1966 US Army Vietnam War ARMOR ... - Survival Books

1966 US Army Vietnam War ARMOR ... - Survival Books 1966 US Army Vietnam War ARMOR ... - Survival Books

survivalebooks.com
from survivalebooks.com More from this publisher
12.07.2015 Views

WWW.SURVIVALEBOOKS.COMground and air surveillance efforts of armor tening posts, and patrols are established tounits.provide continuous and systematic observation.c. Tactical Air Force units may provide air A surveillance force is not usually capable ofreconnaissance and surveillance support to as- offering strong resistance to the enemy; howsistarmor units performing surveillance mis- ever, it must be capable of protecting itself.sions.Air cavalry units are integrated into and extendthe surveillance capabilities of ground88. Surveillance Operations units. When air cavalry units are performingWhen planning surveillance operations, the surveillance missions forward of the FEBA,factors of METT will govern the organization commanders must give careful consideration toand disposition of forces. Since surveillance enemy antiaircraft capabilities, due to the conusuallyconsists of systematic and continuous tinuous operation of the aircraft in enemy terobservationof large areas, long routes, or sev- ritory.eral specific locations, armor units normallycommit the bulk of their forces to performing 89. Night Surveillanceobservation while retaining a small reserve to Surveillance by armor units normally is lessassist elements that may be attacked by enemy effective at night. Observation is limited to theforces. Ground armored units performing a range of organic radar and infrared equipsurveillancemission will usually operate in ment. Use of patrols and listening posts is inrearareas, areas adjacent to the FEBA, or creased. Air cavalry is limited to photographyprovide dismounted elements which will be air- unless other night vision equipment is mountedlifted into areas forward of the FEBA. Sur- on the aircraft. Support from Army aviationveillance missions are conducted in a manner or Air Force units whose aircraft mount insimilarto that of a screening force or a rear frared and radar equipment is usually reareasecurity operation. Observation posts, lis- quired.Section III.SECURITY OPERATIONS90. General from the accomplishment of the mission of thea. Security includes all measures taken by aforce being secured.command to protect itself from espionage, ob- c. FM 17-36 contains the detailed proceservation,sabotage, annoyance, or surprise. Its dures and techniques for conducting securitypurpose is to preserve secrecy and to gain and operations.maintain freedom of action.91. Security Against Ground Actionb. Security is achieved by effectively provid- Ground threats to the security of a commanding for the detection of a threat; for sufficient include reconnaissance, fire, attack by groundtime and maneuver space to react to the forces, infiltration, guerrilla forces, partisans,threat; and for the avoidance, neutralization, and airmobile and airborne forces. Securityor destruction of the threat. Security is im- forces must use terrain and obstacles to augprovedby timely and accurate intelligence and ment their security efforts. Security againstrapid, aggressive movement. All units are re- ground attack is provided by air and groundsponsible for their own security, regardless of reconnaissance; covering, guard, and screeningthe security provided by other units. A securi- force; and local security elements. Covering,ty force for a larger formation must be strong guard, and screening missions may be preenough,and properly located, to provide ade- formed to the front, flank, or rear of a friendlyquate time for the force being secured to react. force. Size and composition of security forcesWithin their capabilities, security forces will are dependent upon the factors of METT.engage the enemy as necessary to accomplish Against a highly mobile enemy, strong in artheirmission. However, security measures mor, security forces must possess equal ormust not unnecessarily divert forces or effort greater mobility and have adequate antitank49

WWW.SURVIVALEBOOKS.COMcapabilities. In any case, security forces must maintained until the enemy ceases to be abe afforded the capability of effective opera- threat to the force being secured or moves outtions under the same conditions as the enemy of the assigned area of responsibility. For disforcethat poses the threat.cussion for actions on contact, see paragraph71. Contact is not voluntarily broken unless or-92. Fundamentals of Security Operations dered by higher headquarters. Enemy forcesAlthough the fundamentals of security are must not be permitted to surprise the force becloselyrelated, the provision of timely and ac- ing secured. If the enemy force moves out ofcurate warning and space for maneuver is the area of responsibility, action must be takenparamount. The actions of security forces to inform the adjacent unit and to assist in esshouldbe guided by the practical application of tablishing contact with the enemy force.these fundamentals through the effective use of 93. Frontages in Security Operationsavailable resources.a. Provide Timely and Accurate Warning. The extent of the frontage assigned in secu-The security force must provide the com- rity operations depends on several factors, inmanderof the force being secured early warningef the location and movement of enemycluding the degree of security desired, thelength of time the security is required, the enforcesthat constitute a threat to his mission. emy capabilities, the terrain (with emphasis onOnly by timely warning and accurate informa- avenues of enemy approach), and the weather.tion can the commander of the force being se-WiderWcderfrontagesfrontagesmaymaybebeassignedassignedwhenwhenair-acured choose the forces, time, and place to engagethe enemy, and maneuver his forces to 94. Degrees of Securitygain tactical surprise and advantage.a. Cover. To cover is to operate as a forceb. Provide Space for Maneuver. Security apart from the main force and oriented in theforces operate far enough from the force being direction of the enemy for the purpose of intersecuredto insure that this force has enough cepting, engaging, delaying, disorganizing, andtime and space to maneuver to meet or avoid deceiving the enemy before he can attack thethe enemy threat. The distance between a secu- force being covered.rity force and the force being secured varies b. Protect. To protect is to operate to theaccording to the factors of METT.flank, front, or rear of a larger moving or stac.Orient on the Location or Movement ofthe Force Being Secured. A security force mationaryforce in a manner that precludes en-emy ground observation, direct fire, and surneuversaccording to the location and move- prise attack. This is done by defeating,ment of the force being secured, and positionsitself between the friendly force and thedestroying, or delaying the enemy within theprotecting force's capabilities.known or suspected enemy threat.c. Screen. To screen is to maintain surveild.Perform Continuous Reconnaissance. Allsecurity forces must perform continuous andlance to the front, flank, or rear of a moving orstationary force, and to provide early warningaggressive reconnaissance. The reconnaissance to this force by observing, reporting, andprovides the security force commander with in- maintaining contact with enemy forces encounformationof enemy forces in his area of re- tered. The screening force will, within its capasponsibilityand enables him to properly posi- bility, impede and harass the enemy by organiction the security force in relation to the force and supporting fires and destroy or repel enbeingsecured and the enemy threat. Recon- emy patrols.naissance provides security from surprise bykeeping the commander of the force being se- 95. Security Forcescured informed of enemy locations and move- A security force may be a covering force,ments, and by maintaining contact with enemy guard force, screening force, or a rear area seforcesthat constitute a threat.curity force, according to the degree of securitye. Maintain Enemy Contact. Once contact required and to its location in relation to thewith the enemy has been gained, it must be force being secured (fig. 3). It may engage in50

