fm3 20
fm3 20
fm3 20
96
Field Manual HEADQUARTERS
No 3-20.96 DEPARTMENT OF THE ARMY
Washington, DC, 23 December 2002
CONTENTS
PREFACE .................................................................................................................. iv
Chapter 1 INTRODUCTION ......................................................................................................1-1
Cavalry Squadron (RSTA) Organization ..................................................................1-3
Cavalry Squadron (RSTA) Missions.........................................................................1-6
Stryker Brigade Combat Team Overview.................................................................1-8
Operational Environment........................................................................................1-10
Battlefield Operating Systems ................................................................................1-20
Chapter 2 BATTLE COMMAND ...............................................................................................2-1
The Art of Command ................................................................................................2-1
The Command and Control System .........................................................................2-7
Communications.....................................................................................................2-31
Computers ..............................................................................................................2-40
Chapter 3 RECONNAISSANCE AND SURVEILLANCE OPERATIONS ................................3-1
Fundamentals...........................................................................................................3-3
Reconnaissance Planning ......................................................................................3-14
Forms of Reconnaissance......................................................................................3-20
Surveillance Operations .........................................................................................3-38
Surveillance Planning .............................................................................................3-40
Reconnaissance Handover ....................................................................................3-42
DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only
to protect technical or operational information that is for official government use. This determination was made on
12 June 2001. Other requests for this document will be referred to Commander, US Army Armor Center, ATTN:
ATZK-TDD-C, Fort Knox, Kentucky 40121-5000.
DESTRUCTION NOTICE: Destroy by any method that will protect disclosure of contents or reconstruction of the
document.
i
FM 3-20.96________________________________________________________________________________
ii
___________________________________________________________________Cavalry Squadron (RSTA)
iii
FM 3-20.96________________________________________________________________________________
Preface
This manual provides doctrine for the employment of the Cavalry Squadron (Reconnaissance,
Surveillance, and Target Acquisition [RSTA]).
FM 3-20.96 describes the tactical employment and operations of the RSTA Squadron. It
describes RSTA operations in support of the Stryker Brigade Combat Team (SBCT).
FM 3-20.96 is the doctrinal foundation that governs the development of equipment, training,
and structure of the squadron and its subordinate troops.
This manual covers basic doctrine in tactics, techniques of employment, organization,
exercise on command, control, movements, and tactical operations appropriate to the
squadron and its recce troops, surveillance troop, HHT, reconnaissance platoon, sensor
platoon, UAV platoon, and NBC platoon organic to the SBCT.
The procedures described herein are intended as a guide only and are not to be considered
inflexible. Each situation in war and military operations other than war must be resolved by
intelligent interpretation and application of the doctrine set forth herein.
This manual is designed for use with FM 3-21.31 (SBCT). The publication reflects and
supports the Army operations doctrine as stated in FM 3-0. Readers should be familiar with
FM 3-90.3 [FM 71-3], FM 3-20.97 [FM 17-97], FM 3-90 [FM 100-40], FM 3-91
[FM 71-100], FM 3-55 [FM 100-55], FM 1-02 [FM 101-5-1], and FM 3-20.98 [FM 17-98].
Examples and graphics are provided to illustrate principles and concepts, not to serve as
prescriptive responses to tactical situations. This publication provides units with the doctrinal
foundation to train leaders, guide tactical planning, and develop standing operating procedures
(SOP).
US Army Armor Center is the proponent for this publication. Submit comments and
recommended changes and the rational for those changes on DA Form 2028 (Recommended
Changes to Publications and Blank Forms) to: Commander, US Army Armor Center, ATTN:
ATZK-TDD-C, Fort Knox, KY 40121-5000, or e-mail comments to
Doctrine@knox.army.mil, attention to Chief, Cavalry Branch.
Unless otherwise stated, masculine nouns and pronouns do not refer exclusively to men.
iv
Chapter 1
Introduction
The cavalry squadron,
reconnaissance, CONTENTS
surveillance, and Cavalry Squadron (RSTA) Organization ........... 1-3
target acquisition Headquarters and Headquarters Troop ........ 1-3
Recce Troops .................................................. 1-5
(RSTA) of the Stryker
Surveillance Troop.......................................... 1-6
brigade combat team Cavalry Squadron (RSTA) Missions.................. 1-6
(SBCT) is carefully Capabilities...................................................... 1-7
designed to provide Limitations/Risks ............................................ 1-8
accurate and timely Stryker Brigade Combat Team Overview.......... 1-8
SBCT Capabilities and Organization ............. 1-8
information over a SBCT Operations ............................................ 1-10
large and complex Operational Environment................................... 1-10
operational Characteristics of the Operational
environment. This Environment................................................. 1-10
Battlefield Environments ................................ 1-14
environment is
Re-Examining the Contact Paradigm ............ 1-15
characterized by a Reconnaissance Purpose .............................. 1-19
new threat armed Battlefield Operating Systems........................... 1-20
with equipment from Intelligence ...................................................... 1-21
advances in global Maneuver ......................................................... 1-21
Fire Support..................................................... 1-21
weapons proliferation Air Defense ...................................................... 1-22
and unconventional Mobility and Survivability ............................... 1-22
terrorist/guerilla Combat Service Support ................................ 1-22
operating tactics. Command and Control ................................... 1-22
These asymmetrical
tactics are in use by regular and irregular forces, special forces,
terrorists, political factions, supporting government factions,
nongovernmental agencies, transnational organizations, organized
criminal groups, and even refugee populations. The geographical
area in which these threats choose to operate is characterized by
varying terrain, ranging from complex urban sprawl to areas with
weak infrastructure supported by inferior roads, bridges, and
transportation networks.
1-1
FM 3-20.96 ____________________________________________________________________________
One key concept that enables the squadron to provide accurate and
timely information to the brigade is situational awareness (SA).
Situational awareness is seeing the battlefield: the impact of terrain,
the friendly situation, and the threat situation. The squadron
develops SA and its own SU to enhance its ability to conduct
successful ISR operations.
1-2
________________________________________________________________ Chapter 1 – Introduction
1-3
FM 3-20.96 ____________________________________________________________________________
1-4
________________________________________________________________ Chapter 1 – Introduction
1-5
FM 3-20.96 ____________________________________________________________________________
RECCE TROOPS
1-4. Each of the three recce troops includes a troop headquarters,
three recce platoons, and a mortar section (see Figures 1-3, 1-4, and
1-5). The three recce platoons are organized with four reconnaissance
vehicles with crews and a scout section (equipped with Javelins) for
dismounted reconnaissance. The mortar section consists of two 120-
mm self-propelled mortars and a fire direction center (FDC).
1-6
________________________________________________________________ Chapter 1 – Introduction
SURVEILLANCE TROOP
1-5. The surveillance troop provides the squadron commander a
mix of specialized capabilities built around airborne and ground
mobile sensors (see Appendix G). The UAV platoon launches, flies,
recovers, and maintains the squadron’s four aerial reconnaissance
platforms. The ground sensor platoon consists of ground-based radio
signals intercept and direction-finding teams capable of conducting
nodal and pattern analysis of area communications activities. The
ground sensor platoon provides remotely emplaced acoustics
monitoring capabilities that capture sophisticated threat personnel
and equipment measurements and signatures. The platoon also has
a dedicated communications terminal that transmits, reports, and
receives voice, data, digital, and imagery from sources through
national level.
1-6. The NBC recce platoon provides a special reconnaissance
capability and performs five critical tasks on the battlespace—detect,
identify, mark, report, and sample. It conducts route, zone, and area
NBC reconnaissance to determine the presence and extent of NBC
contamination. It can locate and identify life-threatening chemical
warfare agents and radiological contaminants. It does not have a
biological detection/identification capability, but can take samples of
suspected biological hazards for transfer to a Theater Army Medical
Laboratory (TAML) for further analysis. The platoon has three M93A1
NBCRS vehicles (FOX) equipped with the M21 Remote Sensing
Chemical Agent Alarm (RSCAAL), capable of detecting nerve (GA, GB,
and GD) and blister (H and L) agent vapors at a line of sight distance
up to 5 kilometers.
1-7
FM 3-20.96 ____________________________________________________________________________
Screen.
Area security.
1-8. The squadron is optimized to conduct ISR on the full range of
threats throughout the brigade’s AO. This means that the squadron’s
orientation is on the AO and the wide variety of threats that will face
the brigade. By leveraging information technology and air-ground
scout capabilities in complex and urban terrain, the squadron can
develop the situation by focusing on designated AOs and
multidimensional and asymmetrical threats. This empowers the
brigade commander to achieve battlefield mobility and agility while
choosing the time and place to confront the threat and the preferred
method of engagement. The squadron commander has a myriad of
tools to assist him in conducting ISR missions within MTW as well as
the more complex environment found in SSC. He task organizes his
assets to optimize the complementary effects of his ISR assets while
effectively covering the brigade’s AO.
CAPABILITIES
1-9. The squadron is organized to provide the following
capabilities:
• Provide all-weather, continuous, accurate, and timely ISR
in complex, close, and urban terrain.
• Engage in close reconnaissance with threat forces by
maximizing the teaming of HUMINT (ground scouts and CI
soldiers); and UAV, NBC reconnaissance, and ground
surveillance radar (GSR)/PROPHET assets.
• Gather information about multidimensional threats that
range from conventional to unconventional, and use
asymmetrical tactics to include—
Regular and irregular forces.
Special forces.
Terrorists.
Political factions.
Supporting government factions.
Criminal elements and nongovernmental agencies.
• Support targeting, using ground reconnaissance and UAV
assets.
• Rapidly develop the situation in depth.
• Rapidly deploy.
• Conduct stealthy ISR operations.
• Reduce risk to the brigade by assuring survivability
through information to avoid contact or achieve force
overmatch if contact is necessary.
• Assist in shaping the battlespace environment by
providing information or directing precision joint fires to
disrupt the threat commander’s decision cycle and deny
him planned or future options.
1-8
________________________________________________________________ Chapter 1 – Introduction
1-9
FM 3-20.96 ____________________________________________________________________________
1-10
________________________________________________________________ Chapter 1 – Introduction
1-11
FM 3-20.96 ____________________________________________________________________________
SBCT OPERATIONS
1-15. The SBCT is a divisional brigade. The major fighting
components are its motorized infantry battalions. The squadron’s
primary role for the SBCT is to enhance situational understanding to
enable the SBCT to conduct decisive action in its AO.
1-16. The SBCT is specifically designed for employment as an early
entry combat force. Encompassing personnel strength of
approximately 3,900 configured in ready-to-fight combined arms
packages, the entire SBCT can deploy within 96 hours of alert
notification to “first aircraft wheels up” and begin operations
immediately upon arrival at the aerial port of debarkation (APOD). In
essence, the APOD is the tactical assembly area (TAA). The SBCT
cannot conduct forced entry, but it provides the joint force
commander an improved capability to arrive immediately behind
forced entry forces and begin operations to shape the battlespace and
execute decisive action to expedite decision. Once committed, the
SBCT can sustain operations for up to 180 days without relief. In
addition, the SBCT’s organization is expandable through either
augmentation or scalability in accordance with the factors of METT-
TC in any given contingency.
1-17. Operationally, the SBCT normally fights under a division. The
SBCT can also fight under the direct control of a corps headquarters,
which will likely be designated as the Army Force (ARFOR) and,
possibly, the Joint Forces Land Component Command (JFLCC)
and/or Joint Task Force (JTF) headquarters, within a joint or
combined command. The SBCT is fully complementary to and
compatible with air expeditionary forces and US Marine Corps forces,
and may fight alongside them. In many contingencies, the SBCT will
(at least initially) be the single US maneuver command operating
under the ARFOR/JFLCC, although other coalition elements may
also be present. The SBCT is dependent on the division and higher
echelons of command for reach-back linkages to higher echelons to
expand its capabilities in the areas of information, intelligence, joint
effects, force protection, and sustainment. (Chapter 6 discusses the
brigade assets and augmentation that is available to the squadron.)
1-12
________________________________________________________________ Chapter 1 – Introduction
1-13
FM 3-20.96 ____________________________________________________________________________
1-14
________________________________________________________________ Chapter 1 – Introduction
1-15
FM 3-20.96 ____________________________________________________________________________
1-16
________________________________________________________________ Chapter 1 – Introduction
BATTLEFIELD ENVIRONMENTS
1-33. While retaining the ability to operate linearly, the squadron
will use advances in information and mobility capabilities to operate
routinely in a non-linear manner. Depending on the nature and
evolution of the operation, conditions may require the squadron to
operate in a continuum of linear battlespace, or to conduct
noncontiguous operations with tactical actions separated spatially,
but focused with respect to timing and purpose against key threat
capabilities and assets. Whether the squadron is conducting
operations in support of MTW, SSC, stability and support, or PME, it
must be prepared to conduct operations in noncontiguous or linear
battlespace. Figure 1-7 depicts combinations of contiguous and
noncontiguous AOs with linear and nonlinear operations.
1-17
FM 3-20.96 ____________________________________________________________________________
1-18
________________________________________________________________ Chapter 1 – Introduction
1-35. With information and intelligence from the SBCT and the
ARFOR/division resources, the squadron and its subordinate
elements have to adjust the way they make contact as well. Planning
considerations include understanding the time required to conduct
actions on contact, knowing the forms of contact, and the steps for
conducting actions on contact. The squadron analyzes the threat
throughout the military decision-making process (MDMP), primarily
the intelligence preparation of the battlefield (IPB) process, to identify
likely contact situations that may occur during an operation.
Intelligence reports from higher help to clarify the threat’s COAs and
likelihood of contact. Through the planning and rehearsals
conducted during the MDMP, they develop and refine COAs to deal
with the probable threat actions/contact. The COAs will eventually
become the foundation for the squadron’s scheme of maneuver.
1-36. During the MDMP, the leaders must evaluate a number of
factors to determine their impact on the unit’s actions on contact.
For example, the squadron needs to consider how the likelihood of
contact will affect its task organization, choice of movement
techniques, and formations. In doing this, the squadron can begin
preparing the unit for actions on contact; for example, it may outline
procedures for the transition to more secure movement techniques or
cue surveillance assets before a contact situation.
1-37. The squadron must understand that properly executed
actions on contact require time at both platoon and troop levels. To
fully develop the situation, a platoon or troop may have to execute
extensive lateral movement; dismount and remount scout squads,
and/or call for and adjust indirect fires. Each of these activities
requires time. The squadron must balance the time required for
subordinate elements to conduct actions on contact with the need of
the troop and squadron to maintain tempo and momentum. In terms
of slowing the tempo of an operation, however, the loss of a platoon
or team is normally much more costly than the additional time
required to allow the subordinate element to properly develop the
situation.
FORMS OF CONTACT
1-38. Contact occurs when a
member of the squadron encounters EIGHT FORMS OF CONTACT
any situation that requires an active
or passive response to the threat. • Visual
These situations may entail one or • Direct Fire
more of the following eight forms of • Indirect Fire
• Obstacles
contact:
• Aircraft
• Visual contact or • NBC
observation. • Electronic
• Nonhostile
• Physical contact (direct fire)
with a threat force.
• Indirect fire contact.
• Contact with threat obstacles or ones of unknown origin.
• Contact with threat or unknown aircraft.
1-19
FM 3-20.96 ____________________________________________________________________________
1-42. The seven- (or four-) step process is not intended to generate
a rigid, lockstep response to the threat. Rather, the goal is to provide
an orderly framework that enables the unit and its subordinates to
1-20
________________________________________________________________ Chapter 1 – Introduction
survive the initial contact, then apply sound decision making and
timely actions to complete the operation. Ideally, the unit will acquire
the threat (visual contact) before being sighted by the threat; it then
can continue with visual contact or initiate indirect contact or
physical contact on its own terms by executing the designated COA.
It is also essential for the squadron to understand the brigade
commander’s intent of the reconnaissance to recommend COAs for
the SBCT to react to the threat contact.
Make Contact through Sensors and Other ISR Assets
1-43. Ideally there will be information and intelligence on the threat
in the squadron’s AO. The squadron will get this contact through the
ATCCS and provide contact information to its subordinate elements
through FBCB2 or other radio reports.
Develop the Situation out of Contact
1-44. Based on the unit’s current situation, the leaders must
evaluate this information and determine if it will gain further contact
with this threat element to further develop the situation. The
squadron may endeavor to make contact with sensor assets to
minimize the danger to soldiers. Optimally, the squadron develops
the situation out of contact, allowing the brigade to do the same.
Maneuver the Force out of Contact
1-45. The squadron develops the situation out of contact and
maneuvers to a position of advantage. It maneuvers ground forces
and sensors into position to better develop the situation and to
prepare to make contact with the threat force. The goal is to position
forces and sensors to support making contact with minimal assets, at
a location and time of the squadron’s choosing.
Make Contact on Your Own Terms (Deploy and Report – If Chance Contact)
1-46. When the selected forces are in position, the squadron makes
contact with the threat force and begins to gather information on the
threat’s activities. The squadron reports its activities to the brigade
and adjacent units to provide SU throughout the force. The unit that
makes contact must take responsibility for maintaining contact until
ordered to break contact or until handover can occur.
Reevaluate and Develop the Situation
1-47. As the squadron deploys, the commander and staff reevaluate
the situation and, as necessary, continue to maneuver to develop it.
The squadron analyzes the new information to determine operational
considerations, including the following:
• The size of the threat element.
• Location, composition, activity, and orientation of the
threat force.
• The impact of obstacles and terrain.
• Threat capabilities (especially antiarmor capability).
• Probable threat intentions.
1-21
FM 3-20.96 ____________________________________________________________________________
1-22
________________________________________________________________ Chapter 1 – Introduction
RECONNAISSANCE PURPOSE
1-50. In order for the squadron to successfully meet the brigade
commander’s intent, the commanders and staff must first have an
understanding of how the collected intelligence information will be
used to develop the brigade’s plan and to facilitate execution. The
purpose of the reconnaissance operation gives the squadron a better
understanding of the intent of the reconnaissance from the brigade’s
perspective. The squadron leadership must understand the three
reasons of employing the squadron. The reconnaissance purposes for
employment are—
• Reconnaissance push.
• Command push.
• Reconnaissance pull.
RECONNAISSANCE PUSH
1-51. The squadron is deployed early in the planning process. The
brigade staff uses the intelligence information collected to develop the
plan. This purpose requires the brigade staff to develop facts and
assumptions on the threat early enough to focus the squadron’s
effort. These facts and assumptions are generally based on threat
templates, predictive analysis, and a thorough IPB. As the squadron
confirms or denies these facts and assumptions, the information is
reported back to the squadron staff, analyzed, and disseminated
throughout the brigade and to the brigade staff in order to complete
the plan. Reconnaissance push requires the brigade to develop a
detailed ISR plan prior to the planning of the brigade’s (main body)
mission. The information must be gathered, analyzed, and reported
in a timely manner in order to influence the brigade’s planning
process. The result of reconnaissance push operations is a detailed
plan, based on reliable intelligence, for the employment of the
brigade. To be successful in a time-constrained environment, the
staffs must dedicate enough time on ISR planning, and then use the
intelligence information collected to develop or adjust their initial
plan.
COMMAND PUSH
1-23
FM 3-20.96 ____________________________________________________________________________
1-24
________________________________________________________________ Chapter 1 – Introduction
1-55. Combat and staff operations are organized around the seven
battlefield operating systems. (BOS). This section provides a brief
overview by BOS of unique aspects of the squadron. Greater detail
will be provided in subsequent chapters. (See Chapter 2 for detailed
explanations of the digital systems.)
INTELLIGENCE
1-56. Battlefield intelligence operations may be the area of greatest
and most dynamic change in the brigade’s operations. Squadron
operations will be significantly impacted by intelligence systems and
the volume of intelligence data that will be available as well as the
increased amount of information that the squadron will be capable of
capturing in reconnaissance operations. Systems that will be organic
to the squadron or the squadron will employ are—
• FBCB2.
• All Source Analysis System (ASAS).
• UAV.
• Ground sensors (see Appendix G).
1-57. With the information that these various systems can acquire,
store, and display, commanders should be able to know more about
the threat and to rapidly exploit that information to defeat them while
taking action to protect their own forces.
MANEUVER
1-58. The squadron is highly mobile in all types of terrain. The use
of the other BOS capabilities, primarily intelligence and C2 at the
squadron level, increases SA of friendly and threat units, which will
increase the squadron’s maneuver capabilities. Though the squadron
has no mounted heavy armor-defeating systems, the troops do have
Javelin capabilities. Javelin employs lock-on-before-launch, fire-and-
forget technology that permits the dismounted scouts to move to an
alternate position immediately upon missile launch. The Javelin
weighs 49.5 pounds, is 47 inches long, and can kill any tank on the
battlefield within 2,000 meters.
FIRE SUPPORT
1-59. The indirect fires organic to the squadron are the 120-mm
mortar sections found at the troop level. The 120-mm mortars
provide quick, responsive, and accurate fires needed for the troop to
develop the situation. The brigade has an M198 155-mm towed
artillery battalion that can be readily available to the squadron. With
the application of the Army Battle Command System (ABCS), the
squadron can also utilize supporting or joint fires such as close air
support and attack helicopters. The squadron will play a major role
in the brigade’s targeting process. The process consists of deciding
what the high-payoff targets are, detection of those targets, delivering
fires to the targets, and assessing the effectiveness of the fires (see
Figure 1-8). The squadron can assist in this process, especially in the
1-25
FM 3-20.96 ____________________________________________________________________________
AIR DEFENSE
1-60. Air defense in the squadron is significantly reduced to passive
forms of protection (dispersion, camouflage, observation of weapon
status, proper reaction) and utilizing direct fire weapon systems
when necessary. The threat of hostile aircraft will be low due to the
efforts at the joint-force level to achieve air parity. As with the
squadron, the brigade has no air defense systems.
1-26
________________________________________________________________ Chapter 1 – Introduction
1-27
Chapter 2
Battle Command
Battle command is
the exercise of CONTENTS
command in The Art of Command .......................................... 2-1
operations against a The Elements of Command............................ 2-2
Battle Command Methodology ...................... 2-2
hostile, thinking Role of the Commander.................................. 2-6
opponent. It includes The Command and Control System .................. 2-7
controlling operations Personnel......................................................... 2-7
and motivating Information Management ............................... 2-8
Procedures ...................................................... 2-10
soldiers and their Command Posts.............................................. 2-11
organizations into Communications ................................................ 2-31
action to accomplish Responsibilities............................................... 2-32
missions. Battle Means of Communication .............................. 2-33
FM versus Digital Communications .............. 2-34
command entails Squadron External Communications ............ 2-35
visualizing the Squadron Internal Communications ............. 2-37
current state and a Communications Security.............................. 2-39
future state, then Computers........................................................... 2-40
Army Battle Command System...................... 2-41
formulating concepts FBCB2 .............................................................. 2-41
of operations to get Maneuver Control System.............................. 2-42
from one to the other All Source Analysis System........................... 2-42
Advanced Field Artillery Tactical Data
at the least cost. It
System.......................................................... 2-43
also includes Air and Missile Defense Workstation ............ 2-44
assigning missions, CSS Control System ....................................... 2-45
prioritizing and Supporting Systems ....................................... 2-45
Distributed Computing Environment ............ 2-46
allocating resources,
selecting the critical
time and place to act, and knowing how and when to make
adjustments during the fight. The command and control (C2)
system at the squadron level enables the commander to lead,
prioritize, and allocate assets required to employ and sustain
combat power. It does this by integrating command and control;
computer technology; communications; and intelligence,
surveillance, and reconnaissance (ISR) functions that provide the
commander with accurate and timely information upon which to
base his decisions.
2-1
FM 3-20.96 ____________________________________________________________________________
During a game of chess, a player will know how each of his pieces move. He
can, at any point, see the entire chessboard and know where each of his own pieces is
located, as well as those of his opponent. He has full situational awareness. He knows
what is. However, depending upon his skill and experience, he may or may not be able to
visualize several moves ahead. Situational awareness is knowing where the pieces are
and how they move. Situational understanding is realizing that you are three moves from
checkmate!
2-3
FM 3-20.96 ____________________________________________________________________________
DESCRIBE
2-8. The commander describes his visualization by participating in
the military decision-making process (MDMP) during planning,
preparing for, and execution of operations. Specifically, his
commander’s intent, planning guidance, anticipated decision point(s),
and his commander’s critical information requirements (CCIR) all
2-4
_____________________________________________________________Chapter 2 – Battle Command
2-5
FM 3-20.96 ____________________________________________________________________________
2-6
_____________________________________________________________Chapter 2 – Battle Command
2-7
FM 3-20.96 ____________________________________________________________________________
PERSONNEL
2-19. The C2 system in the squadron begins with people. No
amount of technology can reduce the importance of the human
dimension. The staff constitutes the most important element among
personnel dedicated to the C2 system. The staff exists to assist and
support the commander in making and implementing decisions. The
staff’s efforts must always focus on supporting the commander and
on helping him support his subordinate units. The staff supports the
commander by providing him RI, making estimates and
recommendations, preparing plans and orders, and monitoring
execution. Staff responsibilities are discussed as part of the
“Command Posts” paragraph later in this section. For additional
information on general staff responsibilities, see FM 6-0 [FM 100-34].
INFORMATION MANAGEMENT
2-20. Information management is the provision of RI to the right
person at the right time in a usable form to facilitate decision
making. Information management uses the procedures and
information systems to collect, process, store, display, and
disseminate data and information. As part of the C2 system,
information management narrows the gap between the information
the commander requires and the information he has. All information
a command produces has one overriding purpose—to enable the
commander to make timely decisions during the fog and friction of
operations. All information must be relevant, and the staff must
ensure it is also accurate, timely, usable, complete, and precise.
Information management has two elements: RI and the information
systems (INFOSYS).
RELEVANT INFORMATION
2-8
_____________________________________________________________Chapter 2 – Battle Command
2-9
FM 3-20.96 ____________________________________________________________________________
2-10
_____________________________________________________________Chapter 2 – Battle Command
2-29. This activity is more than just the communication and display
of data and information. It is the quality of the presentation of
information that facilitates the assimilation and development of
knowledge. A good display should allow a commander to look across
the AOI in space and time and rapidly focus on decisive points,
identifying opportunities, threats, or gaps in information. Cluttered
displays inhibit the momentum of the commander’s decision making.
Good displays should also allow the commander to communicate
directions to subordinates in a manner that facilitates understanding
of the desired end state.
2-30. Storing. Storing retains RI in any form, usually for orderly,
timely retrieval and documentation until it is needed for exercising
C2. Information is stored because not all information collected or
processed can be displayed at the same time, nor is it relevant at all
times.
2-31. Common databases provide powerful tools for transforming
data into information and knowledge required for military decisions.
By storing, ordering, and structuring data in a database based on
data models that reflect the needs of military decisions, a variety of
software applications use and share this data for multiple purposes.
The database provides a bridge allowing different systems with
different purposes to work together or interoperate. For example, data
on the location and identification of friendly units when processed
and compared with other data can support situation understanding
and assist in clearing artillery fire missions. Through the database,
multiple applications can simultaneously use the same data for
different purposes to support multiple decisions horizontally and
vertically. Using a database allows software applications to permit
operators and analysts to sort, store, organize, and query data by
unit identification, geographic location, resource status, or
consumption.
PROCEDURES
2-32. Procedures are standard and detailed sequences of activities
within the squadron to accomplish tasks. They govern actions within
the C2 system to effectively and efficiently exercise C2. Adhering to
procedures minimizes confusion, misunderstanding, and hesitance
as commanders rapidly shift forces to meet contingencies. There are
two levels of procedure within the squadron’s C2 system: doctrinal
procedures and standing operating procedures (SOP).
DOCTRINAL PROCEDURES
2-11
FM 3-20.96 ____________________________________________________________________________
COMMAND POSTS
2-35. Squadron CPs provide sustainment and a work environment
for the elements of the C2 systems. To best direct operations, CPs are
organized by purpose and are distributed across the squadron’s AO
to increase the squadron’s span of control, improve communication,
increase survivability, and enhance mobility. The squadron normally
fields a command group, a tactical CP (TAC CP), a main CP, combat
trains CP (CTCP), and a field trains CP (FTCP). Other CPs include the
recce troop CP and the surveillance troop CP (see Figure 2-5). CPs
provide the physical facilities, personnel, and systems that allow the
commander to see the battle, control and synchronize forces,
communicate orders, plan operations, and position combat service
support (CSS).
2-12
_____________________________________________________________Chapter 2 – Battle Command
COMMAND GROUP
2-36. The command group consists of the commander and the fire
support officer (FSO) (see Figure 2-6). The command group may
include the air liaison officer (ALO), or other personnel the
commander deems necessary. The command group is not a fixed or
permanent organization. During operations, it is normally positioned
forward with the commander where he can track critical events,
make timely decisions, and command operations. The command
group may collocate with the main CP during the MDMP to facilitate
planning. The command group exercises its C2 functions using voice,
digital, and face-to-face communications.
2-13
FM 3-20.96 ____________________________________________________________________________
2-14
_____________________________________________________________Chapter 2 – Battle Command
2-15
FM 3-20.96 ____________________________________________________________________________
S3 Operations Officer
2-42. As the TAC CP officer in charge (OIC), the S3 has overall
responsibility for TAC CP functions and operations. As such, he
performs the following tasks:
• Controls current operations; coordinates direct and indirect,
lethal, and nonlethal fires.
• Synchronizes all tactical operations with all staff sections.
• Assists the squadron commander in the development of the
ISR plan as part of the brigade’s MDMP.
• Assists the brigade S3 in preparing the brigade’s WARNO 2
(ISR plan).
• Prepares, coordinates, publishes, and distributes the
command SOP, operations plans (OPLAN), OPORDs, FRAGOs,
and WARNOs.
• Leads COA development and decision support template (DST)
development.
• Participates in targeting meetings.
2-16
_____________________________________________________________Chapter 2 – Battle Command
2-17
FM 3-20.96 ____________________________________________________________________________
Executive Officer
2-47. The XO is the commander’s principal assistant for directing,
coordinating, supervising, and training the staff. His specific duties
include—
2-18
_____________________________________________________________Chapter 2 – Battle Command
2-19
FM 3-20.96 ____________________________________________________________________________
2-20
_____________________________________________________________Chapter 2 – Battle Command
S2 Section
2-48. The S2 is the OIC of his section, which is responsible for
collecting and applying intelligence to support operations (see Figure
2-9). The S2 and his section play a vital role in planning and
executing squadron operations. The S2’s coordination and interaction
with the S3 and fire support sections are critical to mission
accomplishment. The primary systems found in the S2 section are
ASAS and FBCB2.
2-21
FM 3-20.96 ____________________________________________________________________________
2-22
_____________________________________________________________Chapter 2 – Battle Command
S3 Section
2-52. The S3 is the OIC of this section, and in his absence, the
battle captain is in charge (see Figure 2-10). This section is the focal
point for control of operations and creation of plans and orders. The
2-23
FM 3-20.96 ____________________________________________________________________________
2-24
_____________________________________________________________Chapter 2 – Battle Command
2-54. The battle captain is the main CP OIC in the absence of the
XO. As the senior S3 officer on duty, he is responsible to the XO for
overall main CP operations. As such, he is also responsible for the
following:
2-25
FM 3-20.96 ____________________________________________________________________________
2-55. The OIC of the fire support element (FSE) is the FSO, an
artillery branch captain (see Figure 2-11). The FSE coordinates all
fire support for operations. The FSO advises the commander and staff
on all fire support matters. Its primary system is AFATDS. Key tasks
the FSO/FSE perform are—
2-26
_____________________________________________________________Chapter 2 – Battle Command
2-27
FM 3-20.96 ____________________________________________________________________________
2-59. The chemical officer, who is also the FOX recce platoon leader,
is responsible for requesting and using chemical assets for nuclear,
biological, and chemical (NBC) defense and smoke operations. He and his
NBC NCO use the MCS in conjunction with the Joint Warning and
Reporting Network (JWARN) (either resident on the MCS or as a stand-
alone system) as a tool for NBC warning and reporting and for
maintaining situational understanding and C2 of chemical defense units.
The chemical officer fulfills the role of platoon leader for the NBC recce
platoon since the RSTA main CP is usually collocated with the SBCT main
CP, allowing the chemical sections of both organizations can work
together. The chemical officer performs the following functions:
• In conjunction with the S2, advise the commander and staff
on the probability and effects of threat NBC weapons.
• Recommend reconnaissance, monitoring, and surveying
requirements.
• Disseminate warning messages of friendly use of nuclear
weapons (STRIKWARN).
2-28
_____________________________________________________________Chapter 2 – Battle Command
2-29
FM 3-20.96 ____________________________________________________________________________
S6 Section
2-60. The OIC of this section is the S6, a signal branch captain. The
section contains the communications maintenance platoon and a
RETRANS section capable of operating three RETRANS sites (see
Figure 2-12). It coordinates directly with the reconnaissance and
surveillance troops and the signal company found at brigade. Its
primary systems include FBCB2, Enhanced Position Location
Reporting System (EPLRS), global broadcast service, and local area
network (LAN) equipment. The S6 section is responsible for
maintenance of communications systems, establishment and
operation of FM retransmission nodes, management of the tactical
internet (TI), and establishing/maintaining the CP LAN. The S6 works
with the XO and S3 in selecting CP locations.
2-30
_____________________________________________________________Chapter 2 – Battle Command
S1 Section
2-63. The S1 section has responsibility for all personnel actions and
tracking the manning of the squadron (see Figure 2-14). Key tasks
the S1 and his section perform are—
• Monitor the personnel strength of all subordinate elements.
• Provide unit strength and loss estimates as part of the
planning process.
2-31
FM 3-20.96 ____________________________________________________________________________
2-32
_____________________________________________________________Chapter 2 – Battle Command
2-33
FM 3-20.96 ____________________________________________________________________________
2-34
_____________________________________________________________Chapter 2 – Battle Command
ADVANTAGES DISADVANTAGES
Collocate with main CP Increased coordination with Increased signal footprint.
squadron staff. Increased terrain requirements to
Integrated into main CP defense support main CP.
plan.
Greater access to Trojan Spirit
Lite and TACSAT to speed
transition of imagery and sensor
data.
Collocate with UAV launch site. Increased control over UAV Reduced coordination with main
operations. CP.
Increased local security at UAV Increased signal footprint at UAV
site. site.
As a separate C2 node. Small signal footprint. Limited local security.
Increased range of UAV and Reduced integration with
sensor operations. squadron staff.
Reduced control of UAV
operations.
2-35
FM 3-20.96 ____________________________________________________________________________
2-36
_____________________________________________________________Chapter 2 – Battle Command
2-37
FM 3-20.96 ____________________________________________________________________________
MEANS OF COMMUNICATION
2-73. The squadron uses the full spectrum of communications
means. Planning data for communications systems and sensors
found in the squadron is listed in Table 2-2.
EPLRS Enhanced 3-10 km UHF 420- 14400 100+ Yes Yes Primary
Position Location 240 bps kbps means of
Reporting MHz FBCB2 data
System transmission
SINCGARS Single Channel VHF 30- 16000 -- Yes Secondary
Ground and 87.975 bps means for
Airborne Radio MHz FBCB2 data
System transmission
Manpack 5-10 km 1-10 km
Short range 5-10 km 1-10 km
vehicular
Long range 10-40 km 3-35 km
vehicular
NTDR Near Term Digital 10-20 km UHF 225- 200 Yes Yes CP to CP
Radio 450 kbps data transfer
MHz
AN/PSC-5 UHF/VHF 1-3 km 1-3 km UHF 224- 16000 Yes Yes Can provide
ManpacK LOS (LOS) 500 bps retrans for
and unlimited MHz SINCGARS
DAMA/SATCOM (TACSAT)
terminal
MSE Mobile Area Area UHF 225- 16000 Yes Signal
Subscriber 400 bps company
Equipment MHz maintains
MSE net
AN/TSQ- TROJAN Special Unlimited 512 No Yes Primary
190 (V) Purpose kbps means of
Intelligence sending
Remote video feeds
Integrated from UAV
Terminal
LRS UAV Launch and 50 km VHF Yes
Recovery Shelter
GCS UAV Ground 125 km VHF Yes Aerial retrans
Control Shelter extends
range by 75
km
IREMBASS Improved 15 km VLF 138- Yes Detection
Remotely 153 range: 50m
Monitored MHz dismounts
Battlefield Sensor 250m wheel,
System 350m track
GSR Ground 10 km j- 16- Yes Detection
Surveillance band 16.5 range: 5 km
Radar GHz dismounts,
10 km
vehicles
* Ranges are greatly reduced by using higher data transmission rates.
DIGITAL
2-74. The ABCS is a network of computer systems that allow for
advanced reporting, orders and graphic sharing, and database
management. These systems are described in detail in Section IV,
Computers.
2-38
_____________________________________________________________Chapter 2 – Battle Command
RADIO FM
2-75. Reconnaissance operations normally depend on radio as the
primary means of communication for both voice and digital traffic.
Net discipline and SOP minimize needless traffic. To avoid detection
by threat direction-finding equipment, the squadron uses all other
means of communication to supplement the radio. Once in contact,
the primary means of communication will be FM voice. Radio
communications include electromagnetic communications in FM, AM,
UHF, and VHF spectrums.
COMMERCIAL LINES
2-76. Commercial lines are used when approved by higher
headquarters. If the unit is forced to withdraw, existing wire lines,
including commercial lines, are cut and sections removed so the
threat cannot use them.
SOUND AND VISUAL
2-77. Sound and visual signals are in the signal operating
instructions (SOI) or the unit SOP. Signals not included in the SOI
may be established by SOP. The battlefield will have many sound and
visual cues that become increasingly important in complex and
urban terrain. Commanders and staff planners carefully determine
how sound and visual signals will be used and authenticated. Sound
and visual signals include pyrotechnics, hand-and-arm, flag, metal-
on-metal, rifle shot, whistles, and bells.
MESSENGERS AND LIAISON OFFICERS
2-78. Messengers are used between the CP, trains, and higher and
lower headquarters. The use of liaison officers (LNO) becomes
increasingly important as digitally equipped units operate with
nondigitally equipped units.
WIRE
2-79. Wire is normally used for internal communications within the
CP, support areas, and assembly areas. It is the primary means of
communication whenever the situation permits.
2-39
FM 3-20.96 ____________________________________________________________________________
2-40
_____________________________________________________________Chapter 2 – Battle Command
2-41
FM 3-20.96 ____________________________________________________________________________
2-42
_____________________________________________________________Chapter 2 – Battle Command
2-43
FM 3-20.96 ____________________________________________________________________________
fires or CAS for the squadron. Troop FISTs, the main CP, command
group, TAC CP, and mortar sections are users of this net.
TROOP COMMAND NET
2-93. The troop command net is a secure FM net controlled by the
troop XO in the troop CP. All organic and attached elements of the
troop operate in this net. All tactical and logistics reports are
forwarded to the troop CP on this net. Platoons operate on internal
nets.
TROOP FIRE SUPPORT NET
2-94. The troop FIST controls this FM net. The troop FIST and
mortars operate on the net to call for fires. Any member of the recce
troop may enter the net as necessary to call for fire (see Table 2-3).
2-44
_____________________________________________________________Chapter 2 – Battle Command
SQDN ARTY
BDE SQDN SQDN SQDN TRP/CO TRP FS
STATION/NET CMD FS
CMD OI FM A/L FM FS FM CMD FM FM
FM (DIG)
Sqdn Cmd
X A A X X
Grp
Sqdn TAC CP X X A
Sqdn MAIN
M X N O N X
CP
Sqdn CTCP X X O N
Trp/Co Cdrs X O A A A
Trp CP X X O/A O/A
Trp/Co Plts A A X A
Trp/Co FIST X X X N
Trp/Co 1SG A X X
Trp Mortars X X X
HHT Cdr X X
N – Net control station
X – Enter net
A – Enter net as required
O – Monitor
I – FSO operates on this net
RETRANS TEAMS
2-95. The squadron has three RETRANS teams in the S6 section,
which are dedicated to RETRANS mission any of the squadron nets.
Each team has the capability to RETRANS one FM net using single
channel ground-airborne radio system (SINCGARS), and to serve as a
link in the lower TI with its EPLRS. The S6 positions RETRANS teams
in the squadron AO, balancing the need to maximize LOS and range
with the requirements of local security. Capabilities and limitations of
RETRANS is an important planning consideration when operating in
a noncontiguous environment.
COMMUNICATIONS SECURITY
2-96. The brigade’s OPSEC program is managed by and the
responsibility of the S3. He analyzes the commander’s concept of the
operation to determine the essential elements of friendly information
(EEFI) that must be protected from exploitation by threat intelligence.
The S3 and S2 develop appropriate OPSEC measures, based on their
assessment of threat intelligence collection capabilities and on the
friendly indicators that may compromise the EEFI. These OPSEC
measures are primarily procedural in nature and include—
2-45
FM 3-20.96 ____________________________________________________________________________
SECTION IV – COMPUTERS
2-46
_____________________________________________________________Chapter 2 – Battle Command
2-47
FM 3-20.96 ____________________________________________________________________________
2-48
_____________________________________________________________Chapter 2 – Battle Command
2-49
FM 3-20.96 ____________________________________________________________________________
2-50
_____________________________________________________________Chapter 2 – Battle Command
2-116. The AMDWS air defense force operations are the actions
required to plan, coordinate, prepare for, and sustain the ADA
mission. Force operations are primarily concerned with translating
the air defense concept, based on the OPLAN and the short-range air
defense (SHORAD) battalion commander’s planning guidance, into
detailed instructions. This includes weapons and sensor deployment,
task organization, air space control measures, battlefield geometry,
and logistics and personnel support. The AMDWS force operations
translate all this information into a tactical air defense concept.
SUPPORTING SYSTEMS
2-51
FM 3-20.96 ____________________________________________________________________________
2-52
_____________________________________________________________Chapter 2 – Battle Command
2-53
FM 3-20.96 ____________________________________________________________________________
2-54
_____________________________________________________________Chapter 2 – Battle Command
2-55
Chapter 3
3-1
FM 3-20.96 ____________________________________________________________________________
3-2
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
SECTION I – FUNDAMENTALS
3-3
FM 3-20.96 ____________________________________________________________________________
3-4
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-5
FM 3-20.96 ____________________________________________________________________________
RECONNAISSANCE FOCUS
3-11. Based on the future OE, reconnaissance is focused on more
than just the threat and terrain. The focus defines on what the
squadron needs to concentrate its information gathering and allows
the commander to select which critical tasks must be accomplished
and with what asset(s). Focus enhances the squadron’s ability to
fully understand its environment and conduct a more detailed,
comprehensive reconnaissance. Understanding the multiple
dimensions of the focus of reconnaissance is paramount in the
squadron’s understanding of the OE. Reconnaissance focus must be
linked to answering the brigade and squadron commander’s CCIR,
supporting targeting (lethal and nonlethal), and filling additional
voids in relevant information (RI). The focus of reconnaissance is
characterized in these broad terms: threat, society, infrastructure,
and terrain.
THREAT
3-12. The squadron no longer faces a single, monolithic, or well-
defined threat. During the cold war, planning centered on
confronting numerically superior armored opposing forces in Europe,
the Far East, or Southwest Asia. Today’s reconnaissance units must
be able to conduct operations across the range of military operations
(such as major theater of war [MTW], smaller-scale contingencies
[SSC], and stability operations and support operations) against
threats ranging in size from major regional powers to asymmetric
threats. These may include conventional threat forces, insurgents,
paramilitary forces, guerrillas, criminal groups, and certain civilian
groups and individuals. Because of the diversity of the threat, the IPB
process becomes even more important at the brigade, squadron, and
troop levels. No longer will the threat always fit into a neat time-
distance scenario. Potential adversaries may use a variety of doctrine,
tactics, and equipment. It is extremely important to quickly identify
who the threat is in an operational area. This will continually be the
major focus of reconnaissance for the squadron. However,
reconnaissance focus may be the identification of the unknown
threat as well. That is why the understanding of the society and
infrastructures of an area are also an important focus for
reconnaissance.
SOCIETY (SOCIAL/HUMAN DEMOGRAPHICS)
3-13. The focus of reconnaissance may be the society of a given
area. Gaining an awareness of how the society impacts military
operations and how military operations impact the local society may
3-6
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
be critical to the commander in order for him and his staff to make
decisions.
3-14. The center of gravity during operations may be the civilian
inhabitants themselves. To gain and/or retain the support of the
population, commanders must first understand the complex nature
and character of the society. Second, they must understand and
accept that every military action (or inaction) may influence,
positively or negatively, the relationship between the urban
population and Army forces, and by extension, mission success.
Without the support of the society or understanding its needs, the
society may become a threat to the brigade/military operations. With
this awareness, commanders can plan operations, implement
programs, and/or take immediate action to maintain support of a
friendly populace, or neutralize or gain the support of hostile or
neutral factions. Understanding how operations affect the society
(and vice versa) normally begins with gaining information on the size,
location, and composition of the society. Having understanding of the
society (gained by reconnaissance) gives the commander vital
information to shape the OE.
3-15. The squadron must be aware of the demographics in its AO.
The traditional reconnaissance is mainly focused on conventional
forces. Both traditional threat and unconventional threat military
forces impact the society. Threat conventional and unconventional
forces are still a part of understanding the civilian demographics;
understanding how threat operations affect the society (and vice
versa) will have an impact on military operations. The troops within
the squadron must understand the different cultural and economic
backgrounds of the people it encounters. The troops must clearly
understand the threat—be it conventional forces, paramilitary,
terrorist, or organized crime—that undermines the stability of the
society. The squadron leadership must be familiar with the factional
leaders, such as mayors, police chiefs, and local military
commanders. These relationships, while important in stability
operations and support operations are also critical in SSCs and
MTWs. The squadron should be very concerned with understanding
the needs of the local populace. Refugee situations are a part of the
demographic makeup of an environment. Understanding the full
dimension of demographic framework of a society is the basis of the
characteristics of an environment and determines much of the
reconnaissance objectives/focus.
3-16. Elements of a society may itself be a threat to the brigade. A
mob demonstrating against US military presence could impact
military operations and consequently be a specific focus for
reconnaissance. Refugees clogging routes the brigade may want to
use for combat operations may pose a threat. A focus may then be to
identify these groups (and the leaders of these groups) to allow the
brigade to make a decision to use lethal or nonlethal effects to deal
with the problem. The examples are endless, but these should
indicate how society-focused reconnaissance will help the brigade
shape its OE.
3-17. The following are examples of social/human dimensions of
reconnaissance focus on an AO:
3-7
FM 3-20.96 ____________________________________________________________________________
3-8
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
• Media.
Organizations.
Reporters.
Publications.
Broadcasts.
INFRASTRUCTURE
3-18. The infrastructures are those systems that support the
inhabitants and their economy and government. Destroying,
controlling, or protecting vital parts of the infrastructure can isolate
the threat from potential sources of support. Because these systems
are inextricably linked, destroying or disrupting any portion of the
urban infrastructure can have a cascading effect (either intentional
or unintentional) on the other elements of the infrastructure.
3-19. To successfully operate in an area, the squadron must
understand the local infrastructure. The squadron must understand
it physically in terms of utilities, transportation, and food availability
as well as the many other products that make a community run. The
squadron must understand the infrastructure financially. What is
the monetary base of the different communities, the income
demographics, and the black market trade? Additionally, who can
provide the friendly force with combat service support (CSS) needs?
The squadron must also understand the local community, political,
and governmental structure. This includes religious, military, and
paramilitary, such as local security and police forces that work
independently from one another. The leadership must develop a
general understanding of these organizations—how they fit into the
community at large and how they relate to one another. A
reconnaissance mission focused on infrastructure might look at
these dimensions—
• Communications. (Wireless, telegraphs, radios,
television, computers, newspapers, or magazines.)
• Transportation and Distribution. (Highways and
railways [to include bridges, tunnels, ferries, and fords];
cableways and tramways; ports, harbors, and inland
waterways; airports, seaplane stations, and heliports;
mass transit; and the trucking companies and delivery
services that facilitate the movement of supplies,
equipment, and people.)
• Energy. (System that provides the power to run the urban
area and consists of the industries that produce, store,
and distribute electricity, coal, oil, and natural gas. This
area also encompasses alternate energy sources such as
nuclear, solar, hydroelectric, and geothermal.)
• Commerce. (Area includes business and financial centers
[stores, shops, restaurants, marketplaces, banks, trading
centers, and business offices] and outlying
industrial/agricultural features [strip malls, farms, food
storage centers, and mills] as well as environmentally
3-9
FM 3-20.96 ____________________________________________________________________________
3-10
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-11
FM 3-20.96 ____________________________________________________________________________
FUNDAMENTALS
3-23. Successful reconnaissance operations are planned and
performed with seven fundamentals in mind:
• Orient on the reconnaissance objective.
• Ensure continuous reconnaissance.
• Maximize reconnaissance assets.
• Gain and maintain contact.
• Develop the situation.
• Report all information rapidly and accurately.
• Maintain the ability to maneuver freely.
3-12
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-13
FM 3-20.96 ____________________________________________________________________________
3-14
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
brigade, or higher levels. Ensuring that all leaders know the CCIR, its
significance, and who/how to report is critical. Additionally, all scout
elements must be thoroughly knowledgeable of the specific
information requirements (SIR) developed by the S2. With the
increasing capabilities to create and transmit information, knowing
the CCIR is more important than ever to focus information
management and prevent information overload.
MAINTAIN THE ABILITY TO MANEUVER FREELY
3-31. The ability to maneuver is essential to reconnaissance
operations. The squadron’s assets are lightly armed and conduct
their reconnaissance from medium-skinned vehicles and are not
capable of surviving engagements with a superior or heavily armed
threat force. If the squadron becomes decisively engaged,
reconnaissance ceases; therefore, the squadron must not become
decisively engaged, otherwise their own survivability and ability to
execute the reconnaissance mission will be at risk. The squadron can
maximize the use of precision long-range indirect/direct fires and
conduct effective hand over of threat elements to supporting friendly
maneuver forces. Dismounted reconnaissance also affords vehicles
the opportunity to maneuver more securely. Contact with the threat
should be gained through the squadron’s acquisition capability
rather than a chance meeting. The UAV and GBS provide the
squadron early warning and maximum standoff range and limit
exposure to threat acquisition systems. Troop mortars and Javelin
antitank missile systems will assist in disengagement or responding
to contact. Decisive engagement can be avoided by planning
operations in depth; keeping subordinate troops situationally aware;
and using proper overwatch, movement, and reconnaissance
methods. Leaders must anticipate tactical developments and be
constantly developing and analyzing COAs that will avoid decisive
engagement and maintain the ability to maneuver.
CAPABILITIES
3-32. The squadron is optimally organized to operate in stability
operations, support operations and in SSC; however, it can operate
in MTW but is limited by its lack of armor protection and firepower.
METT-TC will always govern the squadron’s ability to conduct
reconnaissance. The squadron can—
• Provide all weather, continuous, accurate, and timely
reconnaissance in complex, close, restrictive, urban
terrain.
• Reconnoiter up to nine routes simultaneously in a
permissive no threat environment. Reconnoiter up to six
routes in a low-threat environment. Reconnoiter three
routes in a medium- to high-threat environment.
• Conduct a detailed zone/area reconnaissance at a
relatively slow rate of movement, depending on the terrain
and executing all the critical tasks associated with the
mission. (A zone/area reconnaissance properly performed
normally takes considerable time, typically about 1
kilometer per hour.)
3-15
FM 3-20.96 ____________________________________________________________________________
3-16
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
LIMITATIONS
3-33. Survivability is reduced due to the squadron’s lightly armored
vehicles. Medium-heavy weapon systems and indirect fires pose a
significant threat to the squadron. Proper movement techniques,
employment, and strict adherence to the fundamentals will improve
survivability.
3-17
FM 3-20.96 ____________________________________________________________________________
3-18
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
units to the main effort (decisive) and the main effort to the mission,
the squadron must clearly link the focus of reconnaissance so the
squadron’s subordinate units know the purpose (why) of its
reconnaissance.
3-19
FM 3-20.96 ____________________________________________________________________________
TEMPO
3-39. The tempo of the reconnaissance allows the commander to
establish associated time requirements with planning time,
movement formations, and methods, such as dismounted or
mounted. The commander establishes the tempo by answering
several questions: Will the recce troops need to conduct stealthy or
forceful reconnaissance? Is the reconnaissance mission deliberate or
rapid? Is the reconnaissance aggressive or discreet? (See Figure 3-1.)
3-20
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-21
FM 3-20.96 ____________________________________________________________________________
RECONNAISSANCE METHODS
3-47. There are four methods for the employing reconnaissance assets
at squadron level—dismounted, mounted, aerial, and sensor. The
squadron commander may use any method or combination of methods
to accomplish the reconnaissance mission based on the factors of
METT-TC, the reconnaissance troop, and the higher commander’s
intent, guidance, and CCIR.
DISMOUNTED
3-48. Dismounted reconnaissance is the most secure, but time-
consuming method. This method permits the squadron to collect the
most detailed information about the terrain and threat within a given
zone, area, or along a route. It is used when other sensor assets have
triggered ground assets to conduct a more deliberate, thorough, “eyes
on” reconnaissance. The squadron commander may direct/expect
troops to execute dismounted reconnaissance when—
• Time is available.
