You are on page 1of 31

Attack Operations & Attack Actions

By Redbeard Tactical
Introduction

An attack operation, or attack action in general, is the projection of offensive force to the enemies
positions with the goal of achieving an either shaping, supporting or decisive outcome.

While an attack does not have to be decisive, it is the kind of operation that has the most decisive
potential in the field. While a combat patrol wont win a war at any time, an attack can potentially do
this, its also unlikely that in the times of maneuver warfare a defender will decide a conflict without
at least trying to conduct an attack operation.

In literature, attack operations are most often defined by taking and holding ground. While not all
attacks hold ground (proxy attacks are a good example) its exactly what a patrol operation cant do
and therefore makes attacks the decisive tool they are.

Conducting attack operations enables us to take the initiative from the enemy. Therefore the attack is
clearly the foundation of modern Warfare, no matter if it is for an attacking or defending army, for
state actors or violent non-state actors. Learning the basic types and patterns of attack operations is
crucial for achieving a decisive victory.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Foundations
1.1 Types of attacks
The following types of attack are the most commonly employed attack operations. When employed
as a decisive action a succesful execution will always result in gained ground and destruction /
dispersion of enemy forces.

Hasty Attack This attack lacks deliberate planning and is


usually performed during meeting engagements.
Deliberate Attack Is a well prepared attack, most often performed
in a synchronized fashion on a known enemy
position.
Spoiling attack A deliberate attack conducted on an assembling
enemy force. (Used by the defender)
Counter attack Is conducted during an enemy attack as soon as
the enemy has lost momentum.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Foundations
1.2 Attack patterns
Every type of attack is consisting of one core attack pattern which is usually chosen by the commander of the
operation considering enemy, terrain and own forces.

Frontal Attack A frontal attack describes a whole scale attack at a


broad area of the enemies defensive lines or even his
whole defensive lines.
Envelopment/ Flanking The enemy defensive line gets attacked from one or
two flanks, with the attacker making use of the
enemies weakspots.
Penetration The attackers forces get projected at a small area of
the enemy defensive lines, to create a breach and
later exploiting by attacking the enemies rear.
Infiltration Covert insertion into the enemies territory to
maximize surprise.
Turning Movement The enemies defensive line gets outmaneuvered.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Introduction
1.3 Difference between action and
operation.
An attack can be an action or an operation.

An attack operation always has the goal of taking ground or is at least pretending to do so. An attack
operation can be a major or minor military offense. An attack operation can consist of multiple
offensive and defensive sub operations and alawys consists of at least one attack action.

Describes attacking an enemy position or element at the tactical level. Contrary to attack operations,
attack actions never get conducted for their own sake. They are always part of an operation. It is
crucial to understand that a single operation is the sum of its actions. Therefore the lowest level of
command and decisionmaking can be crucial for success of an operation.

An attack operation may be frontal in nature, but squad and platoon leaders may individually decide
to attack their issued objective in an enveloping, penetrating or frontal approach. Its important that
those decisionlevels coexist in a synergetic level. Meaning, the attack action shall never be an
obstacle to the operation it is conducted in.

Also an attack action may be part of an operation that hasnt the goal of taking and holding ground,
for example a patrol.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Foundations
1.4 Tenets of success
Any type of attack needs a balanced combination of the following factors to thrive. In isolated case the focus on one or two factors
can also be sufficient.

Surprise To prevent enemy counter attacks or reinforcements an attack


needs to be screened by deception, camo and secrecy during
assembly.
Mass A successful attack at an unprepared enemy needs an superiority
in numbers and fires at a 1/3 ratio to the enemy. If the enemy is
well prepared its at least a 1/5 ratio
Momentum An attack needs to be executed at the highest possible speed.
Every casuality and every meter your forces move will reduce
that speed. Therefore objectives need to be sustainable.
Centers of gravity Without at least one center of gravity surprise, mass and
momentum will vaporize into nothing.

All those factors need to be balanced according too each other. While mass should be superior to the enemy, an abundance of mass
will reduce momentum and will endanger surprise. An abundance of centers of gravity will disperse mass and so on.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Types
2.1 Hasty attack
A hasty attack gets planned during an engagement, its most often a reactive kind of attack. Execution of those
attacks is not only limited to meeting type engagements but will also happen during prolonged attack
operations. Leaders of the smallest elements should be capable of conudcting hasty attacks and even
encouraged to do so.

