{"lines":[{"page":1,"text":"FM 3-90","rect":[397.78900146484377,91.77996826171875,587.6620302734375,53.93796920776367]},{"page":1,"text":"Tactics","rect":[407.6239929199219,150.89700317382813,583.3699770507813,113.25900268554688]},{"page":1,"text":"MAY 2023","rect":[104.89099884033203,682.93798828125,218.26700415039063,665.1539916992188]},{"page":1,"text":"DISTRIBUTION RESTRICTION:","rect":[104.89100646972656,706.9530029296875,365.89100317382818,693.4349975585938]},{"page":1,"text":"Approved for public release; distribution is unlimited.","rect":[104.89100646972656,732.2919921875,486.6410693359375,718.2669677734375]},{"page":1,"text":"This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013.","rect":[104.89100646972656,752.4650268554688,608.2200029296876,739.5010375976563]},{"page":1,"text":"HEADQUARTERS, DEPARTMENT OF THE ARMY","rect":[104.89100646972656,775.0170288085938,520.8889956054687,760.43701171875]},{"page":2,"text":"This publication is available at the Army Publishing Directorate site","rect":[79.0199966430664,352.22430419921877,515.0031084747315,337.662109375]},{"page":2,"text":"(https://www.apd.army.mil/), and the Central Army Registry site","rect":[89.46503448486328,370.5832214355469,504.5400042266846,356.0210266113281]},{"page":2,"text":"(https://atiam.train.army.mil/catalog/dashboard).","rect":[141.47999572753907,389.0043029785156,452.55633068084719,374.4421081542969]},{"page":3,"text":"Field Manual","rect":[95.4000015258789,92.95026397705078,149.0621256790161,85.86612701416016]},{"page":3,"text":"No. 3-90","rect":[95.4000015258789,104.47028350830078,131.01108360290528,97.5665054321289]},{"page":3,"text":"*FM 3-90","rect":[482.3999938964844,67.30777740478516,539.9836341400146,57.08839416503906]},{"page":3,"text":"Headquarters","rect":[491.2200012207031,94.95426940917969,544.5531146507263,85.86612701416016]},{"page":3,"text":"Department of the Army","rect":[445.5050048828125,106.49530029296875,544.5631618499756,97.38712310791016]},{"page":3,"text":"Washington, D.C., 01 May 2023","rect":[414.0240173339844,118.01629638671875,544.5516872406006,108.90811920166016]},{"page":3,"text":"Chapter 1","rect":[90.0,321.283935546875,136.19219874572756,312.02545166015627]},{"page":3,"text":"Chapter 2","rect":[90.0,384.763916015625,136.18719386291506,375.50543212890627]},{"page":3,"text":"Chapter 3","rect":[90.0,461.3839416503906,136.19219874572756,452.1254577636719]},{"page":3,"text":"Chapter 4","rect":[90.0,513.4039306640625,136.19219874572756,504.14544677734377]},{"page":3,"text":"Chapter 5","rect":[90.0,622.9039306640625,136.19219874572756,613.6454467773438]},{"page":3,"text":"TACTICS","rect":[271.67999267578127,187.4397735595703,358.35125686264038,172.65457153320313]},{"page":3,"text":"Contents","rect":[280.3199768066406,218.69618225097657,349.6465306549072,206.85739135742188]},{"page":3,"text":"Page","rect":[504.7799987792969,244.1609649658203,526.2809775390625,235.83596801757813]},{"page":3,"text":"PREFACE.................................................................................................................... xi","rect":[162.0037078857422,259.730224609375,540.0282359085084,252.325439453125]},{"page":3,"text":"INTRODUCTION ....................................................................................................... xiii","rect":[162.0037078857422,278.0,539.9661631546021,269.845458984375]},{"page":3,"text":"PART ONE","rect":[223.984619140625,301.6803283691406,280.742452419281,293.56610107421877]},{"page":3,"text":"TACTICS OVERVIEW","rect":[295.991455078125,301.6913146972656,405.9199291381836,293.56610107421877]},{"page":3,"text":"ARMY TACTICS ....................................................................................................... 1-1","rect":[162.00372314453126,320.0,540.0382833404541,312.02545166015627]},{"page":3,"text":"Introduction to Tactics ............................................................................................... 1-1","rect":[162.0,330.8902282714844,540.0472555084228,323.57562255859377]},{"page":3,"text":"The Operational Environment ................................................................................... 1-1","rect":[162.0,344.283935546875,540.0443868560791,334.99542236328127]},{"page":3,"text":"Role of Tactics........................................................................................................... 1-2","rect":[162.0,353.8702087402344,540.0445699615478,346.4654235839844]},{"page":3,"text":"General Considerations for Tactics ........................................................................... 1-5","rect":[162.0,365.3902282714844,540.0445699615478,357.9854431152344]},{"page":3,"text":"MOVEMENT AND FORMS OF MANEUVER ........................................................... 2-1","rect":[162.00372314453126,382.92022705078127,540.0583639068603,375.50543212890627]},{"page":3,"text":"Movement Formations............................................................................................... 2-1","rect":[162.0,394.3702087402344,540.0472555084228,387.05560302734377]},{"page":3,"text":"Movement Techniques .............................................................................................. 2-9","rect":[162.0,407.7639465332031,540.0445699615478,398.57562255859377]},{"page":3,"text":"Five Forms of Maneuver.......................................................................................... 2-12","rect":[162.0,417.41021728515627,540.0445699615478,410.00543212890627]},{"page":3,"text":"PART TWO","rect":[209.94122314453126,441.8403015136719,268.6414081497192,433.72607421875]},{"page":3,"text":"OFFENSIVE OPERATIONS","rect":[281.93707275390627,441.8512878417969,420.0171411399841,433.72607421875]},{"page":3,"text":"THE OFFENSE ......................................................................................................... 3-1","rect":[162.00372314453126,459.5402526855469,540.0382833404541,452.1254577636719]},{"page":3,"text":"Purposes of the Offense............................................................................................ 3-1","rect":[162.0,472.9239501953125,540.0442647857666,463.63543701171877]},{"page":3,"text":"Common Offensive Planning Considerations............................................................ 3-3","rect":[162.0,484.4941711425781,540.0556783599853,475.09539794921877]},{"page":3,"text":"Transitions ............................................................................................................... 3-11","rect":[162.0,494.0402526855469,540.0445699615478,486.71563720703127]},{"page":3,"text":"MOVEMENT TO CONTACT ..................................................................................... 4-1","rect":[162.00372314453126,511.55023193359377,540.0482931060791,504.14544677734377]},{"page":3,"text":"General Considerations for a Movement to Contact................................................. 4-1","rect":[162.0,523.01025390625,540.0566549224853,515.60546875]},{"page":3,"text":"Organization of Forces for a Movement to Contact .................................................. 4-2","rect":[162.0,536.5142211914063,540.0445699615478,527.115478515625]},{"page":3,"text":"Common Control Measures for a Movement to Contact........................................... 4-3","rect":[162.0,546.0602416992188,540.0445699615478,538.6454467773438]},{"page":3,"text":"Planning a Movement to Contact .............................................................................. 4-4","rect":[162.0,559.4942016601563,540.0445699615478,550.10546875]},{"page":3,"text":"Preparing a Movement to Contact............................................................................. 4-5","rect":[162.0,571.01416015625,540.0474386138916,561.6254272460938]},{"page":3,"text":"Executing a Movement to Contact ............................................................................ 4-6","rect":[162.0,582.5341796875,540.0345601959228,573.1454467773438]},{"page":3,"text":"Variations for a Movement to Contact....................................................................... 4-8","rect":[162.0,592.01025390625,540.0445699615478,584.60546875]},{"page":3,"text":"Transitions ............................................................................................................... 4-15","rect":[162.0,603.5302124023438,540.0445699615478,596.215576171875]},{"page":3,"text":"ATTACK.................................................................................................................... 5-1","rect":[162.00372314453126,621.0502319335938,540.0482931060791,613.6454467773438]},{"page":3,"text":"General Considerations for the Attack ...................................................................... 5-1","rect":[162.0,632.51025390625,540.0555562896728,625.10546875]},{"page":3,"text":"Organization of Forces for an Attack......................................................................... 5-1","rect":[162.0,646.01416015625,540.0445699615478,636.6154174804688]},{"page":3,"text":"Common Control Measures Associated with an Attack ............................................ 5-2","rect":[162.0,655.5502319335938,540.0445699615478,648.1454467773438]},{"page":3,"text":"Planning for an Attack ............................................................................................... 5-3","rect":[162.0,668.9942016601563,540.0472555084228,659.60546875]},{"page":3,"text":"Preparing for an Attack.............................................................................................. 5-6","rect":[162.0,680.51416015625,540.0445699615478,671.1254272460938]},{"page":3,"text":"DISTRIBUTION RESTRICTION: This manual is approved for public release; distribution unlimited.","rect":[90.0,717.1619873046875,481.48640551757816,708.8280029296875]},{"page":3,"text":"*This publication supersedes FM 3-90-1 and FM 3-90-2, dated 22 March 2013.","rect":[90.0,733.4819946289063,403.05687060546878,725.22900390625]},{"page":3,"text":"FM 3-90","rect":[289.260009765625,754.1909790039063,322.7579978027344,747.6119995117188]},{"page":3,"text":"i","rect":[519.47998046875,754.0830078125,521.98198046875,747.6390380859375]},{"page":4,"text":"Contents","rect":[72.0,62.55902099609375,111.02400427246094,55.90802001953125]},{"page":4,"text":"Chapter 6","rect":[72.0,118.72393035888672,118.19219874572754,109.46544647216797]},{"page":4,"text":"Chapter 7","rect":[72.0,182.2039031982422,118.19521235656738,172.9454345703125]},{"page":4,"text":"Chapter 8","rect":[72.0,293.32391357421877,118.19219874572754,284.0654296875]},{"page":4,"text":"Chapter 9","rect":[72.0,379.84393310546877,118.19219874572754,370.58544921875]},{"page":4,"text":"Chapter 10","rect":[72.0,477.82391357421877,123.71221827697754,468.5654296875]},{"page":4,"text":"Chapter 11","rect":[72.0,564.3439331054688,123.71221827697754,555.08544921875]},{"page":4,"text":"Chapter 12","rect":[72.0,629.4439086914063,123.71221827697754,620.1854248046875]},{"page":4,"text":"Chapter 13","rect":[72.0,704.4439086914063,123.71221827697754,695.1854248046875]},{"page":4,"text":"ii","rect":[72.1199951171875,754.0800170898438,77.1419917602539,747.635986328125]},{"page":4,"text":"Executing an Attack .................................................................................................. 5-9","rect":[144.0,89.81414794921875,522.0471944732666,80.51558685302735]},{"page":4,"text":"Variations of Attacks ............................................................................................... 5-18","rect":[144.0,99.35021209716797,522.0546407623291,91.94542694091797]},{"page":4,"text":"EXPLOITATION........................................................................................................ 6-1","rect":[144.00372314453126,116.87023162841797,522.0377950592041,109.46544647216797]},{"page":4,"text":"General Considerations for an Exploitation .............................................................. 6-1","rect":[144.0,130.2039337158203,522.0445699615478,120.92540740966797]},{"page":4,"text":"Planning an Exploitation ........................................................................................... 6-4","rect":[144.0,141.83416748046876,522.0445699615478,132.53561401367188]},{"page":4,"text":"Preparing an Exploitation.......................................................................................... 6-6","rect":[144.0,153.35418701171876,522.0553121490478,144.05563354492188]},{"page":4,"text":"Executing an Exploitation.......................................................................................... 6-6","rect":[144.0,164.81414794921876,522.0553121490478,155.51559448242188]},{"page":4,"text":"PURSUIT .................................................................................................................. 7-1","rect":[144.00372314453126,181.0,522.0282735748291,172.9454345703125]},{"page":4,"text":"General Considerations for a Pursuit........................................................................ 7-1","rect":[144.0,191.87022399902345,522.0545186920166,184.4654541015625]},{"page":4,"text":"Organization of Forces for a Pursuit ......................................................................... 7-2","rect":[144.0,205.31414794921876,522.0445699615478,195.91539001464845]},{"page":4,"text":"Control Measures for a Pursuit ................................................................................. 7-4","rect":[144.0,214.85020446777345,522.0554342193603,207.4454345703125]},{"page":4,"text":"Planning a Pursuit..................................................................................................... 7-6","rect":[144.0,228.35418701171876,522.0445699615478,219.05563354492188]},{"page":4,"text":"Preparing a Pursuit ................................................................................................... 7-7","rect":[144.0,239.81414794921876,522.0445699615478,230.545654296875]},{"page":4,"text":"Executing a Pursuit ................................................................................................... 7-7","rect":[144.0,251.33416748046876,522.0445699615478,242.065673828125]},{"page":4,"text":"PART THREE DEFENSIVE OPERATIONS","rect":[191.94122314453126,273.791259765625,402.02046755599977,265.6660461425781]},{"page":4,"text":"THE DEFENSE......................................................................................................... 