ARN6672 - ATP 3-21x20 FINAL WEB-pages-291-350
ARN6672 - ATP 3-21x20 FINAL WEB-pages-291-350
ARN6672 - ATP 3-21x20 FINAL WEB-pages-291-350
Stability
Operations focused on stability ultimately aim to establish conditions the local
populace regards as legitimate, acceptable, and predictable. Stabilization is the process
to identify and mitigate underlying sources of instability to establish the conditions for
long-term stability. Stability tasks focus on identifying and targeting the root causes of
instability and building the capacity of local institutions.
Army forces accomplish stability missions and perform tasks across the range of
military operations in coordination with other instruments of national power. Stability
missions and tasks are part of broader efforts to establish and maintain the conditions
for stability in an unstable area before or during hostilities, or to reestablish enduring
peace and stability after open hostilities cease.
The first two sections of this chapter discuss the doctrinal foundation and organization
of forces for operations focused on the stability element of decisive action. Sections III
and IV introduce scenarios, as discussion vehicles, illustrating the methods and ways
an Infantry battalion conducts operations in support of the stability tasks. Scenarios
focus on the challenges confronting the commander and staff and subordinate
commanders and leaders in accomplishing stability-focused missions or tasks. These
scenarios are not intended to be prescriptive of how the Infantry battalion performs any
particular operation.
STABILITY PRINCIPLES
4-2. Based on the four principles (conflict transformation, unity of effort, legitimacy and host-nation
ownership, and building partner capacity) that lay the foundation for long-term stability, Army units conduct
operations focused on stabilizing the environment and transforming conditions of the environment and the
state toward normalization. Units at different echelons balance these principles to mitigate fragile state
characteristics prevalent at the national, regional, and local levels. Long-term stabilization efforts within an
operational environment transform the drivers of conflict while maintaining unity of effort, which is
coordination and cooperation toward common objectives, even if the participants are not necessarily part of
the same command or organization, which is the product of successful unified action (JP 1), among diverse
actors. Fundamental to long-term stability and critical to the host-nation’s legitimacy is its involvement and
ownership to build trust and confidence among the states populace. Building partner capacity addresses
potentially the most important effort to support and enable partners so they can perform their roles effectively.
(Refer to ADRP 3-07 and FM 3-96 for additional information.)
INTERORGANIZATIONAL COOPERATION
4-4. During stability, the commander ensures the key players support interagency partnership, established
ground rules, and collaborative interagency strategies to accomplish the mission. The commander must
understand the importance of ensuring that interagency partners explore various alternatives, and that all
partners participate. The commander adopts consensus-building leadership behavior, to include open
discourse, friendly debate, and discussion with opinion sharing and feedback from participants.
4-5. Understanding an operational environment includes understanding organizational goals or attitudes for
all stability partners. Within operations focused on stability, the commander must act cooperatively rather
than competitively, building relationships to achieve coordinated goals. Organizations can increase
collaboration by providing their representatives with a clear understanding of their organization’s functions
and authority within the larger civil-military partnership. Regular interaction with interagency partners also
contributes to an increased understanding of roles and mission requirements. Success in operations focused
on stability requires an awareness of trends that influence views of the actors and an understanding of factors
that shape or constrain options and capabilities for partner organizations.
STABILITY IN OPERATIONS
4-7. Operations focused on stability, range across all military operations and offer perhaps the most diverse
set of circumstances the Infantry battalion faces. The objective of operations focused on stability is to create
conditions that the local populace regards as acceptable in terms of violence; the functioning of governmental,
economic, and societal institutions; and that adhere to local laws, rules, and norms of behavior. During
decisive action, the battalion seeks to create and maintain the conditions necessary to seize, retain, and exploit
the initiative; and to consolidate gains, which is the activities to make permanent any temporary operational
success and set the conditions for a sustainable stable environment allowing for a transition of control to
legitimate civil authorities (ADRP 3-0)—through partnership with associated diverse enabling organizations.
The battalion, in coordination with these partner organizations, provide the means to secure and stabilize the
operational environment and to conduct operations to establish and maintain stability or to reestablish
stability. The commander keeps in mind how these operations transition in a comprehensive approach to
avoid considering them in isolation. (Refer to FM 3-07 and FM 3-96 for additional information.)
4-11. The district stability framework helps overcome many of the challenges to successful operations
focused on stability. The framework helps to—
Keep military formations focused on the center of gravity for operations focused on stability—
the population and its perceptions.
Provide a common operational picture for all interagency teams in an area of operations. By
focusing on sources of instability, partner organizations can focus their varied resources and
expertise on shared priorities.
Prioritize activities based on their importance to the local populace and their relevance to the
overarching mission of stabilizing the area.
Enhance continuity between military formations. Units can easily pass district stability framework
data along from one unit to the next, establishing a clear baseline that identifies sources of
instability and the steps taken to mitigate them.
Empower tactical-level formations by giving them hard data useful for decision making at their
level and for influencing decisions at higher levels.
Identify MOP and MOE for unit activities rather than simply tracking MOP.
Track indicators of overall stability by assessing whether an area is becoming more stable.
Identify issues that matter most to the population; the district stability framework helps identify
information themes that resonate with the population.
Situation Awareness
4-13. The district stability framework process uses four lenses to achieve a population-centric, stability
oriented, situational awareness of an area of operations. The stability working group examines the area of
operations from four perspectives: an operational environment; cultural aspects; stability and instability
dynamics; and local perceptions. This examination helps military and civilian leaders achieve a situational
awareness of stability conditions and underlying factors.
Analysis
4-14. After gaining this initial situational awareness, the district stability framework process provides tools
to analyze and identify potential sources of instability, their causes, the desired objectives, and the indicators
that measure progress in addressing each source of instability. The analysis consists of four tasks: identify
potential sources of instability, vet each source against instability criteria, determine if the source meets two
of the three instability criteria, and prioritize the sources of instability. The instability criteria are—
Decreased support for the government or legitimate governance institution.
Increased support for adversaries or enemies.
Undermining of the normal functioning of society.
4-15. After identifying and prioritizing the sources of instability, a tactical stability matrix is filled out for
each source of instability. Examples of sources of instability include, but are not limited to—
Insurgents forming a shadow governmental structure.
Religious, ethnic, economic, and political friction between different groups within the local
population.
Natural disasters or resource scarcity.
Super-empowered individuals disrupting legitimate governance.
Severely degrading infrastructure or environment.
Immature, undeveloped, or atrophied government, social, or economic systems.
Ineffective or corrupt host-nation security forces.
Design
4-16. In the design step, working group members (includes interagency partners) design, prioritize, and
synchronize stabilization activities. The stability working group develops activities to diminish the sources
of instability identified during the analysis step. The process begins by brainstorming potential stabilization
activities and continues by filtering and refining the proposed activities against a set of stability criteria,
design principles, and resource availability. The design step is integrated with and similar to the Army design
methodology’s activities, develop an operational approach and develop the plan, described in ADRP 5-0.
process in the future. Effective monitoring and evaluating supports the commander’s decision making
throughout the operations process, focusing on the perceptions of the population and to inform a common
operational picture for the IBCT, subordinate battalions and their interagency partners. Monitoring and
evaluating informs and influences audiences by identifying themes that resonate with the population.
Recognize Complexity
4-22. Given the inherent complex and uncertain nature of operations dominated by stability and that, the
multifaceted drivers of instability are difficult to identify, the commander and staff use the Army design
methodology (see ADRP 5-0) to help understand the root cause of instability and approaches to solve
problems. The Army design methodology is an iterative process of understanding and problem framing that
uses elements of operational art (see ADRP 3-0) to conceive and construct an Operational approach—a
description of the broad actions the force must take to transform current conditions into those desired at end
state (JP 5-0)—to solve identified problems. The Army design methodology results in an improved
understanding of an operational environment. Based on improved understanding, the commander issues
planning guidance, to include an operational approach, to guide more detailed planning using the military
decision-making process. The understanding developed through Army design methodology continues
throughout the operations process in the form of continuous assessment. Assessment, for example updated
running estimates, helps the commander measure the overall effectiveness of employing forces and capabilities.
Operational Approach
4-23. An operational approach provides a unifying purpose and focus to all operations and provides the
framework that relates tactical tasks to the desired end state. The operational approach conceptualizes the
commander‘s vision for establishing the conditions that define the desired end state. When developing an
operational approach, the commander considers how to employ a combination of defeat and stability
mechanisms. Defeat mechanisms are dominated by offensive and defensive tasks, while stability mechanisms
are dominant in stability tasks that establish and maintain security and facilitate consolidating gains in an
area of operation.
4-24. A defeat mechanism is a method through which friendly forces accomplish their mission against enemy
opposition (ADRP 3-0). The battalion uses a combination of four defeat mechanisms: destroy, dislocate,
disintegrate, and isolate. Applying focused combinations produces complementary and reinforcing effects
not attainable with a single mechanism. Used individually, a defeat mechanism achieves results proportional
to the effort expended. Used in combination, the effects are likely to be both synergistic and lasting. Defeat
mechanisms are not tactical missions; rather, they describe broad tactical effects. The commander translates
these effects into tactical tasks.
4-25. A stability mechanism is the primary method through which friendly forces affect civilians to attain
conditions that support establishing a lasting, stable peace (ADRP 3-0). As with defeat mechanisms,
combinations of stability mechanisms produce complementary and reinforcing effects that accomplish the
mission more effectively and efficiently than single mechanisms do alone. The four stability mechanisms are
compel, control, influence, and support. Compel means to use, or threaten to use, lethal force to establish
control and dominance, effect behavioral change, or enforce compliance with mandates, agreements, or civil
authority. Control involves imposing civil order. Influence means to alter the opinions, attitudes, and
ultimately behavior of foreign friendly, neutral, adversary, and enemy populations through information
operations, presence, and actions. Support is to establish, reinforce, or set the conditions necessary for the
instruments of national power to function effectively.
4-27. The combination of stability tasks conducted during operations depends on the situation. In some
operations, the host nation can meet most or all of the population’s requirements. In those cases, Army forces
work with and through host-nation authorities. Commanders use civil affairs operations to mitigate how the
military presence affects the population and vice versa. Conversely, Army forces operating in a failed state
may need to support the well-being of the local population. That situation requires Army forces to work with
civilian organizations to restore basic capabilities. Civil affairs operations prove essential in establishing the
trust between Army forces and civilian organizations required for effective, working relationships.
Note. Section III of this chapter illustrates two scenarios where the Infantry battalion conducts
area security missions during transition after open hostilities.
4-28. Six Army primary stability tasks (figure 4-1) correspond directly to the six stability sectors, used by
the Department of State, Office of the Coordinator for Reconstruction and Stabilization, and directly support
the broader efforts within the stability sectors. Together these six primary stability tasks and the Department
of State stability sectors provide a mechanism for interagency tactical integration, linking the execution of
discreet tasks among the instruments of national power required to establish end state conditions that define
success. Tasks performed in one sector inevitably create related effects in another sector; planned and
performed appropriately, carefully sequenced activities complement and reinforce these effects. The
subordinate tasks performed by the battalion under the primary stability tasks directly support broader efforts
within stability executed as part of unified action. Unified action is the synchronization, coordination, and/or
integration of the activities of governmental and nongovernmental entities with military operations to achieve
unity of effort (JP 1). Refer to ADRP 3-07 and FM 3-07 for additional information.
require increased emphasis and attention by the commander. Some activities—such as security sector reform
and disarmament, demobilization, and reintegration—cut across the primary stability tasks and may be the
centerpiece of an operation. For example, security sector reform is a comprehensive set of programs and
activities undertaken by a host nation to improve the way it provides safety, security, and justice. Also called
SSR (JP 3-07). Within the security sector reform, battalion transformation tasks (see paragraphs 4-33) may
focus on these programs and activities undertaken to improve the way a host nation provides safety, security,
and justice to help enable conditions for enduring stability and peace.
4-31. The primary stability task of establishing security cooperation (SC) (see FM 3-22) may include the
Infantry battalion, depending on the missions assigned, conducting security force assistance (see section IV
of this chapter) as a subset of SC. Security force assistance offers a means of support for SC activities in
support of building capacity of a foreign security force. As soon as the foreign security force can perform
this task, the battalion transitions this task within civil security to the host nation. Related activities and
missions (see FM 3-07 for additional information) include—
Information operations.
Protection of civilians.
Mass atrocity response operations.
Security sector reform.
Disarmament, demobilization, and reintegration.
Destruction, monitoring, and redirection of weapons of mass destruction (WMD) and mitigation
of CBRN hazards.
Security cooperation.
Peace operations.
Foreign humanitarian assistance.
Counterinsurgency.
Foreign internal defense.
Note. Security cooperation involves all Department of Defense interactions with foreign defense
establishments to build defense relationships that promote specific U.S. security interests, develop
allied and friendly military capabilities for self-defense and multinational operations, and provide
U.S. forces with peacetime and contingency access to a host nation. Also called SC (JP 3-22).
Stability Framework
4-32. The stability framework refers to the range of failed, failing, and recovering states. The distinction
among them is rarely clear, as fragile states do not travel a predictable path to failure or recovery. This
framework encompasses the stability tasks performed by military and civilian actors across the range of
military operations. .When applied, the stability framework helps the commander identify the types and
ranges of tasks performed in the phases and identify lead responsibilities and priorities. Stability tasks occur
in three phases: initial response, transformation, and fostering sustainability phases. (Refer to FM 3-96 for
additional information.)
