FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-81
89
Chapter 5 Sustainment Sustainment is the provision of logistics, financial management, personnel services, and health service support necessary to maintain operations until successful mission completion. (ADP 4-0). Sustainment provides freedom of action, extends operational reach, and prolongs endurance to unified land operations. It is essential to retaining and exploiting the initiative. Sustainment provides the support necessary to maintain operations until mission accomplishment. MEB commanders use their assets to maintain the momentum of operations and enhance the capabilities of their forces. This chapter discusses sustainment of the MEB. PLANNING 5-1. The sustainment warfighting function is defined as the related tasks and systems that provide support and services to ensure freedom of action, extend operational reach, and prolong endurance (see ADP 3-0). Sustainment encompasses the elements of logistics, personnel services, financial management, and HSS required for mission accomplishment. Logistics is planning and executing the movement and support of forces. The elements of logistics include maintenance, transportation, supply, field services, distribution, operational contract support, and general engineering. The Army HSS is support and services performed, provided, and arranged by the Army Medicine to promote, improve, conserve, or restore the behavioral and physical well-being of personnel by providing direct patient care that includes medical treatment (organic and area support) and hospitalization, medical evacuation (to include medical regulating), and medical logistics (to include blood management). Personnel services include human resources (HR) support, legal support, religious support, and band support. Financial management encompasses finance operations and resource management. 5-2. This chapter discusses how the MEB sustains itself. The MEB is a unique organization that can expand to employ a wide range of capabilities, each with their own sustainment needs. Operational planners must ensure that MEB sustainment planning is conducted as early as possible and continue to monitor as the mission changes to effectively sustain the MEB throughout the operation. Because the MEB no longer has a BSB, the MEB S-4 must work with the higher echelon headquarters and the sustainment command headquarters to conduct METT-TC analysis to ensure that the MEB has the required sustainment support to ensure mission success. 5-3. The MEB staff synchronizes operations across all six warfighting functions to generate and maintain combat power. It plans tactical logistics. The MEB S-4, S-1, brigade surgeon, and chaplain are the principal sustainment planners for the MEB. The S-4 is the principal sustainment executer. Logistics synchronization for the brigade is done between the primary staff sections and S-4. The MEB commander designates who will oversee logistics synchronization for the brigade. The MEB commander may elect to use the deputy commanding officers, the XO, or the brigade S-4 to oversee logistics synchronization for the brigade. The MEB obtains the logistics preparation of the theater information and products from the supporting sustainment brigade and the higher echelon headquarters concept of operations and integrates this with their IPB. The S-4 and S-1 maintain a continuous sustainment estimate during all operations. They use the logistics estimate to determine sustainment capabilities, anticipate support requirements, identify and resolve shortfalls, and develop support plans. They integrate into all planning what is needed to develop and synchronize sustainment with maneuver and fire plans. Sustainment commanders and planners must thoroughly understand the mission, tactical plans, and the MEB commander’s intent.
3-81
90
Chapter 5 5-4. The MEB must know the— * Mission, task organization, and concept of operations for all subordinate battalions and attachments under MEB control. * Higher headquarters sustainment plans. * Known and anticipated branch plans and sequels. * Density of personnel and equipment of each subordinate unit. * Known and anticipated enemy situation and capabilities. * Capabilities and limitations of subordinate units. * Host-nation support and contract capabilities. * Size and capabilities of local population civil infrastructure. * Capacity and capability of local government and nongovernmental agencies. * Cultural considerations in the MEB AO. 5-5. The MEB does not necessarily need to establish a brigade support area. Given the MEB mission, it will typically be collocated with a support battalion providing general support to the MEB and other units in the support area. MEB operations may require split-based sustainment operations. The S-4 may conduct replenishment operations within the MEB support AO or within the AO of a unit that the MEB is supporting. 5-6. Logistics planners must understand the MEB current and projected sustainment capabilities. They use information collected from personnel and logistics reports and operational reports to determine the personnel, equipment, and supply status of each unit within the MEB. They consider the disposition and condition of all supporting sustainment units and individual unit-level capabilities. They analyze this data and the current situation to determine the MEB logistical capabilities and limitations. 5-7. Sustainment planners must anticipate and understand support requirements of a tactical plan or COA. Running estimates are a critical tool for achieving shared understanding. The S-1, surgeon, and S-4 analyze all COAs and modifications to current plans. They assess their sustainment feasibility, identify support requirements, and determine requirements for synchronization. The S-1 and S-4, like the commander, must visualize how the operation will unfold to determine critical requirements for each sustainment element. They consider the requirements for each sustainment element during all phases of an operation. They analyze each COA and consider the— * Type and duration of the operation. * Task organization, tasks, and sustainment requirements of subordinate forces. * Medical and maintenance profile of units to be assigned or attached. * Ramifications of tactical operations such as gap (river) crossings, tactical pauses, long movements, preparatory fires, or defenses. * Need for special equipment, supplies, or service. * Requirements to separate, disassemble, configure, uncrate, or trans-load supplies above normal requirements. * Requirements for reconstitution. * Required varieties and quantities of all classes of supplies (especially Class III, V, VIII, and IX). * Requirements for support of reconnaissance forces, security operations, or deception efforts. * Need for Class IV/V obstacle material. * Positioning of combat trains and other supporting logistics elements. * Casualty numbers and likely locations. * Large-scale decontamination operations in support of BCTs or consequence management decontamination operations. * Area damage control preparations and response. * Minimal essential stability tasks to support the operation.
3-81
91
Sustainment 5-8. The S-4’s analysis also includes estimated attrition based on likely outcomes of subordinate missions. Analysis of estimated attrition primarily focuses on critical systems. The S-1, in coordination with the surgeon, assists by projecting potential personnel losses (through development of the casualty estimate). To perform this analysis, current unit personnel and equipment densities, standard planning factors, operations logistics software, and historical data are used in conjunction with the operations logistics plan. When analyzing COAs, this projection helps the commander understand the potential losses and associated risks of each COA. 5-9. To understand the MEB capabilities and determine support requirements, logistics planners apply a METT-TC analysis to the operation. Table 5-1 gives an example of general sustainment considerations for tactical operations. Table 5-1. Logistics considerations for tactical operations MEB mission and commander’s intent. Concept of operations. Higher headquarters mission and concept of operations. Mission Higher headquarter concept of support. Type and duration of operation. Required supply rate. Controlled supply rate. Enemy capabilities and tactics that could threaten sustainment operations. Enemy Enemy unconventional tactics that could threaten sustainment operations. Anticipated amount of detainees. MEB task organization to include supporting logistics units. Location and condition of all units, including sustainment units. Current and projected status of personnel, equipment, and classes of Troops supply. Availability and status of services. Unit level sustainment capabilities. Effects of weather and terrain on sustainment operations. Terrain and Weather Additional sustainment requirements of the MEB due to weather and terrain. Condition of infrastructure such as roads and bridges. Impact on the ability to build-up supplies and replenish units. Time Available Planning and preparation time for sustainment units. Impacts of time on support requirements and distribution methods. Host nation support and contract services. Impact of civilian and refugee movements. Civil Considerations Potential for hostile reactions by civilians against sustainment operations. Potential detainee or resettlement requirements. Provision of minimum essential stability tasks. Legend: MEB maneuver enhancement brigade 5-10. The S-4, in coordination with the surgeon, S-1, and all elements of the MEB staff, must balance support requirements and priorities with available sustainment capabilities. They consider existing stockage, anticipated receipts, capacities, and capabilities. They must assess the status of all sustainment functions (logistics, personnel services, financial management, and HSS) required to support the MEB and compare them to available capabilities. They identify potential shortfalls then take or recommend actions to eliminate or reduce their effect on the operation.
3-81
92
Chapter 5 5-11. When a sustainment shortfall is identified, the sustainment planners take every available action to eliminate or reduce its effect. They must understand its potential impact on the force, the risk it presents to mission accomplishment, its duration, and which requirement exceeded the unit capabilities. They analyze the shortfall to determine its cause, such as battle losses, supply availability, resource availability (equipment, man-hours), or distribution shortfall. They consider the following actions to resolve a shortfall: * Shifting supplies or assets by phase of the operation. * Requesting support or additional assets from higher headquarters. * Using alternative distribution methods. * Considering the use of host-nation support. * Considering pre-positioning supplies or attaching additional sustainment capabilities to subordinate forces. * Modifying the COA or plan. 5-12. Based on the logistics estimate, the sustainment planners develop support plans. The overall sustainment plan is briefly described in the concept of support. The concept of support provides all commanders and staffs a general understanding of the commander’s priorities and how the operation will be logistically supported. Detailed sustainment plans are outlined in Annex F (Sustainment) to the MEB OPORD or as part of a fragmentary order. The S-4 and executive officer closely monitor the implementation of the sustainment plan. They adjust sustainment operations or shift resources to account for changing situations or changes in priorities (such as shifting the main effort) or to replace lost sustainment capabilities. 5-13. The MEB staff plans for the sustainment of a frequently changing task organization with augmentation from other unified action partners. Attachments to the MEB should arrive with their appropriate sustainment capability. When a company, team, or detachment is attached to the MEB, the S-4 integrates their sustainment into the MEB support system. The attachment orders must clearly state who will provide medical, maintenance, and recovery services and provide support for Class III, V, and IX supplies. When receiving attachments, sustainment planners require some basic information from the sending unit S-4 to anticipate how to develop a synchronized concept of support. When the unit is detached, the MEB assists forwarding any on-hand supplies or equipment to the gaining unit. Some considerations include the following: * The number and type of vehicles, personnel by specialty, and weapons systems and their current status. * Organic medical and maintenance capabilities. * When the attachment is effective and for how long. * What support assets are coming with each attachment to the MEB. * When and where linkup will occur, and who is responsible for linkup. LOGISTICS ELEMENTS 5-14. Logistics is primarily the responsibility of the MEB S-4 and is provided primarily by the MEB organic HSC or requested through the support battalion providing sustainment to the support area. Logistics elements include maintenance, transportation, supply, field services, distribution, operational contract support, and general engineering. General engineering is primarily planned by the S-3 staff and is not discussed in this chapter. Field services will be discussed further and include mortuary affairs, shower and laundry capabilities, field feeding, and water purification. Operational contract support is discussed in greater detail because much of this information is new or emerging doctrine. Maintenance 5-15. How maintenance is accomplished in the MEB is dependent on the individual unit capabilities. Most units, either organic or attached to the MEB, have some organic field maintenance capabilities. The HSC maintenance support platoon provides field maintenance for organic MEB units and supplemental field maintenance support to other units attached as required. If the echelon of maintenance required is outside the MEB capability, the MEB S-4 section will coordinate with the echelon sustainment brigade for support.
3-81
93
Sustainment Note. Planners need to coordinate for TCF maintenance support to accompany the unit when assigned to a MEB. The MEB does not have maintainers with the proper skills or tools to support main weapons systems (tanks, armored personnel carriers, or Stryker vehicles). Transportation 5-16. The MEB HSC and signal company have 100 percent mobility of their TOE equipment and supplies in a single lift using organic equipment. If MEB assigned and attached units require additional lift support, they will request it through channels to the MEB S-4. Supply 5-17. Supply is the process by which required materials and equipment are made available to supported units to help them accomplish the mission. This process includes all classes of supply, to include Class VIII. MEB resupply to subordinate elements is coordinated through the S-4 sections. Supplies are provided through the distribution processes established below. Field Services 5-18. Field services maintain combat strength of the force by providing for its basic needs and promoting its health, welfare, morale, and endurance. Field services provide life support functions. ATP 4-42 has additional information on field services. Field services include— * Shower and laundry. There is no organic laundry or shower capability in the MEB. Support must be coordinated by S-4 with the sustainment brigade in general support of the MEB. * Field feeding. With the exception of a TCF, units typically assigned to a MEB do not have organic field feeding support. The MEB S-4 will need to coordinate field feeding support and Class I supplies with the supporting sustainment command. * Water. The MEB has limited organic capability to produce, store, and transport purified water to meet the MEB support requirements. The MEB S-4 will coordinate with the support sustainment brigade or command for water support requirements. * Mortuary affairs. The MEB is dependent on its supported command for processing and evacuating remains. Internal to the MEB, handling teams are predesignated at the unit level. It is the unit responsibility to evacuate remains to the mortuary affairs collection point. * Medical. The MEB is dependent on the Medical Brigade (Support) for all AHS support above Role 1 medical treatment. Distribution 5-19. Distribution is the primary means to prolong endurance. Distribution is the operational process of synchronizing all elements of the logistic system to deliver the “right things” to the “right place” at the “right time” to support the geographic combatant commander (JP 4-0). The MEB is typically co-located with the division sustainment brigade or division sustainment support battalion. The MEB S-4 will coordinate with the supporting sustainment unit for Class I, II, III, IIIP, IV, V, VII, and IX supplies and with the Medical Brigade for Class VIII supplies. 5-20. There are two standard methods of supply conducted in an operational environment: supply point distribution and unit distribution. The MEB can use either method when supplying subordinate units. * Supply point distribution. Supply point distribution requires the supported unit to move to a supply point to pick up supplies. The supply point issues materiel to the supported unit that transports their supplies back to the unit with organic transportation. Supply points include supply support activities for all supply classes. * Unit distribution. When unit distribution is used, the supported unit receives supplies in its area. The logistics release point, established by the supported unit, may be any place on the ground where unit vehicles pickup supplies and then take them forward to their unit.
3-81
94
Chapter 5 5-21. Normally the MEB uses the supply point distribution method from the supporting sustainment brigade or a combat sustainment support battalion. If the MEB S-4 determines that the unit distribution method is required, it coordinates with the supporting sustainment unit to distribute among all the bases in the base cluster, METT-TC-dependent, or those MEB subordinate units would travel to an established supply distribution point to pick up supplies. The MEB would not establish supply points for its subordinate units unless a high degree of control was required. See ATP 4-42 for additional information on the two methods of supply for an operational environment. Operational Contract Support 5-22. The Army has consolidated its theater support contracting capabilities into separate table of organization and equipment units. These units include the contracting support brigades and contracting battalions. Operational contract support is the process of planning for and obtaining supplies, services, and construction from commercial sources in support of combatant commander-directed operations. The contracting support brigade and its subordinate unit primary missions include— * Providing theater support contracting capabilities to deployed ARFOR and to other military forces, governmental agencies, and/or nongovernmental agencies, as directed. * Assisting theater Army and ARFOR staffs in developing operational contract support plans (annex W of the OPLAN). These plans will include mission-specific contracting and contractor-specific integration, synchronization, and management information. * Coordinating the execution of planned theater support contracts and coordination with the supporting Army field support battalion. 5-23. The contracting support brigades are regionally aligned to a specific theater Army. When deployed, the contracting support brigade has a direct support relationship with the ARFOR commander in the operational area and executes its contracting mission under the direction and contracting authority of the Army contracting command. The ARFOR commander may further delegate this direct support relationship per METT-TC factors. Theater support contracting actions in support to the MEB will be executed in a general support manner. 5-24. Contracting is a key source of support for deployed armed forces in unified land operations. Because of the importance and unique challenges of operational contract support, the MEB commander and staff need to fully understand their role in planning and managing contracted support in the AO. Current doctrine describes three broad types of contracted support—theater support, external support, and systems support. * Theater support contracts. Theater support contracts are contracts awarded by contingency contracting officers deployed to the operational area. They provide the ability to rapidly contract for logistics support within a theater of operations. Theater-support contractors acquire goods, services, and minor construction support, usually from local commercial sources, to meet the immediate needs of operational commanders. Theater support contracts are the type of contract typically associated with contingency contracting. MEBs often require activity for theater support contract support actions related to both internal and external missions. Theater support contracts in support of MEB missions are normally executed on a regionally aligned basis. * External support contracts. External support contracts provide a variety of mission support to deployed forces. External support contracts may be prearranged contracts or contracts awarded during the contingency itself to support the mission and may include a mix of U.S. citizens, third country nationals, and local national subcontractor employees. The largest and most commonly used external support contract is logistics civil augmentation program. This Army program is commonly used to provide life support, transportation support, and other supporting functions to deployed ARFOR and other elements of the joint force. In most operations, the MEB is a supported unit, but not the requiring activity when it comes to logistics civil augmentation program support. * Systems support contracts. Systems support contracts are prearranged contracts awarded by and funded by acquisition program executive officers and project/product management officers. These contracts provide technical support, maintenance support and, in some cases, Class IX support for a variety of nontype classified and selected other Army weapon and support systems. System contractors, made up of U.S. citizens, provide support in garrison, and may deploy with the force
3-81
95
Sustainment to both training and real-world operations. They may provide either temporary support during the initial fielding of a system, called interim contracted support, or long-term support for selected materiel systems, often referred to as contractor logistic support. The MEB does not normally play a significant role in planning or coordinating system support contracts, other than coordinating and executing support of system-support-contract-related personnel. 5-25. For the MEB, the major challenge is ensuring that operational contract support actions are properly incorporated and synchronized with the overall MEB support effort. The MEB S-4 and resource management staff will be trained on their roles in the operational contract support planning and execution process as described below: * Contract management. The MEB will nominate a contracting officer representative (sometimes referred to as contract officer technical representative) for every service contract, and a receiving official for all supply contracts. Quality contracting officer representative (approved by the supporting contracting office) and receiving official support is key to ensuring that contractors provide the service or item according to the contract. The MEB must also manage funding for each contract and request funds in advance of the depletion of current funds, or all contract work will stop until adequate funds are available. * Contract close out. The MEB is responsible for completing receiving reports, certifying that contracted goods or services were received by the Army, and submitting the receiving report to the contracting officer so the contract can be closed out and the contractor paid. For more information on operational contract support, see ATP 4-10. PERSONNEL SERVICES 5-26. Personnel services complement logistics by planning for and coordinating efforts that provide and sustain personnel. Personnel services are an integral part of unit readiness. The MEB S-1 is the staff officer responsible for personnel services. MEB capabilities include HR support, financial management, legal support, and religious support. Human Resources Support Section 5-27. HR support is an important component of sustainment. The MEB S-1 is responsible for providing or coordinating the operational and tactical level HR support that sustains the combat potential of the force and the morale and welfare of Soldiers. HR support is also found at the sustainment brigade level on a general support or an area basis. They provide HR companies, which can provide planning and coordination for HR operations, and liaison and technical support to their customers and supported units. 5-28. The MEB S-1 section serves as a conduit between subordinate units and the higher echelon HR organization. Because of distances and communications capabilities, all reports are submitted through the MEB S-1 for forwarding to the appropriate agency. Initial personnel data is submitted by subordinate and attached units of the MEB by using digital technology. The MEB S-1 also provides information to subordinate units on the status of evacuated/hospitalized personnel and adjusts personnel requirements accordingly. 5-29. HR support includes personnel accountability, strength reporting, personnel information management, personnel readiness management, casualty operations management, essential personnel services, personnel support, postal operations, and morale welfare and recreation and community support. Personnel Accountability 5-30. The brigade S-1 is responsible for coordinating and managing personnel accountability in the MEB. Personnel accountability is the process for recording by-name data on Soldiers when they arrive at, and depart from, the command. Strength Reporting 5-31. Replacement companies under command and control of replacement battalions at theater or corps level receive, support, and process replacements. They coordinate movement with the appropriate movement
3-81
96
Chapter 5 control element. The division replacement section coordinates with the assistant chief of staff, logistics and higher headquarters transportation officer for movement to the brigade support area. The MEB S-1 processes and assigns replacements to battalions. The battalion S-1 further assigns replacements to the company level. Personnel Information Management 5-32. Personnel information management encompasses the collection, processing, storage, display, and dissemination of information about Soldiers, units, and civilians. Personnel information management is controlled by the brigade S-1 through the battalion S-1s within the command. Personnel Readiness Management 5-33. The purpose of the personnel readiness management system is to distribute Soldiers to units based on documented requirements or authorizations to maximize mission preparedness and provide the manpower needed. Personnel accounting is the system for recording by-name data on Soldiers when they arrive at, and depart from, units when their duty status changes (such as from duty to hospital) and when their grade changes. Strength reporting is a numerical end product of the accounting process. It starts with strength-related transactions submitted at unit level and ends with a database update through all echelons to the Total Army Personnel Database. Personnel readiness managers, casualty managers, and replacement managers utilize a personnel information database when performing their missions. Casualty Operations Management 5-34. The casualty reporting system is a by-name personnel accounting system that begins at unit level with the person who knows that a casualty has occurred. DA Form 1156, Casualty Feeder Card, is forwarded as soon as possible. Reports are prepared using the Army Casualty Information Processing System–Light and are sent directly to Headquarters, Department of the Army (DA), with copies furnished to other higher headquarters, as appropriate. The medical section or the medical support company (area support) provides the disposition log daily to the MEB S-1. Essential Personnel Services 5-35. Essential personnel operations are coordinated with subordinate commands and higher command assistant chief of staff, personnel (G-1). This includes providing the MEB with timely and accurate personnel services that efficiently update Soldier status, readiness, and quality of life. This allows commanders to effectively manage the force, including actions supporting individual career advancement and development, proper identification documents for security and benefits entitlements, and recognition of achievements and service (see FM 4-0). Personnel Support 5-36. Personnel support encompasses command interest/human interest programs, and retention functions. Personnel support also includes substance abuse and prevention programs, enhances unit cohesion, and sustains the morale of the force (FM 4-0). Postal Operations 5-37. The brigade S-1 is responsible for coordinating and providing postal operations support with subordinate units of the brigade. The MEB has no dedicated postal support capability and must perform this function with on-hand assets. The Military Postal Service serves as an extension of the United States Postal Service; therefore, services are regulated by public law and federal regulation. Postal operation requires significant logistics and planning for transportation and mail handling (see FM 4-0). Morale, Welfare, and Recreation 5-38. The brigade S-1 coordinates morale, welfare, and recreation support with subordinate commands in the MEB. This includes providing Soldiers and other authorized personnel with recreation and fitness activities, goods, and services.
3-81
97
Sustainment Financial Management 5-39. The MEB has no special financial management capability. The MEB S-3 coordinates for support from mobile financial management teams. Financial management organizations provide support to MEB units and individual Soldiers on an area basis. During deployments, mobile teams from corps-level financial management organizations provide support to forward units. Financial management support units are also found at the sustainment brigade level on a general support or an area basis. They provide financial management services, to include paying and preparing certified vouchers, receiving collections, establishing financial management control processes, tracking commitments and obligations, providing vendor support and accounting, and establishing disbursing station numbers and a local depository. Legal Support 5-40. The brigade legal section provides and supervises legal support to MEB leaders. The brigade legal section provides and coordinates all legal support for the MEB. Paralegal Soldiers in the MEB and subordinate battalions provide paraprofessional and ministerial support for legal actions. The United States Army Trial Judiciary and United States Army Trial Defense Service are independent organizations that provide military judge and trial defense services to the MEB. Religious Support 5-41. The MEB chaplain is the personnel staff officer responsible for implementing the commander’s religious support program. The religious support mission is to assist commanders in the responsibility to provide for the free exercise of religion and to provide religious, moral, and ethical leadership to sustain a ready force of resilient and ethical Soldiers and leaders. UMTs and chaplain sections, comprised of at least one chaplain and one religious affairs specialist, possess three core competencies: nurture the living, care for the wounded, and honor the dead. The religious support mission is executed through two required capabilities—providing support and advising the command. For additional information on religious support, see ATP 1-05.3, ATP 1-05.4, and FM 1-05. HEALTH SERVICE SUPPORT SECTION 5-42. HSS encompasses all support and services performed, provided, and arranged by the AHS to promote, improve, conserve, or restore the behavioral and physical well-being of Army personnel and, as directed, unified action partners. HSS includes the following— * Medical treatment (organic and area support). * Hospitalization. * Medical evacuation (including medical regulating). * Medical logistics (including blood management). 5-43. The MEB surgeon’s duties and responsibilities for HSS and FHP may include— * Advising the commander on the health of the MEB units. * Planning and coordinating for health services support and FHP for MEB units (including but not limited to medical treatment, medical logistics, medical evacuation, hospitalization, veterinary services, dental services, combat and operational stress control, operational public health, and laboratory services). * Developing and coordinating the AHS OPLANs to support the MEB commander’s decisions, planning guidance, and intent in support of unified land operations. * Recommending task organization of medical units/elements in support to MEB units to satisfy all medical mission requirements. * Monitoring troop strength of medical personnel and their utilization. * Evaluating and interpreting medical statistical data. * Monitoring medical logistics and blood management operations in the theater. * Monitoring medical regulating and patient tracking operations for MEB personnel.
3-81
98
Chapter 5 * Determining MEB training requirements for first aid and for maintaining wellness of the command. * Recommending disposition instructions for captured enemy medical supplies and equipment. * Submitting to the supporting medical brigade (support) and higher headquarters surgeon. * Coordinating and synchronizing—  Health education and combat lifesaver training for the MEB.  The mass casualty plan developed by the S-3.  Medical care of detainees and civilians in the MEB operations area.  The treatment of sick, injured, or wounded Soldiers. * Performing medical evacuation, including the use of both of the Army’s dedicated medical evacuation platforms (air and ground). * Coordinating medical logistics, including Class VIII resupply, blood management, and medical maintenance. * Creating health-related reports and battlefield statistics. * Collecting and analyzing operational data for on-the-spot adjustments in the medical support structure and for use in post operations combat and materiel development studies. Brigade Surgeon Section 5-44. The brigade surgeon section assists the surgeon with the responsibilities listed above. The brigade surgeon section monitors and tracks operations with medical communications for combat casualty care for applicable automated systems and provides updated information to the surgeon and the SPO chief for building HSS and FHP capabilities to meet the MEB medical requirements identified by the surgeon. Other functions include— * Planning for the AHS support for the MEB units. * Identifying and coordinating through the division surgeon section and as authorized directly with medical brigade elements to support the requirements of the MEB. * Coordinating and managing medical evacuation and treatment capabilities. * Coordinating and managing Class VIII resupply capabilities and ensuring that medical support is integrated and synchronized with the MEB operational support plan. 5-45. The brigade surgeon section is normally staffed with medical operations officers and a medical operations noncommissioned officer. The primary function of this brigade surgeon section is medical planning to ensure that adequate AHS support is available and provided in a timely and efficient manner for the MEB and its attached units. This brigade surgeon section coordinates with the division surgeon section and, as authorized, with the medical brigade for the placement and support requirements of medical units and elements located in the MEB operations area. 5-46. The medical treatment team is assigned to the brigade surgeon section and supports the MEB headquarters. The team provides Role 1 AHS support for MEB headquarters personnel. The medical treatment leader is a physician assistant and works under the supervision of the MEB surgeon. Medical Evacuation 5-47. Medical evacuation provides en route care and emergency medical care. En route medical care enhances the Soldier’s prognosis, reduces long-term disability, and provides a vital linkage between the roles of care necessary to sustain the patient during transport. Most units assigned/attached to the MEB have organic ground evacuation capability. The MEB sustainment medical operations officer should coordinate medical evacuation for those units assigned or attached to the MEB that does not have an organic evacuation capability.
3-81
99
Sustainment Medical Logistics 5-48. The MEB surgeon coordinates medical logistics support with both the supported higher echelon surgeon and the EAB medical brigade providing general support to the AO. This includes planning and executing all Class VIII supply support, contract support, medical hazardous waste disposal, and distribution of medical gases. Force Health Protection 5-49. The MEB surgeon’s duties and responsibilities for FHP may include— * Identifying potential medical-related commander’s critical information requirements (PIR and friendly force information requirements) as they pertain to the health threat, ensuring that they are incorporated into the command’s intelligence requirements. * Coordinating for veterinary support for food safety, animal care, and veterinary services, to include zoonotic diseases transmissible to man. * Planning for and implementing FHP operations to counter health threats. * Planning for and accomplishing redeployment and post deployment health assessments. * Establishing and executing a medical surveillance program. * Establishing and executing an occupational and environmental health surveillance program. * Recommending combat and operational stress control, behavioral health, and substance abuse control programs. * Ensuring that general threat, health threat, and medical intelligence considerations are integrated into AHS support OPLANs and orders. * Advising MEB commanders on FHP CBRN defensive actions, such as immunizations, use of chemoprophylaxis, pretreatments, and barrier creams. * Maintaining situational understanding by coordinating for current FHP information with surgeon staffs of the next higher, adjacent, and subordinate headquarters. * Coordinating and synchronizing:  Combat and operational stress control programs with the division surgeon section and supporting medical brigade.  Operational public health services, to include identification of health threats.  Preventive dentistry support programs for the prevention of cavities and gum disease.  Support of area medical laboratories, to include the identification of biological and chemical environmental hazards, as required. 5-50. Preventive medicine personnel provide operational public health support for the identification of endemic and emerging diseases and for employment of the countermeasures required to address health threats in the brigade area. Effective and timely FHP measures are essential for sustaining combat power during continuous operations. The MEB first line of protection is the use of operational public health measures and unit field sanitation teams to protect against food, water, and vector-borne diseases and environmental injuries. Coordination with supporting veterinary teams is also required for food safety and quality assurance surveillance and for assisting in foodborne and zoonotic disease surveillance and control. For additional support, MEB subordinate units coordinate through their medical treatment team or the brigade surgeon section for operational public health preventive medicine. Personnel from the medical brigade (support) provide operational public health provide advice and consultation in the areas of disease and nonbattle injury, environmental sanitation, epidemiology, entomology, medical surveillance, limited sanitary engineering services, and pest management. 5-51. The mental health section provides training and advice in the control of stressors and the promotion of positive combat and operational stress behaviors. The mental health element provides early identification, handling, and management of misconduct stress behavior. The section also assists and counsels personnel with personal, behavioral, or psychological problems and may refer suspected neuropsychiatric cases for evaluation. These programs are designed to maximize the return-to-duty rate by identifying combat stress reactions and providing rest/restoration within or near the Soldier’s unit area. See FM 4-02 for additional information.
