FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-98 | 123 | Security Operations
Figure 5-8. Visual contact during moving flank guard operation
Bravo Troop conducts a fire mission with A/3-29 Field Artillery. Upon completion of the fire mission, Bravo
Troop coordinates with Charlie Company to move two tank platoons into battle position 1 and battle position 2.
Bravo Troop conducts a linkup and a battle handover with Charlie Company using a rearward passage of
lines. Once the last vehicle moves through the passage point, Bravo Troop moves their forces north and
conducts an alternating bound to take over the northern most area of operations. This allows them to destroy
the enemy force while allowing the moving flank guard’s tempo to continue uninterrupted. If a larger force
were observed, then the squadron commander would have to relay to the brigade commander to address the
composition and disposition of the enemy force moving towards the flank of the squadron, brigade, and division.
Once the brigade secures OBJECTIVE KING, the squadron transitions to a screen operation and begins
consolidation and reorganization tasks. The division adjusts the task organization in preparation for follow-
on operations and the attachments no longer under the squadron’s control are escorted to their next location.
The squadron uses the time to conduct sustainment operations.
REAR GUARD
5-83. A rear guard protects the exposed rear of the main body. Rear guards are appropriate when conducting
offensive tasks, when the protected force breaks contact with flanking forces, or during a retrograde. The rear
guard deploys and defends for moving and stationary main bodies. The tasks described for a stationary flank
guard apply. The rear guard for a moving force displaces to successive battle positions along PLs in-depth as
the main body moves. The nature of enemy contact determines the scheme of maneuver for displacement.
(Refer to FM 3-90-2 for more information.) The commander establishes the rear guard during retrograde
operations in two ways: |
3-98 | 124 | Chapter 5
* The guarding force relieves other units in place as they move to the rear.
* The guarding force establishes a position in-depth behind the main body and passes those forces through.
MOVEMENTS INTO SECURITY AREAS FOR STATIONARY SECURITY MISSIONS
5-84. The security force establishes stationary security mission in a similar manner. In deploying into the
security area, the security force must address competing requirements; to establish the security area quickly
to meet mission requirements, and to provide the necessary level of security for itself. The security force
moves into the security area using one of the following three methods listed below:
* Tactical road march.
* Movement to contact.
* Zone reconnaissance.
Tactical Road March Method
5-85. The fastest but least secure method of deploying is a tactical road march from the rear boundary of the
security area to the initial positions. The security forces move to a release point on the rear boundary. From
the release point, subordinate elements deploy to occupy initial positions, moving by the quickest means
possible. This method is appropriate when the security force commander does not expect enemy contact, time
is critical, or previous zone reconnaissance of the security area conducted by aviation units found no enemy
in the security area.
Movement to Contact Method
5-86. In the second method, the security force conducts a movement to contact from an LD (usually the rear
boundary of the security area) to the initial positions. This method is slower than a tactical road march but
more secure. It is appropriate when enemy contact is likely, time is limited, the situation does not require
detailed reconnaissance of the terrain, or aviation elements or other assets conducting zone reconnaissance
forward of the ground element detect enemy forces in the security area.
Zone Reconnaissance Method
5-87. The most secure method for moving into the initial positions is for the security force to conduct zone
reconnaissance from the security area’s rear boundary to its initial security line positions or the forward limit
of the security area. Given adequate time, this method is preferred because it allows the security force to clear
the security area and become familiar with the terrain that it may have to defend. The security force
reconnoiters potential subsequent positions and fire support system firing positions as it moves to its initial
positions. A zone reconnaissance is appropriate when time is available and information about enemy forces
or terrain is unknown. While this technique provides information of tactical value on the enemy forces and
terrain in the area, it also consumes time. Using air reconnaissance forward of the ground units increases the
speed and security of the movement.
MOVEMENT DURING MOVING FLANK SECURITY MISSIONS
5-88. There are three techniques of occupying and moving in a flank security area for moving security
missions. These techniques are based on how the security force crosses the LD—
* Separately from the main body and deploys to perform the mission.
* Separately from the main body, lead elements conduct a movement to contact.
* With the main body and conducts zone reconnaissance out to the limit of the security area.
5-89. Commanders should not require the security force to make its own penetration when it faces prepared
enemy defenses. This may prevent or significantly delay the security force from assuming its duties. They
often combine the three techniques described in paragraphs 5-90 through 5-92 (pages 5-24 through 5-27).
Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission
5-90. In this first technique, the security forces cross the LD separately from the main the body and deploy
to perform the mission, as seen in figure 5-9 and figure 5-10 (page 5-26). The security force then conducts a |
3-98 | 125 | Security Operations
tactical road march, an approach march, or tactical movements parallel to the main body and drops off
observation posts or occupies battle positions along the flank of the main body. This technique keeps the two
forces from interfering with each other during deployment. When another force penetrates the line of contact,
and the main body is not in contact with the enemy and is moving quickly, it is appropriate that the LD is
uncontested. The IPB process indicates that enemy contact is not likely in the area through which the security
force is moving. It is the fastest but least secure technique.
Figure 5-9. Security force crossing the LD separately to establish a flank screen |
3-98 | 126 | Chapter 5
Figure 5-10. Security force continuing to cross LD separately to
establish a flank screen
Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission
5-91. In this technique, the security force crosses the LD separately from the main body, and its lead elements
conduct a movement to contact, as seen in figure 5-11. Follow-on elements occupy positions as they reach
them. This technique is appropriate when the main body is moving slower than in the first method (separately
from the main body and deploys to perform the mission), the LD is uncontested, and the IPB process estimates
possible enemy contact. This technique is slower than the previous technique (separately from the main body
and deploys to perform the mission) but provides better security. |
3-98 | 127 | Security Operations
Figure 5-11. Movement to contact technique during moving flank security mission
Security Force Crosses LD with the Main Body and Conducts Zone Reconnaissance out to the
Limit of the Security Area
5-92. The final technique is when the security force crosses the LD with the main body and conducts zone
reconnaissance out to the far limit of the security area, as seen in figure 5-12, page 5-28. This technique is
appropriate when the LD is also the line of contact, the main body makes its own penetration of the enemy
defenses along the line of contact, the main body is moving slowly, and leaders do not clearly understand the
enemy situation. The security force may follow the lead element of the main body through the gap and deploy
when the situation permits. This technique provides increased security for both the security force and the
main body; it is also the most time-consuming technique. |
3-98 | 128 | Chapter 5
Figure 5-12. Zone reconnaissance technique during moving flank security mission
COVER
5-93. A cover is a type of security operation done independent of the main body to protect them by fighting
to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-90).
Commanders use the cover task offensively and defensively. A cover is a brigade-level, force-oriented
mission that protects the division or corps main body from detection or engagement by enemy forces
attempting to delay or disrupt friendly operations. A covering force may be offensive or defensive in nature.
The nature of the cover mission reflects the type of operation conducted by the division or corps. All covering
force operations are aggressively executed making maximum use of offensive opportunities. A covering force
accomplishes all the tasks of screening and guard forces. (Refer to FM 3-90-2 for more information.)
5-94. A covering force is an independently operating, self-contained force conducting the cover mission.
The covering force operates away from the main body to develop the situation, prevent enemy ground
observation, and protect the main body from direct and indirect fires. METT-TC (I) factors determine the
distance from the main body. To protect the main body from effective ground observation and direct fires,
the BCT may execute operations as far as 50 to 60 kilometers from the main body. The covering force denies
the enemy information by conducting counterreconnaissance to destroy enemy reconnaissance and enemy
forces within the security zone. A covering force develops the situation earlier than a guard force, fights
longer and more frequently, and defeats larger enemy forces than a guard force. Furthermore, a covering
force reconnoiters, screens, attacks, defends, and delays as necessary. The covering force does not allow
enemy forces to bypass and affect the main body. |
3-98 | 129 | Security Operations
5-95. Division or corps headquarters determine the requirements for a covering force built around a brigade.
Maneuver, enabling, and sustainment assets reinforce the covering force so it can accomplish its mission.
Reinforcements increase the distance and time the covering force can operate away from the main body and
enhances the covering force’s ability to fight. Reinforcements typically revert to their parent organizations
upon the passage of the covering force (see table 5-3).
Table 5-3. Typical command and support relationships for cover operations
ATTACHMENT RELATIONSHIP PARENT ORGANIZATION
Battalion Task Force Attached Division
Cavalry Squadron Attached Division
Air Cavalry Squadron/
Operational Control Division/Corps
Attack Battalion
Field Artillery Brigade Attached or Direct Support Division/Corps
Engineer Battalion Attached or Direct Support Division/Corps
Air Defense Artillery Brigade Attached or Direct Support Corps
Additional Sustainment Units Attached Division/Corps
5-96. A covering force may be offensive or defensive in nature, but a covering force executes all covering
force operations aggressively to maximize offensive opportunities. The covering force executes its mission
as it would in zone reconnaissance or reconnaissance in force in that it is force-oriented.
OFFENSIVE COVER
5-97. An offensive covering force seizes the initiative early, allowing the main body commander freedom of
maneuver. While conducting offensive tasks, a covering force may operate to the front or flanks of the main
body. Offensive covering forces conduct reconnaissance along the main body’s axis of advance. They deny
the enemy information about the size, strength, composition, and objective of the main body, destroy, disrupt,
or fix enemy forces and reconnaissance assets in the security zone forces, develop the situation to determine
enemy strengths, weaknesses, and disposition, and exploit opportunities until main body forces are
committed. Advance cover and flank cover are two types of offensive covers.
5-98. The following are a list of offensive tasks Cavalry units could conduct within capability during
offensive cover missions:
* Destroy, disrupt, or fix enemy forces and reconnaissance assets in the disruption zone.
* Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. Must
prevent ground observation and direct fire against the main body.
* Maintain contact with the protected force and other forces operating on its flanks.
* Gain and maintain contact with enemy forces, and report activity in the assigned area.
* Maintain observation of avenues of approach that affect the protected forces’ mission.
* Locate and identify enemy forces in the battle zone, and conduct handover to follow-on forces.
* Cause the enemy to commit resources to counter the cover force that would have been used against
the main body.
* Deny the enemy information about the size, strength, composition, and objective of the main body.
* Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main
body forces are committed.
* Clear or bypass enemy forces in the assigned area according to engagement criteria.
* Conduct reconnaissance along the main body’s axis of advance.
* Penetrate the enemy’s disruption zone to locate enemy main defensive positions.
* Locate gaps or weaknesses in the enemy’s defensive scheme.
* Defeat or repel enemy forces as directed by the higher commander. |
3-98 | 130 | Chapter 5
5-99. If encounter turns into a meeting engagement—
* Destroy enemy reconnaissance and lead elements of the main body.
* Determine the location of enemy assailable flanks.
* Fix enemy forces to allow the main body to maneuver around enemy strengths or through
enemy weaknesses.
Advance Covering Force
5-100. An advance covering force is an offensive cover operation. An advance covering force is task
organized to locate and penetrate the security zone and forward defenses of an enemy force deployed to
defend and to destroy enemy reconnaissance, advance guard units, and first-echelon units of a moving
enemy force.
BCT Planning and Execution Considerations for Offensive Cover Missions
5-101. The BCT advances on a broad front and conducts operations similar to that for zone reconnaissance
or movement to contact. Staffs determine the width of the zone to cover during mission analysis and IPB.
Typically, aviation assets task organized to the covering force reconnoiter forward of the advancing ground
elements. Upon enemy contact, air assets engage and destroy enemy forces according to the covering force
commander’s intent. They report the enemy’s location, composition, and disposition to the ground forces
while maintaining contact with the enemy. Aviation assets conduct target handover to ground forces when
required. Ground forces from the covering force attack to defeat enemy forces. The covering force must have
approval of the main body commander to bypass enemy forces.
5-102. If the covering force finds a gap in enemy defenses, they prepare to penetrate the integrity of the
defense. The covering force immediately reports to the main body to divert follow-on forces. Covering forces
prepare to defeat enemy counterattack during penetrations due to the opportunities hasty attacks provide to
the defender.
5-103. When the BCT covering force can advance no further, they transition to a defense and prepare to
execute a forward passage of lines of the main body. The covering force continues to perform reconnaissance
of enemy positions to locate gaps or vulnerable flanks. The covering force conducts target and reconnaissance
handovers to guide the main body as they attack through or around the covering force. If the covering force
is successful, the main body commander can attack enemy vulnerabilities at the time desired with previously
uncommitted main body forces.
5-104. The covering force must retain a reserve. At the brigade level, a reserve should consist of attached
attack aviation assets and a maneuver company. The reserve must be an uncommitted force and ready to
deploy at a decisive moment anywhere in the covering force’s zone.
Flank Covering Force
5-105. A flank cover is an offensive covering force mission. If the main body commander perceives a
significant threat to one of the unit’s flanks, the commander assigns a flank cover. A BCT or reconnaissance
and security BCT conducts a flank cover much the same as a flank guard. The main difference between the
two missions is the scope of operations and the distance the covering force operates from the main body
(see figure 5-13). |
3-98 | 131 | Security Operations
Figure 5-13. Reinforced SBCT performing advanced cover
5-106. The flank covering force clears the area between its route of advance and the main body the same as
the flank guard. The flank covering force maintains contact with an element of the main body specified by
the main body commander. The commander assigning the mission designates the area of operations for the
flank covering force and the protected force (see figure 5-14, page 5-32). The flank covering force clears the
area between its route of advance and the main body.
5-107. Integration of aviation assets are essential to a cover mission. Aviation assets may assist in clearing
the area between the covering force and the main body, assisting in maintaining contact with the protected
force, and screening to the front of the units conducting the flank covering force. |
3-98 | 132 | Chapter 5
Figure 5-14. Reinforced ABCT performing flank cover
DEFENSIVE COVER
5-108. A defensive covering force prevents the enemy from attacking at the time, place, and combat strength
of their choosing. The defensive cover forces the enemy to reveal their main effort, to disrupt the enemy’s
attack, destroy their initiative, and set the conditions for their defeat. Defensive covers maintain continuous
observation of avenues of approach. They destroy or disrupt enemy reconnaissance and security forces to
deceive the enemy of friendly disposition, and the location of the main defensive effort. The defensive forces
determine the size, strength, composition, and direction of the enemy’s main effort, and maintain contact and
force the commitment of enemy second-echelon forces. A defensive covering force operates to the front,
flanks, or rear of a main body deploying to defend. Defensive cover is performed most frequently forward of
the main body. |
3-98 | 133 | Security Operations
5-109. The following are a list of defensive tasks Cavalry units could conduct within capability during
defensive cover missions:
* Detect, report, and destroy all enemy elements attempting to pass through the cover, both ground
and aerial, and provide the protected force commander early warning of enemy activities.
* Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements.
* Maintain observation of avenues of approach that affect the protected forces’ mission.
* Maintain contact with the protected force and other forces operating on its flanks.
* Maintain contact with enemy forces, and report activity in the assigned area.
* Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the
enemy’s order of battle based upon the IPB (when facing an echeloned enemy force).
* While displacing, determine the direction of enemy movement, maintain contact, and report
threat activities.
* While displacing, impede and harass the enemy to provide the protected force commander with
additional time and maneuver space.
* Cause the enemy main body to deploy prematurely, and then, report their direction of travel.
* Deny ground observation, and prevent direct fire against the main body.
* Deny the enemy information about the size, strength, composition, and location of the main battle area.
* Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main
body forces are committed.
Planning and Execution Considerations for Defensive Cover Missions
5-110. The planning and execution considerations are applicable to all types of defensive cover. Usually,
the division or corps commander uses a BCT or designates a reconnaissance and security BCT as the
foundation covering force. The commander reinforces and augments it with combat power to increase the
length of time it can fight the covering force battle and to give it the capability to destroy larger enemy forces.
The amount of augmentation the covering force receives depends upon the intent of the main body
commander (see figure 5-15, page 5-35). The BCT commander always designates reserves to seize the
initiative during the early stages of an enemy attack.
5-111. The main body commander designates the forward and rear boundaries of the security force with
PLs. Normally, the lateral boundaries of the security area are extensions of the main body boundaries. The
rear boundary of the security force is the BHL, which is within range of the main body artillery. The BCT
commander designates additional control measures as needed to control the operation.
5-112. The BCT commander assigns an area of operations to each subordinate. Covering force missions
delay and defeat enemy forces to allow maximum time for the main body to prepare and execute offensive
or defensive tasks. If certain terrain is crucial to the operation, the commander may assign battle positions to
TFs. Subordinate commanders have the same options in the deployment of their units. If the terrain and
situation permit, the covering force boundaries are extensions of the boundaries of corresponding main body
units to simplify the battle handover.
5-113. The BCT conducts zone reconnaissance or movement to contact to the forward PL in the security
area. The BCT may be required to fight through enemy resistance to establish control over the security area.
If the unit encounters heavy enemy resistance, the main body commander orders the covering force to occupy
a new defensive line and conducts the cover. Planning for such contingencies is critical to the success of the
covering force mission.
5-114. Battle handover and passage of lines are inherent in the conduct of defensive cover. Battle handover
and passage of lines may not occur simultaneously for all covering force units. As some units begin passage,
others may still be taking advantage of offensive opportunities in other parts of the security area. The BCT
prepares to continue fighting in those portions of the security area where forces are successful to set up
offensive opportunities for the main body. Disengagement criteria established by the division or BCT
commander dictate when covering force units may begin battle handover and passage of lines. |
3-98 | 134 | Chapter 5
5-115. Organic and attached aviation assets are invaluable assets in assisting disengagement of ground units
during the conduct of battle handover and passage of lines with the main body. Additionally, they can assist
in reconnaissance of the security area as the covering force moves forward, screening forward of the covering
force, covering areas between ground units, and providing additional firepower for disengaging ground units.
5-116. BCT staffs consider communications requirements to maintain contact with the main body and
subordinate battalions within the covering force. Covering forces consider use of high frequency and tactical
satellite communications to maintain continuous communications with all organic units, adjacent units, and
higher. Covering forces may require additional signal assets to provide communications infrastructure
support and retransmission.
5-117. Reserves are critical to a defensive cover. They allow the BCT commander to seize the initiative
during the early stages of an enemy attack. The covering force commander always designates a reserve.
Frequently, reserves are attack aviation units, combined arms battalions, and other operational control
maneuver forces. In the absence of attached or operational control maneuver units, the BCT commander may
assign a contingency mission to assigned tank companies and dictate employment restrictions to subordinate
commanders. The tank company is the battalion-level commander’s primary reserve force. Normally,
commanders position ground reserve forces in-depth and prepare them to execute a series of contingency
missions, such as counterattack, block, and assume an area defense. Aviation reserves may counterattack in
coordination with ground reserves and conduct an attack against enemy forces in close friendly contact.
Frequently, the covering force commander designs the defense to shape an enemy penetration causing the
enemy to become isolated and to provide opportunities to mass effects to defeat the isolated enemy. |
3-98 | 135 | Security Operations
Figure 5-15. Reinforced ABCT performing defensive cover
Flank and Rear Defensive Covering Forces
5-118. The planning and execution considerations for flank and rear defensive covering forces are the same
as for a frontal covering force. A rear covering force mission is similar to a rear guard mission. A rear
covering force protects a force moving away from the enemy. The BCT deploys behind the forward maneuver
units of the main body, conducts battle handover and passage of lines, and then defends or delays.
Alternatively, the covering force may conduct a relief in place as part of a deception plan or to take advantage
of the best defensive terrain.
5-119. The BCT deploys its subordinate units abreast and in-depth. The subordinate units establish passage
points and assist in the rearward passage of the main body as needed. From that point on, the mission is
conducted the same as any other defensive covering force operation. As the main body moves, the covering
force displaces to subsequent PLs in-depth. If the enemy does not follow the withdrawing forces, contact
may be lost eventually. Fighting a defense or delay is necessary if the enemy detects the movement and attacks. |
3-98 | 136 | Chapter 5
AREA SECURITY
5-120. Area security is a type of security operation conducted to protect friendly forces, lines of
communications, and activities within a specific area (ADP 3-90). The BCT conducts area security to
preserve the commander’s freedom of maneuver, ability to move reserves, positioning of fire support assets,
and to provide effective command and control and conduct sustainment operations. Area security degrades
the enemy’s ability to affect friendly actions in a specific area by denying the enemy’s use of an area for its
own purposes. Area security is essential to all operations, particularly operations in asymmetric environments
during stability tasks. Area security enables military support to local governance, reconstruction efforts, rule
of law, and the development of legitimate security forces. BCTs conduct area security to establish security
around base camps, critical infrastructure, airfields, facilities, main supply routes (MSRs), lines of
communication, terrain features, towns, equipment, and high-value assets. Offense, defense, and stability
tasks support area security.
5-121. Area security is largely concerned with consolidating gains. Area security is typically phased and
ranges in scale. Upon completion or during the execution of a large-scale ground combat operation, area
security initially works to defeat bypassed enemy units that could constitute a means for further resistance or
impact sustainment operations. As that enemy is defeated, actions transition to the defense of the local
population, and finally, stability operations. Effectively, area security establishes the initial basis for wide
area security.
5-122. Army forces perform area security to ensure freedom of action and to deny enemy forces the ability
to disrupt operations. Commanders combine reconnaissance tasks and offensive, defensive, and stability
operations to protect friendly forces, populations, infrastructure, and activities critical to mission
accomplishment. Army forces integrate with partner military, law enforcement, and civil capabilities to
establish and maintain security. The Army’s ability to establish control is critical to consolidating gains in
the wake of successful military operations.
5-123. The commander may task subordinate units to conduct the following to support area security operations:
* Area, route, or zone reconnaissance.
* Screen.
* Offensive and defensive tasks (within capabilities).
* Route and convoy security.
* Security for high-value assets.
* Route or convoy security of critical lines of communications.
* Checkpoint operations to monitor or control movement.
* Patrol to cover gaps between secured perimeters.
* Maintaining an observable presence.
EXECUTION CONSIDERATIONS
5-124. When conducting an area security mission, the security force prevents threat, ground reconnaissance
elements from directly observing friendly activities within the area the force is securing. Within capabilities,
the security force prevents threat, ground maneuver forces from penetrating the defensive perimeters.
5-125. The commander can have the subordinate troops employ a variety of techniques, such as observation
posts, battle positions, ambushes, and combat outposts, to accomplish the security mission. A reserve or quick
reaction force enables the commander to react to unforeseen contingencies. The Cavalry squadron can
execute ambushes and preemptive strikes with greater precision using the intelligence assets available to the
BCT. Figure 5-16 is an example of a BCT Cavalry squadron conducting area security of a village.
5-126. METT-TC (I) determines the required augmentation for the Cavalry squadron. Of particular
importance is the need for such assets as aviation, maneuver forces, engineers, intelligence operations assets,
Armor, Infantry, and military police. Early warning of threat activity is paramount in area security missions
and provides the commander with time and space to react to threats. Failure to conduct continuous
reconnaissance may create a vulnerable seam where the enemy can execute an infiltration or attack. |
3-98 | 137 | Security Operations
5-127. A unit establishes a perimeter when it secures an area where the defense does not have a supporting
unit. Perimeters vary in shape and distribution of assets based upon the results of mission analysis, IPB, and
METT-TC (I). A probable direction of attack based on the enemy’s most likely and most dangerous courses
of action, as determined in the IPB, may require the massing of combat power in that portion of the perimeter
to defeat an attack or infiltration. If the perimeter was inward-focused as in stability tasks, the massing of combat
power would prevent exfiltration or a breakout from the secured area.
5-128. Usually, the unit establishing the perimeter divides it into subordinate unit sectors with boundaries
and contact points. The unit employs integrated observation posts, integrating attack and reconnaissance
aviation, ground-based sensors, UASs, HUMINT assets, and mounted and dismounted patrols. Commanders
emplace attached tanks and other antiarmor weapon systems to orient on high-speed avenues of approach.
UASs and ground-based sensors provide overlapping reconnaissance capabilities at extended distances from
the perimeter.
Figure 5-16. Cavalry squadron conducting area security
5-129. Area security is a frequent mission conducted during stability tasks when circumstances may not
permit establishment of clearly defined perimeters. When a perimeter is not feasible, the Cavalry unit secures
the area by establishing a presence and conducting reconnaissance tasks throughout the area. Subordinate |
3-98 | 138 | Chapter 5
units establish perimeters around base camps, critical infrastructure, and high-value assets, while other units
conduct operations to establish presence, provide security, and assist in stability or relief tasks. The
commander positions reaction forces or disperses the reserve between several secured perimeters. Other
missions or tasks that support area security may include the following:
* Route or convoy security of critical lines of communications.
* Checkpoint operations to monitor or control movement.
* Patrols to cover gaps between secured perimeters.
* Maintain an observable presence.
ROUTE SECURITY
5-130. Cavalry units conduct route security missions to prevent enemy forces from affecting freedom of
maneuver along a protected route. A route security force operates on and to the flanks of a designated route.
Route security operations are defensive in nature, and unlike guard operations, are terrain-oriented. A route
security force prevents an enemy force from impeding, harassing, containing, seizing, or destroying traffic
along the route. To accomplish this task, the force performs the following functions:
* Conduct continuous mounted and dismounted reconnaissance of the route and key locations along
the route to ensure trafficability.
* Conduct sweeps of the route at irregular intervals to prevent emplacement of enemy mines.
* Cordon sections of the route to search suspected enemy locations.
* Establish roadblocks and checkpoints along the route and lateral routes to stop and search vehicles,
persons, and those entering the route.
* Occupy key locations and terrain along or near the route. If possible, establish a screen oriented
to prevent enemy direct fire weapons and observation from influencing the route. This function is
known as out posting, also.
* Aggressively conduct ground and aerial patrols to maintain route security.
* Establish observation posts (covert and overt) or ambushes at critical points to watch for threat activity.
CONVOY SECURITY
5-131. Convoy security is a subset of area security. Convoy security missions are offensive in nature and
orient on the protected force. Typically, a convoy security is a security mission assigned to Cavalry troops,
maneuver companies, and maneuver platoons. Commanders order convoy security missions when
insufficient friendly forces are available to secure lines of communication in an area of operations. The
commander may order troops to conduct convoy security missions in conjunction with route security
operations. A convoy security force operates to the front, flanks, and rear of a convoy element moving along
a designated route or integrated into the body of the convoy.
5-132. A convoy security mission has specific tasks that guide planning and execution. The security force
accomplishes the following to protect a convoy:
* Reconnoiter the route the convoy is to travel.
* Clear the route of obstacles or positions from which the enemy could influence movement.
* Provide early warning of enemy presence along the route.
* Prevent the enemy from impeding, harassing, containing, seizing, or destroying the convoy.
Organization
5-133. If possible, the convoy security force is a combined arms organization with integrated air and ground
assets (see figure 5-17). Ideally, a convoy security force has sufficient combat power to organize into the
following elements:
* Advance guard. The advance guard performs continuous reconnaissance tasks along the main
body’s axis of advance or route. The advance guard maintains continuous surveillance of enemy
avenues of approach and destroys or repels enemy reconnaissance and security forces to protect
the convoy.
* Security element. The security element provides early warning and security to the convoy’s flanks
and rear. They may perform duties of the escort element. |
3-98 | 139 | Security Operations
* Escort element. The escort element provides close-in protection to the convoy. They may provide
a response force to assist in repelling or destroying threat contact.
* Reaction force. The reaction force provides firepower and support to assist the other elements in
developing the situation or conducting a hasty attack. They may perform duties of the
escort element.
