FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-98
123
Security Operations Figure 5-8. Visual contact during moving flank guard operation Bravo Troop conducts a fire mission with A/3-29 Field Artillery. Upon completion of the fire mission, Bravo Troop coordinates with Charlie Company to move two tank platoons into battle position 1 and battle position 2. Bravo Troop conducts a linkup and a battle handover with Charlie Company using a rearward passage of lines. Once the last vehicle moves through the passage point, Bravo Troop moves their forces north and conducts an alternating bound to take over the northern most area of operations. This allows them to destroy the enemy force while allowing the moving flank guard’s tempo to continue uninterrupted. If a larger force were observed, then the squadron commander would have to relay to the brigade commander to address the composition and disposition of the enemy force moving towards the flank of the squadron, brigade, and division. Once the brigade secures OBJECTIVE KING, the squadron transitions to a screen operation and begins consolidation and reorganization tasks. The division adjusts the task organization in preparation for follow- on operations and the attachments no longer under the squadron’s control are escorted to their next location. The squadron uses the time to conduct sustainment operations. REAR GUARD 5-83. A rear guard protects the exposed rear of the main body. Rear guards are appropriate when conducting offensive tasks, when the protected force breaks contact with flanking forces, or during a retrograde. The rear guard deploys and defends for moving and stationary main bodies. The tasks described for a stationary flank guard apply. The rear guard for a moving force displaces to successive battle positions along PLs in-depth as the main body moves. The nature of enemy contact determines the scheme of maneuver for displacement. (Refer to FM 3-90-2 for more information.) The commander establishes the rear guard during retrograde operations in two ways:
3-98
124
Chapter 5 * The guarding force relieves other units in place as they move to the rear. * The guarding force establishes a position in-depth behind the main body and passes those forces through. MOVEMENTS INTO SECURITY AREAS FOR STATIONARY SECURITY MISSIONS 5-84. The security force establishes stationary security mission in a similar manner. In deploying into the security area, the security force must address competing requirements; to establish the security area quickly to meet mission requirements, and to provide the necessary level of security for itself. The security force moves into the security area using one of the following three methods listed below: * Tactical road march. * Movement to contact. * Zone reconnaissance. Tactical Road March Method 5-85. The fastest but least secure method of deploying is a tactical road march from the rear boundary of the security area to the initial positions. The security forces move to a release point on the rear boundary. From the release point, subordinate elements deploy to occupy initial positions, moving by the quickest means possible. This method is appropriate when the security force commander does not expect enemy contact, time is critical, or previous zone reconnaissance of the security area conducted by aviation units found no enemy in the security area. Movement to Contact Method 5-86. In the second method, the security force conducts a movement to contact from an LD (usually the rear boundary of the security area) to the initial positions. This method is slower than a tactical road march but more secure. It is appropriate when enemy contact is likely, time is limited, the situation does not require detailed reconnaissance of the terrain, or aviation elements or other assets conducting zone reconnaissance forward of the ground element detect enemy forces in the security area. Zone Reconnaissance Method 5-87. The most secure method for moving into the initial positions is for the security force to conduct zone reconnaissance from the security area’s rear boundary to its initial security line positions or the forward limit of the security area. Given adequate time, this method is preferred because it allows the security force to clear the security area and become familiar with the terrain that it may have to defend. The security force reconnoiters potential subsequent positions and fire support system firing positions as it moves to its initial positions. A zone reconnaissance is appropriate when time is available and information about enemy forces or terrain is unknown. While this technique provides information of tactical value on the enemy forces and terrain in the area, it also consumes time. Using air reconnaissance forward of the ground units increases the speed and security of the movement. MOVEMENT DURING MOVING FLANK SECURITY MISSIONS 5-88. There are three techniques of occupying and moving in a flank security area for moving security missions. These techniques are based on how the security force crosses the LD— * Separately from the main body and deploys to perform the mission. * Separately from the main body, lead elements conduct a movement to contact. * With the main body and conducts zone reconnaissance out to the limit of the security area. 5-89. Commanders should not require the security force to make its own penetration when it faces prepared enemy defenses. This may prevent or significantly delay the security force from assuming its duties. They often combine the three techniques described in paragraphs 5-90 through 5-92 (pages 5-24 through 5-27). Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission 5-90. In this first technique, the security forces cross the LD separately from the main the body and deploy to perform the mission, as seen in figure 5-9 and figure 5-10 (page 5-26). The security force then conducts a
3-98
125
Security Operations tactical road march, an approach march, or tactical movements parallel to the main body and drops off observation posts or occupies battle positions along the flank of the main body. This technique keeps the two forces from interfering with each other during deployment. When another force penetrates the line of contact, and the main body is not in contact with the enemy and is moving quickly, it is appropriate that the LD is uncontested. The IPB process indicates that enemy contact is not likely in the area through which the security force is moving. It is the fastest but least secure technique. Figure 5-9. Security force crossing the LD separately to establish a flank screen
3-98
126
Chapter 5 Figure 5-10. Security force continuing to cross LD separately to establish a flank screen Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission 5-91. In this technique, the security force crosses the LD separately from the main body, and its lead elements conduct a movement to contact, as seen in figure 5-11. Follow-on elements occupy positions as they reach them. This technique is appropriate when the main body is moving slower than in the first method (separately from the main body and deploys to perform the mission), the LD is uncontested, and the IPB process estimates possible enemy contact. This technique is slower than the previous technique (separately from the main body and deploys to perform the mission) but provides better security.
3-98
127
Security Operations Figure 5-11. Movement to contact technique during moving flank security mission Security Force Crosses LD with the Main Body and Conducts Zone Reconnaissance out to the Limit of the Security Area 5-92. The final technique is when the security force crosses the LD with the main body and conducts zone reconnaissance out to the far limit of the security area, as seen in figure 5-12, page 5-28. This technique is appropriate when the LD is also the line of contact, the main body makes its own penetration of the enemy defenses along the line of contact, the main body is moving slowly, and leaders do not clearly understand the enemy situation. The security force may follow the lead element of the main body through the gap and deploy when the situation permits. This technique provides increased security for both the security force and the main body; it is also the most time-consuming technique.
3-98
128
Chapter 5 Figure 5-12. Zone reconnaissance technique during moving flank security mission COVER 5-93. A cover is a type of security operation done independent of the main body to protect them by fighting to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-90). Commanders use the cover task offensively and defensively. A cover is a brigade-level, force-oriented mission that protects the division or corps main body from detection or engagement by enemy forces attempting to delay or disrupt friendly operations. A covering force may be offensive or defensive in nature. The nature of the cover mission reflects the type of operation conducted by the division or corps. All covering force operations are aggressively executed making maximum use of offensive opportunities. A covering force accomplishes all the tasks of screening and guard forces. (Refer to FM 3-90-2 for more information.) 5-94. A covering force is an independently operating, self-contained force conducting the cover mission. The covering force operates away from the main body to develop the situation, prevent enemy ground observation, and protect the main body from direct and indirect fires. METT-TC (I) factors determine the distance from the main body. To protect the main body from effective ground observation and direct fires, the BCT may execute operations as far as 50 to 60 kilometers from the main body. The covering force denies the enemy information by conducting counterreconnaissance to destroy enemy reconnaissance and enemy forces within the security zone. A covering force develops the situation earlier than a guard force, fights longer and more frequently, and defeats larger enemy forces than a guard force. Furthermore, a covering force reconnoiters, screens, attacks, defends, and delays as necessary. The covering force does not allow enemy forces to bypass and affect the main body.
3-98
129
Security Operations 5-95. Division or corps headquarters determine the requirements for a covering force built around a brigade. Maneuver, enabling, and sustainment assets reinforce the covering force so it can accomplish its mission. Reinforcements increase the distance and time the covering force can operate away from the main body and enhances the covering force’s ability to fight. Reinforcements typically revert to their parent organizations upon the passage of the covering force (see table 5-3). Table 5-3. Typical command and support relationships for cover operations ATTACHMENT RELATIONSHIP PARENT ORGANIZATION Battalion Task Force Attached Division Cavalry Squadron Attached Division Air Cavalry Squadron/ Operational Control Division/Corps Attack Battalion Field Artillery Brigade Attached or Direct Support Division/Corps Engineer Battalion Attached or Direct Support Division/Corps Air Defense Artillery Brigade Attached or Direct Support Corps Additional Sustainment Units Attached Division/Corps 5-96. A covering force may be offensive or defensive in nature, but a covering force executes all covering force operations aggressively to maximize offensive opportunities. The covering force executes its mission as it would in zone reconnaissance or reconnaissance in force in that it is force-oriented. OFFENSIVE COVER 5-97. An offensive covering force seizes the initiative early, allowing the main body commander freedom of maneuver. While conducting offensive tasks, a covering force may operate to the front or flanks of the main body. Offensive covering forces conduct reconnaissance along the main body’s axis of advance. They deny the enemy information about the size, strength, composition, and objective of the main body, destroy, disrupt, or fix enemy forces and reconnaissance assets in the security zone forces, develop the situation to determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main body forces are committed. Advance cover and flank cover are two types of offensive covers. 5-98. The following are a list of offensive tasks Cavalry units could conduct within capability during offensive cover missions: * Destroy, disrupt, or fix enemy forces and reconnaissance assets in the disruption zone. * Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. Must prevent ground observation and direct fire against the main body. * Maintain contact with the protected force and other forces operating on its flanks. * Gain and maintain contact with enemy forces, and report activity in the assigned area. * Maintain observation of avenues of approach that affect the protected forces’ mission. * Locate and identify enemy forces in the battle zone, and conduct handover to follow-on forces. * Cause the enemy to commit resources to counter the cover force that would have been used against the main body. * Deny the enemy information about the size, strength, composition, and objective of the main body. * Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main body forces are committed. * Clear or bypass enemy forces in the assigned area according to engagement criteria. * Conduct reconnaissance along the main body’s axis of advance. * Penetrate the enemy’s disruption zone to locate enemy main defensive positions. * Locate gaps or weaknesses in the enemy’s defensive scheme. * Defeat or repel enemy forces as directed by the higher commander.
3-98
130
Chapter 5 5-99. If encounter turns into a meeting engagement— * Destroy enemy reconnaissance and lead elements of the main body. * Determine the location of enemy assailable flanks. * Fix enemy forces to allow the main body to maneuver around enemy strengths or through enemy weaknesses. Advance Covering Force 5-100. An advance covering force is an offensive cover operation. An advance covering force is task organized to locate and penetrate the security zone and forward defenses of an enemy force deployed to defend and to destroy enemy reconnaissance, advance guard units, and first-echelon units of a moving enemy force. BCT Planning and Execution Considerations for Offensive Cover Missions 5-101. The BCT advances on a broad front and conducts operations similar to that for zone reconnaissance or movement to contact. Staffs determine the width of the zone to cover during mission analysis and IPB. Typically, aviation assets task organized to the covering force reconnoiter forward of the advancing ground elements. Upon enemy contact, air assets engage and destroy enemy forces according to the covering force commander’s intent. They report the enemy’s location, composition, and disposition to the ground forces while maintaining contact with the enemy. Aviation assets conduct target handover to ground forces when required. Ground forces from the covering force attack to defeat enemy forces. The covering force must have approval of the main body commander to bypass enemy forces. 5-102. If the covering force finds a gap in enemy defenses, they prepare to penetrate the integrity of the defense. The covering force immediately reports to the main body to divert follow-on forces. Covering forces prepare to defeat enemy counterattack during penetrations due to the opportunities hasty attacks provide to the defender. 5-103. When the BCT covering force can advance no further, they transition to a defense and prepare to execute a forward passage of lines of the main body. The covering force continues to perform reconnaissance of enemy positions to locate gaps or vulnerable flanks. The covering force conducts target and reconnaissance handovers to guide the main body as they attack through or around the covering force. If the covering force is successful, the main body commander can attack enemy vulnerabilities at the time desired with previously uncommitted main body forces. 5-104. The covering force must retain a reserve. At the brigade level, a reserve should consist of attached attack aviation assets and a maneuver company. The reserve must be an uncommitted force and ready to deploy at a decisive moment anywhere in the covering force’s zone. Flank Covering Force 5-105. A flank cover is an offensive covering force mission. If the main body commander perceives a significant threat to one of the unit’s flanks, the commander assigns a flank cover. A BCT or reconnaissance and security BCT conducts a flank cover much the same as a flank guard. The main difference between the two missions is the scope of operations and the distance the covering force operates from the main body (see figure 5-13).
3-98
131
Security Operations Figure 5-13. Reinforced SBCT performing advanced cover 5-106. The flank covering force clears the area between its route of advance and the main body the same as the flank guard. The flank covering force maintains contact with an element of the main body specified by the main body commander. The commander assigning the mission designates the area of operations for the flank covering force and the protected force (see figure 5-14, page 5-32). The flank covering force clears the area between its route of advance and the main body. 5-107. Integration of aviation assets are essential to a cover mission. Aviation assets may assist in clearing the area between the covering force and the main body, assisting in maintaining contact with the protected force, and screening to the front of the units conducting the flank covering force.
3-98
132
Chapter 5 Figure 5-14. Reinforced ABCT performing flank cover DEFENSIVE COVER 5-108. A defensive covering force prevents the enemy from attacking at the time, place, and combat strength of their choosing. The defensive cover forces the enemy to reveal their main effort, to disrupt the enemy’s attack, destroy their initiative, and set the conditions for their defeat. Defensive covers maintain continuous observation of avenues of approach. They destroy or disrupt enemy reconnaissance and security forces to deceive the enemy of friendly disposition, and the location of the main defensive effort. The defensive forces determine the size, strength, composition, and direction of the enemy’s main effort, and maintain contact and force the commitment of enemy second-echelon forces. A defensive covering force operates to the front, flanks, or rear of a main body deploying to defend. Defensive cover is performed most frequently forward of the main body.
3-98
133
Security Operations 5-109. The following are a list of defensive tasks Cavalry units could conduct within capability during defensive cover missions: * Detect, report, and destroy all enemy elements attempting to pass through the cover, both ground and aerial, and provide the protected force commander early warning of enemy activities. * Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. * Maintain observation of avenues of approach that affect the protected forces’ mission. * Maintain contact with the protected force and other forces operating on its flanks. * Maintain contact with enemy forces, and report activity in the assigned area. * Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the enemy’s order of battle based upon the IPB (when facing an echeloned enemy force). * While displacing, determine the direction of enemy movement, maintain contact, and report threat activities. * While displacing, impede and harass the enemy to provide the protected force commander with additional time and maneuver space. * Cause the enemy main body to deploy prematurely, and then, report their direction of travel. * Deny ground observation, and prevent direct fire against the main body. * Deny the enemy information about the size, strength, composition, and location of the main battle area. * Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main body forces are committed. Planning and Execution Considerations for Defensive Cover Missions 5-110. The planning and execution considerations are applicable to all types of defensive cover. Usually, the division or corps commander uses a BCT or designates a reconnaissance and security BCT as the foundation covering force. The commander reinforces and augments it with combat power to increase the length of time it can fight the covering force battle and to give it the capability to destroy larger enemy forces. The amount of augmentation the covering force receives depends upon the intent of the main body commander (see figure 5-15, page 5-35). The BCT commander always designates reserves to seize the initiative during the early stages of an enemy attack. 5-111. The main body commander designates the forward and rear boundaries of the security force with PLs. Normally, the lateral boundaries of the security area are extensions of the main body boundaries. The rear boundary of the security force is the BHL, which is within range of the main body artillery. The BCT commander designates additional control measures as needed to control the operation. 5-112. The BCT commander assigns an area of operations to each subordinate. Covering force missions delay and defeat enemy forces to allow maximum time for the main body to prepare and execute offensive or defensive tasks. If certain terrain is crucial to the operation, the commander may assign battle positions to TFs. Subordinate commanders have the same options in the deployment of their units. If the terrain and situation permit, the covering force boundaries are extensions of the boundaries of corresponding main body units to simplify the battle handover. 5-113. The BCT conducts zone reconnaissance or movement to contact to the forward PL in the security area. The BCT may be required to fight through enemy resistance to establish control over the security area. If the unit encounters heavy enemy resistance, the main body commander orders the covering force to occupy a new defensive line and conducts the cover. Planning for such contingencies is critical to the success of the covering force mission. 5-114. Battle handover and passage of lines are inherent in the conduct of defensive cover. Battle handover and passage of lines may not occur simultaneously for all covering force units. As some units begin passage, others may still be taking advantage of offensive opportunities in other parts of the security area. The BCT prepares to continue fighting in those portions of the security area where forces are successful to set up offensive opportunities for the main body. Disengagement criteria established by the division or BCT commander dictate when covering force units may begin battle handover and passage of lines.
3-98
134
Chapter 5 5-115. Organic and attached aviation assets are invaluable assets in assisting disengagement of ground units during the conduct of battle handover and passage of lines with the main body. Additionally, they can assist in reconnaissance of the security area as the covering force moves forward, screening forward of the covering force, covering areas between ground units, and providing additional firepower for disengaging ground units. 5-116. BCT staffs consider communications requirements to maintain contact with the main body and subordinate battalions within the covering force. Covering forces consider use of high frequency and tactical satellite communications to maintain continuous communications with all organic units, adjacent units, and higher. Covering forces may require additional signal assets to provide communications infrastructure support and retransmission. 5-117. Reserves are critical to a defensive cover. They allow the BCT commander to seize the initiative during the early stages of an enemy attack. The covering force commander always designates a reserve. Frequently, reserves are attack aviation units, combined arms battalions, and other operational control maneuver forces. In the absence of attached or operational control maneuver units, the BCT commander may assign a contingency mission to assigned tank companies and dictate employment restrictions to subordinate commanders. The tank company is the battalion-level commander’s primary reserve force. Normally, commanders position ground reserve forces in-depth and prepare them to execute a series of contingency missions, such as counterattack, block, and assume an area defense. Aviation reserves may counterattack in coordination with ground reserves and conduct an attack against enemy forces in close friendly contact. Frequently, the covering force commander designs the defense to shape an enemy penetration causing the enemy to become isolated and to provide opportunities to mass effects to defeat the isolated enemy.
3-98
135
Security Operations Figure 5-15. Reinforced ABCT performing defensive cover Flank and Rear Defensive Covering Forces 5-118. The planning and execution considerations for flank and rear defensive covering forces are the same as for a frontal covering force. A rear covering force mission is similar to a rear guard mission. A rear covering force protects a force moving away from the enemy. The BCT deploys behind the forward maneuver units of the main body, conducts battle handover and passage of lines, and then defends or delays. Alternatively, the covering force may conduct a relief in place as part of a deception plan or to take advantage of the best defensive terrain. 5-119. The BCT deploys its subordinate units abreast and in-depth. The subordinate units establish passage points and assist in the rearward passage of the main body as needed. From that point on, the mission is conducted the same as any other defensive covering force operation. As the main body moves, the covering force displaces to subsequent PLs in-depth. If the enemy does not follow the withdrawing forces, contact may be lost eventually. Fighting a defense or delay is necessary if the enemy detects the movement and attacks.
3-98
136
Chapter 5 AREA SECURITY 5-120. Area security is a type of security operation conducted to protect friendly forces, lines of communications, and activities within a specific area (ADP 3-90). The BCT conducts area security to preserve the commander’s freedom of maneuver, ability to move reserves, positioning of fire support assets, and to provide effective command and control and conduct sustainment operations. Area security degrades the enemy’s ability to affect friendly actions in a specific area by denying the enemy’s use of an area for its own purposes. Area security is essential to all operations, particularly operations in asymmetric environments during stability tasks. Area security enables military support to local governance, reconstruction efforts, rule of law, and the development of legitimate security forces. BCTs conduct area security to establish security around base camps, critical infrastructure, airfields, facilities, main supply routes (MSRs), lines of communication, terrain features, towns, equipment, and high-value assets. Offense, defense, and stability tasks support area security. 5-121. Area security is largely concerned with consolidating gains. Area security is typically phased and ranges in scale. Upon completion or during the execution of a large-scale ground combat operation, area security initially works to defeat bypassed enemy units that could constitute a means for further resistance or impact sustainment operations. As that enemy is defeated, actions transition to the defense of the local population, and finally, stability operations. Effectively, area security establishes the initial basis for wide area security. 5-122. Army forces perform area security to ensure freedom of action and to deny enemy forces the ability to disrupt operations. Commanders combine reconnaissance tasks and offensive, defensive, and stability operations to protect friendly forces, populations, infrastructure, and activities critical to mission accomplishment. Army forces integrate with partner military, law enforcement, and civil capabilities to establish and maintain security. The Army’s ability to establish control is critical to consolidating gains in the wake of successful military operations. 5-123. The commander may task subordinate units to conduct the following to support area security operations: * Area, route, or zone reconnaissance. * Screen. * Offensive and defensive tasks (within capabilities). * Route and convoy security. * Security for high-value assets. * Route or convoy security of critical lines of communications. * Checkpoint operations to monitor or control movement. * Patrol to cover gaps between secured perimeters. * Maintaining an observable presence. EXECUTION CONSIDERATIONS 5-124. When conducting an area security mission, the security force prevents threat, ground reconnaissance elements from directly observing friendly activities within the area the force is securing. Within capabilities, the security force prevents threat, ground maneuver forces from penetrating the defensive perimeters. 5-125. The commander can have the subordinate troops employ a variety of techniques, such as observation posts, battle positions, ambushes, and combat outposts, to accomplish the security mission. A reserve or quick reaction force enables the commander to react to unforeseen contingencies. The Cavalry squadron can execute ambushes and preemptive strikes with greater precision using the intelligence assets available to the BCT. Figure 5-16 is an example of a BCT Cavalry squadron conducting area security of a village. 5-126. METT-TC (I) determines the required augmentation for the Cavalry squadron. Of particular importance is the need for such assets as aviation, maneuver forces, engineers, intelligence operations assets, Armor, Infantry, and military police. Early warning of threat activity is paramount in area security missions and provides the commander with time and space to react to threats. Failure to conduct continuous reconnaissance may create a vulnerable seam where the enemy can execute an infiltration or attack.
3-98
137
Security Operations 5-127. A unit establishes a perimeter when it secures an area where the defense does not have a supporting unit. Perimeters vary in shape and distribution of assets based upon the results of mission analysis, IPB, and METT-TC (I). A probable direction of attack based on the enemy’s most likely and most dangerous courses of action, as determined in the IPB, may require the massing of combat power in that portion of the perimeter to defeat an attack or infiltration. If the perimeter was inward-focused as in stability tasks, the massing of combat power would prevent exfiltration or a breakout from the secured area. 5-128. Usually, the unit establishing the perimeter divides it into subordinate unit sectors with boundaries and contact points. The unit employs integrated observation posts, integrating attack and reconnaissance aviation, ground-based sensors, UASs, HUMINT assets, and mounted and dismounted patrols. Commanders emplace attached tanks and other antiarmor weapon systems to orient on high-speed avenues of approach. UASs and ground-based sensors provide overlapping reconnaissance capabilities at extended distances from the perimeter. Figure 5-16. Cavalry squadron conducting area security 5-129. Area security is a frequent mission conducted during stability tasks when circumstances may not permit establishment of clearly defined perimeters. When a perimeter is not feasible, the Cavalry unit secures the area by establishing a presence and conducting reconnaissance tasks throughout the area. Subordinate
3-98
138
Chapter 5 units establish perimeters around base camps, critical infrastructure, and high-value assets, while other units conduct operations to establish presence, provide security, and assist in stability or relief tasks. The commander positions reaction forces or disperses the reserve between several secured perimeters. Other missions or tasks that support area security may include the following: * Route or convoy security of critical lines of communications. * Checkpoint operations to monitor or control movement. * Patrols to cover gaps between secured perimeters. * Maintain an observable presence. ROUTE SECURITY 5-130. Cavalry units conduct route security missions to prevent enemy forces from affecting freedom of maneuver along a protected route. A route security force operates on and to the flanks of a designated route. Route security operations are defensive in nature, and unlike guard operations, are terrain-oriented. A route security force prevents an enemy force from impeding, harassing, containing, seizing, or destroying traffic along the route. To accomplish this task, the force performs the following functions: * Conduct continuous mounted and dismounted reconnaissance of the route and key locations along the route to ensure trafficability. * Conduct sweeps of the route at irregular intervals to prevent emplacement of enemy mines. * Cordon sections of the route to search suspected enemy locations. * Establish roadblocks and checkpoints along the route and lateral routes to stop and search vehicles, persons, and those entering the route. * Occupy key locations and terrain along or near the route. If possible, establish a screen oriented to prevent enemy direct fire weapons and observation from influencing the route. This function is known as out posting, also. * Aggressively conduct ground and aerial patrols to maintain route security. * Establish observation posts (covert and overt) or ambushes at critical points to watch for threat activity. CONVOY SECURITY 5-131. Convoy security is a subset of area security. Convoy security missions are offensive in nature and orient on the protected force. Typically, a convoy security is a security mission assigned to Cavalry troops, maneuver companies, and maneuver platoons. Commanders order convoy security missions when insufficient friendly forces are available to secure lines of communication in an area of operations. The commander may order troops to conduct convoy security missions in conjunction with route security operations. A convoy security force operates to the front, flanks, and rear of a convoy element moving along a designated route or integrated into the body of the convoy. 5-132. A convoy security mission has specific tasks that guide planning and execution. The security force accomplishes the following to protect a convoy: * Reconnoiter the route the convoy is to travel. * Clear the route of obstacles or positions from which the enemy could influence movement. * Provide early warning of enemy presence along the route. * Prevent the enemy from impeding, harassing, containing, seizing, or destroying the convoy. Organization 5-133. If possible, the convoy security force is a combined arms organization with integrated air and ground assets (see figure 5-17). Ideally, a convoy security force has sufficient combat power to organize into the following elements: * Advance guard. The advance guard performs continuous reconnaissance tasks along the main body’s axis of advance or route. The advance guard maintains continuous surveillance of enemy avenues of approach and destroys or repels enemy reconnaissance and security forces to protect the convoy. * Security element. The security element provides early warning and security to the convoy’s flanks and rear. They may perform duties of the escort element.
