Security Flashcards
Principals of control
Rule of Law Use of Force (ROE) Population focus Information Resource the Main Effort
Considerations for Cordon and Search
Security
ISTAR
Use of force
Consider: FRV TCP Outer cordon (estab first then face out): VCPs Civ holding Area, IDP area CSST (CL 1,3,5,10, AXP, R2E, Tpt, GS Engrs) Inner cordon QRF point, routes, LOE ISR screens, NAI EAs for wdr Direction of search / Time of search CT boundaries En CDPs: WDR, re-enforce FF CDPs: Commit QRF, rotation plan
AO Classifications
Geography (LoC, centers, key terrain) - Rural, town, city, complex
Adversary
Population (density)- Red, Amber, Green
IA effects
PROMOTE DETER UNDERMINE ENCOURAGE INFROM REASSURE EXPOSE COERCE COMPEL
Tactical techniques in security
Cordon and search KPP Patrolling Route security VCP / TCP Curfew Crowd control Mass cas (QRF w/ med spt) BPC
Potential Prelim Tasks
Estab LO network (deploy early - needs assessment)
KLE (tribal leaders, govt leaders, NGO, OGA)
Estab ISR screens
Occupy FOBs
Secure lines of communication
IO: Inform CIVPOP
RAM tactics
Harassment ambush Annihilating ambush Raid Assassination Theft Riot
RAM decisions
Transition Open / Incipient insurgency
Resupply
Relocate cache / try camp / DA cell loc
Conduct attack
FF CDPs
Commit QRF (interdict, mass cas, respond to riot, spt DE)
HOTO to HNSF
Trigger C&S
Transition phases
Techniques for supporting elections
Route security IO campaign: ENCOURAGE voter turnout, REASSURE CIVPOP Escort UN - infil/exfil Secure polling booth Patrol D-3 to D-day LO to UN (maintain neutrality)
Length of search for Cordon and Search - what is rare of search
1 hour per house for EHCT
12 hour work day = 12 hrs per day
CIMIC effects
ESTABLISH PROVIDE DEVELOP ENHANCE DELIVER TRAIN ADVISE SUPPORT PARTNER COORDINATE
Length of search for Cordon and Search - what is rare of search
A
CIMIC effects
A
RAM vulnerabilities
- Reliant on unencrypted comms for C2 vuln to detection and geolocation by RRT
- Reliant on predictable x-border smuggling routes for proliferation vuln to interdiction by ISR and partnered border patrols
- DA cells operate in rural townships vuln to isolation from population centers (curfew, VCP)
- Reliant on leadership cell to co-ord spectacular attacks vuln to disruption if key leaders are neutralized.
- Reliant on IEDs to conduct annhialation ambushes and mass cas events vuln to disruption if bombmaker is neutralized.
- Has predictable planning cycle vuln to targeting in known locations once detected.
- Is unable to match FF tempo, vuln to losing initiative when multiple capabilities are targeted simultaneously (IO, bombmaker,leadership, caches)
- Reliant on FoM within CIVPOP to conduct ops vuln to being undermined by CIMIC and IO campaign (public switching tacit consent to FF vs RAM).
TIA vulnerabilities
- Significantly overmatched by FF making them vuln to COERCION to comply. (Using RAM as example)
- SoM tgts undefended govt sites, vuln to disruption through KPP and patrolling
- SoM tgts human suffering for IO campaign vuln to disruption through spt to NGOs and CIMIC ops
How you using intelligence
Employing local agencies early IOT get a startstate and minimize the time spent developing a picture
Use:
OSINT
SIGINT: geolocation to minimize search time
HUMINT
UAS
4WMR
to layer over tgt areas, estab POL and set conditions for strike
TSE will be used on exploit to spt int cycle. DOCEX , CELLEX
Priorities
Secure firm base for force Prevent immediate loss of life Limit human suffering LO network: NGO, govt leaders, tribal ldrs Secure key infrastructure Isolate threats