FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-96 | 246 | Chapter 6
6-220. A lull in combat operations often accompanies a transition. The commander cannot forget about
stability operationsbecause the civilian populations of the unit’s area of operations tend to come outof their
hiding positions and request assistance from friendly forces during these lulls. The commander must consider
how to minimize civilian interference with the force’s combat operations while protecting civilians from
future hostile actions accordingto the law of war. The commander must also consider the threat enemy agents
or saboteurs pose when infiltrating or operating form within civilian populations. (See chapter 8.)
6-221. A commander anticipating the termination of unit offensive actions prepares orders that include the
time or circumstances under which the current offense transitions to the defense,the missions and locations
of subordinate units, and control measures. As the unit transitions from an offensive focus to a defensive
focus,the commander maintains contact with the enemy,using a combination information collectionassets
to develop the information required to plan future actions. The commander also establishes a security area
and local security measures.
TRANSITION TO THE CONDUCT OF STABILITY OPERATIONS
6-222. A transition to stability centric operations occurs for several reasons. A transition may occur from
an operation dominated by large-scale combat operations to one dominated by the consolidation of gains.
Transitions also occur with the delivery of essential services or retention of infrastructure needed for
reconstruction. An unexpected change in conditions may require commanders to direct an abrupt transition
between phases. In such cases, the overall composition of the force remains unchanged despite sudden
changes in mission,task organization,and rules of engagement. Typically,task organization evolves to meet
changing conditions;however,transition planning must account for changes in mission,also. Commanders
continuously assess the situation,task organize,and cycle their forces to retain the initiative. Commanders
strive to achieve changes in emphasis without incurring an operational pause.
6-223. Planning for operations focused on stability begins the moment the BCT receives the mission.
Coordinated early planning between the military and the interagency for post-conflict operations is vitally
important. When coordinated planning to transition responsibility from military to civilian entities does not
occur,the result is always the development of military and civilian parallel efforts,which seek to either secure
or develop the host nation. The end state of the offense is the eventual transfer of all security operations to
host nation control. Transferring security operations does not allow the commander to abdicate the role of
providing security for the host nation,facilities,or friendly units. The commandermust work in concert with
host-nation security forces to ensure a smooth transition to host nation control.
6-224. Building partner capacity is the outcome of comprehensive interorganizational activities,programs,
and engagements. Building partner capacity enhances security, rule of law, essential services, governance,
economic development,and other critical government functions. Army forces support host nation ownership
when planning and implementing capacity building as part of a comprehensive approach.
6-225. All actors involved in decisive action integrate with the operation from the onset of planning.
Together,they complete detailed analyses of the situation and operational environments,develop integrated
COAs, and continuously assess the situation. Integrating civilian and military efforts into a whole of
government approach has challenges. First,the efforts have differing capacities and differing perspectives.
Second,the two efforts use different approaches and decision-making processes.
6-226. A comprehensive approach integrates the cooperative efforts of the departments and agencies of the
U.S. Government,other unified action partners,and private sector entities to achieve unity of effort toward
a shared goal. A comprehensive approach builds from the cooperative spirit of unity of effort. Successful
operations use this approach,even forthose operations involving actors participating at their own discretion
or present in the operational area but not acting as a unified action partner member. Integration and
collaboration among actors with different agendas and experience is challenging. A comprehensive approach
achieves unity of effort to forge a shared understanding of a common goal. Mandates,experiences,structures,
and bureaucratic cultures make it difficult to sustain a comprehensive approach. Commanders overcome and
mitigate this challenge with extensive cooperation and coordination.
6-227. Five broad conditions provide the underpinnings for strategic, whole-of-government planning and
serve as a focal point for integrating operational andtactical level tasks. The end state conditions are flexible |
3-96 | 247 | Offense
and adaptive to support activities across the range of military operations but rely on concrete principles and
fundamentals in application. (See chapter 8.) End state conditions are—
(cid:122) A safe and secure environment.
(cid:122) Established rule of law.
(cid:122) Social well-being.
(cid:122) Stable governance.
(cid:122) A sustainable economy. |
3-96 | 249 | Chapter 7
Defense
The brigade combat team (BCT) conducts defensive operations to defeat enemy
attacks, gain time, control key terrain, protect critical infrastructure, secure the
population, and economize forces. Most importantly, the BCT sets conditions to
transition to the offense or operations focused on stability. Defensive operations alone
are not decisive unless combined with offensive operations to surprise the enemy,
attack enemy weaknesses, and pursue or exploit enemy vulnerabilities. This chapter
addresses the characteristics of the defense, common defensive planning
considerations, forms of the defense, defensive control measures, defensive operations,
and planning considerations when transitioning to other tactical operations.
SECTION I – CHARACTERISTICS OF THE DEFENSE
7-1. Successful defenses share the following characteristics: disruption, flexibility, maneuver, mass and
concentration, operations in depth, preparation, and security. Defenses are aggressive. Defending
commanders use all available means to disrupt enemy forces. Commanders disrupt attackers and isolate them
from mutual support to defeat them in detail. Defenders seek to increase their freedom of maneuver while
denying it to attackers. Defending commanders use every opportunity to transition to the offense, even if
only temporarily. As attackers’ losses increase, they falter, and the initiative shifts to the defenders. These
situations are favorable for counterattacks. Counterattack opportunities rarely last long. Defenders strike
swiftly when the attackers reach their decisive point. Surprise and speed enable counterattacking forces to
seize the initiative and overwhelm the attackers.
7-2. The Battle of Kasserine Pass,described below,is an example of neglecting the characteristics of the
defense. Prior to the Battle of Kasserine Pass,II Corps failed to adequately resource and prepare defensive
positions; ensure defensive positions could mass effects of direct and indirect fires; adequately include
flexibility,depth,and maneuver in planning,and conduct continuous reconnaissance and security operations
to provide early and accurate warning.
The Battle of Kasserine Pass
The Battle of Kasserine Pass,Tunisia in February 1943,served as a rude awakening for
the American Army in World War II. Over the course of the month,German Field Marshal
Erwin Rommel’s veteran Armeegruppe Afrika delivered a series of defeats to the relatively
inexperienced American II Corps under Major General Lloyd Fredendall. Kasserine Pass
was a tremendous blow to American pride and a loss of confidence in the eyes of II Corps’
British and French allies. However, lessons learned from the battle led to changes in
leadership,tactics,and training,resulting in a competent force in the African theater,as
well as more realistic and effective training in America. Kasserine Pass remains a bitterly
poignant example of the disasters that befall a force that neglects the characteristics of the
defense.
The Anglo-Americanadvance into Tunisia transitioned to a defense in December 1942 due
to poor weather and logistical challenges. Major General Fredendall’s II Corps was
tasked with reinforcing the French defenses around several mountain passes and a road
junction in southern Tunisia. Fredendall,headquartered some 70 miles from the forward
line of troops,personally directed the dispersion of his subordinate elements over a large
area of operations. Omar Bradleylater noted in A Soldier’s Storythat,“American Infantry
had been lumped on isolated [hills]…and mobile reserves were scattered in bits and pieces |
3-96 | 250 | Chapter 7
along the line.” Simultaneously, engineer assets needed for improving of defensive
positions were instead constructing a cavernous bunker for the corps command post.
Lack of cooperation with allied forces and inadequate reconnaissance and security
operations allowed German and Italian elements of Armeegruppe Afrika to achieve tactical
surprise at the onset and throughout the battle. During the following weeks, French and
American units routinely found themselves surprised by enemy contact,fighting from non-
mutuallysupporting positions,and unable to mass direct and indirect fires. German and
Italian forces, enjoying local air superiority as allowed by weather, rarely experienced
disruption at the hands of isolated and easily bypassed defensive positions. Retrograde
operations frequently degenerated into routes with significant losses of manpower and
equipment. Allied attempts to maneuver against Axis forces were poorly coordinated due
to failures to incorporate flexibility into the array of forces as well as command failures at
multiple echelons. Brigadier General Paul R. Robinette,commander of Combat Command
Aof the 1stArmored Division,would later record the Soldiers’observation that during this
battle “never were so few commanded by so many from so far away.”
The poor performance of the American Army left a bitter legacy for the American Soldier
that would haunt Anglo American relations in the theater. At the human level, II Corps
sustained approximately six thousand casualties during the February 1943 engagements
as well as the loss of 183 tanks,104half-tracks,208 artillery pieces,500 other vehicles,
and vast amounts of supplies. Conversely,Rommel’s forces sustained approximately 1000
casualties and a tenth of thematerial losses. (See figure 7-1.)
Various |
3-96 | 251 | Defense
Figure 7-1. Kasserine Pass and Sbiba Gap map
DISTRUPTION
7-3. The BCT must disrupt the tempo and synchronization of the enemy’s operation to counter the enemy’s
initiative,to prevent enemy from concentrating combat power against a part of the defense,and to force the
enemy to go where the commander wants the enemy to go. The commander achieves disruption by defeating
or misleading enemy reconnaissance forces, impeding maneuver, disrupting reserves, neutralizing fire
support, and interrupting command and control. Defensive techniques vary with circumstances, but all
defensive concepts of operation aimto spoil the attacker’s synchronization. Strong security forces to defeat
enemy reconnaissance,phony initial positions or dummy positions,and obstacles are some of the measures
used to increase BCT security in the defense.
7-4. The commander uses counterattack, counterbattery, and countermortar fires; spoiling attacks;
electromagnetic attacks (see chapter 4); obstacles; and retention of key or decisive terrain to prevent the
enemy from concentrating overwhelming strength against portions of the defense. Decisive terrain is key
terrain whose seizure and retention is mandatory for successful mission accomplishment (ADP 3-90). An
analysis of friendly force networks will inform the development of critical information and provide a basis
for establishing key terrain in cyberspace. Key terrain in the defense isthose physical and logical entities in
friendly force technical networks of such extraordinary importance that any disruption in their operation
would have debilitating effects upon accomplishment of the mission. |
3-96 | 252 | Chapter 7
FLEXIBILITY
7-5. The BCT commander uses detailed planning, sound preparation, operations in depth, retaining
reserves,and command and control to maintain flexibility. Flexibility requires the commander to visualize
the battlefield to detect the enemy’s scheme of maneuver in time to direct fire and movement against it. The
commander does not limit information collection efforts only to the forces in contact. The commander also
concentrates on formations arrayed in-depth. The enemy may try to bypass areas where the defense is strong.
Hence, the BCT commander ensures detection and the defeat of the enemy along all possible avenues of
approach. The commander uses aviation reconnaissance and surveillance assets and cyberspace and
electromagnetic warfare (EW) operations to support information collection. The BCT’s plan allows the
commander to shift the decisive operation or the main effort quickly, if the situation changes, while
maintaining synchronization. Inaddition,alternate and subsequent positions provide the flexibility needed to
execute the defense,effectively. Small reserves may position near critical terrain or likely avenues of attack
to enable rapid deployment to those areas. Blocking positions can be established to deny the enemy a chance
for a rapid breakthrough.
MANEUVER
7-6. Maneuver allows the commander to take full advantage of the area of operations and to mass and
concentrate resources where required. The BCT arrays and allocates forces in relationship to likely enemy
courses of action (COAs). The BCT uses allocations based on the results of the relative combat power
analysis of the BCT and enemy forces’assigned tasks and the terrain. The commander accepts risk along less
likely avenues of approach to ensure that adequate combat power is available for more likely avenues of
approach.
7-7. Maneuver also encompasses defensive actions such as security and support area operations. In some
cases, the commander must accept gaps within the defense, but must take measures to maintain security
within these risk areas. The BCT integrates assigned or attached and echelon above brigade enablers, for
example,surveillanceassets,reconnaissance and security forces,space and cyberspace capabilities,patrols
(dismounted and mounted),combat outpost,observation posts,sensor outposts,or listening posts.Additional
enablers include engineer reconnaissance teams,orchemical,biological,radiological,and nuclear (CBRN)
reconnaissance forces, observation outposts,forward observer or spotter outposts,or other economy of force
effort for these areas.
MASS AND CONCENTRATION
7-8. The BCT masses its combat power to overwhelm the enemy and regain the initiative. The commander
must be able to concentrate forces and mass the effects of fires at the decisive point and time. To accomplish
this, the commander may economize forces in some areas, retain a reserve, shift priority of fires, and
maneuver repeatedly to concentrate combat power. Commanders accept risks in some areas to concentrate
for decisive action elsewhere. Obstacles, security forces, and fires assist in reducing these risks as forces
economize.
7-9. Dependent on the operational framework, the commander designates a main effort to achieve
concentration, and directs all other elements and assets to support and sustain this effort. The commander
may reprioritize forces,designating a new main effort as the situation changes. The commander directs the
task and purpose of supporting elements to create the conditions necessary for the main effort to accomplish
its task and purpose. The commander narrows the width of subordinate areas of operations, focusing
counterattack plans to support the main effort;assigns the main effort unit priority of obstacle preparation;
gives the unit priority of indirect fire;and positions the reserve to influence the main effort’s area.
7-10. Targets determined during the BCT’s planning process and refined during preparation is described
broadly as physical and logical entities in cyberspace consisting of one or more networked devices used by
enemy and adversary actors. These targets may be established as named area of interests (NAIs) and target
areaof interests (TAIs) as appropriate. As part of cyberspace electromagnetic activities (CEMA),the division
staff,in coordination with the corps staff,performsa key role in target network node analysis (see chapter 2)
supporting the BCT’s cyberspace and EWeffort. |
3-96 | 253 | Defense
7-11. Concealment and deception must mask the concentrating forces since concentration increases the risk
level of large losses from enemy fires. The strategy is to concentrate the effects of the forces,not to physically
concentrate the forces themselves. Defending units use engagement areas (EAs) to concentrate combat power
from mutually supporting positions. Reconnaissance, surveillance, and security operations, organic and
nonorganic to the BCT, are vital to gaining the information and time needed to concentrate the forces and
fires of the BCT.
OPERATIONS IN DEPTH
7-12. Operations in deptharethe simultaneous application ofcombat power throughout an area of operations
(ADP 3-90). Integration of all combat power throughout the area of operations,as well as the BCT’s area of
influence and area of interest,improves the chances for success while minimizing friendly casualties. Quick,
violent,and simultaneous action throughout the depth of the BCT’s area of operations can hurt,confuse,and
even paralyze an enemy force when most exposed and vulnerable. Such actions weaken the enemy’s morale
and do not allow any early successesto build their confidence. Operations indepth prevent the enemy from
gaining momentum in the attack. Synchronization of actions within the division’s operational framework
facilitates mission success.
7-13. Alternate and supplementary positions, combat outposts,observation posts, and mutually supporting
strong points extend the depth of the defense. The commander plans fires throughout the defensive area up
to the maximum range of available weapons. Fire support units and observers move and reposition to
maintain contact with enemy forces and observe TAIsin-depth as the battle develops. The commander plans
for the emplacement of obstacles around critical locations to disrupt the enemy’s most dangerous and most
likely COAs.
PREPARATION
7-14. The commander must be familiar with the enemy’s abilities and limitations to prepare the defense
properly. The enemy’s abilities and limitations include their organization, offensive doctrine (tactics,
techniques, and procedures), weapons systems, and equipment. Collection means (reconnaissance,
surveillance, security operations, and intelligence operations) inform the commander and staff to enable
understanding and multiply the effectiveness of the defense.
7-15. The commander analyzes the terrain in detail from all perspectives and then verifies on the ground to
select EAsand positions that allow for the massing of fires and the concentration of forces on likely enemy
avenues of approach. Emphasis is on preparing and concealing positions,routes,obstacles,logistical support,
and command and control facilities and networks. The commander plans,coordinates,and prepares military
deceptions and uses rehearsals to ensure staffs and subordinates understand the concept of operations and
commander’s intent.
7-16. During preparation,aerial (manned and unmanned) reconnaissance and surveillance collection efforts
(internal and external to the BCT) complement ground efforts by increasing speed and depth with which
reconnaissance can be conducted over an area. Ground reconnaissance and security forces employ, and
supplies are pre-positioned. Counterattack plans to support the defense and to place the BCT on the offense
are key to retaining the initiative. Counterattack routes must be reconnoitered, improved, secured, and
rehearsed. Defensive preparations within the main battle area (MBA) continue in-depth even as close
engagement begins.
SECURITY
7-17. The BCT commander establishes security areas forward of the MBA, on the flanks, and within the
BCT’s support area to protect the force while in the defense. Security operations forward of the MBA
normally include screen, guard, and cover. The presence of a security force forward of the MBA does not
relieve the MBA units from their own security responsibilities (area security and local security tasks). All
units must maintain security,for example civil reconnaissance and security patrolling,within assigned areas
and contribute to counterreconnaissance. |
3-96 | 254 | Chapter 7
7-18. The BCT may defend to conserve combat power for use elsewhere at a later time. The commander
secures the force through integrated security operations throughout the depth and breadth of its assigned area
of operations. Long-range reconnaissance and surveillance assets task organized at the division and corps
level conduct information collection to define and confirm the enemy at extended ranges and in time and
manner. The commander plans for and employs information-related capabilities and CEMA to confuse the
enemy as to the BCT’s manner of defense and to aid in securing the force.
SECTION II – COMMON DEFENSIVE PLANNING CONSIDERATIONS
7-19. The commander in the defense exploits prepared, mutually supporting positions even though the
initiative is yielded to the enemy. The commander uses knowledge of the terrain to slow the enemy’s
momentum. The defending force maintains its security and disrupts the enemy’s attack at every opportunity.
The defending commander uses long-range fires to reduce the force of the enemy’s initial blow,hinder enemy
offensive preparations and wrest the initiative from the enemy. The commander draws the enemy into EAs
to surprise the enemy with concentrated and integrated fires from concealed and protected positions. The
commander then counterattacks the enemy, repeatedly imposing blows from unexpected directions. The
following discussion uses the warfighting functions (command and control, movement and maneuver,
intelligence,fires,sustainment,and protection) and specific operational environments as the framework for
planning considerations that apply to defensive operations.
COMMAND AND CONTROL
7-20. The BCT commander understands,visualizes,and describes the anticipated enemy actions and issues
commander’s guidance to the staff. Based upon the commander’s guidance, the staff refines the higher
headquarters’ products to enable the BCT commander to visualize the operational environment. The BCT
commander and staff refine the higher headquarters’intelligence preparation of the battlefield (IPB) products
to focus on the details of the operation in the BCT’s area of operations. The higher commander normally
defines where and how the BCT defeats or destroys the enemy and the operational framework. The BCT
commander defines (envisions) the BCT’sexecutions of its portion of the higher (division and corps) echelon
fight.As each decision is made and each action is taken in the presence of risk and uncertainty,commanders
must anticipate and prevent or mitigate risk,including ethical risks,to support mission accomplishment.
DEFEAT THE ENEMY
7-21. The BCT commander and staff analyze how and where to defeat the enemy. The BCT commander
may define a defeat mechanism that includes use of single or multiple counterattacks to achieve success.
Subordinate commanders and staffs analyze their unit’s role in the fight and determine how to achieve
success. In an area defense,usually the BCT achieves success by massing the effects of obstacles and fires
to defeat the enemy forward of a designated area,often in conjunction with a higher echelon’s counterattack.
In a delay operation, the BCT achieves success by combining maneuver, fire support, obstacles, and the
avoidance of decisive engagement until conditions are right to gain time or shape the battlefield for a higher
echelon’s counterattack.
ORGANIZE THE DEFENSE
7-22. The BCT commander organizes in the defense to facilitate the execution of a defensive operation. The
commander and staff use an operational framework, and associated vocabulary, to help conceptualize and
describe the concept of operations in time,space,purpose,and resources (see figure 2-3onpage 2-24). An
operational framework is a cognitive tool used to assist commanders and staffs in clearly visualizing and
describing the application of combat power in time,space,purpose,and resources in the concept of operations
(see chapter 2). An operational framework establishes an area of geographic and operational responsibility
for the commander and provides a way to visualize how the commander will employ forces against the
enemy. To understand this framework is to understand the relationship between the area of operations and
operations in depth. Proper relationships allow for simultaneous operations and massing of effects against
the enemy. (SeeFM 3-0 for additional information.) |
3-96 | 255 | Defense
7-23. As stated in chapter 2,the operational framework has four components. First,theBCT commander is
assigned an area of operations for the conduct of operations. Second, the commander can designate deep,
close,rear,and support areas to describe the physical arrangement of forces in time and space. Third,within
this area,the commander conducts decisive,shaping,and sustaining operations to articulate the operation in
terms of purpose. Finally,the commander designates the main and supporting efforts to designate the shifting
prioritization of resources.
Note. The BCT does not conduct operationally significant consolidate gains activities unless
tasked to do so,usually within a division consolidation area.
7-24. As an example,deep,close, and rear areas historically have been associated with terrain orientation,
but this framework can apply to temporal and organizational orientations as well. The BCT can use the deep,
close,and reararea component to engage simultaneously the enemy in three distinct areas—deep area,close
area,and reararea. (See figure 7-2.)
Figure 7-2. Deep, close, and rear areas—contiguous area of operations |
3-96 | 256 | Chapter 7
7-25. Deep area is the portion of the commander’s area of operations that is not assigned to subordinate units.
Within this area, the BCT commander conducts deep operations against uncommitted enemy forces to set
conditions for subordinate commanders conducting operations in the close area. In noncontiguous areas of
operations,the deep area is the area between noncontiguous areas of operations or beyond contiguous areas
of operations.
7-26. Close area is the portion of a commander’s area of operations assigned to subordinate maneuver forces.
Operations in the close area are operations within a subordinate commander’s area of operations. In
contiguous areas of operations,a close area assigned to a maneuver force extends from its subordinates’rear
boundaries to its own forward boundary. In noncontiguous areas of operations, the close area is the area
within the subordinate commanders’areas of operations.
7-27. Rear area is the portion of the commander’s area of operations that is designated to facilitate the
positioning,employment,and protection of assets required to sustain,enable,and control operations. A rear
area in contiguous areasof operations is an area for any command that extends from its rear boundary forward
to the rear boundary of the next lower level of command. In noncontiguous areas of operations,the reararea
is that area defined within the higher commander’s area of operations providing a location to base sustainment
assets and provide sustainment to the force. A support area(s), generally located within the rear area,
facilitates the positioning,employment,protection,and control of base sustainment assets required to sustain
and enable combat operations (see chapter 9).
Note. Corps and division commanders may establish a consolidation area to exploit tactical
success while enabling freedom of action for forces operating in the other areas. When designated,
a consolidation area refers to anarea of operations assigned to an organization,generally a BCT
or task force,where forces have established a level of control and large-scale combat operations
have ceased. Consolidation area activities require a balancing of area security and stability
operations tasks. (See chapter 2,section IVfor a detailed discussion.)
TASKSASSIGNMENT
7-28. The BCT commander assigns tasks to subordinate units through the staff. The assignment of a task
includes not only the task (what), but also the unit (who), place (where), time (when), and purpose (why).
The commander and staff develop obstacle fire support plans concurrently with the defensive force array,
again defining a task and purpose for each obstacle and target in keeping with the commander’s stated fire
support tasks and intended obstacle effects. The desired end state is a plan that defines how the commander
intends to mass the effects of direct and indirect fires with obstacles and use of terrain to shape the battlefield
and defeat or destroy the enemy.
CONTROL MEASURES
7-29. The BCT plans control measures to provide the flexibility needed to respond to changes in the situation
and allow the BCT to concentrate combat power at the decisive point. Defensive control measures within the
BCTs area of operations include designating the security area, the battle handover line, the MBA with its
associated forward edge of the battle area,and the echelon support area. The BCT and subordinate units use
battle positions (primary,alternate,supplemental,subsequent,and strong point),direct fire control,and fire
support coordination measures to conductdefensive operations. The commander designates disengagement
lines to trigger the displacement of subordinate forces when required. A disengagement lineis a phase line
located on identifiable terrain that,when crossed by the enemy,signals to defending elements that it is time
to displace to their next position (ADP 3-90). (See paragraph 7-94 for a discussion of control measures
associated with defensive operations.)
MOVEMENT AND MANEUVER
7-30. The BCT can conduct defensive operations with units out of range andin mutual support of each other.
Defensive operations with out of range units require a judicious effort by the BCT commander and staff to
determine the positioning and priority of support assets and capabilities. During the terrain analysis, the |
3-96 | 257 | Defense
commander and staff must look closely for key and decisive terrain,EAs,choke points,intervisibility lines,
and reverse slope opportunities to take full advantage of the BCT’s capabilities to mass firepower to support
defensive maneuvers.
7-31. The BCT commander must determine any potential gaps between units once maneuver units are
assigned area of operations. The BCT should plan to cover any gaps with reconnaissance and security forces
and surveillance assets. The BCT must plan local counterattacks to isolate and destroy any enemy that
penetrates a gap in the area of operations. The commander should alsoplan to reposition units not in contact
to mass the effects of combat power against an attacking enemy.
7-32. The BCT commander identifies EAs(see paragraph 7-130) to contain or destroy the enemy force with
the massed effect of all available weapons and supporting systems with the assignment of area of operations.
The commander determines the size and shape of the EA by the visibility of the weapons systems in their
firing positions and the maximum range of those weapons. The commander designates EAs to cover each
enemy avenue of approach into the area of operations. Elements,deliberately left behind or inserted through
infiltration or helicopter,can report and call in fires on an approaching enemy.
7-33. The BCT combines fires,defensive positions,countermobility obstacles,and counterattacks to disrupt
the enemy’s attack and break the enemy’s will. The BCT must disrupt the synchronization of the enemy’s
operation to counter the enemy’s initiative,prevent the enemy’s concentrating combat power against a part
ofthe defense,and force the enemy where the commander wants the enemy to go. The commander causes
disruption defeating or misleading the enemy’s reconnaissance forces, impeding maneuver, disrupting
reserve,neutralizing fire support,and interrupting command and control.
7-34. Defensive techniques vary with circumstances,but all defensive concepts of operation aim to spoil the
attacker’s synchronization. Strong security forces to defeat enemy reconnaissance,phony initial positions or
dummy positions, and obstacles are some of the measures used to increase security in the defense.
Repositioning forces, aggressive local protection measures, and employment of roadblocks and ambushes
combine to disrupt the threat of an attack. Counterattack,counterbattery fires,obstacles,and retention of key
or decisive terrain prevent the enemy from concentrating overwhelming strength against portions of the
defense.
7-35. The information environment supports the commander’s mission and desired end state using
information-related capabilities, techniques, or activities. These capabilities include, but are not limited to,
public affairs operations, psychological operations (PSYOP), combat camera, Soldier and leader
engagement,civil affairs operations,civil and cultural considerations,operations security,military deception,
and CEMA. CEMA (see chapter 4) at the BCT level include cyberspace operations, EW, and spectrum
management operations. (SeeFM 3-13 and FM 3-12 for additional information.)
7-36. The BCT commander considers mutual support when task organizing forces, assigning areas of
operations, and positioning units. Mutual support is that support which units render each other against an
enemy, because of their assigned tasks, their position relative to each other and to the enemy, and their
inherent capabilities. Mutual support has two aspects—supporting range and supporting distance.
7-37. Supporting range is the distance one unit may be geographically separated from a second unit yet
remain within the maximum range of the second unit’s weapons systems. Mutual support exists when
positions and units are in supporting range by direct or indirect fires, thus preventing the enemy from
attacking one position without subjecting themselves to fire from one or more adjacent positions. Supporting
distance is the distance between two units that can be traveled in time for one to come to the aid of the other
and prevent its defeat by an enemy or ensure it retainscontrol of a civil situation. When friendly forces are
static,supporting range equals supporting distance.
7-38. Mutual support increases the strength of all defensive positions, prevents defeat in detail, and helps
prevent infiltration between positions. Tactical positions achieve the maximum degree of mutual support
between them when they are located to observe or monitor the ground between them or conduct patrols to
prevent any enemy infiltration. At night or during periods of limited visibility,the commander may position
small tactical units closer together to retain the advantages of mutual support. Unit leaders must coordinate
the nature and extent of their mutual support. |
3-96 | 258 | Chapter 7
7-39. Capabilities of supported and supporting units affect supporting distance. Units may be within
supporting distance,but if the supported unit cannot communicate with the supporting unit, the supporting
unit may not be able to affect the operation’s outcome. In such cases, the units are not within supporting
distance,regardless of their proximity to each other. The following factors affect supporting distance: terrain
and mobility, distance, enemy capabilities, friendly capabilities, and reaction time. (See ADP 3-0 for
additional information.)
7-40. The need for flexibility through mobility requires the use of graphic control measures to assist
command and control during counterattacks and repositioning of forces. Specified routes,phase lines(PLs),
attack-and support by fire positions, battle positions, EAs, target reference points (TRPs), and other fire
support coordinationmeasures are required to synchronize maneuver effectively.
7-41. Army aviation conducts offensive operations to support the maneuver commander’s defensive
operation. Manned and unmanned aircraft can provide reconnaissance,surveillance,and security for ground
forces. Aviation quick response force can respond to a counterattack during the maneuver commander’s
transition from offensive to defensive operations, allowing ground forces to focus on consolidation and
reorganization. Additionally, once in an established defensive position, aviation assets can conduct
information collection and delay advancing enemy forces. Aviation allows the maneuver commander to mass
reserves by air to reinforce a defensive position. Additional aviation considerations include—
(cid:122) Conduct reconnaissance to identify bypasses, adequate sites and routes, and provide overwatch
for security force operations.
(cid:122) Provide direct fires or call for fires to cover obstacles.
(cid:122) Provide security and early warning for ground movement, assembly areas, and fixed base
operations.
(cid:122) Transport air defense teams,CBRN teams,and supplies.
(cid:122) Conduct aerial surveys of known or suspected CBRN contaminated areas.
(cid:122) Provide information collection for targeting.
7-42. The speed and mobility of aviation can help maximize concentration and flexibility. Attack
reconnaissance helicopters routinely support security area operations and mass fires within the MBA.
Synchronization and integration of aviation assets into the defensive ground maneuver plan is important to
ensure engagement as a whole. If the BCT augments with aviation assets, it must involve the direct fire
planning processes of the supporting aviation unit through its aviation liaison officer,the air defense airspace
management (ADAM) element,and brigade aviation element (BAE) within the fire support cell.
7-43. Air assets provide direct fire,observation,and the rapid movement of supplies and personnel during
the conduct of the defense. Attack reconnaissance helicopters and fixed-wing aircraft can employ guided and
unguided munitions that provide Army aviation attack and close air support to ground forces in direct contact
with enemy elements. Through reconnaissance, intelligence, surveillance, and target acquisition planning
(see FM 3-09), these assets can conduct interdiction missions to destroy high-value targets (HVTs) and
high-payoff targets (HPTs) before their employment to shape the operation. Attack reconnaissance
helicopters can assist the BCT reserve in exploiting opportunities to attack an enemy weakness or to support
restructuring of friendly lines in the event of enemy penetration. Rotary and fixed-wing aircraft can provide
additional observation and control indirect fires directed at enemy formations prior to contact with the BCT
defense and enhance situational awareness for the commander and staff. Utility and cargo rotary-wing aircraft
can provide casualty evacuation (see ATP 4-25.13) and conduct emergency resupply operations depending
on the enemy’s air defense capabilities.
7-44. The ground commanderis responsible for the priority,effects,and timing of fires and maneuver within
their area of operations (see JP 3-09). Air-ground operations require detailed planning and synchronization
timelines, aviation tasks and purposes, and airspace control. Analysis of enemy COAs and timelines allow
the BCT staff to synchronize aircraft operational times to match expected enemy contact. Security forces
forward of the BCT MBAassist in synchronizing aircraft employment at the decisive point.
7-45. Development of detailed task and purpose for the supporting aviation is essential as it enables the
aviation commander andstaff to employ the right platforms and munitions. Understanding the threat and the
BCT commander’s desired aviation effects drives the aviation units’ task organization of air elements and
selection ofweapon systems. (SeeFM 3-04 for additional information.) |
3-96 | 259 | Defense
7-46. Effective division airspace control is contingent on the development of a unit airspace plan that
includes subordinate BCT airspace coordinating measures that synchronize airspace users and activities
supporting the BCT. Airspace control is essential for deconflicting manned and unmanned aircraft from
indirect fires. Properly developed airspace coordinating measures enable the BCT to mass aerial and
surface-based fires simultaneously while using unmanned assets to maintain surveillance. (See JP 3-52,
FM3-52,and ATP3-52.1for additional information on airspace control and ATP 3-91.1 for information on
thejoint air-ground integration center [JAGIC].)
7-47. During the conduct of defensive operations,situations requiring denial operations,defending encircled,
andstay-behind operations have their own unique planning,preparation,and execution considerations. In the
defense, denial operations conducted to deprive the enemy of some or all of the short-term benefits of
capturing an area may be required. Denying the enemy, the use of space, personnel, supplies, or facilities
may include destroying, removing, and contaminating those supplies and facilities or erecting obstacles.
Subordinate units of the BCT when encircled can continue to defend, conduct a breakout—an operation
conducted by an encircled force to regain freedom of movement or contact with friendly units (ADP 3-90)—
from encirclement,exfiltrate toward other friendly forces,or attack deeper into enemy-controlled territory.
In other defensive situations,subordinate units may be directed to conduct operations as a stay behind force.
These actions may be planned or forced by the enemy.
7-48. A common additional action planned or forced by the enemy can include a relief in place. A relief in
placeis an operation in which,by direction of higher authority,all or part of a unit is replaced in an area by
the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of
operations are transferred to the incoming unit (JP 3-07.3).