3-98
139
Security Operations * Escort element. The escort element provides close-in protection to the convoy. They may provide a response force to assist in repelling or destroying threat contact. * Reaction force. The reaction force provides firepower and support to assist the other elements in developing the situation or conducting a hasty attack. They may perform duties of the escort element. Figure 5-17. Convoy security organization
3-98
140
Chapter 5 Planning and Execution Considerations 5-134. Convoy security missions generate unique requirements the commander and staff should take into account when formulating a plan. The convoy security commander and subordinates receive a briefing on the latest information regarding the threat situation and the area through which the convoy is to pass. 5-135. The commander formulates plans and issues orders covering the commander’s intent, assignment of security force elements (reconnaissance, screen, escort, and reaction), the movement formation, and intervals between echelons and vehicles, rate of travel, and detailed plans for actions on contact. Leaders at all levels should ensure the convoy security force identify and rehearse immediate action drills (such as enemy ambush, obstacle, and react to indirect fire) before movement and can execute them in case of contact. 5-136. The commander may maintain a quick reaction force to support the convoy movement. The Cavalry unit may perform this mission. In addition, the commander assigns the Cavalry unit to set up outposts along the convoy route or movement corridor to provide overwatch and security of the area. Usually, the commander does not assign the Cavalry unit an area of operations but tasks the Cavalry unit to provide security for that segment of the route or corridor. 5-137. Communications are vital to the success of movement. Leaders plan communications with convoy elements and units occupying areas of operations along the route of movement to ensure support assets availability. Visual and sound signals are prearranged. Signals include colored smoke, identification panels, whistles or horn signals, and escalation of force signs. While limited, these communications means are effective when all personnel understand the prearranged signals and responses. 5-138. When possible, units should coordinate fires along the entire route of movement. Adequate fires planning and prior coordination with fire support cells can ensure indirect fire coverage. The fire support officer conducts detailed fire support rehearsals on the fire support net before convoy movement. The officer conducts rehearsals to confirm communications connectivity and to improve the fire support team’s overall understanding of the fire support plan. Planning and coordination must occur among all units involved if the convoy plans to move through multiple units’ area of operations. 5-139. If an air threat is possible, the commander addresses air defense of the convoy in the planning phase. The convoy elements review small arms air defense procedures and establish orientation sectors. The commander orchestrates air defense reinforcements into the movement and defense plan. If the route falls under an existing air defense umbrella, the staff conducts the appropriate coordination with the controlling air defense headquarters. 5-140. Convoy security operations in an urban environment or built-up area require different emphasis and techniques than those in rural areas. The population density and characteristics of the area may require nonlethal weapons and the careful application of lethal weapons in an effort to minimize collateral damage. To ensure they apply minimum essential force to minimize loss of life and destruction of property, leaders conduct detailed planning, coordination, and control. Whenever possible, convoys move through populated areas when these areas are least congested and pose less danger to the security of the convoy. Convoy operations may require assistance from military or local police and other government agencies to secure the route before the convoy enters the built-up area. 5-141. The S-4 and unit commanders plan for sustainment in convoy security operations. Fuel and maintenance elements are included in the convoy itself, or pre-positioned in secure areas along the route. Leaders should perform a detailed, precombat inspection before the convoy starts. Commanders plan casualty evacuation (CASEVAC) along the entire movement route. Commanders maintain coordination between the security force elements to ensure immediate medical support is available including the aid station, unit command post, sustainment command post, and designated units along the route. When operating at extended distances from organic or supporting medical assets, air medical evacuation is the preferred means of evacuation and is planned and rehearsed in detail. HIGH-VALUE ASSET CONSIDERATIONS 5-142. High-value assets are assets whose capture or destruction by enemy forces could decisively change the course of the operation. Security missions to protect high-value assets are an important component of
3-98
141
Security Operations area security in major combat operations and stability tasks. Examples of high-value assets to be secured in major combat operations include the following: * Major power-generation facilities (power plants and dams). * Airports, seaports, and other centers for mass transit. * Industrial complexes. * Cities. * Dislocated civilian camps. 5-143. High-value assets to be secured in stability tasks include the following: * Government officials and political and military leaders. * Government facilities. * High-value detainees. * Pipelines and relay stations. 5-144. Considerations the security force should address when it tasks subordinate elements to secure high-value assets include the following: * Internet protocol address, frequencies, location, and linkup point of the high-value asset. * Route used in reaching the high-value asset, and the composition and disposition of enemy forces that can influence the route. * Mission and movement or positioning plan of the high-value asset. * How easily the threat may detect and target the high-value asset with indirect fire. The security force should consider its own survivability and maintain adequate standoff from the high-value asset. * Duration of the mission and sustainment considerations. * Other friendly or neutral forces in the area and their task and purpose. * Triggers for change of mission from security to reconnaissance, offensive, or defensive actions. Is there an implied reserve mission? * Ability of the security force to maintain communications with higher headquarters. * Locations used by enemy personnel serving as forward observers for enemy indirect fire systems. SECTION IV – TRANSITION PLANNING 5-145. The transition from offensive to defensive operations or vice versa consistently occurs during large-scale combat operations. Cavalry units perform battle handovers by conducting a passage of lines (forward or rearward), a transition using a relief in place, or a change of mission. Passage of lines and relief in place are enabling operations found in ADP 3-90. 5-146. Cavalry units are consistently transitioning from reconnaissance and security operations or vice versa; therefore, planning for transitions begins early in the operations process during the development of the concept of operations and scheme of maneuver in which decision points are identified for when to execute those necessary transitions. The reconnaissance and security efforts by the Cavalry unit answer information requirements that enable the BCT commander and staff to develop transition decision points or refine the same decision points if the Cavalry unit has to transition earlier or later than originally planned based on effects from enemy or terrain. The decision points that drive the transition of the Cavalry unit must be understood at each echelon to ensure the BCT maintains tempo as transitions occur. BATTLE HANDOVER 5-147. A battle handover is a coordinated operation between two units that transfer responsibility for fighting an enemy force from one unit to the other. During defensive operations, the battle handover is usually coordinated in advance so that when ordered to occur, the operation requires minimum coordination. In the offense, it is often initiated by a fragmentary order based on the situation at hand. Clear standard operating procedure (SOP) allows units to quickly establish the necessary coordination to preclude a loss of momentum in the attack. A battle handover is typically associated with the conduct of passage of lines (forward or rearward).
3-98
142
Chapter 5 BATTLE HANDOVER PLANNING 5-148. Battle handover can occur during either offensive or defensive operations. During defensive operations, the battle handover is usually planned and coordinated in advance to facilitate execution and frequently involves a rearward passage of lines. In the offense, a battle handover is situation dependent and often initiated by a fragmentary order. Normally, a battle handover occurs in the offense when one unit passes through or around another unit. Tactical SOPs containing clear, simple, standardized procedures, and control measures enhance the ability of units to coordinate without experiencing a corresponding loss in momentum. 5-149. Battle handover occurs along a line forward of the stationary force known as the BHL. The BCT commander establishes the line in coordination with stationary and passing battalion commanders. Usually, the stationary commander determines the BHL location. The line is forward of the forward edge of the battle area in the defense or the FLOT in the offense. The BHL is located where elements of the passing unit can be overwatched effectively by direct fires or supported by indirect fires of the forward combat element of the stationary unit until the battle handover is complete. 5-150. Physical handover frequently occurs near the BHL. Events may dictate that a force break contact forward of or behind the BHL; for example, this may occur when there is a gap between echelons of the attacking enemy force. Close coordination (physical, digital, or voice) between the units involved in the handover allows them to coordinate and execute this process at the small-unit level. BATTLE HANDOVER FLOW 5-151. The battle handover operation begins on order of the commander of the units involved or when a given set of conditions occurs. Defensive handover is complete when the passing unit is clear and the stationary unit is ready to engage the enemy. These actions may occur at the same time. Offensive handover is complete when the passing unit crosses the BHL, which is usually considered the LD for the attacking unit. Until the handover is complete and acknowledged by the commanders, the commander in contact is responsible for coordinating the fight. 5-152. Coordination for battle handover flows from the commander out of contact to the commander in contact. The coordination for a battle handover overlaps with the coordination for a passage of lines; the coordination for both should be accomplished at the same time. The squadron tactical SOP should outline these coordination requirements to facilitate rapid accomplishment. 5-153. Digital information systems assist the squadron staff with its coordination and synchronization efforts for the operation. Each unit transmits or delivers a complete copy of its OPORD and overlays by either digital or analog means. Any changes made after initial distribution are updated immediately. The coordination between the two commanders involves— * Establishing digital and voice radio communications. * Providing updates of friendly and enemy situations (digital, voice, and graphical). * Coordinating passage points and routes and ensuring these are displayed on operational overlays (digital and analog). * Collocating contact points and exchanging liaison personnel (if required). * Coordinating fires (direct and indirect) and ensuring the direct fire control measures and fire support coordination measures display on operational overlays (digital and conventional). * Providing updated obstacle overlays including self-destruct, date-time groups of emplaced family of scatterable mines obstacles and reserve demolitions in the affected area of operations. * Determining the need for and dispatching contact point representatives. * Establishing and coordinating recognition signals. * Exchanging locations of obstacles and related covering fires. * Exchanging route information, including waypoints. * Determining sustainment requirements. 5-154. Due to the fluid nature of a battle handover, commanders can use digital systems to speed the planning, coordination, and execution processes. Units should plan voice radio; if digital capabilities are hampered, then units should use frequency modulation to coordinate and execute battle handovers.
3-98
143
Security Operations PASSAGE OF LINES (FORWARD AND REARWARD) 5-155. Cavalry units usually begin and end reconnaissance and security operations with a passage of lines, or a reconnaissance handover (discussed in chapter 4). A passage of lines is a tactical operation designed to pass one unit through the positions of another unit without interference. A passage may be designated as a forward or rearward passage of lines. A passage of lines is an inherent aspect of transferring responsibility for the battle between commanders while maintaining continuity of the fight. Cavalry units can be the passing or stationary force. FORWARD PASSAGE OF LINES 5-156. A forward passage of lines occurs when a unit passes through another unit’s positions while moving toward the enemy (ADP 3-90). Cavalry units conduct forward passage of lines as a transitional operation, typically before reconnaissance and security missions, when the factors of METT-TC (I) do not provide the freedom of bypassing a forward friendly unit. A forward passage of lines may also be conducted by Cavalry units to— * Continue the attack or counterattack. * Envelop a threat force. * Pursue a fleeing threat. * Pass between friendly areas of operations during nonlinear operations. 5-157. The passing force uses two techniques. In the first technique, the passing force deploys in its attack formation in the attack positions to the rear of the FLOT and crosses the FLOT in attack formation. This technique is appropriate if there is adequate maneuver space for the passing force to deploy effectively and without disrupting the stationary force’s defensive positions. This technique also allows the passing force to rapidly attack once it crosses the FLOT. 5-158. In the second technique, the passing force deploys after crossing the FLOT. Using this technique, the passing force crosses the FLOT in march column and then deploys into attack formations prior to crossing the BHL. This technique is required by restrictive terrain. If this technique is used, the FLOT should be outside direct fire range of the threat to allow the passing force to deploy before making direct fire contact with the threat. 5-159. Both of the passing force’s techniques require stationary unit scouts on or near the BHL. The passing unit may have their scout platoon link up with stationary unit scouts and continue the mission or they may have combat units deploy along the BHL to overwatch movement of other units. The units on the ground at the BHL must know the scheme of maneuver of the passing force so that they can act accordingly. 5-160. If the stationary unit identifies a gap or weak point in the threat's deployment, they should go about identifying axes of attack for the passing force that take advantage of that weakness (reconnaissance-pull). The premier consideration is that the stationary force should not pass the moving force into the teeth of the threat defense. The passing force must be flexible enough to modify its scheme of maneuver, if necessary, to take advantage of weaknesses in the threat’s defense. Figure 5-18, page 5-44 depicts the graphic control measures associated with a forward passage of lines.
3-98
144
Chapter 5 Figure 5-18. Forward passage of lines REARWARD PASSAGE OF LINES 5-161. Historically, Cavalry units conducting a rearward passage of lines have been associated with covering force operations. This remains true in the contemporary operational environment. Additionally, the nonlinear battlefield creates continuing requirements for rearward passage of lines. A rearward passage of lines occurs when a unit passes through another unit’s position while moving away from the enemy (ADP 3-90). This operation may or may not be conducted under threat pressure. An example of a rearward passage of lines is a Cavalry squadron as a covering force conducting a rearward passage of lines with the stationary unit in the main battle area. The covering force (Cavalry squadron) withdraws through the
3-98
145
Security Operations stationary force, handing off control of the fight at the BHL. Figure 5-19 provides an example of a rearward passage of lines with graphic control measures. Figure 5-19. Rearward passage of lines Planning Considerations 5-162. Planning procedures for a rearward passage of lines closely resemble the planning procedures for a forward passage of lines. However, rearward movement is likely to be more difficult because of the following: * The threat probably has the initiative, which tends to reduce the time available to conduct liaison and reconnaissance and make detailed plans. * If the rearward moving force has been in action, its Soldiers are tired and possibly disorganized to some degree.
3-98
146
Chapter 5 * The threat may be applying pressure on the passing force. * Friendly forces may be more difficult to recognize because threat forces may be intermixed with them. 5-163. To facilitate a rearward passage of lines, the stationary force commander develops an overlay. Once the overlay is prepared, the stationary commander transmits it and any amplifying information to the passing force commander by way of digital command and control systems. The following graphic control measures are included in a passage of lines overlay: * BHL. * Contact points forward of the BHL. * Passage points along the forward edge of the battlefield. * Lanes to the rear of the main battle area. * Assembly area. * Release point. 5-164. During a passage of lines, friendly unit density in a relatively small maneuver space may cause problems in the ability of the commander to maintain the common operating picture in relation to the passed and passing units. The stationary and passing commanders should determine the best method of exercising mission command to avoid slowing the tempo of the operation and to reduce fratricide potential. Rehearsal 5-165. A rehearsal is beneficial to all units responsible in the execution of a passage of lines operation. The rehearsal allows the passing and stationary unit to work through issues commonly found during this complex operation. The rehearsal allows for easy identification of the passage points and routes to and from areas of operations, and for the units to conduct a communication linkup on voice and digital communication systems. Other rehearsal items include the following: * Fire support observation plan, target execution, communication linkages, and mutual support operations. * Fire support coordination measures confirmation. * Unit routes and positioning review. * Obstacles, lanes, bypasses, and marking locations, and descriptions. * Passage points, routes, and recognition procedures. Verify these and review number of vehicles by type expected at each passage point. * Route management, contact points, and use of guide’s confirmation. * Locations for and movement of sustainment units. Arrange for mutual support and any transfer of supplies. * Locations of aid stations, ambulance exchange points, and CASEVAC procedures. Responsibilities 5-166. The stationary unit is responsible for providing the passing unit with as much assistance as possible. Indirect and direct fire support from the stationary unit to the passing unit is pivotal to the success of the rearward passage of lines. Stationary unit support is especially important in covering the withdrawal of elements left in contact during a delay. The stationary unit's fire support assets answer calls for fire from the passing unit until battle handover occurs. The passing unit's fire support assets echelon rearward to provide continuous fire support for the passing unit until it successfully transitions. Once the passing unit hands over control of the battle to the stationary unit, the stationary unit initiates and clears calls for all fires forward of its location. The same procedure applies to the dedicated air defense assets of the passing and stationary units. 5-167. The stationary unit’s engineer assets provide support to prepare the defense and execute the passage. Priority of effort initially ensures that the passing unit can move through passage lanes around the stationary unit’s defensive positions. The passing unit shifts to close these passage lanes once the passing unit and any security elements disengage and withdraw through the security area and obstacles. The stationary unit provides the passing unit with the previously coordinated combat service support as far forward as possible. The stationary unit concentrates on providing the passing unit with emergency medical, recovery, and fuel supplies so the passing unit can move through the stationary unit’s positions rapidly.
3-98
147
Security Operations RELIEF IN PLACE 5-168. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). Commanders conduct a relief in place as part of a larger operation, primarily to maintain the combat effectiveness of committed units. Cavalry units conduct relief in place operations for the following reasons: * Reconstitute a unit that has sustained heavy losses. * Decontaminate a committed unit. * Rest a unit that has been in prolonged combat. * Conform to a larger tactical plan. * Resupply a defending Cavalry unit. * Assign a new mission to the relieved unit. * Introduce a new unit into combat. * Set the stage for resuming the offense. 5-169. Defensive relief is conducted to continue the defense. Cavalry units can relieve a larger force as an economy of force defensive mission. Offensive relief may follow from a follow-and-assume mission requiring a forward passage of lines. RELIEF TECHNIQUES 5-170. There are three techniques for conducting a relief: sequentially, simultaneously, or staggered. A sequential relief is the most time-consuming relief technique but the most secure. Relief proceeds by troop or company team. Normally, units are relieved in place with the relieving unit assuming the relieved unit’s positions and missions. This technique is most common when units have similar organizations or when occupied terrain must be retained. 5-171. The simultaneous relief technique is faster but less secure because all units are moving at the same time. The decentralized nature of a simultaneous relief requires close coordination to prevent excessive battlefield clutter. Once command groups and combat trains are collocated, troops move forward at the same time along designated routes. Relief occurs simultaneously at each location. Relieved units withdraw immediately upon relief. 5-172. A staggered relief occurs when a commander relieves each element in a sequence determined by the tactical situation, not its geographic orientation. A staggered relief occurs with relief elements occupying positions in-depth or adjacent to the relieved unit; this is considered an area relief. This technique is appropriate when units are dissimilar, when the relieving unit performs a different mission, or when improved defensive terrain is away from the line of contact. A staggered relief is also appropriate when the unit being relieved has been contaminated chemically or radiologically. The relieved unit withdraws one unit at a time or simultaneously and conducts a rearward passage of lines through the relieving unit, if appropriate. PLANNING CONSIDERATIONS 5-173. Fire support coordination and liaison are conducted between the units. If field artillery units are to be relieved, they are the first to collocate and the last to leave. DA Form 5517 (Standard Range Card) target lists, and overlays are given to the incoming unit to ensure the effective delivery of fire. If printed DA Form 5517s are not available, use what you have on hand. Fire support assets of the relieved unit remain in position throughout the relief of maneuver units and are prepared to support both units. Fire support assets of the relieving unit move into positions as quickly as possible so they can support both units during the relief. Combat trains are collocated to facilitate coordination and transfer of equipment, excess ammunition, fuel, water, and medical supplies. 5-174. The relieving unit establishes continuous liaison with the relieved unit immediately upon receipt of the order. The squadron command group moves to the contact point of the relieving unit to coordinate the operation. The relieving unit enters and monitors the command net of the relieved unit. Troops and company teams of both units remain on their internal and parent unit nets. The relieving unit maintains radio listening
3-98
148
Chapter 5 silence on all nets until the relief is complete. The sudden increase in radio traffic is a quick indictor to the threat that a relief is occurring. Upon passage of command, the relieving unit returns to its command net and lifts listening silence as necessary. The relieved unit should maintain radio listening silence during its withdrawal. MOVEMENT CONTROL 5-175. A priority of maintaining movement control is designating and ranking routes. The squadron executive officer supervises unit movement. Rally points for the relieved unit are used at company level to quickly organize the unit for withdrawal. Guides are positioned at critical points along the routes. AAs are designated and activities performed in these areas are specified. Separate AAs are designated for the incoming and outgoing units to minimize confusion. Time spent within AAs is minimized to avoid possible compromise. PASSAGE OF COMMAND 5-176. The division or corps order may specify the passage of command as a time when relief is to be completed. At unit level, the commanders mutually agree to the sequence for the passage of command. This is physically accomplished when a specified percentage, normally greater than one-half of the relieving units are in position and report relief. Passage of command at the squadron and TF level is acknowledged face-to-face by both commanders and passed to subordinates. CHANGE OF MISSION 5-177. A change of mission is another type of transition Cavalry units can expect during reconnaissance and security operations. Change of mission is established in the commander’s guidance and planned using branches and sequels. Change of mission is the term used when units transition from defensive to offensive operations or when the unit changes to a different type of security operation.
3-98
149
Chapter 6 Stability Ultimately, stability is the set of conditions in which a local population regards its governance institutions as legitimate and its living situation as acceptable and predictable (see ADP 3-07). To achieve stability within all operational frameworks, BCTs must understand the operational environment, shape the operational environment through action, and engage local leaders to influence the population. During stability operations, commanders conduct multiple missions and efforts to seek a common goal and end state that nests with the higher command’s objectives. SECTION I – PRINCIPLES AND FRAMEWORK 6-1. BCTs conduct reconnaissance and security operations during stability tasks to increase the commander and staff’s ability to understand the area of operations. Information collection confirms or denies assumptions made during planning and identifies sources of stability and instability. Reconnaissance and security operations contribute to mission command by answering information requirements, which enhances situational awareness and assists the BCT in applying the stability principles in an acceptable and predictable method. Ultimately, reconnaissance and security operations are vital to assisting the BCT in understanding their operational environment through the context of the stability principles. The four principles of stability tasks are— * Conflict transformation. * Unity of effort. * Legitimacy and host-nation ownership. * Building partner capacity. CONFLICT TRANSFORMATION 6-2. Conflict transformation is the process for reducing the means and motivations for violent conflict while developing more viable, peaceful alternatives for the competitive pursuit of political and socio-economic aspirations (see ADP 3-07). Transformation aims to set the host nation on a sustainable, positive trajectory in which transformational processes directly address the dynamics causing instability. BCTs contribute to conflict transformation only if they achieve understanding of the causes and influences of conflict and instability within their area of operations. 6-3. Reconnaissance and security operations assist in identifying the drivers of violent conflict and instability. Collected information impacts planning for future operations to help commanders and staffs identify opportunities linking tactical gains to sustainable strategic objectives. Transformation can occur only if the BCT understands the dynamics of conflict within their area of operations from an objective viewpoint and from the perspective of the local population. UNITY OF EFFORT 6-4. Unity of effort is the coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action (JP 1, Volume 2). Reconnaissance and security operations require unity of effort and purpose to achieve situational awareness at echelon to enable successful operations throughout the BCT’s area of operations.
3-98
150
Chapter 6 6-5. Reconnaissance and security operations assist the commander and staff in developing shared understanding between partners allowing BCTs to foster cooperative environments that focus efforts towards a common goal to achieve stable and sustainable security environments. LEGITIMACY AND HOST-NATION OWNERSHIP 6-6. Legitimacy is a condition based upon the perception by specific audiences of the legality, morality, or rightness of a set of actions, and of the propriety of the authority of the individuals or organizations in taking them (see ADP 3-07 for more information). Host-nation ownership is the will or ability of the ruling entity to resolve its own problems and assume responsibility for solutions that it supports and can implement. BCTs conduct reconnaissance operations focused on determining the extent of legitimacy as perceived by the local population and develop an understanding of areas of conflict that degrade, discredit, or erode perceptions of legitimacy. 6-7. Commanders direct reconnaissance operations and engagement activities to understand the mandate, manner, consent, and expectations of legitimate host-nation ownership and perceived legitimacy. (Refer to ADP 3-07 for more information on the four factors of legitimacy.) 6-8. BCTs conduct reconnaissance and engagement in close contact with the civilian population to collect information, reinforce the capabilities of host-nation security and governance partners, and understand the extent of support and acceptance of host-nation partners with the local population. BCTs actively seek sources of conflict and connectivity between the host nation and local population to assist partners in bridging gaps in perception and strengthening relationships. BUILDING PARTNER CAPACITY 6-9. Building partner capacity is the outcome of comprehensive inter-organizational activities, programs, and military-to-military engagements that enhance the ability of partners to establish security, governance, economic development, essential services, rule of law, and other critical government functions (see ADP 3-07). Reconnaissance and security TF collect information to ensure activities are consistent with tactical, operational, and strategic goals, protect key activities, and enable key capabilities to allow host-nation partners to develop and learn. BCTs conduct operations that enable host-nation partners to thrive and eventually develop sustainable capabilities independent of BCT interference or influence. STABILITY FRAMEWORK 6-10. BCTs conduct stability tasks and operations based upon conditions identified through collection. Reconnaissance operations confirm or deny the conditions and state of stability within the BCT’s area of operations. BCTs identify missions, tasks, and activities about the framework phases using continuous reconnaissance and security operations. (Refer to ATP 3-07.5 for more information.) The three phases of the stability framework are— * Initial response. * Transformation. * Fostering sustainability. INITIAL RESPONSE 6-11. Usually, activities to stabilize an area of operations are initial response actions. Typically, units perform initial response actions during or directly after a conflict or disaster in which the security situation prohibits the introduction of civilian personnel. Initial response actions aim to provide a secure environment that allows relief forces to attend to the immediate humanitarian needs of the local population. TRANSFORMATION 6-12. Stabilization, reconstruction, and capacity building are transformation actions performed in a relatively secure environment. Transformation actions may occur in crisis or vulnerable states and aim to build host-nation capacity across multiple sectors.
