREIGN
AFFAIRS
2-6
_________________________________________________________________________________Chapter 2
directorate’s goal is to ensure that the State remains the most powerful in
the region economically.
MINISTRY OF
PUBLIC
INFORMATION
2-7
FM 7-100 _________________________________________________________________________________
MINISTRY OF
FINANCE AND
ECONOMIC AFFAIRS
DOMESTIC AND INDUSTRIES AND LABOR AND AGRICULTURE FOOD TREASURY AND
FOREIGN TRADE PRODUCTION MANPOWER AND LIVESTOCK BANKING
DIRECTORATE DIRECTORATE DIRECTORATE DIRECTORATE DIRECTORATE
2-8
_________________________________________________________________________________Chapter 2
countries to seek foreign imports and to arrange for foreign exports. All
transactions are based on what will benefit the State. This directorate man-
ages an active program for protection of sensitive economic information re-
lated to production, imports, and exports. However, it also executes a care-
fully orchestrated economic information campaign for effective dissemination
of appropriate information on the economic situation and economic policy,
both within the State and externally.
2-9
FM 7-100 _________________________________________________________________________________
MINISTRY OF
THE
INTERIOR
CHIEF OF
INTERNAL
SECURITY
2-41. Internal threats do not exist only in peacetime, but also continue and
often intensify during war. For instance, a regional enemy sharing a common
ethnic, religious, or cultural heritage with segments of the State’s population
may incite or support anti-State activities by those groups. During wartime,
therefore, some or all of the internal security forces from the Ministry of the
Interior become subordinate to the Supreme High Command (SHC). At that
time, the formal name “Internal Security Forces” applies to all forces resub-
ordinated from the Ministry of the Interior to the SHC, and the General Staff
controls and supervises their activities. In war, the Internal Security Forces
pick up additional missions that support the State in dealing with external
elements.
2-42. The primary imperative for the State is preservation of the regime and all
four instruments of national power. The State will use all means available to
• Protect political centers and the political leadership.
• Protect and control information.
• Protect key economic centers.
• Protect military forces.
2-43. Internal security forces aggressively suppress or crush organized
groups of dissidents, using force when necessary, regardless of whether the
2-10
_________________________________________________________________________________Chapter 2
dissident actions are violent or peaceful. The government may even use
Armed Forces against such groups. Government-controlled media either do
not report the incidents or manage public perception to put the blame on the
antigovernment group.
POLITICAL DIRECTORATE
2-44. The Political Directorate monitors the political activities of the State’s
population. It infiltrates possible subversive groups and tries to undermine
groups’ cohesiveness or redirect their efforts in directions the regime can
control.
2-11
FM 7-100 _________________________________________________________________________________
INTELLIGENCE DIRECTORATE
2-51. The Intelligence Directorate is responsible for identifying and neutral-
izing subversive elements, as well as unsanctioned drug and criminal organi-
zations. It investigates and monitors subversive groups and infiltrates their
ranks. It routinely eavesdrops on communications of such groups and their
known leaders. It employs an extensive human intelligence (HUMINT) net-
work. It also monitors and collects information on foreign organizations oper-
ating within the State. These include not only foreign spies, but also foreign-
based corporations doing business in the State, as well as nongovernmental
and private volunteer organizations that government agents may infiltrate.
The State must examine such external organizations to determine how to
deal with negative influences or how it can manipulate these organizations to
support its own national security objectives.
2-52. In wartime, the assets of the Intelligence Directorate support the In-
ternal Security Forces and the overall national security strategy. The Inter-
nal Security Forces continue to operate an extensive HUMINT network
within the State as the cornerstone of its reconnaissance, intelligence, sur-
veillance, and target acquisition (RISTA) capability. During regional conflict,
the State expands the HUMINT network into enemy territory. This
HUMINT network will also help provide the State a RISTA capability that
may offset the technological advantages of an extraregional force.
MINISTRY OF DEFENSE
2-53. The NCA exercises control over the makeup and actions of the Armed
Forces through the Ministry of Defense (MOD) and the General Staff. The
MOD has six directorates. (See Figure 2-6.) It is responsible for the day-to-
day administration of the Armed Forces and for the readiness and overall de-
velopment of the six service components of the Armed Forces. However, the
General Staff has direct control over the six services. The General Staff also
oversees three functional directorates. In wartime, the MOD and General
Staff together form the Supreme High Command (SHC). (See Figure 2-7.)
2-12
_________________________________________________________________________________Chapter 2
MINISTRY OF
DEFENSE
GENERAL
STAFF
ACQUISITION &
POLITICAL LOGISTICS
PROCUREMENT
DIRECTORATE DIRECTORATE
DIRECTORATE
COMBAT MILITARY
PERSONNEL
TRAINING EDUCATION
DIRECTORATE DIRECTORATE
DIRECTORATE
POLITICAL DIRECTORATE
2-54. The Political Directorate maintains political control over the Armed
Forces and ensures that they adhere to State government policies and direc-
tives. It directs the political education, indoctrination, and political activities
of all Armed Forces personnel. It maintains records on possible subversive
members of the Armed Forces and monitors them to ensure that they remain
loyal to the State and do not initiate any actions contrary to State interests.
LOGISTICS DIRECTORATE
2-56. The Logistics Directorate is responsible for the overall logistics support
of the Armed Forces, movement of troops and supplies, security of logistics
installations, maintenance of lines of communication (LOCs), and general de-
fense of the support zone. See Chapter 7 for more detail on the functions of
this directorate.
PERSONNEL DIRECTORATE
2-57. The Personnel Directorate formulates and implements national-level
military personnel policies, allocates personnel among the service compo-
nents, and establishes basic personnel administration procedures. See Chap-
ter 7 for more detail on the functions of this directorate.
2-13
FM 7-100 _________________________________________________________________________________
NATIONAL
COMMAND
AUTHORITY
MINISTRY OF
SUPREME DEFENSE
HIGH COMMAND
GENERAL
STAFF
ORGANIZATION &
OPERATIONS INTELLIGENCE
MOBILIZATION
DIRECTORATE DIRECTORATE
DIRECTORATE
AIR
DEFENSE
FORCES
2-14
_________________________________________________________________________________Chapter 2
FUNCTIONAL DIRECTORATES
2-61. Under the General Staff are three functional directorates for opera-
tions, intelligence, and organization and mobilization. These directorates
handle functions that transcend service boundaries.
Operations Directorate
2-62. The Operations Directorate is actually focused on developing plans for
the General Staff or SHC, rather than supervising execution of national-level
operations. In fact, the Operations Directorate is the strategic planning or-
ganization for the Armed Forces. During peacetime, it is responsible for the
development, staffing, promulgation, and continuing review of Armed Forces
mobilization and strategic campaign plans. It also reviews mobilization plans
of service components and important government ministries for the General
Staff and the NCA. The Operations Directorate plays the lead role in devel-
oping the national exercise program and provides support to General Staff
inspectors assigned to assess service performance in national exercises.
2-63. During combat operations, the Operations Directorate is responsible,
with the Intelligence Directorate, for maintaining a continuous estimate of
the situation for the SHC, and it contributes to the formal national estimate
process. The Operations Directorate also modifies or develops military stra-
tegic campaign plans based on guidance from the SHC. The directorate is used
to generate options and focuses on the long-, mid-, or short-term objectives of the
State. Consequently, the Operations Directorate assigns liaison officers to im-
portant government ministries.
Intelligence Directorate
2-64. The Intelligence Directorate fields national-level reconnaissance assets
and supports national intelligence requirements. At this level, limited in-
vestments in space-based technology and larger investments in buying prod-
ucts from other nations produce the greatest overall payoff. The State is able
to use commercial enterprises of other countries to obtain space-based imagery
intelligence and to support command and control.
2-65. The Armed Forces place a premium on HUMINT sources. They operate
HUMINT agents throughout the region and have some global capability
against those nations the State perceives as the most likely potential ene-
mies. The SPF Command, with both a regional and global capability, also
supports national intelligence requirements.
2-66. The State can procure signals intelligence (communications and elec-
tronic intelligence) means on the international market. Accordingly, the
Armed Forces’ capability is mixed and probably difficult to maintain, but not
inconsequential. Although the State has targeted regional opponents, it does
have some capability against the bandwidths in which it expects likely ex-
traregional opponents to operate. The Army, Navy, and Air Force components
have tactical assets appropriate to their respective ground, sea, and air venues.
2-67. The Intelligence Directorate is responsible for acquisition of unmanned
aerial vehicles (UAVs, including drones and remotely-piloted vehicles) in
support of the service components. The directorate also fields UAVs capable
2-15
FM 7-100 _________________________________________________________________________________
SERVICE COMPONENTS
2-70. The Armed Forces generally consist of six services. These include the
Army, Navy, Air Force, Strategic Forces, Special-Purpose Forces (SPF)
Command, and Internal Security Forces. The Internal Security Forces are
subordinate to the Ministry of the Interior in peacetime, but become subordi-
nate to the SHC in time of war. The Armed Forces are not a fully unified de-
fense force, but are able to operate jointly as required. The Army is the domi-
nant partner among the military forces. Some functional forces may be or-
ganized as joint forces. For example, intelligence and IW units may operate
jointly in support of the Intelligence Directorate. The Armed Forces field
some reserve component forces in all services, but most reserve forces are
Army forces. Militia forces belong exclusively to the ground component.
Army
2-71. The Army, comprised of ground forces, is the largest and most influen-
tial of the State’s Armed Forces. This reflects the State’s analysis of its po-
tential enemies and the fact that the Armed Forces cannot hope to compete
qualitatively with the air and naval components of a major extraregional
power such as the United States. The Army is large and, in comparison to
most regional neighbors, is modern as well.
2-72. The composition of the Army reflects the great diversity of the geogra-
phy in which it operates and the Armed Forces’ notions about the value of
tempo in offensive operations. Accordingly, the Army includes armor, infan-
try, and a small number of airborne and special-purpose forces. Equally im-
portant, the Armed Forces field a large militia, composed primarily of infan-
try, that is designed to secure LOCs and defend the State if it decides to conduct
2-16
_________________________________________________________________________________Chapter 2
adaptive operations. The Army’s chief offensive power is its armor, mecha-
nized infantry, and airborne forces. The Army also has its own Special-
Purpose Forces (Army SPF) designed to support the ground forces at the op-
erational level and enable the Army to conduct reconnaissance and direct ac-
tion to the opponent’s operational depth.
2-73. The Army has adequate resources to conduct regional offensive opera-
tions supported and sustained by relatively modern conventional forces. Ar-
mor and mechanized infantry forces are the most capable and the most mod-
ern of the Army’s forces. Militia forces include many elements common to all
infantry forces, but are generally not capable of large offensive operations.
2-74. The Army devotes a large share of its means to fielding and maintain-
ing both rocket and tube artillery to support ground operations. The Army
also has some long-range rockets and surface-to-surface missiles (SSMs). Fire
support capability includes attack helicopters employed in close support. Attack
helicopter units also have a limited deep-attack capability. Army air defense is
based on the assumption that every soldier with a shoulder-fired surface-to-air
missile (SAM) is an air defense firing unit. The Army is assigned large numbers
of shoulder-fired SAMs and will also have mobile air defense units in support.
Navy
2-75. The State does not possess the industrial base to sustain a blue-water,
force-projection navy. It does, however, maintain a regional force-projection
navy with a significant access-control capability built on small surface com-
batants and submarines. The Navy can project naval infantry up to brigade
size regionally. While the Navy may have difficulty in warding off attack by
major surface combatants or air forces of extraregional powers, it is more
than adequate to operate against likely regional opponents.
2-76. The Navy is designed primarily to overwhelm regional enemies by
means of small fast-attack craft armed with antiship missiles but is also
equipped to challenge adversaries’ access to the region. Surface- and ground-
based antiship missile units form the bulk of the Navy. The Navy also fields
a submarine force designed primarily for access-control operations, but also
able to insert naval infantry to conduct raids against critical installations
within the region. The submarine force, with significant effort ahead of time,
may also insert SPF for reconnaissance or direct action outside the region.
This kind of operation assumes high risk and is unlikely without expectation
of an important payoff.
2-77. The Navy has also invested in antiship technology including wake-
homing mines and antiship mines. As a consequence, the Navy has the capa-
bility to challenge the most modern navies at maritime choke points, using a
combination of mines, shore- and sea-based antiship missiles, and submarines.
2-78. In the event of blockade, the State is able to sustain naval operations
from home ports for a limited time. The Navy can sustain force projection re-
gionally for limited duration. A month or more of combat operations that
cannot be directly supported without resupply from home ports can challenge
the State’s capacity. Submarine operations are the exception to this assess-
ment. The Navy may operate submarines outside the region by arrangements
with other governments. This capability, while not assured, cannot be ruled out.
2-17
FM 7-100 _________________________________________________________________________________
2-79. The Navy has a limited amphibious capability and possesses naval in-
fantry capable of conducting forcible entry against regional opponents. The
Navy fields organic Special-Purpose Forces (Naval SPF) that are able to con-
duct reconnaissance in support of landings or raids against critical targets.
2-80. Although the Navy is a coastal navy, it is able to maintain control of
inland waterways. This brown-water capability is generally disposed to de-
fend State waterways, but can conduct limited operations in estuaries or fur-
ther inland in support of Naval SPF or ground combat operations.
Air Force
2-81. The Air Force, like the Navy, is fundamentally a supporting arm. The
State’s assessment of the strategic picture is that it cannot hope to compete
with the most modern air forces in size or quality. The Air Force has devel-
oped a significant regional capability and adequate air defenses to challenge
outside air intervention. Its aircraft include fighters, bombers, tactical trans-
port, tankers, airborne early warning (AEW) aircraft, electronic warfare
(EW) aircraft, reconnaissance aircraft, and auxiliaries. The Air Force has a
combination of small numbers of state-of-the-art air-superiority aircraft, re-
connaissance and EW aircraft, and modern, but less than top-line ground-
attack aircraft consistent with State force design and procurement principles.
2-82. Along with its air-superiority aircraft, the Air Force has made impor-
tant investments in AEW, reconnaissance, and EW aircraft. These aircraft
are adequate to dominate the airspace against regional opponents. They may
also be sufficient to challenge outside forces that intervene in the region, at
least in early stages. They may prove effective in supporting access-control
operations during transition or adaptive operations. However, the State as-
sumes that these aircraft would not prove viable over the long term against
an extraregional threat. In the event of full-scale intervention by modern air
forces, the Air Force would not be able to accomplish more than local air par-
ity and would not be able to sustain even that. Due to its investment in
ground-based air defenses, however, the State could still be capable of pre-
venting opponents from attaining air supremacy without a long fight.
2-83. The Air Force’s bomber aviation forces include a combination of modern
and older systems. Deep operations against extraregional forces are unlikely
except against high-value targets that the State estimates to be worth the
expenditure of a scarce resource. Bombers and other fixed-wing aircraft can
have precision munitions and cluster bomb capability. The Air Force also
fields limited quantities of fuel-air explosives and standoff systems including
some short-range ground-attack and antiship cruise missiles.
2-84. The Air Force has transport aircraft designed to provide two capabili-
ties: force projection and insertion. Theater transports enable the projection
of airborne troops regionally. The Air Force also fields light transport aircraft
for insertion of its own SPF or those belonging to other components. None of
these aircraft affords a legitimate strategic force-projection capability. The
Air Force is able to sustain troops on the ground via an air bridge in the ab-
sence of a significant air-to-air threat. Transport helicopters supporting
ground forces operations may either come from Army aviation units or be al-
located from the Air Force.
2-18
_________________________________________________________________________________Chapter 2
2-85. The State’s national-level Air Defense Forces are subordinate to the Air
Force and reflect the State’s force development philosophy. They combine ob-
solescent and state-of-the-art air defense firing units to support area defense
and point defense of high-value assets. The State has invested in point-
defense technology that it believes can prove effective in defending against
cruise missiles.
2-86. Air Force SPF provide organic reconnaissance support and early warn-
ing for air defense sectors. They can conduct raids against enemy air bases
and installations. They also support search and rescue of aircrews. Finally,
SPF form the core for air base security.
2-87. The Air Force manages the State’s use of space-based assets and capa-
bilities. The State’s reliance on such means is minimal, with the concentra-
tion on satellite communication and navigation. The Armed Forces currently
have satellite communications (SATCOMs) at the operational level and are
in the process of extending this capability down to the tactical level. The
SATCOM capabilities the State now uses are commercially-leased circuits.
The State possesses limited indigenous space-based RISTA capabilities.
However, it can purchase commercially-available imagery products as
needed. The increasing ability to leverage commercial satellites will continue
to erode the advantage now enjoyed by the United States and other wealthy
nations with space-based platforms.
Strategic Forces
2-88. The Strategic Forces consist of long-range rocket and missile units. The
State can develop or purchase a number of theater ballistic missiles (TBMs),
as well as intermediate-range ballistic missiles (IRBMs). This constitutes the
bulk of the State’s strategic capability.
2-89. The missiles of the Strategic Forces are capable of delivering nuclear,
biological, and chemical (NBC) munitions, and the NCA is the ultimate NBC
release authority. Therefore, the NCA is likely to retain major elements of
the Strategic Forces under its direct control or under the SHC or a theater
headquarters in wartime.
2-90. The State considers the Strategic Forces capability, even when deliver-
ing conventional munitions, the responsibility of the NCA. Long-range mis-
siles and rockets are political tools, first and foremost. The Strategic Forces
could use long-range missiles and rockets to advance State political ends during
regional, transition, and adaptive operations. Unable to mount robust air cam-
paigns, the State can use these weapons to mount an equivalent effort.
2-91. In some cases, the SHC or theater commander may allocate some Stra-
tegic Forces assets down to operational-level commands. Conventionally-
armed rocket and missile units may be assigned directly in support of air,
naval, and ground forces.
2-19
FM 7-100 _________________________________________________________________________________
2-20
_________________________________________________________________________________Chapter 2
1
A military district may or may not coincide with a political district within the State government.
2-21
FM 7-100 _________________________________________________________________________________
NATIONAL
COMMAND
AUTHORITY
MINISTRY OF MINISTRY OF
DEFENSE THE INTERIOR
GENERAL CHIEF OF
STAFF INTERNAL
SECURITY
INTERNAL
THEATER HQs SERVICE HQs SECURITY
FORCES HQ
SINGLE-
SINGLE- SINGLE-
OSC HQs SERVICE
SERVICE SERVICE
NATIONAL/
OPERATIONAL- DIVISIONS/
DISTRICT-
LEVEL BRIGADES/
LEVEL
COMMANDS BATTALIONS
COMMANDS
NATIONAL
COMMAND
AUTHORITY
MINISTRY OF
DEFENSE
SUPREME
HIGH COMMAND
GENERAL
STAFF
SERVICE
THEATER HQs
HQs
2-22
_________________________________________________________________________________Chapter 2
2-23
FM 7-100 _________________________________________________________________________________
particular mission. In most cases, the mobilized reserve units would be inte-
grated with regular military units in such a fighting command. In rare cases,
however, a reserve command at division level or higher might become a fight-
ing command or serve as the basis for forming a fighting command based
partially or entirely on reserve forces.
2-24
Chapter 3
This chapter first explains the overall concepts and principles involved in
the State’s national security strategy. Then it describes the four basic
types of strategic-level courses of action the State leadership uses to exe-
cute its strategy for total war in a strategic campaign. Finally, this chap-
ter focuses on the course of action called “strategic operations.” For fur-
ther detail on the other three courses of action, see Chapters 4 through 6.
3-2. Despite the term security, the State’s national security strategy defines
not just what the State wants to protect or defend, but what it wants to
achieve. The State’s primary strategic goal is continually expanding its influ-
ence in the region. This goal is a long-term aim for the State. To the State, it
does not matter how long it takes to expand its influence throughout the area,
but just that it continually makes expansionary progress. The State is willing to
3-1
FM 7-100 _________________________________________________________________________________
spend the amount of time necessary to achieve its goal. Thus, its national secu-
rity strategy is designed to allow the State to reach this primary goal.
3-3. The basic national security strategy focuses on the State’s expansionary
goals in the region. Thus, the State seeks to develop and maintain diplo-
matic-political, informational, economic, and military power sufficient to
dominate the region. However, the State assumes the distinct possibility of
extraregional intervention to thwart its regional aspirations. Therefore, to
the extent possible, it also invests in technology and establishes forces with
that possibility in mind. It builds a doctrine and strategy for employing all
these capabilities against all possible threats. Thus, there is no need to im-
provise if an extraregional force does intervene.
INTEGRATED PLANNING
3-4. The State’s leadership understands the benefits of deliberate planning,
perseverance, and willingness to spend the time and other resources neces-
sary to reach the State’s desired end state. Methodical planning by the gov-
ernment leaders at the national level results in a well-orchestrated, coordi-
nated State national security strategy for the conduct of total war. This strat-
egy guides the State toward its strategic goals by combining all the State’s
elements of power in a highly effective and efficient manner.
3-5. The Minister of National Security, through his Strategic Integration
Department (SID), integrates all the instruments of national power into one
cohesive national security strategy and orchestrates a unified strategic cam-
paign. The State’s leadership works well together because its members all
share the same ethical, cultural, and religious backgrounds. Leaders from
both the ruling class and the diplomatic-political, informational, economic,
and military instruments of power participate in strategic planning sessions.
They work in consonance to develop and implement a consolidated plan that
outlines the State’s strategy for total war.
SYSTEMS WARFARE
3-6. The State defines a system as a set of different elements so connected or
related as to perform a unique function not performable by the elements or
components alone. The essential ingredients of a system include the compo-
nents, the synergy among components and other systems, and some type of
functional boundary separating it from other systems. Therefore, a “system of
systems” is a set of different systems so connected or related as to produce
results unachievable by the individual systems alone. The State views the
operational environment, the battlefield, its own instruments of power, and
an opponent’s instruments of power as a collection of complex, dynamic, and
integrated systems composed of subsystems and components.
3-7. Systems warfare serves as a conceptual and analytical tool to assist in
the planning, preparation, and execution of warfare. With the systems ap-
proach, the intent is to identify critical system components and attack them in a
way that will degrade or destroy the use or importance of the overall system.
3-2
_________________________________________________________________________________Chapter 3
Principle
3-8. The primary principle of systems warfare is the identification and isola-
tion of the critical subsystems or components that give the opponent the ca-
pability and cohesion to achieve his aims. The focus is on the disaggregation
of the system by rendering its subsystems and components ineffective. While
the aggregation of these subsystems or components is what makes the overall
system work, the interdependence of these subsystems is also a potential vul-
nerability. Systems warfare has applicability or impact at all three levels of
warfare.
DIPLOMATIC-
INFORMATIONAL
POLITICAL
SYSTEM:
NATIONAL
POWER
ECONOMIC MILITARY
3-10. Thus, the State can target the systems and subsystems that make up
the opponent’s instruments of power. At the strategic level, the State can use
its own instruments of power to counter or attack an opponent’s instruments
of power. The primary purpose is to subdue, control, or change the opponent’s
behavior. If the opponent’s strength lies in his military power, the State can
3-3
FM 7-100 _________________________________________________________________________________
COMBAT LOGISTICS
FORCES FORCES
Examples: Examples:
Tanks, Transportation,
IFVs/APCs, Ammunition,
Infantry Fuel,
Rations,
Maintenance,
Medical
COMBAT
SYSTEM
COMBAT C2 AND
SUPPORT
FORCES RISTA
Examples: Examples:
Artillery, Headquarters,
SSMs, Signal Nodes,
Air Defense, Satellite Downlinks,
Engineers, Reconnaissance Sensors
Direct Air Support
TOTAL WAR
3-13. The State differentiates between war and armed conflict; war is the
more comprehensive of the two. The State’s concept of war is “total war,” in-
volving the entire country and all its instruments of national power, not just
the military. It affects all aspects of life and society. Management of the war
3-4
_________________________________________________________________________________Chapter 3
DISPROPORTIONATE INTERESTS
3-17. When engaged in a conflict within its own country or its own region,
the State has more vital interests in the conflict and its outcome than does an
extraregional adversary. The goals of the extraregional power for intervening
may be political or economic, while the State’s goal is expansion and survival.
