Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

AIR LAND SEA BULLETIN

 
Issue No. 2010-3 Air Land Sea Application (ALSA) Center September 2010

CORDON
AND
SEARCH

 
   
Approved for public release; distribution unlimited.
CONTENTS

Director’s Comments ....................................................3

FEATURE ARTICLES
Staff
Director
Col David B. Hume, USAF Cordon And Search Operations—
Deputy Director “A Deadly Game of Hide and Seek” ........................................ 4
COL Bruce Sones, USA
Editor
Inner Cordon as the Decisive Effort ..................................... 11
Mrs. Bea Waggener, Civilian, USAF
Illustrator
Ms. Laura Caswell, Civilian, USN Operation PITCHFORK—“An Armor Company-Team
Publications Officer Cordon and Search” ............................................................ 14
CDR (S) Cynthia Dieterly, USN
Proper Implementation of E-8C Joint Surveillance Target
Purpose: ALSA Center publishes the ALSB three times a
year. ALSA is a multi-Service DOD field agency sponsored
Attack Radar System (JSTARS) for Cordon and Search
by the US Army Training and Doctrine Command Operations .......................................................................... 20
(TRADOC), Marine Corps Combat Development Command
(MCCDC), Navy Warfare Development Command (NWDC),
and Curtis E. LeMay Center for Doctrine Development and
Education (LeMay Center). This periodical is governed by Civilian Casualty (CIVCAS)—
Army Regulation 25-30, Chapter 10. The ALSB is a vehicle
to “spread the word” on recent developments in warfighting “Communication Breakdown” ............................................. 23
concepts, issues, and Service interoperability. The intent is
to provide a cross-Service flow of information among
readers around the globe. Disclaimer: Since the ALSB is
an open forum, the articles, letters, and opinions Close Air Support (CAS) for Special Operations Forces (SOF)
expressed or implied herein should not be construed to
be the official position of TRADOC, MCCDC, NWDC, Cordon and Search ............................................................. 27
Lemay Center, or ALSA Center.

Submissions: We solicit articles and reader’s comments.


Contributions of 1,500 words or less are ideal. Submit IN HOUSE
contributions, double-spaced in MS Word. Include name,
title, complete unit address, telephone numbers, and e-
mail address. Graphics can appear in an article, but you
must also provide a separate computer file for each Current ALSA MTTP Publications ........................................ 30
graphic and photograph (photos must be 300 dpi). Send
e-mail submissions to alsadirector@langley.af.mil. ALSA New Projects ....................................................................... 33
Center reserves the right to edit content to meet space
limitations and conform to the ALSB style and format. ALSA 35th Anniversary ........................................................ 33
Next issue: January 2011. Submission DEADLINE: COB
1 November 2010. Theme of this issue is “humanitarian ALSA Organization .............................................................. 34
assistance.”
Reprints: ALSA Center grants permission to reprint
ALSA Mission and Voting JASC Members ........................... 35
articles. Please credit the author and the ALSB. Local
reproduction of the ALSB is authorized and encouraged. Subject Matter Experts Needed ........................................... 35
Calling all Humanitarian Assistance Experts....................... 35
Subscriptions: We continue to validate our subscriber’s
information and requirements. If you wish to discontinue
your subscription of the ALSB, please send an e-mail to
alsapubs@langley.af.mil.

Mailing/Distribution: This publication is packaged for Cover photo – US Soldiers from Charlie Company, 1st Battalion,
mailing and distributed by the ALSA Center at Langley
AFB, Virginia.
112th Infantry Regiment, 56th Stryker Brigade Combat Team,
thoroughly search houses during a cordon and knock with Iraqi
ALSA Center Web Sites: The ALSB and MTTP publications
that have no distribution restriction are at our public web
Army soldiers from the 2nd Battalion, 4th Brigade, 9th Iraqi Army
site: http://www.alsa.mil. All unclassified ALSA products are Division, at Taji Market, near Camp Taji, Iraq, August 2009. (Photo
available at our CAC-enabled web site:
https://wwwmil.alsa.mil. For classified ALSA MTTP
by SPC David M. Sharp, USA)
publications, visit https://www.acc.af.smil.mil/alsa.

ALSB 2010-2 2
Director’s Comments
For 35 years, the Air Land Sea Application Training Center (JRTC). CPT Greaves asserts
(ALSA) Center has proudly bridged the gap of that isolation of the target by the inner cordon
Service interoperability. We recently celebrated is key to conducting a successful operation.
this milestone with our 35th Anniversary Our third article gives a firsthand account of a
Dining Out. We were honored to have Maj Gen joint C/S operation with a US Armor
(S) James J. Jones, Deputy Director of Company/Team and an Iraqi Police unit from
Operations for US Central Command, a the commander, CPT Damasio Davila. Our
former ALSA action officer, give the keynote fourth article, by Capt James Holler,
address and COL (R) Gordon P. Lynch, the illustrates proper implementation and benefits
first ALSA Director, speak of ALSA’s early of using Joint Surveillance Target Attack
days. Additionally, I want to personally thank Radar System (JSTARS) to support C/S
all of the former ALSA Directors, action operations, bringing attention to a capability
officers and staff for attending and enlight- that is often underutilized by ground
ening us with their stories of ALSA’s lineage. commanders. Next, we present the serious
As ALSA closes out this milestone year, I issue of civilian casualties (CIVCAS) as a result of
want to reaffirm our commitment to address- miscommunication in positive identification
ing multi-Service interoperability issues with (PID) of targets. In their article, Capt Preston
multi-Service solutions. Meeting the immedi- Rhymer and Capt Eric Danielsen discuss the
ate needs of the warfighters remains our implications of CIVCAS and give
number one priority. We recently published recommendations on how to mitigate this issue
Conventional Forces and Special Forces in future operations. Finally, Capt Phil George
Integration and Interoperability (CFSOF), and outlines the potential issues and
revised Brevity. Military Diving Operations recommendations in an article about using
(MDO), Unmanned Aerial Systems (UAS), close air support (CAS) for special operations
Unexploded Ordnance (UXO), Explosive Ord- forces C/S missions.
nance Disposal (EOD), and Dynamic Targeting We have had many additions to the staff
are in the final stages and will be available here at ALSA over the last few months. I want
soon. The theme of our January 2011 ALSB is to give a hearty welcome to COL Bruce Sones,
Humanitarian Operations. We want to capture US Army, as our new Deputy Director. Bruce
the recent experience from natural disasters joins us from the Iraqi Theater where he
and humanitarian assistance operations. served as an advisor to the Iraqi National
Articles are due by 1 November 2010. Police. I want to also welcome Lt Col Drew
For this ALSB, we focus on cordon and “Stitch” Frasch and Maj William “Braveheart”
search (C/S) operations. C/S operations are a Wallis from the Air Force, LTC Reg Armstrong,
staple tactic in counterinsurgencies and are and MAJ(P) Steve Parker from the Army, and
common practice in Operation IRAQI our new Illustrator Ms. Laura Caswell to
FREEDOM and Operation ENDURING ALSA. Lastly, I want to say farewell to Lt Col
FREEDOM. Four years ago we published FM Robert “Slab” Bradeen, Lt Col Brent “Raygun”
3-06.20, MCRP 3-31.4B, NTTP 3-05.8, and Brockinton, and MAJ Joe Leach. These
AFTTP (I) 3-2.62, Multi-Service Tactics, Tech- officers have been an essential part of ALSA
niques, and Procedures for Cordon and Search and will be missed as they move on to other
Operations. For this ALSB we wanted to reach endeavors. Hopefully, this edition of the ALSB
out to warfighters to solicit information about will provide insights and views that will be
the current C/S fight to gain insight on new helpful to you. As always, we value your
TTP for the revision of the MTTP publication. feedback on the ALSB and all of ALSA’s MTTP
Therefore, we lead off with an article publications, so do not hesitate to let us know
written by John Sutherland, Rick Baillergeon, how we are doing. Better yet, send the editor
and Tim McKane, originally published in an article on a joint warfighting topic for
Armchair General Magazine that lays the publication in the bulletin!
doctrinal ground work of C/S operations by
detailing C/S task organization, phases of
operation, and keys to success. The second
article is written by CPT Jess Greaves, an DAVID B. HUME, Colonel, USAF
observer/controller at the Joint Readiness Director

3 ALSB 2010-3
CORDON AND SEARCH OPERATIONS—
“A Deadly Game of Hide and Seek”

DOD mission brief board from Operation RED DAWN.

By Perhaps the most famous cordon


John Sutherland, Rick Baillergeon, and search operation conducted to
and Tim McKane  date in Iraq was the ultimate capture
of Saddam Hussein. Working on
This article was originally intelligence received 24 hours earlier,
published in Armchair General Soldiers from the 4th Infantry Divi-
Magazine, 23 April 2008 issue. sion with special forces operators
conducted Operation RED DAWN on
Whether you grew up in a city or 14 December 2003. About 60
suburbia, the game of hide and seek Soldiers cordoned off an area of
is a common experience that most of roughly 2 square miles to enable the
…a variant
of hide and us can relate to. Today, a variant of preponderance of forces to search for
seek, called hide and seek, called cordon and Hussein. After initially coming up
cordon and search, is played daily throughout empty handed, forces researched the
search, is Iraq and Afghanistan. However, there farm. Finally, Hussein was dis-
played daily are two clear differences in this covered hiding in an 8-foot-deep,
throughout variant. First, it is obviously not a camouflaged, spider hole. Operation
Iraq and game. Second, the ramifications for
Afghanistan.
RED DAWN was a success!
winning and losing have much more
serious consequences.

ALSB 2010-3 4
INTRODUCTION
Cordon and search operations
have become one of the most
frequent operations in the Global
War on Terror. This type of combat
operation involves isolating the
target area and searching suspected
buildings to capture or destroy
possible insurgents and/or contra-
band. A cordon and search may also
be thought of as a movement to
contact, a raid, a deliberate attack, Figure 1. Task Organization
or as area reconnaissance, based on
the accuracy of intelligence. The typical organization for a
cordon and search operation con-
PURPOSE sists of a Command Element,
Why is the cordon and search Security Element, Search/Assault
used so frequently in Iraq and Element, plus a Support/Reserve
Afghanistan? The key reason is that Element to deal with the unexpected.
in this complex environment it has Command Element
proven to be an effective means to Effective command and control is
seize key materials that an enemy tantamount for all military opera-
may utilize or to seize personnel. tions and no less important during a
Materials could include weapons cordon and search. The Command
caches, explosives, contraband, Element is the headquarters of the
evidence, or intelligence. Personnel organization executing the operation.
normally fall into the categories of Careful consideration should be
insurgents, sympathizers, or crimi- given to the size and composition of …executing
nals. Cordon and search may also be this element. The Command Element a cordon
conducted for other reasons, perhaps should be large enough to effectively and search
as a show of force or to demonstrate coordinate and synchronize the is a think-
to the local populace that the security and search operations but ing man’s
government and not the insurgents must be small enough to not create game.
have control of the area. an overwhelming footprint and
become a burden on overall security.
ORGANIZATION The execution of a cordon and
Whether you consider yourself a search is no place for a commander
neophyte or a master tactician, to carry a big entourage with him!
executing a cordon and search is a The position of the Command
thinking man’s game. The challenges Element in relation to the search
of a complex urban environment can operation is another important
make your brain hurt just a bit. The factor. Since the focus of the
skilled tactician will disregard this operation is the actual search, the
pain and begin planning for success. Command Element usually positions
One of the first things to plan is your itself where it will be close enough to
task organization, so let’s begin by the search to carry out its duties but
understanding the task organization without getting in the way. Normally,
of battalion or company cordon and the Command Element will include
search operations. There are many host-nation representation in the
variations on task organizing; we will form of a police or government
portray one version below. (Fig. 1) official, adding legitimacy to the
overall operation.