Figure 5-17. Convoy security organization |
3-98 | 140 | Chapter 5
Planning and Execution Considerations
5-134. Convoy security missions generate unique requirements the commander and staff should take into
account when formulating a plan. The convoy security commander and subordinates receive a briefing on
the latest information regarding the threat situation and the area through which the convoy is to pass.
5-135. The commander formulates plans and issues orders covering the commander’s intent, assignment of
security force elements (reconnaissance, screen, escort, and reaction), the movement formation, and intervals
between echelons and vehicles, rate of travel, and detailed plans for actions on contact. Leaders at all levels
should ensure the convoy security force identify and rehearse immediate action drills (such as enemy ambush,
obstacle, and react to indirect fire) before movement and can execute them in case of contact.
5-136. The commander may maintain a quick reaction force to support the convoy movement. The Cavalry
unit may perform this mission. In addition, the commander assigns the Cavalry unit to set up outposts along
the convoy route or movement corridor to provide overwatch and security of the area. Usually, the
commander does not assign the Cavalry unit an area of operations but tasks the Cavalry unit to provide
security for that segment of the route or corridor.
5-137. Communications are vital to the success of movement. Leaders plan communications with convoy
elements and units occupying areas of operations along the route of movement to ensure support assets
availability. Visual and sound signals are prearranged. Signals include colored smoke, identification panels,
whistles or horn signals, and escalation of force signs. While limited, these communications means are
effective when all personnel understand the prearranged signals and responses.
5-138. When possible, units should coordinate fires along the entire route of movement. Adequate fires
planning and prior coordination with fire support cells can ensure indirect fire coverage. The fire support
officer conducts detailed fire support rehearsals on the fire support net before convoy movement. The officer
conducts rehearsals to confirm communications connectivity and to improve the fire support team’s overall
understanding of the fire support plan. Planning and coordination must occur among all units involved if the
convoy plans to move through multiple units’ area of operations.
5-139. If an air threat is possible, the commander addresses air defense of the convoy in the planning phase.
The convoy elements review small arms air defense procedures and establish orientation sectors. The
commander orchestrates air defense reinforcements into the movement and defense plan. If the route falls
under an existing air defense umbrella, the staff conducts the appropriate coordination with the controlling
air defense headquarters.
5-140. Convoy security operations in an urban environment or built-up area require different emphasis and
techniques than those in rural areas. The population density and characteristics of the area may require
nonlethal weapons and the careful application of lethal weapons in an effort to minimize collateral damage.
To ensure they apply minimum essential force to minimize loss of life and destruction of property, leaders
conduct detailed planning, coordination, and control. Whenever possible, convoys move through populated
areas when these areas are least congested and pose less danger to the security of the convoy. Convoy
operations may require assistance from military or local police and other government agencies to secure the
route before the convoy enters the built-up area.
5-141. The S-4 and unit commanders plan for sustainment in convoy security operations. Fuel and
maintenance elements are included in the convoy itself, or pre-positioned in secure areas along the route.
Leaders should perform a detailed, precombat inspection before the convoy starts. Commanders plan casualty
evacuation (CASEVAC) along the entire movement route. Commanders maintain coordination between the
security force elements to ensure immediate medical support is available including the aid station, unit
command post, sustainment command post, and designated units along the route. When operating at extended
distances from organic or supporting medical assets, air medical evacuation is the preferred means of
evacuation and is planned and rehearsed in detail.
HIGH-VALUE ASSET CONSIDERATIONS
5-142. High-value assets are assets whose capture or destruction by enemy forces could decisively change
the course of the operation. Security missions to protect high-value assets are an important component of |
3-98 | 141 | Security Operations
area security in major combat operations and stability tasks. Examples of high-value assets to be secured in
major combat operations include the following:
* Major power-generation facilities (power plants and dams).
* Airports, seaports, and other centers for mass transit.
* Industrial complexes.
* Cities.
* Dislocated civilian camps.
5-143. High-value assets to be secured in stability tasks include the following:
* Government officials and political and military leaders.
* Government facilities.
* High-value detainees.
* Pipelines and relay stations.
5-144. Considerations the security force should address when it tasks subordinate elements to secure
high-value assets include the following:
* Internet protocol address, frequencies, location, and linkup point of the high-value asset.
* Route used in reaching the high-value asset, and the composition and disposition of enemy forces
that can influence the route.
* Mission and movement or positioning plan of the high-value asset.
* How easily the threat may detect and target the high-value asset with indirect fire. The security
force should consider its own survivability and maintain adequate standoff from the high-value asset.
* Duration of the mission and sustainment considerations.
* Other friendly or neutral forces in the area and their task and purpose.
* Triggers for change of mission from security to reconnaissance, offensive, or defensive actions. Is
there an implied reserve mission?
* Ability of the security force to maintain communications with higher headquarters.
* Locations used by enemy personnel serving as forward observers for enemy indirect fire systems.
SECTION IV – TRANSITION PLANNING
5-145. The transition from offensive to defensive operations or vice versa consistently occurs during
large-scale combat operations. Cavalry units perform battle handovers by conducting a passage of lines
(forward or rearward), a transition using a relief in place, or a change of mission. Passage of lines and relief
in place are enabling operations found in ADP 3-90.
5-146. Cavalry units are consistently transitioning from reconnaissance and security operations or vice
versa; therefore, planning for transitions begins early in the operations process during the development of the
concept of operations and scheme of maneuver in which decision points are identified for when to execute
those necessary transitions. The reconnaissance and security efforts by the Cavalry unit answer information
requirements that enable the BCT commander and staff to develop transition decision points or refine the
same decision points if the Cavalry unit has to transition earlier or later than originally planned based on
effects from enemy or terrain. The decision points that drive the transition of the Cavalry unit must be
understood at each echelon to ensure the BCT maintains tempo as transitions occur.
BATTLE HANDOVER
5-147. A battle handover is a coordinated operation between two units that transfer responsibility for
fighting an enemy force from one unit to the other. During defensive operations, the battle handover is usually
coordinated in advance so that when ordered to occur, the operation requires minimum coordination. In the
offense, it is often initiated by a fragmentary order based on the situation at hand. Clear standard operating
procedure (SOP) allows units to quickly establish the necessary coordination to preclude a loss of momentum
in the attack. A battle handover is typically associated with the conduct of passage of lines (forward or
rearward). |
3-98 | 142 | Chapter 5
BATTLE HANDOVER PLANNING
5-148. Battle handover can occur during either offensive or defensive operations. During defensive
operations, the battle handover is usually planned and coordinated in advance to facilitate execution and
frequently involves a rearward passage of lines. In the offense, a battle handover is situation dependent and
often initiated by a fragmentary order. Normally, a battle handover occurs in the offense when one unit passes
through or around another unit. Tactical SOPs containing clear, simple, standardized procedures, and control
measures enhance the ability of units to coordinate without experiencing a corresponding loss in momentum.
5-149. Battle handover occurs along a line forward of the stationary force known as the BHL. The BCT
commander establishes the line in coordination with stationary and passing battalion commanders. Usually,
the stationary commander determines the BHL location. The line is forward of the forward edge of the battle
area in the defense or the FLOT in the offense. The BHL is located where elements of the passing unit can
be overwatched effectively by direct fires or supported by indirect fires of the forward combat element of the
stationary unit until the battle handover is complete.
5-150. Physical handover frequently occurs near the BHL. Events may dictate that a force break contact
forward of or behind the BHL; for example, this may occur when there is a gap between echelons of the
attacking enemy force. Close coordination (physical, digital, or voice) between the units involved in the
handover allows them to coordinate and execute this process at the small-unit level.
BATTLE HANDOVER FLOW
5-151. The battle handover operation begins on order of the commander of the units involved or when a
given set of conditions occurs. Defensive handover is complete when the passing unit is clear and the
stationary unit is ready to engage the enemy. These actions may occur at the same time. Offensive handover
is complete when the passing unit crosses the BHL, which is usually considered the LD for the attacking unit.
Until the handover is complete and acknowledged by the commanders, the commander in contact is
responsible for coordinating the fight.
5-152. Coordination for battle handover flows from the commander out of contact to the commander in
contact. The coordination for a battle handover overlaps with the coordination for a passage of lines; the
coordination for both should be accomplished at the same time. The squadron tactical SOP should outline
these coordination requirements to facilitate rapid accomplishment.
5-153. Digital information systems assist the squadron staff with its coordination and synchronization
efforts for the operation. Each unit transmits or delivers a complete copy of its OPORD and overlays by either
digital or analog means. Any changes made after initial distribution are updated immediately. The
coordination between the two commanders involves—
* Establishing digital and voice radio communications.
* Providing updates of friendly and enemy situations (digital, voice, and graphical).
* Coordinating passage points and routes and ensuring these are displayed on operational overlays
(digital and analog).
* Collocating contact points and exchanging liaison personnel (if required).
* Coordinating fires (direct and indirect) and ensuring the direct fire control measures and fire
support coordination measures display on operational overlays (digital and conventional).
* Providing updated obstacle overlays including self-destruct, date-time groups of emplaced family
of scatterable mines obstacles and reserve demolitions in the affected area of operations.
* Determining the need for and dispatching contact point representatives.
* Establishing and coordinating recognition signals.
* Exchanging locations of obstacles and related covering fires.
* Exchanging route information, including waypoints.
* Determining sustainment requirements.
5-154. Due to the fluid nature of a battle handover, commanders can use digital systems to speed the
planning, coordination, and execution processes. Units should plan voice radio; if digital capabilities are
hampered, then units should use frequency modulation to coordinate and execute battle handovers. |
3-98 | 143 | Security Operations
PASSAGE OF LINES (FORWARD AND REARWARD)
5-155. Cavalry units usually begin and end reconnaissance and security operations with a passage of lines,
or a reconnaissance handover (discussed in chapter 4). A passage of lines is a tactical operation designed to
pass one unit through the positions of another unit without interference. A passage may be designated as a
forward or rearward passage of lines. A passage of lines is an inherent aspect of transferring responsibility
for the battle between commanders while maintaining continuity of the fight. Cavalry units can be the passing
or stationary force.
FORWARD PASSAGE OF LINES
5-156. A forward passage of lines occurs when a unit passes through another unit’s positions while moving
toward the enemy (ADP 3-90). Cavalry units conduct forward passage of lines as a transitional operation,
typically before reconnaissance and security missions, when the factors of METT-TC (I) do not provide the
freedom of bypassing a forward friendly unit. A forward passage of lines may also be conducted by Cavalry
units to—
* Continue the attack or counterattack.
* Envelop a threat force.
* Pursue a fleeing threat.
* Pass between friendly areas of operations during nonlinear operations.
5-157. The passing force uses two techniques. In the first technique, the passing force deploys in its attack
formation in the attack positions to the rear of the FLOT and crosses the FLOT in attack formation. This
technique is appropriate if there is adequate maneuver space for the passing force to deploy effectively and
without disrupting the stationary force’s defensive positions. This technique also allows the passing force to
rapidly attack once it crosses the FLOT.
5-158. In the second technique, the passing force deploys after crossing the FLOT. Using this technique,
the passing force crosses the FLOT in march column and then deploys into attack formations prior to crossing
the BHL. This technique is required by restrictive terrain. If this technique is used, the FLOT should be
outside direct fire range of the threat to allow the passing force to deploy before making direct fire contact
with the threat.
5-159. Both of the passing force’s techniques require stationary unit scouts on or near the BHL. The passing
unit may have their scout platoon link up with stationary unit scouts and continue the mission or they may
have combat units deploy along the BHL to overwatch movement of other units. The units on the ground at
the BHL must know the scheme of maneuver of the passing force so that they can act accordingly.
5-160. If the stationary unit identifies a gap or weak point in the threat's deployment, they should go about
identifying axes of attack for the passing force that take advantage of that weakness (reconnaissance-pull).
The premier consideration is that the stationary force should not pass the moving force into the teeth of the
threat defense. The passing force must be flexible enough to modify its scheme of maneuver, if necessary, to
take advantage of weaknesses in the threat’s defense. Figure 5-18, page 5-44 depicts the graphic control
measures associated with a forward passage of lines. |
3-98 | 144 | Chapter 5
Figure 5-18. Forward passage of lines
REARWARD PASSAGE OF LINES
5-161. Historically, Cavalry units conducting a rearward passage of lines have been associated with
covering force operations. This remains true in the contemporary operational environment. Additionally, the
nonlinear battlefield creates continuing requirements for rearward passage of lines. A rearward passage of
lines occurs when a unit passes through another unit’s position while moving away from the enemy
(ADP 3-90). This operation may or may not be conducted under threat pressure. An example of a rearward
passage of lines is a Cavalry squadron as a covering force conducting a rearward passage of lines with the
stationary unit in the main battle area. The covering force (Cavalry squadron) withdraws through the |
3-98 | 145 | Security Operations
stationary force, handing off control of the fight at the BHL. Figure 5-19 provides an example of a rearward
passage of lines with graphic control measures.
Figure 5-19. Rearward passage of lines
Planning Considerations
5-162. Planning procedures for a rearward passage of lines closely resemble the planning procedures for a
forward passage of lines. However, rearward movement is likely to be more difficult because of the following:
* The threat probably has the initiative, which tends to reduce the time available to conduct liaison
and reconnaissance and make detailed plans.
* If the rearward moving force has been in action, its Soldiers are tired and possibly disorganized to
some degree. |
3-98 | 146 | Chapter 5
* The threat may be applying pressure on the passing force.
* Friendly forces may be more difficult to recognize because threat forces may be intermixed with them.
5-163. To facilitate a rearward passage of lines, the stationary force commander develops an overlay. Once
the overlay is prepared, the stationary commander transmits it and any amplifying information to the passing
force commander by way of digital command and control systems. The following graphic control measures
are included in a passage of lines overlay:
* BHL.
* Contact points forward of the BHL.
* Passage points along the forward edge of the battlefield.
* Lanes to the rear of the main battle area.
* Assembly area.
* Release point.
5-164. During a passage of lines, friendly unit density in a relatively small maneuver space may cause
problems in the ability of the commander to maintain the common operating picture in relation to the passed
and passing units. The stationary and passing commanders should determine the best method of exercising
mission command to avoid slowing the tempo of the operation and to reduce fratricide potential.
Rehearsal
5-165. A rehearsal is beneficial to all units responsible in the execution of a passage of lines operation. The
rehearsal allows the passing and stationary unit to work through issues commonly found during this complex
operation. The rehearsal allows for easy identification of the passage points and routes to and from areas of
operations, and for the units to conduct a communication linkup on voice and digital communication systems.
Other rehearsal items include the following:
* Fire support observation plan, target execution, communication linkages, and mutual support operations.
* Fire support coordination measures confirmation.
* Unit routes and positioning review.
* Obstacles, lanes, bypasses, and marking locations, and descriptions.
* Passage points, routes, and recognition procedures. Verify these and review number of vehicles
by type expected at each passage point.
* Route management, contact points, and use of guide’s confirmation.
* Locations for and movement of sustainment units. Arrange for mutual support and any transfer of supplies.
* Locations of aid stations, ambulance exchange points, and CASEVAC procedures.
Responsibilities
5-166. The stationary unit is responsible for providing the passing unit with as much assistance as possible.
Indirect and direct fire support from the stationary unit to the passing unit is pivotal to the success of the
rearward passage of lines. Stationary unit support is especially important in covering the withdrawal of
elements left in contact during a delay. The stationary unit's fire support assets answer calls for fire from the
passing unit until battle handover occurs. The passing unit's fire support assets echelon rearward to provide
continuous fire support for the passing unit until it successfully transitions. Once the passing unit hands over
control of the battle to the stationary unit, the stationary unit initiates and clears calls for all fires forward of
its location. The same procedure applies to the dedicated air defense assets of the passing and stationary units.
5-167. The stationary unit’s engineer assets provide support to prepare the defense and execute the passage.
Priority of effort initially ensures that the passing unit can move through passage lanes around the stationary
unit’s defensive positions. The passing unit shifts to close these passage lanes once the passing unit and any
security elements disengage and withdraw through the security area and obstacles. The stationary unit
provides the passing unit with the previously coordinated combat service support as far forward as possible.
The stationary unit concentrates on providing the passing unit with emergency medical, recovery, and fuel
supplies so the passing unit can move through the stationary unit’s positions rapidly. |
3-98 | 147 | Security Operations
RELIEF IN PLACE
5-168. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is
replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and
the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). Commanders conduct a relief
in place as part of a larger operation, primarily to maintain the combat effectiveness of committed units.
Cavalry units conduct relief in place operations for the following reasons:
* Reconstitute a unit that has sustained heavy losses.
* Decontaminate a committed unit.
* Rest a unit that has been in prolonged combat.
* Conform to a larger tactical plan.
* Resupply a defending Cavalry unit.
* Assign a new mission to the relieved unit.
* Introduce a new unit into combat.
* Set the stage for resuming the offense.
5-169. Defensive relief is conducted to continue the defense. Cavalry units can relieve a larger force as an
economy of force defensive mission. Offensive relief may follow from a follow-and-assume mission
requiring a forward passage of lines.
RELIEF TECHNIQUES
5-170. There are three techniques for conducting a relief: sequentially, simultaneously, or staggered. A
sequential relief is the most time-consuming relief technique but the most secure. Relief proceeds by troop
or company team. Normally, units are relieved in place with the relieving unit assuming the relieved unit’s
positions and missions. This technique is most common when units have similar organizations or when
occupied terrain must be retained.
5-171. The simultaneous relief technique is faster but less secure because all units are moving at the same
time. The decentralized nature of a simultaneous relief requires close coordination to prevent excessive
battlefield clutter. Once command groups and combat trains are collocated, troops move forward at the same
time along designated routes. Relief occurs simultaneously at each location. Relieved units withdraw
immediately upon relief.
5-172. A staggered relief occurs when a commander relieves each element in a sequence determined by the
tactical situation, not its geographic orientation. A staggered relief occurs with relief elements occupying
positions in-depth or adjacent to the relieved unit; this is considered an area relief. This technique is
appropriate when units are dissimilar, when the relieving unit performs a different mission, or when improved
defensive terrain is away from the line of contact. A staggered relief is also appropriate when the unit being
relieved has been contaminated chemically or radiologically. The relieved unit withdraws one unit at a time
or simultaneously and conducts a rearward passage of lines through the relieving unit, if appropriate.
PLANNING CONSIDERATIONS
5-173. Fire support coordination and liaison are conducted between the units. If field artillery units are to
be relieved, they are the first to collocate and the last to leave. DA Form 5517 (Standard Range Card) target
lists, and overlays are given to the incoming unit to ensure the effective delivery of fire. If printed DA Form
5517s are not available, use what you have on hand. Fire support assets of the relieved unit remain in position
throughout the relief of maneuver units and are prepared to support both units. Fire support assets of the
relieving unit move into positions as quickly as possible so they can support both units during the relief.
Combat trains are collocated to facilitate coordination and transfer of equipment, excess ammunition, fuel,
water, and medical supplies.
5-174. The relieving unit establishes continuous liaison with the relieved unit immediately upon receipt of
the order. The squadron command group moves to the contact point of the relieving unit to coordinate the
operation. The relieving unit enters and monitors the command net of the relieved unit. Troops and company
teams of both units remain on their internal and parent unit nets. The relieving unit maintains radio listening |
3-98 | 148 | Chapter 5
silence on all nets until the relief is complete. The sudden increase in radio traffic is a quick indictor to the
threat that a relief is occurring. Upon passage of command, the relieving unit returns to its command net and
lifts listening silence as necessary. The relieved unit should maintain radio listening silence during its withdrawal.
MOVEMENT CONTROL
5-175. A priority of maintaining movement control is designating and ranking routes. The squadron
executive officer supervises unit movement. Rally points for the relieved unit are used at company level to
quickly organize the unit for withdrawal. Guides are positioned at critical points along the routes. AAs are
designated and activities performed in these areas are specified. Separate AAs are designated for the incoming
and outgoing units to minimize confusion. Time spent within AAs is minimized to avoid possible compromise.
PASSAGE OF COMMAND
5-176. The division or corps order may specify the passage of command as a time when relief is to be
completed. At unit level, the commanders mutually agree to the sequence for the passage of command. This
is physically accomplished when a specified percentage, normally greater than one-half of the relieving units
are in position and report relief. Passage of command at the squadron and TF level is acknowledged
face-to-face by both commanders and passed to subordinates.
CHANGE OF MISSION
5-177. A change of mission is another type of transition Cavalry units can expect during reconnaissance
and security operations. Change of mission is established in the commander’s guidance and planned using
branches and sequels. Change of mission is the term used when units transition from defensive to offensive
operations or when the unit changes to a different type of security operation. |
3-98 | 149 | Chapter 6
Stability
Ultimately, stability is the set of conditions in which a local population regards its
governance institutions as legitimate and its living situation as acceptable and
predictable (see ADP 3-07). To achieve stability within all operational frameworks,
BCTs must understand the operational environment, shape the operational environment
through action, and engage local leaders to influence the population. During stability
operations, commanders conduct multiple missions and efforts to seek a common goal
and end state that nests with the higher command’s objectives.
SECTION I – PRINCIPLES AND FRAMEWORK
6-1. BCTs conduct reconnaissance and security operations during stability tasks to increase the commander
and staff’s ability to understand the area of operations. Information collection confirms or denies assumptions
made during planning and identifies sources of stability and instability. Reconnaissance and security
operations contribute to mission command by answering information requirements, which enhances
situational awareness and assists the BCT in applying the stability principles in an acceptable and predictable
method. Ultimately, reconnaissance and security operations are vital to assisting the BCT in understanding
their operational environment through the context of the stability principles. The four principles of stability
tasks are—
* Conflict transformation.
* Unity of effort.
* Legitimacy and host-nation ownership.
* Building partner capacity.
CONFLICT TRANSFORMATION
6-2. Conflict transformation is the process for reducing the means and motivations for violent conflict while
developing more viable, peaceful alternatives for the competitive pursuit of political and socio-economic
aspirations (see ADP 3-07). Transformation aims to set the host nation on a sustainable, positive trajectory
in which transformational processes directly address the dynamics causing instability. BCTs contribute to
conflict transformation only if they achieve understanding of the causes and influences of conflict and
instability within their area of operations.
6-3. Reconnaissance and security operations assist in identifying the drivers of violent conflict and
instability. Collected information impacts planning for future operations to help commanders and staffs
identify opportunities linking tactical gains to sustainable strategic objectives. Transformation can occur only
if the BCT understands the dynamics of conflict within their area of operations from an objective viewpoint
and from the perspective of the local population.
UNITY OF EFFORT
6-4. Unity of effort is the coordination and cooperation toward common objectives, even if the participants
are not necessarily part of the same command or organization, which is the product of successful unified
action (JP 1, Volume 2). Reconnaissance and security operations require unity of effort and purpose to
achieve situational awareness at echelon to enable successful operations throughout the BCT’s area of
operations. |
3-98 | 150 | Chapter 6
6-5. Reconnaissance and security operations assist the commander and staff in developing shared
understanding between partners allowing BCTs to foster cooperative environments that focus efforts towards
a common goal to achieve stable and sustainable security environments.
LEGITIMACY AND HOST-NATION OWNERSHIP
6-6. Legitimacy is a condition based upon the perception by specific audiences of the legality, morality, or
rightness of a set of actions, and of the propriety of the authority of the individuals or organizations in taking
them (see ADP 3-07 for more information). Host-nation ownership is the will or ability of the ruling entity
to resolve its own problems and assume responsibility for solutions that it supports and can implement. BCTs
conduct reconnaissance operations focused on determining the extent of legitimacy as perceived by the local
population and develop an understanding of areas of conflict that degrade, discredit, or erode perceptions
of legitimacy.
6-7. Commanders direct reconnaissance operations and engagement activities to understand the mandate,
manner, consent, and expectations of legitimate host-nation ownership and perceived legitimacy. (Refer to
ADP 3-07 for more information on the four factors of legitimacy.)
6-8. BCTs conduct reconnaissance and engagement in close contact with the civilian population to collect
information, reinforce the capabilities of host-nation security and governance partners, and understand the
extent of support and acceptance of host-nation partners with the local population. BCTs actively seek
sources of conflict and connectivity between the host nation and local population to assist partners in bridging
gaps in perception and strengthening relationships.
BUILDING PARTNER CAPACITY
6-9. Building partner capacity is the outcome of comprehensive inter-organizational activities, programs,
and military-to-military engagements that enhance the ability of partners to establish security, governance,
economic development, essential services, rule of law, and other critical government functions (see
ADP 3-07). Reconnaissance and security TF collect information to ensure activities are consistent with
tactical, operational, and strategic goals, protect key activities, and enable key capabilities to allow
host-nation partners to develop and learn. BCTs conduct operations that enable host-nation partners to thrive
and eventually develop sustainable capabilities independent of BCT interference or influence.
STABILITY FRAMEWORK
6-10. BCTs conduct stability tasks and operations based upon conditions identified through collection.
Reconnaissance operations confirm or deny the conditions and state of stability within the BCT’s area of
operations. BCTs identify missions, tasks, and activities about the framework phases using continuous
reconnaissance and security operations. (Refer to ATP 3-07.5 for more information.) The three phases of the
stability framework are—
* Initial response.
* Transformation.
* Fostering sustainability.
INITIAL RESPONSE
6-11. Usually, activities to stabilize an area of operations are initial response actions. Typically, units
perform initial response actions during or directly after a conflict or disaster in which the security situation
prohibits the introduction of civilian personnel. Initial response actions aim to provide a secure environment
that allows relief forces to attend to the immediate humanitarian needs of the local population.
TRANSFORMATION
6-12. Stabilization, reconstruction, and capacity building are transformation actions performed in a relatively
secure environment. Transformation actions may occur in crisis or vulnerable states and aim to build
host-nation capacity across multiple sectors. |
3-98 | 151 | Stability
FOSTERING SUSTAINABILITY
6-13. BCTs foster sustainability when the security environment is stable enough to support efforts to
implement long-term programs that commit to the viability of the institutions and economy of the host nation.
The BCT consolidates gains to encourage capacity-building reconstruction activities to enable sustainable
development. Often military forces conduct these long-term efforts in support of broader, civilian-led efforts.
SECTION II – OPERATIONS DURING STABILITY TASKS
6-14. Reconnaissance and security operations are imperative to successful stability tasks. Reconnaissance
focuses on identifying enemy forces, human interaction and engagement, and vital infrastructure to collect
information necessary to understand sources of stability and instability within the BCT’s area of operations.
As the environment changes, so do the sentiments of the population and its key actors. Staffs continuously
assess their area of operations based on information collected to provide context to understanding the human
dimension of their area of operations. BCTs conduct security operations to establish safe and secure
environments that enable positive gains and sustainable stability. Since the complexity of the human context
is ever changing and evolving in any environment, reconnaissance and security operations are continuous.
Commanders constantly reassess and refine intelligence estimates to determine if they are collecting the right
information and developing intelligence to understand the operational environment.
6-15. BCTs conduct reconnaissance and security operations to gain an understanding of sources of stability
and instability, and the intentions and capabilities of key actors to shape the BCT’s and unified action
partners’ area of operations during stability tasks. Sources of instability are actors, actions, or conditions that
exceed the legitimate authority’s capacity to exercise effective governance, maintain civil control, and ensure
economic development.
6-16. Enemy forces influence instability sources to create conflict, exacerbate existing conditions, or threaten
to collapse failing or recovering states. Sources of instability include catastrophic events, humanitarian crises,
foreign power-instigated violence, domestic rebellion, and civil war.
6-17. The following vignette describes utilizing Cavalry squadrons in the execution of reconnaissance and
security missions that enabled the BCT’s success during stability operations.