What the extraregional power views as at most a major regional conflict, the
State views as total war. The extraregional power may seek to limit the con-
flict, but the State is fully committed. The State will wage total war, while
the extraregional enemy is more than likely waging a limited war. It will
commit all means necessary, for as long as necessary, to achieve its strategic
goals, while the extraregional power is often tied to a shorter timetable for its
commitment. The State will try to force the enemy to fight to get into the re-
gion; hitting his aerial and sea ports of debarkation (APODs and SPODs) also
has political value.
3-18. Victory may go to the State because it wants to win, needs to win, and
is willing to sacrifice to win. Victory need not equate to defeating the ex-
traregional enemy; it is sufficient to just get him to leave the region. In fact,
the State may be able to achieve its strategic goals by allowing the enemy to
claim victory and depart. In most cases, however, the State will have to try to
convince the extraregional power’s public and decision makers that the goal
of continued intervention is not worth the cost to them. While the extrare-
gional power typically has an aversion to heavy casualties, the State has a
3-5
FM 7-100 _________________________________________________________________________________
much higher threshold for accepting losses, as long as it can preserve its in-
struments of power. If the State has succeeded in preserving those instru-
ments of power (diplomatic-political, informational, military, and economic),
it can reassert its power and influence in the region after the extraregional
force departs. Achieving a stalemate or causing a major extraregional power
to evacuate the region constitutes a great victory, even if the State suffers
losses in doing so. Such a victory can bolster the State’s international pres-
tige, foster regional dominance, and strengthen internal support for its na-
tional security strategy.
3-6
_________________________________________________________________________________Chapter 3
Peace War
STRATEGIC OPERATIONS
Against Enemy Strategic Centers of Gravity
REGIONAL
OPERATIONS
TRANSITION
OPERATIONS
ADAPTIVE
OPERATIONS
Figure 3-3. Conceptual Framework for Implementing the State’s National Security Strategy
3-7
FM 7-100 _________________________________________________________________________________
STRATEGIC OPERATIONS
State Achieves Strategic Goals
3-8
_________________________________________________________________________________Chapter 3
3-24. The national security strategy is designed to achieve one or more specific
strategic goals within the State’s region. Therefore, it typically starts with ac-
tions directed at an opponent within the regionan opponent that the State over-
matches in conventional military power, as well as other instruments of power.
3-25. The State will attempt to achieve its ends without resorting to armed
conflict. Accordingly, strategic operations are not limited to military means
and usually do not begin with armed conflict. The State may be able to achieve
the desired goal through pressure applied by other-than-military instruments of
power, perhaps with the mere threat of using its superior military power against
the regional opponent. These actions would fall under the general framework of
“strategic operations.”
3-26. When nonmilitary means are not sufficient or expedient, the State may
resort to armed conflict as a means of creating conditions that lead to the de-
sired end state. However, strategic operations continue even if a particular
regional threat or opportunity causes the State to undertake “regional opera-
tions” that include military means.
3-27. Prior to initiating armed conflict and throughout the course of armed
conflict with its regional opponent, the State continues to conduct strategic
operations to preclude intervention by outside playersby other regional
neighbors or by an extraregional power that could overmatch the State’s
forces. However, those operations always include branches and sequels for
dealing with the possibility of intervention by an extraregional power.
3-28. When unable to limit the conflict to regional operations, the State is
prepared to engage extraregional forces through “transition and adaptive op-
erations.” Usually, the State does not shift directly from regional to adaptive
operations. The transition is incremental and does not occur at a single, eas-
ily identifiable point. If the State perceives intervention is likely, transition
operations may begin simultaneously with regional and strategic operations.
Transition operations overlap both regional and adaptive operations. Transi-
tion operations allow the State to shift to adaptive operations or back to regional
operations. At some point, the State either seizes an opportunity to return to re-
gional operations, or it reaches a point where it must complete the shift to adap-
tive operations. Even after shifting to adaptive operations, the State tries to set
conditions for transitioning back to regional operations.
3-29. If an extraregional power were to have significant forces already de-
ployed in the region prior to the outbreak of hostilities, the State would not
be able to conduct regional operations using its normal, conventional design
without first eliminating those forces. In this case, the State would first use
strategic operationswith all means availableto put pressure on the al-
ready present extraregional force to withdraw from the region or at least re-
main neutral in the regional conflict. Barring that, strategic operations could
still aim at keeping the extraregional power from committing additional
forces to the region and preventing his forces already there from being able to
fully exercise their capabilities. If the extraregional force is still able to inter-
vene, the rest of the strategic campaign would have to start with adaptive op-
erations. Eventually, the State would hope to move into transition operations. If
3-9
FM 7-100 _________________________________________________________________________________
STRATEGIC CAMPAIGN
3-30. To achieve one or more specific strategic goals, the NCA would develop
and implement a specific national strategic campaign. Such a campaign is the
aggregate of actions of all the State’s instruments of power to achieve a specific
set of the State’s strategic goals against internal, regional, and/or extraregional
opponents. There would normally be a diplomatic-political campaign, an informa-
tion campaign, and an economic campaign, as well as a military campaign. All of
these must fit into a single, integrated national strategic campaign.
3-31. The NCA will develop a series of contingency plans for a number of dif-
ferent specific strategic goals that it might want or need to pursue. These
contingency plans often serve as the basis for training and preparing the
State’s forces. These plans would address the allocation of resources to a po-
tential strategic campaign and the actions to be taken by each instrument of
national power contributing to such a campaign.
Neutral Allied
Country Country Sea
t
res
Un
a of
Are l:
oa cy
Hostile g ic G rgen
ate nsu
Country Str nteri
u Strategic Goal:
Co
Defense Against Invasion
“THE STATE”
Strategic Goal:
Annexation of Territory
Sea
Sea
3-32.Aside from training exercises, the NCA would approve only one strategic
campaign for implementation at a given time. Nevertheless, the single cam-
paign could include more than one specific strategic goal. For instance, any
strategic campaign designed to deal with an insurgency would include con-
tingencies for dealing with reactions from regional neighbors or an extrare-
gional power that could adversely affect the State and its ability to achieve
the selected goal. Likewise, any strategic campaign focused on a goal that in-
volves the State’s invasion of a regional neighbor would have to take into con-
sideration possible adverse actions by other regional neighbors, the possibility
3-10
_________________________________________________________________________________Chapter 3
that insurgents might use this opportunity to take action against the State,
and the distinct possibility that the original or expanded regional conflict might
lead to extraregional intervention. Figure 3-5 shows an example of a single stra-
tegic campaign that includes three strategic goals. (The map of the State in this
diagram is for illustrative purposes only and does not necessarily reflect the ac-
tual size, shape, or physical environment of the State or its neighbors.)
3-38. In wartime, the MOD and the General Staff combine to form the Su-
preme High Command (SHC). The Operations Directorate continues to re-
view the military SCP and modify it or develop new plans based on guidance
from the Chief of the General Staff (CGS), who commands the SHC. It gener-
ates options and contingency plans for various situations that may arise.
Once the CGS approves a particular plan for a particular strategic goal, he
issues it to the appropriate operational-level commanders.
3-11
FM 7-100 _________________________________________________________________________________
3-39. The military SCP directs operational-level military forces, and each
command identified in the SCP prepares an operation plan that supports the
execution of its role in that SCP. The SCP assigns forces to operational-level
commands and designates areas of responsibility for those commands.
3-40. From the General Staff down through the operational and tactical lev-
els, the staff of each military headquarters has an operations element that is
responsible for planning. The plan at each level specifies the task organiza-
tion of forces allocated to that level of command, in order to best accomplish
the mission assigned by a higher headquarters. Once the commander at a
particular level approves the plan, he issues it to the subordinate command-
ers who will execute it.
THEATER
3-41. For the State, a theater is a clearly defined geographic area in which
the State’s Armed Forces plan to conduct or are conducting military opera-
tions. However, the term theater may have a different meaning for the State
than for a major extraregional power. For an extraregional power with global
force-projection capability, a theater is any one of several geographic areas of
the world where its forces may become involved. For the State, however, the
only theater (or theaters) in question would be within the region of the world
in which the State is located and is capable of exerting its regionally-centered
power. The extraregional power may not define the limits of this specific region
in exactly the same way that the State defines it, in terms of its own perceptions
and interests. Within its region, the State may plan or conduct a strategic cam-
paign in a single theater or in multiple theaters, depending on the situation.
3-42. The General Staff may create one or more separate theater headquar-
ters even in peacetime, for planning purposes. However, no forces would be
subordinated to such a headquarters until the activation of a particular SCP.
3-43. When there is only one theater, as is typical, the theater headquarters
may also be the field headquarters of the SHC, and the CGS may also be the
theater commander. Even in this case, however, the CGS may choose to focus
his attention on national strategic matters and to create a separate theater
headquarters, commanded by another general officer, to control operations
within the theater. A theater headquarters provides flexible and responsive
control of all theater forces.
3-44. When parts of the strategic campaign take place in separated geo-
graphical areas and there is more than one major line of operations, the State
may employ more than one theater headquarters, each of which could have
its own theater campaign plan. In this case, albeit rare, the SHC field head-
quarters would be a separate element exercising control over the multiple
theater headquarters.
3-45. The existence of one or more separate theater headquarters provides
flexibility to the State, in that it enables the SHC to focus on the strategic
campaign and to sustain the forces in the field. The theater headquarters
acts to effectively centralize and integrate General Staff control over theater-
wide operations and to exercise command over all forces assigned to a theater
in accordance with mission and aim assigned by the SHC.
3-12
_________________________________________________________________________________Chapter 3
3-46. For the State, a theater (or theaters) may include only those parts of
the region where it wishes to exert its own power and influence. However,
the theater(s) could also extend to areas where the State wishes to prevent
its regional neighbors or extraregional powers from exerting their power and
influence. During war, therefore, the State may extend its definition of a
given theater to include staging areas from which other forces can deploy into
the theater proper. In the event of threats from extraregional powers, the
State may authorize “out-of-theater” operations to neutralize a potential oppo-
nent’s power projection capabilities. For the State, the concept of theater(s) is
part of the concept of total war, which is not entirely military.
STRATEGIC OPERATIONS
3-47. The State’s “strategic operations” involve the application of any or all of
the four instruments of national power at the direction of the national-level
decision makers in the NCA. They occur throughout the strategic campaign.
The nature of strategic operations at any particular time corresponds to the
conditions perceived by the NCA. These operations also differ from the other
operations of a strategic campaign in that they are not limited to wartime
and can transcend the region. (For more detail, see the main heading on
Strategic Operations later in this chapter.)
3-48. During regional, transition, or adaptive operations, the State intends to
employ all its instruments of power in strategic operations against the en-
emy’s strategic centers of gravity. Even before the outset of regional opera-
tions, the State lays plans to prevent outside intervention in the region while
defeating its internal or regional enemies or otherwise achieving its strategic
goals. If extraregional intervention occurs, the State continues to employ
strategic operations while conducting transition and adaptive operations.
Strategic operations typically target intangible elements of the enemy’s ef-
forts against the State, including his will to fight, public support, and alli-
ances or coalitions.
REGIONAL OPERATIONS
3-49. The State possesses an overmatch in most, and sometimes all, elements
of power against regional opponents. It is able to employ that power in a con-
ventional operational design focused on offensive action. A weaker regional
neighbor may not actually represent a threat to the State, but rather an op-
portunity that the State can exploit. (For more detail on regional operations,
see Chapter 4.)
3-50. In such conditions, the State’s doctrine, organization, capabilities, and
national security strategy allow it to deal with internal and regional threats or
opportunities primarily through offensive action. This enables the State to con-
trol its own population and dominate neighboring nations, at least at the outset.
The State plans these operations well in advance and executes them as rapidly
as possible, in order to preclude regional alliances or outside intervention.
3-51. The State designs its military forces and employs an investment strat-
egy that ensures superiority in conventional military power over any of its re-
gional neighbors. Regionally-focused operations typically involve “conventional”
patterns of operation. However, the term conventional does not mean that the
3-13
FM 7-100 _________________________________________________________________________________
State will use only conventional forces and conventional weapons in such a con-
flict, nor does it mean that the State will not use some adaptive approaches.
3-52. During regional operations, the State also relies on its continuing stra-
tegic operations to preclude or control outside intervention. It tries to keep
foreign perceptions of its actions during a regional conflict below the thresh-
old that will invite in extraregional forces. The State wants to win the re-
gional conflict, but has to be careful how it does so. It works to prevent devel-
opment of international consensus for intervention and to create doubt
among possible participants.
TRANSITION OPERATIONS
3-53. Transition operations serve as a pivotal point between regional and
adaptive operations. The transition may go in either direction. The fact that
the State begins transition operations does not necessarily mean that it must
complete the transition from regional to adaptive operations (or vice versa).
As conditions allow or dictate, the “transition” could end with the State con-
ducting the same type of operations as before the shift to transition operations.
(For more detail on transition operations, see Chapter 5.)
3-54. The State conducts transition operations when other regional and/or
extraregional forces threaten the State’s ability to continue regional opera-
tions in a conventional design against the original regional enemy. At the
point of shifting to transition operations, the State still has the ability to ex-
ert all instruments of national power against an overmatched regional en-
emy. Indeed, it may have already defeated its original adversary. However,
its successful actions in regional operations have prompted either other re-
gional neighbors or an extraregional power to contemplate intervention. The
State will use all means necessary to preclude or defeat intervention.
3-55. Although the State would prefer to achieve its strategic goal through
regional operations, an SCP has the flexibility to be able to change and adapt
if required. Since the State assumes the possibility of extraregional interven-
tion, any SCP will already contain thorough plans for transition operations,
as well as adaptive operations, if necessary.
3-56. When an extraregional force starts to deploy into the region, the bal-
ance of power begins to shift away from the State. Although the State may
not yet be totally overmatched by the enemy force, it faces a threat it will not
be able to handle with normal, “conventional” patterns of operation designed
for regional conflict. Therefore, the State must begin to adapt its operations
to the changing threat.
3-57. While the State and its Armed Forces as a whole are in the condition of
transition operations, an operational- or tactical-level commander will still re-
ceive a mission statement in plans and orders from higher headquarters stating
the purpose of his actions. To accomplish that purpose and mission, he will use
as much as he can of the conventional patterns of operation that were available
to him during regional operations and as much as he has to of the more adap-
tive-type approaches dictated by the presence of an extraregional force.
3-58. Even extraregional forces may be vulnerable to “conventional” opera-
tions during the time they require to build combat power and create support
3-14
_________________________________________________________________________________Chapter 3
ADAPTIVE OPERATIONS
3-61. Generally, the State conducts adaptive operations as a consequence of
intervention from outside the region. Once an extraregional force intervenes
with sufficient power to overmatch the State, the full conventional design
used in regionally-focused operations is no longer sufficient to deal with this
threat. The State has developed its doctrine, organization, capabilities, and
strategy with an eye toward dealing with both regional and extraregional op-
ponents. It has already planned how it will adapt to this new and changing
threat and has included this adaptability in its doctrine. (For more detail on
adaptive operations, see Chapter 6.)
3-62. Having begun the process of adaptation during transition operations,
the State must continue to adapt its operations in order to address the grow-
ing threat. Thus, it completes the shift from regional operations to adaptive
operations. Adaptive operations help the State to mitigate its disadvantages
and exploit its advantages, as compared to the extraregional threat. The
State must also continue to deal with internal and regional threats as it pre-
pares to deal with the extraregional threat.
3-63. The longer the State can delay effective extraregional response to the
crisis in the region, the greater its chances for success. Failing to limit or in-
terrupt access to the region, the State will attempt to degrade further enemy
force projection, hold initial gains, and extend the conflict, while preserving
its own military capability and other instruments of national power.
3-15
FM 7-100 _________________________________________________________________________________
3-64. The State believes that adaptive operations can lead to several possible
outcomes. If the results do not completely resolve the conflict in the State’s
favor, they may at least allow the State to return to regional operations. Even
a stalemate may be a victory for the State, as long as it preserves enough of its
instruments of power to preserve the regime and lives to fight another day.
3-65. When an extraregional power intervenes with sufficient force to over-
match the State’s, the State and its Armed Forces have to adapt their pat-
terns of operation. The State still has the same forces and technology that were
available to it for regional operations, but must use them in creative and adap-
tive ways. It has already thought through how it will adapt to this new or chang-
ing threat in general terms. (See Principles of Operation versus an Extrare-
gional Power below.) It has already developed appropriate branches and sequels
to its basic SCP and does not have to rely on improvisation. During the course of
combat, it will make further adaptations, based on experience and opportunity.
3-66. When the State shifts to adaptive operations, these are often sanctuary-
based and more defensive in nature than were regional or transition opera-
tions. When overmatched in conventional power, the State seeks to preserve its
own power and apply it in adaptive ways. It expects its commanders to seize op-
portunity, tailor organizations to the mission, and make creative use of existing
capabilities even more than they did in regional and transition operations.
3-67. As part of the State’s strategy for total war, these adaptive operations
attempt to attack the intervening force throughout its depth and to destroy
its will and ability to fight. The intent is to delay, disrupt, wear down, and ul-
timately defeat the intervening force by the application of all means neces-
sary. These operations will use various combinations of military means, in-
cluding offense and defense, as well as paramilitary and nonmilitary means.
They can also use various combinations of weapons, possibly including weap-
ons of mass destruction (WMD).
3-16
_________________________________________________________________________________Chapter 3
into the region and to force them to keep their operating bases beyond con-
tinuous operational reach. This is the easiest manner of preventing the ac-
cumulation of enemy combat power in the region and thus defeating a tech-
nologically superior enemy.
3-70. Access-control operations are continuous throughout the strategic cam-
paign and can reach beyond the theater as defined by the State’s NCA. They
can begin even before the extraregional power declares its intent to come into
the region, and continue regardless of whether the State is conducting regional,
transition, or adaptive operations. Access-control operations come in three basic
forms: strategic preclusion, operational exclusion, and access limitation.
3-71. Strategic Preclusion. Strategic preclusion seeks to completely deter
extraregional involvement or severely limit its scope and intensity. The State
would attempt to achieve strategic preclusion in order to reduce the influence
of the extraregional power or to improve its own regional or international
standing. It would employ all its instruments of power to preclude direct in-
volvement by the extraregional power. Actions can take many forms and of-
ten contain several lines of operation working simultaneously.
3-72.The primary target of strategic preclusion is the extraregional power’s
national will. First, the State would conduct diplomatic and perception man-
agement activities aimed at influencing regional, transnational, and world
opinion. This could either break apart ad hoc coalitions or allow the State to
establish a coalition of its own or at least gain sympathy. For example, the
State might use a disinformation campaign to discredit the legitimacy of dip-
lomatic or economic sanctions imposed upon it. The extraregional power’s
economy and military would be secondary targets, with both practical and sym-
bolic goals. This might include using global markets and international financial
systems to disrupt the economy of the extraregional power, or conducting physi-
cal and information attacks against critical economic centers. Similarly, the
military could be attacked indirectly by disrupting its power projection, mobili-
zation, and training capacity. Preclusive actions are likely to increase in inten-
sity and scope as the extraregional power moves closer to military action. If stra-
tegic preclusion fails, the State will turn to operational methods that attempt to
limit the scope of extraregional involvement or cause it to terminate quickly.
3-73. Operational Exclusion. Operational exclusion seeks to selectively
deny an extraregional force the use of or access to forward bases of operation
within the region or even outside the theater defined by the NCA. For exam-
ple, through diplomacy, economic or political connections, information cam-
paigns, and/or hostile actions, the State might seek to deny the enemy the
use of bases in other foreign nations. It might also attack population and
economic centers for the intimidation effect, using long-range missiles, WMD,
or Special-Purpose Forces (SPF).
3-74. Forces originating in the enemy’s homeland must negotiate long and
difficult air or surface lines of communication (LOCs) merely to reach the re-
gion. Therefore, the State will use any means at its disposal to also strike the
enemy forces along routes to the region, at transfer points en route, at aerial
and sea ports of embarkation (APOEs and SPOEs), and even at their home
stations. These are fragile and convenient targets in support of transition
and adaptive operations.
3-17
FM 7-100 _________________________________________________________________________________
3-78. Operational shielding generally cannot protect the entire force for an
extended time period. Rather, the State will seek to protect selected elements
of its forces for enough time to gain the freedom of action necessary to prose-
cute important elements of a strategic campaign.
Control Tempo
3-79. The State initially employs rapid tempo to conclude regional operations
before an extraregional force can be introduced. It will also use rapid tempo
to set conditions for access-control operations before the extraregional force
can establish a foothold in the region. Once it has done that, it needs to be
able to control the tempoto ratchet it up or down, as is advantageous to its
own operational or tactical plans.
3-80. During the initial phases of an extraregional enemy’s entry into the re-
gion, the State’s Armed Forces may employ a high operational tempo to take
3-18
_________________________________________________________________________________Chapter 3
3-19
FM 7-100 _________________________________________________________________________________
serves to further define and limit the achievable objectives of a conflict for all
parties involved, and to determine its duration and conditions of termination.
3-20
_________________________________________________________________________________Chapter 3
3-21
FM 7-100 _________________________________________________________________________________
forces. They will also try to mass fires from dispersed locations to destroy key
enemy systems and formations. However, when an opportunity presents it-
self, the State can rapidly mass forces and adopt more patterned operations
for decisive combat.
3-98. The strengths and weaknesses of an adversary may require other ad-
justments. The State will capitalize on interoperability issues among the en-
emy forces and their allies by conducting rapid actions before the enemy can
respond with overwhelming force. If the State borders another country with a
sympathetic population, it can use border areas to provide refuge or a base of
attack for insurgent forces. Also, the State can use terror tactics against enemy
civilians or soldiers not directly connected to the intervention as a device to
change the fundamental nature of the conflict.
3-99. The State may have different criteria for victory than the extraregional
forcea stalemate may be good enough. Similarly, its definition of victory
may not require a convincing military performance. For example, it may call
for inflicting numerous casualties to the enemy. The State’s perception of vic-
tory may equate to national survival. So the nature of the conflict may be
perceived differently in the eyes of the State versus those of the enemy.
Allow No Sanctuary
3-100. Along with dispersion, decoys, and deception, the State uses urban ar-
eas and other complex terrain as sanctuary from the effects of enemy forces.
Meanwhile, its intent is to deny enemy forces the use of such terrain. This
forces the enemy to operate in areas where the State’s long-range fires and
strikes can be more effective.
3-101. The State seeks to deny enemy forces safe haven during every phase
of a deployment and as long as they are in the region. The resultant drain on
manpower and resources to provide adequate force-protection measures can
reduce the enemy’s strategic, operational, and tactical means to conduct war
and erode his national will to sustain conflict. Terror tactics are one of the ef-
fective means to deny sanctuary to enemy forces. Terrorism has a purpose
that goes well beyond the act itself; the goal is to generate fear. For the State,
these acts are part of the concept of total war. State-sponsored or independ-
ent terrorists can attack the enemy anywhere and everywhere. The State’s
SPF can also use terror tactics and are well equipped, armed, and motivated
for such missions.
3-102. The State is prepared to attack enemy forces anywhere on the battle-
field, at overseas bases, at home stations, and even in military communities.
It will attack his airfields, seaports, transportation infrastructures, and
LOCs. These attacks feature coordinated operations by all available forces,
using not just terror tactics, but possibly long-range missiles and WMD. Tar-
gets include not only enemy military forces, but also contractors and private
firms involved in transporting troops and materiel into the region. The goal
is to present the enemy with a nonlinear, simultaneous battlefield. Striking
such targets will not only deny the enemy sanctuary, but also weaken his na-
tional will, particularly if the State can strike targets in the enemy’s homeland.
3-22
_________________________________________________________________________________Chapter 3
STRATEGIC OPERATIONS
3-103. What the State calls “strategic operations” is actually a universal stra-
tegic course of action the State would use to deal with all situationsin
peacetime and war, against all kinds of opponents, potential opponents, or
neutral parties. Strategic operations involve the State’s use of any and all of
its instruments of national power to affect the enemy’s strategic centers of
gravity. In relation to an extraregional power, the first aim of strategic op-
erations is to preclude such a power from intervening in the State’s region. If
preclusion is not possible, the aim becomes that of getting the extraregional
force to leave before it can achieve the goals of its intervention.