3-81
101
Appendix A Synchronize and Coordinate Protection The support area commander synchronizes, integrates, and organizes protection capabilities and resources to protect the force, preserve combat power, reduce risk, and mitigate identified vulnerabilities throughout the support area. Criticality, vulnerability, and recoverability are some of the most significant considerations in determining protection priorities. Although all military assets are important and all resources have value, the capabilities they represent are not equal in their contribution to overall mission accomplishment. Determining and directing protection priorities may involve the most important decisions the support area commander makes and their staffs support. PROTECTION A-1. Protection is the preservation of the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area (JP 3-0). Protection serves as a warfighting function and as a continuous and enduring activity. It integrates all protection capabilities to secure routes, prevent casualties, and protect forces. A-2. Protection is not linear–planning, preparing, executing, and assessing protection is continuous and enduring. Protection preserves capability, momentum, and tempo. Protection is an important contributor to operational reach and closely relates to endurance and momentum. It also contributes to the commander’s ability to extend operations in time and space. Commanders and staffs synchronize, integrate, and organize capabilities and resources throughout the operations process to preserve combat power, enable freedom of action, and prevent or mitigate the effects of threats and hazards. A-3. The principles of protection provide Army leaders and staffs with a context for implementing protection efforts, developing schemes of protection, and allocating resources (see ADP 3-37 for additional information on the protection principles): * Comprehensive. * Integrated. * Layered. * Redundant. * Enduring. PROTECTION WARFIGHTING FUNCTION A-4. The protection warfighting function refers to the related tasks and systems that preserve the force so the commander can apply maximum combat power to accomplish the mission (ADP 3-0). Preserving the force includes protecting personnel (combatants and noncombatants), systems, and physical assets of the United States and unified action partners. The protection warfighting function enables commanders to preserve force integrity and combat power by integrating protection capabilities to safeguard friendly forces, civilians, and infrastructure. Commanders incorporate protection when they understand and visualize capabilities available for protection. Some of these actions or effects may be generated through the combined integration of the eight elements of combat power, resulting in an increasingly effective and efficient scheme of protection.
3-81
102
Appendix A A-5. Military operations are inherently complex. Commanders must deliberately plan and integrate the ethical application of military force against an enemy while protecting the force and preserving combat power. Commanders develop protection strategies for each phase or transition of an operation. They integrate and synchronize protection tasks and systems to reduce risk, mitigate identified vulnerabilities, and act on opportunity. PROTECTION TASKS A-6. Army operations and missions are executed through tactical tasks. The support area commander and staff incorporate protection tasks when they understand and visualize available protection capabilities. Protection tasks enable the designated support area land owner to preserve the force, safeguard bases/base camps, and secure routes throughout the support area. When properly integrated and synchronized, the tasks and systems that comprise the protection warfighting function increase the probability of mission success. A-7. The support area commander and their staff must consider all protection tasks and systems and apply them as appropriate. Each task and its associated system are typically associated with a staff or staff proponent that performs specific duties. The protection warfighting function tasks— * Conduct survivability operations. Survivability is a quality or capability of military forces which permits them to avoid or withstand hostile actions or environmental conditions while retaining the ability to fulfill their primary mission (ATP 3-37.34). Survivability operations enhance the ability to avoid or withstand hostile actions by altering the physical environment (see ATP 3-37.34 for additional information on survivability). They accomplish this by providing or improving camouflage, cover, and concealment via the following four tasks:  Constructing fighting positions.  Constructing protective positions.  Hardening facilities.  Employing camouflage, cover, concealment, and movement. * Provide FHP. The Army FHP consists of measures that promote, improve, or conserve the behavioral and physical well-being of Soldiers comprised of preventive and treatment aspects of medical functions that include: combat and operational stress control, dental services, veterinary services, operational public health, and laboratory services. This enables a healthy and fit force, prevents injury and illness, and protects the force from health hazards. Its mission is under the protection warfighting function. Successful FHP measures require deliberate and consistent analysis and communication of health threats to inform commanders and individuals; they also require the implementation and enforcement of unit and individual countermeasures (to include exposure controls, chemoprophylaxis, and immunizations against diseases both endemic and those used as warfare agents) needed to reduce associated health risks. Commanders and unit leaders must remain informed and proactively engaged to ensure the health of the force; reduce health threats, stressors, and risks; and promote all available countermeasures. See FM 4-02 for additional information on FHP. * Conduct CBRN operations. CBRN operations include the employment of tactical capabilities that anticipate and counter the entire range of CBRN threats and hazards (see FM 3-11 for additional information). The activities to implement protection include the following:  Understand the environment.  Conduct CBRN information collection through reconnaissance and surveillance.  Conduct CBRN defense.  Cooperate with and support partners.  Establish CBRN response efforts to minimize the effects of a CBRN incident. * Provide EOD and force protection support. EOD is a key asset in the protection of military and civilian personnel, critical assets, infrastructure, and public safety. EOD units provide support through the supporting EOD headquarters across the range of military operations by detecting, locating, identifying, diagnosing, rendering safe, exploiting, and disposing of all explosive ordnance, improvised explosive devices, and weapons of mass destruction. See ATP 4-32.1 and ATP 4-32.3 for additional information on EOD.
3-81
103
Synchronize and Coordinate Protection * Coordinate AMD. AMD protects the force from manned and unmanned aerial attacks and enemy aerial surveillance. Coordinating AMD support protects friendly forces from the effects of threatening ballistic missiles; cruise missiles; and fixed-wing, rotary-wing, and unmanned aircraft systems. It enables the freedom of action commanders to require synchronized maneuver and protects critical capabilities from interdiction. See FM 3-01 for additional information on AMD. * Conduct personnel recovery. Army personnel recovery refers to the military efforts taken to prepare for and execute the recovery and reintegration of isolated personnel (FM 3-50). Personnel recovery is the overarching term for operations that focus on recovering isolated personnel before captivity. See FM 3-50 for additional information on personnel recovery. * Conduct detention operations. Detention involves the detainment of a population or group that poses some level of threat to military operations. Detention operations are conducted by military police to shelter, sustain, guard, protect, and account for populations (detainees or U.S. military prisoners [U.S. military personnel ordered to confinement]) as a result of military or civil conflict or to facilitate criminal prosecution. Detention operations are essential to setting the conditions for consolidation of gains during large-scale combat. They lessen enemy capability to prolong a conflict through protracted resistance by irregular forces. See FM 3-63 for additional information detention operations. * Conduct risk management. Risk management is the process to identify, assess, and control risks and make decisions that balance risk cost with mission benefits (JP 3-0). The Army uses risk management to help maintain combat power while ensuring mission accomplishment during current and future operations. It is the Army process for helping organizations and individuals make informed decisions to reduce or offset risk. Risk management applies to operations and to nonoperational activities. Using this process increases operational effectiveness and the probability of mission accomplishment. It is a systematic way of identifying hazards, assessing them, and managing the associated risks. Commanders, staffs, Army leaders, Soldiers, and DA Civilians integrate risk management into planning, preparing, executing, and assessing operations. See ATP 5-19 for additional information on risk management. * Implement physical security procedures. Physical security consists of physical measures that are designed to safeguard personnel and to prevent unauthorized access to equipment, installations, material, and documents and safeguard them against espionage, sabotage, damage, theft, and terrorism. The Army employs physical security measures in depth to protect personnel, information, and critical resources in all locations and situations against various threats through effective security policies and procedures. See ATP 3-39.32 for additional information on physical security. * Apply AT measures. AT consists of proactive defensive measures used to deter, detect, delay, deny, and defend individuals and property against terrorist acts. These measures include limited response and containment by security forces. AT measures are required to be incorporated into all military operations. See ATP 3-37.2 for additional information on AT. * Conduct police operations. Police operations encompass policing and the associated law enforcement activities to control and protect populations and resources and to facilitate the existence of a lawful and orderly environment. Police operations and the associated skills and capabilities inherent in that function provide the fundamental basis on which all other military police disciplines are framed and conducted. See ATP 3-39.10 for additional information on police operations. * Conduct populace and resources control. The function of populace and resources control is conducted in conjunction with, and as an integral part of, all military operations. Populace and resources control functions consist of two distinct, yet linked, components: populace control and resources control. These controls are normally the responsibility of indigenous civil governments. Combatant commanders define and enforce these controls during large-scale combat, consolidation of gains, and times of civil or military emergency. See ATP 3-39.30 and ATP 3-57.10 for additional information on populace and resources control.
3-81
104
Appendix A * Area security. Area security is a type of security operation conducted to protect friendly forces, installations, routes, and actions within a specific area (ADP 3-90). Area security may be the predominant method of protecting the support areas that are necessary to facilitate the positioning, employment, and protection of resources required to sustain, enable, and control forces. Area security often focuses on the following activities:  Tactical AA security.  Base/base camp defense.  Critical asset security.  Node protection.  High-risk personnel security.  Movement corridors.  Response force operations.  LOC security.  Checkpoints and combat outposts.  Convoy security.  Port area and pier security.  Area damage control. * Conduct cyberspace and security defense. The Army secures and defends the network through a defense-in-depth approach, incorporating layered security and defenses. The tasks to secure and defend cyberspace are perform cybersecurity activities and conduct defensive cyberspace operations–internal defensive measures. See FM 3-12 for more information for cyberspace planning considerations. * Conduct electromagnetic protection actions. Many Army capabilities, including communications, cyberspace operations, information collection, space capabilities, target detection, and precision guided munitions, depend on assured access to the electromagnetic spectrum. The tasks to protect Army access to the electromagnetic spectrum are conduct electronic protection actions, conduct defensive electronic attack, and conduct electromagnetic spectrum management. * Conduct OPSEC. Operations security is a capability that identifies and controls critical information, indicators of friendly force actions attendant to military operations, and incorporates countermeasures to reduce the risk of an adversary exploiting vulnerabilities (JP 3-13.3). Effective and disciplined OPSEC is employed during decisive action. Units routinely employ OPSEC measures to reduce, eliminate, and conceal essential elements of friendly information. Units use directional antennas and terrain masking to conceal tactical communication signatures and reduce detection by enemy direction-finding capabilities. This helps to prevent enemy or adversary reconnaissance and other information collection capabilities from gaining an advantage because the threat has knowledge of identifiable or observable unit-specific information. For additional information on OPSEC for division and below, see ATP 3-13.3. PROTECTION SUPPORT TO ARMY OPERATIONS A-8. Protection emphasizes the importance of planning and expanding protection priorities, to include protecting mission partners, civilian populations, equipment, resources, infrastructure, and cultural landmarks across the range of military operations. The synchronization, integration, and organization of protection capabilities and resources to preserve combat power from the effects of threats and hazards are essential. When properly integrated and synchronized, the tasks and systems that relate to protection effectively protect the force, preserve combat power, and increase the probability of mission success. A-9. Operations to shape include unit home station activities, including maintaining operational readiness, training, and contingency planning. Combined exercises and training, military exchange programs, and foreign military member attendance at Army schools are examples of home station shaping activities. At home stations, protection tasks maintain safe and secure environments that enable commanders to generate
3-81
105
Synchronize and Coordinate Protection and preserve combat power during training and deployment tasks that are associated with Army sustainable readiness requirements that are in support of unified land operations. A-10. Army protection capabilities support operations to prevent or deter interference during mobilization and prevent or mitigate attacks during the transit of ARFOR and cargo, along movement routes, and at initial staging areas and subsequent AAs where uncertain threat conditions require a delicate balance between protection and building combat power. A-11. At the division level and higher, the integration of the protection warfighting function and tasks is conducted by a designated protection cell and the chief of protection. At brigade level and below, the integration occurs more informally with the designation of a protection coordinator from the brigade staff or as an integrating staff function assigned to a senior leader. The protection coordinators participate in various forums to facilitate the continuous integration of protection tasks into the operations process. This occurs through protection working groups, staff planning teams, and staffs conducting integrating processes. A-12. During large-scale combat, commanders and staffs deliberately plan and integrate protection capabilities to protect the force, preserve combat power, reduce risk, mitigate identified vulnerabilities, and act on opportunity. Figure A-1 shows the integration and synchronization of protection tasks in support of a gap crossing, movement corridor, and support area. Commanders also develop a scheme of protection for the transition of each phase of an operation or major activity. Transitions mark a change of focus between phases or between the ongoing operation and execution of a branch or sequel. Shifting protection priorities between offensive, defensive, and stability tasks also involves a transition. Transitions require planning and preparation well before their execution so that a force can maintain the momentum and tempo of operations. A force is vulnerable during transitions. Commanders and staffs also identify potential threats and hazards during planning and identify protection priorities during the transition and follow-on operations. Figure A-1. Protection in support of large-scale combat operations
3-81
106
Appendix A Legend: AMD air missle defense BSA brigade support area CBRN chemical, biological, radilogical, and nuclear CIV civilian CSC convoy support center DET detention DSA division support area EOD explosive ordnance disposal EW electronic warfare FHP force health protection OPSEC operations security PL phase line PRC populace and resources control SUST sustainment TCP traffic control post Figure A-1. Protection in support of large-scale combat operations (continued) A-13. As ARFOR transition from large-scale combat to the consolidation of gains, the focus transitions to area security and stability tasks. Army operations to consolidate gains correspond with stabilize and enable civil authority phases of a joint operation. Commanders continuously consider the synchronization, integration, and organization of protection capabilities necessary to consolidate gains and achieve the desired end state. Consolidate gains activities include the relocation of displaced civilians, detainee operations, the reestablishment of law and order, providing humanitarian assistance, and the restoration and protection of critical infrastructure ASSESSMENTS A-14. Initial protection planning requires various assessments to establish protection priorities. Assessments include threats, hazards, vulnerability, and criticality. These assessments are used to determine which assets can be protected given no constraints, and which assets can be protected with available resources. There are seldom sufficient resources to simultaneously provide all assets the same level of protection. For this reason, the support area commander makes decisions on acceptable risks and provides guidance to the staff so that they can employ protection capabilities based on the protection priorities. A-15. Protection planning is a continuous process that must include an understanding of the threats and hazards that may impact operations from the deep area back to the strategic support area. Protection capabilities are aligned to protect critical assets and mitigate effects from threats and hazards. The protection cell and protection working group must prioritize the protection of critical assets during operations to shape, operations to prevent, large-scale combat, and during the consolidation of gains that best supports the commander’s end state. A-16. An important aspect of protection planning involves the support area. If conditions in the support area degrade, it is detrimental to the success of operations. A degraded support area also inhibits the ability to shape the deep area for the BCTs involved in close operations. Therefore, the protection of support areas requires planning considerations equal to those in the close areas. THREAT AND HAZARD ASSESSMENT A-17. Personnel from all staff sections and warfighting functions help conduct threat and hazard analysis. This analysis comprises a thorough, in-depth compilation and examination of information and intelligence that address potential threats and hazards in the AO. The integrating processes (IPB, targeting, and risk management) provide an avenue to obtain the threats and hazards that are reviewed and refined. Threat and hazard assessments are continuously reviewed and updated as the operational environment changes. A-18. Considerations for the threat and hazard assessment include— * Enemy and adversary threats.  Operational capabilities.  Intentions.  Activities.
3-81
107
Synchronize and Coordinate Protection * Foreign intelligence entities (see ATP 2-22.2-1 and ATP 2-22.2-2). * Criminal activities. * Civil disturbances. * Health and safety hazards. * CBRN toxic industrial materials. * Cyberspace threats. * Other relevant aspects of the operational environment. * Urban environments. * Incident reporting and feedback points of contact. A-19. The threat and hazard assessment results in a comprehensive list of threats and hazards and determines the likelihood or probability of occurrence of each threat and hazard. Table 1-1, page 1-2, shows examples of potential threats and hazards in an AO. In the context of assessing risk, the higher the probability or likelihood of a threat or hazard occurring, the higher the risk of asset loss. CRITICALITY ASSESSMENT A-20. A criticality assessment identifies key assets that are required to accomplish a mission. It addresses the impact of a temporary or permanent loss of key assets or the unit ability to conduct a mission. A criticality assessment should also include high-population facilities (recreational centers, theaters, sports venues) that may not be mission-essential. It examines the costs of recovery and reconstitution, including time, expense, capability, and infrastructure support. The staff gauges how quickly a lost capability can be replaced before providing an accurate status to the commander. The general sequence for a criticality assessment is— * Step 1. List the key assets and capabilities. * Step 2. Determine if critical functions or combat power can be substantially duplicated with other elements of the command or an external resource. * Step 3. Determine the time required to substantially duplicate key assets and capabilities in the event of temporary or permanent loss. * Step 4. Set priorities for the response to threats toward personnel, physical assets, and information. A-21. The protection cell staff and working group continuously update criticality assessments during the operations process. As the staff develops or modifies a friendly COA, information collection efforts confirm or deny information requirements. As the mission or threat changes, initial criticality assessments may also change, increasing or decreasing the subsequent force vulnerability. The protection cell members monitor and evaluate these changes and begin coordination among the staff to implement modifications to the protection concept or recommend new protection priorities. PIR, running estimates, MOEs, and MOPs are continually updated and adjusted to reflect the current and anticipated risks associated with the operational environment. VULNERABILITY ASSESSMENT A-22. A vulnerability assessment is an evaluation (assessment) to determine the magnitude of a threat or hazards effect on an installation, personnel, a unit, an exercise, a port, a ship, a residence, a facility, or other site. It identifies the areas of improvement required to withstand, mitigate, or deter acts of violence or terrorism or attacks against threats. The staff addresses who or what is vulnerable and how it is vulnerable against threats. The vulnerability assessment identifies physical characteristics or procedures that render critical assets, areas, infrastructures, or special events vulnerable to known or potential threats and hazards. The general sequence of a vulnerability assessment is— * Step 1. List assets and capabilities and the threats against them. * Step 2. Determine the common criteria for assessing vulnerabilities. * Step 3. Evaluate the vulnerability of assets and capabilities. A-23. Vulnerability evaluation criteria may include the degree to which an asset may be disrupted, quantity of the asset available (if replacement is required due to loss), dispersion (geographic proximity), and key physical characteristics.
3-81
108
Appendix A A-24. DOD has created several decision support tools to perform criticality assessments in support of the vulnerability assessment process, including mission, symbolism, history, accessibility, recognizability, population, and proximity (MSHARPP) and criticality, accessibility, recuperability, vulnerability, effect, and recognizability (CARVER) (see ATP 3-37.2 for more information on MSHARPP and CARVER)— * MSHARPP. The purpose of the MSHARPP tool is to analyze likely terrorist targets and assess their vulnerabilities from the inside out, with focus on the U.S. military mission. Consideration is given to local threats, the probable means of attacks, and variables that affect dispositions of potential targets. After developing a list of potential targets, MSHARPP selection factors are used to assist in further refining the assessment by associating a weapon or tactic with a potential target to determine the efficiency, effectiveness, and plausibility of the attack method and to identify vulnerabilities related to the target. When the MSHARPP values for each target or component are assigned, the sum of the values indicates the highest-value target (for a particular mode of attack) within the limits of enemy known capabilities. See ATP 3-37.2 for additional information on the MSHARPP tool. * CARVER. The CARVER matrix is a valuable tool in determining criticality and vulnerability. For criticality purposes, CARVER helps assessment teams and commanders (and the assets that they are responsible for) determine assets that are more critical to the success of the mission. This also helps determine which resources should be allocated to protect critical assets (personnel, infrastructure, and information). The CARVER matrix assesses a potential target from a terrorist perspective to identify what the enemy might perceive as a good (soft or valuable) target. ESTABLISH PROTECTION PRIORITIES A-25. Criticality, vulnerability, and recoverability are some of the most significant considerations in determining protection priorities that become the subject of support area commanders’ guidance and the focus of area security operations. The scheme of protection is based on the mission variables and should include protection priorities by area, unit, activity, or resource. A-26. Although all military assets are important and all resources have value, the capabilities they represent are not equal in their contribution to decisive operations or overall mission accomplishment. Determining and directing protection priorities may involve the most important decisions that commanders make and their staffs support. There are seldom sufficient resources to simultaneously provide the same level of protection to all assets. A-27. Most prioritization methodologies assist in differentiating what is important from what is urgent. In protection planning, the challenge is to differentiate between critical assets and important assets and to further determine what protection is possible with available protection capabilities. Event-driven operations may be short in duration, enabling a formidable protection posture for a short time; condition-driven operations may be open-ended and long-term, requiring an enduring and sustainable scheme of protection. In either situation, the support area commander provides guidance on prioritizing protection capabilities and categorizing important assets. PROTECTION PRIORITIZATION LIST A-28. Protection prioritization lists are organized through the proper alignment of critical assets. The commander’s priorities and intent and the impacts on mission planning determine critical assets. A critical asset is a specific entity that is of such extraordinary importance that its incapacitation or destruction would have a very serious, debilitating effect on the ability of a nation to continue to function effectively (JP 3-26). Critical assets can be people, property, equipment, activities, operations, information, facilities, or materials. For example, important communications facilities and utilities, analyzed through criticality assessments, provide information to prioritize resources while reducing the potential application of resources on lower-priority assets. Stationary weapons systems might be identified as critical to the execution of military operations and, therefore, receive additional protection. The lack of a replacement may cause a critical asset to become a top priority for protection. A-29. The protection cell and working group use information derived from the support area commander’s guidance, the IPB, targeting, risk management, warning orders, the critical asset list and defended asset list,
3-81
109
Synchronize and Coordinate Protection and the mission analysis to identify critical assets. Critical assets at each command echelon must be determined and prioritized. A-30. Protection cells and working groups can develop criticality, vulnerability, and threat probability values to help prioritize critical assets. Figure A-2 provides an example of how criticality, vulnerability, and threat probability values can help determine risk. Table A-1 provides an example of a protection risk analysis table. Figure A-2. Example criticality, vulnerability, and threat probability values Table A-1. Example protection risk analysis table T Risk Analysis Total Asset C (1–4) V (1–3) (1–5) C x V x T Command post 4 2 4 32 Signal nodes 3 2 4 24 Movement corridor 2 2 4 16 Population center 2 3 2 12 Legend: C criticality T threat V vulnerability A-31. The protection prioritization list is a key protection product developed during initial assessments. The protection cell and working group must use criticality, threat vulnerability, and threat probability to prioritize identified critical assets. Once the protection working group determines which assets are critical for mission success, it recommends protection priorities and establishes a protection prioritization list. It is continuously assessed and revised throughout each phase or major activity of an operation: * Criticality is the degree to which an asset is essential to accomplish the mission. It is determined by assessing the impact that damage to, or destruction of, the asset will have on the success of the operation. Damage to an asset may prevent, significantly delay, or have no impact on the success of the plan.  Catastrophic. Complete mission failure or the inability to accomplish the mission, death or total disability, the loss of major or mission-critical systems or equipment, major property or facility damage, mission-critical security failure, or unacceptable collateral damage.  Critical. Severely degraded mission capability or unit readiness, total disability, partial disability, temporary disability, extensive damage to equipment or systems, significant damage environment, security failure, or significant collateral damage.  Marginal. Degraded mission capability or unit readiness; minor damage to equipment or systems, property, or the environment; lost days due to injury or illness; or minor damage to property or the environment.
3-81
110
Appendix A  Negligible. Little or no adverse impact on mission capability, first aid or minor medical treatment, slight equipment or systems damage (remaining fully functional or serviceable), or little or no property or environmental damage. * Threat vulnerability measures the ability of a threat to damage the target (asset) using available systems (people and material). Asset vulnerability is greater if a lower-level threat (Level I) can create damage or destruction that would result in mission failure or severely degrade its mission capability. If an asset can withstand a Level I or Level II threat, its vulnerability ability is less and may not require additional protection assets, depending on asset criticality. The following mitigating factors must be considered when assessing the vulnerability of a target: survivability (the ability of the critical asset to avoid or withstand hostile actions by using camouflage, cover [hardening], concealment, and deception), the ability to adequately defend against threats and hazards, mobility and dispersion, and recoverability (which measures the time required for the asset to be restored, considering the availability of resources, parts, expertise, manpower, and redundancies).  Level I threat. Agents, saboteurs, sympathizers, terrorists, civil disturbances.  Level II threat. Small tactical units. Irregular forces may include significant standoff weapons threats.  Level III threat. Large tactical force operations, including airborne, heliborne, amphibious, infiltration, and major air operations. * Threat probability assesses the probability that an asset will be targeted for surveillance or attack by a credible/capable threat. Determinations of the intent and capability of the threat are key in assessing the probability of attack.  Frequent. Occurs very often, known to happen regularly. Examples are surveillance, criminal activities, cyberspace attacks, indirect fire, and small-arms fire.  Likely. Occurs several times, a common occurrence. Examples are explosive booby traps/improvised explosive devices, ambushes, and bombings.  Occasional. Occurs sporadically, but is not uncommon. Examples are air-to-surface attacks or insider threats, which may result in injury or death.  Seldom. Remotely possible, could occur at some time. Examples are the release of CBRN hazards or the employment of weapons of mass destruction.  Unlikely. Presumably, the action will not occur, but it is not impossible. Examples are the detonation of containerized ammunition during transport or the use of a dirty bomb. A-32. The protection prioritization list helps Army commanders to identify or assess assets that require protection prioritization within their assigned areas. Not all assets listed on the protection prioritization list receive continuous protection. Some critical assets only receive protection assets based on available resources. It is the responsibility of the protection working group to provide the assessment and recommended protection prioritization list to the commander for approval (see table A-2).
3-81
111
Synchronize and Coordinate Protection Table A-2. Example protection prioritization list Legend: ABCT armored brigade combat team ADA air defense artillery AMD air missile defense BDE brigade BN battalion BTYS battery CAV cavalry CO company CL class DIV division DIVARTY division artillery DMAIN division main command post FA field artillery ENY enemy EW electronic warfare HIMARS high mobility artillery rocket system IDF indigenous forces IBCT infantry brigade combat team
3-81
112
Appendix A Table A-2. Example protection prioritization list (continued) Legend: LOC lines of communication MEB maneuver enhancement brigade MLRS multiple launch rocket system MP military police MRBC multi-role bridge company PL phase line PLT platoon PPL protection prioritization list SEAD suppression of enemy air defense SOF special operations forces SQDN squadron TACON tactical control A-33. Changes to protection prioritization should be anticipated and assets reassessed as transitions occur throughout operations or with changes to the commander’s priorities (see figure A-3). Legend: HIMARS high mobility artillery rocket system LOC line of communications MLRS multiple launch rocket system MRBC multi-role bridge company Figure A-3. Example of protection prioritization during transitions SCHEME OF PROTECTION DEVELOPMENT A-34. The scheme of protection describes how protection tasks support the commander’s intent and concept of operations. It uses the commander’s guidance to establish the priorities of support to units for each phase of the operation. A commander’s initial protection guidance may include protection priorities, civil considerations, protection task considerations, potential protection decisive points, high-risk considerations, and prudent risk. Figure A-4 provides an example of a scheme of protection.
3-81
113
Synchronize and Coordinate Protection Legend: OPORD operations order ZULU time zone indicator for Universal Time Figure A-4. Scheme of protection example A-35. Planners receive guidance as commanders describe their visualization of the operational concept and intent. This guidance generally focuses on the COA development by identifying decisive and supporting efforts, massing effects, and stating priorities. Effective planning guidance provides a broad perspective of the commander’s visualization, with the latitude to explore additional options. A-36. The protection working group develops the scheme of protection after receiving guidance and considering the principles of protection in relation to the mission variables, the incorporation of efforts, and the protection required. The scheme of protection is based on the mission variables, thus it includes protection priorities by area, unit, activity, or resource. It addresses how protection is applied and derived during all phases of an operation. For example, the security for routes, bases/base camps, and critical infrastructure is accomplished by applying protection assets in dedicated, fixed, or local security roles; or it may be derived from economy-of-force protection measures, such as area security techniques. It also identifies areas and conditions where forces may become fixed or static and unable to derive protection from their ability to maneuver. These conditions, areas, or situations are anticipated and the associated risks are mitigated by describing and planning for the use of response forces. A-37. The protection working group considers the following items, at a minimum, as it develops the scheme of protection: * Protection priorities. * Work priorities for survivability assets. * AMD positioning guidance. * Specific terrain and weather factors. * Information focus and limitations for security efforts. * Areas or events where risk is acceptable. * Protected targets and areas. * Civilians and noncombatants in the AO.