5 ALSB 2010-3
Security Element cordon and suppress, cover, and
The Security Element consists of guard. The element executing the
two primary components: the outer inner cordon may utilize (among
and inner cordon. Cordon is a several methods): overwatch posi-
tactical task given to a unit to tions, support-by-fire positions, and
prevent the enemy’s withdrawal from emplacing snipers. One of the major
or reinforcement of a position. A differences in the outer and inner
cordon is a type of isolation. It cordon is the amount of terrain
implies seizing or controlling key involved. Whereas, the outer cordon
terrain and/or mounted and may require setting up forces along
dismounted avenues of approach many blocks (or kilometers if in an
along the search area. Let’s discuss open environment), the inner cordon
each one of the components may only require a block, a single
separately and then we will tie them building, or even a portion of a
together. building.
Outer Cordon
The main
The objectives of the outer cordon
objectives of
the inner
are to prevent anyone/anything from
cordon are to moving into the designated objective
protect the area (search area). (Fig. 2) This could
main effort… include enemy reinforcements or
and ensure even civilians who could disrupt the
the enemy operation. This element may utilize
can-not any of a number of tactical tasks to
enter or accomplish their purpose, including
leave the isolate, block, contain, deny, secure,
search area. etc. To achieve these tasks, an Figure 3. Inner Cordon
element may set up traffic control
points or blocking positions, emplace Establishing Cordons in an Urban
snipers, utilize observation posts, Environment
and conduct patrols. The com- Obviously the type of terrain and
mander will determine the various nature of the threat will dictate the
methods to use based on his inner and outer cordon location and
analysis. method. Planners must also consider
the type of construction searchers
will encounter among dwellings
when conducting cordons in built-up
areas. What’s important to remember
is to establish positive direct-fire
control measures between forces of
the inner and outer cordon.
Sequencing the Timing of the
Cordons
Tacticians must carefully con-
sider the sequence of establishing
Figure 2. Outer Cordon
the outer and inner cordons. Like
most combat operations there really
Inner Cordon
is not a cookie-cutter solution.
The main objectives of the inner
Planners must consider all METT-TC
cordon are to protect the main effort
[mission, enemy, terrain and
of the operation (the Search /Assault
weather, troops and support
Element) from the enemy and ensure
available-time available, and civil
the enemy cannot enter or leave the
considerations] factors in deciding
search area. (Fig. 3) The tactical
the timing of events. If the outer
tasks that may be utilized include
cordon is in place too early it could
those mentioned above in outer

ALSB 2010-3 6
alert the search area and compro-  Interrogation Team
mise the mission. The same is true  Mine Detection Team
with establishing the inner cordon  Combat Camera
first. If the operation is in a hostile  Civil Affairs Team
area with the inner cordon  Psychological Operations
established first, the threat could Team
react and cut off the inner cordon  Human Intelligence Team
before the rest of the friendly force is  Field Interview Team
in place. Operations in Iraq and  Sensitive Site Team
Afghanistan contend with this
 Escort Team
dilemma in almost every circum-
 Female Personnel Search
stance. Near-simultaneous establish-
Team
ment of the inner and outer cordons
seems to be the trend but is  Explosive Ordnance Disposal
extremely difficult to pull off. Team
Imagination is the only limit when it  Possibly the Media
comes to cordons. Given the right  And as many interpreters and
terrain and threat situation, aircraft linguists as you can get!
and unmanned aerial vehicles (UAVs) Again, imagination and careful
have been effective in augmenting planning drives the special team
cordons. Although these force configurations that the Search
multipliers are incapable of “holding” Element requires. The search may be
terrain they can provide early in the form of a forced entry where
shock and speed is used to rapidly …imagination
warning and bolster the security and careful
forces in achieving an effective gain control of the search area or a
planning
cordon. more benign approach can be used. drives the
Search Element Cordon and search operations special team
Now let’s look at the decisive normally fall into the categories of configu-
operation. The main purpose of a “Cordon and Kick” or “Cordon and rations…
cordon and search operation is to Knock or Ask.” Units use the same
find selected personnel or material. It organization of forces as a regular
is the Search Element’s job to do just cordon and search with similar
that. The Search Element contains security procedures, but instead of
an assault team, search team, breaking in the door the Search
security team, and a support team. Element knocks on the door and
The assault team seizes the objective informs the occupants that a search
to allow the search team to conduct is to be conducted. This may seem
the search. The security team odd given that this is still considered
provides on-location security of the a combat operation, but in the battle
immediate objective area and holds for the population’s hearts and
any detainees. The support team minds, politeness counts. Planners
provides overwatch in the search choose the hard or soft approach
area and is prepared to assist the based on the level of intelligence of
other teams as required. In addition the objective and the estimate of the
the Search Element may use many threat involved. Female Soldiers are
unique special teams depending on another important consideration to
mission requirements. Some of the include within the search team.
more common types of special teams Units must respect cultural taboos
include: in searching and handling of female
 Detainee Team noncombatants and children. Let’s
 Vehicle Search Team briefly discuss Cordon and Kick and
Cordon and Knock or Ask.
 Demolition Team
Cordon and Kick
 Documentation Team
When speed and surprise are
 Military Working Dogs
necessary, then this method will
 Tunnel Recon Team likely be executed. As the name

7 ALSB 2010-3
suggests, a cordon is quickly interrogation difficult and gives
emplaced and then the assault and inhabitants time to conceal evidence.
search teams quickly breach any One of the most effective methods
entrances (barriers, doors, etc.) and is to control the heads of the
begin the search for the targeted households. The head of each
person or material. The objective in household is told to remain in front
this method is obviously the target. of the house while everyone else in
Cordon and Knock or Ask the house is brought to a central
When a kinder, gentler approach location. During the search, the head
is required, then this is the preferred of the household accompanies the
method. Here, speed and surprise search team through the house.
are not paramount, while Disruption to the property is reduced
establishing rapport and building and the head of the household sees
relationships are. Certainly, speed that the search team is not stealing
and surprise are still important, but or damaging his property. This is the
they are sacrificed a bit to ensure the best method for controlling the
legitimacy of the operation is populace during a search. Which-
understood by the populace. The ever, method is used the search team
difference between Knock and Ask is: should be courteous and disrupt as
 In Knock, you are telling the little as possible when conducting
…speed and occupants of the location you the actual search. In spite of the
surprise are not are conducting a search. intrusive act of searching homes,
paramount, creating more hostility within the
 In Ask, you are asking the
while establish-
occupants of the location for population must be avoided.
ing rapport and
building permission to conduct a Support/Reserve Element
relationships search. The last element to discuss is the
are.  By the way, in Kick you are Support or Reserve Element. Since
simply conducting the search cordon and search operations involve
—no discussion required! finding hostile forces hiding in the
Once the search area is secured, open within the population anything
the search team usually conducts is likely to happen. It is the
the search using one of the following Support/Reserve Element that
methods: provides the commander flexibility to
 Central Assembly deal with the unknown. The exact
 Restriction to Homes composition of this element is
 Control the Heads of House- directly related to its anticipated
holds tasks. Possible missions may include
The central assembly method dealing with an angry crowd that
assembles inhabitants in a central threatens the outer cordon or
location. This method provides the reinforcing the Search Element in
most control, simplifies a thorough handling detainees. As a conse-
search, denies the personnel an quence, the Support Element must
opportunity to conceal evidence, and be prepared for just about anything.
allows for detailed interrogation. It Every member of the Support/
has the disadvantage of taking Reserve Element must be familiar
inhabitants away from their with the other elements’ roles and
dwellings which can provoke functions during a cordon and
hostility. search. Proper rehearsals are the key
Another effective way is to restrict to ensure mission readiness.
inhabitants to their homes. This One the most important aspects
prohibits movement of civilians and to conducting a cordon and search is
allows them to stay in their to have a contingency plan if contact
dwellings. The disadvantages of this is made during the operation. All
method are that it makes control and cordon and search operations should
be prepared to transition to hasty

ALSB 2010-3 8
attack. Again, careful considerations execute the decisive operation (the
as to direct-fire plans among the search). Timing is paramount in this
elements are imperative to avoid phase. A commander must ensure
friendly fire. The use of indirect fires the maneuver between the security
and/or close air support needs element and the search/assault
careful planning and consideration teams is synchronized. Certainly,
as well. Planners need to cautiously you do not want your search/assault
consider their approach into the teams getting to the objective before
search area as well as the withdraw the security element sets up the
routes. cordons. Conversely, if the security
element begins setting up the
PHASES OF A CORDON AND cordons too far ahead of the
SEARCH maneuver of the search/assault, you
If it’s a military operation there may very well lose surprise and even
are likely to be phases: cordon and compromise the operation.
search is no different! Below you will Phase 4: Cordon (Isolate) the
find the typical phases of a cordon Objective—We cannot stress enough
and search operation, some of which the importance of isolation in any
may be conducted in conjunction urban operation. As discussed
with one another. earlier, isolation within the context of
Phase 1: Planning—It all starts a cordon and search operation is
with a plan! Planning for a cordon achieved when an outer and inner
and search is no different than in cordon of the search area is
any other operation. A commander established. A commander may elect …the com-
and his staff will conduct a thorough to establish the cordons simulta- mander
mission analysis. The objective is to neously or one after the other. In must
achieve a complete understanding of either case, the commander must ensure he
your force, the enemy, and the ensure he utilizes a sufficient utilizes a
terrain and weather. With this number of Soldiers to make the sufficient
understanding, a commander can cordons effective. The commander number of
Soldiers to
develop feasible courses of action who assigns all his Soldiers to the
make the
and then select one to execute. What search/assault team will fail. cordons
is extremely critical during planning Establishing the cordons is critical effective.
is to explore "what if" and discuss and it requires Soldiers.
contingencies. Another factor to Phase 5: Conduct Search—
consider is that your planning Obviously, the decisive phase of the
timeline can also be very short: operation is the execution of the
Remember you are receiving time- search. The search element must
sensitive intelligence, so you may clear the area, search for the targets
have to execute the mission pretty (personnel or material), and then
quickly. conduct consolidation and reorgani-
Phase 2: Recon—As in any zation. As stated before, an element
operation, prior recon is good! will likely find itself augmented by
However, you must weigh this with various "specialists" to conduct the
the potential for giving away your search. These professionals bring
intent to your enemy. For example, it valuable expertise to the operation;
is probably not sound for you to however, in many cases they may
recon an area you have not been have limited experience working with
seen in before. This is a red flag to the element they are attached to.
the enemy that something may be This can be a test for any com-
happening here in the near future. mander.
Phase 3: Maneuver to Objec- Phase 6: Withdraw from
tive—Just as in every operation, you Objective—You maneuvered to the
must get to the objective in good search area, conducted the search
shape mentally and physically to and now it is time to leave the area of

9 ALSB 2010-3
operations (AO). As in most opera- identification, and you could initiate
tions, this is usually the most a public relations nightmare.
challenging phase of the mission. We Are in This Together—In
The principles for withdrawing from many situations (such as today), you
the search area are similar to a could be conducting operations in
withdrawal in any environment. Key support of a host-nation government;
in the withdrawal phase is proper thus, your operations must reflect
determination of withdrawal routes. this. If they do not, the country is
If at all possible never use the same likely to spin into more chaos than it
routes leaving as you did coming in. is currently in.
The chances are they will be far more Damage Control—When con-
dangerous this time around. ducting a cordon and search
Phase 7: Conduct After-Action operation you must keep collateral
Review—Although somewhat over- damage at a minimum. There is no
looked, this is one of the most better way to turn a populace against
important phases of the operation. you than to destroy their homes and
After the mission is complete, you businesses. It is also a good way to
must conduct a thorough analysis. dry up potential or current intelli-
What went right? What did not go so gence sources.
Commanding well? What are the lessons learned Act on Actionable Intelli-
a unit con- we can carry over to the next gence—In most cases, you have a
ducting a operation? These are all vital limited time to conduct an operation;
cordon and questions that must be answered. reliable intelligence ages quickly. If
search is a you let the window close, you may
supreme KEYS TO SUCCESS not see it again. Of course, do not act
challenge. Every mission has certain on highly questionable reports from
elements that will assist in mission questionable sources; this could put
accomplishment. Let’s briefly ad- Soldiers’ lives on the line for no good
dress those for cordon and search. reason.
Surprise—Obviously, you do not Commanding a unit conducting a
want to tip your hand about your cordon and search is a supreme
operation. Surprise ensures your challenge. As a commander you have
enemy cannot react prematurely. elements maneuvering in a relatively
This reaction could mean some type small area. These elements are often
of spoiling attack or hiding the intermixed with civilians and enemy
material or person you are looking acting as civilians. A commander
for. must know where his Soldiers are.
Speed—Once the operation be- He must also provide an environ-
gins, speed is critical. Of course, it ment where initiative is encouraged.
must be controlled speed. The micro-manager will not succeed
Isolate—As in all urban opera- in this operation.
tions, isolation is vital. You must
isolate the target area. That is the SUMMARY
cordon of cordon and search. You The cordon and search is one of
must ensure the target cannot the most universal types of tactical
escape or receive assistance from operations conducted in the war on
outside sources. terror. By understanding how the
Positive Target ID—There is forces are organized for this unique
much activity going on in an urban but common operation, you can
environment and in all likelihood appreciate the challenges. Whether
your target area is filled with at the company or battalion level,
civilians. This makes finding your cordon and search operations re-
target difficult even with the best quire detailed planning and creative
intelligence. Make a mistake in target thinking. It’s truly a thinking man’s
game!