Note.The Army uses an area of operations instead of a zone of operations.
7-49. The BCT normally conducts a relief in place as part of a larger operation, primarily to maintain the
combat effectiveness of committed forces. The higher headquarters directs when and where to conduct the
relief and establishes the appropriate control measures. Normally,during the conduct of combat operations,
the unit relieved is defending. However,a relief in place may set the stage for resuming offensive operations
or serve to free the relieved unit for other tasks.
7-50. There are three types of relief in place operations:
(cid:122) A sequential relief in place occurs when each element within the relieved unit is relieved in
succession,from right to left or left to right,depending on how it is deployed (ADP 3-90).
(cid:122) Asimultaneous relief in placeoccurs when all elements are relieved at the same time (ADP 3-90).
(cid:122) A staggered relief in place occurs when a commander relieves each element in a sequence
determined by the tactical situation,not its geographical orientation (ADP 3-90).
INTELLIGENCE
7-51. IPB helps the BCT commander determine where to concentrate combat power,where to accept risk,
and where to plan the potential decisive operation. The staff integrates intelligence from the higher echelon’s
collection efforts (see chapter 5,section I) and from units operating forward of the BCT’s area of operations.
Information collection includes collection from spot reports, tactical unmanned aircraft systems (known as
TUASs),and other higher-levelcollection assets. Early warning of enemy air attack,airborne or helicopter
assault or insertion, and dismounted infiltration are vitally important to provide adequate reaction time to
counter these threats as far forward as possible. The essential areas of focus are terrain analysis,determination
of enemy force size and likely COAs with associated decision points, and determination of enemy
vulnerabilities.
7-52. Intelligence operations,conducted by the military intelligence company,collect information about the
intent, activities, and capabilities of threats and relevant aspects of the operational environment to support
commanders’ decision-making (see chapter 5, section IV). The commander uses intelligence products to
identify probable enemy objectives and approaches and develops NAIs and TAIs from probable objectives
and approaches. The commander studies the enemy operation patterns and the enemy’s vulnerability to |
3-96 | 260 | Chapter 7
counterattack, interdiction, EW, air attacks, and canalization by obstacles. The commander examines the
enemy’s ability to conduct air attacks, insert forces behind friendly units,and employs nuclear, biological,
and chemical weapons and determines how soon follow-on or reaction enemy forces can influence the
operation.
7-53. The commander and staff use available reconnaissance and engineer assets to study the terrain. By
studying the terrain,the commander tries to determine the principal enemy and friendly heavy,light,and air
avenues of approach. The commander assesses the most advantageous area for the enemy’s main attack,as
well as other military aspects of terrain to include observation and fields of fire, avenues of approach, key
terrain,obstacles,and cover and concealment (OAKOC). The BCT commander and staff assess ground and
air mobility corridors and avenues of approach to determine where the enemy can maneuver to reach likely
objectives and to identify limitations on friendly maneuver and positioning. Identification of terrain,such as
chokepoints that create potential enemy vulnerabilities and opportunities for friendly attack,is critical. (See
ATP 2-01.3 and ATP 3-34.80 for additional information.)
7-54. The BCT S-2, with the BCT geospatial engineer uses the Geospatial Intelligence Workstation to
provide terrain analysis. The Geospatial Intelligence Workstation can identify critical terrain and position
weapons systems and intelligence assets (see ATP 3-34.80). Once subordinate units know the area of
operations,BCT units conduct their own terrain analysis using physical reconnaissance and the lineofsight
analysis function in Joint Capabilities Release(known as JCR). Terrain analysis must achieve a fidelity that
allows for effective positioning of direct fire weapons systems and observers. The analysis must identify
intervisibility lines,fields of fire,deadspaces,and integrate the effects of weather.
7-55. The staff weather officer, or higher headquarters staff if a staff weather officer is not assigned, can
assist the BCT staff by supplying predictive and descriptive weather information for specific time periods
and locations within the BCT’s area of operations. In addition,the weather program of record (for example,
the Distributed Common Ground System-Army [DCGS-A]) can provide weather predictions and weather
effects for a specific mission,desired area of operations,or particular weapons system.
7-56. The result of the terrain analysis is a modified, combined obstacle overlay and identification of
defensible areas. The BCT staff should transmit results of the analysis by any available meansto subordinate
units. When the staff has analyzed the BCT’s assigned area of operations,the staff should expand its analysis
to adjacent area of operations and areas forward and to the rear of the BCT.
7-57. The staff determines enemy force sizes,likely COAs,and decision points through analysis. The staff
determines the size of the enemy force that each avenue of approach and mobility corridor can support. The
expected size of the enemy force drives the determination of friendly force allocation, fires, and obstacle
efforts. The commander and staff use the enemy force’s size to understand how the enemy intends to utilize
its forces and the terrain. The enemy COAs developed must be feasible and must reflect the enemy’s
flexibility and true potential. All COAs,at a minimum,should analyze the following:
(cid:122) Likely enemy objectives.
(cid:122) Enemy composition,disposition,and strength.
(cid:122) Schemes of maneuver including—
(cid:131) Routes.
(cid:131) Formations.
(cid:131) Locations and times the enemy may change formations.
(cid:131) Possible maneuver options available to the enemy.
(cid:131) Key decision points.
(cid:122) Time and distance factors for the enemy’s maneuver through the area of operations.
(cid:122) Likely employment of all enemy combat multipliers including—
(cid:131) Artillery.
(cid:131) Air defense.
(cid:131) Obstacles.
(cid:131) CBRNstrikes.
(cid:131) Dynamic obstacles. |
3-96 | 261 | Defense
(cid:131) Attack aircraft.
(cid:122) Likely use of all enemy reconnaissance assets and organizations including likely reconnaissance
objectives,reconnaissance avenues of approach,and times to expect enemy reconnaissance,based
on doctrinal rates of march.
(cid:122) Likely use of all reconnaissance assets to locate observer locations and observation posts.
(cid:122) Likely locations and identification of enemy HVTs—such as artillery formations, reserves, and
command and control.
(cid:122) Likely locations, compositions, strength, employment options, and time and distance factors for
enemy reserves and follow-on forces.
(cid:122) Locations of enemy decision points that determine selection of a specific COA.
(cid:122) Likely breach sites,strike areas,and points of penetration.
7-58. The intelligence staff develops the enemy COAstatement and sketch. The staff graphically depicts the
enemy on a situation template based upon the results of the IPB. The intelligence staff officer (S-2)and staff
use these items to develop the initial information collection plan. The intelligence staff should distribute all
products by any available means to the entire staff and subordinate units to support parallel planning. (See
ATP 2-01.3 for additional information.)
7-59. The intelligence staff observes the enemy’s tactics, the terrain, the weather, and friendly and enemy
capabilities to identify potential enemy vulnerabilities. To engage the enemy where the terrain puts the enemy
at a disadvantage,the staff identifies restrictive terrain that may slow the enemy’s attack,cause a separation
of forces,create difficulties in command and control,or force the enemy to conduct defile drills;for example,
narrow valleys,passes,or urban areas. The intelligence staff also identifies chokepoints or natural obstacles
that may cause a loss of momentum,a potential fragmenting of forces,or a vulnerable concentration of forces
(rivers and canals). The staff identifies terrain that canalizes enemy formations into areas that provide
defending forces with good fields of fire,observation,and flanking fires. The intelligence staff also identifies
areas dominated by key or defensible terrain that allows massing of fires.
7-60. The entire BCT staff must participate for IPB to develop successfully for the commander and
subordinate units. Each staff member is responsible for analyzing the enemy based upon their warfighting
function. Each staff member must be knowledgeable in friendly and enemy capabilities and terrain analysis.
Each staff member must execute the process rapidly. The staff must ensure the results are detailed,legible,
and disseminated quickly to support planning at all echelons.
7-61. The intelligence officer, supported by the entire BCT staff, provides the fire support officer and
information operations officer information and intelligence for targeting and information capabilities. The
intelligence officer supports targeting by providing accurate,current intelligence and information to the staff
and ensures the information collection plan supports the finalized targeting plan. Intelligence support to
targeting includes two tasks—providing intelligence support to target development and providing
intelligence support to target detection. Intelligence support to information capabilities provides the
commander with information and intelligence support for information tasks and targeting through nonlethal
actions. It includes intelligence support to the planning,preparation,and execution of the information related
activities, as well as assessing the effects of those activities. (See FM 2-0 and FM 3-13 for additional
information.)
FIRES
7-62. Supporting the BCT commander’s concept of operations during the defense involves attacking and
engaging targets throughout the area of operations with massed or precision indirect fires, air and missile
defense fires, defensive counterair, air support, and EW assets. As planning progresses, artillery
counterbattery radar and counterfire radar employment is continually updated. Fire support planners must
make maximum use of any preparation time available to plan and coordinate supporting fires. Planners must
ensure fire support complements and supports all security forces and unit protection plans.
7-63. Fire support plays a key role in disrupting the attacker’s tempo and synchronization during the defense.
When required, massing overwhelming fires at critical places and times gains maximum efficiency and
effectiveness in suppressing direct and indirect-fire systems and repelling an assault. Fire support planning |
3-96 | 262 | Chapter 7
and execution must address flexibility through operations in depth and support to defensive maneuver.
Additional fire support considerations for supporting the commander’s concept of operations include—
(cid:122) Weight the main effort.
(cid:122) Provide 360-degree air and missile defense coverage.
(cid:122) Provide and disseminate early warning.
(cid:122) Contribute targeting information.
(cid:122) Engage critical enemy assets with fires before the attack.
(cid:122) Plan counterfire against enemy indirect-fire systems attacking critical friendly elements.
(cid:122) Use lethal and nonlethal means to apply constant pressure to the enemy’s command and control
structure.
(cid:122) Provide fires to support defensive counterair operations to defeat enemy attacks.
(cid:122) Plan the acquisition and attack of HPTsthroughout the area of operations.
(cid:122) Employ electromagneticattack to degrade,neutralize,or destroy enemy combat capability.
(cid:122) Concentrate fires to support decisive action.
(cid:122) Provide fires to support counterattacks.
(cid:122) Plan fires to support the barrier and obstacle plan.
(cid:122) Planfor target acquisition and sensors to provide coverage of NAIs,TAIs,and critical assets.
(cid:122) Plan for friendly force and allied force fratricide prevention measures.
(cid:122) Plan for civilian noncombatant casualty prevention measures.
(cid:122) Plan for un-intended collateral damage prevention measures.
(cid:122) Request munitions authorities to ensure appropriate units on the ground have the operational and
legal authority to employ munitions such as scatterable mine systems (air and ground volcanos).
7-64. The BCT may utilize unmanned aircraft systems (UASs), remote sensors, and reconnaissance and
security forces to call for fire on the enemy throughout the area of operations. Quick, violent, and
simultaneous action throughout the depth of the defender’s area of operations can degrade, confuse, and
paralyze an enemy force just as that enemy force is most exposed and vulnerable. (See FM 3-09 and
FM3-90-1 for additional information.)
SUSTAINMENT
7-65. Typically, sustaining operations in support of the defense requires more centralized control. Clear
priorities of support, transportation, and maintenance are required. The BCT closely and continuously
coordinates, controls, and monitors the movement of materiel and personnel within the operational
environment based on the BCT’s priorities and ensures their dissemination and enforcement. (See FM4-0
for additional information.)
7-66. The routing function of movement control becomes an essential process for coordinating and directing
movements on main supply routes or alternate supply routes and regulating movement on lines of
communications to prevent conflict and congestion. Movement priorities must include throughput of
echelons above brigade assets transporting additional engineer assets in preparation for the defense. Supply
ofclass IV (construction and barrier materials) and class V (ammunition) normally have higher movement
priorities during the defense. Planners may consider nighttime resupply operations to minimize enemy
interference. (SeeATP 4-16 for additional information.)
7-67. TheBCT logistics staff officer (S-4) must ensure that the sustainment plan is coordinated fully with
the rest of the staff. The S-4 coordinates with the brigade operations staff officer (S-3) to ensure that supply
routes do not interfere with maneuver or obstacle plans but still support the full depth of the defense.
Sustainment planners must consider prepositioning class IV,class V,and class III (bulk) far forward initially
to support the security area during the counterreconnaissance fight,followed by the MBA so that the BCT
can rapidly transition from defense to offense. Planning for sustainment operations throughout the security
area is critical to sustaining reconnaissance and security operations to prevent enemy forces from determining
friendly force disposition. Forces within the security area are configured prior to line of departure with a
minimum of 72 hour logistics package (LOGPAC) of class I (subsistence), class III (petroleum, oils, and |
3-96 | 263 | Defense
lubricants [POL]), and class V. Sustainment support to the security area must include planning for both
ground and aerial medical evacuation of long duration observation posts. BCT sustainment planners also
consider cross leveling classes of supply and sustainment assets upon transition from the offense to the
defense.
7-68. Enemy actions and the maneuver of combat forces complicate forward area medical operations.
Defensive operations must include health service support to medical personnel who have much less time to
reach a patient,apply tactical combat casualty care (TCCC),and remove the patient from the battlefield. The
enemy’s initial attack and the BCT’s counterattack produce the heaviest patient workload. These are also the
most likely times for enemy use of artillery and CBRN weapons. The enemy attack can disrupt ground and
air routes and delay evacuation of patients to and from treatment elements. The depth and dispersion of the
defense create significant time distance problems for medical evacuation assets. (For additional information
on the tactics,techniques,and procedures associated with health service support,see FM 4-02,ATP 4-02.2,
and ATP 4-02.3.)
PROTECTION
7-69. The BCT must take measures to protect against all acts designed to impair its effectiveness and prevent
the enemy from gaining an unexpected advantage. Because a force defends to conserve combat power for
use elsewhere or later, the commander must secure the force. The BCT ensures security by employing
security forces and surveillance assets throughout the depth and breadth of its assigned area of operations.
The BCT may employ counterreconnaissance,combat outposts,a screen or guard force,and other security
operations tasks to provide this security. Information related capabilities and CEMA aid in securing the force
and confuse the enemy as to the manner of defense.
7-70. As discussed in chapter 6, personnel and physical assets have inherent survivability—a quality or
capability of military forces which permits them to avoid or withstand hostile actions or environmental
conditions while retaining the ability to fulfill their primary mission (ATP 3-37.34),which can be enhanced
through various means and methods. One way to enhance survivability when existing terrain features offer
insufficient cover—protection from the effects of fires and concealment—protection from observation
or surveillance is to alter the physical environment to provide or improve cover and concealment. Similarly,
natural or artificial materials may be used as camouflage to confuse,mislead,or evade the enemy. Together,
these are called survivability operations—those protectionactivities that alter the physical environment by
providingor improvingcover,camouflage, and concealment (ATP 3-37.34).
7-71. All BCT units conduct survivability operations within the limits of their capabilities. Engineer and fire
support assets have additional capabilities to support survivability operations. Engineer support to
survivability operations is a major portion of the enhance protection line of engineer support (see FM 3-34).
Fire support to survivability operations includes the employment of obscurants, which forces can use to
enable survivability operations by concealing friendly positions and screening maneuvering forces from
enemy observation and support to disengagement or movement of forces. (See ATP 3-11.50.)
7-72. CBRN support to survivability operations includes the ability to assess,protect and mitigate the effects
of contamination. CBRN reconnaissance provides support by locating and marking contaminated areas and
routes,allowing maneuver forces to avoid unnecessary exposure. Reconnaissance teams are focused on the
collection of tactical and technical information to support survivability of friendly forces and facilities.
7-73. Although survivability encompasses capabilities of military forces both while on the move and when
stationary, survivability operations focus more on stationary capabilities—constructing fighting and
protective positions and hardening facilities. In the case of camouflage and concealment, however,
survivability operations include both stationary and on-the-move capabilities. Conducting survivability
operations is one of the tasks of the protection warfighting function, but forces can also use survivability
operations to enable other warfighting functions. For example,military deception,part of the command and
control warfighting function,can be enabled by the use of survivability operations intended to help mislead
enemy decision makers. This may include the use of dummy or decoy positions or devices. (SeeFM3-13 for
additional information.)
7-74. Ground-based air defense artillery units execute most Army air and missile defense operations though
air and missile defense support to the BCT may be limited. Subordinate units of the BCT should expect to |
3-96 | 264 | Chapter 7
use their organic weapons systems for self-defenseagainst enemy air threats. When available air and missile
defense protects the BCT from missile attack,air attack,and aerial surveillance by ballistic missiles,cruise
missiles,conventional fixed-and rotary-wing aircraft,and UASs. Air and missile defense preventthe enemy
from interdicting friendly forces,while freeing the commander to synchronize movementand firepower. (See
ATP 3-01.8 for additional information.)
7-75. Indirect-fire protection systems protect the BCT from threats that are largely immune to air defense
artillery systems. The indirect-fire protection intercept capability is designed to detect and destroy incoming
rocket, artillery, and mortar fires. This capability assesses the threat to maintain friendly protection and
destroys the incoming projectile at a safe distance from the intended target. The air and missile defense task
consistof active and passive measures that protect the BCT from an air or missile attack. Passive measures
include camouflage, cover, concealment, hardening, and operations security. Active measures are taken to
destroy, neutralize, or reduce the effectiveness of hostile air and missile threats. The early warning of
in-bound missile threats is provided in theater by the globally located, joint tactical ground stations. (See
ADP 3-37 and ATP 3-09.42 for additional information.)
7-76. As stated in chapter 3, protection cell planners coordinate with the ADAM cell for air and missile
defense for the protection of the critical asset list and defended asset list and for other air and missile defense
protection as required. There is continuous coordination to refine the critical asset list and defended asset list
throughout defensive and offensive operations,ensuring the protection of critical assets and forces from air
and missile attack and surveillance. Air and missile defense assets integrate protective systems by using the
six employment guidelines—mutual support, overlapping fires, balanced fires, weighted coverage, early
engagement,and defense in-depth—and additional considerations necessary to mass and mix air and missile
defense capabilities. (SeeATP 3-01.50 for additional information.)
7-77. Military police planners, based upon the mission variables of mission, enemy, terrain and weather,
troops and support available, time available, and civil considerations (METT-TC),identify requirements for
military police support and augmentation. The BCT provost marshal and military police staff planners at
division level coordinate military police activities and provide for the integration of military police focused
considerations throughout the operations process. Military police operations require the use of military police
specific technical skill sets to plan, manage, and execute the military police-specific disciplines. Liaisons
may be needed in certain situations to ensure proper and completestaff planning. (SeeFM3-39 for additional
information.) During the defense,military police planners must—
(cid:122) Understand the IPB, commander’s critical information requirements (CCIRs), and priority
intelligence requirements to facilitate the integration of police intelligence activities within all
military police operations to support those requirements.
(cid:122) Consider the type and size of the area of responsibility(AOR),line of communications security,
and the threat and plan for detainee operations and dislocated civilians to determine how their
presence may affect maneuver forces.
(cid:122) Anticipate operational changes or transitions and prepare the military police effort toward that
action.
7-78. In the defense,attached military police forces ensure movement of repositioning or counterattacking
forces and provide and support the evacuation of captured or detained individuals. Military police missions
provide freedom of movement for repositioning BCT forces and the reserve when it is committed. The
mission variables of METT-TC determine priority of movement along main supply routes. Additional
military police force activities include protection support tocommand posts (CPs),communications facilities,
convoys,supply sites,support areas,and consolidation areas. Examples of expected missions include—
(cid:122) Conduct detention operations.
(cid:122) Establish a movement corridor.
(cid:122) Conduct convoy escorts.
(cid:122) Conduct response force operations.
(cid:122) Conduct lines of communications security.
(cid:122) Provide military working dog support (see ATP 3-39.34).
(cid:122) Support to support area (see FM 3-81) and consolidation area (see chapter 2) operations. |
3-96 | 265 | Defense
7-79. Chemical, biological, radiological, and nuclear environment is an operational environment that
includes chemical, biological, radiological, and nuclear threats and hazards and their potential resulting
effects (JP 3-11). Within the BCT area of operations, CBRN environment conditions can be the result of
deliberate enemy or terrorist actions or the result of an industrial accident. Possible CBRN threats include
the intentional employment of, or intent to employ, weapons or improvised devices to produce CBRN
hazards. CBRN hazards include those created from accidental or intentional releases of toxic industrial
materials,biological pathogens,or radioactive matter. Toxic industrial material is a generic term for toxic or
radioactive substances in solid,liquid,aerosolized,or gaseous form that may be used or stored for industrial,
commercial,medical,military,or domestic purposes. Toxic industrial material may be chemical,biological,
or radiological. (SeeFM 3-11 for more information on CBRN hazards.)
7-80. Chemical,biological,radiological,and nuclear defenseare measures taken to minimize or negate the
vulnerabilities to, and/or effects of, a chemical, biological, radiological, or nuclear hazard or incident
(JP3-11). The BCT commander integrates CBRN defense considerations into mission planning depending
on the CBRN threat. (SeeFM 3-11 and ATP3-11.37for additional information.)Commanders at all echelons
maintain the effectiveness of their force in CBRN environments by establishing CBRN defense plans that—
(cid:122) Estimate enemy intent,capabilities,and effects for CBRN.
(cid:122) Provide guidance to the force on necessary protective measures.
(cid:122) Apply the IPB output to develop CBRN reconnaissance plans to answer priority intelligence
requirements.
(cid:122) Establish the employment criteria of CBRN enablers to counter CBRN threats.
(cid:122) Establish a logistic support plan for long-term CBRN operations.
(cid:122) Establish CBRN warning and reporting requirements.
7-81. Operationally, CBRN passive defense maintains the commander’s ability to continue military
operations in a CBRN environment while minimizing or eliminating the vulnerability of the force to the
degrading effects of those CBRN threats and hazards. Tactical-level doctrine has traditionally segregated
CBRN passive defense into the distinct principles of contamination avoidance, protection, and
decontamination. While these principles remain valid,they are now recognized to be components of the more
expansive concepts of hazard awareness and understanding and contamination mitigation. Since hazard
awareness and understanding largely focuses strategic aspects of operations in a CBRN environment,tactical
level doctrine is organized around the key activities (seefigure 7-3on page 7-18) of CBRN protection and
contamination mitigation.
(cid:122) Chemical biological, radiological, and nuclear protection consists of measures taken to keep
chemical,biological,radiological,and nuclear threats and hazards from having an adverse effect
on personnel, equipment, and facilities (ATP 3-11.32). CBRN protection encompasses the
following activities: protect personnel,equipment,and facilities.
(cid:122) Contamination mitigationis the planning and actions taken to prepare for,respond to,and recover
from contamination associated with all chemical,biological,radiological,and nuclear threats and
hazards to continue military operations (JP 3-11). The two subsets of contamination mitigation are
contamination control and decontamination. (SeeATP3-11.32for a detailed discussion of CBRN
passive defense activities.) |
3-96 | 266 | Chapter 7
Figure 7-3. Chemical, biological, radiological, and nuclear passive defense architecture
7-82. When established, the CBRN working group led by the CBRN officer includes members from the
protection-working group, subordinate commands, host-nation agencies, and other unified action partners.
The CBRN working group—disseminates CBRN operations information,including trend analysis,defense
best practices and mitigating measures, operations, the status of equipment and training issues, CBRN
logistics, and contamination mitigation and remediation efforts and refines the CBRN threat, hazard, and
vulnerability assessments. The working group helps to develop,train,and rehearse a CBRN defense plan to
protect personnel and equipment from an attack or incident involving CBRN threats or hazards. CBRN threat
and hazard assessments made by the working group help determine initial,individual protective equipment
levels and the positioning of decontaminants. Force health personnel maintain the medical surveillance of
personnel strength information for indications of force contamination,epidemic,or other anomalies apparent
in force health trend data. (SeeFM 3-11 and ADP 3-37 for additional information.)
Note. (See chapter 6 for information on countering weapons of mass destruction [CWMD] and
the explosive ordnance disposal company when supporting the BCT.)
7-83. Force health protection (see ATP 4-02.8), measures to promote, improve, conserve or restore the
mental or physical well-being of Soldiers, enable a healthy and fit force, prevent injury and illness, and
protect the force from health hazards. Defensive actions can result in prolonged occupation of static positions
and corresponding exposure of personnel to diseases, weather and other health hazards and environmental
affects that can quickly degrade readiness. The commander enforces environmental disciplines, such as
hydration, sanitation, hygiene, protective clothing, and inspection of potable water supplies. Defensive
actions also may entail sustained enemy bombardments or attacks resulting in dramatic effects on the mental
and behavioral health of unit personnel. Soldiers can become combat ineffective from heavy indirect fire
even if exposure is for short durations. Commanders deliberately emplace systems for combat stress
identification and treatment to reduce the return to duty time of affected personnel. (See FM 4-02 and
ATP4-02.3 for additional information.)
7-84. When planning for base camp security and defense it is critical to remember that a properly designed
perimeter security system should be an integrated, layered, defense in-depth that takes advantage of the
security area. BCT commanders,supported by their staff,evaluate mission variablesfocusing on the threat
to establish a viable perimeter defense plan. Planning for perimeter security and defense,like all protection
measures integrates fires and obstacles,within the context of mission and operational variables and associated |
3-96 | 267 | Defense
constraints,throughout the depth of the base camp area of operations to meet security and defense objectives.
Commanders and staff with base camp security and defense responsibilities plan,coordinate,and synchronize
actions using integrating processes to ensure full integration of their area security and base defense plans.
(SeeATP 3-37.10for additional information.)
7-85. Refer to chapter 6 for a discussion of the following supporting tasks of the protection warfighting
function:
(cid:122) Implement physical security procedures.
(cid:122) Apply antiterrorism measures.
(cid:122) Provide explosive ordnance disposal support.
(cid:122) Conduct personnel recovery.
(cid:122) Conduct populace and resource control.
(cid:122) Conduct risk management(RM).
SECTION III – FORMS OF THE DEFENSE
7-86. The three forms of the defense (defense of a linear obstacle, perimeter defense, and reverse-slope
defense) have special purposes and require special planning and execution. The three forms of the defense
provide distinct advantages for the BCT and its subordinate units and apply to the area defense and the
operations of the fixing force during amobile defense. (SeeFM 3-90-1 for additional information.)
DEFENSE OF A LINEAR OBSTACLE
7-87. The defense of a linear obstacle usually forces the enemy to deploy,concentrate forces,and conduct
breaching operations. A defense of a linear obstacle generally favors the use of a forward defense (see
paragraph 7-128). The defending unit constructs obstacles to stop the enemy forces and channel them into
planned EAs. Maintaining the integrity of the linear obstacle is the key to this type of defense. When attacked,
the defending force isolates the enemy, conducts counterattacks, and delivers fires onto the concentrated
force to defeat attempts to breach the obstacle.
7-88. A defense of a linear obstacle often is used as part of an economy of force measure. In this situation,
the defending force cannot allow the enemy to build up its forces on the friendly side of the obstacle because
it may lack the required combat power to defeat the enemy forces. As forces to counterattack and destroy the
enemy may not be available immediately;defending forces must be able to—
(cid:122) Detect enemy penetrations early enough so that local counterattacks can defeat them.
(cid:122) Defend after being isolated.
(cid:122) Use reconnaissance elements,sniper teams,and other elements to detect enemy forces andcall in
fires.
(cid:122) Bring the fight to the enemy side of the obstacle to destroy its forces and disrupt enemy
preparations.
(cid:122) Use fires to their maximum effect.
(cid:122) Use its mobility to concentrate combat power.
Defense of a Linear Obstacle: Fredericksburg,VA 1862
By December 13,1862,Confederate General Robert E. Lee established a strong defensive
position behind the Rappahannock River in Northern Virginia against Union forces (see
figure 7-4on page7-20). He only lightly defended the actual river line because theUnion
army artillery dominated both sides of the river. His main defensive position was directly
west along a line of hills. The area between the river and the hills was generally open with
scattered woods and streams or canals. The most concealed area was the town of
Fredericksburg.
Early on December 13, the Union army crossed the river and formed for the attack. The
plan was to conduct the main attack to the south with a supporting attack to the north.
Despite repeated attacks, the Union forces were repulsed everywhere. Union casualties |
3-96 | 268 | Chapter 7
were approximately 10,000 while the confederate forces suffered approximately 5,000
casualties.
Vincent Esposito
Figure 7-4. Historical example, defense of a linear obstacle, Fredericksburg, 1862
PERIMETER DEFENSE
7-89. The BCT and its subordinate units often use a perimeter defense when conducting airborne and air
assault operations, as well as when conducting operations in noncontiguous areas of operations. The BCT
presents no assailable flanks to the enemy and allows the defender to reinforce a threatened area rapidly.
Some disadvantages of a perimeter defense include its isolation and the vulnerability of its concentrated units
to enemy fires.
7-90. Acommander establishes a perimeter defense when the unit must hold criticalterrain,such as a strong
point,or when it must defend itself in areas where the defense is not tied in with adjacent units. Depending
on the situation, the commander maximizes the use of class IV barrier material, utilize engineer assets to
create vehicle and crew served fighting positions, and manpower to emplace obstacles of many types |
3-96 | 269 | Defense
(including wire, abates trees,antitank ditches). Additionally, spider mine obstacle groups can be emplaced
and grouped under one or several system operators with appropriate triggers and rehearsals.
7-91. Commanderscan organize a perimeter defense to accomplish a specific mission,such as protecting a
base or to provideimmediate self-protection,such as during resupply operations when all-around security is
required. Duringa perimeter defense,leaders at all levels ensure that—
(cid:122) Units physically tie into each other.
(cid:122) Direct fire weapons use flanking fire to protect the perimeter.
(cid:122) Field artillery and mortars are protected.
(cid:122) Communications are secure and redundant systems in place.
(cid:122) Obstacles are employed.
(cid:122) Final protective fires are established.
7-92. After committing the reserve, the commander must reconstitute the reserve to meet other possible
threats. This reconstitution force normally comes from an unengaged unit in another portion of the perimeter.
Perimeter Defense:Chip’yong Ni, Republic of Korea 1951
During the Chinese Fourth Phase offensive, the 23d Infantry Regimental Combat Team,
reinforced,used a perimeter defense to defeat elements of three People’s Republic of China
armies,about 25,000 soldiers at Chip’yong Ni,Republic of Korea (seefigure 7-5on page
7-22). From 13 to 14 February 1951,the 23d established a perimeter defense around the
town of Chip’yong-Ni and blunted a major People’s Republic of China offensive. After a
bitter fight,the Chinese forces withdrew at the cost of 51 United Nation’s Soldiers and an
estimated 2000 Peoples Republic of China soldiers killed. The battle was a major defeat
for the Chinese forces and led to subsequent United Nation offensives that forced the
Chinese back into the North.
Billy C. Mossman |
3-96 | 270 | Chapter 7
Figure 7-5. Historical example of a perimeter defense, Chip’yong Ni, 1951
REVERSE-SLOPE DEFENSE
7-93. The reverse-slope defense allows units to concentrate their direct fires into a relatively small area while
being protected from the enemy’s direct observation and supporting fires. The defender can destroy the
enemy’s isolated forward units through surprise and concentrated fires. The control of the forward slope is
essential for success. Gaining control of the forward slope can be done by using dominating terrain behind
the defenders or with the use of stay behind forces,such as reconnaissance and sniper teams,that can observe
and call in fires on the attackers. Generally, a unit at battalion level and below conducts a reverse-slope
defense even though the BCT may have areas within its area of operations that are conducive to the useof a
reverse-slope defense.
Reverse-Slope Defense:Kakazu Ridge 1945
During the Okinawa campaign, Imperial Japanese forces conducted reverse-slope
defenses along a series of ridges (seefigure 7-6). This tactic was devastating and cost many
American lives. The Japanese,dug in on the reverse slope,and able to maneuver through
tunnels would immediately counterattack American forces that reached the crest of the
defended ridge. The Japanese held their positions for many days against heavy American
firepower and repeated American attacks. Some of the positions, such as Kakazu Ridge,
were taken,lost,and retaken repeatedly until finally falling to American forces.
Various |
3-96 | 271 | Defense
Figure 7-6. Historical example of a reverse slope defense, Kakazu Ridge, 1945
SECTION IV – DEFENSIVE CONTROL MEASURES
7-94. A control measure is a means of regulating forces or warfighting functions. Control measures provide
control without requiring detailed explanations. Control measures can be permissive (which allows
something to happen) or restrictive (which limits how something is done). Some control measures are
graphic. A graphic control measure is a symbol used on maps and displays to regulate forces and warfighting
functions. (See ADP 1-02 for illustrations of graphic control measures and rules for their use.)
COMMON DEFENSIVE CONTROL MEASURES
7-95. Control measures provide the ability to respond to changes in the situation. They allow the defending
commander to concentrate combat power at the decisive point. Commanders use the minimum number to
control their units and tailor their use to the higher commander’s intent. Figure 7-7onpage 7-25illustrates a
BCT’s use of the following control measures:
(cid:122) Assembly area. |
3-96 | 272 | Chapter 7
(cid:122) Attackbyfire position.
(cid:122) Axis of advance.
(cid:122) Battle handover line.
(cid:122) Battle position (occupied and planed).
(cid:122) Boundaries.
(cid:122) Brigade support area.
(cid:122) Contact point.
(cid:122) EA.
(cid:122) Coordinate fireline.
(cid:122) Forward edge of the battle area.
(cid:122) Lane.
(cid:122) NAI.