Transformation Phase
4-34. The transformation phase represents the broad range of post-conflict reconstruction, stabilization, and
capacity building tasks where host-nation security forces and, potentially, intergovernmental organization
peacekeepers begin to contribute. During the transformation phase, the battalion can conduct security force
assistance (see section IV of this chapter) as a subset of SC to develop the ability of the host nation to defend
against internal and external threats, contribute to multinational operations, and assist other partner nations
to provide for their security. SC activities of these types transition in a relatively secure environments, free
from most wide-scale violence, often to support broader civilian efforts. Throughout transformation, the
battalion continues in partnership with unified action partners according to the legitimate government binding
agreements.
Note. SC supports the implementation of national and theater strategies, and is a key element of
global and theater shaping activities supporting stabilization, building security relationships,
building partner capacity, and providing access. SC activities typically include security assistance
programs, security force assistance activities, joint combined exercise training, and other Service
training opportunities with partner nations and other friendly foreign security forces. SC is a
primary focus for shaping all geographic combatant commanders’ theater campaign plans, and can
be conducted across the range of military operations and during all phases of a joint operation or
campaign. Service components posture forces to conduct SC activities and to execute theater
campaigns and operations, as directed. These activities help shape the operational environment
and produce the conditions necessary for a joint force commander, when directed, to seize the
initiative, dominate, and establish stability within the operational area during a joint
operation/campaign. Conducting sustained SC activities in an area of responsibility typically
requires a combination of assigned and attached forces, composed of conventional forces and
special operations forces. Those forces may include Department of Defense civilian personnel and
contractors. (Refer to FM 3-22 for additional information.)
Note. Planning provides a disciplined framework for approaching and solving complex problems.
Familiarity with the requisite processes and steps typically speeds the planning effort, and
repetition only serves to imbue it with an inherent efficiency. The danger is in taking that discipline
to the extreme. This especially proves dangerous in the collaborative environments typical of
operations with a dominant stability component, where the mix of different planning cultures and
processes can stymie progress. Stakeholders may want to follow a rigid, institutionalized planning
methodology or, in some situations, not use any planning methodology whatsoever. In a
collaborative environment, the commander streamlines the planning effort, providing economy of
effort and coordination among team members working on the same problem.
Transition Planning
4-45. A well-structured transition plan nests the battalion’s short-term stabilization actions with long-term
end states. The numerous layers of tasks conducted by the battalion, its higher headquarters and other
partners, compound the challenges to the transition plan. Numerous lines of effort crossing different transition
phases potentially add complexity to partner organizations within the area of operation. To ensure success,
the battalion, its higher headquarters, and unified action partners clearly plan and express the steps for
transition and their withdrawal so local actors have time to adapt to their responsibilities and structures. The
phases of the stability framework (see paragraphs 4-29 to 4-32) nests with the three stability transition phases,
with initial response tasks generally occurring in transition phase 1, transformation tasks in transition phase 2,
and fostering sustainability tasks in transition phase 3 (table 4-1).
Table 4-1. Phases of the stability framework and stability transition phases
Standard Measures
4-49. MOPs and MOEs are standard measures used to analyze progress when moving from one transition
phase to another. Reports on what is being done to achieve success and whether or not what is being done is
successful in each transition phase is essential to determining progress. Standard measures must be clear and
achievable to provide a true picture of progress. The commander and staff integrate assessments with host-
nation, interagency, and interorganizational partners in determining the criteria for MOPs and MOEs and
determining what standard to use. Integrating MOEs and MOPs help ensure all partners work to the same
purpose and the same goal. (Refer to ADRP 5-0 for additional information on the assessment process.)
in infantry tactics and the use of Infantry weapons up through battalion level. Training and assistance includes
counterinsurgency tactics and techniques (see FM 3-24.2). When provided by the battalion, mobile training
teams may be placed under the operational control of a U.S. security assistance organization and should be
able to provide limited advice and assistance on the conduct of other stability tasks. At a minimum, small
units within each company will be expected to mentor/advise those host nation counterparts with which they
work. (Refer to FM 3-22 for additional information.)
4-56. Early on in the planning process the battalion personnel staff section, in coordination with brigade and
higher echelon manpower and personnel staff sections, screen personnel files to review the records of
identified Soldiers that might have specific skill sets useful to the battalion or higher echelon during the
conduct of stability focused operations. The review by brigade and battalion manpower and personnel staff
sections might not be completed before deployment, especially as it pertains to newly assigned Soldiers.
These skill sets include individuals with professional certification or work experience in those non-military
fields that might have utility during operations focused on the conduct of stability tasks. Individuals that have
the necessary degree of cultural understanding and foreign language skills enable the effective augmentation
of information operations and public affairs requirements.
Note. A database, usually maintained at division level, is created to track the college degrees,
civilian work experience, cultural knowledge, and language proficiencies of Soldiers identified
during the personnel files screening. (Refer to ATP 3-91 for additional information.)
4-57. During prolonged operations when the battalion commander does not employ the tactical command
post, the staff assigned to it reinforces the main command post. This allows economy of scale to the skill sets
appropriate to the conduct of stability tasks with those of the conduct of offensive and defensive tasks in the
battalion‘s area of operations. Battalion standard operating procedures address the specifics for this, including
procedures that quickly detach the tactical command post from the main command post. When participating
in operations focused on the conduct of stability tasks as part of short-term military engagement or limited
contingency operations, the battalion commander may choose to deploy only the tactical command post into
the area of operation specific to the engagement or operation.
OPERATIONAL OVERVIEW
4-59. Operational area security is a form of security operations conducted to protect friendly forces,
installations, routes, and actions within an area of operations (ADRP 3-37). During the conduct of stability-
focused operations, area security operations establish and maintain the conditions for stability in an unstable
area before or during hostilities, or enduring peace and stability after open hostilities cease. Operational area
security is often an effective method of providing civil security and civil control during operations focused
on stability. Security objectives, regardless of which element of decisive action (offense, defense, or stability)
currently dominants, ensure freedom of action over a prolonged period in consonance with the battalion
commander’s concepts of operations and intent.
CIVIL CONSIDERATIONS
4-60. Civil considerations reflect the influence of manmade infrastructure, civilian institutions, and attitudes
and activities of the civilian leaders, populations, and organizations within the operational environment on
the conduct of military operations. Commanders and staffs analyze civil considerations in terms of the
categories expressed in the memory aid known as ASCOPE (areas, structures, capabilities, organizations,
people, and events). See ATP 2-01.3 for additional information on these categories.
4-61. Since civilians are normally present in operations with a dominant stability component, the battalion
normally restrains its use of force when conducting area security operations. However, the commander
remains responsible for protecting the force and considers this responsibility when considering rules of
engagement. Restrictions on conducting operations and using force must be clearly explained and understood
by everyone. Subordinate leaders and Soldiers must understand that their actions, no matter how minor, may
have far-reaching positive or negative effects. Leaders and Soldiers must realize that media (either hostile or
neutral) and adversaries can quickly exploit their actions, especially the way they treat the civilian population.
AREA SECURITY
4-62. Area security, a security task conducted to protect friendly forces, installations, routes, and actions
within a specific area (ADRP 3-90), takes advantage of the local security measures performed by all units,
regardless of their location in the area of operations. Local security includes any local measure taken by units
against enemy actions. Local security, dependent upon the situation, may involve avoiding enemy detection
or deceiving the enemy about friendly positions and intentions. Local security may include finding any enemy
forces in the immediate vicinity and knowing as much about their positions and intentions as possible. Local
security prevents a unit from being surprised, and is an important part of maintaining the initiative during
area security.
4-63. The requirement for maintaining local security is an inherent part of any area security mission. Units
use both passive and active measures to provide local security. Passive local security measures include using
camouflage, movement control, noise and light discipline, operations security, and proper communications
procedures. Measures also include employing available sensors, night-vision devices, and daylight sights to
maintain surveillance over the area immediately around the unit. Active measures, dependent upon the
situation, may include—
Using observation posts, combat outposts, combat patrols, and reconnaissance patrols.
Establishing specific levels of alert based on the mission variables of METT-TC.
Establishing stand-to times. (Unit standard operating procedures (SOPs) detail activities during
the conduct of stand-to.)
ECONOMY-OF-FORCE MISSIONS
4-64. The Infantry battalion, charged with execution, conducts an area security operation as an economy-of-
force mission. Area security missions are numerous, complex, and generally never ending. For this reason,
the commander and staff synchronize and integrate security efforts, focusing on protected forces,
installations, routes, and actions within the battalion’s assigned area of operation. Protected forces within the
battalion range from subordinate units and elements, echeloned command posts, and sustainment elements
within the battalion’s support area (when established). Protected installations can be part of the sustainment
base, or they can constitute part of the area’s civilian infrastructure. Protected ground lines of communication
include the route network to support the numbers, sizes, and weights of tactical and support area movement
within the battalion’s area of operations. Actions range from securing key points (bridges and defiles) and
terrain features (ridgelines and hills) to large civilian population centers and their adjacent areas.
establishment of base perimeter security (See appendix I), combat outposts, observation posts, surveillance,
moving and stationary screen and guard missions, and reconnaissance and counterreconnaissance missions.
Note. During the conduct of offensive or defensive-focused tasks, battalion forces engaged in area
security operations can saturate an area or position on key terrain to provide protection through
early warning, reconnaissance, surveillance, and/or security operation (screen or guard missions),
and to guard against unexpected enemy or adversary attack with an active response. Early warning
may come from ground base forces and/or ground- and space-based sensors. Forces engaged in
area security operations are typically organized in a manner that emphasizes their mobility,
lethality, and communications capabilities. (Refer to chapter 2 and chapter 3 for additional
information.)
4-66. During offensive or defensive-focused tasks, area security operations are often designed to ensure the
continued conduct of sustainment operations to support decisive and shaping operations by generating and
maintaining combat power. Area security operations may be the predominant method of protecting support
areas that are necessary to facilitate the positioning, employment, and protection of resources required to
sustain, enable, and control forces. (Refer to appendix H for additional information.)
READINESS
4-67. During area security operations, forces must retain readiness over longer periods without contact with
the enemy. This occurs most often when the enemy commander knows that enemy forces or insurgents are
seriously overmatched in available combat power. In this situation, the enemy commander normally tries to
avoid engaging friendly forces unless it is on terms favorable to the enemy. Favorable terms include the use
of mines and booby traps. Area security forces must not develop a false sense of security, even if the enemy
appears to have ceased operations in the secured area. The commander must assume that the enemy is
observing friendly operations and is seeking routines, weak points, and lax security for the opportunity to
strike with minimum risk. This requires the commander to influence subordinate small-unit leaders to
maintain the vigilance and discipline of their Soldiers to preclude this opportunity from developing.
PLANNING CONSIDERATIONS
4-68. During operational area security planning, the commander apportions combat power and dedicates
assets to protection tasks and systems based on an analysis of the operational environment, the likelihood of
threat action, and the relative value of friendly resources and populations. Based on an initial assessment of
the operational environment, the commander task organizes subordinate units and elements and assigns
security areas within the battalion’s area of operation. Although all resources have value, the mission
variables of METT-TC make some resources, assets, or locations more significant to successful mission
accomplishment from enemy or adversary and friendly perspectives. Throughout the operations process the
commander relies on the risk management process and other specific assessment methods to facilitate
decision making, issue guidance, and allocate resources (see appendix B). Criticality, vulnerability, and
recoverability are some of the most significant considerations in determining protection priorities that
become the subject of the commander’s guidance and the focus of area security operations.
MISSION COMMAND
4-69. During area security operations, the battalion commander devotes considerable time and energy to the
problems of coordination and cooperation due to the joint, interagency, and multinational nature of stability-
focused tasks. The battalion plans and conducts area security operations in concert with partner participants
towards a unified effort, often as a supporting organization rather than the lead organization. The battalion
commander uses liaisons to enable unity of effort between partner elements and the coordination centers
established by the IBCT or higher commander.
Human Component
4-74. No other military activity has as significant a human component as operations that occur among the
people. Human beings capture information and form perceptions based on inputs received through all the
senses. Humans see actions and hear words. Humans compare gestures and expressions with the spoken
word. Humans weigh the messages presented to them by the battalion and other sources with the conditions
that surround them. When the local and national news media are unavailable or unreliable, people turn to
alternative sources, such as the internet—where information flows freely at unimaginable speeds—or rumor
and gossip. Perception equals truth to people lacking objective sources of information. Altering perceptions
requires shaping information according to how people absorb and interpret information, molding the message
for broad appeal and acceptance.
Information Operations
4-75. The final success or failure of the battalion’s area security operation rests with the perceptions of the
inhabitants within and external to the battalion’s area of operations and goes beyond defeating the enemy.
Securing the trust and confidence of the civilian population is the chief aim of information operations, which
Note. When attached or established within the battalion, an information operations officer or NCO
planner is responsible for synchronizing and deconflicting information-related capabilities
employed in support of battalion operations. In coordination with the information operations
officer at the IBCT, the information operations officer or NCO staff planner synchronizes
capabilities within the battalion staff that communicate information to audiences and affect
information content and flow of enemy or adversary decision-making while protecting friendly
information flow. The information operations planner prepares Appendix 15 and a portion of
Appendices 12, 13, and 14 to Annex C (Operations) to the operation order when established.
(Refer to FM 3-13 and FM 3-96 for additional information.)
