FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 4<br />
ENGINEER DUTIES<br />
4-21. The type and amount of engineer support for area security missions depends on METT-TC and may<br />
require extensive engineer augmentation. Engineer requirements may span a wide range of engineer tasks.<br />
Mobility support requirements may include clearing areas to be occupied of EH and other obstacles.<br />
Engineer countermobility efforts support establishing perimeters and checkpoints (integration of hasty<br />
protective obstacles for local unit security). The level of required protection determines the degree of<br />
survivability effort and the type and amount of engineer augmentation required. Organic and augmenting<br />
combat engineers can provide lower-end hardening (CCD through the construction of protective positions<br />
[earth berms, dug-in positions]). Augmentation with general engineer units may be required, especially in<br />
hardening existing structures or protecting critical infrastructure. (See <strong>FM</strong> 5-103 for more information on<br />
survivability and integrating protection into the operations process.)<br />
ROUTE SECURITY<br />
4-22. Route security is a subset of area security. The purpose of route security is to prevent a threat from<br />
attacking, destroying, seizing, containing, impeding, or harassing traffic along the route. It also prevents<br />
the threat from interdicting traffic by emplacing obstacles on or destroying portions of the route. Route<br />
security operations are defensive in nature and, unlike screen or guard operations, are terrain-oriented.<br />
4-23. Threat forces try to sever supply routes and LOCs by various methods. Roads, waterways, and<br />
railways may be mined; ambush sites may be located adjacent to the route being secured; or bridges and<br />
tunnels may be destroyed by demolitions. Because of the nature of this mission, long routes may be<br />
extremely difficult to secure; however, measures can be enforced to reduce the effect of threat forces on the<br />
routes.<br />
TASKS<br />
4-24. A route security force operates on and to the flanks of a designated route. Since most BCTs have<br />
only two maneuver battalions available for decisive operations, the RS may be used in an economy-offorce<br />
role to secure critical MSRs or other routes. To accomplish the route security mission, the force<br />
performs the following functions:<br />
� Conduct continuous mounted and dismounted reconnaissance of the route and key locations<br />
along it to ensure that the route is trafficable.<br />
� Conduct route clearance at irregular intervals to prevent the emplacement of EHs along the<br />
route.<br />
� Identify sections of the route to search suspected threat locations.<br />
� Establish roadblocks and checkpoints along the route and lateral routes to stop and search<br />
vehicles and persons on the route and entering the route.<br />
� Occupy key locations and terrain along or near the route. If possible, establish a screen that is<br />
oriented to prevent threat direct-fire weapons and observation from influencing the route.<br />
� Conduct ground and aerial patrols and surveillance aggressively to maintain route security.<br />
� Establish OPs (covert, overt) or ambushes at critical points to watch for threat activity.<br />
4-25. Route security is conducted by the following three methods:<br />
� Route reconnaissance. Subordinate units of the BCT conduct route reconnaissance at irregular<br />
intervals to avoid developing a pattern that the threat may exploit. Companies or troops<br />
reconnoiter the route, including conducting zone reconnaissance, to a designated distance to<br />
either flank. Attached aviation assets may reconnoiter in advance of ground troops or assist in<br />
screening the flanks. In addition to reconnaissance, BCT elements may escort engineers<br />
conducting route clearance, improvement, or maintenance; clearing terrain at chokepoints or<br />
other potential ambush sites; or repairing damage caused by threat actions.<br />
� Cordon security. Cordon security uses an economy-of-force technique to protect only critical<br />
sections along the route. The unit tasked to perform the mission establishes mutually supporting<br />
4-6 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009