12.12.2012 Views

FM 3-19.4 - Army Electronic Publications & Forms - U.S. Army

FM 3-19.4 - Army Electronic Publications & Forms - U.S. Army

FM 3-19.4 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>FM</strong> 3-<strong>19.4</strong><br />

• Evacuation procedures if the protected person is<br />

attacked and the threat cannot be immediately<br />

reduced.<br />

• Control measures such as designated checkpoints.<br />

• Crowd control measures.<br />

• Alternate routes.<br />

• Emergency MEDEVAC procedures.<br />

• Emergencyactionstobetakenintheeventofan<br />

ambush or indirect fire.<br />

6-261. Depending on the threat level, selected members<br />

of the security team are armed with a M4, a M16, or a<br />

M203. When dismounted with the protected person, they<br />

provide standoff security out to the maximum effective<br />

range of their weapons. Shotguns should be considered<br />

shotguns if there is a threat of attack in a congested area<br />

where there is danger of injuring innocent persons if<br />

long-range weapons were used. Members of the team<br />

that are selected to physically escort the protected<br />

person should be armed with sidearms only. This allows<br />

them to have both hands free to react to close-in threats.<br />

6-262. The security plan must be flexible to allow for<br />

itinerary and weather changes and mechanical failures.<br />

Once the platoon leader has finalized the security plan,<br />

he assembles the security team and conducts detailed<br />

rehearsals.<br />

Security During the Visit<br />

6-263. Protection may be accomplished by establishing a<br />

series of protective cordons around the protected person.<br />

The protective measures used must allow the person<br />

freedom of movement and must not interfere with the<br />

conduct of his duties. Irritating conduct must be avoided<br />

at all times.<br />

Area Security 6-87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!