8-1","rect":[144.00372314453126,292.0,522.0382833404541,284.0654296875]},{"page":4,"text":"Purpose of the Defense ............................................................................................ 8-1","rect":[144.0,304.86395263671877,522.0542745513916,295.58544921875]},{"page":4,"text":"Characteristics of the Defense.................................................................................. 8-2","rect":[144.0,314.5102233886719,522.0445699615478,307.1054382324219]},{"page":4,"text":"Types of Defensive Operations................................................................................. 8-2","rect":[144.0,327.95416259765627,522.0554342193603,318.555419921875]},{"page":4,"text":"Common Defensive Control Measures..................................................................... 8-4","rect":[144.0,337.490234375,522.0445699615478,330.08544921875]},{"page":4,"text":"Common Defensive Planning Considerations .......................................................... 8-4","rect":[144.0,350.9941711425781,522.0566549224853,341.6054382324219]},{"page":4,"text":"Transitions............................................................................................................... 8-24","rect":[144.0,360.47021484375,522.0445699615478,353.1556091308594]},{"page":4,"text":"AREA DEFENSE...................................................................................................... 9-1","rect":[144.00372314453126,378.000244140625,522.0388326568603,370.58544921875]},{"page":4,"text":"General Considerations for an Area Defense........................................................... 9-1","rect":[144.0,389.5102233886719,522.0546407623291,382.1054382324219]},{"page":4,"text":"Organization of Forces for an Area Defense ............................................................ 9-1","rect":[144.0,402.95416259765627,522.0556173248291,393.555419921875]},{"page":4,"text":"Control Measures for an Area Defense .................................................................... 9-3","rect":[144.0,412.500244140625,522.0575704498291,405.08544921875]},{"page":4,"text":"Planning an Area Defense........................................................................................ 9-4","rect":[144.0,425.9941711425781,522.0563497467041,416.6054382324219]},{"page":4,"text":"Preparation Considerations for an Area Defense..................................................... 9-9","rect":[144.0,437.34393310546877,522.0445699615478,428.0654296875]},{"page":4,"text":"Execution Considerations for an Area Defense...................................................... 9-10","rect":[144.0,446.990234375,522.0546407623291,439.58544921875]},{"page":4,"text":"Variations of the Area Defense............................................................................... 9-12","rect":[144.0,458.4502258300781,522.0546407623291,451.0454406738281]},{"page":4,"text":"MOBILE DEFENSE................................................................................................ 10-1","rect":[144.00372314453126,475.980224609375,522.0482931060791,468.5654296875]},{"page":4,"text":"General Considerations for a Mobile Defense........................................................ 10-1","rect":[144.0,487.490234375,522.0545797271728,480.08544921875]},{"page":4,"text":"Organization of Forces for a Mobile Defense......................................................... 10-2","rect":[144.0,500.9341735839844,522.0546407623291,491.535400390625]},{"page":4,"text":"Control Measures for a Mobile Defense ................................................................. 10-4","rect":[144.0,510.47021484375,522.0445699615478,503.0654296875]},{"page":4,"text":"Planning a Mobile Defense..................................................................................... 10-5","rect":[144.0,523.9741821289063,522.0446309967041,514.58544921875]},{"page":4,"text":"Preparing a Mobile Defense ................................................................................... 10-6","rect":[144.0,535.4341430664063,522.0446309967041,526.04541015625]},{"page":4,"text":"Executing a Mobile Defense................................................................................... 10-6","rect":[144.0,546.9541625976563,522.0546407623291,537.5654296875]},{"page":4,"text":"RETROGRADE....................................................................................................... 11-1","rect":[144.00372314453126,562.490234375,522.0482931060791,555.08544921875]},{"page":4,"text":"General Considerations for the Retrograde............................................................ 11-1","rect":[144.0,575.9341430664063,522.0545797271728,566.54541015625]},{"page":4,"text":"Variations of Retrograde......................................................................................... 11-2","rect":[144.0,587.4541625976563,522.0446309967041,578.0654296875]},{"page":4,"text":"PART FOUR","rect":[194.40072631835938,609.9003295898438,258.54589157867437,601.7860717773438]},{"page":4,"text":"ENABLING OPERATIONS","rect":[266.3966064453125,609.9113159179688,399.5148218040466,601.7860717773438]},{"page":4,"text":"RECONNAISSANCE.............................................................................................. 12-1","rect":[144.00372314453126,627.6002197265625,522.0482931060791,620.1854248046875]},{"page":4,"text":"General Reconnaissance Considerations .............................................................. 12-1","rect":[144.0,639.1102294921875,522.0446309967041,631.7054443359375]},{"page":4,"text":"Reconnaissance Management ............................................................................... 12-4","rect":[144.0,652.6141967773438,522.0545797271728,643.3156127929688]},{"page":4,"text":"Forms of Reconnaissance...................................................................................... 12-9","rect":[144.0,662.0902099609375,522.0545797271728,654.6854248046875]},{"page":4,"text":"Reconnaissance Methods..................................................................................... 12-19","rect":[144.0,673.6102294921875,522.0446309967041,666.2955932617188]},{"page":4,"text":"Recuperation and Reconstitution of Reconnaissance Assets.............................. 12-21","rect":[144.0,687.0039672851563,522.0546407623291,677.7254638671875]},{"page":4,"text":"SECURITY OPERATIONS..................................................................................... 13-1","rect":[144.00372314453126,702.6002197265625,522.0482931060791,695.1854248046875]},{"page":4,"text":"General Security Operations Considerations ......................................................... 13-1","rect":[144.0,716.0941772460938,522.0446309967041,706.6954345703125]},{"page":4,"text":"FM 3-90","rect":[271.2539978027344,754.18798828125,304.75198583984379,747.6090087890625]},{"page":5,"text":"Contents","rect":[501.0,62.55902099609375,540.02401953125,55.90802001953125]},{"page":5,"text":"Security Operations Considerations........................................................................13-2","rect":[162.0,89.81414794921875,540.0545797271728,80.41539001464844]},{"page":5,"text":"Types of Security Operations ................................................................................ 13-11","rect":[162.0,101.33416748046875,540.0446309967041,91.93540954589844]},{"page":5,"text":"Chapter 14","rect":[90.0,118.72393035888672,141.71221827697756,109.46544647216797]},{"page":5,"text":"TROOP MOVEMENT..............................................................................................14-1","rect":[162.00372314453126,116.87023162841797,540.0482931060791,109.46544647216797]},{"page":5,"text":"General Considerations of Troop Movement ..........................................................14-1","rect":[162.0,130.2039337158203,540.0545797271728,120.92540740966797]},{"page":5,"text":"Planning a Troop Movement ...................................................................................14-9","rect":[162.0,141.83416748046876,540.0545797271728,132.53561401367188]},{"page":5,"text":"Preparing a Troop Movement................................................................................14-11","rect":[162.0,153.35418701171876,540.0446309967041,144.05563354492188]},{"page":5,"text":"Executing a Troop Movement ...............................................................................14-11","rect":[162.0,164.81414794921876,540.0445089263916,155.51559448242188]},{"page":5,"text":"Chapter 15","rect":[90.0,182.2039031982422,141.71221827697756,172.9454345703125]},{"page":5,"text":"RELIEF IN PLACE..................................................................................................15-1","rect":[162.00372314453126,181.0,540.0482931060791,172.9454345703125]},{"page":5,"text":"General Considerations of a Relief In Place ...........................................................15-1","rect":[162.0,191.87022399902345,540.0546407623291,184.4654541015625]},{"page":5,"text":"Organization of Forces for a Relief in Place............................................................15-1","rect":[162.0,205.31414794921876,540.0545797271728,195.91539001464845]},{"page":5,"text":"Control Measures for a Relief In Place....................................................................15-2","rect":[162.0,214.85020446777345,540.0445699615478,207.4454345703125]},{"page":5,"text":"Planning a Relief In Place .......................................................................................15-2","rect":[162.0,228.35418701171876,540.0445699615478,218.9654541015625]},{"page":5,"text":"Preparing for a Relief in Place.................................................................................15-4","rect":[162.0,239.81414794921876,540.0445699615478,230.4254150390625]},{"page":5,"text":"Executing a Relief in Place......................................................................................15-4","rect":[162.0,251.33416748046876,540.0446309967041,241.9454345703125]},{"page":5,"text":"Chapter 16","rect":[90.0,268.72393798828127,141.71221827697756,259.4654541015625]},{"page":5,"text":"PASSAGE OF LINES .............................................................................................16-1","rect":[162.00372314453126,266.8802490234375,540.0482931060791,259.4654541015625]},{"page":5,"text":"General Considerations for a Passage of Lines......................................................16-1","rect":[162.0,280.31414794921877,540.0546407623291,270.9254150390625]},{"page":5,"text":"Organization of Forces for a Passage of Lines ....................................................... 16-2","rect":[162.0,291.83416748046877,540.0446309967041,282.4354248046875]},{"page":5,"text":"Control Measures for a Passage of Lines ............................................................... 16-2","rect":[162.0,303.3541564941406,540.0545797271728,293.9654235839844]},{"page":5,"text":"Planning a Passage of Lines...................................................................................16-4","rect":[162.0,314.8141784667969,540.0545797271728,305.4254455566406]},{"page":5,"text":"Forward Passage of Lines.......................................................................................16-6","rect":[162.0,326.33416748046877,540.0446309967041,316.9454345703125]},{"page":5,"text":"Rearward Passage of Lines ....................................................................................16-8","rect":[162.0,337.794189453125,540.0446309967041,328.40545654296877]},{"page":5,"text":"Chapter 17","rect":[90.0,355.1839294433594,141.71221827697756,345.9254455566406]},{"page":5,"text":"COUNTERMOBILITY..............................................................................................17-1","rect":[162.00372314453126,354.0,540.0482931060791,345.9254455566406]},{"page":5,"text":"General Countermobility Considerations.................................................................17-1","rect":[162.0,366.83416748046877,540.0445699615478,357.4454345703125]},{"page":5,"text":"Terrain Reinforcement.............................................................................................17-2","rect":[162.0,376.31024169921877,540.0446309967041,368.90545654296877]},{"page":5,"text":"Obstacle Intent ........................................................................................................17-4","rect":[162.0,387.8302307128906,540.0445699615478,380.4154052734375]},{"page":5,"text":"Obstacles Employment Principles...........................................................................17-9","rect":[162.0,401.33416748046877,540.0445699615478,391.9354248046875]},{"page":5,"text":"Obstacle Emplacement Authority ............................................................................ 17-9","rect":[162.0,412.794189453125,540.0446309967041,403.39544677734377]},{"page":5,"text":"Obstacle Control Measures...................................................................................17-10","rect":[162.0,422.3302307128906,540.0546407623291,414.9154052734375]},{"page":5,"text":"Chapter 18","rect":[90.0,441.70391845703127,141.71221827697756,432.4454345703125]},{"page":5,"text":"MOBILITY................................................................................................................18-1","rect":[162.00372314453126,439.8602294921875,540.0482931060791,432.4454345703125]},{"page":5,"text":"Mobility.....................................................................................................................18-1","rect":[162.0,453.294189453125,540.0346212310791,443.9956359863281]},{"page":5,"text":"Mobility Tasks..........................................................................................................18-1","rect":[162.0,464.8141784667969,540.0346212310791,455.515625]},{"page":5,"text":"Chapter 19","rect":[90.0,482.20391845703127,141.71221827697756,472.9454345703125]},{"page":5,"text":"TACTICAL DECEPTION.........................................................................................19-1","rect":[162.00372314453126,481.0,540.0482931060791,472.9454345703125]},{"page":5,"text":"Overview of Deception ............................................................................................19-1","rect":[162.0,493.6839599609375,540.0545797271728,484.39544677734377]},{"page":5,"text":"Principles of Tactical Deception ..............................................................................19-2","rect":[162.0,505.2039489746094,540.0445699615478,495.9254455566406]},{"page":5,"text":"Types of Tactical Deception .................................................................................... 