09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4<br />

ENGINEER DUTIES<br />

4-21. The type and amount of engineer support for area security missions depends on METT-TC and may<br />

require extensive engineer augmentation. Engineer requirements may span a wide range of engineer tasks.<br />

Mobility support requirements may include clearing areas to be occupied of EH and other obstacles.<br />

Engineer countermobility efforts support establishing perimeters and checkpoints (integration of hasty<br />

protective obstacles for local unit security). The level of required protection determines the degree of<br />

survivability effort and the type and amount of engineer augmentation required. Organic and augmenting<br />

combat engineers can provide lower-end hardening (CCD through the construction of protective positions<br />

[earth berms, dug-in positions]). Augmentation with general engineer units may be required, especially in<br />

hardening existing structures or protecting critical infrastructure. (See <strong>FM</strong> 5-103 for more information on<br />

survivability and integrating protection into the operations process.)<br />

ROUTE SECURITY<br />

4-22. Route security is a subset of area security. The purpose of route security is to prevent a threat from<br />

attacking, destroying, seizing, containing, impeding, or harassing traffic along the route. It also prevents<br />

the threat from interdicting traffic by emplacing obstacles on or destroying portions of the route. Route<br />

security operations are defensive in nature and, unlike screen or guard operations, are terrain-oriented.<br />

4-23. Threat forces try to sever supply routes and LOCs by various methods. Roads, waterways, and<br />

railways may be mined; ambush sites may be located adjacent to the route being secured; or bridges and<br />

tunnels may be destroyed by demolitions. Because of the nature of this mission, long routes may be<br />

extremely difficult to secure; however, measures can be enforced to reduce the effect of threat forces on the<br />

routes.<br />

TASKS<br />

4-24. A route security force operates on and to the flanks of a designated route. Since most BCTs have<br />

only two maneuver battalions available for decisive operations, the RS may be used in an economy-offorce<br />

role to secure critical MSRs or other routes. To accomplish the route security mission, the force<br />

performs the following functions:<br />

� Conduct continuous mounted and dismounted reconnaissance of the route and key locations<br />

along it to ensure that the route is trafficable.<br />

� Conduct route clearance at irregular intervals to prevent the emplacement of EHs along the<br />

route.<br />

� Identify sections of the route to search suspected threat locations.<br />

� Establish roadblocks and checkpoints along the route and lateral routes to stop and search<br />

vehicles and persons on the route and entering the route.<br />

� Occupy key locations and terrain along or near the route. If possible, establish a screen that is<br />

oriented to prevent threat direct-fire weapons and observation from influencing the route.<br />

� Conduct ground and aerial patrols and surveillance aggressively to maintain route security.<br />

� Establish OPs (covert, overt) or ambushes at critical points to watch for threat activity.<br />

4-25. Route security is conducted by the following three methods:<br />

� Route reconnaissance. Subordinate units of the BCT conduct route reconnaissance at irregular<br />

intervals to avoid developing a pattern that the threat may exploit. Companies or troops<br />

reconnoiter the route, including conducting zone reconnaissance, to a designated distance to<br />

either flank. Attached aviation assets may reconnoiter in advance of ground troops or assist in<br />

screening the flanks. In addition to reconnaissance, BCT elements may escort engineers<br />

conducting route clearance, improvement, or maintenance; clearing terrain at chokepoints or<br />

other potential ambush sites; or repairing damage caused by threat actions.<br />

� Cordon security. Cordon security uses an economy-of-force technique to protect only critical<br />

sections along the route. The unit tasked to perform the mission establishes mutually supporting<br />

4-6 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!