ALSB 2010-3 10
INNER CORDON AS THE DECISIVE EFFORT

Iraqi and US Soldiers from 28th Infantry Division, Multi-National Division-Baghdad, enter a neighborhood gate
during a cordon and knock in Taji, Iraq. (Photo by PFC Ali Hargis, USA)

By command element, a search/assault


CPT Jess Greaves, USA element, a security element, and a
support element.
The cordon and search operation The command element maintains
is an increasingly common tactic command and control throughout
used by company and battalion level the operation ensuring synchroni-
commanders to further their counter- zation, as well as timely and
insurgency campaign plan. The thorough execution of subordinate
The security
purpose of this article is to make the tasks and purposes.
element is
argument that the inner cordon, The security element is respon- responsible
rather than the search element, sible for isolating the objective and for isolat-
should be regarded as the decisive specific target areas within the ing the
operation when conducting company objective. To accomplish this, it is objective…
level cordon and search operations. divided into two separate groups: the
FM 3-06.20/ MCRP 3-31.4B/ NTTP 3- outer cordon and the inner cordon.
05.8/ AFTTP (I) 3-2.62, Multi-Service The task for the outer cordon is
Tactics, Techniques, and Procedures generally to block or screen with
for Cordon and Search Operations, either an enemy oriented purpose
identifies the task organization of a such as preventing the enemy from
typical company level cordon and focusing effective fires on the decisive
search operation as having a operation or a friendly oriented

11 ALSB 2010-3
purpose such as allowing the as, with the reserve committed
decisive operation to exploit the elsewhere, one maneuver element
objective. The inner cordon generally generally struggles to conduct both
receives the task to isolate a specific the inner and outer cordons.
area in which the target is located Finally, by collocating the com-
preventing the enemy from escaping mand and control element with
from the objective area. either the inner or outer cordon, the
The search or assault element’s commander can place himself where
task and purpose is enemy-centric he can best synchronize the emplace-
such as clear, destroy, or neutralize. ment of the cordons as well as to
As the search element is generally allow the search element to pass
regarded as the main effort, its through the cordons and access the
purpose can be independent of the objective. Further, if the commander
other elements such as capturing a travels between his three maneuver
high value target (HVT), exploiting a elements, using them as his security
cache, or recovering captured coali- force, he will not have to deplete
tion personnel or equipment. them to maintain an independent
Finally, the support element acts security force.
similar to a reserve and is a force The doctrinally accepted task
multiplier during a cordon and organization generally associates deci-
search operation. This element siveness with the search/assault
should be positioned where they can element. When using the popular
…the enemy’s
preferred tactic
best accomplish their assigned plan- task organization which deviates
of blending is ning priorities and be-prepared-to tasks. from doctrine, decisiveness is gener-
eliminated by One generally accepted deviation ally associated with the search
the inner from doctrinal task organization has element as well. However, in either of
cordon. been to organize the company into these task organizations, the element
three elements: outer cordon, inner conducting the inner cordon is a
cordon, and search elements. In this better choice for the decisive effort.
task organization, the forces that The foundation for this argument is
would have been designated as a the commander’s intent to neutralize
reserve are committed during the the enemy and prevent him from
planning phase to the search ele- registering any credible effect on the
ment. This non-employment of a operational environment (OE). The
reserve is often necessary due to enemy’s ability to register credible
ancillary combat power depletions effects on the OE is effectively ter-
such as combat injuries, mid-tour minated once he is isolated on the
leave, and force protection respon- objective. Of the three available courses
sibilities which challenge the of action (retreating and blending
company’s ability to maintain a cred- into the populace, surrendering, or
ible self-sustaining reserve. Incor- fighting), the enemy’s preferred tactic
porating the reserve with the search of blending is eliminated by the inner
element gives the search element the cordon. Even if the search element
extra combat power required to never arrives to clear the enemy off
accomplish the unique and often the objective, as long as the inner
unexpected control measures that cordon remains intact to prevent the
may be required on the objective enemy from escaping, the com-
such as sensitive site exploitation, mander has accomplished his intent.
detainee handling, street level engage- In order to isolate the enemy, the
ments, and population control. company must constantly strive to
Rather than assigning the inner reduce the time between burning the
and outer cordon to one security target (the point at which friendly
element, these two tasks can be split actions inevitably convey com-
between the two remaining maneu- mander’s intent to the enemy) and
ver elements. This is often necessary isolating the objective to achieve a

ALSB 2010-3 12
tactical situation in which the enemy feature, or even a neighborhood, the
cannot escape. The time between commander has achieved the desired
these two actions is significant as effect of eliminating any credible
this is the window that the enemy effect the enemy can have on the OE.
has to escape off the objective and The second argument is that the
blend into the local population. inner cordon should not be estab-
Minimizing burn to isolation time lished without the outer cordon to
is essential. Company commanders protect it. However, this is not
accept tactical risk each time they necessarily accurate. While the inner
put troops outside the wire to cordon will eventually require the
conduct operations. The commander protection of the outer cordon in
must balance two conflicting moral order to focus its efforts on pre-
responsibilities, that to accomplish venting the enemy from escaping the
his mission and that to safeguard objective, the commander is only
the lives of his Soldiers. By decisively accepting additional tactical risk
establishing the inner cordon, the during the period between burning
commander reduces burn to isola- the objective and establishing the
tion time, greatly increasing his odds outer cordon. Also, during this
of isolating the objective while the period the inner cordon should be …the time
HVT is still there. This ensures the able to protect itself. The inner sensitive
greatest chance that the cordon will cordon is comprised of a rifle platoon operation
isolate and the search element will with the same, or similar, armament which
capture the HVT. This dramatically to the outer cordon. If in contact neutralizes
increases the worthiness of the with the enemy, the inner cordon the enemy is
tactical risk that the company should be able to close with and the inner
cordon.
commander has assumed by con- destroy them rather than relying on
ducting the mission to begin with. the outer cordon to provide this
To further decrease the burn to protection. This additional tactical
isolation time, the company com- risk can be further offset by increas-
mander should consider establishing ing the inner cordon’s combat power
the inner cordon prior to or simul- by task organizing a portion of the
taneously to the outer cordon. While reserve to the inner cordon and allow-
there is an increased immediate ing this element to then pass to the
tactical risk associated with estab- search element after the outer
lishing the inner cordon without an cordon has been established. An opti-
already established outer cordon, it mal time for this reallocation of com-
is outweighed by the long term bat power occurs when the search
tactical risk of repeated missions to element passes through the inner
capture an HVT who escapes due to cordon in order to access the objective.
lack of isolation or retaliatory actions Successful cordon and search
by an escaped cell leader. operations have become one of the
There are two arguments against pillars of US efforts in both Iraq and
assigning the decisive effort to the Afghanistan. Company commanders
inner cordon and establishing it of maneuver elements will most
independently of the outer cordon. likely face this tactic during a 12-
The first is that the inner cordon month rotation to either arena.
cannot be the decisive effort as it Company commanders must identify
does not actually capture the enemy; their intent, properly designate their
it merely holds the enemy in place decisive operation, and allocate task
allowing the decisive operation to kill organized combat power in a manner
or capture him. However, on closer that best supports their determined
examination the time sensitive oper- intent. In so doing, they greatly in-
ation which neutralizes the enemy is crease the likelihood of accomplish-
the inner cordon. Once the enemy is ing their mission and safeguarding
isolated in a structure, a terrain the lives of their Soldiers.

13 ALSB 2010-3
OPERATION PITCHFORK—
“An Armor Company-Team Cordon and Search”

US Soldiers from 2nd Battalion - 162nd Infantry out of Patrol Base Volunteer set up perimeter security with
M2A3 BFVs during a Quick Response Force mission in Sadr City, Iraq, in support of Operation IRAQI FREEDOM.
(Photo by SSgt Ashley Brokop, USAF)

conducted to confirm or deny


By insurgent activity. Based on the
CPT Damasio Davila, USA terrain and mission focus, the
Company-Team was task organized
Since the beginning of the Iraq and attached enablers that allowed
Based on the War there have been countless the mission to be easily executed.
terrain and cordon and search operations.
mission focus, Numerous tactics, techniques, and BACKGROUND
the Comany- procedures (TTP) are used when During OIF 06-07, D/1-12 CAV
Team was task
conducting a cordon and search. operated throughout Iraq but
organized and
attached
This article focuses on how Delta concluded its tour in the Buhritz
enablers that Company, 1st Battalion, 12th sub-district of southern Baqubah.
allowed the Cavalry Regiment (D/1-12 CAV), a The company operated out of a
mission to be Company-Team, conducted a joint combat outpost that was the former
easily executed. cordon and search operation with Buhritz Iraqi Police Station (BIPS).
the local Iraqi Police (IP) during The BIPS was located on the western
Operation IRAQI FREEDOM (OIF) part of town, along the Diyala River.
06-07. By gathering intelligence from The company was task organized
the local population and including into a headquarters platoon, two
the local security forces, a cordon tank platoons, and one mechanized
and search of Al-Karam was infantry platoon.