19-3","rect":[162.0,516.8341674804688,540.0446309967041,507.4454345703125]},{"page":5,"text":"Tactical Deception Means ....................................................................................... 19-4","rect":[162.0,528.1839599609375,540.0445699615478,518.99560546875]},{"page":5,"text":"Variations of Tactical Deception..............................................................................19-6","rect":[162.0,539.7039184570313,540.0445699615478,530.4254150390625]},{"page":5,"text":"Tactical Deception Planning....................................................................................19-9","rect":[162.0,551.3341674804688,540.0446309967041,542.0355834960938]},{"page":5,"text":"Tactical Deception in Offensive Operations ............................................................ 19-9","rect":[162.0,562.6839599609375,540.0545797271728,553.3954467773438]},{"page":5,"text":"Tactical Deception in Defensive Operations .........................................................19-10","rect":[162.0,574.2039184570313,540.0546407623291,564.9154052734375]},{"page":5,"text":"Risk to Tactical Deception.....................................................................................19-10","rect":[162.0,585.6639404296875,540.0446309967041,576.4755859375]},{"page":5,"text":"Chapter 20","rect":[90.0,603.1639404296875,141.71221827697756,593.9054565429688]},{"page":5,"text":"LINKUP ...................................................................................................................20-1","rect":[162.00372314453126,602.0,540.0583028717041,593.99560546875]},{"page":5,"text":"Linkup Operations ...................................................................................................20-1","rect":[162.0,614.7039184570313,540.0446309967041,605.4154052734375]},{"page":5,"text":"Types of Linkups .....................................................................................................20-5","rect":[162.0,626.274169921875,540.0446309967041,616.8854370117188]},{"page":5,"text":"Appendix ATACTICAL CONTROL MEASURES ............................................................................. A-1","rect":[90.0,643.6639404296875,540.0611715240478,634.4054565429688]},{"page":5,"text":"Appendix B","rect":[90.0,661.1838989257813,145.60298586273195,652.045654296875]},{"page":5,"text":"TACTICAL MISSION TASKS .................................................................................. B-1","rect":[162.00372314453126,660.0,540.0483541412353,651.9254150390625]},{"page":5,"text":"Appendix C","rect":[90.0,678.6439208984375,145.60298586273195,669.3854370117188]},{"page":5,"text":"ENCIRCLEMENTS................................................................................................... C-1","rect":[162.00372314453126,676.8002319335938,540.0483541412353,669.3854370117188]},{"page":5,"text":"GLOSSARY ................................................................................................Glossary-1","rect":[162.0019073486328,696.294189453125,538.3620748443603,686.9054565429688]},{"page":5,"text":"REFERENCES ........................................................................................ References-1","rect":[162.0019073486328,711.8402099609375,538.3631124420166,704.4254150390625]},{"page":5,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":5,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":5,"text":"iii","rect":[514.5060424804688,754.0800170898438,522.0480205078125,747.635986328125]},{"page":6,"text":"Contents","rect":[72.0,62.55902099609375,111.02400427246094,55.90802001953125]},{"page":6,"text":"INDEX ............................................................................................................... Index-1","rect":[144.0019073486328,87.83019256591797,520.3745260162353,80.51558685302735]},{"page":6,"text":"Figures","rect":[268.0799865722656,120.1681900024414,325.8785558013916,105.34968566894531]},{"page":6,"text":"Figure 1-1. Army tactical taxonomy ............................................................................................... 1-4","rect":[86.4000015258789,147.71417236328126,522.0521993560791,138.41561889648438]},{"page":6,"text":"Figure 1-2. Tactical framework ...................................................................................................... 1-7","rect":[86.4000015258789,163.19415283203126,522.0500631256103,153.805419921875]},{"page":6,"text":"Figure 1-3. Actions on contact ..................................................................................................... 1-13","rect":[86.4000015258789,178.73419189453126,522.0395650787353,169.43563842773438]},{"page":6,"text":"Figure 2-1. Column formation ........................................................................................................ 2-2","rect":[86.4000015258789,194.21417236328126,522.0490865631103,184.825439453125]},{"page":6,"text":"Figure 2-2. Line formation.............................................................................................................. 2-3","rect":[86.4000015258789,209.69415283203126,522.0395650787353,200.305419921875]},{"page":6,"text":"Figure 2-3. Wedge formation ......................................................................................................... 2-4","rect":[86.4000015258789,225.23419189453126,522.0395650787353,215.845458984375]},{"page":6,"text":"Figure 2-4. Echelon left formation.................................................................................................. 2-5","rect":[86.4000015258789,240.71417236328126,522.0421285552978,231.325439453125]},{"page":6,"text":"Figure 2-5. Echelon right formation ............................................................................................... 2-5","rect":[86.4000015258789,256.19415283203127,522.0421285552978,246.805419921875]},{"page":6,"text":"Figure 2-6. Vee formation .............................................................................................................. 2-6","rect":[86.4000015258789,271.73419189453127,522.0395650787353,262.345458984375]},{"page":6,"text":"Figure 2-7. Diamond formation ...................................................................................................... 2-7","rect":[86.4000015258789,287.2142028808594,522.0501241607666,277.8254699707031]},{"page":6,"text":"Figure 2-8. Box formation .............................................................................................................. 2-8","rect":[86.4000015258789,302.6941833496094,522.0395650787353,293.3054504394531]},{"page":6,"text":"Figure 2-9. Movement techniques usages in relation to enemy contact ....................................... 2-9","rect":[86.4000015258789,318.23419189453127,522.0495748443603,308.9356384277344]},{"page":6,"text":"Figure 2-10. Traveling movement technique ............................................................................... 2-10","rect":[86.4000015258789,333.7142028808594,522.0495138092041,324.4156494140625]},{"page":6,"text":"Figure 2-11. Traveling overwatch movement technique.............................................................. 2-11","rect":[86.4000015258789,349.1941833496094,522.0495748443603,339.8956298828125]},{"page":6,"text":"Figure 2-12. Bounding overwatch movement technique (alternating bounds)............................ 2-12","rect":[86.4000015258789,364.73419189453127,522.0595846099853,355.345458984375]},{"page":6,"text":"Figure 2-13. Bounding overwatch movement technique (successive bounds) ........................... 2-12","rect":[86.4000015258789,380.2142028808594,522.0595846099853,370.8254699707031]},{"page":6,"text":"Figure 2-14. Frontal attack........................................................................................................... 2-14","rect":[86.4000015258789,395.6941833496094,522.0495748443603,386.3956298828125]},{"page":6,"text":"Figure 2-15. Penetration .............................................................................................................. 2-18","rect":[86.4000015258789,411.1741943359375,522.0395650787353,401.8756408691406]},{"page":6,"text":"Figure 2-16. Single envelopment................................................................................................. 2-20","rect":[86.4000015258789,426.7142028808594,522.0395650787353,417.3254699707031]},{"page":6,"text":"Figure 2-17. Envelopment control measures............................................................................... 2-21","rect":[86.4000015258789,442.1941833496094,522.0495748443603,432.8956298828125]},{"page":6,"text":"Figure 2-18. Turning movement .................................................................................................. 2-22","rect":[86.4000015258789,457.6741943359375,522.0395040435791,448.3756408691406]},{"page":6,"text":"Figure 2-19. Infiltration................................................................................................................. 2-25","rect":[86.4000015258789,473.2142028808594,522.0495748443603,463.8254699707031]},{"page":6,"text":"Figure 4-1. Organization of forces for a movement to contact ...................................................... 4-2","rect":[86.4000015258789,488.6941833496094,522.0495748443603,479.29541015625]},{"page":6,"text":"Figure 4-2. Example movement to contact control measures ....................................................... 4-4","rect":[86.4000015258789,504.1741943359375,522.0495138092041,494.8756408691406]},{"page":6,"text":"Figure 4-3. Search and attack control measures......................................................................... 4-10","rect":[86.4000015258789,519.7141723632813,522.0495748443603,510.325439453125]},{"page":6,"text":"Figure 4-4. Cordon and search symbol ....................................................................................... 4-14","rect":[86.4000015258789,535.1941528320313,522.0495138092041,525.805419921875]},{"page":6,"text":"Figure 4-5. Example inner and outer cordons ............................................................................. 4-15","rect":[86.4000015258789,550.6741943359375,522.0495138092041,541.3756103515625]},{"page":6,"text":"Figure 5-1. Example of attack control measures ........................................................................... 5-2","rect":[86.4000015258789,566.2141723632813,522.0495138092041,556.825439453125]},{"page":6,"text":"Figure 5-2. Example control measures for movement from assembly area to attack position...... 5-8","rect":[86.4000015258789,581.6941528320313,522.0615987701416,572.305419921875]},{"page":6,"text":"Figure 5-3. Example of a probable line of deployment and assault position............................... 5-13","rect":[86.4000015258789,597.1741943359375,522.0595846099853,587.7854614257813]},{"page":6,"text":"Figure 5-4. Attack of an objective, breach ................................................................................... 5-15","rect":[86.4000015258789,612.7141723632813,522.0495138092041,603.325439453125]},{"page":6,"text":"Figure 5-5. Attack of an objective, assault................................................................................... 5-15","rect":[86.4000015258789,628.1941528320313,522.0495138092041,618.805419921875]},{"page":6,"text":"Figure 5-6. Example of a linear ambush...................................................................................... 5-20","rect":[86.4000015258789,643.6741943359375,522.0495138092041,634.2854614257813]},{"page":6,"text":"Figure 5-7. Example of an L-shaped ambush.............................................................................. 5-21","rect":[86.4000015258789,659.2141723632813,522.0495748443603,649.825439453125]},{"page":6,"text":"Figure 5-8. Area ambush ............................................................................................................. 5-22","rect":[86.4000015258789,674.6941528320313,522.0495138092041,665.3955688476563]},{"page":6,"text":"Figure 5-9. Example of counterattacks........................................................................................ 5-24","rect":[86.4000015258789,690.1741943359375,522.0495138092041,680.7854614257813]},{"page":6,"text":"Figure 5-10. Five phases of a raid............................................................................................... 5-27","rect":[86.4000015258789,705.7141723632813,522.0495748443603,696.325439453125]},{"page":6,"text":"iv","rect":[72.1199951171875,754.0800170898438,79.64399176025391,747.635986328125]},{"page":6,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":6,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":7,"text":"Contents","rect":[501.0,62.55902099609375,540.02401953125,55.90802001953125]},{"page":7,"text":"Figure 5-11. Spoiling attack.......................................................................................................... 5-28","rect":[104.4000015258789,89.81414794921875,540.0395650787353,80.42540740966797]},{"page":7,"text":"Figure 6-1. Example exploitation control measures....................................................................... 6-4","rect":[104.4000015258789,105.294189453125,540.0496358795166,95.9956283569336]},{"page":7,"text":"Figure 7-1. Frontal pursuit.............................................................................................................. 7-3","rect":[104.4000015258789,120.83416748046875,540.0396261138916,111.53560638427735]},{"page":7,"text":"Figure 7-2. Combination pursuit..................................................................................................... 7-4","rect":[104.4000015258789,136.31414794921876,540.0396261138916,126.92540740966797]},{"page":7,"text":"Figure 7-3. Example pursuit control measures .............................................................................. 7-5","rect":[104.4000015258789,151.794189453125,540.0496358795166,142.49563598632813]},{"page":7,"text":"Figure 8-1. Example detachment left in contact............................................................................. 8-9","rect":[104.4000015258789,167.33416748046876,540.0524434967041,157.9454345703125]},{"page":7,"text":"Figure 9-1. Example area defense control measures .................................................................... 