MEANS
3-104. Strategic operations apply all four instruments of power, in varying
combinations depending on the conditions. In most cases, the diplomatic-
political, informational, and economic means tend to dominate. During stra-
tegic operations, military means are most often used to complement those
other instruments of power to achieve State goals. For example, the military
means are likely to be used against key political or economic centers or tan-
gible targets whose destruction affects intangible centers of gravity, rather
than against military targets for purely military objectives.
3-105. Against such targets, the State will employ all means available: dip-
lomatic initiatives, IW, economic pressure, terrorist attacks, State-sponsored
insurgency, direct action by SPF, long-range precision fires, and even WMD
against selected targets. These efforts often place noncombatants at risk and
aim to apply diplomatic-political, economic, and psychological pressure by al-
lowing the enemy no sanctuary.
3-106. The use of diplomatic-political or economic means or pressure is al-
ways orchestrated at the national level, as is strategic IW. Even with the
military instrument of power, actions considered part of strategic operations
require a conscious, calculated decision and direction or authorization by the
NCA, which is not entirely military in its makeup.
TARGETS
3-107. Strategic operations target the enemy’s strategic centers of gravity.
They attack the intangible components of the enemy’s efforts against the
State. They primarily target those elements that can most affect factors such
as enemy soldiers’ and leaders’ confidence, political and diplomatic decisions,
public opinion, the interests of private institutions, national will, and the col-
lective will and commitment of alliances and coalitions. National will is not
just the will to fight, but also the will to intervene by other than military means.
3-108. It may not be readily apparent to outside parties whether specific ac-
tions by the State’s various instruments of power are part of strategic opera-
tions or part of another strategic-level course of action occurring simultane-
ously. In fact, one action could conceivably fulfill both purposes. For example,
a demoralizing defeat that could affect the enemy’s strategic centers of grav-
ity could also be a defeat from an operational or tactical viewpoint. In other
cases, a particular action on the battlefield might not make sense from a tac-
tical or operational viewpoint, but could achieve a strategic purpose. Its purpose
3-23
FM 7-100 _________________________________________________________________________________
TIMEFRAME
3-110. Strategic operations occur continuously, from prior to the outbreak of
war to the post-war period. They can precede war, with the aim of deterring
other regional actors from actions hostile to the State’s interests or compel-
ling such actors to yield to the State’s will. Once war begins, they are gener-
ally conducted concurrently with the other components of the strategic cam-
paign (regional, transition, and adaptive operations). What the various in-
struments of power do and which ones dominate in strategic operations at a
given time depends on the same circumstances that dictate shifts from re-
gional through transition to adaptive operations. Therefore, Chapters 4
through 6 will further discuss strategic operations in conjunction with the
three other strategic-level courses of action.
3-111. The State is always applying its diplomatic-political, informational,
and economic instruments of power. Even in peacetime, the military plays an
important role. The very presence of the State’s military power, which over-
matches that of its regional neighbors, gives the State leverage and influence
in regional affairs. Peacetime military engagement (PME) is another tool for
expanding the State’s influence. PME encompasses all peacetime programs
and training exercises that the State’s Armed Forces conduct to shape the in-
ternational environment, open communications and improve mutual under-
standing with other countries, and improve interoperability with allies and
potential allies. The State can also foster military or economic cooperation
based on historical relationships. Thus, it may be possible for the State to
achieve its strategic goals without ever resorting to armed conflict.
3-112. In wartime, strategic operations become an important, powerful com-
ponent of the State’s strategy for total war. They occur concurrently with re-
gional, transition, and adaptive operations and can change the course of
other strategic-level courses of action or even bring the war to an end.
3-113. Strategic operations may continue even after termination of the
armed conflict. If the State succeeds in defeating the extraregional force or at
least forces it to withdraw from the region, this victory enhances the State’s
status both regionally and globally. It will take advantage of this status to
pursue its strategic goals. Should the State lose this war as judged from con-
ventional political or military standards, but still survive as a nation and re-
gime, it may be able to claim victory.
3-24
_________________________________________________________________________________Chapter 3
3-25
FM 7-100 _________________________________________________________________________________
ELEMENTS OF IW
3-121. Integrated within IW doctrine are the following elements:
• Electronic warfare (EW). Measures conducted to control or deny the
enemy’s use of the electromagnetic spectrum, while ensuring its use by
the State.
• Computer warfare. Measures ranging from unauthorized access
(hacking) of information systems for intelligence collection purposes to
the insertion of destructive viruses and deceptive information into en-
emy computer systems. Such attacks focus on the denial, disruption, or
manipulation of the infrastructure’s integrity. SIW typically targets
critical nodes or hubs, rather than targeting the entire network or in-
frastructure.
• Deception. Measures designed to mislead the enemy by manipulation,
distortion, or falsification of information to induce him to act in a man-
ner prejudicial to his interests.
• Physical destruction. Measures to destroy critical components of the
enemy’s information infrastructure.
• Protection and security measures. Measures to protect the State’s
information infrastructure and to deny protected information to other
actors.
• Perception management. Measures aimed at creating a perception
of truth that best suits State objectives, using a combination of true,
false, and misleading information targeted at the State’s own citizens
and/or external actors. This element is crucial to successful SIW. The
State is continuously looking for ways to sway international opinion in
its favor or impact critical foreign strategic decision makers.
• Information attack (IA). Measures focused on the intentional dis-
ruption of digital information in a manner that supports a comprehen-
sive SIW campaign. Information attacks focus exclusively on the ma-
nipulation or degradation of the information moving throughout the in-
formation environment.
3-122. The seven elements of IW do not exist in isolation from one another
and are not mutually exclusive. The overlapping of functions, means, and
targets makes it necessary that they all be integrated into a single IW plan.
At the national level, this is known as the strategic information warfare plan
(SIWP). However, effective execution of SIW does not necessary involve the
use of all elements in conjunction. One element may be all that is required to
successfully execute as SIW action or a supporting action at the operational
or tactical level. The use of each element or a combination of elements is de-
termined by the overall situation and specific strategic goals.
3-26
_________________________________________________________________________________Chapter 3
3-27
FM 7-100 _________________________________________________________________________________
3-28
_________________________________________________________________________________Chapter 3
MINISTRY RESPONSIBILITIES
3-133. All State agencies take measures to ensure effective control of infor-
mation and the appropriate dissemination of information within the State
government, to the State’s populace, and to other actors in the international
environment. Each State ministry is responsible for the political indoctrina-
tion of its personnel and the dissemination of government policy information
among its subordinate elements. Information security is also a function
within each ministry. Each of the four key ministries associated with the four
instruments of national power has its own campaign plan, which includes an
IW plan.
3-29
FM 7-100 _________________________________________________________________________________
and national interests and to extend the political influence of the State. The
State consciously uses diplomatic channels of communication to inform for-
eign nations about its policies and create a favorable response. The ministry’s
Public Relations Directorate also conducts information campaigns (in this
case called public relations campaigns) within the region and external to the
region. The directorate produces public relations films and articles and coor-
dinates events that extol the virtues of the State.
3-30
_________________________________________________________________________________Chapter 3
3-31
Chapter 4
Regional Operations
Regional operations are a strategic-level course of action against oppo-
nents the State overmatches in conventional power, including regional
adversaries and internal threats. They include conventional, force-on-
force military operations, along with the application of the State’s other
instruments of national power.
STRATEGIC GOALS
4-1. The national security strategy is designed to achieve one or more specific
strategic goals within the State’s region. Therefore, it typically starts with ac-
tions directed at an opponent within the regionan opponent that the State
overmatches in conventional military power, as well as other instruments of
power.
4-2. The State’s primary strategic goal in conducting regional operations is to
expand its sphere of influence within the region. The specific goal might be
territorial expansion, economic expansion, acquisition of natural resources, or
the protection of a related minority population in a neighboring country.
When the State no longer believes that the status quo offers a means to
achieve its goal, it conducts regional operations.
4-3. To seize territory and otherwise expand its influence in the region, the
State must destroy a regional enemy’s will and capability to continue the
fight. It will attempt to achieve strategic decision or achieve specific regional
goals rapidly, in order to preclude outside intervention. In conjunction with
military means, it can use political-diplomatic, informational, and economic
instruments of power against regional threats and to prevent or preclude ex-
traregional intervention.
4-4. During regional operations, the State must still contend with internal
opponents, as well as the looming possibility of extraregional intervention. It
will try to predict what extraregional actors may try to do to thwart its ef-
forts, when they will do so, and how. It will try to prevent deployment of ex-
traregional forces or an extraregional actor’s intervention by other than mili-
tary means. The State will also start planning for potential transition opera-
tions and even adaptive operations, in case these become necessary.
4-1
FM 7-100 _________________________________________________________________________________
DIPLOMATIC-POLITICAL MEANS
4-5. The State uses political means to maintain internal stability, while us-
ing diplomatic means to counter regional and extraregional threats. During
regional operations, the State must control not only its own population, but
also that of any conquered territory. It must continue to identify and neutral-
ize internal dissident groups, paying particular attention to groups within
the State that have ethnic, religious, and cultural backgrounds similar to
those of the people of the country the State is fighting. The State closely
monitors these groups to ensure that the groups’ dissidents do not negatively
affect the State’s operations. It must also keep dissident groups from exploit-
ing the state of total war or specific events for their own purposes.
4-6. In general, the State increases surveillance of its own citizens, monitor-
ing their attitudes and activities. For example, soldiers who were conscripted
into a peacetime army may now find themselves fighting a war they do not
support. Particularly if they are fighting a people demographically related to
them, such soldiers’ questionable loyalty may threaten the State and its mili-
tary operations. Families of soldiers killed in a war these families do not sup-
port may stage demonstrations against the State. Riots, sabotage, internal
terrorism, work stoppages, and factory shutdowns can also threaten the
State. Should regional operations negatively affect the supply of food and
manufactured goods within the State, citizens who would normally remain
loyal to the State may turn against it.
4-7. When necessary, the State uses internal security forces to control the lo-
cal populace.1 By monitoring known resident dissident leaders, the State
hopes to determine what role, if any, they play in anti-State demonstrations
and activities. The State will round up well-known dissident leaders and jail
them to prevent them from agitating the masses and recruiting additional
support. The State can establish curfews and use roadblocks, checkpoints,
and sentries at borders to prevent other dissidents from entering the State
from neighboring countries. The State can infiltrate groups that advocate the
overthrow of the State government or do not support the State’s goals. The
State can extend the duration of conscripted military service indefinitely and
not allow men to leave military service until a date to be determined by the
State. The State actively seeks and rounds up those who disobey conscription
notices. When necessary, the State can also use regular units of its Armed
Forces against disloyal elements of its own population.
4-8. The State’s internal security forces are responsible for identifying and
neutralizing subversive elements regarded as threats to the regime. Both vio-
lent and peaceful groups are included in this category. Plainclothes agents
investigate and monitor such groups and infiltrate their ranks. The internal
security forces are engaged in intelligence-gathering and counterintelligence
activities, employing an extensive human intelligence (HUMINT) network.
Its agents are recruited from the most politically reliable segments of the
State population. These agents not only gather information, but also focus
1
When subordinate to the Ministry of the Interior in peacetime, the internal security forces have a primarily political
role, although many of these forces are organized and equipped along military lines. Among dissident groups,
these forces are sometimes called the “secret police.” In wartime, they take on more of a military role, but at least
some of them retain their politically-oriented mission.
4-2
_________________________________________________________________________________Chapter 4
the subversive element in a direction that the regime can control. The inter-
nal security forces also eavesdrop on all important telephone lines and instal-
lations dangerous to the regime. Through tapping mobile-phone connections,
and especially through private radio stations, the internal security forces
monitor the activities of dissident and subversive groups.
4-9. During regional operations, the internal security forces continue to op-
erate their HUMINT network within the State and expand this network into
enemy territory as the cornerstone of its reconnaissance, intelligence, surveil-
lance, and target acquisition (RISTA) capability. This HUMINT network
monitors and collects information on foreign organizations operating within
the State’s sphere of influence. These include not only foreign spies, but also
foreign-based corporations doing business in the region, as well as nongov-
ernmental and private volunteer organizations (NGOs and PVOs) that offer
humanitarian assistance. Government agents infiltrate NGOs and PVOs to
determine these organizations’ agendas and how it can manipulate these or-
ganizations to support the State’s goals and objectives.
4-10. During regional operations, the State uses diplomatic means with the
primary purpose of preventing other actors from entering conflicts against
the State. Diplomats will be active outside the country, forming alliances and
seeking promises of neutrality or active support from neighboring states. This
support may be political, military, or economic, and may be either overt or covert.
4-11. The State will seek permission to use forward staging areas, airfields,
ports, and lines of communication (LOCs) located within regional countries,
as well as to use regional airspace for hostile action or overflight. At the same
time, it will deny ground transit and landing rights within the State to those
countries that do not support its activities. It will also deny overflight within
its borders by nations hostile to State goals. The State will ask neighboring
countries to monitor their own internal dissident groups that may assist the
State’s dissidents in negatively affecting State operations.
4-12. At the conclusion of successful regional operations, the State would try
to consolidate its regional power and stabilize the regional balance of power
in its favor. It would also strive to gain global recognition of its expanded
power status.
INFORMATIONAL MEANS
4-13. The State conducts an internal information campaign aimed at main-
taining and strengthening the national will. This campaign tries to give the
State’s people the impression that the government is keeping them informed,
give them a positive attitude about the national leadership, and paint a pic-
ture of a common foe they can universally hate. The overall goal is to give the
entire country a common focus.
4-14. The State’s Ministry of Public Information continues to maintain tight
control of national and local communications and internal media. It can ma-
nipulate the media to undermine support of internal adversaries and to
strengthen the general population’s support of State policy in internal and
external matters. It ensures that newspaper editorials always support State
actions. It can stage rallies by the local populace for the purpose of showing
4-3
FM 7-100 _________________________________________________________________________________
public support for State’s actions. It would mandate heavy media coverage of
such rallies and other positive events. It can crush negative rallies organized
by the local populace and not allow the media to cover these rallies. The State
attempts to focus subversive elements in a direction that the State can control.
4-15. The State conducts political education sessions at local factories and
throughout the industrial base. It also continues indoctrination of youths
within the Youth Corps. Children too young to join the Youth Corps receive
indoctrination at school.
4-16. State-controlled media can project an image of the President as a na-
tional hero. His heroic status may be the result of past military victories or
success in the ongoing strategic campaign. To those who share a common
ethnic, cultural, or religious background with the President, the media may
portray him as a champion of those causes. To all, he will be portrayed as a
champion of State nationalism and expansionary goals.
4-17. In an attempt to show that volunteering for military duty is honorable
and widespread, the State-controlled media can highlight stories about youth
who voluntarily enlist. The State rewards families whose sons volunteer for
military service. Presentations of these rewards to families are nationally
publicized. Military retirees and others who had finished mandatory military
service and returned to the civilian workforce, receive special recognition
from the State when they volunteer for additional military service.
4-18. During regional operations, the Ministry of Public Information also
continues to maintain tight control over access to international communica-
tions and international media. The State can confiscate radios owned by
amateur radio operators communicating with and sharing news information
with outside sources. Internet dial-up capability will be restricted to State of-
ficials only. Libraries and public places that allow the public to use the Inter-
net will no longer be allowed to do so. The intent is to ensure that the populace
is receiving positive messages about the State and its regional operations.
4-19. The State intensifies its efforts to control and manipulate international
media. It will attempt to get foreign media to print favorable articles and run
favorable television news spots about State activities. It can block access to
international media’s satellite transmissions critical of State operations; it
controls the infrastructure (satellite downlink and hub) within the State and
occupied territory and thus can deny distribution to the public by simply not
broadcasting media received from the satellite. It can censor all newspapers
imported into the State. Only newscasts and stories expressing favorable
views of State operations are allowed to circulate.
4-20. State-controlled media will interview citizens of invaded territories and
coerce them into discussing how much better off they are since State occupa-
tion, and the State will use these interviews as part of an information cam-
paign. The State will take over radio and television stations, as well as print
media, in the invaded territory and will use these media sources to present
State political views to invaded peoples. It will identify, locate, and destroy
underground newspaper sources in the invaded territory.
4-4
_________________________________________________________________________________Chapter 4
ECONOMIC MEANS
4-21. The economic impact of regional conflict on the State depends on the
level of resistance from the State’s regional opponents and reaction from other
countries. Even if a regional adversary has the military capability to conduct re-
taliatory strikes onto State territory, including economic targets, the State can
avoid or degrade that capability by having civilians at such sites or by
making it known that strikes would also destroy production of civilian
goods. If the regional opponent causes some damage or outside actors im-
pose economic sanctions, the impact on the State’s economy may be
greater.
4-22. In the best case, the State’s economy and industrial base may suffer lit-
tle or no damage from the war. The State may actually increase production in
a rush to increase national wartime stockpiles of key military and civilian
supplies and material prior to any extraregional intervention that could de-
stroy production facilities or disrupt imports. Whether the State suffers dam-
age to its domestic production capability or not, it may increase production at
factories that the State or its ruling elite own in foreign countries. This can
facilitate further stockpiling before extraregional intervention can close down
those factories or the LOCs to them.
4-23. The State may use its economic leverage within the region in order to
force neighboring countries to become its allies or at least to remain neutral
in the conflict. It actively seeks economic support from regional actors and
also searches for new sources of arms and other goods required to conduct
sustained operations. It can boycott all goods and services exported from the
country whose territory it has invaded, and it will attempt to convince
other regional actors to do the same. Likewise, it will boycott economic
goods and services from regional and extraregional actors not supporting
State goals.
4-24. Once the State has totally subjugated the invaded territory, it will take
over local factories and all means of industrial output within the territorial
boundaries. It may also confiscate foreign-owned industries and assets within
the State or the occupied territory.
4-25. In a worst-case situation, the State’s internal resources might be
strained, particularly if the State becomes subject to regional or interna-
tional boycotts on its own imports and exports. The production of war
goods might be at the expense of goods normally produced for civilian con-
sumption. If necessary, the State is prepared to ration goods, including
food and gasoline. It can appropriate large vehicles necessary for trans-
port of military supplies and equipment. It can also appropriate privately-
owned sea and inland-water transport capabilities. In order to increase
industrial production to support the total war effort, the State may estab-
lish mandatory production quotas and extend workdays in factories. If
necessary, factories may bring back retired workers to assist with factory
operations.
4-5
FM 7-100 _________________________________________________________________________________
MILITARY MEANS
4-26. The State’s choice to use military power indicates that the use of other
means alone proved insufficient to reach the strategic goal, or that the State
has elected to seize an opportunity that it can exploit militarily. Even in the
context of regional operations, a strategic campaign may include several
combined arms, joint, and/or interagency operations. If the State succeeds in
forming a regional alliance or coalition, operations may also be multinational.
Due to its military superiority over the regional adversary, the State is able
to pursue primarily offensive military operations. It is also prepared to use
military means against internal and possible extraregional threats.
4-27. The State’s investment strategy for its Armed Forces focuses on re-
gional dominance, so that regional objectives are achievable with existing
military capabilities. Thus, it maintains large forces, in comparison to its re-
gional neighbors, and pursues a program of selective modernization, insertion
of new technology into older systems, and investment in a few high-cost,
high-payoff systems that provide it a technological niche.
4-28. The State’s military forces are sufficient to overmatch any single re-
gional neighbor, but not necessarily an alliance or coalition of neighboring
countries. They are certainly no match for the forces an extraregional power
can bring to bear. Thus, the State seeks to exploit its numerical and techno-
logical overmatch against one regional opponent rapidly, before other re-
gional neighbors or an extraregional power can enter the fight.
4-29. Regional operations are multiservice operations that include Army,
Navy, Air Force, Strategic Forces, Special-Purpose Forces (SPF), and Internal
Security Forces. Therefore, the State fields a large Army ground combat
forcesupported by the Air Force, Navy, and SPFto seize territory or de-
feat a regional opponent. Strategic Forces may support these operations by
delivering conventional weapons or nuclear, biological, or chemical (NBC)
weapons, depending on the degree of escalation. In addition to their peace-
time missions, the paramilitary Internal Security Forces can help control the
population in territory the State seizes or engage enemy forces that invade
State territory.
4-30. The State’s military goal during regional operations is to destroy its re-
gional opponents’ military power in order to achieve specific ends. The State
plans regional operations well in advance and executes them as rapidly as is
feasible in order to preclude intervention by outside forces. Still, at the very
outset of these operations, it lays plans and positions forces to conduct access-
control operations in the event of outside intervention. Extraregional forces
may also be vulnerable to conventional operations during the time they re-
quire to build combat power and create support at home for their intervention.
4-31. Plans and preparations for regional operations typically include efforts
to ensure—
• The successful penetration of enemy defenses.
• Dependable fire support.
• Simultaneous deep operations throughout the region or theater that
conform to the strategic campaign plan.
4-6
_________________________________________________________________________________Chapter 4
• Rapid exploitation.
• Countermeasures against enemy strike and reconnaissance systems.
• Preparation for access-control operations.
COMMAND AND CONTROL
4-32. The State’s overall command and control (C2) concept is that of central-
ized planning and decentralized execution. Planning occurs from the top
down. Accordingly, the higher commander’s decision for the base course of action
includes four essential elements: objective, opportunity, method, and end state.
4-33. Clearly stating objectives from the strategic level to the tactical level
assures that all units understand the purpose for missions and the desired
outcome. Objectives are linked at each level to achieve the State’s purposes.
4-34. Opportunity stems from a common understanding of the conditions. In
the State Armed Forces, plans identify branches and sequels that may take
advantage of opportunity at all levels. Strategic-level actions create opportu-
nity for operational action, and operational-level actions create opportunity
for tactical action. The essence of the element of opportunity is that the State
Armed Forces encourage initiative by subordinate commanders consistent
with the objectives and end states identified during planning. Confronted by
the possibility of intervention by more capable forces, the State relies on its
commanders to act in the absence of orders, if required, to mitigate State
limitations and vulnerabilities in its C2 architecture.
4-35. Specifying method assures an effective allocation of resources and sup-
ports coordination in the absence of orders from higher headquarters. Finally,
clearly articulating the desired end state assures that all State Armed Forces
elements will execute toward a common goal, whether or not their communi-
cations systems are fully functional.
4-36. Detailed planning starts from the top down. The higher commander
states the mission of subordinates in broad terms, accompanied by his con-
cept of operations, which contains the essential elements of his plan. Thus, in the
event circumstances change, a subordinate who is familiar with his superior’s
concept can adapt his efforts to ensure his unit contributes to the overall goal.
4-37. Initiative and creative approaches are the main criteria. In the State
view, initiative consists of intelligent anticipation, or at least correct inter-
pretation, of the higher commander’s intent and the effective implementation
of it without detailed guidance. It involves the flexible organization and em-
ployment of forces to react speedily, without waiting for direction, to meet
unexpected changes in the operational and/or tactical situation. This enables
the State to accelerate the pace of its operations and decision making so that
it is able to function effectively at a higher tempo than its regional opponents
can undertake.
4-38. Centralization of control gives the Armed Forces flexibility in the em-
ployment of resources to meet the overall goal of the strategic campaign. It
ensures unity of views on the management of forces. Above all, it is essential
to the control of weapons of mass destruction (WMD) and precision weapons.
It is also important in the management of long-range fires and air defense
operations.
4-7
FM 7-100 _________________________________________________________________________________
ARMY
4-41. The Army is large and modern, in comparison to the ground forces of
the State’s regional neighbors. Therefore, it is capable of offensive operations
against such opponents, relying heavily on its armor, mechanized infantry,
and airborne forces. However, it also has large infantry forces suitable for op-
erating in the urban environments and other complex terrain that dominate
portions of the region. Its fire support is adequate to dominate regional ad-
versaries. Army SPF can support the ground forces at the operational level
and conduct reconnaissance and direct action to the opponent’s operational
depth.
4-42. Army ground forces have two purposes: to destroy other military forces
or to seize terrain. For these purposes, Army forces may attack along a sub-
optimal approach to exploit an enemy vulnerability or to achieve surprise. To
maintain a high tempo of operations and reach key targets, Army forces often
accept the risk of bypassing pockets of resistance.
