09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4<br />

Engineer Support to Security Operations<br />

Strategy is the art of making use of time and space. Space we can recover; lost time, never.<br />

—Napoleon Bonaparte<br />

The BCT conducts security operations to provide early and accurate warnings of<br />

threat operations, to provide the force being protected with time and maneuver space<br />

within which to react to the threat, and to develop the situation to allow the<br />

commander to effectively use the protected force. BCT units perform their security<br />

operations as an organization or with reinforcements (engineer units). Security<br />

operations are typically shaping operations and are an essential part of all offensive<br />

and defensive operations. Each of the three primary forms of security operations<br />

(screen, guard, and cover) provide differing levels of protection and early warning to<br />

the force or facility for which they are providing security. The type and level of<br />

engineer support also varies for each form of security operations. (Refer to<br />

<strong>FM</strong> 3-20.96, <strong>FM</strong> 3-90, and <strong>FM</strong> 3-90.6 for more information on security operations in<br />

the BCT.)<br />

OPERATIONS<br />

4-1. Security is essential to protect and conserve combat power. Security operations are conducted by a<br />

military unit, an activity, or an installation to protect itself against all acts designed to (or that may) impair<br />

its effectiveness. Security operations are inherent in every military operation. The purpose is to deny the<br />

enemy knowledge of what the friendly force is doing. Security may be achieved by establishing protective<br />

measures or by conducting deception operations that confuse and dissipate enemy attempts to interfere<br />

with the force being secured. Effective security prevents the enemy from gaining an unexpected advantage<br />

over friendly forces. Each commander is responsible for the security of his force. Security operations orient<br />

on friendly forces and focus on providing BCT forces reaction time, maneuver space, and protection.<br />

When properly task-organized, augmented, and supported, various elements assigned to or supporting a<br />

BCT may perform security operations.<br />

4-2. The modular BCT design added an RS to each BCT to serve as the BCT commander’s eyes and ears,<br />

with reconnaissance as its primary role. The current patterns of operations stress fighting noncontiguous<br />

battles over a larger AO. Battalions operate farther apart, presenting significant gaps on the battlefield.<br />

Given these conditions, the RS is called upon with increased frequency to perform security missions.<br />

Because the RS lacks organic engineers, augmentation may be required from EAB. However, organic<br />

engineer forces within the BCT may be task-organized internally to support the RS, but this requires<br />

commanders to accept a level of risk. Engineers in this role provide assured mobility to the RS (security<br />

force) through M/CM/S and geospatial support.<br />

4-3. Security operations consist of five fundamentals that engineers supporting the security force must<br />

understand. (See <strong>FM</strong> 3-20.96, <strong>FM</strong> 3-90, and <strong>FM</strong> 3-90.6 for further details on these fundamentals.) The five<br />

fundamentals for security operations are—<br />

� Provide early and accurate warning.<br />

� Provide reaction time and maneuver space.<br />

� Orient on the force, area, or facility to be protected.<br />

� Perform continuous reconnaissance.<br />

� Maintain threat contact.<br />

11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> 4-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!