4-78. Within the security environment, enemies, adversaries, and other organizations use propaganda and
disinformation against the commander’s efforts to influence various civilian populations within and external
(area of interest) to the battalion’s area of operations. The battalion’s public affairs staff NCO, in coordination
with the IBCT public affairs officer works closely with the intelligence staff officer to be proactive, rather
than reactive, to such attacks. A coordinated information operations plan informs and counters the effects of
propaganda and misinformation. The plan (generally developed at the IBCT level in coordination with the
division information operations officer and public affairs officer) establishes mechanisms, such as a media
center and/or editorial board, to educate and inform local and international media, which in turn, informs the
public, with accurate and timely information. Additionally, civil affairs operations and military information
support operations are integrated into counterpropaganda efforts at the IBCT level through the information
operations working group.
4-79. When needed, the battalion chaplain can play an important role in bridging gaps with religious leaders
that set conditions for future successful key leader engagements and civil affairs operations. During planning,
the chaplain advises the commander concerning matters of religion, culture, and religious key leaders in the
area of operation and areas of interest. The chaplain and unit ministry team provide important, up-to-date
perspectives concerning local, provincial, and national atmospherics not often included or clear in other
sources. Their efforts should always be coordinated with the battalion information operations NCO and IBCT
information operations working group.
4-80. Without a detailed Soldier and leader engagement plan, different units and staff elements meet with
and engage local leadership with different desired end states thereby undermining the ability of any or all
forces to build capacity and work towards transition to host nation lead. Coordination between staff elements
or units within the battalion, when working with the same host nation individual or office, enables unity of
effort and the desired end state for the battalion’s area security operation. The creation of a detailed
engagement plan includes identifying differences between provinces or localities within the province and
sets out the objectives to reach the desired end state. Host nation leaders in a city, district or province have
face-to-face meetings with these leaders to advance the creation and building of host nation capacities.
4-81. Operations security is as important during the conduct of stability-focused operations as it is during
the conduct of offensive- and defensive-focused operations. Operations security contributes to the battalion’s
ability to achieve surprise during area security missions, thus enabling its chances for success. Within the
battalion area of operation, human adversaries/enemies monitor the battalion’s normal activities to detect
variations in activity patterns that forecast future operations. They monitor the conversations of Soldiers both
on duty and off duty to gain information and intelligence. Adversaries/enemies monitor commercial internet
activity and phone calls from battalion operational and recreation facilities. They will look at trash created
by battalion activities. The absence of operations security about battalion activities contributes to excessive
friendly casualties and possible mission failure in area security operations just like it does in combat
operations. The battalion’s information superiority hinges in no small part on effective operations security;
therefore, measures to protect essential elements of friendly information cannot be an afterthought. (Refer to
FM 3-96 for additional information.)
Notes. The need to maintain transparency of the battalion's intentions during area security
operations is a factor when balancing operations security with information release. Release
authority for information–to include foreign disclosure rules–must be fully understood by
commanders and staffs within the IBCT. The public affairs and information operations officers
(see FM 3-61 and FM 3-13, respectively) lead the coordination and synchronization processes
within the IBCT. Release authority for information rests with the commander at the appropriate
level.
4-82. Multinational staffs result in additional security problems. Each nation has different access to U.S.
information systems. Maintaining operations security with multinational staff members is difficult and
sometimes the security rules restrict the ability of multinational partner staff officers to contribute. The chief
of staff and foreign disclosure officer at division level develop workarounds when required. One such
workaround is to provide the multinational staff officer a U.S. assistant to get on a U.S. secured information
system to ensure the multinational staff officer has the information needed to contribute. The division
assistant chief of staff, signal (known as the G-6) establishes and maintains two separate sets of different
information systems when this occurs. (Refer to ATP 3-91 and ATP 6-02.75 for additional information.)
primary stability tasks because of their deterrence value and the flexibility and labor the battalion provides
to the IBCT commander.
4-87. The battalion employs roadblocks not only to restrict traffic for security purposes, but also to control
the movement of critical cargo. Cargo could be generators designed to restore electric power in a large area
or items that support the population and resources within the battalion’s area of operation.
Occupy an Area
4-88. Planning for the battalion’s occupation of an area or relief in place (see paragraph 3-66) begins before
the battalion deploys or when being relieved, redeploys. Planning includes not only battalion forces and their
activities, but also other governmental agencies, multinational partners, host nation agencies, and potential
international organizations. The mission variables of METT-TC determine the occupation or relief in place
that occurs. Sometimes occupation, much like occupying an initial area of operation is appropriate. This can
take place when the battalion’s stability-focused area security operation occurs within limited intervention or
peace operations. A relief in place may be appropriate during the conduct of an area defense (figure 3-16,
page 3-34). However, a stability-focused area security transition by function may be more effective if the
relief in place is to takes place with host nation military forces and civil authorities within the range of military
operations of irregular warfare. Some of these functions include medical and engineer services, local security,
communications, and sustainment. Battalion plans do not remove a provided capability from the area of
operation until the replacement capability is operating.
information on observation post activities) are threaten by insurgency or in danger of being attacked by
enemy forces infiltrating into and through the battalion’s assign area of operation.
Note. During the conduct of defensive-focused operations, the battalion commander uses a combat
outpost to extend the depth of the security area, to keep friendly forward observation posts in place
until they can observe the enemy’s main body, or to secure friendly forward observation posts that
will be encircled by enemy forces. Mounted and dismounted forces can employ combat outposts.
(Refer to chapter 3 for additional information.)
Army Aviation
4-90. Army aviation attack and reconnaissance units with manned and unmanned systems—when deployed
early with initial response forces—can be a significant deterrent on the indigenous combatants, particularly
if factions or insurgence are not yet organized during the initial response phase (see paragraph 4-32). Attack
and reconnaissance helicopters may be employed to act as a response force against enemy threats. Along
with unmanned aircraft systems, attack and reconnaissance helicopters may conduct reconnaissance,
surveillance, and/or security over wide areas and provide the battalion a means for visual route
reconnaissance and early warning. Utility helicopters provide an excellent mission command capability to
support stability focused area security operations and to transport patrols or security elements throughout the
battalion’s area of operation. Cargo helicopters provide the capable to move large numbers of military and
civilian security force personnel and to conduct resupply when surface transportation is unavailable or routes
become impassable.
Note. Battalion plans include measures for the effective use of all resources, to include, exploiting
airpower for transportation and resupply over extended distances and, where appropriate, tightly
controlled close air support.
4-93. To counter an indirect fire threat, the commander employs counterfire radars throughout and area of
operation to locate hostile indirect fire systems. The use of quick reactionary forces, attack helicopter, or
local friendly forces are ideal for response to counterfire radar acquisitions as clearance of fire procedures
are often time consuming and not necessarily reliable when determining locations for host nation forces.
Additionally, indiscriminate use of indirect fire on counterfire radar acquisitions can lead to unwanted
collateral damage.
INTELLIGENCE
4-94. The conduct of stability focused tasks demands greater attention to civil considerations—the political,
social, economic, and cultural factors in an assigned area of operation—than does the conduct of conventional
offensive and defensive focused tasks. During operational area security the commander expands the IPB
process beyond geographical and force capability considerations. (See ATP 2-01.3 for additional information
on IPB for stability missions.) Information collection, specifically plan requirements and assess collection,
enables relevant, predictive, and tailored intelligence within an area of operation. (See ATP 2-01 for
additional information on the specific functions for stability missions.) Intelligence cells and knowledge
management elements within the IBCT and battalion headquarters develop procedures to share collected
intelligence data and products, both vertically and horizontally, throughout the force. (See ATP 2-19.4 for
additional information on intelligence techniques for stability missions.)
Understanding
4-95. Operational area security requires the integration of the IBCT and battalion’s information collection
effort to develop a clear understanding of all potential threats and the populace. Success in the stability
environment requires a cultural understanding to gauge the reaction of the civilian population within and
external to the battalion’s area of operations to a particular course of action conducted, to avoid
misunderstandings, and to improve the effectiveness of the execution of that course of action by the battalion
and/or IBCT. Changes in the behavior of the populace may suggest needed change in tactics, techniques,
and/or procedures or even strategy. Biographic information, leadership analysis, and methods of operation
within the existing cultural matrix are keys to understanding the attitudes and ability of positional and
reference civilian leaders to favorably or unfavorably influence the outcome of battalion area security
operations.
Indicators of Change
4-96. During area security operations, the commander and staff tie priority intelligence requirements to
identifiable indicators of change within the operational environment, to include, civil inhabitants and their
cultures, politics, crime, religion, economics, and related factors and any variances within affected groups of
people. The commander often focuses on named areas of interest in an effort to answer critical information
requirements to aid in tactical decision making and to confirm or deny threat intentions regardless of which
element of decisive action currently dominants. During area security operations, priority intelligence
requirements related to identifying enemy and adversary activities are tracked where appropriate.
Note. Medical personnel must know the Geneva Convention restrictions against medical personnel
collecting information of intelligence value except that observed incidentally while accomplishing
their humanitarian duties.
Permissive Environment
4-100. In a permissive environment, HUMINT collection teams normally travel throughout the AO without
escorts or a security element. HUMINT collectors may frequently make direct contact with overt sources,
view the activity, or visit the area that is the subject of the information collection effort. They normally use
debriefing and elicitation as their primary collection techniques to obtain firsthand information from local
civilians and officials.
Uncertain Environment
4-101. In an uncertain environment, security considerations increase, but risk to the collector is weighed
against the potential intelligence gain. An uncertain environment limits use of controlled sources and requires
additional resources. HUMINT collection teams should still be used throughout the AO but normally are
integrated into other ground reconnaissance or other missions. For example, a HUMINT collector may
accompany a patrol visiting a village. Security for the team and their sources is a prime consideration.
HUMINT collection teams are careful not to establish a fixed pattern of activity or arrange contacts in a
manner that could compromise the source or the collector. Debriefing and elicitation are still the primary
collection techniques. Teams are frequently deployed to conduct collection at checkpoints, refugee collection
points, and detainee collection points. They may conduct interrogations of detainees within the limits of
applicable laws and policies.
Hostile Environment
4-102. In a hostile environment, the three concerns for HUMINT collection are access to the sources of
information, timeliness of reporting, and security for the HUMINT collectors. A hostile environment requires
significant resource commitments to conduct controlled source operations. Prior to the entry of a force into
a hostile area, HUMINT collectors may be used to debrief civilians, particularly refugees, and to interrogate
other detainees who have been in the area. HUMINT collection teams are normally located with the friendly
units to facilitate timely collection and reporting. HUMINT collectors accompany the BCT lead elements or
ground reconnaissance forces during operations. They interrogate detainees and debrief refugees, displaced
persons, and friendly force patrols.
Security Missions
4-103. Due to the possibility of tying forces to fixed installations or sites, security missions may become
defensive in nature. When this occurs the battalion commander carefully balances with the need for offensive
action. Early warning of enemy activity through information collection is paramount in the conduct of area
security missions to provide the commander with time to react to any threat or other type change identified
within the stability environment. The battalion’s IPB identifies the factors effecting security missions within
the assigned area of operation. Factors, although not inclusive, include—
The natural defensive characteristics of the terrain.
The existing roads and waterways for military lines of communication and civilian commerce.
The control of land and water areas and avenues of approach surrounding the area security.
The control of airspace.
The proximity to critical sites such as airfields, power generation plants, and civic buildings.
FIRES
4-104. The conduct of fires in support of stability-focused tasks is essentially the same as for offensive- and
defensive-focused tasks. However, constraint is vital in the conduct of fires during stability-focused tasks.
Such constraint typically concerns the munitions employed and the targets engaged to obtain desired effects.
Constraint increases the legitimacy of the organization that uses it while potentially damaging the legitimacy
of an opponent.
Employment of Fires
4-105. Employment of fires provide continuous deterrents to hostile action and are a destructive force
multiplier for the commander, regardless of which element of decisive action currently dominants. Within
stability-focused tasks, the planning and delivering of fires precludes fires on protected targets, unwanted
collateral damage, and the political ramifications of perceived excessive fire. In addition to lethal effects, the
targeting functions of the battalion fire support cell includes nonlethal effects input to the information
collection plan and the targeting work groups at the IBCT and battalion headquarters (see appendix B for
targeting functions within the battalion fire support cell).
4-106. During the employment of fires, the commander having the ability to employ a weapon does not
mean it should be employed. In addition to collateral damage considerations, the employment of fires could
have second and third order negative effects. Collateral damage could adversely affect efforts to gain or
maintain legitimacy and impede the attainment of both short- and long-term goals. For example, excessive
force can antagonize those friendly and neutral parties involved. The use of nonlethal capabilities should be
considered to fill the gap between verbal warnings and deadly force to avoid unnecessarily raising the level
of conflict. Key considerations for employment of fires in support of stability-focused tasks include—
Stability-focused tasks conducted in noncontiguous areas of operation complicate the use of fire
support coordination measures, the ability to mass and shift fires, and clearance of fires
procedures.
Key terrain may be based more on political, cultural and/or social considerations than physical
features of the landscape; fires may be used more frequently to defend key sites than to seize them.
Rules of engagement are often more restrictive than in combat operations; commander’s guidance
for fires requires careful consideration during development and wide dissemination to all levels.
Precision-guided munitions and/or employment of nonlethal capabilities may be necessary to limit
collateral damage.
Fires that may be used to demonstrate capabilities, as a demonstration (see paragraph 2-433), or
during a denial operation (see paragraph 3-33).