Third Armored Cavalry Regiment in Tall Afar
The city of Tall Afar is located in Northwestern Iraq and is a compact city with a mixed
ethnic population of over 250,000 people. In late 2004, the Iraqi Security Forces (known
as ISF) in Tall Afar collapsed, allowing enemy threat to impose a grip of terror on the city.
Through violence and intimidation, the enemy took control of every aspect of the city and
crippled the local government. The city divided, as the population was forced into sectarian
boundaries, which helped to fuel sectarian and tribal violence across the city. The enemy’s
firm grip on the city, coupled with the city’s geographically central location lying between
the city of Mosul and the Syrian border, enabled the enemy threat to utilize Tall Afar and
the surrounding region as a training ground and staging base for operations. Foreign
fighters flooded in from Syria, finding sanctuary in Tall Afar and the surrounding cities and
towns and increasing the enemy threat capacity to conduct operations in Mosul and across
Northern Iraq.
In April 2005, 3rd Armored Cavalry Regiment (known as ACR) deployed to the Southern
Baghdad area of operations to conduct reconnaissance and offensive operations. For two
months, 3rd ACR, partnering with the ISF, successfully conducted counterreconnaissance
operations to deny enemy threat the ability to influence political and economic development
within the capital city of Baghdad. During this time, 3rd ACR received orders to move their
area of operations to the western region of the Ninewa Province. The regiment
task-organized itself to conduct multiple operations across separate areas of operations.
Ahead of the rest of the regiment, 2-3 ACR (Sabre Squadron) deployed to the Ninewa
Province to conduct initial reconnaissance operations of the area of operations, including
the city of Tall Afar. The regiment detached 3-3 ACR (Thunder Squadron), an engineer |
3-98 | 152 | Chapter 6
platoon, an attack aviation troop from 4-3 ACR (Longknife Squadron), a tank platoon from
1-3 ACR (Tiger Squadron), and Iraqi Army advisors from Tiger Squadron to remain in
Southern Baghdad in order to support the 3rd Infantry Division. The remainder of the
regiment moved to the Western Ninewa Province to begin operations against the highly
organized enemy network that controlled the area.
From May to July 2005, Sabre Squadron developed an accurate intelligence picture of the
situation inside the city of Tall Afar through effective reconnaissance operations that, on
many occasions, required them to fight for information. The squadron, reinforced by a tank
company from Tiger Squadron, took the fight to the enemies, resulting in some of the
toughest urban combat seen by American troops up to that point. In the month of June
alone, over 210 unconventional enemy attacks occurred within the city, which accounted
for over ten percent of all attacks in the Iraqi theater of operations at the time. These attacks
targeted the civilian population, with the intents to increase the sectarian divide and create
a chaotic situation. Sabre Squadron refused to back down and began building positive
relationships with the locals. This initiative led to the collection of accurate intelligence
that, in turn, enabled 3rd ACR to understand the composition and disposition of the enemy
occupying the city. Ahead of 3rd ACR’s arrival to the Ninewa Province, Sabre Squadron
had already begun reestablishing the local government and reconstituting local police to
set conditions for the large-scale, combined offensive with the ISF that 3rd ACR leadership
understood as necessary to eliminate the enemy threat within Tall Afar.
As Sabre Squadron began to set conditions within Tall Afar, 3rd ACR leadership
understood the need to set conditions across the surrounding region by establishing security
outside the city. Tiger Squadron established itself in the area west of Tall Afar, where they
liberated smaller cities and towns, effectively denying the use of these areas to the enemy
threat and securing critical supply routes from the Syrian border to Tall Afar. Moving from
location to location, Tiger Squadron reestablished security along the border, within the
urban centers, and reconstituted ISF in those areas. Meanwhile, Longknife Squadron, the
aviation squadron, conducted continuous reconnaissance and security operations across
the surrounding desert region. With security in the surrounding region established, 3rd
ACR had engineers construct an eight-foot-high berm around the city of Tall Afar, with the
intents of isolating the enemy threat within the city and of funneling traffic through
established security checkpoints. Conditions were set for 3rd ACR to execute Operation
Restoring Rights.
Operation Restoring Rights was the combined offensive between 3rd ACR and the ISF to
take back Tall Afar. Third ACR integrated over 5,500 Iraqi soldiers and police officers into
this operation with the augmentation of 1 battalion from the 2nd Iraqi Army Division,
5 battalions from the 3rd Iraqi Army Division, an Iraqi Special Forces battalion, a
commando brigade, and the Mosul Emergency Police Battalion. Tiger Squadron conducted
reconnaissance from the western portion of the area of operations into Tall Afar, where
they conducted a relief in place with Sabre Squadron. Tiger Squadron assumed
responsibility of operations on the western side of Tall Afar, while Sabre Squadron
conducted operations on the eastern side of the city. Augmented by the 2-325 Infantry
Battalion from the 82nd Airborne Division, 3rd ACR’s ground forces began clearing out
enemy threat. They actioned on areas and targets throughout the city, using intelligence
gathered from the local population and detainees. Precision artillery and close air support
enabled ground forces to clear out areas in which they encountered heavy resistance,
allowing them to continue to conduct house-to-house searches for enemy threat. From
24 August to 23 September 2005, 3rd ACR and their ISF partners killed over 150 enemy
fighters and captured another 800, while the enemy was attempting to flee the city.
The success achieved by the cooperation between 3rd ACR and the ISF emboldened
Tall Afar’s population to retake control of the city, thereby denying the enemy the ability to
establish another base from which to operate. Following the defeat of the enemy threat,
Sabre Squadron and the 2-325 Infantry Battalion maintained security in Tall Afar and
simultaneously recruited and trained a legitimate Iraqi police force. Tiger Squadron |
3-98 | 153 | Stability
maintained a guard along the Syrian border to deny foreign fighters the ability to influence
Tall Afar, and they began rebuilding the Iraqi Border Police Brigade. With security
reestablished, 3rd ACR then worked to reestablish essential services, and they reconstituted
a legitimate, Iraqi local government and security force. ISF inside and outside Tall Afar
gained confidence and eventually took the lead in operations across the province. The
development of legitimate ISF facilitated increased HUMINT from the local population,
which enabled ISF to action quickly on local tips of false passport shops, weapons
smugglers, and other activities supporting the nontraditional enemy threats. With little
assistance from coalition forces, the ISF successfully denied the enemy threat freedom of
maneuver throughout the Ninewa Province.
During stability tasks, Cavalry units operate within the BCT’s area of operations. BCTs
employ their Cavalry units to conduct route, area, and zone reconnaissance, as well as
screen, guard, and area security (including route security) operations. This activity secures
the affected population and answers BCT and higher PIRs. Cavalry units assist the
commander and staff in visualizing and understanding the area of operations, and the
external factors that may affect the area of operations
6-18. While BCTs can assign Cavalry squadrons to their own area of operations for a period, the use of
Cavalry as a maneuver unit instead of as a reconnaissance and security organization incurs risk of incomplete
or inadequate reconnaissance and security operations. When assigned their own area of operations, Cavalry
squadrons conduct tasks to support stability in the same manner as other maneuver units. However, the
capabilities within the Cavalry squadron and its size make it ideal for employment as an economy of force
for the BCT.
CAVALRY UNIT’S ROLE
6-19. The BCT commander relies heavily on the Cavalry squadron to conduct reconnaissance and security
missions throughout all phases of stability operations. Force organization plays an integral part in stability
operations and the commander uses force tailoring and task organization to get the right military force to
conduct sustainment task operations.
SQUADRON
6-20. The Cavalry squadron can conduct reconnaissance and security operations to support stability tasks.
The Cavalry squadron achieves these goals during all phases of stability tasks within the entirety of the higher
echelon’s area of operations. Additionally, the BCT can assign the Cavalry squadron its own area of
operations where it could be placed upon a border or boundary having enemy infiltration routes, which allows
the squadron to conduct screen or guard tasks for the main body.
TROOP
6-21. The Cavalry troop conducts reconnaissance and security missions during stability tasks to answer PIRs,
develop the commander’s understanding of the operational environment, and enable the squadron to shape
the environment in the area of operations. The troop focuses reconnaissance efforts on gaining a detailed
understanding of the operational environment’s sources of instability, and the capability and intentions of
key actors as the unit moves from the initial response phase to the transformation phase of stability tasks.
Specifically, the scout platoons collect information on civil considerations using areas, structures,
capabilities, organizations, people, and events and operational variables (PMESII-PT). Scout platoons work
directly with unified action partners to assist in their efforts.
SUPPORT DURING STABILITY TASKS
6-22. Maneuver units require attachments to be optimally effective during stability operations. The nature of
stability operations is complex; therefore, it requires diverse organizations with specialties to conduct
reconnaissance and security operations. |
3-98 | 154 | Chapter 6
FIELD ARTILLERY
6-23. Fires require the right amount of force precisely applied to the correct target during the stability
operation phases. Fires, often conducted in densely populated areas of operations, create the requirement for
well-integrated and rehearsed airspace de-confliction, clearance of fires, and precision strike mission
processes. Implementing reasonable fire support coordination measures, updating them continuously, and
ensuring highly accurate (typically 10 meter or less target location error) target locations increases the
effectiveness of fires in a stability environment. Targeting is an integral part of stability tasks to synchronize
nonlethal effects and to conduct engagement planning. Cavalry may use fires frequently to defend key
geopolitical sites or strike high-payoff targets located near restrictive fire areas and densely populated
locations with precision munitions. Fire support officers and joint fire observers’ ability to plan, coordinate,
and execute fires often with precision munitions to support stability tasks are crucial to mission success.
Increasing the proportion of precision munitions used in fires and employment of nonlethal capabilities may
be necessary to limit collateral damage.
6-24. A precision-guided munition is a guided weapon intended to destroy a point target and minimize
collateral damage (JP 3-03). Precision-guided munitions collectively refer to munitions that strike on
reflected electromagnetic energy (such as Hellfire missiles) and precision munitions.
6-25. A precision munition is a munition that corrects for ballistic conditions using guidance and control up
to the aimpoint or submunitions dispense with terminal accuracy less than the lethal radius of effects
(FM 3-09). Munitions with a precision capability (such as the Global Positioning System-aided Excalibur
155-mm projectile, guided multiple launch rocket system rockets, and the advanced precision munitions
initiative 120-mm mortar rounds) have a circular error probable of less than 10 meters. Munitions with a
near-precision capability (such as the precision guidance kit fuze for 155-mm artillery projectiles) have a
circular error probable between 10 and 50 meters. Area capabilities have a circular error probable greater
than 50 meters. Circular error probable is an indicator of the delivery accuracy of a weapon system. Circular
error probable is a factor to determine probable damage to a target. Circular error probable is the radius of a
circle within which half of the rounds fired at a target impact. Even at the munitions’ largest anticipated
delivery error, the aimpoint is within the munitions’ anticipated radius of direct effects. The employment of
precision munitions requires the use of current cryptological key information.
6-26. Rules of engagement often become more restrictive as phases of stability progress. Commander’s
guidance for fires requires careful consideration during the development of the rules of engagement and
engagement criteria. Units conducting reconnaissance and security operations must carefully consider the
benefits and consequences of initiating fires or breaking contact if fires are initiated on the unit.
6-27. The BCT utilizes radars and indirect fire acquisition assets in a sensing mode that allows identifying
the point of impact to protect friendly forces from indirect fire. These radars integrate with the air defense
radar as part of the counter-rocket, artillery, mortar system that provides sense and warn capability for troop
AAs and command posts. In areas subject to collateral damage, counterfire should employ precision
munitions against well-located targets. The BCT must carefully consider the use of fires with munitions
having only area capabilities due to the possible long-term adverse impact on relations with unified action
partners and the indigenous population thereby contributing to sources of instability.
BRIGADE ENGINEER BATTALION
6-28. The BEB provides reconnaissance and security operational support during all phases of stability
operations. Engineers provide mobility, countermobility, survivability, technical reconnaissance, and
infrastructure assessment capabilities.
ENGINEERS
6-29. Engineer platoons task organize at the squad level to Cavalry units to support mobility,
countermobility, and survivability. Engineer platoons can execute route and area reconnaissance organically.
The route clearance platoon can provide mobility and limited disposal of mines. The support platoon or
section can conduct initial infrastructure assessments and basic horizontal construction to restore services to
support governance. |
3-98 | 155 | Stability
6-30. The engineer companies of the BEB can execute some stability tasks identified in reconnaissance and
security operations as an organic unit throughout all phases of stability operations. If required by the
commander, the BEB can conduct route and area reconnaissance, area security, patrols, limited raids,
assessment and restoration of services and leader engagements.
6-31. Geospatial engineering teams can provide detailed products about the topography of a geographic area.
Geospatial teams produce intelligence by analyzing images and geospatial data of terrain and various objects
within a unit’s area of operations. These products can be analyzed and provided to Cavalry units to narrow
the reconnaissance focus to specific objectives rather than a broad area.
CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR
6-32. Each squadron has an organic CBRN reconnaissance and surveillance platoon that can execute
CBRN-specific reconnaissance and surveillance tasks. The platoon supports route, zone, and area
reconnaissance operations and can assess key infrastructure regarding CBRN hazards. The CBRN
reconnaissance and surveillance platoon assesses possible threat locations and confirms or denies the
presence of CBRN threats and hazards to assist with security operations.
INTELLIGENCE
6-33. Commanders must be involved and knowledgeable of the information collection efforts to narrow the
reconnaissance focus and shape the operational environment. Planning for stability tasks is quite complicated,
and planners need to balance resources, capabilities, and activities. BCT staffs analyze the significance of
various activities over time to maximize their efforts to provide stability.
6-34. Commanders often require detailed intelligence and IPB products to determine how to conduct
operations, influence the local population, and mitigate sources of instability. The identification and analysis
of actors, terrain and weather, and civil considerations are critical to determining the most effective missions,
tasks, and locations for stability tasks. A lack of knowledge concerning the enemy threat, local politics,
customs, culture, and differentiating between local combatants often leads to actions that can result in
unintended and disadvantageous consequences. To achieve this understanding, the BCT commander attaches
collection assets to the Cavalry squadron.
6-35. During stability tasks, the disclosure of military information to host-nation personnel and agencies
requires consideration. The BCT S-2 must ensure the BCT has the required amount of foreign disclosure
officers. A foreign disclosure officer may approve the disclosure of classified and controlled, unclassified
military information to foreign representatives based on the policies, directives, and laws that govern the
national disclosure policy and the release of classified information. The officer provides this service to the
command and staff and to assigned, attached, and supporting unified action partners.
6-36. Stability tasks occur in and between the local populations, thus human contact with the local population
has greater emphasis and importance. Observations and experiences of Soldiers, who often work with the
local population, provide depth and context to information collected through reconnaissance and security operations.
Remote Sensors
6-37. The BCT uses remote sensors to perform such tasks as perimeter defense, surveillance, environmental
monitoring (including radiological and nuclear), and target acquisition. Remote sensors are not a military
intelligence collection asset; however, they provide information that the BCT uses to cue military intelligence
collection assets to activity. The BCT should consider remote sensors when preparing the information
collection plan. Soldiers or robotic vehicles hand-emplace them either inside or outside buildings or
structures. Their optimal employment is in areas where major movement is restricted to a few key lines of
communications, and the traffic pattern of military and civilian activity can be easily discriminated. Remote
sensor missions are ideally suited to support relatively stable situations, such as long-term defensive or
security operations, where the time and resources are available to develop an extensive sensor network
throughout the area of operations.
6-38. The employment of sensors in open terrain or heavily congested urban concentrations requires detailed
planning to ensure the sensor network can provide the desired information in those environments. For |
3-98 | 156 | Chapter 6
stability tasks, sensors can provide surveillance of population centers and key infrastructure areas. They can
also provide surveillance along the lines of communications and borders. The supported unit’s information
collection plan includes provisions for sensor surveillance. Incorporating remote sensors into the information
collection plan utilizes the employment concept and detailed instructions to execute remote sensor missions.
BCTs develop requirements for sensor employment along with concepts for the monitoring and
dissemination of sensor data and incorporate them into the information collection plan. The establishment of
a comprehensive sensor network requires time and a significant investment of resources. During the planning
requirements task, the operations and intelligence-working group identify SIRs that remote sensors can
answer. As part of the information collection plan, the sensor surveillance plan specifies the—
* Type and location of sensors, relays, and monitoring sites.
* Time of emplacement and unit responsible for emplacing each sensor string and any relays.
* Time of recovery and unit responsible for recovery.
Expeditionary Military Intelligence Brigade
6-39. Expeditionary military intelligence brigades (known as E-MIBs) conduct multi-discipline intelligence
operations during large-scale combat operations. E-MIB headquarters are required to exercise mission
command over all assigned and attached elements. E-MIB headquarters provide reach capability, establish
and maintain the corps intelligence architecture, and execute technical control of various capabilities. The
size and composition of the deployed E-MIB and its subordinate organization is dependent on the mission
required to be performed in-theater. An E-MIB provides the following capabilities─
* Analysis.
* Processing, exploitation, and dissemination.
* Open-source intelligence.
* SIGINT and electromagnetic warfare integration.
* Counterintelligence collection and activities.
* Multidomain operations sensing and target development.
6-40. E-MIBs can augment corps, division, and BCT intelligence cells, specifically aiding the processing,
exploitation, and dissemination of national and theater SIGINT and geospatial intelligence. Instead of
deploying the E-MIB as a unit to conduct independent intelligence operations to support the corps, the corps
commander, as part of force tailoring during planning, task organizes the E-MIB to support operations. The
corps assistant chief of staff for intelligence (G-2) advises the commanders of the E-MIB’s capabilities and
recommends how to task-organize its assets.
SUSTAINMENT
6-41. Stability tasks require unique sustainment considerations. Commanders must remember that the design
of the BSB supports only the BCT’s assigned Soldiers and equipment. Reconnaissance units often identify
sources of instability that sustainment efforts can mitigate or shape immediately with a sustainment effort. If
the BSB develops stability support plans, the BSB commander must ensure that sustainment estimates
differentiate what is supporting internal BCT requirements and what is supporting external stability support
mission requirements. Sustainment during stability tasks often involves supporting U.S. forces, multinational
forces, and other contributing partners in a wide range of missions and tasks.
INTERDEPENDENT CAPABILITIES
6-42. Cavalry and other units conducting reconnaissance and security operations during stability tasks often
determine that they are not the first organization operating in the area. Units conducting reconnaissance and
security operations can gain a better understanding through coordination and information and intelligence
sharing with unified action partners. Below are some unified action partners that units can coordinate with
during stability─
* SOF.
* Civil affairs.
* Governmental and nongovernmental organizations. |
3-98 | 157 | Stability
SPECIAL OPERATIONS FORCES
6-43. Conventional forces build relationships and foster interdependence with U.S. SOF operating in the
area. Interdependence is the deliberate and mutual reliance of one unified action partner on another’s inherent
capabilities to provide complementary and reinforcing effects. These units execute different tactical tasks to
support the operational objectives and end states to stabilize the area. BCTs rely on interdependence with
unified action partners and SOF partnerships to combat sources of instability. The exercise of
interdependence facilitates shared understanding between the U.S. actors in the operational environment.
Interdependence provides a conduit by which the interagency and SOF partners can provide relevant, useful,
and timely information. Planning efforts, update briefs, and working groups are specific events where BCTs
incorporate their interagency partners. (Refer to FM 6-05 for more information on conventional forces and
SOF integration, interoperability, and interdependence.)
CIVIL AFFAIRS
6-44. Civil affairs support to stability tasks depends on the nature of the operation and the condition of the
affected indigenous population and institutions. The S-9 and civil affairs units continually assess and monitor
the host nation’s capabilities and capacity to identify and mitigate underlying causes of instability within
society and, as required, apply functional skills which are usually the responsibility of civil government. Civil
affairs conduct civil reconnaissance and develop civil information through interaction with the indigenous
population, institutions, and unified action partners. During the transition from primarily offensive and
defensive operations to primary stability operations, civil affairs units place greater emphasis on
infrastructure restoration, economic stability, and support to governance expertise.
GOVERNMENTAL AND NONGOVERNMENTAL ORGANIZATIONS
6-45. Units conducting reconnaissance operations must recognize the value of governmental and
nongovernmental organizations and build effective relationships with these actors. Governmental and
nongovernmental organizations could provide subject matter expertise in many essential services and
governance topics. They are the primary provider of humanitarian, infrastructure, and essential services in
immature operational environments. Governmental and nongovernmental organizations have experience and
detailed knowledge of the civil environment and may have an understanding of civil considerations other
than indigenous population and institutions. This insight can assist the civil reconnaissance effort in
understanding and shaping the environment.
6-46. Understanding where governmental and nongovernmental organizations are on the battlefield and the
nature of their activities develops a common operational picture. The common operational picture enables
the commander and staff to anticipate changes to the operational environment, to anticipate the effects of
governmental and nongovernmental organizations on primary stability tasks and operations, and to anticipate
future friction points between the organizations. Building relationships with governmental and
nongovernmental organizations may be difficult because these organizations are reluctant to establish
associations with U.S. forces. The Cavalry must be mindful of the organizations’ reluctance and establish
relationships on terms beneficial to all parties involved. Cavalry units frequently discover governmental and
nongovernmental organizations unexpectedly within the operational environment so they should plan to
encounter them during their operations.
6-47. Governmental and nongovernmental organizations can bring valuable resources, information
regarding the civil population, the operational environment, and alternative perspectives to the brigade’s
stability operation. (Refer to ATP 3-07.5 for more information.) Cavalry units operating with
nongovernmental organizations follow these guidelines:
* Military personnel wear uniforms when conducting relief activities.
* Military personnel make prior arrangements before visiting nongovernmental organizations.
* Military personnel do not refer to nongovernmental organizations as “force multipliers” or
“partners” or other similar terms.
* U.S. forces respect a nongovernmental organization’s decision not to serve as an implementing partner. |
3-98 | 158 | Chapter 6
SECTION III – ARMY STABILITY OPERATIONS TASKS
6-48. Army stability operations tasks are fundamental and are performed across the range of military
operations, from stable peace to general war. Military forces execute Army stability operations tasks before,
during, or after conflict to support a legitimate host-nation government, to assist a fragile state, or in the
absence of a functioning civil authority. Each situation is unique. Each Army stability task and stability sector
contains a number of related subordinate tasks.
RECONNAISSANCE AND SECURITY STABILITY TASKS
6-49. BCTs conduct stability tasks to create conditions the local population regards as legitimate, acceptable,
and predictable (see ADP 3-07). BCTs conduct continuous reconnaissance operations during stability tasks
to develop information requirements, gain situational understanding of their area of operations, identify
sources of conflict and instability, and identify opportunities to consolidate sustainable and positive gains.
Reconnaissance and security operations assist the commander and staff with determining short-term impacts
and long-term effects on their area of operations. Commanders then assess the effectiveness of their actions
and adjust as needed.
6-50. BCT commanders consider each primary stability task and associated subtasks within the context of
their particular area of operations (see figure 6-1). They also consider the perception of the local population
and host-nation governance and security forces. The six Army primary stability operations tasks are—
* Establish civil security.
* Support to civil control.
* Restore essential services.
* Support to governance.
* Support to economic and infrastructure development.
* Conduct security cooperation. |
3-98 | 159 | Stability
Figure 6-1. Stability tasks
ESTABLISH CIVIL SECURITY
6-51. The burden on BCTs for establishing civil security is highest during the initial response phase of the
stability framework when the host nation lacks the capability or capacity to provide security. BCTs conduct |
3-98 | 160 | Chapter 6
reconnaissance operations to collect information and conduct security operations to protect friendly units, the
local population, key actors, and key terrain to enable the establishment of civil security. (Refer to
ATP 3-07.5 for more information.) BCTs and subordinate units execute zone and area reconnaissance
operations to identify sources of instability affecting civil security. Companies and troops conduct route
reconnaissance missions to support area security operations and retain freedom of maneuver within the area
of operations. BCTs identify sources of instability and identify key terrain to facilitate the commander and
staff’s understanding of the area of operations, and to plan and execute stability mechanisms. The commander
uses reconnaissance operations to make informed decisions about allocating resources to each subordinate to
establish civil security.
6-52. BCTs conduct security operations to control borders, secure boundaries and provide freedom of
movement, and to protect the main body, key personnel, and key facilities. Noncontiguous operations
complicate the BCT’s ability to conduct security operations because potential threats use the civilian
population as cover. BCTs employ mounted and dismounted patrols, engage with the local population, and
employ aerial reconnaissance and observation posts to provide early warning, identify threats, and create
opportunities. Security operations facilitate manageable transitions between stability framework phases and
create dilemmas for threats that seek to undermine sustainable progress.
6-53. Area security operations are essential to stability tasks because they degrade the enemy’s ability to
affect friendly units, host-nation governance and security forces, key leaders, and key facilities. BCTs
conduct area security operations to preserve the higher commander’s freedom of maneuver, protect key
infrastructure and leaders, and deny threats access and opportunity to disrupt progress. BCTs establish
security zones around critical infrastructure, airfields, facilities, MSRs, lines of communication, towns,
equipment, and high-value assets. Combined security operations with host-nation partners enable a transition to
the transformation phase of the stability framework by empowering host-nation security and bolstering legitimacy.
6-54. During the fostering sustainability phase of the stability framework, the host-nation government
assumes responsibility for securing its borders and for internal movement control. Remaining Army units
consist of advisors or, in some cases, BCTs or battalions positioned as a deterrent against external threats.
Advisors continue to help improve host-nation capacities as part of the larger security force assistance
program. Potential external threats may cause military forces to conduct operations to confirm or deny
threat intentions.
SUPPORT TO CIVIL CONTROL
6-55. Civil control centers on rule of law. Civil control provides training and support to law enforcement and
judicial personnel to promote efforts to rebuild host-nation judiciary and corrections systems. Units
conducting reconnaissance identify critical resources, influential pillar organizations, or leaders, sources of
instability, and unified action partners operating in the BCT’s area of operations to support establishing civil
control. During the initial response phase, BCTs may be required to assist host-nation partners in building
interim solutions to establish civil control, which builds upon host-nation governance. Security gains capacity
and capability transitioning to the transformation phase.
6-56. Establishing security and rebuilding justice institutions develops conditions for reconciliation, public
confidence, and subsequent economic growth. BCTs secure key infrastructure, identify key actors, and
disrupt enemy forces. Reconnaissance tasks identify viable and working systems of government as well as
gaps in civil control. Identification of government strengths and weaknesses focus efforts to collaborate with
host-nation security forces and assist host-nation governance in providing viable security and services. Units
conducting security tasks support civil control by interdicting threat activity seeking to subvert the local rule
of law or legitimacy of an interim government through intimidation, corruption, or coercion.
6-57. During the transformation phase of the stability framework, BCTs continue to conduct operations with
unified action partners with efforts focused on building partner capacity. Reconnaissance tasks support civil
control by identifying local population perceptions and acceptance of host-nation governance and security
forces, adequacy of local infrastructure security and viability, sources of corruption, indicators of progress or
regression, and acceptance and adherence to the rule of law. Security tasks support civil control by providing
early warning to threats on infrastructure, facilities, and leaders and assessments of host-nation capabilities. |
3-98 | 161 | Stability
6-58. BCTs transition to supporting civil control and host-nation independence during the fostering of
stability phases. BCTs maintain an ability to assist host-nation forces when needed and according to the rules
of engagement and status of forces agreement restrictions if applicable. Sustainable gains allow host-nation
partners to conduct civil control with minimal input from the BCT.