A big amount of well synchronized hasty attack actions during an attack operation will result in the enemy
commander being overwhelmed by a large amount of unpredictable, yet mission specific decisions. However
leaders should be aware that a hasty attack should never collide with the commanders intent. Especially own
support fires can be a limiting factor a squad or platoon leader should be aware of.

In the larger scale the hasty attack serves the sole purpose of stacking the commanders odds in the wrestling
for initiative with the enemy commander, they are most often shaping and seldom of a decisive nature.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Types
2.2 Deliberate Attack
The deliberate attack is meticiulously planned, be it for hours, days, weeks or months. Forces for the
deliberate attack get assembled for conducting it. Its most often a proactive action or operation and allows to
stack the odds even further to the attacker.

A good deliberate attack should follow a rough pattern, potential issues that can come up during it should be
evaluated but should not be pre-solved in detail. Otherwise the attack gets an even bulkier action or operation
as it is anyways. While assets can be placed for events like casualities.

Those assesments should be made according to the patterns METT-TC and OAKOC which we will explain in
a later chapter of this guide.

Keep in mind that a deliberate attack operation is well planned but not choreographed.

A deliberate attack is always conducted on a known enemy position.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Types
2.3 Spoiling Attack
A spoiling attack is a deliberate or hasty attack executed at an assembling enemy attack force. Besides the
necessity of being able to conduct spoiling attacks, leaders should be aware of the fact that spoiling attacks
can be executed by the enemy himself everytime and anywhere. Therefore an assembling attack elements
needs to maintain security and more importantly conduct security screening.

A spoiling attack serves no other utility than dispersing an enemy force during the weak moment of assembly
before it can build its superiority in numbers and therefore eliminating its success factor of mass.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Types
2.4 Counter Attack
The counter attack is most often conducted using an elements tactical reserve. It is also always conducted
from the defense and should hit an attacking force during its weakest moment.

During an attack the attacker will inenvitably lose mass and momentum, the best time to conduct a
counterattack is therefore when the attacker struggles to move and is starting to hold ground in the defenders
deep defense.

The mass of the attacker should be reduced to at least 1/3 of the counter attacks mass. However, when waiting
to long the attacker will start to reinforce his position and prepare for defense. Therefore timing is crucial for
a well executed counter attack.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.1 Frontal Attack
The frontal attack is the oldest attack pattern known to humanity. It is easy to conduct, but is often associated
with a large amount of casualities. Despite its simple nature it can be the most promising attack pattern in
certain situations, as no other attack is this easy to plan, control and no other attack pattern has the same
devastating initial fires and momentum. It always faces the enemy defenses frontal, as it name implies.

As the frontal attack, in contrast to the penetrating attack, always targets the enemy defensive lines in their
whole size, or at least a major part of it, it is also a very decisive attack. It robs the enemy of a majority of his
fighting capabilities if conducted succesful.

Pros:
-Easy to plan
-Easy to control
-Overwhelming initial fires
-Overwhelming momentum
-Gives freedom to subordinate leaders, due to simple arcs of fire.
-Forces with high mobility can overwhelm the enemy before he can entrench further

Cons:
-High casuality rate
-Vulnerable to deep defense
-Vulnerable to flanking counter attacks
-Support elements have to move after initial attack-Faces the majority of the enemies firepower

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.2 Envelope Attack
The envelope or flanking attack is a classic of military maneuver warfare. As it faces either one or two flanks
of the enemy defensive positions it allows to line-up the enemy and therefore often results in less casualities.
However, the flanking attack in both executions always suffers from a narrow attack corridor. Therefore
support fire has often to be provided from an additional frontal „fixing“ attack, increasing the need of
planning and ressources.

When conducted in a pincer fashion the envelope attack gets even harder to coordinate as excellent
communication between both flanks and a possible fixing element are crucial to prevent blue-on-blue type
accidents.

Pros:
-Hits the enemy at a weak spot
-When conducted succesful the enemy loses the majority of his fighting capabilities
-Support elements dont have to move if combined with a fixing frontal attack
-Limits enemy support fires

Cons:
-Needs more preparation
-Lacks firepower without a dedicated fixing attack
-Requires a longer approach
-Can easily result in blue-on-blue accidents

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.3 Penetration
The penetration is a modified frontal attack, focusing on a very small spot of the enemies defensive lines. It
has the goal to create a breach in the enemies defense, allowing for further exploitation. After a frontal attack
created a breach, a certain center of gravity like command structures or artillery will be attacked, forcing the
enemy to either activate strategic reserves or abandon his defensive lines. Another way of exploitation is to
disperse the attack forces after the breach to attack enemy forces from behind.

