{"lines":[{"page":1,"text":"FM 3-98","rect":[360.8569641113281,108.72198486328125,550.7299624023438,70.87998962402344]},{"page":1,"text":"RECONNAISSANCE AND","rect":[187.11599731445313,150.260986328125,552.2649956054687,126.97998046875]},{"page":1,"text":"SECURITY OPERATIONS","rect":[183.68699645996095,187.46099853515626,552.3079814453125,164.17999267578126]},{"page":1,"text":"JANUARY 2023","rect":[126.09500122070313,672.0339965820313,302.15497412109377,654.25]},{"page":1,"text":"DISTRIBUTION RESTRICTION:","rect":[126.09500122070313,693.5859985351563,387.0950131835938,680.2659912109375]},{"page":1,"text":"Approved for public release; distribution is unlimited.","rect":[126.09500122070313,716.802001953125,472.89491455078129,702.9120483398438]},{"page":1,"text":"This publication supersedes FM 3-98, dated 1 July 2015.","rect":[126.09500122070313,736.197998046875,503.0480517578125,722.1129760742188]},{"page":1,"text":"HEADQUARTERS, DEPARTMENT OF THE ARMY","rect":[126.09501647949219,756.18701171875,540.0309633789062,741.8049926757813]},{"page":2,"text":"This publication is available at the Army Publishing Directorate site","rect":[97.08000183105469,369.431396484375,532.8056003684998,354.92376708984377]},{"page":2,"text":"(https://armypubs.army.mil), and the Central Army Registry site","rect":[109.08191680908203,387.9130859375,520.931393825531,373.4037780761719]},{"page":2,"text":"(https://atiam.train.army.mil/catalog/dashboard).","rect":[159.47999572753907,406.2713928222656,470.55631470680239,391.7637634277344]},{"page":3,"text":"Field Manual","rect":[95.4000015258789,93.00948333740235,149.0555163631439,85.96776580810547]},{"page":3,"text":"No. 3-98","rect":[95.4000015258789,104.4094467163086,130.9771237373352,97.54700469970703]},{"page":3,"text":"*FM 3-98","rect":[482.3999938964844,67.2484359741211,540.1268576545715,56.98519515991211]},{"page":3,"text":"Headquarters","rect":[491.1600036621094,95.0014877319336,544.6023452882766,85.96776580810547]},{"page":3,"text":"Department of the Army","rect":[445.52398681640627,106.69841003417969,544.1696362495422,97.64476776123047]},{"page":3,"text":"Washington, D.C., 10 January 2023","rect":[399.6169738769531,118.22239685058594,544.1589550971985,109.16875457763672]},{"page":3,"text":"RECONNAISSANCE AND SECURITY OPERATIONS","rect":[97.44000244140625,185.4959716796875,532.56459375,172.17596435546876]},{"page":3,"text":"Chapter 1","rect":[90.0,294.27215576171877,135.97336793136598,285.0691223144531]},{"page":3,"text":"Chapter 2","rect":[90.0,550.232177734375,135.97336793136598,541.0291748046875]},{"page":3,"text":"Contents","rect":[280.3199768066406,216.41555786132813,349.55924586105348,204.62110900878907]},{"page":3,"text":"Page","rect":[518.52001953125,241.88099670410157,540.0867026367188,233.55599975585938]},{"page":3,"text":"PREFACE................................................................................................................... vii","rect":[162.00079345703126,258.0,539.8842974910737,250.02908325195313]},{"page":3,"text":"INTRODUCTION ......................................................................................................... ix","rect":[162.00079345703126,274.9095458984375,539.9031164665222,267.5491027832031]},{"page":3,"text":"CAVALRY ORGANIZATIONS AND THE OPERATIONAL ENVIRONMENT..........1-1","rect":[162.00083923339845,293.0,540.0127356071472,285.0691223144531]},{"page":3,"text":"Section I – Operational Overview ..........................................................................1-1","rect":[162.0,309.75213623046877,540.0019934196472,300.5491027832031]},{"page":3,"text":"Historical Roles of Cavalry Units ............................................................................... 1-1","rect":[162.0,321.4016418457031,540.0118811149597,312.0691223144531]},{"page":3,"text":"Current Role ..............................................................................................................1-3","rect":[162.0,331.0,540.0118811149597,323.4691162109375]},{"page":3,"text":"Section II – Understanding the Operational Environment ..................................1-6","rect":[162.0,348.2816467285156,540.0118811149597,338.9491271972656]},{"page":3,"text":"Section III – Shape the Operational Environment................................................1-7","rect":[162.0,363.75213623046877,540.0118811149597,354.5491027832031]},{"page":3,"text":"Section IV – Cavalry Employment in Large Scale Combat Operations......................... 1-8","rect":[162.0,379.36163330078127,540.0019934196472,370.02911376953127]},{"page":3,"text":"BCT Planning Considerations for the Cavalry Units .................................................1-9","rect":[162.0,390.8816223144531,540.0118811149597,381.5491027832031]},{"page":3,"text":"General Employment of Cavalry Units ....................................................................1-10","rect":[162.0,402.4016418457031,539.8923742790222,393.0691223144531]},{"page":3,"text":"Brigade Operations Officer and Squadron Employment...........................................1-11","rect":[162.0,413.8016357421875,539.8823645133972,404.45916748046877]},{"page":3,"text":"Section V – Organizations....................................................................................1-18","rect":[162.0,429.2816467285156,539.8923132438659,419.9491271972656]},{"page":3,"text":"Brigade Combat Team ............................................................................................1-18","rect":[162.0,440.8016357421875,539.8823645133972,431.4691162109375]},{"page":3,"text":"Cavalry Squadrons .................................................................................................. 1-21","rect":[162.0,452.3216247558594,539.8923132438659,442.9891052246094]},{"page":3,"text":"Air Cavalry Squadron ..............................................................................................1-21","rect":[162.0,463.84161376953127,539.8923132438659,454.50909423828127]},{"page":3,"text":"Air Cavalry Troop.....................................................................................................1-22","rect":[162.0,475.36163330078127,539.8823645133972,466.02911376953127]},{"page":3,"text":"Cavalry Troops ........................................................................................................1-22","rect":[162.0,486.8816223144531,539.8923132438659,477.5491027832031]},{"page":3,"text":"Armored Company ..................................................................................................1-24","rect":[162.0,498.4016418457031,539.8923132438659,489.0691223144531]},{"page":3,"text":"Weapons Troop ....................................................................................................... 1-24","rect":[162.0,509.69207763671877,539.9022619743347,500.5587463378906]},{"page":3,"text":"Scout Platoon ..........................................................................................................1-25","rect":[162.0,520.0,539.8923132438659,511.9891052246094]},{"page":3,"text":"CBRN Reconnaissance and Surveillance Platoon..................................................1-25","rect":[162.0,531.0,539.8923132438659,523.5091552734375]},{"page":3,"text":"THREATS..................................................................................................................2-1","rect":[162.00083923339845,549.0,540.0127356071472,541.0291748046875]},{"page":3,"text":"Section I − Understanding the Threat....................................................................2-1","rect":[162.0,565.8416748046875,540.0118811149597,556.3995971679688]},{"page":3,"text":"Irregular Forces .........................................................................................................2-2","rect":[162.0,577.3616943359375,540.0118811149597,568.1187744140625]},{"page":3,"text":"State and Nonstate Threats.......................................................................................2-3","rect":[162.0,587.0,540.0118811149597,579.5491333007813]},{"page":3,"text":"Section II − Threat Capabilities, Tactics, and Techniques .................................. 2-4","rect":[162.0,604.232177734375,540.0118811149597,594.9196166992188]},{"page":3,"text":"Physical Dimension ...................................................................................................2-5","rect":[162.0,615.8816528320313,540.0118811149597,606.6387329101563]},{"page":3,"text":"Cognitive and Informational Dimension.....................................................................2-5","rect":[162.0,627.2816772460938,540.0118811149597,617.9491577148438]},{"page":3,"text":"Countering Adaptations and Retaining the Initiative .................................................2-5","rect":[162.0,638.8016357421875,540.0118811149597,629.4691162109375]},{"page":3,"text":"Section III − Reconnaissance Disruption, Tactics, and Techniques......................2-5","rect":[162.0,654.1521606445313,540.0118811149597,644.839599609375]},{"page":3,"text":"Overview Enemy Reconnaissance and Security Operations ............................................. 2-7","rect":[162.0,665.8016357421875,540.0118811149597,656.4591064453125]},{"page":3,"text":"Counterreconnaissance.............................................................................................2-7","rect":[162.0,676.0,540.0118811149597,667.9891357421875]},{"page":3,"text":"DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.","rect":[90.0,717.2219848632813,431.1475993652344,708.8880004882813]},{"page":3,"text":"*This publication supersedes FM 3-98, dated 1 July 2015.","rect":[90.0,733.6409912109375,319.77989306640628,725.2890014648438]},{"page":3,"text":"FM 3-98","rect":[289.322998046875,754.18798828125,322.8839743652344,747.6090087890625]},{"page":3,"text":"i","rect":[537.47998046875,754.0800170898438,539.98198046875,747.635986328125]},{"page":4,"text":"Contents","rect":[72.0,62.4990234375,111.08339910888673,55.8480224609375]},{"page":4,"text":"Chapter 3","rect":[72.0,107.19215393066406,117.97336793136597,97.9891128540039]},{"page":4,"text":"Chapter 4","rect":[72.0,297.6321716308594,117.97336793136597,288.42913818359377]},{"page":4,"text":"Chapter 5","rect":[72.0,534.1521606445313,117.97336793136597,524.9491577148438]},{"page":4,"text":"ii","rect":[72.0,754.0800170898438,77.0219966430664,747.635986328125]},{"page":4,"text":"Understand Being Matched ......................................................................................","rect":[144.0,89.8016128540039,505.00020325279237,80.58860778808594]},{"page":4,"text":"MISSION COMMAND...............................................................................................","rect":[144.00083923339845,106.0,504.9810992488861,97.9891128540039]},{"page":4,"text":"Section I – Mission Command for Reconnaissance and Security.....................","rect":[144.0,122.8016128540039,505.0599871883392,113.35952758789063]},{"page":4,"text":"Principles of Mission Command................................................................................","rect":[144.0,134.21206665039063,505.0001422176361,124.9891128540039]},{"page":4,"text":"Exercise of Command and Control...........................................................................","rect":[144.0,144.0,505.00011170005799,136.38912963867188]},{"page":4,"text":"Section II – Command and Control....................................................................... 3-4","rect":[144.0,160.0,522.0118811149597,151.86911010742188]},{"page":4,"text":"Operations Process................................................................................................... 3-4","rect":[144.0,172.61209106445313,522.0118811149597,163.37918090820313]},{"page":4,"text":"Commanders and Staffs Collaborate to Plan, Prepare, Execute, and Assess....... 3-16","rect":[144.0,184.13211059570313,521.8923132438659,174.90914916992188]},{"page":4,"text":"Section III – Integrating Processes ..................................................................... 3-27","rect":[144.0,199.72164916992188,521.8823645133972,190.38912963867188]},{"page":4,"text":"Intelligence Preparation of the Battlefield ............................................................... 3-27","rect":[144.0,211.24166870117188,521.8923742790222,201.90914916992188]},{"page":4,"text":"Targeting................................................................................................................. 3-27","rect":[144.0,222.76162719726563,521.8923132438659,213.5187530517578]},{"page":4,"text":"Timely Reporting and Assessment......................................................................... 3-28","rect":[144.0,234.28164672851563,521.8923132438659,225.0387725830078]},{"page":4,"text":"Update the Collection Plan ..................................................................................... 3-29","rect":[144.0,245.69204711914063,521.8923742790222,236.46908569335938]},{"page":4,"text":"Screen Reports ....................................................................................................... 3-30","rect":[144.0,257.0920715332031,521.8923742790222,247.86911010742188]},{"page":4,"text":"Correlate Reports to Requirements........................................................................ 3-30","rect":[144.0,268.6120910644531,521.8923742790222,259.3891296386719]},{"page":4,"text":"Assessments........................................................................................................... 3-30","rect":[144.0,279.0,521.8923742790222,270.998779296875]},{"page":4,"text":"RECONNAISSANCE OPERATIONS.......................................................................","rect":[144.00083923339845,295.7995300292969,505.0108844051361,288.42913818359377]},{"page":4,"text":"Section I – Reconnaissance Fundamentals, Methods, Management ....................","rect":[144.0,313.24163818359377,505.06993591880799,303.90911865234377]},{"page":4,"text":"Reconnaissance Fundamentals................................................................................","rect":[144.0,323.0,505.0001422176361,315.5486755371094]},{"page":4,"text":"Commander’s Reconnaissance Guidance ...............................................................","rect":[144.0,335.0,505.01997864341737,326.9491271972656]},{"page":4,"text":"Reconnaissance Techniques....................................................................................","rect":[144.0,347.69207763671877,505.0001422176361,338.5886535644531]},{"page":4,"text":"Reconnaissance Methods.........................................................................................","rect":[144.0,358.0,504.99022400474549,349.9886779785156]},{"page":4,"text":"Reconnaissance Management .................................................................................","rect":[144.0,370.7216491699219,505.0001422176361,361.5086669921875]},{"page":4,"text":"Reconnaissance Assets and Capabilities.................................................................","rect":[144.0,382.132080078125,505.01997864341737,372.90911865234377]},{"page":4,"text":"Surveillance...............................................................................................................","rect":[144.0,392.0,504.9703875789642,384.42913818359377]},{"page":4,"text":"Section II – Reconnaissance Types...................................................................... 4-8","rect":[144.0,409.24163818359377,522.0118811149597,399.90911865234377]},{"page":4,"text":"Zone Reconnaissance .............................................................................................. 4-9","rect":[144.0,419.0,522.0118811149597,411.5187683105469]},{"page":4,"text":"Area Reconnaissance............................................................................................. 4-13","rect":[144.0,431.0,521.8824255485534,423.03875732421877]},{"page":4,"text":"Route Reconnaissance........................................................................................... 4-15","rect":[144.0,442.0,521.8923132438659,434.5587463378906]},{"page":4,"text":"Reconnaissance in Force ....................................................................................... 4-18","rect":[144.0,454.0,521.8824255485534,445.9587707519531]},{"page":4,"text":"Special Reconnaissance......................................................................................... 4-18","rect":[144.0,466.6120910644531,521.8923132438659,457.3891296386719]},{"page":4,"text":"Section III – Reconnaissance Handover............................................................. 4-19","rect":[144.0,481.0,521.8824255485534,472.869140625]},{"page":4,"text":"Planning Considerations......................................................................................... 4-19","rect":[144.0,493.7216491699219,521.9022619743347,484.3891296386719]},{"page":4,"text":"Execution and Tasks............................................................................................... 4-20","rect":[144.0,504.0,521.8824255485534,495.9987487792969]},{"page":4,"text":"Special Operations Forces Reconnaissance Handover......................................... 4-23","rect":[144.0,516.6521606445313,521.8923742790222,507.4192199707031]},{"page":4,"text":"SECURITY OPERATIONS....................................................................................... 5-1","rect":[144.00083923339845,533.0,522.0127356071472,524.9491577148438]},{"page":4,"text":"Section I – Security Basics .................................................................................... 5-1","rect":[144.0,549.7616577148438,522.0118811149597,540.319580078125]},{"page":4,"text":"Security ..................................................................................................................... 5-1","rect":[144.0,561.2816772460938,522.0218298454284,551.9491577148438]},{"page":4,"text":"Security Fundamentals ............................................................................................. 5-2","rect":[144.0,572.681640625,522.0118811149597,563.34912109375]},{"page":4,"text":"Commander’s Security Guidance............................................................................. 5-4","rect":[144.0,584.20166015625,522.0118811149597,574.869140625]},{"page":4,"text":"Section II – Counterreconnaissance..................................................................... 5-4","rect":[144.0,597.719482421875,522.0019323844909,590.2395629882813]},{"page":4,"text":"Section III – Security Types ................................................................................... 5-5","rect":[144.0,615.1616821289063,522.0118811149597,605.7196044921875]},{"page":4,"text":"Screen....................................................................................................................... 5-7","rect":[144.0,625.0,522.0118811149597,617.34912109375]},{"page":4,"text":"Guard ...................................................................................................................... 5-12","rect":[144.0,637.0,521.8923742790222,628.869140625]},{"page":4,"text":"Cover....................................................................................................................... 5-28","rect":[144.0,648.0,521.8923132438659,640.38916015625]},{"page":4,"text":"Area Security........................................................................................................... 5-36","rect":[144.0,661.24169921875,521.8923742790222,651.9091796875]},{"page":4,"text":"Section IV – Transition Planning......................................................................... 5-41","rect":[144.0,676.7216796875,521.9023230094909,667.38916015625]},{"page":4,"text":"Battle Handover ...................................................................................................... 5-41","rect":[144.0,687.0,521.8923742790222,678.9987182617188]},{"page":4,"text":"Passage of Lines (Forward and Rearward)............................................................ 5-43","rect":[144.0,699.7616577148438,521.8923132438659,690.4291381835938]},{"page":4,"text":"Relief in Place......................................................................................................... 5-47","rect":[144.0,710.0,521.8923132438659,701.9491577148438]},{"page":4,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":5,"text":"Contents","rect":[501.0,62.4990234375,540.0807211914063,55.8480224609375]},{"page":5,"text":"Chapter 6","rect":[90.0,107.19215393066406,135.97336793136598,97.9891128540039]},{"page":5,"text":"Chapter 7","rect":[90.0,297.6321716308594,135.97336793136598,288.42913818359377]},{"page":5,"text":"Appendix A","rect":[90.0,492.15216064453127,145.4303930988312,483.06866455078127]},{"page":5,"text":"Appendix B","rect":[90.0,509.5521545410156,145.4303930988312,500.4686584472656]},{"page":5,"text":"Change of Mission...................................................................................................5-48","rect":[162.0,89.8016128540039,539.8823645133972,80.4690933227539]},{"page":5,"text":"STABILITY ................................................................................................................ 6-1","rect":[162.00083923339845,106.0,540.0227453727722,97.9891128540039]},{"page":5,"text":"Section I – Principles and Framework...................................................................6-1","rect":[162.0,122.67213439941406,540.0118811149597,113.4690933227539]},{"page":5,"text":"Conflict Transformation .............................................................................................6-1","rect":[162.0,133.0,540.0118811149597,124.9891128540039]},{"page":5,"text":"Unity of Effort.............................................................................................................6-1","rect":[162.0,145.72164916992188,540.0019323844909,136.38912963867188]},{"page":5,"text":"Legitimacy and Host-Nation Ownership .................................................................... 6-2","rect":[162.0,157.24166870117188,540.0118811149597,147.89920043945313]},{"page":5,"text":"Building Partner Capacity..........................................................................................6-2","rect":[162.0,168.76162719726563,540.0019934196472,159.42910766601563]},{"page":5,"text":"Stability Framework ................................................................................................... 6-2","rect":[162.0,180.28164672851563,540.0118811149597,170.94912719726563]},{"page":5,"text":"Section II – Operations During Stability Tasks.....................................................6-3","rect":[162.0,195.76162719726563,540.0118811149597,186.31954956054688]},{"page":5,"text":"Cavalry Unit’s Role .................................................................................................... 6-5","rect":[162.0,207.28164672851563,540.0118811149597,197.94912719726563]},{"page":5,"text":"Support During Stability Tasks .................................................................................. 6-5","rect":[162.0,218.80160522460938,540.0118811149597,209.46908569335938]},{"page":5,"text":"Sustainment...............................................................................................................6-8","rect":[162.0,229.0,540.0118811149597,220.86911010742188]},{"page":5,"text":"Interdependent Capabilities.......................................................................................6-8","rect":[162.0,241.61209106445313,540.0119421501159,232.38912963867188]},{"page":5,"text":"Section III – Army Stability Operations Tasks....................................................6-10","rect":[162.0,257.2016296386719,539.8823645133972,247.86911010742188]},{"page":5,"text":"Reconnaissance and Security Stability Tasks.........................................................6-10","rect":[162.0,268.7216491699219,539.8923742790222,259.3891296386719]},{"page":5,"text":"Support to Economic and Infrastructure Development...............................................6-13","rect":[162.0,280.1321105957031,539.9023230094909,270.9091491699219]},{"page":5,"text":"SUSTAINMENT.........................................................................................................7-1","rect":[162.00083923339845,295.7995300292969,540.0127356071472,288.42913818359377]},{"page":5,"text":"Section I – Overview................................................................................................7-1","rect":[162.0,312.0,540.0118811149597,303.90911865234377]},{"page":5,"text":"Section II – Planning ...............................................................................................7-1","rect":[162.0,328.7216491699219,540.0118811149597,319.3891296386719]},{"page":5,"text":"Planning Fundamentals and Procedures ..................................................................7-2","rect":[162.0,340.24163818359377,540.0218908805847,330.9987487792969]},{"page":5,"text":"Logistics.....................................................................................................................7-3","rect":[162.0,351.76165771484377,540.0118811149597,342.5187683105469]},{"page":5,"text":"Personnel Services....................................................................................................7-4","rect":[162.0,362.0,540.0118811149597,353.9491271972656]},{"page":5,"text":"Support Areas............................................................................................................7-7","rect":[162.0,374.69207763671877,540.0118811149597,365.4691162109375]},{"page":5,"text":"Echelons Above Brigade Sustainment Support ........................................................7-8","rect":[162.0,386.20166015625,540.0218908805847,376.869140625]},{"page":5,"text":"Section III – Considerations ...................................................................................7-9","rect":[162.0,399.7195129394531,540.0019934196472,392.34912109375]},{"page":5,"text":"Sustainment of Reconnaissance Operations ............................................................ 7-9","rect":[162.0,413.09210205078127,540.0119421501159,403.85919189453127]},{"page":5,"text":"Sustainment of Security Operations........................................................................7-10","rect":[162.0,424.7216491699219,539.8823645133972,415.3791809082031]},{"page":5,"text":"Stability Operations .................................................................................................7-11","rect":[162.0,436.24163818359377,539.8923132438659,426.899169921875]},{"page":5,"text":"Section IV – Special Considerations ...................................................................7-11","rect":[162.0,451.5921630859375,539.8923742790222,442.3891296386719]},{"page":5,"text":"Attachments.............................................................................................................7-11","rect":[162.0,462.0,539.8823645133972,453.9987487792969]},{"page":5,"text":"Detachments ...........................................................................................................7-11","rect":[162.0,473.0,539.8923742790222,465.5187683105469]},{"page":5,"text":"ECHELONS ABOVE BRIGADE CONSIDERATIONS ............................................ A-1","rect":[162.00083923339845,491.0,540.0227453727722,482.9491271972656]},{"page":5,"text":"ANNEX L (INFORMATION COLLECTION) FORMAT AND INSTRUCTIONS....... B-1","rect":[162.00083923339845,509.681640625,540.0127356071472,500.34912109375]},{"page":5,"text":"GLOSSARY ................................................................................................Glossary-1","rect":[161.99539184570313,527.20166015625,538.3340246696472,517.869140625]},{"page":5,"text":"REFERENCES ........................................................................................ References-1","rect":[161.99539184570313,542.759521484375,538.3340246696472,535.38916015625]},{"page":5,"text":"INDEX................................................................................................................Index-1","rect":[161.99539184570313,561.0,538.3240759391784,552.998779296875]},{"page":5,"text":"Figures","rect":[286.0799865722656,592.6556396484375,343.7913625602722,577.7171020507813]},{"page":5,"text":"Figure 1-1. Reconnaissance and security in offensive, defensive, and stability operations..........1-9","rect":[104.4000015258789,620.0816650390625,540.0105993766784,610.7491455078125]},{"page":5,"text":"Figure 1-2. Brigade reconnaissance cell......................................................................................1-12","rect":[104.4000015258789,635.5616455078125,539.8910315055847,626.3187255859375]},{"page":5,"text":"Figure 1-3. Squadron in its own area of operations ..................................................................... 1-13","rect":[104.4000015258789,651.1616821289063,539.8910315055847,641.8291625976563]},{"page":5,"text":"Figure 1-4. Squadron in BCT deep area of operations ................................................................ 1-14","rect":[104.4000015258789,666.6416625976563,539.8910315055847,657.3091430664063]},{"page":5,"text":"Figure 1-5. Squadron operating across another battalion’s area of operations...........................1-15","rect":[104.4000015258789,682.1216430664063,539.8810827751159,672.7891235351563]},{"page":5,"text":"Figure 1-6. Squadron conducting reconnaissance in the brigade area of operations .................1-17","rect":[104.4000015258789,697.6016845703125,539.8910315055847,688.2691650390625]},{"page":5,"text":"Figure 1-7. ABCT Cavalry units and enablers (shaded) ..............................................................1-19","rect":[104.4000015258789,713.0816650390625,539.8910315055847,703.7491455078125]},{"page":5,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":5,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":5,"text":"iii","rect":[532.43994140625,754.0800170898438,539.9819194335937,747.635986328125]},{"page":6,"text":"Contents","rect":[72.0,62.4990234375,111.08339910888673,55.8480224609375]},{"page":6,"text":"Figure 1-8. IBCT Cavalry units and enablers (shaded) ............................................................... 1-20","rect":[86.4000015258789,89.8016128540039,521.8910315055847,80.4690933227539]},{"page":6,"text":"Figure 1-9. SBCT Cavalry units (shaded).................................................................................... 1-20","rect":[86.4000015258789,105.28165435791016,521.8810827751159,95.94913482666016]},{"page":6,"text":"Figure 1-10. Air Cavalry squadron............................................................................................... 1-22","rect":[86.4000015258789,120.76163482666016,521.8810827751159,111.42911529541016]},{"page":6,"text":"Figure 3-1. CCIR and EEFI breakdown......................................................................................... 3-7","rect":[86.4000015258789,136.24166870117188,522.0205481071472,126.9091567993164]},{"page":6,"text":"Figure 3-2. Reconnaissance tempo............................................................................................. 3-11","rect":[86.4000015258789,151.72164916992188,521.8810827751159,142.47877502441407]},{"page":6,"text":"Figure 3-3. Development of guidance for reconnaissance and security tasks............................ 3-15","rect":[86.4000015258789,167.20162963867188,521.8810827751159,157.86911010742188]},{"page":6,"text":"Figure 3-4. BCT information collection timeline........................................................................... 3-18","rect":[86.4000015258789,182.80160522460938,521.8810827751159,173.46908569335938]},{"page":6,"text":"Figure 3-5. Priority intelligence requirement breakdown............................................................. 3-20","rect":[86.4000015258789,198.28164672851563,521.8910315055847,189.0387725830078]},{"page":6,"text":"Figure 4-1. IBCT zone reconnaissance graphics ........................................................................ 4-12","rect":[86.4000015258789,213.76162719726563,521.8910315055847,204.42910766601563]},{"page":6,"text":"Figure 4-2. SBCT area reconnaissance ...................................................................................... 4-15","rect":[86.4000015258789,229.24166870117188,521.8910315055847,219.90914916992188]},{"page":6,"text":"Figure 4-3. SBCT route reconnaissance mission........................................................................ 4-17","rect":[86.4000015258789,244.72164916992188,521.8910315055847,235.38912963867188]},{"page":6,"text":"Figure 4-4. Reconnaissance handover........................................................................................ 4-21","rect":[86.4000015258789,260.2016296386719,521.8810827751159,250.95875549316407]},{"page":6,"text":"Figure 4-5. Reconnaissance handover between squadron and combat aviation brigade .......... 4-22","rect":[86.4000015258789,275.6816101074219,521.8910315055847,266.438720703125]},{"page":6,"text":"Figure 4-6. Reconnaissance handover, follow-on battalion continues mission........................... 4-23","rect":[86.4000015258789,291.2816467285156,521.8810827751159,281.9491271972656]},{"page":6,"text":"Figure 5-1. SBCT stationary screen mission............................................................................... 5-10","rect":[86.4000015258789,306.76165771484377,521.9009802360534,297.42913818359377]},{"page":6,"text":"Figure 5-2. ABCT advance guard mission................................................................................... 5-15","rect":[86.4000015258789,322.24163818359377,521.8910315055847,312.90911865234377]},{"page":6,"text":"Figure 5-3. IBCT Cavalry squadron stationary flank guard ......................................................... 5-17","rect":[86.4000015258789,337.7216491699219,521.8910315055847,328.3891296386719]},{"page":6,"text":"Figure 5-4. Moving flank guard mission....................................................................................... 5-19","rect":[86.4000015258789,353.20166015625,521.8810827751159,343.869140625]},{"page":6,"text":"Figure 5-5. 4-10 Cavalry task organization.................................................................................. 5-20","rect":[86.4000015258789,368.681640625,521.8910315055847,359.34912109375]},{"page":6,"text":"Figure 5-6. Moving flank guard, simultaneous deployment into zone ......................................... 5-21","rect":[86.4000015258789,384.2816467285156,521.8910315055847,374.9491271972656]},{"page":6,"text":"Figure 5-7. Squadron guard operation on phase line New York ................................................. 5-22","rect":[86.4000015258789,399.76165771484377,521.8910315055847,390.42913818359377]},{"page":6,"text":"Figure 5-8. Visual contact during moving flank guard operation ................................................. 5-23","rect":[86.4000015258789,415.24163818359377,521.8910315055847,405.90911865234377]},{"page":6,"text":"Figure 5-9. Security force crossing the LD separately to establish a flank screen...................... 5-25","rect":[86.4000015258789,430.7216491699219,521.8810827751159,421.3891296386719]},{"page":6,"text":"Figure 5-10. Security force continuing to cross LD separately to establish a flank screen......... 5-26","rect":[86.4000015258789,446.20166015625,521.8910315055847,436.869140625]},{"page":6,"text":"Figure 5-11. Movement to contact technique during moving flank security mission................... 5-27","rect":[86.4000015258789,461.681640625,521.8810827751159,452.34912109375]},{"page":6,"text":"Figure 5-12. Zone reconnaissance technique during moving flank security mission.................. 5-28","rect":[86.4000015258789,477.2816467285156,521.8909704704284,467.9491271972656]},{"page":6,"text":"Figure 5-13. Reinforced SBCT performing advanced cover........................................................ 5-31","rect":[86.4000015258789,492.76165771484377,521.8910315055847,483.42913818359377]},{"page":6,"text":"Figure 5-14. Reinforced ABCT performing flank cover................................................................ 5-32","rect":[86.4000015258789,508.24163818359377,521.8910315055847,498.90911865234377]},{"page":6,"text":"Figure 5-15. Reinforced ABCT performing defensive cover........................................................ 5-35","rect":[86.4000015258789,523.7216796875,521.8910315055847,514.38916015625]},{"page":6,"text":"Figure 5-16. Cavalry squadron conducting area security............................................................ 5-37","rect":[86.4000015258789,539.20166015625,521.8910315055847,529.869140625]},{"page":6,"text":"Figure 5-17. Convoy security organization.................................................................................. 5-39","rect":[86.4000015258789,554.681640625,521.8910315055847,545.34912109375]},{"page":6,"text":"Figure 5-18. Forward passage of lines ........................................................................................ 5-44","rect":[86.4000015258789,570.1616821289063,521.8910315055847,560.8291625976563]},{"page":6,"text":"Figure 5-19. Rearward passage of lines...................................................................................... 5-45","rect":[86.4000015258789,585.7616577148438,521.8810827751159,576.4291381835938]},{"page":6,"text":"Figure 6-1. Stability tasks............................................................................................................. 6-11","rect":[86.4000015258789,601.24169921875,521.8910315055847,591.9091796875]},{"page":6,"text":"Figure 7-1. Process for evacuation of the wounded...................................................................... 7-6","rect":[86.4000015258789,616.7216796875,522.0205481071472,607.38916015625]},{"page":6,"text":"Tables","rect":[271.67999267578127,655.4955444335938,322.29871729660035,643.8926391601563]},{"page":6,"text":"Table 1-1. Squadron employment comparisons.......................................................................... 1-16","rect":[86.4000015258789,686.0816650390625,521.8910315055847,676.7491455078125]},{"page":6,"text":"Table 3-1. Available reconnaissance and security information collection capabilities ................ 3-22","rect":[86.4000015258789,701.5616455078125,521.9009802360534,692.2291259765625]},{"page":6,"text":"Table 4-1. Dedicated reconnaissance units and types of reconnaissance operations ................. 4-9","rect":[86.4000015258789,717.1616821289063,522.0205481071472,707.8291625976563]},{"page":6,"text":"iv","rect":[72.0,754.0800170898438,79.52399664306641,747.635986328125]},{"page":6,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8839743652344,747.6090087890625]},{"page":6,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":7,"text":"Contents","rect":[501.0,62.4990234375,540.0807211914063,55.8480224609375]},{"page":7,"text":"Table 5-1. Typical echelon of security forces for a given operation at echelon ............................. 5-7","rect":[104.4000015258789,89.8016128540039,540.0205481071472,80.4690933227539]},{"page":7,"text":"Table 5-2. Moving flank guard movement method comparison ................................................... 5-18","rect":[104.4000015258789,105.28165435791016,539.9009802360534,95.94913482666016]},{"page":7,"text":"Table 5-3. Typical command and support relationships for cover operations .............................5-29","rect":[104.4000015258789,120.76163482666016,539.9009802360534,111.42911529541016]},{"page":7,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":7,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":7,"text":"v","rect":[534.9599609375,754.0800170898438,539.9639609375,749.4089965820313]},{"page":8,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.21988892555239,375.853759765625]},{"page":9,"text":"Preface","rect":[286.0799865722656,131.21554565429688,343.7753713493347,119.42109680175781]},{"page":9,"text":"FM 3-98 provides doctrinal guidance and direction for Cavalry organizations and reconnaissance and security","rect":[108.0,163.9014129638672,540.0777173042297,154.84776306152345]},{"page":9,"text":"organizations. This field manual establishes the foundation for the development of tactics and procedures in","rect":[108.0,175.42515563964845,540.0519604682922,166.3715057373047]},{"page":9,"text":"subordinate doctrine publications. This publication applies across the range of military operations. The focus","rect":[108.0,186.82933044433595,540.1554458742141,177.7756805419922]},{"page":9,"text":"of this field manual is Cavalry formations within the units listed below; however, all maneuver formations","rect":[108.0,198.3530731201172,540.1504409914016,189.29942321777345]},{"page":9,"text":"must be able to conduct reconnaissance and security operations.","rect":[107.99996185302735,209.8767547607422,363.6930944919586,200.82310485839845]},{"page":9,"text":" Armored brigade combat team Cavalry squadron (ABCT).","rect":[133.1999969482422,223.3014373779297,385.4093725681305,214.24778747558595]},{"page":9,"text":" Infantry brigade combat team Cavalry squadron (IBCT).","rect":[133.1999969482422,236.8613739013672,377.59876465797427,227.80772399902345]},{"page":9,"text":" Stryker brigade combat team Cavalry squadron (SBCT).","rect":[133.1999969482422,250.3014373779297,377.0031530857086,241.24778747558595]},{"page":9,"text":" Battalion scout platoons.","rect":[133.1999969482422,263.8414611816406,250.40857911109925,254.80772399902345]},{"page":9,"text":" Combat aviation brigade air Cavalry squadron.","rect":[133.1999969482422,277.3014221191406,338.97587037086489,268.247802734375]},{"page":9,"text":" Chemical, biological, radiological, and nuclear reconnaissance platoons.","rect":[133.1999969482422,290.86138916015627,440.7653295993805,281.8077697753906]},{"page":9,"text":" Engineer reconnaissance platoons.","rect":[133.1999969482422,304.3013916015625,289.290354013443,295.2477722167969]},{"page":9,"text":"The principal audiences for FM 3-98 are commanders, leaders, and staffs responsible for the planning,","rect":[107.99351501464844,321.821044921875,540.091135263443,312.7674255371094]},{"page":9,"text":"execution, or support of reconnaissance and security operations as well as instructors charged with teaching","rect":[107.99349975585938,333.3447570800781,540.0456128120422,324.2911376953125]},{"page":9,"text":"reconnaissance and security operations.","rect":[107.99349975585938,344.86846923828127,266.3853552341461,335.8148498535156]},{"page":9,"text":"Commanders ensure that their decisions and the actions of their units comply with applicable United States,","rect":[107.99349975585938,362.38812255859377,539.9506933689117,353.3345031738281]},{"page":9,"text":"international, and host-nation laws and regulations. Commanders ensure that their Soldiers operate according","rect":[107.99352264404297,373.9118347167969,540.1045117378235,364.85821533203127]},{"page":9,"text":"to the law of land warfare and the rules of engagement. (Refer to FM 6-27 for more information.)","rect":[107.99352264404297,385.435546875,497.56399446582796,376.3819274902344]},{"page":9,"text":"FM 3-98 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the","rect":[107.98358917236328,402.8356628417969,540.0875232200623,393.7720642089844]},{"page":9,"text":"glossary and the text. Terms for which FM 3-98 is the proponent publication (the authority) are marked with","rect":[107.98358917236328,414.359375,540.0454297065735,405.3057556152344]},{"page":9,"text":"an asterisk (*) in the glossary. Terms and definitions for which FM 3-98 is the proponent publication are","rect":[107.98356628417969,425.8830871582031,540.065245388031,416.8294677734375]},{"page":9,"text":"boldfaced in the text. For definitions shown in the text, the term is italicized and the number of the proponent","rect":[107.98356628417969,437.3869323730469,540.1172686824799,428.35321044921877]},{"page":9,"text":"publication follows the definition.","rect":[107.98356628417969,448.9106140136719,244.14469361305238,439.87689208984377]},{"page":9,"text":"FM 3-98 applies to the Active Army, Army National Guard/Army National Guard of the United States, and","rect":[107.97360229492188,466.3306579589844,540.0244336128235,457.27703857421877]},{"page":9,"text":"United States Army Reserve unless otherwise stated.","rect":[107.96363830566406,477.8543701171875,319.25110840797427,468.8007507324219]},{"page":9,"text":"The proponent of FM 3-98 is the United States Army Maneuver Center of Excellence. The preparing agency","rect":[107.963623046875,495.3739929199219,540.0454907417297,486.32037353515627]},{"page":9,"text":"is the Doctrine and Collective Training Division, United States Army Maneuver Center of Excellence. Send","rect":[107.96360778808594,506.8977355957031,540.0284008979797,497.8441162109375]},{"page":9,"text":"your comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank","rect":[107.96360778808594,518.4214477539063,540.190733669281,509.3677978515625]},{"page":9,"text":"Forms) to Commander, Maneuver Center of Excellence, Directorate of Training and Doctrine, Doctrine and","rect":[107.96360778808594,529.9451904296875,540.0346264839172,520.8915405273438]},{"page":9,"text":"Collective Training Division, ATTN: ATZK-TDD, 1 Karker Street, Fort Benning, GA 31905-5410; by email","rect":[107.96360778808594,541.3494262695313,540.2126666316987,532.2957763671875]},{"page":9,"text":"to usarmy.benning.mcoe.mbx.doctrine@army.mil; or submit an electronic DA Form 2028.","rect":[107.95368957519531,552.8731079101563,455.318674325943,543.8194580078125]},{"page":9,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":9,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":9,"text":"vii","rect":[530.0369873046875,754.0800170898438,540.0989848632812,747.635986328125]},{"page":10,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.21988892555239,375.853759765625]},{"page":11,"text":"Introduction","rect":[268.3199768066406,131.21554565429688,361.596591761589,119.43705749511719]},{"page":11,"text":"FM 3-98 provides the commander and staff of Cavalry formations with doctrine relevant to Army and joint","rect":[108.0,163.9014129638672,539.9892169246674,154.8378143310547]},{"page":11,"text":"operations. This publication explains how effective reconnaissance and security operations generate depth,","rect":[108.0,175.42515563964845,540.0758764743805,166.3715057373047]},{"page":11,"text":"allow commanders reaction time and maneuver space, fight for information and collect information through","rect":[108.0,186.82933044433595,540.050190448761,177.7756805419922]},{"page":11,"text":"stealth, protect forces against surprise, ease the forward movement of follow-on forces, and provide","rect":[108.0,198.3530731201172,540.1036365013123,189.29942321777345]},{"page":11,"text":"commanders with flexibility and adaptability. The doctrine in this publication is applicable across offensive,","rect":[108.00007629394531,209.8767547607422,539.970529794693,200.82310485839845]},{"page":11,"text":"defensive, and stability operations. This publication provides doctrinal guidance for all formations assigned","rect":[108.00007629394531,221.40049743652345,539.951557636261,212.3468475341797]},{"page":11,"text":"to the Armored brigade combat team, the Infantry brigade combat team, and the Stryker brigade combat","rect":[108.0100326538086,232.9242401123047,540.1405841121674,223.87059020996095]},{"page":11,"text":"team. The following is a summarization of each chapter of this manual:","rect":[108.01007080078125,244.4479217529297,393.50352966880799,235.39427185058595]},{"page":11,"text":"","rect":[133.1999969482422,255.14109802246095,139.2058769197464,250.41357421875]},{"page":11,"text":"Chapter 1 addresses the role of Cavalry in","rect":[151.1999969482422,257.8613586425781,331.2568554878235,248.80772399902345]},{"page":11,"text":"Cavalry organizations.","rect":[151.20999145507813,269.3851013183594,241.78220582008363,260.33148193359377]},{"page":11,"text":"offensive, defensive, and stability operations","rect":[335.5197448730469,257.8613586425781,521.3254898195266,248.80772399902345]},{"page":11,"text":"and","rect":[525.48681640625,255.84945678710938,539.9467968940735,248.80772399902345]},{"page":11,"text":" Chapter 2 addresses peer and near peer threats, threat reconnaissance, and security tactics.","rect":[133.1999969482422,282.8214111328125,511.40345215797427,273.7677917480469]},{"page":11,"text":" Chapter 3 discusses the updated concepts of command and control relating to commanders’","rect":[133.1999969482422,296.26141357421877,540.0981741533279,287.2077941894531]},{"page":11,"text":"reconnaissance and security guidance, the operations process, an understanding of the threat,","rect":[151.2198944091797,307.9046630859375,540.115061044693,298.8510437011719]},{"page":11,"text":"potential threat groups, and threat characteristics.","rect":[151.21990966796876,319.4283752441406,348.12708497047427,310.374755859375]},{"page":11,"text":" Chapter 4 discusses the fundamentals of reconnaissance, types of reconnaissance operations, and","rect":[133.1999969482422,332.86138916015627,540.0993847846985,323.8077697753906]},{"page":11,"text":"a reconnaissance handover.","rect":[151.1999969482422,342.3731994628906,260.9721167087555,335.33148193359377]},{"page":11,"text":"","rect":[133.1999969482422,355.10113525390627,139.2058769197464,350.3736267089844]},{"page":11,"text":"","rect":[133.1999969482422,380.0611267089844,139.2058769197464,375.3336181640625]},{"page":11,"text":"","rect":[133.1999969482422,405.0211181640625,139.2058769197464,400.2936096191406]},{"page":11,"text":"Chapter 5 discusses the fundamentals of security operations, counterreconnaissance, and the types","rect":[151.1999969482422,357.8214111328125,540.1700332765579,348.7677917480469]},{"page":11,"text":"of security operations.","rect":[151.20994567871095,369.3451232910156,240.45752930641175,360.29150390625]},{"page":11,"text":"Chapter 6 discusses reconnaissance and security stability planning, stability principles and","rect":[151.1999969482422,382.7814025878906,540.040424823761,373.727783203125]},{"page":11,"text":"frameworks, and stability tasks.","rect":[151.1999969482422,394.30511474609377,278.0107214450836,385.2514953613281]},{"page":11,"text":"Chapter 7 describes considerations for planning and executing sustainment operations.","rect":[151.1999969482422,407.74139404296877,497.3698217868805,398.6877746582031]},{"page":11,"text":"To comprehend FM 3-98, the reader must understand the operational art, the principles of war, and the links","rect":[108.00346374511719,425.36065673828127,540.1748550539016,416.3269348144531]},{"page":11,"text":"between the operational and tactical levels of war described in JP 1, Volume 2, JP 3-0, and ADP 3-0. The","rect":[108.00346374511719,436.8843688964844,540.078184841156,427.85064697265627]},{"page":11,"text":"reader should understand how the offensive, defensive, stability, and defense support of civil authorities’","rect":[107.98355102539063,448.3084716796875,539.8901663408279,439.2548522949219]},{"page":11,"text":"tasks describe carry over and affect the conduct described by each task (in ADPs 3-07, 3-28, and 3-90).","rect":[107.98355102539063,459.8321838378906,540.0612890720367,450.778564453125]},{"page":11,"text":"Readers should understand the operations process (plan, prepare, execute, and assess) and how that process","rect":[107.96360778808594,471.3360290527344,539.9828384523391,462.30230712890627]},{"page":11,"text":"relates to the Army’s military decision-making process and troop leading procedures described in ADP 5-0.","rect":[107.96360778808594,482.879638671875,540.0383398532867,473.8260192871094]},{"page":11,"text":"The reader must also comprehend the concepts associated with mission command and command and control","rect":[107.94369506835938,494.3834533691406,540.0880938777924,485.3497314453125]},{"page":11,"text":"as described in ADP 6-0. Reviewing these publications assists the reader in understanding FM 3-98.","rect":[107.9337387084961,505.92706298828127,499.10279297828677,496.8734436035156]},{"page":11,"text":"While doctrine provides leaders at all echelons with authoritative principles to consider before, during, and","rect":[107.93370056152344,523.3272094726563,540.1091504096985,514.2735595703125]},{"page":11,"text":"after execution of reconnaissance and security operations, FM 3-98 is not a substitute for common sense,","rect":[107.94365692138672,534.8509521484375,539.9984228610992,525.7973022460938]},{"page":11,"text":"professional military judgment, and leaders’ imperatives to act aggressively. As in any combat operation,","rect":[107.93368530273438,546.3746337890625,539.982736825943,537.31103515625]},{"page":11,"text":"success during offensive, defensive, and stability operations depends mainly on leaders and Soldiers who are","rect":[107.93368530273438,557.8983764648438,540.0393054466248,548.8447265625]},{"page":11,"text":"tough, disciplined, and competent and who take the initiative consistent with the mission, commander’s","rect":[107.93370056152344,569.4220581054688,540.0970352296829,560.368408203125]},{"page":11,"text":"intent, and the principles outlined within this manual.","rect":[107.93368530273438,580.9258422851563,321.62549805641177,571.8921508789063]},{"page":11,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":11,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":11,"text":"ix","rect":[532.43994140625,754.0800170898438,539.9639609375,747.635986328125]},{"page":12,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.21988892555239,375.853759765625]},{"page":13,"text":"Chapter 1","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":13,"text":"Cavalry Organizations and the Operational Environment","rect":[102.0,154.17567443847657,527.7042063798905,139.2211456298828]},{"page":13,"text":"Reconnaissance and security operations are essential to the execution of offensive,","rect":[126.0,188.85357666015626,504.1167199611664,178.81822204589845]},{"page":13,"text":"defensive, ","rect":[126.0000228881836,200.0,173.76016783714295,191.4148406982422]},{"page":13,"text":"and ","rect":[180.1192169189453,200.0,198.83864378929139,191.4148406982422]},{"page":13,"text":"stability ","rect":[205.1976776123047,201.4501953125,243.35742735862733,191.4148406982422]},{"page":13,"text":"operations.","rect":[249.83790588378907,201.42811584472657,298.44481444358828,191.4148406982422]},{"page":13,"text":"Brigade combat teams (BCTs) conduct","rect":[307.32098388671877,201.4501953125,504.0692420597076,191.4148406982422]},{"page":13,"text":"reconnaissance and security operations to develop the situation and identify, create, and","rect":[126.0000228881836,214.046875,504.20389890670779,204.0115203857422]},{"page":13,"text":"preserve options to seize, retain, and exploit the initiative.","rect":[126.0000228881836,226.7428741455078,370.4620568752289,216.72959899902345]},{"page":13,"text":"Reconnaissance and security operations allow BCTs to achieve positions of relative","rect":[126.0000228881836,249.44110107421876,504.1111716041565,239.40574645996095]},{"page":13,"text":"advantage. Effective reconnaissance and security operations confirm or deny the","rect":[126.0000228881836,262.0377197265625,504.14785373306276,252.0023651123047]},{"page":13,"text":"commander’s and staff’s initial understanding and visualization of the tactical and","rect":[126.0000228881836,274.63433837890627,504.10023069381716,264.5989685058594]},{"page":13,"text":"operational situation. Reconnaissance and security operations develop the intelligence","rect":[126.0000228881836,287.23101806640627,503.9776266822815,277.1956481933594]},{"page":13,"text":"picture for the BCT so the commander can describe, direct, lead, and make effective decisions.","rect":[126.0000228881836,299.9270324707031,503.9985864162445,289.9137268066406]},{"page":13,"text":"Reconnaissance and security operations provide a continuous flow of combat","rect":[126.01107788085938,322.625244140625,504.03500133705139,312.5898742675781]},{"page":13,"text":"information and intelligence that assist commanders with uncertainty, make contact","rect":[126.01107788085938,335.2218933105469,503.98092418861389,325.1865234375]},{"page":13,"text":"under favorable conditions, identify opportunities, prevent surprise, and make timely","rect":[126.02213287353516,347.81854248046877,504.15873289108279,337.7831726074219]},{"page":13,"text":"decisions. Reconnaissance and security operations provide BCT commanders with","rect":[126.02215576171875,360.53662109375,504.170024394989,350.5012512207031]},{"page":13,"text":"freedom of movement and action to create advantageous conditions for future","rect":[126.02215576171875,373.13323974609377,504.13332736587526,363.0978698730469]},{"page":13,"text":"operations to seize, retain, and exploit initiative.","rect":[126.03321075439453,385.8292541503906,337.835622549057,375.8159484863281]},{"page":13,"text":"SECTION I – OPERATIONAL OVERVIEW","rect":[99.36000061035156,409.82403564453127,328.2480439453125,400.94403076171877]},{"page":13,"text":"1-1. Reconnaissance operations allow commanders to understand the situation, visualize the battle, and","rect":[108.0,433.1614990234375,540.056049823761,424.1277770996094]},{"page":13,"text":"make decisions. Security operations provide commanders with reaction time and maneuver space to make","rect":[108.0,444.7051086425781,540.098204372406,435.6514892578125]},{"page":13,"text":"decisions and protect the force from anticipated and unanticipated dangers. Reconnaissance and security","rect":[108.0,456.2288513183594,540.081684589386,447.1751403808594]},{"page":13,"text":"operations answer commander’s critical information requirements (CCIRs), mitigate risk, identify enemy","rect":[108.0,467.7525634765625,540.0379223823547,458.6989440917969]},{"page":13,"text":"weaknesses, and isolate the enemy from sources of strength.","rect":[108.0,479.2762756347656,349.161447763443,470.22265625]},{"page":13,"text":"1-2. Cavalry units conduct reconnaissance and security operations in close contact with enemy","rect":[107.99004364013672,496.6763916015625,540.0759472846985,487.6227722167969]},{"page":13,"text":"organizations and civilian populations. Cavalry organizations employ appropriate combinations of mounted","rect":[107.99004364013672,508.2001037597656,540.0360913276672,499.146484375]},{"page":13,"text":"and dismounted tactics and to fight for information and develop the situation based upon the mission variables","rect":[107.99004364013672,519.723876953125,540.0309341554641,510.67022705078127]},{"page":13,"text":"of METT-TC (I): mission, enemy, terrain and weather, troops and support available, time available, civil","rect":[107.99004364013672,531.2476196289063,539.9873858699799,522.1939697265625]},{"page":13,"text":"considerations, and informational considerations.","rect":[107.98008728027344,541.0,304.98890137672427,533.7176513671875]},{"page":13,"text":"HISTORICAL ROLES OF CAVALRY UNITS","rect":[90.0,562.050537109375,373.2765768928528,552.3348999023438]},{"page":13,"text":"1-3. Armies have used Cavalry forces to capitalize upon their significant advantage in mobility, making","rect":[108.0,582.3414306640625,540.053852558136,573.2877807617188]},{"page":13,"text":"them well suited for long-range reconnaissance and security operations. The Cavalry forces’ fighting ability","rect":[108.00003814697266,593.74560546875,540.052875995636,584.6919555664063]},{"page":13,"text":"make them well suited for shaping subsequent fights and giving the commander time to make decisions.","rect":[108.00003814697266,605.2693481445313,540.0847265720367,596.2156982421875]},{"page":13,"text":"Reconnaissance and security operations provide commanders the ability to concentrate forces at decisive","rect":[107.99011993408203,616.7930297851563,540.0928943138123,607.7393798828125]},{"page":13,"text":"points while protecting against surprise. A decisive point is key terrain, key event, critical factor, or function","rect":[107.99014282226563,628.3167724609375,540.0779004096985,619.2631225585938]},{"page":13,"text":"that, when acted upon, enables commanders to gain a marked advantage over an enemy or contribute","rect":[107.99014282226563,639.8405151367188,540.120909450531,630.786865234375]},{"page":13,"text":"materially to achieving success (JP 5-0). Cavalry continues to play key roles, such as—","rect":[107.99014282226563,651.3641967773438,457.6657190322876,642.310546875]},{"page":13,"text":" Conducting reconnaissance operations to detect enemy weaknesses and strengths.","rect":[133.1999969482422,664.7814331054688,478.09037232398989,655.727783203125]},{"page":13,"text":" Conducting security operations to provide early warning and maneuver space.","rect":[133.1999969482422,678.221435546875,463.4101049900055,669.1677856445313]},{"page":13,"text":" Covering retreats.","rect":[133.1999969482422,691.7814331054688,222.93589234352113,682.727783203125]},{"page":13,"text":" Countering enemy reconnaissance forces.","rect":[133.1999969482422,705.221435546875,317.986154794693,696.1677856445313]},{"page":13,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":13,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":13,"text":"1-1","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":14,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":14,"text":" Counterattacking enemy infantry attacks.","rect":[115.19999694824219,83.38139343261719,298.18241333961489,74.32775115966797]},{"page":14,"text":" Administering the decisive blow through isolation and pursuit.","rect":[115.19999694824219,96.94139099121094,383.7238562107086,87.88774871826172]},{"page":14,"text":"1-4. For example, the operations of the newly organized Cavalry Corps of the Army of the Potomac during","rect":[89.9935073852539,114.46104431152344,522.0504956245422,105.40740203857422]},{"page":14,"text":"the Gettysburg campaign were an essential factor in the Union’s success in that pivotal battle. At Gettysburg,","rect":[89.99349975585938,125.98472595214844,522.0871679782867,116.93108367919922]},{"page":14,"text":"the Union Army employed an effective Cavalry force that worked directly for the commanding General of","rect":[89.99349975585938,137.5084686279297,522.0682669267654,128.45481872558595]},{"page":14,"text":"the Army. Below is information that highlights an example of a historical role that Cavalry units have played","rect":[89.99349975585938,149.03221130371095,522.0672192573547,139.9785614013672]},{"page":14,"text":"on the battlefield.","rect":[90.00346374511719,158.54397583007813,160.28821778297425,151.5022430419922]},{"page":14,"text":"Shaping the Battlefield with Cavalry: Gettysburg, the First Day","rect":[140.75999450683595,183.78001403808595,453.170529296875,173.07601928710938]},{"page":14,"text":"In June 1863, as General Robert E. Lee led his Army of Northern Virginia through the","rect":[117.84000396728516,201.2213592529297,476.10031008529668,192.16770935058595]},{"page":14,"text":"Shenandoah Valley into Maryland and Pennsylvania, almost one half of the confederate","rect":[117.84000396728516,212.7413787841797,476.11529421615605,203.68772888183595]},{"page":14,"text":"cavalry forces under Major General J.E.B. Stuart were conducting independent","rect":[117.84000396728516,224.2613983154297,476.06941711997987,215.20774841308595]},{"page":14,"text":"operations. The absence of Stuart and his reconnaissance and security force would","rect":[117.84000396728516,235.7814178466797,475.9807324409485,226.72776794433595]},{"page":14,"text":"disadvantage Lee as he concentrated his forces in south central Pennsylvania near the","rect":[117.84000396728516,247.3014373779297,476.0943591575623,238.24778747558595]},{"page":14,"text":"town of Gettysburg.","rect":[117.84000396728516,258.8213806152344,197.00806641578675,249.7677459716797]},{"page":14,"text":"The Union Army of the Potomac moved north in several columns, screened by its cavalry.","rect":[117.84000396728516,276.2213439941406,476.0135290622711,267.167724609375]},{"page":14,"text":"The westernmost column benefited from the protection of Brigadier General John Buford’s","rect":[117.84000396728516,287.74139404296877,476.09438020038609,278.6877746582031]},{"page":14,"text":"Cavalry division, a combined arms force. On 29 June, this formation moved to a nexus of ","rect":[117.84000396728516,299.26141357421877,478.5246069431305,290.2077941894531]},{"page":14,"text":"roads near Gettysburg, leaving one of its brigades to cover the Catoctin Mountain passes","rect":[117.84000396728516,310.7814025878906,476.08043366718297,301.727783203125]},{"page":14,"text":"to protect the army’s flank. After a brief encounter with Confederate forces, Buford led his","rect":[117.84000396728516,322.3013916015625,476.08742219257359,313.2477722167969]},{"page":14,"text":"remaining two brigades and one battery of artillery into Gettysburg the following day. He","rect":[117.84000396728516,333.8214111328125,476.14312624740605,324.7677917480469]},{"page":14,"text":"bypassed initial contact to focus on his reconnaissance objective—the location and actions","rect":[117.84000396728516,345.2214050292969,476.20177155780797,336.16778564453127]},{"page":14,"text":"of Lee’s army.","rect":[117.84000396728516,356.74139404296877,175.29725098609925,347.6877746582031]},{"page":14,"text":"Aware of a Confederate concentration of forces to his west but lacking detailed","rect":[117.84000396728516,374.26141357421877,476.050434589386,365.2077941894531]},{"page":14,"text":"information, Buford dispatched scouts to conduct area reconnaissance west and north of ","rect":[117.84000396728516,385.7814025878906,478.5126440525055,376.727783203125]},{"page":14,"text":"Gettysburg. They reported completely and accurately the locations and lines of march for","rect":[117.84000396728516,397.3013916015625,475.9557388429642,388.2477722167969]},{"page":14,"text":"all three corps of Lee’s army. Buford immediately transmitted the collected information to","rect":[117.84000396728516,408.7013854980469,476.0894055366516,399.64776611328127]},{"page":14,"text":"General Meade and made recommendations to the Union Army commander. Buford’s","rect":[117.84000396728516,420.2214050292969,476.22081452655797,411.16778564453127]},{"page":14,"text":"reports allowed Meade to understand and visualize the terrain surrounding Gettysburg","rect":[117.84000396728516,431.74139404296877,475.95882081985476,422.6877746582031]},{"page":14,"text":"before occupation. Based on his scouts’ reports, Buford deployed his division to cover the","rect":[117.84000396728516,443.26141357421877,476.1422412376404,434.2077941894531]},{"page":14,"text":"primary approaches to the town from the north and west. He also ensured local security","rect":[117.84000396728516,454.7814025878906,476.11236452865605,445.727783203125]},{"page":14,"text":"by implementing martial law, the arrest of a suspected spy, and the prohibition of alcohol","rect":[117.84000396728516,466.3013916015625,476.16197693443299,457.2477722167969]},{"page":14,"text":"sales to his soldiers. Buford understood his mission to delay the Confederates and deny","rect":[117.84000396728516,477.7013854980469,476.10528445053105,468.64776611328127]},{"page":14,"text":"them access to the heights overlooking the town so the Army of the Potomac could occupy","rect":[117.84000396728516,489.2214050292969,476.14422488021855,480.16778564453127]},{"page":14,"text":"that position.","rect":[117.84000396728516,500.72149658203127,170.727609872818,491.6877746582031]},{"page":14,"text":"Having pinpointed and identified their lines of march and probable objective (Gettysburg),","rect":[117.84000396728516,518.2614135742188,476.1481726169586,509.207763671875]},{"page":14,"text":"Buford undertook preparations to delay the Confederate forces (after identifying their","rect":[117.84000396728516,529.7814331054688,476.22081452655797,520.727783203125]},{"page":14,"text":"advance) as long as possible. He prepared his two brigades to cover a seven-mile arc","rect":[117.84000396728516,541.3014526367188,476.01852297592168,532.247802734375]},{"page":14,"text":"outside the town stretching from the west to the northeast. His main effort focused on the","rect":[117.84000396728516,552.701416015625,476.01071047592168,543.6477661132813]},{"page":14,"text":"Chambersburg Pike that reached Gettysburg from the west where the closest Confederate","rect":[117.84000396728516,564.221435546875,476.02068972396855,555.1677856445313]},{"page":14,"text":"forces were encamped. A series of ridgelines crossed the road, and Buford used these to","rect":[117.84000396728516,575.7413940429688,476.0994153022766,566.687744140625]},{"page":14,"text":"add depth to his position. His main position lay upon McPherson Ridge, where he deployed","rect":[117.84000396728516,587.2614135742188,476.119282245636,578.207763671875]},{"page":14,"text":"much of one brigade, which he supported with his artillery battery. A series of picket lines","rect":[117.84000396728516,598.7814331054688,476.07643586444859,589.727783203125]},{"page":14,"text":"and small four- to five-man patrols occupied the ridgelines forward of this position to a","rect":[117.84000396728516,610.1814575195313,476.07530641555788,601.1278076171875]},{"page":14,"text":"depth of nearly two miles. At their most advanced point along Whistler’s Ridge, Buford’s","rect":[117.84000396728516,621.701416015625,476.06654816913609,612.6477661132813]},{"page":14,"text":"pickets laid only a half mile from their Confederate counterparts. In Gettysburg’s","rect":[117.84000396728516,633.221435546875,476.1740310792923,624.1677856445313]},{"page":14,"text":"Lutheran Seminary, Buford established his signals officer in the high cupola, which","rect":[117.84000396728516,644.7413940429688,476.1113476753235,635.687744140625]},{"page":14,"text":"permitted observation of the town and its surroundings.","rect":[117.84000396728516,656.2614135742188,340.642160654068,647.207763671875]},{"page":14,"text":"Buford’s operations lay in complete contrast to those undertaken by the Confederates.","rect":[117.84000396728516,673.7814331054688,476.0087378025055,664.727783203125]},{"page":14,"text":"When a North Carolina brigade approached Gettysburg and discovered the Union","rect":[117.84000396728516,685.181396484375,476.08543825149538,676.1277465820313]},{"page":14,"text":"Cavalry in the town, its commander withdrew and reported the contact to his division and","rect":[117.84000396728516,696.701416015625,476.10237550735476,687.6477661132813]},{"page":14,"text":"corps commanders. Neither officer considered the enemy’s presence in Gettysburg to be","rect":[117.84000396728516,708.221435546875,476.12228274154668,699.1677856445313]},{"page":14,"text":"1-2","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":14,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":14,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":15,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":15,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":15,"text":"significant and determined to evict them the following day. They lacked detailed","rect":[135.83999633789063,83.98143005371094,494.055805683136,74.92778778076172]},{"page":15,"text":"information of Buford’s force, and they were under orders not to trigger a general","rect":[135.83999633789063,95.50144958496094,494.1820575008392,86.44780731201172]},{"page":15,"text":"engagement before the arrival of the rest of Lee’s army. A thorough reconnaissance of ","rect":[135.83999633789063,107.02140808105469,496.478830575943,97.96776580810547]},{"page":15,"text":"Gettysburg might have provided a more realistic assessment of the Union position. With","rect":[135.83999633789063,118.42137145996094,494.072407245636,109.36772918701172]},{"page":15,"text":"much of the Confederate Cavalry on detached service, they were not available to locate","rect":[135.83999633789063,129.94139099121095,494.1290576438904,120.88774871826172]},{"page":15,"text":"and track the movements of the Army of the Potomac, much less conduct a deliberate","rect":[135.83999633789063,141.46141052246095,494.0217273216248,132.4077606201172]},{"page":15,"text":"reconnaissance of Gettysburg thus depriving Lee of vital information.","rect":[135.83999633789063,152.98143005371095,415.0456030368805,143.9277801513672]},{"page":15,"text":"In the early hours of 1 July, Confederate Major General Henry Heth led elements of his","rect":[135.83999633789063,170.50144958496095,494.0594070558548,161.4477996826172]},{"page":15,"text":"division down the Chambersburg Pike toward Gettysburg. Heth’s forces quickly","rect":[135.83999633789063,182.0214080810547,493.9289844017029,172.96775817871095]},{"page":15,"text":"encountered Buford’s forward picket line. Large numbers of Confederate skirmishers","rect":[135.83999633789063,193.42137145996095,493.96986848163609,184.3677215576172]},{"page":15,"text":"deployed to engage the pickets, while an artillery battery provided fire support. Buford’s","rect":[135.83999633789063,204.94139099121095,494.1899917726517,195.8877410888672]},{"page":15,"text":"pickets withdrew slowly, keeping the enemy engaged and unable to make a rapid advance.","rect":[135.83999633789063,216.46141052246095,494.13221192359927,207.4077606201172]},{"page":15,"text":"Buford reinforced his forward lines causing further delays for the Confederate advance.","rect":[135.83999633789063,227.98143005371095,494.10633301734927,218.9277801513672]},{"page":15,"text":"Buford’s actions caused the Confederates to deploy their brigades prematurely to prepare","rect":[135.83999633789063,239.50144958496095,494.0266101341248,230.4477996826172]},{"page":15,"text":"for a general assault and commence an artillery bombardment of the Union positions.","rect":[135.83999633789063,251.0214080810547,493.94986939430239,241.96775817871095]},{"page":15,"text":"Confederate deployment allowed the Army of the Potomac the opportunity to gain","rect":[135.83999633789063,262.4213562011719,494.08833742141726,253.3677215576172]},{"page":15,"text":"positions of tactical advantage and retain initiative.","rect":[135.83999633789063,273.9413757324219,343.28983521461489,264.88775634765627]},{"page":15,"text":"Buford and his division set conditions for Meade’s success. As more U.S. formations","rect":[135.83999633789063,291.4613952636719,494.2318618898392,282.40777587890627]},{"page":15,"text":"arrived on the field, other Union forces relieved Buford’s division. Buford’s actions","rect":[135.83999633789063,302.98138427734377,494.0833023195267,293.9277648925781]},{"page":15,"text":"ensured that the Army of the Potomac secured the high ground. Over the next two days,","rect":[135.83999633789063,314.5013732910156,494.0973608493805,305.44775390625]},{"page":15,"text":"General Lee’s army would shatter itself in repeated attacks upon these heights.","rect":[135.83999633789063,325.9013671875,494.12821412086489,316.8477478027344]},{"page":15,"text":"Reconnaissance operations to identify Confederate forces and key terrain, along with","rect":[135.83999633789063,337.42138671875,494.1321301460266,328.3677673339844]},{"page":15,"text":"security operations delaying Confederate advances and protecting the main body, proved","rect":[135.83999633789063,348.9413757324219,494.103413105011,339.88775634765627]},{"page":15,"text":"decisive at The Battle of Gettysburg.","rect":[135.83999633789063,360.4613952636719,281.9611303806305,351.40777587890627]},{"page":15,"text":"CURRENT ROLE","rect":[90.0,389.2506103515625,202.56569926166535,379.5349426269531]},{"page":15,"text":"1-5. The fundamental purpose of the U.S. Army’s Cavalry is to set conditions for successful operations of","rect":[108.0,409.5413818359375,540.0647879228592,400.4877624511719]},{"page":15,"text":"their higher headquarters. These roles are not necessarily missions themselves but translate into mission","rect":[108.0,421.0650939941406,539.9492993354797,412.011474609375]},{"page":15,"text":"statements. Cavalry units conduct the following to set conditions for successful operations:","rect":[108.00999450683594,432.5888366699219,471.98631775474549,423.53521728515627]},{"page":15,"text":" Enable combat operations.","rect":[133.1999969482422,446.0014953613281,257.61263489723208,436.9677734375]},{"page":15,"text":" Provide accurate and timely information to the operations process.","rect":[133.1999969482422,459.4613952636719,416.853098154068,450.40777587890627]},{"page":15,"text":" Operate as combined arms air-ground teams.","rect":[133.1999969482422,473.0213928222656,330.67920899391177,463.9677734375]},{"page":15,"text":" Provide reaction time and maneuver space.","rect":[133.1999969482422,486.4414978027344,323.514963388443,477.40777587890627]},{"page":15,"text":" Preserve combat power and achieve economy of force.","rect":[133.1999969482422,500.0213928222656,370.68360352516177,490.9677734375]},{"page":15,"text":" Facilitate movement and transitions.","rect":[133.1999969482422,511.4494934082031,296.7255651950836,504.40777587890627]},{"page":15,"text":" Fight for information.","rect":[133.1999969482422,527.0214233398438,238.7663061618805,517.9677734375]},{"page":15,"text":"ENABLE COMBAT OPERATIONS","rect":[90.0,550.3680419921875,244.7815761566162,542.0759887695313]},{"page":15,"text":"1-6.","rect":[108.0,568.3095703125,123.92603516578675,561.467041015625]},{"page":15,"text":"Reconnaissance and security operations are essential to all successful operations. BCTs conduct","rect":[133.1988067626953,570.3414306640625,540.1405230770112,561.2877807617188]},{"page":15,"text":"continuous reconnaissance and security operations mainly through their organic Cavalry organizations. BCTs","rect":[108.00995635986328,581.8651733398438,540.0611465578079,572.8115234375]},{"page":15,"text":"must defeat adaptive and determined enemies as well as consolidate tactical gains. Effective reconnaissance","rect":[108.00995635986328,593.3888549804688,540.0314929466248,584.335205078125]},{"page":15,"text":"and security operations improve situational understanding and enable commanders to—","rect":[108.01000213623047,604.9125366210938,459.48841190338137,595.85888671875]},{"page":15,"text":" Identify or create options to seize, retain, and exploit the initiative.","rect":[133.1999969482422,618.3414306640625,417.55628418922427,609.2877807617188]},{"page":15,"text":" Achieve situational understanding.","rect":[133.1999969482422,631.7814331054688,290.4945776462555,622.727783203125]},{"page":15,"text":" Visualize operations in the context of mission variables of METT-TC (I).","rect":[133.1999969482422,645.2014770507813,444.910471200943,636.1677856445313]},{"page":15,"text":" Develop the situation through action in close contact with enemy and civilian populations.","rect":[133.1999969482422,658.7814331054688,512.6066992282867,649.727783203125]},{"page":15,"text":" Execute operations with higher degrees of flexibility, adaptability, synchronization, and integration.","rect":[133.1999969482422,672.221435546875,540.0881445407867,663.1677856445313]},{"page":15,"text":" Understand the tactical, human, and political dynamics within an area of operations.","rect":[133.1999969482422,685.7814331054688,487.88892579078677,676.727783203125]},{"page":15,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":15,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":15,"text":"1-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":16,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":16,"text":"PROVIDE ACCURATE AND TIMELY INFORMATION TO THE OPERATIONS PROCESS","rect":[72.0,83.32803344726563,468.221960067749,75.0360336303711]},{"page":16,"text":"1-7. Accurate and timely reporting allows the BCT to seize and retain the initiative and to concentrate","rect":[90.0,103.30143737792969,522.100645778656,94.24779510498047]},{"page":16,"text":"combat power at the right time and place. The BCT commander requires accurate and timely information on","rect":[89.99000549316406,114.82518005371094,522.055073261261,105.77153778076172]},{"page":16,"text":"enemy, terrain, and the civilian population as they affect the mission. To understand, visualize, describe,","rect":[89.99000549316406,126.22935485839844,522.0428564548492,117.17571258544922]},{"page":16,"text":"direct, lead, and assess combat operations, the BCT commander relies on information collection units and","rect":[89.99000549316406,137.73316955566407,521.8864331245422,128.69932556152345]},{"page":16,"text":"capabilities, ","rect":[89.98999786376953,149.25685119628907,140.47728943824769,140.22312927246095]},{"page":16,"text":"including ","rect":[146.38356018066407,149.2767791748047,186.66977906227113,140.22312927246095]},{"page":16,"text":"national ","rect":[192.57606506347657,148.0,227.2239019870758,140.22312927246095]},{"page":16,"text":"intelligence ","rect":[233.13018798828126,149.2767791748047,282.29468750953677,140.22312927246095]},{"page":16,"text":"sources, ","rect":[288.2009582519531,148.0,323.091867685318,142.0]},{"page":16,"text":"military ","rect":[328.88165283203127,149.2767791748047,363.04847168922427,140.22312927246095]},{"page":16,"text":"intelligence ","rect":[368.95477294921877,149.2767791748047,418.1193640232086,140.22312927246095]},{"page":16,"text":"units,","rect":[423.9101257324219,148.0,445.83707642555239,140.22312927246095]},{"page":16,"text":"special purpose","rect":[454.2632141113281,149.25685119628907,522.0806872825623,140.22312927246095]},{"page":16,"text":"reconnaissance, unmanned aircraft systems (UASs), aviation, electromagnetic warfare, cyberspace operation","rect":[89.98005676269531,160.80052185058595,522.0547680854797,151.7468719482422]},{"page":16,"text":"platforms, and any unit in contact. These units and capabilities support intelligence preparation of the","rect":[89.98005676269531,172.3242645263672,522.079649684906,163.27061462402345]},{"page":16,"text":"battlefield (IPB), the operations process, and adjustments during operations. During IPB, the staff considers","rect":[89.98001861572266,183.8479461669922,522.1247451906204,174.7843475341797]},{"page":16,"text":"how the adversary or enemy utilizes cyberspace and the electromagnetic spectrum (EMS) to achieve their","rect":[89.98001861572266,195.25218200683595,522.0779715166092,186.1985321044922]},{"page":16,"text":"objective. The commander and staff’s best means of visualizing and understanding their area of operations,","rect":[89.98003387451172,206.77586364746095,522.0678198337555,197.71226501464845]},{"page":16,"text":"if battlefield circulation is not possible, is through reconnaissance operations.","rect":[89.9700698852539,218.2996063232422,399.05875611305239,209.24595642089845]},{"page":16,"text":"1-8. Commanders require timely and accurate information during the execution of operations to maneuver","rect":[89.97006225585938,235.8192596435547,521.9195852861404,226.76560974121095]},{"page":16,"text":"and direct combat operations against the enemy. The primary source of information for the commander","rect":[89.97006225585938,247.3429412841797,522.0729666337967,238.28929138183595]},{"page":16,"text":"during battle is the reconnaissance and security organization—the Cavalry.","rect":[89.97006225585938,258.8666687011719,390.18738770484927,249.8130340576172]},{"page":16,"text":"1-9.","rect":[89.97006225585938,274.2548522949219,105.89609742164612,267.39239501953127]},{"page":16,"text":"Cavalry units—","rect":[115.16886138916016,276.2667541503906,178.77341556549073,267.213134765625]},{"page":16,"text":" Detect and counter enemy tactical deception efforts.","rect":[115.19999694824219,289.6614074707031,341.732492685318,280.6077880859375]},{"page":16,"text":" Provide a capable means of assessing terrain.","rect":[115.19999694824219,303.2214050292969,314.02576661109927,294.16778564453127]},{"page":16,"text":" Operate actively not passively.Cavalry not only finds the enemy but can also develop the situation","rect":[115.19999694824219,316.6614074707031,521.9422192573547,307.6077880859375]},{"page":16,"text":"and force the enemy to reveal more information including enemy intentions and fighting ability.","rect":[133.1999969482422,328.3046569824219,517.5285742282867,319.25103759765627]},{"page":16,"text":" Disseminate relevant information immediately to commanders.","rect":[115.19999694824219,341.74139404296877,385.876291513443,332.6877746582031]},{"page":16,"text":" Develop recommendations to seize, retain, and exploit the initiative.","rect":[115.19999694824219,355.1614990234375,406.15967774391177,346.1277770996094]},{"page":16,"text":" Answer priority intelligence requirements (PIRs).","rect":[115.19999694824219,368.74139404296877,331.7625524997711,359.6877746582031]},{"page":16,"text":" Shape the battlefield.","rect":[115.19999694824219,382.1614990234375,218.00940918922425,373.1277770996094]},{"page":16,"text":"1-10. A key task for the Cavalry is to shape the battlefield. In this context, shaping is to set conditions for","rect":[90.00347900390625,399.7010498046875,522.0527029619217,390.6474304199219]},{"page":16,"text":"the success of the supported commander’s plan through effects on the enemy, other actors, and the terrain.","rect":[89.99349975585938,411.2247619628906,522.1661474704742,402.171142578125]},{"page":16,"text":"Shaping occurs in all domains and can have physical, cognitive, and informational effects. For example, in","rect":[89.99351501464844,422.74847412109377,522.026752948761,413.6948547363281]},{"page":16,"text":"security operations the Cavalry may vary the engagement and disengagement criteria of their battle positions","rect":[89.99351501464844,434.2721862792969,522.0393570070266,425.21856689453127]},{"page":16,"text":"to shape an advancing enemy formation into the supported commander’s chosen engagement area. In","rect":[90.00346374511719,445.7959289550781,522.081440448761,436.7423095703125]},{"page":16,"text":"reconnaissance operations, the Cavalry may use different levels of aggressiveness on different avenues of","rect":[90.00346374511719,457.31964111328127,522.0892019853592,448.2660217285156]},{"page":16,"text":"approach to shape the enemy’s decision-making regarding where to array their defense. Shaping the","rect":[90.00349426269531,468.7238464355469,522.1022326927185,459.67022705078127]},{"page":16,"text":"battlefield is rarely a specified task but is an implied task that occurs during all operations. Cavalry","rect":[90.00349426269531,480.24755859375,522.0526928901672,471.1939392089844]},{"page":16,"text":"commanders must balance the implied shaping effect with the achievement of specified reconnaissance and","rect":[90.00349426269531,491.7712707519531,522.1003003120422,482.7176513671875]},{"page":16,"text":"security tasks.","rect":[90.00349426269531,503.29498291015627,146.59820008277894,494.2413635253906]},{"page":16,"text":"1-11. To shape the battlefield, the Cavalry commander must understand the supported commander’s scheme","rect":[90.00349426269531,520.8146362304688,522.1092517356873,511.760986328125]},{"page":16,"text":"of maneuver and decision points. However, the supported commander may not have completed their plan","rect":[90.00348663330078,532.33837890625,522.031635761261,523.2847290039063]},{"page":16,"text":"before the Cavalry commences their reconnaissance or security operation. Therefore, the Cavalry commander","rect":[90.00348663330078,543.7425537109375,522.0752859697342,534.6889038085938]},{"page":16,"text":"must be prepared to extrapolate the desired shaping effect from the available information, as well as be","rect":[89.99352264404297,555.2662963867188,522.233946559906,546.212646484375]},{"page":16,"text":"prepared to adapt their plan during execution.","rect":[89.99352264404297,566.7899780273438,272.604074716568,557.736328125]},{"page":16,"text":"1-12. The desired shaping effect may change which type of reconnaissance or security the commander","rect":[89.99352264404297,584.3096313476563,522.1102591142654,575.2559814453125]},{"page":16,"text":"selects. For example, a Cavalry commander may elect to conduct a guard rather than a screen to maximize","rect":[89.99352264404297,595.8333740234375,522.118468044281,586.7797241210938]},{"page":16,"text":"their ability to shape the enemy’s avenue of approach. Commanders must also consider the shaping effect","rect":[89.99352264404297,607.2376098632813,522.1111041316987,598.1839599609375]},{"page":16,"text":"when creating reconnaissance and security guidance. In particular, varying engagement and disengagement","rect":[89.99349975585938,618.7612915039063,522.2268878231049,609.7076416015625]},{"page":16,"text":"criteria is key to shaping enemy maneuver effectively.","rect":[89.99349975585938,630.2849731445313,307.28089356422427,621.2313232421875]},{"page":16,"text":"OPERATE AS COMBINED ARMS AIR-GROUND TEAMS","rect":[72.0,653.5800170898438,331.6664180755615,645.2640380859375]},{"page":16,"text":"1-13. Cavalry organizations are combined arms teams that, when paired with aviation units, form air-ground","rect":[90.0,673.5414428710938,522.0598340034485,664.48779296875]},{"page":16,"text":"maneuver teams that utilize appropriate combinations of mounted, dismounted, and aerial operations to","rect":[90.0,685.045166015625,522.095844745636,676.011474609375]},{"page":16,"text":"accomplish their mission. Air-ground operations are the simultaneous or synchronized employment of","rect":[90.0,696.5888671875,522.1903982744217,687.5352172851563]},{"page":16,"text":"ground forces with aviation maneuver and fires to seize, retain, and exploit the initiative. The organization is","rect":[89.99003601074219,707.9930419921875,522.1316421632766,698.9393920898438]},{"page":16,"text":"equipped, organized, and trained to identify enemy locations to improve the BCT’s situational awareness and","rect":[89.99004364013672,719.5167846679688,522.068745136261,710.463134765625]},{"page":16,"text":"1-4","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":16,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":16,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":17,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":17,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":17,"text":"to provide the BCT with security. Cavalry units must move continually and at times rapidly to positions of ","rect":[108.0,83.50144958496094,542.460275888443,74.44780731201172]},{"page":17,"text":"relative advantage to observe and fight. Cavalry units require organized, integrated, and synchronized support","rect":[107.99003601074219,95.02519226074219,540.1437579402924,85.97154998779297]},{"page":17,"text":"from all warfighting functions to ensure effective reconnaissance and security operations. ","rect":[107.99003601074219,106.42936706542969,468.5619604587555,97.37572479248047]},{"page":17,"text":"1-14. Cavalry units employ all available combat power to answer the commander’s PIRs. While the enemy","rect":[107.99004364013672,123.94902038574219,540.0488476753235,114.89537811279297]},{"page":17,"text":"seeks to protect or conceal vital information and key assets, Cavalry units overcome these efforts and fight","rect":[107.99000549316406,135.4727020263672,540.1109820613862,126.41905975341797]},{"page":17,"text":"for information within their capabilities to develop the situation rapidly and report the specific details of the","rect":[107.99000549316406,146.99644470214845,540.058165309906,137.9427947998047]},{"page":17,"text":"tactical situation accurately. Air-ground teams allow reconnaissance efforts to develop the situation in","rect":[107.99000549316406,158.5201873779297,540.0608105659485,149.46653747558595]},{"page":17,"text":"multiple domains to maximize information collection and assist the commander in visualizing and","rect":[107.99002838134766,170.0438690185547,540.0180859565735,160.99021911621095]},{"page":17,"text":"understanding the area of operations. Combined arms air-ground operations answer PIR, create options, and","rect":[107.99002838134766,181.44810485839845,540.0398144721985,172.3944549560547]},{"page":17,"text":"develop the situation to set conditions for a reconnaissance handover or decisive engagement.","rect":[107.98007202148438,192.97178649902345,482.58561158180239,183.9181365966797]},{"page":17,"text":"1-15. Effective air-ground operations are built upon relationships, mutual trust, and a common understanding","rect":[107.98005676269531,210.49143981933595,540.051899433136,201.4377899169922]},{"page":17,"text":"of the operational environment, operation, and mission. Air-ground operations require detailed planning,","rect":[107.98005676269531,222.0151824951172,540.050852060318,212.96153259277345]},{"page":17,"text":"coordination, and synchronized employment of ground, air maneuver, and fire to achieve the commander’s","rect":[107.97013854980469,233.5388641357422,540.1146133546829,224.48521423339845]},{"page":17,"text":"objectives to ensure freedom of movement and action.","rect":[107.96019744873047,245.06260681152345,325.2454626560211,235.99900817871095]},{"page":17,"text":"1-16. Aviation assets are an integral member of the combined arms team that significantly increases the","rect":[107.96015167236328,262.4627380371094,539.9353015403748,253.4091033935547]},{"page":17,"text":"relative combat strength of Cavalry squadrons. These limited assets must be utilized effectively to help","rect":[107.95018768310547,273.9864196777344,540.0310254096985,264.93280029296877]},{"page":17,"text":"achieve the commander’s intent. BCTs must know their capabilities, employ them appropriately, and","rect":[107.95018768310547,285.5101623535156,540.0121655464172,276.45654296875]},{"page":17,"text":"synchronize their operation to accomplish the mission.","rect":[107.95018768310547,297.03387451171877,326.55924439430239,287.9802551269531]},{"page":17,"text":"PROVIDE REACTION TIME AND MANEUVER SPACE","rect":[90.0,320.3399963378906,338.59903860092165,312.0360107421875]},{"page":17,"text":"1-17. The BCT’s Cavalry squadron develops the situation by fighting for information to buy the time and","rect":[108.0,340.3013916015625,540.1494946479797,331.2477722167969]},{"page":17,"text":"space required for an effective response to enemy actions. The Cavalry squadron conducts reconnaissance","rect":[107.99999237060547,351.7055969238281,539.9909656028748,342.6519775390625]},{"page":17,"text":"operations to develop the situation forward or to the flanks of the main body to prevent the BCT commander","rect":[108.0,363.22930908203127,540.0769339189529,354.1756896972656]},{"page":17,"text":"from fighting at a disadvantage. The Cavalry squadron conducts security operations to provide the","rect":[108.0,374.7530212402344,540.1057116966248,365.69940185546877]},{"page":17,"text":"commander with maneuver space so they canrespond to unanticipated enemy actions or developments within","rect":[108.0,386.2767639160156,540.0786938667297,377.22314453125]},{"page":17,"text":"the BCT’s area of operations. Security operations provide the commander with time to assess the situation,","rect":[108.0,397.80047607421877,539.9213964939117,388.7468566894531]},{"page":17,"text":"determine a course of action, issue orders, make continuous assessments, issue additional fragmentary orders,","rect":[108.0,409.3241882324219,540.1058447360992,400.27056884765627]},{"page":17,"text":"and maneuver.","rect":[108.0,418.71649169921877,166.89249634742738,411.6747741699219]},{"page":17,"text":"PRESERVE COMBAT POWER AND ACHIEVE ECONOMY OF FORCE","rect":[90.0,444.0480041503906,407.71378469467165,435.7560119628906]},{"page":17,"text":"1-18. Cavalry organizations provide security for the BCT main body to protect and preserve the combat","rect":[108.0,464.0213928222656,540.1394854793549,454.9677734375]},{"page":17,"text":"power of the BCT. In offensive operations, effective Cavalry operations prevent the premature deployment","rect":[108.00993347167969,475.54510498046877,540.1286212215424,466.4914855957031]},{"page":17,"text":"and loss of critical combat power. In defensive operations, an effective Cavalry operation provides early","rect":[108.00993347167969,487.0688171386719,540.0707592964172,478.01519775390627]},{"page":17,"text":"warning, destroys enemy reconnaissance forces, and fixes the lead elements of enemy organizations within","rect":[108.00993347167969,498.5925598144531,540.101948261261,489.5389404296875]},{"page":17,"text":"the capabilities of the respective Cavalry organization.","rect":[108.00993347167969,510.11627197265627,326.1627905368805,501.0626525878906]},{"page":17,"text":"1-19. Economy of force is the employment and distribution of forces to allocate the maximum possible","rect":[108.00993347167969,527.5164184570313,540.1425769309998,518.4627685546875]},{"page":17,"text":"combat power on primary efforts (JP 3-0). The Cavalry’s flexible capabilities allow the commander to","rect":[107.99998474121094,539.0401611328125,540.057758808136,529.9865112304688]},{"page":17,"text":"conserve their BCT’s combat power to use at a time and place of their choosing. Based on METT-TC (I),","rect":[107.99004364013672,550.5639038085938,540.0847265720367,541.51025390625]},{"page":17,"text":"when augmented with additional combat power, the BCT’s Cavalry organizations can provide the BCT with","rect":[107.98999786376953,562.0875854492188,539.9362988471985,553.033935546875]},{"page":17,"text":"a critical capability based on the economy of force principle of joint operations.","rect":[108.00001525878906,573.6112670898438,426.4471228122711,564.5476684570313]},{"page":17,"text":"FACILITATE MOVEMENT AND TRANSITIONS","rect":[90.0,596.9022216796875,305.8567867279053,588.8159790039063]},{"page":17,"text":"1-20. Cavalry units assist movement and transitions by executing reconnaissance and facilitating","rect":[108.0,616.9014282226563,539.9582715034485,607.8477783203125]},{"page":17,"text":"coordination and contact between units. Scout platoons occupy contact points, passage points, and coordinate","rect":[108.0,628.3056030273438,540.0966174583435,619.251953125]},{"page":17,"text":"with higher and adjacent units to ensure seamless transitions and cross-unit coordination.","rect":[107.99000549316406,639.829345703125,464.11380982398989,630.7657470703125]},{"page":17,"text":"1-21. Effective reconnaissance operations ease transitions in plans, phases, and priorities of effort for the","rect":[107.989990234375,657.3290405273438,540.039854763031,648.2953491210938]},{"page":17,"text":"BCT and mitigate information gaps between units. Reconnaissance operations assist commanders in","rect":[107.98003387451172,668.8727416992188,540.033833026886,659.819091796875]},{"page":17,"text":"employing the most appropriate forms of maneuver to envelop, turn, dislocate, and ultimately defeat enemy forces.","rect":[107.97007751464844,680.3964233398438,540.0140478610992,671.3427734375]},{"page":17,"text":"1-22. Transitions mark a change of focus and priorities between phases or between the ongoing operation","rect":[107.96012115478516,697.7965698242188,539.862446308136,688.742919921875]},{"page":17,"text":"and execution of a branch or sequel. The shift in priority between offense, defense, and stability operations","rect":[107.96019744873047,709.3202514648438,540.1128433351516,700.2666015625]},{"page":17,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":17,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":17,"text":"1-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":18,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":18,"text":"involves a transition. Cavalry units are instrumental in providing the commander with information to make","rect":[90.0,83.50144958496094,522.1007068138123,74.44780731201172]},{"page":18,"text":"transitions as seamless as possible. They provide protection for the main body transitioning from offense to","rect":[90.00999450683594,95.02519226074219,522.0630688667297,85.97154998779297]},{"page":18,"text":"defense. However, Cavalry units are vulnerable to enemy threats, unanticipated changes to the situation, and","rect":[90.00999450683594,106.42936706542969,522.188618183136,97.37572479248047]},{"page":18,"text":"the danger of relaxing discipline and safety standards during their own and higher transitions. As a result,","rect":[90.00999450683594,117.95310974121094,521.9326269626617,108.89946746826172]},{"page":18,"text":"commanders should establish clear conditions for mission execution.","rect":[90.00999450683594,127.4648666381836,365.61414551734927,120.42314910888672]},{"page":18,"text":"FIGHT FOR INFORMATION","rect":[72.0,152.78221130371095,200.6404733657837,144.69601440429688]},{"page":18,"text":"1-23. The information friendly forces seek is generally of equal importance to the enemy who will act to","rect":[90.0,172.7814178466797,522.0072827339172,163.72776794433595]},{"page":18,"text":"protect the vital information. In addition, Cavalry units can satisfy some threat-based intelligence","rect":[90.0,184.30516052246095,522.0856921653748,175.2515106201172]},{"page":18,"text":"requirements only by learning from the enemy’s reactions. While preserving their freedom of maneuver,","rect":[89.99004364013672,195.82884216308595,522.0748388767242,186.7751922607422]},{"page":18,"text":"Cavalry units overcome these efforts and fight for information within their capabilities to develop the","rect":[89.98016357421875,207.2330780029297,522.0817859153748,198.17942810058595]},{"page":18,"text":"situation rapidly and to report accurately the specific details of the tactical situation.","rect":[89.98016357421875,218.7567596435547,425.69190430641177,209.70310974121095]},{"page":18,"text":"SECTION II – UNDERSTANDING THE OPERATIONAL ENVIRONMENT","rect":[81.36000061035156,242.66395568847657,473.41201708984377,233.78396606445313]},{"page":18,"text":"1-24. BCTs develop an understanding of operational variables (political, military, economic, social,","rect":[90.0,266.0213928222656,522.0737402439117,256.9677734375]},{"page":18,"text":"information, infrastructure, physical environment, and time [PMESII-PT], and mission variables of","rect":[90.0,277.5451354980469,522.0547781572342,268.49151611328127]},{"page":18,"text":"METT-TC (I) through reconnaissance and information collection to enhance situational awareness and an","rect":[89.97006225585938,289.0688171386719,522.042133808136,280.01519775390627]},{"page":18,"text":"understanding of competing interests. The G-2 or S2 is responsible for defining the cyberspace and the","rect":[89.96009063720703,300.5925598144531,522.087706325531,291.5389404296875]},{"page":18,"text":"electromagnetic operational environment (EMOE), which enables the BCT commander and staff to visualize","rect":[89.95013427734375,312.11627197265627,521.8756091575623,303.0626525878906]},{"page":18,"text":"both friendly and enemy cyberspace and EW assets through the three layers of cyberspace and the EMS.","rect":[89.95013427734375,323.6399841308594,521.875559091568,314.58636474609377]},{"page":18,"text":"Understanding competing interests within the area of operations allows the commander and staff to frame","rect":[89.95013427734375,335.044189453125,522.011290309906,325.9905700683594]},{"page":18,"text":"specific problems. BCTs seek to understand motivations and to recognize that each interest has multiple","rect":[89.95013427734375,346.5679016113281,521.7511584739685,337.5142822265625]},{"page":18,"text":"perspectives. To operate effectively under conditions of complexity and in close contact with enemies and","rect":[89.95013427734375,358.0916442871094,521.985249042511,349.03802490234377]},{"page":18,"text":"populations, BCTs consider political interests from multiple perspectives.","rect":[89.95013427734375,369.5954284667969,384.62183594703677,360.56170654296877]},{"page":18,"text":"1-25. Understanding interests requires analysis of the operational (PMESII-PT) and mission variables of","rect":[89.95013427734375,387.1349792480469,522.0149222002029,378.08135986328127]},{"page":18,"text":"METT-TC (I) within a particular region. To communicate effectively, BCTs must develop an understanding","rect":[89.93020629882813,398.5391845703125,521.9872632026672,389.4855651855469]},{"page":18,"text":"of the local audience’s cultural communication techniques. BCTs must understand the most important aspect","rect":[89.93020629882813,410.0429992675781,522.0698443660737,401.00927734375]},{"page":18,"text":"of cultural communication is how the population receives the information rather than how the unit transmits","rect":[89.93020629882813,421.56671142578127,522.0879409914016,412.5329895019531]},{"page":18,"text":"the information. Determination of valued interests within an area provides options for BCTs to establish","rect":[89.93020629882813,433.0904235839844,521.684467792511,424.05670166015627]},{"page":18,"text":"programs that incentivize cooperation leading to mission accomplishment. Comprehension of interests allows","rect":[89.93020629882813,444.6340637207031,521.8455703859329,435.5804443359375]},{"page":18,"text":"for understanding to implement disincentives that seek to coerce and persuade adversaries, enemies, and","rect":[89.93020629882813,456.1577453613281,521.8079419136047,447.1041259765625]},{"page":18,"text":"neutral parties who have interests counter to the objectives of the brigade and higher. The understanding and","rect":[89.9302978515625,467.5619812011719,522.113911151886,458.4983825683594]},{"page":18,"text":"acknowledgement of interests frame information operations in future operations.","rect":[89.93028259277344,479.0857238769531,412.46290040016177,470.0321044921875]},{"page":18,"text":"1-26. Efforts to understand interests begin before deployment. Country studies, analysis of the social","rect":[89.93026733398438,496.6053771972656,522.0640460262299,487.5517578125]},{"page":18,"text":"demographics, constructs of local, sub-national, and national governance, and understanding of key","rect":[89.9302749633789,508.1290588378906,521.976215839386,499.075439453125]},{"page":18,"text":"personalities and organizations within a brigade’s future area of operation provide a baseline knowledge to","rect":[89.93028259277344,519.65283203125,521.967182636261,510.59918212890627]},{"page":18,"text":"increase situational awareness and identify potential areas of friction before a brigade deploys. BCTs consider","rect":[89.92030334472656,531.1765747070313,521.8997488603592,522.1229248046875]},{"page":18,"text":"the elements of PMESII-PT within their area of operations to gain understanding of the interests and","rect":[89.92030334472656,542.5807495117188,521.9812207221985,533.527099609375]},{"page":18,"text":"motivations particular to enhance situational awareness. Unified action partners, Army Special Operations","rect":[89.91033172607422,554.1044311523438,522.0696914796829,545.05078125]},{"page":18,"text":"Forces (SOF), and other joint, interagency, intergovernmental, and multinational organizations are key","rect":[89.91033172607422,565.6282348632813,521.8456616401672,556.5645751953125]},{"page":18,"text":"resources all units use to develop situational understanding during shaping efforts leading to a sustainable","rect":[89.910400390625,577.1519165039063,521.9664905052185,568.0982666015625]},{"page":18,"text":"security environment. The military information support operations assets organic and attached to the BCT","rect":[89.91036224365235,588.6755981445313,521.8378793592453,579.6219482421875]},{"page":18,"text":"can assist in conducting adversary, information message analysis, and exploitation. The military information","rect":[89.91036224365235,600.079833984375,521.9712109565735,591.0261840820313]},{"page":18,"text":"support operations staff planner can obtain division or higher-level military information support operations","rect":[89.91039276123047,611.6035766601563,522.0508316164016,602.5499267578125]},{"page":18,"text":"support to counter the adversary information activities as necessary. Analysis of these considerations allows","rect":[89.9004135131836,623.1272583007813,521.9313247804641,614.0736083984375]},{"page":18,"text":"informed leaders to identify information gaps and develop courses of action that increase situational","rect":[89.90043640136719,634.6510620117188,521.7872515926362,625.597412109375]},{"page":18,"text":"understanding within their area of operation.","rect":[89.90043640136719,646.1747436523438,268.30887818336489,637.12109375]},{"page":18,"text":"1-27. BCTs conduct information collection through reconnaissance operations focused on information","rect":[89.90043640136719,663.6943969726563,521.9627270698547,654.6407470703125]},{"page":18,"text":"requirements to bridge information gaps. Gaps identified during IPB develop into information requirements","rect":[89.90039825439453,675.0985717773438,522.0411270265579,666.044921875]},{"page":18,"text":"through continuous reconnaissance. BCTs define and collect information requirements that develop","rect":[89.90039825439453,686.6222534179688,521.9216504096985,677.568603515625]},{"page":18,"text":"situational understanding of the interests within a particular area by focusing civil considerations within the","rect":[89.90039825439453,698.14599609375,521.8586413841248,689.0923461914063]},{"page":18,"text":"construct of areas, structures, capabilities, organizations, people, and events. BCTs employ a range of","rect":[89.90039825439453,709.6697387695313,521.9953299150467,700.6160888671875]},{"page":18,"text":"1-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":18,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":18,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":19,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":19,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":19,"text":"integrated capabilities to understand the cultural implications of conducting military operations among","rect":[108.0,83.50144958496094,540.0597729682922,74.44780731201172]},{"page":19,"text":"indigenous populations and institutions. The BCT or brigade civil affairs operations staff officer (S-9)","rect":[108.0,95.02519226074219,540.0746756181717,85.97154998779297]},{"page":19,"text":"develops plans, policies, and programs to further the relationship between the BCT and the civil component","rect":[107.99000549316406,106.42936706542969,539.9873248348237,97.37572479248047]},{"page":19,"text":"in the assigned area of operations. The S-9 provides a mechanism for civil-military coordination,","rect":[107.99000549316406,117.95310974121094,540.0747168064117,108.89946746826172]},{"page":19,"text":"collaboration, and communication within the BCT area of operations. Chemical, biological, radiological, and","rect":[107.99000549316406,129.47679138183595,540.0437817573547,120.42314910888672]},{"page":19,"text":"nuclear (CBRN) staff elements work with the brigade intelligence staff officer (S-2) to analyze the CBRN","rect":[107.99000549316406,141.0005340576172,539.8356512775421,131.94688415527345]},{"page":19,"text":"threat in the operational environment. The BCT may meet gaps in understanding the CBRN threat with","rect":[107.96014404296875,152.52427673339845,539.9265332221985,143.4706268310547]},{"page":19,"text":"taskings to the CBRN reconnaissance and surveillance platoon.","rect":[107.96014404296875,164.04795837402345,361.368479013443,154.9943084716797]},{"page":19,"text":"1-28. Commanders and staffs consider culture and pillar organizations that influence the civil considerations","rect":[107.96014404296875,181.44810485839845,540.1036270265579,172.3944549560547]},{"page":19,"text":"of the operational environment. Culture is the shared beliefs, values, customs, behaviors, and artifacts","rect":[107.96014404296875,192.9518585205078,540.0203140382766,183.9181365966797]},{"page":19,"text":"members of a society use to cope with the world and each other. Pillar organizations are organizations or","rect":[107.96014404296875,204.4955291748047,540.1033011064529,195.44187927246095]},{"page":19,"text":"systems on which the populace depends for support, security, strength, and direction. Examination of culture","rect":[107.96019744873047,216.01927185058595,539.939512966156,206.9656219482422]},{"page":19,"text":"provides insight to the motivations and interests of people and organizations. Consideration of culture is","rect":[107.95020294189453,227.54295349121095,540.0391739015579,218.4893035888672]},{"page":19,"text":"imperative to successful shaping operations that set conditions for future success. A thorough understanding","rect":[107.95020294189453,239.0666961669922,540.0064282417297,230.01304626464845]},{"page":19,"text":"of group and individual interests allow for informed and viable courses of action that seek to shape the","rect":[107.95020294189453,250.4708709716797,540.0680530052185,241.41722106933595]},{"page":19,"text":"environment favorably and contribute to positive outcomes and objectives within the brigade’s area of operations.","rect":[107.95020294189453,261.9945983886719,540.0409033298492,252.93101501464845]},{"page":19,"text":"1-29. Host-nation security organizations and political partners provide invaluable insight into values, beliefs,","rect":[107.95014953613281,279.5142517089844,539.929514169693,270.46063232421877]},{"page":19,"text":"and interests. These organizations are composed of the people they secure and govern; their native fluency","rect":[107.95014953613281,291.0379333496094,539.986469745636,281.98431396484377]},{"page":19,"text":"in the customs, courtesies, cultures, beliefs, interests, and ideals provide the partnering BCT with cultural","rect":[107.95014953613281,302.5616760253906,539.9256182918549,293.508056640625]},{"page":19,"text":"perspective and intelligence that develops their understanding of the operational environment. Close, positive","rect":[107.95014953613281,314.08538818359377,539.9484851341248,305.0317687988281]},{"page":19,"text":"relationships with host-nation partners breed trust, which lead to an understanding of the operational environment.","rect":[107.95014953613281,325.4895935058594,540.0678808689117,316.43597412109377]},{"page":19,"text":"SECTION III – SHAPE THE OPERATIONAL ENVIRONMENT","rect":[99.36000061035156,349.3440246582031,430.6919853515625,340.4640197753906]},{"page":19,"text":"1-30. Commanders and staffs consider the competitive environment of their area of operations in order to","rect":[108.0,372.6814880371094,540.0181469917297,363.64776611328127]},{"page":19,"text":"seize, retain, and exploit the initiative and set conditions for future success. Different political entities and","rect":[108.0,384.2052001953125,539.924458026886,375.1714782714844]},{"page":19,"text":"personalities, tribal dynamics, religious interests, economic motivations, sources of security, and potential","rect":[108.0,395.7488098144531,539.9783526668549,386.6951904296875]},{"page":19,"text":"havens of refuge for adversaries contribute to the competitive nature of the operational environment.","rect":[108.0,407.2725524902344,540.0929052829742,398.21893310546877]},{"page":19,"text":"Furthermore, not all interests are parallel and mutually supportive of the objectives and end state for a","rect":[108.0,418.7962646484375,540.2761218528748,409.732666015625]},{"page":19,"text":"particular region. Shaping the environment requires BCTs to develop situational understanding and influence","rect":[108.0,430.3199768066406,540.1118152122498,421.266357421875]},{"page":19,"text":"personalities and organizations through engagement to achieve specific objectives. BCTs also persuade and","rect":[108.0,441.72418212890627,540.0491528511047,432.66058349609377]},{"page":19,"text":"empower other personalities and organizations to modify behaviors and actions consistent with friendly","rect":[108.0,453.2478942871094,540.0988965034485,444.19427490234377]},{"page":19,"text":"forces’ intent and objectives, and conduct limited offensive operations to maintain initiative. Shaping is an","rect":[108.0,464.7716369628906,540.0608105659485,455.7080383300781]},{"page":19,"text":"enduring process throughout all operations and is not separated by phases.","rect":[107.99996185302735,476.2953186035156,404.8449194431305,467.24169921875]},{"page":19,"text":"1-31. Commanders actively seek to understand the competitive interests within their area of operations and","rect":[107.99996185302735,493.8149719238281,540.0629467964172,484.7613525390625]},{"page":19,"text":"to understand how local interests influence desired outcomes and objectives. Some interests and motivations","rect":[108.0,505.3387145996094,540.0302627687454,496.2751159667969]},{"page":19,"text":"support the BCT’s objectives and others conflict, counter, and disrupt supportive efforts to the desired end","rect":[108.0,516.742919921875,540.0281567573547,507.6792907714844]},{"page":19,"text":"state. BCTs must have a thorough understanding of the threat to identify conflicting interests and information","rect":[108.0,528.2666625976563,540.0659375190735,519.2130126953125]},{"page":19,"text":"collection requirements developed through reconnaissance and security operations. BCTs actively seek","rect":[108.0,539.7903442382813,539.9592480659485,530.7366943359375]},{"page":19,"text":"answers to information gaps through the development of information requirements that are satisfied through","rect":[108.0,551.3140869140625,540.0611157417297,542.2604370117188]},{"page":19,"text":"active reconnaissance operations within a given area. Through information collection and analysis, staffs","rect":[108.0,562.8378295898438,540.0062759523391,553.7841796875]},{"page":19,"text":"develop options for the commander to inform the population, influence various actors, seize opportunities,","rect":[108.0,574.341552734375,539.9564306735992,565.307861328125]},{"page":19,"text":"and maintain initiative.","rect":[108.0,583.7537231445313,201.68076539039613,576.7120361328125]},{"page":19,"text":"1-32. Analysis of the motivations and interests of personalities and organizations provide insight to future","rect":[107.99004364013672,603.2853393554688,540.0559070091248,594.231689453125]},{"page":19,"text":"psychological operations activities seeking to modify behaviors counter to friendly force objectives.","rect":[107.99004364013672,614.80908203125,540.055979013443,605.7454833984375]},{"page":19,"text":"Supporting efforts empower key influencers and organizations and persuade neutral audiences to bolster","rect":[107.99004364013672,626.3328247070313,540.0628958330154,617.2791748046875]},{"page":19,"text":"legitimacy and secure vital interests and objectives. BCTs use coercive efforts to counter adversary and","rect":[107.99004364013672,637.8565063476563,540.2402539253235,628.7929077148438]},{"page":19,"text":"enemy information activities and isolate adversaries from their support base to begin the psychological","rect":[107.99004364013672,649.2606811523438,540.1257525691987,640.20703125]},{"page":19,"text":"breakdown of enemy organizations. BCTs shape conditions for objectives that are in line with host-nation","rect":[107.99004364013672,660.784423828125,540.0429272651672,651.7208251953125]},{"page":19,"text":"government interests.","rect":[107.99004364013672,672.3081665039063,194.12412476539613,663.2545166015625]},{"page":19,"text":"1-33. The BCT’s shaping activities derive success from how effectively they persuade the populace and","rect":[107.99004364013672,689.8278198242188,539.977436542511,680.774169921875]},{"page":19,"text":"empower the host-nation government. All efforts focus on bolstering the legitimacy of the rule of law and","rect":[107.99005126953125,701.3515014648438,540.0180859565735,692.2978515625]},{"page":19,"text":"the host nation’s ability to provide for effective governance. Persuasion and empowerment demand","rect":[107.99004364013672,712.875244140625,540.0281567573547,703.8215942382813]},{"page":19,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":19,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":19,"text":"1-7","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":20,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":20,"text":"engagement strategies that deliver connections and relationships with pillar organizations and individuals","rect":[90.0,83.50144958496094,522.1285293703079,74.44780731201172]},{"page":20,"text":"who control and influence the local community. Engagements secure common and clearly defined goals and","rect":[90.0,95.02519226074219,522.056049823761,85.97154998779297]},{"page":20,"text":"ideals that provide a common reference point for future engagements and activities. Engagements seek to","rect":[90.0,106.42936706542969,521.9534497261047,97.37572479248047]},{"page":20,"text":"reinforce the authority of legitimate leaders and pillars and restore or solidify confidence in host-nation","rect":[90.0,117.95310974121094,522.1733593940735,108.89946746826172]},{"page":20,"text":"security forces, governance, and the rule of law. Persuasive efforts utilize a compelling narrative that justifies","rect":[89.99004364013672,129.47679138183595,522.0190933351516,120.4131851196289]},{"page":20,"text":"and explains friendly actions while delegitimizing motivations and behaviors of adversaries and those entities","rect":[89.99004364013672,141.0005340576172,522.0411270265579,131.94688415527345]},{"page":20,"text":"opposing positive gains within the area of operations. Additionally, persuasive efforts specifically target","rect":[89.99004364013672,152.52427673339845,522.1358233699799,143.4706268310547]},{"page":20,"text":"neutral or fringe entities with the goal of tipping neutrality to a favorable alliance.","rect":[89.99004364013672,164.04795837402345,417.214914560318,154.9943084716797]},{"page":20,"text":"1-34. Shaping the operational environment requires understanding the competing dynamics within the","rect":[89.99008178710938,181.44810485839845,522.096983669281,172.3944549560547]},{"page":20,"text":"BCT’s area of operations. Commanders and staffs gain an understanding through analysis of mission and","rect":[89.9900894165039,192.97178649902345,522.0063672065735,183.9181365966797]},{"page":20,"text":"operational variables enhanced and developed through information collection and both reconnaissance and","rect":[89.9900894165039,204.4955291748047,522.0330395698547,195.44187927246095]},{"page":20,"text":"security operations. Understanding and analysis are continuous tasks not bound by phase or operation.","rect":[89.99008178710938,216.0192108154297,499.15308594703677,206.96556091308595]},{"page":20,"text":"SECTION IV – CAVALRY EMPLOYMENT INLARGE SCALE COMBAT OPERATIONS","rect":[81.36000061035156,236.9040069580078,520.6464560546875,228.02401733398438]},{"page":20,"text":"1-35. Commanders and staffs at the BCT, division, and corps level determine the reconnaissance","rect":[90.0,260.2414855957031,521.9938342552185,251.20774841308595]},{"page":20,"text":"requirements for the operation. The commander issues reconnaissance-planning guidance early to ensure that","rect":[90.0,271.7851257324219,522.1304522762299,262.73150634765627]},{"page":20,"text":"reconnaissance operations can precede the mission and identify options to seize, retain, and exploit the","rect":[90.0,283.3088073730469,522.023985622406,274.25518798828127]},{"page":20,"text":"initiative. Reconnaissance operations often begin before the course of action analysis completion so that the","rect":[90.00996398925781,294.8325500488281,521.9951159934998,285.7789306640625]},{"page":20,"text":"Cavalry unit can inform the planning effort. For division Cavalry operations at echelons above brigade","rect":[90.00995635986328,306.2367248535156,522.1464221458435,297.18310546875]},{"page":20,"text":"(EAB), refer to appendix A.","rect":[90.0298843383789,317.7405700683594,202.32190918922425,308.70684814453127]},{"page":20,"text":"1-36. Reconnaissance and security are vital operations performed in conjunction with other operations","rect":[90.0298843383789,335.28009033203127,522.2034195070266,326.21649169921877]},{"page":20,"text":"during offensive, defensive, and stability operations. Not only reserved for the Cavalry squadron, the BCT","rect":[90.0298843383789,346.8038024902344,521.9851571912766,337.75018310546877]},{"page":20,"text":"should incorporate reconnaissance and security into all aspects of operations. Figure 1-1 illustrates how","rect":[90.02993774414063,358.3275451660156,522.1345404376983,349.27392578125]},{"page":20,"text":"reconnaissance and security is fundamental to all aspects of decisive operations.","rect":[90.01994323730469,369.7317199707031,410.3932898044586,360.6781005859375]},{"page":20,"text":"1-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":20,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":20,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":21,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":21,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":21,"text":"Figure 1-1. Reconnaissance and security in offensive, defensive, and stability operations","rect":[104.04000091552735,424.36163330078127,525.8370764274597,415.0091857910156]},{"page":21,"text":"BCT PLANNING CONSIDERATIONS FOR THE CAVALRY UNITS","rect":[90.0,449.7306213378906,513.9840353889465,440.0008850097656]},{"page":21,"text":"1-37. Thecore competencies of Cavalry forces are to conduct reconnaissance and security operations in close","rect":[108.0,470.0213928222656,540.0661609153748,460.9677734375]},{"page":21,"text":"contact with enemy forces and civilian populations. These competencies allow the BCT to accomplish its","rect":[108.00000762939453,481.42559814453127,539.8757827882766,472.3719787597656]},{"page":21,"text":"core missions. Cavalry forces facilitate the supported commander’s ability to concentrate superior combat","rect":[108.00000762939453,492.9493103027344,540.1147052059174,483.89569091796877]},{"page":21,"text":"power against the enemy at the decisive time and place, and take appropriate actions to consolidate gains","rect":[108.00000762939453,504.4730224609375,540.0441177492141,495.4194030761719]},{"page":21,"text":"while preparing for the next mission.","rect":[108.00000762939453,515.9967651367188,255.68680787086488,506.943115234375]},{"page":21,"text":"1-38. For reconnaissance and security operations to be most effective, they must be initiated early in the","rect":[108.00000762939453,533.5164184570313,540.1942737083435,524.4627685546875]},{"page":21,"text":"planning process for BCT-level missions and continued throughout the mission. Consequently, commanders","rect":[107.98005676269531,545.0401611328125,540.1315200929641,535.9865112304688]},{"page":21,"text":"and staffs develop information requirements throughout the operations process and assess, add, or delete","rect":[107.97013854980469,556.4443359375,540.013243434906,547.3906860351563]},{"page":21,"text":"requirements continuously during planning and execution.","rect":[107.97013854980469,567.9680786132813,341.34086060523989,558.9144287109375]},{"page":21,"text":"1-39. Cavalry commanders conduct operations consistent with reconnaissance and security fundamentals.","rect":[107.97013854980469,585.4877319335938,539.939279794693,576.43408203125]},{"page":21,"text":"The BCT commander uses reconnaissance and security fundamentals to identify gaps or weaknesses in the","rect":[107.9601821899414,597.0114135742188,539.948302028656,587.957763671875]},{"page":21,"text":"plan as well as opportunities to exploit and improve situational understanding. Reconnaissance and security","rect":[107.96017456054688,608.5350952148438,540.0073437690735,599.4814453125]},{"page":21,"text":"operations answer PIRs and enable the commander to make decisions and direct forces to achieve mission","rect":[107.96017456054688,620.0388793945313,539.914448261261,611.0051879882813]},{"page":21,"text":"success. Both reconnaissance and security operations enable successful offense, defense, and stability tasks.","rect":[107.96019744873047,631.4630737304688,539.9872534275055,622.409423828125]},{"page":21,"text":"Commanders and staffs first identify information gaps during the military decision-making process (MDMP)","rect":[107.96019744873047,642.9867553710938,539.7860403642654,633.93310546875]},{"page":21,"text":"and continuously assess, adapt, add, and delete requirements throughout the operation. Staffs identify","rect":[107.9403076171875,654.5104370117188,540.0133862495422,645.456787109375]},{"page":21,"text":"specified, implied, and essential tasks necessary for mission success during mission analysis, reviewing","rect":[107.9403076171875,666.0342407226563,539.9198803901672,656.9805297851563]},{"page":21,"text":"available assets, and identifying resource and information shortfalls.","rect":[107.94020080566406,677.5579223632813,380.90296387672427,668.5042724609375]},{"page":21,"text":"1-40. During mission analysis, staffs identify critical facts and assumptions aiding in the development of the","rect":[107.93025970458985,694.9580688476563,540.0368640403748,685.9044189453125]},{"page":21,"text":"initial CCIRs, which is comprised of PIRs and friendly force information requirements (FFIRs), facilitating","rect":[107.93024444580078,706.4817504882813,539.983051776886,697.4281005859375]},{"page":21,"text":"timely decision-making. PIRs are information requirements necessary to understand the adversary or","rect":[107.9202880859375,718.0054931640625,539.8834524736404,708.9518432617188]},{"page":21,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":21,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":21,"text":"1-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":22,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":22,"text":"operational environment.","rect":[90.0,83.48152923583985,195.20847535133363,74.44780731201172]},{"page":22,"text":"PIRs","rect":[202.31988525390626,81.4895248413086,221.55762177753449,74.76652526855469]},{"page":22,"text":"identify information about the enemy, terrain, weather, and civil","rect":[228.6033477783203,83.50144958496094,522.1446124324799,74.44780731201172]},{"page":22,"text":"considerations that the commander considers most important and impact upon future decisions. FFIRs","rect":[90.0,95.0052719116211,521.9154556398391,85.97154998779297]},{"page":22,"text":"identify information about friendly forces and supporting capabilities, which affects future courses of action","rect":[90.0,106.42936706542969,522.0817456245422,97.37572479248047]},{"page":22,"text":"and decisions from a friendly perspective. (Refer to chapter 3 for a more detailed explanation of CCIRs.)","rect":[90.00995635986328,117.95310974121094,509.12676912403108,108.89946746826172]},{"page":22,"text":"1-41. Based upon identified information requirements, staffs assign tasks to prioritize, manage, and develop","rect":[90.00999450683594,135.4727020263672,522.0700879096985,126.41905975341797]},{"page":22,"text":"the collection of information requirements leading to future decisions. As staffs identify requirements","rect":[90.00999450683594,146.99644470214845,522.1685073976516,137.9427947998047]},{"page":22,"text":"necessary for successful execution, they recommend and assign tasks to Cavalry units to conduct reconnaissance","rect":[90.00999450683594,158.5201873779297,522.0170276145935,149.46653747558595]},{"page":22,"text":"and provide answers allowing the commander to make decisions and capitalize on opportunities.","rect":[90.01007080078125,170.0438690185547,468.3317358493805,160.99021911621095]},{"page":22,"text":"GENERAL EMPLOYMENT OF CAVALRY UNITS","rect":[72.0,195.33059692382813,390.90871800613408,185.6008758544922]},{"page":22,"text":"1-42. During operations, the commander and staff’s time and resources are balanced between four major","rect":[90.0,215.6213836669922,522.0351858720779,206.5577850341797]},{"page":22,"text":"activities in a continuous learning and adaptive cycle called the operations process, including planning,","rect":[90.0,227.0255584716797,522.0936377048492,217.97190856933595]},{"page":22,"text":"preparing, executing, and continuously assessing the operation. (Refer to ADP 5-0 for more information.)","rect":[90.0,238.54930114746095,522.0647879228592,229.49559020996095]},{"page":22,"text":"Operations process activities are sequential but not discrete; all overlap and recur as circumstances demand.","rect":[89.98999786376953,250.05311584472657,521.4215185642242,241.01939392089845]},{"page":22,"text":"1-43. Commanders implement early information collection and security to protect and prepare the force for","rect":[89.99003601074219,267.5926208496094,522.0649710283279,258.53900146484377]},{"page":22,"text":"execution. Cavalry units should deploy in the planning phase to shape preparation activities and execution.","rect":[89.99004364013672,279.1163635253906,522.0551245212555,270.062744140625]},{"page":22,"text":"(Refer to ADP 5-0 for more information.)","rect":[89.99004364013672,290.6202087402344,256.97840791797639,281.58648681640627]},{"page":22,"text":"1-44. Commanders take every opportunity to improve their situational understanding before execution of the","rect":[89.9800796508789,308.04022216796877,522.089903591156,298.9866027832031]},{"page":22,"text":"mission, which requires aggressive and continuous information collection from Cavalry forces. Information","rect":[89.98008728027344,319.5639343261719,522.0251660346985,310.51031494140627]},{"page":22,"text":"collection is an activity that synchronizes and integrates the planning and employment of sensors and assets","rect":[89.97012329101563,331.087646484375,521.9821060304641,322.0340270996094]},{"page":22,"text":"as well as the processing, exploitation, and dissemination systems in direct support of current and future","rect":[89.97013854980469,342.6113586425781,522.014219997406,333.5577392578125]},{"page":22,"text":"operations (FM 3-55). Through information collection, commanders and staffs continuously plan, task, and","rect":[89.97013854980469,354.13507080078127,522.0219922065735,345.0814514160156]},{"page":22,"text":"employ collection capabilities and forces to collect timely and accurate information to meet CCIRs and other","rect":[89.9601821899414,365.5392761230469,522.0419607744217,356.48565673828127]},{"page":22,"text":"information requirements.","rect":[89.96022033691406,377.0430908203125,194.446604013443,368.0093688964844]},{"page":22,"text":"1-45. The force as a whole is often vulnerable to surprise and enemy attacks during preparation, when forces","rect":[89.96022033691406,394.5826416015625,522.1216323976516,385.5290222167969]},{"page":22,"text":"are often concentrated in assembly areas (AAs). Security operations (screen, guard, cover, and area security)","rect":[89.96023559570313,406.1063537597656,522.1545096025467,397.052734375]},{"page":22,"text":"are essential during preparation. Cavalry units assigned to security operations execute missions while the rest","rect":[89.96019744873047,417.6300964355469,521.9740802059174,408.57647705078127]},{"page":22,"text":"of the force prepares for the overall operation.","rect":[89.97010040283203,429.1339416503906,274.40345215797427,420.1002197265625]},{"page":22,"text":"1-46. When a Cavalry unit’s higher headquarters is conducting offensive operations, the Cavalry unit","rect":[89.97012329101563,446.5539245605469,522.1096392879487,437.50030517578127]},{"page":22,"text":"develops the situation for the higher commander. For example, in a brigade movement to contact, the Cavalry","rect":[89.98008728027344,458.0776672363281,522.079731464386,449.0240478515625]},{"page":22,"text":"squadron may be the lead element conducting zone reconnaissance.","rect":[89.99004364013672,469.6013488769531,360.2167456150055,460.5477294921875]},{"page":22,"text":"1-47. During defensive actions, a higher headquarters typically tasks the Cavalry unit with conducting","rect":[89.99004364013672,487.1210021972656,522.0697827339172,478.0673828125]},{"page":22,"text":"security operations to provide early warning and reaction time, deny enemy reconnaissance efforts, and","rect":[90.0,498.6447448730469,522.0968823432922,489.59112548828127]},{"page":22,"text":"protect the main body. The commander tasks the Cavalry unit to execute security operations based upon the","rect":[89.98999786376953,510.16845703125,522.086729763031,501.1148376464844]},{"page":22,"text":"degree of protection required by the higher headquarters.","rect":[89.99004364013672,521.5726928710938,317.725412607193,512.51904296875]},{"page":22,"text":"1-48. Every operation integrates stability tasks, which are critical to sustaining or establishing civil security","rect":[90.0,539.0923461914063,522.039936542511,530.0386962890625]},{"page":22,"text":"and control over areas, populations, and resources. Cavalry units focus on reconnaissance and security","rect":[89.99998474121094,550.6160278320313,522.2101635932922,541.5623779296875]},{"page":22,"text":"operations that enable its higher headquarters to develop a better understanding of the situation. Cavalry units","rect":[89.99998474121094,562.1398315429688,522.1624038820266,553.086181640625]},{"page":22,"text":"are critical to successful execution of stability tasks and the units’ ability to consolidate tactical gains.","rect":[90.00991821289063,573.6635131835938,496.55033326148989,564.60986328125]},{"page":22,"text":"1-49. Commanders task-organize Cavalry units with the combat power necessary to accomplish the mission","rect":[90.00991821289063,591.1831665039063,521.9722485542297,582.1295166015625]},{"page":22,"text":"based upon mission variables. If a higher headquarters is conducting security operations, it assigns","rect":[90.00993347167969,602.5873413085938,522.0348404054641,593.53369140625]},{"page":22,"text":"appropriate security operations to the Cavalry unit and ensures the Cavalry unit is appropriately task","rect":[90.00995635986328,614.1111450195313,521.9572949409485,605.0574951171875]},{"page":22,"text":"organized to accomplish their mission. Augmentation may include an aviation task force (TF), armored and","rect":[90.01992797851563,625.6348266601563,522.0728344917297,616.5811767578125]},{"page":22,"text":"mechanized Infantry units, additional Cavalry units, engineer units for mobility and reconnaissance, artillery","rect":[90.01000213623047,637.158447265625,522.078754901886,628.1047973632813]},{"page":22,"text":"in direct support, close air support, military intelligence units, air defense units, CBRN reconnaissance units,","rect":[90.01991271972656,648.6821899414063,522.104562997818,639.6285400390625]},{"page":22,"text":"and logistical elements. Reconnaissance and security operations often precede the main operation in time and","rect":[90.01991271972656,660.0863647460938,522.2114453315735,651.03271484375]},{"page":22,"text":"space; therefore, commanders can task-organize enablers organized with Cavalry units from divisions and","rect":[90.01991271972656,671.6101684570313,522.054829120636,662.5565185546875]},{"page":22,"text":"corps to provide reconnaissance and security at EAB. Subsequently, BCT commanders must be judicious","rect":[90.00995635986328,683.1338500976563,522.0339248781204,674.0702514648438]},{"page":22,"text":"when detaching combat power from the Cavalry squadron, such as designating the squadron Armored","rect":[90.00003814697266,694.6575927734375,522.0747876167297,685.6039428710938]},{"page":22,"text":"company as a BCT reserve, based on the importance of the BCT commander’s information and security","rect":[90.01991271972656,706.1813354492188,522.058979511261,697.127685546875]},{"page":22,"text":"requirements. This loss of combat power inhibits the scope of the squadron’s possible security tasks,","rect":[90.01991271972656,717.705078125,522.1016943454742,708.6514282226563]},{"page":22,"text":"1-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":22,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":22,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":23,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":23,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":23,"text":"especially for the conduct of a guard. Mission variables and the commander’s intent determine","rect":[108.0,83.50144958496094,511.33334231185918,74.44780731201172]},{"page":23,"text":"additional capabilities the Cavalry unit requires.","rect":[108.0,95.02519226074219,300.20606446266177,85.97154998779297]},{"page":23,"text":"which","rect":[515.79345703125,81.4895248413086,540.095844745636,74.44780731201172]},{"page":23,"text":"BRIGADE OPERATIONS OFFICER AND SQUADRON EMPLOYMENT","rect":[90.0,122.6471939086914,537.6093699159623,110.60087585449219]},{"page":23,"text":"1-50. BCT commanders and their staff integrate operations and intelligencewhen conductingreconnaissance","rect":[108.0,140.6213836669922,539.997374294281,131.56773376464845]},{"page":23,"text":"and security operations. A commander focuses information collection, combined arms, sustainment and","rect":[108.0,152.0255584716797,540.091938495636,142.97190856933595]},{"page":23,"text":"signal organizations, and reconnaissance efforts to answerthe commander’s PIRsthrough theBCT or brigade","rect":[108.0,163.54930114746095,540.1206042747498,154.4956512451172]},{"page":23,"text":"operations staff officer (S-3).","rect":[108.01991271972656,175.05311584472657,224.7411596775055,166.01939392089845]},{"page":23,"text":"BRIGADE COMBAT TEAM S-3","rect":[90.0,198.41998291015626,234.60000610351563,190.11599731445313]},{"page":23,"text":"1-51. The BCT S-3 is responsible for coordinating and synchronizing information collection with","rect":[108.0,218.3813934326172,540.0587964057922,209.32774353027345]},{"page":23,"text":"reconnaissance and security operations. The BCT S-3 allocates organic, attached, and supporting information","rect":[107.99998474121094,229.90513610839845,540.0657544136047,220.8514862060547]},{"page":23,"text":"collection capabilities to answer PIRs or refine reconnaissance objectives. The S-3 ensures reconnaissance","rect":[107.99998474121094,241.42881774902345,539.9838244895935,232.36521911621095]},{"page":23,"text":"operations enable the commander to make decisions as to how to employ the BCT’s combat power and","rect":[107.98999786376953,252.8330535888672,540.042866230011,243.77940368652345]},{"page":23,"text":"achieve desired outcomes and objectives. In concert with the brigade and subordinate staffs, the BCT S-3","rect":[107.99002838134766,264.3567199707031,539.925434589386,255.2931365966797]},{"page":23,"text":"ensures operations conducted by the Cavalry squadron and other information collection units are nested,","rect":[107.98999786376953,275.8804626464844,539.9652197360992,266.82684326171877]},{"page":23,"text":"complementary, and focused on mission accomplishment.","rect":[107.99004364013672,287.4041748046875,340.0370886325836,278.3505554199219]},{"page":23,"text":"1-52. BCTs establish coordination within the staff and collaborate with the Cavalry squadron staff to","rect":[107.99004364013672,304.923828125,539.9414258003235,295.8702087402344]},{"page":23,"text":"synchronize reconnaissance and security operations. The brigade reconnaissance cell might include an S-2","rect":[107.99005126953125,316.4475402832031,539.9164624214172,307.3939208984375]},{"page":23,"text":"(intelligence community/intelligence, surveillance, and reconnaissance), an S-3 plans, a fire support officer","rect":[107.97013854980469,327.8517150878906,540.0429983720779,318.798095703125]},{"page":23,"text":"(field artillery battalion), a brigade logistics staff officer (S-4), a brigade aviation element, brigade","rect":[107.96022033691406,339.3754577636719,540.1574695091248,330.32183837890627]},{"page":23,"text":"sustainment assets, and the Air Force’s tactical air control party who can coordinate with close air support","rect":[107.9303207397461,350.899169921875,540.0479327449799,341.8455505371094]},{"page":23,"text":"and intelligence, surveillance, and reconnaissance personnel (see figure 1-2, page 1-12). The Cavalry","rect":[107.93028259277344,362.4228820800781,539.990131855011,353.3692626953125]},{"page":23,"text":"squadron can provide a staff officer, whose loss will not degrade squadron staff operations, to serve asa","rect":[107.92032623291016,373.94659423828127,540.0249011497498,364.8929748535156]},{"page":23,"text":"liaison officer to the brigade reconnaissance cell. To achieve intent, the BCT commander task organizes the","rect":[107.92029571533203,385.3507995605469,540.1304919700623,376.2971496582031]},{"page":23,"text":"Cavalry squadron with the necessary combined arms, engineers, military police, CBRN, sustainment, and","rect":[107.91033172607422,396.8745422363281,539.9612011909485,387.8209228515625]},{"page":23,"text":"signal organizations to execute the mission. At the conclusion of mission analysis, the BCT publishes the","rect":[107.91033172607422,408.39825439453127,539.8808581809998,399.3446350097656]},{"page":23,"text":"commander’s intent, including reconnaissance and security guidance and a fragmentary order to initiate","rect":[107.91033172607422,419.9219665527344,539.930479763031,410.86834716796877]},{"page":23,"text":"reconnaissance and security operations. Usually, the Cavalry squadron is the lead element in the brigade.","rect":[107.91033172607422,431.4456787109375,539.9951269626617,422.3920593261719]},{"page":23,"text":"Parallel, integrated, and collaborative planning between the Cavalry squadron and BCT staffs is essential to","rect":[107.90045166015625,442.9693908691406,539.8274121284485,433.915771484375]},{"page":23,"text":"the timely execution of operations and the integration of intelligence collection with reconnaissance and","rect":[107.90039825439453,454.3736267089844,539.938374042511,445.3199768066406]},{"page":23,"text":"security operations.","rect":[107.89042663574219,465.8973388671875,186.22184205055238,456.8437194824219]},{"page":23,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":23,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":23,"text":"1-11","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":24,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":24,"text":"Figure 1-2. Brigade reconnaissance cell","rect":[202.8000030517578,512.681640625,391.05797302818299,503.3291931152344]},{"page":24,"text":"CAVALRY EMPLOYMENT IN THE AREA OF OPERATIONS","rect":[72.0,536.0880737304688,344.6215572357178,527.7960205078125]},{"page":24,"text":"1-53. The BCT commander employs the Cavalry squadron based on mission variables. The squadron can","rect":[90.0,556.0614013671875,522.0182690620422,547.0077514648438]},{"page":24,"text":"operate in its own area of operations, unassigned deep areas in the BCT area of operations, or across another","rect":[90.0,567.5851440429688,522.1922903642654,558.531494140625]},{"page":24,"text":"maneuver battalion’s area of operations.","rect":[90.0,579.0888671875,250.89383912086488,570.05517578125]},{"page":24,"text":"Assignment of Cavalry Squadron’s Area of Operations","rect":[72.0,603.693603515625,329.97610905742649,593.8348999023438]},{"page":24,"text":"1-54. When the BCT commander assigns the Cavalry squadron a specific area of operations,","rect":[90.0,621.221435546875,457.77298951148989,612.1677856445313]},{"page":24,"text":"be prepared to perform the following actions (see figure 1-3):","rect":[89.99996185302735,632.7451782226563,335.75301086997987,623.6915283203125]},{"page":24,"text":" Terrain management.","rect":[115.19999694824219,646.1814575195313,218.86097168922425,637.1278076171875]},{"page":24,"text":" Information collection.","rect":[115.19999694824219,657.6094360351563,225.44553589820863,650.5677490234375]},{"page":24,"text":" Civil-military operations (with attached civil affairs forces).","rect":[115.19999694824219,673.181396484375,372.93323731422427,664.1277465820313]},{"page":24,"text":" Movement control (air-ground).","rect":[115.19999694824219,686.6213989257813,261.215891122818,677.5677490234375]},{"page":24,"text":" Clearance of fires.","rect":[115.19999694824219,698.179443359375,206.86313843727113,691.1277465820313]},{"page":24,"text":" Security.","rect":[115.19999694824219,713.6213989257813,169.0490210056305,704.5677490234375]},{"page":24,"text":"squadrons must","rect":[459.96417236328127,621.2014770507813,522.1314898738862,612.1677856445313]},{"page":24,"text":"1-12","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":24,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":24,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":25,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":25,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":25,"text":" Personnel recovery.","rect":[133.1999969482422,83.38139343261719,230.72861695289613,74.32775115966797]},{"page":25,"text":" Manage airspace users.","rect":[133.1999969482422,96.94139099121094,244.2861578464508,87.88774871826172]},{"page":25,"text":" Minimal essential stability tasks.","rect":[133.1999969482422,110.38139343261719,282.31934571266177,101.32775115966797]},{"page":25,"text":"1-55. Assignment of an area of operations provides the squadron with the maneuver space necessary to","rect":[108.00347137451172,128.0205535888672,540.090229511261,118.96691131591797]},{"page":25,"text":"execute its assigned mission. The BCT commander and staff ensure the squadron is task organized with","rect":[108.013427734375,139.4247283935547,540.0702710151672,130.37107849121095]},{"page":25,"text":"sufficient assets to accomplish the squadron’s assigned mission.","rect":[108.0134506225586,150.94847106933595,364.173654794693,141.8948211669922]},{"page":25,"text":"Figure 1-3. Squadron in its own area of operations","rect":[195.73117065429688,440.2068176269531,434.0669348258972,430.7647399902344]},{"page":25,"text":"Within BCT Deep Areas","rect":[90.0,458.83154296875,205.30615666484833,448.9949035644531]},{"page":25,"text":"1-56. The squadron can also operate in BCT deep area. In noncontiguous areas of operations, the deep area","rect":[108.0,476.3813781738281,540.1105945091248,467.3277587890625]},{"page":25,"text":"is the area between noncontiguous areas of operations or beyond contiguous areas of operations. (Refer to","rect":[108.00995635986328,487.90509033203127,540.067768573761,478.8514709472656]},{"page":25,"text":"ADP 3-0 for more information.) A commander’s deep area generally extends beyond subordinate units’","rect":[108.00995635986328,499.4288024902344,540.0041800127029,490.37518310546877]},{"page":25,"text":"boundaries out to the limits of the commander’s designated area of operations. The purpose of operations in","rect":[108.0199203491211,510.9525451660156,540.0800976753235,501.89892578125]},{"page":25,"text":"the deep area often is tied to setting conditions for future events. The BCT commander may assign urban","rect":[108.0199203491211,522.4762573242188,540.0657544136047,513.422607421875]},{"page":25,"text":"areas to maneuver battalions thus allowing them to focus on that area while the Cavalry squadron conducts","rect":[108.01992797851563,533.8804931640625,540.0539444093704,524.8268432617188]},{"page":25,"text":"operations in the open areas. The BCT may have deep areas due to—","rect":[108.01993560791016,545.4042358398438,384.9737329483032,536.3505859375]},{"page":25,"text":" A decision to accept risk due to a low threat level.","rect":[133.1999969482422,558.8014526367188,351.595285654068,549.7677612304688]},{"page":25,"text":" Areas not assigned to battalions are sparsely populated or the terrain is compartmentalized.","rect":[133.1999969482422,572.3814086914063,515.2980444431305,563.3277587890625]},{"page":25,"text":" Insufficient combat power to assign all areas to subordinate battalions.","rect":[133.1999969482422,585.8214111328125,433.411691904068,576.7677612304688]},{"page":25,"text":"1-57. The BCT is responsible for controlling deep areas within its area of operations. The BCT commander","rect":[108.00347137451172,603.4605712890625,540.0752249345779,594.4069213867188]},{"page":25,"text":"may direct the Cavalry squadron to operate in the deep area (see figure 1-4, page 1-14). Squadrons operating","rect":[108.00347900390625,614.8648071289063,540.0483593940735,605.8111572265625]},{"page":25,"text":"in the BCT deep area are not usually responsible for the entire deep area. The squadron in the deep area","rect":[107.99349975585938,626.3884887695313,540.066466091156,617.3348388671875]},{"page":25,"text":"generally operates in one of the following ways:","rect":[107.98353576660156,637.9122314453125,301.07005798912049,628.8585815429688]},{"page":25,"text":" In a contiguous portion of the unassigned area.","rect":[133.1999969482422,651.3414306640625,338.48780274391177,642.2877807617188]},{"page":25,"text":" In multiple, noncontiguous area of operations within the unassigned area.","rect":[133.1999969482422,664.9014282226563,444.8178503513336,655.8477783203125]},{"page":25,"text":" Within focused target areas of interest (TAIs) or named areas of interest (NAIs).","rect":[133.1999969482422,678.3414306640625,472.519602060318,669.2877807617188]},{"page":25,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":25,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":25,"text":"1-13","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":26,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":26,"text":"Figure 1-4. Squadron in BCT deep area of operations","rect":[171.72000122070313,389.681640625,422.2905981559753,380.23956298828127]},{"page":26,"text":"Across Another Battalion’s Area of Operations","rect":[72.0,414.3115234375,293.01306584453587,404.4748840332031]},{"page":26,"text":"1-58. The squadron may conduct operations in front of and across another battalion’s operation area, such","rect":[90.0,431.98138427734377,522.0579419136047,422.9277648925781]},{"page":26,"text":"as during an area security mission or in preparation for offensive or defensive tasks (see figure 1-5). In this","rect":[90.0,443.3855895996094,522.1384781007766,434.33197021484377]},{"page":26,"text":"case, the BCT commander assigns the entire area of operations to subordinate units or battalions. The BCT","rect":[89.99004364013672,454.9093017578125,521.8356820936203,445.8556823730469]},{"page":26,"text":"commander retains control of the squadron by assigning an area of operations in front of and across the","rect":[89.98005676269531,466.4330139160156,522.0717151145935,457.37939453125]},{"page":26,"text":"maneuver battalions (for example, along a route). The squadron commander retains command and control of","rect":[89.98001861572266,477.9567565917969,522.1868582353592,468.90313720703127]},{"page":26,"text":"the squadron and its significant information collection capabilities. Conditions may include hybrid threat","rect":[89.98999786376953,489.48046875,522.0697833309174,480.4268493652344]},{"page":26,"text":"networks operating across brigade boundaries. During transitions to offense or defense, the BCT commander","rect":[89.99003601074219,501.0041809082031,522.0677786455154,491.9505615234375]},{"page":26,"text":"can direct the squadron commander to place troops under tactical control to the maneuver battalions (for","rect":[89.99000549316406,512.3884887695313,522.0507498369217,503.3547668457031]},{"page":26,"text":"example, one troop in front of each maneuver battalion’s scout platoon). The squadron remains focused on","rect":[89.99000549316406,523.9121704101563,522.031879901886,514.8784790039063]},{"page":26,"text":"collecting information to assist in answering the higher commander’s PIRs or other information requirements.","rect":[89.98005676269531,535.4558715820313,522.0776464939117,526.4022216796875]},{"page":26,"text":"When operating across other battalion’s area of operations, higher headquarters still assigns specific missions","rect":[89.98007202148438,546.9795532226563,521.9004409914016,537.9259033203125]},{"page":26,"text":"to squadrons.","rect":[89.99008178710938,558.4833374023438,143.35575318336488,549.4496459960938]},{"page":26,"text":"1-14","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":26,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":26,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":27,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":27,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":27,"text":"Figure 1-5. Squadron operating across another battalion’s area of operations","rect":[132.47999572753907,389.681640625,497.53391480636597,380.23956298828127]},{"page":27,"text":"EMPLOYMENT METHOD COMPARISON","rect":[90.0,413.0880126953125,279.96238803863528,404.7960205078125]},{"page":27,"text":"1-59. On a contiguous battlefield, the Cavalry squadron may have an area of operations forward of the","rect":[108.0,433.0614013671875,540.2261950950623,424.0077819824219]},{"page":27,"text":"battalions or operate across the BCT area of operations. On a noncontiguous battlefield, the Cavalry squadron","rect":[108.00999450683594,444.5851135253906,540.0747876167297,435.531494140625]},{"page":27,"text":"may operate in the unassigned area inside the BCT’s area of operations. On a contiguous battlefield where","rect":[108.00999450683594,456.1088562011719,540.0927112083435,447.05523681640627]},{"page":27,"text":"there are no unassigned areas, the Cavalry squadron may employ elements within the BCT area of operations","rect":[108.00999450683594,467.632568359375,540.1863296632766,458.5789489746094]},{"page":27,"text":"or across battalion areas of operations to answer information requirements that cross battalion boundaries,","rect":[108.01998138427735,479.0168762207031,540.1047461032867,469.983154296875]},{"page":27,"text":"such as a route security mission that spans the BCT area of operations (see figure 1-6, page 1-17). The","rect":[108.01007080078125,490.56048583984377,540.108702419281,481.5068664550781]},{"page":27,"text":"squadronmay have an area of operations to meet an economy of force role in areas where the primarymission","rect":[108.01000213623047,502.0841979980469,539.954243183136,493.03057861328127]},{"page":27,"text":"is reconnaissance and security. Table 1-1, page 1-16 is a comparison of the three general employment","rect":[108.00991821289063,513.60791015625,540.1623736629487,504.5542907714844]},{"page":27,"text":"methods.","rect":[108.01992797851563,523.1196899414063,144.47352051734925,516.0780029296875]},{"page":27,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":27,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":27,"text":"1-15","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":28,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":28,"text":"1-16","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":28,"text":"Table 1-1. Squadron employment","rect":[185.8800048828125,83.44168853759766,343.0298758134842,73.99960327148438]},{"page":28,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":28,"text":"comparisons","rect":[345.838623046875,83.31221008300781,408.01392579269409,74.22868347167969]},{"page":28,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":29,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":29,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":29,"text":"Figure 1-6. Squadron conducting reconnaissance in the brigade area of operations","rect":[118.55999755859375,403.24163818359377,511.32859254074097,393.799560546875]},{"page":29,"text":"BCT RECONNAISSANCE AND COLLECTION TEAMING","rect":[90.0,426.64801025390627,350.08598041534426,418.35601806640627]},{"page":29,"text":"1-60. BCT reconnaissance and collection teaming is the pairing of collection assets to conduct integrated","rect":[108.0,446.62139892578127,540.053852558136,437.5677795410156]},{"page":29,"text":"reconnaissance and security operations to answer CCIRs. Commanders do not keep their reconnaissance and","rect":[108.0,458.0256042480469,540.0737500190735,448.97198486328127]},{"page":29,"text":"information collection assets in reserve. The commander forms reconnaissance and collection teams to","rect":[108.00997161865235,467.53741455078127,540.004292011261,460.4956970214844]},{"page":29,"text":"complement reconnaissance and intelligence collection capabilities. These teams consist of appropriate","rect":[108.01994323730469,481.0730285644531,540.1345202903748,472.0194091796875]},{"page":29,"text":"combinations of Cavalry Soldiers and multidiscipline intelligence Soldiers.","rect":[108.01994323730469,492.5967712402344,408.573068857193,483.54315185546877]},{"page":29,"text":"1-61. The BCT’s","rect":[108.01994323730469,508.11444091796877,183.41814118671418,501.0627746582031]},{"page":29,"text":"military intelligence","rect":[191.416015625,510.11639404296877,277.90865969467168,501.0627746582031]},{"page":29,"text":"company","rect":[285.9752502441406,510.11639404296877,322.63402223587038,503.3934020996094]},{"page":29,"text":"provides ","rect":[330.7355041503906,510.09649658203127,367.66520142555239,501.0627746582031]},{"page":29,"text":"multidiscipline ","rect":[373.0933837890625,510.09649658203127,435.57642579078677,501.0627746582031]},{"page":29,"text":"intelligence","rect":[441.12615966796877,510.11639404296877,487.78375124740605,501.0627746582031]},{"page":29,"text":"operations.","rect":[495.8523864746094,510.09649658203127,540.1046240329742,501.0627746582031]},{"page":29,"text":"Multidiscipline intelligence","rect":[108.0100326538086,521.64013671875,221.3847033958435,512.5864868164063]},{"page":29,"text":"operations","rect":[226.93243408203126,521.6201782226563,268.72560578632359,512.5864868164063]},{"page":29,"text":"include limited signals intelligence (SIGINT),","rect":[274.3320617675781,521.64013671875,470.49427247047427,512.5864868164063]},{"page":29,"text":"electromagnetic","rect":[476.1615295410156,521.64013671875,539.995909450531,512.5864868164063]},{"page":29,"text":"warfare, interrogation of prisoners of war, multidisciplinary counterintelligence, tactical human intelligence","rect":[108.0,533.0443725585938,540.077940700531,523.99072265625]},{"page":29,"text":"(HUMINT), and air reconnaissance from tactical unmanned aircraft systems (known as TUASs). BCT","rect":[108.0,544.5680541992188,539.8456918592453,535.514404296875]},{"page":29,"text":"commanders build reconnaissance and collection teams to execute offensive, defensive, and stability tasks.","rect":[107.99004364013672,556.091796875,535.403391122818,547.0381469726563]},{"page":29,"text":"1-62. The BCT’s organic military intelligence company can be used to augment the Cavalry squadron based","rect":[107.99004364013672,573.6113891601563,540.0488476753235,564.5577392578125]},{"page":29,"text":"on mission variables and PIRs. They operate together to secure collection assets and provide the appropriate","rect":[107.99008178710938,585.1351318359375,540.100645778656,576.0814819335938]},{"page":29,"text":"combat information and intelligence necessary to answer the PIRs of the supported commander. These","rect":[108.00003814697266,596.6588745117188,540.1196277122498,587.605224609375]},{"page":29,"text":"brigade reconnaissance, collection, and security teams provide the supported commander with the ability to","rect":[108.00999450683594,608.0630493164063,540.0598340034485,599.0093994140625]},{"page":29,"text":"separate combatants from noncombatants more effectively under conditions of uncertainty.","rect":[108.00999450683594,619.5867309570313,472.4174597263336,610.5330810546875]},{"page":29,"text":"1-63. The military intelligence company includes multifunctional teams comprised of all sources of","rect":[108.00997161865235,637.1063842773438,539.9751883134842,628.052734375]},{"page":29,"text":"HUMINT and SIGINT disciplines, HUMINT collection teams, counterintelligence teams, SIGINT platoons,","rect":[108.0100326538086,648.630126953125,540.0897924900055,639.5764770507813]},{"page":29,"text":"and operational management teams that coordinate the various team missions. (Refer to ATP 2-19.4 for more","rect":[108.01004791259766,660.1538696289063,540.106749294281,651.1002197265625]},{"page":29,"text":"information.) BCT commanders can augment the squadron to ensure they have secure access to the local","rect":[108.01007080078125,671.5580444335938,539.8906451473237,662.50439453125]},{"page":29,"text":"population, which is essential for military intelligence discipline collection tasks by the brigade.","rect":[108.00009155273438,683.0817260742188,491.82389283180239,674.028076171875]},{"page":29,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":29,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":29,"text":"1-17","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":30,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":30,"text":"COMPOSITION OF COLLECTION TEAMS","rect":[72.0,83.32803344726563,265.5463924407959,75.0360336303711]},{"page":30,"text":"1-64. The lowest level for task-organizing Cavalry units with additional assets and capabilities is the section.","rect":[90.0,103.30143737792969,522.0847265720367,94.24779510498047]},{"page":30,"text":"However, most assets operate under the operational control of a Cavalry troop or scout platoon. For example,","rect":[89.98999786376953,114.82518005371094,522.0979101657867,105.77153778076172]},{"page":30,"text":"a scout platoon from the Cavalry squadron can receive an attached or operational control","rect":[89.99004364013672,126.22935485839844,522.0670367488862,117.17571258544922]},{"page":30,"text":"SIGINT/electromagnetic warfare. Intelligence and reconnaissance teams provide enhanced security for","rect":[89.99004364013672,137.7530975341797,522.0985403642654,128.69944763183595]},{"page":30,"text":"military intelligence teams, facilitate its movement, and expand the capability of reconnaissance during a","rect":[89.99003601074219,149.2767791748047,522.0980212669373,140.22312927246095]},{"page":30,"text":"mission. Reconnaissance and collection teams combine and integrate collection and reconnaissance","rect":[89.99003601074219,160.80052185058595,522.1137073020935,151.7468719482422]},{"page":30,"text":"specialties to accomplish the mission. Teaming allows rapid communication and sharing of information as","rect":[89.99003601074219,172.3242645263672,522.1454361085891,163.27061462402345]},{"page":30,"text":"teams work together to answer critical information requirements.","rect":[89.99000549316406,183.8479461669922,339.92325806617739,174.79429626464845]},{"page":30,"text":"SECTION V – ORGANIZATIONS","rect":[81.36000061035156,207.7439727783203,260.1239951171875,198.86398315429688]},{"page":30,"text":"1-65. Cavalry units are essential to the brigade. Reconnaissance and security operations are essential to all","rect":[90.0,231.10142517089845,521.8925982723237,222.0477752685547]},{"page":30,"text":"successful large-scale combat operations. Through effective information collection and continuous","rect":[90.0,242.6251678466797,522.0629165773391,233.57151794433595]},{"page":30,"text":"reconnaissance, brigades develop and sustain the understanding to defeat adaptive and determined enemies.","rect":[90.00000762939453,254.0293426513672,522.0800268650055,244.97569274902345]},{"page":30,"text":"Reconnaissance and security operations assist brigades in adapting to uncertainty. Reconnaissance and","rect":[90.00000762939453,265.5530700683594,522.1047558784485,256.49945068359377]},{"page":30,"text":"security operations allow the brigade to understand the tactical, human, and political environment; visualize","rect":[90.00000762939453,277.0767517089844,522.0988757591248,268.02313232421877]},{"page":30,"text":"operations; develop the situation, and identify or create options to seize, retain, and exploit the initiative.","rect":[90.00000762939453,288.6004943847656,522.0597631931305,279.546875]},{"page":30,"text":"Cavalry units provide flexibility, adaptability, and depth to the maneuver commander’s operations.","rect":[90.0,300.12420654296877,485.60746216773989,291.0705871582031]},{"page":30,"text":"1-66. Cavalry units provide information to the commander about the enemy location, disposition, and","rect":[90.0,317.64385986328127,522.0749707221985,308.5902404785156]},{"page":30,"text":"composition (see figure 1-7 and figures 1-8 and 1-9 [page 1-20]). Cavalry units preserve the BCT’s freedom","rect":[90.0,329.0480651855469,522.0409332523346,319.99444580078127]},{"page":30,"text":"of maneuver. Successful reconnaissance allows the BCT commander to initiate combat under advantageous","rect":[89.99008178710938,340.5717468261719,522.1277359132766,331.51812744140627]},{"page":30,"text":"conditions to defeat the enemy and accomplish the mission. Roles and organizations listed in this manual","rect":[89.99008178710938,352.0954895019531,522.0650225887299,343.0418701171875]},{"page":30,"text":"depict habitual attachments and augmentees.","rect":[89.99008178710938,363.61920166015627,268.54102540016177,354.5655822753906]},{"page":30,"text":"BRIGADE