• Detailed information is required.
• Contact is gained from surveillance troop assets or other
sensor contact.
• Stealth is required.
• Threat contact is expected or has been achieved through
visual means.
• Scout vehicles cannot move through an area because of
terrain or threat.
MOUNTED
3-22
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-23
FM 3-20.96 ____________________________________________________________________________
ZONE
3-57. Zone reconnaissance is the directed effort to obtain detailed
information concerning all threat forces, routes, obstacles, society,
3-24
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-25
FM 3-20.96 ____________________________________________________________________________
3-26
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-27
FM 3-20.96 ____________________________________________________________________________
3-28
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
CRITICAL TASKS
3-59. Zone reconnaissance is a deliberate, time-consuming process;
therefore it must be focused. Certain tasks must be accomplished
during zone reconnaissance unless the squadron commander
specifically directs otherwise. Critical tasks serve as a guide to
indicate those tasks that are associated with zone reconnaissance.
These tasks are not a checklist or sequentially arranged. Some may
not be appropriate in all situations. Based on time and the
commander’s intent, the squadron commander may direct the troop
to reconnoiter for specific information only. IPB and CCIR often
indicate the critical information desired by the higher commander.
3-60. The primary tasks accomplished as part of a zone
reconnaissance are—
• Find and report threat forces within the zone.
• Determine the size, location, and composition of the
society demographics (such as race, sex, age, religion,
language, national origin, tribe, clan, class, party
affiliation, education, or any significant social grouping).
• Reconnoiter the society to determine the regional, local,
and neighborhood situations.
• Reconnoiter terrain within the zone.
• Identify key municipal infrastructure that can affect
military operations (utilities, sewage, transportation [rail,
bus, subway, etc.], and communications).
• Inspect and classify all bridges within the zone.
• Locate fords or crossing sites near all bridges within the
zone.
• Inspect and classify all overpasses, underpasses, and
culverts.
• Locate and clear all mines, obstacles, and barriers in the
zone (within its capability).
• Locate a bypass around urban areas, obstacles, and
contaminated areas.
• Establish and maintain contact with local civilian and
military leadership.
• Determine the needs of the society to determine
operation/actions needed to support a friendly populace,
or to neutralize or gain support of a hostile or neutral
faction.
• Determine media activities.
• Clarify organizations and methods of operation for
terrorists, transnational groups, and ethnic centers of
power.
• Identify local populous allegiances to factions, religious
groups, or other organizations.
• Report reconnaissance information.
3-29
FM 3-20.96 ____________________________________________________________________________
3-30
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
Squadron Planning
3-65. After receiving guidance, the squadron commander, S2, and
surveillance troop commander begin planning with the brigade staff to
synchronize the squadron’s plan with the brigade’s ISR plan that
results in the initial IPB products, including NAIs. Concurrently, the
squadron XO prepares the staff for the orders process. Actions for
preparation include—
• Acquiring initial brigade graphics (digital, through
Maneuver Control System [MCS]; and/or traditional).
3-31
FM 3-20.96 ____________________________________________________________________________
• Terrain analysis.
• Updating intelligence information of the area.
• Identifying and coordinating for intelligence assists
available to support the mission (reach through brigade).
3-68. The commander has established the tempo for the mission
initially as forceful, aggressive, and rapid from the LD to PL HAWAII.
This will transition to more stealthy, discreet, and deliberate
reconnaissance. Maintaining stealth is paramount to the success of
the squadron’s mission; therefore, the engagement criterion is that
troops will engage only in self-defense. Troops will destroy small
patrols within capability if they are detected by the threat. Anything
larger is handed over to the infantry for destruction. The troops are to
maintain contact with any threat identified until effective handover is
conducted with the lead infantry battalion or another brigade asset,
or the troop is ordered to break contact to maximize elements for
reconnaissance. Fires will be used in support of hasty attacks, high
explosive, and smoke only, to minimize dud ordnance along the
routes. Guided/precision munitions are available for tanks and other
armored threat vehicles.
3-69. The squadron tasks the surveillance troop to observe the
passage lanes with ISR assets to determine if the threat is planning
any operations against the squadron or brigade prior to or during the
passage. Additionally, the surveillance troop is tasked to conduct
zone reconnaissance forward of the recce troops, with a focus on the
route in each zone. The squadron assigns each troop a zone with a
route. Graphics are developed to include PLs and checkpoints to
complement the scheme of maneuver and facilitate C2.
3-70. The squadron commander tasks A and C troops to conduct a
zone reconnaissance from PL ARIZONA (LD) to PL NEVADA, (LOA).
He tasks B Troop to conduct a zone reconnaissance from PL
ARIZONA (LD) to limit of its boundaries. Each troop is focused on
providing information on the terrain, serviceability of each route, and
identifying all the threat that affects each route. The squadron
commander plans to halt all reconnaissance elements at PL HAWAII
to resynchronize reconnaissance efforts prior to entering the
brigade’s AO. On order, troops conduct multidimensional
3-32
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-33
FM 3-20.96 ____________________________________________________________________________
3-34
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
Execution
3-72. The squadron conducts forward passage of lines (FPOL) with
the rapid deployment forces occupying defensive positions (securing
the APOD) and deploys along the LD. As the recce troops are
conducting FPOL, surveillance troop conducts aerial reconnaissance
of the passage lanes until the troops complete FPOL. The S2 requests
an intelligence update from higher prior to the squadron crossing the
LD. The surveillance troop commander shifts his ground surveillance
radar (GSR) and Improved Remotely Monitored Battlefield Sensor
System (IREMBASS) sensors to observe the squadron flanks and he
shifts the UAVs to reconnoiter forward of the recce troops as they
deploy along the LD in the formation they chose to cross the LD with
and reports readiness condition (REDCON) 1. The squadron
commander acknowledges and orders the troops to cross the LD,
once all the recce troops have reported REDCON 1. The recce troops
conduct the zone reconnaissance using a combination mounted and
dismounted reconnaissance within their assigned zones.
3-73. A Troop reports a point obstacle along Route (RTE) RED, with
an abandoned overwatch strongpoint fighting position. The
information is acknowledged and entered into Force XXI Battle
Command Brigade and Below (FBCB2), All-Source Analysis System
(ASAS), and MCS. To maintain momentum, the squadron requests
engineer support to reduce the obstacle. The troop leaves a section in
contact with the obstacle to guide the engineers and provide local
security as they reduce the obstacle. A Troop maintains observation
with a squad and continues reconnaissance to PL IDAHO until
handover is complete. The obstacle handover is conducted between
his squad and the engineer platoon and the squad moves to rejoin
his recce platoon. B and C Troops conduct zone reconnaissance and
report information as it is acquired.
3-74. The surveillance troop conducts aerial reconnaissance of RTE
WHITE and identifies five threat personnel carriers (PC) north of
Checkpoint 19 oriented south. The report is sent via FBCB2 and the
B Troop command acknowledges the report. The surveillance troop
maintains reconnaissance until B Troop can maneuver scouts to gain
visual contact of the vehicles and obtain further information. B Troop
dismounts scouts to identify vehicle orientation, any supporting or
overwatching elements, and their intentions (defensive posture or
temporary positioning). The commander’s report confirms five
vehicles in an overwatch position without prepared positions. He
recommends maintaining scout observation and coordinating for an
armored gun system (AGS) platoon from the infantry company to
attack by fire. He identifies an attack-by-fire position to the south of
NAI 8 oriented northeast as he sends the graphics via FBCB2 in the
event the vehicles displace towards the other troops’ areas or start
moving south. The squadron commander agrees and orders the troop
commander to execute as the squadron CP contacts the infantry
battalion to begin coordination. The squadron commander halts
ground reconnaissance at PL HAWAII to allow troops to rest,
resupply, and conduct maintenance. When the squadron resumes
reconnaissance, the surveillance troop commander rotates aircraft as
the recce troops, at PL HAWAII, transition to multidimensional
3-35
FM 3-20.96 ____________________________________________________________________________
AREA
3-77. An area reconnaissance is a directed effort to obtain detailed
information concerning the terrain, threat activity, society, and
infrastructure within a prescribed area of interest (AOI). It is a more
narrowly defined form of zone reconnaissance. These areas can
include facilities, such as water plants, weapon storage sites, political
headquarters, a village or town, or other areas, such as a suspected
assembly area, cache site, or an airport complex. The squadron can
3-36
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-37
FM 3-20.96 ____________________________________________________________________________
3-38
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-39
FM 3-20.96 ____________________________________________________________________________
Brigade Concept
3-81. The SBCT conducts a phased deployment and RSOI within
the APOD, conducts battle handover with 307th Parachute Infantry
Regiment, and executes one of four maneuver options based on ISR
operations.
• Phase I: Deployment/RSOI. The SBCT conducts phased
deployment and RSOI to conduct ISR operations and
assist in APOD security operations as necessary. The
cavalry squadron (RSTA) and a reinforced infantry
company deploys to Cumberland. The remaining SBCT
elements follow per the deployment timeline. The SBCT
conducts ISR operations within the AO to answer the
commander’s CCIR and support the attack. The infantry
company is the SBCT reserve with planning priorities to
attack to enable reconnaissance elements to break
contact.
3-40
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-41
FM 3-20.96 ____________________________________________________________________________
3-42
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
Squadron Mission
3-87. The squadron deploys to the Republic of Cumberland and
conducts an area reconnaissance of the brigade AO to identify threat
composition and disposition in support of the brigade’s attack, O/O
screens along the international boundary.
Squadron Concept
3-88. The squadron commander decided to conduct the area
reconnaissance by assigning each recce troop an AO and keeping D
Troop(-) under squadron control (see Figure 3-9). During Phase I the
squadron initially uses a combination of zone, area, and route
reconnaissance to answer the SBCT commander’s PIR as soon as
possible and enable him to select a COA. Once the commander has
selected a COA, the squadron conducts area reconnaissance to
determine the composition and disposition of threat forces to enable
refinement and execution of the COA.
3-43
FM 3-20.96 ____________________________________________________________________________
3-44
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
ROUTE
3-94. A route reconnaissance is an operation focused on obtaining
detailed information on a specific route and all adjacent terrain from
which movement along that route could be influenced. The route is a
prescribed course from a point of origin to a specific destination, and
could be a road or axis of advance. Route reconnaissance is
conducted to ensure that the route is clear of obstacles and threat,
and that it will support the planned movement. Route
reconnaissance may be performed as a mission itself or as a task
during zone or area reconnaissance. Squadron should maximize the
synergistic effect of all its assets (HUMINT collectors, scouts, UAV,
GSR/PROPHET, NBC) as well as engineers when planning and
executing route reconnaissance.
3-95. The squadron as a whole seldom performs a route
reconnaissance. If contact is expected, a troop should be assigned
only one major route. If contact is unlikely, a troop may be assigned
two routes. The routes should be close enough together for the troop
commander to be able to maintain C2 and achieve security. See FM
3-20.971 for troop-level discussion.
CRITICAL TASKS
3-96. Certain tasks must be accomplished during route
reconnaissance unless the squadron commander specifically directs
otherwise. Based on time and the commander’s intent, the squadron
commander may direct the troop to reconnoiter for specific
information only. IPB and CCIR often indicate the critical information
desired by the higher commander. The critical tasks are—
• Reconnoiter and determine trafficability of the route.
• Find and report any threat that can influence movement
along the route.
• Reconnoiter routes approaching and inside urban areas.
• Reconnoiter lateral routes in the area of responsibility
(AOR).
• Inspect and classify bridges along the route.
• Inspect and classify overpasses, underpasses, and
culverts.
3-45
FM 3-20.96 ____________________________________________________________________________
PURPOSE
3-98. Surveillance is the systematic observation of airspace or
surface areas by visual, aural, electronic, photographic, or other
means. The focus and tempo of the collection effort primarily comes
from the PIR derived from the brigade CCIR, the commander’s intent
and the specific (critical) areas in which information is needed.
Surveillance is gaining observation of activities, conducted by the
threat, factions, and/or local populace in a critical NAI. These
activities may be occurring or expected to occur. Surveillance may be
conducted as a stand-alone mission, or as part of a reconnaissance
mission (particularly area reconnaissance). Primarily surveillance is
static in nature, but some systems can perform this task while
moving (such as UAVs).
FUNDAMENTALS
3-99. Successful surveillance operations are planned and
performed with the following three fundamentals in mind—
• Maximize surveillance assets.
• Maintain continuous surveillance of all assigned NAIs.
• Report all information rapidly and accurately.
3-46
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-100. Scouts are the “eyes and ears” of the commander. Previous
surveillance doctrine focused on surveillance as part of a
reconnaissance mission. This may still be appropriate in some
situations; but with the increasing likelihood of noncontiguous
operations and expansion of the brigade’s battlespace, surveillance
operations may be oriented in multiple directions over large areas.
One troop could be utilized in a highly visible checkpoint, another
conducts mounted surveillance of an intersection, while the third
troop conducts a covert surveillance mission of a suspected weapons
storage facility. In a situation such as this, most of the surveillance
troop assets should be task organized to the recce troops based on
the squadron’s analysis of METT-TC. The squadron may maintain
selected surveillance assets and must integrate all of its assets to
support surveillance operations.
MAINTAIN CONTINUOUS SURVEILLANCE OF ALL ASSIGNED NAMED AREAS OF
INTEREST
3-101. Once the surveillance of an NAI commences, surveillance
must be maintained until the mission is completed or terminated by
the higher commander. The commander must carefully plan all
available assets to ensure constant observation of all NAIs.
REPORT ALL INFORMATION RAPIDLY AND ACCURATELY
3-102. The brigade commander may base his battle planning and
tactical decisions on information obtained through the squadron’s
surveillance efforts. Intelligence loses its relevance as it ages. The
squadron must accurately report what it observes and report it in a
timely manner. Digitization speeds both the accuracy of the
intelligence information gathered as well as the timeliness with which
it can be sent. Using FBCB2 and FM, the squadron can receive and
transmit this vital combat information and intelligence in near-real
time.
CAPABILITIES
3-103. The squadron can—
• Conduct mounted, dismounted, aerial, and sensor
surveillance for extended periods of time.
• Conduct thorough surveillance of NAIs with a combination
of mounted, dismounted, aerial, and sensor assets.
• Man up to 36 short-term OPs simultaneously.
• Man up to 18 long-term OPs simultaneously.
• Conduct stealthy surveillance.
LIMITATIONS
3-104. The lightly armored vehicles of the squadron are severely
limited in their ability to survive direct or indirect fire engagements.
Threat compromise of unit positions can prove detrimental to both
the unit and mission. Proper discipline, dispersion, and camouflage
techniques will greatly reduce threat detection of squadron assets.
Ensuring the squadron has the appropriate task organization or
3-47
FM 3-20.96 ____________________________________________________________________________
quick reaction force from brigade to get to the NAI or break contact if
compromised is also the key to survivability and mission
accomplishment.
PLANNING CONSIDERATIONS
3-105. Like reconnaissance, the squadron can conduct surveillance
at all levels of conflict (stability operations and support operations,
SSC, and MTW) and in all terrain (open/rolling to complex/urban) to
provide the brigade with the SU it needs to execute decisive
maneuver within the battlespace. The optimum situations conducive
to successful squadron surveillance operations are stability
operations and support operations and SSC conflicts in
complex/urban terrain. The squadron can conduct surveillance in an
MTW, but will need to rely on augmentation to improve survivability,
and the tempo needs to be such that the squadron can set up
effective surveillance positions. In order for the squadron to conduct
effective surveillance, it must be deployed far in advance (time and
distance) of the brigade. Additional surveillance planning
considerations are as follows.
• Information received from higher—
• Brigade commander’s intent and guidance.
• Overall focus for the surveillance mission.
• Importance of NAIs.
• Critical tasks to be accomplished.
• Task organization and attachments.
• Duration.
• Tempo.
3-48
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
• Displacement.
• Follow-on missions.
• Communications plan (architecture and required
support).
SURVEILLANCE METHODS
3-108. There are four methods for the conduct of surveillance at
troop level—dismounted, mounted, aerial, and sensor. The squadron
commander may use any method or combination of methods to
accomplish surveillance based on the factors of METT-TC, the higher
commander’s intent/guidance, and CCIR.
DISMOUNTED
3-109. Dismounted surveillance permits a troop to collect detailed
information against a fixed site or threat from a close proximity with
the reduced chance of detection by the threat. However, dismounted
reconnaissance is also the most time-consuming in terms of OP
preparation.
3-110. The squadron commander may direct/expect troops to
execute dismounted surveillance when—
• Stealth is a requirement.
• Detailed information is required.
• Surveillance target is a stationary threat, fixed site/area,
or terrain feature.
• Surveillance is required over an extended period of time.
• Scout vehicles cannot move through an area because of
terrain or threat.
• Security is the primary concern.
MOUNTED
3-111. Mounted surveillance permits the squadron to collect
adequate information on an NAI in the least amount of time. It also
allows the squadron to transition more rapidly to another mission.
This method provides less security to the vehicles from the threat,
particularly a dismounted threat.
3-112. The squadron commander may direct/expect troops to
execute mounted surveillance when—
3-49
FM 3-20.96 ____________________________________________________________________________
3-50
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-51
FM 3-20.96 ____________________________________________________________________________
3-52
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-53
FM 3-20.96 ____________________________________________________________________________
3-54
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-55
FM 3-20.96 ____________________________________________________________________________
3-134. Scouts and the UAV establish contact with the threat force
and initiate digital and electronic reconnaissance handover with the
designated infantry battalion (see Figure 3-10, Part Two). GSR
conducts reconnaissance handover with the scouts now maintaining
contact, and then shifts its focus back to its original area of
surveillance. The recce troop with the scouts that are maintaining
contact collocates its CP with the infantry battalion’s tactical CP (TAC
CP) to further facilitate reconnaissance handover; this includes the
exchange of fires information and coordination for the FPOL of the
attacking battalion. An INTSUM is sent to the infantry battalion, and
the battalion reconnaissance platoon moves to a designated RHOCP
(usually a designated contact point) to coordinate with the scouts
already in contact. As the battalion reconnaissance platoon
establishes contact with the threat force, they focus their efforts to
answer the battalion commander’s CCIR/IR to fill voids in the
battalion’s IPB and to support targeting. All ISR assets are prepared
to transition to battle handover in case direct fire contact occurs
between the ISR assets and the threat force. The squadron remains
oriented on the brigade R&S mission, but supports the attacking
battalion by isolating the threat force, facilitating reconnaissance
handover, and providing the information necessary to allow the
attacking battalion the ability to attack at its own time and place(s) of
choosing.
3-56
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-57
FM 3-20.96 ____________________________________________________________________________
3-58
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-59
FM 3-20.96 ____________________________________________________________________________
3-60
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-61
FM 3-20.96 ____________________________________________________________________________
3-62
____________________________________ Chapter 3 - Reconnaissance and Surveillance Operations
3-63
Chapter 4
Security Operations
Security operations,
as defined in FM 3-90 CONTENTS
[FM 100-40], are Purpose, Fundamentals, and Planning
those operations Considerations ............................................ 4-3
Purpose ........................................................ 4-3
undertaken by a
Fundamentals .............................................. 4-3
commander to provide Planning Considerations ............................ 4-5
early and accurate Screen .............................................................. 4-7
warning of threat Critical Tasks ............................................... 4-8
operations, to provide Stationary Screen ........................................ 4-9
Moving Screen ............................................. 4-23
the force being Limited Visibility.......................................... 4-25
protected with time Area and High-Value Asset Security ............. 4-26
and maneuver space Route Security................................................. 4-29
within which to react Convoy Security.............................................. 4-32
to the threat, and to
develop the situation
to allow the commander to effectively use the protected force. Thus
for the cavalry squadron, reconnaissance, surveillance, and target
acquisition (RSTA), security operations are characterized by
conducting reconnaissance to reduce terrain and threat
unknowns, gaining and maintaining contact with the threat to
ensure continuous information, and providing early and accurate
reporting of information to the protected force.
4-1
FM 3-20.96 ____________________________________________________________________________
• Screen.
• Guard.
4-2
__________________________________________________________ Chapter 4 – Security Operations
• Cover.
PURPOSE
4-1. The squadron performs security missions to provide
information about the threat and terrain, to prevent the main body
from being surprised, and to preserve the combat power of friendly
forces for decisive deployment. Critical information includes the size,
composition, location, direction, and rate of movement of the threat.
Terrain information focuses on obstacles, avenues of approach, and
key terrain features that impact the movement of either force. The
intent is to provide information that gives the main body commander
the reaction time and maneuver space necessary to effectively fight
the threat.
FUNDAMENTALS
4-2. Successful security operations are planned and performed
maintaining these five fundamentals:
• Orient on the main body.
• Perform continuous reconnaissance.
• Provide early and accurate warning.
• Provide reaction time and maneuver space.
• Maintain threat contact.
4-3
FM 3-20.96 ____________________________________________________________________________
4-4
__________________________________________________________ Chapter 4 – Security Operations
PLANNING CONSIDERATIONS
4-8. The squadron can conduct security operations across the full
spectrum of conflict (stability operations and support operations,
smaller-scale contingency [SSC], and major theater of war [MTW])
and in all types of terrain (open/rolling to complex/urban) to collect,
analyze, and provide intelligence information for the brigade, allowing
the brigade time to plan, prepare, and/or deploy against expected or
unexpected threat activities.
4-9. In order for the squadron to conduct effective security, the
brigade commander must issue guidance that contains at a
minimum:
• Focus.
• Tempo.
• Engagement/displacement criteria.
4-5
FM 3-20.96 ____________________________________________________________________________
ENGAGEMENT/DISPLACEMENT CRITERIA
4-13. Engagement criteria establish what the troops are expected to
engage and what they are expected to hand over to the brigade.
Conversely, by understanding what the brigade commander
requires/expects the squadron to destroy, coupled with his
understanding of the threat’s most likely course of action (COA), he is
able to identify the troop’s engagement criteria. This enables troop
commanders to focus certain weapons systems or to develop
engagement areas and plan for the destruction of specified threat
elements if encountered. Displacement criteria are tied to
engagement criteria in that the squadron orders or establishes
displacement based on what the squadron can or cannot destroy, or
when the determined end state is met. The main body commander
should define what events, or triggers, will cause the screen to be
collapsed, such as a certain size force or specific element of the
threat formation reaching a given point. The squadron recce
commanders utilize surveillance troop assets to assist in maintaining
contact and/or executing hand over to follow-on units.
4-14. Additional security planning considerations are—
• Information received from higher.
• The overall focus for the security mission.
• The AO.
• The brigade commander’s intent and commander’s critical
information requirements (CCIR).
• Critical tasks to be accomplished.
• Task organization and attachments.
• Personnel and equipment capabilities and limitations.
• Operational tempo (OPTEMPO).
4-6
__________________________________________________________ Chapter 4 – Security Operations
SECTION II – SCREEN
4-7
FM 3-20.96 ____________________________________________________________________________
CRITICAL TASKS
4-8
__________________________________________________________ Chapter 4 – Security Operations
STATIONARY SCREEN
MAIN BODY COMMANDER’S GUIDANCE
4-25. The main body commander should provide the squadron
commander with guidance containing the following considerations:
Augmentation
4-26. Augmentation is any additional assets the squadron unit
receives to conduct the mission. This may include ground maneuver
forces, aviation assets, artillery, air defense, engineers, or additional
logistical support. Augmentation from the brigade can include an
antiarmor platoon or company, an MGS platoon, a recce platoon, a
sniper squad(s), infantry company, or an engineer platoon. The
squadron can expect tanks, Bradleys, and attack aviation when
supporting heavy or light divisions. Refer to Chapter 6 for additional
support assets.
The General Trace of the Screen and the Time the Screen Must Be Established
4-27. A phase line (PL) placed along identifiable terrain graphically
indicates the trace. Consideration should be given to the amount of
early warning, range of indirect fires, desired main body maneuver
space, and fields of observation. When screening forward of the
brigade, this PL represents the forward line of own troops (FLOT) and
may be along or close to a coordinated fire line. Placing screening
forces beyond the trace line requires approval of higher
headquarters, and will usually require modification of fire support
coordination measures (FSCM).
The Width of the Screened Sector
4-28. The tasks required of a screening force are minimal compared
to other security missions. Therefore, the screening force may be
assigned a wide frontage. Depending on terrain and threat, each
recce troop can screen up to a nine-kilometer-wide sector, maintain
continuous surveillance of up to six battalion-size avenues of
4-9
FM 3-20.96 ____________________________________________________________________________
4-10
__________________________________________________________ Chapter 4 – Security Operations
4-11
FM 3-20.96 ____________________________________________________________________________
4-12
__________________________________________________________ Chapter 4 – Security Operations
4-13
FM 3-20.96 ____________________________________________________________________________
Fire Planning
4-42. Fire planning integrates artillery; mortars (troop level); direct
fires; and if allocated, attack aviation and CAS. Planning starts with
the brigade’s fire support plan, which includes assigned essential fire
support tasks (EFST). The squadron provides bottom-up refinement
as required. The planning must consider the brigade commander’s
intent for the screen—if it is to report only, to disrupt, or to
destroy/delay specific elements of the threat’s formations. Targets
should be planned on likely approaches at choke points or areas
where the threat must slow down. Indirect and direct fires should be
planned in conjunction with any obstacles the squadron emplaces.
Engagement areas are planned to focus fires at points along the
likely threat avenues of approach where it is most possible to achieve
the desired effects. It is critical that the brigade clearly identify what
supporting artillery is available for the squadron, the command
relationship, their tactical mission, the communication/digital
linkages, and artillery positioning plans.
Mobility and Survivability
4-43. Engineers, if attached, may be available for specific tasks.
Typical engineer tasks are survivability, improvement of combat
roads and trails, and emplacement of situational obstacles.
Situational obstacles are those planned and possibly prepared, but
not executed until specific criteria are met. Therefore, units may or
may not execute situational obstacles, depending on the situation
that develops during the battle. They are “be prepared” obstacles and
provide the commander flexibility for emplacing tactical obstacles
based on battlefield development. FM 3-34.1 [FM 90-7] provides
specific considerations for planning situational obstacles. Generally,
Volcano is the most frequently used situational obstacles since they
can be rapidly and precisely emplaced with set destruct times. In
screen operations, situational obstacles can be used both to disrupt
and delay the threat (in conjunction with indirect and direct fires),
and to protect elements of the squadron.
Command and Control and Combat Service Support
4-44. In most instances, both the squadron tactical command post
(TAC CP) and main CP must be operational to support C2 over
extended distances and to maintain digital linkages with brigade
headquarters and its subordinate elements. Initial and subsequent
locations of the main CP must be integrated into the brigade’s
communication plan to ensure continuous mobile subscriber
equipment (MSE) connectivity if digital connectivity is to be
maintained. Combat service support (CSS) assets should be prepared
for operations extended in both time and space. Depending on the
threat situation and the length of supply lines, the squadron may
have to dedicate combat assets to securing logistical convoys.
Additionally, squadron assets operating well forward of or to the
flank of brigade may need to be supported by the closest infantry
battalion. This must be determined early in the planning process to
allow the infantry battalion time to plan for and position assets to
provide CSS to the squadron assets.
4-14
__________________________________________________________ Chapter 4 – Security Operations
Planning Considerations
4-45. The staff also considers the following factors when developing
the squadron concept (see also FM 3-20.971 and FM 3-20.98 [FM 17-
98]). Listed are basic considerations at troop level:
• Mission.
• Squadron commander’s essential guidance.
• Orientation of the screen.
• Tasks for augmentation, such as UAVs; GSR/nuclear,
biological, and chemical (NBC) sensors; antitank systems;
assault guns (refer to Chapter 6).
• Direct/indirect fire planning.
• Graphic control measures.
• Initial OP locations.
• Patrol requirements.
• Positioning C2/CSS assets.
• Coordination with friendly and supported unit.
SURVEILLANCE TROOP COMMANDER’S CONSIDERATIONS
4-46. The surveillance troop commander considers the following:
• UAV rotation plan.
• Army airspace command and control (A2C2)
planning/coordination.
• Positioning C2/CSS assets.
• Graphic control measures.
• Systems emplacement (when operating pure).
• Linkup with recce troops.
4-15
FM 3-20.96 ____________________________________________________________________________
4-16
__________________________________________________________ Chapter 4 – Security Operations
4-52. The brigade commander does not set a time (tempo) for the
screen to end; rather, he defines the events, or triggers, that will
cause the screen to be collapsed through the following
engagement/displacement criteria:
• Destruction of any threat light or motorized
reconnaissance.
• Destruction and/or harassment of HPTs.
• Displacement upon location of threat main body and
determination of its avenue(s) of approach.
Squadron Planning
4-53. After receiving guidance, the squadron commander, S2, and
surveillance troop commander begin planning with the brigade staff
to synchronize the squadron’s plan with the brigade’s ISR plan. This
results in development of IPB products, including NAIs.
Concurrently, the squadron executive officer (XO) prepares the staff
for the orders process. Some actions for preparation include—
• Acquiring initial brigade graphics (digital, through
Maneuver Control System [MCS]; and/or traditional).
• Conducting terrain analysis.
• Updating intelligence information of the area.
• Identifying and coordinating for intelligence assets
available to support the mission (reach-back through the
brigade).
4-17
FM 3-20.96 ____________________________________________________________________________
4-61. The squadron commander also briefs his recce troops on the
following planning considerations:
• Coordination for UAVs and/or sensors to assist in depth
or to cover gaps in observation.
• Rehearsals of security drills, battle handover, passage of
lines, and CSS operations.
• Use of organic brigade artillery assets.
4-18
__________________________________________________________ Chapter 4 – Security Operations
4-19
FM 3-20.96 ____________________________________________________________________________
4-20
__________________________________________________________ Chapter 4 – Security Operations
4-21
FM 3-20.96 ____________________________________________________________________________
4-22
__________________________________________________________ Chapter 4 – Security Operations
4-23
FM 3-20.96 ____________________________________________________________________________
MOVING SCREEN
4-76. Given the nature of US Army doctrine and the capabilities of
the brigade, the majority of the operations undertaken will be
offensive, usually operating over extended distances. The same
planning considerations discussed above apply to a moving screen.
Emphasis may shift since the main body is moving. The squadron
may be required to conduct moving flank screens, and potentially
screen the rear of the brigade as it attacks. Screening the rear of a
moving force is essentially the same as a stationary screen. As the
protected force moves, the squadron occupies a series of successive
screens. Movement is regulated by the requirement to maintain the
time and distance factors desired by the main body commander.
UAVs or sensors may assume the screen during movement of ground
troops, or work to extend the areas of coverage.
4-77. The moving flank screen poses additional considerations. The
width of the screen sector is not as important as the force being
protected and the threat avenues of approach that might affect the
main body’s movement. The squadron screens from the front of the
lead combat element of the main body to the rear of the protected
4-24
__________________________________________________________ Chapter 4 – Security Operations
elements (excluding front and rear security forces). The combat trains
moves with the squadron, and the field trains moves with the brigade
support battalion (BSB) in the main body.
4-78. There are three basic techniques for occupying the screen.
The technique, or combination of techniques, is determined by the
threat situation and the knowledge available on the threat, the
brigade commander’s intent, and the speed that the main body is
moving.
4-79. In the first technique, the squadron crosses the line of
departure (LD) separately from the main body and conducts a tactical
road march along a route of advance parallel to the main body. Scout
platoons occupy OPs as they reach them. This is the fastest but least
secure technique. UAVs are well suited to maintain contact with the
main body and to perform reconnaissance forward of the squadron.
Sensors can also occupy OPs and provide long-range surveillance of
threat avenues of approach. This technique is appropriate when the
main body is moving very quickly, the LD is not a line of contact, or
IPB indicates threat contact is not likely in the area through which
the squadron is moving.
4-80. In the second technique, the squadron crosses the LD
separately from the main body and conducts a zone reconnaissance
forward. Screen positions are occupied as they are reached. This
technique is slower, but provides better security to the squadron.
This technique is appropriate when the main body is moving slower,
the LD is not a line of contact, or IPB indicates threat contact is
possible in the squadron area.
4-81. In the third technique, the squadron crosses the LD with the
main body and conducts a zone reconnaissance out to the screen.
This technique provides the most security for the squadron and main
body, but requires more time. This technique is appropriate when the
main body is moving slowly, the LD is the line of contact, or the
threat situation is vague or expected.
4-82. These three methods are summed up in Figure 4-8 below.
4-25
FM 3-20.96 ____________________________________________________________________________
LIMITED VISIBILITY
4-85. Limited visibility conditions often occur during screen
missions. The squadron and troop commanders accommodate the
screen to limited visibility conditions as they occur. FBCB2,
enhanced night vision devices (NVD), and target acquisition systems
reduce the impact of limited visibility conditions, but the screen must
never be left with gaps when aircraft cannot fly or scouts cannot
observe. Ground OPs can be adjusted; night and thermal observation
devices employed; electronic surveillance devices and forward looking
infrared radar (FLIR) activated; and trip flares, sensors, and OPs
placed along dismounted avenues of approach. Depth in the screen
4-26
__________________________________________________________ Chapter 4 – Security Operations
NOTE: The squadron relies on the brigade to provide combat assets to perform offense
and defense actions if the threat situation dictates.
4-27
FM 3-20.96 ____________________________________________________________________________
NOTE: See Appendix D for a more detailed discussion of troop missions supporting
stability operations and support operations.
4-28
__________________________________________________________ Chapter 4 – Security Operations
4-29
FM 3-20.96 ____________________________________________________________________________
4-30
__________________________________________________________ Chapter 4 – Security Operations
4-31
FM 3-20.96 ____________________________________________________________________________
4-101. Threat forces may try to sever supply routes and lines of
communication by various methods. Roads, waterways, and railways
may be mined; ambush sites can be located adjacent to the route
being secured; or bridges and tunnels can be destroyed by
demolitions. Due to the nature of this mission, very long routes may
be extremely difficult to secure; however, measures can be enforced
to reduce the effect of threat forces. Figure 4-11 depicts a squadron
conducting a route security mission.
4-102. Patrolling the route, mounted and/or dismounted, increases
the chances of detecting threat forces before they can effectively
emplace mines or demolitions, or establish ambushes or roadblocks.
Patrolling is performed regularly, but not in an established routine
manner. This precludes possible ambushes and helps detect threat
forces. Patrols can be covert or overt (used as a demonstration of
force or presence patrol) to deter threat actions. Patrols must be
aware of probable ambush sites and choke points where roadblocks
or mines and demolitions would be effective. Personnel conducting
patrols must be trained to detect mines and booby traps.
4-103. Patrols are organized with enough combat power to survive
initial threat contact. Recent threat activity provides guidance on the
organization of patrols. Patrols can be augmented with combat
engineers, infantry (both light and mechanized forces), military
police, or other assets, when available, to increase their combat
capability. Usually, lack of combat power prohibits a patrol’s ability
to deal with large threat forces; therefore, indirect fire plans and air
attack assets, when available, should be integrated into the patrol
plan.
4-32
__________________________________________________________ Chapter 4 – Security Operations
4-33
FM 3-20.96 ____________________________________________________________________________
4-34
__________________________________________________________ Chapter 4 – Security Operations
4-35
FM 3-20.96 ____________________________________________________________________________
4-36
__________________________________________________________ Chapter 4 – Security Operations
4-37
Chapter 5
Enabling Operations
Enabling operations are CONTENTS
specialized missions Movement ...............................................................5-2
Administrative Movement .................................5-2
that need to be planned Tactical Movement ............................................5-2
and/or conducted in Planning Considerations ..................................5-4
Assembly Areas .....................................................5-8
conjunction with on- Site Selection .....................................................5-9
going or future combat Quartering Party ................................................5-10
Occupation.........................................................5-11
operations to achieve or Security ..............................................................5-12
sustain tactical advan- Internal Activity..................................................5-12
tage. The fluid nature Departure............................................................5-12
Infiltration/Exfiltration ...........................................5-12
of the modern battle- Infiltration Planning...........................................5-12
field increases the Exfiltration Planning..........................................5-16
Linkup Operations .................................................5-17
frequency that the Forms of Linkup ................................................5-18
squadron is required to Planning .............................................................5-20
Preparation.........................................................5-22
plan and execute other Execution ...........................................................5-23
tactical operations. Relief Operations...................................................5-23
Planning .............................................................5-24
Digitization increases Exchange of Plans and Liaison Personnel .....5-25
the situational under- Sequence of Relief ............................................5-25
Passage of Command .......................................5-25
standing (SU) of leaders Reconnaissance ................................................5-25
at all levels during Security ..............................................................5-26
Movement Control .............................................5-26
these complex and Methods of Relief in Place ................................5-26
often decentralized Retrograde Operations .........................................5-27
Requirements of Retrograde Operations ........5-28
operations. This Forms of Retrograde Operations .....................5-29
chapter addresses Battle Handover and Passage of Lines ...............5-32
Battle Handover: Squadron and Above ...........5-33
several com-bat Battle Handover: Squadron and Below ...........5-34
operations that the Passage of Lines ...............................................5-34
NBC Defensive Operations ...................................5-40
squadron may be NBC Reconnaissance .......................................5-40
required to perform. Principles ...........................................................5-42
Actions Before, During, and After
These operations are an NBC Attack................................................5-44
considered a routine Use of Smoke and Obscurants ........................5-47
River Crossing Operations ...................................5-48
part of the combat Reconnaissance ................................................5-49
operations discussed in Crossing .............................................................5-50
Fire Support .......................................................5-50
preceding chapters; Follow-on Forces...............................................5-51
however, they are no Obstacle Breaching Operations ...........................5-51
Breaching Fundamentals..................................5-52
less important. Breaching Organization ....................................5-54
Operations in a Noncontiguous Environment ....5-58
5-1
FM 3-20.96 ____________________________________________________________________________
SECTION I – MOVEMENT
ADMINISTRATIVE MOVEMENT
5-3. Administrative movements occur in the communications zone
to deploy or reposition forces. The S4 is responsible for planning these
movements. Administrative movements are normally controlled closely
by, and coordinated with, a movement control center responsible for
the communications zone. Administrative movement includes
reception, staging, onward movement, and integration (RSOI) activities
as a part of the brigade’s deployment into an area of operations (AO).
For discussion of deployment and RSOI, refer to Appendix E and FM 4-
01.8
[FM 100-17-3].
5-4. Movements are normally conducted as road marches. A road
march is characterized by the following factors:
• Unit relocation, when threat contact is not expected.
• Prescribed rates of march and intervals.
• Rapid movement.
• Security.
TACTICAL MOVEMENT
5-5. Tactical movement is the movement or maneuver to gain
contact with the threat or movement during which contact is
anticipated. In a tactical movement, elements are organized to facilitate
combat. Movement in the combat zone of corps or below is considered
tactical, as is movement in and around the AOR while conducting
stability or support operations. This movement is planned by the
G3/S3 and often precedes a combat operation. In rear areas these
movements are also coordinated with movement control centers. A
5-2
_________________________________________________________ Chapter 5 – Enabling Operations
TACTICAL ROADMARCH
Organization
5-7. Successful movements are well organized. The organization of
the unit for a road march is suited for inclusion in the unit standing
operating procedures (SOP) to delineate tasks and responsibilities.
Movement control is a key consideration in planning. The commander
and staff are involved in planning, supervising, and refining execution
of the movement. Both the commander and S3, however, will also be
concerned with plans for the tactical commitment of the unit once the
march objective is reached. The details of movement planning and
supervision are largely the responsibility of the XO who serves as the
movement control officer.
5-8. Units organize into march columns to conduct movement. A
march column includes all elements of a force using the same route for
a single movement under the control of a single commander. Whenever
possible, a unit marches in multiple columns over multiple routes to
reduce closing time. A large column may be composed of a number of
subdivisions, each under the control of a subordinate commander.
March columns are composed of four elements:
• Reconnaissance party.
• Quartering party.
• Main body.
• Trail party.
5-3
FM 3-20.96 ____________________________________________________________________________
5-4
_________________________________________________________ Chapter 5 – Enabling Operations
PLANNING CONSIDERATIONS
5-14. Movement is considered as either deliberate or hasty.
Deliberate movement occurs when plenty of time is available to plan
and prepare, resulting in a detailed and well-coordinated plan. This
typifies administrative movements or long tactical movements. Hasty
movement occurs when time is short. This typifies tactical movements,
often when the squadron is in receipt of a fragmentary order (FRAGO)
for a combat operation. Hasty movement normally does not involve
crossing corps, division, joint task force or national boundaries,
although the squadron can find itself moving across the parent unit
AO, especially in a noncontiguous/nonlinear environment.
5-15. Movement planning is heavily determined by backwards
planning. The mission following the movement drives the planning,
which includes establishment of movement completion times, pass
times, start point times, and organization of the unit for the march.
5-16. The march discipline necessary to execute a road march with
routine precision can only be attained by strict adherence to SOP. This
is particularly true for hasty movements. The unit SOP must provide
for the following:
• Reconnaissance party.
• Quartering party.
• March rate factors.
• Vehicle intervals.
• March unit gaps.
• March unit organization and order.
• Actions on contact.
• Actions at halts.
• Security.
• Contingency plans for vehicle breakdowns, breaks in
columns, and lost vehicles.
• Communications.
• Trail party.
• Control measures.
• Road march tables and movement planning guides.
5-17. Planning for a road march is conducted like any other mission.
As the XO develops the concept he considers the following:
• Time available.
• Distance of the move.
• Current situation.
• Follow-on mission.
• Availability and condition of routes.
• Squadron task organization.
5-5
FM 3-20.96 ____________________________________________________________________________
60 1 2 3 4 5 6 7 8 9 10
50 1.2 2.4 3.6 4.8 6 7.2 8.4 9.6 10.8 12
40 1.5 3 4.5 6 7.5 9 10.5 12 13.5 15
30 2 4 6 8 10 12 14 16 18 20
25 2.4 4.8 7.2 9.6 12 14.4 18.8 19.2 21.6 24
20 3 6 9 12 15 18 21 24 27 30
15 4 8 12 16 20 27 2/ 32 36 40
10 6 12 18 24 30 36 72 48 54 60
5 12 24 36 48 60 72 84 96 108 120
MOVEMENT RATES REDUCED TO MINUTES
KILOMETERS PER
METERS PER MINUTE MILES PER HOUR KNOTS FEET PER SECOND
HOUR
60 1,000 38 33 55
50 830 31 27 46
40 666 25 27 46
30 500 19 16 28
5-6
_________________________________________________________ Chapter 5 – Enabling Operations
25 416 16 13 23
20 333 13 11 18
15 250 9 8 14
10 164 6 5 9
5 83 3 3 5
1 16 .6 .5 1
5-7
FM 3-20.96 ____________________________________________________________________________
5-8
_________________________________________________________ Chapter 5 – Enabling Operations
rates of march, and time gaps. These three variables provide the most
flexibility in adjusting movement times.
REDCON LEVELS
LEVEL PREPAREDNESS SECURITY
• Ready to move on order
• All personnel alert 100% weapons systems
REDCON 1
• All equipment packed manned
5-9
FM 3-20.96 ____________________________________________________________________________
SITE SELECTION
5-25. Site selection of an assembly area is governed by specific unit
requirements. The squadron can occupy one assembly area, or operate
out of separate troop/command and control (C2)/combat service
support (CSS) level assembly areas. Determination on what level
should occupy a site should include—
• The AO and squadron mission.
• The size of the area available to occupy.
• The level of threat and range of its indirect fire assets.
• The ability to secure the area.
• The operational tempo (OPTEMPO) of the squadron
(multiple missions occurring simultaneously).
5-10
_________________________________________________________ Chapter 5 – Enabling Operations
QUARTERING PARTY
5-28. Quartering parties are formed at troop level, and when
appropriate, at squadron level. They are a composite of subordinate
unit representatives. The squadron party also includes medics,
communications, and staff representatives. The 1SGs control troop-
level parties and the CSM controls the squadron party. The quartering
party provides for its own security.
5-29. Quartering parties have four responsibilities: reconnaissance (if
reconnaissance parties are not used), securing the area, organizing the
area, and guiding arriving units. During tactical unit movement, the
reconnaissance party can perform area reconnaissance as a follow-on
mission. The surveillance troop can deploy UAVs to perform
reconnaissance of the route to the assembly area and the assembly
area itself prior to or as part of the reconnaissance party’s operation.
The nuclear, biological, and chemical (NBC) platoon of the surveillance
troop can conduct NBC reconnaissance of the area in conjunction with
the quartering party prior to occupation of the assembly area by the
main body.
5-30. Area reconnaissance is performed to determine suitability of
the area. The quartering party also provides initial security of the area
until the main body arrives. The surveillance troop can assist the
quartering party secure the assembly area by conducting screening
missions with UAVs and surveillance of possible threat avenues of
approach. Organizing includes selecting and marking unit and vehicle
5-11
FM 3-20.96 ____________________________________________________________________________
OCCUPATION
5-31. A squadron assembly area can be organized by assigning
troops to sectors of the perimeter, by dispersing troops in their own
assembly area within the squadron area (as shown in Figure 5-2), or as
previously mentioned, units occupying separate assembly areas within
the AO.
NOTE: While the surveillance troop has its own assembly area, some of its assets may
be operating within another troop’s area, thus the presence and movement of
those assets must be coordinated between the troops, the S3, and the S2.
5-12
_________________________________________________________ Chapter 5 – Enabling Operations
5-13
FM 3-20.96 ____________________________________________________________________________
SECURITY
5-33. An assembly area is not designated as a defensive position, but
the squadron or troop organizes it to detect and defeat a threat ground
attack. Security against air attack is best provided by passive
measures designed to conceal the unit from detection. Guards at all
entrances and exits control the flow of traffic. Observation posts (OP)
cover key terrain features and likely avenues of approach. Platoons
prepare fire plans and coordinate on the flanks. Patrols, sensors, and
surveillance devices augment security. Contact points for units assist
in coordination. Roads are the specific responsibility of subordinate
units. Fire support plans are prepared by the fire support team and
fire support element. Minimal use of radios reduce electronic
signature. Movement is confined to roads to preclude needless surface
disruption, leaving a visible aerial indicator. Unnecessary vehicle
movement is restricted. Noise and light discipline is strictly enforced.
REDCON level is established and adjusted based on mission, enemy,
terrain and weather, troops and support available, time available, and
civil considerations (METT-TC). Units must consider the location and
activities of surveillance troop assets operating within the AOR, and
coordinate with those assets for mutual security.
INTERNAL ACTIVITY
5-34. Actions in the assembly area follow SOP and requirements of
the situation. Planning, orders, resupply, reorganization, vehicle and
aircraft maintenance, weapons maintenance, and rest occur in
accordance with the established REDCON level. For pending combat
operations, precombat checks and inspections occur. For daily
operations, include conduct of stand-to per unit SOP. Reconnaissance
of routes out of the area is made to prepare for departure and initiation
of the follow-on mission.
DEPARTURE
5-35. Departing the assembly area is the first step of a mission and is
just as important as the mission itself. A progressive system of
increasing readiness, such as REDCON levels, ensures units are ready
to move when required without needlessly tiring soldiers and wasting
fuel for long waits. The assembly area is occupied with the follow-on
mission in mind to preclude congestion on departure. Routes from
subordinate unit locations are reconnoitered and timed. Subordinate
units designate a linkup point and units move to and through that
point based on their reconnaissance. Departure is usually conducted
under radio listening silence.
INFILTRATION PLANNING
5-36. Infiltration is a form of maneuver that entails movement
through or into an area occupied by a threat or a friendly force by
5-14
_________________________________________________________ Chapter 5 – Enabling Operations
5-15
FM 3-20.96 ____________________________________________________________________________
METHOD
5-42. The squadron can move as a whole by infiltration or by
individual troops. Infiltration can be executed mounted, dismounted,
or a combination of the two. Dismounted scouts can infiltrate by foot,
vehicle, rotary-wing aircraft, or watercraft to the objective depending on
the availability of equipment and type of mission.
5-16
_________________________________________________________ Chapter 5 – Enabling Operations
Multiple-lane Infiltration
5-45. This is the preferred method of infiltration. The recce troop
infiltrates by multiple lanes when two or more gaps are found through
the threat defense (see Figure 5-4).
5-17
FM 3-20.96 ____________________________________________________________________________
COMMUNICATIONS
5-46. C2 is greatly enhanced by FBCB2 for the decentralized
movements occurring during infiltration. Radio listening silence should
be enforced, except when the unit obtains information that the
commander has directed them to report immediately or when the
threat detects the reconnaissance element.
FIRE SUPPORT
5-47. Indirect fires are always planned, but only used by the recon
element if it makes contact, or if the commander employs fires at
another location to divert attention from the infiltration lane.
ACTIONS ON CONTACT
5-48. When reconnaissance elements infiltrate in multiple lanes, the
detection of one subordinate element may alert the threat and
compromise the entire mission. If detected, subordinate elements will
return fire, break contact, and report. If the reconnaissance unit
makes visual contact, but is not detected, it should continue the
mission. The commander’s intent must clearly state what the unit
should do upon contact with the threat.
EXFILTRATION PLANNING
5-49. Exfiltration is the removal of personnel or units from areas
under threat control by stealth, deception, surprise, or clandestine
means. If the squadron infiltrates to conduct its mission, it may be
required to exfiltrate once the mission is complete. In other instances,
units within the squadron may be deliberately employed in a stay-
behind mode during brigade operations. Exfiltration should be planned
as carefully as infiltration, particularly if contact with the threat has
occurred during the mission. The commander must plan for
contingency measures should conditions force the reconnaissance unit
to conduct an unplanned exfiltration. If surveillance troop assets are
operating within a given recce troop’s AOR, and they are tasked in the
ISR OPORD to accompany that recce troop during exfiltrations, it is the
responsibility of the recce troop commander to ensure the surveillance
assets are accounted for in infiltration planning and execution.
5-50. The same planning considerations for infiltration should be
applied to exfiltration. Plans for extraction by applicable means (air,
ground, or water) should be made before the mission, with
contingencies covering possibilities such as loss of vehicles, evacuation
of sick and wounded personnel, and loss of communications.
Additional considerations include—
• Pick-up points.
• Methods of exfiltration.
PICK-UP POINTS
5-51. Exfiltration pick-up points for dismounts should be far enough
away from the OP to ensure the threat does not hear vehicle or
helicopter noises. Mountains, dense foliage, and other similar terrain
5-18
_________________________________________________________ Chapter 5 – Enabling Operations
features can mask these noises. Movement routes are planned that put
ridgelines, rivers, and other restrictive terrain between the unit and
threat forces. Primary and alternate linkup points should never be on a
single azimuth leading away from the OP of an exfiltration route.
Exfiltration operations require additional time to build in a buffer
against unforeseen circumstances, such as inadvertent contact with
threat forces or unexpected restrictive terrain.
METHODS OF EXFILTRATION
5-52. Exfiltration can be accomplished via land, air, or water. In the
event that dismounted scouts are utilized in a stay-behind mode
(withdrawal or delay), exfiltration by land with its organic vehicles is
the most preferable method. Exfiltration by land is used when—
• Friendly lines are close.
• No other method is feasible.
• Areas along the route are largely uninhabited.
• Threat forces are widely dispersed.
• Threat forces are not conducting aggressive/active
counterreconnaissance and security.
• Terrain degrades threat ability to maneuver against
exfiltration unit.
5-54. The OPORD must also address contingencies and actions the
reconnaissance unit will take for both planned and unplanned
exfiltration.
5-19
FM 3-20.96 ____________________________________________________________________________
FORMS OF LINKUP
5-59. Regardless of the purpose of the linkup, in execution, the
operation takes on one of two forms—moving and stationary or two
moving forces.
5-20
_________________________________________________________ Chapter 5 – Enabling Operations
FSCM
LINKUP OPERATIONS
EARLY STAGES
LINKUP FORCE
LINKUP
POINT
FSCM
LINKUP OPERATIONS
LAST STAGE
RFL
LINKUP FORCE
RFL
5-21
FM 3-20.96 ____________________________________________________________________________
PLANNING
5-63. The headquarters directing the linkup establishes the
command relationship between the forces involved and the
responsibilities of each force. Normally both forces remain under the
control of the headquarters directing the linkup. If this headquarters
cannot adequately control the operation, responsibility is delegated to
one of the forces involved. Operational control (OPCON) is the normal
command relationship used. Often the moving unit is placed under
5-22
_________________________________________________________ Chapter 5 – Enabling Operations
5-23
FM 3-20.96 ____________________________________________________________________________
PREPARATION
5-70. Due to the time-sensitive nature of the operation, the squadron
commander issues his order and attempts to at least walk the troop
commanders through the operation. He particularly stresses the
linkup and the coordination required to effect the linkup without
confusion. The squadron commander’s major concern is that his
leaders do not lose sight of their objective—the linkup.
5-71. The squadron fire support officer (FSO) ensures that his
counterpart force in the linkup operation, whether moving or
stationary, has the squadron’s fire support plan. Specifically, he
ensures all FSCMs are completely understood by both forces. Further,
if any control measures are changed during the operation, the
conditions and signals under which the change takes place must be
coordinated.
5-72. CSS elements organize as for any offensive operation; however,
they may hug the rear of the combat forces for security on the move up
5-24
_________________________________________________________ Chapter 5 – Enabling Operations
to the linkup. They may carry additional supplies if required for the
other force. The S4 also ensures that each unit understands the main
supply route (MSR) and alternate MSR, to include traffic control. In
particular, he pushes as much materiel forward as possible during the
operation. This is because the squadron will expend resources during
the attack and any other mission that may occur after the actual
linkup.