(cid:122) Observation post.
(cid:122) Passage point.
(cid:122) PL.
(cid:122) Strong point battle position.
(cid:122) TAI.
(cid:122) TRP.
(cid:122) Turning obstacle. |
3-96 | 273 | Defense
Figure 7-7. Common defensive control measures
EMPLOYING CONTROL MEASURES
7-96. Effectively employing control measures requires the BCT commander and staff to understand their
purposes and ramifications, including the permissions or limitations imposed on subordinates’ freedom of
action and initiative. Each measure should have a specific purpose. Control measures include designating the
security area,the MBAwith its associated battle positions,the forward edge of the battle area,and the echelon
support area. Commanders use graphic control measures to assign responsibilities, coordinate fires and
maneuver,and control the use of airspace. Well-planned measures permit the proper distribution of fires and |
3-96 | 274 | Chapter 7
prevent multiple weapons from firing upon prominent targets while less prominent targets escape destruction.
The BCT properly uses fire support coordination measures, direct fire control measures, maneuver control
measures,and airspace coordinating measures to synchronize operations in the land and air domains.
AREA OF OPERATIONS
7-97. An area of operations is an operational area defined by the joint force commander for land and maritime
forces that should be large enough to accomplish their missions and protect their forces. An area of operations
is a basic tactical concept and the basic control measure for all types of operations. An area of operations
gives the responsible unit freedom of maneuver and enables fire support planning within a specific area.
Commanders employ control measures to avoid fratricide against forward deployed security forces in the
security area and engineer assets constructing countermobility obstacles in EAs. All units assigned an area
of operations have the following additional responsibilities within the boundaries of that area of operations:
(cid:122) Terrain management.
(cid:122) Information collection.
(cid:122) Civil-military operations.
(cid:122) Movement control.
(cid:122) Clearance of fires.
(cid:122) Security.
(cid:122) Personnel recovery.
(cid:122) Airspace management.
(cid:122) Minimum-essential stability operations tasks.
7-98. A unit’s area of operations should provide adequate depth based on its assigned tasks,the terrain,and
the anticipated size of the attacking enemy force. To maintain security and a coherent defense, an area of
operations generally requires continuous coordination with flank units. The BCT assigns control measures,
such as PLs, coordinating points, EAs, obstacle belts, and battle positions, to coordinate subordinate unit
defenses within the MBA. The BCT commander and staff use briefings, inspections, rehearsals, and
supervision to ensure coordination among subordinate units, to eliminate any gaps, and to ensure a clear
understanding of the defensive plan.
7-99. Subordinate unit area of operations may be contiguous or noncontiguous. A contiguous area of
operations (see figure 7-2onpage 7-7) is where all a commander’s subordinate forces’areas of operations
share one or more common boundary(FM 3-90-1). A noncontiguous area of operations(see figure 7-8) is
where one or more of the commander’s subordinate force’s areas of operation do not share a common
boundary (FM3-90-1). The higher headquarters is responsible for controlling the areas not assigned to
subordinate forces within noncontiguous areas of operations. (SeeFM 3-90-1 for additional information.) |
3-96 | 275 | Defense
Figure 7-8. Area defense, noncontiguous area of operations
BATTLE POSITION
7-100. Abattle positionis a defensive location oriented on a likely enemy avenue of approach (ADP 3-90).
The BCT commander assigns a battle position to a battalion to control the battalion’s fires, maneuver, and
positioning. Usually,the commander assigns boundaries to provide space for the battalion security,support,
and sustainment elements that operate outside a battle position. When the commander does not establish unit
boundaries,the BCT is responsible for fires,security,terrain management,and maneuver between positions
of adjacent battalions. The battle position prescribes a primary direction of fire by the orientation of the
position. The commander defines when and under what conditions the battalion can displace from the battle
position or maneuver outside it. The use of prepared or planned battle positions,with the associated tasks of
prepare or reconnoiter,provides flexibility to rapidly concentrate forces and adds depth to the defense.
7-101. There are five types of battle positions: primary, alternate, supplementary, subsequent, and strong
point. The commander always designates the primary battle position. The commander designates and
prepares alternate,supplementary,and subsequent positions as required.
7-102. Aprimary positionis the position that covers the enemy’s most likely avenue of approach into the
area of operations (ADP 3-90). Always designate this position.Analternate positionis a defensive position
that the commander assigns to a unit or weapon system for occupation when the primary position becomes
untenable or unsuitable for carrying outthe assigned task (ADP 3-90). The alternate position covers the same
area as the primary position. A supplementary positionis a defensive position located within a unit’s assigned
area of operations that provides the best sectors of fire and defensive terrain along an avenue of approach |
3-96 | 276 | Chapter 7
that is not the primary avenue where the enemy is expected to attack (ADP 3-90). Assigned when more than
one avenue of approach into a unit’s area of operations. A subsequent positionis a position that a unit expects
to move to during the course of battle (ADP 3-90). Subsequent positions can have primary, alternate, and
supplementary positions associated with them.
7-103. In accordance with the mission variables, units can conduct survivability moves between their
primary, alternate, and supplementary positions. A survivability move is a move that involves rapidly
displacing a unit, CP, or facility in response to direct and indirect fires, the approach of a threat or as a
proactive measure based on intelligence,meteorological data,and risk assessment of enemy capabilities and
intentions (ADP 3-90). A survivability move includes those based on the impending employment of weapons
of mass destruction (WMD).
7-104. Astrong pointis a heavily fortified battle position tied to a natural or reinforcing obstacle to create
an anchor for the defense or to deny the enemy decisive or key terrain (ADP 3-90). A strong point implies
retention of terrain to control key terrain and blocking,fixing,or canalizing enemy forces. Defending units
require permission from the higher headquarters to withdraw from a strong point. All combat, maneuver
enhancement,and sustainment assets within the strong point require fortified positions. In addition,extensive
protective and tactical obstacles are required to provide an all-around defense. (See figure 7-9.)
Figure 7-9. Strong point placement
7-105. As a rule of thumb, a minimally effective strong point requires a one-day effort from an engineer
unit the same size as the unit defending the strong point. Organic BCT engineers lack sufficient capacity to
create a strong point within a reasonable amount of time;additional engineer assets from echelons above the
BCT are required. Once the strong point is occupied,all units and equipment not essential to the defense are
displaced from the strong point. This includes nonessential staff and elements from the forward support
company(FSC). (SeeFM 3-90-1 for additional information.) |
3-96 | 277 | Defense
7-106. Planning considerations for a strong point,although not inclusive,may include—
(cid:122) Establishment of outposts and observation posts.
(cid:122) Development of integrated fires plans that include final protective fires.
(cid:122) Priorities of work.
(cid:122) Counterattack plans.
(cid:122) Stockage of supplies.
(cid:122) Integration and support of subordinate forces outside the strong point.
(cid:122) Actions of adjacent units.
COMBAT OUTPOST
7-107. Acombat outpostis a reinforced observation post capable of conducting limited combat operations
(FM 3-90-2). Using combat outposts is a technique for employing security forces in restrictive terrain that
precludes mounted security forces from covering the area. While the mission variables of METT-TC
determine the size, location, and number of combat outposts established by a unit, a reinforced platoon
typically occupies a combat outpost. Combat outposts normally are located far enough in front of the
protected force to prevent enemy ground reconnaissance elements from directly observing the protected
force. (SeeFM 3-90-2 and ATP 3-21.8 for additional information.)
SECTION V – DEFENSIVE OPERATIONS
7-108. Adefensiveoperationis an operationto defeat an enemy attack,gain time,economize forces,and
develop conditions favorable for offensive or stability operations (ADP 3-0). The three defensive operations
are area defense,mobile defense,and retrograde. Planning and preparing an effective defense takes time. The
commander uses security elements to provide early warning, reaction time, and maneuver space. Units
establish a defense immediately upon occupation. Commanders refine the initial defense through planning
and preparation and may require units to shift and adjust their positions after the plan is final. Defensive
preparations and refinement are never complete. As required, defending units conduct consolidation and
reorganization activities after each enemy engagement (see paragraph 6-30 for a discussion of these
activities).
AREA DEFENSE
7-109. Anarea defenseis a type of defensive operationthat concentrates on denying enemy forces access
to designated terrainfor a specific time rather than destroying the enemy outright (ADP 3-90). The defender
limits the enemy’s freedom of maneuver and channels them into designated EAs. The focus of the area
defense is to retain terrain where the bulk of the defending force positions itself in mutually supporting,
prepared positions. Units maintain their positions and control the terrain between these positions. The
decisive operation focuses on fires into EAs possibly supplemented by a counterattack. The commander can
use the reserve to reinforce fires;add depth,block,or restore the position by counterattack;seize the initiative;
or destroy enemy forces. The BCT conducts an area defense under the following conditions:
(cid:122) When directed to defend or retain specified terrain.
(cid:122) When forces available have less mobility than the enemy does.
(cid:122) When the terrain affords natural lines of resistance.
(cid:122) When the terrainlimits the enemy to a few well-defined avenues of approach.
(cid:122) When there is time to organize the position.
(cid:122) When conditions require the preservation of forces.
ORGANIZATION OF FORCES
7-110. The BCT commander organizes an area defense around the static framework of the defensive
positions seeking to destroy enemy forces by interlocking fire or local counterattacks. The commander has
the option of defending forward or defending in-depth. The depth of the force positioning depends on the
threat,task organization of the BCT,and nature of the terrain. When the commander defends forward within |
3-96 | 278 | Chapter 7
an area of operations,the force is organized sothat most of the available combat power is committed early
in the defensive effort. To accomplish this,the commander may deploy forces forward or plan counterattacks
well forward in the MBAor even beyond the MBA. If the commander has the option of conducting a defense
in-depth,security forces and forward MBAelements identify,define,and control the depth of the enemy’s
main effort while holding off secondary thrusts. Doing so allows the commander to conserve combat power,
strengthen the reserve, and better resource the counterattack. In an area defense, the commander organizes
the defending force to accomplish information collection,security,MBA,reserve,and sustainmentmissions.
(See figure 7-10.)
Figure 7-10. Area defense, organization of forces
Information Collection
7-111. The commander directs information collection assets to determine the locations, strengths, and
probable intentions of the attacking enemy force. The commander places a high priority on early
identification of the enemy’s main effort.The commander ensures that the mission of reconnaissance forces
and surveillance assets are coordinated with those of higher headquarters. In the defense, reconnaissance,
surveillance,and securityoperations overlap the unit’s planning and preparing phases. |
3-96 | 279 | Defense
7-112. BCT subordinate commanders and leaders performing reconnaissance, surveillance, and security
missions understand that these missions often start before the commander fully develops the plan.
Commanders and leaders have to be responsive to changes in orientation and mission. The commander
ensures that the staff plans,prepares,and assesses the execution of the information collection portion of the
overall plan. (See chapter 5 for a detailed discussion on reconnaissance operations.)
Security
7-113. The higher commander defines the depth of the BCT’s security area. The BCT’s security area
extends from the forward edge of the battle area to the BCT’s forward boundary. Depth in the security area
gives the forces within the MBAmore reaction time. Depth allows the security force more area to conduct
security missions. A very shallow security area may require more forces and assets to provide the needed
reaction time.
7-114. The BCT commander must clearly define the objective of the security area. The commander states
the tasks of the security force in terms of time required or expected to maintain security, expected results,
disengagement and withdrawal criteria,and follow-on tasks. The commander identifies specific avenues of
approach and NAI on which the security force must focus. The BCT assists in the rearward passage of lines
and movement through the BCT area of operations of any division and corps security force deployed beyond
the BCT’s forward boundary.
7-115. The BCT commander balances the need for a strong security force to shape the battle with the
resulting diversion of combat power from the decisive operation in the MBA. The BCT frequently executes
the forward security mission as a guard or screen. Typically,there are two options for organizing the security
force. The BCT forward defending maneuver battalions establish their own security areas or the maneuver
battalions provide security forces that operate with the Cavalry squadron under the BCT’s direct control.
7-116. The BCT conducts counterreconnaissance and area security operations (see chapter 8), and
implements local security measures, operations security, and information protection activities to deny the
enemy information about friendly dispositions. BCT reconnaissance and security forces seek to confuse the
enemy about the location of the BCT’s main battle positions,to prevent enemy observation of preparations
and positions, and to keep the enemy from delivering observed fire on the positions. The BCT conducts
reconnaissance and security operations to gain and maintain contact with the enemy,develop the situation,
answer CCIRs, retain freedom of maneuver, consolidate gains, secure the force, and protect the local
population. (See chapter 5 for a detailed discussion on security force operations.)
Main Battle Area
7-117. The main battle areais the area where the commander intends to deploy the bulk of the unit’s combat
power and conduct decisive operations to defeat an attacking enemy (ADP 3-90). The BCT’sMBAextends
from the forward edge of the battle area to the unit’s rear boundary. The commander selects the MBAbased
on the higher commander’s concept of operations, IPB, results of initial information collection plan
(reconnaissance, security operations, surveillance, and intelligence operations), and the commander’s own
assessment of the situation.
7-118. The BCT commander delegates responsibilities within the MBA by assigning areas of operations
and establishing boundaries to and for subordinate battalions. The commander locates subordinate unit
boundaries along identifiable terrain features and extends them beyond the forward line of own troops by
establishing forward boundaries. Unit boundaries should not split avenues of approach or key terrain. The
BCT is responsible for terrain management,security,clearance of fires,and coordination of maneuver among
other doctrinal responsibilities within the entire area of operations if the commander does not assign area of
operations to subordinate battalions. (See ADP 3-90 for additional information.)
Reserve
7-119. The reserve is not a committed force. The BCT commander can assign it a wide variety of tasks on
its commitment,and it must be prepared to perform other missions. The reserve may be committed to restore
the defense’s integrity by blocking an enemy penetration, reinforcing fires into an EA, or conducting a |
3-96 | 280 | Chapter 7
counterattack against the flank or rear of an attacking enemy. The reserve gives the commander the flexibility
to exploit success or to deal with a tactical setback.
7-120. The commander positions the reserve to respond quickly to unanticipated missions. The commander
determines the reserve’s size and position based on accurate knowledge about the enemy and whether the
terrain can accommodate multiple enemy COAs. When the BCT has accurate knowledge about the enemy
and the enemy’s maneuver options are limited,the BCT can maintain a smaller reserve. If knowledge about
theenemy is limited and the terrain allows the enemy multiple COAs,then the BCT needs a larger reserve
positioned deeper into the area of operations. (SeeFM 3-90-1 for additional information.)
Sustainment
7-121. The sustainment mission in an area defense requires a balance among establishing forward supply
stocks of ammunition, barrier material, and other supplies in sufficient amounts, and having the ability to
move the supplies in conjunction with enemy advances. Proper forecasting of supply and support
requirements is important to the success of the area defense. The location of sustainment units within the
support area is METT-TC dependent. (See chapter 9.)
PLANNING AN AREA DEFENSE
7-122. An area defense requires detailed planning and extensive coordination. In the defense,synchronizing
and integrating the BCTs combat and supporting capabilities enables a commander to apply overwhelming
combat power against selected advancing enemy forces. A successful defense depends on knowing and
understanding the enemy and its capabilities. The commander’s situational understanding is critical in
establishing the conditions that initiate the defensive action. As the situation develops, the commander
reassesses the plan based on a revised situational understanding that results from an updated common
operational picture (COP) as new intelligence and combat information becomes available. In planning an
area defense,the commander may choose between two forms of defensive maneuver—a defense in-depth or
a forward defense.
Understanding
7-123. The BCT commander considers the mission variables of METT-TC to determine how to concentrate
efforts and economize forcesin order to accomplish the mission. A detailed terrain analysis may be the most
important process the BCT commander and staff complete. A successful defense relies on a complete
understanding of terrain to determine likely enemy COAsand the best positioning of BCT assets to counter
them.
7-124. The commander must understand the situation in-depth, develop the situation through action, and
constantly reassess the situation to keep pace with the engagement. Defending forces must gain and maintain
contact with the enemy to observe, assess, and interpret enemy reactions and the ensuing opportunities or
threats to friendly forces, populations, or the mission. The commander must establish priority intelligence
requirements to enable information collection through reconnaissance,surveillance,intelligence operations,
and security operations to develop situational understanding.
7-125. Enemy forces counter friendly information collection efforts to prevent the BCT from gaining
information. Enemy forces use other countermeasures such as dispersion, concealment, deception, and
intermingling with the population to limit the BCT’s ability to develop the situation out of contact.
Reconnaissance and security forces (see chapter 5) fill in the gaps in commanders’ understanding of the
situation. Fighting for understanding and identifying opportunities to seize,retain,and exploit the initiative
requires combined arms capabilities, access to joint capabilities, specialized training, and employing
combinations of manned and unmanned air and ground systems.
Forms of Defensive Maneuver
7-126. The BCT commander may choose between two defensive maneuver forms when planning an area
defense, a defense in-depth, or a forward defense. The commander usually selects the form of defensive
maneuver,but the higher headquarters’commander may define the general defensive scheme for the BCT.
These two deployment choices are not totally exclusionary. Part of a defending commander’s unit can |
3-96 | 281 | Defense
conduct a forward defense,while the other part conducts a defense in-depth. The specific mission may also
impose constraints such as time, security, and retention of certain areas, which are significant factors in
determining how the BCT defends.
Defense In-Depth
7-127. A defense in-depth (see figure 7-11) reduces the risk of a quick penetration by the attacking enemy
force. Even if initially successful, the enemy has to continue to attack through the depth of the defense to
achieve a penetration. The defense in-depth provides more space and time to defeat the enemy attack.
Dependent on the mission variables of METT-TC, it may require forces with at least the same mobility as
the enemy to maneuver to alternate, supplementary, and subsequent positions. The mobility of the enemy
force can determine the disengagement criteria of the defending forces as they seek to maintain depth. The
BCT commander considers using a defense in-depth when—
(cid:122) The mission allows the BCT to fight throughout the depth of the area of operations.
(cid:122) The terrain does not favor a forward defense and there is better defensible terrain deeper in the
area of operations.
(cid:122) Sufficient depth is available in the area of operations.
(cid:122) Cover and concealment forward in the area of operations is limited.
(cid:122) CBRN weapons may be used.
(cid:122) The terrain is restrictive and limits the enemy’s maneuver and size of attack.
Figure 7-11. Defense in-depth |
3-96 | 282 | Chapter 7
Forward Defense
7-128. The intentof a forward defense (seefigure 7-12) isto prevent enemy penetration of the defense. A
forward defense is the least preferred form of the area defense due to its lack of depth. The BCT commander
deploys the majority of combat power into defensive positions near the forward edge of the battle area. The
commander fights to retain the forward position and may conduct spoiling attacks or counterattacks against
enemy penetrations,or destroys enemy forces in forward EAs. Often,counterattacks are planned forward of
the forward edge of the battle areato defeat the enemy. Commanders may use reconnaissance and security
forces to find the enemy in vulnerable situations and exploit the opportunity to conduct a spoiling attack to
weaken the enemy’s main attacking force and to disrupt the enemy operation.
7-129. The BCT commander uses a forward defense when a higher commander directs the commander to
retain forward terrain for political,military,economic,and other reasons. Alternatively,a commander may
choose to conduct a forward defense when the terrain in that part of the area of operations—including natural
obstacles—favors the defending force because—
(cid:122) Terrain forward in the area of operations favors the defense.
(cid:122) Strong,existing natural or manmadeobstacles,such as a river or a canal,are located forward in
the area of operations.
(cid:122) Assigned area of operations lacks depth due to the location of the protected area.
(cid:122) Natural EAs occur near the forward edge of the battle area.
(cid:122) Cover and concealment in the rear portion of the area of operations is limited.
(cid:122) Directedby higher headquarters to retain or initially control forward terrain. |
3-96 | 283 | Defense
Figure 7-12. Forward defense
Engagement Area
7-130. Anengagement areais an area where the commander intends to contain and destroy an enemy force
with the massed effects of all available weapons and supporting systems (ADP 3-90). The success of any
engagement depends on how effectively the BCT commander integrates the direct fire plan,the indirect-fire
plan,the obstacle plan(see ATP 3-90.8),Army aviation fires,close air support,and the terrain within the EA
to achieve the BCT’s tactical purpose.
7-131. Effective use of terrain reduces the effects of enemy fires,increases the effects of friendly fires,and
facilitates surprise. Terrain appreciation—the ability to predict its impact on operations—is an important skill
for every leader. For tactical operations,commanders analyze terrain using the five military aspects of terrain, |
3-96 | 284 | Chapter 7
expressed asOAKOC. (See ATP 2-01.3 and ATP 3-34.80 for information on analyzing the military aspects
of terrain.)
Engagement Area Development
7-132. The BCT commander and staff develop EAs,to include engagement criteria and priority,to cover
each enemy avenue of approach. Within the BCT’sMBA,the commander determines the size and shape of
the EAs by the relatively unobstructed line of sight from the weapon systems firing positions and the
maximum range of those weapon systems.Once the commander and staff select EAs,the commander arrays
available forces and weapon systems in positions to concentrate overwhelming effects into these areas. The
commander routinely subdivides EAs into smaller EAs for subordinates using one or moreTRPsor by key
terrain or prominent terrain feature. The commander assigns sector of fires to subordinates to ensure complete
coverage of EAs and to prevent fratricide and friendly fire incidents. Never split the responsibility for an
avenue of approach or key terrain.
7-133. Security area forces, to include field artillery fire support teams and observers, employ fires to
support operations forward of the BCT’s MBA using precision and other munitions to destroy enemy
reconnaissance and security forces and identified HPTs, and to attrit enemy forces as they approach the
BCT’s MBA. The employment of fires within the security area also helps to deceive the enemy about the
location of the BCT’s MBA. The BCT fire support officer plans the delivery of fires at appropriate times and
places throughout the area of operations to slow and canalize the enemy force as the enemy approaches. The
employment of fires allows security area forces to engage the enemy without becoming decisively engaged.
To prevent fratricide,alliedcasualties,civilian noncombatant casualties,and excessive unintended collateral
damage,the commander designates fire support coordination measures (such as no-fire areas,restrictive fire
areas, restrictive fire lines, fire support coordination lines, and restricted target lines) where security area
forces are positioned. The commander establishes these measures in order to exercise restraint and balance
the need for combat action and that of maintaining the legitimacy of the mission and to prevent unintended
negative effects. The commander uses fires to support the withdrawal of security forces once shaping
operations are completed within the security area and the defending unit is prepared to conduct MBA
operations.
7-134. Engagement criteria are protocols that specify those circumstances for initiating engagement with
an enemy force. Engagement criteria may be restrictive or permissive in nature. For example, the BCT
commander may instruct a subordinate battalion commander not to engage an approaching enemy unit until
the enemy commits to an avenue of approach. The commander establishes engagement criteria in the direct
fire plan in conjunction with engagement priorities and other direct fire control measures to mass fires and
control fire distribution.
7-135. Engagement priority specifies the order in which the unit engages enemy systems or functions
(FM3-90-1). The commander assigns engagement priorities based on the type or level of threat at different
ranges to match organic weapon systems capabilities against enemy vulnerabilities. Engagement priorities
are situationally dependent and used to distribute fires rapidly and effectively. Subordinate elements can have
different engagement priorities but will normally engage the most dangerous targets first,followed by targets
in-depth or specialized systems,such as engineer vehicles.
7-136. A target reference point is a predetermined point of reference, normally a permanent structure or
terrain feature that can be used when describing a target location(JP 3-09.3). The BCT and subordinate units
may designate TRPsto define unit or individual sectors of fire and observation,usually within the EA.TRPs,
along with trigger lines,designate the center of an area where the commander plans to distribute or converge
the fires of all weapons rapidly to further delineate sectors of fire within an EA. Once designated, target
reference points may also constitute indirect-fire targets.
7-137. Atrigger lineis a phase line located on identifiable terrain that crosses the engagement area—used
to initiate and mass fires into an engagement area at a predetermined range for all or like weapon systems
(ATP3-21.20). The BCT commander can designate one trigger line for all weapon systems or separate trigger
lines for each weapon or type of weapon system. The commander specifies the engagement criteria for a
specific situation. The criteria may be either time-or event-driven,such as a certain number or certain types
of vehicles to cross the trigger line before initiating engagement. The commander can use a time-based fires
delivery methodology or a geography-basedfires delivery. |
3-96 | 285 | Defense
Note.The example below addresses the general steps to EAdevelopment for the area defense. In
this example, a battalion task force within the BCT conducts an area defense (defense in-depth)
against a motorized infantryand armor threat. The fictional scenario within this example,used for
discussion purposes, is not the only way to develop an EA. For clarity, many graphic control
measures,such as PLs,are not shown.
Engagement Area Development (Motorized Infantry/Armor Threat),Example
7-138. Although often identified as a method to defeat enemy armor,EAs are an effective method to defeat
any enemy attack whether the attack is primarily an armor, Infantry, or a mixed armor and Infantry force.
The key is the identification of the likely enemy avenues of approach and actions, and the placement of
adequate friendly forces,obstacles,and fires to defeat the enemy. The following seven-step EAdevelopment
process, used for discussion purposes,represents one way a BCT builds an EA. The BCT commander and
staff (specifically the S-3) integrate these steps within the military decision-makingprocess(MDMP)and the
IPB. Steps (asterisks denote steps that occur simultaneously) include the following:
(cid:122) Identify likely enemy avenues of approach.
(cid:122) Identify most likely enemy COA.
(cid:122) Determine where to kill the enemy.
(cid:122) Position subordinate forces and weapons systems. *
(cid:122) Plan and integrate obstacles. *
(cid:122) Plan and integrate fires. *
(cid:122) Rehearse the execution of operations within the EA.
Note.Within the scenario below,the BCT commander focuses the IPB effort on the characteristics
of the operational environment that can influence enemy and friendly operations and how the
operational environment influences friendly and enemy COAs. The BCT staff (specifically the
S-2 and S-3) identified three likely enemy avenues of approach to and through the BCT’s area of
operations. Two enemy avenues of approach were identified within the Blue River Valley,Avenue
of Approach 1 and Avenue of Approach 2 (area of operations assigned to Battalion 2). A third
enemy Avenue of Approach (A and B) was identified north of the Blue River Valley, area of
operations assigned to Battalion 1. Success, against these likely enemy avenues of approach,
results in allowing the commander to quickly choose and exploit terrain, weather, and civil
considerations to best support the mission. (See ATP 2-01.3 for a detailed discussion of the IPB.)
7-139. Step 1. Identify likely enemy avenues of approach. The brigade and battalion staffs identified
significant characteristics of the operational environment to determine the effects of the terrain,weather,and
civil considerations on enemy and friendly operations. The primary analytic tools used to aid in determining
this effect, specific to terrain, are the modified combined obstacle overlay, and the terrain effects matrix.
Figure 7-13on page 7-38,identifies the three enemy avenues of approach and the terrain within the BCT’s
area of operations that impedes friendly and enemy movement (severelyrestricted and restricted areas) and
the terrain where enemy and friendly forces can move unimpeded (unrestricted areas). Key terrain forward
of the Green and Red Rivers is critical to the BCT’s defense because occupying these position will allow the
engagement of enemy forces forward of the river,preventing the establishment of an enemy force on the east
bank and the use of crossing sites to support movement into less restrictive terrain west of the Green and Red
Rivers. |
3-96 | 286 | Chapter 7
Figure 7-13. Identify likely enemy avenues of approach, example
7-140. Enemy Avenue of Approach 1 and Avenue of Approach 2, within the scenario though restricted,
support mounted movement though the terrain forward (east) of the Green and Red Rivers, thus hindering
enemy movement to some degree. The terrain typically consists of moderate-to-steep slopes or
moderate-to-densely spaced obstacles, such as trees or rocks. Enemy forces within this restricted area will
have difficulty maintaining preferred speeds, moving in movement formations, and transitioning from one
formation to another. Enemy movement will require zigzagging or frequent detours. A poorly developed road
system will hinder the enemy’s ability to sustain its attack along both enemy avenues of approach. The
unrestricted terrain further west from Green and Red Rivers will allow the enemy to move unimpeded along
enemy Avenue of Approach 1 and Avenue of Approach 2 once clear of the two rivers.
7-141. The terrain along enemy Avenue of Approach 3 (A and B),identified to the north of the Blue River
valley,is severely restricted. Steep slopes and large or densely spaced obstacles with little or no supporting
roads characterize the terrain. Though suitable for dismounted movement and infiltration,the terrain within
Avenue of Approach 3 (A and B) impedes motorized Infantry and armored movement. Swamps and the
rugged terrain within this area are examples of restricted areas for dismounted Infantry forces. The road
system utilized to sustain the enemy’s attack is very limited along Avenue of Approach 3 (A and B). Due to
the terrain, security patrols between battle positions will be key to impeding enemy infiltration efforts to
division support and consolidation areas. (See ATP 2-01.3 for additional information on determining terrain
characteristics and the terrain’s effect on operations.) |
3-96 | 287 | Defense
Note.The BCT commander and staff,during step 4 of the IPB process (determine threat COAs),
identify and develop possible enemy COAs that can affect the BCT’s mission. (See chapter 4.)
Enemy COA development requires identifying and understanding the significant characteristics
related to enemy, terrain, weather, and civil considerations of the operational environment and
how these characteristics affect friendly and enemy operations. Steps 1 and 2 of the IPB process
are, respectively, define the operations environment and describe environmental effects on
operations. The purpose of evaluating the enemy,step 3 of the IPB process (evaluate the threat),
is to understand how an enemy can affect friendly operations. The commander, in order to plan
for all possible contingencies,understands all COAsan enemy commander can use to accomplish
the enemy objective(s). To aid in this understanding,the staff determines all valid enemy COAs
and prioritizes them from most to least likely. The staff also determines which enemy COAis the
most dangerous to friendly forces. To be valid, enemy COAs should be feasible, acceptable,
suitable, distinguishable, and complete-the same criteria used to validate friendly COAs. (See
ATP2-01.3 for a detailed discussion.)
7-142. Step 2. Identify most likely enemy COA. The commander and staff (specifically the S-2 and S-3)
determine the enemy’s most likely COA, within the scenario, is to attack with two battalions (motorized
Infantry battalion task forces) abreast,one along Avenue of Approach 1 and one along Avenue of Approach
2 (seefigure 7-13onpage 7-38). The enemy’s approach,compartmentalized forward of the Green and Red
Rivers, restricts movement and prevents the attacking enemy force from fully exploiting its combat
superiority. The terrain forward of the Green and Red Rivers allows for the massing of friendly fires with the
enemy piecemeal commitment into friendly EAs. The terrain requires the enemy to zigzag and commit to
frequent detours (due to the compartmentalization during movement),exposing portions of the enemy force
for destruction without giving up the advantage of friendly forces fighting from protected positions.
7-143. The enemy’s main effort, predicted to move along Avenue of Approach 2, requires crossing one
river,the Green River. A secondary effort of the enemy,predicted to move along enemy Avenue of Approach
1, requires crossing both the Red and Blue Rivers. The least likely enemy avenue of approach, Avenue of
Approach 3 (A and B) to the north, though the largest area of operations to defend requires the enemy to
move through severely restricted terrain to the east and west of the Green River. The enemy, predicted to
establish multiple infiltration lanes (company and platoon size elements) along this approach, infiltrates
forces to the rear to disrupt friendly operations. Enemy follow-on forces, anticipated armor battalion task
force,will attempt to exploit enemy successes along enemy Avenues of Approach 1 and 2 (seefigure 7-13
onpage 7-38).
Note. The desired end state of step 4 of the IPB process, determine threat COAs, is the
development of graphic overlays (enemy situation templates) and narratives (enemy COA
statements) for each possible enemy COA identified. Generally, there will not be enough time
during the MDMP (see chapter 4) to develop enemy situation overlays for all COAs. A good
technique is to develop alternate or secondary COAs,write a COAstatement,and produce a list
of HVTs to use during the mission analysis briefing and COA development during the MDMP.
Once these tools and products are complete, the staff constructs overlays depicting the enemy’s
most likely and most dangerous COAto use during the friendly COAdevelopment and friendly
COAanalysis steps of the MDMP. (SeeATP 2-01.3 and FM 6-0 for additional information.)
7-144. Step 3. Determine where to kill the enemy. Whether planning deliberately or rapidly when
determining where to kill enemy, the BCT commander, subordinate commanders, and staffs maintain a
shared understanding of the steps within the IPB process and the MDMP. Within the scenario that follows
this paragraph,the BCT commander focuses this effort to determine the effects of the terrain,weather,and
civil considerations on the enemy avenues of approach identified within and north of the Blue River Valley.
During step 4 of the IPB, the BCT and battalion staffs (specifically the S-2 and S-3) identify and develop
possible enemy COAsthat can affect the BCT mission. Based on the results of this analysis,the commander
concentrates efforts and economizes forces to kill the enemy east of the Green and Red Rivers along three |
3-96 | 288 | Chapter 7
enemy avenues of approach to best utilize the restricted and severely restricted areas forward in the BCT’s
area of operations.
EXAMPLE BCTAREA DEFENSESCENARIO
This fictional scenario for steps 4,5,and 6 of the EAdevelopment process,used for discussion purposes,is
an example of how a BCT commander might build EAs within an area defense. In this scenario,an IBCT
conducts an area defense against a motorized Infantry and armor threat. Army aviation attack and
reconnaissance units,initially control by division and higher echelon,conducted attacks against enemy forces
not in direct contact with the ground maneuver forces of the IBCT. As the enemy advanced,aviation attacks
continued in close proximity or in direct support of IBCT and battalion security forces and main battle area
forces. Artillery and mortar fire support plans were integrated into forward security area actions and the direct
fire plans of maneuver companies in the main battle area. Engineer priorities of work were initially to
countermobility,then to survivability. As the IBCT prepared for the defense,the brigade support battalion
established the brigade support area (BSA) just forward of the division support area to support the BCT area
defense.