COMBAT TEAM","rect":[72.0,386.8506164550781,249.55686054992678,377.1208801269531]},{"page":30,"text":"1-67. The BCT is the Army’s fundamental combined arms organization and its primary close combat force.","rect":[90.0,407.1413879394531,522.086008310318,398.0877685546875]},{"page":30,"text":"The BCT includes units and capabilities from every warfighting function; it is task organized to meet specific","rect":[90.0,418.66510009765627,522.1136462669373,409.6114807128906]},{"page":30,"text":"mission requirements.","rect":[90.00001525878906,430.1689147949219,178.40995240211488,421.13519287109377]},{"page":30,"text":"1-68. The Cavalry squadron is the BCT commander’s main asset for executing reconnaissance and security","rect":[90.00001525878906,447.7084655761719,522.050190448761,438.65484619140627]},{"page":30,"text":"operations at the brigade level; however, each subordinate organization of a BCT is responsible for","rect":[90.0000228881836,459.1126708984375,522.0810843095779,450.0590515136719]},{"page":30,"text":"information collection, local reconnaissance, and security within their assigned area of operations. When the","rect":[90.0000228881836,470.6363830566406,522.1030261497498,461.582763671875]},{"page":30,"text":"BCT assigns reconnaissance or security missions to a subordinate element, it task organizes subordinate","rect":[90.0000228881836,482.1601257324219,522.0966174583435,473.10650634765627]},{"page":30,"text":"elements and allocates the resources necessary to meet mission requirements. To perform reconnaissance or","rect":[89.99006652832031,493.683837890625,522.1236868486404,484.6302185058594]},{"page":30,"text":"security operations, the BCT commander may allocate armored and mechanized Infantry units,","rect":[89.99006652832031,505.2075500488281,522.0899755954742,496.1539306640625]},{"page":30,"text":"reconnaissance units, engineer reconnaissance teams (ERTs), aviation units, air defense units, artillery, close","rect":[89.99006652832031,516.7312622070313,521.9652698020935,507.6776123046875]},{"page":30,"text":"air support, intelligence systems, and sustainment units.","rect":[89.99008178710938,528.135498046875,313.0383093357086,519.0818481445313]},{"page":30,"text":"1-69. In addition to the Cavalry squadron, the military intelligence company serves as a BCT organic","rect":[89.99008178710938,545.6550903320313,522.126524684906,536.6014404296875]},{"page":30,"text":"collection capability. The military intelligence company is organic to the brigade engineer battalion (BEB).","rect":[89.9900894165039,557.1788330078125,522.072824716568,548.1251831054688]},{"page":30,"text":"Most of the intelligence personnel and assets within the BCT are assigned to the military intelligence","rect":[89.99008178710938,568.7025756835938,522.1097400169373,559.64892578125]},{"page":30,"text":"company. The BCT commander and staff task organize the military intelligence company based on mission","rect":[89.99008178710938,580.2262573242188,522.0439038276672,571.172607421875]},{"page":30,"text":"variables of METT-TC (I). The military intelligence company deploys and provides single-source collection,","rect":[90.00003814697266,591.75,522.0748388767242,582.6963500976563]},{"page":30,"text":"TUAS capabilities, and collected intelligence processing capabilities to the BCT and maneuver units.","rect":[89.98016357421875,603.1542358398438,521.9406836032867,594.1005859375]},{"page":30,"text":"HUMINT, SIGINT, and TUAS capabilities within the military intelligence company are used habitually to","rect":[89.98016357421875,614.6779174804688,522.0440258979797,605.624267578125]},{"page":30,"text":"augment the Cavalry squadron during reconnaissance operations to maximize rapid and accurate information","rect":[89.99015808105469,626.2015991210938,522.061176776886,617.14794921875]},{"page":30,"text":"collection. (Refer to FM 2-0 and ATP 2-19.4 for more information on the capabilities of the military","rect":[89.99015808105469,637.725341796875,522.1784253120422,628.6716918945313]},{"page":30,"text":"intelligence company.)","rect":[89.98018646240235,649.2490844726563,181.73968416309357,640.1954345703125]},{"page":30,"text":"1-70. Armored brigade combat teams (ABCTs) have the following reconnaissance units and habitual","rect":[89.98018646240235,666.649169921875,522.1107379207612,657.5955200195313]},{"page":30,"text":"enablers within their organizations:","rect":[89.98018646240235,678.1729125976563,231.33989441490173,669.1192626953125]},{"page":30,"text":" One Cavalry squadron.","rect":[115.19999694824219,691.5414428710938,225.80907654762269,682.48779296875]},{"page":30,"text":" Three Cavalry troops within the Cavalry squadron. Two scout platoons within each Cavalrytroop.","rect":[133.1999969482422,705.701416015625,522.003000497818,696.6477661132813]},{"page":30,"text":" One Armored company within the squadron. Three tank platoons within the Armored company.","rect":[133.1999969482422,719.7413940429688,519.2190039157867,710.687744140625]},{"page":30,"text":"1-18","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":30,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":30,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":31,"text":"","rect":[133.1999969482422,80.6611099243164,139.2058769197464,75.93359375]},{"page":31,"text":"","rect":[133.1999969482422,105.74112701416016,139.2058769197464,101.01361083984375]},{"page":31,"text":"","rect":[133.1999969482422,119.1811294555664,139.2058769197464,114.45361328125]},{"page":31,"text":"","rect":[133.1999969482422,132.7411346435547,139.2058769197464,128.01361083984376]},{"page":31,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":31,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":31,"text":"Three combined arms battalions. Each combined arms battalion has one scout platoon within the","rect":[151.1999969482422,83.3614730834961,540.106261013031,74.32775115966797]},{"page":31,"text":"headquarters and headquarters company.","rect":[151.1999969482422,95.02464294433594,314.48914551734927,85.97100067138672]},{"page":31,"text":"One CBRN reconnaissance and surveillance platoon organic to the BEB.","rect":[151.1999969482422,108.46141052246094,442.76612305641177,99.40776824951172]},{"page":31,"text":"One TUAS platoon from within the military intelligence company.","rect":[151.1999969482422,121.90141296386719,418.765451669693,112.84777069091797]},{"page":31,"text":"Two combat engineer companies within the brigade engineer battalion. Each combat engineer","rect":[151.1999969482422,135.46141052246095,540.0921927080154,126.40776824951172]},{"page":31,"text":"company can create ad hoc ERTs from within its organic platoons and squads or from those tasks","rect":[151.1999969482422,146.9851531982422,539.9141128664016,137.93150329589845]},{"page":31,"text":"organized by echelon above the BCT engineer units. (Refer to ATP 3-34.81 for more information","rect":[151.1999969482422,158.5088348388672,540.055317401886,149.45518493652345]},{"page":31,"text":"on engineer reconnaissance capabilities.)","rect":[151.1999969482422,170.03257751464845,314.9533377275467,160.9789276123047]},{"page":31,"text":"Figure 1-7. ABCT Cavalry units and enablers (shaded)","rect":[187.20538330078126,433.7335205078125,442.73611360645296,424.29144287109377]},{"page":31,"text":"1-71. Infantry brigade combat teams (IBCTs) have the following reconnaissance units and habitual enablers","rect":[108.013427734375,451.31292724609377,540.1681411867141,442.2593078613281]},{"page":31,"text":"within their organizations:","rect":[108.013427734375,462.8366394042969,213.6114703426361,453.78302001953127]},{"page":31,"text":" One Cavalry squadron:","rect":[133.1999969482422,476.26141357421877,244.08795654869079,467.2077941894531]},{"page":31,"text":" Two motorized Cavalry troops within the Cavalry squadron. Three motorized scout platoons","rect":[151.1999969482422,490.3013916015625,540.1501968507766,481.2477722167969]},{"page":31,"text":"within each Cavalry troop.","rect":[169.1999969482422,501.8251037597656,275.9691870212555,492.771484375]},{"page":31,"text":" One dismounted Cavalry troop. Two dismounted scout platoons within the dismounted troop.","rect":[151.1999969482422,515.8613891601563,539.973947763443,506.8077392578125]},{"page":31,"text":" Three Infantry battalions. Each Infantry battalion has one scout platoon within the headquarters","rect":[133.1999969482422,529.3014526367188,540.1231582765579,520.247802734375]},{"page":31,"text":"and headquarters company.","rect":[151.1999969482422,540.8251342773438,260.9711401462555,531.771484375]},{"page":31,"text":" One CBRN reconnaissance and surveillance platoon organic to the BEB.","rect":[133.1999969482422,554.2614135742188,442.76612305641177,545.207763671875]},{"page":31,"text":" One TUAS platoon from within the military intelligence company.","rect":[133.1999969482422,567.8214111328125,418.765451669693,558.7677612304688]},{"page":31,"text":" Two combat engineer companies within the brigade engineer battalion. Each combat engineer","rect":[133.1999969482422,581.2614135742188,540.0734549150467,572.207763671875]},{"page":31,"text":"company can create ad hoc ERTs from within its organic platoons and squads or from those tasks","rect":[151.1999969482422,592.9046630859375,539.9198501710891,583.8510131835938]},{"page":31,"text":"organized by echelon above the BCT engineer units.","rect":[151.20994567871095,604.4284057617188,361.1776831150055,595.374755859375]},{"page":31,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":31,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":31,"text":"1-19","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":32,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":32,"text":"Figure 1-8. IBCT Cavalry units and enablers (shaded)","rect":[171.36000061035157,319.24163818359377,422.4665518388748,309.8891906738281]},{"page":32,"text":"1-72. Stryker brigade combat teams (SBCTs) have the following reconnaissance units and habitual enablers","rect":[90.00672912597656,336.821044921875,522.0388687257766,327.7674255371094]},{"page":32,"text":"within their organizations:","rect":[90.00672912597656,348.2252197265625,195.60661804771423,339.1716003417969]},{"page":32,"text":" One Cavalry squadron:","rect":[115.19999694824219,361.6614074707031,226.08795654869079,352.6077880859375]},{"page":32,"text":" Three Cavalry troops. Two scout platoons within each Cavalry troop.","rect":[133.1999969482422,375.8214111328125,428.37085938453677,366.7677917480469]},{"page":32,"text":" One weapons troop consisting of three antiarmor platoons.","rect":[133.1999969482422,389.86138916015627,385.6503698825836,380.8077697753906]},{"page":32,"text":" Three maneuver battalions. Each maneuver battalion has one scout platoon within the headquarters","rect":[115.19999694824219,403.281494140625,522.1689956789016,394.2477722167969]},{"page":32,"text":"and headquarters company.","rect":[133.1999969482422,414.8251037597656,242.96814942359925,405.771484375]},{"page":32,"text":" One CBRN reconnaissance and surveillance platoon within the BEB.","rect":[115.19999694824219,428.24151611328127,410.0033667087555,419.2077941894531]},{"page":32,"text":" One TUAS platoon within the military intelligence company.","rect":[115.19999694824219,441.8214111328125,378.8036596775055,432.7677917480469]},{"page":32,"text":" Two combat engineer companies within the BEB. Each combat engineer company can create ad","rect":[115.19999694824219,455.26141357421877,522.0822949409485,446.2077941894531]},{"page":32,"text":"hoc ERTs from within its organic platoons and squads or from those tasks organized by echelon","rect":[133.1999969482422,466.9046630859375,522.0493359565735,457.8510437011719]},{"page":32,"text":"above the BCT engineer units.","rect":[133.19004821777345,478.4283752441406,255.0794928073883,469.374755859375]},{"page":32,"text":"1-20","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":32,"text":"Figure 1-9. SBCT Cavalry units (shaded)","rect":[201.59532165527345,718.2453002929688,392.10320955371858,708.80322265625]},{"page":32,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":32,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":33,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":33,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":33,"text":"CAVALRY SQUADRONS","rect":[90.0,87.6071548461914,251.49509801101685,75.57487487792969]},{"page":33,"text":"1-73. Cavalry squadrons conduct reconnaissance and security operations in close contact with enemy forces","rect":[108.0,105.58140563964844,540.1517837648391,96.52776336669922]},{"page":33,"text":"and civilian populations. They maintain contact with the enemy to fight for information while preserving","rect":[108.0,117.10514831542969,540.0508618354797,108.05150604248047]},{"page":33,"text":"their own freedom to maneuver. They shape the battlefield for the commander to allow the BCT to close with","rect":[108.0,128.6288299560547,539.953510761261,119.57512664794922]},{"page":33,"text":"and destroy the enemy through maneuver and superior firepower at a time and place of the commanders choosing.","rect":[108.0,140.03306579589845,540.088693857193,130.9794158935547]},{"page":33,"text":"1-74.","rect":[107.99996185302735,155.54074096679688,128.96576142311097,148.6782989501953]},{"page":33,"text":"1-75.","rect":[107.98583984375,343.68914794921877,128.95163941383363,336.8266906738281]},{"page":33,"text":"All ground Cavalry squadrons possess the following capabilities:","rect":[133.19876098632813,157.5526580810547,393.36888611412049,148.49900817871095]},{"page":33,"text":" Fight for information within unit capabilities.","rect":[133.1999969482422,170.98143005371095,332.835520029068,161.9277801513672]},{"page":33,"text":" Gather information about all categories of threats.","rect":[133.1999969482422,184.5414276123047,350.839182138443,175.48777770996095]},{"page":33,"text":" Provide all-weather, continuous, accurate, and timely reconnaissance in complex terrain.","rect":[133.1999969482422,197.98143005371095,505.93067383766177,188.9277801513672]},{"page":33,"text":" Rapidly develop the situation.","rect":[133.1999969482422,211.5414276123047,271.28971314430239,202.48777770996095]},{"page":33,"text":" Reduce risk and enhance survivability by providing information that allows the higher","rect":[133.1999969482422,224.98143005371095,540.1043387041092,215.9277801513672]},{"page":33,"text":"headquarters commander to avoid contact or to achieve overwhelming combat power.","rect":[151.1999969482422,236.6246795654297,494.7265112400055,227.57102966308595]},{"page":33,"text":" Assist in shaping the area of operations by providing information or directing precision joint fires","rect":[133.1999969482422,250.06138610839845,540.0356948976516,240.99778747558595]},{"page":33,"text":"to disrupt the enemy commander’s decision cycle and deny planned or future options.","rect":[151.1999969482422,261.5851135253906,494.36695313453677,252.53147888183595]},{"page":33,"text":" Conduct collaborative and parallel planning that fully integrates with higher and adjacent units","rect":[133.1999969482422,275.0213928222656,539.9857071046829,265.9577941894531]},{"page":33,"text":"and results in employment of reconnaissance and security assets to support higher headquarters operations.","rect":[151.1999969482422,286.54510498046877,539.9686377048492,277.4914855957031]},{"page":33,"text":" Reestablish command and control through two distinctly different situations listed below:","rect":[133.1999969482422,299.98138427734377,509.5260211238861,290.9277648925781]},{"page":33,"text":" Repel an enemy attack that disrupted command and control.","rect":[151.1999969482422,314.1413879394531,409.5258581638336,305.0877685546875]},{"page":33,"text":" Retransmission of information for units or elements out of communication range of the mainbody.","rect":[151.1999969482422,328.181396484375,540.1125586032867,319.1277770996094]},{"page":33,"text":"All ground Cavalry squadrons are constrained in that—","rect":[133.18463134765626,345.7010498046875,355.1830835342407,336.6474304199219]},{"page":33,"text":" They require augmentation to perform effective offensive and defensive actions as an economy of","rect":[133.1999969482422,359.1413879394531,540.0824270830154,350.0877685546875]},{"page":33,"text":"force role.","rect":[151.1999969482422,368.6531982421875,192.33579468727113,361.6114807128906]},{"page":33,"text":" Wheeled vehicle-equipped squadrons lack direct fire standoff, lethality, and survivability in open","rect":[133.1999969482422,384.10137939453127,540.0503735542297,375.0477600097656]},{"page":33,"text":"and rolling terrain and need augmentation when arrayed against enemy armor.","rect":[151.1999969482422,395.6250915527344,464.368479013443,386.57147216796877]},{"page":33,"text":" Medium-wheeled vehicles have limited cross-country mobility.","rect":[133.1999969482422,409.0614013671875,405.0873816013336,400.0077819824219]},{"page":33,"text":"AIR CAVALRY SQUADRON","rect":[90.0,436.80718994140627,272.76569466972355,424.7749328613281]},{"page":33,"text":"1-76. As an element of the combat aviation brigade, the air Cavalry squadron (known as ACS) provides","rect":[108.0,454.7814025878906,540.1177871828079,445.727783203125]},{"page":33,"text":"accurate and timely information collection, provides reaction time and maneuver space, and destroys, defeats,","rect":[108.0,466.30511474609377,540.163400888443,457.2514953613281]},{"page":33,"text":"diverts, or disrupts enemy forces to support the combined arms team. Although the ACS is fully capable of","rect":[108.0,477.7093200683594,540.0809012041092,468.65570068359377]},{"page":33,"text":"conducting attacks, the integration of RQ-7B UASs at the troop level makes the ACS the best formation for","rect":[108.0,489.2330322265625,540.0589895830154,480.1794128417969]},{"page":33,"text":"conducting reconnaissance, security, and movement to contact as primary missions, with attack operations","rect":[107.99004364013672,500.75677490234377,539.9943130617141,491.7031555175781]},{"page":33,"text":"as a secondary mission.","rect":[107.99004364013672,512.280517578125,202.517404794693,503.22686767578127]},{"page":33,"text":"ORGANIZATION","rect":[90.0,533.5680541992188,168.34312534332276,525.2760009765625]},{"page":33,"text":"1-77. The ACS consists of a headquarters troop, three air Cavalry troops (known as ACTs) equipped with","rect":[108.0,552.46142578125,540.0339550971985,543.4077758789063]},{"page":33,"text":"eight AH-64s and four RQ-7B Shadow UASs each, an aviation maintenance troop, and a forward support","rect":[107.99006652832031,564.1046752929688,540.0829669246674,555.051025390625]},{"page":33,"text":"troop. Figure 1-10, page 1-22 provides ACS organizations.","rect":[107.99005126953125,575.5088500976563,343.52018189430239,566.4552001953125]},{"page":33,"text":"CAPABILITIES","rect":[90.0,596.8080444335938,159.95474815368653,588.5159912109375]},{"page":33,"text":"1-78.","rect":[108.0,613.8094482421875,128.96579957008363,606.947021484375]},{"page":33,"text":"The ACS conducts the following tasks:","rect":[133.1988067626953,615.8214111328125,290.16536438560487,606.7677612304688]},{"page":33,"text":" Zone, route, and area reconnaissance.","rect":[133.1999969482422,627.2494506835938,301.31312012672427,620.207763671875]},{"page":33,"text":" Reconnaissance in force (when task organized).","rect":[133.1999969482422,642.8214111328125,342.33341431617739,633.7677612304688]},{"page":33,"text":" Screen.","rect":[133.1999969482422,654.2594604492188,180.93657898902894,647.3770751953125]},{"page":33,"text":" Guard and area security (when task organized).","rect":[133.1999969482422,669.8214111328125,340.41211915016177,660.7677612304688]},{"page":33,"text":" Movement to contact.","rect":[133.1999969482422,681.2494506835938,238.7693121433258,674.5264892578125]},{"page":33,"text":" Attack.","rect":[133.1999969482422,694.8094482421875,180.33300232887269,687.7677612304688]},{"page":33,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":33,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":33,"text":"1-21","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":34,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":34,"text":"Figure 1-10. Air Cavalry squadron","rect":[216.95999145507813,265.2416687011719,377.0042611951828,255.79959106445313]},{"page":34,"text":"AIR CAVALRY TROOP","rect":[72.0,286.6080017089844,202.69201586914063,278.3160095214844]},{"page":34,"text":"1-79. The primary mission of the ACT is to conduct reconnaissance and security operations. The ACT","rect":[90.0,306.5813903808594,521.9961435194016,297.52777099609377]},{"page":34,"text":"extends the aerial reconnaissance and security capabilities of the BCT with the use of long-range optics,","rect":[89.99998474121094,318.1051025390625,521.9592382907867,309.0514831542969]},{"page":34,"text":"organic UAS for manned unmanned teaming, and trained scouts. ACTs provide timely combat information","rect":[89.99004364013672,329.6288146972656,522.0390820503235,320.5751953125]},{"page":34,"text":"concerning the enemy, terrain, and weather throughout the area of operation and early warning against enemy","rect":[89.99004364013672,341.03302001953127,522.0740551948547,331.9794006347656]},{"page":34,"text":"observation or attack. ACTs augment ground forces when conducting guard and cover operations. The ACT","rect":[89.99004364013672,352.5567321777344,522.0781137342453,343.50311279296877]},{"page":34,"text":"possesses strengths and limitations that must be clearly understood for their effects to be maximized.","rect":[89.99004364013672,364.0804748535156,493.1531774997711,355.02685546875]},{"page":34,"text":"1-80.","rect":[89.99004364013672,379.5682678222656,110.95584321022034,372.7257385253906]},{"page":34,"text":"The ACT has the following capabilities:","rect":[115.18885040283203,381.60009765625,275.86848938560487,372.5464782714844]},{"page":34,"text":" High degree of maneuverability.","rect":[115.19999694824219,395.0213928222656,263.24967408180239,385.9677734375]},{"page":34,"text":" Increased lethality and ability to provide target acquisition.","rect":[115.19999694824219,408.4613952636719,369.31666016578677,399.40777587890627]},{"page":34,"text":" Demonstrated flexibility in changing battlefield situations.","rect":[115.19999694824219,422.0213928222656,367.02994751930239,412.9677734375]},{"page":34,"text":" Adds depth in all reconnaissance and security missions.","rect":[115.19999694824219,435.4613952636719,355.8876440525055,426.40777587890627]},{"page":34,"text":"1-81.","rect":[89.99351501464844,451.0687255859375,110.95931458473206,444.2261962890625]},{"page":34,"text":"The ACT has the following limitations:","rect":[115.19231414794922,453.1005554199219,273.23155701255799,444.04693603515627]},{"page":34,"text":" Limited operations in adverse weather or zero visibility conditions.","rect":[115.19999694824219,466.5413818359375,401.71766114234927,457.4877624511719]},{"page":34,"text":" Limited, continuous 24-hour-a-day operations.","rect":[115.19999694824219,479.98138427734377,320.24186158180239,470.9277648925781]},{"page":34,"text":" Limited situation time due to refueling and rearming requirements resulting in increased situation","rect":[115.19999694824219,493.5413818359375,521.9202466011047,484.4877624511719]},{"page":34,"text":"updates as aircraft rotate in and out of the area of operation.","rect":[133.1999969482422,505.0451965332031,372.1176245212555,496.011474609375]},{"page":34,"text":"CAVALRY TROOPS","rect":[72.0,530.37060546875,203.17010106277466,520.6549682617188]},{"page":34,"text":"1-82. Cavalry troops conduct reconnaissance and security missions throughout their area of operations. The","rect":[90.0,550.6614379882813,522.086973903656,541.6077880859375]},{"page":34,"text":"Cavalry troops provide the BCT commander and staff with an all-weather information collection capability.","rect":[90.0,562.1851196289063,522.079660654068,553.1314697265625]},{"page":34,"text":"Use of long-range optics, organic UAS, and trained scouts enable Cavalry troops to answer information","rect":[90.0,573.7088623046875,522.052875995636,564.6552124023438]},{"page":34,"text":"requirements and create an accurate operational picture of the area of operations. That operational picture","rect":[90.0,585.0931396484375,522.2453601341248,576.0594482421875]},{"page":34,"text":"can focus on any mixture of the METT-TC (I) variables required by the BCT and Cavalry squadron commanders.","rect":[90.0,596.6367797851563,521.9712011814117,587.5831298828125]},{"page":34,"text":"1-83. The Cavalry troop’s operational picture forms a squadron common operational picture. The common","rect":[89.99996185302735,614.1564331054688,522.0430493354797,605.102783203125]},{"page":34,"text":"operational picture allows commanders within and external to the BCT to assess the situation and develop","rect":[89.99996185302735,625.66015625,521.898823261261,616.62646484375]},{"page":34,"text":"their situational understanding of the correct courses of action. This discussion focuses on the Cavalry troops","rect":[90.0,637.203857421875,522.1606338624954,628.1502075195313]},{"page":34,"text":"of the BCT organizational variants of the ABCT, the IBCT, and the SBCT.","rect":[90.0,648.7276000976563,390.206369638443,639.6739501953125]},{"page":34,"text":"TROOP MISSIONS","rect":[72.0,669.9822387695313,158.51178550720216,661.89599609375]},{"page":34,"text":"1-84. Regardless of organization, Cavalry troops conduct reconnaissance and security missions to support","rect":[90.0,689.9814453125,522.0979205379487,680.9277954101563]},{"page":34,"text":"the information collection plan outlined in Annex L of the BCT’s operation order (OPORD). Cavalry troops","rect":[90.0,701.505126953125,522.1564224367141,692.4514770507813]},{"page":34,"text":"1-22","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":34,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":34,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":35,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":35,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":35,"text":"can develop the situation in close contact with civilian populations. They can conduct security force","rect":[108.0,83.50144958496094,540.1059558372498,74.44780731201172]},{"page":35,"text":"assistance, and multinational reconnaissance and security tasks.","rect":[108.0,95.02519226074219,362.4064733982086,85.97154998779297]},{"page":35,"text":"1-85. Cavalry troops can perform limited offensive and defensive tasks though they typically support","rect":[108.0,112.42527770996094,540.0152179012299,103.37163543701172]},{"page":35,"text":"higher-level offensive and defensive task completion through reconnaissance and security missions. The","rect":[108.0,123.94902038574219,540.110899684906,114.89537811279297]},{"page":35,"text":"commander considers the troop’s capabilities and limitations before employing the troop in any specific","rect":[107.99003601074219,135.4727020263672,540.0936877708435,126.41905975341797]},{"page":35,"text":"mission.","rect":[107.99004364013672,144.98452758789063,141.555246591568,137.9427947998047]},{"page":35,"text":"ROLES AND ORGANIZATION","rect":[90.0,168.28799438476563,227.75108432769776,159.99600219726563]},{"page":35,"text":"1-86. As the squadron commander’s eyes and ears, the Cavalry troop is the squadron commander’s primary","rect":[108.0,188.2613983154297,540.0551342964172,179.20774841308595]},{"page":35,"text":"reconnaissance and information collection asset. Reconnaissance units provide the combat information the","rect":[108.0,199.7652130126953,540.0957019309998,190.7314910888672]},{"page":35,"text":"commander needs to conduct informed planning, direct operations, and visualize the area of operations. The","rect":[107.98999786376953,211.30882263183595,540.0900866966248,202.2551727294922]},{"page":35,"text":"unit skillfully conducts reconnaissance and security missions to collect information on enemy locations,","rect":[107.99004364013672,222.8325653076172,540.1008398532867,213.77891540527345]},{"page":35,"text":"dispositions, compositions, and battle damage assessments. In turn, these operations allow the commander","rect":[107.99004364013672,234.2367401123047,540.0719900712967,225.18309020996095]},{"page":35,"text":"to shape the area of operations proactively and accept or initiate contact at times and places of the","rect":[107.99003601074219,245.76048278808595,540.1517322044373,236.7068328857422]},{"page":35,"text":"commander’s choosing.","rect":[107.99003601074219,257.2842102050781,203.5990698337555,248.23057556152345]},{"page":35,"text":"1-87. Cavalry troops conduct reconnaissance and security missions throughout the squadron area of","rect":[107.99003601074219,274.8038024902344,540.0628958330154,265.75018310546877]},{"page":35,"text":"operations. The troop develops the situation by focusing on the reconnaissance objective in a designated area","rect":[107.99003601074219,286.3275451660156,540.0978381614685,277.2639465332031]},{"page":35,"text":"of operations. All types of troops can do this through the task organization of additional combat power to","rect":[107.99003601074219,297.85125732421877,539.8831372261047,288.7976379394531]},{"page":35,"text":"provide the ability to fight for information and increase lethality in security operations. The task organization","rect":[107.98999786376953,309.2554626464844,540.0471386909485,300.20184326171877]},{"page":35,"text":"of tank platoons to an ABCT Cavalry troop allows the use of the hunter-killer concept for reconnaissance","rect":[107.99004364013672,320.7792053222656,540.0976550559998,311.7255859375]},{"page":35,"text":"and security. An SBCT Cavalry troop can receive similar augmentation from antiarmor platoons from the","rect":[107.98008728027344,332.3028869628906,540.0648181419373,323.249267578125]},{"page":35,"text":"SBCT weapons troop.","rect":[107.98008728027344,343.8067321777344,196.6280767917633,334.94232177734377]},{"page":35,"text":"COMMON CAPABILITIES AND LIMITATIONS","rect":[90.0,363.0480041503906,302.97907066345217,354.7560119628906]},{"page":35,"text":"1-88.","rect":[108.0,380.98956298828127,128.96579957008363,374.14703369140627]},{"page":35,"text":"All types of BCT Cavalry troops have the following capabilities:","rect":[133.1988067626953,383.0213928222656,392.16377747154237,373.9677734375]},{"page":35,"text":" Provide all-weather, continuous, accurate, and timely information through the combined use of","rect":[133.1999969482422,396.4613952636719,540.0324392900467,387.40777587890627]},{"page":35,"text":"long-range advanced scout surveillance systems, UASs, and mounted and dismounted scouts.","rect":[151.1999969482422,408.1046447753906,525.2100927829742,399.051025390625]},{"page":35,"text":" Gather information about enemy threats.","rect":[133.1999969482422,421.5413818359375,313.76713013648989,412.4877624511719]},{"page":35,"text":" Rapidly develop the situation and direct reconnaissance tasks to answer PIRs.","rect":[133.1999969482422,434.98138427734377,461.846506357193,425.9277648925781]},{"page":35,"text":" Overcome enemy deception and cover and concealment by employing integrated information","rect":[133.1999969482422,448.5413818359375,539.9576001167297,439.4877624511719]},{"page":35,"text":"collection and reconnaissance and surveillance systems.","rect":[151.1999969482422,460.0650939941406,375.12281250953677,451.011474609375]},{"page":35,"text":" Employ joint fires to include the fires support team, weapons locating radar, and UASs.","rect":[133.1999969482422,473.5013732910156,501.68458008766177,464.4377746582031]},{"page":35,"text":" Conduct stealthy reconnaissance or fight for information against light and motorized forces or, if","rect":[133.1999969482422,486.9413757324219,540.0724783525467,477.88775634765627]},{"page":35,"text":"reinforced, against armored forces.","rect":[151.1999969482422,498.5846252441406,290.86707520484927,489.531005859375]},{"page":35,"text":" Reduce risk and enhance survivability by providing information that allows the squadron to avoid","rect":[133.1999969482422,512.0214233398438,540.0634350776672,502.9677734375]},{"page":35,"text":"contact or achieve a combat power advantage if contact is necessary.","rect":[151.1999969482422,523.5451049804688,426.36915040016177,514.491455078125]},{"page":35,"text":" Assist in shaping the area of operations by providing information or directing fires to disrupt theenemy.","rect":[133.1999969482422,536.9813842773438,540.090158700943,527.927734375]},{"page":35,"text":"1-89. BCT Cavalry troops can have the following limitations, which can be mitigated with careful","rect":[107.99346923828125,554.5010375976563,540.0922442684174,545.4473876953125]},{"page":35,"text":"employment or augmentation:","rect":[107.99347686767578,566.0247802734375,228.6010943660736,556.9711303710938]},{"page":35,"text":" When there are limited dismounts within the scout sections, sections may have to combine to","rect":[133.1999969482422,579.46142578125,540.0644726753235,570.4077758789063]},{"page":35,"text":"generate the required dismounts to conduct the following:","rect":[151.1999969482422,591.1046752929688,382.5667926082611,582.051025390625]},{"page":35,"text":" Long-duration observation posts.","rect":[151.1999969482422,605.1414184570313,301.5265600681305,596.0877685546875]},{"page":35,"text":" Long-duration screening.","rect":[151.1999969482422,619.1814575195313,270.32984375953677,610.1278076171875]},{"page":35,"text":" Dismounted tasks associated with zone, area, or route reconnaissance.","rect":[151.1999969482422,631.20947265625,449.41089844703677,624.1677856445313]},{"page":35,"text":" Limited direct fire standoff, lethality, and survivability (IBCT Cavalry squadron).","rect":[133.1999969482422,646.6614379882813,478.043527841568,637.6077880859375]},{"page":35,"text":" Require augmentation to perform technical engineer reconnaissance tasks.","rect":[133.1999969482422,660.1014404296875,448.178293466568,651.0477905273438]},{"page":35,"text":" Speed of movement is generally equal to that of the main body, making it challenging to stay","rect":[133.1999969482422,673.6614379882813,539.990620136261,664.6077880859375]},{"page":35,"text":"ahead while on the march.","rect":[151.1999969482422,683.1731567382813,256.54191040992739,676.1314697265625]},{"page":35,"text":" Limited counter-UAS assets and communications jamming.","rect":[133.1999969482422,698.6213989257813,390.68616700172427,689.5578002929688]},{"page":35,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":35,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":35,"text":"1-23","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":36,"text":"Chapter 1","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":36,"text":"ARMORED COMPANY","rect":[72.0,85.27651977539063,222.51160531425476,75.57487487792969]},{"page":36,"text":"1-90. The ABCT Cavalry squadron has an organic Armored company. The Armored company is comprised","rect":[90.0,105.58140563964844,522.0638012886047,96.52776336669922]},{"page":36,"text":"of a headquarters and three tank platoons that organize, equip, and train to fight with organic assets or as a","rect":[90.00995635986328,117.10514831542969,521.867979763031,108.05150604248047]},{"page":36,"text":"task organized company team. The headquarters element has two tanks commanded by the commander and","rect":[90.00995635986328,128.6288299560547,522.0747265815735,119.57512664794922]},{"page":36,"text":"executive officer.","rect":[90.01000213623047,138.02114868164063,160.07158875465394,130.9794158935547]},{"page":36,"text":"1-91. The Armored company’s mission is to close with the enemy utilizing maneuver to destroy or capture the","rect":[90.00996398925781,157.5526580810547,521.985167263031,148.49900817871095]},{"page":36,"text":"enemy, repel the enemy’s assault by fire, and engage in close combat and counterattack. The company","rect":[90.0,169.07640075683595,522.209125995636,160.0227508544922]},{"page":36,"text":"maneuvers in all types of terrain, weather, and visibility conditions. The company capitalizes on long-range,","rect":[90.0,180.6001434326172,522.0976660251617,171.54649353027345]},{"page":36,"text":"direct fire combat with enemy mechanized or armored units in open terrain with speed and shock effect.","rect":[90.0,192.1238250732422,496.7902319431305,183.07017517089845]},{"page":36,"text":"1-92. The Armored company in the Cavalry squadron enables reconnaissance and security. It provides the","rect":[90.0,209.6434783935547,522.0977771263123,200.58982849121095]},{"page":36,"text":"BCT commander with flexibility, adaptability, and depth to the Cavalry squadron’s scheme of maneuver by","rect":[89.99999237060547,221.04771423339845,522.1696362495422,211.9940643310547]},{"page":36,"text":"synchronizing and integrating combined arms. The Armored company enables the squadron to fight for","rect":[89.99999237060547,232.57139587402345,522.0986624345779,223.5177459716797]},{"page":36,"text":"information and develop the situation in and out of contact against a broad range of threats, adversaries, and enemies.","rect":[90.00997161865235,244.0951385498047,521.863596200943,235.04148864746095]},{"page":36,"text":"CAPABILITIES","rect":[72.0,265.3680114746094,141.95474815368653,257.0760192871094]},{"page":36,"text":"1-93. The Armored company has the following capabilities:","rect":[90.0,285.3414001464844,331.2092486629486,276.28778076171877]},{"page":36,"text":" Conducts operations requiring firepower, mobility, armor protection, and shock effect.","rect":[115.19999694824219,298.7814025878906,479.60596680641177,289.727783203125]},{"page":36,"text":" Employs a combination of fire and maneuver to destroy enemy tanks, fighting vehicles, antiarmor","rect":[115.19999694824219,312.3414001464844,522.0773611650467,303.28778076171877]},{"page":36,"text":"systems, and emplacements.","rect":[133.1999969482422,323.8651123046875,246.58362793922425,314.8114929199219]},{"page":36,"text":"LIMITATIONS","rect":[72.0,345.1422119140625,139.1790828704834,337.0559997558594]},{"page":36,"text":"1-94.","rect":[90.0,363.1294860839844,110.96579957008362,356.26702880859377]},{"page":36,"text":"The Armored company has the following limitations:","rect":[115.19880676269531,365.1413879394531,328.5608416805267,356.0877685546875]},{"page":36,"text":" Lack of resources to operate a functional command post.","rect":[115.19999694824219,378.5614929199219,360.209299325943,369.52777099609377]},{"page":36,"text":" Very high consumption rate of classes III, V, and IX (petroleum, oil, and lubricants/ammunition/","rect":[115.19999694824219,392.1413879394531,522.1259967098237,383.0877685546875]},{"page":36,"text":"repair parts and components for equipment maintenance).","rect":[133.19998168945313,403.64520263671877,364.05286622047427,394.6114807128906]},{"page":36,"text":" Dependency on logistics packages (LOGPACs) from the forward support company (FSC) to","rect":[115.19999694824219,417.10137939453127,521.9680371284485,408.0477600097656]},{"page":36,"text":"maintain continuous operations.","rect":[133.1999969482422,428.6051940917969,261.20789551734927,419.57147216796877]},{"page":36,"text":" Limited recovery assets across the squadron.","rect":[115.19999694824219,442.0614013671875,312.20411133766177,433.0077819824219]},{"page":36,"text":"WEAPONS TROOP","rect":[72.0,467.4906005859375,196.13328006458284,457.7749328613281]},{"page":36,"text":"1-95. The SBCT Cavalry squadron has an organic weapons troop. The SBCT weapons troop’s role is to","rect":[90.0,487.7814025878906,521.882954120636,478.727783203125]},{"page":36,"text":"provide direct fires to facilitate maneuver. The formation adds depth to the Cavalry squadron by enhancing","rect":[90.0,499.30511474609377,522.0360913276672,490.2514953613281]},{"page":36,"text":"maneuver to deliver direct fires at the decisive point. Employed correctly and synchronized with other","rect":[90.0,510.7093200683594,522.2312918291092,501.65570068359377]},{"page":36,"text":"maneuver units, they facilitate the Cavalry squadron’s ability to conduct effective reconnaissance and","rect":[90.00995635986328,522.2330932617188,522.0820508003235,513.179443359375]},{"page":36,"text":"security operations.","rect":[90.00995635986328,533.7567749023438,168.33838868141175,524.703125]},{"page":36,"text":"1-96. The SBCT weapons troop has antitank guided missile platoons. The troop has a headquarters section","rect":[90.00995635986328,551.2764282226563,521.926655292511,542.2227783203125]},{"page":36,"text":"with an assigned Infantry carrier vehicle. Habitual attachments include a fires support team with a fire support","rect":[90.01000213623047,562.8001708984375,522.1696368465424,553.7465209960938]},{"page":36,"text":"vehicle from the field artillery battalion to manage indirect fires and medics with a medical support vehicle.","rect":[90.00995635986328,574.3239135742188,520.761057138443,565.270263671875]},{"page":36,"text":"1-97. The weapons troop in the Cavalry squadron enhances the reconnaissance and security capabilities of","rect":[90.00995635986328,591.7239990234375,521.9435721025467,582.6703491210938]},{"page":36,"text":"the Cavalry squadron. The weapons troop provides the BCT commander with flexibility, adaptability, and","rect":[90.00996398925781,603.2477416992188,522.0341382026672,594.194091796875]},{"page":36,"text":"depth so the squadron can fight for information and develop the situation against a broad range of threats,","rect":[90.00996398925781,614.7714233398438,522.0499365329742,605.7177734375]},{"page":36,"text":"adversaries, and enemies throughout the area of operations.","rect":[90.00996398925781,626.2951049804688,327.57691407203677,617.241455078125]},{"page":36,"text":"CAPABILITIES","rect":[72.0,647.5680541992188,141.95474815368653,639.2760009765625]},{"page":36,"text":"1-98. The weapons troop has the following capabilities:","rect":[90.0,667.5414428710938,314.6467486629486,658.48779296875]},{"page":36,"text":" The SBCT antiarmor platoon engages the enemy through long-range, antiarmor fires and","rect":[115.19999694824219,680.9814453125,522.0603222846985,671.9277954101563]},{"page":36,"text":"maneuvers to destroy or to repel assaults by fire and counterattack.","rect":[133.1999969482422,692.505126953125,400.64698243141177,683.4514770507813]},{"page":36,"text":" Many of the Stryker vehicles can be transported by C-130 and heavier aircraft.","rect":[115.19999694824219,705.94140625,447.928049325943,696.8877563476563]},{"page":36,"text":"1-24","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":36,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":36,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":37,"text":"Cavalry Organizations and","rect":[426.47998046875,46.28102493286133,540.0995859375,37.8480224609375]},{"page":37,"text":"the Operational Environment","rect":[416.5169982910156,56.487022399902347,539.9907133789062,48.1710205078125]},{"page":37,"text":" The TOW system provides direct fire against armored targets out to 4,500 meters and bunkers out","rect":[133.1999969482422,83.38139343261719,540.0146075496674,74.32775115966797]},{"page":37,"text":"to 3,000 meters.","rect":[151.1999969482422,93.0127182006836,215.72886109352113,86.15027618408203]},{"page":37,"text":"LIMITATIONS","rect":[90.0,118.34220886230469,157.1790828704834,110.25601196289063]},{"page":37,"text":"1-99.","rect":[108.0,136.20944213867188,128.96579957008363,129.3470001220703]},{"page":37,"text":"The weapons troop has the following limitations:","rect":[133.1988067626953,138.2213592529297,329.8878375301361,129.16770935058595]},{"page":37,"text":" Lack of resources to operate a functional command post.","rect":[133.1999969482422,151.6414337158203,378.209299325943,142.6077117919922]},{"page":37,"text":" By design, the Stryker family of vehicles does not have the level of protection necessary to fight","rect":[133.1999969482422,165.2213592529297,540.1312457332612,156.16770935058595]},{"page":37,"text":"against heavily armored vehicles.","rect":[151.1999969482422,176.74510192871095,284.9687292575836,167.6914520263672]},{"page":37,"text":" The antitank guided missile variant must rely on their mobility and maneuverability, in coordination","rect":[133.1999969482422,190.18138122558595,540.0485424995422,181.1277313232422]},{"page":37,"text":"with other units, to effectively engage targets and then displace.","rect":[151.19004821777345,201.8246307373047,406.39917969703677,192.77098083496095]},{"page":37,"text":"SCOUT PLATOON","rect":[90.0,227.13058471679688,211.034615568161,217.41490173339845]},{"page":37,"text":"1-100. The fundamental role of the scout platoon is to conduct aggressive reconnaissance to satisfy the","rect":[108.0,247.42137145996095,539.9413440208435,238.3677215576172]},{"page":37,"text":"battalion and brigade CCIRs. The Cavalry troop commanders and the combined arms battalion commanders","rect":[108.0,258.8255310058594,540.0322158937454,249.7718963623047]},{"page":37,"text":"give missions to the scout platoons and the platoons progressively build situational awareness of the","rect":[108.0,270.3492736816406,540.1107165794373,261.295654296875]},{"page":37,"text":"commanders’ operational environments. The critical information the platoon provides enables the","rect":[108.0,281.8531188964844,540.0122058372498,272.81939697265627]},{"page":37,"text":"commander to develop situational understanding, make comprehensive plans and decisions, and direct","rect":[108.0,293.396728515625,540.1397906551362,284.3431091308594]},{"page":37,"text":"follow-on or future operations. Scout platoons of the combined arms battalion provide the link from forward","rect":[108.0,304.9005432128906,540.067036151886,295.8668212890625]},{"page":37,"text":"reconnaissance elements to the main body maneuver units.","rect":[108.0,316.44415283203127,343.0480444431305,307.3905334472656]},{"page":37,"text":"CBRN RECONNAISSANCE AND SURVEILLANCE PLATOON","rect":[90.0,341.7306213378906,485.97141366386418,332.01495361328127]},{"page":37,"text":"1-101. The CBRN reconnaissance and surveillance platoon in the IBCT provides dismounted CBRN","rect":[108.0,362.0014953613281,539.8857001056671,352.9677734375]},{"page":37,"text":"reconnaissance and surveillance and site assessments to protect the force and support offensive operations.","rect":[108.0,373.40570068359377,540.0600683689117,364.3719787597656]},{"page":37,"text":"They can execute missions in restrictive terrain and in dense urban and subterranean environments. The","rect":[108.0,384.9493103027344,540.0978991966248,375.89569091796877]},{"page":37,"text":"CBRN reconnaissance and surveillance platoon in support of the ABCT and SBCT provides early warning","rect":[108.0,396.4730224609375,540.0517773628235,387.4194030761719]},{"page":37,"text":"of CBRN hazards with the advantage of speed and protection offered by the nuclear, biological, chemical","rect":[107.99002838134766,407.99676513671877,540.0977374324799,398.9431457519531]},{"page":37,"text":"reconnaissance ","rect":[107.99002838134766,417.5085754394531,171.092600107193,410.46685791015627]},{"page":37,"text":"vehicle.","rect":[176.63433837890626,417.5085754394531,208.05018067359925,410.46685791015627]},{"page":37,"text":"While ","rect":[216.11578369140626,418.0,242.84643006324769,410.46685791015627]},{"page":37,"text":"conducting ","rect":[248.3941650390625,419.5204772949219,295.5228979587555,410.46685791015627]},{"page":37,"text":"reconnaissance ","rect":[300.95208740234377,418.0,363.923166513443,410.46685791015627]},{"page":37,"text":"operations, ","rect":[369.4708557128906,419.5005798339844,416.239084482193,410.46685791015627]},{"page":37,"text":"CBRN","rect":[421.78680419921877,417.5185241699219,448.7773932209015,410.63616943359377]},{"page":37,"text":"reconnaissance ","rect":[456.8240966796875,417.5085754394531,519.9266455173492,410.46685791015627]},{"page":37,"text":"and","rect":[525.474365234375,417.5085754394531,539.9372754096985,410.46685791015627]},{"page":37,"text":"surveillance platoons capitalize on their observation of NAIs to answer PIRs in addition to their CBRN","rect":[107.99998474121094,430.90478515625,540.0071600666046,421.8710632324219]},{"page":37,"text":"specific tasks.","rect":[107.99998474121094,442.4284973144531,164.01900696754456,433.394775390625]},{"page":37,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":37,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":37,"text":"1-25","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":38,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.21988892555239,375.853759765625]},{"page":39,"text":"Chapter 2","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":39,"text":"Threats","rect":[286.0799865722656,151.01559448242188,343.7945363883972,139.41265869140626]},{"page":39,"text":"The various actors in any area of operations can qualify as a threat, an enemy, an","rect":[126.0,188.85357666015626,504.0991015434265,178.81822204589845]},{"page":39,"text":"adversary, a neutral, or a friend. A threat is any combination of actors, entities, or forces","rect":[126.0,201.4501953125,504.12768986797337,191.4148406982422]},{"page":39,"text":"that have the capability and intent to harm United States forces, United States national","rect":[126.01104736328125,214.046875,503.99883800697327,204.0115203857422]},{"page":39,"text":"interests, or the homeland (ADP 3-0). Threats may include individuals, groups of ","rect":[126.01104736328125,226.76495361328126,506.76851439476016,216.72959899902345]},{"page":39,"text":"individuals (organized or not organized), paramilitary or military forces, nation-states,","rect":[126.0000228881836,239.361572265625,504.11668944358828,229.3262176513672]},{"page":39,"text":"or national alliances. Threats become enemies when they execute their capability to do","rect":[126.01103210449219,251.95819091796876,504.10905027389529,241.92283630371095]},{"page":39,"text":"harm to the United States.","rect":[126.01103210449219,262.46826171875,240.73099303245545,254.6409149169922]},{"page":39,"text":"An enemy is a party identified as hostile against which the use of force is authorized","rect":[126.01103210449219,287.3524475097656,504.1376757621765,277.31707763671877]},{"page":39,"text":"(ADP 3-0). An enemy is a combatant and therefore is treated as such.An adversary is","rect":[126.01103210449219,299.9490966796875,504.1089520750046,289.9137268066406]},{"page":39,"text":"a party acknowledged as potentially hostile to a friendly party and against which the","rect":[126.01107788085938,312.54571533203127,504.2373007545471,302.5103454589844]},{"page":39,"text":"use of force may be envisaged (JP 3-0). During offensive, defensive, and stability","rect":[126.01107788085938,325.2637939453125,504.1222949028015,315.2284240722656]},{"page":39,"text":"operations, a neutral is a party identified as neither supporting nor opposing friendly","rect":[126.01110076904297,337.8604431152344,504.118999004364,327.8250732421875]},{"page":39,"text":"or enemy forces (ADP 3-0). A hybrid threat is the diverse and dynamic combination","rect":[126.00006103515625,350.5785217285156,504.08802366256716,340.54315185546877]},{"page":39,"text":"of regular forces, irregular forces, terrorists, or criminal elements unified to achieve","rect":[125.97797393798828,363.1751708984375,503.977748752594,353.1398010253906]},{"page":39,"text":"mutually benefitting effects (ADP 3-0). (Refer to ADP 3-0 and JP 3-0 for more","rect":[125.97797393798828,375.77178955078127,504.06374728775026,365.7364196777344]},{"page":39,"text":"information.)","rect":[125.96696472167969,388.4678039550781,184.35751810741426,378.4544982910156]},{"page":39,"text":"SECTION I − UNDERSTANDING THE THREAT","rect":[99.36000061035156,412.4640197753906,357.7320244140625,403.4519958496094]},{"page":39,"text":"A peer threat is an adversary or enemy able to oppose U.S. forces worldwide effectively while enjoying","rect":[133.20240783691407,435.8214111328125,540.057514667511,426.7578125]},{"page":39,"text":"a position of relative advantage in a specific region. These threats can generate equal or temporarily superior","rect":[107.99364471435547,447.3451232910156,540.0747976884842,438.29150390625]},{"page":39,"text":"combat power in geographical proximity to a conflict area with U.S. forces. A peer threat also may have a","rect":[107.99364471435547,458.8688659667969,540.0983264427185,449.81524658203127]},{"page":39,"text":"cultural affinity to specific regions, providing them with relative advantages in terms of time, space, and","rect":[107.99368286132813,470.392578125,540.0615429878235,461.3389587402344]},{"page":39,"text":"sanctuary. They generate tactical, operational, and strategic challenges, an order of magnitude more","rect":[107.99368286132813,481.9162902832031,540.0903308372498,472.8626708984375]},{"page":39,"text":"challenging militarily than other adversaries. (Refer to ADP 3-0 for more information.)","rect":[107.99366760253906,493.32049560546877,456.54485994434358,484.2668762207031]},{"page":39,"text":"Note. Threat forces use the term electronic warfare, which differs from U.S. doctrine’s use of ","rect":[133.1999969482422,515.0,524.4668066501617,507.52777099609377]},{"page":39,"text":"electromagnetic warfare. Electronic warfare consists of the measure’s threats conduct to control","rect":[133.1999969482422,528.1013793945313,522.1409503231049,519.0477294921875]},{"page":39,"text":"or deny friendly use of the electromagnetic spectrum, while ensuring its use by the threat. For U.S.","rect":[133.1999969482422,539.6251220703125,522.105295419693,530.5714721679688]},{"page":39,"text":"forces, electromagnetic warfare is military action involving the use of electromagnetic and","rect":[133.1999969482422,551.1488647460938,522.051411151886,542.09521484375]},{"page":39,"text":"directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-85).","rect":[133.20001220703126,562.6725463867188,489.927316904068,553.618896484375]},{"page":39,"text":"Understanding threats, enemies, and adversaries, to include both state and nonstate actors in the context","rect":[133.20240783691407,594.8214111328125,540.1441241512299,585.7677612304688]},{"page":39,"text":"of the operational environment, is essential for the BCT commander to understand, visualize, describe, direct,","rect":[108.01355743408203,606.3251953125,540.1112158298492,597.29150390625]},{"page":39,"text":"lead, and assess operations. To develop and maintain estimates of the situation as the basis for continuous","rect":[108.01355743408203,617.848876953125,540.1312759523391,608.815185546875]},{"page":39,"text":"adaptation, commanders and staffs consider their own forces in the context of threats, enemies, and","rect":[108.01355743408203,629.3726196289063,540.0893139839172,620.3389282226563]},{"page":39,"text":"adversaries as well as the mission, terrain, friendly forces, and civilian populations. The BCT must be","rect":[108.0135726928711,640.9163208007813,540.0426623802185,631.8626708984375]},{"page":39,"text":"prepared to engage in close combat with adaptive enemies and adversaries while operating in complex terrain","rect":[108.0135726928711,652.3204956054688,540.2160840034485,643.266845703125]},{"page":39,"text":"and among civilian populations. Actors in the operational environment may include regular or irregular","rect":[108.0135726928711,663.8441772460938,540.2187796220779,654.79052734375]},{"page":39,"text":"forces, or agents of—","rect":[108.0036392211914,675.367919921875,194.7652063369751,666.32421875]},{"page":39,"text":" Other nation-states.","rect":[133.1999969482422,686.7794799804688,229.51946473121644,679.727783203125]},{"page":39,"text":" Political parties and officials.","rect":[133.1999969482422,702.2014770507813,268.40226197242739,693.1677856445313]},{"page":39,"text":" Transnational criminal organizations.","rect":[133.1999969482422,715.7814331054688,300.81009888648989,706.727783203125]},{"page":39,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":39,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":39,"text":"2-1","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":40,"text":"Chapter 2","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":40,"text":"","rect":[115.19999694824219,80.6611099243164,121.2058769197464,75.93359375]},{"page":40,"text":"","rect":[115.19999694824219,94.22110748291016,121.2058769197464,89.49359130859375]},{"page":40,"text":"","rect":[115.19999694824219,107.6611099243164,121.2058769197464,102.93359375]},{"page":40,"text":"","rect":[115.19999694824219,121.22110748291016,121.2058769197464,116.49359130859375]},{"page":40,"text":"","rect":[115.19999694824219,134.66111755371095,121.2058769197464,129.93359375]},{"page":40,"text":"Media.","rect":[133.1999969482422,81.36946868896485,161.25432801246644,74.32775115966797]},{"page":40,"text":"Indigenous governmental security forces.","rect":[133.1999969482422,96.94139099121094,298.763986825943,87.88774871826172]},{"page":40,"text":"International and private security organizations.","rect":[133.1999969482422,110.38139343261719,324.567453622818,101.32775115966797]},{"page":40,"text":"Multinational corporations.","rect":[133.1999969482422,123.92147064208985,242.7221167087555,114.88774871826172]},{"page":40,"text":"Joint, interagency, international, governmental, and nongovernmental organizations.","rect":[133.1999969482422,137.3813934326172,470.73438477516177,128.32774353027345]},{"page":40,"text":"Current and future combat operations require the BCT to fight and win in large-scale combat operations","rect":[115.202392578125,155.0214080810547,522.1729629640579,145.96775817871095]},{"page":40,"text":"and limited contingency operations in various types of environments. These environments may be","rect":[90.00360107421875,166.4255828857422,522.0635974388123,157.37193298339845]},{"page":40,"text":"mountainous, urban, jungle, desert, arctic, Antarctic, or subterranean environments. Besides the physical","rect":[90.00360107421875,177.94932556152345,522.0147296199799,168.88572692871095]},{"page":40,"text":"challenges presented by complex terrain, the continuous interactions of numerous threats, each with their","rect":[90.01355743408203,189.4730682373047,522.0913382158279,180.41941833496095]},{"page":40,"text":"own ","rect":[90.01359558105469,199.0,109.78319764137268,193.0]},{"page":40,"text":"agendas, ","rect":[115.33091735839844,200.9967498779297,152.621164560318,191.94309997558595]},{"page":40,"text":"objectives, ","rect":[158.16888427734376,200.9967498779297,203.61832642555238,191.9331512451172]},{"page":40,"text":"interests, ","rect":[209.16604614257813,199.0,247.41637635231019,191.94309997558595]},{"page":40,"text":"and ","rect":[252.96409606933595,199.0,269.9738256931305,191.94309997558595]},{"page":40,"text":"allegiances, ","rect":[275.52154541015627,200.9967498779297,324.93216919898989,191.94309997558595]},{"page":40,"text":"influence ","rect":[330.47991943359377,199.0,370.29004883766177,191.94309997558595]},{"page":40,"text":"the ","rect":[375.8377685546875,199.0,390.56763672828677,191.94309997558595]},{"page":40,"text":"operational ","rect":[395.99786376953127,200.97682189941407,443.60669922828677,191.94309997558595]},{"page":40,"text":"environment ","rect":[449.1544189453125,199.0,502.16358399391177,191.94309997558595]},{"page":40,"text":"and","rect":[507.7113037109375,199.0,522.1712231636047,191.94309997558595]},{"page":40,"text":"mission accomplishment.","rect":[90.01359558105469,212.5005645751953,191.74801087379456,203.4668426513672]},{"page":40,"text":"The human and political dynamics in a peer or near peer fight increases the complexity of BCT","rect":[115.20240783691406,228.94139099121095,521.9837533826828,219.8877410888672]},{"page":40,"text":"operations. Commanders and staffs work to understand the complex relationships and interactions between","rect":[90.01359558105469,240.44520568847657,522.0923047065735,231.41148376464845]},{"page":40,"text":"threats that produce tactical challenges and opportunities in their favor. Understanding a peer or near peer","rect":[90.01359558105469,251.9888153076172,522.0963430986404,242.93516540527345]},{"page":40,"text":"threat is critical to seizing, retaining, and exploiting each echelon in deep operations to consolidate tactical","rect":[90.01359558105469,263.5125427246094,521.9020587215424,254.4589080810547]},{"page":40,"text":"gains to achieve sustainable outcomes consistent with the mission.","rect":[90.00360107421875,275.0362854003906,355.7702429294586,265.982666015625]},{"page":40,"text":"Nation-states organize, train, equip, and employ regular forces to defeat an enemy’s armed forces,","rect":[115.20240783691406,291.4613952636719,522.0944921970367,282.40777587890627]},{"page":40,"text":"destroy an enemy’s war-making capacity, seize territory, and defend territory. Regular forces often possess","rect":[90.00360870361328,302.985107421875,521.9481094484329,293.9314880371094]},{"page":40,"text":"technologically advanced weapon systems that can match the capabilities of U.S. forces’ weapons systems.","rect":[90.00360870361328,314.5088195800781,521.959787607193,305.4552001953125]},{"page":40,"text":"These weapon systems are integrated into mechanized or motorized combined arms formations as well as","rect":[90.00360107421875,326.0325622558594,522.0037124757766,316.97894287109377]},{"page":40,"text":"light infantry forces. BCTs are prepared to defeat enemy forces that include armored fighting vehicles,","rect":[90.00360107421875,337.4367370605469,522.0676367282867,328.38311767578127]},{"page":40,"text":"antiarmor systems, air defense systems, manned and unmanned aircraft, indirect fire systems, mines, digital","rect":[90.00360107421875,348.9604797363281,522.1313067684174,339.9068603515625]},{"page":40,"text":"communications systems, and cyberspace and electromagnetic warfare activities. (Refer to JP 3-85 for more","rect":[90.00360107421875,360.48419189453127,522.1002795677185,351.4305725097656]},{"page":40,"text":"information.) Regular forces also may possess CBRN capabilities and may have access to space capabilities.","rect":[89.99364471435547,372.0079040527344,521.9936621189117,362.95428466796877]},{"page":40,"text":"Regular forces’ organizations are hierarchical (for example, companies, battalions, brigades, and so forth)","rect":[89.99366760253906,383.5316467285156,521.9521780595779,374.47802734375]},{"page":40,"text":"with a generally centralized command and control structure. Regular forces can conduct long-term","rect":[89.99366760253906,394.9358215332031,521.9389435062409,385.8822021484375]},{"page":40,"text":"campaigns and employ combinations of conventional and unconventional tactics. Examples of regular","rect":[89.99364471435547,406.4595642089844,521.9677420244217,397.40594482421877]},{"page":40,"text":"forces include—","rect":[89.99364471435547,416.0,157.0742425918579,408.9296569824219]},{"page":40,"text":" People’s Liberation Army (PLA) of China.","rect":[115.19999694824219,431.3813781738281,305.4860327243805,422.3277587890625]},{"page":40,"text":" Russian Army.","rect":[115.19999694824219,444.9413757324219,193.16416382789613,435.88775634765627]},{"page":40,"text":" North Korean People’s Army.","rect":[115.19999694824219,458.3813781738281,253.7687475681305,449.3277587890625]},{"page":40,"text":" Islamic Republic of Iran Army.","rect":[115.19999694824219,471.9413757324219,259.0495398044586,462.88775634765627]},{"page":40,"text":"Note. Near peer threat comparison of the People’s Liberation Army combined arms brigade","rect":[115.20227813720703,495.2214050292969,504.11309695053105,486.16778564453127]},{"page":40,"text":"organization structure resembles that of a U.S. Army BCT to include the organic reconnaissance","rect":[115.19999694824219,506.74139404296877,503.9706103782654,497.6877746582031]},{"page":40,"text":"force. (Refer to ATP 7-100.3 for more information.) ","rect":[115.1900405883789,518.2451782226563,326.5920202732086,509.21148681640627]},{"page":40,"text":"Enemy threat organizations employ conventional, unconventional, and terrorist tactics and methods to","rect":[115.20240783691406,541.4214477539063,522.0605664253235,532.3677978515625]},{"page":40,"text":"achieve their strategic goals and political aims. Nontraditional threats combine regular and irregular threats","rect":[89.99364471435547,552.9451293945313,522.1580703859329,543.8914794921875]},{"page":40,"text":"or criminal elements unified (or allied) to achieve mutually benefitting effects. Additional threats may include","rect":[90.0036392211914,564.4688720703125,522.1112048606873,555.4152221679688]},{"page":40,"text":"nation-states that employ regular as well as proxy forces. Conventional threats can operate under a centralized","rect":[90.0036392211914,575.9925537109375,522.0783886909485,566.9389038085938]},{"page":40,"text":"or decentralized command and control structure.","rect":[90.00360107421875,585.5043334960938,283.892893075943,578.462646484375]},{"page":40,"text":"IRREGULAR FORCES","rect":[72.0,612.810546875,218.04969395828247,603.0808715820313]},{"page":40,"text":"Irregular forces are armed individuals or groups who are not members of the regular armed forces,","rect":[115.20240783691406,632.9813842773438,522.0387060642242,623.927734375]},{"page":40,"text":"police, or other internal security forces. Irregular forces employ unconventional, asymmetric methods to","rect":[89.99364471435547,644.505126953125,522.0636792182922,635.4514770507813]},{"page":40,"text":"counter U.S. advantages. Unconventional methods may include terrorism, tactics, and guerrilla warfare.","rect":[89.99364471435547,656.0288696289063,522.1012670993805,646.9752197265625]},{"page":40,"text":"Weaker enemy organizations often use unconventional methods to exhaust the United States collective will","rect":[89.99364471435547,667.5525512695313,522.0406085262299,658.4989013671875]},{"page":40,"text":"through protracted conflict. They usually employ sophisticated strategies that combine economic, political,","rect":[89.99364471435547,679.0762939453125,522.0626318454742,670.0226440429688]},{"page":40,"text":"and informational initiatives to subvert U.S. partners, strengthen their own organizations, and disrupt","rect":[89.99364471435547,690.6000366210938,522.0006304988862,681.54638671875]},{"page":40,"text":"U.S. efforts to accomplish their mission. Irregular forces or complex threats are often combinations of ","rect":[89.9936294555664,702.0042114257813,524.5118505954742,692.9505615234375]},{"page":40,"text":"2-2","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":40,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":40,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":41,"text":"Threats","rect":[507.47998046875,44.4990234375,540.0834067382813,37.956024169921878]},{"page":41,"text":"paramilitaries, guerillas, and criminal organizations and networks. Irregular forces often work in concert with","rect":[108.0,83.50144958496094,540.0637402534485,74.44780731201172]},{"page":41,"text":"regular forces to support their objectives.","rect":[108.00001525878906,95.02519226074219,272.36988282203677,85.96158599853516]},{"page":41,"text":"Irregular forces or complex threats usually have political objectives motivated by ideologies or","rect":[133.20240783691407,112.42137145996094,540.0825491533279,103.3577651977539]},{"page":41,"text":"grievances. These grievances may be real or perceived. Identifying their objectives and motivations is often","rect":[108.00360107421875,123.94511413574219,540.047504901886,114.88150787353516]},{"page":41,"text":"difficult because—","rect":[108.00360107421875,133.45687866210938,184.4466028213501,126.41515350341797]},{"page":41,"text":" There may be multiple untraditional threats groups with differing goals and motivations.","rect":[133.1999969482422,148.9014129638672,505.17130494117739,139.84776306152345]},{"page":41,"text":" Leaders change and the organization’s goals shift over time.","rect":[133.1999969482422,162.46141052246095,392.006906747818,153.4077606201172]},{"page":41,"text":" Movement leaders may have different motivations from their followers.","rect":[133.1999969482422,175.9014129638672,438.6784155368805,166.84776306152345]},{"page":41,"text":" Organizations hide their true motivations and make false claims.","rect":[133.1999969482422,189.46141052246095,409.1700232028961,180.4077606201172]},{"page":41,"text":"Irregular forces customarily operate in small, dispersed, decentralized formations or cells (team and","rect":[133.202392578125,206.98143005371095,540.0716137886047,197.9277801513672]},{"page":41,"text":"squad size) within a decentralized command and control structure while retaining the ability to concentrate","rect":[108.00360107421875,218.5051727294922,539.9638659934998,209.45152282714845]},{"page":41,"text":"forces if they perceive weakness. They establish local, regional, and worldwide support networks. Irregular","rect":[108.00360107421875,230.0288543701172,540.1811819658279,220.97520446777345]},{"page":41,"text":"threats’ military capabilities often include small-arms weapons, antitank weapons, man-portable air defense","rect":[108.00360107421875,241.43309020996095,540.0992419700623,232.3794403076172]},{"page":41,"text":"missiles, mortars, short-range rockets, homemade radio frequency weapons, rudimentary robotics, UASs,","rect":[107.99360656738281,252.95677185058595,539.8154394626617,243.9031219482422]},{"page":41,"text":"and land mines. Some irregular threats possess significant financial means, including state sponsorship, and","rect":[107.99359893798828,264.4804992675781,540.060444355011,255.42686462402345]},{"page":41,"text":"can acquire advanced weapon systems and technologies. Irregular forces that have engaged in recent armed","rect":[108.0035629272461,276.0041809082031,540.2171216011047,266.9505615234375]},{"page":41,"text":"conflict include the—","rect":[108.0035629272461,285.5160217285156,195.24320316314698,278.47430419921877]},{"page":41,"text":"","rect":[133.1999969482422,298.2210998535156,139.2058769197464,293.49359130859377]},{"page":41,"text":"","rect":[133.1999969482422,311.6611022949219,139.2058769197464,306.93359375]},{"page":41,"text":"","rect":[133.1999969482422,325.2210998535156,139.2058769197464,320.49359130859377]},{"page":41,"text":"","rect":[133.1999969482422,338.6611022949219,139.2058769197464,333.93359375]},{"page":41,"text":"","rect":[133.1999969482422,352.2210998535156,139.2058769197464,347.49359130859377]},{"page":41,"text":"","rect":[133.1999969482422,365.6611022949219,139.2058769197464,360.93359375]},{"page":41,"text":"","rect":[133.1999969482422,379.2210998535156,139.2058769197464,374.49359130859377]},{"page":41,"text":"Revolutionary Army Forces of Columbia-People’s Army (1964).","rect":[151.1999969482422,300.9413757324219,411.6808874607086,291.88775634765627]},{"page":41,"text":"Mujahidin in Afghanistan (1979).","rect":[151.1999969482422,314.3813781738281,286.2884314060211,305.3177795410156]},{"page":41,"text":"Palestine Liberation Organization in the West Bank (2001).","rect":[151.1999969482422,327.9413757324219,389.492990732193,318.88775634765627]},{"page":41,"text":"Taliban in Afghanistan (2001).","rect":[151.1999969482422,341.3813781738281,275.0027868747711,332.3277587890625]},{"page":41,"text":"Al Qaeda in Iraq (2007).","rect":[151.1999969482422,354.9214782714844,249.92750000953675,345.88775634765627]},{"page":41,"text":"Islamic State in Iraq and the Levant (2013).","rect":[151.1999969482422,368.3614807128906,325.6683142185211,359.3277587890625]},{"page":41,"text":"Iran’s Quds Force support to nonstate threat in foreign countries.","rect":[151.1999969482422,381.9413757324219,410.6111853122711,372.88775634765627]},{"page":41,"text":"Note. Russia’s version of hybrid warfare is built for limited war in which nations do not pursue","rect":[133.2022705078125,405.2214050292969,522.0961291770935,396.16778564453127]},{"page":41,"text":"strategies of annihilation but instead seek to impose their political will without destroying the","rect":[133.1999969482422,416.74139404296877,522.0804431419373,407.6877746582031]},{"page":41,"text":"political institutions of their adversaries. Russian hybrid warfare is a byproduct of the information","rect":[133.1999969482422,428.2651062011719,522.070454120636,419.21148681640627]},{"page":41,"text":"age that seeks to operate in multiple domains to find methods to achieve a relative position of ","rect":[133.1999969482422,439.6693115234375,524.4655859470367,430.6156921386719]},{"page":41,"text":"advantage in relation to an adversary, or to perpetually conduct operations aimed at weakening","rect":[133.1999969482422,451.1930236816406,522.0147290229797,442.139404296875]},{"page":41,"text":"the adversary from the inside out. To do so, Russia leverages information, cyber, and electronic","rect":[133.1999969482422,462.7167663574219,522.0931384544373,453.66314697265627]},{"page":41,"text":"operations in addition to employing special operations forces to sow the seeds of discontent within","rect":[133.1999969482422,474.240478515625,522.073383808136,465.1868591308594]},{"page":41,"text":"the target population.","rect":[133.1999969482422,485.7641906738281,218.60799622535706,476.7105712890625]},{"page":41,"text":"Combat experiences in Afghanistan, Iraq, and other recent conflicts (such as those in Lebanon, Mali,","rect":[133.20265197753907,517.9014282226563,540.069895029068,508.8477783203125]},{"page":41,"text":"Syria, Gaza, Northern Nigeria, and Southern Thailand) reveal a migration of capabilities, tactics, and","rect":[108.00384521484375,529.4251098632813,540.0586743354797,520.3714599609375]},{"page":41,"text":"techniques previously associated only with military forces of nation-states to state-sponsored and nonstate","rect":[108.00383758544922,540.9488525390625,539.9769885520935,531.8952026367188]},{"page":41,"text":"threat organizations. This migration of capabilities presents BCTs with challenges that extend beyond","rect":[108.00383758544922,552.4725341796875,540.0666699409485,543.4188842773438]},{"page":41,"text":"defeating an enemy’s regular force. Threats combine regular and irregular warfare and include adopting","rect":[108.00387573242188,563.9962768554688,540.0898633003235,554.942626953125]},{"page":41,"text":"strategies, tactics, and techniques to evade and disrupt U.S. advantages and to gain tactical advantages within","rect":[108.00387573242188,575.5199584960938,539.958393573761,566.46630859375]},{"page":41,"text":"the physical, cognitive, informational, and political dimensions of armed conflict. As a result, the BCT must","rect":[108.00387573242188,586.9241943359375,540.1109210262299,577.8705444335938]},{"page":41,"text":"be prepared to assess the situation continuously and adapt to seize, retain, and exploit the initiative.","rect":[108.00387573242188,598.4479370117188,504.566232919693,589.394287109375]},{"page":41,"text":"STATE AND NONSTATE THREATS","rect":[90.0,623.7305908203125,320.8807944221497,614.0149536132813]},{"page":41,"text":"The BCT must prepare to defeat determined state and nonstate threats that combine conventional and","rect":[133.20265197753907,644.00146484375,540.0596508979797,634.9677734375]},{"page":41,"text":"unconventional tactics to avoid the U.S. forces’ strengths (such as mobility, long-range surveillance, and","rect":[108.00386047363281,655.5451049804688,539.9451489448547,646.491455078125]},{"page":41,"text":"precision fires capabilities) while attacking perceived vulnerabilities (such as the difficulty in distinguishing","rect":[108.00386047363281,667.06884765625,540.0390210151672,658.0151977539063]},{"page":41,"text":"the enemy from the civilian population). Threats combine a variety of means, including conventional","rect":[108.00386047363281,678.5925903320313,540.1426593074799,669.5389404296875]},{"page":41,"text":"combined arms operations, nontraditional tactics, political subversion, and information warfare, to","rect":[108.00386047363281,689.976806640625,540.071674823761,680.943115234375]},{"page":41,"text":"accomplish objectives and attack U.S. forces. Enemies and adversaries exploit perceived U.S. and coalition","rect":[108.00386047363281,701.5205078125,540.056782245636,692.4569091796875]},{"page":41,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":41,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":41,"text":"2-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":42,"text":"Chapter 2","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":42,"text":"military, political, social, economic, and information vulnerabilities as they seek to seize the initiative and","rect":[90.0,83.50144958496094,522.1118359565735,74.44780731201172]},{"page":42,"text":"dictate the terms and tempo of operations in their favor.","rect":[90.0,95.0052719116211,312.8082067966461,85.97154998779297]},{"page":42,"text":"Enemy organizations employ countermeasures to limit U.S. forces’ ability to develop the situation,","rect":[115.20264434814453,112.42137145996094,522.0556738376617,103.36772918701172]},{"page":42,"text":"avoid decisive engagements, and initiate contact under advantageous conditions. Enemy organizations","rect":[89.99390411376953,123.94511413574219,522.1556289796829,114.89147186279297]},{"page":42,"text":"employ technological countermeasures to reduce their signature on the battlefield and degrade U.S. forces’","rect":[89.99390411376953,135.4687957763672,521.9491263017654,126.41515350341797]},{"page":42,"text":"ability to detect, engage, and destroy them. Many hostile nation-states continue to procure conventional","rect":[89.9939193725586,146.99253845214845,522.1244097957612,137.9388885498047]},{"page":42,"text":"capabilities, such as armor and antiarmor, manned aircraft, and air defense systems, which are increasingly","rect":[89.9939193725586,158.5162811279297,522.0827832221985,149.46263122558595]},{"page":42,"text":"available to nonstate enemy organizations and enemy threats. Enemy forces also integrate emerging","rect":[89.9939193725586,170.0399627685547,522.0757031440735,160.98631286621095]},{"page":42,"text":"technologies, such as robotics, UAS, loitering munitions, cyber and electromagnetic spectrum technology,","rect":[89.99390411376953,181.4441375732422,522.0745947360992,172.39048767089845]},{"page":42,"text":"and nanotechnologies. Enemies and adversaries combine conventional and unconventional tactics to counter,","rect":[89.99390411376953,192.96788024902345,522.0977880954742,183.9142303466797]},{"page":42,"text":"evade, or disrupt U.S. forces’ efforts across the range of military operations.","rect":[89.99390411376953,204.4916229248047,394.7598669528961,195.43797302246095]},{"page":42,"text":"The BCT commander must understand the threat in the context of local conditions that affect the","rect":[115.20264434814453,219.97946166992188,522.130430934906,212.9277801513672]},{"page":42,"text":"mission. Such a contextualized understanding allows commanders to identify emerging opportunities to","rect":[90.00383758544922,233.5051727294922,521.982075214386,224.45152282714845]},{"page":42,"text":"seize, retain, and exploit the initiative.","rect":[90.00383758544922,245.00892639160157,242.7194311618805,235.97520446777345]},{"page":42,"text":"SECTION II − THREAT CAPABILITIES, TACTICS, AND TECHNIQUES","rect":[81.36000061035156,270.7079772949219,467.004,260.0639953613281]},{"page":42,"text":"Peer threats can employ resources across multiple domains to create lethal and nonlethal effects with","rect":[115.20264434814453,292.3013916015625,521.9793286323547,283.2477722167969]},{"page":42,"text":"operational significance throughout an operational environment. They seek to delay deployment of ","rect":[90.00384521484375,303.8251037597656,524.4442236423492,294.771484375]},{"page":42,"text":"U.S forces and inflict significant damage across multiple domains in a short period to achieve their goals","rect":[90.00384521484375,315.22930908203127,522.1095474367141,306.1756896972656]},{"page":42,"text":"before culminating. A peer threat uses various methods to employ their instruments of power to render","rect":[90.00384521484375,326.7530212402344,522.1345511064529,317.69940185546877]},{"page":42,"text":"U.S. military power irrelevant. (Refer to ADP 3-0 for more information.) Five broad methods, used in","rect":[90.00384521484375,338.2767639160156,522.0666089057922,329.22314453125]},{"page":42,"text":"combination by peer threats, include—","rect":[90.00383758544922,349.80047607421877,245.88781070709229,340.7468566894531]},{"page":42,"text":" Information warfare.","rect":[115.19999694824219,361.2095031738281,216.56519532203675,354.16778564453127]},{"page":42,"text":" Preclusion.","rect":[115.19999694824219,374.6495056152344,177.93035340309144,367.6077880859375]},{"page":42,"text":" Isolation.","rect":[115.19999694824219,388.2095031738281,170.7292730808258,381.16778564453127]},{"page":42,"text":" Sanctuary.","rect":[115.19999694824219,403.6614074707031,175.76903748512269,394.777099609375]},{"page":42,"text":" System warfare.","rect":[115.19999694824219,417.2214050292969,198.21787476539613,408.177734375]},{"page":42,"text":"Note. The People’s Liberation Army employment of system warfare supports the development of","rect":[115.20227813720703,440.5013732910156,503.95974641895296,431.44775390625]},{"page":42,"text":"several traditional military strategies, such as preclusion, isolation, and sanctuary throughout all","rect":[115.19999694824219,452.0213928222656,504.10912048912049,442.9677734375]},{"page":42,"text":"domains and at all levels of war. Preclusion is achieved by keeping enemy commanders and forces","rect":[115.20000457763672,463.54510498046877,504.0385330324173,454.4914855957031]},{"page":42,"text":"off balance through asymmetric means, such as deception and information warfare, while","rect":[115.20000457763672,475.0688171386719,503.97161745834355,466.01519775390627]},{"page":42,"text":"simultaneously denying them the use of wide geographic areas through long-range","rect":[115.19999694824219,486.4730224609375,504.09918093490605,477.4194030761719]},{"page":42,"text":"reconnaissance-strike capabilities.","rect":[115.19999694824219,497.9768371582031,251.72570252418519,488.943115234375]},{"page":42,"text":"Peer and near peer threats can employ effects that include communications and navigation disruption","rect":[115.20264434814453,530.2614135742188,522.0696606636047,521.207763671875]},{"page":42,"text":"and partial or total loss of space capabilities. Developing and maintaining these capabilities requires extensive","rect":[90.0137939453125,541.78515625,522.1425769309998,532.7315063476563]},{"page":42,"text":"recruitment, training, and outsourcing of personnel with the required skill set to conduct such attacks.","rect":[90.0137939453125,553.3088989257813,495.81434082984927,544.2552490234375]},{"page":42,"text":"Enemy organizations employ tactical and technical countermeasures to counter U.S. operational and","rect":[115.20264434814453,570.701416015625,522.0907788276672,561.6477661132813]},{"page":42,"text":"tactical advantages. Tactical countermeasures include deception operations, dispersion, and concealment.","rect":[90.00384521484375,582.2251586914063,522.0985205173492,573.1715087890625]},{"page":42,"text":"The enemy employs technological countermeasures, such as cyberspace attacks, Global Positioning System","rect":[90.00387573242188,593.7488403320313,522.0656524906159,584.6951904296875]},{"page":42,"text":"jamming, and other forms of electromagnetic warfare. Technical countermeasures can be used to create a","rect":[90.00387573242188,605.2725830078125,522.1195056419373,596.208984375]},{"page":42,"text":"denied, degraded, and disrupted space-operating environment to evade and disrupt the U.S. forces’ ability to","rect":[90.00387573242188,616.7963256835938,522.057758808136,607.74267578125]},{"page":42,"text":"operate effectively.","rect":[90.00387573242188,628.2005004882813,167.26757264137269,619.1468505859375]},{"page":42,"text":"BCT commanders and staffs anticipate enemy capabilities. Commanders and staffs determine the","rect":[115.20264434814453,645.701416015625,522.0678088645935,636.6477661132813]},{"page":42,"text":"enemy’s capabilities across multiple domains or contested aspects of the mission including the physical,","rect":[90.00384521484375,657.2251586914063,522.0848486423492,648.1715087890625]},{"page":42,"text":"cognitive, and informational dimension. This allows the BCT commander and staff to request the proper","rect":[90.00384521484375,668.7488403320313,522.0466604814529,659.6951904296875]},{"page":42,"text":"enablers required to counter enemy capabilities and augment reconnaissance forces to enable early detection","rect":[90.00383758544922,680.2725830078125,522.130512714386,671.2189331054688]},{"page":42,"text":"of these threats.","rect":[90.00383758544922,689.7843627929688,153.10141968727113,682.74267578125]},{"page":42,"text":"2-4","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":42,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":42,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":43,"text":"Threats","rect":[507.47998046875,44.4990234375,540.0834067382813,37.956024169921878]},{"page":43,"text":"PHYSICAL DIMENSION","rect":[90.0,85.29055786132813,248.41610055351257,75.57487487792969]},{"page":43,"text":"Enemies operate within complex terrain to evade U.S. weapon systems and advanced, combined arms","rect":[133.20265197753907,105.58140563964844,540.0377700929641,96.52776336669922]},{"page":43,"text":"air-ground capabilities while trying to gain a tactical advantage. Even with regular forces, the enemy can","rect":[108.00383758544922,117.10514831542969,540.046772480011,108.05150604248047]},{"page":43,"text":"operate in and among populations to evade detection, preserve combat power, and retain freedom of ","rect":[107.98393249511719,128.6288299560547,542.5307714939117,119.57518768310547]},{"page":43,"text":"movement. The enemy looks to gain the same tactical advantages as U.S. forces such as control of key terrain","rect":[107.98393249511719,140.03306579589845,540.109760761261,130.9794158935547]},{"page":43,"text":"and the civil populous. ","rect":[107.9939193725586,151.5368194580078,201.6876471042633,142.5030975341797]},{"page":43,"text":"To achieve and maintain any tactical advantage, the enemy resorts to a multitude of tactics to include","rect":[133.20265197753907,169.06138610839845,540.0865466575623,160.0077362060547]},{"page":43,"text":"establishing relationships with local, regional, and transnational criminal organizations and contract military","rect":[108.00387573242188,180.5851287841797,539.9195141792297,171.53147888183595]},{"page":43,"text":"organizations to finance their operations and gain access to illicit trafficking networks for the movement of ","rect":[108.00387573242188,192.1088104248047,542.4773046970367,183.05516052246095]},{"page":43,"text":"weapons, munitions, people, narcotics, or money. The enemy also can use these organizations to conduct","rect":[108.00387573242188,203.63255310058595,539.9750567684174,194.5789031982422]},{"page":43,"text":"reconnaissance and early warning to preserve the combat power of regular forces.","rect":[107.9939193725586,215.03672790527345,435.08033204078677,205.9830780029297]},{"page":43,"text":"COGNITIVE AND INFORMATIONAL DIMENSION","rect":[90.0,240.33059692382813,418.6580896892548,230.6008758544922]},{"page":43,"text":"Enemies recognize the importance of public perception and its impact on the conduct of operations.","rect":[133.20265197753907,260.6213684082031,540.0598242282867,251.56773376464845]},{"page":43,"text":"The enemy attempts to influence the will of the American people, key allies, and the conflicting populations","rect":[108.00384521484375,272.1451110839844,540.1376846437454,263.09149169921877]},{"page":43,"text":"through enemy information activities and attacks on U.S. and allies’ assets at home or abroad. The enemy","rect":[108.00384521484375,283.6687927246094,540.036762714386,274.61517333984377]},{"page":43,"text":"uses information for effect. The enemy spreads misinformation, disinformation, and propaganda to shape","rect":[108.00383758544922,295.1925354003906,540.0549304466248,286.138916015625]},{"page":43,"text":"local and international public opinion and perception against the United States, host-nation, or coalition","rect":[108.00383758544922,306.71624755859377,540.0647168159485,297.6626281738281]},{"page":43,"text":"forces by undermining ongoing stabilization efforts, marginalizing friendly successes or exaggerating enemy","rect":[108.01383209228516,318.2399597167969,540.0756421089172,309.18634033203127]},{"page":43,"text":"successes, exploiting instances of friendly force missteps, and fabricating or exaggerating friendly force","rect":[108.01383209228516,329.6441650390625,540.1286609153748,320.5905456542969]},{"page":43,"text":"cultural shortcomings. Enemy organizations attempt to manipulate local, regional, and worldwide news and","rect":[108.01383209228516,341.1678771972656,540.0598950386047,332.1142578125]},{"page":43,"text":"social media outlets to achieve their goals. The psychological operations planners assigned or attached to the","rect":[108.01383209228516,352.6916198730469,540.1234729270935,343.63800048828127]},{"page":43,"text":"BCT or squadron have the resources to analyze and counter the enemy’s actions. Functioning cell phone","rect":[108.01383209228516,364.2153015136719,540.217100856781,355.16168212890627]},{"page":43,"text":"networks are key terrain within the information dimension. The population can use smartphones to document","rect":[108.00386047363281,375.7390441894531,540.1435748348237,366.6854248046875]},{"page":43,"text":"friendly operations that may aid enemy collection or propaganda efforts.","rect":[108.00386047363281,387.14324951171877,398.0082495212555,378.0896301269531]},{"page":43,"text":"COUNTERING ADAPTATIONS AND RETAINING THE INITIATIVE","rect":[90.0,412.4106140136719,527.0399119081498,402.6808776855469]},{"page":43,"text":"Countering enemy adaptations and retaining the initiative in future, armed conflict requires forces that","rect":[133.20265197753907,432.7013854980469,540.1347247371674,423.64776611328127]},{"page":43,"text":"understand the threat and the operational environment. Reconnaissance operations must overcome","rect":[108.00384521484375,444.2052001953125,540.0170886497498,435.1714782714844]},{"page":43,"text":"increasingly sophisticated area-denial actions and capabilities to develop the situation. Combined arms and","rect":[108.00384521484375,455.7488098144531,540.041645526886,446.6951904296875]},{"page":43,"text":"joint capabilities must be integrated effectively to seize the initiative and dominate an increasingly","rect":[108.00383758544922,467.2725524902344,540.0337719917297,458.2089538574219]},{"page":43,"text":"challenging and complex environment.","rect":[107.99388122558594,478.7962646484375,264.201486825943,469.7426452636719]},{"page":43,"text":"Commanders and staffs must understand the tactical, human, and political dynamics associated with","rect":[133.20265197753907,496.3013916015625,539.9201855659485,487.2477722167969]},{"page":43,"text":"current and future armed conflict because of the requirements and challenges of the near, close, and deep","rect":[108.00383758544922,507.7055969238281,540.074848651886,498.6519775390625]},{"page":43,"text":"operational environment. They must understand enemy organizations’ dynamics and capabilities within all","rect":[108.00383758544922,519.2293090820313,540.0996905574799,510.1756591796875]},{"page":43,"text":"operational environments. Identifying and distinguishing these groups and the associated dynamics is","rect":[108.00383758544922,530.7530517578125,540.1573989992141,521.6994018554688]},{"page":43,"text":"extremely difficult and requires a detailed, in-depth information collection effort through every phase of the","rect":[108.00384521484375,542.2767944335938,540.092589138031,533.22314453125]},{"page":43,"text":"operation. Only through an effective information collection effort can the BCT gain the understanding","rect":[107.9939193725586,553.8004760742188,540.0727124214172,544.746826171875]},{"page":43,"text":"necessary to defeat an adaptive and determined enemy on current and future battlefields.","rect":[107.99394226074219,565.32421875,462.2013952732086,556.2705688476563]},{"page":43,"text":"SECTION III − RECONNAISSANCE DISRUPTION, TACTICS, AND TECHNIQUES","rect":[99.36000061035156,590.988037109375,533.723970703125,580.2120361328125]},{"page":43,"text":"The enemy employs combinations of lethal (for example, offensive and defensive tasks, assassination,","rect":[133.20265197753907,612.5814208984375,539.9802343845367,603.5277709960938]},{"page":43,"text":"and ambushes) and nonlethal (political subversion, propaganda, and intimidation) actions to disrupt U.S.","rect":[108.00384521484375,623.9856567382813,540.084787607193,614.9320068359375]},{"page":43,"text":"forces to shape the environment, influence key actors, and to consolidate gains and efforts to accomplish the mission.","rect":[107.99388122558594,635.5093383789063,539.9690039157867,626.4556884765625]},{"page":43,"text":"The following vignette demonstrates how a peer-threat employed a new and effective reconnaissance-strike","rect":[133.20265197753907,653.0214233398438,540.0935046653748,643.9677734375]},{"page":43,"text":"model during recent military operations in the Russo-Ukrainian War’s Donbas campaign. The Donbas","rect":[107.99388122558594,664.5451049804688,540.1523330812454,655.491455078125]},{"page":43,"text":"campaign was a conflict between Ukrainian forces and Russia-backed separatist groups. The 2014 Russo-Ukrainian","rect":[107.99390411376953,676.06884765625,539.9301953315735,667.0151977539063]},{"page":43,"text":"War was an unconventional approach of warfare for Russia. Russia used irregular fighters, disinformation","rect":[107.9939193725586,687.5925903320313,540.030903339386,678.5389404296875]},{"page":43,"text":"tactics, conventional military support, and Russian troops to destabilize the Donbas Region. The following","rect":[107.99390411376953,698.9967651367188,540.046040058136,689.943115234375]},{"page":43,"text":"vignette introduces new and emerging threat tactics that near peer threats have brought forth on today’s battlefield.","rect":[107.99390411376953,710.5205078125,539.8495581150055,701.4668579101563]},{"page":43,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":43,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":43,"text":"2-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":44,"text":"Chapter 2","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":44,"text":"2-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":44,"text":"Russian’s Reconnaissance-strike Model","rect":[198.239990234375,115.59600067138672,395.4960036621094,107.31600189208985]},{"page":44,"text":"During the Russo-Ukrainian War’s Donbas campaign, Russia’s use of drones, supported with","rect":[108.0,140.98143005371095,485.93916749954226,131.9277801513672]},{"page":44,"text":"Russian indirect fire assets, proved to be an effective method to dominate land battle and gain","rect":[108.0,152.50144958496095,485.9272656440735,143.4477996826172]},{"page":44,"text":"the tactical advantage against their peer threats. On July 11, 2014, Ukrainian forces began to","rect":[108.0,164.0214080810547,486.04796266555788,154.96775817871095]},{"page":44,"text":"uncoil from their AA and prepare for offensive operations. Russian forces used drones cued by","rect":[108.0,175.5414276123047,486.10748171615605,166.48777770996095]},{"page":44,"text":"electronic signature-tracking systems to identify Ukrainian force positions to target them when","rect":[108.0,187.06138610839845,486.060688495636,178.0077362060547]},{"page":44,"text":"they were most vulnerable. At approximately 0400 hours, when it was still dark and Ukrainian","rect":[108.0,198.58140563964845,486.0586133003235,189.5277557373047]},{"page":44,"text":"forces were disorganized, Ukrainian forces heard drones overhead. Shortly after, the","rect":[108.0,209.98143005371095,486.08956789779668,200.9277801513672]},{"page":44,"text":"Ukrainian tactical radio network fell silent. All Ukrainian communication systems were","rect":[108.0,221.50144958496095,485.8544909934998,212.4477996826172]},{"page":44,"text":"simultaneously jammed followed by volleys of accurate and deadly indirect fire strikes directly","rect":[108.0,233.0214080810547,485.8637683372498,223.96775817871095]},{"page":44,"text":"on Ukrainian force positions. The bombardment lasted four minutes and the Russians bombed","rect":[108.0,244.5414276123047,485.9381604194641,235.48777770996095]},{"page":44,"text":"Ukrainian force positions with a barrage of rockets and artillery. By the end of the attack,","rect":[108.0,256.0613708496094,485.9720251560211,247.0077362060547]},{"page":44,"text":"Ukrainian forces suffered over 30 soldiers killed in action with several others severely wounded,","rect":[108.0,267.4613952636719,486.2140905857086,258.40777587890627]},{"page":44,"text":"and over 2 battalions worth of combat power destroyed and rendered combat ineffective.","rect":[108.0,278.9814147949219,449.48856568336489,269.92779541015627]},{"page":44,"text":"This revamped tactic is known as the Russians’ reconnaissance-strike model which is a mixture","rect":[108.0,302.0014953613281,485.8604724388123,292.9677734375]},{"page":44,"text":"of drones, rockets, artillery fire, special reconnaissance, cyber capabilities, and geo-locating","rect":[108.0,313.5413818359375,486.05968141555788,304.4877624511719]},{"page":44,"text":"technology to find, fix, and destroy the enemy on the battlefield in near-real time. Russians","rect":[108.0,325.0614013671875,486.1393631105423,316.0077819824219]},{"page":44,"text":"demonstrated the effective use of this type of reconnaissance-strike model and they continually","rect":[108.0,336.4613952636719,486.0994861106873,327.40777587890627]},{"page":44,"text":"use this model on the battlefield today. Russians believe in an “artillery destroys, infantry","rect":[108.0,347.98138427734377,485.97503542709355,338.9277648925781]},{"page":44,"text":"occupies” mentality, and they could be expected to use their indirect fire systems to destroy","rect":[108.0,359.5013732910156,485.9802539329529,350.44775390625]},{"page":44,"text":"their enemy at the first opportunity. The slaughter of Ukrainian forces at Zelenopilla","rect":[108.0,371.0213928222656,485.90340089797976,361.9677734375]},{"page":44,"text":"demonstrated how the Russians have updated and improved their tactics using technology and","rect":[108.0,382.5413818359375,486.0519299507141,373.4877624511719]},{"page":44,"text":"enhanced military capabilities like accurate, long-range artillery and rockets to destroy their","rect":[108.0,394.0614013671875,486.0148208742142,385.0077819824219]},{"page":44,"text":"enemies without much tactical risk to themselves.","rect":[108.0,403.4295654296875,305.2418005466461,396.40777587890627]},{"page":44,"text":"During reconnaissance and security operations, forces must be aware of how the battlefield of ","rect":[108.0,428.5013732910156,488.47596192359927,419.44775390625]},{"page":44,"text":"the 21st century has changed, and how surveillance systems like drones or UAS are an effective","rect":[108.0,440.0213928222656,485.98113894271855,430.7517395019531]},{"page":44,"text":"tool when the system is observing for an artillery battery. Sensors are now able to scan for a","rect":[108.0,451.5413818359375,486.02489137649538,442.4877624511719]},{"page":44,"text":"unit’s electronic signature, which provides the enemy with accurate locations on the battlefield.","rect":[108.0,462.9413757324219,486.109445810318,453.88775634765627]},{"page":44,"text":"Near peer and peer threats have developed new and emerging tactics and reconnaissance and","rect":[108.0,474.4613952636719,486.04796266555788,465.40777587890627]},{"page":44,"text":"security operations must develop ways to counter these enemy disruption techniques and","rect":[108.0,485.98138427734377,486.06966066360476,476.9277648925781]},{"page":44,"text":"tactics. Peer and near peer threats have refined their reconnaissance fire system where they","rect":[108.0,497.5013732910156,485.9870593528748,488.44775390625]},{"page":44,"text":"could have reconnaissance to engagement using high-precision, long-range weapons tied to","rect":[108.0,509.0213928222656,485.93516969680788,499.9677734375]},{"page":44,"text":"immediate and real-time data.","rect":[108.0,518.5095825195313,229.16141724586488,511.48779296875]},{"page":44,"text":"Disruption techniques and tactics are designed to disrupt, destroy, and change the course of ","rect":[108.0,543.46142578125,488.47513794898989,534.4077758789063]},{"page":44,"text":"military operations against the enemy during large-scale combat operations. This vignette","rect":[108.0,554.9813842773438,485.9859912376404,545.927734375]},{"page":44,"text":"provides an example of how the enemy can rapidly gain and maintain contact through multiple","rect":[108.0,566.5014038085938,485.9831531028748,557.44775390625]},{"page":44,"text":"means. Near peer and peer threats do not want to be vulnerable; therefore, they use aggressive","rect":[108.0,578.0214233398438,485.99691653060918,568.9677734375]},{"page":44,"text":"counterreconnaissance methods to destroy ground reconnaissance forces early. The Ukrainian","rect":[108.0,589.5414428710938,485.9434094429016,580.48779296875]},{"page":44,"text":"army was unable to defend the eastern region of Ukraine after this attack. Emerging threats","rect":[108.0,600.94140625,485.9851577882767,591.8877563476563]},{"page":44,"text":"group their intelligence, surveillance, and reconnaissance assets and their indirect fire units","rect":[108.0,612.46142578125,485.99303132343297,603.4077758789063]},{"page":44,"text":"around each other, which usually provides a location for a high-payoff target, if identified.","rect":[108.0,623.9813842773438,471.9164526462555,614.927734375]},{"page":44,"text":"Enemy forces use deception, cover and concealment, and obscuration to achieve positions of relative","rect":[115.20264434814453,656.2614135742188,521.9780261497498,647.207763671875]},{"page":44,"text":"advantage. They may move in different types of units, groups, or formations to avoid obvious detection and","rect":[90.00387573242188,667.78515625,522.0519604682922,658.7315063476563]},{"page":44,"text":"to concentrate against perceived weaknesses. Irregular and regular forces often conduct short engagements","rect":[90.00387573242188,679.1893310546875,522.1316421632766,670.1356811523438]},{"page":44,"text":"and attempt to break contact before U.S. forces can bring indirect fire or other capabilities to bear. The enemy","rect":[90.00387573242188,690.7130737304688,522.229389667511,681.659423828125]},{"page":44,"text":"employs deception measures to reduce U.S. forces’ information collection efforts. Deception measures","rect":[90.00387573242188,702.2367553710938,522.1785171632766,693.18310546875]},{"page":44,"text":"include enemy formations, hardened and buried facilities, and multispectral decoys to mask the signatures of ","rect":[90.00387573242188,713.760498046875,524.5031836032867,704.7068481445313]},{"page":44,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":44,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":45,"text":"Threats","rect":[507.47998046875,44.4990234375,540.0834067382813,37.956024169921878]},{"page":45,"text":"high-value systems (for example, short-range, ballistic missiles, and surface-to-air missile launchers).","rect":[108.0,83.50144958496094,539.9552710056305,74.44780731201172]},{"page":45,"text":"Deception may also include the enemy’s ability to mask their signature in the EMS preventing U.S. forces","rect":[107.99008178710938,95.02519226074219,540.1108902101516,85.97154998779297]},{"page":45,"text":"from being able to discern between an enemy’s electromagnetic signature and that of a host nation or civilian","rect":[107.99008178710938,106.42936706542969,540.0639843940735,97.37572479248047]},{"page":45,"text":"signature.","rect":[107.99008178710938,117.95310974121094,147.20060181617738,108.89946746826172]},{"page":45,"text":"The enemy exploits safe havens within hostile states or in ungoverned areas and takes advantage of","rect":[133.20265197753907,135.46141052246095,539.9174490556717,126.40776824951172]},{"page":45,"text":"subterranean infrastructures (for example, tunnels, underground facilities, sewers, and drainage systems) to","rect":[108.00384521484375,146.9851531982422,540.055805683136,137.93150329589845]},{"page":45,"text":"avoid detection. Enemies evade precision fires by employing Global Positioning System jammers around","rect":[108.00384521484375,158.5088348388672,540.0180859565735,149.4452362060547]},{"page":45,"text":"possible targets, preventing accurate engagements. As enemies evade U.S. and coalition forces, they","rect":[108.00384521484375,170.03257751464845,540.0706372261047,160.9789276123047]},{"page":45,"text":"simultaneously seek to expand their freedom of movement through intimidation and coercion.","rect":[108.00383758544922,181.43675231933595,484.16727662086489,172.3831024169922]},{"page":45,"text":"Note.","rect":[133.1999969482422,203.0,155.13192200660706,195.9664764404297]},{"page":45,"text":"Russia ","rect":[163.4385528564453,202.68948364257813,190.65226197242738,195.6477508544922]},{"page":45,"text":"conducts ","rect":[196.08245849609376,202.68948364257813,231.70041871070863,195.6477508544922]},{"page":45,"text":"counterreconnaissance ","rect":[237.00909423828126,203.0,323.73380494117739,195.6477508544922]},{"page":45,"text":"by ","rect":[329.04248046875,204.70140075683595,340.8948767185211,195.6477508544922]},{"page":45,"text":"locating, ","rect":[346.3240661621094,204.70140075683595,380.8554174900055,195.6477508544922]},{"page":45,"text":"defeating ","rect":[386.1640930175781,204.70140075683595,423.09778809547427,195.6477508544922]},{"page":45,"text":"and ","rect":[428.5279541015625,203.0,444.46094727516177,195.6477508544922]},{"page":45,"text":"destroying ","rect":[449.7696533203125,204.70140075683595,491.50394654273989,195.6477508544922]},{"page":45,"text":"enemy","rect":[496.9341125488281,204.70140075683595,522.3151440620422,197.0]},{"page":45,"text":"reconnaissance efforts. They will use dummy positions and radio nets, conduct false movement, and","rect":[133.1999969482422,216.2213592529297,522.163959980011,207.16770935058595]},{"page":45,"text":"camouflage real and dummy positions. Create a false forward edge of defense. Check the effectiveness of ","rect":[133.1999969482422,227.74510192871095,524.570871591568,218.6914520263672]},{"page":45,"text":"camouflage habitually and particularly from the air.","rect":[133.1999969482422,239.26878356933595,324.70508790016177,230.2151336669922]},{"page":45,"text":"OVERVIEW ENEMY RECONNAISSANCE AND SECURITY OPERATIONS","rect":[90.0,279.3305969238281,539.9496725959778,269.61492919921877]},{"page":45,"text":"The enemy conducts reconnaissance operations to assess a BCT’s strengths and weaknesses, identify","rect":[133.20265197753907,299.62139892578127,540.0967602729797,290.5677795410156]},{"page":45,"text":"opportunities, achieve positions of relative advantage, and to neutralize a BCT’s mobility and firepower","rect":[108.00384521484375,311.0256042480469,540.0779104814529,301.97198486328127]},{"page":45,"text":"strengths. Enemy security operations protect their key elements of combat power, giving their commanders","rect":[108.00384521484375,322.54931640625,540.1613052492141,313.4956970214844]},{"page":45,"text":"information and decision space, and enable affective risk assessment. A conventional enemy executes tactical","rect":[108.00383758544922,334.0730285644531,540.1513262996674,325.0194091796875]},{"page":45,"text":"reconnaissance in which ground reconnaissance forces use one or more forms of reconnaissance to meet","rect":[108.0137939453125,345.5967712402344,540.0129596004487,336.54315185546877]},{"page":45,"text":"intelligence collection requirements.","rect":[108.0137939453125,357.1204833984375,253.77237915992738,348.0668640136719]},{"page":45,"text":"Russia’s utilization of drones is an example of peer and near peer threat reconnaissance tactics. The","rect":[133.20265197753907,374.4814758300781,539.9832751731873,365.44775390625]},{"page":45,"text":"employment of drones and UAS is not to conduct aerial observation exclusively; instead, they are part of a","rect":[108.00383758544922,386.02508544921877,540.1144397239685,376.9714660644531]},{"page":45,"text":"highly-integrated system that benefits from operating under the protection of a dense, integrated air defense","rect":[108.00386047363281,397.5487976074219,539.9969470481873,388.49517822265627]},{"page":45,"text":"system coverage and long-range strike capability. The Russians’ reconnaissance-strike model is an","rect":[108.00387573242188,409.0725402832031,540.0398144721985,400.0189208984375]},{"page":45,"text":"amalgamation of drones, armed UAS, rocket and artillery fire, and special reconnaissance. Russian’s cyber","rect":[107.9939193725586,420.59625244140627,540.0766897783279,411.5426330566406]},{"page":45,"text":"capabilities have geo-locating technology that delivers impressive tactical and operational results. This strike","rect":[108.00391387939453,432.1199645996094,539.8704822044373,423.06634521484377]},{"page":45,"text":"may focus on friendly reconnaissance elements, or it may focus on command and control, fires, or","rect":[108.01387023925781,443.524169921875,540.0906057939529,434.4705505371094]},{"page":45,"text":"sustainment elements necessary to support reconnaissance.","rect":[108.01387023925781,455.0478820800781,343.547922372818,445.9942626953125]},{"page":45,"text":"Enemy reconnaissance elements execute multiple forms of reconnaissance to include combat","rect":[133.20265197753907,472.5413818359375,540.1425372371674,463.4877624511719]},{"page":45,"text":"reconnaissance in which ground reconnaissance forces conduct direct action against an opposing force to","rect":[108.00384521484375,484.0650939941406,540.0170483589172,475.011474609375]},{"page":45,"text":"force the other commander to make a decision. Other forms of reconnaissance include reconnaissance by fire","rect":[108.00384521484375,495.5888366699219,540.132384059906,486.53521728515627]},{"page":45,"text":"and technical reconnaissance in which electronic intelligence and signal intelligence capabilities are used to","rect":[108.00383758544922,507.112548828125,540.125629901886,498.0589294433594]},{"page":45,"text":"support collection efforts through surveillance of the electromagnetic spectrum. Similar to U.S. ground","rect":[108.00383758544922,518.5167846679688,540.0996899604797,509.463134765625]},{"page":45,"text":"reconnaissance forces, enemy conventional forces augment their ground reconnaissance forces with a host","rect":[108.00383758544922,530.0404663085938,539.9822589168549,520.98681640625]},{"page":45,"text":"of enablers that support rapid and aggressive information collection.","rect":[108.00383758544922,541.564208984375,380.9726355075836,532.5105590820313]},{"page":45,"text":"Enemy reconnaissance elements can operate among the civilian population to avoid detection. The","rect":[133.20265197753907,559.0614013671875,540.0549304466248,550.0077514648438]},{"page":45,"text":"enemy can employ regular or irregular forces amongst the civilian population to gain and maintain contact","rect":[108.00384521484375,570.5851440429688,540.1114703426362,561.531494140625]},{"page":45,"text":"with an opposing force while avoiding a direct engagement. Enabled with UAS, SIGINT, or electromagnetic","rect":[108.00386047363281,582.1088256835938,540.1124865989685,573.05517578125]},{"page":45,"text":"warfare capabilities an enemy reconnaissance force hidden among a civilian population can conduct effective","rect":[108.01387023925781,593.5130615234375,540.1304919700623,584.4594116210938]},{"page":45,"text":"information collection that can result in accurate indirect fires or degradation of friendly force’s command","rect":[108.01387023925781,605.0368041992188,540.0647168159485,595.983154296875]},{"page":45,"text":"and control systems.","rect":[108.00391387939453,616.5604858398438,189.92193055152894,607.5068359375]},{"page":45,"text":"COUNTERRECONNAISSANCE","rect":[90.0,641.8505859375,291.56103007221227,632.1349487304688]},{"page":45,"text":"The enemy conducts deliberate counterreconnaissance tasks to deny the BCT their ability to develop","rect":[133.20265197753907,662.1414184570313,540.0539135932922,653.0877685546875]},{"page":45,"text":"the situation in close contact or close operations with the enemy and civilian population. Conventional enemy","rect":[108.00384521484375,673.6651611328125,540.0766186714172,664.6115112304688]},{"page":45,"text":"counterreconnaissance efforts include antiarmor and antipersonnel ambushes, indirect fires, UAS","rect":[108.00386047363281,685.1688842773438,540.0308020133972,676.1351928710938]},{"page":45,"text":"capabilities, fixed- and rotary-wing aircraft, electromagnetic countermeasures, cyberspace attacks, raids, and","rect":[108.00387573242188,696.5930786132813,540.0686841011047,687.5394287109375]},{"page":45,"text":"spoiling attacks to degrade a BCT’s reconnaissance and security operations. ","rect":[108.00383758544922,708.1167602539063,414.4531042575836,699.0631103515625]},{"page":45,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":45,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":45,"text":"2-7","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":46,"text":"Chapter 2","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":46,"text":"Additionally, the enemy conducts propaganda and disinformation to discredit the BCT and to generate","rect":[115.20264434814453,83.50144958496094,522.110655544281,74.44780731201172]},{"page":46,"text":"popular opposition to U.S. and coalition efforts. The use of proxy forces and contracted forces by the enemy","rect":[90.00384521484375,95.02519226074219,522.099506855011,85.97154998779297]},{"page":46,"text":"to conduct reconnaissance and counterreconnaissance has become a more common tactic in an effort to","rect":[90.0137939453125,104.41744232177735,522.1782422065735,97.37572479248047]},{"page":46,"text":"preserve combat power and avoid casualties amongst regular forces. The enemy can integrate proxy forces","rect":[90.0137939453125,117.95310974121094,522.1476333742141,108.89946746826172]},{"page":46,"text":"and contracted forces easily into a civilian population to either influence the local populous or remain","rect":[90.0137939453125,129.47679138183595,522.1006054878235,120.42314910888672]},{"page":46,"text":"concealed to gain and maintain contact with an opposing force.","rect":[90.01377868652344,141.0005340576172,342.70496582984927,131.94688415527345]},{"page":46,"text":"The ","rect":[115.20264434814453,157.0,133.2929937839508,149.4477996826172]},{"page":46,"text":"enemy ","rect":[138.36264038085938,158.50144958496095,167.61316895484925,151.0]},{"page":46,"text":"augments ","rect":[172.68280029296876,158.50144958496095,213.45305848121644,150.4438018798828]},{"page":46,"text":"the ","rect":[218.522705078125,157.0,233.25351929664613,149.4477996826172]},{"page":46,"text":"tactical ","rect":[238.3231658935547,157.0,269.6134741306305,149.4477996826172]},{"page":46,"text":"capabilities ","rect":[274.6831359863281,158.4815216064453,322.7740271091461,149.4477996826172]},{"page":46,"text":"of ","rect":[327.8436584472656,157.0,338.733957529068,149.457763671875]},{"page":46,"text":"combined ","rect":[343.8035888671875,157.0,385.89359498023989,149.4477996826172]},{"page":46,"text":"arms ","rect":[390.9632568359375,157.0,412.89319825172427,151.0]},{"page":46,"text":"teams ","rect":[417.9628601074219,157.0,443.7324011325836,150.4438018798828]},{"page":46,"text":"with ","rect":[448.8020324707031,157.0,469.0527136325836,149.4477996826172]},{"page":46,"text":"inexpensive","rect":[474.24285888671877,158.4815216064453,522.1027209739685,149.4477996826172]},{"page":46,"text":"countermeasures (such as land mines and fire and smoke as a weapon system) to impede U.S. forces. The","rect":[90.00384521484375,170.0251922607422,522.096495388031,160.97154235839845]},{"page":46,"text":"enemy seeks to leverage commercial and military technologies for precision strike capability, satellite","rect":[90.00383758544922,181.4293670654297,521.8627307395935,172.37571716308595]},{"page":46,"text":"imagery, forward-looking infrared, and electromagnetic warfare systems or platforms. The enemy looks to","rect":[90.00383758544922,192.95310974121095,522.0695996284485,183.8994598388672]},{"page":46,"text":"conduct aggressive counterreconnaissance operations to preserve combat power and deny a BCT’s ability to","rect":[90.0137939453125,204.47679138183595,521.9533886909485,195.4231414794922]},{"page":46,"text":"collect information and make timely decisions.","rect":[90.0137939453125,216.0005340576172,277.7797338962555,206.94688415527345]},{"page":46,"text":"UNDERSTAND BEING MATCHED","rect":[72.0,241.29055786132813,294.5087061443329,231.5608367919922]},{"page":46,"text":"The force structure of peer and near peer threat reconnaissance forces is almost identical to","rect":[115.20264434814453,261.5614929199219,522.0857129096985,252.5277557373047]},{"page":46,"text":"reconnaissance forces within a BCT. BCT commanders and staffs should understand that the BCT’s","rect":[90.00384521484375,271.1031799316406,521.9165542726516,264.051513671875]},{"page":46,"text":"reconnaissance and security efforts are matched in the disruption zone of the battlefield with similar","rect":[90.00384521484375,284.6288146972656,521.9501028642654,275.5751953125]},{"page":46,"text":"capabilities if not superior capabilities. Any BCT reconnaissance and security force makes contact early with","rect":[90.00384521484375,296.03302001953127,521.9530835151672,286.9794006347656]},{"page":46,"text":"the enemy through multiple forms of contact. BCT commanders and staffs must anticipate threat tactics in","rect":[90.0137939453125,307.5567321777344,521.9263501167297,298.50311279296877]},{"page":46,"text":"order to augment reconnaissance and security forces with enablers that allow the BCT to succeed in","rect":[90.0137939453125,319.0804748535156,521.992084980011,310.02685546875]},{"page":46,"text":"maintaining an advantage over enemy forces.","rect":[90.0137939453125,330.60418701171877,271.66126465797427,321.5505676269531]},{"page":46,"text":"Regular, irregular, and nontraditional forces present formidable tactical challenges to BCTs through","rect":[115.20264434814453,348.10137939453127,522.077778339386,339.0477600097656]},{"page":46,"text":"area denial, artillery munitions, land mines, and antiaircraft systems. The enemy emphasizes deception,","rect":[90.00383758544922,359.5055847167969,522.1573584079742,350.45196533203127]},{"page":46,"text":"cover, infiltration techniques, mobility, and most importantly, depth for its defense and operations. Together,","rect":[90.00383758544922,371.029296875,522.0966894626617,361.9756774902344]},{"page":46,"text":"regular, irregular, and nontraditional forces on the current and future battlefield employ significant combined","rect":[90.00383758544922,382.5530090332031,522.060688495636,373.4993896484375]},{"page":46,"text":"arms capabilities that seek to disrupt BCT operations and dislocate BCT combined arms capabilities. The","rect":[89.9938735961914,394.0568542480469,521.9472033958435,385.02313232421877]},{"page":46,"text":"enemy is adept at employing electronic warfare and cyberspace capabilities to identify and target friendly","rect":[89.9938735961914,405.6004638671875,522.016254901886,396.5468444824219]},{"page":46,"text":"reconnaissance elements for high volumes of fires.","rect":[89.9938735961914,417.1241760253906,292.998605966568,408.070556640625]},{"page":46,"text":"In addition, enemies are proficient at establishing and maintaining communications as well as","rect":[115.20264434814453,434.5013732910156,521.9034927492141,425.44775390625]},{"page":46,"text":"disrupting U.S. forces’ automated command and control systems and combined-arms capabilities through","rect":[90.00384521484375,446.02508544921877,522.046772480011,436.9714660644531]},{"page":46,"text":"combinations of GlobalPositioning System jamming, cyberspace attacks, data pirating, and potential satellite","rect":[89.99388122558594,457.5487976074219,522.0329577903748,448.4851989746094]},{"page":46,"text":"neutralization. The use of these anti-access and area denial capabilities and techniques are to prevent advance","rect":[90.00383758544922,469.0526428222656,522.1705310325623,460.0189208984375]},{"page":46,"text":"and freedom of action for allied units terrestrially, as well as creating a denied, degraded, and disrupted","rect":[90.00384521484375,480.59625244140627,522.063618183136,471.5426330566406]},{"page":46,"text":"space-operating environment.","rect":[90.00383758544922,492.1199645996094,208.89037537574769,483.06634521484377]},{"page":46,"text":"2-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":46,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":46,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":47,"text":"Chapter 3","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":47,"text":"Mission Command","rect":[243.83999633789063,151.01559448242188,385.9494359998703,139.2211456298828]},{"page":47,"text":"BCT and squadron commanders apply mission command principles to develop the","rect":[126.0,188.85357666015626,503.9864157447815,178.81822204589845]},{"page":47,"text":"situation in close contact with the enemy and civilian populations. Commanders use","rect":[126.0,201.4501953125,504.0924032936096,191.4148406982422]},{"page":47,"text":"the mission command principles exercising command and control of subordinate units","rect":[126.0,214.046875,503.9743085203171,204.0115203857422]},{"page":47,"text":"to build their understanding, visualization, and description of the operational","rect":[126.01103210449219,226.76495361328126,504.093503534317,216.72959899902345]},{"page":47,"text":"environment, the terrain, local populations, and the enemy. At the same time,","rect":[126.02208709716797,239.361572265625,504.13438963890078,229.3262176513672]},{"page":47,"text":"commanders use the information gained from reconnaissance and security operations","rect":[126.02208709716797,251.95819091796876,504.05630925273899,241.92283630371095]},{"page":47,"text":"to modify existing or developing plans and to reallocate BCT assets as they refine their","rect":[126.02208709716797,264.67626953125,504.24245157909396,254.6409149169922]},{"page":47,"text":"direction, leadership, and assessment of both reconnaissance and security operations and","rect":[126.03314208984375,277.27294921875,504.23841428756716,267.2375793457031]},{"page":47,"text":"the BCT’s decisive operations. ","rect":[126.03314208984375,289.96893310546877,260.3104455471039,279.95562744140627]},{"page":47,"text":"The role of reconnaissance and security operations in mission command is essential.","rect":[126.03314208984375,312.66717529296877,504.13780760765078,302.6318054199219]},{"page":47,"text":"Mission command requires the BCT and squadron commander to convey a clear","rect":[126.03314208984375,325.2637939453125,504.1453751630783,315.2284240722656]},{"page":47,"text":"commander’s intent and clear reconnaissance and security guidance. Commander’s","rect":[126.03314208984375,337.8604431152344,504.1354718503952,327.8250732421875]},{"page":47,"text":"guidance becomes essential in reconnaissance and security operations where multiple","rect":[126.03311920166016,350.5785217285156,504.18642795181276,340.54315185546877]},{"page":47,"text":"operational and mission variables interact with the lethal application of combat power.","rect":[126.04415893554688,363.1531066894531,504.2003381252289,353.1398010253906]},{"page":47,"text":"Such dynamic interaction often compels subordinate commanders to make difficult","rect":[126.04415893554688,375.77178955078127,504.10897594642639,365.7364196777344]},{"page":47,"text":"decisions in unforeseen circumstances. Commanders and staffs refine the concept of ","rect":[126.04415893554688,388.4678039550781,506.82393431663516,378.4544982910156]},{"page":47,"text":"the operations during planning and make adjustments throughout operations as Cavalry","rect":[126.04415893554688,401.0865478515625,504.1928210258484,391.0401611328125]},{"page":47,"text":"forces develop the situation or conditions change.","rect":[126.04415893554688,413.80462646484377,344.6836144924164,403.7692565917969]},{"page":47,"text":"SECTION I – MISSION COMMAND FOR RECONNAISSANCE AND SECURITY","rect":[99.36000061035156,437.7840270996094,530.123873046875,428.9040222167969]},{"page":47,"text":"3-1. Military operations are complex human endeavors. The threats, enemies, and adversaries that U.S.","rect":[108.0,461.1413879394531,539.961252450943,452.0877685546875]},{"page":47,"text":"forces face in combat consist of capable, adaptable, and determined enemies who resist U.S. forces actions,","rect":[107.99006652832031,472.64520263671877,540.0767920017242,463.6114807128906]},{"page":47,"text":"employ countermeasures to our strengths and capabilities, and seek to impose their will on all actors within","rect":[107.99004364013672,484.1888122558594,540.0112500190735,475.13519287109377]},{"page":47,"text":"the operational environment. Army forces conduct operations among civilian groups who are influenced by","rect":[107.99004364013672,495.7125549316406,539.9333081245422,486.658935546875]},{"page":47,"text":"military operations. As a result, Army forces encounter a wide variety of political agendas and changing","rect":[107.99004364013672,507.1167907714844,539.902485370636,498.0631103515625]},{"page":47,"text":"perceptions throughout an operational area. As operations progress in close contact with enemy forces and","rect":[107.98999786376953,518.6405029296875,540.0241894721985,509.58685302734377]},{"page":47,"text":"civilian populations, commanders face thinking and adaptive enemies, changing civilian perceptions, and","rect":[107.99004364013672,530.1642456054688,540.0032544136047,521.110595703125]},{"page":47,"text":"differing agendas of various organizations and actors. The result of the continuous process of interactions is","rect":[107.99004364013672,541.6879272460938,540.0159805421829,532.63427734375]},{"page":47,"text":"an uncertain environment.","rect":[107.99006652832031,551.19970703125,212.71946167945863,544.1580200195313]},{"page":47,"text":"PRINCIPLES OF MISSION COMMAND","rect":[90.0,578.4906005859375,343.23667245292668,568.7749633789063]},{"page":47,"text":"3-2.","rect":[108.0,596.7495727539063,123.92603516578675,589.9070434570313]},{"page":47,"text":"Mission command is the Army’s approach to command and control that empowers subordinate","rect":[133.1988067626953,598.7814331054688,540.1057116966248,589.727783203125]},{"page":47,"text":"decision-making and decentralized execution appropriate to the situation (ADP 6-0). Mission command","rect":[108.00000762939453,610.3051147460938,540.0628247261047,601.25146484375]},{"page":47,"text":"includes visualizing the current situation and the future end state, then formulating operations concepts to","rect":[108.0,621.7093505859375,540.0522046089172,612.6557006835938]},{"page":47,"text":"employ offensive, defensive, and stability operations to move from one state to the other. Mission command","rect":[108.0,633.2330932617188,540.067768573761,624.179443359375]},{"page":47,"text":"is one of the foundations of the Army’s operating concept. When contrasted with detailed command, mission","rect":[107.99996185302735,644.7567749023438,540.0657544136047,635.703125]},{"page":47,"text":"command emphasizes centralized intent and decentralized execution through disciplined initiative.","rect":[108.00993347167969,656.280517578125,502.2834265232086,647.2268676757813]},{"page":47,"text":"3-3.","rect":[108.00993347167969,671.7682495117188,123.93597626686096,664.9257202148438]},{"page":47,"text":"Mission command assists commanders and staffs in countering the uncertainty of operations by","rect":[133.208740234375,673.8001098632813,540.070698261261,664.7464599609375]},{"page":47,"text":"reducing the amount of certainty needed to act. Commanders understand some decisions must be made","rect":[108.00995635986328,685.204345703125,540.1566760520935,676.1506958007813]},{"page":47,"text":"quickly and are better made at the point of action. Further, mission command is based on mutual trust and a","rect":[108.00995635986328,696.7280883789063,538.4266955833435,687.6744384765625]},{"page":47,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":47,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":47,"text":"3-1","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":48,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":48,"text":"3-4. Shared understanding and purpose between commanders, subordinates, staffs, and unified action","rect":[90.0,83.50144958496094,522.068989276886,74.44780731201172]},{"page":48,"text":"partners. The following principles enable successful mission command:","rect":[90.0,95.02519226074219,376.69957459068299,85.97154998779297]},{"page":48,"text":" Competence.","rect":[115.19999694824219,108.44149017333985,185.73800110816956,99.57708740234375]},{"page":48,"text":" Mutual trust.","rect":[115.19999694824219,119.88948822021485,184.8864233493805,112.84777069091797]},{"page":48,"text":" Shared understanding.","rect":[115.19999694824219,135.46141052246095,222.68760132789613,126.40776824951172]},{"page":48,"text":" Commander’s intent.","rect":[115.19999694824219,146.89944458007813,217.76738953590394,139.84776306152345]},{"page":48,"text":" Mission orders.","rect":[115.19999694824219,160.44949340820313,195.44999146461488,153.4077606201172]},{"page":48,"text":" Disciplined initiative.","rect":[115.19999694824219,175.88148498535157,219.80120301246644,166.84776306152345]},{"page":48,"text":" Risk acceptance.","rect":[115.19999694824219,189.4414825439453,200.38416504859925,180.4077606201172]},{"page":48,"text":"Note. Refer to ADP 6-0 for a detailed discussion of the principles of mission command.","rect":[115.20227813720703,212.72145080566407,466.40455079078677,203.68772888183595]},{"page":48,"text":"3-5. Mutual trust, shared understanding, clear intent, mission orders, and disciplined initiative fosters agile","rect":[90.0,242.0214080810547,521.9803454856873,232.96775817871095]},{"page":48,"text":"and adaptive forces. Commanders create and sustain shared understanding and purpose through collaboration","rect":[90.0,253.4255828857422,522.068989276886,244.37193298339845]},{"page":48,"text":"and dialogue within their organizations and with unified action partners to facilitate unity of effort.","rect":[90.0,264.9493103027344,522.0708105564117,255.8956756591797]},{"page":48,"text":"Commanders provide clear intent and use mission orders to identify information gaps, to describe their","rect":[90.0,276.4730529785156,522.0976858720779,267.41943359375]},{"page":48,"text":"reconnaissance guidance, assign tasks, and allocate resources. Predicated on the commander’s guidance,","rect":[90.00991821289063,287.99676513671877,522.1046240329742,278.9431457519531]},{"page":48,"text":"subordinate units take appropriate actions to develop the situation, answer identified information","rect":[90.00995635986328,299.5005798339844,522.1008496284485,290.46685791015627]},{"page":48,"text":"requirements, identify, create, and exploit opportunities, anticipate change, and perform the necessary","rect":[90.00995635986328,311.044189453125,521.9496655464172,301.9905700683594]},{"page":48,"text":"coordination without requiring new orders.","rect":[90.01000213623047,322.4483947753906,261.9365026950836,313.394775390625]},{"page":48,"text":"3-6. The nature of military operations requires responsibility and decision-making at the point of action.","rect":[90.00995635986328,339.9680480957031,522.0836889743805,330.9144287109375]},{"page":48,"text":"Mission command demands leaders who can adapt their thinking, their formations, and their employment","rect":[90.00995635986328,351.4917297363281,522.0879718074799,342.4381103515625]},{"page":48,"text":"techniques to the specific situation. Mission command demands agile and adaptive Cavalry organizations","rect":[90.00995635986328,363.0154724121094,522.1554458742141,353.96185302734377]},{"page":48,"text":"that can develop the situation through action in close contact with the enemy and civilian population to set","rect":[90.0,374.5391845703125,522.0095416316987,365.4855651855469]},{"page":48,"text":"conditions for future success. Although BCT and squadron commanders and staffs must accept that they may","rect":[90.0,385.9433898925781,522.0797924995422,376.8897705078125]},{"page":48,"text":"often have to act despite significant gaps in their understanding, focused reconnaissance and security","rect":[90.00003814697266,397.46710205078127,521.943500995636,388.4134826660156]},{"page":48,"text":"operations answer the prioritized information requirements that seek to eliminate information gaps. The","rect":[90.0,408.9908142089844,522.1417224388123,399.93719482421877]},{"page":48,"text":"resulting combat information and intelligence allow commanders and staffs to make timely adjustments in","rect":[90.0,420.5145568847656,521.9058423042297,411.4509582519531]},{"page":48,"text":"response to changes.","rect":[90.0,432.03826904296877,172.52457642555238,422.9846496582031]},{"page":48,"text":"EXERCISE OF COMMAND AND CONTROL","rect":[72.0,457.2906188964844,356.0390268983841,447.574951171875]},{"page":48,"text":"3-7. The principles of mission command and the exercise of command and control enable BCT and","rect":[90.0,477.5614929199219,522.0618481636047,468.52777099609377]},{"page":48,"text":"squadron commanders to develop the situation while in close contact with the enemy and civilian populations.","rect":[90.0,489.1051025390625,522.0946753025055,480.0514831542969]},{"page":48,"text":"These help to develop their understanding, visualization, and description of the operational environment,","rect":[90.0,500.5093078613281,522.0847265720367,491.4556884765625]},{"page":48,"text":"also. Through effective information collection and continuous reconnaissance and security operations, BCTs","rect":[89.98999786376953,512.0330200195313,521.9074600343704,502.9794006347656]},{"page":48,"text":"develop and sustain the necessary tactical and operational understanding to defeat adaptive and determined","rect":[89.99000549316406,523.5568237304688,522.0988354682922,514.503173828125]},{"page":48,"text":"enemies as well as set conditions to consolidate tactical gains. Reconnaissance and security operations","rect":[89.99000549316406,535.0805053710938,522.1792495851516,526.02685546875]},{"page":48,"text":"improve situational understanding and enable commanders to—","rect":[89.99996185302735,546.6041870117188,346.0761194229126,537.550537109375]},{"page":48,"text":" Understand the tactical, human, and political dynamics within an area of operations.","rect":[115.19999694824219,560.0214233398438,469.88892579078677,550.9677734375]},{"page":48,"text":" Visualize operations in the context of mission variables of METT-TC (I).","rect":[115.19999694824219,573.4414672851563,426.92041993141177,564.4077758789063]},{"page":48,"text":" Describe the commander’s decisive operations in time, space, and purpose with a greater degree","rect":[115.19999694824219,587.0214233398438,522.1031482200623,577.9677734375]},{"page":48,"text":"of detail, accuracy, and fidelity.","rect":[133.1999969482422,598.5451049804688,260.14612793922427,589.491455078125]},{"page":48,"text":" Direct the execution of decisive operations with higher degrees of flexibility, adaptability,","rect":[115.19999694824219,611.9813842773438,521.9598486423492,602.927734375]},{"page":48,"text":"synchronization, and integration.","rect":[133.1999969482422,623.505126953125,264.9279272556305,614.4514770507813]},{"page":48,"text":" Lead the BCT to concentrate its strengths against enemy weakness.","rect":[115.19999694824219,636.94140625,402.5722143650055,627.8877563476563]},{"page":48,"text":" Assess progress through continuous reconnaissance, monitoring, and evaluation.","rect":[115.19999694824219,650.5014038085938,455.48182129859927,641.44775390625]},{"page":48,"text":" Modify existing or developing plans and reallocate BCT capabilities or units based on changing","rect":[115.19999694824219,663.94140625,522.0563549995422,654.8877563476563]},{"page":48,"text":"tactical situations.","rect":[133.1999969482422,673.5726928710938,205.28948426246644,666.531005859375]},{"page":48,"text":" Achieve tactical depth.","rect":[115.19999694824219,689.00146484375,225.226389169693,679.9677734375]},{"page":48,"text":" Identify and create options to seize, retain, and exploit the initiative.","rect":[115.19999694824219,702.46142578125,405.5521948337555,693.4077758789063]},{"page":48,"text":"3-2","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":48,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":48,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":49,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":49,"text":"3-8. Based on their initial understanding of the operational environment and the tactical situation, BCT and","rect":[108.0,83.50144958496094,540.0630078315735,74.44780731201172]},{"page":49,"text":"squadron commanders generate information requirements for the BCT and its organic Cavalry organizations.","rect":[108.0,95.02519226074219,540.090646982193,85.97154998779297]},{"page":49,"text":"Commanders visualize how the Cavalry squadron and other reconnaissance and security capabilities or units","rect":[108.0,106.42936706542969,540.0262344484329,97.37572479248047]},{"page":49,"text":"(including national-level intelligence assets, surveillance assets, joint enablers, and SOF) can work together","rect":[108.0,117.95310974121094,540.0757132158279,108.8895034790039]},{"page":49,"text":"to contribute to the overall success of the mission. The Cavalry squadron is the BCT commander’s primary","rect":[107.99996185302735,129.47679138183595,540.0508618354797,120.42314910888672]},{"page":49,"text":"unit to develop the situation and provide the combat information that ultimately refines subsequent courses","rect":[107.99994659423828,141.0005340576172,539.9073989992141,131.94688415527345]},{"page":49,"text":"of action for the BCT’s decisive operations. As a result, the BCT commander, working with the staff, the","rect":[107.99000549316406,152.52427673339845,540.0836780052185,143.4706268310547]},{"page":49,"text":"BCT S-3 (see chapter 1), and the Cavalry squadron commander, directs reconnaissance and security","rect":[107.9899673461914,164.04795837402345,540.0746655464172,154.9943084716797]},{"page":49,"text":"operations to address information requirements and intelligence gaps.","rect":[107.9899673461914,175.4521942138672,386.24247193336489,166.39854431152345]},{"page":49,"text":"3-9. Effective reconnaissance and security operations create opportunities that allow commanders to","rect":[107.98995208740235,192.97178649902345,540.0448803901672,183.9181365966797]},{"page":49,"text":"confirm or deny assumptions, make decisions, and take action. Commanders establish the CCIRs, and","rect":[107.98995208740235,204.4955291748047,539.9331860542297,195.44187927246095]},{"page":49,"text":"continuously update information requirements based on changing battlefield conditions. Commanders and","rect":[107.98999786376953,216.01927185058595,540.019184589386,206.9656219482422]},{"page":49,"text":"their staffs first identify information gaps and continuously assess, adapt, add, and delete requirements","rect":[107.99004364013672,227.54295349121095,540.1736343507766,218.4893035888672]},{"page":49,"text":"throughout the operation. As staffs identify requirements necessary for successful execution, they","rect":[107.99004364013672,239.0666961669922,540.0810132026672,230.01304626464845]},{"page":49,"text":"recommend and assign tasks for Cavalry units to conduct reconnaissance and provide answers that allow the","rect":[107.99004364013672,250.4708709716797,540.0946643333435,241.41722106933595]},{"page":49,"text":"commander to make timely and effective decisions. As commanders and staffs continuously plan, task, and","rect":[107.99006652832031,261.9945983886719,540.068012714386,252.9409637451172]},{"page":49,"text":"employ collection assets to answer the commander’s CCIRs and other information requirements, theymust—","rect":[107.99006652832031,273.5183410644531,539.995156288147,264.4647216796875]},{"page":49,"text":" Develop and continuously update a list of intelligence requirements.","rect":[133.1999969482422,286.9013671875,424.15775513648989,277.8477478027344]},{"page":49,"text":" Identify and update the CCIRs.","rect":[133.1999969482422,300.4613952636719,275.84940552711489,291.40777587890627]},{"page":49,"text":" Tie the CCIRs directly to the scheme of maneuver and decision points.","rect":[133.1999969482422,313.9013671875,434.48829102516177,304.8477478027344]},{"page":49,"text":" Limit the CCIRs to only critical intelligence and combat information needs.","rect":[133.1999969482422,327.4613952636719,454.170236825943,318.40777587890627]},{"page":49,"text":" Seek higher echelons’ collection of and answers to information requirements.","rect":[133.1999969482422,340.9013671875,461.2558081150055,331.8477478027344]},{"page":49,"text":" Ensure CCIRs include the latest time information is of value (LTIOV) to aid timely reporting and","rect":[133.1999969482422,354.3414001464844,540.055317401886,345.28778076171877]},{"page":49,"text":"decision-making.","rect":[151.20001220703126,365.9846496582031,220.40209412574769,356.9310302734375]},{"page":49,"text":"3-10. The commander sets reconnaissance and security priorities early, as reconnaissance and security","rect":[107.9935302734375,383.5042724609375,539.9337964057922,374.4506530761719]},{"page":49,"text":"operations precede main body movement, which minimizes the Cavalry unit’s time available for troop","rect":[107.99354553222656,394.9084777832031,540.180805683136,385.8548583984375]},{"page":49,"text":"leading procedures, including planning and rehearsal times, precombat checks and inspections, and","rect":[107.99354553222656,406.43218994140627,540.042377948761,397.3785705566406]},{"page":49,"text":"maintenance. The commander sets priorities in the warning order (WARNORD), establishing the focus,","rect":[107.99349975585938,417.9559326171875,539.9686987400055,408.9023132324219]},{"page":49,"text":"reconnaissance tempo, security duration, and engagement and disengagement criteria. Missions without focus","rect":[108.00346374511719,429.4796447753906,540.0493667726516,420.426025390625]},{"page":49,"text":"degrade the collection capabilities of the Cavalry unit. Improper utilization of assets can leave the force","rect":[108.00346374511719,441.00335693359377,540.0543200950623,431.9497375488281]},{"page":49,"text":"vulnerable or a catastrophic threat undiscovered.","rect":[108.00346374511719,452.5071716308594,299.0093786716461,443.47344970703127]},{"page":49,"text":"3-11. Reconnaissance and security operations are most effective when command and control elements","rect":[107.99349975585938,469.92718505859377,540.0973404054641,460.8735656738281]},{"page":49,"text":"integrate multiple combined arms and air-ground teams. Reconnaissance and security operations require","rect":[107.99349975585938,481.4508972167969,540.1239612083435,472.39727783203127]},{"page":49,"text":"quick dissemination and execution of orders. Reconnaissance leaders must be decisive, make plans quickly,","rect":[108.0034408569336,492.9746398925781,540.0844213962555,483.9210205078125]},{"page":49,"text":"pass information available to subordinates, report to higher headquarters accurately and rapidly, and be","rect":[108.0034408569336,504.4983215332031,540.1431872825623,495.4447021484375]},{"page":49,"text":"responsive to changing conditions on the battlefield.","rect":[108.0034408569336,516.0220947265625,317.2479956150055,506.96844482421877]},{"page":49,"text":"3-12. The following historical example illustrates the value of a flexible Cavalry force that directly","rect":[108.0034408569336,533.541748046875,539.9110913276672,524.4880981445313]},{"page":49,"text":"contributed to effective mission command. The operations of Napoleon’s cavalry corps during the","rect":[108.0034408569336,544.9459228515625,540.0911853294373,535.8922729492188]},{"page":49,"text":"1806 campaign against the Prussian Army demonstrate how cavalry, particularly when operating in close","rect":[107.99348449707031,556.4696655273438,540.0751941184998,547.416015625]},{"page":49,"text":"contact with the enemy and civilian populations, were essential in Napoleon’s successful campaign.","rect":[107.98353576660156,567.9933471679688,507.2958776950836,558.939697265625]},{"page":49,"text":"Napoleon’s Cavalry and Mission Command ","rect":[206.63999938964845,594.1799926757813,426.3599853515625,583.4759521484375]},{"page":49,"text":"On October 12, 1806, the French Cavalry swept through the little Saxon village of Zeitz,","rect":[131.39999389648438,611.7413940429688,498.5207006931305,602.687744140625]},{"page":49,"text":"25 miles south of Leipzig. Napoleon’s light cavalry, which was his principal cavalry force,","rect":[131.39999389648438,623.2614135742188,498.67423462867739,614.207763671875]},{"page":49,"text":"was executing an advanced guard forward of the lead corps of the Grande Armée. As the","rect":[131.39999389648438,634.7814331054688,498.54363894271855,625.727783203125]},{"page":49,"text":"cavalry secured the town, scouts and commanders immediately collected critical combat","rect":[131.39999389648438,646.1814575195313,498.67732727622987,637.1278076171875]},{"page":49,"text":"information for their emperor. Marshal Joachim Murat, Napoleon’s chief of cavalry, and his","rect":[131.39999389648438,657.701416015625,498.75389558124547,648.6477661132813]},{"page":49,"text":"staff halted temporarily to interrogate the local postmaster, priest, mayor, and essential","rect":[131.39999389648438,669.221435546875,498.61787903404237,660.1677856445313]},{"page":49,"text":"civilians concerning the location and disposition of the Prussian Army, key terrain features,","rect":[131.39999389648438,680.7413940429688,498.44117188453677,671.687744140625]},{"page":49,"text":"and critical civilian activities. In Zeitz, a French spy emerged from the crowd of onlookers","rect":[131.39999389648438,692.2614135742188,498.6301773195267,683.207763671875]},{"page":49,"text":"and reported that the enemy lay to the west and south, near Erfurt.","rect":[131.39999389648438,703.7814331054688,395.846018075943,694.727783203125]},{"page":49,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":49,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":49,"text":"3-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":50,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":50,"text":"A scout produced pen, paper, and a field desk from his kit, established a hasty command post","rect":[113.4000015258789,89.98143005371094,480.4999285945892,80.92778778076172]},{"page":50,"text":"and rapidly converted the spy’s initial report into multiple copies of an important message","rect":[113.4000015258789,101.50144958496094,480.6979053001404,92.44780731201172]},{"page":50,"text":"that contained the critical combat information that the reconnaissance organization knew","rect":[113.4000015258789,113.02140808105469,480.58848941230777,103.96776580810547]},{"page":50,"text":"their commander and the emperor needed. Murat approved the report and handed it to a series","rect":[113.4000015258789,124.40145111083985,480.66527253437047,115.36772918701172]},{"page":50,"text":"of riders who maneuvered along a series of connecting files that relayed the message","rect":[113.4000015258789,135.94139099121095,480.47677492904668,126.88774871826172]},{"page":50,"text":"to Napoleon.","rect":[113.4000015258789,147.4414825439453,165.08841919898988,138.4077606201172]},{"page":50,"text":"That night the report reached Napoleon. The emperor and his staff quickly analyzed the","rect":[113.4000015258789,167.98143005371095,480.6014392356873,158.9277801513672]},{"page":50,"text":"combat information, updated situation maps, and then, in a rush of rapid, harshly accented","rect":[113.4000015258789,179.50144958496095,480.5178418159485,170.4477996826172]},{"page":50,"text":"orders, updated the plan and issued a series of fragmentary orders. By the next morning, all","rect":[113.4000015258789,191.0214080810547,480.47798645591737,181.96775817871095]},{"page":50,"text":"of Napoleon’s subordinates received the same word; the enemy was massing to the west","rect":[113.4000015258789,202.42137145996095,480.66917908287049,193.3677215576172]},{"page":50,"text":"around Erfurt and Weimer. Two days later, elements of the Grande Armée, operating","rect":[113.4000015258789,213.94139099121095,480.70714235305788,204.8877410888672]},{"page":50,"text":"decentralized but still within mutual support, and taking advantage of the effective","rect":[113.4000015258789,225.46141052246095,480.6761767845154,216.4077606201172]},{"page":50,"text":"reconnaissance and security operations of its cavalry screen, crushed the Prussian Army in","rect":[113.4000015258789,236.98143005371095,480.68028688430788,227.9277801513672]},{"page":50,"text":"the battle of Jena-Auerstadt.","rect":[113.4000015258789,246.49948120117188,226.16712403297425,239.4477996826172]},{"page":50,"text":"SECTION II – COMMAND AND CONTROL","rect":[81.36000061035156,278.9040222167969,314.05203173828127,270.0240173339844]},{"page":50,"text":"3-13. Mission command is the Army’s approach to command and control. Command and control is the","rect":[90.0,302.26141357421877,522.1066272239685,293.2077941894531]},{"page":50,"text":"exercise of authority and direction by a properly designated commander over assigned and attached forces in","rect":[90.00999450683594,313.7851257324219,522.0740551948547,304.73150634765627]},{"page":50,"text":"the accomplishment of the mission (JP 1, Volume 2). Command and control alone does not destroy an enemy","rect":[90.00999450683594,325.3088684082031,522.076801776886,316.2552490234375]},{"page":50,"text":"force, secure an objective, or resupply an element. However, none of these activities could be coordinated","rect":[90.01994323730469,336.83258056640627,522.0539746284485,327.76898193359377]},{"page":50,"text":"towards a common objective, or synchronized to achieve the maximum effect, without effective command","rect":[90.01994323730469,348.2367858886719,521.968159198761,339.1731872558594]},{"page":50,"text":"and control. The countless activities a military force must perform gain purpose and direction executing","rect":[90.01994323730469,359.760498046875,521.977192401886,350.7068786621094]},{"page":50,"text":"command and control. The ultimate goal of command and control is mission accomplishment.","rect":[90.02989959716797,371.2842102050781,466.674387216568,362.2305908203125]},{"page":50,"text":"3-14. The operations process is the Army’s framework for organizing and putting command and control into","rect":[90.02989959716797,388.8038635253906,521.968159198761,379.750244140625]},{"page":50,"text":"action. The operations process consists of major command and control activities performed during","rect":[90.02989959716797,400.32757568359377,522.0539746284485,391.26397705078127]},{"page":50,"text":"reconnaissance and security operations (planning, preparing, executing, and continuously assessing). To","rect":[90.01991271972656,411.7317810058594,522.103901386261,402.67816162109377]},{"page":50,"text":"function effectively and have the greatest chance for successful mission accomplishment, commanders,","rect":[90.01991271972656,423.2554931640625,522.1417334079742,414.2018737792969]},{"page":50,"text":"supported by their staffs, employ the operations process to drive both conceptual and detailed planning.","rect":[90.01991271972656,434.7792053222656,522.1145117282867,425.7255859375]},{"page":50,"text":"Conceptual and detailed planning is necessary to understand, visualize, and describe their operational","rect":[90.01991271972656,446.30291748046877,522.1587115535737,437.2492980957031]},{"page":50,"text":"environment; make and articulate decisions; and direct, lead, and assess military operations.","rect":[90.01991271972656,457.8266296386719,457.6515600681305,448.77301025390627]},{"page":50,"text":"3-15. The operations process and reconnaissance and security operations are mutually dependent. Just as the","rect":[90.01991271972656,475.3462829589844,522.0072009544373,466.29266357421877]},{"page":50,"text":"planning, preparation, and assessment of the operations process informs and directs reconnaissance and","rect":[90.01991271972656,486.75048828125,522.1026196479797,477.6968688964844]},{"page":50,"text":"security operations, the BCTs and squadrons conduct reconnaissance operations during all phases of the","rect":[90.01991271972656,498.2742004394531,522.0033557395935,489.2205810546875]},{"page":50,"text":"operations process. The BCTs and squadrons provide the necessary information to complete plans,","rect":[90.01991271972656,509.79791259765627,522.0946142673492,500.7442932128906]},{"page":50,"text":"preparations, adjust the execution of operations, and provide further assessments of the tactical situation and","rect":[90.01988983154297,521.3216552734375,521.954731464386,512.258056640625]},{"page":50,"text":"the operational environment. The activities of the operations process are not discrete; planning, preparing,","rect":[90.01990509033203,532.8453979492188,522.0759375095367,523.791748046875]},{"page":50,"text":"executing, and continuously assessing the operation overlap and recur as the circumstances of the tactical","rect":[90.0199203491211,544.3690795898438,521.9183551082612,535.3154296875]},{"page":50,"text":"situation and operational environment demand. Planning starts an iteration of the operations process. Upon","rect":[90.01992797851563,555.7733154296875,522.196674823761,546.7196655273438]},{"page":50,"text":"completion of the initial order, planning continues as leaders revise the plan based on changing circumstances","rect":[90.00997161865235,567.2970581054688,522.0611465578079,558.243408203125]},{"page":50,"text":"(and timely reports from Cavalry units). Preparing begins during the planning and continues through","rect":[90.00997161865235,578.8207397460938,522.1892895698547,569.76708984375]},{"page":50,"text":"execution. Execution puts a plan into action by applying combat power to gain a position of relative","rect":[90.00997161865235,590.3444213867188,522.130675075531,581.290771484375]},{"page":50,"text":"advantage. (Refer to ADP 5-0 for more information.)","rect":[90.00997161865235,601.8682250976563,302.4766836748123,592.8145751953125]},{"page":50,"text":"OPERATIONS PROCESS","rect":[72.0,627.090576171875,232.82117833328247,617.3749389648438]},{"page":50,"text":"3-16. Commanders and staffs use the operations process to integrate numerous tasks executed by the BCT’s","rect":[90.0,647.3814086914063,521.9166763429641,638.3277587890625]},{"page":50,"text":"organic Cavalry organizations and other subordinate units. Commanders must organize and train their staffs","rect":[90.0,658.78564453125,522.1508072023391,649.7319946289063]},{"page":50,"text":"and subordinates as an integrated team to plan, prepare, execute, and assess reconnaissance and security","rect":[90.0,670.309326171875,522.105854511261,661.2556762695313]},{"page":50,"text":"operations while simultaneously planning, preparing, and assessing the BCT’s decisive operations.","rect":[90.0,681.8330688476563,485.2479040622711,672.7794189453125]},{"page":50,"text":"3-17. In addition to the principles of mission command, commanders and staffs consider the following to","rect":[90.0,699.3527221679688,522.0559277534485,690.299072265625]},{"page":50,"text":"employ the operations process effectively:","rect":[90.0,710.8764038085938,259.4484149227142,701.82275390625]},{"page":50,"text":"3-4","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":50,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":50,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":51,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":51,"text":" Commanders drive the operations process.","rect":[133.1999969482422,83.3614730834961,321.44523072242739,74.32775115966797]},{"page":51,"text":" Commanders and staffs actively collaborate to plan, prepare, execute, and assess operations.","rect":[133.1999969482422,96.94139099121094,520.2052099704742,87.88774871826172]},{"page":51,"text":" Commanders and staffs build and maintain situational understanding.","rect":[133.1999969482422,110.38139343261719,428.9655249118805,101.32775115966797]},{"page":51,"text":" Commanders and staffs apply critical and creative thinking.","rect":[133.1999969482422,123.94139099121094,390.2101538181305,114.88774871826172]},{"page":51,"text":"COMMANDERS DRIVE THE OPERATIONS PROCESS","rect":[90.0,147.28799438476563,335.1494197845459,138.99600219726563]},{"page":51,"text":"3-18. The commander is the central figure in the operations process. While the staff performs essential","rect":[108.0,167.2613983154297,540.1007281551362,158.20774841308595]},{"page":51,"text":"functions that amplify the effectiveness of operations, the commander is ultimately responsible for","rect":[108.0,178.78514099121095,540.0361624345779,169.7314910888672]},{"page":51,"text":"accomplishing assigned missions.","rect":[108.0,190.30882263183595,243.33045411109925,181.2551727294922]},{"page":51,"text":"3-19. Commanders encourage disciplined initiative through a clear commander’s intent while providing","rect":[108.0,207.82847595214845,539.9638867378235,198.7748260498047]},{"page":51,"text":"enough direction to integrate and synchronize the force at the decisive place and time during reconnaissance","rect":[108.0,219.23265075683595,540.099913356781,210.1790008544922]},{"page":51,"text":"and security operations. Early dissemination of intent is important as Cavalry operations precede main body","rect":[108.0,230.7563934326172,540.0639843940735,221.70274353027345]},{"page":51,"text":"movement and the conduct of decisive operations. The commander relies upon subordinates to respond","rect":[108.0,242.2602081298828,540.092915058136,233.2264862060547]},{"page":51,"text":"quickly to mission-type orders and to execute disciplined initiative. Figure 3-3, page 3-15 providesa","rect":[108.0,253.80381774902345,540.1046740989685,244.7501678466797]},{"page":51,"text":"graphical depiction of how the commander’s primary tasks are aligned with elements of reconnaissance and","rect":[108.0,265.3276062011719,540.0529980659485,256.27392578125]},{"page":51,"text":"security planning. To this end, the commander performs six primary tasks. (Refer to ADP 5-0 for additional","rect":[108.00000762939453,276.8512268066406,540.1305743465424,267.797607421875]},{"page":51,"text":"information.) These tasks are to—","rect":[108.00003814697266,288.2355651855469,244.92017459869386,279.20184326171877]},{"page":51,"text":" Understand.","rect":[133.1999969482422,299.66943359375,199.88945984840394,292.6077880859375]},{"page":51,"text":" Visualize.","rect":[133.1999969482422,313.2194519042969,191.3686773777008,306.16778564453127]},{"page":51,"text":" Describe.","rect":[133.1999969482422,326.6495056152344,189.21732544898988,319.6077880859375]},{"page":51,"text":" Direct.","rect":[133.1999969482422,340.2095031738281,178.64975953102113,333.16778564453127]},{"page":51,"text":" Lead.","rect":[133.1999969482422,353.6495056152344,173.7295172214508,346.6077880859375]},{"page":51,"text":" Assess.","rect":[133.1999969482422,367.2095031738281,180.80112671852113,360.33709716796877]},{"page":51,"text":"Understand","rect":[90.0,391.6055908203125,145.8060866584778,384.13153076171877]},{"page":51,"text":"3-20. Understanding is fundamental to the commander’s ability to establish a situation’s context. Moreover,","rect":[108.0,411.4613952636719,539.9665014743805,402.40777587890627]},{"page":51,"text":"understanding is essential to effective decision-making during planning and execution. Analysis provides the","rect":[108.0,422.8656005859375,539.986143825531,413.8119812011719]},{"page":51,"text":"information used to develop understanding and frame the tactical problem in the context of the operational","rect":[108.0,434.3893127441406,540.0989581356049,425.3356628417969]},{"page":51,"text":"environment. In addition, detailed planning assists commanders in developing their initial understanding of","rect":[108.0,445.91302490234377,540.0787649736404,436.8594055175781]},{"page":51,"text":"the operational environment and the tactical challenges further. To develop better understandings of","rect":[108.00997161865235,457.436767578125,540.0848074541092,448.3831481933594]},{"page":51,"text":"operational environments, as well as the specific characteristics of mission variables of METT-TC (I),","rect":[108.01000213623047,468.94061279296877,540.1046240329742,459.9068603515625]},{"page":51,"text":"commanders circulate within their areas of operations and collaborate and consult with subordinate","rect":[108.01000213623047,480.46429443359377,540.087706325531,471.4305725097656]},{"page":51,"text":"commanders, Soldiers, and key staff officers (such as the BCT S-3 outlined in chapter 1). Using their own","rect":[108.00997161865235,491.8883972167969,540.0578198432922,482.83477783203127]},{"page":51,"text":"training, experience, education, and inputs from others (including running estimates from the staff and unified","rect":[108.0,503.412109375,540.0727734565735,494.3584899902344]},{"page":51,"text":"action partners), commanders improve their understandings of operational environments and specific tactical","rect":[108.00997161865235,514.9358520507813,540.0508624324799,505.8822021484375]},{"page":51,"text":"problems throughout the operations process.","rect":[108.01994323730469,526.4595947265625,285.46525025367739,517.4059448242188]},{"page":51,"text":"3-21. Reconnaissance and security operations, as part of the BCT’s information collection efforts, are","rect":[108.01994323730469,543.9791870117188,540.1823718528748,534.925537109375]},{"page":51,"text":"indispensable to building and improving the commander’s understanding of the situation. As commanders","rect":[108.01995086669922,555.3834228515625,540.0558364992141,546.3297729492188]},{"page":51,"text":"refine their understanding, they must quickly formulate the CCIRs, keep them current, determine where to","rect":[108.01994323730469,566.9071655273438,540.0797924995422,557.853515625]},{"page":51,"text":"place key personnel, and arrange for liaison teams to contribute further to improving the commander’s","rect":[108.01994323730469,578.4308471679688,540.1117447023391,569.377197265625]},{"page":51,"text":"understanding. In short, greater understanding of the situation enables commanders to make better decisions","rect":[108.01994323730469,589.9545288085938,540.1992080812454,580.90087890625]},{"page":51,"text":"throughout the conduct of operations.","rect":[108.0298843383789,601.478271484375,258.2365515232086,592.4246215820313]},{"page":51,"text":"Visualize","rect":[90.0,623.7945556640625,132.82746493911743,616.1549072265625]},{"page":51,"text":"3-22. As commanders begin to understand their operational environment and the tactical problem, they","rect":[108.0,643.5414428710938,540.0908398628235,634.48779296875]},{"page":51,"text":"visualize potential solutions and their desired end state. A commander’s visualization is the mental process","rect":[108.0,655.045166015625,540.1663711671829,646.011474609375]},{"page":51,"text":"of developing situational understanding, determining a desired end state, and envisioning an operational","rect":[107.99996185302735,666.5888671875,540.1414386043549,657.5352172851563]},{"page":51,"text":"approach by which the force will achieve that end state (ADP 6-0). The process of commander’s visualization","rect":[107.99996185302735,677.9930419921875,540.0946850776672,668.9393920898438]},{"page":51,"text":"applies to both the BCT’s primary mission (its decisive operation) as well as the collective visualization of","rect":[108.00991821289063,689.5167846679688,540.0403128252029,680.463134765625]},{"page":51,"text":"reconnaissance and security operations that influence the BCT’s decisive operations.","rect":[108.00991821289063,701.0404663085938,446.8620398044586,691.98681640625]},{"page":51,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":51,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":51,"text":"3-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":52,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":52,"text":"3-23. Close collaboration between the BCT commander and the Cavalry squadron commander, as well as","rect":[90.0,83.50144958496094,521.8975113039016,74.44780731201172]},{"page":52,"text":"close synchronization between the BCT staff and the squadron staff, are critical to developing the BCT’s","rect":[90.00001525878906,95.02519226074219,521.9774063234329,85.97154998779297]},{"page":52,"text":"visualization of reconnaissance and security operations. (Refer to ADP 5-0 for more information.)","rect":[90.00001525878906,106.42936706542969,522.0668631181717,97.37572479248047]},{"page":52,"text":"Assignment of a mission focused on specific reconnaissance and security objectives provides the focus for","rect":[90.00003814697266,117.95310974121094,522.0491629228592,108.8895034790039]},{"page":52,"text":"developing the commander’s visualization that, in turn, provides the basis for developing plans and orders.","rect":[90.00003814697266,129.47679138183595,522.0900976657867,120.42314910888672]},{"page":52,"text":"During preparation and execution, the commander’s visualization helps commanders (and their subordinates)","rect":[90.00003814697266,141.0005340576172,522.0940237627029,131.94688415527345]},{"page":52,"text":"make timely decisions as they adapt to changing conditions and the updated information reports produced by","rect":[90.00003814697266,152.52427673339845,522.0669751167297,143.4706268310547]},{"page":52,"text":"the BCT’s reconnaissance and security operations.","rect":[90.00003814697266,164.04795837402345,292.18812012672427,154.9943084716797]},{"page":52,"text":"Describe","rect":[72.0,186.38351440429688,113.02685153579712,178.75486755371095]},{"page":52,"text":"3-24. After commanders visualize an operation, they describe it to their staffs and subordinates to facilitate","rect":[90.0,206.1414031982422,521.9515979270935,197.08775329589845]},{"page":52,"text":"shared understanding and purpose. During planning, commanders ensure subordinates understand their","rect":[90.0,217.66514587402345,522.0838919267654,208.6114959716797]},{"page":52,"text":"visualization well enough to begin course of action development. During execution, commanders describe","rect":[90.0,229.06932067871095,522.226134059906,220.0156707763672]},{"page":52,"text":"modifications to their visualization; modifications informed by continuous reconnaissance and security","rect":[90.00003814697266,240.5930633544922,522.1924023628235,231.53941345214845]},{"page":52,"text":"operations in updated planning guidance and directives resulting in fragmentary orders that adjust the unit’s","rect":[90.00999450683594,252.1167449951172,522.1434829835891,243.0531463623047]},{"page":52,"text":"mission. Commanders describe their visualization in doctrinal terms refining and clarifying their","rect":[90.00999450683594,263.6404724121094,522.1177054033279,254.5868377685547]},{"page":52,"text":"visualization, as circumstances require. Commanders express their visualization in terms of—","rect":[90.00999450683594,275.1443176269531,465.4920434951782,266.110595703125]},{"page":52,"text":" Commander’s intent.","rect":[115.19999694824219,286.5794372558594,217.769357919693,279.52777099609377]},{"page":52,"text":" Planning guidance.","rect":[115.19999694824219,302.0213928222656,209.9686987400055,292.9677734375]},{"page":52,"text":" CCIR.","rect":[115.19999694824219,313.5794372558594,158.98046326637269,306.69708251953127]},{"page":52,"text":" Essential element