EXECUTION
5-73. The initial conduct of the linkup is similar to a zone
reconnaissance, depending on the threat situation. Through the use of
digital intelligence information-gathering systems, the relationship of
friendly forces to threat forces should be clear. This allows the
squadron commander to better prepare or react to the current threat
situation. As the squadron begins its maneuver, it attempts to
establish and maintain contact with its corresponding friendly force.
Each force monitors the progress of the other, making adjustments to
the plan as necessary. For example, if the linkup force is unable to
travel at a speed commensurate with the plan, yet the breakout force is
making a very rapid advance, the location of the linkup point may be
moved closer to the linkup force. Similarly, FSCMs are also moved.
5-74. As the two forces draw closer, the momentum of the operation
slows to help prevent fratricide. The tradeoff may be that some threat
forces may slip between the two closing forces. Coordination signals
are used to identify each force as they approach the linkup point. The
forces should be able to monitor each other’s location via FBCB2 and
take the appropriate actions. If possible, the forces attempt to establish
contact on a designated FM frequency to control the actual linkup.
5-75. FSCMs are changed based on the progress of the forces and the
threat situation. An RFL is placed into effect to prevent fratricide
between the converging forces. Once the linkup has occurred, the fire
support units supporting the squadron and its linkup force are
organized in accordance with the higher headquarters plan for future
operations.
5-25
FM 3-20.96 ____________________________________________________________________________
5-26
_________________________________________________________ Chapter 5 – Enabling Operations
5-78. The squadron will most typically be the unit being relieved, for
either reconsolidation/reorganization, or to proceed with another
mission. When a maneuver unit relieves the squadron, the task
organization normally does not resemble that of the squadron very
closely. This is considered in determining the method of relief.
PLANNING
5-79. The primary purpose for a relief in place is to maintain the
combat effectiveness of committed elements. A relief in place should be
conducted during a lull in combat, if possible. The digital systems of
the Stryker brigade combat team (SBCT) enhance the planning and
facilitate synchronization of a relief in place. When used properly,
digital systems provide the tools to build a complete picture of the area
over which the incoming commander will assume control. As part of
the planning, coordination, and synchronization process, the incoming
and outgoing commanders should provide digital overlays to one
another outlining the following:
• Friendly situation.
• Threat situation.
• Fire support procedures and FSCMs.
• Friendly and threat obstacles by type and location.
• Primary, alternate, and supplementary friendly positions.
• Routes to/from the AO, to include checkpoints.
5-27
FM 3-20.96 ____________________________________________________________________________
SEQUENCE OF RELIEF
5-84. In determining the sequence of the relief, both commanders
should consider—
• Subsequent mission of the unit conducting the relief.
• Strength and combat efficiency of the unit presently in
place.
• Capability of the threat to detect and react against the
relief.
• Characteristics of the AO.
• Communications architecture.
PASSAGE OF COMMAND
5-85. The circumstances under which the incoming commander
assumes responsibility for the area must be clearly defined in the
OPORD. During the relief, the commander having responsibility for the
area, mission, and terrain management will exercise OPCON over all
subordinate units within his AO. Responsibility passes to the incoming
commander normally when digital/FM communications that will allow
effective C2 have been established and in excess of 50 percent of all
the units being relieved have been relieved.
RECONNAISSANCE
5-28
_________________________________________________________ Chapter 5 – Enabling Operations
SECURITY
5-87. The conduct of a relief in place must be accomplished by the
most covert means possible to prevent the threat from learning that a
relief is taking place. The following security measures should be taken:
• Restrictions on the size of advance parties and
reconnaissance parties must be enforced.
• Communications during the relief are conducted digitally
to the maximum extent possible. A common FM voice net
must be established between the two forces.
• Operations security (OPSEC) is enforced throughout the
operation.
MOVEMENT CONTROL
5-88. Strict movement procedures must be established and
coordinated between the incoming and outgoing units. The movement
along the routes will be tracked through FBCB2, giving the
commanders positive control and a common picture of the movement
of both units. Coordination between units can be extensively executed
through the sharing of digital overlays. Information must include the
following:
• Routes and checkpoints to be used and priorities for their
use.
• Responsibility for traffic control.
• Location of assembly areas.
• Common use of transportation.
• Unit maintenance collection point (UMCP) locations and
responsibilities.
• Aid stations and hospitals.
5-29
FM 3-20.96 ____________________________________________________________________________
5-30
_________________________________________________________ Chapter 5 – Enabling Operations
5-31
FM 3-20.96 ____________________________________________________________________________
5-32
_________________________________________________________ Chapter 5 – Enabling Operations
5-33
FM 3-20.96 ____________________________________________________________________________
WITHDRAWAL
5-105. A withdrawal is an operation in which all or part of the
squadron breaks contact to conduct a new mission, or it is conducted
in accordance with the brigade commander’s displacement criteria. The
withdrawal may be assisted or unassisted and may or may not be
executed under pressure from the threat. In either case, digitization is
used to share critical combat information, synchronize the withdrawal,
and maintain situational awareness. The two types of withdrawal are
under threat pressure and not under threat pressure.
• Withdrawal with Threat Pressure. The unit depends on
fire and movement to break contact with an attacking
threat force and then withdraws. Preferably, the
withdrawal is not under heavy pressure. Heavy pressure
may force the unit to transition into a delay.
• Withdrawal without Threat Pressure. The unit depends
on speed of execution and deception. If the unit is not
under attack, then the withdrawal is not under pressure.
5-34
_________________________________________________________ Chapter 5 – Enabling Operations
5-35
FM 3-20.96 ____________________________________________________________________________
tasks as designated. When the rest of the force is set, the DLIC
disengages and moves to the rear to join the main body.
RETIREMENT
5-115. Retirements are organized rearward movements conducted by
units not in contact. A retirement is usually conducted at night and
planned identical to a night tactical road march. Daylight movement
should be conducted only if necessary or if the threat is incapable of
interfering. Contingency missions are assigned to the squadron or
troops in case the threat makes contact. Security and speed are
important considerations when planning a retirement. Commanders
conducting a retirement must emphasize OPSEC during movement.
Additional considerations pertaining to planning and executing a
retirement as part of a larger force are outlined in FM 3-90.2 [FM 71-2]
and FM 3-91.123 [FM 71-123].
5-36
_________________________________________________________ Chapter 5 – Enabling Operations
5-123. For the engaged force, the most important task is to maintain
contact and continue the fight. The threat must continue to see the
level of activity that has been established. If the threat perceives that
the handover is occurring, it will most likely attempt to seize the
opportunity to destroy the friendly unit at a vulnerable moment.
5-124. In the brigade, passage of lines normally occurs at squadron
level. The brigade monitors progress and ensures coordination occurs
between the squadron and the maneuver units. The squadron is
5-37
FM 3-20.96 ____________________________________________________________________________
PASSAGE OF LINES
5-127. A passage of lines is a complex operation requiring detailed
coordination, extensive planning, and close supervision between units.
As such, the conduct of a passage of lines is a C2 challenge. The two
types of passage of lines are forward and rearward. The squadron uses
either method to move through friendly units to conduct its mission or
when mission is complete. The planning considerations are the same
as for battle handover, with these additional consideration and
coordination measures that need inclusion and integration at all levels
in the planning process:
• Exchange of intelligence information.
• Exchange of tactical plans.
• Exchange of SOPs.
• Arrangements for reconnaissance by elements of the
passing units.
• Security measures during passage.
• Selection of areas of passage and provisions for guides.
• Priorities for use of routes and facilities and provisions for
movement control. The passing unit must have priority.
5-38
_________________________________________________________ Chapter 5 – Enabling Operations
5-39
FM 3-20.96 ____________________________________________________________________________
outside direct fire range of the threat to allow the moving force to
deploy without being fired upon.
5-133. In either of the techniques described, there will be stationary
unit scouts on or near the BHL. The passing unit may have their scout
platoon link up with stationary unit scouts and continue the mission,
or may have combat units deploy along the BHL to overwatch
movement of other units. The units on the ground at the BHL must
know the scheme of maneuver of the passing force so they can act
accordingly. (See Figure
5-7.)
5-40
_________________________________________________________ Chapter 5 – Enabling Operations
5-41
FM 3-20.96 ____________________________________________________________________________
5-42
_________________________________________________________ Chapter 5 – Enabling Operations
PLANNING CONSIDERATIONS
5-140. The commander of the passing unit makes a tentative plan for
the conduct of the operation. While formulating the tentative plan,
consideration includes—
• Pertinent control measures related to the passage of lines
on the operations overlay (routes, passage lanes, passage
points, contact points, and BHL).
• Collocation of unit’s C2 vehicle with the stationary unit to
allow use of FBCB2 to update and distribute changes to
the plan.
• Task surveillance and/or ground troops to screen between
the threat and the passing unit to provide early warning
and protection to the main body.
• Ensuring the squadron signal officer (S6) coordinates FM
and EPLRS frequencies, IP addresses, COMSEC key, and
nets so the tactical internet is established to support
situational awareness.
5-141. Control measures normally used in a battle handover and
passage of lines are described in the following paragraphs.
• Assembly Area. An assembly area in the rear area of the
stationary unit allows the passing unit to conduct hasty
reorganization and emergency CSS actions. This assembly
area is temporary in nature.
• Battle Handover Line. The BHL is an easily identifiable
location where the stationary force assumes control of the
battle (used for a rearward passage of lines). This location
must permit the stationary force to engage the threat with
direct and indirect fire systems. It must be portrayed on
the operations overlay as a PL.
• Passage Points. Passage points should be concealed from
threat observation. Stationary unit guides may meet the
passing unit at the passage point.
• Passage Lanes. Passage lanes are established by the
stationary unit that allows the passing unit to move
quickly and uniformly through the stationary unit’s AO.
This could include passing through gaps in friendly
obstacles and moving near friendly engagement areas. The
passage lane begins at the passage point and ends at the
rear of the stationary unit positions. The passage is
considered complete when the moving unit exits the lanes.
• Passage Routes. Routes are not as restrictive as lanes.
Routes allow a passing unit to move more rapidly through
the stationary unit area. If a passage route is used in
conjunction with a passage lane, it begins where the
passage lane ends. The number of lanes/routes
designated will vary based on METT-TC considerations,
but as a general rule, multiple lanes/routes should be
planned to facilitate the rapid passage of the moving units
5-43
FM 3-20.96 ____________________________________________________________________________
5-44
_________________________________________________________ Chapter 5 – Enabling Operations
NBC RECONNAISSANCE
TACTICAL ORGANIZATION
5-149. Organic to the surveillance troop in the RSTA squadron, the
NBCRS platoon is equipped with three nuclear, biological, and
chemical reconnaissance system (NBCRS) vehicles. The NBCRS has a
crew of four who are protected from NBC contamination by an
overpressure system. The NBCRS is capable of day or night operations,
in all geographical areas, in adverse weather, and under all types of
battlefield conditions. The NBCRS is a high-speed, highly mobile,
wheeled light armored reconnaissance vehicle capable of performing
NBC reconnaissance on primary, secondary, or cross-country routes
throughout the battlefield. The NBCRS is not a fighting vehicle. It is a
scarce resource and vulnerable to damage or destruction by enemy
fire, and must be protected by dedicated security elements.
EMPLOYMENT TECHNIQUES
5-150. The NBCRS platoon can be employed to operate as a pure
element or decentralized, depending on METT-TC factors, decentralized
to respond to asymmetrical threats over a large operating environment.
The NBCRS platoon normally operates as one of three configurations:
5-45
FM 3-20.96 ____________________________________________________________________________
5-46
_________________________________________________________ Chapter 5 – Enabling Operations
Team Organization
5-151. The team is the normal organization for the RSTA squadron. In
this configuration, one NBCRS vehicle is paired with a security element
in each one of the three reconnaissance troops. This employment
method is a decentralized configuration designed to perform multiple
NBC R&S missions over vast areas. The organization facilitates NBC
reconnaissance and surveillance throughout the depth and width of
the brigade area of responsibility. This broadened R&S requirement is
achievable by planning and conducting a comprehensive vulnerability
and mission analysis and a coordinated IPB, by optimizing improved
C4ISR, and by integrating networked detectors and sensors into the
collection effort. Other potential team missions include surveillance of
key fixed sites such as airfields or ports. Regardless of the mission,
NBCRS vehicles require a security element or wingman to provide
conventional threat overwatch.
Squad Organization
5-152. A squad consists of two NBCRS vehicles and is the preferred
organization under most conditions, to include large area
reconnaissance, extended route reconnaissance, deliberate attacks,
and defensive operations. This configuration allows two NBCRS
vehicles to complement each other with their sensors in order to
maximize contamination avoidance and detection. When operating as a
pair, the squad can quickly find bypass routes around contamination
to avoid loss of maneuver force momentum or locate an
uncontaminated route. The third NBCRS in the squad configuration
can be used for NBC surveillance operations oriented on NAIs
developed during the IPB process as an integral part of the overall
intelligence collection effort or providing overwatch on key fixed sites.
Platoon Organization
5-153. The platoon configuration consists of all three NBCRS vehicles
operating in unison. This configuration is rarely formed with NBCRS in
the RSTA squadron since it provides little flexibility to the RSTA and
SBCT commanders. However, this configuration may be necessary
when larger contaminated areas or locations require extensive marking
or surveillance.
5-47
FM 3-20.96 ____________________________________________________________________________
PRINCIPLES
5-158. Three principles guide NBC defense. They are—
• Contamination avoidance.
• Protection.
• Decontamination.
COMTAMINATION AVOIDANCE
5-159. Understanding the NBC environment in the battlespace
provides identification of the current NBC hazards in air, water, or on
land; personnel, equipment or facilities; and the physical state of the
hazard (gas, liquid, or solid). This situational awareness promotes safe
contamination avoidance measures since hazards are identified and
located. Contamination avoidance allows the force to move around
hazards or relocate prior to hazard arrival. Detection and identification
is accomplished by integrated cooperative detection methods. This
includes the NBC platoon in the squadron, with point, standoff, and
remote sensing capabilities; unit-level and platform point detection. To
survive and accomplish the mission, individuals and units must take
5-48
_________________________________________________________ Chapter 5 – Enabling Operations
precautions to
avoid or minimize effects of initial and residual NBC hazards. The four
steps to contamination avoidance are—
• Passive defense measures.
• Warn and report NBC attacks.
• Locate and identify NBC hazards.
• Limit exposure to NBC hazards.
PROTECTION
5-162. Protecting the force prevents NBC casualties through reducing
the threat, contamination avoidance, and physical protection. Physical
protection provides the brigade with individual and collective
protection for a contamination-free environment for personnel and
equipment. The brigade will employ NBC collective protection systems
and NBC overgarments to enhance survivability of the brigade.
Through effective threat analysis, the brigade will initiate chemical and
biological agent pretreatment prior to deployment to provide an
effective defense against the physiological effects of the agents. See FM
3-11.4 [FM 3-4].
DECONTAMINATION
5-163. Sustaining the force following NBC contamination involves
decontamination. Decontamination is the process of making a person,
object, or area safe by absorbing, destroying, neutralizing, making
harmless, or by removing chemical or biological agents or radioactive
material clinging to or around it. Decontamination stops the erosion of
combat power and helps the unit avoid casualties. The three types of
decontamination are immediate, operational, and thorough.
Operational decontamination will be conducted with decontamination
assets organic to the forward support companies. The squadron will
5-49
FM 3-20.96 ____________________________________________________________________________
5-50
_________________________________________________________ Chapter 5 – Enabling Operations
5-51
FM 3-20.96 ____________________________________________________________________________
MOPP
MOPP LEVELS COMMAND
EQUIPMENT
MOPP
MOPP ZERO MOPP 1 MOPP 2 MOPP 3 MOPP 4 MASK ONLY
READY
1
Mask Carried Carried Carried Carried Worn Worn Worn
2 3 1 1 1
Overgarment Ready Available Worn Worn Worn Worn
2 3 3
Vinyl overboot Ready Available Available Worn Worn Worn
2 3 3 3 3
Gloves Ready Available Available Available Available Worn
Helmet Protective 2 3 3
Ready Available Available Worn Worn Worn
Cover
Chemical
2 3 4 4 4 4
Protective Ready Available Worn Worn Worn Worn
4
Undergarment
1
In hot weather coat or hood can be left open for ventilation.
2
Must be available to the soldier within two hours. Second set available in 6 hours.
3
Within arm’s reach of soldier.
4
The chemical protective undergarment is worn under the battle dress uniform (primarily applies to special operations
forces personnel and armor vehicle crewmen).
5-52
_________________________________________________________ Chapter 5 – Enabling Operations
5-173. The mission must continue, even though degraded. The threat
often employs chemicals to disrupt the defense as part of an attack.
The troop or squadron cannot become so involved in responding to the
attack that it stops the mission underway. Training, SOP, and
discipline are the foundation of continued combat effectiveness.
5-53
FM 3-20.96 ____________________________________________________________________________
5-54
_________________________________________________________ Chapter 5 – Enabling Operations
5-55
FM 3-20.96 ____________________________________________________________________________
TCP
PL REAR 1
PL REAR
A tta c k p o s itio n
G re en 34
2 -3 k m RP
C r o s s in g A r e a
ERP G reen
RP 4
S ite G r e e n 3 H o ld in g
(R a ft) A re a
S ite G r e e n 2
R IV E R
R IV E R C e n te r lin e C e n te r lin e C e n te r lin e (s w im )
W est M id d le E ast
TCP
2 (E n g in e e r T r a ffic O n ly )
TCP 5
TCP ERP
EEP
G reen 35 1
2 -3 k m 3
ERP
1 ALT
TCP C a ll-fo r w a r d
6 a re a G re e n 2 1
C a ll-fo r w a r d
a re a G re e n 3 3
TCP
7
(E n g in e e r T o S ite G r e e n 1
T r a ffic
O n ly )
H o ld in g
TCP a re a G re e n 3 2
3
RL A PPLE R L A PP LE
8 TCP
TCP
2 ERP 9
S ta g in g a r e a G r e e n 3 1
RECONNAISSANCE
5-184. Air or ground reconnaissance normally encounters the obstacle
first. Reconnaissance is immediately conducted to determine the
following:
• The width and depth of the waterway.
• Water velocity.
• Possible entry and exit points and their conditions.
• Waterbed soil type and condition.
• The threat situation on the far bank. This task is well
suited to the UAVs.
5-56
_________________________________________________________ Chapter 5 – Enabling Operations
FIRE SUPPORT
5-186. Fire support is required to suppress known or suspected threat
overwatching the water obstacle. Mortars are positioned to provide
support as the reconnaissance of the obstacle begins. The FSO is
positioned to observe the crossing site and to manage the fire support
effort. Smoke is planned to screen the crossing, but used only if
necessary. Figure 5-10 shows an example of the squadron conducting
a hasty river crossing.
5-57
FM 3-20.96 ____________________________________________________________________________
FOLLOW-ON FORCES
5-187. The troop is not required to improve a crossing site for follow-on
forces of the squadron or main body. Crossing sites that may be used
by other forces are marked by the troop. The squadron is not
responsible for crossing site improvement; it will rely on the brigade to
enhance crossing sites.
5-58
_________________________________________________________ Chapter 5 – Enabling Operations
BREACHING FUNDAMENTALS
5-194. Suppress, obscure, secure, reduce, and assault (SOSRA) are
the breaching fundamentals that must be applied to ensure success
when breaching against a defending threat. These fundamentals will
always apply but may vary based on the specific situation (METT-TC).
SUPPRESS
5-195. Suppression is a tactical task to employ direct or indirect fires
or electronic attack on threat personnel, weapons, or equipment to
prevent or degrade threat fires and observation of friendly forces. The
purpose of suppression during breaching operations is to protect
forces reducing and maneuvering through an obstacle.
5-196. Effective suppression is a mission-critical task during any
breaching operation. Suppressive fires in sufficient volume serve to
secure the reduction area. Successful suppression generally triggers
the rest of the actions at the obstacle. FSCMs are used to ensure that
5-59
FM 3-20.96 ____________________________________________________________________________
all fires are synchronized with other actions at the obstacle. Although
suppressing the threat overwatching the obstacle is the mission of the
support force, the breach force should have the capability to provide
additional suppression against the threat that the support force cannot
effectively suppress.
OBSCURE
5-197. Obscuration must be employed to protect forces conducting
obstacle reduction and the passage of assault forces. Obscuration
hampers threat observation and target acquisition and conceals
friendly activities and movement. Obscuration smoke deployed on or
near the threat’s position minimizes its vision. Screening smoke
employed between the reduction area and the threat conceals
movement and obstacle-reduction activities. It also degrades threat
ground and aerial observation. Obscuration can also be done utilizing
electronic measures. Obscuration must be carefully planned to provide
maximum degradation of threat observation and fires, but it must not
significantly degrade friendly fires and control.
SECURE
5-198. Friendly forces secure the reduction area to prevent the threat
from interfering with obstacle reduction and the passage of the assault
force through the lanes created during the reduction. Security must be
effective against outposts and fighting positions near the obstacle and
against overwatching units, as necessary. Fires isolate or occupation
must secure the far side of the obstacle before any effort to reduce the
obstacle is attempted. The higher headquarters of the attacking unit
has the responsibility to isolate the breach area by fixing adjacent
units, attacking threat reserves in depth, and providing counterfire
support.
5-199. Identifying the extent of the threat’s positions is critical before
selecting the appropriate technique to secure the point of breach. If the
threat controls the point of breach and cannot be adequately
suppressed, the force must secure the point of breach before it can
reduce the obstacle.
5-200. The breach force must be resourced with enough maneuver
assets to provide local security against those forces that the support
force cannot sufficiently engage. Elements within the breach force that
secure the reduction area may also be used to suppress the threat
once reduction is complete.
REDUCE
5-201. Reduction is the creation of lanes through or over an obstacle
to allow an attacking force to pass. The number and width of lanes
created varies with the threat situation and the composition and
scheme of maneuver of the assault force. The lanes must be sufficient
to allow the assault force to rapidly pass through the obstacle. The
breach force will reduce, proof (if required), mark, and report lane
locations and the lane-marking method to higher headquarters.
Follow-on units will further reduce or clear the obstacle when required.
Reduction cannot be accomplished until effective suppression and
obscuration are in place, the obstacle has been identified, and the
5-60
_________________________________________________________ Chapter 5 – Enabling Operations
BREACHING BREACHING
RESPONSIBILITIES
ORGANIZATION FUNDAMENTALS
Support Force Suppress. Suppress threat direct fires systems covering the
Obscure. reduction area.
Control obscuring smoke.
Prevent threat forces from repositioning or
counterattacking to place direct fires on the breach
force.
Breach Force Suppress (provides additional Create and mark the necessary lanes in an
suppression). obstacle.
Obscure (provides additional Secure the near-side and the far-side of an obstacle
obscuration in the reduction and defeat forces that can place immediate direct
area). fires on the reduction area.
Secure (provides local security). Report lane status/location.
Reduce.
Assault Force Assault. Destroy the threat on the far side of an obstacle that
Suppress (if necessary). is capable of placing direct fires on the reduction
area.
May assist the support force with suppression if the
threat is not effectively suppressed.
Be prepared to breach follow-on and/or protective
obstacles after passing through the reduction area.
SUPPORT FORCE
5-204. The support force’s primary responsibility is to eliminate the
threat’s ability to interfere with a breaching operation. It must—
• Isolate the reduction area with fires.
5-61
FM 3-20.96 ____________________________________________________________________________
BREACH FORCE
5-209. The breach force’s mission is to assist in the passage of the
assault force by creating, proofing (if necessary), and marking lanes per
unit SOP. The breach force should be a combined arms force. It should
5-62
_________________________________________________________ Chapter 5 – Enabling Operations
5-63
FM 3-20.96 ____________________________________________________________________________
ASSAULT FORCE
5-217. The assault force’s primary mission is to destroy the threat and
seize terrain on the far side of the obstacle to prevent the threat from
placing direct fires on the created lanes. The assault force may be
tasked to assist the support force with suppression while the breach
force reduces the obstacle.
5-218. The assault force must be sufficient in size to seize the point of
penetration. Combat power is allocated to the assault force to achieve a
minimum of a 3 to 1 ratio on the point of penetration. In a breaching
operation, particularly squadron/TF and above, the assault force
normally maneuvers as a separate force attacking through a reduced
obstacle. However, breach and assault assets may maneuver as a
single force when conducting lower-level breaching operations at troop
level.
5-219. Direct FSCMs are essential, since both the support and breach
forces may be firing on the threat when the assault force is committed.
Suppression of overwatching threat positions must continue and other
threat forces must remain fixed by fires until the threat has been
destroyed. The assault force must assume control for direct fires on the
assault objective as the support and breach force’s fires are shifted.
5-64
_________________________________________________________ Chapter 5 – Enabling Operations
5-220. Achieving necessary mass for the assault requires the breach
force to open enough lanes through the obstacle to permit rapid
passage and the buildup of forces on the far side. A mounted unit
requires one lane per assaulting unit. A dismounted assault force
requires one lane for each leading assault platoon. The tactical
situation may require additional lanes to quickly pass a large assault
force through the obstacle to achieve a sufficient combat power ratio.
5-221. The principle of mass influences the selection of the point of
breach; the task organization of the support, breach, and assault
forces; and the integration of engineers in force movement or attack
formations.
5-222. The need to generate enough mass and the maneuver space
available strongly influences which echelon can conduct the breaching
operation. A troop generally cannot simultaneously mass sufficient
fires, reduce the obstacle, and also assault the far side unless it is a
simple obstacle lightly defended. The squadron should have a combat
power ratio of at least 3 to 1 in order to reduce an obstacle
overwatched by a threat.
5-223. Breaching is conducted by rapidly applying concentrated
effects at a point to reduce the obstacle and penetrate the defense.
Massed combat power is directed against the threat’s weakness. The
location selected for breaching depends largely on the weakness in the
threat’s defense where its covering fires are minimized. If friendly
forces cannot find a natural weakness, they create one by fixing the
majority of the threat force and isolating a small portion of it for attack.
The squadron cannot breach complex obstacles covered by direct or
indirect fires without augmentation to fill the role of either the breach
or assault force.
5-65
FM 3-20.96 ____________________________________________________________________________
5-66
Chapter 6
Combat Support
The squadron employs CONTENTS
combat support (CS) and Relationships and Responsibilities .................... 6-2
fire support to enhance Employ Fires ......................................................... 6-3
Components ...................................................... 6-4
the effectiveness of Fire Support Assets and Capabilities ............. 6-4
squadron operations. Target Acquisition ............................................ 6-7
Effects-Based Fires .......................................... 6-12
Examples include using Fire Support Planning, Coordination,
engineers to collect and Execution ............................................... 6-13
obstacle intelligence Close Air Support Operations.......................... 6-17
Joint Air Attack Team Operations ................... 6-20
(OBSTINTEL) during a Army Airspace Command and Control ............... 6-21
zone reconnaissance, or Airspace Control Order .................................... 6-22
employing artillery fires Army Airspace Command and
Control Overview .......................................... 6-23
and other effects, to Air Force Command and Control..................... 6-27
facilitate infiltration. Airspace Control Measures ............................. 6-28
Army Aviation Support ......................................... 6-30
Some of the squadron’s Organization ...................................................... 6-30
CS is task organized Principles of Aviation Employment ................. 6-30
with the squadron from Characteristics of Attack Helicopters ............. 6-31
Characteristics of Utility and
Stryker Brigade Combat Cargo Helicopters ......................................... 6-32
Team (SBCT) assets, Planning Operations with Army
such as the engineer Aviation Assets ............................................. 6-33
Aviation Missions.............................................. 6-34
company or the military Aviation Capabilities and Limitations ............. 6-35
intelligence (MI) Air Cavalry Support .......................................... 6-36
Attack Helicopter Support................................ 6-50
company. In some cases Assault and Cargo Helicopter Support ........... 6-63
other CS assets from Joint Air Attack Team ....................................... 6-74
higher echelons of Intelligence and Electronic Warfare .................... 6-84
SBCT Intelligence and Electronic Warfare ..... 6-84
command, such as air Division/ARFOR Intelligence and
defense artillery (ADA) Electronic Warfare ........................................ 6-98
NBC Support ......................................................... 6-98
and nuclear, biological, SBCT/Squadron Assets.................................... 6-98
and chemical (NBC), may Decontamination Support ................................ 6-98
also be task organized Engineer Support.................................................. 6-99
Organization ...................................................... 6-99
with the squadron. In Support Capabilities ......................................... 6-101
addition to organic Combat Engineer Employment........................ 6-103
mortars, the squadron Reconnaissance Operations Support............. 6-104
Security Operations Support ........................... 6-105
plans for and employs Role of Engineers Fighting as Infantry ........... 6-106
fire support from the Air Defense Artillery Support ............................... 6-106
Passive Air Defense.......................................... 6-106
SBCT artillery battalion, Active Air Defense ............................................ 6-107
and external sources Air Defense Command and Control ................ 6-107
such as close air support Planning and Employment ............................... 6-108
Signal Support ...................................................... 6-110
(CAS) and naval gunfire Organization and Functions ............................ 6-111
(NGF). Squadron Brigade Signal Company C4ISR Functions.... 6-115
Squadron Augmentation .................................. 6-117
planners must National and Joint Intelligence Assets ............... 6-117
understand the unique Central Intelligence Agency ............................. 6-120
capabilities and Department of Defense..................................... 6-120
Non-Defense Intelligence Elements ................ 6-125
limitations of these
assets in order to
effectively integrate them
6-1
FM 3-20.96 ____________________________________________________________________________
DIRECT GENERAL
FUNCTION ATTACHED OPCON
SUPPORT SUPORT
Under command/control of– Squadron Squadron Parent Unit Parent Unit
Commander Commander
Task organized by– Squadron Parent Unit Parent Unit Parent Unit
Receives missions, tasks, and Squadron Squadron Squadron Parent Unit
priorities from–
Positioned by– Squadron Squadron Direct Support Parent Unit1
Unit
Commander1
Maintains communications and Squadron Squadron and Squadron and Parent Unit
liaison with– Parent Unit Parent Unit
Receives Combat Service Squadron2 Parent Unit3 Parent Unit3 Parent Unit
Support (CSS) from–
1
With specific approval of the squadron commander if within the squadron area of operations.
2
The squadron provides CSS requirements beyond the capability of the parent unit after specific request
and coordination between the squadron and parent unit are made.
3
Attached element brings an appropriate slice of CSS equipment and personnel to supplement squadron
assets.
6-2
_____________________________________________________________ Chapter 6 – Combat Support
6-3
FM 3-20.96 ____________________________________________________________________________
COMPONENTS
6-8. The fire support system is a collective body of target
acquisition and attack systems (lethal and nonlethal), command and
control (C2) and coordination systems and facilities, technical
support (meteorological and survey), and the personnel required to
provide and manage fire support. ADA and engineer assets may also
become important components of the fire support system.
6-9. Application of lethal and nonlethal effects is essential in
defeating the threat’s ability to fight and win. A variety of means are
used to accomplish this throughout the depth of the battlefield. The
characteristics of the future battlefield will certainly challenge the
commander’s ability to efficiently and effectively employ limited
numbers of sophisticated acquisition and attack systems against a
diverse target array.
CONVENTIONAL MUNITIONS
MAX RANGES (M198) FPF WIDTH RATES OF FIRE
HE/DPICM ERDPICM RAP SUSTAINED MAX
18,100 28,400 30,000 400M Varies 4 rounds/min
ILLUMINATION
RATE OF FIRE
MAX RANGE BURN TIME ILLUM DIAMETER
CONTINUOUS ILLUM
17,500 2 minutes 1 round/min 1,000m
SMOKE
TIME TO BUILD AVG BURN TIME
TYPE
EFFECTIVE SMOKE (MINUTES)
WP 30 Seconds 1 to 1 1/2
6-4
_____________________________________________________________ Chapter 6 – Combat Support
SMOKE 30 Seconds 5 to 10
6-14. CAS is defined as air attacks on hostile surface forces that are in
close proximity of friendly troops. CAS can be employed to blunt a
threat attack, support the momentum of the ground attack, or provide
cover for friendly movements. For best results while avoiding mutual
interference or fratricide, aircraft are kept under “detailed integration”
(part of the USAF’s combat air system). Until the USAF achieves air
superiority, competing demands between CAS and counter-air
operations may limit sorties apportioned for the CAS role. Nomination of
CAS targets is the responsibility of the commander, air liaison officer
(ALO), and S3 at each level.
6-15. Tables 6-2 and 6-3 depict the aviation assets that are most
likely to be available to support the cavalry squadron
(reconnaissance, surveillance, and target acquisition [RSTA]). USAF
and USMC aircraft are listed within the same charts to save space.
6-16. USAF and USMC personnel are the primary means for
requesting and controlling their respective service’s aircraft. However,
if no personnel augmentation by the other services is available, then
6-5
FM 3-20.96 ____________________________________________________________________________
the organic fire support personnel are the primary means for
coordinating and controlling CAS aircraft.
6-6
_____________________________________________________________ Chapter 6 – Combat Support
6-7
FM 3-20.96 ____________________________________________________________________________
AMMUNITION RANGE
High Explosive Full charge: 23,127m; Reduced charge: 12,200m
Illumination Full charge: 23,127m; Reduced charge: 12,200m
White Phosphorous Full charge: 23,127m; Reduced charge: 12,200m
TARGET ACQUISITION
6-18. Target acquisition assets are target-producing systems. They
gather targeting information and targets by using all available means.
These means include, but are not limited to, radar, army aviation,
IEW, observers, and frontline troops. Some of the assets available
are—
• AH-64A/D and OH-58D helicopters.
• Unmanned Aerial Vehicles (UAV).
• Fire Support Teams (FIST).
• Scouts.
• AN/TPQ-36 and AN/TPQ-37 radars (see Table 6-5).
6-8
_____________________________________________________________ Chapter 6 – Combat Support
SECTORS OF SEARCH
6-20. Sectors of search are the areas on the battlefield where radars
focus their target acquisition capabilities. The sectors of search are
determined during the decide function of the targeting process on the
basis of a thorough intelligence preparation of the battlefield (IPB).
During the decide function, decisions are made concerning what
targets should be acquired and attacked, where and when targets are
likely to be found, and who can locate them. Doctrinal employment
considerations, in conjunction with templates and intelligence
produced in the IPB process, dictate the areas in which the radar
searches should be focused. The location of friendly boundaries and
fire support coordination measures (FSCM) may also affect the
assignment of sectors of search.
ZONES
6-21. Zones are a means of prioritizing radar sectors of search into
areas of greater and lesser importance. A zone is a geometric figure
placed around an area that designates it as more or less important
than other areas. There are four types of radar zones: critical friendly
zones (CFZ), call-for-fire zones (CFFZs), artillery target intelligence
zones (ATIZ), and censor zones (CZ). The targets developed by the
radar are prioritized according to the zone where the threat firing
unit is located or fired into. The zone priorities for location
identification, from highest to lowest, are—
• Locations of weapons firing into a CFZ.
• Weapons firing from a CFFZ.
• Weapons firing from an ATIZ.
Call-For-Fire Zone
6-23. A CFFZ designates a search area forward of the forward line
of own troops (FLOT) that the commander wants suppressed,
neutralized, or destroyed. An area designated as a CFFZ would likely
be on a suspected threat artillery position and is closely tied to
information developed during the IPB process. A CFFZ provides the
second most responsive request for fire generated by the radar.
6-9
FM 3-20.96 ____________________________________________________________________________
Censor Zone
6-25. A censor zone is an area from which the commander wishes
to ignore all target detections. Censor zones must be used very
judiciously, since the computer does not report to the operator a
round originating from a censor zone. A censor zone may be used to
ignore a friendly artillery position that, because of its aspect angle to
the radar, could be detected as threat artillery. This situation could
occur when an uneven FLOT exists or when friendly units are in
threat territory. A censor zone may also be used when artillery fires
in support of rear operations.
TARGETING
6-26. Targeting is a command responsibility that requires
participation of key members of the squadron staff. The commander
establishes the environment that determines the quality of the
targeting effort, and targeting often determines the commander’s
success or failure. Locating, identifying, classifying, tracking, and
attacking targets and then assessing battle damage with limited
sensor assets and attack systems are difficult tasks. Competition for
assets is intense. Many intelligence systems are capable of
situational development, target acquisition, and battle damage
assessment (BDA), but may not be able to do them at the same time.
Detailed guidance thorough planning, particularly for ISR, and
disciplined execution prevent unnecessary redundancy and make the
most of available combat power. Successful targeting requires that
commanders and their staffs possess—
• An understanding of the functions associated with the
targeting process.
• The knowledge of the capabilities and limitations of
organic and supporting target acquisition and attack
systems.
• The ability to synchronize battlefield effects both
horizontally (within their own command posts [CP]) and
vertically with higher and lower echelons.
• The targeting effort is a continuous and integral part of
the military decision-making process (MDMP) cycle. The
commander enhances the targeting effort by organizing
his primary operations, intelligence, and fire support
advisors into an informal targeting team.
Targeting Terms
6-27. The following terms define the targeting process and the
classification of targets.
6-10
_____________________________________________________________ Chapter 6 – Combat Support
6-11
FM 3-20.96 ____________________________________________________________________________
6-12
_____________________________________________________________ Chapter 6 – Combat Support
6-13
FM 3-20.96 ____________________________________________________________________________
EFFECTS-BASED FIRES
6-34. Effects-based fires for the SBCT, and hence the squadron,
employ a derivative of the EFST methodology. This approach develops
essential fires and effects tasks (EFET) to focus full-spectrum effects
against an HPT within the battlespace to achieve a desired effect and
purpose. This methodology enables the commander to focus his
limited fires and effects assets in the most agile and efficient manner
while preserving the adaptability to adjust to the demands of a highly
frictional battlefield. An EFET is defined as an application of fires and
effects required to support a combined arms COA; failure to achieve
an EFET may require the commander to alter his tactical plan. A
complete EFET consists of a task (effect), purpose, method, and
assessment. The task is the effect (what) that the commander desires
6-14
_____________________________________________________________ Chapter 6 – Combat Support
to apply against the target. The purpose (why) is the combined arms
outcome desired as a result of applying the effect. The method
consists of acquisition/tracking, delivery of effects (lethal/nonlethal)
and restrictions. Assessment is essential to determine if the desired
effect was created and the purpose achieved. Achievement of the
purpose equals end state for the EFET. The decide-detect-deliver-
assess targeting process is employed during this approach.
PLANNING CONSIDERATIONS
6-36. With the onset of numerous asymmetric threats and the
possibility for multiple, simultaneous engagements in a relatively
short time period, it is imperative that the squadron effectively
employ fire support assets. One of the squadron commander’s
greatest challenges is effectively synchronizing and concentrating all
available assets at the critical times and places. The planning and
coordination process begins with mission receipt and never stops.
The commander, executive officer (XO), S3, S2, and FSO interact
throughout planning and execution of the mission to ensure the
necessary support is continually provided. As the squadron
commander develops his plan for employment of his forces, he and
the FSO plan for the best use of fire support resources by
determining the following:
• Fire support assets that will be tasked to weight the effort
of specific subordinate units.
• Targets to attack.
• Fire support means to use.
• Desired target effects.
• Priorities for engaging targets.
6-37. Fire support planning must be a critical part of the ISR plan
since the squadron, moving out to confirm or deny the commander’s
CCIR while brigade operational planning still continues, will require
such support early.
6-38. The commander must ensure that he clearly states his intent
for fire support and that the fire support plan is developed
accordingly. All available fire support assets must be considered so
that each phase of the commander’s plan will be supported by the
6-15
FM 3-20.96 ____________________________________________________________________________
fire support plan. The FSO must ensure that he understands the
commander’s requirements for fire support. The following list covers
several areas that the commander must coordinate with the FSO:
• Scheme of maneuver. This includes the area of
operations (AO), timing of advance, rate of movement,
passage of lines, and Army aviation in sector.
• Priority of fires. This identifies which unit has priority of
artillery fires.
• Critical targets. These are targets that, if not fired upon,
will seriously impede mission accomplishment (based on
EFET).
• Priority targets. These are identified, along with how long
they will be in effect.
• CAS. The commander and FSO, in coordination with the
forward air controller (FAC), determine what is available,
when it is available, and how it will be used (including
target selection and desired effects).
• FSCMs. These are the existing or proposed permissive or
restrictive control measures established by higher
headquarters or the SBCT itself.
• Ammunition restrictions. These place limitations on the
use of smoke, improved conventional munitions, or other
ammunition (including established controlled supply rates
[CSR]).
6-39. The fire support plan outlines how both lethal and nonlethal
fire support assets will be used to complement both the IRS plan and
the scheme of maneuver. It provides instructions and guidance for
executing those fires. It ranks targets in priority order, matches them
with the available fire support systems, eliminates duplication with
SBCT targets, and allows fires to be executed quickly and without
specific direction from the commander. A squadron fire support plan
should include—
• The general concept of how fires will support the
operation.
• A target list that includes locations where fires are
expected or likely to be used. Known threat locations
should be carefully targeted.
• Priority of fires.
• Priority targets.
• Allocation of priority targets and final protective fires
(FPF), if available.
• Execution matrix.
• Required airspace coordination areas (ACA).
• FSCMs.
6-40. The fire support plan is developed by the FSO with assistance
and input from the FAC, troop FSOs, S2, and S3. It is constantly
6-16
_____________________________________________________________ Chapter 6 – Combat Support
COORDINATION CONSIDERATIONS
6-41. The squadron FSO, as part of his coordination, should
conduct the following actions:
• Ensure that the FA battalion fire direction center (FDC),
each troop mortar section, and any other supporting
elements have the correct fire support plan.
• Conduct fire support rehearsals prior to every operation.
• Keep the SBCT FECC and the supporting FA units
informed of the tactical situation.
• Select the appropriate fire support means to engage
targets throughout the course of the operation.
• Ensure the squadron commander and S3 are kept
informed regarding the status of all fire support assets.
• Modify the fire support plan as necessary to react to
battlefield changes and ensure changes to the plan are
disseminated.
• Coordinate requests for additional fire support if needed.
• Monitor execution of the fire support plan throughout the
operation.
6-42. The squadron FSO must ensure that the fire support plan
remains supportable. He must immediately inform the squadron
commander if there is not enough fire support allocated to make the
plan work or if circumstances dictate changes in the plan. To
accomplish this, the FSO must keep abreast of the tactical situation
and coordinate all fire support affecting his zone. He must ensure
that fires do not jeopardize soldier safety, interfere with other fire
support means, or disrupt adjacent unit operations.
OPERATIONAL CONSIDERATIONS
6-43. To provide the squadron with the necessary support during
all types of operations, the FSE must be prepared to conduct
additional planning and coordination specific to the type of operation
he expects the squadron to execute. The following discussion
provides fire support guidelines and considerations for the four types
of operations the squadron may conduct (offensive, defensive,
stability, support).
Offensive Operations
6-17
FM 3-20.96 ____________________________________________________________________________
Defensive Operations
6-45. The following actions and considerations apply for fire
support planning, coordination, and execution when the squadron
conducts defensive operations:
• Mass fires on threat direct and indirect fire systems.
• Attack threat forces that have penetrated the defensive
area.
• Plan fires to impede threat reserves.
• Plan suppression of enemy air defense (SEAD) in support
of CAS missions.
• Plan for priority of fires.
6-18
_____________________________________________________________ Chapter 6 – Combat Support
6-19
FM 3-20.96 ____________________________________________________________________________
6-49. Immediate CAS requests are used for air support mission
requirements that were identified too late to be included in the
current air tasking order (ATO). These requests usually arise from
situations that develop once the battle has commenced. If there are
no immediate CAS sorties available and HPTs have been identified,
then preplanned CAS will be diverted to engage those targets.
6-50. Both types of CAS missions have specific request channels.
Preplanned requests are sent via Army channels. Immediate requests
are sent via USAF channels. For preplanned missions, the requests
are submitted to the fire support cell. The commander, S3, ALO, and
FSO at each echelon evaluate all CAS requests; coordinate such
requirements as airspace, fires, and intelligence; consolidate the
requests; and if approved, assign a priority of precedence to their
requests. The S3-Air then forwards approved requests by Army
communications nets to the next higher echelon. The fire support cell
of the corps main CP makes the final consolidation and approves
preplanned requests for tactical air support. The requestor is notified
of approval or disapproval at each level. The tactical air control
center does the necessary planning and includes the mission in the
ATO for execution. Requests for CAS that do not reach the tactical air
control center in time for inclusion in the ATO are treated by the air
support operations center (ASOC) the same as immediate requests.
6-20
_____________________________________________________________ Chapter 6 – Combat Support
6-21
FM 3-20.96 ____________________________________________________________________________
6-22
_____________________________________________________________ Chapter 6 – Combat Support
mobile and lethal tank-killing force can engage the threat well
beyond the range of ground antitank weapons. JAAT missions can
significantly increase the lethality of combined arms operations. They
can be employed during any operation and are especially useful to
counter threat airmobile operations. JAAT elements may operate
either integrated into close operations or independently of ground
units.
6-59. Planning for a JAAT operation is a complex process requiring
detailed coordination among the commander, S3, FSO, ALO, S3-Air,
and attack helicopter battalion (ATKHB) commander (see FM 3-09.33
[FM 90-21]). The scheme of maneuver must integrate all JAAT
elements, including CAS and fire support, to the maximum extent
possible. Planning considerations include—
• Nature of the target, including type, size, activity, and
priority.
• Threat avenues of approach.
• Air threat, including type and location.
• Fire support coordination, including locations and
azimuths of fire of friendly assets that can support the
operation.
• Airspace control.
• Laser codes.
• Electronic warfare (EW) considerations.
• Downed aircraft procedures, including search and rescue.
• Emergency procedures.
• Weapons load.
• Target marking options.
• Ingress/egress routes.
• Provisions for SEAD.
• Communications.
• Current ground tactical plan.
• Contact points/initial points.
• Weather.
6-60. Although JAAT assets may be requested and planned for, the
SBCT commander must be prepared to execute his maneuver plan
without some or all of the JAAT components.
6-23
FM 3-20.96 ____________________________________________________________________________
6-24
_____________________________________________________________ Chapter 6 – Combat Support
6-25
FM 3-20.96 ____________________________________________________________________________
6-26
_____________________________________________________________ Chapter 6 – Combat Support
6-27
FM 3-20.96 ____________________________________________________________________________
6-28
_____________________________________________________________ Chapter 6 – Combat Support
has a web feature that allows any system with an Internet browser
and is connected on the Internet to submit ACMRs directly to it for
ACO submissions. All other Army Battle Command Systems (ABCS)
have the ability to pull up the AOC using the Joint Mapping Tool Kit
and display any of the ACOs that the TAIS has enabled. This can be
accomplished during the normal planning process and, as required,
during the execution of operations.
A2C2 at Division Level
6-74. The division A2C2 organization within the division’s main CP
and tactical CP (TAC CP) is similar to that at corps level. The
division’s primary focus is on the conduct of battles and
engagements in the forward portion of the combat zone (division rear
boundary and forward). Therefore, airspace control tasks are
required to synchronize all airspace users of the combined arms
team and supporting services during the close battle. The difference
in geographical orientation (forward versus rear) results in minor
differences in the airspace control procedures employed and the
degree of coordination required. The organization of division A2C2
assets are:
• Division Main CP. In the division main CP, the A2C2
element includes the G3-Air; ADA element; aviation
element; ATS liaison element, as required; FSE; division
G2 section; G4 section, as required; ALO; and air and
naval gunfire liaison company (ANGLICO).
• Division TAC CP. In the division TAC CP, the A2C2
element includes a G3 officer as chief, assisted by an FSO,
G2 representative, aviation representative, ADA
representative, and a fighter liaison officer (FLO).
A2C2 at Corps Level
6-75. The corps A2C2 organization supports future operational
planning, conducts current operations, and performs specified
functions for the corps’ main, tactical, and rear CPs as outlined
below.
• Corps Main CP. In the corps main CP, the A2C2 element
collocates with the FSE. It is the focal point for all
airspace control activities related to corps rear area
operations and deep operations and for planning of future
operations. The A2C2 element works for the G3, but is
normally supervised by the G3-Air. The main CP A2C2
element consists of, but is not limited to, the ADA
element; aviation element; ALO; FSE; the ATS unit
assigned to the corps; corps analysis and control element
(ACE), as required; the G4 section, as required; and the
ANGLICO. Personnel from these elements and sections
perform two separate tasks. First, they perform their
primary staff functions. Second, they assist in
synchronizing airspace requirements of their parent units
with airspace users of the combined arms team and
supporting services.
6-29
FM 3-20.96 ____________________________________________________________________________
• Corps TAC CP. In the corps TAC CP, the A2C2 element
performs airspace management activities and supports close
operations with the A2C2 element at the main CP. The A2C2
elements at both TAC CP and main CP maintain close
coordination to ensure that airspace requirements generated
by changes to the tactical situation are met in a timely and
effective manner. The corps A2C2 element representatives at
the TAC CP consist of an FSO, aviation officer or
noncommissioned officer (NCO), ADA officer or NCO, and an
ALO. The FSO or aviation officer will serve as the element
chief.
• Corps Rear CP. The corps rear CP receives airspace
support from the A2C2 elements at the main CP.
A2C2 at Theater Army Level
6-76. The theater army A2C2 organization supports operational
planning, conducts current operations, and performs specified
functions for the theater army CP. The A2C2 elements are the focal
point for all airspace control activities related to theater army rear
and deep operations, as well as planning for future operations. The
A2C2 element works for the G3, but is normally supervised by the
G3-Air.
6-30
_____________________________________________________________ Chapter 6 – Combat Support
6-31
FM 3-20.96 ____________________________________________________________________________
6-32
_____________________________________________________________ Chapter 6 – Combat Support
6-83. The aviation brigade has the mission to find, fix, and destroy
threat forces using fire and maneuver to concentrate and sustain
combat power at the critical time and place. Aviation brigade assets
can also provide timely reconnaissance and intelligence throughout
the squadron area and can conduct air assault and air movement
operations. With its capabilities, including planning and conducting
maneuver operations, the aviation brigade plays a significant role in
the success of the squadron’s mission. The aviation brigade can
conduct missions either as an aviation-pure force or as a task-
organized force.
ORGANIZATION
6-84. Aviation brigades are assigned from echelons above corps
through division level. Although their missions are basically the
same, the organizations differ based on their higher headquarters,
locations, and specific missions. Organization of aviation units in
support of the RSTA squadron and the SBCT will be designed,
tailored, and configured for specific operational support based on
6-33
FM 3-20.96 ____________________________________________________________________________
6-34
_____________________________________________________________ Chapter 6 – Combat Support
the fire control system. See FM 3-04.112 [FM 1-112] for a detailed
explanation of the aircraft.
6-35
FM 3-20.96 ____________________________________________________________________________
UH-1H IROQUOIS
6-92. The UH-1H is a single-engine, single-rotor helicopter. Primary
mission capability of the helicopter is air movement of supplies and
personnel. Secondary missions include stability operations, support
operations, air assault, and C2 operations under day, night, visual,
and instrument conditions. The aircraft has an external load
capability of 4,000 pounds. The aircraft can carry up to 11 combat-
loaded troops. See FM 3-04.113 [FM 1-113] for a detailed explanation
of the aircraft.
UH-1N (USN)
6-93. The UH-1N is a twin-engine, single-rotor helicopter employed
by the Marine Corps in a combat utility role. The UH-1N’s missions
include command and control; armed escort, FAC(A) (control,
coordinate, and provide terminal guidance for supporting arms, to
include close air support, artillery, mortars, and naval surface fire
support); combat assault transport of troops, supplies, and
equipment; armed reconnaissance; and CASEVAC while maintaining
the ability to operate from amphibious shipping and austere bases
ashore as required during night and under adverse weather
conditions at extended ranges. The UH-1N can carry 1,500 pounds of
cargo, troops, or ordnance. It is equipped with three ARC-210 radios,
capable of HaveQuick, SINCGARS, and SATCOM; third generation
FLIR with laser range finder and 8-mm recording/playback
capability. See MCWP 3-24 for more information on the aircraft.
UH-60A/L BLACK HAWK
6-94. The UH-60A/L is a twin-engine, single-rotor helicopter.
Primary mission capability of the helicopter is air assault and air
movement. Secondary missions include stability operations, support
operations, combat search and rescue (CSAR), C2 platform, casualty
evacuation (CASEVAC), and Air Volcano (mine setting) during day,
night, visual, and instrument conditions. External load capability for
the aircraft is 8,000 pounds for the UH-60A and 9,000 pounds for
the UH-60L. The aircraft can carry 11 troops with seats installed, 16
troops carrying rucksacks with seats removed, and 20 troops not
carrying rucksacks with seats removed. See FM 3-04.113 [FM 1-113]
for a detailed explanation of the aircraft.
CH-47D CHINOOK
6-95. The CH-47D is a twin-engine, tandem-rotor helicopter
designed for transportation of cargo, troops, and weapons during
day, night, visual, and instrument conditions. The maximum single
load that can be suspended as a tandem load from the forward and
aft hooks is 25,000 pounds. Troop-carrying arrangements can
accommodate up to 31 fully equipped ground troops or 24 litters. See
FM 3-04.113 [FM 1-113] for a detailed explanation of the aircraft.