3-98
151
Stability FOSTERING SUSTAINABILITY 6-13. BCTs foster sustainability when the security environment is stable enough to support efforts to implement long-term programs that commit to the viability of the institutions and economy of the host nation. The BCT consolidates gains to encourage capacity-building reconstruction activities to enable sustainable development. Often military forces conduct these long-term efforts in support of broader, civilian-led efforts. SECTION II – OPERATIONS DURING STABILITY TASKS 6-14. Reconnaissance and security operations are imperative to successful stability tasks. Reconnaissance focuses on identifying enemy forces, human interaction and engagement, and vital infrastructure to collect information necessary to understand sources of stability and instability within the BCT’s area of operations. As the environment changes, so do the sentiments of the population and its key actors. Staffs continuously assess their area of operations based on information collected to provide context to understanding the human dimension of their area of operations. BCTs conduct security operations to establish safe and secure environments that enable positive gains and sustainable stability. Since the complexity of the human context is ever changing and evolving in any environment, reconnaissance and security operations are continuous. Commanders constantly reassess and refine intelligence estimates to determine if they are collecting the right information and developing intelligence to understand the operational environment. 6-15. BCTs conduct reconnaissance and security operations to gain an understanding of sources of stability and instability, and the intentions and capabilities of key actors to shape the BCT’s and unified action partners’ area of operations during stability tasks. Sources of instability are actors, actions, or conditions that exceed the legitimate authority’s capacity to exercise effective governance, maintain civil control, and ensure economic development. 6-16. Enemy forces influence instability sources to create conflict, exacerbate existing conditions, or threaten to collapse failing or recovering states. Sources of instability include catastrophic events, humanitarian crises, foreign power-instigated violence, domestic rebellion, and civil war. 6-17. The following vignette describes utilizing Cavalry squadrons in the execution of reconnaissance and security missions that enabled the BCT’s success during stability operations. Third Armored Cavalry Regiment in Tall Afar The city of Tall Afar is located in Northwestern Iraq and is a compact city with a mixed ethnic population of over 250,000 people. In late 2004, the Iraqi Security Forces (known as ISF) in Tall Afar collapsed, allowing enemy threat to impose a grip of terror on the city. Through violence and intimidation, the enemy took control of every aspect of the city and crippled the local government. The city divided, as the population was forced into sectarian boundaries, which helped to fuel sectarian and tribal violence across the city. The enemy’s firm grip on the city, coupled with the city’s geographically central location lying between the city of Mosul and the Syrian border, enabled the enemy threat to utilize Tall Afar and the surrounding region as a training ground and staging base for operations. Foreign fighters flooded in from Syria, finding sanctuary in Tall Afar and the surrounding cities and towns and increasing the enemy threat capacity to conduct operations in Mosul and across Northern Iraq. In April 2005, 3rd Armored Cavalry Regiment (known as ACR) deployed to the Southern Baghdad area of operations to conduct reconnaissance and offensive operations. For two months, 3rd ACR, partnering with the ISF, successfully conducted counterreconnaissance operations to deny enemy threat the ability to influence political and economic development within the capital city of Baghdad. During this time, 3rd ACR received orders to move their area of operations to the western region of the Ninewa Province. The regiment task-organized itself to conduct multiple operations across separate areas of operations. Ahead of the rest of the regiment, 2-3 ACR (Sabre Squadron) deployed to the Ninewa Province to conduct initial reconnaissance operations of the area of operations, including the city of Tall Afar. The regiment detached 3-3 ACR (Thunder Squadron), an engineer
3-98
152
Chapter 6 platoon, an attack aviation troop from 4-3 ACR (Longknife Squadron), a tank platoon from 1-3 ACR (Tiger Squadron), and Iraqi Army advisors from Tiger Squadron to remain in Southern Baghdad in order to support the 3rd Infantry Division. The remainder of the regiment moved to the Western Ninewa Province to begin operations against the highly organized enemy network that controlled the area. From May to July 2005, Sabre Squadron developed an accurate intelligence picture of the situation inside the city of Tall Afar through effective reconnaissance operations that, on many occasions, required them to fight for information. The squadron, reinforced by a tank company from Tiger Squadron, took the fight to the enemies, resulting in some of the toughest urban combat seen by American troops up to that point. In the month of June alone, over 210 unconventional enemy attacks occurred within the city, which accounted for over ten percent of all attacks in the Iraqi theater of operations at the time. These attacks targeted the civilian population, with the intents to increase the sectarian divide and create a chaotic situation. Sabre Squadron refused to back down and began building positive relationships with the locals. This initiative led to the collection of accurate intelligence that, in turn, enabled 3rd ACR to understand the composition and disposition of the enemy occupying the city. Ahead of 3rd ACR’s arrival to the Ninewa Province, Sabre Squadron had already begun reestablishing the local government and reconstituting local police to set conditions for the large-scale, combined offensive with the ISF that 3rd ACR leadership understood as necessary to eliminate the enemy threat within Tall Afar. As Sabre Squadron began to set conditions within Tall Afar, 3rd ACR leadership understood the need to set conditions across the surrounding region by establishing security outside the city. Tiger Squadron established itself in the area west of Tall Afar, where they liberated smaller cities and towns, effectively denying the use of these areas to the enemy threat and securing critical supply routes from the Syrian border to Tall Afar. Moving from location to location, Tiger Squadron reestablished security along the border, within the urban centers, and reconstituted ISF in those areas. Meanwhile, Longknife Squadron, the aviation squadron, conducted continuous reconnaissance and security operations across the surrounding desert region. With security in the surrounding region established, 3rd ACR had engineers construct an eight-foot-high berm around the city of Tall Afar, with the intents of isolating the enemy threat within the city and of funneling traffic through established security checkpoints. Conditions were set for 3rd ACR to execute Operation Restoring Rights. Operation Restoring Rights was the combined offensive between 3rd ACR and the ISF to take back Tall Afar. Third ACR integrated over 5,500 Iraqi soldiers and police officers into this operation with the augmentation of 1 battalion from the 2nd Iraqi Army Division, 5 battalions from the 3rd Iraqi Army Division, an Iraqi Special Forces battalion, a commando brigade, and the Mosul Emergency Police Battalion. Tiger Squadron conducted reconnaissance from the western portion of the area of operations into Tall Afar, where they conducted a relief in place with Sabre Squadron. Tiger Squadron assumed responsibility of operations on the western side of Tall Afar, while Sabre Squadron conducted operations on the eastern side of the city. Augmented by the 2-325 Infantry Battalion from the 82nd Airborne Division, 3rd ACR’s ground forces began clearing out enemy threat. They actioned on areas and targets throughout the city, using intelligence gathered from the local population and detainees. Precision artillery and close air support enabled ground forces to clear out areas in which they encountered heavy resistance, allowing them to continue to conduct house-to-house searches for enemy threat. From 24 August to 23 September 2005, 3rd ACR and their ISF partners killed over 150 enemy fighters and captured another 800, while the enemy was attempting to flee the city. The success achieved by the cooperation between 3rd ACR and the ISF emboldened Tall Afar’s population to retake control of the city, thereby denying the enemy the ability to establish another base from which to operate. Following the defeat of the enemy threat, Sabre Squadron and the 2-325 Infantry Battalion maintained security in Tall Afar and simultaneously recruited and trained a legitimate Iraqi police force. Tiger Squadron
3-98
153
Stability maintained a guard along the Syrian border to deny foreign fighters the ability to influence Tall Afar, and they began rebuilding the Iraqi Border Police Brigade. With security reestablished, 3rd ACR then worked to reestablish essential services, and they reconstituted a legitimate, Iraqi local government and security force. ISF inside and outside Tall Afar gained confidence and eventually took the lead in operations across the province. The development of legitimate ISF facilitated increased HUMINT from the local population, which enabled ISF to action quickly on local tips of false passport shops, weapons smugglers, and other activities supporting the nontraditional enemy threats. With little assistance from coalition forces, the ISF successfully denied the enemy threat freedom of maneuver throughout the Ninewa Province. During stability tasks, Cavalry units operate within the BCT’s area of operations. BCTs employ their Cavalry units to conduct route, area, and zone reconnaissance, as well as screen, guard, and area security (including route security) operations. This activity secures the affected population and answers BCT and higher PIRs. Cavalry units assist the commander and staff in visualizing and understanding the area of operations, and the external factors that may affect the area of operations 6-18. While BCTs can assign Cavalry squadrons to their own area of operations for a period, the use of Cavalry as a maneuver unit instead of as a reconnaissance and security organization incurs risk of incomplete or inadequate reconnaissance and security operations. When assigned their own area of operations, Cavalry squadrons conduct tasks to support stability in the same manner as other maneuver units. However, the capabilities within the Cavalry squadron and its size make it ideal for employment as an economy of force for the BCT. CAVALRY UNIT’S ROLE 6-19. The BCT commander relies heavily on the Cavalry squadron to conduct reconnaissance and security missions throughout all phases of stability operations. Force organization plays an integral part in stability operations and the commander uses force tailoring and task organization to get the right military force to conduct sustainment task operations. SQUADRON 6-20. The Cavalry squadron can conduct reconnaissance and security operations to support stability tasks. The Cavalry squadron achieves these goals during all phases of stability tasks within the entirety of the higher echelon’s area of operations. Additionally, the BCT can assign the Cavalry squadron its own area of operations where it could be placed upon a border or boundary having enemy infiltration routes, which allows the squadron to conduct screen or guard tasks for the main body. TROOP 6-21. The Cavalry troop conducts reconnaissance and security missions during stability tasks to answer PIRs, develop the commander’s understanding of the operational environment, and enable the squadron to shape the environment in the area of operations. The troop focuses reconnaissance efforts on gaining a detailed understanding of the operational environment’s sources of instability, and the capability and intentions of key actors as the unit moves from the initial response phase to the transformation phase of stability tasks. Specifically, the scout platoons collect information on civil considerations using areas, structures, capabilities, organizations, people, and events and operational variables (PMESII-PT). Scout platoons work directly with unified action partners to assist in their efforts. SUPPORT DURING STABILITY TASKS 6-22. Maneuver units require attachments to be optimally effective during stability operations. The nature of stability operations is complex; therefore, it requires diverse organizations with specialties to conduct reconnaissance and security operations.
3-98
154
Chapter 6 FIELD ARTILLERY 6-23. Fires require the right amount of force precisely applied to the correct target during the stability operation phases. Fires, often conducted in densely populated areas of operations, create the requirement for well-integrated and rehearsed airspace de-confliction, clearance of fires, and precision strike mission processes. Implementing reasonable fire support coordination measures, updating them continuously, and ensuring highly accurate (typically 10 meter or less target location error) target locations increases the effectiveness of fires in a stability environment. Targeting is an integral part of stability tasks to synchronize nonlethal effects and to conduct engagement planning. Cavalry may use fires frequently to defend key geopolitical sites or strike high-payoff targets located near restrictive fire areas and densely populated locations with precision munitions. Fire support officers and joint fire observers’ ability to plan, coordinate, and execute fires often with precision munitions to support stability tasks are crucial to mission success. Increasing the proportion of precision munitions used in fires and employment of nonlethal capabilities may be necessary to limit collateral damage. 6-24. A precision-guided munition is a guided weapon intended to destroy a point target and minimize collateral damage (JP 3-03). Precision-guided munitions collectively refer to munitions that strike on reflected electromagnetic energy (such as Hellfire missiles) and precision munitions. 6-25. A precision munition is a munition that corrects for ballistic conditions using guidance and control up to the aimpoint or submunitions dispense with terminal accuracy less than the lethal radius of effects (FM 3-09). Munitions with a precision capability (such as the Global Positioning System-aided Excalibur 155-mm projectile, guided multiple launch rocket system rockets, and the advanced precision munitions initiative 120-mm mortar rounds) have a circular error probable of less than 10 meters. Munitions with a near-precision capability (such as the precision guidance kit fuze for 155-mm artillery projectiles) have a circular error probable between 10 and 50 meters. Area capabilities have a circular error probable greater than 50 meters. Circular error probable is an indicator of the delivery accuracy of a weapon system. Circular error probable is a factor to determine probable damage to a target. Circular error probable is the radius of a circle within which half of the rounds fired at a target impact. Even at the munitions’ largest anticipated delivery error, the aimpoint is within the munitions’ anticipated radius of direct effects. The employment of precision munitions requires the use of current cryptological key information. 6-26. Rules of engagement often become more restrictive as phases of stability progress. Commander’s guidance for fires requires careful consideration during the development of the rules of engagement and engagement criteria. Units conducting reconnaissance and security operations must carefully consider the benefits and consequences of initiating fires or breaking contact if fires are initiated on the unit. 6-27. The BCT utilizes radars and indirect fire acquisition assets in a sensing mode that allows identifying the point of impact to protect friendly forces from indirect fire. These radars integrate with the air defense radar as part of the counter-rocket, artillery, mortar system that provides sense and warn capability for troop AAs and command posts. In areas subject to collateral damage, counterfire should employ precision munitions against well-located targets. The BCT must carefully consider the use of fires with munitions having only area capabilities due to the possible long-term adverse impact on relations with unified action partners and the indigenous population thereby contributing to sources of instability. BRIGADE ENGINEER BATTALION 6-28. The BEB provides reconnaissance and security operational support during all phases of stability operations. Engineers provide mobility, countermobility, survivability, technical reconnaissance, and infrastructure assessment capabilities. ENGINEERS 6-29. Engineer platoons task organize at the squad level to Cavalry units to support mobility, countermobility, and survivability. Engineer platoons can execute route and area reconnaissance organically. The route clearance platoon can provide mobility and limited disposal of mines. The support platoon or section can conduct initial infrastructure assessments and basic horizontal construction to restore services to support governance.
3-98
155
Stability 6-30. The engineer companies of the BEB can execute some stability tasks identified in reconnaissance and security operations as an organic unit throughout all phases of stability operations. If required by the commander, the BEB can conduct route and area reconnaissance, area security, patrols, limited raids, assessment and restoration of services and leader engagements. 6-31. Geospatial engineering teams can provide detailed products about the topography of a geographic area. Geospatial teams produce intelligence by analyzing images and geospatial data of terrain and various objects within a unit’s area of operations. These products can be analyzed and provided to Cavalry units to narrow the reconnaissance focus to specific objectives rather than a broad area. CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR 6-32. Each squadron has an organic CBRN reconnaissance and surveillance platoon that can execute CBRN-specific reconnaissance and surveillance tasks. The platoon supports route, zone, and area reconnaissance operations and can assess key infrastructure regarding CBRN hazards. The CBRN reconnaissance and surveillance platoon assesses possible threat locations and confirms or denies the presence of CBRN threats and hazards to assist with security operations. INTELLIGENCE 6-33. Commanders must be involved and knowledgeable of the information collection efforts to narrow the reconnaissance focus and shape the operational environment. Planning for stability tasks is quite complicated, and planners need to balance resources, capabilities, and activities. BCT staffs analyze the significance of various activities over time to maximize their efforts to provide stability. 6-34. Commanders often require detailed intelligence and IPB products to determine how to conduct operations, influence the local population, and mitigate sources of instability. The identification and analysis of actors, terrain and weather, and civil considerations are critical to determining the most effective missions, tasks, and locations for stability tasks. A lack of knowledge concerning the enemy threat, local politics, customs, culture, and differentiating between local combatants often leads to actions that can result in unintended and disadvantageous consequences. To achieve this understanding, the BCT commander attaches collection assets to the Cavalry squadron. 6-35. During stability tasks, the disclosure of military information to host-nation personnel and agencies requires consideration. The BCT S-2 must ensure the BCT has the required amount of foreign disclosure officers. A foreign disclosure officer may approve the disclosure of classified and controlled, unclassified military information to foreign representatives based on the policies, directives, and laws that govern the national disclosure policy and the release of classified information. The officer provides this service to the command and staff and to assigned, attached, and supporting unified action partners. 6-36. Stability tasks occur in and between the local populations, thus human contact with the local population has greater emphasis and importance. Observations and experiences of Soldiers, who often work with the local population, provide depth and context to information collected through reconnaissance and security operations. Remote Sensors 6-37. The BCT uses remote sensors to perform such tasks as perimeter defense, surveillance, environmental monitoring (including radiological and nuclear), and target acquisition. Remote sensors are not a military intelligence collection asset; however, they provide information that the BCT uses to cue military intelligence collection assets to activity. The BCT should consider remote sensors when preparing the information collection plan. Soldiers or robotic vehicles hand-emplace them either inside or outside buildings or structures. Their optimal employment is in areas where major movement is restricted to a few key lines of communications, and the traffic pattern of military and civilian activity can be easily discriminated. Remote sensor missions are ideally suited to support relatively stable situations, such as long-term defensive or security operations, where the time and resources are available to develop an extensive sensor network throughout the area of operations. 6-38. The employment of sensors in open terrain or heavily congested urban concentrations requires detailed planning to ensure the sensor network can provide the desired information in those environments. For
3-98
156
Chapter 6 stability tasks, sensors can provide surveillance of population centers and key infrastructure areas. They can also provide surveillance along the lines of communications and borders. The supported unit’s information collection plan includes provisions for sensor surveillance. Incorporating remote sensors into the information collection plan utilizes the employment concept and detailed instructions to execute remote sensor missions. BCTs develop requirements for sensor employment along with concepts for the monitoring and dissemination of sensor data and incorporate them into the information collection plan. The establishment of a comprehensive sensor network requires time and a significant investment of resources. During the planning requirements task, the operations and intelligence-working group identify SIRs that remote sensors can answer. As part of the information collection plan, the sensor surveillance plan specifies the— * Type and location of sensors, relays, and monitoring sites. * Time of emplacement and unit responsible for emplacing each sensor string and any relays. * Time of recovery and unit responsible for recovery. Expeditionary Military Intelligence Brigade 6-39. Expeditionary military intelligence brigades (known as E-MIBs) conduct multi-discipline intelligence operations during large-scale combat operations. E-MIB headquarters are required to exercise mission command over all assigned and attached elements. E-MIB headquarters provide reach capability, establish and maintain the corps intelligence architecture, and execute technical control of various capabilities. The size and composition of the deployed E-MIB and its subordinate organization is dependent on the mission required to be performed in-theater. An E-MIB provides the following capabilities─ * Analysis. * Processing, exploitation, and dissemination. * Open-source intelligence. * SIGINT and electromagnetic warfare integration. * Counterintelligence collection and activities. * Multidomain operations sensing and target development. 6-40. E-MIBs can augment corps, division, and BCT intelligence cells, specifically aiding the processing, exploitation, and dissemination of national and theater SIGINT and geospatial intelligence. Instead of deploying the E-MIB as a unit to conduct independent intelligence operations to support the corps, the corps commander, as part of force tailoring during planning, task organizes the E-MIB to support operations. The corps assistant chief of staff for intelligence (G-2) advises the commanders of the E-MIB’s capabilities and recommends how to task-organize its assets. SUSTAINMENT 6-41. Stability tasks require unique sustainment considerations. Commanders must remember that the design of the BSB supports only the BCT’s assigned Soldiers and equipment. Reconnaissance units often identify sources of instability that sustainment efforts can mitigate or shape immediately with a sustainment effort. If the BSB develops stability support plans, the BSB commander must ensure that sustainment estimates differentiate what is supporting internal BCT requirements and what is supporting external stability support mission requirements. Sustainment during stability tasks often involves supporting U.S. forces, multinational forces, and other contributing partners in a wide range of missions and tasks. INTERDEPENDENT CAPABILITIES 6-42. Cavalry and other units conducting reconnaissance and security operations during stability tasks often determine that they are not the first organization operating in the area. Units conducting reconnaissance and security operations can gain a better understanding through coordination and information and intelligence sharing with unified action partners. Below are some unified action partners that units can coordinate with during stability─ * SOF. * Civil affairs. * Governmental and nongovernmental organizations.
3-98
157
Stability SPECIAL OPERATIONS FORCES 6-43. Conventional forces build relationships and foster interdependence with U.S. SOF operating in the area. Interdependence is the deliberate and mutual reliance of one unified action partner on another’s inherent capabilities to provide complementary and reinforcing effects. These units execute different tactical tasks to support the operational objectives and end states to stabilize the area. BCTs rely on interdependence with unified action partners and SOF partnerships to combat sources of instability. The exercise of interdependence facilitates shared understanding between the U.S. actors in the operational environment. Interdependence provides a conduit by which the interagency and SOF partners can provide relevant, useful, and timely information. Planning efforts, update briefs, and working groups are specific events where BCTs incorporate their interagency partners. (Refer to FM 6-05 for more information on conventional forces and SOF integration, interoperability, and interdependence.) CIVIL AFFAIRS 6-44. Civil affairs support to stability tasks depends on the nature of the operation and the condition of the affected indigenous population and institutions. The S-9 and civil affairs units continually assess and monitor the host nation’s capabilities and capacity to identify and mitigate underlying causes of instability within society and, as required, apply functional skills which are usually the responsibility of civil government. Civil affairs conduct civil reconnaissance and develop civil information through interaction with the indigenous population, institutions, and unified action partners. During the transition from primarily offensive and defensive operations to primary stability operations, civil affairs units place greater emphasis on infrastructure restoration, economic stability, and support to governance expertise. GOVERNMENTAL AND NONGOVERNMENTAL ORGANIZATIONS 6-45. Units conducting reconnaissance operations must recognize the value of governmental and nongovernmental organizations and build effective relationships with these actors. Governmental and nongovernmental organizations could provide subject matter expertise in many essential services and governance topics. They are the primary provider of humanitarian, infrastructure, and essential services in immature operational environments. Governmental and nongovernmental organizations have experience and detailed knowledge of the civil environment and may have an understanding of civil considerations other than indigenous population and institutions. This insight can assist the civil reconnaissance effort in understanding and shaping the environment. 6-46. Understanding where governmental and nongovernmental organizations are on the battlefield and the nature of their activities develops a common operational picture. The common operational picture enables the commander and staff to anticipate changes to the operational environment, to anticipate the effects of governmental and nongovernmental organizations on primary stability tasks and operations, and to anticipate future friction points between the organizations. Building relationships with governmental and nongovernmental organizations may be difficult because these organizations are reluctant to establish associations with U.S. forces. The Cavalry must be mindful of the organizations’ reluctance and establish relationships on terms beneficial to all parties involved. Cavalry units frequently discover governmental and nongovernmental organizations unexpectedly within the operational environment so they should plan to encounter them during their operations. 6-47. Governmental and nongovernmental organizations can bring valuable resources, information regarding the civil population, the operational environment, and alternative perspectives to the brigade’s stability operation. (Refer to ATP 3-07.5 for more information.) Cavalry units operating with nongovernmental organizations follow these guidelines: * Military personnel wear uniforms when conducting relief activities. * Military personnel make prior arrangements before visiting nongovernmental organizations. * Military personnel do not refer to nongovernmental organizations as “force multipliers” or “partners” or other similar terms. * U.S. forces respect a nongovernmental organization’s decision not to serve as an implementing partner.
3-98
158
Chapter 6 SECTION III – ARMY STABILITY OPERATIONS TASKS 6-48. Army stability operations tasks are fundamental and are performed across the range of military operations, from stable peace to general war. Military forces execute Army stability operations tasks before, during, or after conflict to support a legitimate host-nation government, to assist a fragile state, or in the absence of a functioning civil authority. Each situation is unique. Each Army stability task and stability sector contains a number of related subordinate tasks. RECONNAISSANCE AND SECURITY STABILITY TASKS 6-49. BCTs conduct stability tasks to create conditions the local population regards as legitimate, acceptable, and predictable (see ADP 3-07). BCTs conduct continuous reconnaissance operations during stability tasks to develop information requirements, gain situational understanding of their area of operations, identify sources of conflict and instability, and identify opportunities to consolidate sustainable and positive gains. Reconnaissance and security operations assist the commander and staff with determining short-term impacts and long-term effects on their area of operations. Commanders then assess the effectiveness of their actions and adjust as needed. 6-50. BCT commanders consider each primary stability task and associated subtasks within the context of their particular area of operations (see figure 6-1). They also consider the perception of the local population and host-nation governance and security forces. The six Army primary stability operations tasks are— * Establish civil security. * Support to civil control. * Restore essential services. * Support to governance. * Support to economic and infrastructure development. * Conduct security cooperation.
3-98
159
Stability Figure 6-1. Stability tasks ESTABLISH CIVIL SECURITY 6-51. The burden on BCTs for establishing civil security is highest during the initial response phase of the stability framework when the host nation lacks the capability or capacity to provide security. BCTs conduct
3-98
160
Chapter 6 reconnaissance operations to collect information and conduct security operations to protect friendly units, the local population, key actors, and key terrain to enable the establishment of civil security. (Refer to ATP 3-07.5 for more information.) BCTs and subordinate units execute zone and area reconnaissance operations to identify sources of instability affecting civil security. Companies and troops conduct route reconnaissance missions to support area security operations and retain freedom of maneuver within the area of operations. BCTs identify sources of instability and identify key terrain to facilitate the commander and staff’s understanding of the area of operations, and to plan and execute stability mechanisms. The commander uses reconnaissance operations to make informed decisions about allocating resources to each subordinate to establish civil security. 6-52. BCTs conduct security operations to control borders, secure boundaries and provide freedom of movement, and to protect the main body, key personnel, and key facilities. Noncontiguous operations complicate the BCT’s ability to conduct security operations because potential threats use the civilian population as cover. BCTs employ mounted and dismounted patrols, engage with the local population, and employ aerial reconnaissance and observation posts to provide early warning, identify threats, and create opportunities. Security operations facilitate manageable transitions between stability framework phases and create dilemmas for threats that seek to undermine sustainable progress. 6-53. Area security operations are essential to stability tasks because they degrade the enemy’s ability to affect friendly units, host-nation governance and security forces, key leaders, and key facilities. BCTs conduct area security operations to preserve the higher commander’s freedom of maneuver, protect key infrastructure and leaders, and deny threats access and opportunity to disrupt progress. BCTs establish security zones around critical infrastructure, airfields, facilities, MSRs, lines of communication, towns, equipment, and high-value assets. Combined security operations with host-nation partners enable a transition to the transformation phase of the stability framework by empowering host-nation security and bolstering legitimacy. 6-54. During the fostering sustainability phase of the stability framework, the host-nation government assumes responsibility for securing its borders and for internal movement control. Remaining Army units consist of advisors or, in some cases, BCTs or battalions positioned as a deterrent against external threats. Advisors continue to help improve host-nation capacities as part of the larger security force assistance program. Potential external threats may cause military forces to conduct operations to confirm or deny threat intentions. SUPPORT TO CIVIL CONTROL 6-55. Civil control centers on rule of law. Civil control provides training and support to law enforcement and judicial personnel to promote efforts to rebuild host-nation judiciary and corrections systems. Units conducting reconnaissance identify critical resources, influential pillar organizations, or leaders, sources of instability, and unified action partners operating in the BCT’s area of operations to support establishing civil control. During the initial response phase, BCTs may be required to assist host-nation partners in building interim solutions to establish civil control, which builds upon host-nation governance. Security gains capacity and capability transitioning to the transformation phase. 6-56. Establishing security and rebuilding justice institutions develops conditions for reconciliation, public confidence, and subsequent economic growth. BCTs secure key infrastructure, identify key actors, and disrupt enemy forces. Reconnaissance tasks identify viable and working systems of government as well as gaps in civil control. Identification of government strengths and weaknesses focus efforts to collaborate with host-nation security forces and assist host-nation governance in providing viable security and services. Units conducting security tasks support civil control by interdicting threat activity seeking to subvert the local rule of law or legitimacy of an interim government through intimidation, corruption, or coercion. 6-57. During the transformation phase of the stability framework, BCTs continue to conduct operations with unified action partners with efforts focused on building partner capacity. Reconnaissance tasks support civil control by identifying local population perceptions and acceptance of host-nation governance and security forces, adequacy of local infrastructure security and viability, sources of corruption, indicators of progress or regression, and acceptance and adherence to the rule of law. Security tasks support civil control by providing early warning to threats on infrastructure, facilities, and leaders and assessments of host-nation capabilities.
