Principals of control
Rule of Law Use of Force (ROE) Population focus Information Resource the Main Effort
Considerations for Cordon and Search
Security
ISTAR
Use of force
Consider: FRV TCP Outer cordon (estab first then face out): VCPs Civ holding Area, IDP area CSST (CL 1,3,5,10, AXP, R2E, Tpt, GS Engrs) Inner cordon QRF point, routes, LOE ISR screens, NAI EAs for wdr Direction of search / Time of search CT boundaries En CDPs: WDR, re-enforce FF CDPs: Commit QRF, rotation plan
AO Classifications
Geography (LoC, centers, key terrain) - Rural, town, city, complex
Adversary
Population (density)- Red, Amber, Green
IA effects
PROMOTE DETER UNDERMINE ENCOURAGE INFROM REASSURE EXPOSE COERCE COMPEL
Tactical techniques in security
Cordon and search KPP Patrolling Route security VCP / TCP Curfew Crowd control Mass cas (QRF w/ med spt) BPC
Potential Prelim Tasks
Estab LO network (deploy early - needs assessment)
KLE (tribal leaders, govt leaders, NGO, OGA)
Estab ISR screens
Occupy FOBs
Secure lines of communication
IO: Inform CIVPOP
RAM tactics
Harassment ambush Annihilating ambush Raid Assassination Theft Riot
RAM decisions
Transition Open / Incipient insurgency
Resupply
Relocate cache / try camp / DA cell loc
Conduct attack
FF CDPs
Commit QRF (interdict, mass cas, respond to riot, spt DE)
HOTO to HNSF
Trigger C&S
Transition phases
Techniques for supporting elections
Route security IO campaign: ENCOURAGE voter turnout, REASSURE CIVPOP Escort UN - infil/exfil Secure polling booth Patrol D-3 to D-day LO to UN (maintain neutrality)
Length of search for Cordon and Search - what is rare of search
1 hour per house for EHCT
12 hour work day = 12 hrs per day
CIMIC effects
ESTABLISH PROVIDE DEVELOP ENHANCE DELIVER TRAIN ADVISE SUPPORT PARTNER COORDINATE
Length of search for Cordon and Search - what is rare of search
A
CIMIC effects
A
RAM vulnerabilities
TIA vulnerabilities
How you using intelligence
Employing local agencies early IOT get a startstate and minimize the time spent developing a picture
Use:
OSINT
SIGINT: geolocation to minimize search time
HUMINT
UAS
4WMR
to layer over tgt areas, estab POL and set conditions for strike
TSE will be used on exploit to spt int cycle. DOCEX , CELLEX
Priorities
Secure firm base for force Prevent immediate loss of life Limit human suffering LO network: NGO, govt leaders, tribal ldrs Secure key infrastructure Isolate threats