13.07.2015 Views

FMI 3-34.119 - Soldier Support Institute - U.S. Army

FMI 3-34.119 - Soldier Support Institute - U.S. Army

FMI 3-34.119 - Soldier Support Institute - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Military Search• Potential VBIED (buses or trucks) should be restricted access and off-base trans-load yardsshould be used.• Procedures. Operating procedures should be integrated so that all processes are thorough,quick, and done with some degree of redundancy.• Defense in depth. Defense in depth is the repeated use engagement zones.• Threat mitigation.• Host nation police. HN police screen initial traffic.• Authorized vehicles moving to U.S. controlled zone. The driver and passengers move to theidentification and search area. The vehicle is searched without the driver or passengerobserving. Explosive detection dogs are used.• Cleared traffic. Cleared traffic continues through the ECP.PERSONNEL AND VEHICLE SEARCHF-11. A personnel and vehicle search includes―• Using the two man rule when searching personnel (one searching and one covering).• Using a separate search area from the holding area (allow for reaction).• Removing and searching (separately) bulky clothing.• Being thorough (occasionally test yourselves).• Using the presence of an interpreter.• Augmenting searches with handheld wands detectors, explosive sensors, and dogs.• Allowing no locals to observe the vehicle being searched, if possible.F-12. A variety of information sources should be used, including imagery assets, to establish predictablepatterns the enemy will use when emplacing IEDs and ensure that it is updated daily. The enemy routinelyreuses the site of previously successful IED attacks. To deny enemy emplacement of additional IEDs inthis location, units must plan for the use of ISR assets to either capture or destroy enemy personnelemplacing the IEDs. These areas would become a NAI.F-13. The latest HUMINT obtained from either MI or local nationals should be used. It is important toensure that the information has been properly filtered to determine its reliability.F-14. The most effective way to enhance security within the AOR in relation to the IED threat is to denythe enemy the opportunity to emplace IEDs. There are a variety of activities units can incorporate toaccomplish this. Units must develop a good relationship and means of communicating with the localcommunity so community members feel comfortable providing the unit with information. Examplesinclude IO and techniques (such as advertising telephone numbers to report enemy activity within the areaor to report locations of potential IED making materials) and media announcements and communications inthe local dialects. When this information is provided, it is imperative that the unit ensures that the source ofinformation remains anonymous. Unit HUMINT personnel should be consulted regarding the properhandling of information and the protection of sources.F-15. Regular sweeps of an AO should be conducted to reduce the availability of bomb-making materials.This becomes necessary to reduce the amount of military explosives or ordnance.F-16. Coordination with HN military or police forces can provide the unit with an increased HUMINTcapability, local credibility, additional insight into the community, and so forth. Caution must be taken toensure that operations security (OPSEC) is not compromised.F-17. Methods of interdicting enemy activity include conducting presence patrols, observation points, andcheckpoints. These methods deny the enemy access to key terrain for IED emplacement.Counter-IED-ambush teams and scout sniper teams can be employed to interdict or kill the enemy.21 September 2005 <strong>FMI</strong> 3-<strong>34.119</strong>/MCIP 3-17.01 F-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!