Pros:
-Hits the enemy with concentrated forces on a small perimeter
-Allows to skip a majority of enemy defenses
-Superiority in numbers is reached easily
-Firepower in the initial phase is overwhelming
-Forces the enemy to react.
-Easy to set-up

Cons:
-Requires knowledge about the enemies rear area
-Requires independent and adaptive subordinate leaders after the breach is achieved
-Very vulnerable to deep defense
-Breach needs to be kept open long enough for support elements to pass
-Often requires proxy attacks
-Will leave a majority of the enemies defense intact

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.4 Infiltration
Infiltration opts to skip enemy defensive lines by covertly moving through them. What sounds like a great
idea is a very uncommon kind of attack for several reasons. Infiltration is suited for harsh terrain that creates
dispersed enemy defensive positions. Once one or multiple gaps are exploited, the approach is silent. Targets
of decisive (Enemy staff, capitals...) or shaping (artillery, airports..) relevance get attacked. Therefore it is
often more suitable to conduct a combat patrol instead of this kind of attack. However, when applied
properly, an infiltration type attack can be devastating to the enemy. It is especially suited for airborne or
other specialized mobility forces.

Pros:
-Needs a low amount of mass.
-Can be devastating if the right forces are used at the right time in the right place.
-Will force the enemy to react
-Great in conjuction with other types of attacks

Cons:
-Forces will inenvitably get isolated
-Enemy main defense is still intact
-Decisive outcome is a rarity
-Requires VERY well trained troops and leaders
-Requires extensive knowledge of enemy rear areas
-Requires extensive reconnaisance of enemy main defensive positions

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.5 Turning Movement
Turning Movement is another attack that skips the enemy main defensive line, but other than penetration and
and infiltration it does not target the enemy defenses but his rear area. This attack pattern is especially suited
to deal with a setup deep defense. Its either conducted in concert with a frontal or flanking proxy attack or by
simply infiltrating or penetrating enemy defense lines. It can be conducted by penetration or infiltration.

Pros:
-Skips enemy defenses
-Denies enemy fallback positions
-If conducted succesful the enemy defense is rendered useless
-Can conduct a pincer movement

Cons:
-Requires special insertion methods or brute force
-Requires extensive data of enemy defense
-Turning element will be isolated after breaching defenses
-Hard to assemble

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Attack Patterns
3.6 Combining Attack Patterns
Especially on the large scale, but also during platoon size operations and actions, combining some of the
attack patterns above can be the key to success. A strong frontal attack, combined with a shaping proxy and a
decisive envelope attack are good ways to enhance pressure on the enemy and keep the initiative.

Always keep in mind that every attack should have an at least shaping character and should be at least able to
be decisive by chances. Therefore none of the attacks conducted during such a combined action or operation
should be executed for the sole sake of executing it.

Actions that only have a supporting to shaping character should therefore be limited to patrols if possible. It
can require to combine several attack patterns, either at the same time or staged. E.g.: An infiltration can be
followed by pincer attack to crush enemy defenses.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.1 General Preparation
When conducting an attack you will follow a general pattern of preparations that will help to ensure mass,
surprise and momentum. This applies to all levels of command except the highest ranking levels. Subordinate
leaders will repeat the same and filter the information.

1. Receive the mission


2. Issue warning order
3. Create Idea of battle
4. Approach
5. Conduct Reconnaissance
6. Finish Idea of Battle
7. Issue Order
8. Execute, Supervise
9. Prepare for counterattack

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.2 Receiving the mission

You most likely will receive a mission in form of a warning order first. Giving you rough information about elements, place, time and intent. This serves as a means
to maintain surprise and screen the operation.

Later on you will receive a fragmentary order and finally a detailed operation order.

Soak up all information you get, ask questions and take notes.

All informations you get can be passed to your subordinates when not stated otherwise, although you should filter them by preparing your own briefing or warning
order.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.3 Issuing Warning Order
The warning order is your subordinates first contact with the plan in front of them. It consists out of the following paragraphs.