3-81
114
Appendix A * Vehicle and equipment safety or security constraints. * Personnel recovery actions and control measures. * Force protection condition status. * FHP measures. * Mission-oriented protective posture guidance. * Environmental guidance. * Information environment guidance. * Explosive ordnance and hazard guidance. * Ordnance order of battle. * OPSEC risk tolerance. * Fratricide avoidance measures. * Rules of engagement, standing rules for the use of force, and rules of interaction. * Escalation of force and nonlethal weapons guidance. * Operational scheme of maneuver. * Military deception. * Obscuration. * Radiation exposure status. * Contractors in the AO. A-38. While each protection task and system has its own operational consideration, each must be synchronized and integrated within the scheme of protection to ensure synergistic protection efforts. For example, AMD without survivability is less effective. Area security without AT, OPSEC, and physical security is also less effective. To ensure this synergy, the protection working group develops a scheme of protection around which MOPs and MOEs can be monitored and evaluated. See FM 6-0 for additional information on MOPs and MOEs. A-39. Individuals are protected at the lowest level by awareness, personal protective equipment, an understanding of the rules of engagement, and fratricide avoidance measures. By implementing additional protection measures in the area surrounding an individual (fighting positions, vehicles, collective protection, and FHP measures taken against accidents and disease), the force then provides a layering of protection. Enhancing survivability measures, applying active and passive defense operations, and implementing AT and physical security measures add to the next layer of a comprehensive, integrated, layered scheme of protection. Implementing protection tasks and utilizing protection systems in a comprehensive, layered scheme of protection preserve the protected priorities throughout the range of military operations in any operational environment. PROTECTION COORDINATOR A-40. The protection coordinator works with the protection working group to integrate and synchronize protection tasks and systems for each phase of an operation or major activity. The MEB commander designates a senior staff officer to serve as the protection coordinator and to lead the protection working group. The protection working group at a minimum should consist of (see ADP 3-37): CBRN personnel, engineer personnel; personnel recovery; brigade surgeon; and provost marshal. The protection working group coordinates with the signal staff section to further facilitate the information protection task. A-41. While the planning cell develops plans, the protection working group attempts to minimize vulnerability based on the developing COAs. The intent is to identify and recommend refinements to the COAs that are necessary to reduce vulnerability and ensure mission success. The protection working group provides vulnerability mitigation measures to help reduce risks associated with particular COAs and conducts planning and oversight. Representatives from the protection working group may provide input to plans and future operations, depending on the operational environment and the commander’s preference. A-42. The protection working group membership does not require representatives from every functional element of protection. However, dedicated members should coordinate with other personnel and special staff elements as required. Primary members of the protection working group typically include the chief of
3-81
115
Synchronize and Coordinate Protection protection coordinator, an ADA officer, a personnel recovery officer, a military police officer, a CBRN officer, an EOD officer, an engineer officer, and an AT officer. TASKS AND SYSTEMS INTEGRATION A-43. Protection tasks integration throughout the operations process helps establish control measures against potential threats and hazards (see figure A-5). The layering of protection tasks (some redundant) ensures a comprehensive scheme of protection. The layered approach of protection provides strength and depth. Units use their available capabilities to defend the protection priorities, and a layering of capabilities reduces the destructive effect of threats and hazards. Legend: CCIR commander’s critical information requirement OPSEC operations security PPL protection prioritization list Figure A-5. Integration of protection throughout the operations process A-44. The protection working group ensures the integration of protection equities throughout the operations process via integrating processes, continuing activities, the MDMP, working groups, planning sessions, and coordination between warfighting functions. This develops and refines a scheme of protection and a protection plan that are comprehensive, integrated, layered, redundant, and enduring. All members of the protection working group provide input and conduct actions that have beneficial output, which develops the scheme of protection and enhances the overall protection plan. The agenda, frequency, composition, input, and expected output for the working group are determined by the lead protection working group officer based on mission variables and MDMP integration.
3-81
116
Appendix A INTEGRATING PROCESSES A-45. The integrating processes of IPB, targeting, and risk management are essential in providing assessments or key information to assessments. They are a vital part of integrating protection within the other warfighting functions and throughout the operations process. A-46. IPB is a systematic process of analyzing the mission variables of threat, terrain, weather, and civil considerations in a specific area of interest to determine their effects on operations. By conducting the IPB, commanders gain the information necessary to selectively apply and maximize operational effectiveness at critical points in time and space. A-47. The targeting process integrates commander guidance and priorities to determine which targets to engage and how, when, and where to engage them to assign friendly capabilities to create the desired effect. The staff then assigns friendly capabilities that are best suited to produce the desired effect on each target. An important part of targeting is identifying possibilities for fratricide and collateral damage. Commanders establish control measures, including the consideration for restraint, which are necessary to minimize the chance of these events. The protection priorities must be integrated within the targeting process to achieve the desired objectives while ensuring the preservation of combat power. A-48. Risk management is the process of identifying, assessing, and controlling risks that arise from operational factors and making decisions that balance risk cost with mission benefits. Threat, hazard, capability, vulnerability, and criticality assessments are utilized to evaluate the risk to the force, determine the critical assets, ascertain available resources, and apply security or defensive measures to achieve protection. Risk management helps commanders preserve lives and resources, avoid or mitigate unnecessary risk, identify and implement feasible and effective control measures where specific standards do not exist, and develop valid COAs. Risk management integration during operations process activities is the primary responsibility of the unit protection officer or operations officer. MILITARY DECISIONMAKING PROCESS A-49. The military decisionmaking process is an iterative planning methodology to understand the situation and mission, develop a course of action, and produce an operation plan or order (ADP 5-0). The MDMP integrates the activities of the commander, staff, subordinate headquarters, and unified action partners to understand the situation and mission; develop and compare COAs; decide on a COA that best accomplishes the mission; and produce an OPLAN or order for execution. The MDMP helps leaders apply thoroughness, clarity, sound judgment, logic, and professional knowledge to understand situations, develop options to solve problems, and reach decisions. This process helps commanders, staffs, and others think critically and creatively while planning. The MDMP results in an improved understanding of the situation and in a plan or order that guides the force through preparation and execution. A-50. Effective protection integration during operations depends on full integration into the MDMP and the overall operations process. The protection working group provides input to the commander’s MDMP by integrating the threat and hazard assessment with the commander’s essential elements of friendly information and the protection prioritization list. See table A-3 for protection integration to MDMP.
3-81
117
Synchronize and Coordinate Protection Table A-3. Protection integration to MDMP Key Input Steps Protection Actions Protection Output Key Output • Higher HQ plan or Step 1: • Consolidate protection-related • Protection working • Commander’s order running estimates from staffs group initial guidance Receipt of • New mission Mission • Review consolidated protection • Warning and • Initial allocation of anticipated by the array of assets reporting systems time commander • Determine protection working • Protection running group members estimate • Ensure protection planner integration within the unit planning team Warning Order • Higher HQ plan or Step 2: • Provide input on critical • Consolidated HVT • Problem order networks or nodes that can be list statement Mission • Higher HQ Analysis influenced • RFIs • Mission knowledge and • Identify requests for information • Initial assessments statement pin rt oe dll uig ce tsnce • Determine available assets • Recommended • Initial • Conduct and consolidate initial PPL commander’s • Knowledge intent p or ro gd au nc izt as t if oro nm s other OW ra dr en ri ng • a Cs os ne ds us cm t e pn rots tection working • ER Eec Fo Immended • Initial planning guidance • D dee vs eig lon p c eo dn )cept (if • Rgr eo cu op m mend and coordinate • I pn ri it oia ril t ip er sotection • Initial CCIRs and EEFIs information collection assets for • Input into protection • Initial OPSEC information • Identify EEFI, and establish collection plan planning guidance how long it should be protected (Condition of key units and • Updated IPB and weapons systems) running estimates • Determine OPSEC indicators • Assumptions • Develop essential survivability and other engineering tasks • Identify available information on routes and key facilities • Analyze protection considerations of civilians in the AOs • Determine available unified action partner capabilities • Determine funding sources, as required • Determine availability of construction and other engineering materials
3-81
118
Appendix A Table A-3. Protection integration to MDMP (continued) Key Input Steps Protection Actions Protection Output Key Output • Mission statement Step 3: • Determine array of • Recommended • COA statements • Initial • COA protection assets updates to PPL and sketches commander’s Development • Integrate protection • Recommended • Tentative task intent, planning tasks into COA updates to EEFIs organization guidance, CCIRs, • Determine initial • Determine residual • Broad concept and EEFIs scheme of protection risk of operations • Updated IPB and • Coordinate health • Develop initial • Revised running estimates support requirements OPSEC measure and planning • Assumptions • Ensure that link countermeasures guidance architecture meets • Initial scheme of • Updated requirements and has protection assumptions been allocated from respective agents • Recommend appropriate level of survivability effort for each COA based on the expected threat • Determine alternate construction location, methods, means, materials, and timelines to give the commander options • Determine real-property and real estate requirements • Identify indicators and vulnerabilities • Updated running Step 4: • Identify limitations and • Initial DAL • Refined COAs estimates • COA Analysis shortfalls of protection • Refined EEFI • Potential • Revised planning (War Game) tasks for each COA • Refined information decision points guidance • Determine branches, collection plan • War-game • COA statements s ue nq inu tee nls d, ed decision points, • Refine OPSEC results and sketches consequences, and measures and • Initial • Updated second- and third-order countermeasures assessment assumptions effects • Initial risk measures • Develop risk management and risk • Updated management and tolerance decision assumptions decision points for risk point matrix • tolerance • Refined scheme of • Develop MOE and MOP protection • Updated running Step 5: • Compare economy-of- • Refined protection • Evaluated COAs estimates • COA force and risk reduction priorities • Recommended • Refined COAs Comparison measures • Refined PPL COAs • Evaluation criteria • Refined EEFI • Updated running • War-game results • Refined scheme of estimates • Updated protection • Updated assumptions assumptions
3-81
119
Synchronize and Coordinate Protection Table A-3. Protection integration to MDMP (continued) Key Output Steps Protection Actions Protection Output Key Output • Updated running Step 6: • Brief scheme of • Refined • Commander- estimates protection protection selected COA and COA Approval • Evaluated COAs • Brief protection priorities modifications • Recommended • Warning Order task specifics, as • Refined EEFI • Refined COA required • Refined commander’s intent, CCIRs, and • Updated • Refined scheme EEFIs assumptions of protection • Updated assumptions • Commander- Step 7: • Refine and develop • Protection • Approved OPLAN selected COA with • Orders Production, protection annex annex and or OPORD any modifications Dissemination, and and supporting supporting • Subordinate • Refined Transition appendixes appendixes understanding of commander’s intent, plan or order CCIRs, and EEFIs • Update EEFIs as • Updated needed assumptions Legend: AO area of operations CCIR commander’s critical COA course of action DAL defended asset list EEFI essential element of friendly information HQ headquarters HVT high-value target IPB intelligence preparation of the battlespace MOE measure of effectiveness MOP measure of performance OPSEC operations security PPL protection priority list RFI request for information PROTECTION WORKING GROUP A-51. Working groups address various subjects depending on the situation and echelon. A working group is a grouping of predetermined staff representatives who meet to provide analysis, coordinate, and provide recommendations for a particular purpose or function (FM 6-0). Their cross-functional design enables working groups to synchronize contributions from multiple command post cells and staff sections. For example, the protection working group brings together representatives of all staff elements concerned with protection. It synchronizes the contributions of all staff elements with the work of the protection working group. It also synchronizes protection with future operations and current operations integration cells. A-52. The protection working group forms the core membership of the protection working group, which includes other agencies, as required. Protection working group members differ in that additional staff officers are brought into the working group. These additional staff officers meet operational requirements for threat assessments, vulnerability assessments, and protection priority recommendations. The protection working group calls upon existing resources from the staff and are incorporated into the unit battle rhythm as needed. Working groups may convene daily, weekly, monthly, or intermittently depending on the subject, situation, and echelon. A-53. Protection working group meetings have the same purpose, regardless of the echelon. Protection functions at different echelons of command differ mostly in the size of the AO and the number of available protection capabilities. The protection working group— * Determines likely threats and hazards from updated enemy tactics, the environment, and accidents. * Determines vulnerabilities as assessed by the vulnerability assessment team. * Establishes and recommends protection priorities, such as the critical asset list. * Provides recommendations for the critical asset list and defended asset list.
3-81
120
Appendix A * Reviews and coordinates unit protection measures. * Recommends force protection conditions and random AT measures. * Determines required resources and makes recommendations for funding and equipment fielding. * Provides input and recommendations on protection-related training. * Makes recommendations to commanders on protection issues that require a decision. * Performs tasks required for a force protection working group and a threat protection working group according to DODI 2000.16. * Accesses assets and infrastructure that are designated as critical by higher headquarters. * Recommends the mode and frequency of survivability movements. A-54. Commanders augment the team with other unit specialties and unified action partners, depending on the operational environment and unit mission. The chief of protection determines the working group agenda, meeting frequency, composition, input, and expected output. Table A-4 shows a sample purpose, agenda, and composition of a protection working group with staff inputs and outputs. Table A-4. Example protection working group activities Purpose: • Determines likely threats and hazards • Determines vulnerabilities • Establishes and recommends protection priorities • Provides recommendations for the CAL and DAL • Reviews and coordinates unit protection measures • Recommends FPCONs and random AT measures • Makes recommendations to commanders on protection issues that require a decision • Performs tasks required for a force protection working group and a threat protection working group Purpose and Frequency • Assesses assets and infrastructure that are designated as critical by higher headquarters. • Analyzes and provides recommendations for the protection of civilians in the AO • Develops and refines the protection running estimate • Develops a scheme of protection, ensuring that it nests with the operational concept • Develops isolated Soldier guidance. • Provides input and recommendations for cyberspace network protection. • Identifies risks to the mission • Integrates PR requirements into plans, orders, SOPs and staff products. Frequency: Every other day Chair: Chief of protection • Public affairs officer. Attendees: • Staff judge advocate. • ADA officer • Chaplain. • AT officer • Surgeon. • CBRN officer • Medical representative. • Engineer officer • Veterinary representative • Electronic warfare element representative • Subordinate unit LNOs Composition • EOD officer • Operations representative • Fire support representative • An area contracting officer • OPSEC planner • Cyberspace representative • Provost marshal • Information officer • Safety officer • Logisticians • Intelligence representative • Personnel recovery officer • CA officer
3-81
121
Synchronize and Coordinate Protection Table A-4. Example protection working group activities (continued) Inputs: Outputs: • Commanders guidance and intent • Update protection assessment • Operations and warning orders • Scheme of protection • Current scheme of protection • Protection Running estimate • Threat and hazard assessment • Protection prioritization list Inputs and out puts • Vulnerability assessment • Recommended FPCON • Criticality assessment • Recommended protection guidance and • Risk management mitigation measures • CAL • Recommended changes to EEFI • DAL • Recommended changes to CAL and prioritization of DAL • Roll Call • Operations/intelligence update (G-3/G-2) • Protection prioritization list assessment / update (Chief of Protection) • New vulnerabilities—next 72 hours (Chief of Protection) Agenda • Mitigation measures (Chief of Protection) • Recommendations—security posture adjustments, information engagement, resource allocation, required training (Chief of Protection) • Guidance (G-3) • Conclusion (Chief of Protection) Legend: ADA air defense artillery AO area of operations AT antiterrorism CA civil affairs CAL critical asset list CBRN chemical, biological, radiological, and nuclear DAL defended asset list EEFI essential elements of friendly information EOD explosive ordnance disposal FPCON force protection condition G-2 assistant chief of staff, intelligence G-3 assistant chief of staff, operations LNO liaison officer OPSEC operations security PR personnel recovery SOP standard operating procedure RUNNING ESTIMATE A-55. A running estimate is the continuous assessment of the current situation used to determine if the current operation is proceeding according to the commander’s intent and if planned future operations are supportable (ADP 5-0). Failure to maintain accurate running estimates may lead to errors or omissions that result in flawed plans or bad decisions during execution. Running estimates include recommendations for anticipated decisions. During planning, commanders use these recommendations to select feasible, acceptable, and suitable COAs for further analysis. During preparation and execution, commanders use recommendations from running estimates in decision making. See ADP 5-0 for additional information on running estimates. A-56. The protection working group develops and refines the protection running estimate (see figure A-6, page A-22). The protection estimate provides a picture to the command on the protection continuing activity. It is developed from information (including the facts, assumptions, constraints, limitations, risks, and issues) pertaining to the protection mission and the scheme of protection. It includes the essential tasks from a higher order. Integrating process data and continuing activities (assets available, civil considerations, threat and hazard assessments, criticality assessments, vulnerability assessments, capability assessments, MOEs, MOPs, essential elements of friendly information, protection priorities, risk decision points, supporting tasks) feed updates to the running estimate.
3-81
122
Appendix A Past 24 hours Protection common operational picture PPL Next 48 to 72 hours • PPL Asset task • Threats/hazards organization Issues/risk decision • Incidents Provost marshal officer points • Asset locations Protection priorities Engineer Essential elements FPCON AMD CBRN and EOD Safety of friendly INFOCON ADW MOPP information WCS OEG Explosive hazards Security banner Legend: ADW air defense warning AMD air missile defense CBRN chemical, biological, radiological, and nuclear EOD explosive ordnance disposal FPCON force protection condition INFOCON information operations condition MOPP mission-oriented protective posture OEG operation exposure guide PPL protection prioritization list WCS weapons control status Figure A-6. Example protection running estimate CONTINUOUS ASSESSMENT A-57. Assessment is the determination of the progress toward accomplishing a task, creating a condition, or achieving an objective (JP 3-0). Commanders typically base assessments on their situational understanding, which is generally a composite of several informational sources and intuition. Assessments help commanders determine progress toward attaining the desired end state, achieving objectives, and performing tasks. It also involves continuously monitoring and evaluating the operational environment to determine what changes might affect the conduct of operations. A-58. Throughout the operations process, commanders integrate their assessments with those of the staff, subordinate commanders, and other unified action partners. The primary tools for assessing the progress of the operation include the OPORD, the common operational picture, personal observations, running estimates, and the assessment plan. Staff members develop running estimates that illustrate the significant aspects of a particular activity or function over time. These estimates are used by commanders to maintain situational understanding and direct adjustments. Significant changes or variances among or within running estimates can signal a threat or an opportunity, alerting commanders to take action. A-59. The assessment plan is enabled by monitoring and evaluating criteria derived from the warfighting function protection tasks. The criteria used to monitor and evaluate the situation or operation may be represented as an MOE or MOP. These measures are discrete, relevant, and responsive benchmarks that are useful in all operations. They may contain the commander’s critical information requirements and the essential elements of friendly information and may generate information requirements. MOEs and MOPs can be significant decision support tools and may drive transition periods, resource allocations, and other critical decisions. A-60. During preparation, operations to shape, and operations to prevent, the protection working group focuses on threats and hazards that can influence preparatory activities, including monitoring new Soldier integration programs and movement schedules and evaluating live-fire requirements for precombat checks and inspections. The protection working group may evaluate training and rehearsals or provide coordination and liaison to facilitate effectiveness in high-risk or complex preparatory activities, such as movement and sustainment preparation.
3-81
123
Synchronize and Coordinate Protection A-61. The protection working group monitors and evaluates the progress of current operations to validate assumptions made in planning and to continually update changes to the situation. The protection working group continually meets to monitor threats to protection priorities, and they recommend changes to the protection plan, as required. They also monitor the conduct of operations, looking for variances from the OPORD that affects their areas of expertise. When variances exceed a threshold value developed or directed in planning, the protection working group may recommend an adjustment to counter an unforecasted threat or hazard or to mitigate a developing vulnerability. It also tracks the status of protection assets and evaluates the effectiveness of the protection systems as they are employed. Additionally, the protection working group monitors the actions of other staff sections by periodically reviewing plans, orders, and risk assessments to determine if those areas require a change in protection priorities, posture, or resource allocation. A-62. The protection working group monitors and evaluates— * Changes to threat and hazard assessments. * Changes in force vulnerabilities. * Changes to unit capabilities. * The relevancy of facts. * The validity of assumptions. * Reasons that new conditions affect the operation. * Running estimates. * Protection tasks. * System failures. * Resource allocations. * Increased risks. * Supporting efforts. * Force protection implementation measures, including site-specific AT measures.
3-81
125
Appendix B Defense Support of Civil Authorities ARFOR demonstrate the Army’s core competencies by combining offensive, defensive, and stability or DSCA tasks. The continuous, simultaneous combinations of offensive, defensive, and stability or DSCA tasks is known as decisive action. In DSCA, decisive action refers to how ARFOR combine DSCA tasks to support homeland security and, if required, DSCA tasks with offensive and defensive tasks to support homeland defense. The MEB is well suited to provide support to civil authorities because it has the most complete multifunctional staff of any Army brigade. The MEB also has the skills needed to provide command and control for units that are frequently needed by civil authorities. This appendix discusses the MEB support to DSCA. DEFENSE SUPPORT OF CIVIL AUTHORITIES CORE TASK B-1. ARFOR conduct four core tasks (figure B-1 illustrates the DSCA core tasks with examples) in support of DSCA and the overall homeland security enterprise: * Provide support for domestic disasters. * Provide support for domestic CBRN incidents. * Provide support for domestic civilian law enforcement agencies. * Provide other designated domestic support plan. Figure B-1. DSCA core tasks with examples
3-81
126
Appendix B B-2. These DSCA tasks can overlap. For example, providing Army support of civil law enforcement agencies can occur during disaster response or its aftermath. In most cases, a MEB may provide support for the first three tasks. The MEB may provide assistance as a unit or as part of a joint task force in support of lead civil authorities for DSCA (see JP 3-28). The U.S. laws carefully limit the actions that military forces conduct within the United States, its territories, and its possessions (see ADP 3-28 for information on laws). The MEB complies with these laws while assisting affected citizens. B-3. Doctrine on CBRN consequence management is contained in JP 3-0 and JP 3-41. This chapter uses the task Respond to CBRN Incident for DSCA and area damage control. Tactical-level doctrine on CBRN consequence management operations is contained in ATP 3-11.41. B-4. The MEB is designed to integrate many of the types of units that have the greatest applicability in support to DSCA (CBRN, engineer, EOD, and military police). The MEB has the broadest multifunctional capability and training for DSCA tasks of any brigade. The MEB may be the ideal brigade to respond to certain incidents because of its capability to provide command and control, be assigned an AO, and perform other related requirements. The brigade is trained to manage airspace and conduct interface with others that control airspace. This is particularly important in large-scale disasters requiring DOD aviation support. The MEB can conduct or support most DSCA tasks depending on the nature of the incident and its task organization. The MEB may be called upon to function as the on-site DOD or Army headquarters or to complement or support another headquarters (such as a joint task force or the CBRNE operational headquarters to respond to specific missions). The MEB can provide area damage control as part of support area or in support of its higher headquarters and assigned units. B-5. The MEBs in the Army National Guard could be among the first military forces to respond on behalf of state authorities. Planning DSCA tasks is similar to planning stability tasks; they both interact with the populace and civil authorities to provide essential services. The MEB tasks are similar, but the environment is different (domestic versus foreign). The specialized capabilities of the MEB to conduct stability tasks apply to DSCA, primarily for Tasks 1 and 3. However, the MEB supports the lead civil authority for DSCA. A civil authority is in the lead for DSCA, while the task force or joint task force (hence MEB) supports the lead civil authority. See ADP 3-28 for additional information on DSCA. PROVIDE SUPPORT FOR DOMESTIC DISASTERS B-6. Natural and man-made disasters occur throughout the United States and its territories. Most domestic disasters require no federal military support. State and federal emergency management entities receive most military support from the National Guard in state active duty or Title 32, United States Code (USC) status. In a catastrophic event, the demand for resources may exceed National Guard capacity, even with assistance from other states. In such situations, federal ARFOR provide requested support, through either United States Pacific Command or United States Northern Command. B-7. DOD defines a complex catastrophe as any natural or man-made incident, including cyberspace attack, power grid failure, and terrorism, which results in cascading failures of multiple, interdependent, critical, life-sustaining infrastructure sectors and causes extraordinary levels of mass casualties, damage or disruption severely affecting the population, environment, economy, public health, national morale, response efforts, and/or government functions (JP 3-28). B-8. There are two distinguishing characteristics of a complex catastrophe: 1) the extremely large scale of damage and casualties, and 2) the cascading effects of the failure of critical infrastructure. These cascading effects impact both the types and quantity of response required in support of the affected populace as well as the environmental conditions in which the response must occur. Some of the effects include widespread and long-term power grid failure, degraded or inoperable communications, and severe impacts to the transportation infrastructure. The cascading effects from these failures could cause numerous problems beyond the immediate affected area and increase the severity of the situation including, but not limited to, widespread scarcity of food and water, lack of medical services at fixed sites within the impacted area, and potentially the breakdown of governance and rule of law. B-9. DOD installations and activities may receive requests directly from local civil authorities and will respond, within their capability, under their own immediate response authority in accordance with DODD 3025.18, and mutual aid agreements in accordance with DODI 6055.06.
3-81
127
Defense Support of Civil Authorities PROVIDE SUPPORT FOR DOMESTIC CHEMICAL, BIOLOGICAL, RADIOLOGICAL, OR NUCLEAR INCIDENTS B-10. A chemical, biological, radiological, or nuclear incident is any occurrence, resulting from the use of chemical, biological, radiological, and nuclear weapons and devices; the emergence of secondary hazards arising from friendly actions; or the release of toxic industrial materials or biological organisms and substances into the environment, involving the emergence of chemical, biological, radiological, and nuclear hazards (JP 3-11). The National Response Force integrates governmental jurisdictions, incident management and emergency response disciplines, and private sector entities into a coordinated CBRN incident response. B-11. Military forces conduct domestic CBRN incident support under appropriate laws, regulations, and policies. These include the hazardous waste operations and emergency response standard (Title 29, Code of Federal Regulations, Part 1910, Occupational Safety and Health Standard Number 1910.120) and the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) (Sections 9601 to 9675 of Title 42 USC). Responders at every level plan and operate in accordance with these laws. These and other laws define— * Response authorities for public and private agencies. * Hazardous substances, emergency planning, and community right to know. * Cleanup requirements. * Required protective measures and training for responders within the United States. B-12. Department of Homeland Security uses the National Fire Protection Association Standard 472, Standard for Competence of Responders to Hazardous Materials/Weapons of Mass Destruction Incidents, to establish the qualifications for personnel conducting domestic CBRN incident response. (See National Fire Protection Standard 472). During domestic CBRN incident response operations, national laws subordinate military doctrine and military authority outside DOD installations. Command structures are based on the National Response Framework and the National Incident Management System, with DOD as a supporting partner. DOD is not the lead unless an incident occurs on a DOD installation. PROVIDE SUPPORT FOR DOMESTIC CIVILIAN LAW ENFORCEMENT B-13. Providing support for domestic civilian law enforcement applies to the restricted use of military assets to support civilian law enforcement personnel within the United States and its territories. These operations are significantly different from operations outside the United States. ARFOR support domestic civilian law enforcement agencies under constitutional and statutory restrictions, as prescribed by corresponding directives and regulations. For additional information, see DODI 3025.21. B-14. Except as expressly authorized by the Constitution of the United States or by another act of congress, the Posse Comitatus Act of 1878 (18 USC 1385) prohibits the use of active Army and Air Force as enforcement officials to execute state or federal law and perform direct law enforcement functions. Likewise, United States Navy regulations prohibit the use of the Marine Corps and Navy for performing direct state and federal law enforcement functions. However, the Posse Comitatus Act does not apply to state National Guard forces in state active duty status and Title 32, USC status. Nor does the Posse Comitatus Act restrict the Coast Guard, even when under the OPCON of the Navy, since the Coast Guard has inherent law enforcement powers under Title 14 USC. B-15. Domestic law enforcement missions differ substantially from similar stability tasks associated with civil security and civil control. The rights of civilians take precedence during domestic law enforcement support except in extreme emergencies. B-16. Law enforcement support falls into two broad categories: direct and indirect. Direct support involves enforcing the law and engaging in physical contact with offenders. Indirect support consists of aid to civilian law enforcement agencies but does not include enforcement of the law or direct contact with offenders. Federal laws, presidential directives, and DOD policy prohibit federal military forces from enforcing laws and providing security except on military installations. These laws, policies, and directives specify limited exceptions to the restrictions. When authorized by the Secretary of Defense, federal military forces may provide indirect support to civilian law enforcement agencies, but support is limited to logistic, transportation, and training assistance except in life threatening emergencies. State and territorial governors can use state
3-81
128
Appendix B National Guard forces for direct support of civilian law enforcement as a temporary expedient in accordance with state laws. PROVIDE OTHER DESIGNATED DOMESTIC SUPPORT B-17. Providing other designated domestic support encompasses preplanned, routine, and periodic support not related to disasters or emergencies. Often, this is support to major public events and consists of participatory support, special transportation, and additional security. Examples are national special security events such as Olympics, inaugurations, or state funerals. Some missions may involve designated support requested by a federal or state agency to augment its capabilities due to labor shortages or a sudden increase in demands. Such support may extend to augmentation of critical government services by Soldiers, as authorized by the President and directed by the Secretary of Defense. For example, skilled Soldiers replaced striking air controllers in the Federal Aviation Administration until newly hired civilians completed training. Soldiers have moved coal during strikes or even operated key commercial enterprises when national security considerations justified such extreme action. DEFENSE SUPPORT OF CIVIL AUTHORITIES CONSIDERATIONS B-18. Commanders, supported by their staffs, use the operations process to drive the conceptual and detailed planning necessary to understand, visualize, and describe their operational environment; make and articulate decisions; and direct, lead, and assess military operations. The activities of the operations process are not discrete; they overlap and recur as circumstances demand. Planning starts an iteration of the operations process. Upon completion of the initial order, planning continues as leaders revise the plan based on changing circumstances. Preparing begins during planning and continues through execution. Execution puts a plan into action by applying combat power to seize, retain, and exploit the initiative to gain a position of relative advantage. Assessing is continuous and influences the other three activities. This section uses the operations process activities (plan, prepare, execute, and assess) to discuss considerations that are important to the MEB in conducting DSCA. PLAN B-19. The MEB uses Army planning procedures for DSCA, but must be able to participate and integrate its planning with federal, state, tribal, or local levels as discussed in the following section. Soldiers receive their orders in an Army format, but these orders must be consistent with the overall shared objectives for the response. These orders are aligned with the specific guidance that other on-the-ground responders from other civilian and military organizations are receiving. Soldiers exercise individual initiative to establish and maintain communication at all levels. Based on the type of support provided, MEB leaders, staffs, and Soldiers need to be familiar (to varying degrees) with the terminology, doctrine, and procedures that are used by first responders to ensure the effective integration of Army personnel and equipment. This ensures that citizens who are affected by the disaster receive the best care and service possible. B-20. When the MEB conducts DSCA tasks, a lead federal or state government agency has the overall responsibility depending on the MEB status as a 10 USC or 32 USC Title 10 or Title 32 organizations. The MEB status as a state or federal asset will determine which documents it should use as legal authorities when conducting operations. If the MEB is a state asset, it reports to the state National Guard chain of command. If the MEB is a 10 USC asset (Regular Army), it reports to its federal chain of command. Note. The military chain of command is not violated while the MEB supports the lead federal agency to assist citizens who are affected by a disaster.