3-98
161
Stability 6-58. BCTs transition to supporting civil control and host-nation independence during the fostering of stability phases. BCTs maintain an ability to assist host-nation forces when needed and according to the rules of engagement and status of forces agreement restrictions if applicable. Sustainable gains allow host-nation partners to conduct civil control with minimal input from the BCT. RESTORE ESSENTIAL SERVICES 6-59. Using stability operations to restore essential services contributes to the social well-being of the population. BCTs conduct area and zone reconnaissance to identify areas requiring assistance to repair or rebuild, identify public health hazards or outbreaks, and verify locations and dispositions of displaced civilians who require aid and support but have no access to key services. BCTs identify popular perceptions of legitimacy through censuses and engagement with the local population. Route reconnaissance identifies mobility corridors to facilitate sustainment operations, humanitarian services and support to outlying or urban areas, evacuation routes for noncombatant evacuation operations, and freedom of movement and maneuver. Units conducting security operations support the primary Army stability task of restoration of essential services. Units conduct area security operations independently or they partner with host-nation security forces. 6-60. During the transformation phase, BCTs conduct reconnaissance operations in concert with host-nation security partners to identify sources of instability adversely affecting host-nation partners to meet the needs of the populace. Security forces screen or guard infrastructure projects, provide security to outlying areas and local government infrastructure, services, and leaders. Security forces also identify enemy safe havens or sources of support. SUPPORT TO GOVERNANCE 6-61. During the initial response phase, the BCT may function as the transitional military authority to establish governmental services and work with established governmental authorities, if any are present, to increase capability. BCTs conduct security operations to protect governing officials, key facilities, and eventually, polling locations. 6-62. During the transformation phase, the BCT begins to transition its responsibility for governance to civilian authority. In some cases, authority transfers to host-nation representatives that may or may not be the same host-nation government before the operation. As host-nation institutions develop, the BCT continues to collect information indicating good governance through advising, assisting, and supporting host-nation partners as well as identifying sources of instability and corruption that seek to disrupt or degrade effective governance. BCTs conduct reconnaissance operations to identify effective and ineffective governing bodies, to identify locations for potential polling and elections, and to maintain freedom of movement and maneuver. BCTs conduct security operations to protect governing officials, key facilities, and polling locations. BCTs conduct guard missions to protect polling boxes and election officials during the transformation phase to prevent enemy disruption on the civilian population. 6-63. BCTs eventually transfer governance to host-nation authorities and authority for governance reducing BCTs’ involvement with established governments and transition partnerships to State or other government agencies. Reconnaissance and security operations transfer to appropriate host-nation security forces though BCTs continue to monitor governance developments and identify concerns to host-nation authorities and U.S. chains of command. SUPPORT TO ECONOMIC AND INFRASTRUCTURE DEVELOPMENT 6-64. BCTs identify infrastructure damage early in the stability framework’s initial response phase so commanders have the information they need as they conduct area assessments. While airborne and space platforms may provide imagery of damaged infrastructure, ground-based reconnaissance operations clarify the scope of the problem. BCTs assess the local impact and feelings of people in the area to make recommendations to higher headquarters on the importance of repair and development when multiple pieces of infrastructure need attention. Cavalry units must consider cultural aspects when conducting reconnaissance and shaping the environment regarding key infrastructure.
3-98
162
Chapter 6 INITIAL RESPONSE PHASE 6-65. The protection of natural resources and the environment may become tasks for the BCT during the initial response phase. In Iraq the willful burning of oil wells, damage to the oil pipeline infrastructure and the deliberate leaking of oil into the Persian Gulf are examples of incidents during the initial response phase. These incidents resulted in ground forces conducting reconnaissance and security missions over large areas to deter further incidents. The long-term macroeconomic recovery and development of a nation can depend on a small number of critical pieces of infrastructure. TRANSFORMATION PHASE 6-66. Multiple external specialist agencies participate in this task during the transformation phase. The transformation phase aims to establish the foundation for sustainable economic development and begin to transition control of economic growth to U.S. Government civil agencies, international civil agencies, and host-nation economic officials and entrepreneurs. BCTs’ balance of effort switches to security missions to support specialists who do the detailed work to facilitate economic and infrastructure development. Cavalry units’ probable mission sets include— * Screen or guard critical infrastructure. * Screening of a border area to prevent external actors adversely affecting economic development. * Conducting zone or area reconnaissance with a reconnaissance focus on social and economic indicators. * Route security so economic activity can take place in a safe and secure environment. 6-67. During the transformation phase, there may be an opportunity to expand the area of interest. Cavalry units continue to report infrastructure issues and economic activity in existing and new areas of operations. FOSTERING SUSTAINABILITY PHASE 6-68. In the fostering sustainability phase, the goal is to institutionalize a long-term sustainable economic development program and to transition control of the economy to host-nation officials, entrepreneurs, and civil society. This phase includes follow-on steps, which develop and reinforce the successes of the initial response and transformation phase. Steps taken during this phase support sustainable economic growth based on healthy communities and neighborhoods supporting a healthy society. CONDUCT SECURITY COOPERATION 6-69. Security cooperation is Department of Defense interactions with foreign security establishments to build relationships that promote specific United States security interests, develop allied and partner military and security capabilities for self-defense and multinational operations, and provide United States forces with peacetime and contingency access to allies and partners (JP 3-20). The U.S. military’s security cooperation organization often coordinates security cooperation in a country.
3-98
163
Chapter 7 Sustainment Sustainment units synchronize and execute sustainment operations to support units conducting reconnaissance, security, and stability operations under all conditions. Cavalry squadrons frequently operate in locations distant from their organic sustaining base. These Cavalry squadrons carry a configured load or are task organized with assets to ensure their sustainment until another unit can relieve them. Generally, units conducting reconnaissance and security operations have self-sustainment capability for up to 72 hours. Units conducting reconnaissance and security operations and sustainment staffs must anticipate future sustainment needs. An accurate estimate allows forces to retain freedom of movement and action along the entire width and depth of extended and contested lines of operation. SECTION I – OVERVIEW 7-1. Sustainment is the provision of logistics, financial management, personnel services, and health service support necessary to maintain operations until successful mission completion (ADP 4-0). The purpose of the Army’s logistics system is to sustain combat power on a continuous basis as far forward as possible. Sustainment principles and fundamentals, as well as roles and responsibilities, remain the same for all types of operations at the BCT-level and below. (Refer to ADP 4-0 for sustainment principles and fundamentals.) Successful sustainment planning and execution to support reconnaissance and security operations at the BCT level and below provides commanders with the flexibility required to develop the situation in close contact with enemy forces and civilian populations. 7-2. Reconnaissance and security operations executed at the BCT level involve fast-paced, wide-ranging operations requiring a rapid transition from one mission to another. Such operations involve extended lines of support, higher consumption rates, and present unique challenges to the BCT sustainment units’ ability to support and sustain reconnaissance and security operations. Based on the nature of their missions, BCT sustainment units may require EAB support and other nonorganic assets to support reconnaissance and security operations. 7-3. In most cases, a BSB’s FSC is in direct support of a squadron-sized unit conducting reconnaissance and security operations. Smaller reconnaissance organizations may have task-organized forward logistics elements (FLEs) in a direct, support sustainment role. A BCT conducting a cover operation has an organic BSB but may require augmentation from the division sustainment. The key to reconnaissance and security operations is a fully planned, war-gamed, and rehearsed support concept. SECTION II – PLANNING 7-4. Reconnaissance and security operations present unique challenges to sustainment staff planners. Planners need to consider many factors as they develop their support concepts. Challenges include the terrain and enemy situation, friendly situation, type of reconnaissance and security operation, levels of aggressiveness and pace, and duration of the operation. Planners consider the positioning of sustainment assets based on known friendly and predicted enemy actions, distances, and on-order requirements. 7-5. Sustainment plans for reconnaissance and security operations vary greatly according to the maneuver commander’s guidance for the tempo of the operation. For instance, stealthy reconnaissance operations may require a majority of pre-positioned stocks and the reliance on covered or concealed resupply routes to remain undetected. However, forceful reconnaissance operations where detection is not a concern may facilitate
3-98
164
Chapter 7 routine sustainment operations, such as LOGPACs, on any trafficable route at any hour of the day. Sustainment planners should conduct frequent coordination with adjacent units. LOGPACs may be required to pass forward and rearward through other units’ areas of operations and passage lanes beyond the squadron rear boundary. Often, adjacent unit sustainment assets may be closer to units performing reconnaissance and security that can best conduct recovery, evacuation, and emergency resupply. 7-6. Sustainment planners for reconnaissance and security operations must be aware of the enemy situation and threat level as units conduct these missions forward of friendly lines. High-payoff targets to enemy forces include sustainment vehicles, equipment, and support areas (such as fuel tankers, billets, and FARPs, respectively). Planners should consider intervisibility lines, covered and concealed positions for support areas, and covered and concealed routes for logistic package operations. 7-7. The lead sustainment planner in a maneuver battalion or Cavalry squadron is the S-4 assisted by the battalion or brigade personnel staff officer (S-1), a medical planner, and the BSB FSC commander. Representatives from these elements form the sustainment-planning cell ensuring integrated sustainment plans in all operational planning. The S-1 may have a representative at or near the aid station to monitor casualty operations. For reconnaissance and security missions above the battalion level, the majority of sustainment planning occurs in the brigade S-4 in close coordination with the BSB support operations section and FSC commanders. PLANNING FUNDAMENTALS AND PROCEDURES 7-8. Planners integrate sustainment planning into all operational planning and synchronize the concept of sustainment support with other areas of the operations concept. Planning is continuous and concurrent with ongoing support execution. BCT sustainment personnel (such as the S-4, S-1, surgeon, and FSC commander) actively participate in the unit’s maneuver planning process, including course of action development and war-gaming. The goal is to ensure support during all phases of an operation. 7-9. To provide effective support, sustainment planners and operators understand the mission statement, commander’s intent, and concept of operations. The S-4, with input from the FSC and headquarters and headquarters troop commanders, the medical service officer, and the squadron executive officer handles production of paragraph 4 (Sustainment) of the OPORD, which includes the following: * Commander’s reconnaissance and security sustainment priorities. * Sustainment overlay. * Supply routes. * Logistics release points. * CASEVAC points. * Maintenance collection points. * Class III and class V resupply during the mission if necessary. * Movement criteria and triggers for logistics nodes. 7-10. To predict support requirements, sustainment planners determine the following: * Type of support required. * Quantities of support required. * Priority of support by type and unit. 7-11. After determining the support requirements, sustainment planners assess— * Sustainment resources available (organic and supporting). * Status of the sustainment resources (location, maintenance, and personnel status). * Time sustainment resources are available to the unit. * Configuration of resources and methods of distribution available. 7-12. Based on facts and assumptions, planners develop the sustainment estimate for the operation. The sustainment estimate is the formal, detailed analysis of the sustainment that supports an operation. During execution, planners use a running estimate to provide information to the commander.
3-98
165
Sustainment 7-13. To facilitate rapid planning, Force XXI Battle Command, brigade and below provides sustainment planners with reports to assist in planning. Supplemented by their actual operational experience, sustainment planners take advantage of— * Running estimates, status charts, and automatic estimation tools. * Updated status reports when the commander issues a WARNORD. * Established planning factors, historical data, and data tailored for their unit. * Procedures and organizations specified in the SOPs. LOGISTICS 7-14. Logistics consist of supply, field services, maintenance, transportation, operational contract support, general engineering support, and distribution. Supply operations consider all classes of supply. For units conducting reconnaissance and security operations, usually classes III (B) (petroleum, oil, and lubricants [bulk]), IV (construction materials), V, VIII (medical), and IX are priority items for replenishment. 7-15. The BCT will limit or suspend most field services during reconnaissance and security operations. Field services are those essential services for enhancing the quality of life of Soldiers. They include clothing repair and exchange, laundry and shower support, mortuary affairs, aerial delivery, and field feeding. The only field service provided to maneuver units during reconnaissance and security operations is field feeding. The FSC provides field-feeding support. Logistics organizations at EAB coordinate and provide all other field services. 7-16. Maintenance is all actions taken to retain material in a serviceable condition or to restore it to serviceability. The Army utilizes a tiered, two-level maintenance system composed of field and sustainment maintenance. Field maintenance is on system maintenance, repair, and return to the user including maintenance actions performed by operators (FM 4-30). Mechanics and technicians organic to the BSB FSC maintenance platoon and the BSB field maintenance company perform field maintenance, and at times, from EAB. The unit maintenance officer and FSC, perform maintenance management including determining and utilizing battle damage assessment and repair, evacuation, and controlled exchange. (Refer to ATP 4-33 for more information.) Battle damage assessment and repair occurs at the point of fault or at the maintenance collection point. Battle damage assessment and repair properly applied at the point of fault may immediately return the equipment to a mission-capable status or prolong its functional life, which may be critical to maintaining combat power during reconnaissance and security operations. (Refer to ATP 4-31 for more information.) Maintenance planners recognize that an information requirement regarding the decision to echelon the combat trains forward is influenced by the amount of activity in the maintenance collection point. The maintenance collection point should maintain mobility so that it may support the reconnaissance or security mission at extended ranges. 7-17. Transportation support for units conducting reconnaissance and security operations is coordinated through the unit S-4 and FSC to the BSB support operations officer. Many transportation requirements exceed organic assets and require support from EAB transportation units. 7-18. Operational contract support occurs during all phases of operations and has increased emphasis during stability operations and area security missions. Trained and ready contracting officer representatives, field-ordering officers, and paying agents are a necessity to most units. These personnel are part of a larger acquisition team at higher echelons, which include the contract and financial management experts who provide guidance and direction to each field ordering officer and paying agent to meet the unit’s needs. 7-19. The S-4 coordinates general engineering support through the BCT S-3. Engineering support includes engineering capabilities and activities excluding combat engineering that modifies, maintain, or protect the physical environment. Examples include facility construction, repair, maintenance, and operation. 7-20. Logistics distribution to units conducting reconnaissance and security operations is either routine or emergency. Whenever possible, units conduct routine resupply daily based on METT-TC (I) utilizing either throughput, logistics release point, or supply point distribution methods.
3-98
166
Chapter 7 ROUTINE RESUPPLY 7-21. Routine resupply is operations that are planned based on projected or actual consumption rates received through reporting. Routine resupply includes LOGPAC operations, aerial delivery, and operational contract support. Logistics Package Operations 7-22. The logistic package is a centrally organized resupply convoy originating from field trains. The field trains transport the supplies needed to sustain a unit for a specific time, until the next scheduled LOGPAC. 7-23. Logistics planners utilize anticipation to standardize push packages as much as possible to provide all units with sufficient quantities. Accurate logistics reporting, along with the commander’s guidance and priorities, allows logistics planners to forecast supply requirements quickly. Inaccurate, incomplete, or untimely logistics status and situation reporting can severely handicap efforts to balance unit requirements and available supplies. This reduces the amount of time a unit can continue conducting reconnaissance and security operations. Planners must also consider the likely increased width and depth at which reconnaissance and security operations occur, as this can drastically affect consumption rates and LOGPAC operational timelines. Aerial Delivery 7-24. Units can use aerial delivery, which is an essential sustainment operation, to support reconnaissance and security missions. Aerial delivery operations reduce the risks associated with conducting ground resupply. Units can conduct aerial delivery in various operational environments where terrain limits access. Aerial delivery operations include sling-load, airdrop, and air-land procedures. The type and availability of aircraft limits aerial delivery. Aerial delivery may also compromise locations of units conducting reconnaissance and security operations. (Refer to ATP 4-48 for more information.) Operational Contract Support 7-25. Units may use operational contract support to assist units conducting reconnaissance and security operations. Operational variables and mission variables are considerations that affect employment of contract support during reconnaissance and security operations. (Refer to ATP 4-10 for more information.) EMERGENCY RESUPPLY 7-26. Emergency resupply operations may utilize any of the distribution methods with expedited distribution. Units conduct emergency resupply using the fastest appropriate means based on METT-TC (I). Emergency resupply may involve classes I (rations and gratuitous issue of health, morale, and welfare items), III, V, VIII, and IX. Aerial delivery is the fastest method to conduct emergency resupply, but may be limited due to aircraft availability and other circumstances. Usually, the FSC’s supply and transportation platoon located in the combat trains conduct emergency resupply. Pre-rigged loads of standard resupply packages may reduce the response time for emergency resupply. (Refer to ATP 4-45 and ATP 4-48 for details about rigging supplies for airdrop.) PERSONNEL SERVICES 7-27. Personnel services are sustainment functions that man and fund the force, maintain Soldier and Family readiness, promote the moral and ethical values of the nation, and enable the fighting qualities of the Army (ADP 4-0). Personnel services that are essential to units conducting reconnaissance and security operations include personnel accountability and strength reporting, casualty operations, and religious support. The unit S-1 and the squadron unit ministry team provide personnel services to the units. (Refer to ADP 4-0 and FM 1-0 for more information.) CASUALTY OPERATIONS 7-28. Casualty operations during reconnaissance and security operations present unique challenges to units. Units must rehearse casualty operations before commencement. Casualty operations include production,
3-98
167
Sustainment dissemination, coordination, validation, and synchronization of information regarding each casualty. Casualty information includes casualty reporting, casualty notification, casualty assistance, line-of-duty determination, disposition of remains, and disposition of personal effects, military burial honors, and casualty mail coordination. 7-29. As casualties occur, the nearest observer informs the unit first sergeant via the most expedient means. The unit first sergeant submits a personnel status report to the squadron S-1 documenting duty status changes. The unit first sergeant classifies casualties by injury type at the casualty collection point and enters them into the medical treatment system. The first sergeant ensures completed DA Form 1156 (Casualty Feeder Card) is forwarded to the S-1 who then enters the data into the Defense Casualty Information Processing System. 7-30. Platoon combat medics record the treatment the casualty received on the casualty’s DA Form 7656 (Tactical Combat Casualty Care [TCCC] Card) by electronic means or by utilizing a DD Form 1380 (Tactical Combat Casualty Care [TCCC] Card), if available. The squadron S-1 receives notifications updating the Soldier’s patient tracking status as changes occur, and in turn, informs the Soldier’s troop for accountability. HEALTH SERVICE SUPPORT 7-31. Health service support encompasses all support and services performed, provided, and arranged by the Army Medical Department to promote, improve, conserve, or restore the mental and physical well-being of personnel in the Army. Additionally, as directed, provide support in other Services, agencies, and organizations. This includes casualty care (encompassing a number of Army Medical Department functions—organic and area medical support, hospitalization, the treatment aspects of dental care and behavioral/neuropsychiatric treatment, clinical laboratory services, and treatment of chemical, biological, radiological, and nuclear patients), medical evacuation, and medical logistics (FM 4-02). Squadrons have an organic medical platoon consisting of an ambulance squad and treatment squad equipped to provide mobile medical treatment and ground medical evacuation to the combat casualty. Combat medics provide tactical combat casualty care to wounded Soldiers. Squadrons assign combat medics under the operational control of the platoon and under the technical supervision of the squadron surgeon and squadron physician assistant. 7-32. Additionally, a forward resuscitative and surgical detachment may be attached to the BSB medical company to provide a rapidly, deployable, immediate surgical capability as a result of an extended battlefield for those critically injured patients who cannot be transported over great distances without surgical intervention and stabilization. Further Army Health System support at EAB may be available from the supporting medical brigade (support). 7-33. The brigade surgeon, in coordination with the BSB medical company commander, develops the health service support portion of the brigade’s support concept. The S-1, S-4, and medical platoon leader should participate in the concept development rehearsal before execution. SOLDIER EVACUATION 7-34. Squadrons conduct reconnaissance and security missions over wide and extended areas. The squadron must place careful attention on the location of medical treatment facilities and the availability of medical evacuation platforms (air and ground) against time-distance factors when developing the support operation concept and should realize the nearest aid station may not be their own. Casualties may need to be transported to another battalion’s aid station. This must be considered during planning. Medical Evacuation 7-35. Medical evacuation is the timely and effective movement of the wounded and injured. Medical professionals perform evacuation using dedicated, standardized, medical evacuation platforms. Medical professionals provide timely, efficient movement and en route care of injured or ill persons to medical treatment facilities. Medical evacuation ground and air ambulance platforms are platforms designed especially for the medical evacuation mission, with allocated medical equipment to provide en route care by trained medical personnel.
3-98
168
Chapter 7 7-36. The medical evacuation plan is a crucial part of the medical operational plan or OPORD. The brigade surgeon section handles development of the BCT medical evacuation plan. The medical evacuation plan identifies ambulance exchange points and casualty collection points. Support graphics in Force XXI Battle Command, brigade and below display these locations. Additional ambulance support is coordinated with the supporting sustainment unit operations section and the supporting medical company. 7-37. While the platoon medics and platoon sergeant evacuate casualties from the point of injury to the troop, casualty collection point, the troop first sergeant or troop medics handle medical evacuation of patients from the troop, casualty collection point to the aid station. The squadron conducts reconnaissance and security operations over wide and extended areas; therefore, the BCT squadron and troop medical planners must consider using adjacent unit aid stations. Ambulance teams from the supporting medical company evacuate patients from the aid station back to the role 2 medical treatment facility located in the BSA. The pre-positioning of ambulance teams with the aid station reduces ambulance turnaround times. Medical evacuation of patients should be no further than their condition requires so they can return to duty as soon as possible. 7-38. The preferred method of medical evacuation is by air, but air evacuation is dependent upon aircraft availability and the mission variables of METT-TC (I). Ground evacuation is the primary method of evacuation. The evacuation platoon provides area support to all units in the supported area. The brigade aviation element and surgeon, in conjunction with higher headquarters, coordinates the use of air medical evacuation (see figure 7-1). 7-39. Medical planners anticipate the potential for high casualty rates, long evacuation distances, and adverse weather when developing the medical evacuation plan. They identify and coordinate ambulance exchange points for all operations, including the locations of ambulance exchange points for all phases of each operation. Medical assets need planned triggers. For example, when the forward element reaches a certain PL, they trigger the medical assets to advance to their next designated location. Planners retain the flexibility to shift nonstandard evacuation assets to support mass casualties or CASEVACs when required. Plans and exercises should include any available air evacuation to transport urgent litter patients. Figure 7-1. Process for evacuation of the wounded
3-98
169
Sustainment Note. Although the role 3 hospital is a medical brigade asset dependent upon the scenario and area of operations, the combat support hospital could be located closer to the patient or located in the area of operations laterally (central) to a role 2 facility. Depending upon the severity of the injury, location of appropriate medical treatment facilities, and available clinical specialties that the patient may require based on clinical judgment, the role 2 medical treatment facility (with or without fire support task) may be bypassed and a particular role 3 element selected as the medical evacuation destination for a particular patient with particular injuries. (Refer to FM 4-02, ATP 4-02.2, and ATP 4-02.10 for more information.) Casualty Evacuation 7-40. CASEVAC involves the unregulated movement of casualties using predesignated tactical or logistic aircraft and vehicles. These vehicles and aircraft are not staffed with medical personnel and organic medical equipment for en route care unless augmentation is planned in the operational plan. If the combat medic is not available to provide care en route, the combat lifesaver may accompany the casualties to monitor their condition. CASEVAC Casualties transported in nonmedical vehicles may not receive proper medical care during transport. If the casualty’s medical condition deteriorates during transport, or the casualty is not transported to the appropriate medical treatment facility, an adverse impact on prognosis and long-term disability or death may result. SUPPORT AREAS 7-41. A logistics support area is a designated location where sustainment elements, some staff elements, and other elements locate to support unit operations. Support areas represent an echelon of support. The method employed to echelon support is a deliberate, collaborative decision, based upon thorough mission analysis and the MDMP conducted by the leadership and staffs at the brigade, squadron, and troop levels. The primary support area for units conducting reconnaissance and security operations is the BSA. Trains are echeloned forward to provide fluid support to units conducting reconnaissance and security operations. The positioning of FLEs and FARPs are essential to reconnaissance sustainment planning. TRAINS 7-42. Trains are a grouping of unit personnel, vehicles, and equipment organized to provide sustainment. Units use the trains concept to arrange their subordinate sustainment elements. Squadron combat trains are usually under the control of the headquarters and headquarters troop commander or the S-4 and assisted by the S-1. Squadron field trains are under control of the FSC commander. Troop trains are usually under control of the troop commander or executive officer. The composition and location of unit trains vary depending upon the number of units attached to or augmenting the unit, as well as other mission variables. Trains have two basic configurations: as unit trains in one location (appropriate when the squadron consolidates during reconstitution and during major movements) or as echeloned trains. Considerations include the following: * The troop commander determines the troop trains, which may consist of the troop first sergeant, supply sergeant, and troop medical assets. Maintenance teams from the FSC may be included. * The FSC forms the squadron field trains and portions of the squadron combat trains. The squadron commander and staff, the BSB commander and staff, and the FSC commander must collaborate to determine the best method of employment commensurate with the support brigade concept. 7-43. The trains should change locations frequently depending upon available time and terrain. The trains change locations to provide the forward support to the Cavalry unit, when an area becomes unusable because of environmental conditions, or to follow protection (survivability) operations.
3-98
170
Chapter 7 BRIGADE SUPPORT AREA 7-44. The BSA is the sustainment hub of the BCT. Usually, the BSA is located near an MSR where there is minimum threat from enemy artillery and mortar fires. For this reason, the BSA usually locates far behind where units conducting reconnaissance and security operations are located. Normally, the BSA includes the BSB (less FSCs as applicable), the alternate command post for the higher headquarters (if formed), the squadron field trains, elements from adjacent units or separate companies, and other sustainment units from EAB. FORWARD LOGISTICS ELEMENT 7-45. An FLE includes task organized, multifunctional logistics assets to address specific sustainment missions, which is characteristic of reconnaissance and security operations. The FLE operates from a forward logistics base or support area. The FLE represents the BSB commander’s ability to weigh the effort for the operation by drawing on all sustainment assets across the brigade. Additionally, the BSB commander may coordinate with EAB to provide support capabilities to augment the FLE in the concept of support. BSB support includes identifying and positioning EAB unit assets in proximity to geographically dispersed forces to extend the operational reach and prolong endurance. The intent for employing an FLE is to minimize tactical pauses to the reconnaissance and security plan and enable momentum for the commander. FORWARD ARMING AND REFUELING POINT 7-46. The FSC is organic to support aviation operations as required by the combined arms battalion. The FARP provides fuel and ammunition for the sustainment of aviation maneuver units during decisive operations. Usually, FARPs employ to support aviation operations when the distance covered or endurance requirements exceed normal capabilities of the aircraft. (Refer to ATP 3-04.17 for more information.) SECURITY OF SUPPORT AREAS 7-47. Within a support area, a designated unit provides area security, terrain management, movement control, mobility support, clearance of fires, and required tactical combat forces. Area security operations focus on the protected force, base, base camp, route, or area, which allows sustainment units to focus on their primary function. When commanders utilize sustainment units for security operations, logistical operations may be adversely affected. Security of sustainment efforts during reconnaissance resupply is a critical factor to successful operations. (Refer to ADP 4-0 for more information.) 7-48. The security of the trains in the support area is the responsibility of the individual in charge of the trains. The best defense is to avoid detection. The following activities ensure trains security: * Select sites that use available cover, concealment, and camouflage. * Enforce strict movement and positioning discipline as well as noise and light discipline to prevent detection. * Establish a perimeter defense using the occupy procedures for AAs. * Establish rest plans. * Identify an alarm or warning system that would enable rapid execution of the defense plan without further guidance. Usually, the SOP includes the alarm, warning system, and defense plan. * Designate a reaction force. ECHELONS ABOVE BRIGADE SUSTAINMENT SUPPORT 7-49. Units conducting large-scale combat operations and reconnaissance and security operations require sustainment support from EAB sustainment units, particularly in maintenance and medical support. Typically, an EAB sustainment brigade provides support to units conducting reconnaissance and security operations. The unit conducting reconnaissance and security may require EAB units to provide water purification, petroleum storage, and transportation support. The medical brigade and the multifunctional medical battalion provide additional medical capability as needed. The FSC, in conjunction with the unit S-4, requests EAB assistance through the BSB. (Refer to ATP 4-93 for more information on the sustainment brigade and the combat sustainment support battalion.)