9-3","rect":[104.4000015258789,182.81414794921876,540.0525655670166,173.4254150390625]},{"page":7,"text":"Figure 9-2. Organization of forces for an area defense, contiguous assigned areas .................... 9-4","rect":[104.4000015258789,198.294189453125,540.0596456451416,188.8954315185547]},{"page":7,"text":"Figure 9-3. Organization of forces for an area defense, noncontiguous assigned areas .............. 9-5","rect":[104.4000015258789,213.83416748046876,540.0495748443603,204.43540954589845]},{"page":7,"text":"Figure 9-4. Example defense in depth ........................................................................................... 9-7","rect":[104.4000015258789,229.31414794921876,540.0496358795166,219.9254150390625]},{"page":7,"text":"Figure 9-5. Example forward defense ............................................................................................ 9-8","rect":[104.4000015258789,244.794189453125,540.0492086334228,235.40545654296876]},{"page":7,"text":"Figure 9-6. Example area defense............................................................................................... 9-11","rect":[104.4000015258789,260.33416748046877,540.0495138092041,250.9454345703125]},{"page":7,"text":"Figure 9-7. Example of a defense of a linear obstacle................................................................. 9-13","rect":[104.4000015258789,275.81414794921877,540.0395650787353,266.4254150390625]},{"page":7,"text":"Figure 9-8. Example of a perimeter defense................................................................................ 9-14","rect":[104.4000015258789,291.294189453125,540.0495138092041,281.90545654296877]},{"page":7,"text":"Figure 9-9. Example of a perimeter defense in depth.................................................................. 9-15","rect":[104.4000015258789,306.83416748046877,540.0495138092041,297.4454345703125]},{"page":7,"text":"Figure 9-10. Battalion perimeter, squadron reserve..................................................................... 9-15","rect":[104.4000015258789,322.3141784667969,540.0395040435791,313.015625]},{"page":7,"text":"Figure 9-11. Example perimeter defense control measures........................................................ 9-17","rect":[104.4000015258789,337.794189453125,540.0495138092041,328.40545654296877]},{"page":7,"text":"Figure 9-12. Slope terminology .................................................................................................... 9-22","rect":[104.4000015258789,353.33416748046877,540.0495748443603,343.9454345703125]},{"page":7,"text":"Figure 10-1. Mobile defense.........................................................................................................10-2","rect":[104.4000015258789,368.8141784667969,540.0395650787353,359.4254455566406]},{"page":7,"text":"Figure 10-2. Organization of forces for a mobile defense............................................................10-3","rect":[104.4000015258789,384.294189453125,540.0595846099853,374.89544677734377]},{"page":7,"text":"Figure 10-3. Example of mobile defense control measures.........................................................10-4","rect":[104.4000015258789,399.7742004394531,540.0495748443603,390.3854675292969]},{"page":7,"text":"Figure 10-4. Mobile defense before commitment of striking force...............................................10-8","rect":[104.4000015258789,415.3141784667969,540.0595846099853,405.9254455566406]},{"page":7,"text":"Figure 10-5. Mobile defense after commitment of striking force..................................................10-9","rect":[104.4000015258789,430.794189453125,540.0495748443603,421.40545654296877]},{"page":7,"text":"Figure 11-1. Delay from alternating positions ..............................................................................11-4","rect":[104.4000015258789,446.2742004394531,540.0495748443603,436.8854675292969]},{"page":7,"text":"Figure 11-2. Delay from subsequent positions.............................................................................11-5","rect":[104.4000015258789,461.8141784667969,540.0495748443603,452.4254455566406]},{"page":7,"text":"Figure 11-3. Example of common delay control measures..........................................................11-6","rect":[104.4000015258789,477.294189453125,540.0495748443603,467.90545654296877]},{"page":7,"text":"Figure 11-4. Example of a delay forward of a specified line for a specified time.........................11-8","rect":[104.4000015258789,492.7742004394531,540.0495748443603,483.3854675292969]},{"page":7,"text":"Figure 11-5. Example control measures for a withdrawal using a detachment left in contact...11-14","rect":[104.4000015258789,508.3141784667969,540.0495748443603,498.9254455566406]},{"page":7,"text":"Figure 11-6. Withdrawal techniques...........................................................................................11-15","rect":[104.4000015258789,523.794189453125,540.0495748443603,514.49560546875]},{"page":7,"text":"Figure 11-7. Example organization of forces for a retirement....................................................11-18","rect":[104.4000015258789,539.274169921875,540.0495748443603,529.8854370117188]},{"page":7,"text":"Figure 12-1. Example of zone reconnaissance control measures............................................. 12-11","rect":[104.4000015258789,554.8141479492188,540.0595846099853,545.4254150390625]},{"page":7,"text":"Figure 12-2. Example of area reconnaissance control measures..............................................12-13","rect":[104.4000015258789,570.294189453125,540.0495748443603,560.9054565429688]},{"page":7,"text":"Figure 12-3. Example of route reconnaissance control measures.............................................12-15","rect":[104.4000015258789,585.774169921875,540.0495748443603,576.3854370117188]},{"page":7,"text":"Figure 13-1. Example of the security force crossing LD separately to deploy and establish a flank","rect":[104.4000015258789,601.3141479492188,531.9612331390381,591.9254150390625]},{"page":7,"text":"screen ....................................................................................................................... 13-9","rect":[158.3977813720703,610.8632202148438,540.0395650787353,603.53857421875]},{"page":7,"text":"Figure 13-2. Example of the security force crossing separately and the lead element conducting a","rect":[104.4000015258789,628.3141479492188,534.7427511138916,618.9254150390625]},{"page":7,"text":"movement to contact ..............................................................................................13-10","rect":[158.3977813720703,637.8632202148438,540.0295553131103,630.53857421875]},{"page":7,"text":"Figure 13-3. Example of the security force crossing with the main body and conducting a zone","rect":[104.4000015258789,655.3141479492188,519.7119893951416,645.9254150390625]},{"page":7,"text":"reconnaissance.......................................................................................................13-11","rect":[158.3977813720703,664.8632202148438,540.0395650787353,657.53857421875]},{"page":7,"text":"Figure 13-4. Example security operations control measures.....................................................13-12","rect":[104.4000015258789,682.3141479492188,540.0496358795166,673.0155639648438]},{"page":7,"text":"Figure 13-5. Control measures used in a screen mission..........................................................13-14","rect":[104.4000015258789,697.794189453125,540.0596456451416,688.4054565429688]},{"page":7,"text":"Figure 13-6. Moving flank screen...............................................................................................13-16","rect":[104.4000015258789,713.274169921875,540.0495748443603,703.8854370117188]},{"page":7,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":7,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":7,"text":"v","rect":[517.0260009765625,754.0800170898438,522.0300009765625,749.4089965820313]},{"page":8,"text":"Contents","rect":[72.0,62.55902099609375,111.02400427246094,55.90802001953125]},{"page":8,"text":"Figure 13-7. Examples of alternate bound by OP and alternate bound by unit......................... 13-17","rect":[86.4000015258789,89.81414794921875,522.0596456451416,80.41539001464844]},{"page":8,"text":"Figure 13-8. Example of successive bound by unit and continuous marching methods of","rect":[86.4000015258789,105.294189453125,474.3522105178833,95.90544891357422]},{"page":8,"text":"displacement .......................................................................................................... 13-18","rect":[140.3977813720703,116.70698547363281,522.0395650787353,107.51863861083985]},{"page":8,"text":"Figure 13-9. Advance guard for division attack ......................................................................... 13-20","rect":[86.4000015258789,132.294189453125,522.0495748443603,122.90544891357422]},{"page":8,"text":"Figure 13-10. Stationary flank guard ......................................................................................... 13-22","rect":[86.4000015258789,147.83416748046876,522.0495748443603,138.4454345703125]},{"page":8,"text":"Figure 13-11. Moving flank guard control measures................................................................. 13-23","rect":[86.4000015258789,163.31414794921876,522.0495748443603,153.9254150390625]},{"page":8,"text":"Figure 13-12. Attack using a covering force.............................................................................. 13-26","rect":[86.4000015258789,178.794189453125,522.0495748443603,169.40545654296876]},{"page":8,"text":"Figure 13-13 Example of a defensive cover.............................................................................. 13-28","rect":[86.4000015258789,194.33416748046876,522.0495748443603,184.9454345703125]},{"page":8,"text":"Figure 14-1. Tactical movement .................................................................................................. 14-2","rect":[86.4000015258789,209.81414794921876,522.0495748443603,200.51559448242188]},{"page":8,"text":"Figure 14-2. Approach march...................................................................................................... 14-2","rect":[86.4000015258789,225.294189453125,522.0495748443603,215.99563598632813]},{"page":8,"text":"Figure 14-3. Example overlay with route control measures ........................................................ 14-7","rect":[86.4000015258789,240.83416748046876,522.0595846099853,231.53561401367188]},{"page":8,"text":"Figure 14-4. Example strip map................................................................................................... 14-8","rect":[86.4000015258789,256.31414794921877,522.0395650787353,247.01559448242188]},{"page":8,"text":"Figure 15-1. Example of a brigade relief in place........................................................................ 15-2","rect":[86.4000015258789,271.794189453125,522.0595846099853,262.40545654296877]},{"page":8,"text":"Figure 16-1. Control measures associated with a rearward passage of lines............................. 16-3","rect":[86.4000015258789,287.33416748046877,522.0595846099853,277.9454345703125]},{"page":8,"text":"Figure 16-2. Forward passage of lines........................................................................................ 16-7","rect":[86.4000015258789,302.8141784667969,522.0495748443603,293.4254455566406]},{"page":8,"text":"Figure 17-1. Obstacle control measures and intent symbols .................................................... 17-12","rect":[86.4000015258789,318.294189453125,522.0596456451416,308.89544677734377]},{"page":8,"text":"Figure 18-1. Breach..................................................................................................................... 18-3","rect":[86.4000015258789,333.83416748046877,522.0395650787353,324.5356140136719]},{"page":8,"text":"Figure 20-1. Linkup of a moving force with a stationary force..................................................... 20-5","rect":[86.4000015258789,349.3141784667969,522.0495748443603,339.9254455566406]},{"page":8,"text":"Figure 20-2. Linkup of two moving forces.................................................................................... 20-6","rect":[86.4000015258789,364.794189453125,522.0495748443603,355.40545654296877]},{"page":8,"text":"Figure A-1. AO with forward, rear, and lateral boundaries ............................................................ A-2","rect":[86.4000015258789,380.33416748046877,522.0506124420166,370.9354248046875]},{"page":8,"text":"Figure A-2. Division AO with single boundary and contiguous BCT assigned areas.................... A-3","rect":[86.4000015258789,395.8141784667969,522.0495138092041,386.4154052734375]},{"page":8,"text":"Figure A-3. Assembly areas........................................................................................................... A-4","rect":[86.4000015258789,411.294189453125,522.0395040435791,401.9956359863281]},{"page":8,"text":"Figure A-4. Single assembly area method..................................................................................... A-5","rect":[86.4000015258789,426.7742004394531,522.0295553131103,417.3854675292969]},{"page":8,"text":"Figure A-5. Portion of a larger assembly area method.................................................................. A-5","rect":[86.4000015258789,442.3141784667969,522.0424947662353,432.9254455566406]},{"page":8,"text":"Figure A-6. Dispersed assembly area method .............................................................................. A-6","rect":[86.4000015258789,457.794189453125,522.0395040435791,448.4956359863281]},{"page":8,"text":"Figure A-7. Checkpoint 13 ............................................................................................................. A-7","rect":[86.4000015258789,473.2742004394531,522.0420064849853,463.8854675292969]},{"page":8,"text":"Figure A-8. Contact point 8............................................................................................................ A-7","rect":[86.4000015258789,488.8141784667969,522.0295553131103,479.4254455566406]},{"page":8,"text":"Figure A-9. Coordination point....................................................................................................... A-7","rect":[86.4000015258789,504.294189453125,522.0395040435791,494.90545654296877]},{"page":8,"text":"Figure A-10. Forward line of own troops........................................................................................ A-7","rect":[86.4000015258789,519.7742309570313,522.0412130279541,510.385498046875]},{"page":8,"text":"Figure A-11. Gap ........................................................................................................................... A-8","rect":[86.4000015258789,535.3141479492188,522.0395040435791,525.9254150390625]},{"page":8,"text":"Figure A-12. Infiltration lane MICHAEL.......................................................................................... A-8","rect":[86.4000015258789,550.794189453125,522.0402364654541,541.4054565429688]},{"page":8,"text":"Figure A-13. Line of contact........................................................................................................... A-8","rect":[86.4000015258789,566.274169921875,522.0395650787353,556.8854370117188]},{"page":8,"text":"Figure A-14. Linkup point 8............................................................................................................ A-9","rect":[86.4000015258789,581.8141479492188,522.0295553131103,572.5155639648438]},{"page":8,"text":"Figure A-15. Named area of interest AUGUSTA........................................................................... A-9","rect":[86.4000015258789,597.294189453125,522.0395040435791,587.9054565429688]},{"page":8,"text":"Figure A-16. Passage lane ............................................................................................................ A-9","rect":[86.4000015258789,612.774169921875,522.0395650787353,603.4755859375]},{"page":8,"text":"Figure A-17. Forward and rearward passage of lines ................................................................. A-10","rect":[86.4000015258789,628.3141479492188,522.0395650787353,618.9254150390625]},{"page":8,"text":"Figure A-18. Passage point ......................................................................................................... A-10","rect":[86.4000015258789,643.794189453125,522.0395040435791,634.49560546875]},{"page":8,"text":"Figure A-19. Phase lines.............................................................................................................. A-11","rect":[86.4000015258789,659.274169921875,522.0294942779541,649.9755859375]},{"page":8,"text":"Figure A-20. Position area for artillery ......................................................................................... A-11","rect":[86.4000015258789,674.8141479492188,522.0395040435791,665.4254150390625]},{"page":8,"text":"Figure A-21. Rally point 14 .......................................................................................................... A-12","rect":[86.4000015258789,690.294189453125,522.0395650787353,680.99560546875]},{"page":8,"text":"Figure A-22. Relief in place.......................................................................................................... A-12","rect":[86.4000015258789,705.774169921875,522.0395040435791,696.3854370117188]},{"page":8,"text":"vi","rect":[72.1199951171875,754.0800170898438,79.66199603271484,747.635986328125]},{"page":8,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":8,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":9,"text":"Contents","rect":[501.0,62.55902099609375,540.02401953125,55.90802001953125]},{"page":9,"text":"Figure A-23. Routes .....................................................................................................................A-13","rect":[104.4000015258789,89.81414794921875,540.0295553131103,80.51558685302735]},{"page":9,"text":"Figure A-24. Target area of interest WHITETAIL.........................................................................A-13","rect":[104.4000015258789,105.294189453125,540.0395040435791,95.90544891357422]},{"page":9,"text":"Figure A-25. Common offensive control measures......................................................................A-14","rect":[104.4000015258789,120.83416748046875,540.0395040435791,111.44542694091797]},{"page":9,"text":"Figure A-26. Attack by fire position JAMES .................................................................................A-15","rect":[104.4000015258789,136.31414794921876,540.0395040435791,126.92540740966797]},{"page":9,"text":"Figure A-27. Battle handover line DANIEL...................................................................................A-16","rect":[104.4000015258789,151.794189453125,540.0395040435791,142.49563598632813]},{"page":9,"text":"Figure A-28. Point of departure 7.................................................................................................A-17","rect":[104.4000015258789,167.33416748046876,540.0295553131103,157.9454345703125]},{"page":9,"text":"Figure A-29. Support by fire position............................................................................................A-18","rect":[104.4000015258789,182.81414794921876,540.0395040435791,173.4254150390625]},{"page":9,"text":"Figure A-30. Example zone for 1-66 Armor .................................................................................A-19","rect":[104.4000015258789,198.294189453125,540.0395040435791,188.90545654296876]},{"page":9,"text":"Figure A-31. Five kinds of battle positions ...................................................................................A-20","rect":[104.4000015258789,213.83416748046876,540.0495138092041,204.4454345703125]},{"page":9,"text":"Figure A-32. Combined arms battalion with company battle positions ........................................A-21","rect":[104.4000015258789,229.31414794921876,540.0495748443603,219.9254150390625]},{"page":9,"text":"Figure A-33. Brigade assigned area with battalion battle positions .............................................A-22","rect":[104.4000015258789,244.794189453125,540.0495748443603,235.49563598632813]},{"page":9,"text":"Figure A-34. Task force engagement areas.................................................................................A-23","rect":[104.4000015258789,260.33416748046877,540.0395040435791,250.9454345703125]},{"page":9,"text":"Figure A-35. Final protective fire ..................................................................................................A-23","rect":[104.4000015258789,275.81414794921877,540.0395040435791,266.4254150390625]},{"page":9,"text":"Figure A-36. Final protective line..................................................................................................A-24","rect":[104.4000015258789,291.294189453125,540.0294942779541,281.9956359863281]},{"page":9,"text":"Figure A-37. Forward edge of the battle area ..............................................................................A-24","rect":[104.4000015258789,306.83416748046877,540.0395040435791,297.4454345703125]},{"page":9,"text":"Figure A-38. Example sector for 1-66 Armor ...............................................................................A-25","rect":[104.4000015258789,322.3141784667969,540.0294942779541,312.9254455566406]},{"page":9,"text":"Figure A-39. Direct fire control measures ....................................................................................A-26","rect":[104.4000015258789,337.794189453125,540.0294942779541,328.40545654296877]},{"page":9,"text":"Figure A-40. Sectors of fire ..........................................................................................................A-27","rect":[104.4000015258789,353.33416748046877,540.0194845123291,343.9454345703125]},{"page":9,"text":"Figure A-41. Target reference point 032 ......................................................................................A-27","rect":[104.4000015258789,368.8141784667969,540.0395040435791,359.4254455566406]},{"page":9,"text":"Figure A-42. Trigger line...............................................................................................................A-28","rect":[104.4000015258789,384.294189453125,540.0395040435791,374.9956359863281]},{"page":9,"text":"Figure A-43. Coordinated fire line ................................................................................................A-29","rect":[104.4000015258789,399.7742004394531,540.0395650787353,390.3854675292969]},{"page":9,"text":"Figure A-44. Fire support coordination line..................................................................................A-29","rect":[104.4000015258789,415.3141784667969,540.0395040435791,406.015625]},{"page":9,"text":"Figure A-45. Free fire area...........................................................................................................A-30","rect":[104.4000015258789,430.794189453125,540.0395040435791,421.40545654296877]},{"page":9,"text":"Figure A-46. Blue kill box .............................................................................................................A-31","rect":[104.4000015258789,446.2742004394531,540.0395040435791,436.97564697265627]},{"page":9,"text":"Figure A-47. Purple kill box ..........................................................................................................A-31","rect":[104.4000015258789,461.8141784667969,540.0295553131103,452.515625]},{"page":9,"text":"Figure A-48. No fire area..............................................................................................................A-32","rect":[104.4000015258789,477.294189453125,540.0294942779541,467.90545654296877]},{"page":9,"text":"Figure A-49. Restrictive fire area..................................................................................................A-32","rect":[104.4000015258789,492.7742004394531,540.0294942779541,483.3854675292969]},{"page":9,"text":"Figure A-50. Restrictive fire line ...................................................................................................A-33","rect":[104.4000015258789,508.3141784667969,540.0294942779541,498.9254455566406]},{"page":9,"text":"Figure A-51. Fire support targets .................................................................................................A-33","rect":[104.4000015258789,523.794189453125,540.0295553131103,514.49560546875]},{"page":9,"text":"Figure A-52. Coordinating altitude and coordination level ...........................................................A-35","rect":[104.4000015258789,539.274169921875,540.0395040435791,529.8854370117188]},{"page":9,"text":"Figure B-1. Attack by fire task ........................................................................................................ B-1","rect":[104.4000015258789,554.8141479492188,540.0390767974853,545.4254150390625]},{"page":9,"text":"Figure B-2. Block task .................................................................................................................... B-2","rect":[104.4000015258789,570.294189453125,540.0396261138916,560.99560546875]},{"page":9,"text":"Figure B-3. Block obstacle effect.................................................................................................... B-2","rect":[104.4000015258789,585.774169921875,540.0321187896728,576.3854370117188]},{"page":9,"text":"Figure B-4. Breach task.................................................................................................................. B-3","rect":[104.4000015258789,601.3141479492188,540.0295553131103,592.0155639648438]},{"page":9,"text":"Figure B-5. Bypass task ................................................................................................................. B-3","rect":[104.4000015258789,616.794189453125,540.0399923248291,607.49560546875]},{"page":9,"text":"Figure B-6. Task force conducting a fix and a bypass ................................................................... B-4","rect":[104.4000015258789,632.274169921875,540.0396261138916,622.8854370117188]},{"page":9,"text":"Figure B-7. Canalize task............................................................................................................... B-4","rect":[104.4000015258789,647.8141479492188,540.0410299224853,638.4254150390625]},{"page":9,"text":"Figure B-8. Clear task .................................................................................................................... B-4","rect":[104.4000015258789,663.294189453125,540.0295553131103,653.9054565429688]},{"page":9,"text":"Figure B-9. Contain task................................................................................................................. B-5","rect":[104.4000015258789,678.774169921875,540.0399923248291,669.3854370117188]},{"page":9,"text":"Figure B-10. Control task ............................................................................................................... B-5","rect":[104.4000015258789,694.3141479492188,540.0410299224853,684.9254150390625]},{"page":9,"text":"Figure B-11. Destroy task............................................................................................................... B-5","rect":[104.4000015258789,709.794189453125,540.0410299224853,700.49560546875]},{"page":9,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":9,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":9,"text":"vii","rect":[511.9859924316406,754.0800170898438,522.0480205078125,747.635986328125]},{"page":10,"text":"Contents","rect":[72.0,62.55902099609375,111.02400427246094,55.90802001953125]},{"page":10,"text":"Figure B-12. Disengage task ......................................................................................................... B-6","rect":[86.4000015258789,89.81414794921875,522.0395040435791,80.51558685302735]},{"page":10,"text":"Figure B-13. Disrupt task ............................................................................................................... B-6","rect":[86.4000015258789,105.294189453125,522.0409688873291,95.9956283569336]},{"page":10,"text":"Figure B-14. Disrupt obstacle effect .............................................................................................. B-7","rect":[86.4000015258789,120.83416748046875,522.0395040435791,111.44542694091797]},{"page":10,"text":"Figure B-15. Exfiltrate task............................................................................................................. B-7","rect":[86.4000015258789,136.31414794921876,522.0420064849853,126.92540740966797]},{"page":10,"text":"Figure B-16. Fix task...................................................................................................................... B-8","rect":[86.4000015258789,151.794189453125,522.0419454498291,142.49563598632813]},{"page":10,"text":"Figure B-17. Fix obstacle effect ..................................................................................................... B-8","rect":[86.4000015258789,167.33416748046876,522.0395040435791,157.9454345703125]},{"page":10,"text":"Figure B-18. Follow and assume task ........................................................................................... B-8","rect":[86.4000015258789,182.81414794921876,522.0395040435791,173.51559448242188]},{"page":10,"text":"Figure B-19. Follow and support task............................................................................................ B-9","rect":[86.4000015258789,198.294189453125,522.0492086334228,188.99563598632813]},{"page":10,"text":"Figure B-20. Interdict task.............................................................................................................. B-9","rect":[86.4000015258789,213.83416748046876,522.0295553131103,204.53561401367188]},{"page":10,"text":"Figure B-21. Isolate task.............................................................................................................. B-10","rect":[86.4000015258789,229.31414794921876,522.0395650787353,220.01559448242188]},{"page":10,"text":"Figure B-22. Neutralize task ........................................................................................................ B-10","rect":[86.4000015258789,244.794189453125,522.0395040435791,235.49563598632813]},{"page":10,"text":"Figure B-23. Occupy task ............................................................................................................ B-10","rect":[86.4000015258789,260.33416748046877,522.0395650787353,250.93540954589845]},{"page":10,"text":"Figure B-24. Retain task .............................................................................................................. B-11","rect":[86.4000015258789,275.81414794921877,522.0395650787353,266.5155944824219]},{"page":10,"text":"Figure B-25. Secure task ............................................................................................................. B-11","rect":[86.4000015258789,291.294189453125,522.0395040435791,281.90545654296877]},{"page":10,"text":"Figure B-26. Seize task................................................................................................................ B-11","rect":[86.4000015258789,306.83416748046877,522.0294942779541,297.4454345703125]},{"page":10,"text":"Figure B-27. Support by fire task ................................................................................................. B-12","rect":[86.4000015258789,322.3141784667969,522.0295553131103,312.9254455566406]},{"page":10,"text":"Figure B-28. Suppress task ......................................................................................................... B-12","rect":[86.4000015258789,337.794189453125,522.0395040435791,328.40545654296877]},{"page":10,"text":"Figure B-29. Turn task ................................................................................................................. B-13","rect":[86.4000015258789,353.33416748046877,522.0395040435791,344.0356140136719]},{"page":10,"text":"Figure B-30. Turn obstacle effect ................................................................................................ B-13","rect":[86.4000015258789,368.8141784667969,522.0295553131103,359.4254455566406]},{"page":10,"text":"Figure C-1. Inner and outer arms of an encirclement.................................................................... C-2","rect":[86.4000015258789,384.294189453125,522.0525045318603,374.90545654296877]},{"page":10,"text":"Figure C-2. Example of encirclement control measures................................................................ C-3","rect":[86.4000015258789,399.7742004394531,522.0395650787353,390.3854675292969]},{"page":10,"text":"Figure C-3. Squeeze technique ..................................................................................................... C-5","rect":[86.4000015258789,415.3141784667969,522.0395650787353,405.9254455566406]},{"page":10,"text":"Figure C-4. Hammer technique ..................................................................................................... C-6","rect":[86.4000015258789,430.794189453125,522.0294942779541,421.40545654296877]},{"page":10,"text":"Figure C-5. Wedge technique........................................................................................................ C-7","rect":[86.4000015258789,446.2742004394531,522.0390767974853,436.8854675292969]},{"page":10,"text":"Figure C-6. Encircled division perimeter defense.......................................................................... C-9","rect":[86.4000015258789,461.8141784667969,522.0395040435791,452.4254455566406]},{"page":10,"text":"Figure C-7. Organization of forces for a breakout operation ....................................................... C-10","rect":[86.4000015258789,477.294189453125,522.0495748443603,467.89544677734377]},{"page":10,"text":"Figure C-8. Example breakout organization of forces by an encircled division........................... C-13","rect":[86.4000015258789,492.7742004394531,522.0495748443603,483.3854675292969]},{"page":10,"text":"Figure C-9. Example breakout by an encircled division .............................................................. C-14","rect":[86.4000015258789,508.3141784667969,522.0495748443603,498.9254455566406]},{"page":10,"text":"Tables","rect":[271.6199951171875,547.0161743164063,322.3473363189697,535.36962890625]},{"page":10,"text":"Introductory table-1. Removed terms ..............................................................................................xv","rect":[86.4000015258789,577.6741943359375,522.0295314788818,568.3756103515625]},{"page":10,"text":"Introductory table-2. Modified terms and definitions........................................................................xv","rect":[86.4000015258789,593.2141723632813,522.0295314788818,583.825439453125]},{"page":10,"text":"Introductory table-3. Modified proponent.......................................................................................xviii","rect":[86.4000015258789,608.6941528320313,522.0555558242797,599.305419921875]},{"page":10,"text":"Introductory table-4. New terms...................................................................................................... xix","rect":[86.4000015258789,624.1741943359375,522.0195217132568,614.9057006835938]},{"page":10,"text":"Table 1-1. Considerations for limited-visibility operations ........................................................... 1-19","rect":[86.4000015258789,639.7141723632813,522.0395650787353,630.325439453125]},{"page":10,"text":"Table 1-2. Intelligence warfighting function tasks that support the commander.......................... 1-24","rect":[86.4000015258789,655.1941528320313,522.0495138092041,645.805419921875]},{"page":10,"text":"Table 2-1. Forms of maneuver and planning symbols ................................................................ 2-13","rect":[86.4000015258789,670.6741943359375,522.0495748443603,661.2854614257813]},{"page":10,"text":"Table 3-1. Types of the offensive operations and planning symbols ............................................ 3-2","rect":[86.4000015258789,686.2141723632813,522.0395650787353,676.825439453125]},{"page":10,"text":"Table 3-2. Common offensive control measures........................................................................... 3-4","rect":[86.4000015258789,699.72021484375,522.0395040435791,692.305419921875]},{"page":10,"text":"Table 8-1. Defensive operations symbols...................................................................................... 8-3","rect":[86.4000015258789,717.1741943359375,522.0422506256103,707.7854614257813]},{"page":10,"text":"viii","rect":[72.1199951171875,754.0800170898438,84.64169421386718,747.635986328125]},{"page":10,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":10,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":11,"text":"Contents","rect":[501.0,62.55902099609375,540.02401953125,55.90802001953125]},{"page":11,"text":"Table 8-2. Retrograde task symbols .............................................................................................. 8-3","rect":[104.4000015258789,89.81414794921875,540.0396261138916,80.51558685302735]},{"page":11,"text":"Table 11-1. Considerations for delay techniques.........................................................................11-4","rect":[104.4000015258789,105.294189453125,540.0395650787353,95.90544891357422]},{"page":11,"text":"Table 12-1. Typical reconnaissance and surveillance assets available.......................................12-7","rect":[104.4000015258789,120.83416748046875,540.0395650787353,111.53560638427735]},{"page":11,"text":"Table 12-2. Dedicated reconnaissance units and forms of reconnaissance operations..............12-9","rect":[104.4000015258789,136.2039337158203,540.0395650787353,126.92540740966797]},{"page":11,"text":"Table 13-1. Typical size of security forces for a given mission and echelon ............................... 13-5","rect":[104.4000015258789,151.794189453125,540.0495748443603,142.40545654296876]},{"page":11,"text":"Table 13-2. Screen movement methods....................................................................................13-16","rect":[104.4000015258789,165.3602294921875,540.0396261138916,157.9454345703125]},{"page":11,"text":"Table 14-1. Route designations ...................................................................................................14-9","rect":[104.4000015258789,182.81414794921876,540.0395650787353,173.51559448242188]},{"page":11,"text":"Table 16-1. Brigade Combat Team passage lane requirements ................................................. 16-5","rect":[104.4000015258789,198.294189453125,540.0495748443603,188.90545654296876]},{"page":11,"text":"Table 17-1. Tactical obstacle effects............................................................................................17-5","rect":[104.4000015258789,211.85020446777345,540.0395650787353,204.4454345703125]},{"page":11,"text":"Table 18-1. Breaching tenets ....................................................................................................... 18-5","rect":[104.4000015258789,229.31414794921876,540.0395650787353,220.01559448242188]},{"page":11,"text":"Table 18-2. Support, breach, and assault force responsibilities .................................................. 18-7","rect":[104.4000015258789,244.68397521972657,540.0495748443603,235.40545654296876]},{"page":11,"text":"Table 18-3. Deliberate wet-gap crossing phases.......................................................................18-14","rect":[104.4000015258789,260.33416748046877,540.0396261138916,251.03561401367188]},{"page":11,"text":"Table 19-1. Sample deception techniques...................................................................................19-6","rect":[104.4000015258789,275.70391845703127,540.0495748443603,266.4254150390625]},{"page":11,"text":"Table 19-2. Forms of tactical deception and planning symbols...................................................19-9","rect":[104.4000015258789,291.294189453125,540.0495748443603,281.90545654296877]},{"page":11,"text":"Table B-1. Tactical mission tasks................................................................................................... B-1","rect":[104.4000015258789,304.8502197265625,540.0295553131103,297.5356140136719]},{"page":11,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":11,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":11,"text":"ix","rect":[514.5060424804688,754.0800170898438,522.0300620117188,747.635986328125]},{"page":12,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":13,"text":"Preface","rect":[286.0799865722656,131.1562042236328,343.9442296295166,119.31742095947266]},{"page":13,"text":"FM 3-90 describes combat-tested tactics and techniques for offensive, defensive, and enabling operations.","rect":[108.0,163.914306640625,539.9562940597534,154.80612182617188]},{"page":13,"text":"For each type of operation FM 3-90 discusses the organization of forces; minimum essential control","rect":[107.97997283935547,175.377197265625,540.0112070999146,166.26901245117188]},{"page":13,"text":"measures; and general planning, preparation, and execution considerations. ","rect":[107.99000549316406,186.90020751953126,410.92470836639407,177.79202270507813]},{"page":13,"text":"To understand the doctrine contained in FM 3-90, readers must first understand the doctrinal topics described","rect":[108.00003814697266,204.40513610839845,539.9914455413818,195.31698608398438]},{"page":13,"text":"in ADP 3-90 since FM 3-90 expands and builds on the topics established in ADP 3-90. FM 3-90’s","rect":[108.01005554199219,215.86802673339845,540.0654437522888,206.77987670898438]},{"page":13,"text":"foundational chapters are chapters 1, 2, 3, and 8. Readers must comprehend the material within these chapters","rect":[108.01005554199219,227.3910369873047,540.0935809593201,218.30288696289063]},{"page":13,"text":"to gain a full understanding of the remaining chapters within FM 3-90. Readers must also be familiar with","rect":[108.01005554199219,238.93408203125,539.9662990570068,229.82589721679688]},{"page":13,"text":"ADP 5-0 and FM 5-0 as it applies the intellectual framework that leaders use to plan, prepare, execute, and","rect":[108.01005554199219,250.3768768310547,539.9293117523193,241.28872680664063]},{"page":13,"text":"assess military operations.","rect":[107.99000549316406,261.919921875,213.28016185760499,252.81173706054688]},{"page":13,"text":"FM 3-90 is applicable to all members of the profession of arms. The principal audience are practitioners of","rect":[108.0000228881836,279.3647155761719,539.9622705039978,270.2765808105469]},{"page":13,"text":"military tactics, students of the various professional development courses, and doctrine writers at the U.S.","rect":[107.99002075195313,290.90777587890627,540.0053052902222,281.7995910644531]},{"page":13,"text":"Army’s Centers of Excellence. Trainers and educators throughout the Army will also use this publication.","rect":[107.98001098632813,302.4307861328125,531.2628736495972,293.3226013183594]},{"page":13,"text":"The considerations for offensive, defensive, and enabling operations in this publication