3-81
129
Defense Support of Civil Authorities B-21. The MEB leaders and staff may help support the emergency preparedness planning that is conducted at the national, state, or local level. The MEB may conduct contingency, crisis response, or deliberate planning. The MEB leaders and staffs must understand the following documents from the Department of Homeland Security: * National-level civil disaster and emergency response doctrine contained within the National Incident Management System. * National Response Framework documents. Note. The MEB leaders must understand the doctrine in JP 3-28. B-22. The National Response Framework organizational structure includes emergency support function annexes. There are currently fifteen emergency support function annexes. The emergency support functions are used to help identify who has what type of resources to provide as part of a disaster response. Possible considerations for MEB support to DSCA planning include— * Assisting with interorganizational planning. * Assisting with initial needs assessments. * Providing logistics support for civil authorities. * Providing sustainment in a damaged austere environment. * Assisting the lead civil agency to define and share COAs. * Soliciting agency understanding of roles. * Developing measurable objectives. * Assisting in the coordination of actions with other agencies to avoid duplicating effort. * Planning to hand over to the operation civilian agencies as soon as feasible. The end state and transition are based on the—  Ability of civilian organizations to carry out their responsibilities without military assistance.  Need to commit ARFOR to other operations or the preparation for other operations.  Ability to provide essential support to the largest possible number of people.  Knowledge of the legal restrictions and rules for the use of force.  Establishment of funding and document expenditures (see National Incident Management System procedures). * Identifying and overcoming obstacles, including—  Planning media operations and coordinating with local officials.  Maintaining information assurance.  Establishing liaison with the lead federal agency. PREPARE B-23. Commanders should prepare for DSCA by understanding the appropriate laws, policies, and directives that govern the military during response and by planning and preparing with the agencies and organizations they will support before an incident. There may be little or no time to prepare for a specific DSCA mission. When possible, the commander helps develop contingency plans and standing operating procedures for potential natural and man-made disasters. The MEB may plan, receive units, and deploy within hours. It is possible that the MEB will link up with units on-site during execution as they arrive from across a state or region. B-24. Based on METT-TC factors, training before deployment for DSCA aids in preparing for and executing the necessary tasks. Many stability tasks correlate with DSCA tasks. When possible, the MEB leaders and staff train with civil authorities. B-25. The notification for DSCA employment usually requires rapid reaction to an emergency, but sometimes may allow for deliberate preparation. After notification, the MEB commander and staff leverage the command and control system to coordinate and synchronize their operations with civilian authorities.
3-81
130
Appendix B B-26. The deployment may be within a state or anywhere within the United States or its territories. The MEB should develop standing operating procedures for the various methods and locations of deployment. Based on METT-TC, the MEB task-organizes to conduct DSCA. The MEB may deploy an advanced party with additional staff augmentation as an early-entry command post to provide on-site assessment and an immediate command and control presence. Deployment is affected whether the DSCA mission warrants the entire MEB or one or more task forces from the MEB. The MEB task organization may change periodically as the need for particular services and support changes. A MEB involved in DSCA operations normally will be task-organized with CBRN, engineer, medical, military police, public affairs and, potentially, units from other Services. Throughout the coordination effort, it is important for the commander and staff to understand and inform interagency personnel of the MEB capabilities and limitations. B-27. Due to nonhabitual supporting relationships and dissimilar equipment, the MEB and the lead governmental organization must ensure that there is close coordination in all areas. The MEB may co-locate its headquarters with the lead agency to improve coordination. The MEB headquarters may be established in tactical equipment or fixed facilities. By using liaison teams, the commander and staff work closely with interagency and other military elements. B-28. A defense coordinating officer and assigned staff may not suffice for a complex disaster. When required, the MEB headquarters can control capabilities that the lead authority requires from the DOD. Depending on the complexity of the operation, some staff augmentation may be required. The previously existing task organization of the MEB may require reinforcement with additional functional units to accomplish assigned missions. The MEB commander task-organizes available assets for the mission and requests reinforcement as necessary. B-29. The MEB leaders must understand the complex environment in which the brigade conducts its mission. The MEB must integrate its activities into the planning effort of the supported civilian agency, understand support requirements, and be aware of the supported agency’s capabilities and limitations. This leader understanding creates an atmosphere that permits shared communications and forges a unified effort between elements. Integrating the MEB command and control system into the command and control systems of the lead governmental agency and local first responders may be a challenge. The extent to which the MEB command and control system is able to integrate into the supported agency command and control system depends on the communications/network compatibility/capability of the supported agency. B-30. Oftentimes, an agency possesses data that, in its original form, creates compatibility issues with the MEB format and the common operational picture. It is incumbent upon the MEB to facilitate the exchange of information with the lead agency. During planning and execution, the MEB can deploy liaison officers to the lead agency. The network-centric environment of the MEB serves as the conduit for rapidly communicating information, while stationary or while moving en route to the geographical site for support operations. B-31. When the MEB works closely with an agency, the problem sets can be complex and diverse. The MEB and the agency must leverage their skill sets and resources to better inform leaders and maximize their greatest potential when preparing to conduct a DSCA operation. By eliminating redundancies and identifying shortfalls in corresponding capabilities, the MEB creates the conditions for a unified effort. The MEB must always protect its information, leverage its information collection capabilities and the communications network to enhance situational awareness, and verify the lead governmental agencies capability to fuse data. EXECUTE B-32. The MEB will do what is required to accomplish its mission when conducting DSCA, even though task organizations may need to be changed. The MEB may not be assigned an AO. The MEB may conduct the below tasks for DSCA. Respond to Chemical, Biological, Radiological, or Nuclear Incidents B-33. Depending on the nature of the incident and initial assessment, the task organization of the MEB may need to be changed frequently. The controlling headquarters may also change the command or support relationship of the MEB as additional units or organizations respond to the incident. Key response tasks may include assessing a CBRN hazard, conducting risk management, responding to a CBRN hazard, planning
3-81
131
Defense Support of Civil Authorities and preparing for CBRN consequence management support, and providing mass casualty decontamination support. CBRN response addresses the short-term, direct effects of a CBRN incident. Major functions performed are safeguarding lives, preserving health and safety, securing and eliminating the hazard, protecting property, preventing further damage to the environment, and maintaining the public’s confidence in the government’s ability to respond to a CBRN incident. Provide Support to Law Enforcement B-34. The MEB conducts this task in domestic and foreign locations and is governed by applicable laws and policies (see ADP 3-28). The efforts are similar to the stability tasks: establish civil security and establish civil control. Key law enforcement tasks may include conducting law and order operations, providing guidance on military police 0perations, planning police operations, and providing operational law support. Conduct Postincident Response B-35. The MEB organic staff has many of the skills required to conduct most postincident response tasks. MEB requirements could include many of the tasks from stability and DSCA, to include tasks from support area operations. Some DSCA would require the MEB to conduct airspace management, unmanned aircraft system employment, debris removal, medical care, and the employment of specialized search and rescue teams. The MEB can provide command and control for most search and rescue tasks on land but may require augmentation and task-organized capabilities depending on the mission. In a domestic incident, United States Northern Command and United States Pacific Command have a capability area of protection that includes search and rescue. The United States Army Corps of Engineers provides organic and contracted land-based search and rescue capabilities. B-36. Executing DSCA must occur within the guidelines laid out by the lead civil agency. When requested and within the legal limits of federal and state law, the MEB may leverage attached/OPCON information collection assets and networks by positioning sensors, robotics, or forces in a manner that provides rapid and accurate data flow to lead governmental agencies, which enables them to assess the situation and the status of objectives. The civil agency may require an adjustment to the plan, and the MEB must be ready to modify its ongoing operations. The information processes the MEB has in place, because of its communication network, will allow for rapid dissemination of potential issues to the lead agency for resolution. B-37. When executing DSCA, MEB leaders and staff must— * Be familiar with the incident command system and be able to follow unified command system procedures for the integration and implementation of each system. * Know how the systems integrate and support the incident. * Be familiar with the overall operation of the two command systems and be able to assist in implementing the unified command system if needed. * Know how to develop an Incident Action Plan and identify assets available for controlling weapons of mass destruction and hazardous material events. * Coordinate these activities with the on-scene incident commander. * Be familiar with steps to take to assist in planning operational goals and objectives that are to be followed on site in cooperation with the on-scene incident commander. * Know how to interface with and integrate requisite emergency support services and resources among the emergency operations center management and the incident or unified command on- scene incident management team. * Be familiar with the coordination functions and procedures that are to be conducted by and with the emergency operation center in support of on-scene emergency response activities. B-38. The tasks of Soldiers are similar to many of the tasks in stability tasks. In most cases, they do not need to have as much knowledge of the incident command system. B-39. While DSCA operations vary greatly in every mission, the MEB can expect events to follow a pattern of planning, preparation, response, and recovery. Military support for DSCA will be provided through Commander, United States Northern Command; Commander, United States Southern Command; or Commander, United States Pacific Command depending upon the location of the incident.
3-81
132
Appendix B B-40. The Joint Director of Military Support in the operations directorate of a joint staff (J-3) serves as the action agent for the Assistant Secretary of Defense–Homeland Defense and America’s Security Affairs who has the executive agent responsibility delegated by the Secretary of Defense. The Joint Director of Military Support plans for and coordinates the DOD civil support mission and is the primary DOD contact for all federal departments and agencies during DOD involvement in most domestic operations. B-41. If DSCA is provided concurrently with homeland defense, the MEB must be prepared to transition to support the offensive and defensive operations of other military forces. Preparation B-42. The MEB preparation for disaster response depends on the priority of other missions. If the MEB is a 10 USC unit, mission priorities may dictate minimal planning and preparation for DSCA operations. On the other hand, a 22 USC MEB may have enough time to plan and prepare for DSCA with other civil and military organizations. B-43. Preparation implements approved plans and relevant agreements to increase readiness through a variety of tasks. Such tasks may include, but are not limited to— * Developing standing operating procedures and tactics, techniques, and procedures with expected supported and supporting elements. * Task-organizing to fill gaps in duties and responsibilities. * Training personnel and leaders on nonmilitary terminology and procedures used for DSCA (such as the incident command system). * Obtaining (through training) the proper credentials for key personnel. * Exercising and refining plans with military and civilian counterparts. * Obtaining the proper equipment to provide the required capability. * Developing, requesting, and maintaining logistics packages for follow-on resupply and maintenance of all classes of supplies in support of extended operations. * Preparing and maintaining Soldier readiness for all personnel to ensure that they are up to date. * Ensuring that communications equipment, communications security, and controlled cryptographic items are serviceable and ready to deploy. Response B-44. As part of a response, the MEB subordinate units and/or liaison teams enter the affected area and make contact with relief organizations. They relay pertinent information about the effort of these organizations up through their military chain of command. The military chain of command relays this information to the lead civil authority. Planning for the operation, staging command post into the area, establishing security, deploying MEB subordinate units, and initiating contact with supported activities and other parts of the relief force occur during this phase of operations. B-45. The commander considers leading with liaison teams and urgent relief assets, such as debris clearance, law enforcement, search and rescue, food, and water. The command and control system of the lead unit gives the MEB units robust early ability to communicate and coordinate with each other and that organization with which the command and control information systems are compatible. Further, the ability to reconnoiter and gather information makes MEB units useful in the initial efforts by civil and other authorities to establish situational awareness, control the area, and oversee critical actions. Recovery B-46. Once DSCA is underway, recovery begins. With initial working relationships between all organizations in place, the MEB maintains steady progress in relieving the situation throughout this phase of operations. The MEB work includes coordination with its higher headquarters, supported groups, and other relief forces and the daily allocation of its own assets to recovery tasks. B-47. The MEB task organization is likely to change periodically as the need for particular services and support changes. Security, maintenance, the effective employment of resources, and Soldier support all need
3-81
133
Defense Support of Civil Authorities continuing attention. The brigade surgeon advises and assists the MEB commander in counteracting the psychological effects of disaster relief work and exposure to human suffering on MEB Soldiers throughout the operation. Restoration B-48. Restoration is the return of normality to the area. In most cases, the MEB disengages before restoration begins. The Federal Emergency Management Agency is in charge of restoration operations for DSCA. B-49. The DSCA ends in different ways. Crises may be resolved or the MEB may hand off a continuing DSCA to a replacement unit, a relief agency, a police force, or other civil authority. Missions of short duration or narrow scope may end with completion of the assigned task. ASSESS B-50. The MEB command and control system is essential to support the interagency overall assessment. The MEB network-centric environment provides for a robust exchange of information. A common problem that the MEB or a nonmilitary agency may encounter is information overload or a different perception on how an operation is progressing. Commanders share the common operational picture (their interpretation of the situation) with their civil agency counterpart to ensure a unified effort. Liaison should occur to demonstrate this capability and to verify the method in which information sharing will occur. B-51. MEB commanders gauge unit readiness for DSCA missions by assessing proficiency in the tasks of command and control, sustainment, protection, support area operations, and emergency/incident response or the specified tasks assigned to an Army National Guard unit for planning. The requirement to deploy into a domestic operational environment—often with little warning—and to operate requires command and control that can adapt systems and procedures for a noncombat, civilian-led structure. B-52. The MEB leverages its command and control system capabilities and supports a degraded or destroyed civilian command and control/communications system. The MEB brings its mobile network and augments and/or replaces a devastated civil infrastructure. Most first responder communications are wireless, using tower-based repeating which is powered by the grid. The MEB augments local law enforcement (and emergency medical services, fire services, and other first responder communications) with the command and control network to restore vital services to the AO. EMPLOYMENT B-53. An example of a MEB conducting DSCA is a plane that has crashed into a major industrial site and resulted in mass casualties. A CBRN incident has occurred, with downwind prediction that affects a built-up area and state Highway 5, and there is an environmental hazard of runoff into the river that provides water to a built-up area downstream. B-54. The local officials responded but were overwhelmed. The state governor declared a state of emergency; directed the state emergency management agency to take over incident command, management, and response; and requested support from a neighboring state. That state has an Army National Guard MEB ready to respond to the mission based on an existing support agreement. B-55. The Army National Guard MEB immediately deploys the deputy commanding officer with an early-entry command post to collocate with the state emergency management agency on-site command post, while the rest of the MEB mobilizes and moves to the incident site. The MEB is task-organized with one engineer battalion, two military police battalions, a CA battalion, two CBRN battalions, and one mechanized infantry battalion. The state emergency management agency also put their state medical battalion, rotary- wing squadron, local and state search and rescue teams, and a volunteer local construction company OPCON to the MEB. The state emergency management agency assigned the MEB an area to control, in which they will conduct the operations. The key tasks include conducting risk management, responding to a CBRN incident, providing support to law enforcement, conducting postincident response, improving movement, and supporting area security in and around the industrial site. Finally, they are to conduct sustainment support operations (general engineering to construct a berm to control surface runoff) and other critical requirements that may be identified.
3-81
135
Appendix C Lines of Communication Considerations The forward movement of personnel, equipment, and materiel from the echelon (corps and division) support areas is vital to the support of decisive action. The protection of ground supply routes, waterways, rail lines, pipelines, and power generation and distribution capabilities is used to support operations across the range of military operations. LOC security is especially challenging during large-scale combat operations and the consolidation of gains. One of the greatest risks to Army operations can be threats along MSRs. LINES OF COMMUNICATION OVERVIEW C-1. The security, maintenance, and movement control of LOCs is critical to military operations. Line of communications are a route, either land, water, and/or air, that connects an operating military force with a base of operations and along which supplies and military forces move (JP 2-01.3). During large-scale combat operations, the support area commander’s primary focus is the security and maintenance of LOC (rail, pipeline, highway, waterway[canal or river]) throughout the support area and provides forward movement of personnel and the distribution of equipment and materiel from the echelon (corps and division) support areas to units forward. C-2. LOC security is an operation, not a sustainment function, and Level II and Level III threat conditions require a dedicated security force. Most units conducting operations throughout the support area can defend against and defeat Level I threats; however, various types of security forces are normally required to patrol and respond to incidents on LOCs to defeat Level II and III threats. These security forces include a dedicated LOC response force and TCF. A response force (normally military police) is a highly mobile, dedicated security force with the capability to defeat Level I and II threats and delay Level III attacking support area LOCs. C-3. Although all LOCs throughout the support area are important, the capabilities they represent are not equal in their contributions to support area operations and overall mission accomplishment. Determining and directing protection and maintenance priorities for ground LOCs throughout the support area may involve the most important decisions that the commander will make. There are seldom sufficient resources to simultaneously provide the same level of protection to all ground LOCs. See ADP 3-37 for establishing protection priorities. C-4. General engineering assets possess the capabilities to develop infrastructure to support mobility, force protection, logistics, base camps, and force beddown facilities. Infrastructure support includes the construction, rehabilitation, repair, maintenance, and modifications of landing strips, airfields, check points, MSRs, LOCs, supply installations, building structures, and bridges. General engineering units (in support of infrastructure development) can also provide capabilities to repair (and limited reconstruction of) railroads or water and waste facilities. The basic capabilities of general engineer units can be expanded by augmenting them with additional personnel, equipment, and training from specialized engineer units. See ATP 3-34.40 for additional information on general engineering support. C-5. Movement control is a significant component to the control of LOCs, routes, and area security, but it is focused on control rather than security of the movement. Movement control is the planning, routing, scheduling, and control of personnel and cargo movements over lines of communications (JP 4-01.5). Movement control activities also interface with information operations, CA, psychological operations, public affairs, crowd sourcing, and tactical deception. Security considerations should always be a part of movement control. Mobility considerations are also critical to providing security.
3-81
136
Appendix C LINES OF COMMUNICATION SECURITY C-6. Security operations are those operations performed by commanders to provide early and accurate warning of enemy operations, to provide the force being protected with time and maneuver space within which to react to the enemy, and to develop the situation to allow commanders to effectively use their protected forces (ADP 3-90). Security operations encompass five primary tasks—screen, guard, cover, area security, and local security. While the first three tasks are linked to the movement and maneuver warfighting function, the last two are linked to the protection warfighting function. These last two security tasks are focused on providing protection, although they may also enhance the movement and maneuver of the force. The focus of security operations may be either on a force (such as convoy operations), facility (base camp, dislocated civilian camp, detention site), or LOC for which they are providing security. See ADP 3-37, ADP 3-90, and chapter 2 for additional information on area and local security. C-7. Security forces operating in the support area (normally military police [see FM 3-39] or a TCF) may also conduct counterreconnaissance in the performance of area and local security in support of LOC security. Counterreconnaissance is a tactical mission task that encompasses all measures taken by a commander to counter enemy reconnaissance and surveillance efforts. Counterreconnaissance is not a distinct mission, but a component of all forms of security operations (FM 3-90-1). ROUTE SECURITY C-8. Route security is a specialized area security task conducted to protect LOCs or MSRs and friendly forces moving along them. Enemy attempts to interdict LOCs may have little immediate impact on the corps or division ongoing decisive and shaping operations because of subordinate unit basic loads. However, the security of those routes over which the corps and division sustaining operations flow are critical to sustained land operations. C-9. The security of the support area LOCs and supply routes, whether rail, pipeline, highway, or waterway, presents one of the greatest security problems in the support area. Route security operations are defensive in nature and are terrain-oriented. A route security force prevents an enemy force from impeding, harassing, or destroying traffic along the route or portions of the route itself. The establishment of base camps and base clusters along that route permits the concentration of security resources. Route security requires dedicated resources at almost an infinite number of points or reaction forces to counter possible enemy action. Units performing missions that require the habitual use of LOCs and supply routes, such as military police, maintenance, transportation, supply, and field service units, can perform route security operations with their primary activities. The support area commander can employ the following techniques to provide route security: * Active and passive security. * Route reconnaissance. * Cordon security. * Movement corridor. C-10. While the scope of these operations depends on the mission variables of METT-TC, route security operations tend to require the commitment of significant resources. A combination of passive and route reconnaissance is the most common pattern used over secured routes, such as a division MSR. Active and Passive Security C-11. Active and passive security is a technique to provide route security without a significant expenditure of labor or resources. It includes— * Camouflage. * Convoy formation and march control to present the least lucrative target possible under prevailing conditions.
3-81
137
Lines of Communication Considerations * Proper selection of routes. * Capitalizing on security offered by related activities taking place without regard to route security requirements. These activities include aircraft traversing over all or portions of the route, maintenance activities taking place along the route, training exercise or troop movement adjacent to or along the route, military and host-nation police traffic control activities, and the activities of the civilian population. C-12. The support area commander employs passive security for all conditions or situations and as an adjunct to any other technique of route security employed. They are the products of a long-term and continually improved program for an integrated security system. Route Reconnaissance C-13. Route reconnaissance addresses not only the route itself, but also all terrain along the route from which the enemy could influence the movement of forces. Route reconnaissance takes place at irregular intervals to avoid developing a regular pattern that an enemy could exploit. See FM 3-90-1 for additional information on route reconnaissance. Cordon Security C-14. It is normally not feasible to secure all points along a route by physically allocating resources to all the points of the route. Cordon security is the security provided between two combat outposts positioned to provide mutual support. (ATP 3-91) The support area commander can assign any available air assault, mechanized, Stryker, or military police unit to combat outposts established at critical locations along the route. The commander locates these combat outposts within supporting distance of each other when possible. Units assigned to these combat outposts provide response forces in the event of enemy activity along the route within their subordinate areas of operations. Forces based at these combat outposts conduct reconnaissance patrols and offensive actions between their base combat outpost and adjacent combat outposts designed to counter enemy activities between these two points on a frequent but irregular schedule. C-15. Normally, each combat outpost contains at least a platoon size element and is equipped with automatic weapons, communications, and sensors and is supported by those fire support assets available to the support area commander. The outpost commander rotates personnel between duty at the combat outpost and duty on patrol. The higher commander of each combat outpost makes frequent contact with each deployed combat outpost to check its status. C-16. The establishment of cordon security does little to eliminate those threat forces that require the adoption of this technique. A commander directing the establishment of cordon security should also direct a series of parallel corrective actions, including— * Searching for a new route to bypass an enemy attack/ambush locations. * Conducting vigorous search and attack operations to destroy the enemy within the support area. * Rigorously enforcing circulation control measures in coordination with the host nation over the civilian population. * Removing cover from areas offering concealment to an enemy. * Constructing new routes to bypass dangerous areas. * Mass-evacuating the civilian population from towns and villages along the route. (This is an extreme measure and requires consultation with host-nation authorities and adherence to the laws of land warfare.) Convoy Security C-17. Convoy security is a specialized area security task conducted to protect convoys. Units conduct convoy security when there are not enough friendly forces to continuously secure LOCs in an AO and there is a significant danger of enemy ground action directed against the convoy. The commander may also conduct them with route security operations. Convoy operations are generally conducted at the battalion level or below, with brigade oversight. The support area commander is responsible for convoy security in the support area (which is usually the MEB commander). Likewise, responsibility for the security of convoys transiting
3-81
138
Appendix C BCT areas of operations is the responsibility of the appropriate BCT commander. Security of convoys transiting previously unassigned areas within the division AO will typically be the responsibility of the commander assigned responsibility for the temporary movement corridor designated by the echelon headquarters to support that convoy. Planning considerations for the division include— * Ensuring proper allocation of combat power to the task. * Coordinating combat enablers (fires, attack aviation, electronic warfare assets) for supported units. * Allocating information collection assets. Movement Corridor C-18. A movement corridor may be established to facilitate the movement of a single element or be established for a longer period of time to facilitate the movement of a number of elements along a given route. The support area commander may establish a movement corridor within the support area along an established MSR or a route designated for unit movement. All airspace requirements above the movement corridor, such as airspace for aerial recon and fires, must be included in the unit airspace plan to allow the establishing unit to conduct effective operations. C-19. The unit commander or convoy commander is responsible for a base level of security during movement. Most support brigades and functional units have a need for more security that they can organically provide during their movement and receive little support from maneuver units to provide additional required security. Units owning an AO may provide additional security support to units moving through or that are present in their AOs, to include the ability to provide fires. Several tasks and tactics, techniques, and procedures can be integrated within an AO to set conditions to help secure individual unit movement, to include— * Supporting situational understanding. * Conducting tactical maneuver (performed by the AO owner or assigned maneuver unit). * Conducting route and convoy security operations. * Conducting mobility operations. * Conducting AT activities. * Conducting CBRN operations. * Conducting survivability operations. * Handing off security responsibility when crossing AO borders or at the nearest secure area/facility/base. * Integrating fires. * Coordinating logistics support. * Conducting tactical troop movement. * Employing combat patrols. * Conducting counterambush actions. * Employing obscurants. * Providing tactical overwatch. C-20. The support area commander task-organizes the enablers required to establish a movement corridor and has the staff necessary to establish integrated operations within it. Military police, engineer, logistics, EOD, aviation, CBRN, and other forces may establish a combined arms approach to establish a movement corridor to provide secure movement of military traffic through vulnerable areas (see figure C-1). Based on published movement tables, the combined movement corridor forces will open and maintain a safe passage route through uncontrolled terrain. The opening of the route requires a synchronized effort, with each branch providing unique movement and mobility skills to the route. The sequence may include engineer route clearance and maintenance activities that are integrated with area security implementation along the corridor.
3-81
139
Lines of Communication Considerations Legend: ACP air control point CSC convoy support center EOD explosive ordnance disposal MP military police MSR main supply route NAI named area of interest SUST sustainment TCP traffic control post TRP target reference point Figure C-1. Example movement corridor C-21. Engineer and military police forces conduct route reconnaissance missions to determine problems along the route. Sustainment forces may then establish temporary holding, maintenance, or rest areas along the corridor as the tactical situation dictates. With the establishment of military police traffic control posts and convoy escorts of critical commodities of supplies and with aviation convoy security in place, the convoys move along the protected route to their final destination. The movement corridor opens and closes for specified periods of time to meet movement table requirements. C-22. This paragraph discusses support to movement beyond the support area commander’s assigned support area by using the technique of movement corridors. There are several techniques that the support area commander may use to support movement beyond its assigned support area. Where an MSR passes from the support area AO through a division-controlled area directly into a BCT AO, the division could designate an AO around the MSR and assign it to the support area commander as part of the support area. The support area commander could create a movement corridor from the support area boundary to the BCT AO. In this case, the support area commander would be responsible for all actions within the movement corridor. The division would provide the required information collection and fires support. The support area commander would coordinate with higher headquarters and the units conducting the movement to provide the required capabilities to support ongoing operations. The support area commander would transfer responsibility for units moving along the corridor to the BCT at their boundary. The BCT could extend the movement corridor within their AO to their brigade support area or to their other boundary if the MSR passes through the AO. The support area commander’s support to movement that does not move on an MSR could also be provided within a movement corridor. A movement corridor that does not use an established MSR may require additional information collection and other forces to set conditions.
