Security Flashcards
Principals of control
Rule of Law Use of Force (ROE) Population focus Information Resource the Main Effort
Considerations for Cordon and Search
Security
ISTAR
Use of force
Consider: FRV TCP Outer cordon (estab first then face out): VCPs Civ holding Area, IDP area CSST (CL 1,3,5,10, AXP, R2E, Tpt, GS Engrs) Inner cordon QRF point, routes, LOE ISR screens, NAI EAs for wdr Direction of search / Time of search CT boundaries En CDPs: WDR, re-enforce FF CDPs: Commit QRF, rotation plan
AO Classifications
Geography (LoC, centers, key terrain) - Rural, town, city, complex
Adversary
Population (density)- Red, Amber, Green
IA effects
PROMOTE DETER UNDERMINE ENCOURAGE INFROM REASSURE EXPOSE COERCE COMPEL
Tactical techniques in security
Cordon and search KPP Patrolling Route security VCP / TCP Curfew Crowd control Mass cas (QRF w/ med spt) BPC
Potential Prelim Tasks
Estab LO network (deploy early - needs assessment)
KLE (tribal leaders, govt leaders, NGO, OGA)
Estab ISR screens
Occupy FOBs
Secure lines of communication
IO: Inform CIVPOP
RAM tactics
Harassment ambush Annihilating ambush Raid Assassination Theft Riot
RAM decisions
Transition Open / Incipient insurgency
Resupply
Relocate cache / try camp / DA cell loc
Conduct attack
FF CDPs
Commit QRF (interdict, mass cas, respond to riot, spt DE)
HOTO to HNSF
Trigger C&S
Transition phases
Techniques for supporting elections
Route security IO campaign: ENCOURAGE voter turnout, REASSURE CIVPOP Escort UN - infil/exfil Secure polling booth Patrol D-3 to D-day LO to UN (maintain neutrality)
Length of search for Cordon and Search - what is rare of search
1 hour per house for EHCT
12 hour work day = 12 hrs per day
CIMIC effects
ESTABLISH PROVIDE DEVELOP ENHANCE DELIVER TRAIN ADVISE SUPPORT PARTNER COORDINATE
Length of search for Cordon and Search - what is rare of search
A
CIMIC effects
A
RAM vulnerabilities
- Reliant on unencrypted comms for C2 vuln to detection and geolocation by RRT
- Reliant on predictable x-border smuggling routes for proliferation vuln to interdiction by ISR and partnered border patrols
- DA cells operate in rural townships vuln to isolation from population centers (curfew, VCP)
- Reliant on leadership cell to co-ord spectacular attacks vuln to disruption if key leaders are neutralized.
- Reliant on IEDs to conduct annhialation ambushes and mass cas events vuln to disruption if bombmaker is neutralized.
- Has predictable planning cycle vuln to targeting in known locations once detected.
- Is unable to match FF tempo, vuln to losing initiative when multiple capabilities are targeted simultaneously (IO, bombmaker,leadership, caches)
- Reliant on FoM within CIVPOP to conduct ops vuln to being undermined by CIMIC and IO campaign (public switching tacit consent to FF vs RAM).