The IBCT is task organized with two Infantry battalions,a combined arms battalion,aCavalry squadron,a
field artillery battalion, a brigade engineer battalion, and a brigade support battalion. Infantry Battalion 2
(main effort) is task organized with two Infantry rifle companies,a mechanized Infantrycompany team (two
mechanized Infantry platoons and one tank platoon),and a weapons company. Company C,the third Infantry
rifle company (mounted) from Infantry Battalion 2, was placed under IBCT control as the reserve for the
BCT. Infantry Battalion 1 istask organized with its three Infantry rifle companies and weapons company.
The combined arms battalion is task organized with two armor company teams,each with two tank platoons
and one mechanized Infantry platoon. The commander weighted the main effort by attaching the mechanized
Infantry company team from the combined arms battalion to Infantry Battalion 2,as stated above. No change
in task organization for the IBCT Cavalry squadron,field artillery battalion,and brigade engineer battalion.
The brigade support battalion is task organized with the logistical elements required to support the combined
arms battalion. Subordinate unit task organization and scheme of maneuver are as follows:
(cid:122) Infantry Battalion 2,main effort,conducts an area defense. The battalion defends in-depth with
two Infantry rifle companies,with one assault platoon each attached,forward,and a mechanized
Infantry company team (two mechanized Infantry platoons) and weapons company (two assault
platoons) back. The tank platoon from the mechanized Infantry company team is the battalion
reserve. (Illustrated within EAdevelopment example,see figure 7-14 on page 7-42.)
(cid:122) Infantry Battalion 1, supporting effort, conducts an area defense to the north of Infantry
Battalion2. The battalion defends in-depth with two Infantry rifle companies forward,and one
Infantry rifle company back. The weapons company (two assault platoons) is the battalion reserve.
(Not illustrated.)
(cid:122) The combined arms battalion,two armor company teams,is the counterattack force for the BCT.
(Not illustrated.)
(cid:122) Infantry rifle company C from Infantry Battalion 2 is the reserve for the BCT. Company C is
mounted and has two attached assault platoons from Infantry Battalion 1. (Not illustrated.)
(cid:122) The Cavalry squadron establishes the security area forward of the BCT main battle area. (Not
illustrated.)
(cid:122) The brigade engineer battalion priorities of work, countermobility, survivability, and then
mobility. Priority of engineer effort initially to Infantry Battalion 2, then to the mobility of the
BCT counterattack force.
(cid:122) The field artillery battalion provides priority of fires initially to security area forces, then to
Infantry Battalion 2,on order to the BCT counterattack force. (Not illustrated.)
(cid:122) The brigade support battalion establishes the BSA just forward of the division support area.
Priority of support initially to security area forces,then to Infantry Battalion 2,finally to the BCT
counterattack force. (Not illustrated.)
7-145. Step 4. Position subordinate forces and weapons systems. Within the above scenario, the Infantry
brigade combat team (IBCT) commander’s concept for the area defense required the positioning of
subordinate forces and weapon systems to accomplish their mission independently and in combination by
means of fires,the employment of obstacles,and absorbing the strength of the attack within defensive battle |
3-96 | 289 | Defense
positions. The commander assigned subordinate maneuver units an area of operations,based on the mission
variables of METT-TC, to maximize decentralized execution empowering subordinate commanders to
position battle positions within their assigned area of operations. At the same time, each subordinate
commander addressed security requirements for the flanks of assigned area of operations by assigning
responsibility to a subordinate element or organizing a security force or observation post(s) to accomplish
that mission. The commander and subordinate commanders retained reserves to contain enemy penetrations
between units and positions,to reinforce fires into an EA,or to help a portion of the security force or main
body disengage from the enemy if required.
7-146. Step 5. Plan and integrate obstacles. During the conduct of the area defense, countermobility (see
ATP 3-90.8) planning is the primary concern of the assistant brigade engineer (known as ABE) under the
supervision of the brigade engineer battalion commander and battalion and squadron engineer staff
noncommissioned officers, in coordination with the BCT and battalion and squadron S-3, S-2, and fire
support officers. (External to the BCT,engineer planners [division and corps] coordinate with the BCT ABE
and brigade engineer battalion).The plan addresses how security area and MBAforces reinforce the natural
defensive characteristics of the terrain with the employment of obstacles to block, disrupt, fix, and turn
attacking enemy forces into planned EAs. Countermobility planning also includes the positioning of
protective obstacles to prevent the enemy from closing with defensive battle positons within subordinate unit
area defenses.
7-147. Within the scenario, the IBCT commander’s concept for the employment of obstacles within the
area defense (Infantry Battalion 2) forces the enemy to enter established EAs positioned where the
commander intends to kill the enemy. To succeed,the battalion through the employment of obstacles and the
static positioning of company and platoon battle positions control,stop,or canalize attacking enemy forces
to counteract the enemy’s initiative. The commander,through dynamic actions of the battalion reserve,covers
gaps between positions and takes advantage of available offensive opportunities such as a local attack or
counterattack that do not risk the integrity of the defense (see figure 7-14on page 7-42). |
3-96 | 290 | Chapter 7
Figure 7-14. Engagement areas (motorized Infantry/Armor threat), example
7-148. Step 6. Plan and integrate fires. During the conduct of the area defense,fire support planning is the
primary concern of the BCT fire support officer (under the supervision of the BCT field artillery battalion |
3-96 | 291 | Defense
commander) and battalion and squadron fire support officers,in coordination with the BCT and battalion and
squadron S-3,S-2,and engineer staff officers. (External to the BCT,fire support planners [division and corps]
coordinate with the BCT fire support officer and field artillery battalion.) Within the scenario,the IBCT and
division higher area of interest and area of operations extend far enough beyond forward battalions’forward
line of own troops that the BCT commander has the time and resources to identify approaching enemy forces,
assess options,and recommend targets for attack to enable the mission. Fires conducted byjoint fire assets
or through the provision of mission orders to the division’s attached combat aviation brigade and field
artillery units at the BCT and division echelons further enable the ability to seize the initiative before the
advancing enemy makes contact with forward defensive positions. The division JAGIC,in coordination with
the BCT fire support cell, plans and coordinates joint fires, suppression of enemy air defenses, airspace
coordination areas, ingress and egress routes, and other airspace requirements to deliver aerial and
surface-delivered fires simultaneously into a given EAor target area.
7-149. Before the enemy closes into direct fire EAs,in either the security area or the MBA,the BCT and
subordinate units direct the initiation of fires. The commander and staff plan to provide the most effective
fires resources and mitigate the risk of fratricide as the attacking enemy nears the designated EA while
supporting air conducts army aviation and close air support attacks. During EA development, fire support
coordination measures, such as TRPs, trigger lines, and final protective fires enable observed fires (see
ATP3-09.30) and the obstacle plan (see ATP 3-90.8) to force the enemy to use avenues of approach covered
by friendly EAs. These shaping operations typically focus on enemy HPTs, such as command and control
nodes,engineer,fire support,and air defense assets and follow-on forces for destruction or disruption.
7-150. Step 7. Rehearse the execution of operations within the EA. The BCT and subordinate units
coordinate and rehearse EA actions on the ground, gaining intimate familiarity with the terrain. The
commander, the S-2, the S-3, engineer planner, and the fire support officer, at a minimum, rehearse the
sequence of events with the subordinate commanders and separate element leaders for each EA.
7-151. During rehearsals, the BCT commander confirms designated TRPs, trigger lines, final protective
fires, EAs, and other direct- and indirect-fire control measures in each EA within the BCT’s area of
operations. Once in position,the commander may modify subordinate unit positions and preplanned control
measures during rehearsals to improve defensive capabilities as required. The commander ensures the
integration of fires by adjusting the planned positions of weapon systems to obtain maximum effectiveness
against targets in the planned EA. The commander coordinates all fires,including those of supporting Army
aviation and close air support,used to isolate the targeted enemy force in theplanned EAwhile preventing
the target’s escape or reinforcement. The BCT and subordinate headquarters rehearse the confliction of fires
to ensure maximum damage before the enemy can respond. The commander rehearses the actions of the
reserve and counterattack forces to reinforce fires,add depth,or block,to restore a position by counterattack,
or to reinforce the destruction of enemy forces within planned EAs.
7-152. Commanders at each echelon rehearse their planned actions within EAs. Subordinate commanders
and leaders reconnoiter and identify positions and identify movement or withdrawal routes and revisethem
as required. Subordinate units rehearse assigned weapon system primary sectors of fire and secondary sectors
of fire to increase the capability of concentrating fire in certain areas in accordance with established criteria
and priorities for engagement. Secondary sectors of fire,when there are no targets in the primary sector or
when commanders need to cover the movement of another friendly element,correspond to another element’s
primary sector of fire to obtain mutual support. Secondary sectors of fire are rehearsed and confirmed
depending on the availability of time before execution. Subordinate commanders may impose and rehearse
additional fire supportcoordinationmeasures as required and as time permits.
PREPARING AN AREA DEFENSE
7-153. The BCT uses time available to build the defense and to refine counterattack plans. The commander
and staff assess unit preparations while maintaining situational awareness of developments in the BCT’s
areas of interest. Collection activities (see chapter 5) begin soon after receipt of the mission and continue
throughout preparation and execution. Security operations are conducted aggressively while units occupy
and prepare assigned positions and rehearse defensive actions. During preparation, surveillance,
reconnaissance, and intelligence operations help improve understanding of the enemy, terrain, and civil
considerations. |
3-96 | 292 | Chapter 7
7-154. Revising and refining the plan is a key activity of preparation. The commander’s situational
understanding may change over the course of operations,enemy actions may require revision of the plan,or
unforeseen opportunities may arise. During preparation,assumptions made during planning may be proven
true or false. Intelligence analysis may confirm or deny enemy actions or show changed conditions in the
area of operations because of shaping operations.
Establish Security
7-155. The first priority in the defense is to establish security. During the defense,effective security requires
the establishment of the security area (forward of the MBA), the employment of patrols and observation
posts,the use of manned and UASsand sensors,and the use of the terrain (cover and concealment). Security
operations, counterreconnaissance, survivability operations, military deception, information-related
capabilities, and CEMAs (specifically EW) counter enemy intelligence, surveillance, and reconnaissance
from determining friendly locations,strengths,and weaknesses.
7-156. Potential threats to the defense may include noncombatant access to communications, digital
cameras, and similar devices. Security measures, such as shutting down telephone exchanges and cell
telephone towers and preventing unauthorized personnel from moving in the BCT’s area of operations may
be required. The BCT should request guidance from higher headquarters before implementing any security
measures that could affect the civilian population.
7-157. As part of the defense, higher headquarters may have created a military deception operation and
associated information operations to protect the force, cause early committal of the enemy, or mislead the
enemy as to the defender’strue intentions,composition,and disposition of friendly forces. The BCT aids in
the preparation and execution of the military deception plan to—
(cid:122) Exploit enemy prebattle force allocation and sustainment decisions.
(cid:122) Exploit the potential for favorable outcomes of protracted minor engagements and battles.
(cid:122) Lure the enemy into friendly territory exposing the enemy’s flanks and rear to attacks.
(cid:122) Mask the level of the sustaining and operational forces committed to the defense.
7-158. A defense containing branches and sequels gives the commander preplanned opportunities to exploit
the situation and around these branches and sequels that deception potentials exist. Specific deceptive actions
the BCT commander can take to hasten exhaustion of the enemy offensive include but are not limited to—
(cid:122) Masking the conditions under which the enemy will accept decisive engagement.
(cid:122) Luring the enemy into a decisive engagement that facilitates the transition sequence.
(cid:122) Employing camouflage,decoys,false radio traffic,movement of forces,and the digging of false
positions and obstacles.
Occupation of Positions
7-159. The BCT commander and staff monitor and deconflict any positioning problems with BCT or higher
headquarters’ reconnaissance and security efforts as units move into their assigned areas of operation and
occupy positions. The BCT may have to make minor adjustments to areas of operation,EAs,battle positions,
and other defensive control measures based on unanticipated conditions the occupying units encountered as
they begin preparing the defense.
7-160. TheABEmonitors units assigned to close gaps or to execute directed obstacles such as demolition
of bridges or dams to assure the units are ready to execute their mission. The ABEalso ensures the units site
and complete all obstacle emplacements within the BCT according to the obstacle plan.
Rehearsals
7-161. The BCT conducts defensive rehearsals as time permits. The commander uses any,or combinations
of, the four types of rehearsals: backbrief, combined arms rehearsal, support rehearsal, and battle drill or
standard operating procedures (SOPs) rehearsal. Each rehearsal type achieves a different result and has a
specific place in the preparation timeline. The commander’s imagination and available resources are the only
limits restricting methods of conducting rehearsals. The BCT commander ensures the integration of attached |
3-96 | 293 | Defense
enabling forces into the defensive scheme of maneuver through rehearsals. (Seechapter 4,section II of this
manual and FM 6-0 for additional information.)
EXECUTING AN AREA DEFENSE
7-162. In an area defense, the BCT concentrates combat power effects against attempted enemy
breakthroughs and flanking movements from prepared and protected positions. The commander uses the
reserve to cover gaps between defensive positions, to reinforce those positions as necessary, and to
counterattack to seal penetrations or block enemy attempts at flanking movements. For discussion purposes,
the following paragraphs divide execution of an area defense into a five-step sequence:
Step 1,Gain and Maintain Enemy Contact
7-163. Gaining and maintaining contact with the enemy is vital to the success of the defense. As the enemy’s
attack begins, the BCT’s initial goals are to identify committed enemy units’ positions and capabilities,
determine the enemy’s intent and direction of attack, and gain time to react. Initially, the commander
accomplishes these goals in the security area. The sources of this type of information include reconnaissance
and security forces,surveillance assets,intelligence operations,and supporting echelons above the BCT. The
commander ensures the distribution of a COP throughout the BCT during the battle to form a shared basis
for subordinate commanders’ actions. The commander uses available information, in conjunction with
judgment,to determine the point at which the enemy is committed to a COA.
Step 2,Disrupt the Enemy
7-164. The commander executes shaping operations to disrupt the enemy. After making contact with the
enemy, the commander seeks to disrupt the enemy’s plan and ability to control its forces. Ideally, the
commander’s shaping operations result in a disorganized enemy force conducting a movement to contact
against a prepared defense. Once the process of disrupting the enemy begins, it continues throughout the
defense. An enemy airborne assault or air assaultin the BCT area of operations must be attacked immediately
with available ground forces and fires before the enemy airhead can be organized and reinforced. The BCT
uses indirect fires, close air support, Army aviation attacks, and other available fires and nonlethal effects
during this phase of the battle to—
(cid:122) Support the security force.
(cid:122) Disrupt or limit the momentum of the enemy’s attack.
(cid:122) Destroy HPTs.
(cid:122) Divert the enemy’s attack.
(cid:122) Deceive the enemy’s knowledge of the BCT’sMBA.
(cid:122) Reduce the enemy’s combat power.
(cid:122) Separate enemy formations.
Step 3,Fix the Enemy
7-165. The commander has several options to fix an attacking enemy force. The commander can design
shaping operations,such as securing the flanks and point of penetration,to fix the enemy and allow friendly
forces to execute decisive maneuver elsewhere. Combat outposts and strong points can deny enemy
movement to or through a given location and as to the exact location of the BCT’sMBA. A properly executed
deception operation can constrain the enemy to a given COA.
Step 4,Maneuver
7-166. The decisive operation occurs in the MBA. This is where the effects of shaping operations,coupled
with sustaining operations, combine with the decisive operation of the MBA force defeat the enemy. The
commander’s goal is to prevent the enemy’s further advance using a combination of fires from prepared
positions,obstacles and reserve forces. To accomplish this,the commander masses effects by maneuvering
forces to focus direct and indirect fires at a critical point to counter the enemy’s attack. |
3-96 | 294 | Chapter 7
7-167. In an area defense, the need for flexibility through movement and maneuver requires the use of
graphic control measures to assist commandand controlduring the repositioning forces and counterattacks.
Specified routes,PLs,attack andsupport by fire positions,battle positions,EAs,TRPs,and other fire support
coordinationmeasures are required to synchronize movement and maneuver.
7-168. During the defense, the BCT commander must prepare to quickly take advantage of fleeting
opportunities, seize the initiative, and assume the offense. Although the BCT commander plans for the
counterattack,the plan may not correspond exactly with the existing situation when the commander launches
the counterattack. As the situation develops,the commander reassesses the plan based on a revised situational
understanding that results from an updated COP.
7-169. Ideally,the commander has a counterattack plan appropriate to the existing situation. When this is
not the case,the commander must rapidly reorganize and refit selected units,move them to attack positions,
and attack or the commander must conduct an attack using those units already in contact with the enemy,
which is normally the least favorable COA.
Step5,Follow Through
7-170. Three conditions may result from the initial enemy attack: friendly forces achieve their objectives,
friendly forces do not achieve their objectives,or both forces are in a stalemate with neither side gaining a
decisive advantage over the other. A successful area defense allows the commander to transition to an attack.
An area defense resulting in the defender being overcome by the enemy attack and needing to transition to a
retrograde operation must consider the current situation in adjacent defensive areas. Only the commander
who ordered the defense can designate a new forward edge of the battle area or authorize a retrograde
operation.
7-171. As the purpose of a defensive action is to retain terrain and create conditions for a counteroffensive
that regains the initiative. A successful area defense causes the enemy to sustain unacceptable losses short of
any decisive objectives. During follow through, time is critical. Unless the commander has a large,
uncommitted reserve prepared to quickly exploit or reverse the situation, the commander must reset the
defense as well as maintain contact with the enemy. Time is also critical to the enemy to reorganize,establish
a security area,and fortify positions.
7-172. The BCT commander plans and conducts a counterattack to attack the enemy when and where the
enemy is most vulnerable. There is a difference between local counterattacks designed to restore the defense
and a decisive operation designed to wrest the initiative from the enemy force and then defeat it. To conduct
a decisive counterattack, the defending force must bring the enemy attack to or past its culminating point
before it results in an unacceptable level of degradation to the defending force. To do this, the defending
force must disrupt the enemy’s ability to mass, causing the enemy to disperse its combat power into small
groups or attrit enemy forces to gain a favorable combat power ratio. The defending force must continue to
disrupt the enemy’s ability to introduce follow-on forces and attack the defender’s sustainment system. (See
figure 7-15.) As the objective of the counterattack is reached, the BCT consolidates and continues
reorganization that is more extensive and begins preparation to resume the offense. |
3-96 | 295 | Defense
Figure 7-15. Counterattack
7-173. In a successful defense,the enemy’s attack is defeated,and the defensive plan must address missions
following successful operations. The division’s follow-on missions for the BCT governsthis plan. The staff
must begin planning for future offensive operations as they develop defensive plans. The commander and
staff must develop maneuver plans,control measures,obstacle restrictions,and sustainment plans that enable
the BCT to quickly transition to follow-on offensive missions or to pass follow-on forces.
MOBILE DEFENSE
7-174. Themobile defenseis a type of defensive operationthat concentrates on the destruction or defeat of
the enemy through a decisive attack by a striking force (ADP 3-90). The mobile defense focuses on defeating
or destroying the enemy by allowing enemy forces to advance to a position that exposes them to a decisive
counterattack by the striking force—a dedicated counterattack force in a mobile defense constituted with the
bulk of available combat power (ADP 3-90). The commander uses the fixing force—a force designated to
supplement the striking force by preventing the enemy from moving from a specific area for a specific time
(ADP 3-90)—to help channel attacking enemy forces into EAs and to retain areas from which to launch the
striking force. (See figure 7-16on page 7-48.) A mobile defense requires an area of operations of considerable
depth. The commander must be able to shape the battlefield,causing an enemy force to overextend its lines
of communication,expose its flanks,and risk its combat power. Likewise,the commander must be able to
move friendly forces around and behind the enemy force,cut them off,and destroy them. (See figure 7-17 |
3-96 | 296 | Chapter 7
on page 7-49.) Divisions and larger formations normally execute mobile defenses. However, BCTs and
maneuver battalions may participate in a mobile defense as part of the fixing force or thestriking force. (See
FM 3-90-1 for additional information.)
Figure 7-16. Mobile defense, fixing force |
3-96 | 297 | Defense
Figure 7-17. Mobile defense, committed striking force
RETROGRADE
7-175. A retrograde is a type of defensive operation that involves organized movement away from the
enemy (ADP3-90). The enemy may force the retrograde or a commander may execute it voluntarily. The
three variations of the retrograde are: delay,withdraw,and retirement.
DELAY
7-176. A delay is when a force under pressure trades space for time by slowing down the enemy’s
momentum and inflicting maximum damage on enemy forces without becoming decisively engaged
(ADP3-90). Delays allow units to yield ground to gain time while retaining flexibility and freedom of action
to inflict the maximum damage on the enemy. The methods are delay from successive positions and delay
from alternate positions. The BCT conducts the delay by using one or a combination of the two methods. The
method selected depends on the width of the front,the terrain,the forces available,the enemy,and the amount
of time required of the delay. In either method,a mobility advantage over the enemy is required.
Delay from Successive Positions
7-177. A delay from successive positions involves fighting rearward from one position to the next,holding
each as long as possible orfor a specified time (figure 7-18on page 7-50). In this type of delay,all maneuver
battalions are committed on each of the BCT delay positions or across the area of operations on the same PL.
The BCT commander uses a delay from successive positions when an area of operations is so wide that
available forces cannot occupy more than a single line of positions. The disadvantages of this delay are lack
of depth,less time to prepare successive positions,and the possibility of gaps between units. |
3-96 | 298 | Chapter 7
7-178. When ordered to move,the BCT disengages,then moves and occupies the next designated position.
A part of the unit displaces directly to the rear when the order to begin the delay is received and occupies the
next designated position. The rest of the unit maintains contact with the enemy between the first and second
delay positions. As these elements pass through the second position,the forces on that position engage the
enemy at the greatest effective range. When the BCT can no longer hold the position without becoming
decisively engaged, it moves to the next successive position. When conducting a delay from successive
positions, the BCT may retain a reserve if the division has none. The reserve will frequently be small and
employed as a counterattacking force. It protects a threatened flank, secures vital rear areas, or provides
overwatch fires to a withdrawing unit.
Figure 7-18. Delay from successive positions |
3-96 | 299 | Defense
Delay from Alternate Positions
7-179. Delay from alternate positions can be used when a force has a narrow area of operations or has been
reinforced to allowpositioning in-depth (see figure 7-19). This is the preferred method of delay. One or more
maneuver units employ this method to occupy the initial delay position and engage the enemy. Other
maneuver units occupy a prepared second delay position. These elements alternate movement in the delay.
While one element is fighting, the other occupies the next position in-depth and prepares to assume
responsibility for the fight.
7-180. Units occupying the initial delay position can delay between it and the second position. When the
delaying units arrive at the second delay position, they move through or around the units that occupy the
second delay position. The units on the second delay position assume responsibility for delaying the enemy;
the delaying procedure is then repeated. Moving around theunit on the next delay is preferred because this
simplifies passage of lines. The alternate method provides greater security to the delay force and more time
to prepare and improve delay positions. Normally, when delaying from alternate positions, the BCT
commander does not maintain a reserve. The forces not in contact with the enemy are available to function
in the role of a reserve if needed.
Figure 7-19. Delay from alternate positions |
3-96 | 300 | Chapter 7
WITHDRAW
7-181. Withdraw is to disengage from an enemy force and moves in a direction away from the enemy
(ADP3-90). Withdrawing units, whether all or part of a committed force, voluntarily disengage from the
enemy to preserve the force or release it for a new mission. The purpose of a withdrawal is to remove a unit
from combat,adjust defensive positions,or relocate forces. A withdrawal may free a unit for a new mission.
A unitmay execute a withdrawal at any time and during any type of operation.
7-182. BCTs normally withdraw using a security force,a main body,and a reserve. There are two types of
withdrawals, assisted and unassisted. In an assisted withdrawal, the next higher headquarters provides the
security forces that facilitate the move away from the enemy. In an unassisted withdrawal,the BCT provides
its own security force. Withdrawals are generally conducted under one of two conditions, under enemy
pressure and not under enemy pressure. Regardless of the type or condition under which it is conducted,all
withdrawals share the following planning considerations:
(cid:122) Keep enemy pressure off the withdrawing force. Position security elements to delay the enemy.
Emplace obstacles andcover by fire to slow its advance.
(cid:122) Maintain security. Know the enemy’s location and its possible COAs. Observe possible enemy
avenues of approach.
(cid:122) Gain a mobility advantage. Gain the advantage by increasing the mobility of the BCT,reducing
the mobility of the enemy,or both.
(cid:122) Reconnoiter and prepare routes. Each unit must know the routes or lanes of withdrawal. Establish
priority of movement and traffic control if two or more units move on the same route.
(cid:122) Withdraw nonessential elements early. Withdrawing nonessential elements early may include
some command and control and sustainment elements.
(cid:122) Move during limited visibility. Movement under limited visibility provides concealment for the
moving units and reduces the effectiveness of enemy fires.
(cid:122) Concentrate all available fires on the enemy. Alternate movement between elements so some of
the force can always place direct or indirect fires on the enemy.
7-183. Withdrawing under enemy pressure demands superior maneuver,firepower,and control. The BCT
executes a withdrawal in the same manner as a delay,although its ultimate purpose is to break contact with
the enemy rather than maintain it as in the delay. When conducting a withdrawal under enemy pressure,the
commander organizes the BCT into a security force and a main body. Use control measures that facilitate the
accomplishment of the commander’s intent. These control measures may include areas of operations,battle
positions,PLs,routes,passage points and lanes,contact points,checkpoints,and battle handover lines.
7-184. Success depends on facilitating the disengagement of the main body by massing its own fires and
the overwatch fires provided by the security element. The division commander may place adjacent units in
overwatch or require them to conduct security operations or limited counterattacks to support the
withdrawing BCT. To assist withdrawing elements, the security force must be strong enough to detect and
engage the enemy on all avenues of approach. The BCT may form its own security force from forward
maneuver battalion elements or the Cavalry squadron. The security force must:
(cid:122) Stop,disrupt,disengage,or reduce the enemy’s ability to pursue.
(cid:122) Reduce,through smoke and suppressive fires,the enemy’s capability to observe the movementof
the main body.
(cid:122) Rapidly concentrate additional combat power in critical areas.
7-185. As the commander gives the order to withdraw,the BCT must engage the enemy with concentrated
direct and indirect fire to enable the withdrawing force to disengage,conduct a rearward passage through the
security force, assemble, and move to their next position. The security force assumes the fight from the
forward elements. This includes delaying the enemy advance while the bulk of the BCT conducts movement
to the rear. On order,or when the BCT meets other predetermined criteria,the security force disengages itself
and moves to the rear as a rear guard. Depending on the BCT’s next mission, the security force may be
required to maintain contact with the enemy throughout the operation.
7-186. When the BCT conducts a withdrawal not under enemy pressure, it must plan as though enemy
pressure is expected,and then plan for a withdrawal without pressure. Withdrawal not under enemy pressure |
3-96 | 301 | Defense
requires the formation of a detachment left in contact (DLIC). Reconnaissance, security,and deception are
critical to conducting a withdrawal not under enemy pressure. The commander must knowthe activities and
movements of any enemy in the area that could influence the operation. The commander ensuresthe security
of the force against surprise and projects the impression of conducting operations other than a withdrawal. If
the enemy becomes aware that the BCT is withdrawing,the enemy may choose to exploit the BCT’s relative
vulnerability by attacking or employing indirect fires against elements in movement. Therefore, deception
and operations security measures are essential to the success of a withdrawal not under enemy pressure.
These measures include—
(cid:122) Maintaining the same level of communications.
(cid:122) Continuing the use of patrols.
(cid:122) Moving during limited visibility.
(cid:122) Maintaining the same level of indirect fires.
(cid:122) Avoiding compromise of the operation by radio.
(cid:122) Maintaining noise and light discipline.
(cid:122) Using the DLIC to simulate or continue normal activities.
7-187. Adetachment left in contactis an element left in contact as part of the previously designated (usually
rear) security force while the main body conducts its withdrawal (FM 3-90-1). The DLIC is a force organized
from within the BCT that maintains contact with the enemy while the majority of the BCT withdraws. The
DLIC usually comprises one third of the available combat power. A BCT may direct that three maneuver
companies, augmented with the necessary combat power and increased mobility and firepower, form the
DLIC.
7-188. Two techniques for organizing the DLIC are designating one maneuver battalion as the DLIC or
forming a new organization under the BCT S-3. When one maneuver battalion forms the DLIC,it repositions
its forcethrough a series of company-sizedrelief in place operations with companies in the other maneuver
battalion’s areas of operations. The advantages of this technique arethat command and control is facilitated
by the organic nature of the units involved and the focus of the force as a whole is dedicated toward one
mission maintaining contact and preparing to fight a delay, if necessary. The disadvantages are the time
needed to reposition and the increased amount of movement in the area of operations that may signal a
vulnerability to the enemy.
7-189. Forming a new organization under a new controlling headquarters also has advantages and
disadvantages. The advantages are that the units of the DLIC may have to do less repositioning and some
may not have to move at all. This advantage helps to deceive the enemy as to the intentions of the BCT. The
disadvantage is that the unit’s ability to fight as a team decreases if the organization is ad hoc in nature. This
organization must train together to avoid this disadvantage.
RETIREMENT
7-190. Aretirementiswhena force out of contact moves away from the enemy (ADP 3-90). A retirement
is conducted as a tactical movement to the rear. The brigade may move on one or more routes depending on
the routes available. Security for the main body is similar to that for a movement to contact using advance,
flank,and rear guards. As in all tactical movements,all round security must be maintained. In all retrograde
operations,control of friendly maneuver elements is a prerequisite for success. A withdrawal may become a
retirement once forces have disengaged from the enemy,and the main body forms march columns.
7-191. The BCT conducts retrograde operations to improve a tactical situation or to prevent defeat.
Retrograde operations accomplish the following:
(cid:122) Resist,exhaust,and defeat enemy forces.
(cid:122) Draw the enemy into an unfavorable situation.
(cid:122) Avoid contact in undesirable conditions.
(cid:122) Gain time.
(cid:122) Disengage a force from battle for use elsewhere in other missions. |
3-96 | 302 | Chapter 7
(cid:122) Reposition forces, shorten lines of communication, or conform to movements of other friendly
units.
(cid:122) Secure terrain that is more favorable.
SECTION VI – TRANSITION
7-192. Transitions between tasks during decisive action whether anticipated or unanticipated require
adaptability as the BCT commander copes with changes in the operational environment. During transition
and operating with mission orders, subordinate leaders take disciplined initiative within the commander’s
intent, bounded by the Army Ethic. The commander considers the concurrent conduct of each task—
offensive,defensive,and stability—in every phase and ongoing operation. Transition between tasks during
decisive action require careful assessment,prior planning,and unit preparation as the commander shifts the
combinations of offensive,defensive,and stability operations.
7-193. The BCT commander halts the defense only when the operation accomplishes the desired end state,
reaches a culminating point or receives a change of mission from higher headquarters. Transitions mark a
change of focus between phases or between the ongoing operation and execution of a branch or sequel. In
the defense, the BCT and subordinate units often transition from one phase of the operation to another
sequentially or simultaneously. In decisive action,it is common for subordinate units of the BCT to transition
to the offense and operations focused on stability,while maintaining the defense with other subordinate units.
7-194. The commander deliberately plans for sequential operations, assisting the transition process and
allowing the setting of the conditions necessary for a successful transition. Such planning addresses the need
to control the tempo of operations,maintain contact with both enemy and friendly forces,and keep the enemy
off balance. The BCT establishes the required organization of forces and control measures based on the
mission variables of METT-TC.
7-195. Prior contingency planning decreases the time needed to adjust the tempo of combat operations when
a unit transitions from the defense to the offense or operations focused on stability. It does this by allowing
subordinate units to simultaneously plan and prepare for subsequentoperations.
TRANSITION TO THE CONDUCT OF OFFENSIVE OPERATIONS
7-196. The BCT or higher commander may order an attack, a movement to contact, or participate in an
exploitation and subsequent pursuit if conditions are suitable. The commander transitions to the offense as
soon as possible to attack the enemy when it is most vulnerable. The commander does not want to give the
enemy time to prepare.
7-197. A defending commander transitioning to the offense anticipates when and where the enemy force
will reach its culminating point or when it will require an operational pause before it can continue. At those
moments,the combat power ratios most likely favor the defending force. The actions which may indicate the
enemy has reached its culminating point include transitioning to the defense, heavy losses, lack of
sustainment to continue the mission,unexpected success of friendly operations,increased enemy prisoners
of war,and a lack of coherence and reduced combat power in the enemy’s attacks.
7-198. The BCT commander must be careful not to be the target of enemy information activities designed
to encourage the commander to abandon the advantages of fighting from prepared defensive positions. The
commander ensures the force has the assets necessary to complete its assigned offensive mission. The
commander should not wait too long to transition from the defense to the offense as the enemy force
approaches its culminating point. The BCT must disperse, extend in-depth, and weaken enemy forces. At
that time,any enemy defensive preparations will be hasty and enemy forces will not be adequately disposed
to defend. The BCT commander wants the enemy in this posture when the force transitions to the offense.