3-81
140
Appendix C RAILWAY AND RAILHEAD SECURITY C-23. Support area commanders support the security of railheads, terminals, and railways that run through the support area and are critical to the forward movement of personnel, equipment, and materiel from the echelon (corps and division) support areas. As with air and sea ports and terminals, railheads and terminals may be collocated with a base camp located in the support area. C-24. Security forces operating in the support area support Army rail operations through local and area security. As with planning to support other intermodal operations, the support area commander and security forces need to understand the basics of those operations. (See ATP 4-14 for more information on Army rail operations.) It is important to understand the critical assets associated with rail operations (tracks, locomotives and rolling stock, switching modes, tunnels and bridges, marshalling yards) and the items (materiel and personnel) that are being transported. The basics associated with route security apply to the tracks, while those associated with local security apply to the protection of sites and specific points within the rail system. Military police may also be involved in providing security as part of the security force on the rolling stock itself (to include armored trains and cars), and many of the basics associated with convoy security will apply. See ATP 3-39.30 and FM 3-39 for additional information on military police support to the security of critical sites. C-25. Security forces support to rail security operations is to prevent the theft, damage, and interference of rail operations during the transport phase. Therefore, security forces support of rail security focuses on high- value or sensitive military equipment. The overall rail security is the responsibility of the train commander or shipper; however, security forces are integrated into rail security if a viable threat has been identified or the sensitivity of the cargo requires additional trained security personnel. C-26. When planning for security forces support in rail security operations, security forces need to consider host-nation security regulations and close coordination with host-nation law enforcement agencies or other regulatory agencies. Planning considerations for security forces rail security activities include— * Developing a security plan for rail transport, including establishing preventive security assumptions/measures to ensure that transport is undisturbed. * Establishing initial security rules before the rail operations begin; for example, military working dog teams or security forces conduct security checks of rail wagons and/or stocks and supplies. * Obtaining a detailed threat assessment of the route before movement to identify likely threats and, based on the threat assessment, applying the correct level of security measures for rail operations. * Conducting route/railway reconnaissance, if necessary. * Coordinating and liaising with host-nation law enforcement activities and host-nation security forces before movement to minimize vulnerable points. When feasible, a detailed movement plan should be given to allied forces. * Defining where security monitoring/patrolling are required. * Determining host-nation and other national border-crossing requirements to ensure undisturbed transport via crossing points. PIPELINE SECURITY C-27. Pipelines assist in maintaining storage levels to meet daily demand and required stock objectives for the distribution of petroleum. Pipelines reduce the number of convoys and personnel required in distributing the product. The support area commander tasks security forces to provide pipeline security through local and area security tasks to protect pipelines. Security forces (normally military police) conduct mobile security patrols and employ sensors and unmanned aircraft systems to detect and defeat Level I and Level II enemy threats disrupting pipeline distribution.
3-81
141
Lines of Communication Considerations TRAFFIC MANAGEMENT AND CONTROL C-28. Traffic management and control are conducted to enable the unencumbered movement of personnel and resources along road networks in the most efficient manner possible. Although focused on supporting movement, traffic management can also be selectively applied to enable maneuver. Traffic management and control also contributes to the commander’s protection efforts. Reconnaissance is an essential component of effective traffic management and control. C-29. Traffic management and control is the direction, control, supervision, and execution of the activities required to enable freedom of movement for persons, vehicles, and resources. Traffic management holistically involves transportation, military police, engineer, and other technical capabilities. The four primary components of traffic management and control are— * Movement control (a transportation task under sustainment). * Traffic management and enforcement (performed by military police as part of their military police disciplines). * MSR and ASR regulation and enforcement (performed by military police as part of security and mobility support discipline). * Engineering support focused on traffic engineering. MOVEMENT CONTROL C-30. Regulating movements entails the additional actions to synchronize the flow of movement over LOCs which includes, but is not limited to, planning and executing route synchronization and distribution network designs, managing convoys at distribution hubs/convoy support centers/border crossings/entry control points, and diverting the movement of a convoy or single shipment when necessary. C-31. A key aspect of regulating movements is route synchronization. Route synchronization is the planning, routing, and scheduling of movement on ground supply routes and is a control measure that regulates the flow of movement supporting military operations. Route synchronization is executed by commanders with the responsibility to provide order, prevent congestion, and enforce movement priorities for the ground supply routes in their operational area. C-32. The support area commander regulates movement throughout the support area. If the movement is conducted on MSRs or ASRs designated by higher headquarters, the support area commander regulates movement in coordination with the division transportation office/movement control battalion/movement control teams. Units may not move through ground LOCs within the support area without clearance from the AO responsible unit. The support area commander designates, maintains, secures, and controls movement along the routes within the support area unless the higher headquarters directs otherwise. Most routine movement on MSRs/ASRs is handled by the unit conducting the movement or the supporting headquarters. The support area commander must assert control when security conditions require it and stop, reroute, or delay movement even if coordinated or approved by others. C-33. The higher headquarters must provide clear guidance on the roles and responsibilities for movement control, protection, and defense of forces moving through the support area or originating in the support area AO that move into other AOs. Active participation by the SA commander and tenant units with higher headquarters planners will help to ensure proper guidance. The support area commander has responsibility for movement control, protection, and defense within the support area. The higher headquarters, through its movement control battalion and movement control teams, has primary responsibility for movement control within the AO. The convoy commander has primary responsibility for convoy protection, security, and defense. The support area commander may be assigned TACON for force protection in certain circumstances. When a unit wants to move within the support area, it coordinates with the BDOC or BCOC. The BDOC or BCOC will coordinate with the support area commander to obtain movement support: intelligence updates, additional security, fires, and final approval. When the unit plans to leave the support area, the support area commander will coordinate with the supporting movement control team as required to obtain movement clearance for use of the MSRs and ASRs. The base camp or base cluster commander adjusts perimeter security after a unit loads out for movement or integrates a new unit into existing plans to ensure a comprehensive security posture. When a unit moves through the support area, it coordinates with the supporting movement control team.
3-81
142
Appendix C C-34. Sustainment headquarters pushing convoys into a support area and the sustainment headquarters receiving the convoy coordinate with the support area BCOC or BDOC to ensure that the convoys do not conflict with movement and maneuver, protection, or fires warfighting functions. This is especially important for major unit moves supported by transportation units. The support area owner S-3 is ultimately responsible for controlling all movement through the support area. If possible, the support area owner may place a liaison officer at the higher headquarters to assist in controlling sustainment movements. C-35. The support area commander’s staff plans and conducts the required operations to support movement. The CBRN officer determines likely areas for enemy use of CBRN, and designates decontamination sites for restoring contaminated units. The CBRN officer also coordinates with task-organized CBRN assets to position CBRN detection sensors and to establish the corresponding process for receiving, validating, and disseminating CBRN alerts, precautions, and downwind messages to subordinate, adjacent, and higher units. The engineer coordinates mobility support, monitoring route status and directing required route maintenance. The EOD staff, in coordination with the engineer and intelligence staff, monitors and conducts trend analysis within the support area. The military police coordinates traffic control and directs required military police security. The S-6 ensures that the required codes, loads, administrative data, and procedures for accessing dedicated communication nets or networked systems are current, available, operational, and packaged for dissemination by the operations section to organic, tenant, or passing units. They coordinate with subordinate electronic warfare officers to ensure that electronic countermeasure devices and equipment are properly installed, tested, and deconflicted with noncomplementary devices of similar purpose within the support area TRAFFIC MANAGEMENT AND ENFORCEMENT C-36. Traffic management and enforcement and MSR and ASR regulation and enforcement collectively include active and passive measures used to control traffic circulation, enforce traffic regulations, investigate traffic collisions, and enable safe movement of vehicular and pedestrian traffic. Traffic management and enforcement focuses on mitigating traffic disruptions created by threats, dislocated civilians, and congestion due to breakdowns, weather, and degradation of road surfaces. Traffic control elements coordinate with movement control teams to update and share information on MSR interdiction, traffic congestion, or other situations influencing movement in the AO. Military police provide temporary traffic control through manned traffic control posts and emplace temporary traffic control devices (signs, roadblocks, traffic cones, warning devices, other traffic control measures). Traffic management and enforcement and MSR and ASR regulation and enforcement conducted by military police may include— * Supporting movement associated with tactical missions, such as traffic control in support of breaching and gap crossing (traffic control posts, defiles, temporary route signing). * Supporting movement control priorities through execution of published traffic control plans and enforcing highway regulations. * Supporting passage of lines (forward or rearward) mobility support through traffic control (to include management of dislocated civilians, stragglers, and detainees) for stationary and passing units. * Enforcing traffic laws and building host-nation police capacity to perform traffic control and enforcement tasks consistent with the rule of law. C-37. Military police trained as traffic management and collision investigators can conduct traffic surveys to assess traffic problems on specific existing road structures. Based on these assessments, they can provide recommendations for implementation of traffic control measures to mitigate acute traffic flow problems. (See ATP 3-39.10.) Traffic flow problems that require major construction or cover large road networks (such as those found within large cities) require comprehensive traffic studies and expertise from traffic engineers supported by transportation, military police, and other technical specialties.
3-81
143
Lines of Communication Considerations LINES OF COMMUNICATION MAINTENANCE C-38. Engineering support to traffic management and control can include repairing and clearing roads, improving trafficability and facilitating movement to major construction projects, and designing and building highways. In support of traffic studies, engineers also provide technical expertise on the design and installation of permanent traffic control devices into the road network. See ATP 3-34.40 for additional information on general engineering support.
3-81
145
Appendix D Support Area Tenant Units Many of the units not staffed to control terrain become tenants within the support area. Support area operations are conducted by the assigned area owner. Support area operations do not include the mission support operations conducted by tenants within the support area. The support area commander will synchronize their operations with tenant units in the support area to prevent or minimize interference with command and control and support operations and to provide unimpeded movement of friendly forces; protection; operations to find, fix, and destroy enemy forces or defeat threats; and area damage control. The support area commander will have some command and control authority over the tenant and transient organizations within the support area for security and defense; this may be TACON for security and defense. This chapter provides an overview of support area tenant units and their capabilities. Note: See chapter 2, Section II, for an overview of possible MEB task-organized units and their capabilities. ENGINEER D-1. Engineers not assigned to BCTs are organized in capability-based units of multidiscipline combat, general, and geospatial capabilities. Army engineer forces operate as integral members of the combined arms teams and echelons above the BCT during peace and war to provide a full range of engineering capabilities. These capabilities are generally provided by three engineer disciplines—combat, general, and geospatial engineering. Table D-1 provides an overview of engineer capabilities at the brigade and battalion level that may be a tenant unit of the support area. For additional information on engineer operations, see FM 3-34. Table D-1. Engineer mission planning and capabilities Organization Capabilities Engineer Brigade • Provide command and control, plan, integrate, and employ engineer capabilities (combat, general, and geospatial engineering) in support of division, corps and theater areas of operations. • Oversee contract construction, labor, and indigenous personnel. • Plan and supervise terrain analysis and topographic operations. • Decoy emplacements (if necessary field expedient decoys/on-site fabrication). Engineer Battalion • Provide command and control, plan, integrate, and employ up to 5 task organized companies, one forward support company. • Coordinate engineer support, subunit task organization, and resource management. • Plan and support mobility, countermobility, and survivability operations. • Plan and supervise the collection of engineer related information and development of engineer information.
3-81
146
Appendix D Table D-1. Engineer mission planning and capabilities (continued) Organization Capabilities Engineer Battalion • Provide technical advice, assistance, and training in mine warfare, field (continued) fortifications, camouflage, demolitions, and engineer reconnaissance techniques. • Plan, supervise, and coordinate survey and design teams when augmented by engineer brigade for construction or clearance missions. • Coordinate with medical brigade to provide for site preparation, construction or modification of waste disposal areas for combat support hospitals. • Emplace division managed multi-spectral decoys, construct decoy positions, and support decoy pattern of life. MILITARY POLICE D-2. Military police units are manned, equipped, and trained to operate across the range of military operations. Military police organize for purpose and provide technical capabilities that enhance the support area commander’s ability to control terrain, protect populations, defeat enemy forces, and consolidate gains. Military police do this through their three military police disciplines of police operations, detention operations, and security and mobility support. Military police headquarters cannot generally conduct all three military police disciplines at the same level of priority; therefore, commanders must anticipate, prioritize, and synchronize the employment of military police assets. Table D-2 provides an overview of military police capabilities at the battalion level and below that may be a tenant unit of the corps or division support area. For additional information on military police operations, see FM 3-39. Table D-2. Military police capabilities Organization Capabilities Military police • Provides command and control for the operation of the brigade and for all task brigade organized units. • Provides staff planning, coordination, and supervision required for all task organized and attached units, including unit allocation and resource management. • Coordinates with CA operations staff officer for planning and execution of civil-military operations, appropriate Army, joint, interagency, and multinational headquarters, host- nation civil authorities, nongovernmental organizations, and private volunteer organizations. • Provides logistical and administrative support to the headquarters and task organized units. • Integrates police intelligence operations and vulnerability assessments into the common operational picture. • Provides management of detainee operations. • Provides MWD program management, and coordinating MWD employment and sustainment within the brigade AO. • Coordinates and supervises protective service operations for designated personnel. • Brigade commander serves as Commander of Detainee Operations when required. • Provides staff planning, coordination, and supervision required for all task organized and attached units. • Coordinates and supervises protective service operations for designated personnel.
3-81
147
Support Area Tenant Units Table D-2. Military police capabilities (continued) Organization Capabilities Military police • Conducts the command and control of battalion operations for 2 to 5 military police battalion companies and other assigned or attached elements. • Provides staff planning, coordination, and supervision required for all task organized and attached units executing police operations, detention operations, and security and mobility support. • Coordinates with the headquarters and headquarters detachment, military police brigade, host-nation military organizations, and the civil police authorities concerning host-nation support. • Conducts vulnerability assessments of critical facilities. • Provides management of detainee operations and supervises the staff for collection and evacuation of detainees and/or dislocated civilians. • Prepares the command and control of subordinate elements that support counterdrug operations pursuant to controlling law and within the provisions of DOD policy. • Integrates Police Intelligence Operations and vulnerability assessments into the common operational picture • Supervises the selection, organization, training, equipment, and employment of host- nation military and paramilitary police units. • Provides military police investigative support within the battalion AOs. • Provides protective service details for designated high-risk personnel when they are properly trained or supervised by a CID special agent. Military police • Conducts command and control of operations for assigned and attached units. detention • Provides administrative, field feeding, clothing, religious, and recreational support to battalion detainees. When organized to support U.S. military prisoners or detainees, field feeding provided is limited to the procurement/distribution of rations, menus, and field kitchen equipment and the supervision of qualified U.S. military prisoners or detainees in the preparation of meals. Complete field-feeding services are provided to high-risk detainees. • Coordinates and supervises work projects for detainees or U.S. military prisoners. • Provides limited health support services and operations public health services during detainee operations and escorts qualified personnel providing medical care and operations public health services. • Screens/inspects incoming and outgoing detainee mail for contraband items. • Maintains organic equipment in the headquarters and headquarters company and assigned military police detention companies and detention camp liaison detachments. • Operates and maintains battalion internal radio and wire communication nets. • Provides organic personnel to maintain detention facilities and utilities, heat, lights, and water. • Consolidates supply and HR support to U.S. Soldiers assigned to subordinate units. Legend: AO area of operations CA civil affairs CID criminal investigations division DOD Department of Defense HR human resources MWD military working dog U.S. United States
3-81
148
Appendix D CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR D-3. Chemical, biological, radiological, and nuclear operations include the employment of capabilities that assess, protect against, and mitigate the entire range of chemical, biological, radiological, and nuclear incidents to enable freedom of action (FM 3-11). CBRN capabilities support operations across the range of military operations by assessing CBRN threats and hazards, providing protection against CBRN hazards, mitigating CBRN incidents, and providing hazard awareness and understanding. The CBRN functions of assess, protect, and mitigate share a common fundamental purpose that fits within the protection warfighting function to achieve or contribute to support area operations. Table D-3 provides an overview of CBRN units, planning requirements, and capabilities at the battalion level and below that may be task-organized to the support area designated land owner or a tenant unit of the corps or division support area. For additional information on CBRN operations, see FM 3-11. Table D-3. CBRN mission planning and capabilities Organization Capabilities • Provide command and control for the operation of the brigade and up to five CBRN battalions. • Provide staff planning and sustainment coordination with the CBRN staff within division, corps, or theater Army sector. CBRN brigade • Operate a tactical command post and a main command post. • Allocate units and resources in support of CBRN reconnaissance, detection, decontamination, and chemical weapons of mass destruction operations throughout the theater of operation. • Command and control and supervision of personnel assigned to the CBRN battalion and up to six CBRN/CBRNE companies. • Operate a battalion main command post. • Conduct staff planning and sustainment coordination with the CBRN CBRN battalion staff within the brigade, division, corps, or theater army sector. • Allocate task organized units and resources in support of CBRN reconnaissance, surveillance, decontamination, biological detection, and CWMD operations to the theater army area, corps, division, and brigade areas of operation. Legend: CBRN chemical, biological, radiological, and nuclear CBRNE chemical, biological, radiological, nuclear, and explosives CWMD countering weapons of mass destruction CIVIL AFFAIRS D-4. CA forces execute CA core competencies and functions. The CA branch provides three core competencies nested within CA operations–CA activities, military government operations, and CA supported activities. CA functions are structured under each competency, organizing tasks and systems (people, organizations, information, and processes) into executable capabilities to create the desired effects. CA core competencies form the basis for training, organizing, equipping, and employing CA forces. The core competencies nest within the commander’s overall responsibility for planning and executing civil-military operations. The following are CA operations core competencies and their nested functions: * CA activities. Civil affairs activities are activities specifically planned, executed, and assessed by civil affairs forces that support the commander in order to synchronize, coordinate, and integrate indigenous populations and institutions, unified action partners, and interagency (FM 3-57). CA activities provide unique capabilities to the commander. CA activities consist of the following functions:  Civil reconnaissance.  Civil engagement.  Civil information management.
3-81
149
Support Area Tenant Units  Civil-military operations center.  CA operations staff support. * Military government operations. Military government operations are operations executed by civil affairs to provide expertise in the civil sector functions in order to establish transitional military authority or conduct support to civil administration (FM 3-57). While the Department of State has the lead for stabilization and reconstruction, the DOD has a requirement to support that. DODD 5100.01 directs the Army to establish military government when occupying enemy territory, and DODD 2000.13 identifies military government as a directed requirement under CA operations. Although CA forces enable military government by conducting military government operations, there is currently no overarching concept or doctrine within DOD or the Army on how to establish a transitional military authority. CA forces provide expertise in civilian sector functions that are typically the responsibility of civilian authorities to establish local government capability or to enhance its capacity. This core competency is normally executed in support of Department of State operations or when directed in the absence of other U.S. government capabilities. Military government operations include the following functions:  Transitional military authority.  Support to civil administration. * CA supported activities. Civil affairs supported activities are activities in which civil affairs plays a key planning, coordinating or synchronizing role, but for which they are not the proponent or primary executor (FM 3-57). CA supported activities are comprised of the following functions:  Foreign assistance.  Foreign humanitarian assistance.  Populace and resources control.  Civil-military engagement. D-5. Table D-4 provides an overview of CA units, planning requirements, and capabilities for units that may be task-organized to the support area designated land owner or tenant unit of the corps or division support area. For additional information on the capabilities of CA units, see ATP 3-57.70 and FM 3-57. Table D-4. CA mission planning and capabilities Organization Capabilities • Plan, enable, shape, and manage civil-military operations. • Develop and maintain a civil common operational picture for the corps’ AOs. • Plan, assess, and manage CA operations in support of unified land operations. CA Brigade • Plan, assess, and support military government operations (Subnational). • Support stabilization, reconstruction, and development. • Enable indigenous populations and institutions, interagency, and interorganizational coordination to achieve unified action. • Enable command and control. • Enable transitions to consolidate gains.
3-81
150
Appendix D Table D-4. CA mission planning and capabilities (continued) Organization Capabilities • Plan, enable, shape, and manage civil-military operations • Develop and maintain a civil common operational for the division’s AOs. • Plan, assess, and execute CA operations in support of unified land operations. CA Battalion • Plan and assess stability activities • Enable indigenous populations and institutions, interagency, and interorganizational coordination to achieve unified action. • Enable mission command. • Enable transitions to consolidate gains. Legend: AO area of operations CA civil affairs AIR AND MISSILE DEFENSE D-6. Air and missile defense is the direct (active and passive) defensive actions taken to destroy, nullify, or reduce the effectiveness of hostile air and ballistic missile threats against friendly forces and assets (JP 3-01). More precisely, ADA is the dedicated Army systems, personnel, and forces that provide active, land-based defense against air and missile attacks. ADA forces execute AMD operations under the joint counterair operational framework based on the integration of offensive and defensive counterair operations. Offensive counterair are offensive operations to destroy or neutralize enemy aircraft, missile launch platforms, and their supporting structures and systems both before and after launch, and as close to their source as possible (JP 3-01). Defensive counterair are all defensive measures designed to neutralize or destroy enemy forces attempting to penetrate or attack through friendly airspace (JP 3-01). D-7. During support area operations, the designated support area land owner may be task-organized an ADA element (SHORAD) to counter low-altitude unmanned aircraft systems, high-speed fixed-wing and rotary- wing aircraft, reconnaissance, intelligence, and surveillance and target acquisition assets. Table D-5 provides an overview of the ADA battalion capabilities that may be a tenant unit of the corps or division support area. For additional information on ADA battalions (SHORAD), see FM 3-01. Table D-5. ADA mission planning and capabilities Organization Capabilities • Air defense against low altitude hostile aircraft • Air defense airspace management coordination elements to supporting high and medium ADA battalions • Early warning information and air defense command and control ADA Battalion information to supported units (SHORAD) • Unit administration; religious support; field feeding; and communications- electronics support for units of the battalion • A force protection element to conduct coordinated defense of the unit’s area or installation, unit movements, and other missions Legend: ADA air defense artillery SHORAD short-range air defense AVIATION BRIGADE D-8. Army aviation formations are organized, trained, and equipped to support the combined arms team at the tactical and operational levels. Army aviation operations in the support area typically include air movement, aeromedical evacuation, and command and control support, but they may also include
3-81
151
Support Area Tenant Units reconnaissance, attacks, and security operations if there is a threat to the support area. When conducting attacks, reconnaissance, and security operations, Army aviation typically operates as a combined arms team with the ground unit designated with the security mission for the support area. The aviation brigade and theater-aviation EAB require large AAs usually located inside the division support area. An aviation brigade may need as much as 145,000 square meters to park aircraft and equipment. The space is required because of the minimum space required around helicopters during takeoff and landing in unimproved areas. D-9. Table D-6 provides an overview of Army aviation formations capabilities that may be a tenant unit of the corps or division support area. For additional information on Army Aviation formations, see FM 3-04. Table D-6. Aviation brigade capabilities Organization Capabilities • Conduct command and control of helicopters and equipment to enhance command, control, communications, and intelligence. • Provide attack/recon helicopters for rapid employment as a part of the combined arms team to destroy enemy forces. • Provide utility and cargo helicopters for air assault and air movement, aerial mine warfare, downed aircraft recovery team, casualty evacuation, and intermediate and deliberate search and rescue operations in support of the division. Combat Aviation • Provide air ambulance helicopters to evacuate critically wounded or other Brigade patients consistent with evacuation priorities and operational considerations, from points as far forward as possible, to appropriate role of care. • Conduct air reconnaissance, surveillance, and security operations in support of the division. • Provide air traffic services for division and transit aircraft. • Provide unmanned aircraft systems for tactical reconnaissance, surveillance and target acquisition and manned unmanned teaming to increase the commander’s situational understanding and operational reach. • Conduct command and control of helicopters and equipment to enhance command, control, communications, and intelligence. • Provide utility and cargo helicopters for air assault and air movement, aerial mine warfare, Downed Aircraft Recovery Team, casualty evacuation, and Expeditionary intermediate and deliberate search and rescue operations in support of the Combat Aviation Division/Corps. Brigade • Provide air ambulance helicopters to evacuate critically wounded or other patients consistent with evacuation priorities and operational considerations, from points as far forward as possible, to appropriate role of care. • Conduct Air Traffic Services for Division/Corps and transit aircraft. LOGISTICS CAPBILITIES D-10. Logistics include maintenance, transportation, supply, field services, distribution, operational contract support, and general engineering. Field services maintain the force by providing life, morale, and welfare support. Field services include shower and laundry, field feeding, water production and distribution, clothing and light textile repair, aerial delivery, and mortuary affairs. Table D-7, page D-8, provides an overview of sustainment capabilities that may be a tenant unit of the corps or division support area. For additional information on sustainment, see FM 4-0.
3-81
152
Appendix D Table D-7. Sustainment capabilities Organization Capabilities • Provide sustainment support which includes logistics support, conduct human resources support, conduct financial and comptroller support, and provide health service support. Expeditionary • Plan, integrate, synchronize and assess Army common and special Sustainment Command operations forces sustainment requirements. • Rapidly deploy to conduct theater opening, distribution management and reception, staging and onward movement of forces. • Provide responsibility for the integration, synchronization, and execution of sustainment operations for a division. • Command and control of up to seven battalions. Division sustainment • Coordinate and synchronize tactical-level sustainment operations to meet brigade current and future operations. • Provide general support to units assigned or attached to the division and operating in the division areas of operations. ARMY HEALTH SYSTEM D-11. The Army Health System is a component of the Military Health System that is responsible for operational management of the HSS and FHP missions for training, pre-deployment, deployment, and postdeployment operations. Army Health System includes all mission support services performed, provided, or arranged by the Army Medicine to support health service support and force health protection mission requirements for the Army and as directed, for joint, intergovernmental agencies, coalition, and multinational forces (FM 4-02). The AHS is a complex system of systems, divided into ten medical functions and aligned with medical disciplines. These systems are interrelated and interdependent and must be continuously and meticulously synchronized. The AHS uses medical command and control organizations to manage the subordinate units providing AHS and FHP (see table D-8). Table D-8. Medical capabilities Organization Capabilities MEDCOM (DS) • Command and control of theater medical units providing AHS support within the AO. • Management, coordination, and patient tracking procedures with the theater patient movement center staff section. • Synchronization of intratheater evacuation plans with the intertheater evacuation plan to ensure a seamless transition between tactical and strategic evacuation systems. • Coordination and orchestration of medical logistic operations to include Class VIII supply, distribution, medical maintenance and repair support, optical fabrication, and blood management. • Veterinary technical supervision for animal medical care, food protection, and veterinary public health support. • Operations public health support for medical and (OEH surveillance, potable water inspection, pest management, food facility inspection, and control of medical and nonmedical waste. • Assistance with coordination and integration of strategic capabilities from the sustaining base to units in the AO. • Staff planning, supervision of operations, and administration of assigned and attached medical units.
3-81
153
Support Area Tenant Units Table D-8. Medical capabilities (continued) Organization Capabilities Medical Brigade • Command and control of subordinate and attached units. (Support) • Advises commanders on medical aspects of their operations. • Medical staff planning, operational and technical supervision, and administrative assistance for subordinate or attached units and hospitals operating in the division or corps AO. • Coordination with the supporting theater patient movement requirements center for medical regulating and medical evacuation from medical battalion (multifunctional) and hospitals to support theater Army unit’s MTFs. • Medical consultation service and technical advice in Operations public health, behavioral health, dental services, medical laboratory support, nutrition, and veterinary support. • Control and supervision of Class VIII supply and resupply to include blood management. Serves as the single integrated medical logistics manager when designated by the geographical combatant commander. • Joint capable C2 capability when augmented with appropriate joint assets. Medical Battalion • Medical command and control, staff planning, supervision of operations, (Multifunctional) medical and general logistics support as required, and administration of activities of subordinates in accomplishing the AHS mission. • Task organization of EAB health care assets to meet the projected patient workload. • Planning and coordination of Role 1 and Role 2 medical treatment, to include staff advice on a support basis for EAB units without organic health assets. • Monitoring and supervision of medical logistics operations, to include Class VIII supply or resupply, medical equipment maintenance and repair support, optical fabrication and repair support, and blood management. • Consultation, planning, and coordinating air and ground medical evacuation within the battalion AO. Coordinating aeromedical evacuation support requirements with the supporting aviation unit, and synchronizing the air evacuation plan into the overall medical evacuation plan. • Coordination of medical regulating and patient movement with the medical brigade (support) patient movement branch or the MEDCOM (DS) theater patient movement center, as required within the AO. • Consultation and technical advice on operations public health (disease vectors and pest management, medical and OEH surveillance, food facility inspection, waste and water management, operational hearing services), combat operational stress control and behavioral health, medical records administration, veterinary services, nursing practices and procedures, dental services, and automated medical information systems to supported units. Legend: AHS Army Health System AO area of operations C2 command and control EAB echelons above brigade MTF medical treatment facility MEDCOM (DS) medical command, deployment support OEH occupational and environmental health
3-81
154
Appendix D REGIONAL SUPPORT GROUP D-12. The regional support group mission enables a commander to support personnel. The regional support group is a deployable headquarters that manages base camps or base clusters with a population of 6,000 or more personnel and requires services beyond basic life support (see ATP 3-90.20). The regional support group headquarters is designed to relieve the burden of base camp management and operations from the combatant commander. D-13. A regional support group provides the command, control, and administrative support structure for operating a base camp or base cluster with a population of 6,000 or more personnel. The population consists of military forces, DA Civilians, other government agency personnel, nongovernmental organization personnel, government contractors, and transients. Usually a regional support group falls under a general officer command during contingency operations. This mission set includes— * Commanding assigned or attached units. * Supporting units and personnel as directed. * Providing contract requirements definition and oversight assistance. * Determining base camp support requirements. * Operating and manning a 24/7 BDOC. * Commanding smaller contingency bases within the general officer command’s operational area. * Overseeing base camp management and operations.