Note. Mortars at the IBCT and below, due to their smaller bursting radius, reduce collateral
damage. Mortars are generally more responsive to the small unit operations common to area
security missions. In addition to lethal fires, mortars may provide illumination to demonstrate
deterrent capability, observe contested areas, or support area security missions [including
patrolling (reconnaissance and combat)].
synchronizes a range of non-lethal capabilities to produce non-lethal effects that advance the desired end
state. Thus, information operations participates in the targeting process.
Note. Fire support coordination, planning, and clearance demands special arrangements with joint
and multinational forces and local authorities. These arrangements include communications and
language requirements, liaison personnel, and procedures focused on interoperability. The North
Atlantic Treaty Organization standardization agreements (commonly called STANAGs) provide
excellent examples of coordinated fire support arrangements. These arrangements provide
participants with common terminology and procedures.
PROTECTION
4-109. Battalion activities associated with executing operational area security (ADRP 3-37), physical
security (see ATP 3-39.32), operations security (ADRP 3-37), and antiterrorism (ATP 3-37.2) tasks enhance
the security of the command within an area of operation. In large part, the measures within these four tasks
are the same or complementary. Stability-focused operations closely resemble battalion activities for these
tasks during the conduct of offensive- and defensive-focused operations though the battalion generally works
closer with civilian inhabitants. (Refer to FM 3-96 for additional information.)
Note. Deploying battalions and higher echelons should have a trained Level II antiterrorism officer
assigned. An assigned antiterrorism officer works to ensure that security considerations are
integrated in base designs and unit operations. These individuals guide their units in conducting
threat assessment, criticality assessments, and vulnerability analysis to determine each unit’s
vulnerability to terrorism. (Refer to ATP 3-91 and ATP 3-37.2 for additional information.)
Protection Template
4-111. The protection template lists and integrates all protection tasks in an appropriate way for use by
subordinate units, and any base and base cluster operations envisioned to be established during the battalion’s
area security operation. The protection cell when established within the battalion S-3 section, augments the
staff with a small protection planning cell that maintains and publishes the template in coordination with the
IBCT protection cell. The template is use as a reference prior to or during employment. Battalion and
base/base cluster situational modifications to this template, and their regular rehearsal of all parts of their
protection plans are inspected periodically by the IBCT protection working group. During inspections, the
protection working group identifies weak areas in subordinate protection plans, ensures that area of operation
protection best practices are incorporated into the plans of the battalion, and provides protection-related
observations, insights, and lessons learned to subordinate units, and any unit relieving the battalion or
subordinate unit within its area of operation.
Note. When a protection cell officer and/or noncommissioned officer is not designated within or
attached to the battalion, protection cell functions and tasks are the responsibility of the battalion
operations officer and/or noncommission officer. Key protection tasks conducted within the
IBCT’s and battalion’s area security operation include area security, CBRN operations,
coordinating air and missile defense, personnel recovery, explosive ordnance disposal, and
detainee operations. (Refer to FM 3-96 for additional information on integrating and
synchronizing protection tasks.)
Protective Services
4-112. The commander may determine that it is necessary (or be required) to provide protective services
from within the battalion to protect high value host nation civil and military authorities or other selected
individual(s). This requirement usually occurs when host nation security forces have been so extensively
penetrated by hostile elements that they cannot be trusted to provide protective services or when host nation
security forces lack the technical skills and capabilities to provide the desired degree of protection. The
element(s) tasked to perform protective services for designated personnel receives as much training and
specialized equipment as is possible prior to the mission. (Refer to ATP 3-39.35 for additional information.)
Note. Dependent on the situation, host nation security forces are involved as much as possible in
the performance of the above protection tasks. Host-nation support is important in the variety of
services and facilities that can support security and protection of assets within the battalion’s area
of operation. Services provided by the host nation relieve the battalion of the need to provide
equivalent capabilities thereby reducing the battalion’s sustainment and protection footprint.
Threat Levels
4-114. Threats within the battalion’s security area operation are categorized by the three levels of defense
required to counter them. Any or all threat levels may exist simultaneously in the battalion’s area of operation.
Emphasis on base defense and security measures may depend on the anticipated threat level. Within the
battalion’s area of operation all elements protect themselves from Level I threats. This includes medical
elements although they have reduced defensive capabilities since they can only use their non-medical
personnel to provide their own local security. Locating medical elements on bases with other units mitigate
this factor.
4-115. The battalion commander positions response forces to respond to a level II threat (enemy force or
activities that can be defeated when augmented by a response force) in appreciation of time-distance factors
so that no element is left outside supporting distance from a response force. The commander integrates fire
support assets into the composition of the response because of the speed at which these assets can react over
the extensive distances involved in area security operations. Where possible, host nation security assets
constitute part of the response to smooth the interactions of these forces with the civilian population.
Note. A Level III threat is an enemy force or activities beyond the defensive capability of any
local reserve or response force. The response to a Level III threat is a tactical combat force,
generally established no lower than division level due to the inability to resource at lower echelons.
(See appendix I for additional information on threat levels.)
Survivability
4-116. Precautions should be taken to protect positions, headquarters, support facilities, and
accommodations including the construction of obstacles, protective bunkers, fighting positions, and shelters.
Battalion subordinate units practice alert procedures and develop drills to occupy positions. Engineer forces
enable, when available, survivability needs. Units maintain proper camouflage and concealment based on the
mission variables of METT-TC. Area security forces are vulnerable to personnel security risks from local
employees and other personnel subject to bribes, threats, or compromise. The threat from local criminal
elements is a constant threat and protection consideration. The most proactive measure for survivability is
individual awareness by Soldiers in all circumstances. Soldiers look for things out of place and patterns
preceding aggression. Commanders and subordinate leaders ensure Soldiers remain alert, do not establish
routines, and maintain appearance and bearing. (Refer to chapter 3 and ATP 3-37.34 for additional
information.)
Notes.
In stability-focused operations, the enemy sniper poses a significant threat to dismounted (or
mounted) movement and marches. Counter-sniper drills should include rehearsed responses,
reconnaissance and surveillance (R&S), and cover and concealment. The battalion’s rules of
engagement provide instructions on how to react to sniper fire, including restrictions on weapons
used depending on the circumstances. For example, rules of engagement may allow units to use
weapon systems, such as a sniper rifle team, to eliminate a positively identified sniper even in a
crowded urban setting because of the reduce possibility for collateral damage. (Refer to
Appendix E and ATP 3-21.18 for additional information.)
An enemy improvised explosive device (IED) attack is another major threat to dismounted (or
mounted) movement and marches. Prior to the conduct of any area security mission, commanders
and subordinate leaders brief personnel on the latest IED threat types, usage, and previous
emplacements within an area of operation or along mounted and dismounted movement or march
routes. All Soldiers maintain situational awareness by looking for IEDs and IED hiding places.
Units vary routes and times, enter overpasses on one side of the road and exit out the other, train
weapons on overpasses as the movement passes under, and avoids chokepoints to reduce risk.
Units should expect an IED attack at any time during movements and expect an ambush
immediately after an IED detonation. Early mornings and periods of reduced visibility are
especially dangerous since the enemy has better opportunities to emplace IEDs without detection.
(Refer to ATP 3-21.18 and ATP 3-21.8 for additional information.)
Note. See ATP 3-01.15 for information on the tactics, techniques, and procedures for an integrated
air defense system. See ATP 3-01.50 for information on the operations of the air defense and
airspace management cell established within the IBCT fire support cell.
4-118. Counterrocket, artillery, and mortar batteries may be located in or near the battalion’s area of
operation to support its area security mission. Battery sensors detect incoming rockets, artillery, and mortar
shells and may be used to detect Group 1 and 2 unmanned aircraft systems. The battery’s fire control system
predicts the flight path of incoming rockets and shells, prioritizes targets, and activates the supported area of
operation’s warning system according to established rules of engagement. Exposed elements within the area
of operation then can take cover and provide cueing data that allows the battery’s weapon system to defeat
the target before the target can impact the area. The commander clearly defines command and support
relationships between counter-rocket, artillery, and mortar elements and the battalion during planning. (Refer
to ATP 3-01.60 for additional information.)
4-119. The battalion commander and subordinate leaders ensure all passive and active air defense measures
(see chapter 2) are well planned and implemented. Passive measures include use of concealed routes and
assembly areas, movement on secure routes, marches at night, increased intervals between elements of the
columns, and dispersion. Active measures include use of organic and attached weapons according to the
operations order (OPORD) and unit SOP. Air guard duties assigned to specific Soldiers during dismounted
(or mounted) movements and marches give each a specific search area. For movements and marches, seeing
the enemy first gives the unit time to react. Leaders understand that scanning for long periods decreases the
Soldier’s ability to identify enemy aircraft. During extended or long movements and marches, Soldiers are
assigned air guard duties in shifts. (Refer to ATP 3-21.18 and ATP 3-21.8 for additional information.)
Convoy Security
4-124. Convoy security is a specialized kind of area security operations conducted to protect convoys. Units
conduct convoy security operations anytime there are insufficient friendly forces to secure routes
continuously in an area of operations and there is a significant danger of enemy or adversary ground action
directed against the convoy. The battalion may conduct convoy security operations in conjunction with route
security operations within its area of operation. Planning includes designating units for convoy security;
providing guidance on tactics, techniques, and procedures for units to provide for their own security during
convoys; or establishing protection and security requirements for convoys carrying critical assets. Local or
theater policy typically dictates when or which convoys receive security and protection. (Refer to
ATP 4-01.45 for additional information.)
SUSTAINMENT
4-125. The battalion commander’s responsibilities during area security includes support areas and extends
to self-protection of battalion assets operating outside of the battalion echelon support area(s. Forces engaged
in area security operations protect the force, installation, route, area, or asset. Area security operation are
often designed to ensure the continued conduct of sustainment operations to support decisive and shaping
operations by generating and maintaining combat power. Area security operations may be the predominant
method of protecting echelon support areas that are necessary to facilitate the positioning, employment, and
protection of resources required to sustain, enable, and control forces.
4-126. The battalion commander and staff must plan for and coordinate protection for subordinate units and
detachments located within and away from the battalion support area. While the battalion S-3 is responsible
overall for developing the support area(s) security plan, the battalion S-2 assists by developing the
information collection plan to support intelligence operations, reconnaissance, surveillance, and security
operations within the battalion support area. The battalion commander uses the intelligence preparation of
the battlefield to analyze the mission variables of enemy, terrain, weather, and civil considerations to
determine their effect on sustainment operations.
4-127. The enemy may avoid maneuver forces, preferring to attack targets commonly found in sustainment
areas. Sustainment elements must organize and prepare to defend themselves against ground or air attacks.
The security of the trains at each echelon is the responsibility of the individual in charge of the echeloned
trains. All elements in, or transiting the support area, assist with forming and defending the area. Based on
mission analyses, the battalion S-3 subdivides the area, and assigns subordinate and tenant units to those
subdivided areas. When a subordinate or tenant unit receives a change of mission or can no longer occupy
an assigned area, area adjustments are made to the support area by the battalion S-3. When a particular supply
point is sufficiently large, it may be assigned its own area for defense, and a security force may be attached
to provide security. (Refer to ADRP 3-37 for additional information.) Additional activities to enable echelon
support area(s security include—
Select sites that use available cover, concealment, and camouflage.
Use movement and positioning discipline, as well as noise and light discipline, to prevent
detection.
Establish area defenses.
Establish observation posts and conduct patrols.
Position weapons (small arms, machine guns, and antitank weapons) for self-defense.
Plan mutually supporting positions to dominate likely avenues of approach.
Prepare a fire support plan.
Make area of operations sketches and identify sectors of fires.
Emplace target reference points to control fires.
Integrate available combat vehicles within the trains into the plan and adjust the plan when
vehicles depart.
Conduct rehearsals.
Establish rest plans.
Identify an alarm or warning system to enable rapid execution of the defense plan.
Designate a response force (see ATP 3-37.10) with appropriate fire support.
Ensure the reaction force is equipped to perform its mission.
Ensure the reaction force is well-rehearsed or briefed on—
Unit assembly.
Friendly and threat force recognition.
Actions on contact.
4-128. The Infantry battalion S-4, in coordination with the battalion S-3, select battalion supply routes
within the area of operation. A supply route is selected based on the terrain, friendly disposition, enemy
situation, and scheme of maneuver. Alternate supply routes are planned in the event that a main supply route
is interdicted by the enemy or becomes too congested. In the event of CBRN contamination, either the
primary or the alternate supply route(s) can be designated as the dirty main supply route to handle
contaminated traffic. Alternate supply routes should meet the same criteria as the main supply route. Military
police may assist with regulating traffic and the security of routes and convoys on those routes, and engineer
units, if available, can maintain routes. (Refer to ADRP 3-37 for additional information.) Battalion supply
route(s) considerations include—
Location and planned scheme of maneuver for subordinate units.
Location and planned movements of other units moving through the battalion’s area of operation
and within the IBCT‘s area of operations.
Route classification, width, obstructions, steep slopes, sharp curves, and roadway surface.
Two-way, all-weather trafficability.
Classification of bridges and culverts. Location and planned scheme of maneuver for subordinate
units.
Requirements for traffic control such as choke points, congested areas, confusing intersections, or
through built-up areas.
Location and number of crossover routes from the main supply route to alternate supply routes.
Requirements for repair, upgrade, or maintenance of the route, fording sites, and bridges.
Route vulnerabilities that must be protected, such as bridges, fords, built-up areas, and choke
points.