of friendly information (EEFI).","rect":[115.19999694824219,329.0213928222656,330.90101075172427,319.9677734375]},{"page":52,"text":" Reconnaissance and security guidance.","rect":[115.19999694824219,342.5813903808594,289.4365026950836,333.52777099609377]},{"page":52,"text":"Commander’s Intent","rect":[72.00575256347656,364.0950012207031,157.68364441490173,357.212646484375]},{"page":52,"text":"3-25. Commander’s intent is a clear and concise expression of the purpose of the operation and the desired","rect":[90.00347900390625,383.5966796875,521.9527173042297,374.5629577636719]},{"page":52,"text":"military end state that supports mission command and provides focus to the staff. Commander’s intent assists","rect":[90.00346374511719,395.14031982421877,522.0472915773391,386.0867004394531]},{"page":52,"text":"subordinate and supporting commanders in achieving the commander’s desired results without further orders,","rect":[90.0034408569336,406.6640319824219,522.0981543064117,397.61041259765627]},{"page":52,"text":"even when the operation does not unfold as planned. (Refer to JP 3-0 and ADP 5-0 for more information.)","rect":[90.00349426269531,418.04833984375,514.3971243486404,409.0146179199219]},{"page":52,"text":"3-26. The commander’s intent statement describes what constitutes success for the reconnaissance and","rect":[90.00347900390625,433.5759582519531,522.1052441596985,426.53424072265627]},{"page":52,"text":"security operation including the operation’s purpose, key tasks, and the conditions that define the end state.","rect":[90.00347900390625,447.1116027832031,522.0653784275055,438.0579833984375]},{"page":52,"text":"Intent links the mission, concept of operations, and tasks to subordinate units. A clear commander’s intent","rect":[90.00347900390625,458.61541748046877,521.9768267879487,449.5816955566406]},{"page":52,"text":"facilitates a shared understanding and focuses on the overall conditions that represent mission","rect":[90.00347900390625,470.1590270996094,521.9441113471985,461.10540771484377]},{"page":52,"text":"accomplishment. During execution, the commander’s intent spurs disciplined initiative.","rect":[90.00350189208985,481.563232421875,440.23490357398989,472.5096130371094]},{"page":52,"text":"3-27. The commander’s intent must be easy to remember and clearly understood by commanders and staff","rect":[89.99351501464844,499.0828552246094,522.0417166337967,490.02923583984377]},{"page":52,"text":"two echelons lower in the chain of command. (Refer to ADP 5-0 for a detailed discussion of writing the","rect":[89.99351501464844,510.6065979003906,522.0801990013123,501.552978515625]},{"page":52,"text":"commander’s intent statement.) The more concise the commander’s intent, the easier it is for everyone to","rect":[89.98355102539063,522.1303100585938,522.0407910346985,513.07666015625]},{"page":52,"text":"recall and understand. Commanders develop and personalize their intent statement using the following components:","rect":[89.98360443115235,533.654052734375,522.1121417293549,524.6004028320313]},{"page":52,"text":" Expanded purpose.","rect":[115.19999694824219,547.0414428710938,209.96671509742738,538.0077514648438]},{"page":52,"text":" Key tasks.","rect":[115.19999694824219,560.5014038085938,174.80291199684144,551.44775390625]},{"page":52,"text":" End state.","rect":[115.19999694824219,572.0494384765625,172.64757752418519,565.0077514648438]},{"page":52,"text":"3-28. When describing the expanded purpose of the reconnaissance and security operation, the commander’s","rect":[90.00347137451172,591.5810546875,522.0446670656204,582.5274047851563]},{"page":52,"text":"intent does not restate the why of the mission statement. Rather, it addresses the broader purpose of the","rect":[90.00347137451172,603.1047973632813,521.9809558372498,594.0511474609375]},{"page":52,"text":"operation and its relationship to the force as a whole. Often, the commander’s intent incorporates how the","rect":[90.00347137451172,614.6085205078125,522.0882556419373,605.5748291015625]},{"page":52,"text":"operation relates to one or more of the fundamentals of reconnaissance and security. The commander’s intent","rect":[89.99354553222656,626.1522216796875,522.1441851863862,617.0985717773438]},{"page":52,"text":"clearly conveys the expanded purpose of an operation.","rect":[89.99354553222656,637.556396484375,307.769846200943,628.5027465820313]},{"page":52,"text":"3-29. Key tasks are those significant activities the force must perform as a whole to achieve the desired end","rect":[90.00350189208985,655.0760498046875,522.0795483589172,646.0223999023438]},{"page":52,"text":"state (ADP 6-0). Key tasks are not specified tasks for a subordinate unit; however, they may be sources of","rect":[89.99354553222656,666.5997924804688,522.0533743486404,657.546142578125]},{"page":52,"text":"implied tasks. During execution when significant opportunities present themselves or the concept of","rect":[89.99354553222656,678.1234741210938,522.0685721025467,669.06982421875]},{"page":52,"text":"operations no longer fits the situation, subordinates use key tasks to keep their efforts focused on achieving","rect":[89.99354553222656,689.647216796875,522.0298047065735,680.5935668945313]},{"page":52,"text":"the desired end state.","rect":[89.99354553222656,699.158935546875,173.85672974586488,692.1172485351563]},{"page":52,"text":"3-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":52,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":52,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":53,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":53,"text":"3-30. The end state is a set of desired future conditions the commander wants to exist when an operation","rect":[108.0,83.48152923583985,540.0590405464172,74.44780731201172]},{"page":53,"text":"concludes. Commanders describe the operation’s end state by stating the desired conditions of the friendly","rect":[108.0,95.02519226074219,539.902729511261,85.97154998779297]},{"page":53,"text":"force in relationship to desired conditions of the enemy, terrain, other friendly forces, and civil considerations.","rect":[108.0,106.42936706542969,540.1109716892242,97.37572479248047]},{"page":53,"text":"A clearly defined end state promotes unity of effort among the force and with unified action partners.","rect":[108.0,117.95310974121094,513.2067663669586,108.89946746826172]},{"page":53,"text":"Planning Guidance","rect":[90.00228881835938,141.4686737060547,170.7330920677185,132.5843505859375]},{"page":53,"text":"3-31. Commanders provide planning guidance to the staff based upon their visualization of the current","rect":[108.00001525878906,158.98826599121095,540.1685382137299,149.9346160888672]},{"page":53,"text":"situation, their experience, and their professional military judgment. Planning guidance reflects how the","rect":[108.00001525878906,170.5120086669922,540.2450549583435,161.4484100341797]},{"page":53,"text":"commander sees the operation unfolding with sufficient detail, context, and clarity. Planning guidance","rect":[108.00001525878906,182.0356903076172,540.0021960716248,172.98204040527345]},{"page":53,"text":"broadly describes when, where, and how the commander intends to employ combat power to accomplish the","rect":[108.00001525878906,193.43992614746095,540.221495388031,184.3862762451172]},{"page":53,"text":"mission within the higher commander’s intent. Broad and general guidance gives the staff and subordinate","rect":[108.00001525878906,204.96360778808595,540.064024684906,195.9099578857422]},{"page":53,"text":"leaders maximum latitude, which allows the BCT staff and the Cavalry squadron staff to develop flexible","rect":[108.00001525878906,216.4873504638672,540.0659167747498,207.43370056152345]},{"page":53,"text":"and effective options in parallel, simultaneous, and complementary efforts. Leaders within the BCT’s Cavalry","rect":[108.00005340576172,228.0110321044922,539.815815448761,218.95738220214845]},{"page":53,"text":"organizations, the leaders who execute the reconnaissance and security missions in support of the BCT, must","rect":[108.00003814697266,239.53477478027345,540.0120440731049,230.4811248779297]},{"page":53,"text":"clearly understand the BCT commander’s planning guidance so they know what and when to report as they","rect":[108.00003814697266,251.0585174560547,539.922504901886,242.00486755371095]},{"page":53,"text":"identify combat information, fill information gaps, and answer PIRs.","rect":[108.0,262.4626770019531,382.5374548435211,253.40904235839845]},{"page":53,"text":"Commander’s Information Collection Effort","rect":[90.00227355957031,285.9782409667969,273.6008807430267,277.09393310546877]},{"page":53,"text":"3-32. The commander’s information collection effort answers CCIRs (specifically PIRs and FFIRs).","rect":[107.99998474121094,303.4978942871094,539.839670419693,294.44427490234377]},{"page":53,"text":"Figure 3-1 illustrates the key doctrinal terms and definitions used throughout this manual.","rect":[107.99000549316406,315.0216369628906,466.7492163181305,305.968017578125]},{"page":53,"text":"Figure 3-1. CCIR and EEFI breakdown","rect":[225.458251953125,524.719482421875,404.3328744764328,515.386962890625]},{"page":53,"text":"3-33. A commander’s critical information requirement is specific information identified by the commander","rect":[107.97010040283203,542.2988891601563,540.0438528642654,533.2452392578125]},{"page":53,"text":"as being essential to facilitate timely decision making (JP 3-0). The CCIRs consist of PIRs focused on the","rect":[107.9701156616211,553.8226318359375,540.161436794281,544.7689819335938]},{"page":53,"text":"adversary and environment, FFIRs focused on friendly forces and supporting capabilities, and EEFI.","rect":[107.94023132324219,565.3463745117188,481.9582006931305,556.292724609375]},{"page":53,"text":"3-34. A priority intelligence requirement is an intelligence requirement that the commander and staff need","rect":[107.95020294189453,582.7464599609375,540.004047870636,573.6928100585938]},{"page":53,"text":"to understand the threat and other aspects of the operational environment (JP 2-0). PIRs identify information","rect":[107.95021057128906,594.2702026367188,540.002094745636,585.216552734375]},{"page":53,"text":"about the enemy, terrain, weather, and civil considerations the commander considers most important and","rect":[107.95018768310547,605.7939453125,539.9534497261047,596.7402954101563]},{"page":53,"text":"impact on future decisions. Normally, PIRs are tied to either an NAI or a TAI. PIRs become the central","rect":[107.95018768310547,617.3176879882813,539.8476763973237,608.2640380859375]},{"page":53,"text":"focus for the Cavalry organizations conducting the BCT’s reconnaissance and security operations.","rect":[107.95022583007813,628.8414306640625,540.0409033298492,619.7877807617188]},{"page":53,"text":"LTIOV is the time that the planning Staff needs information collected in order to answer PIR and inform the","rect":[107.95022583007813,640.3651123046875,540.056212184906,631.3114624023438]},{"page":53,"text":"commander to make a decision. Therefore, LTIOV is the primary planning factor when determining the","rect":[107.95022583007813,651.7693481445313,540.0530993919373,642.7156982421875]},{"page":53,"text":"reconnaissance tempo for information collection operations and will dictate the level of detail to be collected","rect":[107.95022583007813,663.2731323242188,539.8755688667297,654.2394409179688]},{"page":53,"text":"and the stealth required (see ATP 2-01).","rect":[107.95022583007813,674.796875,268.2394812107086,665.76318359375]},{"page":53,"text":"3-35. A friendly force information requirement is information the commander and staff need to understand","rect":[107.95022583007813,692.33642578125,540.0051465034485,683.2827758789063]},{"page":53,"text":"the status of friendly force and supporting capabilities (JP 3-0). FFIRs identify the information about the","rect":[107.95024871826172,703.8601684570313,540.0180041770935,694.8065185546875]},{"page":53,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":53,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":53,"text":"3-7","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":54,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":54,"text":"mission, troops and support available, and time available for friendly forces that the commander considers","rect":[90.0,83.50144958496094,522.1197403078079,74.44780731201172]},{"page":54,"text":"most important.","rect":[90.0,95.0052719116211,153.44620728492738,85.97154998779297]},{"page":54,"text":"3-36. Essential element of friendly information is a critical aspect of a friendly operation that, if known by a","rect":[90.0,112.42527770996094,522.0986316184998,103.37163543701172]},{"page":54,"text":"threat would subsequently compromise, lead to failure, or limit success of the operation and therefore should","rect":[90.0,123.94902038574219,522.057758808136,114.89537811279297]},{"page":54,"text":"be protected from enemy detection (ADP 6-0). Although EEFIs are not CCIRs, they have the same priority.","rect":[89.99004364013672,135.4727020263672,522.0678808689117,126.41905975341797]},{"page":54,"text":"EEFIs establish elements of information to protect rather than elements of information to seek or collect.","rect":[89.99004364013672,146.9765167236328,522.0807592868805,137.9427947998047]},{"page":54,"text":"EEFI identification is central to prioritizing units, information, or activities focusing on security tasks.","rect":[89.99008178710938,158.5201873779297,522.0717871189117,149.46653747558595]},{"page":54,"text":"Cavalry units’ use of operations security process develop EEFI associated with unit operations, capabilities,","rect":[89.9801254272461,170.0438690185547,521.9403784275055,160.99021911621095]},{"page":54,"text":"activities, limitations, and intentions that require protection.","rect":[89.9801254272461,181.4281768798828,329.22928833961489,172.3944549560547]},{"page":54,"text":"3-37. A CCIR directly influences decision-making and facilitates the successful execution of flexible","rect":[89.9801254272461,198.9676971435547,521.9858386497498,189.91404724121095]},{"page":54,"text":"military operations or decision point tactics. Commanders decide to designate an information requirement as","rect":[89.97010040283203,210.49143981933595,522.1229141359329,201.4377899169922]},{"page":54,"text":"a CCIR based on probable decisions and their visualization of the course of the operation. During planning,","rect":[89.97012329101563,222.0151824951172,522.0559179782867,212.96153259277345]},{"page":54,"text":"staffs recommend information requirements for commanders to designate as CCIRs. During preparation and","rect":[89.97013854980469,233.5388641357422,522.0312695503235,224.48521423339845]},{"page":54,"text":"execution, both the BCT and the Cavalry squadron staff may recommend changes to CCIRs based on","rect":[89.97013854980469,245.06260681152345,522.060200214386,236.0089569091797]},{"page":54,"text":"assessments. A CCIR is—","rect":[89.97013854980469,254.46481323242188,195.44654178619386,247.4131317138672]},{"page":54,"text":"","rect":[115.19999694824219,267.1410827636719,121.2058769197464,262.41357421875]},{"page":54,"text":"","rect":[115.19999694824219,280.70111083984377,121.2058769197464,275.9736022949219]},{"page":54,"text":"","rect":[115.19999694824219,305.6611022949219,121.2058769197464,300.93359375]},{"page":54,"text":"","rect":[115.19999694824219,330.7411193847656,121.2058769197464,326.01361083984377]},{"page":54,"text":"","rect":[115.19999694824219,344.18109130859377,121.2058769197464,339.4535827636719]},{"page":54,"text":"Specified by a commander for a specific operation.","rect":[133.1999969482422,269.8613586425781,337.666818857193,260.8077392578125]},{"page":54,"text":"Applicable ","rect":[133.1999969482422,283.4014892578125,179.60961365699769,274.3677673339844]},{"page":54,"text":"only ","rect":[184.67926025390626,283.42138671875,204.92794251441956,274.3677673339844]},{"page":54,"text":"to ","rect":[209.99757385253907,282.0,220.28724122047425,275.36376953125]},{"page":54,"text":"the ","rect":[225.3568878173828,282.0,239.96720337867738,274.3677673339844]},{"page":54,"text":"commander ","rect":[245.03683471679688,282.0,294.68641114234927,274.3677673339844]},{"page":54,"text":"who ","rect":[299.75604248046877,282.0,319.52567505836489,274.3677673339844]},{"page":54,"text":"specifies ","rect":[324.5953369140625,283.4014892578125,362.0051062107086,274.3677673339844]},{"page":54,"text":"it ","rect":[367.07476806640627,282.0,374.96509766578677,274.3677673339844]},{"page":54,"text":"(or ","rect":[380.03472900390627,283.4014892578125,394.28553223609927,274.3677673339844]},{"page":54,"text":"reconnaissance and security tasks to support the commander).","rect":[133.1999969482422,294.9450988769531,380.36832642555239,285.8914794921875]},{"page":54,"text":"Situation dependent, directly linked to a current mission or a decision that will create a new","rect":[133.1999969482422,308.3813781738281,522.1439398517608,299.3277587890625]},{"page":54,"text":"mission, branch, or sequel to the current mission.","rect":[133.20994567871095,320.0047302246094,329.85416626930239,310.97100830078127]},{"page":54,"text":"Time-sensitive.","rect":[133.1999969482422,331.4494934082031,195.07850098609925,324.40777587890627]},{"page":54,"text":"A design and planning requirement.","rect":[133.1999969482422,346.9013671875,276.80823731422427,337.8477478027344]},{"page":54,"text":"3-38. BCT commanders prioritize and limit the number of CCIRs to focus Cavalry assets to support BCT","rect":[90.00347137451172,364.4210205078125,522.0792734022141,355.3674011230469]},{"page":54,"text":"operations. With fewer prioritized CCIRs, subordinate units can apply greater concentrations of combat","rect":[90.00349426269531,375.9447326660156,522.1549884090424,366.89111328125]},{"page":54,"text":"power and reconnaissance focus to each information requirement. At the same time, fewer prioritized CCIRs","rect":[89.99354553222656,387.44854736328127,521.9658706789016,378.4148254394531]},{"page":54,"text":"facilitate timely and accurate reporting and provide the commander with the required information sooner.","rect":[89.99354553222656,398.9921569824219,511.51990723609927,389.93853759765627]},{"page":54,"text":"3-39. Throughout an operation, the list of CCIRs constantly changes. BCT commanders, through their staffs,","rect":[89.99354553222656,416.5118103027344,522.0802099704742,407.45819091796877]},{"page":54,"text":"effective liaison teams, the tactical network, and direct communications with their subordinate commanders","rect":[90.0035171508789,426.0,522.1432388429641,418.8623962402344]},{"page":54,"text":"constantly refine and develop their information requirements. Commanders can add and delete CCIRs based","rect":[90.0035171508789,439.4397277832031,521.8352246284485,430.3861083984375]},{"page":54,"text":"on the information needed for specific decisions.","rect":[90.00349426269531,450.94354248046877,285.20951294898989,441.9098205566406]},{"page":54,"text":"Commander’s Reconnaissance and Security Guidance","rect":[71.99581909179688,474.47900390625,296.36373781967168,465.5946960449219]},{"page":54,"text":"3-40. Reconnaissance and security operations are enduring missions conducted by Cavalry units; therefore,","rect":[89.99352264404297,491.9986267089844,522.0832617282867,482.94500732421877]},{"page":54,"text":"commanders provide clear reconnaissance and security guidance that enables freedom of action to develop","rect":[89.99354553222656,503.5223693847656,522.1728711128235,494.46875]},{"page":54,"text":"the situation and adequate direction to ensure their organic Cavalry organizations can accomplish stated","rect":[89.99352264404297,514.9265747070313,522.0933423042297,505.8729248046875]},{"page":54,"text":"reconnaissance and security objectives within the required timeframe. The commander’s reconnaissance and","rect":[89.99351501464844,526.4503173828125,522.091450214386,517.38671875]},{"page":54,"text":"security planning guidance is nested with the higher commander’s intent. The reconnaissance and security","rect":[89.98356628417969,537.9739990234375,522.0166211128235,528.9203491210938]},{"page":54,"text":"guidance provides a clear understanding of the Cavalry organization’s task, purpose, objective, and how the","rect":[89.98356628417969,549.4977416992188,522.0864245872498,540.4341430664063]},{"page":54,"text":"Cavalry organization will effectively answer information requirements on enemy and terrain to enable the","rect":[89.98356628417969,561.0214233398438,521.9270007591248,551.9677734375]},{"page":54,"text":"higher commander to make timely decisions.","rect":[89.98356628417969,572.545166015625,269.950754404068,563.4915161132813]},{"page":54,"text":"3-41. Reconnaissance guidance explains the focus, reconnaissance tempo, and guidelines for engagement.","rect":[89.98356628417969,589.9452514648438,522.0683081150055,580.8916015625]},{"page":54,"text":"The commander develops the planning guidance based on the BCT mission, timeline, and intents to satisfy","rect":[89.97360229492188,601.4690551757813,522.0293774604797,592.4154052734375]},{"page":54,"text":"information requirements and to identify opportunities to seize, retain, and exploit the initiative. The","rect":[89.97359466552735,612.9927368164063,522.0803210716248,603.9390869140625]},{"page":54,"text":"commander specifies different reconnaissance guidance for each phase of an operation and can adjust the","rect":[89.97359466552735,624.5164794921875,522.0722644309998,615.452880859375]},{"page":54,"text":"components of the guidance throughout an operation as the situation changes or develops. BCT and maneuver","rect":[89.97359466552735,636.0402221679688,522.0635672197342,626.986572265625]},{"page":54,"text":"battalion commanders include their reconnaissance and security guidance in, Annex L, Scheme of","rect":[89.97359466552735,647.4443969726563,522.1698904619217,638.3907470703125]},{"page":54,"text":"Information Collection, paragraph 3 (Execution). Commanders of organizations that focus on reconnaissance","rect":[89.97359466552735,658.9680786132813,522.0911853294373,649.9144287109375]},{"page":54,"text":"and security (such as reconnaissance and security TFs, or Cavalry squadrons) include reconnaissance and","rect":[89.98356628417969,670.4918212890625,522.166889667511,661.4381713867188]},{"page":54,"text":"security guidance in Annex L, paragraph 3 (Execution), commander’s intent, found in Annex L. It is critical","rect":[89.99356079101563,682.0155639648438,522.1191607723237,672.9619140625]},{"page":54,"text":"that initial reconnaissance and security guidance is published as part of WARNORD #2 to provide Cavalry","rect":[89.99357604980469,693.539306640625,522.0534253120422,684.4856567382813]},{"page":54,"text":"formations sufficient time to collect the required information to inform their higher headquarters’","rect":[89.99362182617188,705.0630493164063,522.0584402666092,696.0093994140625]},{"page":54,"text":"decision-making process. As the BCT commander and staff become more aware of the situation, they can","rect":[89.9836654663086,716.4672241210938,522.0359082221985,707.41357421875]},{"page":54,"text":"3-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":54,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":54,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":55,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":55,"text":"publish refined reconnaissance guidance in the OPORD and updated Annex L to provide all ground","rect":[108.0,83.50144958496094,540.058002948761,74.44780731201172]},{"page":55,"text":"reconnaissance forces with detailed and specific information. The commander’s reconnaissance guidance","rect":[108.0,95.02519226074219,540.0937488059998,85.97154998779297]},{"page":55,"text":"and how it is issued to the Cavalry squadron is not prescriptive; however, it is critical that the BCT establishes","rect":[108.0,106.42936706542969,539.9247329835891,97.37572479248047]},{"page":55,"text":"some form of guidance for the Cavalry squadron that enables them to focus on what the BCT needs to know","rect":[108.0,117.95310974121094,539.9934271564483,108.89946746826172]},{"page":55,"text":"about enemy, terrain, and the decisions to be made. A dialogue between the BCT commander and the Cavalry","rect":[108.0,129.47679138183595,540.0869946479797,120.42314910888672]},{"page":55,"text":"squadron commander will suffice as long as the result of the dialogue is a mutual understanding of the overall","rect":[108.0,141.0005340576172,540.1345416316987,131.94688415527345]},{"page":55,"text":"commander’s intent. For more information on the commander’s dialogue, refer to paragraphs 3-66 through","rect":[108.0,152.52427673339845,540.0578198432922,143.4706268310547]},{"page":55,"text":"3-68 of this chapter. The commander’s reconnaissance guidance consists of three elements—","rect":[107.99004364013672,164.04795837402345,480.5836877822876,154.9943084716797]},{"page":55,"text":" Focus.","rect":[133.1999969482422,175.44949340820313,177.56809449195863,168.7264862060547]},{"page":55,"text":" Reconnaissance tempo.","rect":[133.1999969482422,190.88148498535157,245.14469361305238,181.84776306152345]},{"page":55,"text":" Engagement criteria and disengagement criteria, both lethal and nonlethal.","rect":[133.1999969482422,204.46141052246095,448.90040040016177,195.4077606201172]},{"page":55,"text":"Focus","rect":[89.99578857421875,219.96914672851563,115.47446900653839,213.2461395263672]},{"page":55,"text":"3-42. Reconnaissance focus defines the Cavalry organization’s area of emphasis and has four categories:","rect":[107.99351501464844,239.50071716308595,539.9986163387299,230.4470672607422]},{"page":55,"text":"threat, civil, terrain, and weather effects. The higher commander’s intent serves as the basis for establishing","rect":[107.98358917236328,251.02439880371095,540.0304760932922,241.9707489013672]},{"page":55,"text":"the focus for reconnaissance tasks. The Cavalry organization uses focus to narrow the scope of tasks in order","rect":[107.98358917236328,262.4286193847656,540.0603323564529,253.37498474121095]},{"page":55,"text":"to get the most important information to develop the situation for future operations. Like many elements","rect":[107.98358917236328,273.9523010253906,540.1290176515579,264.898681640625]},{"page":55,"text":"within the commander’s reconnaissance guidance, the focus can change during different operation phases.","rect":[107.9736328125,285.4760437011719,532.982736825943,276.42242431640627]},{"page":55,"text":"3-43. Commanders orient their reconnaissance assets by identifying a reconnaissance objective in the area","rect":[107.97364807128906,302.99566650390627,540.1053454856873,293.93206787109377]},{"page":55,"text":"of operations. The reconnaissance objective is the most important result desired from that specific","rect":[107.97364807128906,314.5193786621094,540.0444323997498,305.4557800292969]},{"page":55,"text":"reconnaissance effort. The reconnaissance objective could be a terrain feature, geographic area, enemy force,","rect":[107.96369934082031,326.0431213378906,540.1283056735992,316.9795227050781]},{"page":55,"text":"or other mission or operational variable about which the commander wants to obtain additional information.","rect":[107.96369171142578,337.4273986816406,540.0534155368805,328.3936767578125]},{"page":55,"text":"For example, if the reconnaissance operation is threat focused, then the reconnaissance objective could be a","rect":[107.95376586914063,348.9710388183594,540.0523669700623,339.9074401855469]},{"page":55,"text":"specific type of equipment, or an entire system, such as an integrated air defense system. The reconnaissance","rect":[107.95376586914063,360.4947204589844,540.0743396263123,351.44110107421877]},{"page":55,"text":"objective clarifies the intent of the reconnaissance effort by specifying the most important result to obtain","rect":[107.96376037597656,372.0184631347656,539.9631543159485,362.9548645019531]},{"page":55,"text":"from the reconnaissance effort. Every reconnaissance mission specifies a reconnaissance objective. The","rect":[107.96376037597656,383.54217529296877,540.1384265403748,374.47857666015627]},{"page":55,"text":"commander assigns a reconnaissance objective based on PIRs resulting from the IPB process, which should","rect":[107.9637451171875,394.9463806152344,540.024555683136,385.8827819824219]},{"page":55,"text":"directly support the end state as defined in the commander’s intent. The reconnaissance objective can be","rect":[107.96376037597656,406.4700927734375,539.9391467552185,397.406494140625]},{"page":55,"text":"information about a specific geographic location (such as the cross-country trafficability of a specific area),","rect":[107.95379638671875,417.9938049316406,539.9089453220367,408.940185546875]},{"page":55,"text":"a specific enemy or adversary activity to be confirmed or denied, or a specific enemy or adversary unit to","rect":[107.9437026977539,429.5175476074219,539.739887714386,420.46392822265627]},{"page":55,"text":"be located and tracked. When the reconnaissance unit does not have enough time to complete all the tasks","rect":[107.9437026977539,441.0412902832031,539.8403823976516,431.9876708984375]},{"page":55,"text":"associated with a specific form of reconnaissance, it uses the reconnaissance objective to guide it in","rect":[107.94371795654297,452.5649719238281,540.045307636261,443.5013732910156]},{"page":55,"text":"setting priorities.","rect":[107.94371795654297,463.9692077636719,176.4276831150055,454.91558837890627]},{"page":55,"text":"3-44. Additionally, a reconnaissance objective may include gaining an awareness of how the local society","rect":[107.93376159667969,481.4888610839844,539.838764667511,472.4252624511719]},{"page":55,"text":"affects military operations. Cavalry organizations may have to conduct reconnaissance to gather information","rect":[107.93379974365235,493.0125427246094,539.991596698761,483.95892333984377]},{"page":55,"text":"on the size, location, composition, and political temperament of the society. Such reconnaissance focuses on","rect":[107.93377685546875,504.5362548828125,539.9928784370422,495.4826354980469]},{"page":55,"text":"developing an understanding of the cultural and human factors that affect friendly as well as adversarial","rect":[107.93377685546875,516.0599975585938,539.8712970027924,507.00634765625]},{"page":55,"text":"perceptions and operations, such as religion, ethnicity, language, and political or tribal organizations. Civil","rect":[107.93377685546875,527.5836791992188,539.9280596981049,518.530029296875]},{"page":55,"text":"considerations also address infrastructure—the systems that support the inhabitants, economy, and","rect":[107.93377685546875,538.9879150390625,539.9966626167297,529.9342651367188]},{"page":55,"text":"government of a specific area. Areas, structures, capabilities, organizations, people, and events compose the","rect":[107.93379974365235,550.5116577148438,540.0305163841248,541.4580078125]},{"page":55,"text":"civil considerations potentially included as a component of reconnaissance focus. Regardless of its focus on","rect":[107.9437255859375,562.0354614257813,539.8830151557922,552.9818115234375]},{"page":55,"text":"terrain, the enemy, or civil considerations, the reconnaissance objective clarifies the intent of the","rect":[107.9437026977539,573.55908203125,540.034483669281,564.4954833984375]},{"page":55,"text":"reconnaissance effort by stating the most important result of the reconnaissance effort.","rect":[107.94371795654297,585.0828247070313,453.5560095310211,576.0291748046875]},{"page":55,"text":"Reconnaissance Tempo","rect":[89.94599914550781,608.4588623046875,187.45142030715943,599.594482421875]},{"page":55,"text":"3-45. The reconnaissance tempo is the level of detail and level of aggressiveness required to accomplish","rect":[107.9437255859375,625.9984741210938,539.9836010932922,616.94482421875]},{"page":55,"text":"reconnaissance operations. The level of detail is conveyed using the terms “rapid” and “deliberate” to","rect":[107.9337387084961,637.522216796875,540.0862622261047,628.4685668945313]},{"page":55,"text":"establish the necessary number of tasks required, based on the amount of time available, in a reconnaissance","rect":[107.9337387084961,649.0459594726563,540.0347888450623,639.9923095703125]},{"page":55,"text":"operation to sufficiently answer the supported commander’s PIR. The level of aggressiveness addresses the","rect":[107.9337387084961,660.5697021484375,539.9052722434998,651.5160522460938]},{"page":55,"text":"necessity to avoid either detection or engagement and is conveyed through the terms “forceful” and","rect":[107.9337387084961,672.0934448242188,539.9878125190735,663.039794921875]},{"page":55,"text":"“stealthy”. Commanders analyze the mission variables of METT-TC (I) to assist them in determining the","rect":[107.9337387084961,683.4976196289063,539.9865710716248,674.4439697265625]},{"page":55,"text":"best reconnaissance tempo for a specific type of reconnaissance.","rect":[107.92376708984375,695.0213623046875,365.45472168922427,685.9677124023438]},{"page":55,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":55,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":55,"text":"3-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":56,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":56,"text":"3-46. The level of detail assigned will naturally impact the depth of information collected. Commanders","rect":[90.0,83.50144958496094,522.0958145265579,74.44780731201172]},{"page":56,"text":"identify the number of tasks associated with a type of reconnaissance. In a rapid reconnaissance, commanders","rect":[90.0,95.02519226074219,522.1942642335891,85.97154998779297]},{"page":56,"text":"prescribe the minimum number of tasks necessary to accomplish the mission. By assigning a rapid","rect":[90.0,106.42936706542969,522.042133808136,97.37572479248047]},{"page":56,"text":"reconnaissance, the commander is accepting a reduced number of tasks and specificity of information","rect":[90.0,117.95310974121094,522.1416821479797,108.89946746826172]},{"page":56,"text":"associated with the assigned tasks. This is more easily accomplished with a greater understanding of the","rect":[90.0,129.47679138183595,522.044981716156,120.42314910888672]},{"page":56,"text":"operational environment, or when only specific information is needed to facilitate the supported commander's","rect":[90.0,141.0005340576172,522.0511367921829,131.94688415527345]},{"page":56,"text":"decisions. The limitation of rapid reconnaissance is a higher risk to the force due to reduced specificity and","rect":[90.0,152.52427673339845,522.1606640815735,143.4706268310547]},{"page":56,"text":"less detailed information about the operational environment.","rect":[90.0,164.0280303955078,331.4064428806305,154.9943084716797]},{"page":56,"text":"3-47. A deliberate reconnaissance implies all tasks for that type of reconnaissance must be accomplished to","rect":[90.0,181.44810485839845,521.9912915229797,172.3944549560547]},{"page":56,"text":"ensure mission success and to answer PIR. This is usually necessary when the understanding of the","rect":[90.0,192.97178649902345,521.981261013031,183.9181365966797]},{"page":56,"text":"operational environment is vague. A deliberate reconnaissance tempo is inherently more time intensive due","rect":[90.0,204.4955291748047,521.964415309906,195.44187927246095]},{"page":56,"text":"to the amount of required information to collect and tasks to complete. It requires meticulous information","rect":[90.0,215.99928283691407,522.0611157417297,206.96556091308595]},{"page":56,"text":"collection, and is conducted when there is limited enemy presence, when more time is available, or the","rect":[90.0,227.54295349121095,522.2899768333435,218.4893035888672]},{"page":56,"text":"commander requires more detailed information about the operational environment. The limitation of a","rect":[90.0,239.04676818847657,522.0001208763123,230.01304626464845]},{"page":56,"text":"deliberate reconnaissance is that it may require augmentation to include more detailed information collection","rect":[90.0,250.4708709716797,522.1953930854797,241.41722106933595]},{"page":56,"text":"assets and may require more deliberate sustainment planning.","rect":[90.0,261.9945373535156,336.0001928806305,252.94090270996095]},{"page":56,"text":"3-48. The level of aggressiveness in a reconnaissance is how the commander directs a reconnaissance force's","rect":[90.0,279.5141906738281,522.1097305421829,270.4605712890625]},{"page":56,"text":"reaction to contact with the enemy. In a stealthy reconnaissance, units are governed by more restrictive","rect":[90.0,291.0379333496094,522.0123279075623,281.98431396484377]},{"page":56,"text":"engagement /bypass criteria. This is appropriate when time is available and the unit is either unable to fight","rect":[90.0,302.5616455078125,522.0920001277924,293.5080261230469]},{"page":56,"text":"for information based on relative combat analysis, dismounted scouts are unable to sustain direct contact, the","rect":[90.0,314.0853576660156,522.2263171653748,305.03173828125]},{"page":56,"text":"commander wants forces to remain undetected, or when a higher headquarters is unwilling to accept a higher","rect":[90.0,325.4895935058594,522.0839529619217,316.43597412109377]},{"page":56,"text":"threshold of risk with reconnaissance forces as a means of achieving economy of force.","rect":[90.0,337.0132751464844,439.40604615211489,327.95965576171877]},{"page":56,"text":"3-49. A forceful reconnaissance requires a reconnaissance force to develop the situation through action and","rect":[90.0,354.5329284667969,522.044086933136,345.47930908203127]},{"page":56,"text":"they are governed by more permissive, aggressive engagement criteria. This is appropriate when favorable","rect":[90.0,366.056640625,522.0750720481873,357.0030212402344]},{"page":56,"text":"relative combat power analysis permits, when limited time necessitates, or when aggressive engagement is","rect":[90.0,377.5803527832031,522.1763809328079,368.5267333984375]},{"page":56,"text":"necessary to gain the required information. Commanders may also select a level of aggressiveness based on","rect":[90.0,388.98455810546877,522.1018261909485,379.9309387207031]},{"page":56,"text":"their desire to shape the operational environment and influence enemy decision-making.","rect":[90.0,400.50830078125,443.13175415992739,391.4546813964844]},{"page":56,"text":"3-50. Rapid and deliberate are mutually exclusive levels of detail, as one cannot be rapid and deliberate at","rect":[90.0,418.0279235839844,522.0392047176362,408.97430419921877]},{"page":56,"text":"the same time. Similarly, stealthy and forceful are mutually exclusive levels of aggressiveness. This provides","rect":[90.00000762939453,429.5516662597656,522.0502212648391,420.498046875]},{"page":56,"text":"commanders with four sets of reconnaissance tempos they can assign as seen in figure 3-2.","rect":[90.00000762939453,441.0754089355469,452.8527624607086,432.02178955078127]},{"page":56,"text":"3-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":56,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":56,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":57,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":57,"text":"Figure 3-2. Reconnaissance tempo","rect":[232.4399871826172,418.24163818359377,397.37361544322968,408.9190979003906]},{"page":57,"text":"3-51. For context, a rapid and forceful tempo for route reconnaissance might entail hastily assessing the","rect":[107.98977661132813,435.821044921875,539.8315417747498,426.7674255371094]},{"page":57,"text":"trafficability of bridges and bypasses; hastily observing for threat indicators (rapid movement results in hasty","rect":[107.98978424072266,447.2252197265625,539.8167309761047,438.1716003417969]},{"page":57,"text":"assessments); and engaging two enemy platoons or less (forceful due to the permissive engagement criteria).","rect":[107.98978424072266,458.74896240234377,540.112375497818,449.6953430175781]},{"page":57,"text":"Whereas a deliberate and stealthy tempo might entail committing engineer assets to classify (time-consuming","rect":[107.98977661132813,470.2726745605469,540.0515942573547,461.21905517578127]},{"page":57,"text":"and deliberate) the bridges along a route (concerned with the complete task of bridge classification), while","rect":[107.9897232055664,481.79638671875,540.2009265403748,472.7427673339844]},{"page":57,"text":"engaging any threat lesser than a squad (stealthy due to restrictive engagement criteria).","rect":[107.97976684570313,493.3200988769531,432.0881140232086,484.2664794921875]},{"page":57,"text":"3-52. It is less important that commanders use the specific terms (rapid or deliberate, forceful or stealthy) to","rect":[107.97976684570313,510.8397521972656,539.9059643745422,501.7861328125]},{"page":57,"text":"communicate an organization’s reconnaissance tempo. Instead, commanders should strive to provide","rect":[107.97980499267578,522.2439575195313,540.0734851341248,513.1903076171875]},{"page":57,"text":"guidance within each area of tempo toassist subordinate units in understanding how the reconnaissance effort","rect":[107.9798355102539,533.7677001953125,540.1272784481049,524.7140502929688]},{"page":57,"text":"is nested within the supported organization’s operating tempo. Generally speaking, commanders should let","rect":[107.97982025146485,545.2914428710938,540.0962115535737,536.23779296875]},{"page":57,"text":"reconnaissance forces know how much information that pertains to enemy and terrain that they need to gather,","rect":[107.97980499267578,556.8151245117188,540.1222631931305,547.761474609375]},{"page":57,"text":"how quickly they need to gather the information, and how aggressive they can be in the pursuit of that","rect":[107.98977661132813,568.3388671875,540.1333819637299,559.2852172851563]},{"page":57,"text":"information.","rect":[107.98978424072266,577.8505859375,157.75791382789613,570.8088989257813]},{"page":57,"text":"Engagement Criteria","rect":[89.9920654296875,603.2586059570313,176.8163800239563,594.374267578125]},{"page":57,"text":"3-53. Engagement criteria are protocols that specify those circumstances for initiating engagement with an","rect":[107.98977661132813,620.7782592773438,540.0217480659485,611.724609375]},{"page":57,"text":"enemy force (FM 3-90-1). They can either be restrictive, limiting the freedom that leaders allow their","rect":[107.98977661132813,632.302001953125,539.9340506181717,623.2483520507813]},{"page":57,"text":"subordinates during engagements, or permissive, allowing subordinates their own judgment in initiating and","rect":[107.97984313964844,643.82568359375,540.0347485542297,634.7620849609375]},{"page":57,"text":"completing engagements with threat forces. The squadron commander visualizes engagement criteria through","rect":[107.9698715209961,655.3494262695313,540.0686841011047,646.2957763671875]},{"page":57,"text":"an analysis of the mission variables of METT-TC (I).","rect":[107.9698715209961,666.8731079101563,321.5321753025055,657.8194580078125]},{"page":57,"text":"3-54. Commanders must define the size or type of enemy force they expect their subordinate units to engage","rect":[107.95988464355469,684.2732543945313,540.0565173606873,675.2196044921875]},{"page":57,"text":"or avoid, and they must specify the conditions. These decisions drive the planning for direct and indirect","rect":[107.95989227294922,695.7969360351563,540.0714923152924,686.7432861328125]},{"page":57,"text":"fires, as well as the establishment of bypass criteria. Bypass criteria are measures established by higher","rect":[107.95987701416016,707.3206787109375,540.0714407548904,698.2670288085938]},{"page":57,"text":"echelon headquarters that specify the conditions and size under which enemy units and contact may be","rect":[107.9698486328125,718.8444213867188,540.109434841156,709.790771484375]},{"page":57,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":57,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":57,"text":"3-11","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":58,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":58,"text":"avoided (ADP 3-90). The establishment of bypass criteria requires the commander, staff, and subordinate","rect":[90.0,83.50144958496094,522.0560290794373,74.44780731201172]},{"page":58,"text":"commanders to develop a plan and allocate resources to maintain visual contact with bypassed or bypassing","rect":[89.99004364013672,95.02519226074219,521.926655292511,85.97154998779297]},{"page":58,"text":"threat elements. Commanders visualize how they expect engagements to be conducted and create their","rect":[89.99004364013672,106.42936706542969,522.0937185869217,97.37572479248047]},{"page":58,"text":"engagement criteria to both retain freedom of maneuver and prevent a decisive engagement. The squadron","rect":[90.00003814697266,117.95310974121094,522.0439038276672,108.89946746826172]},{"page":58,"text":"commander must consider information engagement and how the squadron interacts and influences the","rect":[89.99008178710938,129.47679138183595,522.1048572044373,120.42314910888672]},{"page":58,"text":"local population.","rect":[90.00004577636719,140.98060607910157,157.28980469703675,131.94688415527345]},{"page":58,"text":"3-55. Merely defining engagement criteria using terms like “aggressive” or “discreet” is not sufficient.","rect":[90.00004577636719,158.5201873779297,522.110666513443,149.46653747558595]},{"page":58,"text":"Engagement criteria should be defined using precise doctrinal terms. Again, the squadron commander issues","rect":[90.01994323730469,170.0438690185547,522.1737564210891,160.99021911621095]},{"page":58,"text":"specific planning guidance to define the engagement criteria. Commanders use size and description of the","rect":[90.01994323730469,181.44810485839845,521.989073513031,172.3944549560547]},{"page":58,"text":"enemy composition to create an understanding for their unit of the engagement criteria. The staff and","rect":[90.01994323730469,192.97178649902345,522.106586933136,183.9181365966797]},{"page":58,"text":"subordinate commanders refine that guidance into specific execution information. Examples include","rect":[90.00997161865235,204.4955291748047,522.0327136497498,195.44187927246095]},{"page":58,"text":"the following:","rect":[90.00997161865235,216.0192108154297,146.17940247154236,206.96556091308595]},{"page":58,"text":" Engagement criteria.","rect":[115.19999694824219,229.42137145996095,216.58011841773988,220.3677215576172]},{"page":58,"text":" Engagement priorities.","rect":[115.19999694824219,242.8613739013672,224.24537110328675,233.80772399902345]},{"page":58,"text":" Direct fire control measures to mass fires and control fire distribution.","rect":[115.19999694824219,254.40945434570313,413.48133301734927,247.3677215576172]},{"page":58,"text":" Guidance for actions on contact.","rect":[115.19999694824219,267.8594055175781,262.8891088962555,260.8077392578125]},{"page":58,"text":" Bypass criteria.","rect":[115.19999694824219,283.42138671875,195.33843445777894,274.3677673339844]},{"page":58,"text":" Reconnaissance handover criteria.","rect":[115.19999694824219,294.8494873046875,270.1131384372711,287.8077697753906]},{"page":58,"text":" Priority of fires.","rect":[115.19999694824219,310.42138671875,197.35137391090394,301.3677673339844]},{"page":58,"text":" Rules of engagement or rules for use of force.","rect":[115.19999694824219,323.86138916015627,316.764719247818,314.8077697753906]},{"page":58,"text":" Fire support coordination measures.","rect":[115.19999694824219,337.4014892578125,277.04822754859927,328.3677673339844]},{"page":58,"text":" Weapons control status.","rect":[115.19999694824219,350.84149169921877,229.04508423805238,341.8077697753906]},{"page":58,"text":"Disengagement Criteria","rect":[72.00575256347656,374.4964599609375,170.4583477973938,365.6121520996094]},{"page":58,"text":"3-56. Disengagement criteria are protocols that specify those circumstances where a friendly force must","rect":[90.013427734375,391.8965759277344,522.1810504207612,382.84295654296877]},{"page":58,"text":"break contact with the direct fire and observed indirect fire to prevent decisive engagement. The commander","rect":[90.013427734375,403.4203186035156,522.0881643877029,394.36669921875]},{"page":58,"text":"develops the disengagement criteria for reconnaissance operations. The disengagement criteria are","rect":[90.00349426269531,414.94403076171877,522.1300647239685,405.8904113769531]},{"page":58,"text":"enemy-based and given in quantifiable terms. The disengagement criteria are well-thought-out, developed in","rect":[89.99354553222656,426.4677429199219,522.0493969917297,417.41412353515627]},{"page":58,"text":"the planning process to prevent Cavalry units from becoming decisively engaged, and allow them to retain","rect":[89.99349975585938,437.9914855957031,522.0463452339172,428.9378662109375]},{"page":58,"text":"freedom of maneuver. A disengagement involves moving to a location where enemy forces cannot engage","rect":[89.99352264404297,449.51519775390627,522.0675036888123,440.4615783691406]},{"page":58,"text":"friendly forces through direct fire contact or observed indirect fires. The disengagement criteria indicate the","rect":[89.99351501464844,460.91937255859377,522.0981433372498,451.8657531738281]},{"page":58,"text":"conditions or size of enemy forces such that contact may spoil mission objectives or enemy forces may","rect":[89.99349975585938,472.443115234375,522.193745136261,463.3795166015625]},{"page":58,"text":"overmatch the Cavalry unit.","rect":[90.00346374511719,483.9668273925781,201.694895029068,474.9132080078125]},{"page":58,"text":"Commander’s Security Guidance","rect":[72.0,508.5335998535156,229.16543185806274,498.6748962402344]},{"page":58,"text":"3-57. Although similar to the reconnaissance guidance, the commander’s security guidance has unique","rect":[90.0,526.0614624023438,522.0043933372498,517.0078125]},{"page":58,"text":"components that require additional consideration and planning in addition to the reconnaissance guidance.","rect":[90.0,537.5851440429688,522.0539648532867,528.531494140625]},{"page":58,"text":"Commanders provide clear security guidance that offers freedom of action and direction to ensure their","rect":[90.0,549.10888671875,522.2373343095779,540.0552368164063]},{"page":58,"text":"organic Cavalry organizations can accomplish the stated objectives within the required timeframe. The","rect":[90.0,560.632568359375,522.1047351341248,551.5689697265625]},{"page":58,"text":"commander’s security planning guidance provides a clear understanding of the Cavalry organization’s task,","rect":[90.0,572.1563110351563,521.960520029068,563.1026611328125]},{"page":58,"text":"purpose, and objective, and the security operation’s protection requirements. The components of the","rect":[90.0,583.5604858398438,521.975157497406,574.4968872070313]},{"page":58,"text":"commander’s security guidance are—","rect":[89.99004364013672,595.084228515625,241.92186832427979,586.0305786132813]},{"page":58,"text":" Focus.","rect":[115.19999694824219,606.4894409179688,159.56809449195863,599.7664794921875]},{"page":58,"text":" Security duration.","rect":[115.19999694824219,622.0614013671875,204.92394471168519,613.0077514648438]},{"page":58,"text":" Engagement criteria and disengagement criteria.","rect":[115.19999694824219,635.5014038085938,326.86222290992739,626.44775390625]},{"page":58,"text":"Focus","rect":[71.99578857421875,651.1286010742188,97.47446900653839,644.4056396484375]},{"page":58,"text":"3-58. The security focus defines what the Cavalry organization is to protect and why. The focus describes","rect":[89.99351501464844,670.5407104492188,522.0056045656204,661.487060546875]},{"page":58,"text":"the expected results of the security operation and has four categories: threat, terrain, civil, and friendly. (Refer","rect":[89.98355102539063,682.0643920898438,522.1808157548904,673.0107421875]},{"page":58,"text":"to chapter 5 for additional information on security operations.) The security focus could change during each","rect":[89.98358917236328,693.588134765625,522.0343823432922,684.5344848632813]},{"page":58,"text":"phase of the security operation.","rect":[89.97361755371094,705.1118774414063,215.22156739234925,696.0582275390625]},{"page":58,"text":"3-12","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":58,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":58,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":59,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":59,"text":"3-59. The security focus allows the commander to determine specific tasks, their priority, and their relation","rect":[108.0,83.50144958496094,539.9176831245422,74.44780731201172]},{"page":59,"text":"to the intent and end state. Moreover, focus allows subordinate commanders to narrow their operations to","rect":[108.0,95.0052719116211,540.016254901886,85.97154998779297]},{"page":59,"text":"acquire the most important information for higher headquarters and protect the most critical activities.","rect":[107.99004364013672,106.42936706542969,516.0621435642242,97.37572479248047]},{"page":59,"text":"3-60. Commanders orient their security assets by identifying a security objective in the area of operations.","rect":[107.99004364013672,123.94902038574219,540.0510351657867,114.88541412353516]},{"page":59,"text":"The security objective is the most important result desired from that specific security effort. The security","rect":[107.99005126953125,135.4727020263672,539.9982495307922,126.40909576416016]},{"page":59,"text":"objective clarifies and prioritizes the tasks for the Cavalry unit nested within the maneuver plan of the","rect":[107.99005126953125,146.99644470214845,540.132628200531,137.93284606933595]},{"page":59,"text":"protected commander. The BCT commander provides focus to the protecting force’s efforts to accomplish","rect":[107.99005126953125,158.5201873779297,540.0320019721985,149.46653747558595]},{"page":59,"text":"the mission efficiently and effectively. As an example, the security objective may constitute locating and","rect":[107.99005126953125,170.0438690185547,540.013325214386,160.9802703857422]},{"page":59,"text":"defeating enemy reconnaissance forces, confirming or denying the commander and staff’s initial assessment,","rect":[107.99005126953125,181.44810485839845,539.9664404392242,172.3944549560547]},{"page":59,"text":"providing early warning and reaction time to the main body, or protecting the main body from enemy","rect":[107.99005126953125,192.97178649902345,540.052875995636,183.9181365966797]},{"page":59,"text":"observation and engagement.","rect":[107.99004364013672,204.4955291748047,224.95528626441956,195.44187927246095]},{"page":59,"text":"Security Duration","rect":[89.99232482910156,228.01109313964845,164.05089783859254,219.12677001953126]},{"page":59,"text":"3-61. Clearly articulating the duration of security operations allows the commander to establish associated","rect":[107.99004364013672,245.53074645996095,540.0610547065735,236.4770965576172]},{"page":59,"text":"time requirements that drive security operations planning, such as the method of establishing observation","rect":[107.99003601074219,257.0544128417969,540.0459179878235,248.0007781982422]},{"page":59,"text":"posts (either mounted or dismounted), battle positions, length of UAS rotation, and required logistical and","rect":[107.98999786376953,268.4586486816406,539.9052319526672,259.40496826171877]},{"page":59,"text":"communications support necessary to execute the mission. The security durations are short (less than","rect":[107.98999786376953,279.9823303222656,539.9358105659485,270.9287109375]},{"page":59,"text":"12 hours) and long (greater than 12 hours). Duration can also relate to depth, especially in screen missions,","rect":[107.98999786376953,291.5060729980469,539.9712011814117,282.45245361328127]},{"page":59,"text":"as time is needed to deploy properly into screen areas to achieve the required depth throughout the area of","rect":[107.99004364013672,303.02978515625,540.0469046220779,293.9761657714844]},{"page":59,"text":"operations. Commanders consider tasks, their CCIRs, the LTIOV, tactical risk, movement techniques,","rect":[107.99002838134766,314.5335998535156,540.0856420993805,305.4998779296875]},{"page":59,"text":"reconnaissance methods, and formations when articulating the security duration. The two observation posts","rect":[108.0,326.07720947265627,540.0309341554641,317.0235900878906]},{"page":59,"text":"that Cavalry units employ are described below:","rect":[108.0,337.4814147949219,297.02586853599549,328.42779541015627]},{"page":59,"text":" Short duration: Cavalry organizations establish and staff short duration observation posts for less","rect":[133.1999969482422,350.86138916015627,540.0205581789016,341.8077697753906]},{"page":59,"text":"than 12 hours. Cavalry units establish short duration observation posts quickly, so commanders","rect":[151.19000244140626,362.504638671875,540.1450088624954,353.4510192871094]},{"page":59,"text":"can take advantage of available time and mass reconnaissance assets by maximizing the number","rect":[151.18008422851563,373.9088439941406,540.0483694658279,364.855224609375]},{"page":59,"text":"of observation posts and associated observing forces on the ground and in the air for a short period.","rect":[151.17015075683595,385.43255615234377,540.0832617282867,376.3789367675781]},{"page":59,"text":" Long duration: Cavalry organizations establish and staff long duration observation posts for","rect":[133.1999969482422,398.86138916015627,539.9596243486404,389.8077697753906]},{"page":59,"text":"greater than 12 hours. Significantly, the number of observation posts decreases as platoons and","rect":[151.20999145507813,410.504638671875,540.0772290229797,401.4510192871094]},{"page":59,"text":"troops must allocate additional forces to each observation post to manage a deliberate rotation","rect":[151.20994567871095,421.9088439941406,539.9457592964172,412.855224609375]},{"page":59,"text":"schedule and rest plan. Units must coordinate for adequate resupply of all supplyclasses to support","rect":[151.1999969482422,433.43255615234377,540.1200762996674,424.3789367675781]},{"page":59,"text":"observation posts that operate for extended periods.","rect":[151.1999969482422,444.9363708496094,357.69071412086489,435.90264892578127]},{"page":59,"text":"Engagement and Disengagement Criteria","rect":[90.00574493408203,468.4718322753906,261.306782245636,459.5875244140625]},{"page":59,"text":"3-62. Just as the commander issues guidance for engagement and disengagement criteria in reconnaissance","rect":[108.00346374511719,485.991455078125,539.996153591156,476.9378356933594]},{"page":59,"text":"guidance in paragraphs 3-51 to 3-54 (page 3-11), the same criteria apply to security operations.","rect":[107.99349975585938,497.51519775390627,488.35599732398989,488.4615478515625]},{"page":59,"text":"3-63. The BCT commander provides the security force with engagement and disengagement criteria for the","rect":[107.98360443115235,514.9153442382813,539.9638659934998,505.8616943359375]},{"page":59,"text":"operation. Engagement criteria direct the squadron either to engage and destroy enemy reconnaissance assets","rect":[107.97360229492188,526.4390258789063,539.9288833742141,517.3853759765625]},{"page":59,"text":"or to allow enemy reconnaissance assets to pass in order to identify, disrupt, or isolate the enemy’s","rect":[107.97359466552735,537.9627685546875,540.1349990968704,528.9091186523438]},{"page":59,"text":"second-echelon forces with direct and indirect fires. The BCT and security force must still have a plan to","rect":[107.97359466552735,549.4865112304688,540.0005688667297,540.432861328125]},{"page":59,"text":"maintain contact with enemy reconnaissance assets that bypass the security force.","rect":[107.96363830566406,561.0101928710938,434.464670419693,551.95654296875]},{"page":59,"text":"3-64. Engagement criteria identify two specific themes: under which conditions the protecting force can","rect":[107.96363830566406,578.5298461914063,540.0114941596985,569.4761962890625]},{"page":59,"text":"attack enemy forces, and what the security force can attack within its capabilities and task organization. A","rect":[107.95366668701172,589.93408203125,540.0632513751983,580.8804321289063]},{"page":59,"text":"protecting force has a restrictive engagement criterion when the BCT desires the protecting force to remain","rect":[107.95366668701172,601.457763671875,540.0134472846985,592.4041137695313]},{"page":59,"text":"hidden in order to report on the enemy composition and disposition. Likewise, a protecting force has an","rect":[107.94371032714844,612.9815063476563,539.992573261261,603.9278564453125]},{"page":59,"text":"unrestricted engagement criterion and may destroy enemy reconnaissance assets within their capability when","rect":[107.9238052368164,624.5051879882813,539.9885449409485,615.4515380859375]},{"page":59,"text":"friendly forces overmatch enemy forces or when the commander requires an aggressive","rect":[107.92379760742188,636.0289306640625,539.9215686302185,626.9752807617188]},{"page":59,"text":"counterreconnaissance effort.","rect":[107.92379760742188,645.4212036132813,225.75058960914613,638.3795166015625]},{"page":59,"text":"3-65. The commander develops the disengagement criteria in conjunction with engagement criteria for","rect":[107.92379760742188,664.9528198242188,540.0216971025467,655.8892211914063]},{"page":59,"text":"security operations. Similar to reconnaissance guidance, the disengagement criteria for security operations","rect":[107.92379760742188,676.4765014648438,540.0465591554641,667.4228515625]},{"page":59,"text":"are well thought out and developed in the planning process to prevent a security force from becoming","rect":[107.92379760742188,688.0001831054688,540.031635761261,678.946533203125]},{"page":59,"text":"decisively engaged. A disengagement involves moving to a location where enemy forces can no longer","rect":[107.92379760742188,699.52392578125,540.0433645830154,690.4702758789063]},{"page":59,"text":"engage the security force through direct fire contact or observed indirect fires. The disengagement criteria","rect":[107.92378234863281,711.0476684570313,540.0505359153748,701.9940185546875]},{"page":59,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":59,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":59,"text":"3-13","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":60,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":60,"text":"indicate the conditions or size of enemy forces such that contact may spoil mission objectives or enemy forces","rect":[90.0,83.50144958496094,522.1925552492141,74.4378433227539]},{"page":60,"text":"may overmatch a security force. Disengagement criteria in security operations is often tied to planned","rect":[90.0,95.02519226074219,522.1406445503235,85.97154998779297]},{"page":60,"text":"transitions that are based on conditions for the security force to break contact with the enemy or the","rect":[90.0,106.42936706542969,522.2473132591248,97.37572479248047]},{"page":60,"text":"anticipated duration of the security operation. For example, a security force may meet its disengagement","rect":[90.0,117.95310974121094,522.1127520809174,108.89946746826172]},{"page":60,"text":"criteria to avoid a decisive engagement or enemy overmatch ahead of a planned transition such as a forward","rect":[90.0,129.47679138183595,522.048237323761,120.42314910888672]},{"page":60,"text":"passage of lines or rearward passage of lines resulting in the protected force having to commit forces earlier","rect":[90.0,141.0005340576172,521.9781790361404,131.94688415527345]},{"page":60,"text":"than anticipated. The disengagement criteria for a security force must be clear, concise, and understood at","rect":[90.00999450683594,152.52427673339845,522.1577960262299,143.4706268310547]},{"page":60,"text":"the lowest echelon to anticipate potential transitions and allow the protected force to maintain reaction time","rect":[90.00999450683594,164.0280303955078,522.0800158958435,154.9943084716797]},{"page":60,"text":"and space. For more on transition planning, reference chapter 5, section IV of this manual beginning on page 5-41.","rect":[90.00999450683594,175.4521942138672,516.0888769626617,166.39854431152345]},{"page":60,"text":"DIRECT","rect":[72.0,198.73269653320313,110.71909475326538,190.65597534179688]},{"page":60,"text":"3-66. Commanders direct all aspects of operations by establishing their commanders’ intents, setting","rect":[90.0,218.7413787841797,522.0698437690735,209.68772888183595]},{"page":60,"text":"achievable objectives, and issuing clear tasks to subordinate units. Throughout the operations process,","rect":[90.00999450683594,230.26512145996095,522.144602060318,221.20152282714845]},{"page":60,"text":"commanders direct forces by—","rect":[90.00999450683594,241.78880310058595,215.77491092681886,232.7351531982422]},{"page":60,"text":" Preparing and approving plans and orders.","rect":[115.19999694824219,255.2213592529297,302.72510743141177,246.16770935058595]},{"page":60,"text":" Establishing command and support relationships.","rect":[115.19999694824219,268.6613464355469,330.2067358493805,259.60772705078127]},{"page":60,"text":" Assigning and adjusting tasks, control measures, and task organization.","rect":[115.19999694824219,282.2214050292969,418.52710938453677,273.1578063964844]},{"page":60,"text":" Positioning units to maximize combat power.","rect":[115.19999694824219,295.6614074707031,314.9639685153961,286.6077880859375]},{"page":60,"text":" Positioning key leaders at critical places and times to ensure effective command and control.","rect":[115.19999694824219,309.2214050292969,503.73194336891177,300.16778564453127]},{"page":60,"text":" Allocating resources to exploit developing opportunities and counter emerging threats.","rect":[115.19999694824219,322.6614074707031,479.84400391578677,313.6077880859375]},{"page":60,"text":" Committing the BCT reserve, as required.","rect":[115.19999694824219,336.2214050292969,301.4083960056305,327.16778564453127]},{"page":60,"text":"LEAD","rect":[72.0,359.3999938964844,100.07977390289307,351.45599365234377]},{"page":60,"text":"3-67. Through leadership, commanders provide purpose, direction, and motivation to subordinate","rect":[90.0,379.5413818359375,522.1127917747498,370.4877624511719]},{"page":60,"text":"commanders, their staffs, and Soldiers. The commander’s physical presence is necessary to lead effectively.","rect":[90.0,391.0650939941406,522.1398413181305,382.011474609375]},{"page":60,"text":"During reconnaissance and security operations, the BCT commander balances the time between leading the","rect":[90.00000762939453,402.5888366699219,522.1265857200623,393.53521728515627]},{"page":60,"text":"staff through the operations process and providing purpose, direction, and motivation to subordinate","rect":[90.00001525878906,414.112548828125,522.0888659934998,405.0589294433594]},{"page":60,"text":"commanders and Soldiers forward of the command post. Once the Cavalry squadron initiates their","rect":[90.00001525878906,425.5167541503906,522.0521536455154,416.463134765625]},{"page":60,"text":"reconnaissance and security missions, the Cavalry squadron commander commands the squadron from where","rect":[90.00001525878906,437.04046630859377,522.100645778656,427.9868469238281]},{"page":60,"text":"they can best conduct command and control of the squadron’s assets while maintaining communication with","rect":[90.0,448.5641784667969,522.0610547065735,439.51055908203127]},{"page":60,"text":"the BCT main body as the Cavalry squadron develops the situation.","rect":[90.0,460.087890625,360.32535767555239,451.0342712402344]},{"page":60,"text":"3-68. BCT commanders conduct a commander's dialogue with subordinate commanders to provide effective","rect":[89.99004364013672,477.6075439453125,521.9813830833435,468.5539245605469]},{"page":60,"text":"guidance to ensure a shared understanding of the commander’s intent and essential tasks assigned to","rect":[89.99005126953125,489.1312561035156,522.058979511261,480.07763671875]},{"page":60,"text":"subordinate elements. To be effective, the commander's dialogue should be a face-to-face event; however,","rect":[89.99004364013672,500.53546142578127,522.0797827243805,491.4818420410156]},{"page":60,"text":"the situation may prevent a face-to face meeting, which means the BCT commander identifies other","rect":[89.9801254272461,512.0592041015625,522.0799856767654,503.00555419921877]},{"page":60,"text":"communication means to ensure the execution of a dialogue with subordinate commanders. The BCT","rect":[89.98011779785156,523.5829467773438,522.0859872694016,514.529296875]},{"page":60,"text":"commander’s dialogue with the Cavalry squadron commander occurs early and often throughout the","rect":[89.98011779785156,535.1066284179688,522.0620105247498,526.052978515625]},{"page":60,"text":"operations process and the execution of the BCT mission. The BCT commander initiates a commander’s","rect":[89.97015380859375,546.6103515625,521.9454849367141,537.57666015625]},{"page":60,"text":"dialogue with the Cavalry squadron commander as early as the BCT's receipt of mission.","rect":[89.97015380859375,558.154052734375,445.6119177341461,549.1004028320313]},{"page":60,"text":"3-69. The dialogue between the BCT commander and the Cavalry squadron commander at the beginning of","rect":[89.97021484375,575.55419921875,522.0422659502029,566.5005493164063]},{"page":60,"text":"the operations process is critical as it has the potential, especially in a time constrained environment, to serve","rect":[89.97021484375,587.077880859375,522.0738513450623,578.0242309570313]},{"page":60,"text":"as the BCT commander’s primary opportunity to issue the essential reconnaissance and security guidance","rect":[89.97021484375,598.6016235351563,522.0411365013123,589.5479736328125]},{"page":60,"text":"that the Cavalry squadron requires to effectively enable the BCT commander to make decisions. The BCT","rect":[89.96025085449219,610.1253051757813,521.8977548475266,601.0716552734375]},{"page":60,"text":"staff develops reconnaissance and security guidance that is refined and approved by the BCT commander","rect":[89.96025085449219,621.6490478515625,522.0359793291092,612.5953979492188]},{"page":60,"text":"and then published in WARNORD #2. The BCT staff refines the guidance throughout the MDMP as the","rect":[89.96025848388672,633.0532836914063,521.9333484153748,623.9996337890625]},{"page":60,"text":"Cavalry squadron answers information requirements. The BCT staff publishes the refined guidance in the","rect":[89.95020294189453,644.5770263671875,522.0102527122498,635.5233764648438]},{"page":60,"text":"OPORD. However, the BCT commander uses the commander’s dialogue to provide the Cavalry squadron","rect":[89.95020294189453,656.1007690429688,521.8647046089172,647.047119140625]},{"page":60,"text":"commander with the CCIRs based on the BCT commander’s understanding of the mission and the mission","rect":[89.94020080566406,667.6244506835938,521.9884839057922,658.57080078125]},{"page":60,"text":"variables. The dialogue also provides the Cavalry squadron commander the ability to assist the BCT","rect":[89.94023895263672,679.1481323242188,521.9117318983078,670.094482421875]},{"page":60,"text":"commander in refining the CCIRs based on the Cavalry squadron commander's understanding of the BCT","rect":[89.94023895263672,690.671875,521.8657724256516,681.6182250976563]},{"page":60,"text":"commander’s intent and the mission variables. The reconnaissance and security guidance issued from the","rect":[89.94023895263672,702.0761108398438,521.9963366966248,693.0224609375]},{"page":60,"text":"BCT commander to the Cavalry squadron commander may not cover all of the components of the","rect":[89.94023132324219,713.5997924804688,522.0350940208435,704.546142578125]},{"page":60,"text":"3-14","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":60,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":60,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":61,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0995859375,37.8480224609375]},{"page":61,"text":"reconnaissance and security guidance, but it should contain enough information to allow the Cavalry","rect":[108.0,83.50144958496094,540.0670971870422,74.44780731201172]},{"page":61,"text":"squadron commander to refine the guidance in order to issue more detailed reconnaissance and security","rect":[108.0,95.02519226074219,540.0760083198547,85.97154998779297]},{"page":61,"text":"guidance to the Cavalry squadron subordinate commanders that is nested with the BCT commander’s intent.","rect":[108.0,106.42936706542969,540.0929052829742,97.37572479248047]},{"page":61,"text":"3-70. The primary attendees for the BCT commander's dialogue are the subordinate battalion and squadron","rect":[108.0,123.94902038574219,540.0501294136047,114.89537811279297]},{"page":61,"text":"commanders. However, BCT staff members, at a minimum the S-2 and S-3, should be in attendance to ensure","rect":[108.0,133.47073364257813,540.2271716575623,126.41905975341797]},{"page":61,"text":"synchronization of efforts across the BCT. The presence of subordinate battalion commanders at the dialogue","rect":[108.00001525878906,146.99644470214845,540.1208484153748,137.9427947998047]},{"page":61,"text":"when the BCT commander issues reconnaissance and security guidance to the Cavalry squadron commander","rect":[108.00001525878906,158.5201873779297,540.0838919267654,149.46653747558595]},{"page":61,"text":"enables the other battalion commanders to understand the tasks being executed by the Cavalry squadron and","rect":[108.00001525878906,170.0438690185547,540.058002948761,160.99021911621095]},{"page":61,"text":"how that effects the main and supporting efforts of the other battalions. The presence of the BCT S-2, S-3,","rect":[108.00001525878906,181.44810485839845,539.835764169693,172.3944549560547]},{"page":61,"text":"and other staff primaries enables the synchronization of all information collection assets to include the","rect":[107.99015808105469,192.97178649902345,540.0937488059998,183.9181365966797]},{"page":61,"text":"Cavalry squadron and battalion scout platoons. Staff presence at the commander’s dialogue ensures a shared","rect":[107.99015808105469,204.4955291748047,539.9279980659485,195.44187927246095]},{"page":61,"text":"understanding of the BCT commander’s intent and any changes that may be a result of the BCT commander’s","rect":[107.98999786376953,216.01927185058595,540.0248916749954,206.96556091308595]},{"page":61,"text":"dialogue with the subordinate commanders.","rect":[107.98999786376953,227.54295349121095,282.67444825172427,218.48924255371095]},{"page":61,"text":"ASSESS","rect":[90.0,250.8221893310547,126.11208915710449,242.5679931640625]},{"page":61,"text":"3-71. Commanders continuously assess situations to understand current conditions and to determine how","rect":[108.0,270.8213806152344,540.1056708087921,261.76776123046877]},{"page":61,"text":"operations are progressing. Commanders use continuous assessment to anticipate and adapt the force to","rect":[108.0,282.2255859375,540.092670917511,273.1719665527344]},{"page":61,"text":"changing circumstances. Commanders incorporate staff, subordinate commanders, and unified action","rect":[108.01992797851563,293.7492980957031,540.0837597846985,284.6956787109375]},{"page":61,"text":"partners into their assessments of situations. Based on their assessments, commanders modify plans and","rect":[108.02989959716797,305.27301025390627,540.116596698761,296.2193908691406]},{"page":61,"text":"orders to adapt the force to changing circumstances (see figure 3-3).","rect":[108.0498275756836,316.7967529296875,380.53553223609927,307.7431335449219]},{"page":61,"text":"Figure 3-3. Development of guidance for reconnaissance and security tasks","rect":[135.1709442138672,703.4937744140625,494.6819555778503,694.0516967773438]},{"page":61,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":61,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":61,"text":"3-15","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":62,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":62,"text":"COMMANDERS AND STAFFS COLLABORATE TO PLAN, PREPARE,","rect":[72.0,85.29055786132813,520.9346826076508,75.57487487792969]},{"page":62,"text":"EXECUTE, AND ASSESS","rect":[72.0,101.36636352539063,231.25291051101685,91.65068054199219]},{"page":62,"text":"3-72. The operations process consists of the major activities of command and control conducted during","rect":[90.0,121.66136169433594,522.0669751167297,112.5977554321289]},{"page":62,"text":"operations, which are planning, preparing, executing, and assessing operations. Commanders drive the","rect":[90.0,133.1851043701172,522.1107776145935,124.13146209716797]},{"page":62,"text":"operations process while remaining focused on the major aspects of operations. Staffs conduct the operations","rect":[90.00000762939453,144.7087860107422,522.1676529054641,135.6451873779297]},{"page":62,"text":"process; they assist commanders with the details of planning, preparing, executing, and assessing.","rect":[90.00000762939453,156.23252868652345,480.928049325943,147.1788787841797]},{"page":62,"text":"3-73. The continuous nature of the operations process, as well as the critical combat information and timely","rect":[90.00001525878906,173.6326141357422,522.1693921089172,164.57896423339845]},{"page":62,"text":"and accurate reports provided during reconnaissance and security operations, allow commanders and staffs","rect":[90.00005340576172,185.15635681152345,522.1425674562454,176.1027069091797]},{"page":62,"text":"to make adjustments. Commanders, assisted by their staffs, integrate activities and operations throughout","rect":[89.99008178710938,196.6800994873047,522.0669757137299,187.6165008544922]},{"page":62,"text":"BCTs and squadrons as they exercise mission command. Throughout the operations process, commanders","rect":[89.99008178710938,208.2037811279297,522.0052383546829,199.15013122558595]},{"page":62,"text":"develop an understanding and appreciation of operational environments and tactical situations. They","rect":[89.99008178710938,219.7275848388672,521.9281811714172,210.6738739013672]},{"page":62,"text":"formulate plans and provide purpose, direction, and guidance to BCTs. Commanders then adjust operations","rect":[89.98999786376953,231.2512664794922,522.1335952882766,222.1876678466797]},{"page":62,"text":"based on changes to the operational environments and tactical situations. Adjusting operations allows","rect":[89.98007202148438,242.6554412841797,522.1434829835891,233.5918426513672]},{"page":62,"text":"commanders to gain positions of relative advantage over the enemy. (Refer to ADP 5-0 for more information.)","rect":[89.98005676269531,254.17918395996095,522.0617972002029,245.1255340576172]},{"page":62,"text":"3-74. Throughout the entire operations process, the staff supports the commander and subordinate","rect":[89.98001861572266,271.6987609863281,522.0726916770935,262.6451416015625]},{"page":62,"text":"commanders in understanding the situation, so they can make recommendations and implement decisions","rect":[89.97006225585938,283.2225036621094,522.1046035890579,274.16888427734377]},{"page":62,"text":"throughout the conduct of the operation. The staff does this by conducting the operations process (plan,","rect":[89.9601058959961,294.7462463378906,522.0497534275055,285.692626953125]},{"page":62,"text":"prepare, execute, and assess), and knowledge and information management.","rect":[89.96012115478516,306.2699279785156,393.88855957984927,297.21630859375]},{"page":62,"text":"PLAN","rect":[72.0,323.53271484375,99.35977268218994,315.45599365234377]},{"page":62,"text":"3-75. Planning is the art and science of understanding a situation, envisioning a desired future, and","rect":[90.0,343.42138671875,522.056049823761,334.3677673339844]},{"page":62,"text":"determining effective ways to bring that future about (ADP 5-0). An Army leader plans to create a common","rect":[90.00000762939453,354.9450988769531,522.1703686714172,345.8914794921875]},{"page":62,"text":"vision among subordinate commanders, staffs, and unified action partners. Planning results in an order that","rect":[89.98005676269531,366.4688415527344,522.0926104793549,357.41522216796877]},{"page":62,"text":"communicates a commander’s vision clearly and directs actions to synchronize forces in time, space, and","rect":[89.97007751464844,377.9925537109375,522.0240063667297,368.9389343261719]},{"page":62,"text":"purpose for achieving objectives and accomplishing missions.","rect":[89.97007751464844,389.5162658691406,337.9750463962555,380.4526672363281]},{"page":62,"text":"3-76. All planning is based on imperfect knowledge and assumptions about the future. Planning cannot","rect":[89.97007751464844,406.9163818359375,522.1276446590424,397.8627624511719]},{"page":62,"text":"predict the operation’s outcomes, describe with precision the enemy’s behaviors, or anticipate the civilian","rect":[89.97008514404297,418.4400939941406,522.030903339386,409.386474609375]},{"page":62,"text":"population’s responses to military operations. The understanding and learning that occur during planning","rect":[89.97010040283203,429.9638366699219,522.019917011261,420.91021728515627]},{"page":62,"text":"have great value, even if operations do not proceed precisely as envisioned, because that process of planning","rect":[89.97006225585938,441.487548828125,522.0368847846985,432.4339294433594]},{"page":62,"text":"results in the improved situational understanding that facilitates future decision-making. Leaders use plans","rect":[89.98001861572266,453.0112609863281,522.0159195070266,443.9576416015625]},{"page":62,"text":"and planning to—","rect":[89.97010040283203,464.53497314453127,162.21097660064698,455.4813537597656]},{"page":62,"text":" Understand and develop solutions to problems.","rect":[115.19999694824219,477.9214782714844,321.56644654273989,468.88775634765627]},{"page":62,"text":" Anticipate events and adapt to changing circumstances.","rect":[115.19999694824219,491.3813781738281,355.199533700943,482.3277587890625]},{"page":62,"text":" Task-organize the force and prioritize efforts.","rect":[115.19999694824219,504.9413757324219,315.44410157203677,495.88775634765627]},{"page":62,"text":"Understand and Develop Solutions","rect":[72.0,523.5115356445313,235.01996281719208,513.6749267578125]},{"page":62,"text":"3-77. The commander and staff conduct conceptual planning (using the Army design methodology) to","rect":[90.0,541.0614013671875,522.0839428901672,532.0077514648438]},{"page":62,"text":"understand, visualize, and describe the operational environment and the operational approach to the problem.","rect":[90.0,552.565185546875,522.0969336032867,543.531494140625]},{"page":62,"text":"The Army design methodology results in an improved understanding of the operational environment and an","rect":[90.0,564.1088256835938,522.0509839057922,555.05517578125]},{"page":62,"text":"operational approach that serves as a link between conceptual and detailed planning. The methodology may","rect":[89.98999786376953,575.6326293945313,522.0539135932922,566.5789184570313]},{"page":62,"text":"also result in an initial problem statement, an initial commander’s intent, and a commander’s initial","rect":[89.98999786376953,587.1363525390625,522.0025836238862,578.1026611328125]},{"page":62,"text":"reconnaissance and security guidance. Based on their understanding and learning gained while using the","rect":[90.0,598.5604858398438,522.1026599388123,589.5068359375]},{"page":62,"text":"Army design methodology, commanders issue planning guidance, including an operational approach, to","rect":[89.99998474121094,610.084228515625,522.0786938667297,601.0305786132813]},{"page":62,"text":"guide more detailed planning with either the MDMP or the rapid decision-making and synchronization","rect":[90.00995635986328,621.6079711914063,522.0896191596985,612.5543212890625]},{"page":62,"text":"process (RDSP). (Refer to FM 6-0 and ADP 5-0 for more information.) The BCT and Cavalry squadron’s","rect":[90.01988983154297,633.1316528320313,522.0349014406204,624.0780029296875]},{"page":62,"text":"planning efforts use the MDMP to create a synchronized plan that provides mission-type orders to","rect":[90.0,644.6553955078125,522.063862323761,635.6017456054688]},{"page":62,"text":"subordinate units, including the BCT’s Cavalry squadron.","rect":[90.00999450683594,656.1790771484375,321.21448731422427,647.1254272460938]},{"page":62,"text":"3-78. The military decision-making process is an iterative planning methodology to understand the situation","rect":[90.00003814697266,673.5792236328125,522.055805683136,664.5255737304688]},{"page":62,"text":"and mission, develop a course of action, and produce an operation plan or order (ADP 5-0). The MDMP","rect":[90.00001525878906,685.0829467773438,522.0040075798034,676.0492553710938]},{"page":62,"text":"integrates the activities of the commanders, staffs, subordinate headquarters, and unified action partners to","rect":[90.0,696.6266479492188,522.054829120636,687.572998046875]},{"page":62,"text":"decide on a course of action that accomplishes the mission and to produce an OPORD for execution. Leaders","rect":[89.99004364013672,708.1304321289063,522.1514175539016,699.0967407226563]},{"page":62,"text":"use the MDMP to apply thoroughness, clarity, sound judgment, logic, and professional knowledge to","rect":[89.99000549316406,719.674072265625,522.0529980659485,710.6104736328125]},{"page":62,"text":"3-16","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":62,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":62,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":63,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":63,"text":"understand situations, develop options to solve problems, and reach decisions. Commanders, staffs, and","rect":[108.0,83.48152923583985,540.0647778511047,74.44780731201172]},{"page":63,"text":"others use the MDMP to think critically and creatively while planning. Using the MDMP results in an","rect":[107.99996185302735,95.02519226074219,540.1833081245422,85.97154998779297]},{"page":63,"text":"improved understanding of the situation and an order that guides the force through preparation and execution.","rect":[107.99996185302735,106.42936706542969,540.2254736423492,97.37572479248047]},{"page":63,"text":"3-79. The MDMP consists of seven steps. Each step of the MDMP has various inputs, a method (step) to","rect":[107.99996185302735,123.9291000366211,540.0559277534485,114.89537811279297]},{"page":63,"text":"conduct, and outputs. The outputs lead to an increased understanding of the situation and facilitate the next","rect":[107.99000549316406,135.4727020263672,540.0020343074799,126.41905975341797]},{"page":63,"text":"step of the MDMP.","rect":[107.99004364013672,146.9765167236328,185.2387945652008,137.9427947998047]},{"page":63,"text":"3-80. The MDMP facilitates collaboration and parallel planning. The BCT headquarters solicits input and","rect":[107.99004364013672,164.51609802246095,539.8971753120422,155.4623260498047]},{"page":63,"text":"continuously shares information concerning future operations through planning meetings, WARNORDs,","rect":[107.98999786376953,176.0398406982422,539.9652197360992,166.98619079589845]},{"page":63,"text":"OPORDs, and fragmentary orders. Commanders encourage active collaborations to build","rect":[107.99004364013672,187.4440155029297,506.81648683547976,178.39036560058595]},{"page":63,"text":"shared","rect":[514.0773315429688,185.43209838867188,540.1814770698547,178.39036560058595]},{"page":63,"text":"understandings of situations, participate in course of action development and decision-making, and resolve","rect":[107.99004364013672,198.96775817871095,540.0947253684998,189.9141082763672]},{"page":63,"text":"conflicts before publishing orders.","rect":[107.98999786376953,210.49143981933595,245.238840341568,201.4377899169922]},{"page":63,"text":"3-81. The MDMP also drives preparation. Since time is a factor in all operations, commanders and staffs","rect":[107.99003601074219,227.9911651611328,540.0172622804641,218.9574432373047]},{"page":63,"text":"conduct time analyses of their planning and preparation activities early in the planning process. Time analysis","rect":[107.99003601074219,239.5348358154297,540.0279434328079,230.48118591308595]},{"page":63,"text":"may require the commander to direct subordinates through a series of WARNORDs to start necessary","rect":[108.0,251.0585174560547,539.9572339057922,242.00486755371095]},{"page":63,"text":"movements, conduct task organization changes, begin reconnaissance and security operations, and execute","rect":[107.99996185302735,262.4627380371094,540.075011013031,253.4091033935547]},{"page":63,"text":"other preparation activities before completing the plan. For example, to support reconnaissance and security","rect":[107.99996185302735,273.9864196777344,540.0569043159485,264.93280029296877]},{"page":63,"text":"operations, the Cavalry squadron commander and staff must conduct parallel planning with the BCT staff, as","rect":[107.99996185302735,285.5101623535156,540.0328872804641,276.45654296875]},{"page":63,"text":"seen in figure 3-4, page 3-18.","rect":[108.0,297.0339050292969,225.5578863620758,287.98028564453127]},{"page":63,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":63,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":63,"text":"3-17","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":64,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":64,"text":"Figure 3-4. BCT information collection timeline","rect":[186.12001037597657,538.24169921875,407.74888062667847,528.9091796875]},{"page":64,"text":"3-82. The commander is the most crucial participant in the MDMP. More than merely a decision-maker in","rect":[89.986083984375,555.821044921875,522.0349316596985,546.7673950195313]},{"page":64,"text":"the process, a commanderuses his or her experience,knowledge, and judgment to drive staff planning efforts.","rect":[89.97618865966797,567.2252807617188,521.9533789157867,558.1616821289063]},{"page":64,"text":"During the MDMP, commanders focus their activities on understanding, visualizing, and describing.","rect":[89.9861831665039,578.7489624023438,492.5624487400055,569.6953125]},{"page":64,"text":"3-83. The staff’s efforts during the MDMP focus on assisting the commander in understanding the situation,","rect":[89.9861831665039,596.2686157226563,521.9533789157867,587.2149658203125]},{"page":64,"text":"making decisions, and synchronizing those decisions into a fully developed plan or order. Staff activities","rect":[89.9861831665039,607.7923583984375,522.0200698976516,598.7387084960938]},{"page":64,"text":"during planning initially focus on mission analysis. Commanders use the products the staffs produce during","rect":[89.9861831665039,619.3161010742188,521.9282422065735,610.262451171875]},{"page":64,"text":"mission analyses to understand situations and develop a commander’s visualization. The mission analysis","rect":[89.98609924316406,630.8397827148438,522.0059707765579,621.7861328125]},{"page":64,"text":"products also define the staff’s input into the initial phases of the BCT’s reconnaissance and security operations.","rect":[89.97611236572266,642.2439575195313,519.3018896579742,633.1903076171875]},{"page":64,"text":"3-84. The RDSP is a decision-making and planning technique that commanders and staffs commonly use","rect":[89.97608947753906,659.7636108398438,522.0707995872498,650.7099609375]},{"page":64,"text":"during execution when available planning time is limited. (See FM 6-0 for more information regarding the","rect":[89.96619415283203,671.287353515625,522.050841091156,662.233642578125]},{"page":64,"text":"RDSP.) The MDMP is a time-intensive systematic process that provides the optimal solution, while the RDSP","rect":[89.96617889404297,682.8110961914063,521.8726599235534,673.7574462890625]},{"page":64,"text":"seeks a rapid and effective solution within the commander’s intent. The RDSP is a time-friendly","rect":[89.97612762451172,694.3347778320313,522.1465039253235,685.2811279296875]},{"page":64,"text":"decision-making and synchronization process that allows leaders to combine experience and intuition to","rect":[89.96615600585938,705.8585205078125,522.0110669136047,696.8048706054688]},{"page":64,"text":"understand situations quickly and develop courses of action. The Cavalry squadron staff most often executes","rect":[89.95622253417969,717.2626953125,522.0020645265579,708.2090454101563]},{"page":64,"text":"3-18","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":64,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":64,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":65,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":65,"text":"a RDSP following completion of their MDMP as they execute operations within the BCT’s MDMP planning","rect":[108.0,83.50144958496094,540.071918964386,74.44780731201172]},{"page":65,"text":"cycle, in addition to the Cavalry squadron’s continuously transitioning between reconnaissance and security","rect":[108.0,95.02519226074219,540.079731464386,85.97154998779297]},{"page":65,"text":"operations. The RDSP does not take the place of the MDMP; however, the RDSP supplements the MDMP","rect":[107.99004364013672,106.4094467163086,540.1177160758972,97.37572479248047]},{"page":65,"text":"when time is limited and the staff is unable to conduct the full MDMP. The RDSP includes the following","rect":[107.99004364013672,117.95310974121094,539.9900097846985,108.89946746826172]},{"page":65,"text":"five steps:","rect":[107.99004364013672,129.4568634033203,148.1935778865814,120.42314910888672]},{"page":65,"text":" Step 1. Compare the current situation to the order.","rect":[133.1999969482422,142.88148498535157,351.804270029068,133.84776306152345]},{"page":65,"text":" Step 2. Make the determination that a decision is required and determine the type.","rect":[133.1999969482422,156.46141052246095,478.7733862400055,147.4077606201172]},{"page":65,"text":" Step 3. Develop a course of action.","rect":[133.1999969482422,169.88148498535157,291.20865845680239,160.84776306152345]},{"page":65,"text":" Step 4. Refine and validate the course of action.","rect":[133.1999969482422,183.4414825439453,342.9508764743805,174.4077606201172]},{"page":65,"text":" Step 5. Issue and implement the order.","rect":[133.1999969482422,196.88148498535157,305.127756357193,187.84776306152345]},{"page":65,"text":"Anticipate Events and Adapt to Changing Circumstances","rect":[90.0,221.61358642578126,359.0149579343796,211.75486755371095]},{"page":65,"text":"3-85. Cavalry squadrons are the eyes and ears of the BCT. The BCT commander, the squadron commander","rect":[108.0,239.1414031982422,540.0757132158279,230.08775329589845]},{"page":65,"text":"and staffs must assist the BCT commander in understanding, visualizing, and describing the area of","rect":[108.00001525878906,250.66514587402345,540.0779715166092,241.6114959716797]},{"page":65,"text":"operations and the tactical situation. The squadron’s primary purpose is to answer the BCT commander’s","rect":[108.00997924804688,262.0693054199219,540.0369766359329,253.0156707763672]},{"page":65,"text":"PIRs (see figure 3-5, page 3-20).","rect":[108.00999450683594,273.5930480957031,238.89437317848206,264.5394287109375]},{"page":65,"text":"3-86. Outputs of the IPB, such as the enemy situational templates, the event template, and the BCT and","rect":[108.00003814697266,291.1126708984375,539.931293964386,282.0590515136719]},{"page":65,"text":"squadron commanders’ CCIRs are critically important to assisting the BCT in anticipating events and","rect":[108.0,302.6363830566406,540.076801776886,293.582763671875]},{"page":65,"text":"adapting to changing situations. As commanders articulate, assess, and refine their information requirements,","rect":[108.00995635986328,314.1601257324219,540.111887216568,305.10650634765627]},{"page":65,"text":"the BCT and squadron staffs further refine the commanders’ information requirements into specific","rect":[108.00995635986328,325.6639404296875,540.092833278656,316.6302185058594]},{"page":65,"text":"information collection plans.","rect":[108.00995635986328,337.0681457519531,223.29392457008363,328.034423828125]},{"page":65,"text":"3-87. As described previously in this chapter, PIRs are intelligence requirements that drive decision points.","rect":[108.00995635986328,354.607666015625,540.0986425876617,345.5540466308594]},{"page":65,"text":"(Refer to FM 1-02.1 and ADP 3-90 for additional information.) For example, the BCT commander could","rect":[108.00001525878906,366.1114807128906,540.0100293159485,357.0777587890625]},{"page":65,"text":"establish PIRs concerning enemy capabilities and disposition as well as PIRs concerning civil considerations","rect":[107.98011016845703,377.65509033203127,540.1504409914016,368.6014709472656]},{"page":65,"text":"in conjunction with a series of FFIRs about the BCT.","rect":[108.00005340576172,389.1788024902344,320.1381323337555,380.1152038574219]},{"page":65,"text":"3-88. The BCT commander requires information about the enemy to make informed decisions, such as—","rect":[108.0100326538086,406.6984558105469,531.011269569397,397.64483642578127]},{"page":65,"text":" When will enemy artillery be in range of our main body?","rect":[133.1999969482422,420.10137939453127,379.6584765892029,411.0477600097656]},{"page":65,"text":" Where is the enemy main body?","rect":[133.1999969482422,433.5413818359375,280.31442141342168,424.4877624511719]},{"page":65,"text":" Where are civilians on the battlefield?","rect":[133.1999969482422,445.09942626953127,303.5749804954529,438.0477600097656]},{"page":65,"text":"3-89. The BCT commander requires information about FFIRs (the things we know about ourselves) to make","rect":[107.99351501464844,464.62103271484377,540.1070544700623,455.5674133300781]},{"page":65,"text":"informed decisions, such as—","rect":[108.00346374511719,474.1328430175781,228.5991449356079,467.09112548828127]},{"page":65,"text":" Completion and status of defensive preparations.","rect":[133.1999969482422,489.5614929199219,346.774484872818,480.52777099609377]},{"page":65,"text":" Loss of communications with the Cavalry squadron.","rect":[133.1999969482422,503.0213928222656,360.4535925388336,493.9677734375]},{"page":65,"text":" Loss of key weapons system.","rect":[133.1999969482422,516.5814208984375,268.16919922828677,507.52777099609377]},{"page":65,"text":" Significant maintenance issues.","rect":[133.1999969482422,530.0214233398438,276.92505860328677,520.9677734375]},{"page":65,"text":"3-90. The Cavalry squadron staff further refines the BCT commander’s PIRs into discrete groups and","rect":[108.00347137451172,547.5410766601563,540.0862011909485,538.4874267578125]},{"page":65,"text":"indicators. Indicators, in intelligence usage, are items of information that reflects the intention or capability","rect":[108.01341247558594,559.0647583007813,540.0642895698547,550.0111083984375]},{"page":65,"text":"of an enemy and/or adversary to adopt or reject a course of action (JP 2-0). Indicators are collected within","rect":[108.01337432861328,570.5885009765625,540.0581860542297,561.52490234375]},{"page":65,"text":"NAIs or TAIs. In the below example, the BCT commander needs to know, “will the enemy attack within the","rect":[108.01337432861328,582.1122436523438,540.1080310325623,573.05859375]},{"page":65,"text":"next 72 hours?” After developing PIRs into groups and indicators, the staff and troop commanders then assign","rect":[108.01337432861328,593.6359252929688,540.090229511261,584.582275390625]},{"page":65,"text":"specific information requirements (SIRs) to facilitate tasking by matching requirements to asset capability.","rect":[108.01337432861328,605.15966796875,540.0692236423492,596.1060180664063]},{"page":65,"text":"The staff and troop commanders develop SIRs for each information collection asset based on capabilities of","rect":[108.00343322753906,616.5439453125,539.9785452470779,607.51025390625]},{"page":65,"text":"the asset and the expected threat activity (see figure 3-5, page 3-20). SIRs provide specific information about","rect":[108.00341796875,628.0875854492188,540.1229449520112,619.033935546875]},{"page":65,"text":"specific threat activity (or lack thereof) at specific locations. Cavalry units should have access to all","rect":[107.99348449707031,639.6112670898438,540.1239825496674,630.5576171875]},{"page":65,"text":"information requirements at the lowest level to enable them to timely and accurately report to the commander,","rect":[107.99349975585938,651.135009765625,540.088205575943,642.0813598632813]},{"page":65,"text":"which assists the commander in developing his or her situational understanding. After doing an analysis of","rect":[107.99349975585938,662.6587524414063,540.0692434892654,653.6051025390625]},{"page":65,"text":"probable firing positions given the terrain, the groups’ indicators, and SIRs for their respective area of","rect":[108.00347900390625,674.1824340820313,540.1160574541092,665.1287841796875]},{"page":65,"text":"operations could include the following:","rect":[108.0035400390625,685.586669921875,265.3326617488861,676.5330200195313]},{"page":65,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":65,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":65,"text":"3-19","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":66,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":66,"text":"PIR 1: Will the enemy attack within the next 72 hours?","rect":[117.36000061035156,83.38139343261719,338.02279543685918,74.32775115966797]},{"page":66,"text":" Group 1.1: Positioning of air defense artillery (ADA) assets.","rect":[115.19999694824219,96.94139099121094,374.73002076148989,87.88774871826172]},{"page":66,"text":" Indicator 1.1.1: Are there any ZSU-23s present?","rect":[133.1999969482422,110.98143005371094,344.0166308860779,101.92778778076172]},{"page":66,"text":" SIR 1.1.1.1: Report any transmissions across the J frequency band.","rect":[133.1999969482422,125.02140808105469,418.765451669693,115.96776580810547]},{"page":66,"text":" SIR 1.1.1.2: Report light tracked vehicle with satellite dish.","rect":[133.1999969482422,139.18138122558595,389.004953622818,130.1277313232422]},{"page":66,"text":" Group 1.2: Positioning of fires assets.","rect":[115.19999694824219,152.6213836669922,283.86988282203677,143.56773376464845]},{"page":66,"text":" Indicator 1.2.1: Are there three or more BM-21s?","rect":[133.1999969482422,164.64944458007813,348.69186281967168,157.6077117919922]},{"page":66,"text":" SIR 1.2.1.1: Report intercept of low angle fires.","rect":[133.1999969482422,180.70140075683595,342.0933630466461,171.6477508544922]},{"page":66,"text":" SIR 1.2.1.2: Report wheeled vehicle with rocket tubes.","rect":[133.1999969482422,194.72145080566407,370.4096472263336,185.68772888183595]},{"page":66,"text":" SIR 1.2.2.1: Report tracked artillery.","rect":[133.1999969482422,208.7814178466797,297.80021119117739,199.72776794433595]},{"page":66,"text":" SIR 1.2.2.2: Report intercept of medium angle fires.","rect":[133.1999969482422,222.82139587402345,359.84208130836489,213.7677459716797]},{"page":66,"text":"Figure 3-5. Priority intelligence requirement breakdown","rect":[165.83120727539063,624.6376953125,428.0969125623703,615.3151245117188]},{"page":66,"text":"3-91. The Cavalry squadron has a supporting relationship to the BCT’s reconnaissance and security","rect":[89.97588348388672,642.2171020507813,522.0190014839172,633.1634521484375]},{"page":66,"text":"operation. The squadron staff often operates on a parallel planning timeline with the BCT staff during the","rect":[89.97588348388672,653.7407836914063,522.0336902122498,644.6871337890625]},{"page":66,"text":"operations process.","rect":[89.97590637207031,665.1250610351563,166.61911988258363,656.0913696289063]},{"page":66,"text":"Note. The development of CCIRs (both PIRs and FFIRs) is an operations function led by the BCT","rect":[115.20458221435547,688.4214477539063,503.9825326795578,679.3677978515625]},{"page":66,"text":"S-3 in collaboration with the BCT S-2 and refined by the BCT commander.","rect":[115.19999694824219,699.94140625,417.19715332984927,690.8877563476563]},{"page":66,"text":"3-20","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":66,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":66,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":67,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":67,"text":"Task Organize the Force and Prioritize Efforts","rect":[90.0,84.5736083984375,310.0934491453171,74.71488952636719]},{"page":67,"text":"3-92. Task organization is a temporary grouping of forces designed to accomplish a particular mission","rect":[108.0,102.10142517089844,539.9734082221985,93.04778289794922]},{"page":67,"text":"(ADP 5-0). Commanders task organize the force by establishing command and support relationships","rect":[107.98999786376953,113.62516784667969,540.0100601320266,104.57146453857422]},{"page":67,"text":"according to their analysis of the mission variables of METT-TC (I).","rect":[107.98007202148438,125.14884948730469,382.6171362400055,116.09520721435547]},{"page":67,"text":"3-93. BCTs task organize and assign command relationships for their Cavalry formations to execute","rect":[107.98008728027344,142.6685028076172,540.0778796653748,133.61485290527345]},{"page":67,"text":"combined arms, air-ground operations to accomplish their assigned mission in their anticipated operational","rect":[107.98009490966797,154.19224548339845,540.0819293270112,145.1385955810547]},{"page":67,"text":"environment. The BCT establishes conditions for reconnaissance and security operations by enabling the","rect":[107.97013854980469,165.59642028808595,540.0579822044373,156.5427703857422]},{"page":67,"text":"Cavalry squadron with aviation support, joint and organic fires, and additional intelligence collection assets.","rect":[107.97013854980469,177.1201629638672,539.9453222751617,168.0565643310547]},{"page":67,"text":"This may include partnering with and access to joint and national-level intelligence assets. The more","rect":[107.9801025390625,188.6438446044922,540.0698230247498,179.5802459716797]},{"page":67,"text":"sufficient the task organization, the more capable the reconnaissance organization is to develop the situation","rect":[107.97013854980469,200.16758728027345,540.1405835151672,191.1139373779297]},{"page":67,"text":"through action, especially in an unclear operational environment. Similarly, in stability tasks, task organizing","rect":[107.9601821899414,211.6913299560547,540.016987323761,202.63768005371095]},{"page":67,"text":"the squadrons with assets specific to collecting information for follow-on operations (such as civil affairs,","rect":[107.96014404296875,223.0955047607422,539.938303232193,214.04185485839845]},{"page":67,"text":"translators, engineers, and infrastructure assessment teams) allows commanders to receive relevant","rect":[107.9601821899414,234.6191864013672,540.0907183895112,225.56553649902345]},{"page":67,"text":"information in a timely fashion.","rect":[107.95022583007813,246.14292907714845,234.87244629859925,237.0892791748047]},{"page":67,"text":"3-94. When task organizing, commanders and staffs should clearly define the command and support","rect":[107.95022583007813,263.6625671386719,539.9544879207612,254.6089324951172]},{"page":67,"text":"relationships between organizations. The type of command relationship relates to the nature of the operation","rect":[107.95022583007813,275.1863098144531,540.0200390815735,266.1326904296875]},{"page":67,"text":"and the expected duration of the organization. The duration of the task organization and command and support","rect":[107.96019744873047,286.7099914550781,540.1097003231049,277.6563720703125]},{"page":67,"text":"relationships should be defined by transition points where the unit changes mission or priority of support.","rect":[107.96022033691406,298.11419677734377,519.780100107193,289.0605773925781]},{"page":67,"text":"3-95. When task organizing, commanders and staffs should consider the various information collection and","rect":[107.96022033691406,315.63385009765627,540.127827167511,306.5802307128906]},{"page":67,"text":"combined arms reconnaissance and security assets available to BCTs. Information collection assets can be","rect":[107.96022033691406,327.1575622558594,540.071104763031,318.10394287109377]},{"page":67,"text":"categorized several different ways. Table 3-1, page 3-22 outlines organic capabilities of BCT units.","rect":[107.96022033691406,338.6812744140625,504.89213013648989,329.6276550292969]},{"page":67,"text":"3-96. Additional combat power enhances the Cavalry squadron’s ability to gain and maintain contact and","rect":[107.97017669677735,356.200927734375,539.9873242378235,347.1473083496094]},{"page":67,"text":"execute reconnaissance and battle handover. Additional combat power provides the Cavalry squadron with","rect":[107.97017669677735,367.7246398925781,540.008442401886,358.6710205078125]},{"page":67,"text":"an increased capability to defeat enemy reconnaissance and security organizations and survive chance","rect":[107.97017669677735,379.12884521484377,540.1207263450623,370.0752258300781]},{"page":67,"text":"encounters. Task organizing additional combat power with the BCT’s Cavalry squadron gives the brigade a","rect":[107.97017669677735,390.6525573730469,540.1727282981873,381.59893798828127]},{"page":67,"text":"marked advantage during decisive operations.","rect":[107.97017669677735,402.17626953125,291.6583960056305,393.1226501464844]},{"page":67,"text":"3-97. Although properly task organized, Cavalry organizations can produce effects that outweigh the","rect":[107.97017669677735,419.6959228515625,540.0670154075623,410.6423034667969]},{"page":67,"text":"diversion of combat power from the main body, such as achieving an economy of force. The BCT commander","rect":[107.97018432617188,431.2196350097656,539.9393606767654,422.166015625]},{"page":67,"text":"should consider that dedicating these additional capabilities to the Cavalry squadron comes at the expense of","rect":[107.97017669677735,442.7433776855469,540.0482473955154,433.68975830078127]},{"page":67,"text":"capability for potential follow-on operations. Therefore, commanders should carefully consider the risks of","rect":[107.97017669677735,454.1475830078125,540.0231619462967,445.0939636230469]},{"page":67,"text":"executing reconnaissance operations as an economy of force.","rect":[107.96022033691406,465.67132568359377,352.402658700943,456.6177062988281]},{"page":67,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":67,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":67,"text":"3-21","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":68,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":68,"text":"Table 3-1. Available reconnaissance and security information collection capabilities","rect":[98.27999877929688,83.44168853759766,495.48581910324097,74.10916900634766]},{"page":68,"text":"PREPARE","rect":[72.0,557.280029296875,118.27427053451538,549.3359985351563]},{"page":68,"text":"3-98. Preparation is those activities performed by units and Soldiers to improve their ability to execute an","rect":[90.0,577.4214477539063,522.035053730011,568.3677978515625]},{"page":68,"text":"operation (ADP 5-0). Preparation creates conditions that improve friendly forces’ opportunities for success.","rect":[89.99999237060547,588.9451293945313,521.9623510837555,579.8914794921875]},{"page":68,"text":"Preparation requires commanders, staffs, and units to ensure that the force is trained, equipped, and ready to","rect":[90.00000762939453,600.4688720703125,522.053120136261,591.4152221679688]},{"page":68,"text":"execute operations.","rect":[90.00000762939453,611.9725952148438,167.24976563453675,602.9389038085938]},{"page":68,"text":"3-99. During preparation, commanders take every opportunity to improve their situational understanding","rect":[90.00000762939453,629.51220703125,522.0410351753235,620.4585571289063]},{"page":68,"text":"prior to execution of their decisive operations. The BCT and its organic Cavalry squadron must be prepared","rect":[90.00001525878906,640.9164428710938,522.0481152534485,631.86279296875]},{"page":68,"text":"to execute aggressive and continuous reconnaissance and security operations during the preparation phase of","rect":[90.00001525878906,652.4401245117188,522.2021170244217,643.386474609375]},{"page":68,"text":"the operations process.","rect":[90.0,663.9439086914063,181.4079077243805,654.9102172851563]},{"page":68,"text":"3-100. At the same time, the BCT is often most vulnerable to surprise and enemy attacks during preparation,","rect":[90.0,681.4835205078125,522.1178686618805,672.4298706054688]},{"page":68,"text":"when forces might be concentrated in AAs. While leaders are away from their units and concentrated together","rect":[90.0,693.0072021484375,522.1167288408279,683.9535522460938]},{"page":68,"text":"for rehearsals, part of the force could be moving to task organize. Required supplies may be unavailable or","rect":[90.0,704.4114379882813,522.0867605791092,695.3577880859375]},{"page":68,"text":"being repositioned. As a result, security operations are essential during this phase of the operations process.","rect":[89.99002838134766,715.9351196289063,520.0363256931305,706.8814697265625]},{"page":68,"text":"3-22","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":68,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":68,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":69,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":69,"text":"3-101. Commanders and staffs must revise and refine their initial plan during preparation. The","rect":[108.0,83.50144958496094,540.1444690208435,74.44780731201172]},{"page":69,"text":"commander’s situational understanding changes over the course of the operations process as enemy actions","rect":[108.0,95.02519226074219,540.1514785890579,85.97154998779297]},{"page":69,"text":"require them to revise their plan. The ongoing reconnaissance and security operations generate both","rect":[108.0,106.42936706542969,540.0468945503235,97.37572479248047]},{"page":69,"text":"applicable combat information and unforeseen opportunities. During preparation, commanders confirm or","rect":[107.99004364013672,117.95310974121094,540.0410452470779,108.89946746826172]},{"page":69,"text":"deny assumptions made during planning. Commanders must revise and refine their operational plan when","rect":[107.99004364013672,129.47679138183595,540.0249829292297,120.42314910888672]},{"page":69,"text":"reconnaissance and security operations provide significant new information from PIRs or FFIRs.","rect":[107.99004364013672,141.0005340576172,494.9659216403961,131.94688415527345]},{"page":69,"text":"3-102. Finally, commanders and staffs conduct effective confirmation briefs and rehearsals. A confirmation","rect":[108.00003814697266,158.5201873779297,539.9962964057922,149.46653747558595]},{"page":69,"text":"brief is a brief subordinate leaders give to the higher commander immediately after the operation order is","rect":[108.00003814697266,170.0438690185547,540.0159805421829,160.99021911621095]},{"page":69,"text":"given to confirm understanding (ADP 5-0). The brief is the leaders’ understanding of the commander’s intent,","rect":[107.9801025390625,181.44810485839845,539.9592382907867,172.3943328857422]},{"page":69,"text":"their specific tasks, the BCT commander’s reconnaissance guidance, and the relationship between their","rect":[107.98008728027344,192.97178649902345,540.0747366533279,183.9181365966797]},{"page":69,"text":"mission and those of the other units in the operation (see ADP 5-0). Ideally, the commander conducts","rect":[107.98007202148438,204.4955291748047,540.1443985109329,195.44187927246095]},{"page":69,"text":"confirmation briefs in person with selected staff members.","rect":[107.98007202148438,215.99928283691407,341.373850107193,206.96556091308595]},{"page":69,"text":"3-103. A rehearsal is a session in which the commander and staff or unit practices expected actions to","rect":[107.98007202148438,233.51893615722657,539.9682812690735,224.48521423339845]},{"page":69,"text":"improve performance during execution (ADP 5-0). Both confirmation briefs and rehearsals are essential to","rect":[107.9701156616211,245.06260681152345,539.8855175971985,236.0089569091797]},{"page":69,"text":"ensure that subordinate commanders and staffs understand the concept of operations and the commander’s","rect":[107.96015930175781,256.4468688964844,540.0849502687454,247.4131317138672]},{"page":69,"text":"intent. Rehearsals and confirmation briefs allow leaders to practice synchronizing operations at times and","rect":[107.96015930175781,267.9905090332031,540.0130200386047,258.9368896484375]},{"page":69,"text":"places critical to mission accomplishment. Effective rehearsals and confirmation briefs solidify the sequence","rect":[107.95020294189453,279.5142517089844,540.1147448997498,270.46063232421877]},{"page":69,"text":"of the operation’s key actions and improve mutual understanding throughout the unit. During preparation,","rect":[107.95020294189453,291.0379333496094,539.9983007907867,281.98431396484377]},{"page":69,"text":"commanders and staffs must ensure that the BCT and the Cavalry squadron are—","rect":[107.95020294189453,302.5616760253906,434.58838748931887,293.508056640625]},{"page":69,"text":" Securing and protecting the force.","rect":[133.1999969482422,315.9413757324219,287.0075170993805,306.88775634765627]},{"page":69,"text":" Conducting aggressive reconnaissance to improve commanders’ situational understanding.","rect":[133.1999969482422,329.3813781738281,514.524973154068,320.3277587890625]},{"page":69,"text":" Revising, refining, and rehearsing the operational plan.","rect":[133.1999969482422,342.9413757324219,371.48536133766177,333.88775634765627]},{"page":69,"text":" Integrating, organizing, and configuring their task organized, combined-arms, air-ground teams.","rect":[133.1999969482422,356.3813781738281,535.5265600681305,347.3277587890625]},{"page":69,"text":" Ensuring forces and resources are ready for execution.","rect":[133.1999969482422,369.9413757324219,368.996408700943,360.88775634765627]},{"page":69,"text":"Note. The BCT and the Cavalry squadron should also conduct a reconnaissance and security","rect":[133.2022705078125,393.2214050292969,522.107319355011,384.16778564453127]},{"page":69,"text":"rehearsal to ensure that the BCT reconnaissance and security plan meets the commander’s intent","rect":[133.1999969482422,404.74139404296877,522.1690875301362,395.6877746582031]},{"page":69,"text":"and is synchronized throughout the BCT. The BCT commander, executive officer, S-2, S-3, fire","rect":[133.1999969482422,416.2651062011719,522.0802600364685,407.21148681640627]},{"page":69,"text":"support coordinator, Cavalry squadron commander, military intelligence company commander,","rect":[133.1801300048828,427.6693115234375,522.036447763443,418.6156921386719]},{"page":69,"text":"and other BCT staff cells (for example, sustainment, information operations, and mobile","rect":[133.1801300048828,439.1731262207031,522.0802600364685,430.139404296875]},{"page":69,"text":"communications) should attend. The rehearsal should last no longer than 1 hour and should focus","rect":[133.18016052246095,450.7167663574219,522.0186050539016,441.66314697265627]},{"page":69,"text":"on rehearsing reconnaissance and security tasks that address each decision point and PIR, and their","rect":[133.18016052246095,462.240478515625,522.0544729814529,453.1868591308594]},{"page":69,"text":"associated NAIs.","rect":[133.18020629882813,471.7522888183594,200.82853150367738,464.7105712890625]},{"page":69,"text":"EXECUTE","rect":[90.0,505.8222351074219,137.59435415267945,497.73602294921877]},{"page":69,"text":"3-104. Execution is putting a plan into action by applying combat power to accomplish the mission. (Refer","rect":[108.0,525.701416015625,540.0760183916092,516.6477661132813]},{"page":69,"text":"to ADP 5-0 for more information.) In execution, commanders, staffs, and subordinate commanders focus","rect":[108.0,537.2052001953125,540.1138198976516,528.1715087890625]},{"page":69,"text":"their efforts on translating decisions into actions. During execution, the tactical situation changes rapidly.","rect":[108.0,548.7488403320313,540.0756933689117,539.6951904296875]},{"page":69,"text":"Operations the commander originally envisioned during planning may bear little resemblance to actual","rect":[107.98999786376953,560.2725830078125,540.1417437801362,551.2189331054688]},{"page":69,"text":"events. Subordinate commanders require maximum latitude to take advantage of unforeseen situations in the","rect":[107.99003601074219,571.7963256835938,540.096739528656,562.74267578125]},{"page":69,"text":"form of both opportunities and challenges to execute actions on contact, develop the situation through action,","rect":[107.99008178710938,583.3200073242188,540.0927832126617,574.266357421875]},{"page":69,"text":"and meet the commander’s intent, even when the original order no longer applies.","rect":[108.00005340576172,594.7241821289063,435.0866186618805,585.6705322265625]},{"page":69,"text":"3-105. Cavalry organizations assist BCTs in developing the situation through action. Cavalry organizations","rect":[108.00005340576172,612.2438354492188,540.0409439210891,603.190185546875]},{"page":69,"text":"within the BCTs must effectively seize the initiative through combined arms, air-ground teams and execute","rect":[108.0100326538086,623.767578125,540.1007068138123,614.7139282226563]},{"page":69,"text":"decision point tactics.","rect":[108.0100326538086,635.2713623046875,194.97376465797425,626.2376708984375]},{"page":69,"text":"Seize the Initiative through Combined-Arms, Air-Ground Team","rect":[90.0,659.8535766601563,391.0210269994736,649.994873046875]},{"page":69,"text":"3-106. Reconnaissance and security operations, by their nature, are combined arms, air-ground operations.","rect":[108.0,677.3814086914063,540.0847265720367,668.3277587890625]},{"page":69,"text":"These operations provide the commander with information and intelligence to reduce uncertainty and enable","rect":[108.00003814697266,688.9051513671875,540.124571559906,679.8515014648438]},{"page":69,"text":"rapid decision-making. Moreover, the same combined arms, air-ground teams can present enemy forces with","rect":[108.00003814697266,700.4288940429688,540.065815448761,691.375244140625]},{"page":69,"text":"multiple forms of contact, forcing them to react continuously. Aviation assets provide critical complementary","rect":[107.99008178710938,711.9525756835938,540.0578808784485,702.89892578125]},{"page":69,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":69,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":69,"text":"3-23","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":70,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":70,"text":"effects to the BCT’s organic Cavalry squadrons during reconnaissance and security operations. Specifically,","rect":[90.0,83.50144958496094,522.1206152439117,74.44780731201172]},{"page":70,"text":"air assets provide direct fire, extensive observation capabilities, and facilitate the rapid movement of supplies","rect":[90.0,95.0052719116211,522.1724746828079,85.97154998779297]},{"page":70,"text":"and personnel during reconnaissance and security operations. Attack and reconnaissance rotary- and","rect":[90.0,106.42936706542969,522.0528149604797,97.37572479248047]},{"page":70,"text":"fixed-wing aircraft employ guided and unguided munitions, while Army attack aviation and fixed-wing assets","rect":[89.99000549316406,117.95310974121094,522.0179947023391,108.89946746826172]},{"page":70,"text":"can provide close air support to ground forces to strengthen the ground Cavalry squadron’s ability to retain","rect":[89.99004364013672,129.47679138183595,521.9143872261047,120.42314910888672]},{"page":70,"text":"freedom of maneuver and action to conduct counterreconnaissance operations. Additionally, these assets can","rect":[89.98008728027344,141.0005340576172,521.9442944526672,131.94688415527345]},{"page":70,"text":"quickly transition to conduct interdiction missions by destroying high-value and high-payoff targets within a","rect":[89.99004364013672,152.52427673339845,522.0927112083435,143.4706268310547]},{"page":70,"text":"TAI or as identified during reconnaissance or security operations. Rotary- and fixed-wing aircraft can provide","rect":[90.00003814697266,164.04795837402345,522.1146228294373,154.9943084716797]},{"page":70,"text":"additional observation to assist the Cavalry organization in maintaining contact.","rect":[89.99008178710938,175.4521942138672,409.39640259742739,166.39854431152345]},{"page":70,"text":"3-107. For a combined arms air-ground team to enable the conduct of reconnaissance and security","rect":[89.99008178710938,192.97178649902345,522.0390820503235,183.9181365966797]},{"page":70,"text":"operations properly, it must coordinate the allocation of sufficient indirect fires. The squadron must augment","rect":[89.9801025390625,204.4955291748047,522.1186114559174,195.44187927246095]},{"page":70,"text":"their organic mortars with rocket and cannon artillery either in a direct support relationship or through priority","rect":[89.99008178710938,216.0192108154297,522.0769238471985,206.96556091308595]},{"page":70,"text":"of fires. This provides mobility and survivability for the aviation TF by enabling them to avoid, suppress, or","rect":[89.9900894165039,227.54295349121095,522.0528860673904,218.4893035888672]},{"page":70,"text":"kill air defense threats. This also allows attack aviation to conserve critical munitions by using cannons to","rect":[89.99008178710938,239.0666961669922,521.9933667182922,230.01304626464845]},{"page":70,"text":"shape the disruption zone for the squadron’s ground maneuver and rockets to destroy or neutralize","rect":[89.99008178710938,250.4708709716797,522.0907580833435,241.41722106933595]},{"page":70,"text":"high-payoff targets in the deep area.","rect":[89.99008178710938,261.9945373535156,234.45688843727113,252.94090270996095]},{"page":70,"text":"3-108. Effective air-ground operations build upon relationships, mutual trust, application of joint and Army","rect":[89.99008178710938,279.5141906738281,522.037006855011,270.4505920410156]},{"page":70,"text":"doctrine, and a common understanding of the operational environment, operation, and mission. They require","rect":[89.98016357421875,291.0379333496094,522.082091091156,281.98431396484377]},{"page":70,"text":"detailed planning, coordination, and synchronized employment of ground and air maneuver and fire to","rect":[89.98016357421875,302.5616455078125,522.070209980011,293.5080261230469]},{"page":70,"text":"achieve the commander’s objectives and ensure freedom of movement and action. Air-ground operations","rect":[89.98016357421875,314.0853576660156,522.1296280031204,305.0217590332031]},{"page":70,"text":"require detailed planning of synchronized timelines, aviation element task and purpose, and airspace and","rect":[89.9802017211914,325.4895935058594,521.9014477729797,316.43597412109377]},{"page":70,"text":"close air support employment.","rect":[89.9801025390625,337.0133056640625,211.15340638160706,327.9596862792969]},{"page":70,"text":"3-109. The key to implementing aviation assets into reconnaissance and security operations is early","rect":[89.9801025390625,354.532958984375,522.0818676948547,345.4793395996094]},{"page":70,"text":"integration into the supported commander’s operations process. The supported commander and staff must","rect":[89.9800796508789,366.05670166015627,522.0691119441987,357.0030822753906]},{"page":70,"text":"understand the capabilities and limitations of the aviation unit, the types of aircraft available, and the doctrinal","rect":[89.9800796508789,377.5804138183594,522.1444293270112,368.52679443359377]},{"page":70,"text":"missions and roles that aviation can support. Regardless of the type of reconnaissance or security operation,","rect":[89.98007202148438,388.984619140625,522.0561621189117,379.9309997558594]},{"page":70,"text":"integrating aviation into the early stages of planning allows the supported commander, staff, and subordinates","rect":[89.98007202148438,400.5083312988281,522.0311782960891,391.4547119140625]},{"page":70,"text":"to leverage the capabilities and deconflict issues critical to the effective use and synchronization of aviation","rect":[89.98007202148438,412.03204345703127,522.0359082221985,402.9784240722656]},{"page":70,"text":"in a combined arms environment. The aviation commander’s plan must be nested and deconflicted with the","rect":[89.98005676269531,423.535888671875,522.0679919700623,414.5021667480469]},{"page":70,"text":"ground scheme of maneuver. Aviation-specific information includes the location of aerial observation posts,","rect":[89.98005676269531,435.0794982910156,521.9552099704742,426.02587890625]},{"page":70,"text":"battle positions, forward arming and refueling points (FARPs), ingress and egress corridors and routes, UAS","rect":[89.98999786376953,446.60321044921877,522.0052893180847,437.549560546875]},{"page":70,"text":"launch and recovery sites, and other airspace coordinating measures. These locations and assets must","rect":[89.99004364013672,458.0074157714844,522.0259600887299,448.95379638671877]},{"page":70,"text":"integrate with the ground scheme of maneuver, ground observation posts and artillery positions, and other","rect":[89.99004364013672,469.5311584472656,522.1683645830154,460.4775390625]},{"page":70,"text":"airspace restrictions, such as UAS restricted operations zones, so they do not interfere with indirect fires,","rect":[89.99002838134766,481.05487060546877,522.0448095798492,472.0012512207031]},{"page":70,"text":"maneuver by other units, or aviation use. Consideration to the positioning and securing of the aviation unit’s","rect":[89.99002838134766,492.57861328125,522.1484268312454,483.5249938964844]},{"page":70,"text":"maintenance and support assets in a forward location is essential to minimize distance traveled yet still","rect":[89.99002838134766,504.10235595703127,522.0251055965424,495.0485534667969]},{"page":70,"text":"maintain supportability. Coordinating airspace for the rapid and efficient use of fires and aviation is essential","rect":[89.98999786376953,515.6260375976563,521.8847857723237,506.5723876953125]},{"page":70,"text":"and must be reviewed often. Once planning is complete, all ground and aviation units must be using the same","rect":[89.99003601074219,527.0302124023438,521.9923083763123,517.9765625]},{"page":70,"text":"common operational picture to prevent fratricide and to conduct operations efficiently.","rect":[89.99003601074219,538.5540161132813,436.51835083961489,529.5003662109375]},{"page":70,"text":"3-110. The BCT’s combined arms, air-ground teams operate and disperse over wide areas to evade enemy","rect":[89.99004364013672,556.0736083984375,522.065815448761,547.0199584960938]},{"page":70,"text":"surveillance and strike capabilities, to deceive the enemy, and to achieve surprise. Aviation units can quickly","rect":[89.99006652832031,567.5973510742188,522.167377948761,558.543701171875]},{"page":70,"text":"reconnoiter terrain that is difficult or hard to reach with ground vehicles, large swaths of open area (such as","rect":[89.98011016845703,579.12109375,522.1305435304641,570.0674438476563]},{"page":70,"text":"desert plains and open valleys), or the dead space between ground observation posts and battle positions.","rect":[89.97010040283203,590.5253295898438,521.9353125095367,581.4716796875]},{"page":70,"text":"Attack and reconnaissance aviation units are ideally suited for reconnaissance and security operations due to","rect":[89.97010040283203,602.0489501953125,522.0398755073547,592.9953002929688]},{"page":70,"text":"the superior speed, mobility, and firepower inherent to aviation. Attack and reconnaissance aircraft have","rect":[89.98005676269531,613.5726928710938,522.0986316184998,604.51904296875]},{"page":70,"text":"advanced day and night observation and target acquisition systems, long-range digital and voice","rect":[89.98005676269531,625.096435546875,522.087706325531,616.0427856445313]},{"page":70,"text":"communication capabilities, and can integrate with UAS platforms for increased situational awareness and","rect":[89.98005676269531,636.6201782226563,521.9362988471985,627.5665283203125]},{"page":70,"text":"information collection. Attack and reconnaissance aviation enable the BCT to concentrate rapidly against","rect":[89.98005676269531,648.1438598632813,521.9720050106049,639.0902099609375]},{"page":70,"text":"decisive points to attack enemy weaknesses, isolate the enemy from sources of strength, or strike the enemy","rect":[89.98005676269531,659.548095703125,522.0329174995422,650.4944458007813]},{"page":70,"text":"from unexpected directions.","rect":[89.97013854980469,671.0518798828125,201.91355347633363,662.0181884765625]},{"page":70,"text":"3-24","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":70,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":70,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":71,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":71,"text":"Execute Decision Points","rect":[90.0,82.3435287475586,201.94557622051239,74.71488952636719]},{"page":71,"text":"3-111. The commander and staff’s ability to anticipate changing conditions on the battlefield is key to","rect":[108.0,102.10142517089844,540.0658764839172,93.04778289794922]},{"page":71,"text":"mission success. Commanders and their staffs must see themselves and other friendly forces in addition to","rect":[108.0,113.62516784667969,540.1723217964172,104.57152557373047]},{"page":71,"text":"the terrain, threats, enemies, and adversaries, and the population. Reconnaissance and security operations","rect":[107.99996185302735,125.14884948730469,540.1513565187454,116.09520721435547]},{"page":71,"text":"allow commanders to anticipate changing conditions accurately. Cavalry organizations confirm or deny the","rect":[107.99996185302735,136.67259216308595,540.0866076927185,127.61894989013672]},{"page":71,"text":"commander’s and the staff’s initial anticipatory assumptions. For example, during course of action analysis,","rect":[107.99000549316406,148.1963348388672,540.076975107193,139.14268493652345]},{"page":71,"text":"commanders and staffs focus on critical events that directly influence mission accomplishment. In addition,","rect":[107.99000549316406,159.6005096435547,540.0709936618805,150.54685974121095]},{"page":71,"text":"the commander may identify PIRs that answer the commander’s decision points during these identified","rect":[107.99000549316406,171.1241912841797,540.0597729682922,162.07054138183595]},{"page":71,"text":"critical events. The decision support matrix coupled with the decision support template is the result of a","rect":[107.99996185302735,182.6280059814453,539.8466174583435,173.5942840576172]},{"page":71,"text":"commander and staff’s ability to visualize the battlefield and identify critical points where transitions or","rect":[107.99996185302735,194.1716766357422,540.0571585283279,185.11802673339845]},{"page":71,"text":"decisions must occur.","rect":[107.99996185302735,203.68344116210938,194.487619638443,196.64170837402345]},{"page":71,"text":"3-112. A decision point is a point in space and the latest time when the commander or staff anticipates","rect":[107.99996185302735,223.07557678222657,539.8735855226516,214.04185485839845]},{"page":71,"text":"making a key decision concerning a specific course of action (JP 5-0). A decision support template is a","rect":[107.989990234375,234.6191864013672,540.0958240013123,225.56553649902345]},{"page":71,"text":"combined intelligence and operations graphic based on the results of war-gaming that depicts decision points,","rect":[107.98999786376953,246.14292907714845,539.9592382907867,237.0892791748047]},{"page":71,"text":"timelines associated with movement of forces and the flow of the operation, and other key items of","rect":[107.99004364013672,257.6666564941406,540.0699759111404,248.61302185058595]},{"page":71,"text":"information required to execute a specific friendly course of action (JP 2-0). A decision support matrix is a","rect":[107.98999786376953,269.1903991699219,539.9662463645935,260.13677978515627]},{"page":71,"text":"written record of a war-gamed course of action that describes decision points and associated actions at those","rect":[107.99000549316406,280.7140808105469,540.1005847434998,271.66046142578127]},{"page":71,"text":"decision points (ADP 5-0).","rect":[107.99002075195313,292.0984191894531,215.83988404273988,283.064697265625]},{"page":71,"text":"3-113. The decisions commanders and staffs must make during the execution of operations are either","rect":[107.99002075195313,309.6379699707031,540.1058645830154,300.5843505859375]},{"page":71,"text":"execution decisions or adjustment decisions. (Refer to ADP 5-0 for additional information.) Execution","rect":[107.99002075195313,321.1616516113281,540.0381665229797,312.0980529785156]},{"page":71,"text":"decisions involve options anticipated in planning and outlined in the OPORD. Adjustment decisions involve","rect":[107.9801025390625,332.68536376953127,540.0907580833435,323.62176513671877]},{"page":71,"text":"options that commanders did not anticipate—they respond to unanticipated opportunities and threats and","rect":[107.9800796508789,344.2090759277344,540.0498242378235,335.15545654296877]},{"page":71,"text":"require implementing and synchronizing unanticipated operations. Adjustment decisions may include a","rect":[107.99000549316406,355.7327880859375,540.107725856781,346.669189453125]},{"page":71,"text":"decision to develop an entirely new plan.","rect":[107.99000549316406,367.1369934082031,272.23731446266177,358.0833740234375]},{"page":71,"text":"3-114. Cavalry organizations answer SIRs to support the brigade’s PIRs and decision points. Answering","rect":[107.99000549316406,384.6566467285156,540.0498242378235,375.60302734375]},{"page":71,"text":"SIRs provides the commander with the flexibility necessary for mission accomplishment. During mission","rect":[107.9899673461914,396.18035888671877,540.043842792511,387.1267395019531]},{"page":71,"text":"execution, the staff is continually updating their critical facts and assumptions based on reports from","rect":[107.9899673461914,407.7040710449219,540.0527740726471,398.65045166015627]},{"page":71,"text":"reconnaissance and security operations. The technique of using decision points to influence critical events on","rect":[107.99000549316406,419.227783203125,539.9296460151672,410.1741638183594]},{"page":71,"text":"the battlefield highlights the necessity for continuous reporting during mission execution.","rect":[107.9801025390625,430.7515563964844,465.54603028297427,421.6979064941406]},{"page":71,"text":"3-115. The location of commanders and their tactical command posts should facilitate the rapid and","rect":[107.9800796508789,448.13177490234377,540.058002948761,439.0980529785156]},{"page":71,"text":"effective decision-making under the anticipated tactical and operational decisions contained within the","rect":[107.98008728027344,459.6754150390625,540.0709216575623,450.6217956542969]},{"page":71,"text":"decision support matrix, the decision support template, and updated assessments of the situation. To create,","rect":[107.97012329101563,471.17926025390627,540.077707529068,462.1455383300781]},{"page":71,"text":"identify, and seize fleeting opportunities, squadron and BCT commanders must be capable of commanding","rect":[107.97010040283203,482.722900390625,540.1288647651672,473.6692810058594]},{"page":71,"text":"forward and take advantage of tactical networks (frequency modulation, long-range, and digital networks) to","rect":[107.97010040283203,494.2466125488281,540.0348706245422,485.1929931640625]},{"page":71,"text":"confirm combat information, update their understanding, visualization, description, direction, assessment,","rect":[107.97010040283203,505.65081787109377,539.7841894626617,496.5971984863281]},{"page":71,"text":"and leadership of combat operations to make timely and effective tactical and operational decisions.","rect":[107.97010040283203,517.1746215820313,507.7844030857086,508.1209716796875]},{"page":71,"text":"ASSESS","rect":[90.0,534.3822021484375,126.11208915710449,526.1279907226563]},{"page":71,"text":"3-116. BCT, squadron commanders, and their staffs prioritize information collection activities by providing","rect":[108.0,554.3814086914063,540.0597729682922,545.3277587890625]},{"page":71,"text":"their reconnaissance guidance and intent early in the planning process, establishing CCIRs, and updating","rect":[108.00997161865235,565.9051513671875,540.062885761261,556.8515014648438]},{"page":71,"text":"information requirements based on changing battlefield conditions as reported by their Cavalry organizations.","rect":[108.00999450683594,577.4288940429688,540.0073339939117,568.375244140625]},{"page":71,"text":"While doing so, commanders and their staffs must ensure that the CCIRs directly inform decisions associated","rect":[108.00999450683594,588.9525756835938,539.9580273628235,579.89892578125]},{"page":71,"text":"with their scheme of maneuver to provide flexibility and agility as they develop the situation and determine","rect":[108.01990509033203,600.3567504882813,540.1068713645935,591.3031005859375]},{"page":71,"text":"the disposition, intent, and capabilities of enemy organizations. Commanders and staffs must aggressively","rect":[108.0199203491211,611.8805541992188,539.9102368354797,602.8268432617188]},{"page":71,"text":"seek higher echelons’ collection of, and answers to, the information requirements as well as identify the time","rect":[108.01990509033203,623.4042358398438,540.0091540794373,614.3505859375]},{"page":71,"text":"sensitivity of their CCIRs with the LTIOV and resulting decisions to ensure timely decision-making.","rect":[108.00995635986328,634.9279174804688,510.82328248023989,625.874267578125]},{"page":71,"text":"MAINTAINING SITUATIONAL UNDERSTANDING","rect":[90.0,652.260009765625,318.762433052063,643.9559936523438]},{"page":71,"text":"3-117. Successful operations demand timely and effective decisions based on available information","rect":[108.0,672.221435546875,540.053852558136,663.1677856445313]},{"page":71,"text":"provided by effective reconnaissance and security operations. As a result, commanders and staffs must build","rect":[108.0,683.7451171875,539.9344067573547,674.6914672851563]},{"page":71,"text":"and maintain situational understanding throughout the operations process. Situational understanding is the","rect":[108.0,695.1493530273438,540.0996081809998,686.095703125]},{"page":71,"text":"product of applying analysis and judgment to relevant information to determine the relationship among the","rect":[108.0,706.6730346679688,539.9763171653748,697.6094360351563]},{"page":71,"text":"operational and mission variables (ADP 6-0). Building and maintaining situational understanding is essential","rect":[108.0,718.19677734375,539.8795977840424,709.1431274414063]},{"page":71,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":71,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":71,"text":"3-25","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":72,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":72,"text":"to establishing the situation’s context, developing effective plans, assessing operations, and making effective","rect":[90.0,83.50144958496094,522.1118152122498,74.44780731201172]},{"page":72,"text":"decisions throughout the operations process. (Refer to ADP 6-0 for more information.)","rect":[90.0,95.02519226074219,436.8659659013748,85.97154998779297]},{"page":72,"text":"ENCOURAGING COLLABORATION AND DIALOGUE","rect":[72.0,112.36801147460938,315.6807951927185,104.07601165771485]},{"page":72,"text":"3-118. Throughout the operations process, commanders encourage continuous collaboration and dialogue","rect":[90.0,132.2213592529297,522.085997341156,123.16771697998047]},{"page":72,"text":"among the staff and with unified action partners to plan, execute, and assess reconnaissance and security","rect":[90.0,143.74510192871095,522.0559277534485,134.6914520263672]},{"page":72,"text":"operations. Collaboration and dialogue develops shared understanding throughout the force. The operations","rect":[89.99002838134766,155.26878356933595,522.1384781007766,146.2151336669922]},{"page":72,"text":"and intelligence-working group comprises designated staff officers that coordinate and integrate information","rect":[89.99000549316406,166.7925262451172,522.0378613471985,157.73887634277345]},{"page":72,"text":"collection activities and provide the commander and the BCT S-3 with recommendations. The operations","rect":[89.98005676269531,178.29627990722657,521.9969986085891,169.26255798339845]},{"page":72,"text":"and intelligence-working group develops and refines the information collection plan as part of the BCT’s","rect":[89.98003387451172,189.83995056152345,521.9663589601516,180.7863006591797]},{"page":72,"text":"reconnaissance and security operations. (Refer to FM 3-55 for more information.)","rect":[89.98002624511719,201.2441864013672,417.17498689746858,192.19053649902345]},{"page":72,"text":"3-119. The BCT S-3 directs the operations efforts of coordinating and integrating special staff officers. The","rect":[89.98001861572266,218.76377868652345,522.0798327903748,209.7101287841797]},{"page":72,"text":"S-3 integrates and synchronizes plans and orders and supervises management of the CCIRs. The BCT S-2","rect":[89.9801025390625,230.2875213623047,522.0349316596985,221.23387145996095]},{"page":72,"text":"works with the entire staff to prepare the information collection plan and identify information collection","rect":[89.97010040283203,241.81126403808595,522.0219311714172,232.7576141357422]},{"page":72,"text":"requirements for inclusion. The intelligence staff, with input from the staff representatives,assists the brigade","rect":[89.97010040283203,253.33494567871095,521.9482409934998,244.2812957763672]},{"page":72,"text":"S-3 with developing the information collection matrix by recommending methods or assets to task for","rect":[89.97010040283203,264.8586730957031,522.0710745439529,255.80503845214845]},{"page":72,"text":"collection. The BCT S-2 identifies intelligence assets and resources that can provide answers to the CCIRs,","rect":[89.97010040283203,276.2628479003906,521.8158056735992,267.209228515625]},{"page":72,"text":"including HUMINT, geospatial intelligence, measurement and signature intelligence, and SIGINT.","rect":[89.97010040283203,287.7865905761719,485.695871591568,278.73297119140627]},{"page":72,"text":"3-120. The intelligence cell manages intelligence operations to support the overall unit mission. The staff","rect":[89.97017669677735,305.3062438964844,522.0319510087967,296.25262451171877]},{"page":72,"text":"weather office provides planning expertise on weather conditions and effects for friendly and enemy forces","rect":[89.97017669677735,316.8299255371094,522.1019180421829,307.77630615234377]},{"page":72,"text":"to inform FFIRs. The staff weather office assists with the planning and execution of air, ground, and space","rect":[89.97017669677735,328.3536682128906,522.0460803489685,319.300048828125]},{"page":72,"text":"operations and provides services in accordance with responsibilities outlined in AR 115-10.","rect":[89.96019744873047,339.7379455566406,456.647531747818,330.7042236328125]},{"page":72,"text":"3-121. The BCT S-3 is the primary information collection tasking and directing staff officer within the unit,","rect":[89.96014404296875,357.2774963378906,522.0488379001617,348.223876953125]},{"page":72,"text":"tasking the organic and assigned assets for execution. Before publishing the information collection plan, the","rect":[89.96014404296875,368.8012390136719,522.0560290794373,359.74761962890627]},{"page":72,"text":"S-3 coordinates with other command post staff to ensure synchronization with the other elements of the","rect":[89.96014404296875,380.3249206542969,522.0560290794373,371.27130126953127]},{"page":72,"text":"OPORD. The operations and intelligence working group is represented by the following:","rect":[89.95018768310547,391.8486633300781,445.51427185630799,382.7950439453125]},{"page":72,"text":" Assistant brigade engineer.","rect":[115.19999694824219,405.2214050292969,241.88848328590394,396.16778564453127]},{"page":72,"text":" Air defense airspace management representative.","rect":[115.19999694824219,418.6614074707031,329.64014649391177,409.6077880859375]},{"page":72,"text":" Aviation officer.","rect":[115.19999694824219,430.2095031738281,199.88619446754456,423.16778564453127]},{"page":72,"text":" Air liaison officer.","rect":[115.19999694824219,443.6495056152344,207.45179200172425,436.6077880859375]},{"page":72,"text":" Military intelligence company commander.","rect":[115.19999694824219,459.2214050292969,306.58866333961489,450.16778564453127]},{"page":72,"text":" Cavalry squadron S-3.","rect":[115.19999694824219,472.6614074707031,223.04917359352113,463.6077880859375]},{"page":72,"text":" Cavalry squadron S-2.","rect":[115.19999694824219,486.2214050292969,223.04917359352113,477.16778564453127]},{"page":72,"text":" Cavalry squadron liaison officer.","rect":[115.19999694824219,499.6614074707031,264.81141114234927,490.6077880859375]},{"page":72,"text":" Fire support officer.","rect":[115.19999694824219,513.2014770507813,213.552316904068,504.16778564453127]},{"page":72,"text":" Cavalry squadron signal staff officer (S-6).","rect":[115.19999694824219,526.6614379882813,305.48807740211489,517.6077880859375]},{"page":72,"text":" Cyber-electromagnetic warfare officer.","rect":[115.19999694824219,540.221435546875,289.651682138443,531.1677856445313]},{"page":72,"text":" CBRN officer.","rect":[115.19999694824219,551.6594848632813,192.08053040504456,544.6077880859375]},{"page":72,"text":" Sustainment cell representative.","rect":[115.19999694824219,567.2014770507813,260.62919068336489,558.1677856445313]},{"page":72,"text":" Information operations officer.","rect":[115.19999694824219,580.6414794921875,256.7657263278961,571.6077880859375]},{"page":72,"text":" Civil affairs officer.","rect":[115.19999694824219,592.219482421875,212.9566900730133,585.1677856445313]},{"page":72,"text":" Judge advocate general (if available).","rect":[115.19999694824219,607.6614379882813,282.809152841568,598.6077880859375]},{"page":72,"text":" Public affairs officer (if available).","rect":[115.19999694824219,621.2014770507813,272.37110352516177,612.1677856445313]},{"page":72,"text":"3-122. The operations and intelligence working group directly supports the commander with executing","rect":[90.00348663330078,638.7410278320313,522.0852246284485,629.6873779296875]},{"page":72,"text":"command and control of reconnaissance and security operations by performing four primary command and","rect":[90.0134506225586,650.2647705078125,522.1880078315735,641.2111206054688]},{"page":72,"text":"control warfighting function tasks listed below (refer to ADP 6-0 for more information):","rect":[90.00349426269531,661.7885131835938,443.27473938560487,652.73486328125]},{"page":72,"text":" Command forces.","rect":[115.19999694824219,673.219482421875,204.3273413181305,666.1677856445313]},{"page":72,"text":" Control operations.","rect":[115.19999694824219,688.6414794921875,210.44877076148988,679.6077880859375]},{"page":72,"text":" Drive the operations process.","rect":[115.19999694824219,702.2014770507813,249.80965638160706,693.1677856445313]},{"page":72,"text":" Establish the command and control system.","rect":[115.19999694824219,715.6614379882813,307.0507299900055,706.6077880859375]},{"page":72,"text":"3-26","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":72,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":72,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":73,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":73,"text":"SECTION III – INTEGRATING PROCESSES","rect":[99.36000061035156,86.90400695800781,340.0440390625,78.02400970458985]},{"page":73,"text":"3-123. Throughout the operations process, commanders and staffs integrate the warfighting functions to","rect":[108.0,110.26139831542969,540.0161938667297,101.20775604248047]},{"page":73,"text":"synchronize the force according to the commander’s intent, reconnaissance focus, concept of operations, and","rect":[108.0,121.78514099121094,540.060932636261,112.73149871826172]},{"page":73,"text":"updated combat information provided by the BCT’s reconnaissance and security operations. The integrating","rect":[108.0,133.30882263183595,540.0570874214172,124.25518035888672]},{"page":73,"text":"processes for reconnaissance and security operations are—","rect":[108.0,144.8325653076172,343.566933631897,135.77891540527345]},{"page":73,"text":" IPB.","rect":[133.1999969482422,156.24948120117188,169.16784119606019,149.52647399902345]},{"page":73,"text":" Targeting.","rect":[133.1999969482422,171.70140075683595,192.68937134742738,162.6477508544922]},{"page":73,"text":" Information collection.","rect":[133.1999969482422,183.24948120117188,243.44553589820863,176.20774841308595]},{"page":73,"text":"INTELLIGENCE PREPARATION OF THE BATTLEFIELD","rect":[90.0,210.57064819335938,463.5622950115204,200.84092712402345]},{"page":73,"text":"3-124. Reconnaissance and security operations begin with developing and adapting the commander’s IPB.","rect":[108.0,230.8613739013672,539.851633310318,221.80772399902345]},{"page":73,"text":"The commander’s IPB including understanding threat capabilities, visualizing enemy courses of actions, and","rect":[108.0,242.38511657714845,540.1822094917297,233.3314666748047]},{"page":73,"text":"developing associated decision support matrices and templates.","rect":[108.0,253.90879821777345,360.92920899391177,244.85508728027345]},{"page":73,"text":"3-125. AnIPBis a systematic, continuous process of analyzing the threat and other aspects of an operational","rect":[108.0,271.4284362792969,540.1884356746674,262.37481689453127]},{"page":73,"text":"environment within a specific geographic area. The entire staff participates in the IPB to develop and sustain","rect":[108.0,282.8326416015625,539.9414868354797,273.7790222167969]},{"page":73,"text":"an understanding of the enemy, terrain and weather, and civil considerations. An IPB identifies options","rect":[108.0,294.3563537597656,540.1564224367141,285.302734375]},{"page":73,"text":"available to friendly and threat forces. ATP 2-01.3 discusses IPB in detail.","rect":[107.99996185302735,305.8800964355469,405.20740723609927,296.82647705078127]},{"page":73,"text":"TARGETING","rect":[90.0,331.17059326171877,175.69454331016542,321.44085693359377]},{"page":73,"text":"3-126. Targeting is the process of selecting and prioritizing targets and matching the appropriate response","rect":[108.0,351.4613952636719,540.0928943138123,342.40777587890627]},{"page":73,"text":"to them, considering operational requirements and capabilities (JP 3-0). Targeting begins in planning.","rect":[108.0,362.985107421875,540.2101538181305,353.9314880371094]},{"page":73,"text":"Targeting is an iterative process that continues through preparation and execution.","rect":[107.99002838134766,374.5088195800781,436.639230966568,365.4552001953125]},{"page":73,"text":"3-127. The targeting process is comprised of four basic steps: decide; detect; deliver; and assess. Targeting,","rect":[107.99002838134766,391.9089660644531,540.0797216892242,382.8553466796875]},{"page":73,"text":"nested within the operations process, provides an effective method for matching friendly force capabilities","rect":[107.99000549316406,403.43267822265627,539.9991958742141,394.3790588378906]},{"page":73,"text":"against enemy targets. The decide step sets priorities for intelligence operations, reconnaissance and security","rect":[107.99000549316406,414.9563903808594,540.067768573761,405.90277099609377]},{"page":73,"text":"operations, and attack planning. The decide step draws heavily on detailed IPB and the timely and accurate","rect":[107.99000549316406,426.4801330566406,540.076964138031,417.426513671875]},{"page":73,"text":"reporting of the BCT’s Cavalry organizations to provide a continuous assessment of the enemy situation.","rect":[107.99000549316406,438.00384521484377,540.028146982193,428.9502258300781]},{"page":73,"text":"Staff develops NAIs and TAIs to support the commander’s decision-making regarding targeting and to","rect":[107.99000549316406,449.5275573730469,540.069721698761,440.47393798828127]},{"page":73,"text":"effectively target threats.","rect":[107.99996185302735,460.9317321777344,207.6896002292633,451.87811279296877]},{"page":73,"text":"3-128. To ensure effective targeting, commanders and staffs establish intelligence operations priorities for","rect":[107.99996185302735,478.4513854980469,539.9492483720779,469.39776611328127]},{"page":73,"text":"each phase or critical event of an operation and effectively translate these priorities into clear reconnaissance","rect":[108.0,489.97509765625,540.177550075531,480.9214782714844]},{"page":73,"text":"guidance. A high-value target is a target the enemy commander requires for the successful completion of the","rect":[108.0,501.4988098144531,540.149718044281,492.4451904296875]},{"page":73,"text":"mission (JP 3-60). The loss of a high-value target degrades important enemy functions significantly","rect":[108.0,513.0225830078125,540.0498852729797,503.96893310546877]},{"page":73,"text":"throughout the friendly commander’s area of interest. Priorities depicted using visual products and matrices","rect":[108.0,524.5463256835938,540.1447036867141,515.49267578125]},{"page":73,"text":"communicate the importance of specific targets to the enemy’s course of action and those targets that, if","rect":[108.0,535.9505004882813,539.9443655595779,526.8968505859375]},{"page":73,"text":"destroyed, would contribute favorably to the friendly course of action. The high-payoff target is a target","rect":[108.0,547.4741821289063,539.8805743465424,538.4205322265625]},{"page":73,"text":"whose loss to the enemy will significantly contribute to the success of the friendly course of action (JP 3-60).","rect":[107.99008178710938,558.9979248046875,540.0748388767242,549.9442749023438]},{"page":73,"text":"The collection plan guides Cavalry units to answer the commander’s PIRs, including finding those high-payoff","rect":[107.9801025390625,570.5216674804688,540.1743460283279,561.468017578125]},{"page":73,"text":"targets designated as PIRs.","rect":[107.98008728027344,582.0453491210938,212.94849610328675,572.99169921875]},{"page":73,"text":"NAMED AREA OF INTEREST","rect":[90.0,605.3280639648438,225.80574941635133,597.0480346679688]},{"page":73,"text":"3-129. A named area of interest is a geospatial area or systems node or link against which information that","rect":[108.0,625.3014526367188,540.1285601863862,616.247802734375]},{"page":73,"text":"will satisfy a specific information requirement can be collected, usually to capture indications of adversary","rect":[107.99999237060547,636.7056274414063,540.0419507026672,627.6519775390625]},{"page":73,"text":"courses of action (JP 2-0). NAIs provide a graphical method to focus Cavalry organizations as they execute","rect":[108.0,648.2293090820313,539.967344997406,639.1756591796875]},{"page":73,"text":"security missions. Significantly, NAIs link most probable and most dangerous threat activities to terrain","rect":[107.99999237060547,659.7530517578125,540.082905292511,650.6994018554688]},{"page":73,"text":"where those activities may occur. Given the NAIs, subordinate commanders can prioritize the employment","rect":[107.99999237060547,671.2767944335938,540.1185504207612,662.22314453125]},{"page":73,"text":"and deployment of their forces and assets to provide the most effective observation and coverage throughout","rect":[108.0,682.8004760742188,540.1269122371674,673.746826171875]},{"page":73,"text":"the area of operations as they develop their scheme of maneuver and observation plans.","rect":[108.0,694.2047119140625,457.4069616794586,685.1510620117188]},{"page":73,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":73,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":73,"text":"3-27","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":74,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":74,"text":"3-130. NAIs should not be tied to specific terrain but developed based on threat locations or suspected","rect":[90.0,83.48152923583985,521.995258808136,74.44780731201172]},{"page":74,"text":"locations during the MDMP and IPB. Planners use their event template and event matrices to determine","rect":[90.0,95.02519226074219,521.9962756614685,85.97154998779297]},{"page":74,"text":"where to place NAIs and TAIs to confirm or deny threat activity and help determine the threat course of","rect":[89.98999786376953,106.42936706542969,522.0707693681717,97.37572479248047]},{"page":74,"text":"action for the commander.","rect":[89.99004364013672,115.9411849975586,195.55608582496644,108.89946746826172]},{"page":74,"text":"TARGET AREA OF INTEREST","rect":[72.0,141.26219177246095,211.88584280014039,133.00799560546876]},{"page":74,"text":"3-131. A target area of interest is the geographical area where high-value targets can be acquired and","rect":[90.0,161.2613983154297,522.2102246284485,152.20774841308595]},{"page":74,"text":"engaged by friendly forces (JP 2-0). Commanders use TAIs to apply a specific effect against a specific target","rect":[90.0,172.78514099121095,522.1414996395112,163.7314910888672]},{"page":74,"text":"with a specific outcome. Unit staffs develop TAIs during the MDMP. Commanders designate TAIs for any","rect":[90.00003814697266,184.30882263183595,522.0421948432922,175.2551727294922]},{"page":74,"text":"organic or supporting system including lethal and nonlethal effects.","rect":[90.00003814697266,195.8325653076172,359.72684693336489,186.77891540527345]},{"page":74,"text":"TIMELY REPORTING AND ASSESSMENT","rect":[72.0,221.13058471679688,347.12499491596227,211.40086364746095]},{"page":74,"text":"3-132. During mission planning and mission execution, Cavalry organizations provide timely and accurate","rect":[90.0,241.42137145996095,521.9821765403748,232.3677215576172]},{"page":74,"text":"combat information through combined arms operations and their associated reports. These reports allow the","rect":[90.0,252.82554626464845,522.0920398216248,243.7718963623047]},{"page":74,"text":"staff and the BCT commander to update their running estimates based on the most recent and accurate reports","rect":[90.0,264.3492736816406,522.1653946046829,255.29563903808595]},{"page":74,"text":"reconnaissance and security operations generate. At the same time, Cavalry operations execute assigned","rect":[90.0,275.8730163574219,522.1067700386047,266.81939697265627]},{"page":74,"text":"security missions while the rest of the force prepares for the overall operation. The force as a whole is often","rect":[90.0,287.396728515625,521.9272046089172,278.3431091308594]},{"page":74,"text":"vulnerable to surprise and enemy attack during preparation, when forces are often concentrated in AAs.","rect":[90.0,298.9204406738281,522.0897924900055,289.8668212890625]},{"page":74,"text":"Security operations (screen, guard, cover, and area security) are essential during preparation.","rect":[90.0,310.44415283203127,460.7709753513336,301.3905334472656]},{"page":74,"text":"3-133. Commanders take every opportunity to improve their situational understanding before execution of","rect":[90.0,327.8442687988281,522.0710745439529,318.7906494140625]},{"page":74,"text":"the mission. Cavalry forces aggressively and continuously collect information to improve situational","rect":[90.0,339.3680114746094,522.1147052059174,330.31439208984377]},{"page":74,"text":"understanding. Through information collection, commanders and staffs continuously plan, task, and employ","rect":[90.0,350.8916931152344,522.0520825386047,341.83807373046877]},{"page":74,"text":"collection assets and forces to collect timely and accurate information to satisfy the CCIRs and other","rect":[90.0,362.4154357910156,521.9632254228592,353.36181640625]},{"page":74,"text":"information requirements.","rect":[90.0,373.91925048828127,194.4853765964508,364.8855285644531]},{"page":74,"text":"3-134. The commander and staff’s ability to anticipate changing conditions on the battlefield is key in","rect":[90.0,391.3392639160156,522.0648999214172,382.28564453125]},{"page":74,"text":"seizing, retaining, and exploiting the initiative. To be effective, the intelligence and operations staffs base the","rect":[90.0,402.86297607421877,522.0778796653748,393.8093566894531]},{"page":74,"text":"information collection plan on the initial IPB and modify it as the intelligence running estimate changes.","rect":[90.0,414.3866882324219,522.0539038181305,405.33306884765627]},{"page":74,"text":"Other staff sections’ running estimates may contain requirements for inclusion into the information collection","rect":[89.99006652832031,425.910400390625,522.0551342964172,416.8567810058594]},{"page":74,"text":"plan. Additionally, the staff plans synchronization into the scheme of maneuver and adds updates as that","rect":[89.99006652832031,437.4341125488281,521.9495440731049,428.3804931640625]},{"page":74,"text":"scheme changes. Properly synchronized information collection planning begins with developing and","rect":[89.99006652832031,448.9578552246094,522.0261425971985,439.90423583984377]},{"page":74,"text":"updating the IPB including threat characteristics, enemy templates, enemy course of action statements, and","rect":[89.99006652832031,460.3620300292969,522.0581860542297,451.30841064453127]},{"page":74,"text":"an enemy event template or matrix.","rect":[89.99006652832031,471.8857727050781,231.69791626930238,462.8321533203125]},{"page":74,"text":"3-135. During course of action analysis, the staff focuses on critical events that directly influence mission","rect":[89.99006652832031,489.4054260253906,522.0349926948547,480.351806640625]},{"page":74,"text":"accomplishment. During these critical events, the staff may identify PIRs that answer decision points. The","rect":[90.00003814697266,500.9291076660156,522.1107165794373,491.87548828125]},{"page":74,"text":"decision support matrix coupled with the decision support template is a result of a staff’s ability to visualize","rect":[90.01998138427735,512.452880859375,521.8729236106873,503.39923095703127]},{"page":74,"text":"the battlefield and identify potential points of friction.","rect":[90.01998138427735,523.9766235351563,305.61609864234927,514.9229736328125]},{"page":74,"text":"3-136. As execution of the plan progresses, the staff refines decision point timelines used as the basis for","rect":[90.01998138427735,541.376708984375,521.9592581377029,532.3230590820313]},{"page":74,"text":"the LTIOV. The staff stays alert to the need for recommending changes in the information collection plan","rect":[90.01998138427735,552.9004516601563,522.0371289253235,543.8468017578125]},{"page":74,"text":"due to refinements. As the need for change arises, the intelligence staff coordinates with the appropriate staff","rect":[90.01998901367188,564.4241333007813,522.0968313798904,555.3704833984375]},{"page":74,"text":"sections to update the products required to refine the information collection plan.","rect":[90.01990509033203,575.927978515625,413.86145997047427,566.894287109375]},{"page":74,"text":"CUE COLLECTION ASSETS TO OTHER REQUIREMENTS","rect":[72.0,600.7464599609375,339.1115779876709,590.916015625]},{"page":74,"text":"3-137. The