4-43. Offensive operations during the course of regional operations attempt
to achieve strategic political or military decision by destroying the enemy’s
4-8
_________________________________________________________________________________Chapter 4
will and capability to fight. The Army may try to bring this about by destroy-
ing the C2 and logistics systems the enemy needs for continued operations.
NAVY
4-44. The Navy is more than adequate to operate against navies of regional
opponents and overwhelm them. Its primary means of dominating regional
navies are small fast-attack craft armed with antiship missiles. These craft,
along with ground-based antiship missile units, submarines, and mines, also
give the Navy the ability to challenge or control access to the region by sea.
4-45. The Navy enables the State to project power within the region. It can
project ground forces or naval infantry up to brigade size within the region. If
necessary, the State can appropriate privately-owned ships to supplement its
transport capability. Naval infantry forces can operate independently for up
to 30 days pending linkup with ground forces. Naval SPF can carry out re-
connaissance in support of landings or conduct raids against critical targets.
AIR FORCE
4-46. The State takes great pride in its Air Force, which is numerically and
technologically superior to other air forces in its region. It invests in a few
high-payoff systems and larger numbers of other aircraft that are less than
state-of-the-art but still sufficient to dominate the regional airspace. It has
transport aircraft capable of projecting airborne troops regionally. It can also
insert its own SPF and those of other service components.
4-47. The Air Force also includes Air Defense Forces with which the State
can successfully defend its airspace against regional opponents. Against such
adversaries, the State may be able to use an integrated air defense system
(IADS) that is centrally directed at the national level. The State’s air de-
fenses also provide the capability to challenge or deny air access into the re-
gion by outside forces, at least initially.
STRATEGIC FORCES
4-48. The long-range missiles and rockets of State’s Strategic Forces are pri-
marily political tools for exerting influence in the region. When necessary, the
State can use these systems with conventional warheads to strike key targets
and affect the national will of a regional opponent. The threat of using these
systems to deliver WMD is also an intimidating factor. Should any regional
opponent use its own WMD capability against the State, the State is pre-
pared to retaliate in kind. It is also possible that the State could use WMD
against a regional neighbor as a warning to any potential extraregional en-
emy that it is willing to use such weapons.
4-49. Strategic Forces can use long-range missiles and even WMD to deny a
regional opponent the use of urban and other complex terrain. This creates
opportunities for operational forces to engage the enemy with fires and ma-
neuver.
4-9
FM 7-100 _________________________________________________________________________________
AFFILIATED FORCES
4-51. The State may also have overt or covert affiliations with other forces
that act in concert with the Armed Forces but are not actually part of them.
These affiliated forces may be mercenaries, insurgents, terrorists, and drug
or criminal organizations. Thus, regional operations could include State-
sponsored terrorism or insurgency against a regional neighbor. Other affili-
ated forces may include cyber terrorists or hackers.
STRATEGIC OPERATIONS
4-52. During the course of regional operations, the State uses strategic op-
erations primarily in defensive ways, in order to prevent other parties from
becoming involved in what it regards as purely regional affairs. At this point,
use of any military means against parties not currently involved in the con-
flict would most likely have the opposite effect, causing them to become in-
volved. Therefore, the State relies primarily on the diplomatic-political, in-
formational, and economic means in a peacetime mode in relation to parties
with whom it is not at war. For example, it may try to deny the rest of the
world information on events in the region or to portray those events in a
manner favorable to the State.
4-10
Chapter 5
Transition Operations
Transition operations are a strategic-level course of action that bridges
the gap between regional and adaptive operations and contains some ele-
ments of both. The State continues to pursue its regional goals while deal-
ing with the development of outside intervention that has the potential
for overmatching the State.
STRATEGIC GOALS
5-1. The State conducts transition operations when other regional and/or ex-
traregional forces threaten the State’s ability to continue regional operations
in a conventional design against the original regional enemy. Transition opera-
tions serve as a means for the State to adapt to the new situation and still pur-
sue its overall strategic goal of regional expansion. At this point, another emerg-
ing strategic goal is to defeat outside intervention or perhaps still prevent it.
5-2. Transition operations serve as a bridge between regional and adaptive
operations. The transition may go in either direction. The fact that the State
begins transition operations does not necessarily mean that it must complete
the transition from regional to adaptive operations (or vice versa). As condi-
tions allow or dictate, the “transition” could end with the State conducting
the same type of operations as before the shift to transition operations.
5-3. Usually, the State does not shift directly from regional to adaptive opera-
tions. The transition is incremental and does not occur at a single, easily
identifiable point. Thus, a period of transition operations overlaps both re-
gional and adaptive operations. The State plans and prepares for transition
operations prior to being forced into adaptive operations; so, the transition
can begin concurrently with regional operations. As the term “transition” im-
plies, actions defy clear categorization and the progression is not easily dis-
cernable. Transition operations allow the State to shift gradually to adaptive
operations or back to regional operations. In this fluid situation, transition
operations serve as a pivotal point in a strategic campaign that could go ei-
ther way. (See Figure 5-1.) At some point, the State seizes an opportunity to
return to regional operations or it reaches a point where it must complete the
shift to adaptive operations.
5-1
FM 7-100 _________________________________________________________________________________
5-4. Mostly defensive in nature, transition operations may include some of-
fensive operations. If this combination of offensive and defensive actions is
successful and the extraregional force is no longer a factor, the State may be
able to transition back to regional operations without having to complete the
shift to adaptive operations.
5-5. During transition operations, the State must decide whether to keep its
forces in any territory it has occupied in a neighboring country or to with-
draw them back to its home territory. The decision to stay or withdraw at
this point may be based on the presence or absence of urban areas and/or
other complex terrain suitable for sanctuaries and other adaptive measures
in the occupied territory against an extraregional power with overmatch in
technology and conventional forces. Sanctuary requires not only suitable ter-
rain, but also a sympathetic or intimidated local populace. The State is also
more likely to remain in the occupied territory if it has already achieved its
strategic goal in regional operations or at least achieved major intermediate
objectives leading toward that goal.
5-6. At the point of shifting to transition operations, the State still has the
ability to exert all instruments of national power against an overmatched re-
gional enemy and, indeed, may have defeated its original regional adversary.
However, its successful actions in regional operations have prompted ether
other regional actors or an extraregional actor to threaten to become involved
in the conflict. The State will use all means necessary to preclude or put a
quick end to such possible expansion of the conflict and to either consolidate
its previous gains or conduct further operations against the original regional
enemy using a more conventional design.
5-7. Transition operations can also buy time for the State’s strategic opera-
tions to succeed. Meanwhile, strategic operations against the impending ex-
traregional threat may resort to more offensive actions against intangibles
and even carefully selected attacks on the enemy’s tangible assets in order to
target his strategic centers of gravity. For example, the State or its affiliated
forces can attack staging areas and economic targets in the region or even in
the enemy’s homeland.
5-2
_________________________________________________________________________________Chapter 5
DIPLOMATIC-POLITICAL MEANS
5-8. Because of the lack of a clear-cut division between regional and transi-
tion operations, political means of maintaining internal stability during tran-
sition operations are similar to the means used during regional operations.
The types of internal threats remain the same, but are intensified by chang-
ing conditions. When conducting regional operations, the State was making
progress toward a longstanding goal of regional hegemony and enjoyed a
high level of public support. When extraregional intervention threatens to
halt or reverse this progress, it also threatens internal stability. Faced with
increasing unrest among local civilians, the State must be more concerned
about internal dissidents and use its control mechanisms to crack down on
them. However, the State’s ability to deal with increased internal unrest is
impacted by diversion of resources and instruments of national power to deal
with external threats from regional and extraregional forces. When the tran-
sition is from adaptive back toward regional operations, there will also be a
lack of clear distinction in the use of political means against internal threats.
5-9. As it does during regional operations, the State will continue to use diplo-
matic means to negotiate alliances and attempt to increase support internally
and externally to the region. However, these negotiations take on more of a
sense of urgency for the State. It may enlist the services and expertise of former
or retired diplomats and politicians who have had experience working with vari-
ous regional and extraregional actors and have established a rapport with the
officials in these countries. During these negotiations, the State may use bribes
or make promises that it has no intention of keeping. Against extraregional ac-
tors, it will initiate diplomatic actions to postpone, delay, or disrupt the mobili-
zation and deployment of extraregional forces. Even after actual intervention be-
gins, the State will seek diplomatic ways to prevent deployment of further forces.
INFORMATIONAL MEANS
5-10. The State continues to exercise the informational instrument of power
during transition operations in the same manner it uses during regional op-
erations. In its internal information campaign, it will exaggerate enemy com-
bat losses as compared to State combat losses. The State will not admit that
it is overmatched by regional and/or extraregional adversaries, that it is in
danger of losing the war, or that it is failing to make progress in achieving its
strategic goal. The State will accentuate success and will put a positive spin
on all news releases. The State’s informational goal will be to convince its
citizens that transition operations are necessary in order for the State to ex-
ploit the many gains it has already made.
5-11. In information campaigns targeting the international community, the
State increases its emphasis on popularizing the State and its actions. Not
wishing to appear as an aggressor, it attempts to convince the international
community that it is conducting its primarily military campaign in order to
help regional neighbors increase their standard of living and improve their
way of life. If it is obvious that the State will be overmatched by the extrare-
gional force that is about to intervene, the State may depict the intervening
force as an unwanted aggressor involving itself in regional affairs in order to
support its own selfish interests.
5-3
FM 7-100 _________________________________________________________________________________
5-12. Against extraregional threats, the State begins to use more offensive
forms of information warfare (IW). These include not only more aggressive
information campaigns, but also information attack and perhaps physical at-
tack, as long as there is opportunity for plausible deniability. As extrare-
gional forces begin to deploy into the region, the State can use information
attacks on enemy command and control (C2) systems. The State continues to
leverage international media to influence world perception and public opin-
ion within the extraregional power’s own populace. It can influence the ex-
traregional force’s operations by playing up in the media the fact that the en-
emy’s standoff weapons sometimes strike innocent civilians.
ECONOMIC MEANS
5-13. By the time the State enters transition operations, it should already
have sufficient stockpiles of key military supplies and materiel to support
sustained operations. Faced with economic sanctions and boycotts of imports,
it now focuses on further stockpiling of critical civilian goods such as fuel,
food, and clothing to satisfy the basic needs of the populace. Even with these
stockpiles, the State may gradually begin rationing of civilian supplies and
services as a hedge against future shortages. It assumes that the intervening
extraregional force will be capable of striking its fixed production facilities.
The State will seek to keep the enemy from using this capability by publiciz-
ing that there are large numbers of civilians at these sites or that such
strikes would also destroy production of civilian goods.
5-14. During transition operations, if not before, the State begins to national-
ize the industrial base. Since the wealthy families who control the State gov-
ernment also own most of the large factories and major business enterprises,
the step of nationalizing these parts of the State’s economy is a short one.
The State may ask workers to work longer hours for lower wages, and use the
money saved to further State goals. The State may increase production quotas
and reward factories or workers who meet them while severely punishing those
who do not. The State will increase interest rates on government-funded loans.
5-15. Prior to transition operations, the State monitored railway and port-of-
entry operations closely. During transition operations, it may nationalize
these assets. Thus it can dictate and control all railway schedules. By limit-
ing passenger travel to official travel only, the State can use the railway lines
to transport more goods to areas where they are needed to support the war
effort. It can confiscate privately-owned container cars and use them for offi-
cial business. The State will limit transfer of goods at all ports of entry to
those goods necessary for the sustainment and conduct of the war effort.
5-16. The State will attempt to negotiate future payment for imported goods
in order to decrease the cash flow out of the country. By calling in interna-
tional debt and demanding debt payments from regional and extraregional
actors, the State will also increase the cash flow into the State. In turn, the
State may cease payments on national debt owed to other countries.
5-17. The State will use economic sanctions and pressure to prevent its re-
gional neighbors from lending support or sanctuary for deployment of ex-
traregional forces. It will also use the possibility of collateral damage to
5-4
_________________________________________________________________________________Chapter 5
MILITARY MEANS
5-18. It is possible for transition operations to be hasty in natureagainst an
unexpected regional coalition or unexpected extraregional intervention. In
this rather unlikely case, the short-term goal is preservation of military ca-
pability while seeking transition back to regional operations.
5-19. In most cases, the State will have anticipated extraterritorial interven-
tion and will have thoroughly planned transition operations, as well as possi-
ble adaptive operations. The Armed Forces operate human intelligence
(HUMINT) agents throughout the region and have some global intelligence-
gathering capability against those nations the State perceives as the most
likely potential enemies. When the transition is planned and deliberate, the
long-term goal is preservation and application of military capability support-
ing the transition from regional to adaptive operations and eventually back
to regional operations, if conditions support doing so.
5-20. During transition operations, military forces solidify gains made during
regional operations. However, the central aim is to prevent or defeat outside
intervention. Although military operations are primarily defensive in nature,
limited attacks may continue. A combination of operational and tactical of-
fensive and defensive actions help the State to control tempo. In some cases,
the objective is to get inside the enemy decision cycle.
5-21. The State will use the time it takes the extraregional force to prepare
and deploy into the region to change the nature of the conflict into something
for which the intervening force is unprepared. The State tries to establish condi-
tions that force the new enemy to fight at less than full strength and on terrain
for which his forces are not optimized. It seeks to take advantage of urban areas
or other complex terrain whenever possible, while controlling the enemy’s access
to such terrain. It plans operations to exploit the opportunities created by the
presence of NGOs, PVOs, media, and other civilians on the battlefield.
5-22. Military forces in the immediate vicinity of the point of intervention
move into sanctuary as opportunity allows, making use of existing C2 and lo-
gistics. They conduct limited attacks to secure positions, protect flanks, and
control access. They may attack vulnerable early-entry forces before the en-
emy can bring his technological overmatch to bear. Even at this stage, the
State may be able to inflict politically unacceptable casualties that could
cause the extraregional power to terminate its intervention.
5-23.During transition operations, State forces will plan and conduct sophis-
ticated ambushes to destroy high-visibility enemy systems or cause mass
casualties. These ambushes are not always linked to maneuver or ground ob-
jectives, but may have huge psychological and political impact by demonstrat-
ing the vulnerability. The State may use niche technology it has acquired to
achieve technological surprise and limited-duration overmatch in specific areas.
5-24. The State can use long-range missiles to deny an extraregional oppo-
nent the use of urban areas or other complex terrain. This creates opportunities
5-5
FM 7-100 _________________________________________________________________________________
for operational forces to destroy key enemy systems with precision fires or to
engage the enemy forces with fires and maneuver.
5-25. If access-control efforts are successful, in conjunction with transition
operations, the State wants to stay in the regional operations mode. If at-
tacks against enemy early-entry forces are successful, the State may go back
to regional operations. If not, it moves toward adaptive operations. It wants
to be able to go either direction.
5-26. Meanwhile, transition operations permit other key forces the time,
space, and freedom of action necessary to move into sanctuary in preparation
for a shift to adaptive operations. These forces preserve combat power and
prepare to defend the State homeland, if necessary. Transition operations usu-
ally include mobilization of reserve and militia to assist in defending the State.
5-27. Transition operations may include several combined arms, joint, and/or
interagency operations and, if the State is part of an alliance or coalition,
may also be multinational. Even when operations are joint, the air and naval
forces increasingly revert to defensive measures to preserve their capability.
Ground forces or, more often, Special-Purpose Forces (SPF) conduct raids
against logistics sites, lines of communication (LOCs), and vulnerable mili-
tary targets in the region, along the routes to the region, and to the enemy’s
strategic depth. Occasionally, if the risks are worth the costs, the State at-
tacks such targets by air and sea. It may also use long-range missiles or
rockets to deliver conventional warheads or weapons of mass destruction
(WMD) against these kinds of targets. Paramilitary forces, air defense forces,
and precision attack can also play important roles. The State may also use
long-range weapons or SPF to conduct attacks outside the theater, to divert
enemy resources to protect politically or ecologically sensitive targets. Al-
though these attacks are characteristically part of transition operations, they
are also conducted during regional and adaptive operations if required. The
purpose is to allow the enemy no sanctuary.
5-28. At some point, the State may conclude that it cannot deny entry or de-
feat the extraregional force by destroying his early-entry forces. The State
then shifts its emphasis to completing the transition to adaptive operations
as soon as possible, before the enemy can deploy overwhelming forces into
the region.
5-6
_________________________________________________________________________________Chapter 5
5-32. Transition operations do not lead to a single end state. The end state
against a regional opponent may be consolidation and/or disengagement. If
transition operations prevent intervention or destroy the intervening force,
the result can set the conditions for a return to regional operations. If they
merely delay or temporarily disrupt the intervention and the extraregional
force is able to get sufficient force in the region to threaten eventual over-
match against the State, the desired end state is to permit other State forces
to prepare for a shift to adaptive operations.
5-7
FM 7-100 _________________________________________________________________________________
ARMY
5-36. During transition operations, if not before, the State begins mobiliza-
tion of militia for defense of the homeland. The militia forces belong exclu-
sively to the Army and consist primarily of infantry. Thus, they are suited for
securing LOCs and defending the State in sanctuary-based operations, but
they are generally not capable of large offensive operations.
5-37. Regular Army ground forces or Army SPF conduct raids against enemy
logistics sites, LOCs, and vulnerable military targets. Army forces may still
be able to conduct operations in a conventional design against enemy early-
entry forces. However, Army operations generally begin to move toward the
less conventional applications associated with adaptive operations.
NAVY
5-38. The Navy possesses the capability to challenge or control access to the
region by the most modern navies at maritime choke points, using a combi-
nation of mines, shore- and sea-based antiship missiles, and submarines. The
Navy can also insert naval infantry or Naval SPF to conduct raids against
critical installations within the region. If necessary, the State can appropri-
ate privately-owned ships or inland-water craft to supplement its capability
to transport troops or supplies.
AIR FORCE
5-39. At least during the early stages of intervention, the Air Force and its
Air Defense Forces are sufficient to challenge extraregional air forces and
prevent them from attaining air supremacy for a time. Thus, the State’s air
and air defense forces may prove effective in supporting access-control efforts
during transition operations.
5-40. Within the region, Air Force transport aircraft may deliver airborne
troops, Air Force SPF, and SPF belonging to other components. The State
may also use privately-owned and commercial aircraft for this purpose. Air
Force SPF can conduct raids against enemy air bases and other installations.
STRATEGIC FORCES
5-41. The State can use the long-range missiles of its Strategic Forces to
strike intermodal transportation nodes, and air and sea ports along the LOCs
that any extraregional force might require for its deployment into the region.
It may also use them to extend the conflict beyond the region, to affect the
national will of potential opponents or members of enemy coalitions.
5-42. The Strategic Forces can strike enemy logistics sites, LOCs, and vul-
nerable military targets using missiles with conventional or WMD warheads.
However, it is unlikely that the State would use those delivery means to em-
ploy NBC weapons inside or outside the region or theater prior to using the
same units to deliver long-range conventional weapons. It also could use
WMD tactically or operationally against troops in the field prior to using
them strategically. However, once having crossed the threshold of using
WMD, the State may use them against any high-payoff target within the
range of its delivery systems. Positioning of the State’s Strategic Forces units
5-8
_________________________________________________________________________________Chapter 5
AFFILIATED FORCES
5-44. During transition operations, the State can count on most of the same
affiliated forces that aided it in regional operations. It may be able to form
further affiliations with groups that were not originally sympathetic to the
State’s goals, but are willing to unite with the State against an extraregional
power perceived as a common enemy. Affiliated forces can attack aerial and
sea ports of debarkation (APODs and SPODs), staging areas, or economic
targets in the region. Terrorists with global reach can even strike the home-
land of the extraregional force.
STRATEGIC OPERATIONS
5-45. The State will use strategic operations to limit or shape enemy coali-
tions. During transition operations, the military aspects of strategic opera-
tions become more aggressive. The State can try to slow down enemy mobili-
zation by information attack. During deployment, it can disrupt the flow of
enemy movement at his aerial and sea ports of embarkation (APOEs and
SPOEs), as well as APODs and SPODs, by SPF direct action and information
attack. It can physically attack enemy early-entry forces and their LOCs. It
can also attack high-payoff targets such as high-technology communications
nodes and other information systems.
5-46. Enemy force projection from a distant homeland affords the State the
opportunity to mine nautical choke points and to establish antishipping am-
bushes. Air and sea ports, both in the enemy homeland and in the region, are
vulnerable and convenient targets for terror tactics or sabotage in support of
transition and adaptive operations. The State can also exploit local nationals
employed as contractors and host-nation support for the extraregional force;
the State can use them to collect intelligence or conduct sabotage.
5-9
Chapter 6
Adaptive Operations
Adaptive operations are a strategic-level course of action to preserve the
State’s power and apply it in adaptive ways against opponents that over-
match the State. Theoretically, this overmatch could be the result of an
alliance among the State’s regional neighbors, but it will more likely come
from the intervention of an extraregional power.
STRATEGIC GOALS
6-1. Generally, the State conducts adaptive operations during the strategic
campaign as a consequence of intervention from outside the region. If it can-
not control the extraregional enemy’s access into the region or defeat his
forces before his combat potential in the region equals or exceeds its own, the
State must resort to adaptive operations. The primary objectives are to pre-
serve combat power, to degrade the enemy’s will and capability to fight, and to
gain time for aggressive strategic operations to succeed. However, the State will
not cede the initiative. Even with the intervention of an advanced extraregional
power, the State will employ military means so long as this does not either place
the regime at risk or risk depriving it of sufficient force to remain a regional he-
gemon. Adaptive operations generally include the State’s home territory, as well
as the regional theater(s) in which the State has conducted regional operations.
6-2. Once an extraregional force intervenes with sufficient power to over-
match the State, the State’s immediate goal is survivalas a regime and as a
nation. However, its long-term goal is still the expansion of influence within
its region. In the State’s view, this goal is only temporarily thwarted by the
extraregional intervention. Accordingly, planning for adaptive operations fo-
cuses on effects over time. The State believes that patience is its ally and an
enemy of the extraregional force and its intervention in regional affairs.
6-3. It is the combination of the State’s capabilities and strategy that make it
believe it can take on the extraregional force and win. The State must make
creative and adaptive use of existing technologies and forces. At the strategic,
operational, and/or tactical levels, it employs conventional and unconven-
tional forces in an adaptive manner, in close coordination with the strategic
6-1
FM 7-100 _________________________________________________________________________________
operations, to wrest the initiative from the opposition and achieve decisive
operational and strategic results.
6-4. Internal threats remain much the same as in regional and transition
operations, but are further intensified by the conditions that led to adaptive
operations. As in transition operations, the State’s ability to deal with increased
internal unrest is impacted by diversion of resources and instruments of national
power to deal with external threats from regional and extraregional forces.
6-5. The State believes that adaptive operations can lead to several possible
outcomes. If the results do not completely resolve the conflict in the State’s
favor, they may at least allow the State to return to regional operations. Even
a stalemate may be a victory for the State, as long as it preserves enough of
its instruments of power to preserve the regime and lives to fight another day.
DIPLOMATIC-POLITICAL MEANS
6-6. The State will conduct diplomatic and political activities similar to those
during regional and transition operations. It becomes very difficult for the
State to use political means to counter internal threats during adaptive op-
erations. By the time the State has shifted to adaptive operations, it has suf-
fered casualties and may not have reached its goal. The State’s citizens may
be rebellious and more difficult for the State to control during adaptive op-
erations than during regional operations.
6-7. The State will expand and step up internal control measures imple-
mented during regional operations. For example, it may make travel passes
mandatory for travel inside and outside urban areas and around key strategic lo-
cations. It may establish curfews and close places of entertainment such as bars,
theaters, and other gathering places where citizens could meet to form dissident
organizations. It may even abolish all religious services and related activities.
6-8. By rewarding those citizens who continue to support the war effort, the
State hopes to increase support from other citizens. It will fill jails with those
who do not support it, and even provide monetary incentive for citizens turn-
ing in other citizens for unpatriotic activities.
6-9. The State continues to seek new diplomatic agreements and alliances
that will allow it to expel the extraregional force that caused it to transition
to adaptive operations. Unexpected alliances with the State can affect the ex-
traregional force’s dominance. The State also attempts to exploit the vulner-
abilities of an enemy coalition.