RESTORE ESSENTIAL SERVICES
6-59. Using stability operations to restore essential services contributes to the social well-being of the
population. BCTs conduct area and zone reconnaissance to identify areas requiring assistance to repair or
rebuild, identify public health hazards or outbreaks, and verify locations and dispositions of displaced
civilians who require aid and support but have no access to key services. BCTs identify popular perceptions
of legitimacy through censuses and engagement with the local population. Route reconnaissance identifies
mobility corridors to facilitate sustainment operations, humanitarian services and support to outlying or urban
areas, evacuation routes for noncombatant evacuation operations, and freedom of movement and maneuver.
Units conducting security operations support the primary Army stability task of restoration of essential
services. Units conduct area security operations independently or they partner with host-nation security forces.
6-60. During the transformation phase, BCTs conduct reconnaissance operations in concert with host-nation
security partners to identify sources of instability adversely affecting host-nation partners to meet the needs
of the populace. Security forces screen or guard infrastructure projects, provide security to outlying areas and
local government infrastructure, services, and leaders. Security forces also identify enemy safe havens or sources
of support.
SUPPORT TO GOVERNANCE
6-61. During the initial response phase, the BCT may function as the transitional military authority to
establish governmental services and work with established governmental authorities, if any are present, to
increase capability. BCTs conduct security operations to protect governing officials, key facilities, and
eventually, polling locations.
6-62. During the transformation phase, the BCT begins to transition its responsibility for governance to
civilian authority. In some cases, authority transfers to host-nation representatives that may or may not be the
same host-nation government before the operation. As host-nation institutions develop, the BCT continues
to collect information indicating good governance through advising, assisting, and supporting host-nation
partners as well as identifying sources of instability and corruption that seek to disrupt or degrade effective
governance. BCTs conduct reconnaissance operations to identify effective and ineffective governing bodies,
to identify locations for potential polling and elections, and to maintain freedom of movement and maneuver.
BCTs conduct security operations to protect governing officials, key facilities, and polling locations. BCTs
conduct guard missions to protect polling boxes and election officials during the transformation phase to
prevent enemy disruption on the civilian population.
6-63. BCTs eventually transfer governance to host-nation authorities and authority for governance reducing
BCTs’ involvement with established governments and transition partnerships to State or other government
agencies. Reconnaissance and security operations transfer to appropriate host-nation security forces though
BCTs continue to monitor governance developments and identify concerns to host-nation authorities and
U.S. chains of command.
SUPPORT TO ECONOMIC AND INFRASTRUCTURE DEVELOPMENT
6-64. BCTs identify infrastructure damage early in the stability framework’s initial response phase so
commanders have the information they need as they conduct area assessments. While airborne and space
platforms may provide imagery of damaged infrastructure, ground-based reconnaissance operations clarify
the scope of the problem. BCTs assess the local impact and feelings of people in the area to make
recommendations to higher headquarters on the importance of repair and development when multiple pieces
of infrastructure need attention. Cavalry units must consider cultural aspects when conducting reconnaissance
and shaping the environment regarding key infrastructure. |
3-98 | 162 | Chapter 6
INITIAL RESPONSE PHASE
6-65. The protection of natural resources and the environment may become tasks for the BCT during the
initial response phase. In Iraq the willful burning of oil wells, damage to the oil pipeline infrastructure and
the deliberate leaking of oil into the Persian Gulf are examples of incidents during the initial response phase.
These incidents resulted in ground forces conducting reconnaissance and security missions over large areas
to deter further incidents. The long-term macroeconomic recovery and development of a nation can depend
on a small number of critical pieces of infrastructure.
TRANSFORMATION PHASE
6-66. Multiple external specialist agencies participate in this task during the transformation phase. The
transformation phase aims to establish the foundation for sustainable economic development and begin to
transition control of economic growth to U.S. Government civil agencies, international civil agencies, and
host-nation economic officials and entrepreneurs. BCTs’ balance of effort switches to security missions to
support specialists who do the detailed work to facilitate economic and infrastructure development. Cavalry
units’ probable mission sets include—
* Screen or guard critical infrastructure.
* Screening of a border area to prevent external actors adversely affecting economic development.
* Conducting zone or area reconnaissance with a reconnaissance focus on social and economic indicators.
* Route security so economic activity can take place in a safe and secure environment.
6-67. During the transformation phase, there may be an opportunity to expand the area of interest. Cavalry
units continue to report infrastructure issues and economic activity in existing and new areas of operations.
FOSTERING SUSTAINABILITY PHASE
6-68. In the fostering sustainability phase, the goal is to institutionalize a long-term sustainable economic
development program and to transition control of the economy to host-nation officials, entrepreneurs, and
civil society. This phase includes follow-on steps, which develop and reinforce the successes of the initial
response and transformation phase. Steps taken during this phase support sustainable economic growth based
on healthy communities and neighborhoods supporting a healthy society.
CONDUCT SECURITY COOPERATION
6-69. Security cooperation is Department of Defense interactions with foreign security establishments to
build relationships that promote specific United States security interests, develop allied and partner military
and security capabilities for self-defense and multinational operations, and provide United States forces with
peacetime and contingency access to allies and partners (JP 3-20). The U.S. military’s security cooperation
organization often coordinates security cooperation in a country. |
3-98 | 163 | Chapter 7
Sustainment
Sustainment units synchronize and execute sustainment operations to support units
conducting reconnaissance, security, and stability operations under all conditions.
Cavalry squadrons frequently operate in locations distant from their organic sustaining
base. These Cavalry squadrons carry a configured load or are task organized with assets
to ensure their sustainment until another unit can relieve them. Generally, units
conducting reconnaissance and security operations have self-sustainment capability for
up to 72 hours. Units conducting reconnaissance and security operations and
sustainment staffs must anticipate future sustainment needs. An accurate estimate
allows forces to retain freedom of movement and action along the entire width and
depth of extended and contested lines of operation.
SECTION I – OVERVIEW
7-1. Sustainment is the provision of logistics, financial management, personnel services, and health service
support necessary to maintain operations until successful mission completion (ADP 4-0). The purpose of the
Army’s logistics system is to sustain combat power on a continuous basis as far forward as possible.
Sustainment principles and fundamentals, as well as roles and responsibilities, remain the same for all types
of operations at the BCT-level and below. (Refer to ADP 4-0 for sustainment principles and fundamentals.)
Successful sustainment planning and execution to support reconnaissance and security operations at the BCT
level and below provides commanders with the flexibility required to develop the situation in close contact
with enemy forces and civilian populations.
7-2. Reconnaissance and security operations executed at the BCT level involve fast-paced, wide-ranging
operations requiring a rapid transition from one mission to another. Such operations involve extended lines
of support, higher consumption rates, and present unique challenges to the BCT sustainment units’ ability to
support and sustain reconnaissance and security operations. Based on the nature of their missions, BCT
sustainment units may require EAB support and other nonorganic assets to support reconnaissance and
security operations.
7-3. In most cases, a BSB’s FSC is in direct support of a squadron-sized unit conducting reconnaissance
and security operations. Smaller reconnaissance organizations may have task-organized forward logistics
elements (FLEs) in a direct, support sustainment role. A BCT conducting a cover operation has an organic
BSB but may require augmentation from the division sustainment. The key to reconnaissance and security
operations is a fully planned, war-gamed, and rehearsed support concept.
SECTION II – PLANNING
7-4. Reconnaissance and security operations present unique challenges to sustainment staff planners.
Planners need to consider many factors as they develop their support concepts. Challenges include the terrain
and enemy situation, friendly situation, type of reconnaissance and security operation, levels of
aggressiveness and pace, and duration of the operation. Planners consider the positioning of sustainment
assets based on known friendly and predicted enemy actions, distances, and on-order requirements.
7-5. Sustainment plans for reconnaissance and security operations vary greatly according to the maneuver
commander’s guidance for the tempo of the operation. For instance, stealthy reconnaissance operations may
require a majority of pre-positioned stocks and the reliance on covered or concealed resupply routes to remain
undetected. However, forceful reconnaissance operations where detection is not a concern may facilitate |
3-98 | 164 | Chapter 7
routine sustainment operations, such as LOGPACs, on any trafficable route at any hour of the day.
Sustainment planners should conduct frequent coordination with adjacent units. LOGPACs may be required
to pass forward and rearward through other units’ areas of operations and passage lanes beyond the squadron
rear boundary. Often, adjacent unit sustainment assets may be closer to units performing reconnaissance and
security that can best conduct recovery, evacuation, and emergency resupply.
7-6. Sustainment planners for reconnaissance and security operations must be aware of the enemy situation
and threat level as units conduct these missions forward of friendly lines. High-payoff targets to enemy forces
include sustainment vehicles, equipment, and support areas (such as fuel tankers, billets, and FARPs,
respectively). Planners should consider intervisibility lines, covered and concealed positions for support
areas, and covered and concealed routes for logistic package operations.
7-7. The lead sustainment planner in a maneuver battalion or Cavalry squadron is the S-4 assisted by the
battalion or brigade personnel staff officer (S-1), a medical planner, and the BSB FSC commander.
Representatives from these elements form the sustainment-planning cell ensuring integrated sustainment
plans in all operational planning. The S-1 may have a representative at or near the aid station to monitor
casualty operations. For reconnaissance and security missions above the battalion level, the majority of
sustainment planning occurs in the brigade S-4 in close coordination with the BSB support operations section
and FSC commanders.
PLANNING FUNDAMENTALS AND PROCEDURES
7-8. Planners integrate sustainment planning into all operational planning and synchronize the concept of
sustainment support with other areas of the operations concept. Planning is continuous and concurrent with
ongoing support execution. BCT sustainment personnel (such as the S-4, S-1, surgeon, and FSC commander)
actively participate in the unit’s maneuver planning process, including course of action development and
war-gaming. The goal is to ensure support during all phases of an operation.
7-9. To provide effective support, sustainment planners and operators understand the mission statement,
commander’s intent, and concept of operations. The S-4, with input from the FSC and headquarters and
headquarters troop commanders, the medical service officer, and the squadron executive officer handles
production of paragraph 4 (Sustainment) of the OPORD, which includes the following:
* Commander’s reconnaissance and security sustainment priorities.
* Sustainment overlay.
* Supply routes.
* Logistics release points.
* CASEVAC points.
* Maintenance collection points.
* Class III and class V resupply during the mission if necessary.
* Movement criteria and triggers for logistics nodes.
7-10. To predict support requirements, sustainment planners determine the following:
* Type of support required.
* Quantities of support required.
* Priority of support by type and unit.
7-11. After determining the support requirements, sustainment planners assess—
* Sustainment resources available (organic and supporting).
* Status of the sustainment resources (location, maintenance, and personnel status).
* Time sustainment resources are available to the unit.
* Configuration of resources and methods of distribution available.
7-12. Based on facts and assumptions, planners develop the sustainment estimate for the operation. The
sustainment estimate is the formal, detailed analysis of the sustainment that supports an operation. During
execution, planners use a running estimate to provide information to the commander. |
3-98 | 165 | Sustainment
7-13. To facilitate rapid planning, Force XXI Battle Command, brigade and below provides sustainment
planners with reports to assist in planning. Supplemented by their actual operational experience, sustainment
planners take advantage of—
* Running estimates, status charts, and automatic estimation tools.
* Updated status reports when the commander issues a WARNORD.
* Established planning factors, historical data, and data tailored for their unit.
* Procedures and organizations specified in the SOPs.
LOGISTICS
7-14. Logistics consist of supply, field services, maintenance, transportation, operational contract support,
general engineering support, and distribution. Supply operations consider all classes of supply. For units
conducting reconnaissance and security operations, usually classes III (B) (petroleum, oil, and lubricants
[bulk]), IV (construction materials), V, VIII (medical), and IX are priority items for replenishment.
7-15. The BCT will limit or suspend most field services during reconnaissance and security operations. Field
services are those essential services for enhancing the quality of life of Soldiers. They include clothing repair
and exchange, laundry and shower support, mortuary affairs, aerial delivery, and field feeding. The only field
service provided to maneuver units during reconnaissance and security operations is field feeding. The FSC
provides field-feeding support. Logistics organizations at EAB coordinate and provide all other field services.
7-16. Maintenance is all actions taken to retain material in a serviceable condition or to restore it to
serviceability. The Army utilizes a tiered, two-level maintenance system composed of field and sustainment
maintenance. Field maintenance is on system maintenance, repair, and return to the user including
maintenance actions performed by operators (FM 4-30). Mechanics and technicians organic to the BSB FSC
maintenance platoon and the BSB field maintenance company perform field maintenance, and at times, from
EAB. The unit maintenance officer and FSC, perform maintenance management including determining and
utilizing battle damage assessment and repair, evacuation, and controlled exchange. (Refer to ATP 4-33 for
more information.) Battle damage assessment and repair occurs at the point of fault or at the maintenance
collection point. Battle damage assessment and repair properly applied at the point of fault may immediately
return the equipment to a mission-capable status or prolong its functional life, which may be critical to
maintaining combat power during reconnaissance and security operations. (Refer to ATP 4-31 for more
information.) Maintenance planners recognize that an information requirement regarding the decision to
echelon the combat trains forward is influenced by the amount of activity in the maintenance collection point.
The maintenance collection point should maintain mobility so that it may support the reconnaissance or
security mission at extended ranges.
7-17. Transportation support for units conducting reconnaissance and security operations is coordinated
through the unit S-4 and FSC to the BSB support operations officer. Many transportation requirements exceed
organic assets and require support from EAB transportation units.
7-18. Operational contract support occurs during all phases of operations and has increased emphasis during
stability operations and area security missions. Trained and ready contracting officer representatives,
field-ordering officers, and paying agents are a necessity to most units. These personnel are part of a larger
acquisition team at higher echelons, which include the contract and financial management experts who
provide guidance and direction to each field ordering officer and paying agent to meet the unit’s needs.
7-19. The S-4 coordinates general engineering support through the BCT S-3. Engineering support includes
engineering capabilities and activities excluding combat engineering that modifies, maintain, or protect the
physical environment. Examples include facility construction, repair, maintenance, and operation.
7-20. Logistics distribution to units conducting reconnaissance and security operations is either routine or
emergency. Whenever possible, units conduct routine resupply daily based on METT-TC (I) utilizing either
throughput, logistics release point, or supply point distribution methods. |
3-98 | 166 | Chapter 7
ROUTINE RESUPPLY
7-21. Routine resupply is operations that are planned based on projected or actual consumption rates received
through reporting. Routine resupply includes LOGPAC operations, aerial delivery, and operational
contract support.
Logistics Package Operations
7-22. The logistic package is a centrally organized resupply convoy originating from field trains. The field
trains transport the supplies needed to sustain a unit for a specific time, until the next scheduled LOGPAC.
7-23. Logistics planners utilize anticipation to standardize push packages as much as possible to provide all
units with sufficient quantities. Accurate logistics reporting, along with the commander’s guidance and
priorities, allows logistics planners to forecast supply requirements quickly. Inaccurate, incomplete, or
untimely logistics status and situation reporting can severely handicap efforts to balance unit requirements
and available supplies. This reduces the amount of time a unit can continue conducting reconnaissance and
security operations. Planners must also consider the likely increased width and depth at which reconnaissance
and security operations occur, as this can drastically affect consumption rates and LOGPAC operational timelines.
Aerial Delivery
7-24. Units can use aerial delivery, which is an essential sustainment operation, to support reconnaissance
and security missions. Aerial delivery operations reduce the risks associated with conducting ground
resupply. Units can conduct aerial delivery in various operational environments where terrain limits access.
Aerial delivery operations include sling-load, airdrop, and air-land procedures. The type and availability of
aircraft limits aerial delivery. Aerial delivery may also compromise locations of units conducting
reconnaissance and security operations. (Refer to ATP 4-48 for more information.)
Operational Contract Support
7-25. Units may use operational contract support to assist units conducting reconnaissance and security
operations. Operational variables and mission variables are considerations that affect employment of contract
support during reconnaissance and security operations. (Refer to ATP 4-10 for more information.)
EMERGENCY RESUPPLY
7-26. Emergency resupply operations may utilize any of the distribution methods with expedited distribution.
Units conduct emergency resupply using the fastest appropriate means based on METT-TC (I). Emergency
resupply may involve classes I (rations and gratuitous issue of health, morale, and welfare items), III, V, VIII,
and IX. Aerial delivery is the fastest method to conduct emergency resupply, but may be limited due to
aircraft availability and other circumstances. Usually, the FSC’s supply and transportation platoon located in
the combat trains conduct emergency resupply. Pre-rigged loads of standard resupply packages may reduce
the response time for emergency resupply. (Refer to ATP 4-45 and ATP 4-48 for details about rigging
supplies for airdrop.)
PERSONNEL SERVICES
7-27. Personnel services are sustainment functions that man and fund the force, maintain Soldier and Family
readiness, promote the moral and ethical values of the nation, and enable the fighting qualities of the Army
(ADP 4-0). Personnel services that are essential to units conducting reconnaissance and security operations
include personnel accountability and strength reporting, casualty operations, and religious support. The unit
S-1 and the squadron unit ministry team provide personnel services to the units. (Refer to ADP 4-0 and FM 1-0
for more information.)
CASUALTY OPERATIONS
7-28. Casualty operations during reconnaissance and security operations present unique challenges to units.
Units must rehearse casualty operations before commencement. Casualty operations include production, |
3-98 | 167 | Sustainment
dissemination, coordination, validation, and synchronization of information regarding each casualty.
Casualty information includes casualty reporting, casualty notification, casualty assistance, line-of-duty
determination, disposition of remains, and disposition of personal effects, military burial honors, and casualty
mail coordination.
7-29. As casualties occur, the nearest observer informs the unit first sergeant via the most expedient means.
The unit first sergeant submits a personnel status report to the squadron S-1 documenting duty status changes.
The unit first sergeant classifies casualties by injury type at the casualty collection point and enters them into
the medical treatment system. The first sergeant ensures completed DA Form 1156 (Casualty Feeder Card)
is forwarded to the S-1 who then enters the data into the Defense Casualty Information Processing System.
7-30. Platoon combat medics record the treatment the casualty received on the casualty’s DA Form 7656
(Tactical Combat Casualty Care [TCCC] Card) by electronic means or by utilizing a DD Form 1380
(Tactical Combat Casualty Care [TCCC] Card), if available. The squadron S-1 receives notifications updating
the Soldier’s patient tracking status as changes occur, and in turn, informs the Soldier’s troop for accountability.
HEALTH SERVICE SUPPORT
7-31. Health service support encompasses all support and services performed, provided, and arranged by
the Army Medical Department to promote, improve, conserve, or restore the mental and physical
well-being of personnel in the Army. Additionally, as directed, provide support in other Services, agencies,
and organizations. This includes casualty care (encompassing a number of Army Medical Department
functions—organic and area medical support, hospitalization, the treatment aspects of dental care and
behavioral/neuropsychiatric treatment, clinical laboratory services, and treatment of chemical, biological,
radiological, and nuclear patients), medical evacuation, and medical logistics (FM 4-02). Squadrons have
an organic medical platoon consisting of an ambulance squad and treatment squad equipped to provide
mobile medical treatment and ground medical evacuation to the combat casualty. Combat medics provide
tactical combat casualty care to wounded Soldiers. Squadrons assign combat medics under the operational
control of the platoon and under the technical supervision of the squadron surgeon and squadron physician
assistant.
7-32. Additionally, a forward resuscitative and surgical detachment may be attached to the BSB medical
company to provide a rapidly, deployable, immediate surgical capability as a result of an extended battlefield
for those critically injured patients who cannot be transported over great distances without surgical
intervention and stabilization. Further Army Health System support at EAB may be available from the
supporting medical brigade (support).
7-33. The brigade surgeon, in coordination with the BSB medical company commander, develops the health
service support portion of the brigade’s support concept. The S-1, S-4, and medical platoon leader should
participate in the concept development rehearsal before execution.
SOLDIER EVACUATION
7-34. Squadrons conduct reconnaissance and security missions over wide and extended areas. The squadron
must place careful attention on the location of medical treatment facilities and the availability of medical
evacuation platforms (air and ground) against time-distance factors when developing the support operation
concept and should realize the nearest aid station may not be their own. Casualties may need to be transported
to another battalion’s aid station. This must be considered during planning.
Medical Evacuation
7-35. Medical evacuation is the timely and effective movement of the wounded and injured. Medical
professionals perform evacuation using dedicated, standardized, medical evacuation platforms. Medical
professionals provide timely, efficient movement and en route care of injured or ill persons to medical
treatment facilities. Medical evacuation ground and air ambulance platforms are platforms designed
especially for the medical evacuation mission, with allocated medical equipment to provide en route care by
trained medical personnel. |
3-98 | 168 | Chapter 7
7-36. The medical evacuation plan is a crucial part of the medical operational plan or OPORD. The brigade
surgeon section handles development of the BCT medical evacuation plan. The medical evacuation plan
identifies ambulance exchange points and casualty collection points. Support graphics in Force XXI Battle
Command, brigade and below display these locations. Additional ambulance support is coordinated with the
supporting sustainment unit operations section and the supporting medical company.
7-37. While the platoon medics and platoon sergeant evacuate casualties from the point of injury to the troop,
casualty collection point, the troop first sergeant or troop medics handle medical evacuation of patients from
the troop, casualty collection point to the aid station. The squadron conducts reconnaissance and security
operations over wide and extended areas; therefore, the BCT squadron and troop medical planners must
consider using adjacent unit aid stations. Ambulance teams from the supporting medical company evacuate
patients from the aid station back to the role 2 medical treatment facility located in the BSA. The
pre-positioning of ambulance teams with the aid station reduces ambulance turnaround times. Medical
evacuation of patients should be no further than their condition requires so they can return to duty as soon
as possible.
7-38. The preferred method of medical evacuation is by air, but air evacuation is dependent upon aircraft
availability and the mission variables of METT-TC (I). Ground evacuation is the primary method of
evacuation. The evacuation platoon provides area support to all units in the supported area. The brigade
aviation element and surgeon, in conjunction with higher headquarters, coordinates the use of air medical
evacuation (see figure 7-1).
7-39. Medical planners anticipate the potential for high casualty rates, long evacuation distances, and adverse
weather when developing the medical evacuation plan. They identify and coordinate ambulance exchange
points for all operations, including the locations of ambulance exchange points for all phases of each
operation. Medical assets need planned triggers. For example, when the forward element reaches a certain
PL, they trigger the medical assets to advance to their next designated location. Planners retain the flexibility
to shift nonstandard evacuation assets to support mass casualties or CASEVACs when required. Plans and
exercises should include any available air evacuation to transport urgent litter patients.
Figure 7-1. Process for evacuation of the wounded |
3-98 | 169 | Sustainment
Note. Although the role 3 hospital is a medical brigade asset dependent upon the scenario and area
of operations, the combat support hospital could be located closer to the patient or located in the
area of operations laterally (central) to a role 2 facility. Depending upon the severity of the injury,
location of appropriate medical treatment facilities, and available clinical specialties that the
patient may require based on clinical judgment, the role 2 medical treatment facility (with or
without fire support task) may be bypassed and a particular role 3 element selected as the medical
evacuation destination for a particular patient with particular injuries. (Refer to FM 4-02,
ATP 4-02.2, and ATP 4-02.10 for more information.)
Casualty Evacuation
7-40. CASEVAC involves the unregulated movement of casualties using predesignated tactical or logistic
aircraft and vehicles. These vehicles and aircraft are not staffed with medical personnel and organic medical
equipment for en route care unless augmentation is planned in the operational plan. If the combat medic is
not available to provide care en route, the combat lifesaver may accompany the casualties to monitor their condition.
CASEVAC
Casualties transported in nonmedical vehicles may not receive proper medical care during
transport. If the casualty’s medical condition deteriorates during transport, or the casualty is not
transported to the appropriate medical treatment facility, an adverse impact on prognosis and
long-term disability or death may result.
SUPPORT AREAS
7-41. A logistics support area is a designated location where sustainment elements, some staff elements, and
other elements locate to support unit operations. Support areas represent an echelon of support. The method
employed to echelon support is a deliberate, collaborative decision, based upon thorough mission analysis
and the MDMP conducted by the leadership and staffs at the brigade, squadron, and troop levels. The primary
support area for units conducting reconnaissance and security operations is the BSA. Trains are echeloned
forward to provide fluid support to units conducting reconnaissance and security operations. The positioning
of FLEs and FARPs are essential to reconnaissance sustainment planning.
TRAINS
7-42. Trains are a grouping of unit personnel, vehicles, and equipment organized to provide sustainment.
Units use the trains concept to arrange their subordinate sustainment elements. Squadron combat trains are
usually under the control of the headquarters and headquarters troop commander or the S-4 and assisted by
the S-1. Squadron field trains are under control of the FSC commander. Troop trains are usually under control
of the troop commander or executive officer. The composition and location of unit trains vary depending
upon the number of units attached to or augmenting the unit, as well as other mission variables. Trains have
two basic configurations: as unit trains in one location (appropriate when the squadron consolidates during
reconstitution and during major movements) or as echeloned trains. Considerations include the following:
* The troop commander determines the troop trains, which may consist of the troop first sergeant,
supply sergeant, and troop medical assets. Maintenance teams from the FSC may be included.
* The FSC forms the squadron field trains and portions of the squadron combat trains. The squadron
commander and staff, the BSB commander and staff, and the FSC commander must collaborate
to determine the best method of employment commensurate with the support brigade concept.
7-43. The trains should change locations frequently depending upon available time and terrain. The trains
change locations to provide the forward support to the Cavalry unit, when an area becomes unusable because
of environmental conditions, or to follow protection (survivability) operations. |
3-98 | 170 | Chapter 7
BRIGADE SUPPORT AREA
7-44. The BSA is the sustainment hub of the BCT. Usually, the BSA is located near an MSR where there is
minimum threat from enemy artillery and mortar fires. For this reason, the BSA usually locates far behind
where units conducting reconnaissance and security operations are located. Normally, the BSA includes the
BSB (less FSCs as applicable), the alternate command post for the higher headquarters (if formed), the
squadron field trains, elements from adjacent units or separate companies, and other sustainment units from EAB.
FORWARD LOGISTICS ELEMENT
7-45. An FLE includes task organized, multifunctional logistics assets to address specific sustainment
missions, which is characteristic of reconnaissance and security operations. The FLE operates from a forward
logistics base or support area. The FLE represents the BSB commander’s ability to weigh the effort for the
operation by drawing on all sustainment assets across the brigade. Additionally, the BSB commander may
coordinate with EAB to provide support capabilities to augment the FLE in the concept of support. BSB
support includes identifying and positioning EAB unit assets in proximity to geographically dispersed forces
to extend the operational reach and prolong endurance. The intent for employing an FLE is to minimize
tactical pauses to the reconnaissance and security plan and enable momentum for the commander.
FORWARD ARMING AND REFUELING POINT
7-46. The FSC is organic to support aviation operations as required by the combined arms battalion. The
FARP provides fuel and ammunition for the sustainment of aviation maneuver units during decisive
operations. Usually, FARPs employ to support aviation operations when the distance covered or endurance
requirements exceed normal capabilities of the aircraft. (Refer to ATP 3-04.17 for more information.)
SECURITY OF SUPPORT AREAS
7-47. Within a support area, a designated unit provides area security, terrain management, movement control,
mobility support, clearance of fires, and required tactical combat forces. Area security operations focus on
the protected force, base, base camp, route, or area, which allows sustainment units to focus on their primary
function. When commanders utilize sustainment units for security operations, logistical operations may be
adversely affected. Security of sustainment efforts during reconnaissance resupply is a critical factor to
successful operations. (Refer to ADP 4-0 for more information.)