intelligence and operations staffs at the BCT and Cavalry squadron track the status of collection","rect":[90.0,619.1814575195313,522.060932636261,610.1278076171875]},{"page":74,"text":"assets, cross-cueing them as needed, and teaming assets together as appropriate to answer PIRs. For example,","rect":[90.0,630.5856323242188,522.1037085056305,621.531982421875]},{"page":74,"text":"a Soldier reports the absence of normal activity in a normally active market area. In that case, the staff could","rect":[90.00007629394531,642.1093139648438,521.957661151886,633.0556640625]},{"page":74,"text":"recommend redirecting UASs or other surveillance means to monitor the area for a potential threat.","rect":[90.01000213623047,653.633056640625,486.81641602516177,644.5794067382813]},{"page":74,"text":"ELIMINATE SATISFIED REQUIREMENTS","rect":[72.0,678.5064086914063,265.4357662200928,668.6759643554688]},{"page":74,"text":"3-138. As an operation progresses, the operations and intelligence cell tracks the status of each collection","rect":[90.0,696.94140625,522.059956073761,687.8877563476563]},{"page":74,"text":"task, analyzes SIRs, and monitors tasks forthesatisfaction of requirements. The staffs pay particular attention","rect":[90.00000762939453,708.4651489257813,522.064838886261,699.4114990234375]},{"page":74,"text":"3-28","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":74,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":74,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":75,"text":"Mission Command","rect":[459.9599914550781,44.4990234375,540.0977548828125,37.8480224609375]},{"page":75,"text":"to assets not producing required results, which may trigger adjustments to the information collection plan or","rect":[108.0,83.50144958496094,540.0740042314529,74.4378433227539]},{"page":75,"text":"require the reallocation of collection assets.","rect":[108.0,95.0052719116211,281.7372534275055,85.97154998779297]},{"page":75,"text":"3-139. The operations and intelligence staff eliminate satisfied requirements and irrelevant requirements","rect":[107.99002838134766,112.42527770996094,540.1634414796829,103.37163543701172]},{"page":75,"text":"from the collection plan, even if unsatisfied. In this case, the operations staff, in coordination with the intelligence","rect":[107.99000549316406,123.94902038574219,540.1235339622498,114.89537811279297]},{"page":75,"text":"staff, relieves the collection assets of further responsibility to collect information on the original task.","rect":[107.99000549316406,135.4727020263672,492.1970007419586,126.41905975341797]},{"page":75,"text":"3-140. The staffs must still periodically reassess whether or not satisfied requirements remain satisfied due","rect":[107.99000549316406,152.9923553466797,540.0800769309998,143.93870544433595]},{"page":75,"text":"to changing conditions, the introduction of enemy reinforcements, or other changes to mission variables.","rect":[107.9900131225586,164.51609802246095,526.2774755954742,155.4624481201172]},{"page":75,"text":"RETASK CAVALRY ORGANIZATIONS AND ASSETS","rect":[90.0,187.84799194335938,331.1918697357178,179.55599975585938]},{"page":75,"text":"3-141. As the situation changes, or when Cavalry organizations meet the initial information requirements,","rect":[108.0,207.82139587402345,540.0709326267242,198.7677459716797]},{"page":75,"text":"the commander and the staff should redirect the focus of reconnaissance and security operations. Retasking","rect":[108.0,219.22557067871095,540.0542187690735,210.1719207763672]},{"page":75,"text":"is assigning an information collection asset or a Cavalry unit with a new, modified, or refocused task and","rect":[107.99004364013672,230.7493133544922,540.0279126167297,221.69566345214845]},{"page":75,"text":"purpose. Generally, retasking is accomplished at the squadron level through a fragmentary order published","rect":[107.98008728027344,242.27305603027345,540.030170917511,233.2194061279297]},{"page":75,"text":"by the S-3. Retasking occurs—","rect":[107.98008728027344,253.79673767089845,232.6593713760376,244.7430877685547]},{"page":75,"text":" Upon completion of its initial requirement.","rect":[133.1999969482422,267.2014465332031,322.87745118141177,258.167724609375]},{"page":75,"text":" When an original task becomes irrelevant.","rect":[133.1999969482422,280.6613464355469,320.126535654068,271.60772705078127]},{"page":75,"text":" On order, after the LTIOV, and having not satisfied the original requirement. (Adjusting the","rect":[133.1999969482422,294.2214050292969,540.131163356781,285.1578063964844]},{"page":75,"text":"LTIOV may be required.)","rect":[151.1999969482422,305.7451171875,254.59774690723419,296.6914978027344]},{"page":75,"text":" As planned to support a branch or sequel.","rect":[133.1999969482422,319.1614990234375,317.48609375953677,310.1277770996094]},{"page":75,"text":" To respond to a change in the tactical or operational situation.","rect":[133.1999969482422,332.74139404296877,398.72989869117739,323.6877746582031]},{"page":75,"text":"DEVELOP AND ADD NEW REQUIREMENTS","rect":[90.0,357.62640380859377,294.71576499938967,347.8080139160156]},{"page":75,"text":"3-142. As the operation progresses and the threat situation develops, commanders generate new","rect":[108.0,376.0614013671875,540.0160101642608,367.0077819824219]},{"page":75,"text":"requirements. The intelligence staff begins updating requirements planning by identifying and prioritizing","rect":[108.00001525878906,387.5851135253906,540.0241284370422,378.531494140625]},{"page":75,"text":"new requirements, evaluating resources based on priorities, and making appropriate recommendations to the","rect":[108.00001525878906,399.1088562011719,540.097960231781,390.05523681640627]},{"page":75,"text":"commander and operations officer.","rect":[108.00001525878906,410.4931335449219,248.00867676734925,401.45941162109377]},{"page":75,"text":"TRANSITION","rect":[90.0,433.8222351074219,151.79539585113526,425.73602294921877]},{"page":75,"text":"3-143. Updating information collection taskings may result in a change of focus for several collection","rect":[108.0,453.8214111328125,540.0959668159485,444.7677917480469]},{"page":75,"text":"assets. Collection assets may require rest and refit, or lead-time for employment to effectively transition from","rect":[108.0,465.3451232910156,540.0628448734284,456.29150390625]},{"page":75,"text":"one mission or operation to another.","rect":[108.0,476.8489685058594,252.447824716568,467.81524658203127]},{"page":75,"text":"UPDATE THE COLLECTION PLAN","rect":[90.0,500.130615234375,320.67160897636418,490.4149475097656]},{"page":75,"text":"3-144. The staff updates the information collection plan as the reconnaissance assets answer requirements.","rect":[108.0,520.4014892578125,540.1417334079742,511.3677978515625]},{"page":75,"text":"Evaluation of reporting, production, and dissemination identifies the need for focus or refocus and assigning","rect":[108.0,531.9451293945313,540.0598340034485,522.8914794921875]},{"page":75,"text":"or reassigning collection assets. As the current tactical situation changes, adjustments are made to the overall","rect":[108.00003814697266,543.4688720703125,540.1756182918549,534.4052734375]},{"page":75,"text":"information collection plan to keep collection tasks synchronized. Listed below are the steps for updating the","rect":[107.99008178710938,554.9925537109375,540.0927722434998,545.9389038085938]},{"page":75,"text":"information collection plan. These steps are collaborative efforts by the intelligence and operations staffs.","rect":[107.99008178710938,566.5162963867188,540.061838388443,557.462646484375]},{"page":75,"text":"Some steps predominately engage the intelligence staff, others the operations staff, and some steps may","rect":[107.98011016845703,577.9204711914063,540.0681347846985,568.8668212890625]},{"page":75,"text":"require coordination with other staff sections:","rect":[107.98011016845703,589.4242553710938,290.38756287193299,580.3905639648438]},{"page":75,"text":" Keep information collection activities synchronized to operations.","rect":[133.1999969482422,602.8613891601563,415.2844030857086,593.8077392578125]},{"page":75,"text":" Cue assets to other collection requirements.","rect":[133.1999969482422,616.4014892578125,325.64832520484927,607.3677978515625]},{"page":75,"text":" Eliminate satisfied requirements.","rect":[133.1999969482422,629.8414306640625,283.0404760837555,620.8077392578125]},{"page":75,"text":" Develop and add new requirements.","rect":[133.1999969482422,643.4014892578125,295.2892553806305,634.3677978515625]},{"page":75,"text":" Retask assets.","rect":[133.1999969482422,654.8494262695313,206.60349488258363,647.8077392578125]},{"page":75,"text":" Transition to the next operation.","rect":[133.1999969482422,670.4014892578125,279.8084509372711,661.3677978515625]},{"page":75,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":75,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":75,"text":"3-29","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":76,"text":"Chapter 3","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":76,"text":"SCREEN REPORTS","rect":[72.0,85.29055786132813,198.48638524246216,75.57487487792969]},{"page":76,"text":"3-145. The staffuses the criteria listed below toscreen incoming reports to determine whether the collection","rect":[90.0,105.58140563964844,521.9483227729797,96.52776336669922]},{"page":76,"text":"tasks have been satisfied:","rect":[90.0,115.09322357177735,191.42265808677673,108.05150604248047]},{"page":76,"text":"","rect":[115.19999694824219,127.8211441040039,121.2058769197464,123.0936279296875]},{"page":76,"text":"","rect":[115.19999694824219,152.7811737060547,121.2058769197464,148.05364990234376]},{"page":76,"text":"","rect":[115.19999694824219,166.3411102294922,121.2058769197464,161.61358642578126]},{"page":76,"text":"","rect":[115.19999694824219,179.7811737060547,121.2058769197464,175.05364990234376]},{"page":76,"text":"Relevance: Does the information address the collection task? If not, use this information to satisfy","rect":[133.1999969482422,130.5414276123047,521.8125195503235,121.48778533935547]},{"page":76,"text":"other requirements.","rect":[133.1999969482422,142.0452423095703,211.04834961891175,133.0115203857422]},{"page":76,"text":"Completeness: Is essential information missing? (Refer to the original collection task.)","rect":[133.1999969482422,155.50144958496095,479.58587556934358,146.4477996826172]},{"page":76,"text":"Timeliness: Has the asset reported by the LTIOV as established in the original task?","rect":[133.1999969482422,169.06138610839845,469.65386843490605,160.0077362060547]},{"page":76,"text":"Opportunities for cueing: Can this asset or another asset take advantage of the new information to","rect":[133.1999969482422,182.50144958496095,522.0595898628235,173.4477996826172]},{"page":76,"text":"increase the effectiveness and efficiency of the overall information collection effort?","rect":[133.1999969482422,194.0251922607422,471.4695117454529,184.97154235839845]},{"page":76,"text":"CORRELATE REPORTS TO REQUIREMENTS","rect":[72.0,219.60716247558595,372.8982809944153,207.5748748779297]},{"page":76,"text":"3-146. Correlating and evaluating intelligence reports to the original requirement is essential to effective","rect":[90.0,237.70140075683595,522.0957019309998,228.6477508544922]},{"page":76,"text":"requirements management. Timely requirements management includes dissemination and receipt of reports","rect":[90.00003814697266,249.2251434326172,522.0302627687454,240.17149353027345]},{"page":76,"text":"and related information to the original requesters and other users.","rect":[90.00003814697266,260.6293029785156,350.96900391578677,251.57566833496095]},{"page":76,"text":"3-147. The staff tracks which specific collection task originates from which requirement, ensuring the","rect":[90.00003814697266,278.1489562988281,522.1337268333435,269.0953369140625]},{"page":76,"text":"collected information provided to the original requester (and to all who need the information) is timely. For","rect":[90.00003814697266,289.67266845703127,522.0710745439529,280.6190490722656]},{"page":76,"text":"efficiency and timeliness, the staff ensures they receive the proper collection assets to determine which","rect":[90.00003814697266,301.1963806152344,522.167622089386,292.14276123046877]},{"page":76,"text":"requirements have been satisfied and which require additional collection.","rect":[90.00003814697266,312.7002258300781,382.40677857398989,303.66650390625]},{"page":76,"text":"3-148.","rect":[90.00003814697266,328.2079162597656,115.88608765602112,321.3653869628906]},{"page":76,"text":"","rect":[115.19999694824219,340.9411315917969,121.2058769197464,336.213623046875]},{"page":76,"text":"","rect":[115.19999694824219,354.381103515625,121.2058769197464,349.6535949707031]},{"page":76,"text":"","rect":[115.19999694824219,367.82110595703127,121.2058769197464,363.0935974121094]},{"page":76,"text":"","rect":[115.19999694824219,381.381103515625,121.2058769197464,376.6535949707031]},{"page":76,"text":"The staff address the following potential challenges:","rect":[124.56124114990235,330.23974609375,333.95723450279237,321.1861267089844]},{"page":76,"text":"Large volumes of information that could overwhelm the staff’s capabilities.","rect":[133.1999969482422,343.6614074707031,435.80469727516177,334.6077880859375]},{"page":76,"text":"Reports that partially satisfy collection tasks.","rect":[133.1999969482422,357.10137939453127,313.1561987400055,348.0477600097656]},{"page":76,"text":"Assets reporting information without referring to the original tasking.","rect":[133.1999969482422,370.5413818359375,411.2055151462555,361.4877624511719]},{"page":76,"text":"Circular reporting or unnecessary message traffic.","rect":[133.1999969482422,384.10137939453127,333.2306616306305,375.0477600097656]},{"page":76,"text":"3-149. Information collection assets do not submit reports that state nothing significant to report. They","rect":[89.99351501464844,401.62103271484377,522.0465893745422,392.5674133300781]},{"page":76,"text":"should report collection occurred but observed no activity thus satisfying the information collection task.","rect":[89.99351501464844,413.1447448730469,522.0543310642242,404.09112548828127]},{"page":76,"text":"Lack of activity might be a significant indicator. “Nothing observed” states more plainly that information","rect":[89.99349975585938,424.66845703125,522.0583691596985,415.6148376464844]},{"page":76,"text":"collection activities occurred.","rect":[89.99349975585938,434.1802673339844,208.0333960056305,427.1385498046875]},{"page":76,"text":"ASSESSMENTS","rect":[72.0,461.4906005859375,172.54604710769653,451.7749328613281]},{"page":76,"text":"3-150. Commanders and staffs should conduct assessments before and after each engagement to update","rect":[90.0,481.7814025878906,522.106749294281,472.727783203125]},{"page":76,"text":"information collection guidance and increase their own understanding of the situation. Feedback is essential","rect":[90.0,493.30511474609377,521.8786822566987,484.2514953613281]},{"page":76,"text":"for maintaining effectiveness and alerting leaders of deficiencies.","rect":[90.0,504.7093200683594,351.0049841403961,495.65570068359377]},{"page":76,"text":"3-151. Following each assessment, staff sections should work together to tailor the information collection","rect":[90.0,522.22900390625,522.0420727729797,513.1753540039063]},{"page":76,"text":"plan making it as seamless as possible by removing information sharing barriers. Feedback reinforces","rect":[90.0,533.7527465820313,522.0359390382766,524.6990966796875]},{"page":76,"text":"whether collection or production satisfies the original task or request, provides guidance if it does not, and","rect":[90.0,545.2764282226563,522.0629467964172,536.2227783203125]},{"page":76,"text":"aids in the redistribution of assets to capitalize on opportunities or fill identified voids.","rect":[90.0,556.7802124023438,435.5663549900055,547.7465209960938]},{"page":76,"text":"3-30","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":76,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":76,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":77,"text":"Chapter 4","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":77,"text":"Reconnaissance Operations","rect":[207.36000061035157,153.9681854248047,422.3379934196472,139.2211456298828]},{"page":77,"text":"Cavalry formations conduct combined-arms, reconnaissance operations to determine","rect":[126.0,188.85357666015626,504.1111716041565,178.81822204589845]},{"page":77,"text":"enemy composition and disposition as well as to gather information on the operational","rect":[126.0,201.4501953125,504.06698375892639,191.4148406982422]},{"page":77,"text":"environment. Reconnaissance operations enable all units to seize, retain, and exploit","rect":[126.0,214.02479553222657,503.954587518692,204.0115203857422]},{"page":77,"text":"the initiative across the range of military operations by identifying, creating, and","rect":[126.0,226.76495361328126,504.03504514694216,216.72959899902345]},{"page":77,"text":"capitalizing ","rect":[126.0,239.361572265625,180.23952269554139,229.3262176513672]},{"page":77,"text":"upon ","rect":[186.0023956298828,239.33949279785157,210.72206664085389,231.0]},{"page":77,"text":"opportunities, ","rect":[216.48495483398438,239.33949279785157,280.0852563381195,229.3262176513672]},{"page":77,"text":"providing ","rect":[285.84814453125,239.361572265625,331.44774413108828,229.3262176513672]},{"page":77,"text":"them ","rect":[337.21063232421877,238.0,362.05064940452578,229.3262176513672]},{"page":77,"text":"with ","rect":[367.69097900390627,238.0,390.1308801174164,229.3262176513672]},{"page":77,"text":"information ","rect":[395.89373779296877,238.0,450.6146447658539,229.3262176513672]},{"page":77,"text":"facilitating","rect":[456.37750244140627,239.361572265625,504.1376757621765,229.3262176513672]},{"page":77,"text":"decision-making, and the concentration of unified efforts against decisive points.","rect":[126.0,251.95819091796876,481.798269033432,241.92283630371095]},{"page":77,"text":"SECTION I – RECONNAISSANCE FUNDAMENTALS, METHODS, MANAGEMENT","rect":[99.36000061035156,276.0240173339844,538.813201171875,267.1440124511719]},{"page":77,"text":"4-1. Reconnaissance is a mission undertaken to obtain information about the activities and resources of an","rect":[108.0,297.3694763183594,540.0649609565735,290.3277587890625]},{"page":77,"text":"enemy or adversary, or to secure data concerning the meteorological, hydrographic, geographic, or other","rect":[108.00996398925781,310.90509033203127,540.0371389970779,301.8514709472656]},{"page":77,"text":"characteristics of a particular area, by visual observation or other detection methods (JP 2-0). Conducting","rect":[108.00996398925781,322.4288024902344,540.0619702339172,313.37518310546877]},{"page":77,"text":"reconnaissance before and during other combat operations provides information to the commander so they","rect":[108.0,333.8330078125,540.066792011261,324.7793884277344]},{"page":77,"text":"can confirm, deny, and modify the concept of operations. Within the BCT, the Cavalry squadron is the","rect":[108.00003814697266,345.35675048828127,540.0040881614685,336.3031311035156]},{"page":77,"text":"principal reconnaissance organization.","rect":[108.010009765625,356.8804626464844,261.57825684547427,347.82684326171877]},{"page":77,"text":"RECONNAISSANCE FUNDAMENTALS","rect":[90.0,382.17059326171877,343.3180807991028,372.4549255371094]},{"page":77,"text":"4-2. Planning and executing reconnaissance operations consists of seven fundamentals. Paragraphs 4-3","rect":[108.0,402.4613952636719,540.174458026886,393.40777587890627]},{"page":77,"text":"through 4-9 (page 4-2) describe each fundamental.","rect":[107.98999786376953,413.985107421875,310.5355932712555,404.9314880371094]},{"page":77,"text":"4-3. Ensure continuous reconnaissance. BCTs require continuous information collection throughout all","rect":[107.99999237060547,431.5013732910156,540.1564532527924,422.44775390625]},{"page":77,"text":"phases and critical events of all operations. Commanders direct information collection throughout all","rect":[108.0,442.9013671875,540.1305743465424,433.8477478027344]},{"page":77,"text":"operations and task-organize Cavalry assets to collect required information vital to enhancing the","rect":[108.0,454.4250793457031,540.0976550559998,445.3714599609375]},{"page":77,"text":"commander’s ability to make informed decisions. Continuous reconnaissance provides commanders with a","rect":[107.99008178710938,465.9488220214844,540.073790309906,456.89520263671877]},{"page":77,"text":"constant flow of relevant information to identify and seize key terrain, confirm or deny enemy composition,","rect":[107.9801254272461,477.4725341796875,540.0649511814117,468.4189147949219]},{"page":77,"text":"disposition, strength, and courses of action. Continuous reconnaissance also provides reaction time and","rect":[107.9801254272461,488.9962463378906,540.0588574409485,479.942626953125]},{"page":77,"text":"maneuver space for unpredicted enemy actions.","rect":[107.98014831542969,500.51995849609377,298.53690552711489,491.4663391113281]},{"page":77,"text":"4-4. Do not keep reconnaissance assets in reserve. Continuous and focused collection efforts require an","rect":[108.00006866455078,517.8814697265625,539.913959980011,508.8465576171875]},{"page":77,"text":"efficient mix and redundancy of reconnaissance assets; however, this does not mean employing all assets and","rect":[108.0,529.4214477539063,539.933247089386,520.3677978515625]},{"page":77,"text":"capabilities simultaneously. Commanders maximize employment of their reconnaissance assets and","rect":[107.98999786376953,540.9451293945313,540.0529370307922,531.8914794921875]},{"page":77,"text":"capabilities to answer their CCIRs. BCTs task and position reconnaissance assets and capabilities at the","rect":[107.98999786376953,552.4489135742188,540.122618434906,543.4152221679688]},{"page":77,"text":"appropriate time, place, and in the right combination (human, sensor, and technical means) to maximize their","rect":[108.01994323730469,563.9925537109375,540.1047659502029,554.9389038085938]},{"page":77,"text":"impact, allow for timely analysis of information, and aid decision-making at the appropriate echelon.","rect":[108.01994323730469,575.5162963867188,512.0443212985992,566.462646484375]},{"page":77,"text":"Note. This does not mean Cavalry units should not have a reserve. Instead, Cavalry units should","rect":[133.1988067626953,598.6614379882813,522.0415234565735,589.6077880859375]},{"page":77,"text":"generate a reserve from nonreconnaissance units (for example, the tank company in an ABCT, an","rect":[133.1999969482422,610.1814575195313,521.8471875190735,601.1278076171875]},{"page":77,"text":"antitank guided missile platoon from the weapons troop in an SBCT, or a platoon from a weapons","rect":[133.20001220703126,621.7051391601563,522.0414322023391,612.6514892578125]},{"page":77,"text":"company in an IBCT).","rect":[133.20001220703126,633.2288818359375,223.16869568824769,624.1752319335938]},{"page":77,"text":"4-5. Orient on the reconnaissance objective. Commanders establish the reconnaissance objective with a","rect":[108.0,665.5014038085938,540.099669216156,656.4378051757813]},{"page":77,"text":"specific task, purpose, and focus to direct reconnaissance efforts. The reconnaissance objective specifies the","rect":[108.0,676.9014282226563,540.113585231781,667.8378295898438]},{"page":77,"text":"most important result to obtain from the reconnaissance effort and clarifies the intent of the reconnaissance","rect":[108.00001525878906,688.4051513671875,540.0927112083435,679.3714599609375]},{"page":77,"text":"effort. Cavalry formations use NAIs to focus information collection to answer PIRs. However, observing","rect":[108.00003814697266,699.9488525390625,540.0548901557922,690.8952026367188]},{"page":77,"text":"NAIs is just a means of collecting information or the initial assessment as to where information and indicators","rect":[108.00003814697266,711.4725952148438,540.1667984132766,702.4089965820313]},{"page":77,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":77,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":77,"text":"4-1","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":78,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":78,"text":"might be collected. Orienting on the reconnaissance objective helps Cavalry formations understand when and","rect":[90.0,83.50144958496094,522.1863598823547,74.4378433227539]},{"page":78,"text":"if it should adjust information collection of an NAI.","rect":[90.0,95.02519226074219,296.96879029273989,85.96158599853516]},{"page":78,"text":"4-6. Report allrequiredinformation rapidly and accurately.Commanders develop plans and make decisions","rect":[89.99998474121094,112.42137145996094,522.0478408937454,103.36772918701172]},{"page":78,"text":"based upon the analysis of information subordinate units collect. Commanders require quick and accurate","rect":[90.0,123.94139099121094,522.0946643333435,114.88774871826172]},{"page":78,"text":"reports to make informed decisions on the proper application of forces. Rapid reporting allows staffs","rect":[90.0,135.4651336669922,522.1716201906204,126.41149139404297]},{"page":78,"text":"maximum time to analyze information and make timely recommendations to the commander. Information","rect":[90.0,146.9888153076172,522.0202832221985,137.93516540527345]},{"page":78,"text":"requirements tied to decision points with an LTIOV date-time group provide focus for units collecting","rect":[90.0,158.51255798339845,522.0608105659485,149.4589080810547]},{"page":78,"text":"information and ensure units report information to facilitate timely decisions.","rect":[89.99004364013672,170.0363006591797,398.69938111305239,160.98265075683595]},{"page":78,"text":"4-7. Retain freedom of maneuver. Tactical mobility and maneuver drive the success of reconnaissance","rect":[90.00000762939453,187.42137145996095,522.0285022239685,178.3628387451172]},{"page":78,"text":"operations. Commanders and staffs consider task organization, movement techniques, and scheme of","rect":[90.0,198.94139099121095,522.0689993486404,189.8877410888672]},{"page":78,"text":"maneuver to retain the unit’s ability to maneuver. Reconnaissance operations confirm or deny assumptions","rect":[90.0,210.4651336669922,522.1318252687454,201.41148376464845]},{"page":78,"text":"about terrain and enemy made during mission analysis and IPB to identify opportunities and maintain","rect":[90.0,221.9888153076172,522.0918164253235,212.93516540527345]},{"page":78,"text":"freedom of maneuver for the BCT. Counterreconnaissance operations retain freedom of maneuver by denying","rect":[90.0,233.51255798339845,522.0658764839172,224.4589080810547]},{"page":78,"text":"enemy collection efforts and identifying opportunities for the command to seize, retain, and exploit initiative.","rect":[90.0,245.0363006591797,521.9842627048492,235.98265075683595]},{"page":78,"text":"Commanders change movement techniques and employ multiple assets to make contact with the smallest","rect":[90.0,256.4404602050781,521.9581500301362,247.38682556152345]},{"page":78,"text":"possible element and to avoid becoming decisively engaged. Commanders retain freedom of maneuver by","rect":[90.0,267.9642028808594,522.0370678901672,258.91058349609377]},{"page":78,"text":"avoiding decisive engagement with a superior force and develop the situation further. Commanders","rect":[90.00000762939453,279.4878845214844,522.0369156007766,270.43426513671877]},{"page":78,"text":"consistently balance the requirement to maintain contact with retaining freedom of maneuver.","rect":[90.0,291.0116271972656,464.96424317359927,281.9580078125]},{"page":78,"text":"4-8. Gain and maintain enemy contact. Cavalry forces find and sustain contact with the enemy on terms","rect":[90.0,308.5013732910156,522.1216323976516,299.44775390625]},{"page":78,"text":"and conditions of their choosing. Using at least one of the nine forms of contact (visual, direct, indirect,","rect":[90.0,320.0213928222656,522.0787451267242,310.9677734375]},{"page":78,"text":"nonhostile, obstacles, aircraft, CBRN, influence, and electromagnetic warfare), commanders and staffs plan","rect":[89.99008178710938,331.42559814453127,522.041889667511,322.3719787597656]},{"page":78,"text":"for and integrate aerial and ground sensors, manned platforms and unmanned systems, dismounted","rect":[89.99008178710938,342.9493103027344,522.1358227729797,333.89569091796877]},{"page":78,"text":"operations, SIGINT, geospatial intelligence, HUMINT, and visual observation to gain contact with the enemy","rect":[89.99008178710938,354.4730224609375,522.0759472846985,345.4194030761719]},{"page":78,"text":"using the smallest element possible. Intelligence units can provide a wide array of support to assist Cavalry","rect":[89.99007415771485,365.99676513671877,521.9303784370422,356.9431457519531]},{"page":78,"text":"forces in detecting and tracking the enemy, such as UAS imagery and full motion video or geo-location","rect":[89.99008178710938,377.5204772949219,522.0419507026672,368.46685791015627]},{"page":78,"text":"provided by SIGINT collectors. Once units make contact, Cavalry forces maintain contact, until specific","rect":[89.98016357421875,388.9246826171875,522.0609118919373,379.8710632324219]},{"page":78,"text":"orders are given, a change of mission occurs when directed by a higher headquarters, or the unit conducts a","rect":[89.97017669677735,400.4483947753906,522.0668323020935,391.394775390625]},{"page":78,"text":"reconnaissance handover with another unit. Maintaining contact with the enemy provides real-time","rect":[89.97010040283203,411.97210693359377,522.0668323020935,402.9184875488281]},{"page":78,"text":"information of the enemy’s composition, disposition, strength, and actions that allow staffs to analyze and make","rect":[89.97017669677735,423.4958190917969,522.103575466156,414.44219970703127]},{"page":78,"text":"recommendations to the commander.","rect":[89.97017669677735,433.00762939453127,238.37418580055238,425.9659118652344]},{"page":78,"text":"4-9. Develop the situation rapidly. Cavalry forces act instinctively and urgently to increase the","rect":[90.00005340576172,452.5013732910156,522.0394275169373,443.44573974609377]},{"page":78,"text":"commander’s situational understanding of the terrain, enemy, and civilian population. Effective Cavalry","rect":[90.0,463.9013671875,522.0707592964172,454.8477478027344]},{"page":78,"text":"forces understand how time impacts movement (both friendly and enemy) and how timely collection of","rect":[90.0,475.4250793457031,522.0757132158279,466.3714599609375]},{"page":78,"text":"information","rect":[90.0,484.9369201660156,137.21736574172975,477.89520263671877]},{"page":78,"text":"requirements","rect":[142.67843627929688,486.9289245605469,194.91862946796418,477.89520263671877]},{"page":78,"text":"supports","rect":[200.277099609375,486.9289245605469,234.15105134296418,478.8912048339844]},{"page":78,"text":"the commander’s decision-making.","rect":[239.51951599121095,486.9488220214844,386.1316931247711,477.89520263671877]},{"page":78,"text":"The reconnaissance scheme of","rect":[391.4393615722656,484.9369201660156,521.9691458330154,477.89520263671877]},{"page":78,"text":"maneuver and tempo matches the requisite urgency to answer the necessary information requirements.","rect":[89.99998474121094,498.4725341796875,522.0400488376617,489.4189147949219]},{"page":78,"text":"Cavalry forces collect on directed reconnaissance objectives in close contact with civilian populations while","rect":[89.99998474121094,509.9962463378906,522.0759265403748,500.9326477050781]},{"page":78,"text":"selectively choosing to fight enemy forces to determine intent, disposition, composition, and strength.","rect":[89.99998474121094,521.5199584960938,497.372141122818,512.46630859375]},{"page":78,"text":"4-10. The following vignette highlights a Cavalry organization’s use of reconnaissance fundamentals to","rect":[89.99998474121094,538.9014282226563,521.9627270698547,529.8477783203125]},{"page":78,"text":"locate an opposing force during the Civil War.","rect":[90.0,550.4251098632813,276.09562134742739,541.3714599609375]},{"page":78,"text":"Reed’s Bridge","rect":[271.0799865722656,576.6600341796875,340.7279633789062,565.9559936523438]},{"page":78,"text":"In the days preceding the battle of Chickamauga, the roads in northwest Georgia were filled ","rect":[122.4000015258789,594.221435546875,492.09839844703677,585.1677856445313]},{"page":78,"text":"with columns of marching and countermarching soldiers as the Union Army of the","rect":[122.4000015258789,605.7413940429688,489.5556628684998,596.687744140625]},{"page":78,"text":"Cumberland and the Confederate Army of Tennessee maneuvered in preparation for battle.","rect":[122.4000015258789,617.2614135742188,489.6801550388336,608.207763671875]},{"page":78,"text":"By mid-September, General Rosecrans had begun to concentrate Union forces, but the action","rect":[122.4000015258789,628.7814331054688,489.5586133003235,619.727783203125]},{"page":78,"text":"took time. Most of his army remained south of Chattanooga, while smaller forces garrisoned","rect":[122.4000015258789,640.1814575195313,489.55159425735476,631.1278076171875]},{"page":78,"text":"the town and occupied key locations nearby.","rect":[122.4000015258789,651.701416015625,300.5654089450836,642.6477661132813]},{"page":78,"text":"General Bragg’s Army of Tennessee sought to engage and destroy a portion of Rosecrans’s","rect":[122.4000015258789,669.221435546875,489.62437897968297,660.1677856445313]},{"page":78,"text":"army before it could be reinforced. Alternatively, he sought to interpose his Confederate","rect":[122.4000015258789,680.7413940429688,489.4410693626404,671.687744140625]},{"page":78,"text":"Army between Rosecrans and the main Union supply depot at Chattanooga, forcing an","rect":[122.4000015258789,692.2614135742188,489.693989276886,683.207763671875]},{"page":78,"text":"engagement. Critical to Union planning lay the determination of Bragg’s location and intent.","rect":[122.4000015258789,703.7814331054688,489.7089636325836,694.727783203125]},{"page":78,"text":"Therefore, mounted forces, including Colonel H. G. Minty’s Cavalry brigade were","rect":[122.4000015258789,715.181396484375,489.57940554428105,706.1277465820313]},{"page":78,"text":"4-2","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":78,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":78,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":79,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":79,"text":"dispatched to find the Confederates. Minty’s mission also included screening the northern","rect":[140.39999389648438,83.98143005371094,507.5088086128235,74.92778778076172]},{"page":79,"text":"or left flank of Rosecrans’s consolidating army.","rect":[140.39999389648438,95.50144958496094,331.2863256931305,86.44780731201172]},{"page":79,"text":"On 15 September, the Union cavalry crossed Chickamauga Creek at Reed’s Bridge and","rect":[140.39999389648438,113.02140808105469,507.545551776886,103.96776580810547]},{"page":79,"text":"pushed patrols eastward toward Ringgold. Minty’s troopers initially found little sign of ","rect":[140.39999389648438,124.42137145996094,510.12418580055239,115.36772918701172]},{"page":79,"text":"Confederate activity, but they did identify several potential crossing sites over the","rect":[140.39999389648438,135.94139099121095,507.56170534896855,126.88774871826172]},{"page":79,"text":"Chickamauga that enemy forces might use. On the 17th, a probe toward the town by Union","rect":[140.39999389648438,147.46141052246095,507.53575563430788,138.4077606201172]},{"page":79,"text":"infantry encountered a concentrated force of Confederates and retired. Minty also noted the","rect":[140.39999389648438,158.98143005371095,507.58453249740605,149.9277801513672]},{"page":79,"text":"enemy presence and the apparent northward shift of Bragg’s army in preparation for a thrust","rect":[140.39999389648438,170.50144958496095,507.6333514461517,161.4477996826172]},{"page":79,"text":"across the Chickamauga into the left flank of Rosecrans’s still consolidating forces. This","rect":[140.39999389648438,182.0214080810547,507.6082351808548,172.96775817871095]},{"page":79,"text":"information concerning Confederate activity was reported to Minty’s chain of command.","rect":[140.39999389648438,193.42137145996095,507.688059091568,184.3677215576172]},{"page":79,"text":"Colonel Minty also maintained patrols to observe the Confederates at Ringgold. His actions","rect":[140.39999389648438,204.94139099121095,507.6323745851517,195.8877410888672]},{"page":79,"text":"triggered the dispatch of additional Union mounted elements to cover crossings over the","rect":[140.39999389648438,216.46141052246095,507.57537722396855,207.4077606201172]},{"page":79,"text":"Chickamauga on each of his flanks.","rect":[140.39999389648438,227.98143005371095,283.167551279068,218.9277801513672]},{"page":79,"text":"Ensure continuous reconnaissance. The regular use of small patrols during the day and at","rect":[140.39999389648438,245.50144958496095,507.70296204185487,236.4477996826172]},{"page":79,"text":"night to monitor activities at Ringgold enabled Minty to accurately locate, monitor, and ","rect":[140.39999389648438,257.0213928222656,510.10633301734927,247.96775817871095]},{"page":79,"text":"forecast Confederate intentions and forces.","rect":[140.39999389648438,268.4213562011719,313.404123544693,259.36773681640627]},{"page":79,"text":"Do not keep reconnaissance assets in reserve. Minty’s Cavalry brigade managed","rect":[140.39999389648438,285.9413757324219,507.546772480011,276.88775634765627]},{"page":79,"text":"reconnaissance patrols with a redundancy of day and night small patrols to answer the corps","rect":[140.39999389648438,297.4613952636719,507.6512954835892,288.40777587890627]},{"page":79,"text":"commander’s information requirements.","rect":[140.39999389648438,308.98138427734377,302.24695801734927,299.9277648925781]},{"page":79,"text":"Orient on the reconnaissance objective. Minty remained focused upon obtaining information","rect":[140.39999389648438,326.5013732910156,507.6661877632141,317.44775390625]},{"page":79,"text":"on enemy troop locations and movements, resulting in his correct identification of the","rect":[140.39999389648438,337.9013671875,507.59933352279668,328.8477478027344]},{"page":79,"text":"Confederate concentration at Ringgold and its likely purpose.","rect":[140.39999389648438,349.42138671875,388.1659643650055,340.3677673339844]},{"page":79,"text":"Report all required information rapidly and accurately. Minty provided at least nine reports","rect":[140.39999389648438,366.9413757324219,507.6482437257767,357.88775634765627]},{"page":79,"text":"to his corps commander in four days with most of the reports arriving across several miles","rect":[140.39999389648438,378.4613952636719,507.61037141132359,369.40777587890627]},{"page":79,"text":"within a few hours. He also sent reports to other Union commanders in his vicinity to keep","rect":[140.39999389648438,389.98138427734377,507.6412854194641,380.9277648925781]},{"page":79,"text":"them apprised of the tactical situation. He relied upon a network of dispatchers to sustain","rect":[140.39999389648438,401.5013732910156,507.506733417511,392.44775390625]},{"page":79,"text":"these communication links.","rect":[140.39999389648438,410.8695373535156,249.08848023414613,403.8477478027344]},{"page":79,"text":"Retain freedom of maneuver. Minty’s success in finding and tracking Confederate forces","rect":[140.39999389648438,430.42138671875,507.50475007343297,421.3677673339844]},{"page":79,"text":"stemmed from his ability to avoid becoming decisively or unnecessarily engaged in","rect":[140.39999389648438,441.9413757324219,507.4170117378235,432.88775634765627]},{"page":79,"text":"combat operations.","rect":[140.39999389648438,453.4414978027344,218.84595704078675,444.40777587890627]},{"page":79,"text":"Gain and maintain contact. Minty’s reconnaissance patrols located and tracked Confederate","rect":[140.39999389648438,470.98138427734377,507.59747195053105,461.9277648925781]},{"page":79,"text":"troop movements into and around Ringgold in accordance with his original instructions.","rect":[140.39999389648438,482.5013732910156,495.44019532203677,473.44775390625]},{"page":79,"text":"Develop the situation rapidly. The nine reports that Minty provided his corps commander","rect":[140.39999389648438,499.9013671875,507.4857986574173,490.8477478027344]},{"page":79,"text":"over a four-day period allowed his higher headquarters to develop the situation rapidly and","rect":[140.39999389648438,511.42138671875,507.539692401886,502.3677673339844]},{"page":79,"text":"employ combat power accordingly.","rect":[140.39999389648438,522.94140625,281.48633790016177,513.8877563476563]},{"page":79,"text":"COMMANDER’S RECONNAISSANCE GUIDANCE","rect":[90.0,551.7305908203125,414.4813486757279,542.0009155273438]},{"page":79,"text":"4-11. The commander’s reconnaissance guidance should consist of the reconnaissance focus, tempo, and","rect":[108.0,572.0214233398438,540.0728344917297,562.9677734375]},{"page":79,"text":"engagement and disengagement criteria. In providing this guidance, the commander describes, shapes, and","rect":[108.01000213623047,583.5451049804688,539.9228100776672,574.491455078125]},{"page":79,"text":"prioritizes the intended vision of the reconnaissance effort supporting the overall scheme of maneuver and","rect":[108.0,595.06884765625,540.0678296089172,586.0151977539063]},{"page":79,"text":"the specific roles of the Cavalry unit. Echelon must understand the commander’s guidance and the importance","rect":[108.0,606.5925903320313,540.1165759544373,597.5389404296875]},{"page":79,"text":"of accomplishing the mission.","rect":[108.00995635986328,617.9967651367188,228.09859681129456,608.943115234375]},{"page":79,"text":"4-12. Detailed information on the commander’s dialogue and the commander’s reconnaissance guidance is","rect":[108.01000213623047,635.5164184570313,540.1653946046829,626.4627685546875]},{"page":79,"text":"in chapter 3 of this manual.","rect":[108.01000213623047,647.0201416015625,217.53910279273988,637.9864501953125]},{"page":79,"text":"RECONNAISSANCE TECHNIQUES","rect":[90.0,674.647216796875,318.4419821662903,662.6149291992188]},{"page":79,"text":"4-13. Two reconnaissance techniques commanders employ to answer information requirements are","rect":[108.0,692.6213989257813,539.988096950531,683.5677490234375]},{"page":79,"text":"reconnaissance-push and reconnaissance-pull. Commanders employ these techniques based on their level of","rect":[107.99996185302735,704.1451416015625,540.0727835283279,695.0914916992188]},{"page":79,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":79,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":79,"text":"4-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":80,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":80,"text":"understanding of the operational environment combined with the time available to refine their understanding.","rect":[90.0,83.50144958496094,522.1058447360992,74.44780731201172]},{"page":80,"text":"In selecting one technique over the other, the commander considers the following:","rect":[90.0,95.02519226074219,419.04369080162049,85.97154998779297]},{"page":80,"text":" Degree of the situational understanding of the enemy.","rect":[115.19999694824219,108.46141052246094,348.2065222263336,99.40776824951172]},{"page":80,"text":" Time available to collect the information.","rect":[115.19999694824219,119.88948822021485,299.3595983982086,112.84777069091797]},{"page":80,"text":" Leadership ability of subordinate commanders.","rect":[115.19999694824219,135.46141052246095,321.804514169693,126.40776824951172]},{"page":80,"text":" Proficiency of subordinate units to plan and rapidly react for uncertain situations.","rect":[115.19999694824219,148.9014129638672,458.1232397556305,139.84776306152345]},{"page":80,"text":"4-14. Reconnaissance-push is reconnaissance that refines the common operational picture, enabling the","rect":[89.99351501464844,166.4210662841797,522.1112048606873,157.36741638183595]},{"page":80,"text":"commander to finalize the plan and support shaping and decisive operations.","rect":[89.99349975585938,177.9447479248047,441.44202637672427,168.89109802246095]},{"page":80,"text":"Commanders use","rect":[448.4339599609375,175.94277954101563,522.0981433372498,168.89109802246095]},{"page":80,"text":"reconnaissance-push when they have relatively thorough understandings of the operational environments. In","rect":[89.99344635009766,189.46849060058595,522.0713086128235,180.4148406982422]},{"page":80,"text":"these cases, commanders “push” reconnaissance assets into specific portions of their areas of operations to","rect":[90.01339721679688,200.97230529785157,522.0793042182922,191.93858337402345]},{"page":80,"text":"confirm, deny, and validate planning assumptions affecting operations. Reconnaissance-push emphasizes","rect":[90.02339172363281,212.5159149169922,522.0583999757766,203.46226501464845]},{"page":80,"text":"detailed, well-rehearsed planning.","rect":[90.02340698242188,224.03965759277345,225.5919439792633,214.9860076904297]},{"page":80,"text":"4-15. Reconnaissance-pull is reconnaissance that determines which routes are suitable for maneuver, where","rect":[90.02340698242188,241.41981506347657,522.1220080833435,232.38609313964845]},{"page":80,"text":"the enemy is strong and weak, and where gaps exist, thus pulling the main body toward and along the path","rect":[90.02336883544922,252.96348571777345,522.0506176948547,243.9098358154297]},{"page":80,"text":"of least resistance. Commanders use reconnaissance-pull when they are uncertain of the compositions and","rect":[90.02336883544922,264.4872131347656,522.0761914253235,255.43357849121095]},{"page":80,"text":"dispositions of enemy forces in their areas of operations, information concerning terrain is vague, and time","rect":[90.01339721679688,276.0108947753906,521.9915759544373,266.957275390625]},{"page":80,"text":"is limited. In these cases, reconnaissance assets initially work over broad areas to develop the enemy","rect":[90.02340698242188,287.5346374511719,522.0932202339172,278.48101806640627]},{"page":80,"text":"situations. As they gain an understanding of enemy weaknesses, they then “pull” the main body to positions","rect":[90.02342224121094,299.058349609375,522.0583389406204,290.0047302246094]},{"page":80,"text":"of tactical advantage. Reconnaissance-pull knowingly emphasizes opportunity at the expense of a detailed,","rect":[90.02344512939453,310.4625549316406,522.0993750095367,301.408935546875]},{"page":80,"text":"well-rehearsed plan, and unity of effort. Commanders base plans on several viable branches or courses of","rect":[90.02344512939453,321.98626708984377,522.0613089189529,312.9326477050781]},{"page":80,"text":"action triggered by decision points that reconnaissance assets operate to answer associated CCIRs. Leaders","rect":[90.02344512939453,333.5099792480469,522.0663345460891,324.45635986328127]},{"page":80,"text":"at all levels must understand and rehearse branches and sequels.","rect":[90.02348327636719,345.0137939453125,346.0702612400055,335.9800720214844]},{"page":80,"text":"RECONNAISSANCE METHODS","rect":[72.0,370.2906188964844,278.6421774787903,360.574951171875]},{"page":80,"text":"4-16. Cavalry units use appropriate combinations of dismounted, mounted, aerial (manned and unmanned),","rect":[90.0,390.5813903808594,522.0859472751617,381.52777099609377]},{"page":80,"text":"reconnaissance by fire methods, and space assets to accomplish their missions during reconnaissance","rect":[90.0,402.1051025390625,522.1036365013123,393.0514831542969]},{"page":80,"text":"operations. No means is mutually exclusive of another, since the greater number of capabilities and units","rect":[90.0,413.5093078613281,522.0199478273391,404.4556884765625]},{"page":80,"text":"applied to information collection increases the operation’s effectiveness. All units conduct reconnaissance","rect":[89.99996185302735,425.01312255859377,522.0787951927185,415.9794006347656]},{"page":80,"text":"using a combination of dismounted, mounted, aerial, and reconnaissance by fire methods, augmented with","rect":[89.99000549316406,436.5567626953125,521.933247089386,427.5031433105469]},{"page":80,"text":"brigade and higher echelon technical sensor capabilities.","rect":[89.98992919921875,448.0804748535156,311.35889649391177,439.02685546875]},{"page":80,"text":"DISMOUNTED","rect":[72.0,465.3822021484375,139.20027256011964,457.2959899902344]},{"page":80,"text":"4-17. Dismounted reconnaissance is the most time-consuming method used by ground units but permits the","rect":[90.0,485.3813781738281,522.1056506614685,476.3277587890625]},{"page":80,"text":"most detailed information collection about the enemy, terrain, civil considerations, and infrastructure. The","rect":[90.00995635986328,496.90509033203127,522.2340686302185,487.8514709472656]},{"page":80,"text":"commander considers using dismounted reconnaissance when—","rect":[90.00995635986328,508.3092956542969,348.0048608779907,499.25567626953127]},{"page":80,"text":" Stealth is required, or security is the primary concern.","rect":[115.19999694824219,521.7413940429688,348.2074682712555,512.687744140625]},{"page":80,"text":" Time is available.","rect":[115.19999694824219,533.2894897460938,204.5653784275055,526.247802734375]},{"page":80,"text":" Detailed information is required.","rect":[115.19999694824219,548.721435546875,264.3223669528961,539.687744140625]},{"page":80,"text":" The reconnaissance objective is a stationary threat, fixed site, or terrain feature.","rect":[115.19999694824219,562.3014526367188,450.940256357193,553.2378540039063]},{"page":80,"text":" The unit expects, or has made, enemy contact through visual and/or electromagnetic means.","rect":[115.19999694824219,575.7413940429688,500.4909460544586,566.687744140625]},{"page":80,"text":" Reconnaissance vehicles cannot move through an area due to terrain or threat.","rect":[115.19999694824219,589.3014526367188,445.414133310318,580.247802734375]},{"page":80,"text":" The terrain creates a visual dead space that prevents using optics or sensors.","rect":[115.19999694824219,602.7413940429688,436.6513159275055,593.687744140625]},{"page":80,"text":" Vehicles are not available.","rect":[115.19999694824219,614.2994995117188,239.38852906227113,607.247802734375]},{"page":80,"text":"MOUNTED","rect":[72.0,639.6221923828125,123.83506107330322,631.5359497070313]},{"page":80,"text":"4-18. Mounted reconnaissance enables a more rapid tempo while increasing the potential compromise of","rect":[90.0,659.6213989257813,522.0558157548904,650.5677490234375]},{"page":80,"text":"reconnaissance efforts. Mounted reconnaissance should take advantage of standoff capabilities provided by","rect":[90.0,671.1451416015625,522.0451245307922,662.0914916992188]},{"page":80,"text":"surveillance and weapon systems to observe and engage from greater distances. Successful reconnaissance","rect":[90.0,682.6688842773438,521.999815700531,673.615234375]},{"page":80,"text":"operations mix mounted and dismounted methods based on the enemy situation and time available. The","rect":[90.0,694.1925659179688,521.9813830833435,685.138916015625]},{"page":80,"text":"commander considers mounted reconnaissance when—","rect":[90.0,703.5847778320313,312.2394495010376,696.5430908203125]},{"page":80,"text":"4-4","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":80,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":80,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":81,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":81,"text":"","rect":[133.1999969482422,80.6611099243164,139.2058769197464,75.93359375]},{"page":81,"text":"","rect":[133.1999969482422,94.22110748291016,139.2058769197464,89.49359130859375]},{"page":81,"text":"","rect":[133.1999969482422,107.6611099243164,139.2058769197464,102.93359375]},{"page":81,"text":"","rect":[133.1999969482422,121.22110748291016,139.2058769197464,116.49359130859375]},{"page":81,"text":"","rect":[133.1999969482422,146.18113708496095,139.2058769197464,141.45361328125]},{"page":81,"text":"","rect":[133.1999969482422,171.14109802246095,139.2058769197464,166.41357421875]},{"page":81,"text":"Time is limited.","rect":[151.1999969482422,81.36946868896485,214.76372742652894,74.32775115966797]},{"page":81,"text":"Distances require mounted movement.","rect":[151.1999969482422,96.92147064208985,305.74830079078677,87.88774871826172]},{"page":81,"text":"Stealth and security are not primary concerns.","rect":[151.1999969482422,110.38139343261719,334.91321778297427,101.32775115966797]},{"page":81,"text":"Detailed information is not required, or the mounted method affords the same","rect":[151.1999969482422,123.92147064208985,483.24456667709355,114.88774871826172]},{"page":81,"text":"dismounted method.","rect":[151.20994567871095,133.45321655273438,233.01839661598206,126.41149139404297]},{"page":81,"text":"scope","rect":[487.70465087890627,123.92147064208985,510.48614382553105,117.20842742919922]},{"page":81,"text":"as the","rect":[514.92919921875,121.9294662475586,539.8680407981873,114.88774871826172]},{"page":81,"text":"The nature of the reconnaissance objective allows vehicles to approach, such as a terrain feature","rect":[151.1999969482422,148.9014129638672,540.1090075950623,139.8378143310547]},{"page":81,"text":"or road intersection in stability tasks.","rect":[151.1999969482422,160.42515563964845,298.88688111305239,151.3715057373047]},{"page":81,"text":"The enemy location is known.","rect":[151.1999969482422,173.8613739013672,272.1293432712555,164.80772399902345]},{"page":81,"text":"AERIAL","rect":[90.0,197.1600341796875,128.71909475326539,189.04803466796876]},{"page":81,"text":"4-19. Aerial reconnaissance conducted by Army or joint aviation assets serves as a link between sensors and","rect":[108.0,217.3014373779297,539.9381909370422,208.2378387451172]},{"page":81,"text":"mounted or dismounted reconnaissance. Commanders use aerial reconnaissance to cue other reconnaissance","rect":[108.0,226.82321166992188,540.113585231781,219.7715301513672]},{"page":81,"text":"methods to specific areas, thereby increasing the operation’s overall efficiency. Aerial reconnaissance assets","rect":[108.0,240.22935485839845,539.9272964601516,231.1757049560547]},{"page":81,"text":"can rapidly transition to hasty attack or security operations without necessarily becoming decisively engaged","rect":[107.99002838134766,251.7530975341797,540.0539135932922,242.69944763183595]},{"page":81,"text":"due to their mobility, speed, range, flexibility, lethality, and precision. Complex terrain, adverse weather,","rect":[107.99002838134766,263.2767639160156,540.0817358493805,254.22312927246095]},{"page":81,"text":"enemy air defense systems, and deception and countermeasures degrade the effectiveness of aerial","rect":[107.99004364013672,274.8005065917969,540.1325885066987,265.74688720703127]},{"page":81,"text":"reconnaissance. The commander considers aerial reconnaissance when—","rect":[107.99002838134766,284.31231689453127,400.9138879776001,277.2705993652344]},{"page":81,"text":"","rect":[133.1999969482422,297.0211181640625,139.2058769197464,292.2936096191406]},{"page":81,"text":"","rect":[133.1999969482422,310.46112060546877,139.2058769197464,305.7336120605469]},{"page":81,"text":"","rect":[133.1999969482422,324.0211181640625,139.2058769197464,319.2936096191406]},{"page":81,"text":"","rect":[133.1999969482422,337.46112060546877,139.2058769197464,332.7336120605469]},{"page":81,"text":"","rect":[133.1999969482422,351.0211181640625,139.2058769197464,346.2936096191406]},{"page":81,"text":"","rect":[133.1999969482422,364.46112060546877,139.2058769197464,359.7336120605469]},{"page":81,"text":"","rect":[133.1999969482422,389.4211120605469,139.2058769197464,384.693603515625]},{"page":81,"text":"Weather permits.","rect":[151.1999969482422,299.72149658203127,220.06043457984925,290.6877746582031]},{"page":81,"text":"Time is extremely limited, or information is required quickly.","rect":[151.1999969482422,313.181396484375,397.7726843357086,304.1277770996094]},{"page":81,"text":"Ground reconnaissance elements are not available.","rect":[151.1999969482422,324.73944091796877,354.122141122818,317.6877746582031]},{"page":81,"text":"The objective is at an extended range.","rect":[151.1999969482422,340.181396484375,302.609934091568,331.1177978515625]},{"page":81,"text":"A target requires verification.","rect":[151.1999969482422,353.74139404296877,269.6054480075836,344.6877746582031]},{"page":81,"text":"The enemy locations are known and extremely dangerous (high risk) to ground assets or are vague","rect":[151.1999969482422,367.181396484375,540.1029040794373,358.1277770996094]},{"page":81,"text":"but considered high risk to ground assets.","rect":[151.1999969482422,378.7051086425781,317.0110876560211,369.6514587402344]},{"page":81,"text":"The terrain is complex.","rect":[151.1999969482422,392.1214904785156,244.05506348609925,383.0877685546875]},{"page":81,"text":"RECONNAISSANCE BY FIRE","rect":[90.0,415.58221435546877,223.15819692611695,407.4960021972656]},{"page":81,"text":"4-20. Reconnaissance by fire is a technique in which a unit fires on a suspected enemy position.","rect":[108.0,435.5813903808594,540.067697763443,426.52777099609377]},{"page":81,"text":"Reconnaissance by fire requires reconnaissance elements to place direct or indirect fire on positions","rect":[107.98999786376953,447.1051025390625,540.0319107179641,438.0514831542969]},{"page":81,"text":"reasonably suspected of enemy occupation. The goal is to cause the enemy to react by moving or returning","rect":[107.99002838134766,458.5093078613281,540.0468335151672,449.4556884765625]},{"page":81,"text":"fire, thus disclosing their disposition or willingness to fight. Leaders use this reconnaissance method when","rect":[107.99006652832031,470.03302001953127,540.1426587104797,460.9794006347656]},{"page":81,"text":"enemy contact is expected and time is limited, or when the unit cannot maneuver to develop the situation.","rect":[107.99005126953125,481.5567626953125,539.9115087985992,472.5031433105469]},{"page":81,"text":"Commanders consider reconnaissance by fire when the unit—","rect":[107.99005126953125,493.0804748535156,356.512001991272,484.02685546875]},{"page":81,"text":" Identifies a natural or manufactured obstacle with suspicion of enemy nearby.","rect":[133.1999969482422,506.5013732910156,462.68213868141177,497.44775390625]},{"page":81,"text":" Detects an obvious kill zone.","rect":[133.1999969482422,517.929443359375,267.08756470680239,510.88775634765627]},{"page":81,"text":" Identifies a suspected enemy position that fits the situational template.","rect":[133.1999969482422,533.5014038085938,432.31312012672427,524.44775390625]},{"page":81,"text":" Determines signs of recent activity, such as track marks or trash.","rect":[133.1999969482422,546.94140625,409.41004395484927,537.8877563476563]},{"page":81,"text":" Locates probable enemy bunker complexes.","rect":[133.1999969482422,560.5014038085938,327.09156250953677,551.44775390625]},{"page":81,"text":"4-21. Reconnaissance by fire eliminates the element of surprise the Cavalry element may have had, and it","rect":[108.00346374511719,578.0210571289063,540.1610919246674,568.9674072265625]},{"page":81,"text":"may give the enemy detailed knowledge of their location. However, reconnaissance by fire may reduce the","rect":[108.00346374511719,589.5447998046875,540.2365710716248,580.4911499023438]},{"page":81,"text":"chance of ambush within established kill zones. Disciplined troops in prepared positions might not react to","rect":[108.00347900390625,601.0684814453125,540.046528339386,592.0148315429688]},{"page":81,"text":"the fires, particularly if the fires are ineffective and do not inflict damage or casualties. As a result,","rect":[108.00349426269531,612.5922241210938,539.9102880954742,603.53857421875]},{"page":81,"text":"reconnaissance by fire should not entail the indiscriminate use of direct and indirect fires at all wood lines","rect":[108.01345825195313,623.9963989257813,540.0034683351516,614.9427490234375]},{"page":81,"text":"and hilltops with the hope that the enemy will react.","rect":[108.01345825195313,635.5201416015625,315.832834482193,626.4664916992188]},{"page":81,"text":"Note. Commanders are required to avoid the targeting of neutral or civilian objects. Unless civilian","rect":[133.20230102539063,658.7814331054688,522.083393573761,649.7178344726563]},{"page":81,"text":"objects on a possible target location are engaged in hostilities, they would not be valid targets.","rect":[133.1999969482422,670.3013916015625,509.35926270484927,661.23779296875]},{"page":81,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":81,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":81,"text":"4-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":82,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":82,"text":"RECONNAISSANCE MANAGEMENT","rect":[72.0,85.29055786132813,312.8394114198685,75.56083679199219]},{"page":82,"text":"4-22. The Cavalry unit commander and staffs manage assets by cueing, mixing, and redundancy.","rect":[90.0,105.58140563964844,522.0946753025055,96.52776336669922]},{"page":82,"text":"Reconnaissance management allows the unit to collect the most critical information with multiple","rect":[90.0,117.10514831542969,522.0667712669373,108.05150604248047]},{"page":82,"text":"perspectives at the appropriate time. The BCT S-3 manages and synchronizes all capabilities and units to","rect":[90.0,128.6288299560547,522.0559277534485,119.57518768310547]},{"page":82,"text":"support the brigade and Cavalry squadron execution. Cueing, mixing, and redundancy maximize collection","rect":[90.0,140.03306579589845,522.0468335151672,130.9794158935547]},{"page":82,"text":"efforts and allow the primary focus to be on reconnaissance objectives that may yield the most information.","rect":[89.99004364013672,151.55674743652345,522.076730966568,142.49314880371095]},{"page":82,"text":"The details of cueing, mixing, and redundancy are as follows:","rect":[89.99006652832031,163.0804901123047,336.95723450279237,154.02684020996095]},{"page":82,"text":"","rect":[115.19999694824219,173.7811737060547,121.2058769197464,169.05364990234376]},{"page":82,"text":"Cueing is the integration of one or more types of reconnaissance or surveillance systems to provide","rect":[133.1999969482422,176.50144958496095,522.2377917747498,167.4477996826172]},{"page":82,"text":"information that directs follow-on collecting of more detailed information by another system.","rect":[133.1999969482422,188.0251922607422,522.088205575943,178.97154235839845]},{"page":82,"text":"These systems may signal other ground or air reconnaissance assets to investigate specific areas","rect":[133.1999969482422,199.5488739013672,522.0415542726516,190.49522399902345]},{"page":82,"text":"in order to confirm, deny, or verify information. For example, a dismounted observation post may","rect":[133.19003295898438,211.07261657714845,521.929829120636,202.0189666748047]},{"page":82,"text":"observe an NAI along avenue of approach 1, while an unmanned ground sensor surveys avenue","rect":[133.19004821777345,222.5963592529297,522.074278591156,213.54270935058595]},{"page":82,"text":"of approach 2. Upon activation of the unmanned ground sensor conducting surveillance of avenue","rect":[133.170166015625,234.1200408935547,522.0743396263123,225.06639099121095]},{"page":82,"text":"of approach 2, the observation post is retasked to observe avenue of approach 2 to confirm or deny","rect":[133.1702117919922,245.64378356933595,522.036518573761,236.5901336669922]},{"page":82,"text":"enemy presence or movement along the avenue of approach.","rect":[133.17022705078126,257.0479431152344,375.6574194431305,247.9943084716797]},{"page":82,"text":"","rect":[115.19999694824219,267.7411193847656,121.2058769197464,263.01361083984377]},{"page":82,"text":"Mixing is using two or more different capabilities to collect against the same information","rect":[133.1999969482422,270.4613952636719,522.0652661323547,261.40777587890627]},{"page":82,"text":"requirement. Employing different systems is always desirable when the situation and available","rect":[133.20993041992188,282.1046447753906,521.9626452903748,273.051025390625]},{"page":82,"text":"resources permit. This method increases the probability of collecting information and tends to","rect":[133.1999969482422,293.62835693359377,521.9224438667297,284.5747375488281]},{"page":82,"text":"provide more complete information. Mixing can defeat deception attempts by highlighting","rect":[133.19000244140626,305.0325622558594,522.0373730659485,295.97894287109377]},{"page":82,"text":"discrepancies in information reported by different collection assets. For example, one observation","rect":[133.18008422851563,316.5562744140625,522.0796093940735,307.5026550292969]},{"page":82,"text":"post and one UAS focused on one NAI.","rect":[133.18008422851563,328.0600891113281,292.15162110328677,319.0263671875]},{"page":82,"text":" Redundancy is using two or more like capabilities to collect against the same information","rect":[115.19999694824219,341.5013732910156,522.0503125190735,332.44775390625]},{"page":82,"text":"requirement. Redundancy improves the chances the reconnaissance element collects the required","rect":[133.19996643066407,353.02508544921877,522.0984692573547,343.9714660644531]},{"page":82,"text":"information and provides depth, should one element become compromised. For example, two","rect":[133.19996643066407,364.5289001464844,521.9573559761047,355.49517822265627]},{"page":82,"text":"observation posts focused on one NAI.","rect":[133.1999969482422,376.0526428222656,288.8090612888336,367.0189208984375]},{"page":82,"text":"4-23. The BCT commander task organizes with additional assets from within or without the Cavalry unit to","rect":[89.99349975585938,393.5921630859375,522.052387714386,384.5385437011719]},{"page":82,"text":"increase the effectiveness and survivability of a Cavalry asset. For example, the BCT task organizes a Cavalry","rect":[90.00347900390625,405.11590576171877,521.9596753120422,396.0622863769531]},{"page":82,"text":"squadron with a lasing team, a signal retransmission element, and an ERT to improve fires lethality, increase","rect":[90.0034408569336,416.5201110839844,521.8690173606873,407.46649169921877]},{"page":82,"text":"communications range, and enhance mobility capabilities organic to the squadron. (Refer to ADP 3-90 for","rect":[90.01341247558594,428.0438232421875,522.2007132158279,418.9902038574219]},{"page":82,"text":"more information.)","rect":[90.00341796875,439.5476379394531,166.15757661914825,430.513916015625]},{"page":82,"text":"RECONNAISSANCE ASSETS AND CAPABILITIES","rect":[72.0,464.8506164550781,396.9347495002747,455.13494873046877]},{"page":82,"text":"4-24. Although the Cavalry scout directly observing the target is the commander’s most flexible","rect":[90.0,485.1413879394531,522.008116481781,476.0877685546875]},{"page":82,"text":"reconnaissance asset, the commander maximizes all the collection capabilities and units, manned and","rect":[90.0,496.64520263671877,522.0691723823547,487.6114501953125]},{"page":82,"text":"unmanned, to assess the enemy and the effects of the terrain on enemy and friendly forces. Besides knowing","rect":[90.01000213623047,508.1888122558594,521.9490551948547,499.13519287109377]},{"page":82,"text":"the capabilities and limitations of these systems, commanders and staffs understand all systems are","rect":[90.01000213623047,519.7125854492188,522.018858669281,510.658935546875]},{"page":82,"text":"susceptible to deception and countermeasures.","rect":[90.01000213623047,531.0968017578125,275.3754675388336,522.0631103515625]},{"page":82,"text":"4-25. The following assets and capabilities integrate into the information collection effort through cueing,","rect":[90.01000213623047,548.6364135742188,522.078684091568,539.582763671875]},{"page":82,"text":"mixing, and redundancy. These capabilities provide the commander with critical information at the","rect":[89.99998474121094,560.16015625,522.087706325531,551.1065063476563]},{"page":82,"text":"appropriate time, utilizing the fewest assets.","rect":[90.0,571.6838989257813,265.644602060318,562.6302490234375]},{"page":82,"text":"SENSORS","rect":[72.0,595.0199584960938,116.6267147064209,586.7159423828125]},{"page":82,"text":"4-26. Sensors allow flexibility in economizing aerial, dismounted, or mounted capabilities. Commanders use","rect":[90.0,614.9813842773438,521.9851062278748,605.927734375]},{"page":82,"text":"sensors to observe areas where contact may not be expected but is possible, or for surveillance of areas over","rect":[90.00003814697266,626.3856201171875,522.1316214189529,617.3319702148438]},{"page":82,"text":"extended periods. Sensors facilitate ground reconnaissance by providing redundancy and confirmation for","rect":[90.00003814697266,637.9093627929688,522.0541067705154,628.855712890625]},{"page":82,"text":"other capabilities and units operating in different areas of the battlefield. They can extend surveillance","rect":[90.00003814697266,649.4330444335938,522.1357409934998,640.37939453125]},{"page":82,"text":"distance between ground reconnaissance and the threat. The commander considers sensor reconnaissance to","rect":[90.00003814697266,660.956787109375,522.2282910346985,651.9031372070313]},{"page":82,"text":"expand the scope of coverage in a larger area of operations, to conduct missions of an extended duration, to","rect":[90.00003814697266,672.4805297851563,522.050678730011,663.4268798828125]},{"page":82,"text":"conduct CBRN reconnaissance, or to cue a more thorough ground or aerial reconnaissance of a given area.","rect":[90.0,684.0042114257813,516.5670263767242,674.9505615234375]},{"page":82,"text":"4-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":82,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":82,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":83,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":83,"text":"UNMANNED AIRCRAFT SYSTEMS","rect":[90.0,83.34003448486328,250.79259300231935,75.0360336303711]},{"page":83,"text":"4-27. UAS platforms can locate and identify major enemy forces, moving vehicles, weapons systems, and","rect":[108.0,103.30143737792969,540.0517773628235,94.23783111572266]},{"page":83,"text":"other targets. Additionally, UASs can detect and confirm information on the ground, such as the position of","rect":[108.00001525878906,114.82518005371094,540.0689993486404,105.77153778076172]},{"page":83,"text":"friendly forces or the presence of noncombatant civilians. Besides its organic UASs, the unit may plan and","rect":[108.00003051757813,126.22935485839844,540.0598340034485,117.17571258544922]},{"page":83,"text":"control employment of UASs from supporting organizations.","rect":[108.00999450683594,137.7530975341797,352.1823523044586,128.69944763183595]},{"page":83,"text":"Note. Airspace management and coordination is a critical consideration for the employment of ","rect":[133.19883728027345,161.0214080810547,524.452707529068,151.96775817871095]},{"page":83,"text":"UASs. (Refer to FM 3-52 and ATP 3-52.1 for more information.)","rect":[133.1999969482422,172.52149963378907,395.11514192676546,163.48777770996095]},{"page":83,"text":"4-28. UAS employment is most effective forward or on the flanks. Employed together, UASs and manned","rect":[108.0,204.82139587402345,540.065815448761,195.7677459716797]},{"page":83,"text":"or unmanned ground reconnaissance elements provide excellent surveillance capability. Other capabilities","rect":[108.0,216.22557067871095,540.0062149171829,207.1719207763672]},{"page":83,"text":"include the following:","rect":[108.0,227.7493133544922,196.4467974910736,218.69566345214845]},{"page":83,"text":" Support target acquisition efforts and lethal attacks on enemy reconnaissance and advance forces.","rect":[133.1999969482422,241.18138122558595,540.1001074314117,232.1277313232422]},{"page":83,"text":" Assist in zone, area, and route reconnaissance operations.","rect":[133.1999969482422,254.72145080566407,381.2162573337555,245.68772888183595]},{"page":83,"text":" Locate and determine enemy force composition, disposition, and activity.","rect":[133.1999969482422,268.1813659667969,445.40650391578677,259.12774658203127]},{"page":83,"text":" Maintain contact with enemy forces.","rect":[133.1999969482422,281.7413635253906,297.5890600681305,272.687744140625]},{"page":83,"text":" Provide target location with enough accuracy to enable immediate target handover and first round","rect":[133.1999969482422,295.181396484375,540.0664258003235,286.1277770996094]},{"page":83,"text":"fire-for-effect engagements.","rect":[151.1999969482422,306.82464599609377,263.380441904068,297.7710266113281]},{"page":83,"text":" Provide or enhance multispectral sensor coverage of the area of operations.","rect":[133.1999969482422,320.26141357421877,452.0119116306305,311.2077941894531]},{"page":83,"text":" Provide information to ground reconnaissance elements, increasing survivability.","rect":[133.1999969482422,333.7013854980469,476.005686044693,324.64776611328127]},{"page":83,"text":" Reduce or eliminate exposure time of ground reconnaissance elements in high-risk environments.","rect":[133.1999969482422,347.26141357421877,540.087229013443,338.2077941894531]},{"page":83,"text":" Support mission duration beyond those of manned systems.","rect":[133.1999969482422,360.7013854980469,389.6075232028961,351.64776611328127]},{"page":83,"text":" Provide digital connectivity that enables rapid product dissemination and constant communications.","rect":[133.1999969482422,374.26141357421877,539.981516122818,365.2077941894531]},{"page":83,"text":"4-29. While UASs are excellent force multipliers, they have limited effectiveness in locating well-covered","rect":[107.99351501464844,391.78106689453127,540.0622143745422,382.7274475097656]},{"page":83,"text":"or concealed enemy forces. UASs organic to the reconnaissance unit are not suited for deep, long duration","rect":[107.99349975585938,403.3047790527344,540.1590161323547,394.25115966796877]},{"page":83,"text":"searches. Other limitations include the following:","rect":[108.00346374511719,414.708984375,305.8817340145111,405.6553649902344]},{"page":83,"text":" Vulnerability to enemy fire.","rect":[133.1999969482422,428.1413879394531,262.88443970680239,419.0877685546875]},{"page":83,"text":" Weather restrictions, such as cloud cover or turbulence.","rect":[133.1999969482422,440.0,373.76514649391177,432.64776611328127]},{"page":83,"text":" Line-of-sight requirement between the aircraft and ground control stations.","rect":[133.1999969482422,455.1413879394531,450.9083044528961,446.0877685546875]},{"page":83,"text":" Limited frequencies for UAS control.","rect":[133.1999969482422,468.6814880371094,301.52918457984927,459.64776611328127]},{"page":83,"text":" Airspace coordination issues.","rect":[133.1999969482422,482.1214904785156,268.64335083961489,473.0877685546875]},{"page":83,"text":" Limited sensor field of view.","rect":[133.1999969482422,493.6894836425781,267.083566904068,486.64776611328127]},{"page":83,"text":" Limited detection capability in complex terrain.","rect":[133.1999969482422,509.1413879394531,342.45292115211489,500.0877685546875]},{"page":83,"text":" Unique class III/V requirements.","rect":[133.1999969482422,522.6814575195313,282.1959021091461,513.6477661132813]},{"page":83,"text":" Inability to provide first-hand knowledge of the situation.","rect":[133.1999969482422,536.1414184570313,381.21021485328677,527.0877685546875]},{"page":83,"text":" Fragile components.","rect":[133.1999969482422,549.701416015625,232.89092469215394,540.6477661132813]},{"page":83,"text":"SIGNALS INTELLIGENCE","rect":[90.0,573.0599975585938,209.84842824935914,564.7559814453125]},{"page":83,"text":"4-30. BCTs use information developed by the SIGINT systems organic or task organized to the BCT.","rect":[108.0,593.0214233398438,539.9781591892242,583.9677734375]},{"page":83,"text":"SIGINT systems can monitor or scan for signals, stop at detected signals, and restart after a predetermined","rect":[108.0,604.5451049804688,540.078022480011,595.491455078125]},{"page":83,"text":"time or when manually cued. The system has on-the-move signal intercept capabilities. Electromagnetic","rect":[108.0,616.06884765625,540.0966784934998,607.0151977539063]},{"page":83,"text":"support (ES) and SIGINT often share the same or similar assets and resources, and personnel conducting ES","rect":[108.0,627.5925903320313,540.1324865837097,618.5389404296875]},{"page":83,"text":"could be required to collect information that meets both requirements simultaneously. The distinction","rect":[108.0,639.1162719726563,540.068012714386,630.0626220703125]},{"page":83,"text":"between ES and SIGINT is determined by who has operational control of assets collecting information. (See","rect":[108.0,650.5204467773438,540.1034533958435,641.466796875]},{"page":83,"text":"FM 3-12 for further details.)","rect":[108.0,662.0242919921875,221.593794880867,652.9906005859375]},{"page":83,"text":"SURVEILLANCE","rect":[90.0,687.33056640625,201.3680826845169,677.6149291992188]},{"page":83,"text":"4-31. Surveillance is the systematic observation of aerospace, cyberspace, surface, or subsurface areas,","rect":[108.0,707.6213989257813,539.9652197360992,698.5677490234375]},{"page":83,"text":"places, persons, or things by visual, aural, electronic, photographic, or other means (JP 3-0). Surveillance","rect":[108.0,719.1451416015625,540.099669216156,710.0914916992188]},{"page":83,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":83,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":83,"text":"4-7","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":84,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":84,"text":"involves observing an area to collect information and observing the threat and local population in an NAI or","rect":[90.0,83.50144958496094,522.0877371416092,74.44780731201172]},{"page":84,"text":"a TAI. Surveillance may be a stand-alone mission or part of a reconnaissance mission (particularly area","rect":[90.00999450683594,95.02519226074219,522.1407458763123,85.97154998779297]},{"page":84,"text":"reconnaissance). Elements conducting surveillance must maximize assets, maintain continuous surveillance","rect":[90.00999450683594,106.42936706542969,522.0947253684998,97.37572479248047]},{"page":84,"text":"on all NAIs and TAIs, and report all information accurately. A variety of assets (ground, air, sea, and space),","rect":[90.00999450683594,117.95310974121094,522.1236670017242,108.89946746826172]},{"page":84,"text":"means (Soldiers and systems), and mediums (through the electromagnetic spectrum) can perform","rect":[90.010009765625,129.47679138183595,522.0877472171784,120.42314910888672]},{"page":84,"text":"surveillance tasks. Effective surveillance—","rect":[90.01998138427735,139.0,263.31202030181887,131.94688415527345]},{"page":84,"text":" Maintains continuous observations of all assigned NAIs and TAIs.","rect":[115.19999694824219,154.42137145996095,399.56727051734927,145.3677215576172]},{"page":84,"text":" Provides early warning.","rect":[115.19999694824219,167.8613739013672,228.56797242164613,158.80772399902345]},{"page":84,"text":" Detects, tracks, and assesses key targets.","rect":[115.19999694824219,181.42137145996095,295.43445801734927,172.3677215576172]},{"page":84,"text":" Provides mixed, redundant, and overlapping coverage.","rect":[115.19999694824219,194.8613739013672,351.56604981422427,185.80772399902345]},{"page":84,"text":"4-32. Cavalry units conduct surveillance as a “task” while conducting reconnaissance operations.","rect":[90.00347137451172,212.5005340576172,522.1691992282867,203.44688415527345]},{"page":84,"text":"Surveillance is similar to reconnaissance, because they both include observation and reporting and involve","rect":[90.00347137451172,224.02427673339845,522.0981433372498,214.9706268310547]},{"page":84,"text":"detection, location, tracking, and identification of entities in an assigned area, gaining environmental data.","rect":[89.99354553222656,235.42845153808595,522.077219247818,226.3748016357422]},{"page":84,"text":"Surveillance is distinct from reconnaissance in that surveillance is tiered and layered with technical","rect":[89.99354553222656,246.9521942138672,522.1121417293549,237.89854431152345]},{"page":84,"text":"capabilities and systems that collect information. Surveillance is passive and continuous; reconnaissance is","rect":[89.99354553222656,258.4758605957031,522.0414322023391,249.42222595214845]},{"page":84,"text":"active in the collection of information (such as maneuver) and usually includes human participation and","rect":[89.99357604980469,269.9996032714844,522.0565991401672,260.94598388671877]},{"page":84,"text":"fighting for information. Surveillance and reconnaissance complement each other by cueing the commitment","rect":[89.99357604980469,281.5233459472656,522.1352740535737,272.4697265625]},{"page":84,"text":"of collection capabilities against locations or specially targeted enemy units.","rect":[89.99357604980469,293.0470275878906,395.004709482193,283.993408203125]},{"page":84,"text":"SECTION II – RECONNAISSANCE TYPES","rect":[81.36000061035156,316.9440002441406,314.84402685546879,308.0639953613281]},{"page":84,"text":"4-33. The five types of reconnaissance operations are zone, area, route, reconnaissance in force, and special","rect":[90.0,340.3013916015625,522.1736041316987,331.2477722167969]},{"page":84,"text":"reconnaissance. All types of reconnaissance, driven by the fundamentals of reconnaissance, answer PIRs that","rect":[90.00000762939453,351.7055969238281,522.0127764949799,342.6519775390625]},{"page":84,"text":"allow the commander and staff to understand and visualize the environment, develop the situation, create","rect":[90.01000213623047,363.20941162109377,521.9415271263123,354.1756896972656]},{"page":84,"text":"options, identify opportunities, and make decisions.","rect":[90.00995635986328,374.7530212402344,296.73975586891177,365.69940185546877]},{"page":84,"text":"4-34. Zone reconnaissance allows intelligence development on threat, terrain, infrastructure, and society","rect":[90.00997161865235,392.2726745605469,521.9973340034485,383.21905517578127]},{"page":84,"text":"within a specified zone of operations. Zone reconnaissance operations are generally large, deliberate, and","rect":[90.00997161865235,403.79638671875,522.0817456245422,394.7427673339844]},{"page":84,"text":"thorough efforts designed to gain a significant amount of information. Area reconnaissance focuses","rect":[90.00997161865235,415.3200988769531,522.0449112062454,406.2664794921875]},{"page":84,"text":"reconnaissance efforts within a smaller geographic area than zone reconnaissance but requires collecting the","rect":[90.00997161865235,426.72430419921877,522.1115710716248,417.6706848144531]},{"page":84,"text":"same information as for zone reconnaissance, as well as information about dominant terrain outside the","rect":[90.00995635986328,436.2361145019531,522.1296374778748,429.19439697265627]},{"page":84,"text":"specified area from which the threat can still influence friendly operations. Route reconnaissance is a directed","rect":[90.00995635986328,449.7717590332031,522.1006054878235,440.7181396484375]},{"page":84,"text":"operation to obtain detailed information of a specific route and the influential terrain along the route.","rect":[90.00995635986328,461.29547119140627,522.1085913181305,452.2418518066406]},{"page":84,"text":"Reconnaissance in force is an operation to determine the enemy’s strength, disposition, and reactions in a","rect":[90.00995635986328,472.8191833496094,522.0661609153748,463.76556396484377]},{"page":84,"text":"specified area, conducted by battalion-sized TFs or larger elements. Special reconnaissance is an operation","rect":[90.00995635986328,484.3428955078125,522.0558667182922,475.2892761230469]},{"page":84,"text":"conducted by SOF in hostile, denied, or diplomatically and politically sensitive environments to collect or","rect":[90.00003814697266,495.7471008300781,522.0529471025467,486.6934814453125]},{"page":84,"text":"verify information of strategic or operational significance. Special reconnaissance capabilities and assets are","rect":[90.00003814697266,507.27081298828127,521.9765613059998,498.2171936035156]},{"page":84,"text":"not usually available to conventional forces.","rect":[90.0,518.7945556640625,266.619699716568,509.74090576171877]},{"page":84,"text":"Note. When the Cavalry unit receives a reconnaissance mission from higher headquarters, the unit","rect":[115.19879913330078,542.0214233398438,504.13802063560487,532.9677734375]},{"page":84,"text":"may perform a combination of reconnaissance types to answer the higher commander’s","rect":[115.19999694824219,553.5414428710938,504.15514069843297,544.48779296875]},{"page":84,"text":"information requirements. For example, if the Cavalry squadron’s mission is to conduct zone","rect":[115.19999694824219,564.9456176757813,504.1240527610779,555.8919677734375]},{"page":84,"text":"reconnaissance, their subordinate units may conduct a combination of zone, area, or route","rect":[115.19999694824219,576.4692993164063,504.08737063217168,567.4156494140625]},{"page":84,"text":"reconnaissance missions inside the assigned squadron zone of operations.","rect":[115.19002532958985,587.9930419921875,409.3915503025055,578.9393920898438]},{"page":84,"text":"4-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":84,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":84,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":85,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":85,"text":"4-35. Table 4-1 shows which types of Cavalry units could conduct which type of reconnaissance operation.","rect":[108.0,83.50144958496094,540.1005957126617,74.44780731201172]},{"page":85,"text":"SOF conducts special reconnaissance operations.","rect":[107.99002838134766,95.0052719116211,304.42310547828677,85.97154998779297]},{"page":85,"text":"Table 4-1. Dedicated reconnaissance units and types of reconnaissance operations","rect":[117.1133804321289,112.48502349853516,512.7165014762878,103.04293823242188]},{"page":85,"text":"ZONE RECONNAISSANCE","rect":[90.0,282.5705871582031,264.7334238710404,272.85491943359377]},{"page":85,"text":"4-36. Zone reconnaissance is a type of reconnaissance operation that involves a directed effort to obtain","rect":[108.0,302.86138916015627,539.8753247261047,293.8077697753906]},{"page":85,"text":"detailed information on all routes, obstacles, terrain, and enemy forces within a zone defined by boundaries","rect":[107.98999786376953,314.3851013183594,540.1327407960891,305.3314514160156]},{"page":85,"text":"(ADP 3-90). Any unit can perform zone reconnaissance, though the Cavalry squadron conducts zone","rect":[107.99004364013672,325.9088439941406,540.0947253684998,316.855224609375]},{"page":85,"text":"reconnaissance in advance of the BCT’s maneuver battalions to develop information and intelligence,","rect":[107.99004364013672,337.43255615234377,540.0847265720367,328.3789367675781]},{"page":85,"text":"affecting the success of current and future BCT operations. A commander assigns zone reconnaissance when","rect":[107.99011993408203,348.9562683105469,540.0589184761047,339.90264892578127]},{"page":85,"text":"the enemy situation is vague or when information related to terrain, infrastructure, or the civil populous is","rect":[108.00007629394531,360.47998046875,540.1540420656204,351.4263610839844]},{"page":85,"text":"limited. Commanders require specific information from zone reconnaissance to develop or refine their","rect":[108.0,371.8642883300781,540.2111502275467,362.83056640625]},{"page":85,"text":"courses of action before deploying additional forces into the zones. In this regard, zone reconnaissance may","rect":[108.0,383.40789794921877,540.0966382026672,374.3542785644531]},{"page":85,"text":"orient on the main body’s subsequent area of operations or a specific axis of advance. Zone reconnaissance","rect":[108.01991271972656,394.9316101074219,540.1505115013123,385.87799072265627]},{"page":85,"text":"is the broadest and overarching of the reconnaissance types and is an appropriate mission for the BCT’s","rect":[108.01991271972656,406.4553527832031,540.0228775148391,397.4017333984375]},{"page":85,"text":"Cavalry squadron. The more focused types of reconnaissance operations (area and route reconnaissance) may","rect":[108.01991271972656,417.97906494140627,540.0930371284485,408.9254455566406]},{"page":85,"text":"be included as specified tasks during zone reconnaissance.","rect":[108.01991271972656,429.5027770996094,341.8856909275055,420.44915771484377]},{"page":85,"text":"4-37. Commanders must work to balance available time with critical collection requirements to ensure they","rect":[108.0199203491211,446.90289306640627,540.0620312690735,437.8492736816406]},{"page":85,"text":"provide the necessary information for their higher commanders. To do this, commanders deliberately focus","rect":[108.0199203491211,458.4266052246094,540.0471084718704,449.37298583984377]},{"page":85,"text":"collection requirements and adjust their reconnaissance methods to increase the overall tempo of the","rect":[108.01991271972656,469.9503173828125,540.1246936302185,460.88671875]},{"page":85,"text":"operation. However, as tempo increases, so does the risk associated with zone reconnaissance and follow-on","rect":[108.01990509033203,481.4541931152344,540.0847973823547,472.42047119140627]},{"page":85,"text":"operations. Commanders choose to task organize the reconnaissance force to mitigate risks associated with","rect":[108.01990509033203,492.9977722167969,539.992329120636,483.94415283203127]},{"page":85,"text":"an increased tempoof operations and to provide Cavalry organizations with an ability to develop the situation","rect":[108.01991271972656,504.4020080566406,540.0836987495422,495.348388671875]},{"page":85,"text":"through action in close contact with the enemy and civilian population.","rect":[108.00994873046875,515.9257202148438,392.2543737888336,506.8720703125]},{"page":85,"text":"TASKS","rect":[90.0,539.1822509765625,122.86622428894043,531.0960083007813]},{"page":85,"text":"4-38. The Cavalry squadron commander, working with the BCT commander, determines the priority of tasks","rect":[108.0,559.1814575195313,540.1696670656204,550.1278076171875]},{"page":85,"text":"that best answers PIRs. The commander then focuses the squadron’s collection efforts against these","rect":[108.0,570.7051391601563,540.0969226341248,561.6514892578125]},{"page":85,"text":"requirements. The primary tasks conducted within capability and associated with zone reconnaissance are—","rect":[108.01000213623047,582.2288818359375,540.041298866272,573.1752319335938]},{"page":85,"text":" Find and report all enemy forces within the zone.","rect":[133.1999969482422,595.6614379882813,348.20780396461489,586.6077880859375]},{"page":85,"text":" Clear all enemy forces in the designated, assigned area of the unit conducting reconnaissance in","rect":[133.1999969482422,609.1014404296875,540.0592846870422,600.0477905273438]},{"page":85,"text":"accordance with engagement criteria.","rect":[151.1999969482422,620.7446899414063,300.57010865211489,611.6910400390625]},{"page":85,"text":" Determine the trafficability of all terrain in the zone, including built-up areas.","rect":[133.1999969482422,634.1814575195313,461.4938452243805,625.1278076171875]},{"page":85,"text":" Locate and determine the extent of all contaminated areas in the zone.","rect":[133.1999969482422,645.6094360351563,431.2694799900055,638.5677490234375]},{"page":85,"text":" Inspect and classify all bridges within the zone.","rect":[133.1999969482422,661.1814575195313,341.24772095680239,652.1278076171875]},{"page":85,"text":" Inspect and classify overpasses, underpasses, and culverts.","rect":[133.1999969482422,674.6213989257813,385.42029786109927,665.5677490234375]},{"page":85,"text":" Reconnoiter defiles along the route. Clear them of enemy and obstacles, or locate a bypass.","rect":[133.1999969482422,688.181396484375,515.8614599704742,679.1277465820313]},{"page":85,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":85,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":85,"text":"4-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":86,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":86,"text":"4-39.","rect":[89.99351501464844,126.00862884521485,110.95931458473206,119.14618682861328]},{"page":86,"text":" Locate fords or crossing sites, or obstacle bypasses, within the zone.","rect":[115.19999694824219,83.38139343261719,406.29126954078677,74.32775115966797]},{"page":86,"text":" Locate and clear any mines, obstacles, and barriers in the zone.","rect":[115.19999694824219,96.94139099121094,385.655100107193,87.88774871826172]},{"page":86,"text":" Report reconnaissance information.","rect":[115.19999694824219,110.3614730834961,275.72754883766177,101.32775115966797]},{"page":86,"text":"Based on priority, the commander may direct the following:","rect":[115.19231414794922,128.0205535888672,355.5580035457611,118.96691131591797]},{"page":86,"text":" Reconnoiter all terrain within the zone.","rect":[115.19999694824219,139.44949340820313,289.87967896461489,132.4077606201172]},{"page":86,"text":" Reconnoiter specific terrain within the zone.","rect":[115.19999694824219,154.88148498535157,310.99991822242739,145.84776306152345]},{"page":86,"text":" Locate bypasses around built-up areas, obstacles, and contaminated areas.","rect":[115.19999694824219,168.46141052246095,428.9970190525055,159.4077606201172]},{"page":86,"text":"BCT PLANNING CONSIDERATIONS","rect":[72.0,191.80801391601563,241.8975887298584,183.51602172851563]},{"page":86,"text":"4-40. BCT commanders direct zone reconnaissance to develop the situation for follow-on offensive,","rect":[90.0,211.76148986816407,522.0847265720367,202.72776794433595]},{"page":86,"text":"defensive, or stability tasks. The Cavalry squadron is the BCT commander’s primary reconnaissance unit to","rect":[90.0,223.30516052246095,522.046040058136,214.2515106201172]},{"page":86,"text":"develop the situation and refine subsequent courses of action. Consequently, BCT commanders must provide","rect":[90.0,234.82884216308595,522.1147448997498,225.7751922607422]},{"page":86,"text":"planning guidance and clear intent for zone reconnaissance operations that offer both freedom of action and","rect":[90.0,246.2330780029297,522.0578198432922,237.17942810058595]},{"page":86,"text":"adequate direction to ensure their Cavalry squadrons accomplish defined reconnaissance objectives within","rect":[90.0,257.7567443847656,521.922016620636,248.6931610107422]},{"page":86,"text":"the required timeframe.","rect":[90.0,269.2605895996094,184.16582703590394,260.22686767578127]},{"page":86,"text":"4-41. The BCT commander’s intent for zone reconnaissance provides focus for information collection.","rect":[90.0,286.78021240234377,522.0847265720367,277.7464904785156]},{"page":86,"text":"Based on the potential scale of zone reconnaissance, commanders prioritize collection efforts on","rect":[89.98999786376953,298.303955078125,521.9637036323547,289.2702331542969]},{"page":86,"text":"reconnaissance objectives determined during the IPB process. The event template, terrain analysis, and enemy","rect":[89.98999786376953,309.8475646972656,521.9925122261047,300.7839660644531]},{"page":86,"text":"situation template create information requirements that in turn focus collection efforts. These requirements,","rect":[89.99004364013672,321.2318420410156,521.9323828220367,312.1981201171875]},{"page":86,"text":"linked to CCIRs, assist the BCT commander and staff with developing and refining courses of action.","rect":[89.99004364013672,332.7754821777344,486.57242798805239,323.72186279296877]},{"page":86,"text":"4-42. Regardless of the amount of information known, the BCT commander initially defines and consistently","rect":[90.00001525878906,350.29510498046877,522.052875995636,341.2414855957031]},{"page":86,"text":"refines the type of information needed (information requirements) and when it is needed. The BCT","rect":[90.00003814697266,361.8188171386719,521.9672738904953,352.76519775390627]},{"page":86,"text":"commander describes how the reconnaissance efforts enable follow-on operations. The Cavalry squadron","rect":[90.00003814697266,373.3425598144531,522.0419507026672,364.2889404296875]},{"page":86,"text":"serves as the BCT commander’s eyes and ears allowing the commander to have a better understanding of the","rect":[89.99008178710938,384.7467346191406,522.0997302513123,375.693115234375]},{"page":86,"text":"operational environment and have the ability to focus the main effort at positions of tactical advantage.","rect":[89.99008178710938,396.2704772949219,521.982248544693,387.21685791015627]},{"page":86,"text":"Finally, the BCT commander defines the Cavalry squadron’s role when the squadron transitions from zone","rect":[90.00004577636719,407.794189453125,522.0939929466248,398.7405700683594]},{"page":86,"text":"reconnaissance to a follow-on operation.","rect":[90.0,419.2980041503906,252.5691168308258,410.2642822265625]},{"page":86,"text":"4-43. When reconnaissance assets react to contact, they affect the reconnaissance tempo. Therefore,","rect":[90.0,436.8375549316406,522.0837500095367,427.783935546875]},{"page":86,"text":"engagement, disengagement, and bypass criteria are essential considerations from the BCT to the section","rect":[90.0,448.3612976074219,522.0092968940735,439.30767822265627]},{"page":86,"text":"level. The criteria for which subordinate elements lethally engage or disengage enemy forces help the","rect":[90.0,459.7654724121094,522.1055896263123,450.71185302734377]},{"page":86,"text":"squadron gain and maintain contact with the enemy. Commanders may direct bypassing or handing off","rect":[90.0,471.2892150878906,522.1018362627029,462.235595703125]},{"page":86,"text":"certain sizes or types of units to maintain the tempo of the operation based upon subsequent planned","rect":[90.0,482.81292724609377,521.9663281440735,473.7593078613281]},{"page":86,"text":"operations and guidance from higher. Follow-on forces must understand engagement/disengagement and","rect":[90.0,494.3366394042969,522.0628247261047,485.2829895019531]},{"page":86,"text":"bypass criteria. Reconnaissance assets direct and rehearse deliberate handover of enemy targets between","rect":[90.0,505.8603820800781,521.955219745636,496.8067626953125]},{"page":86,"text":"friendly units as required during engagement, disengagements, and transitions.","rect":[90.0,517.3840942382813,404.855539560318,508.3304443359375]},{"page":86,"text":"4-44. To enable information collection, one of the major considerations for the BCT staff when planning","rect":[90.0,534.7015380859375,522.0331616401672,525.637939453125]},{"page":86,"text":"zone reconnaissance is the Cavalry squadron’s task organization. BCTs task organize and assign command","rect":[89.9923095703125,546.2252807617188,522.0490918159485,537.171630859375]},{"page":86,"text":"relationships for their Cavalry formations to accomplish their assigned mission in their anticipated area of","rect":[89.9923095703125,557.7489624023438,522.0720511064529,548.6953125]},{"page":86,"text":"operations. The BCT sets conditions for zone reconnaissance by enabling the Cavalry squadron with","rect":[89.9923095703125,569.272705078125,522.0602612495422,560.2190551757813]},{"page":86,"text":"additional capabilities, such as rotary-wing aircraft, air defense support, joint and organic fires. The BCT also","rect":[89.9923095703125,580.7964477539063,521.9336133003235,571.7328491210938]},{"page":86,"text":"provides information collection assets, mobility support, increased sustainment capacity, retransmission","rect":[89.98236083984375,592.3201293945313,522.0503125190735,583.2664794921875]},{"page":86,"text":"capability, Infantry, and Armored based upon available units, information collection requirements, and","rect":[89.9923095703125,603.7243041992188,522.0700879096985,594.670654296875]},{"page":86,"text":"estimates of the enemy’s capabilities and assets. Effective Cavalry is task organized with additional assets","rect":[90.00228881835938,615.248046875,522.0331924562454,606.1943969726563]},{"page":86,"text":"that allow them to collect information and intelligence in close contact with the enemy and civil population","rect":[90.01223754882813,626.7717895507813,522.030415058136,617.7181396484375]},{"page":86,"text":"without placing the unit in a position of disadvantage or risk of enemy overmatch. A sufficient task","rect":[90.01223754882813,638.2954711914063,521.9545483589172,629.2418212890625]},{"page":86,"text":"organization enables the unit conducting zone reconnaissance to develop the situation through action,","rect":[90.01223754882813,649.8192138671875,522.239572763443,640.7655639648438]},{"page":86,"text":"especially in an unclear operational environment. Similarly, when conducting operations focused on the","rect":[90.0221939086914,661.2234497070313,522.0402820091248,652.1697998046875]},{"page":86,"text":"conduct of stability tasks, task organizing the squadron with capabilities specific to collecting information","rect":[90.022216796875,672.7471313476563,522.052143573761,663.6934814453125]},{"page":86,"text":"for follow-on operations (such as civil affairs, translators, or a complete infrastructure assessment team)","rect":[90.01223754882813,684.2509155273438,521.9743948564529,675.2172241210938]},{"page":86,"text":"provides information in a timely fashion.","rect":[90.00228881835938,695.7945556640625,254.00953125953675,686.7409057617188]},{"page":86,"text":"4-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":86,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":86,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":87,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":87,"text":"4-45. The positioning of sustainment assets depends on the depth of the zone, anticipated duration of the","rect":[108.0,83.50144958496094,540.061827419281,74.44780731201172]},{"page":87,"text":"operation, and sustainment requirements during operations. Class III, class V, maintenance collection, and","rect":[108.0,95.02519226074219,540.0627636909485,85.97154998779297]},{"page":87,"text":"medical evacuation are of primary concern. A forward-positioned FARP reduces aircraft turnaround time.","rect":[107.99002838134766,106.42936706542969,540.064768075943,97.37572479248047]},{"page":87,"text":"The FARP may be in the squadron zone or in the area of operations of the lead unit behind the squadron.","rect":[107.98007202148438,117.95310974121094,527.1041357517242,108.89946746826172]},{"page":87,"text":"4-46. Dedication of additional capabilities comes at a potential cost to follow-on operations. Additional","rect":[107.98007202148438,135.45277404785157,540.1096392879487,126.41905975341797]},{"page":87,"text":"combat power enhances the Cavalry squadron’s ability to gain and maintain contact and execute","rect":[107.98008728027344,146.99644470214845,540.0856921653748,137.9427947998047]},{"page":87,"text":"reconnaissance and battle handover while providing an increased capacity to defeat enemy reconnaissance","rect":[107.98008728027344,158.5201873779297,539.9974963645935,149.46653747558595]},{"page":87,"text":"and security forces. Above all other considerations, an appropriately task-organized squadron has the ability","rect":[107.9801025390625,170.0438690185547,540.027973651886,160.99021911621095]},{"page":87,"text":"to take advantage of situations and opportunities identified during zone reconnaissance. Seizing opportunities","rect":[107.97013854980469,181.44810485839845,540.0070083742141,172.3944549560547]},{"page":87,"text":"provides the BCT with a marked advantage during decisive operations. Therefore, commanders should","rect":[107.97013854980469,192.97178649902345,540.045063495636,183.9181365966797]},{"page":87,"text":"carefully consider the significant risks assumed in executing reconnaissance operations as an economy of","rect":[107.97013854980469,204.4955291748047,539.8906546220779,195.44187927246095]},{"page":87,"text":"force without appropriately task organizing the Cavalry force.","rect":[107.97013854980469,216.0192108154297,355.752023935318,206.96556091308595]},{"page":87,"text":"Note. “Reconnaissance organizations require versatility to adapt to ever-evolving tactical","rect":[133.19882202148438,239.2613983154297,522.0085650691987,230.20774841308595]},{"page":87,"text":"situations and operational realities. Versatility without survivability and combat power has little","rect":[133.1999969482422,250.66136169433595,521.8303210716248,241.6077117919922]},{"page":87,"text":"relevance. Reconnaissance units unable to survive contact with an enemy and incapable of ","rect":[133.1999969482422,262.1850891113281,524.5525000095367,253.13145446777345]},{"page":87,"text":"overcoming even light resistance tend to be marginalized either by a threat or by their own","rect":[133.1999969482422,273.7087707519531,522.068256855011,264.6551513671875]},{"page":87,"text":"commanders. Even stealthy reconnaissance requires an ability to survive a chance contact or an","rect":[133.2099151611328,285.2325134277344,521.9200024604797,276.17889404296877]},{"page":87,"text":"ambush that may occur with little warning.” (Cameron, page 577.)","rect":[133.2099151611328,296.7562255859375,399.21160799121858,287.7026062011719]},{"page":87,"text":"CAVALRY SQUADRON PLANNING CONSIDERATIONS","rect":[90.0,330.38641357421877,342.5677242279053,320.5560302734375]},{"page":87,"text":"4-47. When developing planning guidance, Cavalry squadron commanders incorporate the","rect":[108.0,348.8214111328125,512.8632190208435,339.7677917480469]},{"page":87,"text":"BCT","rect":[520.4407958984375,346.8194580078125,539.8498422498703,339.9371032714844]},{"page":87,"text":"commander’s intent and concept for follow-on forces into their overall scheme of maneuver. When","rect":[108.0,360.2057189941406,540.0464673042297,351.1719970703125]},{"page":87,"text":"conducting all the types of reconnaissance, focus, reconnaissance tempo, and engagement/disengagement","rect":[108.0,371.74932861328127,540.1354571590424,362.6956787109375]},{"page":87,"text":"criteria are critical components of the commander’s reconnaissance guidance.","rect":[107.99996185302735,383.2730407714844,418.79178833961489,374.21942138671877]},{"page":87,"text":"4-48. The tempo and uncertainty of military operations rarely allows sufficient time to collect all the relevant","rect":[107.99996948242188,400.7926940917969,540.1197711238862,391.73907470703127]},{"page":87,"text":"or required information during zone reconnaissance. Therefore, commanders must focus their formations on","rect":[107.99996948242188,412.31640625,539.9353833198547,403.2627868652344]},{"page":87,"text":"specific reconnaissance objectives that validate or invalidate assumptions and confirm or deny planned","rect":[108.0,423.7206115722656,540.0849194526672,414.6570129394531]},{"page":87,"text":"courses of action. Prioritization allows the Cavalry squadron to increase the speed of collection and","rect":[107.99004364013672,435.24432373046877,539.930317401886,426.1907043457031]},{"page":87,"text":"accomplish reconnaissance objectives in sufficient time to facilitate the main effort’s movement and","rect":[108.0,446.7680358886719,540.038959980011,437.7044372558594]},{"page":87,"text":"maneuver to positions of tactical advantage. Mission analysis and IPB produces terrain analysis, enemy","rect":[108.0,458.2917785644531,539.966206073761,449.2381591796875]},{"page":87,"text":"situational templates, and an event template to predict how the military aspects of terrain, mission variables,","rect":[108.00999450683594,469.81549072265627,540.0951025485992,460.7618713378906]},{"page":87,"text":"and civil considerations affect friendly and enemy forces. The squadron uses available information to","rect":[108.00999450683594,481.3392028808594,540.0877270698547,472.28558349609377]},{"page":87,"text":"prioritize tasks and determine factors, such as—","rect":[108.01996612548828,492.7234802246094,300.5167932510376,483.68975830078127]},{"page":87,"text":" Speed, movement, and reconnaissance techniques.","rect":[133.1999969482422,506.1214904785156,353.1280310153961,497.0877685546875]},{"page":87,"text":" Overall focus of reconnaissance.","rect":[133.1999969482422,517.699462890625,281.74173951148989,510.64776611328127]},{"page":87,"text":" Task, purpose, and focus for subordinate troops, task-organized assets, and boundaries (zones) for","rect":[133.1999969482422,533.1414184570313,540.2046805009842,524.0877685546875]},{"page":87,"text":"ground troops.","rect":[151.1999969482422,544.78466796875,209.6084234714508,535.7310180664063]},{"page":87,"text":" Essential aerial on-station times or locations if available.","rect":[133.1999969482422,556.20947265625,377.95325684547427,549.1677856445313]},{"page":87,"text":"4-49. Commanders direct the reconnaissance tempo during zone reconnaissance to enable the timely","rect":[107.99352264404297,575.7410278320313,539.832172870636,566.6873779296875]},{"page":87,"text":"collection of information and intelligence to facilitate successful subsequent operations. Commanders","rect":[107.98355102539063,587.2647705078125,540.0098159914016,578.2111206054688]},{"page":87,"text":"prescribe the scope to collect against specific reconnaissance objectives, and speed and movement techniques","rect":[107.98355102539063,598.7885131835938,540.0403335695266,589.7249145507813]},{"page":87,"text":"during different portions of the operation, task organization of reconnaissance assets to create efficient","rect":[107.98355102539063,610.1926879882813,540.1461993465424,601.1390380859375]},{"page":87,"text":"collection, and a timeline for collection in their planning guidance. The combination of these factors creates","rect":[107.98355102539063,621.7164306640625,539.9171646242141,612.6627807617188]},{"page":87,"text":"a tempo for zone reconnaissance.","rect":[107.9935073852539,633.22021484375,241.06009888648988,624.1865234375]},{"page":87,"text":"4-50. To control movement, the squadron assigns zones for the ground troops (see figure 4-1, page 4-12).","rect":[107.9935073852539,650.759765625,540.1977026462555,641.7061157226563]},{"page":87,"text":"Zone reconnaissance begins at the line of departure and concludes at a specified limit of advance (LOA) with","rect":[107.98351287841797,662.2835083007813,539.9178051948547,653.2298583984375]},{"page":87,"text":"lateral boundaries defining the area of operations. Subordinate zones may not be the same size. The main","rect":[107.98351287841797,673.8071899414063,540.0414624214172,664.7535400390625]},{"page":87,"text":"body frequently orients movement along a major route, especially an axis of advance though travelling","rect":[107.98351287841797,685.21142578125,540.043354511261,676.1478271484375]},{"page":87,"text":"directly along the route incurs tactical risk. Reconnaissance of the route becomes a specified task for a troop,","rect":[107.98351287841797,696.7351684570313,540.073801279068,687.6815185546875]},{"page":87,"text":"typically. Phase lines (PLs) control progress through the zone. Boundaries and PLs are drawn along","rect":[107.98360443115235,708.2588500976563,540.037739276886,699.2052001953125]},{"page":87,"text":"recognizable terrain. Contact points along boundaries maintain coordinated reconnaissance between adjacent","rect":[107.97360229492188,719.7825927734375,540.0025836238862,710.718994140625]},{"page":87,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":87,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":87,"text":"4-11","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":88,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":88,"text":"units. Checkpoints indicate critical terrain features, control reconnaissance movement and reporting, and","rect":[90.0,83.50144958496094,522.0776562690735,74.44780731201172]},{"page":88,"text":"coordinate air and ground actions.","rect":[90.0,95.02519226074219,223.76481080055238,85.97154998779297]},{"page":88,"text":"Figure 4-1. IBCT zone reconnaissance graphics","rect":[184.43075561523438,549.161376953125,409.2916662712097,539.828857421875]},{"page":88,"text":"4-51. Cavalry units conduct detailed fires planning regardless of the assigned task or prescribed tempo.","rect":[89.98008728027344,566.74072265625,522.1256201267242,557.6870727539063]},{"page":88,"text":"Deliberate fire planning has two components, indirect and direct. A commander deliberately plans and","rect":[89.99004364013672,578.2644653320313,521.9863476753235,569.2108154296875]},{"page":88,"text":"integrates indirect fire support into the scheme of maneuver to enhance the effectiveness of direct fires. Fires","rect":[90.0,589.7882080078125,522.0280655031204,580.7345581054688]},{"page":88,"text":"integration ensures that templated enemy forces are targeted with the most casualty-producing weapon","rect":[90.0,601.3119506835938,522.0608716011047,592.2581787109375]},{"page":88,"text":"systems. By setting the conditions to engage the enemy with indirect fires, the commander can degrade the","rect":[90.00003814697266,612.835693359375,522.1026599388123,603.7820434570313]},{"page":88,"text":"enemy scheme of maneuver without exposing friendly forces to observation and direct fire engagement until","rect":[90.00007629394531,624.2398681640625,522.0053912410737,615.1862182617188]},{"page":88,"text":"necessary. Commanders establish a direct fire plan based on METT-TC (I). Fire distribution allows the","rect":[90.00007629394531,635.7636108398438,522.1007068138123,626.7099609375]},{"page":88,"text":"commander to achieve massing fires and effects on the enemy to degrade or destroy their ability to command","rect":[90.00011444091797,647.287353515625,522.061909198761,638.2337036132813]},{"page":88,"text":"and control their forces. Proper direct fire planning—","rect":[90.00015258789063,658.8110961914063,303.8383569717407,649.7574462890625]},{"page":88,"text":" Destroys the most dangerous enemy assets first.","rect":[115.19999694824219,672.221435546875,325.04847168922427,663.1677856445313]},{"page":88,"text":" Uses each weapon system in its best role.","rect":[115.19999694824219,685.6614379882813,298.78895020484927,676.6077880859375]},{"page":88,"text":" Concentrates fires and effects on long-range targets.","rect":[115.19999694824219,699.221435546875,341.856027841568,690.1677856445313]},{"page":88,"text":"4-12","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":88,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":88,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":89,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":89,"text":" Takes the best shots and exposes only those combat vehicles that actually need to fire.","rect":[133.1999969482422,83.38139343261719,495.95548462867739,74.32775115966797]},{"page":89,"text":" Avoids target overkill.","rect":[133.1999969482422,96.94139099121094,241.524240732193,87.88774871826172]},{"page":89,"text":"4-52. Integration of combined arms, air-ground operations are essential to the success of reconnaissance","rect":[107.99351501464844,114.46104431152344,540.0023791770935,105.40740203857422]},{"page":89,"text":"operations. Considerations for the integration of air-ground operations include the following:","rect":[107.99349975585938,125.98472595214844,479.9995318660736,116.93108367919922]},{"page":89,"text":" Command and control relationship.","rect":[133.1999969482422,139.4014434814453,292.8878881931305,130.3677215576172]},{"page":89,"text":" Rotary-wing employment plan, task, and purpose.","rect":[133.1999969482422,152.8613739013672,351.2017614841461,143.80772399902345]},{"page":89,"text":" Ground troops’ missions.","rect":[133.1999969482422,166.4014434814453,252.56292176246644,157.3677215576172]},{"page":89,"text":" Tasks performed by air and ground troops.","rect":[133.1999969482422,179.8613739013672,322.05079102516177,170.80772399902345]},{"page":89,"text":"4-53. Rotary-wing support increases the effectiveness of the reconnaissance efforts by reconnoitering open","rect":[108.00347137451172,197.5005340576172,540.048481464386,188.44688415527345]},{"page":89,"text":"terrain, reconnoitering forward of the ground troops, screening flanks, and locating enemy forces. Integrated","rect":[107.99351501464844,209.02427673339845,540.0573315620422,199.9706268310547]},{"page":89,"text":"and synchronized aerial reconnaissance allows ground troops to focus on terrain, routes, and reconnaissance","rect":[107.98358917236328,220.42845153808595,540.0876452903748,211.3748016357422]},{"page":89,"text":"of obstacles and enemy. When air and ground reconnaissance efforts are integrated, the squadron develops","rect":[107.98358917236328,231.9521942138672,540.1095474367141,222.89854431152345]},{"page":89,"text":"the situation faster with more fidelity for the BCT commander.","rect":[107.98358917236328,243.4758758544922,359.70069336891177,234.42222595214845]},{"page":89,"text":"4-54. Usually, the squadron retains control of task-organized reinforcements when the situation is vague.","rect":[107.98358917236328,260.9955139160156,540.0483496189117,251.94187927246095]},{"page":89,"text":"Engineers are typically task organized to maneuver elements along primary and alternate routes to assist in","rect":[107.98358917236328,272.5192565917969,539.9089550971985,263.46563720703127]},{"page":89,"text":"technical reconnaissance, obstacle reduction, and route repair.","rect":[107.9736328125,284.0230407714844,356.0246069431305,274.98931884765627]},{"page":89,"text":"4-55. The BCT field artillery battalion has an organic command relationship with the BCT. Priority of fire","rect":[107.9736328125,301.4430847167969,540.059386013031,292.38946533203127]},{"page":89,"text":"for artillery to the Cavalry troops is based on intelligence or the main effort. Normally, priority for ADA","rect":[107.9736328125,312.9667663574219,540.0703314533233,303.91314697265627]},{"page":89,"text":"protects trains, command posts, artillery batteries, and task organized or designated reserve.","rect":[107.96368408203125,324.4905090332031,474.90702271461489,315.4368896484375]},{"page":89,"text":"4-56. Commanders at all levels position themselves in the best position to command subordinate units and","rect":[107.97364807128906,341.9902648925781,540.0028882026672,332.95654296875]},{"page":89,"text":"gain situational awareness. Normally, the squadron tactical command post and main command post are","rect":[107.97364807128906,353.5338439941406,539.984678981781,344.480224609375]},{"page":89,"text":"operational to ensure continuous communications over extended distances within the squadron and to higher","rect":[107.97362518310547,364.9380798339844,540.0496512041092,355.88446044921877]},{"page":89,"text":"headquarters. Usually, the combat trains command post moves through the center of the zone along a route","rect":[107.97362518310547,376.4617614746094,540.0515124778748,367.40814208984377]},{"page":89,"text":"providing good movement laterally and in-depth. A unit, maintenance collection point is usually co-located","rect":[107.9736328125,387.9855041503906,540.0215649604797,378.931884765625]},{"page":89,"text":"with, or near the combat train’s command post. The combat train’s command post can promote security and","rect":[107.95372009277344,399.50921630859377,540.002583026886,390.4555969238281]},{"page":89,"text":"provide command and control of the unit, maintenance collection point, and role 1. The field trains of the","rect":[107.9338150024414,411.0130310058594,539.884093044281,401.97930908203127]},{"page":89,"text":"Cavalry squadron either co-locates with the brigade support battalion (BSB) or echelons in-depth behind the","rect":[107.92387390136719,422.556640625,540.0265490989685,413.5030212402344]},{"page":89,"text":"combat trains. Command posts and sustainment assets remain mobile and bound forward as the","rect":[107.92389678955078,433.9409484863281,540.034483669281,424.9072265625]},{"page":89,"text":"squadron advances.","rect":[107.92389678955078,445.46466064453127,186.262277841568,436.4309387207031]},{"page":89,"text":"4-57. The purpose of a forward passage of lines is to move forces forward to conduct operations. A forward","rect":[107.93385314941406,463.00421142578127,539.876118183136,453.9505920410156]},{"page":89,"text":"passage of lines ensures the maintenance of enemy contact while allowing the relief of previously committed","rect":[107.93385314941406,474.5279235839844,540.131245136261,465.47430419921877]},{"page":89,"text":"forces. The stationary force controls and secures the area of operations far enough to its front that the moving","rect":[107.93385314941406,486.05169677734377,539.989643573761,476.9980163574219]},{"page":89,"text":"force can pass through the stationary force and reform into a combat formation before contact with an enemy","rect":[107.93379974365235,497.5754089355469,539.9987378120422,488.52178955078127]},{"page":89,"text":"force. A forward passage of lines allows the Cavalry squadron or units conducting reconnaissance to avoid","rect":[107.93376159667969,508.9795837402344,539.9787793159485,499.92596435546877]},{"page":89,"text":"being harassed or assaulted with hostile intent by enemy forces as they begin operations. Forward or rearward","rect":[107.93376159667969,520.5033569335938,540.0095410346985,511.44970703125]},{"page":89,"text":"passage of lines can occur during any type of reconnaissance or security operations. (Refer to FM 3-90-2 for","rect":[107.93376159667969,532.027099609375,539.9986868486404,522.9734497070313]},{"page":89,"text":"more information.)","rect":[107.92379760742188,543.5308227539063,184.07795625782013,534.4971313476563]},{"page":89,"text":"4-58. Upon completion of the mission, the squadron proceeds with assigned follow-on missions. In the","rect":[107.91383361816406,561.0703735351563,540.023009059906,552.0167236328125]},{"page":89,"text":"absence of an assigned mission, typically, the squadron conducts security missions in the form of a screen or","rect":[107.91380310058594,572.5941772460938,539.9937430009842,563.54052734375]},{"page":89,"text":"guard along the LOA or to the flank of a supported unit. If the squadron encounters major enemy formations","rect":[107.91386413574219,583.9983520507813,539.9509781007766,574.9347534179688]},{"page":89,"text":"before the objective and do not find a gap or bypass, the squadron conducts a screen or guard, continues","rect":[107.91386413574219,595.5220947265625,540.0424087648391,586.45849609375]},{"page":89,"text":"reconnaissance, and prepares to pass main body forces forward.","rect":[107.91386413574219,607.0458374023438,362.879953622818,597.9921875]},{"page":89,"text":"AREA RECONNAISSANCE","rect":[90.0,632.2506103515625,264.72501627826696,622.5349731445313]},{"page":89,"text":"4-59. Area reconnaissance is a type of reconnaissance operation that focuses on obtaining detailed","rect":[108.0,652.5414428710938,540.043842792511,643.48779296875]},{"page":89,"text":"information about the terrain or enemy activity within a prescribed area (ADP 3-90). Area reconnaissance is","rect":[107.99998474121094,664.0651245117188,540.1454361085891,655.011474609375]},{"page":89,"text":"detailed reconnaissance in specific locations that answers PIRs and develops the situation to provide options","rect":[107.98999786376953,675.5689086914063,540.0248916749954,666.53515625]},{"page":89,"text":"to the commander. The commander assigns area reconnaissance when information on the enemy situation is","rect":[107.99004364013672,686.9930419921875,540.0510147218704,677.9393920898438]},{"page":89,"text":"more developed, when focused reconnaissance in the given area may yield specific information related to","rect":[107.98008728027344,698.5167846679688,540.0219311714172,689.463134765625]},{"page":89,"text":"terrain or decision points, or when more detailed information is required in a designated area. The area","rect":[107.98008728027344,710.0404663085938,540.0980212669373,700.98681640625]},{"page":89,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":89,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":89,"text":"4-13","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":90,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":90,"text":"targeted for reconnaissance may consist of a future friendly position, such as brigade support areas (BSAs)","rect":[90.0,83.50144958496094,521.9472952470779,74.44780731201172]},{"page":90,"text":"or position areas for artillery. Frequently, area reconnaissance is defined as an NAI or a TAI to focus the unit","rect":[90.0,95.02519226074219,522.1305133113862,85.97154998779297]},{"page":90,"text":"on a more specific area, such as a building, bridge, obstacle, or key terrain.","rect":[89.99996185302735,106.42936706542969,389.484201669693,97.37572479248047]},{"page":90,"text":"TASKS","rect":[72.0,123.74217224121094,104.86622428894043,115.65597534179688]},{"page":90,"text":"4-60. Area reconnaissance comprises the same tasks as zone reconnaissance. Based on time and the","rect":[90.0,143.72145080566407,522.1305530052185,134.68772888183595]},{"page":90,"text":"commander’s intent, the commander may direct reconnaissance for SIRs only. Like zone reconnaissance, the","rect":[89.99998474121094,155.26512145996095,522.1285388450623,146.2114715576172]},{"page":90,"text":"commander should provide focus to the unit in the commander’s intent within the OPORD and list the tasks","rect":[90.0,166.7688751220703,521.9104507570266,157.7351531982422]},{"page":90,"text":"in the specific instructions. Primary tasks","rect":[90.00003814697266,178.3125457763672,277.23109895038609,169.25889587402345]},{"page":90,"text":"conducted within capability and","rect":[284.1593017578125,178.3125457763672,425.700825214386,169.25889587402345]},{"page":90,"text":"associated with","rect":[432.7225646972656,176.30062866210938,498.30220460891726,169.25889587402345]},{"page":90,"text":"area","rect":[505.3240051269531,176.30068969726563,521.9888904075623,171.57965087890626]},{"page":90,"text":"reconnaissance are—","rect":[90.0,187.82431030273438,175.32035160064698,180.78257751464845]},{"page":90,"text":"","rect":[115.19999694824219,200.54112243652345,121.2058769197464,195.8135986328125]},{"page":90,"text":"","rect":[115.19999694824219,213.9811248779297,121.2058769197464,209.25360107421876]},{"page":90,"text":"","rect":[115.19999694824219,227.54112243652345,121.2058769197464,222.8135986328125]},{"page":90,"text":"","rect":[115.19999694824219,240.9811248779297,121.2058769197464,236.25360107421876]},{"page":90,"text":"","rect":[115.19999694824219,254.54112243652345,121.2058769197464,249.8135986328125]},{"page":90,"text":"Confirm or deny the commander’s PIRs.","rect":[133.1999969482422,203.2613983154297,295.8965857028961,194.20774841308595]},{"page":90,"text":"Determine the trafficability of all terrain in the area, including","rect":[133.1999969482422,216.70140075683595,381.4111523628235,207.6477508544922]},{"page":90,"text":"Find and report all enemy forces within the area.","rect":[133.1999969482422,230.2613983154297,327.92298340797427,221.20774841308595]},{"page":90,"text":"Reconnoiter specific terrain within the area.","rect":[133.1999969482422,243.6814727783203,308.87647461891177,234.6477508544922]},{"page":90,"text":"Report reconnaissance information.","rect":[133.1999969482422,257.2414855957031,275.72754883766177,248.20774841308595]},{"page":90,"text":"built-up areas.","rect":[383.9927978515625,216.6814727783203,441.2110388278961,207.6477508544922]},{"page":90,"text":"4-61.","rect":[89.99351501464844,272.74920654296877,110.95931458473206,265.90667724609377]},{"page":90,"text":"Other area reconnaissance tasks include the following:","rect":[115.19231414794922,274.7810363769531,333.6180621395111,265.7274169921875]},{"page":90,"text":" Inspect and classify all bridges within the area.","rect":[115.19999694824219,288.2214050292969,320.97684693336489,279.16778564453127]},{"page":90,"text":" Locate fords or crossing sites near all bridges within the area.","rect":[115.19999694824219,301.6614074707031,379.04468750953677,292.6077880859375]},{"page":90,"text":" Inspect and classify all overpasses, underpasses, defiles, and culverts.","rect":[115.19999694824219,315.2214050292969,411.45353150367739,306.16778564453127]},{"page":90,"text":" Locate and clear all mines, obstacles, and barriers in the area.","rect":[115.19999694824219,327.0,378.96814942359927,319.6077880859375]},{"page":90,"text":" Locate bypasses around built-up areas.","rect":[115.19999694824219,342.2214050292969,288.45548462867739,333.16778564453127]},{"page":90,"text":" Locate and determine the extent of all contamination in the area, as well as bypasses around","rect":[115.19999694824219,355.6614074707031,521.981586933136,346.6077880859375]},{"page":90,"text":"contaminated areas.","rect":[133.20994567871095,365.2927551269531,212.6339819431305,358.25103759765627]},{"page":90,"text":" Locate any bypasses for existing obstacles in the area that cannot be cleared.","rect":[115.19999694824219,380.74139404296877,439.5297338962555,371.6877746582031]},{"page":90,"text":"BCT PLANNING CONSIDERATIONS","rect":[72.0,404.0880126953125,241.8975887298584,395.7960205078125]},{"page":90,"text":"4-62. The planning considerations for area reconnaissance at the BCT are the same as for zone","rect":[90.0,424.0614013671875,522.1058337669373,415.0077819824219]},{"page":90,"text":"reconnaissance. The BCT commander provides focus within the area and the reconnaissance tempo. The","rect":[90.0,435.5652160644531,522.089903591156,426.531494140625]},{"page":90,"text":"BCT commander also provides the reconnaissance objective and the engagement/disengagement criteria for","rect":[89.98999786376953,447.1088562011719,522.0588675127029,438.0452575683594]},{"page":90,"text":"the maneuver to the reconnaissance objective.","rect":[89.99008178710938,458.5130310058594,273.92142701148989,449.4494323730469]},{"page":90,"text":"CAVALRY SQUADRON PLANNING CONSIDERATIONS","rect":[72.0,483.38641357421877,324.56769371032717,473.5560302734375]},{"page":90,"text":"4-63. The planning considerations for area reconnaissance at the squadron level are the same as for zone","rect":[90.0,501.8214111328125,522.0927112083435,492.7677917480469]},{"page":90,"text":"reconnaissance, with some unique considerations. In area reconnaissance, the squadron’s IPB analysis","rect":[89.99000549316406,513.3451538085938,522.0388076906204,504.29150390625]},{"page":90,"text":"determines the speed, formations, and movement techniques used to travel to the area. Depending on the size","rect":[89.9899673461914,524.868896484375,522.0987536888123,515.8152465820313]},{"page":90,"text":"of the area, the commander decides the appropriate size force required to reconnoiter the objective. En route","rect":[89.9899673461914,536.3926391601563,521.9691760520935,527.3290405273438]},{"page":90,"text":"to or inside the area, the squadron establishes control measures as in zone reconnaissance (see figure 4-2).","rect":[89.99004364013672,547.9163208007813,513.7980139255524,538.8626708984375]},{"page":90,"text":"4-64. If another unit occupies an AA, the squadron reconnoiters avenues of approach and mobility corridors","rect":[89.99000549316406,565.3164672851563,522.1434829835891,556.2628173828125]},{"page":90,"text":"leading to the area to support that force. That squadron can secure the area initially; until the unit’s quartering","rect":[89.9900131225586,576.8401489257813,522.0478100776672,567.7864990234375]},{"page":90,"text":"parties arrive. The squadron continues with assigned missions or moves to screen that force as it conducts","rect":[89.99000549316406,588.3638916015625,522.1354873781204,579.3102416992188]},{"page":90,"text":"AA operations. Upon completion of reconnaissance, the troop or squadron departs the area along a different route.","rect":[89.98005676269531,599.8876342773438,521.9552099704742,590.833984375]},{"page":90,"text":"4-65. The squadron establishes control measures for area reconnaissance in the same manner as for zone","rect":[89.98005676269531,617.3872680664063,522.0827014427185,608.3535766601563]},{"page":90,"text":"reconnaissance. The squadron designates the area to reconnoiter with a continuous closed line, usually","rect":[89.98001861572266,628.9309692382813,522.0388379096985,619.8773193359375]},{"page":90,"text":"depicted as an NAI.","rect":[89.97998046875,640.315185546875,169.51954102516175,631.281494140625]},{"page":90,"text":"4-66. The key distinction between zone and area reconnaissance is not which echelon can conduct either","rect":[89.97998046875,657.8547973632813,522.0398245439529,648.8011474609375]},{"page":90,"text":"task, or the size of the area or zone to be reconnoitered. The key distinctions, instead, rely on the amount of","rect":[89.97002410888672,669.3785400390625,522.0350027666092,660.3248901367188]},{"page":90,"text":"information known about the enemy and operational environment, as well as the amount of risk the","rect":[89.96019744873047,680.9022216796875,522.0717761497498,671.8485717773438]},{"page":90,"text":"commander is willing to accept. Therefore, the commander might accept risk moving to the NAI or TAI to","rect":[89.97013854980469,692.4259643554688,521.8858227729797,683.372314453125]},{"page":90,"text":"maximize the amount of time the unit can conduct the area reconnaissance. Whereas, in zone reconnaissance,","rect":[89.97013854980469,702.0,521.9582006931305,694.7764892578125]},{"page":90,"text":"4-14","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":90,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":90,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":91,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":91,"text":"the unit would deploy into a maneuver formation at the LD and conduct reconnaissance throughout the zone","rect":[108.0,83.50144958496094,540.0936267356873,74.44780731201172]},{"page":91,"text":"to mitigate the risk incurred by not understanding the enemy situation.","rect":[107.99002838134766,95.02519226074219,389.34705567359927,85.97154998779297]},{"page":91,"text":"Figure 4-2. SBCT area reconnaissance","rect":[223.79495239257813,501.1640930175781,405.9424231071472,491.8315734863281]},{"page":91,"text":"ROUTE RECONNAISSANCE","rect":[90.0,526.5305786132813,274.870295208931,516.81494140625]},{"page":91,"text":"4-67. Route reconnaissance is a type of reconnaissance operation to obtain detailed information of a","rect":[108.0,546.8214111328125,539.9901111106873,537.7677612304688]},{"page":91,"text":"specified route and all terrain from which the enemy could influence movement along that route (ADP 3-90).","rect":[108.0,558.3451538085938,540.087717294693,549.29150390625]},{"page":91,"text":"A route may include a road, highway, trail, tunnel, bridge, and ferry. Routes include a designated start point","rect":[108.0,569.8688354492188,540.1225787410737,560.815185546875]},{"page":91,"text":"and end point. Reconnaissance of a route is essential when intelligence indicates a probability of enemy","rect":[107.99004364013672,581.392578125,540.0478100776672,572.3389282226563]},{"page":91,"text":"contact or obstacle along the route, or in the area and surrounding terrain, or when information concerning","rect":[107.99002838134766,592.9163208007813,540.0418286323547,583.8626708984375]},{"page":91,"text":"the surrounding, influential terrain is vague or unknown. The commander assigns route reconnaissance either","rect":[107.99000549316406,604.4400024414063,540.0886526689529,595.3863525390625]},{"page":91,"text":"as a discrete operation or as an implied task during zone reconnaissance. Units collect information about","rect":[107.99000549316406,615.8441772460938,540.0718585262299,606.79052734375]},{"page":91,"text":"roads, bridges, tunnels, fords, waterways, and other natural and artificial terrain features that can affect","rect":[107.9701156616211,627.367919921875,540.0249224910737,618.3142700195313]},{"page":91,"text":"mobility. Route reconnaissance provides commanders with more detailed information about the route and","rect":[107.98007202148438,638.8916625976563,540.0508618354797,629.8380126953125]},{"page":91,"text":"terrain that can influence the unit. Commanders use this information to prevent surprise, determine","rect":[107.99000549316406,650.3953857421875,540.0836780052185,641.3616943359375]},{"page":91,"text":"trafficability for follow-on forces, and confirm or deny staff estimates and assumptions made during the","rect":[107.99002838134766,661.9390869140625,540.0856311302185,652.8854370117188]},{"page":91,"text":"operations process. Route reconnaissance is not to be confused with route classification, which can be","rect":[107.99002838134766,673.4428100585938,540.1029651145935,664.4091186523438]},{"page":91,"text":"included in route reconnaissance. Typically, engineer reconnaissance platoons perform a route classification,","rect":[107.99002838134766,684.8670043945313,539.8446753025055,675.8133544921875]},{"page":91,"text":"which requires technical measurements and analysis.","rect":[107.99996185302735,696.3906860351563,319.6769506931305,687.3370361328125]},{"page":91,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":91,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":91,"text":"4-15","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":92,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":92,"text":"TASKS","rect":[72.0,83.30223083496094,104.86622428894043,75.21603393554688]},{"page":92,"text":"4-68. Certain tasks are required during route reconnaissance, unless otherwise directed by the higher","rect":[90.0,103.30143737792969,522.0897513017654,94.24779510498047]},{"page":92,"text":"commander. These tasks are not a checklist or arranged sequentially, as some may not be necessary for","rect":[90.00000762939453,114.82518005371094,521.9684134111404,105.77153778076172]},{"page":92,"text":"mission accomplishment. If time is limited, the commander directs reconnaissance for SIRs. The tasks","rect":[90.00000762939453,126.20943450927735,522.1633194093704,117.17571258544922]},{"page":92,"text":"conducted within capability and associated with route reconnaissance are—","rect":[89.9899673461914,137.7530975341797,392.77198123931887,128.69944763183595]},{"page":92,"text":" Find, report, and clear all enemy forces that can influence movement along the route in accordance","rect":[115.19999694824219,151.18138122558595,522.100157497406,142.1277313232422]},{"page":92,"text":"with engagement criteria.","rect":[133.1999969482422,162.8246307373047,235.170480966568,153.77098083496095]},{"page":92,"text":" Reconnoiter and determine the trafficability of the route.","rect":[115.19999694824219,176.2613983154297,359.83683228492739,167.20774841308595]},{"page":92,"text":" Reconnoiter all terrain the enemy can use to influence movement along the route, such as choke","rect":[115.19999694824219,189.70140075683595,522.0950915794373,180.6477508544922]},{"page":92,"text":"points, ambush sites, and pickup, landing, and drop zones.","rect":[133.1999969482422,201.2251434326172,366.3337194919586,192.17149353027345]},{"page":92,"text":" Reconnoiter all built-up areas along the route.","rect":[115.19999694824219,214.66136169433595,316.88428711891177,205.6077117919922]},{"page":92,"text":" Reconnoiter all lateral routes.","rect":[115.19999694824219,226.20944213867188,251.48192811012269,219.16770935058595]},{"page":92,"text":" Locate bypasses around built-up and contaminated areas.","rect":[115.19999694824219,241.66136169433595,361.785959482193,232.6077117919922]},{"page":92,"text":" Inspect and classify all bridges within the area.","rect":[115.19999694824219,255.2213592529297,320.96790528297427,246.16770935058595]},{"page":92,"text":" Reconnoiter defiles along the route. Clear them of enemy and obstacles, or locate a bypass.","rect":[115.19999694824219,268.6613464355469,497.845529794693,259.60772705078127]},{"page":92,"text":" Locate fords or crossing sites near all bridges on the route.","rect":[115.19999694824219,282.2214050292969,367.40345215797427,273.16778564453127]},{"page":92,"text":" Inspect and classify all overpasses, underpasses, and culverts.","rect":[115.19999694824219,295.6614074707031,379.7658483982086,286.6077880859375]},{"page":92,"text":" Locate and clear all mines and barriers on the route, and locate bypasses around any obstacles that","rect":[115.19999694824219,309.2214050292969,522.0099688777924,300.16778564453127]},{"page":92,"text":"cannot be cleared.","rect":[133.1999969482422,318.73321533203127,205.78251099586488,311.6914978027344]},{"page":92,"text":" Submit route report.","rect":[115.19999694824219,334.1614990234375,214.17479920387269,325.1277770996094]},{"page":92,"text":"BCT PLANNING CONSIDERATIONS","rect":[72.0,357.64801025390627,241.8975887298584,349.35601806640627]},{"page":92,"text":"4-69. The BCT commander assigns a route reconnaissance mission when plans call for using a specific route","rect":[90.0,377.5013732910156,522.1105945091248,368.44775390625]},{"page":92,"text":"for friendly movement. The planning considerations for route reconnaissance at brigade level are the same","rect":[90.00003814697266,389.02508544921877,521.9876697044373,379.9714660644531]},{"page":92,"text":"as for zone reconnaissance, with additional considerations. BCT commanders assign the Cavalry squadron a","rect":[90.0,400.5487976074219,522.105772731781,391.49517822265627]},{"page":92,"text":"single route along the length or width of the area of operations or along multiple, geographically separate","rect":[90.0,412.0725402832031,522.099669216156,403.0189208984375]},{"page":92,"text":"routes, albeit commanders seldom assign single routes to squadrons. The squadron can establish its own","rect":[89.99008178710938,423.59625244140627,521.9343457221985,414.5426330566406]},{"page":92,"text":"routes with different functions. Commanders can add those functions as objectives to specify different types","rect":[89.98999786376953,435.1199645996094,522.1338394289016,426.0563659667969]},{"page":92,"text":"of routes. Examples of such routes are portrayed in figure 4-3 and figure 5-4 (page 5-19). The BCT","rect":[89.99004364013672,446.524169921875,521.9552499647141,437.4705505371094]},{"page":92,"text":"commander provides focus, reconnaissance tempo, and engagement and disengagement criteria as they relate","rect":[89.98005676269531,458.0478820800781,521.8685901145935,448.9942626953125]},{"page":92,"text":"to the main body considerations for reconnaissance or battle handover.","rect":[89.98008728027344,469.5716247558594,372.90482544898989,460.51800537109377]},{"page":92,"text":"CAVALRY SQUADRON PLANNING CONSIDERATIONS","rect":[72.0,494.4263916015625,324.5876216888428,484.59600830078127]},{"page":92,"text":"4-70. The planning considerations for route reconnaissance at the squadron level are the same as for zone","rect":[90.0,512.8613891601563,522.092833278656,503.8077697753906]},{"page":92,"text":"reconnaissance, with some unique considerations. When a squadron conducts route reconnaissance of a","rect":[89.98999786376953,524.3651733398438,522.1285998802185,515.3314819335938]},{"page":92,"text":"single route, one troop acts as the main reconnaissance unit with the other troops operating abreast on the","rect":[89.99004364013672,535.9088745117188,522.0451037864685,526.855224609375]},{"page":92,"text":"flanks to reconnoiter terrain features that dominate or influence the main route. When deciding how much","rect":[89.99004364013672,547.3130493164063,522.0012402534485,538.2593994140625]},{"page":92,"text":"terrain on each flank of the route to reconnoiter, the commander determines possible danger areas and the","rect":[89.99004364013672,558.8367919921875,522.0937488059998,549.7831420898438]},{"page":92,"text":"nature of the potential threat. The squadron then determines the task organization and command relationships","rect":[89.99004364013672,570.3605346679688,522.1566055421829,561.306884765625]},{"page":92,"text":"of any combined arms attachments, based on the IPB and mission analysis.","rect":[89.99004364013672,581.8842163085938,390.19532227516177,572.83056640625]},{"page":92,"text":"4-71. When the squadron conducts route reconnaissance of multiple routes whereon enemy contact is","rect":[89.99004364013672,599.4038696289063,522.1564224367141,590.3502197265625]},{"page":92,"text":"probable, a troop conducts reconnaissance of one route while the other troops secure their flanks. If contact","rect":[89.99004364013672,610.9075927734375,521.9854327449799,601.8739013671875]},{"page":92,"text":"is unlikely, the troop may reconnoiter with assigned scout platoons through multiple routes, which must be","rect":[89.99004364013672,622.331787109375,522.0827014427185,613.2781372070313]},{"page":92,"text":"close enough together for the troop commander to control the operation. Integrated air and ground","rect":[89.98005676269531,633.8555297851563,522.0152173042297,624.8018798828125]},{"page":92,"text":"reconnaissance provides for faster and more complete reconnaissance. The squadron establishes control","rect":[89.98005676269531,645.3592529296875,522.0073443660737,636.3255615234375]},{"page":92,"text":"measures for route reconnaissance by creating an area of operations for the unit conducting reconnaissance.","rect":[89.98005676269531,656.9028930664063,521.9601538181305,647.8492431640625]},{"page":92,"text":"The commander places lateral boundaries on both sides of the route far enough out to allow reconnaissance","rect":[89.98001861572266,668.4266357421875,521.951475856781,659.3729858398438]},{"page":92,"text":"of all terrain from which the enemy could influence movement along the route. An LD is placed","rect":[89.98001861572266,679.8308715820313,522.1357007026672,670.7772216796875]},{"page":92,"text":"perpendicularly to the route, and at a starting point at the beginning of the route. Figure 4-3 illustrates a start","rect":[89.98001861572266,691.3545532226563,521.9807940731049,682.3009033203125]},{"page":92,"text":"point. The LD creates the rear boundary of the area of operations. The commander then places an LOA far","rect":[89.9801025390625,702.8782958984375,522.0599051103592,693.8246459960938]},{"page":92,"text":"enough beyond the route’s release point to include terrain from which the enemy could influence the route.","rect":[89.98007202148438,714.4020385742188,522.049143075943,705.348388671875]},{"page":92,"text":"4-16","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":92,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":92,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":93,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":93,"text":"The start and release points define that section of the route where the unit collects detailed information. The","rect":[108.0,83.48152923583985,540.0996081809998,74.44780731201172]},{"page":93,"text":"commander places PLs and checkpoints to maintain coordinated reconnaissance, control movement and","rect":[108.00003814697266,95.0052719116211,540.098774433136,85.97154998779297]},{"page":93,"text":"maneuver, or designate critical points. The commander places additional control measures to coordinate","rect":[108.00999450683594,106.42936706542969,540.2410876731873,97.37572479248047]},{"page":93,"text":"indirect and direct fire, as necessary (see figure 4-3). ","rect":[108.00997161865235,117.95310974121094,320.974680185318,108.89946746826172]},{"page":93,"text":"Figure 4-3. SBCT route reconnaissance mission","rect":[201.36505126953126,536.21337890625,428.4599496717453,526.7713012695313]},{"page":93,"text":"PLANNING AND EXECUTION CONSIDERATIONS","rect":[90.0,559.6080322265625,317.3775997161865,551.3159790039063]},{"page":93,"text":"4-72. The commander integrates ground, air, and other technical assets to allow for either faster or more","rect":[108.0,579.5814208984375,540.201231716156,570.5277709960938]},{"page":93,"text":"detailed route reconnaissance. The commander orders aerial reconnaissance if the squadron must complete","rect":[107.99996185302735,591.085205078125,540.1228015403748,582.051513671875]},{"page":93,"text":"the reconnaissance mission quickly. When time is limited, aerial reconnaissance is essential in determining","rect":[107.99996185302735,602.6288452148438,540.0428051948547,593.5751953125]},{"page":93,"text":"areas clear of enemy forces and obstacles and in cueing ground reconnaissance about where to focus efforts.","rect":[107.99998474121094,614.0330200195313,540.0926611423492,604.9793701171875]},{"page":93,"text":"4-73. The commander establishes priorities of fire and indirect fire control measures if enemy contact is","rect":[107.99998474121094,631.5526733398438,540.0211685304641,622.4990234375]},{"page":93,"text":"possible or expected. The squadron considers built-up areas, protected sites, and civilians in both the planning","rect":[107.99998474121094,643.076416015625,540.054829120636,634.0227661132813]},{"page":93,"text":"and execution of indirect fires.","rect":[107.99996185302735,652.5881958007813,230.4870092868805,645.5465087890625]},{"page":93,"text":"4-74. If the commander requires detailed information on a route, ERTs can conduct deliberate","rect":[107.99996185302735,672.099853515625,540.1135241966248,663.066162109375]},{"page":93,"text":"reconnaissance of critical points along the route more quickly and accurately than route reconnaissance","rect":[107.99992370605469,683.6434936523438,540.1145007591248,674.58984375]},{"page":93,"text":"conducted by a Cavalry unit. If the commander anticipates significant obstacles or is required to determine a","rect":[107.99992370605469,695.0477294921875,540.1027820091248,685.9940795898438]},{"page":93,"text":"hasty classification of bridges, fords, ferry sites, and tunnels, engineers are normally task organized to","rect":[107.9899673461914,706.5714111328125,540.0547680854797,697.5177612304688]},{"page":93,"text":"the squadron.","rect":[107.9899673461914,718.0751953125,161.95922303199769,709.04150390625]},{"page":93,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":93,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":93,"text":"4-17","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":94,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":94,"text":"4-75. If CBRN contamination is expected, CBRN reconnaissance assets should accompany the force","rect":[90.0,83.50144958496094,522.1378161888123,74.44780731201172]},{"page":94,"text":"conducting ground reconnaissance. They can detect, identify, and locate CBRN hazards more accurately and","rect":[90.00000762939453,95.02519226074219,521.9552807807922,85.97154998779297]},{"page":94,"text":"quickly than organic Cavalry units.","rect":[90.0,106.42936706542969,230.854318857193,97.37572479248047]},{"page":94,"text":"RECONNAISSANCE IN FORCE","rect":[72.0,131.73056030273438,275.10961405658727,122.01487731933594]},{"page":94,"text":"4-76. Reconnaissance in force is a type of reconnaissance operation designed to discover or test the enemy’s","rect":[90.0,152.0214080810547,522.0468032960891,142.96775817871095]},{"page":94,"text":"strength, dispositions, and reactions or to obtain other information (ADP 3-90). Usually, reconnaissance in","rect":[90.00000762939453,163.54515075683595,522.0717968940735,154.4915008544922]},{"page":94,"text":"force is a limited objective operation conducted by a battalion-sized TF, Cavalry squadron, or larger force.","rect":[90.00003814697266,175.06883239746095,522.0847265720367,166.00523376464845]},{"page":94,"text":"The commander assigns reconnaissance in force when the enemy is operating within a specific area and the","rect":[89.99011993408203,186.5925750732422,522.1290271263123,177.53892517089845]},{"page":94,"text":"commander cannot obtain adequate intelligence by other means. Reconnaissance in force is an aggressive","rect":[89.99011993408203,198.1162567138672,522.0917346458435,189.06260681152345]},{"page":94,"text":"reconnaissance, which develops information and intelligence in contact with the enemy to determine and","rect":[89.99011993408203,209.63999938964845,521.991352558136,200.5863494873047]},{"page":94,"text":"exploit enemy weaknesses. The commander plans for both the retrograde and reinforcement of the friendly","rect":[89.98016357421875,221.0442352294922,522.038959980011,211.99058532714845]},{"page":94,"text":"force (in case it should encounter superior enemy forces) and for the exploitation of its success.","rect":[89.98016357421875,232.5679168701172,471.42322754859927,223.51426696777345]},{"page":94,"text":"4-77. During reconnaissance in force, the subordinate elements of the Cavalry unit conduct offensive tasks","rect":[89.98016357421875,250.0875701904297,522.0212295656204,241.03392028808595]},{"page":94,"text":"and zone, area, and route reconnaissance operations. The Cavalry squadron often conducts reconnaissance in","rect":[89.99012756347656,261.6112365722656,522.050922870636,252.55760192871095]},{"page":94,"text":"force in advance of a BCT movement to contact in order to allow the main body freedom of maneuver and","rect":[89.99010467529297,273.1349792480469,522.160542011261,264.08135986328127]},{"page":94,"text":"mass combat power.","rect":[89.99010467529297,284.6387939453125,170.83542847633363,275.6050720214844]},{"page":94,"text":"4-78. BCT commanders order squadrons to conduct reconnaissance in force as a stand-alone operation or as","rect":[89.99010467529297,302.0389099121094,522.1452530031204,293.00518798828127]},{"page":94,"text":"the lead in conjunction with a brigade attack. Based upon enemy composition and other METT-TC (I)","rect":[89.98999786376953,313.5825500488281,522.1743460283279,304.5189514160156]},{"page":94,"text":"variables, the Cavalry squadron may require augmentation with maneuver and fires elements to conduct","rect":[89.98005676269531,325.1062927246094,522.1136676082612,316.05267333984377]},{"page":94,"text":"reconnaissance in force as a stand-alone operation. Cavalry forces need to retain freedom of maneuver while","rect":[89.98006439208985,336.6299743652344,521.9745471458435,327.57635498046877]},{"page":94,"text":"conducting tasks during reconnaissance in force operations.","rect":[89.97010040283203,348.1537170410156,328.6207983493805,339.10009765625]},{"page":94,"text":"TASKS","rect":[72.0,371.4222106933594,104.86622428894043,363.33599853515627]},{"page":94,"text":"4-79.","rect":[90.0,389.28948974609377,110.96579957008362,382.4270324707031]},{"page":94,"text":"Tasks for reconnaissance in force include the following:","rect":[115.19880676269531,391.3013916015625,339.96614563560487,382.2477722167969]},{"page":94,"text":" Penetrate the enemy’s security area, and determine its size and depth.","rect":[115.19999694824219,404.74139404296877,410.96741700172427,395.6877746582031]},{"page":94,"text":" Determine the location and disposition of enemy forces.","rect":[115.19999694824219,418.3013916015625,357.6873571872711,409.2477722167969]},{"page":94,"text":" Attack enemy positions, and attempt to force the enemy to react by using local reserves or major","rect":[115.19999694824219,431.74139404296877,521.9429007158279,422.67779541015627]},{"page":94,"text":"counterattack forces, employing fires and specific weapons systems, and adjusting positions.","rect":[133.20001220703126,443.3846435546875,503.97095704078677,434.321044921875]},{"page":94,"text":" Determine weaknesses in the enemy’s disposition to exploit.","rect":[115.19999694824219,456.8214111328125,375.3276159763336,447.7677917480469]},{"page":94,"text":" Locate obstacles, and create lanes as specified.","rect":[115.19999694824219,470.24151611328127,320.39518189430239,461.2077941894531]},{"page":94,"text":" Enter areas of operations in complex terrain not previously occupied by friendly forces, such as","rect":[115.19999694824219,483.8214111328125,522.0244644289016,474.7677917480469]},{"page":94,"text":"urban environments.","rect":[133.1999969482422,493.3332214355469,215.48853516578675,486.29150390625]},{"page":94,"text":"PLANNING CONSIDERATIONS","rect":[72.0,518.6880493164063,214.88809776306153,510.3960266113281]},{"page":94,"text":"4-80. The planning considerations for reconnaissance in force are the same as for zone reconnaissance. The","rect":[90.0,538.6614379882813,522.000059841156,529.6077880859375]},{"page":94,"text":"control measures of reconnaissance in force are the same as for offensive tasks. (Refer to ADP 3-90 for","rect":[90.01000213623047,550.1651611328125,522.0777884111404,541.1314697265625]},{"page":94,"text":"more information.)","rect":[90.00999450683594,561.6889038085938,166.1651602373123,552.6552124023438]},{"page":94,"text":"SPECIAL RECONNAISSANCE","rect":[72.0,587.0105590820313,267.67687479877477,577.294921875]},{"page":94,"text":"4-81. Special reconnaissance is characterized as reconnaissance and surveillance actions conducted as a","rect":[90.0,607.281494140625,522.1657702903748,598.247802734375]},{"page":94,"text":"special operation in hostile, denied, or diplomatically and/or politically sensitive environments to collect or","rect":[90.0,618.7056274414063,522.0518484697342,609.6519775390625]},{"page":94,"text":"verify information of strategic or operational significance, employing military capabilities not normally","rect":[89.99006652832031,630.2293090820313,522.0508618354797,621.1756591796875]},{"page":94,"text":"found in conventional forces (JP 3-05). Special reconnaissance tasks support the collection of the joint TF","rect":[89.99006652832031,641.7530517578125,522.1194250602722,632.689453125]},{"page":94,"text":"commander’s PIRs. A special operations liaison may provide a responsive reporting capability in situations","rect":[89.9801025390625,653.2767944335938,521.9873550539016,644.22314453125]},{"page":94,"text":"wherein the special operations TF commander has been requested to collect intelligence information that","rect":[89.9800796508789,664.8004760742188,522.0987139949799,655.746826171875]},{"page":94,"text":"supports the intelligence requirements of a conventional force commander.","rect":[89.98008728027344,676.2047119140625,389.7074682712555,667.1510620117188]},{"page":94,"text":"4-82. An SOF element conducting special reconnaissance supports the joint TF commander’s overall","rect":[89.98008728027344,693.724365234375,522.1126300106049,684.6607666015625]},{"page":94,"text":"information collection efforts. The SOF element does not suspend or alter their collection efforts to support","rect":[89.98008728027344,705.2280883789063,522.0966998348237,696.1943969726563]},{"page":94,"text":"another collection plan unless the joint TF commander directs them to do so. SOF are equipped and possess","rect":[89.98011016845703,716.7717895507813,521.8964126710891,707.7081909179688]},{"page":94,"text":"4-18","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":94,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":94,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":95,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":95,"text":"capabilities to conduct reconnaissance on denied and hostile areas normally inaccessible to other forces or","rect":[108.0,83.50144958496094,539.9764700517654,74.44780731201172]},{"page":95,"text":"assets. Special reconnaissance activities include—","rect":[108.0,95.0052719116211,309.3942346572876,85.97154998779297]},{"page":95,"text":" Environmental reconnaissance.","rect":[133.1999969482422,106.4494857788086,276.228830575943,99.40776824951172]},{"page":95,"text":" Armed reconnaissance.","rect":[133.1999969482422,119.88948822021485,244.54410767555238,112.84777069091797]},{"page":95,"text":" Target and threat assessment.","rect":[133.1999969482422,135.46141052246095,268.909250497818,126.40776824951172]},{"page":95,"text":" Post-strike reconnaissance.","rect":[133.1999969482422,146.88949584960938,259.54187989234927,139.84776306152345]},{"page":95,"text":"4-83. Commanders establish mutual liaison capacity within both the brigade and SOF to understand","rect":[107.99351501464844,166.4210662841797,540.054340839386,157.36741638183595]},{"page":95,"text":"collection task prioritization and to understand associated reporting requirements and mechanisms. Special","rect":[107.99349975585938,177.9447479248047,540.0963946590424,168.89109802246095]},{"page":95,"text":"reconnaissance may occur prior to conventional forces entering a designated area of operations. Commanders","rect":[107.99349975585938,189.46849060058595,540.1469619874954,180.4148406982422]},{"page":95,"text":"and staffs must understand when, where, and why special reconnaissance operations are being conducted to","rect":[107.99349975585938,200.9922332763672,540.0385937690735,191.93858337402345]},{"page":95,"text":"establish unity of purpose and provide any necessary additional forces. Detailed coordination is imperative","rect":[107.99349975585938,212.5159149169922,540.0782458763123,203.46226501464845]},{"page":95,"text":"between SOF and conventional elements in order to support the operational element appropriately. (Refer to","rect":[107.98358917236328,224.03965759277345,539.9319043159485,214.9860076904297]},{"page":95,"text":"ATP 3-18.4 for more information on special reconnaissance.)","rect":[107.98362731933594,235.4239044189453,353.69683748340608,226.3901824951172]},{"page":95,"text":"4-84. Electromagnetic reconnaissance (ER) is the detection, location, identification, and evaluation of","rect":[107.97369384765625,252.96348571777345,540.0544729814529,243.9098358154297]},{"page":95,"text":"foreign electromagnetic radiations (energy) (JP 3-85). Electromagnetic reconnaissance is an action used to","rect":[107.97367858886719,264.4872131347656,540.0515332221985,255.43357849121095]},{"page":95,"text":"support information collection and is an element of the tactical task reconnaissance. Information obtained","rect":[107.97367858886719,275.9909973144531,539.987934589386,266.957275390625]},{"page":95,"text":"through electromagnetic reconnaissance assists the commander with situational understanding and","rect":[107.97367858886719,287.5346374511719,540.0525708198547,278.48101806640627]},{"page":95,"text":"decision-making. (See FM 3-12 for more information on ER.)","rect":[107.97367858886719,299.0583190917969,355.5992117509842,290.00469970703127]},{"page":95,"text":"SECTION III – RECONNAISSANCE HANDOVER","rect":[99.36000061035156,322.9440002441406,365.5440048828125,314.0639953613281]},{"page":95,"text":"4-85. A reconnaissance handover is the action that occurs between two elements to coordinate the","rect":[108.0,344.28948974609377,540.0448596458435,337.4071350097656]},{"page":95,"text":"transfer of information and responsibility for observation of potential threat contact, or the transfer","rect":[108.0,357.7055969238281,540.076964138031,348.81134033203127]},{"page":95,"text":"of an assigned area from one element to another. A reconnaissance handover occurs between the BCT","rect":[108.0,369.22930908203127,539.8497201795578,360.1756896972656]},{"page":95,"text":"and other BCTs, SOF, foreign military forces, civilian agencies and organizations, or indigenous persons. A","rect":[108.0,380.7530212402344,540.1146429767608,371.69940185546877]},{"page":95,"text":"reconnaissance handover occurs between the BCT’s Cavalry squadron and battalion scouts, as well as","rect":[108.0,392.2767639160156,540.1703994874954,383.22314453125]},{"page":95,"text":"maneuver battalions. Reconnaissance handovers could occur between manned and unmanned elements, like","rect":[108.00999450683594,403.31243896484377,539.9960925559998,394.7468566894531]},{"page":95,"text":"the ACS.","rect":[108.01994323730469,413.3222351074219,144.59301209449769,406.27056884765627]},{"page":95,"text":"PLANNING CONSIDERATIONS","rect":[90.0,433.5306091308594,295.9036520881653,423.8008728027344]},{"page":95,"text":"4-86. Reconnaissance and security operations require the unit conducting the handover to coordinate with","rect":[108.0,453.8214111328125,539.9011425971985,444.7677917480469]},{"page":95,"text":"higher, lower, and adjacent units. Planning for these operations requires the reconnaissance handover","rect":[108.0,465.3451232910156,540.0741873369217,456.2815246582031]},{"page":95,"text":"coordination to start at the higher echelons and execute at the lowest element. A reconnaissance handover","rect":[108.0,476.8688659667969,540.0837088212967,467.81524658203127]},{"page":95,"text":"ensures information requirements are transferred between units to maintain initiative and tempo and to ease","rect":[108.00991821289063,488.3726806640625,540.104552028656,479.3389587402344]},{"page":95,"text":"transitions. Well-planned and executed reconnaissance handovers ease transitions in plans, phases, and","rect":[108.00991821289063,499.8963928222656,540.0847363471985,490.8626708984375]},{"page":95,"text":"priorities of effort and mitigate information gaps between units.","rect":[108.0198745727539,511.32049560546877,362.62134766578677,502.2668762207031]},{"page":95,"text":"4-87. Planning for a reconnaissance handover takes place as part of a change of mission before or during","rect":[108.01988220214844,528.8401489257813,540.1626172065735,519.7864990234375]},{"page":95,"text":"operations. When planning before an operation, commanders review the completed plan for layered,","rect":[108.01988220214844,540.3638916015625,540.1098730564117,531.3102416992188]},{"page":95,"text":"redundant reconnaissance and security, using all available capabilities and units. Commanders and staff direct","rect":[108.01988220214844,551.8875732421875,540.1703692684174,542.8339233398438]},{"page":95,"text":"control measures, such as a reconnaissance handover line between units or potential designated coordination,","rect":[108.01988983154297,563.4113159179688,540.1157324314117,554.357666015625]},{"page":95,"text":"points to facilitate ground linkup, along with other graphic control measures that aid in command and control.","rect":[108.00993347167969,574.9349975585938,540.1046240329742,565.88134765625]},{"page":95,"text":"A reconnaissance handover line is a designated phase line on the ground where reconnaissance","rect":[108.01000213623047,586.3392333984375,539.8944690208435,577.4449462890625]},{"page":95,"text":"responsibility transitions from one element to another.","rect":[108.01991271972656,597.8629760742188,339.94849610328677,588.9686889648438]},{"page":95,"text":"4-88. A reconnaissance handover is typically associated with a trigger, a coordination point, or PLs","rect":[108.01991271972656,615.3826293945313,540.0479019289016,606.3289794921875]},{"page":95,"text":"designated as the reconnaissance handover line to ensure positive control and chain of custody from the initial","rect":[108.01991271972656,626.9063110351563,540.0241900691987,617.8526611328125]},{"page":95,"text":"force to the force assuming responsibility and control. A reconnaissance handover prevents gaps or seams","rect":[108.01990509033203,638.4300537109375,540.1654556398391,629.3764038085938]},{"page":95,"text":"from emerging that the enemy can exploit. Once handover is complete, the force transferring control either","rect":[108.02987670898438,649.834228515625,540.0840750322342,640.7805786132813]},{"page":95,"text":"passes to the rear through the main body, assuming responsibility for the reconnaissance objective as a","rect":[108.02987670898438,661.3579711914063,540.1584460716248,652.2943725585938]},{"page":95,"text":"rearward passage of lines, or continues farther into the zone to continue their reconnaissance mission.","rect":[108.0298843383789,672.8816528320313,514.082102060318,663.8280029296875]},{"page":95,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":95,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":95,"text":"4-19","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":96,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":96,"text":"EXECUTION