Paragaph Contents Example


Situation -Area of Interest This is a warning order, command wants us to push deeper into enemy territory to seize ground. Our unit will operate
-Area of Operation in pinewood. Enemy resistance on our target area Height 688 consists out of propably one rifle squad. We are flanked
-Enemy Forces by charly and bravo platoon, each completing a similar objective.
-Friendly Forces
Mission -Type of mission We will be attacking the enemy position and drive the enemy out of our sector in pinewood. We are conducting a
frontal attack.
Execution -Propable course of action Movement of all elements starts at 17 0500 Jun 2022. We will be one of the three assault platoons and will move in
bounding overwatch. We should arrive in the assembly area at 0700. A leaders recce is then conducted by each
platoon. We will attack the enemy around 0900. Once the objective is taken we will prepare for defense
(Sustainment) -Maintenance Each soldier will carry a full combat load, 4l of additional water and 300 additional rounds of 556 ammo packed in
-Transportation magazines. Otherwise pack light. We wont need any additional rations as this operation is conducted in less than 24h.
-Supply
-Uniform
(Command & Signal) -Location of HQ Platoon HQ is always with A squad. Signaling is performed by radio.
-Means of Communication

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.4 Idea of Battle

The Idea of battle is the more detailed version of the warning order, also called operational order. To get an idea of what you are facing and what your should prepare
for you should work with the patterns METT-TC and OAKOC

METT-TC: Mission, Enemy, Terrain and Weather, Troops, Time, Civilian Considerations
OAKOC: Observations and Fields of Fire, Avenues of Approach, Key and Decisive Terrain, Obstacles, Cover and Concealment.

Keep in mind that those are not formulas or replacements for your brains, METT-TC and OAKOC are just aids to memorize the most important factors, which will
help you to develop a rough idea of battle.

The idea of battle will never survive the first contact. OAKOC and METT-TC will be reevaluated constantly.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.5 METT-TC

Mission Mission and Commanders Intent, includes mission statement of higher levels..

Constraints, Tasks, Risks, Restatement


Enemy Composition, Disposition, Strength, Capabilities, Behavior (Most propable & Most dangerous)
Terrain/Weather Key Terrain, Positions (See OAKOC)
Troops Composition, Disposition, Strength, Capabilities
Time Set timeframes
Civilian Considerations Are civilians in the area?

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.6 OAKOC

Observation/Fields of Fire Analyze Terrain by its ability to improve direct fire capabilities of your troops and restrict direct fire
capabilities of enemy troops.
Avenues of approach Analyze approach routes to assembly area and to objectives and key terrain
Key Terrain Key Terrain covers terrain features of decisive or shaping importance
Obstacles Manmade and natural obstacles that can potentially slow down enemy or friendly movement
Cover and Concealment Analyze which terrain provides cover and which terrain provides concealment

OAKOC is a terrain analysis, but can change during battle as centers of gravity may shift. This is especially true for arcs of fire.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.7 Finalizing your Idea of Battle

Using METT-TC and OAKOC you will be able to select the approach route, recon and actions of your troops. Especially enemy capabilties and terrain will narrow
down your options when it comes to finding a fitting attack pattern on certain enemy positions.

Will OAKOC even allow an enveloping attack? Is the amount of own troops enough for a frontal attack according to your METT-TC based analysis? Maybe an
infiltrating attack is best suited due to terrain assesment?

You will present your idea of battle like issuing a Warning Order, but way more detailed. If you have subordinate leaders, let them create their own idea of battle with
your given restrictions and intent.

If not given, you will have to select an assembly area for your troops which they will approach to. The assembly area should provide necessary space and shelter, but
should also allow for observation while being defendable. Of course it should also fit the factors of time given in the Warning Order and Operational Order.

Finally you have to set a line of departure, when all troops are succesfully ordered to the line of departure, the attack operation or action begins.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.7 Approach
The approach is the critical phase when your elements leave the release point and approach the assembly
area. Even the best planned attack can fail due to a poorly planned approach. While enemy contact should not
happen during the approach it can happen, either due to bad intelligence or bad luck.

Therefore conduct only the initial approach in regular traveling. Later on you will switch to traveling
overwatch or even to moving in a bounding fashion. Concealment, speed and protection are important factors
too.

