22.03.2013 Views

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security Operations<br />

Figure 4-5. Example of a DRT conducting area security<br />

4-65. Route security is a subset of area security. The purpose of route security is to prevent a threat from<br />

attacking, destroying, seizing, containing, impeding, or harassing traffic along the route. It also prevents the<br />

threat from interdicting traffic by emplacing obstacles on or destroying portions of the route. Route security<br />

operations are defensive in nature and, unlike screen operations, are terrain oriented.<br />

4-66. Threat forces will try to sever supply routes and LOCs by various methods. Roads, waterways, and<br />

railways may be mined or have IEDs emplaced along them; ambush sites can be located adjacent to the<br />

route being secured; or bridges and tunnels can be destroyed by demolitions. Because of the nature of this<br />

mission, very long routes may be extremely difficult to secure; however, measures can be enforced to<br />

reduce the effect of threat forces.<br />

SECURITY FORCE TASKS<br />

4-67. A route security force operates on and to the flanks of a designated route. To accomplish the route<br />

security mission, the DRT performs the following functions:<br />

Conducts dismounted reconnaissance of the route and key locations along it to ensure the route<br />

is trafficable. Mounted reconnaissance if augmented with vehicles.<br />

Conducts route clearance (task organized with attached engineers and other elements as<br />

required) at designated irregular intervals to prevent emplacement of threat mines and other<br />

explosive hazards along the route. (See FM 3-90.119.)<br />

Identifies sections of the route to search suspected threat locations.<br />

Establishes roadblocks/checkpoints along the route and lateral routes to stop and search vehicles<br />

and persons on the route and those entering the route. This may require augmentation from other<br />

units, such as an Infantry platoon.<br />

Occupies key locations and terrain along or near the route.<br />

Conducts ground and aerial reconnaissance/surveillance to maintain route security.<br />

Establishes OPs (covert/overt) or ambushes at critical points to watch for threat activity.<br />

Employs snipers to overwatch route for unusual activity, such as personnel attempting to plant<br />

an IED.<br />

ROUTE SECURITY METHODS<br />

4-68. The following discussion highlights two methods that the DRT can use in executing route security<br />

depending on the nature of the threat, purpose of the security mission, and characteristics of the route. The<br />

methods are as follows:<br />

16 November 2010 ATTP 3-20.97 4-17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!