AND TASKS","rect":[72.0,85.29055786132813,240.2104453010559,75.57487487792969]},{"page":96,"text":"4-89. A reconnaissance handover involves transferring physical, visual, electromagnetic, or digital","rect":[90.0,105.58140563964844,522.1544390926362,96.52776336669922]},{"page":96,"text":"observation in a number of combinations. Reconnaissance assets, such as ground sensors and UASs, may","rect":[90.00001525878906,117.10514831542969,521.9463086128235,108.05150604248047]},{"page":96,"text":"transfer responsibility during the reconnaissance handover. A reconnaissance handover is similar to a battle","rect":[90.00007629394531,128.6288299560547,521.983214138031,119.57518768310547]},{"page":96,"text":"handover in that its conduct is in conjunction with other tasks, such as relief in place, linkup, and passage of","rect":[90.00007629394531,140.03306579589845,522.0837698564529,130.96946716308595]},{"page":96,"text":"lines (see figures 4-4, 4-5 [page 4-22], and 4-6 [page 4-23]).","rect":[90.00007629394531,151.55674743652345,328.97037720680239,142.5030975341797]},{"page":96,"text":"4-90. Leaders and planners at all levels coordinate and execute reconnaissance ","rect":[89.96022033691406,169.0564727783203,430.3017065525055,160.0227508544922]},{"page":96,"text":"considering the following:","rect":[89.96022033691406,180.6001434326172,195.56610596275329,171.54649353027345]},{"page":96,"text":" Redundant surveillance to assist in maintaining enemy contact.","rect":[115.19999694824219,194.0214080810547,385.28663086891177,184.96775817871095]},{"page":96,"text":" Location and criteria for a reconnaissance handover.","rect":[115.19999694824219,205.44949340820313,342.9277136325836,198.4077606201172]},{"page":96,"text":" Communications plan between handover elements.","rect":[115.19999694824219,221.00148010253907,337.43177247047427,211.96775817871095]},{"page":96,"text":" Exchanging operations and fires plans.","rect":[115.19999694824219,234.46141052246095,288.4474585056305,225.4077606201172]},{"page":96,"text":" Exchanging intelligence and information collection assets.","rect":[115.19999694824219,248.0214080810547,367.0488073825836,238.96775817871095]},{"page":96,"text":" Identifying and coordinating for target handover, as necessary.","rect":[115.19999694824219,261.4613952636719,383.9689428806305,252.4077606201172]},{"page":96,"text":" Contact points or linkup points.","rect":[115.19999694824219,275.0014953613281,259.528635263443,265.9677734375]},{"page":96,"text":" Collocating command posts.","rect":[115.19999694824219,288.4613952636719,247.41131043434144,279.40777587890627]},{"page":96,"text":" Transfer and acceptance of command between units.","rect":[115.19999694824219,302.0014953613281,343.43775391578677,292.9677734375]},{"page":96,"text":" Rehearsals.","rect":[115.19999694824219,313.4494934082031,178.89946961402894,306.40777587890627]},{"page":96,"text":" Recognition signals.","rect":[115.19999694824219,329.0213928222656,214.8889410495758,319.9677734375]},{"page":96,"text":"handover ","rect":[432.7319641113281,168.0,472.54606080055239,160.0227508544922]},{"page":96,"text":"tasks","rect":[474.9762878417969,168.0,494.81261140155797,160.0227508544922]},{"page":96,"text":"while","rect":[499.69891357421877,167.06448364257813,521.8798205833435,160.0227508544922]},{"page":96,"text":"4-20","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":96,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":96,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":97,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":97,"text":"Figure","rect":[224.8800048828125,548.0816650390625,255.3775274772644,538.7590942382813]},{"page":97,"text":"4-4. Reconnaissance handover","rect":[258.11651611328127,546.1095581054688,404.8821304445267,538.8387451171875]},{"page":97,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":97,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0834067382813,37.8480224609375]},{"page":97,"text":"4-21","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":98,"text":"Chapter 4","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":98,"text":"Figure","rect":[92.15999603271485,553.24169921875,122.65751099777222,543.9191284179688]},{"page":98,"text":"4-22","rect":[72.0,754.0800170898438,90.08100347900391,747.6090087890625]},{"page":98,"text":"4-5. Reconnaissance handover between squadron and combat aviation","rect":[125.39651489257813,553.1121826171875,462.8719369764328,543.9191284179688]},{"page":98,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":98,"text":"brigade","rect":[465.7098388671875,553.24169921875,501.72718262863159,544.0286865234375]},{"page":98,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":99,"text":"Reconnaissance Operations","rect":[418.91998291015627,46.164024353027347,540.0842612304688,37.8480224609375]},{"page":99,"text":"Figure 4-6. Reconnaissance handover, follow-on battalion continues mission","rect":[132.36000061035157,553.24169921875,497.4607126111984,543.9091796875]},{"page":99,"text":"SPECIAL OPERATIONS FORCES RECONNAISSANCE HANDOVER","rect":[90.0,578.610595703125,527.3306055583954,568.8949584960938]},{"page":99,"text":"4-91. Based on their forward proximity in the area of operations, reconnaissance forces may often be the","rect":[108.0,598.9014282226563,540.1046130638123,589.8477783203125]},{"page":99,"text":"first friendly units to encounter SOF units. (Refer to chapter 6 for more details.) Conventional reconnaissance","rect":[107.99002838134766,610.4251098632813,539.9741198997498,601.3714599609375]},{"page":99,"text":"forces may operate in conjunction with SOF. Depending on the command relationship, a reconnaissance","rect":[107.99002838134766,621.829345703125,540.0847156028748,612.7657470703125]},{"page":99,"text":"handover may be required to conduct a relief in place with SOF, conduct joint operations with SOF, or in","rect":[108.00001525878906,633.3530883789063,539.8862500190735,624.2894897460938]},{"page":99,"text":"passing through SOF areas. Units use the same planning steps listed above when conducting an SOF","rect":[108.00001525878906,644.8767700195313,540.1326086540222,635.8231201171875]},{"page":99,"text":"reconnaissance handover.","rect":[108.00003814697266,654.3885498046875,209.37192749977113,647.3468627929688]},{"page":99,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":99,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":99,"text":"4-23","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":100,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.22001099586489,375.853759765625]},{"page":101,"text":"Chapter 5","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":101,"text":"Security Operations","rect":[238.9199981689453,154.17567443847657,390.7969777946472,139.04559326171876]},{"page":101,"text":"Security operations are operations to provide early and accurate warning of enemy","rect":[126.0,188.85357666015626,504.17982053756716,178.81822204589845]},{"page":101,"text":"operations, to provide the force being protected with time and maneuver space within","rect":[126.01104736328125,201.4501953125,504.143168926239,191.4148406982422]},{"page":101,"text":"which to react to the enemy, and to develop the situation to allow commanders to","rect":[126.01104736328125,214.046875,504.117778301239,204.0115203857422]},{"page":101,"text":"effectively use their force. Security is inherent in all operations and is always the first","rect":[126.01104736328125,226.76495361328126,504.140866815567,216.72959899902345]},{"page":101,"text":"priority of work. Commanders use continual reconnaissance and the development of ","rect":[126.01104736328125,239.361572265625,506.75972533226016,229.3262176513672]},{"page":101,"text":"information ","rect":[126.01104736328125,250.0,180.85887694358827,241.92283630371095]},{"page":101,"text":"requirements ","rect":[186.97503662109376,251.9361114501953,247.10329222679139,241.92283630371095]},{"page":101,"text":"to","rect":[253.34310913085938,250.0,261.987407207489,243.0]},{"page":101,"text":"provide security.","rect":[270.96624755859377,251.95819091796876,350.40233397483828,241.92283630371095]},{"page":101,"text":"Commanders ","rect":[359.27850341796877,249.73915100097657,420.59908080101016,241.92283630371095]},{"page":101,"text":"follow ","rect":[426.836669921875,249.72811889648438,458.2763879299164,241.92283630371095]},{"page":101,"text":"the ","rect":[464.51397705078127,249.72811889648438,480.71407103538516,241.92283630371095]},{"page":101,"text":"five","rect":[486.83355712890627,249.72811889648438,504.095668674469,241.92283630371095]},{"page":101,"text":"fundamentals of security during security operations to ensure early and accurate","rect":[126.01104736328125,264.67626953125,504.13320529556276,254.6409149169922]},{"page":101,"text":"warning of enemy forces. Security operations provide reaction time and maneuver","rect":[126.01105499267578,277.27294921875,504.0901993818283,267.2375793457031]},{"page":101,"text":"space to develop the situation and determine the most effective use of force to","rect":[126.00000762939453,289.96893310546877,504.1288561820984,279.95562744140627]},{"page":101,"text":"neutralize, defeat, or destroy enemy forces. There are four types of security operations:","rect":[126.00000762939453,302.587646484375,504.07586437416077,292.5522766113281]},{"page":101,"text":"screen, guard, cover, and area security. Each security type provides varying levels of ","rect":[126.01103210449219,315.18426513671877,506.73091673851016,305.1488952636719]},{"page":101,"text":"protection to the main body. The commander weighs operational and mission variables","rect":[126.01103210449219,327.9023742675781,504.33194401836399,317.86700439453127]},{"page":101,"text":"with the end state to select the appropriate security type.","rect":[126.01103210449219,340.4990234375,362.8885705471039,330.4636535644531]},{"page":101,"text":"SECTION I – SECURITY BASICS","rect":[99.36000061035156,364.5840148925781,282.08401708984379,355.7040100097656]},{"page":101,"text":"5-1. Security is an essential part to all BCT operations. Maneuver units perform security missions as part","rect":[108.0,387.9413757324219,540.1027423152924,378.88775634765627]},{"page":101,"text":"of a larger security force or operate independently with task-organized attachments. The main difference","rect":[107.99999237060547,399.465087890625,540.0846545677185,390.4114685058594]},{"page":101,"text":"between security operations and reconnaissance operations is that security operations orient on the protected","rect":[107.98005676269531,410.8692932128906,540.0431714057922,401.815673828125]},{"page":101,"text":"force, area, or facility to be protected, while reconnaissance is enemy, infrastructure, terrain and weather","rect":[107.98005676269531,422.39300537109377,540.0629568681717,413.3393859863281]},{"page":101,"text":"effects, and society oriented. However, security operations cannot be divorced from reconnaissance missions","rect":[107.98005676269531,433.916748046875,540.0231826906204,424.8631286621094]},{"page":101,"text":"as one of the fundamentals of security is to perform continuous reconnaissance.","rect":[107.98005676269531,445.4404602050781,426.1842749118805,436.3868408203125]},{"page":101,"text":"5-2. Security operations prevent enemy reconnaissance assets from determining friendly locations,","rect":[107.98005676269531,462.9601135253906,540.043039560318,453.906494140625]},{"page":101,"text":"strengths, and weaknesses. Every tactical echelon requires a specially trained organization that can execute","rect":[107.98005676269531,474.48382568359377,540.1208484153748,465.4302062988281]},{"page":101,"text":"security missions to preserve freedom of action for the main body.","rect":[107.98005676269531,485.8880310058594,373.991770029068,476.83441162109377]},{"page":101,"text":"SECURITY","rect":[90.0,511.17059326171877,162.41831307792664,501.4549255371094]},{"page":101,"text":"5-3. Security operations provide information about the enemy and terrain while preserving the combat","rect":[107.99829864501953,531.4577026367188,540.1308795223237,522.404052734375]},{"page":101,"text":"power of friendly forces. Security operations provide information about the size, composition, location, and","rect":[107.99832153320313,542.9813842773438,540.0464062690735,533.927734375]},{"page":101,"text":"the enemy forces’ direction of movement. Information collected by the squadron gives the main body","rect":[107.99832153320313,554.505126953125,540.0661206245422,545.4514770507813]},{"page":101,"text":"commander time to react and maneuver to prepare for future operations or to deploy to engage the enemy.","rect":[107.99832153320313,566.0288696289063,540.0661718845367,556.9752197265625]},{"page":101,"text":"Security prevents the enemy from surprising the main body, which allows the commander to preserve the","rect":[107.99832916259766,577.5525512695313,540.0800158958435,568.4989013671875]},{"page":101,"text":"combat power of maneuver forces and mass effects and combat power at the decisive point in time. (Refer","rect":[107.99832153320313,588.9368286132813,540.0829763994217,579.9031372070313]},{"page":101,"text":"to FM 3-90-2 for more information.)","rect":[107.99827575683594,600.4605712890625,254.70907503223419,591.4268798828125]},{"page":101,"text":"5-4. Security along a common boundary with another friendly unit is the responsibility of the unit assigned","rect":[107.98831176757813,618.0001220703125,540.0503125190735,608.9464721679688]},{"page":101,"text":"to that zone or sector. Liaison with the protected force is critical during security operations. Constant","rect":[107.98831176757813,629.5238647460938,540.0240679988862,620.47021484375]},{"page":101,"text":"communication and liaison ensures both the security force and the protected force remain informed of the","rect":[107.9884033203125,641.0475463867188,540.0533435325623,631.993896484375]},{"page":101,"text":"full situation and maintains synchronized operations.","rect":[107.98835754394531,652.5712890625,319.75391602516177,643.5176391601563]},{"page":101,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":101,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":101,"text":"5-1","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":102,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":102,"text":"SECURITY FUNDAMENTALS","rect":[72.0,85.29055786132813,266.16482152175908,75.57487487792969]},{"page":102,"text":"5-5. The fundamentals of security, similar to the fundamentals of reconnaissance, provide a framework for","rect":[90.0,105.58140563964844,522.0728445634842,96.52776336669922]},{"page":102,"text":"security operations. Reconnaissance operations, because they are continuous throughout all operations to","rect":[89.99998474121094,117.10514831542969,522.0041699409485,108.05150604248047]},{"page":102,"text":"develop the situation through information collection, are essential to successful security operations. The","rect":[89.99998474121094,128.6288299560547,522.108702419281,119.57518768310547]},{"page":102,"text":"fundamentals of security are applicable to each type of security. The method in which each type of security","rect":[90.01000213623047,140.03306579589845,522.0569653511047,130.9794158935547]},{"page":102,"text":"achieves the fundamentals is different. This is important to understand when determining which type of","rect":[90.00995635986328,151.55674743652345,522.0876761064529,142.5030975341797]},{"page":102,"text":"security operation the security force should conduct. The following fundamentals guide security operations.","rect":[90.00991821289063,163.0804901123047,521.1314795017242,154.02684020996095]},{"page":102,"text":"5-6. Provide early and accurate warning. The security force provides early warning by detecting the enemy","rect":[90.00991821289063,180.6001434326172,522.079731464386,171.54649353027345]},{"page":102,"text":"force quickly and reporting information accurately to the main body commander. The security force operates","rect":[90.00991821289063,192.1238250732422,522.1874282960891,183.07017517089845]},{"page":102,"text":"at varying distances from the main body based on the mission variables of METT-TC (I). The earlier the","rect":[90.00991821289063,203.64756774902345,522.087706325531,194.5939178466797]},{"page":102,"text":"security force detects the enemy and answers PIRs, the more time the main body has to assess the changing","rect":[90.0,215.05174255371095,522.0568432807922,205.9980926513672]},{"page":102,"text":"situation and react. Therefore, the security force should operate as far away from the protected force as the","rect":[90.0,226.5754852294922,522.1257312278748,217.52183532714845]},{"page":102,"text":"mission variables allow without opening seems or gaps that the enemy could exploit.","rect":[90.0,238.0991668701172,429.8084509372711,229.04551696777345]},{"page":102,"text":"5-7. Provide reaction time and maneuver space. The security force operates at a distance from the main","rect":[90.0,255.6188201904297,522.0529370307922,246.56517028808595]},{"page":102,"text":"body and offers resistance to enemy forces to provide the main body with enough reaction time and maneuver","rect":[89.99004364013672,267.1425476074219,522.0847464189529,258.08892822265627]},{"page":102,"text":"space to respond effectively to likely enemy actions. The commander determines the amount of time and","rect":[90.00001525878906,278.6662902832031,522.0249829292297,269.6126708984375]},{"page":102,"text":"space required to respond effectively from information provided by the IPB process and the main body","rect":[89.99006652832031,290.0704650878906,522.1784253120422,281.016845703125]},{"page":102,"text":"commander’s guidance regarding time the main body requires to react to enemy courses of action based on","rect":[89.99006652832031,301.59417724609377,522.0370678901672,292.5405578613281]},{"page":102,"text":"the mission variables of METT-TC (I). This includes providing time to the protected force to allow them to","rect":[89.99006652832031,313.1178894042969,521.906391620636,304.06427001953127]},{"page":102,"text":"execute decision point to maximize firepower at their decisive point. The security force that operates farthest","rect":[89.98011779785156,324.6416015625,522.1505938777924,315.5879821777344]},{"page":102,"text":"away from the main body and offers more resistance provides more time and space to the main body. The","rect":[89.98011016845703,336.1653137207031,522.0404040794373,327.1116943359375]},{"page":102,"text":"security force attempts to hinder the enemy’s advance by acting within its capabilities and mission constraints.","rect":[89.9801025390625,347.5695495605469,520.8695776462555,338.51593017578127]},{"page":102,"text":"5-8. Orient on the protected force, area, or facility to be secured. The security force focuses all its actions","rect":[89.9801025390625,365.08917236328127,522.0278823976516,356.0355529785156]},{"page":102,"text":"on protecting and providing early warning to the secured force or facility. The security force operates between","rect":[89.98007202148438,376.6128845214844,522.054829120636,367.55926513671877]},{"page":102,"text":"the main body and known or suspected enemy units. The security force must move as the main body moves","rect":[89.98001861572266,388.1365966796875,522.1237075929641,379.0829772949219]},{"page":102,"text":"and orient on its movement. The security force commander must know the main body’s scheme of maneuver","rect":[89.98997497558594,399.6603088378906,522.0749807939529,390.606689453125]},{"page":102,"text":"to keep the security force between the main body and the enemy. The value of terrain occupied by the security","rect":[89.98997497558594,411.1840515136719,522.078999042511,402.13043212890627]},{"page":102,"text":"force hinges on the protection it proves to the main body commander. This fundamental serves as a","rect":[89.98997497558594,422.5882568359375,521.860655544281,413.5346374511719]},{"page":102,"text":"counterbalance to the expectations that are implicit in “provide early and accurate warning.”","rect":[89.9899673461914,434.1119689941406,458.9681384544373,425.058349609375]},{"page":102,"text":"5-9. Perform continuous reconnaissance. Implicit in this fundamental is that thesquadrons needto prioritize","rect":[89.9899673461914,451.6116943359375,521.9820544700623,442.5779724121094]},{"page":102,"text":"answering brigade PIRs to facilitate decisions to allow the commander to achieve a position of relative","rect":[89.99996185302735,463.15533447265627,522.139708278656,454.1017150878906]},{"page":102,"text":"advantage. Therefore, the security force aggressively and continuously seeks the enemy and reconnoiters key","rect":[90.00993347167969,474.6790466308594,522.0829663276672,465.62542724609377]},{"page":102,"text":"terrain. Terrain information focuses on the security force’s possible use by the enemy or the friendly force,","rect":[90.00993347167969,486.2027893066406,522.0847265720367,477.149169921875]},{"page":102,"text":"either for offensive or defensive operations.","rect":[90.00993347167969,497.58709716796877,264.935373544693,488.5533752441406]},{"page":102,"text":"5-10. Maintain enemy contact. Once the security force makes enemy contact, it does not break contact unless","rect":[90.00993347167969,515.1266479492188,522.1128433351516,506.072998046875]},{"page":102,"text":"the main force commander specifically directs them to do so. By using depth, recon management, and","rect":[90.01988983154297,526.650390625,522.0987133979797,517.5967407226563]},{"page":102,"text":"utilizing different methods of reconnaissance, the security force is able to maintain contact with one asset","rect":[90.01988983154297,538.1741333007813,522.1086627254487,529.1204833984375]},{"page":102,"text":"while allowing others to displace. The security force must continuously collect information on the enemy’s","rect":[90.01988983154297,549.6978759765625,522.0537613039016,540.6442260742188]},{"page":102,"text":"activities to assist the main body in determining potential and actual enemy courses of action and to prevent","rect":[90.0198745727539,561.2216186523438,522.1424151668549,552.16796875]},{"page":102,"text":"the enemy from surprising the main body. This requires the security force to maintain continuous visual","rect":[90.00988006591797,572.6257934570313,522.0728961238862,563.5721435546875]},{"page":102,"text":"contact, to be able to use direct and indirect fires, and to maneuver freely, which requires the security force","rect":[90.00988006591797,584.1495361328125,522.1025378684998,575.0958862304688]},{"page":102,"text":"to have depth in space and time. In specific circumstances, electronic contact could be sufficient to “maintain","rect":[90.00989532470703,595.6533203125,522.035053730011,586.61962890625]},{"page":102,"text":"enemy contact.” However, if the enemy is in obstacle contact, and there are no assets able to observe that","rect":[90.00989532470703,607.197021484375,522.1433917293549,598.1433715820313]},{"page":102,"text":"contact, then this fundamental has not been achieved.","rect":[90.00985717773438,618.2327270507813,303.57911133766177,609.6671142578125]},{"page":102,"text":"5-11. The following vignette highlights a Cavalrysquadron’suse of security fundamentals toprotect a BCT’s","rect":[90.00985717773438,636.120849609375,522.0726211671829,627.0671997070313]},{"page":102,"text":"flank during combat operations.","rect":[90.01981353759766,647.6445922851563,217.67112183570863,638.5909423828125]},{"page":102,"text":"5-2","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":102,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":102,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":103,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":103,"text":"3-7 CAV Security Mission at Objective Lions 2003","rect":[190.8000030517578,87.17997741699219,439.1999816894531,76.46397399902344]},{"page":103,"text":"U.S. military action in Iraq during March and April 2003 focused upon reaching the nation’s","rect":[126.0,104.74137878417969,504.0120132570267,95.68773651123047]},{"page":103,"text":"capital in Baghdad and eliminating the resistance of Saddam Hussein’s combat forces. By early","rect":[126.0,116.26139831542969,503.88058352279668,107.20775604248047]},{"page":103,"text":"April, the 3rd Infantry Division had reached the city’s outskirts from the south. Its subordinate","rect":[126.0,127.78141784667969,503.9919421653748,118.72777557373047]},{"page":103,"text":"BCT began to seize key objectives on the outskirts of the urban area. Baghdad International","rect":[126.0,139.3014373779297,504.0947467098236,130.24778747558595]},{"page":103,"text":"Airport, designated as OBJECTIVE LIONS, constituted one of these objectives. Its seizure would","rect":[126.0,150.82139587402345,504.41719484329226,141.7677459716797]},{"page":103,"text":"ensure a steady flow of supplies, easing a difficult,logistical effort to support the division.","rect":[126.0,162.2213592529297,452.61329102516177,153.16770935058595]},{"page":103,"text":"On 3 April, the 1st BCT commenced operations to seize the airport. The divisional Cavalry","rect":[126.0,176.7413787841797,503.9323718528748,167.68772888183595]},{"page":103,"text":"squadron, 3-7 Cavalry (known as CAV), moved to provide flank security against any threat","rect":[126.0,188.2613983154297,503.96703064537049,179.20774841308595]},{"page":103,"text":"from the north or west, centering its position on the intersection of Highways 1 and 10.","rect":[126.0,199.7814178466797,504.10047364234927,190.72776794433595]},{"page":103,"text":"Highways 1 and 10 were 2 of the main arteries feeding into Baghdad. The squadron established","rect":[126.0,211.3014373779297,504.0707287788391,202.24778747558595]},{"page":103,"text":"a screen that consisted of a series of checkpoints to interdict movement.","rect":[126.0,222.82139587402345,413.27433228492739,213.7677459716797]},{"page":103,"text":"Initially, the squadron’s positions began to attract enemy attention, but activity dropped during","rect":[126.0,237.2213592529297,504.0688672065735,228.16770935058595]},{"page":103,"text":"the evening and nighttime hours. The early hours of 4 April, however, witnessed a steady","rect":[126.0,248.7413787841797,504.15048098373418,239.68772888183595]},{"page":103,"text":"increase in hostile combat operations. By 0435, 3-7 CAV positions had already destroyed","rect":[126.0,260.2613830566406,504.07259035110476,251.20774841308595]},{"page":103,"text":"several T-72 tanks and other armored vehicles. The Iraqis also sought to pass through the","rect":[126.0,271.7814025878906,503.9671618919373,262.727783203125]},{"page":103,"text":"screen, using a combination of buses, pickup trucks, and an array of civilian vehicles to carry","rect":[126.0,283.3013916015625,503.97201418685918,274.2477722167969]},{"page":103,"text":"combatants through the squadron’s positions. These efforts constituted part of a larger Iraqi","rect":[126.0,294.8214111328125,504.0876971492767,285.7677917480469]},{"page":103,"text":"effort to prevent the capture of Baghdad International Airport. However, 3-7 CAV employeda","rect":[126.0,306.2214050292969,504.300678730011,297.16778564453127]},{"page":103,"text":"mix of direct fire, close air support and artillery and all Iraqi efforts to reach the airport failed.","rect":[126.0,317.74139404296877,489.5678503513336,308.6877746582031]},{"page":103,"text":"As the attacks finally diminished, the squadron received reports from observation posts of a","rect":[126.0,332.26141357421877,504.01402711868288,323.2077941894531]},{"page":103,"text":"battalion of Iraqi tanks 3 kilometers north of the screen. The squadron planned an attack while","rect":[126.0,343.7814025878906,503.98007082748418,334.727783203125]},{"page":103,"text":"aircraft and artillery hammered the suspected target. Low visibility conditions hampered efforts","rect":[126.0,355.3013916015625,503.92638093280797,346.2477722167969]},{"page":103,"text":"to observe the effects of the bombardment. Therefore, Apache troop received instructions to","rect":[126.0,366.7013854980469,504.0110363960266,357.64776611328127]},{"page":103,"text":"move forward and conduct a damage assessment.","rect":[126.0,378.2214050292969,324.565500497818,369.16778564453127]},{"page":103,"text":"The troop’s lead platoon advanced cautiously in a staggered column. The platoon leader noted","rect":[126.0,392.74139404296877,504.0598340034485,383.6877746582031]},{"page":103,"text":"a berm and the possible location of enemy tanks. The platoon leader reported this information","rect":[126.0,404.26141357421877,504.05489015579226,395.2077941894531]},{"page":103,"text":"just before several gunners in the platoon began to engage hostile vehicles that were positioned","rect":[126.0,415.7814025878906,504.07588624954226,406.727783203125]},{"page":103,"text":"behind the berm and spaced at intervals of 50 meters. The berm had protected the enemy","rect":[126.0,427.3013916015625,504.1662890892029,418.2477722167969]},{"page":103,"text":"platforms from significant damage from the air and artillery attacks.","rect":[126.0,438.7013854980469,401.00660157203677,429.64776611328127]},{"page":103,"text":"The Cavalry troop quickly engaged the tanks, which received support from Iraqi mortars,","rect":[126.0,453.2214050292969,504.0060827732086,444.16778564453127]},{"page":103,"text":"artillery, and ADA. As the firefight escalated, the troop directed artillery upon the enemy","rect":[126.0,464.74139404296877,503.98907351303105,455.6877746582031]},{"page":103,"text":"positions and withdrew. Later, the troop was found to have destroyed much of an Iraqi","rect":[126.0,476.26141357421877,504.13960754966737,467.2077941894531]},{"page":103,"text":"Republican Guard battalion, including 16, T-72 tanks in an action lasting approximately","rect":[126.0,487.7814025878906,503.98589968490605,478.727783203125]},{"page":103,"text":"15 minutes. The Cavalry squadron’s flank security mission had succeeded, blocking all Iraqi","rect":[126.0,499.3013916015625,503.9801226863861,490.2477722167969]},{"page":103,"text":"attempts to interfere with the seizure of Baghdad International Airport.","rect":[126.0,510.8214111328125,410.96558594703677,501.7677917480469]},{"page":103,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":103,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":103,"text":"5-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":104,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":104,"text":"Security Fundamentals","rect":[108.0,84.94139099121094,204.3849228029251,76.05706787109375]},{"page":104,"text":"Provide early and accurate warning","rect":[108.0,102.46141052246094,255.65694093704225,93.57708740234375]},{"page":104,"text":"The ability of Apache troop and the observation posts to directly observe Iraqi tanks north of ","rect":[108.0,113.98143005371094,488.46033692359927,104.92778778076172]},{"page":104,"text":"the screen provided situational awareness to 3-7 CAV and ultimately 1st BCT, 3rd Infantry Division.","rect":[108.0,125.50144958496094,485.84256958961489,116.44780731201172]},{"page":104,"text":"Provide reaction time and maneuver space","rect":[108.0,143.00148010253907,283.20037722396855,134.1370849609375]},{"page":104,"text":"The ability of Apache troop and the observation posts to identify a battalion of Iraqi tanks north","rect":[108.0,154.42137145996095,485.94725465774538,145.3677215576172]},{"page":104,"text":"of the screen provided the squadron with ample time to plan an attack while aircraft and","rect":[108.0,165.94139099121095,485.9630627632141,156.8877410888672]},{"page":104,"text":"artillery engaged the suspected targets.","rect":[108.0,177.46141052246095,266.00538086891177,168.4077606201172]},{"page":104,"text":"Orient on the force or facility to be secured","rect":[108.0,194.98143005371095,285.198383808136,186.08714294433595]},{"page":104,"text":"3-7 CAV protected the flank of 1st BCT, 3rd Infantry Division, ensuring that the seizure of","rect":[108.0,206.50144958496095,485.9680377254486,197.4477996826172]},{"page":104,"text":"Baghdad International Airport occurred without interference. The squadron did so by","rect":[108.0,218.0214080810547,486.0598132591248,208.96775817871095]},{"page":104,"text":"operating between the BCT and the threat of Iraqi intervention from the north.","rect":[108.0,229.42137145996095,422.7230932712555,220.3677215576172]},{"page":104,"text":"Perform continuous reconnaissance","rect":[108.0,246.94139099121095,257.36715578842168,238.05706787109376]},{"page":104,"text":"The combination of checkpoints and the forward movement of Apache troop ensured continuous","rect":[108.0,258.4613952636719,486.03282624530797,249.4077606201172]},{"page":104,"text":"monitoring of the surrounding area. It was through this troop’s actions that the Iraqi tank force","rect":[108.0,269.9814147949219,486.1125781517029,260.92779541015627]},{"page":104,"text":"was located and destroyed.","rect":[108.0,281.5014343261719,216.92852234840394,272.44781494140627]},{"page":104,"text":"Maintain enemy contact","rect":[108.0,299.0213928222656,207.97945129966736,290.1370849609375]},{"page":104,"text":"The checkpoints provided a means of monitoring the surrounding area and maintaining contact","rect":[108.0,310.42138671875,486.01305115318299,301.3677673339844]},{"page":104,"text":"once the Iraqis sought to penetrate the screen. In most cases, the troop maintained contact","rect":[108.0,321.9413757324219,485.94322693443299,312.88775634765627]},{"page":104,"text":"through a mix of observation posts and direct fire engagements employed through the","rect":[108.0,333.4613952636719,485.9532458763123,324.40777587890627]},{"page":104,"text":"squadron’s combat power mix of tanks and Bradleys. Additionally, when aircraft identified a","rect":[108.0,344.98138427734377,486.03767824172976,335.9277648925781]},{"page":104,"text":"tank force north of the screen, the troop maintained contact through the application of air","rect":[108.0,356.5013732910156,486.1573989992142,347.44775390625]},{"page":104,"text":"strikes and artillery, followed by the dispatch of Apache troop to ascertain the impact of ","rect":[108.0,367.9013671875,488.5199682712555,358.8477478027344]},{"page":104,"text":"this bombardment.","rect":[108.0,377.3895568847656,183.08944153785706,370.3677673339844]},{"page":104,"text":"COMMANDER’S SECURITY GUIDANCE","rect":[72.0,409.5306091308594,337.3279368104935,399.8008728027344]},{"page":104,"text":"5-12. The BCT commander’s guidance should consist of the security focus, duration, and engagement and","rect":[90.0,429.8214111328125,522.0529370307922,420.7677917480469]},{"page":104,"text":"disengagement criteria. In providing this guidance, the commander describes, shapes, and prioritizes the","rect":[89.98999786376953,441.3451232910156,521.989317653656,432.29144287109377]},{"page":104,"text":"intended vision of the security effort supporting the overall scheme of maneuver and the specific roles of the","rect":[89.99003601074219,452.8688659667969,522.098936794281,443.81524658203127]},{"page":104,"text":"Cavalry unit. As with the commander’s reconnaissance guidance, this guidance and the importance of","rect":[89.99003601074219,464.2730407714844,522.0807180986404,455.21942138671877]},{"page":104,"text":"accomplishing the mission must be understood at echelon. (Refer to chapter 3 of this manual for detailed","rect":[89.99004364013672,475.7967834472656,522.016987323761,466.7431640625]},{"page":104,"text":"information about the commander’s security guidance.)","rect":[89.98007202148438,487.32049560546877,312.1777334794998,478.2668762207031]},{"page":104,"text":"SECTION II – COUNTERRECONNAISSANCE","rect":[81.36000061035156,511.2240295410156,331.4040244140625,502.3440246582031]},{"page":104,"text":"5-13. Counterreconnaissance is a tactical mission task that encompasses all measures taken by a commander","rect":[90.0,534.5814208984375,522.1427908525467,525.5277709960938]},{"page":104,"text":"to counter enemy reconnaissance efforts. (Refer to ADP 3-90 for more information.) The purpose of","rect":[90.0,546.1051635742188,522.0757132158279,537.051513671875]},{"page":104,"text":"counterreconnaissance is to destroy, defeat, or repel all enemy reconnaissance elements within capabilities","rect":[89.99004364013672,557.6288452148438,521.9394424562454,548.5751953125]},{"page":104,"text":"and following engagement criteria. Counterreconnaissance is not a distinct mission, but a component of all","rect":[89.99004364013672,569.152587890625,521.9754229793549,560.0989379882813]},{"page":104,"text":"types of security operations. Counterreconnaissance denies the enemy commander the ability to conduct","rect":[89.99004364013672,580.5567626953125,522.1402789363862,571.5031127929688]},{"page":104,"text":"reconnaissance and develop their situational understanding. Successfully countering enemy reconnaissance","rect":[89.98999786376953,592.0805053710938,521.9877917747498,583.02685546875]},{"page":104,"text":"is the first and possibly most important step to ensure the BCT can successfully execute its mission.","rect":[89.98999786376953,603.6041870117188,489.10026001930239,594.550537109375]},{"page":104,"text":"5-14. Counterreconnaissance is an inherent task in all security operations. Counterreconnaissance keeps","rect":[89.99004364013672,621.1238403320313,522.1536758546829,612.0701904296875]},{"page":104,"text":"enemy reconnaissance forces from observing the main body by defeating or blocking them. Units organize","rect":[89.99005126953125,632.6475830078125,522.0681140403748,623.5939331054688]},{"page":104,"text":"to defeat enemy reconnaissance forces without requiring reinforcement. Additionally, units consider enemy","rect":[89.99005126953125,644.1713256835938,522.052875995636,635.11767578125]},{"page":104,"text":"reconnaissance capabilities to determine if additional maneuver or sustainment assets are required.","rect":[89.99004364013672,655.5555419921875,484.44999146461489,646.5218505859375]},{"page":104,"text":"5-15. The counterreconnaissance plan should address how to acquire and defeat enemy reconnaissance","rect":[89.99004364013672,673.0951538085938,522.0013415794373,664.04150390625]},{"page":104,"text":"elements. The intelligence section provides key input into the planning process. The intelligence section","rect":[89.99005126953125,684.6188354492188,522.042866230011,675.565185546875]},{"page":104,"text":"identifies avenues of approach into the unit’s sector, which type of enemy reconnaissance elements the unit","rect":[89.99004364013672,696.142578125,522.0010577449799,687.0889282226563]},{"page":104,"text":"expects in the sector, and when they are most likely to move into the sector. The commander of the squadron","rect":[90.0,707.6663208007813,522.0548901557922,698.6126708984375]},{"page":104,"text":"or counterreconnaissance force uses this information to formulate the counterreconnaissance plan and to task","rect":[90.0,719.1700439453125,522.053852558136,710.1363525390625]},{"page":104,"text":"5-4","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":104,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":104,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":105,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":105,"text":"units to execute it. Often, the counterreconnaissance plan requires a unit to conduct a screen mission to","rect":[108.0,83.48152923583985,540.0627636909485,74.44780731201172]},{"page":105,"text":"acquire, identify, and defeat enemy reconnaissance forces.","rect":[108.0,95.02519226074219,341.50919556617739,85.97154998779297]},{"page":105,"text":"5-16. The counterreconnaissance force must be task organized to accomplish its mission with the enemy.","rect":[107.99998474121094,112.42527770996094,540.0507910251617,103.37163543701172]},{"page":105,"text":"Whatever option the commander employs, the counterreconnaissance fight should be firmly controlled,","rect":[107.989990234375,123.94902038574219,540.1077978610992,114.89537811279297]},{"page":105,"text":"monitored at the higher headquarters level, coordinated early, and thoroughly rehearsed. An effective","rect":[107.989990234375,135.4727020263672,540.0960681419373,126.41905975341797]},{"page":105,"text":"counterreconnaissance fight suppresses the enemy reconnaissance effort, forcing the enemy to attack without","rect":[107.989990234375,146.99644470214845,540.1305743465424,137.9427947998047]},{"page":105,"text":"information about the friendly force disposition.","rect":[107.989990234375,158.5201873779297,300.7956030368805,149.46653747558595]},{"page":105,"text":"SECTION III – SECURITY TYPES","rect":[99.36000061035156,179.42396545410157,282.80398779296879,170.54397583007813]},{"page":105,"text":"5-17. Leaders categorize security operations in terms of the degree of security provided and the amount of","rect":[108.0,202.7814178466797,539.9276419267654,193.72776794433595]},{"page":105,"text":"combat power required. (Refer to ADP 3-90 for more information.) The four primary types of security","rect":[108.0,214.30516052246095,540.077778339386,205.2515106201172]},{"page":105,"text":"operations are—","rect":[107.99004364013672,225.8089141845703,174.47603702545167,216.7751922607422]},{"page":105,"text":" Screen.","rect":[133.1999969482422,237.25942993164063,180.93059754371644,230.3770751953125]},{"page":105,"text":" Stationary.","rect":[151.1999969482422,253.3014373779297,212.8546850681305,244.24778747558595]},{"page":105,"text":" Moving (flank and rear).","rect":[151.1999969482422,267.3414001464844,268.16752076148989,258.28778076171877]},{"page":105,"text":" Guard.","rect":[133.1999969482422,278.7794494628906,178.76928162574769,271.727783203125]},{"page":105,"text":" Advance guard (stationary and moving).","rect":[151.1999969482422,294.9413757324219,331.1645300388336,285.88775634765627]},{"page":105,"text":" Flank guard (stationary and moving).","rect":[151.1999969482422,308.98138427734377,318.32703614234927,299.9277648925781]},{"page":105,"text":" Rear guard.","rect":[151.1999969482422,323.0213928222656,215.976145029068,313.9677734375]},{"page":105,"text":" Cover.","rect":[133.1999969482422,334.4594421386719,178.16869568824769,327.57708740234377]},{"page":105,"text":"","rect":[133.1999969482422,375.381103515625,139.2058769197464,370.6535949707031]},{"page":105,"text":" Offensive cover (advance and flank).","rect":[151.1999969482422,350.60150146484377,317.86991333961489,341.5677795410156]},{"page":105,"text":" Defensive cover (front, flank, and rear).","rect":[151.1999969482422,364.6415100097656,328.667551279068,355.6077880859375]},{"page":105,"text":"Area security.","rect":[151.1999969482422,378.10137939453127,207.33854126930238,369.0477600097656]},{"page":105,"text":" Route security.","rect":[151.1999969482422,392.1413879394531,229.7677710056305,383.0877685546875]},{"page":105,"text":" Convoy security.","rect":[151.1999969482422,406.181396484375,237.56743836402894,397.1277770996094]},{"page":105,"text":"5-18. The four types of security operations provide varying levels of protection to the protected force and","rect":[107.99579620361328,423.7010498046875,540.0396313667297,414.6474304199219]},{"page":105,"text":"are dependent upon the size of the unit conducting the security operation. Screen operations provide early","rect":[107.97588348388672,435.2247619628906,540.0098462104797,426.171142578125]},{"page":105,"text":"warning to the main body. Guard operations prevent enemy observation and direct fire on the main body.","rect":[107.97588348388672,446.74847412109377,540.0260107517242,437.6948547363281]},{"page":105,"text":"Cover operations protect the main body from enemy observation and effective direct fire. Area security","rect":[107.97588348388672,458.2721862792969,540.0898633003235,449.21856689453127]},{"page":105,"text":"protects friendly installations, routes, units, and facilities within a prescribed area. All types of security","rect":[107.97588348388672,469.7959289550781,540.039692401886,460.7423095703125]},{"page":105,"text":"operations provide protection and early warning to the protected force, which in turn, provides reaction time","rect":[107.97584533691406,481.2001037597656,540.0787951927185,472.146484375]},{"page":105,"text":"and maneuver space to the commander and preserves freedom of action. Commanders should consider the","rect":[107.97584533691406,492.7039489746094,540.072569606781,483.67022705078127]},{"page":105,"text":"following when assigning a security mission and employing a security force:","rect":[107.975830078125,504.24755859375,415.30159485435487,495.1939392089844]},{"page":105,"text":" Force or area to secure.","rect":[133.1999969482422,515.6494750976563,244.90267395973206,508.926513671875]},{"page":105,"text":" Location and orientation of the security area.","rect":[133.1999969482422,531.1013793945313,330.95011353492739,522.0477294921875]},{"page":105,"text":" Initial location and types of observation posts, if applicable.","rect":[133.1999969482422,544.6614379882813,390.67627930641177,535.6077880859375]},{"page":105,"text":" Time allocated to establish the security operation.","rect":[133.1999969482422,558.1014404296875,350.3591101169586,549.0477905273438]},{"page":105,"text":" Criteria for transitioning from the security operation to BCT decisive operations.","rect":[133.1999969482422,571.6614379882813,474.205881357193,562.6077880859375]},{"page":105,"text":" Task organization and augmentation of security forces.","rect":[133.1999969482422,585.1014404296875,371.48926758766177,576.0477905273438]},{"page":105,"text":" Level of protection and minimum warning time requirements.","rect":[133.1999969482422,598.6614379882813,398.849436044693,589.6077880859375]},{"page":105,"text":" Threat considerations, such as the smallest enemy element allowed passage without engagement","rect":[133.1999969482422,612.1014404296875,540.1562091121674,603.0477905273438]},{"page":105,"text":"or the threat’s capability to influence main body activities.","rect":[151.1999969482422,623.7446899414063,384.67432618141177,614.6910400390625]},{"page":105,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":105,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":105,"text":"5-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.7260131835938]},{"page":106,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":106,"text":"Note.Local security is a priority of work and the responsibility of all units as a force protection measure.","rect":[115.19999694824219,89.26139831542969,503.97864747047427,80.20775604248047]},{"page":106,"text":"Local security is the low-level security activities conducted near a unit to prevent surprise by the","rect":[115.19999694824219,100.78141784667969,504.0913073997498,91.72777557373047]},{"page":106,"text":"enemy (ADP 3-90). Local security involves avoiding detection or deceiving the enemy regarding","rect":[115.19998931884766,112.18559265136719,504.05147218704226,103.13195037841797]},{"page":106,"text":"friendly actions, positions, and intentions. Local security includes finding enemy forces in the","rect":[115.19998931884766,123.70933532714844,503.9279773216248,114.65569305419922]},{"page":106,"text":"immediate vicinity and knowing as much about their positions and intentions as possible. Units","rect":[115.19998931884766,135.2330780029297,504.00063020038609,126.17943572998047]},{"page":106,"text":"use active and passive measures to provide local security. Active patrolling and continuous","rect":[115.19998931884766,146.7567596435547,504.0553787355423,137.70310974121095]},{"page":106,"text":"reconnaissance are active measures that provide local security. Passive measures include using","rect":[115.19998931884766,158.28050231933595,504.0645031929016,149.2268524169922]},{"page":106,"text":"camouflage, movement control, noise and light discipline, proper communication procedures,","rect":[115.19998931884766,169.8042449951172,504.090158700943,160.75059509277345]},{"page":106,"text":"ground sensors, night vision devices, and daylight sights.","rect":[115.19999694824219,181.3279266357422,343.523996591568,172.27427673339845]},{"page":106,"text":"5-19. Security operations are extremely important when engaged in large-scale combat operations. The","rect":[90.0,210.46141052246095,522.108702419281,201.4077606201172]},{"page":106,"text":"historic Arracourt vignette below demonstrates how incorporating security and applying security fundamentals","rect":[90.01000213623047,221.9851531982422,522.1852920656204,212.93150329589845]},{"page":106,"text":"in battle can lead to victory.","rect":[90.02986145019531,233.5088348388672,201.71331238746644,224.45518493652345]},{"page":106,"text":"Applying Security Fundamentals at Arracourt","rect":[183.0,257.6999816894531,411.0959792480469,246.99600219726563]},{"page":106,"text":"In September 1944, the 4th Armored Division constituted part of an operation intended to cross","rect":[108.0,275.2613830566406,486.0459488039017,266.207763671875]},{"page":106,"text":"the Moselle River and isolate the city of Nancy. This operation concluded with elements of the","rect":[108.0,286.7814025878906,485.96819948959355,277.727783203125]},{"page":106,"text":"4th Armored Division playing a significant role in disrupting German rear area elements and","rect":[108.0,298.3013916015625,486.0578808784485,289.2477722167969]},{"page":106,"text":"reinforcements to Nancy. The division then transitioned into an exploitation mission, heading","rect":[108.0,309.8214111328125,486.0370373725891,300.7677917480469]},{"page":106,"text":"further east into Lorraine and creating more havoc for German efforts to mount a coherent defense.","rect":[108.0,321.2214050292969,485.9770300388336,312.16778564453127]},{"page":106,"text":"The threat posed by the American armored division led the Germans to counterattack with","rect":[108.0,338.74139404296877,485.94835329055788,329.6877746582031]},{"page":106,"text":"elements drawn from the Fifth Panzer Army on 18 September. Part of their objective lay in","rect":[108.0,350.26141357421877,485.8795666694641,341.2077941894531]},{"page":106,"text":"destroying the scattered U.S. armored forces in and around the town of Arracourt. The German","rect":[108.0,361.7814025878906,485.95238161087038,352.727783203125]},{"page":106,"text":"action triggered a series of fast moving and freewheeling engagements. These encounters","rect":[108.0,373.3013916015625,485.9324234132767,364.2477722167969]},{"page":106,"text":"placed the 4th Armored Division at a disadvantage. The Germans employed superior tanks,","rect":[108.0,384.7013854980469,485.9264929294586,375.64776611328127]},{"page":106,"text":"practiced infiltration tactics, and benefited from ground fog that protected them from allied","rect":[108.0,396.2214050292969,485.88753175735476,387.16778564453127]},{"page":106,"text":"aircraft. However, despite these advantages, the Germans suffered a significant defeat at","rect":[108.0,407.74139404296877,486.0259295711517,398.6877746582031]},{"page":106,"text":"Arracourt. They were generally out maneuvered and outfought by aggressive American, small","rect":[108.0,419.26141357421877,485.9991961727142,410.2077941894531]},{"page":106,"text":"unit tactics.","rect":[108.0,428.74957275390627,154.6446783542633,422.3054504394531]},{"page":106,"text":"American armored teams employed basic security measures to offset the initial surprise of the","rect":[108.0,448.3013916015625,486.0856921653748,439.2477722167969]},{"page":106,"text":"German attack. C Company, 37th Tank Battalion, for example, employed outposts to provide","rect":[108.0,459.7013854980469,486.0747363548279,450.64776611328127]},{"page":106,"text":"early warning of enemy activity. One of these outposts reported the noise of an enemy column","rect":[108.0,471.2214050292969,486.0468945503235,462.16778564453127]},{"page":106,"text":"shortly before midnight on the 18th. The outpost dispatched a patrol to investigate. When it","rect":[108.0,482.74139404296877,485.95128357505799,473.6877746582031]},{"page":106,"text":"identified tank tracks, a second patrol followed the tracks and pinpointed the German tanks in","rect":[108.0,494.26141357421877,485.9333691596985,485.2077941894531]},{"page":106,"text":"a bivouac position. The patrol directed artillery fire onto the enemy tanks and adjusted onto a","rect":[108.0,505.7814025878906,485.927387714386,496.727783203125]},{"page":106,"text":"nearby crossroads through which the tanks had to move as they retired.","rect":[108.0,517.3014526367188,395.12696290016177,508.247802734375]},{"page":106,"text":"The following morning another C Company outpost reported contact with German forces. This","rect":[108.0,534.701416015625,486.0359695558548,525.6477661132813]},{"page":106,"text":"outpost included a tank section and a smaller outpost further forward. The latter remained in","rect":[108.0,546.221435546875,486.03596925735476,537.1677856445313]},{"page":106,"text":"contact with the tank section via a landline. The smaller outpost provided the tank section with","rect":[108.0,557.721435546875,485.93733644485476,548.687744140625]},{"page":106,"text":"early warning of approaching vehicles. Armed with this information, the American tank section","rect":[108.0,569.2614135742188,486.0717053413391,560.207763671875]},{"page":106,"text":"quickly destroyed two of the German tanks as soon as they came into view.","rect":[108.0,580.7814331054688,407.3688452243805,571.727783203125]},{"page":106,"text":"In this instance, C Company demonstrated the fundamentals of security. Outposts provided","rect":[108.0,598.3014526367188,486.05781984329226,589.247802734375]},{"page":106,"text":"early and accurate warning of approaching enemy armor. The outposts provided reaction time","rect":[108.0,609.701416015625,485.98409914779668,600.6477661132813]},{"page":106,"text":"and maneuver space that permitted the tank section to maneuver and destroy two enemy tanks.","rect":[108.0,621.221435546875,486.08658814430239,612.1677856445313]},{"page":106,"text":"Positioned between the enemy and the main body of C Company, the outposts were oriented on","rect":[108.0,632.7413940429688,486.0687756538391,623.687744140625]},{"page":106,"text":"the force to be secured. In each case, the outposts were able to perform continuous","rect":[108.0,644.2614135742188,486.1046646242142,635.207763671875]},{"page":106,"text":"reconnaissance by reporting and tracking hostile movements. In the first example, the outpost","rect":[108.0,655.7814331054688,485.86861145591737,646.727783203125]},{"page":106,"text":"maintained enemy contact using foot patrols that were able to track the enemy armor column","rect":[108.0,667.181396484375,486.059711933136,658.1277465820313]},{"page":106,"text":"and direct indirect fire upon it.","rect":[108.0,678.701416015625,231.93229126930238,669.6477661132813]},{"page":106,"text":"5-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":106,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":106,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":107,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":107,"text":"5-20. Cavalry squadrons organize and equip to perform screen, guard, and area security operations. Cavalry","rect":[108.0,83.50144958496094,539.9463086128235,74.44780731201172]},{"page":107,"text":"squadrons participate in a cover operation as part of a larger element with external assets task organized to","rect":[108.00003814697266,95.02519226074219,540.053852558136,85.97154998779297]},{"page":107,"text":"the squadron and perform guard operations with combined arms augmentation. Usually, commanders assign","rect":[108.00003814697266,106.42936706542969,539.9492993354797,97.37572479248047]},{"page":107,"text":"security operations (screen, guard, cover) at EAB to BCTs. Table 5-1 shows typical sizes of security forces","rect":[108.0,117.95310974121094,540.0428360109329,108.89946746826172]},{"page":107,"text":"at various echelons in relation to their operation.","rect":[108.0,129.4568634033203,301.99881958961489,120.42314910888672]},{"page":107,"text":"Table 5-1. Typical echelon of security forces for a given operation at echelon","rect":[132.9597625732422,152.93258666992188,497.0047494764328,143.49050903320313]},{"page":107,"text":"SCREEN","rect":[90.0,455.7306213378906,146.8156672039032,446.01495361328127]},{"page":107,"text":"5-21. Screen is a type of security operation that primarily provides early warning to the protected force","rect":[108.0,476.0213928222656,540.1095569114685,466.9677734375]},{"page":107,"text":"(ADP 3-90). Screen operations provide less protection than guards or covers. Screen operations are defensive","rect":[108.0,487.54510498046877,540.0996081809998,478.4914855957031]},{"page":107,"text":"in nature. The screen force uses a series of observation posts and patrols to ensure observation of the assigned","rect":[108.0,498.9493103027344,539.9464917182922,489.8956604003906]},{"page":107,"text":"sector. The screen force gains and maintains enemy contact consistent with the security fundamentals. The","rect":[108.0,510.4730224609375,540.0988147239685,501.4194030761719]},{"page":107,"text":"screen force conducts counterreconnaissance to destroy or repel enemy reconnaissance units. The depth of","rect":[108.0,521.9967651367188,540.0568533525467,512.943115234375]},{"page":107,"text":"the screen is critical to allow a reconnaissance handover from one element to another without displacement","rect":[107.9801254272461,533.5005493164063,540.1037799129487,524.4668579101563]},{"page":107,"text":"from established observation posts. Friendly forces use depth to conduct counterreconnaissance to delay,","rect":[107.98011016845703,545.0442504882813,540.0260107517242,535.9906005859375]},{"page":107,"text":"impede, and harass the enemy with indirect fires causing them to deploy early while preventing enemy forces","rect":[107.98011016845703,556.5679321289063,540.0292251710891,547.5142822265625]},{"page":107,"text":"from identifying, penetrating, and exploiting the screen.","rect":[107.98011016845703,567.9721069335938,331.6279089450836,558.91845703125]},{"page":107,"text":"5-22. Screen missions are appropriate when operations have created extended flanks; gaps exist between","rect":[107.98011016845703,585.4917602539063,539.7989087104797,576.4381103515625]},{"page":107,"text":"major subordinate maneuver units, or when required to provide early warning over gaps not considered","rect":[107.9801254272461,597.0155029296875,540.0491528511047,587.951904296875]},{"page":107,"text":"critical enough to require security in greater strength. The BCT commander maximizes the security effort","rect":[107.9801254272461,608.5392456054688,540.1167804012299,599.485595703125]},{"page":107,"text":"where contact is expected.","rect":[107.9801254272461,620.04296875,213.56705689430238,611.00927734375]},{"page":107,"text":"5-23. A unit may conduct a screen in all directions for a stationary, protected force within supporting range","rect":[107.9801254272461,637.5825805664063,540.0797107200623,628.5289306640625]},{"page":107,"text":"of indirect fire assets. Units perform a screen to the flanks or rear, but not in front of a moving force. Zone","rect":[107.98011016845703,648.9867553710938,540.0562732200623,639.93310546875]},{"page":107,"text":"reconnaissance, reconnaissance in force, and guard are missions given to units in front of a moving force.","rect":[107.98011016845703,660.510498046875,529.8668310642242,651.4568481445313]},{"page":107,"text":"BCT PLANNING CONSIDERATIONS","rect":[90.0,683.8080444335938,259.8975887298584,675.5159912109375]},{"page":107,"text":"5-24. When planning the screen, the Cavalry squadron commander or maneuver battalion commander","rect":[108.0,703.7814331054688,540.0848074541092,694.727783203125]},{"page":107,"text":"considers the number of routes required, the number of observation posts or patrols needed (depth, width,","rect":[108.0,715.28515625,540.0737402439117,706.25146484375]},{"page":107,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":107,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":107,"text":"5-7","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.7260131835938]},{"page":108,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":108,"text":"duration, and orientation of the screen), the time needed to occupy the observation posts and to establish the","rect":[90.0,83.50144958496094,521.973204372406,74.44780731201172]},{"page":108,"text":"screen, and the ability of indirect fire assets to range NAIs and TAIs to provide security to the protected force.","rect":[89.99004364013672,95.02519226074219,522.1406347751617,85.97154998779297]},{"page":108,"text":"Both BCT and squadron commanders and staffs consider conditions to facilitate reconnaissance handover or","rect":[89.99004364013672,106.4094467163086,522.1876516923904,97.37572479248047]},{"page":108,"text":"battle handover with the BCT. The commanders consider the time required to conduct the handover along","rect":[89.99004364013672,117.95310974121094,522.0270581245422,108.89946746826172]},{"page":108,"text":"with the time and distance needed for subordinate elements to maneuver to subsequent positions.","rect":[89.99004364013672,129.4568634033203,477.676096200943,120.42314910888672]},{"page":108,"text":"5-25. A rearward passage of lines is similar in concept to a forward passage of lines. A rearward passage of","rect":[89.98008728027344,146.99644470214845,521.9902639970779,137.9427947998047]},{"page":108,"text":"lines continues the defense or retrograde operation and maintains enemy contact while allowing for recovery","rect":[89.98009490966797,158.5201873779297,522.193256855011,149.46653747558595]},{"page":108,"text":"of security or other forward forces. A unit may or may not conduct rearward passage of lines under enemy","rect":[89.99005126953125,170.0438690185547,522.1724438667297,160.99021911621095]},{"page":108,"text":"pressure. Usually, the stationary unit assumes control of the area of operations forward of the battle handover","rect":[89.99011993408203,181.44810485839845,522.0698538408279,172.3944549560547]},{"page":108,"text":"line (BHL) after two-thirds of the passing force’s combat elements move through the passage points. A battle","rect":[89.99011993408203,192.97178649902345,522.096739528656,183.9181365966797]},{"page":108,"text":"handover line is a designated phase line where responsibility transitions from the stationary force to the","rect":[90.00011444091797,204.4955291748047,522.105772731781,195.44187927246095]},{"page":108,"text":"moving force and vice versa (ADP 3-90). Cavalry squadrons and security forces conduct extensive","rect":[90.01008605957031,216.0192108154297,522.0828845481873,206.96556091308595]},{"page":108,"text":"coordination enabling rearward passage of lines, especially while under fire. Passage of lines may occur","rect":[89.99015808105469,227.54295349121095,522.1050100908279,218.4893035888672]},{"page":108,"text":"during any reconnaissance or security operation. (Refer to FM 3-90-2 for more information.)","rect":[89.99015808105469,239.0666961669922,461.0997305498123,230.01304626464845]},{"page":108,"text":"5-26. Attack and reconnaissance aviation units screen forward, to the flanks, or to the rear of a stationary","rect":[89.98016357421875,256.4667663574219,522.009174823761,247.4131317138672]},{"page":108,"text":"main body and to the flanks or to the rear of a moving main body. The ACS is able to provide the maximum","rect":[89.98014831542969,267.9905090332031,522.1703888187409,258.9368896484375]},{"page":108,"text":"amount of reaction time and maneuver space when conducting screens, across either a wide frontage or","rect":[89.98014831542969,279.5141906738281,522.0599051103592,270.4605712890625]},{"page":108,"text":"operating in-depth with manned-unmanned teams at the ACT or squadron level. Aviation units conduct zone","rect":[89.98016357421875,291.0379333496094,522.083311794281,281.98431396484377]},{"page":108,"text":"reconnaissance forward of a moving body. Aviation units conduct continuous reconnaissance to gain contact","rect":[89.9801025390625,302.5616760253906,522.1038409481049,293.508056640625]},{"page":108,"text":"with the enemy force unless the supported commander directs otherwise.","rect":[89.9800796508789,314.08538818359377,381.549143075943,305.0317687988281]},{"page":108,"text":"5-27. Based on the BCT commander’s security guidance and intent, a screening aviation unit impedes and","rect":[89.98008728027344,331.4855041503906,522.0429883003235,322.431884765625]},{"page":108,"text":"harasses the enemy with organic and supporting fires. Within its capabilities, the unit destroys or repels","rect":[89.9801025390625,343.00921630859377,522.0050552492141,333.9555358886719]},{"page":108,"text":"enemy reconnaissance elements without decisively engaging. Upon enemy contact, the aviation unit reports","rect":[89.97006225585938,354.5329284667969,522.0020645265579,345.47930908203127]},{"page":108,"text":"the enemy location, maintains contact with the enemy force, and uses its maneuverability and fires to develop","rect":[89.97006225585938,366.056640625,522.0500683784485,357.0030212402344]},{"page":108,"text":"the situation. The BCT provides priority of fires to the aviation unit so it does not have to rely on its own","rect":[89.97006225585938,377.5803527832031,521.9860424995422,368.5267333984375]},{"page":108,"text":"direct fire weapons and risk becoming decisively engaged. Aviation units do not bypass enemy forces without","rect":[89.97006225585938,388.98455810546877,522.1104937801362,379.9309387207031]},{"page":108,"text":"the permission or direction of the main body commander.","rect":[89.97006225585938,400.50830078125,320.33790040016177,391.4546813964844]},{"page":108,"text":"5-28. Attack and reconnaissance aviation units maneuver to the enemy’s flanks and rear to locate and exploit","rect":[89.97006225585938,418.0279235839844,522.1247149715424,408.97430419921877]},{"page":108,"text":"enemy vulnerabilities and weaknesses and to conduct offensive engagements, such as hasty attack operations.","rect":[89.98002624511719,429.5516662597656,521.957102060318,420.498046875]},{"page":108,"text":"However, commanders must weigh the benefit of aviation units conducting an offensive operation against","rect":[89.98001861572266,441.0754089355469,521.9523516902924,432.02178955078127]},{"page":108,"text":"the benefit of retaining aviation units in a reconnaissance and security role.","rect":[89.98001861572266,452.5991516113281,390.06595826148989,443.5455322265625]},{"page":108,"text":"GENERAL DESCRIPTIONS OF A SCREEN","rect":[72.0,475.8600158691406,263.39973545074465,467.5440368652344]},{"page":108,"text":"5-29. Screens, even for a stationary protected force, are active operations of which stationary, observation","rect":[90.0,495.7013854980469,522.0498242378235,486.64776611328127]},{"page":108,"text":"posts and surveillance assets are only a part of the overall mission. A screen requires employment of mounted","rect":[89.99004364013672,507.22509765625,521.938618183136,498.17144775390627]},{"page":108,"text":"and dismounted patrols, aerial reconnaissance, and observation posts positioned over extended distances","rect":[89.98999786376953,518.7288818359375,522.0229385499954,509.6951904296875]},{"page":108,"text":"in-depth. Inactivity in a stationary screen yields identifiable and exploitable gaps for the threat.","rect":[89.99004364013672,530.2725830078125,469.63550782203677,521.2189331054688]},{"page":108,"text":"5-30. The BCT commander provides purpose and guidance to the Cavalry squadron commander. The BCT","rect":[89.99004364013672,547.7921752929688,522.0826913709641,538.738525390625]},{"page":108,"text":"commander states why the screen is important to the BCT mission and how it fits into the scheme of maneuver","rect":[90.0,559.31591796875,522.0838919267654,550.2622680664063]},{"page":108,"text":"of the BCT mission.","rect":[90.0,568.7182006835938,171.09131836891175,561.66650390625]},{"page":108,"text":"5-31. Depth provides the BCT commander with more time to react to approaching enemy ground units and","rect":[90.0,588.2398071289063,522.0481152534485,579.1861572265625]},{"page":108,"text":"allows for a reconnaissance handover from one element to another with minimal displacement. Depth","rect":[90.0,599.7435302734375,522.054829120636,590.7098388671875]},{"page":108,"text":"prevents the threat from easily identifying and penetrating the screen, prevents gaps from occurring when","rect":[90.0,611.2871704101563,521.896137714386,602.2335205078125]},{"page":108,"text":"observation posts displace, and facilitates the destruction of enemy reconnaissance elements without","rect":[90.0,622.8109741210938,522.1607257137299,613.7572631835938]},{"page":108,"text":"compromising critical observation posts. A unit employs depth by positioning observation posts and other","rect":[90.0,634.2151489257813,522.0707693681717,625.1614990234375]},{"page":108,"text":"information collection assets between the forward line of own troops (FLOT) and the rear boundary of the","rect":[90.0,645.7388305664063,522.088682888031,636.6851806640625]},{"page":108,"text":"security force.","rect":[90.00001525878906,657.2625732421875,147.336740732193,648.2089233398438]},{"page":108,"text":"5-32. The wider the area to secure, the less the security force can take advantage of increased depth, because","rect":[90.00001525878906,674.7822265625,522.1046130638123,665.7285766601563]},{"page":108,"text":"it has fewer forces to position in-depth. Once the BCT determines the width and depth of the security area,","rect":[90.0,686.305908203125,522.076730966568,677.2522583007813]},{"page":108,"text":"the initial screen, and probable avenues of approach, the security force orients on the protected force, area,","rect":[89.98008728027344,697.8296508789063,522.1972754001617,688.7760009765625]},{"page":108,"text":"or facility.","rect":[89.97013854980469,709.2338256835938,131.69356751441956,700.18017578125]},{"page":108,"text":"5-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":108,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":108,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":109,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":109,"text":"5-33. Maneuverof the screen elements to subsequent positions is event-driven. The approach of an identified","rect":[108.0,83.48152923583985,540.056782245636,74.44780731201172]},{"page":109,"text":"and specified threat element that answers PIRs, relief by a friendly unit, or movement of the protected force","rect":[107.99006652832031,95.02519226074219,540.0858142356873,85.97154998779297]},{"page":109,"text":"may dictate displacement. Collapsing the screen, executed by well-rehearsed drills performed at all levels,","rect":[107.99006652832031,106.42936706542969,540.0797216892242,97.37572479248047]},{"page":109,"text":"provides security, and maintains contact for the unit as it displaces. The BCT commander can place a time","rect":[107.98008728027344,117.95310974121094,540.0697009544373,108.89946746826172]},{"page":109,"text":"requirement on the duration of the screen if the intent is to provide a higher level of security to the BCT or to","rect":[107.9801025390625,129.47679138183595,540.0236401557922,120.42314910888672]},{"page":109,"text":"provide a tentative period for subordinate unit planning and follow-on missions.","rect":[107.9801025390625,141.0005340576172,421.01294922828677,131.94688415527345]},{"page":109,"text":"SCREEN TASKS","rect":[90.0,164.34002685546876,165.22621726989747,156.03604125976563]},{"page":109,"text":"5-34. Execution considerations guide screen planning. Execution considerations for a screen include the","rect":[108.0,184.3014373779297,540.1057116966248,175.24778747558595]},{"page":109,"text":"following and are conducted within capability:","rect":[108.0,195.82518005371095,294.9686785945892,186.7715301513672]},{"page":109,"text":" Maintain continuous observation of all avenues of approach that affect the main body’s mission.","rect":[133.1999969482422,209.2613983154297,536.6071875095367,200.20774841308595]},{"page":109,"text":" Conduct counterreconnaissance to destroy, defeat, or disrupt all enemy reconnaissance elements","rect":[133.1999969482422,222.70140075683595,540.0734146242141,213.6477508544922]},{"page":109,"text":"according to engagement criteria. Allow no enemy ground element to pass through the screen","rect":[151.1999969482422,234.2251434326172,539.943745136261,225.17149353027345]},{"page":109,"text":"undetected and unreported.","rect":[151.1999969482422,245.72889709472657,259.88749146461489,236.69517517089845]},{"page":109,"text":" Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[133.1999969482422,259.1813659667969,540.2418200950623,250.1277313232422]},{"page":109,"text":"enemy’s order of battle based upon the IPB (when facing an echeloned enemy force).","rect":[151.1999969482422,270.8246154785156,492.8080542087555,261.77099609375]},{"page":109,"text":" While displacing, determine the direction of enemy movement, maintain contact, and report","rect":[133.1999969482422,284.26141357421877,540.1319781551362,275.2077941894531]},{"page":109,"text":"threat activities.","rect":[151.1999969482422,293.7732238769531,215.00374817848206,286.73150634765627]},{"page":109,"text":" Maintain contact with the protected force and other forces operating on its flank.","rect":[133.1999969482422,309.2214050292969,473.7238256931305,300.16778564453127]},{"page":109,"text":" Detect and report all enemy elements attempting to pass through the screen, both ground and","rect":[133.1999969482422,322.6614074707031,540.0633130073547,313.6077880859375]},{"page":109,"text":"aerial, and provide the protected force commander early warning of enemy activities.","rect":[151.1999969482422,334.3046569824219,491.84998536109927,325.25103759765627]},{"page":109,"text":" Maintain contact with enemy forces, and report activity in the assigned area.","rect":[133.1999969482422,347.74139404296877,457.08985352516177,338.6877746582031]},{"page":109,"text":"5-35. To enhance the effectiveness and depth of the screen, the squadron’s subordinate elements conduct","rect":[108.00347137451172,365.24114990234377,539.9898272762299,356.2074279785156]},{"page":109,"text":"reconnaissance handover or battle handover to pass contact from one element to another. In this way, the","rect":[108.00347137451172,376.7847595214844,540.0496814231873,367.73114013671877]},{"page":109,"text":"methods of reconnaissance management (cueing, mixing, and redundancy) and task organization maintain","rect":[108.00347137451172,388.3084716796875,540.0326733589172,379.2548522949219]},{"page":109,"text":"threat contact and protect the main effort following the commander’s intent.","rect":[108.00347137451172,399.7126770019531,412.1601049900055,390.6590576171875]},{"page":109,"text":"STATIONARY SCREEN","rect":[90.0,423.05999755859377,197.03973484039308,414.7560119628906]},{"page":109,"text":"5-36.","rect":[108.0,440.98956298828127,128.96579957008363,434.14703369140627]},{"page":109,"text":"A squadron executing astationary screenmission (see figure5-1,page 5-10)requires the followingguidance:","rect":[133.1988067626953,443.0213928222656,536.6535235652924,433.9677734375]},{"page":109,"text":" General trace of screen and time it should be established.","rect":[133.1999969482422,454.4594421386719,379.55704712867739,447.40777587890627]},{"page":109,"text":" Commander’s security guidance.","rect":[133.1999969482422,470.0213928222656,283.0504858493805,460.9677734375]},{"page":109,"text":" Information collection plan.","rect":[133.1999969482422,483.4414978027344,263.25000977516177,474.40777587890627]},{"page":109,"text":" Width of the screened sector.","rect":[133.1999969482422,495.0194396972656,268.1851599216461,487.9677734375]},{"page":109,"text":" Identity of screened force.","rect":[133.1999969482422,510.4613952636719,256.3048803806305,501.40777587890627]},{"page":109,"text":" Rear boundary of the screening force.","rect":[133.1999969482422,524.0214233398438,302.24634766578677,514.9677734375]},{"page":109,"text":" Possible follow-on missions.","rect":[133.1999969482422,535.449462890625,266.48600220680239,528.4077758789063]},{"page":109,"text":"5-37. The tasks required of a screening unit are minimal compared to other security missions. Therefore, the","rect":[107.99351501464844,555.1005859375,540.100401638031,546.0469360351563]},{"page":109,"text":"screening force may have a wide frontage. Usually, units deploy abreast with troops established in-depth.","rect":[107.99351501464844,566.5048217773438,529.4000952243805,557.451171875]},{"page":109,"text":"5-38. A PL placed along identifiable terrain graphically indicates the FLOT and can serve as an LOA. When","rect":[107.99354553222656,584.0244140625,540.0686841011047,574.9707641601563]},{"page":109,"text":"screening forward of the BCT, this PL represents the forward line of the screening unit troops. A boundary","rect":[108.00350189208985,595.5481567382813,540.0434765815735,586.4945068359375]},{"page":109,"text":"depicts the rear limit of the screen. The screening force is responsible for the area between the screened force","rect":[108.00348663330078,607.0718383789063,540.143126247406,598.0181884765625]},{"page":109,"text":"and the rear screen boundary. The boundary may serve as a BHL or a reconnaissance handover line. The","rect":[108.00348663330078,618.5955810546875,540.083800075531,609.5419311523438]},{"page":109,"text":"screening force uses other PLs to control forward and backward displacements of subordinate units of the","rect":[108.00350189208985,629.9998168945313,540.0733630638123,620.9461669921875]},{"page":109,"text":"screening force and to aid in reporting and orientation. The screening force designates sectors to control lateral","rect":[108.00346374511719,641.5234985351563,540.0104571590424,632.4698486328125]},{"page":109,"text":"movement of subordinate units.","rect":[108.00346374511719,652.0,232.29430603981019,643.9935302734375]},{"page":109,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":109,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":109,"text":"5-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":110,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":110,"text":"Figure 5-1. SBCT stationary screen mission","rect":[193.55999755859376,532.24169921875,400.1602670545578,522.9091796875]},{"page":110,"text":"5-39. Given the higher commander’s guidance (security objective, focus, duration, and engagement criteria),","rect":[89.99591064453125,549.821044921875,522.0846045017242,540.7574462890625]},{"page":110,"text":"commanders and staffs consider the following during planning:","rect":[89.99592590332031,561.2252807617188,343.68114197349549,552.171630859375]},{"page":110,"text":" Location of the initial screen.","rect":[115.19999694824219,572.6494750976563,250.76183533668519,565.6077880859375]},{"page":110,"text":" Movement or maneuver to occupy the screen.","rect":[115.19999694824219,588.221435546875,316.28565430641177,579.1677856445313]},{"page":110,"text":" Assigned area of operations for subordinate elements.","rect":[115.19999694824219,601.6614379882813,348.450510263443,592.6077880859375]},{"page":110,"text":" Air and ground integration.","rect":[115.19999694824219,615.221435546875,242.72811341285706,606.1677856445313]},{"page":110,"text":" Surveillance and acquisition assets.","rect":[115.19999694824219,628.6414794921875,274.6448767185211,619.6077880859375]},{"page":110,"text":" Fires.","rect":[115.19999694824219,640.20947265625,155.60999512672425,633.1677856445313]},{"page":110,"text":" Protection.","rect":[115.19999694824219,653.6494750976563,176.84771180152894,646.6077880859375]},{"page":110,"text":" Command and control.","rect":[115.19999694824219,667.219482421875,225.2104742527008,660.1677856445313]},{"page":110,"text":" Sustainment.","rect":[115.19999694824219,680.6594848632813,185.12745118141175,673.6077880859375]},{"page":110,"text":" Control of displacement to subsequent positions.","rect":[115.19999694824219,696.2014770507813,328.1669409275055,687.1677856445313]},{"page":110,"text":" Reconnaissance handover between screening elements.","rect":[115.19999694824219,709.6614379882813,353.96439576148989,700.6077880859375]},{"page":110,"text":"5-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":110,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":110,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":111,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":111,"text":"INITIAL SCREEN","rect":[90.0,83.34003448486328,170.8797311782837,75.0360336303711]},{"page":111,"text":"5-40. The BCT establishes the general location of the initial screen. To prevent fratricide, the squadron or","rect":[108.0,103.30143737792969,540.0697317705154,94.24779510498047]},{"page":111,"text":"screening unit adjusts closer to the protected force only with coordination. The initial screen often represents","rect":[108.0,114.82518005371094,540.1605728273391,105.7615737915039]},{"page":111,"text":"the FLOT. The initial screen is a restrictive control measure requiring coordination when units move beyond","rect":[108.0,126.22935485839844,539.9339184761047,117.17559051513672]},{"page":111,"text":"it to conduct aerial surveillance or ground reconnaissance. If operations forward of the screen are required,","rect":[108.0,137.7530975341797,540.1079199314117,128.69932556152345]},{"page":111,"text":"the commander establishes a PL to designate the security unit LOA. Key considerations include determining","rect":[108.0,149.2767791748047,540.0569043159485,140.22312927246095]},{"page":111,"text":"fields of fire and observation, requirements to observe specific NAIs or TAIs, and the range of supporting","rect":[108.0,160.80052185058595,540.020161151886,151.7468719482422]},{"page":111,"text":"indirect fire assets.","rect":[108.0,170.31234741210938,183.20597290992738,163.27061462402345]},{"page":111,"text":"5-41. With permission from the BCT, the squadron or screening unit can adjust the initial screen to meet","rect":[108.0,189.84385681152345,540.0769854793549,180.78025817871095]},{"page":111,"text":"these considerations. Time available and the threat situation determine the method of occupying the screen.","rect":[108.0,201.2480926513672,537.4552710056305,192.19444274902345]},{"page":111,"text":"AREAS OF OPERATION FOR SUBORDINATE ELEMENTS","rect":[90.0,224.58001708984376,354.2353267669678,216.27603149414063]},{"page":111,"text":"5-42. The squadron or screening unit commander designates areas of operations for subordinate elements to","rect":[108.0,244.5414276123047,539.9394726753235,235.48777770996095]},{"page":111,"text":"include responsibility for NAIs and TAIs. The commander positions attack and reconnaissance aviation, UAS","rect":[108.0,256.0651550292969,540.0480139274597,247.01145935058595]},{"page":111,"text":"or ground-based sensors, and SIGINT systems to provide additional depth. Reduced depth is the trade-off","rect":[108.0,267.5888366699219,540.0588675127029,258.53521728515627]},{"page":111,"text":"when screening extended frontages. The commander may assign specific terrain to attack and reconnaissance","rect":[107.9801025390625,279.1125793457031,540.0996081809998,270.0589599609375]},{"page":111,"text":"aviation units and UASs, which should not be along critical high-speed avenues of approach. The","rect":[107.99004364013672,290.63629150390627,540.0761096458435,281.5826721191406]},{"page":111,"text":"commander’s plans include reconnaissance management (cueing, mixing, and redundancy) to maximize","rect":[107.98999786376953,302.0404968261719,540.118712184906,292.98687744140627]},{"page":111,"text":"coverage and effectiveness. Commanders specify how to adjust ground observation posts or positions to","rect":[107.99004364013672,313.564208984375,540.0458569526672,304.5006103515625]},{"page":111,"text":"compensate for the absence of visual observation with aerial assets, such as in adverse weather.","rect":[107.99004364013672,325.0680236816406,489.55765748023989,316.0343017578125]},{"page":111,"text":"5-43. Attack and reconnaissance aviation and UASs, or attached, manned aviation assets may conduct","rect":[107.99004364013672,342.6075744628906,540.0179644832612,333.553955078125]},{"page":111,"text":"reconnaissance forward, to the rear, or on the flanks of ground elements to add depth and extend the","rect":[108.00001525878906,354.13128662109377,540.112608669281,345.0776672363281]},{"page":111,"text":"capabilities of the ground screen. Aerial assets patrol along exposed flanks or in gaps between ground","rect":[108.00001525878906,365.5354919433594,540.097065448761,356.48187255859377]},{"page":111,"text":"observation posts, augment the surveillance of NAIs, and add redundancy and depth within the sector. Aerial","rect":[108.00001525878906,377.0592041015625,540.1358233699799,368.0055847167969]},{"page":111,"text":"reconnaissance units extend a ground screen or provide an independent screen to protect ground forces.","rect":[108.00001525878906,388.5829162597656,540.111887216568,379.529296875]},{"page":111,"text":"Aviation assets provide continuous observation of threat elements allowing ground forces to displace to","rect":[108.00001525878906,400.10662841796877,539.9306225776672,391.0530090332031]},{"page":111,"text":"subsequent positions.","rect":[108.0,411.6105041503906,193.64306092262269,402.5767822265625]},{"page":111,"text":"5-44. Using its own or the BCT’s organic surveillance and acquisition assets, such as UASs and ground","rect":[107.99004364013672,429.1500244140625,540.044819355011,420.0964050292969]},{"page":111,"text":"sensors, the screening unit develops a plan to provide early warning on the probable avenues of approach.","rect":[107.99000549316406,440.5542297363281,540.0717260837555,431.5006103515625]},{"page":111,"text":"Nonorganic, higher assets, such as Joint Surveillance Target Attack Radar Systems, provide earlier","rect":[107.99000549316406,452.0779724121094,540.0747366533279,443.02435302734377]},{"page":111,"text":"acquisition information to cue unit assets.","rect":[107.99004364013672,463.5817565917969,274.5171911716461,454.54803466796877]},{"page":111,"text":"Note. Most probable avenues of approach are not necessarily the high-speed avenues of approach.","rect":[133.1888427734375,486.8214111328125,522.0942480564117,477.7677917480469]},{"page":111,"text":"The factors of METT-TC (I) influence the most probable avenues of approach.","rect":[133.1999969482422,498.3215026855469,448.65210938453677,489.28778076171877]},{"page":111,"text":"5-45. BCT assets aid the squadron or screening unit when it is collapsing the screen and is most vulnerable,","rect":[108.0,530.5014038085938,540.2042334079742,521.44775390625]},{"page":111,"text":"and they assist with regaining contact with the threat when contact is lost. If the squadron screens extended","rect":[107.98999786376953,542.0250854492188,540.0408520698547,532.971435546875]},{"page":111,"text":"frontages, these assets can operate in an economy of force role by conducting periodic surveillance on less","rect":[107.99004364013672,553.548828125,540.0120132570266,544.4951782226563]},{"page":111,"text":"probable areas the threat may useand by maximizing ground combat power alongprobable avenues of approach.","rect":[107.99006652832031,565.0725708007813,540.0807592868805,556.0189208984375]},{"page":111,"text":"5-46. Fires planning include the integration of direct and indirect fires, attack aviation, and close air support.","rect":[107.99004364013672,582.5922241210938,540.2042334079742,573.53857421875]},{"page":111,"text":"The commander’s intent drives the screen’s purpose, which is to report, disrupt, delay, or destroy specific","rect":[107.98999786376953,594.1159057617188,539.9501941184998,585.062255859375]},{"page":111,"text":"elements of the threat’s formations. The staff plans targets at chokepoints along probable avenues of approach","rect":[107.98007202148438,605.5201416015625,540.0439038276672,596.4664916992188]},{"page":111,"text":"in areas where the threat movement may be restricted or severely restricted, such as those areas with natural","rect":[107.98008728027344,617.0438842773438,540.1195880184174,607.990234375]},{"page":111,"text":"or manufactured obstacles. Commanders designate engagement areas to focus fires along likely threat","rect":[107.98008728027344,628.5675659179688,540.1364947566987,619.513916015625]},{"page":111,"text":"avenues of approach where the fires have the greatest likelihood of achieving the desired effects. The higher","rect":[107.98008728027344,640.0912475585938,540.0660086259842,631.03759765625]},{"page":111,"text":"headquarters must clearly identify the command and support relationship of supporting artillery available to","rect":[107.98008728027344,651.614990234375,540.028950214386,642.5613403320313]},{"page":111,"text":"the screening force. Annex D of the OPORD articulates the fire support tasks and communication means","rect":[107.98008728027344,663.0192260742188,540.1096695070266,653.965576171875]},{"page":111,"text":"(including voice and digital), additional fire support coordination measures, and planned position areas for artillery.","rect":[107.98011016845703,674.5429077148438,537.5736181735992,665.4892578125]},{"page":111,"text":"5-47. Engineers provide mobility, countermobility, and survivability capabilities for specific tasks, such as","rect":[107.98011016845703,692.0625610351563,540.1305435304641,683.0089111328125]},{"page":111,"text":"improvement of roads and trails for mobility, emplacement of obstacles, and observation post survivability.","rect":[107.97013854980469,703.5862426757813,540.0528662204742,694.5325927734375]},{"page":111,"text":"Reserve obstacles are planned and prepared but are not executed until time or event criteria are met.","rect":[107.97013854980469,715.0900268554688,540.1036474704742,706.0563354492188]},{"page":111,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":111,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":111,"text":"5-11","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":112,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":112,"text":"Generally, engineers use rapidly emplaced obstacle systems, which meet the commander’s intent during","rect":[90.0,83.50144958496094,522.0678296089172,74.44780731201172]},{"page":112,"text":"screening operations. Situational obstacles disrupt and delay the threat, in conjunction with fires, to protect","rect":[90.00999450683594,95.02519226074219,522.0984698543549,85.96158599853516]},{"page":112,"text":"elements of the screening unit and main body.","rect":[90.00999450683594,106.42936706542969,270.57483887672427,97.37572479248047]},{"page":112,"text":"COMMAND AND CONTROL AND SUSTAINMENT","rect":[72.0,123.77997589111328,298.14435720443728,115.4759750366211]},{"page":112,"text":"5-48. Commanders position themselves and their command posts to support command and control forces","rect":[90.0,143.72145080566407,522.0190322999954,134.68772888183595]},{"page":112,"text":"over extended distances and to maintain communications and digital linkages with higher headquarters and","rect":[90.00995635986328,155.26512145996095,522.0728344917297,146.2114715576172]},{"page":112,"text":"subordinate elements. Initial and subsequent locations of the command posts integrate into the BCT","rect":[90.01000213623047,166.78880310058595,521.8576547498703,157.7351531982422]},{"page":112,"text":"communications plan to ensure continuous digital connectivity. BCT and squadron commanders place","rect":[90.01994323730469,178.3125457763672,522.1318347434998,169.25889587402345]},{"page":112,"text":"themselves in positions that maximize their ability to command their units and gain situational awareness.","rect":[90.01994323730469,189.8362274169922,513.5869238376617,180.78257751464845]},{"page":112,"text":"5-49. Prepare sustainment assets for operations in both time and space. Units screening forward or to the","rect":[90.01994323730469,207.2363739013672,522.0710437278748,198.18272399902345]},{"page":112,"text":"flanks of the BCT may require support from the closest battalion. Priorities and sources of support are","rect":[90.01995086669922,218.76011657714845,522.1766345481873,209.7064666748047]},{"page":112,"text":"determined early in the planning process to allow the supporting sustainment unit time to conduct planning,","rect":[90.01995086669922,230.28379821777345,522.0927832126617,221.2301483154297]},{"page":112,"text":"coordinate with adjacent units, and position assets to provide sustainment to the screening units.","rect":[90.01995086669922,241.8075408935547,474.10355591773989,232.7439422607422]},{"page":112,"text":"5-50. The screen’s scheme of maneuver, engagement, and disengagement criteria nested within the BCT","rect":[90.01995086669922,259.3271789550781,521.9582406873703,250.27354431152345]},{"page":112,"text":"plan defines the conditions or time criteria triggering transition. PLs and checkpoints control transition.","rect":[90.01996612548828,270.8508605957031,522.1246435642242,261.7972412109375]},{"page":112,"text":"Transition of a screening unit is a decision point that marks a shift from security operations to offensive or","rect":[90.02989959716797,282.2550964355469,521.9770804033279,273.20147705078127]},{"page":112,"text":"defensive operations.","rect":[90.0298843383789,293.7588806152344,175.08330750465394,284.72515869140627]},{"page":112,"text":"Note. As stated earlier in chapter 4, the BCT or squadron commander may establish additional","rect":[115.19880676269531,317.0213928222656,504.0803424129486,307.9677734375]},{"page":112,"text":"routes as a control measure to conduct transitions while maintaining freedom of maneuver and","rect":[115.19999694824219,328.5413818359375,504.13216066360476,319.4877624511719]},{"page":112,"text":"controlling ","rect":[115.19999694824219,340.0650939941406,161.6106207370758,331.011474609375]},{"page":112,"text":"maneuver ","rect":[166.79977416992188,339.0,208.64969849586488,333.0]},{"page":112,"text":"forces ","rect":[213.8388671875,339.0,240.6880133152008,331.02142333984377]},{"page":112,"text":"without ","rect":[245.87716674804688,339.0,278.9662573337555,331.011474609375]},{"page":112,"text":"slowing ","rect":[284.1554260253906,340.0650939941406,318.32422852516177,331.011474609375]},{"page":112,"text":"or ","rect":[323.3948669433594,339.0,334.2841284275055,333.0]},{"page":112,"text":"congestion ","rect":[339.47332763671877,340.0650939941406,385.16883301734927,331.011474609375]},{"page":112,"text":"of ","rect":[390.3580322265625,339.0,401.127756357193,331.02142333984377]},{"page":112,"text":"one ","rect":[406.31695556640627,339.0,423.207102060318,333.0]},{"page":112,"text":"single ","rect":[428.39630126953127,340.0650939941406,454.766428232193,331.011474609375]},{"page":112,"text":"route ","rect":[459.95556640625,339.0,482.84668946266177,332.0074768066406]},{"page":112,"text":"(see","rect":[488.03582763671877,340.0451965332031,504.09734988021855,331.011474609375]},{"page":112,"text":"paragraph 4-70, page 4-16).","rect":[115.19999694824219,351.5888366699219,226.64243531227113,342.53521728515627]},{"page":112,"text":"MOVING SCREEN (FLANK AND REAR)","rect":[72.0,382.7879943847656,257.07600183105469,372.2760009765625]},{"page":112,"text":"5-51. A squadron or screening unit executes a moving screen by implementing movement techniques. The","rect":[90.0,400.5413818359375,522.0927112083435,391.4877624511719]},{"page":112,"text":"screen movement relies upon time and distance factors associated with the BCT’s movement.","rect":[90.0,412.0451965332031,522.0917456150055,403.011474609375]},{"page":112,"text":"Responsibilities for a moving flank screen begin at the front of the BCT’s lead combat element, and ends at","rect":[90.0,423.5888366699219,522.1327105770112,414.53521728515627]},{"page":112,"text":"the rear of the protected force excluding front and rear security forces. The screening unit, typically the","rect":[90.0,435.112548828125,522.0950915794373,426.0589294433594]},{"page":112,"text":"Cavalry squadron, may conduct moving flank screens or screen the rear of the BCT.","rect":[90.0,446.5167541503906,426.811350107193,437.463134765625]},{"page":112,"text":"5-52. As with a stationary screen, PLs, checkpoints, contact points, and lateral boundaries aid to orient and","rect":[89.99998474121094,464.036376953125,522.0489087104797,454.9827575683594]},{"page":112,"text":"control the screening unit’s movement. The LD, which is the same for the protected force, initiates the screen","rect":[89.99999237060547,475.5600891113281,521.9661450386047,466.5064697265625]},{"page":112,"text":"mission and becomes the rear boundary of the moving screen.","rect":[90.00995635986328,487.0838317871094,337.77796387672427,478.03021240234377]},{"page":112,"text":"5-53. The planning considerations discussed earlier for stationary screens apply to a moving screen.","rect":[90.00995635986328,504.60345458984377,521.965402841568,495.5498352050781]},{"page":112,"text":"However, emphasis may shift because the BCT is moving. As the BCT force moves, the screening unit","rect":[90.00995635986328,516.127197265625,522.1394854793549,507.07354736328127]},{"page":112,"text":"occupies a series of successive screens, regulating movement to maintain the time and distance factors the","rect":[90.00995635986328,527.5314331054688,522.0151355247498,518.477783203125]},{"page":112,"text":"main body commander desires. As with the stationary screen, integrating attack and reconnaissance aviation","rect":[90.00995635986328,539.0551147460938,521.9641919136047,530.00146484375]},{"page":112,"text":"units and UASs into the screen affords increased flexibility, fires platforms, and sensors to the mission.","rect":[90.00999450683594,550.5787963867188,502.66492676734927,541.525146484375]},{"page":112,"text":"Note. Cavalry units do not conduct a moving screen to the front of a stationary force or a stationary","rect":[115.19883728027344,573.8214111328125,504.07127809524538,564.7677612304688]},{"page":112,"text":"screen in front of a moving force. They could conduct an advance guard, reconnaissance in force,","rect":[115.19999694824219,585.3414306640625,503.9945776462555,576.2877807617188]},{"page":112,"text":"or zone reconnaissance to the front of a moving force.","rect":[115.19999694824219,596.8651733398438,331.28516602516177,587.8115234375]},{"page":112,"text":"GUARD","rect":[72.0,627.810546875,123.4186945476532,618.0808715820313]},{"page":112,"text":"5-54. Guard is a type of security operation done to protect the main body by fighting to gain time while","rect":[90.0,648.1014404296875,521.9432971458435,639.0477905273438]},{"page":112,"text":"preventing enemy ground observation of and direct fire against the main body (ADP 3-90). Units conducting","rect":[90.0,659.6251831054688,522.0598340034485,650.571533203125]},{"page":112,"text":"a guard cannot operate independently because they rely upon fires and functional and multifunctional support","rect":[90.00003814697266,671.1488647460938,522.1284381160737,662.09521484375]},{"page":112,"text":"assets of the main body. A commander assigns a guard operation when the BCT expects contact or has an","rect":[90.0,682.672607421875,522.064838886261,673.6189575195313]},{"page":112,"text":"exposed flank that requires greater protection than a screen can provide. The guard force conducts","rect":[90.0,694.1962890625,522.1337173585891,685.1426391601563]},{"page":112,"text":"reconnaissance, attacks, defends, delays, and screens as needed to provide reaction time and maneuver space","rect":[90.0,705.6005249023438,522.1026599388123,696.546875]},{"page":112,"text":"5-12","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":112,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":112,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":113,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":113,"text":"to the protected force. A commander may assign a guardoperationto protect a stationary or moving force.There are","rect":[108.0,83.50144958496094,540.4881579856873,74.44780731201172]},{"page":113,"text":"three types of guard operations—","rect":[107.99998474121094,95.02519226074219,233.3963861465454,85.97154998779297]},{"page":113,"text":" Advance guard.","rect":[133.1999969482422,108.46141052246094,214.65516114234925,99.40776824951172]},{"page":113,"text":" Flank guard.","rect":[133.1999969482422,121.90141296386719,201.80675721168519,112.84777069091797]},{"page":113,"text":" Rear guard.","rect":[133.1999969482422,135.46141052246095,197.97913575172425,126.40776824951172]},{"page":113,"text":"5-55. A Cavalry squadron, maneuver battalion, or BCT performs guard operations. A guard force operates","rect":[108.00347900390625,152.98106384277345,540.1638687257766,143.9274139404297]},{"page":113,"text":"within the range of the main body’s indirect fire weapons. A guard force accomplishes all the tasks of a","rect":[108.0034408569336,164.50474548339845,539.9693591575623,155.4510955810547]},{"page":113,"text":"screen, but then deploys over a narrower front to permit the concentration of combat power. Squadron-sized","rect":[107.99349975585938,176.0284881591797,540.0443921089172,166.97483825683595]},{"page":113,"text":"elements or higher generally conduct guard operations due to the protection and assets required. A BCT","rect":[107.98355102539063,187.4326629638672,539.9487802381516,178.37901306152345]},{"page":113,"text":"conducts guard for the division and corps.","rect":[107.97359466552735,198.95640563964845,276.0604956150055,189.9027557373047]},{"page":113,"text":"5-56. Staffs consider augmenting the guard force based on the anticipated threat and tasks for the guard force.","rect":[107.98355102539063,216.47605895996095,540.0761816501617,207.4224090576172]},{"page":113,"text":"Dependent on the BCT type, the guard force has different combat power capabilities than the parent force it","rect":[107.98360443115235,227.9998016357422,539.9818927059174,218.94615173339845]},{"page":113,"text":"protects. Additionally, BCT commanders consider and plan for the integration of assets and enablers across","rect":[107.98355865478516,239.5234832763672,540.0069473390579,230.46983337402345]},{"page":113,"text":"all warfighting functions.","rect":[107.98355865478516,251.04722595214845,209.47098755836488,241.9935760498047]},{"page":113,"text":"5-57. The guard force differs from a screen in that the guard force contains sufficient combat power to defeat,","rect":[107.98355865478516,268.4472961425781,540.0874121189117,259.3936767578125]},{"page":113,"text":"cause to withdraw, or fix lead threat elements before they can engage the protected force and forces the","rect":[107.98355865478516,279.9710388183594,540.0742175559998,270.91741943359377]},{"page":113,"text":"enemy main body to deploy early. A guard force is appropriate when contact is expected, there is an exposed","rect":[107.98355102539063,291.4947204589844,540.080219745636,282.44110107421877]},{"page":113,"text":"flank or a threat to the rear, the protected force is conducting a retrograde operation, or there is a requirement","rect":[107.98355102539063,303.0184631347656,540.1263018856049,293.96484375]},{"page":113,"text":"for greater protection than a screen provides.","rect":[107.98355102539063,314.54217529296877,287.10914063453677,305.4885559082031]},{"page":113,"text":"5-58. Attack and reconnaissance aviation units supporting a guard operation accomplish all the tasks of a","rect":[107.98355102539063,332.0617980957031,539.9564197044373,323.0081787109375]},{"page":113,"text":"screen, zone reconnaissance, and hasty attack mission. Units place emphasis on the early development of the","rect":[107.97360229492188,343.4660339355469,540.0692126731873,334.41241455078127]},{"page":113,"text":"situation along the main body’s axis of advance. Early contact with the enemy may cause enemy forces to","rect":[107.963623046875,354.98974609375,540.024311542511,345.9361267089844]},{"page":113,"text":"deploy prematurely providing opportunity to the main body to counterattack a vulnerable enemy force. Aerial","rect":[107.96360778808594,366.5134582519531,539.9827471981049,357.4598388671875]},{"page":113,"text":"assets support the guard force by screening between and in front of battle positions as they are established.","rect":[107.96360778808594,378.03717041015627,540.0622045993805,368.9835510253906]},{"page":113,"text":"Aviation reconnoiters the area between the guard or cover force and the main body, assists in maintaining","rect":[107.96360778808594,389.5608825683594,540.1122632026672,380.50726318359377]},{"page":113,"text":"contact between the security force and the main body, and protects the flank guard force to allow it to","rect":[107.96360778808594,400.965087890625,540.0713696479797,391.9114685058594]},{"page":113,"text":"concentrate on its security or battle position tasks. When supporting a moving force, aviation units","rect":[107.96360778808594,412.4888000488281,539.9945572023391,403.4351806640625]},{"page":113,"text":"reconnoiter along the flanks of advancing ground units by conducting any type of reconnaissance to","rect":[107.963623046875,424.01251220703127,540.029438495636,414.9588928222656]},{"page":113,"text":"successive screen areas, observation posts, or battle positions.","rect":[107.97360229492188,435.5163879394531,355.13102173805239,426.482666015625]},{"page":113,"text":"GUARD TASKS","rect":[90.0,458.82000732421877,161.98622703552247,450.5040283203125]},{"page":113,"text":"5-59.","rect":[108.0,476.7695007324219,128.96579957008363,469.90704345703127]},{"page":113,"text":"BCTs, maneuver battalions, and squadrons conduct the following guard tasks within capability:","rect":[133.1988067626953,478.7814025878906,515.6429034481049,469.727783203125]},{"page":113,"text":" Detect and report all enemy elements attempting to pass through the guard, both ground and aerial","rect":[133.1999969482422,492.2214050292969,540.1460162410737,483.16778564453127]},{"page":113,"text":"and provide the protected force commander early warning of enemy activities.","rect":[151.1999969482422,503.7451171875,464.76600098609927,494.6914978027344]},{"page":113,"text":" Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements according","rect":[133.1999969482422,517.1814575195313,540.1023144721985,508.1278076171875]},{"page":113,"text":"to engagement criteria.","rect":[151.1999969482422,528.7051391601563,243.22239136695863,519.6514892578125]},{"page":113,"text":" Maintain contact with the protected force and other forces operating on its flanks.","rect":[133.1999969482422,542.1414184570313,477.5634253025055,533.0877685546875]},{"page":113,"text":" Maintain observation of avenues of approach that affect the protected forces missions.","rect":[133.1999969482422,555.6814575195313,496.16459107398989,546.6477661132813]},{"page":113,"text":" Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[133.1999969482422,569.1414184570313,540.2457873802185,560.0877685546875]},{"page":113,"text":"enemy’s order of battle based upon the IPB (when facing an echeloned enemy force).","rect":[151.1999969482422,580.78466796875,492.8409216403961,571.7310180664063]},{"page":113,"text":" While displacing, determine the direction of enemy movement, maintain contact, and report","rect":[133.1999969482422,594.221435546875,540.1350299129487,585.1677856445313]},{"page":113,"text":"threat activities.","rect":[151.1999969482422,603.7332153320313,215.00374817848206,596.6915283203125]},{"page":113,"text":"","rect":[133.1999969482422,616.461181640625,139.2058769197464,611.733642578125]},{"page":113,"text":"","rect":[133.1999969482422,641.421142578125,139.2058769197464,636.693603515625]},{"page":113,"text":"","rect":[133.1999969482422,654.9811401367188,139.2058769197464,650.2536010742188]},{"page":113,"text":"","rect":[133.1999969482422,668.421142578125,139.2058769197464,663.693603515625]},{"page":113,"text":"","rect":[133.1999969482422,681.9811401367188,139.2058769197464,677.2536010742188]},{"page":113,"text":"While displacing, impede and harass the enemy to provide the protected force commander with","rect":[151.1999969482422,619.1814575195313,540.027485370636,610.1278076171875]},{"page":113,"text":"additional time and maneuver space.","rect":[151.1999969482422,630.6851806640625,297.5890600681305,621.6514892578125]},{"page":113,"text":"Cause the enemy main body to deploy prematurely.","rect":[151.1999969482422,644.1414184570313,357.930734872818,635.0877685546875]},{"page":113,"text":"Maintain contact with enemy forces and report activity in the assigned area.","rect":[151.1999969482422,657.701416015625,454.54871582984927,648.6477661132813]},{"page":113,"text":"Deny ground observation, and prevent direct fire contact on the protected forces.","rect":[151.1999969482422,671.1414184570313,474.2416784763336,662.0877685546875]},{"page":113,"text":"Deny the enemy information about the size, strength, composition, and objective of the main body.","rect":[151.1999969482422,684.701416015625,540.1093237400055,675.6378173828125]},{"page":113,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":113,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":113,"text":"5-13","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":114,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":114,"text":"5-60.","rect":[90.0,81.4696044921875,110.96579957008362,74.62708282470703]},{"page":114,"text":"Following are additional tasks if encounter turns into a meeting engagement:","rect":[115.19880676269531,83.50144958496094,422.5186053524017,74.44780731201172]},{"page":114,"text":" Destroy enemy reconnaissance and lead elements of the main body.","rect":[115.19999694824219,96.94139099121094,404.364084482193,87.88774871826172]},{"page":114,"text":" Determine the location of enemy assailable flanks.","rect":[115.19999694824219,110.38139343261719,335.634104013443,101.32775115966797]},{"page":114,"text":" Fix enemy forces to allow the main body to maneuver around the ","rect":[115.19999694824219,123.94139099121094,435.19239258766177,114.88774871826172]},{"page":114,"text":"through weaknesses.","rect":[133.1999969482422,135.4651336669922,217.53629517555238,126.41149139404297]},{"page":114,"text":"enemy ","rect":[437.7421875,123.94139099121094,467.948801279068,116.0]},{"page":114,"text":"strengths ","rect":[470.49859619140627,123.94139099121094,510.786691904068,114.88774871826172]},{"page":114,"text":"or","rect":[513.33642578125,122.0,521.8133841142654,116.0]},{"page":114,"text":"5-61. Staffs consider whether subordinate units conducting a guard operation require augmentation to","rect":[90.00347137451172,152.98472595214845,522.070454120636,143.9310760498047]},{"page":114,"text":"execute their mission. Additionally, squadron commanders and staffs analyze requirements and notify the","rect":[90.00347137451172,164.5084686279297,521.9598376731873,155.45481872558595]},{"page":114,"text":"BCT commander of those tasks they cannot accomplish. The protected force commander then task organizes","rect":[90.013427734375,176.03221130371095,522.1727798585891,166.9785614013672]},{"page":114,"text":"more augmentation or provides guidance on the prioritization of tasks.","rect":[90.01341247558594,187.43638610839845,371.61951661109927,178.3827362060547]},{"page":114,"text":"BCT PLANNING AND EXECUTION CONSIDERATIONS","rect":[72.0,210.76797485351563,326.36810874938967,202.47598266601563]},{"page":114,"text":"5-62. BCT commanders, or higher echelon commanders in the case of a TF or reconnaissance and security","rect":[90.0,230.7413787841797,522.067768573761,221.68772888183595]},{"page":114,"text":"BCT conducting a guard, may augment the guard force with internal and external assets. Attack and","rect":[90.0,242.26512145996095,522.0629467964172,233.2114715576172]},{"page":114,"text":"reconnaissance aviation assists the guard force by gaining contact with enemy forces and reporting the","rect":[90.0,253.78880310058595,522.1048572044373,244.7351531982422]},{"page":114,"text":"enemy’s composition, disposition, and strength. Aerial assets can maneuver and assist in destroying enemy","rect":[90.0,265.3125305175781,522.056782245636,256.2589111328125]},{"page":114,"text":"ground forces over large areas to weaker sections to maintain the guard. Aerial assets can be a quick reaction","rect":[90.0,276.8362121582031,522.0946850776672,267.7825927734375]},{"page":114,"text":"force to destroy enemy ground forces and reinforcements through Army attack aviation that canalize the","rect":[90.00001525878906,288.2404479980469,522.1096179466248,279.18682861328127]},{"page":114,"text":"enemy towards areas that the guard force fires plan supports. Indirect fire considerations are the same as in a","rect":[90.00003814697266,299.76416015625,522.014219997406,290.7105407714844]},{"page":114,"text":"screen, though the guarding unit may have more indirect fire assets at their disposal. BCT engineers conduct","rect":[90.01000213623047,311.2878723144531,522.1369220027924,302.2342529296875]},{"page":114,"text":"countermobility and survivability tasks to assist the guard force.","rect":[90.0,322.8116149902344,346.42017579078677,313.75799560546877]},{"page":114,"text":"ADVANCE GUARD (STATIONARY AND MOVING)","rect":[72.0,348.3479919433594,304.3559853515625,337.8240051269531]},{"page":114,"text":"5-63. An advance guard for a stationary BCT deploys forward and defends the main body. Once the unit","rect":[90.0,366.10137939453127,522.0750323543549,357.0477600097656]},{"page":114,"text":"makes contact, they continue to defend or delay within the area of operations consistent with the BCT","rect":[90.0,377.5055847167969,522.0171396131516,368.45196533203127]},{"page":114,"text":"commander’s intent.","rect":[90.0,387.01739501953127,172.28751587867738,379.9756774902344]},{"page":114,"text":"5-64. An advance guard for a moving force is offensive in nature, finding and defeating enemy units along","rect":[90.0,406.5489501953125,522.0371289253235,397.4953308105469]},{"page":114,"text":"the axis of advance. Units conducting an advance guard provide for the uninterrupted movement of the","rect":[90.0,418.0726623535156,522.1328113059998,409.01904296875]},{"page":114,"text":"protected force. The advance guard engages in offensive tasks and movement to contact as needed to","rect":[90.0,429.59637451171877,522.0707592964172,420.5427551269531]},{"page":114,"text":"accomplish the mission. If the advance guard encounters enemy forces beyond its capability, the advance","rect":[90.0,441.1200866699219,522.0649402122498,432.06646728515627]},{"page":114,"text":"guard transitions to a defense to protect the BCT, continues reconnaissance to develop the situation, and","rect":[89.99003601074219,452.5242919921875,521.9792675971985,443.4706726074219]},{"page":114,"text":"prepares to pass elements of the main body forward. If the BCT is advancing as part of a division advance","rect":[89.99003601074219,464.0480041503906,522.077696559906,454.994384765625]},{"page":114,"text":"along widely separated axes, the advance guard moves with the main effort based on the factors of","rect":[89.99004364013672,475.5717468261719,522.0727835283279,466.51812744140627]},{"page":114,"text":"METT-TC (I). The supporting effort provides its own security (see figure 5-2).","rect":[90.0,487.095458984375,405.9212439060211,478.0418395996094]},{"page":114,"text":"5-14","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":114,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":114,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":115,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":115,"text":"Figure 5-2. ABCT advance guard mission","rect":[217.4399871826172,493.24163818359377,412.27949923229218,483.90911865234377]},{"page":115,"text":"Organization of Forces","rect":[90.0,511.89361572265627,198.21410039043426,502.034912109375]},{"page":115,"text":"5-65. An advance guard performs continuous reconnaissance along the main body’s axis of advance,","rect":[108.0,529.4214477539063,540.0899755954742,520.3677978515625]},{"page":115,"text":"maintains continuous observation of enemy avenues of approach (when stationary), and destroys or repels","rect":[108.0,540.9451293945313,540.0349624757766,531.8914794921875]},{"page":115,"text":"enemy reconnaissance and security forces. An advance guard defeats, disrupts, or fixes enemy ground forces","rect":[108.00003814697266,552.4688720703125,540.1603897218704,543.4152221679688]},{"page":115,"text":"before they can engage the main body with direct fires. In coordination with the protected force commander,","rect":[108.00003814697266,563.9925537109375,540.0900976657867,554.9389038085938]},{"page":115,"text":"the advance guard commander clarifies the interval between the advance guard and the main body. The","rect":[108.00003814697266,575.3967895507813,540.220518825531,566.3431396484375]},{"page":115,"text":"advance guard maintains the interval from the protected force and leads the main body within the protected","rect":[108.00003814697266,586.9204711914063,540.166645526886,577.8668212890625]},{"page":115,"text":"force commander’s intent. The advance guard guides the main body through gaps in the enemy force to take","rect":[108.00003814697266,598.4442138671875,540.1156604270935,589.3905639648438]},{"page":115,"text":"advantage of opportunities.","rect":[108.00003814697266,609.9679565429688,217.16959595680238,600.914306640625]},{"page":115,"text":"Integration of Enablers","rect":[90.0,634.5336303710938,200.14717534160614,624.6749267578125]},{"page":115,"text":"5-66. In planning and conducting an advance guard, the BCT commander and staff considers the factors of","rect":[108.0,652.0614013671875,540.0539847002029,643.0077514648438]},{"page":115,"text":"METT-TC (I). BCT and squadron staffs conduct collaborative and individual planning considering the","rect":[108.0,663.5851440429688,540.1157214622498,654.531494140625]},{"page":115,"text":"missions and the area of operations assigned to subordinate units. The staff plans fires to support the","rect":[108.00000762939453,675.1088256835938,540.2431628684998,666.05517578125]},{"page":115,"text":"maneuver plan and integrates aerial assets to enhance the capability of the advance guard to find, fix, and","rect":[108.00997161865235,686.632568359375,540.0153393745422,677.5789184570313]},{"page":115,"text":"defeat enemy reconnaissance assets. The staff must integrate engineer assets to provide mobility,","rect":[108.00997161865235,698.0368041992188,540.0992529392242,688.983154296875]},{"page":115,"text":"countermobility, and survivability support. Staffs deliberately plan for the positioning of command and","rect":[108.01000213623047,709.5604858398438,540.115620136261,700.5068359375]},{"page":115,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":115,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":115,"text":"5-15","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":116,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":116,"text":"control nodes to support advance guard operations and the positioning of support and sustainment assets to","rect":[90.0,83.50144958496094,522.025288105011,74.44780731201172]},{"page":116,"text":"allow seamless logistical support to maintain the momentum of the advance guard.","rect":[89.99004364013672,95.02519226074219,421.15601563453677,85.97154998779297]},{"page":116,"text":"5-67. Additionally, the BCT commander identifies a unit to serve as a reserve for the advance guard. A","rect":[89.99004364013672,112.42527770996094,522.0241278400421,103.37163543701172]},{"page":116,"text":"reserve is that portion of a body of troops that is withheld from action at the beginning of an engagement to","rect":[89.99005126953125,123.94902038574219,522.1614575386047,114.89537811279297]},{"page":116,"text":"be available for a decisive movement (ADP 3-90). By allocating forces to field a reserve, the commander","rect":[89.99004364013672,135.4727020263672,521.9563894853592,126.41905975341797]},{"page":116,"text":"preserves the freedom to exploit opportunity or reinforce friendly elements as required. For a BCT conducting","rect":[89.99004364013672,146.99644470214845,522.077045917511,137.9427947998047]},{"page":116,"text":"a guard, the reserve is a maneuver company from one of the maneuver battalions. If the Cavalry squadron is","rect":[89.99004364013672,158.5201873779297,522.0459488039016,149.46653747558595]},{"page":116,"text":"performing a guard, BCTs consider providing a maneuver company from a maneuver battalion to serve as","rect":[89.99004364013672,170.0438690185547,521.9943130617141,160.99021911621095]},{"page":116,"text":"the squadron reserve so the squadron does not place a reconnaissance asset in a reserve role.","rect":[89.99004364013672,181.4281768798828,458.7721655368805,172.3944549560547]},{"page":116,"text":"FLANK GUARD","rect":[72.0,204.77996826171876,145.91548252105714,196.46397399902345]},{"page":116,"text":"5-68. A flank guard protects an exposed flank of the main body. In performing this operation, the flank guard","rect":[90.0,224.7413787841797,522.066792011261,215.68772888183595]},{"page":116,"text":"operates beyond the assigned zone or sector of the protected force. The flank guard’s responsibility begins at","rect":[89.99996185302735,236.26512145996095,522.0171710262299,227.2114715576172]},{"page":116,"text":"the trail element of the advance guard or at the lead combat element of the main body. The flank guard ends","rect":[89.99996185302735,247.78880310058595,522.1545303468704,238.7351531982422]},{"page":116,"text":"at the rear of the protected force or lead element of the rear guard. The higher commander tasking the flank","rect":[89.99996185302735,259.3125305175781,522.105854511261,250.25889587402345]},{"page":116,"text":"guard specifies the boundary. (Refer to FM 3-90-2 for more information.)","rect":[89.99996185302735,270.8362121582031,385.03408723926546,261.7825927734375]},{"page":116,"text":"Stationary Flank Guard","rect":[72.0,295.4136047363281,185.76281273269655,285.5549011230469]},{"page":116,"text":"5-69. A flank guard for a stationary force performs zone or area reconnaissance when establishing the initial","rect":[90.0,312.9413757324219,522.0591632137299,303.88775634765627]},{"page":116,"text":"security line positions allowing the flank guard to become familiar with the terrain they will defend. Upon","rect":[89.99003601074219,324.465087890625,522.0468945503235,315.4114685058594]},{"page":116,"text":"reaching their initial positions, the flank guard establishes a defense and goes through the steps of engagement","rect":[89.99004364013672,335.8692932128906,522.1566973934174,326.815673828125]},{"page":116,"text":"area development. Once the flank guard makes contact, they continue to defend or delay when necessary,","rect":[89.99004364013672,347.39300537109377,522.074777841568,338.3393859863281]},{"page":116,"text":"according to the commander’s intent. As with the advance guard, the commander must allocate forces to","rect":[89.9801254272461,358.916748046875,521.9963574409485,349.8631286621094]},{"page":116,"text":"serve as a reserve (see figure 5-3).","rect":[89.9801254272461,370.4404602050781,226.98987793922425,361.3868408203125]},{"page":116,"text":"5-16","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":116,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":116,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":117,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":117,"text":"Figure 5-3. IBCT Cavalry squadron stationary flank guard","rect":[179.39999389648438,464.681640625,450.4234506483078,455.23956298828127]},{"page":117,"text":"Moving Flank Guard","rect":[90.0,489.3335876464844,190.32821190261843,479.4748840332031]},{"page":117,"text":"5-70. Units must consider many factors for the organization security force of a moving flank guard, which","rect":[108.0,506.98138427734377,540.0629467964172,497.9277648925781]},{"page":117,"text":"is similar to organizing an advance guard. The BCT establishes conditions for reconnaissance and security","rect":[108.0,518.3856201171875,539.9038281440735,509.33197021484377]},{"page":117,"text":"operations by enabling the security force with aviation support, joint and organic fires, and additional","rect":[108.0,529.9093627929688,540.1325274715424,520.8457641601563]},{"page":117,"text":"intelligence collection. This may include partnering with and access to joint and national-level intelligence","rect":[108.0,541.4330444335938,540.084776638031,532.3694458007813]},{"page":117,"text":"assets (see paragraph 3-91, page 3-20). The security force commander designates roles to each subordinate","rect":[107.99004364013672,552.956787109375,540.1036365013123,543.9031372070313]},{"page":117,"text":"unit, in coordination with the protected force commander. For example, if a Cavalry squadron is tasked to","rect":[107.99004364013672,564.4805297851563,540.0468945503235,555.4268798828125]},{"page":117,"text":"provide a moving flank guard for a BCT, the security force commander is the squadron commander and the","rect":[107.99004364013672,576.0042114257813,540.0957019309998,566.9505615234375]},{"page":117,"text":"protected force commander is the BCT commander. The moving flank guard maintains a large enough","rect":[107.98999786376953,587.4083862304688,540.0847363471985,578.354736328125]},{"page":117,"text":"interval from the protected force and protects the main body within the protected force commander’s intent.","rect":[108.0,598.93212890625,539.1287939548492,589.8784790039063]},{"page":117,"text":"5-71. As part of the planning and execution phase, the security force commander decides on one of the two","rect":[108.0,616.4517822265625,540.1724438667297,607.3981323242188]},{"page":117,"text":"methods of execution. These methods are based on how the main body crosses the LD. The security force","rect":[108.0,627.9755249023438,540.1096179466248,618.921875]},{"page":117,"text":"should not make its own penetration of the line of contact when facing prepared enemy defenses. To do so","rect":[108.0,639.4992065429688,540.0598950386047,630.445556640625]},{"page":117,"text":"may prevent or significantly delay the security force in the assumption of the flank guard.","rect":[108.0,650.9033813476563,466.52332520484927,641.8497314453125]},{"page":117,"text":"5-72. In the first method, the security force crosses the LD separately from the main body and deploys to","rect":[108.0,668.4230346679688,540.0359082221985,659.369384765625]},{"page":117,"text":"perform the mission. This method keeps the two forces from interfering with one another and is faster. This","rect":[108.00001525878906,679.94677734375,540.1386001710891,670.8931274414063]},{"page":117,"text":"method is appropriate when another force has penetrated the line of contact or the main body is not in contact","rect":[108.00001525878906,691.4705200195313,540.0478717098237,682.4168701171875]},{"page":117,"text":"with the enemy.","rect":[108.00001525878906,702.9942016601563,172.2898199558258,693.9405517578125]},{"page":117,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":117,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":117,"text":"5-17","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":118,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":118,"text":"5-73. In the second method, the security force crosses the LD with the main body and then deploys out into","rect":[90.0,83.50144958496094,521.9414868354797,74.44780731201172]},{"page":118,"text":"the zone. This method is appropriate when the division makes its own penetration of the enemy defenses","rect":[90.0,95.02519226074219,522.0969131593704,85.97154998779297]},{"page":118,"text":"along the line of contact. The security force may follow the lead battalion TF of the protected force through","rect":[90.0,106.42936706542969,522.179340839386,97.37572479248047]},{"page":118,"text":"the gap and deploy when the situation permits. Alternatively, the security force follows the combat elements","rect":[89.99996185302735,117.95310974121094,522.0239151124954,108.89946746826172]},{"page":118,"text":"of the lead brigade. This method is slower but provides security for the security force before it begins their","rect":[89.989990234375,129.47679138183595,522.0498343095779,120.42314910888672]},{"page":118,"text":"flank guard mission.","rect":[89.98003387451172,141.0005340576172,171.91001343727113,131.94688415527345]},{"page":118,"text":"5-74. The security force regulates movement along the route of advance by the pace of the protected force,","rect":[89.98003387451172,158.5201873779297,522.0638525485992,149.46653747558595]},{"page":118,"text":"distance to the objective, and the enemy situation. There are three methods of movement that the security","rect":[89.9700698852539,170.0438690185547,521.9851880073547,160.9802703857422]},{"page":118,"text":"force may use:","rect":[89.97010040283203,181.44810485839845,148.89546692466736,172.404296875]},{"page":118,"text":" Successive bounds.","rect":[115.19999694824219,192.85940551757813,211.04737305641175,185.80772399902345]},{"page":118,"text":" Alternate bounds.","rect":[115.19999694824219,206.40945434570313,204.32834839820863,199.3677215576172]},{"page":118,"text":" Continuous marching.","rect":[115.19999694824219,221.8613739013672,222.20853638648988,212.80772399902345]},{"page":118,"text":"5-75. Table 5-2 summarizes these methods. If the protected force stops, the security force occupies blocking","rect":[90.00347137451172,239.5005340576172,522.0674023628235,230.44688415527345]},{"page":118,"text":"positions. As the speed of the main body changes, the security force changes movement methods. The","rect":[90.00346374511719,251.02427673339845,522.154112575531,241.9706268310547]},{"page":118,"text":"security force commander must not allow the security force to fall behind the main body or present a lucrative","rect":[90.00346374511719,262.4284362792969,522.1140124778748,253.3748016357422]},{"page":118,"text":"target by remaining stationary along the route.","rect":[90.00347900390625,273.9521789550781,275.37098145484927,264.8985595703125]},{"page":118,"text":"Table 5-2. Moving flank guard movement method comparison","rect":[151.0782012939453,291.41204833984377,442.6321908826828,281.969970703125]},{"page":118,"text":"5-76. The moving flank guard is an incredibly complex operation requiring detailed planning. A moving","rect":[90.0,508.181396484375,522.0002636909485,499.1277770996094]},{"page":118,"text":"flank guard has many of the same considerations as the moving flank screen; however, while conducting a","rect":[90.0,519.7051391601563,522.0761706809998,510.6514892578125]},{"page":118,"text":"moving flank guard, the unit occupies a series of battle positions along the axis of advance. The security unit","rect":[90.0,531.1093139648438,522.1355181941987,522.0556640625]},{"page":118,"text":"also occupies a series of observation posts forward of the battle positions and those observation posts are","rect":[90.00999450683594,542.6130981445313,522.0561511497498,533.5794067382813]},{"page":118,"text":"either designated by the security force commander or delegated to subordinate commanders. The tasks for","rect":[90.01000213623047,554.1567993164063,522.0707693681717,545.1031494140625]},{"page":118,"text":"the moving flank guard include maintaining continuous surveillance of enemy avenues of approach,","rect":[89.99996185302735,565.6804809570313,522.083811044693,556.6268310546875]},{"page":118,"text":"reconnoitering the zone between the main body and the flank guard’s position, maintaining contact with the","rect":[89.99996185302735,577.2042236328125,522.0938708763123,568.1505737304688]},{"page":118,"text":"lead combat elements of the main body, defeating enemy reconnaissance forces, and defeating, disrupting,","rect":[89.99996185302735,588.7279663085938,522.0946142673492,579.67431640625]},{"page":118,"text":"or fixing enemy ground forces before they can engage the main body with direct fire.","rect":[90.00995635986328,600.1321411132813,430.890939950943,591.0784912109375]},{"page":118,"text":"5-77. The lead element of the security force performs a critical three-fold mission. They must maintain","rect":[90.00995635986328,617.6517944335938,521.9353222846985,608.59814453125]},{"page":118,"text":"contact with the protected force, reconnoiter the zone between the main body and the security force route of","rect":[90.00003814697266,629.1754760742188,522.0729055986404,620.121826171875]},{"page":118,"text":"advance, and reconnoiter the security force route. The lead element performs zone reconnaissance to","rect":[90.00003051757813,640.69921875,522.0817456245422,631.6455688476563]},{"page":118,"text":"accomplish these three tasks. The speed of the protected force determines how thoroughly to perform","rect":[90.00003814697266,652.2229614257813,522.0838409671784,643.1693115234375]},{"page":118,"text":"reconnaissance. Planners must consider METT-TC (I) during the planning phase to identify their formations’","rect":[90.00003814697266,663.7466430664063,522.0678396806717,654.6929931640625]},{"page":118,"text":"lead unit capabilities to determine if augmentation is required. When the zone exceeds the organic capability","rect":[89.99015808105469,675.1508178710938,522.0678906440735,666.09716796875]},{"page":118,"text":"of the lead element (typically 10 kilometers for an armored Cavalry troop in open terrain), units augment the","rect":[89.99015808105469,686.674560546875,522.1037585716248,677.6209106445313]},{"page":118,"text":"lead element with additional forces to ensure the lead element maintains contact with the protected force,","rect":[90.00011444091797,698.1783447265625,522.2224218845367,689.1446533203125]},{"page":118,"text":"does not become over tasked, and can match the tempo of the protected force. During planning, the staff","rect":[90.00011444091797,709.7219848632813,522.0688772783279,700.6683349609375]},{"page":118,"text":"5-18","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":118,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":118,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":119,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":119,"text":"conducts course of action analysis to determine whether the task assigned to the lead element exceeds the","rect":[108.0,83.50144958496094,540.0957019309998,74.44780731201172]},{"page":119,"text":"capabilities of the unit. The lead element does not reconnoiter the battle positions or occupy them unless","rect":[107.99008178710938,95.02519226074219,540.0140884523391,85.97154998779297]},{"page":119,"text":"required when contact is made; follow-on elements reconnoiter their assigned battle positions before occupation.","rect":[107.99008178710938,106.42936706542969,538.899729013443,97.37572479248047]},{"page":119,"text":"Note. If available, air Cavalry forces are well suited to maintain contact with the main body and","rect":[133.19886779785157,127.66136169433594,522.0384106636047,118.60771942138672]},{"page":119,"text":"to perform reconnaissance forward of the security force lead troop if available. However, there is","rect":[133.1999969482422,139.18138122558595,522.0834854249954,130.1277313232422]},{"page":119,"text":"inherent risk involved when ground forces rely on aviation assets to maintain communications","rect":[133.1999969482422,150.7051239013672,521.9857681398391,141.65147399902345]},{"page":119,"text":"with the main body on their behalf.","rect":[133.1999969482422,162.2288055419922,274.04529786109927,153.17515563964845]},{"page":119,"text":"5-78. The remainder of the security force maneuvers along the route of advance and occupies battle positions","rect":[108.0,189.46141052246095,540.0507705812454,180.4077606201172]},{"page":119,"text":"as necessary. Criteria for the route are the same as in a moving flank screen. Troop or company-sized battle","rect":[108.00995635986328,200.9851531982422,540.1026599388123,191.93150329589845]},{"page":119,"text":"positions are designated parallel to the axis of the main body, outside the route of advance, and along avenues","rect":[108.00003814697266,212.5088348388672,540.1624649171829,203.45518493652345]},{"page":119,"text":"of approach into the security force. Follow-on elements reconnoiter assigned battle positions before","rect":[108.0100326538086,224.03257751464845,540.0988147239685,214.9789276123047]},{"page":119,"text":"occupation. Scouts occupy observations posts along a screen line forward of the battle positions.","rect":[108.00007629394531,235.43675231933595,493.6483862400055,226.3831024169922]},{"page":119,"text":"5-79. Since the squadron is moving in one direction and orienting in another, the security force commander","rect":[108.00006866455078,252.95640563964845,540.0738211259842,243.9027557373047]},{"page":119,"text":"plans control measures that facilitate this dual orientation. The commander may assign an objective for","rect":[108.00003814697266,264.4801330566406,540.0807791337967,255.4165496826172]},{"page":119,"text":"orientation or to secure the flank of the main body objective. One set of control measures control the security","rect":[108.00003814697266,276.0038146972656,540.0766797065735,266.9402160644531]},{"page":119,"text":"effort, and another set of control measures control movement in parallel to the protected force (see figure 5-4).","rect":[108.0,287.5275573730469,540.0748388767242,278.47393798828127]},{"page":119,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":119,"text":"Figure 5-4. Moving flank guard mission","rect":[222.101806640625,708.7857666015625,407.5699350233078,699.3436889648438]},{"page":119,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":119,"text":"5-19","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":120,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":120,"text":"5-80. The security force’s combat trains move with the flank guard force. The field trains move with the","rect":[90.0,83.50144958496094,522.0957019309998,74.44780731201172]},{"page":120,"text":"BSB or the nearest brigade.","rect":[90.00003814697266,95.02519226074219,200.37676453590394,85.97154998779297]},{"page":120,"text":"5-81. If thesecurityforce anticipates being overextended, the commander informs the main body commander","rect":[90.01000213623047,112.42527770996094,522.1048269853592,103.37163543701172]},{"page":120,"text":"and recommends one of the following courses of action:","rect":[90.01000213623047,123.94902038574219,315.01439392662049,114.89537811279297]},{"page":120,"text":" Reinforce the flank guard.","rect":[115.19999694824219,137.3813934326172,238.28797364234925,128.32774353027345]},{"page":120,"text":" Reduce the area of operations.","rect":[115.19999694824219,150.9214630126953,254.62731385231019,141.8877410888672]},{"page":120,"text":" Screen a portion of the area and guard the rest.","rect":[115.19999694824219,164.3813934326172,319.7707006931305,155.32774353027345]},{"page":120,"text":"5-82. Figures 5-5 and 5-6, figure 5-7, page 5-22, and figure 5-8, page 5-23 demonstrate a moving flank guard","rect":[90.00347900390625,182.0205535888672,522.0722241401672,172.96690368652345]},{"page":120,"text":"operation. The scenario highlights the tasks, actions, and considerations in regard to a moving flank guard","rect":[90.00349426269531,193.4247283935547,522.0276684761047,184.37107849121095]},{"page":120,"text":"operation.","rect":[90.00349426269531,204.9285430908203,130.41221833229066,195.8948211669922]},{"page":120,"text":"Moving Flank Guard Scenario","rect":[220.4399871826172,231.1799774169922,373.55999755859377,220.47598266601563]},{"page":120,"text":"The 4th Infantry Division, which consists of a division headquarters, two SBCTs, one ABCT, a combat aviation","rect":[77.63999938964844,248.7413787841797,516.417866230011,239.68772888183595]},{"page":120,"text":"brigade, a sustainment brigade, and a division artillery are conducting an attack against a defending enemy","rect":[77.63999938964844,260.2613830566406,516.3175036888123,251.20774841308595]},{"page":120,"text":"brigade. The 3rd ABCT (3/4 Infantry Division) is the division decisive effort with the task to seize","rect":[77.63999938964844,271.7814025878906,516.3415210227967,262.727783203125]},{"page":120,"text":"OBJECTIVE KING. The ABCT commander tasks the organic Cavalry squadron (4-10 CAV) to conduct a","rect":[77.63999938964844,283.3013916015625,516.4287915229797,274.2477722167969]},{"page":120,"text":"moving flank guard along PL NEW YORK (LOA) between PL COWBOYS (LD) and PL STEELERS (LOA) to","rect":[77.63999938964844,294.8214111328125,516.4148755073547,285.7677917480469]},{"page":120,"text":"enable freedom of maneuver of the 3/4 Infantry Division main body.","rect":[77.63999938964844,306.2214050292969,350.2521765232086,297.16778564453127]},{"page":120,"text":"The 4-10 CAV augments with the following additional forces to support the moving flank guard mission: an","rect":[77.63999938964844,323.74139404296877,516.3792004585266,314.6877746582031]},{"page":120,"text":"armor company, an air attack and reconnaissance troop, an artillery battery, an air defense platoon, a CBRN ","rect":[77.63999938964844,335.26141357421877,518.8474218845367,326.2077941894531]},{"page":120,"text":"reconnaissance platoon, and a TUAS platoon. Figure 5-5 depicts the task organization.","rect":[77.63999938964844,346.7814025878906,428.234934091568,337.727783203125]},{"page":120,"text":"5-20","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":120,"text":"Figure 5-5. 4-10 Cavalry task organization","rect":[198.239990234375,714.0416870117188,395.463550745964,704.7091674804688]},{"page":120,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":120,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":121,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":121,"text":"Upon receiving the mission from brigade, the squadron planners begin collaborative and parallel planning","rect":[95.63999938964844,89.98143005371094,534.409809589386,80.92778778076172]},{"page":121,"text":"with the BCT staff and augments liaison officers. Based on the threat, the squadron works to mask its forces,","rect":[95.63999938964844,101.50144958496094,534.312326669693,92.44780731201172]},{"page":121,"text":"minimize the electromagnetic signature, and ensure proper coverage of counter-UAS systems. The squadron","rect":[95.63999938964844,113.02140808105469,534.4168286323547,103.96776580810547]},{"page":121,"text":"prepares to react to all forms of contact with the enemy, but primarily focuses on direct fire, aerial, and","rect":[95.63999938964844,124.42137145996094,534.4320874214172,115.36772918701172]},{"page":121,"text":"electromagnetic contact. The squadron commander task organizes the three reconnaissance troops with one","rect":[95.63999938964844,135.94139099121095,534.4437243919373,126.88774871826172]},{"page":121,"text":"tank platoon each from D/4-10 CAV and one Avenger section from 1/C/5-5 ADA. To execute the moving flank","rect":[95.63999938964844,147.46141052246095,534.3470447044373,138.4077606201172]},{"page":121,"text":"guard, the squadron commander directs the squadron to move separately from the main body and execute","rect":[95.63999938964844,158.98143005371095,534.3094470481873,149.9277801513672]},{"page":121,"text":"successive bounds as they move along their route of advance.","rect":[95.63999938964844,170.50144958496095,341.72376465797427,161.4477996826172]},{"page":121,"text":"Alpha Troop, 4-10 CAV is the lead troop to cross the LD and has the three-fold mission, which is to maintain","rect":[95.63999938964844,189.94139099121095,534.4157910346985,180.8877410888672]},{"page":121,"text":"contact with the main body, to reconnoiter the zone between the main body and the squadrons’ route of ","rect":[95.63999938964844,201.46141052246095,536.8961279392242,192.4077606201172]},{"page":121,"text":"advance, and to reconnoiter the squadron’s route. Alpha Troop conducts zone reconnaissance accomplishing","rect":[95.63999938964844,212.98143005371095,534.2932324409485,203.9277801513672]},{"page":121,"text":"the three tasks for the squadron as seen in figure 5-6.","rect":[95.63999938964844,224.50144958496095,309.32181763648989,215.4477996826172]},{"page":121,"text":"Figure 5-6. Moving flank guard, simultaneous deployment into zone","rect":[154.6800079345703,577.3616943359375,475.20676636886597,567.9196166992188]},{"page":121,"text":"Bravo Troop, Charlie Troop, and Charlie Company 1-68 Armor move into their designated area of operations","rect":[95.63999938964844,594.8214111328125,534.5163467531204,585.7677612304688]},{"page":121,"text":"across the eastern flank of the main body. Simultaneously, the squadron main command post, along with the","rect":[95.63999938964844,606.3414306640625,534.4310901145935,597.2877807617188]},{"page":121,"text":"artillery battery, move to their predetermined locations. Alpha troop continues to bound and clear throughout","rect":[95.63999938964844,617.8613891601563,534.3663531551362,608.8077392578125]},{"page":121,"text":"the zone moving north to tie in the screen, oriented east. The artillery battery has preplanned and designated","rect":[95.63999938964844,629.3814086914063,534.4011425971985,620.3277587890625]},{"page":121,"text":"rectangular position areas throughout the squadron’s area of operations to cover all engagement areas.","rect":[95.63999938964844,640.9014282226563,514.059641122818,631.8477783203125]},{"page":121,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":121,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":121,"text":"5-21","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":122,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":122,"text":"Bravo and Charlie Troops move into their assigned boundaries and maneuver to PL NEW YORK, which is the","rect":[77.63999938964844,89.98143005371094,516.3381335716248,80.92778778076172]},{"page":122,"text":"LOA. The troops identify and establish battle positions oriented toward the anticipated direction from which","rect":[77.63999938964844,101.50144958496094,516.2786450386047,92.44780731201172]},{"page":122,"text":"the enemy will attack. They have continuous observation to the east between the ground observation posts,","rect":[77.63999938964844,113.02140808105469,516.2796728610992,103.96776580810547]},{"page":122,"text":"TUAS, and the attack reconnaissance troop allowing the troops to conduct engagement area development. The","rect":[77.63999938964844,124.42137145996094,516.4627673606873,115.36772918701172]},{"page":122,"text":"artillery battery and Charlie Company 1-68 Armor have moved north and are prepared to defend if the enemy","rect":[77.63999938964844,135.94139099121095,516.4587390403748,126.88774871826172]},{"page":122,"text":"attacks from the east. Troops are arrayed in defensive positions between PL KENTUCKY and PL NEW YORK","rect":[77.63999938964844,147.46141052246095,516.3989657773972,138.4077606201172]},{"page":122,"text":"(LOA) using the TUAS and attack reconnaissance troop to screen east to observe NAIs 101, 102, and 103 (see","rect":[77.63999938964844,158.98143005371095,516.465636013031,149.9277801513672]},{"page":122,"text":"figure 5-7).","rect":[77.63999938964844,170.50144958496095,123.3300039768219,161.4477996826172]},{"page":122,"text":"Figure 5-7. Squadron guard operation on phase line New York","rect":[150.0,520.7216796875,443.8945715446472,511.2795715332031]},{"page":122,"text":"The squadron has established their moving flank guard. The troops maneuver their elements to protect the","rect":[77.63999938964844,532.1814575195313,516.4091784934998,523.1278076171875]},{"page":122,"text":"main body from direct fire. The squadron uses preplanned positions to maintain observation of designated","rect":[77.63999938964844,543.701416015625,516.3633008003235,534.6477661132813]},{"page":122,"text":"NAIs. The TUAS platoon moving from east to west through NAI 103 observes an enemy reconnaissance unit.","rect":[77.63999938964844,555.221435546875,516.4577124118805,546.1677856445313]},{"page":122,"text":"The squadron made the decision to use fires, air, and armor to defeat the enemy reconnaissance force as they","rect":[77.63999938964844,566.7413940429688,516.452696559906,557.687744140625]},{"page":122,"text":"move into engagement area two as seen in figure 5-8.","rect":[77.63999938964844,578.2614135742188,292.1684362888336,569.207763671875]},{"page":122,"text":"5-22","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":122,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":122,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":123,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":123,"text":"Figure 5-8. Visual contact during moving flank guard operation","rect":[165.72000122070313,426.1616516113281,463.9988901014328,416.7195739746094]},{"page":123,"text":"Bravo Troop conducts a fire mission with A/3-29 Field Artillery. Upon completion of the fire mission, Bravo","rect":[95.63999938964844,437.74139404296877,534.407856464386,428.6877746582031]},{"page":123,"text":"Troop coordinates with Charlie Company to move two tank platoons into battle position 1 and battle position 2.","rect":[95.63999938964844,449.26141357421877,534.4477026462555,440.2077941894531]},{"page":123,"text":"Bravo Troop conducts a linkup and a battle handover with Charlie Company using a rearward passage of ","rect":[95.63999938964844,460.7814025878906,536.7895605564117,451.727783203125]},{"page":123,"text":"lines. Once the last vehicle moves through the passage point, Bravo Troop moves their forces north and","rect":[95.63999938964844,472.3013916015625,534.442768573761,463.2477722167969]},{"page":123,"text":"conducts an alternating bound to take over the northern most area of operations. This allows them to destroy","rect":[95.63999938964844,483.8214111328125,534.3471057395935,474.7677917480469]},{"page":123,"text":"the enemy force while allowing the moving flank guard’s tempo to continue uninterrupted. If a larger force","rect":[95.63999938964844,495.2214050292969,534.328184841156,486.16778564453127]},{"page":123,"text":"were observed, then the squadron commander would have to relay to the brigade commander to address the","rect":[95.63999938964844,506.74139404296877,534.4279773216248,497.6877746582031]},{"page":123,"text":"composition and disposition of the enemy force moving towards the flank of the squadron, brigade, and division.","rect":[95.63999938964844,518.2614135742188,534.210031747818,509.207763671875]},{"page":123,"text":"Once the brigade secures OBJECTIVE KING, the squadron transitions to a screen operation and begins","rect":[95.63999938964844,535.7814331054688,534.5582779054641,526.727783203125]},{"page":123,"text":"consolidation and reorganization tasks. The division adjusts the task organization in preparation for follow-","rect":[95.63999938964844,547.3014526367188,534.4377737627029,538.247802734375]},{"page":123,"text":"on operations and the attachments no longer under the squadron’s control are escorted to their next location.","rect":[95.63999938964844,558.8214111328125,534.3281347751617,549.7677612304688]},{"page":123,"text":"The squadron uses the time to conduct sustainment operations.","rect":[95.63999938964844,570.3214721679688,347.60111451148989,561.2877807617188]},{"page":123,"text":"REAR GUARD","rect":[90.0,597.1799926757813,157.79547214508058,588.864013671875]},{"page":123,"text":"5-83. A rear guard protects the exposed rear of the main body. Rear guards are appropriate when conducting","rect":[108.0,617.0214233398438,540.0649609565735,607.9677734375]},{"page":123,"text":"offensive tasks, when the protected force breaks contact with flanking forces, or during a retrograde. The rear","rect":[108.0,628.5451049804688,540.0899954423904,619.491455078125]},{"page":123,"text":"guard deploys and defends for moving and stationary main bodies. The tasks described for a stationary flank","rect":[108.0,640.06884765625,540.060932636261,631.0151977539063]},{"page":123,"text":"guard apply. The rear guard for a moving force displaces to successive battle positions along PLs in-depth as","rect":[108.0,651.5925903320313,540.0319717531204,642.5389404296875]},{"page":123,"text":"the main body moves. The nature of enemy contact determines the scheme of maneuver for displacement.","rect":[108.00003814697266,663.1162719726563,540.1735937595367,654.0626220703125]},{"page":123,"text":"(Refer to FM 3-90-2 for more information.) The commander establishes the rear guard during retrograde","rect":[108.00003814697266,674.6400146484375,540.1156604270935,665.5863647460938]},{"page":123,"text":"operations in two ways:","rect":[108.00003814697266,686.044189453125,199.5593463191986,676.9905395507813]},{"page":123,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":123,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":123,"text":"5-23","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":124,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":124,"text":" The guarding force relieves other units in place as they move to the rear.","rect":[115.19999694824219,83.38139343261719,423.0868628025055,74.32775115966797]},{"page":124,"text":" The guarding force establishes a position in-depth behind the main body and passes those forcesthrough.","rect":[115.19999694824219,96.94139099121094,522.1120092868805,87.88774871826172]},{"page":124,"text":"MOVEMENTS INTO SECURITY AREAS FOR STATIONARY SECURITY MISSIONS","rect":[72.0,118.25995635986328,447.2312068939209,109.9559555053711]},{"page":124,"text":"5-84. The security force establishes stationary security mission in a similar manner. In deploying into the","rect":[90.0,138.2213592529297,522.0966784934998,129.16770935058595]},{"page":124,"text":"security area, the security force must address competing requirements; to establish the security area quickly","rect":[90.0,149.74510192871095,522.106831073761,140.6914520263672]},{"page":124,"text":"to meet mission requirements, and to provide the necessary level of security for itself. The security force","rect":[90.0,161.26878356933595,522.1607654075623,152.2151336669922]},{"page":124,"text":"moves into the security area using one of the following three methods listed below:","rect":[90.0,172.7925262451172,423.00462830162049,163.73887634277345]},{"page":124,"text":" Tactical road march.","rect":[115.19999694824219,184.20944213867188,215.74248719215394,177.16770935058595]},{"page":124,"text":" Movement to contact.","rect":[115.19999694824219,197.64944458007813,220.7693121433258,190.9264373779297]},{"page":124,"text":" Zone reconnaissance.","rect":[115.19999694824219,211.20944213867188,219.3440191745758,204.16770935058595]},{"page":124,"text":"Tactical Road March Method","rect":[72.0,229.58352661132813,211.70125877761843,221.9548797607422]},{"page":124,"text":"5-85. The fastest but least secure method of deploying is a tactical road march from the rear boundary of the","rect":[90.0,249.46141052246095,522.1019275169373,240.4077606201172]},{"page":124,"text":"security area to the initial positions. The security forces move to a release point on the rear boundary. From","rect":[90.0,260.8655700683594,522.0667511234284,251.8119354248047]},{"page":124,"text":"the release point, subordinate elements deploy to occupy initial positions, moving by the quickest means","rect":[90.0,272.3893127441406,521.9742935304641,263.335693359375]},{"page":124,"text":"possible. This method is appropriate when the security force commander does not expect enemy contact, time","rect":[90.0,283.91302490234377,522.123839138031,274.8594055175781]},{"page":124,"text":"is critical, or previous zone reconnaissance of the security area conducted by aviation units found no enemy","rect":[90.0,295.436767578125,522.055073261261,286.3831481933594]},{"page":124,"text":"in the security area.","rect":[89.99004364013672,306.9604797363281,168.45191407203675,297.9068603515625]},{"page":124,"text":"Movement to Contact Method","rect":[72.0,327.3945617675781,213.4985915412903,319.7658996582031]},{"page":124,"text":"5-86. In the second method, the security force conducts a movement to contact from an LD (usually the rear","rect":[90.0,347.0213928222656,522.0707693681717,337.9677734375]},{"page":124,"text":"boundary of the security area) to the initial positions. This method is slower than a tactical road march but","rect":[89.99004364013672,358.54510498046877,522.0020343074799,349.4914855957031]},{"page":124,"text":"more secure. It is appropriate when enemy contact is likely, time is limited, the situation does not require","rect":[89.99004364013672,370.0688171386719,522.142882106781,361.01519775390627]},{"page":124,"text":"detailed reconnaissance of the terrain, or aviation elements or other assets conducting zone reconnaissance","rect":[89.99004364013672,381.5925598144531,522.1267077903748,372.5389404296875]},{"page":124,"text":"forward of the ground element detect enemy forces in the security area.","rect":[89.99004364013672,393.11627197265627,375.5992224216461,384.0626525878906]},{"page":124,"text":"Zone Reconnaissance Method","rect":[72.0,413.42352294921877,211.9441481819153,405.7948913574219]},{"page":124,"text":"5-87. The most secure method for moving into the initial positions is for the security force to conduct zone","rect":[90.0,433.181396484375,522.1893908958435,424.1277770996094]},{"page":124,"text":"reconnaissance from the security area’s rear boundary to its initial security line positions or the forward limit","rect":[90.0,444.7051086425781,522.1186724910737,435.6514892578125]},{"page":124,"text":"of the security area. Given adequate time, this method is preferred because it allows the security force to clear","rect":[90.0,456.2288513183594,522.1486502275467,447.17523193359377]},{"page":124,"text":"the security area and become familiar with the terrain that it may have to defend. The security force","rect":[90.0,467.7525634765625,522.1036975364685,458.6989440917969]},{"page":124,"text":"reconnoiters potential subsequent positions and fire support system firing positions as it moves to its initial","rect":[90.0,479.2762756347656,522.0969439754487,470.22265625]},{"page":124,"text":"positions. A zone reconnaissance is appropriate when time is available and information about enemy forces","rect":[90.0,490.68048095703127,522.1417739992141,481.6268615722656]},{"page":124,"text":"or terrain is unknown. While this technique provides information of tactical value on the enemy forces and","rect":[90.0,502.2041931152344,522.039204120636,493.15057373046877]},{"page":124,"text":"terrain in the area, it also consumes time. Using air reconnaissance forward of the ground units increases the","rect":[90.0,513.7279052734375,522.1435534934998,504.6742858886719]},{"page":124,"text":"speed and security of the movement.","rect":[90.0,525.2516479492188,236.62908387184144,516.197998046875]},{"page":124,"text":"MOVEMENT DURING MOVING FLANK SECURITY MISSIONS","rect":[72.0,542.5800170898438,362.1517696380615,534.2760009765625]},{"page":124,"text":"5-88. There are three techniques of occupying and moving in a flank security area for moving security","rect":[90.0,562.5414428710938,522.1187329292297,553.48779296875]},{"page":124,"text":"missions. These techniques are based on how the security force crosses the LD—","rect":[90.0,573.9456176757813,415.1940088272095,564.8919677734375]},{"page":124,"text":" Separately from the main body and deploys to perform the mission.","rect":[115.19999694824219,587.3814086914063,403.404855966568,578.3277587890625]},{"page":124,"text":" Separately from the main body, lead elements conduct a movement to contact.","rect":[115.19999694824219,600.94140625,446.85035157203677,591.8877563476563]},{"page":124,"text":" With the main body and conducts zone reconnaissance out to the limit of the security area.","rect":[115.19999694824219,614.3814086914063,495.477121591568,605.3277587890625]},{"page":124,"text":"5-89. Commanders should not require the security force to make its own penetration when it faces prepared","rect":[90.00347137451172,632.0205688476563,522.0712475776672,622.9669189453125]},{"page":124,"text":"enemy defenses. This may prevent or significantly delay the security force from assuming its duties. They","rect":[90.00347900390625,643.5443115234375,521.9052319526672,634.4906616210938]},{"page":124,"text":"often combine the three techniques described in paragraphs 5-90 through 5-92 (pages 5-24 through 5-27).","rect":[90.00350189208985,654.948486328125,512.4867956638336,645.8948364257813]},{"page":124,"text":"Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission","rect":[72.0,679.5335693359375,503.21483909988407,669.6748657226563]},{"page":124,"text":"5-90. In this first technique, the security forces cross the LD separately from the main the body and deploy","rect":[90.0,697.181396484375,522.051899433136,688.1277465820313]},{"page":124,"text":"to perform the mission, as seen in figure 5-9 and figure 5-10 (page 5-26). The security force then conducts a","rect":[90.00997161865235,708.5856323242188,521.990050075531,699.531982421875]},{"page":124,"text":"5-24","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":124,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":124,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":125,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":125,"text":"tactical road march, an approach march, or tactical movements parallel to the main body and drops off ","rect":[108.0,83.50144958496094,542.5389502048492,74.44780731201172]},{"page":125,"text":"observation posts or occupies battle positions along the flank of the main body. This technique keeps the two","rect":[108.0,95.02519226074219,540.0717968940735,85.97154998779297]},{"page":125,"text":"forces from interfering with each other during deployment. When another force penetrates the line of contact,","rect":[108.00997161865235,106.42936706542969,540.1295263767242,97.37572479248047]},{"page":125,"text":"and the main body is not in contact with the enemy and is moving quickly, it is appropriate that the LD is","rect":[108.00999450683594,117.95310974121094,539.8716323976516,108.89946746826172]},{"page":125,"text":"uncontested. The IPB process indicates that enemy contact is not likely in the area through which the security","rect":[108.00999450683594,129.47679138183595,540.1066479682922,120.42314910888672]},{"page":125,"text":"force is moving. It is the fastest but least secure technique. ","rect":[108.00999450683594,141.0005340576172,344.5002233982086,131.94688415527345]},{"page":125,"text":"Figure 5-9. Security force crossing the LD separately to establish a flank screen","rect":[125.76866149902344,526.2633056640625,504.0492135877609,516.8212280273438]},{"page":125,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":125,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":125,"text":"5-25","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":126,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":126,"text":"Figure 5-10. Security force continuing to cross LD separately to","rect":[146.16000366210938,457.24163818359377,447.6631967420578,447.799560546875]},{"page":126,"text":"establish a flank screen","rect":[240.59078979492188,466.79327392578127,353.215503870964,459.4328308105469]},{"page":126,"text":"Security Force Crosses LD Separately from the Main Body and Deploys to Perform Mission","rect":[72.0,493.4136047363281,503.1982070198059,483.5549011230469]},{"page":126,"text":"5-91. In this technique, the security force crosses the LD separately from the main body, and its lead elements","rect":[90.0,510.9413757324219,522.0640762453079,501.88775634765627]},{"page":126,"text":"conduct a movement to contact, as seen in figure 5-11. Follow-on elements occupy positions as they reach","rect":[90.0,522.4651489257813,522.0478100776672,513.4114990234375]},{"page":126,"text":"them. This technique is appropriate when the main body is moving slower than in the first method (separately","rect":[90.0,533.9888305664063,522.0698437690735,524.9351806640625]},{"page":126,"text":"from the main body and deploys to perform the mission), the LD is uncontested, and the IPB process estimates","rect":[90.00003814697266,545.3930053710938,521.9593399171829,536.33935546875]},{"page":126,"text":"possible enemy contact. This technique is slower than the previous technique (separately from the main body","rect":[90.00003814697266,556.916748046875,522.0708203315735,547.8630981445313]},{"page":126,"text":"and deploys to perform the mission) but provides better security.","rect":[90.00999450683594,568.4404907226563,348.935129404068,559.3868408203125]},{"page":126,"text":"5-26","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":126,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":126,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":127,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":127,"text":"Figure 5-11. Movement to contact technique during moving flank security mission","rect":[120.4800033569336,457.24163818359377,509.34627169322968,447.799560546875]},{"page":127,"text":"Security Force Crosses LD with the Main Body and Conducts Zone Reconnaissance out to the","rect":[90.0,481.89361572265627,530.2674826393128,472.034912109375]},{"page":127,"text":"Limit of the Security Area","rect":[90.01103210449219,494.4902648925781,213.50997495651246,484.6315612792969]},{"page":127,"text":"5-92. The final technique is when the security force crosses the LD with the main body and conducts zone","rect":[108.0,512.0214233398438,540.0941150169373,502.9677734375]},{"page":127,"text":"reconnaissance out to the far limit of the security area, as seen in figure 5-12, page 5-28. This technique is","rect":[108.0,523.5451049804688,540.0130508546829,514.491455078125]},{"page":127,"text":"appropriate when the LD is also the line of contact, the main body makes its own penetration of the enemy","rect":[107.98008728027344,535.06884765625,540.0161938667297,526.0151977539063]},{"page":127,"text":"defenses along the line of contact, the main body is moving slowly, and leaders do not clearly understand the","rect":[107.98008728027344,546.5925903320313,540.092833278656,537.5389404296875]},{"page":127,"text":"enemy situation. The security force may follow the lead element of the main body through the gap and deploy","rect":[107.98008728027344,558.1162719726563,539.9416699409485,549.0626220703125]},{"page":127,"text":"when the situation permits. This technique provides increased security for both the security force and the","rect":[107.9801025390625,569.6400146484375,540.0322253684998,560.5863647460938]},{"page":127,"text":"main body; it is also the most time-consuming technique.","rect":[107.9800796508789,581.0442504882813,337.1427710056305,571.9906005859375]},{"page":127,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":127,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":127,"text":"5-27","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":128,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":128,"text":"Figure 5-12. Zone reconnaissance technique during moving flank security mission","rect":[101.4000015258789,460.24163818359377,492.4305612440109,450.799560546875]},{"page":128,"text":"COVER","rect":[72.0,485.5965576171875,122.57207589530946,475.8949279785156]},{"page":128,"text":"5-93. A cover is a type of security operation done independent of the main body to protect them by fighting","rect":[90.0,505.9013671875,522.0561108589172,496.8477478027344]},{"page":128,"text":"to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-90).","rect":[90.00000762939453,517.4251098632813,522.0847265720367,508.3714599609375]},{"page":128,"text":"Commanders use the cover task offensively and defensively. A cover is a brigade-level, force-oriented","rect":[89.98999786376953,528.8292846679688,522.0548901557922,519.775634765625]},{"page":128,"text":"mission that protects the division or corps main body from detection or engagement by enemy forces","rect":[90.0,540.35302734375,522.1815078859329,531.2993774414063]},{"page":128,"text":"attempting to delay or disrupt friendly operations. A covering force may be offensive or defensive in nature.","rect":[90.0,551.8767700195313,522.082102060318,542.8231201171875]},{"page":128,"text":"The nature of the cover mission reflects the type of operation conducted by