The commander does not want to give the enemy force time to prepare the defense. Additionally, the
psychological shock on enemy soldiers will be greater if they suddenly find themselves desperately defending
on new and often unfavorable terms,while the commander’s own Soldiers will enjoy a psychological boost
by going on the offense. |
3-96 | 303 | Defense
7-199. A commander can use two basic methods when transitioning to the offense. The first,and generally
preferred, method is to attack using forces not previously committed to the defense. This method has the
advantage of using rested units at a high operational strength. A drawback to this method is the requirement
to conduct a forward passage of lines. Additionally,enemy intelligence assets are likely to detect the arrival
of significant reinforcements. Another consideration of using units not in contact occurs when they are
operating in noncontiguous areas of operations. The commander rapidly masses overwhelming combat power
in the decisive operation. This might require the commander to adopt economy of force measures in some
areas of operations while temporarily abandoning others to generate sufficient combat power.
7-200. The other method is to conduct offensive actions using the currently defending forces. This method
has the advantage of being more rapidly executed and thus more likely to catch the enemy by surprise. Speed
of execution in this method results from not having to conduct an approach or tactical road march from
reserve assembly areas or,in the case of reinforcements,move from other area of operations and reception,
staging, organization, and integration locations. Speed also results from not having to conduct a forward
passage of lines and perform the liaison necessary to establish a COP that includes knowledge of the enemy
force’s patterns of operation. The primary disadvantage of this method is that the attacking force generally
lacks stamina and must be quickly replaced if friendly offensive actions are not to culminate quickly.
7-201. If units in contact participate in the attack,the commander must retain sufficient forces in contact to
fix the enemy. The commander concentrates the attack by reinforcing select subordinate units so they can
execute the attack and, if necessary, maintain the existing defense. The commander can also adjust the
defensive boundaries of subordinate units so entire units can withdraw and concentrate for the attack.
7-202. The commander conducts any required reorganization and resupply concurrently with transition
activities. This requires a transition in the sustainment effort, with a shift in emphasis from ensuring a
capability to defend from a chosen location to an emphasis on ensuring the force’s ability to advance and
maneuver. For example,in the defense,the sustainment effort may have focused on the forward stockage of
class IV (construction and barrier materials) and class V (ammunition) items and the rapid evacuation of
combat damaged systems. In the offense, the sustainment effort may need to focus on providing POL and
forward repair of maintenance and combat losses. Transition is often a time in which forces perform deferred
equipment maintenance. Additional assets may also be available on a temporary basis for casualty evacuation
and medical treatment because of a reduction in the tempo of operations.
TRANSITION TO THE CONDUCT OF STABILITY OPERATIONS
7-203. During the transition to operations focused on stability,the role of the BCT varies greatly depending
upon the security environment,the authority and responsibility of the BCT,and the presence and capacities
of other nonmilitary actors. When transitioning from the defense, these other actors will normally be less
established before stability operations tasks begin. The BCT in this casewill operate before other actors have
a significant presence. Generally, the BCT will focus on meeting the immediate essential service and civil
security needs of the civilian inhabitants of the area of operations in coordination with any existing
host-nation government and nongovernmental organizations before addressing the other stability operations
tasks. (See chapter 8.) Support requirements may change dramatically. During transition, the commander
may adjust rules of engagement or their implementation. The commander must effectively convey these
changes to the lowest level.
7-204. The BCT must remain versatile and retain flexibility when transitioning from the defense to
operations focused on stability. The commander may plan on order transition to a stability-focusedmission
when certain conditions are met. These conditions may include a sharp reduction of the enemy’s offensive
capabilities or deterioration in civilian governance and security. These conditions may require the rapid
occupation and security of civilian areas. The commander must make every attempt to begin transition
operations as soon as subordinate units of the BCT arrive within an assigned area of operations.
7-205. BCT subordinate units and Soldiers must be aware that during the transition to operations focused
on stability,there may be events that escalate to combat. The BCT must always retain the ability to conduct
offense and defense during transition. Preserving the ability to transition allows the commander to maintain
initiative while providing security. The commander should consider planning an on-order offensive and |
3-96 | 304 | Chapter 7
defensive contingency in case the transition to operations focused on stability deteriorates. Subordinate
commanders and leaders must be well-rehearsed to recognize activities that would initiate these contingences. |
3-96 | 305 | Chapter 8
Stability
The requirement for military formations to conduct operations focused on stability is
not new. Our involvement in military conflict from the Revolutionary War to Operation
Enduring Freedom consists of only eleven conventional military operations.
Conversely, that same history reveals hundreds of operations focused on stability with
recent history proving no different. Since the fall of the Berlin Wall, the United States
led or participated in over fifteen operations in places such as Haiti, Liberia, Somalia,
the Balkans, Iraq, and Afghanistan. While the magnitude of violence may not match
conventional operations, history often measures the duration of stability operations in
decades. This fact combines with the disturbing spread of international terrorism,
fragile states allowing safe haven to terrorist organizations and or possessing weapons
of mass destruction (WMD), along with an endless array of humanitarian and natural
disasters illustrates the increasing requirement for operations focused on stability.
Military formations conduct operations focused on stability to transition the security
and governance of populations to legitimate civilian authorities. The brigade combat
team (BCT) lacks the organic capability to stabilize an assigned area of operations
independently. The BCT’s central role in operations focused on stability is to establish
and maintain unity of effort towards achieving the political objectives of the operation.
To do this the BCT employs combined arms formations that execute offensive and
defensive operations, and stability operations tasks to identify and mitigate critical
sources of instability. Essentially, the BCT unifies governmental, nongovernmental,
and elements of the private sector activities with military operations to seize, retain,
and exploit the initiative and consolidate gains.
The first three sections of this chapter discuss the doctrinal foundation, stability
environment, and the Army’s six stability operations tasks for operations focus on the
stability element of decisive action. Sections IV and V focus on the challenges
confronting the BCT commander and staff and subordinate commanders and leaders
in accomplishing stability-focused missions or tasks, specifically area security
operations and security force assistance (SFA). The final section addresses transition
to offensive or defensive operations if the focus of the operation changes from stability.
This section concludes with a discussion of transitions during SFA.
SECTION I – FOUNDATION FOR OPERATIONS FOCUSED ON STABILITY
8-1. Stability ultimately aims to establish conditions the local populace regards as legitimate, acceptable,
and predictable. Stabilization is a process in which personnel identify and mitigate underlying sources of
instability to establish the conditions for long-term stability. Stability operations tasks focus on identifying
and targeting the root causes of instability and building the capacity of local institutions. Army forces
accomplish stability missions and perform tasks across the range of military operations and in coordination
with other instruments of national power. Stability missions and tasks are part of broader efforts to establish
and maintain the conditions for stability in an unstable area before or during hostilities, or to re-establish
enduring peace and stability after open hostilities cease. |
3-96 | 306 | Chapter 8
FUNDAMENTALS OF STABILIZATION
8-2. The BCT applies the fundamentals of stabilization to the offense, defense, and operations focused on
stability to achieve political and military objectives. (See ADP 3-07 for additional information.) The
following fundamentals of stabilization lay the foundation for long-term stability:
(cid:122) Conflict transformation.
(cid:122) Unity of effort.
(cid:122) Build host-nation capacity and capabilities.
(cid:122) Host-nation ownership and legitimacy.
CONFLICT TRANSFORMATION
8-3. Conflict transformation is the process of converting the actors and conditions that motivate violent
conflict into the governmental process to address the causes of instability. Conflict transformation sets the
host nation on a sustainable, positive trajectory in which transformational processes directly address the
dynamics causing instability. The use of the BCT in a combat role serves as a temporary solution until the
situation is stabilized and host-nation forces are able to provide security for the populace. In all cases, the
combat role supports the host nation’s ability to provide for its internal security and external defense.
UNITY OF EFFORT
8-4. Military operations typically demand unity of command. The challenge for military and civilian leaders
is to forge unity of effort or unity of purpose among the diverse array of actors involved in an operation
focused on stability. This is the essence of unified action—the synchronization, coordination, and/or
integration of the activities of governmental and nongovernmental entities with military operations to achieve
unity of effort (JP 1). Unity of effortis the coordination and cooperation toward common objectives, even if
the participants are not necessarily part of the same command or organization, which is the product of
successful unified action (JP 1). Unity of effort is fundamental to successfully incorporating all the
instruments of national power in a collaborative approach when conducting stability operations tasks during
military operations.
8-5. When countering insurgency an example of unity of effort could be a military commander and a
civilian leader ensuring that governance and economic lines of effort are fully coordinated with military
operations. Unity of effort among nationally, culturally, and organizationally distinct partners is difficult to
maintain, given their different layers of command.Achieving unity of effort requires participants to overcome
cultural barriers and set aside parochial agendas. It also requires that each organization understand the
capabilities and limitations of the others.
BUILDING HOST-NATION CAPACITY AND CAPABILITIES
8-6. Building host-nation capacity and capabilities is the outcome of comprehensive inter-organizational
activities, programs, and military-to-military engagements that enhance the ability of partners to establish
security, governance, economic development, essential services, rule of law, and other critical government
functions. The Army integrates capabilities of operating forces and the institutional force to support
interorganizational capacity and capabilities-building efforts, primarily through security cooperation
interactions. The institutional force advises and trains partner army activities to build institutional capacity
for professional education, force generation, and force sustainment. Army integrates capabilities of operating
forces and the institutional force to support interorganizational capacity and capabilities-building efforts,
primarily through security cooperation interactions. BCTs apply a comprehensive approach to sustained
engagement with foreign and domestic partners to co-develop mutually beneficial capacities and capabilities
to address shared interests.
8-7. Unified action is an indispensable feature of building host-nation capacity and capabilities. In
operations characterized by stability operations tasks, unified action to enhance the ability of partners for
security, governance, economic development, essential services, rule of law, and other critical government
functions exemplifies building host-nation capacity and capabilities. Building the capacity and capability,
during SFA, of foreign security forces (FSF) and their supporting institutions is normally the primary focus |
3-96 | 307 | Stability
of security force assistance brigades (known as SFABs). On occasion, the BCT as a whole or selected unit(s)
of the BCT may support SFA activities. SFA will encompass various activities related to the organizing,
equipping, training, advising, and assessing of FSF and their supporting institutions. SFA activities conducted
by SFABs and BCTs build host nation capacity and capabilities to defend against internal, external, and
transnational threats to stability. (See FM 3-22 for additional information.)
HOST-NATION OWNERSHIP AND LEGITIMACY
8-8. Ownership and legitimacy is a condition based upon the perception by specific audiences of the
legality, morality, or rightness of aset of actions, and of the propriety of the authority of the individuals or
organizations in taking them. Legitimacy enables host nation ownership by building trust and confidence
among the people. The foundation of ownership and legitimacy affects every aspect of operations from every
conceivable perspective. Ownership of the mission and legitimacy of the host-nation government enables
successful operations characterized by stability operations tasks.
8-9. Security sector reform is a comprehensive set of programs and activities undertaken by way a host
nation to improve the way it provides safety, security, and justice (JP 3-07).
Note. Security sector reform can be an activity conducted during security cooperation (see
paragraph 8-112).
8-10. The BCT’s primary role in security sector reform is to support the reform, restructuring, or
re-establishment of the armed forces and the defense sector across the range of military operations. The
overall objective is to support in a way that promotes an effective and legitimate host-nation government and
its ownership of the mission that is transparent, accountable, and responsive to civilian authority. (See
ADP3-07 for additional information.)
STABILIZATION FRAMEWORK
8-11. A stabilization framework based on conditions within the area of operations of initial response,
transformation, and fostering sustainability, helps the BCT determine the required training and task
organization of forces before initial deployment, and serves as a guide to actions in an operation focused on
stability operations tasks. A BCT deployed into an area of operations where the local government is
nonexistent may conduct a set of tasks while another BCT may conduct another set of tasks in an area of
operations with a functioning local government. The phases described in the following paragraphs facilitate
identifying lead responsibilities and determining priorities. (See FM 3-07 for additional information.)
INITIAL RESPONSE PHASE
8-12. Initial response actions generally reflect activity executed to stabilize a crisis state in the area of
operations. The BCT typically performs initial response actions during, or directly after, a conflict or disaster
in which the security situation prohibits the introduction of civilian personnel. Initial response actions aim to
provide a secure environment that allows relief forces to attend to the immediate humanitarian needs of the
local population. They reduce the level of violence and human suffering while creating conditions that enable
other actors to participate safely in relief efforts.
TRANSFORMATION PHASE
8-13. Stabilization, reconstruction, and capacity building are transformation actions performed in a relatively
secure environment. Transformation actions occur in either crisis or vulnerable states. These actions aim to
build host nation capacity across multiple sectors. Transformation actions are essential to the continuing
stability of the environment and foster sustainability within the BCT’s area of operations. |
3-96 | 308 | Chapter 8
FOSTERING SUSTAINABILITY PHASE
8-14. Fostering sustainability actions are those activities that encompass long-term efforts, which capitalize
on capacity building and reconstruction. Successful accomplishment of these actions establishes conditions
that enable sustainable development. Usually military forces perform fostering sustainability phase actions
only when the security environment is stable enough to support efforts to implement the long-term programs
that commit to the viability of the institutions and economy of the host nation. Often military forces conduct
these long-term efforts to support broader, civilian led efforts.
COMPREHENSIVE APPROACH
8-15. A comprehensive approach to achieve unity of effort during stability operations tasks requires
contributions from a variety of partners outside the United Statesand the U.S. Government. These partners
include foreign military and police forces, nongovernmental organizations, international organizations,
host-nation organizations, news media, and businesses. Many partners have no formal relationship with Army
units but are, nevertheless, instrumental in achieving the desired outcomes. Army units must interact
effectively with these partners to exchange information and strive for unified action. Army units demonstrate
to the host nation and international community through action its character, competence, and commitment to
adhere to and uphold the Army Ethic.
8-16. When developing an operational approach, commanders consider methods to employ a combination
of defeat mechanisms and stability mechanisms. Defeat mechanisms relate to offensive and defensive
operations (see chapters 6 and 7). Stability mechanisms relate to stability operations tasks, security, and
consolidating gains in an area of operations. Planning operations related to stability mechanisms employed
by the BCT requires a comprehensive approach, as well as an in-depth understanding of the stability
environment (see paragraph 8-18). Planning must be nested within policy, internal defense and development
(IDAD) strategy, the campaign plan, and any other higher-echelon plans. Continuous and open to change,
planning includes identifying how to best assist the FSF and developing a sequence of actions to change the
situation. Planning involves anticipating consequences of actions and developing ways to mitigate them to
attain conditions that support establishing a lasting, stable peace.
Note. IDAD focuses on building viable institutions (political, economic, social, and military) that
respond to the needs of society. Ideally, IDAD is a preemptive strategy. However, if an insurgency
or other threat develops, it becomes an active strategy to combat that threat. To support the host
nation effectively, U.S. forces, especially planners, consider the host-nation’s IDAD strategy.
8-17. Considering the elements of operational art (the cognitive approach by commanders and staffs—
supported by their skill, knowledge, experience, creativity, and judgement, see ADP 3-0) provides the BCT
commander and staff with a combination of conventional forces while leveraging the unique capabilities of
special operations forces, to assist in achieving operations focused on stability. The planning for and selection
of the appropriate mix of military forces, civilian expeditionary workforce, or civilian personnel and
contractors should be a deliberate decision based on thorough mission analysis and a pairing of available
capabilities to requirements. Important factors to consider in these decisions include the nature of the
host-nation force, the nature of the skills or competencies required by the host-nation force, and the nature of
the situation and environment into which the BCT will deploy.
SECTION II – STABILITY ENVIRONMENT
8-18. Operations focused on stability, range across all military operations and offer perhaps the most diverse
set of circumstances the BCT faces. The objective of operations focused on stability is to create conditions
that the local populaceregards as acceptable in terms of violence; the functioning of governmental, economic,
and societal institutions; and adhere to local laws, rules, and norms of behavior. During unified land
operations, the BCT provides the means for seizing and retaining initiative through partnership with
associated enabling organizations that are better suited to bring stability to the operational environment. To
successfully seize, retain, and exploit the initiative and consolidate gains in operations focused on stability: |
3-96 | 309 | Stability
the BCT must identify and mitigate sources of instability, understand and nest operations within political
objectives, and achieve unity of effort across diverse organizations.
SOURCES OF INSTABILITY
8-19. The BCT conducts information collection to gain a detailed understanding of the sources of instability,
and the capability and intentions of key actors within its area of operations. Sources of instability are actors,
actions, or conditions that exceed the legitimate authority’s capacity to exercise effective governance,
maintain civil control, and ensure economic development. Enemy forces leverage sources of instability to
create conflict, exacerbate existing conditions, or threaten to collapse failing or recovering states. Examples
of sources of instability include but are not limited to—
(cid:122) Ungoverned areas.
(cid:122) Religious, ethnic, economic, political differences among the local population.
(cid:122) Natural disasters.
(cid:122) Resource scarcity.
(cid:122) Individual disrupting legitimate governance.
(cid:122) Degraded infrastructure.
(cid:122) Economic strife.
(cid:122) Immature, undeveloped or atrophied systems.
(cid:122) Ineffective or corrupt host-nation security forces.
8-20. The BCT commander and staff must apply the same fundamental planning processes in the military
decision-making process (MDMP) and the intelligence preparationof the battlefield (IPB) process to identify
the tactical problem, and conduct information collection to fulfill priority intelligence requirements or
identified information gaps. Critical thinking, innovative problem solving, and leveraging different tools to
address these tactical problems assists the BCT commander and staff in identifying sources of instability.
Thorough analysis, engaging with local leaders and populations, leveraging unified action partners, and
research are standard methods used to identify sources of instability. The commander and staff consider
operational variables (in coordination with division and corps staffs) and mission variables, with emphasis
on civil considerations, to gain an understanding of the interests and motivations particular to different groups
and individuals to enhance situational understanding.
8-21. Interactions of various actors affect the BCT’s operational environment in terms of operational and
mission variables. Some of these actors include the following:
(cid:122) Unified action partners.
(cid:122) Nongovernmental organizations.
(cid:122) Private volunteer organizations.
(cid:122) International and private security organizations.
(cid:122) Media.
(cid:122) Multinational corporations.
(cid:122) Transnational criminal organizations.
(cid:122) Insurgents.
(cid:122) Violent extremist organizations.
(cid:122) Tribes,clans, and ethnic groups indigenous to the area of operations.
(cid:122) Regional influences such as other nation states.
8-22. The commander and staff consider alternative perspectives and approaches to the ones used in offense
and defense. The BCT analyzes sources of instability from both the local, indigenous perspective and the
U.S. military perspective to understand the differences between viewpoints. During the IPB, the BCT
identifies key actors and their interests or agendas. Additionally, the BCT analyzes how these key actors
influence the local civil capacity; this analysis drives the BCT’s planning effort that addresses
accomplishment of stability operations tasks. Staffs conduct preparation to understand unique aspects of
operations focused on stability. For example, the brigade assistant engineer might conduct an assessment on
the local electrical grid system of an assigned area of operations or the brigade surgeon or medical planner |
3-96 | 310 | Chapter 8
may conduct an assessment on host-nation medical facilities and their capacity before employment to an
assigned area of operations. This staff specific assessment further enables the conduct of the six stability
operations tasks (see section III) and makes the BCT’s planning effort during operations focused on stability
more informedand efficient.
8-23. Once the commander and staff possess an understanding of the operational environment, the BCT
applies a mixture of stability mechanisms to set conditions to retain and exploit stabilizing factors. A stability
mechanismis the primary methodthrough which friendly forces affect civilians in order to attain conditions
that support establishing a lasting, stable peace. Stability mechanisms relate to stability operations, security,
and consolidating gains in an area of operations. The four stability mechanisms are compel, control,
influence, and support. Combinations of stability mechanisms produce complementary and reinforcing
outcomes that accomplish the mission more effectively and efficiently than single mechanisms do alone.
8-24. The BCT simultaneously uses stability mechanisms such as compel and control to assist with seizing
initiative. Compel means to use, or threaten to use, lethal force to establish control and dominance, effect
behavioral change, or enforce compliance with mandates, agreements, or civil authority. Control means to
impose civil order. Offensive operations reveal and exploit enemy weaknesses by defeating, destroying, or
neutralizing threat forces. These actions disrupt threat forces, prevent them from negatively influencing
populations, and provide opportunities to continue exploiting weaknesses—but they are not decisive by
themselves. The design of these actions should consider how and what they compel the population to do and
whether or not the action will result in positive, neutral or negative support by the population in the long-and
short-term. (See ADP 3-0 for additional information.)
UNDERSTANDING POLITICAL OBJECTIVES
8-25. Understanding political objectives frames the unique operations required to conduct stability
operations.General political objectives are broad and conceptual in nature, but they give contextual guidance
that informs the expanded purpose of the echelons above the BCT commander’s intent. Political objectives
may shift and change as the operational environment changes. That same guidance unifies or alienates
partners that may fall outside of the military chain of command.
8-26. Given the inherently complex and uncertain nature of political objectives, the BCT commander and
staff use the Army design methodology (see chapter 4) to help understand the root cause of instability and
approaches to solve problems. The Army design methodology entails framing an operational environment,
framing the problem, and developing an operational approach to solve the problem. The Army design
methodology results in an improved understanding of an operational environment. Based on this improved
understanding, the commander issues planning guidance, to include an operational approach, to guide more
detailed planning using the MDMP (see chapter4).
8-27. Incorporating political objectives into the planning process (see chapter 4) is a shared task amongst the
BCT staff. Each staff officer understands the general and specific political objectives and the commander’s
intent two levels up of an assigned operation focused on stability and considers the implications and effects
of the political objectives when presenting the commander with running estimates, courses of action (COAs)
and other decision support staff products. The BCT staff must understandhow to communicate general and
specific political objectives into the themes and messages delivered in the operation order and fragmentary
orders that Soldiers display through their actions. These political objectives must translate across the entirety
of the operational environment yet be understood by subordinate units allowing them to affect the local
population’s perception.
ACHIEVE UNITY OF EFFORT ACROSS DIVERSE ORGANIZATIONS
8-28. BCT commanders and staffs must understand how to build relationships with many diverse
organizations within an area of operations. These relationships allow the BCT to nest operations with both
their higher headquarters and with the overall U.S. effort within the joint operational area. A
whole-of-government approach, along with collaboration and cooperation with unified action partners—
those military forces, governmental and nongovernmental organizations, and elements of the private sector
with whom Army forces plan, coordinate, synchronize, and integrate during the conduct of operations |
3-96 | 311 | Stability
(ADP3-0)—are key components of operations focused on stability. The BCT staff incorporates personnel
from these organizations into the operations process as soon as possible.
8-29. By building relationships, the BCT reinforces the legitimacy of the BCT operation. Legitimacy is of
great importance with stability operations. Military activities must sustain the legitimacy of the operation and
of the local emerging or host government. Having a just cause, and establishing and sustaining trust affects
several relationships: trust with the American people; trust within the unified force; trust with allies,
governmental and nongovernmental organizations, and coalition partners; trust with the host nation
government; and trust with the indigenous population. Restraint in the disciplined and ethical application of
lethal force has a significant influence on those relationships of trust and legitimacy of the operation. There
is a direct relationship between restraint, protection of noncombatant civilians and legitimacy in any military
operation, but especially in stability operations.
MILITARYPOLICE
8-30. Mission tailored military police support to the BCT integrates police intelligence operations (see
ATP3-39.20) throughout the offense, the defense, and operations focused on stability. Police intelligence
operations address the reality that, in some operational environments, the threat is more criminal than
conventional in nature. In those environments, it is not uncommon for members of armed groups, insurgents,
and other belligerents to use or mimic established criminal networks, activities, and practices to move
contraband, raise funds, or generally or specifically further their goals and objectives. Police intelligence can
provide relevant, actionable police information or police intelligence to the BCT through integration into the
operations process and fusion with other intelligence data. U.S. Army criminal investigations division and
provost marshal staffs provide police intelligence analysis to the commander that identifies indicators of
potential crimes and criminal threats against facilities or personnel.
SPECIAL OPERATIONS FORCES
8-31. BCT will typically coordinate with a Special Operations Task Force or a Joint Special Operations Task
Force. Army special operations forces operating in a BCT’s area of operations must coordinate their activities
with the BCT regardless of command or supporting relationships. To best support integration efforts, and
generate and sustain interdependence, the BCT and the special operations units should exchange a variety of
liaison and coordination elements. This is especially important for the intelligence and fires warfighting
functions. They range in size from individual liaisons to small coordination elements. Whatever their size or
location, these elements coordinate, synchronize, and deconflict missions in the other unit’s area of operation.
By exchanging liaisons, conditions are created that foster interdependence. The exercise of interdependence
facilitates shared understanding between the BCT and special operations forces and provides a conduit by
which the two units can provide each other relevant, useful and timely information during the operations
processes. Liaisons should attend and participate in all planning efforts, update briefs, and working groups.
(See ADP 3-05 for additional information.)
8-32. Civil affairs operations are essential to the conduct of operations focused on stability. The full
capability of the civil affairs force manifests itself in the conduct of stability operations tasks in every
environment across the range of military operations. Civil affairs support to stabilityoperations tasks include
the execution of all five civil affairs core tasks, employment of civil affairs functional specialists, and
continuous analysis of the civil component of the operational environment in terms of both operational and
mission variables by civil affairs staff elements. Civil affairs activities are civil reconnaissance, civil
engagement, civil-military operations center, civil information management and civil affairs operation staff
support. Civil affairs forces also conduct military government operations that include transitional military
authority and support to civil administration and provide support to civil affairs supported activities such as
populace and resources control, foreign humanitarian assistance, and civil foreign assistance
8-33. Civil affairs support to operations focused on stability depends on the nature of the operation and the
condition of the affected indigenous population and institutions. The civil affairs staff continually monitors
the condition of the host nation throughout the operation, applies available resources to affect the civilian
component, and recommends functional skills required to support this critical phase of the operation. Civil
affairs support the BCT, U.S. Government agencies, and the host-nation civil administration in transitioning
power back to the local government. During the transition from offense or defense to operations focused on |
3-96 | 312 | Chapter 8
stability, civil affairs units place greater emphasis on infrastructure, economic stability, and governance
expertise. (See FM 3-57 for additional information.)
PROVINCIAL RECONSTRUCTION TEAM
8-34. A provincial reconstruction team, when established, can be part of a long-term strategy to transition
the functions of security, governance, and economics to provincial governments. It is a potential combat
multiplier for maneuver commanders performing governance and economics functions and providing
expertise to programs designed to strengthen infrastructure and the institutions of local governments. The
provincial reconstruction team leverages the principles of reconstruction and development to build host
nation capacity while speeding the transition of security, justice, and economic development to the control
of the host nation. Depending on the situation, a provincial reconstruction team is manned between 60 to 90
personnel. A provincial reconstruction team may have the following complement of personnel:
(cid:122) Provincial reconstruction team leader.
(cid:122) Deputy team leader.
(cid:122) Multinational force liaison officer.
(cid:122) Rule of law coordinator.
(cid:122) Provincial action officer.
(cid:122) Public diplomacy officer.
(cid:122) Agricultural advisor.
(cid:122) Engineer.
(cid:122) Development officer.
(cid:122) Governance team.
(cid:122) Civil affairs team.
(cid:122) Bilingual cultural advisor.
INTERGOVERNMENTAL ANDNONGOVERNMENTAL ORGANIZATIONS
8-35. BCTs also must recognize the value of intergovernmental and nongovernmental organizations and
build effective relationships with these actors. These organizations may have the most extensive amounts of
resources to conduct stability operations tasks within the BCT’s area of operations. Intergovernmental
organizations and nongovernmental organizations are the primary sources of subject matter expertise in many
essential services and governance topics. They also are the primary provider of humanitarian, infrastructure
and essential services in immature operational environments. Intergovernmental and nongovernmental
organizations potentially have experienced and detailed knowledge of the civil environment. Usually the
intergovernmental and nongovernmental organizations will have a better understanding of the civil
considerations than any other actors other than host-nation personnel will. This insight can assist the BCT in
the continual process to understand and shape the environment.
8-36. Building relationships with intergovernmental and nongovernmental organizations is unique, as
opposed to host-nation forces and interagency actors, who often have different mandates and alternative
perspectives to operations, focused on stability. The BCT commander and staff utilize these differences to
see the operational environment and tactical problems from different perspectives. Additionally,
understanding where intergovernmental and nongovernmental organizations are in the area of operations and
the nature of their activitieshelps develop a common operational picture (COP). This COP enables the BCT
to anticipate changes to the operational environment, the effects of intergovernmental and nongovernmental
organizations on stability operations tasks and BCT operations, and future friction points between the
organization’s interests and the BCT’s interests.
8-37. Building relationships with intergovernmental and nongovernmental organizations might also be
difficult because these organizations are reluctant to establish associations with U.S. forces. The BCT must
be cognizant of this and establish these relationships on terms beneficial to all parties involved.
Intergovernmental and nongovernmental organizations can bring valuable resources, information regarding
the civil populace and the operational environment, and alternative perspectives to the BCT’s operation.
Examples of interagency personnel that can provide the BCT valuable information are members of a United |
3-96 | 313 | Stability
StatesDepartment of State Embassy or Consulate country team, chiefs ofstations or bases, defense attaches,
and subject matter expertise from other governmental departments (Departments of Agriculture, Justice,
Treasury, and so forth).
8-38. Humanitarian organizations avoid any blurring of the distinction between neutral, independent, and
impartial humanitarian action and development aid derived from political engagement, as the latter is
potentially linked to security concerns or support to one side. The BCT often works through civilian
representatives from United States Agency for International Development, the United Nations, or the host
nation when coordinating with nongovernmental organizations. The BCT avoids publicly citing
nongovernmental organizations as information sources, as that might jeopardize their neutrality and invite
retaliation by adversaries. The BCT primarily uses civil-military operations centers operated by civil affairs
units to coordinate with nongovernmental organizations. (See ATP 3-07.5 for additional information.) BCTs
operating with nongovernmental organizations follow these guidelines:
(cid:122) Military personnel wear uniforms when conducting relief activities.
(cid:122) Military personnel make prior arrangements before visiting nongovernmental organizations.
(cid:122) Military personnel do not refer to nongovernmental organizations as force multipliers or partners
or other similar terms.
(cid:122) U.S. forces respect a nongovernmental organization’s decision not to serve as an implementing
partner.
SEIZING THE INITIATIVE
8-39. The enduring theme of seizing the initiative is as applicable in operations focused on stability as in the
offense and defense. What is significantly different is the context in which the operational framework occurs.
Operations focused on stability have fewer specified applications of tactics and procedures. The BCT
commander must study and use critical thinking and creativity to address the tactical problems in this
complex environment. Operations focused on stability have broader temporal considerations; this operational
framework occurs before, during and after conflict as well as simultaneous to offensive and defensive
operations. The BCT commander must consider the effects of this temporal aspect and manage it
appropriately.
8-40. Operations focused on stability are by nature conceptual. The BCT commander must understand how
each action affects the other elements in the complex system of host-nation governmental institutions, civil
society and local economies. Success in seizing the initiative from a stability-focused perspective is critical
to preventing conflict, setting conditions for success during the offense and defense and securing hard won
successes in a post conflict environment.
RETAINING THE INITIATIVE
8-41. Retaining initiative gained through the offense and operations focused on stability requires the BCT to
anticipate and act on civil requirements while actively averting threat actions. Influencing the population
towards the legitimacy of the civil authority is critical to retaining initiative. In many circumstances, security
is the most influential element affecting thepopulation beyond their basic needs of food, water, and shelter.
A secure environment fosters a functioning economy, which provides employment and gradually transfers
the population’s dependence from military to civilian authorities and host-nation governments.
8-42. The BCT executes defensive operations and operations focused on stability to retain key terrain, guard
populations, and protect critical capabilities that inhibit threat actions while fostering conditions to increase
the impact of stabilizing efforts. Often the BCT assigns these tasks as an economy of force to conduct
offensive operations and operations focused on stability operations tasks. These tasks take form in such as
actions as partnership with other indigenous security forces but must be executed to prevent instability. The
objective is that the population feels that the level of security promotes evolving and often sequential growth
and stabilization. Host nation actors are often the best and most informed sources on the local environment. |
3-96 | 314 | Chapter 8
EXPLOITING THE INITIATIVE
8-43. A secure operational environment enables unified action partners to capitalize on their unique
capabilities—thus exploiting the initiative gained in earlier operations. Governmental, nongovernmental, and
other actors must be unified in purpose for this to be effective. Effective civilian-military teaming starts with
the development of shared goals, aims, and objectives and a unity of purpose, which leads to a relationship
of shared trust and a unity of effort. The BCT commander’s responsibilities include creating and fostering
this dynamic and culture among organizations.
8-44. Unity of effort is more than working with other U.S. Governmental agencies. Political leaders,
governmental agencies, security forces, and local businesses are examples of host-nation actors that a BCT
works with during operations focused on stability. The BCT also leverages relationships with host-nation
actors to develop their understanding of the information environment and to answer information
requirements.
8-45. Actors that encompass unified action partners are not limited to host nation and interagency personnel.