7-48. The security of the trains in the support area is the responsibility of the individual in charge of the
trains. The best defense is to avoid detection. The following activities ensure trains security:
* Select sites that use available cover, concealment, and camouflage.
* Enforce strict movement and positioning discipline as well as noise and light discipline to prevent detection.
* Establish a perimeter defense using the occupy procedures for AAs.
* Establish rest plans.
* Identify an alarm or warning system that would enable rapid execution of the defense plan without
further guidance. Usually, the SOP includes the alarm, warning system, and defense plan.
* Designate a reaction force.
ECHELONS ABOVE BRIGADE SUSTAINMENT SUPPORT
7-49. Units conducting large-scale combat operations and reconnaissance and security operations require
sustainment support from EAB sustainment units, particularly in maintenance and medical support.
Typically, an EAB sustainment brigade provides support to units conducting reconnaissance and security
operations. The unit conducting reconnaissance and security may require EAB units to provide water
purification, petroleum storage, and transportation support. The medical brigade and the multifunctional
medical battalion provide additional medical capability as needed. The FSC, in conjunction with the unit S-4,
requests EAB assistance through the BSB. (Refer to ATP 4-93 for more information on the sustainment brigade
and the combat sustainment support battalion.) |
3-98 | 171 | Sustainment
SECTION III – CONSIDERATIONS
7-50. Reconnaissance, security, and stability operations present significant challenges to sustainment
organizations. Units conducting reconnaissance and security operations should consider increased days of
supply on all vehicles, the location of trains, resupplying forward of the LD and line of contact, increased
class V priority on indirect fires systems and class III (B), medical evacuation over greater distances and
dispersed areas, and FLEs. Wide and deep reconnaissance and security operations have the potential to
contact mass quantities of dislocated civilians and detainees as well as captured enemy ammunition and
equipment, all of which require sustainment operational planning.
SUSTAINMENT OF RECONNAISSANCE OPERATIONS
7-51. Maintaining momentum is the overriding consideration when supporting reconnaissance and security
operations. Specific considerations guide planning and preparation. Emphasis, priorities, and requirements
may shift as the operation is underway. The availability of adequate supplies and transportation to sustain the
operation becomes critical as the operation progresses. As reconnaissance elements advance, MSRs lengthen
and communications are strained. Units conducting reconnaissance and security operations suspend most
field service functions except for the increased distribution of ready-to-eat meals. Sustainment units are often
at risk of compromising the stealth of the reconnaissance operation due to their footprint; therefore,
reconnaissance plans must consider resupply methods that emphasize cover and concealment and the
reduction in the frequency of resupply. Reconnaissance operations plan for the disposition of captured enemy
supplies and equipment, particularly ammunition and vehicles.
7-52. Units conducting reconnaissance and security operations may receive support from additional CBRN
platoons task organized to provide additional reconnaissance or decontamination support. Sustainment
considerations for CBRN units supporting include coordinating push packages for unique equipment repair
parts and consumables.
AREA AND ZONE RECONNAISSANCE
7-53. Units conducting area and zone reconnaissance should consider the echeloning of sustainment. Units
should plan for the increased consumption of ammunition, petroleum, oils, and lubricants when
pre-positioning trains. Planning consideration for refuel on the move, maintenance requirements, and push
packages of preplanned and preconfigured essential logistics items should be part of the considerations in
sustainment planning. Area and zone reconnaissance plans should account for an increase in vehicular
maintenance, especially when operating over rough terrain, and mitigate risk through the positioning of
maintenance support teams well forward. Unit distribution should occur at forward locations. Units should
plan for aerial resupply. Area and zone reconnaissance plans include dispersed patient collection points and
multiple ambulance exchange points. Units should coordinate increased class VIII consumption and
augmentation of medical treatment elements. Sustainment units conducting resupply operations for units
conducting reconnaissance must plan for and utilize all available resources for cover and concealment to
mitigate the risk of enemy compromise.
ROUTE RECONNAISSANCE
7-54. Sustainment for units conducting route reconnaissance consists of the same factors as area
reconnaissance. Additionally, units plan for rapidly increasing distances and longer turn-around times for
MSR operations. Units should consider recovering damaged vehicles only to the MSR for further recovery
by higher headquarters’ assets.
RECONNAISSANCE IN FORCE
7-55. Units conducting reconnaissance in force should plan for increased consumption of classes III, V, and
VIII, as well as forward located recovery and maintenance support. Direct and indirect fire contact is much
more likely, given the nature of reconnaissance in force, which means units must be postured for rapid
resupply and maintenance to continue the reconnaissance effort. During reconnaissance in force, unit
commanders must also plan for the retrograde or reinforcement of the force, or the exploitation of success |
3-98 | 172 | Chapter 7
which means estimating a higher consumption of classes III and V, or simply increasing the amount of
emergency classes III and V resupply at the combat trains command post.
SUSTAINMENT OF SECURITY OPERATIONS
7-56. Security missions tend to be defensive in nature. Security operations must make the best use of
available preparation time and sustainment resources. As with reconnaissance, emphasis on any particular
consideration varies with the mission assigned and shifts during mission execution. Security missions include
screen, guard, cover, and area security. As they are able, units conducting security operations utilize a
deception plan for sustainment preparations and operations.
SCREEN
7-57. Screen operations can occur at any level. The FSC supports screen operations at the troop level.
Sustainment planning for units conducting screen operations includes considerations for increased use of
class III (B) and class V. Considerations for the pre-position of limited amounts of ammunition, petroleum,
oil, and lubricant, and barrier material in centrally located forward positions should be included. Screening
units conduct resupply during limited visibility to reduce the chance of enemy interference, and emergency
resupply well forward during lulls in the battle or as required. Sustainment units supporting screen operations
should select MSRs that do not interfere with the movement of maneuver units. Units should plan mobility
operations to maintain MSRs. Plans should limit the forward flow of supplies to supplies essential for the
operation only and should include the destruction of supplies and equipment (except medical) not evacuated.
When time or the enemy situation constrains forward repair of equipment, screening units should prioritize
recovery and evacuation of equipment to preclude loss to the enemy. Units should utilize all available
noncombat vehicles to tow disabled vehicles.
GUARD
7-58. Units conduct guard operations at the battalion level and above. Sustainment planners for units
conducting guard operations consider echeloning sustainment assets. Units conducting guard operations
should plan for displacement of sustainment assets so uninterrupted support continues. Units conducting
guard operations should understand that sustainment units cannot provide support while displacing. Units
conducting guard operations use push packages of critical supplies on a scheduled basis and continues routine
resupply until the using unit requests otherwise. Sustainment planners request additional sustainment assets
from higher headquarters to support attachments or extended operations. Units conducting guard operations
plan for displacement of support assets and supplies early to keep routes open and preclude unnecessary
interference with maneuver units.
7-59. Since the guard force must protect the main body by fighting to gain time, while also forcing the enemy
main body to deploy early, the guarding unit should prioritize forward repair of equipment as much as
possible to avoid being decisively engaged. If displacing to avoid decisive engagement, units should prioritize
recovery over forward repair until they reach a suitable time and location to continue forward repair. If units
have met triggers for transition, they should prioritize recover and evacuation of equipment. In addition,
because guarding is defensive in nature, guarding units should also plan for an increased usage of class IV
material and supplies.
COVER
7-60. The BCT executes cover operations. Cover operations require full BSB sustainment support with the
probability of echeloned support from above brigade, such as the sustainment brigade or medical brigade.
Sustainment for units conducting covering operations consists of the same factors as the screen and the guard
at the BCT level. Cover operations consider additional transportation requirements for the movement of all
essential classes of supply. Cover operations consider a plan to compensate for lost sustainment capability,
and as missions become more dynamic in execution, determining ways to increase the mobility of forward
support assets to maintain pace with the unit. Cover operations anticipate greater numbers of civilians
on the battlefield and detainees than screen or guard operations. |
3-98 | 173 | Sustainment
AREA SECURITY
7-61. Area security operational plans consider increasing their use of barrier materiel, lethal and nonlethal
munitions, and operational contract support. The BSB supports area security missions. Many sustainment
considerations in area security operations coincide with sustainment of stability tasks, such as the plan for
and anticipation of detainees and dislocated civilians.
STABILITY OPERATIONS
7-62. Stability operations are required when there is no fully functional, legitimate, civil governing authority
present in a theater of operations. Stability operations involve comprehensive efforts to stabilize states in
crisis and to build the capacity of vulnerable states. Units conducting stability operations conduct a broad
range of offensive and defensive tasks under the stability framework phases of initial response,
transformation, and fostering sustainability. The BSB and EAB units support stability operations. (Refer to
ATP 3-07.5 for more information.)
7-63. During the initial response phase, units conducting stability operations should emphasize area security
and immediate humanitarian needs. Units should understand medical eligibility of care requirements for the
theater of operations, especially regarding civilians, dislocated civilians, and detainees. During
transformation, units conducting stability operations may execute border control and boundary security
operations over extended lines of communication that may require echeloned and area sustainment support
beyond the capabilities of organic sustainment units.
SECTION IV – SPECIAL CONSIDERATIONS
7-64. Reconnaissance, security, and stability operations requirements are diverse; therefore, units conducting
them are likely to receive attachments and detachments. Due to their diverse mission set, units conducting
reconnaissance and security operations may consider special sustainment requirements for specific units.
ATTACHMENTS
7-65. When receiving attachments, sustainment planners should receive or obtain some basic information
from the sending unit’s S-4 to anticipate support requirements. Planning considerations include—
* Mission.
* Number and type of vehicles, personnel (by specialty), and weapon systems.
* Current status or strength.
* Duration of unit attachment and effective times.
* Support assets accompanying the attachment.
* When and where linkup is to occur, coordination measures for the linkup (such as near and far
recognition signals), and who handles the linkup.
DETACHMENTS
7-66. The unit conducting reconnaissance and security may detach a subordinate element to other units or
organizations for certain missions. The units use the same considerations that apply to receiving attachments.
Company-size detachments deploy with the appropriate level of support to include maintenance, classes III
and V resupply, and medical materials based upon length of time the unit is detached. Additionally, this
applies to troops operating at a considerable distance from the unit’s sustainment assets but is still attached
technically. The S-4 should send the same information as that listed in the preceding paragraph to the
receiving unit’s S-4.
7-67. Attachment and detachment reports reflect the addition or subtraction of units if the attachment or
detachment is effective for more than 24 hours. Upon notification of pending attachments or detachments,
the unit S-4 immediately notifies the FSC and BSB. Sustainment units continue to have an area support
capability and responsibility for units in or transitioning through their area of operations. |
3-98 | 175 | Appendix A
Echelons Above Brigade Considerations
A-1. Corps and division commanders depend on situational understanding to seize and retain the initiative.
Corps and division commanders require reconnaissance formations to develop the situation through action
and in particular, to determine enemy intentions, strengths, and disposition. Commanders require security
forces to provide early warning, maneuver space, and time for the employment of the main body. Cavalry
forces must be able to deploy to advantageous positions while concurrently developing the situation for the
joint TF commander. Cavalry forces regionally aligned to combatant commands ensure the capability is
resident throughout all phases of a joint operation.
A-2. All units have the responsibility to conduct reconnaissance and security tasks to support their own
operations within their area of operations. Commanders may assign corps or divisions a dedicated
reconnaissance and security formation, such as a Cavalry squadron. In the absence of a dedicated formation,
commanders can resource the capability from assigned forces. The corps commander may designate and task
organize a BCT while simultaneously, a division commander may designate and task organize a Cavalry
squadron to perform reconnaissance and security operations. An example is a BCT reconnaissance and
security TF, under the command and control of the corps headquarters, conducting a screen along a corps
front. If a corps requires capabilities beyond a task-organized BCT (such as for reconnaissance in force, a
guard, or a cover), the corps commander may task a division. Another option for corps and division
commanders is to assign security requirements to subordinate units for execution. As an example, a division
tasks a Cavalry squadron to conduct zone reconnaissance or guard within their respective area of operations.
A-3. Mission analysis is essential to the corps and division commander’s decision to determine how to
execute reconnaissance and security operations. Mission analysis evaluates the mission variables of
METT-TC (I), the gain received by creating a reconnaissance and security TF, and the operational
effectiveness of the formation that resource the reconnaissance and security TF. To enhance the corps or
division commander’s ability to plan the execution of reconnaissance and security during mission analysis,
the commander forms a reconnaissance cell within the staff headed by the G-3 (assistant chief of staff,
operations). The reconnaissance cell is responsible for planning and synchronizing operations for the
reconnaissance and security TF to ensure it is properly nested with the commander’s intent and the
information collection plan. (See figure 1-2, page 1-12 as an example of Recon Cell.) One determining factor
for assigning reconnaissance and security tasks to subordinate units is their ability to accomplish their primary
missions, such as attack or defend, while simultaneously executing assigned corps or division reconnaissance
and security tasks. Considerations for establishing a reconnaissance and security TF include the following:
* What is the purpose and intent for reconnaissance and security?
* Does the purpose and intent for reconnaissance and security require an independent formation
under corps or division control?
* What are the impacts to other subordinate unit missions?
* How does the employment of the reconnaissance and security TF mitigate risks to the mission and
enable overall mission accomplishment?
* What are the risks of employment and how does the corps or division mitigate the risks?
* How does the corps or division sustain a reconnaissance and security TF?
* Which additional enablers does the TF require?
* Is the reconnaissance and security TF commander able to control the necessary enablers?
* What is the proficiency of the unit tasked with conducting reconnaissance and security?
* What is the duration of the task organization and mission? |
3-98 | 176 | Appendix A
A-4. The decision to employ a Cavalry squadron for reconnaissance and security depends upon the mission
variables of METT-TC (I). The division commander considers several factors before detaching a Cavalry
squadron from a BCT to execute independent reconnaissance or security operations. These factors are—
* Is the mission distinct from that assigned to the BCT?
* Is the BCT able to accomplish its mission without the Cavalry squadron?
* What sustainment does the detached Cavalry squadron require?
* What additional artillery, aviation, engineer, air defense, electromagnetic warfare, and maneuver
forces does the Cavalry squadron require?
* Is staff augmentation required to control necessary enablers?
A-5. Corps and division commanders should consider additional factors when addressing mission duration
and unit proficiency. One factor commanders should consider is that reconnaissance and security are enduring
and enabling tasks that support all operations and transitions. A second factor to consider is that unit
proficiency usually increases as leaders and Soldiers become more competent in the individual and collective
tasks associated with reconnaissance and security operations. In addition, habitual task organization and
relationships increase cohesion and understanding of SOPs in addition to building trust. Rotating the mission
and designation between formations increases unit turbulence and reduces the ability to develop
reconnaissance and security expertise within the command. A third factor commanders should consider is
that units may require time to adjust to the differing METT-TC (I) factors between offensive and defensive
operations and reconnaissance and security operations. There are also adjustments as units that usually operate
at one echelon provide support for a higher echelon (such as a Cavalry squadron usually supporting a brigade
is now supporting a division).
A-6. Simultaneous with determining the best means for meeting reconnaissance and security requirements,
corps or division commanders must determine the necessary task organization to conduct these operations in
close contact with the enemy and civilian populations. The commander determines task organization during
war-gaming supported by a thorough review of the mission variables, IPB, and risks. Commanders must
understand that the constantly changing operational environment requires decentralized, combined arms
formations capable of working with joint and interagency partners to collect critical information, provide the
level of security required in a given situation, and defeat a variety of threats from state and nonstate actors.
These various aspects provide a general list of recommended capabilities for reconnaissance task
organization. As an example, for reconnaissance in force, commanders place particular emphasis on the
maneuver, mobility, and fires requirements since fighting for information is probably a key aspect of the mission.
A-7. Task organizing a reconnaissance and security formation for employment at EAB should include the
following capabilities:
* Ground maneuver.
Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or
area; anticipated enemy and the need to fight for information; speed required; detail required;
mobility about the enemy and the main body.
Security capabilities: size of the security area or area of operations; anticipated enemy;
requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities. The
formation must have the capability to prevent enemy forces from gaining a position of
advantage across a division front or flank to collect and target the division and subordinate
BCTs. Simultaneously, the formation must protect organic or supporting capabilities. While
the force conducts reconnaissance in support of maneuver, it must be able to secure key terrain
for follow-on forces without degrading its ability to continue further reconnaissance. The
distance between the force and the following BCT must be considered when allocating the
proper additional combat power.
* Manned aviation.
Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or
area; anticipated enemy and the need to fight for information; speed required; terrain.
Security capabilities: size of the security area or area of operations; anticipated enemy;
requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; terrain. |
3-98 | 177 | Echelons Above Brigade Considerations
* UASs. dependent on unit capabilities, speed required, number and types of NAIs or
reconnaissance objectives, and terrain.
* Mobility.
Engineer reconnaissance capabilities: dependent on the information requirement detail and
breadth of area reconnoitered; detail of infrastructure required.
Engineer mobility capabilities: dependent on obstacles anticipated and the requirement to
breach; types and number of gaps anticipated and required to cross.
* Countermobility. Capabilities: dependent on time available and whether it is a stationary or
moving operation; capacity of organic capabilities; obstacle intended affect against enemy
reconnaissance or maneuver capabilities.
* Indirect fires.
Planning: planning considerations for task organizing capabilities to support the
reconnaissance and security TF with indirect fire support, target acquisition, mobility, and
survivability.
Supporting reconnaissance: dependent on organic capabilities; anticipated enemy and the
need to fight for information; distance from the main body or supporting fires capabilities.
The division may task a BCT to provide additional artillery support to the reconnaissance and
security BCT or Cavalry squadron through augmentation of, at a minimum, a field artillery
battery. The corps and division may also allocate other supporting lethal and nonlethal fires
including joint fires, such as close air support, electromagnetic attack capabilities, or offensive
cyberspace operations.
Supporting security: dependent on organic capabilities; anticipated enemy; requirement to
defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; distance from the
main body or supporting fires capabilities.
Indirect fires radar capabilities: dependent on other units’ ability to provide radar coverage;
distance from main body.
* Intelligence.
SIGINT capabilities: dependent on the requirement to collect on specific aspects of enemy
communications; distance from the main body and capabilities of SIGINT assets; site
exploitation requirements.
HUMINT capabilities: dependent on time available to collect; specific information required;
site exploitation requirements. The theater or corps may task-organize HUMINT capabilities
to provide interrogation capabilities down to the brigade.
Geospatial intelligence capabilities: dependent on time and UAS assets available to collect
specific information required.
* Protection.
Air defense capabilities: dependent on the air threats and ability of other ADA units to provide
coverage. The division can attach or provide as direct support, mobile short-range air defense
capabilities to counter enemy aerial threats, such as fixed-wing and rotary-wing aircraft. The
division may task-organize additional capabilities as operational control, tactical control, or
in a supporting role. These may include radars, counter-UAS, counter-air, or counter-rocket,
artillery, and mortar capabilities.
Survivability capabilities: dependent on the volume of hardening of command-and-control
facilities and other critical infrastructure. potential for the employment of CBRN threats and
hazards requiring increased standoff predetonation layers. Examples are enhanced personal
protective equipment and posture, such as applying reactive armor to vehicles, sapi plates to
fragmentation vests, and mission-orientated protective posture improvements.
CBRN reconnaissance and decontamination capabilities: dependent on the division receiving
CBRN reconnaissance capabilities to its forces. In some cases, the division may task organize
a hazard response company to the BCT or Cavalry squadron to provide decontamination and
additional CBRN reconnaissance capabilities. |
3-98 | 178 | Appendix A
* Sustainment.
Capabilities supporting reconnaissance: dependent on the breadth and depth of the
reconnaissance mission, organic sustainment capabilities, and duration of the mission.
Transportation capabilities: dependent on the mobility of the unit conducting reconnaissance,
travel distance, time available, and speed required.
Capabilities supporting security: dependent on the breadth and depth of the security area or
area of operations, organic sustainment capabilities, and duration of the mission.
Transportation capabilities: dependent on the mobility of the unit conducting security,
distance required to travel, time available, and terrain.
Capabilities to support the unique requirements of all attached enablers in terms of
maintenance, recovery, and classes of supply
Capabilities to provide health service support in terms of ability to transport casualties over
extended distances to role 1 and role 2 levels of care. (See ADP 4-0.)
* Command and control.
The staff, which is dependent on the enablers and attachments employed by the Calvary force,
should be augmented to provide the requisite capability to enable the commander’s
understanding, plan operations, and synchronize the employment of enablers.
The level of headquarters is dependent on span of control, unity of command required, and
discretion of the commander. Assign the appropriate level of command to the force.
The reconnaissance and security BCT and Cavalry squadron S-6 must plan, engineer, install,
operate, and defend the tactical portion of the Department of Defense information
network-Army, known as the tactical network. The S-6 employs a network defense-in-depth
to ensure the availability, protection, and delivery of network resources and critical
information. This facilitates the allocation of network services to enable mission
accomplishment under all conditions.
A-8. Task organizing a formation for employment at EAB requires detailed planning and staff analysis.
Normally, these units are modular forces that require various enablers and augmentation based on
METT-TC (I) and staff analysis to answer the division or corps commander’s PIRs. |
3-98 | 179 | Appendix B
Annex L (Information Collection)
Format and Instructions
B-1. Appendix B provides fundamental considerations, formats, and instructions for developing Annex L
(Information Collection) in Army plans and orders. Annex L provides a format for the annex that can be
modified to meet the requirements of the base order and operations and for an example information collection
plan. This annex follows the five-paragraph attachment format.
B-2. The information collection annex describes how information collection activities support the offensive,
defensive, and stability or defense support of civil authority operations throughout the conduct of the
operation described in the base order. Annex L synchronizes activities in time, space, and purpose to achieve
objectives and accomplish the commander’s intent for reconnaissance, surveillance, and intelligence
operations (including military intelligence disciplines). The G-3 (S-3), in conjunction with the G-2 (S-2), is
responsible for this annex.
[CLASSIFICATION]
Place the classification at the top and bottom of every page of the attachments. Place the
classification marking (TS), (S), I, or (U) at the front of each paragraph and subparagraph in
parentheses. Refer to AR 380-5 for classification and release marking instructions.
Copy ## of ## copies
Issuing headquarters
Place of issue
Date-time group of signature
Message reference number
Include the full heading if attachment is distributed separately from the base order or higher-
level attachment.
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
(U)References: List documents essential to understanding Annex L.
a. List maps and charts first. Map entries include series number, country, sheet names or
numbers, edition, and scale.
b.List other references in subparagraphs labeled as shown.
c.Doctrinal references for this annex include FM 2-0 and FM 6-0.
[page number]
[CLASSIFICATION] |
3-98 | 180 | Appendix B
[CLASSIFICATION]
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
(U)Time Zone Used Throughout the Plan/Order: Write the time zone established in the base plan
or order.
1.(U) Situation.
a.(U) Area of Interest. Refer to Annex B (Intelligence) or Appendix 2 (Operation Overlay) to
Annex C (Operations).
b.(U) Area of Operations. Refer to Appendix 2 (Operation Overlay) to Annex C (Operations).
(1) (U) Terrain. Describe the aspects of terrain that impact information collection. Refer
to Annex B (Intelligence) as required.
(2) (U) Weather. Describe the aspects of weather that impact information collection.
Refer to Annex B (Intelligence) as required.
c.(U) Enemy Forces. Refer to Annex B (Intelligence) as required.
d.(U) Friendly Forces. Refer to base order, Annex A (Task Organization) and Annex C (Operations)
as required.
e.(U) Interagency, Governmental, and Nongovernmental Organizations. Identify and describe
other organizations in the area of operations that may impact the conduct of operations or
implementation of information collection-specific equipment and tactics. Refer to Annex V
(Interagency Coordination) as required.
f. (U) Civil Considerations. Describe the critical aspects of the civil situation that impact
information collection activities. Refer to Appendix 1 (Intelligence Estimate) to Annex B
(Intelligence) and Annex K (Civil Affairs Operations) as required.
g. (U) Attachments and Detachments. If pertinent, list units or assets attached to or detached
from the issuing headquarters. State when each attachment or detachment is effective (for example,
on order, on commitment of the reserve) if different from the effective time of the base plan or order.
Do not repeat information already listed in Annex A (Task Organization).
h. (U) Assumptions. List any information collection-specific assumptions that support the
annex development.
2. (U) Mission. State the mission of information collection in support of the operation—a short
description of the who, what (task), when, where, and why (purpose) that clearly indicates the action
to be taken and the reason for doing so.
3.(U) Execution.
a. (U) Concept of Operations. This is a statement of the overall information collection
objective. Describe how the tasks or missions of reconnaissance, surveillance, security,
intelligence operations, and so forth support the commander’s intent and the maneuver plan. Direct
the manner in which each element of the force cooperates to accomplish the key information
collection tasks and ties that to support of the operation with task and purpose statement. Must
describe, at minimum, the overall scheme of maneuver and concept of fires. Refer to Appendix 1
(Information Collection Plan) to Annex L (Information Collection). The following subparagraphs
are examples. Omit what is unnecessary for brevity.
(1) (U) Movement and Maneuver. Provide the scheme of movement and maneuver for
collection assets and any other unit given a key information collection task, in accordance with
the concept of operations in the base order (paragraph 3b) and Annex C (Operations). Describe
the employment of information collection assets in relation to the rest of the force and state the
method forces will enter the area of operations.
[page number]
[CLASSIFICATION] |
3-98 | 181 | Annex L (Information Collection)
Format and Instructions
[CLASSIFICATION]
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
(2) (U) Intelligence. Describe the intelligence concept for supporting information
collection. Refer to Annex B (Intelligence) as required.
(3) (U) Fires. Describe the concept of fires in support of information collection. Identify
which information collection assets have priority of fires and the coordinating purpose of,
priorities for, allocation of, and restrictions on fire support and fire support coordinating measures.
Refer to Annex D (Fires) as required.
(4) (U) Protection. Describe protection support to information collection. Refer to Annex
E (Protection) as required.
(5) (U) Engineer. Describe engineer support, if applicable, to information collection.
Identify priority of mobility and survivability assets. Refer to Annex G (Engineer) as required.
(6)(U) Sustainment. Describe sustainment support to information collection as required. Refer
to Annex F (Sustainment).
(7)(U) Signal. Describe signal support to information collection as required. Refer to Annex H
(Signal).
(8) (U) Soldier and Leader Engagement. State overall concept for synchronizing information
collection with Soldier and leader engagement. Refer to coordinating instructions in Annex C
(Operations).
(9) (U) Assessment. If required, describe the priorities for assessment for the
information collection plan and identify the measures of effectiveness used to assess end state
conditions and objectives. Refer to Annex M (Assessment) as required.
b. (U) Tasks to Subordinate Units. State the information collection task assigned to each unit
not identified in the base order. Refer to Appendix 1 (Information Collection Plan) to Annex L
(Information Collection) as required.
(1)(U) Information Collection Support Tasks for Maneuver Units.
(a)(U) Tasks to Maneuver Unit 1.
(b)(U) Tasks to Maneuver Unit 2.
(c)(U) Tasks to Maneuver Unit 3.
[page number]
[CLASSIFICATION] |
3-98 | 182 | Appendix B
[CLASSIFICATION]
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
(2) (U) Information Collection Support Tasks for Support Units. Direct units to observe
and report in accordance with Appendix 1 (Information Collection Plan) to Annex L
(Information Collection).
(a)(U) Military Intelligence. Refer to Annex B (Intelligence) as required.