the division or corps. All covering","rect":[90.0,563.4004516601563,522.2035717964172,554.3468017578125]},{"page":128,"text":"force operations are aggressively executed making maximum use of offensive opportunities. A covering force","rect":[90.0,574.9241943359375,522.1198718528748,565.8705444335938]},{"page":128,"text":"accomplishes all the tasks of screening and guard forces. (Refer to FM 3-90-2 for more information.)","rect":[90.0,586.4479370117188,494.1060782060623,577.394287109375]},{"page":128,"text":"5-94. A covering force is an independently operating, self-contained force conducting the cover mission.","rect":[89.99002838134766,603.8480224609375,522.051828622818,594.7943725585938]},{"page":128,"text":"The covering force operates away from the main body to develop the situation, prevent enemy ground","rect":[89.98008728027344,615.3717651367188,522.0808911323547,606.318115234375]},{"page":128,"text":"observation, and protect the main body from direct and indirect fires. METT-TC (I) factors determine the","rect":[89.98008728027344,626.8954467773438,522.0638415794373,617.841796875]},{"page":128,"text":"distance from the main body. To protect the main body from effective ground observation and direct fires,","rect":[89.97013854980469,638.419189453125,522.0549414157867,629.3655395507813]},{"page":128,"text":"the BCT may execute operations as far as 50 to 60 kilometers from the main body. The covering force denies","rect":[89.96025848388672,649.9429321289063,521.9991958742141,640.8892822265625]},{"page":128,"text":"the enemy information by conducting counterreconnaissance to destroy enemy reconnaissance and enemy","rect":[89.96025848388672,661.4666137695313,521.982563495636,652.4129638671875]},{"page":128,"text":"forces within the security zone. A covering force develops the situation earlier than a guard force, fights","rect":[89.96025848388672,672.8707885742188,521.9186294679641,663.817138671875]},{"page":128,"text":"longer and more frequently, and defeats larger enemy forces than a guard force. Furthermore, a covering","rect":[89.96025848388672,684.39453125,521.9555859565735,675.3408813476563]},{"page":128,"text":"force reconnoiters, screens, attacks, defends, and delays as necessary. The covering force does not allow","rect":[89.96025848388672,695.9182739257813,522.0320624103546,686.8646240234375]},{"page":128,"text":"enemy forces to bypass and affect the main body.","rect":[89.95030212402344,707.4419555664063,288.0596716403961,698.3883056640625]},{"page":128,"text":"5-28","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":128,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":128,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":129,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":129,"text":"5-95. Division or corps headquarters determine the requirements for a covering force built around a brigade.","rect":[108.0,83.50144958496094,540.0968725681305,74.44780731201172]},{"page":129,"text":"Maneuver, enabling, and sustainment assets reinforce the covering force so it can accomplish its mission.","rect":[108.0,95.02519226074219,539.801828622818,85.97154998779297]},{"page":129,"text":"Reinforcements increase the distance and time the covering force can operate away from the main body and","rect":[107.99004364013672,106.42936706542969,540.2173657417297,97.37572479248047]},{"page":129,"text":"enhances the covering force’s ability to fight. Reinforcements typically revert to their parent organizations","rect":[107.99004364013672,117.95310974121094,540.1127822999954,108.89946746826172]},{"page":129,"text":"upon the passage of the covering force (see table 5-3).","rect":[107.99004364013672,129.47679138183595,324.6698706150055,120.42314910888672]},{"page":129,"text":"Table 5-3. Typical command and support relationships for cover operations","rect":[135.6987762451172,146.93667602539063,494.02967286300659,137.60415649414063]},{"page":129,"text":"5-96. A covering force may be offensive or defensive in nature, but a covering force executes all covering","rect":[108.0,290.26141357421877,540.0459790229797,281.2077941894531]},{"page":129,"text":"force operations aggressively to maximize offensive opportunities. The covering force executes its mission","rect":[108.0,301.7851257324219,539.9372754096985,292.73150634765627]},{"page":129,"text":"as it would in zone reconnaissance or reconnaissance in force in that it is force-oriented.","rect":[107.99004364013672,311.2969665527344,460.51627564430239,304.2552490234375]},{"page":129,"text":"OFFENSIVE COVER","rect":[90.0,327.64801025390627,184.6830759048462,319.35601806640627]},{"page":129,"text":"5-97. An offensive covering force seizes the initiative early, allowing the main body commander freedom of","rect":[108.0,347.62139892578127,540.0779104814529,338.5677795410156]},{"page":129,"text":"maneuver. While conducting offensive tasks, a covering force may operate to the front or flanks of the main","rect":[108.0,359.0256042480469,540.0681347846985,349.97198486328127]},{"page":129,"text":"body. Offensive covering forces conduct reconnaissance along the main body’s axis of advance. They deny","rect":[108.0,370.54931640625,540.1723217964172,361.4956970214844]},{"page":129,"text":"the enemy information about the size, strength, composition, and objective of the main body, destroy, disrupt,","rect":[107.99004364013672,382.0730285644531,540.0919897556305,373.0094299316406]},{"page":129,"text":"or fix enemy forces and reconnaissance assets in the security zone forces, develop the situation to determine","rect":[107.99004364013672,393.5967712402344,540.1317737083435,384.54315185546877]},{"page":129,"text":"enemy strengths, weaknesses, and disposition, and exploit opportunities until main body forces are","rect":[107.99004364013672,405.1204833984375,540.0529773216248,396.0668640136719]},{"page":129,"text":"committed. Advance cover and flank cover are two types of offensive covers.","rect":[107.99004364013672,416.5246887207031,418.27393555641177,407.4710693359375]},{"page":129,"text":"5-98. The following are a list of offensive tasks Cavalry units could","rect":[107.98011016845703,434.0443115234375,399.65779542922976,424.9906921386719]},{"page":129,"text":"offensive cover missions:","rect":[107.9801025390625,443.5561218261719,210.22447693443298,436.514404296875]},{"page":129,"text":"conduct within capability","rect":[404.1407165527344,434.0443115234375,509.4377942085266,424.9906921386719]},{"page":129,"text":"during","rect":[513.9397583007813,434.0443115234375,540.0399975776672,424.9906921386719]},{"page":129,"text":"","rect":[133.1999969482422,456.2611083984375,139.2058769197464,451.5335998535156]},{"page":129,"text":"","rect":[133.1999969482422,469.82110595703127,139.2058769197464,465.0935974121094]},{"page":129,"text":"","rect":[133.1999969482422,494.7810974121094,139.2058769197464,490.0535888671875]},{"page":129,"text":"","rect":[133.1999969482422,508.2210998535156,139.2058769197464,503.49359130859377]},{"page":129,"text":"","rect":[133.1999969482422,521.7811279296875,139.2058769197464,517.0535888671875]},{"page":129,"text":"","rect":[133.1999969482422,535.2211303710938,139.2058769197464,530.4935913085938]},{"page":129,"text":"","rect":[133.1999969482422,548.7811279296875,139.2058769197464,544.0535888671875]},{"page":129,"text":"","rect":[133.1999969482422,573.7411499023438,139.2058769197464,569.0136108398438]},{"page":129,"text":"","rect":[133.1999969482422,587.3011474609375,139.2058769197464,582.5736083984375]},{"page":129,"text":"","rect":[133.1999969482422,612.2611083984375,139.2058769197464,607.5335693359375]},{"page":129,"text":"","rect":[133.1999969482422,625.8211669921875,139.2058769197464,621.0936279296875]},{"page":129,"text":"","rect":[133.1999969482422,639.2611083984375,139.2058769197464,634.5335693359375]},{"page":129,"text":"","rect":[133.1999969482422,652.701171875,139.2058769197464,647.9736328125]},{"page":129,"text":"","rect":[133.1999969482422,666.2611694335938,139.2058769197464,661.5336303710938]},{"page":129,"text":"Destroy, disrupt, or fix enemy forces and reconnaissance assets in the disruption zone.","rect":[151.1999969482422,458.98138427734377,496.679758310318,449.9277648925781]},{"page":129,"text":"Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. Must","rect":[151.1999969482422,472.5413818359375,540.0953570613862,463.4877624511719]},{"page":129,"text":"prevent ground observation and direct fire against the main body.","rect":[151.1999969482422,484.0650939941406,412.88709473609927,475.011474609375]},{"page":129,"text":"Maintain contact with the protected force and other forces operating on its flanks.","rect":[151.1999969482422,497.5013732910156,477.5692846775055,488.44775390625]},{"page":129,"text":"Gain and maintain contact with enemy forces, and report activity in the assigned area.","rect":[151.1999969482422,510.9413757324219,494.73035645484927,501.88775634765627]},{"page":129,"text":"Maintain observation of avenues of approach that affect the protected forces’ mission.","rect":[151.1999969482422,524.4814453125,495.685617685318,515.44775390625]},{"page":129,"text":"Locate and identify enemy forces in the battle zone, and conduct handover to follow-on forces.","rect":[151.1999969482422,537.94140625,531.082346200943,528.8877563476563]},{"page":129,"text":"Cause the enemy to commit resources to counter the cover force that would have been used against","rect":[151.1999969482422,551.5014038085938,540.0218707332612,542.44775390625]},{"page":129,"text":"the main body.","rect":[151.1999969482422,563.025146484375,211.049631357193,553.9714965820313]},{"page":129,"text":"Deny the enemy information about the size, strength, composition, and objective of the main body.","rect":[151.1999969482422,576.46142578125,540.1093237400055,567.3978271484375]},{"page":129,"text":"Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main","rect":[151.1999969482422,590.0214233398438,540.0733227729797,580.9677734375]},{"page":129,"text":"body forces are committed.","rect":[151.1999969482422,601.5451049804688,260.73011231422427,592.491455078125]},{"page":129,"text":"Clear or bypass enemy forces in the assigned area according to engagement criteria.","rect":[151.1999969482422,614.9813842773438,487.061105966568,605.927734375]},{"page":129,"text":"Conduct reconnaissance along the main body’s axis of advance.","rect":[151.1999969482422,628.5414428710938,407.01261353492739,619.48779296875]},{"page":129,"text":"Penetrate the enemy’s disruption zone to locate enemy main defensive positions.","rect":[151.1999969482422,641.9813842773438,474.0932104587555,632.927734375]},{"page":129,"text":"Locate gaps or weaknesses in the enemy’s defensive scheme.","rect":[151.1999969482422,655.4214477539063,396.4860632419586,646.3677978515625]},{"page":129,"text":"Defeat or repel enemy forces as directed by the higher commander.","rect":[151.1999969482422,668.9814453125,420.48377442359927,659.9277954101563]},{"page":129,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":129,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":129,"text":"5-29","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":130,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":130,"text":"5-99.","rect":[90.0,81.4895248413086,110.96579957008362,74.62708282470703]},{"page":130,"text":"If encounter turns into a meeting engagement—","rect":[115.19880676269531,83.50144958496094,306.9586877822876,74.44780731201172]},{"page":130,"text":" Destroy enemy reconnaissance and lead elements of the main body.","rect":[115.19999694824219,96.94139099121094,404.364084482193,87.88774871826172]},{"page":130,"text":" Determine the location of enemy assailable flanks.","rect":[115.19999694824219,110.38139343261719,335.634104013443,101.32775115966797]},{"page":130,"text":" Fix enemy forces to allow the main body to maneuver around enemy strengths or through","rect":[115.19999694824219,123.94139099121094,521.8071484565735,114.88774871826172]},{"page":130,"text":"enemy weaknesses.","rect":[133.1999969482422,135.4651336669922,214.77239441871644,126.41149139404297]},{"page":130,"text":"Advance Covering Force","rect":[72.0,160.0535888671875,188.86172092056274,150.1948699951172]},{"page":130,"text":"5-100.","rect":[90.0,175.549560546875,115.88604187965393,168.70704650878907]},{"page":130,"text":"An advance covering force is an offensive cover operation. An advance covering force is task","rect":[124.56120300292969,177.58140563964845,522.0707592964172,168.5277557373047]},{"page":130,"text":"organized to locate and penetrate the security zone and forward defenses of an enemy force deployed to","rect":[90.01991271972656,189.1051483154297,521.8885083198547,180.05149841308595]},{"page":130,"text":"defend and to destroy enemy reconnaissance, advance guard units, and first-echelon units of a moving","rect":[90.01990509033203,200.6288299560547,521.840717792511,191.5751190185547]},{"page":130,"text":"enemy force.","rect":[90.01994323730469,212.15257263183595,143.27308106422425,203.10888671875]},{"page":130,"text":"BCT Planning and Execution Considerations for Offensive Cover Missions","rect":[72.0,236.733642578125,422.97488835430149,226.8749237060547]},{"page":130,"text":"5-101. The BCT advances on a broad front and conducts operations similar to that for zone reconnaissance","rect":[90.0,254.24147033691407,521.986387966156,245.20774841308595]},{"page":130,"text":"or movement to contact. Staffs determine the width of the zone to cover during mission analysis and IPB.","rect":[90.0,265.7851257324219,521.9264013767242,256.73150634765627]},{"page":130,"text":"Typically, aviation assets task organized to the covering force reconnoiter forward of the advancing ground","rect":[90.0,277.3088073730469,522.044086933136,268.25518798828127]},{"page":130,"text":"elements. Upon enemy contact, air assets engage and destroy enemy forces according to the covering force","rect":[89.99999237060547,288.8325500488281,522.2161853294373,279.7789306640625]},{"page":130,"text":"commander’s intent. They report the enemy’s location, composition, and disposition to the ground forces","rect":[89.99998474121094,300.2367248535156,522.1126602296829,291.18310546875]},{"page":130,"text":"while maintaining contact with the enemy. Aviation assets conduct target handover to ground forces when","rect":[89.99998474121094,311.7604675292969,522.036030292511,302.70684814453127]},{"page":130,"text":"required. Ground forces from the covering force attack to defeat enemy forces. The covering force must have","rect":[89.99998474121094,323.2841796875,522.162657497406,314.2305603027344]},{"page":130,"text":"approval of the main body commander to bypass enemy forces.","rect":[89.99998474121094,334.8078918457031,343.770822763443,325.7542724609375]},{"page":130,"text":"5-102. If the covering force finds a gap in enemy defenses, they prepare to penetrate the integrity of the","rect":[89.99994659423828,352.3275451660156,522.0845935325623,343.27392578125]},{"page":130,"text":"defense. The covering force immediately reports to the main body to divert follow-on forces. Covering forces","rect":[89.99992370605469,363.7317199707031,522.1663711671829,354.6781005859375]},{"page":130,"text":"prepare to defeat enemy counterattack during penetrations due to the opportunities hasty attacks provide to","rect":[90.00988006591797,375.2554626464844,522.0647168159485,366.20184326171877]},{"page":130,"text":"the defender.","rect":[89.99992370605469,384.76727294921877,142.29888367652894,377.7255554199219]},{"page":130,"text":"5-103. When the BCT covering force can advance no further, they transition to a defense and prepare to","rect":[89.99992370605469,404.2987976074219,522.048725605011,395.24517822265627]},{"page":130,"text":"execute a forward passage of lines of the main body. The covering force continues to perform reconnaissance","rect":[89.99990844726563,415.8225402832031,521.999327419281,406.7689208984375]},{"page":130,"text":"of enemy positions to locate gaps or vulnerable flanks. The covering force conducts target and reconnaissance","rect":[89.99990844726563,427.34625244140627,522.1337878684998,418.2926330566406]},{"page":130,"text":"handovers to guide the main body as they attack through or around the covering force. If the covering force","rect":[89.99990844726563,438.7504577636719,521.9754626731873,429.69683837890627]},{"page":130,"text":"is successful, the main body commander can attack enemy vulnerabilities at the time desired with previously","rect":[89.9999008178711,450.274169921875,522.045795917511,441.2205505371094]},{"page":130,"text":"uncommitted main body forces.","rect":[89.99990844726563,461.7978820800781,217.16814637184144,452.7442626953125]},{"page":130,"text":"5-104. The covering force must retain a reserve. At the brigade level, a reserve should consist of attached","rect":[89.99990844726563,479.3175354003906,522.084858417511,470.263916015625]},{"page":130,"text":"attack aviation assets and a maneuver company. The reserve must be an uncommitted force and ready to","rect":[89.99990844726563,490.84124755859377,522.0451245307922,481.7876281738281]},{"page":130,"text":"deploy at a decisive moment anywhere in the covering force’s zone.","rect":[89.98999786376953,502.3649597167969,362.48279786109927,493.31134033203127]},{"page":130,"text":"Flank Covering Force","rect":[72.0,526.8936157226563,175.4216269264221,517.034912109375]},{"page":130,"text":"5-105. A flank cover is an offensive covering force mission. If the main body commander perceives a","rect":[90.0,544.4214477539063,522.0067737083435,535.3677978515625]},{"page":130,"text":"significant threat to one of the unit’s flanks, the commander assigns a flank cover. A BCT or reconnaissance","rect":[90.0,555.9451293945313,522.100645778656,546.8914794921875]},{"page":130,"text":"and security BCT conducts a flank cover much the same as a flank guard. The main difference between the","rect":[89.99004364013672,567.3493041992188,522.1267077903748,558.295654296875]},{"page":130,"text":"two missions is the scope of operations and the distance the covering force operates from the main body","rect":[89.99004364013672,578.873046875,521.9223828315735,569.8193969726563]},{"page":130,"text":"(see figure 5-13).","rect":[89.99005126953125,590.3967895507813,160.03873658180238,581.3431396484375]},{"page":130,"text":"5-30","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":130,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":130,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":131,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":131,"text":"Figure 5-13. Reinforced SBCT performing advanced cover","rect":[177.47999572753907,503.681640625,452.41173249530797,494.34912109375]},{"page":131,"text":"5-106. The flank covering force clears the area between its route of advance and the main body the same as","rect":[107.98906707763672,521.2610473632813,539.9114273195266,512.2073974609375]},{"page":131,"text":"the flank guard. The flank covering force maintains contact with an element of the main body specified by","rect":[107.98906707763672,532.7847900390625,540.016254901886,523.7311401367188]},{"page":131,"text":"the main body commander. The commander assigning the mission designates the area of operations for the","rect":[107.98906707763672,544.3085327148438,540.0720202903748,535.2548828125]},{"page":131,"text":"flank covering force and the protected force (see figure 5-14, page 5-32). The flank covering force clears the","rect":[107.98906707763672,555.8322143554688,540.1036365013123,546.778564453125]},{"page":131,"text":"area between its route of advance and the main body.","rect":[107.97907257080078,567.2363891601563,320.70276856422427,558.1827392578125]},{"page":131,"text":"5-107. Integration of aviation assets are essential to a cover mission. Aviation assets may assist in clearing","rect":[107.97907257080078,584.7560424804688,540.0288281440735,575.702392578125]},{"page":131,"text":"the area between the covering force and the main body, assisting in maintaining contact with the protected","rect":[107.97908782958985,596.27978515625,540.008198261261,587.2261352539063]},{"page":131,"text":"force, and screening to the front of the units conducting the flank covering force.","rect":[107.97908782958985,607.8035278320313,431.1034948825836,598.7498779296875]},{"page":131,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":131,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":131,"text":"5-31","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":132,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":132,"text":"Figure 5-14. Reinforced ABCT performing flank cover","rect":[170.52000427246095,541.24169921875,423.3824966554642,531.9091796875]},{"page":132,"text":"DEFENSIVE COVER","rect":[72.0,558.6480102539063,166.56306552886964,550.35595703125]},{"page":132,"text":"5-108. A defensive covering forceprevents the enemy from attacking at the time, place, and combat strength","rect":[90.0,578.6213989257813,522.0908398628235,569.5677490234375]},{"page":132,"text":"of their choosing. The defensive cover forces the enemy to reveal their main effort, to disrupt the enemy’s","rect":[90.00996398925781,590.025634765625,522.1355484132766,580.9719848632813]},{"page":132,"text":"attack, destroy their initiative, and set the conditions for their defeat. Defensive covers maintain continuous","rect":[90.0,601.54931640625,522.1366470460891,592.4956665039063]},{"page":132,"text":"observation of avenues of approach. They destroy or disrupt enemy reconnaissance and security forces to","rect":[89.99999237060547,613.0730590820313,522.044819355011,604.0194091796875]},{"page":132,"text":"deceive the enemy of friendly disposition, and the location of the main defensive effort. The defensive forces","rect":[90.0,624.5967407226563,522.1614273195266,615.5430908203125]},{"page":132,"text":"determine the size, strength, composition, and direction of the enemy’s main effort, and maintain contact and","rect":[89.99004364013672,636.1204833984375,522.0650219917297,627.0668334960938]},{"page":132,"text":"force the commitment of enemy second-echelon forces. A defensive covering force operates to the front,","rect":[89.99004364013672,647.6442260742188,522.0548193454742,638.590576171875]},{"page":132,"text":"flanks, or rear of a main body deploying to defend. Defensive cover is performed most frequently forward of","rect":[89.99004364013672,659.0484008789063,521.9534597978592,649.9947509765625]},{"page":132,"text":"the main body.","rect":[89.99004364013672,670.5721435546875,149.83968567848206,661.5184936523438]},{"page":132,"text":"5-32","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":132,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":132,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":133,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":133,"text":"5-109. The following are a list of defensive tasks Cavalry units could conduct within capability during","rect":[108.0,83.50144958496094,540.0788159370422,74.44780731201172]},{"page":133,"text":"defensive cover missions:","rect":[108.01990509033203,93.01326751708985,211.32903015708923,85.97148895263672]},{"page":133,"text":"","rect":[133.1999969482422,105.74112701416016,139.2058769197464,101.01361083984375]},{"page":133,"text":"","rect":[133.1999969482422,130.7010955810547,139.2058769197464,125.97357177734375]},{"page":133,"text":"","rect":[133.1999969482422,144.14109802246095,139.2058769197464,139.41357421875]},{"page":133,"text":"","rect":[133.1999969482422,157.7010955810547,139.2058769197464,152.97357177734376]},{"page":133,"text":"","rect":[133.1999969482422,171.14109802246095,139.2058769197464,166.41357421875]},{"page":133,"text":"","rect":[133.1999969482422,184.7010955810547,139.2058769197464,179.97357177734376]},{"page":133,"text":"","rect":[133.1999969482422,209.66111755371095,139.2058769197464,204.93359375]},{"page":133,"text":"Detect, report, and destroy all enemy elements attempting to pass through the cover, both ground","rect":[151.1999969482422,108.46141052246094,540.0505566596985,99.40776824951172]},{"page":133,"text":"and aerial, and provide the protected force commander early warning of enemy activities.","rect":[151.1999969482422,119.98515319824219,508.763010263443,110.93151092529297]},{"page":133,"text":"Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements.","rect":[151.1999969482422,133.42137145996095,503.422678232193,124.36772918701172]},{"page":133,"text":"Maintain observation of avenues of approach that affect the protected forces’ mission.","rect":[151.1999969482422,146.84144592285157,495.69144654273989,137.80772399902345]},{"page":133,"text":"Maintain contact with the protected force and other forces operating on its flanks.","rect":[151.1999969482422,160.42137145996095,477.562326669693,151.3677215576172]},{"page":133,"text":"Maintain contact with enemy forces, and report activity in the assigned area.","rect":[151.1999969482422,173.8613739013672,457.05469727516177,164.80772399902345]},{"page":133,"text":"Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[151.1999969482422,187.42137145996095,540.2457873802185,178.3677215576172]},{"page":133,"text":"enemy’s order of battle based upon the IPB (when facing an echeloned enemy force).","rect":[151.1999969482422,198.9451141357422,492.826975107193,189.89146423339845]},{"page":133,"text":"While displacing, determine the direction of enemy movement, maintain contact, and report","rect":[151.1999969482422,212.3813934326172,539.8560992488862,203.32774353027345]},{"page":133,"text":"threat activities.","rect":[151.1999969482422,222.01272583007813,216.328439950943,214.9709930419922]},{"page":133,"text":"","rect":[133.1999969482422,234.7411346435547,139.2058769197464,230.01361083984376]},{"page":133,"text":"","rect":[133.1999969482422,259.7010803222656,139.2058769197464,254.97357177734376]},{"page":133,"text":"","rect":[133.1999969482422,273.1410827636719,139.2058769197464,268.41357421875]},{"page":133,"text":"","rect":[133.1999969482422,286.70111083984377,139.2058769197464,281.9736022949219]},{"page":133,"text":"","rect":[133.1999969482422,300.14111328125,139.2058769197464,295.4136047363281]},{"page":133,"text":"While displacing, impede and harass the enemy to provide the protected force commander with","rect":[151.1999969482422,237.46141052246095,540.045307636261,228.4077606201172]},{"page":133,"text":"additional time and maneuver space.","rect":[151.1999969482422,248.96522521972657,297.5890600681305,239.93150329589845]},{"page":133,"text":"Cause the enemy main body to deploy prematurely, and then, report their direction of travel.","rect":[151.1999969482422,262.4213562011719,520.7687475681305,253.3677215576172]},{"page":133,"text":"Deny ground observation, and prevent direct fire against the main body.","rect":[151.1999969482422,275.8613586425781,439.52308106422427,266.8077392578125]},{"page":133,"text":"Deny the enemy information about the size, strength, composition, and location of the main battle area.","rect":[151.1999969482422,289.42138671875,539.9815771579742,280.3677673339844]},{"page":133,"text":"Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main","rect":[151.1999969482422,302.86138916015627,540.0683789253235,293.8077697753906]},{"page":133,"text":"body forces are committed.","rect":[151.1999969482422,314.504638671875,260.73011231422427,305.4510192871094]},{"page":133,"text":"Planning and Execution Considerations for Defensive Cover Missions","rect":[90.0,339.0935974121094,416.0993390378952,329.2348937988281]},{"page":133,"text":"5-110. The planning and execution considerations are applicable to all types of defensive cover. Usually,","rect":[108.0,356.62139892578127,540.0610449314117,347.5677795410156]},{"page":133,"text":"the division or corps commander uses a BCT or designates a reconnaissance and security BCT as the","rect":[108.0,368.1451110839844,540.1335437278748,359.09149169921877]},{"page":133,"text":"foundation covering force. The commander reinforces and augments it with combat power to increase the","rect":[107.99998474121094,379.6688537597656,540.065733669281,370.615234375]},{"page":133,"text":"length of time it can fight the covering force battle and to give it the capability to destroy larger enemy forces.","rect":[107.99004364013672,391.0730285644531,540.0936377048492,382.0194091796875]},{"page":133,"text":"The amount of augmentation the covering force receives depends upon the intent of the main body","rect":[107.99998474121094,402.5967712402344,540.0548901557922,393.54315185546877]},{"page":133,"text":"commander (see figure 5-15, page 5-35). The BCT commander always designates reserves to seize the","rect":[107.98999786376953,414.1204833984375,540.0217273216248,405.0668640136719]},{"page":133,"text":"initiative during the early stages of an enemy attack.","rect":[107.98999786376953,425.6441955566406,317.2356970310211,416.590576171875]},{"page":133,"text":"5-111. The main body commander designates the forward and rear boundaries of the security force with","rect":[107.99004364013672,443.1638488769531,540.013325214386,434.1102294921875]},{"page":133,"text":"PLs. Normally, the lateral boundaries of the security area are extensions of the main body boundaries. The","rect":[107.99003601074219,454.68756103515627,540.0670154075623,445.6339416503906]},{"page":133,"text":"rear boundary of the security force is the BHL, which is within range of the main body artillery. The BCT","rect":[107.99003601074219,466.0917663574219,539.9432260389328,457.03814697265627]},{"page":133,"text":"commander designates additional control measures as needed to control the operation.","rect":[107.99000549316406,477.615478515625,452.71854615211489,468.5618591308594]},{"page":133,"text":"5-112. The BCT commander assigns an area of operations to each subordinate. Covering force missions","rect":[107.99996185302735,495.1351013183594,539.8748062257766,486.08148193359377]},{"page":133,"text":"delay and defeat enemy forces to allow maximum time for the main body to prepare and execute offensive","rect":[107.99996185302735,506.6588439941406,540.0770251731873,497.605224609375]},{"page":133,"text":"or defensive tasks. If certain terrain is crucial to the operation, the commander may assign battle positions to","rect":[107.99996185302735,518.1825561523438,539.9362378120422,509.12890625]},{"page":133,"text":"TFs. Subordinate commanders have the same options in the deployment of their units. If the terrain and","rect":[107.99996185302735,529.5867919921875,539.9882397651672,520.5331420898438]},{"page":133,"text":"situation permit, the covering force boundaries are extensions of the boundaries of corresponding main body","rect":[107.99996185302735,541.1105346679688,540.0580639839172,532.056884765625]},{"page":133,"text":"units to simplify the battle handover.","rect":[107.99996185302735,552.6342163085938,255.32828736305238,543.58056640625]},{"page":133,"text":"5-113. The BCT conducts zone reconnaissance or movement to contact to the forward PL in the security","rect":[107.99996185302735,570.1538696289063,539.9272656440735,561.1002197265625]},{"page":133,"text":"area. The BCT may be required to fight through enemy resistance to establish control over the security area.","rect":[107.99992370605469,581.6775512695313,540.2191870212555,572.6239013671875]},{"page":133,"text":"If the unit encounters heavy enemy resistance, the main body commander orders the covering force to occupy","rect":[107.99992370605469,593.2012939453125,540.0840039253235,584.1476440429688]},{"page":133,"text":"a new defensive line and conducts the cover. Planning for such contingencies is critical to the success of the","rect":[107.99992370605469,604.6055297851563,539.9764392356873,595.5518798828125]},{"page":133,"text":"covering force mission.","rect":[107.99992370605469,616.1292114257813,202.15976929664613,607.0755615234375]},{"page":133,"text":"5-114. Battle handover and passage of lines are inherent in the conduct of defensive cover. Battle handover","rect":[107.9899673461914,633.6488647460938,540.0697317705154,624.59521484375]},{"page":133,"text":"and passage of lines may not occur simultaneously for all covering force units. As some units begin passage,","rect":[107.98995208740235,645.1725463867188,540.0819799900055,636.118896484375]},{"page":133,"text":"others may still be taking advantage of offensive opportunities in other parts of the security area. The BCT","rect":[107.98995208740235,656.6962890625,539.9453012342453,647.6426391601563]},{"page":133,"text":"prepares to continue fighting in those portions of the security area where forces are successful to set up","rect":[107.98995208740235,668.2200317382813,540.0487866401672,659.1663818359375]},{"page":133,"text":"offensive opportunities for the main body. Disengagement criteria established by the division or BCT","rect":[107.9899673461914,679.6242065429688,539.9603769178391,670.570556640625]},{"page":133,"text":"commander dictate when covering force units may begin battle handover and passage of lines.","rect":[107.9899673461914,691.1478881835938,485.1166784763336,682.09423828125]},{"page":133,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":133,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":133,"text":"5-33","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":134,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":134,"text":"5-115. Organic and attached aviation assets are invaluable assets in assisting disengagement of ground units","rect":[90.0,83.50144958496094,522.0520523195266,74.44780731201172]},{"page":134,"text":"during the conduct of battle handover and passage of lines with the main body. Additionally, they can assist","rect":[90.0,95.02519226074219,521.8858233699799,85.97154998779297]},{"page":134,"text":"in reconnaissance of the security area as the covering force moves forward, screening forward of the covering","rect":[90.0,106.42936706542969,522.140522480011,97.37572479248047]},{"page":134,"text":"force, covering areas between ground units, and providing additional firepower for disengaging ground units.","rect":[90.0,117.95310974121094,522.0936377048492,108.89946746826172]},{"page":134,"text":"5-116. BCT staffs consider communications requirements to maintain contact with the main body and","rect":[90.00995635986328,135.4727020263672,522.1086621284485,126.41905975341797]},{"page":134,"text":"subordinate battalions within the covering force. Covering forces consider use of high frequency and tactical","rect":[90.00995635986328,146.99644470214845,522.1447345027924,137.9427947998047]},{"page":134,"text":"satellite communications to maintain continuous communications with all organic units, adjacent units, and","rect":[90.00995635986328,158.5201873779297,522.0610547065735,149.4565887451172]},{"page":134,"text":"higher. Covering forces may require additional signal assets to provide communications infrastructure","rect":[90.00995635986328,170.0438690185547,522.2443835716248,160.99021911621095]},{"page":134,"text":"support and retransmission.","rect":[90.00995635986328,181.4281768798828,200.25718140602113,172.3944549560547]},{"page":134,"text":"5-117. Reserves are critical to a defensive cover. They allow the BCT commander to seize the initiative","rect":[90.00995635986328,198.9676971435547,521.9682605247498,189.91404724121095]},{"page":134,"text":"during the early stages of an enemy attack. The covering force commander always designates a reserve.","rect":[90.00995635986328,210.49143981933595,522.157541513443,201.4377899169922]},{"page":134,"text":"Frequently, reserves are attack aviation units, combined arms battalions, and other operational control","rect":[90.00995635986328,222.0151824951172,522.1604205379487,212.96153259277345]},{"page":134,"text":"maneuver forces. In the absence of attached or operational control maneuver units, the BCT commander may","rect":[90.00995635986328,233.5388641357422,522.0810742378235,224.48521423339845]},{"page":134,"text":"assign a contingency mission to assigned tank companies and dictate employment restrictions to subordinate","rect":[90.00995635986328,245.06260681152345,521.9924304466248,236.0089569091797]},{"page":134,"text":"commanders. The tank company is the battalion-level commander’s primary reserve force. Normally,","rect":[90.00995635986328,256.4667663574219,522.0697729587555,247.4131317138672]},{"page":134,"text":"commanders position ground reserve forces in-depth and prepare them to execute a series of contingency","rect":[90.00995635986328,267.9905090332031,522.1813549995422,258.9368896484375]},{"page":134,"text":"missions, such as counterattack, block, and assume an area defense. Aviation reserves may counterattack in","rect":[89.99996185302735,279.5141906738281,522.0677075386047,270.4605712890625]},{"page":134,"text":"coordination with ground reserves and conduct an attack against enemy forces in close friendly contact.","rect":[89.99996185302735,291.0379333496094,522.0946142673492,281.98431396484377]},{"page":134,"text":"Frequently, the covering force commander designs the defense to shape an enemy penetration causing the","rect":[89.99996185302735,302.5616455078125,522.0659167747498,293.5080261230469]},{"page":134,"text":"enemy to become isolated and to provide opportunities to mass effects to defeat the isolated enemy.","rect":[89.99996185302735,314.0853576660156,488.88224244117739,305.03173828125]},{"page":134,"text":"5-34","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":134,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":134,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":135,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0831015625,37.7490234375]},{"page":135,"text":"Figure 5-15. Reinforced ABCT performing defensive cover","rect":[177.12001037597657,532.24169921875,452.7679947023392,522.9091796875]},{"page":135,"text":"Flank and Rear Defensive Covering Forces","rect":[90.0,550.8936157226563,292.07397893047337,541.034912109375]},{"page":135,"text":"5-118. The planning and execution considerations for flank and rear defensive covering forces are the same","rect":[108.0,568.4214477539063,540.1126697044373,559.3677978515625]},{"page":135,"text":"as for a frontal covering force. A rear covering force mission is similar to a rear guard mission. A rear","rect":[108.0,579.9451293945313,540.1116018877029,570.8914794921875]},{"page":135,"text":"covering force protects a force moving away from the enemy. The BCT deploys behind the forward maneuver","rect":[107.99998474121094,591.4688720703125,540.0950003252029,582.4152221679688]},{"page":135,"text":"units of the main body, conducts battle handover and passage of lines, and then defends or delays.","rect":[107.99998474121094,602.9925537109375,540.0839941501617,593.9389038085938]},{"page":135,"text":"Alternatively, the covering force may conduct a relief in place as part of a deception plan or to take advantage","rect":[107.99998474121094,614.3967895507813,540.1178576927185,605.3431396484375]},{"page":135,"text":"of the best defensive terrain.","rect":[107.99998474121094,623.9085083007813,221.62265992164613,616.8668212890625]},{"page":135,"text":"5-119. The BCT deploys its subordinate units abreast and in-depth. The subordinate units establish passage","rect":[107.99998474121094,643.4401245117188,540.104552028656,634.386474609375]},{"page":135,"text":"points and assist in the rearward passage of the main body as needed. From that point on, the mission is","rect":[107.99998474121094,654.9638671875,540.0939224367141,645.9102172851563]},{"page":135,"text":"conducted the same as any other defensive covering force operation. As the main body moves, the covering","rect":[107.99998474121094,666.487548828125,540.1656079292297,657.4338989257813]},{"page":135,"text":"force displaces to subsequent PLs in-depth. If the enemy does not follow the withdrawing forces, contact","rect":[107.99998474121094,677.8917846679688,540.0996905574799,668.838134765625]},{"page":135,"text":"may be lost eventually. Fighting a defense or delay is necessary if the enemy detects the movement and attacks.","rect":[107.98006439208985,689.4154663085938,539.9453222751617,680.36181640625]},{"page":135,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":135,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":135,"text":"5-35","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":136,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":136,"text":"AREA SECURITY","rect":[72.0,85.29055786132813,187.61939340019226,75.57487487792969]},{"page":136,"text":"5-120. Area security is a type of security operation conducted to protect friendly forces, lines of","rect":[90.0,105.58140563964844,522.0509329423904,96.52776336669922]},{"page":136,"text":"communications, and activities within a specific area (ADP 3-90). The BCT conducts area security to","rect":[89.99999237060547,117.10514831542969,521.9612011909485,108.05150604248047]},{"page":136,"text":"preserve the commander’s freedom of maneuver, ability to move reserves, positioning of fire support assets,","rect":[89.99000549316406,128.6288299560547,521.961496591568,119.57518768310547]},{"page":136,"text":"and to provide effective command and control and conduct sustainment operations. Area security degrades","rect":[89.99000549316406,140.03306579589845,522.1285904054641,130.9794158935547]},{"page":136,"text":"the enemy’s ability to affect friendly actions in a specific area by denying the enemy’s use of an area for its","rect":[89.989990234375,151.55674743652345,522.1287124757766,142.5030975341797]},{"page":136,"text":"own purposes. Area security is essential to all operations, particularly operations in asymmetric environments","rect":[89.989990234375,163.0804901123047,522.1495864992141,154.02684020996095]},{"page":136,"text":"during stability tasks. Area security enables military support to local governance, reconstruction efforts, rule","rect":[89.989990234375,174.6041717529297,522.0929553489685,165.55052185058595]},{"page":136,"text":"of law, and the development of legitimate security forces. BCTs conduct area security to establish security","rect":[89.989990234375,186.12791442871095,522.0558667182922,177.0742645263672]},{"page":136,"text":"around base camps, critical infrastructure, airfields, facilities, main supply routes (MSRs), lines of","rect":[89.98002624511719,197.6516571044922,522.0488577470779,188.59800720214845]},{"page":136,"text":"communication, terrain features, towns, equipment, and high-value assets. Offense, defense, and stability","rect":[89.98005676269531,209.0558319091797,521.8974194526672,200.00218200683595]},{"page":136,"text":"tasks support area security.","rect":[89.97010040283203,220.57957458496095,198.41854310035706,211.5259246826172]},{"page":136,"text":"5-121. Area security is largely concerned with consolidating gains. Area security is typically phased and","rect":[89.97010040283203,238.0991668701172,521.8999218940735,229.04551696777345]},{"page":136,"text":"ranges in scale. Upon completion or during the execution of a large-scale ground combat operation, area","rect":[89.97010040283203,249.62290954589845,521.954893825531,240.5692596435547]},{"page":136,"text":"security initially works to defeat bypassed enemy units that could constitute a means for further resistance or","rect":[89.97010040283203,261.1466369628906,522.0562430009842,252.09300231933595]},{"page":136,"text":"impact sustainment operations. As that enemy is defeated, actions transition to the defense of the local","rect":[89.9701156616211,272.6703796386719,522.2014971981049,263.61676025390627]},{"page":136,"text":"population, and finally, stability operations. Effectively, area security establishes the initial basis for wide","rect":[89.9701156616211,284.0745544433594,522.0370471458435,275.02093505859377]},{"page":136,"text":"area security.","rect":[89.9701156616211,295.5982971191406,143.3507330417633,286.544677734375]},{"page":136,"text":"5-122. Army forces perform area security to ensure freedom of action and to deny enemy forces the ability","rect":[89.9701156616211,313.1179504394531,521.9103589057922,304.0643310546875]},{"page":136,"text":"to disrupt operations. Commanders combine reconnaissance tasks and offensive, defensive, and stability","rect":[89.97010040283203,324.6416320800781,521.918354511261,315.5880126953125]},{"page":136,"text":"operations to protect friendly forces, populations, infrastructure, and activities critical to mission","rect":[89.97017669677735,336.16534423828127,521.913715839386,327.1117248535156]},{"page":136,"text":"accomplishment. Army forces integrate with partner military, law enforcement, and civil capabilities to","rect":[89.97017669677735,347.5695495605469,521.9355664253235,338.51593017578127]},{"page":136,"text":"establish and maintain security. The Army’s ability to establish control is critical to consolidating gains in","rect":[89.97017669677735,359.09326171875,521.9792675971985,350.0396423339844]},{"page":136,"text":"the wake of successful military operations.","rect":[89.96019744873047,370.6169738769531,261.0530798435211,361.5633544921875]},{"page":136,"text":"5-123.","rect":[89.96019744873047,386.10479736328127,115.84624695777893,379.26226806640627]},{"page":136,"text":"","rect":[115.19999694824219,398.7810974121094,121.2058769197464,394.0535888671875]},{"page":136,"text":"","rect":[115.19999694824219,412.2210998535156,121.2058769197464,407.49359130859377]},{"page":136,"text":"","rect":[115.19999694824219,425.7810974121094,121.2058769197464,421.0535888671875]},{"page":136,"text":"","rect":[115.19999694824219,439.2210998535156,121.2058769197464,434.49359130859377]},{"page":136,"text":"","rect":[115.19999694824219,452.7810974121094,121.2058769197464,448.0535888671875]},{"page":136,"text":"","rect":[115.19999694824219,466.2210998535156,121.2058769197464,461.49359130859377]},{"page":136,"text":"","rect":[115.19999694824219,479.7810974121094,121.2058769197464,475.0535888671875]},{"page":136,"text":"","rect":[115.19999694824219,493.2210998535156,121.2058769197464,488.49359130859377]},{"page":136,"text":"","rect":[115.19999694824219,506.7810974121094,121.2058769197464,502.0535888671875]},{"page":136,"text":"The commander may task subordinate units to conduct the following","rect":[124.52140808105469,388.1366271972656,386.44063234329226,379.0830078125]},{"page":136,"text":"Area, route, or zone reconnaissance.","rect":[133.1999969482422,400.0,278.3878881931305,392.44775390625]},{"page":136,"text":"Screen.","rect":[133.1999969482422,412.9394226074219,162.93657898902894,406.05706787109377]},{"page":136,"text":"Offensive and defensive tasks (within capabilities).","rect":[133.1999969482422,428.4814758300781,338.129953622818,419.44775390625]},{"page":136,"text":"Route and convoy security.","rect":[133.1999969482422,441.9413757324219,242.72910523414613,432.88775634765627]},{"page":136,"text":"Security for high-value assets.","rect":[133.1999969482422,455.5013732910156,254.2518560886383,446.44775390625]},{"page":136,"text":"Route or convoy security of critical lines of communications.","rect":[133.1999969482422,468.9413757324219,378.44507813453677,459.88775634765627]},{"page":136,"text":"Checkpoint operations to monitor or control movement.","rect":[133.1999969482422,482.4814758300781,356.845773935318,473.44775390625]},{"page":136,"text":"Patrol to cover gaps between secured perimeters.","rect":[133.1999969482422,495.9413757324219,329.03849244117739,486.88775634765627]},{"page":136,"text":"Maintaining an observable presence.","rect":[133.1999969482422,509.5013732910156,279.809152841568,500.44775390625]},{"page":136,"text":"to","rect":[388.5422058105469,386.1247253417969,396.04207277297976,380.0790100097656]},{"page":136,"text":"support area security operations:","rect":[398.24212646484377,388.1366271972656,521.9751788387299,379.0830078125]},{"page":136,"text":"EXECUTION CONSIDERATIONS","rect":[72.0,532.8480834960938,221.85284996032716,524.5560302734375]},{"page":136,"text":"5-124. When conducting an area security mission, the security force prevents threat, ground reconnaissance","rect":[90.0,552.8214111328125,521.9821155052185,543.7677612304688]},{"page":136,"text":"elements from directly observing friendly activities within the area the force is securing. Within capabilities,","rect":[90.0,564.3451538085938,521.962229013443,555.29150390625]},{"page":136,"text":"the security force prevents threat, ground maneuver forces from penetrating the defensive perimeters.","rect":[90.00003814697266,575.8688354492188,495.45768189430239,566.815185546875]},{"page":136,"text":"5-125. The commander can have the subordinate troops employ a variety of techniques, such as observation","rect":[90.00003814697266,593.3884887695313,521.9419751167297,584.3348388671875]},{"page":136,"text":"posts, battle positions, ambushes, and combat outposts, to accomplish the security mission. A reserve or quick","rect":[90.0,604.9122314453125,522.0746655464172,595.8585815429688]},{"page":136,"text":"reaction force enables the commander to react to unforeseen contingencies. The Cavalry squadron can","rect":[89.99998474121094,616.31640625,522.0628247261047,607.2627563476563]},{"page":136,"text":"execute ambushes and preemptive strikes with greater precision using the intelligence assets available to the","rect":[90.0,627.8401489257813,522.0866687278748,618.7864990234375]},{"page":136,"text":"BCT. Figure 5-16 is an example of a BCT Cavalry squadron conducting area security of a village.","rect":[90.00003814697266,639.3638305664063,482.1312048435211,630.3101806640625]},{"page":136,"text":"5-126. METT-TC (I) determines the required augmentation for the Cavalry squadron. Of particular","rect":[90.00003814697266,656.8834838867188,522.0788260087967,647.829833984375]},{"page":136,"text":"importance is the need for such assets as aviation, maneuver forces, engineers, intelligence operations assets,","rect":[90.00003051757813,668.4072265625,522.0390722751617,659.3535766601563]},{"page":136,"text":"Armor, Infantry, and military police. Early warning of threat activity is paramount in area security missions","rect":[90.00003051757813,679.8114013671875,522.0151260499954,670.7577514648438]},{"page":136,"text":"and provides the commander with time and space to react to threats. Failure to conduct continuous","rect":[90.00003051757813,691.315185546875,522.1505630617141,682.281494140625]},{"page":136,"text":"reconnaissance may create a vulnerable seam where the enemy can execute an infiltration or attack.","rect":[90.00003814697266,702.8588256835938,488.6711218357086,693.80517578125]},{"page":136,"text":"5-36","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":136,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":136,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":137,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":137,"text":"5-127. A unit establishes a perimeter when it secures an area where the defense does not have a supporting","rect":[108.0,83.50144958496094,540.0618481636047,74.44780731201172]},{"page":137,"text":"unit. Perimeters vary in shape and distribution of assets based upon the results of mission analysis, IPB, and","rect":[108.0,95.02519226074219,540.055317401886,85.97154998779297]},{"page":137,"text":"METT-TC (I). A probable direction of attack based on the enemy’s most likely and most dangerous courses","rect":[108.0,106.42936706542969,540.0219619874954,97.37572479248047]},{"page":137,"text":"of action, as determined in the IPB, may require the massing of combat power in that portion of the perimeter","rect":[108.0,117.95310974121094,540.0918264970779,108.89946746826172]},{"page":137,"text":"to defeat an attack or infiltration. If the perimeter was inward-focused as in stability tasks, the massing of combat","rect":[108.0,129.47679138183595,540.2580157527924,120.42314910888672]},{"page":137,"text":"power would prevent exfiltration or a breakout from the secured area.","rect":[107.99996185302735,140.98060607910157,374.0146276950836,131.94688415527345]},{"page":137,"text":"5-128. Usually, the unit establishing the perimeter divides it into subordinate unit sectors with boundaries","rect":[107.99996185302735,158.5201873779297,540.0150650148391,149.46653747558595]},{"page":137,"text":"and contact points. The unit employs integrated observation posts, integrating attack and reconnaissance","rect":[107.99996185302735,170.0438690185547,539.9899890403748,160.99021911621095]},{"page":137,"text":"aviation, ground-based sensors, UASs, HUMINT assets, and mounted and dismounted patrols. Commanders","rect":[108.0,181.44810485839845,540.1723526124954,172.3944549560547]},{"page":137,"text":"emplace attached tanks and other antiarmor weapon systems to orient on high-speed avenues of approach.","rect":[108.00995635986328,192.97178649902345,540.2111914157867,183.9181365966797]},{"page":137,"text":"UASs and ground-based sensors provide overlapping reconnaissance capabilities at extended distances from","rect":[108.00995635986328,204.4955291748047,540.2074981937409,195.44187927246095]},{"page":137,"text":"the perimeter.","rect":[108.01991271972656,215.99928283691407,163.67937684059144,206.96556091308595]},{"page":137,"text":"Figure 5-16. Cavalry squadron conducting area security","rect":[182.66015625,673.2828979492188,447.13599610519409,663.8408203125]},{"page":137,"text":"5-129. Area security is a frequent mission conducted during stability tasks when circumstances may not","rect":[108.00991821289063,690.8622436523438,540.0918170223237,681.80859375]},{"page":137,"text":"permit establishment of clearly defined perimeters. When a perimeter is not feasible, the Cavalry unit secures","rect":[108.00991821289063,702.2664794921875,540.1077774171829,693.2128295898438]},{"page":137,"text":"the area by establishing a presence and conducting reconnaissance tasks throughout the area. Subordinate","rect":[108.00991821289063,713.7902221679688,540.064024684906,704.736572265625]},{"page":137,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":137,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":137,"text":"5-37","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":138,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":138,"text":"units establish perimeters around base camps, critical infrastructure, and high-value assets, while other units","rect":[90.0,83.50144958496094,522.0249527101516,74.44780731201172]},{"page":138,"text":"conduct operations to establish presence, provide security, and assist in stability or relief tasks. The","rect":[90.0,95.02519226074219,522.099669216156,85.97154998779297]},{"page":138,"text":"commander positions reaction forces or disperses the reserve between several secured perimeters. Other","rect":[90.0,106.4094467163086,522.0281057939529,97.37572479248047]},{"page":138,"text":"missions or tasks that support area security may include the following:","rect":[90.0,117.95310974121094,372.2374469051361,108.89946746826172]},{"page":138,"text":" Route or convoy security of critical lines of communications.","rect":[115.19999694824219,131.3813934326172,378.44507813453677,122.32775115966797]},{"page":138,"text":" Checkpoint operations to monitor or control movement.","rect":[115.19999694824219,144.9214630126953,356.84876465797427,135.8877410888672]},{"page":138,"text":" Patrols to cover gaps between secured perimeters.","rect":[115.19999694824219,158.3813934326172,332.99170899391177,149.32774353027345]},{"page":138,"text":" Maintain an observable presence.","rect":[115.19999694824219,171.9214630126953,267.1111853122711,162.8877410888672]},{"page":138,"text":"ROUTE SECURITY","rect":[72.0,189.29998779296876,160.43570041656495,180.99600219726563]},{"page":138,"text":"5-130. Cavalry units conduct route security missions to prevent enemy forces from affecting freedom of","rect":[90.0,209.2613983154297,522.1784964189529,200.20774841308595]},{"page":138,"text":"maneuver along a protected route. A route security force operates on and to the flanks of a designated route.","rect":[90.00001525878906,220.78514099121095,521.9616186618805,211.7314910888672]},{"page":138,"text":"Route security operations are defensive in nature, and unlike guard operations, are terrain-oriented. A route","rect":[90.00001525878906,232.30882263183595,521.9801013450623,223.2551727294922]},{"page":138,"text":"security force prevents an enemy force from impeding, harassing, containing, seizing, or destroying traffic","rect":[89.99996185302735,243.8325653076172,522.0739123802185,234.77891540527345]},{"page":138,"text":"along the route. To accomplish this task, the force performs the following functions:","rect":[89.99996185302735,255.2367401123047,427.20787537193299,246.18309020996095]},{"page":138,"text":" Conduct continuous mounted and dismounted reconnaissance of the route and key locations along","rect":[115.19999694824219,268.6613464355469,521.939106464386,259.60772705078127]},{"page":138,"text":"the route to ensure trafficability.","rect":[133.1999969482422,280.3045959472656,262.4010717868805,271.2509765625]},{"page":138,"text":" Conduct sweeps of the route at irregular intervals to prevent emplacement of enemy mines.","rect":[115.19999694824219,293.74139404296877,498.2072241306305,284.6877746582031]},{"page":138,"text":" Cordon sections of the route to search suspected enemy locations.","rect":[115.19999694824219,307.181396484375,396.44581055641177,298.1277770996094]},{"page":138,"text":" Establish roadblocks and checkpoints along the route and lateral routes to stop and search vehicles,","rect":[115.19999694824219,320.74139404296877,521.8969824314117,311.6877746582031]},{"page":138,"text":"persons, and those entering the route.","rect":[133.1999969482422,332.2651062011719,282.44654297828677,323.21148681640627]},{"page":138,"text":" Occupy key locations and terrain along or near the route. If possible, establish a screen oriented","rect":[115.19999694824219,345.7013854980469,522.0375561714172,336.64776611328127]},{"page":138,"text":"to prevent enemy direct fire weapons and observation from influencing the route. This function is","rect":[133.1999969482422,357.22509765625,522.1561782960891,348.1714782714844]},{"page":138,"text":"known as out posting, also.","rect":[133.1999969482422,368.7488098144531,242.1325170993805,359.6951904296875]},{"page":138,"text":" Aggressively conduct ground and aerial patrols to maintain route security.","rect":[115.19999694824219,382.181396484375,429.924387216568,373.1277770996094]},{"page":138,"text":" Establishobservation posts(covert and overt) or ambushes at critical points to watch for threatactivity.","rect":[115.19999694824219,395.74139404296877,522.001779794693,386.6877746582031]},{"page":138,"text":"CONVOY SECURITY","rect":[72.0,413.1000061035156,168.83570957183839,404.7960205078125]},{"page":138,"text":"5-131. Convoy security is a subset of area security. Convoy security missions are offensive in nature and","rect":[90.0,433.0614013671875,522.0371289253235,424.0077819824219]},{"page":138,"text":"orient on the protected force. Typically, a convoy security is a security mission assigned to Cavalry troops,","rect":[90.00000762939453,444.5851135253906,522.072824716568,435.531494140625]},{"page":138,"text":"maneuver companies, and maneuver platoons. Commanders order convoy security missions when","rect":[90.00001525878906,456.1088562011719,521.9637036323547,447.05523681640627]},{"page":138,"text":"insufficient friendly forces are available to secure lines of communication in an area of operations. The","rect":[90.0,467.5130310058594,522.1097400169373,458.4593811035156]},{"page":138,"text":"commander may order troops to conduct convoy security missions in conjunction with route security","rect":[90.01000213623047,479.0367736816406,522.081928730011,469.9731750488281]},{"page":138,"text":"operations. A convoy security force operates to the front, flanks, and rear of a convoy element moving along","rect":[90.00995635986328,490.56048583984377,522.0740551948547,481.5068664550781]},{"page":138,"text":"a designated route or integrated into the body of the convoy.","rect":[90.00995635986328,502.0841979980469,331.421457529068,493.03057861328127]},{"page":138,"text":"5-132. A convoy security mission has specific tasks that guide planning and execution. The security force","rect":[90.00995635986328,519.6038818359375,522.1235339622498,510.55023193359377]},{"page":138,"text":"accomplishes the following to protect a convoy:","rect":[90.00995635986328,531.1276245117188,282.25508606529237,522.073974609375]},{"page":138,"text":" Reconnoiter the route the convoy is to travel.","rect":[115.19999694824219,544.5414428710938,313.76578736305239,535.48779296875]},{"page":138,"text":" Clear the route of obstacles or positions from which the enemy could influence movement.","rect":[115.19999694824219,557.9813842773438,496.4054663181305,548.927734375]},{"page":138,"text":" Provide early warning of enemy presence along the route.","rect":[115.19999694824219,571.5414428710938,364.5280249118805,562.48779296875]},{"page":138,"text":" Prevent the enemy from impeding, harassing, containing, seizing, or destroying the convoy.","rect":[115.19999694824219,584.9813842773438,500.48414063453677,575.927734375]},{"page":138,"text":"Organization","rect":[72.0,603.693603515625,134.42235863113405,593.8348999023438]},{"page":138,"text":"5-133. If possible, the convoy security force is a combined arms organization with integrated air and ground","rect":[90.0,621.221435546875,522.0799145698547,612.1677856445313]},{"page":138,"text":"assets (see figure 5-17). Ideally, a convoy security force has sufficient combat power to organize into the","rect":[90.0,632.7451782226563,522.0618884544373,623.6915283203125]},{"page":138,"text":"following elements:","rect":[89.99004364013672,644.1493530273438,169.79327881431579,635.095703125]},{"page":138,"text":" Advance guard. The advance guard performs continuous reconnaissance tasks along the main","rect":[115.19999694824219,657.5814208984375,522.070454120636,648.5277709960938]},{"page":138,"text":"body’s axis of advance or route. The advance guard maintains continuous surveillance of enemy","rect":[133.1999969482422,669.2246704101563,522.0415844917297,660.1710205078125]},{"page":138,"text":"avenues of approach and destroys or repels enemy reconnaissance and security forces to protect","rect":[133.1999969482422,680.7483520507813,521.9990435848237,671.6947021484375]},{"page":138,"text":"the convoy.","rect":[133.1999969482422,692.152587890625,179.96817994117738,683.0989379882813]},{"page":138,"text":" Security element. The security element provides early warning and security to the convoy’s flanks","rect":[115.19999694824219,705.5814208984375,522.1671035890579,696.5277709960938]},{"page":138,"text":"and rear. They may perform duties of the escort element.","rect":[133.1999969482422,717.2246704101563,360.82483887672427,708.1710205078125]},{"page":138,"text":"5-38","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":138,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":138,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":139,"text":"","rect":[133.1999969482422,80.6611099243164,139.2058769197464,75.93359375]},{"page":139,"text":"","rect":[133.1999969482422,105.74112701416016,139.2058769197464,101.01361083984375]},{"page":139,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":139,"text":"Escort element. The escort element provides close-in protection to the convoy. They may provide","rect":[151.1999969482422,83.38139343261719,540.1021716575623,74.32775115966797]},{"page":139,"text":"a response force to assist in repelling or destroying threat contact.","rect":[151.2000274658203,95.02464294433594,413.606271982193,85.97100067138672]},{"page":139,"text":"Reaction force. The reaction force provides firepower and support to assist the other elements in","rect":[151.1999969482422,108.44149017333985,539.9360547065735,99.40776824951172]},{"page":139,"text":"developing the situation or conducting a hasty attack. They may perform duties of the","rect":[151.1999969482422,119.98515319824219,539.4995105247498,110.93151092529297]},{"page":139,"text":"escort element.","rect":[151.1999969482422,129.49691772460938,214.06054139137269,122.45519256591797]},{"page":139,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":139,"text":"Figure 5-17. Convoy security organization","rect":[215.53163146972657,680.2052612304688,414.43977755260468,670.76318359375]},{"page":139,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":139,"text":"5-39","rect":[521.9999389648438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":140,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":140,"text":"Planning and Execution Considerations","rect":[72.0,84.5736083984375,258.1841016111374,74.71488952636719]},{"page":140,"text":"5-134. Convoy security missions generate unique requirements the commander and staff should take into","rect":[90.0,102.10142517089844,522.0540356636047,93.04778289794922]},{"page":140,"text":"account when formulating a plan. The convoy security commander and subordinates receive a briefing on","rect":[90.0,113.62516784667969,522.015278339386,104.57152557373047]},{"page":140,"text":"the latest information regarding the threat situation and the area through which the convoy is to pass.","rect":[90.0,125.14884948730469,492.8025915622711,116.09520721435547]},{"page":140,"text":"5-135. The commander formulates plans and issues orders covering the commander’s intent, assignment of","rect":[90.0,142.6685028076172,522.0849905595779,133.61485290527345]},{"page":140,"text":"security force elements (reconnaissance, screen, escort, and reaction), the movement formation, and intervals","rect":[90.0,154.19224548339845,522.2303970460891,145.1385955810547]},{"page":140,"text":"between echelons and vehicles, rate of travel, and detailed plans for actions on contact. Leaders at all levels","rect":[90.0,165.5764923095703,522.0570572023391,156.5427703857422]},{"page":140,"text":"should ensure the convoy security force identify and rehearse immediate action drills (such as enemy ambush,","rect":[90.0,177.1201629638672,522.1198828220367,168.06651306152345]},{"page":140,"text":"obstacle, and react to indirect fire) before movement and can execute them in case of contact.","rect":[90.0,188.62391662597657,463.55384278297427,179.59019470214845]},{"page":140,"text":"5-136. The commander may maintain a quick reaction force to support the convoy movement. The Cavalry","rect":[90.0,206.1634979248047,522.0587964057922,197.10984802246095]},{"page":140,"text":"unit may perform this mission. In addition, the commander assigns the Cavalry unit to set up outposts along","rect":[90.0,217.68724060058595,521.926899433136,208.6335906982422]},{"page":140,"text":"the convoy route or movement corridor to provide overwatch and security of the area. Usually, the","rect":[90.0,229.09141540527345,522.1046740989685,220.0377655029297]},{"page":140,"text":"commander does not assign the Cavalry unit an area of operations but tasks the Cavalry unit to provide","rect":[90.0,240.6151580810547,522.2121570091248,231.56150817871095]},{"page":140,"text":"security for that segment of the route or corridor.","rect":[89.99002838134766,252.1388397216797,285.79761719703677,243.08518981933595]},{"page":140,"text":"5-137. Communications are vital to the success of movement. Leaders plan communications with convoy","rect":[89.99002838134766,269.6584777832031,522.1676831245422,260.6048583984375]},{"page":140,"text":"elements and units occupying areas of operations along the route of movement to ensure support assets","rect":[89.99002838134766,281.1822204589844,522.0292251710891,272.12860107421877]},{"page":140,"text":"availability. Visual and sound signals are prearranged. Signals include colored smoke, identification panels,","rect":[90.0,292.7059631347656,522.0799658298492,283.65234375]},{"page":140,"text":"whistles or horn signals, and escalation of force signs. While limited, these communications means are","rect":[90.0,304.1101379394531,522.1475818138123,295.0565185546875]},{"page":140,"text":"effective when all personnel understand the prearranged signals and responses.","rect":[90.0,315.6338806152344,405.3217566013336,306.58026123046877]},{"page":140,"text":"5-138. When possible, units should coordinate fires along the entire route of movement. Adequate fires","rect":[90.0,333.15350341796877,522.1475113039016,324.0998840332031]},{"page":140,"text":"planning and prior coordination with fire support cells can ensure indirect fire coverage. The fire support","rect":[90.00003814697266,344.6772155761719,522.1285601863862,335.62359619140627]},{"page":140,"text":"officer conducts detailed fire support rehearsals on the fire support net before convoy movement. The officer","rect":[90.00003814697266,356.2009582519531,522.0827322587967,347.1473388671875]},{"page":140,"text":"conducts rehearsals to confirm communications connectivity and to improve the fire support team’s overall","rect":[90.0,367.72467041015627,521.9986163387299,358.67095947265627]},{"page":140,"text":"understanding of the fire support plan. Planning and coordination must occur among all units involved if the","rect":[89.98999786376953,379.12884521484377,521.9731433372498,370.07513427734377]},{"page":140,"text":"convoy plans to move through multiple units’ area of operations.","rect":[90.0,390.6525573730469,349.40821290016177,381.59893798828127]},{"page":140,"text":"5-139. If an air threat is possible, the commander addresses air defense of the convoy in the planning phase.","rect":[90.0,408.1722106933594,522.0946753025055,399.11859130859377]},{"page":140,"text":"The convoy elements review small arms air defense procedures and establish orientation sectors. The","rect":[90.0,419.6959228515625,522.1566760520935,410.6423034667969]},{"page":140,"text":"commander orchestrates air defense reinforcements into the movement and defense plan. If the route falls","rect":[90.0,431.1997375488281,522.1586197023391,422.166015625]},{"page":140,"text":"under an existing air defense umbrella, the staff conducts the appropriate coordination with the controlling","rect":[90.0,442.7433776855469,522.024067401886,433.68975830078127]},{"page":140,"text":"air defense headquarters.","rect":[90.0,454.127685546875,189.70157837867738,445.0939636230469]},{"page":140,"text":"5-140. Convoy security operations in an urban environment or built-up area require different emphasis and","rect":[90.0,471.6672058105469,521.956196308136,462.61358642578127]},{"page":140,"text":"techniques than those in rural areas. The population density and characteristics of the area may require","rect":[90.00001525878906,483.1909484863281,522.1076648216248,474.1373291015625]},{"page":140,"text":"nonlethal weapons and the careful application of lethal weapons in an effort to minimize collateral damage.","rect":[90.00003814697266,494.7146911621094,522.0946753025055,485.66107177734377]},{"page":140,"text":"To ensure they apply minimum essential force to minimize loss of life and destruction of property, leaders","rect":[90.0,506.2383728027344,522.1158340578079,497.18475341796877]},{"page":140,"text":"conduct detailed planning, coordination, and control. Whenever possible, convoys move through populated","rect":[89.99004364013672,517.6426391601563,522.0281567573547,508.5889892578125]},{"page":140,"text":"areas when these areas are least congested and pose less danger to the security of the convoy. Convoy","rect":[89.99004364013672,529.1663208007813,522.1137890815735,520.1126708984375]},{"page":140,"text":"operations may require assistance from military or local police and other government agencies to secure the","rect":[89.99004364013672,540.6900634765625,522.0996081809998,531.6364135742188]},{"page":140,"text":"route before the convoy enters the built-up area.","rect":[89.99000549316406,552.2138061523438,282.32059693336489,543.16015625]},{"page":140,"text":"5-141. The S-4 and unit commanders plan for sustainment in convoy security operations. Fuel and","rect":[89.989990234375,569.7334594726563,522.0380444526672,560.6798095703125]},{"page":140,"text":"maintenance elements are included in the convoy itself, or pre-positioned in secure areas along the route.","rect":[89.98003387451172,581.2571411132813,521.9471533298492,572.2034912109375]},{"page":140,"text":"Leaders should perform a detailed, precombat inspection before the convoy starts. Commanders plan casualty","rect":[89.98001861572266,592.661376953125,521.943256855011,583.6077270507813]},{"page":140,"text":"evacuation (CASEVAC) along the entire movement route. Commanders maintain coordination between the","rect":[89.98001861572266,604.1851196289063,522.0748889427185,595.1314697265625]},{"page":140,"text":"security force elements to ensure immediate medical support is available including the aid station, unit","rect":[89.97006225585938,615.7088623046875,522.1135455379487,606.6552124023438]},{"page":140,"text":"command post, sustainment command post, and designated units along the route. When operating at extended","rect":[89.97006225585938,627.2326049804688,522.1564526557922,618.178955078125]},{"page":140,"text":"distances from organic or supporting medical assets, air medical evacuation is the preferred means of","rect":[89.97006225585938,638.75634765625,522.1854544267654,629.7026977539063]},{"page":140,"text":"evacuation and is planned and rehearsed in detail.","rect":[89.97006225585938,650.2600708007813,288.77759766578677,641.2263793945313]},{"page":140,"text":"HIGH-VALUE ASSET CONSIDERATIONS","rect":[72.0,673.488037109375,263.85761070251467,665.1959838867188]},{"page":140,"text":"5-142. High-value assets are assets whose capture or destruction by enemy forces could decisively change","rect":[90.0,693.3414306640625,522.0888659934998,684.2877807617188]},{"page":140,"text":"the course of the operation. Security missions to protect high-value assets are an important component of","rect":[89.99005126953125,704.8651123046875,522.0467825517654,695.8114624023438]},{"page":140,"text":"5-40","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":140,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":140,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":141,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":141,"text":"area security in major combat operations and stability tasks. Examples of high-value assets to be secured in","rect":[108.0,83.50144958496094,540.0747265815735,74.4378433227539]},{"page":141,"text":"major combat operations include the following:","rect":[108.0,95.02519226074219,298.3246051082611,85.96158599853516]},{"page":141,"text":" Major power-generation facilities (power plants and dams).","rect":[133.1999969482422,108.46141052246094,389.2360327243805,99.3978042602539]},{"page":141,"text":" Airports, seaports, and other centers for mass transit.","rect":[133.1999969482422,121.8814926147461,362.24939942359927,112.84777069091797]},{"page":141,"text":" Industrial complexes.","rect":[133.1999969482422,135.4414825439453,237.32909607887269,126.40776824951172]},{"page":141,"text":" Cities.","rect":[133.1999969482422,146.89944458007813,176.846994638443,139.84776306152345]},{"page":141,"text":" Dislocated civilian camps.","rect":[133.1999969482422,162.4414825439453,257.00506043434145,153.4077606201172]},{"page":141,"text":"5-143.","rect":[108.00347137451172,177.94921875,133.88950562477113,171.10670471191407]},{"page":141,"text":"","rect":[133.1999969482422,190.7010955810547,139.2058769197464,185.97357177734376]},{"page":141,"text":"","rect":[133.1999969482422,204.14109802246095,139.2058769197464,199.41357421875]},{"page":141,"text":"","rect":[133.1999969482422,217.7010955810547,139.2058769197464,212.97357177734376]},{"page":141,"text":"","rect":[133.1999969482422,231.14109802246095,139.2058769197464,226.41357421875]},{"page":141,"text":"High-value assets to be secured in stability tasks include the following:","rect":[142.56466674804688,179.98106384277345,427.08601868247987,170.9274139404297]},{"page":141,"text":"Government officials and political and military leaders.","rect":[151.1999969482422,193.42137145996095,373.15860962867739,184.3677215576172]},{"page":141,"text":"Government facilities.","rect":[151.1999969482422,204.85940551757813,240.5641119480133,197.80772399902345]},{"page":141,"text":"High-value detainees.","rect":[151.1999969482422,220.42137145996095,238.41771912574769,211.3677215576172]},{"page":141,"text":"Pipelines and relay stations.","rect":[151.1999969482422,233.8613739013672,262.88343262672427,224.80772399902345]},{"page":141,"text":"5-144. Considerations the security force should address when it tasks subordinate elements to secure","rect":[108.00347137451172,251.5005340576172,540.0212390403748,242.44688415527345]},{"page":141,"text":"high-value assets include the following:","rect":[108.00350189208985,263.0242614746094,267.49690735435487,253.9706268310547]},{"page":141,"text":" Internet protocol address, frequencies, location, and linkup point of the high-value asset.","rect":[133.1999969482422,276.4613952636719,504.6933386325836,267.40777587890627]},{"page":141,"text":" Route used in reaching the high-value asset, and the composition and disposition of enemy forces","rect":[133.1999969482422,289.9013671875,540.0344741945266,280.8477478027344]},{"page":141,"text":"that can influence the route.","rect":[151.1999969482422,299.4131774902344,262.6483862400055,292.3714599609375]},{"page":141,"text":"","rect":[133.1999969482422,312.14111328125,139.2058769197464,307.4136047363281]},{"page":141,"text":"","rect":[133.1999969482422,325.70111083984377,139.2058769197464,320.9736022949219]},{"page":141,"text":"","rect":[133.1999969482422,350.6611022949219,139.2058769197464,345.93359375]},{"page":141,"text":"","rect":[133.1999969482422,364.2210998535156,139.2058769197464,359.49359130859377]},{"page":141,"text":"","rect":[133.1999969482422,377.6611022949219,139.2058769197464,372.93359375]},{"page":141,"text":"","rect":[133.1999969482422,402.6211242675781,139.2058769197464,397.89361572265627]},{"page":141,"text":"","rect":[133.1999969482422,416.18109130859377,139.2058769197464,411.4535827636719]},{"page":141,"text":"Mission and movement or positioning plan of the high-value asset.","rect":[151.1999969482422,314.86138916015627,418.277414560318,305.8077697753906]},{"page":141,"text":"How easily the threat may detect and target the high-value asset with indirect fire. The security","rect":[151.1999969482422,328.42138671875,539.9158520698547,319.3677673339844]},{"page":141,"text":"force should consider its own survivability and maintain adequate standoff from the high-value asset.","rect":[151.1999969482422,339.9450988769531,536.0145971775055,330.8914794921875]},{"page":141,"text":"Duration of the mission and sustainment considerations.","rect":[151.1999969482422,351.3694763183594,376.04395508766177,344.3277587890625]},{"page":141,"text":"Other friendly or neutral forces in the area and their task and purpose.","rect":[151.1999969482422,366.9413757324219,430.283273935318,357.88775634765627]},{"page":141,"text":"Triggers for change of mission from security to reconnaissance, offensive, or defensive actions. Is","rect":[151.1999969482422,380.3813781738281,540.1591079835891,371.3277587890625]},{"page":141,"text":"there an implied reserve mission?","rect":[151.1999969482422,391.88519287109377,285.71774172592168,382.8514709472656]},{"page":141,"text":"Ability of the security force to maintain communications with higher headquarters.","rect":[151.1999969482422,405.3414001464844,483.0871069431305,396.28778076171877]},{"page":141,"text":"Locations used by enemy personnel serving as forward observers for enemy indirect fire systems.","rect":[151.1999969482422,418.9013671875,539.8505346775055,409.8477478027344]},{"page":141,"text":"SECTION IV – TRANSITION PLANNING","rect":[99.36000061035156,442.82403564453127,320.0160231933594,433.94403076171877]},{"page":141,"text":"5-145.","rect":[108.0,464.2695617675781,133.88604187965394,457.4270324707031]},{"page":141,"text":"The transition from offensive to defensive operations or vice versa consistently occurs during","rect":[142.5612030029297,466.3013916015625,540.0688061714172,457.2477722167969]},{"page":141,"text":"large-scale combat operations. Cavalry units perform battle handovers by conducting a passage of lines","rect":[108.00999450683594,477.7055969238281,540.2045181398391,468.6519775390625]},{"page":141,"text":"(forward or rearward), a transition using a relief in place, or a change of mission. Passage of lines and relief","rect":[108.00999450683594,489.22930908203127,540.2014456377029,480.1756896972656]},{"page":141,"text":"in place are enabling operations found in ADP 3-90.","rect":[108.00999450683594,500.7530212402344,317.2497045993805,491.69940185546877]},{"page":141,"text":"5-146. Cavalry units are consistently transitioning from reconnaissance and security operations or vice","rect":[108.00003814697266,518.272705078125,540.1386706809998,509.21905517578127]},{"page":141,"text":"versa; therefore, planning for transitions begins early in the operations process during the development of the","rect":[108.00003814697266,529.7964477539063,540.2374255638123,520.7427978515625]},{"page":141,"text":"concept of operations and scheme of maneuver in which decision points are identified for when to execute","rect":[108.00003814697266,541.3001708984375,539.9526355247498,532.2664794921875]},{"page":141,"text":"those necessary transitions. The reconnaissance and security efforts by the Cavalry unit answer information","rect":[108.00003814697266,552.7243041992188,540.0481762886047,543.670654296875]},{"page":141,"text":"requirements that enable the BCT commander and staff to develop transition decision points or refine the","rect":[108.00003814697266,564.2280883789063,540.085753200531,555.1943969726563]},{"page":141,"text":"same decision points if the Cavalry unit has to transition earlier or later than originally planned based on","rect":[108.00003814697266,575.7717895507813,540.0063061714172,566.7181396484375]},{"page":141,"text":"effects from enemy or terrain. The decision points that drive the transition of the Cavalry unit must be","rect":[108.00003814697266,587.2954711914063,540.1046740989685,578.2418212890625]},{"page":141,"text":"understood at each echelon to ensure the BCT maintains tempo as transitions occur.","rect":[108.0,598.7992553710938,443.245676279068,589.7655639648438]},{"page":141,"text":"BATTLE HANDOVER","rect":[90.0,624.0765380859375,232.04549508476257,614.3749389648438]},{"page":141,"text":"5-147. A battle handover is a coordinated operation between two units that transfer responsibility for","rect":[108.0,644.3814086914063,540.2063894853592,635.3277587890625]},{"page":141,"text":"fighting an enemy force from one unit to the other. During defensive operations, the battle handover is usually","rect":[108.0,655.78564453125,539.954243183136,646.7319946289063]},{"page":141,"text":"coordinated in advance so that when ordered to occur, the operation requires minimum coordination. In the","rect":[108.01000213623047,667.2893676757813,540.1066272239685,658.2556762695313]},{"page":141,"text":"offense, it is often initiated by a fragmentary order based on the situation at hand. Clear standard operating","rect":[108.00999450683594,678.8330688476563,540.066792011261,669.7794189453125]},{"page":141,"text":"procedure (SOP) allows units to quickly establish the necessary coordination to preclude a loss of momentum","rect":[108.00999450683594,690.3567504882813,540.0897003421784,681.3031005859375]},{"page":141,"text":"in the attack. A battle handover is typically associated with the conduct of passage of lines (forward or","rect":[108.00999450683594,701.8804931640625,540.0897513017654,692.8268432617188]},{"page":141,"text":"rearward).","rect":[108.00999450683594,713.38427734375,149.485422372818,704.3505859375]},{"page":141,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":141,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":141,"text":"5-41","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":142,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":142,"text":"BATTLE HANDOVER PLANNING","rect":[72.0,83.30223083496094,226.4815492630005,75.21603393554688]},{"page":142,"text":"5-148. Battle handover can occur during either offensive or defensive operations. During defensive","rect":[90.0,103.30143737792969,521.9753406028748,94.24779510498047]},{"page":142,"text":"operations, the battle handover is usually planned and coordinated in advance to facilitate execution and","rect":[90.0,114.82518005371094,522.0051465034485,105.77153778076172]},{"page":142,"text":"frequently involves a rearward passage of lines. In the offense, a battle handover is situation dependent and","rect":[90.0,126.22935485839844,522.0578198432922,117.17571258544922]},{"page":142,"text":"often initiated by a fragmentary order. Normally, a battle handover occurs in the offense when one unit passes","rect":[90.0,137.7530975341797,522.0438736085891,128.69944763183595]},{"page":142,"text":"through or around another unit. Tactical SOPs containing clear, simple, standardized procedures, and control","rect":[90.0,149.2767791748047,522.1375323543549,140.22312927246095]},{"page":142,"text":"measures enhance the ability of units to coordinate without experiencing a corresponding loss in momentum.","rect":[90.0,160.80052185058595,522.0977880954742,151.7468719482422]},{"page":142,"text":"5-149. Battle handover occurs along a line forward of the stationary force known as the BHL. The BCT","rect":[90.0,178.32017517089845,521.8051645154953,169.2665252685547]},{"page":142,"text":"commander establishes the line in coordination with stationary and passing battalion commanders. Usually,","rect":[90.0,189.84385681152345,522.0759375095367,180.7902069091797]},{"page":142,"text":"the stationary commander determines the BHL location. The line is forward of the forward edge of the battle","rect":[90.0,201.2480926513672,522.103575466156,192.19444274902345]},{"page":142,"text":"area in the defense or the FLOT in the offense. The BHL is located where elements of the passing unit can","rect":[90.0,212.7717742919922,522.0487866401672,203.71812438964845]},{"page":142,"text":"be overwatched effectively by direct fires or supported by indirect fires of the forward combat element of the","rect":[90.0,224.29551696777345,522.148741481781,215.2418670654297]},{"page":142,"text":"stationary unit until the battle handover is complete.","rect":[90.0,235.8192596435547,298.27259278297427,226.76560974121095]},{"page":142,"text":"5-150. Physical handover frequently occurs near the BHL. Events may dictate that a force break contact","rect":[90.0,253.33885192871095,522.1397906551362,244.2852020263672]},{"page":142,"text":"forward of or behind the BHL; for example, this may occur when there is a gap between echelons of the","rect":[90.0,264.8625793457031,522.1016833763123,255.80894470214845]},{"page":142,"text":"attacking enemy force. Close coordination (physical, digital, or voice) between the units involved in the","rect":[90.0,276.2667541503906,522.1008288841248,267.213134765625]},{"page":142,"text":"handover allows them to coordinate and execute this process at the small-unit level.","rect":[90.0,287.7705993652344,424.76258301734927,278.73687744140627]},{"page":142,"text":"BATTLE HANDOVER FLOW","rect":[72.0,311.052734375,204.83870315551759,302.97601318359377]},{"page":142,"text":"5-151. The battle handover operation begins on order of the commander of the units involved or when a","rect":[90.0,331.0614013671875,522.0570056419373,322.0077819824219]},{"page":142,"text":"given set of conditions occurs. Defensive handover is complete when the passing unit is clear and the","rect":[90.0,342.5851135253906,522.1298816184998,333.531494140625]},{"page":142,"text":"stationary unit is ready to engage the enemy. These actions may occur at the same time. Offensive handover","rect":[90.0,354.1088562011719,522.0741263017654,345.05523681640627]},{"page":142,"text":"is complete when the passing unit crosses the BHL, which is usually considered the LD for the attacking unit.","rect":[90.0,365.5130310058594,521.9831030368805,356.45941162109377]},{"page":142,"text":"Until the handover is complete and acknowledged by the commanders, the commander in contact is","rect":[90.00999450683594,377.0367736816406,522.2025039796829,367.983154296875]},{"page":142,"text":"responsible for coordinating the fight.","rect":[90.00999450683594,388.56048583984377,241.5414068698883,379.5068664550781]},{"page":142,"text":"5-152. Coordination for battle handover flows from the commander out of contact to the commander in","rect":[90.01000213623047,404.0781555175781,522.0171704292297,397.0264892578125]},{"page":142,"text":"contact. The coordination for a battle handover overlaps with the coordination for a passage of lines; the","rect":[90.00995635986328,417.6038513183594,522.0480334739685,408.55023193359377]},{"page":142,"text":"coordination for both should be accomplished at the same time. The squadron tactical SOP should outline","rect":[90.00995635986328,429.107666015625,522.1066882591248,420.0739440917969]},{"page":142,"text":"these coordination requirements to facilitate rapid accomplishment.","rect":[90.00995635986328,440.5118713378906,359.74161744117739,431.4781494140625]},{"page":142,"text":"5-153. Digital information systems assist the squadron staff with its coordination and synchronization","rect":[90.00995635986328,458.0513916015625,522.0777173042297,448.9977722167969]},{"page":142,"text":"efforts for the operation. Each unit transmits or delivers a complete copy of its OPORD and overlays by either","rect":[90.00997161865235,469.5751037597656,522.1158743486404,460.521484375]},{"page":142,"text":"digital or analog means. Any changes made after initial distribution are updated immediately. The","rect":[90.00997161865235,481.0988464355469,522.0668933372498,472.04522705078127]},{"page":142,"text":"coordination between the two commanders involves—","rect":[90.00000762939453,490.6106262207031,308.6419153213501,483.56890869140627]},{"page":142,"text":"","rect":[115.19999694824219,503.3011169433594,121.2058769197464,498.5736083984375]},{"page":142,"text":"","rect":[115.19999694824219,516.7411499023438,121.2058769197464,512.0136108398438]},{"page":142,"text":"","rect":[115.19999694824219,530.3011474609375,121.2058769197464,525.5736083984375]},{"page":142,"text":"","rect":[115.19999694824219,555.2611083984375,121.2058769197464,550.5335693359375]},{"page":142,"text":"","rect":[115.19999694824219,568.8211669921875,121.2058769197464,564.0936279296875]},{"page":142,"text":"","rect":[115.19999694824219,593.7811279296875,121.2058769197464,589.0535888671875]},{"page":142,"text":"","rect":[115.19999694824219,618.7411499023438,121.2058769197464,614.0136108398438]},{"page":142,"text":"","rect":[115.19999694824219,632.3011474609375,121.2058769197464,627.5736083984375]},{"page":142,"text":"","rect":[115.19999694824219,645.7411499023438,121.2058769197464,641.0136108398438]},{"page":142,"text":"","rect":[115.19999694824219,659.3011474609375,121.2058769197464,654.5736083984375]},{"page":142,"text":"","rect":[115.19999694824219,672.7411499023438,121.2058769197464,668.0136108398438]},{"page":142,"text":"Establishing digital and voice radio communications.","rect":[133.1999969482422,506.0213928222656,346.048166513443,496.9677734375]},{"page":142,"text":"Providing updates of friendly and enemy situations (digital, voice, and graphical).","rect":[133.1999969482422,519.46142578125,460.7784216403961,510.40777587890627]},{"page":142,"text":"Coordinating passage points and routes and ensuring these are displayed on operational overlays","rect":[133.1999969482422,533.0214233398438,522.0186660890579,523.9677734375]},{"page":142,"text":"(digital and analog).","rect":[133.1999969482422,544.5451049804688,214.04732728004456,535.491455078125]},{"page":142,"text":"Collocating contact points and exchanging liaison personnel (if required).","rect":[133.1999969482422,557.9813842773438,428.00403809547427,548.927734375]},{"page":142,"text":"Coordinating fires (direct and indirect) and ensuring the direct fire control measures and","rect":[133.1999969482422,571.5414428710938,504.331684589386,562.48779296875]},{"page":142,"text":"support coordination measures display on operational overlays (digital and conventional).","rect":[133.1999969482422,583.0651245117188,492.202219247818,574.011474609375]},{"page":142,"text":"Providing updated obstacle overlays including self-destruct, date-time groups of emplaced family","rect":[133.1999969482422,596.5014038085938,522.0473828315735,587.44775390625]},{"page":142,"text":"of scatterable mines obstacles and reserve demolitions in the affected area of operations.","rect":[133.19004821777345,608.0051879882813,486.6803991794586,598.9714965820313]},{"page":142,"text":"Determining the need for and dispatching contact point representatives.","rect":[133.1999969482422,621.46142578125,418.890695810318,612.4077758789063]},{"page":142,"text":"Establishing and coordinating recognition signals.","rect":[133.1999969482422,635.0214233398438,333.4467566013336,625.9677734375]},{"page":142,"text":"Exchanging locations of obstacles and related covering fires.","rect":[133.1999969482422,648.46142578125,376.5507299900055,639.4077758789063]},{"page":142,"text":"Exchanging route information, including waypoints.","rect":[133.1999969482422,662.0214233398438,342.57511353492739,652.9677734375]},{"page":142,"text":"Determining sustainment requirements.","rect":[133.1999969482422,675.46142578125,291.20435547828677,666.4077758789063]},{"page":142,"text":"5-154. Due to the fluid nature of a battle handover, commanders can use digital systems to speed the","rect":[89.99351501464844,692.9810791015625,522.154112575531,683.9274291992188]},{"page":142,"text":"planning, coordination, and execution processes. Units should plan voice radio; if digital capabilities are","rect":[89.99351501464844,704.5047607421875,522.0943591575623,695.4511108398438]},{"page":142,"text":"hampered, then units should use frequency modulation to coordinate and execute battle handovers.","rect":[89.99351501464844,716.0285034179688,484.88355469703677,706.974853515625]},{"page":142,"text":"5-42","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":142,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":142,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":143,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":143,"text":"PASSAGE OF LINES (FORWARD AND REARWARD)","rect":[90.0,87.87391662597656,431.2351954755783,75.56083679199219]},{"page":143,"text":"5-155. Cavalry units usually begin and end reconnaissance and security operations with a passage of lines,","rect":[108.0,105.58140563964844,540.1276953220367,96.52776336669922]},{"page":143,"text":"or a reconnaissance handover (discussed in chapter 4). A passage of lines is a tactical operation designed to","rect":[107.99998474121094,117.10514831542969,540.078754901886,108.05150604248047]},{"page":143,"text":"pass one unit through the positions of another unit without interference. A passage may be designated as a","rect":[107.99998474121094,128.6288299560547,540.0867907981873,119.57518768310547]},{"page":143,"text":"forward or rearward passage of lines. A passage of lines is an inherent aspect of transferring responsibility","rect":[107.99998474121094,140.03306579589845,539.930805683136,130.9794158935547]},{"page":143,"text":"for the battle between commanders while maintaining continuity of the fight. Cavalry units can be the passing","rect":[108.0,151.55674743652345,539.9460644721985,142.5030975341797]},{"page":143,"text":"or stationary force.","rect":[108.0,163.0804901123047,181.7737066745758,154.02684020996095]},{"page":143,"text":"FORWARD PASSAGE OF LINES","rect":[90.0,186.38218688964845,237.58603477478028,178.29598999023438]},{"page":143,"text":"5-156. A forward passage of lines occurs when a unit passes through another unit’s positions while moving","rect":[108.0,206.3813934326172,540.065815448761,197.32774353027345]},{"page":143,"text":"toward the enemy (ADP 3-90). Cavalry units conduct forward passage of lines as a transitional operation,","rect":[108.00995635986328,217.90513610839845,540.0788061618805,208.8514862060547]},{"page":143,"text":"typically before reconnaissance and security missions, when the factors of METT-TC (I) do not provide the","rect":[108.01992797851563,229.42881774902345,540.1186511497498,220.3751678466797]},{"page":143,"text":"freedom of bypassing a forward friendly unit. A forward passage of lines may also be conducted by Cavalry","rect":[108.01994323730469,240.8330535888672,540.1916699409485,231.77940368652345]},{"page":143,"text":"units to—","rect":[108.01994323730469,250.34481811523438,147.7404260635376,243.30308532714845]},{"page":143,"text":" Continue the attack or counterattack.","rect":[133.1999969482422,263.7794494628906,298.657785654068,256.727783203125]},{"page":143,"text":" Envelop a threat force.","rect":[133.1999969482422,279.3215026855469,242.3688452243805,270.28778076171877]},{"page":143,"text":" Pursue a fleeing threat.","rect":[133.1999969482422,292.7814025878906,243.463449716568,283.727783203125]},{"page":143,"text":" Pass between friendly areas of operations during nonlinear operations.","rect":[133.1999969482422,306.3414001464844,432.5700170993805,297.28778076171877]},{"page":143,"text":"5-157. The passing force uses two techniques. In the first technique, the passing force deploys in its attack","rect":[108.00349426269531,323.8610534667969,539.943500995636,314.807373046875]},{"page":143,"text":"formation in the attack positions to the rear of the FLOT and crosses the FLOT in attack formation. This","rect":[108.01339721679688,335.3648681640625,540.1122940187454,326.3311462402344]},{"page":143,"text":"technique is appropriate if there is adequate maneuver space for the passing force to deploy effectively and","rect":[108.01343536376953,346.9084777832031,540.1730542182922,337.8548583984375]},{"page":143,"text":"without disrupting the stationary force’s defensive positions. This technique also allows the passing force to","rect":[108.01343536376953,358.31268310546877,540.075336933136,349.2590637207031]},{"page":143,"text":"rapidly attack once it crosses the FLOT.","rect":[108.0134506225586,369.8363952636719,268.32264161109927,360.78277587890627]},{"page":143,"text":"5-158. In the second technique, the passing force deploys after crossing the FLOT. Using this technique,","rect":[108.0134506225586,387.3560485839844,540.0654394626617,378.30242919921877]},{"page":143,"text":"the passing force crosses the FLOT in march column and then deploys into attack formations prior to crossing","rect":[108.0134506225586,398.8797607421875,540.0782055854797,389.8261413574219]},{"page":143,"text":"the BHL. This technique is required by restrictive terrain. If this technique is used, the FLOT should be","rect":[108.0134506225586,410.4034729003906,540.0385119895935,401.349853515625]},{"page":143,"text":"outside direct fire range of the threat to allow the passing force to deploy before making direct fire contact","rect":[108.00349426269531,421.92718505859377,540.1015216121674,412.8735656738281]},{"page":143,"text":"with the threat.","rect":[108.00349426269531,431.3194885253906,168.32822632789613,424.27777099609377]},{"page":143,"text":"5-159. Both of the passing force’s techniques require stationary unit scouts on or near the BHL. The passing","rect":[108.00349426269531,450.85101318359377,539.9613842964172,441.7973937988281]},{"page":143,"text":"unit may have their scout platoon link up with stationary unit scouts and continue the mission or they may","rect":[108.01339721679688,462.3747863769531,540.069233417511,453.3211364746094]},{"page":143,"text":"have combat units deploy along the BHL to overwatch movement of other units. The units on the ground at","rect":[108.00346374511719,473.8984680175781,540.1172686824799,464.8448486328125]},{"page":143,"text":"the BHL must know the scheme of maneuver of the passing force so that they can act accordingly.","rect":[108.00346374511719,485.4222106933594,501.93644165992739,476.36859130859377]},{"page":143,"text":"5-160. If the stationary unit identifies a gap or weak point in the threat's deployment, they should go about","rect":[108.01341247558594,502.9418640136719,540.1469317684174,493.88824462890627]},{"page":143,"text":"identifying axes of attack for the passing force that take advantage of that weakness (reconnaissance-pull).","rect":[108.02336883544922,514.3460693359375,540.1130468845367,505.29241943359377]},{"page":143,"text":"The premier consideration is that the stationary force should not pass the moving force into the teeth of the","rect":[108.02336883544922,525.8698120117188,540.1003406028748,516.816162109375]},{"page":143,"text":"threat defense. The passing force must be flexible enough to modify its scheme of maneuver, if necessary, to","rect":[108.02336883544922,537.3934936523438,540.0874218940735,528.33984375]},{"page":143,"text":"take advantage of weaknesses in the threat’s defense. Figure 5-18, page 5-44 depicts the graphic control","rect":[108.02336883544922,548.917236328125,540.1310015926362,539.8635864257813]},{"page":143,"text":"measures associated with a forward passage of lines.","rect":[108.013427734375,560.4409790039063,318.6117651462555,551.3873291015625]},{"page":143,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":143,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":143,"text":"5-43","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":144,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":144,"text":"Figure 5-18. Forward passage of lines","rect":[207.47999572753907,586.24169921875,386.2878820915222,576.9091796875]},{"page":144,"text":"REARWARD PASSAGE OF LINES","rect":[72.0,609.6221923828125,226.78604698181153,601.5359497070313]},{"page":144,"text":"5-161.","rect":[90.0,627.5895385742188,115.88604187965393,620.7470092773438]},{"page":144,"text":"Historically, Cavalry units conducting a rearward passage of lines have been associated with","rect":[124.56120300292969,629.6213989257813,522.078754901886,620.5677490234375]},{"page":144,"text":"covering force operations. This remains true in the contemporary operational environment. Additionally, the","rect":[90.0,641.025634765625,522.0946643333435,631.9719848632813]},{"page":144,"text":"nonlinear battlefield creates continuing requirements for rearward passage of lines. A rearward passage of","rect":[90.00003814697266,652.54931640625,522.0071002254487,643.4956665039063]},{"page":144,"text":"lines occurs when a unit passes through another unit’s position while moving away from the enemy","rect":[90.00003814697266,664.0730590820313,521.9492993354797,655.0194091796875]},{"page":144,"text":"(ADP 3-90). This operation may or may not be conducted under threat pressure. An example of a rearward","rect":[90.01000213623047,675.5967407226563,522.054096698761,666.5430908203125]},{"page":144,"text":"passage of lines is a Cavalry squadron as a covering force conducting a rearward passage of lines with the","rect":[90.00995635986328,687.1204833984375,522.1215198020935,678.0668334960938]},{"page":144,"text":"stationary unit in the main battle area. The covering force (Cavalry squadron) withdraws through the","rect":[90.00995635986328,698.6442260742188,522.1176135520935,689.590576171875]},{"page":144,"text":"5-44","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":144,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":144,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":145,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":145,"text":"stationary force, handing off control of the fight at the BHL. Figure 5-19 provides an example of a rearward","rect":[108.0,83.50144958496094,540.078754901886,74.44780731201172]},{"page":145,"text":"passage of lines with graphic control measures.","rect":[108.0,95.02519226074219,297.206125497818,85.97154998779297]},{"page":145,"text":"Planning Considerations","rect":[90.0,630.8135986328125,205.8979230222702,620.9548950195313]},{"page":145,"text":"Figure 5-19. Rearward passage of lines","rect":[222.480224609375,618.1642456054688,407.38865113449097,608.8317260742188]},{"page":145,"text":"5-162. Planning procedures for a rearward passage of lines closely resemble the planning procedures for a","rect":[108.0,648.46142578125,539.973204372406,639.4077758789063]},{"page":145,"text":"forward passage of lines. However, rearward movement is likely to be more difficult because of the following:","rect":[108.00001525878906,659.9851684570313,539.7797442684174,650.9315185546875]},{"page":145,"text":" The threat probably has the initiative, which tends to reduce the time available to conduct liaison","rect":[133.1999969482422,673.4214477539063,539.9168286323547,664.3677978515625]},{"page":145,"text":"and reconnaissance and make detailed plans.","rect":[151.1999969482422,684.9251708984375,330.12244629859927,675.8914794921875]},{"page":145,"text":" If the rearward moving force has been in action, its Soldiers are tired and possibly disorganized to","rect":[133.1999969482422,698.3814086914063,539.9348340034485,689.3277587890625]},{"page":145,"text":"some degree.","rect":[151.1999969482422,709.9051513671875,204.093576669693,700.8515014648438]},{"page":145,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":145,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":145,"text":"5-45","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":146,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":146,"text":" The threat may be applying pressure on the passing force.","rect":[115.19999694824219,83.38139343261719,364.412424325943,74.32775115966797]},{"page":146,"text":" Friendly forces may be more difficult to recognize because threat forces may be intermixed with them.","rect":[115.19999694824219,96.94139099121094,522.0891211032867,87.88774871826172]},{"page":146,"text":"5-163. To facilitate a rearward passage of lines, the stationary force commander develops an overlay. Once","rect":[90.00350189208985,114.46104431152344,522.1131579856873,105.40740203857422]},{"page":146,"text":"the overlay is prepared, the stationary commander transmits it and any amplifying information to the passing","rect":[90.01344299316406,125.98472595214844,522.0804028511047,116.93108367919922]},{"page":146,"text":"force commander by way of digital command and control systems. The following graphic control measures","rect":[90.01344299316406,137.5084686279297,522.0366714601516,128.45481872558595]},{"page":146,"text":"are included in a passage of lines overlay:","rect":[90.01344299316406,149.03221130371095,257.56554138755799,139.9785614013672]},{"page":146,"text":" BHL.","rect":[115.19999694824219,160.32000732421876,155.61397767066956,153.7264862060547]},{"page":146,"text":" Contact points forward of the BHL.","rect":[115.19999694824219,175.88148498535157,275.84705567359927,166.84776306152345]},{"page":146,"text":" Passage points along the forward edge of the battlefield.","rect":[115.19999694824219,189.46141052246095,357.9264929294586,180.4077606201172]},{"page":146,"text":" Lanes to the rear of the main battle area.","rect":[115.19999694824219,200.88949584960938,294.593820810318,193.84776306152345]},{"page":146,"text":" Assembly area.","rect":[115.19999694824219,216.46141052246095,194.8553717136383,207.4077606201172]},{"page":146,"text":" Release point.","rect":[115.19999694824219,229.88148498535157,189.80367493629456,220.84776306152345]},{"page":146,"text":"5-164. During a passage of lines, friendly unit density in a relatively small maneuver space may cause","rect":[89.99351501464844,247.4210662841797,522.102354763031,238.36741638183595]},{"page":146,"text":"problems in the ability of the commander to maintain the common operating picture in relation to the passed","rect":[89.99351501464844,258.9447326660156,522.053608417511,249.89109802246095]},{"page":146,"text":"and passing units. The stationary and passing commanders should determine the best method of exercising","rect":[89.99351501464844,270.4684753417969,522.027729511261,261.41485595703127]},{"page":146,"text":"mission command to avoid slowing the tempo of the operation and to reduce fratricide potential.","rect":[89.99351501464844,281.9922180175781,475.87980103492739,272.9385986328125]},{"page":146,"text":"Rehearsal","rect":[72.0,304.3435363769531,119.1187186832428,296.89154052734377]},{"page":146,"text":"5-165. A rehearsal is beneficial to all units responsible in the execution of a passage of lines operation. The","rect":[90.0,324.10137939453127,521.9832751731873,315.0477600097656]},{"page":146,"text":"rehearsal allows the passing and stationary unit to work through issues commonly found during this complex","rect":[90.0,335.6250915527344,522.0678906440735,326.57147216796877]},{"page":146,"text":"operation. The rehearsal allows for easy identification of the passage points and routes to and from areas of","rect":[90.00000762939453,347.1488342285156,521.9523001298904,338.09521484375]},{"page":146,"text":"operations, and for the units to conduct a communication linkup onvoice and digital communication systems.","rect":[90.0,358.67254638671877,522.103586435318,349.6189270019531]},{"page":146,"text":"Other rehearsal items include the following:","rect":[90.00995635986328,370.0767517089844,266.5278826961517,361.02313232421877]},{"page":146,"text":" Fire support observation plan, target execution, communication linkages, and mutual support operations.","rect":[115.19999694824219,383.5013732910156,520.8044531345367,374.44775390625]},{"page":146,"text":" Fire support coordination measures confirmation.","rect":[115.19999694824219,397.04150390625,331.29444336891177,388.0077819824219]},{"page":146,"text":" Unit routes and positioning review.","rect":[115.19999694824219,410.5013732910156,274.5324194431305,401.44775390625]},{"page":146,"text":" Obstacles, lanes, bypasses, and marking locations, and descriptions.","rect":[115.19999694824219,424.0614013671875,404.85901856422427,415.0077819824219]},{"page":146,"text":" Passage points, routes, and recognition procedures. Verify these and review number of vehicles","rect":[115.19999694824219,437.5013732910156,522.0017593507766,428.44775390625]},{"page":146,"text":"by type expected at each passage point.","rect":[133.1999969482422,449.1446228027344,290.72828125953677,440.09100341796877]},{"page":146,"text":" Route management, contact points, and use of guide’s confirmation.","rect":[115.19999694824219,462.5813903808594,406.2931921482086,453.52777099609377]},{"page":146,"text":" Locations for and movement of sustainment units. Arrange for mutual support and any transfer of supplies.","rect":[115.19999694824219,476.0213928222656,522.0104467868805,466.9677734375]},{"page":146,"text":" Locations of aid stations, ambulance exchange points, and CASEVAC procedures.","rect":[115.19999694824219,489.5813903808594,464.25147461891177,480.52777099609377]},{"page":146,"text":"Responsibilities","rect":[72.0,514.1514892578125,145.4159894285202,504.31488037109377]},{"page":146,"text":"5-166. The stationary unit is responsible for providing the passing unit with as much assistance as possible.","rect":[90.0,531.701416015625,521.9880468845367,522.6477661132813]},{"page":146,"text":"Indirect and direct fire support from the stationary unit to the passing unit is pivotal to the success of the","rect":[90.0,543.2251586914063,522.0657947044373,534.1715087890625]},{"page":146,"text":"rearward passage of lines. Stationary unit support is especially important in covering the withdrawal of","rect":[89.99004364013672,554.7488403320313,522.0956717119217,545.6951904296875]},{"page":146,"text":"elements left in contact during a delay. The stationary unit's fire support assets answer calls for fire from the","rect":[89.99004364013672,566.2725830078125,522.0817859153748,557.2189331054688]},{"page":146,"text":"passing unit until battle handover occurs. The passing unit's fire support assets echelon rearward to provide","rect":[89.99004364013672,577.7963256835938,522.084044216156,568.74267578125]},{"page":146,"text":"continuous fire support for the passing unit until it successfully transitions. Once the passing unit hands over","rect":[89.99004364013672,589.3200073242188,522.0630789384842,580.266357421875]},{"page":146,"text":"control of the battle to the stationary unit, the stationary unit initiates and clears calls for all fires forward of","rect":[89.99004364013672,600.7241821289063,522.0649710283279,591.6705322265625]},{"page":146,"text":"its location. The same procedure applies to the dedicated air defense assets of the passing and stationary units.","rect":[89.98999786376953,612.2479248046875,521.964182138443,603.1942749023438]},{"page":146,"text":"5-167. The stationary unit’s engineer assets provide support to prepare the defense and execute the passage.","rect":[89.99004364013672,629.767578125,522.0859472751617,620.7139282226563]},{"page":146,"text":"Priority of effort initially ensures that the passing unit can move through passage lanes around the stationary","rect":[89.99004364013672,641.2913208007813,522.043842792511,632.2376708984375]},{"page":146,"text":"unit’s defensive positions. The passing unit shifts to close these passage lanes once the passing unit and any","rect":[89.98008728027344,652.8150024414063,522.0379223823547,643.7613525390625]},{"page":146,"text":"security elements disengage and withdraw through the security area and obstacles. The stationary unit","rect":[89.98008728027344,664.2191772460938,522.1308184871674,655.16552734375]},{"page":146,"text":"provides the passing unit with the previously coordinated combat service support as far forward as possible.","rect":[89.98008728027344,675.742919921875,521.9462378025055,666.6892700195313]},{"page":146,"text":"The stationary unit concentrates on providing the passing unit with emergency medical, recovery, and fuel","rect":[89.98005676269531,687.2666625976563,522.0779010066987,678.2130126953125]},{"page":146,"text":"supplies so the passing unit can move through the stationary unit’s positions rapidly.","rect":[89.98005676269531,698.7903442382813,428.11210083961489,689.7366943359375]},{"page":146,"text":"5-46","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":146,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":146,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":147,"text":"Security Operations","rect":[454.44000244140627,46.28102493286133,540.0840170898438,37.7490234375]},{"page":147,"text":"RELIEF IN PLACE","rect":[90.0,85.27651977539063,212.27717081928254,75.57487487792969]},{"page":147,"text":"5-168. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is","rect":[108.0,105.58140563964844,540.1057632570266,96.52776336669922]},{"page":147,"text":"replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and","rect":[107.99999237060547,117.10514831542969,540.0601391792297,108.05150604248047]},{"page":147,"text":"the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). Commanders conduct a relief ","rect":[107.99999237060547,128.6288299560547,542.5000097751617,119.57518768310547]},{"page":147,"text":"in place as part of a larger operation, primarily to maintain the combat effectiveness of committed units.","rect":[107.99004364013672,140.03306579589845,539.9454443454742,130.9794158935547]},{"page":147,"text":"Cavalry units conduct relief in place operations for the following reasons:","rect":[107.99004364013672,151.55674743652345,403.0720416316986,142.5030975341797]},{"page":147,"text":" Reconstitute a unit that has sustained heavy losses.","rect":[133.1999969482422,164.98143005371095,354.566232919693,155.9277801513672]},{"page":147,"text":" Decontaminate a committed unit.","rect":[133.1999969482422,176.52951049804688,284.48267579078677,169.48777770996095]},{"page":147,"text":" Rest a unit that has been in prolonged combat.","rect":[133.1999969482422,191.98143005371095,336.4450170993805,182.9277801513672]},{"page":147,"text":" Conform to a larger tactical plan.","rect":[133.1999969482422,205.5414276123047,284.0275366306305,196.48777770996095]},{"page":147,"text":" Resupply a defending Cavalry unit.","rect":[133.1999969482422,218.98143005371095,293.1259558200836,209.9277801513672]},{"page":147,"text":" Assign a new mission to the relieved unit.","rect":[133.1999969482422,232.5414276123047,319.0468237400055,223.48777770996095]},{"page":147,"text":" Introduce a new unit into combat.","rect":[133.1999969482422,243.96951293945313,286.17093873023989,236.9277801513672]},{"page":147,"text":" Set the stage for resuming the offense.","rect":[133.1999969482422,259.5414123535156,304.90567994117739,250.48777770996095]},{"page":147,"text":"5-169. Defensive relief is conducted to continue the defense. Cavalry units can relieve a larger force as an","rect":[108.00347137451172,277.0610656738281,539.995747089386,268.0074462890625]},{"page":147,"text":"economy of force defensive mission. Offensive relief may follow from a follow-and-assume mission","rect":[108.00347137451172,288.58477783203127,539.8092846870422,279.5311584472656]},{"page":147,"text":"requiring a forward passage of lines.","rect":[107.99354553222656,300.1084899902344,254.02007508277894,291.05487060546877]},{"page":147,"text":"RELIEF TECHNIQUES","rect":[90.0,324.98638916015627,194.62238121032716,315.33599853515627]},{"page":147,"text":"5-170. There are three techniques for conducting a relief: sequentially, simultaneously, or staggered. A","rect":[108.0,343.42138671875,540.1656683673858,334.3677673339844]},{"page":147,"text":"sequential relief is the most time-consuming relief technique but the most secure. Relief proceeds by troop","rect":[108.0,354.8255920410156,540.055805683136,345.77197265625]},{"page":147,"text":"or company team. Normally, units are relieved in place with the relieving unit assuming the relieved unit’s","rect":[108.0,366.34930419921877,540.1544693117141,357.2956848144531]},{"page":147,"text":"positions and missions. This technique is most common when units have similar organizations or when","rect":[108.0,377.8730163574219,540.093891620636,368.81939697265627]},{"page":147,"text":"occupied terrain must be retained.","rect":[108.0,389.3768615722656,243.8165533542633,380.3431396484375]},{"page":147,"text":"5-171. The simultaneous relief technique is faster but less secure because all units are moving at the same","rect":[108.0,406.9163818359375,540.1298205833435,397.8627624511719]},{"page":147,"text":"time. The decentralized nature of a simultaneous relief requires close coordination to prevent excessive","rect":[108.0,418.3006896972656,540.1965320091248,409.2669677734375]},{"page":147,"text":"battlefield clutter. Once command groups and combat trains are collocated, troops move forward at the same","rect":[108.0,429.84429931640627,540.133604763031,420.7906799316406]},{"page":147,"text":"time along designated routes. Relief occurs simultaneously at each location. Relieved units withdraw","rect":[108.0,441.3680114746094,540.1016424884796,432.31439208984377]},{"page":147,"text":"immediately upon relief.","rect":[108.0,452.8917541503906,206.72851014137269,443.838134765625]},{"page":147,"text":"5-172. A staggered relief occurs when a commander relieves each element in a sequence determined by the","rect":[108.0,470.411376953125,540.102598903656,461.3577575683594]},{"page":147,"text":"tactical situation, not its geographic orientation. A staggered relief occurs with relief elements occupying","rect":[108.00001525878906,481.9350891113281,539.9873852729797,472.8814697265625]},{"page":147,"text":"positions in-depth or adjacent to the relieved unit; this is considered an area relief. This technique is","rect":[108.00001525878906,493.33929443359377,540.1854141359329,484.27569580078127]},{"page":147,"text":"appropriate when units are dissimilar, when the relieving unit performs a different mission, or when improved","rect":[107.99004364013672,504.8630065917969,540.0859570503235,495.80938720703127]},{"page":147,"text":"defensive terrain is away from the line of contact. A staggered relief is also appropriate when the unit being","rect":[107.99004364013672,516.3867797851563,540.0739331245422,507.3331298828125]},{"page":147,"text":"relieved has been contaminated chemically or radiologically. The relieved unit withdraws one unit at a time","rect":[107.99004364013672,527.9104614257813,540.0788562278748,518.8568115234375]},{"page":147,"text":"or simultaneously and conducts a rearward passage of lines through the relieving unit, if appropriate.","rect":[108.0,539.4342041015625,511.40113282203677,530.3805541992188]},{"page":147,"text":"PLANNING CONSIDERATIONS","rect":[90.0,562.72802734375,232.88809776306153,554.4359741210938]},{"page":147,"text":"5-173. Fire support coordination and liaison are conducted between the units. If field artillery units are to","rect":[108.0,582.701416015625,539.9084668159485,573.6477661132813]},{"page":147,"text":"be relieved, they are the first to collocate and the last to leave. DA Form 5517 (Standard Range Card) target","rect":[108.0,594.1056518554688,540.1394854793549,585.052001953125]},{"page":147,"text":"lists, and overlays are given to the incoming unit to ensure the effective delivery of fire. If printed DA Form","rect":[108.00995635986328,605.6293334960938,540.0795074710846,596.57568359375]},{"page":147,"text":"5517s are not available, use what you have on hand. Fire support assets of the relieved unit remain in position","rect":[108.01000213623047,617.153076171875,540.081684589386,608.0994262695313]},{"page":147,"text":"throughout the relief of maneuver units and are prepared to support both units. Fire support assets of the","rect":[108.0199203491211,628.6768188476563,540.0531604270935,619.6231689453125]},{"page":147,"text":"relieving unit move into positions as quickly as possible so they can support both units during the relief.","rect":[108.0199203491211,640.2005004882813,539.9464209079742,631.1468505859375]},{"page":147,"text":"Combat trains are collocated to facilitate coordination and transfer of equipment, excess ammunition, fuel,","rect":[108.01992797851563,651.584716796875,540.0908300876617,642.551025390625]},{"page":147,"text":"water, and medical supplies.","rect":[108.01992797851563,663.1084594726563,221.64060425758363,654.0747680664063]},{"page":147,"text":"5-174. The relieving unit establishes continuous liaison with the relieved unit immediately upon receipt of","rect":[108.01992797851563,680.6480712890625,540.0807180986404,671.5944213867188]},{"page":147,"text":"the order. The squadron command group moves to the contact point of the relieving unit to coordinate the","rect":[108.01988983154297,692.1718139648438,540.226134059906,683.1181640625]},{"page":147,"text":"operation. The relieving unit enters and monitors the command net of the relieved unit. Troops and company","rect":[108.00995635986328,703.6954956054688,540.0727734565735,694.641845703125]},{"page":147,"text":"teams of both units remain on their internal and parent unit nets. The relieving unit maintains radio listening","rect":[108.00991821289063,715.21923828125,540.0432324409485,706.1655883789063]},{"page":147,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":147,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":147,"text":"5-47","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":148,"text":"Chapter 5","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":148,"text":"silence on all nets until the relief is complete. The sudden increase in radio traffic is a quick indictor to the","rect":[90.0,83.48152923583985,522.1688220481873,74.44780731201172]},{"page":148,"text":"threat that a relief is occurring. Upon passage of command, the relieving unit returns to its command net and","rect":[90.0,95.02519226074219,522.0580639839172,85.97154998779297]},{"page":148,"text":"lifts listening silence as necessary. The relieved unit should maintain radio listening silence during its withdrawal.","rect":[90.0,106.42936706542969,521.965158700943,97.37572479248047]},{"page":148,"text":"MOVEMENT CONTROL","rect":[72.0,129.76797485351563,184.52042531967164,121.4759750366211]},{"page":148,"text":"5-175. A priority of maintaining movement control is designating and ranking routes. The squadron","rect":[90.0,149.7413787841797,522.1843457221985,140.68772888183595]},{"page":148,"text":"executive officer supervises unit movement. Rally points for the relieved unit are used at company level to","rect":[90.00995635986328,161.26512145996095,522.0461621284485,152.2114715576172]},{"page":148,"text":"quickly organize the unit for withdrawal. Guides are positioned at critical points along the routes. AAs are","rect":[90.00995635986328,172.78880310058595,521.9810779075623,163.7351531982422]},{"page":148,"text":"designated and activities performed in these areas are specified. Separate AAs are designated for the incoming","rect":[90.00995635986328,184.3125457763672,522.2812085151672,175.25889587402345]},{"page":148,"text":"and outgoing units to minimize confusion. Time spent within AAs is minimized to avoid possible compromise.","rect":[90.00995635986328,195.8362274169922,521.9752295017242,186.78257751464845]},{"page":148,"text":"PASSAGE OF COMMAND","rect":[72.0,219.16799926757813,189.72053623199464,210.87600708007813]},{"page":148,"text":"5-176. The division or corps order may specify the passage of command as a time when relief is to be","rect":[90.0,239.0214080810547,522.046934841156,229.96775817871095]},{"page":148,"text":"completed. At unit level, the commanders mutually agree to the sequence for the passage of command. This","rect":[90.0,250.54515075683595,522.1488540773391,241.4915008544922]},{"page":148,"text":"is physically accomplished when a specified percentage, normally greater than one-half of the relieving units","rect":[90.0,262.0688171386719,522.1464126710891,253.0151824951172]},{"page":148,"text":"are in position and report relief. Passage of command at the squadron and TF level is acknowledged","rect":[90.0,273.5925598144531,522.2032055854797,264.5389404296875]},{"page":148,"text":"face-to-face by both commanders and passed to subordinates.","rect":[90.00995635986328,285.11627197265627,335.9711401462555,276.0626525878906]},{"page":148,"text":"CHANGE OF MISSION","rect":[72.0,310.4106140136719,220.612008146286,300.6808776855469]},{"page":148,"text":"5-177. A change of mission is another type of transition Cavalry units can expect during reconnaissance","rect":[90.0,330.7013854980469,521.9948108177185,321.64776611328127]},{"page":148,"text":"and security operations. Change of mission is established in the commander’s guidance and planned using","rect":[90.0,342.22509765625,522.047993183136,333.1714782714844]},{"page":148,"text":"branches and sequels. Change of mission is the term used when units transition from defensive to offensive","rect":[90.0,353.6293029785156,521.9654529075623,344.57568359375]},{"page":148,"text":"operations or when the unit changes to a different type of security operation.","rect":[90.0,365.15301513671877,395.84379029273989,356.0993957519531]},{"page":148,"text":"5-48","rect":[72.0,754.18798828125,90.08100347900391,747.6090087890625]},{"page":148,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":148,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":149,"text":"Chapter 6","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":149,"text":"Stability","rect":[283.79998779296877,154.17567443847657,345.95939234542848,139.2211456298828]},{"page":149,"text":"Ultimately, stability is the set of conditions in which a local population regards its","rect":[126.0,188.85357666015626,504.0868878660202,178.81822204589845]},{"page":149,"text":"governance institutions as legitimate and its living situation as acceptable and","rect":[126.0,201.4501953125,504.154399394989,191.4148406982422]},{"page":149,"text":"predictable (see ADP 3-07). To achieve stability within all operational frameworks,","rect":[126.0,214.046875,504.11226439476016,204.0115203857422]},{"page":149,"text":"BCTs must understand the operational environment, shape the operational environment","rect":[125.98896789550781,226.7428741455078,504.0758338565826,216.72959899902345]},{"page":149,"text":"through action, and engage local leaders to influence the population. During stability","rect":[125.98896789550781,239.361572265625,504.1188769340515,229.3262176513672]},{"page":149,"text":"operations, commanders conduct multiple missions and efforts to seek a common goal","rect":[125.98896789550781,251.95819091796876,504.0493445987701,241.92283630371095]},{"page":149,"text":"and end state that nests with the higher command’s objectives.","rect":[125.97793579101563,264.67626953125,400.30647826194766,254.62986755371095]},{"page":149,"text":"SECTION I – PRINCIPLES AND FRAMEWORK","rect":[99.36000061035156,288.6240234375,357.98400732421876,279.7440185546875]},{"page":149,"text":"6-1. BCTs conduct reconnaissance and security operations during stability tasks to increase the commander","rect":[108.0,311.98138427734377,540.0869436845779,302.9277648925781]},{"page":149,"text":"and staff’s ability to understand the area of operations. Information collection confirms or denies assumptions","rect":[108.0,323.5050964355469,540.0418594484329,314.45147705078127]},{"page":149,"text":"made during planning and identifies sources of stability and instability. Reconnaissance and security","rect":[108.0,335.0288391113281,539.928120136261,325.9752197265625]},{"page":149,"text":"operations contribute to mission command by answering information requirements, which enhances","rect":[108.0,346.55255126953127,540.1624038820266,337.4989318847656]},{"page":149,"text":"situational awareness and assists the BCT in applying the stability principles in an acceptable and predictable","rect":[108.0,358.0762634277344,540.1525866966248,349.02264404296877]},{"page":149,"text":"method. Ultimately, reconnaissance and security operations are vital to assisting the BCT in understanding","rect":[108.010009765625,369.48046875,540.050190448761,360.4268493652344]},{"page":149,"text":"their operational environment through the context of the stability principles. The four principles of stability","rect":[108.010009765625,381.0041809082031,540.034077167511,371.9505615234375]},{"page":149,"text":"tasks are—","rect":[108.010009765625,390.5159912109375,152.65360355377198,383.4742736816406]},{"page":149,"text":" Conflict transformation.","rect":[133.1999969482422,403.9394226074219,247.891672372818,396.88775634765627]},{"page":149,"text":" Unity of effort.","rect":[133.1999969482422,419.5013732910156,212.1352789402008,410.44775390625]},{"page":149,"text":" Legitimacy and host-nation ownership.","rect":[133.1999969482422,432.9413757324219,307.875803232193,423.88775634765627]},{"page":149,"text":" Building partner capacity.","rect":[133.1999969482422,446.5013732910156,255.4632818698883,437.44775390625]},{"page":149,"text":"CONFLICT TRANSFORMATION","rect":[90.0,471.81060791015627,303.67197518730168,462.0949401855469]},{"page":149,"text":"6-2. Conflict transformation is the process forreducing themeans and motivations for violent conflict while","rect":[108.0,492.10137939453127,540.1115100364685,483.0477600097656]},{"page":149,"text":"developing more viable, peaceful alternatives for the competitive pursuit of political and socio-economic","rect":[107.99998474121094,503.6250915527344,540.1066882591248,494.57147216796877]},{"page":149,"text":"aspirations (see ADP 3-07). Transformation aims to set the host nation on a sustainable, positive trajectory","rect":[108.0,515.1488647460938,539.9064526557922,506.0852355957031]},{"page":149,"text":"in which transformational processes directly address the dynamics causing instability. BCTs contribute to","rect":[107.98999786376953,526.6725463867188,540.1277050971985,517.618896484375]},{"page":149,"text":"conflict transformation only if they achieve understanding of the causes and influences of conflict and","rect":[107.99004364013672,538.0767822265625,540.1096386909485,529.0231323242188]},{"page":149,"text":"instability within their area of operations.","rect":[107.99004364013672,549.6005249023438,273.56507325172427,540.546875]},{"page":149,"text":"6-3. Reconnaissance and security operations assist in identifying the drivers of violent conflict and","rect":[108.0,567.1201171875,540.055805683136,558.0664672851563]},{"page":149,"text":"instability. Collected information impacts planning for future operations to help commanders and staffs","rect":[108.0,578.6438598632813,540.1763198976516,569.5902099609375]},{"page":149,"text":"identify opportunities linking tactical gains to sustainable strategic objectives. Transformation can occur only","rect":[108.0,590.1675415039063,540.200581073761,581.1039428710938]},{"page":149,"text":"if the BCT understands the dynamics of conflict within their area of operations from an objective viewpoint","rect":[108.0,601.57177734375,540.1255084285737,592.5081787109375]},{"page":149,"text":"and from the perspective of the local population.","rect":[108.0,613.0755615234375,302.48893189430239,604.0418701171875]},{"page":149,"text":"UNITY OF EFFORT","rect":[90.0,638.37060546875,218.40282694721223,628.6549682617188]},{"page":149,"text":"6-4. Unity of effort is the coordination and cooperation toward common objectives, even if the participants","rect":[108.0,658.6614379882813,540.0359390382766,649.5978393554688]},{"page":149,"text":"are not necessarily part of the same command or organization, which is the product of successful unified","rect":[108.0,670.1851196289063,540.0498852729797,661.1314697265625]},{"page":149,"text":"action (JP 1, Volume 2). Reconnaissance and security operations require unity of effort and purpose to","rect":[108.0,681.7088623046875,540.0948071479797,672.6552124023438]},{"page":149,"text":"achieve situational awareness at echelon to enable successful operations throughout the BCT’s area of","rect":[108.0,693.2326049804688,540.1634817705154,684.178955078125]},{"page":149,"text":"operations.","rect":[108.0,704.736328125,152.25228333473206,695.70263671875]},{"page":149,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":149,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":149,"text":"6-1","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":150,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":150,"text":"6-5. Reconnaissance and security operations assist the commander and staff in developing shared","rect":[90.0,83.50144958496094,522.0617871284485,74.44780731201172]},{"page":150,"text":"understanding between partners allowing BCTs to foster cooperative environments that focus efforts towards","rect":[90.0,95.02519226074219,522.0471695070266,85.97154998779297]},{"page":150,"text":"a common goal to achieve stable and sustainable security environments.","rect":[90.0,106.42936706542969,378.207590341568,97.37572479248047]},{"page":150,"text":"LEGITIMACY AND HOST-NATION OWNERSHIP","rect":[72.0,131.73056030273438,392.8926489610672,122.00083923339844]},{"page":150,"text":"6-6. Legitimacy is a condition based upon the perception by specific audiences of the legality, morality, or","rect":[90.0,152.0214080810547,522.0700369462967,142.96775817871095]},{"page":150,"text":"rightness of a set of actions, and of the propriety of the authority of the individuals or organizations in taking","rect":[90.0,163.54515075683595,522.062153339386,154.4915008544922]},{"page":150,"text":"them (see ADP 3-07 for more information). Host-nation ownership is the will or ability of the ruling entity","rect":[90.0,175.06883239746095,522.0309643745422,166.0151824951172]},{"page":150,"text":"to resolve its own problems and assume responsibility for solutions that it supports and can implement. BCTs","rect":[90.0,186.5925750732422,522.0459488039016,177.53892517089845]},{"page":150,"text":"conduct reconnaissance operations focused on determining the extent of legitimacy as perceived by the local","rect":[90.0,198.1162567138672,522.1355181941987,189.06260681152345]},{"page":150,"text":"population and develop an understanding of areas of conflict that degrade, discredit, or erode perceptions","rect":[90.00995635986328,209.63999938964845,522.0229995851516,200.5863494873047]},{"page":150,"text":"of legitimacy.","rect":[90.00995635986328,221.0442352294922,145.8905279636383,211.99058532714845]},{"page":150,"text":"6-7. Commanders direct reconnaissance operations and engagement activities to understand the mandate,","rect":[90.00995635986328,238.56382751464845,522.1317236423492,229.5101776123047]},{"page":150,"text":"manner, consent, and expectations of legitimate host-nation ownership and perceived legitimacy. (Refer to","rect":[90.00995635986328,250.0875701904297,522.0618481636047,241.03392028808595]},{"page":150,"text":"ADP 3-07 for more information on the four factors of legitimacy.)","rect":[90.0,261.6112365722656,355.2746267900467,252.55760192871095]},{"page":150,"text":"6-8. BCTs conduct reconnaissance and engagement in close contact with the civilian population to collect","rect":[89.99002838134766,279.1308898925781,522.1086016902924,270.0772705078125]},{"page":150,"text":"information, reinforce the capabilities of host-nation security and governance partners, and understand the","rect":[89.98008728027344,290.6546325683594,522.1783435325623,281.60101318359377]},{"page":150,"text":"extent of support and acceptance of host-nation partners with the local population. BCTs actively seek","rect":[89.98008728027344,302.0588073730469,521.9492383003235,293.00518798828127]},{"page":150,"text":"sources of conflict and connectivity between the host nation and local population to assist partners in bridging","rect":[89.99004364013672,313.5825500488281,521.9342846870422,304.5289306640625]},{"page":150,"text":"gaps in perception and strengthening relationships.","rect":[89.99000549316406,325.10626220703127,293.35328125953677,316.0526428222656]},{"page":150,"text":"BUILDING PARTNER CAPACITY","rect":[72.0,350.37060546875,291.42698007011418,340.640869140625]},{"page":150,"text":"6-9. Building partner capacity is the outcome of comprehensive inter-organizational activities, programs,","rect":[90.0,370.6614074707031,521.9542334079742,361.6077880859375]},{"page":150,"text":"and military-to-military engagements that enhance the ability of partners to establish security, governance,","rect":[90.00001525878906,382.18511962890627,521.9375097751617,373.1315002441406]},{"page":150,"text":"economic development, essential services, rule of law, and other critical government functions (see","rect":[89.99005126953125,393.7088317871094,522.097716091156,384.65521240234377]},{"page":150,"text":"ADP 3-07). Reconnaissance and security TF collect information to ensure activities are consistent with","rect":[90.0,405.113037109375,521.9353833198547,396.05938720703127]},{"page":150,"text":"tactical, operational, and strategic goals, protect key activities, and enable key capabilities to allow","rect":[89.99004364013672,416.63677978515627,521.9473456134796,407.5831604003906]},{"page":150,"text":"host-nation partners to develop and learn. BCTs conduct operations that enable host-nation partners to thrive","rect":[89.98008728027344,428.1405944824219,521.960264919281,419.10687255859377]},{"page":150,"text":"and eventually develop sustainable capabilities independent of BCT interference or influence.","rect":[89.9801254272461,439.6842041015625,465.1854040622711,430.6305847167969]},{"page":150,"text":"STABILITY FRAMEWORK","rect":[72.0,464.9705810546875,249.14127487754824,455.2549133300781]},{"page":150,"text":"6-10. BCTs conduct stability tasks and operations based upon conditions identified through collection.","rect":[90.0,485.26141357421877,522.1128027439117,476.2077941894531]},{"page":150,"text":"Reconnaissance operations confirm or deny the conditions and state of stability within the BCT’s area of","rect":[90.0,496.7851257324219,521.9026785478592,487.73150634765627]},{"page":150,"text":"operations. BCTs identify missions, tasks, and activities about the framework phases using continuous","rect":[90.0,508.3088684082031,522.1703994874954,499.2552490234375]},{"page":150,"text":"reconnaissance and security operations. (Refer to ATP 3-07.5 for more information.) The three phases of the","rect":[90.00997161865235,519.7130737304688,522.2282092552185,510.659423828125]},{"page":150,"text":"stability framework are—","rect":[90.00007629394531,531.23681640625,193.44764041900636,522.1831665039063]},{"page":150,"text":" Initial response.","rect":[115.19999694824219,544.6414794921875,197.12626099586488,535.6077880859375]},{"page":150,"text":" Transformation.","rect":[115.19999694824219,556.20947265625,197.9718725681305,549.1677856445313]},{"page":150,"text":" Fostering sustainability.","rect":[115.19999694824219,571.6614379882813,229.28309082984925,562.6077880859375]},{"page":150,"text":"INITIAL RESPONSE","rect":[72.0,595.1022338867188,164.72432851791383,587.0159912109375]},{"page":150,"text":"6-11. Usually, activities to stabilize an area of operations are initial response actions. Typically, units","rect":[90.0,615.1014404296875,522.1544082765579,606.0477905273438]},{"page":150,"text":"perform initial response actions during or directly after a conflict or disaster in which the security situation","rect":[89.99996185302735,626.505615234375,521.9427075386047,617.4519653320313]},{"page":150,"text":"prohibits the introduction of civilian personnel. Initial response actions aim to provide a secure environment","rect":[89.99996185302735,638.0093994140625,522.1237994441987,628.9757080078125]},{"page":150,"text":"that allows relief forces to attend to the immediate humanitarian needs of the local population.","rect":[89.99996185302735,649.5330810546875,466.86759400367739,640.4993896484375]},{"page":150,"text":"TRANSFORMATION","rect":[72.0,672.8621826171875,165.94587802886964,664.7759399414063]},{"page":150,"text":"6-12. Stabilization, reconstruction, and capacitybuilding are transformation actions performed in a relatively","rect":[90.0,692.8613891601563,522.0698437690735,683.8077392578125]},{"page":150,"text":"secure environment. Transformation actions may occur in crisis or vulnerable states and aim to build","rect":[90.00003814697266,704.3851318359375,522.0717968940735,695.3314819335938]},{"page":150,"text":"host-nation capacity across multiple sectors.","rect":[90.010009765625,715.7893676757813,266.85071778297427,706.7357177734375]},{"page":150,"text":"6-2","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":150,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":150,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":151,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0807211914063,37.8480224609375]},{"page":151,"text":"FOSTERING SUSTAINABILITY","rect":[90.0,83.34003448486328,232.56457614898683,75.0360336303711]},{"page":151,"text":"6-13. BCTs foster sustainability when the security environment is stable enough to support efforts to","rect":[108.0,103.30143737792969,540.191547870636,94.24779510498047]},{"page":151,"text":"implement long-term programs that commit to the viability of the institutions and economy of the host nation.","rect":[108.0,114.82518005371094,540.1048681735992,105.77153778076172]},{"page":151,"text":"The BCT consolidates gains to encourage capacity-building reconstruction activities to enable sustainable","rect":[107.99003601074219,126.22935485839844,540.0657947044373,117.17571258544922]},{"page":151,"text":"development. Often military forces conduct these long-term efforts in support of broader, civilian-led efforts.","rect":[107.99000549316406,137.7530975341797,539.9492285251617,128.69944763183595]},{"page":151,"text":"SECTION II – OPERATIONS DURING STABILITY TASKS","rect":[99.36000061035156,158.66395568847657,415.52395849609379,149.78396606445313]},{"page":151,"text":"6-14. Reconnaissance and security operations are imperative to successful stability tasks. Reconnaissance","rect":[108.0,182.0214080810547,539.983946559906,172.96775817871095]},{"page":151,"text":"focuses on identifying enemy forces, human interaction and engagement, and vital infrastructure to collect","rect":[108.0,193.54515075683595,540.0959063777924,184.4915008544922]},{"page":151,"text":"information necessary to understand sources of stability and instability within the BCT’s area of operations.","rect":[108.0,205.06883239746095,540.0946753025055,196.0151824951172]},{"page":151,"text":"As the environment changes, so do the sentiments of the population and its key actors. Staffs continuously","rect":[108.0,216.5925750732422,540.0312695503235,207.53892517089845]},{"page":151,"text":"assess their area of operations based on information collected to provide context to understanding the human","rect":[108.0,228.1162567138672,540.0591015815735,219.06260681152345]},{"page":151,"text":"dimension of their area of operations. BCTs conduct security operations to establish safe and secure","rect":[108.0,239.63999938964845,540.1029651145935,230.5863494873047]},{"page":151,"text":"environments that enable positive gains and sustainable stability. Since the complexity of the human context","rect":[108.0,251.0442352294922,540.2482501277924,241.99058532714845]},{"page":151,"text":"is ever changing and evolving in any environment, reconnaissance and security operations are continuous.","rect":[108.0,262.5679016113281,540.0946142673492,253.51426696777345]},{"page":151,"text":"Commanders constantly reassess and refine intelligence estimates to determine if they are collecting the right","rect":[108.0,274.0916442871094,540.0055133113862,265.03802490234377]},{"page":151,"text":"information and developing intelligence to understand the operational environment.","rect":[108.0,285.6153564453125,442.6471655368805,276.5617370605469]},{"page":151,"text":"6-15. BCTs conduct reconnaissance and security operations to gain an understanding of sources of stability","rect":[108.0,303.1349792480469,540.0597729682922,294.08135986328127]},{"page":151,"text":"and instability, and the intentions and capabilities of key actors to shape the BCT’s and unified action","rect":[107.99998474121094,314.6587219238281,540.091694355011,305.6051025390625]},{"page":151,"text":"partners’ area of operations during stability tasks. Sources of instability are actors, actions, or conditions that","rect":[107.99998474121094,326.0628967285156,540.1324664363862,317.00927734375]},{"page":151,"text":"exceed the legitimate authority’s capacity to exercise effective governance, maintain civil control, and ensure","rect":[107.99998474121094,337.5866394042969,540.222471950531,328.53302001953127]},{"page":151,"text":"economic development.","rect":[107.99998474121094,349.0904541015625,203.61300110816956,340.0567321777344]},{"page":151,"text":"6-16. Enemy forces influence instabilitysourcesto create conflict, exacerbate existing conditions, or threaten","rect":[108.00994110107422,366.6299743652344,540.1147046089172,357.57635498046877]},{"page":151,"text":"to collapse failing or recovering states. Sources of instability include catastrophic events, humanitarian crises,","rect":[108.00995635986328,378.1537170410156,540.1095678806305,369.10009765625]},{"page":151,"text":"foreign power-instigated violence, domestic rebellion, and civil war.","rect":[108.01990509033203,389.5578918457031,381.81632447242739,380.5042724609375]},{"page":151,"text":"6-17. The following vignette describes utilizing Cavalry squadrons in the execution of reconnaissance and","rect":[108.0199203491211,407.0775451660156,540.081684589386,398.02392578125]},{"page":151,"text":"security missions that enabled the BCT’s success during stability operations.","rect":[108.02986145019531,418.6012878417969,414.7182104587555,409.54766845703127]},{"page":151,"text":"Third Armored Cavalry Regiment in Tall Afar","rect":[207.36000061035157,444.7799987792969,436.06793286132815,434.0760192871094]},{"page":151,"text":"The city of Tall Afar is located in Northwestern Iraq and is a compact city with a mixed","rect":[140.39999389648438,462.3414001464844,503.0447278022766,453.28778076171877]},{"page":151,"text":"ethnic population of over 250,000 people. In late 2004, the Iraqi Security Forces (known","rect":[140.39999389648438,473.86138916015627,503.1941418647766,464.8077697753906]},{"page":151,"text":"as ISF) in Tall Afar collapsed, allowing enemy threat to impose a grip of terror on the city.","rect":[140.39999389648438,485.3813781738281,503.25965332984927,476.3277587890625]},{"page":151,"text":"Through violence and intimidation, the enemy took control of every aspect of the city and","rect":[140.39999389648438,496.9013671875,503.2347912788391,487.8477478027344]},{"page":151,"text":"crippled the local government. The city divided, as the population was forced into sectarian","rect":[140.39999389648438,508.3013916015625,503.108540058136,499.2477722167969]},{"page":151,"text":"boundaries, which helped to fuel sectarian and tribal violence across the city. The enemy’s","rect":[140.39999389648438,519.8214721679688,503.2001236085892,510.767822265625]},{"page":151,"text":"firm grip on the city, coupled with the city’s geographically central location lying between","rect":[140.39999389648438,531.3414306640625,503.09651613235476,522.2877807617188]},{"page":151,"text":"the city of Mosul and the Syrian border, enabled the enemy threat to utilize Tall Afar and","rect":[140.39999389648438,542.8613891601563,503.19994020462038,533.8077392578125]},{"page":151,"text":"the surrounding region as a training ground and staging base for operations. Foreign","rect":[140.39999389648438,554.3814086914063,503.13130617141726,545.3277587890625]},{"page":151,"text":"fighters flooded in from Syria, finding sanctuary in Tall Afar and the surrounding cities and","rect":[140.39999389648438,565.9014282226563,503.10948610305788,556.8477783203125]},{"page":151,"text":"towns and increasing the enemy threat capacity to conduct operations in Mosul and across","rect":[140.39999389648438,577.3014526367188,503.06944733905797,568.247802734375]},{"page":151,"text":"Northern Iraq.","rect":[140.39999389648438,588.8014526367188,199.2875006198883,579.7677612304688]},{"page":151,"text":"In April 2005, 3rd Armored Cavalry Regiment (known as ACR) deployed to the Southern","rect":[140.39999389648438,606.3414306640625,503.0676465034485,597.2877807617188]},{"page":151,"text":"Baghdad area of operations to conduct reconnaissance and offensive operations. For two","rect":[140.39999389648438,617.8613891601563,503.0796399116516,608.8077392578125]},{"page":151,"text":"months, 3rd ACR, partnering with the ISF, successfully conducted counterreconnaissance","rect":[140.39999389648438,629.3814086914063,503.14617800521855,620.3277587890625]},{"page":151,"text":"operations to deny enemy threat the ability to influence political and economic development","rect":[140.39999389648438,640.7814331054688,503.29756653404237,631.727783203125]},{"page":151,"text":"within the capital city of Baghdad. During this time, 3rd ACR received orders to move their","rect":[140.39999389648438,652.3014526367188,503.0874832277298,643.247802734375]},{"page":151,"text":"area of operations to the western region of the Ninewa Province. The regiment","rect":[140.39999389648438,663.8214111328125,503.18355286216737,654.7677612304688]},{"page":151,"text":"task-organized itself to conduct multiple operations across separate areas of operations.","rect":[140.39999389648438,675.3414306640625,503.09449219703677,666.2877807617188]},{"page":151,"text":"Ahead of the rest of the regiment, 2-3 ACR (Sabre Squadron) deployed to the Ninewa","rect":[140.39999389648438,686.8613891601563,503.11827516555788,677.8077392578125]},{"page":151,"text":"Province to conduct initial reconnaissance operations of the area of operations, including","rect":[140.39999389648438,698.3814086914063,503.09956789016726,689.3277587890625]},{"page":151,"text":"the city of Tall Afar. The regiment detached 3-3 ACR (Thunder Squadron), an engineer","rect":[140.39999389648438,709.7814331054688,503.05470734882359,700.727783203125]},{"page":151,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":151,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":151,"text":"6-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":152,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":152,"text":"6-4","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":152,"text":"platoon, an attack aviation troop from 4-3 ACR (Longknife Squadron), a tank platoon from","rect":[122.4000015258789,83.98143005371094,485.1530340900421,74.92778778076172]},{"page":152,"text":"1-3 ACR (Tiger Squadron), and Iraqi Army advisors from Tiger Squadron to remain in","rect":[122.4000015258789,95.50144958496094,485.1859631538391,86.44780731201172]},{"page":152,"text":"Southern Baghdad in order to support the 3rd Infantry Division. The remainder of the","rect":[122.4000015258789,107.02140808105469,485.1861560325623,97.96776580810547]},{"page":152,"text":"regiment moved to the Western Ninewa Province to begin operations against the highly","rect":[122.4000015258789,118.42137145996094,485.0875537376404,109.36772918701172]},{"page":152,"text":"organized enemy network that controlled the area.","rect":[122.4000015258789,129.94139099121095,324.9296362400055,120.88774871826172]},{"page":152,"text":"From May to July 2005, Sabre Squadron developed an accurate intelligence picture of the","rect":[122.4000015258789,147.46141052246095,485.13241457748418,138.4077606201172]},{"page":152,"text":"situation inside the city of Tall Afar through effective reconnaissance operations that, on","rect":[122.4000015258789,158.98143005371095,485.064594745636,149.9277801513672]},{"page":152,"text":"many occasions, required them to fight for information. The squadron, reinforced by a tank","rect":[122.4000015258789,170.50144958496095,485.14718508529668,161.4477996826172]},{"page":152,"text":"company from Tiger Squadron, took the fight to the enemies, resulting in some of the","rect":[122.4000015258789,182.0214080810547,485.1561267356873,172.96775817871095]},{"page":152,"text":"toughest urban combat seen by American troops up to that point. In the month of June","rect":[122.4000015258789,193.42137145996095,485.1383349876404,184.3677215576172]},{"page":152,"text":"alone, over 210 unconventional enemy attacks occurred within the city, which accounted","rect":[122.4000015258789,204.94139099121095,485.09141969680788,195.8877410888672]},{"page":152,"text":"for over ten percent of all attacks in the Iraqi theater of operations at the time. These attacks","rect":[122.4000015258789,216.46141052246095,485.2179763917923,207.4077606201172]},{"page":152,"text":"targeted the civilian population, with the intents to increase the sectarian divide and create","rect":[122.4000015258789,227.98143005371095,485.15023684310918,218.9277801513672]},{"page":152,"text":"a chaotic situation. Sabre Squadron refused to back down and began building positive","rect":[122.4000015258789,239.50144958496095,485.1752002220154,230.4477996826172]},{"page":152,"text":"relationships with the locals. This initiative led to the collection of accurate intelligence","rect":[122.4000015258789,251.0214080810547,485.07269167709355,241.96775817871095]},{"page":152,"text":"that, in turn, enabled 3rd ACR to understand the composition and disposition of the enemy","rect":[122.4000015258789,262.4213562011719,485.25884890365605,253.3677215576172]},{"page":152,"text":"occupying the city. Ahead of 3rd ACR’s arrival to the Ninewa Province, Sabre Squadron","rect":[122.4000015258789,273.9413757324219,485.0745129585266,264.88775634765627]},{"page":152,"text":"had already begun reestablishing the local government and reconstituting local police to","rect":[122.4000015258789,285.4613952636719,485.0735058784485,276.40777587890627]},{"page":152,"text":"set conditions for the large-scale, combined offensive with the ISF that 3rd ACR leadership","rect":[122.4000015258789,296.98138427734377,485.09737062454226,287.9277648925781]},{"page":152,"text":"understood as necessary to eliminate the enemy threat within Tall Afar.","rect":[122.4000015258789,308.5013732910156,408.80079102516177,299.44775390625]},{"page":152,"text":"As Sabre Squadron began to set conditions within Tall Afar, 3rd ACR leadership","rect":[122.4000015258789,325.9013671875,485.0566906929016,316.8477478027344]},{"page":152,"text":"understood the need to set conditions across the surrounding region by establishing security","rect":[122.4000015258789,337.42138671875,485.16033816146855,328.3677673339844]},{"page":152,"text":"outside the city. Tiger Squadron established itself in the area west of Tall Afar, where they","rect":[122.4000015258789,348.9413757324219,485.0168445091248,339.88775634765627]},{"page":152,"text":"liberated smaller cities and towns, effectively denying the use of these areas to the enemy","rect":[122.4000015258789,360.4613952636719,484.98409914779668,351.40777587890627]},{"page":152,"text":"threat and securing critical supply routes from the Syrian border to Tall Afar. Moving from","rect":[122.4000015258789,371.98138427734377,485.2837103595734,362.9277648925781]},{"page":152,"text":"location to location, Tiger Squadron reestablished security along the border, within the","rect":[122.4000015258789,383.5013732910156,485.0854785423279,374.44775390625]},{"page":152,"text":"urban centers, and reconstituted ISF in those areas. Meanwhile, Longknife Squadron, the","rect":[122.4000015258789,394.9013671875,485.12151980209355,385.8477478027344]},{"page":152,"text":"aviation squadron, conducted continuous reconnaissance and security operations across","rect":[122.4000015258789,406.42138671875,485.0408218507767,397.3677673339844]},{"page":152,"text":"the surrounding desert region. With security in the surrounding region established, 3rd","rect":[122.4000015258789,417.9413757324219,485.1025586128235,408.88775634765627]},{"page":152,"text":"ACR had engineers construct an eight-foot-high berm around the city of Tall Afar, with the","rect":[122.4000015258789,429.4613952636719,485.2517077903748,420.40777587890627]},{"page":152,"text":"intents of isolating the enemy threat within the city and of funneling traffic through","rect":[122.4000015258789,440.98138427734377,485.2038769721985,431.9277648925781]},{"page":152,"text":"established security checkpoints. Conditions were set for 3rd ACR to execute Operation","rect":[122.4000015258789,452.5013732910156,485.0566906929016,443.44775390625]},{"page":152,"text":"Restoring Rights. ","rect":[122.4000015258789,463.9013671875,194.37096619606019,454.8477478027344]},{"page":152,"text":"Operation Restoring Rights was the combined offensive between 3rd ACR and the ISF to","rect":[122.4000015258789,481.42138671875,485.06367921829226,472.3677673339844]},{"page":152,"text":"take back Tall Afar. Third ACR integrated over 5,500 Iraqi soldiers and police officers into","rect":[122.4000015258789,492.9413757324219,484.986958026886,483.88775634765627]},{"page":152,"text":"this operation with the augmentation of 1 battalion from the 2nd Iraqi Army Division,","rect":[122.4000015258789,504.4613952636719,485.05863404273989,495.40777587890627]},{"page":152,"text":"5 battalions from the 3rd Iraqi Army Division, an Iraqi Special Forces battalion, a","rect":[122.4000015258789,515.9813842773438,485.20836305618288,506.927734375]},{"page":152,"text":"commando brigade, and the Mosul Emergency Police Battalion. Tiger Squadron conducted","rect":[122.4000015258789,527.5014038085938,485.108540058136,518.44775390625]},{"page":152,"text":"reconnaissance from the western portion of the area of operations into Tall Afar, where","rect":[122.4000015258789,538.9014282226563,484.97601198959355,529.8477783203125]},{"page":152,"text":"they conducted a relief in place with Sabre Squadron. Tiger Squadron assumed","rect":[122.4000015258789,550.4214477539063,485.2539258003235,541.3677978515625]},{"page":152,"text":"responsibility of operations on the western side of Tall Afar, while Sabre Squadron","rect":[122.4000015258789,561.94140625,485.0940136909485,552.8877563476563]},{"page":152,"text":"conducted operations on the eastern side of the city. Augmented by the 2-325 Infantry","rect":[122.4000015258789,573.46142578125,485.14230227279668,564.4077758789063]},{"page":152,"text":"Battalion from the 82nd Airborne Division, 3rd ACR’s ground forces began clearing out","rect":[122.4000015258789,584.9813842773438,485.26195252037049,575.927734375]},{"page":152,"text":"enemy threat. They actioned on areas and targets throughout the city, using intelligence","rect":[122.4000015258789,596.3814086914063,485.0982654075623,587.3277587890625]},{"page":152,"text":"gathered from the local population and detainees. Precision artillery and close air support","rect":[122.4000015258789,607.9014282226563,485.1643267879486,598.8477783203125]},{"page":152,"text":"enabled ground forces to clear out areas in which they encountered heavy resistance,","rect":[122.4000015258789,619.4214477539063,485.1543982028961,610.3677978515625]},{"page":152,"text":"allowing them to continue to conduct house-to-house searches for enemy threat. From","rect":[122.4000015258789,630.94140625,485.1441839923859,621.8877563476563]},{"page":152,"text":"24 August to 23 September 2005, 3rd ACR and their ISF partners killed over 150 enemy","rect":[122.4000015258789,642.46142578125,485.09857058334355,633.4077758789063]},{"page":152,"text":"fighters and captured another 800, while the enemy was attempting to flee the city.","rect":[122.4000015258789,653.9813842773438,453.9236853122711,644.927734375]},{"page":152,"text":"The success achieved by the cooperation between 3rd ACR and the ISF emboldened","rect":[122.4000015258789,671.3814086914063,485.2537121772766,662.3277587890625]},{"page":152,"text":"Tall Afar’s population to retake control of the city, thereby denying the enemy the ability to","rect":[122.4000015258789,682.9014282226563,485.0894055366516,673.8477783203125]},{"page":152,"text":"establish another base from which to operate. Following the defeat of the enemy threat,","rect":[122.4000015258789,694.4214477539063,485.13321900367739,685.3677978515625]},{"page":152,"text":"Sabre Squadron and the 2-325 Infantry Battalion maintained security in Tall Afar and","rect":[122.4000015258789,705.94140625,485.22386598587038,696.8877563476563]},{"page":152,"text":"simultaneously recruited and trained a legitimate Iraqi police force. Tiger Squadron","rect":[122.4000015258789,717.46142578125,485.219135761261,708.4077758789063]},{"page":152,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":152,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":153,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0807211914063,37.8480224609375]},{"page":153,"text":"maintained a guard along the Syrian border to deny foreign fighters the ability to influence","rect":[140.39999389648438,83.98143005371094,503.02572512435918,74.92778778076172]},{"page":153,"text":"Tall Afar, and they began rebuilding the Iraqi Border Police Brigade. With security","rect":[140.39999389648438,95.50144958496094,503.1483447532654,86.44780731201172]},{"page":153,"text":"reestablished, 3rd ACR then worked to reestablish essential services, and they reconstituted","rect":[140.39999389648438,107.02140808105469,503.238911151886,97.96776580810547]},{"page":153,"text":"a legitimate, Iraqi local government and security force. ISF inside and outside Tall Afar","rect":[140.39999389648438,118.42137145996094,503.1503189210892,109.36772918701172]},{"page":153,"text":"gained confidence and eventually took the lead in operations across the province. The","rect":[140.39999389648438,129.94139099121095,503.16912722396855,120.88774871826172]},{"page":153,"text":"development of legitimate ISF facilitated increased HUMINT from the local population,","rect":[140.39999389648438,141.46141052246095,503.08851075172427,132.4077606201172]},{"page":153,"text":"which enabled ISF to action quickly on local tips of false passport shops, weapons","rect":[140.39999389648438,152.98143005371095,503.1871841554642,143.9277801513672]},{"page":153,"text":"smugglers, and other activities supporting the nontraditional enemy threats. With little","rect":[140.39999389648438,164.50144958496095,503.14718508529668,155.4477996826172]},{"page":153,"text":"assistance from coalition forces, the ISF successfully denied the enemy threat freedom of ","rect":[140.39999389648438,176.0214080810547,505.51066040992739,166.96775817871095]},{"page":153,"text":"maneuver throughout the Ninewa Province.","rect":[140.39999389648438,187.42137145996095,315.6869909763336,178.3677215576172]},{"page":153,"text":"During stability tasks, Cavalry units operate within the BCT’s area of operations. BCTs","rect":[140.39999389648438,204.94139099121095,503.0665786867142,195.8877410888672]},{"page":153,"text":"employ their Cavalry units to conduct route, area, and zone reconnaissance, as well as","rect":[140.39999389648438,216.46141052246095,503.1393325929642,207.4077606201172]},{"page":153,"text":"screen, guard, and area security (including route security) operations. This activity secures","rect":[140.39999389648438,227.98143005371095,503.08458405780797,218.9277801513672]},{"page":153,"text":"the affected population and answers BCT and higher PIRs. Cavalry units assist the","rect":[140.39999389648438,239.50144958496095,503.00448488998418,230.4477996826172]},{"page":153,"text":"commander and staff in visualizing and understanding the area of operations, and the","rect":[140.39999389648438,251.0214080810547,503.05267214584355,241.96775817871095]},{"page":153,"text":"external factors that may affect the area of operations","rect":[140.39999389648438,262.5414123535156,356.55189973163609,253.48777770996095]},{"page":153,"text":"6-18. While BCTs can assign Cavalry squadrons to their own area of operations for a period, the use of","rect":[108.0,283.42138671875,540.0687552080154,274.3677673339844]},{"page":153,"text":"Cavalry as a maneuver unit instead of as a reconnaissance and security organization incurs risk of incomplete","rect":[108.00003814697266,294.9450988769531,539.9902331809998,285.8914794921875]},{"page":153,"text":"or inadequate reconnaissance and security operations. When assigned their own area of operations, Cavalry","rect":[108.00004577636719,306.4688415527344,540.0668530464172,297.41522216796877]},{"page":153,"text":"squadrons conduct tasks to support stability in the same manner as other maneuver units. However, the","rect":[108.0,317.9925537109375,540.1153552513123,308.9389343261719]},{"page":153,"text":"capabilities within the Cavalry squadron and its size make it ideal for employment as an economy of force","rect":[108.0,329.5162658691406,539.9672839622498,320.462646484375]},{"page":153,"text":"for the BCT.","rect":[108.0,338.91851806640627,158.84380555152894,331.8668518066406]},{"page":153,"text":"CAVALRY UNIT’S ROLE","rect":[90.0,366.2106018066406,254.28905741596223,356.49493408203127]},{"page":153,"text":"6-19. The BCT commander relies heavily on the Cavalry squadron to conduct reconnaissance and security","rect":[108.0,386.5013732910156,540.0510449409485,377.44775390625]},{"page":153,"text":"missions throughout all phases of stability operations. Force organization plays an integral part in stability","rect":[108.0,398.02508544921877,539.7829174995422,388.9714660644531]},{"page":153,"text":"operations and the commander uses force tailoring and task organization to get the right military force to","rect":[107.99002838134766,409.5487976074219,540.041889667511,400.49517822265627]},{"page":153,"text":"conduct sustainment task operations.","rect":[107.99000549316406,421.0526428222656,255.19382691383363,412.0189208984375]},{"page":153,"text":"SQUADRON","rect":[90.0,445.9463806152344,145.67091464996339,436.1159973144531]},{"page":153,"text":"6-20. The Cavalry squadron can conduct reconnaissance and security operations to support stability tasks.","rect":[108.0,464.3813781738281,540.060861825943,455.3277587890625]},{"page":153,"text":"The Cavalry squadron achieves these goals during all phases of stability tasks within the entirety of the higher","rect":[107.99003601074219,475.90509033203127,540.0908499345779,466.8514709472656]},{"page":153,"text":"echelon’s area of operations. Additionally, the BCT can assign the Cavalry squadron its own area of","rect":[107.99003601074219,487.3092956542969,539.9810476884842,478.25567626953127]},{"page":153,"text":"operations where it could be placed upon a border or boundary having enemy infiltration routes, which