Red Diamond Threats Newsletter
Total Page:16
File Type:pdf, Size:1020Kb
Red Diamond Threats Newsletter TRADOC G-2 Operational Environment Enterprise ACE Threats Integration Fort Leavenworth, KS Volume 6, Issue 7 JUL 2015 INSIDE THIS ISSUE UGF in North Korea......... 4 Fight for Hama, Syria .... 12 JMRC Ex CR 15-04 ........ 17 WEG 2015 Changes....... 22 Boko Haram ................... 24 Recon & Assault Pt 2 .... 29 ACE-TI POCs ................. 35 by TRADOC G-2 ACE Threats Integration OEE Red Diamond The Threat Tactics Course will be at Fort Leavenworth next month, 24– published monthly by 28 August. The week-long course provides students with an TRADOC G-2 OEE understanding of the tactics and techniques employed by the threat in ACE Threats Integration complex environments. Those who design or participate in training Send suggestions to: exercises and scenario development will benefit from this free course. ATTN: Red Diamond Slots for August are still available. Please contact Angela Wilkins Dr. Jon H. Moilanen ([email protected]) to register for the course, and Operations BMA Contractor provide the following: your name, rank/civilian/contractor, duty title, and organization, installation, email, and phone. If you are unable to attend Angela Wilkins but would like to be contacted about future courses, you will be added Chief Editor and to the contact list. Typically, the course is provided twice a year in Product Integration BMA Contractor March and August. OEE NEWSLETTER DISTRIBUTION UNLIMITED RED DIAMOND TOPICS OF INTEREST by Angela M. Wilkins, TRADOC G-2 ACE-Threats Integration, Editor, Red Diamond Newsletter (BMA Ctr) This month’s front-page feature serves as a reminder to Nigerian governments’ ability to conduct business. A register for the Threat Tactics Course to be held next prime example was the threat group’s effect on the month. Contact us with questions about the course or to timeline of the presidential election. Although Nigeria register. has the potential to be one of the world’s fastest growing economies this year, Boko Haram has found success in The use of subterranean spaces, or underground impeding the government’s progress and legitimacy with facilities (UGF), is an effective technique the threat a variety of common tactics and simple techniques. employs against the United States’ air superiority. The article beginning on page 4 discusses the over 10,000 This month’s issue of Red Diamond concludes with Part 2 UGFs operated in and by the North Korean government. of a tactical vignette on reconnaissance and assault techniques (page 29). The article takes the reader Recent operations in Hama, Syria demonstrate how the through a recon and assault mission in explicit detail, Syrian regime used a variety of organizations to conduct providing a realistic sense of a way such tactical actions defensive and offensive operations, including non-state might take place. Additionally, opposing force doctrinal actors and local militias. In particular, in 2014, Syria was definitions and descriptions are provided to demonstrate able to defend the airbase in Hama from opposition to the reader the connection between doctrine and real- forces. See page 12 for details. word threat tasks. An analyst from ACE Threats Integration observed a Contact information for all TRADOC G-2 ACE Threats DATE-based exercise at the Join Multinational Readiness Integration personnel is provided on the final page of the Center (JMRC), Combined Resolve IV. The exercise, newsletter. We are here to help, so contact us with your taking place in May and early June 2015, successfully questions. employed a realistic and robust OPFOR to challenge the US and its partners, providing excellent training. Find the Email your topic recommendations to: analyst’s observations beginning on page 17. Dr. Jon H. Moilanen, ACE Threats Integration The Worldwide Equipment Guide (WEG) is updated Operations, BMA CTR annually by TRADOC G-2 ACE Threats Integration. The [email protected] 2015 iteration will undergo format changes to aid in ease and of extraction of information, and will streamline content Angela M. Wilkins, ACE Threats Integration by eliminating outdated weapons and equipment if there Chief Editor and Product Integration, BMA CTR is a similar entry with the same capabilities. See page 22. [email protected] The article on page 24 discusses tactics and techniques successfully employed by Boko Haram to disrupt the Red Diamond Disclaimer The Red Diamond presents professional information but the views expressed herein are those of the authors, not the Department of Defense or its elements. The content does not necessarily reflect the official US Army position and does not change or supersede any information in other official US Army publications. Authors are