Fort Leavenworth, KS Volume 8, Issue 08 August 2017

INSIDE THIS ISSUE

Snow Dome Pt 2 ...... 3 Integrated Attack ...... 10 Mirawi Attack ...... 23 DATE 3.0 Revisions ...... 35 ACE-TI POCs ...... 39 by John Cantin, TRADOC G-2 ACE Threats Integration (BMA CTR) TRADOC G-2 ACE Threats Integration has been actively teaching functional analysis as a method for planning and developing opposing force (OPFOR) courses of action. The core concept is that, while every battle is unique, certain functions continue to be performed by the enemy to reach mission accomplishment. Functional analysis determines threat objectives, the battlefield functions required, and the OEE Red Diamond published capabilities available for performing each function. There are four main functions by TRADOC G-2 OEE the OPFOR will use to complete its goals and objectives: action, enabling, fixing, ACE Threats Integration and security.

For e-subscription, contact: There are several advantages to using this methodology: 1) it forces the staff to Nicole Bier (DAC), learn and understand tactics, 2) it reduces the ability of the enemy to deceive Intel OPS Coordinator, analysts, and 3) it works across the range of military operations. G-2 ACE-TI Functional analysis and functional tactics are currently discussed in depth in ATP 2- Topic inquiries: 01.3, Intelligence Preparation of the Battlefield, Appendix B. However, in the Jon H. Moilanen (DAC), current update to ATP 2-01.3, there is a potential that functional analysis will move G-2 ACE-TI from an appendix to the main body. This analysis methodology also continues to or be taught during the Threat Tactics Course, in both the resident and mobile training Angela Williams (DAC), team courses. Additionally, functional analysis was taught to the recent graduates Deputy Director, G-2 ACE-TI of the Command and General Staff College during the Brigade S2 course in June Copy Editor: 2017. Intelligence professionals that have studied functional analysis in order to Laura Deatrick (CGI CTR), understand battlefield tactics will then be able to make more accurate tactical G-2 ACE-TI predictions to their commanders.

APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED

RED DIAMOND TOPICS OF INTEREST by TRADOC G-2 ACE Threats Integration This issue of Red Diamond opens with part two of an President Duterte’s home island of Mindanao. There, on article series on the Russian Snow Dome. Starting in the 23 May 2017, elements of the Armed Forces of the days of the Tsarist Empire, Russian Ground Forces were Philippines and Philippine National Police raided a safe built around their artillery. This doctrine extended house to arrest an Islamist extremist and take him into throughout the Cold War, explaining the consistent federal custody. The authorities got more than they investment the Red Army made in its artillery corps. This bargained for: a firefight erupted that ended in a standoff article reviews several Russian artillery systems and how by nightfall, leaving three members of the government they are typically used by the Russian military. security force dead and eleven others wounded. The first article in a two-part series discusses the operational Integrated attack is a tactic that applies massed effects environment during this time, what led up to the raid, and rapid actions of threat forces to achieve of a mission and the events that happened immediately afterward. objective. Aspects of threat brigade-echelon capabilities observed in recent and current tactical real-world The purpose of the Decisive Action Training Environment operations include substantial integrated air defense, (DATE) is to provide the US Army training community indirect fires, electronic warfare, and other combat with a detailed description of the operational power enablers in conjunction with ground and aerial environments of five fictitious countries in the Caucasus maneuver. These types of capabilities are typically region: Ariana, Atropia, Donovia, Gorgas, and Limaria. present in the brigade tactical group (BTG) t