Enemy threats such as air attack, mines, ambushes, and CBRN attacks.
Known or likely locations of enemy penetrations, attacks, CBRN attacks, or obstacles.
Known or potential civilian and refugee movements that must be controlled or monitored.
4-129. Security of supply routes may require the battalion commander or IBCT commander to commit
combat units. The security and protection of supply routes along with lines of communications are critical to
military operations since most support traffic moves along these routes. (Refer to appendix H for additional
information.)
PREPARATION
4-130. During preparation activities, the Infantry battalion continues to plan, train, organize, and equip for
area security missions within its area of operation. The conduct of preparation activities in support of
stability-focused tasks is essentially the same as for offensive- and defensive-focused tasks. (See ADRP 5-0
for a complete discussion.) However, factors that distinguish stability-focused tasks are the increased
requirement for interagency coordination at battalion level and below and the demands on the battalion staff
to perform tasks or functions outside their traditional scope of duties. The commander’s realignment of
organizations and functions during operational area security reflect carefully weighing and acceptance of risk
(for example—economy of force) to reflect the demands of the battalion’s area security mission.
MISSION COMMAND
4-131. Stability-focused tasks within area security operations tend to be more complex and involve to a
greater extent unified action partners. Battalion preparatory activities stress authoritative relationships
established between the battalion and the other military service components or agencies that operate in
assigned or projected areas of operation. Though difficult, the battalion commander strives to achieve unity
of command, spending a great deal of effort during preparations to clarify the roles and functions of the
various, often completing agencies. The battalion commander, when required, modifies standard command
and support relationships to meet the requirements of the situation.
Inherent Responsibilities
4-132. The battalion commander has inherent responsibilities—including the requirements to clarify the
mission; to determine the controlling legal and policy authorities; and to organize, direct, sustain, and care
for the organizations and individuals for whom they provide the effort in interagency and multinational
operations. The commander serves as the unit’s chief engager, responsible for informing and influencing
audiences inside and outside the organization. For example, the commander often integrates host nation
security forces and interagency activities with subordinate companies and platoons and down to the
individual Soldier level for support units. With this in mind, obtaining the necessary numbers of scalable
communications packages and linguist to support the battalion’s planned operations and training are
important preparatory activities.
Note. Defining the ground rules for sharing unclassified information between the battalion, other
military forces and foreign governments, nongovernmental organizations and international
agencies according to higher commander policy is an important function of the division and IBCT
knowledge management and foreign disclosure officers. The division G-6 and IBCT signal staff
officer (S-6) staff sections are responsible for disseminating and implementing those ground rules
to the Infantry battalion.
Degree of Risk
4-139. The degree of risk the battalion commander accepts within an area security operation, regarding the
enemy threat, invariably passes to the subordinate unit commander assigned the area security mission. For
example, the subordinate unit commander moves security forces to decrease the threat’s impact on logistics
and medical units to support the battalion’s continued operations at the anticipated level. When available and
to not divert any battalion assets from their primary area security missions, military police (see ATP 3-39.30)
or other available security force (possibly host nation) screen or guard friendly command post facilities and
critical sites from enemy observation or attack. Subordinate unit security plans, to protect command posts,
critical sites, base, base clusters, and security corridors, are rehearsed and inspected by the commander. These
plans address support unit, site, and base and convoy defense against Level I threats. Plans also address
response force operations directed against Level II and Level III threats (see paragraphs 4-105 and 4-106 and
appendix I for additional information on threat levels).
Terrain Management
4-140. Terrain management is the process of allocating terrain by establishing areas of operation. The
commander designates assembly areas and specifies locations for units and activities to deconflict
movements and repositioning of units, and other activities that might interfere with each other. Subordinate
commanders assigned an area security mission manage terrain within their boundaries and identify and locate
key terrain in the area. The battalion operations officer, with support from others in the staff, deconflict
operations, control movements, and deter fratricide as units move to execute planned area security missions.
The commander and staff also track and monitor unified action partners and their activities in the battalion’s
area of operation.
Terrain Preparation
4-141. Terrain preparation starts with the situational understanding of the terrain through proper terrain
analysis. Terrain preparation involves shaping the terrain to gain an advantage, such as improving cover,
concealment and observation, fields of fire, new obstacle effects through reinforcing obstacles, or mobility
operations for initial positioning of forces. Terrain preparation can make the difference between the area
security operation’s success and failure. Commanders must understand the terrain and the infrastructure of
their area of operations as early as possible to identify potential for improvement and establish priorities of
work, and to begin preparing the area.
INTELLIGENCE
4-142. As the battalion prepares, the commander takes every opportunity to improve situational
understanding prior to and during operations specific to aggressive and continuous collection. The
commander executes collection, focused on requirements tied to the execution of tactical missions [normally
intelligence operations (undertaken by military intelligence units and Soldiers), reconnaissance, surveillance,
and security operations], early in planning and continues it through preparation and execution.
Note. Intelligence operations are tasks undertaken by military intelligence units and Soldiers to
obtain information to satisfy validated requirements (ADRP 2-0).
Information Collection
4-143. Through information collection, the commander and staff continuously plan, task, and employ
collection forces and assets to collect timely and accurate information. Collection helps to satisfy the CCIRs,
in addition to other information requirements. Collection efforts within the battalion worked through the
battalion intelligence cell (specifically the intelligence staff officer) to the IBCT intelligence cell. Intelligence
cells, in coordination with the IBCT provost marshal, work to develop a readily searchable database—
including biometric data if possible—of potential insurgents, terrorists, and criminals within the battalion’s
area of operation. This information is use by patrols to identify individuals, according to applicable guidance,
when encountered during civil reconnaissance patrols (see ATP 3-21.8) and other operations. (Refer to
appendix B for additional information.)
PROTECTION
4-145. As preparation activities continue, the commander’s situational understanding may change over the
course of the area security operation, enemy actions may require revision of the security plan, or unforeseen
opportunities may arise. Protection assessments made during planning may be proven true or false.
Intelligence analysis from R&S may confirm or deny enemy actions or show changed security conditions in
the area of operations because of shaping operations. The status of friendly forces may change as the situation
changes. In any of these cases, the commander identifies the changed conditions and assesses how the
changes might affect upcoming area security missions. Significant new information requires commanders to
make one of three assessments listed below regarding the area security plans:
SUSTAINMENT
4-147. Resupplying, maintaining, and the issuing of supplies or equipment occur during temporary and long
term area security commitments. Repositioning of sustainment assets also occur. During preparation,
sustainment planners take action to optimize means (force structure and resources) for supporting the
commander’s area security plan. These actions include, but are not limited to, identifying and preparing bases,
host-nation infrastructure and capabilities, contract support requirements, and lines of communications. They
also include forecasting and building operational stocks as well as identifying endemic health and
environmental factors. Integrating environmental considerations will sustain vital resources and help reduce
the logistics footprint. Planners focus on identifying the resources currently available and ensuring access to
them. During preparation, sustainment planning continues to support operational planning (branch and sequel
development) and the targeting (lethal and nonlethal) process.
4-148. Dependent on the mission variables of METT-TC, sustainment elements may support the battalion
from within its area of operation or from echelon support areas located outside the area of operation. The
threat within the assigned area of operation is generally the major consideration in determining the size and
composition of forces (support and operational) arrayed during an area security operation. Support elements
(and any other force) within the battalion’s area of operation must be able to defend themselves against a
level I threat, a small enemy force that can be defeated by those units normally operating in the echelon
support area or by the perimeter defenses established by friendly bases and base clusters. The battalion
commander uses a response force to response to a level II threat (see paragraph 4-108). Host nation security
forces, when feasible, may be an effective means of reinforcing the security of sustainment elements
supporting from within and external to the battalion’s area of operation because of their knowledge of the
area, its language, and customs. (Refer to appendix H for additional information.)
Notes.
Base and base cluster defense is the cornerstone of successful operational area security and support
area efforts. The commander achieves the application of effective area security for base and base
clusters and their tenant and transient units by developing a comprehensive plan linked to site
selection, layout, and facility design. Appendix I outlines the organization of forces, control
measures, and considerations pertaining to planning, preparing, and executing base and base
cluster operations.
The commander and staff assess the need for providing protection to contractors operating within
the battalion’s area of operation and designate forces to provide security to them when appropriate.
The mission of, threat to, and location of each contractor determines the degree of protection
needed. Protecting contractors involves not only active protection to provide escort or perimeter
security, but also training and equipping of contractor personnel in self-protection (protective
equipment and weapons). Under certain conditions, contract security forces may be another means
of reinforcing the security of sustainment elements supporting from within and external to the
battalion’s area of operation, and base and cluster defenses.
EXECUTION
4-149. Though close combat dominance remains the principal means to influence enemy actions, the
conditions and standards of performance are modified by the mission variables of METT-TC and the more
restrictive rules of engagement required during the conduct of stability-focused tasks. The general scope of
battalion missions supporting stability-focused tasks include security operations, patrols and patrolling
(reconnaissance and combat), intelligence operations (for example human intelligence assets from outside
the battalion), surveillance (ground forces and aerial assets), convoy security, and Soldier and leader
engagements. Additionally, missions often require the establishment of static security posts, base and base
clusters, searches, roadblocks, checkpoints, observation posts, and combat outposts supports the conduct of
stability-focused tasks. The condition set surrounding each mission differs and requires detailed analysis and
planning.
Note. In the illustrations below, the IBCT conducts area security operations to establish stability
after open hostilities cease. With the complex and dynamic nature of an area security operation, it
is important to remember that area security tasks and activities change from day to day, based
upon the mission variables of METT-TC.
engineer battalion, and the brigade support battalion headquarters collocate with the IBCT headquarters
elements in FOB Talon.
Figure 4-2. IBCT area security operation (nonlinear and noncontiguous areas of operation),
example
4-154. The IBCT is task organized with one field artillery battery (M777) positioned within FOB Talon.
An explosive ordnance disposal company, positioned in FOB Talon, supports operations across the IBCT’s
area of operation. A Special Forces Detachment locates in the western province to support IBCT operations.
An Infantry rifle platoon augments the detachment to assist in base defense and day-to-day operations.
Company D (from Infantry Battalion 2), with two assault platoons, establishes IBCT reserve in the eastern
province. Company D’s, IBCT reserve, be prepared mission is to respond to activities within unassigned
areas of the IBCT and Infantry Battalion 2.
Infantry Battalion 1
4-155. Infantry Battalion 1, responsible for assigned area of operation in the western province, conducts
area security and maintains lines of communication running north to south along route 1. Battalion main
command post locates in Combat Outpost 1. Battalion mortars operate in split section with one mortar section
located Combat Outpost 1 and one mortar section located Combat Outpost 3. The battalion, augmented with
a route clearance package, prevents the enemy from influencing operations along route 1. Rifle companies,
illustrated in the example, are responsible for area security within their area of operation in support of host
nation operations. Company A, with attached assault platoon, initially occupies Combat Outpost 3 then
moves to establish Combat Outpost 6 in Area of Operation 6. Company B initially collocates with Company
A in Combat Outpost 3. Company C occupies Combat Outpost 1. Company D, with two assault platoons,
establishes battalion reserve in the western province. Company D’s, battalion reserve, be prepared mission
to respond to activities within the unassigned areas of the battalion.
Infantry Battalion 2
4-156. Infantry Battalion 2, responsible for assigned area of operation in the eastern province, conducts area
security and maintains lines of communication running north to south along Route 2. Battalion main
command post locates FOB Talon. Battalion mortars operate in split section with one mortar section located
FOB Talon and one mortar section located Combat Outpost 4. Rifle companies, illustrated in the example,
are responsible for area security within their areas of operation in support of host nation operations. Company
A occupies Combat Outpost 4. Company B, with attached assault platoon, operates out of FOB Talon to
conduct operations in Area of Operation 7. Company C operates out of FOB Talon to conduct operations in
Area of Operation 8. Company D, with two assault platoons, establishes IBCT reserve in the eastern province.
Company B and Company C based out of FOB Talon supports, as required, the brigade engineer battalion’s
base defense of FOB Talon.
Infantry Battalion 3
4-157. Infantry Battalion 3, under division control, is the tactical combat force (see paragraph I-32) for level
III threats to divisional assets (not illustrated).
Cavalry Squadron
4-158. Cavalry squadron commander and staff, located FOB Talon, conduct mission command for
reconnaissance, surveillance, and security operations within the unassigned areas (specifically the mountain
range separating the eastern and western provinces) of the IBCT as required. Troop A occupies Combat
Outpost 5 with attached assault platoon, conducts area security within Area of Operation 5. Troop B, response
force, positions at the airfield on FOB Talon. Troop C supports route clearance operations along route 2, on
order, conducts reconnaissance and security operations within the unassigned areas of the IBCT.
Note. The ability of the Army aviation commander, in coordination with the ground commander,
to exercise mission command is essential to the execution of air-ground operations (see appendix
C). The optimal establishment of command posts, integration of the air and ground staffs, and
utilization of mission command systems are integral to both commanders’ ability to understand,
visualize, describe, direct, lead, and assess operations. Air-ground operations are complicated
more when host nation and multinational partners participate in, or are in support of area security
operations. Army aviation facilitates mission command with airborne command and control
systems and communication relay packages, a key enabler in area security operations. (Refer to
ATP 3-04.1 for additional information.)
operations include special reconnaissance, high value target extraction, and security force assistance to host
nation special forces within the IBCT’s area of operation.