WWW.SURVIVALEBOOKS.COMcapabilities. In any case, security forces must maintained until the enemy ceases to be abe afforded the capability of effective opera- threat to the force being secured or moves outtions under the same conditions as the enemy of the assigned area of responsibility. For disforcethat poses the threat.cussion for actions on contact, see paragraph71. Contact is not voluntarily broken unless or-92. Fundamentals of Security Operations dered by higher headquarters. Enemy forcesAlthough the fundamentals of security are must not be permitted to surprise the force becloselyrelated, the provision of timely and ac- ing secured. If the enemy force moves out ofcurate warning and space for maneuver is the area of responsibility, action must be takenparamount. The actions of security forces to inform the adjacent unit and to assist in esshouldbe guided by the practical application of tablishing contact with the enemy force.these fundamentals through the effective use of 93. Frontages in Security Operationsavailable resources.a. Provide Timely and Accurate <strong>War</strong>ning. The extent of the frontage assigned in secu-The security force must provide the com- rity operations depends on several factors, inmanderof the force being secured early warningef the location and movement of enemycluding the degree of security desired, thelength of time the security is required, the enforcesthat constitute a threat to his mission. emy capabilities, the terrain (with emphasis onOnly by timely warning and accurate informa- avenues of enemy approach), and the weather.tion can the commander of the force being se-WiderWcderfrontagesfrontagesmaymaybebeassignedassignedwhenwhenair-acured choose the forces, time, and place to engagethe enemy, and maneuver his forces to 94. Degrees of Securitygain tactical surprise and advantage.a. Cover. To cover is to operate as a forceb. Provide Space for Maneuver. Security apart from the main force and oriented in theforces operate far enough from the force being direction of the enemy for the purpose of intersecuredto insure that this force has enough cepting, engaging, delaying, disorganizing, andtime and space to maneuver to meet or avoid deceiving the enemy before he can attack thethe enemy threat. The distance between a secu- force being covered.rity force and the force being secured varies b. Protect. To protect is to operate to theaccording to the factors of METT.flank, front, or rear of a larger moving or stac.Orient on the Location or Movement ofthe Force Being Secured. A security force mationaryforce in a manner that precludes en-emy ground observation, direct fire, and surneuversaccording to the location and move- prise attack. This is done by defeating,ment of the force being secured, and positionsitself between the friendly force and thedestroying, or delaying the enemy within theprotecting force's capabilities.known or suspected enemy threat.c. Screen. To screen is to maintain surveild.Perform Continuous Reconnaissance. Allsecurity forces must perform continuous andlance to the front, flank, or rear of a moving orstationary force, and to provide early warningaggressive reconnaissance. The reconnaissance to this force by observing, reporting, andprovides the security force commander with in- maintaining contact with enemy forces encounformationof enemy forces in his area of re- tered. The screening force will, within its capasponsibilityand enables him to properly posi- bility, impede and harass the enemy by organiction the security force in relation to the force and supporting fires and destroy or repel enbeingsecured and the enemy threat. Recon- emy patrols.naissance provides security from surprise bykeeping the commander of the force being se- 95. Security Forcescured informed of enemy locations and move- A security force may be a covering force,ments, and by maintaining contact with enemy guard force, screening force, or a rear area seforcesthat constitute a threat.curity force, according to the degree of securitye. Maintain Enemy Contact. Once contact required and to its location in relation to thewith the enemy has been gained, it must be force being secured (fig. 3). It may engage in50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!