CH-53E (USMC)
6-36
_____________________________________________________________ Chapter 6 – Combat Support
CH-46E (USMC)
6-97. The CH-46E is a twin-engine, tandem-rotor cargo helicopter
with a 4,300-pound payload and the capacity to carry 18 troops. See
MCWP 3-24 for additional information.
6-37
FM 3-20.96 ____________________________________________________________________________
UH-1 2 1 1
UH-60 2 1 1
NOTES: * The HF listed above is not currently installed, but the wiring and mounts
exist.
** Configuration is 2 FM and 0 VHF, or 1 FM and 1 VHF.
*** Configuration is 2 FM and 0 VHF, or 1 FM and 1 VHF, or 0 FM and 2
VHF.
AVIATION MISSIONS
COMBAT MISSIONS
6-102. Aviation maneuver forces engage in destroying threat forces
by direct fire, indirect fire, and standoff precision weapons in joint
and combined arms missions. These aviation combat missions
include—
• Reconnaissance.
• Security.
• Attack.
• Air assault.
• Special operations.
• Theater missile defense.
• Support by fire.
CAPABILITIES
6-38
_____________________________________________________________ Chapter 6 – Combat Support
6-39
FM 3-20.96 ____________________________________________________________________________
LIMITATIONS
6-106. Aviation brigades also are subject to some operational
limitations, to include—
• The effects of weather and obscuration on observation,
acquisition, and engagement ranges of combat systems as
well as on the employment of all aviation forces.
• Limited capability to secure unit assembly areas.
EMPLOYMENT CONSIDERATIONS
6-108. The aeroscout platoon consists of four aircraft, led by a
lieutenant. Its primary mission is conducting armed reconnaissance
and surveillance.
6-109. The primary aircraft in air cavalry units is the OH-58D Kiowa
Warrior. This helicopter provides the maneuver commander with a
versatile platform; it can be armed with various weapon systems and
is suitable for employment in numerous types of situations and
operations.
6-110. The aircraft features a stabilized mast-mounted sight (MMS)
with a low-light TV system, thermal imaging system (TIS), and
LFR/D. The aircrew of the Kiowa Warrior can detect a heat source in
day or night conditions at a range up to 15 kilometers and is capable
6-40
_____________________________________________________________ Chapter 6 – Combat Support
6-41
FM 3-20.96 ____________________________________________________________________________
6-42
_____________________________________________________________ Chapter 6 – Combat Support
6-43
FM 3-20.96 ____________________________________________________________________________
6-44
_____________________________________________________________ Chapter 6 – Combat Support
Employment Methods
6-124. Squadrons have two options for the employment of the ACTs.
The first option is to employ troops simultaneously, with separate
AOs. The second option is to employ the ACTs sequentially, with the
same or different AOs. In either option, the ACTs may be retained
under squadron control or task organized with recce assets as air-
ground teams.
6-45
FM 3-20.96 ____________________________________________________________________________
Synchronization
6-127. The integration of air cavalry into the decision-making
process is an important and unique aspect of staff planning. The
employment of air cavalry may be the significant difference between
COAs presented to the commander. In development of COAs, air-
ground synchronization should be planned along the guidelines
covered in the following paragraphs.
6-128. Intelligence. Intelligence must drive the maneuver plan.
Effective IPB will often make it obvious how and when to employ air
cavalry assets. To provide the commander with a clear picture of
when and where to employ air cavalry, the IPB process should
answer five fundamental questions:
• Where is the threat currently located?
• Where is the threat going, and what are his repositioning
criteria and routes?
• Where can we best acquire or engage the threat?
• When will the threat be there?
• What threat weapon systems can affect air cavalry assets?
6-46
_____________________________________________________________ Chapter 6 – Combat Support
6-129. Answering the questions above will allow the commander and
staff to—
• Designate reconnaissance objectives and focus.
• Determine priority intelligence requirements to facilitate
employment of the air cavalry.
• Develop an intelligence, surveillance, and reconnaissance
(ISR) plan with depth and redundancy.
• Determine required combat multipliers (lethal and
nonlethal SEAD), air-ground team task organization, and
ACT weapons configurations.
• Determine bypass and engagement criteria.
• Determine REDCON levels and employment timelines or
triggers.
• Determine holding area locations, forward assembly area
locations, and FARP locations.
• Focus on developing a plan that pits the ACT’s capabilities
against threat weaknesses.
6-47
FM 3-20.96 ____________________________________________________________________________
6-48
_____________________________________________________________ Chapter 6 – Combat Support
AIR-GROUND INTEGRATION
ROUTE RECONNAISSANCE
6
- As an AGT, a GCT, and an ACT
conduct coordinated route NAI A1
reconnaissance operations
6-49
FM 3-20.96 ____________________________________________________________________________
AIR-GROUND INTEGRATION
AREA RECONNAISSANCE ..
TECHNIQUE #1 8
- As an AGT, a GCT, and an ACT 9
conduct a coordinated area
reconnaissance of OBJ CAT.
6-50
_____________________________________________________________ Chapter 6 – Combat Support
AIR-GROUND INTEGRATION
AREA RECONNAISSANCE ..
TECHNIQUE #2
8
- As an AGT, a GCT, and an and ACT
9
conduct a coordinated area reconn-
aissance of OBJ CAT.
PL KILL 7
- PLs, checkpoints, and screen
lines are used to control movement
and focus the reconnaissance and
security effort.
...
6-51
FM 3-20.96 ____________________________________________________________________________
6-52
_____________________________________________________________ Chapter 6 – Combat Support
6-53
FM 3-20.96 ____________________________________________________________________________
AIR-GROUND INTEGRATION
STATIONARY FLANK SCREEN
BHOL
- An ACT and GCT conduct a coordinated
stationary screen of the right flank of the
main body. 6
11
- The ACT establishes OPs, team
boundaries, and other control measures
2
to facilitate C and depth to the screen
line.
ACTM 1
- The ACT operates with 3 ACTMs set in OPs
to maintain maximum eyes forward and
provide security within the team. OPs are not 5
placed linearly along the screen, but placed 10
in-depth to allow contact to be maintained
with enemy force and to cover multiple
avenues of approach. ACTM integrity is
maintained to facilitate security and
reconnaissance through the depth of the
... CDR
sector.
...
ACT and ground scout platoon screens.
6-54
_____________________________________________________________ Chapter 6 – Combat Support
6-55
FM 3-20.96 ____________________________________________________________________________
combat power rapidly at the decisive time and place to affect the
battle’s outcome, striking the threat where and when he is most
vulnerable.
6-137. An ATKHB seldom fights alone; it is normally employed with
other maneuver, CS, CSS, and joint forces in a combined arms team.
This team surprises and overmatches the threat at the point of
attack. The attack helicopter unit may conduct its attack out of
physical contact with other friendly forces but synchronized with
their scheme of maneuver; it may also be employed in direct contact
with friendly forces.
6-138. ATKHBs are assigned to divisional aviation brigades, corps
attack helicopter regiments, and divisional aviation brigades. They
give the commander a highly mobile, 24-hour-a-day antiarmor
capability. It is important to remember that ATKHBs are maneuver
units, not CAS or fire support units. Therefore, they must be
integrated into the commander’s tactical plan along with his other
maneuver units.
6-139. The ATKHB has the mission to destroy or disrupt massed
threat armor and mechanized forces using aerial firepower, mobility,
and shock. It can also destroy threat helicopters that pose an
immediate threat and conduct JAAT operations with CAS and FA
assets. The ATKHB cannot conduct missions that require the
occupation of terrain. It can, however, deny the threat use of that
same terrain for a limited time by employing organic and supporting
fire.
6-56
_____________________________________________________________ Chapter 6 – Combat Support
6-57
FM 3-20.96 ____________________________________________________________________________
rear area. It can react rapidly to a threat air assault in the corps or
division rear area and contain or destroy threat forces once they are
in the rear area. To ensure success, it is important to remember that
many AOs require close coordination between artillery, CAS, and
attack helicopter units.
6-58
_____________________________________________________________ Chapter 6 – Combat Support
Raid
6-148. The ATKHB is the ideal unit for conducting a raid. The
mission is short in duration and requires speed, flexibility, and
audacity. The following are considerations related to planning and
conducting a raid with attack helicopters:
• A well-defined objective is required.
• The mission must be of short enough duration to be
accomplished on one fuel load.
• Multiple routes must be available for aircraft.
• Air-to-air security must be emphasized.
• Actions at the objective should be fast-paced and provide
for massed fires.
• Attack helicopters are best suited for raids against moving
targets.
Exploitation
6-149. In the exploitation, the ATKHB is employed as part of a larger
force. It allows the exploiting force to strike the threat’s flanks and
rear area to disrupt his withdrawal and reorganization. The ATKHB
operates as in a movement to contact, moving behind the ground
force, ready to strike early in the fight. In addition, attack helicopters
can effectively interdict and harass retreating threat armored forces.
Pursuit
6-150. The ATKHB’s speed, mobility, and firepower make it an ideal
force for a pursuit. It can maneuver deep to outflank and contain
retreating forces and quicken the disintegration of the threat’s will to
fight. By “phasing” its three attack helicopter companies (one
company in battle, one company en route to the battle area, and one
company en route to or at the FARP), the ATKHB can place
continuous pressure on the withdrawing threat force.
6-59
FM 3-20.96 ____________________________________________________________________________
6-60
_____________________________________________________________ Chapter 6 – Combat Support
• Current situation, to include friendly forces location and situation, threat situation
highlighting known air defense artillery threat in the area of operations (AO), and
tentative engagement area coordinates.
• Brigade/squadron-level graphics, updated via Maneuver Control System or radio
communications. The update should include critical items, such as limit of advance,
fire control measures, and base maneuver graphics, to integrate better into the
friendly scheme of maneuver.
• Fire support coordination information, such as location of direct support artillery and
organic mortars, call signs, and frequencies.
• Ingress/egress routes into the brigade AO. This includes passage point into sector
or zone and air routes to the holding area.
• Holding area for face-to-face coordination between the attack team and the
battalion in contact. A holding area equates to an assault position. It must be large
enough to accommodate the number of aircraft assigned to the mission and out of
range of threat direct fire systems. It should also be out of threat mortar range.
• Call signs/frequencies of the battalion in contact down to the company in contact.
Air-ground coordination must be done on command frequencies to provide
situational awareness for all elements involved.
• Single Channel Ground-Airborne Radio System (SINCGARS) time hack.
6-61
FM 3-20.96 ____________________________________________________________________________
NOTE: Table 6-9 shows simulated radio traffic as an example of what may occur
during this step.
6-62
_____________________________________________________________ Chapter 6 – Combat Support
6-162. The attack team leader and ground unit’s key leaders must
consider the effects on friendly forces of the various weapons carried
by the attack aircraft prior to target selection and engagement.
Selection of weapon systems and munitions for a given engagement
is METT-TC dependent. Point target weapon systems, such as Hellfire
or TOW, are the preferred systems for engaging armor or hardened
targets in the close fight. The gun systems and the 2.75-inch rockets
are the preferred system/munition for engaging troops in the open
and soft targets, such as trucks and trenchworks. These area fire
weapon systems pose a danger to friendly soldiers who may be in the
lethality zone of the rounds or rockets. In this case, the leader on the
ground must be very precise in describing the target he wants the
aircraft to engage.
6-63
FM 3-20.96 ____________________________________________________________________________
6-64
_____________________________________________________________ Chapter 6 – Combat Support
6-65
FM 3-20.96 ____________________________________________________________________________
6-168. After receipt of a request for aviation direct fires, the attack
team leader then informs the ground unit leader of the BP, ABF/SBF
position, or the series of positions his team will occupy to gain the
best possible observation and fields of fire into the EA or target area.
The BP or ABF/SBF position is a position from which the attack
aircraft will engage the threat with direct fire. It includes a number of
individual aircraft firing positions. It may be preplanned or
established as the situation dictates. Size will vary depending on the
number of aircraft using the position, the size of the EA, and the type
of terrain. The BP or ABF/SBF position is normally offset from the
flank of the friendly ground position, but close to the position of the
requesting unit to facilitate efficient target handover. This also
ensures that rotor wash, ammunition casing expenditure, and the
general signature of the aircraft do not interfere with operations on
the ground. The offset position also allows the aircraft to engage the
threat on its flanks rather than its front and reduces the risk of
fratricide along the helicopter gun-target line.
6-169. The attack team leader then provides the ground maneuver
unit leader with his concept for the team’s attack on the objective.
This may be as simple as relaying the direction from which the
aircraft will be coming or the attack route, time required to move
forward from their current position, and the location of the BP. Only
on completion of coordination with the lowest unit in contact does
the flight depart the holding area for the BP. As the attack team
moves out of the holding area, it uses nap of the earth (NOE) flight
along attack routes to mask itself from ground threat observation
and threat direct fire systems. The attack team leader maintains FM
communications with the ground unit leader while he maintains
internal communications on either his very high frequency (VHF) or
ultra high frequency (UHF) net (see Table 6-13).
NOTE: This scenario was written without friction, as though in perfect conditions.
Grid locations may be difficult for the ground maneuver element to determine,
6-66
_____________________________________________________________ Chapter 6 – Combat Support
6-67
FM 3-20.96 ____________________________________________________________________________
6-68
_____________________________________________________________ Chapter 6 – Combat Support
6-69
FM 3-20.96 ____________________________________________________________________________
TELEVISION/ELECTRO-OPTICAL
6-178. TV/EO sensors are subject to many of the same limitations as
the naked eye, particularly TVs without low-light capability. Aircrews
may not be successful in acquiring a target and achieving lock-on if
smoke, buildings, or other factors repeatedly interrupt their line of
sight (LOS). TV/EO resolution is typically not sufficient at medium
and extended ranges to discriminate between a friendly position or a
target and its surrounding urban features. Ground personnel may
need to use more aggressive and overt means of identifying their
position and that of the target if TV/EO sensors are to identify, track,
and engage targets.
LASER DESIGNATION
6-179. A major challenge for a gunner in a moving aircraft is
achieving and keeping LOS with a target or friendly position. Laser
designation requires uninterrupted LOS to identify and engage a
target. Helicopters may use hover capabilities, but only in the most
permissive environments. This may mean the lasing platform has to
be very near the target, often within danger-close or weapon-arming
distances, to keep the spot on the target until ordnance impact.
Smoke from burning vehicles or other fires may drift across the laser-
to-target line, causing laser dispersion.
6-180. If the supporting sensor cannot see a target, then the laser
cannot effectively mark the target. A rule of thumb, if you detect a
target with a visual sensor and consistently determine a range to it
with a laser range finder, then you can likely designate it
satisfactorily for a laser-guided weapon.
6-70
_____________________________________________________________ Chapter 6 – Combat Support
CAPABILITIES
6-183. While conducting combat, CS, and CSS operations, the utility
and cargo helicopter unit significantly influences the squadron
commander’s fight by—
• Conducting day, night, and limited visibility combat, CS,
and CSS operations across the entire length and width of
the battlefield and in stability operations and support
operations.
• Conducting operations against a threat force from
multiple directions.
• Influencing the tempo of friendly operations.
• Rapidly moving tactical units over great distances during
close, deep, and rear operations.
• Bypassing threat positions, barriers, and obstacles to
achieve surprise.
• Enhancing the C3 process.
• Moving large amounts of supplies and equipment to
sustain combat operations.
• Moving critical repair parts quickly to increase the combat
power of the force.
• Emplacing Volcano minefields to disrupt, delay, turn, or
block threat forces.
• Conducting operations beyond the FLOT.
• Providing CSAR coverage in the AO.
• Conducting CASEVAC and personnel replacement
operations (transporting replacements forward).
• Providing refueling capabilities using Fat Hawk/Fat
Cow/jump FARPs (discussed later in this section).
LIMITATIONS
6-184. Utility and cargo helicopter units are subject to operational
limitations that the commander must consider when planning their
employment. These limitations are as follows:
6-71
FM 3-20.96 ____________________________________________________________________________
AIRCRAFT-SPECIFIC CHARACTERISTICS
6-185. The purpose of this information is to highlight aircraft
characteristics and planning considerations for utility and cargo
aircraft. It is not designed to cover all aircraft characteristics, but
focuses on those deemed critical in the planning of successful utility
and cargo helicopter operations.
UH-60A/L
6-186. The UH-60A/L is a twin-engine, single-rotor helicopter.
Primary mission capability of the helicopter is air assault and air
movement. Secondary missions include stability operations and
support operations, CSAR, C2 platform, CASEVAC, and air Volcano
(mine setting) during day, night, visual, and instrument conditions.
The aircraft is approximately 65 feet long with an approximate main
rotor span of 54 feet. Maximum gross weight for both the UH-60A
and the UH-60L is 22,000 pounds. (With an external load exceeding
8,000 pounds, the maximum gross weight is 23,500 pounds.)
Maximum airspeed is 193 knots with a normal cruise speed of 130
knots. However, the speed for any mission will vary greatly depending
on load configuration (internal or external), time of day, weather
conditions, and METT-TC. The minimum crew for tactical missions is
four—two pilots and two crew chiefs. It is essential that two crew
chiefs be used when conducting air assault, NVG operations, and
sling loads.
6-187. Capabilities of the UH/60A/L include the following:
6-72
_____________________________________________________________ Chapter 6 – Combat Support
6-73
FM 3-20.96 ____________________________________________________________________________
6-74
_____________________________________________________________ Chapter 6 – Combat Support
UH-IH
6-198. The UH-IH is a single-engine, single-rotor helicopter. Its
primary mission capability is air movement of supplies and
personnel. The aircraft is approximately 57 feet long with a 48-foot
main rotor span. Maximum gross weight is 9,500 pounds. Maximum
airspeed is 112 knots with a normal cruise speed of 100 knots.
However, the speed for any mission will vary greatly depending on
the load configuration, time of day, weather conditions, and METT-
TC. The minimum crew for tactical operations is three—two pilots
and one crew chief. The aircraft can be operated in instrument
meteorological conditions (IMC).
6-199. Capabilities of the UH-IH include the following:
• Cargo hook can carry external loads up to 4,000 pounds.
• With seats installed, the UH-IH can carry up to 11
combat-loaded troops.
• Aircraft internal loads can be up to the maximum gross
weight, with limitations of aircraft space and prohibition of
loads exceeding 100 pounds per square foot.
AERIAL RESUPPLY
6-201. Aerial resupply operations provide the squadron commander
with a flexible, responsible means to resupply his force. Although
limited by weather and threat air defense systems, aerial resupply
enables the commander to bypass congested supply routes,
destroyed bridges, and most terrain obstacles to deliver supplies
where they are most needed. At brigade level and below, aerial
resupply is generally confined to helicopters.
6-202. Helicopter resupply assets are limited. Internal to the division,
the combat aviation company of the aviation brigade provides the
only organic utility helicopter support. Aerial resupply support is
normally provided by corps aviation assets. Requests for support are
normally routed through the division G3 for action.
6-203. Close coordination must occur between all players in the
aerial resupply operation. The entire mission is reviewed and all
limitations and problem areas resolved. If a particular problem
cannot be resolved, another mode of transport should be considered
for the item of equipment that presents the problem.
6-204. Planning for aerial resupply must consider many factors,
including these:
6-75
FM 3-20.96 ____________________________________________________________________________
DAY DISTANCES
UH-60 and like aircraft 50 meters
CH-47 and like or unknown aircraft 100 meters
NIGHT
UH-60 and like aircraft 75 meters
CH-47 and like or unknown aircraft 150 meters
Surface Condition
6-208. The surface condition should be solid enough to prevent a
helicopter or load from sinking into the ground. Blowing dust, sand,
gravel, or loose debris can cause damage to people as well as
6-76
_____________________________________________________________ Chapter 6 – Combat Support
Approach/Departure Direction
6-209. When carrying an external load, it is preferred that
helicopters use gradual approach and departure angles (not a vertical
ascent or descent). The avenues of approach and departure for a
PZ/LZ should be over the lowest obstacle in the direction of the
prevailing winds. Arrival and departure obstacle clearance and wind
direction are especially important when visibility is reduced.
Site Preparation
6-210. The unit receiving the supplies is responsible for preparing
the LZ. In addition to general PZ/LZ responsibilities, specific tasks to
be accomplished are—
• PZ/LZ security.
• Recovery and assembly of equipment and supplies.
• Limited weather observations such as wind velocity,
direction, cloud cover, visibility, and approximate ceiling.
• Detailed NBC monitoring and survey, if required.
Sling-Load Missions
6-211. There are normally three different elements involved in a
sling-load mission: the supported unit that requested the mission,
the aviation unit that will provide the aircraft, and the receiving unit
that is having the cargo delivered. These elements have the following
responsibilities and functions:
6-212. Supported Unit. The supported unit is responsible for—
• PZ selection and control.
• Requisitioning of all equipment needed for sling-load
operations, to include the slings, A-22 bags, cargo nets,
and containers.
• Storage and maintenance of all sling-load equipment.
• Providing a sufficient number of trained ground crews to
rig and inspect all the loads, guide in the helicopters,
hook up the loads, and clear the helicopters for departure.
• Securing and protecting sensitive items of supply and
equipment.
• Providing load derigging and disposition instructions to
the receiving unit.
6-77
FM 3-20.96 ____________________________________________________________________________
6-78
_____________________________________________________________ Chapter 6 – Combat Support
6-79
FM 3-20.96 ____________________________________________________________________________
6-80
_____________________________________________________________ Chapter 6 – Combat Support
6-81
FM 3-20.96 ____________________________________________________________________________
6-82
_____________________________________________________________ Chapter 6 – Combat Support
COMPOSITION
6-229. The JAAT is composed of both ground and air commanders,
attack helicopters, TACAIR, and a FAC. These elements and their
responsibilities and duties are explained in the following paragraphs.
Commander
6-230. The ground maneuver force commander is responsible for the
ground and airspace below the coordinating altitude where the
supported commander must synchronize the JAAT into the battle
and bring its combined fires into play at the decisive moment. To
plan and coordinate the JAAT, ground force commanders use their
S3, tactical air control party (TACP), FSO, and the squadron
commander or his ALO. Air commanders may use the FAC-Airborne
(FAC-A), TACP, ASOC, air operations center (AOC), wing ground LNO,
and/or the squadron commander.
Attack Helicopters
6-231. The attack helicopter portion of the JAAT consists of OH-58D
Kiowa Warriors in the divisional cavalry squadron (DCS) and both the
AH-64 Apache and the Kiowa Warrior in the regimental aviation
squadron (RAS). Except for the additional planning and coordination
necessary for a joint operation, the unit will conduct the JAAT
operation as they would a normal attack mission. During the JAAT
6-83
FM 3-20.96 ____________________________________________________________________________
operation, the ACTM air mission commander (AMC) will plan the
operation, coordinate the attacks in the EA, and provide SEAD for
attacking TACAIR and armed helicopters. Although the ACTM will
provide suppressive fires against threat air defense, the primary
armor killers are TACAIR. The size of the JAAT depends on the
squadron commander’s analysis of the factors of METT-TC and the
number of TACAIR sorties allocated.
Tactical Aircraft
6-232. TACAIR that can perform CAS are the USAF A/OA-10 and F-
16; USN F/A-18; and USMC AV-8 and F/A-18. However, other
TACAIR may be employed. JAATs will normally be formed with USAF
participants. However, USN and USMC assets may be available in
some cases. The use of TACAIR significantly increases the combat
power of the ACT or ACTM by virtue of the large and varied ordnance
payloads available.
6-233. The USAF A/OA-10 provides the most flexible support to
JAATs and has several advantages over other aircraft. A/OA-10s
were specifically designed for and dedicated to the CAS mission.
A/OA-10 pilots have trained extensively with Army units in CAS and
JAAT employment TTP. Their night attack capabilities have increased
due to the fielding of NVGs and associated equipment. The A/OA-10
has extensive loiter and multipass capabilities and can react quickly
to a changing attack plan. Other TACAIR assets do not normally
possess the extended loiter capability of the A/OA-10, but are very
capable due to their LANTIRN and/or their targeting pods, FLIRs,
and/or NVGs.
6-234. The use of aircraft other than A/OA-10s may require more
coordination between the FAC and the ACT commander because they
may not be as fully trained in JAAT TTP.
6-84
_____________________________________________________________ Chapter 6 – Combat Support
6-85
FM 3-20.96 ____________________________________________________________________________
Mission Planning
6-238. Because each member of the JAAT retains his own C2 system,
mission planning must be a coordinated effort. Constant coordination is
required between the ground maneuver commander, aviation
commander, TACAIR flight lead/ALO/FAC, and FSO. As elements of the
mission change, all members must be informed so that they can adjust
their plans accordingly. Success of the JAAT operation depends on the
proper synchronization of assets and how well each member of the
JAAT understands the operation. JAAT operations may be preplanned,
immediate, or spontaneous. ATKHBs will normally be designated to
execute preplanned JAAT. DCSs and RASs can expect to execute
immediate or spontaneous JAAT during both reconnaissance and
security operations.
6-239. Preplanned. A preplanned JAAT operation is used when time
is available to request CAS in the normal planning cycle (usually 36
hours). The preplanned request is drafted by the FSO in coordination
with the TACP and processed through Army channels to the AOC.
The AOC processes the request according to priorities selected by the
joint force commander. Approved preplanned JAATs will appear in
the ATO with the number of sorties, times, and ordnance.
6-240. Immediate. An immediate request for CAS is used when time
is not available to process the request within the normal planning
cycle. An immediate CAS request should be submitted as soon as the
need is recognized. For example, if it is 1000 hours and a JAAT is
planned for 2300 hours, the immediate request for CAS will be
placed as soon as possible to allow TACAIR coordination and
planning to begin. An immediate CAS request is transmitted by the
appropriate echelon TACP over the USAF air request net directly to
the ASOC collocated at the corps main CP. Intermediate-level TACPs
monitor these requests and advise their respective commanders.
Intermediate echelon commanders may direct their assigned TACP to
disapprove the request using the air request net if other assets are
available or they otherwise do not support the request. Silence by
intermediate-level TACPs for a specified amount of time (normally 10
minutes) is considered approval. Following approval by the corps
FSE, the ASOC coordinates with the AOC to fulfill the requirement.
6-241. Spontaneous. A spontaneous JAAT operation occurs when all
members of the team are available but no time is available to plan and
coordinate. To be successful, spontaneous JAAT operations depend on
effective unit SOPs, training, and communications. A successful JAAT
operation is possible any time pilots are able to coordinate actions by
talking with each other. A common JAAT frequency that can be used
by the team members is a critical aspect of a spontaneous JAAT
operation and should be included in signal operating instruction (SOI)
and USAF ATOs. A common JAAT frequency will allow the ACTM to
communicate and coordinate its attacks with the CAS aircraft in a
minimal amount of time.
Sequencing
6-242. A well-orchestrated JAAT operation will normally require a
number of radio calls to ensure success. To reduce radio traffic to a
6-86
_____________________________________________________________ Chapter 6 – Combat Support
6-87
FM 3-20.96 ____________________________________________________________________________
6-88
_____________________________________________________________ Chapter 6 – Combat Support
EMPLOYMENT METHODS
6-245. Employment of the JAAT depends on the factors of METT-TC.
The method of employment is decided as early as possible so that
attacking assets can be coordinated. The two basic employment
methods are sector attacks and combined attacks. Sector attacks allow
each element of the JAAT to attack within a specified sector. Combined
attacks occur when JAAT elements mass their fires by attacking in the
same sector.
Sector Attacks
6-246. Sectors work best when easily recognizable terrain such as
roads, rivers, ridgelines, or tree lines are used. Sectoring the target
reduces targeting deconfliction and provides flexibility to each weapon
system in prioritizing the targets within the designated sector. The three
types of sector attacks are sector-simultaneous, sector-sequential, and
sector-random.
6-247. Sector-simultaneous. During sector-simultaneous attacks,
each element maneuvers to attack within its assigned sector to
engage targets simultaneously with other JAAT elements. All aircraft
must coordinate ordnance fans to avoid fratricide.
6-248. Sector-sequential. During sector-sequential attacks, each
element maneuvers within its assigned sector to attack in a
predetermined sequence. This sequence may range from several
seconds to several minutes. This option reduces the ordnance fan
coordination problem and facilitates covering fire for each succeeding
element.
6-249. Sector-random. During sector-random attacks, each element
maneuvers to attack within its assigned sector and engages targets at
will. All elements must coordinate ordnance fans and ensure fratricide
avoidance.
Combined Attacks
6-250. Combined attacks usually involve helicopters and TACAIR,
using approximately the same avenue of approach to the target.
Combined attacks typically provide good mutual support between the
different elements but require more coordination and are more
predictable to the threat after the initial attack. The three types of
combined attacks are combined-simultaneous, combined-sequential,
and combined-random.
6-251. Combined-simultaneous. During combined-simultaneous
attacks, all elements engage targets in the same sector and attack
simultaneously. All elements must coordinate ordnance fans and
ensure fratricide avoidance. Combined-simultaneous attacks maximize
destruction of the threat and are the simplest to control. This is an
excellent control method when FA fires are not available or when
elements can use maximum ordnance elevation for deconfliction of
airspace.
6-252. Combined-sequential. During combined-sequential attacks,
all elements engage targets in the same sector and attack in a
predetermined sequence. This sequence may range from several
seconds to several minutes. This option reduces the ordnance fan
6-89
FM 3-20.96 ____________________________________________________________________________
6-90
_____________________________________________________________ Chapter 6 – Combat Support
6-91
FM 3-20.96 ____________________________________________________________________________
NOTE: Authentication and appropriate responses suggested here. The brief may be abbreviated for
brevity or security (“as fragged” or “with exception”).
4. Ordnance: ___________________________________________________________________________
6-92
_____________________________________________________________ Chapter 6 – Combat Support
Omit data not required. Do not transmit line numbers. Units of measure are standard unless otherwise
specified. The asterisk (*) denotes minimum essential in limited communications. Bold denotes readback
items when requested.
NOTE: For AC-130 employment, lines 5, 6, and 8 are mandatory briefing items.
Remarks should also include detailed threat descriptions, marking method of friendly locations (including
magnetic bearing and distance in meters form the friendly position to the target, if available), identifiable
ground features, danger close acceptance.
Time on Target: “________________________________________________________________________“
or
Time to Target: “Standby _______________ plus ________________________________________ Hack.”
6-93
FM 3-20.96 ____________________________________________________________________________
CAPABILITIES
6-94
_____________________________________________________________ Chapter 6 – Combat Support
6-95
FM 3-20.96 ____________________________________________________________________________
6-96
_____________________________________________________________ Chapter 6 – Combat Support
6-97
FM 3-20.96 ____________________________________________________________________________
6-98
_____________________________________________________________ Chapter 6 – Combat Support
6-99
FM 3-20.96 ____________________________________________________________________________
6-100
_____________________________________________________________ Chapter 6 – Combat Support
6-101
FM 3-20.96 ____________________________________________________________________________
Military
Military Intelligence Company
Company
ISR-TA
ISR-TA Architecture
Architecture
TUAV
JSTARS Ntl/Theater
Platforms
IBS NIMA
DIA
U2 SIPRNET DHS
(TRAP NGIC
TADIXS-B NSA
COL
TIBS SCI JWICS INSCOM
TRIXS)
GRCS -
connectivity
CGS
via SIPRNET
TROJAN SPIRIT
CCS
ARFOR HQ ACE
HUMINT
6-102
_____________________________________________________________ Chapter 6 – Combat Support
6-103
FM 3-20.96 ____________________________________________________________________________
6-104
_____________________________________________________________ Chapter 6 – Combat Support
6-299. S2X Team. The S2X team provides the ISR integration
platoon with a dedicated mission management function for tactical
HUMINT collection, a critical intelligence capability in SSC
operations. The S2X ensures that the HUMINT collection, analysis,
and dissemination effort is conducted in concert with the
commander’s requirements and that the intelligence is delivered
when needed, in a usable format, and in time to influence his
decision making. Working in conjunction with the ISR management
team, the S2X develops HUMINT SIR, orders, and RFIs based on the
SBCT’s commander’s PIR. It works closely with the G2X at the
6-105
FM 3-20.96 ____________________________________________________________________________
ARFOR and J2X at the JTF to ensure that HUMINT efforts within the
theater are complementary and supportive of the SBCT commander’s
intelligence requirements. For subordinate CI agents and HUMINT
collectors, the S2X provides collection focus, technical support, and
technical control. It also provides tactical HUMINT support to
situation development, information operations, and force protection.
Other specific tasks for the S2X team are—
• Synchronize the HUMINT collection effort in the SBCT’s
AO.
• Manage source registration and deconfliction.
• Manage the intelligence contingency fund and source
incentive program.
• Access the national source database through the
migration defense intelligence threat data system (MDITS).
• Access national and theater HUMINT reports and
products through the supporting ARFOR ACE.
• Provide HUMINT link and pattern analysis support to the
ISR analysis platoon.
6-106
_____________________________________________________________ Chapter 6 – Combat Support
6-107
FM 3-20.96 ____________________________________________________________________________
Limitations
6-313. Limitations of the MI company include the following:
• Linguist Support. The MI company relies on a force pool
of linguists to support requirements based on the
operational environment. The linguists must be identified,
trained, tracked, and placed on call for insertion in 24 to
48 hours as the situation dictates. Linguistic
requirements include translation, tactical HUMINT, and
SIGINT operations. Linguists will also be pushed down to
6-108
_____________________________________________________________ Chapter 6 – Combat Support
6-109
FM 3-20.96 ____________________________________________________________________________
DECONTAMINATION SUPPORT
6-320. The squadron receives support from a divisional or corps NBC
company decontamination platoon when thorough decontamination
is required. Thorough decontamination is normally required after
contamination with a persistent agent or prolonged exposure to other
agents. It requires detailed planning and extensive manpower and
equipment resources. It is conducted in a forward area to limit
contamination spread, but in an area that will be out of likely contact
with the threat throughout the operation.
6-321. The squadron may be relieved by other units to conduct
thorough decontamination. Decontamination may proceed by troop,
or the entire squadron may move to the decontamination site. If the
decontamination proceeds by troop and the squadron remains
committed in a mission, the decontamination unit may be placed
under OPCON of the squadron. More often, the affected troop or the
entire squadron moves to the established site and conducts thorough
decontamination under division control. This method permits the
most effective and expeditious use of decontamination assets.
ORGANIZATION
6-323. The engineer company organic to the SBCT is ideally suited
for integration into the maneuver operations at all levels. It is an agile
6-110
_____________________________________________________________ Chapter 6 – Combat Support
6-111
FM 3-20.96 ____________________________________________________________________________
SUPPORT CAPABILITIES
MOBILITY
6-328. Mobility operations maintain the freedom of movement for
maneuver units and critical supplies. Engineers accomplish this by
reducing the effects of existing or reinforcing obstacles, by providing
gap crossings, and by constructing and maintaining combat roads
and trails. Engineers often support a squadron during
reconnaissance by performing mobility tasks in support of the
movement or maneuver of follow-on forces. Construction and
maintenance of routes are accomplished to the extent necessary to
support the momentum of the squadron and SBCT. Improvement of
existing routes is the first choice, with construction of short bypasses
second. Movement of service support assets must also be considered
when constructing combat roads and trails since these assets require
the highest degree of mobility support.
COUNTERMOBILITY
6-112
_____________________________________________________________ Chapter 6 – Combat Support
6-113
FM 3-20.96 ____________________________________________________________________________
SURVIVABILITY
6-333. Survivability operations entail the development and
construction of protective positions to reduce the effectiveness of
threat weapon systems. Engineers construct survivability positions
for C2 elements and for critical equipment and supplies. They dig
individual and crew-served weapon positions and vehicle fighting
positions and may provide cover for personnel and vehicles. The most
extensive survivability effort is expended in the defense. There is
seldom enough time or equipment for the engineers to do all the
tasks desired; therefore, soldiers, vehicle crews, and units must do
all they can to prepare their own survivability positions. The
squadron commander designates the priority for engineer effort in
survivability work. The amount of time available and the level of
threat determine the amount of resources the squadron can invest in
increasing survivability. The maneuver battalions and SBCT
headquarters may get the priority of engineer survivability support.
Squadron priorities should list CPs (combat trains command post
[CTCP], field trains command post [FTCP]) and high value assets
(TROJAN, GCS) as top priorities.
ENGINEER MISSIONS
6-335. The engineer unit may be placed in a supporting relationship
with a specific subordinate ground troop for an operation in which
this arrangement best accomplishes the mission. Squadron units
provide security to engineers as they work on their tasks and are
prepared to provide CSS as well. These actions ensure the engineer
effort is focused. The engineer company commander or platoon leader
can best manage the collective effort of the entire company/platoon
and supporting equipment, using them as needed to accomplish the
commander’s intent. Reconnaissance missions may, on occasion,
require an engineer platoon to delegate squads to troops or scout
platoons.
6-336. As the troops and engineer platoons identify assigned
obstacles and mark survivability positions, they use on-board
6-114
_____________________________________________________________ Chapter 6 – Combat Support
position location devices and FBCB2 to verify the start point, end
point, and turn points along the length of the obstacle. In addition,
they annotate the location of unit-emplaced protective obstacles and
transmit the updated obstacle overlay back to the main CP for
consolidation.
EMPLOYMENT METHODS
6-337. For mobility, countermobility, and survivability support,
engineers may be tasked organized to support the maneuver effort
using one of three methods. The first method is to be attached or
OPCON to the squadron. Method two is to operate pure, and the final
method is to be task organized to the maneuver battalions. Table 6-
16 outlines considerations for these methods. Additional guidance on
engineer employment may be found in FM 3-34.1 [FM 90-7].
6-115
FM 3-20.96 ____________________________________________________________________________
Method 1
6-338. In method 1, the squadron receives the engineer element and
either task organizes it down to troop level or keeps it under
squadron control. The size of the element and the mission will
influence the method of control. Engineers reconnoiter and/or reduce
obstacles identified by the squadron’s reconnaissance elements.
Close handover is required between reconnaissance elements and
engineers (see Chapter 5). FBCB2 facilitates the handover process.
Method 2
6-339. In this method, the engineers operate pure, under SBCT
control. The engineer company provides support to the squadron and
maneuver battalions as directed. The squadron reports its
requirements to the SBCT. It coordinates closely with the engineer
company headquarters to hand over obstacles identified during
squadron reconnaissance and/or to identify areas that may require
engineer countermobility efforts.
Method 3
6-340. When the engineers are task organized to maneuver
battalions, they maneuver with the battalions and provide mobility
and countermobility support in relation to obstacles identified by the
squadron, the battalion scout platoons, or other intelligence assets.
6-116
_____________________________________________________________ Chapter 6 – Combat Support
6-117
FM 3-20.96 ____________________________________________________________________________
6-118
_____________________________________________________________ Chapter 6 – Combat Support
6-119
FM 3-20.96 ____________________________________________________________________________
6-354. Local air defense warnings do more than describe the current
level of air threat in the immediate area. They also require specific air
defense reactions from receiving units. Unit commanders must
establish in their tactical SOP what they want their units to do when
a local air defense warning is received.
6-355. Air defense control is exercised by ROE that delineate the
circumstances under which weapons can fire at an aircraft. The
SBCT commander establishes the rules to provide the degree of
centralized control required. These rules allow for decentralized
execution. Subordinate commanders can issue more restrictive ROE
than those imposed by the SBCT commander, but not more
permissive ones. The right of self-defense is always preserved. For the
squadron, the critical ROE are as follows:
• Hostile criteria. Hostile criteria describe the conditions
under which an aircraft may be identified as hostile for
engagement purposes. Examples include speed, altitude,
heading, release of projectiles, or other requirements
within specified volumes of airspace. At squadron level,
these criteria include visual recognition of specific threat
characteristics or hostile acts.
• Weapons control status. WCS describes the degree of fire
control imposed (hold, tight, or free) on air defense
6-120
_____________________________________________________________ Chapter 6 – Combat Support
6-121
FM 3-20.96 ____________________________________________________________________________
6-122
_____________________________________________________________ Chapter 6 – Combat Support
6-363. The SBCT has an organic signal company that supports the
SBCT’s command, control, communications, computers, intelligence,
surveillance, and reconnaissance (C4ISR) network (see Figure 6-21).
The SBCT signal company (BSC) deploys, performs, and installs,
operates, and maintains (IOM) for the SBCT’s C4ISR support
network. The BSC also provides the S6 staff. In the execution of its
mission, the BSC establishes networks that support SBCT operations
and integrate with division ARFOR, JTF, or theater networks. The
BSC provides reachback connectivity to ARFOR headquarters, range
extension of the SBCT’s signal services, network management of all
organic assets, and establishment of primary CP voice/video
capabilities. It also performs limited, critical signal electronic
maintenance.
6-123
FM 3-20.96 ____________________________________________________________________________
Company Headquarters
3/3/20/26
Cmd Section Ntwk Mgmt Section S6 Section
2/0/4/6 0/2/6/8 1/1/10/12
Tactical
Communications
0/0/20/20 Section
0/0/1/1
EPLRS/NCS EPLRS/SINCGARS
Team Retrans Teams
0/0/8/8 0/0/11/11
HEADQUARTERS
6-365. The headquarters contains the command section, the network
management (NM) section, and the S6 section. Refer to Figure 6-22.
6-124
_____________________________________________________________ Chapter 6 – Combat Support
AS OF 041015NOV99
SWITCHING PLATOON
6-368. There are three distinct sections within the switching platoon:
the warfighter information network section and the electronic
maintenance section.
6-125
FM 3-20.96 ____________________________________________________________________________
GR Description MOS
ELM Section
E7 Section Chief 35W
ELM Contact Tm
E5 Signal Repair NCO 35E
E4 Signal Equip Repairer 35E
ELM Facility
E5 Microwave Repair NCO 31P
E5 Switch Repair 31F
E4 Switch Repair 31F
AS OF 041015NOV99
6-126
_____________________________________________________________ Chapter 6 – Combat Support
TRANSMISSION PLATOON
6-371. The four sections in the transmission platoon are the tactical
satellite (TACSAT) section, the enhanced position location reporting
system (EPLRS) section, the TROJAN SPIRIT section, and the TI (see
Figure 6-24).
TACSAT Section
E6 SATCOM OPS NCO 31S
Satellite Teams
E5 SATCOM Team Chief 31S x3
E4 SATCOM Oper 31S x6
E3 SATCOM Oper 31S x3
EPLRS/NCS Teams
E5 NCS Team Chief 31C x2
E4 NCS Opr 31C x4
E4 NCS Maintainer 31CT1 x2
AS OF 041015NOV99
6-127
FM 3-20.96 ____________________________________________________________________________
6-128
_____________________________________________________________ Chapter 6 – Combat Support
6-129
FM 3-20.96 ____________________________________________________________________________
LIMITATIONS/RISKS
Bandwidth Availability
6-381. As a limitation, the SBCT’s TI and CNRV network support the
squadron and the three CAMBs (voice and data C2 only). Due to their
heavy equipment and personnel density, the squadron and battalions
do not have the SBCT ACUS network switching and TACSAT
capability required for tactical telephone service and traditional
6-130
_____________________________________________________________ Chapter 6 – Combat Support
SQUADRON AUGMENTATION
6-383. Due to dispersed and decentralized operations, the squadron
staff must pay particular attention to the communications
requirement of the squadron. Mountainous and urban terrain poses
unique communication challenges for the squadron to overcome.
Requesting assets from the transmission platoon of the BSC can
greatly improve the squadron’s internal and/or external
communications. The electronic maintenance section of the BSC is
the primary unit for maintenance on the majority of the squadron’s
communication systems, especially for TROJAN SPIRIT. The BSC will
normally operate in or around the SBCT main CP.
6-131
FM 3-20.96 ____________________________________________________________________________
6-386. In most cases, the squadron will not have direct tasking
authority for any of these intelligence community assets. It can,
however, send RFIs through the SBCT S2. The S2 will forward the
request once it is received or incorporate the request into the SBCT’s
ISR plan to make use of the assets. These intelligence assets are
especially important prior to or during the conduct of
multidimensional reconnaissance. The background and/or current
6-132
_____________________________________________________________ Chapter 6 – Combat Support
6-133
FM 3-20.96 ____________________________________________________________________________
DEPARTMENT OF DEFENSE
6-134
_____________________________________________________________ Chapter 6 – Combat Support
6-135
FM 3-20.96 ____________________________________________________________________________
ARMY INTELLIGENCE
6-400. The US Army has undertaken an important transformation,
shifting away from the Cold War and moving beyond the Industrial
Age into the Information Age. As part of this transformation,
intelligence is
6-136
_____________________________________________________________ Chapter 6 – Combat Support
being fully integrated into the force at every level. The conduct of
successful operations requires that—
• Intelligence flows seamlessly from national systems to
tactical operations.
• It supports warfighting commanders at each echelon.
• It can be communicated within seconds.
Joint Support
6-404. At joint level, special operations forces (SOF) are commonly
used for HUMINT. The A-Teams within the SOF specialize in
reconnaissance. The team consists of 12 personnel. Special
Operations Command coordination elements are normally placed at
the operational and tactical levels.
Corps Support
6-405. The Army has a robust intelligence structure that supports
tactical-level warfighters. At corps level, the commander’s senior
intelligence officer, the G2, and an organic MI brigade provide
intelligence support. The MI brigade provides support across the full
range of intelligence and CI disciplines and functions.
6-406. Assets within the corps and MI brigade include—
• UAVs (see Appendix G).
• Guardrail system (see Appendix F).
• EH-60 Quickfix (see Appendix F).
• Long-range surveillance company (LRSC). This company
has the primary mission to maintain surveillance for a
6-137
FM 3-20.96 ____________________________________________________________________________
Division Support
6-407. The division intelligence structure provides collection assets
and analytic organizations that meet the division and brigade
commanders’ intelligence needs. The MI battalion at division provides
the commander with an organic collection and analytic capability.
SBCT/Battalion Support
6-408. The intelligence structure at the maneuver battalion and
SBCT is simple, small, and standardized. Both elements have small
intelligence staffs designed to support commanders with the
expedited distribution of combat intelligence. The SBCT is also
augmented with a direct support MI company. The primary
reconnaissance asset for a SBCT is the SBCT reconnaissance troop.
The troop consists of two scout platoons (six HMMWVs per platoon)
and one STRIKER platoon (six HMMWVs).
6-138
_____________________________________________________________ Chapter 6 – Combat Support
6-139
FM 3-20.96 ____________________________________________________________________________
6-140
_____________________________________________________________ Chapter 6 – Combat Support
Disaster Squad
6-423. The nucleus of the Disaster Squad consists of the FBI
Laboratory’s latent fingerprint specialists. Over the past 50 years, the
squad has assisted in examining more than 7,200 victims in over
175 disasters. Of these, 4,150 were positively identified through
fingerprints, palm prints, and footprints. Recent incidents requiring
Disaster Squad assistance include the Oklahoma City bombing; the
bombing of a US military housing facility in Dharan, Saudi Arabia;
and the bombing of US embassies in Nairobi, Kenya, and Dar es
Salaam, Tanzania.
6-141
FM 3-20.96 ____________________________________________________________________________
6-431. The INR coordinates the handling of issues that arise in the
course of—
• Intelligence.
• Security.
• Counterintelligence.
• Investigations.
• Special operations.
6-142
_____________________________________________________________ Chapter 6 – Combat Support
6-143
FM 3-20.96 ____________________________________________________________________________
DEPARTMENT OF ENERGY
6-433. The Department of Energy’s foreign intelligence program is a
component of the intelligence community. The department focuses its
intelligence activities on these substantive areas:
• Nuclear proliferation.
• Nuclear weapons technology.
• Fossil and nuclear energy.
6-144
Chapter 7
7-1
FM 3.20-96 ____________________________________________________________________________
7-2
___________________________________________________ Chapter 7 – Squadron Urban Operations
TERRAIN
7-2. The terrain component is the most basic and easily
recognizable aspect of an urban area. However, truly understanding
it requires comprehending its multidimensional nature, types of
urban terrain, and size. The infinite ways in which these factors can
be combined makes it impossible to describe a “typical” city. Yet,
these elements provide a framework for understanding the terrain
component of the urban environment.
MULTIDIMENSIONAL NATURE
7-3. Urban terrain presents an extraordinary blend of horizontal,
vertical, interior, exterior, and subterranean forms superimposed
upon the landscape’s natural relief, drainage, and vegetation. While a
city may appear dwarfed by the surrounding countryside, the surface
area of an urban environment is usually many times that of a
similarly sized portion of natural terrain. Additionally, the conduct of
urban operations can radically alter the physical nature of the terrain
in ways not experienced in other environments. Some buildings may
be destroyed either through combat or natural disasters, eliminating
reference points and leaving large piles of rubble. Urban operations
may cause uncontrollable fires or the loss of electricity. A loss of
electrical power can cause flooding (especially in subterranean areas)
by shutting down pumping stations. The likely presence of hazardous
materials may create additional obstacles. In addition, the physical
environment can dramatically affect the conduct of urban operations.
The four physical dimensions that must be considered are described
below.
Airspace over the City
7-4. As in other environments, the air provides a rapid avenue of
approach in urbanized areas. Aerial assets can be used for
observation and reconnaissance, aerial attack, or high-speed
insertion and extraction of soldiers, supplies, and equipment. While
obstacles such as rubble do not affect aerial assets, buildings of
varying height and the increased density of towers, signs, and power
lines limits lower altitude maneuverability. They are also vulnerable
to man-portable surface to air systems, antitank (AT) weapons, and
small arms weapons. The UAV is the squadron’s primary tool
operating in the airspace over a city.
7-3
FM 3.20-96 ____________________________________________________________________________
Buildings
7-5. Buildings provide cover and concealment; limit or enhance
observation and fields of fire; and restrict, canalize, or block
movement. Buildings also provide excellent concealed locations for
snipers and air defense artillery (ADA) or AT crews. The building level
enables top-down attacks against the weakest points of armored
vehicles and unsuspecting aircraft. The recce soldier on the ground is
the squadron’s primary reconnaissance asset in checking buildings.
Streets
7-6. Highways, streets, and sidewalks provide avenues of approach
and the means for rapid ground advance. However, forces moving
along streets are often canalized by the buildings and have little
space for off-street maneuver. As such, obstacles on urban streets
are usually more effective than those on roads in open terrain since
entering and transiting buildings are often the only means of bypass.
While ground surveillance radar (GSR) and measurement and
signature intelligence (MASINT) (sensors) provide some
reconnaissance capability on streets, it is still the dismounted scout
who is primary.
7-4
___________________________________________________ Chapter 7 – Squadron Urban Operations
Subterranean Systems
7-7. Subterranean systems found in the urban area can serve as
the avenues of approach. They include subways, sewers, cellars, and
utility systems. All sides can use subterranean systems to maneuver
against the rear or flanks of their adversary and to conduct
ambushes and sustainment operations.
7-5
FM 3.20-96 ____________________________________________________________________________
SIZE
7-9. Urban areas are classified into the following categories in
relation to size—
• Villages – population of 3,000 or less.
• Strip areas – urban areas built along roads connecting
towns or cities.
• Towns and small cities – population up to 100,000 and
not part of a major urban complex.
• City – population over 100,000 to 1 million.
• Metropolis with associated urban sprawl – population over
1,000,000 to 10,000,000 covering hundreds of square
kilometers.
• Megalopolis – population over 10,000,000.
INFRASTRUCTURE
7-11. Urban structures are those physical and cyber-based systems
that support the inhabitants and their economy and government.
Targeting or controlling vital parts of the infrastructure can deter or
isolate threat aggression. Targeting any portion of the urban
infrastructure can have a cascading effect (either intentional or
unintentional) on the other elements of the infrastructure. The
commander can gain a tactical advantage using precision munitions,
electronic disruption of communications, or intelligence on essential
facilities or structures. Commanders must look beyond the
immediate tactical situation and understand the effects that the
destruction of any of these elements may have on future operations
and the inhabitants of the urban area. The squadron determines
what infrastructure in the urban area can provide commanders with
essential logistics and CSS assets and also assess what the initial
expenditure of time and resources may be necessary to support
operations within the urban area (see Figure 7-2). The following
paragraphs list examples of infrastructure components.
7-6
___________________________________________________ Chapter 7 – Squadron Urban Operations
Communications
and
Information Energy
Human
Services
Commerce
Transportation
and
Distribution
ENERGY
7-14. This system provides the power to run the urban area and
consists of the industries that produce and distribute electricity, oil,
and natural gas.
COMMERCE
7-15. This includes business centers and outlying industrial and
agricultural areas as well as environmentally sensitive areas.
HUMAN SERVICES
7-7
FM 3.20-96 ____________________________________________________________________________
SOCIAL
7-17. The center of gravity during an urban operation, particularly
stability and support operations, may be the civilian inhabitants
themselves. The side that gains the support of the population retains
innumerable advantages. To gain or retain the support of the
population, commanders must understand its social and political
characteristics. With this understanding, commanders can
implement programs, or take direct action to maintain support of a
friendly populace, neutralize, or gain the support of hostile or neutral
factions. Some critical aspects of the social component include—
• Demographics.
• Ethnic and cultural information.
• Historical background.
• Political and religious conflicts.
• Customs and behaviors.
• Criminal activity.