3-81
155
Appendix E Base Camp and Base Cluster Security and Defense Support areas are subject to both conventional and unconventional threats. These threats will attempt to disrupt support area operations by attacking sustainment operations and command and control nodes, disabling AMD systems, and seizing key terrain. Every unit in the support area is responsible for its own defense. The establishment of base camps and base clusters throughout the support area builds on the concept of integrating mutual support into a viable defense. BASE CAMP AND BASE CLUSTER OVERVIEW E-1. A base camp is an evolving military facility that supports the military operations of a deployed unit and provides the necessary support and services for sustained operations (ATP 3-37.10). Establishing base camps is a complex task that balances mission, protection, sustainment, and construction requirements. This task is further complicated by changes in missions; fluctuating troop levels; threat factors; and the complexity, lethality, and speed of military operations. Added to this are time and resource constraints, theater entry conditions, mission duration, access to resources, competing requirements, and environmental considerations. E-2. The use of base camps for sustainment and related activities are unavoidable during the conduct of large-scale combat operations. Commanders must be able to establish base camps and enable access for onward movement and sustainment of forces. Base camps, due to their size and immobility, are difficult to conceal and are generally considered high-value targets for enemy attacks due to the concentration of friendly forces and materiel. Securing and protecting base camps and infrastructure is essential to the force ability to compete and win. Base camps are highly contested and difficult to sustain forward on the battlefield. All activities forward on the battlefield, including LOCs, critical infrastructure, and hasty base camps or AAs, must be resilient and mobile. E-3. The base camp is the focal point for base defense planning and is responsible for defending itself against Level I threats. The base camp engages Level II and Level III threats and delays them until reinforcing military police or a TCF arrives to assist in defeating the threat. Each base establishes a BDOC to plan, coordinate, and supervise base camp defense operations. E-4. Base camps are nonpermanent by design and are geographically small, defendable areas with defined perimeters and established access controls. Base camps should be situated and designed to take advantage of natural and man-made terrain features. The area may vary from high ground with good observation and fields of fire to highly congested areas, obscuring observation and limiting fields of fire. E-5. Lethality and the speed of operations may require the establishment of AAs, hasty base camps, and base clusters using physical terrain features and dispersion to support the protection of forces. The designated base camp commander assigns areas to tenant units and requires them to tie in fires and observation with adjacent units. The BDOC is normally located near the center of the base camp. Unit locations in the base camp are assigned areas based on their future mission, their combat power, and the presence of enemy avenues of approach within their AO. The base camp commander ensures that observation posts are established at key points around the entire perimeter along the most likely enemy avenues of approach. When possible, hasty base camps should provide— * Concealment from air and ground observation. * Adequate entrances, exits, and internal routes.
3-81
156
Appendix E * Space for dispersion. * Cover from direct fire. * Good drainage and soil conditions that can sustain unit vehicles and individual Soldier movements. * Terrain masking electromagnetic signatures. * Sanctuary from enemy artillery fires. * Sufficient space for basecamp specific purposes. E-6. Base camps may have a specific purpose, or they may be multifunctional. While base camps are not permanent bases or installations, the longer they exist, the more they exhibit many of the same characteristics in terms of the support and services that are provided and the types of facilities that are developed E-7. A base camp can contain one or more units from one or more Services and typically support U.S. and multinational forces and other unified action partners operating anywhere along the range of military operations. (See JP 3-10.) A base camp has a defined perimeter and established access controls. The perimeter encircles the base camp site and employs crew served-weapons, fighting positions, and observation posts. E-8. Base camps provide a protected location from which to project and sustain combat power. Commanders apply operational art to decide when, where, and for what purpose to operate from base camps. The arrangement and location of base camps (often in austere, rapidly-emplaced configurations) throughout the support area complement the ability of U.S. forces to conduct sustained, continuous operations, enabling commanders to apply combat power in support of large-scale combat operations. E-9. Base camps throughout the support area may be developed for specific purposes. A base camp can serve as an AA or a sustainment base; support onward movement, integration, or detention operations; or perform multiple functions. The designated purpose and operational requirements of tenant units serve as the primary guides for designing a base camp. E-10. The support area commander designates an area or facility as a base camp and designates the senior officer as the base camp commander responsible for protection, terrain management, and day-to-day operations of the base camp. This allows other units in the base camp to focus on their primary functions. Units located within the base camp are under the TACON of the base camp commander for security and defense. E-11. Construction standards for a base camp in support of large-scale combat operations normally fall within the initial construction standards. An initial construction standard is characterized by facilities with minimum capabilities, requiring minimal engineer effort and simplifying material transport and availability. Organic construction is a subset of the initial construction standard. It is intended for immediate use by units upon arrival in theater for up to 90 days; however, it may be used for up to 6 months. Units use their organic/table of organization and equipment capabilities to the fullest extent possible to construct base camps. Organic capabilities may vary based on the type of unit, training, experience, and equipment available. They typically provide for initial force presence and maneuver activities until force flow supports the arrival of engineer resources. See ATP 3-37.10 for additional information on base camp construction standards. E-12. Base camps may be grouped together into a cluster. Within the support area, the support area commander may designate base clusters for the mutual protection and accomplishment of mission objectives. A base cluster has no defined perimeter. However, each base camp within the base cluster does. The senior commander within the base cluster is the base cluster commander. The base cluster commander operates the BCOC and is responsible for the base cluster defense plan. E-13. A number of base clusters may exist within the echelon support area, but there will only be limited assets to assist in their defense. The support area commander will determine which base camps or base clusters have protection priority and submit the unit protection prioritization list to the appropriate echelon for consideration of additional protection assets. See appendix A for additional information on developing a protection prioritization list.
3-81
157
Base Camp and Base Cluster Security and Defense BASE CAMP PRINCIPLES E-14. The base camp commander and staff use the base camp principles as a guide for analytical thinking. These principles are not a set of rigid rules, nor do they apply in every situation (see ATP 3-37.10 for additional information on base camp master planning principles). They should be applied with creativity, insight, and boldness. These principles are— * Survivability. A primary purpose of base camps is providing a protected location from which to project and sustain combat power. Base camps depend on the application of effective protection strategies, generally achieved by developing a comprehensive protection plan consistent with the principles of protection discussed in ADP 3-37. * Scalability. Scalability is the ability to tolerate population fluctuations and incorporate changes in the base camp mission, level of services, or force protection level without the need for redesign. * Sustainability. Sustainability is the ability to maintain the necessary level and duration of sustainment/logistics support to achieve military objectives. This means that base camps must achieve and maintain effectiveness within the means of available resources (materials, labor, energy, and funds) without placing any unnecessary strain on existing sustainment systems. * Standardization. The standardization of base camp policies, Service standards, guidance, system solutions, standard designs, and construction provides consistent expectations for commanders and drives the repetitive use of proven best practices and tactics, techniques, and procedures. It helps achieve a higher degree of sustainability, reliability, and efficiency. BASE CAMP ACTIVITIES E-15. Base camp activities are interrelated and interdependent; each activity provides an action that mutually supports the others. The foundation of all activities is master planning. The base camp activities are— * Master planning. Master planning is an integrated strategy for the design, construction, and maintenance of required facilities and infrastructure that integrates base camp improvements for protection, quality of life for residents, and efficiencies and effectiveness. * Operations and maintenance. This activity includes all of the tasks needed for constructing, maintaining, operating, and repairing base camp facilities and infrastructure. * Protection. Base camp protection includes the consideration of all of the protection tasks within the protection warfighting function articulated in ADP 3-37 (see appendix A for more information on protection). * Sustainment. Sustainment activities provide support in two major areas: sustainment/logistics and field services. SITE SELECTION AND LAYOUT E-16. Numerous competing demands and considerations influence a base camp site selection and layout, such as tactical and operational objectives, mission concerns, military constraints, environmental factors, division or corps directives, and commander guidance. A site selection and layout assessment assists in identifying the potential benefits, vulnerabilities, and protection requirements associated with a base camp. E-17. In all situations, a site selection and layout assessment aids in estimating base camp characteristics and the suitability of the site to meet protection requirements. It is important to recognize that some problems are inherent, such as high ground and snipers overlooking the entire base camp interior, or a location where floods occur while other problems can be mitigated. Knowledge regarding base camp protection measures improves throughout the process, from initial selection and layout to design and establishment of the base camp. Protection considerations deliberately integrated from inception into the site selection, layout, design, and establishment process greatly reduces the resource requirements (materials, time, and labor) needed to protect personnel and assets.
3-81
158
Appendix E SITE SELECTION CONSIDERATIONS E-18. Many factors influence site selection, including the tactical situation, access to transportation and infrastructure, proximity to the civilian population, terrain, weather, protection considerations, and effects of selecting an alternate location. Site selection can be crucial to effective operations. The primary concern during site selection is mission accomplishment. However, protection considerations cannot be ignored. A poorly located base camp may be difficult to secure and could hinder rather than enable the mission. Early identification of protection and security requirements reduces construction requirements and manpower demands and helps ensure adequate protection of personnel and assets commensurate with the threat. See ATP 3-37.10 for additional information on site selection. DESIGN AND LAYOUT CONSIDERATIONS E-19. Planners responsible for the base camp layout and design should consider many variables, such as operational and functional issues, infrastructure requirements, protection and security measures, health and safety, and emergency response. Each base camp should be prepared to defend against the effects of hostile actions, nonhostile or unintended events (such as fire), and environmental conditions such as flooding or other man-made or natural disasters. Many of the base camp layout considerations are similar to site selection criteria. However, layout concerns and constraints are typically base camp-specific. Throughout the design process, planners should recognize conflicts, establish priorities, and focus on the most favorable solutions. The base camp layout should— * Facilitate current and future operations. * Maintain a layered, defense-in-depth security approach. * Include entry control points that maintain security and control vehicle and personnel access. * Protect critical assets and provide accessible protective shelters (bunkers) throughout the base camp. * Allow for the dispersion of units and structures and maintain interior LOCs to support rapid incident response. * Maximize protection of high-occupancy structures using measures such as overhead and sidewall protection designs. * Maximize utilization of existing buildings and other infrastructure. E-20. Protection measures that reduce vulnerability and diminish potential threats and hazards to personnel and critical assets should be addressed during base camp design. These measures include the establishment of standoff and facilities separation distances, perimeter security, vehicle barriers, entry control points, access control, intrusion detection, and mass warning. SECURITY AND DEFENSE E-21. All commanders are responsible for the protection of forces on base camps within their AOs. The base camp and base cluster commanders integrate the appropriate protection tasks as part of mission planning and throughout the operations process. The framework for base camp protection consists of three primary areas: an outer security area, a perimeter zone, and an inner security area. These are shown conceptually in figure E-1. The base camp commander implements protection measures for tenant units on the base camp, and the base cluster commander coordinates, synchronizes, and integrates protection capabilities to safeguard base camps, secure routes, and protect forces within the base cluster. Protection and defensive measures are applied within and beyond the confines of the base camp to safeguard personnel, physical assets, and information. Protecting and defending base camps include consideration of all of the protection principles
3-81
159
Base Camp and Base Cluster Security and Defense within the protection warfighting function in ADP 3-37 and the associated defensive tasks detailed in FM 3-90-1, including— * Comprehensive. Base camp and base cluster protection is an all-inclusive utilization of complementary and reinforcing protection tasks and systems available to base camp commanders to preserve the force. * Integrated. Base camp and base cluster protection is integrated with other activities, systems, efforts, and capabilities associated with base camp missions to provide strength and structure to the overall effort. Integration must occur vertically and horizontally throughout the process. * Layered. Base camp and base cluster protection capabilities are arranged using a layered approach to provide strength and depth. Layering reduces the destructive effect of a threat or hazard. * Redundant. Base camp and base cluster protection efforts are often redundant anywhere that a vulnerability or point of failure is identified. Redundancy ensures that specific activities, systems, efforts, and capabilities that are critical for the success of overall base camp protection have a secondary or auxiliary effort of equal or greater quality. * Enduring. Ongoing base camp and base cluster protection activities maintain the objectives of preserving combat power, populations, partners, essential equipment, resources, and critical infrastructure throughout the base camp life cycle. Figure E-1. Framework for base camp security and defense E-22. Base camp and base cluster security and defense capabilities are employed using a layered approach to provide strength and depth. Layering reduces the destructive effect from any single attack or hazard through the dissipation of energy or the defeat of the attacking force. A layered defense slows threat attacks and provides time for friendly defensive forces to assess, decide, and respond. Obstacles, such as barbed wire fences, jersey barriers, T-walls, berms and ditches, bastion barriers, networked munitions, and direct-fire positions and elements are deployed in depth, in a concentric fashion, to provide maximum protection.
3-81
160
Appendix E E-23. These obstacles, direct-fire positions, and active deterrents can be in the form of— * Wire, concrete, or other barriers used to reinforce the perimeter. * Entry control points and associated obstacle/countermobility plans used to canalize and control incoming personnel or vehicles. * Barriers employed to block high-speed avenues of approach, externally on approaches to the perimeter and internally to protect high-risk targets. * Perimeter guard towers and observation posts. * Ditches, berms, or other earthen obstacles. * Mobile security patrols. * Communications signal/electromagnetic signature masking. BASE CAMP AND BASE CLUSTER SECURITY E-24. Base camps provide a protected location to project and sustain combat power. While some base camps, especially smaller base camps built in high-threat areas, may be required to focus on defense rather than just security, the primary focus for most base camps is not on conducting defense, except in rare instances. In these cases, normal mission operations on the base camp cease and the focus of all available assets is shifted to defense until the threat is eliminated or repelled. Once the threat is defeated, the base camp and its tenant or transient units return their focus to their primary missions. E-25. Security operations are those operations performed by commanders to provide early and accurate warning of enemy operations, to provide the forces being protected with time and maneuver space within which to react to the enemy, and to develop the situation to allow commanders to effectively use their protected forces (ADP 3-90). The five fundamentals of security are— * Provide early and accurate warnings. Early and accurate warnings of an enemy approach are essential to successful base camp and base cluster protection/force protection. The base camp and base cluster commanders need information to shift and concentrate forces to meet and defeat the enemy. The use of OPs, patrols, security forces, and sensors provide long-range observation; observe enemy movement; and report the enemy’s size, location, and activity. * Provide reaction time and maneuver space. Base camp and base cluster security assets—forces, sensors, and patrols—should work at a sufficient distance to allow the base camp and base cluster commanders time to review rapidly reported information. This timely review gives the base camp and base cluster commanders the reaction time necessary to order indirect fire to slow the enemy’s rate of advance; maneuver direct-fire elements into place to engage, exploit, and defeat the enemy; and initiate coordination for a response force or TCF if required, based on the threat level. * Orient on the force, area, or facility to be protected. Base camp and base cluster organic, security, and reinforcement forces must be aware of any enemy movement and must reposition their elements accordingly to maintain their position relative to any threats. The force must understand the base camp and base cluster commander’s scheme of protection, including where the security force is in relation to enemy movement. * Perform continuous area security operations. Base camp and base cluster personnel conduct continuous area security operations to gain as much information as possible about the AO and any threats. This can be accomplished through OPs, mounted and dismounted patrols, and remote sensors, such as unmanned aircraft systems deployed to observe dead space. * Maintain threat contact. Once enemy forces are detected, base camp forces must continuously collect information on the enemy’s activities and disposition to assist the base camp or base cluster commander in determining the potential and actual enemy COA and deny the enemy the element of surprise. This requires security forces to maintain continuous visual contact to be able to use direct and indirect fires to influence enemy actions and gain time for the base camp and base cluster commander. Once the base camp security forces make enemy contact, they do not break contact unless the base camp or base cluster commander or a designated security force commander specifically directs it.
3-81
161
Base Camp and Base Cluster Security and Defense E-26. Although not a fundamental of security operations, the use of dispersion is an important technique that commanders should consider. Dispersing units, command posts, equipment, and personnel reduces vulnerability against enemy direct- and indirect-fire threats and CBRN attacks. However, units should be close enough to provide mutual support against enemy ground attacks. Commanders must determine where risk is acceptable. E-27. Base camps and base clusters typically protect their personnel and assets through the application of security activities. Some essential security activities include communications security, cybersecurity, information security, OPSEC, personnel security, and physical security. Of the five security tasks listed in ADP 3-90—screen, guard, cover, area security, and local security—only area security and local security typically apply to base camps and base clusters. Area security preserves the base camp and base cluster commander’s freedom to move reserves, position fire support means, provide for mission control, conduct sustaining activities, and coordinate for reinforcing forces (see chapter 2). Local security provides immediate protection to base camp forces and assets. See ADP 3-37 and ADP 3-90 for additional information on area and local security. BASE CAMP DEFENSE E-28. Defensive operations are operations to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability operations (ADP 3-0). Base defense refers to the local military measures, both normal and emergency, required to nullify or reduce the effectiveness of enemy attacks on, or sabotage of, a base to ensure the maximum capacity of its facilities is available to United States forces (JP 3-10). Successful base camp and base cluster defenses share the following characteristics: disruption; flexibility; maneuver; massing effects; and operations in depth, preparation, and security. The basic defensive tasks are applicable to the area and perimeter of the base camp. See ADP 3-90 for a discussion of these characteristics. Area Defense E-29. Conducting area defense is a defensive task that concentrates on denying enemy forces access to a base camp, base cluster, or surrounding terrain. The focus of the area defense is on retaining terrain where the bulk of the defending force positions itself in mutually supporting, prepared positions. Units maintain their positions and control the terrain between these positions. An area defense capitalizes on the strength inherent in a closely integrated base camp defense. The higher commander may assign subordinate units or tenant organizations the task of conducting an area defense as part of their mission. Subordinate echelons defend within their assigned AOs as part of the larger-echelon operation. See FM 3-90-1 for more information on area defense. Perimeter Defense E-30. The commander can employ perimeter defense as an option when conducting an area defense or in the conduct of base camp and base cluster defense in the echelon support. A perimeter defense is oriented in all directions. The prerequisites for a successful perimeter defense are aggressive patrolling and security operations outside the perimeter. The unit within the perimeter can perform these activities; or another force, such as the territorial defense forces of a host nation, can perform them. The unit can organize a perimeter defense to accomplish a specific mission, such as protecting a fire base. A unit may also form a perimeter when it is located in the friendly echelon support area within the confines of a base camp or base cluster. E-31. A major characteristic of a perimeter defense is a secure inner area, with most of the combat power located on the perimeter. Another characteristic is the ease of access for resupply operations. The commander coordinates direct- and indirect-fire plans to prevent accidentally engaging neighboring friendly units and noncombatants. Normally, the reserve centrally locates to react to a penetration of the perimeter at any point. See FM 3-90-1 for more information on perimeter defense.
3-81
162
Appendix E BASE DEFENSE OPERATIONS CENTER E-32. A base defense operations center is a command and control facility established by the base commander to serve as the focal point for base security and defense (JP 3-10). Other contingency locations may also establish BDOCs as the situation requires. A base camp’s commander provides and exercises base camp defense through a BDOC. Through the BDOC, the base camp commander plans, directs, integrates, coordinates, and controls all base camp defense efforts (see ATP 3-90.20). E-33. The BDOC resembles a typical command post. A command post is a unit headquarters where the commander and staff perform their activities (FM 6-0). Personnel and equipment are arranged to facilitate coordination, the exchange of information, and timely decision making. Well-designed BDOCs integrate command and staff efforts by matching personnel, equipment, information systems, and procedures against their internal layout. (See ADP 6-0 or FM 6-0 for more information on command posts.) The protection functions of a BDOC include the following: * Plan and execute force protection, AT, and physical security operations according to published guidance. * Conduct a protection working group and threat working group. * Ensure that all units within the perimeter conduct active and passive security measures. * Monitor and direct security forces. E-34. The composition of the BDOC depends on the combination of forces involved and may include other Services and multinational, host-nation, and other U.S. agency personnel, depending on the combination of forces located at each base camp. Multi-Service, other agency, host-nation, and multinational representation should be part of the BDOC when elements of their armed forces, police, or paramilitary forces are directly involved in the overall base defense effort, or when they are a major tenant organization. The BDOC normally consists of three primary sections: command, intelligence, and operations. There may be additional sections designated as deemed necessary (see ATP 2-22.2-1). E-35. Similar to a BDOC, the BCOC is a command and control facility that serves as the base cluster commander’s focal point for defense and security of the base cluster (see JP 3-10). The BCOC is established to control several subordinate base camps that may be grouped together in a cluster for mutual support for protection. The base and base cluster commanders also coordinate and integrate security operations with the BCOC as appropriate. Other contingency locations may also need to coordinate with BCOCs as the situation requires. Such coordination normally involves TACON over forces assigned or attached to the base primarily for the purpose of base defense and security. The base commander may also exercise TACON over other forces (such as medical or emergency services) residing on the base for primary purposes other than base defense. For example, when these forces perform functions related to base defense or local security missions as part of the overall base defense plan, they typically fall under TACON of the base commander (see ATP 3-90.20). This TACON relationship may not exist at other contingency locations; the echelon (corps or division) commander should provide guidance in those situations. The BDOC typically conducts 24-hour operations. Basic BDOC functions include the following: * Provide organization for coordinated base camp security. * Prepare plans to implement the commander’s base camp defense guidance. * Monitor assigned, attached, and tenant-unit forces and resources and provide the commander information to aid, allocate, and move forces and materiel to meet base defense requirements. * Inform the base commander of security concerns. * Develop and execute a reconnaissance and surveillance plan to ensure proper security from standoff threats within base camp boundaries, and coordinate with the base camp and base cluster commanders for the area outside the base camp boundary. * Coordinate with the base camp commander or tenant commander to deconflict security activities from combat and stability operations. * Identify and share emergency response and area damage control capabilities, to include medical support, engineering, EOD, and firefighting, as required.
3-81
163
Base Camp and Base Cluster Security and Defense * Evaluate actions to identify operational deficiencies, lessons learned, and best practices. * Develop methods to improve combined operational effectiveness, to include coordinating training and exercising security measures. Base Defense Planning E-36. Base camp defense planning is a methodical process that combines site selection considerations, mission objectives, mitigation strategies, identified security requirements, and protection operations. Early identification of protection requirements is essential to base camp defense planning. Requirements established before construction reduce construction and manpower costs. Security measures established in the planning process are more easily applied than after construction. E-37. The base camp defense plan is necessary for the development and implementation of a comprehensive protection program. The base camp defense plan should focus efforts and resources toward cohesive defense operations. A sample plan template is provided in appendix D. The base defense plan should— * Convey the base camp commander’s intent. * Provide a clear, concise mission statement. * Provide tasks and activities, constraints, and coordinating instructions. * Permit subordinate commanders to prepare supporting plans. * Focus on subordinate activities. * Promote initiative. * Include annexes containing subordinate information not included in the main defense plan. E-38. Base camp defense planning should be conducted using a team approach. Essential members include the base commander, tenant-unit commanders, and the protection team. Base Camp Commander E-39. Base camp commanders are responsible for protection planning and operations and should use all available assets to establish required security levels. Base camp commanders normally exercise TACON for the purpose of base defense over forces assigned or attached to the base. The commander may also exercise TACON over other forces residing in the base for primary purposes other than local base defense when these forces are called on to perform functions related to base camp defense or local security missions as part of the overall base camp defense plan. E-40. Base camp commanders also have direct interest in the security of the area surrounding the base. As such, the commander coordinates base defense efforts with the TCF or host-nation forces providing exterior security, if available. Base camp commanders establish a BDOC to serve as the focal point for protection, security, and defense within the base camp boundary. Through the BDOC, the commander plans, directs, integrates, coordinates, and controls all base camp defense efforts. E-41. Critical to the success of the protection mission is the need for coordination and cooperation among assigned or attached units. These units should build operational relationships based on mutual support. For example, tenant-unit communications equipment may not be compatible with host-unit equipment. In this case, tenant-unit commanders should coordinate with the base commander to ensure compatibility.
3-81
164
Appendix E Tenant-Unit Commanders E-42. Tenant-unit commanders actively participate in base camp defense planning. Tenant units normally provide for their own security and contribute personnel to the protection mission. These assigned or attached forces fall under the base camp commander’s TACON. This relationship may not necessarily exist at all contingency locations. Regardless, tenant-unit commanders should ensure that provided personnel are properly equipped and trained. Key tenant-unit concerns include training, rehearsals, coordination, and competing requirements between security and operational tasks. Tenant-unit commander responsibilities include— * Participating in the preparation and execution of base camp defense plans. * Providing for unit internal security. * Conducting individual and unit training to ensure readiness for assigned defense tasks. * Providing an appropriate share of facilities, equipment, and personnel for the BDOC. * Advising the base camp commander on operational concerns specific to their units. * Sustaining and administering unit forces. * Providing unit requirements for common-user communications systems to the base camp commander’s communications element. Protection Working Group E-43. A working group approach should be used to develop the base defense plan and protection measures and to manage protection operations. To interact efficiently, team members should understand the concepts, roles, and capabilities of other members. A working-group approach facilitates protection plan development, intelligence sharing, and coordination between tenant units. BASE CAMP THREATS E-44. In most cases, base camps are located where the risk of Level III threats have been eliminated or effectively mitigated by the designated AO commander. During large-scale combat operations, base camps often become focal points for bypassed or reconsolidated Level III threats. The support area commander must be prepared to conduct defensive and offensive tasks by deploying the TCF to repel a Level III attack when the threat assessment indicates the possibility of a Level III threat in the support area, regardless of whether the element of decisive action/simultaneous activities is currently dominant. Preparations may involve significant increases in area denial measures; offensive actions; hardening, dispersal, and other protection measures; and immediate reaction to hostile actions. E-45. On initial occupation of the base camp site, friendly forces take offensive actions to identify levels of enemy presence and eliminate enemy threats in the immediate area, if required. Once the area is cleared and the necessary elements of the base camp defense have been established, the base camp commander continues managing area security tasks to provide an early warning and to mitigate the risks of threat elements operating within the base camp AO. The base camp commander and staff identify gaps in security and requirements for additional support or assets. The base camp commander, supported by the staff, coordinates with the AO commander to fill identified capability gaps. E-46. Base camps are purposely designed and constructed to be resistant to enemy attack and to recover quickly so that they can continue to operate. The ability to quickly recover from an enemy attack is enhanced through detailed planning and rehearsals of procedures. Base camps must be prepared to defend in any direction through flexible base camp defense plans that include the use of dedicated initial-response forces positioned to respond to the widest possible range of contingencies.
3-81
165
Base Camp and Base Cluster Security and Defense E-47. The two principal types of attacks that a base camp commander and their staff focus on are categorized as penetrating attacks or standoff attacks. Infiltrated attacks from inside the base camp are likely to occur as well. Screening and vetting local workers are paramount to disrupting the threat’s potential to gain access as a base camp worker or visitor. Hybrid threats will use the difficulties of positive identification of threat actors as threat actors to their advantage, and often these actors will provide signatures similar to friendly or neutral actors, gaining them access to the base camps. PENETRATING ATTACKS E-48. Defending against penetrating attacks relies on a strong perimeter defense that incorporates obstacles and integrated fires from well-protected firing positions. When applying defensive elements to a base camp perimeter, the type and extent of barrier and fires integration may be restricted based on mission and operational variables. Base camps within complex terrain, especially in support of stability tasks, will likely be restricted in the amount and types of obstacles and corresponding fires allowed in the outer security area; this is especially true for indirect fires. E-49. Security forces must be capable of disrupting and delaying the penetration of the base camp perimeter until reinforced by a response force or TCF. Base camp defenders should have tactical mobility with as much personal protection as possible. Security forces must be equipped with reliable and multiple means of communication. They should also have the necessary sensors and devices to execute reconnaissance and surveillance to the limits of the security area. This helps provide adequate detection and early warnings during periods of limited visibility. E-50. Joint fires may be employed to augment the organic direct- and indirect-fire capabilities of the base camp or base cluster. Security force personnel (augmentation and selectively armed personnel) may be directed to secure key facilities within the base camp, such as command posts, ammunition storage areas, and aircraft revetments. They may also support finding, fixing, containing, and defeating any attacks that may penetrate the perimeter. Adequate fire-control measures must be employed to prevent fratricide. STANDOFF ATTACKS E-51. Standoff attackers are typically elusive targets. Level I and Level II threats may rely on blending in with the legitimate populace, only revealing themselves as combatants when they engage in a hostile act. Standoff attacks are mitigated by conducting area security tasks within and beyond the base camp AO to— * Deny hiding places to the enemy. * Disrupt enemy planning, reconnaissance, and organization. * Detect the enemy as it moves into position and posture forces to quickly neutralize detected forces. * Deny enemy anonymity through identity activities. E-52. These preemptive actions rely on timely, accurate, relevant, and predictable intelligence, including human intelligence, within the base camp outer security area and beyond. For imminent threats that originate outside the base AO for which the AO commander is unable to assist, the base camp commander must use organic base camp combat power to counter the threat or, with the permission of the support area commander, assume the risk of enemy standoff attacks.