ALSB 2010-3 14
Due to offensive operations over Abu Ali claimed that hayy Al-
the past year and the creation of a Karam, a neighborhood south of
Concerned Local Citizens (CLCs) hayy Al-Tamimi was an insurgent
program, there was a decline in staging and bed-down point. He
insurgent activity which allowed the stated that the local CLC had seen
people to re-build their homes and men in Al-Karam who later that
live in relative peace. The CLCs evening fired at the local CLC strong-
augmented the local Iraqi Police (IP), point. He additionally stated that
and together, they were able to retain livestock had been killed or maimed
areas by establishing checkpoints in explosions in the field between Al-
and defensive positions. D/1-12 CAV Tamimi and Al-Karam, suggesting
helped to increase the role of the that IEDs had been the cause. Upon
Iraqi Security Forces (ISF) by reviewing this information with COL
conducting joint cordon and search Yaheea, the local IP Chief, he
operations. confirmed that hayy Al-Karam had in
The Buhritz area was composed fact been abandoned for some time.
of several neighborhoods or hayys. Manning issues did not afford COL
D/1-12 CAV
Most hayys were Sunni, with a small Yaheea the ability to patrol this
helped to
outcropping of Shia that lived east of peripheral and vacant town increase the
Buhritz in hayy Al-Tamimi. During effectively. He stated that any family role of the
the height of insurgent activity, the moving into the area had to inform Iraqi Security
Shia had been displaced but later the local IP of their move and since Forces (ISF) by
returned at the invitation of the local this had not occurred, he concluded conducting
government. Improvised explosive that these men were insurgents. He joint cordon
devices (IEDs) had been placed along suggested that together we conduct a and search
Route Yankees on the east side of mission to clear the area. Then he operations.
Buhritz leading to Al Tamimi. While could convince the CLC to establish
most were discovered, some a strong-point to retain the area. I
detonated on the local population. spoke with MAJ Mohammed, the
One detonation injured the brother local Iraqi Army commander for the
of Abu Ali, the sheik or leader of Al- Buhritz area. MAJ Mohammed
Tamimi. During a meeting with Abu agreed with COL Yaheea and was
Ali, we learned that his brother’s leg willing to task several soldiers and a
had been amputated in the mangled vehicle in support of a mission to
remains of a pick-up truck. Abu Ali clear hayy Al-Karam. Faced with the
also presented us with a 155mm reports of possible insurgents in
artillery shell, proclaiming that he hayy Al-Karam and backed by the
had found and disarmed this IED Iraqi Security Forces, I planned an
along the road. Based on what we operation to search hayy Al-Karam.
learned at this meeting, we requested
an Explosive Ordnance Disposal PLANNING THE OPERATION
(EOD) team. With input from the battalion
While CLC strong-points over- commander and operations officer, I
watched the Al-Tamimi/Buhritz began conducting troop leading
road, they were incapable of procedures and drafted an
deterring insurgent activity during operations order. Terrain analysis of
hours of darkness. To mitigate the hayy Al-Karam indicated that the
lack of night vision devices at CLC area consisted of approximately 17
strong-points, D/1-12 CAV incor- distinct compounds with numerous
porated a section of M1A2 and M2A3 structures along a hard-packed road
Bradley Fighting Vehicles (BFVs) into known as Route Dodgers. Weaving
the CLC area of defense. The night out to the east, Route Dodgers
vision devices and thermal sites on intersected with Route Detroit, a
the vehicles allowed us to identify two-lane paved highway. A palm
potential insurgent activity. grove was located on the western

15 ALSB 2010-3
edge of the neighborhood while fields the cordon and search of Al-Karam
to the north and south of the area along with the attached ISF. Their
provided clear observation and ample M2A3 BFVs would establish the
stand-off. The enemy was templated northern part of the outer cordon
as having placed defensive IEDs while two of Diablo White’s tanks
along Route Dodgers to the west of and a headquarters tank were tasked
Al-Karam. The IEDs would serve as to serve as the southern part of the
early warning and allow enemy outer cordon. The headquarters
forces to leave the area. The platoon, along with the IP, was
operation determined that any force tasked with establishing a blocking
entering hayy Al-Karam would have position to the east of Al-Karam
to be dismounted in order to conduct along Route Detroit to prevent
a thorough search of the dense movement from the west into the
structures. However, a dismounted objective area. Diablo Red was
force would be vulnerable to IEDs tasked with securing the BIPS and
and small arms fire. To mitigate this, providing a section of tanks as an
the bulk of the search force would armored reserve or quick reaction
arrive in armored vehicles and the force (QRF). Enabler support was
dismounted approach into Al-Karam received after requests were made
would begin after Route Dodgers was through battalion. The battalion
cleared and the outer cordon was attached an EOD team and sniper
established. The dismounted avenue team, while the brigade attached a
of approach would lead in from the Combat Camera crew and two AH-64
The threat of west where they could take helicopters. The EOD team was
IEDs in the advantage of the cover and con- tasked with reducing IEDs and other
fields deter- cealment offered by the palm grove. unexploded ordnance (UXO). The
mined that an The threat of IEDs in the fields Combat Camera crew was tasked
outer cordon determined that an outer cordon with recording the operation while
would best be
would best be achieved by tracked the sniper section identified and
achieved by
tracked vehicles. The M2A3 and M1A2 BFVs reported potential threats. The AH-
vehicles. could better sustain IED blasts and 64s were tasked with maintaining a
utilize fire control systems to identify screen line to the southeast of Al-
and neutralize potential threats. Karam. A route clearance team was
Although Route Detroit was far requested to clear Route Dodgers but
enough away from the objective area was unable to support the operation
not to be a direct factor, it allowed us because of priority taskings.
access to a high-speed avenue of
approach. To protect this key terrain, SCHEME OF MANEUVER
a blocking position was established At 1006 30 Nov 07, Bone White
south of the intersection of Route conducted a combat patrol to Al-
Dodgers and Route Detroit. Tamimi where they inserted the
During this time, Delta Company sniper team. The sniper team was
was comprised of one headquarters tasked with identifying and reporting
platoon of about 15 soldiers, two activity within Al-Karam the night
armor platoons, Diablo Red and prior to the operation. The sniper
Diablo White, and one infantry team established a hide within Al-
platoon, Bone White. The armor Tamimi and reported their location
platoons were assigned 16 Soldiers and status over the radio every 30
each while the infantry platoon was minutes. Bone White was on-call to
composed of approximately 50 pick-up the snipers in the event they
Soldiers. Since Bone White became compromised. At 1105 30
comprised the bulk of the company’s Nov 07 Diablo White and the
dismounted force and could headquarters platoon began move-
simultaneously operate its vehicles, ment from the BIPS to the blocking
it was tasked as the main effort for position along Route Detroit. The

ALSB 2010-3 16
Scheme of Maneuver

sniper section reported that there position along Route Detroit. The
had been no movement within Al- Bone White M2A3 BFVs and the
Karam that evening. From their Diablo White tanks simultaneously
position, they continued to over- established the outer cordon. Once
watch Al-Karam throughout the the outer cordon was established,
operation. At 1106 30 Nov 07, Bone Bone White began their movement
through the palm grove and into Al- An M2A3
White with attached ISF, EOD team,
Karam. BFV served
and Combat Camera crew began as the center
movement towards Al-Karam. Once To maintain situation awareness
of a “V” for-
Bone White reached Route Dodgers, of friendly locations, all vehicle mation while
an infantry squad dismounted and commanders, squad leaders, snipers, the infantry
began to clear the sides of the road and helicopter pilots were provided radiated out
leading into Al-Karam. An M2A3 BFV with common operating graphics at 45 degree
served as the center of a “V” that identified each compound by angles on
formation while the infantry radiated number. As a squad approached a either side….
out at 45 degree angles on either compound, they would relay the
side of the M2A3. This technique had compound number over the company
been used in the past and was radio. This enabled the company to
successful at identifying command- quickly identify the location of
wired IEDs. Once Bone White had friendly forces. Additionally, it
cleared the road, the remainder of allowed the company to relay the
the platoon dismounted on the locations of unknown forces within
western edge of the palm grove and Al-Karam. When in dense areas, the
set in a hasty assault position. By Bone White squads utilized smoke
this time, headquarters platoon with and bounding techniques to relay
the IP had established a blocking their position and secure their

17 ALSB 2010-3
movement. During the course of the southern portion of the cordon
their search, the squads located a and moved towards Route Detroit.
tripod. It was believed that this Once on Route Detroit, the
tripod served as the base for some headquarters blocking position was
sort of indirect or surveying sighting removed and the platoon proceeded
device. The squads continued their to move back to the BIPS. After
search into the northern field and ensuring the IP had left the southern
identified an IED. The IED consisted town, the tanks proceeded north on
of three explosive fuses bound Route Detroit and back to the BIPS.
together at the base and wired
together with a detonation cord. The LESSONS LEARNED
IED was secured and disposed of by The inclusion of the ISF in this
the EOD team. operation allowed them to learn that
During this operation, the AH- intelligence was actionable and
Good relation- 64s were assigned to the company would yield results. Once Al-Karam
ships with the and controlled by the headquarters was cleared, the CLCs retained
local popula-
platoon. They were given two grids control of the area by placing a
tion and ISF
are necessary. that delineated the ends of an strong-point in the hayy. Conducting
imaginary line on the ground. This this operation empowered the ISF
line became the screen line and the and led them to conduct their own
aircraft would fly back and forth on operation where several men were
this line. They were occasionally arrested and another area cleared.
ordered to fly over Al-Karam to Though the results of this operation
observe compounds and the yielded very little in terms of tangible
surrounding fields. While flying the evidence, it did serve as an exercise
screen line, the pilots identified an that united the Company-Team and
exodus of vehicles and men in a ISF with the local population.
town south of Al-Karam. They Good relationships with the local
reported the event over the company population and ISF are necessary. In
net and the information was relayed this operation, you can see that the
to the IP. The IP at the blocking relationships with Abu Ali, COL
position stopped several of the cars Yaheea, and MAJ Mohammed
that had moved north on Route resulted in actionable intelligence
Detroit. The men that left on foot and better security for the area. As a
were coerced to return to the town result of including the ISF
after the helicopters dropped flares commanders, they were empowered
in front of their path. COL Yaheea and encouraged to conduct future
had one of the drivers arrested when joint operations. A weekly visit with
he could not provide identification. the local leaders and security force
The driver led the IP to the southern commanders to discuss the area
town where they were able to arrest facilitated two-way conversation.
several other men who had fled. These conversations provided leaders
As the operation in Al-Karam the ability to express their concerns
concluded, a group of CLCs and painted a better picture of what
established a strong-point in one of each group was doing.
the buildings. Once the strong-point Request enabler support! The
was established, the Bone White worst that can happen is someone
infantry squads moved back to the says no…and then ask again. For
palm grove for pick-up. The sniper this operation, I was provided with a
section left their hiding position after number of enablers that contributed
the infantry squads had cleared Al- to mission success and greater
Karam and left in the M2A3 BFVs. situational awareness. I was not
The BFVs then moved back to Route excited about being tasked a Combat
Dodgers to pick up the rest of their Camera crew for this operation, I
platoon. Diablo White displaced from thought that they would get in the

ALSB 2010-3 18
way but as it turned out, the Combat During this operation, the Bone
Camera crew documented the entire White squads spray painted an
mission on over 100 photographs. orange “X” on the outside wall next
Through these photographs, we to the door of the room or building
conducted an after action review, that had been searched. They also
talked about lessons learned, and identified suspicious characteristics
created story boards. Additionally, of a structure with orange arrows.
we framed pictures of the ISF This technique ensured that the
personnel and presented them to squads had searched all structures
COL Yaheea and MAJ Mohammed. and identified potential hazards to
When dealing with enablers, directly the rest of the platoon and
assign them to the lowest unit that attachments. This technique is
they are supporting. Make controversial as it appears disre-
contingencies in the event that spectful to the local population. With
enabler support is not available; for prior planning, paint or cleaning
example, we modified our movement supplies can be distributed once the
into Al-Karam by dismounting forces operation has concluded to re-paint
to clear the route when route or remove the marking systems.
clearance was not available. Retain what is cleared. This
Utilize the snipers to answer operation would have been futile
questions or commander’s critical without an ability to retain what had
information requirements (CCIR) you been searched and cleared. By
have about the objective. Snipers are placing a CLC strong-point in Al-
highly trained Soldiers that can be Karam and conducting presence Indirect fires
used to gather intelligence about an patrols, we ensured that this area are force
area or observe indirect fires. Prior to could not be used by insurgents multipliers
the operation, I should have used again. Additionally, the snipers could and add to
sniper teams to record patterns of have repositioned to Al-Karam after operational
life in the area. Having the the operation to assist the CLC security.
intelligence about the area could strong-point in the event of an
have prepared me to plan for a evening attack. They could have also
clearance of the southern town. The been used to observe illumination
snipers observed the objective 24 rounds and provide the CLCs greater
hours prior to the operation; but visibility.
because Al-Karam was abandoned, There was a dependence on direct
they could only report what they fires in the form of a 25mm chain
observed, which was nothing. The gun and 120mm cannon, and as a
snipers should have been tasked result, there was no indirect fires
with establishing a position within or plan for this operation. Indirect fires
closer to Al-Karam prior to, during, are force multipliers and add to
and after the operation. This would operational security. Preplotted
have provided better situational targets on possible enemy locations
awareness of the objective, focused within and in vicinity of Al-Karam
the efforts on the objective, and would have maximized lethal effects
made the snipers directly available to and limited friendly exposure. Smoke
the Bone White infantry squads. The could have screened Bone White’s
snipers were underutilized for this movement when clearing Route
operation because of a lack of Dodgers and moving through the
planning and guidance. palm grove. Additionally, use indirect
Number structures and use fire assets to protect sniper
marking systems to clearly illustrate positions. In this case, indirect fires
where Soldiers are and what rooms/ would have responded quicker than
buildings have been searched. any QRF.