The BCT’s area of operations may include allied and multi-national forces. Understanding capabilities,
constraints and limitations, and command relationships amongst the allied and multi-national forces facilitate
the mission preparation and execution of operations in a constantly changing operational environment. The
BCT cannot conduct successful operations focused on stability without building relationships. Each actor
brings expertise, perspective, resources and capabilities that are necessary to ensure stability operations tasks
are accomplished and that they achieve the end state for the operation.
STABILIZING THE ENVIRONMENT
8-46. Operations focused on stability seek to stabilize the environment enough so that the host nation can
begin to resolve the root causes of conflict and state failure. During consolidation of gains, these operations
will focus on security and stability operations tasks to establish conditions that support the transition to
legitimate authorities. Initially, this is accomplished by performing the minimum essential stability operations
tasks of providing security, food, water, shelter, and medical treatment. Once conditions allow, these tasks
are a legal responsibility of U.S. Army forces. However, the BCT commander may not need to have the BCT
conduct all of these essential tasks. Other military units or appropriate civilian organizations may be available
to adequately perform these tasks. As the operational environment and time allow, the effort will transition
to the more deliberate of execution of the six stability operations tasks.
SECTION III – STABILITY OPERATIONS
8-47. A stability operation is an operation conducted outside the United States in coordination with other
instruments of national power to establish or maintain secure environment and provide essential
governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP3-0). The
BCT executes operations focused on stability operations tasks against destabilizing factors by establishing
unity of effort among diverse organizations, and then task organizing and partnering with other elements to
mitigate sources of instability. (See ADP 3-0, ADP 3-07, FM 3-07, ADRP 1-03, and ATP3-07.5 for
additional information.)
SIX STABILITY OPERATIONS TASKS
8-48. U.S. Army forces often seek to stabilize an area of operations by performing stability operations tasks.
A single action taken by a BCT or partnered element can support multiple stability operations tasks because
they are interrelated and interdependent. Each stability operations task carries unique considerations, but
actions taken affect each differently. The BCT plans, prepares, executes, and assesses operations to determine
impacts on the area of operations as positively, negatively or neutral considering long-term and short-term
effects. In operations focused on stability, planning and assessing require significant analysis supported
through information collection activities (see chapter 5) focused on identifiable indicators within and external
to the BCT’s area of operations. As the commander considers each stability operations task within the context
of the stability principles, the BCT staff analyzes measures of performance (MOPs) and measures of |
3-96 | 315 | Stability
effectiveness (MOEs) during assessment to plan for the next operation asking, “What is needed to accomplish
the intended outcome?” The Army’s six stability operations tasks are—
(cid:122) Establish civil security.
(cid:122) Support to civil control.
(cid:122) Restore essential services.
(cid:122) Support to governance.
(cid:122) Support to economic and infrastructure development.
(cid:122) Conduct security cooperation.
8-49. The combination of stability operations tasks conducted during operations depends on the situation. In
some operations, the host nation can meet most or all of the population’s requirements. In those cases, Army
forces work with and through host-nation authorities. Commanders use civil affairs operations to mitigate
how the military presence affects the population and vice versa. Conversely, Army forces operating in a
failed state may need to support the well-being of the local population. That situation requires Army forces
to work with civilian organizations to restore basic capabilities. Civil affairs operations prove essential in
establishing the trust between Army forces and civilian organizations required for effective, working
relationships.
8-50. Six Army stability operations tasks (see figure 8-1 on page 8-12) correspond directly to the five
stability sectors, used by the U.S. Department of State, Office of the Coordinator for Reconstruction and
Stabilization, and directly support the broader efforts within the stability sectors. Together these six stability
operations tasks and the U.S. Department of State stability sectors provide a mechanism for interagency
tactical integration, linking the execution of discreet tasks among the instruments of national power required
to establish end state conditions that define success. Tasks performed in one sector inevitably create related
effects in another sector; planned and performed appropriately, carefully sequenced activities complement
and reinforce these effects. The subordinate tasks performed by the BCT under the six stability operations
tasks directly support broader efforts within stability executed as part of unified action. |
3-96 | 316 | Chapter 8
Figure 8-1. Mechanism for interagency tactical integration
8-51. Over time, to ensure safety and security are sustained, unified action partners perform numerous tasks
across all stability sectors. As part of a joint team working with unified action partners, achieving a specific
objective or setting certain conditions often requires the BCT to perform a number of related tasks among
the six stability operations tasks. An example of this is the effort required to provide a safe, secure
environment for the local populace. Rather than the outcome of a single task focused solely on the local
populace, safety and security are broad effects. The BCT can help achieve safety and security by performing
a number of related tasks to assist in ending hostilities, isolating belligerents and criminal elements,
demobilizing armed groups, eliminating explosives and other hazards, and providing public order and safety.
ESTABLISH CIVIL SECURITY
8-52. Civil security provides for the safety of the host nation and its population, including protection from
internal and externalthreats. The BCT coordinates operations to restore order, halt violence and to support,
reinstate, or create civil authority by establishing a safe, secure, and stable environment for the local populace
supporting the overall stability operation. (See ATP 3-07.5 for additional information.) Establishing civil
security subtasks include the following:
(cid:122) Enforce cessation of hostilities, peace agreements, and other arrangements.
(cid:122) Determine disposition and composition of host nation armed and intelligence services.
(cid:122) Conduct disarmament, demobilization, and reintegration.
(cid:122) Conduct border control, boundary security, and freedom of movement.
(cid:122) Support identification programs. |
3-96 | 317 | Stability
(cid:122) Protect key personnel and facilities.
(cid:122) Clear explosive and other hazards.
8-53. The BCT conducts operations that directly support subtasks: enforce cessation of hostilities, peace
agreements, and other arrangements; conduct border control, boundary security, and freedom of movement;
support identification; protect key personnel, and facilities. The BCT has limited capability to support,
determine disposition and composition of national armed and intelligence services; conduct disarmament,
demobilization, and reintegration; and to clear explosives and other hazards.
INITIAL RESPONSE
8-54. During the initial response phase, the BCT often executes subordinate tasks because the host nation
lacks the capability. BCT subordinate units occupy areas of operation in accordance with geographical,
political, socioeconomic, task, or supported actor boundary considerations. Information collection activities
will develop further understanding of boundaries requiring the BCT to shift unit assets and resources to better
align with unified action partners to mitigate sources of instability. BCTs may be required to identify and
segregate combatants and noncombatants, search them, safeguard them, and move them out of the immediate
area of operations. The BCT commander establishes priorities for protection of civil and military personnel,
facilities, installations, and key terrain within the area of operations and initiates the stability principles of
conflict transformation, unity of effort, and building partner capacity during the initial response.
8-55. The BCT conducts operations that safeguard the local population and prevent factions or actors
contributing to sources of instability. Ultimately, these operations convince rival factions and actors to secure
their interests through negotiation and peaceful political processes rather than violence, intimidation,
coercion, or corruption. BCT units must remain neutral during this period. Supporting one of more factions
or leveraging one faction against another may contribute to instability. Perception from the local population
must be that the U.S. forces are neutral and have the best interests of the population and are providing security
to the area allowing further development to occur.
8-56. Identifying actors and their intentions during this phase through information collection allows the BCT
to seize the initiative. The BCT commander and subordinate leaders must reach, through engagements,
binding agreements or understandings with unified action partners to determine the best way to divide labor
and deconflict efforts so that partners are not working at cross-purposes. Actor agendas or intents are not
known or understood in their entirety during this phase. Psychological operations (PSYOP) staff planners
and intelligence staff sections develop indicators that commanders and leaders can clearly understand and
identify to reveal actor agendas or intents. Information collection, with and without unified action partners,
along with continuous assessment enables the commander’s understanding of unity of effort and unity of
purpose.
TRANSFORMATION
8-57. In the transformation phase, host-nation security forces and, potentially, intergovernmental
organization peacekeepers begin to contribute. The BCT focuses more on SFA, particularly on the systems
required to professionalize the host-nation security forces. The BCT continues in partnership with unified
action partners according to the legitimate government binding agreements. Information collection will
develop further understanding of boundaries requiring the BCT to shift unit assets and resources to better
align with unified action partners to mitigate sources of instability. The BCT advises and assists the security
force leadership empowering them to assume as much of the security effort as possible.
8-58. Host-nation security forces prominently work on security efforts so local populations do not perceive
theBCT as an invading force, to resist. Host-nation security forces stay involved to promote the legitimacy
of their government and progress with unified action partners. The BCT will assist host-nation security force
information operations, sustainment in support of the host nation, protection and area security operations as
needed.
8-59. As soon as possible, the BCT transfers host nation infrastructure security to host-nation organizations.
Host-nation military units may temporarily be committed to securing public infrastructure, but eventually
police forces or dedicated security organizations conduct this function. The BCT continues coordination
between unified action partners to help mediate any disagreements among them. |
3-96 | 318 | Chapter 8
8-60. The BCT ensures host-nation forces act in accordance with respect to human rights; failure to do so
undermines popular support for the host-nation government and can quickly revert conditions back to those
experienced during the initial response phase. Partnered security operations that place thehost-nation forces
in the lead or independent of the BCT that result in combating instability are the most credible to the
population and build legitimacy of government through ownership.
8-61. Initially the BCT may simply be a support apparatus or, contrastingly, may make most security related
decisions and perform most tasks. Nevertheless, host-nation actors support and increasingly take ownership
in such matters. The BCT develops clear MOPs and MOEs leading to the security efforts shifting from the
BCT as the lead to the host-nation forces in the lead. The BCT develops indicators of the host-nation unit’s
actions and conduct as well as the local population sentiment that their units can identify while conducting
partnered actions.
FOSTERING SUSTAINABILITY
8-62. Inthe fostering sustainability phase, the BCT transitions to a steady state posture focused on advisory
duties and security cooperation. The BCT commander implements additional peace measures depending
upon further negotiations. During this phase, the BCT enables the host nation to sustain the peace.
SUPPORT TO CIVIL CONTROL
8-63. Civil control centers on rule of law by promoting efforts to rebuild host nation judiciary and corrections
systems by providing training and support to law enforcement and judicial personnel. Civil control tasks
focus on building temporary or interim capabilities to pave the way for the host nation or international
organizations to implement permanent capabilities. (See ATP 3-07.5 for additional information.) Support to
civil control subtasks include—
(cid:122) Establish public order and safety.
(cid:122) Establish an interim criminal justice system.
(cid:122) Support law enforcement and police reform.
(cid:122) Support judicial reform.
(cid:122) Support a civil property dispute resolution process.
(cid:122) Support criminal justice system reform.
(cid:122) Support corrections reform.
(cid:122) Support war crimes courts and tribunals.
(cid:122) Support public outreach and community rebuilding programs.
8-64. Establishing security and rebuilding justice institutions can help to develop the necessary climate for
reconciliation, public confidence, and subsequent economic growth. The BCT supports civil control tasks
directly by conducting operations that support subtasks establishing public order and safety and supporting
public outreach and community rebuilding efforts. The BCT supports the remaining civil control subtasks
indirectly.
INITIAL RESPONSE
8-65. During initial response, the BCT conducts area security to protect the population, facilitate access to
critical resources for endangered populations, and secure vital resources and infrastructure for the interim
and future criminal justice institutions to strengthen the legitimacy of the operation and maintain the trust of
the host nation. The BCT initiates the principles of conflict transformation and unity of effort to begin
establishment of civil control.
8-66. The BCT conducts operations that safeguard the local population and prevent factions or actors from
contributing to sources of instability, in this case actors or groups enacting their form of justice. The legal
and justice system will be in disarray during the initial response from the interim and host-nation government.
The BCT respects and implements laws established by the host nation in support of political objectives and
directly addresses sources of instability. The BCT staff analyzes these laws to recommend COAs and develop
rules of engagement or other mission parameters. |
3-96 | 319 | Stability
8-67. The BCT conducts information operations related to the development of judicial systems that are
outside of the interim or established government and disrupt the organizations that control them. Ultimately,
these operations convince rival factions and actors to secure their interests through negotiation and peaceful
political processes rather than violence, intimidation, coercion, or corruption.
8-68. The BCT develops plans for coordinating the security, safety, and care for displaced communities in
camps and settlements. This includes the movement of displaced people, the screening of returnees at
checkpoints, the protection of relief convoys, and public safety in returnee communities that lack local law
and order.
8-69. The BCT requests partnerships with U.S. Army and other unified action partners to assist in the initial
establishment of civil control. For example, the BCT request military police forces with the technical skills
to conduct investigations, collect and handle evidence, and undertake correction reform (see ATP3-39.12).
The BCT seeks additional judge advocates since the BCT lacks the legal manpower to assist the host nation
in judicial reform,as well as support to war crime courts and tribunals.
TRANSFORMATION
8-70. During transformation, the BCT continues to conduct operations with unified action partners, however,
shifts efforts to legitimacy and host-nation ownership, and building partner capacity. In the transformation
phase of the stabilization framework, host-nation police forces and inter organizational entities take the lead
with Army units focusing on SFA, particularly the professionalization of host-nation security forces.
8-71. Legitimate political authorities pass laws and orders that are binding to the local population during this
phase. The BCT continues its operations and partnership but must know the laws and orders to properly
mentor and guide its partner to support legitimacy. These laws and orders may also cause an adjustment to
rules of engagement and the conduct of operations.
8-72. Building partner capacity to protect military and public infrastructure and facilitate emergency
response is the primary goal during transformation phase for civil control. Security measures should be
integrated into broader programs that foster good order and discipline, including personnel accountability,
property accountability, and maintenance. The BCT continues its engagements with unified action partners
toestablish timelines and measurable standards as capacity develops for conditions improving or regressing.
FOSTERING SUSTAINABILITY
8-73. In fostering sustainability, the BCT transfers all public security responsibilities to host-nation forces
while monitoring and reporting on progress as well as identifying modernization needs and the means to
achieve them. Through engagements, the BCT ensures political authorities do not abuse their institutions and
maintain civil control.
RESTORE ESSENTIAL SERVICES
8-74. Restoring essential services addresses the fundamental needs of the populace, beyond the provision of
security. The BCT normally supports subtasks of restore essential services, for example, conducting tasks
related to civilian dislocation and support to food relief and public health programs within its area of
operations. (See ATP 3-07.5 for additional information.) Restore essential services subtasks include—
(cid:122) Provide essential civil services.
(cid:122) Perform tasks related to civilian dislocation.
(cid:122) Support famine prevention and emergency food relief programs.
(cid:122) Support nonfood relief programs.
(cid:122) Support humanitarian demining.
(cid:122) Support human rights initiatives.
(cid:122) Support public health programs.
(cid:122) Support education programs. |
3-96 | 320 | Chapter 8
8-75. The BCT works to transfer responsibility to a transitional intergovernmental, nongovernmental
organization, or host-nation authority as quickly as possible. However, maintains responsibility for security
in the area of operations so that the transitional authority can best meet the needs of the population. The BCT
prioritizes restoration of essential services based solely on need and mitigate unnecessary suffering. The BCT
commander and staff consider location, security, and quantity of distribution of humanitarian aid, as well as
who and how the aid is distributed. The BCT staff must determine the perception of the local population,
mitigate corruption of a partnered element, and ensure these actions mitigate instability for theshort and long
term.
8-76. The BCT continuously coordinates with unified action partners assigned by the joint task force
headquarters and may be partnered with the civil-military operations center, host-nation ministry of health
and agriculture, and relief organizations such as U.S. Agency for International Development and the United
Nations World Food Program to ensure the population has access to food and water. Partnership with special
operations forces may also augment the BCT by providing additional geographic and cultural knowledge and
sharing intelligence to address potential sources of instability.
INITIAL RESPONSE
8-77. The BCT’s primarily focus on essential services is to alleviate unnecessary suffering among the
population. This includes providing basic humanitarian needs such as food, water, and shelter, along with
providing support for displaced civilians and preventing the spread of epidemic disease. Efforts to restore
essential services in any operation contribute to the social well-being of the population. The BCT supports
government efforts to establish or restore basic civil services, including food, water, shelter, and medical
support with such actions as:
(cid:122) Conducting area and zone reconnaissance to identify areas that require immediate assistance.
(cid:122) Conducting area security to ensure those affected receive the goods, services, and protection.
(cid:122) Sustainingoperations to deliver class I; water, food, and emergency shelter (tents).
(cid:122) Engineeringoperations to assess and repair infrastructure within capabilities.
(cid:122) Providingmedical treatment to civilians that are at immediate risk of losing life, limb, or eyesight.
(cid:122) Identifying requirements and request enablers, augmentation or integration of theater assets for
specified requirements (for example, repair or rebuild infrastructure, task organization, request for
forces, project request, or operational needs statement processes).
8-78. A BCT may provide for immediate humanitarian needs of the population within its organic capabilities
to restore essential services following the conduct of offensive or defensive operations or in response to
disaster as part of a humanitarian relief effort. The BCT applies the principles of conflict transformation and
unity of effort and sets the conditions to build partner capacity when restoring essential services in the initial
response phase.
8-79. Beyond security considerations, the BCT relies on its information collection and sustainment capability
to apply conflict transformation. This includes operations that identify the sources of instability and support
the restoration of essential civil service as defined in terms of immediate humanitarian needs (such as
providing food, water, shelter, and medical support) necessary to sustain the population until local civil
services are restored. Contracted services are often a viable option to fulfill essential civil services, therefore,
trained contracting officer representatives (CORs) and pay agents are critical enablers at the battalion and
company level that can ensure that contracted support meets its intended purpose in the manner as agreed to
in contracts or other binding agreements. (See chapter 9.)
8-80. Operations focused on stability require unique sustainment considerations. The brigade support
battalion (BSB) must always plan to support the BCT, but also may be required to plan sustainment beyond
the BCT when supporting stability operations tasks. The BCT logistics staff officer (S-4), during the
development of the BCT’s concept of support, must remember that the design of the BSB is only to support
the BCT’s assigned Soldiers and equipment. Prior to the execution of the sustainment plan, the BSB
commander must ensure that sustainment estimates differentiate what is supporting internal BCT
requirements and what is supporting external support mission requirements. Sustainment during operations
focused on stability often involves supporting U.S. forces, multinational forces, and other contributing
partners in a wide range of missions and tasks. |
3-96 | 321 | Stability
8-81. The BCT remains responsible for achieving unity of effort in all subtasks, but other agencies, including
host nation, U.S. Department of State, or nongovernment organizations will most often assume responsibility
for execution. Credibility of the legitimate authority or illegitimate actors is not the primary consideration
during the initial response phase of restoring essential services. Credibility will become vital later in the
initial response phase, as actors will seize the initiative to influence their political position when an interim
authority is established and as the host nation begins the transformation phase. The BCT monitors and keeps
a record of actions taken by actors to influence the population perception of legitimacy. This allows the BCT
to credit and discredit legitimate and illegitimate actors through factual information.
8-82. BCTs also focus on maintaining civil security to allow other agency and host nation entities to meet
these needs, thus ensuring the BCT builds capacity to transition this responsibility quickly. The activities
associated with this stability operations task extend beyond simply restoring local civil services and
addressing the effects of humanitarian crises. While military forces generally center efforts on immediate
needs of the populace, other civilian agencies and organizations focus on broader humanitarian issues and
social well-being.
8-83. The presence of dislocated civilians can threaten success in any operation. A number of factors may
displace civilians, which will prompt the BCT to assist meeting the immediate needs of the displaced civilians
until other better-equipped organizations establish control in the BCT area of operations. Dislocated civilians
may indicate symptoms of broader issues such as conflict, insecurity, and disparities among the population.
The BCT must address and assess the impact of displaced civilians immediately to establish conditions for
stabilization and reconstruction of a traumatized population. Local and international aid organizations are
most often best equipped to handle the needs of the local populace but require a secure environment in which
to operate. Through close cooperation, military forces can enable the success of these organizations by
providing critical assistance to the populace.
8-84. Understanding the location, disposition, and composition of displaced civilians must remain a high
priority and consideration throughout operations focused on stability. A large number of all dislocated
civilians are women and children. Most suffer from some form of posttraumatic stress disorder, and all
require food, shelter, and medical care. External groups may target the displaced civilians as a continuation
of earlier conflict, thus escalating the conflict and destabilizing the environment. Internal unrest within the
displaced civilian population can create de-stabilizing actors as well. Thus, the BCT coordinates with unified
action partners and augments with available assets from a higher headquarters, such as medical support,
security, establishing secure facilities and possibly evacuation to maintain initiative over potential
destabilizing factors.
8-85. The BCT plans for health threats and diseases prevalent in the regionto provide support for deployed
forces and affected civilians within the BCT’s area of operations. Roles 1 and 2 medical assets support force
health protection (see ATP 4-02.8) measures to mitigate the adverse effects of disease and nonbattle injuries
and promote the health of deployed forces. The BCT conducts area and zone reconnaissance to gain
information on public health hazards by collecting information on sewage, water, electricity, academics,
trash, medical, safety, and other considerations. If necessary, the BCT assesses existing medical infrastructure
including preventative health services and may temporarily operate or augment operations of existing
medical facilities in extreme circumstances. (See FM 4-02 and ATP4-02.3 for additional information.)
TRANSFORMATION
8-86. Operations conducted during the transformation phase establish the foundation for long-term
development, resolving the root causes of conflict that lead to events such as famine, dislocated civilians,
and human trafficking. The BCT primarily conducts operations that secure the environment to enable other
agencies and host nation to meet the needs of the populace. The BCT commander and staff assess related
activities and missions to achieve unity of effort within the operational environment and continually identify
potential sources of instability. The commander and staff apply the principles of unity of effort, legitimacy
and host nation ownership, and building partner capacity during transformation that enables a combined
effort toward sustained social well-being for the population and achieving progress towards fostering
sustainability. |
3-96 | 322 | Chapter 8
8-87. As other organizations, nongovernmental organizations, U.S. Agency for International Development,
and other interagency partners and the host nation assume responsibilities for restoring essential services, the
BCT continues its partnership with those organizations. The BCT supports the efforts by ensuring that
security exists, identifying needs that have been overlooked, facilitating the activities of these other partners,
and continuing to provide critically needed humanitarian assistance.
8-88. To achieve legitimacy in the eyes of the population host-nation authorities must demonstrate the ability
to restore essential services. The BCT includes host nation legitimate authorities in assessments and in
establishing priorities. The BCT transitions its relationship from direct support and coordination to coaching,
teaching, mentoring, and facilitating unified action partners so they can continue to make progress toward
essential services.
8-89. The BCT scales activities to local capacity for sustainment. Proper scaling also creates opportunity for
the local populace to generate small-scale enterprise to provide for services as much as possible. The BCT
must not initiate large-scale projects until the necessary infrastructure is in place to support such efforts.
FOSTERING SUSTAINABILITY
8-90. Fostering sustainability tasks ensures the permanence of those efforts by institutionalizing positive
change in society. Conditions for sustained social well-being depend on the ability of the legitimate authority
to meet basic needs of the population, ensure right of return, address instances of civilian harm, promote
transitional justice, and support peaceful coexistence.
SUPPORT TO GOVERNANCE
8-91. Governance is the state’s ability to serve the citizens through the rules, processes, and behavior by
which interests are articulated, resources are managed, and power is exercised in a society (JP 3-24). Support
to governance subtasks include—
(cid:122) Support transitional administrations.
(cid:122) Support development of local governance.
(cid:122) Support anticorruption initiatives.
(cid:122) Support elections.
8-92. The BCT’s support to governance varies over the range of military operations and area of operations.
Support to transitional authorities and development of local governance can be supported by the BCT as a
primary or subordinate role with the partnering entities. The BCT’s support to anticorruption and elections
does not change its role throughout the area of operations; instead, it varies depending on how it may be
conducted when considering the mission variables of mission, enemy, terrain and weather, troops and support
available, civil considerations (METT-TC). The establishment of civil security and civil control provide a
foundation for transitioning authority to civilian agencies and eventually to the host nation. (See ATP3-07.5
for additionalinformation.)
INITIAL RESPONSE
8-93. The initial response phase sets the conditions on how governance can be supported. Information
collection during this phase must be continuous and leveraged through Soldier and leader engagements to
identify sources of instability, understanding of unified action partners motivations and agendas, and
identification of local civic leaders. The BCT commander and subordinate commanders and leaders apply
adroit diplomatic and communications skills to build constructive relationships during this phase. The BCT
focuses on providing a secure environment allowing relief forces to focus on the immediate local population
humanitarian needs.
8-94. The BCT sets the conditions for civic leaders and factions to address grievances and sources of
instability peacefully and openly. The BCT can set conditions regarding:
(cid:122) Identification of leaders of factions, legitimate authority, popular and minority support, or aligned
with coalition forces political interests.
(cid:122) Provide a safe and secure environment for these leaders to meet and communicate. |
3-96 | 323 | Stability
(cid:122) Influence leaders to participate in political system and not through violence.
(cid:122) Influence local population to participate in elections.
(cid:122) Remain actively neutral but keeping the local populations interests in mind, allowing leaders to
communicate, but not tolerating intimidation, violence, corruption, or sources of instability to
escalate.
8-95. A thorough information collection plan provides the commander and subordinates units with an
understanding of the area of operations allowing them to engage unified action partners from a position of
advantage. The commander must reach clear communication, agreements, understandings, or accords to
conduct operations for laying the foundation of governance during the initial response phase. Conducting
operations after Soldier and leader engagements confirm or deny unified action partners motivations and
agendas. Assessing the outcomes of unified action partners’ operations and actions reveal their relationship
to the BCT and provide direction on how to support governance further.
8-96. The initial response phase normally ends with the election of officials and the establishment of a safe
and secure environment capable of mitigating sources of instability for a longer period time. Elections may
require an increased presence by BCT and host-nation security forces, and additional information-related
capabilities to encourage participation and responsible behavior. BCT and host-nation forces may conduct
security and area security for polling sites, political rallies, media centers, international observers, and
candidates.
TRANSFORMATION
8-97. The transformation phase begins after establishment of some form of a government becomes
operational. This may include oversight by the transitional military authority but must include a relatively
safe environment in which a tolerable level of instability can be mitigated. Transformation ends with the host
nation capable of conducting good governance with minimal assistance, acceptance by the local population,
and prepared for long-term development.
8-98. The BCT supports governance during transformation by advising, assisting, supporting, and
monitoring other actors. During this phase, BCT commanders and subordinate commanders and leaders
continue to build constructive relationships even through changes in unit or organizational leaderships in
efforts to progress the stability principles of unity of effort, legitimate and host nation ownership, and building
partner capacity.
8-99. The BCT commander, subordinate leaders, and unified action partners advise civil servants during
administrative actions. They continue to conduct engagements within their area of operations and assess
actors’ agendas or intentions through operations ensuringunity of effort. BCT subordinate units interact with
multiple host-nation actors helping them coordinate efforts more effectively.
8-100. Legitimate and host nation ownership must retain support of the local population. The BCT conducts
operations to build the local population’s perception that the local government and unified action partners
are capable, willing, and progressing towards mitigating sources of instability with little assistance if not
independently. The local population must be convinced that the BCT and host nation can sustain this
achievement for the duration and not become unstable or corrupt.
8-101. The BCT commander builds partner capacity by leveraging unified action partners providing for
government needs and demonstrating the host-nation’s government legitimacy and capability. The BCT
commander and staff identify gaps in capability to address sources of instability gained through information
collection and engagements with the local government. The BCT shares this information between the local
population and government leveraging unified action partners resources to build capacity mitigating
instability where capability did not previously exist. See an example of building partner capacity on
page8-20. |
3-96 | 324 | Chapter 8
A patrol identifies two villages that are in contention with one another because of a lack of water.
One has an abundance of water due to building a levee and the other does not. The patrol shares
this information to the company commander. The company commander engages the local
government leader about the issue and the local leader does not have the capability to solve the
problem. The company commander engages the battalion commander and staff who arranges an
engagement with the provincial reconstruction team and unified action partners. An engineer from
the provincial reconstruction team coordinates with U.S. Army Corps of Engineers and local
regional development planners discover that they can provide water to the other village by digging
wells that access underground water sources. The provincial reconstruction team provides a
proposal for a contract to the company commander and local government leaders. The local
government leader reaches a decision to commission a contract to build wells. While the wells are
being built, the levee must be lowered to allow some water to flow downstream for certain periods
of time. In return, both villages provide labor to the project equally. The company commander
coordinates with the provincial reconstruction team, sends patrols with a qualified COR and
ensures fulfillment of the contract terms. The BCT commander and staff, and subordinate units
conduct information operations to show a partnership with the host nation.
8-102. The BCT supports good governance by ensuring that local governments adhere to the rule of law
and to the law established by the higher level of government. The incoming legitimate authority, with the
population’s support, establishes (or re-establishes) and supports the rule of law during the transformation
phase. The BCT commander and subordinate leaders must be familiar with the current state of the rule of
law to ensure their partnered elements support the rule of law and act accordingly. Operations conducted
during this phase support the messages and themes that support the rule of law as well as reports of violations
of the law by actors and how the government acts consistently with the rule of law in addressing violations
of the law.
FOSTERING SUSTAINABILITY
8-103. The fostering sustainability phase begins with the host nation capable of conducting good
governance with minimal assistance, accepted by the local population, and prepared for long-term
development. This phase ends with the complete withdrawal of BCTs interacting with local government on
a routine basis. The BCT support to governance during fostering sustainability oversees transfer
responsibility of governance to an enduring host nation authority.
SUPPORT TO ECONOMIC AND INFRASTRUCTURE
DEVELOPMENT
8-104. The BCT assists host-nation actors to begin the process of achieving sustainable economic
development by establishing a safe and secure environment. Other U.S. Government agencies,
intergovernmental organizations, and civilian relief agencies often have the best qualifications to lead efforts
to restore and help develop host-nation economic capabilities. Ultimately, the goal is to establish conditions
so that the host nation can generate its own revenues and not rely upon outside aid. The desired end state is
for the host nation to achieve a robust, entrepreneurial, and sustainable economy. All economic development
actions build upon and enhance host nation economic and management capacity. (See ATP 3-07.5 for
additional information.) Support to economic and infrastructure development subtasks include—
(cid:122) Support economic generation and enterprise creation.
(cid:122) Support monetary institutions and programs.
(cid:122) Support national treasury operations.
(cid:122) Support public sector investment programs.
(cid:122) Support private sector development.
(cid:122) Protect natural resources and environment.
(cid:122) Support agricultural development programs.
(cid:122) Restoretransportation infrastructure. |
3-96 | 325 | Stability
(cid:122) Restore telecommunications infrastructure.
(cid:122) Support general infrastructure reconstruction programs.
8-105. The BCT’s support to economic and infrastructure development varies over the range of military
operations and area of operations but the principles of conflict transformation, unity of effort, legitimacy and
host nation ownership, and building partner capacity are enduring throughout all phases.
INITIAL RESPONSE
8-106. The BCT supports economic and infrastructure development at the local level during the initial
response phase by establishing areas of operation, and task organizing and empowering its subordinate units
by allowing them to coordinate with unified action partners. The BCT synchronizes efforts regionally and
shifts assets and resources as main efforts change or as opportunity to exploit the initiative arise. The building
blocks for broad national recovery and development are set at the local-level and the BCT’s information
collection effort should focus on identifying microeconomic information such as changes in cost of a
commodity, number of unemployed males 15 to 45 years of age, changes in costs of services such as medical
treatment, and so forth. Although the BCT maintains responsibility for security, secondary efforts will include
facilitating the emergence of employment opportunities, infusing monetary resources into the local economy,
stimulating market activity, fostering recovery through microeconomics, and supporting the restoration of
physical infrastructure to help retain and exploit the initiative.
8-107. The BCT may have to take the lead in responding to immediate economic needs, including assessing
the critical micro-and macro-economic conditions, during the initial response phase. These economic needs
include ensuring host-nation civilians can bring agricultural products and other goods to safe and secure
marketplaces, generating jobs that can be filled with qualified laborers, and others. Unity of effort is essential
for the BCT to identify and engage all relevant actors from the host nation, U.S. civil agencies, and
international organizations. These evolving partnerships and assessments will significantly enhance the
economic development management transition tasks from the BCT to the U.S. Government civil agencies
and host-nation actors. Hostile individuals and groups can take advantage of gaps if the actors do not engage,
and exploit opportunities for profit, contributing to long-term instability.
8-108. Infrastructure reconnaissance is a multidiscipline variant of reconnaissance to collect detailed
technical information on various categories of the public systems, services, and facilities of a country or
region. The infrastructure reconnaissance develops the situational understanding of the local capability to
support the infrastructure requirements of the local populace or military operations within a specific area.
Infrastructure reconnaissance is accomplished in stages: the infrastructure assessment and the infrastructure
survey. (See ATP 3-34.81 for additional information.)
8-109. Coordinating with the combat engineer units for an on-site visit, an engineer reconnaissance team
can be expected to conduct the initial assessment with available expertise from the supported unit. The initial
assessment provides information to confirm or deny planning assumptions, update running estimates/staff
estimates, determine immediate needs, develop priorities, obtain resources, and refine a plan. As operations
continue, general engineer and other supporting technical support elements provide teams that are qualified
to perform an infrastructure survey. These infrastructure survey teams use the infrastructure assessments
from the engineer reconnaissance teams to prioritize categories and identify those parts of the infrastructure
to be reassessed in more detail. Technical capabilities required to perform a comprehensive reconnaissance
include robust support from joint Service, multiagency, contractor, host nation, multinational, and reachback
elements.