3-98
171
Sustainment SECTION III – CONSIDERATIONS 7-50. Reconnaissance, security, and stability operations present significant challenges to sustainment organizations. Units conducting reconnaissance and security operations should consider increased days of supply on all vehicles, the location of trains, resupplying forward of the LD and line of contact, increased class V priority on indirect fires systems and class III (B), medical evacuation over greater distances and dispersed areas, and FLEs. Wide and deep reconnaissance and security operations have the potential to contact mass quantities of dislocated civilians and detainees as well as captured enemy ammunition and equipment, all of which require sustainment operational planning. SUSTAINMENT OF RECONNAISSANCE OPERATIONS 7-51. Maintaining momentum is the overriding consideration when supporting reconnaissance and security operations. Specific considerations guide planning and preparation. Emphasis, priorities, and requirements may shift as the operation is underway. The availability of adequate supplies and transportation to sustain the operation becomes critical as the operation progresses. As reconnaissance elements advance, MSRs lengthen and communications are strained. Units conducting reconnaissance and security operations suspend most field service functions except for the increased distribution of ready-to-eat meals. Sustainment units are often at risk of compromising the stealth of the reconnaissance operation due to their footprint; therefore, reconnaissance plans must consider resupply methods that emphasize cover and concealment and the reduction in the frequency of resupply. Reconnaissance operations plan for the disposition of captured enemy supplies and equipment, particularly ammunition and vehicles. 7-52. Units conducting reconnaissance and security operations may receive support from additional CBRN platoons task organized to provide additional reconnaissance or decontamination support. Sustainment considerations for CBRN units supporting include coordinating push packages for unique equipment repair parts and consumables. AREA AND ZONE RECONNAISSANCE 7-53. Units conducting area and zone reconnaissance should consider the echeloning of sustainment. Units should plan for the increased consumption of ammunition, petroleum, oils, and lubricants when pre-positioning trains. Planning consideration for refuel on the move, maintenance requirements, and push packages of preplanned and preconfigured essential logistics items should be part of the considerations in sustainment planning. Area and zone reconnaissance plans should account for an increase in vehicular maintenance, especially when operating over rough terrain, and mitigate risk through the positioning of maintenance support teams well forward. Unit distribution should occur at forward locations. Units should plan for aerial resupply. Area and zone reconnaissance plans include dispersed patient collection points and multiple ambulance exchange points. Units should coordinate increased class VIII consumption and augmentation of medical treatment elements. Sustainment units conducting resupply operations for units conducting reconnaissance must plan for and utilize all available resources for cover and concealment to mitigate the risk of enemy compromise. ROUTE RECONNAISSANCE 7-54. Sustainment for units conducting route reconnaissance consists of the same factors as area reconnaissance. Additionally, units plan for rapidly increasing distances and longer turn-around times for MSR operations. Units should consider recovering damaged vehicles only to the MSR for further recovery by higher headquarters’ assets. RECONNAISSANCE IN FORCE 7-55. Units conducting reconnaissance in force should plan for increased consumption of classes III, V, and VIII, as well as forward located recovery and maintenance support. Direct and indirect fire contact is much more likely, given the nature of reconnaissance in force, which means units must be postured for rapid resupply and maintenance to continue the reconnaissance effort. During reconnaissance in force, unit commanders must also plan for the retrograde or reinforcement of the force, or the exploitation of success
3-98
172
Chapter 7 which means estimating a higher consumption of classes III and V, or simply increasing the amount of emergency classes III and V resupply at the combat trains command post. SUSTAINMENT OF SECURITY OPERATIONS 7-56. Security missions tend to be defensive in nature. Security operations must make the best use of available preparation time and sustainment resources. As with reconnaissance, emphasis on any particular consideration varies with the mission assigned and shifts during mission execution. Security missions include screen, guard, cover, and area security. As they are able, units conducting security operations utilize a deception plan for sustainment preparations and operations. SCREEN 7-57. Screen operations can occur at any level. The FSC supports screen operations at the troop level. Sustainment planning for units conducting screen operations includes considerations for increased use of class III (B) and class V. Considerations for the pre-position of limited amounts of ammunition, petroleum, oil, and lubricant, and barrier material in centrally located forward positions should be included. Screening units conduct resupply during limited visibility to reduce the chance of enemy interference, and emergency resupply well forward during lulls in the battle or as required. Sustainment units supporting screen operations should select MSRs that do not interfere with the movement of maneuver units. Units should plan mobility operations to maintain MSRs. Plans should limit the forward flow of supplies to supplies essential for the operation only and should include the destruction of supplies and equipment (except medical) not evacuated. When time or the enemy situation constrains forward repair of equipment, screening units should prioritize recovery and evacuation of equipment to preclude loss to the enemy. Units should utilize all available noncombat vehicles to tow disabled vehicles. GUARD 7-58. Units conduct guard operations at the battalion level and above. Sustainment planners for units conducting guard operations consider echeloning sustainment assets. Units conducting guard operations should plan for displacement of sustainment assets so uninterrupted support continues. Units conducting guard operations should understand that sustainment units cannot provide support while displacing. Units conducting guard operations use push packages of critical supplies on a scheduled basis and continues routine resupply until the using unit requests otherwise. Sustainment planners request additional sustainment assets from higher headquarters to support attachments or extended operations. Units conducting guard operations plan for displacement of support assets and supplies early to keep routes open and preclude unnecessary interference with maneuver units. 7-59. Since the guard force must protect the main body by fighting to gain time, while also forcing the enemy main body to deploy early, the guarding unit should prioritize forward repair of equipment as much as possible to avoid being decisively engaged. If displacing to avoid decisive engagement, units should prioritize recovery over forward repair until they reach a suitable time and location to continue forward repair. If units have met triggers for transition, they should prioritize recover and evacuation of equipment. In addition, because guarding is defensive in nature, guarding units should also plan for an increased usage of class IV material and supplies. COVER 7-60. The BCT executes cover operations. Cover operations require full BSB sustainment support with the probability of echeloned support from above brigade, such as the sustainment brigade or medical brigade. Sustainment for units conducting covering operations consists of the same factors as the screen and the guard at the BCT level. Cover operations consider additional transportation requirements for the movement of all essential classes of supply. Cover operations consider a plan to compensate for lost sustainment capability, and as missions become more dynamic in execution, determining ways to increase the mobility of forward support assets to maintain pace with the unit. Cover operations anticipate greater numbers of civilians on the battlefield and detainees than screen or guard operations.
3-98
173
Sustainment AREA SECURITY 7-61. Area security operational plans consider increasing their use of barrier materiel, lethal and nonlethal munitions, and operational contract support. The BSB supports area security missions. Many sustainment considerations in area security operations coincide with sustainment of stability tasks, such as the plan for and anticipation of detainees and dislocated civilians. STABILITY OPERATIONS 7-62. Stability operations are required when there is no fully functional, legitimate, civil governing authority present in a theater of operations. Stability operations involve comprehensive efforts to stabilize states in crisis and to build the capacity of vulnerable states. Units conducting stability operations conduct a broad range of offensive and defensive tasks under the stability framework phases of initial response, transformation, and fostering sustainability. The BSB and EAB units support stability operations. (Refer to ATP 3-07.5 for more information.) 7-63. During the initial response phase, units conducting stability operations should emphasize area security and immediate humanitarian needs. Units should understand medical eligibility of care requirements for the theater of operations, especially regarding civilians, dislocated civilians, and detainees. During transformation, units conducting stability operations may execute border control and boundary security operations over extended lines of communication that may require echeloned and area sustainment support beyond the capabilities of organic sustainment units. SECTION IV – SPECIAL CONSIDERATIONS 7-64. Reconnaissance, security, and stability operations requirements are diverse; therefore, units conducting them are likely to receive attachments and detachments. Due to their diverse mission set, units conducting reconnaissance and security operations may consider special sustainment requirements for specific units. ATTACHMENTS 7-65. When receiving attachments, sustainment planners should receive or obtain some basic information from the sending unit’s S-4 to anticipate support requirements. Planning considerations include— * Mission. * Number and type of vehicles, personnel (by specialty), and weapon systems. * Current status or strength. * Duration of unit attachment and effective times. * Support assets accompanying the attachment. * When and where linkup is to occur, coordination measures for the linkup (such as near and far recognition signals), and who handles the linkup. DETACHMENTS 7-66. The unit conducting reconnaissance and security may detach a subordinate element to other units or organizations for certain missions. The units use the same considerations that apply to receiving attachments. Company-size detachments deploy with the appropriate level of support to include maintenance, classes III and V resupply, and medical materials based upon length of time the unit is detached. Additionally, this applies to troops operating at a considerable distance from the unit’s sustainment assets but is still attached technically. The S-4 should send the same information as that listed in the preceding paragraph to the receiving unit’s S-4. 7-67. Attachment and detachment reports reflect the addition or subtraction of units if the attachment or detachment is effective for more than 24 hours. Upon notification of pending attachments or detachments, the unit S-4 immediately notifies the FSC and BSB. Sustainment units continue to have an area support capability and responsibility for units in or transitioning through their area of operations.
3-98
175
Appendix A Echelons Above Brigade Considerations A-1. Corps and division commanders depend on situational understanding to seize and retain the initiative. Corps and division commanders require reconnaissance formations to develop the situation through action and in particular, to determine enemy intentions, strengths, and disposition. Commanders require security forces to provide early warning, maneuver space, and time for the employment of the main body. Cavalry forces must be able to deploy to advantageous positions while concurrently developing the situation for the joint TF commander. Cavalry forces regionally aligned to combatant commands ensure the capability is resident throughout all phases of a joint operation. A-2. All units have the responsibility to conduct reconnaissance and security tasks to support their own operations within their area of operations. Commanders may assign corps or divisions a dedicated reconnaissance and security formation, such as a Cavalry squadron. In the absence of a dedicated formation, commanders can resource the capability from assigned forces. The corps commander may designate and task organize a BCT while simultaneously, a division commander may designate and task organize a Cavalry squadron to perform reconnaissance and security operations. An example is a BCT reconnaissance and security TF, under the command and control of the corps headquarters, conducting a screen along a corps front. If a corps requires capabilities beyond a task-organized BCT (such as for reconnaissance in force, a guard, or a cover), the corps commander may task a division. Another option for corps and division commanders is to assign security requirements to subordinate units for execution. As an example, a division tasks a Cavalry squadron to conduct zone reconnaissance or guard within their respective area of operations. A-3. Mission analysis is essential to the corps and division commander’s decision to determine how to execute reconnaissance and security operations. Mission analysis evaluates the mission variables of METT-TC (I), the gain received by creating a reconnaissance and security TF, and the operational effectiveness of the formation that resource the reconnaissance and security TF. To enhance the corps or division commander’s ability to plan the execution of reconnaissance and security during mission analysis, the commander forms a reconnaissance cell within the staff headed by the G-3 (assistant chief of staff, operations). The reconnaissance cell is responsible for planning and synchronizing operations for the reconnaissance and security TF to ensure it is properly nested with the commander’s intent and the information collection plan. (See figure 1-2, page 1-12 as an example of Recon Cell.) One determining factor for assigning reconnaissance and security tasks to subordinate units is their ability to accomplish their primary missions, such as attack or defend, while simultaneously executing assigned corps or division reconnaissance and security tasks. Considerations for establishing a reconnaissance and security TF include the following: * What is the purpose and intent for reconnaissance and security? * Does the purpose and intent for reconnaissance and security require an independent formation under corps or division control? * What are the impacts to other subordinate unit missions? * How does the employment of the reconnaissance and security TF mitigate risks to the mission and enable overall mission accomplishment? * What are the risks of employment and how does the corps or division mitigate the risks? * How does the corps or division sustain a reconnaissance and security TF? * Which additional enablers does the TF require? * Is the reconnaissance and security TF commander able to control the necessary enablers? * What is the proficiency of the unit tasked with conducting reconnaissance and security? * What is the duration of the task organization and mission?
3-98
176
Appendix A A-4. The decision to employ a Cavalry squadron for reconnaissance and security depends upon the mission variables of METT-TC (I). The division commander considers several factors before detaching a Cavalry squadron from a BCT to execute independent reconnaissance or security operations. These factors are— * Is the mission distinct from that assigned to the BCT? * Is the BCT able to accomplish its mission without the Cavalry squadron? * What sustainment does the detached Cavalry squadron require? * What additional artillery, aviation, engineer, air defense, electromagnetic warfare, and maneuver forces does the Cavalry squadron require? * Is staff augmentation required to control necessary enablers? A-5. Corps and division commanders should consider additional factors when addressing mission duration and unit proficiency. One factor commanders should consider is that reconnaissance and security are enduring and enabling tasks that support all operations and transitions. A second factor to consider is that unit proficiency usually increases as leaders and Soldiers become more competent in the individual and collective tasks associated with reconnaissance and security operations. In addition, habitual task organization and relationships increase cohesion and understanding of SOPs in addition to building trust. Rotating the mission and designation between formations increases unit turbulence and reduces the ability to develop reconnaissance and security expertise within the command. A third factor commanders should consider is that units may require time to adjust to the differing METT-TC (I) factors between offensive and defensive operations and reconnaissance and security operations. There are also adjustments as units that usually operate at one echelon provide support for a higher echelon (such as a Cavalry squadron usually supporting a brigade is now supporting a division). A-6. Simultaneous with determining the best means for meeting reconnaissance and security requirements, corps or division commanders must determine the necessary task organization to conduct these operations in close contact with the enemy and civilian populations. The commander determines task organization during war-gaming supported by a thorough review of the mission variables, IPB, and risks. Commanders must understand that the constantly changing operational environment requires decentralized, combined arms formations capable of working with joint and interagency partners to collect critical information, provide the level of security required in a given situation, and defeat a variety of threats from state and nonstate actors. These various aspects provide a general list of recommended capabilities for reconnaissance task organization. As an example, for reconnaissance in force, commanders place particular emphasis on the maneuver, mobility, and fires requirements since fighting for information is probably a key aspect of the mission. A-7. Task organizing a reconnaissance and security formation for employment at EAB should include the following capabilities: * Ground maneuver.  Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or area; anticipated enemy and the need to fight for information; speed required; detail required; mobility about the enemy and the main body.  Security capabilities: size of the security area or area of operations; anticipated enemy; requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities. The formation must have the capability to prevent enemy forces from gaining a position of advantage across a division front or flank to collect and target the division and subordinate BCTs. Simultaneously, the formation must protect organic or supporting capabilities. While the force conducts reconnaissance in support of maneuver, it must be able to secure key terrain for follow-on forces without degrading its ability to continue further reconnaissance. The distance between the force and the following BCT must be considered when allocating the proper additional combat power. * Manned aviation.  Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or area; anticipated enemy and the need to fight for information; speed required; terrain.  Security capabilities: size of the security area or area of operations; anticipated enemy; requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; terrain.
3-98
177
Echelons Above Brigade Considerations * UASs. dependent on unit capabilities, speed required, number and types of NAIs or reconnaissance objectives, and terrain. * Mobility.  Engineer reconnaissance capabilities: dependent on the information requirement detail and breadth of area reconnoitered; detail of infrastructure required.  Engineer mobility capabilities: dependent on obstacles anticipated and the requirement to breach; types and number of gaps anticipated and required to cross. * Countermobility. Capabilities: dependent on time available and whether it is a stationary or moving operation; capacity of organic capabilities; obstacle intended affect against enemy reconnaissance or maneuver capabilities. * Indirect fires.  Planning: planning considerations for task organizing capabilities to support the reconnaissance and security TF with indirect fire support, target acquisition, mobility, and survivability.  Supporting reconnaissance: dependent on organic capabilities; anticipated enemy and the need to fight for information; distance from the main body or supporting fires capabilities. The division may task a BCT to provide additional artillery support to the reconnaissance and security BCT or Cavalry squadron through augmentation of, at a minimum, a field artillery battery. The corps and division may also allocate other supporting lethal and nonlethal fires including joint fires, such as close air support, electromagnetic attack capabilities, or offensive cyberspace operations.  Supporting security: dependent on organic capabilities; anticipated enemy; requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; distance from the main body or supporting fires capabilities.  Indirect fires radar capabilities: dependent on other units’ ability to provide radar coverage; distance from main body. * Intelligence.  SIGINT capabilities: dependent on the requirement to collect on specific aspects of enemy communications; distance from the main body and capabilities of SIGINT assets; site exploitation requirements.  HUMINT capabilities: dependent on time available to collect; specific information required; site exploitation requirements. The theater or corps may task-organize HUMINT capabilities to provide interrogation capabilities down to the brigade.  Geospatial intelligence capabilities: dependent on time and UAS assets available to collect specific information required. * Protection.  Air defense capabilities: dependent on the air threats and ability of other ADA units to provide coverage. The division can attach or provide as direct support, mobile short-range air defense capabilities to counter enemy aerial threats, such as fixed-wing and rotary-wing aircraft. The division may task-organize additional capabilities as operational control, tactical control, or in a supporting role. These may include radars, counter-UAS, counter-air, or counter-rocket, artillery, and mortar capabilities.  Survivability capabilities: dependent on the volume of hardening of command-and-control facilities and other critical infrastructure. potential for the employment of CBRN threats and hazards requiring increased standoff predetonation layers. Examples are enhanced personal protective equipment and posture, such as applying reactive armor to vehicles, sapi plates to fragmentation vests, and mission-orientated protective posture improvements.  CBRN reconnaissance and decontamination capabilities: dependent on the division receiving CBRN reconnaissance capabilities to its forces. In some cases, the division may task organize a hazard response company to the BCT or Cavalry squadron to provide decontamination and additional CBRN reconnaissance capabilities.
3-98
178
Appendix A * Sustainment.  Capabilities supporting reconnaissance: dependent on the breadth and depth of the reconnaissance mission, organic sustainment capabilities, and duration of the mission.  Transportation capabilities: dependent on the mobility of the unit conducting reconnaissance, travel distance, time available, and speed required.  Capabilities supporting security: dependent on the breadth and depth of the security area or area of operations, organic sustainment capabilities, and duration of the mission.  Transportation capabilities: dependent on the mobility of the unit conducting security, distance required to travel, time available, and terrain.  Capabilities to support the unique requirements of all attached enablers in terms of maintenance, recovery, and classes of supply  Capabilities to provide health service support in terms of ability to transport casualties over extended distances to role 1 and role 2 levels of care. (See ADP 4-0.) * Command and control.  The staff, which is dependent on the enablers and attachments employed by the Calvary force, should be augmented to provide the requisite capability to enable the commander’s understanding, plan operations, and synchronize the employment of enablers.  The level of headquarters is dependent on span of control, unity of command required, and discretion of the commander. Assign the appropriate level of command to the force.  The reconnaissance and security BCT and Cavalry squadron S-6 must plan, engineer, install, operate, and defend the tactical portion of the Department of Defense information network-Army, known as the tactical network. The S-6 employs a network defense-in-depth to ensure the availability, protection, and delivery of network resources and critical information. This facilitates the allocation of network services to enable mission accomplishment under all conditions. A-8. Task organizing a formation for employment at EAB requires detailed planning and staff analysis. Normally, these units are modular forces that require various enablers and augmentation based on METT-TC (I) and staff analysis to answer the division or corps commander’s PIRs.
