Related Books
The Army Operations & Doctrine SMARTbook, 4th Rev. Ed. (PREVIOUS EDITION)
SUTS3: The Small Unit Tactics SMARTbook, 3rd Ed.
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
AODS7: The Army Operations & Doctrine SMARTbook, 7th Ed.
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
TLS7: The Leader's SMARTbook, 7th Ed.
OPFOR SMARTbook 2 - North Korean Military
The Army Operations & Doctrine SMARTbook, 4th Rev. Ed. (PREVIOUS EDITION)

ISBN-10 :0974248673
Release Date :Aug 1st, 2008
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:320

A NEW edition of this book is available!
AODS7: The Army Operations & Doctrine SMARTbook, 7th Ed.
Upgrade/update to the NEW 5th Edition (AODS5 with Change 1)!
The Army Operations & Doctrine SMARTbook, 4th Rev. Ed. (Aug 2008) has been superseded by a newer sixth edition AODS6 w/SMARTupdate 1 (Aug '20).Upgrade/update to the NEW edition! Click "HERE" to browse the new AODS6-1 edition!
AODS6-1: The Army Operations & Doctrine SMARTbook (w/SMARTupdate 1*) is the new sixth edition of our Army SMARTbook. Completely updated with the July 2019 ADPs, the 400-pg AODS6-1 includes operations (ADP 3-0), large-scale combat operations (FM 3-0 w/Chg 1), and refocused chapters on the elements of combat power: command & control (ADP 6-0), movement and maneuver (ADPs 3-90, 3-07, 3-28, 3-05), intelligence (ADP 2-0), fires (ADP 3-19), sustainment (ADP 4-0), & protection (ADP 3-37).
*SMARTupdate 1 to AODS6 (July 2019 ADPs) updates/replaces material in the first printing of the AODS6 SMARTbook with new material from the Army’s July 2019 ADPs, along with “pen-and-ink” reference citation and terminology changes. (Readers of the original/base AODS6 can obtain SMARTupdate 1 at www.thelightningpress.com/smartupdates/)
Always check our website for the most current and up-to-date SMARTbook edition! The Lightning Press is committed to providing the best and most relevant doctrinal material to our readers and are vigilant in reviewing new publications, anticipating upcoming doctrinal releases, and incorporating the updated material into our SMARTbook series!
Related Books
SUTS3: The Small Unit Tactics SMARTbook, 3rd Ed.
ISBN-10 :1-935886-77-0
Release Date :Mar 1st, 2020
Cover Type:Gloss U.V. Coating
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Planning & Conducting Tactical Operations
SUTS3: The Small Unit Tactics SMARTbook, 3rd Ed. is the third revised edition of The Small Unit Tactics SMARTbook, completely updated for 2019 to include ADP 3-90 Offense and Defense (Jul ‘19), FM 3-0 Operations w/Change 1 (Dec ‘17), FMs 3-90-1 & -2 (May ‘13), ATP 3-21.8 Infantry Platoon and Squad (Apr ‘16), ATP 3-21.10 Infantry Rifle Company (May ‘18), TC 3-21-76 The Ranger Handbook (Apr ‘17), and the latest versions of more than 20 additional references. SUTS3 also features a return of our premium GBC plastic-comb binding for a true open-flat reference experience!
At 344-pages, chapters and topics include tactical mission fundamentals, the offense, the defense, stability and counterinsurgency operations, tactical enabling tasks (security, reconnaissance, relief in place, passage of lines, encirclement, and troop movement), special purpose attacks (ambush and raid), urban and regional environments (urban, fortified areas, desert, cold region, mountain, and jungle operations), patrols and patrolling.
Tactics is the employment and ordered arrangement of forces in relation to each other. Through tactics, commanders use combat power to accomplish missions. The tactical-level commander uses combat power in battles, engagements, and small-unit actions.
The nature of close combat in land operations is unique. Combatants routinely come face-to-face with one another in large numbers in a wide variety of operational environments comprising all types of terrain. When other means fail to drive enemy forces from their positions, forces close with and destroy or capture them.
Offensive actions are combat operations conducted to defeat and destroy enemy forces and seize terrain, resources, and population centers. They impose the commander’s will on the enemy. A commander may also conduct offensive actions to deprive the enemy of resources, seize decisive terrain, deceive or divert the enemy, develop intelligence, or hold an enemy in position. The four primary offensive tasks are movement to contact, attack, exploitation, and pursuit.
A defensive task is a task conducted to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability tasks. Although on the defense, the commander remains alert for opportunities to attack the enemy. A defending force does not wait passively to be attacked, aggressively seeking ways of attriting and weakening enemy forces before close combat begins. There are three basic defensive tasks—area defense, mobile defense, and retrograde.