3-81
166
Appendix E BASE CAMP SECURITY FORCES E-53. Within a support area, various types of security forces are assigned to secure the security area and LOCs. These include dedicated base camp and base cluster security forces, LOC security forces, and TCFs. A response force (normally military police) is a highly mobile, dedicated security force with the capability to defeat Level I and II threats and delay Level III threats within a support area. All base camp and base cluster units and/or detachments must maintain a readiness posture. Important rehearsals include commitment of base camp response forces, commitment of cluster response forces, commitment of the support area TCF, battle handover, and fire plan rehearsals. E-54. A base camp may or may not have a force dedicated to its security and defense. Therefore, it is important for base camp commanders to be aware of the assets available for base camp security and defense. When there is not a dedicated security force, the base camp commander requires TACON of tenant-unit personnel to augment security and defense of the base camp. Base camp security and defense is an economy- of-force mission, so it is imperative that all organic, tenant, and transient forces residing on the base camp provide assistance to the base camp commander to fulfill these requirements as necessary. See ATP 3-37.10 for additional information on security forces. BASE CAMP DEFENSE PLAN E-55. The base camp commander plans, directs, integrates, coordinates, and controls all base camp defense efforts. The commander also coordinates and integrates security operations with the BCOC as appropriate. Such coordination normally involves TACON over forces assigned or attached to the base primarily for the purpose of local base camp defense. The base commander may also exercise TACON over other forces residing on the base for primary purposes other than local base camp defense (such as medical). For example, when these forces perform functions related to base defense or local security missions as part of the overall base camp defense plan, they fall under TACON of the base camp commander. TACON may be authorized at the first common higher headquarters. Figure E-2 provides a sample format for a base camp defense plan.
3-81
167
Base Camp and Base Cluster Security and Defense [CLASSIFICATION] Place the classification at the top and bottom of every page of the OPLAN or OPORD. Place the classification marking Top Secret, Secret, or Confidential in parentheses at the front of each paragraph and subparagraph. Refer to AR 380-5 for classification and release marking instructions. Note. Omit areas that do not apply. Copy ## of ## copies Issuing headquarters Place of issue Date-time group of signature Message reference number The first line of the heading is the copy number that is assigned by the issuing headquarters. Maintain a log of specific copies issued to addressees. The second line is the official designation of the issuing headquarters (for example, 1st Infantry Division). The third line is the place of issue. It may be a code name, postal designation, or geographic location. The fourth line is the date or date-time group that the plan or order was signed or issued and becomes effective unless specified otherwise in the coordinating instructions. The fifth line is a headquarters internal control number assigned to all plans and orders according to unit SOPs. OPLAN/OPORD [number] [(code name)] [(classification of title)] Number plans and orders consecutively by calendar year. Include code name, if any. References: List documents (JP 3-10 and ATP 3-37.10) that are essential to understanding the OPLAN or OPORD. List references concerning a specific function in the appropriate attachments. (a)List maps and charts first. Map entries include the series number, country, sheet names or numbers, edition, and scale. (b)List other references in subparagraphs labeled as shown. Note. Doctrinal references for this attachment include JP 3-10, ADP 3-37, FM 3-81, FM 3-90-1, and ATP 3-90.20. Time Zone Used Throughout the OPLAN/OPORD: State the time zone used in the AOs during execution. When the OPLAN or OPORD applies to units in different time zones, use ZULU time. Task Organization: Describe the organization of forces available to the issuing headquarters and their command and support relationships. Refer to Annex A (Task Organization) if long or complicated. The organization for defense should clearly specify the base units providing the forces for each defense element. Attached or transient units and the names of commanders should be included. The defense requirements of U.S., HNs, TCNs, and other civilian organizations quartered on the base also should be identified. Their capabilities to assist in the defense are determined and integrated into the base defense plan.) 1.Situation. The situation paragraph describes the conditions of the operational environment that impact operations in the following subparagraphs (Under the following headings, describe the environment in which defense of the base will be conducted, in sufficient detail for subordinate commanders to grasp the way in which their tasks support the larger mission): a.Area of Interest. Describe the area of interest. Refer to Annex B (Intelligence) as required. [page number] [CLASSIFICATION] Figure E-2. Example format for a base camp defense plan
3-81
168
Appendix E [CLASSIFICATION] b.Area of Operations. Describe the AO. Refer to the appropriate map by its subparagraph under references; for example, “Map, reference (b).” Refer to appendix 2 (Operation Overlay) to Annex C (Operations) as required. (1)Terrain. Describe the aspects of terrain that impact operations. Refer to Annex B (Intelligence) as required. (2)Weather. Describe the aspects of weather that impact operations. Refer to Annex B (Intelligence) as required. (Place the classification and title of the OPLAN or OPORD and the issuing headquarters at the top of the second and any subsequent pages of the base plan or order.) c.Enemy Forces. Refer to Annex B (Intelligence). (Describe the threat to the base, to include the composition, disposition, location, movements, estimated strengths, including terrorist organizations and reconnaissance elements.) d.Friendly Forces. Refer to base order, Annex A (Task Organization), and Annex C (Operations). (List information on friendly forces not covered by this OPORD, to include the mission of the next higher headquarters and adjacent bases as well as units not under base command whose actions will affect or assist the defense of the base. These units may include security forces, fire support, special operations forces, cyberspace operations forces, engineers, CBRN units, military police, EOD, HN military or police organizations, and government and nongovernmental organizations of both the U.S. and HN.) e.Interagency, Intergovernmental, and Nongovernmental Organizations. Identify and describe other organizations in the AO that may impact physical security or the implementation of physical security procedures. f.Civil Considerations. Describe the critical aspects of the civil situation that impact base defense. Refer to Annex K (Civil Affairs Operations) as required. View civil considerations through a base defense perspective by using operation and mission variables. g.Attachments and Detachments. If pertinent, list the units or assets that are attached to or are detached from the issuing headquarters. State when each attachment or detachment is effective (for example, on order or on commitment of the reserve) if different from the effective time of the base order. Do not repeat information that is already listed in Annex A (Task Organization). h.Assumptions. List the assumptions that are specific to base defense which support the OPORD development. 2.Mission. Provide a clear concise statement of the base commander’s defense mission. 3.Execution. a.Commander’s Intent. (The commander discusses how the development of the defense is envisioned and establishes overall command priorities. This subparagraph should provide subordinates sufficient guidance to act upon if contact is lost or disrupted.) b.Concept of Operation. (Briefly describe how the commander believes the overall operation should progress. Define the areas, buildings, and other facilities considered critical, and establish priorities for their protection.) (1)Phasing. (Set forth, if necessary, the phases of the operation as they are anticipated by the commander.) (2)Scheme of Maneuver. (Describe the organization of the ground security forces, the assignment of elements to counter standoff and penetrating attacks to include the base boundary patrol concept of operation and establishment of a defense with primary, alternate, and supplementary defensive positions, as well as reaction force responsibilities. Describe the purpose of counterattacks and set work priorities.) (3)Scheme of Fires. (State plans for employing AMD and supporting fires, such as mortars and other indirect-fire assets, smoke, and aviation support.) c.Tasks for Subordinate Elements. (If not previously described, this and succeeding subparagraphs should set forth the specific tasks for each subordinate defense element listed in the Task Organization.) d.Reserve. (The next-to-last subparagraph of paragraph 3 contains instructions to the base’s mobile reserve.) Figure E-2. Example format for a base camp defense plan (continued)
3-81
169
Base Camp and Base Cluster Security and Defense [CLASSIFICATION] e.Coordinating Instructions. (Always the last subparagraph of paragraph 3. Contains those instructions applicable to two or more elements or to the command as a whole.) (1)Control Measures. (Define and establish restrictions on access to and movement into critical areas. These restrictions can be categorized as personnel, materiel, and vehicles. Security measures also may be outlined here.) (a)Base Boundary. (Define and establish the base boundary as coordinated with the area commander. Include a description of plans to cope with enemy standoff attacks.) (b)Personnel Access. (Establish control pertinent to each area or structure.) 1.Authority. (Give authority for access.) 2.Criteria. (Give access criteria for unit contractor personnel and local police and armed forces.) 3.Identification and Control a.(Describe the system to be used in each area. If a badge system is used, give a complete description to disseminate requirements for identification and control of personnel who conduct business on the base, if applicable.) b.(Describe how the system applies to unit personnel, visitors to restricted or administrative areas, vendors, contractor personnel, and maintenance and support personnel – if applicable.) (c)Materiel Control Procedures. 1.Incoming. a.(List requirements for admission of materiel and supplies.) b.(List special controls on delivery of supplies to restricted areas.) 2.Outgoing. a.(List required documentation.) b.(List special controls on delivery of supplies from restricted areas.) c.(List classified shipments.) (d)Vehicle Control 1.(State policy on registration of vehicles.) 2.(State policy on search of vehicles.) 3.(State policy on parking.) 4.(State policy on abandoned vehicles.) 5.(List controls for entering restricted areas.) (e)Train Control 1.(State policy on search of railcars.) 2.(State policy on securing railcars.) 3.(State policy on entry and exit of trains.) (2)Security Aids. (Indicate the manner in which the following security aids will be implemented on the base.) (a)Protective Barriers 1.Definition. 2.Clear Zones. a.Criteria. b.Maintenance. 3.Signs. a.Types. b.Posting. Figure E-2. Example format for a base camp defense plan (continued)
3-81
170
Appendix E [CLASSIFICATION] 4.Gates. a.Hours of operation b.Security requirements c.Lock security. d.Protective lighting system. (Use and control, inspection, direction, actions during power failures, emergency lighting.) (b)Intrusion Detection System 1.Types and locations. 2.Security classifications. 3.Maintenance. 4.Operation. 5.Probability of Detection. a.Limitations. b.Compensating measures. c.Redundant capabilities. (c)Protection of Classified Information 1.Security containers. 2.Personnel access to areas containing classified material. 3.Vetting and verification of clearance. 4.Classified material handling procedures. 5.Emergency destruction plan. (3)Interior Guard Procedures. (Include general instructions that apply to all interior guard personnel, fixed and mobile. Attach detailed instructions such as special orders and standing operating procedures as annexes. Ensure that procedures include randomness.) (a)Composition and organization. (Note: During security and support operations, the interior guard may be a contracted civilian security force.) (b)Tour of duty. (c)Essential posts and routes. (d)Weapons and equipment. (e)Training. (f)Military working dogs. (g)Method of challenge. (h)Mobile security force. 1.Composition. 2.Mission. 3.Weapons and equipment. 4.Location. 5.Deployment concept. (4)Rules of engagement. (Directives issued by competent military authority that delineate the circumstances and limitations under which U.S. forces will initiate and/or continue combat engagement with other forces encountered.) [page number] [CLASSIFICATION] Figure E-2. Example format for a base camp defense plan (continued)
3-81
171
Base Camp and Base Cluster Security and Defense [CLASSIFICATION] (5)Contingency Plans. (Indicate actions in response to various emergency situations. List as annexes any detailed plans, such as combating terrorism, responding to bomb threats, active shooter response, hostage situations, emergency destruction of classified information, natural disasters, and firefighting.) (a)Individual actions. (b)MSF actions. (6)Security Alert Status. (7)Air Surveillance. (8)Noncombatant Evacuation OPLANs. (9)Coordination with HN or Adjacent Base Plans. (10)Measures for Coordination with Response Force and Tactical Combat. (11)Procedures for Update of This OPORD. (If the OPORD is not effective upon receipt, indicate when it will become effective.) 4.Sustainment. Identify priorities of sustainment for physical security key tasks, and specify additional instructions as required. Refer to Annex F (Sustainment) as required. 5.Command and Signal. a.Command. (1)Location of the Commander. State the locations of the provost marshal and military police commanders within the AO. (2)Liaison Requirements. State the physical security liaison requirements that are not covered in SOPs. b.Control. (1)Command Posts. Describe the employment of command posts within the AO, including the location of each command post and its time of opening and closing. (2)Reports. List police operations-specific reports that are not covered in SOPs. Refer to Annex R (Reports) as required. c.Signal. Address police operations-specific communications requirements. Refer to Annex H (Signal) as required. ACKNOWLEDGE: Include only if the attachment is distributed separately from the base order. [Commander’s last name] [Commander’s rank] The commander or authorized representative signs the original copy of the attachment. If the representative signs the original, add the phrase “For the Commander.” The signed copy is the historical copy and remains in the headquarter files. DISTRIBUTION: Show only if distributed separately from the base order or higher-level attachments. [page number] [CLASSIFICATION] Legend: AMD air missile defense JP joint publication AO area of operations MSF mobile security force AR Army regulation OPLAN operation plan ATP Army techniques publication OPORD operation order CBRN chemical, biological, radiological, and SOP standard operating procedure nuclear TCN third country nationals EOD explosive ordnance disposal U.S. United States FM field manual ZULU time zone indicator for Universal Time HN host nation Figure E-2. Example format for a base camp defense plan (continued)
3-81
173
Glossary The glossary lists acronyms and terms with Army or joint definitions. Where Army and joint definitions differ, (Army) precedes the definitions. SECTION I – ACRONYMS AND ABBREVIATIONS AA assembly area ADA air defense artillery ADP Army doctrine publication AHS Army Health System AO area of operations AMD air missle defense AR Army regulation ARFOR Army forces ASCOPE areas, structures, capabilities, organizations, people, and events ASR alternate supply route AT antiterrorism ATP Army techniques publication attn attention BCT brigade combat team BCOC base cluster operations center BDOC base defense operations center BSB brigade support battalion CA civil affairs CARVER criticality, accessibility, recuperability, vulnerability, effect, and recognizability CBRN chemical, biological, radiological, and nuclear CBRNE chemical, biological, radiologial, nuclear, and explosives CERCLA Comprehensive Environmental Response, Compensation, and Liability Act COA course of action DA Department of the Army DC dislocated civilian DOD Department of Defense DODD Department of Defense directive DODI Department of Defense instruction DSCA defense support of civil authorities EAB echelons above brigade EOD explosive ordnance disposal F&Es Fire and Emergency Services
3-81
174
Glossary FHP force health protection FM field manual FY fiscal year G-1 assistant chief of staff, personnel G-9 assistant chief of staff, civil affairs operations HR human resources HSC headquarters support company HSS health service support IPB intelligence preparation of the battlespace J-3 operations directorate of a joint staff JP joint publication JSA joint security area LOC line of communications MDMP military decisionmaking process MEB maneuver enhancement brigade METT-TC mission, enemy, terrain and weather, troops and support available, time available, and civil considerations MO Missouri MOE measure of effectiveness MOP measure of performance MSCoE Maneuver Support Center of Excellence MSHARPP mission, symbolism, history, accessibility, recognizability, population, and proximity MSR main supply route NO. number OPCON operational control OPORD operation order OPLAN operation plan OPSEC operations security PMESII-PT political, military, economic, social, information, infrastructure, physical environment, and time (operational variables) PIR priority intelligence requirement S-1 battalion or brigade manpower and personnel staff officer S-2 battalion or brigade intelligence staff officer S-3 battalion or brigade operations staff officer S-4 battalion or brigade logistics staff officer S-5 battalion or brigade plans staff officer S-6 battalion or brigade signal staff officer S-9 battalion or brigade civil affairs operations staff officer SHORAD short-range air defense SPO support operations TACON tactical control
3-81
175
Glossary TC training circular TCF tactical combat force UMT unit ministry team U.S. United States USC United States Code SECTION II – TERMS This section contains no entries.
3-81
177
References All websites accessed on 27 August 2021. REQUIRED PUBLICATIONS These documents must be available to intended users of this publication. DOD Dictionary of Military and Associated Terms. August 2021. FM 1-02.1. Operational Terms. 9 March 2021. FM 1-02.2. Military Symbols. 10 November 2020. RELATED PUBLICATIONS These documents contain relevant supplemental information. DEPARTMENT OF DEFENSE AND JOINT PUBLICATIONS Most Department of Defense publications are available online at https://www.esd.whs.mil/DD/. Most joint publications are available online at http://www.jcs.mil/doctrine/. DODD 2000.13. Civil Affairs. 11 March 2014. DODD 3025.18. Defense Support of Civil Authorities (DSCA). 29 December 2010. DODD 5100.01. Functions of the Department of Defense and its Major Components. 21 December 2010. DODI O-2000.16 Volume I. (U) DoD Antiterrorism Program Implementation: DoD Antiterrorism Standards. 17 November 2016. DODI O-2000.22. Designation and Physical Protection of DoD High-Risk Personnel. 19 June 2014. DODI 3025.21. Defense Support of Civilian Law Enforcement Agencies. 27 February 2013. DODI 6055.06. DoD Fire and Emergency Services (F&Es) Program. 3 October 2019. JP 2-01.2. (U) Counterintelligence and Human Intelligence in Joint Operations (on SIPRNET only). 6 April 2016. JP 2-0. Joint Intelligence. 22 October 2013. JP 2-01.3. Joint Intelligence Preparation of the Operational Environment. 21 May 2014. JP 2-03. Geospatial Intelligence in Joint Operations. 5 July 2017. JP 3-0. Joint Operations. 17 January 2017. JP 3-01. Countering Air and Missile Threats. 21 April 2017. JP 3-10. Joint Security Operations in Theater. 25 July 2019. JP 3-11. Operations in Chemical, Biological, Radiological, and Nuclear Environments. 29 October 2018. JP 3-13.3. Operations Security. 6 January 2016. JP 3-26. Joint Combating Terrorism. 30 July 2020. JP 3-28. Defense Support of Civil Authorities. 29 October 2018. JP 3-34. Joint Engineer Operations. 6 January 2016. JP 3-36. Joint Air Mobility and Sealift Operations. 4 January 2021. JP 3-52. Joint Airspace Control. 13 November 2014. JP 3-41. Chemical, Biological, Radiological, and Nuclear Response. 9 September 2016.
3-81
178
References JP 4-0. Joint Logistics. 4 February 2019. JP 4-01.5. Joint Terminal Operations. 2 November 2015. ARMY PUBLICATIONS Unless otherwise indicated, Army publications are available online: https://armypubs.army.mil/. ADP 1-01. Doctrine Primer. 31 July 2019. ADP 3-0. Operations. 31 July 2019. ADP 3-07. Stability. 31 July 2019. ADP 3-28. Defense Support of Civil Authorities. 31 July 2019. ADP 3-37. Protection. 31 July 2019. ADP 3-90. Offense and Defense. 31 July 2019. ADP 4-0. Sustainment. 31 July 2019. ADP 5-0. The Operations Process. 31 July 2019. ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019. AR 380-5. Army Information Security Program. 22 October 2019. ATP 1-05.1. Religious Support and the Operations Process. 31 July 2018. ATP 1-05.3. Religious Support and External Advisement. 31 January 2019. ATP 1-05.4. Religious Support and Internal Advisement. 23 March 2017. ATP 3-11.41/MCRP 3-37.2C/NTTP 3-11.24/AFTTP 3-2.37. Multi-Service Tactics, Techniques, and Procedures for Chemical, Biological, Radiological, and Nuclear Consequence Management Operations. 30 July 2015. ATP 2-22.2-1. Counterintelligence Volume I: Investigations, Analysis and Production, and Technical Services and Support Activities. 11 December 2015. ATP 2-22.2-2. Counterintelligence Volume II: Operations and Collections Activities. 22 December 2016. ATP 3-21.20. Infantry Battalion. 28 December 2017. ATP 3-09.12. Field Artillery Targeting Acquisition. 24 July 2015. ATP 3-13.3. Army Operations Security for Division and Below. 16 July 2019. ATP 3-34.5. Environmental Considerations. 10 August 2015. ATP 3-34.40. General Engineering. 25 February 2015. ATP 3-34.80. Geospatial Engineering. 22 February 2017. ATP 3-37.2. Antiterrorism. 19 July 2021. ATP 3-37.10. Base Camps. 27 January 2017. ATP 3-37.34. Survivability Operations. 16 April 2018. ATP 3-39.10. Police Operations. 24 August 2021. ATP 3-39.30. Security and Mobility Support. 21 May 2020. ATP 3-39.35. Protective Services. 31 May 2013. ATP 3-39.32. Physical Security. 30 April 2014. ATP 3-57.10. Civil Affairs Support to Populace and Resource Control. 6 August 2013. ATP 3-57.70. Civil-Military Operations Center. 5 May 2014. ATP 3-90.4. Combined Arms Mobility. 8 March 2016. ATP 3-90.8/MCWP 3-17.5. Combined Arms Countermobility Operations. 17 September 2014. ATP 3-90.20. Regional Support Group. 16 January 2018. ATP 3-91. Division Operations. 17 October 2014. ATP 4-01.45/MCRP 3-40F.7/NTTP 4-01.6/AFTTP 3-2.58. Multi-Services Tactics, Techniques, and Procedures for Tactical Convoy Operations. 26 March 2021.
3-81
179
References ATP 4-10/MCRP 4-11H/NTTP 4-09.1/AFMAN 10-409-O. Multi-Service Tactics, Techniques, and Procedures for Operational Contract Support. 18 February 2016. ATP 4-14. Expeditionary Railway Center Operations. 29 May 2014. ATP 4-16. Movement Control. 5 April 2013. ATP 4-32.1. Explosive Ordnance Disposal (EOD) Group and Battalion Headquarters Operations. 24 January 2017. ATP 4-32.3. Explosive Ordnance Disposal (EOD) Company, Platoon, and Team Operations. 1 February 2017. ATP 4-42. Material Management, Supply, and Field Services Operations. 2 November 2020. ATP 5-19. Risk Management. 14 April 2014. FM 1-05. Religious Support. 21 January 2019. FM 3-0. Operations. 6 October 2017. FM 3-01. U.S. Army Air and Missile Defense Operations. 22 December 2020. FM 3-04. Army Aviation. 6 April 2020. FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020. FM 3-11. Chemical, Biological, Radiological, and Nuclear Operations. 23 May 2019. FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021. FM 3-22. Army Support to Security Cooperation. 22 January 2013. FM 3-34. Engineer Operations. 18 December 2020. FM 3-39. Military Police Operations. 9 April 2019. FM 3-50. Army Personnel Recovery. 2 September 2014. FM 3-52. Airspace Control. 20 October 2016. FM 3-55. Information Collection. 3 May 2013. FM 3-57. Civil Affairs Operations. 28 July 2021. FM 3-63. Detainee Operations. 2 January 2020. FM 3-90-1. Offense and Defense Volume I. 22 March 2013. FM 3-94. Armies, Corps, and Division Operations. 23 July 2021. FM 4-0. Sustainment Operations. 31 July 2019. FM 4-02. Army Health System. 17 November 2020. FM 4-30. Ordnance Operations. 1 April 2014. FM 6-0. Commander and Staff Organization and Operations. 5 May 2014. FM 6-02. Signal Support to Operations. 13 September 2019. FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019. OTHER PUBLICATIONS These publications are available at http://uscode.house.gov/. 10 USC. Armed Forces. 14 USC. Coast Guard. 22 USC. Foreign Relations and Intercourse. 32 USC. National Guard. 42 USC. The Public Health and Welfare. Comprehensive Environmental Response, Compensation, and Liability Act. https://www.epa.gov/enforcement/comprehensive-environmental-response-compensation- and-liability-act-cercla-and-federal.
3-81
180
References WEBSITES Occupational Safety and Health Administration Standard 1910.120. Hazardous Waste Operations and Emergency Response. https://www.osha.gov/laws-regs/interlinking/standards/1910.120 accessed on 17 August 2021. Posse Comitatus Act of 1878 (18 USC 1385. https://www.govinfo.gov/app/details/STATUTE- 75/STATUTE-75-Pg195-2 accessed on 1 September 2021. Standard for Competence of Responders to Hazardous Materials/Weapons of Mass Destruction Incidents. https://www.nfpa.org/codes-and-standards/all-codes-and-standards/list-of-codes- and-standards/detail?code=472 accessed on 17 August 2021. PRESCRIBED FORMS This section contains no entries. REFERENCED FORMS Unless otherwise indicated, DA forms are available on the Army Publishing Directorate website at https://armypubs.army.mil/. DA Form 2028. Recommended Changes to Publications and Blank Forms. DA Form 1156. Casualty Feeder Card. RECOMMANDED READINGS ADP 2-0. Intelligence. 31 July 2019. ADP 3-19. Fires. 31 July 2019. ADP 7-0. Training. 31 July 2019. ADRP 1-03. The Army Universal Task List. 2 October 2015. AR 525-13. Antiterrorism. 3 December 2019. ATP 3-28.1/MCRP 3-36.2/NTTP 3-57.2/AFTTP 3-2.67/CGTTP 3-57.1. Multi-Service Tactics Techniques, and Procedures for Defense Support of Civil Authorities (DSCA). 11 February 2021. ATP 3-53.2. Military Information in Conventional Operations. 7 August 2015. ATP 3-57.60. Civil Affairs Planning. 27 April 2014. ATP 3-60. Targeting. 7 May 2015. ATP 3-92. Corps Operations. 7 April 2016. ATP 3-93. Theater Army Operations. 27 August 2021. ATP 4-41. Army Field Feeding and Class I Operations. 31 December 2015. ATP 4-45. Force Provider Operations. 24 November 2014. ATP 4-93. Sustainment Brigade. 11 April 2016. ATP 4-98. Army Field Support Brigade. 30 June 2021. Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and Federal Facilities. https://www.epa.gov/enforcement/comprehensive-environmental-response- compensation-and-liability-act-cercla-and-federal, accessed on 17 August 2021. FM 1-0. Human Resources Support. 25 August 2021. FM 1-06. Financial Management Operations. 15 April 2014. FM 4-02. Army Health System. 17 November 2020. ATP 4-33. Maintenance Operations. 9 July 2019. FM 4-40. Quarter Master Operations. 22 October 2013. JP 1. Doctrine for the Armed Forces of the United States. 25 March 2013. JP 3-13. Information Operations. 27 November 2012.
3-81
181
Index Entries are by paragraph number. division. 1-12 A P air and missile defense. A-54 E personnel recovery. A-54 analysis. 4-15 EOD. A-54 police intelligence. 2-30, 4-15 antiterrorism. A-54 police operations. 2-29 F area security. A-7 priorities. C-31 force health protection. 5-49 C freedom of movement. 2-30 R CBRN. A-54 railheads and terminals H civil control. 2-30, 4-15 security. C-23 higher-echelon headquarters. combat power. 1-72, A-9 1-12 reconnaissance. 1-48 combined arms. 1-48, 4-61 reconnaissance and surveillance. L 4-16 convoy security. 4-62 law enforcement. 2-30, 4-15 corps. 1-12, 1-15 S countermobility operations. M security. 2-30, 1-48 4-92 main command post. 2-7 security operations. C-6 counterreconnaissance. C-7 military police disciplines. 2-29 stability. 1-13, 1-44 critical asset list. A-54 mission variables. 1-55, 1-59 support area. C-22 critical asset security. A-7 mobility considerations. C-5 surveillance. 1-48 cyberspace. A-54 movement control. C-5 sustainment. 5-1, 5-14 D N T defended asset list. A-54 nonlethal. D-2, 2-28 tactical command post. 2-6 detainee operations. 2-29 O theater. 1-12 detention. 2-30 offensive tasks. 1-44 U detention and resettlement. operational area security. 4-29 U.S. military prisoners. 2-29 2-29 operational variables. 1-54 disciplines. 2-28, 2-29, D-2 W operations security. A-7 military police disciplines. warfighting function. 5-1 2-29
3-81
183
FM 3-81 09 November 2021 By Order of the Secretary of the Army: JAMES C. MCCONVILLE General, United States Army Chief of Staff Official: MARK F. AVERILL Acting Administrative Assistant to the Secretary of the Army 2131202 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve. To be distributed in
6-99
1
FM 6-99 U.S. ARMY REPORT AND MESSAGE FORMATS MAY 2021 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 6-99, dated 19 August 2013.