apply to all echelons,","rect":[107.9699935913086,319.8956298828125,539.8961133956909,310.7874450683594]},{"page":13,"text":"even though numerous figures in this publication use divisions and brigade combat teams to illustrate points","rect":[107.9699935913086,331.41864013671877,539.9740130882263,322.3104553222656]},{"page":13,"text":"in the text. Echelon-specific field manuals and Army techniques publications address the specifics of how","rect":[107.98001098632813,342.941650390625,539.9803509750366,333.8334655761719]},{"page":13,"text":"each tactical echelon uses these tactical concepts.","rect":[107.98001098632813,354.38446044921877,305.41314220428469,345.29632568359377]},{"page":13,"text":"Commanders, staffs, and subordinates ensure their decisions and actions comply with applicable United","rect":[107.9699935913086,371.92950439453127,539.9243068695068,362.8213195800781]},{"page":13,"text":"States, international, and in some cases, host-nation laws and regulations. Commanders at all levels ensure","rect":[107.9699935913086,383.4525146484375,539.9480867462158,374.3443298339844]},{"page":13,"text":"their Soldiers operate in accordance with the law of armed conflict and applicable rules of engagement. (See","rect":[107.9699935913086,394.9153747558594,539.9743928985596,385.80718994140627]},{"page":13,"text":"FM 6-27/MCTP 11-10C for more information on the law of war.)","rect":[107.97003173828125,406.4183044433594,370.9349267539978,397.3301696777344]},{"page":13,"text":"FM 3-90 uses joint terms where applicable. Selected joint and Army terms and definitions are in both the","rect":[107.97003173828125,423.9633483886719,539.8658113555908,414.84515380859377]},{"page":13,"text":"glossary and the text. Terms for which FM 3-90 is the proponent publication (the authority) are marked with","rect":[107.96001434326172,435.42620849609377,539.9984645843506,426.3180236816406]},{"page":13,"text":"an asterisk (*) in the glossary. When first defined in the text, terms for which FM 3-90 is the proponent","rect":[107.96003723144531,446.94921875,539.9111704788209,437.8410339355469]},{"page":13,"text":"publication are boldfaced and italicized, and definitions are boldfaced. When first defining other proponent","rect":[107.95000457763672,458.47222900390627,539.9002451858521,449.3640441894531]},{"page":13,"text":"definitions in the text, the term is italicized, and the number of the proponent publication follows the","rect":[107.94002532958985,469.9150390625,540.0025301055908,460.826904296875]},{"page":13,"text":"definition. Following uses of the term are not italicized. The introduction for FM 3-90 indicates heavily","rect":[107.94002532958985,481.45806884765627,539.9653835296631,472.3498840332031]},{"page":13,"text":"revised content within each chapter and appendix. ","rect":[107.93998718261719,492.9610595703125,310.6626844406128,483.8729248046875]},{"page":13,"text":"FM 3-90 applies to the Active Army, the Army National Guard/Army National Guard of the United States,","rect":[107.93998718261719,510.4459533691406,539.9243116378784,501.3377685546875]},{"page":13,"text":"and the U.S. Army Reserve unless otherwise stated.","rect":[107.93998718261719,521.968994140625,315.15960216522219,512.86083984375]},{"page":13,"text":"The United States Army Combined Arms Center is the proponent for this publication. The preparing agency","rect":[107.93998718261719,539.433837890625,539.9740505218506,530.32568359375]},{"page":13,"text":"is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send written","rect":[107.93998718261719,550.9568481445313,539.8360500335693,541.8486938476563]},{"page":13,"text":"comments and recommendations on a DA Form 2028 (Recommended Changes to Publications and Blank","rect":[107.93998718261719,562.4798583984375,540.0034456329346,553.3717041015625]},{"page":13,"text":"Forms) to Commander, U.S. Army Combined Arms Center and Fort Leavenworth, ATZL-MCD (FM 3-90),","rect":[107.93998718261719,573.9427490234375,539.9222364425659,564.8345947265625]},{"page":13,"text":"300 ","rect":[107.93994903564453,583.4217529296875,125.50500774383545,576.5380249023438]},{"page":13,"text":"McPherson ","rect":[140.58010864257813,583.4417724609375,188.6820936203003,576.357666015625]},{"page":13,"text":"Avenue, ","rect":[203.75718688964845,583.4417724609375,239.92141246795655,576.5279541015625]},{"page":13,"text":"Fort ","rect":[255.05661010742188,583.4417724609375,274.18178844451907,576.6782836914063]},{"page":13,"text":"Leavenworth, ","rect":[289.3160095214844,583.4417724609375,347.1404676437378,576.357666015625]},{"page":13,"text":"KS ","rect":[362.215576171875,583.4517822265625,377.50408458709719,576.5279541015625]},{"page":13,"text":"66027-2337; ","rect":[392.6393127441406,584.974853515625,446.2552442550659,576.5380249023438]},{"page":13,"text":"by ","rect":[461.39044189453127,585.4658203125,473.91546154022219,576.357666015625]},{"page":13,"text":"e-mail ","rect":[489.0496826171875,584.0,517.0615797042847,576.357666015625]},{"page":13,"text":"to","rect":[532.19580078125,583.4417724609375,539.9662990570068,577.359619140625]},{"page":13,"text":"usarmy.leavenworth.mccoe.mbx.cadd-org-mailbox@army.mil; or submit an electronic DA Form 2028.","rect":[107.93994903564453,596.98876953125,521.3261060714722,587.7703857421875]},{"page":13,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":13,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":13,"text":"xi","rect":[514.4970092773438,754.0800170898438,521.9759990234375,747.635986328125]},{"page":14,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":15,"text":"Introduction","rect":[268.3199768066406,131.1562042236328,361.66691290664678,119.50965881347656]},{"page":15,"text":"Tactics are the employment, ordered arrangement, and directed actions of forces in relation to each other.","rect":[108.0,163.914306640625,539.9966382980347,154.80612182617188]},{"page":15,"text":"Leaders select tactics that accomplish their assigned mission. Successful tactics require generating and","rect":[108.00000762939453,175.377197265625,540.0527248382568,166.26901245117188]},{"page":15,"text":"applying combat power. This publication introduces the basic concepts and control measures associated with","rect":[108.00000762939453,186.90020751953126,540.0283107757568,177.79202270507813]},{"page":15,"text":"the science of tactics and provides a common baseline for Soldiers and leaders to execute offensive,","rect":[108.0,198.40318298339845,540.0341749191284,189.31503295898438]},{"page":15,"text":"defensive, and enabling operations. Soldiers and leaders who know these basic tactics are better prepared to","rect":[108.0,209.88604736328126,539.9120998382568,200.77786254882813]},{"page":15,"text":"adapt them quickly based on the mission variables of mission, enemy, terrain and weather, troops and support","rect":[108.0,221.4090576171875,540.0956187210084,212.30087280273438]},{"page":15,"text":"available—time available, civil considerations, and informational considerations [METT-TC(I)].","rect":[108.0,232.9120330810547,495.03948497772219,223.82388305664063]},{"page":15,"text":"Tactics require judgement in application. The tactics discussed in this publication focus on the Army’s","rect":[108.00997924804688,250.39691162109376,539.9920794944763,241.27871704101563]},{"page":15,"text":"strategic role of prevailing during large-scale combat operations. Their application must be tempered by the","rect":[108.00997924804688,261.919921875,539.9571809844971,252.81173706054688]},{"page":15,"text":"obligation to protect the civilian population. The ability to seize and secure terrain, with its population and","rect":[108.00995635986328,273.3828125,539.9681911468506,264.2746276855469]},{"page":15,"text":"productive capacity, distinguishes land forces conducting offensive, defensive, or enabling operations. FM","rect":[108.00997924804688,284.90582275390627,539.9479415397644,275.7976379394531]},{"page":15,"text":"3-90 provides a common framework for leaders from squad through corps echelon to conduct tactical","rect":[108.00997924804688,296.4288024902344,539.9646372756959,287.32061767578127]},{"page":15,"text":"operations in which leaders seek to find the enemy, fix the enemy, finish the enemy, and follow-through to","rect":[108.01000213623047,307.8916931152344,539.9702663421631,298.78350830078127]},{"page":15,"text":"achieve their objectives. This manual is not prescriptive, but it is authoritative.","rect":[108.01001739501953,319.4146728515625,421.9266004562378,310.2964782714844]},{"page":15,"text":"FM 3-90 (Tactics) merges the 2013 versions of FM 3-90-1 (Offense and Defense Volume 1) and FM 3-90-2","rect":[108.02005004882813,336.9396667480469,539.9721584320068,327.83148193359377]},{"page":15,"text":"(Reconnaissance, Security, and Tactical Enabling Tasks Volume 2) into a single comprehensive volume on","rect":[108.0,348.40252685546877,539.9953517913818,339.2943420410156]},{"page":15,"text":"offensive, defensive, and enabling operations. A highlight of changes includes:","rect":[107.98994445800781,359.925537109375,424.09409284210207,350.8173522949219]},{"page":15,"text":" Created and became the proponent for the \"tactical framework\" - which is find, fix, finish, and","rect":[133.1999969482422,373.354248046875,540.0013332366943,364.26611328125]},{"page":15,"text":"follow through. This framework is how all offensive and defensive operations are described.","rect":[151.1999969482422,384.8973083496094,521.0823316574097,375.78912353515627]},{"page":15,"text":" Changed actions on contact from a 5-step process to a new 4-step process – “react”, “develop the","rect":[133.1999969482422,398.394287109375,540.0762605743408,389.2861022949219]},{"page":15,"text":"situation”, “choose an action”, and “execute and report”.","rect":[151.2100067138672,409.8371276855469,377.8023328781128,400.7489929199219]},{"page":15,"text":" Removed defeat as a tactical mission task.","rect":[133.1999969482422,421.33026123046877,320.31646251678469,414.2461242675781]},{"page":15,"text":" Removed ambush as a tactical mission task, which was a mistake in the 2019 version of","rect":[133.1999969482422,435.0,540.0391748008728,427.7461242675781]},{"page":15,"text":"ADP 3-90.","rect":[151.1999969482422,446.353271484375,194.5665693283081,439.4394836425781]},{"page":15,"text":" Changed the form of maneuver of “frontal assault” back to “frontal attack.”","rect":[133.1999969482422,461.8742980957031,453.25289631652836,452.76611328125]},{"page":15,"text":" Added mobility, countermobility, link-up, and tactical deception as types of enabling operations.","rect":[133.1999969482422,475.3742980957031,538.0041456222534,466.26611328125]},{"page":15,"text":" Made feint and demonstration as variations of tactical deception, instead of variations of an attack.","rect":[133.1999969482422,488.854248046875,540.0411329269409,479.76611328125]},{"page":15,"text":" Described what are forms of contact and added influence as a form of contact.","rect":[133.1999969482422,500.3502502441406,463.7839307785034,493.26611328125]},{"page":15,"text":" Removed forms of defense and made them variations of an area defense.","rect":[133.1999969482422,513.8502197265625,442.23406505584719,506.7660827636719]},{"page":15,"text":" Changed the variations of troop movement from administrative movement, approach march, and","rect":[133.1999969482422,529.374267578125,539.9266262054443,520.26611328125]},{"page":15,"text":"tactical road march to tactical and nontactical movements.","rect":[151.1999969482422,538.8131103515625,383.9124708175659,531.72900390625]},{"page":15,"text":"","rect":[133.1999969482422,551.6054077148438,139.16105696249009,546.9132080078125]},{"page":15,"text":"","rect":[133.1999969482422,588.1453857421875,139.16105696249009,583.4531860351563]},{"page":15,"text":"","rect":[133.1999969482422,613.1054077148438,139.16105696249009,608.4132080078125]},{"page":15,"text":"","rect":[133.1999969482422,626.6054077148438,139.16105696249009,621.9132080078125]},{"page":15,"text":"","rect":[133.1999969482422,640.1054077148438,139.16105696249009,635.4132080078125]},{"page":15,"text":"Removed encirclement as an enabling operation. It is still a desired outcome, and there is special","rect":[151.1999969482422,554.3342895507813,540.0210947952271,545.2261352539063]},{"page":15,"text":"planning required to create, maintain, reduce, and when encircled, break out of an encirclement,","rect":[151.1999969482422,565.8572998046875,539.9883375167847,556.7491455078125]},{"page":15,"text":"so that information was moved to an appendix.","rect":[151.1999969482422,577.3602905273438,338.9879102706909,568.2721557617188]},{"page":15,"text":"Removed the tactical mission tasks categories of \"actions by friendly forces\" and \"effects on","rect":[151.1999969482422,590.874267578125,539.9332180023193,581.76611328125]},{"page":15,"text":"enemy forces.