7-18. The squadron will most likely face threats that are supported
by weak national economies and infrastructures seeking to achieve
regional objectives that challenge US national objectives. Trends
indicate an increasing availability and integration of more
sophisticated technology and unorthodox operational approaches by
potential opponents focused on the diversity and time sensitivity of
humanitarian issues. Offsetting their inherent weaknesses, threat
forces will seek advantage in urban and restrictive terrain to remain
dispersed and decentralized, adapting their tactics to provide them
the best success in countering a US response. Threats, in addition to
conventional forces, may consist of—
• Unconventional forces.
• Paramilitary forces.
• Militia and special police organizations.
• Organized criminal organizations.
• Local civilians.
7-8
___________________________________________________ Chapter 7 – Squadron Urban Operations
Allow No Sanctuary
7-9
FM 3.20-96 ____________________________________________________________________________
the threat for destruction would be stealth aircraft, M1A2 main battle
tank (MBT), Apache Longbow helicopter, TPQ-36/37 Firefinder radar,
Joint Surveillance Target Attack Radar System (JSTARS) or Airborne
Warning and Control System (AWACS) aircraft, or Army Tactical
Missile System (ATACMS). These systems are recognized as premier
items in their categories, and losses among these items would
undermine morale, degrade operational capability, and erode
confidence in those weapon systems. The Army has made
considerable investments in command and control and plans to fight
future wars with information superiority. The threat will invariably
seek to suppress/degrade these systems. Proliferation of advanced
antitank guided missiles (ATGM) in the hands of line infantry or
insurgents in urban areas could jeopardize armored systems. The
TPQ-36/37, ATACMS, and ground terminals for UAVs could be
targeted by threat special operations forces (SOF) aided by the
civilian population and commercial intelligence, surveillance, and
reconnaissance (ISR) systems.
7-24. Force-on-force battles will occur at a time and place of the
threat’s choosing. The threat may offset US air, ISR operations, and
other technological advantages by contesting US objectives in urban
areas where he can achieve sanctuary from our effects. These fights
may involve decentralized maneuver, precision fires, and
simultaneous operations involving unconventional and special
purpose forces (SPF). Threat forces will plan and conduct operations
as opportunities present themselves. In urban areas, infantry
formations will often follow this pattern, mixing (or blending in) with
the civilian population as a method of concealing a light infantry
force.
7-25. The threat may also have the capability of using human
intelligence (HUMINT) assets to a greater degree and more effectively
than the Army, gaining intelligence through civilians or local workers
contracted by the Army for base operation purposes. Cellular
telephones may be distributed to essential information nodes as a
backup communication means to provide redundancy. The threat
may make use of commercial systems intertwined with legitimate
civilian users, making it unpalatable to prevent threat use of these
assets.
7-10
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-11
FM 3.20-96 ____________________________________________________________________________
ALLOW NO SANCTUARY
7-32. Army forces may be denied safe haven during deployment and
throughout every phase of urban operations. The resultant drain on
manpower and resources to provide adequate force protection
measures may result in reduced strategic, operational, and tactical
means to conduct war and an erosion of national will to sustain
conflict. Terrorism may be one of the tactics used to deny sanctuary
to Army forces, attacking Army forces anywhere, particularly in
urban areas. The threat may employ state sponsored or independent
terrorists, well equipped, armed, and motivated for this mission.
These attacks seek to disrupt force protection operations.
Additionally, they may feature coordinated operations between police,
paramilitary, special purpose, guerilla forces, mercenaries, and
conventional forces to present non-linear, simultaneous threat
operations conducted throughout the depth of the urban area of
operations (AO), to include WMD and the means of delivery of those
weapons.
7-33. These forces are equipped with small arms, mortars, machine
guns, anti-armor weapons (possibly two to three times the number
possessed by past adversaries), and mines to very capable
mechanized and armored forces equipped with current generation
equipment. These approaches seek to counter the technological and
numerical advantages of US joint systems and forces, and to exploit
constraints placed on US forces due to cultural bias, media presence,
ROE, rules of interaction (ROI), and distance from the crisis location.
The urban environments are generally characterized by weak
infrastructure, especially roads, bridges, rail, airport, and seaport
facilities. Urban environments also provide many passive dangers
such as disease from unsanitary conditions and psychological
illnesses.
7-34. Within this environment, most threats are not capable of long-
term, sustained, high-tempo combat operations. They are capable of
limited duration and limited objective operations such as destruction
of a weaker force, seizure of an area or region, or seizure of an urban
area. Forces in this environment are capable of long term, sustained
unconventional terrorist and guerilla operations. Compounding this
threat is the potential for transnational or non-state actors to openly
oppose the goals and actions of US forces. These elements can
include individual or organized criminal factions, religious groups,
and ethnic entities. These groups may employ terrorism against the
populace under US protection or against US forces in the region.
THREAT TACTICS
7-35. While the active threats will vary widely, many techniques will
be common to all (see Figure 7-4). The following paragraphs are sets
of tactical tenets that may be used against US forces in the urban
environment.
7-12
___________________________________________________ Chapter 7 – Squadron Urban Operations
Use
Usethe
thePopulation
Populationto
toAdvantage
Advantage
Win
Winthe
theInformation
InformationWar
War
Manipulate
ManipulateKey
KeyFacilities
Facilities
Use
UseAll
AllDimensions
Dimensions
Employ
EmployUrban-Oriented
Urban-OrientedWeapons
Weapons
Engage
Engagethe
theEntire
EntireForce
Force
Focus
FocusAttacks
Attackson
onService
ServiceSupport
Support
and Unprotected Soldiers
and Unprotected Soldiers
7-13
FM 3.20-96 ____________________________________________________________________________
7-14
___________________________________________________ Chapter 7 – Squadron Urban Operations
Weapons
Weaponswith
withno
nominimum
minimum Mortars.
Mortars.
depression
depressionor
ormaximum
maximum
elevation.
elevation.
Sniper
Sniperrifles.
rifles.
Grenade
Grenadelaunchers Machine
launchers Machineguns.
guns. Grenades.
Grenades.
(automatic
(automaticand
andrifle-
rifle-
mounted).
mounted).
Flame
Flameand
andincendiary
incendiaryweapons.
weapons.
RPGs
RPGsand
andother
othershoulder-fired
shoulder-fired Riot
Riotcontrol
controland
and
ATGMs.
ATGMs. tranquilizer
tranquilizergases.
gases.
Weapons
Weaponswith
withlittle
littleor
ornonobackblast
backblast Mines
Minesand
and
(gas-metered,
(gas-metered,soft
softlaunch,
launch,etc.)
etc.) boobytraps.
boobytraps.
7-15
FM 3.20-96 ____________________________________________________________________________
FUNDAMENTALS
7-16
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-17
FM 3.20-96 ____________________________________________________________________________
TRANSITION CONTROL
7-52. Urban operations must be planned to accomplish assigned
missions in the most expeditious manner. The end state of urban
operations is the transfer of control to civilian or other agency
control. The SBCT must thoroughly develop a transition plan that
ensures the restoration of peaceful conditions and avoids further
disruption to stability within the AO.
7-53. A framework used to visualize and conceptualize urban
operations is—
• Assess.
• Shape.
• Dominate.
• Transition.
OFFENSIVE OPERATIONS
7-54. During offensive operations, the SBCT commander seeks to—
• Synchronize fires and effects (lethal and nonlethal), and
information operations.
• Isolate the threat force.
• Destroy high-payoff targets (HPT).
• Use close combat, when necessary, against the threat.
ASSESS
7-55. The squadron primarily assesses the urban environment by
conducting intelligence preparation of the battlefield (IPB) to
determine what may be decisive. (See FM 2-01.3 [FM 34-130] for
detailed information on urban IPB.) The squadron also conducts an
analysis of existing intelligence and results of previous operations
that impact current operations and initiates aggressive
reconnaissance and surveillance as soon as allowed by the ROE. This
normally consists of conducting area and route reconnaissance to
identify what may be decisive components of the urban area and
threat.
SHAPE
7-18
___________________________________________________ Chapter 7 – Squadron Urban Operations
TRANSITION
7-58. During transition, the squadron conducts ISR operations
consistent with the mission end state and ROE to assist the brigade
as it transitions from combat operations to stability (or support)
operations in order to return the urban area back to civilian control.
DEFENSIVE OPERATIONS
7-59. The SBCT may be tasked to defend an urban area for various
reasons, to include protecting political institutions and economic
infrastructures, protecting an urban population, or shaping
conditions for decisive offensive operations.
ASSESS
7-60. In assessing the urban area for defense, the SBCT
commander uses the squadron to conduct an aggressive ISR
operation to determine the composition and intentions of the threat.
The threat may intend to seize objectives within the city using speed
and firepower to overwhelm defending forces, or it may begin by
isolating the urban AO and its defenders. This assessment
determines what needs to be accomplished to prevent the isolation of
the brigade. Additionally, the squadron assesses the defensive
qualities of the urban environment. This is normally conducted as an
area reconnaissance; the squadron will transition to a screen to
assist with shaping the battlespace.
SHAPE
7-19
FM 3.20-96 ____________________________________________________________________________
7-20
___________________________________________________ Chapter 7 – Squadron Urban Operations
DOMINATE
7-62. Dominating the urban area in a defensive operation requires
decisively defeating the threat’s attacks. Domination translates into
denying threat efforts to control the vital functions and critical
infrastructure of the urban area. The SBCT employs precision
indirect fires synchronized with direct fires from covered positions,
oriented against selected avenues of approach and engagement areas.
The squadron will control precision fires on selected targets using
scouts and UAVs to separate threat forces in contact from reinforcing
forces. Additionally, the squadron may help direct the brigade’s
mobile counterattack force on threat formations or locations.
TRANSITION
7-63. At the conclusion of a successful defense, the SBCT
consolidates and reorganizes in preparation for offensive operations.
The same considerations for transition that were discussed in
offensive operations apply to transition in the defense (see paragraph
7-60).
SECTION IV – PLANNING
7-21
FM 3.20-96 ____________________________________________________________________________
URBAN RECONNAISSANCE
7-69. As part of area reconnaissance, the squadron will conduct
reconnaissance of urban areas during some missions. The squadron
will need to focus its reconnaissance to provide information about the
urban area to support the commander’s COA. This information may
be directly linked to the commander’s critical information
requirements (CCIR) or may support triggers established in his COA
(targeting lethal and nonlethal effects). The following is an example of
specific information requirements (SIR) given to reconnaissance
(recce) troops for the Urban Assessment Report (see Figure 7-6, parts
one through four). This form can be tailored and is not all-inclusive.
The squadron should develop similar SIR for each mission for
HUMINT collection. This form provides an example of SIR that
support society and infrastructure requirements as well as the
traditional threat and terrain.
7-22
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-23
FM 3.20-96 ____________________________________________________________________________
7-24
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-25
FM 3.20-96 ____________________________________________________________________________
URBAN MAPPING
7-70. Prior to entering an urban environment, the squadron
develops urban operations sketches (see Figures 7-7 and 7-8). Units
should attempt to gain access to city planner or civil engineer maps
7-26
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-27
FM 3.20-96 ____________________________________________________________________________
7-28
___________________________________________________ Chapter 7 – Squadron Urban Operations
RIVER
CITY
HALL
12 15
13
10
8 11
9
6
4 7
2 HOSPITAL 3
7-29
FM 3.20-96 ____________________________________________________________________________
7-30
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-31
FM 3.20-96 ____________________________________________________________________________
7-32
___________________________________________________ Chapter 7 – Squadron Urban Operations
ATTACK HELICOPTERS
7-85. Cavalry units may be supported by a variety of attack
helicopters ranging from fully modernized AH-64Ds to lightly armed
but agile
OH-58Ds. Regardless of the specific type of attack helicopter
available, the same missions and tasks can be accomplished due to
the inherent flexibility of Army aviation units. Because of the
increased risk of small arms and MANPAD engagements, aviation
7-33
FM 3.20-96 ____________________________________________________________________________
7-34
___________________________________________________ Chapter 7 – Squadron Urban Operations
arm and stabilize on the intended target. Often, fire from longer
ranges actually improves accuracy. In urban structures, the shaped
charge of the Hellfire produces less damage and over-pressurization
than the TOW’s high explosive round. Window engagements are
generally not recommended, since the missile will usually impact the
far wall of the structure, expending its blast energy away from the
structure. Missile impact on the facing structure will normally cause
over-pressurization inside the structure (in the vicinity of impact) as
well as secondary fragmentation of wood/concrete, which can
neutralize or stun occupants in the vicinity of the impact. Extensive
use of precision weapons by several units in close proximity may
cause coordination problems with target identification and
designation.
7-89. Laser designation by both ground and aerial systems may be
degraded by the large expanses of polished, flat reflective surfaces
common in many urban areas. High volumes of smoke and dust
associated with burning buildings and urban combat can prevent
accurate laser designation required for precision engagements.
7-90. Aircraft cannon fire against buildings can be devastating.
These fires provide excellent suppression and can drive threat forces
away from firing positions or fix the threat in place until ground
maneuver forces can destroy him. Threat positions that have been
struck by fire can normally be reoccupied quickly by the threat.
Ricochets from these rounds are common in urban structures. They
can cause additional collateral damage and pose a danger to nearby
friendly forces.
7-91. Target identification and marking may be difficult because of
heavy smoke and dust rising from urban fires and explosions. Some
smoke from fires in industrial areas may be highly toxic or irritating.
Pilots may have to don chemical protective equipment that hinders
target detection and engagement. Friendly unit locations and
personnel can be marked with colored panels, glint tape, strobe
lights, and colored smoke. Targets can be marked with infrared laser
pointers, such as the GCP-1 Ground Commander
Pointer/Illuminator, colored M203 smoke rounds, M203 or mortar
flares burning on the ground, or tracer fires. In some situations,
improvised spotlights can also be used.
7-92. While fire from stationary positions is more accurate, running
fire is normally safer for the aircraft due to threat ground fire. If
possible, ground commanders should avoid directing pilots along a
gun-target line that passes over friendly troops. Gun-target runs that
are perpendicular to the friendly unit’s front are normally best.
7-93. 2.75 rockets (area fire) with HE warheads have a burst radius
in excess of 50 meters and are effective in the destruction of C4
structures, thin-skinned vehicles, ADA, and damaging/breaching
concrete and wood structures. However, when fired in pairs or more,
the rockets have a large dispersion pattern and pose a potential
accuracy and fratricide issue.
7-35
FM 3.20-96 ____________________________________________________________________________
7-36
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-37
FM 3.20-96 ____________________________________________________________________________
RIVER
CITY
HALL
12 15 X-faction controlled with
mixed opinions on US
Government 13
10 and business presence.
district. Y-faction controlled
and anti-US opinions.
8 11
9
6
4 7
2 HOSPITAL 3
Wealthy neighborhood
very pro-US.
LEGEND:
7-38
___________________________________________________ Chapter 7 – Squadron Urban Operations
RIVER
CITY
HALL
12 15
13
10
8 11 6
9
6
4 7
5 5
4
2 HOSPITAL 3
1 2 3
LEGEND:
1 Dismounted approach
2 4 Wheeled-capable approach
7-39
FM 3.20-96 ____________________________________________________________________________
E
RIVER
CITY
HALL
12 15 E
13 E
10
8 11
9
6
4 7
E
E
5
E 2 HOSPITAL 3
LEGEND:
8 ft. diameter sewage lines Subway
4 ft. diameter sewage lines E Entrance
7-40
___________________________________________________ Chapter 7 – Squadron Urban Operations
RIVER
CITY
HALL
12 15
13
10
8 11
9
6
4 7
2 HOSPITAL 3
LEGEND:
7-41
FM 3.20-96 ____________________________________________________________________________
SECTION V – EXECUTION
7-42
___________________________________________________ Chapter 7 – Squadron Urban Operations
LO
A
GR
AN
T
NAI
6
PL NAI
MEADE NAI 8
7
TUAVs perform
recon of routes
and NAIs.
DO BJ
I5
G
O
NA
I
NA 4
PL D
M
cC RE
LE RT A NAI
LL B 3
AN
E EN
NAI
RT G R
1 B C
7-43
FM 3.20-96 ____________________________________________________________________________
7-44
___________________________________________________ Chapter 7 – Squadron Urban Operations
ASSIST IN ISOLATION
7-45
FM 3.20-96 ____________________________________________________________________________
LO
A
G TUAVs monitor
RA urban area and
NT MI farside approaches.
NAI
6
PL NAI
MEADE NAI 8
S
7
S
S
D BJ
I5
G
2
O
O
S
NA
I
Checkpoints are NA 4 5 GSRs and
used to gain sensors cover
information areas that RECCE
during isolation. 3 troops cannot.
4
PL D
M
cC RE
LE RT A NAI
LL B 3
AN
EN E
NAI
RT GR
1 B C
NAI
LD HOO 2
K ER
7-46
___________________________________________________ Chapter 7 – Squadron Urban Operations
7-47
FM 3.20-96 ____________________________________________________________________________
7-48
Chapter 8
SECTION I – FUNDAMENTALS
8-1. The CSS system will be challenged to sustain the squadron in the
fast-paced, nonlinear, operations over a large battlespace. The CSS
structure throughout the SBCT is extremely austere, allowing for quicker
deployability and the reduction of the support footprint in the area of
operations (AO). This austere structure forces the SBCT to employ the
latest advances in CSS, command and control (C2), and situational
understanding to enable it to effectively support the squadron. The CSS
structure will be significantly challenged to support the squadron’s wide-
ranging, and in some situations, decentralized missions.
8-2. CSS planning begins early in the squadron’s planning process.
In some situations CSS planning begins before mission receipt, as part
of the ongoing process of refining the squadron CSS estimate.
8-1
FM 3-20.96 ____________________________________________________________________________
NOTE: Squadron staff estimates are less structured than the staff estimates done at
higher echelons of command.
8-3. CSS planners
CONTENTS (Continued)
use data available from Field Services ........................................................8-75
Force XXI Battle Food Preparation...............................................8-75
Command Brigade and Mortuary Affairs.................................................8-75
Laundry, Shower, and Clothing
Below (FBCB2) and Light Textile Repair................................8-76
logistics report Force Provider ...................................................8-76
messages and Personnel Support ................................................8-76
personnel status Personnel Services Support.............................8-76
Systems..............................................................8-78
messages to identify Planning Operations .........................................8-79
equipment and Communications ...............................................8-82
personnel issues that Religious Support .............................................8-82
Finance Support ................................................8-82
can impact planned or
Public Affairs .....................................................8-82
ongoing operations. Postal Support...................................................8-83
The squadron CSS Legal Support ....................................................8-83
staff must be proactive Enemy Prisoners of War ...................................8-84
Combat Health Support ........................................8-85
in identifying and Squadron Medical Platoon ...............................8-86
solving CSS issues Combat Lifesavers ............................................8-87
by— Medical Evacuation ...........................................8-87
Combat Health Logistics ..................................8-89
• Using Medical Force Protection..................................8-90
Reconstitution .......................................................8-91
FBCB2 and Reorganization ..................................................8-91
other Army Regeneration .....................................................8-91
Battle Planning .............................................................8-92
Command SOP.....................................................................8-92
Mission Planning...............................................8-93
Systems
(ABCS) to
maintain
CSS situational understanding.
• Working closely with higher headquarters CSS staff to
resolve CSS problems.
• Establishing CSS priorities that conform to mission
requirements.
• Recommending CSS-related commander’s critical
information requirements (CCIR).
• Ensuring the commander is apprised of critical CSS
issues.
8-2
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-3
FM 3-20.96 ____________________________________________________________________________
FORCE AGILITY
8-6. An agile CSS force is always planned and developed within a
joint/multinational/interagency context. Just as the Army conducts
operations as part of a joint and normally multinational force, so does
it plan and execute CSS within that environment. This allows the
overall CSS force to be as economical and efficient as possible.
8-7. The CSS force seeks to maximize efficiency and responsiveness
through a number of methods. First, it is built around the optimal mix
of active component, reserve component, Department of the Army (DA)
civilians, and contractors. Though they involve a number of risks,
contractors and DA civilians are playing an ever-increasing role in CSS
for a number of reasons. The use of contractors may be more
responsive. Also, use of contractors and DA civilians may enhance the
commander’s ability to stay within force caps for given operations and
allow military personnel to maximize effectiveness in hostile conditions
where risks associated with using civilians is unacceptable to the
commander.
8-8. An agile force also relates to the growing seamless nature of the
Army’s CSS structure. Elements of the strategic base, such as the US
Army Materiel Command (AMC) logistics support element and the US
Army Medical Research and Materiel Command, deploy to AOs and are
integrated into the overall CSS force to provide support at the
operational, and in certain scenarios, even the tactical level.
8-9. An agile force structure is one that has a relatively small
footprint, and does not encumber the maneuver commander with large
stockpiles of supplies or large numbers of CSS personnel on the
ground. The key to agility is to place on the ground only those CSS
assets that are truly needed, no more and no less. Other aspects of a
flexible, deployable CSS force are modular and tailorable force
packages, split-based operations, reach capabilities, maintenance
initiatives, and the use of contractors in lieu of force structure.
Modular/Tailorable Force Packages
8-10. Modularity involves company-level force structure designs in
which each major company subelement has a cross-section of the total
company’s capabilities. This allows individual modules to provide a
support or C2 function while still allowing the remainder of the unit to
be operational. Modular units will provide support at echelons above
brigade (EAB) or as augmentation to the brigade support battalion
(BSB). When modular functional or multifunctional companies with
multifunctional platoons, teams, or sections are used to create tailored
force packages, they can reduce the CSS footprint in an AO. CSS
organizations and units are customized through the use of modular
units and sub-units (platoons, teams, or sections) to produce the
required CSS capabilities without adding unnecessary, redundant, or
nonvalue-adding elements to the task organization. The operational
commander uses the modular force structure at his disposal to create
customized CSS in tailorable force packages to meet requirements.
8-4
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Split-Based Operations
8-11. Split-based operations refer to performing certain CSS
administrative and management functions outside of the AO, whether
in a secure location in the communications zone, an intermediate
staging base, or even at home station. If the automated and
communication systems networks are adequate, some personnel and
materiel or distribution management functions can be performed by
soldiers or civilians who may not have to deploy to the AO, thus
helping to minimize strategic lift requirements, the CSS footprint in
theater, and support requirements for forces in theater.
Reach Capabilities
8-12. Reach capabilities also minimize the CSS footprint in the AO.
CSS reach operations involve the deliberate positioning of stocks and
units/capabilities dedicated for a specific operation. These stocks
and/or units may be positioned at home station, an intermediate
staging base, or other location within the theater outside the AO. The
purpose of identifying and positioning reach units and CSS resources
is to increase responsiveness of support and sustainability of the force.
This method, which is key to early support of the SBCT, may be used
for any force. It involves a risk analysis and ultimate decision by the
commander as to what support capabilities must be on hand in the AO
and what can be deferred until positioned capabilities become available
to provide support.
Maintenance Initiatives
8-13. A number of maintenance initiatives will also increase the
agility and economy of the CSS force. The shift to a “replace
forward/fix rear” system reduces the requirement for extensive repair
facilities, tools, and personnel to be pushed forward. In addition, the
multi-capable maintainer has a broad, but shallow range of skills
designed to enable him to replace line replaceable units (LRU) or
modules to rapidly return a vehicle to mission capable status. Finally,
combining organizational and direct support (DS) maintenance
maximizes economy in forward maintenance elements.
8-14. Replace forward/fix rear is a maintenance conservation
concept for replacing LRUs or modules instead of attempting to repair
the LRUs or modules by leveraging advanced prognostic and diagnostic
tools, support equipment, and training. The LRUs or modules are then
retrograded to higher levels of maintenance for repair and return to the
distribution system. Lean, modular, and enabled maintenance units
focused on maximizing combat power characterize field maintenance
operations. The velocity at which future field maintenance operations
must be performed, distributed operations, the capabilities of
battlefield distribution, and expected gains in diagnostics facilitate our
ability to fix equipment forward through the replacement of LRU or
component assemblies.
• Replace forward means a soldier performs on-system
maintenance. “On system” refers to replacing components
8-5
FM 3-20.96 ____________________________________________________________________________
Contractors
8-17. The following paragraphs address the use of contractors on the
battlefield. Lessons learned from military operations throughout our
history indicate that contracting and outsourcing can be effective force
multipliers. Contracted capability can extend existing Army capabilities
and provide alternative sources of supplies and services. Use of
contractors may reduce the personnel, equipment, and supplies that
must be deployed to support a specific operation. Contractors do not
replace force structure; they augment Army capabilities and provide an
additional option for meeting support requirements.
8-18. To the extent they are used, contractors will be incorporated
into the force structure as force multipliers, but they will not displace
military assets within that force structure. Their use may reduce the
size of the Army force required to support a specific operation, but they
will not permanently replace force structure. The Army can use
contractors to bridge gaps between required capabilities and actual
force structure available within the theater of operations. Contractors
may be employed, subject to mission, enemy, terrain and weather,
8-6
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-7
FM 3-20.96 ____________________________________________________________________________
8-8
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Unity of Command
8-30. Unity of command for CSS enhances surge capability. CSS
commanders may, for example, surge maintenance assets to meet
priority readiness, surge fuel assets prior to a counterattack, or surge
other commodities to make up for disruption in the lines of
communication (LOC) from corps. In practice, at the tactical level, a
support battalion commander may, because he has centralized
command and control over many of the SBCT’s CSS assets,
compensate for anticipated or realized shortfalls by cross-leveling or
redirecting idle or under-utilized assets from other SBCT support
assets. He may direct other units within the SBCT if CSS requirements
exceed the FMC’s capabilities. If additional required support is not
available at the brigade level, the commander may call upon higher
echelons within the CSS C2 structure for support. Higher echelon CSS
commanders enjoy the same surge capabilities with centralized C2
over CSS assets.
Increased Velocity
8-31. Increased velocity refers to the time required to move supplies,
equipment, and capability from the strategic base through the
distribution system to the end user. Time is critical for a force
projection Army. Increased velocity has made reductions in the CSS
battlefield footprint, in terms of personnel, equipment, and supplies
possible. The increased velocity concept relies on effective C2 provided
by unity of command coupled with situational understanding. The
following key principles relate directly to increased velocity:
• Maximum use of throughput.
• Minimizing load handling.
• Configured loads.
• Scheduled delivery.
• Time definite delivery (TDD).
• Velocity management.
8-9
FM 3-20.96 ____________________________________________________________________________
8-10
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-11
FM 3-20.96 ____________________________________________________________________________
8-12
___________________________________________Chapter 8 – Combat Service Support/Sustainment
SITUATIONAL UNDERSTANDING
8-40. The final factor that enables an agile CSS force to focus a
distribution-based system to responsively meet the needs of the
operational commander is situational understanding. Situational
understanding is the complete understanding of the friendly situation,
the threat situation, and the CSS situation through the use of
advanced, seamless information technology. Key elements of
situational understanding are discussed below.
8-41. Situational understanding is the ability to identify CSS and
operational data at all echelons in near-real time to provide
commanders and CSS managers the same battlefield picture.
Leveraging force structure designs, advanced automation, information,
and communications capabilities are key to fusing operational and
CSS data to create situational understanding of the battlefield, which
in turn facilitates optimal CSS operations. This applies to both tactics
and CSS and to commanders and CSS personnel at all echelons from
the tactical to the strategic level. Commanders and distribution
managers at all levels must have access to the same information at the
same time in order to have unity of command and unity of effort. The
seamless information network combined with in-transit visibility and
integrated Standard Army Management and Information System
(STAMIS) provide a common operational picture (COP).
8-42. An integrated STAMIS is one that incorporates multiple types of
functionality within a single system and can share database
information between functionalities. Global Combat Service Support-
Army (GCSS-A) is an example of an integrated STAMIS. It will have
interfaces with other CSS automated systems in order for users to have
access to the maximum amount of information with the minimum
amount of data entry.
8-13
FM 3-20.96 ____________________________________________________________________________
8-14
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-48. CSS leaders must not only support the ongoing operation but
also anticipate future events and requirements. The S4 must anticipate
the needs of the unit as an operation is occurring, coordinate to push
support forward, keep the commander abreast of CSS status and
capabilities, and keep the support echelons informed of requirements.
If the CSS system becomes reactive, support will be too late. The S4
must immediately begin planning when he receives the warning order
(WARNO) and fragmentary orders (FRAGO). He must determine
support requirements, coordinate changes to support relationships,
and alert the supporting units to new trains positions to maintain the
flow of support.
8-49. Commanders and staffs must integrate CSS into the planning
process. At troop level the commander, executive officer (XO), and the
first sergeant (1SG) do this. At squadron level, the S4 has staff
responsibility and works with the squadron commander, XO, S3, and
headquarters and headquarters troop (HHT) commander to ensure
integration occurs. CSS leaders must identify sustainment problems
during the estimate process and before the operation starts.
Discussing CSS in maneuver and in fire support rehearsals is a highly
recommended method to ensure the CSS plan is integrated and all
planners and executors outside of the CSS arena (commanders, battle
captains, S2, etc.) know of the plan.
8-50. Sustainment efforts are continuous. CSS is never in reserve.
Support is continuous during preparations before an operation begins,
during the operation, and afterwards as the squadron reconstitutes or
prepares for another mission. Operator and organizational
maintenance and repair work is done whenever the opportunity exists.
Repairing and returning damaged equipment to the fight requires early
diagnosis and identification of faults and is done as far forward as
possible. Vulnerability and limited cross-country mobility of CSS
vehicles dictate the predominant use of road and trail networks.
Continuous CSS operations require careful personnel management to
provide sustained effort. Local security, routine details, and operator
maintenance all compete for time with CSS operations. Fatigue can
8-15
FM 3-20.96 ____________________________________________________________________________
8-16
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-17
FM 3-20.96 ____________________________________________________________________________
8-18
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-19
FM 3-20.96 ____________________________________________________________________________
8-20
___________________________________________Chapter 8 – Combat Service Support/Sustainment
TRANSPORTATION PLATOON
8-70. The transportation platoon (Figure 8-4) provides limited
transportation support and distribution to the squadron and battalions
in the SBCT. Their priorities are coordinated with the SBCT S4.
Transportation Platoon
Distribution Team
8-21
FM 3-20.96 ____________________________________________________________________________
Ammunition
Supply Support Repair Part
Transfer Point
Section Section
Section
8-22
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-80. The ATP receives and stores ammunition for the SBCT. A small
section, with a total of three HEMTT-LHSs, mans the ATP. The ATP
can, on a daily basis, perform the following functions:
• Receive 62 STONs.
• Store 14 STONs.
• Issue 62 STONs.
8-23
FM 3-20.96 ____________________________________________________________________________
8-82. Due to the limited assets, the ATP section does not deliver
Class V, build a large amount of configured loads, or conduct fire
fighting.
8-24
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-25
FM 3-20.96 ____________________________________________________________________________
8-26
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Recovery Section
8-92. The recovery section (Figure 8-10) provides recovery support to
all elements of the SBCT, to include recovery of the—
• HEMTT.
• High mobility multipurpose wheeled vehicle (HMMWV).
• Medium and light-wheeled vehicles, to include trailers.
8-27
FM 3-20.96 ____________________________________________________________________________
Classification Section
8-94. The classification section classifies inoperative and damaged
equipment according to condition codes. The classification is made in
accordance with the technical manuals, bulletins, and directives from
higher headquarters. The inspection normally occurs in the BSA, after
either the recovery section or CRT recovers the item. The primary
function of the section is to identify the extent of repairs required and
to determine whether the item is worth repairing and where repairs
can be accomplished. The section then determines the proper
disposition of the item.
8-28
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-29
FM 3-20.96 ____________________________________________________________________________
8-30
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-31
FM 3-20.96 ____________________________________________________________________________
8-32
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-33
FM 3-20.96 ____________________________________________________________________________
8-34
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-35
FM 3-20.96 ____________________________________________________________________________
Echelon of Care
Echelon I (Level I)
a. The first medical care a soldier received is provided at this echelon. This echelon of care includes the following:
immediate lifesaving measures, disease and nonbattle injury prevention, combat stress control preventive measures,
casualty collection, evacuation from support units to supporting medical treatment.
b. Major emphasis of treated is placed on those measures necessary to stabilize and allow for the evacuation of the
patient to the next echelon of care. These measures include: maintain the airway, stop bleeding, prevent shock, protect
wounds, immobile fractures, and other emergency measures as indicated. Those patients not required a higher level of
care are returned to duty.
c. Medical care is provided by an individual (self-aid, buddy aid, combat lifesaver, or combat medic) or by personnel
in a treatment squad.
8-36
___________________________________________Chapter 8 – Combat Service Support/Sustainment
COMPANY HEADQUARTERS
8-121. The headquarters provides C2 for the company and other
medical augmentation. It also provides general and medical
supply/resupply to its organic and augmented elements. Figure 8-16
shows the organization of the headquarters platoon. The headquarters
platoon can support the squadron/battalion’s medical platoons in the
following two ways:
• Class VIII resupply.
• Medical equipment repair.
8-37
FM 3-20.96 ____________________________________________________________________________
8-38
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-126. It also provides stress control training for the squadron and
battalions. The section normally operates within the SBCT clearing
station in the BSA, but it is mobile and can provide its service down to
the squadron level.
8-39
FM 3-20.96 ____________________________________________________________________________
8-40
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-41
FM 3-20.96 ____________________________________________________________________________
Treatment Squad
8-130. The treatment squad (Figure 8-21) provides emergency and
routine sick call treatment for all SBCT personnel. The squad is
deployed in support of combat support (CS)/CSS units, ambulance
exchange points (AXP), and when required, to reinforce the maneuver
medical platoons. The squad has the capability to split into two
independent treatment teams for limited periods of time to provide
better coverage.
8-42
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-43
FM 3-20.96 ____________________________________________________________________________
8-44
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-45
FM 3-20.96 ____________________________________________________________________________
AMBULANCE PLATOON
8-134. The ambulance platoon shown in Figure 8-25 performs ground
evacuation and en route patient care for supported units. The
ambulance platoon consists of a platoon headquarters, a DS
evacuation section, and a GS evacuation section. The platoon employs
five ambulance squads (ten ambulance teams). It locates with the
treatment platoon for mutual support. Each ambulance team carries a
medical equipment set designed for medical emergencies and en route
patient care. Ambulances either deploy forward to support the unit aid
stations or to AXPs.
8-46
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-135. The DS and GS ambulance squads (Figures 8-26 and 8-27) are
the primary evacuation elements in the platoon. The squads provide
ground ambulance evacuation support for—
• Each of the maneuver units.
• Elements in the BSA.
• Units receiving area medical support from the BSMC.
8-47
FM 3-20.96 ____________________________________________________________________________
Figure 8-
27.
General
Support
Ambulan
ce Squad
Organiza
tion
COMB
AT
SERVI
CE
SUPPO
RT
COMP
ANY –
AUGM
ENTAT
ION
8-137. Due to the BSB’s reliance on augmentation to fully support the
SBCT, the CSSC was designed to package the augmentation into a
single viable unit (see Figure 8-28). It has 293 personnel and is organic
to the main support battalion in the DISCOM of each division that has
an assigned SBCT.
8-48
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-49
FM 3-20.96 ____________________________________________________________________________
• Engineers.
• Field artillery.
8-144. Based on the tactical situation and CSS requirements, the BSB
may organize a tailored forward logistics element to push critical
supplies and services to a designated unit or location, such as the
SBCT TOC, or the squadron combat trains or field trains (if forward of
the BSA). Another option is to establish another CSS node outside the
BSA to employ modular support such as the forward repair elements,
recovery capability, and critical assets such as Class III and V closer to
support the SBCT.
FM 4-93.1 [FM 63-1] addresses siting and security of the BSA.
8-145. If the squadron is operating within the support distance of the
BSA, the squadron field trains may collocate with the BSB in the BSA.
This facilitates support by the BSB, eases communications
requirements, simplifies security requirements, and reduces the need
for additional coordination with the SBCT for terrain. When collocating
with the BSB, the field trains fall under the operational control of the
BSB commander for movement, security, terrain management, and
synchronization of sustainment activities. The HHT commander
establishes close liaison with the BSB staff. The positioning needs of
the squadron must be clearly communicated to and coordinated with
the BSB. The squadron field trains must be positioned near the exit
points of the BSA in case it moves forward to better support the
squadron. When leaving the BSA, the HHT commander must inform
the BSB commander or the SBCT rear CP when the field trains are
leaving, and an estimated time it will return. If the squadron is
operating at extended ranges from the BSA, the squadron field trains is
positioned between the BSB and the squadron to better facilitate
support.
8-50
___________________________________________Chapter 8 – Combat Service Support/Sustainment
SUPPORT AREAS
8-146. A support area is a designated area in which CSS elements,
some staff elements, and other elements locate to support a unit.
Trains are located in support areas. Types of support areas include the
following:
• BSA.
• Squadron support area.
TRAINS
8-147. The basic CSS tactical organization is the trains. Trains are any
grouping of personnel, vehicles, and equipment organic or attached to
a unit that provides CSS. Trains are under unit control and can be
employed in two basic configurations: In one location as unit trains, or
in echeloned trains. Echeloned trains are normally organized into troop
trains, squadron CTCP, unit maintenance collection point (UMCP),
medical aid station, and squadron field trains. Echeloned trains are
best used when the squadron is operating over extended distances
from the SBCT, and/or dispersed throughout the AO. Unit trains at the
squadron level are appropriate when the squadron is consolidated,
during reconstitution, and during major movements.
TROOP TRAINS
8-148. Troop trains provides CSS for the troop during combat
operations. The troop organizes its organic and attached CSS assets
into troop trains and squadron combat trains. The troop trains
includes the 1SG and medical aid/evacuation teams. The supply
sergeant and the armorer and will collocate with the squadron combat
trains and UMCP and are under operational control (OPCON) to the
CSS OIC in that area. The supply sergeant may collocate in the field
trains if it facilitates LOGPAC operations. The 1SG directs movement
and employment of the troop trains. He receives logistical reports
directly from the platoon sergeants or through the troop CP,
coordinates logistical matters with the XO, and assists the XO in
ensuring the troop is logistically ready for battle. During operations,
the 1SG coordinates and directs the evacuation of casualties and
equipment to designated troop or squadron logistics release points
(LRPs), which are graphically depicted by checkpoints; leads the troop
LOGPAC forward from the LRP to resupply the troop and then leads it
back to the LRP; and organizes the LOGPAC to conduct troop resupply
operations. Depending on METT-TC, platoon sergeants may assume
the 1SG’s role for their platoon and may have to coordinate with the
CTCP for the platoon’s logistical support.
8-149. The troop trains may be collocated with the troop CP or operate
separately under the control of the 1SG. Threat situation and distances
between the platoons are some of the major determining factors. The
troop trains may also consolidate or coordinate with an infantry
8-51
FM 3-20.96 ____________________________________________________________________________
SQUADRON TRAINS
8-150. Squadron trains consists of two types: combat trains and field
trains.
Combat Trains
8-151. There may be no need or requirement for a logistical combat
trains or CTCP for the cavalry squadron (RSTA) during some types of
operations. Sustainment of the squadron is achieved through
situational understanding of not only the COP but also the logistical
operational picture. Theoretically, sustainment in the squadron is no
longer a routine LOGPAC-type operation. Sustainment is achieved
through anticipation, planning, and coordinating for requirements well
in advance of the need for supply. LOGPAC operations however remain
the vehicle for the delivery, but occur only when needed.
8-152. The elements that made up the CTCP may operate collocated
with the FTCP (see Figure 8-29), or in the S4’s case, at the squadron
main CP. In some situations the squadron will establish a CTCP to
accomplish a specific logistical task. Situations that may dictate the
need for a CTCP include:
• As part of a BSB forward logistical element operation.
• During periods of supply or resupply of major end items.
• During reception, staging, onward movement, and
integration (RSOI) operations.
• As required by METT-TC.
8-52
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Field Trains
8-154. The squadron field trains (Figure 8-30) is the primary direct
coordination element between the squadron and the BSA. Field trains
consists of the CSS elements required to respond to continuous
support operations. Field trains includes those assets not located with
the combat trains and higher echelon support teams of the BSB. It will
normally consist of the HHT commander; XO; 1SG; nuclear, biological,
and chemical (NBC) noncommissioned officer (NCO); supply sergeant;
and S1 personnel. The field trains personnel facilitate the movement of
service support from the BSB to the squadron AO by ensuring that
LOGPACs are organized and configured per the unit’s requests and
that the LOGPACs make it forward to the LRP and back to the BSA.
8-155. The field trains may collocate with the BSA, operate
independently between the BSA and combat trains, collocate with the
squadron trains, or with the nearest trains of the infantry battalions.
Field trains location is determined by the level and capabilities of the
threat and the distances between the forward elements of the
squadron and the BSA.
8-53
FM 3-20.96 ____________________________________________________________________________
8-54
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-55
FM 3-20.96 ____________________________________________________________________________
8-56
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-165. With this information, planners develop the support plans for
the operation. Several planning tools are available. The logistics
estimate described in FM 5-0 [FM 101-5] is the formal, detailed process
of CSS planning, and is used when time is available. Frequently at
squadron level and normally at troop level, CSS planning is more
informal. It is normally formulated in terms of the following
considerations:
• The current and projected unit status of maintenance,
supply, and transportation.
• Quantities and types of logistics needed to support the
operation.
• How it will be transported to where it is needed.
• When it must be on hand.
• The external support needed.
• The displacement of CSS assets, if required.
• How requirements can be met.
• Host nation support available.
• Shortfalls and impact on the operation.
• Prioritizing the supportability of each course of action
(COA).
• Availability of CHS, to include medical evacuation and
treatment.
• NBC decontamination capabilities and contamination
considerations.
8-57
FM 3-20.96 ____________________________________________________________________________
8-58
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-59
FM 3-20.96 ____________________________________________________________________________
8-60
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-61
FM 3-20.96 ____________________________________________________________________________
8-62
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-178. The HHT commander runs the field trains and is the primary
face-to-face link between the squadron and the BSB. The HHT 1SG
supports the field trains and ensures that the LOGPAC reaches, at a
minimum, the LRP.
CTCP
CRT
OPS SGM
CO/XO/1SG
LOGISTICS COMMUNICATIONS
8-180. At troop level, there is normally no dedicated FM voice
administrative/logistics (A/L) radio net. Logistical reports and requests
for support are sent on FBCB2 to the 1SG and/or the troop CP. The
1SG receives digital reports, coordinates with the troop XO as
8-63
FM 3-20.96 ____________________________________________________________________________
REPORTS
8-182. SOPs should establish report formats, reporting times, and FM
voice brevity codes to keep logistics nets manageable. As mentioned
before, FBCB2 provides CSS functionality by having logistics situation
reports (LOGSITREP), personnel situation reports (PERSITREP),
logistical call for support and logistics task order messaging,
situational awareness, and task management capabilities. This
functionality affects the synchronization of all logistics support on the
battlefield between the supported and the supporter.
8-183. Units send logistics reports in two channels. Detailed
information may now be sent both to the supporting logistics element
and the higher tactical CP. Alternatively, detailed FM voice reports are
sent to the supporting logistics element while a summarized status in
each general category is given to the higher tactical CP using a brevity
code. Battle and other loss reports update the original baseline data.
The S4 ensures that lengthy, repetitive reports are minimized and that
large quantities of numerical data are sent only via FBCB2 if at all
possible. Routine reports should be limited to a summary of those
items changing during the reporting period. All reports can be
8-64
___________________________________________Chapter 8 – Combat Service Support/Sustainment
FTCP
Brigade
S4
DISCOM
CTCP SPO
8-65
FM 3-20.96 ____________________________________________________________________________
8-66
___________________________________________Chapter 8 – Combat Service Support/Sustainment
ATTACHMENTS
8-191. When a maneuver company team is attached to the squadron,
the necessary combat service support is also attached. This slice is
established by SOP and should be coordinated in advance. It normally
consists of medical, maintenance and recovery, and supply support for
Class III, V, and IX. Class I support is coordinated on a case-by-case
basis. A CSS slice may be attached to the squadron and these assets
may be used in the manner that best supports the overall mission.
This is particularly true when the attached company is task organized
within the squadron. Generally speaking, these assets form the combat
trains and LOGPAC for the attached company. When attached, these
assets as well as the company should arrive fully uploaded and ready
to provide support. Platoon-level attachments, unless unique to
squadron systems, can be supported by the squadron with little to no
adjustments. When receiving attachments, there is some basic
8-67
FM 3-20.96 ____________________________________________________________________________
CONVOY SURVIVABILITY
8-195. The convoy should only be halted when the artillery
concentration is ahead of the convoy. The convoy commander should
look for an alternate route around the impact area and the convoy
should remain prepared to move out rapidly. The mission or terrain
may require the convoy to continue. If this is the case, increase speed
and spread out to the maximum extent the terrain will allow. Avoiding
the impact area, increasing speed, wearing protective equipment, using
the vehicle for protection, and increasing dispersion can reduce
casualties.
8-68
___________________________________________Chapter 8 – Combat Service Support/Sustainment
SNIPER FIRE
8-196. Take extreme caution when sniper fire is received to ensure that
return fire does not harm friendly troops or civilians in the area. The
best actions are passive. Ensure all personnel wear Kevlar helmets and
available body armor at all times. Vehicles should move through the
area without stopping. Escort personnel should notify the march
element commander by a prearranged signal, like a smoke grenade
thrown in the direction of fire, and use long-range fire to locate and
destroy the sniper if in a free-fire zone. Prevent convoy personnel from
random firing by designating personnel to return fire. The convoy
commander may order additional fire or supporting forces into the area
to destroy, capture, or drive off the sniper. Convoy personnel should be
aware that the threat frequently uses a heavy volume of fire to slow
down a convoy before an ambush. Remember all details so the incident
can be reported to higher headquarters.
AMBUSH
8-197. This paragraph provides guidance in developing and employing
counter-ambush tactics and techniques. The very nature of an
ambush, a surprise attack from a concealed position, places an
ambushed unit at a disadvantage. Combat situations may prevent a
convoy from taking all the measures necessary to avoid being
ambushed. Therefore, a convoy must take all possible measures to
reduce its vulnerability. These are passive measures supplemented by
active measures taken to destroy or escape from an ambush. For
information on the types of ambushes, see FM 3-21.75
[FM 21-75]).
8-198. No single defensive measure, or combination of measures, will
prevent or effectively counter all ambushes in a situation. The
effectiveness of counter-ambush measures is directly related to the
state of training of troops and the leadership ability of the leaders.
8-199. Take the following actions to avoid an ambush:
• Select the best route for your convoy.
• Conduct map (digital) reconnaissance.
• Conduct ground reconnaissance.
• Conduct aerial reconnaissance.
• Obtain current intelligence information from the All-
Source Analysis System (ASAS) and UAVs.
• Use operations security (OPSEC) to deny the threat
foreknowledge of the convoy.
• Do not present a profitable target.
• Never schedule routine times or routes.
8-69
FM 3-20.96 ____________________________________________________________________________
8-70
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-71
FM 3-20.96 ____________________________________________________________________________
SUPPLY
8-210. Supplies are grouped into ten classes for supply management
and planning (see Figure 8-34). Resupply operations are based on
these classes.
8-72
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-73
FM 3-20.96 ____________________________________________________________________________
8-215. These supplies are provided by the BSB FMC and are
maintained as part of the SBCT’s authorized stockage list. The
squadron’s supply sergeants maintain, at a minimum, a three-day
supply of small items for immediate issue such as TA-50, NBC
protective equipment, and general supplies. Vehicles also carry a small
amount of commonly used packaged petroleum products for
immediate use. These loads are established in the squadron SOP.
Emergency requirements beyond the BSB capabilities will be locally
procured. The S4 submits requests for replenishment of these supplies
to the BSB via FBCB2 or CSSCS.
8-216. Supplies are distributed from the supporting distribution point
to the FTCP. Supplies are provided from the SBCT distribution point
(normally within the BSA) to the squadron. They are carried forward
with the next LOGPAC or immediately as required. Class II/III (P)
products are brought forward by the HDC transportation assets
escorted with FTCP personnel.
CLASS III (BULK)
8-217. The SBCT’s primary means of fuel support is through the
Defense Logistics Agency (DLA) regional contracts and/or DLA wartime
reserve stocks. The option of bladder bird C-130s, KC10, or wet-wing
operations is used when regional contracted fuel support cannot be
established early enough to support requirements. The HDC Class III
platoon transports fuel forward to the squadron. Retail support is
primarily supply-point based, with limited forward distribution
capability to the squadron and SBCT units.
8-218. The S4 forecasts requirements for the squadron based upon
the current or upcoming mission. He uses available planning data,
reports on FBCB2 from the troops, and operational experience to make
the forecast. These forecasts and reporting times are established in the
SBCT SOP. The S4 determines if the standard push package will meet
the forecasted requirements and orders more Class III based on
whether the standard package is enough to meet the forecasted
amount. The S4 can request to keep up to two HEMTTs at the CTCP to
maintain a fuel point to better accommodate the needs of the squadron
and reduce the amount of vehicle movement for the drivers. The
forecast is submitted through the HHT and the SBCT S4 to the BSB
CTCP, or directly to the BSB SPO for immediate or emergency
situations. The forecast is SOP dependent, but is normally for the 72-
hour period beyond the next day, or out to 96 hours.
CLASS IV
8-219. Limited Class IV barrier material for unit defense will be
included in UBLs, which tactical vehicles mount, primarily for
constructing hasty protective obstacles. The S4 will request additional
items to the BSB CTCP depending on upcoming missions. Requests
must be requested as soon as the S4 identifies the items are needed to
provide the BSB time to procure the Class IV. The BSB will procure
items required beyond UBL (e.g., for hasty/deliberate barriers) by local
procurement, or will ship it in via air/sea LOCs. The supply sergeant
or additional support vehicle assets bring Class IV products forward.
Intensively managed barrier materials may be delivered without delay
8-74
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-75
FM 3-20.96 ____________________________________________________________________________
8-76
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Water
8-234. The BSB can support drinking water requirements at the rate
of two gallons per man per day. The primary water source is bottled
water through regionally available contract sources. The headquarters
and distribution company (HDC) can receive, store, and distribute
7,500 gallons of water. For emergency purposes only, the HDC has one
lightweight water purifier that can purify up to 3,000 gallons in 20
hours. The squadron will maximize the use of water buffaloes and five-
gallon containers. The supply sergeants will maintain buffaloes at the
combat trains and refill when the configured loads are brought forward
from the BSA. Refilling of five-gallon containers occurs during
squadron and troop LOGPAC operations. Normally a one-for-one
exchange (empty container for a full one) is conducted with the
containers and the supply sergeant refills the containers at the combat
trains. If the supply sergeant is in the field trains, water buffaloes are
filled prior to moving forward with the BSB transportation assets.
Maps
8-235. The FMC maintains maps in the BSB. The squadron requests
maps through the S4 to SBCT S4. When delivered, they are
transported forward on unit LOGPACs. Critical maps may be delivered
by air, if necessary, to initiate an operation. The S2 determines map
requirements for the squadron and requests classified maps or
specialty products (digitally produced items such as contour/IV maps)
through G2 channels.
Captured/Salvaged Material
8-77
FM 3-20.96 ____________________________________________________________________________
TRANSPORTATION
8-237. The SBCT uses centralized control of transportation platforms
to enable synchronized movement management of CSS assets.
Assistance from EAC elements includes theater, US Transportation
Command, DLA, AMC, installation, and other Department of Defense
(DoD) agencies to maximize throughput from either continental US or
intra-theater locations. Transportation operations in the SBCT are
characterized by a combination of transportation enablers to increase
expediency and minimize load handling. These systems include
flatrack and/or CROP exchange at the SBCT and squadron support
areas. Transportation managers coordinate efficient flatrack/CROP
exchange and maximize flatrack load capacity for return trip
operations. The movement manager (BSB support operations) tracks
all DS transportation assets in the BSA. Using a combination of the
Transportation Coordinator’s Automated Information for Movement
System II (TC-AIMS II), MTS, CSSCS, and FBCB2, the movement
manager can rapidly respond to requests from the squadron S4 for
transportation by tracking and redirecting transportation assets.
8-238. The support section from the BSB is the squadron’s major
transportation assets. When large, numerous, or extended line hauling
of supplies is required, particularly between support sites, the
squadron should request support from the SBCT. The unique service
support requirements and operations of the squadron make this
support request more common than for any other maneuver battalion
in the SBCT. The HDC normally provides additional transportation
assets. Selected vehicles in the squadron and the BSB have part
number (P/N) or movement tracking systems to enhance C2 and
extended range operations. Utility aircraft, if available, may be placed
under operational control of the squadron to perform aerial resupply.
UNIT MAINTENANCE
8-239. The SBCT uses consolidated organizational and DS
maintenance. The organic maintenance capability of the SBCT is
extremely limited. The FMC provides diverse maintenance capabilities
(vehicles, weapons, missile, communications, special devices, power
8-78
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-79
FM 3-20.96 ____________________________________________________________________________
8-80
___________________________________________Chapter 8 – Combat Service Support/Sustainment
CONTROLLED EXCHANGE
8-243. Controlled exchanged is the removal of serviceable parts from
an NMC vehicle to install on a vehicle that can be more quickly or
easily rendered mission capable. The squadron commander has the
authority to direct controlled exchanges, but normally delegates the
authority to the squadron XO or S4. At troop level, the troop
commander has the authority to internally conduct controlled
exchange with his organic vehicles. Controlled exchanges must be
closely monitored and tracked. Controlled exchange is performed on
site or at the UMCP.