3-98
179
Appendix B Annex L (Information Collection) Format and Instructions B-1. Appendix B provides fundamental considerations, formats, and instructions for developing Annex L (Information Collection) in Army plans and orders. Annex L provides a format for the annex that can be modified to meet the requirements of the base order and operations and for an example information collection plan. This annex follows the five-paragraph attachment format. B-2. The information collection annex describes how information collection activities support the offensive, defensive, and stability or defense support of civil authority operations throughout the conduct of the operation described in the base order. Annex L synchronizes activities in time, space, and purpose to achieve objectives and accomplish the commander’s intent for reconnaissance, surveillance, and intelligence operations (including military intelligence disciplines). The G-3 (S-3), in conjunction with the G-2 (S-2), is responsible for this annex. [CLASSIFICATION] Place the classification at the top and bottom of every page of the attachments. Place the classification marking (TS), (S), I, or (U) at the front of each paragraph and subparagraph in parentheses. Refer to AR 380-5 for classification and release marking instructions. Copy ## of ## copies Issuing headquarters Place of issue Date-time group of signature Message reference number Include the full heading if attachment is distributed separately from the base order or higher- level attachment. ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] (U)References: List documents essential to understanding Annex L. a. List maps and charts first. Map entries include series number, country, sheet names or numbers, edition, and scale. b.List other references in subparagraphs labeled as shown. c.Doctrinal references for this annex include FM 2-0 and FM 6-0. [page number] [CLASSIFICATION]
3-98
180
Appendix B [CLASSIFICATION] ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] (U)Time Zone Used Throughout the Plan/Order: Write the time zone established in the base plan or order. 1.(U) Situation. a.(U) Area of Interest. Refer to Annex B (Intelligence) or Appendix 2 (Operation Overlay) to Annex C (Operations). b.(U) Area of Operations. Refer to Appendix 2 (Operation Overlay) to Annex C (Operations). (1) (U) Terrain. Describe the aspects of terrain that impact information collection. Refer to Annex B (Intelligence) as required. (2) (U) Weather. Describe the aspects of weather that impact information collection. Refer to Annex B (Intelligence) as required. c.(U) Enemy Forces. Refer to Annex B (Intelligence) as required. d.(U) Friendly Forces. Refer to base order, Annex A (Task Organization) and Annex C (Operations) as required. e.(U) Interagency, Governmental, and Nongovernmental Organizations. Identify and describe other organizations in the area of operations that may impact the conduct of operations or implementation of information collection-specific equipment and tactics. Refer to Annex V (Interagency Coordination) as required. f. (U) Civil Considerations. Describe the critical aspects of the civil situation that impact information collection activities. Refer to Appendix 1 (Intelligence Estimate) to Annex B (Intelligence) and Annex K (Civil Affairs Operations) as required. g. (U) Attachments and Detachments. If pertinent, list units or assets attached to or detached from the issuing headquarters. State when each attachment or detachment is effective (for example, on order, on commitment of the reserve) if different from the effective time of the base plan or order. Do not repeat information already listed in Annex A (Task Organization). h. (U) Assumptions. List any information collection-specific assumptions that support the annex development. 2. (U) Mission. State the mission of information collection in support of the operation—a short description of the who, what (task), when, where, and why (purpose) that clearly indicates the action to be taken and the reason for doing so. 3.(U) Execution. a. (U) Concept of Operations. This is a statement of the overall information collection objective. Describe how the tasks or missions of reconnaissance, surveillance, security, intelligence operations, and so forth support the commander’s intent and the maneuver plan. Direct the manner in which each element of the force cooperates to accomplish the key information collection tasks and ties that to support of the operation with task and purpose statement. Must describe, at minimum, the overall scheme of maneuver and concept of fires. Refer to Appendix 1 (Information Collection Plan) to Annex L (Information Collection). The following subparagraphs are examples. Omit what is unnecessary for brevity. (1) (U) Movement and Maneuver. Provide the scheme of movement and maneuver for collection assets and any other unit given a key information collection task, in accordance with the concept of operations in the base order (paragraph 3b) and Annex C (Operations). Describe the employment of information collection assets in relation to the rest of the force and state the method forces will enter the area of operations. [page number] [CLASSIFICATION]
3-98
181
Annex L (Information Collection) Format and Instructions [CLASSIFICATION] ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] (2) (U) Intelligence. Describe the intelligence concept for supporting information collection. Refer to Annex B (Intelligence) as required. (3) (U) Fires. Describe the concept of fires in support of information collection. Identify which information collection assets have priority of fires and the coordinating purpose of, priorities for, allocation of, and restrictions on fire support and fire support coordinating measures. Refer to Annex D (Fires) as required. (4) (U) Protection. Describe protection support to information collection. Refer to Annex E (Protection) as required. (5) (U) Engineer. Describe engineer support, if applicable, to information collection. Identify priority of mobility and survivability assets. Refer to Annex G (Engineer) as required. (6)(U) Sustainment. Describe sustainment support to information collection as required. Refer to Annex F (Sustainment). (7)(U) Signal. Describe signal support to information collection as required. Refer to Annex H (Signal). (8) (U) Soldier and Leader Engagement. State overall concept for synchronizing information collection with Soldier and leader engagement. Refer to coordinating instructions in Annex C (Operations). (9) (U) Assessment. If required, describe the priorities for assessment for the information collection plan and identify the measures of effectiveness used to assess end state conditions and objectives. Refer to Annex M (Assessment) as required. b. (U) Tasks to Subordinate Units. State the information collection task assigned to each unit not identified in the base order. Refer to Appendix 1 (Information Collection Plan) to Annex L (Information Collection) as required. (1)(U) Information Collection Support Tasks for Maneuver Units. (a)(U) Tasks to Maneuver Unit 1. (b)(U) Tasks to Maneuver Unit 2. (c)(U) Tasks to Maneuver Unit 3. [page number] [CLASSIFICATION]
3-98
182
Appendix B [CLASSIFICATION] ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] (2) (U) Information Collection Support Tasks for Support Units. Direct units to observe and report in accordance with Appendix 1 (Information Collection Plan) to Annex L (Information Collection). (a)(U) Military Intelligence. Refer to Annex B (Intelligence) as required. (b)(U) Engineer. Refer to Annex G (Engineer) as required. (c)(U) Fires. Refer to Annex D (Fires) as required. (d)(U) Signal. Refer to Annex H (Signal) as required. (e)(U) Sustainment. Refer to Annex F (Sustainment) as required. (f)(U) Protection. Refer to Annex E (Protection) as required. (g)(U) Civil Affairs. Refer to Annex K (Civil Affairs Operations) as required. c. (U) Coordinating Instructions. List only instructions applicable or not covered in unit standard operating procedures (SOPs). (1)(U) Time or Condition When the Plan Becomes Effective. (2) (U) Priority Intelligence Requirements. List priority intelligence requirements (PIRs) here, the information collection tasks associated with them, and the latest time information is of value for each PIR. (3) (U) Essential Elements of Friendly Information. List essential elements of friendly information (EEFIs) here. (4) (U) Fire Support Coordination Measures. List fire support coordination measures. Establish no fire areas. (5) (U) Intelligence Handover Lines with Adjacent Units. Identify handover guidance and parameters; refer to necessary graphics or attachments as required. (6) (U) Limits of Advance, Limits of Reconnaissance, and Quick Reaction Force Response Instructions. Identify as required, referencing graphical depictions in attachments or instructions as needed. (7)(U) Airspace Coordinating Measures. List airspace coordinating measures. (8) (U) Intelligence Coordination Measures. List information such as restrictions on international borders or other limitations and the coordination or special instructions that apply. Identify what unit is responsible for coordinating information collection activities in relation to the area of operations. [page number] [CLASSIFICATION]
3-98
183
Annex L (Information Collection) Format and Instructions [CLASSIFICATION] ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] (9) (U) Rules of Engagement. Refer to Appendix 11 (Rules of Engagement) to Annex C (Operations) as required. (10) (U) Risk Reduction Control Measures. State reconnaissance, surveillance, and security- specific guidance such as fratricide prevention measures not included in SOPs, referring to Annex E (Protection) as required. (11)(U) Environmental Considerations. Refer to Appendix 5 (Environmental Considerations) to Annex G (Engineer) as required. (12) (U) Other Coordinating Instructions. List only instructions applicable to two or more subordinate units not covered in the base plan or order. 4.(U) Sustainment. Describe any sustainment requirements, subparagraphs may include: a. (U) Logistics. Identify unique sustainment requirements, procedures, and guidance to support information collection. Specify procedures for specialized technical logistics support from external organizations as necessary. Use subparagraphs to identify priorities and specific instructions for information collection logistics support. Refer to Annex F (Sustainment) and Annex P (Host-Nation Support) as required. b. (U) Personnel. Identify unique personnel requirements and concerns, associated with information collection, including global sourcing support and contracted linguist requirements. Use subparagraphs to identify priorities and specific instructions for human resources support, financial management, legal support, and religious support. Refer to Annex F (Sustainment) as required. c. (U) Health Service Support. Provide information including the health threat (endemic and epidemic diseases, state of health of the enemy forces, medical capabilities of the enemy force and the civilian population), and medical evacuation routes, barriers, and significant terrain features. Refer to Appendix 3 (Health System Support) to Annex F (Sustainment) as required. 5.(U) Command and Signal. a.(U) Command. (1) (U) Location of the Commander and Key Leaders. List the location of the commander and key information collection leaders and staff officers. (2) (U) Succession of Command. State the succession of command if not covered in the unit’s SOPs. (3)(U) Liaison Requirements. State information collection liaison requirements not covered in the unit’s SOPs. b.(U) Control. (1) (U) Command Posts. Describe the employment of command posts, (CPs), including the location of each CP and its time of opening and closing, as appropriate. State the primary controlling CP for specific tasks or phases of the operation. (2) (U) Reports. List reports not covered in SOPs. Describe information collection reporting requirements for subordinate units. Refer to Annex R (Reports) as required. [page number] [CLASSIFICATION]
3-98
184
Appendix B [CLASSIFICATION] ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number] [(code name)]—[issuing headquarters] [(classification of title)] c. (U) Signal. List signal operating instructions for information collection as needed. Consider operations security requirements. Address any information collection specific communications and digitization connectivity requirements. Refer to Annex H (Signal) as required. ACKNOWLEDGE: Include only if attachment is distributed separately from the base plan or order. [Commander’s last name] [Commander’s rank] The commander or authorized representative signs the original copy. If the representative signs the original, add the phrase “For the Commander.” The signed copy is the historical copy and remains in the headquarters’ files. OFFICIAL [Authenticator’s name] [Authenticator’s position] Use only if the commander does not sign the original attachment. If the commander signs the original, no further authentication is required. If the commander does not sign, the signature of the preparing staff officer requires authentication and only the last name and rank of the commander appear in the signature block. ATTACHMENTS: List lower-level attachment (appendixes, tabs, and exhibits). Appendix 1–Information Collection Plan Appendix 2–Information Collection Overlay DISTRIBUTION: (if distributed separately from the base order). [page number] [CLASSIFICATION]
3-98
185
Glossary The glossary lists acronyms and terms with Army or joint definitions. Where Army and joint definitions differ, (Army) precedes the definition. Terms for which FM 3-98 is the proponent are marked with an asterisk (*). The proponent manual for other terms is listed in parentheses after the definition. SECTION I – ACRONYMS AND ABBREVIATIONS AA assembly area ABCT armored brigade combat team ACR armored Cavalry regiment ACS air Cavalry squadron ACT air Cavalry troop ADA air defense artillery ADP Army doctrine publication AFI Air Force instruction AFTTP Air Force tactics, techniques, and procedures AR Army regulation ATP Army techniques publication BCT brigade combat team BEB brigade engineer battalion BHL battle handover line BSA brigade support area BSB brigade support battalion CASEVAC casualty evacuation CAV Cavalry CBRN chemical, biological, radiological, and nuclear CCIR commander’s critical information requirement class I rations and gratuitous issue of health, morale, and welfare items class III petroleum, oil, and lubricants class III (B) petroleum, oil, and lubricants (bulk) class IV construction materials class V ammunition class VIII medical class IX repair parts and components for equipment maintenance DA Department of the Army DD Department of Defense (form) DOD Department of Defense
3-98
186
Glossary EAB echelons above brigade EEFI essential element of friendly information E-MIB expeditionary military intelligence brigade ERT engineer reconnaissance team FARP forward arming and refueling point FFIR friendly force information requirement FLE forward logistics element FLOT forward line of own troops FM field manual FSC forward support company G-2 assistant chief of staff, intelligence G-3 assistant chief of staff, operations HUMINT human intelligence IBCT Infantry brigade combat team IPB intelligence preparation of the battlefield ISF Iraqi Security Forces JP joint publication LOA limit of advance LOGPAC logistics package LTIOV latest time information is of value MCRP Marine Corps reference publication MCWP Marine Corps warfighting publication MDMP military decision-making process METT-TC (I) mission, enemy, terrain and weather, troops and support available, time available, civil considerations, and informational considerations mm millimeter MSR main supply route NAI named area of interest NTTP Navy tactics, techniques, and procedures OPORD operation order PIR priority intelligence requirement PL phase line PMESII-PT political, military, economic, social, information, infrastructure, physical environment, and time [operational variables] RDSP rapid decision-making and synchronization process S-1 battalion or brigade personnel staff officer S-2 battalion or brigade intelligence staff officer S-3 battalion or brigade operations staff officer S-4 battalion or brigade logistics staff officer S-6 battalion or brigade signal staff officer S-9 battalion or brigade civil affairs operations staff officer SIGINT signals intelligence
3-98
187
Glossary SIR specific information requirement SOF special operations forces SOP standard operating procedure TAI target area of interest TF task force TUAS tactical unmanned aircraft system UAS unmanned aircraft system U.S. United States WARNORD warning order SECTION II – TERMS adversary A party acknowledged as potentially hostile to a friendly party and against which the use of force may be envisaged. (JP 3-0) area reconnaissance A type of reconnaissance operation that focuses on obtaining detailed information about the terrain or enemy activity within a prescribed area. (ADP 3-90) area security A type of security operation conducted to protect friendly forces, lines of communications, and activities within a specific area. (ADP 3-90) battle handover line A designated phase line where responsibility transitions from the stationary force to the moving force and vice versa. (ADP 3-90) bypass criteria Measures established by higher echelon headquarters that specify the conditions and size under which enemy units and contact may be avoided. (ADP 3-90) command and control The exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. (JP 1, Volume 2) commander’s critical information requirement Specific information identified by the commander as being essential to facilitate timely decision making. (JP 3-0) commander’s visualization The mental process of developing situational understanding, determining a desired end state, and envisioning an operational approach by which the force will achieve that end state. (ADP 6-0) confirmation brief A brief subordinate leaders give to the higher commander immediately after the operation order is given to confirm understanding. (ADP 5-0) cover (Army) A type of security operation done independent of the main body to protect them by fighting to gain time while preventing enemy ground observation of and direct fire against the main body. (ADP 3-90) decision point A point in space and the latest time when the commander or staff anticipates making a key decision concerning a specific course of action. (JP 5-0)
3-98
188
Glossary decision support matrix A written record of a war-gamed course of action that describes decision points and associated actions at those decision points. (ADP 5-0) decision support template A combined intelligence and operations graphic based on the results of war-gaming that depicts decision points, timelines associated with movement of forces and the flow of the operation, and other key items of information required to execute a specific friendly course of action. (JP 2-0) decisive point Key terrain, key event, critical factor, or function that, when acted upon, enables commanders to gain a marked advantage over an enemy or contribute materially to achieving success. (JP 5-0) economy of force The employment and distribution of forces to allocate the maximum possible combat power on primary efforts. (JP 3-0) enemy A party identified as hostile against which the use of force is authorized. (ADP 3-0) engagement criteria Protocols that specify those circumstances for initiating engagement with an enemy force. (FM 3-90-1) essential element of friendly information A critical aspect of a friendly operation that, if known by a threat would subsequently compromise, lead to failure, or limit success of the operation and therefore should be protected from enemy detection. (ADP 6-0) field maintenance On system maintenance, repair, and return to the user including maintenance actions performed by operators. (FM 4-30) forward passage of lines Occurs when a unit passes through another unit’s positions while moving toward the enemy. (ADP 3-90) friendly force information requirement Information the commander and staff need to understand the status of friendly force and supporting capabilities. (JP 3-0) guard A type of security operation done to protect the main body by fighting to gain time while preventing enemy ground observation of and direct fire against the main body. (ADP 3-90) health service support (Army) Health service support encompasses all support and services performed, provided, and arranged by the Army Medical Department to promote, improve, conserve, or restore the mental and physical well-being of personnel in the Army. Additionally, as directed, provide support in other Services, agencies, and organizations. This includes casualty care (encompassing a number of Army Medical Department functions—organic and area medical support, hospitalization, the treatment aspects of dental care and behavioral/neuropsychiatric treatment, clinical laboratory services, and treatment of chemical, biological, radiological, and nuclear patients), medical evacuation, and medical logistics. (FM 4-02) high-payoff target A target whose loss to the enemy will significantly contribute to the success of the friendly course of action. (JP 3-60) high-value target A target the enemy commander requires for the successful completion of the mission. (JP 3-60)
3-98
189
Glossary hybrid threat The diverse and dynamic combination of regular forces, irregular forces, terrorists, or criminal elements unified to achieve mutually benefitting effects. (ADP 3-0) indicator In intelligence usage, an item of information that reflects the intention or capability of an enemy and/or adversary to adopt or reject a course of action. (JP 2-0) information collection An activity that synchronizes and integrates the planning and employment of sensors and assets as well as the processing, exploitation, and dissemination systems in direct support of current and future operations. (FM 3-55) key tasks Those significant activities the force must perform as a whole to achieve the desired end state. (ADP 6-0) local security Low-level security activities conducted near a unit to prevent surprise by the enemy. (ADP 3-90) military decision-making process An iterative planning methodology to understand the situation and mission, develop a course of action, and produce an operation plan or order. (ADP 5-0) mission command (Army) The Army’s approach to command and control that empowers subordinate decision-making and decentralized execution appropriate to the situation. (ADP 6-0) named area of interest The geospatial area or systems node or link against which information that will satisfy a specific information requirement can be collected, usually to capture indications of adversary courses of action. (JP 2-0) neutral (Army) A party identified as neither supporting nor opposing friendly or enemy forces. (ADP 3-0) personnel services Sustainment functions that man and fund the force, maintain Soldier and Family readiness, promote the moral and ethical values of the nation, and enable the fighting qualities of the Army. (ADP 4-0) planning The art and science of understanding a situation, envisioning a desired future, and determining effective ways to bring that future about. (ADP 5-0) precision-guided munition A guided weapon intended to destroy a point target and minimize collateral damage. (JP 3-03) precision munition A munition that corrects for ballistic conditions using guidance and control up to the aimpoint or submunitions dispense with terminal accuracy less than the lethal radius of effects. (FM 3-09) preparation Those activities performed by units and Soldiers to improve their ability to execute an operation. (ADP 5-0) priority intelligence requirement An intelligence requirement that the commander and staff need to understand the threat and other aspects of the operational environment. (JP 2-0)
3-98
190
Glossary rearward passage of lines Occurs when a unit passes through another unit’s position while moving away from the enemy. (ADP 3-90) reconnaissance A mission undertaken to obtain information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, geographic, or other characteristics of a particular area, by visual observation or other detection methods. (JP 2-0) *reconnaissance handover The action that occurs between two elements to coordinate the transfer of information and responsibility for observation of potential threat contact, or the transfer of an assigned area from one element to another. *reconnaissance handover line A designated phase line on the ground where reconnaissance responsibility transitions from one element to another. reconnaissance in force A type of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and reactions or to obtain other information. (ADP 3-90) rehearsal A session in which the commander and staff or unit practices expected actions to improve performance during execution. (ADP 5-0) relief in place An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of operations are transferred to the incoming unit. (JP 3-07.3) reserve (Army) That portion of a body of troops that is withheld from action at the beginning of an engagement to be available for a decisive movement. (ADP 3-90) route reconnaissance A type of reconnaissance operation to obtain detailed information of a specified route and all terrain from which the enemy could influence movement along that route. (ADP 3-90) screen A type of security operation that primarily provides early warning to the protected force. (ADP 3-90) security cooperation Department of Defense interactions with foreign security establishments to build relationships that promote specific United States security interests, develop allied and partner military and security capabilities for self-defense and multinational operations, and provide United States forces with peacetime and contingency access to allies and partners. (JP 3-20) situational understanding The product of applying analysis and judgment to relevant information to determine the relationships among the operational and mission variables. (ADP 6-0) special reconnaissance Reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or diplomatically and/or politically sensitive environments to collect or verify information of strategic or operational significance, employing military capabilities not normally found in conventional forces. (JP 3-05) surveillance The systematic observation of aerospace, cyberspace, surface, or subsurface areas, places, persons, or things by visual, aural, electronic, photographic, or other means. (JP 3-0)
3-98
191
Glossary sustainment (Army) The provision of logistics, financial management, personnel services, and health service support necessary to maintain operations until successful mission completion. (ADP 4-0) target area of interest The geographical area where high-value targets can be acquired and engaged by friendly forces. (JP 2-0) targeting The process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities. (JP 3-0) task organization (Army) A temporary grouping of forces designed to accomplish a particular mission. (ADP 5-0) threat Any combination of actors, entities, or forces that have the capability and intent to harm United States forces, United States national interests, or the homeland. (ADP 3-0) unity of effort Coordination and cooperation toward common objectives, even if the participants are not necessarily part of the same command or organization, which is the product of successful unified action. (JP 1, Volume 2) zone reconnaissance A type of reconnaissance operation that involves a directed effort to obtain detailed information on all routes, obstacles, terrain, and enemy forces within a zone defined by boundaries. (ADP 3-90)
3-98
193
References All websites accessed 4 January 2023. REQUIRED PUBLICATIONS These documents must be available to intended users of this publication. DOD Dictionary of Military and Associated Terms, November 2022. FM 1-02.1. Operational Terms, 9 March 2021. FM 1-02.2. Military Symbols, 18 May 2022. RELATED PUBLICATIONS These documents are cited in this publication. JOINT PUBLICATIONS Most joint publications are available online: http://www.jcs.mil/Doctrine. JP 1, Volume 2. The Joint Force. 19 June 2020. JP 2-0. Joint Intelligence. 26 May 2022. JP 3-0. Joint Campaigns and Operations. 18 June 2022. JP 3-03. Joint Interdiction. 26 May 2022. JP 3-05. Joint Doctrine for Special Operations. 22 September 2020. JP 3-07.3. Peace Operations. 1 March 2018. JP 3-20. Security Cooperation. 9 September 2022. JP 3-60. Joint Targeting. 28 September 2018. JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020. JP 5-0. Joint Planning. 1 December 2020. ARMY PUBLICATIONS Most Army doctrinal publications are available online: https://armypubs.army.mil ADP 3-0. Operations. 31 July 2019. ADP 3-07. Stability. 31 July 2019. ADP 3-28. Defense Support of Civil Authorities. 31 July 2019. ADP 3-90. Offense and Defense. 31 July 2019. ADP 4-0. Sustainment. 31 July 2019. ADP 5-0. The Operations Process. 31 July 2019. ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019. AR 115-10/AFI 15-157 (IP). Climatic, Hydrological, and Topographic Services, Weather Support for the U.S. Army. 2 September 2021. AR 380-5. Security, Army Information Security Program. 25 March 2022. ATP 2-01. Collection Management. 17 August 2021. ATP 2-01.3. Intelligence Preparation of the Battlefield. 1 March 2019. ATP 2-19.4. Brigade Combat Team Intelligence Techniques. 25 June 2021. ATP 3-04.17. Techniques for Forward Arming and Refueling Points. 4 June 2018.
3-98
194
References ATP 3-07.5. Stability Techniques. 31 August 2012. ATP 3-18.4. Special Forces Special Reconnaissance. 5 October 2021. ATP 3-34.81/MCWP 3-17.4. Engineer Reconnaissance. 1 March 2016. ATP 3-52.1/MCRP 3-20F.4 [MCWP 3-25.13] NTTP 3-56.4/AFTTP 3-2.78. Airspace Control. Multi-Service Tactics, Techniques, and Procedures for Airspace Control. 14 February 2019. ATP 4-02.2. Medical Evacuation. 12 July 2019. ATP 4-02.10. Theater Hospitalization. 14 August 2020. ATP 4-10/MCRP 4-11H/NTTP 4-09.1/AFTTP 3-2.41. Multi-service Tactics, Techniques, and Procedures for Operational Contract Support. 16 December 2021. ATP 4-31/MCRP 3-40E.1. Recovery and Battle Damage Assessment and Repair (BDAR). 18 November 2020. ATP 4-33. Maintenance Operations. 9 July 2019. ATP 4-45. Force Provider Operations. 24 November 2014. ATP 4-48. Aerial Delivery. 21 December 2016. ATP 4-93. Sustainment Brigade. 11 April 2016. ATP 7-100.3. Chinese Tactics. 9 August 2021. FM 1-0. Human Resources Support. 25 August 2021. FM 2-0. Intelligence. 6 July 2018. FM 3-0. Operations. 1 October 2022. FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020. FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021. FM 3-52. Airspace Control. 20 October 2016. FM 3-55. Information Collection. 3 May 2013. FM 3-90-1. Offense and Defense, Volume 1. 22 March 2013. FM 3-90-2. Reconnaissance, Security, and Tactical Enabling Tasks, Volume 2. 22 March 2013. FM 4-02. Army Health System. 17 November 2020. FM 4-30. Ordnance Operations. 1 April 2014. FM 6-0. Commander and Staff Organization and Operations. 16 May 2022. FM 6-05/MCRP 3-30.4/NTTP 3-05.19/AFTTP 3-2.73/USSOCOM Pub 3-33. CF-SOF Multi-service Tactics, Techniques, and Procedures for Conventional Forces and Special Operations Forces Integration, Interoperability, and Interdependence. 25 January 2022. FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019. OTHER PUBLICATIONS Cameron, Robert S. Ph.D. 2009. To Fight or Not to Fight? Organizational and Doctrinal Trends in Mounted Maneuver Reconnaissance from the Interwar Years to Operation IRAQI FREEDOM. Combat Studies Institute Press, U.S. Army Combined Arms Center, Fort Leavenworth, Kansas, (https://www.armyupress.army.mil/Portals/7/combat-studies- institute/csi-books/cameron_fight.pdf) PRESCRIBED FORMS This section contains no entries. REFERENCED FORMS Unless otherwise indicated, DA forms are available online: https://armypubs.army.mil. DD forms are available online: https://www.esd.whs.mil/Directives/forms. DA Form 1156, Casualty Feeder Card.
3-98
195
References DA Form 2028, Recommended Changes to Publications and Blank Forms. DA Form 5517, Standard Range Card. DA Form 7656, Tactical Combat Casualty Care (TCCC) Card. DD Form 1380, Tactical Combat Casualty Care (TCCC) Card (Instructions). (Available through normal publications supply channels.)
3-98
197
Index Entries are by paragraph number. A E R advance covering force. 5-100 economy of force. 1-19 rear guard. 5-83 area reconnaissance emergency resupply. 7-26 reconnaissance definition. 4-59 execution decisions or five types. 4-33 area security. 5-120 adjustment decisions. 3-111 seven fundamentals. 4-2 ASCOPE. 6-22 expeditionary military reconnaissance by fire. 4-19 attack and reconnaissance intelligence brigades 3-139 aviation units. 5-26 (E-MIB). 6-39 route security. 5-130 augment the guard force. 5-62 F routine resupply. 7-21 B field artillery. 6-23 S brigade engineer battalion flank and rear defensive screen elements. 6-28 covering forces. 5-118 depth. 5-31 flank covering force. 5-106 initial. 5-40 C four factors of legitimacy. 6-7 stationary. 5-36 casualty operations. 7-28 four primary types of security security fundamentals. 5-5 Cavalry as maneuver unit. 6-18 operations. 5-17 security operations Cavalry squadron, role of. 6-20 four principles of stability tasks. cover. 5-93 Cavalry squadrons. 5-20 6-1 four types. 5-18 Cavalry troop, role of. 6-21 shape the battlefield. 1-10 H collection plan. 3-126 shaping. 1-30 high-payoff target. 3-126 combined arms, air-ground situational understanding. teams. 3-108 I 3-115 command and control initial response phase. 6-65 stationary flank guard. 5-69 warfighting function tasks. integrating processes for sustainability phase. 6-68 3-120 reconnaissance and security T commander’s intent. 3-25 operations. 3-121 targeting. 6-23 convoy security. 5-131 intelligence preparation of the battlefield (IPB). 3-122 transformation phase. 6-67, cueing. 3-143, 3-135 6-66 cueing, mixing, and M redundancy. 4-22 medical platoon. 7-31 V vignettes D mine-dispensing systems. 5-47 3-7 CAV Security Mission at decide; detect; deliver; and N Objective Lions 2003. assess (D3A). 3-125 5-11 named area of interest. 3-127 decision point. 3-110 applying security O fundamentals at decision support matrix. 3-113, Arracourt. 5-19 3-110 offensive cover Napoleon’s Cavalry and types of. 5-97 decision support template. Mission Command. 3-12 3-113, 3-110 P Reed's Bridge. 4-10 defensive covering force. 5-108 Russian's phases of the stability Reconnaissance-strike disengagement criteria. 3-61 framework. 6-10 Model preparation. 3-130
3-98
198
Index Entries are by paragraph number. Russo-Ukrainian War’s Gettysburg, the First Day. Third Armored Cavalry Donbas campaign. 2-24 1-4 Regiment in Tall Afar. Shaping the Battlefield with 6-17 Cavalry
3-98
199
FM 3-98 10 January 2023 By Order of the Secretary of the Army: JAMES C. MCCONVILLE General, United States Army Chief of Staff Official: MARK F. AVERILL Administrative Assistant to the Secretary of the Army 2300900 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve. To be distributed in
3-90
1
FM 3-90 Tactics MAY 2023 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013.
3-90
2
This publication is available at the Army Publishing Directorate site (https://www.apd.army.mil/), and the Central Army Registry site
3-90
3
*FM 3-90 Field Manual Headquarters No. 3-90 Department of the Army Washington, D.C., 01 May 2023 TACTICS Contents Page PREFACE.................................................................................................................... xi INTRODUCTION ....................................................................................................... xiii PART ONE TACTICS OVERVIEW Chapter 1 ARMY TACTICS ....................................................................................................... 1-1 Introduction to Tactics ............................................................................................... 1-1 The Operational Environment ................................................................................... 1-1 Role of Tactics ........................................................................................................... 1-2 General Considerations for Tactics ........................................................................... 1-5 Chapter 2 MOVEMENT AND FORMS OF MANEUVER ........................................................... 2-1 Movement Formations ............................................................................................... 2-1 Movement Techniques .............................................................................................. 2-9 Five Forms of Maneuver .......................................................................................... 2-12 PART TWO OFFENSIVE OPERATIONS Chapter 3 THE OFFENSE ......................................................................................................... 3-1 Purposes of the Offense ............................................................................................ 3-1 Common Offensive Planning Considerations ............................................................ 3-3 Transitions ............................................................................................................... 3-11 Chapter 4 MOVEMENT TO CONTACT ..................................................................................... 4-1 General Considerations for a Movement to Contact ................................................. 4-1 Organization of Forces for a Movement to Contact .................................................. 4-2 Common Control Measures for a Movement to Contact ........................................... 4-3 Planning a Movement to Contact .............................................................................. 4-4 Preparing a Movement to Contact ............................................................................. 4-5 Executing a Movement to Contact ............................................................................ 4-6 Variations for a Movement to Contact ....................................................................... 4-8 Transitions ............................................................................................................... 4-15 Chapter 5 ATTACK .................................................................................................................... 5-1 General Considerations for the Attack ...................................................................... 5-1 Organization of Forces for an Attack ......................................................................... 5-1 Common Control Measures Associated with an Attack ............................................ 5-2 Planning for an Attack ............................................................................................... 5-3 Preparing for an Attack .............................................................................................. 5-6 DISTRIBUTION RESTRICTION: This manual is approved for public release; distribution unlimited. *This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013.