(b)(U) Engineer. Refer to Annex G (Engineer) as required.
(c)(U) Fires. Refer to Annex D (Fires) as required.
(d)(U) Signal. Refer to Annex H (Signal) as required.
(e)(U) Sustainment. Refer to Annex F (Sustainment) as required.
(f)(U) Protection. Refer to Annex E (Protection) as required.
(g)(U) Civil Affairs. Refer to Annex K (Civil Affairs Operations) as required.
c. (U) Coordinating Instructions. List only instructions applicable or not covered in unit
standard operating procedures (SOPs).
(1)(U) Time or Condition When the Plan Becomes Effective.
(2) (U) Priority Intelligence Requirements. List priority intelligence requirements (PIRs)
here, the information collection tasks associated with them, and the latest time information is of value
for each PIR.
(3) (U) Essential Elements of Friendly Information. List essential elements of friendly
information (EEFIs) here.
(4) (U) Fire Support Coordination Measures. List fire support coordination measures.
Establish no fire areas.
(5) (U) Intelligence Handover Lines with Adjacent Units. Identify handover guidance
and parameters; refer to necessary graphics or attachments as required.
(6) (U) Limits of Advance, Limits of Reconnaissance, and Quick Reaction Force
Response Instructions. Identify as required, referencing graphical depictions in attachments or
instructions as needed.
(7)(U) Airspace Coordinating Measures. List airspace coordinating measures.
(8) (U) Intelligence Coordination Measures. List information such as restrictions on
international borders or other limitations and the coordination or special instructions that
apply. Identify what unit is responsible for coordinating information collection activities in
relation to the area of operations.
[page number]
[CLASSIFICATION] |
3-98 | 183 | Annex L (Information Collection)
Format and Instructions
[CLASSIFICATION]
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
(9) (U) Rules of Engagement. Refer to Appendix 11 (Rules of Engagement) to Annex C
(Operations) as required.
(10) (U) Risk Reduction Control Measures. State reconnaissance, surveillance, and security-
specific guidance such as fratricide prevention measures not included in SOPs, referring to
Annex E (Protection) as required.
(11)(U) Environmental Considerations. Refer to Appendix 5 (Environmental Considerations) to
Annex G (Engineer) as required.
(12) (U) Other Coordinating Instructions. List only instructions applicable to two or
more subordinate units not covered in the base plan or order.
4.(U) Sustainment. Describe any sustainment requirements, subparagraphs may include:
a. (U) Logistics. Identify unique sustainment requirements, procedures, and guidance to
support information collection. Specify procedures for specialized technical logistics support from
external organizations as necessary. Use subparagraphs to identify priorities and specific
instructions for information collection logistics support. Refer to Annex F (Sustainment) and
Annex P (Host-Nation Support) as required.
b. (U) Personnel. Identify unique personnel requirements and concerns, associated with
information collection, including global sourcing support and contracted linguist requirements. Use
subparagraphs to identify priorities and specific instructions for human resources support, financial
management, legal support, and religious support. Refer to Annex F (Sustainment) as required.
c. (U) Health Service Support. Provide information including the health threat (endemic and
epidemic diseases, state of health of the enemy forces, medical capabilities of the enemy force and
the civilian population), and medical evacuation routes, barriers, and significant terrain features.
Refer to Appendix 3 (Health System Support) to Annex F (Sustainment) as required.
5.(U) Command and Signal.
a.(U) Command.
(1) (U) Location of the Commander and Key Leaders. List the location of the commander
and key information collection leaders and staff officers.
(2) (U) Succession of Command. State the succession of command if not covered in the unit’s
SOPs.
(3)(U) Liaison Requirements. State information collection liaison requirements not covered in
the unit’s SOPs.
b.(U) Control.
(1) (U) Command Posts. Describe the employment of command posts, (CPs), including
the location of each CP and its time of opening and closing, as appropriate. State the primary
controlling CP for specific tasks or phases of the operation.
(2) (U) Reports. List reports not covered in SOPs. Describe information collection
reporting requirements for subordinate units. Refer to Annex R (Reports) as required.
[page number]
[CLASSIFICATION] |
3-98 | 184 | Appendix B
[CLASSIFICATION]
ANNEX L (INFORMATION COLLECTION) TO OPERATION PLAN/ORDER [number]
[(code name)]—[issuing headquarters] [(classification of title)]
c. (U) Signal. List signal operating instructions for information collection as needed.
Consider operations security requirements. Address any information collection specific
communications and digitization connectivity requirements. Refer to Annex H (Signal) as required.
ACKNOWLEDGE: Include only if attachment is distributed separately from the base plan or order.
[Commander’s last name]
[Commander’s rank]
The commander or authorized representative signs the original copy. If the representative signs the
original, add the phrase “For the Commander.” The signed copy is the historical copy and remains in
the headquarters’ files.
OFFICIAL
[Authenticator’s name]
[Authenticator’s
position]
Use only if the commander does not sign the original attachment. If the commander signs the original,
no further authentication is required. If the commander does not sign, the signature of the preparing
staff officer requires authentication and only the last name and rank of the commander appear in the
signature block.
ATTACHMENTS: List lower-level attachment (appendixes, tabs, and exhibits).
Appendix 1–Information Collection Plan
Appendix 2–Information Collection Overlay
DISTRIBUTION: (if distributed separately from the base order).
[page number]
[CLASSIFICATION] |
3-98 | 185 | Glossary
The glossary lists acronyms and terms with Army or joint definitions. Where Army and
joint definitions differ, (Army) precedes the definition. Terms for which FM 3-98 is the
proponent are marked with an asterisk (*). The proponent manual for other terms is
listed in parentheses after the definition.
SECTION I – ACRONYMS AND ABBREVIATIONS
AA assembly area
ABCT armored brigade combat team
ACR armored Cavalry regiment
ACS air Cavalry squadron
ACT air Cavalry troop
ADA air defense artillery
ADP Army doctrine publication
AFI Air Force instruction
AFTTP Air Force tactics, techniques, and procedures
AR Army regulation
ATP Army techniques publication
BCT brigade combat team
BEB brigade engineer battalion
BHL battle handover line
BSA brigade support area
BSB brigade support battalion
CASEVAC casualty evacuation
CAV Cavalry
CBRN chemical, biological, radiological, and nuclear
CCIR commander’s critical information requirement
class I rations and gratuitous issue of health, morale, and welfare items
class III petroleum, oil, and lubricants
class III (B) petroleum, oil, and lubricants (bulk)
class IV construction materials
class V ammunition
class VIII medical
class IX repair parts and components for equipment maintenance
DA Department of the Army
DD Department of Defense (form)
DOD Department of Defense |
3-98 | 186 | Glossary
EAB echelons above brigade
EEFI essential element of friendly information
E-MIB expeditionary military intelligence brigade
ERT engineer reconnaissance team
FARP forward arming and refueling point
FFIR friendly force information requirement
FLE forward logistics element
FLOT forward line of own troops
FM field manual
FSC forward support company
G-2 assistant chief of staff, intelligence
G-3 assistant chief of staff, operations
HUMINT human intelligence
IBCT Infantry brigade combat team
IPB intelligence preparation of the battlefield
ISF Iraqi Security Forces
JP joint publication
LOA limit of advance
LOGPAC logistics package
LTIOV latest time information is of value
MCRP Marine Corps reference publication
MCWP Marine Corps warfighting publication
MDMP military decision-making process
METT-TC (I) mission, enemy, terrain and weather, troops and support available, time
available, civil considerations, and informational considerations
mm millimeter
MSR main supply route
NAI named area of interest
NTTP Navy tactics, techniques, and procedures
OPORD operation order
PIR priority intelligence requirement
PL phase line
PMESII-PT political, military, economic, social, information, infrastructure, physical
environment, and time [operational variables]
RDSP rapid decision-making and synchronization process
S-1 battalion or brigade personnel staff officer
S-2 battalion or brigade intelligence staff officer
S-3 battalion or brigade operations staff officer
S-4 battalion or brigade logistics staff officer
S-6 battalion or brigade signal staff officer
S-9 battalion or brigade civil affairs operations staff officer
SIGINT signals intelligence |
3-98 | 187 | Glossary
SIR specific information requirement
SOF special operations forces
SOP standard operating procedure
TAI target area of interest
TF task force
TUAS tactical unmanned aircraft system
UAS unmanned aircraft system
U.S. United States
WARNORD warning order
SECTION II – TERMS
adversary
A party acknowledged as potentially hostile to a friendly party and against which the use of force may
be envisaged. (JP 3-0)
area reconnaissance
A type of reconnaissance operation that focuses on obtaining detailed information about the terrain or
enemy activity within a prescribed area. (ADP 3-90)
area security
A type of security operation conducted to protect friendly forces, lines of communications, and
activities within a specific area. (ADP 3-90)
battle handover line
A designated phase line where responsibility transitions from the stationary force to the moving force
and vice versa. (ADP 3-90)
bypass criteria
Measures established by higher echelon headquarters that specify the conditions and size under which
enemy units and contact may be avoided. (ADP 3-90)
command and control
The exercise of authority and direction by a properly designated commander over assigned and
attached forces in the accomplishment of the mission. (JP 1, Volume 2)
commander’s critical information requirement
Specific information identified by the commander as being essential to facilitate timely decision
making. (JP 3-0)
commander’s visualization
The mental process of developing situational understanding, determining a desired end state, and
envisioning an operational approach by which the force will achieve that end state. (ADP 6-0)
confirmation brief
A brief subordinate leaders give to the higher commander immediately after the operation order is
given to confirm understanding. (ADP 5-0)
cover
(Army) A type of security operation done independent of the main body to protect them by fighting to
gain time while preventing enemy ground observation of and direct fire against the main body.
(ADP 3-90)
decision point
A point in space and the latest time when the commander or staff anticipates making a key decision
concerning a specific course of action. (JP 5-0) |
3-98 | 188 | Glossary
decision support matrix
A written record of a war-gamed course of action that describes decision points and associated actions
at those decision points. (ADP 5-0)
decision support template
A combined intelligence and operations graphic based on the results of war-gaming that depicts
decision points, timelines associated with movement of forces and the flow of the operation, and other
key items of information required to execute a specific friendly course of action.
(JP 2-0)
decisive point
Key terrain, key event, critical factor, or function that, when acted upon, enables commanders to gain a
marked advantage over an enemy or contribute materially to achieving success. (JP 5-0)
economy of force
The employment and distribution of forces to allocate the maximum possible combat power on
primary efforts. (JP 3-0)
enemy
A party identified as hostile against which the use of force is authorized. (ADP 3-0)
engagement criteria
Protocols that specify those circumstances for initiating engagement with an enemy force. (FM 3-90-1)
essential element of friendly information
A critical aspect of a friendly operation that, if known by a threat would subsequently compromise,
lead to failure, or limit success of the operation and therefore should be protected from enemy
detection. (ADP 6-0)
field maintenance
On system maintenance, repair, and return to the user including maintenance actions performed by
operators. (FM 4-30)
forward passage of lines
Occurs when a unit passes through another unit’s positions while moving toward the enemy.
(ADP 3-90)
friendly force information requirement
Information the commander and staff need to understand the status of friendly force and supporting
capabilities. (JP 3-0)
guard
A type of security operation done to protect the main body by fighting to gain time while preventing
enemy ground observation of and direct fire against the main body. (ADP 3-90)
health service support
(Army) Health service support encompasses all support and services performed, provided, and
arranged by the Army Medical Department to promote, improve, conserve, or restore the mental and
physical well-being of personnel in the Army. Additionally, as directed, provide support in other
Services, agencies, and organizations. This includes casualty care (encompassing a number of Army
Medical Department functions—organic and area medical support, hospitalization, the treatment
aspects of dental care and behavioral/neuropsychiatric treatment, clinical laboratory services, and
treatment of chemical, biological, radiological, and nuclear patients), medical evacuation, and medical
logistics. (FM 4-02)
high-payoff target
A target whose loss to the enemy will significantly contribute to the success of the friendly course of
action. (JP 3-60)
high-value target
A target the enemy commander requires for the successful completion of the mission. (JP 3-60) |
3-98 | 189 | Glossary
hybrid threat
The diverse and dynamic combination of regular forces, irregular forces, terrorists, or criminal
elements unified to achieve mutually benefitting effects. (ADP 3-0)
indicator
In intelligence usage, an item of information that reflects the intention or capability of an enemy and/or
adversary to adopt or reject a course of action. (JP 2-0)
information collection
An activity that synchronizes and integrates the planning and employment of sensors and assets as well
as the processing, exploitation, and dissemination systems in direct support of current and future operations.
(FM 3-55)
key tasks
Those significant activities the force must perform as a whole to achieve the desired end state.
(ADP 6-0)
local security
Low-level security activities conducted near a unit to prevent surprise by the enemy. (ADP 3-90)
military decision-making process
An iterative planning methodology to understand the situation and mission, develop a course of action,
and produce an operation plan or order. (ADP 5-0)
mission command
(Army) The Army’s approach to command and control that empowers subordinate decision-making
and decentralized execution appropriate to the situation. (ADP 6-0)
named area of interest
The geospatial area or systems node or link against which information that will satisfy a specific
information requirement can be collected, usually to capture indications of adversary courses of action.
(JP 2-0)
neutral
(Army) A party identified as neither supporting nor opposing friendly or enemy forces. (ADP 3-0)
personnel services
Sustainment functions that man and fund the force, maintain Soldier and Family readiness, promote the
moral and ethical values of the nation, and enable the fighting qualities of the Army. (ADP 4-0)
planning
The art and science of understanding a situation, envisioning a desired future, and determining
effective ways to bring that future about. (ADP 5-0)
precision-guided munition
A guided weapon intended to destroy a point target and minimize collateral damage. (JP 3-03)
precision munition
A munition that corrects for ballistic conditions using guidance and control up to the aimpoint or
submunitions dispense with terminal accuracy less than the lethal radius of effects. (FM 3-09)
preparation
Those activities performed by units and Soldiers to improve their ability to execute an operation.
(ADP 5-0)
priority intelligence requirement
An intelligence requirement that the commander and staff need to understand the threat and other
aspects of the operational environment. (JP 2-0) |
3-98 | 190 | Glossary
rearward passage of lines
Occurs when a unit passes through another unit’s position while moving away from the enemy.
(ADP 3-90)
reconnaissance
A mission undertaken to obtain information about the activities and resources of an enemy or
adversary, or to secure data concerning the meteorological, hydrographic, geographic, or other
characteristics of a particular area, by visual observation or other detection methods. (JP 2-0)
*reconnaissance handover
The action that occurs between two elements to coordinate the transfer of information and
responsibility for observation of potential threat contact, or the transfer of an assigned area from one
element to another.
*reconnaissance handover line
A designated phase line on the ground where reconnaissance responsibility transitions from one
element to another.
reconnaissance in force
A type of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and
reactions or to obtain other information. (ADP 3-90)
rehearsal
A session in which the commander and staff or unit practices expected actions to improve performance
during execution. (ADP 5-0)
relief in place
An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by
the incoming unit and the responsibilities of the replaced elements for the mission and the assigned
zone of operations are transferred to the incoming unit. (JP 3-07.3)
reserve
(Army) That portion of a body of troops that is withheld from action at the beginning of an engagement
to be available for a decisive movement. (ADP 3-90)
route reconnaissance
A type of reconnaissance operation to obtain detailed information of a specified route and all terrain
from which the enemy could influence movement along that route. (ADP 3-90)
screen
A type of security operation that primarily provides early warning to the protected force. (ADP 3-90)
security cooperation
Department of Defense interactions with foreign security establishments to build relationships that
promote specific United States security interests, develop allied and partner military and security
capabilities for self-defense and multinational operations, and provide United States forces with
peacetime and contingency access to allies and partners. (JP 3-20)
situational understanding
The product of applying analysis and judgment to relevant information to determine the relationships
among the operational and mission variables. (ADP 6-0)
special reconnaissance
Reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or
diplomatically and/or politically sensitive environments to collect or verify information of strategic or
operational significance, employing military capabilities not normally found in conventional forces.
(JP 3-05)
surveillance
The systematic observation of aerospace, cyberspace, surface, or subsurface areas, places, persons, or
things by visual, aural, electronic, photographic, or other means. (JP 3-0) |
3-98 | 191 | Glossary
sustainment
(Army) The provision of logistics, financial management, personnel services, and health service
support necessary to maintain operations until successful mission completion. (ADP 4-0)
target area of interest
The geographical area where high-value targets can be acquired and engaged by friendly forces.
(JP 2-0)
targeting
The process of selecting and prioritizing targets and matching the appropriate response to them,
considering operational requirements and capabilities. (JP 3-0)
task organization
(Army) A temporary grouping of forces designed to accomplish a particular mission. (ADP 5-0)
threat
Any combination of actors, entities, or forces that have the capability and intent to harm United States
forces, United States national interests, or the homeland. (ADP 3-0)
unity of effort
Coordination and cooperation toward common objectives, even if the participants are not necessarily
part of the same command or organization, which is the product of successful unified action.
(JP 1, Volume 2)
zone reconnaissance
A type of reconnaissance operation that involves a directed effort to obtain detailed information on all
routes, obstacles, terrain, and enemy forces within a zone defined by boundaries. (ADP 3-90) |
3-98 | 193 | References
All websites accessed 4 January 2023.
REQUIRED PUBLICATIONS
These documents must be available to intended users of this publication.
DOD Dictionary of Military and Associated Terms, November 2022.
FM 1-02.1. Operational Terms, 9 March 2021.
FM 1-02.2. Military Symbols, 18 May 2022.
RELATED PUBLICATIONS
These documents are cited in this publication.
JOINT PUBLICATIONS
Most joint publications are available online: http://www.jcs.mil/Doctrine.
JP 1, Volume 2. The Joint Force. 19 June 2020.
JP 2-0. Joint Intelligence. 26 May 2022.
JP 3-0. Joint Campaigns and Operations. 18 June 2022.
JP 3-03. Joint Interdiction. 26 May 2022.
JP 3-05. Joint Doctrine for Special Operations. 22 September 2020.
JP 3-07.3. Peace Operations. 1 March 2018.
JP 3-20. Security Cooperation. 9 September 2022.
JP 3-60. Joint Targeting. 28 September 2018.
JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020.
JP 5-0. Joint Planning. 1 December 2020.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: https://armypubs.army.mil
ADP 3-0. Operations. 31 July 2019.
ADP 3-07. Stability. 31 July 2019.
ADP 3-28. Defense Support of Civil Authorities. 31 July 2019.
ADP 3-90. Offense and Defense. 31 July 2019.
ADP 4-0. Sustainment. 31 July 2019.
ADP 5-0. The Operations Process. 31 July 2019.
ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019.
AR 115-10/AFI 15-157 (IP). Climatic, Hydrological, and Topographic Services, Weather Support for
the U.S. Army. 2 September 2021.
AR 380-5. Security, Army Information Security Program. 25 March 2022.
ATP 2-01. Collection Management. 17 August 2021.
ATP 2-01.3. Intelligence Preparation of the Battlefield. 1 March 2019.
ATP 2-19.4. Brigade Combat Team Intelligence Techniques. 25 June 2021.
ATP 3-04.17. Techniques for Forward Arming and Refueling Points. 4 June 2018. |
3-98 | 194 | References
ATP 3-07.5. Stability Techniques. 31 August 2012.
ATP 3-18.4. Special Forces Special Reconnaissance. 5 October 2021.
ATP 3-34.81/MCWP 3-17.4. Engineer Reconnaissance. 1 March 2016.
ATP 3-52.1/MCRP 3-20F.4 [MCWP 3-25.13] NTTP 3-56.4/AFTTP 3-2.78. Airspace Control.
Multi-Service Tactics, Techniques, and Procedures for Airspace Control. 14 February 2019.
ATP 4-02.2. Medical Evacuation. 12 July 2019.
ATP 4-02.10. Theater Hospitalization. 14 August 2020.
ATP 4-10/MCRP 4-11H/NTTP 4-09.1/AFTTP 3-2.41. Multi-service Tactics, Techniques, and
Procedures for Operational Contract Support. 16 December 2021.
ATP 4-31/MCRP 3-40E.1. Recovery and Battle Damage Assessment and Repair (BDAR).
18 November 2020.
ATP 4-33. Maintenance Operations. 9 July 2019.
ATP 4-45. Force Provider Operations. 24 November 2014.
ATP 4-48. Aerial Delivery. 21 December 2016.
ATP 4-93. Sustainment Brigade. 11 April 2016.
ATP 7-100.3. Chinese Tactics. 9 August 2021.
FM 1-0. Human Resources Support. 25 August 2021.
FM 2-0. Intelligence. 6 July 2018.
FM 3-0. Operations. 1 October 2022.
FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020.
FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021.
FM 3-52. Airspace Control. 20 October 2016.
FM 3-55. Information Collection. 3 May 2013.
FM 3-90-1. Offense and Defense, Volume 1. 22 March 2013.
FM 3-90-2. Reconnaissance, Security, and Tactical Enabling Tasks, Volume 2. 22 March 2013.
FM 4-02. Army Health System. 17 November 2020.
FM 4-30. Ordnance Operations. 1 April 2014.
FM 6-0. Commander and Staff Organization and Operations. 16 May 2022.
FM 6-05/MCRP 3-30.4/NTTP 3-05.19/AFTTP 3-2.73/USSOCOM Pub 3-33. CF-SOF Multi-service
Tactics, Techniques, and Procedures for Conventional Forces and Special Operations Forces
Integration, Interoperability, and Interdependence. 25 January 2022.
FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019.
OTHER PUBLICATIONS
Cameron, Robert S. Ph.D. 2009. To Fight or Not to Fight? Organizational and Doctrinal Trends in
Mounted Maneuver Reconnaissance from the Interwar Years to Operation IRAQI
FREEDOM. Combat Studies Institute Press, U.S. Army Combined Arms Center, Fort
Leavenworth, Kansas, (https://www.armyupress.army.mil/Portals/7/combat-studies-
institute/csi-books/cameron_fight.pdf)
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available online: https://armypubs.army.mil. DD forms are
available online: https://www.esd.whs.mil/Directives/forms.
DA Form 1156, Casualty Feeder Card. |
3-98 | 195 | References
DA Form 2028, Recommended Changes to Publications and Blank Forms.
DA Form 5517, Standard Range Card.
DA Form 7656, Tactical Combat Casualty Care (TCCC) Card.
DD Form 1380, Tactical Combat Casualty Care (TCCC) Card (Instructions). (Available through normal
publications supply channels.) |
3-98 | 197 | Index
Entries are by paragraph number.
A E R
advance covering force. 5-100 economy of force. 1-19 rear guard. 5-83
area reconnaissance emergency resupply. 7-26 reconnaissance
definition. 4-59 execution decisions or five types. 4-33
area security. 5-120 adjustment decisions. 3-111 seven fundamentals. 4-2
ASCOPE. 6-22 expeditionary military reconnaissance by fire. 4-19
attack and reconnaissance intelligence brigades 3-139
aviation units. 5-26 (E-MIB). 6-39 route security. 5-130
augment the guard force. 5-62 F routine resupply. 7-21
B field artillery. 6-23 S
brigade engineer battalion flank and rear defensive screen
elements. 6-28 covering forces. 5-118 depth. 5-31
flank covering force. 5-106 initial. 5-40
C
four factors of legitimacy. 6-7 stationary. 5-36
casualty operations. 7-28
four primary types of security security fundamentals. 5-5
Cavalry as maneuver unit. 6-18
operations. 5-17 security operations
Cavalry squadron, role of. 6-20 four principles of stability tasks. cover. 5-93
Cavalry squadrons. 5-20 6-1 four types. 5-18
Cavalry troop, role of. 6-21 shape the battlefield. 1-10
H
collection plan. 3-126 shaping. 1-30
high-payoff target. 3-126
combined arms, air-ground situational understanding.
teams. 3-108 I 3-115
command and control initial response phase. 6-65 stationary flank guard. 5-69
warfighting function tasks. integrating processes for sustainability phase. 6-68
3-120 reconnaissance and security
T
commander’s intent. 3-25 operations. 3-121
targeting. 6-23
convoy security. 5-131 intelligence preparation of the
battlefield (IPB). 3-122 transformation phase. 6-67,
cueing. 3-143, 3-135
6-66
cueing, mixing, and M
redundancy. 4-22 medical platoon. 7-31 V
vignettes
D mine-dispensing systems. 5-47
3-7 CAV Security Mission at
decide; detect; deliver; and N Objective Lions 2003.
assess (D3A). 3-125 5-11
named area of interest. 3-127
decision point. 3-110 applying security
O fundamentals at
decision support matrix. 3-113,
Arracourt. 5-19
3-110 offensive cover
Napoleon’s Cavalry and
types of. 5-97
decision support template. Mission Command. 3-12
3-113, 3-110 P Reed's Bridge. 4-10
defensive covering force. 5-108 Russian's
phases of the stability
Reconnaissance-strike
disengagement criteria. 3-61 framework. 6-10
Model
preparation. 3-130 |
3-98 | 198 | Index
Entries are by paragraph number.
Russo-Ukrainian War’s Gettysburg, the First Day. Third Armored Cavalry
Donbas campaign. 2-24 1-4 Regiment in Tall Afar.
Shaping the Battlefield with 6-17
Cavalry |
3-98 | 199 | FM 3-98
10 January 2023
By Order of the Secretary of the Army:
JAMES C. MCCONVILLE
General, United States Army
Chief of Staff
Official:
MARK F. AVERILL
Administrative Assistant
to the Secretary of the Army
2300900
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve. To be distributed in |
3-90 | 1 | FM 3-90
Tactics
MAY 2023
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013. |
3-90 | 2 | This publication is available at the Army Publishing Directorate site
(https://www.apd.army.mil/), and the Central Army Registry site |
3-90 | 3 | *FM 3-90
Field Manual Headquarters
No. 3-90 Department of the Army
Washington, D.C., 01 May 2023
TACTICS
Contents
Page
PREFACE.................................................................................................................... xi
INTRODUCTION ....................................................................................................... xiii
PART ONE TACTICS OVERVIEW
Chapter 1 ARMY TACTICS ....................................................................................................... 1-1
Introduction to Tactics ............................................................................................... 1-1
The Operational Environment ................................................................................... 1-1
Role of Tactics ........................................................................................................... 1-2
General Considerations for Tactics ........................................................................... 1-5
Chapter 2 MOVEMENT AND FORMS OF MANEUVER ........................................................... 2-1
Movement Formations ............................................................................................... 2-1
Movement Techniques .............................................................................................. 2-9
Five Forms of Maneuver .......................................................................................... 2-12
PART TWO OFFENSIVE OPERATIONS
Chapter 3 THE OFFENSE ......................................................................................................... 3-1
Purposes of the Offense ............................................................................................ 3-1
Common Offensive Planning Considerations ............................................................ 3-3
Transitions ............................................................................................................... 3-11
Chapter 4 MOVEMENT TO CONTACT ..................................................................................... 4-1
General Considerations for a Movement to Contact ................................................. 4-1
Organization of Forces for a Movement to Contact .................................................. 4-2
Common Control Measures for a Movement to Contact ........................................... 4-3
Planning a Movement to Contact .............................................................................. 4-4
Preparing a Movement to Contact ............................................................................. 4-5
Executing a Movement to Contact ............................................................................ 4-6
Variations for a Movement to Contact ....................................................................... 4-8
Transitions ............................................................................................................... 4-15
Chapter 5 ATTACK .................................................................................................................... 5-1
General Considerations for the Attack ...................................................................... 5-1
Organization of Forces for an Attack ......................................................................... 5-1
Common Control Measures Associated with an Attack ............................................ 5-2
Planning for an Attack ............................................................................................... 5-3
Preparing for an Attack .............................................................................................. 5-6
DISTRIBUTION RESTRICTION: This manual is approved for public release; distribution unlimited.