INFORMATIONAL MEANS
6-10. The State continues to censor and manipulate the media. It may
change and modify its basic themes, but the final essence of the information
campaign remains the same: to maintain or expand internal, regional, and
international support for State operations.
6-11. During adaptive operations against an extraregional enemy, State-
controlled media continue to project an image of the President as a national
hero. The media seek to add to his heroic status. This image is important to
impress on the general populace, so that it will continue to follow the President
6-2
_________________________________________________________________________________Chapter 6
in hardship. Otherwise, the populace may not have the same patience as the
State leadership or maintain the same willingness to sacrifice over time.
6-12. In its internal information campaign, the State will continue to exag-
gerate its gains and downplay the extent of its losses. It will continue to extol
benefits of continuing the strategic campaign. It will tell citizens that its stra-
tegic campaign is a success and will continue to be an even greater success if
the citizens dedicate more time and effort to the State’s cause. It will con-
tinue to use the citizens of the invaded territory as pawns in its information
campaign, which also will exploit enemy deserters, as well as prisoners of
war from extraregional forces.
6-13. The State uses perception management and other tools to attack the
enemy’s will to fight or otherwise continue its intervention, and to manipulate
international opinion. If it still occupies territory of a neighboring country, it also
tries to turn the populace there against the intervening extraregional force.
6-14. During adaptive operations, the informational element of strategic op-
erations continues to attack the intangible components of the enemy’s efforts
against the State. It targets those elements that can most affect factors such
as enemy soldiers’ and leaders’ confidence, political and diplomatic decisions,
public opinion, the interests of private institutions, national will, and the col-
lective will and commitment of alliances and coalitions.
6-15. The extraregional force and its individual soldiers tend to lack cultural
awareness of the region and will thus make mistakes that unintentionally of-
fend the local populace. The State will publicize these unintentional offensive
actions in order to solidify its own people’s hatred of the outsiders or to turn
regional neighbors against them.
6-16. The State can create or manufacture humanitarian crises to embarrass
the enemy or force him to divert resources to correct the real or manufactured
crises. It can also stage incidents, riots, and demonstrations for media atten-
tion and to delay or disrupt enemy movement.
ECONOMIC MEANS
6-17. The State will continue tighten the internal economic controls it im-
plemented previously. It will nationalize all small, private factories that had
not previously come under its control. The State may close schools in order to
allow children to join the workforce and assist in the production of war mate-
rials. The presence of children in the factories may deter the enemy from
bombing them. The State will authorize release and use of equipment, energy
sources, and goods that are stored in national wartime stockpiles. However, it
will normally impose or increase rationing of civilian supplies and services.
6-18. The State continues and intensifies economic sanctions and pressure on
other nations. It will look for new or expanded lines of communication (LOCs)
that open up routes closed by intervention of extraregional forces. If diplo-
matic sanctions are not imposed, the State will continue to produce, trans-
port, and stockpile key military and civilian goods from State-owned factories
based in other countries. It will seek to transport supplies and materiel under
foreign-flagged commercial transportation, as well as through the supply
networks of affiliated forces.
6-3
FM 7-100 _________________________________________________________________________________
MILITARY MEANS
6-19. Adaptive operations occur as a result of an extraregional power inter-
vening with sufficient forces to thwart the State’s original offensive opera-
tions in the region. Adaptive operations are often more defensive in nature
than were regional or transition operations. They may focus on preserving
forces, retaining gains in the region, and defending the State’s home terri-
tory. The State’s forces disperse to the extent their command and control (C2)
allows and conduct decentralized operations in both offense and defense. The
State views adaptive operations as temporary in nature, serving as a means
for the State to return to regional operations.
6-20. Once an extraregional power commits forces in the region, State forces
will not avoid battle. They will seek it often, but on their own terms. Battles
will occur at a place and time of the State’s choosing and will involve dis-
persed maneuver, precision fires, and simultaneous actions by all services of
the Armed Forces as well as affiliated forces.
6-21. Adaptive operations are often sanctuary-based. Sanctuaries are areas
that limit the ability of an opponent to apply his full range of capabilities.
The State’s forces can use physical and/or moral sanctuaries for preserving
and applying forces. They can defend in sanctuaries or attack out of them.
When defending, the State’s forces generally do not employ fixed, contigu-
ous defensive fronts. They may conduct limited-duration operational- and
tactical-level offensive actions to prevent buildup of intervening forces, to fa-
cilitate the defense, or to take advantage of an opportunity to counterattack.
6-22. When State forces can create a window of opportunity or exploit oppor-
tunity created by natural conditions that limit or degrade enemy capabilities,
they move out of sanctuary and attack. They try to force the enemy to operate
in areas where the State’s own long-range fires and strike operations can be
most effective. They use windows of opportunity to destroy key enemy sys-
tems or cause mass casualties. If these fires and strikes change the balance of
forces, State forces can exploit success with decisive offensive maneuver.
Otherwise, they go back into sanctuaries.
6-23. The State uses flexible and unpredictable force structures task-
organized for particular missions. Forces may be combined arms, joint, inter-
agency, and possibly multinational. The State may fully mobilize all available
means to create large conventional force and paramilitary capability in sup-
port of adaptive operations. Full mobilization involves all military and para-
military forces, including militia. During adaptive operations, the State will
use conventional forces in adaptive ways. It will also employ unconventional
and specialized forces tailored to the needs of combat against an extrare-
gional force with technological overmatch. Operations may also involve vari-
ous types of affiliated forces.
6-24. In military terms, the extraregional force might have technological
overmatch, but may not be able to apply it fully against the State. This can
occur when successful strategic operations cause the extraregional power to
impose political limitations on its participation in the conflict. Such political
considerations can limit the amount of forces being brought to bear, the time-
table for deployment, and the application of forces. The State can change the
nature of conflict to something for which the extraregional force was not
6-4
_________________________________________________________________________________Chapter 6
6-5
FM 7-100 _________________________________________________________________________________
6-30. The State concept for C2 takes into account the State’s vulnerabilities
as well as the vulnerabilities it perceives in its potential adversaries. It
stresses planning centrally, but encourages flexibility and initiative in decen-
tralized execution. This concept both mitigates State weaknesses and enables
it to accelerate its decision making and accelerate or slow the pace of its opera-
tions as required. Equally important, the State believes it can operate effectively
at a tempo that will challenge potential extraregional opponents. In sanctuary-
based adaptive operations, it will afford itself more robust C2 by hard-wiring to
the extent possible. It believes this will enable its militia forces and regular
forces to act in concert effectively, while accounting for the fact that its mili-
tia forces are less able to execute its fundamental approach to command and
control.
ARMY
6-32. The Army will seek to conduct adaptive operations in circumstances,
opportunities, and terrain that optimize its own capabilities and degrade
those of the enemy. It will employ a force that is optimized for the terrain
or for a specific mission. For example, it will use its antitank capability,
tied to obstacles and complex terrain, inside a defensive structure de-
signed to absorb the enemy’s momentum and fracture his organizational
framework.
6-33. The Army plans and prepares sanctuaries and defenses throughout
State territory in anticipation of intervention. It makes maximum use of pre-
positioned logistics. Then it tries to dictate when and where combat opera-
tions occur. Success depends on two critical factors—transition operations
that have allowed the Army to occupy defensive positions, and an enemy
driven by a timeline for completion.
6-34. Various State forces engage the enemy simultaneously to his opera-
tional and even strategic depth. The goal is to present the enemy with a non-
linear, simultaneous battlefield, allowing him no sanctuary. This does not
allow the enemy to have any secure rear areas. The State tries to force the
enemy to commit forces at very low percentage of combat strength, possibly
with no reserve, before he has built up overwhelming forces on the ground.
The Army attempts to control enemy movement, using natural and manmade
obstacles and exploiting the presence of civilians on the battlefield. Overland
routes through complex terrain are obviously vulnerable to attack. Army
forces use the enemy’s predictable patterns of operation to set up raids and
ambushes. They look for opportunities to conduct fast, surgical attacks or
counterattacks and then return to sanctuary.
6-6
_________________________________________________________________________________Chapter 6
6-35. During dispersed operations, substantial gaps may exist between the
positions of units. In these gaps, the State will use precision long-range fires
or Special-Purpose Forces (SPF), insurgents, and militia to destroy key sys-
tems, cause politically unacceptable casualties, harass the enemy, and main-
tain contact. Some defensive positions may include complex battle positions
or heavily defended spaces that are able to fight in all directions within the
limitations of the terrain. These defenses are generally tied to complex ter-
rain. The Army conducts counterattacks at all levels, in the gaps or inside de-
fensive positions, to impose delay, inflict casualties, or preserve critical points
in the defense. Sanctuary-based operations require extensive planning,
preparation, and pre-positioning of forces, caches of supplies, and critical C2
systems. Urban or other complex terrain provides concealment for these as-
sets. The State’s forces also try to deny the enemy use of complex terrain that
could protect his forces from fires delivered by State forces from their dis-
persed locations.
6-36. Fighting in urban areas and other complex terrain is manpower- and
resource-intensive. The State may have more of both those types of assets
readily available in the region than does the extraregional power. When op-
erating in rugged terrain, the older, simpler systems of the State’s Armed
Forces may function better and more reliably that the high-technology sys-
tems of the extraregional force. In urban areas and other complex terrain, the
State can use cheap, plentiful, but lethal infantry systems to destroy enemy
platforms. It can also affect the extraregional force’s dominance by acquiring
niche technology and achieving technological surprise.
6-37. The extraregional enemy prefers to use his technological advantage in
the form of long-range, standoff engagement. The State can force such an en-
emy to engage in close, dismounted combat by conducting the fight in urban
or other complex terrain. It can also keep the enemy from using his standoff ca-
pability by using the civilian populace and third-party noncombatants as shields
or locating the State’s forces and systems close to sites that are culturally, politi-
cally, economically, or ecologically sensitive, especially in invaded territory.
6-38. The advanced C2 and reconnaissance, intelligence, surveillance, and
target acquisition (RISTA) systems of the extraregional force are high-payoff
targets for computer warfare, information attack, or physical destruction.
Disruption or denial of these resources at critical times can degrade the en-
emy’s situational awareness and real-time intelligence ability. Attacking a
critical ground-based C2 or RISTA node can have a very big payoff for low
risk and relatively low investment, using common jamming systems and
other technologies readily available on the open market. Thus, the State
places high priority on identifying and locating enemy C2 and RISTA as-
sets, so that it can destroy, deceive, or manipulate them to its own advantage.
6-39. The Army recognizes the importance of preventing or at least delaying
enemy air superiority. Therefore, the Army maintains its own air defense
forces in addition to those subordinate to the Air Force. Army air defense in-
cludes mobile air defense units and large numbers of shoulder-fired surface-
to-air missiles (SAMs).
6-7
FM 7-100 _________________________________________________________________________________
NAVY
6-40. The Navy will continue its efforts to limit or disrupt further enemy ac-
cess into the region by sea. Navy operations become more offensive. However,
it may make more aggressive use of its land-based antiship cruise missiles.
The State may risk a surge effort by its remaining naval forces in order to
produce politically significant casualties. Sinking a major naval combatant,
for example, may be worth the risk and effort. The Navy could also use its
submarine force to insert SPF for direct action against a high-payoff target
outside the region.
AIR FORCE
6-41. Against an extraregional enemy, the State starts to lose the air superi-
ority it had enjoyed against regional forces. Still, it can employ its relatively
limited air assets during early stages of enemy deployment, to control enemy
access or to inflict early casualties before the enemy builds up sufficient air
and air defense capabilities to dominate the airspace. It can also save its air
forces for a surge effort at a critical point in the conflict. However, the State
will not delay use of its Air Force assets until such a surge unless it has
means, such as underground shelters, to ensure the survivability of its air-
craft on the ground. Deep operations by the State’s attack helicopter units
against extraregional forces are unlikely except against high-value targets
that the State estimates to be worth the expenditure of scarce resources.
6-42. The Air Defense Forces, subordinate to the Air Force, focus their efforts
on destroying enemy aircraft, while protecting critical defensive positions and
key political and economic sites. The State watched with interest the air
campaigns in Operations Desert Storm and Allied Force and concluded that it
is unlikely to be able to defend all of its airspace in the event of extraregional
intervention. Fundamentally, the State accepts that it may not be able to
employ a nationally integrated air defense system (IADS) against a modern
extraregional force. A vertically integrated system centrally directed at the
national level could be a liability from a C2 standpoint. Thus, the State is
prepared to use IADS at sector levels, where units may be hard-wired and do
not require as large a footprint physically and electronically.
6-43. The State arrays its Air Defense Forces in air defense sectors and de-
velops air defense ambushes along the most likely air avenues of ap-
proach. Within sectors, it may be able to challenge the most modern air forces.
In choosing to fight within sectors, it accepts risk, in that air defense sectors pre-
sent seams in the defenses and may be unable to provide mutual support.
6-44. The State also employs passive air defense techniques including disper-
sal, deception, and camouflage. To the extent possible, it disperses high-value
assets. Sector air defense provides three discrete benefits: facilitating passive air
defense, reducing the signature of defensive systems, and enabling the State to
mass air defense assets from dispersed sites to protect the most critical targets.
6-45. Air Defense Forces have a combination of passive early warning based
on observers and radar systems that will serve them well in the early stages
of combat operations against even the most modern opponents. In later
stages, the State accepts that it must rely heavily on observers and will lose
6-8
_________________________________________________________________________________Chapter 6
or at least not be able to use both airborne and ground-based early warning
systems with optimum effectiveness.
6-46. The State’s concept of air defense is not purely defensive in nature. It
also focuses on destroying not only enemy aircraft, but also the C2 systems
associated with enemy air operations. Thus, it will also attack enemy AEW
(AWACS) platforms, and use air defense jammers, GPS jammers, and other
electronic warfare methods to disrupt his air capability.
6-47. During adaptive operations in State territory, Air Force SPF provide
air base security. They also can conduct raids against enemy air bases and
installations within the region. They may also take part in joint SPF opera-
tions coordinated by the SPF Command as part of strategic operations.
STRATEGIC FORCES
6-48. The State considers the Strategic Forces capability, even when deliver-
ing conventional munitions, the responsibility of the National Command Au-
thority (NCA). Unable to mount robust air campaigns, the State can use
these weapons to mount an equivalent effort. While willing to use long-range
missiles and rockets, the State fully recognizes the international implications
of doing so, even with conventional warheads.
6-49. Perhaps the most promising means for the State to mitigate or offset
the tremendous technological advantage of an extraregional force is to use of
weapons of mass destruction (WMD). The State has invested in very capable
ballistic missiles and rockets that enable the Strategic Forces to deliver
WMD packages. These weapons do not require great accuracy to achieve re-
sults. They do not require sophisticated delivery means either. However, the
State does not use WMD casually. Although the State understands that
WMD confer advantages in first use, it recognizes that they carry great risks
for retaliation in kind. Accordingly, it may risk first use only when the payoff
appears to outweigh the potential costs.
6-50. During adaptive operations, the State shows greater willingness to use
WMD to extend and divert the enemy. It may conduct WMD attacks against
third parties in the region on order to draw enemy attention and resources
away from the main fight and to affect international opinion. It may use
WMD against the extraregional force, particularly in his rear area.
6-51. Escalation from conventional weapons delivery to delivery of WMD is
tightly controlled by the NCA. The State understands that the use of WMD
(including large high-explosive warheads) delivered by long-range rockets or
missiles represents a deliberate escalation or widening of any conflict in
which the State is a participant. Consequently, the State is likely to escalate
in stages in order to minimize reaction. For example, it might use Strategic
Forces units to deliver NBC weapons inside or outside of the region or theater
only after using the same units to deliver long-range conventional weapons.
It might use WMD operationally or tactically against troops in the field prior
to using them strategically. However, once having crossed the threshold of us-
ing WMD, the State may use them against any high-payoff target within the
range of its delivery systems. Positioning of its Strategic Forces units and sup-
porting C2 nodes could, if detected, serve as indicators of the State’s intentions.
Therefore, the State will seek to conceal the location of these forces and nodes.
6-9
FM 7-100 _________________________________________________________________________________
6-52. Strategic Forces that are capable of delivering WMD are the exception
to the State’s C2 concept of being able to operate in the absence of assured
communications. Since the State does not believe that first use of chemicals
against units in the field will provoke a nuclear response, it is less rigid than
other nations in the control of chemical release. The NCA may pass chemical
release authority to operational or even tactical levels. That is not the case in
employing NBC warheads on any national- or theater-level systems or sys-
tems that have a strategic consequence.
6-53. Nuclear weapons would almost surely provoke response in kind. So the
State will probably avoid the use of nuclear weapons against an extraregional
power unless survival of the regime or the nation is at risk. Among NBC
weapons, the State is more likely to use biological or chemical weapons
against even an extraregional enemy, particularly if the enemy does not have
the capability to respond in kind. Biological weapons, particularly those of
high infection rate at relatively low rates of mortality, offer some advantage,
particularly if plausible deniability can be achieved. The State is most likely
to use chemical weapons, particularly if it can mitigate the risk of retaliation.
During the course of armed conflict, the State may intentionally or uninten-
tionally cause the release of toxic industrial chemicals into the environment.
Fuel-air explosives and large conventional warheads offer decided advantage
and do not necessarily trigger similar responses from the enemy. The State is
particularly likely to use these conventional weapons during adaptive opera-
tions when its forces are widely dispersed.
6-10
_________________________________________________________________________________Chapter 6
AFFILIATED FORCES
6-56. The State may form alliances with non-state actors, including insurgents,
terrorists, or even drug and criminal organizations. These affiliated forces do not
necessarily agree with all the State’s policies and goals, but may just be against
the intervention of an extraregional force whose influence they resent and resist.
6-57. Transnational corporations operating in the State or the region often
have their own private security forces that can act independently or as affili-
ated forces. Sometimes these are highly capable paramilitary forces, possibly
including armored vehicles.
6-58. The State may foster insurgency operations against enemy forces in
any portion of the region that enemy forces may occupy and in the enemy’s
operational rear areas. Insurgency operations can divert enemy attention and
assets from the main conflict.
6-59. In addition to other types of affiliated forces that may be present in re-
gional or transition operations, adaptive operations may involve partisan op-
erations within parts of the State contested by extraregional forces.
PARTISAN FORCES
6-60. When the territory of the State is partially overrun by extraregional
forces, yet another kind of forces can become involved on the part of the
Statepartisans. Partisan forces are an important element in the State’s
concept of total war. Whether or not partisans are considered “affiliated”
forces depends on their level of integration into the operations of the regular
Armed Forces. Partisan operations typically are conducted by militia units,
augmented by civilians and remnants of regular military units. Partisans are
“invisible infantry,” indistinguishable from the civilian populace.
6-61. If the State has insufficient forces to defend against an invader by
“conventional” means, its leadership plans to integrate partisan actions in an
attempt to prevent occupation of State territory and to eventually force the
invader to withdraw. Partisans task-organize their available forces based on
the mission. Many of the tactics, techniques, and procedures used by partisan
forces are similar to those used by insurgents.
6-62. The aim of partisan operations is to defeat the enemy through a series
of small combat actions aimed at harassing or attriting his forces and dis-
rupting or destroying his C2 elements, LOCs, or logistics support. Partisans
attempt to avoid decisive clashes as long as possible, expand the number of
lower-level tactical combat actions, and destroy the enemy by conducting raids
and ambushes against his vulnerable points, such as logistics and rear areas.
6-63. Partisans must know the terrain and maintain maximum mobility,
adapting quickly to new situations and tactics. Partisan forces have several
advantages over the enemy. Primary among these are the partisans’ exten-
sive knowledge of the State’s terrain and their ability to successfully execute
their missions in adverse weather conditions. Their familiarity with the terrain
allows them to use urban areas and other complex terrain to their advantage.
Partisans familiar with the terrain and possessing appropriate equipment can be
quite effective in this environment. They are more agile than regular forces.
6-11
FM 7-100 _________________________________________________________________________________
6-64. Militia units participating in partisan operations may have been by-
passed, fragmented, or heavily attrited, or may not have had time to fully
mobilize. The effectiveness of these forces and the degree of their integration
into regular Army operations varies widely. For example, militia units that
have been fully mobilized and previously integrated into regional operations
would be more effective as partisans than would previously unmobilized units
fighting without knowledge of the missions and plans of regular Army units. Mi-
litia units may be augmented by remnants of regular Army forces that have been
bypassed, weakened, or attrited. As a rule, partisan units with such augmenta-
tion achieve a higher degree of integration into the operations of other regular
Army forces by virtue of their familiarity with the missions and plans of a higher
headquarters. However, these units are most likely to conduct operations against
smaller enemy combat units than do their regular Army counterparts.
6-65. Partisan operations may also include civilians, augmenting militia
forces. Enemy forces may have destroyed or bypassed the homes of these ci-
vilians. Their degree of integration into the operations of regular Army or mi-
litia units is normally low, and they are poorly equipped to engage enemy
combat units. However, they can still be effective against enemy logistics and
C2 facilities and LOCs.
STRATEGIC OPERATIONS
6-66. During adaptive operations, the State uses all its instruments of power to
deny the extraregional enemy any sanctuary in the region or in his strategic
depth. Access-control operations and strategic attack of the enemy LOCs and rear
are essential to success. Unable to conduct strategic bombing campaigns, the State
may use other means to attack targets in its enemy’s homeland or along the LOCs
into the theater. The State will coordinate its attacks on enemy infrastructure or
even civilian targets with perception management efforts to convey the view that
these terrorist-type attacks are no worse than enemy bombing campaigns.
6-67.The Armed Forces conduct operational and tactical lines of operation that
accentuate what the State is doing at the strategic level. In most cases, opera-
tional and tactical efforts are focused on not being defeated, which offers no deci-
sion. Therefore, the State needs its strategic operations to be decisive.
6-68. Concurrent with adaptive operations, the State could also conduct or
support insurgency operations either within the region in support of its other
operations or outside the region. The purpose of such insurgency operations
could be to draw an extraregional enemy’s attention and resources from the
State’s main effort or merely to harass the State’s adversaries.
6-69. The State will instigate and support terrorist attacks and/or conduct
SPF direct action against the extraregional power, even in that power’s
homeland. It can also use these types of attack against an extraregional
force’s coalition partners and allies in order to force them out of the war. De-
pending on the situationhow the war is going or how the State perceives it
is goingthe State might use WMD at any time against any conceivable tar-
get it can reach. The long-range missiles and rockets of the Strategic Forces
are powerful political and psychological tools, whether armed with conven-
tional or WMD munitions. With SPF and terrorist delivery means, the range
of WMD is not limited to the range of the missiles of the Strategic Forces.
6-12
Chapter 7
7-1
FM 7-100 _________________________________________________________________________________
7-3. A primary SID objective is to ensure the national industrial base is re-
sponsive to both the civilian populace and the military during the strategic
campaign. For example, the SID may order stockpiling of critical civilian
supplies and materiel in anticipation of economic sanctions imposed by an
extraregional power and/or the United Nations. Thus, the impact of the eco-
nomic sanctions is minimized or has a limited effect.
7-4. The SID, in coordination with the MOD, must determine the functional
types and levels of civilian support to the military the State can afford with-
out placing the success of the strategic campaign at an unnecessarily high
risk. The scope of the support is limited only by the availability of resources
and the ability of the SID to reach a consensus across ministerial lines. The
SID designates a single point of contact or liaisons within each ministry to
coordinate the activities related to civilian and military support during
peacetime, mobilization, and war. This ensures the timely and efficient acti-
vation and integration of the civilian populace and the Armed Forces.
7-5. Within the MOD, the SID works closely with the Organization and Mo-
bilization Directorate of the General Staff. That office, one of the most power-
ful in the government, determines requirements, establishes priorities, and
resolves competition for resources in the Armed Forces. The Organization
and Mobilization Directorate, in turn, works closely with the Ministry of Fi-
nance and Economic Affairs. The objective is to assure that the acquisition of
materiel and the development of stockpiles to support sustained operations
meet the national priorities established in the State. The Chief of Logistics,
who heads the Logistics Directorate of the MOD, executes logistics plans in
response to the SID during transition to war and conducts planning with the
Organization and Mobilization Directorate.