The Small Unit Tactics SMARTbook translates and bridges operational-level doctrine into tactical application -- in the form of tactics, techniques and procedures -- and provides the “how to” at the small-unit level as a ready reference at the battalion, company, platoon, squad and fire team level.
Related Books
Discount sets with this book
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
ISBN-10 :1935886711
Release Note :Base CYBER1 released Oct '19 (New CYBER1-1 w/SMARTupdate 1 released 22 Sept 21.)
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Multi-Domain Guide to Offensive/Defensive CEMA and CO
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1*) (Multi-Domain Guide to Offensive/Defensive CEMA and CO) topics and chapters include cyber intro (global threat, contemporary operating environment, information as a joint function), joint cyberspace operations (CO), cyberspace operations (OCO/DCO/DODIN), electromagnetic warfare (EW) operations, cyber & EW (CEMA) planning, spectrum management operations (SMO/JEMSO), DoD information network (DODIN) operations, acronyms/abbreviations, and a cross-referenced glossary of cyber terms.
*SMARTupdate 1 to CYBER1 (Aug ‘21) updates the first printing of CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook (Oct ‘19) by incorporating new material from FM 3-12, Cyberspace Operations and Electromagnetic Warfare (Aug ‘21), ATP 3-12.3, Electronic Warfare Techniques (Jul ‘19), ATP 6-02.70, Techniques for Spectrum Management Operations (Oct ‘19), JP 3-85, Joint Electromagnetic Spectrum Management Operations (May ‘20) and adding a new section on Cyberspace IPB (ATP 2-01.3, Jul ‘19). (Readers of the original/base CYBER1 can obtain SMARTupdate 1 at www.thelightningpress.com/smartupdates/)
United States armed forces operate in an increasingly network-based world. The proliferation of information technologies is changing the way humans interact with each other and their environment, including interactions during military operations. This broad and rapidly changing operational environment requires that today’s armed forces must operate in cyberspace and leverage an electromagnetic spectrum that is increasingly competitive, congested, and contested.
Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Operations in cyberspace contribute to gaining a significant operational advantage for achieving military objectives.
Cyber electromagnetic activities (CEMA) are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations, electronic warfare, and spectrum management operations.
Cyberspace operations (CO) are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Cyberspace operations consist of three functions: offensive cyberspace operations, defensive cyberspace operations, and Department of Defense information network operations.
Electromagnetic Warfare (EW) (formerly "electronic" warfare) is military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. EW consists of three functions: electromagnetic attack, electromagnetic protection, and electromagnetic support.
Spectrum management operations (SMO) are the interrelated functions of spectrum management, frequency assignment, host-nation coordination, and policy that enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. SMO are the management portions of electromagnetic spectrum operations (EMSO). EMSO also include electronic warfare.
Department of Defense information network (DODIN) operations are operations to secure, configure, operate, extend, maintain, and sustain DOD cyberspace.
Cybersecurity ensures the confidentiality, integrity, availability, authentication, and nonrepudiation of friendly information and information systems while denying adversaries access to the same information and information systems. Cybersecurity incorporates actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity on DOD information systems and computer networks.
Related Books
Discount sets with this book
AODS7: The Army Operations & Doctrine SMARTbook, 7th Ed.
ISBN-10 :1935886916
Release Date :Mar 1st, 2023
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:352

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Multidomain Operations
AODS7: The Army Operations & Doctrine SMARTbook, 7th Ed. (Multidomain Operations) is completely updated with the 2022 edition of FM 3-0. AODS7 focuses on Multidomain Operations and features rescoped chapters on generating and applying combat power: command & control (ADP 6-0), movement and maneuver (ADPs 3-90, 3-07, 3-28, 3-05), intelligence (ADP 2-0), fires (ADP 3-19), sustainment (ADP 4-0), & protection (ADP 3-37).
The Army’s primary mission is to organize, train, and equip its forces to conduct prompt and sustained land combat to defeat enemy ground forces and seize, occupy, and defend land areas. Army forces shape operational environments, counter aggression on land during crisis, prevail during large-scale ground combat, and consolidate gains.
Army forces achieve objectives through the conduct of operations. Operations vary in many ways. They occur in all kinds of physical environments and vary in scale of forces involved and duration.