Note. The route clearance platoon from the brigade engineer battalion provides for its own security
during clearance operations. As part of a larger effort with an increased threat, an Infantry rifle
company or platoon conducts route clearance operations with an attached route clearance package.
Figure 4-3. Battalion area security operation (nonlinear and contiguous areas of operation),
example
Note. The following scenario, used for discussion purposes, represents one way the Infantry
battalion may employ forces during the conduct of an area security operation. In this scenario, the
Infantry battalion’s area security operation spans an area of operation approximately 45 kilometers
wide and 35 kilometers in length. Example battalion employment follows:
4-165. In this example, the battalion conducts security force assistance to help organize, train, equip,
rebuild, and advise host nation forces. Select forces within the battalion, tasked organize to align with the
appropriate counterpart, plan, prepare, and execute security force assistance. When conducting unilateral and
partnered operations and training it is important for subordinate commanders and leaders to assess the
potential for an insider attack. Commanders and leaders take the appropriate precautions to prevent insider
threats by identifying personnel to pull security (covertly) at each echelon, and having all participants to
remain vigilant in identifying insider threat behavior. (See section IV for additional information on security
force assistance.)
4-166. During mission analysis, the commander and staff identify specific targets and areas likely to benefit
ongoing operations through lethal and nonlethal means. (Lethal [for example, mortars and artillery, Army
attack aviation-manned and unmanned, and close air support] and nonlethal [for example, electronic warfare,
see appendix B of this publication] effects are planned for and allocated to companies in support of
operations.) The company commander identifies priority of effort to subordinate platoons based upon
METT-TC. Companies resource details from subordinate elements to secure the battalion commander,
command sergeants major, or other headquarters personnel necessary to be on a mission outside a secured
perimeter, typically referred to as a personal security detachment.
4-167. The battalion commander and subordinate commanders ensure appropriate measures are taken to
account for all Soldiers at all times. Personnel recovery is the sum of military, diplomatic, and civil efforts
to prepare for and execute the recovery and reintegration of isolated personnel (JP 3-50). Commanders
conduct contingency planning and coordinate actions to be taken for the potential of missing personnel
(commonly called duty status whereabouts unknown [DUSTWUN]) to expedite personnel recovery in the
event it happens. Contingency planning and coordination covers immediate actions to recover missing
personnel. Examples of these actions may include securing avenues an enemy may use to flee with kidnapped
friendly personnel, clearing operations that clear an area of known enemy and facilitate locating personnel
gone missing, and coordination/communication outside of the unit to expedite recovery. (Refer to FM 3-50
for additional information.)
4-168. The battalion commander, with the assistance of the battalion S-3, ensures subordinate unit
movement and maneuver is coordinated to prevent bottlenecks, and allow friendly freedom of movement. As
operations continue the commander arrays forces as needed to meet mission requirements for a given day.
As the commander assigns each company an area of operation, within each company the company
commander assigns platoon missions based on the battalion concept of operation and upon changes within
their area of operation.
Company A
4-170. Company A, assigned the northeastern area of operation within the battalion, conducts cordon and
knock due to the permissive nature of the threat. (See ATTP 3-06.11 for additional information on the cordon
and knock technique.) Company A is the main effort for the battalion on this day. The purpose of Company
A’s mission is threefold: gather information from the local populace regarding possible enemy in the area,
identify suspected weapons staging/cache sites used to enable smuggling into the eastside of the battalion’s
area of operation, and provide humanitarian aid to the local village by handing out blankets and having
healthcare personnel screen children for possible illnesses.
Company B
4-171. Company B, assigned the northwestern area of operation within the battalion, conducts cordon and
kick due to the non-permissive nature of the threat. (See ATTP 3-06.11 for additional information on the
cordon and kick technique.) Company B is a shaping operation for the battalion on this day. The purpose of
Company B’s mission is to kill or capture members of a known insurgent cell and weapons smuggling ring
in an area identified during the targeting process. The company collects information on enemy activities in
the area and criminal facilitators during the operation. The company searches potential weapons cache sites
suspected of use prior to the movement of these weapons to the eastern side of the battalion’s area of
operation.
Company C
4-172. Company C, assigned the southeastern area of operation within the battalion, establishes Combat
Outpost 1 and executes operations south of Route Ford. Company C conducts clearance of NAI 5 and NAI
6 and overwatches NAI 10 and NAI 11 to deny enemy lines of communication, and access to cache and
enemy indirect fire locations. The establishment of small kill teams/ambushes, strictly adhering to rules of
engagement practices, engage enemy who attempt to influence friendly operations. Third platoon, located
Base Gecko, conducts battalion reserve mission.
Company D
4-173. Company D (not illustrated), under IBCT control, establishes the IBCT response force within
Infantry Battalion 2’s area of operation in the eastern portion of the IBCT’s area of operation. Infantry
Battalion 2 has an area of operation four times the size of Infantry Battalion 1’s area of operation.
OPERATIONAL OVERVIEW
4-177. SFA activities are conducted to organize, train, equip, rebuild (or build), and advise foreign security
forces from the ministerial/department level down through the tactical units. The Department of Defense
maintains capabilities for SFA through conventional forces, special operations forces, the civilian
expeditionary workforce, and when necessary contractor personnel in both joint operational area and a
non-joint operational area environment. SFA activities require carefully selected and properly trained and
experienced personnel (as trainers or advisors) who are not only subject matter experts, but also have the
sociocultural understanding, language skills, and seasoned maturity to more effectively relate to and train
FSF. Ideally, SFA activities help build the FSF capacity to train their own forces independent of sustained
United States Government efforts.
Note. Department of Defense Instruction 5000.68, Security Force Assistance (SFA), dated
27 October 2010. With, through, and by. Describes the process of interaction with FSF that
initially involves training and assisting (interacting “with” the forces). The next step in the process
is advising, which may include advising in combat situations (acting “through” the forces). The
final phase is achieved when foreign security forces operate independently (act “by” themselves).
Note. For the purpose of the following discussion, SFA is addressed within the initial response,
transformation, and fostering sustainability phases of the stability framework.
Note. A provincial reconstruction team embedded at BCT level is a key element during the
conduct of security force assistance. The BCT leads the effort to establish civil security, establish
civil control (when approved by Congress), and to develop and enable foreign security forces. The
embedded provincial reconstruction team has the lead for support to economic and infrastructure
development, restore essential services, and support to governance. Together the BCT and an
embedded provincial reconstruction team are able to effectively support the FSF and execute all
six primary stability tasks.
security forces—U.S., other, and FSF—provide a secure environment and reduce the threat. As security
conditions improve, transition to the transformation phase begins.
Transformation Phase
4-182. In the transformation phase, SFA activities seeks to assist FSF to stabilize the operational
environment in a crisis or vulnerable state. The operational environment in this phase is more permissive
than the initial response phase; however, military forces will often be required to provide security to some
actors. Activities in this phase normally include a broad range of post-conflict reconstruction, stabilization,
and capacity-building efforts, which the embedded provincial reconstruction team is essential for long-term
success. Objectives in this phase include continuing efforts to improve the security situation, reducing the
threat to the populace, building host-nation capacity across the stability sectors, and facilitating the
comprehensive approach to assist FSF.
4-183. The transformation phase represents a broad range of SFA activities to support FSF. The initial
response phase differs from the transformation phase in the FSF capability to provide for a safe and secure
environment. More specifically, FSFs may have a level of proficiency to no longer need a permanent U.S.
and FSF relationship for tactical operations. However, they may still need full-time advisors and support,
sustainment, and medical assistance. Embedded provincial reconstruction team members will continue to
play a vital role in assisting governance and development efforts throughout this phase. SFA end state for
this phase seeks to establish conditions so the host nation’s security sector can provide a secure environment
with its own security forces.
TRANSITIONS
4-185. Transitions during SFA are dependent upon the conditions within the operational environment.
Transitions are initially identified during planning using a comprehensive approach (see paragraphs 4-174).
Transitions can occur simultaneously or sequentially in different levels or war and in separate echelons, to
include having potentially at the tactical level, transitions for different units within the battalion’s area of
operations. Major transitions can include the Infantry battalion in the beginning of an initial response phase
being the supported unit with the FSF transitioning to the supported unit later on in the phase. At this point
in the transformation phase, the area in which the battalion conducts SFA will expand. This expansion can
occur multiple times during the transformation phase, which is based on conditions, especially the capability
and capacity of FSF. The commander, to facilitate flexibility, visualizes and incorporates branches and
sequels into the overall plan to enable transitions. Unless planned, prepared for, and executed efficiently,
transitions can reduce the tempo of the operation, slow its momentum, and surrender the initiative.
PLANNING CONSIDERATIONS
4-186. Planning for SFA, like any other operation, begins either with the anticipation of a new mission or
the receipt of mission as part of the military decision-making process. The Army design methodology is
particularly useful as an aid to conceptual planning when integrated with the detailed planning typically
associated with the military decision-making process to develop the capacity and capability of FSF and their
supporting institutions. Planning helps the commander create and communicate a common vision between
the staff, subordinate commanders, and unified action partners. Planning results in a plan and orders that
synchronize the action of participating partners in time, space, and purpose to achieve objectives and
accomplish missions.
COMPREHENSIVE APPROACH
4-187. SFA planning requires a comprehensive approach, as well as an in-depth understanding of the
operational environment (see paragraph 4-175). Planning must be nested within policy, internal defense and
development strategy, the campaign plan, and any other higher-echelon plans. Continuous and open to
change, planning for SFA includes identifying how to best assist the FSF and developing a sequence of
actions to change the situation. Planning involves anticipating consequences of actions and developing ways
to mitigate them.
Note. Internal defense and development (known as IDAD) focuses on building viable institutions
(political, economic, social, and military) that respond to the needs of society. Ideally, internal
defense and development is a preemptive strategy. However, if an insurgency or other threat
develops, it becomes an active strategy to combat that threat. To support the host nation
effectively, U.S. forces, especially planners, consider the host-nation’s internal defense and
development strategy. (Refer to FM 3-22 for additional information.)
4-188. Considering the elements of operational art provides the IBCT commander and staff with a
combination of conventional forces while leveraging the unique capabilities of special operations forces, to
assist in achieving SFA objectives. The planning for and selection of the appropriate mix of military forces,
civilian expeditionary workforce, and/or civilian personnel and contractors should be a deliberate decision
based on thorough mission analysis and a pairing of available capabilities to requirements. Important factors
to consider in these decisions include the nature of the host-nation force, the nature of the skills or
competencies required by the host-nation force, and the nature of the situation and environment into which
U.S. forces will deploy.
UNDERSTANDING
4-189. Understanding the operational environment is fundamental to all operations, and essential to SFA
activities. An in-depth understanding of the operational environment includes the size, organization,
capabilities, disposition, roles, functions, and mission focus of host-nation forces, opposing threats, regional
players, transnational actors, joint operational area, or non-joint operational area of responsibility, especially
the sociocultural factors of the indigenous and other relevant populations. Identifying all actors influencing
the environment and their motivations will help planners and practitioners define the goals and methods for
developing host-nation security forces and their institutions.
4-190. The plan, which includes the commander’s intent, provides understanding to U.S. and FSF on the
actions to take. (SFA planning may involve the development of non-military security forces and their
supporting institutions.) Plans and orders provide decision points and branches that anticipate options that
enable the force to adapt as the operation unfolds. This is especially important for SFA, as these operations
tend to be prolonged efforts. Units conducting SFA often rotate before achieving all objectives. As a result,
planning should establish objectives and milestones that can be achieved during the battalion’s mission.
These objectives and milestones must support higher echelon plans, including the campaign plan and internal
defense and development strategy.
Note. SFA planning may involve the development of nonmilitary security forces and their
supporting institutions.
LEGITIMACY
4-191. Legitimacy of the forces providing SFA may be tenuous during some phases of a complex operation,
but it is an essential consideration for achieving long-term objectives. SFA should aim to ensure that all FSF
operate within the bounds of domestic and international laws, respect human rights, and that they support
wide-ranging efforts to enforce and promote the rule of law, thus supporting legitimacy and transparency.
Legitimacy fosters transparency and confidence among host-nation government, FSF, host-nation
population, and United States Government agencies. Another aspect of legitimacy is supporting host-nation
ownership in the SFA effort, because it facilitates a sense of sustainability for building a capacity or security
reform through acceptance by the host-nation population.
4-192. Throughout planning, the commander and staff consider how each SFA activity affect popular
perceptions, and focus on the activities that enable the legitimacy of the host-nation government and FSF,
not just make them technically competent. Commander and staff must ensure an appropriate information
management plan is developed for SFA in coordination with interagency partners and the IBCT or other
higher headquarters. SFA advisors/trainers must work with the FSF to give a positive context and narrative
to the FSF professionalization efforts and capacity to secure the population. Coordination of the information
themes and messages among the U.S., FSF, and the host-nation government, and the presentation or
availability of information to the indigenous population can limit or mitigate the propaganda efforts of
insurgents or hostile forces. This may serve to mitigate the potential for destabilizing influences of hostile
forces or criminal elements to propagandize SFA efforts and damage the host-nation government’s credibility
and legitimacy.
Note. Employing operational forces to fill SFA capabilities associated with developing the FSF
generating function (FSF tasks such as “develop FSF doctrine” or “stand up a staff officer’s
college”), and possibly in the FSF executive function (ministries) would likely be beyond the
inherent capability of the operating force and would likely require special training or augmentation
by subject matter experts drawn from U.S. generating organizations.