*This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013. |
3-90 | 4 | Contents
Executing an Attack .................................................................................................. 5-9
Variations of Attacks ............................................................................................... 5-18
Chapter 6 EXPLOITATION ........................................................................................................ 6-1
General Considerations for an Exploitation .............................................................. 6-1
Planning an Exploitation ........................................................................................... 6-4
Preparing an Exploitation .......................................................................................... 6-6
Executing an Exploitation .......................................................................................... 6-6
Chapter 7 PURSUIT .................................................................................................................. 7-1
General Considerations for a Pursuit ........................................................................ 7-1
Organization of Forces for a Pursuit ......................................................................... 7-2
Control Measures for a Pursuit ................................................................................. 7-4
Planning a Pursuit ..................................................................................................... 7-6
Preparing a Pursuit ................................................................................................... 7-7
Executing a Pursuit ................................................................................................... 7-7
PART THREE DEFENSIVE OPERATIONS
Chapter 8 THE DEFENSE ......................................................................................................... 8-1
Purpose of the Defense ............................................................................................ 8-1
Characteristics of the Defense .................................................................................. 8-2
Types of Defensive Operations ................................................................................. 8-2
Common Defensive Control Measures ..................................................................... 8-4
Common Defensive Planning Considerations .......................................................... 8-4
Transitions ............................................................................................................... 8-24
Chapter 9 AREA DEFENSE ...................................................................................................... 9-1
General Considerations for an Area Defense ........................................................... 9-1
Organization of Forces for an Area Defense ............................................................ 9-1
Control Measures for an Area Defense .................................................................... 9-3
Planning an Area Defense ........................................................................................ 9-4
Preparation Considerations for an Area Defense ..................................................... 9-9
Execution Considerations for an Area Defense ...................................................... 9-10
Variations of the Area Defense ............................................................................... 9-12
Chapter 10 MOBILE DEFENSE ................................................................................................ 10-1
General Considerations for a Mobile Defense ........................................................ 10-1
Organization of Forces for a Mobile Defense ......................................................... 10-2
Control Measures for a Mobile Defense ................................................................. 10-4
Planning a Mobile Defense ..................................................................................... 10-5
Preparing a Mobile Defense ................................................................................... 10-6
Executing a Mobile Defense ................................................................................... 10-6
Chapter 11 RETROGRADE ....................................................................................................... 11-1
General Considerations for the Retrograde ............................................................ 11-1
Variations of Retrograde ......................................................................................... 11-2
PART FOUR ENABLING OPERATIONS
Chapter 12 RECONNAISSANCE .............................................................................................. 12-1
General Reconnaissance Considerations .............................................................. 12-1
Reconnaissance Management ............................................................................... 12-4
Forms of Reconnaissance ...................................................................................... 12-9
Reconnaissance Methods ..................................................................................... 12-19
Recuperation and Reconstitution of Reconnaissance Assets .............................. 12-21
Chapter 13 SECURITY OPERATIONS ..................................................................................... 13-1
General Security Operations Considerations ......................................................... 13-1 |
3-90 | 5 | Contents
Security Operations Considerations ........................................................................ 13-2
Types of Security Operations ................................................................................ 13-11
Chapter 14 TROOP MOVEMENT .............................................................................................. 14-1
General Considerations of Troop Movement .......................................................... 14-1
Planning a Troop Movement ................................................................................... 14-9
Preparing a Troop Movement ................................................................................ 14-11
Executing a Troop Movement ............................................................................... 14-11
Chapter 15 RELIEF IN PLACE .................................................................................................. 15-1
General Considerations of a Relief In Place ........................................................... 15-1
Organization of Forces for a Relief in Place ............................................................ 15-1
Control Measures for a Relief In Place .................................................................... 15-2
Planning a Relief In Place ....................................................................................... 15-2
Preparing for a Relief in Place ................................................................................. 15-4
Executing a Relief in Place ...................................................................................... 15-4
Chapter 16 PASSAGE OF LINES ............................................................................................. 16-1
General Considerations for a Passage of Lines ...................................................... 16-1
Organization of Forces for a Passage of Lines ....................................................... 16-2
Control Measures for a Passage of Lines ............................................................... 16-2
Planning a Passage of Lines ................................................................................... 16-4
Forward Passage of Lines ....................................................................................... 16-6
Rearward Passage of Lines .................................................................................... 16-8
Chapter 17 COUNTERMOBILITY .............................................................................................. 17-1
General Countermobility Considerations ................................................................. 17-1
Terrain Reinforcement ............................................................................................. 17-2
Obstacle Intent ........................................................................................................ 17-4
Obstacles Employment Principles ........................................................................... 17-9
Obstacle Emplacement Authority ............................................................................ 17-9
Obstacle Control Measures ................................................................................... 17-10
Chapter 18 MOBILITY................................................................................................................ 18-1
Mobility ..................................................................................................................... 18-1
Mobility Tasks .......................................................................................................... 18-1
Chapter 19 TACTICAL DECEPTION ......................................................................................... 19-1
Overview of Deception ............................................................................................ 19-1
Principles of Tactical Deception .............................................................................. 19-2
Types of Tactical Deception .................................................................................... 19-3
Tactical Deception Means ....................................................................................... 19-4
Variations of Tactical Deception .............................................................................. 19-6
Tactical Deception Planning .................................................................................... 19-9
Tactical Deception in Offensive Operations ............................................................ 19-9
Tactical Deception in Defensive Operations ......................................................... 19-10
Risk to Tactical Deception ..................................................................................... 19-10
Chapter 20 LINKUP ................................................................................................................... 20-1
Linkup Operations ................................................................................................... 20-1
Types of Linkups ..................................................................................................... 20-5
Appendix ATACTICAL CONTROL MEASURES ............................................................................. A-1
Appendix B TACTICAL MISSION TASKS .................................................................................. B-1
Appendix C ENCIRCLEMENTS ................................................................................................... C-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1 |
3-90 | 6 | Contents
INDEX ............................................................................................................... Index-1
Figures
Figure 1-1. Army tactical taxonomy ............................................................................................... 1-4
Figure 1-2. Tactical framework ...................................................................................................... 1-7
Figure 1-3. Actions on contact ..................................................................................................... 1-13
Figure 2-1. Column formation ........................................................................................................ 2-2
Figure 2-2. Line formation .............................................................................................................. 2-3
Figure 2-3. Wedge formation ......................................................................................................... 2-4
Figure 2-4. Echelon left formation .................................................................................................. 2-5
Figure 2-5. Echelon right formation ............................................................................................... 2-5
Figure 2-6. Vee formation .............................................................................................................. 2-6
Figure 2-7. Diamond formation ...................................................................................................... 2-7
Figure 2-8. Box formation .............................................................................................................. 2-8
Figure 2-9. Movement techniques usages in relation to enemy contact ....................................... 2-9
Figure 2-10. Traveling movement technique ............................................................................... 2-10
Figure 2-11. Traveling overwatch movement technique .............................................................. 2-11
Figure 2-12. Bounding overwatch movement technique (alternating bounds) ............................ 2-12
Figure 2-13. Bounding overwatch movement technique (successive bounds) ........................... 2-12
Figure 2-14. Frontal attack ........................................................................................................... 2-14
Figure 2-15. Penetration .............................................................................................................. 2-18
Figure 2-16. Single envelopment ................................................................................................. 2-20
Figure 2-17. Envelopment control measures. .............................................................................. 2-21
Figure 2-18. Turning movement .................................................................................................. 2-22
Figure 2-19. Infiltration ................................................................................................................. 2-25
Figure 4-1. Organization of forces for a movement to contact ...................................................... 4-2
Figure 4-2. Example movement to contact control measures ....................................................... 4-4
Figure 4-3. Search and attack control measures ......................................................................... 4-10
Figure 4-4. Cordon and search symbol ....................................................................................... 4-14
Figure 4-5. Example inner and outer cordons ............................................................................. 4-15
Figure 5-1. Example of attack control measures ........................................................................... 5-2
Figure 5-2. Example control measures for movement from assembly area to attack position ...... 5-8
Figure 5-3. Example of a probable line of deployment and assault position ............................... 5-13
Figure 5-4. Attack of an objective, breach ................................................................................... 5-15
Figure 5-5. Attack of an objective, assault ................................................................................... 5-15
Figure 5-6. Example of a linear ambush ...................................................................................... 5-20
Figure 5-7. Example of an L-shaped ambush.............................................................................. 5-21
Figure 5-8. Area ambush ............................................................................................................. 5-22
Figure 5-9. Example of counterattacks ........................................................................................ 5-24
Figure 5-10. Five phases of a raid ............................................................................................... 5-27 |
3-90 | 7 | Contents
Figure 5-11. Spoiling attack .......................................................................................................... 5-28
Figure 6-1. Example exploitation control measures ....................................................................... 6-4
Figure 7-1. Frontal pursuit .............................................................................................................. 7-3
Figure 7-2. Combination pursuit ..................................................................................................... 7-4
Figure 7-3. Example pursuit control measures .............................................................................. 7-5
Figure 8-1. Example detachment left in contact ............................................................................. 8-9
Figure 9-1. Example area defense control measures .................................................................... 9-3
Figure 9-2. Organization of forces for an area defense, contiguous assigned areas .................... 9-4
Figure 9-3. Organization of forces for an area defense, noncontiguous assigned areas .............. 9-5
Figure 9-4. Example defense in depth ........................................................................................... 9-7
Figure 9-5. Example forward defense ............................................................................................ 9-8
Figure 9-6. Example area defense ............................................................................................... 9-11
Figure 9-7. Example of a defense of a linear obstacle ................................................................. 9-13
Figure 9-8. Example of a perimeter defense ................................................................................ 9-14
Figure 9-9. Example of a perimeter defense in depth .................................................................. 9-15
Figure 9-10. Battalion perimeter, squadron reserve..................................................................... 9-15
Figure 9-11. Example perimeter defense control measures ........................................................ 9-17
Figure 9-12. Slope terminology .................................................................................................... 9-22
Figure 10-1. Mobile defense ......................................................................................................... 10-2
Figure 10-2. Organization of forces for a mobile defense ............................................................ 10-3
Figure 10-3. Example of mobile defense control measures ......................................................... 10-4
Figure 10-4. Mobile defense before commitment of striking force ............................................... 10-8
Figure 10-5. Mobile defense after commitment of striking force .................................................. 10-9
Figure 11-1. Delay from alternating positions .............................................................................. 11-4
Figure 11-2. Delay from subsequent positions ............................................................................. 11-5
Figure 11-3. Example of common delay control measures .......................................................... 11-6
Figure 11-4. Example of a delay forward of a specified line for a specified time ......................... 11-8
Figure 11-5. Example control measures for a withdrawal using a detachment left in contact ... 11-14
Figure 11-6. Withdrawal techniques ........................................................................................... 11-15
Figure 11-7. Example organization of forces for a retirement .................................................... 11-18
Figure 12-1. Example of zone reconnaissance control measures ............................................. 12-11
Figure 12-2. Example of area reconnaissance control measures .............................................. 12-13
Figure 12-3. Example of route reconnaissance control measures ............................................. 12-15
Figure 13-1. Example of the security force crossing LD separately to deploy and establish a flank
screen ....................................................................................................................... 13-9
Figure 13-2. Example of the security force crossing separately and the lead element conducting a
movement to contact .............................................................................................. 13-10
Figure 13-3. Example of the security force crossing with the main body and conducting a zone
reconnaissance ....................................................................................................... 13-11
Figure 13-4. Example security operations control measures ..................................................... 13-12
Figure 13-5. Control measures used in a screen mission .......................................................... 13-14
Figure 13-6. Moving flank screen ............................................................................................... 13-16 |
3-90 | 8 | Contents
Figure 13-7. Examples of alternate bound by OP and alternate bound by unit ......................... 13-17
Figure 13-8. Example of successive bound by unit and continuous marching methods of
displacement .......................................................................................................... 13-18
Figure 13-9. Advance guard for division attack ......................................................................... 13-20
Figure 13-10. Stationary flank guard ......................................................................................... 13-22
Figure 13-11. Moving flank guard control measures ................................................................. 13-23
Figure 13-12. Attack using a covering force .............................................................................. 13-26
Figure 13-13 Example of a defensive cover .............................................................................. 13-28
Figure 14-1. Tactical movement .................................................................................................. 14-2
Figure 14-2. Approach march ...................................................................................................... 14-2
Figure 14-3. Example overlay with route control measures ........................................................ 14-7
Figure 14-4. Example strip map ................................................................................................... 14-8
Figure 15-1. Example of a brigade relief in place ........................................................................ 15-2
Figure 16-1. Control measures associated with a rearward passage of lines ............................. 16-3
Figure 16-2. Forward passage of lines ........................................................................................ 16-7
Figure 17-1. Obstacle control measures and intent symbols .................................................... 17-12
Figure 18-1. Breach ..................................................................................................................... 18-3
Figure 20-1. Linkup of a moving force with a stationary force ..................................................... 20-5
Figure 20-2. Linkup of two moving forces .................................................................................... 20-6
Figure A-1. AO with forward, rear, and lateral boundaries ............................................................ A-2
Figure A-2. Division AO with single boundary and contiguous BCT assigned areas .................... A-3
Figure A-3. Assembly areas........................................................................................................... A-4
Figure A-4. Single assembly area method ..................................................................................... A-5
Figure A-5. Portion of a larger assembly area method .................................................................. A-5
Figure A-6. Dispersed assembly area method .............................................................................. A-6
Figure A-7. Checkpoint 13 ............................................................................................................. A-7
Figure A-8. Contact point 8 ............................................................................................................ A-7
Figure A-9. Coordination point ....................................................................................................... A-7
Figure A-10. Forward line of own troops ........................................................................................ A-7
Figure A-11. Gap ........................................................................................................................... A-8
Figure A-12. Infiltration lane MICHAEL .......................................................................................... A-8
Figure A-13. Line of contact ........................................................................................................... A-8
Figure A-14. Linkup point 8 ............................................................................................................ A-9
Figure A-15. Named area of interest AUGUSTA ........................................................................... A-9
Figure A-16. Passage lane ............................................................................................................ A-9
Figure A-17. Forward and rearward passage of lines ................................................................. A-10
Figure A-18. Passage point ......................................................................................................... A-10
Figure A-19. Phase lines .............................................................................................................. A-11
Figure A-20. Position area for artillery ......................................................................................... A-11
Figure A-21. Rally point 14 .......................................................................................................... A-12
Figure A-22. Relief in place.......................................................................................................... A-12 |
3-90 | 9 | Contents
Figure A-23. Routes .....................................................................................................................A-13
Figure A-24. Target area of interest WHITETAIL .........................................................................A-13
Figure A-25. Common offensive control measures ......................................................................A-14
Figure A-26. Attack by fire position JAMES .................................................................................A-15
Figure A-27. Battle handover line DANIEL ...................................................................................A-16
Figure A-28. Point of departure 7 .................................................................................................A-17
Figure A-29. Support by fire position ............................................................................................A-18
Figure A-30. Example zone for 1-66 Armor .................................................................................A-19
Figure A-31. Five kinds of battle positions ...................................................................................A-20
Figure A-32. Combined arms battalion with company battle positions ........................................A-21
Figure A-33. Brigade assigned area with battalion battle positions .............................................A-22
Figure A-34. Task force engagement areas .................................................................................A-23
Figure A-35. Final protective fire ..................................................................................................A-23
Figure A-36. Final protective line ..................................................................................................A-24
Figure A-37. Forward edge of the battle area ..............................................................................A-24
Figure A-38. Example sector for 1-66 Armor ...............................................................................A-25
Figure A-39. Direct fire control measures ....................................................................................A-26
Figure A-40. Sectors of fire ..........................................................................................................A-27
Figure A-41. Target reference point 032 ......................................................................................A-27
Figure A-42. Trigger line ...............................................................................................................A-28
Figure A-43. Coordinated fire line ................................................................................................A-29
Figure A-44. Fire support coordination line ..................................................................................A-29
Figure A-45. Free fire area ...........................................................................................................A-30
Figure A-46. Blue kill box .............................................................................................................A-31
Figure A-47. Purple kill box ..........................................................................................................A-31
Figure A-48. No fire area ..............................................................................................................A-32
Figure A-49. Restrictive fire area ..................................................................................................A-32
Figure A-50. Restrictive fire line ...................................................................................................A-33
Figure A-51. Fire support targets .................................................................................................A-33
Figure A-52. Coordinating altitude and coordination level ...........................................................A-35
Figure B-1. Attack by fire task ........................................................................................................ B-1
Figure B-2. Block task .................................................................................................................... B-2
Figure B-3. Block obstacle effect.................................................................................................... B-2
Figure B-4. Breach task .................................................................................................................. B-3
Figure B-5. Bypass task ................................................................................................................. B-3
Figure B-6. Task force conducting a fix and a bypass ................................................................... B-4
Figure B-7. Canalize task ............................................................................................................... B-4
Figure B-8. Clear task .................................................................................................................... B-4
Figure B-9. Contain task ................................................................................................................. B-5
Figure B-10. Control task ............................................................................................................... B-5
Figure B-11. Destroy task ............................................................................................................... B-5 |
3-90 | 10 | Contents
Figure B-12. Disengage task ......................................................................................................... B-6
Figure B-13. Disrupt task ............................................................................................................... B-6
Figure B-14. Disrupt obstacle effect .............................................................................................. B-7
Figure B-15. Exfiltrate task ............................................................................................................. B-7
Figure B-16. Fix task ...................................................................................................................... B-8
Figure B-17. Fix obstacle effect ..................................................................................................... B-8
Figure B-18. Follow and assume task ........................................................................................... B-8
Figure B-19. Follow and support task ............................................................................................ B-9
Figure B-20. Interdict task .............................................................................................................. B-9
Figure B-21. Isolate task .............................................................................................................. B-10
Figure B-22. Neutralize task ........................................................................................................ B-10
Figure B-23. Occupy task ............................................................................................................ B-10
Figure B-24. Retain task .............................................................................................................. B-11
Figure B-25. Secure task ............................................................................................................. B-11
Figure B-26. Seize task ................................................................................................................ B-11
Figure B-27. Support by fire task ................................................................................................. B-12
Figure B-28. Suppress task ......................................................................................................... B-12
Figure B-29. Turn task ................................................................................................................. B-13
Figure B-30. Turn obstacle effect ................................................................................................ B-13
Figure C-1. Inner and outer arms of an encirclement .................................................................... C-2
Figure C-2. Example of encirclement control measures ................................................................ C-3
Figure C-3. Squeeze technique ..................................................................................................... C-5
Figure C-4. Hammer technique ..................................................................................................... C-6
Figure C-5. Wedge technique ........................................................................................................ C-7
Figure C-6. Encircled division perimeter defense .......................................................................... C-9
Figure C-7. Organization of forces for a breakout operation ....................................................... C-10
Figure C-8. Example breakout organization of forces by an encircled division ........................... C-13
Figure C-9. Example breakout by an encircled division .............................................................. C-14
Tables
Introductory table-1. Removed terms .............................................................................................. xv
Introductory table-2. Modified terms and definitions ........................................................................ xv
Introductory table-3. Modified proponent ....................................................................................... xviii
Introductory table-4. New terms ...................................................................................................... xix
Table 1-1. Considerations for limited-visibility operations ........................................................... 1-19
Table 1-2. Intelligence warfighting function tasks that support the commander .......................... 1-24
Table 2-1. Forms of maneuver and planning symbols ................................................................ 2-13
Table 3-1. Types of the offensive operations and planning symbols ............................................ 3-2
Table 3-2. Common offensive control measures ........................................................................... 3-4
Table 8-1. Defensive operations symbols ...................................................................................... 8-3 |
3-90 | 11 | Contents
Table 8-2. Retrograde task symbols .............................................................................................. 8-3
Table 11-1. Considerations for delay techniques ......................................................................... 11-4
Table 12-1. Typical reconnaissance and surveillance assets available ....................................... 12-7
Table 12-2. Dedicated reconnaissance units and forms of reconnaissance operations .............. 12-9
Table 13-1. Typical size of security forces for a given mission and echelon ............................... 13-5
Table 13-2. Screen movement methods .................................................................................... 13-16
Table 14-1. Route designations ................................................................................................... 14-9
Table 16-1. Brigade Combat Team passage lane requirements ................................................. 16-5
Table 17-1. Tactical obstacle effects ............................................................................................ 17-5
Table 18-1. Breaching tenets ....................................................................................................... 18-5
Table 18-2. Support, breach, and assault force responsibilities .................................................. 18-7
Table 18-3. Deliberate wet-gap crossing phases ....................................................................... 18-14
Table 19-1. Sample deception techniques ................................................................................... 19-6
Table 19-2. Forms of tactical deception and planning symbols ................................................... 19-9
Table B-1. Tactical mission tasks ................................................................................................... B-1 |
3-90 | 13 | Preface
FM 3-90 describes combat-tested tactics and techniques for offensive, defensive, and enabling operations.
For each type of operation FM 3-90 discusses the organization of forces; minimum essential control
measures; and general planning, preparation, and execution considerations.
To understand the doctrine contained in FM 3-90, readers must first understand the doctrinal topics described
in ADP 3-90 since FM 3-90 expands and builds on the topics established in ADP 3-90. FM 3-90’s
foundational chapters are chapters 1, 2, 3, and 8. Readers must comprehend the material within these chapters
to gain a full understanding of the remaining chapters within FM 3-90. Readers must also be familiar with
ADP 5-0 and FM 5-0 as it applies the intellectual framework that leaders use to plan, prepare, execute, and
assess military operations.
FM 3-90 is applicable to all members of the profession of arms. The principal audience are practitioners of
military tactics, students of the various professional development courses, and doctrine writers at the U.S.
Army’s Centers of Excellence. Trainers and educators throughout the Army will also use this publication.
The considerations for offensive, defensive, and enabling operations in this publication apply to all echelons,
even though numerous figures in this publication use divisions and brigade combat teams to illustrate points
in the text. Echelon-specific field manuals and Army techniques publications address the specifics of how
each tactical echelon uses these tactical concepts.
Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United
States, international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure
their Soldiers operate in accordance with the law of armed conflict and applicable rules of engagement. (See
FM 6-27/MCTP 11-10C for more information on the law of war.)
FM 3-90 uses joint terms where applicable. Selected joint and Army terms and definitions are in both the
glossary and the text. Terms for which FM 3-90 is the proponent publication (the authority) are marked with
an asterisk (*) in the glossary. When first defined in the text, terms for which FM 3-90 is the proponent
publication are boldfaced and italicized, and definitions are boldfaced. When first defining other proponent
definitions in the text, the term is italicized, and the number of the proponent publication follows the
definition. Following uses of the term are not italicized. The introduction for FM 3-90 indicates heavily
revised content within each chapter and appendix.
FM 3-90 applies to the Active Army, the Army National Guard/Army National Guard of the United States,
and the U.S. Army Reserve unless otherwise stated.
The United States Army Combined Arms Center is the proponent for this publication. The preparing agency
is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send written
comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank
Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATZL-MCD (FM 3-90),
300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by e-mail to
[email protected]; or submit an electronic DA Form 2028. |
3-90 | 15 | Introduction
Tactics are the employment, ordered arrangement, and directed actions of forces in relation to each other.
Leaders select tactics that accomplish their assigned mission. Successful tactics require generating and
applying combat power. This publication introduces the basic concepts and control measures associated with
the science of tactics and provides a common baseline for Soldiers and leaders to execute offensive,
defensive, and enabling operations. Soldiers and leaders who know these basic tactics are better prepared to
adapt them quickly based on the mission variables of mission, enemy, terrain and weather, troops and support
available—time available, civil considerations, and informational considerations [METT-TC(I)].
Tactics require judgement in application. The tactics discussed in this publication focus on the Army’s
strategic role of prevailing during large-scale combat operations. Their application must be tempered by the
obligation to protect the civilian population. The ability to seize and secure terrain, with its population and
productive capacity, distinguishes land forces conducting offensive, defensive, or enabling operations. FM
3-90 provides a common framework for leaders from squad through corps echelon to conduct tactical
operations in which leaders seek to find the enemy, fix the enemy, finish the enemy, and follow-through to
achieve their objectives. This manual is not prescriptive, but it is authoritative.
FM 3-90 (Tactics) merges the 2013 versions of FM 3-90-1 (Offense and Defense Volume 1) and FM 3-90-2
(Reconnaissance, Security, and Tactical Enabling Tasks Volume 2) into a single comprehensive volume on
offensive, defensive, and enabling operations. A highlight of changes includes:
* Created and became the proponent for the "tactical framework" - which is find, fix, finish, and
follow through. This framework is how all offensive and defensive operations are described.
* Changed actions on contact from a 5-step process to a new 4-step process – “react”, “develop the
situation”, “choose an action”, and “execute and report”.
* Removed defeat as a tactical mission task.
* Removed ambush as a tactical mission task, which was a mistake in the 2019 version of
ADP 3-90.
* Changed the form of maneuver of “frontal assault” back to “frontal attack.”
* Added mobility, countermobility, link-up, and tactical deception as types of enabling operations.
* Made feint and demonstration as variations of tactical deception, instead of variations of an attack.
* Described what are forms of contact and added influence as a form of contact.
* Removed forms of defense and made them variations of an area defense.
* Changed the variations of troop movement from administrative movement, approach march, and
tactical road march to tactical and nontactical movements.
* Removed encirclement as an enabling operation. It is still a desired outcome, and there is special
planning required to create, maintain, reduce, and when encircled, break out of an encirclement,
so that information was moved to an appendix.
* Removed the tactical mission tasks categories of "actions by friendly forces" and "effects on
enemy forces."
* Modified, removed, or added over 140 definitions to make it easier to read and understand.
* Added graphics for all offensive and defensive operations.
* Made numerous other changes to enhance readability and understanding.
FM 3-90 is divided into four parts, consisting of twenty chapters and three appendices. Part One (chapters 1-
2) focuses on the overall concept of tactics and maneuver. Part Two (chapters 3-7) focuses on offensive
operations. Part Three (chapters 8-11) focuses on defensive operations. Part Four (chapters 12-20) focuses
on enabling operations. Appendix A describes tactical control measures. Appendix B describes tactical
mission tasks. Appendix C describes encirclements. |
3-90 | 16 | Introduction
Chapter 1 (Army Tactics) introduces the role of Army tactics and discusses how the tactical taxonomy nests
within multidomain operations. It also discusses the types and general planning considerations for offensive,
defensive, and enabling operations. The major updates to this chapter include introducing the tactical
framework, updating taxonomy, a revision and expansion on the forms of contact, revision of assigned
areas, and revision of actions on contact.
Chapter 2 (Movement and Forms of Maneuver) introduces and describes movement formations,
movement techniques, and the five forms of maneuver. The major updates in this chapter include revising
the forms of maneuver definitions and identifying the forms of maneuver as applicable to offensive
and defensive operations.
Chapter 3 (The Offense) introduces and describes the fundamentals of offensive operations, common
offensive planning considerations, and transitions from offensive operations to defensive or stability
operations. There are no major updates to this chapter.
Chapter 4 (Movement to Contact) introduces and describes general considerations, organization of forces,
common control measures, conduct of the two variations of a movement to contact, and transitions. The
major update in this chapter is the expansion of the cordon and search section.