7-6. The SID also works directly with the Ministry of Finance and Economic
Affairs to ensure that economic policies meet a variety of needs. These needs
include the financing of the infrastructure and other capital projects or de-
velopmental programs. The intent is to avert a major economic or political
crisis. Thus, the State’s leadership is afforded reasonable economic and po-
litical stability at all times.
7-7. The SID coordinates with the Ministry of Public Information to encour-
age constructive public support for the State’s policy objectives and to un-
mask and counter hostile attempts to distort and frustrate the State’s poli-
cies and programs. The wide range of information campaigns involves all of
the internal media sources.
7-8. The SID develops programs and coordinates humanitarian relief activi-
ties to support those who suffer from natural disasters such as earthquake,
famine, flood, and drought. The effort is conducted, often in conjunction with
those of other nations and nongovernmental organizations, to quickly allevi-
ate the effects of disaster and reduce human suffering.
7-2
_________________________________________________________________________________Chapter 7
GOALS
7-11. The State is pragmatic in
the design of forces and makes Force Design Goals
few high-cost, high-technology The State’s force design goals are to
investments beyond those that allow it to
assure internal security and
regional dominance and enable • Preserve its own regime.
the State to contest access to the • Exert influence in its region.
region by potential extraregional • Contest access to the region.
opponents. Where possible, it
also seeks the capability to deny its opponents sanctuary from the tactical to
the strategic level. In sum then, the State’s goals are the capabilities to preserve
its own regime, exert influence in its region, and contest access to the region.
7-12. For dealing with internal threats, the State maintains a variety of in-
ternal security forces. These run the gamut from national security and border
guard units to national, district, and local police units. Some of these units
are paramilitary forces (organized along military lines and in some cases
equipped with heavy weapons and armored vehicles. Thus, they can provide
combat potential to conduct defensive operations or otherwise supplement
regular military forces if required.
7-13. The State invests over the long term to assure strong conventional
forces able to overpower opponents in its immediate region, where its Armed
Forces enjoy relative strength. However, it does not attempt to match the ca-
pabilities of likely opponents from outside the region. Accordingly, it fields a
wide range of capabilities, from state-of-the-art systems to obsolescent or
even obsolete systems that have been modernized to the extent possible. It
places a premium on adaptive and innovative application of existing systems
as the only way in which it might be able to match the most modern armies
in the world today. It also develops and invests in special-purpose forces
(SPF), information warfare, and selected high-payoff modern systems that
inhibit outside intervention or have strategic reach.
7-14. Taking the fight to the enemy throughout his strategic depth is part of
the State’s concept of employing all means necessary. This idea drives the
State to fielding SPF with a global reach, as well as Strategic Forces with
long-range rockets and missiles.
7-3
FM 7-100 _________________________________________________________________________________
Adaptability
7-16. The first principle is whether a system is adaptable—that is, can the
system serve multiple purposes, and can it be modernized effectively by up-
grades from the supplier or by applying upgrades developed indigenously or
procured from a third party? Wherever possible, the Armed Forces also try to
field forces and systems mounted on a common chassis. This approach allows
relatively low-cost upgrades and direct improvements to force effectiveness.
Affordability
7-17. The second principle is whether the system is affordable—that is, is the
payoff likely to offset the cost? More than any other consideration, this is es-
sential in the State’s thinking. For example, ballistic missiles may have a
fairly high unit cost, but have high strategic payoff. Missile units, while diffi-
cult to maintain, are low-density; so the State can assure relatively high-
quality units. On the other hand, state-of-the-art fighter aircraft have high
unit costs for relatively low strategic benefit. Moreover, the need to maintain
highly trained fighter units continues throughout the life cycle of the system.
Accordingly, the State tends to invest more heavily in ballistic missiles
rather than state-of-the-art fighter aircraft. The intent of the selective pur-
chase of such high-cost technology is twofold. The State may seek a niche
that has strategic value, such as ballistic missiles, or may attempt to achieve
surprise by introducing unexpected technology.
Deployability
7-18. The third principle is whether the system is widely deployablethat is,
can the State field it in significant numbers? Another factor driving force design
is the State’s concept of total war and applying all means necessary. The State
can field a large number of conventional units with low-cost, low-overhead sys-
tems to enable regional overmatch and a relatively large force of conventional
units capable of conducting adaptive operations against an extraregional enemy.
The concept of the total war also leads the State to field a large number of re-
serve and militia formations. While most of these reserve and militia formations
have little offensive capability, they are capable of defending the State against
outside intervention and are easily a match for likely regional opponents.
7-4
_________________________________________________________________________________Chapter 7
from a regional opponent and to win quickly in combat. The State recognizes
that new technologies serve to create new capabilities in old systems as hy-
bridization provides rapid, exponential improvements in some systems.
Therefore, it prefers initially to purchase equipment upgrades that produce
hybrid systems, rather than to create or purchase new systems.
7-20. The State focuses on upgrading weapon systems based primarily upon
the perceived regional threat. Depending on the threat, it may place a higher
priority on upgrades to a particular service of its Armed Forces. For example,
it may initially modernize its Navy and then shift emphasis to its Air Force
or Army. However, the modernization priorities generally favor the Army.
The modernization effort includes incremental hardware and software im-
provements, new system development, and the use of commercial off-the-
shelf components.
7-21. The rapid growth and proliferation of new technology, combined with
the modernization effort, allows the State to achieve equality or even an
overmatch of the enemy in niche areas. For example, the Armed Forces may
have a computerized fire control system that has limitations based on software
in the system. Software upgrades can be purchased from other nations or trans-
national organizations, transmitted or downloaded electronically, and applied on
a matter of minutes. Since the basic operation of the system is unchanged, this
improvement is transparent to the user. Thus, it improves system performance
with no time-consuming retraining or equipment maintenance downtime.
ACQUISITION PHASES
7-22. The acquisition process is divided into four phases. The concept explo-
ration phase consists of competitive, parallel short-term studies. The focus of
these efforts is to define and evaluate the feasibility of alternative concepts
and to provide a basis for assessing relative merits of these concepts at the
next milestone decision point.
7-23. The program definition and risk reduction phase is where one or more
concepts, design approaches, and/or parallel technologies are pursued as war-
ranted. Assessments of the advantages and disadvantages of alternative
concepts are refined. For example, the State may determine that the pro-
curement of commercial off-the-shelf equipment may be in its best interest in
the short term. However, the long-term goal is to reverse engineer, develop,
and domestically produce the equipment. This phase is also characterized by the
prototyping, demonstration, and consideration of early operational assessments
of equipment and weapon systems. This effort ensures that technology, manu-
facturing, and fielding risks are well in hand prior to the next decision point.
7-24. During the engineering, manufacturing, and development phase, the
most promising design approach is translated into a stable, interoperable,
producible, supportable, and cost-effective design. The equipment is produced
and fielded in limited quantities to facilitate the incorporation of design im-
provements and upgrades.
7-25. The fourth and final phase is production and operational fielding. The
objective of this phase is to achieve an operational capability that satisfies
the mission need or requirement. However, the potential for modification or
upgrades to the fielded system is continuously evaluated.
7-5
FM 7-100 _________________________________________________________________________________
DOMESTIC
7-26. As a rule, the State gradually updates weapons as the overall economy
advances, improving existing equipment. Priorities aside, however, it may
choose to make opportunistic purchases for the procurement of key techno-
logical advances that can produce a qualitative edge over a regional opponent
or mitigate the advantage of an extraregional force. When selecting weapons
systems, the State considers training, technical, and support-equipment costs
required for maintaining and operating the weapon system, in addition to the
cost of the system itself. To reduce the overall operating and maintenance
costs, the State may procure systems with the intent of placing a majority of
them in long-term storage. A few of the systems (along with simulators and
training devices) are fielded to designated training units and facilities to
maintain established training standards. Thus, the State attains a benefit by
reducing the ownership costs of existing systems, extending their life cycle,
and maintaining established training standards.
7-27. Whenever feasible, systems and production facilities are dual-use, serv-
ing both civilian and military needs. For example, an aircraft plant may be
producing commercial transport as well as combat aircraft. The State may
purchase or import a foreign-made avionics package for the transport aircraft
with a possible use or application in the combat aircraft. This serves to meet
two objectives. First it reduces the unit cost of military production, and sec-
ondly it facilitates mobilization.
7-28. The State’s basic policy is to export or sell arms to obtain both financial
and political advantage. The State attempts to undersell its competitors and
usually is able to succeed, since its labor costs are lower than in most indus-
trialized nations. However, the bottom line is that money, as well as politics,
governs to whom the State sells. It sells arms for foreign exchange that in
turn it can use to pay for the acquisition of more technology and weapons sys-
tems it cannot produce.
FOREIGN
7-29. The cornerstone of the State’s foreign acquisition strategy is the import
of technology and technical assistance with the purchase of foreign systems
and subsystems. This includes the licensing for the manufacture and produc-
tion of systems and their respective components. The primary factor that de-
termines the State’s foreign weapons acquisition is the ability of the State to
pay in convertible or hard currency, barter for existing goods or services (in-
cluding food, fuel, raw materials, or illegal drugs), or possibly attain financial
assistance from allies. The State may initially purchase much of the equip-
ment for civilian use, but subsequently find military applications. It may
make opportunistic investment in high-payoff foreign systems to create tech-
nological niches or to lead into domestic development.
7-6
_________________________________________________________________________________Chapter 7
both the true ownership and purpose of these firms. Thus, the State has ac-
cess to factories and other enterprises that use human and natural resources
of another country to produce goods and services for the State’s use. Addi-
tionally, this facilitates the State’s ability to generate revenue with which it
can purchase other goods and services.
MOBILIZATION
7-31. The mobilization process is another reflection of the dual principles of
the total war and all means necessary. For example, the principle of total war
emphasizes universal military training and service. Thus, the State is able to
meet the personnel requirement for standing forces, significant reserves, and a
militia. Planning for mobilization of reserves and militia is the responsibility of
the Organization and Mobilization Directorate of the General Staff.
7-32. The Organization and Mobilization Directorate must also coordinate
through the SID with other ministries of the government to assure that their
planning will meet wartime needs of the Armed Forces. During wartime, the
directorate identifies and recommends priorities of effort in coordination with
civilian ministries. It deals particularly with those ministries concerned with
transportation and the production or acquisition of food, fuel, and materiel.
7-33. The State’s Mobilization Law outlines the duties and responsibilities of
State ministries and the civilian populace during a State declared emer-
gency. For example, the liability for military service for men starts at age 18
and lasts until their sixtieth birthday. Once the initial training or service
commitment is completed, the personnel are transferred to the Armed Forces
reserves. Reserve and militia personnel may receive up to 120 days of train-
ing per year. The Mobilization Law also permits limited or selective mobiliza-
tion of resources appropriate for lesser emergencies. Mobilization measures
may be applied to specific organizations, agencies, or units. For natural disas-
ters, it facilitates shifting additional personnel to aid certain districts.
7-34. Priorities for acquisition and sustainment, once developed, are adhered
to ruthlessly. Nonetheless, the State’s growing economy and the limited
means of distribution require patience and time, since the State anticipates
outside intervention and the need to stockpile equipment and supplies. This
is especially so during peacetime. Despite the State’s penchant for preparing
for war all of the time, it is unable to meet all of its needs quickly. The need
to assign production to stockpiling efforts often means that some units may
not enjoy high readiness rates during peacetime. Additionally, the State’s
approach of stockpiling at numerous sites to offset its distribution problems
requires such long lead time that the logistics system imposes limitations on
the acquisition system.
7-35. During mobilization, the State’s logistics system moves very rapidly
and smoothly to support military requirements. Generally, the system func-
tions more effectively following mobilization, at least in part due to the set-
ting aside of civilian high-priority efforts. The SID has the requisite authority
to enforce national-level decisions. Thus, the State’s civilian populace and
Armed Forces logistics are afforded the emphasis and resources that the na-
tional strategy requires.
7-7
FM 7-100 _________________________________________________________________________________
SUSTAINMENT
7-36. The State’s concept of the logistics visualizes war throughout the entire
country and region. This includes everything from battle positions to the
theater or national support zone.1 The Armed Forces logistics doctrine is a
blend of other nations’ systems and domestic concepts. This blend can be at-
tributed to the State’s previous experience in war, doctrine adapted from for-
eign sources, and analysis of the operational environment.
7-37. The largest vulnerabilities of the State’s logistics system are mainte-
nance of communications and a transportation network capable of sustaining
military operations. Therefore, the State must be opportunistic. For example,
it emphasizes the use of civilian and captured vehicles, equipment, and sup-
plies to maintain the tempo of military operations. It also places considerable
emphasis on improving the efficiency and security of the logistics system. It
has increased the depth of forward service areas and increased the mobility
and range of logistics units in support of frontline forces.
7-38. For the Armed Forces, all strategic logistics support is coordinated at
the national level through the MOD’s Chief of Logistics. The responsibilities
of the Chief of Logistics are the same during war and peace. These responsi-
bilities include
• Procuring of personnel, materiel, and services required by the military.
• Preparing the economy and the people to provide sustained support in
case of war.
• Ensuring that an uninterrupted flow of personnel, materiel, and
equipment reaches the individual fighting unit at the proper place and
time.
SUSTAINMENT TENETS
7-40. Given its disadvantages, the
State considers that logistics planning
Sustainment Tenets
is essential to executing the national The State relies on the follow-
security strategy. The State relies on ing sustainment tenets:
the following three tenets: long-term • Long-term planning.
planning, centralized planning and • Centralized planning and de-
decentralized execution, and inter- centralized execution.
ministerial coordination. • Interministerial coordination.
1
The support zone is that area of the battlespace designed to be free of significant enemy action and to permit the
effective logistics and administrative support of forces.
7-8
_________________________________________________________________________________Chapter 7
Long-Term Planning
7-41. Long-term planning ensures that the right materiel is developed in
support of the military and assures the State is able to sustain operations.
The State plans for sustainment in accordance with mobilization of its
forces and the types of strategic-level courses of action it anticipates in a
strategic campaign. Conceptually, its logistics capability parallels its force
design philosophy. For example, mobile forces designed for regional force-
projection operations are generally modern and have the most robust
combat logistics capability. Logistics plans are primarily developed to sus-
tain military operations against regional threats. Additionally, the logis-
tics plans include sustainment of operations against an extraregional
threat.
Interministerial Coordination
7-45. Finally, strategic logistics plans are coordinated across ministerial
lines. This is commonly referred to as interministerial coordination. Inter-
ministerial coordination by the SID ensures a balanced responsiveness of the
national industrial base to both the civilian populace and the military during
the strategic campaign.
7-9
FM 7-100 _________________________________________________________________________________
LOGISTICS MISSIONS
7-46. Three terms describe how the Armed Forces provide support during
peacetime and wartime. The terms for these logistics missions are primary
support, area support, and depot support.
7-47. Primary support is a mission given to supply, services, transportation,
and maintenance units that normally provide support directly to other units.
This allows the primary support unit to respond directly to the supported
unit’s request for assistance or supplies.
7-48. Area support is a mission given to supply, services, transportation, and
maintenance units that normally provide support to primary support units
and other area support units. Lower-priority units may have to rely on area
support, rather than receiving supplies and services directly from the next-
higher echelon.
7-49. Depot support is a mission given to national-level or strategic units that
normally provide support to area support units. Depot support operations in-
clude the receipt, storage, and issue of war stocks and domestically produced
armaments and materiel, and the overhaul and rebuilding of major end
items.
REGIONAL OPERATIONS
7-50. During regional operations, the State generally possesses the advan-
tage of secure LOCs and the latitude to sustain its forces with little to no disrup-
tion. In the best case, the State’s economy and industrial base may suffer little
or no damage from the war. The State may actually increase production of sup-
plies and materiel in a rush to increase national wartime stockpiles of key mili-
tary and civilian supplies and material prior to any extraregional intervention
that could destroy production facilities or disrupt imports.
7-51. Whether the State suffers damage to its domestic production capability
or not, it may also increase production in factories and facilities owned by the
State or its ruling elite in foreign countries, based on the perceived possibility
of intervention of an extraregional force. This action facilitates the State’s
ability to produce, transport, and stockpile key military and civilian supplies
prior to diplomatic initiatives of an extraregional force and/or the United Na-
tions to close down the State-owned foreign facilities.
TRANSITION OPERATIONS
7-52. During transition operations, the stockpiling of critical civilian supplies
and material (such as food, petroleum products, and clothing) becomes the
primary focus of the State. The objective is to enable the State to resist eco-
nomic sanctions imposed by an extraregional power and/or the United Na-
tions. Thus, the impact of the economic sanctions has a limited effect. This af-
fords the State the ability to sustain military operations to attain strategic
objectives and satisfy the basic needs of the populace with minimal impact.
The State may gradually begin the rationing of civilian supplies and services.
7-53. The State’s militia units may be employed in primarily defensive roles
during transition and adaptive operations. They are generally dependent on
stockpiled supplies and logistics units of limited mobility. During transition
7-10
_________________________________________________________________________________Chapter 7
operations, militia units may receive top priority in distribution and trans-
portation of supplies in order to facilitate their execution of missions in sup-
port of the strategic campaign plan.
ADAPTIVE OPERATIONS
7-54. The State primarily shifts its emphasis to an area support mode during
adaptive operations, since it no longer possesses the advantage of secure
LOCs. For example, it may use all modes of transportation (air, rail, water-
way, and road) sparingly due to the Armed Forces’ inability to control the
State’s airspace. Thus, military units and the civilian populace are locally
sustained through short-duration facilities such as supply points, caches, and
depots. These facilities are capable of accommodating a majority of the de-
mands placed on the distribution system for activities located in their respec-
tive support zone.
7-55. Diplomatic initiatives may impact on the State’s ability to procure sup-
plies and materiel produced in State-owned factories and facilities based in
foreign countries. However, the State remains opportunistic during adaptive
operations. If the diplomatic sanctions are not imposed, the State can con-
tinue to produce, transport, and stockpile key military and civilian supplies.
It could seek to transport supplies and materiel under foreign-flagged com-
mercial transportation as well as through the supply networks of under-
ground or criminally-based activities. The SID normally imposes the ration-
ing of civilian supplies and services. Internal security forces are generally
vigilant in their efforts to reduce the impact of black marketing of supplies on
the civilian populace.
MATERIEL SUPPORT
7-56. The Armed Forces materiel support system comprises a mix of very
modern and unsophisticated capabilities that vary depending on the priority
of the supported units. Generally, high-priority or elite units enjoy the bene-
fits of a robust materiel support system that affords a higher degree of flexi-
bility and responsiveness to rapid changes in plans. For such units, the sys-
tem may be fully automated to track requirements and control the issue of
supplies. Less capable units (including reserve and the militia forces) typi-
cally have little or no automation support. Both types of materiel support
system are based on allocating supplies and services to units in order to
accomplish mission objectives. However, the aim of the State is to continue
the upgrade of its less capable units to a robust supply system capable of
sustaining the force in all environments.
7-57. Supply includes actions to acquire, manage, receive, store, and issue
the materiel required to equip and sustain the force from mobilization
through deployment, combat operations, and recovery into the State home-
land. The allocation of supplies is based on the unit mission, supply reports,
and the availability of supplies. During peacetime, the Armed Forces operate
under the “pull system” of supply. For example, personnel in the field may
request material from a depot where it must be picked up and delivered to
the field.
7-11
FM 7-100 _________________________________________________________________________________
7-58. The State’s concept of services includes all troops, installations, and
duty positions that perform logistics support for combat arms units. Such ser-
vices are not specific to the ground forces, but support other Armed Forces
components as well.
7-59. During wartime, however, the Armed Forces operate under the forward
distribution or “push system” principle, in which the higher echelon directly
supplies and services the next-lower echelon. Supplies and services are deliv-
ered directly to subordinate elements using the organic transportation assets
of the higher headquarters. Supplies may be procured or obtained from social
groups, consumer cooperatives, government farms, or individual citizens, and
by coercion or foraging. Lower-priority units may have to rely on area sup-
port or even supply point distribution.
MAINTENANCE
7-60. Maintenance includes actions taken to keep materiel and equipment in
a serviceable condition, to return it to service, or to update and upgrade its
capability. Since supplies are limited, the Armed Forces stress preventive
maintenance, technical inspections, and proper operating methods to extend
the life cycle of equipment. The maintenance system is designed to repair ve-
hicles and equipment as far forward as possible. Repair facilities and units
move near the scene of combat rather than waiting for damaged equipment
to be evacuated to them. Fixed and mobile repair units extend repair capa-
bilities forward into the battle zone and provide service to the customer
unit. During wartime, the types of repair performed at each level depend
on the situation. Generally, they are of a lesser degree than in peacetime.
The Armed Forces classify three categories of repair: routine, medium, or
capital.
7-61. Routine repairssuch as replacements, adjustments, or repair of in-
dividual componentsrequire a short time to fix. Generally, maintenance
personnel do not disassemble major components as part of routine repair.
Medium repairs include the minor overhaul of equipment and the repair of
individual components requiring a short time to fix. Capital repairs are
conducted at depot level and involve the major overhaul and/or assembly
of equipment.
7-12
_________________________________________________________________________________Chapter 7
ABOVEGROUND STRUCTURES
7-64. Aboveground structures range from factory warehouses to aboveground
hardened structures. Hardened structures are reinforced for protection
against aerial and ground attack. Earth mounded bunkers are an example of
an aboveground hardened structure. The State uses extensive camouflage,
concealment, cover, and deception techniques to reduce the detection signa-
ture of these structures to enemy reconnaissance platforms. The State can
also develop sophisticated decoy sites.
UNDERGROUND STRUCTURES
7-65. Underground structures include shallow buried and deep underground
bunkers and complexes. There are cases where the State uses underground
storage facilities to house its command and control (C2) complexes and medi-
cal facilities. Underground structures are dispersed throughout the country
and consist of intersecting tunnels with multiple exits. Some of these exits
may lead to either external combat positions or other subterranean facilities.
Large camouflaged doors cover the entrances. The camouflage material
matches the surrounding rock so closely that one has to knock on the surface
to determine the difference. Normally, a complex may extend over a square
kilometer or more. Auxiliary casements in the underground facility may hold
fuel, water, food, medical supplies, clothing, or life support equipment.
SHORT-DURATION FACILITIES
7-66. Short-duration storage facilities play a central role in any strategic
campaign that may involve intervention by an extraregional power. For example,
prior to conducting adaptive operations, the State plans, develops, and builds
short-duration facilities for the pre-positioning of equipment and supplies to sus-
tain deployed forces. The State attempts to anticipate outside intervention and
plan accordingly. Logistics items are stockpiled or cached in underground caves
and dugout holes, tents, or warehouses, and are dispersed over a wide area. These
7-13
FM 7-100 _________________________________________________________________________________
TRANSPORTATION
7-67. The State’s military logistics planners base their estimates on the use
of all movement resources available. These estimates include tactical combat
vehicles as well as civilian transportation assets mobilized to move supplies,
equipment, and personnel. For example, during mobilization, civilian truck-
ing and bus companies may be organized as militia truck units to provide
transportation of cargo and personnel in the State’s homeland. The mobility
of logistics units must match that of the supported operation. If the logistics
support units fail to achieve this, they may jeopardize the overall success of
the State’s strategic campaign. Traffic management is the responsibility of
the Military Transportation Bureau. The bureau is subordinate to the Mate-
riel Support Department under the MOD Chief of Logistics and is responsible
for managing defense transportation requirements using military and civil-
ian resources.
TRANSPORTATION PRINCIPLES
7-68. The principles of movement apply to all military transportation ser-
vices and remain constant throughout peace and war. Additionally, they
apply regardless of the planning level. During wartime, civilian personnel,
transportation assets (including farm animals, vehicles, aircraft, and wa-
ter vessels), and materiel-handling equipment are mobilized to support
the war effort.
Regulated Movement
7-70. All movement is regulated according to command priorities. Move-
ments are not validated, approved, or initiated if any part of the transporta-
tion system cannot meet the requirement. Regulating transportation assets
and LOCs is required to prevent congestion, confusion, and conflict of move-
ments. Unregulated use of the transportation system can severely hamper
the movement of critical cargo and personnel supporting the strategic cam-
paign. Therefore, traffic in the theater is programmed to provide fluid move-
ment throughout the transportation network. The State’s internal security
forces support movement control through protection of supply routes of
movement and key transportation nodes and centers in the State’s homeland
or in State-occupied territory in a neighboring country.