19 ALSB 2010-3
Proper Implementation of E-8C Joint Surveillance Target
Attack Radar System (JSTARS) for Cordon & Search Operations

The weapons section of the E-8C Joint Surveillance Target Attack Radar System aircraft voices targeted
information to the fighter and bomber aircraft during their exercises in the Korean Peninsula area. (Photo by
TSgt Rey Ramon, USAF)

By officers/technicians (AIO/T) rely on


Capt James “Screamin” Holler, cross-cueing the radar data with off-
USAF board assets. MC-12s, P-3s, attack
helicopters, remotely piloted aircraft
The JSTARS radar, the AN/APY7, (RPA), and joint terminal attack
recently received the IR 5.3 radar controllers (JTAC) operating in the
upgrade to enhance its ability to area provide the “eyeball” to allow
accurately track dismounted moving proper identification of a track of
target indications (DMTIs) with low interest (TOI).
radar cross-sections (LRCS.) This The next consideration is
improved DMTI can support multiple location. Is the operation within a
Urban areas are mission sets. One such mission is large urban area or a rural village? Is
of particular support to cordon search operations. the region mountainous or heavily
concern because The key considerations are the forested? Urban areas are of
…roads that run cordoned area itself, the JSTARS particular concern because even
parallel to the user interface, and the interoper- though the radar can track in these
JSTARS’s orbit
ability of JSTARS with other areas, roads that run parallel to the
will be screened
platforms. JSTARS’s orbit will be screened due
due to buildings.
There are a few key points to to buildings. Second, the sheer
consider in using JSTARS in any amount of MTI makes it extremely
operation. The first is that JSTARS difficult for JSTARS surveillance to
doesn’t have an on-board capability track.
to identify a target, it only detects Mountainous or heavily forested
movement. The air battle managers areas also result in screening. To
(ABM) and airborne intelligence negate the effects of terrain, JSTARS

ALSB 2010-3 20
must shift its orbit to look up the such as timing, choke points, blind
valleys instead of across them. To spots, objective buildings, and
reduce the impact of foliage the E-8 ingress/egress routes must be
must be perpendicular to the roads, covered to maximize sensor coverage.
which is difficult to do if they aren’t Also, the E-8’s command and control
straight. Therefore, the ideal search (C2) capabilities must be addressed
zones are suburban and outlying and utilized. This includes packaging
rural township areas. The limited the air assets and assigning the E-8
terrain and foliage maximize JSTARS investigate authority of TOI. How will
ability to track low radar cross- the E-8 crew communicate to the
section (LRCS) targets that are other players? Will it be via radio,
fleeing the cordoned zone. IRC or messages in improved data
The operator interface onboard modem (IDM) to the OH-58s? How
JSTARS provides many options to will the E-8 reference the ground
enhance the situational awareness track? “Bullseye” is the quickest
(SA) of crews both on-board and on means of cueing assets to a target,
the ground. The crew can overlay but lacks the accuracy of universal
moving target indicator (MTI) data on transverse Mercator (UTM) or
current satellite imagery of the geographic reference (GEOREF). JSTARS
cordoned area. This allows the ABM Another option is referencing link integration
or AIO to add accurate fill-ins, such tracks over IDM. in the plan-
as specific buildings or terrain During Phase I, the ground forces ning phase is
features while talking assets onto a take position along the perimeter of essential.
TOI. To pass the information off- the village as planned. Their
board, JSTARS utilizes a robust locations, and the search patterns of
communications suite. It’s equipped the RPAs and other air assets, will be
with internet relay chat (IRC), Force transmitted to JSTARS via FBCB2
Battle Command Brigade and Below and JTIDS respectively. This pro-
(FBCB2), Joint Tactical Information vides JSTARS the big-picture of the
Distribution System (JTIDS), JVoice operation, enabling the crew to
[software-based voice over Internet provide information to the correct
Protocol], surveillance coordination entities. This picture allows E-8
data link (SCDL), Personal Computer operators to focus their tracking
Improved Data Modem (PCIDM™), and efforts on any gaps in coverage that
satellite communication (SATCOM) to may exist, and either inform the task
compliment its 12 UHF, 4 VHF, and force about the gaps, or assume
HF radios. Also, the Combined Enter- responsibility for reporting move-
prise Regional Information Exchange ment in those areas.
System (CENTRIXS) will be added soon. Phase II is the initial push into
So, what will JSTARS support the zone and is typically the most
look like for a cordon and search hectic time. The enemy will attempt
operation? The following scenario is to either blend-in, escape, or resist.
based on a cordon and search in the JSTARS, with its DMTI capability,
vicinity of a rural village commonly focuses on two things: escape
found in the current operational attempts or signs of “milling”. If
theatre and has four phases (phase 0 individuals try to flee the area, the
through phase 3). E–8 operator will see a stream of
Phase 0 is the planning phase, radar “dots” heading away from the
followed by marshalling, ingress, and area, and this is considered
finally extraction. The players for this “coherent movement.” Milling is
scenario include the task force on nonspecific localized movement and
the ground, 2 x OH-58 attack helos, can indicate a mortar team setting
1 x RC-12, RPAs, and an E-8. up or a group of individuals about to
JSTARS integration in the strike the search team. Once
planning phase is essential. Aspects movement is detected, the E-8 crew

21 ALSB 2010-3
analyzes the MTI data to confirm it on the RPAs and OH-58s. Addition-
didn’t originate from the cordon and ally, signals intelligence (SIGINT) hits
search team. Next, the ABM passes from other platforms can provide
that information to the cross-cue ellipses for JSTARS to search within
asset, the asset validates the TOI, for suspect movement in the vicinity.
and the information is passed to the After the search is complete,
task force commander. Below is a Phase III begins and the E-8 provides
communications example to a OH-58 over-watch of the egress. It provides
using an IDM track to cue it to the updates to the convoy commander
location. and airborne support assets of any
E-8: “Kiowa 11, Strikestar with movement that could intercept the
tasking” convoy, as well as individuals
The E-8 can be OH-58: “Strikestar, Kiowa, go with attempting to plant improvised
a force multi- tasking” explosive devices (IEDs). This
plier for cordon E-8: “one-one, capture track 345, provides the convoy commander with
and search call ready details” advance notice and time to adjust
OH-58: “Track 345 captured, ready
operations…. their response posture accordingly to
details”
ensure safe passage back to the
E-8: “Possible personnel on foot,
originating in field 75 meters staging area.
NE of bldg 6 track N.” The E-8 can be a force multiplier
OH-58: “One-one copies all, overhead for cordon and search operations
now. Visual, 4 armed personnel and is most effective when integrated
fleeing N.” early in the planning process.
At that point the decision of how JSTARS specializes in using its
to prosecute the track falls under the sensor to compliment its system, and
appropriate rules of engagement others, by pulling information from
(ROE) for the situation. Once the multiple sources to develop an
immediate scene has stabilized and accurate “big-picture” of the ground
the search commences, the E-8 war. This provides the field
assists by providing a wide swath of commanders with enhanced SA of
coverage to compliment the sensors the tactical situation.

An E-8C JSTARS aircraft takes off for an intelligence, surveillance, and reconnaissance mission.
(US Air Force file photo.)

ALSB 2010-3 22
CIVILIAN CASUALTY (CIVCAS)—
“Communication Breakdown”
 
By operated by not standardizing and
Capt Preston “Broose” Rhymer, USAF simplifying the terminology and pro-
Capt Eric “Julio” Danielsen, USAF cesses involved in differentiating
between combatants from noncom-
In counterinsurgency (COIN), batants for determining PID. The
we—Airmen and the terminal attack authors advocate specific terminol-
control (TAC)—have a very difficult ogy and process solutions be added
task. Until we identify, geolocate, to relevant ALSA MTTP publications
and action the insurgent, he holds such as JFIRE and BREVITY.
the initiative. If we do our job well,
we can make tactical and operational Terminology
gains. If we do our job poorly, we can Human Categories—We spend a
have a negative strategic impact. lot of time watching the world
through full motion video (FMV) and
BACKGROUND describing what we see, but without
In the early morning hours of 21 standard terminology, we describe
February 2010, two OH-58Ds decis- things differently. Operators are
ively struck a 3-vehicle group in …by standard-
routinely tasked to count the
Oruzgan Province, Afghanistan, kill- izing the
number of people in an area of categories of
ing up to 23 civilian men and interest and determine their sex and
injuring 13 men, women, and observed
ages. Some report military-aged people, one
children. The subsequent investiga- males (MAM), teenagers, and adoles- can mitigate
tions revealed that several com- cents. Some of these terms have the use of
pounding mistakes, made by various commonly understood definitions, ambiguous
operators from various branches of but many of them are dangerously terminology
the military at various locations, ambiguous. In the 21 February and
culminated in an incorrect positive CIVCAS incident, some people were subsequent
identification (PID) declaration. terminology
assessed to be children. That assess-
drift.
ment was then re-characterized as
PROBLEM adolescents after follow-on video
Differentiating between combat- review. That was, in turn, translated
ants and noncombatants can be very into teenagers. The teenagers were
difficult. If one lacks standardized then assumed to be MAMs. At the
terminology to characterize the end of the day, they were all resolved
people they observe and the to be targeted non-combatants. In
confidence of their characterizations, order to prevent this cycle of
one can miscommunicate and subjective interpretation and termi-
thereby mistake noncombatants as nology drift, the authors recommend
combatants. Furthermore, if one standardizing definitions of observed
lacks simple tools to keep track of humans into the following three
the multisource data which they categories: Adult/s, Child/ren, and
must weigh to achieve and maintain Unknown. (See table 1.) The Adult/s
PID, one may overlook missing data, category can then be further divided
fail to recognize critical assumptions, by sex—Male, Female, and Unknown.
and induce undue subjectivity. There are no tactics, techniques,
and procedures (TTP) that can guarantee an
SOLUTION operator’s flawless categorization of
Operational lessons learned have observed people into the above cate-
revealed an unacceptable level of risk gories. However, by standardizing the
within which coalition forces have categories of observed people, one
23 ALSB 2010-3
can mitigate the use of ambiguous the actual field category for the sake
terminology and subsequent termi- of clarity:
nalogy drift.
“Slant: five adult males, zero
Table 1. Human Categories adult females, three adult
unknowns, two children, and two
Size Sex Definition
unknowns”
Adult/s Male Relative size,
shape, activity, Confidence Levels—On 21 February,
and clothing
denote adult
many people were very sure of
male themselves. Some trusted their own
Female Relative size, intuition to the extent that they are
shape, activity, unable to critically evaluate their
and clothing own perceptions and those of others.
denote adult
female
Some failed to incorporate new input
Unknown Relative size, that conflicted with their conclu-
shape, activity, sions. Some failed to question others’
and clothing unsubstantiated claims and highly
denote adult, dangerous conclusions. They were
but not sex
caught in a self-reassuring loop
Child/ren N/A Relative size,
shape, activity, indicative of Groupthink. For personnel
and clothing involved in targeting and applying
denote a child firepower, this is a dangerous state
Unknown N/A Relative size, to be in. With no gauge of confi-
shape, activity,
dence, all information, no matter
and clothing
are not how irrational, was treated equally.
assessable Because intelligence assessments
are rarely 100% certain, they are
Slant—It is often tactically accompanied by confidence levels to
relevant to determine the number give decision makers the ability to
With no gauge and categories of people in an area of accurately weigh several sources of
of confidence, interest. For example, these numbers data and come to reasonable
all information, can be used to determine collateral conclusions. However, two signifi-
no matter how damage estimations (CDEs). The cant problems exist with this
irrational, was process. First, while many intelli-
authors propose adopting a com-
treated equally. gence personnel understand their
monly used term, such as slant, in
this simple categorization example: respective confidence levels, many
Airmen, tactical commanders, and
operational commanders do not.
Slant: Second, different intelligence
Adult Men/Adult Women/Adult
disciplines have different terms and
Unknown/Children/Unknown
definitions to quantify their
confidence levels. Amid this potential
As such, an example slant would confusion, an operational com-
be presented as: mander may fail to PID a valid target
or incorrectly PID an invalid target.
To establish a universal vocab-
“Slant: 5/0/3/2/2”
ulary which conveys an assessment’s
confidence level, the authors
Meaning—“There are five adult recommend the following terms be
males, zero adult females, three used (1) across all intelligence
adult unknowns, two children, and disciplines which disseminate infor-
two people of unknown age.” mation to an operational commander
If passed via voice communica- and (2) by operators who provide
tions, operators may need to include

