FM-3-81 Maneuver Enhancement Brigade Download
Page 136 of 188
Appendix C C-2 FM 3-81 09 November 2021 LINES OF COMMUNICATION SECURITY C-6. Security operations are those operations performed by commanders to provide early and accurate warning of enemy operations, to provide the force being protected with time and maneuver space within which to react to the enemy, and to develop the situation to allow commanders to effectively use their protected forces (ADP 3-90). Security operations encompass five primary tasks—screen, guard, cover, area security, and local security. While the first three tasks are linked to the movement and maneuver warfighting function, the last two are linked to the protection warfighting function. These last two security tasks are focused on providing protection, although they may also enhance the movement and maneuver of the force. The focus of security operations may be either on a force (such as convoy operations), facility (base camp, dislocated civilian camp, detention site), or LOC for which they are providing security. See ADP 3-37, ADP 3-90, and chapter 2 for additional information on area and local security. C-7. Security forces operating in the support area (normally military police [see FM 3-39] or a TCF) may also conduct counterreconnaissance in the performance of area and local security in support of LOC security. Counterreconnaissance is a tactical mission task that encompasses all measures taken by a commander to counter enemy reconnaissance and surveillance efforts. Counterreconnaissance is not a distinct mission, but a component of all forms of security operations (FM 3-90-1). ROUTE SECURITY C-8. Route security is a specialized area security task conducted to protect LOCs or MSRs and friendly forces moving along them. Enemy attempts to interdict LOCs may have little immediate impact on the corps or division ongoing decisive and shaping operations because of subordinate unit basic loads. However, the security of those routes over which the corps and division sustaining operations flow are critical to sustained land operations. C-9. The security of the support area LOCs and supply routes, whether rail, pipeline, highway, or waterway, presents one of the greatest security problems in the support area. Route security operations are defensive in nature and are terrain-oriented. A route security force prevents an enemy force from impeding, harassing, or destroying traffic along the route or portions of the route itself. The establishment of base camps and base clusters along that route permits the concentration of security resources. Route security requires dedicated resources at almost an infinite number of points or reaction forces to counter possible enemy action. Units performing missions that require the habitual use of LOCs and supply routes, such as military police, maintenance, transportation, supply, and field service units, can perform route security operations with their primary activities. The support area commander can employ the following techniques to provide route security: Active and passive security. Route reconnaissance. Cordon security. Movement corridor. C-10. While the scope of these operations depends on the mission variables of METT-TC, route security operations tend to require the commitment of significant resources. A combination of passive and route reconnaissance is the most common pattern used over secured routes, such as a division MSR. Active and Passive Security C-11. Active and passive security is a technique to provide route security without a significant expenditure of labor or resources. It includes— Camouflage. Convoy formation and march control to present the least lucrative target possible under prevailing conditions.