An approach can be conducted by vehicle, aircraft, on foot, by boat or a mix of those. It can take a few hours
or days.

When in the assembly area its „go and find work“ equipment is prepared and checked, reconnaissance is
conducted and the idea of battle is refined. Most important: Security is maintained as well as camouflage.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.8 Conduct Reconnaissance

Remember that the intel you used to create the Warning Order and Operational Order is outdated as soon as the ink on the printed paper has dried. Therefore you
should conduct reconnaissance in front of an attack operation.

This can be conducted by UAVs, recon teams, snipers or other designated elements. However, most often you will assemble a small reconnaissance patrol that will
either confirm or neglect the intelligence gathered before. Nothing of all this will replace a leaders recce, scout designated centers of gravity and routes with their
designated subordinate leaders. This way you and your leaders will have a clear view of whats actually going on there.

Arcs of fire can look great on a papermap, or satellite footage. But they will always look different from first person. Be it worse or even better.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.9 Finish and issue order
Now its time reevaluate the operational order according to METT-TC and OAKOC. The approach may have
left some support assets behind. The weather may have changed. The enemy is stronger or weaker than
expected. All this will form your final idea of battle.

Now that you and your subordinate leaders have seen the objective and its centers of gravity first hand its
time to brief all members of your element with the final plan.

Use simple drawings and a terrain sandbox to do so. Allow questions, answer questions.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.10 Execute and Supervise
Your elements are ready and have arrived on the line of departure. This is the sign for the attack to start. In
the sense of mission command its important to be a supervisor all the time but only to be a controller when
absolutely necessary.

You should lead from the front and lead by example, meaning you will be in charge of the most important
attack actions yourself. „Chilling“ on a hilltop with the support element may enable you to gain more control,
but you wont be able to see the outcome of the most important actions for the operation yourself. This doesnt
mean that you should place yourself in the most dangerous initial assault all the time, but it doesnt excludes
this option. Go and find work.

Take note of completed objectives, of failed objectives and be there where your leadership is needed the
most. Be aware of what your elements are doing all the time.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Preparing an Attack
4.11 Prepare for counterattack

Modern armies know that the best defense is a counterattack and often create a defense in depth. Therefore chances are good that you have just succesfully attacked a
series of proxy defenses, with an enemy tactical reserve at the ready to counterattack when you have lost all momentum.

Be aware of this fact and establish an effective defense as soon as you have succesfully attacked. This is the most crucial phase as you have propably lost a majority
of mass and momentum and all surprise at this point. You are easy prey for a counterattack right now.

Is your troopers assaultpack packed with an e-tool and spare ammo? How do you get the large backpacks left in the assembly area towards your current position?

Set up patrols between the assembly area and your new position to prevent ambushes conducted by dispersed enemy elements, keep in mind that this is your new
supply line.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Appendix
5.1 Dealing with obstacles
A well prepared defender will place manmade obstacles like barbed wire. Obstacles are almost always
defended while inenvitable slowing down your approach. Therefore it is important to approach and reduce
those using a breacher element as the first phase of the assault. Otherwise your assault element will get
slowed down by the obstacle while getting annihilated by the enemies overwhelming firepower. Apply
SOSRA.

S Suppress The support element lays down suppressive, yet casuality producing fire on
enemy defensive positions. Arcs of fire should enable the breaching team to
approach the obstacle.
O Obscure The breaching team usually deploys smoke covering its approach and reduction
area.
S Secure Parts of the breaching team and support element provide security to reduce the
obstacle.
R Reduce The obstacle gets reduced by explosives, woodboards or wire cutters to create a
passage.
A Assault The assault gets conducted.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22
Appendix
5.2 Dealing with enemy security areas

Most likely the enemy will establish a deep defence, which will include at least a line of observation posts. When your reconnaissance reveals enemy observation
posts there are two ways to deal with them.

Scenario 1: Observation post is in the general direction of the Attack. If the enemy observation post is in the general direction of your attack, roll over it in the wage
of your attack. This is true for all attacks except infiltration attacks.

Scenario 2: Observation post or security asset is outside your main direction of attack. In this scenario you will simply take note of the observation post but ignore it.
Dont waste momentum and ressources for such a small enemy asset.

WWW.REDBEARDTACTICAL.COM INSTAGRAM.COM/REDBEARDTACTICAL.DE
20.05.22

You might also like