allows","rect":[107.99003601074219,498.8330078125,540.1494033937454,489.7793884277344]},{"page":153,"text":"the squadron to conduct screen or guard tasks for the main body.","rect":[107.99002838134766,510.35675048828127,366.91907715797427,501.3031311035156]},{"page":153,"text":"TROOP","rect":[90.0,533.6527099609375,125.30921697616577,525.5759887695313]},{"page":153,"text":"6-21. The Cavalry troopconducts reconnaissance and security missions during stability tasks to answer PIRs,","rect":[108.0,553.6614379882813,539.8556616306305,544.6077880859375]},{"page":153,"text":"develop the commander’s understanding of the operational environment, and enable the squadron to shape","rect":[108.00995635986328,565.1851196289063,540.0936267356873,556.1314697265625]},{"page":153,"text":"the environment in the area of operations. The troop focuses reconnaissance efforts on gaining a detailed","rect":[108.00997161865235,576.7088623046875,540.0607495307922,567.6552124023438]},{"page":153,"text":"understanding of the operational environment’s sources of instability, and the capability and intentions of","rect":[108.00997161865235,588.1130981445313,540.1873465166092,579.0594482421875]},{"page":153,"text":"key actors as the unit moves from the initial response phase to the transformation phase of stability tasks.","rect":[108.00997161865235,599.6367797851563,540.0620214939117,590.5831298828125]},{"page":153,"text":"Specifically, the scout platoons collect information on civil considerations using areas, structures,","rect":[108.00997161865235,611.1604614257813,539.9794409275055,602.1068115234375]},{"page":153,"text":"capabilities, organizations, people, and events and operational variables (PMESII-PT). Scout platoons work","rect":[108.00997161865235,622.6842041015625,540.0625195503235,613.6305541992188]},{"page":153,"text":"directly with unified action partners to assist in their efforts.","rect":[108.01000213623047,634.2079467773438,347.9603064060211,625.154296875]},{"page":153,"text":"SUPPORT DURING STABILITY TASKS","rect":[90.0,659.4906005859375,344.8498190803528,649.7609252929688]},{"page":153,"text":"6-22. Maneuver units require attachments to be optimally effective during stability operations. The nature of","rect":[108.0,679.7814331054688,539.9613943681717,670.727783203125]},{"page":153,"text":"stability operations is complex; therefore, it requires diverse organizations with specialties to conduct","rect":[108.0,691.1856079101563,540.1415606746674,682.1319580078125]},{"page":153,"text":"reconnaissance and security operations.","rect":[108.00995635986328,702.7093505859375,266.4028112888336,693.6557006835938]},{"page":153,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":153,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":153,"text":"6-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":154,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":154,"text":"FIELD ARTILLERY","rect":[72.0,83.1600341796875,163.32847690582276,75.04803466796875]},{"page":154,"text":"6-23. Fires require the right amount of force precisely applied to the correct target during the stability","rect":[90.0,103.30143737792969,522.0578808784485,94.24779510498047]},{"page":154,"text":"operation phases. Fires, often conducted in densely populated areas of operations, create the requirement for","rect":[90.00003814697266,114.82518005371094,522.1036673173904,105.77153778076172]},{"page":154,"text":"well-integrated and rehearsed airspace de-confliction, clearance of fires, and precision strike mission","rect":[90.0100326538086,126.22935485839844,522.092915058136,117.17571258544922]},{"page":154,"text":"processes. Implementing reasonable fire support coordination measures, updating them continuously, and","rect":[90.0100326538086,137.7530975341797,522.1866040229797,128.69944763183595]},{"page":154,"text":"ensuring highly accurate (typically 10 meter or less target location error) target locations increases the","rect":[90.0100326538086,149.2767791748047,522.005186794281,140.22312927246095]},{"page":154,"text":"effectiveness of fires in a stability environment. Targeting is an integral part of stability tasks to synchronize","rect":[90.02001953125,160.80052185058595,522.1155993919373,151.7468719482422]},{"page":154,"text":"nonlethal effects and to conduct engagement planning. Cavalry may use fires frequently to defend key","rect":[90.02001953125,172.3242645263672,522.0927929878235,163.27061462402345]},{"page":154,"text":"geopolitical sites or strike high-payoff targets located near restrictive fire areas and densely populated","rect":[90.02997589111328,183.8479461669922,522.2102856636047,174.79429626464845]},{"page":154,"text":"locations with precision munitions. Fire support officers and joint fire observers’ ability to plan, coordinate,","rect":[90.02993774414063,195.25218200683595,522.1115820407867,186.18858337402345]},{"page":154,"text":"and execute fires often with precision munitions to support stability tasks are crucial to mission success.","rect":[90.02996063232422,206.77586364746095,521.9593603610992,197.7222137451172]},{"page":154,"text":"Increasing the proportion of precision munitions used in fires and employment of nonlethal capabilities may","rect":[90.02996063232422,218.2996063232422,522.0859570503235,209.24595642089845]},{"page":154,"text":"be necessary to limit collateral damage.","rect":[90.02996826171875,229.8232879638672,248.42481446266175,220.76963806152345]},{"page":154,"text":"6-24. A precision-guided munition is a guided weapon intended to destroy a point target and minimize","rect":[90.02996826171875,247.3429412841797,522.1356189231873,238.28929138183595]},{"page":154,"text":"collateral damage (JP 3-03). Precision-guided munitions collectively refer to munitions that strike on","rect":[90.01004791259766,258.8666687011719,522.043110370636,249.8130340576172]},{"page":154,"text":"reflected electromagnetic energy (such as Hellfire missiles) and precision munitions.","rect":[90.00011444091797,270.2708435058594,428.847238779068,261.21722412109377]},{"page":154,"text":"6-25. A precision munition is a munition that corrects for ballistic conditions using guidance and control up","rect":[90.00011444091797,287.7904968261719,522.0471386909485,278.73687744140627]},{"page":154,"text":"to the aimpoint or submunitions dispense with terminal accuracy less than the lethal radius of effects","rect":[89.99016571044922,299.314208984375,522.1674697999954,290.2605895996094]},{"page":154,"text":"(FM 3-09). Munitions with a precision capability (such as the Global Positioning System-aided Excalibur","rect":[90.00011444091797,310.8379211425781,522.0619192705154,301.7843017578125]},{"page":154,"text":"155-mm projectile, guided multiple launch rocket system rockets, and the advanced precision munitions","rect":[89.98016357421875,322.36163330078127,522.1295669679641,313.29803466796877]},{"page":154,"text":"initiative 120-mm mortar rounds) have a circular error probable of less than 10 meters. Munitions with a","rect":[89.97021484375,333.7459411621094,521.933409450531,324.71221923828127]},{"page":154,"text":"near-precision capability (such as the precision guidance kit fuze for 155-mm artillery projectiles) have a","rect":[89.97021484375,345.2895812988281,521.9452502708435,336.2259826660156]},{"page":154,"text":"circular error probable between 10 and 50 meters. Area capabilities have a circular error probable greater","rect":[89.96019744873047,356.81329345703127,522.0501394853592,347.7596740722656]},{"page":154,"text":"than 50 meters. Circular error probable is an indicator of the delivery accuracy of a weapon system. Circular","rect":[89.96015930175781,368.3370056152344,521.7928763017654,359.28338623046877]},{"page":154,"text":"error probable is a factor to determine probable damage to a target. Circular error probable is the radius of a","rect":[89.96014404296875,379.8607177734375,521.9442737083435,370.8070983886719]},{"page":154,"text":"circle within which half of the rounds fired at a target impact. Even at the munitions’ largest anticipated","rect":[89.96014404296875,391.3844299316406,521.9306836128235,382.330810546875]},{"page":154,"text":"delivery error, the aimpoint is within the munitions’ anticipated radius of direct effects. The employment of","rect":[89.96014404296875,402.78863525390627,522.0371389970779,393.7350158691406]},{"page":154,"text":"precision munitions requires the use of current cryptological key information.","rect":[89.96014404296875,414.3123474121094,400.48612427711489,405.25872802734377]},{"page":154,"text":"6-26. Rules of engagement often become more restrictive as phases of stability progress. Commander’s","rect":[89.96014404296875,431.8320007324219,522.0630386476516,422.77838134765627]},{"page":154,"text":"guidance for fires requires careful consideration during the development of the rules of engagement and","rect":[89.96014404296875,443.355712890625,522.0131421089172,434.30206298828127]},{"page":154,"text":"engagement criteria. Units conducting reconnaissance and security operations must carefully consider the","rect":[89.95020294189453,454.87945556640627,522.013243434906,445.8258361816406]},{"page":154,"text":"benefits and consequences of initiating fires or breaking contact if fires are initiated on the unit.","rect":[89.95020294189453,466.4031982421875,472.1195776462555,457.3495788574219]},{"page":154,"text":"6-27. The BCT utilizes radars and indirect fire acquisition assets in a sensing mode that allows identifying","rect":[89.95020294189453,483.8033447265625,521.9910473823547,474.7497253417969]},{"page":154,"text":"the point of impact to protect friendly forces from indirect fire. These radars integrate with the air defense","rect":[89.95018768310547,495.3270568847656,522.0639026145935,486.2734375]},{"page":154,"text":"radar as part of the counter-rocket, artillery, mortar system that provides sense and warn capability for troop","rect":[89.95018768310547,506.8507995605469,521.880024433136,497.79718017578127]},{"page":154,"text":"AAs and command posts. In areas subject to collateral damage, counterfire should employ precision","rect":[89.95020294189453,518.3744506835938,521.8894238471985,509.3108215332031]},{"page":154,"text":"munitions against well-located targets. The BCT must carefully consider the use of fires with munitions","rect":[89.95020294189453,529.898193359375,521.9840591554641,520.8445434570313]},{"page":154,"text":"having only area capabilities due to the possible long-term adverse impact on relations with unified action","rect":[89.95022583007813,541.4219360351563,521.9851269721985,532.3682861328125]},{"page":154,"text":"partners and the indigenous population thereby contributing to sources of instability.","rect":[89.95022583007813,552.8261108398438,427.95487427711489,543.7724609375]},{"page":154,"text":"BRIGADE ENGINEER BATTALION","rect":[72.0,576.022216796875,233.76785373687745,567.9359741210938]},{"page":154,"text":"6-28. The BEB provides reconnaissance and security operational support during all phases of stability","rect":[90.0,596.0214233398438,521.956928730011,586.9677734375]},{"page":154,"text":"operations. Engineers","rect":[90.01000213623047,607.5451049804688,180.28740388202668,598.491455078125]},{"page":154,"text":"provide mobility, countermobility, survivability, technical reconnaissance, and","rect":[186.25344848632813,607.5451049804688,522.0440258979797,598.491455078125]},{"page":154,"text":"infrastructure assessment capabilities.","rect":[90.00995635986328,619.0488891601563,241.29239869117738,610.0151977539063]},{"page":154,"text":"ENGINEERS","rect":[72.0,642.3822021484375,129.5767879486084,634.2959594726563]},{"page":154,"text":"6-29. Engineer platoons task organize at the squad level to Cavalry units to support mobility,","rect":[90.0,662.3814086914063,522.2072241306305,653.3277587890625]},{"page":154,"text":"countermobility, and survivability. Engineer platoons can execute route and area reconnaissance organically.","rect":[89.99996185302735,673.78564453125,522.2670996189117,664.7319946289063]},{"page":154,"text":"The route clearance platoon can provide mobility and limited disposal of mines. The support platoon or","rect":[90.00993347167969,685.309326171875,522.0747976884842,676.2556762695313]},{"page":154,"text":"section can conduct initial infrastructure assessments and basic horizontal construction to restore services to","rect":[90.0,694.8211059570313,521.9383130073547,687.7794189453125]},{"page":154,"text":"support governance.","rect":[90.0,708.3567504882813,171.2168219089508,700.299072265625]},{"page":154,"text":"6-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":154,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":154,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":155,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0807211914063,37.8480224609375]},{"page":155,"text":"6-30. The engineer companies of the BEB can execute some stability tasks identified in reconnaissance and","rect":[108.0,83.50144958496094,539.9353222846985,74.44780731201172]},{"page":155,"text":"security operations as an organic unit throughout all phases of stability operations. If required by the","rect":[107.99008178710938,95.02519226074219,540.1127917747498,85.97154998779297]},{"page":155,"text":"commander, the BEB can conduct route and area reconnaissance, area security, patrols, limited raids,","rect":[107.99008178710938,106.42936706542969,540.0252783298492,97.37572479248047]},{"page":155,"text":"assessment and restoration of services and leader engagements.","rect":[107.99008178710938,117.95310974121094,361.28284668922427,108.89946746826172]},{"page":155,"text":"6-31. Geospatial engineering teams can provide detailed products about the topography of a geographic area.","rect":[107.99008178710938,135.4727020263672,539.9703466892242,126.41905975341797]},{"page":155,"text":"Geospatial teams produce intelligence by analyzing images and geospatial data of terrain and various objects","rect":[107.9900894165039,146.99644470214845,540.1497085695266,137.93284606933595]},{"page":155,"text":"within a unit’s area of operations. These products can be analyzed and provided to Cavalry units to narrow","rect":[107.9900894165039,158.5201873779297,540.0888861408233,149.46653747558595]},{"page":155,"text":"the reconnaissance focus to specific objectives rather than a broad area.","rect":[107.9900894165039,170.0438690185547,393.843332529068,160.9802703857422]},{"page":155,"text":"CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR","rect":[90.0,195.2880096435547,375.2404947280884,185.07601928710938]},{"page":155,"text":"6-32. Each squadron has an organic CBRN reconnaissance and surveillance platoon that can execute","rect":[108.0,213.2213592529297,540.1155993919373,204.16770935058595]},{"page":155,"text":"CBRN-specific reconnaissance and surveillance tasks. The platoon supports route, zone, and area","rect":[108.0,224.7251739501953,539.9931018333435,215.6914520263672]},{"page":155,"text":"reconnaissance operations and can assess key infrastructure regarding CBRN hazards. The CBRN","rect":[108.0,236.26878356933595,539.9921454181671,227.2151336669922]},{"page":155,"text":"reconnaissance and surveillance platoon assesses possible threat locations and confirms or denies the","rect":[107.99006652832031,247.77259826660157,540.0887439231873,238.73887634277345]},{"page":155,"text":"presence of CBRN threats and hazards to assist with security operations.","rect":[107.99006652832031,259.3161926269531,398.356027841568,250.26255798339845]},{"page":155,"text":"INTELLIGENCE","rect":[90.0,282.6222229003906,164.36843252182008,274.5360107421875]},{"page":155,"text":"6-33. Commanders must be involved and knowledgeable of the information collection efforts to narrow the","rect":[108.0,302.62139892578127,540.0976550559998,293.5677795410156]},{"page":155,"text":"reconnaissance focus and shape the operational environment. Planning for stability tasks is quite complicated,","rect":[108.0,314.0256042480469,540.1048681735992,304.97198486328127]},{"page":155,"text":"and planners need to balance resources, capabilities, and activities. BCT staffs analyze the significance of","rect":[108.0,325.54931640625,540.0920706377029,316.4956970214844]},{"page":155,"text":"various activities over time to maximize their efforts to provide stability.","rect":[108.0,337.0730285644531,398.72550415992739,328.0194091796875]},{"page":155,"text":"6-34. Commanders often require detailed intelligence and IPB products to determine how to conduct","rect":[108.0,354.5926818847656,540.1317950496674,345.5390625]},{"page":155,"text":"operations, influence the local population, and mitigate sources of instability. The identification and analysis","rect":[108.0,366.11639404296877,540.0300186281204,357.0627746582031]},{"page":155,"text":"of actors, terrain and weather, and civil considerations are critical to determining the most effective missions,","rect":[108.00995635986328,377.5205993652344,540.0966284275055,368.46697998046877]},{"page":155,"text":"tasks, and locations for stability tasks. A lack of knowledge concerning the enemy threat, local politics,","rect":[108.00995635986328,389.0443115234375,539.987131357193,379.9906921386719]},{"page":155,"text":"customs, culture, and differentiating between local combatants often leads to actions that can result in","rect":[108.01991271972656,400.5680236816406,540.1416821479797,391.514404296875]},{"page":155,"text":"unintended and disadvantageous consequences. To achieve this understanding, the BCT commander attaches","rect":[108.01991271972656,412.0917663574219,540.2032364015579,403.03814697265627]},{"page":155,"text":"collection assets to the Cavalry squadron.","rect":[108.02986145019531,423.615478515625,274.1984350681305,414.5618591308594]},{"page":155,"text":"6-35. During stability tasks, the disclosure of military information to host-nation personnel and agencies","rect":[108.02986145019531,441.1351013183594,540.0547989015579,432.08148193359377]},{"page":155,"text":"requires consideration. The BCT S-2 must ensure the BCT has the required amount of foreign disclosure","rect":[108.0298843383789,452.539306640625,540.083800075531,443.4856872558594]},{"page":155,"text":"officers. A foreign disclosure officer may approve the disclosure of classified and controlled, unclassified","rect":[108.0199203491211,464.0630187988281,539.953266620636,455.0093994140625]},{"page":155,"text":"military information to foreign representatives based on the policies, directives, and laws that govern the","rect":[108.01991271972656,475.58673095703127,540.0599963645935,466.5331115722656]},{"page":155,"text":"national disclosure policy and the release of classified information. The officer provides this service to the","rect":[108.01991271972656,487.1104431152344,539.9684436302185,478.05682373046877]},{"page":155,"text":"command and staff and to assigned, attached, and supporting unified action partners.","rect":[108.01991271972656,498.6341857910156,446.86426758766177,489.58056640625]},{"page":155,"text":"6-36. Stability tasks occur in and between the localpopulations, thus human contact with the local population","rect":[108.01991271972656,516.1538696289063,540.093647480011,507.1002197265625]},{"page":155,"text":"has greater emphasis and importance. Observations and experiences of Soldiers, who often work with the","rect":[108.01991271972656,527.5580444335938,540.1175525169373,518.50439453125]},{"page":155,"text":"local population, provide depth and context to information collected through reconnaissance and security operations.","rect":[108.02982330322266,539.0817260742188,539.9300634860992,530.028076171875]},{"page":155,"text":"Remote Sensors","rect":[90.0,561.4055786132813,164.99139836406708,553.7659301757813]},{"page":155,"text":"6-37. The BCT uses remote sensors to perform such tasks as perimeter defense, surveillance, environmental","rect":[108.0,581.1214599609375,540.1736041316987,572.0877685546875]},{"page":155,"text":"monitoring (including radiological and nuclear), and target acquisition. Remote sensors are not a military","rect":[108.0,592.6651000976563,539.927387714386,583.6114501953125]},{"page":155,"text":"intelligence collection asset; however, they provide information that the BCT usesto cue military intelligence","rect":[107.99008178710938,604.1888427734375,540.0957019309998,595.1351928710938]},{"page":155,"text":"collection assets to activity. The BCT should consider remote sensors when preparing the information","rect":[107.99008178710938,615.7125854492188,540.057026386261,606.658935546875]},{"page":155,"text":"collection plan. Soldiers or robotic vehicles hand-emplace them either inside or outside buildings or","rect":[107.9801254272461,627.2362670898438,540.0588064775467,618.1826171875]},{"page":155,"text":"structures. Their optimal employment is in areas where major movement is restricted to a few key lines of","rect":[107.97015380859375,638.760009765625,540.0249930009842,629.6964111328125]},{"page":155,"text":"communications, and the traffic pattern of military and civilian activity can be easily discriminated. Remote","rect":[107.97013854980469,650.1642456054688,540.0560290794373,641.110595703125]},{"page":155,"text":"sensor missions are ideally suited to support relatively stable situations, such as long-term defensive or","rect":[107.97013854980469,661.6879272460938,540.0608206377029,652.63427734375]},{"page":155,"text":"security operations, where the time and resources are available to develop an extensive sensor network","rect":[107.97013854980469,673.211669921875,540.1120190620422,664.1580200195313]},{"page":155,"text":"throughout the area of operations.","rect":[107.97014617919922,684.7353515625,243.17711853981019,675.6817016601563]},{"page":155,"text":"6-38. The employment of sensors in open terrain or heavily congested urban concentrations requires detailed","rect":[107.97010040283203,702.2550048828125,539.9149975776672,693.2013549804688]},{"page":155,"text":"planning to ensure the sensor network can provide the desired information in those environments. For","rect":[107.97010040283203,713.7787475585938,540.0660696611404,704.72509765625]},{"page":155,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":155,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":155,"text":"6-7","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":156,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":156,"text":"stability tasks, sensors can provide surveillance of population centers and key infrastructure areas. They can","rect":[90.0,83.50144958496094,522.0581860542297,74.44780731201172]},{"page":156,"text":"also provide surveillance along the lines of communications and borders. The supported unit’s information","rect":[90.0,95.02519226074219,522.1814160346985,85.97154998779297]},{"page":156,"text":"collection plan includes provisions for sensor surveillance. Incorporating remote sensors into the information","rect":[90.0,106.42936706542969,522.0739941596985,97.37572479248047]},{"page":156,"text":"collection plan utilizes the employment concept and detailed instructions to execute remote sensor missions.","rect":[90.0,117.95310974121094,521.9652197360992,108.89946746826172]},{"page":156,"text":"BCTs develop requirements for sensor employment along with concepts for the monitoring and","rect":[90.0,129.47679138183595,522.2183423042297,120.42314910888672]},{"page":156,"text":"dissemination of sensor data and incorporate them into the information collection plan. The establishment of ","rect":[90.0,140.98060607910157,524.4762060642242,131.94688415527345]},{"page":156,"text":"a comprehensive sensor network requires time and a significant investment of resources. During the planning","rect":[90.0,152.52427673339845,522.067036151886,143.4706268310547]},{"page":156,"text":"requirements task, the operations and intelligence-working group identify SIRs that remote sensors can","rect":[90.0,164.04795837402345,522.1912426948547,154.9943084716797]},{"page":156,"text":"answer. As part of the information collection plan, the sensor surveillance plan specifies the—","rect":[89.99000549316406,175.43226623535157,467.394326210022,166.39854431152345]},{"page":156,"text":" Type and location of sensors, relays, and monitoring sites.","rect":[115.19999694824219,188.8613739013672,366.21317505836489,179.80772399902345]},{"page":156,"text":" Time of emplacement and unit responsible for emplacing each sensor string and any relays.","rect":[115.19999694824219,202.42137145996095,499.28492188453677,193.3677215576172]},{"page":156,"text":" Time of recovery and unit responsible for recovery.","rect":[115.19999694824219,215.8613739013672,339.92774415016177,206.80772399902345]},{"page":156,"text":"Expeditionary Military Intelligence Brigade","rect":[72.0,240.5736083984375,278.40716159439088,230.7148895263672]},{"page":156,"text":"6-39. Expeditionary military intelligence brigades (known as E-MIBs) conduct multi-discipline intelligence","rect":[90.0,258.1014099121094,522.0906970481873,249.0477752685547]},{"page":156,"text":"operations during large-scale combat operations. E-MIB headquarters are required to exercise mission","rect":[90.0,269.6251525878906,522.0697827339172,260.571533203125]},{"page":156,"text":"command over all assigned and attached elements. E-MIB headquarters provide reach capability, establish","rect":[89.99002838134766,281.1488342285156,521.9231762886047,272.0950927734375]},{"page":156,"text":"and maintain the corps intelligence architecture, and execute technical control of various capabilities. The","rect":[89.98999786376953,292.6725769042969,521.9824206809998,283.61895751953127]},{"page":156,"text":"size and composition of the deployed E-MIB and its subordinate organization is dependent on the mission","rect":[89.98999786376953,304.0767822265625,521.8952221870422,295.0231628417969]},{"page":156,"text":"required to be performed in-theater. An E-MIB provides the following capabilities─","rect":[89.9801025390625,315.6004943847656,426.6579727516174,306.546875]},{"page":156,"text":" Analysis.","rect":[115.19999694824219,329.0213928222656,170.60477662086488,319.9677734375]},{"page":156,"text":" Processing, exploitation, and dissemination.","rect":[115.19999694824219,342.5813903808594,309.32267212867739,333.52777099609377]},{"page":156,"text":" Open-source intelligence.","rect":[115.19999694824219,356.0213928222656,236.009104013443,346.9677734375]},{"page":156,"text":" SIGINT and electromagnetic warfare integration.","rect":[115.19999694824219,369.5813903808594,330.68689942359927,360.52777099609377]},{"page":156,"text":" Counterintelligence collection and activities.","rect":[115.19999694824219,383.0213928222656,312.07657837867739,373.9677734375]},{"page":156,"text":" Multidomain operations sensing and target development.","rect":[115.19999694824219,396.5813903808594,361.04395508766177,387.52777099609377]},{"page":156,"text":"6-40. E-MIBs can augment corps, division, and BCT intelligence cells, specifically aiding the processing,","rect":[89.99351501464844,414.1010437011719,522.0384619235992,405.04742431640627]},{"page":156,"text":"exploitation, and dissemination of national and theater SIGINT and geospatial intelligence. Instead of","rect":[89.98355102539063,425.624755859375,522.0633230791092,416.5711364746094]},{"page":156,"text":"deploying the E-MIB as a unit to conduct independent intelligence operations to support the corps, the corps","rect":[89.98355102539063,437.1484680175781,522.1332290773391,428.0948486328125]},{"page":156,"text":"commander, as part of force tailoring during planning, task organizes the E-MIB to support operations. The","rect":[89.97358703613281,448.67218017578127,522.0662829856873,439.6185607910156]},{"page":156,"text":"corps assistant chief of staff for intelligence (G-2) advises the commanders of the E-MIB’s capabilities and","rect":[89.96363830566406,460.0763854980469,522.0264477729797,451.02276611328127]},{"page":156,"text":"recommends how to task-organize its assets.","rect":[89.9636001586914,471.6001281738281,267.63407349586489,462.5465087890625]},{"page":156,"text":"SUSTAINMENT","rect":[72.0,496.890625,174.8247477235794,487.1749572753906]},{"page":156,"text":"6-41. Stability tasks require unique sustainment considerations. Commanders must remember that the design","rect":[90.0,517.1814575195313,521.9545483589172,508.1278076171875]},{"page":156,"text":"of the BSB supports only the BCT’s assigned Soldiers and equipment. Reconnaissance units often identify","rect":[90.0,528.7051391601563,522.0342602729797,519.6514892578125]},{"page":156,"text":"sources of instability that sustainment efforts can mitigate or shape immediately with a sustainment effort. If","rect":[90.0,540.2288818359375,522.0697317705154,531.1752319335938]},{"page":156,"text":"the BSB develops stability support plans, the BSB commander must ensure that sustainment estimates","rect":[89.99998474121094,551.7525634765625,522.0650528078079,542.6989135742188]},{"page":156,"text":"differentiate what is supporting internal BCT requirements and what is supporting external stability support","rect":[89.99998474121094,563.1567993164063,522.1277667293549,554.1031494140625]},{"page":156,"text":"mission requirements. Sustainment during stability tasks often involves supporting U.S. forces, multinational","rect":[89.99998474121094,574.6804809570313,522.1396685848237,565.6268310546875]},{"page":156,"text":"forces, and other contributing partners in a wide range of missions and tasks.","rect":[89.99998474121094,586.2042236328125,397.16639161109927,577.1505737304688]},{"page":156,"text":"INTERDEPENDENT CAPABILITIES","rect":[72.0,611.4906005859375,306.5662497444153,601.7749633789063]},{"page":156,"text":"6-42. Cavalry and other units conducting reconnaissance and security operations during stability tasks often","rect":[90.0,631.7814331054688,521.9331250190735,622.727783203125]},{"page":156,"text":"determine that they are not the first organization operating in the area. Units conducting reconnaissance and","rect":[90.0,643.3051147460938,522.0511059761047,634.25146484375]},{"page":156,"text":"security operations can gain a better understanding through coordination and information and intelligence","rect":[90.0,654.828857421875,521.9704577903748,645.7752075195313]},{"page":156,"text":"sharing with unified action partners. Below are some unified action partners that units can coordinate with","rect":[90.0,666.3526000976563,522.042866230011,657.2989501953125]},{"page":156,"text":"during stability─","rect":[90.0,677.7567749023438,157.8973221168518,668.703125]},{"page":156,"text":" SOF","rect":[115.19999694824219,689.179443359375,151.45568299484254,682.2970581054688]},{"page":156,"text":".","rect":[151.435791015625,689.16943359375,153.92579102516175,688.09375]},{"page":156,"text":" Civil affairs.","rect":[115.19999694824219,702.7394409179688,183.68224549293519,695.687744140625]},{"page":156,"text":" Governmental and nongovernmental organizations.","rect":[115.19999694824219,718.181396484375,338.72855591773989,709.1277465820313]},{"page":156,"text":"6-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":156,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":156,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":157,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0842612304688,37.8480224609375]},{"page":157,"text":"SPECIAL OPERATIONS FORCES","rect":[90.0,83.34003448486328,242.0301570892334,75.0360336303711]},{"page":157,"text":"6-43. Conventional forces build relationships and foster interdependence with U.S. SOF operating in the","rect":[108.0,103.30143737792969,540.0856921653748,94.24779510498047]},{"page":157,"text":"area. Interdependence is the deliberate and mutual reliance of one unified action partner on another’s inherent","rect":[107.99000549316406,114.80525970458985,540.1347857723237,105.77153778076172]},{"page":157,"text":"capabilities to provide complementary and reinforcing effects. These units execute different tactical tasks to","rect":[107.99000549316406,126.22935485839844,539.969379901886,117.17571258544922]},{"page":157,"text":"support the operational objectives and end states to stabilize the area. BCTs rely on interdependence with","rect":[107.99000549316406,137.7530975341797,539.8791089057922,128.6894989013672]},{"page":157,"text":"unified action partners and SOF partnerships to combat sources of instability. The exercise of","rect":[107.98999786376953,149.2767791748047,540.0748587236404,140.22312927246095]},{"page":157,"text":"interdependence facilitates shared understanding between the U.S. actors in the operational environment.","rect":[107.99008178710938,160.80052185058595,540.0948584079742,151.7468719482422]},{"page":157,"text":"Interdependence provides a conduit by which the interagency and SOF partners can provide relevant, useful,","rect":[107.99008178710938,172.3242645263672,540.1986792087555,163.27061462402345]},{"page":157,"text":"and timely information. Planning efforts, update briefs, and working groups are specific events where BCTs","rect":[107.99008178710938,183.8479461669922,540.0289810304641,174.79429626464845]},{"page":157,"text":"incorporate their interagency partners. (Refer to FM 6-05 for more information on conventional forces and","rect":[107.99008178710938,195.25218200683595,540.027973651886,186.1985321044922]},{"page":157,"text":"SOF integration, interoperability, and interdependence.)","rect":[107.9801254272461,206.77586364746095,332.0900869951248,197.7222137451172]},{"page":157,"text":"CIVIL AFFAIRS","rect":[90.0,230.08798217773438,164.51910972595216,221.79598999023438]},{"page":157,"text":"6-44. Civil affairs support to stability tasks depends on the nature of the operation and the condition of the","rect":[108.0,250.06138610839845,540.0740954856873,241.0077362060547]},{"page":157,"text":"affected indigenous population and institutions. The S-9 and civil affairs units continually assess and monitor","rect":[108.0,261.5851135253906,540.0817556962967,252.53147888183595]},{"page":157,"text":"the host nation’s capabilities and capacity to identify and mitigate underlying causes of instability within","rect":[108.0,273.1087951660156,539.9873242378235,264.05517578125]},{"page":157,"text":"society and, as required, apply functional skills which are usually the responsibility of civil government. Civil","rect":[108.0,284.6325378417969,540.0271807918549,275.57891845703127]},{"page":157,"text":"affairs conduct civil reconnaissance and develop civil information through interaction with the indigenous","rect":[108.0,296.0367126464844,540.1415908937454,286.98309326171877]},{"page":157,"text":"population, institutions, and unified action partners. During the transition from primarily offensive and","rect":[108.0,307.5604553222656,540.0786938667297,298.5068359375]},{"page":157,"text":"defensive operations to primary stability operations, civil affairs units place greater emphasis on","rect":[108.00991821289063,319.08416748046877,540.1135449409485,310.0305480957031]},{"page":157,"text":"infrastructure restoration, economic stability, and support to governance expertise.","rect":[108.02984619140625,330.6078796386719,437.63611817359927,321.55426025390627]},{"page":157,"text":"GOVERNMENTAL AND NONGOVERNMENTAL ORGANIZATIONS","rect":[90.0,353.9399719238281,393.09723472595217,345.6239929199219]},{"page":157,"text":"6-45. Units conducting reconnaissance operations must recognize the value of governmental and","rect":[108.0,373.9013671875,539.9563794136047,364.8477478027344]},{"page":157,"text":"nongovernmental organizations and build effective relationships with these actors. Governmental and","rect":[108.0,385.30560302734377,540.0618481636047,376.251953125]},{"page":157,"text":"nongovernmental organizations could provide subject matter expertise in many essential services and","rect":[108.00003814697266,396.82928466796877,539.861958026886,387.76568603515627]},{"page":157,"text":"governance topics. They are the primary provider of humanitarian, infrastructure, and essential services in","rect":[108.00004577636719,408.3529968261719,539.9333691596985,399.29937744140627]},{"page":157,"text":"immature operational environments. Governmental and nongovernmental organizations have experience and","rect":[108.00007629394531,419.8767395019531,540.0827832221985,410.8231201171875]},{"page":157,"text":"detailed knowledge of the civil environment and may have an understanding of civil considerations other","rect":[108.00007629394531,431.40045166015627,540.0588675127029,422.3468322753906]},{"page":157,"text":"than indigenous population and institutions. This insight can assist the civil reconnaissance effort in","rect":[107.99014282226563,442.9241638183594,539.9216504096985,433.87054443359377]},{"page":157,"text":"understanding and shaping the environment.","rect":[107.99014282226563,454.328369140625,285.5600073337555,445.2747497558594]},{"page":157,"text":"6-46. Understanding where governmental and nongovernmental organizations are on the battlefield and the","rect":[107.99014282226563,471.8480224609375,540.0829455833435,462.7944030761719]},{"page":157,"text":"nature of their activities develops a common operational picture. The common operational picture enables","rect":[107.99014282226563,483.3518371582031,540.1555069093704,474.318115234375]},{"page":157,"text":"the commander and staff to anticipate changes to the operational environment, to anticipate the effects of","rect":[107.99011993408203,494.89544677734377,539.9026785478592,485.8418273925781]},{"page":157,"text":"governmental and nongovernmental organizations on primary stability tasks and operations, and to anticipate","rect":[107.99011993408203,506.4191589355469,540.0908191184998,497.36553955078127]},{"page":157,"text":"future ","rect":[107.99011993408203,516.0,134.47974610328675,508.89923095703127]},{"page":157,"text":"friction ","rect":[139.90794372558595,516.0,171.7978765964508,508.8892822265625]},{"page":157,"text":"points ","rect":[177.22607421875,517.9229736328125,204.07523560523988,508.8892822265625]},{"page":157,"text":"between ","rect":[209.50341796875,516.0,245.35242676734925,508.8892822265625]},{"page":157,"text":"the ","rect":[250.78060913085938,516.0,265.5104467868805,508.8892822265625]},{"page":157,"text":"organizations. ","rect":[270.93865966796877,517.9429321289063,329.828195810318,508.8892822265625]},{"page":157,"text":"Building ","rect":[335.25640869140627,517.9429321289063,372.66617798805239,508.8892822265625]},{"page":157,"text":"relationships ","rect":[378.0943908691406,517.9229736328125,431.70215821266177,508.8892822265625]},{"page":157,"text":"with ","rect":[437.13037109375,516.0,457.38004517555239,508.8892822265625]},{"page":157,"text":"governmental ","rect":[462.80828857421877,517.9429321289063,520.2566015720367,508.8892822265625]},{"page":157,"text":"and","rect":[525.684814453125,516.0,540.0252270698547,508.8892822265625]},{"page":157,"text":"nongovernmental organizations may be difficult because these organizations are reluctant to establish","rect":[107.99011993408203,529.3471069335938,539.927631855011,520.29345703125]},{"page":157,"text":"associations with U.S. forces. The Cavalry must be mindful of the organizations’ reluctance and establish","rect":[107.99011993408203,540.8707885742188,539.9240307807922,531.817138671875]},{"page":157,"text":"relationships on terms beneficial to all parties involved. Cavalry units frequently discover governmental and","rect":[107.98999786376953,552.39453125,540.0528149604797,543.3408813476563]},{"page":157,"text":"nongovernmental organizations unexpectedly within the operational environment so they should plan to","rect":[107.99004364013672,563.9182739257813,540.0598340034485,554.8646240234375]},{"page":157,"text":"encounter them during their operations.","rect":[107.99000549316406,575.4419555664063,266.11988282203677,566.3883056640625]},{"page":157,"text":"6-47. Governmental and nongovernmental organizations","rect":[107.99000549316406,592.9616088867188,349.47020417499547,583.907958984375]},{"page":157,"text":"can bring valuable resources, information","rect":[356.27886962890627,592.9616088867188,540.0458569526672,583.907958984375]},{"page":157,"text":"regarding the civil population, the operational environment, and alternative perspectives to the brigade’s","rect":[107.98999786376953,604.3658447265625,540.0231216554641,595.3121948242188]},{"page":157,"text":"stability operation.","rect":[107.99004364013672,615.8895874023438,187.99773621559144,606.8359375]},{"page":157,"text":"(Refer to ATP 3-07.5 for more information.)","rect":[195.4677276611328,615.86962890625,403.6336660966873,606.8359375]},{"page":157,"text":"Cavalry units operating with","rect":[411.1127014160156,615.8895874023438,540.0498242378235,606.8359375]},{"page":157,"text":"nongovernmental organizations follow these guidelines:","rect":[107.99004364013672,627.4132690429688,332.51729309654237,618.359619140625]},{"page":157,"text":" Military personnel wear uniforms when conducting relief activities.","rect":[133.1999969482422,640.7814331054688,421.51648926734927,631.727783203125]},{"page":157,"text":" Military personnel make prior arrangements before visiting nongovernmental organizations.","rect":[133.1999969482422,654.221435546875,519.6901342868805,645.1677856445313]},{"page":157,"text":"","rect":[133.1999969482422,665.0611572265625,139.2058769197464,660.3336181640625]},{"page":157,"text":"Military personnel do not refer to nongovernmental organizations","rect":[151.1999969482422,667.7814331054688,430.83104401874547,658.727783203125]},{"page":157,"text":"“partners” or other similar terms.","rect":[151.20999145507813,679.28515625,283.66004395484927,670.25146484375]},{"page":157,"text":"as","rect":[435.7164306640625,665.7694702148438,444.03102570819859,661.0584106445313]},{"page":157,"text":"“force multipliers”","rect":[448.92431640625,667.761474609375,526.6720569114685,658.727783203125]},{"page":157,"text":"or","rect":[531.6121826171875,665.7694702148438,539.9686575517654,661.0584106445313]},{"page":157,"text":" U.S.forces respect anongovernmental organization’sdecision notto serve as an implementingpartner.","rect":[133.1999969482422,692.7413940429688,540.2365820407867,683.687744140625]},{"page":157,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":157,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":157,"text":"6-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":158,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":158,"text":"SECTION III – ARMY STABILITY OPERATIONS TASKS","rect":[81.36000061035156,86.90400695800781,388.764009765625,78.02400970458985]},{"page":158,"text":"6-48. Army stability operations tasks are fundamental and are performed across the range of military","rect":[90.0,110.26139831542969,522.087788105011,101.20775604248047]},{"page":158,"text":"operations, from stable peace to general war. Military forces execute Army stability operations tasks before,","rect":[90.0,121.78514099121094,522.0827124118805,112.73149871826172]},{"page":158,"text":"during, or after conflict to support a legitimate host-nation government, to assist a fragile state, or in the","rect":[90.0,133.30882263183595,521.9273669700623,124.25518035888672]},{"page":158,"text":"absence of a functioning civil authority. Each situation is unique. Each Army stability task and stability sector","rect":[89.99000549316406,144.8325653076172,522.0608206377029,135.77891540527345]},{"page":158,"text":"contains a number of related subordinate tasks.","rect":[89.99000549316406,154.22482299804688,278.0009253025055,147.18309020996095]},{"page":158,"text":"RECONNAISSANCE AND SECURITY STABILITY TASKS","rect":[75.48191833496094,181.53060913085938,445.9315146369934,171.81492614746095]},{"page":158,"text":"6-49. BCTs conduct stability tasks to create conditions the local population regards as legitimate, acceptable,","rect":[90.0,201.82139587402345,522.1225683689117,192.7677459716797]},{"page":158,"text":"and predictable (see ADP 3-07). BCTs conduct continuous reconnaissance operations during stability tasks","rect":[90.0,213.3451385498047,521.8975113039016,204.29148864746095]},{"page":158,"text":"to develop information requirements, gain situational understanding of their area of operations, identify","rect":[89.99005126953125,224.8688201904297,522.0458569526672,215.81517028808595]},{"page":158,"text":"sources of conflict and instability, and identify opportunities to consolidate sustainable and positive gains.","rect":[89.99004364013672,236.39256286621095,522.0380346775055,227.3389129638672]},{"page":158,"text":"Reconnaissance and security operations assist the commander and staff with determining short-term impacts","rect":[89.99004364013672,247.9163055419922,522.0150039796829,238.86265563964845]},{"page":158,"text":"and long-term effects on their area of operations. Commanders then assess the effectiveness of their actions","rect":[89.98008728027344,259.4399719238281,521.9294937257766,250.38633728027345]},{"page":158,"text":"and adjust as needed.","rect":[89.98008728027344,270.8441467285156,175.03550171852113,261.7805480957031]},{"page":158,"text":"6-50. BCT commanders consider each primary stability task and associated subtasks within the context of","rect":[89.98008728027344,288.36383056640627,522.0270681962967,279.3102111816406]},{"page":158,"text":"their particular area of operations (see figure 6-1). They also consider the perception of the local population","rect":[89.98009490966797,299.8875427246094,522.0240063667297,290.83392333984377]},{"page":158,"text":"and host-nation governance and security forces. The six Army primary stability operations tasks are—","rect":[89.9601821899414,311.4112548828125,489.6778955459595,302.3576354980469]},{"page":158,"text":" Establish civil security.","rect":[115.19999694824219,324.8214111328125,226.76221680641175,315.7677917480469]},{"page":158,"text":" Support to civil control.","rect":[115.19999694824219,338.24151611328127,228.8090307712555,329.2077941894531]},{"page":158,"text":" Restore essential services.","rect":[115.19999694824219,349.80950927734377,237.82679200172425,342.7677917480469]},{"page":158,"text":" Support to governance.","rect":[115.19999694824219,365.26141357421877,226.28914856910706,356.3771057128906]},{"page":158,"text":" Support to economic and infrastructure development.","rect":[115.19999694824219,378.801513671875,346.6507360935211,369.7677917480469]},{"page":158,"text":" Conduct security cooperation.","rect":[115.19999694824219,392.26141357421877,253.5267584323883,383.2077941894531]},{"page":158,"text":"6-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":158,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":158,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":159,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0807211914063,37.8480224609375]},{"page":159,"text":"Figure 6-1. Stability tasks","rect":[254.63999938964845,658.24169921875,375.11619019699097,648.9091796875]},{"page":159,"text":"ESTABLISH CIVIL SECURITY","rect":[90.0,681.6599731445313,230.03530979156495,673.35595703125]},{"page":159,"text":"6-51. The burden on BCTs for establishing civil security is highest during the initial response phase of the","rect":[108.0,701.6213989257813,540.0936877708435,692.5677490234375]},{"page":159,"text":"stability framework when the host nation lacks the capability or capacity to provide security. BCTs conduct","rect":[108.0,713.025634765625,540.1109210262299,703.9719848632813]},{"page":159,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":159,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":159,"text":"6-11","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":160,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":160,"text":"reconnaissance operations to collect information and conduct security operations to protect friendly units, the","rect":[90.0,83.50144958496094,522.1036365013123,74.44780731201172]},{"page":160,"text":"local population, key actors, and key terrain to enable the establishment of civil security. (Refer to","rect":[90.0,95.02519226074219,522.0608105659485,85.97154998779297]},{"page":160,"text":"ATP 3-07.5 for more information.) BCTs and subordinate units execute zone and area reconnaissance","rect":[90.0,106.4094467163086,522.119688747406,97.37572479248047]},{"page":160,"text":"operations to identify sources of instability affecting civil security. Companies and troops conduct route","rect":[90.00996398925781,117.95310974121094,522.1297595481873,108.89946746826172]},{"page":160,"text":"reconnaissance missions to support area security operations and retain freedom of maneuver within the area","rect":[90.00996398925781,129.47679138183595,522.1135241966248,120.42314910888672]},{"page":160,"text":"of operations. BCTs identify sources of instability and identify key terrain to facilitate the commander and","rect":[90.00997161865235,141.0005340576172,522.0737500190735,131.94688415527345]},{"page":160,"text":"staff’sunderstanding of the area of operations,and to plan and execute stability mechanisms. The commander","rect":[90.00997161865235,152.52427673339845,522.0917654619217,143.4706268310547]},{"page":160,"text":"uses reconnaissance operations to make informed decisions about allocating resources to each subordinate to","rect":[90.00999450683594,164.04795837402345,522.074848651886,154.9943084716797]},{"page":160,"text":"establish civil security.","rect":[90.00997161865235,175.4521942138672,181.89196228981019,166.39854431152345]},{"page":160,"text":"6-52. BCTs conduct security operations to control borders, secure boundaries and provide freedom of","rect":[90.00997161865235,192.97178649902345,522.0926809892654,183.9181365966797]},{"page":160,"text":"movement, and to protect the main body, key personnel, and key facilities. Noncontiguous operations","rect":[90.00995635986328,204.4955291748047,522.1743667726516,195.44187927246095]},{"page":160,"text":"complicate the BCT’s ability to conduct security operations because potential threats use the civilian","rect":[90.00997161865235,216.0192108154297,522.0678296089172,206.96556091308595]},{"page":160,"text":"population as cover. BCTs employ mounted and dismounted patrols, engage with the local population, and","rect":[90.00995635986328,227.54295349121095,522.0356640815735,218.48924255371095]},{"page":160,"text":"employ aerial reconnaissance and observation posts to provide early warning, identify threats, and create","rect":[90.01000213623047,239.0666961669922,522.1196277122498,230.01304626464845]},{"page":160,"text":"opportunities. Security operations facilitate manageable transitions between stability framework phases and","rect":[90.00999450683594,250.4708709716797,522.2155346870422,241.41722106933595]},{"page":160,"text":"create dilemmas for threats that seek to undermine sustainable progress.","rect":[90.00004577636719,261.9945983886719,377.6119177341461,252.9409637451172]},{"page":160,"text":"6-53. Area security operations are essential to stability tasks because they degrade the enemy’s ability to","rect":[90.00005340576172,279.5142517089844,521.8863110542297,270.46063232421877]},{"page":160,"text":"affect friendly units, host-nation governance and security forces, key leaders, and key facilities. BCTs","rect":[90.0,291.0379333496094,522.0880630617141,281.98431396484377]},{"page":160,"text":"conduct area security operations to preserve the higher commander’s freedom of maneuver, protect key","rect":[90.0,302.5616760253906,522.128559589386,293.508056640625]},{"page":160,"text":"infrastructure and leaders, and deny threats access and opportunity to disrupt progress. BCTs establish","rect":[90.0,314.08538818359377,521.9610180854797,305.0317687988281]},{"page":160,"text":"security zones around critical infrastructure, airfields, facilities, MSRs, lines of communication, towns,","rect":[90.0,325.4895935058594,522.0897314548492,316.43597412109377]},{"page":160,"text":"equipment, and high-value assets. Combined security operations with host-nation partners enable a transition to","rect":[90.0,337.0133361816406,522.0478711128235,327.959716796875]},{"page":160,"text":"the transformation phase of the stability framework by empowering host-nation security and bolstering legitimacy.","rect":[89.99004364013672,348.53704833984377,521.8357031345367,339.4834289550781]},{"page":160,"text":"6-54. During the fostering sustainability phase of the stability framework, the host-nation government","rect":[89.9801254272461,366.05670166015627,522.1046954402924,357.0030822753906]},{"page":160,"text":"assumes responsibility for securing its borders and for internal movement control. Remaining Army units","rect":[89.98016357421875,377.5804138183594,522.0891006593704,368.52679443359377]},{"page":160,"text":"consist of advisors or, in some cases, BCTs or battalions positioned as a deterrent against external threats.","rect":[89.98016357421875,388.984619140625,521.959299325943,379.9309997558594]},{"page":160,"text":"Advisors continue to help improve host-nation capacities as part of the larger security force assistance","rect":[89.98016357421875,400.5083312988281,521.840880153656,391.4547119140625]},{"page":160,"text":"program. Potential external threats may cause military forces to conduct operations to confirm or deny","rect":[89.9801025390625,412.0320739746094,521.7837109565735,402.97845458984377]},{"page":160,"text":"threat intentions.","rect":[89.9801025390625,421.5438232421875,158.4650366306305,414.5021057128906]},{"page":160,"text":"SUPPORT TO CIVIL CONTROL","rect":[72.0,446.82000732421877,217.64179372787477,438.5160217285156]},{"page":160,"text":"6-55. Civil control centers on rule of law. Civil control provides training and support to law enforcement and","rect":[90.0,466.7814025878906,522.0659375190735,457.727783203125]},{"page":160,"text":"judicial personnel to promote efforts to rebuild host-nation judiciary and corrections systems. Units","rect":[90.0,478.30511474609377,521.9064224367141,469.24151611328127]},{"page":160,"text":"conducting reconnaissance identify critical resources, influential pillar organizations, or leaders, sources of","rect":[89.99004364013672,489.7093200683594,522.0757742509842,480.65570068359377]},{"page":160,"text":"instability, and unified action partners operating in the BCT’s area of operations to support establishing civil","rect":[89.99004364013672,501.2330322265625,522.1115924129487,492.1794128417969]},{"page":160,"text":"control. During the initial response phase, BCTs may be required to assist host-nation partners in building","rect":[89.99000549316406,512.7567749023438,522.0249829292297,503.7031555175781]},{"page":160,"text":"interim solutions to establish civil control, which builds upon host-nation governance. Security gains capacity","rect":[89.98005676269531,524.280517578125,521.9353222846985,515.2268676757813]},{"page":160,"text":"and capability transitioning to the transformation phase.","rect":[89.98008728027344,535.8042602539063,313.50736451148989,526.7506103515625]},{"page":160,"text":"6-56. Establishing security and rebuilding justice institutions develops conditions for reconciliation, public","rect":[89.98008728027344,553.3239135742188,522.0766589622498,544.2603149414063]},{"page":160,"text":"confidence, and subsequent economic growth. BCTs secure key infrastructure, identify key actors, and","rect":[89.98008728027344,564.7280883789063,522.0700879096985,555.6744384765625]},{"page":160,"text":"disrupt enemy forces. Reconnaissance tasks identify viable and working systems of government as well as","rect":[89.98008728027344,576.2517700195313,521.9842422609329,567.1981201171875]},{"page":160,"text":"gaps in civil control. Identification of government strengths and weaknesses focus efforts to collaborate with","rect":[89.98008728027344,587.7755126953125,521.9243359565735,578.7218627929688]},{"page":160,"text":"host-nation security forces and assist host-nation governance in providing viable security and services. Units","rect":[89.99004364013672,599.2992553710938,522.0239151124954,590.24560546875]},{"page":160,"text":"conducting security tasks support civil control by interdicting threat activity seeking to subvert the local rule","rect":[89.99002838134766,610.8229370117188,522.0909411888123,601.769287109375]},{"page":160,"text":"of law or legitimacy of an interim government through intimidation, corruption, or coercion.","rect":[89.99002838134766,622.2271118164063,459.6745092868805,613.1734619140625]},{"page":160,"text":"6-57. During the transformation phase of the stability framework, BCTs continue to conduct operations with","rect":[89.99002838134766,639.7467651367188,521.9294018745422,630.693115234375]},{"page":160,"text":"unified action partners with efforts focused on building partner capacity. Reconnaissance tasks support civil","rect":[89.98999786376953,651.2705078125,521.9914141902924,642.2168579101563]},{"page":160,"text":"control by identifying local population perceptions and acceptance of host-nation governance and security","rect":[89.99004364013672,662.7942504882813,522.052875995636,653.7406005859375]},{"page":160,"text":"forces, adequacy of local infrastructure security and viability, sources of corruption, indicators of progress or","rect":[89.98011016845703,674.3179321289063,522.0631399736404,665.2642822265625]},{"page":160,"text":"regression, and acceptance and adherence to the rule of law. Security tasks support civil control by providing","rect":[89.98011016845703,685.8416748046875,522.0490918159485,676.7880249023438]},{"page":160,"text":"early warning to threats on infrastructure, facilities, and leaders and assessments of host-nation capabilities.","rect":[89.98011016845703,697.2459106445313,519.9005224704742,688.1922607421875]},{"page":160,"text":"6-12","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":160,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":160,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":161,"text":"Stability","rect":[504.9599914550781,46.28102493286133,540.0807211914063,37.8480224609375]},{"page":161,"text":"6-58. BCTs transition to supporting civil control and host-nation independence during the fostering of","rect":[108.0,83.50144958496094,540.0773611650467,74.44780731201172]},{"page":161,"text":"stability phases. BCTs maintain an ability to assist host-nation forces when needed and according to the rules","rect":[107.98999786376953,95.02519226074219,540.1465347414016,85.97154998779297]},{"page":161,"text":"of engagement and status of forces agreement restrictions if applicable. Sustainable gains allow host-nation","rect":[107.99000549316406,106.42936706542969,540.0548901557922,97.37572479248047]},{"page":161,"text":"partners to conduct civil control with minimal input from the BCT.","rect":[107.98999786376953,117.93318939208985,375.919016122818,108.89946746826172]},{"page":161,"text":"RESTORE ESSENTIAL SERVICES","rect":[90.0,141.29998779296876,245.8616237640381,132.99600219726563]},{"page":161,"text":"6-59. Using stability operations to restore essential services contributes to the social well-being of the","rect":[108.0,161.2613983154297,540.1086413841248,152.20774841308595]},{"page":161,"text":"population. BCTs conduct area and zone reconnaissance to identify areas requiring assistance to repair or","rect":[107.99996185302735,172.78514099121095,540.0837698564529,163.7314910888672]},{"page":161,"text":"rebuild, identify public health hazards or outbreaks, and verify locations and dispositions of displaced","rect":[108.00995635986328,184.30882263183595,540.083881855011,175.2551727294922]},{"page":161,"text":"civilians who require aid and support but have no access to key services. BCTs identify popular perceptions","rect":[108.00994873046875,195.8325653076172,540.1584976320266,186.77891540527345]},{"page":161,"text":"of legitimacy through censuses and engagement with the local population. Route reconnaissance identifies","rect":[108.00995635986328,207.2367401123047,539.9363296632766,198.18309020996095]},{"page":161,"text":"mobility corridors to facilitate sustainment operations, humanitarian services and support to outlying or urban","rect":[108.00997161865235,218.76048278808595,540.089008808136,209.7068328857422]},{"page":161,"text":"areas, evacuation routes for noncombatant evacuation operations, and freedom of movement and maneuver.","rect":[108.00997161865235,230.26429748535157,540.1046240329742,221.23057556152345]},{"page":161,"text":"Units conducting security operations support the primary Army stability task of restoration of essential","rect":[108.01000213623047,241.8079071044922,540.0590411434174,232.75425720214845]},{"page":161,"text":"services. Units conduct area security operations independently or they partner with host-nation security forces.","rect":[108.00995635986328,253.33164978027345,539.9870703220367,244.2779998779297]},{"page":161,"text":"6-60. During the transformation phase, BCTs conduct reconnaissance operations in concert with host-nation","rect":[108.00999450683594,270.8512268066406,540.0648999214172,261.797607421875]},{"page":161,"text":"security partners to identify sources of instability adversely affecting host-nation partners to meet the needs","rect":[108.0,282.2554626464844,540.1494644289016,273.20184326171877]},{"page":161,"text":"of the populace. Security forces screen or guard infrastructure projects, provide security to outlying areas and","rect":[108.00003814697266,293.7792053222656,540.055805683136,284.7156066894531]},{"page":161,"text":"local government infrastructure, services, and leaders. Security forces also identify enemy safe havens or sources","rect":[107.99006652832031,305.3028869628906,540.1525161867141,296.249267578125]},{"page":161,"text":"of support.","rect":[107.99006652832031,316.8067321777344,150.7971441745758,307.782958984375]},{"page":161,"text":"SUPPORT TO GOVERNANCE","rect":[90.0,340.1399841308594,224.70449209213258,331.8240051269531]},{"page":161,"text":"6-61. During the initial response phase, the BCT may function as the transitional military authority to","rect":[108.0,360.10137939453127,540.058735370636,351.0477600097656]},{"page":161,"text":"establish governmental services and work with established governmental authorities, if any are present, to","rect":[108.0,371.5055847167969,540.0262036323547,362.45196533203127]},{"page":161,"text":"increase capability. BCTs conduct security operations to protect governing officials, key facilities, and","rect":[108.0,383.029296875,540.0629467964172,373.97564697265627]},{"page":161,"text":"eventually, polling locations.","rect":[108.0,394.5530090332031,224.12464356422425,385.4993896484375]},{"page":161,"text":"6-62. During the transformation phase, the BCT begins to transition its responsibility for governance to","rect":[107.99004364013672,412.0726623535156,540.1823315620422,403.01904296875]},{"page":161,"text":"civilian authority. In some cases, authority transfers to host-nation representatives that may or may not be the","rect":[108.00001525878906,423.59637451171877,539.9862048606873,414.5427551269531]},{"page":161,"text":"same host-nation government before the operation. As host-nation institutions develop, the BCT continues","rect":[108.00003814697266,435.1200866699219,539.8954971437454,426.06646728515627]},{"page":161,"text":"to collect information indicating good governance through advising, assisting, and supporting host-nation","rect":[107.99008178710938,446.5242919921875,540.0439038276672,437.4706726074219]},{"page":161,"text":"partners as well as identifying sources of instability and corruption that seek to disrupt or degrade effective","rect":[107.99008178710938,458.0480041503906,540.0809314231873,448.994384765625]},{"page":161,"text":"governance. BCTs conduct reconnaissance operations to identify effective and ineffective governing bodies,","rect":[107.99008178710938,469.5717468261719,540.0781347751617,460.51812744140627]},{"page":161,"text":"to identify locations for potential polling and elections, and to maintain freedom of movement and maneuver.","rect":[107.99008178710938,481.095458984375,540.0949804782867,472.0418395996094]},{"page":161,"text":"BCTs conduct security operations to protect governing officials, key facilities, and polling locations. BCTs","rect":[107.99008178710938,492.6191711425781,539.9064224367141,483.5655517578125]},{"page":161,"text":"conduct guard missions to protect polling boxes and election officials during the transformation phase to","rect":[107.99008178710938,504.14288330078127,540.0419507026672,495.0892639160156]},{"page":161,"text":"prevent enemy disruption on the civilian population.","rect":[107.98005676269531,515.547119140625,317.82825684547427,506.49346923828127]},{"page":161,"text":"6-63. BCTs eventually transfer governance to host-nation authorities and authority for governance reducing","rect":[107.98005676269531,533.0667724609375,540.0378613471985,524.0131225585938]},{"page":161,"text":"BCTs’ involvement with established governments and transition partnerships to State or other government","rect":[107.98003387451172,544.5905151367188,540.1015826473237,535.536865234375]},{"page":161,"text":"agencies. Reconnaissance and security operations transfer to appropriate host-nation security forces though","rect":[107.98003387451172,556.1141967773438,540.031879901886,547.060546875]},{"page":161,"text":"BCTs continue to monitor governance developments and identify concerns to host-nation authorities and","rect":[107.98003387451172,567.6378784179688,540.0249218940735,558.584228515625]},{"page":161,"text":"U.S. chains of command.","rect":[107.98005676269531,577.1696166992188,209.23340821266175,570.1079711914063]},{"page":161,"text":"SUPPORT TO ECONOMIC AND INFRASTRUCTURE DEVELOPMENT","rect":[90.0,604.4105834960938,534.0346628847123,594.6949462890625]},{"page":161,"text":"6-64. BCTs identify infrastructure damage early in the stability framework’s initial response phase so","rect":[108.0,624.5814208984375,540.063129901886,615.5277709960938]},{"page":161,"text":"commanders have the information they need as they conduct area assessments. While airborne and space","rect":[108.0,636.1051635742188,540.1027209739685,627.051513671875]},{"page":161,"text":"platforms may provide imagery of damaged infrastructure, ground-based reconnaissance operations clarify","rect":[108.0,647.6288452148438,540.067768573761,638.5751953125]},{"page":161,"text":"the scope of the problem. BCTs assess the local impact and feelings of people in the area to make","rect":[107.99996185302735,659.152587890625,540.1135241966248,650.0989379882813]},{"page":161,"text":"recommendations to higher headquarters on the importance of repair and development when multiple pieces","rect":[107.99996185302735,670.6763305664063,540.0578506593704,661.6226806640625]},{"page":161,"text":"of infrastructure need attention. Cavalry units must consider cultural aspects when conducting reconnaissance","rect":[107.98995208740235,682.2000122070313,539.993223903656,673.1463623046875]},{"page":161,"text":"and shaping the environment regarding key infrastructure.","rect":[107.98995208740235,693.6041870117188,340.5290319919586,684.550537109375]},{"page":161,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":161,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":161,"text":"6-13","rect":[521.9999389648438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":162,"text":"Chapter 6","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":162,"text":"INITIAL RESPONSE PHASE","rect":[72.0,83.30223083496094,200.36228322982789,75.21603393554688]},{"page":162,"text":"6-65. The protection of natural resources and the environment may become tasks for the BCT during the","rect":[90.0,103.30143737792969,522.1837146263123,94.24779510498047]},{"page":162,"text":"initial response phase. In Iraq the willful burning of oil wells, damage to the oil pipeline infrastructure and","rect":[90.0,114.82518005371094,522.032856464386,105.77147674560547]},{"page":162,"text":"the deliberate leaking of oil into the Persian Gulf are examples of incidents during the initial response phase.","rect":[90.0,126.22935485839844,522.0946753025055,117.17571258544922]},{"page":162,"text":"These incidents resulted in ground forces conducting reconnaissance and security missions over large areas","rect":[90.00003814697266,137.7530975341797,522.1476944093704,128.69944763183595]},{"page":162,"text":"to deter further incidents. The long-term macroeconomic recovery and development of a nation can depend","rect":[90.00003814697266,149.2767791748047,522.054829120636,140.22312927246095]},{"page":162,"text":"on a small number of critical pieces of infrastructure.","rect":[90.00003814697266,160.7805938720703,302.5126745700836,151.7468719482422]},{"page":162,"text":"TRANSFORMATION PHASE","rect":[72.0,184.1022186279297,201.56229543685914,176.01602172851563]},{"page":162,"text":"6-66. Multiple external specialist agencies participate in this task during the transformation phase. The","rect":[90.0,204.10142517089845,522.122618434906,195.0477752685547]},{"page":162,"text":"transformation phase aims to establish the foundation for sustainable economic development and begin to","rect":[90.00001525878906,215.6251678466797,522.054829120636,206.57151794433595]},{"page":162,"text":"transition control of economic growth to U.S. Government civil agencies, international civil agencies, and","rect":[90.00003814697266,227.0293426513672,522.069965839386,217.97569274902345]},{"page":162,"text":"host-nation economic officials and entrepreneurs. BCTs’ balance of effort switches to security missions to","rect":[89.99010467529297,238.55308532714845,522.0284008979797,229.4994354248047]},{"page":162,"text":"support specialists who do the detailed work to facilitate economic and infrastructure development. Cavalry","rect":[89.9801025390625,250.07676696777345,521.9184765815735,241.0231170654297]},{"page":162,"text":"units’ probable mission sets include—","rect":[89.98999786376953,261.5805969238281,243.34415531158448,252.54685974121095]},{"page":162,"text":" Screen or guard critical infrastructure.","rect":[115.19999694824219,275.0213928222656,285.8300268650055,265.9677734375]},{"page":162,"text":" Screening of a border area to prevent external actors adversely affecting economic development.","rect":[115.19999694824219,288.4613952636719,519.5692846775055,279.40777587890627]},{"page":162,"text":" Conductingzone or area reconnaissance with a reconnaissance focus on socialandeconomic indicators.","rect":[115.19999694824219,302.0213928222656,521.9686987400055,292.9677734375]},{"page":162,"text":" Route security so economic activity can take place in a safe and secure environment.","rect":[115.19999694824219,315.4613952636719,472.075021982193,306.40777587890627]},{"page":162,"text":"6-67. During the transformation phase, there may be an opportunity to expand the area of interest. Cavalry","rect":[90.00346374511719,333.1005554199219,521.9507031440735,324.04693603515627]},{"page":162,"text":"units continue to report infrastructure issues and economic activity in existing and new areas of operations.","rect":[90.00346374511719,344.624267578125,517.766916513443,335.5706481933594]},{"page":162,"text":"FOSTERING SUSTAINABILITY PHASE","rect":[72.0,367.8600158691406,250.04189443588258,359.5560302734375]},{"page":162,"text":"6-68. In the fostering sustainability phase, the goal is to institutionalize a long-term sustainable economic","rect":[90.0,387.8214111328125,522.0797107200623,378.7677917480469]},{"page":162,"text":"development program and to transition control of the economy to host-nation officials, entrepreneurs, and","rect":[89.99004364013672,399.3451232910156,522.0598340034485,390.29150390625]},{"page":162,"text":"civil society. This phase includes follow-on steps, which develop and reinforce the successes of the initial","rect":[89.99002838134766,410.8688659667969,521.9803057918549,401.81512451171877]},{"page":162,"text":"response and transformation phase. Steps taken during this phase support sustainable economic growth based","rect":[89.9801025390625,422.392578125,522.0501294136047,413.3389587402344]},{"page":162,"text":"on healthy communities and neighborhoods supporting a healthy society.","rect":[89.9800796508789,433.9162902832031,382.5052282810211,424.8626708984375]},{"page":162,"text":"CONDUCT SECURITY COOPERATION","rect":[72.0,457.260009765625,250.44012546539308,448.9560241699219]},{"page":162,"text":"6-69. Security cooperation is Department of Defense interactions with foreign security establishments to","rect":[90.0,477.10137939453127,521.8965649604797,468.0477600097656]},{"page":162,"text":"build relationships that promote specific United States security interests, develop allied and partner military","rect":[90.00000762939453,488.6250915527344,521.9076733589172,479.57147216796877]},{"page":162,"text":"and security capabilities for self-defense and multinational operations, and provide United States forces with","rect":[90.00000762939453,500.1488342285156,522.0439648628235,491.09521484375]},{"page":162,"text":"peacetime and contingency access to allies and partners (JP 3-20). The U.S. military’s security cooperation","rect":[90.0,511.67254638671877,522.0378613471985,502.6189270019531]},{"page":162,"text":"organization often coordinates security cooperation in a country.","rect":[89.99004364013672,523.1962890625,348.4420874118805,514.1426391601563]},{"page":162,"text":"6-14","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":162,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":162,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":163,"text":"Chapter 7","rect":[287.2799987792969,129.67201232910157,342.672,118.5840072631836]},{"page":163,"text":"Sustainment","rect":[267.0,151.0315399169922,362.9148387041092,139.04559326171876]},{"page":163,"text":"Sustainment units synchronize and execute sustainment operations to support units","rect":[126.0,188.85357666015626,504.09131291484837,178.81822204589845]},{"page":163,"text":"conducting reconnaissance, security, and stability operations under all conditions.","rect":[126.0000228881836,201.4501953125,504.10896849632266,191.4148406982422]},{"page":163,"text":"Cavalry squadrons frequently operate in locations distant from their organic sustaining","rect":[125.98896789550781,214.046875,504.064799785614,204.0115203857422]},{"page":163,"text":"base. These Cavalry squadrons carry a configured load or are task organized with assets","rect":[125.98896789550781,226.76495361328126,504.21936467266087,216.72959899902345]},{"page":163,"text":"to ensure their sustainment until another unit can relieve them. Generally, units","rect":[125.9889907836914,239.361572265625,504.08801701641087,229.3262176513672]},{"page":163,"text":"conducting reconnaissance and security operations have self-sustainment capability for","rect":[125.9889907836914,251.95819091796876,504.1002091474533,241.92283630371095]},{"page":163,"text":"up to 72 hours. Units conducting reconnaissance and security operations and","rect":[125.9889907836914,264.67626953125,504.1056628227234,254.6409149169922]},{"page":163,"text":"sustainment staffs must anticipate future sustainment needs. An accurate estimate","rect":[125.98896789550781,277.2508850097656,504.0946005592346,267.2375793457031]},{"page":163,"text":"allows forces to retain freedom of movement and action along the entire width and","rect":[125.98896789550781,289.9909973144531,504.1210436820984,279.95562744140627]},{"page":163,"text":"depth of extended and contested lines of operation.","rect":[125.97792053222656,302.5655822753906,350.37804198265078,292.5522766113281]},{"page":163,"text":"SECTION I – OVERVIEW","rect":[99.36000061035156,326.54400634765627,237.4080018310547,317.66400146484377]},{"page":163,"text":"7-1. Sustainment is the provision of logistics, financial management, personnel services, and health service","rect":[108.0,350.0213928222656,540.0018908958435,340.9677734375]},{"page":163,"text":"support necessary to maintain operations until successful mission completion (ADP 4-0). The purpose of the","rect":[108.0,361.42559814453127,540.1962878684998,352.3719787597656]},{"page":163,"text":"Army’s logistics system is to sustain combat power on a continuous basis as far forward as possible.","rect":[107.97013854980469,372.9493103027344,540.088937997818,363.89569091796877]},{"page":163,"text":"Sustainment principles and fundamentals, as well as roles and responsibilities, remain the same for all types","rect":[107.97013854980469,384.4730224609375,540.0140274171829,375.4194030761719]},{"page":163,"text":"of operations at the BCT-level and below. (Refer to ADP 4-0 for sustainment principles and fundamentals.)","rect":[107.9801254272461,395.97686767578127,540.0458670244217,386.9431457519531]},{"page":163,"text":"Successful sustainment planning and execution to support reconnaissance and security operations at the BCT","rect":[107.97015380859375,407.5204772949219,539.8238412733078,398.46685791015627]},{"page":163,"text":"level and below provides commanders with the flexibility required to develop the situation in close contact","rect":[107.97017669677735,418.9246826171875,539.9606524715424,409.8710632324219]},{"page":163,"text":"with enemy forces and civilian populations.","rect":[107.9801025390625,430.4483947753906,283.03101563453677,421.394775390625]},{"page":163,"text":"7-2. Reconnaissance and security operations executed at the BCT level involve fast-paced, wide-ranging","rect":[107.9800796508789,447.9680480957031,540.037006855011,438.9144287109375]},{"page":163,"text":"operations requiring a rapid transition from one mission to another. Such operations involve extended lines","rect":[107.9801025390625,459.49176025390627,540.1217544679641,450.4381408691406]},{"page":163,"text":"of support, higher consumption rates, and present unique challenges to the BCT sustainment units’ ability to","rect":[107.98007202148438,471.0154724121094,539.9133496284485,461.96185302734377]},{"page":163,"text":"support and sustain reconnaissance and security operations. Based on the nature of their missions, BCT","rect":[107.98001861572266,482.5391845703125,539.8514901990891,473.4855651855469]},{"page":163,"text":"sustainment units may require EAB support and other nonorganic assets to support reconnaissance and","rect":[107.97999572753906,493.9433898925781,540.0588574409485,484.8897705078125]},{"page":163,"text":"security operations.","rect":[107.97999572753906,505.46710205078127,186.31551575660706,496.4134826660156]},{"page":163,"text":"7-3. In most cases, a BSB’s FSC is in direct support of a squadron-sized unit conducting reconnaissance","rect":[107.98999786376953,522.9867553710938,539.9788806419373,513.93310546875]},{"page":163,"text":"and security operations. Smaller reconnaissance organizations may have task-organized forward logistics","rect":[107.98999786376953,534.510498046875,540.0060318117141,525.4568481445313]},{"page":163,"text":"elements (FLEs) in a direct, support sustainment role. A BCT conducting a cover operation has an organic","rect":[107.98008728027344,546.0342407226563,540.0758044700623,536.9805908203125]},{"page":163,"text":"BSB but may require augmentation from the division sustainment. The key to reconnaissance and security","rect":[107.98008728027344,557.5579223632813,540.1774487495422,548.5042724609375]},{"page":163,"text":"operations is a fully planned, war-gamed, and rehearsed support concept.","rect":[107.98011016845703,568.962158203125,400.26624512672427,559.9085083007813]},{"page":163,"text":"SECTION II – PLANNING","rect":[99.36000061035156,592.823974609375,238.65600732421877,583.9439697265625]},{"page":163,"text":"7-4.","rect":[108.0,614.2894897460938,123.92603516578675,607.4270629882813]},{"page":163,"text":"Reconnaissance and security operations present unique challenges to sustainment staff planners.","rect":[133.1988067626953,616.3014526367188,540.0877783298492,607.247802734375]},{"page":163,"text":"Planners need to consider many factors as they develop their support concepts. Challenges include the terrain","rect":[107.99006652832031,627.7056274414063,540.0747265815735,618.6519775390625]},{"page":163,"text":"and enemy ","rect":[107.99006652832031,639.2293090820313,158.3617651462555,630.1756591796875]},{"page":163,"text":"situation, ","rect":[162.71429443359376,638.0,202.16385865211488,630.1756591796875]},{"page":163,"text":"friendly situation, type of ","rect":[206.39385986328126,639.2293090820313,323.36707520484927,630.1756591796875]},{"page":163,"text":"reconnaissance ","rect":[327.7196044921875,638.0,390.5702612400055,630.1756591796875]},{"page":163,"text":"and security operation, ","rect":[394.92279052734377,639.2293090820313,497.37452149391177,630.1756591796875]},{"page":163,"text":"levels","rect":[501.72698974609377,638.0,525.0251968507766,630.1756591796875]},{"page":163,"text":"of","rect":[531.7183837890625,637.2173461914063,540.0747976884842,630.1856079101563]},{"page":163,"text":"aggressiveness and pace, and duration of the operation. Planners consider the positioning of sustainment","rect":[108.0,650.7530517578125,540.1165972957612,641.6994018554688]},{"page":163,"text":"assets based on known friendly and predicted enemy actions, distances, and on-order requirements.","rect":[108.0,662.2767944335938,504.93192505836489,653.22314453125]},{"page":163,"text":"7-5. Sustainment plans for reconnaissance and security operations vary greatly according to the maneuver","rect":[108.00003814697266,679.7964477539063,540.0687552080154,670.7427978515625]},{"page":163,"text":"commander’s guidance for the tempo of the operation. For instance, stealthy reconnaissance operations may","rect":[108.00001525878906,691.2006225585938,540.0757641792297,682.14697265625]},{"page":163,"text":"require a majority of pre-positioned stocks and the reliance on covered or concealed resupply routes to remain","rect":[107.99008178710938,702.724365234375,540.058979511261,693.6607666015625]},{"page":163,"text":"undetected. However, forceful reconnaissance operations where detection is not a concern may facilitate","rect":[107.98011016845703,714.248046875,539.9423816184998,705.1943969726563]},{"page":163,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":163,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":163,"text":"7-1","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":164,"text":"Chapter 7","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":164,"text":"routine sustainment operations, such as LOGPACs, on any trafficable route at any hour of the day.","rect":[90.0,83.50144958496094,522.0946753025055,74.44780731201172]},{"page":164,"text":"Sustainment planners should conduct frequent coordination with adjacent units. LOGPACs may be required","rect":[90.00003814697266,95.02519226074219,522.0608716011047,85.96158599853516]},{"page":164,"text":"to pass forward and rearward through other units’ areas of operations and passage lanes beyond the squadron","rect":[90.00003814697266,106.42936706542969,522.053852558136,97.37572479248047]},{"page":164,"text":"rear boundary. Often, adjacent unit sustainment assets may be closer to units performing reconnaissance and","rect":[90.0,117.95310974121094,522.066059589386,108.8895034790039]},{"page":164,"text":"security that can best conduct recovery, evacuation, and emergency resupply.","rect":[90.0,129.47679138183595,399.44434571266177,120.42314910888672]},{"page":164,"text":"7-6. Sustainment planners for reconnaissance and security operations must be aware of the enemy situation","rect":[90.0,146.99644470214845,522.0617871284485,137.9427947998047]},{"page":164,"text":"and threat level as units conduct these missions forward of friendly lines. High-payoff targets to enemy forces","rect":[90.0,158.5201873779297,522.1733291749954,149.46653747558595]},{"page":164,"text":"include sustainment vehicles, equipment, and support areas (such as fuel tankers, billets, and FARPs,","rect":[90.0,170.02394104003907,521.8656103610992,160.99021911621095]},{"page":164,"text":"respectively). Planners should consider intervisibility lines, covered and concealed positions for support","rect":[90.01990509033203,181.44810485839845,522.1764117488862,172.3944549560547]},{"page":164,"text":"areas, and covered and concealed routes for logistic package operations.","rect":[90.01992797851563,192.97178649902345,378.58008790016177,183.9181365966797]},{"page":164,"text":"7-7. The lead sustainment planner in a maneuver battalion or Cavalry squadron is the S-4 assisted by the","rect":[90.00997161865235,210.49143981933595,522.1007068138123,201.4377899169922]},{"page":164,"text":"battalion or brigade personnel staff officer (S-1), a medical planner, and the BSB FSC commander.","rect":[90.00007629394531,222.0151824951172,521.9652807712555,212.96153259277345]},{"page":164,"text":"Representatives from these elements form the sustainment-planning cell ensuring integrated sustainment","rect":[89.99011993408203,233.5388641357422,521.9981280574799,224.48521423339845]},{"page":164,"text":"plans in all operational planning. The S-1 may have a representative at or near the aid station to monitor","rect":[89.99011993408203,245.06260681152345,522.0321341142654,236.0089569091797]},{"page":164,"text":"casualty operations. For reconnaissance and security missions above the battalion level, the majority of","rect":[89.99011993408203,256.4667663574219,522.1089163408279,247.40318298339845]},{"page":164,"text":"sustainment planning occurs in the brigade S-4 in close coordination with the BSB supportoperations section","rect":[89.99011993408203,267.9905090332031,522.0519604682922,258.9368896484375]},{"page":164,"text":"and FSC commanders.","rect":[89.99015808105469,277.5122375488281,180.9269506931305,270.4605712890625]},{"page":164,"text":"PLANNING FUNDAMENTALS AND PROCEDURES","rect":[72.0,304.7705993652344,402.37258519363408,295.0408630371094]},{"page":164,"text":"7-8. Planners integrate sustainment planning into all operational planning and synchronize the concept of","rect":[90.0,325.0614013671875,522.1673880205154,316.0077819824219]},{"page":164,"text":"sustainment support with other areas of the operations concept. Planning is continuous and concurrent with","rect":[90.0,336.5851135253906,522.0487866401672,327.531494140625]},{"page":164,"text":"ongoing support execution. BCT sustainment personnel (such as the S-4, S-1, surgeon, and FSC commander)","rect":[90.00001525878906,348.1088562011719,522.0917654619217,339.05523681640627]},{"page":164,"text":"actively participate in the unit’s maneuver planning process, including course of action development and","rect":[90.00007629394531,359.5130310058594,522.050922870636,350.45941162109377]},{"page":164,"text":"war-gaming. The goal is to ensure support during all phases of an operation.","rect":[89.99011993408203,371.0367736816406,394.9922888278961,361.983154296875]},{"page":164,"text":"7-9. To provide effective support, sustainment planners and operators understand the mission statement,","rect":[89.99011993408203,388.5364990234375,522.0382177829742,379.5027770996094]},{"page":164,"text":"commander’s intent, and concept of operations. The S-4, with input from the FSC and headquarters and","rect":[89.99012756347656,400.0602111816406,522.0588574409485,391.0264892578125]},{"page":164,"text":"headquarters troop commanders, the medical service officer, and the squadron executive officer handles","rect":[89.98016357421875,411.5839538574219,522.1316421632766,402.55023193359377]},{"page":164,"text":"production of paragraph 4 (Sustainment) of the OPORD, which includes the following:","rect":[89.9802017211914,423.1275329589844,438.94676697349549,414.07391357421877]},{"page":164,"text":" Commander’s reconnaissance and security sustainment priorities.","rect":[115.19999694824219,436.5413818359375,395.24759888648989,427.4877624511719]},{"page":164,"text":" Sustainment overlay.","rect":[115.19999694824219,449.98138427734377,217.768381357193,440.9277648925781]},{"page":164,"text":" Supply routes.","rect":[115.19999694824219,463.5413818359375,191.00882935523988,454.4877624511719]},{"page":164,"text":" Logistics release points.","rect":[115.19999694824219,476.98138427734377,229.52514100074769,467.9277648925781]},{"page":164,"text":" CASEVAC points.","rect":[115.19999694824219,490.521484375,209.25156617164613,481.4877624511719]},{"page":164,"text":" Maintenance collection points.","rect":[115.19999694824219,503.96148681640627,256.18702149391177,494.9277648925781]},{"page":164,"text":" Class III and class V resupply during the mission if necessary.","rect":[115.19999694824219,517.5414428710938,382.292551279068,508.48779296875]},{"page":164,"text":" Movement criteria and triggers for logistics nodes.","rect":[115.19999694824219,530.9813842773438,335.726633310318,521.927734375]},{"page":164,"text":"7-10. To predict support requirements, sustainment planners determine the following:","rect":[89.99349975585938,548.5010375976563,434.4102984676361,539.4473876953125]},{"page":164,"text":" Type of support required.","rect":[115.19999694824219,561.94140625,235.52903199195863,552.8877563476563]},{"page":164,"text":" Quantities of support required.","rect":[115.19999694824219,575.4814453125,256.04859375953677,566.44775390625]},{"page":164,"text":" Priority of support by type and unit.","rect":[115.19999694824219,588.94140625,276.9277136325836,579.8877563476563]},{"page":164,"text":"7-11.","rect":[90.00347137451172,604.568603515625,110.96927094459534,597.7061767578125]},{"page":164,"text":"After determining the support requirements, sustainment planners assess—","rect":[115.2022705078125,606.58056640625,415.087929725647,597.5269165039063]},{"page":164,"text":" Sustainment resources available (organic and supporting).","rect":[115.19999694824219,620.0214233398438,365.48816895484927,610.9677734375]},{"page":164,"text":" Status of the sustainment resources (location, maintenance, and personnel status).","rect":[115.19999694824219,633.4414672851563,459.207834482193,624.4077758789063]},{"page":164,"text":" Time sustainment resources are available to the unit.","rect":[115.19999694824219,645.0094604492188,343.7653601169586,637.9677734375]},{"page":164,"text":" Configuration of resources and methods of distribution available.","rect":[115.19999694824219,660.46142578125,394.28748536109927,651.4077758789063]},{"page":164,"text":"7-12. Based on facts and assumptions, planners develop the sustainment estimate for the operation. The","rect":[90.00347137451172,677.9610595703125,522.1031482200623,668.9273681640625]},{"page":164,"text":"sustainment estimate is the formal, detailed analysis of the sustainment that supports an operation. During","rect":[90.00349426269531,689.5047607421875,522.0603222846985,680.4511108398438]},{"page":164,"text":"execution, planners use a running estimate to provide information to the commander.","rect":[90.00349426269531,701.0285034179688,430.292795419693,691.974853515625]},{"page":164,"text":"7-2","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":164,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":164,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":165,"text":"Sustainment","rect":[486.0,44.508026123046878,540.1160795898437,37.7490234375]},{"page":165,"text":"7-13. To facilitate rapid planning, Force XXI Battle Command, brigade and below provides sustainment","rect":[108.0,83.50144958496094,539.9930621395112,74.44780731201172]},{"page":165,"text":"planners with reports to assist in planning. Supplemented by their actual operational experience, sustainment","rect":[107.99004364013672,95.02519226074219,540.0290118465424,85.97154998779297]},{"page":165,"text":"planners take advantage of—","rect":[107.99004364013672,106.42936706542969,224.99016666412354,97.37572479248047]},{"page":165,"text":" Running estimates, status charts, and automatic estimation tools.","rect":[133.1999969482422,119.86137390136719,409.51563477516177,110.80773162841797]},{"page":165,"text":" Updated status reports when the commander issues a WARNORD.","rect":[133.1999969482422,133.4014434814453,419.1340124607086,124.36772918701172]},{"page":165,"text":" Established planning factors, historical data, and data tailored for their unit.","rect":[133.1999969482422,146.8613739013672,453.08756470680239,137.80772399902345]},{"page":165,"text":" Procedures and organizations specified in the SOPs.","rect":[133.1999969482422,160.42137145996095,359.7325232028961,151.3677215576172]},{"page":165,"text":"LOGISTICS","rect":[90.0,185.73056030273438,167.18209447097778,176.00083923339845]},{"page":165,"text":"7-14. Logistics consist of supply, field services, maintenance, transportation, operational contract support,","rect":[108.0,206.0214080810547,540.0649511814117,196.96775817871095]},{"page":165,"text":"general engineering support, and distribution. Supply operations consider all classes of supply. For units","rect":[108.0,217.54515075683595,540.1355484132766,208.4915008544922]},{"page":165,"text":"conducting reconnaissance and security operations, usually classes III (B) (petroleum, oil, and lubricants","rect":[107.98005676269531,229.06883239746095,540.1046035890579,220.0151824951172]},{"page":165,"text":"[bulk]), IV (construction materials), V, VIII (medical), and IX are priority items for replenishment.","rect":[107.95018768310547,240.5925750732422,503.8890173435211,231.53892517089845]},{"page":165,"text":"7-15. The BCT will limit or suspend most field services during reconnaissance and security operations. Field","rect":[107.93025970458985,258.1122131347656,539.9950757026672,249.05857849121095]},{"page":165,"text":"services are those essential services for enhancing the quality of life of Soldiers. They include clothing repair","rect":[107.94023132324219,269.6358947753906,540.0270681962967,260.582275390625]},{"page":165,"text":"and exchange, laundry and shower support, mortuary affairs, aerial delivery, and field feeding. The only field","rect":[107.94023132324219,281.0401306152344,539.9970288276672,271.98651123046877]},{"page":165,"text":"service provided to maneuver units during reconnaissance and security operations is field feeding. The FSC","rect":[107.94023132324219,292.5638122558594,540.0877169981003,283.51019287109377]},{"page":165,"text":"provides field-feeding support. Logistics organizations at EAB coordinate and provide all other field services.","rect":[107.92024993896485,304.0875549316406,540.0050146579742,295.033935546875]},{"page":165,"text":"7-16. Maintenance is all actions taken to retain material in a serviceable condition or to restore it to","rect":[107.92029571533203,319.5953063964844,539.9973340034485,312.5535888671875]},{"page":165,"text":"serviceability. The Army utilizes a tiered, two-level maintenance system composed of field and sustainment","rect":[107.92031860351563,333.13092041015627,540.0778399715424,324.0773010253906]},{"page":165,"text":"maintenance. Field maintenance is on system maintenance, repair, and return to the user including","rect":[107.92032623291016,344.6546325683594,539.9641308784485,335.60101318359377]},{"page":165,"text":"maintenance actions performed by operators (FM 4-30). Mechanics and technicians organic to the BSB FSC","rect":[107.92030334472656,356.0588073730469,539.9583224668503,347.00518798828127]},{"page":165,"text":"maintenance platoon and the BSB field maintenance company perform field maintenance, and at times, from","rect":[107.910400390625,367.5825500488281,539.9712311038971,358.5289306640625]},{"page":165,"text":"EAB. The unit maintenance officer and FSC, perform maintenance management including determining and","rect":[107.9004135131836,379.1062927246094,539.9453320503235,370.05267333984377]},{"page":165,"text":"utilizing battle damage assessment and repair, evacuation, and controlled exchange. (Refer to ATP 4-33 for","rect":[107.89044189453125,390.6299743652344,539.9582205400467,381.57635498046877]},{"page":165,"text":"more information.) Battle damage assessment and repair occurs at the point of fault or at the maintenance","rect":[107.8804702758789,402.1537170410156,539.9511706809998,393.10009765625]},{"page":165,"text":"collection point. Battle damage assessment and repair properly applied at the point of fault may immediately","rect":[107.8804702758789,413.5578918457031,539.958149433136,404.5042724609375]},{"page":165,"text":"return the equipment to a mission-capable status or prolong its functional life, which may be critical to","rect":[107.8804702758789,425.0816345214844,539.8197827339172,416.02801513671877]},{"page":165,"text":"maintaining combat power during reconnaissance and security operations. (Refer to ATP 4-31 for more","rect":[107.8804702758789,436.6053466796875,539.9901111106873,427.5517272949219]},{"page":165,"text":"information.) Maintenance planners recognize that an information requirement regarding the decision to","rect":[107.88050842285156,448.1290588378906,539.9713940620422,439.075439453125]},{"page":165,"text":"echelon the combat trains forward is influenced by the amount of activity in the maintenance collection point.","rect":[107.88050842285156,459.65277099609377,539.9652197360992,450.5991516113281]},{"page":165,"text":"The maintenance collection point should maintain mobility so that it may support the reconnaissance or","rect":[107.87059020996094,471.1764831542969,539.9644461259842,462.12286376953127]},{"page":165,"text":"security mission at extended ranges.","rect":[107.87059020996094,482.5806884765625,252.55846619606019,473.5270690917969]},{"page":165,"text":"7-17. Transportation support for units conducting reconnaissance and security operations is coordinated","rect":[107.87059020996094,500.100341796875,539.9314160346985,491.0467224121094]},{"page":165,"text":"through the unit S-4 and FSC to the BSB support operations officer. Many transportation requirements exceed","rect":[107.87059020996094,511.6240539550781,539.9533276557922,502.5704345703125]},{"page":165,"text":"organic assets and require support from EAB transportation units.","rect":[107.86063385009766,523.1477661132813,370.86939454078677,514.0941162109375]},{"page":165,"text":"7-18. Operational contract support occurs during all phases of operations and has increased emphasis during","rect":[107.86063385009766,540.6674194335938,539.9296460151672,531.61376953125]},{"page":165,"text":"stability operations and area security missions. Trained and ready contracting officer representatives,","rect":[107.86064147949219,552.1912231445313,539.8457129001617,543.1375732421875]},{"page":165,"text":"field-ordering officers, and paying agents are a necessity to most units. These personnel are part of a larger","rect":[107.86063385009766,563.5953979492188,539.9106741533279,554.541748046875]},{"page":165,"text":"acquisition team at higher echelons, which include the contract and financial management experts who","rect":[107.85066986083985,575.119140625,539.9644360542297,566.0654907226563]},{"page":165,"text":"provide guidance and direction to each field ordering officer and paying agent to meet the unit’s needs.","rect":[107.85066223144531,586.6428833007813,520.2514746189117,577.5892333984375]},{"page":165,"text":"7-19. The S-4 coordinates general engineering support through the BCT S-3. Engineering support includes","rect":[107.84072875976563,604.1625366210938,539.9802139406204,595.10888671875]},{"page":165,"text":"engineering capabilities and activities excluding combat engineering that modifies, maintain, or protect the","rect":[107.83075714111328,615.6862182617188,539.9184558372498,606.632568359375]},{"page":165,"text":"physical environment. Examples include facility construction, repair, maintenance, and operation.","rect":[107.83073425292969,627.0903930664063,499.59742188453677,618.0367431640625]},{"page":165,"text":"7-20. Logistics distribution to units conducting reconnaissance and security operations is either routine or","rect":[107.83073425292969,644.6100463867188,539.8965139970779,635.556396484375]},{"page":165,"text":"emergency. Whenever possible, units conduct routine resupply daily based on METT-TC (I) utilizing either","rect":[107.83073425292969,656.1337890625,539.8905325517654,647.0801391601563]},{"page":165,"text":"throughput, logistics release point, or supply point distribution methods.","rect":[107.82073974609375,667.6575317382813,396.5142614841461,658.6038818359375]},{"page":165,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":165,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":165,"text":"7-3","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":166,"text":"Chapter 7","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":166,"text":"ROUTINE RESUPPLY","rect":[72.0,83.30223083496094,172.332688331604,75.21603393554688]},{"page":166,"text":"7-21. Routine resupply is operations that are planned based on projected or actual consumption rates received","rect":[90.0,103.30143737792969,522.0968823432922,94.23783111572266]},{"page":166,"text":"through reporting. Routine resupply includes LOGPAC operations, aerial delivery, and operational","rect":[90.0,114.82518005371094,522.0019732723237,105.77153778076172]},{"page":166,"text":"contract support.","rect":[89.99002838134766,126.20943450927735,159.0825445652008,118.17171478271485]},{"page":166,"text":"Logistics Package Operations","rect":[72.0,150.8135986328125,210.81253483867645,140.9548797607422]},{"page":166,"text":"7-22. The logistic package is a centrally organized resupply convoy originating from field trains. The field","rect":[90.0,168.46141052246095,522.1723828315735,159.4077606201172]},{"page":166,"text":"trains transport the supplies needed to sustain a unit for a specific time, until the next scheduled LOGPAC.","rect":[89.99008178710938,179.96522521972657,516.6764013767242,170.93150329589845]},{"page":166,"text":"7-23. Logistics planners utilize anticipation to standardize push packages as much as possible to provide all","rect":[89.98999786376953,197.38523864746095,522.1150714168549,188.3315887451172]},{"page":166,"text":"units with sufficient quantities. Accurate logistics reporting, along with the commander’s guidance and","rect":[89.98999786376953,208.9089813232422,522.0717358589172,199.85533142089845]},{"page":166,"text":"priorities, allows logistics planners to forecast supply requirements quickly. Inaccurate, incomplete, or","rect":[90.0,220.4326629638672,522.0747976884842,211.37901306152345]},{"page":166,"text":"untimely logistics status and situation reporting can severely handicap efforts to balance unit requirements","rect":[90.0,231.95640563964845,522.0100601320266,222.9027557373047]},{"page":166,"text":"and available supplies. This reduces the amount of time a unit can continue conducting reconnaissance and","rect":[89.99999237060547,243.4801483154297,522.0391430854797,234.42649841308595]},{"page":166,"text":"security operations. Planners must also consider the likely increased width and depth at which reconnaissance","rect":[89.99999237060547,254.8843231201172,522.1218249778748,245.83067321777345]},{"page":166,"text":"and security operations occur, as this can drastically affect consumption rates and LOGPAC operational timelines.","rect":[89.99999237060547,266.4080505371094,516.589914560318,257.35443115234377]},{"page":166,"text":"Aerial Delivery","rect":[72.0,290.9736022949219,143.8946795463562,281.1148986816406]},{"page":166,"text":"7-24. Units can use aerial delivery, which is an essential sustainment operation, to support reconnaissance","rect":[90.0,308.62139892578127,522.1026599388123,299.5677795410156]},{"page":166,"text":"and security missions. Aerial delivery operations reduce the risks associated with conducting ground","rect":[89.99008178710938,320.0256042480469,522.049946308136,310.97198486328127]},{"page":166,"text":"resupply. Units can conduct aerial delivery in various operational environments where terrain limits access.","rect":[89.99008178710938,331.54931640625,521.960275888443,322.4956970214844]},{"page":166,"text":"Aerial delivery operations include sling-load, airdrop, and air-land procedures. The type and availability of","rect":[89.99008178710938,343.0730285644531,522.0418997392654,334.0194091796875]},{"page":166,"text":"aircraft limits aerial delivery. Aerial delivery may also compromise locations of units conducting","rect":[89.97017669677735,354.5967712402344,522.0299878120422,345.54315185546877]},{"page":166,"text":"reconnaissance and security operations. (Refer to ATP 4-48 for more information.)","rect":[89.97017669677735,366.1204833984375,421.6072683916092,357.0668640136719]},{"page":166,"text":"Operational Contract Support","rect":[72.0,390.6715393066406,215.1236466474533,380.83489990234377]},{"page":166,"text":"7-25. Units may use operational contract support to assist units conducting reconnaissance and security","rect":[90.0,408.2214050292969,522.0747265815735,399.16778564453127]},{"page":166,"text":"operations. Operational variables and mission variables are considerations that affect employment of contract","rect":[90.0,419.7451171875,522.1484576473237,410.6914978027344]},{"page":166,"text":"support during reconnaissance and security operations. (Refer to ATP 4-10 for more information.)","rect":[90.0,431.2688293457031,482.8323965654373,422.2152099609375]},{"page":166,"text":"EMERGENCY RESUPPLY","rect":[72.0,454.58221435546877,190.6926736831665,446.4960021972656]},{"page":166,"text":"7-26. Emergency resupplyoperationsmay utilize any of thedistributionmethods with expedited distribution.","rect":[90.0,474.4613952636719,522.0976049900055,465.40777587890627]},{"page":166,"text":"Units conduct emergency resupply using the fastest appropriate means based on METT-TC (I). Emergency","rect":[90.00997161865235,485.985107421875,522.051899433136,476.9314880371094]},{"page":166,"text":"resupply may involve classes I (rations and gratuitous issue of health, morale, and welfare items), III, V, VIII,","rect":[90.0,497.5088195800781,522.0926611423492,488.4552001953125]},{"page":166,"text":"and IX. Aerial delivery is the fastest method to conduct emergency resupply, but may be limited due to","rect":[90.01991271972656,509.0325622558594,522.066792011261,499.97894287109377]},{"page":166,"text":"aircraft availability and other circumstances. Usually, the FSC’s supply and transportation platoon located in","rect":[90.00995635986328,520.5563354492188,522.066792011261,511.502685546875]},{"page":166,"text":"the combat trains conduct emergency resupply. Pre-rigged loads of standard resupply packages may reduce","rect":[90.00995635986328,531.9605102539063,521.9850451927185,522.9068603515625]},{"page":166,"text":"the response time for emergency resupply. (Refer to ATP 4-45 and ATP 4-48 for details about rigging","rect":[90.0,543.4841918945313,522.0708813667297,534.4305419921875]},{"page":166,"text":"supplies for airdrop.)","rect":[90.01000213623047,554.9879760742188,174.20086580371857,545.9542846679688]},{"page":166,"text":"PERSONNEL SERVICES","rect":[72.0,580.2905883789063,231.21499242019653,570.574951171875]},{"page":166,"text":"7-27. Personnel services are sustainment functions that man and fund the force, maintain Soldier and Family","rect":[90.0,600.5814208984375,522.0737500190735,591.5277709960938]},{"page":166,"text":"readiness, promote the moral and ethical values of the nation, and enable the fighting qualities of the Army","rect":[90.00993347167969,612.1051635742188,522.0617871284485,603.051513671875]},{"page":166,"text":"(ADP 4-0). Personnel services that are essential to units conducting reconnaissance and security operations","rect":[90.01990509033203,623.6288452148438,522.1824844484329,614.5751953125]},{"page":166,"text":"include personnel accountability and strength reporting, casualty operations, and religious support. The unit","rect":[90.00995635986328,635.152587890625,522.1354571590424,626.0989379882813]},{"page":166,"text":"S-1 and the squadron unit ministry team provide personnel services to the units. (Refer to ADP 4-0 and FM 1-0","rect":[90.01000213623047,646.5567626953125,522.0647778511047,637.5031127929688]},{"page":166,"text":"for more information.)","rect":[89.99996185302735,658.060546875,178.51447969532013,649.02685546875]},{"page":166,"text":"CASUALTY OPERATIONS","rect":[72.0,681.4080200195313,193.0615749359131,673.115966796875]},{"page":166,"text":"7-28. Casualty operations during reconnaissance and security operations present unique challenges to units.","rect":[90.0,701.3814086914063,521.9652197360992,692.3277587890625]},{"page":166,"text":"Units must rehearse casualty operations before commencement. Casualty operations include production,","rect":[90.0,712.9051513671875,522.2152197360992,703.8515014648438]},{"page":166,"text":"7-4","rect":[72.0,754.0800170898438,85.04100256347657,747.6090087890625]},{"page":166,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":166,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":167,"text":"Sustainment","rect":[486.0,44.508026123046878,540.1160795898437,37.7490234375]},{"page":167,"text":"dissemination, coordination, validation, and synchronization of information regarding each casualty.","rect":[108.0,83.50144958496094,540.0628759860992,74.44780731201172]},{"page":167,"text":"Casualty information includes casualty reporting, casualty notification, casualty assistance, line-of-duty","rect":[107.99004364013672,95.02519226074219,540.0458569526672,85.97154998779297]},{"page":167,"text":"determination, disposition of remains, and disposition of personal effects, military burial honors, and casualty","rect":[107.99000549316406,106.42936706542969,540.092670917511,97.37572479248047]},{"page":167,"text":"mail coordination.","rect":[107.99000549316406,115.9411849975586,181.3952124118805,108.89946746826172]},{"page":167,"text":"7-29. As casualties occur, the nearest observer informs the unit first sergeant via the most expedient means.","rect":[107.99000549316406,135.4727020263672,540.1226904392242,126.41905975341797]},{"page":167,"text":"The unit first sergeant submits a personnel status report to the squadron S-1 documenting duty status changes.","rect":[107.9900131225586,146.99644470214845,540.0816748142242,137.9427947998047]},{"page":167,"text":"The unit first sergeant classifies casualties by injury type at the casualty collection point and enters them into","rect":[107.99000549316406,158.5201873779297,539.9392895698547,149.4565887451172]},{"page":167,"text":"the medical treatment system. The first sergeant ensures completed DA Form 1156 (Casualty Feeder Card)","rect":[107.99000549316406,170.0438690185547,540.0647879228592,160.99009704589845]},{"page":167,"text":"is forwarded to the S-1 who then enters the data into the Defense Casualty Information Processing System.","rect":[107.98999786376953,181.44810485839845,535.4016211032867,172.3943328857422]},{"page":167,"text":"7-30. Platoon combat medics record the treatment the casualty received on the casualty’s DA Form 7656","rect":[107.99002838134766,198.9676971435547,540.0448803901672,189.91404724121095]},{"page":167,"text":"(Tactical Combat Casualty Care [TCCC] Card) by electronic means or by utilizing a DD Form 1380","rect":[107.98008728027344,210.49143981933595,540.0429272651672,201.4377899169922]},{"page":167,"text":"(Tactical Combat Casualty Care[TCCC] Card), if available. The squadron S-1 receivesnotificationsupdating","rect":[107.98008728027344,222.0151824951172,540.1621289253235,212.96153259277345]},{"page":167,"text":"the Soldier’s patient tracking status as changes occur, and in turn, informs the Soldier’s troop for accountability.","rect":[107.9801025390625,233.5388641357422,536.3527319431305,224.4851531982422]},{"page":167,"text":"HEALTH SERVICE SUPPORT","rect":[90.0,256.8599853515625,226.6509337425232,248.55599975585938]},{"page":167,"text":"7-31. Health service support encompasses all support and services performed, provided, and arranged by","rect":[108.0,276.8213806152344,539.921284198761,267.76776123046877]},{"page":167,"text":"the Army Medical Department to promote, improve, conserve, or restore the mental and physical","rect":[108.0,288.2255859375,540.1346026668549,279.1719665527344]},{"page":167,"text":"well-being of personnel in the Army. Additionally, as directed, provide support in other Services, agencies,","rect":[108.0,299.7492980957031,539.9604589939117,290.6956787109375]},{"page":167,"text":"and organizations. This includes casualty care (encompassing a number of Army Medical Department","rect":[108.0,311.27301025390627,540.0189410457612,302.2193908691406]},{"page":167,"text":"functions—organic and area medical support, hospitalization, the treatment aspects of dental care and","rect":[108.0,322.7967529296875,540.1196484565735,313.7431335449219]},{"page":167,"text":"behavioral/neuropsychiatric treatment, clinical laboratory services, and treatment of chemical, biological,","rect":[108.0,334.3204650878906,540.0001318454742,325.266845703125]},{"page":167,"text":"radiological, and nuclear patients), medical evacuation, and medical logistics (FM 4-02). Squadrons have","rect":[108.0,345.72467041015627,540.0907580833435,336.6710510253906]},{"page":167,"text":"an organic medical platoon consisting of an ambulance squad and treatment squad equipped to provide","rect":[107.99004364013672,357.2483825683594,540.1267077903748,348.19476318359377]},{"page":167,"text":"mobile medical treatment and ground medical evacuation to the combat casualty. Combat medics provide","rect":[107.99004364013672,368.7720947265625,540.084776638031,359.7184753417969]},{"page":167,"text":"tactical combat casualty care to wounded Soldiers. Squadrons assign combat medics under the operational","rect":[107.99004364013672,380.2958068847656,539.9594317684174,371.2421875]},{"page":167,"text":"control of the platoon and under the technical supervision of the squadron surgeon and squadron physician","rect":[107.99004364013672,391.81951904296877,540.025288105011,382.7658996582031]},{"page":167,"text":"assistant.","rect":[107.99004364013672,401.3313293457031,144.31714844703675,394.28961181640627]},{"page":167,"text":"7-32. Additionally, a forward resuscitative and surgical detachment may be attached to the BSB medical","rect":[107.99004364013672,420.7433776855469,539.9861041316987,411.68975830078127]},{"page":167,"text":"company to provide a rapidly, deployable, immediate surgical capability as a result of an extended battlefield","rect":[107.98005676269531,432.2670593261719,540.0449414253235,423.21343994140627]},{"page":167,"text":"for those critically injured patients who cannot be transported over great distances without surgical","rect":[107.99000549316406,443.7908020019531,540.0878497371674,434.7272033691406]},{"page":167,"text":"intervention and stabilization. Further Army Health System support at EAB may be available from the","rect":[107.99000549316406,455.31451416015627,540.1176745872498,446.2608947753906]},{"page":167,"text":"supporting medical brigade (support).","rect":[107.98999786376953,466.8382568359375,259.162912607193,457.7846374511719]},{"page":167,"text":"7-33. The brigade surgeon, in coordination with the BSB medical company commander, develops the health","rect":[107.99003601074219,484.3578796386719,540.056049823761,475.30426025390627]},{"page":167,"text":"service support portion of the brigade’s support concept. The S-1, S-4, and medical platoon leader should","rect":[107.99003601074219,495.7621154785156,540.032856464386,486.70849609375]},{"page":167,"text":"participate in the concept development rehearsal before execution.","rect":[107.99004364013672,507.26593017578127,373.543527841568,498.2322082519531]},{"page":167,"text":"SOLDIER EVACUATION","rect":[90.0,530.5800170898438,203.02620029449464,522.2760009765625]},{"page":167,"text":"7-34. Squadrons conduct reconnaissance and security missions over wide and extended areas. The squadron","rect":[108.0,550.5414428710938,540.0518383979797,541.48779296875]},{"page":167,"text":"must place careful attention on the location of medical treatment facilities and the availability of medical","rect":[107.99000549316406,562.0651245117188,540.0511065731049,553.011474609375]},{"page":167,"text":"evacuation platforms (air and ground) against time-distance factors when developing the support operation","rect":[107.99000549316406,573.5888671875,540.1662793159485,564.5352172851563]},{"page":167,"text":"concept and should realize the nearest aid station may not be their own. Casualties may need to be transported","rect":[107.99000549316406,585.112548828125,540.1931958198547,576.0588989257813]},{"page":167,"text":"to another battalion’s aid station. This must be considered during planning.","rect":[107.99996948242188,596.5167846679688,408.09086060523989,587.463134765625]},{"page":167,"text":"Medical Evacuation","rect":[90.0,618.8634643554688,183.99344932937624,611.23486328125]},{"page":167,"text":"7-35. Medical evacuation is the timely and effective movement of the wounded and injured. Medical","rect":[108.0,638.7413940429688,540.0219317684174,629.6777954101563]},{"page":167,"text":"professionals perform evacuation using dedicated, standardized, medical evacuation platforms. Medical","rect":[108.00991821289063,650.1456298828125,540.1414386043549,641.0919799804688]},{"page":167,"text":"professionals provide timely, efficient movement and en route care of injured or ill persons to medical","rect":[108.00991821289063,661.6693725585938,540.1824542293549,652.6057739257813]},{"page":167,"text":"treatment facilities. Medical evacuation ground and air ambulance platforms are platforms designed","rect":[108.00991821289063,673.1930541992188,540.1983227729797,664.139404296875]},{"page":167,"text":"especially for the medical evacuation mission, with allocated medical equipment to provide en route care by","rect":[108.00991821289063,684.716796875,540.114643573761,675.6631469726563]},{"page":167,"text":"trained medical personnel.","rect":[108.00991821289063,696.2205810546875,213.95641541481019,687.1868896484375]},{"page":167,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":167,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":167,"text":"7-5","rect":[527.0399780273438,754.1790161132813,540.0809653320313,747.7260131835938]},{"page":168,"text":"Chapter 7","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":168,"text":"7-36. The medical evacuation plan is a crucial part of the medical operational plan or OPORD. The brigade","rect":[90.0,83.50144958496094,522.2191760520935,74.44780731201172]},{"page":168,"text":"surgeon section handles development of the BCT medical evacuation plan. The medical evacuation plan","rect":[89.99008178710938,95.02519226074219,522.054096698761,85.97154998779297]},{"page":168,"text":"identifies ambulance exchange points and casualty collection points. Support graphics in Force XXI Battle","rect":[89.99008178710938,106.42936706542969,521.8319690208435,97.37572479248047]},{"page":168,"text":"Command, brigade and below display these locations. Additional ambulance support is coordinated with the","rect":[89.99008178710938,117.95310974121094,522.0958240013123,108.89946746826172]},{"page":168,"text":"supporting sustainment unit operations section and the supporting medical company.","rect":[90.00003814697266,129.47679138183595,428.842355966568,120.42314910888672]},{"page":168,"text":"7-37. While the platoon medics and platoon sergeant evacuate casualties from the point of injury to the troop,","rect":[90.00003814697266,146.99644470214845,522.0847265720367,137.93284606933595]},{"page":168,"text":"casualty collection point, the troop first sergeant or troop medics handle medical evacuation of patients from","rect":[89.99011993408203,158.5201873779297,522.0578399906159,149.46653747558595]},{"page":168,"text":"the troop, casualty collection point to the aid station. The squadron conducts reconnaissance and security","rect":[89.99011993408203,170.0438690185547,522.169575214386,160.99021911621095]},{"page":168,"text":"operations over wide and extended areas; therefore, the BCT squadron and troop medical planners must","rect":[89.98016357421875,181.4281768798828,522.1067096004487,172.3944549560547]},{"page":168,"text":"consider using adjacent unit aid stations. Ambulance teams from the supporting medical company evacuate","rect":[89.98014831542969,192.97178649902345,522.0728747825623,183.90818786621095]},{"page":168,"text":"patients from the aid station back to the role 2 medical treatment facility located in the BSA. The","rect":[89.98016357421875,204.4955291748047,522.0798327903748,195.44187927246095]},{"page":168,"text":"pre-positioning of ambulance teams with the aid station reduces ambulance turnaround times. Medical","rect":[89.9801025390625,216.01927185058595,521.8468219051362,206.9656219482422]},{"page":168,"text":"evacuation of patients should be no further than their condition requires so they can return to duty as soon","rect":[89.97012329101563,227.54295349121095,521.883686542511,218.4893035888672]},{"page":168,"text":"as possible.","rect":[89.97012329101563,239.04676818847657,136.25522828102113,230.01304626464845]},{"page":168,"text":"7-38. The preferred method of medical evacuation is by air, but air evacuation is dependent upon aircraft","rect":[89.96015930175781,256.4667663574219,522.0658160457612,247.4131317138672]},{"page":168,"text":"availability and the mission variables of METT-TC (I). Ground evacuation is the primary method of","rect":[89.95021057128906,267.9905090332031,522.0209646806717,258.9368896484375]},{"page":168,"text":"evacuation. The evacuation platoon provides area support to all units in the supported area. The brigade","rect":[89.94025421142578,279.5141906738281,522.0421130638123,270.4605712890625]},{"page":168,"text":"aviation element and surgeon, in conjunction with higher headquarters, coordinates the use of air medical","rect":[89.94025421142578,291.0379333496094,521.9333087215424,281.9743347167969]},{"page":168,"text":"evacuation (see figure 7-1).","rect":[89.93024444580078,302.5616455078125,199.94144654273988,293.5080261230469]},{"page":168,"text":"7-39. Medicalplanners anticipate the potential for high casualty rates, longevacuation distances, and adverse","rect":[89.93025207519531,320.081298828125,522.0777575950623,311.0276794433594]},{"page":168,"text":"weather when developing the medical evacuation plan. They identify and coordinate ambulance exchange","rect":[89.93025207519531,331.4855041503906,522.1207873802185,322.431884765625]},{"page":168,"text":"points for all operations, including the locations of ambulance exchange points for all phases of each","rect":[89.93025207519531,343.00921630859377,522.0180859565735,333.9555969238281]},{"page":168,"text":"operation. Medical assets need planned triggers. For example, when the forward element reaches a certain","rect":[89.94021606445313,354.5329284667969,522.0110058784485,345.47930908203127]},{"page":168,"text":"PL, they trigger the medical assets to advance to their next designated location. Planners retain the flexibility","rect":[89.93025970458985,366.056640625,521.9970288276672,357.0030212402344]},{"page":168,"text":"to shift nonstandard evacuation assets to support mass casualties or CASEVACs when required. Plans and","rect":[89.94019317626953,377.5604553222656,521.8719067573547,368.5267333984375]},{"page":168,"text":"exercises should include any available air evacuation to transport urgent litter patients.","rect":[89.94020080566406,388.9845886230469,436.09205079078677,379.93096923828127]},{"page":168,"text":"7-6","rect":[72.0,754.1790161132813,85.04100256347657,747.6090087890625]},{"page":168,"text":"Figure 7-1. Process for evacuation of the wounded","rect":[176.81137084960938,708.2424926757813,416.75569552135468,698.8004150390625]},{"page":168,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":168,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":169,"text":"Sustainment","rect":[486.0,44.508026123046878,540.1160795898437,37.7490234375]},{"page":169,"text":"Note. Although the role 3 hospital is a medical brigade asset dependent upon the scenario and area","rect":[133.1999969482422,89.26139831542969,522.1369616966248,80.20775604248047]},{"page":169,"text":"of operations, the combat support hospital could be located closer to the patient or located in the","rect":[133.1999969482422,100.7614974975586,522.089171169281,91.72777557373047]},{"page":169,"text":"area of operations laterally (central) to a role 2 facility. Depending upon the severity of the injury,","rect":[133.1999969482422,112.18559265136719,522.086252450943,103.12198638916016]},{"page":169,"text":"location of appropriate medical treatment facilities, and available clinical specialties that the","rect":[133.19998168945313,123.68941497802735,522.0695178489685,114.65569305419922]},{"page":169,"text":"patient may require based on clinical judgment, the role 2 medical treatment facility (with or","rect":[133.19998168945313,135.2330780029297,522.0821219072342,126.16947174072266]},{"page":169,"text":"without fire support task) may be bypassed and a particular role 3 element selected as the medical","rect":[133.19998168945313,146.7567596435547,522.1610919246674,137.70310974121095]},{"page":169,"text":"evacuation destination for a particular patient with particular injuries. (Refer to FM 4-02,","rect":[133.19998168945313,158.28050231933595,522.0882666110992,149.21690368652345]},{"page":169,"text":"ATP 4-02.2, and ATP 4-02.10 for more information.)","rect":[133.1999969482422,169.78431701660157,347.4694510087967,160.75059509277345]},{"page":169,"text":"Casualty Evacuation","rect":[90.0,209.01361083984376,187.58256065750124,199.15489196777345]},{"page":169,"text":"7-40. CASEVAC involves the unregulated movement of casualties using predesignated tactical or logistic","rect":[108.0,226.66136169433595,540.0738513450623,217.6077117919922]},{"page":169,"text":"aircraft and vehicles. These vehicles and aircraft are not staffed with medical personnel and organic medical","rect":[108.0,238.06553649902345,540.0590411434174,229.0118865966797]},{"page":169,"text":"equipment for en route care unless augmentation is planned in the operational plan. If the combat medic is","rect":[108.0,249.5892791748047,540.0090835695266,240.53562927246095]},{"page":169,"text":"not available to provide care en route, the combat lifesaver may accompany the casualties to monitor their condition.","rect":[108.0,261.1130065917969,539.9662573337555,252.0593719482422]},{"page":169,"text":"CASEVAC","rect":[303.35546875,282.3875732421875,351.5897406330109,275.4952392578125]},{"page":169,"text":"Casualties transported in nonmedical vehicles may not receive proper medical care during","rect":[133.1999969482422,301.9013671875,522.0791821479797,292.8477478027344]},{"page":169,"text":"transport. If the casualty’s medical condition deteriorates during transport, or the casualty is not","rect":[133.1999969482422,313.4250793457031,521.9807940731049,304.3714599609375]},{"page":169,"text":"transported to the appropriate medical treatment facility, an adverse impact on prognosis and","rect":[133.1999969482422,324.82928466796877,521.980854511261,315.7756652832031]},{"page":169,"text":"long-term disability or death may result.","rect":[133.1999969482422,336.3529968261719,294.32792115211489,327.29937744140627]},{"page":169,"text":"SUPPORT AREAS","rect":[90.0,367.4106140136719,206.41265477371216,357.6949462890625]},{"page":169,"text":"7-41. A logistics support area is a designated location where sustainment elements, some staff elements, and","rect":[108.0,387.7013854980469,540.088764667511,378.64776611328127]},{"page":169,"text":"other elements locate to support unit operations. Support areas represent an echelon of support. The method","rect":[108.00001525878906,399.2052001953125,540.0559277534485,390.1714782714844]},{"page":169,"text":"employed to echelon support is a deliberate, collaborative decision, based upon thorough mission analysis","rect":[108.00001525878906,410.7488098144531,539.8984268312454,401.6951904296875]},{"page":169,"text":"and the MDMP conducted by the leadership and staffs at the brigade, squadron, and troop levels. The primary","rect":[108.00001525878906,422.2725524902344,540.0810132026672,413.21893310546877]},{"page":169,"text":"support area for units conducting reconnaissance and security operations is the BSA. Trains are echeloned","rect":[108.00001525878906,433.6767272949219,540.0697827339172,424.62310791015627]},{"page":169,"text":"forward to provide fluid support to units conducting reconnaissance and security operations. The positioning","rect":[108.0,445.2004699707031,540.0668530464172,436.1468505859375]},{"page":169,"text":"of FLEs and FARPs are essential to reconnaissance sustainment planning.","rect":[108.00999450683594,456.72418212890627,404.12589478492739,447.6705627441406]},{"page":169,"text":"TRAINS","rect":[90.0,480.022216796875,127.54176139831543,471.9360046386719]},{"page":169,"text":"7-42. Trains are a grouping of unit personnel, vehicles, and equipment organized to provide sustainment.","rect":[108.0,500.0213928222656,540.0521337985992,490.9677734375]},{"page":169,"text":"Units use the trains concept to arrange their subordinate sustainment elements. Squadron combat trains are","rect":[108.0,511.54510498046877,539.9790027122498,502.4914855957031]},{"page":169,"text":"usually under the control of the headquarters and headquarters troop commander or the S-4 and assisted by","rect":[107.98999786376953,523.06884765625,539.9094433784485,514.0151977539063]},{"page":169,"text":"the S-1. Squadron field trains are under control of the FSC commander. Troop trains are usually under control","rect":[107.98008728027344,534.4730834960938,540.1288043270112,525.41943359375]},{"page":169,"text":"of the troop commander or executive officer. The composition and location of unit trains vary depending","rect":[107.98009490966797,545.9967651367188,540.0320019721985,536.943115234375]},{"page":169,"text":"upon the number of units attached to or augmenting the unit, as well as other mission variables. Trains have","rect":[107.97013854980469,557.5205078125,539.960264919281,548.4668579101563]},{"page":169,"text":"two basic configurations: as unit trains in one location (appropriate when the squadron consolidates during","rect":[107.97010040283203,569.0442504882813,540.019917011261,559.9906005859375]},{"page":169,"text":"reconstitution and during major movements) or as echeloned trains. Considerations include the following:","rect":[107.97012329101563,580.5679321289063,531.6924029598237,571.5043334960938]},{"page":169,"text":" The troop commander determines the troop trains, which may consist of the troop first sergeant,","rect":[133.1999969482422,593.9813842773438,540.0741674900055,584.927734375]},{"page":169,"text":"supply sergeant, and troop medical assets. Maintenance teams from the FSC may be included.","rect":[151.1900177001953,605.505126953125,527.2758886814117,596.4514770507813]},{"page":169,"text":" The FSC forms the squadron field trains and portions of the squadron combat trains. The squadron","rect":[133.1999969482422,618.9214477539063,540.0666089057922,609.8877563476563]},{"page":169,"text":"commander and staff, the BSB commander and staff, and the FSC commander must collaborate","rect":[151.20999145507813,628.4631958007813,540.1161487083435,621.4114990234375]},{"page":169,"text":"to determine the best method of employment commensurate with the support brigade concept.","rect":[151.20999145507813,641.9888305664063,527.4987890720367,632.9351806640625]},{"page":169,"text":"7-43. The trains should change locations frequently depending upon available time and terrain. The trains","rect":[108.0134506225586,659.5084838867188,540.1519668703079,650.454833984375]},{"page":169,"text":"change locations to provide the forward support to the Cavalry unit, when an area becomes unusable because","rect":[108.00349426269531,671.0322265625,540.1031482200623,661.9785766601563]},{"page":169,"text":"of environmental conditions, or to follow protection (survivability) operations.","rect":[107.99352264404297,682.5559692382813,422.3581030368805,673.5023193359375]},{"page":169,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":169,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":169,"text":"7-7","rect":[527.0399780273438,754.0800170898438,540.0809653320313,747.7260131835938]},{"page":170,"text":"Chapter 7","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":170,"text":"BRIGADE SUPPORT AREA","rect":[72.0,83.34003448486328,197.15977573394776,75.0360336303711]},{"page":170,"text":"7-44. The BSA is the sustainment hub of the BCT. Usually, the BSA is located near an MSR where there is","rect":[90.0,103.30143737792969,522.0448501710891,94.24779510498047]},{"page":170,"text":"minimum threat from enemy artillery and mortar fires. For this reason, the BSA usually locates far behind","rect":[90.0,114.82518005371094,522.0401196479797,105.77147674560547]},{"page":170,"text":"where units conducting reconnaissance and security operations are located. Normally, the BSA includes the","rect":[89.98999786376953,126.22935485839844,522.0957019309998,117.17571258544922]},{"page":170,"text":"BSB (less FSCs as applicable), the alternate command post for the higher headquarters (if formed), the","rect":[89.98999786376953,137.7530975341797,522.0936267356873,128.69944763183595]},{"page":170,"text":"squadron field trains, elements from adjacent units or separate companies, andother sustainment units from EAB.","rect":[89.99000549316406,149.2767791748047,521.9552099704742,140.2131805419922]},{"page":170,"text":"FORWARD LOGISTICS ELEMENT","rect":[72.0,172.5821990966797,231.56559133529664,164.49600219726563]},{"page":170,"text":"7-45. An FLE includes task organized, multifunctional logistics assets to address specific sustainment","rect":[90.0,192.58140563964845,521.9975787410737,183.5277557373047]},{"page":170,"text":"missions, which is characteristic of reconnaissance and security operations. The FLE operates from a forward","rect":[89.98999786376953,204.1051483154297,522.0508618354797,195.05149841308595]},{"page":170,"text":"logistics base or support area. The FLE represents the BSB commander’s ability to weigh the effort for the","rect":[90.0,215.6288299560547,522.0741565208435,206.57518005371095]},{"page":170,"text":"operation by drawing on all sustainment assets across the brigade. Additionally, the BSB commander may","rect":[90.0,227.03306579589845,522.0301098823547,217.9794158935547]},{"page":170,"text":"coordinate with EAB to provide support capabilities to augment the FLE in the concept of support. BSB","rect":[90.0,238.55674743652345,522.0379733457565,229.5030975341797]},{"page":170,"text":"support includes identifying and positioning EAB unit assets in proximity to geographically dispersed forces","rect":[89.98999786376953,250.0804901123047,522.1524551515579,241.02684020996095]},{"page":170,"text":"to extend the operational reach and prolong endurance. The intent for employing an FLE is to minimize","rect":[89.99002838134766,261.6041564941406,522.0717761497498,252.55052185058595]},{"page":170,"text":"tactical pauses to the reconnaissance and security plan and enable momentum for the commander.","rect":[89.99000549316406,273.1278991699219,481.757639169693,264.07427978515627]},{"page":170,"text":"FORWARD ARMING AND REFUELING POINT","rect":[72.0,296.4222106933594,285.92243337631228,288.1679992675781]},{"page":170,"text":"7-46. The FSC is organic to support aviation operations as required by the combined arms battalion. The","rect":[90.0,316.42138671875,522.0998523216248,307.3677673339844]},{"page":170,"text":"FARP provides fuel and ammunition for the sustainment of aviation maneuver units during decisive","rect":[90.0,327.8255920410156,522.099669216156,318.77197265625]},{"page":170,"text":"operations. Usually, FARPs employ to support aviation operations when the distance covered or endurance","rect":[90.0,339.34930419921877,522.0988147239685,330.2956848144531]},{"page":170,"text":"requirements exceed normal capabilities of the aircraft. (Refer to ATP 3-04.17 for more information.)","rect":[90.00995635986328,350.8531188964844,496.62896638965608,341.81939697265627]},{"page":170,"text":"SECURITY OF SUPPORT AREAS","rect":[72.0,374.2200012207031,222.46117210388185,365.916015625]},{"page":170,"text":"7-47. Within a support area, a designated unit provides area security, terrain management, movement control,","rect":[90.0,394.181396484375,522.1148779392242,385.1277770996094]},{"page":170,"text":"mobility support, clearance of fires, and required tactical combat forces. Area security operations focus on","rect":[90.0,405.7051086425781,522.2072949409485,396.6514892578125]},{"page":170,"text":"the protected force, base, base camp, route, or area, which allows sustainment units to focus on their primary","rect":[90.0,417.10931396484377,522.058735370636,408.0556945800781]},{"page":170,"text":"function. When commanders utilize sustainment units for security operations, logistical operations may be","rect":[89.99998474121094,428.6330261230469,522.0807483177185,419.57940673828127]},{"page":170,"text":"adversely affected. Security of sustainment efforts during reconnaissance resupply is a critical factor to","rect":[89.99998474121094,440.1567687988281,522.1408276557922,431.1031494140625]},{"page":170,"text":"successful operations. (Refer to ADP 4-0 for more information.)","rect":[89.99998474121094,451.6606140136719,347.23687654590608,442.6268615722656]},{"page":170,"text":"7-48. The security of the trains in the support area is the responsibility of the individual in charge of the","rect":[90.0,469.2001037597656,522.0209948997498,460.146484375]},{"page":170,"text":"trains. The best defense is to avoid detection. The following activities ensure trains security:","rect":[89.9800796508789,480.7238464355469,458.49409973716737,471.67022705078127]},{"page":170,"text":" Select sites that use available cover, concealment, and camouflage.","rect":[115.19999694824219,494.1413879394531,401.2912085056305,485.0877685546875]},{"page":170,"text":" Enforce strict movement and positioning discipline as well as noise and light discipline to preventdetection.","rect":[115.19999694824219,507.5813903808594,522.088205575943,498.52777099609377]},{"page":170,"text":" Establish a perimeter defense using the occupy procedures for AAs.","rect":[115.19999694824219,521.1414184570313,404.842111825943,512.0877685546875]},{"page":170,"text":" Establish rest plans.","rect":[115.19999694824219,534.5614624023438,212.8461401462555,525.5277709960938]},{"page":170,"text":" Identify an alarm or warning system that would enable rapid execution of the defense plan without","rect":[115.19999694824219,548.1414184570313,522.0167437801362,539.0877685546875]},{"page":170,"text":"further guidance. Usually, the SOP includes the alarm, warning system, and defense plan.","rect":[133.1999969482422,559.6651000976563,491.8397924900055,550.6114501953125]},{"page":170,"text":" Designate a reaction force.","rect":[115.19999694824219,573.1014404296875,240.46819519996644,564.0477905273438]},{"page":170,"text":"ECHELONS ABOVE BRIGADE SUSTAINMENT SUPPORT","rect":[72.0,598.4105834960938,447.179621380806,588.680908203125]},{"page":170,"text":"7-49. Units conducting large-scale combat operations and reconnaissance and security operations require","rect":[90.0,618.701416015625,522.0936877708435,609.6477661132813]},{"page":170,"text":"sustainment support from EAB sustainment units, particularly in maintenance and medical support.","rect":[90.0,630.2251586914063,522.0560400485992,621.1715087890625]},{"page":170,"text":"Typically, an EAB sustainment brigade provides support to units conducting reconnaissance and security","rect":[90.0,641.7488403320313,522.051899433136,632.6951904296875]},{"page":170,"text":"operations. The unit conducting reconnaissance and security may require EAB units to provide water","rect":[89.99008178710938,653.2725830078125,522.0728445634842,644.2189331054688]},{"page":170,"text":"purification, petroleum storage, and transportation support. The medical brigade and the multifunctional","rect":[89.99008178710938,664.7963256835938,522.1486407527924,655.74267578125]},{"page":170,"text":"medical battalion provide additional medical capability as needed. The FSC, in conjunction with the unit S-4,","rect":[90.00004577636719,676.2005004882813,522.0847265720367,667.1369018554688]},{"page":170,"text":"requests EAB assistance through the BSB. (Refer to ATP 4-93 for more information on the sustainment brigade","rect":[89.98999786376953,687.7242431640625,522.102598903656,678.6705932617188]},{"page":170,"text":"and the combat sustainment support battalion.)","rect":[89.99004364013672,699.2279663085938,266.70632845020296,690.1942749023438]},{"page":170,"text":"7-8","rect":[72.0,754.18798828125,85.04100256347657,747.6090087890625]},{"page":170,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":170,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":171,"text":"Sustainment","rect":[486.0,44.508026123046878,540.1160795898437,37.7490234375]},{"page":171,"text":"SECTION III – CONSIDERATIONS","rect":[99.36000061035156,86.90400695800781,288.20401220703129,78.02400970458985]},{"page":171,"text":"7-50. Reconnaissance, security, and stability operations present significant challenges to sustainment","rect":[108.0,110.26139831542969,539.9886676082612,101.20775604248047]},{"page":171,"text":"organizations. Units conducting reconnaissance and security operations should consider increased days of","rect":[108.0,121.78514099121094,540.0608206377029,112.73149871826172]},{"page":171,"text":"supply on all vehicles, the location of trains, resupplying forward of the LD and line of contact, increased","rect":[108.00001525878906,133.30882263183595,540.063862323761,124.25518035888672]},{"page":171,"text":"class V priority on indirect fires systems and class III (B), medical evacuation over greater distances and","rect":[108.0,144.8325653076172,539.929340839386,135.77891540527345]},{"page":171,"text":"dispersed areas, and FLEs. Wide and deep reconnaissance and security operations have the potential to","rect":[108.00995635986328,156.2367401123047,540.091694355011,147.18309020996095]},{"page":171,"text":"contact mass quantities of dislocated civilians and detainees as well as captured enemy ammunition and","rect":[108.01991271972656,167.76048278808595,540.0799145698547,158.7068328857422]},{"page":171,"text":"equipment, all of which require sustainment operational planning.","rect":[108.01991271972656,179.2842254638672,371.6312048435211,170.23057556152345]},{"page":171,"text":"SUSTAINMENT OF RECONNAISSANCE OPERATIONS","rect":[90.0,204.57064819335938,446.71841038894658,194.85496520996095]},{"page":171,"text":"7-51. Maintaining momentum is the overriding consideration when supporting reconnaissance and security","rect":[108.0,224.8613739013672,540.178364276886,215.80772399902345]},{"page":171,"text":"operations. Specific considerations guide planning and preparation. Emphasis, priorities, and requirements","rect":[108.0,236.38511657714845,540.1286514406204,227.3314666748047]},{"page":171,"text":"may shift as the operation is underway. The availability of adequate supplies and transportation to sustain the","rect":[107.99999237060547,247.90879821777345,539.9982898216248,238.8551483154297]},{"page":171,"text":"operation becomes critical as the operation progresses. As reconnaissance elements advance, MSRs lengthen","rect":[107.99999237060547,259.4325256347656,540.0628247261047,250.37889099121095]},{"page":171,"text":"and communications are strained. Units conducting reconnaissance and security operations suspend most","rect":[108.0,270.8367004394531,540.1175738582612,261.7830810546875]},{"page":171,"text":"field service functions except for the increased distribution of ready-to-eat meals. Sustainment units are often","rect":[108.0,282.3604431152344,540.0498242378235,273.30682373046877]},{"page":171,"text":"at risk of compromising the stealth of the reconnaissance operation due to their footprint; therefore,","rect":[107.99008178710938,293.8841552734375,540.0770971775055,284.8305358886719]},{"page":171,"text":"reconnaissance plans must consider resupply methods that emphasize cover and concealment and the","rect":[107.99008178710938,305.4078674316406,540.0936877708435,296.354248046875]},{"page":171,"text":"reduction in the frequency of resupply. Reconnaissance operations plan for the disposition of captured enemy","rect":[107.99004364013672,316.9316101074219,540.0608105659485,307.87799072265627]},{"page":171,"text":"supplies and equipment, particularly ammunition and vehicles.","rect":[108.0,328.4552917480469,359.00794434547427,319.40167236328127]},{"page":171,"text":"7-52. Units conducting reconnaissance and security operations may receive support from additional CBRN","rect":[108.0,345.8554382324219,539.9783514728546,336.80181884765627]},{"page":171,"text":"platoons task organized to provide additional reconnaissance or decontamination support. Sustainment","rect":[108.0,357.379150390625,540.1347857723237,348.3255310058594]},{"page":171,"text":"considerations for CBRN units supporting include coordinating push packages for unique equipment repair","rect":[108.00000762939453,368.9028625488281,540.0659475908279,359.8492431640625]},{"page":171,"text":"parts and consumables.","rect":[107.99004364013672,380.40667724609377,201.08017945289613,371.3729553222656]},{"page":171,"text":"AREA AND ZONE RECONNAISSANCE","rect":[90.0,403.70220947265627,265.9849944114685,395.447998046875]},{"page":171,"text":"7-53. Units conducting area and zone reconnaissance should consider the echeloning of sustainment. Units","rect":[108.0,423.7013854980469,540.0358780031204,414.64776611328127]},{"page":171,"text":"should plan for the increased consumption of ammunition,","rect":[108.0,435.085693359375,371.12626099586489,426.0519714355469]},{"page":171,"text":"petroleum,","rect":[377.87615966796877,435.085693359375,420.9242651462555,426.0519714355469]},{"page":171,"text":"oils,","rect":[427.556640625,434.6175537109375,444.448801279068,426.0519714355469]},{"page":171,"text":"and lubricants when","rect":[451.2016906738281,433.09368896484377,540.1873364448547,426.0519714355469]},{"page":171,"text":"pre-positioning trains. Planning consideration for refuel on the move, maintenance requirements, and push","rect":[108.0,446.6293029785156,540.054829120636,437.57568359375]},{"page":171,"text":"packages of preplanned and preconfigured essential logistics items should be part of the considerations in","rect":[107.99002838134766,458.15301513671877,540.0449414253235,449.0993957519531]},{"page":171,"text":"sustainment planning. Area and zone reconnaissance plans should account for an increase in vehicular","rect":[107.99008178710938,469.6767578125,540.0687552080154,460.6231384277344]},{"page":171,"text":"maintenance, especially when operating over rough terrain, and mitigate risk through the positioning of","rect":[107.99008178710938,481.2004699707031,540.2283621416092,472.1468505859375]},{"page":171,"text":"maintenance support teams well forward. Unit distribution should occur at forward locations. Units should","rect":[107.99008178710938,492.70428466796877,539.9180493354797,483.6705627441406]},{"page":171,"text":"plan for aerial resupply. Area and zone reconnaissance plans include dispersed patient collection points and","rect":[107.9801025390625,504.1283874511719,540.0300488471985,495.07476806640627]},{"page":171,"text":"multiple ambulance exchange points. Units should coordinate increased class VIII consumption and","rect":[107.9800796508789,515.6521606445313,540.0359692573547,506.5985107421875]},{"page":171,"text":"augmentation of medical treatment elements. Sustainment units conducting resupply operations for units","rect":[107.97013854980469,527.1758422851563,540.1235855226516,518.1221923828125]},{"page":171,"text":"conducting reconnaissance must plan for and utilize all available resources for cover and concealment to","rect":[107.97015380859375,538.6995239257813,540.0362133979797,529.6458740234375]},{"page":171,"text":"mitigate the risk of enemy compromise.","rect":[107.97015380859375,550.2232666015625,267.41581177711489,541.1696166992188]},{"page":171,"text":"ROUTE RECONNAISSANCE","rect":[90.0,573.502197265625,218.9402403831482,565.4159545898438]},{"page":171,"text":"7-54. Sustainment for units conducting route reconnaissance consists of the same factors as area","rect":[108.0,593.5014038085938,540.125548122406,584.44775390625]},{"page":171,"text":"reconnaissance. Additionally, units plan for rapidly increasing distances and longer turn-around times for","rect":[108.00003814697266,604.9056396484375,540.0658255205154,595.8519897460938]},{"page":171,"text":"MSR operations. Units should consider recovering damaged vehicles only to the MSR for further recovery","rect":[108.00003814697266,616.4293212890625,540.0429272651672,607.3756713867188]},{"page":171,"text":"by higher headquarters’ assets.","rect":[108.00003814697266,627.9530639648438,231.32276368141175,618.8994140625]},{"page":171,"text":"RECONNAISSANCE IN FORCE","rect":[90.0,651.26220703125,231.0789122581482,643.1759643554688]},{"page":171,"text":"7-55. Units conducting reconnaissance in force should plan for increased consumption of classes III, V, and","rect":[108.0,671.2614135742188,540.0518383979797,662.207763671875]},{"page":171,"text":"VIII, as well as forward located recovery and maintenance support. Direct and indirect fire contact is much","rect":[107.99996185302735,682.78515625,540.209370136261,673.7315063476563]},{"page":171,"text":"more likely, given the nature of reconnaissance in force, which means units must be postured for rapid","rect":[107.99996185302735,694.1893310546875,540.081928730011,685.1356811523438]},{"page":171,"text":"resupply and maintenance to continue the reconnaissance effort. During reconnaissance in force, unit","rect":[107.99996185302735,705.7130737304688,540.1495562801362,696.659423828125]},{"page":171,"text":"commanders must also plan for the retrograde or reinforcement of the force, or the exploitation of success","rect":[107.99996185302735,717.2367553710938,539.9991958742141,708.18310546875]},{"page":171,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":171,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":171,"text":"7-9","rect":[527.0399780273438,754.18798828125,540.0809653320313,747.6090087890625]},{"page":172,"text":"Chapter 7","rect":[72.0,46.164024353027347,113.60699682617188,37.8480224609375]},{"page":172,"text":"which means estimating a higher consumption of classes III and V, or simply increasing the amount of ","rect":[90.0,83.50144958496094,524.503977060318,74.44780731201172]},{"page":172,"text":"emergency classes III and V resupply at the combat trains command post.","rect":[90.00993347167969,95.02519226074219,385.06495118141177,85.97154998779297]},{"page":172,"text":"SUSTAINMENT OF SECURITY OPERATIONS","rect":[72.0,120.33059692382813,369.7125815315247,110.61491394042969]},{"page":172,"text":"7-56. Security missions tend to be defensive in nature. Security operations must make the best use of","rect":[90.0,140.6213836669922,522.0807180986404,131.56773376464845]},{"page":172,"text":"available preparation time and sustainment resources. As with reconnaissance, emphasis on any particular","rect":[89.99996185302735,152.0255584716797,522.1047659502029,142.97190856933595]},{"page":172,"text":"consideration varies with the mission assigned and shifts during mission execution. Security missions include","rect":[89.99996185302735,163.54930114746095,522.1158435325623,154.4956512451172]},{"page":172,"text":"screen, guard, cover, and area security. As they are able, units conducting security operations utilize a","rect":[89.99996185302735,175.0730438232422,522.1005847434998,166.01939392089845]},{"page":172,"text":"deception plan for sustainment preparations and operations.","rect":[89.99996185302735,186.57679748535157,328.64957642555239,177.54307556152345]},{"page":172,"text":"SCREEN","rect":[72.0,209.94000244140626,111.95971775054932,201.63601684570313]},{"page":172,"text":"7-57. Screen operations can occur at any level. The FSC supports screen operations at the troop level.","rect":[90.0,229.9014129638672,522.2401220798492,220.84776306152345]},{"page":172,"text":"Sustainment planning for units conducting screen operations includes considerations for increased use of","rect":[89.99998474121094,241.42515563964845,521.9532766923904,232.3715057373047]},{"page":172,"text":"class III (B) and class V. Considerations for the pre-position of limited amounts of ammunition, petroleum,","rect":[89.99004364013672,252.8094024658203,522.0567724704742,243.7756805419922]},{"page":172,"text":"oil, and lubricant, and barrier material in centrally located forward positions should be included. Screening","rect":[89.98007202148438,264.3530578613281,521.9223828315735,255.29942321777345]},{"page":172,"text":"units conduct resupply during limited visibility to reduce the chance of enemy interference, and emergency","rect":[89.98007202148438,275.8767395019531,522.0488476753235,266.8231201171875]},{"page":172,"text":"resupply well forward during lulls in the battle or as required. Sustainment units supporting screen operations","rect":[89.98005676269531,287.4004821777344,522.1506240968704,278.34686279296877]},{"page":172,"text":"should select MSRs that do not interfere with the movement of maneuver units. Units should plan mobility","rect":[89.98005676269531,298.9241943359375,521.9193921089172,289.8705749511719]},{"page":172,"text":"operations to maintain MSRs. Plans should limit the forward flow of supplies to supplies essential for the","rect":[89.99004364013672,310.4280090332031,522.075743434906,301.394287109375]},{"page":172,"text":"operation only and should include the destruction of supplies and equipment (except medical) not evacuated.","rect":[89.98008728027344,321.85211181640627,522.0727636814117,312.7984924316406]},{"page":172,"text":"When time or the enemy situation constrains forward repair of equipment, screening units should prioritize","rect":[89.97013854980469,333.3758239746094,522.0707995872498,324.32220458984377]},{"page":172,"text":"recovery and evacuation of equipment to preclude loss to the enemy. Units should utilize all available","rect":[89.97017669677735,344.8995666503906,522.0797717552185,335.845947265625]},{"page":172,"text":"noncombat vehicles to tow disabled vehicles.","rect":[89.97017669677735,354.411376953125,271.13160157203677,347.3696594238281]},{"page":172,"text":"GUARD","rect":[72.0,379.739990234375,108.71548557281494,371.42401123046877]},{"page":172,"text":"7-58. Units conduct guard operations at the battalion level and above. Sustainment planners for units","rect":[90.0,399.7013854980469,522.1653946046829,390.64776611328127]},{"page":172,"text":"conducting guard operations consider echeloning sustainment assets. Units conducting guard operations","rect":[90.00995635986328,411.1055908203125,522.1674087648391,402.0519714355469]},{"page":172,"text":"should plan for displacement of sustainment assets so uninterrupted support continues. Units conducting","rect":[90.00993347167969,422.6293029785156,522.0639233589172,413.57568359375]},{"page":172,"text":"guard operations should understand that sustainment units cannot provide support while displacing. Units","rect":[90.00993347167969,434.15301513671877,522.0228775148391,425.0993957519531]},{"page":172,"text":"conducting guard operations use push packages of critical supplies on a scheduled basis and continues routine","rect":[89.99998474121094,445.6767578125,522.1207263450623,436.6231384277344]},{"page":172,"text":"resupply until the using unit requests otherwise. Sustainment planners request additional sustainment assets","rect":[89.99998474121094,457.2004699707031,521.8996475343704,448.1468505859375]},{"page":172,"text":"from higher headquarters to support attachments or extended operations. Units conducting guard operations","rect":[89.99998474121094,468.72418212890627,522.1554458742141,459.6705627441406]},{"page":172,"text":"plan for displacement of support assets and supplies early to keep routes open and preclude unnecessary","rect":[89.99996185302735,480.1283874511719,521.996235370636,471.07476806640627]},{"page":172,"text":"interference with maneuver units.","rect":[89.99996185302735,489.64019775390627,224.265695810318,482.5984802246094]},{"page":172,"text":"7-59. Since the guard force must protect the main body by fighting to gain time, while also forcing the enemy","rect":[89.99996185302735,509.1717529296875,522.0995678901672,500.1181335449219]},{"page":172,"text":"main body to deploy early, the guarding unit should prioritize forward repair of equipment as much as","rect":[89.99996185302735,520.6954956054688,522.0779312257766,511.641845703125]},{"page":172,"text":"possible to avoid being decisively engaged. If displacing to avoid decisive engagement, units should prioritize","rect":[89.99996185302735,532.2191772460938,522.1226794700623,523.16552734375]},{"page":172,"text":"recovery over forward repair until they reach a suitable time and location to continue forward repair. If units","rect":[89.99996185302735,543.742919921875,522.0341690187454,534.6892700195313]},{"page":172,"text":"have met triggers for transition, they should prioritize recover and evacuation of equipment. In addition,","rect":[89.99996185302735,555.1471557617188,522.0689795017242,546.093505859375]},{"page":172,"text":"because guarding is defensive in nature, guarding units should also plan for an increased usage of class IV","rect":[89.98999786376953,566.6708374023438,521.9741400470733,557.6171875]},{"page":172,"text":"material and supplies.","rect":[89.98008728027344,578.1746215820313,177.42688965797425,569.1409301757813]},{"page":172,"text":"COVER","rect":[72.0,601.488037109375,108.00306797027588,593.1959838867188]},{"page":172,"text":"7-60. The BCT executes cover operations. Cover operations require full BSB sustainment support with the","rect":[90.0,621.4414672851563,521.9691760520935,612.4077758789063]},{"page":172,"text":"probability of echeloned support from above brigade, such as the sustainment brigade or medical brigade.","rect":[90.00001525878906,632.9851684570313,522.0897314548492,623.9315185546875]},{"page":172,"text":"Sustainment for units conducting covering operations consists of the same factors as the screen and the guard","rect":[89.99008178710938,644.3893432617188,522.0857739448547,635.335693359375]},{"page":172,"text":"at the BCT level. Cover operations consider additional transportation requirements for the movement of all","rect":[89.99008178710938,655.89306640625,522.1156817684174,646.859375]},{"page":172,"text":"essential classes of supply. Cover operations consider a plan to compensate for lost sustainment capability,","rect":[89.99008178710938,667.436767578125,521.9355566501617,658.3831176757813]},{"page":172,"text":"and as missions become more dynamic in execution, determining ways to increase the mobility of forward","rect":[89.99008178710938,678.9605102539063,521.918354511261,669.9068603515625]},{"page":172,"text":"support assets to maintain pace with the unit. Cover operations anticipate greater numbers of civilians","rect":[89.99008178710938,690.4841918945313,521.8506363039016,681.4305419921875]},{"page":172,"text":"on the battlefield and detainees than screen or guard operations.","rect":[89.99008178710938,702.0079345703125,355.39917969703677,692.9542846679688]},{"page":172,"text":"7-10","rect":[72.0,754.1790161132813,90.08100347900391,747.6090087890625]},{"page":172,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":172,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":173,"text":"Sustainment","rect":[486.0,44.508026123046878,540.1160795898437,37.7490234375]},{"page":173,"text":"AREA SECURITY","rect":[90.0,83.34003448486328,171.59570407867433,75.0360336303711]},{"page":173,"text":"7-61. Area security operational plans consider increasing their use of barrier materiel, lethal and nonlethal","rect":[108.0,103.30143737792969,540.1225787410737,94.24779510498047]},{"page":173,"text":"munitions, and operational contract support. The BSB supports area security missions. Many sustainment","rect":[108.00001525878906,114.82518005371094,540.1255694637299,105.77153778076172]},{"page":173,"text":"considerations in area security operations coincide with sustainment of stability tasks, such as the plan for","rect":[107.99008178710938,126.22935485839844,540.0251761064529,117.17571258544922]},{"page":173,"text":"and anticipation of detainees and dislocated civilians.","rect":[107.99008178710938,137.73316955566407,321.69776368141177,128.69944763183595]},{"page":173,"text":"STABILITY OPERATIONS","rect":[90.0,163.05062866210938,262.44631566238408,153.33494567871095]},{"page":173,"text":"7-62. Stability operations are required when there is no fully functional, legitimate, civil governing authority","rect":[108.0,183.34141540527345,540.064838886261,174.2877655029297]},{"page":173,"text":"present in a theater of operations. Stability operations involve comprehensive efforts to stabilize states in","rect":[108.0,194.8651580810547,539.8906445503235,185.81150817871095]},{"page":173,"text":"crisis and to build the capacity of vulnerable states. Units conducting stability operations conduct a broad","rect":[107.98999786376953,206.3888397216797,540.0548901557922,197.33518981933595]},{"page":173,"text":"range of offensive and defensive tasks under the stability framework phases of initial response,","rect":[108.00003814697266,217.91258239746095,539.848703622818,208.8589324951172]},{"page":173,"text":"transformation, and fostering sustainability. The BSB and EAB units support stability operations. (Refer to","rect":[108.0100326538086,229.4363250732422,540.0588574409485,220.38267517089845]},{"page":173,"text":"ATP 3-07.5 for more information.)","rect":[108.00999450683594,240.82057189941407,248.00775056934357,231.78684997558595]},{"page":173,"text":"7-63. During the initial response phase, units conducting stability operations should emphasize area security","rect":[108.00997924804688,258.3601379394531,539.9651684761047,249.30650329589845]},{"page":173,"text":"and immediate humanitarian needs. Units should understand medical eligibility of care requirements for the","rect":[108.00997161865235,269.8838195800781,540.097716091156,260.8302001953125]},{"page":173,"text":"theater ","rect":[108.00995635986328,280.0,137.74553894996644,272.35394287109377]},{"page":173,"text":"of ","rect":[143.05421447753907,280.0,153.9444830417633,272.3638916015625]},{"page":173,"text":"operations, ","rect":[159.25315856933595,281.3876647949219,205.90777039527894,272.35394287109377]},{"page":173,"text":"especially","rect":[211.21646118164063,281.4075622558594,251.1251721382141,272.35394287109377]},{"page":173,"text":"regarding","rect":[258.98358154296877,281.4075622558594,297.4431347846985,272.35394287109377]},{"page":173,"text":"civilians,","rect":[305.28765869140627,279.3956604003906,341.6127722263336,272.35394287109377]},{"page":173,"text":"dislocated ","rect":[349.330810546875,279.3956604003906,392.37891602516177,272.35394287109377]},{"page":173,"text":"civilians,","rect":[397.6876220703125,280.9195251464844,434.0207006931305,272.35394287109377]},{"page":173,"text":"and ","rect":[441.8492431640625,280.0,458.85892701148989,272.35394287109377]},{"page":173,"text":"detainees. ","rect":[464.1676025390625,280.0,506.37809205055239,272.35394287109377]},{"page":173,"text":"During","rect":[511.686767578125,281.4075622558594,540.066792011261,272.35394287109377]},{"page":173,"text":"transformation, units conducting stability operations may execute border control and boundary security","rect":[108.00999450683594,292.9312744140625,540.0857129096985,283.8776550292969]},{"page":173,"text":"operations over extended lines of communication that may require echeloned and area sustainment support","rect":[108.00999450683594,304.4549865722656,540.1385089168549,295.4013671875]},{"page":173,"text":"beyond the capabilities of organic sustainment units.","rect":[108.00999450683594,315.85919189453127,318.33826661109927,306.8055725097656]},{"page":173,"text":"SECTION IV – SPECIAL CONSIDERATIONS","rect":[99.36000061035156,339.7440185546875,344.72400122070317,330.864013671875]},{"page":173,"text":"7-64. Reconnaissance, security,and stabilityoperationsrequirements are diverse; therefore,units conducting","rect":[108.0,363.10137939453127,540.1803784370422,354.0477600097656]},{"page":173,"text":"them are likely to receive attachments and detachments. Due to their diverse mission set, units conducting","rect":[108.0,374.6250915527344,540.0429272651672,365.57147216796877]},{"page":173,"text":"reconnaissance and security operations may consider special sustainment requirements for specific units.","rect":[108.00001525878906,386.1488342285156,527.3708593845367,377.09521484375]},{"page":173,"text":"ATTACHMENTS","rect":[90.0,411.4505920410156,199.8110312385559,401.73492431640627]},{"page":173,"text":"7-65. When receiving attachments, sustainment planners should receive or obtain some basic information","rect":[108.0,431.74139404296877,540.034077167511,422.6877746582031]},{"page":173,"text":"from the sending unit’s S-4 to anticipate support requirements. Planning considerations include—","rect":[108.00000762939453,443.2651062011719,499.0794153213501,434.21148681640627]},{"page":173,"text":" Mission.","rect":[133.1999969482422,454.6894836425781,185.83988404273988,447.64776611328127]},{"page":173,"text":" Number and type of vehicles, personnel (by specialty), and weapon systems.","rect":[133.1999969482422,470.1413879394531,457.5167944431305,461.0877685546875]},{"page":173,"text":" Current status or strength.","rect":[133.1999969482422,483.7013854980469,255.20928406715394,474.64776611328127]},{"page":173,"text":" Duration of unit attachment and effective times.","rect":[133.1999969482422,495.1294860839844,343.16004395484927,488.0877685546875]},{"page":173,"text":" Support assets accompanying the attachment.","rect":[133.1999969482422,510.7013854980469,333.2070105075836,501.64776611328127]},{"page":173,"text":" When and where linkup is to occur, coordination measures for the linkup (such as near and far","rect":[133.1999969482422,524.1214599609375,540.1886892900467,515.0877685546875]},{"page":173,"text":"recognition signals), and who handles the linkup.","rect":[151.19000244140626,535.78466796875,347.95279908180239,526.7310180664063]},{"page":173,"text":"DETACHMENTS","rect":[90.0,561.090576171875,199.81805028152466,551.3749389648438]},{"page":173,"text":"7-66. The unit conducting reconnaissance and security may detach a subordinate element to other units or","rect":[108.0,581.3814086914063,539.9235525712967,572.3277587890625]},{"page":173,"text":"organizations for certain missions. The units use the same considerations that apply to receiving attachments.","rect":[108.0,592.9051513671875,540.1018164157867,583.8515014648438]},{"page":173,"text":"Company-size detachments deploy with the appropriate level of support to include maintenance, classes III","rect":[108.0,604.309326171875,539.9453421220779,595.2556762695313]},{"page":173,"text":"and V resupply, and medical materials based upon length of time the unit is detached. Additionally, this","rect":[108.0,615.8330688476563,540.1345718507766,606.7794189453125]},{"page":173,"text":"applies to troops operating at a considerable distance from the unit’s sustainment assets but is still attached","rect":[107.98005676269531,627.3567504882813,540.032856464386,618.3031005859375]},{"page":173,"text":"technically. The S-4 should send the same information as that listed in the preceding paragraph to the","rect":[107.97006225585938,638.8804931640625,540.1117541770935,629.8268432617188]},{"page":173,"text":"receiving unit’s S-4.","rect":[107.97006225585938,650.4042358398438,189.4129889011383,641.3505859375]},{"page":173,"text":"7-67. Attachment and detachment reports reflect the addition or subtraction of units if the attachment or","rect":[107.96009826660156,667.7843627929688,540.0249930009842,658.7506713867188]},{"page":173,"text":"detachment is effective for more than 24 hours. Upon notification of pending attachments or detachments,","rect":[107.95020294189453,679.3280639648438,540.0120947360992,670.2743530273438]},{"page":173,"text":"the unit S-4 immediately notifies the FSC and BSB. Sustainment units continue to have an area support","rect":[107.9501953125,690.8517456054688,540.0760699520112,681.798095703125]},{"page":173,"text":"capability and responsibility for units in or transitioning through their area of