7-14
_________________________________________________________________________________Chapter 7
TRANSPORTATION MODES
7-75. Transportation operations may include motor vehicles, rail, aircraft,
and waterway (coastal and inland) transport vessels. The Armed Forces gen-
erally uses motor vehicles to move large quantities of general cargo, petro-
leum products, and personnel throughout the theater. However, waterway
transport vessels may be used to move large quantities of supplies and per-
sonnel along coastal or inland waterways to remote areas that are not acces-
sible to motor vehicles.
7-76. As requirements for transportation fluctuate, each mode must be prop-
erly used to accomplish the commander’s objective. For example, air trans-
port is employed if reaction speed is the priority. Motor transport is consid-
ered the most flexible surface mode. It provides door-to-door delivery service
and an interface with all other transportation modes.
7-15
FM 7-100 _________________________________________________________________________________
PERSONNEL
7-77. The MOD establishes policy, assigns responsibilities, and prescribes
procedures for personnel readiness issues as they apply to all members and
components (standing forces, reserve, and militia) of the Armed Forces. The
Manpower and Readiness Department under the MOD Chief of Logistics is
responsible for the administration and management of the military personnel
system.
7-78. In consultation with the various service component chiefs, the Chief of
the General Staff (CGS) provides advice to the Minister of Defense on man-
power and personnel issues impacting the readiness of the Armed Forces and
the force structure required to support national security objectives. Addition-
ally, the CGS advises the Minister of Defense on the extent to which the ma-
jor programs and policies of the Armed Forces in the area of manpower con-
form with strategic plans.
7-79. In addition to recruiting, organizing, equipping, and training, each of
the six service components has the responsibility for providing personnel
support to its forces. Major combatant commanders exercise authority over
assigned forces. This authority allows the combatant commanders to direct
and approve those aspects of personnel support necessary to carry out as-
signed missions and to standardize personnel policies within the command to
the extent that such standardization is necessary to carry out missions as-
signed to the command.
7-80. The State considers people as one of the most critical assets to the suc-
cess of any military operation. Thorough planning and efficient personnel
management directly influences mission readiness. Therefore, the MOD re-
quires service components to resource personnel requirements in a timely man-
ner to support operational requirements. The State views “personnel support” as
all activities associated with assignment of personnel against authorized billets
and validated individual augmentation requirements, as well as those adminis-
trative activities associated with personnel programs within a command.
7-16
_________________________________________________________________________________Chapter 7
Unit Training
7-87. The military leadership clearly understands that the training methods
of the past are hopelessly inadequate to prepare units for modern warfare.
Regional conflicts are expected to be very lethal and may include high-
technology weapons. Lessons learned by observing the fate of Iraqi troops in
the Gulf War reinforced the need to improve training of the State’s Armed
Forces. The speed at which the U.S.-led coalition forces cut through the infantry-
heavy Iraqi units served to warn the State’s leadership of its own possible fate in
a future war. Except for a few elite, high-readiness units, most combat units
prior to the Gulf War adhered to a numbingly monotonous field-training regi-
men that expended few resources, took few risks, and produced predictable
results.
7-17
FM 7-100 _________________________________________________________________________________
7-88. The State now has training centers that employ “aggressor” units
trained and organized to simulate potential enemy forces in the offensive and
defensive combat against the State’s Armed Forces. The “aggressors” use
electronic countermeasures, mobility and countermobility methods, recon-
naissance, counterreconnaissance, and heavy and light forces units.
7-89. Military operations provide the State’s military leaders the opportunity
to develop and implement new doctrinal and tactical techniques, as well as
gain combat experience. They are capable of task-organizing units based on
mission, terrain, enemy disposition, and availability of equipment. The task-
organized units function effectively, demonstrating a high degree of training
in C2 during combined arms operations.
MEDICAL SUPPORT
7-90. The basic principle of combat medical support is multistage evacuation
with minimum treatment by medical personnel at each unit level. They treat
the lightly wounded who can return to combat and those casualties who
would not survive further evacuation without immediate medical attention.
7-91. The State divides the range of medical treatment into three categories.
The first category of procedures includes only mandatory lifesaving meas-
ures. The second category includes procedures to prevent severe complica-
tions of wounds or injuries. The final category of treatment includes proce-
dures accomplished only when there is a low casualty load and reduced en-
emy activity.
7-92. In anticipation of an overtaxed combat medical support system, the
State’s military doctrine emphasizes the importance of self-help and mutual
aid among individual soldiers. This concept extends beyond the battlefield to
casualty collection points and unit aid stations. Self-help and mutual aid re-
duces the demands made on dedicated medical personnel, particularly when
there is a sudden and massive influx of casualties. Each soldier is required to
attend a first-aid training session.
7-18
_________________________________________________________________________________Chapter 7
7-95. During peacetime, members of the reserve and militia receive their
medical care through the government-sponsored National Social Health and
Security Fund. This fund, financed by employee, employer, and government
contributions, provide medical insurance to the civilian populace. It seeks to
control health care costs and gradually reduce the numbers of patients going
abroad for health care by improving services within the country. The fund of-
fers primary health care through numerous clinics and hospitals. During
wartime, the reserve and militia receive medical support through the mili-
tary health care system.
MEDICAL FACILITIES
7-97. The best medical facility is the Central Army Hospital. During peace-
time, military personnel receive treatment at this hospital, which also is des-
ignated as one of the emergency medical care facilities for foreign diplomats
and their families. During wartime conditions, military personnel are treated
at all of the major civilian hospitals. The State has designated some of its
major university hospitals as emergency medical care facilities for foreign
diplomats, their families, and tourists. This action ensures consistent high-
quality medical staffing, care and treatment. These facilities are also staffed
with foreign medical personnel. A majority of medical facilities or clinics in
the outlying areas have sufficient numbers of trained personnel, supplies,
and reliable electric power and water. The facilities also contain high-quality,
sophisticated, domestic and imported medical equipment. The pharmacies
are stocked with high-quality domestic, and foreign-produced pharmaceuticals.
MEDICAL LOGISTICS
7-98. The medical logistics system operates on a “pull system.” Personnel in
the field request medical material (including repair parts for medical equip-
ment) from a medical depot where it must be picked up and delivered to the
field. Normally, medical supplies are transported forward on cargo carrying
transport vehicles, water vessels, or aircraft. However, ground ambulances
returning to forward areas may assist in transporting medical supplies for-
ward. A medical equipment maintenance unit at the medical depot provides
all medical equipment maintenance.
7-19
FM 7-100 _________________________________________________________________________________
personnel receive annual training in advanced trauma life support. After ac-
tive duty, most of the physicians remain part of the medical reserve and are
subject to annual recalls. Once the country has been mobilized, civilian medi-
cal personnel are detailed into the military structure to augment existing
professionals.
7-100. The training of medical officers, dentists, and pharmacists is con-
ducted at both domestic and foreign specialized medical institutions. Medical
personnel also undergo advanced and continuing education through training
at the Central Army Hospital. The National Military Academy also has a
medical department that is the center of scientific research into theoretical
and practical military medical problems. The medical department serves as a
major training center for instructors in medical and biological sciences. The
medical department coordinates various medical research projects conducted
in both domestic and foreign civilian medical institutions.
CASUALTY HANDLING
7-101. The State has shown success in handling combat casualties. This suc-
cess stems from emphasis placed on trauma training and close coordination
with the civilian medical sector. Evacuation is based on a higher-to-lower
method. The next-higher echelon provides transportation for casualties. Each
level has specific responsibilities for the care of the sick and wounded. Be-
sides treating the wounded, medical personnel handle virtually all of their
own administration, especially at lower levels. As casualties move through
the combat evacuation system, medical personnel at each level make effective
use of medical facilities by repeated sorting of the wounded (triage). Helicop-
ters are used for all military and civilian search and rescue missions, medical
evacuations, and domestic disaster relief flights. During wartime situations,
most casualties arrive at a hospital within 6 to 12 hours after being wounded.
The evacuation time is reduced to 2 hours during peacetime.
7-102. Treating nuclear, biological, and chemical (NBC) casualties is a stan-
dard State trauma protocol. The NBC medical plan is based on three as-
sumptions: mass casualties will occur, casualties will be similar to those that
medical personnel have been trained to treat, and medical personnel will be
able to treat the casualties in a decontaminated environment. The Central
Army Hospital can be converted into a chemical decontamination center
within 2 to 6 hours. Most of the remaining major hospitals require 30 days to
convert to a decontamination center.
BLOOD MANAGEMENT
7-103. The Ministry of Health maintains a Blood Management Office to over-
see the collection, processing, storage, and distribution of blood (to include
liquid blood and blood components) to alleviate the effects of a natural disas-
ter or war. Blood management services are provided to support both civilian
and military establishments. The main source of blood to support wartime
casualty requirements comes from the collection and processing of blood from
the civilian populace during peacetime. The blood is generally stored in pre-
positioned underground structures throughout the country.
7-20
_________________________________________________________________________________Chapter 7
LEGAL AFFAIRS
7-106. The Legal Affairs Department under the MOD Chief of Logistics pro-
vides professional legal services to the MOD and its staff. These legal ser-
vices include matters that affect the morale, order, and discipline of the mili-
tary. The department’s responsibilities are to
• Supervise the administration of military justice within the country and
occupied territory.
• Provide legal services to commanders, staffs, and other authorized per-
sonnel on all matters involving military law, domestic law, and inter-
national law.
• Consult and coordinate with other governmental agencies on legal
matters. In particular, the department works in close coordination
with the Legal Affairs Directorate in the Ministry of Public Information.
7-21
Glossary
The glossary lists acronyms and terms with Army or joint definitions, and
other selected terms. Terms with specific OPFOR-related definitions for
which FM 7-100 is the proponent manual (the authority) are marked with
an asterisk (*) and followed by the number of the paragraph (¶) or page
where they are defined. For other terms, refer to the manual listed.
Glossary-1
FM 7-100 _________________________________________________________________________________
Glossary-2
_________________________________________________________________________________ Glossary
*services .....................................................................................................¶7-58
SHC Supreme High Command
SID Strategic Integration Department
SPF Special-Purpose Forces
SPOD sea port of debarkation
SPOE sea port of embarkation
SSM surface-to-surface missile
*strategic operations ................................................................................ ¶3-21, 3-47, 3-103
*strategic preclusion .....................................................................................................¶3-71
*supply .....................................................................................................¶7-57
*support zone .................................................................................................. ¶7-36n
*system .......................................................................................................¶3-6
*systems warfare .......................................................................................................¶3-7
TBM theater ballistic missile
*theater .....................................................................................................¶3-41
*threat ........................................................................................................p. x
*total war .....................................................................................................¶3-13
TRADOC U.S. Army Training and Doctrine Command
*transition operations ......................................................................................... ¶3-21, p. 5-1
UAV unmanned aerial vehicle
VIP very important person
*war .....................................................................................................¶3-13
WMD weapons of mass destruction
Glossary-3
Bibliography
The bibliography lists field manuals by new number followed by old
number.
DOCUMENTS NEEDED
These documents must be available to the intended users of this publication.
JP 1-02. Department of Defense Dictionary of Military and Associated Terms.
Available online: http://www.dtic.mil/doctrine/jel/doddict/
FM 1-02 (101-5-1). Operational Terms and Graphics. 30 September 1997.
READINGS RECOMMENDED
These sources contain relevant supplemental information.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: http://www.adtdl.army.mil
Bibliography-0
Index
Entries are by paragraph number unless page (p.) or pages (pp.) is specified. After a page
reference, the subsequent use of paragraph reference is indicated by the paragraph symbol (¶).
Index-1
FM 7-100 _________________________________________________________________________________
air defense (continued) APODs. See aerial ports of airborne forces, 2-72, 2-84,
surface-to-air missiles debarkation. 2-102, 4-41, 4-46, 5-39
(SAMs), 2-74, 6-39 APOEs. See aerial ports of air defense, 2-74, 6-39
air defense ambush, 5-31, 6-43 embarkation. armor forces, 2-72, 2-73, 4-41
Air Defense Forces, Air Force, area(s) of responsibility, 3-39 Army aviation, 2-84
2-85, 5-27, 5-39, 6-42 area support, logistics, 2-105, Army Special-Purpose Forces
Air Force, 2-81–2-87 7-48, 7-54, 7-59 (SPF), 2-72, 2-95, 2-102,
Air Defense Forces, 2-85, armed conflict, 3-13 4-41, 5-37, 6-54
4-47, 5-27, 5-39, 6-42 Armed Forces, 2-53. For in adaptive operations, 6-32–
Air Force Special-Purpose individual services, see Air 6-39
Forces (SPF), 2-84, 2-86, Force; Army; Internal Security infantry forces, 2-72, 4-41,
2-95, 4-45, 5-40, 6-47, Forces; Navy; Special-Purpose 6-36
6-54 Forces; Strategic Forces.
in regional operations, 4-41–
in adaptive operations, 6-41– administrative force structure, 4-43
6-47 2-99–2-109
in transition operations, 5-27,
in regional operations, 4-29, force design, pp. xiii–xv, 5-36–5-37
4-46–4-47 ¶ 1-19, 1-25, 2-81, 3-51,
mechanized infantry forces,
3-69, 7-9–7-18, 7-41
in transition operations, 5-27, 2-72, 2-73, 4-41
5-39–5-40 investment strategy, p. xiii,
militia forces, 1-17, 2-19,
¶ 1-19, 1-25, 1-29–1-30,
regional force projection, 2-68, 2-70, 2-72–2-73,
3-51, 3-69, 4-27, 7-9–7-18
2-84, 4-46 2-100, 2-107–2-109, 4-40,
militia, 1-17, 2-19, 2-68, 2-70, 5-26, 5-36, 6-23, 6-30–
surge effort, 6-41
2-72, 2-73, 2-100, 2-107– 6-31, 6-35, 6-60, 6-64–
theater air armies, 2-103 2-109, 4-40, 5-26, 5-36, 6-65, 7-18, 7-31, 7-33,
Air Force Special-Purpose Forces 6-23, 6-30–6-31, 6-35, 7-53, 7-56, 7-67, 7-77,
(SPF), 2-84, 2-86, 2-95, 4-45, 6-60, 6-64–6-65, 7-18, 7-95
5-40, 6-47, 6-54 7-31, 7-33, 7-53, 7-56,
Army aviation, 2-84
air parity, local, 2-82 7-67, 7-77, 7-95
army groups, 2-101
alliances. See coalitions. personnel (manpower), 7-2,
7-31, 7-77–7-89 Army Special-Purpose Forces
allied forces. See coalitions. (SPF), 2-72, 2-95, 2-102, 4-41,
readiness, 7-77–7-78
all means necessary, p. xiii, 5-37, 6-54
¶ 1-29, 3-14–3-16, 3-17, 3-29, regular forces, 2-100, 5-37,
artillery, 2-74
3-54, 3-67, 3-77, 3-85, 3-105, 7-77
assassination, 2-48
p. 7-1, ¶ 7-14, 7-18, 7-31 reserve component forces,
1-17, 2-19, 2-68, 2-70, asymmetric. See adaptive.
ambush, 3-83, 3-90, 3-97, 6-34,
6-62 2-100, 2-105, 2-107– attack helicopters, 2-74, 6-41
2-109, 5-26, 7-18, 7-31,
air defense, 5-31, 6-43 7-33, 7-56, 7-77, 7-95
antishipping, 5-46 B
service component(s), 1-17,
sophisticated, 5-23 2-70–2-98, 2-100, 2-102, ballistic missiles. See long-range
2-107, 7-78–7-80, 7-85 missiles.
antiship cruise missiles. See
antiship missiles. wartime fighting force battalions, 2-102
antiship mines, Navy, 2-77, 4-44, structure, 2-101, 2-104– battle damage repair, by civil
5-38 2-106 defense units, 2-50, 7-104
antiship missiles, armies, 2-101 battle position(s), 6-35, 7-36
Air Force, 2-83 armor forces, 2-72, 2-73, 4-41 battle zone, 7-60
Navy, 2-76, 2-77, 4-44, 5-38, Army, 2-71–2-74, 4-29 biological munitions, 2-89, 2-94,
6-40 active component (regular 2-96, 4-29, 5-42, 6-51–6-53,
army), 5-37 6-55
antishipping ambush, 5-46
antitank capability, 6-32
Index-2
____________________________________________________________________________________ Index
Index-3
FM 7-100 _________________________________________________________________________________
computer warfare, 1-45, 3-92, to national strategic culture, p. vi, ¶ 1-2–1-3, 1-5, 1-20–
3-121, 6-38 campaign, 3-23, 3-31 1-21, 1-23, 1-50, 6-15
concealment, 7-64, 7-66 contractor support, cyber terrorists, 4-51
conscription, 2-19, 4-7, 7-31, 7-33 host-nation, 6-24
constabulary forces, 4-40 of extraregional enemy (US), D
contemporary operational 1-52, 1-54, 5-46, 6-24 decentralized execution, 4-32,
environment (COE), pp. iv–ix. control access into region. See 5-30, 6-27–6-28, 6-30, 7-69
See also operational access-control operations. decentralized operations, 6-19
environment. control tempo. See tempo. deception, 3-91, 3-100, 3-121,
adaptability, p. ix conventional operational design. 6-44, 7-64
adjustability, p. ix See conventional patterns of decoy, 3-91, 3-100. See also
combat development, p. viii operation. deception.
complexity of, pp. vi, ix, xi conventional operations. See storage sites, 7-64
conventional patterns of
constantly changing nature defense information infrastructure
operation.
of, pp. iv, ix, xvi (DII), 3-123, 3-126, 3-127
conventional patterns of
contemporary, pp. viii–ix defensive operations,
operation, pp. viii, xv–xvi,
critical variables, pp. iv–ix, xiii ¶ 1-27, 3-29. 3-49, 3-51, 3-54, by internal security forces,
fluidity, p. xvi 3-56–3-58, 3-61, 3-80, 3-94– 7-12
learning and adapting, pp. ix, 3-95, p. 4-1, ¶ 4-30–4-31, 5-1, by militia, 7-18
xv 5-6, 5-37 in adaptive operations, 6-19
overall (strategic), pp. v, viii– core states, p. xii in transition operations, 5-4,
ix corps, 2-101 5-20
real-world, pp. viii, ix counterattack, 6-21, 6-34–6-35 demographics, p. vi
training environments, counterdrug activities, 2-48 classes, 1-5, 1-20–1-24
pp. viii–ix counterinsurgency activities, 2-48 depot(s), 7-54, 7-62–7-63
contemporary opposing force counterintelligence, 4-8 ammunition, 7-63
(OPFOR), pp. xiii–xvi. See also
counterterrorist activities, 2-48 area distribution, 7-63
opposing force.
cover, 7-64 depot support, 2-105, 7-49
adaptability, pp. xiii–xvi
criminal organizations, p. xii maintenance, 7-63
applicability, pp. iii, xiii
affiliated with State, p. xiv, medical, 7-63, 7-98
baseline, pp. xiii–xiv
¶ 1-20, 3-109, 3-120, 4-51, repair, 7-61–7-62
composite example of threat 6-56, 7-55
capabilities, pp. xi, xiii, xv diplomatic activities, 3-72
as threat to State, 1-20
contemporary, p. xi Diplomatic Activities Directorate,
Critical Technologies Directorate, Ministry of Foreign Affairs,
doctrine evolving, p. xvi Ministry of Public Information, 2-25, 3-137
flexibility, pp. xiii–xv, ¶ 4-37– 2-31
diplomatic corps, 2-11
4-38, 6-23 critical variables of COE, pp. iv–ix,
xiii diplomatic information campaigns,
initiative, pp. xiii, xvi, ¶ 4-34,
3-137
4-37, 6-1, 6-29–6-30 interaction of, pp. viii–ix
diplomatic means. See diplomatic-
learning and adapting, pp. ix, synergy of, p. ix political means.
xv
cruise missiles diplomatic-political campaign,
thinking, pp. xiii, xv
antiship, Air Force, 2-83 3-30
unpredictability, p. xvi, ¶ 6-23
antiship, Navy (land-based), diplomatic-political means, pp. iv,
contingency plans, 4-44, 6-40 xiv, ¶ 2-11–2-12, 3-30
to military strategic campaign land-attack, Air Force, 2-83, diplomatic means, 4-5, 4-10,
plan, 3-38 6-40 5-9
Index-4
____________________________________________________________________________________ Index
Index-5
FM 7-100 _________________________________________________________________________________
Index-6
____________________________________________________________________________________ Index
information campaign(s), 2-26, NCA responsibility for, 3-128– intelligence gathering, 4-8,
2-32, 3-30, 3-73, 3-137, 3-142, 3-132, 3-134 5-19, 5-43, 5-46
4-13, 4-20, 5-10–5-12, 6-10, offensive IW, 2-14, 3-92, Intelligence Directorate,
6-12, 7-7, 7-12 3-115, 5-12 General Staff, 2-63–2-67,
information infrastructure, perception management, 2-70, 3-134
as target of IW, 3-121, 3-123– p. vi, ¶ 2-30, 2-43, 3-52, Ministry of the Interior, 2-51–
3-127 3-72, 3-118, 3-121, 3-125, 2-52
defense information 3-127, 3-141, 6-13, 6-66
Intelligence Officer, General Staff,
infrastructure (DII), 3-123, physical destruction, 1-45, 3-134–3-135
3-126, 3-127 3-72, 3-92, 3-121, 5-12,
intelligence officer, military staffs,
global information 6-38
3-134
infrastructure (GII), 3-123, protection and security
interagency operations, 4-26,
3-127 measures, 3-121
5-27, 6-23
national information strategic information warfare
intermediate-range ballistic
infrastructure (NII), 3-123– (SIW), 3-106, 3-114–3-144
missiles (IRBMs), 2-88
3-125, 3-127 strategic information warfare
internally displaced persons,
of the State, 4-19 campaign, 2-28, 3-121,
pp. vi, xii
information strategic campaign 3-134
internal security forces, Ministry of
plan (SCP), 3-130 strategic information warfare
the Interior, 1-31, 2-40–2-52,
information strategy, 3-120, 3-133 plan (SIWP), 3-122, 3-128,
2-98, 2-102, 3-143–3-144, 4-7–
3-130, 3-132, 3-134–3-135
information warfare (IW), 1-18, 4-8, 4-29, 4-39, 7-55
2-13, 3-77, 3-114–3-144, 7-13 strategic information warfare
Border Guard Forces, 2-46,
planning office (SIWPO),
chief of IW, 3-134–3-136 7-12
3-129–3-130, 3-132,
computer warfare, 1-45, 3-92, 3-135, 3-139 Chief of Internal Security, 1-2,
3-121, 6-38 2-40
strategic operations, 3-105
deception, 3-91, 3-100, Civil Defense Directorate,
units, 2-70
3-121, 6-44, 7-64 2-50, 7-104
infrastructure, 2-19, 7-6, 7-10
defensive IW, 3-92, 3-115 General Police Directorate,
information infrastructure, 2-49
definition, 3-114
3-121, 3-123–3-127, 4-19
denial-of-service activities, in adaptive operations, 6-31
initiative, pp. xiii, xvi, ¶ 4-34, 4-37,
3-92 in regional operations, 4-39–
6-1, 6-29–6-30
electronic warfare (EW), 4-40
instruments of national power.