ALSB 2010-3 24
data to decision makers for the incident demonstrated any func-
purpose of targeting. tional understanding of PID, its
Some argue that there should be definition, its minimum criteria, or
only two levels—a firm confident or standards for establishing and
not confident. There are three maintaining it. While United States
significant problems with that Central Command (USCENTCOM)
argument. First, it would result in PID policy is very simple and rational
inaccurate assessments because to a reasonable person who takes the
collected data is rarely so clear and time to read it carefully, it does have
decisive to lend itself to such binary intricacies which may be difficult to
confidence levels. Second, by forcing keep track of while under stress and
assessments that are “all or trying to coordinate multiple assets,
nothing,” one runs the risk of while receiving multiple sources of
creating an environment where crews data, each unique with varying levels
are too reserved to label their of confidence.
assessments with the higher As such, the authors recommend
confidence level for fear of the loss of adoption of the Target ID Tracker
credibility and punitive conse- shown in table 3 into JFIRE to (1)
quences should their assessments ensure clarity and accuracy on the Experience
prove wrong. Third, the operational part of the PID authority, (2) provide has demon-
commander is responsible for operators with a simple reference strated the
making difficult decisions such as that ensures consideration of the challenges of
PID of a target based on multiple constituent elements of PID, and (3) differentiat-
sources of information. By forcing instill confidence in the PID ing between
combatants
what may be interpreted to be declaration. Ultimately, this tracker
and noncom-
“shoot” or “no shoot” confidence would help PID authorities keep batants in a
levels upon others, that operational track of the required elements COIN environ-
commander is unintentionally shift- establishing and maintaining PID ment.
ing his/her responsibility to someone and keeping the PID determination
who may not have the training or within the bounds of “reasonable.”
authority to make targeting Ideally, the ultimate PID authority in
decisions. a given tactical situation would
The current lexicon for geospatial maintain this tracker. All others may
intelligence is Possible, Probable, and use a copy to track their own and/or
Confirmed. The authors recommend others’ inputs as needed, but the PID
replacing Probable with Likely to authority’s version would serve as
reduce the risk of confusing Possible primary.
with Probable when transmitted via Note: The italicized text in table 3
voice communications. (See table 2.) constitutes an example of what one
The 2007 Joint Publication 2-0, Joint may write in the tracker; it is not
Intelligence, offers five similar levels based on any actual event or system
of confidence, which is unnecessarily capability.
numerous, uses unwise vocabulary,
It may not always be practical to
and is not employed operationally.
fill out an actual Target ID Tracker.
However, if concerned parties study
Table 2. Confidence Levels the critical elements of the tracker—
Possible <50% confidence Time, Source, Assessment, Geo-
spatial resolution, Confidence level—
Likely >50% confidence they will ask the right questions to
Confirmed ≥95% confidence achieve reasonable determinations.

Target Identification (ID) Tracker CONCLUSION


Experience has demonstrated the
On 21 February, no friendly parties
challenges of differentiating between
immediately involved in the CIVCAS

25 ALSB 2010-3
combatants and noncombatants in a the ground force commander and
COI N environment. The authors close air support (CAS) players,
believe that the recommended termi- providing an enduring methodology
nology and PID processes may that mitigates the potential for
improve the communication between CIVCAS.

Table 3. Target Identification Tracker


PID Type Time Source Assessment Geospatial Confidence
Resolution Level
(Include
time (Yes, No. If yes, (Possible,
zone) include location1 Likely,
or ellipse2) Confirmed3)
PID Establishment4 0030z JTAC 2 x adult male shooting at 41S PS 54045 Confirmed
eyes on FF 46353, TLE CAT
IV, plot on map
JTAC69 0045z SIGINT Insurgent coordinating 41S PS 53997 Confirmed
system multi-person attack on FF 16415, 99 x 42m,
132°
0055z MQ-9 2 x adult unknown sex 41S PS 54098 Likely
with weapons 16365, TLE CAT
IV, targeting pod

PID Maintenance 0110z MQ-9 2 x adult unknown sex 41S PS 54831 Likely
with weapons 16441
REAPER42

Notes:
1. Include grids, target location error (TLE) category (CAT), source.
Example 12X XX 12345 67890
2. Include centerpoint grids, semi-major x semi-minor axes, orientation off north.
Example: 12X XX 12345 67890, 500x200m, 45°
3. Possible: <50% confidence / Likely: >50% confidence / Confirmed: ≥95% confidence
4. Users may write in the space directly below who is responsible for establishing and maintaining PID.

Table Columns:
PID Type: This column serves primarily to make clear the distinction between PID establishment and
maintenance and, if necessary, gives space to annotate which party is currently responsible for each.
Time: Correlating assessments from separate sources requires consideration of time. For example, vehicles
and dismounts move at different rates and keeping track of report times helps correlate or avoid correlating
associations over time.
Source: Noting an assessment’s source allows the user to better judge its reliability and geospatial resolution
capabilities (e.g., coordinates vs. ellipse). Also, different sources may require different confidence levels in
accordance with (IAW) combatant command (command authority) (COCOM) PID policies.
Assessment: User must know exactly what each source assesses to correlate data for a reasonable
conclusion.
Geospatial Resolution: Correlating two sources requires that their reported data is geospatially resolved
within reason. Also, COCOM PID policies may specify maximum degrees of geospatial error.
Confidence Level: Considering a source’s confidence level helps the PID authority keep his/her PID
determination within reason. Also, COCOM PID policies may require minimum confidence levels for specific
data types.

ALSB 2010-3 26
CLOSE AIR SUPPORT (CAS) FOR SPECIAL OPERATIONS
FORCES (SOF) CORDON AND SEARCH

An F-15E Strike Eagle deploys flares over Afghanistan during a close air support mission in support of Operation
ENDURING FREEDOM. (Photo by SSgt Aaron Allmon, USAF)

By
Capt Phil George, USAF SOF ground commanders go
through a decision process on
In the current counterinsurgency whether to conduct a kinetic or
fight, cordon and search is a nonkinetic strike to reduce collateral
commonly used tactic. Special opera- damage and prevent disruption of
tions forces (SOF) set up a cordon the population. Generally, the only …finding
around an identified target area (or time a ground commander approves evidence is as
individual) in order to prevent a kinetic strike is when there is risk important as
anyone from entering or leaving. The to the force that requires close air finding the
security element will maintain these support (CAS). When a commander targeted
individual…
positions while the assault force decides to pursue a kinetic strike,
searches the target area for any the assault force’s first course of
evidence to use against the target action will be to use their organic
individual in the host country’s court weapons to suppress or eliminate the
of law. Due to information operations threat.
(IO) implications, finding evidence is
as important as finding the targeted As many aircrews know,
individual; without it, the assault collateral damage estimates (CDE)
force may not be able to prove the have become a major senior leader
accused individual’s association with concern. While it is not the aircrew’s
known terrorist groups. responsibility to determine CDE,

27 ALSB 2010-3
they still need to know weapons present itself again. This can mean
effects. The biggest lesson empha- days or even weeks worth of work
sized to today’s SOF operators is that being lost in a few minutes and
you can kill the target, but if the reemphasizes the need for combat
kinetic strike impacts the local air forces (CAF) squadrons to take
populace, it is going to have negative advantage of every opportunity
strategic implications. With rising available to train with special
CDE concerns, a pilot will usually operation units before deploying.
only get one opportunity for weapons
employment. It is also important to It is every pilot’s dream to
know that it is in these situations WINCHESTER his or her jet in
the ground commander does indeed combat. Unfortunately, those op-
own the bomb and it is his authority portunities are rare. With limited
to grant weapons release, as opposed opportunities to employ, the best
to having to ask the joint operations way to help the assault force may be
center (JOC) for approval. providing good sensor coverage to
help build situational awareness. A
Most CAS engagements in sensor contract should be one of the
…if the kinetic support of (ISO) SOF units are first things a CAS pilot asks for if it
strike impacts circumstances where the assault is not passed by the joint terminal
the local force is not in a position to engage attack controller (JTAC) in the area
populace, it is the target, usually around exfil- of operations (AO) update. Main-
going to have tration or infiltration. These are the taining disciplined sensor coverage is
negative situations where pilots need to know as important to the fight as
strategic im-
the rules of engagement (ROE), employing weapons. It is imperative
plications.
special instructions (SPINS), and that CAS pilots know proper
tactical directives. Aside from know- terminology and what the JTAC
ing the ROE, SPINS, and tactical wants them to point the sensor at. A
directives, CAS pilots also need to CAS pilot will build situational
understand the capabilities of the awareness by knowing their own
other assets that support special responsibilities and sensor response-
operations assault forces. This bilities for other assets in the aircraft
knowledge allows CAS pilots to stack, preventing duplication of
understand how the assault forces effort. This management plan will
find, fix, and target our enemies. prevent personnel fleeing the target
(squirters) unseen, which could lead
IMPROVING THE SITUATION to mission failure and/or unneces-
sary risk to the assault force.
The current special operations
fight requires that CAS pilots be Providing good sensor coverage
proficient on CAS tactics, tech- takes coordination. This is easily
niques, and procedures (TTP) and accomplished when the aircrew
asset capabilities. When opportune- receives the mission products before
ities arise to employ weapons, pilots they step to the aircraft. When the
need to be on target, on time, and be aircrew takes off without products or
able to get weapons away on the first are retasked to a mission they did
pass. Recent experiences in not plan on supporting, it is highly
Afghanistan highlighted instances of recommended that they contact the
pilots slowing down the kill chain JOC fires support officer (FSO) as
because they did not understand the soon as possible. The FSO can
ground commander’s intent, the provide an up-to-date status of the
ROE, or desired weapons effects. assault force to include current
CAS pilots need to understand the position of friendly forces, enemy
fleeting nature of SOF targets and situation template, and pertinent
that a missed opportunity may not contact information. In most cases,

ALSB 2010-3 28
the FSO can provide all of the in order to prepare for combat
information provided in the products downrange. Given the multiple
minus the ground reference guides assets that support SOF missions,
(GRGs). This knowledge should be aircrews should not think that they …flying
gained through the squadron’s can show up and be an expert. It squadrons
liaison officer (LNO) at the JOC and takes training and relationship should
disseminated to the rest of the building to remain on top and that seek out
squadron. Information can also be starts with predeployment training. integrated
training
learned and reinforced through Unfortunately, it seems that too
opportu-
training exercises that are readily many flying squadrons are tasked to nities…
available to CAS squadrons before support exercises that prepare them
deploying. for the next fight, which causes them
to miss opportunities that will pre-
CONCLUSION pare them for the current fight.
Flying squadrons should seek ways
United States special operations to overcome the challenges posed by
units execute many important maintenance, manning, and scheduling
missions in today’s fight. With this in conflicts to capitalize on the training
mind, flying squadrons should seek opportunities that are readily avail-
out integrated training opportunities able to them.