4-194. U.S. operating forces are typically better suited to develop FSF operating force capabilities than they
are to developing FSF generating forces of generating capabilities. Typically, the battalion is tasked to train
and/or advise FSF operating forces. The operating function employs military capabilities through application
of warfighting functions of mission command, movement and maneuver, intelligence, fires, protection, and
sustainment during actual operations. Operating, as it applies to police security forces, may include training
and actual operations with the integration of patrolling, forensics, apprehension, intelligence, investigations,
incarceration, communications, and sustainment. Operating forces are responsible for collective training and
performing missions assigned to the unit.
Train. All activities taken to create, improve, and integrate training, leader development, and
education at the individual, leader, collective, and staff levels. This may include task analysis, the
development and execution of programs of instruction, implementation of training events, and
leader development activities.
Equip. All activities to design, improve, and integrate materiel and equipment, procurement,
fielding, accountability, and maintenance through life cycle management. This may also include
fielding of new equipment, operational readiness processes, repair, and recapitalization.
Rebuild or Build. All activities to create, improve, and integrate facilities. This may include
physical infrastructures such as bases and stations, lines of communication, ranges and training
complexes, and administrative structures.
Advise/Assist. All activities to provide subject matter expertise, guidance, advice, and counsel to
FSF while carrying out the missions assigned to the unit or organization. Advising may occur
under combat or administrative conditions, at tactical through strategic levels, and in support of
individuals or groups.
Assess. All activities for determining progress toward accomplishing a task, creating an effect, or
achieving an objective using MOE and MOP to evaluate foreign security force capability. Once
an objective is achieved, the focus shifts to sustaining it.
SUSTAINING ACTIVITIES
4-199. Sustaining SFA activities consists of two major components: the ability of the United States and
other partners to sustain the SFA activities successfully and the ability of host-nation security forces to sustain
their capabilities independently over the long term. The first component may be predicated on the host-nation
maintaining legitimacy while the second component should be considered holistically when working with
the host nation to build their security forces. It is important to consider the sociocultural factors,
infrastructure, and education levels of prospective FSF when fielding weapons systems and maintaining
organizations. Though this is not a battalion, BCT, or division decision, a strong recommendation through
the SFA chain should be made in regards to this consideration.
INTELLIGENCE
4-200. Intelligence provides an assessment of host nation and potential adversaries’ capabilities, capacities,
and shortfalls. It involves understanding sociocultural factors, information and intelligence sharing, and
intelligence training. Information sharing between the battalion and FSF must be an early consideration for
planners. A continuous intelligence effort will gauge the reaction of the local populace and determine the
effects on the infrastructure of SFA efforts as well as evaluate strengths, weaknesses, and disposition of
opposition groups in the area. Ultimately, intelligence supports the SFA and FSF leaders’ decision-making
processes, and supports the protection of friendly forces and assets.
Note. Train personnel two deep in every staff section or advisory subunit on foreign disclosure
before deployment. Interaction with host nation and FSF, even North Atlantic Treaty Organization
or other coalition allies requires foreign disclosure officer approval. This will become a huge
bottleneck if not trained for and decentralized.
PROTECTION
4-201. Protection is incumbent upon the commander to fully understand the threat environment within the
battalion’s area of operation. By having access to fused intelligence from local, regional and national
resources, the commander can accurately assess threats and employ measures to safeguard SFA personnel
and facilities. Protection planning considerations should address additional support requirements for the
response force, emergency procedures, personnel recovery, or the requirement to integrate SFA personnel
into the host-nation protection plan.
4-202. Nontraditional threats, such as the insider threat, can undermine SFA activities as well as the
cohesion of U.S. forces and FSF. Tactically, the breakdown of trust, communication, and cooperation
between host nation and U.S. forces can affect military capability. Adversaries may view attacks against U.S.
forces as a particularly effective tactic, especially when using co-opted host-nation forces to conduct these
attacks. While these types of insider or green on blue” attacks have been context-specific to a particular
theater, the commander should ensure that protection plans take into account the potential for these types of
attacks and plan appropriate countermeasures.
Note. More stringent protection controls and measures that are overtly heavy handed must be well
balanced yet culturally sensitive enough to not send the wrong message to the very people and
organizations the United States is trying to assist.
LOGISTICS
4-203. Logistics planners at the battalion level must understand the IBCT’s concept of support and
sustainment estimates that outline the responsibilities and requirements for maintaining logistics support for
deployed forces within the IBCT’s area of operation. Logistics support might include support of SFA
augmentees and FSF within the battalion’s area of operation to conduct operational missions (supporting
host-nation civilians or military forces with medical, construction, power generation, maintenance and
supply, or transportation capabilities).
PREPARATION
4-204. Preparation for SFA creates conditions that improve the Infantry battalion’s opportunities for
success. The degree to which the battalion is tasked within SFA operations depends on preparation in terms
of cultural knowledge, language, functional skills, and the ability to apply these skills within the operational
environment. Preparation includes, but is not limited to, initiate security and information collection, continue
to coordinate and conduct liaison, refine the plan, complete task organization, conduct pre-mission training,
conduct rehearsals and inspections; continue to build partnerships and teams, and initial movement.
Preparation facilitates and sustains plans-to-operations transitions, including those to branches and sequels,
which are of vital importance for the often-dynamic operational environment for SFA.
PREMISSION PREPARATIONS
4-205. After receiving a mission, the battalion continues detailed preparation activities, prepares for and
rehearse classes given in country, and conduct extensive briefings on the area of operation. Key staff and
subordinate unit actions particular to SFA include the following:
Current Operations
4-206. The battalion operations staff officer (S-3) ensures pre-deployment training for Soldiers, to include
preparation for training FSF and rehearsals for movement. The S-3 reviews the program of instruction for
training FSF, to include getting approval from the commander, and higher headquarters if necessary. The
S-3, in coordination with IBCT S-9 (civil affairs officer), ensures the operation plan minimizes how
operations affect the civilian population and addresses ways to mitigate the civilian impact on military
operations. The civil-military operations plan is coordinated with the indigenous population and institutions,
unified action partners, other civil entities, and interagency as necessary. This coordination might include
civil affairs battalions or brigades, provincial reconstruction teams, or United States Agency for International
Development project officers in the area of operation.
Note. The primary staff officers of the current operations cell may be called upon to be the primary
advisors to the host-nation forces staff sections and cells.
4-207. The battalion intelligence staff officer (S-2) supervises the dissemination of intelligence and other
operationally pertinent information within the unit and, as applicable, to higher, lower, or adjacent units or
agencies. The S-2 monitors the implementation of the intelligence collection plans to include updating the
commander’s priority intelligence requirements, conducting area assessment, and coordinating for additional
intelligence support. The S-2 establishes liaison with FSF intelligence and security agencies (within the
guidelines provided by applicable higher authority). The S-2 assesses the intelligence threat and resulting
security requirements, including coordination with the S-3 on specific security and operations security
measures.
4-208. The battalion personnel staff officer (S-1) supervises the battalion personnel staff section, in
coordination with brigade and higher echelon manpower and personnel staff sections, screen personnel files
to review the records of identified Soldiers that might have specific skill sets useful to the battalion or higher
echelon during the conduct of stability focused operations. Skill sets include individuals with professional
certification or work experience in those non-military fields that might have utility during operations focused
on the conduct of stability tasks. (See paragraph 4-55 for additional information.)
4-209. The battalion logistics staff officer (S-4) supervises, as required, the logistics support of SFA
augmentees and FSF within the battalion area of operation to conduct operational missions (supporting
host-nation civilians or military forces with medical, construction, power generation, maintenance, supply,
or transportation capabilities). (See paragraph 4-89 for additional information.)
4-210. The battalion signal staff officer (S-6), in coordination with the IBCT S-6, ensures depth in
communication and synchronization between organizations both horizontally and vertically within the
battalion’s proposed area of operation. In coordination with the IBCT S-9 and S-6, establishes
communications as early as possible upon arrival with the civil-military operations center (normally
established at IBCT level), civil liaison teams, civil information management architecture, and supporting
networks to facilitate communication and coordination with the nonmilitary agencies.
Predeployment Training
4-211. During predeployment training, Soldiers receive training, materials, and briefings on the operational
area. This training can cover the history, culture, religion, language, tribal affiliations, local politics, and
cultural sensitivities as well as any significant nongovernmental organizations operating in the operational
area. Advisors focus their premission training on the specific requirements of developing FSF. The training
emphasizes the host-nation culture and language and provides cultural tips for developing a good rapport
with foreign personnel. (Refer to FM 7-0 for premission training for SFA.)
4-212. Based on the battalion commander’s, or higher commander’s training guidance, subordinate unit
commanders assign missions and approve the draft mission-essential task list that supports SFA. The staff
plans, conducts, and evaluates training to support this guidance and the approved mission-essential task list
for SFA missions. Subordinate commanders prioritize tasks that need training. Since there is never enough
time to train in every area, commanders focus on tasks essential for mission accomplishment.
4-213. Once commanders select tasks for training, the staff builds the training schedule and plans on these
tasks. The staff provides the training requirements to the commander. After approving the list of tasks to be
trained, the commander includes the tasks in the unit training schedule. The staff then coordinates the support
and resource requirements with the S-3 and S-4. Finally, the commander ensures standards are enforced
during training.
Evaluation
4-214. Evaluations can be either internal or external. Internal evaluations occur at all levels, and they must
be inherent in all training. External evaluations are usually more formal and conducted by a headquarters one
or two levels above the unit being evaluated. This subject must be carefully planned and discussed with FSF
leaders to account for cultural sensitivities and current capabilities. A critical weakness in training is the
failure to evaluate each task every time it is executed. Every training exercise provides potential for
evaluation feedback. Every evaluation is also a training session. Leaders and trainers must continually
evaluate to optimize training. Evaluation must occur as the training takes place. Emphasis is on direct, on-
the-spot evaluations. However, leaders allow Soldiers to complete the task first. Leaders plan after action
reviews at frequent, logical intervals during exercises. This technique allows the correction of shortcomings
while they are still fresh in everyone’s mind. The after action review eliminates reinforcing bad habits.
Specified Training
4-215. Augmentation elements require area orientation, refresher combat training, field-training exercises,
and the like. Unit training objectives are for developing capabilities to conduct internal and external defense
activities for tactical operations, intelligence operations, psychological operations, populace and resources
control operations, and civil affairs and advisory assistance operations in the host nation language. Units
identified for SFA begin intensified training immediately upon deployment notification.
4-216. After deployment to the host nation and before commitment to operations, the unit may receive in-
country training at host-nation training centers or at designated training locations. This training helps
personnel become psychologically and physically acclimated to the host nation. This training also allows
commanders and staff some time to coordinate and plan within their own command and with civilian and
military joint and multinational organizations. After commitment, training continues and is stressed between
operations, using needed improvements identified in operations as the basis for training.
4-217. Insider attacks are a threat in any area of operation. The battalion commander ensures that military
forces, civilian expeditionary workforce, and/or civilian personnel and contractors are trained to identify
behavioral indicators of possible insider threats and the means to apply prevention tools to mitigate this threat.
Cultural awareness yields situational awareness and leads to increased force protection for SFA personnel.
Eliminating and/or minimizing the insider threat, especially by proper preparation and training of forces, is
critical to mission success.
Note. To reduce the potential for insider attacks, FSF should be further vetted to identify
individuals whose motivations toward the host nation and United States Government are in
question.
higher headquarters, the conditions of the operational environment, and capacity of the FSF camps to
accommodate the U.S. forces.
Note. The designation of force assistance teams used in figure 4-5 are not to be prescriptive of
how the Infantry battalion might support a particular SFA activity. Designations are intended to
be used as a guide illustrating one way the battalion may task organize to support multiple SFA
activities within an area of operation.
4-222. Subordinate units of the IBCT conducting SFA are best located inside the base of the FSF to be
trained. Collocation facilitates integration with the FSF and allows the two forces to form mutual
understanding and trust. Collocation and the close cooperation often facilitates and improves the population’s
perception of the legitimacy of U.S. and foreign security forces, which can be an essential condition of the
overall mission’s end state.
4-223. When protection conditions require, a U.S. area may be established in the FSF base, although this is
not optimal. Key considerations for collocation may include the threat, FSF acceptance, physical space inside
the FSF base, sustainment capabilities, medical facilities, and availability of response forces.
4-224. When U.S. forces are operating out of smaller outposts in an urban environment, the local populace
sees the integration and presence of the U.S. and foreign security forces working together. This integration
not only enhances overall operational effectiveness and trust, living and working together builds legitimacy
of the two forces as well as FSF; it reinforces trust between the FSF and the people they are tasked to protect.
DEPLOYMENT
4-225. SFA is often conducted in operational environments in which U.S. forces are guests of the host
nation or partner organization. When not already in country, SFA units move into the operational area by
following their deployment OPORD and standing operating procedures. (See FM 3-22 for information on
deployment activities.) When located within the operational area, units conduct troop movement (see
paragraphs 2-34 to 2-36) to their assigned area of operation.
IN-COUNTRY PREPARATIONS
4-226. Upon arrival, the commander and S-3 brief the higher headquarters on the planned execution of the
mission and reconfirm the required command relationship. Local conditions may require the unit to confirm
or establish its in-country and external mission command systems and sustainment functions relationships
from outside its operational area upon arrival. The SFA unit establishes direct working relationships with the
next higher in- or out-of-country supporting element to—
Determine the limits of the available support and expected reaction time between the initiation of
the support request and fulfillment.