2-81, 3-121, 6-38, 6-46 Intelligence Directorate,
See national power.
elements of IW, 3-121–3-122 2-51–2-52
insurgent forces, p. xii
goals of IW, 3-114 in transition operations, 5-33–
affiliated with State, 3-98, 5-35
hacking, 3-121, 4-51 3-105, 3-109, 4-51, 5-43,
Ministry of the Interior, 2-40,
information attack (IA), 1-45, 6-35, 6-56
2-52, 2-98, 2-102, 4-8n,
3-72, 3-92, 3-121, 5-12, as threat to State, 1-23 4-39
5-45, 6-38
SPF support of, 2-94, 4-50, movement control, 7-70
information campaign(s), 5-43, 6-54
2-26, 2-32, 3-30, 3-73, National Security Forces,
State-supported, 6-56, 6-58, 2-47, 4-40, 7-12
4-13, 4-20, 5-10–5-12,
6-68
6-10, 6-12, 7-7, 7-12 paramilitary, 2-41, 2-45–2-48,
integrated air defense system 4-8n, 4-29, 4-39–4-40,
IW plan of Ministry of Foreign
(IADS), 4-47, 6-42 6-31, 7-12
Affairs, 3-137
intelligence, 2-52, 2-87, 3-21, 4-9 police, 2-49, 7-12
military IW plan, 3-132,
3-134–3-135 human intelligence (HUMINT), Political Directorate, 2-44
p. vi, ¶ 2-51, 2-52, 2-65,
ministry responsibilities for, resubordinated to SHC, 2-70,
3-93, 4-8–4-9, 5-19
3-133–3-144 2-98, 4-39, 6-31
Index-7
FM 7-100 _________________________________________________________________________________
internal security forces, Ministry of Legal Affairs Department, Logistics long-term planning, 7-41
the Interior (continued) Directorate, MOD, 2-33, 7-106 maintenance, 7-39, 7-60–
Special-Purpose Forces Legal Affairs Directorate, Ministry 7-61, 7-63, 7-98
(SPF), 2-48, 2-95, 4-40, of Public Information, 2-33, materiel support, 7-39, 7-56–
6-54 7-106 7-59, 7-67
Internal Security Forces Special- liaison offices, medical support, 7-90–7-103
Purpose Forces (SPF), 2-48, from Chief of IW, General missions, 7-46–7-49
2-95, 4-40, 6-54, 6-54 Staff, 3-136
personnel administration,
International Information from Operations Directorate, 7-77
Directorate, Ministry of Public General Staff, 3-37, 3-136
Information, 2-30, 3-141 personnel management, 7-77
from SID, 3-131, 3-136, 7-4
International Relations personnel support, 7-79–7-80
literacy rate, 1-5
Directorate, Ministry of Foreign planning, 7-5, 7-40–7-45
Affairs, 2-23 military, 7-83–7-84, 7-86
pre-positioned, 6-33
Internet, 1-6, 4-18 local police, 2-49, 7-12
primary support, 7-47
invaded territory. See occupied logistics, ¶ 3-12, 5-31, pp. 7-1–
priorities, 7-5, 7-48
territory. 7-21
pull system, 7-57, 7-59, 7-98
investment strategy, p. xiii, ¶ 1-19, area support, 2-105, 7-48,
1-25, 1-29–1-30, 3-51, 3-69, 7-54, 7-59 services, 7-58
4-27, 7-9–7-18 automation of, 7-56 stockpiles, ¶ 4-22, 5-13,
IRBMs. See intermediate-range 6-17–6-18, p. 7-1, ¶ 7-3,
caches, 6-35, 7-43–7-44,
ballistic missiles. 7-5, 7-34, 7-49, 7-50–7-53,
7-54, 7-66
7-55, 7-62, 7-66
irregular forces, SPF support to, centralized planning, 7-42–
2-94, 4-50, 5-43, 6-54 supply, 7-57
7-44, 7-69
IW. See information warfare. transportation, 7-37, 7-54,
Chief of Logistics, Ministry of
7-67–7-76
Defense, 7-5, 7-38, 7-67,
7-77, 7-93, 7-106. See also vulnerabilities of State
J
Logistics Directorate, MOD. logistics system, 7-37
jammers, Logistics Directorate, Ministry of
decentralized execution, 7-69
air defense, 6-46 Defense, 2-33, 2-56, 7-5, 7-38,
depot support, 2-105, 7-49
EW, 6-38, 6-46 7-67, 7-77, 7-93, 7-106
doctrine, 7-36
GPS, 1-30, 3-91, 6-46 long-range fires, 3-100, 3-105,
facilities, 2-100 4-38, 6-22, 6-35
joint operations, 4-26, 5-27, 6-23
forward distribution, 7-59 long-range missiles, 3-73, 3-102,
joint SPF operations, 2-95–2-96,
forward service areas, 7-37 4-48–4-49, 5-24, 5-27, 5-41,
6-47, 6-54
in adaptive operations, 7-53– 6-48–6-49, 6-51, 6-69, 7-14,
7-55, 7-66 7-17. See also SSMs.
K
in regional operations, 7-50–
key forces, of State, 3-77–3-78, 7-51 M
3-96, 5-26
in transition operations, 7-52– maintenance, 7-60–7-61
key systems, enemy, as targets, 7-53 maintenance depots, 7-63
3-83, 3-90, 3-97, 5-23–5-24,
interministerial coordination, maintenance units, 7-39,
5-42, 5-45, 6-22, 6-35, 6-38,
7-45 7-60–7-61
6-41, 6-51
Logistics Directorate, Ministry medical equipment, 7-98
kidnapping, 2-48
of Defense, 2-33, 2-56,
Manpower and Readiness
7-5, 7-38, 7-67, 7-77, 7-93,
L Department, Logistics
7-106
Directorate, MOD, 7-77
Labor and Manpower Directorate, logistics sites, as targets,
manpower requirements, 7-2,
Ministry of Finance and 4-43, 5-27, 5-37, 5-42,
7-31
Economic Affairs, 2-37 6-62, 6-65
Index-8
____________________________________________________________________________________ Index
Index-9
FM 7-100 _________________________________________________________________________________
Ministry of Defense (MOD), 2-20, Ministry of Public Information, 1-2, movement control, 7-69
2-21, 2-53–2-60, 3-34–3-35, 1-6, 2-20–2-21, 2-28–2-33, movement program, 7-70
3-38, 3-130, 3-132, 3-134– 3-130, 3-138–3-141, 4-14,
movement regulation, 7-70
3-136, 3-143, 7-1, 7-4–7-5, 4-18, 7-7
7-63, 7-77 multinational forces and
Critical Technologies
operations, 3-36, 4-26, 5-27,
Acquisition and Procurement Directorate, 2-31
6-23
Directorate, 2-55, 7-19 International Information
multiservice operations, 4-29. See
Combat Training Directorate, Directorate, 2-30, 3-141
also joint operations.
2-58, 7-85 Legal Affairs Directorate,
Logistics Directorate (Chief of 2-33, 7-106
Logistics), 2-33, 2-56, 7-5, N
Political and Cultural
7-38, 7-67, 7-77, 7-93, Information Directorate, National Assembly, 1-2
7-106 2-32, 3-140 National Command Authority
Military Education State Information Directorate, (NCA), 2-20–2-21, 2-60, 3-19,
Directorate, 2-59, 7-81 2-29, 3-139 3-32, 3-47, 3-70, 3-73, 3-106,
Personnel Directorate, 2-57 6-48
Ministry of the Interior, 2-20–2-21,
Political Directorate, 2-54 2-40–2-52, 3-130, 3-143– centralized control of WMD,
3-144, 4-8n 6-51, 6-55
Ministry of Education, 1-5, 2-32,
7-81, 7-94 Chief of Internal Security, NBC release authority, 2-89,
1-2, 2-40 6-52
Ministry of Finance and Economic
Affairs, 1-2, 1-5, 2-20–2-21, Civil Defense Directorate, staff responsibility for
2-34–2-39, 3-130, 3-142, 7-5– 2-50, 7-104 strategic IW, 3-128–3-132,
7-6 3-134
General Police Directorate,
Agriculture and Livestock 2-49 national direction, 2-7
Directorate, 2-38 Intelligence Directorate, national information infrastructure
Domestic and Foreign Trade 2-51–2-52 (NII), 3-123–3-125, 3-127
Directorate, 2-35 Internal Security Forces, nationalization, 4-25, 4-45, 5-14–
Industries and Production 2-40–2-52, 2-98, 2-102, 5-15, 6-17
Directorate, 2-36 4-8n, 4-39 National Military Academy, 7-81,
Labor and Manpower Political Directorate, 2-44 7-83, 7-100
Directorate, 2-37 Special-Purpose Forces National Military Schools and
Treasury and Banking (SPF), 2-48, 2-95, 4-40, Colleges Department, Military
Directorate, 2-39 6-54 Education Directorate, MOD,
7-81
Ministry of Foreign Affairs, 2-20, State Security Directorate,
2-21, 2-22–2-27, 3-130, 3-137 2-45–2-48, 4-40 national police, 2-49, 7-12
Diplomatic Activities missiles. See long-range missiles; national power, elements of, 2-1–
Directorate, 2-25, 3-137 surface-to-air missiles; surface- 2-19, 3-15
Economic Relations to-surface missiles. national power, instruments of,
Directorate, 2-27 mission statement, 4-36 p. xiv, ¶ 2-8–2-21, 3-1, 3-6,
3-9–3-10, 3-14, 3-35, 3-104,
information warfare (IW) plan, mobilization, 2-68–2-69, 2-104,
3-111, 3-115, 3-129, 7-1
3-137 2-105, 2-107, 5-26, 5-36, 6-23,
6-64, 7-2, 7-31–7-35, 7-67, diplomatic-political, pp. iv, xiv,
International Relations
7-99 ¶ 2-11–2-12, 3-104–3-106,
Directorate, 2-23
4-5–4-12, 4-52, 5-8–5-9,
Public Relations Directorate, civilian resources, 7-39
6-6–6-9
2-26, 3-137 Mobilization Law, 7-33
economic, pp. iv, xiv, ¶ 2-15–
Regional Affairs Directorate, priorities, 7-32 2-16, 3-104–3-106, 4-21–
2-24 mockup, 3-91. See also deception. 4-25, 4-52, 5-13–5-17,
Ministry of Health, 7-94, 7-103 MOD. See Ministry of Defense. 6-17–6-18
modernization, 4-27, 7-19–7-21
Index-10
____________________________________________________________________________________ Index
Index-11
FM 7-100 _________________________________________________________________________________
nuclear munitions, 2-89, 2-94, sparring partner, pp. x, xiv Personnel Directorate, Ministry of
2-96, 4-29, 5-42, 6-51–6-53, threat-based, p. x Defense, 2-57
6-55 physical destruction, 1-45, 3-72,
training tool, pp. x, xiv
3-92, 3-121, 5-12, 6-38
Organization and Mobilization
O Directorate, General Staff, physical environment, p. vi, ¶ 1-7,
objective(s), 4-33, 5-31, 6-28 2-68–2-69, 2-107, 7-5, 7-31– 3-88
obstacles, 6-32, 6-34 7-32 terrain, 1-7
occupied territory, 4-19–4-20, OSCs. See operational-strategic weather, 1-7, 3-88, 6-63
4-23–4-24, 4-39, 5-5, 5-33, commands. planning, 6-26
6-12–6-13, 6-37, 7-70, 7-106 out-of-theater operations (beyond centralized, 4-32, 4-38, 5-30,
OE. See operational environment. the region), 3-46, 3-70, 5-27, 6-27, 6-30, 7-42–7-44,
5-41–5-42, 6-40, 6-51, 6-68 7-69
offensive operations,
in regional operations, 4-26, logistics, 7-40–7-45
4-43 P top-down, 4-32, 4-36, 6-28
in transition operations, 5-4, paramilitary forces, pp. xi, xiii, strategic, 2-62, 3-4–3-5
5-20 ¶ 5-27, 5-33, 6-23, 6-57
PME. See peacetime military
operational environment (OE), civil defense units, 2-50 engagement.
p. iv. See also contemporary constabulary forces, 4-40 police, p. v
operational environment. home guards, 4-40 district police, 2-49, 7-12
complexity of, pp. vi, ix, xi internal security forces, local police, 2-49, 7-12
overall (strategic), pp. v, viii– Ministry of the Interior,
national police, 2-49, 7-12
ix 2-41, 2-45–2-48, 4-8n,
4-29, 4-39–4-40, 6-31, special police, 2-49, 4-40
specific, pp. v, ix
7-12 Political and Cultural Information
total, p. xiv
national police, 2-49, 7-12 Directorate, Ministry of Public
operational shielding, 3-77–3-78, Information, 2-32, 3-140
3-96, 5-26 non-state, p. xiv
Political Directorate,
operational-strategic commands of the State, p. xiv
Ministry of Defense, 2-54
(OSCs), 2-104 private security organizations,
4-40, 6-57 Ministry of the Interior, 2-44
operation plan, 3-39
special police, 2-49, 4-40 political districts, 1-2, 2-101n
Operations Directorate,
territorial militias, 4-40 political education, 2-54, 4-15
General Staff, 2-62–2-63,
3-37–3-38, 3-135–3-136 partisan forces, 6-59–6-65 political indoctrination, 3-133,
4-15
military SCP, 3-37–3-38 patterned operations, 3-87, 3-97.
See also conventional patterns politically unacceptable casualties.
OPFOR. See contemporary
of operation. See casualties.
opposing force; opposing force.
patternless operations, 3-95 political means, 4-5, 5-8. See also
opportunity, window of, pp. vii, xiii,
diplomatic-political means.
xv–xvi, ¶ 3-26, 3-28, 3-94, peacetime military engagement
3-96–3-97, 4-26, 4-34, 4-49, (PME), 3-111 political movements, p. xii
5-3, 5-21–5-22, 5-31, 6-21– peer competitor, political power, 2-12
6-22, 6-28, 6-34, 7-55 population, p. vi, ¶ 2-4
of United States, p. iv
opposing force (OPFOR), pp. x– control of, 5-33
State is not, p. xiii
xi. See also contemporary
opposing force, penal system, 2-49 potential adversary. See threat.
Index-12
____________________________________________________________________________________ Index
Index-13
FM 7-100 _________________________________________________________________________________
space-based assets, 2-87 SPOEs. See sea ports of logistics system, pp. 7-1–7-
embarkation. 21. See also logistics.
special police, 2-49, 4-40
SSMs. See surface-to-surface military capabilities, 1-17–
Special-Purpose Forces (SPF), 1-18, 2-17–2-19
3-73, 3-101, 3-105, 3-109, missiles.
4-29, 5-40, 6-35, 6-69, 7-13– staging areas, as targets, 5-6, military power, 4-26–4-53,
7-14, 7-44 5-44 5-18–5-44, 6-19–6-65
Air Force Special-Purpose stalemate, 3-18, 3-64, 3-99, 6-4 ministries, 3-34. See
Forces (SPF), 2-84, 2-86, individual ministries.
State, p. xiii, pp. 1-1–1-11,
2-95, 4-45, 5-40, 6-47, pp. 2-1–2-24 National Assembly, 1-2
6-54 National Command Authority
characteristics of, 1-1–1-18,
Army Special-Purpose Forces 2-2 (NCA), 2-20–2-21, 2-60,
(SPF), 2-72, 2-95, 2-102, 3-19, 3-32, 3-47, 3-70,
demographics, 1-5, 1-20–
4-41, 5-37, 6-54 3-73, 3-106, 6-48
1-24
commandos, 2-48, 2-97 national direction, 2-7
diplomatic corps, 2-11
direct action, 2-94, 4-50, 5-43 national power, elements of,
2-1–2-19, 3-15
Index-14
____________________________________________________________________________________ Index
national power, instruments stockpiles, ¶ 4-22, 5-13, 6-17– in transition operations, 5-1–
of, 2-8–2-21, 3-1, 3-6, 3-9– 6-18, p. 7-1, ¶ 7-3, 7-5, 7-34, 5-7
3-10, 3-14, 3-35, 3-104, 7-49, 7-50–7-53, 7-55, 7-62, long-term, 1-1, 1-15–1-16,
3-111, 3-115, 3-129, 7-1 7-66 1-25, 3-19, 3-59
national power, sources of, storage, specific, 3-20, 3-24, 3-30–
2-2–2-7 aboveground facilities, 7-64, 3-32, 3-38, 3-59, 4-1–4-3
national security strategy, 7-105 survival, 6-2
p. xiii, ¶ 2-9, 3-1–3-29, 4-1, bunkers, 7-65 strategic information warfare
7-1
depots, 7-62–7-63 (SIW), 3-106, 3-114–3-144
national will, 1-13–1-14, 2-6,
long-term, 7-26 definition, 3-117
3-83–3-84, 3-86, 4-13
short-duration facilities, 7-43, goal, 3-118
nature of government, 1-2
7-54, 7-66 NCA staff responsibility,
not a peer competitor of US,
underground structures, 7-65, 3-128–3-132, 3-134
p. xiii
7-105 strategic information warfare
physical environment, 1-7
strategic campaign, 3-30–3-102. (SIW) campaign, 2-28, 3-121,
political power, 2-12 See national strategic 3-134
population, 2-4 campaign. strategic information warfare plan
President, 1-2, 2-20–2-21, strategic campaign plan (SCP). (SIWP), 3-122, 3-128, 3-130,
6-11 See diplomatic strategic 3-132, 3-134–3-135
regional and global campaign plan; economic strategic information warfare
relationships, 1-3 strategic campaign plan; planning office (SIWPO),
information strategic campaign 3-129–3-130, 3-132, 3-135,
regional power, p. xiii
plan; military strategic 3-139
State-owned facilities abroad, campaign plan; national
7-30 Strategic Integration Department
strategic campaign plan.
(SID), 2-21, 2-50, 3-5, 3-34,
strategic goal(s). See main strategic centers of gravity, enemy 7-1–7-8, 7-32, 7-35, 7-45, 7-55,
entry on strategic goal(s). (U.S.), 3-21, 3-48, 3-103– 7-104
strategic planning, 2-62, 3-4– 3-104, 3-107–3-109, 5-6
liaison offices, 3-131, 3-136,
3-5 strategic environment. See 7-4
strategy, pp. xiii, xvi operational environment;
responsibility for SIWP,
structure of, pp. 2-1–2-24 contemporary operational
3-128–3-129, 3-131, 3-135
environment, overall.
technology, 1-8–1-9, 2-31, strategic operations, 3-21–3-22,
4-27, 4-46, 5-23, 6-36, Strategic Forces, 2-88–2-91, 7-14
3-25, 3-27–3-29, 3-47–3-48,
7-17, 7-19–7-21, 7-23, in adaptive operations, 6-48– 3-52, 3-59, 3-103–3-113
7-25, 7-27–7-29 6-54
defensive actions, 4-52
threats to the State, pp. x, in regional operations, 4-29,
during adaptive operations,
xiii–xv, 1-19–1-31, 2-18, 4-48–4-49
6-1, 6-3, 6-24, 6-47, 6-66–
2-41, 4-4, 4-39, 5-8, 6-4, in transition operations, 5-41– 6-69
7-9, 7-12, 7-20 5-42
during regional operations,
time, 1-15–1-16, 6-2 strategic goal(s), 1-1, 1-15–1-16, 4-52
views of the United States, 3-1–3-2, 3-19–3-20, 3-23, 3-29,
during transition operations,
pp. viii, xv, ¶ 1-32–1-55, 3-59
5-6, 5-45–5-46
3-68 expansionary, p. xiii, p. 2-1, ¶
means, 3-104–3-106
State Information Directorate, 3-2, 3-19, 3-59, 4-2–4-3,
Ministry of Public Information, 5-1, 5-8, 6-2 targets, 3-107–3-109
2-29, 3-139 in adaptive operations, 6-1– timeframe, 3-110–3-113
State Security Directorate, 6-5, 6-27 strategic planning, 2-62, 3-4–3-5
Ministry of the Interior, 2-45– in regional operations, 4-1–
2-48, 4-40 4-3
Index-15
FM 7-100 _________________________________________________________________________________
Index-16
____________________________________________________________________________________ Index
threats to the State (continued) movement regulation, 7-70 key systems, as targets, 3-83,
internal, 1-20–1-24, 4-4, 4-39, network, vulnerability of, 7-37 3-90, 3-97, 6-22, 6-35,
5-8, 6-4, 7-9, 7-12 6-38, 6-41, 6-51
principles, 7-68–7-74
regional, pp. xiii–xv, ¶ 1-25– logistics, 1-52–1-53
rail, 7-73, 7-75
1-27, 7-20 long-range, standoff
road (motor vehicle), 7-73,
terrorism, 1-20, 4-6 engagement, 1-39, 6-37
7-75–7-76
threat(s), to the United States, national will, p. vii–viii, ¶ 1-36,
traffic management, 7-67
pp. v, x–xiii 3-72, 3-101–3-102, 5-41,
Treasury and Banking Directorate, 6-1, 6-13–6-14
time, pp. vii–viii, ¶ 1-15–1-16, Ministry of Finance and
1-38, 3-83–3-84, 6-2. See also predictable operations, 1-48–
Economic Affairs, 2-39
tempo. 1-49
tunnels, 7-65
total war, ¶ 3-4–3-5, 3-13–3-14, strategic centers of gravity,
3-16–3-17, 3-46, 3-67, 3-85, 3-21, 3-48, 3-103–3-104,
3-101, 3-112, 3-115, 4-5, 4-25, U 3-107–3-109, 5-6
6-60, p. 7-1, ¶ 7-18, 7-31 UAVs. See unmanned aerial sensitivity to domestic and
strategy for, pp. 3-1–3-31 vehicles. world opinion, 1-38, 3-84–
unconventional forces, 3-90 3-85
toxic industrial chemicals, 6-53
United States. See also technology and warfighting
traffic management, 7-67
extraregional power. capability, p. viii, ¶ 1-33,
training. See military training. 1-42–1-43, 1-48. See also
casualties, aversion to heavy technological overmatch.
training exercises, of State, 2-62,
losses, 1-36–1-37, 3-18
3-32 views of, pp. viii, xv, ¶ 1-32–
close, dismounted combat, 1-55, 3-68
training objectives, U.S., p. ix
1-40–1-41
training outcomes, U.S., pp. viii–ix unit training, U.S., p. xiii
coalitions, vulnerability of,
transition operations, 2-82, 2-89, p. vi, ¶ 1-34–1-35, 3-72, unmanned aerial vehicles (UAVs),
2-92, 3-21–3-22, 3-28–3-29, 5-41, 5-45, 6-14 2-67
3-48, 3-53–3-60, 3-62, 3-66, unpredictability, p. xvi, ¶ 6-23
commitment, lack of, p. viii,
3-70, 3-73, 3-110, 3-112, 4-4,
¶ 1-38, 3-83–3-84 urban environments, pp. vi–vii,
pp. 5-1–5-9, ¶ 6-4, 6-6, 6-19,
contractor support, 1-52, ¶ 1-47, 3-88, 3-96, 3-100, 4-49,
6-25–6-27, 6-33, 6-59, 7-52–
1-54, 5-46, 6-24 5-5, 5-21, 5-24, 6-35–6-37,
7-53
6-63
transition states, p. xii cultural awareness, lack of,
1-50, 6-15
transnational corporations, pp. vii, V
xii, ¶ 1-3, 1-9, 1-11, 4-9, 5-17, downsizing after conflict, 1-55
6-57 early-entry forces, p. viii, variables, of COE. See critical
¶ 3-80, 3-95, 5-22, 5-25, variables.
transnational groups, 1-12
5-28, 5-31, 5-37, 5-43, victory, p. vii, ¶ 3-18, 3-64, 3-86,
transnational political movements,
5-45, 6-41 3-99, 3-113, 6-4
p. xii
force projection, vulnerability views of the United States, pp. viii,
transport aircraft, 2-81, 4-46, 5-39
of, p. vii, ¶ 1-51 xv, ¶ 1-32–1-55, 3-68
transport helicopters, 2-84
homeland, as target, 3-102, VIP security, 2-48
transportation, 7-54, 7-67–7-76 3-119, 5-6, 5-44, 5-46,
air, 7-73, 7-76 6-66, 6-69 W
coastal waterway, 7-75 home stations, as targets,
wartime fighting force structure,
inland waterway, 7-73, 7-75 3-102
2-101, 2-104–2-106
Military Transportation information dominance, 1-44–
weapons of mass destruction
Bureau, 7-67 1-47
(WMD), 3-67, 3-73, 3-102
modes, 7-75–7-76 intervention by, pp. iv, xiv
in adaptive operations, 6-49–
movement control, 7-69 6-52, 6-55, 6-69
movement program, 7-70
Index-17
FM 7-100 _________________________________________________________________________________
Y
Youth Corps, 2-32, 4-15
Index-18
FM 7-100
1 MAY 2003
ERIC K. SHINSEKI
General, United States Army
Chief of Staff
Official:
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
0310404
DISTRIBUTION:
Active Army, Army National Guard, and US Army Reserve: To be distributed in
accordance with initial distribution number xxxxxx, requirements for FM 7-100.
PIN: 080791-000