3-90
4
Contents Executing an Attack .................................................................................................. 5-9 Variations of Attacks ............................................................................................... 5-18 Chapter 6 EXPLOITATION ........................................................................................................ 6-1 General Considerations for an Exploitation .............................................................. 6-1 Planning an Exploitation ........................................................................................... 6-4 Preparing an Exploitation .......................................................................................... 6-6 Executing an Exploitation .......................................................................................... 6-6 Chapter 7 PURSUIT .................................................................................................................. 7-1 General Considerations for a Pursuit ........................................................................ 7-1 Organization of Forces for a Pursuit ......................................................................... 7-2 Control Measures for a Pursuit ................................................................................. 7-4 Planning a Pursuit ..................................................................................................... 7-6 Preparing a Pursuit ................................................................................................... 7-7 Executing a Pursuit ................................................................................................... 7-7 PART THREE DEFENSIVE OPERATIONS Chapter 8 THE DEFENSE ......................................................................................................... 8-1 Purpose of the Defense ............................................................................................ 8-1 Characteristics of the Defense .................................................................................. 8-2 Types of Defensive Operations ................................................................................. 8-2 Common Defensive Control Measures ..................................................................... 8-4 Common Defensive Planning Considerations .......................................................... 8-4 Transitions ............................................................................................................... 8-24 Chapter 9 AREA DEFENSE ...................................................................................................... 9-1 General Considerations for an Area Defense ........................................................... 9-1 Organization of Forces for an Area Defense ............................................................ 9-1 Control Measures for an Area Defense .................................................................... 9-3 Planning an Area Defense ........................................................................................ 9-4 Preparation Considerations for an Area Defense ..................................................... 9-9 Execution Considerations for an Area Defense ...................................................... 9-10 Variations of the Area Defense ............................................................................... 9-12 Chapter 10 MOBILE DEFENSE ................................................................................................ 10-1 General Considerations for a Mobile Defense ........................................................ 10-1 Organization of Forces for a Mobile Defense ......................................................... 10-2 Control Measures for a Mobile Defense ................................................................. 10-4 Planning a Mobile Defense ..................................................................................... 10-5 Preparing a Mobile Defense ................................................................................... 10-6 Executing a Mobile Defense ................................................................................... 10-6 Chapter 11 RETROGRADE ....................................................................................................... 11-1 General Considerations for the Retrograde ............................................................ 11-1 Variations of Retrograde ......................................................................................... 11-2 PART FOUR ENABLING OPERATIONS Chapter 12 RECONNAISSANCE .............................................................................................. 12-1 General Reconnaissance Considerations .............................................................. 12-1 Reconnaissance Management ............................................................................... 12-4 Forms of Reconnaissance ...................................................................................... 12-9 Reconnaissance Methods ..................................................................................... 12-19 Recuperation and Reconstitution of Reconnaissance Assets .............................. 12-21 Chapter 13 SECURITY OPERATIONS ..................................................................................... 13-1 General Security Operations Considerations ......................................................... 13-1
3-90
5
Contents Security Operations Considerations ........................................................................ 13-2 Types of Security Operations ................................................................................ 13-11 Chapter 14 TROOP MOVEMENT .............................................................................................. 14-1 General Considerations of Troop Movement .......................................................... 14-1 Planning a Troop Movement ................................................................................... 14-9 Preparing a Troop Movement ................................................................................ 14-11 Executing a Troop Movement ............................................................................... 14-11 Chapter 15 RELIEF IN PLACE .................................................................................................. 15-1 General Considerations of a Relief In Place ........................................................... 15-1 Organization of Forces for a Relief in Place ............................................................ 15-1 Control Measures for a Relief In Place .................................................................... 15-2 Planning a Relief In Place ....................................................................................... 15-2 Preparing for a Relief in Place ................................................................................. 15-4 Executing a Relief in Place ...................................................................................... 15-4 Chapter 16 PASSAGE OF LINES ............................................................................................. 16-1 General Considerations for a Passage of Lines ...................................................... 16-1 Organization of Forces for a Passage of Lines ....................................................... 16-2 Control Measures for a Passage of Lines ............................................................... 16-2 Planning a Passage of Lines ................................................................................... 16-4 Forward Passage of Lines ....................................................................................... 16-6 Rearward Passage of Lines .................................................................................... 16-8 Chapter 17 COUNTERMOBILITY .............................................................................................. 17-1 General Countermobility Considerations ................................................................. 17-1 Terrain Reinforcement ............................................................................................. 17-2 Obstacle Intent ........................................................................................................ 17-4 Obstacles Employment Principles ........................................................................... 17-9 Obstacle Emplacement Authority ............................................................................ 17-9 Obstacle Control Measures ................................................................................... 17-10 Chapter 18 MOBILITY................................................................................................................ 18-1 Mobility ..................................................................................................................... 18-1 Mobility Tasks .......................................................................................................... 18-1 Chapter 19 TACTICAL DECEPTION ......................................................................................... 19-1 Overview of Deception ............................................................................................ 19-1 Principles of Tactical Deception .............................................................................. 19-2 Types of Tactical Deception .................................................................................... 19-3 Tactical Deception Means ....................................................................................... 19-4 Variations of Tactical Deception .............................................................................. 19-6 Tactical Deception Planning .................................................................................... 19-9 Tactical Deception in Offensive Operations ............................................................ 19-9 Tactical Deception in Defensive Operations ......................................................... 19-10 Risk to Tactical Deception ..................................................................................... 19-10 Chapter 20 LINKUP ................................................................................................................... 20-1 Linkup Operations ................................................................................................... 20-1 Types of Linkups ..................................................................................................... 20-5 Appendix ATACTICAL CONTROL MEASURES ............................................................................. A-1 Appendix B TACTICAL MISSION TASKS .................................................................................. B-1 Appendix C ENCIRCLEMENTS ................................................................................................... C-1 GLOSSARY ................................................................................................ Glossary-1 REFERENCES ........................................................................................ References-1
3-90
6
Contents INDEX ............................................................................................................... Index-1 Figures Figure 1-1. Army tactical taxonomy ............................................................................................... 1-4 Figure 1-2. Tactical framework ...................................................................................................... 1-7 Figure 1-3. Actions on contact ..................................................................................................... 1-13 Figure 2-1. Column formation ........................................................................................................ 2-2 Figure 2-2. Line formation .............................................................................................................. 2-3 Figure 2-3. Wedge formation ......................................................................................................... 2-4 Figure 2-4. Echelon left formation .................................................................................................. 2-5 Figure 2-5. Echelon right formation ............................................................................................... 2-5 Figure 2-6. Vee formation .............................................................................................................. 2-6 Figure 2-7. Diamond formation ...................................................................................................... 2-7 Figure 2-8. Box formation .............................................................................................................. 2-8 Figure 2-9. Movement techniques usages in relation to enemy contact ....................................... 2-9 Figure 2-10. Traveling movement technique ............................................................................... 2-10 Figure 2-11. Traveling overwatch movement technique .............................................................. 2-11 Figure 2-12. Bounding overwatch movement technique (alternating bounds) ............................ 2-12 Figure 2-13. Bounding overwatch movement technique (successive bounds) ........................... 2-12 Figure 2-14. Frontal attack ........................................................................................................... 2-14 Figure 2-15. Penetration .............................................................................................................. 2-18 Figure 2-16. Single envelopment ................................................................................................. 2-20 Figure 2-17. Envelopment control measures. .............................................................................. 2-21 Figure 2-18. Turning movement .................................................................................................. 2-22 Figure 2-19. Infiltration ................................................................................................................. 2-25 Figure 4-1. Organization of forces for a movement to contact ...................................................... 4-2 Figure 4-2. Example movement to contact control measures ....................................................... 4-4 Figure 4-3. Search and attack control measures ......................................................................... 4-10 Figure 4-4. Cordon and search symbol ....................................................................................... 4-14 Figure 4-5. Example inner and outer cordons ............................................................................. 4-15 Figure 5-1. Example of attack control measures ........................................................................... 5-2 Figure 5-2. Example control measures for movement from assembly area to attack position ...... 5-8 Figure 5-3. Example of a probable line of deployment and assault position ............................... 5-13 Figure 5-4. Attack of an objective, breach ................................................................................... 5-15 Figure 5-5. Attack of an objective, assault ................................................................................... 5-15 Figure 5-6. Example of a linear ambush ...................................................................................... 5-20 Figure 5-7. Example of an L-shaped ambush.............................................................................. 5-21 Figure 5-8. Area ambush ............................................................................................................. 5-22 Figure 5-9. Example of counterattacks ........................................................................................ 5-24 Figure 5-10. Five phases of a raid ............................................................................................... 5-27
3-90
7
Contents Figure 5-11. Spoiling attack .......................................................................................................... 5-28 Figure 6-1. Example exploitation control measures ....................................................................... 6-4 Figure 7-1. Frontal pursuit .............................................................................................................. 7-3 Figure 7-2. Combination pursuit ..................................................................................................... 7-4 Figure 7-3. Example pursuit control measures .............................................................................. 7-5 Figure 8-1. Example detachment left in contact ............................................................................. 8-9 Figure 9-1. Example area defense control measures .................................................................... 9-3 Figure 9-2. Organization of forces for an area defense, contiguous assigned areas .................... 9-4 Figure 9-3. Organization of forces for an area defense, noncontiguous assigned areas .............. 9-5 Figure 9-4. Example defense in depth ........................................................................................... 9-7 Figure 9-5. Example forward defense ............................................................................................ 9-8 Figure 9-6. Example area defense ............................................................................................... 9-11 Figure 9-7. Example of a defense of a linear obstacle ................................................................. 9-13 Figure 9-8. Example of a perimeter defense ................................................................................ 9-14 Figure 9-9. Example of a perimeter defense in depth .................................................................. 9-15 Figure 9-10. Battalion perimeter, squadron reserve..................................................................... 9-15 Figure 9-11. Example perimeter defense control measures ........................................................ 9-17 Figure 9-12. Slope terminology .................................................................................................... 9-22 Figure 10-1. Mobile defense ......................................................................................................... 10-2 Figure 10-2. Organization of forces for a mobile defense ............................................................ 10-3 Figure 10-3. Example of mobile defense control measures ......................................................... 10-4 Figure 10-4. Mobile defense before commitment of striking force ............................................... 10-8 Figure 10-5. Mobile defense after commitment of striking force .................................................. 10-9 Figure 11-1. Delay from alternating positions .............................................................................. 11-4 Figure 11-2. Delay from subsequent positions ............................................................................. 11-5 Figure 11-3. Example of common delay control measures .......................................................... 11-6 Figure 11-4. Example of a delay forward of a specified line for a specified time ......................... 11-8 Figure 11-5. Example control measures for a withdrawal using a detachment left in contact ... 11-14 Figure 11-6. Withdrawal techniques ........................................................................................... 11-15 Figure 11-7. Example organization of forces for a retirement .................................................... 11-18 Figure 12-1. Example of zone reconnaissance control measures ............................................. 12-11 Figure 12-2. Example of area reconnaissance control measures .............................................. 12-13 Figure 12-3. Example of route reconnaissance control measures ............................................. 12-15 Figure 13-1. Example of the security force crossing LD separately to deploy and establish a flank screen ....................................................................................................................... 13-9 Figure 13-2. Example of the security force crossing separately and the lead element conducting a movement to contact .............................................................................................. 13-10 Figure 13-3. Example of the security force crossing with the main body and conducting a zone reconnaissance ....................................................................................................... 13-11 Figure 13-4. Example security operations control measures ..................................................... 13-12 Figure 13-5. Control measures used in a screen mission .......................................................... 13-14 Figure 13-6. Moving flank screen ............................................................................................... 13-16
3-90
8
Contents Figure 13-7. Examples of alternate bound by OP and alternate bound by unit ......................... 13-17 Figure 13-8. Example of successive bound by unit and continuous marching methods of displacement .......................................................................................................... 13-18 Figure 13-9. Advance guard for division attack ......................................................................... 13-20 Figure 13-10. Stationary flank guard ......................................................................................... 13-22 Figure 13-11. Moving flank guard control measures ................................................................. 13-23 Figure 13-12. Attack using a covering force .............................................................................. 13-26 Figure 13-13 Example of a defensive cover .............................................................................. 13-28 Figure 14-1. Tactical movement .................................................................................................. 14-2 Figure 14-2. Approach march ...................................................................................................... 14-2 Figure 14-3. Example overlay with route control measures ........................................................ 14-7 Figure 14-4. Example strip map ................................................................................................... 14-8 Figure 15-1. Example of a brigade relief in place ........................................................................ 15-2 Figure 16-1. Control measures associated with a rearward passage of lines ............................. 16-3 Figure 16-2. Forward passage of lines ........................................................................................ 16-7 Figure 17-1. Obstacle control measures and intent symbols .................................................... 17-12 Figure 18-1. Breach ..................................................................................................................... 18-3 Figure 20-1. Linkup of a moving force with a stationary force ..................................................... 20-5 Figure 20-2. Linkup of two moving forces .................................................................................... 20-6 Figure A-1. AO with forward, rear, and lateral boundaries ............................................................ A-2 Figure A-2. Division AO with single boundary and contiguous BCT assigned areas .................... A-3 Figure A-3. Assembly areas........................................................................................................... A-4 Figure A-4. Single assembly area method ..................................................................................... A-5 Figure A-5. Portion of a larger assembly area method .................................................................. A-5 Figure A-6. Dispersed assembly area method .............................................................................. A-6 Figure A-7. Checkpoint 13 ............................................................................................................. A-7 Figure A-8. Contact point 8 ............................................................................................................ A-7 Figure A-9. Coordination point ....................................................................................................... A-7 Figure A-10. Forward line of own troops ........................................................................................ A-7 Figure A-11. Gap ........................................................................................................................... A-8 Figure A-12. Infiltration lane MICHAEL .......................................................................................... A-8 Figure A-13. Line of contact ........................................................................................................... A-8 Figure A-14. Linkup point 8 ............................................................................................................ A-9 Figure A-15. Named area of interest AUGUSTA ........................................................................... A-9 Figure A-16. Passage lane ............................................................................................................ A-9 Figure A-17. Forward and rearward passage of lines ................................................................. A-10 Figure A-18. Passage point ......................................................................................................... A-10 Figure A-19. Phase lines .............................................................................................................. A-11 Figure A-20. Position area for artillery ......................................................................................... A-11 Figure A-21. Rally point 14 .......................................................................................................... A-12 Figure A-22. Relief in place.......................................................................................................... A-12
3-90
9
Contents Figure A-23. Routes .....................................................................................................................A-13 Figure A-24. Target area of interest WHITETAIL .........................................................................A-13 Figure A-25. Common offensive control measures ......................................................................A-14 Figure A-26. Attack by fire position JAMES .................................................................................A-15 Figure A-27. Battle handover line DANIEL ...................................................................................A-16 Figure A-28. Point of departure 7 .................................................................................................A-17 Figure A-29. Support by fire position ............................................................................................A-18 Figure A-30. Example zone for 1-66 Armor .................................................................................A-19 Figure A-31. Five kinds of battle positions ...................................................................................A-20 Figure A-32. Combined arms battalion with company battle positions ........................................A-21 Figure A-33. Brigade assigned area with battalion battle positions .............................................A-22 Figure A-34. Task force engagement areas .................................................................................A-23 Figure A-35. Final protective fire ..................................................................................................A-23 Figure A-36. Final protective line ..................................................................................................A-24 Figure A-37. Forward edge of the battle area ..............................................................................A-24 Figure A-38. Example sector for 1-66 Armor ...............................................................................A-25 Figure A-39. Direct fire control measures ....................................................................................A-26 Figure A-40. Sectors of fire ..........................................................................................................A-27 Figure A-41. Target reference point 032 ......................................................................................A-27 Figure A-42. Trigger line ...............................................................................................................A-28 Figure A-43. Coordinated fire line ................................................................................................A-29 Figure A-44. Fire support coordination line ..................................................................................A-29 Figure A-45. Free fire area ...........................................................................................................A-30 Figure A-46. Blue kill box .............................................................................................................A-31 Figure A-47. Purple kill box ..........................................................................................................A-31 Figure A-48. No fire area ..............................................................................................................A-32 Figure A-49. Restrictive fire area ..................................................................................................A-32 Figure A-50. Restrictive fire line ...................................................................................................A-33 Figure A-51. Fire support targets .................................................................................................A-33 Figure A-52. Coordinating altitude and coordination level ...........................................................A-35 Figure B-1. Attack by fire task ........................................................................................................ B-1 Figure B-2. Block task .................................................................................................................... B-2 Figure B-3. Block obstacle effect.................................................................................................... B-2 Figure B-4. Breach task .................................................................................................................. B-3 Figure B-5. Bypass task ................................................................................................................. B-3 Figure B-6. Task force conducting a fix and a bypass ................................................................... B-4 Figure B-7. Canalize task ............................................................................................................... B-4 Figure B-8. Clear task .................................................................................................................... B-4 Figure B-9. Contain task ................................................................................................................. B-5 Figure B-10. Control task ............................................................................................................... B-5 Figure B-11. Destroy task ............................................................................................................... B-5
3-90
10
Contents Figure B-12. Disengage task ......................................................................................................... B-6 Figure B-13. Disrupt task ............................................................................................................... B-6 Figure B-14. Disrupt obstacle effect .............................................................................................. B-7 Figure B-15. Exfiltrate task ............................................................................................................. B-7 Figure B-16. Fix task ...................................................................................................................... B-8 Figure B-17. Fix obstacle effect ..................................................................................................... B-8 Figure B-18. Follow and assume task ........................................................................................... B-8 Figure B-19. Follow and support task ............................................................................................ B-9 Figure B-20. Interdict task .............................................................................................................. B-9 Figure B-21. Isolate task .............................................................................................................. B-10 Figure B-22. Neutralize task ........................................................................................................ B-10 Figure B-23. Occupy task ............................................................................................................ B-10 Figure B-24. Retain task .............................................................................................................. B-11 Figure B-25. Secure task ............................................................................................................. B-11 Figure B-26. Seize task ................................................................................................................ B-11 Figure B-27. Support by fire task ................................................................................................. B-12 Figure B-28. Suppress task ......................................................................................................... B-12 Figure B-29. Turn task ................................................................................................................. B-13 Figure B-30. Turn obstacle effect ................................................................................................ B-13 Figure C-1. Inner and outer arms of an encirclement .................................................................... C-2 Figure C-2. Example of encirclement control measures ................................................................ C-3 Figure C-3. Squeeze technique ..................................................................................................... C-5 Figure C-4. Hammer technique ..................................................................................................... C-6 Figure C-5. Wedge technique ........................................................................................................ C-7 Figure C-6. Encircled division perimeter defense .......................................................................... C-9 Figure C-7. Organization of forces for a breakout operation ....................................................... C-10 Figure C-8. Example breakout organization of forces by an encircled division ........................... C-13 Figure C-9. Example breakout by an encircled division .............................................................. C-14 Tables Introductory table-1. Removed terms .............................................................................................. xv Introductory table-2. Modified terms and definitions ........................................................................ xv Introductory table-3. Modified proponent ....................................................................................... xviii Introductory table-4. New terms ...................................................................................................... xix Table 1-1. Considerations for limited-visibility operations ........................................................... 1-19 Table 1-2. Intelligence warfighting function tasks that support the commander .......................... 1-24 Table 2-1. Forms of maneuver and planning symbols ................................................................ 2-13 Table 3-1. Types of the offensive operations and planning symbols ............................................ 3-2 Table 3-2. Common offensive control measures ........................................................................... 3-4 Table 8-1. Defensive operations symbols ...................................................................................... 8-3
3-90
11
Contents Table 8-2. Retrograde task symbols .............................................................................................. 8-3 Table 11-1. Considerations for delay techniques ......................................................................... 11-4 Table 12-1. Typical reconnaissance and surveillance assets available ....................................... 12-7 Table 12-2. Dedicated reconnaissance units and forms of reconnaissance operations .............. 12-9 Table 13-1. Typical size of security forces for a given mission and echelon ............................... 13-5 Table 13-2. Screen movement methods .................................................................................... 13-16 Table 14-1. Route designations ................................................................................................... 14-9 Table 16-1. Brigade Combat Team passage lane requirements ................................................. 16-5 Table 17-1. Tactical obstacle effects ............................................................................................ 17-5 Table 18-1. Breaching tenets ....................................................................................................... 18-5 Table 18-2. Support, breach, and assault force responsibilities .................................................. 18-7 Table 18-3. Deliberate wet-gap crossing phases ....................................................................... 18-14 Table 19-1. Sample deception techniques ................................................................................... 19-6 Table 19-2. Forms of tactical deception and planning symbols ................................................... 19-9 Table B-1. Tactical mission tasks ................................................................................................... B-1
3-90
13
Preface FM 3-90 describes combat-tested tactics and techniques for offensive, defensive, and enabling operations. For each type of operation FM 3-90 discusses the organization of forces; minimum essential control measures; and general planning, preparation, and execution considerations. To understand the doctrine contained in FM 3-90, readers must first understand the doctrinal topics described in ADP 3-90 since FM 3-90 expands and builds on the topics established in ADP 3-90. FM 3-90’s foundational chapters are chapters 1, 2, 3, and 8. Readers must comprehend the material within these chapters to gain a full understanding of the remaining chapters within FM 3-90. Readers must also be familiar with ADP 5-0 and FM 5-0 as it applies the intellectual framework that leaders use to plan, prepare, execute, and assess military operations. FM 3-90 is applicable to all members of the profession of arms. The principal audience are practitioners of military tactics, students of the various professional development courses, and doctrine writers at the U.S. Army’s Centers of Excellence. Trainers and educators throughout the Army will also use this publication. The considerations for offensive, defensive, and enabling operations in this publication apply to all echelons, even though numerous figures in this publication use divisions and brigade combat teams to illustrate points in the text. Echelon-specific field manuals and Army techniques publications address the specifics of how each tactical echelon uses these tactical concepts. Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United States, international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiers operate in accordance with the law of armed conflict and applicable rules of engagement. (See FM 6-27/MCTP 11-10C for more information on the law of war.) FM 3-90 uses joint terms where applicable. Selected joint and Army terms and definitions are in both the glossary and the text. Terms for which FM 3-90 is the proponent publication (the authority) are marked with an asterisk (*) in the glossary. When first defined in the text, terms for which FM 3-90 is the proponent publication are boldfaced and italicized, and definitions are boldfaced. When first defining other proponent definitions in the text, the term is italicized, and the number of the proponent publication follows the definition. Following uses of the term are not italicized. The introduction for FM 3-90 indicates heavily revised content within each chapter and appendix. FM 3-90 applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve unless otherwise stated. The United States Army Combined Arms Center is the proponent for this publication. The preparing agency is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send written comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATZL-MCD (FM 3-90), 300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by e-mail to [email protected]; or submit an electronic DA Form 2028.
3-90
15
Introduction Tactics are the employment, ordered arrangement, and directed actions of forces in relation to each other. Leaders select tactics that accomplish their assigned mission. Successful tactics require generating and applying combat power. This publication introduces the basic concepts and control measures associated with the science of tactics and provides a common baseline for Soldiers and leaders to execute offensive, defensive, and enabling operations. Soldiers and leaders who know these basic tactics are better prepared to adapt them quickly based on the mission variables of mission, enemy, terrain and weather, troops and support available—time available, civil considerations, and informational considerations [METT-TC(I)]. Tactics require judgement in application. The tactics discussed in this publication focus on the Army’s strategic role of prevailing during large-scale combat operations. Their application must be tempered by the obligation to protect the civilian population. The ability to seize and secure terrain, with its population and productive capacity, distinguishes land forces conducting offensive, defensive, or enabling operations. FM 3-90 provides a common framework for leaders from squad through corps echelon to conduct tactical operations in which leaders seek to find the enemy, fix the enemy, finish the enemy, and follow-through to achieve their objectives. This manual is not prescriptive, but it is authoritative. FM 3-90 (Tactics) merges the 2013 versions of FM 3-90-1 (Offense and Defense Volume 1) and FM 3-90-2 (Reconnaissance, Security, and Tactical Enabling Tasks Volume 2) into a single comprehensive volume on offensive, defensive, and enabling operations. A highlight of changes includes: * Created and became the proponent for the "tactical framework" - which is find, fix, finish, and follow through. This framework is how all offensive and defensive operations are described. * Changed actions on contact from a 5-step process to a new 4-step process – “react”, “develop the situation”, “choose an action”, and “execute and report”. * Removed defeat as a tactical mission task. * Removed ambush as a tactical mission task, which was a mistake in the 2019 version of ADP 3-90. * Changed the form of maneuver of “frontal assault” back to “frontal attack.” * Added mobility, countermobility, link-up, and tactical deception as types of enabling operations. * Made feint and demonstration as variations of tactical deception, instead of variations of an attack. * Described what are forms of contact and added influence as a form of contact. * Removed forms of defense and made them variations of an area defense. * Changed the variations of troop movement from administrative movement, approach march, and tactical road march to tactical and nontactical movements. * Removed encirclement as an enabling operation. It is still a desired outcome, and there is special planning required to create, maintain, reduce, and when encircled, break out of an encirclement, so that information was moved to an appendix. * Removed the tactical mission tasks categories of "actions by friendly forces" and "effects on enemy forces." * Modified, removed, or added over 140 definitions to make it easier to read and understand. * Added graphics for all offensive and defensive operations. * Made numerous other changes to enhance readability and understanding. FM 3-90 is divided into four parts, consisting of twenty chapters and three appendices. Part One (chapters 1- 2) focuses on the overall concept of tactics and maneuver. Part Two (chapters 3-7) focuses on offensive operations. Part Three (chapters 8-11) focuses on defensive operations. Part Four (chapters 12-20) focuses on enabling operations. Appendix A describes tactical control measures. Appendix B describes tactical mission tasks. Appendix C describes encirclements.