 
1st Battalion, 508th Infantry Regiment and special operation force Soldiers search for
enemy fighters after Air Force munitions strike a target in Sangin District, April 2010.
Combined Joint Special Operations Task Force-Afghanistan Soldiers have been con-
ducting operations in Sangin to eliminate insurgents and promote peace and stability in
the area. (Photo by SPC Daniel Love, USA)

29 ALSB 2010-3
CURRENT ALSA MTTP PUBLICATIONS
 
AIR BRANCH – POC alsaa@langley.af.mil
TITLE DATE PUB # DESCRIPTION / STATUS
AOMSW 17 NOV 08 NTTP 3-20.8 Description: This publication consolidates Service doctrine, TTP, and
Multi-Service Tactics, Techniques, and AFTTP 3-2.74 lessons-learned from current operations and exercises to maximize the
Procedures for Air Operations in Maritime effectiveness of "air attacks on enemy surface vessels".
Surface Warfare Status: Current
Distribution Restricted

AVIATION URBAN OPERATIONS 9 JUL 05 FM 3-06.1 Description: Provides MTTP for tactical-level planning and execution of
Multi-Service Tactics, Techniques, and MCRP 3-35.3A fixed- and rotary-wing aviation urban operations.
Procedures for Aviation Urban Operations NTTP 3-01.04 Status: Assessment
Distribution Restricted AFTTP 3-2.29

IADS 1 MAY 09 FM 3-01.15 Description: Provides joint planners with a consolidated reference on
Multi-Service Tactics, Techniques, and MCRP 3-25E Service air defense systems, processes, and structures to include
Procedures for an Integrated Air Defense System integration procedures.
NTTP 3-01.8
Distribution Restricted AFTTP 3-2.31 Status: Current

JFIRE 20 DEC 07 FM 3-09.32 Description: Pocket size guide of procedures for calls for fire, CAS, and
Multi-Service Procedures for the Joint Application MCRP 3-16.6A naval gunfire. Provides tactics for joint operations between attack
of Firepower helicopters and fixed-wing aircraft performing integrated battlefield
NTTP 3-09.2 operations.
Distribution Restricted AFTTP 3-2.6
Status: Current

JSEAD / ARM-J 28 MAY 04 FM 3-01.4 Description: Contributes to Service interoperability by providing the JTF
Multi-Service Tactics, Techniques, and MCRP 3-22.2A and subordinate commanders, their staffs, and SEAD operators a single,
Procedures for the Suppression of Enemy Air consolidated reference.
NTTP 3-01.42
Defenses in a Joint Environment Status: Current
AFTTP 3-2.28
Classified SECRET

JSTARS 16 NOV 06 FM 3-55.6 Description: Provides procedures for the employment of JSTARS in
Multi-Service Tactics, Techniques, and MCRP 2-24A dedicated support to the JFC. Describes multi-Service TTP for
Procedures for the Joint Surveillance Target consideration and use during planning and employment of JSTARS.
NTTP 3-55.13
Attack Radar System Status: Assessment
AFTTP 3-2.2
Distribution Restricted

KILL BOX 4 AUG 09 FM 3-09.34 Description: Assists the Services and JFCs in developing, establishing,
Multi-Service Tactics, Techniques, and MCRP 3-25H and executing Kill Box procedures to allow rapid target engagement.
Procedures for Kill Box Employment Describes timely, effective multi-Service solutions to FSCMs, ACMs, and
NTTP 3-09.2.1 maneuver control measures with respect to Kill Box operations.
Distribution Restricted AFTTP 3-2.59
Status: Current

SCAR 26 NOV 08 FM 3-60.2 Description: This publication provides strike coordination and
Multi-Service Tactics, Techniques, and reconnaissance (SCAR) MTTP to the military Services for the conduct of
MCRP 3-23C air interdiction against targets of opportunity.
Procedures for Strike Coordination and
Reconnaissance NTTP 3-03.4.3
Status: Current
Distribution Restricted AFTTP 3-2.72

SURVIVAL, EVASION, AND RECOVERY 20 MAR 07 FM 3-50.3 Description: Provides a weather-proof, pocket-sized, quick reference
NTTP 3-50.3 guide of basic survival information to assist Service members in a survival
Multi-Service Procedures for Survival, Evasion, situation regardless of geographic location.
and Recovery AFTTP 3-2.26
Distribution Restricted Status: Assessment

TAGS 10 APR 07 FM 3-52.2 Description: Promotes Service awareness regarding the role of airpower
Multi-Service Tactics, Techniques, and NTTP 3-56.2 in support of the JFC’s campaign plan, increases understanding of the air-
Procedures for the Theater Air-Ground System ground system, and provides planning considerations for the conduct of
AFTTP 3-2.17 air-ground ops.
Distribution Restricted/ REL ABCA
Status: Current

TST (DYNAMIC TARGETING) 20 APR 04 FM 3-60.1 Description: Provides the JFC, the operational staff, and components
Multi-Service Tactics, Techniques, and MCRP 3-16D MTTP to coordinate, de-conflict, synchronize, and prosecute TSTs within
Procedures for Targeting Time-Sensitive Targets any AOR. Includes lessons learned, multinational and other government
NTTP 3-60.1 agency considerations.
Distribution Restricted AFTTP 3-2.3 Status: Revision

ALSB 2010-3 30
AIR BRANCH – POC alsaa@langley.af.mil
TITLE DATE PUB # DESCRIPTION / STATUS
UAS 3 AUG 06 FM 3-04.15 Description: Establishes MTTP for UAS addressing tactical and
Multi-Service Tactics, Techniques, and NTTP 3-55.14 operational considerations, system capabilities, payloads, mission
Procedures for Tactical Employment of planning, logistics, and most importantly, multi-Service execution.
AFTTP 3-2.64
Unmanned Aircraft Systems Status: Revision
Distribution Restricted

 
LAND AND SEA BRANCH – POC alsab@langley.af.mil
TITLE DATE PUB # DESCRIPTION / STATUS
ADVISING 10 SEP 09 FM 3-07.10 Description: This publication serves as a reference to ensure coordinated
Multi-Service Tactics, Techniques, and MCRP 3-33.8A multi-Service operations for planners and operators preparing for, and
Procedures for Advising Foreign Forces conducting, advisor team missions. It is intended to provide units and
NTTP 3-07.5 personnel that are scheduled to advise foreign forces with viable TTP so
Distribution Restricted AFTTP 3-2.76 that they can successfully plan, train for, and carry out their mission.
Status: Current

AIRFIELD OPENING 15 MAY 07 FM 3-17.2 Description: A quick-reference guide to opening an airfield in accordance
Multi-Service Tactics, Techniques, and NTTP 3-02.18 with MTTP. Contains planning considerations, airfield layout, and
Procedures for Airfield Opening AFTTP 3-2.68 logistical requirements for opening an airfield.
Status: Current
Distribution Restricted
CFSOF 17 MAR 10 FM 6-03.05 Description: This publication assists in planning and executing operations
Multi-Service Tactics, Techniques, and MCWP 3-36.1 where conventional forces and special operations forces (CF/SOF)
Procedures for Conventional Forces and Special occupy the same operational environment.
NTTP 3-05.19
Operations Forces Integration and Interoperability Status: Approved/Current
AFTTP 3-2.73
Distribution Restricted
USSOCOM Pub 3-
33V.3

CORDON AND SEARCH 25 APR 06 FM 3-06.20 Description: Consolidates the Services’ best TTP used in cordon and
Multi-Service Tactics, Techniques, and MCRP 3-31.4B search operations. Provides MTTP for the planning and execution of
Procedures for Cordon and Search Operations NTTP 3-05.8 cordon and search operations at the tactical level of war.

Distribution Restricted AFTTP 3-2.62 Status: Assessment

EOD 27 OCT 05 FM 4-30.16 Description: Provides guidance and procedures for the employment of a
Multi-Service Tactics, Techniques, and MCRP 3-17.2C joint EOD force. It assists commanders and planners in understanding
Procedures for Explosive Ordnance Disposal in a the EOD capabilities of each Service.
NTTP 3-02.5
Joint Environment Status: Revision
AFTTP 3-2.32
Approved for Public Release

MILITARY DECEPTION 12 APR 07 MCRP 3-40.4A Description: Facilitate the integration, synchronization, planning, and
Multi-Service Tactics, Techniques, and NTTP 3-58.1 execution of MILDEC operations. Servce as a ”one stop” reference for
Procedures for Military Deception AFTTP 3-2.66 service MILDEC planners to plan and execute multi-service MILDEC
operations.
Classified SECRET Status: Current

NLW 24 OCT 07 FM 3-22.40 Description: This publication provides a single-source, consolidated


Multi-Service Service Tactics, Techniques, and MCWP 3-15.8 reference on the tactical employment of NLWs and offers commanders
Procedures for the Tactical Employment of and their staff guidance for NLW employment and planning. Commanders
NTTP 3-07.3.2 and staffs can use this publication to aid in the tactical employment of
Nonlethal Weapons
AFTTP 3-2.45 NLW during exercises and contingencies.
Approved for Public Release
Status: Assessment

PEACE OPS 20 OCT 03 FM 3-07.31 Description: Provides tactical-level guidance to the warfighter for
MCWP 3-33.8 conducting peace operations.
Multi-Service Tactics, Techniques, and Change 1
Procedures for Conducting Peace Operations incorporated 14 AFTTP 3-2.40 Status: Current with Change 1
Approved for Public Release APR 09

TACTICAL CONVOY OPERATIONS 13 JAN 09 FM 4-01.45 Description: Consolidates the Services’ best TTP used in convoy
Multi-Service Tactics, Techniques, and MCRP 4-11.3H operations into a single multi-Service TTP. Provides a quick reference
Procedures for Tactical Convoy Operations guide for convoy commanders and subordinates on how to plan, train,
NTTP 4-01.3 and conduct tactical convoy operations in the contemporary operating
Distribution Restricted AFTTP 3-2.58 environment.
Status: Current

TECHINT 9 JUN 06 FM 2-22.401 Description: Provides a common set of MTTP for technical intelligence
Multi-Service Tactics, Techniques, and NTTP 2-01.4 operations. Serves as a reference for Service technical intelligence
Procedures for Technical Intelligence Operations planners and operators.
AFTTP 3-2.63
Approved for Public Release Status: Current

31 ALSB 2010-3
LAND AND SEA BRANCH – POC alsab@langley.af.mil
TITLE DATE PUB # DESCRIPTION / STATUS
UXO 16 AUG 05 FM 3-100.38 Description: Describes hazards of UXO submunitions to land operations,
Multi-Service Tactics, Techniques, and MCRP 3-17.2B addresses UXO planning considerations, and describes the architecture
Procedures for Unexploded Explosive Ordnance for reporting and tracking UXO during combat and post conflict.
NTTP 3-02.4.1
Operations Status: Revision
AFTTP 3-2.12
Approved for Public Release

