Attack presentation

30
THE DELIBERATE ATTACK LT COL PR PATHIRAVITHANA psc

Transcript of Attack presentation

Page 1: Attack presentation

THE DELIBERATE ATTACK

LT COL PR PATHIRAVITHANA psc

Page 2: Attack presentation

2

One of the primary tactical roles of infantry is to seize and hold ground

Whatever the method of approach to an objective it will finally only be seized and held by infantry action on foot

The infantry must on foot break into the objective fight through it by fire and movement and reorganize on or near it  

An assault phase by dismounted action is a tactic common to all infantry and the basic lies in the principles mechanics and tactics of the deliberate attack

INTRODUCTION

Page 3: Attack presentation

3

TYPE OF ATTACK 

Page 4: Attack presentation

4

DELIBERATE ATTACK A deliberate attack is one, which is

mounted against well organized defences. It involves careful and detailed planning and preparation with full co- ordination of all available resources

Deliberate attack normally allows time for reconnaissance down to section level Assaulting troop may have little room for manoeuvre but this disadvantage will be compensated for by the weight of fire support available form tanks indirect fire weapons other battle groups aircraft and sometimes, ships

Page 5: Attack presentation

5

Attack is one which is mounted as swiftly as is possible in order to take full advantage of an unprepared or disorganized enemy defence

It may be undertaken at battle group or any lesser level and is a tactic of the advance

Risks must be accepted and some decentralization is necessary speed will be obtained by having a well-established battle procedure and a simple, though not necessarily frontal, plan of attack

The need for speed may reduce the time available for reconnaissance

QUICK ATTACK

Page 6: Attack presentation

6

An infiltration attack involves the unseen filtering of sub-units, usually of not less than combat team strength, through enemy forward positions in order to reach objective

The surprise which can be achieved by this type of operation can pay enormous dividends

INFILTRATION ATTACK

Page 7: Attack presentation

7

An area where final administrative preparations and regrouping of battle groups and combat team take place before an attack. it should be free from enemy ground observation, be concealed from visual air reconnaissance, be battle group is responsible for signing and controlling the assembly area

ASSEMBLY AREA

Page 8: Attack presentation

8

An area to which troops deploy immediately before an attack and in which they may adopt their assault formations

It allows a buffer of time between the move forward and the crossing of the start line at h hour

FUP is occupied for as short a time as is possible, though it is here that final orders or briefings may be given or orientation be carried

FORMING UP PLACE (FUP)

Page 9: Attack presentation

9

The line which the assault troops cross at H Hour . It must be easily recognizable

Preferable be square to the objective in order that it can help align the attacking troops with the objective

The start line is normally the forward edge of the FUP

START LINE

Page 10: Attack presentation

10

This is an area close to the objective where the assaulting troops if not already so deployed adopt their formation for the assault.

FINAL ASSAULT POSITION

Page 11: Attack presentation

11

An assault may take place in progressive stages. These stages are known as phases

It is essential though not essential to use different troops for each successive phase in order to maintain momentum

PHASE

Page 12: Attack presentation

12

These are in each phase the combat teams detailed to capture objective. These are called the assaulting combat teams

ASSAULTING COMBAT TEAMS

Page 13: Attack presentation

13

These are the combat teams detailed for the role of battle group commanders reserve.

This means by which the CO deals with the unexpected and influences events once the attack has begun.

RESERVE COMBAT TEAMS

Page 14: Attack presentation

14

This the physical object of the action taken e g of the action take n a definite tactical feature the seizure of which is essential to the plan An objective will not be simply the enemy such an order is imprecise and will lead to confusion. An objective will be a firm feature which can be seen or identified by assaulting troops before they cross the SL

OBJECTIVE

Page 15: Attack presentation

15

This is the means by which enemy interference by fire or assault on to the flanks of an attack in countered. Clearly enemy enfilade interference in the early stages of an attack would be disruptive in the extreme

Special arrangements therefore, must be made to neutralize it by the use of direct and indirect fire, and by other troops positioned to do so

FLANK PROTECTION

Page 16: Attack presentation

16

  Surprise   Maintenance of momentum    Security

PRINCIPLES OF THE DELEBERATE ATTACK

Page 17: Attack presentation

17

Though a defender has usually chosen the general area of operation and has the advantage of detailed knowledge of the ground, the attacker has the initiative and the direction of assault. The attacker will choose these to his maximum advantage in order to surprise the defender and may supplement his choice by deceptive measures.  

SURPRISE

Page 18: Attack presentation

18

Timing Direction of Assault Deception

THREE CONSIDERATIONS TO ACHIEVE SURPRISE

Page 19: Attack presentation

19

Momentum is essential in order to retain the initiative to prevent an enemy form sealing off any initial penetration and to prevent him from mounting a counterattack. Momentum may be achieved by:

Organizing the attack in depth Use of the Maximum fire support Impetus of the attack Rapid reorganization

MAINTENANCE OF MOMENTUM

Page 20: Attack presentation

20

This involves isolating the area of operations as thoroughly as is possible to reduce interference. The necessary measures are:

The start line must be secure The flanks of the attack must be

protected Reorganization and exploitation Conduct of the deliberate attack

SECURITY

Page 21: Attack presentation

21

PLANNING THE DELIBERATE ATATACK

Page 22: Attack presentation

22

Allotment of tasks. Allotment of CT, in different phases, grouping etc Movement from AA to FUP, crossing obstacles, SL to assault fighting thorough the objective and reorganization Employment of Armour Employment of reserves

  DURING PLANNING THE FOLLOWING SHOULD BE CONSIDERED

Page 23: Attack presentation

23

CONDUCT OF THE DELEBERATE ATTACK

 

Page 24: Attack presentation

24

The approach to the Assembly Area (AA) should be well secured concealed from enemy observation

The distance from AA to FUP should be less than four Km. Reception at the FUP must be arranged by the nominated guides

Ideally troops will form at the FUP square to the objective in the formation in which they will advance

SL too should be square to the objective and should be marked if possible. Should a start line to be secured a preliminary op should be carried out to do so and the main body to be launched subsequently

In the assault the infantry should ideally maintain 100 m in 2 minutes

Page 25: Attack presentation

25

Armour move should be properly coordinated under following conditions: Tank and infantry on the same axis Tank and infantry on different axes Leading to the objective The assault and fighting through

 

Page 26: Attack presentation

26

This is the process by which assaulting troops will secure the area of an objective after it capture in order to hold it against counter attack

The process will involve the move forward to the assault troops of support weapons the preparation of a co ordinate defence and resupply and casualty evacuation

The vital aspect in reorganization is the speed in organizing the defence and bringing forward support weapons and the balance or the F echelon to meet any counter attack

REORGANIZATION

Page 27: Attack presentation

27

Having reached and secured an objective, combat teams may take advantage of an enemy's reverse and confusion by advancing further that the immediate objective; this in known as exploitation

Exploitation will be carried out to conform to the plan of the higher commander. Limit of exploitation will strictly limited and purely local. Calculated risk should be accepted

 

EXPLOITATION

Cont..

Page 28: Attack presentation

28

Troops used for exploitation are at risk as they are moving into the unknown and their use may weaken the defensive ability of the reorganized position, a limit of exploitation is therefore usually laid down for each combat team by the CO. Clearly there is a great advantage in the ruthless pursuit of a beaten enemy exploitation in depth must therefore by conducted by troops other that those involved in reorganization on the objective

Page 29: Attack presentation

29

CONCLUSION

Page 30: Attack presentation

30