operations.","rect":[107.94023895263672,702.37548828125,462.75123047828677,693.3218383789063]},{"page":173,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":173,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":173,"text":"7-11","rect":[521.9999389648438,754.0800170898438,540.0809653320313,747.6090087890625]},{"page":174,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.22001099586489,375.853759765625]},{"page":175,"text":"Appendix A","rect":[281.6400146484375,125.59198760986328,348.38519140625,114.64798736572266]},{"page":175,"text":"Echelons Above Brigade Considerations","rect":[160.32000732421876,150.0956573486328,469.50831202316285,135.14112854003907]},{"page":175,"text":"A-1. Corps and division commanders depend on situational understanding to seize and retain the initiative.","rect":[108.0,179.6213836669922,540.0789892673492,170.56773376464845]},{"page":175,"text":"Corps and division commanders require reconnaissance formations to develop the situation through action","rect":[108.0,191.14512634277345,540.042866230011,182.0914764404297]},{"page":175,"text":"and in particular, to determine enemy intentions, strengths, and disposition. Commanders require security","rect":[107.99998474121094,202.66880798339845,540.1614575386047,193.6151580810547]},{"page":175,"text":"forces to provide early warning, maneuver space, and time for the employment of the main body. Cavalry","rect":[107.99011993408203,214.1925506591797,540.0339550971985,205.13890075683595]},{"page":175,"text":"forces must be able to deploy to advantageous positions while concurrently developing the situation for the","rect":[107.99014282226563,225.7162322998047,540.0788562278748,216.66258239746095]},{"page":175,"text":"joint TF commander. Cavalry forces regionally aligned to combatant commands ensure the capability is","rect":[107.99015808105469,237.23997497558595,540.0529068117141,228.17637634277345]},{"page":175,"text":"resident throughout all phases of a joint operation.","rect":[108.01007080078125,248.6442108154297,309.09949707984927,239.5806121826172]},{"page":175,"text":"A-2. All units have the responsibility to conduct reconnaissance and security tasks to support their own","rect":[108.01007080078125,266.1637878417969,540.0013012886047,257.11016845703127]},{"page":175,"text":"operations within their area of operations. Commanders may assign corps or divisions a dedicated","rect":[108.01007080078125,277.6875305175781,540.186420917511,268.6339111328125]},{"page":175,"text":"reconnaissance and security formation, such as a Cavalry squadron. In the absence of a dedicated formation,","rect":[108.00011444091797,289.21124267578127,540.1236670017242,280.1576232910156]},{"page":175,"text":"commanders can resource the capability from assigned forces. The corps commander may designate and task","rect":[108.0001220703125,300.7349548339844,540.0791821479797,291.68133544921877]},{"page":175,"text":"organize a BCT while simultaneously, a division commander may designate and task organize a Cavalry","rect":[108.0001220703125,312.2586669921875,540.062885761261,303.2050476074219]},{"page":175,"text":"squadron to perform reconnaissance and security operations. An example is a BCT reconnaissance and","rect":[108.00015258789063,323.6628723144531,540.1021313667297,314.6092529296875]},{"page":175,"text":"security TF, under the command and control of the corps headquarters, conducting a screen along a corps","rect":[108.00015258789063,335.18658447265627,540.1406143312454,326.1329650878906]},{"page":175,"text":"front. If a corps requires capabilities beyond a task-organized BCT (such as for reconnaissance in force, a","rect":[108.00015258789063,346.7102966308594,540.094786403656,337.65667724609377]},{"page":175,"text":"guard, or a cover), the corps commander may task a division. Another option for corps and division","rect":[107.99018096923828,358.2340393066406,539.9333691596985,349.180419921875]},{"page":175,"text":"commanders is to assign security requirements to subordinate units for execution. As an example, a division","rect":[107.98999786376953,369.7577819824219,540.0471997261047,360.70416259765627]},{"page":175,"text":"tasks a Cavalry squadron to conduct zone reconnaissance or guard within their respective area of operations.","rect":[107.99004364013672,381.1619567871094,540.0748388767242,372.10833740234377]},{"page":175,"text":"A-3. Mission analysis is essential to the corps and division commander’s decision to determine how to","rect":[107.98999786376953,398.6816101074219,540.0448803901672,389.62799072265627]},{"page":175,"text":"execute reconnaissance and security operations. Mission analysis evaluates the mission variables of","rect":[107.98007202148438,410.205322265625,540.0518484697342,401.1517028808594]},{"page":175,"text":"METT-TC (I), the gain received by creating a reconnaissance and security TF, and the operational","rect":[107.98005676269531,421.7290344238281,540.1005450496674,412.6754150390625]},{"page":175,"text":"effectiveness of the formation that resource the reconnaissance and security TF. To enhance the corps or","rect":[107.98001861572266,433.25274658203127,540.0338430986404,424.1991271972656]},{"page":175,"text":"division commander’s ability to plan the execution of reconnaissance and security during mission analysis,","rect":[107.98005676269531,444.7764587402344,539.9285986423492,435.72283935546877]},{"page":175,"text":"the commander forms a reconnaissance cell within the staff headed by the G-3 (assistant chief of staff,","rect":[107.98005676269531,456.1806640625,540.0707495212555,447.1270446777344]},{"page":175,"text":"operations). The reconnaissance cell is responsible for planning and synchronizing operations for the","rect":[107.97006225585938,467.7043762207031,540.0709216575623,458.6507568359375]},{"page":175,"text":"reconnaissance and security TF to ensure it is properly nested with the commander’s intent and the","rect":[107.97005462646485,479.2281188964844,539.950499294281,470.17449951171877]},{"page":175,"text":"information collection plan. (See figure 1-2, page 1-12 as an example of Recon Cell.) One determining factor","rect":[107.97005462646485,490.7518310546875,540.0567312822342,481.6982116699219]},{"page":175,"text":"for assigning reconnaissance and security tasks to subordinate units is their ability to accomplish their primary","rect":[107.97002410888672,502.2755432128906,540.0648999214172,493.221923828125]},{"page":175,"text":"missions, such as attack or defend, while simultaneously executing assigned corps or division reconnaissance","rect":[107.97002410888672,513.79931640625,539.957335231781,504.74566650390627]},{"page":175,"text":"and security tasks. Considerations for establishing a reconnaissance and security TF include the following:","rect":[107.97000122070313,525.2034912109375,534.7061969051362,516.1498413085938]},{"page":175,"text":" What is the purpose and intent for reconnaissance and security?","rect":[133.1999969482422,538.5414428710938,405.82147097396855,529.48779296875]},{"page":175,"text":" Does the purpose and intent for reconnaissance and security require an independent formation","rect":[133.1999969482422,552.1014404296875,540.0196118354797,543.0477905273438]},{"page":175,"text":"under corps or division control?","rect":[151.1999969482422,563.605224609375,278.98077273178105,554.571533203125]},{"page":175,"text":" What are the impacts to other subordinate unit missions?","rect":[133.1999969482422,577.0414428710938,378.33978152084355,568.0077514648438]},{"page":175,"text":" How does the employment of the reconnaissance and security TF mitigate risks to the mission and","rect":[133.1999969482422,590.6213989257813,540.0583691596985,581.5677490234375]},{"page":175,"text":"enable overall mission accomplishment?","rect":[151.1999969482422,602.1251831054688,313.6624743919373,593.0914916992188]},{"page":175,"text":" What are the risks of employment and how does the corps or division mitigate the risks?","rect":[133.1999969482422,615.5814208984375,504.81695437240605,606.5277709960938]},{"page":175,"text":" How does the corps or division sustain a reconnaissance and security TF?","rect":[133.1999969482422,629.1414184570313,445.90643191146855,620.0877685546875]},{"page":175,"text":" Which additional enablers does the TF require?","rect":[133.1999969482422,642.5614624023438,341.25872683334355,633.5277709960938]},{"page":175,"text":" Is the reconnaissance and security TF commander able to control the necessary enablers?","rect":[133.1999969482422,656.0214233398438,507.8457019309998,646.9677734375]},{"page":175,"text":" What is the proficiency of the unit tasked with conducting reconnaissance and security?","rect":[133.1999969482422,669.5814208984375,502.2980945091248,660.5277709960938]},{"page":175,"text":" What is the duration of the task organization and mission?","rect":[133.1999969482422,683.0214233398438,384.2191455345154,673.9677734375]},{"page":175,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":175,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":175,"text":"A-1","rect":[525.4829711914063,754.0800170898438,539.9639609375,747.6090087890625]},{"page":176,"text":"Appendix A","rect":[72.0,46.164024353027347,122.17770275878907,37.956024169921878]},{"page":176,"text":"A-4. The decision to employ a Cavalry squadron for reconnaissance and security depends upon the mission","rect":[90.0,83.50144958496094,522.0688061714172,74.44780731201172]},{"page":176,"text":"variables of METT-TC (I). The division commander considers several factors before detaching a Cavalry","rect":[90.00995635986328,95.02519226074219,522.022114276886,85.97154998779297]},{"page":176,"text":"squadron from a BCT to execute independent reconnaissance or security operations. These factors are—","rect":[90.0,106.42936706542969,507.7393274307251,97.37572479248047]},{"page":176,"text":" Is the mission distinct from that assigned to the BCT?","rect":[115.19999694824219,119.86137390136719,348.45147585678105,110.80773162841797]},{"page":176,"text":" Is the BCT able to accomplish its mission without the Cavalry squadron?","rect":[115.19999694824219,133.42137145996095,425.74114870834355,124.36772918701172]},{"page":176,"text":" What sustainment does the detached Cavalry squadron require?","rect":[115.19999694824219,146.8613739013672,387.2187488059998,137.80772399902345]},{"page":176,"text":" What additional artillery, aviation, engineer, air defense, electromagnetic warfare, and maneuver","rect":[115.19999694824219,160.42137145996095,522.0712576494217,151.3677215576172]},{"page":176,"text":"forces does the Cavalry squadron require?","rect":[133.1999969482422,171.9451141357422,301.8974597434998,162.89146423339845]},{"page":176,"text":" Is staff augmentation required to control necessary enablers?","rect":[115.19999694824219,185.3813934326172,376.33245730209355,176.32774353027345]},{"page":176,"text":"A-5. Corps and division commanders should consider additional factors when addressing mission duration","rect":[90.00350189208985,203.0205535888672,521.9279370307922,193.96690368652345]},{"page":176,"text":"and unit proficiency. One factor commanders should consider is that reconnaissance and security are enduring","rect":[90.00350189208985,214.4247283935547,522.116108417511,205.37107849121095]},{"page":176,"text":"and enabling tasks that support all operations and transitions. A second factor to consider is that unit","rect":[90.00347900390625,225.94847106933595,522.1389361629487,216.8948211669922]},{"page":176,"text":"proficiency usually increases as leaders and Soldiers become more competent in the individual and collective","rect":[90.0134506225586,237.4722137451172,522.0026843528748,228.41856384277345]},{"page":176,"text":"tasks associated with reconnaissance and security operations. In addition, habitual task organization and","rect":[90.0134506225586,248.9958953857422,522.0864453315735,239.94224548339845]},{"page":176,"text":"relationships increase cohesion and understanding of SOPs in addition to building trust. Rotating the mission","rect":[90.0134506225586,260.5196228027344,522.0742993354797,251.4659881591797]},{"page":176,"text":"and designation between formations increases unit turbulence and reduces the ability to develop","rect":[90.0134506225586,272.0433654785156,522.1013989448547,262.98974609375]},{"page":176,"text":"reconnaissance and security expertise within the command. A third factor commanders should consider is","rect":[90.0134506225586,283.4475402832031,522.1429947023391,274.3939208984375]},{"page":176,"text":"that units may require time to adjust to the differing METT-TC (I) factors between offensive and defensive","rect":[90.0134506225586,294.97125244140627,522.102110622406,285.90765380859377]},{"page":176,"text":"operations and reconnaissance and security operations. There are also adjustments as units that usually operate","rect":[90.00349426269531,306.4949645996094,522.017393825531,297.4313659667969]},{"page":176,"text":"at one echelon provide support for a higher echelon (such as a Cavalry squadron usually supporting a brigade","rect":[90.00349426269531,318.0187072753906,522.2167956809998,308.965087890625]},{"page":176,"text":"is now supporting a division).","rect":[89.99356079101563,329.5423889160156,206.2367193698883,320.48876953125]},{"page":176,"text":"A-6. Simultaneous with determining the best means for meeting reconnaissance and security requirements,","rect":[89.98359680175781,346.9425354003906,522.067697763443,337.888916015625]},{"page":176,"text":"corps or division commanders must determine the necessary task organization to conduct these operations in","rect":[89.98359680175781,358.46624755859377,522.0475659370422,349.4126281738281]},{"page":176,"text":"close contact with the enemy and civilian populations. The commander determines task organization during","rect":[89.98361206054688,369.9899597167969,522.0317578315735,360.93634033203127]},{"page":176,"text":"war-gaming supported by a thorough review of the mission variables, IPB, and risks. Commanders must","rect":[89.98361206054688,381.513671875,522.0822345027924,372.4600524902344]},{"page":176,"text":"understand that the constantly changing operational environment requires decentralized, combined arms","rect":[89.9736328125,393.0373840332031,522.1619156007766,383.9837646484375]},{"page":176,"text":"formations capable of working with joint and interagency partners to collect critical information, provide the","rect":[89.9736328125,404.5611267089844,522.0753161888123,395.4975280761719]},{"page":176,"text":"level of security required in a given situation, and defeat a variety of threats from state and nonstate actors.","rect":[89.9736328125,415.9653015136719,521.9548437595367,406.91168212890627]},{"page":176,"text":"These various aspects provide a general list of recommended capabilities for reconnaissance task","rect":[89.98359680175781,427.4890441894531,522.0933423042297,418.4354248046875]},{"page":176,"text":"organization. As an example, for reconnaissance in force, commanders place particular emphasis on the","rect":[89.98359680175781,439.0127258300781,522.0878283958435,429.9591064453125]},{"page":176,"text":"maneuver, mobility, and fires requirements since fighting for information is probably a key aspect of the mission.","rect":[89.98360443115235,450.5365295410156,521.948801279068,441.48291015625]},{"page":176,"text":"A-7. Task organizing a reconnaissance and security formation for employment at EAB should include the","rect":[89.99354553222656,468.05615234375,522.0773303489685,459.0025329589844]},{"page":176,"text":"following capabilities:","rect":[89.9736328125,479.5798645019531,179.61461365318298,470.5262451171875]},{"page":176,"text":" Ground maneuver.","rect":[115.19999694824219,490.9394226074219,208.28843140602113,483.88775634765627]},{"page":176,"text":" Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or","rect":[133.1999969482422,506.96148681640627,522.0775442705154,497.9277648925781]},{"page":176,"text":"area; anticipated enemy and the need to fight for information; speed required; detail required;","rect":[151.20994567871095,518.505126953125,522.0277911434174,509.45147705078127]},{"page":176,"text":"mobility about the enemy and the main body.","rect":[151.20994567871095,530.0288696289063,332.97791504859927,520.9752197265625]},{"page":176,"text":"","rect":[133.1999969482422,539.5242919921875,138.25631693077089,536.2564697265625]},{"page":176,"text":"Security capabilities: size of the security area or area of operations; anticipated enemy;","rect":[151.1999969482422,544.0614013671875,522.0718585262299,535.0077514648438]},{"page":176,"text":"requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities. The","rect":[151.1999969482422,555.5851440429688,522.110411403656,546.531494140625]},{"page":176,"text":"formation must have the capability to prevent enemy forces from gaining a position of","rect":[151.1999969482422,567.1088256835938,522.0996389970779,558.05517578125]},{"page":176,"text":"advantage across a division front or flank to collect and target the division and subordinate","rect":[151.1999969482422,578.5130615234375,521.943175075531,569.4594116210938]},{"page":176,"text":"BCTs. Simultaneously, the formation must protect organic or supporting capabilities. While","rect":[151.1999969482422,590.0368041992188,521.972960231781,580.983154296875]},{"page":176,"text":"the force conducts reconnaissance in support of maneuver, it must be able to secure key terrain","rect":[151.19007873535157,601.5604858398438,521.9391674995422,592.5068359375]},{"page":176,"text":"for follow-on forces without degrading its ability to continue further reconnaissance. The","rect":[151.19007873535157,613.084228515625,522.1115710716248,604.0305786132813]},{"page":176,"text":"distance between the force and the following BCT must be considered when allocating the","rect":[151.19007873535157,624.6079711914063,522.053770778656,615.5543212890625]},{"page":176,"text":"proper additional combat power.","rect":[151.19007873535157,635.9921875,281.71680665016177,626.95849609375]},{"page":176,"text":" Manned aviation.","rect":[115.19999694824219,647.4094848632813,203.24866700172425,640.3677978515625]},{"page":176,"text":" Reconnaissance capabilities: dependent on the number of routes or areas; size of the zone or","rect":[133.1999969482422,663.5614624023438,522.0675955400467,654.5277709960938]},{"page":176,"text":"area; anticipated enemy and the need to fight for information; speed required; terrain.","rect":[151.1999969482422,675.1051635742188,492.5701696872711,666.051513671875]},{"page":176,"text":" Security capabilities: size of the security area or area of operations; anticipated enemy;","rect":[133.1999969482422,689.1414184570313,522.0107623348237,680.0877685546875]},{"page":176,"text":"requirement to defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; terrain.","rect":[151.1999969482422,700.6651611328125,522.0236914157867,691.6115112304688]},{"page":176,"text":"A-2","rect":[72.0,754.0800170898438,86.48099737548829,747.6090087890625]},{"page":176,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":176,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":177,"text":"","rect":[133.1999969482422,80.6611099243164,139.2058769197464,75.93359375]},{"page":177,"text":"","rect":[133.1999969482422,105.74112701416016,139.2058769197464,101.01361083984375]},{"page":177,"text":"","rect":[133.1999969482422,170.30113220214845,139.2058769197464,165.5736083984375]},{"page":177,"text":"","rect":[133.1999969482422,206.7811737060547,139.2058769197464,202.05364990234376]},{"page":177,"text":"Echelons Above Brigade Considerations","rect":[366.0,46.28102493286133,540.0824912109375,37.8480224609375]},{"page":177,"text":"UASs. dependent on unit capabilities,","rect":[151.1999969482422,83.3614730834961,320.500070810318,74.32775115966797]},{"page":177,"text":"reconnaissance objectives, and terrain.","rect":[151.20997619628907,95.02464294433594,305.38477540016177,85.9610366821289]},{"page":177,"text":"Mobility.","rect":[151.1999969482422,108.46141052246094,188.7292730808258,99.40776824951172]},{"page":177,"text":" Engineer reconnaissance capabilities: dependent on the information requirement detail and","rect":[151.1999969482422,122.50144958496094,540.0586743354797,113.44780731201172]},{"page":177,"text":"breadth of area reconnoitered; detail of infrastructure required.","rect":[169.1999969482422,134.00526428222657,419.72583985328677,124.97148895263672]},{"page":177,"text":" Engineer mobility capabilities: dependent on obstacles anticipated and the requirement to","rect":[151.1999969482422,148.06138610839845,540.0586133003235,139.0077362060547]},{"page":177,"text":"breach; types and number of gaps anticipated and required to cross.","rect":[169.1999969482422,159.5851287841797,438.8073217868805,150.53147888183595]},{"page":177,"text":"Countermobility. Capabilities: dependent on time available and whether it is a stationary or","rect":[151.1999969482422,173.0214080810547,540.1002493486404,163.96775817871095]},{"page":177,"text":"moving operation; capacity of organic capabilities; obstacle intended affect against enemy","rect":[151.20993041992188,184.54515075683595,540.0732007026672,175.4915008544922]},{"page":177,"text":"reconnaissance or maneuver capabilities.","rect":[151.19998168945313,196.0489044189453,314.96927857398989,187.0151824951172]},{"page":177,"text":"Indirect fires.","rect":[151.1999969482422,207.48953247070313,205.1732428073883,200.4477996826172]},{"page":177,"text":"","rect":[151.1999969482422,219.12428283691407,156.25631693077089,215.8564453125]},{"page":177,"text":"Planning:","rect":[169.1999969482422,223.66136169433595,207.60774719810486,214.6077117919922]},{"page":177,"text":"planning ","rect":[215.76300048828126,223.66136169433595,253.293283700943,214.6077117919922]},{"page":177,"text":"considerations ","rect":[258.96051025390627,222.0,319.16968750953677,214.6077117919922]},{"page":177,"text":"for ","rect":[324.8369140625,222.0,339.08667969703677,214.61767578125]},{"page":177,"text":"task ","rect":[344.75390625,222.0,363.323312997818,214.6077117919922]},{"page":177,"text":"organizing ","rect":[368.9905700683594,223.66136169433595,414.2010290622711,214.6077117919922]},{"page":177,"text":"capabilities ","rect":[419.8682861328125,223.6414337158203,467.83863282203677,214.6077117919922]},{"page":177,"text":"to ","rect":[473.5058898925781,222.0,483.79557251930239,215.6037139892578]},{"page":177,"text":"support ","rect":[489.4627990722656,223.6414337158203,522.0719091892242,215.6037139892578]},{"page":177,"text":"the","rect":[527.7391357421875,222.0,539.9610583763123,214.6077117919922]},{"page":177,"text":"reconnaissance and security TF with indirect fire support, target acquisition, mobility, and","rect":[169.1999969482422,235.1851043701172,540.0406079292297,226.13145446777345]},{"page":177,"text":"survivability.","rect":[169.1999969482422,246.5892791748047,222.3246557712555,237.53562927246095]},{"page":177,"text":"","rect":[151.1999969482422,256.08428955078127,156.25631693077089,252.81646728515626]},{"page":177,"text":"","rect":[133.1999969482422,402.9811096191406,139.2058769197464,398.25360107421877]},{"page":177,"text":"","rect":[133.1999969482422,516.14111328125,139.2058769197464,511.41357421875]},{"page":177,"text":" Supporting security: dependent on organic capabilities; anticipated enemy; requirement to","rect":[151.1999969482422,343.6614074707031,539.9456372261047,334.6077880859375]},{"page":177,"text":"defeat, delay, and attrit enemy reconnaissance or maneuver capabilities; distance from the","rect":[169.1999969482422,355.18511962890627,539.9918811302185,346.1314697265625]},{"page":177,"text":"main body or supporting fires capabilities.","rect":[169.1999969482422,366.7088317871094,338.60755372047427,357.65521240234377]},{"page":177,"text":" Indirect fires radar capabilities: dependent on other units’ ability to provide radar coverage;","rect":[151.1999969482422,380.74139404296877,539.9919635066987,371.6877746582031]},{"page":177,"text":"distance from main body.","rect":[169.1999969482422,392.2651062011719,271.5300085544586,383.21148681640627]},{"page":177,"text":"Intelligence.","rect":[151.1999969482422,405.7013854980469,200.9701178073883,396.64776611328127]},{"page":177,"text":" SIGINT capabilities: dependent on the requirement to collect on specific aspects of enemy","rect":[151.1999969482422,419.86138916015627,540.0576367378235,410.8077697753906]},{"page":177,"text":"communications; distance from the main body and capabilities of SIGINT assets; site","rect":[169.19998168945313,431.2655944824219,539.8446643333435,422.21197509765627]},{"page":177,"text":"exploitation requirements.","rect":[169.19998168945313,442.7694091796875,274.1694128513336,433.7356872558594]},{"page":177,"text":" HUMINT capabilities: dependent on time available to collect; specific information required;","rect":[151.1999969482422,456.801513671875,540.1212970027924,447.7677917480469]},{"page":177,"text":"site exploitation requirements. The theater or corps may task-organize HUMINT capabilities","rect":[169.20001220703126,468.3451232910156,540.0237930421829,459.29150390625]},{"page":177,"text":"to provide interrogation capabilities down to the brigade.","rect":[169.1900634765625,479.8688659667969,397.03504395484927,470.81524658203127]},{"page":177,"text":" Geospatial intelligence capabilities: dependent on time and UAS assets available to collect","rect":[151.1999969482422,493.9013671875,540.1144000301362,484.8477478027344]},{"page":177,"text":"specific information required.","rect":[169.20001220703126,505.4051818847656,288.44410157203677,496.3714599609375]},{"page":177,"text":"Protection.","rect":[151.1999969482422,516.8494262695313,194.8546850681305,509.8077392578125]},{"page":177,"text":"","rect":[151.1999969482422,528.3643188476563,156.25631693077089,525.0964965820313]},{"page":177,"text":"","rect":[151.1999969482422,600.0043334960938,156.25631693077089,596.7365112304688]},{"page":177,"text":"","rect":[151.1999969482422,660.0043334960938,156.25631693077089,656.7365112304688]},{"page":177,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":177,"text":"Survivability capabilities: dependent on the volume of hardening of command-and-control","rect":[169.1999969482422,604.5414428710938,539.9928790340424,595.48779296875]},{"page":177,"text":"facilities and other critical infrastructure. potential for the employment of CBRN threats and","rect":[169.18008422851563,616.0651245117188,539.9098706245422,607.011474609375]},{"page":177,"text":"hazards requiring increased standoff predetonation layers. Examples are enhanced personal","rect":[169.18011474609376,627.4692993164063,540.1164141902924,618.4156494140625]},{"page":177,"text":"protective equipment and posture, such as applying reactive armor to vehicles, sapi plates to","rect":[169.18006896972657,638.9930419921875,539.9151196479797,629.9393920898438]},{"page":177,"text":"fragmentation vests, and mission-orientated protective posture improvements.","rect":[169.1800537109375,650.5167846679688,480.89820313453677,641.463134765625]},{"page":177,"text":"CBRN reconnaissance and decontamination capabilities: dependent on the division receiving","rect":[169.1999969482422,664.5414428710938,540.0506176948547,655.48779296875]},{"page":177,"text":"CBRN reconnaissance capabilities to its forces. In some cases, the division may task organize","rect":[169.19000244140626,676.0651245117188,539.9699695091248,667.011474609375]},{"page":177,"text":"a hazard response company to the BCT or Cavalry squadron to provide decontamination and","rect":[169.19000244140626,687.5888671875,539.9220776557922,678.53515625]},{"page":177,"text":"additional CBRN reconnaissance capabilities.","rect":[169.19000244140626,699.0925903320313,352.5118200778961,690.0588989257813]},{"page":177,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":177,"text":"A-3","rect":[525.4829711914063,754.1790161132813,539.9639609375,747.6090087890625]},{"page":178,"text":"Appendix A","rect":[72.0,46.164024353027347,122.17770275878907,37.956024169921878]},{"page":178,"text":"","rect":[115.19999694824219,80.6611099243164,121.2058769197464,75.93359375]},{"page":178,"text":"","rect":[115.19999694824219,247.4611053466797,121.2058769197464,242.73358154296876]},{"page":178,"text":"Sustainment.","rect":[133.1999969482422,81.37943267822266,185.13143372535706,74.32775115966797]},{"page":178,"text":" Capabilities supporting reconnaissance: dependent on the breadth and depth of the","rect":[133.1999969482422,97.54142761230469,522.1014392356873,88.48778533935547]},{"page":178,"text":"reconnaissance mission, organic sustainment capabilities, and duration of the mission.","rect":[151.1999969482422,109.06517028808594,495.68754029273989,100.01152801513672]},{"page":178,"text":" Transportation capabilities: dependent on the mobility of the unit conducting reconnaissance,","rect":[133.1999969482422,123.10142517089844,521.9719336032867,114.04778289794922]},{"page":178,"text":"travel distance, time available, and speed required.","rect":[151.1999969482422,134.60523986816407,353.73063111305239,125.57152557373047]},{"page":178,"text":" Capabilities supporting security: dependent on the breadth and depth of the security area or","rect":[133.1999969482422,148.66136169433595,522.0615530595779,139.6077117919922]},{"page":178,"text":"area of operations, organic sustainment capabilities, and duration of the mission.","rect":[151.1999969482422,160.1851043701172,473.13709473609927,151.13145446777345]},{"page":178,"text":" Transportation capabilities: dependent on the mobility of the unit conducting security,","rect":[133.1999969482422,174.2213592529297,521.960031747818,165.16770935058595]},{"page":178,"text":"distance required to travel, time available, and terrain.","rect":[151.1999969482422,185.7251739501953,367.41565918922427,176.6914520263672]},{"page":178,"text":" Capabilities to support the unique requirements of all attached enablers in terms of","rect":[133.1999969482422,199.76148986816407,522.0388479814529,190.72776794433595]},{"page":178,"text":"maintenance, recovery, and classes of supply","rect":[151.1999969482422,211.1855926513672,331.4052929878235,202.13194274902345]},{"page":178,"text":" Capabilities to provide health service support in terms of ability to transport casualties over","rect":[133.1999969482422,225.2213592529297,521.9154348955154,216.16770935058595]},{"page":178,"text":"extended distances to role 1 and role 2 levels of care. (See ADP 4-0.)","rect":[151.1999969482422,236.7251739501953,427.6198721513748,227.6914520263672]},{"page":178,"text":"Command and control.","rect":[133.1999969482422,248.17941284179688,225.2104742527008,241.1277313232422]},{"page":178,"text":" The staff, which is dependent on the enablers and attachments employed by the Calvary force,","rect":[133.1999969482422,264.3414001464844,522.1056005954742,255.2877655029297]},{"page":178,"text":"should be augmented to provide the requisite capability to enable the commander’s","rect":[151.1999969482422,275.8651428222656,522.1394546632766,266.8115234375]},{"page":178,"text":"understanding, plan operations, and synchronize the employment of enablers.","rect":[151.1999969482422,287.3888244628906,460.8893530368805,278.335205078125]},{"page":178,"text":" The level of headquarters is dependent on span of control, unity of command required, and","rect":[133.1999969482422,301.42138671875,522.0616040229797,292.3677673339844]},{"page":178,"text":"discretion of the commander. Assign the appropriate level of command to the force.","rect":[151.19996643066407,312.8255920410156,486.7065222263336,303.77197265625]},{"page":178,"text":"","rect":[133.1999969482422,322.3243103027344,138.25631693077089,319.0564880371094]},{"page":178,"text":"The reconnaissance and security BCT and Cavalry squadron S-6 must plan, engineer, install,","rect":[151.1999969482422,326.86138916015627,521.961008310318,317.8077697753906]},{"page":178,"text":"operate, and defend the tactical portion of the Department of Defense information","rect":[151.1900634765625,338.3652038574219,522.047749042511,329.33148193359377]},{"page":178,"text":"network-Army, known as the tactical network. The S-6 employs a network defense-in-depth","rect":[151.19007873535157,349.9088439941406,522.0298657417297,340.8551330566406]},{"page":178,"text":"to ensure the availability, protection, and delivery of network resources and critical","rect":[151.1701202392578,361.43255615234377,521.8326007137299,352.3789367675781]},{"page":178,"text":"information. This facilitates the allocation of network services to enable mission","rect":[151.1701202392578,370.9443664550781,522.0158886909485,363.90264892578127]},{"page":178,"text":"accomplishment under all conditions.","rect":[151.1701202392578,384.4600830078125,301.13978028297427,375.4263610839844]},{"page":178,"text":"A-8. Task organizing a formation for employment at EAB requires detailed planning and staff analysis.","rect":[89.9659194946289,401.9996337890625,522.046701669693,392.9460144042969]},{"page":178,"text":"Normally, these units are modular forces that require various enablers and augmentation based on","rect":[89.9559555053711,413.4038391113281,522.0077710151672,404.3502197265625]},{"page":178,"text":"METT-TC (I) and staff analysis to answer the division or corps commander’s PIRs.","rect":[89.9559555053711,424.9275207519531,424.60108399391177,415.8739013671875]},{"page":178,"text":"A-4","rect":[72.0,754.0800170898438,86.48099737548829,747.6090087890625]},{"page":178,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":178,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":179,"text":"Appendix B","rect":[281.6400146484375,125.59198760986328,348.38519140625,114.64798736572266]},{"page":179,"text":"Annex L (Information Collection)","rect":[191.0399932861328,150.0956573486328,438.9898203935623,135.14112854003907]},{"page":179,"text":"Format and Instructions","rect":[223.4387969970703,165.41726684570313,406.43458155441285,153.63877868652345]},{"page":179,"text":"B-1. Appendix B provides fundamental considerations, formats, and instructions for developing Annex L","rect":[108.0,198.10142517089845,540.0847055311203,189.0477752685547]},{"page":179,"text":"(Information Collection) in Army plans and orders. Annex L provides a format for the annex that can be","rect":[108.0,209.6251678466797,540.0627429466248,200.57151794433595]},{"page":179,"text":"modified to meet the requirements of the base order and operations and for an example information collection","rect":[107.99004364013672,221.00941467285157,540.0449414253235,211.97569274902345]},{"page":179,"text":"plan. This annex follows the five-paragraph attachment format.","rect":[107.99008178710938,232.55308532714845,360.93421387672427,223.4994354248047]},{"page":179,"text":"B-2. The information collection annex describes how information collection activities support the offensive,","rect":[107.98011779785156,250.05274963378907,539.9594824314117,241.01902770996095]},{"page":179,"text":"defensive, and stability or defense support of civil authority operations throughout the conduct of the","rect":[107.98011779785156,261.5964050292969,540.088682888031,252.5427703857422]},{"page":179,"text":"operation described in the base order. Annex L synchronizes activities in time, space, and purpose to achieve","rect":[107.98011016845703,273.1201477050781,540.0877673606873,264.0665283203125]},{"page":179,"text":"objectives and accomplish the commander’s intent for reconnaissance, surveillance, and intelligence","rect":[107.98011016845703,284.64385986328127,540.061094997406,275.58026123046877]},{"page":179,"text":"operations (including military intelligence disciplines). The G-3 (S-3), in conjunction with the G-2 (S-2), is","rect":[107.98011016845703,296.0480651855469,540.0090835695266,286.9844665527344]},{"page":179,"text":"responsible for this annex.","rect":[107.97017669677735,307.5518493652344,213.65970826148988,298.51812744140627]},{"page":179,"text":"[CLASSIFICATION]","rect":[265.44000244140627,331.8127136230469,357.91775423145296,323.257080078125]},{"page":179,"text":"Place the classification at the top and bottom of every page of the attachments. Place the","rect":[112.08000183105469,349.5413818359375,517.0038440208435,340.4877624511719]},{"page":179,"text":"classification marking (TS), (S), I, or (U) at the front","rect":[112.02030944824219,361.0650939941406,336.4141131649017,352.011474609375]},{"page":179,"text":"of","rect":[343.49072265625,361.0650939941406,351.2993670711517,352.011474609375]},{"page":179,"text":"each paragraph and subparagraph in","rect":[358.25146484375,361.0650939941406,516.8454480171204,352.011474609375]},{"page":179,"text":"parentheses. Refer to AR 380-5 for classification and release marking instructions.","rect":[112.03022766113281,372.46929931640627,444.13648438453677,363.4156799316406]},{"page":179,"text":"Include the full heading","rect":[112.08000183105469,457.6614074707031,213.78155946731568,448.6077880859375]},{"page":179,"text":"level attachment.","rect":[112.10002136230469,467.0337829589844,180.34594178199769,460.0119934082031]},{"page":179,"text":"if","rect":[218.52252197265626,457.6614074707031,224.05032837486267,448.6077880859375]},{"page":179,"text":"attachment","rect":[228.84109497070313,455.62957763671877,273.2527362117767,448.6077880859375]},{"page":179,"text":"is","rect":[277.9239501953125,455.62957763671877,284.5573013429642,449.1854553222656]},{"page":179,"text":"Copy ## of ## copies","rect":[427.79998779296877,393.8214111328125,515.068501294136,384.9271545410156]},{"page":179,"text":"Issuing headquarters","rect":[424.9215393066406,405.3451232910156,515.0724990968704,396.45086669921877]},{"page":179,"text":"Place of issue","rect":[458.50665283203127,414.7374267578125,515.0097339134217,407.8550720214844]},{"page":179,"text":"Date-time group of signature","rect":[391.7846374511719,428.2730407714844,514.8802478294373,419.3787841796875]},{"page":179,"text":"Message reference number","rect":[400.180908203125,439.7967834472656,515.001768825531,430.9124755859375]},{"page":179,"text":"distributed separately from the base order or higher-","rect":[289.32818603515627,457.6614074707031,516.9341726884842,448.6077880859375]},{"page":179,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[112.08000183105469,487.38201904296877,401.0514105548859,478.6570739746094]},{"page":179,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[112.08999633789063,499.0650939941406,376.86660677051546,490.17083740234377]},{"page":179,"text":"(U) References: List documents essential to understanding Annex L.","rect":[112.08000183105469,516.8214721679688,386.73697876930239,507.767822265625]},{"page":179,"text":"a. List maps and charts","rect":[130.0800018310547,535.1614990234375,231.8881424074173,526.1278076171875]},{"page":179,"text":"numbers, edition, and scale.","rect":[112.09224700927735,544.6732788085938,224.7478277683258,537.6514892578125]},{"page":179,"text":"PLAN/ORDER","rect":[405.61114501953127,485.5394287109375,471.60509097480777,478.6570739746094]},{"page":179,"text":"country, sheet","rect":[414.84637451171877,535.1814575195313,473.0685015926361,526.1278076171875]},{"page":179,"text":"[number]","rect":[476.29730224609377,487.21270751953127,516.8056326494217,478.8064880371094]},{"page":179,"text":"names or","rect":[477.73382568359377,533.1495971679688,516.8865860109329,528.6376953125]},{"page":179,"text":"b. List other references in subparagraphs labeled as shown.","rect":[130.0800018310547,564.5814208984375,369.717600107193,555.5277709960938]},{"page":179,"text":"c. Doctrinal references for this annex include FM 2-0 and FM 6-0.","rect":[130.0800018310547,582.94140625,397.2968542575836,573.8877563476563]},{"page":179,"text":"[page number]","rect":[288.00579833984377,617.5125732421875,351.0705252275467,608.7776489257813]},{"page":179,"text":"[CLASSIFICATION]","rect":[277.55999755859377,628.57275390625,370.26467805957796,620.01708984375]},{"page":179,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":179,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":179,"text":"B-1","rect":[525.4829711914063,754.0800170898438,539.9639609375,747.6090087890625]},{"page":180,"text":"Appendix B","rect":[72.0,46.164024353027347,122.17770275878907,37.956024169921878]},{"page":180,"text":"[CLASSIFICATION]","rect":[247.4399871826172,84.25272369384766,339.91775423145296,75.69708251953125]},{"page":180,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[94.08000183105469,95.82206726074219,383.0514105548859,87.09710693359375]},{"page":180,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[94.08999633789063,107.50517272949219,358.86660677051546,98.61088562011719]},{"page":180,"text":"PLAN/ORDER","rect":[387.61114501953127,93.9794692993164,453.60509097480777,87.09710693359375]},{"page":180,"text":"[number]","rect":[458.29730224609377,95.65274810791016,498.80560213184358,87.24650573730469]},{"page":180,"text":"(U) Time Zone Used Throughout the Plan/Order: Write the time zone established in the base plan","rect":[94.08000183105469,136.9014129638672,498.6652112007141,127.84777069091797]},{"page":180,"text":"or order.","rect":[94.080078125,146.393310546875,130.16316437721253,139.3715057373047]},{"page":180,"text":"1. (U) Situation.","rect":[94.080078125,162.7820281982422,161.71837830543519,154.04710388183595]},{"page":180,"text":"a. (U) Area of Interest. Refer to Annex B (Intelligence) or Appendix 2 (Operation Overlay) to","rect":[113.63999938964844,177.46141052246095,489.04231691360476,168.4077606201172]},{"page":180,"text":"Annex C (Operations).","rect":[104.63999938964844,188.9615020751953,195.4552710056305,179.9277801513672]},{"page":180,"text":"b. (U) Area of Operations. Refer to Appendix 2 (Operation Overlay) to Annex C (Operations).","rect":[112.0801010131836,203.50144958496095,487.402658700943,194.4477996826172]},{"page":180,"text":"(1) (U) Terrain. Describe the aspects of terrain that impact information collection. Refer","rect":[123.23880004882813,217.9014129638672,496.6156509523392,208.84776306152345]},{"page":180,"text":"to Annex B (Intelligence) as required.","rect":[95.63999938964844,229.42137145996095,246.9323980808258,220.3677215576172]},{"page":180,"text":"(2) (U) Weather. Describe the aspects of weather that impact information collection.","rect":[123.23915100097656,243.94139099121095,472.10807251930239,234.8877410888672]},{"page":180,"text":"Refer to Annex B (Intelligence) as required.","rect":[95.63999938964844,255.46141052246095,272.0116674900055,246.4077606201172]},{"page":180,"text":"c. (U) Enemy Forces. Refer to Annex B (Intelligence) as required.","rect":[112.08395385742188,269.9830627441406,375.69132447242739,260.92779541015627]},{"page":180,"text":"d. (U) Friendly Forces. Refer to base order, Annex A (Task Organization) and Annex C (Operations)","rect":[112.08000183105469,284.3813781738281,514.6193838701248,275.3277587890625]},{"page":180,"text":"as required.","rect":[95.63999938964844,295.8814697265625,143.96592164039613,286.8477478027344]},{"page":180,"text":"e. (U) Interagency, Governmental, and Nongovernmental Organizations. Identify and describe","rect":[113.6377182006836,310.42138671875,498.54424929428105,301.3677673339844]},{"page":180,"text":"other organizations in the area of operations that may impact the conduct of operations or","rect":[97.08000183105469,321.9413757324219,498.7768142824173,312.88775634765627]},{"page":180,"text":"implementation of information collection-specific equipment and tactics. Refer to Annex V ","rect":[97.09994506835938,333.465087890625,501.236887216568,324.4114685058594]},{"page":180,"text":"(Interagency Coordination) as required.","rect":[97.10990142822266,344.9888000488281,258.72086548805239,335.9351806640625]},{"page":180,"text":"f. (U) Civil Considerations. Describe the critical aspects of the civil situation that impact","rect":[115.07775115966797,359.3813781738281,498.95625794029237,350.3273620605469]},{"page":180,"text":"information","rect":[97.08000183105469,370.9013671875,144.291401386261,361.8477478027344]},{"page":180,"text":"collection activities.","rect":[151.31219482421876,368.8695373535156,236.36063599586488,361.8477478027344]},{"page":180,"text":"Refer to Appendix 1","rect":[243.35256958007813,370.9013671875,336.41881227493288,361.8477478027344]},{"page":180,"text":"(Intelligence","rect":[343.3210754394531,370.9013671875,393.9477832298279,361.8477478027344]},{"page":180,"text":"Estimate)","rect":[400.91973876953127,370.8814697265625,439.15420442676546,361.8477478027344]},{"page":180,"text":"to Annex B","rect":[446.03857421875,368.8695373535156,498.8066598768234,362.0170593261719]},{"page":180,"text":"(Intelligence) and Annex K (Civil Affairs Operations) as required.","rect":[97.080078125,382.4250793457031,361.5479528903961,373.3714599609375]},{"page":180,"text":"g. (U) Attachments and Detachments. If pertinent, list units or assets attached to or detached","rect":[115.07775115966797,396.9413757324219,498.8885998725891,387.8831787109375]},{"page":180,"text":"from the issuing headquarters. State when each attachment or detachment is effective (for example,","rect":[97.08000183105469,408.4613952636719,498.94410157203677,399.40777587890627]},{"page":180,"text":"on order, on commitment of the reserve) if different from the effective time of the base plan or order.","rect":[97.08999633789063,419.8656005859375,498.695139169693,410.8119812011719]},{"page":180,"text":"Do not repeat information already listed in Annex A (Task Organization).","rect":[97.08999633789063,431.3893127441406,392.8322546482086,422.335693359375]},{"page":180,"text":"h. (U) Assumptions.","rect":[115.07775115966797,445.8811340332031,200.96282410621644,436.847412109375]},{"page":180,"text":"annex development.","rect":[97.08000183105469,457.4014892578125,176.61060547828675,448.3677673339844]},{"page":180,"text":"List any information collection-specific assumptions","rect":[206.032470703125,445.9013671875,425.30409699726109,436.8477478027344]},{"page":180,"text":"that support the","rect":[430.31402587890627,445.8814697265625,498.6993396263123,436.8477478027344]},{"page":180,"text":"2. (U) Mission. State the mission of information collection in support of the operation—a short","rect":[97.07999420166016,471.9413757324219,498.74690735435487,462.88775634765627]},{"page":180,"text":"description of the who, what (task), when, where, and why (purpose) that clearly indicates the action","rect":[97.08000183105469,483.4613952636719,498.7866711616516,474.40777587890627]},{"page":180,"text":"to be taken and the reason for doing so.","rect":[97.08992004394531,494.985107421875,255.941965341568,485.9314880371094]},{"page":180,"text":"3. (U) Execution.","rect":[97.0799560546875,509.357421875,168.81192994117738,500.3236999511719]},{"page":180,"text":"a. (U) Concept of Operations. This is a statement of the overall information collection","rect":[115.08000183105469,523.9014282226563,498.75914430618288,514.8477783203125]},{"page":180,"text":"objective. ","rect":[97.08000183105469,535.4214477539063,138.21778321266175,526.3677978515625]},{"page":180,"text":"Describe ","rect":[141.48468017578126,534.0,179.96712708473206,526.3677978515625]},{"page":180,"text":"how ","rect":[185.2758026123047,533.3895874023438,204.448801279068,526.3677978515625]},{"page":180,"text":"the ","rect":[209.87701416015626,533.3895874023438,224.727365732193,526.3677978515625]},{"page":180,"text":"tasks ","rect":[230.15557861328126,533.3895874023438,252.56556153297425,526.3677978515625]},{"page":180,"text":"or","rect":[257.7547302246094,533.3895874023438,266.66893464374547,528.877685546875]},{"page":180,"text":"missions of reconnaissance,","rect":[274.5572509765625,535.4214477539063,397.4039099216461,526.3677978515625]},{"page":180,"text":"surveillance,","rect":[405.35198974609377,534.0,456.68583130836489,526.3677978515625]},{"page":180,"text":"security,","rect":[464.6339111328125,535.4214477539063,498.6801550388336,526.9454956054688]},{"page":180,"text":"intelligence operations, and so forth support the commander’s intent and the maneuver plan. Direct","rect":[97.08003997802735,546.9451293945313,498.7419635066986,537.8914794921875]},{"page":180,"text":"the manner in which each element of the force cooperates to accomplish the key information","rect":[97.09003448486328,558.3493041992188,498.79671144485476,549.295654296875]},{"page":180,"text":"collection tasks and ties that to support of the operation with task and purpose statement. Must","rect":[97.09994506835938,569.873046875,498.91621887779237,560.8193969726563]},{"page":180,"text":"describe, at minimum, the overall scheme of maneuver and concept of fires. Refer to Appendix 1","rect":[97.15967559814453,581.3967895507813,499.075581073761,572.3431396484375]},{"page":180,"text":"(Information Collection Plan) to Annex L (Information Collection). The following subparagraphs","rect":[97.13980865478516,592.9204711914063,498.93614655780797,583.8668212890625]},{"page":180,"text":"are examples. Omit what is unnecessary for brevity.","rect":[97.1497573852539,604.4442138671875,316.7448523044586,595.3905639648438]},{"page":180,"text":"(1) (U) Movement and Maneuver. Provide the scheme of movement and maneuver for","rect":[133.07550048828126,618.94140625,498.6617935304642,609.8877563476563]},{"page":180,"text":"collection assets and any other unit given a key information collection task, in accordance with","rect":[97.08000183105469,630.3414306640625,498.6941113471985,621.2877807617188]},{"page":180,"text":"the concept of operations in the base order (paragraph 3b) and Annex C (Operations). Describe","rect":[97.11985778808594,641.8651733398438,498.5994861106873,632.8115234375]},{"page":180,"text":"the employment of information collection assets in relation to the rest of the force and state the","rect":[97.09994506835938,653.3888549804688,498.7668445091248,644.335205078125]},{"page":180,"text":"method forces will enter the area of operations.","rect":[97.1497573852539,664.9125366210938,287.9136755466461,655.85888671875]},{"page":180,"text":"[page number]","rect":[265.55999755859377,685.3013916015625,328.51714998340608,676.5664672851563]},{"page":180,"text":"[CLASSIFICATION]","rect":[250.6800079345703,696.4927368164063,343.15777498340608,687.9370727539063]},{"page":180,"text":"B-2","rect":[72.0,754.0800170898438,86.48099737548829,747.6090087890625]},{"page":180,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":180,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":181,"text":"Annex L (Information Collection)","rect":[400.44000244140627,46.28102493286133,539.9958403320312,37.8480224609375]},{"page":181,"text":"Format and Instructions","rect":[437.03399658203127,54.822021484375,540.0768149414063,48.180023193359378]},{"page":181,"text":"[CLASSIFICATION]","rect":[265.44000244140627,85.33267974853516,357.78912263965608,76.77703857421875]},{"page":181,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[115.08000183105469,103.02201843261719,401.9001044025421,94.29705810546875]},{"page":181,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[115.10986328125,114.70512390136719,379.90640169239046,105.81083679199219]},{"page":181,"text":"PLAN/ORDER","rect":[405.98175048828127,101.1794204711914,471.9766424884796,94.29705810546875]},{"page":181,"text":"[number]","rect":[476.30926513671877,102.85269927978516,516.8185721025467,94.44645690917969]},{"page":181,"text":"(2)","rect":[151.0800018310547,143.9615020751953,162.7929678544998,134.9277801513672]},{"page":181,"text":"(U) Intelligence.","rect":[169.67532348632813,143.98143005371095,240.08255982398988,134.9277801513672]},{"page":181,"text":"Describe the intelligence","rect":[246.9549560546875,143.98143005371095,355.6683642845154,134.9277801513672]},{"page":181,"text":"collection. Refer to Annex B (Intelligence) as required.","rect":[115.08000183105469,155.50144958496095,335.00675415992739,146.4477996826172]},{"page":181,"text":"concept ","rect":[362.5208435058594,143.9615020751953,396.3350622653961,136.0]},{"page":181,"text":"for","rect":[400.68756103515627,143.98143005371095,412.3606765871048,134.9277801513672]},{"page":181,"text":"supporting ","rect":[419.17333984375,143.98143005371095,465.1088354587555,135.50546264648438]},{"page":181,"text":"information","rect":[469.4613342285156,143.98143005371095,516.7922558784485,134.9277801513672]},{"page":181,"text":"(3) (U) Fires. Describe the concept of fires in support of information collection. Identify","rect":[151.075439453125,170.0214080810547,516.6637561302185,160.96775817871095]},{"page":181,"text":"which information collection assets have priority of fires and the coordinating purpose of,","rect":[115.08000183105469,181.42137145996095,516.5177710056305,172.3677215576172]},{"page":181,"text":"priorities for, allocation of, and restrictions on fire support and fire support coordinating measures.","rect":[115.03018951416016,192.9451141357422,516.536691904068,183.89146423339845]},{"page":181,"text":"Refer to Annex D (Fires) as required.","rect":[115.06008911132813,204.4687957763672,266.232980966568,195.41514587402345]},{"page":181,"text":"(4) (U) Protection. Describe protection support to information collection. Refer to Annex","rect":[151.075439453125,218.98143005371095,516.791319606781,209.92686462402345]},{"page":181,"text":"E (Protection) as required.","rect":[115.08000183105469,230.4815216064453,223.27549195289613,221.4477996826172]},{"page":181,"text":"(5) (U) Engineer. Describe engineer support, if applicable, to information collection.","rect":[151.075439453125,245.0231170654297,516.6717627048492,235.96775817871095]},{"page":181,"text":"Identify priority of mobility and survivability assets. Refer to Annex G (Engineer) as required.","rect":[115.08000183105469,256.5414123535156,490.75525879859927,247.48777770996095]},{"page":181,"text":"(6) (U) Sustainment. Describe sustainment support to information collection as required. Refer","rect":[149.64120483398438,270.9413757324219,535.4465225343704,261.88775634765627]},{"page":181,"text":"to Annex F (Sustainment).","rect":[113.63999938964844,282.4414978027344,218.23990845680238,273.40777587890627]},{"page":181,"text":"(7) (U) Signal. Describe signal support to information collection as required. Refer to AnnexH","rect":[149.63543701171876,296.9830627441406,535.2812689533233,287.9277648925781]},{"page":181,"text":"(Signal).","rect":[113.63999938964844,308.5013732910156,148.28087830543519,299.44775390625]},{"page":181,"text":"(8) (U) Soldier and Leader Engagement. State overall concept for synchronizing information","rect":[149.63543701171876,323.0213928222656,534.4147534370422,313.9677734375]},{"page":181,"text":"collection with Soldier and leader engagement. Refer to coordinating instructions in Annex C ","rect":[115.08000183105469,337.42138671875,520.1731054782867,328.3677673339844]},{"page":181,"text":"(Operations).","rect":[115.08003997802735,348.9252014160156,169.05327820777894,339.8914794921875]},{"page":181,"text":"(9)","rect":[149.6412353515625,363.4369201660156,161.35420137500763,354.4031982421875]},{"page":181,"text":"(U)","rect":[169.19271850585938,363.4369201660156,183.06700044727325,354.4031982421875]},{"page":181,"text":"Assessment.","rect":[190.905517578125,362.0,240.32578492164613,354.572509765625]},{"page":181,"text":"If","rect":[248.15435791015626,363.4613952636719,254.2797595272064,354.40777587890627]},{"page":181,"text":"required, ","rect":[262.0684814453125,363.4414978027344,301.6295874118805,354.40777587890627]},{"page":181,"text":"describe ","rect":[307.05780029296877,362.0,343.5114233493805,354.40777587890627]},{"page":181,"text":"the ","rect":[348.8200988769531,362.0,363.55094361305239,354.40777587890627]},{"page":181,"text":"priorities ","rect":[368.859619140625,363.4414978027344,408.669748544693,354.9854431152344]},{"page":181,"text":"for ","rect":[413.9784240722656,363.4613952636719,428.2311804294586,354.40777587890627]},{"page":181,"text":"assessment ","rect":[433.53985595703127,362.0,480.55106568336489,355.7125244140625]},{"page":181,"text":"for ","rect":[485.8597412109375,363.4613952636719,500.1124975681305,354.40777587890627]},{"page":181,"text":"the","rect":[505.42120361328127,362.0,517.7616565208435,354.40777587890627]},{"page":181,"text":"information collection plan and identify the measures of effectiveness used to assess end state","rect":[113.63999938964844,374.98138427734377,517.6574084739685,365.9277648925781]},{"page":181,"text":"conditions and objectives. Refer to Annex M (Assessment) as required.","rect":[113.63996124267578,386.5050964355469,398.37647461891177,377.45147705078127]},{"page":181,"text":"b. (U) Tasks to Subordinate Units. State the information collection task assigned to each unit","rect":[131.63768005371095,400.9013671875,517.7393389949799,391.84368896484377]},{"page":181,"text":"not identified in the base order. Refer to Appendix 1 (Information Collection Plan) to Annex L","rect":[113.63999938964844,412.42138671875,517.8465979118347,403.3677673339844]},{"page":181,"text":"(Information Collection) as required. ","rect":[113.66986083984375,423.9450988769531,265.90845704078677,414.8914794921875]},{"page":181,"text":"(1) (U) Information Collection Support Tasks for Maneuver Units.","rect":[149.63540649414063,438.4414978027344,415.15369629859927,429.4031677246094]},{"page":181,"text":"(a) (U) Tasks to Maneuver Unit 1.","rect":[181.1999969482422,452.96148681640627,317.72168946266177,443.9277648925781]},{"page":181,"text":"(b) (U) Tasks to Maneuver Unit 2.","rect":[181.1999969482422,467.4814758300781,318.32032227516177,458.44775390625]},{"page":181,"text":"(c) (U) Tasks to Maneuver Unit 3.","rect":[181.1999969482422,482.0014953613281,317.72168946266177,472.9677734375]},{"page":181,"text":"[page number]","rect":[283.55999755859377,525.46142578125,346.51714998340608,516.7265014648438]},{"page":181,"text":"[CLASSIFICATION]","rect":[268.67999267578127,536.6527099609375,361.15777498340608,528.0970458984375]},{"page":181,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":181,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":181,"text":"B-3","rect":[525.4829711914063,754.1790161132813,539.9639609375,747.6090087890625]},{"page":182,"text":"Appendix B","rect":[72.0,46.164024353027347,122.17770275878907,37.956024169921878]},{"page":182,"text":"[CLASSIFICATION]","rect":[243.0,85.33267974853516,335.3491201982498,76.77703857421875]},{"page":182,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[97.08000183105469,103.02201843261719,383.9001044025421,94.29705810546875]},{"page":182,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[97.10986328125,114.70512390136719,361.90640169239046,105.81083679199219]},{"page":182,"text":"PLAN/ORDER","rect":[387.98175048828127,101.1794204711914,453.9766424884796,94.29705810546875]},{"page":182,"text":"[number]","rect":[458.30926513671877,102.85269927978516,498.8185721025467,94.44645690917969]},{"page":182,"text":"(2) (U) Information Collection Support Tasks for Support Units. Direct units to observe","rect":[127.31999969482422,143.72145080566407,498.3509509544373,134.68772888183595]},{"page":182,"text":"and report in accordance with Appendix 1 (Information Collection Plan) to Annex L","rect":[127.31999969482422,155.2613983154297,498.3798315544128,146.20774841308595]},{"page":182,"text":"(Information Collection).","rect":[127.31999969482422,166.78514099121095,228.32535767555238,157.7314910888672]},{"page":182,"text":"(a) (U) Military Intelligence. Refer to Annex B (Intelligence) as required.","rect":[151.08456420898438,181.3014373779297,443.9737341403961,172.2432098388672]},{"page":182,"text":"(b) (U) Engineer. Refer to Annex G (Engineer) as required.","rect":[151.0800018310547,195.82139587402345,388.39689087867739,186.7677459716797]},{"page":182,"text":"(c) (U) Fires. Refer to Annex D (Fires) as required.","rect":[151.0800018310547,210.34141540527345,355.88749146461489,201.2877655029297]},{"page":182,"text":"(d) (U) Signal. Refer to Annex H (Signal) as required.","rect":[151.0800018310547,224.7413787841797,366.44507813453677,215.68772888183595]},{"page":182,"text":"(e) (U) Sustainment. Refer to Annex F (Sustainment) as required.","rect":[151.0800018310547,239.2613983154297,411.79297852516177,230.20774841308595]},{"page":182,"text":"(f) (U) Protection. Refer to Annex E (Protection) as required.","rect":[151.0800018310547,253.7814178466797,396.29520630836489,244.72776794433595]},{"page":182,"text":"(g) (U) Civil Affairs. Refer to Annex K (Civil Affairs Operations) as required.","rect":[151.0800018310547,268.3014221191406,462.42957520484927,259.247802734375]},{"page":182,"text":"c. (U) Coordinating Instructions. List only instructions applicable or not covered in unit","rect":[115.08000183105469,282.8214111328125,498.47029602622987,273.7677917480469]},{"page":182,"text":"standard operating procedures (SOPs).","rect":[97.08000183105469,294.3414001464844,254.98583436012269,285.28778076171877]},{"page":182,"text":"(1) (U) Time or Condition When the Plan Becomes Effective.","rect":[131.28262329101563,308.7236633300781,377.73023438453677,299.6877746582031]},{"page":182,"text":"(2) (U) Priority Intelligence Requirements. List priority intelligence requirements (PIRs)","rect":[131.63999938964845,323.26141357421877,498.39211946582796,314.2077941894531]},{"page":182,"text":"here, the information collection tasks associated with them, and the latest time information is of value","rect":[95.63999938964844,334.7814025878906,498.2431628684998,325.727783203125]},{"page":182,"text":"for each PIR.","rect":[95.65994262695313,346.30511474609377,149.39414429664613,337.2514953613281]},{"page":182,"text":"(3) (U) Essential Elements","rect":[133.0796661376953,360.79693603515627,244.95172578144074,351.76318359375]},{"page":182,"text":"information (EEFIs) here.","rect":[97.08000183105469,372.3414001464844,201.9189703464508,363.28778076171877]},{"page":182,"text":"of Friendly Information.","rect":[249.2335205078125,360.8214111328125,350.59644532203677,351.7677917480469]},{"page":182,"text":"List essential elements","rect":[354.948974609375,358.7895812988281,448.57494050312047,351.7677917480469]},{"page":182,"text":"of ","rect":[452.85577392578127,360.8214111328125,463.14444947242739,351.7677917480469]},{"page":182,"text":"friendly","rect":[467.0189208984375,360.8214111328125,498.32403445053105,351.7677917480469]},{"page":182,"text":"(4) (U) Fire Support","rect":[133.07545471191407,386.7237243652344,220.07463562583923,377.6877746582031]},{"page":182,"text":"Establish no fire areas.","rect":[97.08000183105469,398.26141357421877,190.17612671852113,389.2077941894531]},{"page":182,"text":"Coordination Measures.","rect":[224.74188232421876,384.73944091796877,322.28016114234927,377.6877746582031]},{"page":182,"text":"List","rect":[326.9912109375,384.7095642089844,341.8804217586517,378.0065002441406]},{"page":182,"text":"fire support coordination","rect":[348.4749450683594,386.74139404296877,453.652485370636,377.6877746582031]},{"page":182,"text":"measures.","rect":[458.27392578125,384.7095642089844,498.3331091403961,380.19769287109377]},{"page":182,"text":"(5) (U) Intelligence Handover Lines with Adjacent Units. Identify handover guidance","rect":[133.075439453125,412.7814025878906,498.4626452903748,403.7178039550781]},{"page":182,"text":"and parameters; refer to necessary graphics or attachments as required.","rect":[97.08000183105469,424.3013916015625,387.61316895484927,415.2477722167969]},{"page":182,"text":"(6) (U) Limits of Advance, Limits of Reconnaissance, and Quick Reaction Force","rect":[133.07542419433595,438.68365478515627,498.64385866928105,429.64776611328127]},{"page":182,"text":"Response Instructions. Identify as required, referencing graphical depictions in attachments or","rect":[97.08000183105469,450.2214050292969,498.3086746339798,441.16778564453127]},{"page":182,"text":"instructions as needed.","rect":[97.08000183105469,459.7294921875,191.012766122818,452.6877746582031]},{"page":182,"text":"(7) (U) Airspace Coordinating Measures. List airspace coordinating measures.","rect":[133.075439453125,476.26141357421877,447.68653321266177,467.2077941894531]},{"page":182,"text":"(8) (U) Intelligence Coordination Measures. List information such as restrictions on","rect":[133.0800018310547,490.7814025878906,498.17772340774538,481.727783203125]},{"page":182,"text":"international borders or other limitations and the coordination or special instructions that","rect":[133.0800018310547,502.281494140625,498.5920916805267,493.2477722167969]},{"page":182,"text":"apply. Identify what unit is responsible for coordinating information collection activities in","rect":[133.06005859375,513.7056274414063,498.263325214386,504.6519775390625]},{"page":182,"text":"relation to the area of operations.","rect":[133.04010009765626,525.2293090820313,269.22318482398989,516.1756591796875]},{"page":182,"text":"[page number]","rect":[265.55999755859377,568.7814331054688,328.51714998340608,560.0465087890625]},{"page":182,"text":"[CLASSIFICATION]","rect":[250.6800079345703,579.9727783203125,343.15777498340608,571.4171142578125]},{"page":182,"text":"B-4","rect":[72.0,754.0800170898438,86.48099737548829,747.6090087890625]},{"page":182,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":182,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":183,"text":"Annex L (Information Collection)","rect":[400.44000244140627,46.28102493286133,539.99309375,37.8480224609375]},{"page":183,"text":"Format and Instructions","rect":[437.03399658203127,54.822021484375,540.0768149414063,48.180023193359378]},{"page":183,"text":"[CLASSIFICATION]","rect":[261.0,85.33267974853516,353.47857576465608,76.77703857421875]},{"page":183,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[115.07603454589844,100.02366638183594,402.60826480293277,91.2987060546875]},{"page":183,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[115.09593200683594,111.70677185058594,379.8725576982498,102.81248474121094]},{"page":183,"text":"PLAN/ORDER","rect":[406.9339294433594,98.18106842041016,472.8093451251984,91.2987060546875]},{"page":183,"text":"[number]","rect":[477.261474609375,99.8543472290039,517.7707815752029,91.44810485839844]},{"page":183,"text":"(9) (U) Rules of Engagement. Refer to Appendix 11 (Rules of Engagement) to AnnexC","rect":[149.63999938964845,140.8613739013672,516.8951205625534,131.80772399902345]},{"page":183,"text":"(Operations) as required.","rect":[113.63999938964844,152.36146545410157,216.19809937477113,143.32774353027345]},{"page":183,"text":"(10) (U)Risk Reduction ControlMeasures.State reconnaissance, surveillance, and security-","rect":[149.63543701171876,166.9014129638672,516.7854910478592,157.84776306152345]},{"page":183,"text":"specific guidance such as fratricide prevention measures not included in SOPs, referring to","rect":[113.63999938964844,178.42137145996095,516.7421154975891,169.3677215576172]},{"page":183,"text":"Annex E (Protection) as required.","rect":[113.60018157958985,189.92518615722657,249.16575074195863,180.89146423339845]},{"page":183,"text":"(11) (U) Environmental Considerations. Refer to Appendix 5 (Environmental Considerations) to","rect":[149.63546752929688,204.34141540527345,535.126850605011,195.2836151123047]},{"page":183,"text":"Annex G (Engineer) as required.","rect":[149.63999938964845,218.8613739013672,280.7634069919586,209.80772399902345]},{"page":183,"text":"(12)","rect":[149.63999938964845,233.3631134033203,166.27320772266388,224.3293914794922]},{"page":183,"text":"(U)","rect":[171.5918426513672,233.36146545410157,185.46612459278107,224.32774353027345]},{"page":183,"text":"Other Coordinating","rect":[190.90428161621095,233.3813934326172,271.48067140579226,224.32774353027345]},{"page":183,"text":"Instructions.","rect":[276.8192443847656,231.36947631835938,326.2308142185211,224.32774353027345]},{"page":183,"text":"List","rect":[331.65899658203127,231.34954833984376,346.54820740318299,224.64646911621095]},{"page":183,"text":"only instructions","rect":[351.93756103515627,233.3813934326172,421.8069656496048,224.32774353027345]},{"page":183,"text":"more subordinate units not covered in the base plan or order.","rect":[113.63999938964844,244.88148498535157,360.3392126560211,235.84776306152345]},{"page":183,"text":"applicable to","rect":[427.1754150390625,233.36146545410157,482.5529980659485,224.32774353027345]},{"page":183,"text":"two","rect":[488.01104736328127,231.34954833984376,502.35445070266726,225.63250732421876]},{"page":183,"text":"or","rect":[507.8115234375,231.34954833984376,516.6061905031204,226.83767700195313]},{"page":183,"text":"4. (U) Sustainment. Describe any sustainment requirements, subparagraphs may include:","rect":[113.63996124267578,259.4213562011719,475.7158404598236,250.3677215576172]},{"page":183,"text":"a. (U) Logistics. Identify unique sustainment requirements, procedures, and guidance to","rect":[131.63999938964845,273.8213806152344,516.763325214386,264.76776123046877]},{"page":183,"text":"support information collection. Specify procedures for specialized technical logistics support from","rect":[113.63999938964844,285.3414001464844,516.6315497150421,276.28778076171877]},{"page":183,"text":"external organizations as necessary. Use subparagraphs to identify priorities and specific","rect":[113.67981719970703,296.8651123046875,516.8795154075623,287.8114929199219]},{"page":183,"text":"instructions for information","rect":[113.69978332519531,308.3888244628906,226.556538105011,299.335205078125]},{"page":183,"text":"collection","rect":[232.61221313476563,306.35699462890627,272.030903339386,299.335205078125]},{"page":183,"text":"logistics support. Refer","rect":[278.0895690917969,308.3888244628906,377.83702546405797,299.335205078125]},{"page":183,"text":"to Annex F (Sustainment)","rect":[383.7950439453125,308.3689270019531,496.0541983232498,299.335205078125]},{"page":183,"text":"and","rect":[501.97039794921877,306.35699462890627,516.7908825874329,299.335205078125]},{"page":183,"text":"Annex P (Host-Nation Support) as required.","rect":[113.64991760253906,319.8926696777344,294.23465943336489,310.85894775390627]},{"page":183,"text":"b.","rect":[131.6376953125,333.0,139.16745972633363,325.37066650390627]},{"page":183,"text":"(U)","rect":[144.95420837402345,334.4043884277344,158.8284903154373,325.37066650390627]},{"page":183,"text":"Personnel.","rect":[164.74473571777345,332.4123840332031,206.35991883277894,325.37066650390627]},{"page":183,"text":"Identify unique personnel","rect":[212.26620483398438,334.42138671875,321.34813416099549,325.3677673339844]},{"page":183,"text":"requirements and","rect":[327.09503173828127,334.4014892578125,400.82893800735476,325.3677673339844]},{"page":183,"text":"concerns,","rect":[406.8846435546875,333.0,445.489572763443,327.877685546875]},{"page":183,"text":"associated","rect":[451.28631591796877,332.3895568847656,493.46492433547976,325.3677673339844]},{"page":183,"text":"with","rect":[499.5225830078125,332.3895568847656,516.6209301948547,325.3677673339844]},{"page":183,"text":"information collection, including global sourcing support and contracted linguist requirements. Use","rect":[113.63999938964844,345.8214111328125,516.6903674583435,336.7677917480469]},{"page":183,"text":"subparagraphs to identify priorities and specific instructions for human resources support, financial","rect":[113.63004302978516,357.3451232910156,516.9613238582612,348.29150390625]},{"page":183,"text":"management, legal support, and religious support. Refer to Annex F (Sustainment) as required.","rect":[113.63004302978516,368.8688659667969,496.3022253513336,359.81524658203127]},{"page":183,"text":"c. (U) Health Service Support. Provide information including the health threat (endemic and","rect":[131.63778686523438,383.3813781738281,516.8031811714172,374.32696533203127]},{"page":183,"text":"epidemic diseases, state of health of the enemy forces, medical capabilities of the enemy force and","rect":[113.63999938964844,394.9013671875,516.6216015815735,385.8477478027344]},{"page":183,"text":"the civilian population), and medical evacuation routes, barriers, and significant terrain features.","rect":[113.60018157958985,406.3055725097656,516.6156103610992,397.251953125]},{"page":183,"text":"Refer to Appendix 3 (Health System Support) to Annex F (Sustainment) as required.","rect":[113.57028198242188,417.82928466796877,449.53101563453677,408.7756652832031]},{"page":183,"text":"5. (U) Command and Signal.","rect":[113.63996124267578,432.3414001464844,235.03248047828675,423.2873840332031]},{"page":183,"text":"a. (U) Command.","rect":[131.63999938964845,446.84149169921877,201.569162607193,437.8077697753906]},{"page":183,"text":"(1) (U) Location of the Commander and Key Leaders. List the location of the commander","rect":[151.0800018310547,461.3813781738281,516.7214859132766,452.3277587890625]},{"page":183,"text":"and key information collection leaders and staff officers.","rect":[115.08000183105469,472.9013671875,341.49073243141177,463.8477478027344]},{"page":183,"text":"(2) (U) Succession of Command. State the succession of command if not covered in the unit’s","rect":[151.07546997070313,487.42138671875,535.3209121828079,478.3677673339844]},{"page":183,"text":"SOPs.","rect":[113.63999938964844,499.8194580078125,138.32586121559144,492.9371032714844]},{"page":183,"text":"(3) (U) Liaison Requirements. State information collection liaison requirements not covered in","rect":[154.1999969482422,516.3414306640625,537.8791089057922,507.28778076171877]},{"page":183,"text":"the unit’s SOPs.","rect":[113.63999938964844,528.8594360351563,178.40390992164613,521.8077392578125]},{"page":183,"text":"b. (U) Control.","rect":[131.63771057128907,545.3614501953125,191.0016119480133,536.3277587890625]},{"page":183,"text":"(1) (U) Command Posts. Describe the employment of command posts, (CPs), including","rect":[154.1999969482422,559.9014282226563,517.899311542511,550.8477783203125]},{"page":183,"text":"the location of each CP and its time of opening and closing, as appropriate. State the primary","rect":[113.63999938964844,571.3014526367188,517.8268420677185,562.247802734375]},{"page":183,"text":"controlling CP for specific tasks or phases of the operation.","rect":[113.68984985351563,582.8251342773438,353.5366003513336,573.771484375]},{"page":183,"text":"(2) (U) Reports. List reports not covered in SOPs. Describe information","rect":[154.19717407226563,597.3414306640625,472.69090700149538,588.283203125]},{"page":183,"text":"reporting requirements for subordinate units. Refer to Annex R (Reports) as required.","rect":[113.63999938964844,608.8613891601563,457.07071900367739,599.8077392578125]},{"page":183,"text":"collection","rect":[478.3880615234375,595.3095703125,517.684223651886,588.2877807617188]},{"page":183,"text":"[page number]","rect":[292.4396057128906,655.6538696289063,355.5163260087967,646.9188842773438]},{"page":183,"text":"[CLASSIFICATION]","rect":[277.6789245605469,669.8468627929688,370.15753084278108,661.2911987304688]},{"page":183,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":183,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":183,"text":"B-5","rect":[525.4829711914063,754.1790161132813,539.9639609375,747.635986328125]},{"page":184,"text":"Appendix B","rect":[72.0,46.164024353027347,122.17770275878907,37.956024169921878]},{"page":184,"text":"[CLASSIFICATION]","rect":[247.4399871826172,85.33267974853516,339.78912263965608,76.77703857421875]},{"page":184,"text":"ANNEX L (INFORMATION COLLECTION) TO OPERATION","rect":[97.08000183105469,103.02201843261719,383.9001044025421,94.29705810546875]},{"page":184,"text":"[(code name)]—[issuing headquarters] [(classification of title)]","rect":[97.10986328125,114.70512390136719,361.8864431962967,105.81083679199219]},{"page":184,"text":"PLAN/ORDER","rect":[387.98175048828127,101.1794204711914,453.9766424884796,94.29705810546875]},{"page":184,"text":"[number]","rect":[458.30926513671877,102.85269927978516,498.8185721025467,94.44645690917969]},{"page":184,"text":"c. (U) Signal. List signal operating instructions for information collection as needed.","rect":[113.63999938964844,149.8613739013672,499.699533700943,140.80772399902345]},{"page":184,"text":"Consider","rect":[95.63999938964844,159.37942504882813,132.16132050800324,152.32774353027345]},{"page":184,"text":"operations ","rect":[141.246826171875,161.36146545410157,186.69431519508363,152.90542602539063]},{"page":184,"text":"security","rect":[193.3276824951172,161.3813934326172,225.10305666732789,152.90542602539063]},{"page":184,"text":"requirements. ","rect":[234.6118621826172,161.36146545410157,292.4117224216461,152.90542602539063]},{"page":184,"text":"Address","rect":[299.0450744628906,159.34954833984376,331.3573501710892,152.32774353027345]},{"page":184,"text":"any","rect":[340.56634521484377,161.3813934326172,355.0681140403748,154.83767700195313]},{"page":184,"text":"information","rect":[364.201416015625,161.3813934326172,411.420795917511,152.32774353027345]},{"page":184,"text":"collection ","rect":[420.60491943359377,159.34954833984376,462.57633423805239,152.32774353027345]},{"page":184,"text":"specific","rect":[469.2096862792969,161.3813934326172,499.66338991928105,152.32774353027345]},{"page":184,"text":"communications and digitization connectivity requirements. Refer to Annex H (Signal) as required.","rect":[95.63999938964844,172.90513610839845,493.2830603122711,163.8514862060547]},{"page":184,"text":"ACKNOWLEDGE: Include only if attachment is distributed separately from the base plan or order.","rect":[79.68000030517578,197.2613983154297,486.34681153297427,188.20774841308595]},{"page":184,"text":"[Commander’s last name]","rect":[259.697021484375,214.49221801757813,362.25515657520296,205.60789489746095]},{"page":184,"text":"[Commander’s rank]","rect":[259.697021484375,226.01589965820313,343.41079622364046,217.13157653808595]},{"page":184,"text":"The commander or authorized representative signs the original copy. If the representative signs the","rect":[79.68000030517578,243.58140563964845,499.85250735092168,234.5277557373047]},{"page":184,"text":"original, add the phrase “For the Commander.” The signed copy is the historical copy and remains in","rect":[79.74967956542969,254.86607360839845,499.7927441596985,245.8124237060547]},{"page":184,"text":"the headquarters’ files.","rect":[79.729736328125,266.2702941894531,172.8059332370758,257.2166748046875]},{"page":184,"text":"OFFICIAL","rect":[79.68000030517578,324.97943115234377,128.4441623106003,318.0970764160156]},{"page":184,"text":"[Authenticator’s ","rect":[79.68000030517578,341.20428466796877,147.56637024879456,332.3299255371094]},{"page":184,"text":"[Authenticator’s","rect":[79.67999267578125,352.7279968261719,145.3462722902298,343.8536376953125]},{"page":184,"text":"position]","rect":[79.67998504638672,364.41107177734377,115.27702241992951,355.3773498535156]},{"page":184,"text":"name]","rect":[157.31719970703126,341.2142333984375,182.11860567188263,332.4992370605469]},{"page":184,"text":"Use only if the commander does not sign the original attachment. If the commander signs the original,","rect":[79.67998504638672,378.9526672363281,499.61353516578677,369.8990478515625]},{"page":184,"text":"no further authentication is required. If the commander does not sign, the signature of the preparing ","rect":[79.64022064208985,390.47637939453127,502.12342286109927,381.4227600097656]},{"page":184,"text":"staff officer requires authentication and only the last name and rank of the commander appear in the","rect":[79.63018798828125,402.0000915527344,499.6842334251404,392.94647216796877]},{"page":184,"text":"signature block.","rect":[79.58037567138672,413.5238342285156,143.87217164039613,404.47021484375]},{"page":184,"text":"ATTACHMENTS: List lower-level attachment (appendixes, tabs, and exhibits).","rect":[79.67997741699219,427.8814697265625,404.49549317359927,418.8477478027344]},{"page":184,"text":"Appendix 1–Information Collection Plan","rect":[79.68995666503906,442.40313720703127,243.30289125442506,433.3694152832031]},{"page":184,"text":"Appendix 2–Information Collection Overlay","rect":[79.68000793457031,456.9447326660156,257.6990704536438,447.89111328125]},{"page":184,"text":"DISTRIBUTION: (if distributed separately from the base order).","rect":[79.68001556396485,471.4664001464844,343.0423376560211,462.41278076171877]},{"page":184,"text":"[page number]","rect":[274.3083801269531,510.58929443359377,337.26553255176546,501.8544006347656]},{"page":184,"text":"[CLASSIFICATION]","rect":[259.44000244140627,523.4527587890625,351.91775423145296,514.8970947265625]},{"page":184,"text":"B-6","rect":[72.0,754.1790161132813,86.48099737548829,747.6090087890625]},{"page":184,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":184,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":185,"text":"Glossary","rect":[280.79998779296877,134.37562561035157,349.17740992355348,119.42109680175781]},{"page":185,"text":"The glossary lists acronyms and terms with Army or joint definitions. Where Army and","rect":[126.0,169.0535888671875,504.12455320358279,159.00718688964845]},{"page":185,"text":"joint definitions differ, (Army) precedes the definition. Terms for which FM 3-98 is the","rect":[126.0,181.65020751953126,504.10454928970338,171.6038055419922]},{"page":185,"text":"proponent are marked with an asterisk (*). The proponent manual for other terms is","rect":[126.00004577636719,194.2248077392578,504.08032658672337,184.21153259277345]},{"page":185,"text":"listed in parentheses after the definition.","rect":[126.00004577636719,207.0642852783203,302.79686522483828,197.05101013183595]},{"page":185,"text":"SECTION I – ACRONYMS AND ABBREVIATIONS","rect":[99.36000061035156,242.9040069580078,374.84402685546879,234.02401733398438]},{"page":185,"text":"AA","rect":[165.60000610351563,260.1600341796875,179.99220645332339,253.4270782470703]},{"page":185,"text":"ABCT","rect":[152.16395568847657,275.7773132324219,179.9304446592331,268.89495849609377]},{"page":185,"text":"ACR","rect":[158.27940368652345,291.3746643066406,179.8726843585968,284.4923095703125]},{"page":185,"text":"ACS","rect":[159.962646484375,306.86248779296877,179.90256715011598,299.97015380859377]},{"page":185,"text":"ACT","rect":[158.886962890625,322.3303527832031,179.9324435606003,315.447998046875]},{"page":185,"text":"ADA","rect":[158.27940368652345,337.66876220703127,179.8726843585968,330.935791015625]},{"page":185,"text":"ADP","rect":[159.48455810546876,353.1466064453125,179.9722787733078,346.41363525390627]},{"page":185,"text":"AFI","rect":[162.73153686523438,368.6244201660156,179.92648774433136,361.8914489746094]},{"page":185,"text":"assembly area","rect":[226.80419921875,262.3014221191406,283.19573855209355,253.24778747558595]},{"page":185,"text":"armored brigade combat team","rect":[226.80419921875,277.7792663574219,346.5273834476471,268.72564697265627]},{"page":185,"text":"armored Cavalry regiment","rect":[226.80419921875,293.3766174316406,332.41307556724549,284.322998046875]},{"page":185,"text":"air Cavalry squadron","rect":[226.80419921875,308.8544616699219,310.74507570266726,299.80084228515627]},{"page":185,"text":"air Cavalry troop","rect":[226.80419921875,324.3323059082031,295.1417737007141,315.2786865234375]},{"page":185,"text":"air defense artillery","rect":[226.80419921875,339.8101501464844,304.63658571243288,330.75653076171877]},{"page":185,"text":"Army doctrine publication","rect":[226.80419921875,355.2879943847656,332.94295167922976,346.234375]},{"page":185,"text":"Air Force instruction","rect":[226.81417846679688,368.75390625,310.75108766555788,361.7121887207031]},{"page":185,"text":"AFTTP","rect":[147.2537078857422,384.2218017578125,179.86574190807344,377.48883056640627]},{"page":185,"text":"AR","rect":[165.6099853515625,399.69964599609377,180.00218570137026,392.9666748046875]},{"page":185,"text":"ATP","rect":[159.9726104736328,415.1774597167969,179.86172884655,408.4444885253906]},{"page":185,"text":"BCT","rect":[159.49453735351563,430.7947692871094,179.94141572856905,423.91241455078127]},{"page":185,"text":"BEB","rect":[159.9726104736328,446.1331787109375,179.94042390727999,439.5396728515625]},{"page":185,"text":"BHL","rect":[158.89694213867188,461.61102294921877,179.94341462993624,455.01751708984377]},{"page":185,"text":"BSA","rect":[160.57022094726563,477.23828125,179.88565432929995,470.345947265625]},{"page":185,"text":"BSB","rect":[161.05825805664063,492.83563232421877,179.94541353130342,485.94329833984377]},{"page":185,"text":"CASEVAC","rect":[131.66629028320313,508.3134765625,179.90057742500307,501.421142578125]},{"page":185,"text":"CAV","rect":[158.30929565429688,523.7813720703125,179.90257632637026,516.8989868164063]},{"page":185,"text":"CBRN","rect":[151.71575927734376,539.2592163085938,179.9085425128937,532.3768310546875]},{"page":185,"text":"CCIR","rect":[154.47470092773438,554.737060546875,179.9075659503937,547.8546752929688]},{"page":185,"text":"class I","rect":[153.62811279296876,570.2048950195313,179.9374588136673,563.48193359375]},{"page":185,"text":"class III","rect":[145.83938598632813,585.8023071289063,179.9503982667923,579.079345703125]},{"page":185,"text":"class III (B)","rect":[130.00299072265626,603.1326904296875,179.87969881153107,594.40771484375]},{"page":185,"text":"class IV","rect":[146.44696044921876,616.7680053710938,179.90758120918276,610.0350341796875]},{"page":185,"text":"Air Force tactics, techniques, and procedures","rect":[226.81417846679688,386.3432922363281,407.11705476093297,377.3095703125]},{"page":185,"text":"Army regulation","rect":[226.81417846679688,401.8410339355469,293.2274670600891,392.78741455078127]},{"page":185,"text":"Army techniques publication","rect":[226.81417846679688,417.31884765625,342.9128918647766,408.2652282714844]},{"page":185,"text":"brigade combat team","rect":[226.81417846679688,432.7967224121094,310.7729889163971,423.74310302734377]},{"page":185,"text":"brigade engineer battalion","rect":[226.81417846679688,448.2745666503906,331.27266359329226,439.220947265625]},{"page":185,"text":"battle handover line","rect":[226.81417846679688,461.7405090332031,306.3557422142029,454.69879150390627]},{"page":185,"text":"brigade support area","rect":[226.81417846679688,479.2302551269531,308.51705813217168,470.1766357421875]},{"page":185,"text":"brigade support battalion","rect":[226.8241424560547,494.8276062011719,326.84444093704226,485.77398681640627]},{"page":185,"text":"casualty evacuation","rect":[226.82412719726563,510.3054504394531,305.499165058136,501.2518310546875]},{"page":185,"text":"Cavalry","rect":[226.8341064453125,525.7833251953125,258.45909547805788,516.7296752929688]},{"page":185,"text":"chemical, biological, radiological, and nuclear","rect":[226.83407592773438,541.2611694335938,412.09707552051546,532.20751953125]},{"page":185,"text":"commander’s critical information requirement","rect":[226.8341064453125,556.7190551757813,412.26241028404237,547.6853637695313]},{"page":185,"text":"rations and gratuitous issue of health, morale, and welfare items","rect":[226.8341064453125,572.2168579101563,482.5869644289017,563.1632080078125]},{"page":185,"text":"petroleum, oil, and lubricants","rect":[226.8440704345703,587.7943115234375,344.3571060304642,578.7606201171875]},{"page":185,"text":"petroleum, oil, and lubricants (bulk)","rect":[226.8440704345703,603.2720947265625,371.3935537919998,594.2384033203125]},{"page":185,"text":"construction materials","rect":[226.84408569335938,616.7579956054688,315.5528152589798,609.71630859375]},{"page":185,"text":"class V","rect":[150.29153442382813,632.245849609375,179.91954409980776,625.5128784179688]},{"page":185,"text":"ammunition","rect":[226.8540496826172,632.23583984375,275.27061891555788,625.1941528320313]},{"page":185,"text":"class VIII","rect":[138.64828491210938,647.7236938476563,179.95439606952668,640.99072265625]},{"page":185,"text":"medical","rect":[226.8540496826172,647.7136840820313,258.5487567195892,640.6719970703125]},{"page":185,"text":"class IX","rect":[146.45692443847657,663.1915283203125,179.9255102863312,656.4685668945313]},{"page":185,"text":"DA","rect":[165.6597900390625,678.659423828125,180.05199038887026,671.9264526367188]},{"page":185,"text":"DD","rect":[165.66973876953126,694.1373291015625,180.061939119339,687.5438232421875]},{"page":185,"text":"DOD","rect":[157.87107849121095,709.7545776367188,180.06294619941714,702.8721923828125]},{"page":185,"text":"repair parts and components for equipment maintenance","rect":[226.864013671875,665.1835327148438,451.83944582748418,656.1498413085938]},{"page":185,"text":"Department of the Army","rect":[226.86398315429688,680.8008422851563,325.5715527534485,671.7471923828125]},{"page":185,"text":"Department of Defense (form)","rect":[226.8739471435547,696.2587890625,348.87002473926546,687.22509765625]},{"page":185,"text":"Department of Defense","rect":[226.87396240234376,711.736572265625,320.2270495872498,702.7128295898438]},{"page":185,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":185,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":185,"text":"Glossary-1","rect":[493.44293212890627,755.9609985351563,540.08456640625,747.5280151367188]},{"page":186,"text":"Glossary","rect":[72.0,46.28102493286133,110.60460119628907,37.8480224609375]},{"page":186,"text":"EAB","rect":[141.47999572753907,83.4000244140625,161.92687410259249,76.66706085205078]},{"page":186,"text":"EEFI","rect":[138.60000610351563,98.8800048828125,161.9213455324173,92.28648376464844]},{"page":186,"text":"E-MIB","rect":[132.00839233398438,114.35784912109375,161.93419832134249,107.76432800292969]},{"page":186,"text":"ERT","rect":[141.49032592773438,129.835693359375,161.9372043027878,123.24217224121094]},{"page":186,"text":"FARP","rect":[135.36000061035157,145.44000244140626,161.9671518201828,138.70704650878907]},{"page":186,"text":"FFIR","rect":[138.72000122070313,160.91998291015626,161.99153506660464,154.3264617919922]},{"page":186,"text":"FLE","rect":[142.5560302734375,176.3978271484375,161.92325776958467,169.80430603027345]},{"page":186,"text":"FLOT","rect":[134.75999450683595,192.01943969726563,161.92688936138155,185.1370849609375]},{"page":186,"text":"FM","rect":[146.40060424804688,207.35784912109376,161.92326664733887,200.7643280029297]},{"page":186,"text":"FSC","rect":[143.1536407470703,222.98509216308595,161.98302066230776,216.0927734375]},{"page":186,"text":"G-2","rect":[145.9199981689453,238.5894012451172,162.06000185012818,231.68711853027345]},{"page":186,"text":"G-3","rect":[145.92251586914063,254.06724548339845,162.0577130317688,247.1649627685547]},{"page":186,"text":"HUMINT","rect":[119.75999450683594,269.5494384765625,161.9206790342331,262.8065185546875]},{"page":186,"text":"IBCT","rect":[137.52000427246095,285.0194396972656,161.92101472759249,278.1370849609375]},{"page":186,"text":"IPB","rect":[145.32492065429688,300.35784912109377,161.92325776958467,293.76434326171877]},{"page":186,"text":"ISF","rect":[146.41055297851563,315.985107421875,161.85153597545625,309.0927734375]},{"page":186,"text":"JP","rect":[150.83999633789063,331.5794372558594,161.9653207654953,324.84649658203127]},{"page":186,"text":"LOA","rect":[140.27999877929688,347.0594482421875,161.87526309394839,340.1770935058594]},{"page":186,"text":"LOGPAC","rect":[119.15999603271485,362.5494079589844,161.8674811115265,355.6471252441406]},{"page":186,"text":"LTIOV","rect":[129.72000122070313,378.0194396972656,161.86989200019839,371.1370849609375]},{"page":186,"text":"MCRP","rect":[132.00839233398438,393.4972839355469,161.85652559947969,386.61492919921877]},{"page":186,"text":"MCWP","rect":[129.239990234375,408.97943115234377,161.8470346326828,402.0970764160156]},{"page":186,"text":"MDMP","rect":[129.83712768554688,424.3178405761719,161.96709078502657,417.7243347167969]},{"page":186,"text":"METT-TC (I)","rect":[102.23796844482422,441.897216796875,161.83761507129669,433.1722717285156]},{"page":186,"text":"mm","rect":[145.32000732421876,466.9200134277344,162.01668125247955,462.2388000488281]},{"page":186,"text":"MSR","rect":[139.80706787109376,482.5472717285156,161.8804205646515,475.6549377441406]},{"page":186,"text":"NAI","rect":[143.63999938964845,498.0194396972656,161.91660004901886,491.14703369140627]},{"page":186,"text":"NTTP","rect":[135.36492919921876,513.497314453125,161.8575326795578,506.76434326171877]},{"page":186,"text":"OPORD","rect":[125.8800048828125,528.9794311523438,161.9889868488312,522.0970458984375]},{"page":186,"text":"PIR","rect":[144.72732543945313,544.31787109375,161.873462556839,537.724365234375]},{"page":186,"text":"PL","rect":[149.28900146484376,559.9151611328125,162.05274385356905,553.3216552734375]},{"page":186,"text":"PMESII-PT","rect":[110.27999877929688,575.5494384765625,161.92325776958467,568.6571044921875]},{"page":186,"text":"RDSP","rect":[135.83999633789063,602.5494384765625,161.84755343151094,595.6571044921875]},{"page":186,"text":"S-1","rect":[148.0800018310547,618.0294189453125,161.9399914741516,611.1370849609375]},{"page":186,"text":"S-2","rect":[148.08387756347657,633.5072631835938,161.93823671340943,626.6149291992188]},{"page":186,"text":"S-3","rect":[148.0800018310547,648.9893798828125,161.9399914741516,642.0970458984375]},{"page":186,"text":"S-4","rect":[148.0838623046875,664.4672241210938,161.93822145462037,657.5748901367188]},{"page":186,"text":"S-6","rect":[148.0800018310547,680.0693969726563,161.9399914741516,673.1770629882813]},{"page":186,"text":"S-9","rect":[148.0800018310547,695.5494384765625,161.9399914741516,688.6571044921875]},{"page":186,"text":"SIGINT","rect":[126.95999908447266,711.0294189453125,161.9186038389206,704.1271362304688]},{"page":186,"text":"Glossary-2","rect":[72.0,755.9609985351563,118.6415961303711,747.5280151367188]},{"page":186,"text":"echelons above brigade","rect":[208.8000030517578,85.54142761230469,302.7417285423279,76.48778533935547]},{"page":186,"text":"essential element of friendly information","rect":[208.8000030517578,101.02140808105469,372.06233644485476,91.96776580810547]},{"page":186,"text":"expeditionary military intelligence brigade","rect":[208.80995178222657,116.49925231933594,379.66171145248418,107.44561004638672]},{"page":186,"text":"engineer reconnaissance team","rect":[208.80996704101563,131.9770965576172,328.1825348148346,122.92345428466797]},{"page":186,"text":"forward arming and refueling point","rect":[208.8000030517578,147.58140563964845,349.9271441707611,138.5277557373047]},{"page":186,"text":"friendly force information requirement","rect":[208.8000030517578,163.06138610839845,364.08629334068299,154.0077362060547]},{"page":186,"text":"forward logistics element","rect":[208.79998779296876,178.5392303466797,310.45967590904237,169.48558044433595]},{"page":186,"text":"forward line of own troops","rect":[208.8000030517578,194.00148010253907,316.10902863788609,184.96775817871095]},{"page":186,"text":"field manual","rect":[208.8000030517578,207.48733520507813,259.21553528404237,200.4456024169922]},{"page":186,"text":"forward support company","rect":[208.8000030517578,224.9770965576172,312.17781496047976,215.92344665527345]},{"page":186,"text":"assistant chief of staff, intelligence","rect":[208.8000030517578,240.58140563964845,347.98104738998418,231.5277557373047]},{"page":186,"text":"assistant chief of staff, operations","rect":[208.8000030517578,256.0393371582031,343.0070083742142,247.00559997558595]},{"page":186,"text":"human intelligence","rect":[208.8000030517578,271.5414123535156,285.2210986595154,262.48779296875]},{"page":186,"text":"Infantry brigade combat team","rect":[208.8000030517578,287.0213928222656,327.4444977054596,277.9677734375]},{"page":186,"text":"intelligence preparation of the battlefield","rect":[208.80995178222657,302.4992370605469,372.05525636672976,293.44561767578127]},{"page":186,"text":"Iraqi Security Forces","rect":[208.8099365234375,317.9770812988281,292.72691804218297,308.9234619140625]},{"page":186,"text":"joint publication","rect":[208.8000030517578,333.5813903808594,274.7312207221985,324.5177917480469]},{"page":186,"text":"limit of advance","rect":[208.8000030517578,347.04949951171877,273.93942141342168,340.0077819824219]},{"page":186,"text":"logistics package","rect":[208.8000030517578,364.5413818359375,277.4214160423279,355.4877624511719]},{"page":186,"text":"latest time information is of value","rect":[208.8000030517578,378.0094909667969,344.0179431419373,370.9677734375]},{"page":186,"text":"Marine Corps reference publication","rect":[208.80995178222657,395.4793395996094,351.2040295600891,386.44561767578127]},{"page":186,"text":"Marine Corps warfighting publication","rect":[208.8000030517578,410.98138427734377,360.657124042511,401.9277648925781]},{"page":186,"text":"military decision-making process","rect":[208.8000030517578,426.459228515625,342.02895051288609,417.4056091308594]},{"page":186,"text":"mission, enemy, terrain and weather, troops and support available,","rect":[208.8000030517578,441.93707275390627,474.2140600681305,432.8834533691406]},{"page":186,"text":"available, civil considerations, and informational considerations","rect":[208.8000030517578,452.9727478027344,464.67335969257359,444.40716552734377]},{"page":186,"text":"millimeter","rect":[208.8000030517578,467.04949951171877,250.38998323535919,460.0077819824219]},{"page":186,"text":"main supply route","rect":[208.80995178222657,484.53924560546877,281.15045046615605,475.4856262207031]},{"page":186,"text":"named area of interest","rect":[208.8000030517578,498.0094909667969,297.50475037193299,490.9677734375]},{"page":186,"text":"Navy tactics, techniques, and procedures","rect":[208.80996704101563,515.499267578125,372.17189484882359,506.44561767578127]},{"page":186,"text":"operation order","rect":[208.8000030517578,530.96142578125,270.1954336748123,521.927734375]},{"page":186,"text":"priority intelligence requirement","rect":[208.80996704101563,546.4592895507813,338.76997864341737,537.4056396484375]},{"page":186,"text":"phase line","rect":[208.80995178222657,562.03662109375,249.11111330795289,553.0029296875]},{"page":186,"text":"political, military, economic, social, information, infrastructure, physical","rect":[208.8000030517578,577.4214477539063,499.79271423912049,568.3677978515625]},{"page":186,"text":"environment, and time [operational variables]","rect":[208.8000030517578,588.9214477539063,391.87673860645296,579.8877563476563]},{"page":186,"text":"rapid decision-making and synchronization process","rect":[208.8000030517578,604.5414428710938,414.3932693605423,595.48779296875]},{"page":186,"text":"battalion or brigade personnel staff officer","rect":[208.8000030517578,620.0214233398438,377.9545889482498,610.9677734375]},{"page":186,"text":"battalion or brigade intelligence staff officer","rect":[208.80003356933595,635.499267578125,385.74832063770296,626.4456176757813]},{"page":186,"text":"battalion or brigade operations staff officer","rect":[208.8000030517578,650.9813842773438,380.8380117998123,641.927734375]},{"page":186,"text":"battalion or brigade logistics staff officer ","rect":[208.80001831054688,666.459228515625,374.97266602516177,657.4055786132813]},{"page":186,"text":"battalion or brigade signal staff officer","rect":[208.8000030517578,682.0614013671875,363.07437044239046,673.0077514648438]},{"page":186,"text":"battalion or brigade civil affairs operations staff officer","rect":[208.8000030517578,697.5414428710938,429.0664053544998,688.48779296875]},{"page":186,"text":"signals intelligence","rect":[208.8000030517578,713.0214233398438,285.6961963157654,703.9677734375]},{"page":186,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":187,"text":"Glossary","rect":[501.47998046875,46.28102493286133,540.08456640625,37.8480224609375]},{"page":187,"text":"SIR","rect":[163.32000732421876,83.54942321777344,179.87153994941714,76.6571044921875]},{"page":187,"text":"SOF","rect":[160.55999755859376,99.02940368652344,179.96307772350313,92.1370849609375]},{"page":187,"text":"SOP","rect":[160.56600952148438,114.50724792480469,179.96908968639375,107.61492919921875]},{"page":187,"text":"TAI","rect":[162.249267578125,129.835693359375,179.92827302265168,123.10272979736328]},{"page":187,"text":"TF","rect":[167.27999877929688,145.44000244140626,179.96904391002657,138.8464813232422]},{"page":187,"text":"TUAS","rect":[153.36000061035157,161.0693817138672,179.8994238395691,154.17706298828126]},{"page":187,"text":"UAS","rect":[159.95843505859376,176.54722595214845,179.89835572433473,169.6549072265625]},{"page":187,"text":"U.S.","rect":[162.239990234375,192.02940368652345,179.9677984714508,185.1370849609375]},{"page":187,"text":"WARNORD","rect":[126.12432098388672,207.49728393554688,179.88043582344057,200.61492919921876]},{"page":187,"text":"specific information requirement","rect":[226.8000030517578,85.5215072631836,358.46422302818299,76.48778533935547]},{"page":187,"text":"special operations forces","rect":[226.8000030517578,101.0014877319336,325.7296646242142,91.96776580810547]},{"page":187,"text":"standard operating procedure ","rect":[226.8099822998047,116.49925231933594,346.06104493141177,107.44561004638672]},{"page":187,"text":"target area of interest","rect":[226.8099822998047,131.9770965576172,311.5476580867767,122.92345428466797]},{"page":187,"text":"task force","rect":[226.8000030517578,145.56948852539063,266.02645754623418,138.5277557373047]},{"page":187,"text":"tactical unmanned aircraft system","rect":[226.8000030517578,163.06138610839845,361.41037905311586,154.0077362060547]},{"page":187,"text":"unmanned aircraft system","rect":[226.79998779296876,178.5392303466797,330.07920229530336,169.48558044433595]},{"page":187,"text":"United States","rect":[226.8000030517578,192.02940368652345,280.3489578371048,184.96775817871095]},{"page":187,"text":"warning order","rect":[226.80996704101563,209.49925231933595,283.28616243457796,200.4456024169922]},{"page":187,"text":"SECTION II – TERMS","rect":[99.36000061035156,235.34400939941407,218.12401037597656,226.46401977539063]},{"page":187,"text":"adversary","rect":[90.0,256.7814025878906,132.78716707229615,248.04649353027345]},{"page":187,"text":"A party acknowledged as potentially hostile to a friendly party and against which the use of force may","rect":[125.99543762207031,271.3030700683594,535.024799823761,262.24945068359377]},{"page":187,"text":"be envisaged. (JP 3-0)","rect":[125.99543762207031,282.8268127441406,214.9880362138748,273.773193359375]},{"page":187,"text":"area reconnaissance","rect":[89.99004364013672,296.292724609375,175.784483669281,289.4103698730469]},{"page":187,"text":"A type of reconnaissance operation that focuses on obtaining detailed information about the terrain or","rect":[125.98548889160156,312.8263244628906,532.7300100908279,303.772705078125]},{"page":187,"text":"enemy activity within a prescribed area. (ADP 3-90)","rect":[125.9854736328125,324.23052978515627,336.0518484697342,315.1769104003906]},{"page":187,"text":"area security","rect":[89.97010040283203,339.7083740234375,145.2421154975891,330.8141174316406]},{"page":187,"text":"A type of security operation conducted to protect friendly forces, lines of communications, and","rect":[125.96553802490235,354.23004150390627,506.1776623725891,345.1764221191406]},{"page":187,"text":"activities within a specific area. (ADP 3-90)","rect":[125.96553802490235,365.7338562011719,302.31729036426546,356.70013427734377]},{"page":187,"text":"battle handover line","rect":[89.96014404296875,379.2196960449219,175.49166750717164,372.33734130859377]},{"page":187,"text":"A designated phase line where responsibility transitions from the stationary force to the moving force","rect":[125.95558166503906,395.7532653808594,532.134581325531,386.69964599609377]},{"page":187,"text":"and vice versa. (ADP 3-90)","rect":[125.95558166503906,407.2571105957031,235.70481783008575,398.223388671875]},{"page":187,"text":"bypass criteria","rect":[89.9402084350586,422.7548522949219,152.88939332962037,413.860595703125]},{"page":187,"text":"Measures established by higher echelon headquarters that specify the conditions and size under which","rect":[125.93565368652344,437.2765197753906,534.023823261261,428.222900390625]},{"page":187,"text":"enemy units and contact may be avoided. (ADP 3-90)","rect":[125.93565368652344,448.80023193359377,341.29080110645296,439.7466125488281]},{"page":187,"text":"command and control","rect":[89.93024444580078,462.2662048339844,183.88493836021423,455.543212890625]},{"page":187,"text":"The exercise of authority and direction by a properly designated commander over assigned and","rect":[125.93563842773438,478.7997741699219,506.15294313430788,469.74615478515627]},{"page":187,"text":"attached forces in the accomplishment of the mission. (JP 1, Volume 2)","rect":[125.93563842773438,490.3035888671875,411.7278738603592,481.2698669433594]},{"page":187,"text":"commander’s critical information requirement","rect":[89.93022155761719,505.7814025878906,290.19399934864046,496.90704345703127]},{"page":187,"text":"Specific information identified by the commander as being essential to facilitate timely decision","rect":[125.92566680908203,520.3230590820313,510.2014660835266,511.2694091796875]},{"page":187,"text":"making. (JP 3-0)","rect":[125.92566680908203,531.7272338867188,192.9564657793045,522.673583984375]},{"page":187,"text":"commander’s visualization","rect":[89.92025756835938,545.193115234375,204.6584570426941,538.310791015625]},{"page":187,"text":"The mental process of developing situational understanding, determining a desired end state, and","rect":[125.91570281982422,561.7267456054688,513.7082715034485,552.673095703125]},{"page":187,"text":"envisioning an operational approach by which the force will achieve that end state. (ADP 6-0)","rect":[125.9156723022461,573.25048828125,502.4235830888748,564.1968383789063]},{"page":187,"text":"confirmation brief","rect":[89.90029907226563,586.7163696289063,168.58528047657013,579.8340454101563]},{"page":187,"text":"A brief subordinate leaders give to the higher commander immediately after the operation order is","rect":[125.90570068359375,603.25,517.9691665773391,594.1963500976563]},{"page":187,"text":"given to confirm understanding. (ADP 5-0)","rect":[125.90568542480469,614.7737426757813,299.2594900712967,605.7200927734375]},{"page":187,"text":"cover","rect":[89.90028381347656,628.2395629882813,113.28636050033569,623.4288940429688]},{"page":187,"text":"(Army) A type of security operation done independent of the main body to protect them by fighting to","rect":[125.89572143554688,644.7732543945313,534.4270825386047,635.7196044921875]},{"page":187,"text":"gain time while preventing enemy ground observation of and direct fire against the main body.","rect":[125.89572143554688,656.2969970703125,505.06022095680239,647.2433471679688]},{"page":187,"text":"(ADP 3-90)","rect":[125.89572143554688,667.80078125,173.4846182451248,658.76708984375]},{"page":187,"text":"decision point","rect":[89.88035583496094,683.2786254882813,148.86846834278107,674.404296875]},{"page":187,"text":"A point in space and the latest time when the commander or staff anticipates making a key decision","rect":[125.88575744628906,697.8202514648438,523.7617993354797,688.7666015625]},{"page":187,"text":"concerning a specific course of action. (JP 5-0)","rect":[125.88575744628906,709.2244262695313,314.2393484697342,700.1707763671875]},{"page":187,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":187,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":187,"text":"Glossary-3","rect":[493.44293212890627,755.9609985351563,540.08456640625,747.5280151367188]},{"page":188,"text":"Glossary","rect":[72.0,46.28102493286133,110.60460119628907,37.8480224609375]},{"page":188,"text":"decision support matrix","rect":[72.0,83.48152923583985,173.6896252632141,74.60716247558594]},{"page":188,"text":"A written record of a war-gamed course of action that describes decision points and associated actions","rect":[108.00540161132813,98.02311706542969,517.1154068117141,88.96947479248047]},{"page":188,"text":"at those decision points. (ADP 5-0)","rect":[108.00538635253906,109.40743255615235,249.1983633623123,100.37371063232422]},{"page":188,"text":"decision support template","rect":[71.99998474121094,124.8852767944336,182.0101916770935,116.01091003417969]},{"page":188,"text":"A combined intelligence and operations graphic based on the results of war-gaming that depicts","rect":[107.99542236328125,139.42686462402345,490.94350129413609,130.3732147216797]},{"page":188,"text":"decision points, timelines associated with movement of forces and the flow of the operation, and other","rect":[107.99542236328125,150.9306182861328,517.1502981767654,141.8968963623047]},{"page":188,"text":"key items of information required to execute a specific friendly course of action. ","rect":[107.99542236328125,162.4742889404297,432.32291626930239,153.42063903808595]},{"page":188,"text":"(JP 2-0)","rect":[107.99542236328125,173.97804260253907,139.98695283985138,164.94432067871095]},{"page":188,"text":"decisive point","rect":[71.99002075195313,189.45594787597657,129.899458943367,180.5815887451172]},{"page":188,"text":"Key terrain, key event, critical factor, or function that, when acted upon, enables commanders to gain a","rect":[107.98546600341797,203.99754333496095,520.4014880638123,194.9438934326172]},{"page":188,"text":"marked advantage over an enemy or contribute materially to achieving success. (JP 5-0)","rect":[107.98546600341797,215.52122497558595,460.4997549638748,206.4675750732422]},{"page":188,"text":"economy of force","rect":[71.98008728027344,230.9990692138672,144.8076007347107,222.11474609375]},{"page":188,"text":"The employment and distribution of forces to allocate the maximum possible combat power on","rect":[107.97552490234375,245.52073669433595,488.31123781204226,236.4670867919922]},{"page":188,"text":"primary efforts. (JP 3-0)","rect":[107.97552490234375,257.0444641113281,205.24488741016388,247.99082946777345]},{"page":188,"text":"enemy","rect":[71.96017456054688,272.5222473144531,99.74458742141724,265.69964599609377]},{"page":188,"text":"A party identified as hostile against which the use of force is authorized. (ADP 3-0)","rect":[107.95561218261719,287.0439758300781,442.7012930498123,277.9903564453125]},{"page":188,"text":"engagement criteria","rect":[71.9403076171875,302.5218200683594,157.2148175239563,293.6275634765625]},{"page":188,"text":"Protocols that specify those circumstances for initiating engagement with an enemy force. (FM 3-90-1)","rect":[107.93574523925781,317.0434875488281,520.7976980791092,307.9898681640625]},{"page":188,"text":"essential element of friendly information","rect":[71.92040252685547,332.5213317871094,244.87479615402223,323.6270751953125]},{"page":188,"text":"A critical aspect of a friendly operation that, if known by a threat would subsequently compromise,","rect":[107.91585540771485,347.04302978515627,504.847727060318,337.9894104003906]},{"page":188,"text":"lead to failure, or limit success of the operation and therefore should be protected from enemy","rect":[107.91586303710938,358.4472351074219,483.9397168159485,349.39361572265627]},{"page":188,"text":"detection. (ADP 6-0)","rect":[107.91586303710938,369.9510498046875,192.10774141407013,360.9173278808594]},{"page":188,"text":"field maintenance","rect":[71.91045379638672,383.4368896484375,147.72199892807007,376.5545349121094]},{"page":188,"text":"On system maintenance, repair, and return to the user including maintenance actions performed by","rect":[107.90589904785156,399.970458984375,502.54002809524538,390.9168395996094]},{"page":188,"text":"operators. (FM 4-30)","rect":[107.90591430664063,411.47430419921877,192.09779268360138,402.4405822753906]},{"page":188,"text":"forward passage of lines","rect":[71.9004898071289,426.9720458984375,175.01335603046418,418.0777893066406]},{"page":188,"text":"Occurs when a unit passes through another unit’s positions while moving toward the enemy.","rect":[107.89593505859375,441.49371337890627,477.94874024391177,432.4400939941406]},{"page":188,"text":"(ADP 3-90)","rect":[107.89591979980469,452.99755859375,155.48480135059357,443.9638366699219]},{"page":188,"text":"friendly force information requirement","rect":[71.88055419921875,468.49530029296877,239.25833040332794,459.6010437011719]},{"page":188,"text":"Information the commander and staff need to understand the status of friendly force and supporting","rect":[107.87599182128906,483.0169982910156,505.60286378860476,473.96337890625]},{"page":188,"text":"capabilities. (JP 3-0)","rect":[107.87599182128906,494.52081298828127,190.38462740039825,485.4870910644531]},{"page":188,"text":"guard","rect":[71.86062622070313,510.0185852050781,97.43890595626832,501.28369140625]},{"page":188,"text":"A type of security operation done to protect the main body by fighting to gain time while preventing","rect":[107.85606384277344,524.540283203125,509.1884961128235,515.4866333007813]},{"page":188,"text":"enemy ground observation of and direct fire against the main body. (ADP 3-90)","rect":[107.85606384277344,535.9445190429688,427.1239004716873,526.890869140625]},{"page":188,"text":"health service support","rect":[71.84076690673828,551.40234375,166.25057893848419,542.5280151367188]},{"page":188,"text":"(Army) Health service support encompasses all support and services performed, provided, and","rect":[107.84616088867188,565.9440307617188,485.90303468704226,556.890380859375]},{"page":188,"text":"arranged by the Army Medical Department to promote, improve, conserve, or restore the mental and","rect":[107.84615325927735,577.4677124023438,510.26231813430788,568.4140625]},{"page":188,"text":"physical well-being of personnel in the Army. Additionally, as directed, provide support in other","rect":[107.84615325927735,588.9915161132813,494.5591726884842,579.9378662109375]},{"page":188,"text":"Services, agencies, and organizations. This includes casualty care (encompassing a number of Army","rect":[107.84614562988281,600.5151977539063,509.301167011261,591.4615478515625]},{"page":188,"text":"Medical Department functions—organic and area medical support, hospitalization, the treatment","rect":[107.84614562988281,612.0389404296875,494.2513629207611,602.9852905273438]},{"page":188,"text":"aspects of dental care and behavioral/neuropsychiatric treatment, clinical laboratory services, and","rect":[107.84615325927735,623.4431762695313,497.217426776886,614.3895263671875]},{"page":188,"text":"treatment of chemical, biological, radiological, and nuclear patients), medical evacuation, and medical","rect":[107.84614562988281,634.9669189453125,517.3557330379487,625.9132690429688]},{"page":188,"text":"logistics. (FM 4-02)","rect":[107.84614562988281,646.4906616210938,188.20342928028107,637.43701171875]},{"page":188,"text":"high-payoff target","rect":[71.84073638916016,661.968505859375,149.43611055469513,653.07421875]},{"page":188,"text":"A target whose loss to the enemy will significantly contribute to the success of the friendly course of","rect":[107.836181640625,676.4901733398438,510.9810476884842,667.4365234375]},{"page":188,"text":"action. (JP 3-60)","rect":[107.836181640625,687.9939575195313,174.26939302539825,678.9602661132813]},{"page":188,"text":"high-value target","rect":[71.83078002929688,703.4917602539063,144.97701936817169,694.5974731445313]},{"page":188,"text":"A target the enemy commander requires for the successful completion of the mission. (JP 3-60)","rect":[107.81625366210938,718.013427734375,489.85198885059358,708.9597778320313]},{"page":188,"text":"Glossary-4","rect":[72.0,755.9609985351563,118.6415961303711,747.5280151367188]},{"page":188,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":188,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":189,"text":"Glossary","rect":[501.47998046875,46.28102493286133,540.08456640625,37.8480224609375]},{"page":189,"text":"hybrid threat","rect":[90.0,83.50144958496094,147.42637544727325,74.60716247558594]},{"page":189,"text":"The diverse and dynamic combination of regular forces, irregular forces, terrorists, or criminal","rect":[125.99543762207031,98.02311706542969,503.87779724693299,88.96947479248047]},{"page":189,"text":"elements unified to achieve mutually benefitting effects. (ADP 3-0)","rect":[125.99542236328125,109.42735290527344,396.2998953447342,100.37371063232422]},{"page":189,"text":"indicator","rect":[89.98005676269531,122.89327239990235,128.8379962425232,116.01091003417969]},{"page":189,"text":"In intelligence usage, an item of information that reflects the intention or capability of an enemy and/or","rect":[125.98545837402344,139.42686462402345,538.9758597002029,130.3732147216797]},{"page":189,"text":"adversary to adopt or reject a course of action. (JP 2-0)","rect":[125.97547912597656,150.95054626464845,345.6432791337967,141.88694763183595]},{"page":189,"text":"information collection","rect":[89.9601058959961,164.41647338867188,184.1737158317566,157.5341033935547]},{"page":189,"text":"An activity that synchronizes and integrates the planning and employment of sensors and assets as well","rect":[125.96550750732422,180.9501190185547,538.8885699520112,171.89646911621095]},{"page":189,"text":"as the processing, exploitation, and dissemination systems in direct support of current and future operations.","rect":[125.96550750732422,192.4738006591797,536.5764257907867,183.42015075683595]},{"page":189,"text":"(FM 3-55)","rect":[125.96548461914063,203.9776153564453,168.03652864551544,194.9438934326172]},{"page":189,"text":"key tasks","rect":[89.96007537841797,219.4753875732422,129.23434907245636,210.74046325683595]},{"page":189,"text":"Those significant activities the force must perform as a whole to achieve the desired end state.","rect":[125.9654769897461,233.99705505371095,502.63111329078677,224.9434051513672]},{"page":189,"text":"(ADP 6-0)","rect":[125.96552276611328,245.50086975097657,168.5146475419998,236.46714782714845]},{"page":189,"text":"local security","rect":[89.95015716552735,260.9985656738281,146.29784059524537,252.1042938232422]},{"page":189,"text":"Low-level security activities conducted near a unit to prevent surprise by the enemy. (ADP 3-90)","rect":[125.95555877685547,275.5202941894531,513.9772329912186,266.4666748046875]},{"page":189,"text":"military decision-making process","rect":[89.94019317626953,290.9981384277344,230.96881562519074,282.1038818359375]},{"page":189,"text":"An iterative planning methodology to understand the situation and mission, develop a course of action,","rect":[125.94559478759766,305.5198059082031,537.629465341568,296.4661865234375]},{"page":189,"text":"and produce an operation plan or order. (ADP 5-0)","rect":[125.94559478759766,317.02362060546877,329.05987459278108,307.9898986816406]},{"page":189,"text":"mission command","rect":[89.94017791748047,330.5094299316406,166.99572205734254,323.6270751953125]},{"page":189,"text":"(Army) The Army’s approach to command and control that empowers subordinate decision-making","rect":[125.94557189941406,347.04302978515627,525.7200512886047,337.9894104003906]},{"page":189,"text":"and decentralized execution appropriate to the situation. (ADP 6-0)","rect":[125.94561767578125,358.4273376464844,395.05486970996858,349.39361572265627]},{"page":189,"text":"named area of interest","rect":[89.94019317626953,371.9131774902344,185.78726106739044,365.03082275390627]},{"page":189,"text":"The geospatial area or systems node or link against which information that will satisfy a specific","rect":[125.93563842773438,388.4467468261719,511.57418703842168,379.39312744140627]},{"page":189,"text":"information requirement can be collected, usually to capture indications of adversary courses of action.","rect":[125.93563842773438,399.9704895019531,538.4611303806305,390.9168701171875]},{"page":189,"text":"(JP 2-0)","rect":[125.93563842773438,411.47430419921877,157.9271689043045,402.4405822753906]},{"page":189,"text":"neutral","rect":[89.93023681640625,424.96014404296877,121.01540100669861,418.2371520996094]},{"page":189,"text":"(Army) A party identified as neither supporting nor opposing friendly or enemy forces. (ADP 3-0)","rect":[125.92567443847656,441.49371337890627,519.5846853837967,432.4400939941406]},{"page":189,"text":"personnel services","rect":[89.9004135131836,456.95166015625,167.34837800312043,448.0773010253906]},{"page":189,"text":"Sustainment functions that man and fund the force, maintain Soldier and Family readiness, promote the","rect":[125.89585876464844,471.4932556152344,539.7557971458435,462.43963623046877]},{"page":189,"text":"moral and ethical values of the nation, and enable the fighting qualities of the Army. (ADP 4-0)","rect":[125.89584350585938,483.0169982910156,508.6387625322342,473.96337890625]},{"page":189,"text":"planning","rect":[89.88054656982422,498.4948425292969,127.49249696731568,489.6005859375]},{"page":189,"text":"The art and science of understanding a situation, envisioning a desired future, and determining","rect":[125.87599182128906,513.0165405273438,503.804340839386,503.962890625]},{"page":189,"text":"effective ways to bring that future about. (ADP 5-0)","rect":[125.87599182128906,524.540283203125,333.90054231739046,515.4866333007813]},{"page":189,"text":"precision-guided munition","rect":[89.86065673828125,540.0181274414063,202.30805421066285,531.1238403320313]},{"page":189,"text":"A guided weapon intended to destroy a point target and minimize collateral damage. (JP 3-03)","rect":[125.8561019897461,554.5398559570313,503.3301687822342,545.4862060546875]},{"page":189,"text":"precision munition","rect":[89.85072326660156,569.9976806640625,170.01777100753785,561.1233520507813]},{"page":189,"text":"A munition that corrects for ballistic conditions using guidance and control up to the aimpoint or","rect":[125.84616088867188,584.5393676757813,512.9178763017654,575.4857177734375]},{"page":189,"text":"submunitions dispense with terminal accuracy less than the lethal radius of effects. (FM 3-09)","rect":[125.84616088867188,595.9435424804688,501.3979178056717,586.889892578125]},{"page":189,"text":"preparation","rect":[89.84080505371094,611.4014282226563,140.98441529464723,602.527099609375]},{"page":189,"text":"Those activities performed by units and Soldiers to improve their ability to execute an operation.","rect":[125.84620666503906,625.9430541992188,512.6886389255524,616.889404296875]},{"page":189,"text":"(ADP 5-0)","rect":[125.84620666503906,637.4468383789063,168.39532381153107,628.4131469726563]},{"page":189,"text":"priority intelligence requirement","rect":[89.83084106445313,652.9446411132813,229.84748750782013,644.0503540039063]},{"page":189,"text":"An intelligence requirement that the commander and staff need to understand the threat and other","rect":[125.82627868652344,667.4663696289063,515.4656668291092,658.4127197265625]},{"page":189,"text":"aspects of the operational environment. (JP 2-0)","rect":[125.82627868652344,678.9700927734375,317.89492708301546,669.9364013671875]},{"page":189,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":189,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":189,"text":"Glossary-5","rect":[493.44293212890627,755.9609985351563,540.08456640625,747.5280151367188]},{"page":190,"text":"Glossary","rect":[72.0,46.28102493286133,110.60460119628907,37.8480224609375]},{"page":190,"text":"rearward passage of lines","rect":[72.0,83.50144958496094,180.62775117206574,74.60716247558594]},{"page":190,"text":"Occurs when a unit passes through another unit’s position while moving away from the enemy.","rect":[107.99543762207031,98.02311706542969,489.44068360328677,88.96947479248047]},{"page":190,"text":"(ADP 3-90)","rect":[107.99542236328125,109.40743255615235,155.58431917285919,100.37371063232422]},{"page":190,"text":"reconnaissance","rect":[71.98006439208985,122.89327239990235,136.29078554916382,116.01091003417969]},{"page":190,"text":"A mission undertaken to obtain information about the activities and resources of an enemy or","rect":[107.98546600341797,139.42686462402345,481.3771658525467,130.3732147216797]},{"page":190,"text":"adversary, or to secure data concerning the meteorological, hydrographic, geographic, or other","rect":[107.98546600341797,150.95054626464845,485.82009798145296,141.8968963623047]},{"page":190,"text":"characteristics of a particular area, by visual observation or other detection methods. (JP 2-0)","rect":[107.98545837402344,162.4742889404297,479.9416494951248,153.42063903808595]},{"page":190,"text":"*reconnaissance handover","rect":[71.98005676269531,175.94021606445313,184.4015490989685,169.05784606933595]},{"page":190,"text":"The action that occurs between two elements to coordinate the transfer of information and","rect":[107.97549438476563,190.46188354492188,468.27180910110476,183.42015075683595]},{"page":190,"text":"responsibility for observation of potential threat contact, or the transfer of an assigned area from one","rect":[107.97549438476563,203.99754333496095,509.5968005638123,194.9438934326172]},{"page":190,"text":"element to another.","rect":[107.97549438476563,213.50930786132813,184.99517273902894,206.4675750732422]},{"page":190,"text":"*reconnaissance handover line","rect":[71.98005676269531,228.98715209960938,202.50686526107789,222.1047821044922]},{"page":190,"text":"A designated phase line on the ground where reconnaissance responsibility transitions from one","rect":[107.97549438476563,245.52073669433595,491.48348879623418,236.4670867919922]},{"page":190,"text":"element to another.","rect":[107.97549438476563,255.03256225585938,184.99517273902894,247.99082946777345]},{"page":190,"text":"reconnaissance in force","rect":[71.98005676269531,270.5103454589844,171.33703493881226,263.62799072265627]},{"page":190,"text":"A type of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and","rect":[107.9854507446289,287.0439758300781,519.040913105011,277.9903564453125]},{"page":190,"text":"reactions or to obtain other information. (ADP 3-90)","rect":[107.9854507446289,298.4282531738281,317.9422598466873,289.39453125]},{"page":190,"text":"rehearsal","rect":[71.98007202148438,311.91412353515627,111.95652496910096,305.1911315917969]},{"page":190,"text":"A session in which the commander and staff or unit practices expected actions to improve performance","rect":[107.97550964355469,328.42779541015627,520.5446765403748,319.3940734863281]},{"page":190,"text":"during execution. (ADP 5-0)","rect":[107.97550964355469,339.9714050292969,223.00355440235138,330.91778564453127]},{"page":190,"text":"relief in place","rect":[71.96014404296875,355.4293518066406,129.65942263412476,346.55499267578127]},{"page":190,"text":"An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by","rect":[107.95558166503906,369.9709167480469,507.370747089386,360.91729736328127]},{"page":190,"text":"the incoming unit and the responsibilities of the replaced elements for the mission and the assigned","rect":[107.95558166503906,381.49462890625,504.2400097846985,372.4410095214844]},{"page":190,"text":"zone of operations are transferred to the incoming unit. (JP 3-07.3)","rect":[107.95558166503906,393.01837158203127,375.15151887989046,383.9647521972656]},{"page":190,"text":"reserve","rect":[71.95018768310547,406.48431396484377,103.02040743637085,401.6736145019531]},{"page":190,"text":"(Army) That portion of a body of troops that is withheld from action at the beginning of an engagement","rect":[107.94563293457031,423.01788330078127,513.0836688289643,413.9642639160156]},{"page":190,"text":"to be available for a decisive movement. (ADP 3-90)","rect":[107.94561767578125,434.521728515625,319.81475740528108,425.4880065917969]},{"page":190,"text":"route reconnaissance","rect":[71.93028259277344,448.007568359375,161.5652911643982,441.1252136230469]},{"page":190,"text":"A type of reconnaissance operation to obtain detailed information of a specified route and all terrain","rect":[107.92572021484375,464.5411682128906,508.060932636261,455.487548828125]},{"page":190,"text":"from which the enemy could influence movement along that route. (ADP 3-90)","rect":[107.92572021484375,475.94537353515627,425.1517325029373,466.8917541503906]},{"page":190,"text":"screen","rect":[71.91033172607422,489.41131591796877,99.05631470870972,484.6006164550781]},{"page":190,"text":"A type of security operation that primarily provides early warning to the protected force. (ADP 3-90)","rect":[107.91574096679688,505.94488525390627,512.3913870439529,496.8912658691406]},{"page":190,"text":"security cooperation ","rect":[71.91036987304688,521.4227905273438,161.40096497535706,512.5285034179688]},{"page":190,"text":"Department of Defense interactions with foreign security establishments to build relationships that","rect":[107.915771484375,535.9444580078125,501.9890643367767,526.8908081054688]},{"page":190,"text":"promote specific United States security interests, develop allied and partner military and security","rect":[107.915771484375,547.4682006835938,495.3132519721985,538.41455078125]},{"page":190,"text":"capabilities for self-defense and multinational operations, and provide United States forces with","rect":[107.915771484375,558.971923828125,491.00728273391726,549.938232421875]},{"page":190,"text":"peacetime and contingency access to allies and partners. (JP 3-20)","rect":[107.915771484375,570.5156860351563,372.4633474931717,561.4620361328125]},{"page":190,"text":"situational understanding","rect":[71.90039825439453,585.9934692382813,181.5052227973938,577.0991821289063]},{"page":190,"text":"The product of applying analysis and judgment to relevant information to determine the relationships","rect":[107.89583587646485,600.5151977539063,512.5628555421829,591.4515991210938]},{"page":190,"text":"among the operational and mission variables. (ADP 6-0)","rect":[107.89583587646485,612.0389404296875,334.0476065263748,602.9852905273438]},{"page":190,"text":"special reconnaissance","rect":[71.89042663574219,627.496826171875,167.6468341331482,618.6224975585938]},{"page":190,"text":"Reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or","rect":[107.89582824707031,642.0184936523438,486.74355989551546,632.9848022460938]},{"page":190,"text":"diplomatically and/or politically sensitive environments to collect or verify information of strategic or","rect":[107.89582824707031,653.442626953125,515.5867605791092,644.3889770507813]},{"page":190,"text":"operational significance, employing military capabilities not normally found in conventional forces.","rect":[107.89582824707031,664.9663696289063,507.343820810318,655.9127197265625]},{"page":190,"text":"(JP 3-05)","rect":[107.89582824707031,676.4701538085938,144.9271231279373,667.4364624023438]},{"page":190,"text":"surveillance","rect":[71.89042663574219,689.9559936523438,122.87367129135132,683.0736694335938]},{"page":190,"text":"The systematic observation of aerospace, cyberspace, surface, or subsurface areas, places, persons, or","rect":[107.89582824707031,706.4896850585938,514.1094656572342,697.43603515625]},{"page":190,"text":"things by visual, aural, electronic, photographic, or other means. (JP 3-0)","rect":[107.89582824707031,718.0133666992188,399.81350618457796,708.959716796875]},{"page":190,"text":"Glossary-6","rect":[72.0,755.9609985351563,118.6415961303711,747.5280151367188]},{"page":190,"text":"FM 3-98","rect":[271.31402587890627,754.18798828125,304.87500219726567,747.6090087890625]},{"page":190,"text":"10 January 2023","rect":[501.947998046875,755.9609985351563,571.4909995117188,747.510009765625]},{"page":191,"text":"Glossary","rect":[501.47998046875,46.28102493286133,540.08456640625,37.8480224609375]},{"page":191,"text":"sustainment","rect":[90.0,81.4895248413086,141.55496126270294,74.60716247558594]},{"page":191,"text":"(Army) The provision of logistics, financial management, personnel services, and health service","rect":[126.00540161132813,98.02311706542969,510.3657214622498,88.96947479248047]},{"page":191,"text":"support necessary to maintain operations until successful mission completion. (ADP 4-0)","rect":[126.00540161132813,109.42735290527344,482.47381502246858,100.37371063232422]},{"page":191,"text":"target area of interest","rect":[89.99008178710938,124.90519714355469,182.48062044239044,116.01091003417969]},{"page":191,"text":"The geographical area where high-value targets can be acquired and engaged by friendly forces.","rect":[125.98551940917969,139.42686462402345,510.4415991306305,130.3732147216797]},{"page":191,"text":"(JP 2-0)","rect":[125.99549865722656,150.9306182861328,157.98702913379669,141.8968963623047]},{"page":191,"text":"targeting","rect":[89.99009704589844,166.4283905029297,128.93370485305787,157.5341033935547]},{"page":191,"text":"The process of selecting and prioritizing targets and matching the appropriate response to them,","rect":[125.99549865722656,180.9501190185547,508.79126954078677,171.89646911621095]},{"page":191,"text":"considering operational requirements and capabilities. (JP 3-0)","rect":[125.99551391601563,192.4738006591797,376.74847322559358,183.42015075683595]},{"page":191,"text":"task organization","rect":[89.99010467529297,207.95164489746095,164.28673768234254,199.05735778808595]},{"page":191,"text":"(Army) A temporary grouping of forces designed to accomplish a particular mission. (ADP 5-0)","rect":[125.9955062866211,222.4733123779297,511.1387625322342,213.41966247558595]},{"page":191,"text":"threat","rect":[89.98016357421875,235.93923950195313,116.10225587940217,229.2162322998047]},{"page":191,"text":"Any combination of actors, entities, or forces that have the capability and intent to harm United States","rect":[125.98556518554688,252.4728240966797,534.1205947999954,243.41917419433595]},{"page":191,"text":"forces, United States national interests, or the homeland. (ADP 3-0)","rect":[125.98556518554688,263.9766540527344,397.1465750322342,254.9429168701172]},{"page":191,"text":"unity of effort","rect":[89.99011993408203,279.4743957519531,149.45233064746857,270.58013916015627]},{"page":191,"text":"Coordination and cooperation toward common objectives, even if the participants are not necessarily","rect":[125.99552917480469,293.9960632324219,529.4055981636047,284.9324645996094]},{"page":191,"text":"part of the same command or organization, which is the product of successful unified action.","rect":[125.99553680419922,305.519775390625,496.52662110328677,296.4661560058594]},{"page":191,"text":"(JP 1, Volume 2)","rect":[125.99553680419922,317.0235900878906,194.35101228809357,307.9898681640625]},{"page":191,"text":"zone reconnaissance","rect":[89.99012756347656,330.5094299316406,176.26464724349976,323.6270751953125]},{"page":191,"text":"A type of reconnaissance operation that involves a directed effort to obtain detailed information on all","rect":[125.99552917480469,347.04302978515627,534.1176959285737,337.9894104003906]},{"page":191,"text":"routes, obstacles, terrain, and enemy forces within a zone defined by boundaries. (ADP 3-90)","rect":[125.99552917480469,358.4472351074219,499.01748567676546,349.39361572265627]},{"page":191,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":191,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":191,"text":"Glossary-7","rect":[493.44293212890627,755.9609985351563,540.08456640625,747.5280151367188]},{"page":192,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.21988892555239,375.853759765625]},{"page":193,"text":"References","rect":[271.79998779296877,131.21554565429688,357.93131617355348,119.42109680175781]},{"page":193,"text":"All websites accessed 4 January 2023.","rect":[126.0,169.0535888671875,294.7375695705414,159.0182342529297]},{"page":193,"text":"REQUIRED PUBLICATIONS","rect":[90.0,194.76719665527345,275.7140768928528,182.7349090576172]},{"page":193,"text":"These documents must be available to intended users of this publication.","rect":[108.0,209.4815216064453,398.3659460544586,200.4477996826172]},{"page":193,"text":"DOD Dictionary of Military and Associated Terms, November 2022. ","rect":[108.0,224.0231170654297,386.73060059547427,214.96946716308595]},{"page":193,"text":"FM 1-02.1. Operational Terms, 9 March 2021.","rect":[108.00001525878906,238.5248565673828,295.77588868141177,229.4911346435547]},{"page":193,"text":"FM 1-02.2. Military Symbols, 18 May 2022.","rect":[108.00995635986328,253.06651306152345,285.3397924900055,244.0128631591797]},{"page":193,"text":"RELATED PUBLICATIONS","rect":[90.0,276.4505920410156,267.92470921707158,266.73492431640627]},{"page":193,"text":"These documents are cited in this publication.","rect":[90.0,293.4814758300781,273.6882116794586,284.44775390625]},{"page":193,"text":"JOINT PUBLICATIONS","rect":[90.0,316.8480224609375,196.4223690032959,308.73602294921877]},{"page":193,"text":"Most joint publications are available online: http://www.jcs.mil/Doctrine.","rect":[108.0,333.8214111328125,402.088937997818,324.7578125]},{"page":193,"text":"JP 1, Volume 2. The Joint Force. 19 June 2020.","rect":[108.00001525878906,347.85504150390627,299.49198365211489,339.2894592285156]},{"page":193,"text":"JP 2-0. Joint Intelligence. 26 May 2022.","rect":[108.0,362.8647766113281,268.8878881931305,353.8111572265625]},{"page":193,"text":"JP 3-0. Joint Campaigns and Operations. 18 June 2022.","rect":[107.99004364013672,377.2669372558594,332.233469247818,368.21331787109377]},{"page":193,"text":"JP 3-03. Joint Interdiction. 26 May 2022.","rect":[107.98008728027344,391.7886047363281,273.90772461891177,382.7349853515625]},{"page":193,"text":"JP 3-05. Joint Doctrine for Special Operations. 22 September 2020.","rect":[107.97013854980469,406.3102722167969,380.21778321266177,397.25665283203127]},{"page":193,"text":"JP 3-07.3. Peace Operations. 1 March 2018.","rect":[107.97013854980469,420.81207275390627,286.3786413669586,411.7783508300781]},{"page":193,"text":"JP 3-20. Security Cooperation. 9 September 2022.","rect":[107.97013854980469,435.3536682128906,309.41214966773989,426.300048828125]},{"page":193,"text":"JP 3-60. Joint Targeting. 28 September 2018.","rect":[107.96017456054688,449.8753356933594,290.448312997818,440.82171630859377]},{"page":193,"text":"JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020.","rect":[107.9601821899414,464.2774963378906,380.44889283180239,455.223876953125]},{"page":193,"text":"JP 5-0. Joint Planning. 1 December 2020.","rect":[107.96019744873047,478.7991638183594,276.16468262672427,469.74554443359377]},{"page":193,"text":"ARMY PUBLICATIONS","rect":[90.0,502.1022033691406,197.5023708343506,493.8479919433594]},{"page":193,"text":"Most Army doctrinal publications are available online: https://armypubs.army.mil","rect":[108.0,519.1013793945313,436.08638489341737,510.0477294921875]},{"page":193,"text":"ADP 3-0. Operations. 31 July 2019.","rect":[108.0,533.6231079101563,253.1640112400055,524.5694580078125]},{"page":193,"text":"ADP 3-07. Stability. 31 July 2019.","rect":[108.00001525878906,548.144775390625,246.43905091285706,539.0911254882813]},{"page":193,"text":"ADP 3-28. Defense Support of Civil Authorities. 31 July 2019.","rect":[107.99006652832031,562.6664428710938,358.62952637672427,553.61279296875]},{"page":193,"text":"ADP 3-90. Offense and Defense. 31 July 2019.","rect":[107.98011016845703,577.068603515625,295.86255860328677,568.0149536132813]},{"page":193,"text":"ADP 4-0. Sustainment. 31 July 2019.","rect":[107.98014831542969,591.5902709960938,256.9877417087555,582.53662109375]},{"page":193,"text":"ADP 5-0. The Operations Process. 31 July 2019.","rect":[107.98016357421875,606.1119995117188,304.74695801734927,597.058349609375]},{"page":193,"text":"ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019.","rect":[107.98016357421875,620.6336669921875,446.1092321872711,611.5800170898438]},{"page":193,"text":"AR 115-10/AFI 15-157 (IP). Climatic, Hydrological, and Topographic Services, Weather Support for","rect":[107.98016357421875,635.1553344726563,515.5343826417923,626.1016845703125]},{"page":193,"text":"the U.S. Army. 2 September 2021.","rect":[143.9756317138672,646.5595092773438,280.50928711891177,637.505859375]},{"page":193,"text":"AR 380-5. Security, Army Information Security Program. 25 March 2022.","rect":[107.98019409179688,661.0812377929688,405.07206177711489,652.027587890625]},{"page":193,"text":"ATP 2-01. Collection Management. 17 August 2021.","rect":[107.99015808105469,675.6029052734375,320.594309091568,666.5492553710938]},{"page":193,"text":"ATP 2-01.3. Intelligence Preparation of the Battlefield. 1 March 2019.","rect":[107.99015808105469,690.1245727539063,391.63505005836489,681.0709228515625]},{"page":193,"text":"ATP 2-19.4. Brigade Combat Team Intelligence Techniques. 25 June 2021.","rect":[107.99018096923828,704.6463012695313,409.99930787086489,695.5926513671875]},{"page":193,"text":"ATP 3-04.17. Techniques for Forward Arming and Refueling Points. 4 June 2018.","rect":[107.99018096923828,719.16796875,437.83948731422427,710.1143188476563]},{"page":193,"text":"10 Janaury 2023","rect":[90.0,755.9609985351563,159.97899084472656,747.510009765625]},{"page":193,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":193,"text":"References-1","rect":[483.47998046875,754.1790161132813,540.0809653320313,747.5280151367188]},{"page":194,"text":"References","rect":[72.0,44.4990234375,120.56400518798829,37.8480224609375]},{"page":194,"text":"ATP 3-07.5. Stability Techniques. 31 August 2012.","rect":[90.0,83.50144958496094,295.05250000953677,74.44780731201172]},{"page":194,"text":"ATP 3-18.4. Special Forces Special Reconnaissance. 5 October 2021.","rect":[90.00997161865235,98.0031967163086,370.5433142185211,88.96947479248047]},{"page":194,"text":"ATP 3-34.81/MCWP 3-17.4. Engineer Reconnaissance. 1 March 2016.","rect":[90.00995635986328,112.42527770996094,376.17469239234927,103.37163543701172]},{"page":194,"text":"ATP 3-52.1/MCRP 3-20F.4 [MCWP 3-25.13] NTTP 3-56.4/AFTTP 3-2.78. Airspace Control.","rect":[90.00997161865235,126.9270248413086,468.92826294898989,117.89330291748047]},{"page":194,"text":"Multi-Service Tactics, Techniques, and Procedures for Airspace Control. 14 February","rect":[125.99549865722656,138.47068786621095,470.461079120636,129.4170379638672]},{"page":194,"text":"ATP 4-02.2. Medical Evacuation. 12 July 2019.","rect":[90.00003814697266,152.9923553466797,282.3236792087555,143.93870544433595]},{"page":194,"text":"ATP 4-02.10. Theater Hospitalization. 14 August 2020.","rect":[90.00005340576172,167.51402282714845,314.0064489841461,158.4603729248047]},{"page":194,"text":"ATP 4-10/MCRP 4-11H/NTTP 4-09.1/AFTTP 3-2.41. Multi-service Tactics, Techniques, and","rect":[90.00003814697266,182.0158233642578,466.51195192337038,172.9821014404297]},{"page":194,"text":"Procedures for Operational Contract Support. 16 December 2021.","rect":[125.99549865722656,193.43992614746095,393.56095337867739,184.3862762451172]},{"page":194,"text":"ATP 4-31/MCRP 3-40E.1. Recovery and Battle Damage Assessment and Repair (BDAR).","rect":[89.99010467529297,207.9615936279297,449.715402841568,198.90794372558595]},{"page":194,"text":"18 November 2020.","rect":[125.98550415039063,217.47341918945313,205.75516724586488,210.4316864013672]},{"page":194,"text":"2019.","rect":[473.04168701171877,136.45877075195313,495.45267701148989,129.59632873535157]},{"page":194,"text":"ATP 4-33. Maintenance Operations. 9 July 2019.","rect":[89.99006652832031,234.0070037841797,288.67814087867739,224.95335388183595]},{"page":194,"text":"ATP 4-45. Force Provider Operations. 24 November 2014.","rect":[89.99006652832031,248.5087432861328,328.880686044693,239.4750213623047]},{"page":194,"text":"ATP 4-48. Aerial Delivery. 21 December 2016.","rect":[89.99006652832031,263.0503234863281,280.40137696266177,253.99668884277345]},{"page":194,"text":"ATP 4-93. Sustainment Brigade. 11 April 2016.","rect":[90.00003814697266,277.4525451660156,282.09159302711489,268.39892578125]},{"page":194,"text":"ATP 7-100.3. Chinese Tactics. 9 August 2021.","rect":[90.00999450683594,291.9742126464844,277.29285645484927,282.92059326171877]},{"page":194,"text":"FM 1-0. Human Resources Support. 25 August 2021.","rect":[90.00999450683594,306.4958801269531,304.0563757419586,297.611572265625]},{"page":194,"text":"FM 2-0. Intelligence. 6 July 2018.","rect":[90.00999450683594,321.0175476074219,226.7777349948883,311.96392822265627]},{"page":194,"text":"FM 3-0. Operations. 1 October 2022.","rect":[90.01000213623047,335.51934814453127,240.096262216568,326.4856262207031]},{"page":194,"text":"FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020.","rect":[90.01000213623047,350.0609130859375,370.4188940525055,341.0072937011719]},{"page":194,"text":"FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021.","rect":[90.010009765625,364.46307373046877,418.41016602516177,355.4094543457031]},{"page":194,"text":"FM 3-52. Airspace Control. 20 October 2016.","rect":[90.00995635986328,378.96484375,274.17933106422427,369.9311218261719]},{"page":194,"text":"FM 3-55. Information Collection. 3 May 2013.","rect":[90.00995635986328,393.5064392089844,278.25794434547427,384.45281982421877]},{"page":194,"text":"FM 3-90-1. Offense and Defense, Volume 1. 22 March 2013.","rect":[90.0,408.0281066894531,333.07679200172427,398.9744873046875]},{"page":194,"text":"FM 3-90-2. Reconnaissance, Security, and Tactical Enabling Tasks, Volume 2. 22 March 2013.","rect":[89.99002838134766,422.5498046875,472.2687780857086,413.4961853027344]},{"page":194,"text":"FM 4-02. Army Health System. 17 November 2020.","rect":[89.99004364013672,436.95196533203127,296.718820810318,427.8983459472656]},{"page":194,"text":"FM 4-30. Ordnance Operations. 1 April 2014.","rect":[89.99006652832031,451.4537353515625,276.5538122653961,442.4200134277344]},{"page":194,"text":"FM 6-0. Commander and Staff Organization and Operations. 16 May 2022.","rect":[89.99004364013672,465.99530029296877,394.7560827732086,456.9416809082031]},{"page":194,"text":"FM 6-05/MCRP 3-30.4/NTTP 3-05.19/AFTTP 3-2.73/USSOCOM Pub 3-33. CF-SOF Multi-service","rect":[89.99004364013672,478.5250244140625,492.07125735092168,471.46337890625]},{"page":194,"text":"Tactics, Techniques, and Procedures for Conventional Forces and Special Operations Forces","rect":[125.9655990600586,492.0407409667969,502.0711258058548,482.98712158203127]},{"page":194,"text":"Integration, Interoperability, and Interdependence. 25 January 2022. ","rect":[125.9655990600586,503.564453125,404.70716309547427,494.5108337402344]},{"page":194,"text":"FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019.","rect":[89.98011016845703,517.9666137695313,493.7436010837555,508.9129638671875]},{"page":194,"text":"OTHER PUBLICATIONS","rect":[72.0,541.4105834960938,232.8281973762512,531.6949462890625]},{"page":194,"text":"Cameron, Robert S. Ph.D. 2009. To Fight or Not to Fight? Organizational and Doctrinal Trends in","rect":[90.0,558.46142578125,487.851215839386,549.4077758789063]},{"page":194,"text":"Mounted Maneuver Reconnaissance from the Interwar Years to Operation IRAQI","rect":[125.99543762207031,569.9851684570313,452.9494314775467,560.9315185546875]},{"page":194,"text":"FREEDOM. Combat Studies Institute Press, U.S. Army Combined Arms Center, Fort","rect":[125.99543762207031,581.5088500976563,469.08260071372987,572.4552001953125]},{"page":194,"text":"Leavenworth, Kansas, (https://www.armyupress.army.mil/Portals/7/combat-studies-","rect":[125.99542999267578,592.9130249023438,462.90237337207796,583.859375]},{"page":194,"text":"institute/csi-books/cameron_fight.pdf) ","rect":[125.98542785644531,604.436767578125,282.198068857193,595.3831176757813]},{"page":194,"text":"PRESCRIBED FORMS","rect":[72.0,627.9305419921875,216.37049473953247,618.2149047851563]},{"page":194,"text":"This section contains no entries.","rect":[90.0,642.9694213867188,218.48595643043519,635.927734375]},{"page":194,"text":"REFERENCED FORMS","rect":[72.0,668.3705444335938,222.55794896316528,658.6549072265625]},{"page":194,"text":"Unless otherwise indicated, DA forms are available online: https://armypubs.army.mil. DD forms are","rect":[90.0,685.4214477539063,495.33614992904668,676.3677978515625]},{"page":194,"text":"available online: https://www.esd.whs.mil/Directives/forms.","rect":[108.0076675415039,696.9251708984375,349.0475561618805,687.8914794921875]},{"page":194,"text":"DA Form 1156, Casualty Feeder Card.","rect":[90.00995635986328,711.4668579101563,248.0154058933258,702.4132080078125]},{"page":194,"text":"References-2","rect":[72.0,754.1790161132813,128.60100775146484,747.5280151367188]},{"page":194,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8840048828125,747.6090087890625]},{"page":194,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":195,"text":"DA Form 2028, Recommended Changes to Publications and Blank Forms.","rect":[108.0,83.50144958496094,407.606760263443,74.44780731201172]},{"page":195,"text":"DA Form 5517, Standard Range Card.","rect":[108.0,98.02311706542969,264.4486792087555,88.96947479248047]},{"page":195,"text":"DA Form 7656, Tactical Combat Casualty Care (TCCC) Card. ","rect":[108.0,112.42527770996094,364.4102575778961,103.37163543701172]},{"page":195,"text":"DD Form 1380,Tactical Combat Casualty Care (TCCC) Card (Instructions).","rect":[108.0,126.94694519042969,411.9293920993805,117.89330291748047]},{"page":195,"text":"publications supply channels.)","rect":[143.9954376220703,138.47068786621095,265.3898611650467,129.4170379638672]},{"page":195,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":195,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":195,"text":"References","rect":[491.5199890136719,44.4990234375,540.0840170898438,37.8480224609375]},{"page":195,"text":"(Available through normal","rect":[414.4791564941406,126.94694519042969,521.0472003231049,117.89330291748047]},{"page":195,"text":"References-3","rect":[483.47998046875,754.1790161132813,540.0809653320313,747.5280151367188]},{"page":196,"text":"This page intentionally left blank.","rect":[188.77999877929688,390.36138916015627,405.22001099586489,375.853759765625]},{"page":197,"text":"A","rect":[149.40139770507813,211.4375,156.59251773262026,204.30613708496095]},{"page":197,"text":"advance covering force. 5-100","rect":[90.0,226.88099670410157,211.16429357910156,218.447998046875]},{"page":197,"text":"area reconnaissance","rect":[90.0,238.41900634765626,173.60460119628906,231.87600708007813]},{"page":197,"text":"definition. 4-59","rect":[102.95999908447266,248.74200439453126,162.0809805908203,242.09100341796876]},{"page":197,"text":"area security. 5-120","rect":[89.99999237060547,263.8440246582031,169.64099340820312,255.4920196533203]},{"page":197,"text":"ASCOPE. 6-22","rect":[89.99999237060547,275.4990234375,150.56099157714844,268.8390197753906]},{"page":197,"text":"attack and reconnaissance","rect":[89.99999237060547,288.8190002441406,197.12426977539062,282.2760009765625]},{"page":197,"text":"aviation units. 5-26","rect":[100.07999420166016,299.1419982910156,175.76098852539062,292.5719909667969]},{"page":197,"text":"augment the guard force. 5-62","rect":[89.99998474121094,314.2440185546875,211.16697912597656,305.8110046386719]},{"page":197,"text":"B","rect":[149.39999389648438,329.6400146484375,156.5911139240265,322.5086669921875]},{"page":197,"text":"brigade engineer battalion","rect":[90.0,345.0810241699219,194.12549047851562,336.7560119628906]},{"page":197,"text":"elements. 6-28","rect":[100.08000183105469,353.739013671875,159.68699865722656,347.16900634765627]},{"page":197,"text":"C","rect":[149.39999389648438,371.0295715332031,156.5911139240265,363.66912841796877]},{"page":197,"text":"casualty operations. 7-28","rect":[90.0,386.36102294921877,190.64699011230469,378.0090026855469]},{"page":197,"text":"Cavalry as maneuver unit. 6-18","rect":[90.00900268554688,399.6810302734375,215.13328771972656,391.2480163574219]},{"page":197,"text":"Cavalry squadron, role of. 6-20","rect":[90.00900268554688,413.0010070800781,213.573580078125,404.5679931640625]},{"page":197,"text":"Cavalry squadrons. 5-20","rect":[90.00900268554688,426.3210144042969,188.13600378417969,417.88800048828127]},{"page":197,"text":"Cavalry troop, role of. 6-21","rect":[90.01799774169922,439.7580261230469,196.6589835205078,431.32501220703127]},{"page":197,"text":"collection plan. 3-126","rect":[90.01799774169922,452.9790344238281,175.18499975585937,444.72601318359377]},{"page":197,"text":"combined arms, air-ground","rect":[90.02699279785156,466.39801025390627,197.63099890136719,458.072998046875]},{"page":197,"text":"teams. 3-108","rect":[100.10699462890625,474.9480285644531,152.74800329589844,468.3690185546875]},{"page":197,"text":"command and control","rect":[90.02699279785156,488.3760070800781,176.6240986328125,481.8330078125]},{"page":197,"text":"warfighting function tasks.","rect":[100.10699462890625,500.48101806640627,203.77256884765627,492.0480041503906]},{"page":197,"text":"3-120","rect":[100.10699462890625,509.0310363769531,123.2279990234375,502.4520263671875]},{"page":197,"text":"commander’s intent. 3-25","rect":[90.02699279785156,522.3510131835938,191.630708984375,515.7720336914063]},{"page":197,"text":"convoy security. 5-131","rect":[90.02699279785156,537.56103515625,180.10798864746094,529.2090454101563]},{"page":197,"text":"cueing. 3-143, 3-135","rect":[90.02699279785156,550.8809814453125,172.67128210449219,542.5289916992188]},{"page":197,"text":"cueing, mixing, and","rect":[90.02699279785156,564.2009887695313,167.6340048828125,555.8759765625]},{"page":197,"text":"redundancy. 4-22","rect":[100.10699462890625,574.5239868164063,170.27009802246094,566.1719970703125]},{"page":197,"text":"D","rect":[149.39999389648438,589.9199829101563,156.5911139240265,582.7886352539063]},{"page":197,"text":"decide; detect; deliver; and","rect":[90.0,604.7489624023438,197.6102774658203,597.0360107421875]},{"page":197,"text":"assess (D3A). 3-125","rect":[100.08000183105469,615.8009643554688,182.24099951171875,607.3679809570313]},{"page":197,"text":"decision point. 3-110","rect":[90.0,629.02197265625,173.12401037597656,620.7689819335938]},{"page":197,"text":"decision support matrix. 3-113,","rect":[90.0,642.3419799804688,213.09930529785158,634.0889892578125]},{"page":197,"text":"3-110","rect":[100.07998657226563,650.990966796875,123.20099096679688,644.4119873046875]},{"page":197,"text":"decision support template.","rect":[89.99999237060547,666.1019897460938,195.22169604492189,657.8759765625]},{"page":197,"text":"3-113, 3-110","rect":[100.07998657226563,674.7509765625,151.1639884033203,668.1719970703125]},{"page":197,"text":"defensive covering force. 5-108","rect":[89.99999237060547,689.843994140625,215.61116247558594,681.4110107421875]},{"page":197,"text":"disengagement criteria. 3-61","rect":[89.99999237060547,703.1639404296875,204.20546179199219,694.8119506835938]},{"page":197,"text":"10 January 2023","rect":[90.0,755.9609985351563,159.54300146484375,747.510009765625]},{"page":197,"text":"Index","rect":[294.1199951171875,131.21554565429688,335.74366358566285,119.61261749267578]},{"page":197,"text":"Entries are by paragraph number.","rect":[241.8000030517578,169.0535888671875,388.19148802757266,159.0182342529297]},{"page":197,"text":"E","rect":[311.6400146484375,211.44000244140626,318.28333467388156,204.3086395263672]},{"page":197,"text":"economy of force. 1-19","rect":[252.0,226.88099670410157,344.12402563476567,218.447998046875]},{"page":197,"text":"emergency resupply. 7-26","rect":[252.00001525878907,240.2010040283203,356.1210349121094,231.84901428222657]},{"page":197,"text":"execution decisions or","rect":[252.00001525878907,251.739013671875,341.1576140136719,245.19601440429688]},{"page":197,"text":"adjustment decisions. 3-111","rect":[262.08001708984377,263.8440246582031,374.2470114746094,255.4920196533203]},{"page":197,"text":"expeditionary military","rect":[252.00001525878907,277.2810363769531,336.54241943359377,268.9560241699219]},{"page":197,"text":"intelligence brigades","rect":[262.08001708984377,287.60400390625,344.21942138671877,279.27899169921877]},{"page":197,"text":"(E-MIB). 6-39","rect":[262.08001708984377,297.927001953125,316.16101293945317,289.4939880371094]},{"page":197,"text":"F","rect":[311.8799743652344,313.32000732421877,317.96553438854218,306.18865966796877]},{"page":197,"text":"field artillery. 6-23","rect":[252.0,328.7610168457031,323.1270163574219,320.3280029296875]},{"page":197,"text":"flank and rear defensive","rect":[252.00900268554688,340.29901123046877,348.2135947265625,333.64801025390627]},{"page":197,"text":"covering forces. 5-118","rect":[262.0889892578125,352.5210266113281,351.2133200683594,344.0880126953125]},{"page":197,"text":"flank covering force. 5-106","rect":[252.00900268554688,365.84100341796877,358.17297583007817,357.4079895019531]},{"page":197,"text":"four factors of legitimacy. 6-7","rect":[252.00900268554688,379.1610107421875,367.64999609375,370.7279968261719]},{"page":197,"text":"four primary types of security","rect":[252.00900268554688,392.48101806640627,367.63018798828127,384.0480041503906]},{"page":197,"text":"operations. 5-17","rect":[262.0889892578125,402.822021484375,327.21301489257817,394.5690002441406]},{"page":197,"text":"four principles of stability tasks.","rect":[252.00900268554688,416.2409973144531,376.55186572265628,407.8079833984375]},{"page":197,"text":"6-1","rect":[262.0889892578125,424.781982421875,275.1299765625,418.21197509765627]},{"page":197,"text":"H","rect":[311.3999938964844,441.9599914550781,318.5911139240265,434.8286437988281]},{"page":197,"text":"high-payoff target. 3-126","rect":[252.0,457.4010314941406,350.1270163574219,448.968017578125]},{"page":197,"text":"I","rect":[313.55999755859377,472.79998779296877,316.3288775691986,465.66864013671877]},{"page":197,"text":"initial response phase. 6-65","rect":[252.0,488.1419982910156,362.1257956542969,479.88897705078127]},{"page":197,"text":"integrating processes for","rect":[252.0,501.5610046386719,350.63728930664066,493.12799072265627]},{"page":197,"text":"reconnaissance and security","rect":[262.0799865722656,512.0009765625,376.26025390625,503.6759948730469]},{"page":197,"text":"operations. 3-121","rect":[262.0799865722656,522.2249755859375,332.243990234375,513.9719848632813]},{"page":197,"text":"intelligence preparation of the","rect":[252.0,535.6439208984375,370.16366796875,527.2109375]},{"page":197,"text":"battlefield (IPB). 3-122","rect":[262.0799865722656,545.9669799804688,351.6840231933594,537.5339965820313]},{"page":197,"text":"M","rect":[310.79998779296877,561.3599853515625,319.09666782474519,554.2286376953125]},{"page":197,"text":"medical platoon. 7-31","rect":[252.0,576.7019653320313,338.12100439453129,568.448974609375]},{"page":197,"text":"mine-dispensing systems. 5-47","rect":[252.0,590.2379760742188,376.0506003417969,581.9129638671875]},{"page":197,"text":"N","rect":[311.3999938964844,605.6400146484375,318.5911139240265,598.5086669921875]},{"page":197,"text":"named area of interest. 3-127","rect":[252.0,619.3079833984375,370.167330078125,612.6480102539063]},{"page":197,"text":"O","rect":[311.0400085449219,636.5895385742188,318.7888885746002,629.2291259765625]},{"page":197,"text":"offensive cover","rect":[252.0,650.1390380859375,312.59700610351566,643.488037109375]},{"page":197,"text":"types of. 5-97","rect":[264.9599914550781,662.2440185546875,319.52701025390629,653.81103515625]},{"page":197,"text":"P","rect":[311.6400146484375,677.6400146484375,318.28333467388156,670.5086669921875]},{"page":197,"text":"phases of the stability","rect":[252.0,693.0809936523438,338.58001708984377,684.6480102539063]},{"page":197,"text":"framework. 6-10","rect":[262.0799865722656,701.6220092773438,327.20312719726567,694.9710083007813]},{"page":197,"text":"preparation. 3-130","rect":[252.0,716.741943359375,325.64431982421879,708.4889526367188]},{"page":197,"text":"FM 3-98","rect":[289.3229675292969,754.18798828125,322.8839743652344,747.6090087890625]},{"page":197,"text":"R","rect":[473.3999938964844,211.44000244140626,480.5911139240265,204.3086395263672]},{"page":197,"text":"rear guard. 5-83","rect":[414.0,226.88099670410157,478.64431982421879,218.5290069580078]},{"page":197,"text":"reconnaissance","rect":[414.0,238.41900634765626,477.08459692382817,231.87600708007813]},{"page":197,"text":"five types. 4-33","rect":[426.9599914550781,250.5240020751953,488.12402563476567,242.09100341796876]},{"page":197,"text":"seven fundamentals. 4-2","rect":[426.9599914550781,259.06500244140627,525.5639975585938,252.41400146484376]},{"page":197,"text":"reconnaissance by fire. 4-19","rect":[414.0,274.2840270996094,527.1245444335938,265.85101318359377]},{"page":197,"text":"3-139","rect":[416.52001953125,285.8310241699219,439.64099340820317,279.25201416015627]},{"page":197,"text":"route security. 5-130","rect":[414.0,300.92401123046877,496.160982421875,292.5719909667969]},{"page":197,"text":"routine resupply. 7-21","rect":[414.0,314.2440185546875,497.1239951171875,305.8919982910156]},{"page":197,"text":"S","rect":[473.6400146484375,329.759521484375,480.28333467388156,322.3891296386719]},{"page":197,"text":"screen","rect":[414.0,343.29901123046877,441.08999853515629,338.4300231933594]},{"page":197,"text":"depth. 5-31","rect":[426.9599914550781,355.4220275878906,472.52429418945317,347.16900634765627]},{"page":197,"text":"initial. 5-40","rect":[426.9599914550781,364.06201171875,470.6010153808594,357.49200439453127]},{"page":197,"text":"stationary. 5-36","rect":[426.9599914550781,376.1670227050781,483.81299047851567,367.81500244140627]},{"page":197,"text":"security fundamentals. 5-5","rect":[414.0090026855469,389.4870300292969,519.6905844726563,381.05401611328127]},{"page":197,"text":"security operations","rect":[414.0090026855469,402.9240417480469,489.6684265136719,394.5990295410156]},{"page":197,"text":"cover. 5-93","rect":[426.968994140625,411.4740295410156,472.0499899902344,404.89501953125]},{"page":197,"text":"four types. 5-18","rect":[426.968994140625,423.5700378417969,489.57300024414067,415.13702392578127]},{"page":197,"text":"shape the battlefield. 1-10","rect":[414.0090026855469,436.7910461425781,517.6529868164063,428.45703125]},{"page":197,"text":"shaping. 1-30","rect":[414.0090026855469,450.21002197265627,468.69030981445317,441.8580017089844]},{"page":197,"text":"situational understanding.","rect":[414.0090026855469,463.6470031738281,516.7142802734375,455.3219909667969]},{"page":197,"text":"3-115","rect":[424.0889892578125,472.197021484375,447.20999365234379,465.6180114746094]},{"page":197,"text":"stationary flank guard. 5-69","rect":[414.0090026855469,487.2900085449219,523.1699545898438,478.85699462890627]},{"page":197,"text":"sustainability phase. 6-68","rect":[414.0090026855469,500.6100158691406,515.6135886230469,492.25799560546877]},{"page":197,"text":"T","rect":[473.8799743652344,516.1199951171875,479.96553438854218,508.9886474609375]},{"page":197,"text":"targeting. 6-23","rect":[414.0,531.56103515625,472.163423828125,523.2090454101563]},{"page":197,"text":"transformation phase. 6-67,","rect":[414.0,544.781982421875,524.1420146484375,536.447998046875]},{"page":197,"text":"6-66","rect":[424.0799865722656,553.4219970703125,442.16101293945317,546.8519897460938]},{"page":197,"text":"V","rect":[473.6400146484375,570.5999755859375,480.28333467388156,563.4686279296875]},{"page":197,"text":"vignettes","rect":[414.0,586.041015625,450.0657043457031,577.716064453125]},{"page":197,"text":"3-7 CAV Security Mission at","rect":[426.9599914550781,596.364013671875,539.1395732421875,587.9310302734375]},{"page":197,"text":"Objective Lions 2003.","rect":[437.0400085449219,606.803955078125,523.6659404296875,598.3619995117188]},{"page":197,"text":"5-11","rect":[437.0400085449219,615.344970703125,455.12100439453129,608.7749633789063]},{"page":197,"text":"applying security","rect":[426.9599914550781,627.449951171875,494.1000061035156,619.125]},{"page":197,"text":"fundamentals at","rect":[437.0400085449219,635.990966796875,501.22261157226566,629.3399658203125]},{"page":197,"text":"Arracourt. 5-19","rect":[437.0400085449219,646.4310302734375,497.1239951171875,639.8610229492188]},{"page":197,"text":"Napoleon’s Cavalry and","rect":[426.9599914550781,658.5360107421875,522.564302734375,650.10302734375]},{"page":197,"text":"Mission Command. 3-12","rect":[437.0400085449219,667.0859985351563,534.6809409179688,660.426025390625]},{"page":197,"text":"Reed's Bridge. 4-10","rect":[426.9599914550781,679.1820068359375,506.35888891601567,670.8300170898438]},{"page":197,"text":"Russian's","rect":[426.9599914550781,687.822021484375,465.7796936035156,681.279052734375]},{"page":197,"text":"Reconnaissance-strike","rect":[437.03997802734377,698.1419677734375,528.206392578125,691.5989990234375]},{"page":197,"text":"Model","rect":[437.03997802734377,708.4649658203125,461.59828076171876,701.9219970703125]},{"page":197,"text":"Index-1","rect":[508.43695068359377,754.1790161132813,540.0809653320313,747.6090087890625]},{"page":198,"text":"Index","rect":[72.0,44.4990234375,95.60340338134766,37.956024169921878]},{"page":198,"text":"Russo-Ukrainian War’s","rect":[92.04299926757813,94.1820068359375,184.13641357421876,87.63894653320313]},{"page":198,"text":"Donbas campaign. 2-24","rect":[101.99700164794922,106.28706359863281,197.60130529785156,97.93506622314453]},{"page":198,"text":"Shaping the Battlefield with","rect":[84.95999908447266,116.61006164550781,193.64488439941406,108.17706298828125]},{"page":198,"text":"Cavalry","rect":[95.04000091552735,126.93312072753906,125.57969665527344,118.5001220703125]},{"page":198,"text":"Index-2","rect":[72.0,754.1790161132813,103.64399938964844,747.6090087890625]},{"page":198,"text":"Entries are by paragraph number.","rect":[223.55999755859376,72.93359375,370.55980467796328,62.89823913574219]},{"page":198,"text":"Gettysburg, the First Day.","rect":[254.04299926757813,95.97309875488281,356.7509929199219,87.54010009765625]},{"page":198,"text":"1-4","rect":[264.0059814453125,104.41510009765625,277.04696875,97.94409942626953]},{"page":198,"text":"FM 3-98","rect":[271.322998046875,754.18798828125,304.8839743652344,747.6090087890625]},{"page":198,"text":"Third Armored Cavalry","rect":[408.9690246582031,95.97309875488281,499.509033203125,87.54010009765625]},{"page":198,"text":"Regiment in Tall Afar.","rect":[419.04901123046877,106.29609680175781,505.6713115234375,97.86309814453125]},{"page":198,"text":"6-17","rect":[419.04901123046877,114.837158203125,437.13003759765629,108.26715850830078]},{"page":198,"text":"10 January 2023","rect":[501.95697021484377,755.9609985351563,571.4999716796875,747.510009765625]},{"page":199,"text":"FM 3-98","rect":[478.2960205078125,76.7302017211914,537.9384923248291,64.8433609008789]},{"page":199,"text":"10 January 2023","rect":[445.3599853515625,95.87201690673828,538.0839873046875,84.60401153564453]},{"page":199,"text":"By Order of the Secretary of the Army:","rect":[84.95999908447266,263.274169921875,255.00934552764893,253.76519775390626]},{"page":199,"text":"Official:","rect":[84.9581069946289,405.8368225097656,118.33873700714112,398.3117980957031]},{"page":199,"text":"JAMES C. MCCONVILLE","rect":[350.6710205078125,320.4630126953125,490.01501684570317,311.45098876953127]},{"page":199,"text":"General, United States Army","rect":[356.64801025390627,334.5931701660156,484.0366725921631,325.0942077636719]},{"page":199,"text":"Chief of Staff","rect":[391.4540100097656,344.0722351074219,449.23413800811769,336.5572204589844]},{"page":199,"text":"MARK F.","rect":[84.95999908447266,471.5400085449219,134.9160018310547,462.8160095214844]},{"page":199,"text":"AVERILL","rect":[141.3300018310547,471.5400085449219,192.63000415039063,462.8160095214844]},{"page":199,"text":"Administrative Assistant","rect":[84.96000671386719,483.7702331542969,191.2285532913208,476.3754577636719]},{"page":199,"text":"to the Secretary of the Army","rect":[96.60029602050781,498.1689758300781,221.07774925231935,488.6700134277344]},{"page":199,"text":"2300900","rect":[139.15000915527345,510.80224609375,178.18984889221194,503.3674011230469]},{"page":199,"text":"DISTRIBUTION:","rect":[85.0009994506836,572.7229614257813,174.31701440429689,563.7109985351563]},{"page":199,"text":"Active Army, Army National Guard, and United States Army Reserve. To be distributed in","rect":[85.0009994506836,586.5831909179688,482.69621180725098,577.084228515625]},{"page":199,"text":"accordance with the initial distribution number (IDN) 116064, requirements for FM 3-98.","rect":[85.0009994506836,597.5611572265625,472.1331248245239,588.0621948242188]},{"page":200,"text":"This page intentionally left blank.","rect":[188.75999450683595,383.8313903808594,405.1457006931305,369.3237609863281]},{"page":201,"text":"This page intentionally left blank.","rect":[188.75999450683595,383.8313903808594,405.1457006931305,369.3237609863281]},{"page":202,"text":"This page intentionally left blank.","rect":[188.75999450683595,383.8313903808594,405.1457006931305,369.3237609863281]},{"page":204,"text":"PIN: 105332-000","rect":[418.7920227050781,725.490966796875,497.1720300292969,718.0709838867188]}]}