6-99
2
This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil/) and the Central Army Registry site
6-99
3
*FM 6-99 Field Manual Headquarters No. 6-99 Department of the Army Washington, D.C., 17 May 2021 U.S. Army Report and Message Formats Contents Page PREFACE....................................................................................................................ix INTRODUCTION .........................................................................................................xi Chapter 1 INSTRUCTIONS ........................................................................................................ 1-1 Report and Message Formats ................................................................................... 1-1 Message Organization ............................................................................................... 1-1 Chapter 2 HOW TO USE THIS MANUAL.................................................................................. 2-1 Manual Organization ................................................................................................. 2-1 Report Formats Numbering System .......................................................................... 2-1 General Instructions .................................................................................................. 2-1 Chapter 3 VARIABLE MESSAGE FORMAT ............................................................................. 3-1 Variable Message Format Explanation ..................................................................... 3-1 Message Standard Functional Areas ........................................................................ 3-1 Variable Message Format Development ................................................................... 3-2 Appendix A VOICE MESSAGE FORMAT TEMPLATES ............................................................ A-1 Accident Report/Serious Incident Report [SIR] .........................................................A -2 Acknowledge Message [AKNLDG] ............................................................................A -4 Adversary Message Spot Report [ADMSSPTREP] .................................................. A-5 Air Defense Command Message [AIRDEFCOM] ......................................................A -6 Air Mission Request Status/Tasking [REQSTATASK] ..............................................A -7 Air Support Request [AIRSUPREQ] ..........................................................................A -8 Airlift Request [AIRLIFTREQ] ..................................................................................A-10 Airspace Coordinating Measures Request [ACMREQ] ...........................................A-12 Airspace Control Order [ACO] .................................................................................A-13 Ammunition Fire Unit-Ammunition Status [AFU.AMS] ............................................A-14 Ammunition Fire Unit-Ammunition Supply Rate [AFU.ASR] ...................................A-15 Ammunition Fire Unit-Deployment Command [AFU.DCMD] ...................................A-16 Ammunition Fire Unit-Fire Status [AFU.FUS] ..........................................................A-18 Ammunition Fire Unit-Firing Site Data [AFU.FSD] ..................................................A-20 Ammunition Fire Unit-Mission Fired Report [AFU.MFR] .........................................A-21 Artillery Target Intelligence-Artillery Target Criteria [ATI.TCRIT] ............................A-23 Artillery Target Intelligence-Artillery Target Report [ATI.ATR] ................................A-24 Asset/Multiple Asset Status Report [ASTSTATREP] ..............................................A-26 Aviation (Army Rotary Wing) Mission/Support Request [AVIAREQ] ......................A-27 Basic Wind Data Message [BWD] ...........................................................................A-28 Battle Damage Assessment Report [BDAREP PHASE 1] ......................................A-29 DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited. *This publication supersedes FM 6-99, dated 19 August 2013.
6-99
4
Contents Bed Availability and Element Status [BEDAVAIL] .................................................. A-31 Bed Designations [BEDDESIG] .............................................................................. A-33 Bed Request [BEDREQ] ......................................................................................... A-35 Blood Shipment Report [BLDSHIPREP] ................................................................. A-37 Bridge Report [BRIDGEREP] .................................................................................. A-39 Bulk Petroleum Allocation [POLALOT] ................................................................... A-40 Bulk Petroleum Contingency Report [REPOL] ....................................................... A-41 Bulk Petroleum Requirements Forecast [POLRQMT] ............................................ A-42 Bulk Class III Request/Forecast [BKLIIIREQ] ......................................................... A-43 Casualty Report [CASREP] .................................................................................... A-44 CBRN 1CHEM/BIO/RAD/NUC Report [CBRN 1] ................................................... A-45 CBRN 2 CHEM/BIO/RAD/NUC Report [CBRN 2] .................................................. A-47 CBRN 3 CHEM/BIO/RAD/NUC Report [CBRN 3] .................................................. A-48 CBRN 4 CHEM/BIO/RAD/NUC Report [CBRN 4] .................................................. A-50 CBRN 5 CHEM/BIO/RAD/NUC Report [CBRN 5] .................................................. A-51 CBRN 6 CHEM/BIO/RAD/NUC Report [CBRN 6] .................................................. A-52 CBRN Hazard Warning Message [CBRN HAZWARN] ........................................... A-53 CBRN Situation Report [CBRN SITREP] ................................................................ A-54 Cemetery Status [CEMSTAT] ................................................................................. A-55 Chemical Downwind Message [CDM] ..................................................................... A-57 Close Air Support Summary [CASSUM] ................................................................. A-59 Commander’s Situation Report [SITREP] ............................................................... A-60 Computer Network Attack [COMNETATK] ............................................................. A-63 Crew Manning Report [CREWMNQREP] ............................................................... A-64 Crossing Report [CROSSREP] ............................................................................... A-65 Cyber Effects Request Format [CERF] ................................................................... A-66 Cyberspace Operations Mission Request Status/Tasking [CYOPREQSTATSK] .. A-68 Daily Blood Report [DBLDREP] .............................................................................. A-69 Direct Support Unit Report [DIRSPTREP] .............................................................. A-70 Effective Downwind Message [EDM] ...................................................................... A-71 Electronic Attack Data Message [EADAT] .............................................................. A-72 Electronic Warfare Frequency Deconfliction Message [EWDECONFLICT] ........... A-73 Electronic Warfare Mission Summary [EWMSNSUM] ............................................ A-74 Electronic Warfare Requesting/Tasking Message [EWRTM] ................................. A-76 Enemy/Friendly/Unit Minefield/Obstacle Report [MINOBREP] ............................... A-79 Explosive Ordnance Disposal Support [EODSPT] ................................................. A-81 Fire Mission-Beacon Location [FM.BEALOC] ......................................................... A-83 Fire Mission-Request To Fire [FM.RF] .................................................................... A-84 Fire Planning-Compute A Fire Plan [FP.COMPFP] ................................................ A-85 Fire Planning-Fire Plan Executive Orders [FP.FPO] .............................................. A-86 Fire Planning-Fire Plan Target List [FP.FPT] .......................................................... A-87 Fire Planning-Reserve Fire Unit [FP.RESFU] ......................................................... A-88 Fire Support Element-Commander’s Criteria [FSE.CRITER] ................................. A-89 Fire Support Element-Friendly Unit Location [FSE.FRD] ....................................... A-90 Flight Control Information [FLTCONTINFO] ........................................................... A-91 Fragmentary Order [FRAGORD] ............................................................................ A-92 Friendly Nuclear Strike Warning [STRIKWARN] .................................................... A-93 General Administrative Message [GENADMIN] ..................................................... A-94 Handover Message [HANDOVER] ......................................................................... A-95 Highway Situation Report [HWYSITREP] ............................................................... A-97 Human Remains Search And Recovery Status Report [REMAINSARSTAT] ........ A-98 Intelligence Report [INTREP] .................................................................................. A-99 Intelligence Summary [INTSUM] ........................................................................... A-100 Isolated Soldier Guidance [ISG] ............................................................................ A-102 Isolated Soldier Guidance Execution Report [ISGX] ............................................ A-104
6-99
5
Contents Logistics Resupply Request [LOGRESREP] ........................................................ A-105 Logistics Status Report [LOGSTAT] ..................................................................... A-106 Mail Distribution Scheme Change [MAILDISTCH] ............................................... A-108 Maintenance Support Request [MAINTSPTREQ] ................................................ A-109 Maintenance Support Response [MAINTSPTRES] ............................................. A-110 Major Ammunition Malfunction-Initial Report [AMMOMALFUNCREP] ................ A-111 Meaconing, Intrusion, Jamming, and Interface (MIJI) Feeder Report [MIJIFEEDER] ................................................................................................ A-112 Media Contact Report [MEDIACOTREP] ............................................................. A-113 9-LINE Medical Evacuation Request [MEDEVAC] ............................................... A-114 Medical Situation Report [MEDSITREP] .............................................................. A-116 Medical Status Report [MEDSTAT] ...................................................................... A-117 Message, Audience, Reaction, Carrier, Origin Report [MARCOREP] ................. A-118 Message Correction or Cancellation [MSGCORRCAXN] .................................... A-120 Meteorological-Computer Message [MET.CM] .................................................... A-121 Meteorological-Fallout Message [MET.CF] .......................................................... A-122 Meteorological-Target Acquisition Message [MET.TA] ........................................ A-123 Military Information Support Operations Report [MISOREP] ............................... A-124 Military Postal Facility Request [POSTREQ] ........................................................ A-125 Missile Intercept Report [MIR] .............................................................................. A-126 Modification-Attack Criteria [MOD.ATTACK] ........................................................ A-127 Modification-Attack Exclude Criteria [MOD.XCLUDE] ......................................... A-128 NMC Summary Report [NMC] .............................................................................. A-129 Operation Order [OPORD] ................................................................................... A-130 Operation Plan Change [PLANORDCHG] ........................................................... A-133 Operation Report [OPREP] .................................................................................. A-134 Operations Summary [OPSUM] ........................................................................... A-135 Patrol Report [PATROLREP]................................................................................ A-136 Personnel Recovery Incident Report [PRIR] ........................................................ A-137 Personnel Recovery Request [PRREQ] ............................................................... A-138 Personnel Recovery Situation Summary Report [PRSIT] .................................... A-139 Personnel Status Report [PERSTAT] ................................................................... A-140 Preliminary Technical Report [PRETECHREP].................................................... A-142 Psychological Action Report [PSYACTREP] ........................................................ A-143 Public Affairs Operation Report [PUBAFFOPSREP] ........................................... A-144 Radar Status Report [RADSTAT] ......................................................................... A-145 Reconnaissance Exploitation Report [RECCEXREP] .......................................... A-146 Reconnaissance Following Report [RECON 4] .................................................... A-147 Reconnaissance Nickname Report [RECON 1] ................................................... A-148 Reconnaissance Scheduling Report [RECON 3] ................................................. A-149 Reconnaissance Track Report [RECON 2] .......................................................... A-151 Religious Support Report [RSREP] ...................................................................... A-153 Request Confirmation [REQCONF] ...................................................................... A-155 Request for Information [RI] ................................................................................. A-156 Response to Request For Information [RRI] ........................................................ A-157 Road Clearance Request [ROADCLRREQ] ......................................................... A-158 Route Report [ROUTEREP] ................................................................................. A-160 Rules of Engagement Authorization [ROEAUTH] ................................................ A-161 Rules of Engagement Implementation [ROEIMPL] .............................................. A-162 Scatterable Minefield Record [SCATMINREC] .................................................... A-163 Scatterable Minefield Request [SCATMINREQ] .................................................. A-164 Scatterable Minefield Warning [SCATMINWARN] ............................................... A-165 Sensitive Items Report [SENITREP] .................................................................... A-166 Severe Weather Warning [SVRWXWARN] .......................................................... A-167 SLANT Report [SLANTREP] ................................................................................ A-168
6-99
6
Contents Sortie Allotment [SORTIEALOT] ........................................................................... A-169 Source, Content, Audience, Media, Effect Report [SCAMEREP] ......................... A-170 Spill Report [SPILLREP] ....................................................................................... A-173 Spot Report [SPOTREP] ....................................................................................... A-174 Summary Report Of Nuclear Detonations [NUDETSUM] ..................................... A-175 Support-Air Corridor [SPRT.AIRCOR] .................................................................. A-176 Support-Battlefield Geometry [SPRT.GEOM] ....................................................... A-178 Support-Damage Avoidance Area [SPRT.DAACAT] ............................................ A-180 Surveillance and Reconnaissance Plan Report [SURRECONREP] .................... A-182 Survey-Control Point Access Request [SURV.TPAC] .......................................... A-183 Survey-Control Point Storage (Input/Output) Message [SURV.SCPST] .............. A-184 System-Reply or Remarks Message [SYS.RRM] ................................................. A-185 System-Request for Report [SYS.RFR] ................................................................ A-186 Tactical ELINT Report [TACELINT] ...................................................................... A-187 Temporary Burial Site Request [TEMPBURIALSITEREQ] ................................... A-188 Track Management Message [TRKMAN] ............................................................. A-190 Track/Point Report [TRKREP] .............................................................................. A-191 Transportation Support Request (TRANSSPTREQ) ............................................ A-192 Transportation Support Response (TRANSSPTRES) .......................................... A-194 Unit Situation Report [UNITSITREP] .................................................................... A-196 War Crime Reportable Incident Report [WCRIR] ................................................. A-198 Warning Message-Air Defense [AIRDEFWARN] .................................................. A-199 Warning Order [WARNORD] ................................................................................ A-200 Water Supply Point [WTRSUPPT] ........................................................................ A-202 Weather Advisory or Watch [WEATHERWATCH] ................................................ A-203 Weather Forecast [WXFCST] ............................................................................... A-204 GLOSSARY ................................................................................................ Glossary-1 REFERENCES ........................................................................................ References-1 Figures Figure 1-1. Sample message ......................................................................................................... 1-2 Tables Introductory table 1. Deleted and added reports ............................................................................. xii Introductory table 2. Modified reports with name changes .............................................................. xii Introductory table 3. Reports modified ............................................................................................. xii Table A-1. Accident report/serious incident report acronym and abbreviation key ....................... A-3 Table A-2. Acknowledge message acronym and abbreviation key ............................................... A-4 Table A-3. Adversary message spot report acronym and abbreviation key .................................. A-5 Table A-4. Air defense command message acronym and abbreviation key ................................. A-6 Table A-5. Air mission request status/tasking acronym and abbreviation key .............................. A-7 Table A-6. Air support request acronym and abbreviation key ...................................................... A-9 Table A-7. Airlift request acronym and abbreviation key ............................................................. A-11 Table A-8. Airspace coordinating measures request acronym and abbreviation key ................. A-12 Table A-9. Airspace control order acronym and abbreviation key ............................................... A-13
6-99
7
Contents Table A-10. Ammunition fire unit-ammunition status acronym and abbreviation key ..................A-14 Table A-11. Ammunition fire unit-ammunition supply rate acronym and abbreviation key ..........A-15 Table A-12. Ammunition fire unit-deployment command acronym and abbreviation key ............A-17 Table A-13. Ammunition fire unit-fire status acronym and abbreviation key ................................A-19 Table A-14. Ammunition fire unit-firing site data acronym and abbreviation key .........................A-20 Table A-15. Ammunition fire unit-mission fired report acronym and abbreviation key .................A-22 Table A-16. Artillery target intelligence-artillery target Criteria acronym and abbreviation key ...A-23 Table A-17. Artillery target intelligence-artillery target report acronym and abbreviation key......A-25 Table A-18. Asset/Multiple asset status report acronym and abbreviation key ...........................A-26 Table A-19. Aviation (Army rotary wing) mission/support request acronym and abbreviation key .. A- 27 Table A-20. Basic wind data message acronym and abbreviation key ........................................A-28 Table A-21. Battle damage assessment report acronym and abbreviation key ..........................A-30 Table A-22. Bed availability and element status acronym and abbreviation key .........................A-32 Table A-23. Bed designations acronym and abbreviation key .....................................................A-34 Table A-24. Bed request acronym and abbreviation key .............................................................A-36 Table A-25. Blood shipment report acronym and abbreviation key .............................................A-38 Table A-26. Bridge report acronym and abbreviation key ............................................................A-39 Table A-27. Bulk petroleum allocation acronym and abbreviation key ........................................A-40 Table A-28. Bulk petroleum contingency report acronym and abbreviation key ..........................A-41 Table A-29. Bulk petroleum requirements forecast acronym and abbreviation key ....................A-42 Table A-30. Bulk class III request/forecast acronym and abbreviation key .................................A-43 Table A-31. Casualty report acronym and abbreviation key ........................................................A-44 Table A-32. CBRN 1 report acronym and abbreviation key .........................................................A-46 Table A-33. CBRN 2 report acronym and abbreviation key .........................................................A-47 Table A-34. CBRN 3 report acronym and abbreviation key .........................................................A-49 Table A-35. CBRN 4 report acronym and abbreviation key .........................................................A-50 Table A-36. CBRN 5 report acronym and abbreviation key .........................................................A-51 Table A-37. CBRN 6 report acronym and abbreviation key .........................................................A-52 Table A-38. CBRN hazard warning message acronym and abbreviation key .............................A-53 Table A-39. CBRN situation report acronym and abbreviation key .............................................A-54 Table A-40. Cemetery status acronym and abbreviation key ......................................................A-56 Table A-41. Chemical downwind message acronym and abbreviation key .................................A-58 Table A-42. Close air support summary acronym and abbreviation key .....................................A-59 Table A-43. Commander’s situation report acronym and abbreviation key .................................A-62 Table A-44. Computer network attack acronym and abbreviation key ........................................A-63 Table A-45. Crew manning report acronym and abbreviation key ...............................................A-64 Table A-46. Crossing report acronym and abbreviation key ........................................................A-65 Table A-47. Cyber effects request format acronym and abbreviation key ...................................A-67 Table A-48. Cyberspace operations mission request status/tasking acronym and abbreviation key ................................................................................................................................................A-68 Table A-49. Daily blood report acronym and abbreviation key ....................................................A-69
6-99
8
Contents Table A-50. Direct support unit report acronym and abbreviation key ........................................ A-70 Table A-51. Effective downwind message acronym and abbreviation key ................................. A-71 Table A-52. Electronic attack data message acronym and abbreviation key .............................. A-72 Table A-53. Electronic warfare frequency deconfliction message acronym and abbreviation key . A- 73 Table A-54. Electronic warfare mission summary acronym and abbreviation key ...................... A-75 Table A-55. Electronic warfare requesting/tasking message acronym and abbreviation key ..... A-78 Table A-56. Enemy/friendly/unit minefield/obstacle report acronym and abbreviation key ......... A-80 Table A-57. Explosive ordnance disposal support acronym and abbreviation key ..................... A-82 Table A-58. Fire mission-beacon location acronym and abbreviation key .................................. A-83 Table A-59. Fire mission-request to fire acronym and abbreviation key ..................................... A-84 Table A-60. Fire planning-compute a fire plan acronym and abbreviation key ........................... A-85 Table A-61. Fire planning-fire plan executive orders acronym and abbreviation key ................. A-86 Table A-62. Fire planning-fire plan target list acronym and abbreviation key ............................. A-87 Table A-63. Fire planning-reserve fire unit acronym and abbreviation key ................................. A-88 Table A-64. Fire support element-commander’s criteria acronym and abbreviation key ............ A-89 Table A-65. Fire support element-friendly unit location acronym and abbreviation key .............. A-90 Table A-66. Flight control information acronym and abbreviation key ........................................ A-91 Table A-67. Fragmentary order acronym and abbreviation key .................................................. A-92 Table A-68. Friendly nuclear strike warning acronym and abbreviation key ............................... A-93 Table A-69. General administrative message acronym and abbreviation key ............................ A-94 Table A-70. Handover message acronym and abbreviation key ................................................. A-96 Table A-71. Highway situation report acronym and abbreviation key ......................................... A-97 Table A-72. Human remains search and recovery status report acronym and abbreviation key A-98 Table A-73. Intelligence report acronym and abbreviation key ................................................... A-99 Table A-74. Intelligence summary acronym and abbreviation key ............................................ A-101 Table A-75. Isolated Soldier guidance acronym and abbreviation key ..................................... A-103 Table A-76. Isolated Soldier guidance execution report acronym and abbreviation key .......... A-104 Table A-77. Logistics resupply request acronym and abbreviation key .................................... A-105 Table A-78. Logistics status report ............................................................................................ A-107 Table A-79. Mail distribution scheme change acronym and abbreviation key .......................... A-108 Table A-80. Maintenance support request acronym and abbreviation key ............................... A-109 Table A-81. Maintenance support response acronym and abbreviation key ............................ A-110 Table A-82. Major ammunition malfunction-initial report acronym and abbreviation key .......... A-111 Table A-83. MIJI feeder report acronym and abbreviation key .................................................. A-112 Table A-84. Media contact report acronym and abbreviation key ............................................. A-113 Table A-85. Medical evacuation request acronym and abbreviation key .................................. A-115 Table A-86. Medical situation report acronym and abbreviation key ......................................... A-116 Table A-87. Medical status report acronym and abbreviation key ............................................ A-117 Table A-88. Message, audience, reaction, carrier, origin report acronym and abbreviation key .... A- 119 Table A-89. Message correction or cancellation acronym and abbreviation key ...................... A-120
6-99
9
Contents Table A-90. Meteorological-computer message acronym and abbreviation key ...................... A-121 Table A-91. Meteorological-fallout message acronym and abbreviation key ........................... A-122 Table A-92. Meteorological-target acquisition message acronym and abbreviation key .......... A-123 Table A-93. Military information support operations report acronym and abbreviation key ...... A-124 Table A-94. Military Postal Facility Request acronym and abbreviation key ............................ A-125 Table A-95. Missile Intercept report acronym and abbreviation key ......................................... A-126 Table A-96. Modification-attack criteria acronym and abbreviation key.................................... A-127 Table A-97. Modification-attack exclude criteria acronym and abbreviation key ...................... A-128 Table A-98. NMC summary report acronym and abbreviation key ........................................... A-129 Table A-99. Operation order acronym and abbreviation key .................................................... A-132 Table A-100. Operation plan change acronym and abbreviation key ....................................... A-133 Table A-101. Operation report acronym and abbreviation key ................................................. A-134 Table A-102. Operations summary acronym and abbreviation key .......................................... A-135 Table A-103. Patrol report acronym and abbreviation key ........................................................ A-136 Table A-104. Personnel recovery incident report acronym and abbreviation key .................... A-137 Table A-105. Personnel recovery request acronym and abbreviation key ............................... A-138 Table A-106. Personnel recovery situation summary report acronym and abbreviation key ... A-139 Table A-107. Personnel status report acronym and abbreviation key ...................................... A-141 Table A-108. Preliminary technical report acronym and abbreviation key ................................ A-142 Table A-109. Psychological action report acronym and abbreviation key ................................ A-143 Table A-110. Public affairs operation report acronym and abbreviation key ............................ A-144 Table A-111. Radar status report acronym and abbreviation key ............................................. A-145 Table A-112. Reconnaissance exploitation report acronym and abbreviation key ................... A-146 Table A-113. Reconnaissance following report acronym and abbreviation key ....................... A-147 Table A-114. Reconnaissance nickname report acronym and abbreviation key ...................... A-148 Table A-115. Reconnaissance Scheduling Report acronym and abbreviation key .................. A-150 Table A-116. Reconnaissance track report acronym and abbreviation key ............................. A-152 Table A-117. Religious support report acronym and abbreviation key ..................................... A-154 Table A-118. Request confirmation acronym and abbreviation key ......................................... A-155 Table A-119. Request for information acronym and abbreviation key ...................................... A-156 Table A-120. Response to request for information acronym and abbreviation key .................. A-157 Table A-121. Road clearance request acronym and abbreviation key ..................................... A-159 Table A-122. Route report acronym and abbreviation key ....................................................... A-160 Table A-123. Rules of engagement authorization acronym and abbreviation key ................... A-161 Table A-124. Rules of engagement implementation acronym and abbreviation key ................ A-162 Table A-125. Scatterable minefield record acronym and abbreviation key .............................. A-163 Table A-126. Scatterable minefield request acronym and abbreviation key ............................. A-164 Table A-127. Scatterable minefield warning acronym and abbreviation key ............................ A-165 Table A-128. Sensitive Items Report acronym and abbreviation key ....................................... A-166 Table A-129. Severe weather warning acronym and abbreviation key ..................................... A-167 Table A-130. SLANT report acronym and abbreviation key ..................................................... A-168
6-99
10
Contents Table A-131. Sortie allotment acronym and abbreviation key ................................................... A-169 Table A-132. Source, content, audience, media, effect report acronym and abbreviation key . A-172 Table A-133. Spill report acronym and abbreviation key ........................................................... A-173 Table A-134. Spot report acronym and abbreviation key .......................................................... A-174 Table A-135. Summary report of nuclear detonations acronym and abbreviation key ............. A-175 Table A-136. Support-air corridor acronym and abbreviation key ............................................. A-177 Table A-137. Support-battlefield geometry acronym and abbreviation key ............................... A-179 Table A-138. Support-damage avoidance area acronym and abbreviation key ....................... A-181 Table A-139. Surveillance and reconnaissance plan report acronym and abbreviation key ..... A-182 Table A-140. Survey-control point access request acronym and abbreviation key................... A-183 Table A-141. Survey-control point storage (input/output) message acronym and abbreviation key .............................................................................................................................................. A-184 Table A-142. System-reply or remarks message acronym and abbreviation key ..................... A-185 Table A-143. System-request for report acronym and abbreviation key ................................... A-186 Table A-144. Tactical ELINT report acronym and abbreviation key .......................................... A-187 Table A-145. Temporary burial site request acronym and abbreviation key ............................. A-189 Table A-146. Track management message acronym and abbreviation key ............................. A-190 Table A-147. Track/Point report acronym and abbreviation key ............................................... A-191 Table A-148. Transportation support request acronym and abbreviation key ........................... A-193 Table A-149. Transportation support response acronym and abbreviation key ........................ A-195 Table A-150. Unit situation report acronym and abbreviation key ............................................. A-197 Table A-151. War crime reportable incident report acronym and abbreviation key .................. A-198 Table A-152. Warning message-air defense acronym and abbreviation key ............................ A-199 Table A-153. Warning order acronym and abbreviation key ..................................................... A-201 Table A-154. Water supply point acronym and abbreviation key .............................................. A-202 Table A-155. Weather advisory or watch acronym and abbreviation key ................................. A-203 Table A-156. Weather forecast acronym and abbreviation key ................................................. A-205
6-99
11
Preface FM 6-99 provides a standardized, readily available reference for Army forces to extract common voice reports and message templates. This manual is a collection of reports used by units of all sizes and forms the basis of Army voice information exchange in a degraded network environment. FM 6-99 facilitates a common understanding of voice reporting and communicating throughout U.S. Army elements and is the keystone manual for voice report and message formats. The principal audience for FM 6-99 is all members of the profession of arms. Commanders and staffs of Army headquarters serving as joint task force or multinational headquarters should also refer to applicable joint or multinational doctrine, such as North Atlantic Treaty Organization (NATO) or American, British, Canadian, Australian, New Zealand (ABCANZ) doctrine, related to the range of military operations and joint or multinational forces. Joint and multinational doctrine aids interoperability. Trainers and educators throughout the Army also will use this manual. Note that some reports in FM 6-99 may contain portions that unit standard operating procedures eliminate or modify. Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable U.S., international, and, in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiers operate in accordance with the law of war and the rules of engagement. This publication is not the proponent for any Army terms. FM 6-99 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the United States Army Reserve, unless otherwise stated. The proponent of FM 6-99 is the United States Army Combined Arms Center. The preparing agency is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send written comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, United States Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-MCD (FM 6-99), 300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by email to [email protected]; or submit an electronic DA Form 2028.
6-99
13
Introduction While U.S. forces are among the most technologically advanced forces in the world, the need for redundancy and interoperability between joint and multinational forces requires the continued use of analog communication systems. Other circumstances that require the use of voice message formats include attacks on communication networks, failures of equipment, and inhospitable locations. This manual provides the Army with an effective means of communicating with joint and multinational forces that do not operate on parallel communication platforms. As U.S. Army communications strategies evolve, the need to communicate expeditiously and succinctly via voice remains. FM 6-99 is the U.S. Army’s doctrinal library for report and message voice templates. It saves units time and resources in developing internal formats. FM 6-99 formats are derived from United States message text format (USMTF), variable message formats (VMFs), command post computing environment (also known as CPCE) systems, NATO standardization agreements (STANAGs), historical Army reports, and allied procedural publications (APPs). The authorities for the United States message text formats in FM 6-99 are MIL-STD-6040B and CJCSI 6241.04C. As a user’s manual, FM 6-99 influences future Army information systems, user interfaces, and report and message graphics. Formats included in FM 6-99 are the means through which the Army adapts multiple reporting sources into a user-friendly, standardized message format library. FM 6-99 enables Army units to synchronize with joint and multinational communication structures without modifying their normal mode of operation with similar reports. Units use FM 6-99 report and message formats for all voice reporting. A unit will not modify these formats unless authorized by the unit commander to allow for expanded critical information requirements, which should be articulated in a unit standard operating procedure. This manual does not include many branch-specific or technical report and message formats that are contained in FMs and other publications published by their respective proponents. FM 6-99 does not supersede branch-specific or technical reports, but units should use FM 6-99 formats whenever possible. Chapters 1 and 2 instruct users how to transmit written and voice reports and messages. Appendix A contains message formats. This manual reflects updated changes in doctrine and procedures from previous editions. FM 6-99 now provides users with reports that are easier to transmit and pertinent to the modern battlefield. This revision— (cid:122) Removes some reports or messages and retains only the most widely used today. (cid:122) Adds new reports and messages reflecting modern formats and needs. (cid:122) Modifies existing reports or messages to correspond with evolving battlefield and staff needs. (cid:122) Consolidates numerous reports to provide effective messaging and reduce repetitive messages. (cid:122) Eliminates repetitive lines for message brevity and clarity. (cid:122) Updates references and terminology to reflect the latest doctrine. FM 6-99 deletes, adds, or modifies reports listed in introductory tables 1, 2, and 3 on page xii to adapt to modern needs and as requested from the field, centers of excellence, and the community of interest. Some report and message formats contained in FM 6-99 are similar to USMTFs but vary slightly to accommodate modern U.S. Army needs—these formats do not have associated USMTF numbers.