CANNIBALIZATION
8-244. Cannibalization is the authorized removal for reuse of parts or
components from uneconomically repairable or disposable end items
or assemblies. It is a supply source for authorized low mortality or
difficult to obtain repair parts, components, and assemblies. It is a
source for high priority items when delivery cannot be made by the
required delivery date. It is performed in strict compliance with the
SOP and in close coordination with maintenance support team
personnel. The authorization process is the same as for controlled
8-81
FM 3-20.96 ____________________________________________________________________________
FOOD PREPARATION
8-249. The SBCT and squadron have no assets to prepare food other
than the augmented CSSC. MREs are the primary foodstuff, until the
SBCT is augmented with food service assets. Based on the SBCT
commander’s guidance after deployment, A-rations may be available
through regional commercial contractors as approved by US Army
Veterinary Services or through the Logistical Civil Augmentation
Program.
8-82
___________________________________________Chapter 8 – Combat Service Support/Sustainment
MORTUARY AFFAIRS
8-250. The BSB has limited mortuary affairs capability and cannot
process contaminated remains. Augmentation will come from the
mortuary affairs company, echelons above division. Squadron units
recover and establish tentative identification of remains vicinity of the
combat trains (ensure separated from the aid station). The combat
trains processes (ensuring Department of Defense [DD] Form 565,
Statement of Recognition, for all remains, and/or a Statement of
Incident are completed), then transports or coordinates for the
transport of the remains and effects to the mortuary affairs collection
point determined in the SBCT OPORD. Once the remains are
processed, they are placed in refrigeration.
FORCE PROVIDER
8-252. For extended operations (120 days or more) a force provider
package will be considered to provide support to the soldiers of the
SBCT. Assets to establish and operate the force provider facilities are
external to the SBCT. It can provide environmentally controlled
billeting; fuel storage; laundry; modern latrines; showers; food service;
MWR facilities; first aid; water/waste distribution; and power
generation. The army’s force provider is a modular system, principally
designed to provide the front-line soldier with a brief respite from the
rigors of a combat environment. The system’s cadre will need to be
reinforced to provide effective support.
GENERAL
8-255. SBCT and battalion S1s provide their respective commanders
an organic capability for critical personnel functions and services to
8-83
FM 3-20.96 ____________________________________________________________________________
PERSONNEL REPLACEMENT
8-256. Units will receive replacements through the predictive manning
process, verified by strength information within FBCB2 systems, and
allocated by the unit commander. This differs from the current
process, which consists of detailed deliberate and hasty strength
reports and by-name accounting. The digitized manning process within
the tactical command net will report strength information upon source
input.
MANNING TASKS
8-257. Manning tasks of predicting, resourcing, monitoring, assessing,
and adjusting are supported by FBCB2.
8-258. Predicting is the process of anticipating the number, grade, and
skill of personnel resources required to sustain the battlefield
functional area and execute operational plans. The responsible S1
must complete a loss estimate based on the threat and friendly force
capabilities. This estimate provides planning parameters for
replacements, medical facility requirements and graves registration
assets.
8-259. The SBCT S1 will use the Force XXI manning system (FMS) to
anticipate casualties. FMS uses the gross loss estimate within the
Logistics Processor External - Medical Module (LPXMED) and stratifies
them to grade and MOS to anticipate replacement requirements.
8-260. Resourcing brings units to their required strength according to
the commander’s priorities. It occurs at every echelon of command,
even at crew level when a squad leader augments a crew with a few
soldiers to provide a special capability. The S1/S4 must work closely to
provide commanders combat power visibility. The S1 must properly
identify the status of available personnel resources, and then
recommend plans for the proper allocation of available resources
within the commander’s guidance. This allocation includes current and
future personnel.
8-261. Monitoring gathers unit strength data on a real-time basis
through digitized systems and communications. Digitization eliminates
the requirement for unique personnel reporting systems by having the
capability of absorbing personnel information from tactical
communications.
8-262. The task of digitized strength monitoring starts with
establishing the strength baseline. Through the manifest process, FMS
creates the deployed database, which establishes the personnel
8-84
___________________________________________Chapter 8 – Combat Service Support/Sustainment
SYSTEMS
8-85
FM 3-20.96 ____________________________________________________________________________
8-86
___________________________________________Chapter 8 – Combat Service Support/Sustainment
PLANNING OPERATIONS
8-272. The squadron S1 conducts PSS planning to ensure continuous
support during all operational phases, develops the PSS plan
concurrently with the tactical plan, and adds to the automated
operations overlay in FBCB2 for use by digitally equipped units.
8-87
FM 3-20.96 ____________________________________________________________________________
BEFORE OPERATIONS
Predictive Manning
8-273. Manning is critical to operational success. During the planning
process, the S1 war-games different COAs and identifies replacement
requirements based on the commander’s priorities. The commander’s
priorities should include the preferred method of replacing soldiers
(individual, team, and crew) within their units.
NOTE: Doctrine for control of the division rear area is under significant revision.
Communications architecture is not yet defined.
DURING OPERATIONS
Casualty Reporting/Strength Reporting
8-275. As casualties occur, the nearest observer informs the troop
1SG via the most expedient method available (e.g., free-text within
FBCB2, FM voice) per troop/squadron SOP. The 1SG submits a duty
status change on all casualties using FBCB2 (PERSITREP). FBCB2
sends these reports directly to the CTCP and squadron TOC. Slice
elements report to the supported unit for action; an information copy
goes to the parent unit for administrative use. Casualties are taken to
the squadron casualty collection points for classification of injury type
(routine, urgent, return to duty) and evacuation back to the BSA.
8-88
___________________________________________Chapter 8 – Combat Service Support/Sustainment
Medical/Personnel Accounting
8-276. When a soldier becomes a casualty, the unit medic records
medical treatment on the soldier’s DA Form 1156 or MARC. The BSMC
reads the soldier’s MARC when they admit the soldier and download
the MARC manifest report to the BSMC computer. The admissions
clerk transmits the admissions/discharges (SSN and duty status code)
through wireless local area network modems. The S1 electronically
receives the message and updates the soldier’s patient tracking status.
In this manner, S1s can identify a casualty’s location and properly
account for them. This accountability capability provides commanders
a near accurate picture of their forces and personnel combat power.
Personnel Accountability
8-277. FMS maintains three status areas: real world, mission capable,
and exercise status. The real world database accounts for all personnel
actually deployed on an exercise or on an actual mission. The exercise
status database maintains exercise accountability (exercise kills,
wounded, etc.) for training purposes. All personnel entering or
departing the exercise box will process through the squadron S1
representative to maintain an accurate, real world accountability of all
deployed personnel. They read the person’s ID card through a scanner
and enter a duty status. The squadron S1 periodically obtains a
download of this file to update FMS. Upon redeployment, the S1
creates the appropriate manifest reports using MARC and FMS.
AFTER OPERATIONS
Replacement Operations
8-278. The squadron S1 reviews updated personnel strength figures
through FMS and assists in reorganizing or reconstituting units based
on the commander’s assessment from FMS strength data. The S1 also
uses FMS information to decide where to return soldiers to duty or
assign replacements. The S1 can view individual soldier information in
FMS and uses by-name accountability to monitor his manning
requirements. Standard Installation/Division Personnel System
(SIDPERS) will eventually provide data to CSSCS and additional
updates to FMS and strategic assignment systems.
8-279. CSSCS includes summary data only, and not personnel data
such as name and SSN. The S1 depends on his FMS database for
detailed personnel data. Future versions of CSSCS will receive updated
status of those personnel assets listed on the CSSCS tracked items list
from SIDPERS. CSSCS reports will be derived from an interface with
SIDPERS at brigade level, so the information the squadron S1 has may
be more current than what is reported on CSSCS. CSSCS also has a
COA capability so the S1/S4 can recommend the best COA to the
commander.
Tips for the S1 after the Battle
8-280. Tips for the S1 after the battle include—
• Plan to receive digital reports from troops shortly after
battle.
8-89
FM 3-20.96 ____________________________________________________________________________
COMMUNICATIONS
8-281. The CTCP is the net control station for the squadron A/L net.
See Chapter 2 for more information.
RELIGIOUS SUPPORT
8-282. The unit ministry team (UMT), consisting of a chaplain and
chaplain assistant, provides religious support operating from the
combat trains. UMTs ensure DS, GS, and denominational religious
support. UMTs are dedicated to delivering religious support far forward
to meet the spiritual needs of soldiers in combat. Religious support
includes performing/providing sacraments, rites, ordinances, and
worship services; pastoral care and counseling; battle fatigue ministry;
and special services and ministrations.
FINANCE SUPPORT
8-283. The SBCT S1 and attached finance support teams/detachment
will provide finance support.
PUBLIC AFFAIRS
8-284. The SBCT public affairs officer (PAO) provides information
(public affairs) support for soldiers and commanders in wartime. The
media has greater access to combat zones and deploy closer to actual
conflicts than in previous conflicts. American public opinion and
politics greatly affect conduct of current and future operations. Rules
of engagement and guidance from the SBCT PAO and commander
8-90
___________________________________________Chapter 8 – Combat Service Support/Sustainment
dictate what soldiers will say when approached from the media. The S1
should manage and escort or arrange for escort for all media personnel
in the squadron AO.
POSTAL SUPPORT
8-285. Postal support is provided by the DS postal platoon that
supports the division. Division postal personnel pick up incoming mail
from the corps GS postal detachment. They separate the mail by
battalion/squadron-level organizations. It is either picked up by the
designated squadron mail clerk or sent forward to him in the field
trains. Outgoing mail is exchanged at the same time. The squadron
mail clerk receives and sorts the mail by current task organization and
distributes it to the unit supply sergeant (assistant mail clerk) who
delivers it to the 1SG, platoon sergeant, or to the soldier himself
(accountable mail) during LOGPAC resupply.
LEGAL SUPPORT
8-286. The SBCT uses an organic legal team identified as the brigade
operational law team (BOLT), which is illustrated in
Figure 8-37. The BOLT provides legal support in operational law and
the core legal disciplines, which are—
• Military justice.
• International law.
• Administrative law.
• Civil law (contract, fiscal, and environmental law).
• Claims.
• Legal assistance.
8-91
FM 3-20.96 ____________________________________________________________________________
8-92
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-93
FM 3-20.96 ____________________________________________________________________________
8-94
___________________________________________Chapter 8 – Combat Service Support/Sustainment
COMBAT LIFESAVERS
8-295. Combat lifesavers and buddy aid are crucial in sustaining CHS.
This is the first level of aid an injured soldier will receive, and is proven
in saving lives. Combat lifesavers receive additional training above the
basic first-aid level and provide enhanced first aid to battlefield
casualties before the arrival of the combat medic. Squadrons should
have one soldier qualified as a combat lifesaver in each vehicle/crew.
MEDICAL EVACUATION
8-296. The key to the CHS plan is the medical evacuation plan. The
S1/S4 must plan medical evacuation from the troop aid stations all the
way back to the BSMC in the BSA. The S4 must coordinate with the
SBCT S4 for AXPs, and post them to his support graphics in FBCB2.
He coordinates for any available ambulance support from the BSB.
Internal vehicles for mass casualty evacuation are identified and
positioned forward. The S4 tracks active and inactive AXPs and
disseminates that information to the main and forward aid stations
and to the squadron CP. As casualties occur, the S4 directs assets to
assist with casualty evacuation. Recovery responsibility does not end
until casualties are transferred at the AXP or are transported to the
BSMC in the BSA. Medical evacuation beyond the SAS is the
responsibility of the BSMC. Patients are evacuated no further to the
rear than their condition requires and returned to duty as soon as
possible. Medical evacuation outside the squadron may be
accomplished by ground or air means. Aeromedical evacuation out of
the squadron is used to the maximum extent possible. Ground
ambulances are used only for those patients who cannot be evacuated
by air. FBCB2 can significantly improve casualty evacuation times by
its ability to display all aid stations in an area. Crews need to know the
bumper numbers of all unit aid stations to facilitate locating them in
FBCB2. Casualties should be evacuated to the nearest aid station, not
necessarily a squadron aid station. Figures 8-40 and 8-41 show the
procedure for reporting and evacuating casualties, based on whether
the soldier is wounded or killed.
8-95
FM 3-20.96 ____________________________________________________________________________
8-96
___________________________________________Chapter 8 – Combat Service Support/Sustainment
8-97
FM 3-20.96 ____________________________________________________________________________
PREVENTIVE MEDICINE
8-301. Rules of hygiene should be established in SOP and observed
daily to prevent the spread of disease. Soldiers should wash and
change undergarments daily. Proper clothing and inspections prevent
cold and hot weather injuries. Immunizations must be current. Field
sanitation is important to prevent the spread of debilitating diseases.
Only approved or tested water sources should be used. Utensils used
for eating must be properly cleaned before reuse. In static situations,
soldiers use slit trenches or latrines; at other times they use cat holes.
All must be covered up after use to prevent the spread of disease.
8-302. Rest is extremely important. The effects of sleep degradation
are disastrous to unit missions and personnel. Sleep plans must be
practiced and established in SOP. When possible, soldiers should sleep
outside vehicles to allow them to fully stretch out and get the full
benefit of at least four hours of continuous sleep.
8-303. Safety is a continuous requirement to prevent accidents that
injure soldiers. The combat environment is full of risks associated with
vehicles, weapons, stress, and fatigue. Attention to detail can slip on
matters that do not directly affect combat. Safety is inherent in
following proper equipment and weapons operating procedures. SOPs
incorporate safety concerns in establishing procedures for assembly
areas and other locations of troop concentrations. Leaders enforce
proper equipment-operating procedures and SOP safety items
continuously.
8-304. PVNTMED assets at brigade level consist of a two-man team:
an environmental science officer and a PVNTMED specialist.
8-98
___________________________________________Chapter 8 – Combat Service Support/Sustainment
SECTION XI – RECONSTITUTION
REORGANIZATION
8-309. Reorganization restores combat effectiveness by cross-leveling
assets internally. This may be done within platoons and troops to
produce balanced and effective, but reduced strength, units. Units do
this as a matter of SOP during consolidation and reorganization
phases of combat operations. Reorganization also includes the
formation of composite units, resulting in fewer, but full strength,
units. These actions are part of SOP that also designate who has
8-99
FM 3-20.96 ____________________________________________________________________________
REGENERATION
8-310. Regeneration is the rebuilding of a squadron to a specified level
of combat effectiveness through large-scale replacement of personnel,
equipment, and supplies. This process is initiated when losses are too
substantial to regain combat effectiveness through reorganization. Unit
regeneration consists mainly of two major subtasks—repair or
replacement of critical equipment and replacement of critical personnel
losses. Equipment comes from the Class VII resupply system or the
maintenance system. Personnel come from the replacement or medical
channels. SBCT or higher normally controls regeneration of the
squadron.
8-311. The regeneration should be planned as any other tactical
operation. Normally, regeneration of the squadron takes place in an
assembly area in the BSA. Coordination should be made for as many
regeneration resources as possible to be in the assembly area before
the squadron arrives. The S4 has staff responsibility for regeneration,
and the SBCT S4 is the principal executor. The WSRO system will be
used extensively. The squadron must maintain security of its assembly
area during reconstitution. Just as important, however, is the need to
maintain or reconstitute the mental well-being and fighting spirit of the
soldier. Units should make an extraordinary effort to administer to
these needs during this time.
8-312. The squadron commander establishes the sequential priority of
the order that subordinate units get regenerated. The availability of
systems, vehicles, and personnel determines the priority of fill.
8-313. The time to complete regeneration varies with the situation. The
controlling headquarters designates to the CSS planners a specific
time frame that regeneration should be completed. Time for a unit to
train is essential to reestablish cohesion and teamwork. During
regeneration, it may be necessary to use a combination of
reorganization and regeneration techniques. Commanders should
maintain the integrity of squads, crews, and sections as much as
possible.
8-314. Units may be issued with equipment from theater stocks that is
slightly different from original equipment or from equipment called for
by TOE. Tasks such as crew drills, boresighting, zeroing, and
adjustments in tactics should be trained as much as possible given the
time available.
PLANNING
8-315. Reconstitution operations should be planned as any other
operation. The commander plays the most crucial role in reconstitution
planning. He assesses combat effectiveness and, in line with the higher
headquarters plan, establishes the intent, concept, priorities, and
criteria (time and effectiveness) of the reconstitution.
8-100
___________________________________________Chapter 8 – Combat Service Support/Sustainment
MISSION PLANNING
8-317. Commanders routinely include actions in the mission plan to
reduce the impact of the mission and to preserve their force. In some
operations, commanders plan to conduct reconstitution at a specific
point during the operation. The commander and staff should address
the following functions in the plan:
• Assessment methods.
• Transition from combat operations to reconstitution.
• Security of the reconstitution site.
• Movement control of traffic to the reconstitution site.
8-101
Appendix A
A-1
FM 3-20.96 ___________________________________________________________________________
A-2
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-3
FM 3-20.96 ___________________________________________________________________________
A-4
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-5
FM 3-20.96 ___________________________________________________________________________
A-19. These products, along with the SBCT commander’s ISR planning
guidance and higher headquarters ISR tasks, form the basis for the RSTA
squadron’s mission planning.
A-20. The squadron initiates its MDMP simultaneously with the SBCT
MDMP since it is required to provide information to support the brigade’s
planning and decision making. The squadron plans collaboratively with
the SBCT. Once the brigade’s initial ISR collection plan and commander’s
critical information requirements (CCIR) are developed, they become the
basis for the squadron OPORD. The collaborative planning technique will
be employed between the squadron and the SBCT staff.
A-21. The squadron may receive its mission in several different ways,
depending on operational conditions, the SBCT tactical SOP, or the SBCT
commander’s guidance. The squadron can receive a mission verbally or
through the maneuver control system (MCS) in the form of a WARNO,
FRAGO, or OPORD. The commander may also begin the MDMP by
anticipating a new mission based on his analysis of the current and
projected tactical situation.
A-22. Anticipating a mission stems from situational understanding and
the ability of the commander, his staff, or both, to anticipate what to do
next. INFOSYS facilitate mission anticipation by providing a COP that
allows the commander to see the same things his subordinates and his
higher headquarters see. Applying judgment to this expanded view of the
battlespace makes it easier for the commander to anticipate both threat
actions and appropriate friendly actions, or to determine where
unforeseen opportunities for mission accomplishment are.
A-23. The squadron MDMP steps are outlined in Figure A-1.
A-6
________________________________________________Appendix A – MDMP Process/OPORD Guide
b. Based on SBCT initial planning guidance, squadron commander and staff perform a quick initial
assessment to review or determine the following:
(1) SBCT ISR focus, tempo, engagement criteria, and acceptable risk to ISR units, elements,
and assets.
(2) SBCT ISR WARNO or WARNO issued following SBCT mission analysis.
(3) Time available from mission receipt to mission execution.
(4) Time needed to plan, prepare, and execute mission for own and subordinate units.
(5) IPB.
(6) Staff estimates available to support planning.
(7) Ambient light requirements for planning, rehearsals, and movement.
c. Squadron commander issues initial ISR planning guidance based on SBCT commander’s initial
ISR planning guidance. Guidance includes—
(1) Hasty or deliberate planning process.
(2) Initial time allocation.
(3) Liaison officers (LNO) to dispatch.
(4) Initial reconnaissance guidance (focus of reconnaissance, tempo, engagement criteria).
(5) Reconnaissance to start (UAV, emplacement of sensors, ground reconnaissance).
(6) Authorized movement.
(7) Information to be obtained from reachback sources (intelligence agencies, additional
requests for information).
(8) Additional tasks for the staff.
e. Squadron commander, XO, S3, or designated representatives participate in the SBCT ISR
mission analysis. The analysis identifies—
(1) Higher headquarters scheme for ISR operations and focus, tempo, and engagement
criteria.
A-7
FM 3-20.96 ___________________________________________________________________________
(2) Specified and implied SBCT ISR tasks assigned by higher headquarters, including target
acquisition or battlefield damage assessment (BDA) requirements.
(a) Specific orders and requests for information from higher headquarters that require
SBCT assets to collect.
(b) Information requirements based on CCIR.
(c) Request for information from SBCT subordinate units or adjacent units.
(d) Target acquisition or BDA requirements.
(e) Constraints placed on reconnaissance.
(f) High-value targets (HVT).
(g) Objectives for reconnaissance from event template or as specified in higher
headquarters order.
(h) Priority information requirements (PIR).
(i) Risk assessment.
(j) Higher headquarters reconnaissance focus and tempo.
(3) Products from the SBCT initial IPB.
(a) Analysis of the AO.
(b) MCOO.
(c) Approved threat courses of actions (COA).
(4) For each approved theat COA, determine the—
(a) SBCT named area of interest (NAI) and information requirements (IR) to confirm or
deny each threat COA.
(b) IR for each NAI; compare and modify based on PIR and existing IR.
(c) NAIs that can be combined or revised to confirm or deny multiple threat COAs.
(d) Refinements to designated NAIs and adjustments to respective IR and collection
times.
(5) Results of analysis (NAI, PIR, and IR) are recorded on tasking matrix and/or
reconnaissance scheme of support worksheet.
f. Squadron commander, XO, S3, or designated representatives participate in the SBCT ISR
scheme of support development.
(1) Determines tactical risk based on focus, tempo, engagement criteria, and/or displacement
criteria.
(2) Identifies and adds additional NAIs and IR for threat branch and/or sequel.
(3) Identifies infiltration/exfiltration requirements.
(4) Allocates and arrays forces and assets.
(5) Assigns tasks based on the concepts of—
(a) Cuing, which involves using one or more sensor systems to provide data that directs
collection by other systems.
(b) Redundancy, which involves tasking several identical assets to cover the same
target.
(c) Mixing assets to provide complementary coverage from multiple sensors.
(d) Integrating new requirements into planned or on-going missions.
(6) Identifies, assigns, and synchronizes supporting tasks for maneuver units.
(7) Develops scheme for combat support (CS).
(8) Determines command and control (C2) relationships.
(9) Determines reconnaissance handover procedures.
A-8
________________________________________________Appendix A – MDMP Process/OPORD Guide
g. SBCT ISR planning team, with participation of the squadron commander, XO, S3, or designated
representatives, analyzes ISR scheme of support by conducting a hasty war game.
(1) Confirms suitability, feasibility, and acceptability based on focus, tempo, and engagement,
and/or displacement criteria to support mission and obtain information requirements.
(2) War-games scheme of support against each threat COA.
(3) Verifies that all NAIs and information requirements confirm/deny the threat COA based on
the PIR and SBCT scheme of maneuver.
(4) Adjusts and shifts ISR assets to account for losses, alternate threat COAs, branches,
and/or sequels.
(5) Confirms exfiltration, evacuation, and/or emergency resupply procedures.
(6) Records results of war game.
(7) Addition/deletion/modification of NAIs and/or information requirements.
(a) Adjustments to maneuver and fires.
(b) Modifications to task organization.
(c) Shifts in command and control relationships.
(d) Adjustments to force protection and/or control measures.
(e) Modifications to service support plan.
(8) SBCT S3 should brief the results of the ISR war game to the SBCT commander who—
(a) Approves ISR scheme of support.
(b) Provides additional planning guidance, if necessary.
h. The SBCT ISR planning team, with participation of the squadron commander, XO, S3, or
designated representatives, develops a draft ISR plan that includes, as a minimum—
(1) SBCT mission.
(2) Commander's intent for ISR operations.
(3) Initial CCIR.
(4) Unit AO.
(5) Reconnaissance instructions.
(a) Initial focus, tempo, and engagement criteria.
(b) Initial ISR tasking matrix.
(c) Initial ISR overlay that includes the following, as applicable—
1. Friendly boundaries and phase lines (PL).
2. Reconnaissance handover line(s).
3. NAIs and targeted areas of interest (TAI).
4. Limits of advance (LOA) and limits of reconnaissance (LOR).
5. Counterreconnaissance AOs for all units.
6. Fire support coordination measures (FSCM).
7. Graphics depicting zone, area, or route reconnaissance.
8. Routes, start points (SP), release points (RP), and checkpoints.
9. Passage points.
10. Contact points.
11. Infiltration/exfiltration lanes.
12. Primary and alternate observation posts (OP) locations.
A-9
FM 3-20.96 ___________________________________________________________________________
i. SBCT ISR planning team, with the assistance of the squadron staff, produces ISR order, after
approval of ISR plan by the SBCT commander, which is distributed IAW the unit SOP. The ISR order may
be a separate document or incorporated into an SBCT WARNO.
a. The squadron commander and staff conduct a thorough analysis of the SBCT ISR order.
(1) Reviews the common operational picture, including both the friendly situation and the
threat situation.
(a) The S2 updates the FBCB2 threat entity data.
(b) The S3 updates the friendly locations for units not equipped with digital location
reporting systems.
(c) The S1/S4 updates the current and projected status of subordinate unit’s
maintenance, supply, and personnel through combat service support control system (CSSCS) and FBCB2
logistic reports.
(2) S2 section distributes all intelligence products to subordinates as soon as they are usable,
even if only partially complete.
(3) ISR tasks assigned by the SBCT are analyzed to determine specified, implied, and
essential squadron tasks.
(4) Constraints and restrictions are identified.
(5) Current squadron task organization, support relationships, and unit status are examined to
determine required changes and additional resources needed for mission success.
(6) Accident risk hazards are identified and an initial assessment of risk for each hazard is
performed.
b. If time permits, a mission analysis briefing is conducted IAW the unit SOP to synchronize staff
planning.
A-10
________________________________________________Appendix A – MDMP Process/OPORD Guide
d. Commander develops restated mission and intent with input from the staff.
(1) Key tasks: Tasks that must be performed or conditions that must be met to achieve the
stated purpose.
(2) Purpose: Only needed if the purpose in the mission statement is not clear.
(3) End state: Reference friendly, location, and threat.
a. For each specified, implied, and/or essential ISR task, the squadron staff uses a four-step
process to develop at least one COA based on the commander’s planning guidance, unless the SBCT ISR
order or squadron commander has already directed a course of action for the task. The staff considers the
following for each course of action:
(1) Type and duration of the operation.
(2) Focus, tempo, and engagement criteria.
(3) Threat counterreconnaissance and countersurveillance capabilities and limitations.
A-11
FM 3-20.96 ___________________________________________________________________________
A-12
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-13
FM 3-20.96 ___________________________________________________________________________
(3) Recording method: Sync matrix or sketch note (modified sync matrix). An example follows.
Phase of Operation
Est Start-Stop
Blue Resolution/ Branch/ Branch/
BOS Synch Blue Set Red Action
Mitigation Sequel Sequel
SBCT Mission
SBCT Maneuver
Decision Points
Recon/ Security
Focus
Primary NAI/TAIs
EAB Intel Assets
Maneuver
Lethal Effects
Nonlethal Effects
CSS
Command/ Signal
Tactical/ Safety Risk
RFIs/Issues/
Required
Coordination
(4) Two threat COA sketches (each sketch has terrain, higher headquarters graphics, and
commander’s COA maneuver graphics. No assets or units depicted. Add control measures as the war
game progresses. The map recorder is the specific plotter.
(5) Means to post friendly and threat assets/units on the sketches.
(6) Blank overlays: One for each COA with higher headquarters graphics. One for updating
COA graphics during war gaming. Hopefully, it will become the operations graphics.
(7) Graphic aids: Smoke, chemical, FASCAM, artillery, obstacles. Have extra graphic icons.
(8) Planning references: Force ratio tables, movement tables, aircraft endurance rates, and
calculator.
(9) Mission, intent, and concept one and two levels higher posted.
(10) COA statements posted.
(11) Recorder for sync matrix.
(12) Recorder for issues/notes.
(13) Friendly and threat forces available charts posted.
(14) Additional items to post: Evaluation criteria, high-payoff target list (HPTL), decision support
matrix (DSM), close air support (CAS) battle drill, sync matrix, issues/notes, CCIR, risks, assumptions,
critical events.
b. Step 2: List all friendly forces (reference forces availability chart): Combat, CS, and CSS units
that can be committed. Include electronic warfare (EW), PSYOP, deception, OPSEC, and smoke. Add
graphics for all assets. This is one of the most important steps.
c. Step 3: List assumptions. Review list to ensure validity and necessity. Address tactical timeline,
terrain, and weather.
d. Step 4: List last known critical events and decision points. Decision points are linked to critical
events, which are linked to NAIs and TAIs.
A-14
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-15
FM 3-20.96 ___________________________________________________________________________
(13) Identify likely times and areas the threat may use weapons of mass destruction.
(14) Identify location of commander and CPs.
(15) Determine requirements for infiltration, deception, and surprise.
(16) Develop fire support, mobility/survivability, air defense artillery (ADA), information
operations, and CSS plans and graphics.
(17) Develop the intelligence collection and dissemination plan tied to reachback requirements.
(18) Refine and identify decision points, NAIs, TAIs.
(19) Refine CCIR and integrate into the IR order.
(20) Refine C2 requirements, to include control measures.
(21) Determine movement times and tables.
(22) Identify hazards, assess risks, and develop measures to reduce those risks.
j. Following the war game, the XO may conduct a war-game briefing to ensure all participants
have a common understanding of changes or modifications to the COAs.
k. The targeting conference follows the war game. Participants should be XO, S2, S3-air, ALO,
ADO, FSO. Identify triggers.
a. The staff compares the COAs based on the approved evaluation criteria.
b. The staff recommends a COA.
c. The recommended COA is briefed to the squadron commander IAW the SOP.
a. Commander approves: May refine his intent, issue guidance on reconnaissance focus, tempo,
engagement criteria, CS, CSS, orders preparation, and rehearsals. May modify a COA.
b. If this happens, the staff must develop and war-game the new COA.
c. Based on approved COA, the staff prepares and issues WARNO which provides:
(1) Essential information subordinates need to refine their plans.
(2) Higher headquarters and the issuing headquarters mission statement.
(3) Refined commander’s intent.
(4) Specified type of OPORD.
(5) Specified type of rehearsal.
(6) High-payoff target list.
(7) Required maps.
(8) Threat/society situation and any significant intelligence events.
(9) Orders for preliminary action, reconnaissance, and surveillance.
(10) Coordinating instructions.
(11) Service support instructions: Any necessary special equipment and/or movements.
a. Based on the approved COA, the staff prepares the OPORD IAW the squadron commander’s
guidance and the unit SOP.
b. The commander reviews and approves the OPORD before the staff distributes it IAW unit SOP.
c. The commander may direct that the staff brief the OPORD to the subordinate unit commanders
before it is disseminated. A format for this briefing is provided below.
d. Following the OPORD briefing or dissemination, the commander may conduct backbriefs with
the subordinate unit commanders.
A-16
________________________________________________Appendix A – MDMP Process/OPORD Guide
• Posted Items:
Higher’s and squadron graphics: OPs map board.
Threat SITEMP: Intelligence map board.
Phase or critical event sketches: 1 x butcher paper = entire
op, 1 x butcher paper = actions on objective.
Agenda.
Mission, intent, and concept two levels up.
Mission, intent, and concept one level up.
Commander’s intent.
Commander’s reconnaissance guidance (focus/tempo/
engagement criteria).
Tactical timeline: Friendly and threat, indicate day and
night.
CCIR chart:
Task organization:
Issues/notes by recorder: Butcher paper.
Wind direction on map board and sketches.
Threat task organization chart.
Weather/Light Chart.
Mission.
Assumptions.
Obstacle matrix (only if needed).
Slant report, to include vehicle/aircraft status of attached
and OPCON units.
• XO begins briefing: Higher’s graphics are posted.
Ensure personnel and charts are organized around the
map: Briefers on one side organized in the order they will
brief. Use BOS/name plates. Organize charts around the
map/sketch. Think about the logical flow.
Conduct roll call: Identify personnel to attend the brief.
The purpose is to brief OPORD # ________. (State mission.)
References we will use throughout this briefing are ______.
(Identify everything you will reference.)
Products you should have in front of you are ______.
(Identify all your handouts.)
A-17
FM 3-20.96 ___________________________________________________________________________
A-18
________________________________________________Appendix A – MDMP Process/OPORD Guide
WARNING ORDER
A-27. Upon receipt or discovery of a new mission, the commander and
his staff will perform a quick analysis of the nature of the operation and
issue a WARNO. The WARNO includes general information on the
situation, task organization, and nature of the operation. From this the
troop commanders formulate their WARNOs and issue them to their
units. ISR operations can commence with the information provided in the
initial WARNO. The squadron normally issues a WARNO at the end of
mission analysis. This WARNO includes the restated squadron mission,
commander’s intent, CCIR, and detailed guidance on the conduct of
immediate ISR operations. Another WARNO may be issued once the
commander has decided on a COA for the squadron operation. It includes
details needed by subordinate units to refine their plans and provides
guidance on OPORD issuance and rehearsals.
OPERATION ORDER
A-28. The key to ISR operations is to get assets in position as soon as
possible, allowing them to provide the commander as much information
and detail as early as possible. As the brigade’s maneuver forces are
conducting their consolidation/reorganization from the current operation,
the squadron may initiate its next ISR operation. This technique allows
the brigade to move the squadron as early as possible while providing
subordinate units the information needed to initiate planning.
A-29. The squadron OPORD is normally issued after completion of the
brigade’s mission analysis, once the brigade has developed its ISR plan. The
OPORD should include the commander’s guidance, NAIs, PIR/CCIR, location of
critical OPs, and tasking requirements for specific assets (collection matrix). The
MCS and FBCB2 systems have OPORD tools that provide automatic
formatting and almost instantaneous distribution to everyone in the unit.
A-30. Characteristics of a good operations order include simplicity,
brevity, completeness, coordination, and flexibility. The following
techniques should be incorporated into the unit order SOP:
A-19
FM 3-20.96 ___________________________________________________________________________
A-20
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-21
FM 3-20.96 ___________________________________________________________________________
• Key Tasks: Those that must be performed or conditions that must be met to achieve
the purpose. Not tied to a specific COA. The operation’s tempo, duration, effect on
the threat, and terrain that must be controlled are examples of key tasks.
• Broader purpose, if needed, to expand on the purpose in the mission statement.
• End state: Commander’s vision of end state. Include relation of friendly, threat,
(civilians) and terrain / location. Define the task in the mission statement.
A-22
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-23
FM 3-20.96 ___________________________________________________________________________
• Phase 1: (what is it) Fires: In each phase, brief task, purpose, method, and effects for
each task.
• EFST/task: State the EFST for this phase or state there are no EFSTs for this phase,
or state the tasks for this phase, if any. The tasks are disrupt, divert, limit, destroy,
delay, and damage.
• Purpose: How it relates to maneuver, what the effect will accomplish.
• Method:
System: CAS, FA, mortars.
Observer: primary and alternate.
Triggers: initiate, lift, and shift.
Target numbers: higher and lower.
A-24
________________________________________________Appendix A – MDMP Process/OPORD Guide
(4) Intelligence: Describe the POE for each phase: Situational development, targeting,
and/or BDA. Describe the POS: units, assets include GSR, STRIKER, GLD, scouts (LRAS3), Q36, Q37,
HUMINT, CI teams, REMBASS, UAV, Avenger, others by phase.
A-25
FM 3-20.96 ___________________________________________________________________________
c. Tasks to Combat Support Units: These tasks can be specified or implied. State as task
and purpose as much as possible. Do not task if task organized.
(1) Intelligence: (Intelligence assets attached to the squadron.)
(2) Engineer:
(a) Engineer units, priorities of work.
(b) Environmental considerations.
(3) Fire Support: Include fire support information here rather than in an annex.
(a) Air Support: Allocation of CAS sorties.
(b) Field Artillery Support: Priorities (counterfires/interdiction), organization for
combat, command and support relationships if not clear in task organization.
(c) Naval Gun Fire Support.
(d) Fire Support Coordination Measures.
(4) Air Defense:
(a) Organization for combat.
(b) Missions.
(c) Priorities for protection.
(5) Signal:
(a) Organization for combat.
(b) POE.
(c) POS.
(d) Priority of work.
(6) NBC:
(a) Organization for combat.
(b) POE.
(c) POS.
(d) Priority of work.
(e) Tasks to decontamination or smoke units.
(7) Provost Marshal:
(8) Psychological Operations:
(9) Civil Military:
(10) Other: As required.
d. Coordinating Instructions: Applies to two or more units. Many determined during war
game. Think by phase if it applies. Highlight key things during the brief. The first five are mandatory.
(1) Time or condition when a plan or order becomes effective:
A-26
________________________________________________Appendix A – MDMP Process/OPORD Guide
(2) CCIR: All CCIR are linked to a decision or answer higher’s CCIR. Identify by phase
and assign a number to link with the DST. May have a separate CCIR chart listing higher’s CCIR.
Identified on the DSM as P1, E1, F1, etc, under criteria.
• PIR: Linked to targeting or a maneuver branch plan or sequel, e.g., P1, P2.
• EEFI: Linked to force protection, security (counterreconnaissance), or
deception. If any measures fail, a branch plan is needed, e.g., E1, E2.
• FFIR: Linked to culmination that generates the commitment of the reserve, add
assets, or a branch plan, e.g., F1, F2.
(3) Risk reduction control measures: Identify hazards, preventative measures for those
hazards, acceptable risk. MOPP level, OEG, vehicle recognition signals, fratricide prevention measures.
Tactical Risks are threat related and Accident Risks are friendly, terrain, and weather related.
(4) Rules of engagement (ROE): Can be within own annex. Is IAW the Laws of War,
ADA warning, and WCS.
(5) Environmental Considerations: Digging next to water sources, fuel spills, etc.
(6) Movement: By phase if not addressed in the maneuver paragraph. Route or axis to
end of mission, order of movement, movement technique, movement formation, routes, SP and RP
times and locations, rate of march, catch-up speed. Add compass directions when describing routes.
(7) Engagement Priority: By weapon system.
(8) Engagement Criteria/Triggers: Direct fire weapons only. When and where, if not in
the maneuver paragraph.
(9) Bypass Criteria:
(10) Displacement Criteria: Favorable/unfavorable.
(11) Timeline: LD, screen NLT, earliest time of move, (maneuver, CSS, and fires
rehearsals), LOGPAC, backbriefs, boresight complete, PCCs complete, PCIs complete, wake up and
stand-to, occupation of staging area, intelligence updates, BUBs, OPORDs planning and rehearsals one
level down complete, target list, commander’s huddle, control measures, reconnaissance of LD,
quartering party, occupy, CP rehearsal, task organize effective, reconnaissance set, SP tactical
assembly area (TAA), commander’s rest, XO’s rest, movement to TAA, receive engineers, etc.
(12) Priorities of Work:
(13) Actions on Contact: Based on the eight forms of contact (see Chapter 1). During the
tactical road march, etc.
(14) EPWs: Handling: 5S—search, segregate, silence, speed, safeguard.
(15) Civilians: Handling.
(16) Passage of Lines: Lane name and location, passage point number and location,
recognition signals, and vehicle markings.
(17) As Required:
4. SERVICE SUPPORT: Brief by phase: Asset location, POS, and highlights.
a. Support Concept (SAFFMM): Brief the concept of support in general terms before,
during, after: Important things to include during each phase.
(1) Before Phase: Prior to LD of main body, include the reconnaissance fight. Discuss
the location of trains, LOGPAC operations, POS, and any highlights.
(a) Sustain: Echeloned or consolidated support, location of trains, ration cycle,
priority of support, order of movement during resupply. Last LOGPAC time and type.
(b) Arm: Prestock guidance, priority.
A-27
FM 3-20.96 ___________________________________________________________________________
A-28
________________________________________________Appendix A – MDMP Process/OPORD Guide
C2 locations by
Phase: Give PHASE I PHASE II PHASE III PHASE IV PHASE V REMARKS
Grids C2 Assets
CDR
CP
TAC
HIGHER CDR
RETRANS
A-29
FM 3-20.96 ___________________________________________________________________________
b. Signal:
• SOI ___ in effect.
• GPS time in effect.
• COMSEC guidelines and radio communications restrictions.
• Code words.
• Visual and pyrotechnic signals: For example, red smoke marks the friendly line of own
troops for CAS.
• Methods of communication by priority.
• Time to change frequencies.
• Retrans in effect:
• Challenge/Password:
• Hopset series_____.
• Radio Frequencies: as needed.
• Required reports, formats, and time to submit.
• Review issues / notes:
• Time now:_____: Synchronize watches.
• Backbriefs in 15 minutes.
• Next hard time.
• Questions.
OFFICIAL: If not signed by the commander, authentication is required by the preparing staff officer
(name and position).
NOTE: The security classification must appear centered at the top and bottom of each page.
A-30
________________________________________________Appendix A – MDMP Process/OPORD Guide
ANNEXES:
Annex A Task Organization
Annex B Intelligence
Appendix 1 Weather and Terrain
Tab A Modified Combined Obstacle Overlay
Appendix 2 Threat Most Probable COA Situation Template
Appendix 3 Threat Most Dangerous COA SITEMP
Appendix 4 Threat Order of Battle
Appendix 5 Threat Doctrinal Composition
Appendix 6 Threat Most Probable COA Task Organization
Annex C Operations Overlay
Annex D Fire Support
Appendix 1 HPT List/Tgt Sync Matrix
Appendix 2 Target List
Appendix 3 Field Artillery Support Plan
Appendix 4 Target Number Assignments
Annex E Rules of Engagement
Annex F Engineer
Appendix 1 Obstacle Overlay
Tab A Obstacle Matrix
Tab B Threat Engineer Capabilities
Appendix 2 Survivability Matrix
Appendix 3 Threat Engineer Assets
Appendix 4 Report Formats/Obstacle and Lane Marking SOP
Annex H Signal
Annex I Service Support
Appendix 1 Service Support Overlay
Appendix 2 Traffic Circulation and Control
Tab A Traffic Circulation (Overlay)
Tab B Road Movement Table
Tab C Highway Regulations
Appendix 3 Personnel
Appendix 4 Legal
Appendix 5 Religious Support
Annex J Nuclear, Biological, and Chemical Operations
Annex O Army Airspace Command and Control
Annex P Information Operations
Annex Q Civil Military Operations
Annex R Public Affairs
Annex T Electronic Warfare
A-31
FM 3-20.96 ___________________________________________________________________________
A-32
________________________________________________Appendix A – MDMP Process/OPORD Guide
(2) Fires. Clarify scheme of fires to support the overall ISR concept. This paragraph
should state which ISR unit is the main effort and has priority of fires, to include stating purpose of,
priorities for, allocation of, and restrictions for fire support. Refer to Annex D (Fire Support) if required. If
the fire support annex is the only one referenced, show it after “(2) Fire Support.” Refer to appropriate
annexes as required. When referencing other annexes, identify them within the subparagraph where
appropriate.
(3) Intelligence, Surveillance, and Reconnaissance. State the ISR support from higher,
adjacent, and joint units and assets that contribute to the ISR operation.
(4) Intelligence. State the intelligence system concept supporting the ISR plan. Describe
the priority of effort among situation development, targeting, and battle damage assessment. Describe
the priority of support to maneuver units and the priority of counterintelligence effort. Refer to Annex B
(Intelligence) if required.
(5) Engineer. Clarify the scheme of engineer support to the ISR plan, paying particular
attention to the integration of engineer assets and obstacles. Indicate priority of effort and provide
priority of mobility and survivability aspects as appropriate. Delegate or withhold authority to emplace
obstacles. Refer to Annex F (Engineer) and other appropriate annexes as required.
(6) Air and Missile Defense. State overall concept of air and missile defense in support of
the ISR operation. Include considerations of potential Air Force counterair support as well as the actual
contribution of dedicated air defense (AD) units. Establish priority of air defense for general support
units and provide AD weapons status and warning status. State clearly how ISR assets support AD.
Refer to Annex G (Air Defense) and other appropriate annexes as required.
(7) Information Operations. State overall concept of information operations in support of
ISR operations. Establish priority of support and refer to Annex P (Information Operations) and other
appropriate annexes as required.
b. Tasks to maneuver units. Clearly state the tasks and purposes for each maneuver unit
supporting ISR execution that reports directly to the headquarters issuing the order. State the
reconnaissance objective for the unit. How the unit will get to its assigned area (routes, passage points,
infiltration lanes, and so on). Use a separate subparagraph for each maneuver unit. Specific collection
tasks (PIR with indicators) and where to look (NAIs) as identified in the reconnaissance and surveillance
plan matrix. Only state tasks that are necessary for comprehension, clarity, and emphasis. Place tactical
tasks that affect two or more units in subparagraph 3d.
c. Tasks to combat support units. Use these subparagraphs only as necessary. How the
unit will get to its assigned area (routes, passage points, and so on). Clearly state the tasks and
purposes for each CS unit that supports ISR execution. Use CS subparagraphs to list only those
specific tasks that CS units must accomplish, but are not specified or implied elsewhere.
(1) Intelligence. Annex B (Intelligence). If not clear in the task organization, address the
function or support roles of organic or attached military intelligence units.
(2) Engineer. Annex F (Engineer). If not in the task organization, list organization for ISR
combat operations. Assign priorities of effort and support. Address functions or support roles of organic
or attached engineer units if it is not clear in task organization. Clearly state any reconnaissance task
needed to support ISR operations. If not addressed in unit SOPs, establish priorities of work.
(a) Engineer units, priorities of work.
(b) Environmental considerations.
(3) Fire Support. Refer to Annex D (Fire Support). A fire support annex is usually
published at division and corps levels. At brigade and lower, include fire support information here rather
than in an annex. Clearly state any reconnaissance or surveillance task needed to support ISR
operations (target acquisition radar, Colts, etc.).
(a) Air support. State allocation of close air support sorties, air interdiction sorties
(corps), and nominations (division). Show tactical air reconnaissance sorties here.
(b) Field artillery support. Cover priorities such as counterfires or interdiction. State
organization for combat, to include command and support relationships only if they are not clear in task
organization. Ensure that allocation of fires supports the commander’s concept. At brigade and lower,
most of the fire support information is contained in a matrix format in the fire support annex.
A-33
FM 3-20.96 ___________________________________________________________________________
A-34
________________________________________________Appendix A – MDMP Process/OPORD Guide
A-35
Appendix B
Force Protection
Force protection is one CONTENTS
of the four primary Risk Management ........................................ B-1
elements that combine Identify Hazards ....................................... B-1
to create combat power. Assess Hazards to Determine Risks ...... B-3
Develop Controls and Make
The primary objective of Risk Decisions...................................... B-3
force protection is to Implement Controls ................................. B-5
help units protect their Supervise and Evaluate........................... B-5
combat power through Fratricide ...................................................... B-7
Risk Identification and
accident prevention, Preventive Measures............................ B-7
enabling them to win Fratricide Risk Considerations
the battle quickly and (OPORD Format)................................... B-10
decisively, with
minimum losses. This
appendix will focus on two aspects of force protection: safety or
risk management, and the avoidance of fratricide. Risk is the
chance of injury or death for individuals and damage to or loss of
vehicles and equipment. Risks, and/or the potential for risks, are
always present in every combat and training situation the
squadron faces. Risk management must take place at all levels of
the chain of command during each phase of every operation; it is
an integral part of all tactical planning. The squadron commander,
troop commanders, staff, and all soldiers must know how to use
risk management, coupled with fratricide reduction measures, to
ensure that the mission is executed in the safest possible
environment within mission constraints. For additional
information on risk management, refer to FM 5-19
[FM 100-14].
B-1
1
FM 3-20.96 ____________________________________________________________________________
B-2
2
___________________________________________________________ Appendix B – Force Protection
B-3
FM 3-20.96 ____________________________________________________________________________
DEVELOPING CONTROLS
B-6. After assessing each hazard, develop one or more controls
that will either eliminate the hazard or reduce the risk (probability
and/or severity) of potential hazardous incidents. When developing
controls, consider the reason for the hazard, not just the hazard by
itself.
B-4
4
___________________________________________________________ Appendix B – Force Protection
B-5
FM 3-20.96 ____________________________________________________________________________
SUPERVISION
B-11. Leadership and unit discipline are the keys to ensuring that
effective risk management controls are implemented. All leaders are
responsible for supervising mission rehearsals and execution to
ensure standards and controls are enforced. In particular,
noncommissioned officers must enforce established safety policies as
well as controls developed for a specific operation or task. Techniques
include spot checks, inspections, situation reports (SITREP),
confirmation briefs, and supervision.
B-12. During mission execution, leaders must continuously monitor
risk management controls to determine whether they are effective
B-6
6
___________________________________________________________ Appendix B – Force Protection
B-7
FM 3-20.96 ____________________________________________________________________________
SECTION II – FRATRICIDE
B-8
8
___________________________________________________________ Appendix B – Force Protection
NOTE: See FM 1-02 [FM 101-5-1] for the definitions of each type of graphic control measure.
PREPARATION PHASE
B-23. The following are some indicators that may identify potential
fratricide risks:
• Rehearsals not conducted to standard, or not done at all.
• Low training or proficiency levels of units and individuals.
• No habitual relationships between units conducting the
operation.
• Weakened physical readiness (endurance) of the troops
conducting the operation.
EXECUTION PHASE
B-25. During execution, in-stride risk assessment and reaction are
necessary to overcome unforeseen fratricide risk situations. The
following are factors to consider when assessing fratricide risks:
• Intervisibility between adjacent units.
• The level of cross-talk between units.
• Amount of battlefield obscuration.
B-9
FM 3-20.96 ____________________________________________________________________________
B-1
10
___________________________________________________________ Appendix B – Force Protection
B-11
FM 3-20.96 ____________________________________________________________________________
1. Situation.
a. Threat forces.
(1) Are there similarities among threat and friendly equipment and uniforms that could lead
to fratricide?
(2) What languages do threat forces speak? Could these contribute to fratricide risk?
(3) What are the threat’s deception capabilities and his past record of deception activities?
(4) Do you know the locations of threat forces?
b. Friendly forces.
(1) Among the allied forces, are there differences (or similarities with threat forces) in
language, uniform, and equipment that could increase fratricide risk during combined operations?
(2) Could differences in equipment and uniforms among US armed forces increase
fratricide risk during joint operations?
(3) What differences in equipment and uniforms can be stressed to help prevent fratricide?
(4) What is the friendly deception plan?
(5) What are the locations of your unit and adjacent units (left, right, leading, follow-on)?
(6) What are the locations of neutrals and noncombatants?
c. Own forces.
(1) What is the status of training activities? What are the levels of individual, crew, and unit
proficiency?
(2) Will fatigue be a factor for friendly forces during the operation? Has an effective sleep
plan been developed?
(3) Are friendly forces acclimatized to the area of operations (AO)?
(4) What is the age (new, old, or mix) and condition of equipment in friendly units? What is
the status of new equipment training?
(5) What are the expected mission oriented protective posture (MOPP) requirements for the
operation?
d. Attachments and detachments.
(1) Do attached elements understand pertinent information regarding threat and friendly
forces?
(2) Are detached elements supplied this pertinent information by their gaining units?
e. Weather.
(1) What are the expected visibility conditions (light data and precipitation) for the
operation?
(2) What effect will heat and cold have on soldiers, weapons, and equipment?
f. Terrain.
(1) Do you know the topography and vegetation (such as urban, mountainous, hilly, rolling,
flat, desert, swamp/marsh, prairie/steppe, jungle, dense forest, open woods) of the expected AO?
(2) Have you evaluated the terrain using the factors of OAKOC?
2. Mission. Is the mission and all associated tasks and purposes clearly understood?
3. Execution.
a. Task organization.
(1) Has the unit worked under this task organization before?
(2) Are SOPs compatible with the task organization (especially with attached units)?
B-1
12
___________________________________________________________ Appendix B – Force Protection
(3) Are special markings or signals (for example, cats’ eyes, chemlites, or panels) needed
for positive identification of uniforms and equipment?
(4) What special weapons and/or equipment will be used? Do they look or sound like threat
weapons and/or equipment?
b. Concept of the operation.
(1) Maneuver. Are main and supporting efforts identified to ensure awareness of fratricide
risks and prevention measures?
(2) Fires (direct and indirect).
(a) Are priorities of fires identified?
(b) Have target lists been developed?
(c) Has the fire execution matrix/overlay been developed?
(d) Have locations of denial areas (minefields, FASCAM) and contaminated areas
(ICM, NBC) been identified?
(e) Are the locations of all supporting fire targets identified in the OPORD/OPLAN
overlays?
(f) Are aviation and close air support targets clearly identified? Have signals been
established to positively identify these targets for the aircraft? Have airspace coordination areas been
developed? Have threat air defense systems been suppressed?
(g) Has the direct-fire plan been developed and synchronized with the fire support
plan?
(h) Have final protective fires been designated?
(i) Have sector limits been identified and verified?
(j) Have executors for each target been assigned and do they understand when and
where to shoot? Do the shooters have “eyes on” the target?
(k) Are the observers surveyed in or are they using a map spot? Target location
errors can cause big problems.
(l) Do all leaders and executors understand where the fire support coordination
measures are and when they go into effect? Rehearsal is the key.
(m) Can the FSO hear what targets are being called on the maneuver nets?
(n) Have targets been rehearsed with the executors and the field artillery battalion?