responsible for the accuracy and source documentation of material that they reference. The Red Diamond staff reserves the right to edit material. Appearance of external hyperlinks does not constitute endorsement by the US Army for information contained therein. Red Diamond Page 2 Director’s Corner Thoughts for Training Readiness by Jon Cleaves, Director, TRADOC G-2 ACE Threats Integration (DAC) The Threat Tactics course we teach twice a year here at Fort Leavenworth is one of the best ways to become familiar with the concepts of hybrid threat, operational environment, and functional tactics, and to learn how to apply them in your daily responsibilities supporting the soldier. The knowledge you will gain from attending the course will provide you with bya solidJon understanding S. Cleaves, Director,of threat concepts ACE-Threats to enhance Integration tasks such as writing scenarios, developing exercises, and simply reading about and understanding threat actions currently taking place worldwide. The week-long class is based on doctrine detailed in the TC 7-100 series, and also makes references to the Decisive Action Training Environment (DATE) and some of our other publications on recent hybrid threat actions. Students will experience an engaging atmosphere in a small classroom setting with state-of-the-art equipment. Our instructors are the same people who analyze operational environments and develop the products upon which the course content is based. ACE Threats Integration, a member of TRADOC G-2 Operational Environment Enterprise (OEE), is the Army's lead to study, design, document, validate, and apply hybrid threat and operational environment (OE) conditions that support all US Army and joint training and leader development programs. All military, civilians, and contractors are eligible to attend the course, with a maximum of three personnel per organization. The course is UNCLASSIFIED, and there is no fee. Having students with multiple backgrounds and experience in intelligence operations is ideal. Foreign officers are eligible with approval. We typically offer the course twice a year, in March and August, and we consider and implement changes to the course after each iteration based on student and instructor feedback, and to keep course materials current. If you’d like to take advantage of this opportunity, there are a limited number of seats still available for the 24–28 August course. To register or ask questions about the course, please contact Angela Wilkins ([email protected] or 913-684-7929). Key Links on Army Training Network TC 7-100 Series: https://atn.army.mil/dsp_template.aspx?dpID=311 DATE: https://atn.army.mil/media/docs/DATE%202.2.pdf Threat Tactics Course Material from March 2015: https://atn.army.mil/dsp_template.aspx?dpID=447 JON Red Diamond Page 3 by H. David Pendleton, TRADOC G-2 ACE Threats Integration (CGI Ctr) Some analysts estimate the Democratic People’s Republic of Korea (DPRK), commonly known as North Korea, operates between 11,000 and 14,000 underground facilities (UGF) for military or governmental use. North Korea has taken much of its military and governmental activity below ground because of the massive destruction UN airplanes caused to above- ground facilities during the 1950–53 Korean War and as a means to avoid enemy imagery intelligence opportunities. The actual amount of subterranean activity is only speculation, however, and often UGF excavations are only discovered by the amount of debris generated—whether left on site or transported away. Many other countries have now accepted that subterranean operations may be the best way to survive American air superiority. It is likely any countries who face off against the US military will use UGFs and American Soldiers will need to understand what they may potentially face. While this article will cover the subterranean activities of North Korea, it is important to note many other countries may also adopt the same strategy if they face the US on the battlefield. The North Korean use of underground concrete bunkers dates back to at least January 1951 when the Central Intelligence Agency (CIA) located a bunker a little outside of Pyongyang’s city limits designed specifically for use by the then-DPRK leader, Kim Il Sung. UGF construction has slowed down in the last decade due to shortage of materials, the lack of heavy equipment, and frequent electrical blackouts throughout the country. Nevertheless, work on underground facilities continues with much of the work formerly done by machinery now completed using manual labor.1 The DPRK recruits its citizens, usually in their late teens, into special military units that construct and/or operate underground facilities. The soldiers sign a confidentiality agreement and the North Korean government