Chapter 5 (Attack) introduces and describes general considerations, organization of forces, common control
measures, and conduct of the four variations of an attack. The major update in this chapter is moving
demonstration and feint from the variations of an attack to chapter 19 (Tactical Deception).
Chapter 6 (Exploitation) introduces general considerations, organization of forces, common control
measures, and the conduct of an exploitation. The major update in this chapter removes local and major
exploitations.
Chapter 7 (Pursuit) introduces and describes general considerations, organization of forces for the two
variations of a pursuit, common control measures, and the conduct of a pursuit. There are no major updates
in this chapter.
Chapter 8 (The Defense) introduces and describes the fundamentals of the defense, common defensive
planning considerations, common defensive control measures, and transitions. The major update in this
chapter is the removal of the forms of the defense.
Chapter 9 (Area Defense) introduces and describes the general considerations, organization of forces,
common control measures, and the conduct of the three variations of an area defense. The major update in
this chapter is changing defense of a linear obstacle, perimeter defense, and reverse slope defense from
forms of the defense to variations of an area defense.
Chapter 10 (Mobile Defense) introduces and describes the general considerations, organization of forces,
common control measures, and the conduct of a mobile defense. No major updates in this chapter.
Chapter 11 (Retrograde) introduces and describes the general considerations and conduct of the three
variations of a retrograde. The major update in this chapter is changing the retrograde tasks to
variations of the retrograde.
Chapter 12 (Reconnaissance) introduces and describes the general reconnaissance considerations,
fundamentals, methods, and forms of reconnaissance. The major updates in this chapter are updating the
commander’s reconnaissance guidance, tasks within the forms of reconnaissance, and reconnaissance
fundamentals.
Chapter 13 (Security Operations) introduces and describes the general security considerations and conduct
of the types of security operations. The major updates in this chapter are added commander’s security
guidance, updated tasks within types of security operations, and updated security fundamentals.
Chapter 14 (Troop Movement) introduces and describes troop movement general considerations, types and
methods of troop movement, and conduct of troop movements. The major updates in the chapter are
modifying the troop movement definitions and taxonomy.
Chapter 15 (Relief in Place) introduces and describes the general considerations, organization of forces,
control measures, and the conduct of relief in place. There are no major updates in this chapter. |
3-90 | 17 | Introduction
Chapter 16 (Passage of Lines) introduces and describes the general considerations, organization of forces,
control measures, and the conduct of the variations of a passage of lines No major updates in this chapter.
Chapter 17 (Countermobility) introduces and describes the general considerations for countermobility,
terrain reinforcement, obstacle intent, obstacle employment principles, and obstacle emplacement. This is a
new chapter and makes countermobility an enabling operation.
Chapter 18 (Mobility) introduces and describes the general considerations of and the types of mobility tasks.
This is a new chapter and makes mobility an enabling operation.
Chapter 19 (Tactical Deception) introduces and describes tactical deception principles, types, means, and
variations. This is a new chapter and makes tactical deception an enabling operation and moves feint
and demonstration from an offensive operation to a variation of tactical deception.
Chapter 20 (Linkup) introduces and describes the general considerations and conduct of link up operations.
This is a new chapter and makes linkup an enabling operation.
Appendix A (Tactical Control Measures) introduces and describes the general considerations for common
control measures. The major updates to this appendix include organizing control measures by
movement and maneuver control measures, fire support coordination measures, and airspace
coordinating measures.
Appendix B (Tactical Mission Tasks) introduces, describes, and provides graphical depictions of the
tactical mission tasks. The major updates in this appendix are removing ambush and defeat as tactical
mission tasks, alphabetizing the tactical missions, and removing actions by friendly forces and effects
on enemy forces.
Appendix C (Encirclements) introduces and describes encirclements and describes types of encirclement.
The major update to this appendix is modifying the executing an encirclement discussion to include
two methods.
This publication is the proponent for select terms. See introductory table-1 for removed terms. See
introductory table-2 for terms with modified definitions. See introductory table-3 on page xviii for terms with
a new proponent. See introductory table-4 on page xix for new terms.
Introductory table-1. Removed terms
Term Remarks
administrative movement No longer used as a defined Army term.
air movements No longer used as an Army term. Adopts joint term.
contiguous area of operations No longer used as a defined Army term.
covering force No longer used as a defined Army term.
covering force area No longer used as a defined Army term.
decisive engagement No longer used as a defined Army term.
defeat (tactical mission task) No longer used as a defined Army term.
encirclement operations No longer used as a defined Army term.
fire strike No longer used as a defined Army term.
flank attack No longer used as a defined Army term.
noncontiguous area of operations No longer used as a defined Army term.
Introductory table-2. Modified terms and definitions
Term Remarks
actions on contact FM 3-90 modifies definition and becomes proponent.
alternate position FM 3-90 modifies definition and becomes proponent
ambush FM 3-90 modifies definition.
approach march FM 3-90 modifies definition and becomes proponent. |
3-90 | 18 | Introduction
Introductory table-2. Modified terms and definitions (continued)
area reconnaissance FM 3-90 modifies definition and becomes proponent.
area security FM 3-90 modifies definition and becomes proponent.
attack FM 3-90 modifies definition and becomes proponent.
attack by fire FM 3-90 modifies definition.
block (tactical mission task) FM 3-90 modifies definition.
bounding overwatch FM 3-90 modifies definition.
box formation FM 3-90 modifies definition.
breach FM 3-90 modifies definition.
breakthrough FM 3-90 modifies definition.
bypass FM 3-90 modifies definition.
canalize FM 3-90 modifies definition.
clear FM 3-90 modifies definition.
column formation FM 3-90 modifies definition.
contain FM 3-90 modifies definition.
consolidate FM 3-90 modifies term from consolidation to consolidate and
updates the definition.
control FM 3-90 modifies definition.
cordon and search FM 3-90 modifies definition.
counterattack FM 3-90 modifies definition and becomes proponent.
counterreconnaissance FM 3-90 modifies definition.
decisively engaged FM 3-90 modifies term from decisive engagement to decisively
engaged and becomes proponent.
delay line FM 3-90 modifies definition.
denial operations FM 3-90 modifies definition.
destroy FM 3-90 modifies definition.
detachment left in contact FM 3-90 modifies definition.
direct pressure force FM 3-90 modifies definition.
disengage FM 3-90 modifies definition.
dismounted movement FM 3-90 modifies term from dismounted march to dismounted
movement
disrupt (tactical mission task) FM 3-90 modifies definition.
double envelopment FM 3-90 modifies definition.
echelon formation FM 3-90 modifies definition.
encirclement FM 3-90 modifies term from encirclement operations to
encirclement and becomes proponent.
encircling force FM 3-90 modifies definition.
engagement area FM 3-90 modifies definition and becomes proponent.
engagement priority FM 3-90 modifies definition.
envelopment FM 3-90 modifies definition.
exfiltrate FM 3-90 modifies definition.
exploitation FM 3-90 modifies definition and becomes proponent.
fire superiority FM 3-90 modifies definition.
fix (tactical mission task) FM 3-90 modifies definition.
follow and assume FM 3-90 modifies definition. |
3-90 | 19 | Introduction
Introductory table-2. Modified terms and definitions (continued)
Term Remarks
follow and support FM 3-90 modifies definition.
forward boundary FM 3-90 modifies definition.
gap FM 3-90 modifies definition and becomes proponent.
infiltration FM 3-90 modifies definition.
interdict FM 3-90 modifies definition.
isolate (tactical mission task) FM 3-90 modifies definition.
kill zone FM 3-90 modifies definition.
lateral boundary FM 3-90 modifies definition.
line formation FM 3-90 modifies definition.
linkup FM 3-90 modifies definition and becomes proponent.
linkup point FM 3-90 modifies definition.
main battle area FM 3-90 modifies definition and becomes proponent.
march column FM 3-90 modifies definition.
march serial FM 3-90 modifies definition.
march unit FM 3-90 modifies definition.
meeting engagement FM 3-90 modifies definition and becomes proponent.
mixing FM 3-90 modifies definition.
mounted movement FM 3-90 modifies term from mounted march to mounted
movement
movement to contact FM 3-90 modifies definition and becomes proponent.
neutralize FM 3-90 modifies definition.
observation post FM 3-90 modifies definition.
obstacle control measures FM 3-90 modifies definition.
obstacle group FM 3-90 modifies term by making term singular
occupy FM 3-90 modifies definition.
passage lane FM 3-90 modifies definition.
passage point FM 3-90 modifies definition.
penetration FM 3-90 modifies definition.
position area for artillery FM 3-90 modifies definition.
primary position FM 3-90 modifies definition and becomes proponent.
pursuit FM 3-90 modifies definition and becomes proponent.
quartering party FM 3-90 modifies definition.
rear boundary FM 3-90 modifies definition.
reconnaissance by fire FM 3-90 modifies definition.
reconnaissance in force FM 3-90 modifies definition and becomes proponent.
reconnaissance objective FM 3-90 modifies definition and becomes proponent.
reconnaissance-pull FM 3-90 modifies definition.
reconnaissance-push FM 3-90 modifies definition.
reduce (tactical mission task) FM 3-90 modifies definition.
redundancy FM 3-90 modifies definition.
release point FM 3-90 modifies definition. |
3-90 | 20 | Introduction
Introductory table-2. Modified terms and definitions (continued)
Term Remarks
follow and support FM 3-90 modifies definition.
forward boundary FM 3-90 modifies definition.
retain FM 3-90 modifies definition.
retrograde movement FM 3-90 modifies definition.
route FM 3-90 modifies definition.
route reconnaissance FM 3-90 modifies definition and becomes proponent.
search and attack FM 3-90 modifies definition.
sector of fire FM 3-90 modifies definition.
secure FM 3-90 modifies definition.
seize FM 3-90 modifies definition.
single envelopment FM 3-90 modifies definition.
spoiling attack FM 3-90 modifies definition.
start point FM 3-90 modifies definition.
stay-behind operation FM 3-90 modifies definition.
supplementary position FM 3-90 modifies definition and becomes proponent.
support by fire FM 3-90 modifies definition.
suppress FM 3-90 modifies definition.
tactical deception FM 3-90 modifies definition and becomes proponent.
tactical mission task FM 3-90 modifies definition.
tactical road march FM 3-90 modifies definition and becomes proponent.
terrain management FM 3-90 modifies definition and becomes proponent.
trail party FM 3-90 modifies definition.
traveling overwatch FM 3-90 modifies definition.
trigger line FM 3-90 modifies definition and becomes proponent.
troop movement FM 3-90 modifies definition and becomes proponent.
turn (tactical mission task) FM 3-90 modifies definition.
turning movement FM 3-90 modifies definition.
zone reconnaissance FM 3-90 modifies definition and becomes proponent.
Introductory table-3. Modified proponent
Term Remarks
bypass criteria FM 3-90 becomes proponent.
checkpoint FM 3-90 becomes proponent.
final protective line FM 3-90 becomes proponent.
rally point FM 3-90 becomes proponent.
subsequent position FM 3-90 becomes proponent.
traveling FM 3-90 becomes proponent.
trigger line FM 3-90 becomes proponent. |
3-90 | 21 | Introduction
Introductory table-4. New terms
Term Remarks
assault Adds new Army term.
battle handover Adds new term.
consolidate Adds new term.
coordination point Adds new term
demonstration Adds new Army term.
diamond formation Adds new term.
disengagement criteria Adds new term.
enabling operation Adds new term.
feint Adds new Army term.
forced march Adds new term.
forward line of own troops Adds new term.
light line Adds new term.
nontactical movement Adds new term.
quick reaction force Adds new term.
raid Adds new Army term.
security objective Adds new term.
tactical movement Adds new term.
vee formation Adds new term.
vertical envelopment Adds new term.
wedge formation Adds new term. |
3-90 | 23 | PART ONE
Tactics Overview
Part One introduces tactics and forms of maneuver. Chapter 1 describes the role of
tactics, operational and mission variables, and the general considerations for tactics.
Chapter 2 covers the movement formations, techniques, and the forms of maneuver.
Chapter 1
Army Tactics
This chapter introduces the role of Army tactics and discusses how the tactics
taxonomy nests within multidomain operations. This chapter discusses the operational
environment, the role of tactics, and general tactical considerations by warfighting
function that apply to offensive, defensive, and enabling operations.
INTRODUCTION TO TACTICS
1-1. Tactics are the employment, ordered arrangement and directed actions of forces in relation to each
other (ADP 3-90). Units employ tactics during the conduct of operations. An operation is a sequence of
tactical actions with a common purpose or unifying theme (JP 1, Vol 1). Tacticians use the art and science of
tactics to maneuver and position formations. Maneuver is movement in conjunction with fires (ADP 3-90).
The purpose of maneuver is to gain and exploit positions of relative advantage to accomplish the mission.
(See ADP 3-90 for more information on the art and science of tactics.)
1-2. Successful tactical operations are the result of integrating and synchronizing the warfighting functions
in time, space, and purpose. The starting point for planning, preparing, and executing tactical operations is
understanding the operational environment.
THE OPERATIONAL ENVIRONMENT
1-3. Army forces conduct offensive, defensive, and enabling operations within operational environments
spanning the globe. An operational environment is the aggregate of the conditions, circumstances, and
influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0).
For Army forces, an operational environment consists of five domains (land, air, maritime, space, and
cyberspace) understood through three dimensions (physical, human, and information).
1-4. The purpose of understanding an operational environment is to aid in accounting for the totality of
factors and conditions that impact the conduct of operations. This understanding enables leaders to better
identify problems; anticipate potential outcomes; and understand the results of various friendly, enemy,
adversary, and neutral actions and the effects these actions have on achieving the military end state. A
description of an operational environment includes all the factors that the commander and staff need to
capture and understand to inform the conduct of operations. (See FM 3-0 for more information on operational
environments.) |
3-90 | 24 | Chapter 1
OPERATIONAL VARIABLES
1-5. Army planners use the operational variables to describe an operational environment. Operational
variables are a comprehensive set of information categories used to describe an operational environment
(ADP 1-01). They are the aspects of an operational environment that affect operations, and they differ from
one assigned area to another. The eight operational variables are: political, military, economic, social,
information, infrastructure, physical environment, and time (also known as PMESII-PT).
1-6. When commanders and staff analyze their specific operational environment, they also discern what
parts or aspects of each domain and the relevant information aspects and considerations to their operation.
They continue to refine and update their analysis even after receiving a mission and throughout the course of
the ensuing operation. (See FM 5-0 for more information on the operational variables.)
MISSION VARIABLES
1-7. The mission variables are categories of specific information needed to conduct operations (ADP 1-
01). The purpose of mission variables is to provide a set of informational categories focused on what leaders
need to know to achieve situational understanding once assigned a mission. This ensures Army leaders
understand the context in which they perform their missions and if necessary, take actions to modify their
chosen tactic. The seven mission variables are mission, enemy, terrain and weather, troops and support
available—time available, civil considerations, and informational considerations [METT-TC(I)].
1-8. METT-TC (I) represents the mission variables leaders use to analyze and understand a situation in
relationship to the unit’s mission. The first six variables are not new. However, the pervasiveness of
information and its applicability in different military contexts requires leaders to continuously assess its
various aspects during operations. Due to this, “I” has been added to the METT-TC mnemonic. Information
considerations are expressed as a parenthetical variable because it is not an independent consideration, but
an important component of each variable of METT-TC that leaders must understand when developing
understanding of a situation. (See FM 5-0 for additional information on the mission variables.)
ROLE OF TACTICS
1-9. Tactical actions always link to operational or strategic objectives; they are never employed in isolation.
Tactics serve a distinct purpose and are nested within a larger military campaign. Military operations are
inherently joint and frequently multinational in nature. Understanding how tactics fit into the larger picture
is the starting point to planning, preparing, executing, and assessing successful tactical operations.
JOINT OPERATIONS
1-10. The joint force conducts joint operations through unified action. Unified action is the synchronization,
coordination, and/or integration of the activities of governmental and nongovernmental entities with military
operations to achieve unity of effort (JP 1, Vol 1). The Army accomplishes its mission by supporting the joint
force and unified action partners in four strategic roles:
* Shape operational environments.
* Counter aggression on land during crisis.
* Prevail in large-scale ground combat.
* Consolidate gains.
1-11. These strategic roles are not tasks assigned to subordinate units. The U.S. Army’s primary mission
supports the joint force by organizing, training, and equipping its forces to conduct prompt and sustained
land combat to defeat enemy ground forces and seize, occupy, and defend land areas.
MULTIDOMAIN OPERATIONS
1-12. The Army’s contribution to joint operations is multidomain operations. Multidomain operations are
the combined arms employment of joint and Army capabilities to create and exploit relative advantages that
achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force commanders (FM 3-
0). Multidomain operations are how Army forces operate as part of the joint force against threats able to |
3-90 | 25 | Army Tactics
contest the joint force in all domains. Army forces simultaneously support and are supported by the joint
force across all domains. This interdependent relationship between the Army and the rest of the joint force
allows joint force commanders to impose multiple dilemmas on the enemy. This interdependence is also why
all Army operations are multidomain operations.
1-13. At the tactical level of warfare, Army formations provide unique capabilities to the joint force. These
capabilities include but are not limited to ground maneuver forces able to seize and hold terrain, surface based
indirect fires, air and missile defense, and sustainment. Army tactical formations also use joint force
capabilities including fixed- and rotary-wing aviation, unmanned aircraft systems (UAS), satellite
communications, and the global positioning system during offensive, defensive, and stability operations.
1-14. All Army operations are multidomain operations. This is because every operation requires integrating
capabilities from all domains to succeed. For example, at the lower tactical levels companies and platoons
employ capabilities from other domains such as aviation (including UAS), joint fires, satellite
communications, and the global positioning system. As part of the joint force, Army forces execute
multidomain operations throughout the competition, crisis, and conflict contexts. Army tactical formations
typically conduct operations dominated by one context at a time. (See FM 3-0 for more information on Army
operations during competition and crisis).
1-15. During combat operations tactical-level Army forces execute offensive, defensive, and stability
operations supported by enabling operations to achieve tactical objectives that support operational and
strategic objectives. While a division possesses the capability and capacity to conduct simultaneous
offensive, defensive, and stability operations, brigade combat teams (BCTs) and below are typically only
capable of executing a single type of operation at a given time.
1-16. FM 3-90 focuses on the tactics associated with large-scale combat operations at the tactical level with
particular emphasis on offensive, defensive, and enabling operations. (See ADP 3-07 for more information
on stability operations and ADP 3-28 for more information on defense support to civil authorities).
OFFENSIVE, DEFENSIVE, STABILITY, AND ENABLING OPERATIONS
1-17. An offensive operation is an operation to defeat or destroy enemy forces and gain control of terrain,
resources, and population centers (ADP 3-0). A defensive operation is an operation to defeat an enemy attack,
gain time, economize forces, and develop conditions favorable for offensive or stability operations (ADP 3-
0). A stability operation is an operation conducted outside the United States in coordination with other
instruments of national power to establish or maintain a secure environment and provide essential
governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP 3-0). Every
type of operation has a mission that consists of a task and purpose.
1-18. An enabling operation is an operation that sets the friendly conditions required for mission
accomplishment. By themselves, enabling operations do not directly accomplish the commander’s end state
and are not decisive on their own, but are required to conduct successful offensive, defensive, and stability
operations. Enabling operations can also be described or listed as key tasks during the execution of a mission.
1-19. Offensive, defensive, and enabling operations arrange friendly forces by purpose. Purpose describes
friendly force goals with respect to the enemy force’s ability to achieve its objectives. Objective is a location
used to orient operations, phase operations, facilitate changes of direction, and provide for unity of effort
(ADP 3-90). Based on the purpose assigned, the commander selects a type of offensive or defensive operation
and any enabling operations required. The types of operations have subsets called variations. The variations
share similar ways of organizing forces as the parent operation, with differing conditions and outcomes. The
taxonomy provides, if needed, additional categories of methods and forms. Figure 1-1 illustrates the Army’s
tactical taxonomy. |
3-90 | 26 | Chapter 1
Figure 1-1. Army tactical taxonomy
Offensive Operations
1-20. Chapter 3 discusses general considerations for offensive operations. The four types of offensive
operations are—
* Movement to contact. (See Chapter 4).
* Attack. (See Chapter 5).
* Exploitation. (See Chapter 6).
* Pursuit. (See Chapter 7).
Defensive Operations
1-21. Chapter 8 discusses general considerations for defensive operations. The three types of defensive
operations are—
* Area defense. (See Chapter 9).
* Mobile defense. (See Chapter 10).
* Retrograde. (See Chapter 11).
Enabling Operations
1-22. Chapters 12-20 discuss enabling operations. The nine types of enabling operations are—
* Reconnaissance. (See Chapter 12).
* Security operations. (See Chapter 13). |
3-90 | 27 | Army Tactics
* Troop movement. (See Chapter 14).
* Relief in place. (See Chapter 15).
* Passage of lines. (See Chapter 16).
* Countermobility. (See Chapter 17).
* Mobility. (See Chapter 18).
* Tactical deception. (See Chapter 19).
* Linkup. (See Chapter 20).
GENERAL CONSIDERATIONS FOR TACTICS
1-23. The tasks assigned to subordinates are as much an aspect of tactics as employment and arrangement.
Commanders and units use tactics as the basis for their concept of operations, which is derived from
understanding the mission variables and operational environment. The three subcomponents of tactics are—
* Employment: the synchronization of warfighting functions. The characteristics of the offense and
the defense assist in framing the synchronization of warfighting functions.
* Arrangement: formations in relation to friendly forces, enemy forces, and the terrain. The type
of operations and forms of maneuver provide a baseline for these arrangements.
* Directed actions: the task and purpose directed by a commander to achieve objectives. The
tactical mission tasks generally are used to direct the actions of subordinate forces.
1-24. A warfighting function is a group of tasks and systems united by a common purpose that commanders
use to accomplish missions and training objectives (ADP 3-0). Synchronizing the six warfighting functions
through prior planning and preparation increases a unit’s effectiveness when executing operations. The six
warfighting functions are—
* Command and control.
* Movement and maneuver.
* Intelligence.
* Fires.
* Sustainment.
* Protection.
See ADP 3-0 for detailed discussion on warfighting functions.
1-25. Each warfighting functions contributes to generating and applying combat power during operations.
Combat power is the total means of destructive and/or disruptive force that a military unit/formation can
apply against the opponent at a given time (JP 3-0). Synchronizing operations produces complementary and
reinforcing effects that result in a powerful blow that overwhelms enemy forces and creates friendly
momentum. Army forces deliver that blow through a combination of five dynamics. The dynamics of combat
power are—
* Leadership.
* Firepower.
* Information.
* Mobility.
* Survivability.
See FM 3-0 for more information on each dynamic of combat power.
1-26. Tactics don’t happen in isolation, and they are influenced by a large variety of considerations. The
remainder of this chapter discusses general tactical considerations broken down by warfighting function and
are applicable to all types of operations. These considerations are in addition to those offensive and defensive
specific considerations discussed separately in Chapter 3 and Chapter 8.
COMMAND AND CONTROL WARFIGHTING FUNCTION
1-27. The command and control warfighting function is the related tasks and a system that enable
commanders to synchronize and converge all elements of power (ADP 3-0). The primary purpose of the |
3-90 | 28 | Chapter 1
command and control warfighting function is to assist commanders in integrating the other warfighting
functions effectively at each echelon and to apply combat power to achieve objectives and accomplish
missions. The command and control warfighting function consists of the command and control warfighting
function tasks and the command and control system. (See ADP 3-0 for a detailed description of the command
and control warfighting function.)
1-28. Commanders, assisted by their staffs, integrate numerous processes and activities within the
headquarters and across the force as they exercise command and control. The commander’s mission and
intent determine the scheme of maneuver and the allocation of available resources. Commanders issue intent
linking the purpose of an operation with the conditions that define the desired end state.
1-29. Units must prepare to execute operations with degraded or minimal communications. Throughout the
operations process, units may operate within range of enemy jamming capabilities. Situations will likely arise
requiring units to reduce their electromagnetic signature. These situations may require units to employ
emission control procedures to reduce the effectiveness of enemy targeting efforts. Operations during these
periods require clearly understood and rehearsed standard operating procedures at all echelons. Successful
operations during these periods requires that units have clearly developed emission control plans and exercise
electromagnetic protection tasks focused on transmitting only mission essential information. (See FM 3-12
for more information on emission control procedures.)
Hasty and Deliberate Operations
1-30. Most military operations lie somewhere along a continuum between a hasty operation and a deliberate
operation. A hasty operation is an operation in which a commander directs immediately available forces,
using fragmentary orders, to perform tasks with minimal preparation, trading planning and preparation time
for speed of execution (ADP 3-90). A deliberate operation is an operation in which the tactical situation
allows the development and coordination of detailed plans, including multiple branches and sequels (ADP 3-
90).
1-31. Generally, hasty operations take advantage of fleeting tactical opportunities that provide their
formations a position of advantage over the enemy. In doing so commanders accept the risk of reduced
planning, preparation, and coordination. Some situations may require commanders to take more time to plan
and prepare their formations to ensure detailed integration and synchronization of the combined arms team.
Any type of operation can be characterized as hasty or deliberate. (See ADP 3-90 for more information on
hasty and deliberate operations.)
Tactical Framework
1-32. The tactical framework provides leaders with a framework to help visualize operations and to organize
their force. The framework is applicable to all types of offensive and defensive operations. Figure 1-2 is a
graphical depiction of the tactical framework. Inherent to the tactical framework is the concept of combined
arms. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater
than if each element was used separately or sequentially (ADP 3-0). FM 3-90 uses it to expand the discussion
for each type of offensive and defensive operation. The tactical framework consists of—
* Find the enemy. Intel drives fires and maneuver.
* Fix the enemy. Prevent repositioning or reinforcement making them easier to destroy.
* Finish the enemy. Mass available combat power to accomplish the mission.
* Follow through. Defeat in detail, consolidate, reorganize, and transition. |
3-90 | 29 | Army Tactics
Figure 1-2. Tactical framework
Find the Enemy
1-33. Units find the enemy through aggressive information collection activities that provide commanders
with timely, detailed, and accurate intelligence. Once a unit gains contact with the enemy they fight to
maintain contact unless directed otherwise by their higher headquarters. Information collection activities
contribute to improving situational understanding regarding the enemy and terrain. Units use as many
capabilities as possible when performing information collection. Finding every enemy formation is likely
impractical within the time and assets available. Therefore, information collection focuses on reducing those
uncertainties within the assigned area that directly impact mission accomplishment.
1-34. Units use human and technical means to confirm suspected locations of enemy formations and
capabilities. When successful, information collection enables commanders to use combined arms actions to
fix and destroy enemy formations and shape the battlefield. If information collection efforts are unsuccessful,
friendly forces conduct a movement to contact to find the enemy. Once the location of the enemy is known,
friendly forces conduct actions on contact and maintain contact with the enemy.
Fix the Enemy
1-35. Fixing the enemy limits their maneuver options and prevents them from repositioning, reinforcing, or
reorganizing. Fixing the enemy requires using combined arms and allows friendly forces to mass combat
power against a relatively static enemy. Units seek to fix enemy forces with the minimum amount of combat
power since fixing an enemy is typically a supporting effort.
1-36. Units at all echelons use all capabilities at their disposal to gain and maintain contact with the enemy
and use combined arms to fix the enemy. Units can also isolate the enemy by severing lines of
communications to fix enemy forces and prevent reinforcement. Nearly every type of offensive or defensive |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.