(o) Does the reinforcing or general support reinforcing field artillery have all the
proper graphics and understand where they fit in? Did they attend the rehearsal?
(p) Have restrictions on specific munitions been established and does everyone
know where they are planned and emplaced?
(3) Engineer tasks.
(a) Are friendly minefields, including FASCAM and ICM dud-contaminated areas,
known?
(b) Are obstacles identified, along with the approximate time needed for
reduction/breaching of each?
(4) Tasks to each subordinate unit. Are friendly forces identified, as appropriate, for each
subordinate maneuver element?
(5) Tasks to combat support (CS)/combat service support (CSS) units. Have locations of
friendly forces been reported to CS/CSS units?
(6) Coordinating instructions.
(a) Will rehearsals be conducted? Are they necessary? Are direct and indirect fires
included?
(a) Is a backbrief necessary?
Figure B-4. Example OPORD Format with Fratricide Reduction Measures (Continued)
B-13
FM 3-20.96 ____________________________________________________________________________
(c) Are appropriate control measures clearly explained and illustrated in the OPORD
and overlays? Have they been disseminated to everyone who has a need to know? What is the plan for
using these control measures to synchronize the battle and prevent fratricide?
(d) Have target/vehicle identification drills been practiced?
(e) Do subordinate units know the immediate action, drill, or signal for “CEASE FIRE”
or “I AM FRIENDLY” if they come under unknown or friendly fire? Is there a backup action?
(f) Is guidance in handling dud munitions, such as ICM and cluster bomb units,
included?
4. Service Support.
a. Are train locations and identification markings known by everyone?
b. Do medical and maintenance personnel know the routes between train units?
5. Command and Signal.
a. Command.
(1) What are the locations of the commander and key staff members?
(2) What is the chain of command and the succession of command?
b. Signal.
(1) Do instructions include backup code words and visual signals for all special and
emergency events?
(2) Do instructions cover how to identify friendly forces to aircraft?
(3) Are signal operating instructions (SOI) distributed to all units with a need to know, such
as higher, lower, adjacent, leading, and follow-on elements?
Figure B-4. Example OPORD Format with Fratricide Reduction Measures (Continued)
B-1
14
Appendix C
C-1
FM 3-20.96 ____________________________________________________________________________
C-4. The commander states his CCIR and PIR, or they are
recommended by the staff and approved by the commander. CCIR
and PIR provide focus to the collection plan. Each CCIR/PIR supports
a decision expected to occur during execution of the selected threat
C-2
____________________________________ Appendix C – Collection Management and Battle Tracking
STEP 4 - DISSEMINATE
C-3
FM 3-20.96 ____________________________________________________________________________
NOTE: The optimal mix is to send graphics and/or text immediately via digital means
with a notice that voice clarification can be accomplished if the digital traffic is
not understood. Under all circumstances it is important to ensure that the
recipient received the information sent.
C-4
____________________________________ Appendix C – Collection Management and Battle Tracking
C-5
C-6
MISSION DATE:
MISSION/PU
RPOSE/ADDI
VEH LINKUP
UNIT TIONAL CREDIT # OIC MARCH TIME SP TIME # OF PAX
BUMPER #s POINT
INFORMATIO
N
1 N/A
2 N/A
3 N/A
4 N/A
5 N/A
7 N/A
8 N/A
9 N/A
10 N/A
FM 3-20.96 ____________________________________________________________________________
Appendix D
D-1
FM 3-20.96 ____________________________________________________________________________
D-2
___________________________________ Appendix D – Stability Operations and Support Operations
D-3
FM 3-20.96 ____________________________________________________________________________
PEACE OPERATIONS
D-14. Peace operations support strategic and policy objectives.
Peace operations include peacekeeping operations and peace
enforcement operations. The US usually participates in peace
operations as part of a United Nations (UN) force or another
multinational organization; it reserves the right to conduct peace
operations unilaterally. Peace operations require the continual
assessment of commanders and staffs to ensure that units are ready
to transition into other operations as a result of an escalation of the
current situation. The transition may be from a US unilateral
operation or multinational coalition to a UN-led coalition, from
noncombat to combat operations, and from military to civilian
control.
Peacekeeping Operations
D-15. A peacekeeping operation is conducted with the consent of all
major parties to a dispute. It is designed to monitor and facilitate
implementation of agreements (cease fire, truce, or other such
agreements) and to support diplomatic efforts to reach a long-term
political settlement. The use of force, actual or threatened, occurs
only in self-defense or as a last resort to accomplish the mission.
D-4
___________________________________ Appendix D – Stability Operations and Support Operations
D-5
FM 3-20.96 ____________________________________________________________________________
D-6
___________________________________ Appendix D – Stability Operations and Support Operations
SECURITY ASSISTANCE
D-24. Security assistance refers to a group of programs by which
the US provides defense articles, military training, and other defense-
related services to foreign nations by grant, loan, credit, or cash sales
to further national policies and objectives.
D-25. Army forces support security assistance efforts through
military training teams, maintenance support personnel and training,
and related activities.
HUMANITARIAN AND CIVIC ASSISTANCE
D-26. Humanitarian and civic assistance programs are provided in
conjunction with military operations and exercises. In contrast to
humanitarian and disaster relief operations, they are planned
activities. Humanitarian and civic actions are limited to the following
categories:
• Medical, dental, and veterinary care provided in rural
areas of a country.
• Construction of rudimentary surface transportation
systems.
• Well drilling and construction of basic sanitation facilities.
• Rudimentary construction and repair of public facilities.
SUPPORT TO INSURGENCIES
D-27. The US may support insurgencies that oppose regimes that
threaten US interests or are a threat to regional stability. This type of
mission is normally carried out by Army special operations forces.
Support includes logistics and training, but normally not combat
operations.
SUPPORT TO COUNTERDRUG OPERATIONS
D-28. In 1986, the president declared drug trafficking a threat to
national security. This resulted in US forces being employed in a
variety of operations to support other agencies that are responsible for
detecting, disrupting, interdicting, and destroying illicit drugs and the
infrastructure (personnel, material, and distribution systems) of illicit
drug-trafficking entities. Counterdrug activities are always conducted
in conjunction with another government agency. When executed inside
of the US and its territories, counterdrug operations are considered
domestic support operations. Army forces do not engage in direct
action during counterdrug operations. Typical support to counterdrug
operations include:
• Detection and monitoring.
• Host nation.
• Command, control, communications, and computers.
• Intelligence.
• Planning.
• Logistics.
• Training.
D-7
FM 3-20.96 ____________________________________________________________________________
• Manpower.
• Research, development, and acquisition.
• Reconnaissance.
COMBATING TERRORISM
D-29. In all types of stability operations, counterterrorism and
antiterrorism activities are a continuous requirement in protecting
installations, units, and individuals from the threat of terrorism.
These operations contain elements of both offensive and defensive
operations. Counterterrorism encompasses a full range of offensive
measures, including strikes and raids, to prevent, deter, and respond
to terrorism. This is a specified mission for selected special
operations forces. Antiterrorism focuses on defensive measures used
to reduce vulnerabilities of individuals and property to terrorist
attacks, to include limited response and containment by local
military forces. Commanders must take the security measures
necessary to accomplish the mission and protect the force against
terrorism. Typical antiterrorism actions include—
• Coordination with local law enforcement.
• Positioning and hardening of facilities.
• Physical security actions designed to prevent
unauthorized access or approach to facilities.
• Crime prevention and physical security actions that
prevent theft of weapons, munitions, identification cards,
and other materials.
• Policies regarding travel, size of convoys, breaking of
routines, HN interaction, and off-duty restrictions.
• Protection from WMD.
D-8
___________________________________ Appendix D – Stability Operations and Support Operations
D-9
FM 3-20.96 ____________________________________________________________________________
D-10
___________________________________ Appendix D – Stability Operations and Support Operations
D-11
FM 3-20.96 ____________________________________________________________________________
D-12
___________________________________ Appendix D – Stability Operations and Support Operations
D-13
FM 3-20.96 ____________________________________________________________________________
D-14
___________________________________ Appendix D – Stability Operations and Support Operations
D-15
FM 3-20.96 ____________________________________________________________________________
D-16
___________________________________ Appendix D – Stability Operations and Support Operations
• Hospitalization.
• Follow-up on victims of chemical and biological agents.
D-17
FM 3-20.96 ____________________________________________________________________________
D-18
___________________________________ Appendix D – Stability Operations and Support Operations
D-19
FM 3-20.96 ____________________________________________________________________________
ENVIRONMENT
D-80. Stability operations and support operations can take place in
any part of the world. To deal effectively with the diverse situations
they may face, US forces must undergo orientation training on the
complex conditions and factors at work in a specific region. Each
soldier must understand the political and economic situation, as well
as the cultures, climates, and terrain of the region. He should
understand the military situation, especially the doctrine, tactics,
and equipment that are employed by belligerent, guerrilla, and
terrorist forces. Orientation training should also clarify
environmental factors as well as the planning and operational
considerations discussed in the remainder of this section.
TEMPO
D-81. Although extreme tension may underlie stability operations
and support operations, the tempo of these operations is generally
slow. Nonetheless, the speed of military action can vary widely, from
fast, violent tactical movement by a reaction force for the purpose of
relieving encircled friendly forces to the occupation of checkpoints to
control vehicular and civilian traffic.
D-82. The threat can be expected to execute both overt and covert
operations to test friendly reaction times and security procedures
throughout stability operations and support operations. Units that
are predictable or that lack sound operations security (OPSEC) leave
themselves susceptible to attack. For the squadron, the key to a
secure environment is not only to maintain the highest possible level
of OPSEC, but also to vary the techniques by which security
procedures are executed (for example, varying security patrol routes
and moving checkpoints).
INTELLIGENCE
D-83. Intelligence is crucial during the execution of stability
operations and support operations. The threats faced by military
forces in these operations are more ambiguous than those in other
situations because combatants, guerrillas, and terrorists can easily
blend with the civilian population. Before forces are committed and
while they are conducting operations, intelligence must be collected,
processed, and focused to support all planning, training, and
operational requirements. (NOTE: See FM 3-07 [FM 100-20] for
additional information.)
DECENTRALIZED OPERATIONS
D-84. Although stability operations and support operations are
normally centrally planned, execution often takes the form of small-
scale, decentralized actions conducted over extended distances. In
some situations, junior leaders will have the responsibility for making
immediate and monumental decisions on the ground. Effective
command guidance and a thorough understanding of ROE are
critical at each level.
RULES OF ENGAGEMENT
D-20
___________________________________ Appendix D – Stability Operations and Support Operations
All threat military personnel and vehicles transporting threat personnel or their equipment may be
engaged subject to the following restrictions:
A. When possible, the threat will be warned first and asked to surrender.
B. Armed force is the last resort.
C. Armed civilians will be engaged only in self-defense.
D. Civilian aircraft will not be engaged, except in self-defense, without approval from division level.
E. All civilians should be treated with respect and dignity. Civilians and their property should not be
harmed unless necessary to save US lives. If possible, civilians should be evacuated before any US
attack. Privately owned property may be used only if publicly owned property is unavailable or its use
is inappropriate.
F. If civilians are in the area, artillery, mortars, AC-130s, attack helicopters, and tube-launched or
rocket-launched weapons should not be used against known or suspected targets without the
permission of a ground maneuver commander (lieutenant colonel or higher).
G. If civilians are in the area, all air attacks must be controlled by forward air controller or forward
observer, and close air support, white phosphorous weapons, and incendiary weapons are
prohibited without approval from division.
H. If civilians are in the area, shoot only at known threat locations.
I. Public works such as power stations, water treatment plants, dams, and other public utilities may not
be engaged without approval from division level.
J. Hospitals, churches, shrines, schools, museums, and other historical or cultural sites will be
engaged only in self-defense against fire from these locations.
K. All indirect fire and air attacks must be observed.
L. Pilots must be briefed for each mission as to the location of civilians and friendly forces.
M. Booby traps are not authorized. Authority to emplace mines is reserved for the division commander.
Riot control agents can be used only with approval from division level.
N. Prisoners should be treated humanely, with respect and dignity.
O. Annex R to the operations plan (OPLAN) provides more detail. In the event this card conflicts with
the OPLAN, the OPLAN should be followed.
D-21
FM 3-20.96 ____________________________________________________________________________
GRADUATED RESPONSE
D-88. ROE will be published in any stability operation and support
operation. As the operation continues and the military is forced to
deal with different ROE situations, the threat will quickly determine
what US forces can and can’t do. With the information, the threat will
test US forces and their resolve. For this reason, a graduated
response matrix should be used. This provides leaders and soldiers a
framework of how to deal with ROE situations. They should be
rehearsed using vignettes that actually put the soldiers and leaders
in a situation that forces them to work through the graduated
response. Refer to Figure D-2 for an example of a graduated
response.
SITUATION: Your unit is conducting an operation (i.e., secure a weapons storage facility). Signs have
been posted that no crowds are allowed near the facility. After a period of time, a crowd of civilians begins
to gather. You are given the order to disperse the crowd as quickly and safely as possible. The following
steps should be followed to disperse the crowd. Steps can be used independently or in conjunction with
each other to get the crowd to disperse.
1. Bring in linguists assigned to your unit to talk to the crowd and tell them to disperse.
2. Employ Airborne Speaker Teams to transmit instructions to the crowd to disperse.
3. Employ bullhorns to relay instructions to the crowd to disperse.
4. Use Loud Noise Speaker Teams to disperse the crowd.
5. Honk the horns of unit vehicles to get the crowd to disperse.
6. Employ concertina wire to keep the crowed from gaining access to the area.
7. Start the vehicle you have to show the crowd that you will move on them if necessary.
8. Employ mechanized vehicles (interim armored vehicles) as a show of force to the crowd.
9. Take pictures of the instigators of the crowd.
10. Employ military working dogs to disperse the crowd.
11. Fix bayonets.
12. Conduct procedures used in Civil Disturbance Drills.
13. Use pepper spray to disperse the crowd.
14. Show that you have CS canisters.
15. Use the CS canisters.
16. Employ helicopter blades wash to disperse the crowd.
17. Fire rounds in the air.
18. Employ the use of deadly force.
RULES OF INTERACTION
D-89. ROI describe what forms of local civilian contact are allowed
and prohibited. ROI may account for local political, religious, other
D-22
___________________________________ Appendix D – Stability Operations and Support Operations
FORCE PROTECTION
D-91. Because of the influence of local politics and news media in
stability operations and support operations, precautions and
operations required to minimize casualties and collateral damage
become particularly important operational considerations during
these operations. At the same time, however, force protection must
be a constant priority.
D-92. In attempting to limit the level and scope of violence used in
stability operations and support operations, leaders must avoid making
tactically unsound decisions or exposing the force to unnecessary risks.
On the contrary, an overpowering use of force, correctly employed, can
reduce subsequent violence or prevent a response from the threat force.
This must be covered in the ROE and the operations order (OPORD)
from the troop.
D-93. OPSEC, tempered by restrictions in the ROE and ROI, is an
important tool for the commander in accomplishing his force
protection goals. Security procedures should encompass the full
range of antiterrorist activities for every soldier and leader. Examples
include proper communications security; strict noise, light, and litter
discipline; proper wear of the uniform; display of the proper
demeanor for the situation; as well as effective use of cover and
concealment, obstacles, observation posts (OP) and early warning
devices, the protection afforded by armored vehicles, and safe
locations for eating and resting.
D-94. A final consideration in force protection is hygiene. Many
stability operations and support operations take place in
underdeveloped nations; therefore, proper field sanitation and
personal hygiene are mandatory if soldiers are to stay healthy.
TASK ORGANIZATION
D-23
FM 3-20.96 ____________________________________________________________________________
LEADER REQUIREMENTS
D-100. Flexibility and situational awareness are paramount
requirements. Leaders must ensure that every soldier understands
the mission, the history, and reason they are executing the mission.
This creates confident leaders and soldiers who don’t hesitate when a
D-24
___________________________________ Appendix D – Stability Operations and Support Operations
SOLDIERS’ RESPONSIBILITIES
D-101. US soldiers may have extensive contact with HN civilians
during stability operations and support operations. As a result, their
personal conduct has a significant impact on the opinions, and thus
the support, of the local population. As noted, soldiers must
understand that misconduct by US forces (even those deployed for
only a short time) can damage rapport that took years to develop. US
soldiers must treat local civilians and military personnel as personal
and professional equals, affording them the appropriate customs and
courtesies.
D-102. Every soldier must be updated continuously on changes to
operational considerations (such as environment, ROE/ROI, media,
and force protection). Such changes can have immediate impact on
his freedom to react to a given situation. Keeping the soldier informed
of changes enhances his situational awareness and his ability to
adapt to changing conditions. Leaders must disseminate this
information quickly and accurately.
D-103. The collection of information is a continuous process, and all
information must be reported. Intelligence is provided by many
sources, including friendly forces, threat elements, and the local
populace. From the friendly standpoint, each soldier must be familiar
with the commander’s critical information requirements and other
applicable intelligence requirements. At the same time, threat
soldiers will be continuously seeking intelligence on US actions, often
blending easily into the civilian population. US soldiers must be
aware of this and use OPSEC procedures at all times.
D-104. To emphasize responsibilities, soldiers and leaders conduct
precombat checks (PCC) and precombat inspections (PCI) that focus
on a soldier’s knowledge of the environment and application of ROE,
graduated response, and ROI. These checks and inspections should
also identify possible OPSEC violations and deficiencies that could
place the soldier and his equipment at risk. Leaders should stress
that terrorists and thieves may attempt to infiltrate positions or
mount vehicles either to steal equipment and supplies or to cause
harm to US forces or facilities.
D-105. To enhance civilian cooperation and support, the S2 is
responsible for issuing key word and phrase cards (primarily to
commanders) to assist in translation of key English phrases into the
language of the HN. These phrases should apply specifically to the
AO.
EMPLOYMENT CONSIDERATIONS
D-25
FM 3-20.96 ____________________________________________________________________________
D-26
___________________________________ Appendix D – Stability Operations and Support Operations
• Liaison/negotiate.
• Conduct presence operations.
• Compliance inspection operations.
• Conduct a Joint Military Commission (JMC) meeting.
• React to civil disturbance.
• Plan for and react to a media interview.
• Deliver supplies or humanitarian assistance.
• Supervise minefield clearance.
NOTE: This is not an all-inclusive list of tasks. The following lists contain information
only on the squadron task, purpose, and planning considerations for the tasks
specified here.
LIAISON/NEGOTIATE
D-111. When conducting stability operations and support operations,
the squadron commander must conduct liaison or negotiations with
many military forces, factional force leaders, government
organizations, NGOs, PVOs, and international agencies. Leaders
must be in control, dominating, and confident. The squadron
commander must be aware of all liaison tasks being conducted in his
organization. He should delegate liaison tasks to subordinate leaders
and establish a liaison officer (LNO) within the staff when capable
and assume responsibility of specific liaison requirements that
warrant his level of attention.
D-112. The following is a guide and should be modified to fit
individual METT-TC conditions. The majority of the steps are geared
toward a stability operation but are easily applied to all types of
operations.
• Unit headquarters (squadron commander and staff)
determines liaison requirements for making contact.
Determines the need for interpreter. Plans the type of
interpreter to be used. Ensures that the interpreter is
the right one for the situation. Many times the
interpreter is of the opposite factional affiliation and
could hinder proper dialog or mood of the liaison. May
request interpreter assistance from higher or perhaps
request that the agency/individual conducting liaison
bring his interpreter for heightened clarification.
Identifies military forces, civil authorities, religious
leaders, ethnic groups, local factions, and NGOs
operating in the area of responsibility (AOR).
D-27
FM 3-20.96 ____________________________________________________________________________
D-28
___________________________________ Appendix D – Stability Operations and Support Operations
D-29
FM 3-20.96 ____________________________________________________________________________
D-30
___________________________________ Appendix D – Stability Operations and Support Operations
D-31
FM 3-20.96 ____________________________________________________________________________
D-32
___________________________________ Appendix D – Stability Operations and Support Operations
Task Organization
D-117. Task organization for a compliance inspection requires the
unit to designate a security force to isolate the area to be inspected, a
search or reconnaissance force, and a QRF. Special consideration
must be made to determine the size of security needed and the QRF
to over match any possible threat. Augmentation from the brigade
can usually provide an effective QRF.
D-33
FM 3-20.96 ____________________________________________________________________________
D-34
___________________________________ Appendix D – Stability Operations and Support Operations
D-35
FM 3-20.96 ____________________________________________________________________________
D-36
___________________________________ Appendix D – Stability Operations and Support Operations
D-37
FM 3-20.96 ____________________________________________________________________________
D-38
___________________________________ Appendix D – Stability Operations and Support Operations
D-39
FM 3-20.96 ____________________________________________________________________________
Disperse.
• Unit leaders select and employ control formations to best
accomplish the task assigned.
• Soldiers respond with strict discipline to orders to help
demonstrate firm resolve.
• Soldiers resist provocation and deliberate attempts to
humiliate them.
• Leaders consider rotation scheme for soldiers in
perimeter, especially those closest to civilians.
• Commander uses all available resources to help reduce
tensions.
PSYOP assets are used for recording unlawful
activities, communicating to crowd, identifying covert
direction or leadership.
CA assets are used to aid in communication and
liaison.
PVO and other nongovernmental agencies identify the
real cause of the disturbance and potential means to
end confrontation.
• Soldiers are required to review rules for use of lethal force
before employment in the perimeter.
Brigade or squadron commander may add or delete
restrictions to the ROE.
Soldiers must be able to react immediately to every
threat. (Commander must wargame every considerable
action of the crowd or hostile individuals.)
Soldiers rehearse all physical restraint options to be
used in escalating situation before the use of deadly
force prior to assuming duties on the perimeter.
Adhere to the graduated response.
Leaders ensure that soldiers on the perimeter can hear
orders, and soldiers are kept informed of the situation.
• Apprehension and detention of civilians are consistent
with specific guidance issued for the current operation.
Apprehension and detention limited to serious
offenses involving death or injury, or property theft or
destruction.
Personnel searches are conducted to check for
weapons or evidence.
• Leader considers use of patrols and visible mobile
checkpoints after cessation of the disturbance to assist
the resumption of control by the local civil authorities.
• Leader uses video equipment to tape the disturbance and
unit’s actions to document accuracy of activities and
preclude incorrect reporting of force response.
PLAN FOR AND REACT TO A MEDIA INTERVIEW
D-40
___________________________________ Appendix D – Stability Operations and Support Operations
D-41
FM 3-20.96 ____________________________________________________________________________
D-42
___________________________________ Appendix D – Stability Operations and Support Operations
D-43
FM 3-20.96 ____________________________________________________________________________
D-128. The commander confirms the mission and intent from higher
for the humanitarian assistance, and does the necessary
coordination with government organizations/NGOs that are
concerned with the mission. He establishes a reconnaissance force to
reconnoiter the route and the delivery site (liaisons with delivery site
officials, evaluates the security of the site, establishes security of the
site). Once complete, the reconnaissance force may become the
overall security force. He also establishes the convoy security force to
organize the convoy security mission and a QRF to respond to chance
contact by the convoy.
D-129. The following are other planning considerations for the
execution of the delivery of humanitarian assistance/supplies:
• The convoy halts in a covered, concealed site short of the
delivery destination.
• The convoy commander confirms the location for delivery.
• The commander conducts liaison with authorities for
drop-off point.
• The commander organizes the unit to maintain security
during delivery.
Security elements posted at intersections or choke
points en route from the halt site to the delivery site.
Security element posted at delivery site; wire emplaced
as necessary.
Security is maintained at halt site.
• Supply vehicles move in manageable numbers (dependent
on off-load timing) to delivery site.
En route security or QRF prevents diversion of
vehicles.
Site security prevents infiltration and attempts to loot.
QRF prepared to respond to events at delivery site.
• The commander ensures relief organization or local
authority acknowledges receipt of supplies.
• Security collapses onto and around the delivery site when
all vehicles complete unloading. The unit may set up area
security with subordinate elements/platoons conducting
screen, reconnaissance, defensive, and QRF missions.
• Security remains on site until local authorities assume
control or distribution is completed.
• The convoy commander reports mission complete to
higher headquarters.
D-44
___________________________________ Appendix D – Stability Operations and Support Operations
D-45
FM 3-20.96 ____________________________________________________________________________
D-46
Appendix E
Deployment
Speed, precision, and
CONTENTS
knowledge are Predeployment Activities............................ E-2
necessary if we are to Movement..................................................... E-2
meet the Army’s Fort to Port Movement ............................ E-2
Port to Port Movement ............................ E-3
requirement for a
Reception, Staging, Onward Movement,
strategically responsive and Integration......................................... E-3
full spectrum brigade. Airlift Operations ......................................... E-4
The brigade will deploy Planning ................................................... E-4
Operation Considerations....................... E-7
within 96 hours of
Load Shoring ........................................... E-7
notification and begin Unit Load Planning Personnel................ E-11
operations immediately Basics of Aircraft Load Planning ........... E-12
upon departure from Types of Loads ........................................ E-12
463L Cargo System ................................. E-13
the aerial port of
debarkation (APOD).
The squadron will be the first unit to deploy within that timeline.
To achieve that goal, we need to examine what is necessary in
predeployment activities; fort to port movement, port to port
movement; and reception, staging, onward movement, and
integration (RSOI).
E-1
FM 3-20.96 ____________________________________________________________________________
E-2
_______________________________________________________________ Appendix E – Deployment
SECTION II – MOVEMENT
E-3
FM 3-20.96 ____________________________________________________________________________
E-10. RSOI are processes that generate combat power. Limited time
requires the rapid processing of RSOI. The TC-AIMS II will integrate
information from the Worldwide Port System and the Global Air
Transportation and Execution System to support this process.
E-11. As the initial step in the introduction of combat power,
reception can determine the success or failure of an entire operation;
it must therefore be thoroughly planned and carefully executed.
Reception from strategic lift is implemented at or near designated
APODs and SPODs, under the control of the CINC or the joint task
force commander. While the reception plan for each theater may vary,
reception capacity must, at a minimum, equal strategic lift delivery
capabilities.
E-12. The APOD serves as the primary port of entry for all deploying
personnel as well as for early entry forces, which are normally
airlifted into theater together with their equipment. At a minimum,
responsibility for APOD operations is divided between the Army and
US Air Force (USAF). In general, the Air Force is responsible for air
terminal control, loading, unloading, and servicing of aircraft. The
Army is responsible for clearing personnel and cargo and for life
support, as required.
E-4
_______________________________________________________________ Appendix E – Deployment
PLANNING
E-14. Four plans are developed for the execution of airlift
operations:
• Ground tactical plan.
• Landing plan.
• Air movement plan.
• Marshaling plan.
E-5
FM 3-20.96 ____________________________________________________________________________
LANDING PLAN
E-21. The landing plan contains the sequence and method of
delivery into selected drop zone (DZ) and landing zone (LZ) in the AO.
The landing plan is the link between the air movement plan and the
ground tactical plan. It contains the following information:
• Locations of DZs, LZs, and LAPES extraction zones.
• Sequence in which the zones will be used.
• Method of delivery.
• Parachute hour (P-Hour).
E-6
_______________________________________________________________ Appendix E – Deployment
E-7
FM 3-20.96 ____________________________________________________________________________
OPERATION CONSIDERATIONS
E-26. During airland operations, aircraft land on available runways
in a secure area to deliver cargo. They land, quickly dispense their
cargo, and take off immediately. The airland method ensures
negligible damage to materiel; delivers vehicles ready for immediate
drive away; delivers crews with their weapons and vehicles; and
provides for the backhaul of casualties, enemy prisoners of war, and
damaged equipment. Airland operations have the disadvantages of
requiring LZs and more time for delivering loads than the LAPES and
the low velocity airdrop (LVAD) methods. Additionally, aircraft and
units are extremely vulnerable to threat direct and indirect fires
during landing and unloading.
E-27. During a LAPES operation (C-130 only), aircraft approach an
identified cargo delivery strip flying several feet above the ground. The
flight crew deploys an extraction parachute and the cargo is pulled
out of the aircraft. The aircraft then regains altitude and leaves the
area. A secure LZ and USAF control teams are usually required at the
site. LAPES requires less preparation time, personnel, and equipment
support than LVAD. LAPES is a pinpoint delivery system for large
items of equipment; however, materiel is more susceptible to damage
when the LAPES method is used as compared to the airland method.
Additionally, the LAPES zone may require a significant amount of
preparation. Wet soil conditions hinder LAPES operations.
E-28. LVAD operations (C-130, C-141, C-17) are used during the
initial assault and during follow-on delivery of cargo. During LVAD
operations, the delivering aircraft eject cargo with the aid of an
extraction parachute from the minimum height necessary to fully
deploy cargo parachutes needed to suspend the specific cargo they
are carrying (usually 500 to 1,500 feet above ground level). LVAD
delivers the most cargo in the least amount of time and is usually the
prime method of delivery during initial assaults.
E-29. The adverse weather aerial delivery system (AWADS) on the C-
130 and station keeping equipment on the C-141 provide all-weather
delivery capability for both troops and equipment.
E-30. The AWADS delivers smaller bundles of supplies via airdrop.
This system provides the assault force a high assurance of accurate
parachute delivery of follow-on material.
E-31. Helicopters are deployed by flying them to the airhead and/or
by USAF airland aircraft. While flying them to the airhead is
preferred, this may not be possible because of refueling requirements
en route.
LOAD SHORING
E-32. Shoring is lumber, planking, plywood, or any other similar
material that protects the aircraft cargo floor or 463L pallet surfaces,
decreases the approach angle of aircraft ramps, protects airport
tarmacs, spreads weight over a larger area, and keeps 463L pallets
off the ground. Shoring is used during airland operations; it is not
required for LVAD or LAPES operations. Modern cargo aircraft can
carry considerable weight; however, shoring is necessary, particularly
E-8
_______________________________________________________________ Appendix E – Deployment
E-9
FM 3-20.96 ____________________________________________________________________________
3/4 inch; however, some aircraft may require thicker shoring than
others. Refer to applicable USAF technical orders.
Parking Shoring
E-40. Use parking shoring to protect the aircraft floor or aircraft
loading ramps from concentrated contact, such as steel wheels and
trailer tongue supports and wheels (see Figure E-2). Each aircraft has
specific floor weight limitations that apply to wheeled and
nonwheeled cargo. Most pneumatic tires do not require parking
shoring. The minimum thickness of parking shoring is 3/4 inch.
Always use parking shoring when rolling shoring is required.
E-10
_______________________________________________________________ Appendix E – Deployment
E-11
FM 3-20.96 ____________________________________________________________________________
BRIDGE SHORING
E-41. Use bridge shoring to take advantage of the greater strength of
the vehicle treadways of the aircraft cargo floor. It allows the heavy
cargo to be positioned between the treadways without overloading the
center of the floor area. Shoring is first placed lengthwise, nose-to-
tail, or laterally on the treadways. Planks or beams are positioned on
top of the shoring planks and form the bridge (see Figure E-3).
SLEEPER SHORING
E-42. Use sleeper shoring under the frame or axle of any special-
purpose vehicle (such as a forklift, scoop loader, or grader) that
weighs over 20,000 pounds and has tires that are not designed for
highway travel. Sleeper shoring is placed between the aircraft floor
and a structured part of the vehicle, such as the frame or axle (see
Figure E-4). This type of shoring prevents the vehicle from bouncing
up and down and possibly pulling the tie-down rings out of the
aircraft floor.
E-12
_______________________________________________________________ Appendix E – Deployment
E-13
FM 3-20.96 ____________________________________________________________________________
TYPES OF LOADS
E-50. Aircraft loading is generally categorized into two types—
concentrated loading and palletized loading. Table E-1 summarizes
USAF aircraft load data.
• Concentrated Loading. Concentrated loads are very large
or heavy items, such as tanks, vehicles, or construction
equipment.
E-14
_______________________________________________________________ Appendix E – Deployment
E-15
FM 3-20.96 ____________________________________________________________________________
463L PALLET
E-53. The 463L pallet is made of corrosion-resistant aluminum with
a soft wood core and is framed on all sides by aluminum rails. The
rails have 22 attached tie-down rings with six rings on each long side
and five rings on each short side. Each ring has a 7,500-pound
restraint capacity. The rails also have indents (notches), which are
designed to accept the detent locks located on numerous types of
material-handling equipment on all airlift-capable aircraft. The
overall dimensions of the 463L pallet are 88 inches long by 108
inches wide by 2-1/4 inches thick. The usable dimensions of the
surface area are 84 inches wide by 104 inches long. This allows two
inches around the periphery of the pallet to attach straps, nets, or
other restraint devices. An empty pallet weighs 290 pounds (355
pounds with nets) and has a maximum load capacity of 10,000
pounds.
E-16
Appendix F
Intelligence Systems
This appendix
augments the CONTENTS
Interconnectivity and Reachback Systems .... F-1
discussion in Chapter Global Broadcast Service ............................. F-3
6 (Section X – National TENCAP Communication System
and Joint Intelligence Processor ................................................... F-4
Assets), by providing Secret Internet Protocol Router Network .... F-5
Common Systems at the National Level ......... F-5
technical data for some
E-3 Sentry AWACS ........................................ F-5
of the more prominent RC-135V/W RIVET JOINT .............................. F-6
and probable systems U-2 Reconnaissance Aircraft........................ F-7
from which the Common Systems at the Joint Level .............. F-7
squadron will receive or Joint Surveillance Target Attack
Radar System............................................. F-8
request information/ Airborne Reconnaissance Low (ARL) ......... F-9
intelligence. RQ-1A Global Hawk (Tier II+) HAE UAV....... F-10
Trackwolf ....................................................... F-12
Ground Station Module................................. F-13
Figure F-1 displays an Common Ground Station.............................. F-15
TROJAN SPIRIT II .......................................... F-17
intelligence systems
Electronic Processing and
architecture from the Dissemination System .............................. F-20
national level down to Common Systems at the Corps Level............. F-20
the cavalry squadron, Guardrail Common Sensor........................... F-21
reconnaissance, Enhanced Tactical Unit Terminal ................. F-22
Imagery Processing and Dissemination
surveillance, and System........................................................ F-23
target acquisition Common Systems at the Division Level ......... F-23
(RSTA), which will be AN/TSQ-114 Trailblazer................................. F-23
referenced throughout AN/TRQ-32A(V)2 Teammate.......................... F-25
AN/ALQ-151(V)2 Quickfix.............................. F-26
the sections when
AN/TSQ-2000 Mobile Integrated
identifying the Tactical Terminal ....................................... F-26
systems at each level. AN/TSC-125 Commander’s Tactical
Terminal...................................................... F-27
F-1
FM 3-20.96 ____________________________________________________________________________
F-2
________________________________________________________Appendix F – Intelligence Systems
ARFOR
ARFOR
Brigade and/or
Brigade
Squadron
Squadron
F-3
FM 3-20.96 ____________________________________________________________________________
F-4
________________________________________________________Appendix F – Intelligence Systems
F-5
FM 3-20.96 ____________________________________________________________________________
F-6
________________________________________________________Appendix F – Intelligence Systems
F-7
FM 3-20.96 ____________________________________________________________________________
F-8
________________________________________________________Appendix F – Intelligence Systems
F-9
FM 3-20.96 ____________________________________________________________________________
F-10
________________________________________________________Appendix F – Intelligence Systems
In Desert Storm, JSTARS was praised for tracking mobile Iraqi forces, including
tanks and Scud missiles. The crew flew 49 combat sorties accumulating more
than 500 combat hours. In one mission, JSTARS provided surveillance support
of the battlefield during the battle for the town of Khafji. JSTARS detected a
follow-on force of 80 Iraqi vehicles heading toward Khafji. This follow-on force
was engaged and stopped by tactical airpower and the Marine ground
commanders knew that additional Iraqi forces would not enter the battle.
In another mission, JSTARS surveillance of the Iraqi retreat from Kuwait City
provided real time information of the retreat to the air operations center. This
information allowed commanders to use tactical airpower to interdict and destroy the
slow-moving Iraqi mechanized columns as they used the roads out of Kuwait City.
F-11
FM 3-20.96 ____________________________________________________________________________
F-12
________________________________________________________Appendix F – Intelligence Systems
F-13
FM 3-20.96 ____________________________________________________________________________
F-14
________________________________________________________Appendix F – Intelligence Systems
TRACKWOLF
AN/TSQ-152 TRACKWOLF
F-38. The AN/TSQ-152 Special Purpose Receiving System
(Trackwolf), shown in Figure F-4, provides the commander, US Army
Europe, with an organic capability to intercept, locate, exploit, or
initially target sources of threat HF voice communications. Trackwolf
is a high-frequency sky wave, intelligence, and emitter location
system. This ground-based system can be tailored extensively—from
a large, fully capable mobile COMINT field station to a small, elusive,
four-vehicle field configuration—to meet a wide range of mission
objectives, giving early, reliable, and critical intelligence to the
theater commander before initiation of hostilities.
F-41. The CPS is modular, with all components linked together via a
fiber optic digital data local area network (LAN). This allows systems
to be tactically sized, ranging from field station operations to rapid
deployment corps operations.
F-42. The primary mission of the DFS is direction finding. The DFS
consists of—
• Net control station (NCS).
• Three remotely located direction-finding outstations.
F-15
FM 3-20.96 ____________________________________________________________________________
F-16
________________________________________________________Appendix F – Intelligence Systems
F-17
FM 3-20.96 ____________________________________________________________________________
AFATDS.
Standard tactical and commercial communications.
Secure facsimile (FAX).
• Products:
Color or black and white hardcopy imagery.
Electronic maps.
Graphics, targeting, track display, and target files.
• Six GSMs per division, seven per corps (six per corps and
one per armored cavalry regiment), and two per each EAC
military intelligence (MI) brigade.
F-50. The follow-on GSM, also known as the CGS, is the next
generation intelligence and electronic warfare (IEW) system. Refer to
following paragraph on CGS.
Figure F-6. Common Ground Station and Common Ground Station with Trailer
F-18
________________________________________________________Appendix F – Intelligence Systems
F-19
FM 3-20.96 ____________________________________________________________________________
F-20
________________________________________________________Appendix F – Intelligence Systems
F-21
FM 3-20.96 ____________________________________________________________________________
F-22
________________________________________________________Appendix F – Intelligence Systems
F-23
FM 3-20.96 ____________________________________________________________________________
F-24
________________________________________________________Appendix F – Intelligence Systems
F-25
FM 3-20.96 ____________________________________________________________________________
F-26
________________________________________________________Appendix F – Intelligence Systems
F-75. Systems at the division level are shown in Figure F-1 at the
beginning of this appendix. This section discusses the divisional
assets not previously discussed, which further provide detection,
processing, and disseminating capabilities at the division level. The
systems discussed are the Trailblazer, Teammate, Quickfix, the MITT,
and the CTT.
AN/TSQ-114 TRAILBLAZER
F-76. The AN/TSQ-114 Trailblazer (Figure F-10) is a mobile,
ground-based LOS electronic warfare (EW)/SIGINT intercept system
with VHF direction-finding capability. The Trailblazer system consists
of five AN/TSQ-138A master control sets. Each master control set is
mounted on an M923A2 five-ton carrier with a trailer support unit,
which houses a 30-kilowatt generator. A quick erecting, self-
supporting telescopic mast for the DF antenna group, and separate
antennas for HF intercept and voice link, are attached to the top of
the shelter. The shelter has a ballistically protected exterior to resist
small arms fire. The MCS operator is capable of intercepting and
monitoring signals in the HF, VHF, and UHF frequency bands. The
operator determines the locations of signal emitters by intercepting
and analyzing signals of interest in the VHF band. DF tasking and
other communications between MCSs are controlled by a secure data
link.
F-77. Capabilities/features include:
• Five Trailblazer systems per heavy division.
• Searches for, intercepts, records, identifies, locates, and
reports on radio signals in the HF/VHF/UHF frequency
ranges.
• Can perform netted DF operations with other Trailblazers
and various other platforms.
• DF capabilities in VHF range
• Receives in AM, FM, continuous wave (CW), lower side
band (LSB), and upper side band (USB) modes.
• Capable of interoperating with QUICKFIX (ALQ-151) and
TRQ-32A(V)2.
• UHF data link for reporting and tasking.
• 6 x 98G (linguists).
• Operates 5-15 kilometers from the FLOT in a linear
framework.
F-27
FM 3-20.96 ____________________________________________________________________________
AN/TRQ-32A(V)2 TEAMMATE
F-79. The TRQ-32 Teammate (Figure F-11) is a mobile, multi-
station, LOS ground-based EW/SIGINT asset, used as a tactical DF
and intercept system. Teammate is capable of performing netted DF
operations with other Teammates and various other platforms.
F-28
________________________________________________________Appendix F – Intelligence Systems
AN/ALQ-151(V)2 QUICKFIX
F-82. The EH-60A (Figure F-12) is a Blackhawk helicopter fitted
with the AN/ALQ-151(V)2 Quickfix equipment, and features the host
interface unit to connect with the ASAS Tactical Commander’s
Analysis Center (TCAC), and an improved Teammate direction-finding
link. The EH-60A is normally deployed 20 kilometers behind the
FLOT in a linear framework.
F-29
FM 3-20.96 ____________________________________________________________________________
F-30
________________________________________________________Appendix F – Intelligence Systems
F-31
FM 3-20.96 ____________________________________________________________________________
F-32
Appendix G
Surveillance Troop
The surveillance troop
of the squadron CONTENTS
provides the squadron Unmanned Aerial Vehicle Platoon ............. G-1
commander with a wide Organization............................................. G-1
Mission ..................................................... G-3
array of reconnaissance Capabilities............................................... G-3
assets that enhance its Limitations................................................ G-6
intelligence-gathering System Description ................................. G-6
capability. Among these Employment Considerations .................. G-7
Ground Sensor Platoon .............................. G-10
assets are imagery Organization............................................. G-10
intelligence (IMINT), Mission ..................................................... G-12
signal intelligence PROPHET ................................................. G-13
(SIGINT), and GSR/IREMBASS ....................................... G-16
NBC Reconnaissance Platoon ................... G-34
measurement and Organization............................................. G-34
signature intelligence Mission ..................................................... G-35
(MASINT). Capabilities/Limitations........................... G-35
Employment Considerations .................. G-35
ORGANIZATION
G-1. The UAV platoon consists of a platoon headquarters, a ground
control section, and a launch and recovery (L/R) section (see Figure
G-1). Each section is divided into two teams.
G-1
FM 3-20.96 ____________________________________________________________________________
PLATOON HEADQUARTERS
G-2. The UAV platoon headquarters collocates with the
surveillance troop command post (CP). The platoon leader is
responsible for coordinating the movement and linkup of platoon
elements deploying into a maneuver brigade’s forward area. The
platoon leader uses his aviation subject matter expertise to conduct
mission planning and to identify airspace coordination requirements.
The platoon leader forwards the mission plan to the surveillance
troop commander. The surveillance troop commander forwards his
complete plans for all organic sensors to the squadron S2 and S3 for
approval. The platoon leader and surveillance troop commander
subsequently request airspace coordination/ deconfliction through
the squadron S3.
G-2
_________________________________________________________ Appendix G – Surveillance Troop
MISSION
G-5. The mission of the UAV units is to provide a real-time,
responsive, day and night imagery surveillance and reconnaissance
capability to support situational awareness (SA), target acquisition,
battle damage assessment (BDA), and enhanced battle management
capabilities (friendly situation and battlefield visualization).
G-6. Based on mission, enemy, terrain and weather, troops and
support available, time available, and civil considerations (METT-TC),
the squadron may task organize the UAVs to individual recce
(reconnaissance) troops or may keep them under squadron control.
The surveillance troop operates its UAVs out to 50 kilometers for
periods up to four hours. In addition, the Army Force may be able to
provide additional aerial reconnaissance to the brigade out to 50
kilometers beyond the forward line of own troops (FLOT). The Imagery
Workstation–Brigade (IWS-B) database provides the capability to
correlate and synchronize imagery from bottom-up tactical imagery
feeds, top-down imagery feeds supporting visualization of the
brigade’s battlespace, and that of subordinate battalions.
CAPABILITIES
G-7. The UAV baseline is capable of 12 hours of continuous
operations on-station within a 24-hour period. The system has the
capability of surge operations for 18 hours within a 24-hour period
for no more than three consecutive days. The following day is limited
to eight hours of operation. Although the system has the capability to
surge for 18 hours over the course of 72 hours, the UAV baseline and
its parent unit may be reconstituted after 36 hours.
G-8. The AV can operate during less than ideal weather conditions
(environments similar to a small light aircraft) with a range of 50
kilometers from the L/R site, flying at altitudes of 14,000 feet mean
sea level (MSL) or greater. Nominal operating altitudes/survivable
G-3
FM 3-20.96 ____________________________________________________________________________
altitudes are from 8,000 to 10,000 feet above ground level (AGL) for
day operations and between 6,000 to 8,000 feet AGL for night
operations. The UAV system will have an endurance of four hours on-
station at 50 kilometers. It can launch and recover in crosswinds
from 0 to 20 knots and operate in moderate precipitation conditions
(up to 2 inches per hour).
G-9. The UAV system’s mobility and rapid set-up and tear-down
times allow the UAV platoon to keep pace with the brigade’s
movement. To facilitate rapid movement, the control of the UAV may
be passed to other control stations or L/R stations to allow
continuous flight operations to meet the commander’s requirements.
The minimal UAV system (to include all personal gear and sufficient
Class I, Class III, and Class IX supplies for the initial 72 hours of
operations at a minimum of 12 flight hours on-station in a 24-hour
period) fits into two high-mobility multi-purpose wheeled vehicles
(HMMWV) with shelters, two cargo/troop-carrying HMMWVs, and two
trailers deployable in a single C-130 sortie. The complete baseline
UAV system with all personnel and equipment is transportable in no
more than two C-130 sorties. Sustainment beyond the initial 72
hours is supported with a divisional mobile maintenance facility
consisting of a HMMWV and trailer. The addition of a mobile
maintenance facility will require an additional C-130.
G-10. The UAV can be retasked in flight to ensure it is responsive to
the commander’s immediate information requirements. The UAV is
fully integrated with and cued by other collection systems, such as
Joint Surveillance Target Attack Radar System (JSTARS), Guardrail
Common Sensor, Artillery Counter Mortar/Battery Radars, and
Forward Area Air Defense Command and Control (FAADC2), in a
synchronized effort to support the warfighter.
G-11. There are a variety of imagery sensors available for use on
UAVs. Each sensor has a unique capability, with distinct advantages
and disadvantages for each sensor. Sensors are currently limited to
electro-optical (EO) and infrared (IR). Additional payloads are under
development and may be fielded as payload technology matures.
Table
G-1 is a matrix of sensor characteristics for the type sensors
currently available on the UAV.
G-4
_________________________________________________________ Appendix G – Surveillance Troop
G-5
FM 3-20.96 ____________________________________________________________________________
LIMITATIONS
G-14. There are several significant limitations to the UAV. They
include—
• Unique operational signature. Due to the signature
associated with the launch and recovery of the UAV, the
L/R area will normally not be collocated with the
brigade/Joint Task Force (JTF) CP. The high operational
signature also means that the UAV launch site must
periodically be in environments in which the threat can
acquire and attack the site. The L/R team has little or no
capability to provide its own security.
• Limited operational capability. The UAV is not yet capable
of 24-hour operations. For sustained operations it can
operate 12 hours per day with a three-day surge capability
of up to 18 hours per day.
• Limited loiter time. At a 50-kilometer range, the UAV has a
four-hour loiter time. This reduces its effectiveness as a
long-term surveillance system.
• Limited AVs. The UAV has only three AVs per system,
which restricts its employment and limits the number of
named areas of interest (NAI) that it can cover. Although
missions can sometimes be combined, the dedication of
UAV to BDA, for example, would necessarily reduce its use
in missions such as flank security.
• Limited payload. The UAV has a limit of 60 pounds of
usable payload capacity.
• Altitude limited to 15,000 feet MSL. This limitation makes
the UAV more vulnerable to threat weapons systems in
higher terrain elevations.
• Survivability. The UAV flies slow and relatively low, which
makes it an inviting target for threat air defense systems.
The UAV system will operate in close proximity to heavily
defended areas. It will be subject to hostile air defenses
that may include the full range of antiaircraft systems.
These systems include conventional small arms;
automatic antiaircraft weapons; man portable air defense
(MANPAD) systems; and crew-served systems using radar,
optics, and EO for detection, tracking, and engagement.
The threat will also include shoulder-fired surface-to-air
missiles (SAM), launcher-mounted SAMs; and air-to-air
weapons launched by fixed-wing aircraft, helicopters,
counter-UAVs, anti-radiation missiles, and directed energy
weapons. Airborne and ground components will be
susceptible to the same threat as the unit they support.
Airborne and ground computers and
communications/data links (networks) may be subjected
to threat electronic warfare (EW) and SIGINT exploitation
and attack as well as computer network attack.
SYSTEM DESCRIPTION
G-6
_________________________________________________________ Appendix G – Surveillance Troop
EMPLOYMENT CONSIDERATIONS
G-18. Figures G-2 and G-3 are two examples of flight patterns for
employment of the UAV for intelligence-gathering operations. The
figures depict possible flight paths of the UAV as it would fly a route
reconnaissance along a highway across brigade boundaries deep into
the area of interest (AOI). Again, care is taken to fly at a safe distance
from the actual target area to preclude being engaged by threat
weapons systems.
G-19. The surveillance troop and the UAV platoon leader direct the
deployment, operations, and redeployment of the UAV platoon when
it is retained under squadron control. The UAV platoon’s CP consists
of the platoon headquarters and the collocated GCS. The CP is
normally collocated with the surveillance troop CP. The location of
the CP must support continuous mission management of aerial
reconnaissance assets. The location must also support the
dissemination of taskings, reports, and technical data between the
analysis and control element and the aerial reconnaissance platoon.
G-7
FM 3-20.96 ____________________________________________________________________________
G-20. Control of the UAV during flight is affected through the GCS.
At the launch site, the AV is programmed to climb out to a specified
altitude and distance from the launcher. The AV operator launches
the UAV from inside the GCS. The mission is flown with the AV
operator controlling the UAV via the C-band microwave data link
from inside the GCS shelter. The data link must maintain LOS
between the AV and the GCS. The shelter can be located within the
CP, giving the supported commander the ability to immediately effect
a mission change. The GCS can also be located up to several
kilometers away from the CP.
120
km
Hwy 7
2
0
0
k Hwy 7
m
Launch/Recovery Area
G-8
_________________________________________________________ Appendix G – Surveillance Troop
G-9
FM 3-20.96 ____________________________________________________________________________
120
km
Hwy 7 Hwy 5
Assembly area
2
0
0
k
m
Hwy7
G-10
_________________________________________________________ Appendix G – Surveillance Troop
ORGANIZATION
G-25. The ground sensor platoon consists of headquarters element
and four multi-sensor sections (see Figure G-4). Each section
consists of one SIGINT team and one MASINT team. The platoon
depends upon the ISR integration section located at the squadron CP
for SIGINT mission management, technical support, and direction-
finding analysis.
G-11
FM 3-20.96 ____________________________________________________________________________
PLATOON HEADQUARTERS
G-26. The platoon headquarters consists of the platoon leader and
the platoon sergeant. They work together to ensure the subordinate
sections are deployed, employed, and supported in accordance with
the squadron’s OPORD and the surveillance troop commander’s
guidance. Using troop-leading procedures, the platoon leader is
responsible for coordinating the movement and link-up of platoon
elements that the squadron might attach to the recce troops or
deploy into a maneuver battalion’s AOs.
G-27. The ground sensor platoon’s CP is normally collocated with
one of its subordinate sections. The platoon CP can serve as an
alternate CP for the troop during deployment and redeployment. The
location of the CP must support the C2 of the sections.
MULTISENSOR SECTION
G-28. The multi-sensor section consists of one SIGINT team and one
MASINT team. Both teams always move as a two-vehicle multisensor
section within the AO. Movement by section allows the platoon to use
bounding overwatch techniques to maintain MASINT coverage and to
move the direction-finding baseline while maintaining continuous
G-12
_________________________________________________________ Appendix G – Surveillance Troop
The tactics, techniques, and procedures for the multisensor section support the future
fielding and evaluation of a multisensor platform. The multisensor platform will
consolidate the SIGINT and MASINT capability in a single vehicle.
MISSION
G-31. The surveillance troop directs the platoon based on the orders
of the supported higher headquarters. The surveillance troop
commander determines which subordinate platoons are best adept at
covering the taskings and tasks the ground sensor platoon leader
with covering specific NAI(s). Based on the surveillance troop’s
tasking, the ground sensor platoon leader directs the organization,
means, and method of covering the assigned NAI(s). The C2
relationship affects the communications relationship as well. Several
variations are possible, but these are METT-TC driven and will be
completely spelled out in the OPORD for the mission.
G-32. The squadron provides the surveillance troop commander
with the NAIs, specific information requirements, high pay-off target
lists (HPTL), the attack guidance matrix, and current order of battle
information, ISR graphics, threat databases, and target
identifications necessary to conduct collection missions. The
surveillance troop commander provides the information above, but
tailors it to the needs of the ground sensor platoon along with the
operations graphics and order. If the platoon is attached to brigade or
another battalion, the S2 directly provides the ground sensor platoon
leader with the NAIs, specific information requirements, HPTLs, the
attack guidance matrix, current order of battle information, ISR
G-13
FM 3-20.96 ____________________________________________________________________________
PROPHET
G-14
_________________________________________________________ Appendix G – Surveillance Troop
G-38. Convex provides good lines of bearing against targets that are
located to the sides of the baseline systems. The convex baseline is a
multi-station formation used when the threat forces are operating
along a broad, deep front. This formation supports intercept coverage
over a large front but is not for precise location (see Figure G-5).
