Show previous

FM 3-0

1-50. A peer threat’s use of systems warfare during the shape and deter phases of a joint operation focuses primarily on the systems within each instrument of national power, seeking vulnerabilities that can be exploited to preclude the achievement of U.S. objectives. During subsequent phases, peer threats use systems warfare in combat to assist threat commanders in decision making and the planning and execution of their mission. Peer threats believe that a qualitatively or quantitatively weaker force can defeat a superior foe, if the weaker force can dictate the terms of combat. Peer threats believe that the systems warfare approach allows them to move away from the traditional attrition-based approach to combat. Systems warfare makes it unnecessary to match an opponent system-for-system or capability-for-capability. Threat commanders and staffs will locate the critical components of the enemy combat system, patterns of interaction, and opportunities to exploit this connectivity. (See TC 7-100.2 for a more in depth discussion of systems warfare.)
Show next Show next 5