Multidomain operations are the combined arms employment of joint and Army capabilities to create and exploit relative advantages that achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force commanders. Multidomain operations are the Army’s contribution to joint campaigns, spanning the competition continuum.The Army provides forces capable of transitioning to combat operations, fighting for information, producing intelligence, adapting to unforeseen circumstances, and defeating enemy forces. Army forces employ capabilities from multiple domains in a combined arms approach that creates complementary and reinforcing effects through multiple domains while preserving combat power to maintain options for the joint force commander.
Combat power is the total means of destructive and disruptive force that a military unit/formation can apply against an enemy at a given time. It is the ability to fight. The complementary and reinforcing effects that result from synchronized operations yield a powerful blow that overwhelms enemy forces and creates friendly momentum. Army forces deliver that blow through a combination of five dynamics: leadership, firepower, information, mobility, and survivability.
The warfighting functions contribute to generating and applying combat power. Well sustained units able to move and maneuver bring combat power to bear against the opponent. Joint and Army indirect fires complement and reinforce organic firepower in maneuver units. Survivability is a function of protection tasks that focus friendly strengths against enemy weaknesses. Information contributes to the disruption and destruction of enemy forces. Intelligence determines how and where to best apply combat power against enemy weaknesses. C2 enables leadership, the most important qualitative aspect of combat power.

Related Books
Discount sets with this book
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
ISBN-10 :1935886436
Release Date :May 19th, 2016
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:384
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Guide to Terrorism, Hybrid and Emerging Threats
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook topics and chapters include: the terrorist threat (characteristics, goals & objectives, organization, state-sponsored, international, and domestic), hybrid and future threats (forces, organization, operations & tactics), forms of terrorism (tactics, techniques, & procedures), counterterrorism (strategy, fundamentals, command, planning, and operations) critical infrastructure (identifying weaknesses, risk management, and cyber threats), protection (warfighting function, supporting tasks, and planning), countering WMD (WMD weapons, planning, and execution), and consequence management (all hazards response, domestic, international and DoD-led CM).
* This is the second printing of CTS1 (Jul 2017), incorporating an updated DNI World Threat Assessment and additional materials from START/GTD. An asterisk marks changed pages.
Terrorism has evolved as a preferred tactic for ideological extremists around the world, directly or indirectly affecting millions of people. Terrorists use many forms of unlawful violence or threats of violence to instill fear and coerce governments or societies to further a variety of political, social, criminal, economic, and religious ideologies. Terrorists threaten the national power, sovereignty, and interests of the United States and our allies. Terrorists organize and operate in a number of ways. Some operate within transnational networks, others operate as small independent groups, and others operate alone.
A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, and/or criminal elements all unified to achieve mutually-benefiting effects. Hybrid threats are innovative, adaptive, globally connected, networked, and embedded in the clutter of local populations. They can operate conventionally and unconventionally, employing adaptive and asymmetric combinations of traditional, irregular, and criminal tactics and using traditional military capabilities in old and new ways.
Counterterrorism activities and operations are taken to neutralize terrorists, their organizations, and networks in order to render them incapable of using violence to instill fear and coerce governments or societies to achieve their goals. The purpose of CT is to disrupt, isolate, and dismantle terrorist organizations and networks to render them incapable of striking the homeland, US facilities and personnel, or US interests abroad. CT also includes crisis response operations to respond to imminent terrorist threats or incidents when preemption and preclusion are not successful. In addition to increasing law enforcement capabilities for counterterrorism, the United States, like many nations, has developed specialized, but limited, military CT capabilities.
Weapons of mass destruction (WMD) are chemical, biological, radiological, or nuclear (CBRN) weapons or devices capable of a high order of destruction and/or causing mass casualties. The terrorist threat is amplified by the proliferation of WMD and their potential use by terrorists. The existence of these materials and the potential for use by actors of concern precipitates the need to plan, prepare for, and counter their use.
Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy - the infrastructure. Protection is the preservation of the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area.
Consequence management refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism. Incidents involving CBRN material produce a chaotic and hazardous environment requiring immediate response to minimize pain and suffering, reduce casualties, and restore essential infrastructure. Responders at the local, state, and federal levels may be overwhelmed by the magnitude of the incident, and U.S. DoD forces may be requested to provide additional support through the national response framework (NRF).
Related Books
TLS7: The Leader's SMARTbook, 7th Ed.
ISBN-10 :1-935886-95-9
Release Date :Aug 1st, 2023
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:328

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Leadership as a Dynamic of Combat Power
TLS7 is the seventh edition of The Leader’s SMARTbook, completely updated for 2023. TLS7 focuses on gaining the human advantage and leadership as a dynamic of combat power (FM 3-0, 2022), developing leaders, and training, the most important thing the Army does to prepare for operations. Topics and chapters include Army leadership and the profession (ADP 7-0); developing leaders (FM 6-22); counseling, coaching, and mentoring (ATP 6-22.1); Army team building (ATP 6-22.6); training to fight and win (ADP 7-0 / FM 7-0 / FM 7-22); planning & preparation: training guidance, meetings, schedules, briefs; executing training events and exercises, holistic health & fitness (H2F); training evaluations, assessments, and after action reviews.