3-90
16
Introduction Chapter 1 (Army Tactics) introduces the role of Army tactics and discusses how the tactical taxonomy nests within multidomain operations. It also discusses the types and general planning considerations for offensive, defensive, and enabling operations. The major updates to this chapter include introducing the tactical framework, updating taxonomy, a revision and expansion on the forms of contact, revision of assigned areas, and revision of actions on contact. Chapter 2 (Movement and Forms of Maneuver) introduces and describes movement formations, movement techniques, and the five forms of maneuver. The major updates in this chapter include revising the forms of maneuver definitions and identifying the forms of maneuver as applicable to offensive and defensive operations. Chapter 3 (The Offense) introduces and describes the fundamentals of offensive operations, common offensive planning considerations, and transitions from offensive operations to defensive or stability operations. There are no major updates to this chapter. Chapter 4 (Movement to Contact) introduces and describes general considerations, organization of forces, common control measures, conduct of the two variations of a movement to contact, and transitions. The major update in this chapter is the expansion of the cordon and search section. Chapter 5 (Attack) introduces and describes general considerations, organization of forces, common control measures, and conduct of the four variations of an attack. The major update in this chapter is moving demonstration and feint from the variations of an attack to chapter 19 (Tactical Deception). Chapter 6 (Exploitation) introduces general considerations, organization of forces, common control measures, and the conduct of an exploitation. The major update in this chapter removes local and major exploitations. Chapter 7 (Pursuit) introduces and describes general considerations, organization of forces for the two variations of a pursuit, common control measures, and the conduct of a pursuit. There are no major updates in this chapter. Chapter 8 (The Defense) introduces and describes the fundamentals of the defense, common defensive planning considerations, common defensive control measures, and transitions. The major update in this chapter is the removal of the forms of the defense. Chapter 9 (Area Defense) introduces and describes the general considerations, organization of forces, common control measures, and the conduct of the three variations of an area defense. The major update in this chapter is changing defense of a linear obstacle, perimeter defense, and reverse slope defense from forms of the defense to variations of an area defense. Chapter 10 (Mobile Defense) introduces and describes the general considerations, organization of forces, common control measures, and the conduct of a mobile defense. No major updates in this chapter. Chapter 11 (Retrograde) introduces and describes the general considerations and conduct of the three variations of a retrograde. The major update in this chapter is changing the retrograde tasks to variations of the retrograde. Chapter 12 (Reconnaissance) introduces and describes the general reconnaissance considerations, fundamentals, methods, and forms of reconnaissance. The major updates in this chapter are updating the commander’s reconnaissance guidance, tasks within the forms of reconnaissance, and reconnaissance fundamentals. Chapter 13 (Security Operations) introduces and describes the general security considerations and conduct of the types of security operations. The major updates in this chapter are added commander’s security guidance, updated tasks within types of security operations, and updated security fundamentals. Chapter 14 (Troop Movement) introduces and describes troop movement general considerations, types and methods of troop movement, and conduct of troop movements. The major updates in the chapter are modifying the troop movement definitions and taxonomy. Chapter 15 (Relief in Place) introduces and describes the general considerations, organization of forces, control measures, and the conduct of relief in place. There are no major updates in this chapter.
3-90
17
Introduction Chapter 16 (Passage of Lines) introduces and describes the general considerations, organization of forces, control measures, and the conduct of the variations of a passage of lines No major updates in this chapter. Chapter 17 (Countermobility) introduces and describes the general considerations for countermobility, terrain reinforcement, obstacle intent, obstacle employment principles, and obstacle emplacement. This is a new chapter and makes countermobility an enabling operation. Chapter 18 (Mobility) introduces and describes the general considerations of and the types of mobility tasks. This is a new chapter and makes mobility an enabling operation. Chapter 19 (Tactical Deception) introduces and describes tactical deception principles, types, means, and variations. This is a new chapter and makes tactical deception an enabling operation and moves feint and demonstration from an offensive operation to a variation of tactical deception. Chapter 20 (Linkup) introduces and describes the general considerations and conduct of link up operations. This is a new chapter and makes linkup an enabling operation. Appendix A (Tactical Control Measures) introduces and describes the general considerations for common control measures. The major updates to this appendix include organizing control measures by movement and maneuver control measures, fire support coordination measures, and airspace coordinating measures. Appendix B (Tactical Mission Tasks) introduces, describes, and provides graphical depictions of the tactical mission tasks. The major updates in this appendix are removing ambush and defeat as tactical mission tasks, alphabetizing the tactical missions, and removing actions by friendly forces and effects on enemy forces. Appendix C (Encirclements) introduces and describes encirclements and describes types of encirclement. The major update to this appendix is modifying the executing an encirclement discussion to include two methods. This publication is the proponent for select terms. See introductory table-1 for removed terms. See introductory table-2 for terms with modified definitions. See introductory table-3 on page xviii for terms with a new proponent. See introductory table-4 on page xix for new terms. Introductory table-1. Removed terms Term Remarks administrative movement No longer used as a defined Army term. air movements No longer used as an Army term. Adopts joint term. contiguous area of operations No longer used as a defined Army term. covering force No longer used as a defined Army term. covering force area No longer used as a defined Army term. decisive engagement No longer used as a defined Army term. defeat (tactical mission task) No longer used as a defined Army term. encirclement operations No longer used as a defined Army term. fire strike No longer used as a defined Army term. flank attack No longer used as a defined Army term. noncontiguous area of operations No longer used as a defined Army term. Introductory table-2. Modified terms and definitions Term Remarks actions on contact FM 3-90 modifies definition and becomes proponent. alternate position FM 3-90 modifies definition and becomes proponent ambush FM 3-90 modifies definition. approach march FM 3-90 modifies definition and becomes proponent.
3-90
18
Introduction Introductory table-2. Modified terms and definitions (continued) area reconnaissance FM 3-90 modifies definition and becomes proponent. area security FM 3-90 modifies definition and becomes proponent. attack FM 3-90 modifies definition and becomes proponent. attack by fire FM 3-90 modifies definition. block (tactical mission task) FM 3-90 modifies definition. bounding overwatch FM 3-90 modifies definition. box formation FM 3-90 modifies definition. breach FM 3-90 modifies definition. breakthrough FM 3-90 modifies definition. bypass FM 3-90 modifies definition. canalize FM 3-90 modifies definition. clear FM 3-90 modifies definition. column formation FM 3-90 modifies definition. contain FM 3-90 modifies definition. consolidate FM 3-90 modifies term from consolidation to consolidate and updates the definition. control FM 3-90 modifies definition. cordon and search FM 3-90 modifies definition. counterattack FM 3-90 modifies definition and becomes proponent. counterreconnaissance FM 3-90 modifies definition. decisively engaged FM 3-90 modifies term from decisive engagement to decisively engaged and becomes proponent. delay line FM 3-90 modifies definition. denial operations FM 3-90 modifies definition. destroy FM 3-90 modifies definition. detachment left in contact FM 3-90 modifies definition. direct pressure force FM 3-90 modifies definition. disengage FM 3-90 modifies definition. dismounted movement FM 3-90 modifies term from dismounted march to dismounted movement disrupt (tactical mission task) FM 3-90 modifies definition. double envelopment FM 3-90 modifies definition. echelon formation FM 3-90 modifies definition. encirclement FM 3-90 modifies term from encirclement operations to encirclement and becomes proponent. encircling force FM 3-90 modifies definition. engagement area FM 3-90 modifies definition and becomes proponent. engagement priority FM 3-90 modifies definition. envelopment FM 3-90 modifies definition. exfiltrate FM 3-90 modifies definition. exploitation FM 3-90 modifies definition and becomes proponent. fire superiority FM 3-90 modifies definition. fix (tactical mission task) FM 3-90 modifies definition. follow and assume FM 3-90 modifies definition.
3-90
19
Introduction Introductory table-2. Modified terms and definitions (continued) Term Remarks follow and support FM 3-90 modifies definition. forward boundary FM 3-90 modifies definition. gap FM 3-90 modifies definition and becomes proponent. infiltration FM 3-90 modifies definition. interdict FM 3-90 modifies definition. isolate (tactical mission task) FM 3-90 modifies definition. kill zone FM 3-90 modifies definition. lateral boundary FM 3-90 modifies definition. line formation FM 3-90 modifies definition. linkup FM 3-90 modifies definition and becomes proponent. linkup point FM 3-90 modifies definition. main battle area FM 3-90 modifies definition and becomes proponent. march column FM 3-90 modifies definition. march serial FM 3-90 modifies definition. march unit FM 3-90 modifies definition. meeting engagement FM 3-90 modifies definition and becomes proponent. mixing FM 3-90 modifies definition. mounted movement FM 3-90 modifies term from mounted march to mounted movement movement to contact FM 3-90 modifies definition and becomes proponent. neutralize FM 3-90 modifies definition. observation post FM 3-90 modifies definition. obstacle control measures FM 3-90 modifies definition. obstacle group FM 3-90 modifies term by making term singular occupy FM 3-90 modifies definition. passage lane FM 3-90 modifies definition. passage point FM 3-90 modifies definition. penetration FM 3-90 modifies definition. position area for artillery FM 3-90 modifies definition. primary position FM 3-90 modifies definition and becomes proponent. pursuit FM 3-90 modifies definition and becomes proponent. quartering party FM 3-90 modifies definition. rear boundary FM 3-90 modifies definition. reconnaissance by fire FM 3-90 modifies definition. reconnaissance in force FM 3-90 modifies definition and becomes proponent. reconnaissance objective FM 3-90 modifies definition and becomes proponent. reconnaissance-pull FM 3-90 modifies definition. reconnaissance-push FM 3-90 modifies definition. reduce (tactical mission task) FM 3-90 modifies definition. redundancy FM 3-90 modifies definition. release point FM 3-90 modifies definition.
3-90
20
Introduction Introductory table-2. Modified terms and definitions (continued) Term Remarks follow and support FM 3-90 modifies definition. forward boundary FM 3-90 modifies definition. retain FM 3-90 modifies definition. retrograde movement FM 3-90 modifies definition. route FM 3-90 modifies definition. route reconnaissance FM 3-90 modifies definition and becomes proponent. search and attack FM 3-90 modifies definition. sector of fire FM 3-90 modifies definition. secure FM 3-90 modifies definition. seize FM 3-90 modifies definition. single envelopment FM 3-90 modifies definition. spoiling attack FM 3-90 modifies definition. start point FM 3-90 modifies definition. stay-behind operation FM 3-90 modifies definition. supplementary position FM 3-90 modifies definition and becomes proponent. support by fire FM 3-90 modifies definition. suppress FM 3-90 modifies definition. tactical deception FM 3-90 modifies definition and becomes proponent. tactical mission task FM 3-90 modifies definition. tactical road march FM 3-90 modifies definition and becomes proponent. terrain management FM 3-90 modifies definition and becomes proponent. trail party FM 3-90 modifies definition. traveling overwatch FM 3-90 modifies definition. trigger line FM 3-90 modifies definition and becomes proponent. troop movement FM 3-90 modifies definition and becomes proponent. turn (tactical mission task) FM 3-90 modifies definition. turning movement FM 3-90 modifies definition. zone reconnaissance FM 3-90 modifies definition and becomes proponent. Introductory table-3. Modified proponent Term Remarks bypass criteria FM 3-90 becomes proponent. checkpoint FM 3-90 becomes proponent. final protective line FM 3-90 becomes proponent. rally point FM 3-90 becomes proponent. subsequent position FM 3-90 becomes proponent. traveling FM 3-90 becomes proponent. trigger line FM 3-90 becomes proponent.
3-90
21
Introduction Introductory table-4. New terms Term Remarks assault Adds new Army term. battle handover Adds new term. consolidate Adds new term. coordination point Adds new term demonstration Adds new Army term. diamond formation Adds new term. disengagement criteria Adds new term. enabling operation Adds new term. feint Adds new Army term. forced march Adds new term. forward line of own troops Adds new term. light line Adds new term. nontactical movement Adds new term. quick reaction force Adds new term. raid Adds new Army term. security objective Adds new term. tactical movement Adds new term. vee formation Adds new term. vertical envelopment Adds new term. wedge formation Adds new term.
3-90
23
PART ONE Tactics Overview Part One introduces tactics and forms of maneuver. Chapter 1 describes the role of tactics, operational and mission variables, and the general considerations for tactics. Chapter 2 covers the movement formations, techniques, and the forms of maneuver. Chapter 1 Army Tactics This chapter introduces the role of Army tactics and discusses how the tactics taxonomy nests within multidomain operations. This chapter discusses the operational environment, the role of tactics, and general tactical considerations by warfighting function that apply to offensive, defensive, and enabling operations. INTRODUCTION TO TACTICS 1-1. Tactics are the employment, ordered arrangement and directed actions of forces in relation to each other (ADP 3-90). Units employ tactics during the conduct of operations. An operation is a sequence of tactical actions with a common purpose or unifying theme (JP 1, Vol 1). Tacticians use the art and science of tactics to maneuver and position formations. Maneuver is movement in conjunction with fires (ADP 3-90). The purpose of maneuver is to gain and exploit positions of relative advantage to accomplish the mission. (See ADP 3-90 for more information on the art and science of tactics.) 1-2. Successful tactical operations are the result of integrating and synchronizing the warfighting functions in time, space, and purpose. The starting point for planning, preparing, and executing tactical operations is understanding the operational environment. THE OPERATIONAL ENVIRONMENT 1-3. Army forces conduct offensive, defensive, and enabling operations within operational environments spanning the globe. An operational environment is the aggregate of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). For Army forces, an operational environment consists of five domains (land, air, maritime, space, and cyberspace) understood through three dimensions (physical, human, and information). 1-4. The purpose of understanding an operational environment is to aid in accounting for the totality of factors and conditions that impact the conduct of operations. This understanding enables leaders to better identify problems; anticipate potential outcomes; and understand the results of various friendly, enemy, adversary, and neutral actions and the effects these actions have on achieving the military end state. A description of an operational environment includes all the factors that the commander and staff need to capture and understand to inform the conduct of operations. (See FM 3-0 for more information on operational environments.)
3-90
24
Chapter 1 OPERATIONAL VARIABLES 1-5. Army planners use the operational variables to describe an operational environment. Operational variables are a comprehensive set of information categories used to describe an operational environment (ADP 1-01). They are the aspects of an operational environment that affect operations, and they differ from one assigned area to another. The eight operational variables are: political, military, economic, social, information, infrastructure, physical environment, and time (also known as PMESII-PT). 1-6. When commanders and staff analyze their specific operational environment, they also discern what parts or aspects of each domain and the relevant information aspects and considerations to their operation. They continue to refine and update their analysis even after receiving a mission and throughout the course of the ensuing operation. (See FM 5-0 for more information on the operational variables.) MISSION VARIABLES 1-7. The mission variables are categories of specific information needed to conduct operations (ADP 1- 01). The purpose of mission variables is to provide a set of informational categories focused on what leaders need to know to achieve situational understanding once assigned a mission. This ensures Army leaders understand the context in which they perform their missions and if necessary, take actions to modify their chosen tactic. The seven mission variables are mission, enemy, terrain and weather, troops and support available—time available, civil considerations, and informational considerations [METT-TC(I)]. 1-8. METT-TC (I) represents the mission variables leaders use to analyze and understand a situation in relationship to the unit’s mission. The first six variables are not new. However, the pervasiveness of information and its applicability in different military contexts requires leaders to continuously assess its various aspects during operations. Due to this, “I” has been added to the METT-TC mnemonic. Information considerations are expressed as a parenthetical variable because it is not an independent consideration, but an important component of each variable of METT-TC that leaders must understand when developing understanding of a situation. (See FM 5-0 for additional information on the mission variables.) ROLE OF TACTICS 1-9. Tactical actions always link to operational or strategic objectives; they are never employed in isolation. Tactics serve a distinct purpose and are nested within a larger military campaign. Military operations are inherently joint and frequently multinational in nature. Understanding how tactics fit into the larger picture is the starting point to planning, preparing, executing, and assessing successful tactical operations. JOINT OPERATIONS 1-10. The joint force conducts joint operations through unified action. Unified action is the synchronization, coordination, and/or integration of the activities of governmental and nongovernmental entities with military operations to achieve unity of effort (JP 1, Vol 1). The Army accomplishes its mission by supporting the joint force and unified action partners in four strategic roles: * Shape operational environments. * Counter aggression on land during crisis. * Prevail in large-scale ground combat. * Consolidate gains. 1-11. These strategic roles are not tasks assigned to subordinate units. The U.S. Army’s primary mission supports the joint force by organizing, training, and equipping its forces to conduct prompt and sustained land combat to defeat enemy ground forces and seize, occupy, and defend land areas. MULTIDOMAIN OPERATIONS 1-12. The Army’s contribution to joint operations is multidomain operations. Multidomain operations are the combined arms employment of joint and Army capabilities to create and exploit relative advantages that achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force commanders (FM 3- 0). Multidomain operations are how Army forces operate as part of the joint force against threats able to
3-90
25
Army Tactics contest the joint force in all domains. Army forces simultaneously support and are supported by the joint force across all domains. This interdependent relationship between the Army and the rest of the joint force allows joint force commanders to impose multiple dilemmas on the enemy. This interdependence is also why all Army operations are multidomain operations. 1-13. At the tactical level of warfare, Army formations provide unique capabilities to the joint force. These capabilities include but are not limited to ground maneuver forces able to seize and hold terrain, surface based indirect fires, air and missile defense, and sustainment. Army tactical formations also use joint force capabilities including fixed- and rotary-wing aviation, unmanned aircraft systems (UAS), satellite communications, and the global positioning system during offensive, defensive, and stability operations. 1-14. All Army operations are multidomain operations. This is because every operation requires integrating capabilities from all domains to succeed. For example, at the lower tactical levels companies and platoons employ capabilities from other domains such as aviation (including UAS), joint fires, satellite communications, and the global positioning system. As part of the joint force, Army forces execute multidomain operations throughout the competition, crisis, and conflict contexts. Army tactical formations typically conduct operations dominated by one context at a time. (See FM 3-0 for more information on Army operations during competition and crisis). 1-15. During combat operations tactical-level Army forces execute offensive, defensive, and stability operations supported by enabling operations to achieve tactical objectives that support operational and strategic objectives. While a division possesses the capability and capacity to conduct simultaneous offensive, defensive, and stability operations, brigade combat teams (BCTs) and below are typically only capable of executing a single type of operation at a given time. 1-16. FM 3-90 focuses on the tactics associated with large-scale combat operations at the tactical level with particular emphasis on offensive, defensive, and enabling operations. (See ADP 3-07 for more information on stability operations and ADP 3-28 for more information on defense support to civil authorities). OFFENSIVE, DEFENSIVE, STABILITY, AND ENABLING OPERATIONS 1-17. An offensive operation is an operation to defeat or destroy enemy forces and gain control of terrain, resources, and population centers (ADP 3-0). A defensive operation is an operation to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive or stability operations (ADP 3- 0). A stability operation is an operation conducted outside the United States in coordination with other instruments of national power to establish or maintain a secure environment and provide essential governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP 3-0). Every type of operation has a mission that consists of a task and purpose. 1-18. An enabling operation is an operation that sets the friendly conditions required for mission accomplishment. By themselves, enabling operations do not directly accomplish the commander’s end state and are not decisive on their own, but are required to conduct successful offensive, defensive, and stability operations. Enabling operations can also be described or listed as key tasks during the execution of a mission. 1-19. Offensive, defensive, and enabling operations arrange friendly forces by purpose. Purpose describes friendly force goals with respect to the enemy force’s ability to achieve its objectives. Objective is a location used to orient operations, phase operations, facilitate changes of direction, and provide for unity of effort (ADP 3-90). Based on the purpose assigned, the commander selects a type of offensive or defensive operation and any enabling operations required. The types of operations have subsets called variations. The variations share similar ways of organizing forces as the parent operation, with differing conditions and outcomes. The taxonomy provides, if needed, additional categories of methods and forms. Figure 1-1 illustrates the Army’s tactical taxonomy.
3-90
26
Chapter 1 Figure 1-1. Army tactical taxonomy Offensive Operations 1-20. Chapter 3 discusses general considerations for offensive operations. The four types of offensive operations are— * Movement to contact. (See Chapter 4). * Attack. (See Chapter 5). * Exploitation. (See Chapter 6). * Pursuit. (See Chapter 7). Defensive Operations 1-21. Chapter 8 discusses general considerations for defensive operations. The three types of defensive operations are— * Area defense. (See Chapter 9). * Mobile defense. (See Chapter 10). * Retrograde. (See Chapter 11). Enabling Operations 1-22. Chapters 12-20 discuss enabling operations. The nine types of enabling operations are— * Reconnaissance. (See Chapter 12). * Security operations. (See Chapter 13).
3-90
27
Army Tactics * Troop movement. (See Chapter 14). * Relief in place. (See Chapter 15). * Passage of lines. (See Chapter 16). * Countermobility. (See Chapter 17). * Mobility. (See Chapter 18). * Tactical deception. (See Chapter 19). * Linkup. (See Chapter 20). GENERAL CONSIDERATIONS FOR TACTICS 1-23. The tasks assigned to subordinates are as much an aspect of tactics as employment and arrangement. Commanders and units use tactics as the basis for their concept of operations, which is derived from understanding the mission variables and operational environment. The three subcomponents of tactics are— * Employment: the synchronization of warfighting functions. The characteristics of the offense and the defense assist in framing the synchronization of warfighting functions. * Arrangement: formations in relation to friendly forces, enemy forces, and the terrain. The type of operations and forms of maneuver provide a baseline for these arrangements. * Directed actions: the task and purpose directed by a commander to achieve objectives. The tactical mission tasks generally are used to direct the actions of subordinate forces. 1-24. A warfighting function is a group of tasks and systems united by a common purpose that commanders use to accomplish missions and training objectives (ADP 3-0). Synchronizing the six warfighting functions through prior planning and preparation increases a unit’s effectiveness when executing operations. The six warfighting functions are— * Command and control. * Movement and maneuver. * Intelligence. * Fires. * Sustainment. * Protection. See ADP 3-0 for detailed discussion on warfighting functions. 1-25. Each warfighting functions contributes to generating and applying combat power during operations. Combat power is the total means of destructive and/or disruptive force that a military unit/formation can apply against the opponent at a given time (JP 3-0). Synchronizing operations produces complementary and reinforcing effects that result in a powerful blow that overwhelms enemy forces and creates friendly momentum. Army forces deliver that blow through a combination of five dynamics. The dynamics of combat power are— * Leadership. * Firepower. * Information. * Mobility. * Survivability. See FM 3-0 for more information on each dynamic of combat power. 1-26. Tactics don’t happen in isolation, and they are influenced by a large variety of considerations. The remainder of this chapter discusses general tactical considerations broken down by warfighting function and are applicable to all types of operations. These considerations are in addition to those offensive and defensive specific considerations discussed separately in Chapter 3 and Chapter 8. COMMAND AND CONTROL WARFIGHTING FUNCTION 1-27. The command and control warfighting function is the related tasks and a system that enable commanders to synchronize and converge all elements of power (ADP 3-0). The primary purpose of the
3-90
28
Chapter 1 command and control warfighting function is to assist commanders in integrating the other warfighting functions effectively at each echelon and to apply combat power to achieve objectives and accomplish missions. The command and control warfighting function consists of the command and control warfighting function tasks and the command and control system. (See ADP 3-0 for a detailed description of the command and control warfighting function.) 1-28. Commanders, assisted by their staffs, integrate numerous processes and activities within the headquarters and across the force as they exercise command and control. The commander’s mission and intent determine the scheme of maneuver and the allocation of available resources. Commanders issue intent linking the purpose of an operation with the conditions that define the desired end state. 1-29. Units must prepare to execute operations with degraded or minimal communications. Throughout the operations process, units may operate within range of enemy jamming capabilities. Situations will likely arise requiring units to reduce their electromagnetic signature. These situations may require units to employ emission control procedures to reduce the effectiveness of enemy targeting efforts. Operations during these periods require clearly understood and rehearsed standard operating procedures at all echelons. Successful operations during these periods requires that units have clearly developed emission control plans and exercise electromagnetic protection tasks focused on transmitting only mission essential information. (See FM 3-12 for more information on emission control procedures.) Hasty and Deliberate Operations 1-30. Most military operations lie somewhere along a continuum between a hasty operation and a deliberate operation. A hasty operation is an operation in which a commander directs immediately available forces, using fragmentary orders, to perform tasks with minimal preparation, trading planning and preparation time for speed of execution (ADP 3-90). A deliberate operation is an operation in which the tactical situation allows the development and coordination of detailed plans, including multiple branches and sequels (ADP 3- 90). 1-31. Generally, hasty operations take advantage of fleeting tactical opportunities that provide their formations a position of advantage over the enemy. In doing so commanders accept the risk of reduced planning, preparation, and coordination. Some situations may require commanders to take more time to plan and prepare their formations to ensure detailed integration and synchronization of the combined arms team. Any type of operation can be characterized as hasty or deliberate. (See ADP 3-90 for more information on hasty and deliberate operations.) Tactical Framework 1-32. The tactical framework provides leaders with a framework to help visualize operations and to organize their force. The framework is applicable to all types of offensive and defensive operations. Figure 1-2 is a graphical depiction of the tactical framework. Inherent to the tactical framework is the concept of combined arms. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater than if each element was used separately or sequentially (ADP 3-0). FM 3-90 uses it to expand the discussion for each type of offensive and defensive operation. The tactical framework consists of— * Find the enemy. Intel drives fires and maneuver. * Fix the enemy. Prevent repositioning or reinforcement making them easier to destroy. * Finish the enemy. Mass available combat power to accomplish the mission. * Follow through. Defeat in detail, consolidate, reorganize, and transition.
3-90
29
Army Tactics Figure 1-2. Tactical framework Find the Enemy 1-33. Units find the enemy through aggressive information collection activities that provide commanders with timely, detailed, and accurate intelligence. Once a unit gains contact with the enemy they fight to maintain contact unless directed otherwise by their higher headquarters. Information collection activities contribute to improving situational understanding regarding the enemy and terrain. Units use as many capabilities as possible when performing information collection. Finding every enemy formation is likely impractical within the time and assets available. Therefore, information collection focuses on reducing those uncertainties within the assigned area that directly impact mission accomplishment. 1-34. Units use human and technical means to confirm suspected locations of enemy formations and capabilities. When successful, information collection enables commanders to use combined arms actions to fix and destroy enemy formations and shape the battlefield. If information collection efforts are unsuccessful, friendly forces conduct a movement to contact to find the enemy. Once the location of the enemy is known, friendly forces conduct actions on contact and maintain contact with the enemy. Fix the Enemy 1-35. Fixing the enemy limits their maneuver options and prevents them from repositioning, reinforcing, or reorganizing. Fixing the enemy requires using combined arms and allows friendly forces to mass combat power against a relatively static enemy. Units seek to fix enemy forces with the minimum amount of combat power since fixing an enemy is typically a supporting effort. 1-36. Units at all echelons use all capabilities at their disposal to gain and maintain contact with the enemy and use combined arms to fix the enemy. Units can also isolate the enemy by severing lines of communications to fix enemy forces and prevent reinforcement. Nearly every type of offensive or defensive