TRANSFORMATION
8-110. The goal of the transformation phase is to establish firmly the foundation for sustainable economic
development and to begin to transition control of economic development to U.S. Government civil agencies,
international civil agencies, and host nation economic officials and entrepreneurs. The collective emphasis is
on establishing host nation institutions providing sustainable economic growth during this phase. Once a
civilian administration assumes control, the primary economic development role of the BCT is to advise and
assist local leaders. |
3-96 | 326 | Chapter 8
FOSTERING SUSTAINABILITY
8-111. In fostering sustainability, the goal is to institutionalize a long-term sustainable economic
development program and to transition control of the economy completely to host-nation officials,
entrepreneurs, and civil society. This phase also includes steps that build on and reinforce the successes of
the initial response and transformation phases. Steps taken during this phase support sustainable economic
growth based on a healthy society supported by healthy communities and neighborhoods. The primary
economic development role for the BCT is to continue to advise and assist host-nation civilian economic
officials.
CONDUCT SECURITY COOPERATION
8-112. Security cooperationis all Department of Defense interactions with foreign security establishments
to build security relationships that promote specific United States security interests, develop allied and partner
nation military and security capabilities for self-defense and multinational operations, and provide United
States forces with peacetime and contingency access to allied and partner nations (JP 3-20). Security
cooperation provides the means to build partner capacity and achieve strategic objectives. These objectives
include—
(cid:122) Building defensive and security relationships that promotes specific U.S. security interests.
(cid:122) Developing capabilities for self-defense and multinational operations.
(cid:122) Providing U.S. forces with peacetime and contingency access to host nations to increase situational
understanding of an operational environment.
8-113. Army forces support the objectives of the combatant commander’s campaign plan in accordance
with appropriate policy, legal frameworks, and authorities. The plan supports those objectives through
security cooperation, specifically those involving SFA (see FM 3-22) and foreign internal defense (see
ATP3-05.2). Security force assistanceis the Department of Defense activities that support the development
of the capacity and capabilityof foreign security forces and their supporting institutions (JP 3-20).Foreign
internal defense is participation by civilian and military agencies of a government in any of the action
programs taken by another government or other designated organization to free and protect its society from
subversion, lawlessness, insurgency, terrorism, and other threats toits security (JP 3-22).
8-114. SFA and foreign internal defense professionalize and develop security partner capacity to enable
synchronized sustaining operations. Army security cooperation interactions enable other interorganizational
efforts to build partnercapacity. Army forces—including special operations forces—advise, assist, train, and
equip partner units to develop unit and individual proficiency in security operations. The institutional Army
advises and trains partner Army activities to build institutional capacity for professional education, force
generation, and force sustainment. (See FM 3-22 for additional information on support to security
cooperation.)
Notes. SFABs provide SFA to host-nation FSF. The SFAB provides organic forces to form the
basisfor the SFAB mission to support FSF. Within the SFAB, the company team is the foundation
for the SFAB’s mission and augmented with additional personnel and assets to accomplish the
mission. (See ATP 3-96.1 for information on the SFAB.)
On occasion, the BCT as a whole or selected unit(s) of the BCT may support SFA activities,
including potentially supporting multiple FSF organizations in or external to the BCT’s area of
operations. Additionally, these FSF organizations may each report through different host-nation
government channels and even to different ministries. To synchronize efforts in this case, U.S.
forces must achieve unity of effort. Similarly, each of the FSF organizational commanders should
synchronize their efforts with the host-nation government representatives, as appropriate. (See
ATP3-21.20 for an example task organization, used for discussion purposes, for an Infantry
battalion supporting multiple SFA activities.) |
3-96 | 327 | Stability
8-115. The stability operations task of establishing security cooperation may include the BCT or selected
subordinate unit(s), depending on the missions assigned, conducting SFA as a subset of security cooperation.
SFA offers a means of support for security cooperation activities in support of building capacity of an FSF.
As soon as the FSF can perform this task, the BCT or selected unit transitions this task within civil security
to the host nation.
INITIAL RESPONSE
8-116. As the initial response phase normally occurs during or immediately after a conflict where the
operational environment prevents civilian personnel from operating effectively. The operational environment
is typified as nonpermissive. The objective of this phase is to improve the security situation, reducing the
threat to the populace and creating the conditions that allow civilian personnel to safely operate. SFA in the
initial response phase is normally required when FSF lack the capability or capacity to provide the required
level of security. This phase often requires SFA efforts to help generate and train or assist new and existing
FSF. This phase may require a combination of the types of SFA and considerable support, sustainment, and
medical resources. BCT activities during the initial response may have to be conducted with multinational
combat operations to consolidate gains, to include providing a safe, secure environment for the local
populace. SFA efforts during this phase focus on improving the FSF capability and capacity so all security
forces—U.S., other, and FSF—provide a secure environment and reduce the threat. Assecurity conditions
improve, transition to the transformation phase begins.
TRANSFORMATION
8-117. In the transformation phase, SFA activities seek to assist FSF to stabilize the operational
environment in a crisis or vulnerable state. The operational environment in this phase is more permissive
than the initial response phase; however, military forces will often be required to provide security to some
actors. Activities in this phase normally include a broad range of post-conflict reconstruction, stabilization,
and capacity-building efforts, which the embedded provincial reconstruction team is essential for long-term
success. Objectives in this phase include continuing efforts to improve the security situation, reducing the
threat to the populace, building host-nation capacity across the stability sectors, and facilitating the
comprehensive approach to assist FSF.
8-118. The transformation phase represents a broad range of SFA activities to support FSF. The initial
response phase differs from the transformation phase in the FSF capability to provide for a safe and secure
environment. More specifically, FSF may have a level of proficiency to no longer need a permanent United
States and FSF relationship for tactical operations. However, they may still need full-time advisors and
support, sustainment, and medical assistance. Embedded provincial reconstruction team members will
continue to play a vital role in assisting governance and development efforts throughout this phase. SFA end
state for this phase seeks to establish conditions so the host nation’s security sector can provide a secure
environment with its own security forces.
FOSTERING SUSTAINABILITY
8-119. In this phase, the focus of SFA continues to shift toward assisting institutions required to sustain
FSF. This phase encompasses long-term efforts to assist FSF. FSF conduct independent operations and can
provide a safe, secure internal environment. While SFA activities may be initially required during this phase,
activities reduce as FSF become more capable and viable. The determination for the BCT to receive a change
of mission from SFA is based on the policy and conditions of the operational environment. Provincial
reconstruction teams and other forces may remain to support a theater security cooperation plan.
SECTION IV – AREA SECURITY OPERATIONS
8-120. The BCT engaged in area security operations is typically organized in a manner that emphasizes its
mobility, lethality, and communications capability. Population-centric area security operations, for example
to consolidate gains, are common across the range of military operations, but is almost a fixture during the
conduct of stability-focused operations. Population-centric operational area security operations typically
combine aspects of the area defense and offensive operations (for example, search and attack, cordon and |
3-96 | 328 | Chapter 8
search, raid, and ambush) to eliminate the efficacy of internal defense threats. During the conduct of area
security operations, the BCT commander and staff must understand the relationship with host-nation
authorities and the civilian population. A clear understanding of the commander’s authority is essential in
exercising that degree of control necessary to ensure security and safety to all military forces and the civilian
population located within the BCT’s areaof operations.
OPERATIONAL OVERVIEW
8-121. Area security operations protect friendly forces, installations, routes, and actions within an area of
operations. During the conduct of stability-focused operations, area security operations establish and
maintain the conditions for stability in an unstable area before or during hostilities, or enduring peace and
stability after open hostilities cease. Area security operations are often an effective method of providing civil
security and civil control and supporting security cooperation during operations focused on stability. For
example, an area security operation may have to be designed around numerous political constraints. This
may include aligning unit areas of operation with the host nation’s existing political boundaries. Security
objectives, regardless of which element of decisive action (offense, defense, or stability) currently dominates,
ensure freedom of action over a prolonged period in consonance with the BCT commander’s concepts of
operations and intent. (See ATP 3-91 for additional information.)
CIVIL CONSIDERATIONS
8-122. Civil considerations reflect the influence of manmade infrastructure, civilian institutions, and
attitudes and activities of the civilian leaders, populations, and organizations within the operational
environment on the conduct of military operations. Commanders and staffs analyze civil considerations
within thecharacteristicsof areas, structures, capabilities, organizations, people, and events(ASCOPE). (See
ATP 2-01.3 for additional information on these characteristics.)
8-123. Since civilians are normally present in operations with a dominant stability component, the BCT
normally restrains its use of force when conducting area security operations. However, the commander
remains responsible for protecting the force and considers this responsibility when considering rules of
engagement. Restrictions on conducting operations and using force must be clearly explained and understood
by everyone. Subordinate commanders and leaders, and Soldiers must understand that their actions, no matter
how minor, may have far-reaching positive or negative effects. Subordinate commanders and leaders, and
Soldiers must realize that media (either hostile or neutral) and adversaries can quickly exploit their actions,
especially the way they treat the civilian population.
AREA SECURITY
8-124. Area security, a security operation conducted to protect friendly forces, installations, routes, and
actions within a specific area, takes advantage of the local security measures performed by all units,
regardless of their location in the area of operations. Local security includes any local measure taken by units
against enemy actions. Local security, dependent upon the situation, may involve avoiding enemy detection
or deceiving the enemy about friendly positions and intentions. Local security may include finding any enemy
forces in the immediate vicinity and knowing as much about their positions and intentions as possible. Local
security prevents a unit from being surprised and is an important part of maintaining the initiative during area
security.
8-125. The requirement for maintaining local security is an inherent part of any area security mission. Units
use both passive and active measures to provide local security. Passive local security measures include using
camouflage, movement control, noise and light discipline, operations security, and proper communications
procedures. Measures also include employing available sensors, night-vision devices, and daylight sights to
maintain surveillance over the area immediately around the unit. Active measures, dependent upon the
situation, may include—
(cid:122) Using observation posts, combat outposts, combat patrols, and reconnaissance and surveillance
patrols.
(cid:122) Establishing specific levels of alert based on the mission variables of METT-TC. |
3-96 | 329 | Stability
(cid:122) Establishing stand-to times. (Unit standard operating procedures [SOPs] detail activities during
the conduct of stand-to.)
LOCAL SECURITY
8-126. Local security is the low-level security activities conducted near a unit to prevent surprise by the
enemy (ADP 3-90). Area security activities take advantage of the local security measures performed by all
units (regardless of their location) in an area of operations, and all local security activities should be linked
to the broader area security activities. Local security is closely associated with unit protection efforts (see
ADP 3-37). Local securityincludes local measures that prevent or interdict enemy efforts. Local security is
an enduring priority of work, is essential to maintaining initiative, and prevents units from being surprised.
Local security involves avoiding detection and deceiving the enemy about friendly actions, positions, and
intentions. Local security includes finding any enemy forces in the immediate vicinity and knowing as much
about their positions and intentions as possible.
8-127. Local security can be part of the sustaining base or part of the area infrastructure. Local security
protection ranges from echelon headquarters to reserve and sustainment forces using active and passive
measures to provide local security. Active patrolling, unit SOPs, and continuous reconnaissance are active
measures that help provide local security. Passive measures include using camouflage, movement control,
noise and light discipline, proper communications procedures, ground sensors, night vision devices, and
daylight sights.
ECONOMY-OF-FORCEMISSIONS
8-128. The BCT, charged with execution, conducts an area security operation as an economy-of-force
mission. Area security missions are numerous, complex, and generally never ending. For this reason, the
commander and staff synchronize and integrate security efforts, focusing on protected forces, installations,
routes, and actions within the BCT’s assigned area of operations. Protected forces within the BCT range from
subordinate units and elements, echeloned command posts (CPs), and sustainment elements within the BCT’s
support area or consolidation area (when established). Protected installations can be part of the sustainment
base, or they can constitute part of the area’s civilian infrastructure within a consolidation area. Protected
ground lines of communication include the route network to support the numbers, sizes, and weights of
tactical and support area movement within the BCT’s area of operations, for example a consolidation area.
Actions range from securing key points (bridges and defiles) and terrain features (ridgelines and hills) to
large civilian population centers and their adjacent areas.
OFFENSIVE AND DEFENSIVE ACTIVITIES
8-129. During the conduct of stability-focused tasks, area security missions are a mixture of offensive and
defensive activities involving not only subordinate battalions, companies, and platoons, but also those
host-nation security forces over which the BCT has a command relationship such as operational control
(OPCON), or can otherwise influence. Offensive area security activities include subordinate tasks of
movement to contact [search and attack (see ATP 3-21.20 and ATP 3-21.10) or cordon and search (see
ATP3-21.20 and ATP3-21.10) missions] and combat patrols (see ATP 3-21.8), when required, designed to
ambush detected enemy forces or to conduct raids within the BCT’s area of operations. Defensive area
security activities include the establishment of base perimeter security (see ATP 3-21.20, appendix I); combat
outposts and observation posts (see ATP 3-21.20); moving and stationary screen and guard missions, and
reconnaissance and counterreconnaissance missions (see ATP 3-20.96 and ATP 3-20.97).
8-130. During offensive or defensive-focused tasks, area security operations are often designed to ensure
the continued conduct of sustainment operations to support decisive and shaping operations by generating
and maintaining combat power. Area security operations may be the predominant method of protecting
support areas that are necessary to facilitate the positioning, employment, and protection of resources
required to sustain, enable, and control forces. (See chapter 9for additional information.) |
3-96 | 330 | Chapter 8
READINESS
8-131. During area security operations, forces must retain readiness over longer periods without contact
with the enemy. This occurs most often when the enemy commander knows that enemy forces or insurgents
are seriously overmatched in available combat power. In this situation, the enemy commander normally tries
to avoid engaging friendly forces unless it is on terms favorable to the enemy. Favorable terms include the
use of mines and booby traps. Area security forces must not develop a false sense of security, even if the
enemy appears to have ceased operations in the secured area. The commander must assume that the enemy
is observing friendly operations and is seeking routines, weak points, and lax security for the opportunity to
strike with minimum risk. This requires commanders at each echelon to influence subordinate small-unit
leaders to maintain the vigilance and discipline of their Soldiers to preclude this opportunity from developing.
PLANNING CONSIDERATIONS
8-132. During area security operations planning, the commander apportions combat power and dedicates
assets to protection tasks and systems based on an analysis of the operational environment, the likelihood of
threat action, and the relative value of friendly resources and populations. Based on an initial assessment of
the operational environment, the commander task organizes subordinate units and elements and assigns
security areas within the BCT’s area of operations. Although all resources have value, the mission variables
of METT-TC make some resources, assets, or locations more significant to successful mission
accomplishment from enemy or adversary and friendly perspectives. Throughout the operations process the
commander relies on the risk management (RM) process and other specific assessmentmethods to facilitate
decision-making, issue guidance, and allocate resources (see chapter 4). Criticality, vulnerability, and
recoverability are some of the most significant considerations in determining protection priorities that
become the subject of the commander’s guidance and the focus of area security operations.
COMMAND AND CONTROL
8-133. During area security operations, the BCT commander devotes considerable time and energy to the
problems of coordination and cooperation due to the joint, interagency, and multinational nature of
stability-focused tasks. The BCT plans and conducts area security operations in concert with partner
participants towards a unified effort, often as a supporting organization rather than the lead organization. The
commander uses liaisons to enable unity of effort between partner elements and the coordination centers
established by the division or higher commander.
Interagency and Multinational Organizations
8-134. One factor that distinguishes the conduct of stability-focused tasks from the conduct of
offensive-and defensive-focused tasks is the requirement for interagency coordination at battalion level and
below. During area security operations with interagency partners, the commander has inherent
responsibilities. These responsibilities include the requirement to clarify the mission; to determine the
controlling legal and policy authorities; and to task, organize, direct, sustain, and care for the organizations
and individuals for whom the BCT provides the interagency effort. The commander also ensures seamless
termination of the mission under conditions that ensure the identified objectives are met and can be sustained
after the operation.
8-135. When operating inside or with multinational organizations, the BCT commander and subordinate
commanders and leaders should expect to integrate foreign units down to the company level. SFA activities
within an area security mission require carefully selected and properly trained and experienced personnel (as
trainers or advisors) who are not only subject matter experts, but also have the sociocultural understanding,
language skills, and seasoned maturity to more effectively relate to and train FSF. Additionally, commanders
and subordinate leaders within the brigade support area (BSA) and battalion trains with the fact that they will
routinely interact with multinational partners during other area security missions. SOPs at subordinate
echelons will require modification to incorporate multinational small units that do not have compatible
communications and information systems. |
3-96 | 331 | Stability
Desired End State
8-136. The BCT commander’s definition of the desired end state is a required input to area security
operations. While end state is normally described as a stable, safe, and secure environment during
stability-focused operations, this description is not sufficient. Initial MOEs and MOPs quantifying that
environment are determined during the planning process. (See chapter 3 for additional information.)
Measures of effectiveness and performance are important in stability-focused area security operations since
traditional combat measures, such as territory gained, enemy personnel killed or captured, and enemy combat
vehicles destroyed or captured do not apply. The commander also ensures the desired end state reflects the
prolonged time-period associated with many stability-focused area security operations.
8-137. Achieving the desired end state requires a knowledge of operational design (see chapter 4), the
ability to achieve unity of effort, and a thorough depth of cultural awareness (see chapter 2) relating to the
BCT’s area of operations. Through economy of forces, the commander identifies a finite amount of available
combat powerto apply against the essential tasks associated with a given area security operation. Identifying
essential tasks lays the foundation for the success of area security operations that represent the future stability
of a state. Decisions about use of combatpower are more than a factor of the size of the force deployed, its
relative composition, and the anticipated nature and duration of the mission. Assuring the long-term stability
depends on applying unity of effort to the tasks that are, in fact, essential.
Information Operations
8-138. The final success or failure of the BCT’s area security operation rests with the perceptions of the
inhabitants within and external to the BCT’s area of operations and goes beyond defeating the enemy.
Securing the trust and confidence of the civilian population is the chief aim of information operations, which
integrates and synchronizes information-related capabilities to generate effects in the information
environment necessary to influence enemy, adversary, neutral, and friendly audiences.
8-139. Information operations synchronization of information-related capabilities promotes the legitimacy
of the mission and reduces bias, ignorance, and confusion by persuading, educating, coordinating, or
influencing targeted audiences. Further, it promotes—through Soldier and leader engagement, civil affairs
operations, and PSYOP, among other information-related capabilities—interaction at all echelons with these
audiences so these target audiences understand the objectives and motives of BCT and that of higher
headquarters, and the scope and duration of area security actions. Combined with broad efforts to build
partner capacity, for example, SFA (see section V). Information operations are essential to achieving decisive
results: a stable host-nation government and peaceful civilian population.
8-140. The BCT information operations officer or noncommissioned officer coordinates with the division
(or higher) information operations officer to synchronize information-related capabilities into the BCT’s
information operations planning. Synchronization requires the BCT information operations officer (in
coordination with the electromagnetic warfare officer [EWO]) to participate in targeting within the fire
support cell as well as the various working groups and meetings chaired by the current and future operations
and other integrating cells within the BCT. Participation allows for the development of a holistic
understanding of the information environment within the problem sets facing the BCT staff. A staff-wide
understanding helps synchronize the information-operations related planning and targeting and allows for
shifts in priorities. This synchronization, in coordination with the information operations and civil-military
operations managed at the BCT or division enables united action partners to be incorporated into planning.
Note. Within the BCT, the information operations officer is responsible for synchronizing and
deconflicting information-related capabilities employed in support of BCT operations. The BCT
information operations officer synchronizes capabilities within subordinate maneuver battalions
and squadron, and subordinate companies and troops that communicate information to audiences
and affect information content and flow of enemy or adversary decision-making while protecting
friendly information flow. The information operations officer prepares appendix 15 and a portion
of appendixes 12, 13, and 14 to Annex C (Operations) to the operation order. (See chapter 3 and
FM 3-13 for additional information.) |
3-96 | 332 | Chapter 8
8-141. Within the security environment, enemies, adversaries, and other organizations use propaganda and
disinformation against the commander’s efforts to influence various civilian populations within and external
(area of interest) to the BCT’s area of operations. The BCT’s public affairs staff officer, in coordination with
the division public affairs officer works closely with the intelligence staff officer to be proactive, rather than
reactive, to such attacks. A coordinated information operations plan informs and counters the effects of
propaganda and misinformation. The plan (generally developed at BCT level in coordination with the
division information operations officer and public affairs officer) establishes mechanisms, such as a media
center or editorial board, to educate and inform local and international media, which in turn, informs the
public, with accurate and timely information. Additionally, civil affairs operations and PSYOPare integrated
into counterpropaganda efforts at the BCT level through the division, or higher headquarters’ information
operations working group.
8-142. When needed, the BCT chaplain can play an important role in bridging gaps with religious leaders
that set conditions for future successful key leader engagements and civil affairs operations. During planning,
the chaplain advises the commander concerning matters of religion, culture, and religious key leaders in the
area of operations and area of interest. The chaplain and religious affairs noncommissioned officer provide
important,up-to-date perspectives concerning local, provincial, and national atmospherics not often included
or clear in other sources. Their efforts should always be coordinated with the BCT information operations
officer and BCT information operations working group (see FM 3-13), when established.
8-143. Without a detailed Soldier and leader engagement plan, different units and staff elements meet with
and engage local leadership with different desired end states thereby undermining the ability of any or all
forces to build capacity and work towards transition to host nation lead. Coordination between staff elements
or units within the BCT, when working with the same host nation individual or office, enables unity of effort
and the desired end state for the BCT’s area security operation. The creation of a detailed engagement plan
includes identifying differences between provinces or localities within the province and sets out the
objectives to reach the desired end state. Host nation leaders in a city, district or provincehave face-to-face
meetings with these leaders to advance the creation and building of host nation capacities.
8-144. Soldier and leader engagements have a significant impact on the human component during all
operations that occur among the people. Human beings capture information and form perceptions based on
inputs received through all the senses. Humans see actions and hear words. Humans compare gestures and
expressions with the spoken word. Humans weigh the messages presented to them by the Soldiers and leaders
of the BCT, and other sources with the conditions that surround them. When the local and national news
media are unavailable or unreliable, people turn to alternative sources, such as the internet—where
information flows freely at unimaginable speeds—or rumor and gossip. Perception equals truth to people
lacking objective sources of information. Altering perceptions requires shaping information through
engagements according to how people absorb and interpret information, molding the message for broad
appeal and acceptance.
8-145. Operations security is as important during the conduct of stability-focused operations as it is during
the conduct of offensive- and defensive-focused operations. Operations security contributes to the BCT’s
ability to achieve surprise during area security missions, thus enabling its chances for success. Within the
BCT area of operations, human adversaries/enemies monitor the BCT’s normal activities to detect variations
in activity patterns that forecast future operations. They monitor the conversations of Soldiers both on duty
and off duty to gain information and intelligence. Adversaries/enemies monitor commercial internet activity
and phone calls from BCT operational and recreation facilities. They will look at trash created by BCT
activities. The absence of operations security about BCT activities contributes to excessive friendly casualties
and possible mission failure in area security operations just like it does in combat operations. The BCT’s
information superiority hinges in no small part on effective operations security; therefore, measures to protect
essential element of friendly information (EEFI) cannot be an afterthought. (See FM 3-13 and ATP3-13.1
for additional information.) |
3-96 | 333 | Stability
Note. The need to maintain transparency of the BCT’s intentions during area security operations
is a factor when balancing operations security with information release. Release authority for
information—to include foreign disclosure rules—must be fully understood by commanders and
staffs within the BCT. The public affairs and information operations officers (see FM 3-61 and
FM 3-13, respectively) lead the coordination and synchronization processes within the BCT.
Release authority for information rests with the commander at the appropriate level.
8-146. Multinational staffs result in additional security problems. Each nation has different access to U.S.
information systems. Maintaining operations security with multinational staff members is difficult and
sometimes the security rules restrict the ability of multinational partner staff officers to contribute. The chief
of staff and foreign disclosure officer at division level develop workarounds when required. One such
workaround is to provide the multinational staff officer a U.S. assistant to get on a U.S. securedinformation
system to ensure the multinational staff officer has the information needed to contribute. The division
assistant chief of staff, signal establishes and maintains two separate sets of different information systems
when this occurs. (See ATP 3-91 and ATP 6-02.75 for additional information.)
MOVEMENT AND MANEUVER
8-147. During the conduct of stability-focused operations, the BCT plans its area security movement and
maneuver simultaneously with offensive and defensive movement and maneuver, though with an extensive
emphasis on security and engagement skills (negotiation, rapport building, cultural awareness, and critical
language phrases). Movement and maneuver within the BCT area of operations is normally decentralized to
the battalion and company. Through economy of force, the BCT commander determines the right mix of
forces to quickly transition between operations as the situation requires. During area security operations, the
commander plans for future movement within the BCT’s area of operations and as required, in adjacent areas
of operation. The BCT’s lethal capabilities make the execution of area security operations possible even if
the probability of combat is remote. When new requirements develop the BCT commander plans for the
shifting of priorities when the need arises.
Fire and Movement
8-148. The application of fire and movement lends itself to several offensive and defensive operations (for
example,search and attack, cordon and search, and area defense) within the civil security and civil control
stability operations tasks. Across the range of military operations, the BCT and its subordinate units play a
major role in ensuring the outcome of these stability operations tasks. The BCT and its subordinate units are
useful in the conduct of other stability operations tasks (for example,security cooperation) because of their
deterrence value and the flexibility and labor the BCT provides to the division or higher-level commander.
Mobility and Countermobility
8-149. Mobility (see chapter 6) and countermobility (see chapter 7) operations are key enablers to area
security operations. In stability focused area security operations, mobility operations allow civilian traffic
and commerce to continue or resume. Resuming normal civilian activities in the BCT’s area of operations is
an important objective within stability focused area security operations. Countermobility operations
indirectly support stability focused area security operations in regard to offensive and defensive operations.
8-150. Mobility operations focus on keeping ground lines of communications open for both civilian and
military activities and on reducing the threat of mines and other unexploded ordnance to the same. During
area security operations, the commander and staff develop the countermobility plan concurrently with the
fire support plan and defensive scheme of maneuver, guided by the commander’s intent. When combat
engineer support falls under the mobility and countermobility tasks, it can include—
(cid:122) Constructing combat roads and trails.
(cid:122) Breaching existing obstacles (including minefields).
(cid:122) Marking minefields, including minefield fence maintenance.
(cid:122) Clearing mines and debris from roads. |
3-96 | 334 | Chapter 8
(cid:122) Conducting route reconnaissance to support the main supply routes and civilian lines of
communications.
(cid:122) Creating obstacles between opposing factions to prevent easy movement between their positions.
8-151. The BCT employs roadblocks not only to restrict traffic for security purposes, but also to control the
movement of critical cargo. Cargo could be generators designed to restore electric power in a large area or
items that support the population and resources within the BCT’s area of operations.
Occupy an Area
8-152. Planning for the occupation of an area or relief in place begins before the BCT deploys or when
being relieved, redeploys. Planning includes not only BCT forces and their activities, but also other
governmental agencies, multinational partners, host-nation agencies, and potential international
organizations. The mission variables of METT-TC determine the occupation or relief in place that occurs.
Sometimes occupation, much like occupying an initial area of operations,is appropriate. This can occur when
the BCT’s stability-focused area security operation occurs within limited intervention or peace operations. A
relief in place may be appropriate during the conduct of an area defense (see chapter 7). However, a
stability-focused area security transition by function may be more effective if the relief in place takes place
withhost-nation military forces and civil authorities within the range of military operations. Some of these
functions include medical and engineer services, local security, communications, and sustainment. BCT plans
do not remove a provided capability from the area of operations until the replacement capability is operating.
Surveillance Systems and Reconnaissance and Security Forces
8-153. In restrictive (as well as unrestrictive) terrain, the commander relies on manned and unmanned
surveillance systems and reconnaissance and security forces to collect information within the BCT’s area of
operations. Operation of ground and aerial surveillance systems in restricted terrain is often affected by
interrupted line-of-sight, and extreme climate and weather variations. In restrictive terrain, reconnaissance
and security forces within the BCT’s area of operations focus on these areas to assist in collection when
manned and unmanned surveillance capabilities are degraded. Using a combat outpost, a reinforced
observation post capable of conducting limited combat operations, is a technique for employing
reconnaissance and security forces in restrictive terrain that precludes mounted reconnaissance and security
forces from covering the assigned area. While the mission variables of METT-TC determine the size,
location, and number of combat outposts a unit establishes, a reinforced platoon typically occupies a combat
outpost. (See chapter 7 and ATP 3-21.10 for additional information.) A combat outpost must have sufficient
resources to accomplish its designated missions, such as conducting aggressive combat patrolling and
reconnaissance patrolling. Combat outposts are established when observation posts (see chapter 5 for
information on observation post activities) are threatened by insurgency or in danger of being attacked by
enemy forces infiltrating into and through the BCT’s assignedarea of operations.
Note. During the conduct of defensive-focused operations, the commander uses a combat outpost
to extend the depth of the security area, to keep friendly forward observation posts in place until
they can observe the enemy’s main body, or to secure friendly forward observation posts that will
be encircled by enemy forces. Mounted and dismounted forces can employ combat outposts. (See
chapter 7 for additional information.)
Army Aviation
8-154. Army aviation attack and reconnaissance units with manned and unmanned systems—when
deployed early with initial response forces—can be a significant deterrent on the indigenous combatants,
particularly if factions or insurgences are not yet organized during the initial response phase. Attack and
reconnaissance helicopters may be employed to act as a response force against enemy threats. Along with
unmanned aircraft systems (UASs), attack and reconnaissance helicopters may conduct reconnaissance,
surveillance, or security over wide areas and provide the BCT a means for visual route reconnaissance and
early warning. Utility helicopters provide an excellent command and control capability to support stability
focused area security operations and to transport patrols or security elements throughout the BCT’s area of |
3-96 | 335 | Stability
operations. Cargo helicopters provide the capable to move large numbers of military and civilian security
force personnel and to conduct resupply when surface transportation is unavailable, or routes become
impassable.
Note. BCT plans include measures for the effective use of all resources, to include, exploiting
airpower for transportation and resupply over extended distances and, where appropriate, tightly
controlled close air support.
Reserve and Response Force Operations
8-155. Maintaining a reserve during any operation is difficult. Often, the commander finds that the BCT
has more tasks than units to do, and stability focused area security operations are no exception. Nonetheless,
contingencies or missions may arise that require establishing a reserve. Maintaining a reserve allows the
establishing commander to plan for worst-case scenarios and to exploit opportunities, provide flexibility, and
conserve the force during long-term operations.
8-156. The response force differs from a reserve in that it is not in support of a particular engagement. A
response force is a dedicated force on a base with adequate tactical mobility and fire support designated to
defeat Level I and Level II threats and shape Level III threats until a tactical combat force can defeat them
or other available response forces. The response force answers to the establishing headquarters. (See
ATP3-91.) Considerations when establishing a response force include—
(cid:122) Threats.
(cid:122) Communication equipment and procedures.
(cid:122) Alert procedures.
(cid:122) Transportation.
(cid:122) Training priorities.
8-157. To counter an indirect fire threat, the commander employs counterfire radars throughout and area of
operations to locate hostile indirect fire systems. The use of quick reactionary forces, attack helicopter, or
local friendly forces are ideal for response to counterfire radar acquisitions as clearance of fire procedures
are often time-consuming and not necessarily reliable when determining locations for host-nation forces.
Additionally, indiscriminate use of indirect fire on counterfire radar acquisitions can lead to unwanted
collateral damage.
INTELLIGENCE
8-158. The conduct of stability focused tasks demands greater attention to civilian considerations—the
political, social, economic, and cultural factors in an assigned area of operations—than does the conduct of
conventional offensive and defensive focused tasks. Using the mission variable of civil considerations and
its subordinate characteristics identified by the mnemonic ASCOPE, the BCT staff has a standardized
baseline for analysis to generate understanding. This baseline is augmented by analyses conducted byorganic
and attached forces such as social-cultural analysis, target audience analyses, intelligence analyses,
population, and area studies. During area security operations, the commander expands the IPB process
beyond geographical and force capability considerations. (See ATP 2-01.3 for additional information on IPB
for stability missions.)
Information Collection
8-159. Information collection, specifically plan requirements and assess collection, enables relevant,
predictive, and tailored intelligence within an area of operations. (See ATP 2-01 for additional information
on the specific functions for stability missions.) Intelligence cells and knowledge management elements
within the BCT and division (or higher) headquarters and battalion and squadron headquarters develop
procedures to share collected intelligence data and products, both vertically and horizontally, throughout the
force. (See ATP 2-19.4 for additional information on intelligence techniques for stability missions.) |
3-96 | 336 | Chapter 8
Understanding
8-160. Area security operations require the integration of the division and BCT’s information collection
effort to develop a clear understanding of all potential threats and the populace. Success in the stability
environment requires a cultural understanding to gauge the reaction of the civilian population within and
external to the BCT’s area of operations to a particular COA conducted, to avoid misunderstandings, and to
improve the effectiveness of the execution of that COA by the BCT or division. Changes in the behavior of
the populace may suggest needed change in tactics, techniques, or procedures or even strategy. Biographic
information, leadership analysis, and methods of operation within the existing cultural matrix are keys to
understanding the attitudes and ability of positional and reference civilian leaders to favorably or unfavorably
influence the outcome of BCT area security operations.