Combat power is the total means of destructive and disruptive force that a military unit/formation can apply against an enemy at a given time. It is the ability to fight.
Leadership is the most essential dynamic of combat power. Leadership is the activity of influencing people by providing purpose, direction, and motivation to accomplish the mission and improve the organization.
The human dimension encompasses people and the interaction between individuals and groups, how they understand information and events, make decisions, generate will, and act within an operational environment. A human advantage occurs when a force holds the initiative in terms of training, morale, perception, and will.
Today’s Army demands trained and ready units with agile, proficient leaders. Army leaders are the competitive advantage the Army possesses that neither technology nor advanced weaponry and platforms can replace. Developing leaders is a complex and complicated undertaking because it is primarily a human endeavor—requiring constant involvement, assessment, and refinement.
The Army relies on effective teams to perform tasks, achieve objectives, and accomplish missions. Building and maintaining teams that operate effectively is essential. Team building is a continuous process of enabling a group of people to reach their goals and improve their effectiveness through leadership and various exercises, activities, and techniques.
The Army trains to fight and win—it is what we do in order to preserve the peace and to decisively defeat our enemies. We do this through challenging, relevant, and realistic training performed to the highest standards. The Army trains the way it operates. It does this by replicating in training how we expect to fight,closing the gap between operations and training.
To do this, the Army trains by developing proficiencies in mission-essential tasks, weapon systems, and the effective integration and employment of both. These components of training readiness provide the backbone to the development of unit readiness—the Army’s first priority.
Related Books
Discount sets with this book
OPFOR SMARTbook 2 - North Korean Military
ISBN-10 :978-1-935886-55-6
Release Date :Aug 9th, 2022
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:316
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
North Korean Forces, Operations & Tactics
OPFOR2 topics and chapters include the strategic environment (intro to North Korea, capabilities & intent, framework for military operations), force structure (KPA: Ground Forces, Navy, Air & Air Defense Force, Strategic Force, Special Operations, Reserve and Paramilitary forces, Internal Security & Intel Services), functional tactics, reconnaissance & security, offensive and defensive actions (operational level divisions & regiments, tactical level, complex operational environments), counterstability actions, electronic intelligence warfare, equipment and capabilities.
North Korea is one of the most militarized countries in the world and remains a critical security challenge for the United States, our Northeast Asian allies, and the international community. The Kim regime has seen itself as free to take destabilizing actions to advance its political goals, including attacks on South Korea, development of nuclear weapons and ballistic missiles, proliferation of weapons, and cyberattacks against civilian infrastructure worldwide.
The Korean Peninsula is a location of strategic interest for the U.S. in the Indo-Pacific Command due to its proximity to China, South Korea’s historical relationship with the U.S. over the past 7 decades, and the booming South Korean economy that makes it an important U.S. trading partner. The Democratic People’s Republic of Korea, commonly known as North Korea or the DPRK, remains one of the United States’ most critical security challenges for many reasons. These include the country’s provocative and destabilizing behavior, such as unprovoked attacks on the Republic of Korea (South Korea; ROK); its pursuit of nuclear weapons and long-range ballistic missiles; and its willingness to proliferate weapons in contravention of international treaties. For over 50 years, North Korea has sporadically conducted operations directed against its foes, especially South Korea.
North Korea’s military poses two direct, overlapping challenges to the United States and its allies: a conventional force consisting mostly of artillery and infantry that can attack South Korea with little advance warning, and a ballistic missile arsenal, intended to be armed with nuclear weapons, that is capable of reaching bases and cities in South Korea and Japan, and the U.S. homeland.
North Korea’s conventional military consists of the ground, air, naval, and special operations forces. KPA Ground Forces operate thousands of long-range artillery and rocket systems along the entire length of the DMZ. These weapons include close-range mortars, guns, and multiple rocket launcher systems (MRLs) trained on South Korean military forces deployed north of Seoul, and longer-range self-propelled guns, rockets, and ballistic missiles that can reach Seoul and some points south of the capital. Collectively, this capability holds South Korean citizens and a large number of U.S. and South Korean military installations at risk. The North could use this capability to inflict severe damage and heavy casualties on the South with little warning.
Related Books
Discount sets with this book