Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 4<br />
Convoy security (within capabilities).<br />
Route security.<br />
High-value asset security.<br />
Fixed site security.<br />
Checkpoint security.<br />
Downed aircraft recovery team security.<br />
AREA SECURITY PROCEDURES<br />
4-60. When conducting an area security mission, the DRT prevents threat ground reconnaissance elements<br />
from directly observing friendly activities within the area being secured. It prevents (within capabilities)<br />
threat ground maneuver forces from penetrating the defensive perimeters. The commander has his<br />
subordinate platoons employ a variety of techniques such as OPs, BPs, ambushes, and combat outposts to<br />
accomplish this security mission. A reserve or QRF enables him to react to unforeseen contingencies.<br />
Using the intelligence acquisition capability available to the squadron and IBCT, the DRT can execute<br />
ambushes and preemptive strikes with greater precision.<br />
4-61. METT-TC determines required augmentation for the DRT. Particular consideration is given to the<br />
need for aviation, maneuver forces, engineers, and artillery. Early warning of threat activity is paramount in<br />
area security missions and provides the commander with time and space to react to threats. Proper<br />
planning, coupled with patrols and aerial reconnaissance, is critical to successful operations, especially in<br />
securing fixed sites. Failure to conduct continuous reconnaissance can create a vulnerable seam within<br />
which the threat can execute an infiltration or attack.<br />
4-62. A perimeter or combat outpost is established when a unit must secure an area where the defense is<br />
not tied into an adjacent unit. Combat outpost vary in shape and distribution of assets based on the results<br />
of IPB and METT- TC. A most probable direction of attack may require extra “weighting” of that portion<br />
of the perimeter to defeat attack or infiltration. METT-TC variables may require that one platoon mans the<br />
combat outpost while the other platoon conducts other security missions. The platoon should rotate<br />
between COP defense/maintenance/sleep/rest and the other mission on a random schedule.<br />
4-63. The combat outpost is typically divided into platoon AOs with boundaries and contact points if the<br />
DRT has no other missions to conduct. A screen is established, integrating OPs, ground-based sensors,<br />
SUASs, HUMINT, and patrols. Organic or attached (a section from a weapons company), antiarmor<br />
weapon systems are emplaced to orient on high-speed avenues of approach. Ground-based sensors and<br />
SUASs provide overlapping reconnaissance capabilities at extended distances from the perimeter.<br />
4-64. Most circumstances will not permit establishment of defined, neat perimeters. When a perimeter is<br />
not feasible, the troop secures the area by establishing a presence and conducting reconnaissance operations<br />
throughout the area. Platoons can establish perimeters around base camps, critical infrastructure, and highvalue<br />
assets, while other units conduct operations to establish presence, provide security, and assist stability<br />
operations. The troop can also position reaction forces or disperse its reserve between several secured<br />
perimeters. Other missions or tasks in support of area security may include the following:<br />
Screens along zones of separation or other designated areas.<br />
Route security of critical LOCs.<br />
Checkpoint operations to monitor or control movement.<br />
Patrolling between secured perimeters.<br />
Demonstrations to maintain an observable presence.<br />
4-16 ATTP 3-20.97 16 November 2010