Confirm or establish communications procedures between the supporting element and the SFA
unit, to include alternative and emergency procedures for mission command, all support
operations, and medical evacuation.
4-227. The SFA unit establishes procedures to promote interagency cooperation and synchronization. The
unit—
Identifies the location of the concerned host nation, U.S., or other agencies.
Contacts the concerned agency to establish initial coordination.
Exchanges information or intelligence.
Confirms or establishes other coordination protocols as necessary.
Incorporates the newly established or changed procedures into the plans for mission execution.
4-228. The unit immediately establishes operations security procedures to support its mission execution and
identifies rally points incorporated into its defensive, evasion, and personnel recovery plans.
4-229. After receiving a detailed briefing and further guidance from the advance party, unit personnel
continue to develop effective rapport with the FSF commander and counterparts. They also assess their
working, storage, and living areas for security and verify the location of the training site, communications
center, dispensary area, and FSF troop area. With the FSF commander, the unit commander—
Establishes rapport.
Conducts introductions in a businesslike, congenial manner.
Briefs on the unit’s mission, its capabilities, and the restrictions and limits imposed on the
detachment by the higher U.S. commander.
Ensures all unit personnel fully support FSF and firmly believes a joint U.S.-FSF effort will
succeed. Requests counterpart linkup be made under the mutual supervision of the FSF
commander and the unit commander.
Ensures all current unit plans are tentative and that assistance is needed to finalize them.
Deduces or solicits the actual estimate of unit capabilities and perceived advisory assistance and
material requirements.
Recommends the most desirable courses of action while emphasizing how they satisfy present
conditions, achieve the desired training, and meet advisory assistance goals.
Informs the higher in-country U.S. commander of any significant changes in the unit’s plan to
assist FSF.
4-230. Through the S-2, the commander’s priority intelligence requirements are based on the latest
information available and requirements for additional priority intelligence requirements that arise from
modified estimates and plans. The S-2 also—
Analyzes the foreign unit’s status to finalize unit plans for advisory assistance. These plans can
include task organization of unit with counterparts, staff functions for planning SFA, and advisory
assistance for executing SFA.
Explains analysis to counterparts and encourages them to help with—and participate in—
analyzing, preparing, and briefing the analysis to the foreign unit commander.
Prepares and briefs the plans for training and advisory assistance.
Helps the foreign unit inspect the available facilities to identify deficiencies. If the unit finds
deficiencies, the S-2 prepares estimates of courses of action for the FSF commander to correct
them.
Supervises the preparation of the facilities with their counterparts and informs unit and FSF
commanders on the status of the facilities.
4-231. The unit ensures its security is based on the present or anticipated threat. Some recommended actions
the unit may take include—
Hardening its positions based on available means and requirements to maintain low visibility.
Maintaining unit internal guard system with at least one Soldier who is awake and knows the
locations of all other unit personnel. The guard reacts to an emergency by following an internal
alert plan and starting defensive actions.
Maintaining communications with all subordinate unit personnel deployed outside the immediate
area controlled by the main body.
Establishing plans for immediate defensive actions in the event of an attack or a loss of rapport
with hostile reaction.
Discussing visible security measures with foreign counterparts to ensure understanding and to
maintain effective rapport. Unit personnel do not divulge sensitive information for the sake of
possible rapport benefits.
Encouraging the foreign unit, through counterparts, to adopt additional security measures
identified when analyzing the foreign unit’s status and inspecting its facilities.
Coordinating defensive measures with the foreign unit to develop a mutual defensive plan. Unit
personnel obtain from the unit’s present reaction and defensive plans for attack. They encourage
the foreign unit to conduct mutual full-force rehearsals of defensive plans; if unsuccessful, the unit
conducts internal rehearsals of the plans.
EXECUTION
4-232. In execution, the battalion commander, staff, and subordinate commanders focus efforts on
translating decisions, made during planning and preparation, into actions supporting the SFA mission. Once
the Infantry battalion arrives in-country, it begins the employment of forces to support the development of
FSF capabilities and capacities. Employment of the battalion occurs generally with the establishment of
advising, assisting, and training teams and key individuals. These teams and key individuals partner with
foreign counterparts during FSF planning [preparing the FSF for the mission(s) itself] to increase the
capability and capacity of FSF planning processes, as well as to increase the probability of success.
Note. SFA activities normally use the general developmental tasks (known as FSF development
tasks) of organize, train, equipment, rebuild and build, advise and assist, and assess (OTERA-A)
to develop the functional capabilities required by the FSF. See paragraph 4-85 for information on
organize, equip, and rebuild and build developmental tasks.
assisting, or training a specific partner individual, unit, or activity. These teams and key individuals include,
but are not limited to, Infantry battalion training, advising, or advisory teams and individuals. Specialized
teams and individuals may also be required for partner sustainment, engineer, or police units.
Battalion Commander
4-236. Before the mission, the Infantry battalion commander advises and assists the FSF commander. The
FSF commander then issues planning guidance for planning the execution of the mission and clarifies
commander’s intent. The battalion commander advises and assists the FSF commander throughout the
operations process for the tactical operation(s). By accompanying the FSF commander when the mission is
received from higher headquarters, the battalion commander assists any subsequent missions. The battalion
commander monitors how FSF subordinate units understand the commander’s intent and all specified and
implied tasks.
4-237. During the execution of the mission, the battalion commander helps the FSF commander provides
mission command (also called, command and control) during operations. While monitoring the tactical
situation, the battalion commander recommends changes to the chosen course of action(s) to exploit the
situation. After monitoring the flow of information, the battalion commander recommends improvements to
the use of intelligence collection assets and the processes used by subordinates to report required information.
Battalion Staff
4-239. Before the mission, members of the battalion staff advise and assist foreign counterparts in preparing
staff estimates and courses of actions for essential tasks. The battalion staff helps write tentative plans and/or
orders based on the FSF commander planning guidance and FSF standing operating procedures. Plans,
depending on the situation, may include primary, alternate, contingency, and emergency plans.
4-240. During execution, the battalion staff helps foreign counterparts coordinate the execution of FSF
tasks. The staff assists in the dissemination of FSF plans and/or orders to senior and adjacent staff sections
and supporting elements. The battalion staff helps notify higher, lower, or adjacent staff sections of modified
estimates and plans. The staff—led by the S-3 and S-2 and the S-3 and S-2 counterparts—helps update the
CCIRs with the latest information and future requirements.
Note. U.S. forces’ automated pay systems are nothing like the cash-only transactions in FSF. Graft,
corruption (ghost soldiers/policemen), and extortion are rife in these circumstances.
Note. As above, train personnel two deep in every staff section or advisory subunit on foreign
disclosure before deployment. Interaction with host nation and FSF, even NATO or other coalition
allies requires foreign disclosure officer approval. This will become a huge bottleneck if not
trained for and decentralized.
4-246. The Signal officer, in coordination with the IBCT, continuously assess and assist interorganizational
information management coordination, normally required among participating interagency partners and the
affected partner nation organizations. The signal officer uses assessments as part of the SFA and FSF
communications synchronization plan. The signal officer uses foreign disclosure procedures and a tailored
and responsive information- sharing process as part of the SFA and FSF assessment plan for dissemination
with interagency partners and/or multinational audience.
Civil-Military Teams
4-248. Upon deployment, civil-military teams advise the SFA and FSF commanders and staffs on civil-
military considerations and coordinate efforts of any civil affairs units supporting the FSF operation. Civil-
military teams mentor counterpart teams and the supported foreign element staff on civil-military operations
and the importance of respecting human rights. Civil-military teams may introduce counterparts to relevant
nongovernmental organizations, United States Agency for International Development project officers, and
provincial reconstruction team staff.
Note. The judge advocate (judge advocate general corps) mentors (provide legal mentorship)
and/or coordinates the legal and moral obligations of military commanders to civilian populations
under their control. (See AR 27-1 and FM 1-04.)
fully involved, and supportive for FSF training to succeed. An effective FSF requires leadership from both
the provider and the recipient sides throughout training to help build the F SF capacity to train their
own forces.
Training Assessment
4-252. Prior to training the FSF, the battalion commander begins with a training assessment, in coordination
with the FSF commander, of the training plans designed prior to the battalion’s employment. This assessment
is important to evaluate the FSF and to exercise the working relationship between the Infantry battalion and
the FSF. The training assessment covers all aspects of leadership, training, sustainment, and
professionalization. To support an assessment, the battalion commander analyzes the following specific
foreign unit considerations:
The unit’s mission and mission-essential task list and capability to execute them.
Staff capabilities.
Personnel and equipment authorization.
Physical condition.
Any past or present foreign influence on training and combat operations.
Operational deficiencies identified during recent operations or exercises with U.S. personnel.
Sustainment capabilities, to include training programs.
Internal training programs and personnel.
Training facilities.
4-253. The battalion commander assesses the level of professionalism of FSF, both units and individuals.
Adhering to established rules of engagement, ethics that meet the established laws and regulations of the
commanding authority, laws for land warfare, and human rights are key areas that require assessment. The
FSF support of civilian leaders and political goals also fall within this assessment.
4-254. Battalion subordinate leaders, working with FSF leaders, evaluate current members of the FSF for
past military skills and positions. Often military reorganizations arbitrarily shift personnel to fill vacancies
outside their knowledge and experience.
Program of Instruction
4-256. In coordination with the FSF staff and subordinate units, the staff and subordinate units of the
Infantry battalion develop programs of instruction. These programs incorporate all training objectives that
satisfy the training requirements identified during assessment. Training programs support these requirements.
The FSF commander approves these programs of instruction prior to execution by the battalion. When
executing programs of instruction, trainers/advisors adhere to training schedules consistent with changes in
the mission variables. Trainers/advisors ensure through their counterparts and the FSF commander that all
personnel receive training. Foreign counterpart trainers rehearse all classes approved on the programs
of instruction.
Presentation of Instruction
4-257. Presenting the training material properly, trainers follow lesson outlines approved in the programs
of instruction. All training clearly states the task, conditions, and standards desired during each lesson,
ensuring the FSF understand them. Trainers/advisors state all warning and safety instructions (through
interpreters when required) to the FSF. The training to reinforce the concepts includes demonstrations of the
execution of each task, stressing the execution as a step-by-step process. Trainers monitor FSF progress
during instruction and practical exercises, correcting mistakes as they are made.
Collective Training
4-261. Collective training starts at squad level. Squad battle drills provide key building blocks to support
FSF operations. Battalion trainers link battle drills and collective tasks through a logical, tactical scenario in
situational training exercises. Although this exercise is mission-oriented, it results in more than mission
proficiency. Battle drills and collective tasks support situational training exercises, while these exercises
support operations. Battalion trainers/advisors must understand the operational environment when training
FSF; training incorporates how internal and external threats and civilians affect the environment.
4-262. Flexibility in using Army doctrine in training enhances efforts to make training realistic. Battalion
trainers/advisors modify Army doctrine to fit the FSF level of expertise, mission command systems, the
tactical situation, and sustainment base. Often the structure and capabilities of FSF differ from that required
by Army doctrine. When FSF counter an insurgency, these exercises emphasize interplay among
psychological and tactical, populace and resources control, intelligence, and civil affairs operations. (Refer
to FM 7-0 for additional information.)
Individual Training
4-263. Individual training within the FSF by the battalion emphasizes physical and mental conditioning,
tactical training, basic rifle marksmanship, first aid, combatives, and the operational environment. Individual
training includes general tactics and techniques of security operations and the motivation, operations, and
objectives of internal and external threats. Tough and realistic training conditions troops to mentally and
physically withstand the strain of continuous operations. The battalion cross-trains the FSF on all types of
weapons, communications and other equipment, and skills particular to their unit. Personnel losses must
never cause weapons, communications equipment, or essential skills to be lost due to a lack of fully trained
replacement personnel.
Comprehensive Review
4-269. The battalion commander encourages the FSF commander to conduct a comprehensive review of
collective training events with the entire unit, or at a minimum, with key subordinate leaders. If possible, the
review occurs during the field portion of the training when the unit assembles at logical stopping points.
During the review, the battalion commander and subordinate trainer/advisors avoid criticizing or
embarrassing the FSF commander or subordinates. After action reviews provide feedback to increase and
reinforce learning, providing a database for key points. During reviews within subordinate echelons,
evaluators draw information from FSF subordinate leaders to form possible alternative course of actions for
future activities.
Note. It is important to conduct comprehensive after- action reviews and reports, focusing on the
specifics of the SFA activities, to gather information as soon as possible after execution.
Operational Success
4-272. Throughout the operation, the battalion commander assists the FSF commander in addressing
changes to the operation and the feeding the assessments of the progress or regression back into the planning
process. The closer SFA and FSF commanders work with trainer/advisor teams and the more they interact
with local political and cultural leaders, the better the overall chances of mission success. Keys to operational
success within the SFA and FSF area of operation, although not all inclusive, include the following:
Establish MOE to provide benchmarks against which the commander assesses progress toward
accomplishing the mission.
Establish MOP to determine whether a task or action was performed to standard.
Establish close and continuing relationships with all advisor teams, other actors operating in its
area of operation, and foreign area officers with local or regional expertise.
Establish close and continuing relationships with all foreign units (military, police, and others)
operating in the area of operation.
Establish close and continuing relationships with all political entities and actors within the
area of operation.
Establish redundant communications within the area of operation, especially when the battalion
shares its area of operation with other entities that have cultural differences and lack of or
degraded communications.