G-39. Concave, which is the most accurate, is used when targets are
directly in front of the baseline. The concave baseline is a multi-
station formation used when the threat is operating in a compact,
narrow, but deep area like a salient. The direction finding accuracy is
excellent at short ranges under 15 kilometers and satisfactory at
longer ranges (see Figure G-6).
G-15
FM 3-20.96 ____________________________________________________________________________
G-16
_________________________________________________________ Appendix G – Surveillance Troop
G-17
FM 3-20.96 ____________________________________________________________________________
GSR/IREMBASS
G-49. MASINT assets provide situation development, targeting, and
force protection information by detecting, classifying, and locating
moving targets. The GSR provides combat information and targeting
G-18
_________________________________________________________ Appendix G – Surveillance Troop
data through the detection and location of moving targets. Its primary
functions are forward, flank, or rear security and early warning,
target acquisition, and limited assistance to friendly force movement
control. The IREMBASS provides the commander with information
from forward, flank, or rear. This information includes the
approximate number of targets, last known location, time of last
activation, type of target, and direction of travel.
G-50. The principal MASINT units in the brigade are the
GSR/IREMBASS sections of the ground sensor platoon in the
surveillance troop. These units operate under the centralized control
of the platoon leader. The platoon is integrated within the RSTA plan
that supports the identification and location of the threat along the
front, flank, or rear of the brigade to provide early warning,
surveillance, and target acquisition. Either the GSRs or the
IREMBASS (the choice is METT-TC driven) can accomplish this by
providing coverage on routes or areas not easily accessible or
desirable for maneuver forces. Since the same prime mover carries
both systems, only the GSR systems or the IREMBASS sensor strings
can be used.
G-51. The platoon supports the surveillance troop and cavalry
squadron, RSTA, by—
• Providing indications and warning of threat movement,
reinforcement, or withdrawal.
• Providing near-real time combat information and targeting
data.
• Confirming or denying movement along major supply
routes and avenues of approach or through specific NAIs.
• Supporting flank and rear security.
• Vectoring friendly forces to objectives during periods of
poor visibility by monitoring their movement.
• Providing tip-off and cross-cueing of other sensors to
support the squadron and brigade’s targeting effort.
GSR Operations
G-53. The team uses its GSR to detect, locate, classify, and track
moving ground targets in an area under surveillance. The GSR
detects moving ground targets only and cannot distinguish between
threat and friendly targets. The team uses the radar to search an
area by using one of four different modes of operation.
G-19
FM 3-20.96 ____________________________________________________________________________
G-54. The team can operate the system up to nine meters from the
vehicle or its battery power source. The operator evaluates the radar
data to determine the type of target, number of targets, direction of
travel, rate of speed, length of column, and last known location. With
this information he then prepares and submits a spot report to the
platoon leader and surveillance troop CP. This information is sent to
the ISR integration section at the squadron operations center that is
collocated with the S2.
G-55. The main advantage of radar is its ability to detect objects and
provide accurate target locations when other surveillance means
cannot. Radar is used mostly for limited visibility operations—
operations during darkness, haze, fog, or smoke. Radar can penetrate
light camouflage, smoke, haze, light rain, light snow, darkness, and
light foliage. Heavy rain or snow restricts radar-detection capabilities;
however, having a well-trained operator can compensate in part for
these negative effects. Radar is limited to LOS. The GSR provides a
highly mobile, nearly all-weather 24-hour capability, including night
and poor daylight visibility, for battlefield surveillance.
G-56. The GSR team can operate its equipment either vehicle- or
ground-mounted. This capability ensures the team has the mobility
of its supported unit. Its employment is coordinated closely with that
of scouts, patrols, observation posts (OP), and other sensor devices.
The GSR is ineffective against air targets unless the target is flying
near the ground. This is because GSR is designed to detect moving
targets in front of a background. It is also vulnerable to direction-
finding and jamming by threat electronic combat and other deception
means.
G-20
_________________________________________________________ Appendix G – Surveillance Troop
the GSR team into its planning and operations in order to optimize its
employment. The GSR teams perform the following missions:
• Search missions. Search for threat activity on likely
avenues of approach or withdrawal, attack positions, and
assembly areas.
• Point surveillance. Monitor point targets such as bridges,
defiles, or road junctions to detect movement in and
around the point. Similarly, this type of surveillance can
be conducted to cover gaps between friendly units and key
terrain where OPs might be established.
• Control and coordination. Assist in the control of units,
especially during night operations, by monitoring and
vectoring the movement of friendly forces and warning
them of threat and other friendly activities along their
routes.
• Target acquisition and tracking. Acquire targets for fire
missions and track the advancing or retreating threat to
permit the timely shifting of fire. When coordinated with
final protective fires and illumination plans, GSR teams
are used to locate the threat and alert the supported unit
so that fires, illuminations, and prepositioned munitions
can be employed at the appropriate time. Survey target
areas immediately following the lifting of fires to detect any
remaining activity.
• Observation. Vector friendly maneuver while concurrently
searching for threat activity during periods when visibility
is limited or obscured.
• Perimeter security. Enhance security and provide early
warning of intrusions, movements in likely routes of
approach toward the perimeter, and unusual or
suspicious activities near long stretches of pipeline or
lines of communications.
G-58. Figures G-7 and G-8 highlight the capabilities of the GSR.
G-21
FM 3-20.96 ____________________________________________________________________________
G-22
_________________________________________________________ Appendix G – Surveillance Troop
G-60. Since many threat forces can detect radar signals, the team
should not locate the system near troop concentrations or other
friendly HVTs. The team should use the terrain to decrease the
electronic signature of the radar and increase the team’s electronic
protection. The GSR team can use hills, embankments, trees, and
other terrain features to absorb the radar’s side lobes. A soft target
background, such as heavily wooded terrain, also helps absorb the
radar signal. A hard background, such as rock terrain or buildings,
scatters and reduces the signal, thus limiting the threat’s capability
to detect the signal and locate the radar. Although LOS to the target
is required, the team should not use terrain such as hilltops that
G-23
FM 3-20.96 ____________________________________________________________________________
G-24
_________________________________________________________ Appendix G – Surveillance Troop
• Improve position.
G-63. Initially, the team emplaces the radar and clears the
surveillance area. It emplaces the radar where it can best cover the
target area, yet provides an acceptable degree of concealment and
cover from hostile direct and indirect fire. The team clears a
surveillance area in front of the GSR. Clearing a surveillance area is
very similar to clearing a field of fire in front of weapons systems. In a
hasty position, the initial emphasis is on concealment from threat
observation. The radar must be sited in a camouflaged position that
allows the team to cover its assigned area. The GSR team uses the
following principles when clearing a site:
G-25
FM 3-20.96 ____________________________________________________________________________
IREMBASS Operations
G-69. The team’s IREMBASS is capable of detecting and classifying
moving targets by responding to seismic acoustic disturbances,
changes to the IR energy, and magnetic field changes produced by
the targets. The IREMBASS operator collects information using three
sensors:
• Magnetic (M) Sensor. The magnetic sensor is a count
indicator sensor capable of detecting, counting, and
determining the direction of travel when objects containing
ferrous metal (iron) come within its detection radius.
• Seismic Acoustic (SA) Sensor. The seismic acoustic
sensor is a classification sensor capable of detecting and
classifying targets by ground vibrations and acoustic
signals. The sensor classifies the target as personnel,
vehicle, wheeled vehicles, tracked vehicles, and
unidentified.
• Infrared (IR) Passive Sensor. The infrared passive sensor
is a count indicator sensor capable of detecting, counting,
and determining the direction of travel of a target by
measuring the temperature change of a target against a
steady thermal background.
G-26
_________________________________________________________ Appendix G – Surveillance Troop
G-27
FM 3-20.96 ____________________________________________________________________________
G-28
_________________________________________________________ Appendix G – Surveillance Troop
G-29
FM 3-20.96 ____________________________________________________________________________
G-30
_________________________________________________________ Appendix G – Surveillance Troop
G-31
FM 3-20.96 ____________________________________________________________________________
G-32
_________________________________________________________ Appendix G – Surveillance Troop
G-33
FM 3-20.96 ____________________________________________________________________________
G-78. The IREMBASS team can use a sensor field consisting of two
or more sensor strings to monitor two or more specific locations
within an AOI (see Figure G-22).
G-34
_________________________________________________________ Appendix G – Surveillance Troop
G-35
FM 3-20.96 ____________________________________________________________________________
G-36
_________________________________________________________ Appendix G – Surveillance Troop
employ the sensors and relays than those revealed by the map
reconnaissance.
G-85. Upon completion of the ground reconnaissance, the leader
backbriefs the surveillance troop commander or the supported S2
(this can be in person or via FM; if FM, then grid locations of the new
scheme must be sent). Emplacement of the sensor strings occurs
once the new plan has been approved. Emplacement should occur at
night, at a time when the local populace are in their homes. This time
determination is part of the surveillance troop commander and/or
S2’s assessment of the population. This helps prevent the observation
of the emplacement and conceals the soldiers. Additionally,
maintenance operations on emplaced strings should also occur at
night. In certain environments, the IREMBASS teams will require
additional support. In a stability operations and support operations
environment where mines are prevalent, an IREMBASS team will
require engineer support and MP canine support. This type of
support allows the team to temporarily clear the area in which the
strings are to be emplaced. The dog allows for quick identification of
mines/explosives in darkness, while the engineers clear the small
obstacles. Any large-scale obstacles should have been identified in
the ground reconnaissance and cleared by engineers prior to the
night insertion by the IREMBASS team. Although this process
sounds very time-intensive, prior planning helps cut down the
emplacement time. By having contingency areas for IREMBASS
already identified, the map and ground reconnaissance can be
accomplished well before emplacement, requiring only a quick
validation before execution. This builds in the time needed for
additional support requirements.
ORGANIZATION
G-86. The NBC reconnaissance platoon consists of four vehicles (see
Figure G-24).
G-37
FM 3-20.96 ____________________________________________________________________________
CAPABILITIES/LIMITATIONS
G-88. The NBC reconnaissance platoon possesses limited capability
to provide warning and enhance protection against a “low-tech” NBC
threat, to include accidental or deliberate release of industrial
hazards and terrorism. Some significant limitations exist with respect
to area coverage, staff planning, and organic decontamination
capabilities. The size of the brigade’s AO presents a challenge to the
ability of the platoon to provide full coverage. Any determined effort
by an adversary to employ NBC capabilities against the brigade will
require chemical staff and unit augmentation.
EMPLOYMENT CONSIDERATIONS
G-89. In urban and complex terrain, the brigade leverages point,
standoff, and look-down detection capability to gain NBC situational
understanding. Urban and complex terrain creates
microenvironments that affect the behavior of NBC hazards and
smoke. The brigade will require augmentation of smoke assets to
provide long duration smoke that can screen movement of brigade
assets or support deception operations.
G-38
Appendix H
H-1
FM 3-20.96 ____________________________________________________________________________
H-2. CPs are positioned where they can best balance the need for
security and self-protection with the requirements to maintain both
digital and FM communications architectures. This may require a
centralized position during operations in a noncontiguous AO or
during stability or support operations. Conversely, during operations
in smaller-scale contingency or major theater of war environments,
CPs may be forced to locate well forward and prepared to move
frequently in support of mobile operations. Regardless, the CP should
not set up along likely threat avenues of approach, and it should be
prepared to displace as necessary to ensure survivability and
continuous battle control.
H-3. The general positioning of any CP should consider several
factors, including—
• Security.
• Trafficability of terrain.
• Line of sight communications (for both communications
and tactical unmanned aerial vehicle [UAV] operations).
• Terrain for passive security (cover and concealment) and
signal masking.
• Location away from main avenues of approach.
H-2
__________________________________________________ Appendix H – Command Post Operations
H-3
FM 3-20.96 ____________________________________________________________________________
H-4
__________________________________________________ Appendix H – Command Post Operations
MSR status.
Logistical “warstoppers.”
• S1—
Significant personnel actions.
Changes in medical coverage.
Safety.
• Fire support coordinator—
Current fire support coordination measures.
Army airspace command and control (A2C2) update.
Air defense artillery coverage.
• Engineer — Obstacle/survivability update.
• Military police — Rear area security.
• Chemical — Mission oriented protective posture (MOPP).
• S6—
Current communications and network status.
Location of key leaders.
• Headquarters commandant—
CP logistical issues.
CP security.
Displacement plan and proposed jump locations.
• S3 sergeant major (SGM) — Priority of work for CP.
H-5
FM 3-20.96 ____________________________________________________________________________
H-6
__________________________________________________ Appendix H – Command Post Operations
H-14. CPs in the Stryker Brigade Combat Team (SBCT) are the main
CP, the TAC CP, the command group, and the rear CP. Figures H-1
and H-2 show the SBCT main CP’s organization, equipment, and
personnel. As discussed in Chapter 2, the squadron main CP will
collocate with the SBCT main CP. To facilitate an effective inter-staff
working relationship, the squadron staff must understand the
functions of SBCT staff sections and special cells. Figure H-3 outlines
the major functions within the SBCT staff.
H-7
FM 3-20.96 ____________________________________________________________________________
H-8
__________________________________________________ Appendix H – Command Post Operations
H-9
FM 3-20.96 ____________________________________________________________________________
H-10
__________________________________________________ Appendix H – Command Post Operations
H-15. Squadron CPs include the main CP, the TAC CP, the
command group, the CTCP, the field trains CP (FTCP), and the
surveillance troop CP. Figures H-4, H-5, and H-6 show the main CP
and TAC CP organization, equipment, and personnel.
H-11
FM 3-20.96 ____________________________________________________________________________
INDEPENDENT OPERATIONS
H-16. The SBCT’s main CP is the principle C2 facility for the SBCT.
The cavalry squadron, reconnaissance, surveillance, and target
acquisition (RSTA) main CP is optimized to operate with subelements
in the SBCT main CP. These subelements include the MI company’s
ISR analysis and integration platoons, the SBCT S2X, brigade S2,
and the fires and effects coordination cell (see Figure H-2). Under
certain circumstances the squadron main CP may need to operate
independently from the SBCT main CP. These circumstances include
the following:
H-12
__________________________________________________ Appendix H – Command Post Operations
H-13
FM 3-20.96 ____________________________________________________________________________
FILTER SETTINGS
H-22. To achieve a COP, all FBCB2, from individual vehicle to
squadron, must have the same SA filter settings. This is particularly
important for the Red picture so that as information about icons
ages, the system purges them at the same time on all of the
squadron’s systems. Standard filter settings based on the nature of
the threat’s operation should be established in unit SOPs and be the
same throughout the brigade. For threat offensive operations, the
filter settings should be short; for threat defensive operations, the
setting times should be longer, reflecting the more static nature of the
threat picture. Table H-1 provides an example of possible filter
settings.
H-14
__________________________________________________ Appendix H – Command Post Operations
REPORTING
H-26. It may not be advantageous to have all vehicles sending
SPOTREPs digitally. This can lead to multiple reports of the same
threat element and contribute to an already confused and
indecipherable intelligence picture. Defining who within the SBCT
can initiate digital SPOTREPs can help eliminate this problem. One
technique is to limit the creation of Red icons via digital SPOTREPs to
reconnaissance elements and the troop leadership (commander, XO,
or first sergeant [1SG]). Others would report on FM to their higher
headquarters, which will create and manage the icon. This will also
help those who execute the direct firefight by moving the digital
reporting responsibility to someone somewhat removed from the
H-15
FM 3-20.96 ____________________________________________________________________________
fight. At troop level, the XO, 1SG, or troop CP personnel become the
primary digital reporters. These constraints cannot be completely
restrictive. Unit SOPs and command guidance must allow for and
encourage soldiers who observe the threat and know they are the sole
observer (for example, there is no corresponding Red icon displayed
in the SA picture) to create a digital SPOTREP. The brigade and
squadron SOPs should define the schedule for report submissions,
the message group for the report, and the medium (digital system or
verbal) to be used.
UPDATES
H-27. The squadron establishes a routine schedule of when system
updates should be executed. For example, the S2 section should be
continuously updating the All-Source Analysis System (ASAS)
database, and every 30 minutes transmit the latest ASAS SA picture
to the FBCB2 network. Staff sections should print critical displays on
an established schedule. These printed snapshots of SA can be used
for continuity of battle tracking in the event of system failures and
can contribute to after-action reviews and unit historical records.
H-16
__________________________________________________ Appendix H – Command Post Operations
COLOR STANDARDS
H-30. The SOP should define the colors used in graphics down to
troop level.
DATABASES
H-31. C2 systems will inevitably migrate to a web-based capability,
allowing information to be entered into a database and then accessed
by users as needed or when they are able to retrieve it. For example,
the S2 may transmit an intelligence summary to all subordinates and
some will inevitably not receive it or lose the file. He could
simultaneously post that same summary to his “homepage” so users
can access it as required. If this technique is used, note the
recommendations below:
• Posting a document to a homepage does not constitute
communications. The right people have to be alerted that
the document is there and available.
• Keep documents concise and simple. Elaborate
PowerPoint slide briefings will take days to transmit,
collapsing the TI. Similarly, gaudy graphics and templates
should not be used.
• The amount of information in the database and who has
access must be carefully controlled, both for security and
for keeping from overloading the TI.
SHIFT ORGANIZATION
H-32. CPs must be capable of conducting continuous operations for
considerable lengths of time. Fatigue caused by stress, lack of sleep,
extremes in temperature, combat, and monitoring digital systems will
significantly degrade operations if leaders do not actively manage the
shift changes. Squadron CPs are manned at a level that allows for
two shifts. While these may be broken into a traditional day and
night shift, the schedule may require modification based on the
tempo of operations and requirements for conducting the military
decision-making process. Each shift in the main CP is led by a battle
captain from the S3 shop and contains representation from every
staff section, to include radio operators and security personnel.
H-17
FM 3-20.96 ____________________________________________________________________________
both analog and digital formats. The CTCP maintains both the
operational and combat service support (CSS) overlays current in
both formats.
H-34. All of the Army Tactical Command and Control Systems
(ATCCS) effectively support the creation and transmission of doctrinal
field orders. The brigade staff sections will normally develop their
portions of orders, send them to the S3 plans maneuver control
station where they are merged into a single document and
transmitted to subordinate, higher, and adjacent units. In creating
orders, remember that the TI does not possess high transmission
rates like civilian electronic mail. Orders and graphics must be
concise to reduce transmission times. Table H-2 provides
transmission times and capabilities based on system capability and
sample file sizes. Consider as well that orders transmitted directly to
FBCB2-equipped systems (such as all subordinate leaders in the
squadron) must meet the size constraints of the order formats in
FBCB2.
H-35. Graphics and overlays should be constructed with the same
considerations for clarity and size. SA reduces to some degree the
need for control measures, but the staff must always consider the
integration of analog units and that SA may not always be available
to all elements.
Equipment (data rate Kbytes/sec 100K File 1 MB File 5 MB File 10 MB File 1 GB File
capacity)
WIN-T (2,000k) 2MB 208 .5 sec 5 sec 24 sec 48 sec 1.3 hours
WIN-T (8,000k) 8MB 833 .12 sec 1.2 sec 6 sec 12 sec 20 min
ABCS MAIN CP LAN 10MB 1,042 .1 sec .96 sec 5 sec 10 sec 16 min
ABCS MAIN CP LAN 100MB 10,417 .01 sec .1 sec .5 sec .96 sec 96 sec
EPLRS (64K) 6.7 15 sec 2.5 min 12.5 min 25 min 42 hours
EPLRS VHSIC (128K) 13.3 7.5 sec 1.3 min 6.3 min 12.5 min 21 hours
NTDR (288K) 30 3.3 sec 33 sec 2.8 min 5.6 min 9.2 hours
JTIDS (238K) 24.8 4 sec 40 sec 3.4 min 6.7 min 11.2 hours
H-18
__________________________________________________ Appendix H – Command Post Operations
H-38. The staff must recognize that integrating an analog unit into
the unit requires retention of most of the analog control techniques.
In essence, two control systems have to be in operation, with
particular attention paid to keeping the analog unit apprised of all of
the pertinent information that is flowing digitally.
FRATRICIDE PREVENTION
H-39. Digital systems, particularly FBCB2, make a significant
contribution to reducing fratricide by allowing all units to have
visibility of FBCB2-equipped forces in their network. Vehicle
commanders can quickly check their displays to see if friendly forces
are operating in an area as they prepare to execute direct or indirect
fires. However, there are some limitations to the system that
operators must be aware of and trained on.
H-40. To begin with, not all systems will be equipped with FBCB2 or
(embedded battle command software, nor will all systems always be
operational. Also, elements that are not operating within the
squadron’s communication architecture will not be visible on FBCB2
or on ATCCS unless they have been manually entered and
continuously updated (manually). When leaders know that there are
elements without FBCB2 or with inoperable FBCB2 in the area, they
should alert all their soldiers to that situation. For example, a
reconnaissance platoon may be conducting a rearward passage of
lines when some of the unit’s FBCB2 or associated radios are
inoperative. In this case, the platoon leader should alert the unit they
are passing through that some vehicles are not able to transmit SA
data, and identify where they are and on what route they are
returning. If possible, vehicles with operable FBCB2 should link up
and act as escorts for vehicles whose systems are inoperable.
H-41. There is not a dismounted system for FBCB2, and it will be
some time before one is widely fielded. This is critical for dismounted
soldiers, particularly during infiltration operations when indirect fires
are being employed. Fire support elements may check digital displays
H-19
FM 3-20.96 ____________________________________________________________________________
and see no Blue icons in the target area and be unaware that
dismounted soldiers are operating there. FBCB2 and ATCCS displays
may be used for denying fires, but not for clearing fires. The absence
of a Blue icon should not be the basis for assuming there is no
friendly force there. Additionally, if an ATCCS display is being viewed,
remember that the information may not be current. Never use ATCC
displays as a sole source for targeting information. Some other
method of both target observation and clearance must be used.
H-42. Depending on the Blue SA filter setting, an operator may not
have all Blue units displayed. If the filter setting is for display of only
armor and infantry elements, the operator will not have visibility on
all other Blue assets such as artillery, air defense, and CSS vehicles.
The same is true for the echelon filter setting; if only troop and higher
echelons are selected, the operator will not have visibility on the
majority of the systems on the battlefield.
H-43. The nature of tactics and capabilities are evolving at an
alarming rate, with an increase in maneuvering forces and the use of
rapidly emplaced obstacles. This can lead to an increase in obstacle
fratricide. Digital systems can help reduce this if CPs keep obstacle
overlays current and quickly disseminate changes, and if operators
keep current, critical overlays posted on their systems. Transmission
of updated overlays should be accompanied by net-wide FM alerts to
ensure system operators know new obstacle information has been
disseminated and they are to display the new overlay.
H-44. Finally, the increase in maneuvering of forces over expanded
battlespaces, the increased forward presence and maneuvering of
artillery units, and the increased use of rapidly emplaced obstacles
can lead to fratricide incidents. Operators must utilize their digital
displays to track friendly elements and conduct the essential FM
crosstalk to clear fires and maintain their total SA.
H-20
Appendix I
Environmental Protection
Protection of natural
CONTENTS
resources is an ever-
Environmental Risk Management
increasing concern. It is Process ................................................... I-1
the responsibility of all Identify Environmental Hazards ............... I-1
unit leaders to decrease Assess Environmental Hazards................ I-1
and, if possible, eliminate Develop Controls and Make Decisions .... I-3
Implement Controls ................................... I-3
damage to the Supervise and Evaluate............................. I-3
environment when Environmental Risk Assessment
conducting all types of Worksheet................................................... I-3
operations. This appendix
focuses on measures the squadron must implement to accomplish
that objective. Training Circular (TC) 3-34.489 provides a
comprehensive listing of procedures and considerations applicable
when operating in environmentally sensitive areas.
I-1
FM 3-20.96 ____________________________________________________________________________
I-2
____________________________________________________ Appendix I – Environmental Protection
I-3
FM 3-20.96 ____________________________________________________________________________
I-4
A. Mission or Task: B. Date/Time Group C. Date Prepared:
Begin:
End:
I-5
FM 3-20.96 ____________________________________________________________________________
Worksheet Instructions
Block
A–E Self-explanatory.
F Identify Hazards. Identify hazards by reviewing METT-TC factors for the mission or
task. Additional factors include historical lessons learned, experience, judgment,
equipment characteristics and warnings, and environmental considerations.
G Assess Hazards. Assessment includes historical lessons learned, intuitive analyses,
experience, judgment, equipment characteristics and warnings, and environmental
considerations. Determine initial risk for each hazard by applying the risk assessment
matrix (refer to Chapter 2, FM 3-100.4). Enter the risk level for each hazard.
H Develop Controls. Develop one or more controls for each hazard to either eliminate the
hazard or reduce the risk (probability and/or severity) of a hazardous incident. Specify
who, what, where, when, and how for each control. Enter controls.
I Determine Residual Risk. Determine the residual risk for each hazard by applying the
risk assessment matrix (refer to Chapter 2, FM 3-100.4). Enter the residual risk level for
each hazard.
J Implement Controls. Decide how each control will be put into effect or communicated to
the personnel who will make it happen (written or verbal instruction: tactical, safety,
garrison SOPs, rehearsals). Enter controls.
K Determine Overall Mission/Task Risk. Select the highest residual risk level and circle it.
This level becomes the overall mission or task risk level. The commander decides
whether the controls are sufficient to accept the residual risk. If the risk is too great to
continue the mission or task, the commander directs development of additional controls
or modifies, changes, or rejects the COA.
Supervise and Evaluate. This last step is not on the worksheet. Plan how each control
will be monitored for implementation (continuous supervision, spot checks), and
reassess hazards as the situation changes. Determine if the controls worked and if they
can be improved. Communicate lessons learned.
I-6
A. Mission or Task: B. Date/Time Group C. Date Prepared:
Squadron FTX Begin: 010600 JUN XX 22 MAY XX
End: 040900 JUN XX
Conduct area Environmentally Moderate (M) Designate this area Low (L) Squadron OPORD,
reconnaissance sensitive area in the as contaminated Para 3, and
northeast corner of with a persistent Operations Overlay
Training Area 13 chemical agent and
declare it off limits.
I-7
Glossary
A/L administrative and logistics
A2C2 Army airspace command and control
AA assembly area; avenue of approach
AADC area air defense commander
AAGS Army air-ground system
AAR after-action review
ABCS Army Battle Command System
ABCCC Airborne Battlefield Command and Control Center
ABF attack by fire
ACA airspace coordination area
ACC airspace control center
ACE analysis and control element; aviation combat element;
armored combat earthmover
ACL allowable cargo load
ACM airspace control measures
ACMR air combat maneuvering range
ACO airspace control order
ACP airspace control plan
ACT analysis and control team; air cavalry troop
ACTM air cavalry team
ACU area common user
ACUS area common user system
AD air defense
ADA air defense artillery
ADAM area denial artillery munitions; Air Defense Airspace
Management
ADO air defense officer
ADSI Air Defense System Integrator
AEB aerial exploitation battalion
AEPDS Advanced Electronic Processing and Dissemination
System
AFATDS Advanced Field Artillery Tactical Data System
AFCC Air Force component commander
AGL above ground level
Glossary-1
FM 3-20.96 ____________________________________________________________________________
Glossary-2
______________________________________________________________________________Glossary
Glossary-3
FM 3-20.96 ____________________________________________________________________________
Glossary-4
______________________________________________________________________________Glossary
Glossary-5
FM 3-20.96 ____________________________________________________________________________
Glossary-6
______________________________________________________________________________Glossary
Glossary-7
FM 3-20.96 ____________________________________________________________________________
EA engagement area
EAB echelons above brigade
EAC echelons above corps
EAD echelons above division
EAVO external air vehicle operator
EBC embedded battle command
EC effects coordination
ECCM electronic countercountermeasures
ECOA enemy course of action
ECT effects coordination team
EEFI essential elements of friendly information
EFET essential fires and effects task
EFF COORD effects coordinator
EFST essential fire support task
ELINT electronic intelligence
ELM electronic maintenance
EM enlisted men
EMPCOA enemy most probable course of action
eng; engr engineer
EO electro-optical
EP electronic protection
EPDS electronic processing and dissemination system
EPLRS enhanced position location reporting system
EPLRS–VHSIC enhanced position location reporting system–very high
speed integrated circuit
EPW enemy prisoner of war
ERFS extended range fuel supply
ESM electronic support measure
ET enhanced Trackwolf
Glossary-8
______________________________________________________________________________Glossary
Glossary-9
FM 3-20.96 ____________________________________________________________________________
Glossary-10
______________________________________________________________________________Glossary
Glossary-11
FM 3-20.96 ____________________________________________________________________________
Glossary-12
______________________________________________________________________________Glossary
IP internet protocol
IPB intelligence preparation of the battlefield
IPDS imagery processing and dissemination
IPF integrated processing facility
IR information requirement; infrared
IREMBASS improved remotely monitored battlefield sensor system
IRLS infrared line scanner
ISF internal security force
ISMS improved SIGINT (signal intelligence) manpack system
ISR intelligence, surveillance, and reconnaissance
IV intravenous
IWS-B imagery workstation-brigade
k kilowatt
kbps kilobytes per second
KIA killed in action
km kilometers
Glossary-13
FM 3-20.96 ____________________________________________________________________________
Glossary-14
______________________________________________________________________________Glossary
m meter(s)
MAC Military Airlift Command
MAJ major
MANPAD man portable air defense
MANPADS man portable air defense system
MAP mobile antenna platform
MARC multi-technology automated reader card
MASINT measurement and signature intelligence
MAV medium assault vehicle
max maximum
MBA main battle area
MBT main battle tank
MC4 Medical Communications for Combat Casualty Care
MCB mine-clearing blade
MCI Marine Corps intelligence
MCL mission configured load
MCO maintenance control officer
MCOO modified combined obstacle overlay
MCS Maneuver Control System; maintenance control section
MCWP Marine Corps Warfighting Publication
MDITS migration defense intelligence threat data system
MDMP military decision-making process
MEA munitions effects assessment
MEDEVAC medical evacuation
MEDLOG medical logistics
MEL maximum engagement line
MELIOS mini-eyesafe laser infrared observation set
MES medical equipment set
Glossary-15
FM 3-20.96 ____________________________________________________________________________
Glossary-16
______________________________________________________________________________Glossary
Glossary-17
FM 3-20.96 ____________________________________________________________________________
NM network management
NMC non-mission capable
NOE nap of the earth
NOFORN not releasable to foreign nationals/governments/non-US
citizens
NOSC Network Operations and Security Center
NPL no penetration line
NRO National Reconnaissance Office
NSA National Security Agency
NSFS naval surface fire support
NTDR Near Term Digital Radio
NVD night vision device
NVG night vision goggles
Glossary-18
______________________________________________________________________________Glossary
OT observer-target
Glossary-19
FM 3-20.96 ____________________________________________________________________________
P/N part/number
PA physician’s assistant
PAC personnel and administration center
PANAMSAT Pan American satellite
PAO public affairs office; public affairs officer
PARC principal assistant responsible for contracting
PAS personnel accountability system
PAX personnel (number of)
PC personnel carrier
PCC precombat check
PCI precombat inspection
PDDE power-driven decontamination equipment
PDS personnel data system
PEOC3S program executive officer command, control, and
communications system
PERSITREP personnel situation report
PERSTAT personnel status
PGM precision-guided munitions
P-Hour parachute hour
PHS primary heavy HMMWV shelter
PIP primary injection point
PIR priority intelligence requirements
PL phase line
PLGR position locator grid reference
PLL prescribed load list
PLS palletized loading system
plt platoon
PM program manager
PMCS preventive maintenance checks and services
PME peacetime military engagement
PMO provost marshal office
PMS portable monitoring set
POE port of embarkation; priority of effort
POF priority of fires
POL petroleum, oils, and lubricants
POS; pos priority of support; position
Glossary-20
______________________________________________________________________________Glossary
QA quality assurance
QC quality control
QRA quick reaction antenna
QRF quick reaction force
Glossary-21
FM 3-20.96 ____________________________________________________________________________
Glossary-22
______________________________________________________________________________Glossary
SA situational awareness
SAAFR standard use Army aircraft flight routes
SAFFMM sustaining, arming, fixing, fueling, manning, moving
SALUTE size, activity, location, unit, time, and equipment
SAM surface-to-air missile
SAMS-1 Standard Army Maintenance System-1
SAR synthetic aperture radar
SAS squadron aid station
SATCOM satellite communication
SAW squad automatic weapon
SBCT Stryker brigade combat team
SBF support by fire
SCDL surveillance and control data link
SCI sensitive compartmented information
SCL strategic configured load
SCO squadron commander
sct scout
SDS security data system
SEAD suppression of enemy air defense
sec second(s)
SEM spare equipment maintenance
SF Special Forces; security force
SFC sergeant first class
SGLI Serviceman's Group Life Insurance
SGM sergeant major
SGT sergeant
SHORAD short-range air defense
SICPS standard integrated command post system
SIDPERS Standard Installation/Division Personnel System
SID secondary imagery dissemination
SIGINT signal intelligence
SIGSEC signal security
SINCGARS Single Channel Ground-Airborne Radio System
SINCGARS–SIP single channel ground-airborne radio system–system
improvement program
SIPRNET secret internet protocol router network
Glossary-23
FM 3-20.96 ____________________________________________________________________________
Glossary-24
______________________________________________________________________________Glossary
Glossary-25
FM 3-20.96 ____________________________________________________________________________
Glossary-26
______________________________________________________________________________Glossary
Glossary-27
Bibliography
AR 380-19. Information Systems Security. 27 February 1998.
DA Form 581. Request For Issue and Turn-in of Ammunition. July 1999.
DA Form 1156. Casualty Feeder Report. 1 June 1966.
DD Form 565. Statement of Recognition of Deceased. August 1984.
FM 1-02 [FM 101-5-1]. Operational Terms and Graphics. 30 September 1997.
FM 2-0. Intelligence and Electronic Warfare Operations. 27 September 1994.
FM 2-01.3 [FM 34-130]. Intelligence Preparation of the Battlefield. 8 July 1994.
FM 2-33.3 [FM 32-2]. Collection Management and Synchronization Planning.
8 March 1994.
FM 2-22.5 [FM 34-56]. Imagery Intelligence. To Be Published.
FM 3-0 [FM 100-5]. Operations. 14 June 2001.
FM 3-04.111 [FM 1-111]. Aviation Brigades (and Digital Annex). 12 October 1997.
FM 3-04.112 [FM 1-112]. Attack Helicopter Battalion (and Digital Annex).
2 April 1997.
FM 3-04.113 [FM 1-113]. Utility and Cargo Helicopter Operations (and Digital Annex).
12 September 1997.
FM 3-04.114 [FM 1-114]. Air Cavalry Squadron/Troop Operations (and Digital Annex).
1 February 2000.
FM 3-06 [FM 90-10]. Urban Operations. 30 May 2001.
FM 3-07 [FM 100-20]. Stability Operations and Support Operations. 5 December 1990.
Bibliography-1
FM 3-20.96____________________________________________________________________________
FM 3-90.3 [FM 71-3]. The Mounted Brigade Combat Team. November 2001.
FM 3-91.123 [FM 71-123]. Techniques, Tactics, and Procedures for Combined Arms
Heavy Forces: Armored Brigade, Battalion Task Force, and Company Team.
30 September 1992.
FM 3-100.4 [FM 20-400]. Environmental Considerations in Military Operations.
15 June 2000.
FM 3-100.21 [FM 100-21]. Contractors on the Battlefield. 26 March 2000.
FM 4-0 [FM 100-10]. Combat Service Support. 03 October 1995.
FM 4-01 [FM 55-1]. Army Transportation. 3 October 1995.
Bibliography-2
___________________________________________________________________________Bibliography
FM 4-01.51 [FM 55-21]. Railway Operating and Safety Rules. 17 July 1989.
FM 4-93.1 [FM 63-1]. Support Battalions and Squadrons, Separate Brigades and
Armored Cavalry Regiment. 30 September 1993.
FM 4-100.2 [FM 100-10-2]. Contracting Support on the Battlefield. 4 August 1999.
FM 5-0 [FM 101-5]. Army Planning and Orders Preparation. 31 May 1997.
FM 5-19 [FM 100-14]. Risk Management. 23 April 1998.
FM 6-0 [FM 100-34]. Command and Control. To Be Published.
FM 6-02.7 [FM 24-7]. Tactical Local Area Network (LAN) Management.
8 October 1999.
JP 2-0. Doctrine for Intelligence Support to Joint Operations. 9 March 2000.
Bibliography-3
Index
Army tactical command and logistics package
A control system (ATCCS), (LOGPAC), 8-60 – 8-61
1-2, 2-41, 4-2 maintenance, 8-10, 8-55 –
actions on contact, 1-17 –
1-19, 3-17, 3-24, 3-40, 5-16 assembly area, 5-8 – 5-12 8-66
eight forms of contact, personnel support, 8-14,
1-16 – 1-17 B 8-76 – 8-85
advanced field artillery tactical battle command methodology, planning, 8-1, 8-13, 8-47,
data system, (AFATDS), 2-2 – 2-6 8-51 – 8-55
2-41, 2-43 battle handover, 5-32 reconstitution, 8-32, 8-46,
air and missile defense 8-91 – 8-93
squadron and above, 5-33
workstation (AMDWS), resupply operations,
squadron and below, 5-34
2-44 – 2-45 6-68 – 6-69, 8-46, 8-61,
battle tracking, C-5 – C-6 8-66
air defense, 1-22
battlefield operating systems, in stability and support
air defense artillery, 6-1, 6-106
1-20 – 1-23, 6-100. See also operations, D-28, D-38
active air defense, 6-107 intelligence, maneuver, fire
situational understanding,
command and control, support, air defense, mobility
8-1, 8-2, 8-7, 8-8, 8-9,
6-107 and survivability, combat
8-11 – 8-13
passive air defense, 6-106 service support, command
and control. support for attachments,
all source analysis system 8-61 – 8-62
(ASAS), 2-42, 6-93, 6-95,
support for detachments,
6-117 C
8-62
analysis and control team cavalry squadron (RSTA),
support for
(ACT), 2-17 1-1 – 1-2
reconnaissance
Army airspace command and missions, 1-6 – 1-8 operations, 8-53 – 8-54
control (A2C2), 6-21 – 6-30 organization, 1-3 – 1-6 support for security
Army aviation, 6-30, 6-36 close air support (CAS), 6-5 – operations, 8-54 – 8-55
air cavalry, 6-36 – 6-50 6-6, 6-17 – 6-20 trains, 8-13, 8-27, 8-44,
air-ground integration, collection management, C-1 – 8-45, 8-46 – 8-51
6-37 – 6-49, 6-53 – 6-60 C-4 transportation, 8-6, 8-8,
attack helicopter, 6-31 – COLT, 1-22 8-9, 8-14, 8-15, 8-17,
6-32, 6-50 – 6-60 combat service support, 1-23, 8-18, 8-19
assault and cargo 4-13 velocity of, 8-2, 8-6 – 8-11
helicopter, 6-32, 6-63 – brigade support battalion, combat service support control
6-74 8-3, 8-16 – 8-45 system (CSSCS), 2-45,
forward arming and classes of supply, 8-17, 8-12, 8-18, 8-44, 8-52, 8-53,
refueling point (FARP) 8-66 8-58, 8-67, 8-68, 8-72, 8-77,
operations, 6-71 – 6-74 8-79, 8-81
combat health support,
missions, 6-34 – 6-35 8-15, 8-85 – 8-91 combat support. See
joint air attack team intelligence (and electronic
convoy survivability, 8-54, warfare), fire support, target
operations, 6-20 – 6-21 8-62 acquisition, Army aviation,
Army battle command system essential functions, 8-14 – signal support, Army
(ABCS), 1-21, 2-41, 6-89, 8-15 airspace command and
6-97 control (A2C2), engineer
field services, 8-75 – 8-76
force agility, 8-2, 8-3 – 8-6
Index-1
FM 3-20.96_______________________________________________________________________________
support, air defense, air compliance inspection. See Force XXI Battle Command
defense artillery. stability operations and Brigade and Below
command and control (C2), support operations. (FBCB2), 1-2, 2-41 – 2-42,
1-3, 1-23, 2-1, 2-7, 2-30, computers, 2-40 – 2-48 4-2, 6-25
2-38, 4-13 contact paradigm, 1-15 – 1-19 forward area air defense
Air Force, 6-27 – 6-28 command, control,
contiguous operations, 1-14,
communications, and
Army airspace, 2-24 1-15
intelligence system
command group, 1-4, counterreconnaissance, 4-2, (FAADC3I), 2-44
2-12 – 2-13 4-7, 5-17
fratricide, 5-19, 5-23, 5-57, B-1,
digital systems, 2-14, 2-47 B-7 – B-13, H-17
global C2 system-Army D
(GCCS-A), 2-41 decontamination. See nuclear, G
information management, biological, chemical (NBC).
global combat service support-
2-8 – 2-10 defensive operations, 1-8, Army (GCSS-A), 8-12, 8-52
role of the commander, 1-13, 1-20, 4-1, 4-2, 4-26,
global command and control
2-6, 2-13 4-27, 5-23, 5-32, 6-16 –
system–Army (GCCS-A),
command post, 2-6, 2-11, 6-17, G-33
2-41
2-17 – 2-26, 6-26 – 6-27 deployment, E-1
graphic control measures, 2-3,
battle drills, H-5 – H-6 airlift operations, E-4 – 2-44, 5-48 – 5-49
battle update brief, H-2, E-14
ground sensor platoon, 1-1,
H-5 movement, E-2 – E-3 1-6, G-1, G-10 – G-34
combat trains, 2-27 – 2-28 predeployment activities, ground surveillance radar, 1-7,
command, control, E-2 3-28, 3-37, 3-42, 4-5, 4-8,
communications, and reception, staging, onward 4-11, 4-14, 4-19, 4-20, 4-31,
computers (C4) movement, and G-1, G-15, G-16 – G-24
architecture, H-1, H-12 integration, (RSOI),
communications, E-3 – E-4 H
2-31 – 2-39
human intelligence (HUMINT),
deployment operations, E 1-2, 3-2, 3-11, 3-37
H-11 – H-12 engineer support, 3-37, 3-38,
displacing, H-2, H-3 – H-4 3-40, 4-9, 4-13, 4-27, 4-30, I
field trains, 2-29, H-10 4-32, 6-1, 6-99 – 6-106
infrastructure, 3-8 – 3-9
positioning, H-1 – H-2 environmental protection, I-1
improved remotely monitored
recce troop, 2-30 risk assessment
battlefield sensor system
worksheet, I-3 – I-6
responsibilities, 2-32 (IREMBASS), 1-17, 3-28,
risk management process, 4-5, 4-8, 4-11, 4-19, 4-20,
SBCT CP organization,
I-1 – I-3 G-1, G-15, G-16 – G-17,
H-6 – H-8
exfiltration, 5-16 – 5-17 G-24 – G-34
security, H-1, H-2 – H-3
infiltration, 5-12 – 5-16
shift change briefing, H-4 –
H-5 F intelligence, 1-21, 6-1, D-17.
fire support, 1-21, 5-50, 6-1 See also human intelligence.
SOP, H-2, H-13 – H-18
assets and capabilities, and electronic warfare
squadron CP organization, (EW), 6-84
H-6, H-10 6-3 – 6-7
components, 6-4 military intelligence
surveillance troop, company, 6-90 – 6-98
2-30 – 2-31, H-10 planning, coordination,
execution, 6-13 – 6-17 intelligence preparation of the
tactical, 2-14 – 2-16 battlefield (IPB), 1-16, 1-17,
common ground station (CGS), fire support coordinator 1-19, 1-20, 2-1, 2-19, 2-20,
6-95, 6-96 (FSCOORD), 6-23 2-21, 3-5, 3-6, 3-9, 3-10,
communications, 2-31 – 2-40 fire support team (FIST), 5-12 3-11, 3-23, 3-25, 3-37, 3-46,
Index-2
_____________________________________________________________________________________Index
4-16, 5-29, 5-40, 5-41, 5-52, RQ-1A Global Hawk 1-2, 2-9, 3-10, 3-12, 3-13,
A-1, A-4 – A-6 unmanned aerial 3-18, 3-39, 3-41, 4-4, 4-7,
intelligence, surveillance, and vehicle, (UAV), F-10 – 4-8, 4-28,
reconnaissance (ISR), 1-2, F-11 mobility and survivability, 1-22,
1-3, 1-7, 1-9, 1-11, 1-12, secret internet protocol 4-13
1-15, 1-17 – 1-20, 2-1, 2-5, router network, F-5 mortar section, 1-5
2-6, 2-9, 2-13, 2-15, 2-19, systems architecture, movement, 5-2 — 5-4
2-20, 3-1, 3-2, 3-3, 3-5, 3-8, F-1 – F-2
3-11, 3-12, 3-19, 3-25, 3-26, planning, 5-4 – 5-8
tactical exploitation of
3-31, 3-32, 3-33, 3-36, 3-43, tactical, 5-2 – 5-7. See
national capabilities,
3-44, 3-46, 3-47, 4-4, 4-16, also tactical roadmarch.
(TENCAP), F-4
4-27, 4-28
Teammate, AN/TRQ-32A
intelligence systems N
(V) 2, F-25 – F-26
airborne reconnaissance national and joint intelligence
Trackwolf, AN/TSQ-152,
low (ARL), aircraft, assets, 6-117 – 6-128
F-12 – F-13
F-9 – F-10
Trailblazer, AN/TSQ-114, CIA, 6-120
commander’s tactical
F-23 – F-25 DoD, 6-120 – 6-125
terminal, AN/TSC-125,
F-27 – F-28 TROJAN SPIRIT II, F-17 – non-defense intelligence
F-20 elements, 6-125 –
common ground station
(CGS), F-15 – F-17 U-2 reconnaissance 6-128
aircraft, F-7 noncontiguous operations,
E-3 Sentry airborne
warning and control 1-14, 1-15, 2-39, 5-58 – 5-59
system (AWACS), F-5 – J nonlinear operations, 1-14
F-6 joint surveillance and target nuclear, biological, chemical
electronic processing and attack radar system (NBC) operations, 5-40 –
dissemination system (JSTARS), 3-41, 3-45, 4-4, 5-47, 6-1, 6-98 – 6-99
(EPDS), F-20 4-12, 6-117, F-8 – F-9 actions after NBC attack,
enhanced tactical unit 5-46 – 5-47
terminal (ETUT), F-22 L actions before NBC attack,
enhanced Trackwolf, 5-44 – 5-45
linear operations, 1-14
AN/TSQ-199, F-13 actions during NBC attack,
linkup, 5-17 – 5-23
global broadcast service 5-45 – 5-46
(GBS), F-3 – F-4 local area network (LAN), 2-46
decontamination, 5-43,
ground station module 5-46 – 5-47, 6-98
(GSM), F-13 – F-15 M defense, 5-42 – 5-43
Guardrail common sensor major theater of war (MTW), platoon, 1-6
(GR/CS), F-21 – F-22 1-2, 1-12, 3-6, 3-7, 3-13,
reconnaissance, 5-40 –
imagery processing and 3-14, 3-18, 3-40, 4-5, 4-7,
5-42
dissemination system 4-30, 4-31
reconnaissance and
(IPDS), F-23 maneuver, 1-21
security, 5-32
joint surveillance target maneuver control system
reconnaissance platoon,
attack radar system (MCS), 2-42, 3-25, 3-28,
5-43, G-34 – G-35
(JSTARS), F-8 – F-9 3-29, 4-17
reconnaissance system
mobile integrated tactical military decision-making
(NBCRS), 5-40 – 5-42
terminal, AN/TSQ-2000, process (MDMP), 1-16, 2-4,
F-26 – F-27 2-5, 2-15, 3-14, 3-26, 4-16,
Quickfix, AN/ALQ-151(V)2, 6-9, 6-10 —6-11, A-1 – A-3, O
F-26 A-6 – A-16 observation and fields of fire,
RC-135V/W RIVET JOINT mission, enemy, terrain, troops cover, obstacles, key terrain,
aircraft, F-6 – F-7 and support available, time and avenues of approach
available, and civil (OCOKA), 3-9
considerations (METT-TC),
Index-3
FM 3-20.96_______________________________________________________________________________
obstacle breaching operations, operations, 6 43, G-15, 3-40, 4-5, 4-7, 4-30, 5-52,
4-16, 5-51 – 5-58 G-23 5-58
offensive operations, 1-8, 4-1, pull, 1-20 society, 3-6 – 3-8
4-2, 4-23, 4-26, 4-27, 4-32, push, 1-19 stability operations, 3-15, D-1 –
5-22, 5-23, 5-32, 6-15 – D-3. See also stability
route, 3-37 – 3-38
6-16, G-13, G-33 operations and support
sensor, 3-19 – 3-20
operational environment, operations.
1-10 – 1-20, 3-3 – 3-5 tempo, 3-14, 3-16, 3-33
considerations for, D-8 –
orders, 2-5 zone, 3-20 – 3-29 D-9
FRAGO, A-39 rehearsals, 3-44, 4-17 types of, D-3 – D-8
OPORD, A-17 – A-18, relief operations, 5-23 – 5-27 stability operations and support
A-19 – A-35, B-10 – relief in place, 5-24 – 5-26 operations, 3-3, 3-5 – 3-7,
B-13 retrograde operations, 4-1, 3-9, 3-10, 3-13, 3-14, 3-17,
WARNO, A-19 5-27 – 5-32 3-40, 5-52, 5-58, 6-17, G-16,
G-23, G-33 – G-34
risk management, B-1 – B-6
P compliance inspections,
river crossing, 5-48 – 5-51 D-29
passage of lines, 5-32 – 5-39 rules of engagement (ROE), CSS considerations, D-20
PROPHET, 1-7, 1-17, 3-37, 1-11, 3-15, 3-34, 6-11, D-9,
4-8, 4-11, 4-19, G-1, G-13 – D-17 – D-18 force protection, D-1, D-20
G-16 rules of interaction (ROI), D-16, intelligence, D-17
D-19 – D-20 joint military commission
R meeting, D-29 – D-33
readiness condition S media considerations,
(REDCON), 5-8 D-21, D-35 – D-37
security drill, 4-8, 4-17
recce troop, 1-5 minefield clearance,
security operations, 4-1 – 4-5,
reconnaissance, 6-104 – 6-105 D-38 – D-40
4-7, 6-43, 6-105, G-16, G-23
and security, 2-31, 3-1, planning and preparation,
security missions, 1-6, 4-2
4-26, 4-27, 5-25 – 5-26 D-16 – D-20
area security, 4-3, 4-26 –
and surveillance (R&S), react to civil disturbance,
4-29
2-26, 3-43, 3-46, 4-2, D-33 – D-35
5-41 convoy security, 4-3,
squadron tasks, D-23 –
4-32 – 4-35
aerial, 3-19. See also D-40
unmanned aerial cover, 4-2
squadron’s role in, D-15 –
vehicle (UAV). fundamentals, 4-3 – 4-5 D-40
area, 3-29 – 3-37 guard, 4-2 soldiers’ responsibilities,
command push, 1-19 – high-value asset, 4-3, D-21 – D-22
1-20 4-26 – 4-29 Stryker brigade combat team
commander’s essential route, 4-3, 4-29 – 4-32 (SBCT), 1-1 – 1-2, 1-8 –
guidance, 3-14 – 3-18 screen, 4-2, 4-9 – 4-25 1-10, 3-11, 3-24, 3-29,
dismounted, 3-18 3-31 – 3-37, 3-43, 6-1,
signal support, 6-110 –
6-84 – 6-98
engagement criteria, 6-117
3-16 – 3-18, 3-33 support operations, D-9 –
situational awareness, 1-2, 2-3,
D-15. See also stability
focus, 3-6 – 3-9, 3-14, 3-2, 4-1
operations and support
3-15, 3-33 situational understanding, 1-2, operations.
fundamentals of, 3-10 – 1-3, 1-8, 1-10, 2-3, 3-2, 8-1,
characteristics of, D-10
3-13 8-2, 8-7, 8-8, 8-9,
8-11 – 8-13 considerations for, D-14 –
handover, 3-42 – 3-50 D-15
missions, 1-6 smaller-scale contingency
(SSC), 1-2, 1-13, 3-6, 3-7, forms of, D-11 – D-14
mounted, 3-18 – 3-19 3-9, 3-13, 3-14, 3-15, 3-17, types of, D-10 – D-11
multidimensional, 3-5
Index-4
_____________________________________________________________________________________Index
Index-5
FM 3-20.96
23 DECEMBER 2002
ERIC K. SHINSEKI
General, United States Army
Chief of Staff
Official:
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
0307710
DISTRIBUTION:
Active Army, Army National Guard, and US Army Reserve: To be distributed in accordance with the
initial distribution number 115891, requirements for FM 3-20.96.
PIN: 080700-000