 
COMMAND AND CONTROL (C2) BRANCH - POC: alsac2@langley.af.mil 
TITLE DATE PUB # DESCRIPTION / STATUS
AIRSPACE CONTROL 22 MAY 09 FM 3-52.1 Description: This MTTP publication is a tactical level document, which
Multi-Service Tactics, Techniques, and will synchronize and integrate airspace command and control functions
AFTTP 3-2.78 and serve as a single source reference for planners and commanders at
Procedures for Airspace Control
all levels
Distribution Restricted
Status: Current

BREVITY 7 APR 10 FM 1-02.1 Description: Defines multi-Service brevity which standardizes air-to-air,
Multi-Service Brevity Codes MCRP 3-25B air-to-surface, surface-to-air, and surface-to-surface brevity code words
in multi-Service operations.
Distribution Restricted NTTP 6-02.1
AFTTP 3-2.5 Status: Current

CIVIL SUPPORT 3 DEC 07 FM 3-28.1 Description: Fills the Civil Support Operations MTTP void and assists
Multi-Service Tactics, Techniques, and NTTP 3-57.2 JTF commanders in organizing and employing Multi-Service Task Force
Procedures for Civil Support Operations support to civil authorities in response to domestic crisis.
AFTTP 3-2.67
Distribution Restricted Status: Current

COMCAM 24 MAY 07 FM 3-55.12 Description: Fills the void that exists regarding combat camera doctrine
Multi-Service Tactics, Techniques, and MCRP 3-33.7A and assists JTF commanders in structuring and employing combat
Procedures for Joint Combat Camera camera assets as an effective operational planning tool.
NTTP 3-13.12
Operations Status: Current
AFTTP 3-2.41
Approved for Public Release

HAVE QUICK 7 MAY 04 FM 6-02.771 Description: Simplifies planning and coordination of HAVE QUICK radio
Multi-Service Tactics, Techniques, and MCRP 3-40.3F procedures. Provides operators information on multi-Service HAVE
Procedures for HAVE QUICK Radios QUICK communication systems while conducting home station training
NTTP 6-02.7 or in preparation for interoperability training.
Distribution Restricted AFTTP 3-2.49
Status: Current

HF-ALE 20 NOV 07 FM 6-02.74 Description: Standardizes high power and low power HF-ALE operations
Multi-Service Tactics, Techniques, and MCRP 3-40.3E across the Services and enables joint forces to use HF radio as a
Procedures for the High Frequency-Automatic supplement / alternative to overburdened SATCOM systems for over-the-
NTTP 6-02.6 horizon communications.
Link Establishment (HF-ALE) Radios
AFTTP 3-2.48
Distribution Restricted Status: Current

JATC 23 JUL 09 FM 3-52.3 Description: Provides guidance on ATC responsibilities, procedures, and
Multi-Service Procedures for Joint Air Traffic MCRP 3-25A employment in a joint environment. Discusses JATC employment and
Control Service relationships for initial, transition, and sustained ATC operations
NTTP 3-56.3 across the spectrum of joint operations within the theater or AOR.
Distribution Restricted AFTTP 3-2.23
Status: Current

JTF IM 10 SEP 03 FM 6-02.85 Description: Describes how to manage, control, and protect information
Multi-Service Tactics, Techniques, and (FM 101-4) in a JTF headquarters conducting continuous operations.
Procedures for Joint Task Force Information MCRP 3-40.2A Status: Assessment
Management
NTTP 3-13.1.16
Distribution Restricted AFTTP 3-2.22

EW REPROGRAMMING 22 JAN 07 FM 3-13.10 Description: Supports the JTF staff in planning, coordinating, and
Multi-Service Tactics, Techniques, and (FM 3-51.1) executing reprogramming of electronic warfare and target sensing
Procedures for the Reprogramming of Electronic systems as part of joint force command and control warfare operations.
NTTP 3-51.2
Warfare and Target Sensing Systems Status: Revision
AFTTP 3-2.7
Distribution Restricted
TACTICAL CHAT 7 JUL 09 FM 6-02.73 Description: This publication provides MTTP to standardize and describe
Multi-Service Tactics, Techniques, and the use of internet tactical chat (TC) in support of operations. It provides
MCRP 3-40.2B commanders and their units with guidelines to facilitate coordination and
Procedures for Internet Tactical Chat in Support
of Operations NTTP 6-02.8 integration of TC when conducting multi-Service and joint force
operations.
AFTTP 3-2.77
Distribution Restricted
Status: Current

ALSB 2010-3 32
COMMAND AND CONTROL (C2) BRANCH - POC: alsac2@langley.af.mil 
TITLE DATE PUB # DESCRIPTION / STATUS
TACTICAL RADIOS 14 JUN 02 FM 6-02.72 Description: Standardizes joint operational procedures for SINCGARS
Multi-Service Communications Procedures for MCRP 3-40.3A and provides an overview of the multi-Service applications of EPLRS.
Tactical Radios in a Joint Environment NTTP 6-02.2 Status: Current
Approved for Public Release
AFTTP 3-2.18

UHF TACSAT/DAMA 31 AUG 04 FM 6-02.90 Description: Documents TTP that will improve efficiency at the planner
Multi- Service Tactics, Techniques, and MCRP 3-40.3G and user levels. (Recent operations at JTF level have demonstrated
Procedures Package for Ultra High Frequency NTTP 6-02.9 difficulties in managing limited number of UHF TACSAT frequencies.)
Tactical Satellite and Demand Assigned Multiple AFTTP 3-2.53 Status: Current
Access Operations
Approved for Public Release

NEW PROJECTS
TITLE SERVICE DESCRIPTION / STATUS
Military Diving Operations (MDO) ATTP 3-34.84 Description: This MTTP publication describes US Military dive
Multi-Service Service Tactics, Techniques, and Procedures for MCRP 3-35.9A mission areas (DMA) as well as the force structure, equipment,
Military Diving Operations and primary missions that each Service could provide to a JTF
NTTP 3-07.7 Commander.
Distribution Restricted AFTTP 3-2.80 Status: Signature Draft
CG COMDTINST 3-07.7

ALSA 35th Anniversary


 

ALSA recently celebrated its 35th anniversary by holding a dining-out at the Langley Air
Force Base Officers Club. Pictured from left to right are former ALSA Directors: COL
(R) Lynch, COL (R) Manganaro, Col (R) Bristow, COL (R) Kucera, Col Garland, and the
current Director, Col Hume.

33 ALSB 2010-3
ALSA ORGANIZATION
JASC
Joint Actions Steering Committee

Director
Col David B. Hume, USAF

Deputy
COL Bruce Sones, USA
NCOIC Support Staff
TSgt Christal Jefferson, USAF Cheryl Parris, Admin Support Asst
Sonya Robinson, Budget Analyst
Leila Joyce, Office Auto Asst
Publishing Staff
Beatrice Waggener, Editor
Laura Caswell, Illustrator
CDR (S) Cynthia Dieterly, Publications Officer

Air Land and Sea Command and Control


MAJ Brian Bolio, USA LTC Reginald Armstrong, USA Lt Col Michael Woltman, USAF
MAJ (P) Stephen Parker, USA MAJ (P) Troy Ewing, USA Lt Col Andrew Frasch, USAF
Maj Ray Zuniga, USAF MAJ Joseph Leach, USA CDR (S) Cynthia Dieterly, USN
Maj Jeffrey Hughes, USMC Maj William Wallis, USAF USAF, Vacant
USAF, Vacant USA, Vacant
 
Air Operations in Maritime Surface Warfare Advising Foreign Forces Airspace Control
  (AOMSW)
10 Sep 09 22 May 09
17 Nov 08
 
Airfield Opening Brevity Codes
Aviation Urban Operations
15 May 07 Apr 10
9 Jul 05

Integrated Air Defense System (IADS) Conducting Peace Operations (PEACE OPS) Civil Support Operations

1 May 09 14 Apr 09 (CH1) 3 Dec 07

Joint Application of Firepower (JFIRE) Cordon and Search Operations Combat Camera Operations (COMCAM)

20 Dec 07 25 Apr 06 24 May 07

Joint Surveillance Target Attack Radar Explosive Ordnance Disposal (EOD) Have Quick Radios
System (JSTARS) 27 Oct 05 7 May 04
16 Nov 06
High Frequency-Automatic Link
Military Deception (MILDEC)
Kill Box Employment Establishment Radios (HF-ALE)
12 Apr 07
4 Aug 09 20 Nov 07

Nonlethal Weapons (NLW)


Strike Coordination and Reconnaissance Joint Air Traffic Control (JATC)
(SCAR) 24 Oct 07
23 Jul 09
26 Nov 08
Tactical Convoy Operations (TCO)
Joint Task Force Information Management
Suppression of Enemy Air Defenses 13 Jan 09 (JTF-IM)
(JSEAD)
10 Sep 03
28 May 04 Technical Intelligence (TECHINT)
9 Jun 06 Electronic Warfare Reprogramming
Survival, Evasion, and Recovery
22 Jan 07
20 Mar 07
Unexploded Explosive Ordnance
Operations (UXO) Internet Tactical Chat in Support of
Tactical Employment of Unmanned Aircraft Operations (Tactical Chat)
Systems (UAS) 16 Aug 05
7 Jul 09
3 Aug 06
Conventional Forces / Tactical Radios
Targeting Time Sensitive Targets (TST) Special Operations Forces
Integration and Interoperability (CFSOF) 14 Jun 02
20 Apr 04
17 Mar 10
Ultra High Frequency Tactical Satellite and
Theater Air-Ground System (TAGS) Demand Assigned Multiple Access
10 Apr 07 Operations (UHF TACSAT/DAMA)
31 Aug 04

ALSB 2010-3 34
ALSA’s mission is to rapidly and responsively develop multi-
Service tactics, techniques and procedures (MTTP), studies, and other
like solutions across the entire military spectrum to meet the immediate
needs of the warfighter.

ALSA is a joint organization chartered by a memorandum of


agreement under the authority of the Commanders, Army Training and
Doctrine Command (TRADOC), USMC Combat Development
Command (MCCDC), Navy Warfare Development Command (NWDC),
and Headquarters, Curtis E. LeMay Center for Doctrine Development
and Education. ALSA is governed by a Joint Actions Steering
Committee (JASC) consisting of four voting and three nonvoting
members.
 
Voting JASC Members

RADM Wendi B. Maj Gen David S. BGen Daniel J.


Mr. Dale A. Ormond
Carpenter Fadok O’Donohue

Commander, Navy Commander, Curtis E. Deputy to the Director, Capabilities


Warfare Development LeMay Center for Commanding General Development
Command Doctrine Development US Army Combined Directorate, Marine
and Education Arms Center Corps Combat
Development Command

CALLING ALL HUMANITARIAN


SUBJECT MATTER EXPERTS ASSISTANCE EXPERTS!
NEEDED! If you participated in recent assistance efforts
(Haiti, Chile, Samoa, Gulf Oil spill, flood recovery,
UPCOMING JOINT WORKING GROUPS:
etc.), we want to share your observations, insights,
and lessons learned! Write an account of your
Cordon and Search – Nov 2010 experience, enhance your professional development,
POC: LTC Reginald Armstrong and get published. We’re always looking for current
reginald.armstrong@langley.af.mil pictures as well!
Survival – Nov 2010 Submissions due by 1 Nov 2010 for publication
POC: MAJ Brian Bolio in our January 2011 issue.
brian.bolio@langley.af.mil Send articles (in MS Word document format)
and pictures (in high resolution JPG format) to:
JSTARS– Dec 2010
POC: Maj Ray “Ponch” Zuniga CDR (S) Cynthia Dieterly, USN
ray.zuniga@langley.af.mil cynthia.dieterly@langley.af.mil

35 ALSB 2010-3
ALSA CENTER
ATTN: ALSB
114 ANDREWS STREET
LANGLEY AFB VA 23665-2785

OFFICIAL BUSINESS

alsacenter@langley.af.mil
http://www.alsa.mil

ALSB 2010-3 36

You might also like