Indicators of Change
8-161. During area security operations, the commander and staff tie priority intelligence requirements to
identifiable indicators of change within the operational environment, to include, civil inhabitants and their
cultures, politics, crime, religion, economics, and related factors and any variances within affected groups of
people. The commander often focuses on named areasof interest in an effort to answer critical information
requirements to aid in tactical decision-making and to confirm or deny threat intentions regardless of which
element of decisive action currently dominates. During area security operations, priority intelligence
requirements related to identifying enemy and adversary activities are tracked,where appropriate.
Commander’s Critical Information Requirements
8-162. Due to the increased reliance on human intelligence (HUMINT), when conducting area security
operations, the commander emphasizes the importance of commander’s critical information requirements
(CCIRs) to all personnel within the BCT. CCIRs are information requirements identified by the commander
as being critical to facilitating timely decision-making, and answers to CCIRs can come from staff at all
levels. All personnel must be given appropriate guidance to improve information-gathering capabilities
throughout the BCT. Interpreters, speaking to local civilian personnel, security operations, and patrolling
(combat and reconnaissance) are primary sources for assessing the economic and health needs, military
capability, and political intent of those receiving assistance who or are otherwise a party to the area security
operation. (See ADP 5-0 and ATP 3-55.4 for additional information.)
8-163. Planners at the division and BCT ensure that any HUMINT assets assigned from outside the BCT
are employed effectively, which is typically accomplished by integrating HUMINT collectors at the lowest
level possible. The gaining unit accounts for HUMINT asset security and establishes tasking priorities and
command relationships for temporary and long-term commitments. (See FM 2-22.3 for additional
information.)
Note. Medical personnel must know the Geneva Convention restrictions against medical personnel
collecting information of intelligence value except that observed incidentally while accomplishing
their humanitarian duties.
Employment and Control of Human Intelligence Collection Teams
8-164. Human intelligenceis the collection by a trained human intelligence collector of foreign information
from people and multimedia to identify elements, intentions, composition, strength, dispositions, tactics,
equipment, and capabilities (ADP 2-0). Commanders consider security when planning for the employment
of HUMINT collection teams. (See FM 2-0.) Generally, three security conditions exist: permissive, uncertain,
and hostile. |
3-96 | 337 | Stability
Note. The success of the HUMINT collection effort depends on a complex interrelationship
between command and control elements, requirements, technical control, technical support, and
collection assets. Each echelon of command has its supporting HUMINT elements to conduct
sustained HUMINT operations under all operational environments using only its organic
HUMINT assets. HUMINT units have specific support requirements to each echelon’s
commander though HUMINT units must be flexible, versatile, and prepared to conduct HUMINT
collection and analysis operations in support of any echelon of command. A coherent command
and control structure within these HUMINT organizations is necessary in order to ensure
successful, disciplined, and legal HUMINT operations. This structure is part of a coherent
architecture that includes organic HUMINT assets and HUMINT resources from national (for
example, the Defense Intelligence Agency), theater, and non-Department of Defense HUMINT
organizations. The corps, joint, division, and brigade and below intelligence staff officer is the
primary advisor on HUMINT and counterintelligence within this structure, and is the focal point
for all HUMINT and counterintelligence activities within a joint task force, an Army component
task force or a BCT. The intelligence staff officer can be organic to the unit staff or can be attached
or under OPCON to the staff from another organization such as the theater military intelligence
brigade. (See FM 2-22.3 for additional information.)
Permissive Environment
8-165. In a permissive environment, HUMINT collection teams normally travel throughout the area of
operations without escorts or a security element. HUMINT collectors may frequently make direct contact
with overt sources, view the activity, or visit the area that is the subject of the information collection effort.
They normally use debriefing and elicitation as their primary collection techniques to obtain firsthand
information from local civilians and officials.
Uncertain Environment
8-166. In an uncertain environment, security considerations increase, but risk to the collector is weighed
against the potential intelligence gain. An uncertainenvironment limits use of controlled sources and requires
additional resources. HUMINT collection teams should still be used throughout the area of operations but
normally are integrated into other ground reconnaissance or other missions. For example, a HUMINT
collector may accompany a patrol visiting a village. Security for the team and their sources is a prime
consideration. HUMINT collection teams are careful not to establish a fixed pattern of activity or arrange
contacts in a manner that could compromise the source or the collector. Debriefing and elicitation are still
the primary collection techniques. Teams are frequently deployed to conduct collection at checkpoints,
dislocated civilian collection points, and detainee collection points. They may conduct interrogations of
detainees within the limits of applicable laws and policies.
Note.The word “detainee” includes any person captured, detained, or otherwise under the control
of Department of Defense personnel. This does not include Department of Defense personnel or
Department of Defense contractor personnel or other persons being held primarily for law
enforcement purposes except where the United States is the occupying power. As a matter of
policy, all detainees will be treated as an enemy prisonerof war until the appropriate legal status
is determined and granted by competent authority in accordance with the criteria enumerated in
the Geneva Convention Relative to the Treatment of Prisoners of War (GPW). Detainees include
enemy prisoners of war, retained persons, civilian internees, and detained persons. Detaining
officials must recognize that detainees to include those who have not satisfied the applicable
criteria in the GPW are still entitled to humane treatment. The inhumane treatment of detainees is
prohibited and is not justified by the stress of combat or deep provocation (see JP 3-63). |
3-96 | 338 | Chapter 8
Hostile Environment
8-167. In a hostile environment, three concerns for HUMINT collection are access to the sources of
information, timeliness of reporting, and security for the HUMINT collectors. A hostile environment requires
significant resource commitments to conduct controlled source operations. Prior to the entry of a force into
a hostile area, HUMINT collectors may be used to debrief civilians, particularly dislocated civilians, and to
interrogate other detainees who have been in the area. HUMINT collection teams are normally located with
the friendly units to facilitate timely collection and reporting. HUMINT collectors accompany the BCT lead
elements or ground reconnaissance and security forces during operations. They interrogate detainees and
debrief dislocated civilians and friendly force patrols.
Security Missions
8-168. Due to the possibility of tying forces to fixed installations or sites, security missions may become
defensive in nature. When this occurs the BCT commander carefully balances with the need for offensive
action. Early warning of enemy activity through information collection is paramount in the conduct of area
security missions to provide the commander with time to react to any threat or other type change identified
within the stability environment. The BCT’s IPB identifies the factors effecting security missions within the
assigned area of operations. Factors, although not inclusive, include—
(cid:122) The natural defensive characteristics of the terrain.
(cid:122) The existing roads and waterways for military lines of communication and civilian commerce.
(cid:122) The control of land and water areas and avenues of approach surrounding the area security.
(cid:122) The airspace management.
(cid:122) The proximity to critical sites such as airfields, power generation plants, and civic buildings.
FIRES
8-169. The conduct of fires in support of stability-focused tasks is essentially the same as for offensive-and
defensive-focused tasks. However, constraint is vital in the conduct of fires during stability-focused tasks.
Such constraint typically concerns the munitions employed and the targets engaged to obtain desired effects.
Constraint increases the legitimacy of the organization that uses it while potentially damaging the legitimacy
of an opponent.
Employment of Fires
8-170. Employment of fires provides continuous deterrents to hostile action and are a destructive force
multiplier for the commander, regardless of which element of decisive action currently dominates. Within
stability-focused tasks, the planning and delivering of fires precludes fires on protected targets, unwanted
collateral damage, and the political ramifications of perceived excessive fire. In addition to lethal effects, the
targeting functions ofthe BCT fire support cell includes nonlethal effects input to the information collection
plan and the targeting working groups at the division and BCT headquarters (see chapter 4 for targeting
functions within the BCT fire support cell).
8-171. During the employment of fires, the commander having the ability to employ a weapon does not
mean it should be employed. In addition to collateral damage considerations, the employment of fires could
have second and third order negative effects. Collateral damage could adversely affect efforts to gain or
maintain legitimacy and impede the attainment of both short-and long-term goals. For example, excessive
force can antagonize those friendly and neutral parties involved. The use of nonlethal capabilities should be
considered to fill the gap between verbal warnings and deadly force to avoid unnecessarily raising the level
of conflict. Key considerations for employment of fires in support of stability-focused tasks include—
(cid:122) Stability-focused tasks conducted in noncontiguous areas of operation complicate the use of fire
support coordination measures, the ability to mass and shift fires, and clearance of fires
procedures.
(cid:122) Key terrain may be based more on political, cultural or social considerations than physical features
of the landscape; fires may be used more frequently to defend key sites than to seize them. |
3-96 | 339 | Stability
(cid:122) Rules of engagement are often more restrictive than in combat operations; commander’s guidance
for fires requires careful consideration during development and wide dissemination to all levels.
(cid:122) Precision-guided munitions or employment of nonlethal capabilities may be necessary to limit
collateral damage.
(cid:122) Fires that may be used to demonstrate capabilities, as a demonstration (see chapter 6), or during a
denial operation (see chapter 7).
Note. Mortars at the BCT and below, due to their smaller bursting radius, reduce collateral
damage. Mortars are generally more responsive to the small-unit operations common to area
security missions. In addition to lethal fires, mortars may provide illumination to demonstrate
deterrent capability, observe contested areas, or support area security missions (including
patrolling [reconnaissance and combat]).
Application of Lethal and Nonlethal Capabilities
8-172. Though highly effective for their intended purpose, lethal capabilities may not always be suitable.
For example, during stability-focused tasks, the application of lethal fires is normally greatly restricted,
making the use of nonlethal capabilities the dominant feasible option. The considerations for use of nonlethal
capabilities in targeting should not pertain to only specific phases or missions but should be integrated
throughout the area of operations. Escalation of force measures can be established in order to identify hostile
intent and deter potential threats at checkpoints, entry control points and in convoys. Such measures remain
distinct from other use of force guidance such as fire support coordination measures and are intended to
protect the force, minimize the use of force against civilians while not interfering with self-defense if attacked
by adversaries. One of the primary mechanisms for employing nonlethal capabilities and generating nonlethal
effects is information operations. Participating in the targeting process, information operations synchronizes
a range of nonlethal capabilities to produce nonlethal effects that advance the desired end state. Thus,
information operations participate in the targeting process.
Fire Support Coordination Measures
8-173. As during offensive-and defensive-focused tasks, fire support coordination measures are established
for stability-focused tasks to facilitate the attack of high-payoff targets (HPTs) throughout the area of
operations. Restrictive fire support coordination measures are those that provide safeguards for friendly
forces and noncombatants, facilities, or terrain. For example, no-fire area, restrictive fire areas, restricted
target lists, restrictive fire lines, and fire support coordination lines may be used not only to protect forces,
but also to protect populations, critical infrastructure, and sites of religious or cultural significance.
Regardless of which element of decisive action currently dominates, coordination measures are required to
coordinate ongoing activities to create desiredeffects and avoid undesired effects.
Note.Fire support coordination, planning, and clearance demands special arrangements with joint
and multinational forces and local authorities. These arrangements include communications and
language requirements, liaison personnel, and procedures focused on interoperability. The North
Atlantic Treaty Organization standardization agreements provide excellent examples of
coordinated fire support arrangements. These arrangements provide participants with common
terminology and procedures.
SUSTAINMENT
8-174. The BCT commander’s responsibilities during area security include support areas and extend to
self-protection of BCT assets operating outside of the BCT echelon support areas. Forces engaged in area
security operations protect the force, installation, route, area, or asset. Area security operations are often
designed to ensure the continued conduct of sustainment operations to support decisive and shaping
operations by generating and maintaining combat power. Area security operations may be the predominant
method of protecting echelon support areas that are necessary to facilitate the positioning, employment, and |
3-96 | 340 | Chapter 8
protection of resources required to sustain, enable, and control forces. (See chapter 4 for additional
information.)
PROTECTION
8-175. BCT activities associated with executing security operations (see FM 3-90-2), physical security (see
ATP3-39.32), antiterrorism (see ATP 3-37.2), and operations security (see FM 3-13) tasks enhance the
security of the command within an areaof operations. In large part, the measures within these four tasks are
the same or complementary. Stability-focused operations closely resemble BCT activities for these tasks
during the conduct of offensive- and defensive-focused operations though the BCT generally works closer
with civilian inhabitants. (See ATP 3-91 for additional information.)
Establish and Maintain Security
8-176. The BCT conducts security operations to ensure freedom of movement and action and to deny the
enemy the ability to disrupt operations. Commanders combine offensive, defensive, and stability operations
tasks, and information collection means to protect friendly forces, populations, infrastructure, and activities
critical to mission accomplishment. The BCT integrates with partner military, law enforcement, and civil
capabilities to establish and maintain security. The ability to establish control is critical to consolidating gains
in the wake of successful military operations.
8-177. Security operations prevent surprise, reduce uncertainty, and provide early warning of enemy
operations. Warning of enemy operations provides forces with time and maneuver space with which to react
and develop the situation. Security operations prevent enemies from discovering the friendly plan and protect
the force from unforeseen enemy actions. Security elements focus on preventing the enemy from gathering
EEFI. Security is a dynamic effort that anticipates and thwarts enemy collection efforts. When successful,
security operations allow the BCT to maintain the initiative within the stability environment.
8-178. Protection is a continuous activity; it integrates all protection capabilities to safeguard bases, secure
routes, and protect forces. Effective physical security and antiterrorism measures, like any stability measure,
overlap and are employ in-depth. For example, planners determine how military police support enhances unit
physical security and antiterrorism capabilities by performing area security operations inside and outside an
echelon support area or consolidation area. Military police also conduct response force operations to defeat
LevelII threats against bases or critical assets and delay Level III threats in an echelon support area until a
tactical combat force can respond. (See ATP 3-39.11 for information on military police special reaction
teams.)
8-179. The BCT commander pays attention to physical security and antiterrorism operations throughout the
stability environment. This is especially true when subordinate units conduct noncontiguous operations, as
the success of the BCT mission may depend on protecting support areas from enemy attacks. The
commanders must address the early detection and immediate destruction of enemy forces attempting to attack
support or consolidation areas. Enemy attacks against sustainment and other facilities can range in size from
individual saboteurs to enemy airborne or air assault insertions targeted against key military and civilian
facilities and capabilities. These enemy activities, especially at smaller unit levels, may even precede the
onset of large-scale combat and be almost indistinguishable from terrorist acts. The BCT implements
operations security and other information protection measures to deny the enemy force information about
friendly dispositions.
Note. Within the stability environment, deploying battalions and higher echelons should have a
trained Level II antiterrorism officer assigned. An assigned antiterrorism officer works to ensure
that security considerations are integrated in base designs and unit operations. These individuals
guide their units in conducting threat assessment, criticality assessments, and vulnerability
analysis to determine each unit’s vulnerability to terrorism. (See ATP 3-91 and ATP3-37.2 for
additional information.) |
3-96 | 341 | Stability
Assessments to Support Protection Prioritization
8-180. Initial protection planning by the BCT commander and staff requires various assessments to
establish protection priorities. Assessments include threats, hazards, vulnerability, and criticality. These
assessments are used to determine which assets can be protected given no constraints and which assets can
be protected with available resources. There are seldom sufficient resources to simultaneously provide all
assets the same level of protection. For this reason, the commander makes decisions on acceptable risks and
provides guidance to the staff so that they can employ protection capabilities based on protection priorities.
8-181. Protection planning is a continuous process that includes an understanding of the threats and hazards
that may impact operations throughout the BCT’s area of operations. Protection capabilities are aligned to
protect critical assets and mitigate effects from threats and hazards. The protection cell prioritizes the
protection of critical assets that best supports the commander’s end state. Protection prioritization lists are
organized through the proper alignment of critical assets. The commander’s priorities and intent and the
impacts on mission planning determine critical assets. Critical assets can be people, property, equipment,
activities, operations, information, facilities, or materials. For example, important communications facilities
and utilities, analyzed through criticality assessments, provide information to prioritize resources while
reducing the potential application of resources on lower-priority assets. Stationary weapons systems might
be identified as critical to the execution of BCT operations and, therefore, receive additional protection. The
lack of a replacement may cause a critical asset to become a top priority for protection.
Protection Template
8-182. The protection template lists and integrates all protection tasks in an appropriate way for use by
subordinate units, and any base and base cluster operations envisioned to be established during the BCT’s or
subordinate battalion or squadron’s area security operation. The protection cell when established within the
BCT operations staff officer (S-3) section augments the staff with a small protection planning cell that
maintains and publishes the template in coordination with the division protection cell. The template is used
as a reference before or during employment. Battalion/squadron and base/base cluster situational
modifications to this template, and their regular rehearsal of all parts of protection plans are inspected
periodically by the BCT protection working group. During inspections, the protection working group
identifies weak areas in subordinate protection plans, ensures that area of operations protection best practices
are incorporated into the plans of the BCT, and provides protection-related observations, insights, and lessons
learned to subordinate units, and any unit relieving the BCT or subordinate unit within its area of operations.
Note. When a protection cell officer or noncommissioned officer is not designated within or
attached to a battalion/squadron, protection cell functions and tasks are the responsibility of the
battalion/squadron operations officer or noncommissioned officer. Key protection tasks conducted
within the BCT’s area security operation include area security, chemical, biological, radiological,
and nuclear (CBRN) operations, coordinating air and missile defense, personnel recovery,
explosive ordnance disposal, and detainee operations. (See ATP 3-91 for additional information
on integrating and synchronizing protection tasks.)
Protective Services
8-183. The commander may determine that it is necessary (or be required) to provide protective services
from within the BCT to protect high-value host nation civil and military authorities or other selected
individual(s). This requirement usually occurs when host-nation security forces have been so extensively
penetrated by hostile elements that they cannot be trusted to provide protective services or when host-nation
security forces lack the technical skills and capabilities to provide the desired degree of protection. The
element(s) tasked to perform protective services for designated personnel receives as much training and
specialized equipment as is possible before the mission. (See ATP 3-39.35 for additional information.) |
3-96 | 342 | Chapter 8
Allocation of Combat Power
8-184. Protection of installations or areas of operation (including route and convoy security) by the BCT
require significant allocation of combat power when a threat beyond organized crime exists. Conducting
resupply from one base to another is treated as a tactical action and tracked in the BCT main CP current
operations cell. When the BCT establishes a response force(s), care is taken so that the response force does
not establish patterns when responding to incidents. Establishment of patterns-same route, same movement
formation, configuration and order of vehicles, and same response force responding from the same
base-allows an enemy to ambush the response force at a point of its choosing.
Note. Dependent on the situation, host-nation security forces are involved as much as possible in
the performance of the above protection tasks. Host-nation support is important in the variety of
services and facilities that can support security and protection assets within the BCT’s area of
operations. Services provided by the host nation can relieve the BCT of the need to provide
equivalent capabilities thereby reducing the BCT’s sustainment and protection footprint. Key
criteria in the decision-making process to utilize host-nation support is the trust in host-nation to
provide the support and that host-nation forces have the technical skills and capabilities to provide
the desired degree of protection.
Threat Levels
8-185. Threats within the BCT’s area security operation are categorized by the three levels of defense
required to counter them. Any or all threat levels may exist simultaneously in the BCT’s area of operations.
Emphasis on base defense and security measures may depend on the anticipated threat level. Within the
BCT’s area of operations all elements protect themselves from Level I threats. This includes medical
elements although they have reduced defensive capabilities since they can only use their nonmedical
personnel to provide their own local security. Locating medical elements and other support elements on bases
with other units mitigate this factor.
8-186. The BCT commander positions response forces to respond to a Level II threat (enemy force or
activities that can be defeated when augmented by a response force) in appreciation of time-distance factors
so that no element is left outside supporting distance from a response force. The commander integrates fire
support assets into the composition of the response because of the speed at which these assets can react over
the extensive distances involved in area security operations. Where possible, host-nation security assets
constitute part of the response to smooth the interactions of these forces with the civilian population.
Note. A Level III threat is an enemy force or activities beyond the defensive capability of any
local reserve or response force. The response to a Level III threat is a tactical combat force,
generally established no lower than division level due to the inability to resource at lower echelons.
(See chapter 9for additional information on threat levels.)
Survivability
8-187. Precautions should be taken to protect positions, headquarters, support facilities, and
accommodations including the construction of obstacles, protective bunkers, fighting positions, and shelters.
BCT subordinate units practice alert procedures and develop drills to occupy positions. Engineer forces
enable, when available, survivability needs. Units maintain proper camouflage and concealment based on the
mission variables of METT-TC. Area security forces are vulnerable to personnel security risks from local
employees and other personnel subject to bribes, threats, or compromise. The threat from local criminal
elements is a constant threat and protection consideration. The most proactive measure for survivability is
individual awareness by Soldiers in all circumstances. Soldiers look for things out of place and patterns
preceding aggression. Commanders and subordinate leaders ensure Soldiers remain alert, do not establish
routines, and maintain appearance and bearing. (See chapter 7 and ATP 3-37.34 for additional information.) |
3-96 | 343 | Stability
Notes.In stability-focused operations, the enemy sniper poses a significant threat to dismounted
(or mounted) movement and marches. Counter-sniper drills should include rehearsed responses,
reconnaissance and security operations, and the incorporation of cover and concealment. The
BCT’s rules of engagement provide instructions on how to react to sniper fire, including
restrictions on weapons used dependingon the circumstances. For example, rules of engagement
may allow units to use weapon systems, such as a sniper rifle team, to eliminate a positively
identified sniper even in a crowded urban setting because of the reduce possibility for collateral
damage.(See ATP 3-21.20, appendixE and ATP 3-21.18 for additional information.)
An enemy improvised explosive device (IED) attack is another major threat to dismounted (or
mounted) movement and marches. Prior to the conduct of any area security mission, commanders
and subordinate leaders’ brief personnel on the latest IED threat types, usage, and previous
emplacements within an area of operations or along mounted and dismounted movement or march
routes. All Soldiers maintain situational awareness by looking for IEDs and IED hiding places.
Units vary routes and times, enter overpasses on one side of the road and exit out the other, train
weapons on overpasses as the movement passes under, and avoid chokepoints to reduce risk. Units
should expect an IED attack at any time during movements and expect an ambush immediately
after an IED detonation. Early mornings and periods of reduced visibility are especially dangerous
since the enemy has better opportunities to emplace IEDs without detection. (See ATP3-21.18
and ATP 3-21.8 for additional information.)
Air and Missile Defense
8-188. Offensive and defensive air defense planning considerations continue to apply when the BCT
conducts stability-focused operations. However, the air threat trends toward Group 1 and 2 UASs (see
ATP3-04.64) employed by enemy forces opposing the BCT’s effort to provide a stable, safe, and secure
environment. Air and missile defense sensors and command and control elements external to the BCT provide
early warning against aerial attack, and populatethe BCT’s COP. Soldiers train in aircraft recognition and
on rules of engagement due to multiple factions using the same or similar aircraft, to include international
and private organizations employing their own or charter civilian aircraft. (See ATP 3-01.8 for additional
information.)
Note.See ATP 3-01.15 for information on the tactics, techniques, and procedures for an integrated
air defense system. See ATP 3-01.50 for information on the operations of the air defense and
airspace management cell established within the BCT fire support cell. (See chapter 4 for
additional information.)
8-189. Counterrocket, artillery, and mortar batteries may be located in or near the BCT’s area of operations
to support its area security mission. Battery sensors detect incoming rockets, artillery, and mortar shells and
may be used to detect Group 1 and 2 UASs. The battery’s fire control system predicts the flight path of
incoming rockets and shells, prioritizes targets, and activates the supported area of operations’ warning
system according to established rules of engagement. Exposed elements within the area of operations then
can take cover and provide cueing data that allows the battery’s weapon system to defeat the target before
the target can impact the area. The commander clearly defines command and support relationships between
counter-rocket, artillery, and mortar elements and the BCT during planning. (See ATP 3-01.60 for additional
information.)
8-190. The BCT commander and subordinate commanders and leaders ensure all passive and active air
defense measures (see chapter 6) are well planned and implemented. Passive measures include use of
concealed routes and assembly areas, movement on secure routes, marches at night, increased intervals
between elements of the columns, and dispersion. Active measures include use of organic and attached
weapons according to the operation order and unit SOP. Air guard duties assigned to specific Soldiers during
dismounted (or mounted) movements and marches give each a specific search area. For movements and
marches, seeing the enemy first gives the unit time to react. Leaders understand that scanning for long periods |
3-96 | 344 | Chapter 8
decreases the Soldier’s ability to identify enemy aircraft. During extended or long movements and marches,
Soldiers are assigned air guard duties in shifts. (See ATP 3-21.18 and ATP 3-21.8 for additional information.)
Force Health Protection
8-191. The nature of area security in support of stability-focused tasks requires the BCT surgeon to stress
planning for the provision of preventive medicine, veterinary services, and combat and operational stress
control over that inherent in supporting offensive- and defensive-focused tasks. The BCT’s area security
mission focused within the conduct of stability-focused tasks interacts with the civilian population of its area
of operations to a far greater degree. Under these conditions, the probability of Soldiers exposure to zoonotic
diseases, toxic industrial chemicals and other pollutants, and bad food and water increases. The prolonged
tours of duty typically associated with these operations and the enemy’s use of unconventional weapons,
such as mines and suicide bombers, tends to increase psychiatric casualties. The BCT surgeon coordinates
the employment of combat stress teams with the chaplain to best meet the needs of BCT Soldiers for stress
control. (See ATP 3-91 and ATP 4-02.8 for additional information.)
Chemical, Biological, Radiological, and Nuclear Operations
8-192. CBRN operations are the employment of capabilities that assess, protect against, and mitigate the
entire range of CBRN incidents to enable freedom of action. CBRN operations support operational and
strategic objectives to counter WMD and operate safely in a CBRN environment. An effective CBRN defense
by the BCT counters enemy threats and attacks and the presence of toxic industrial materials in its area of
operations by minimizing vulnerabilities, protecting friendly forces, and maintaining an operational tempo
that complicates enemy or terrorist targeting.
8-193. The BCT employs key CBRN passive defense activities organized within two overarching CBRN
principles (protection and contamination mitigation, see figure 7-3 on page 7-18) to survive and sustain area
security operations in a CBRN environment. The BCT commander and staff, in coordination with the division
or higher headquarters, integrate these principles regardless of the mission type.
8-194. The commander considersthe requirement for CBRN support if evidence exists that enemy forces
or terrorists have employed CBRN agents or have the potential for doing so. A mix of different CBRN units—
such as decontamination, hazard response, reconnaissance, and surveillance—are necessary to balance
capabilities. The CBRN staff officer at the BCT and battalion/squadron participates in the intelligence process
to advise the commander of commercial and toxic industrial materials in the local area. (See ATP 3-91 and
FM 3-11 for additional information.)
Convoy Security
8-195. Convoy security is a specialized kind of area security operations conducted to protect convoys. Units
conduct convoy security operations anytime there are insufficient friendly forces to secure routes
continuously in an area of operations and there is a significant danger of enemy or adversary ground action
directed against the convoy. The BCT may conduct convoy security operations in conjunction with route
security operations within its area of operations. Planning includes designating units for convoy security;
providing guidance on tactics, techniques, and procedures for units to provide for their own security during
convoys; or establishing protection and security requirements for convoys carrying critical assets. Local or
theater policy typically dictates when or which convoys receive security and protection. (See ATP4-01.45
for additional information.)
PREPARATION
8-196. During preparation activities, the BCT continues to plan, train, organize, and equip for area security
missions within its area of operations. The conduct of preparation activities in support of stability-focused
tasks is essentially the same as for offensive- and defensive-focused tasks. (See ADP 5-0 for a complete
discussion.) However, factors that distinguish stability-focused tasks are the increased requirement for
interagency coordination at BCT level and below and the demands on the BCT and subordinate staffs to
perform tasks or functions outside their traditional scope of duties. The commander’s realignment of |
3-96 | 345 | Stability
organizations and functions during area security operations reflect carefully weighing and accepting risk (for
example,economy of force) to reflect the demands of the BCT’s area security mission.
COMMAND AND CONTROL
8-197. Stability-focused tasks within area security operations are more complex because they involve to a
greater extent unified action partners, sister services, and host-nation forces. BCT preparatory activities stress
clarity and transparency about the command relationship between the BCT and the other military service
components or agencies that operate in assigned or projected areas of operations. Though difficult, the BCT
commander strives to achieve unity of effort with unified action partners, spending a great deal of effort
during preparations to clarify the roles and functions of the various, often competing agencies.
Inherent Responsibilities
8-198. The BCT commander has inherent responsibilities—including the requirements to clarify the
mission; to determine the controlling legal and policy authorities; and to organize, direct, sustain, and care
for the organizations and individuals for whom they provide the effort in interagency and multinational
operations. The commander serves as the unit’s chief engager, responsible for informing and influencing
audiences inside and outside the organization. For example, the commander often integrates host-nation
security forces and interagency activities with subordinate battalion, companies and platoons and down to
the individual Soldier level forsupport units. With this in mind, obtaining the necessary numbers of scalable
communications packages and linguist to support the BCT’s planned operations and training are important
preparatory activities.
Continue to Coordinate and Conduct Liaison
8-199. Coordinating and conducting liaison ensures that subordinate commanders and leaders internal and
external to the BCT understand their unit’s role in upcoming operations, and that they are prepared to perform
that role. In addition to military forces, many civilian organizations may operate in the same area of
operations. Their presence can both affect and be affected by BCT operations. Continuous coordination and
liaison between the command and unified action partners helps to build unity of effort, especially with civilian
organizations because of the variety of external organizations and the inherent coordination challenges.
8-200. Available resources and the need for direct contact between sending and receiving headquarters
determine when to establish liaison. Establishing and maintaining liaison enables direct communications
between the sending and receiving units or headquarters beginning with planning and continue through
preparing and executing, or it may start (although not preferred) as late as execution. The BCT commander
and staff coordinate with higher, lower, adjacent, supporting, and supported units and civilian organizations.
Coordination includes but is not limited to the following:
(cid:122) Sending and receiving liaison teams.
(cid:122) Establishing communication links that ensure continuous contact during execution.
(cid:122) Exchanging SOPs.
(cid:122) Synchronizing security operations with reconnaissance plans to prevent breaks in coverage.
(cid:122) Facilitating civil-military coordination among those involved.
Continue to Build Partnerships andTeams
8-201. As part of the BCT’s coordination efforts, the commander may establish or utilize (from higher
echelon) special negotiation elements that move wherever they are needed to build partnerships or teams and
diffuse or negotiate confrontations within the BCT area of operations. Echeloned elements partner with
linguist support and personnel with the authority to negotiate on behalf of the appropriate level chain of
command. As the BCT and these elements conduct preparatory activities, subordinate units of the BCT
rehearse activities supporting these operations and when required ensures that these elements have access to
required transportation and communications assets. |
3-96 | 346 | Chapter 8
Initiate the Information Network
8-202. During preparation, the information network is tailored and engineered to meet the specific needs of
each operation and partnered participant. This includes not only communications, but also how the
commander expects information to move between and be available for subordinate commanders and leaders
and their units within an area of operations. During preparation, the staff and subordinate units prepare and
rehearse the information network supporting the plan. Network considerations include the following:
(cid:122) Management of available bandwidth.
(cid:122) Availability and location of data and information.
(cid:122) Positioning and structure of network assets.
(cid:122) Tracking status of key network systems.
(cid:122) Arraying sensors, weapons, and the information network to support the concept of operations.
Note. Defining the ground rules for sharing unclassified information between the BCT, other
military forces and foreign governments, nongovernmental organizations and international
agencies according to higher commander policy is an important function of the division and BCT
knowledge management and foreign disclosure officers. The division assistant chief of staff, signal
and BCT signal staff officer (S-6) staff sections are responsible for disseminating and
implementing those ground rules to subordinate units of the BCT.
MOVEMENT AND MANEUVER
8-203. Success in area security operations hinge on protecting the BCT forces within the area of operations
and their ability to act in support stability-focused tasks. The positioning and repositioning of forces address
the early detection and defeat of enemy forces attempting to operate within the BCT’s area of operations.
Enemy attacks within the BCT’s area security range from individual saboteurs and terrorist acts to enemy
insurgent operations.
Assign and Define Responsibility
8-204. During preparation activities, the commander assigns and defines responsibilities for the security of
units within the BCT’s area of operations or respective base or base cluster. Subordinate areas of operation
or base and base cluster commanders are responsible for the local security of their respective area or base
and base cluster. Individual area of operations and base commanders’ designate protection standards and
defensive readiness conditions (in coordination with the BCT’s security plan) for tenant units and units
transiting through their area or base. Commanders coordinate with the BCT main CP to mitigate the effects
of security operations on the primary functions of units located within the area of operations.
Degree of Risk
8-205. The degree of risk the BCT commander accepts within an area security operation, regarding the
enemy threat, invariably passes to the subordinate unit commander assigned the area security mission. For
example, the subordinate unit commander moves security forces to decrease the threat’s impact on logistics
and medical units to support the BCT’s continued operations at the anticipated level. When available and to
not divert any BCT assets from their primary area security missions, military police (see ATP 3-39.30) or
other available security force (possibly host nation) screen or guard friendly CP facilities and critical sites
from enemy observation or attack. Subordinate unit security plans, to protect CPs, critical sites, base, base
clusters, and security corridors, are rehearsed and inspectedby the commander. These plans address support
unit, site, and base and convoy defense against Level I threats. Plans also address response force operations
directed against Level II and Level III threats (see chapter 9 and ATP 3-91 for additional information on
threat levels). |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.