FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 4<br />
Engineer Support to Security Operations<br />
Strategy is the art of making use of time and space. Space we can recover; lost time, never.<br />
—Napoleon Bonaparte<br />
The BCT conducts security operations to provide early and accurate warnings of<br />
threat operations, to provide the force being protected with time and maneuver space<br />
within which to react to the threat, and to develop the situation to allow the<br />
commander to effectively use the protected force. BCT units perform their security<br />
operations as an organization or with reinforcements (engineer units). Security<br />
operations are typically shaping operations and are an essential part of all offensive<br />
and defensive operations. Each of the three primary forms of security operations<br />
(screen, guard, and cover) provide differing levels of protection and early warning to<br />
the force or facility for which they are providing security. The type and level of<br />
engineer support also varies for each form of security operations. (Refer to<br />
<strong>FM</strong> 3-20.96, <strong>FM</strong> 3-90, and <strong>FM</strong> 3-90.6 for more information on security operations in<br />
the BCT.)<br />
OPERATIONS<br />
4-1. Security is essential to protect and conserve combat power. Security operations are conducted by a<br />
military unit, an activity, or an installation to protect itself against all acts designed to (or that may) impair<br />
its effectiveness. Security operations are inherent in every military operation. The purpose is to deny the<br />
enemy knowledge of what the friendly force is doing. Security may be achieved by establishing protective<br />
measures or by conducting deception operations that confuse and dissipate enemy attempts to interfere<br />
with the force being secured. Effective security prevents the enemy from gaining an unexpected advantage<br />
over friendly forces. Each commander is responsible for the security of his force. Security operations orient<br />
on friendly forces and focus on providing BCT forces reaction time, maneuver space, and protection.<br />
When properly task-organized, augmented, and supported, various elements assigned to or supporting a<br />
BCT may perform security operations.<br />
4-2. The modular BCT design added an RS to each BCT to serve as the BCT commander’s eyes and ears,<br />
with reconnaissance as its primary role. The current patterns of operations stress fighting noncontiguous<br />
battles over a larger AO. Battalions operate farther apart, presenting significant gaps on the battlefield.<br />
Given these conditions, the RS is called upon with increased frequency to perform security missions.<br />
Because the RS lacks organic engineers, augmentation may be required from EAB. However, organic<br />
engineer forces within the BCT may be task-organized internally to support the RS, but this requires<br />
commanders to accept a level of risk. Engineers in this role provide assured mobility to the RS (security<br />
force) through M/CM/S and geospatial support.<br />
4-3. Security operations consist of five fundamentals that engineers supporting the security force must<br />
understand. (See <strong>FM</strong> 3-20.96, <strong>FM</strong> 3-90, and <strong>FM</strong> 3-90.6 for further details on these fundamentals.) The five<br />
fundamentals for security operations are—<br />
� Provide early and accurate warning.<br />
� Provide reaction time and maneuver space.<br />
� Orient on the force, area, or facility to be protected.<br />
� Perform continuous reconnaissance.<br />
� Maintain threat contact.<br />
11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> 4-1