\"","rect":[151.1999969482422,602.337158203125,211.44425454711914,593.239013671875]},{"page":15,"text":"Modified, removed, or added over 140 definitions to make it easier to read and understand.","rect":[151.1999969482422,614.0,515.3888502120972,606.7261352539063]},{"page":15,"text":"Added graphics for all offensive and defensive operations.","rect":[151.1999969482422,629.3342895507813,385.1209669113159,620.2261352539063]},{"page":15,"text":"Made numerous other changes to enhance readability and understanding.","rect":[151.1999969482422,642.8342895507813,443.14385509490969,633.7261352539063]},{"page":15,"text":"FM 3-90 is divided into four parts, consisting of twenty chapters and three appendices. Part One (chapters 1-","rect":[108.00376892089844,660.3592529296875,539.9960839805603,651.2510986328125]},{"page":15,"text":"2) focuses on the overall concept of tactics and maneuver. Part Two (chapters 3-7) focuses on offensive","rect":[108.02383422851563,671.8622436523438,540.0842561798096,662.7741088867188]},{"page":15,"text":"operations. Part Three (chapters 8-11) focuses on defensive operations. Part Four (chapters 12-20) focuses","rect":[108.02384948730469,683.3251342773438,540.0171649436951,674.2369995117188]},{"page":15,"text":"on enabling operations. Appendix A describes tactical control measures. Appendix B describes tactical","rect":[108.02383422851563,694.8681640625,539.9640269241334,685.760009765625]},{"page":15,"text":"mission tasks. Appendix C describes encirclements.","rect":[108.02383422851563,706.3711547851563,315.5511426925659,697.2830200195313]},{"page":15,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":15,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":15,"text":"xiii","rect":[509.5110168457031,754.0800170898438,522.0327006835937,747.635986328125]},{"page":16,"text":"Introduction","rect":[72.0,44.55902099609375,124.53839819335937,38.016021728515628]},{"page":16,"text":"Chapter 1 (Army Tactics) introduces the role of Army tactics and discusses how the tactical taxonomy nests","rect":[90.0,83.51434326171875,521.9633319358826,74.40616607666016]},{"page":16,"text":"within multidomain operations. It also discusses the types and general planning considerations for offensive,","rect":[90.01001739501953,94.97723388671875,521.9933423995972,85.86905670166016]},{"page":16,"text":"defensive, and enabling operations. The major updates to this chapter include introducing the tactical","rect":[90.01001739501953,106.500244140625,521.9923472366334,97.3920669555664]},{"page":16,"text":"framework, updating taxonomy, a revision and expansion on the forms of contact, revision of assigned","rect":[90.01001739501953,118.023193359375,522.0164327545166,109.07533264160156]},{"page":16,"text":"areas, and revision of actions on contact.","rect":[90.02003479003906,128.0,262.8059034347534,120.53822326660156]},{"page":16,"text":"Chapter 2 (Movement and Forms of Maneuver) introduces and describes movement formations,","rect":[90.02002716064453,146.9810028076172,522.0123853683472,137.89285278320313]},{"page":16,"text":"movement techniques, and the five forms of maneuver. The major updates in this chapter include revising","rect":[90.03005981445313,158.5240478515625,522.0794582366943,149.41586303710938]},{"page":16,"text":"the forms of maneuver definitions and identifying the forms of maneuver as applicable to offensive","rect":[90.03005981445313,169.9869384765625,521.9752473907471,161.03907775878907]},{"page":16,"text":"and defensive operations.","rect":[90.03004455566406,181.4899139404297,198.1408338546753,172.5620880126953]},{"page":16,"text":"Chapter 3 (The Offense) introduces and describes the fundamentals of offensive operations, common","rect":[90.03004455566406,199.01487731933595,522.0584011077881,189.92672729492188]},{"page":16,"text":"offensive planning considerations, and transitions from offensive operations to defensive or stability","rect":[90.03004455566406,210.497802734375,522.0014553070068,201.38961791992188]},{"page":16,"text":"operations. There are no major updates to this chapter. ","rect":[90.03004455566406,222.02081298828126,325.2796277999878,212.91262817382813]},{"page":16,"text":"Chapter 4 (Movement to Contact) introduces and describes general considerations, organization of forces,","rect":[90.04005432128906,239.48565673828126,522.0834913253784,230.37747192382813]},{"page":16,"text":"common control measures, conduct of the two variations of a movement to contact, and transitions. The","rect":[90.04009246826172,249.0,522.0514192657471,241.90048217773438]},{"page":16,"text":"major update in this chapter is the expansion of the cordon and search section.","rect":[90.04005432128906,262.53167724609377,425.13787364959719,253.5838165283203]},{"page":16,"text":"Chapter 5 (Attack) introduces and describes general considerations,organization of forces, common control","rect":[90.04005432128906,279.99652099609377,522.1275401077271,270.8883361816406]},{"page":16,"text":"measures, and conduct of the four variations of an attack. The major update in this chapter is moving","rect":[90.04005432128906,291.51953125,522.0714015960693,282.4113464355469]},{"page":16,"text":"demonstration and feint from the variations of an attack to chapter 19 (Tactical Deception). ","rect":[90.03004455566406,303.0224609375,483.0245008468628,294.09466552734377]},{"page":16,"text":"Chapter 6 (Exploitation) introduces general considerations, organization of forces, common control","rect":[90.04005432128906,320.50738525390627,522.0713877639771,311.3992004394531]},{"page":16,"text":"measures, and the conduct of an exploitation. The major update in this chapter removes local and major","rect":[90.0500717163086,332.0303955078125,522.0564241485596,322.9222106933594]},{"page":16,"text":"exploitations.","rect":[90.0500717163086,343.5333251953125,147.03481578826905,334.60552978515627]},{"page":16,"text":"Chapter 7 (Pursuit) introduces and describes general considerations, organization of forces for the two","rect":[90.0500717163086,361.0182189941406,522.0424098968506,351.9100341796875]},{"page":16,"text":"variations of a pursuit, common control measures, and the conduct of a pursuit. There are no major updates","rect":[90.04004669189453,372.5412292480469,522.1264789085388,363.43304443359377]},{"page":16,"text":"in this chapter. ","rect":[90.06006622314453,384.044189453125,156.76421642303468,375.11639404296877]},{"page":16,"text":"Chapter 8 (The Defense) introduces and describes the fundamentals of the defense, common defensive","rect":[90.06006622314453,401.509033203125,522.1096468048096,392.4208984375]},{"page":16,"text":"planning considerations, common defensive control measures, and transitions. The major update in this","rect":[90.05004119873047,413.0520935058594,522.0203998069763,403.94390869140627]},{"page":16,"text":"chapter is the removal of the forms of the defense. ","rect":[90.05004119873047,424.5550537109375,305.2415723800659,415.62725830078127]},{"page":16,"text":"Chapter 9 (Area Defense) introduces and describes the general considerations, organization of forces,","rect":[90.05005645751953,442.0399475097656,522.0244092941284,432.9317626953125]},{"page":16,"text":"common control measures, and the conduct of the three variations of an area defense. The major update in","rect":[90.05005645751953,453.56298828125,522.1123800201416,444.4548034667969]},{"page":16,"text":"this chapter is changing defense of a linear obstacle, perimeter defense, and reverse slope defense from","rect":[90.07006072998047,465.08599853515627,522.0795705375672,456.1381530761719]},{"page":16,"text":"forms of the defense to variations of an area defense. ","rect":[90.07006072998047,475.0,316.4318799972534,467.6010437011719]},{"page":16,"text":"Chapter 10 (Mobile Defense) introduces and describes the general considerations, organization of forces,","rect":[90.07006072998047,494.0638427734375,522.0904493331909,484.9556579589844]},{"page":16,"text":"common control measures, and the conduct of a mobile defense. No major updates in this chapter.","rect":[90.06005096435547,505.5267333984375,493.30593395233157,496.4185485839844]},{"page":16,"text":"Chapter 11 (Retrograde) introduces and describes the general considerations and conduct of the three","rect":[90.04999542236328,523.0517578125,522.0493440704346,513.943603515625]},{"page":16,"text":"variations of a retrograde. The major update in this chapter is changing the retrograde tasks to","rect":[90.05003356933594,534.57470703125,522.0252590179443,525.466552734375]},{"page":16,"text":"variations of the retrograde. ","rect":[90.05003356933594,546.03759765625,213.09563732147218,537.0897216796875]},{"page":16,"text":"Chapter 12 (Reconnaissance) introduces and describes the general reconnaissance considerations,","rect":[90.06005096435547,563.5526123046875,522.0523633956909,554.4444580078125]},{"page":16,"text":"fundamentals, methods, and forms of reconnaissance. The major updates in this chapter are updating the","rect":[90.07009887695313,575.0756225585938,522.0995149688721,565.9674682617188]},{"page":16,"text":"commander’s reconnaissance guidance, tasks within the forms of reconnaissance, and reconnaissance","rect":[90.07009887695313,586.5385131835938,522.1385774688721,577.5906372070313]},{"page":16,"text":"fundamentals. ","rect":[90.07009887695313,596.0374755859375,153.4165449142456,589.1236572265625]},{"page":16,"text":"Chapter 13 (Security Operations) introduces and describes the general security considerations and conduct","rect":[90.07010650634766,615.5764770507813,522.1545786819459,606.4683227539063]},{"page":16,"text":"of the types of security operations. The major updates in this chapter are added commander’s security","rect":[90.07009887695313,627.0393676757813,522.0423488616943,617.9312133789063]},{"page":16,"text":"guidance, updated tasks within types of security operations, and updated security fundamentals.","rect":[90.08011627197266,638.5624389648438,500.1767530441284,629.6145629882813]},{"page":16,"text":"Chapter 14 (Troop Movement) introduces and describes troop movement general considerations, types and","rect":[90.080078125,656.08740234375,522.0012111663818,646.979248046875]},{"page":16,"text":"methods of troop movement, and conduct of troop movements. The major updates in the chapter are","rect":[90.09009552001953,667.55029296875,522.1415071563721,658.442138671875]},{"page":16,"text":"modifying the troop movement definitions and taxonomy. ","rect":[90.080078125,679.0733032226563,337.8045606613159,670.1254272460938]},{"page":16,"text":"Chapter 15 (Relief in Place) introduces and describes the general considerations, organization of forces,","rect":[90.08009338378906,696.5982666015625,522.1134595870972,687.4901123046875]},{"page":16,"text":"control measures, and the conduct of relief in place. There are no major updates in this chapter.","rect":[90.08011627197266,708.0611572265625,485.87713146209719,698.9530029296875]},{"page":16,"text":"xiv","rect":[72.1199951171875,754.0800170898438,84.62099676513673,747.635986328125]},{"page":16,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":16,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":17,"text":"Introduction","rect":[487.5,44.55902099609375,540.0384287109375,38.016021728515628]},{"page":17,"text":"Chapter 16 (Passage of Lines) introduces and describes the general considerations, organization of forces,","rect":[108.0,83.51434326171875,540.0363721847534,74.40616607666016]},{"page":17,"text":"control measures, and the conduct of the variations of a passage of lines No major updates in this chapter.","rect":[107.98994445800781,94.97723388671875,539.9822340011597,85.86905670166016]},{"page":17,"text":"Chapter 17 (Countermobility) introduces and describes the general considerations for countermobility,","rect":[108.0,112.4921875,539.9221754074097,103.3840103149414]},{"page":17,"text":"terrain reinforcement, obstacle intent, obstacle employment principles, and obstacle emplacement. This is a","rect":[107.99996185302735,124.01519775390625,539.9050197601318,114.90702056884766]},{"page":17,"text":"new chapter and makes countermobility an enabling operation. ","rect":[107.99996185302735,135.47808837890626,380.5039014816284,126.53022766113281]},{"page":17,"text":"Chapter 18 (Mobility) introduces and describes the general considerations of and the types of mobility tasks.","rect":[107.99996185302735,152.9930419921875,539.9841871261597,143.88485717773438]},{"page":17,"text":"This is a new chapter and makes mobility an enabling operation. ","rect":[107.98994445800781,164.5159912109375,385.83452892303469,155.56813049316407]},{"page":17,"text":"Chapter 19 (Tactical Deception) introduces and describes tactical deception principles, types, means, and","rect":[107.98994445800781,181.98089599609376,540.0402736663818,172.87271118164063]},{"page":17,"text":"variations. This is a new chapter and makes tactical deception an enabling operation and moves feint","rect":[107.97993469238281,193.50390625,539.9249780235291,184.39572143554688]},{"page":17,"text":"and demonstration from an offensive operation to a variation of tactical deception. ","rect":[107.97993469238281,205.00682067871095,462.14687633514407,196.07899475097657]},{"page":17,"text":"Chapter 20 (Linkup) introduces and describes the general considerations and conduct of link up operations.","rect":[107.97993469238281,222.49176025390626,539.9722242355347,213.38357543945313]},{"page":17,"text":"This is a new chapter and makes linkup an enabling operation. ","rect":[107.97997283935547,234.0147705078125,378.0409803390503,225.06690979003907]},{"page":17,"text":"Appendix A (Tactical Control Measures) introduces and describes the general considerations for common","rect":[107.97997283935547,251.4796142578125,539.9483547210693,242.37142944335938]},{"page":17,"text":"control measures. The major updates to this appendix include organizing control measures by","rect":[107.97997283935547,263.0025634765625,540.0854396820068,253.89437866210938]},{"page":17,"text":"movement and maneuver control measures, fire support coordination measures, and airspace","rect":[107.97997283935547,274.5055236816406,539.9963655548096,265.5777282714844]},{"page":17,"text":"coordinating measures.","rect":[107.97997283935547,285.98846435546877,207.43850231170655,277.0406188964844]},{"page":17,"text":"Appendix B (Tactical Mission Tasks) introduces, describes, and provides graphical depictions of the","rect":[107.97998809814453,303.513427734375,539.9963045196533,294.4052429199219]},{"page":17,"text":"tactical mission tasks. The major updates in this appendix are removing ambush and defeat as tactical","rect":[107.99002075195313,315.03643798828127,540.0123667678834,305.9282531738281]},{"page":17,"text":"mission tasks, alphabetizing the tactical missions, and removing actions by friendly forces and effects","rect":[107.99002075195313,326.49932861328127,540.0463397483826,317.5514831542969]},{"page":17,"text":"on enemy forces.","rect":[107.98001098632813,338.0223083496094,179.3575086593628,329.08447265625]},{"page":17,"text":"Appendix C (Encirclements) introduces and describes encirclements and describes types of encirclement.","rect":[107.98001098632813,355.5372619628906,539.9942579269409,346.4290771484375]},{"page":17,"text":"The major update to this appendix is modifying the executing an encirclement discussion to include","rect":[107.9699935913086,367.0001220703125,539.9343538360596,358.0522766113281]},{"page":17,"text":"two methods.","rect":[107.9699935913086,376.49908447265627,164.64911937713624,369.735595703125]},{"page":17,"text":"This publication is the proponent for select terms. See introductory table-1 for removed terms. See","rect":[107.9699935913086,396.0481262207031,540.0364046173096,386.93994140625]},{"page":17,"text":"introductory table-2 for terms with modified definitions. See introductory table-3 on page xviii for terms with","rect":[107.9699935913086,407.5110168457031,539.9392604827881,398.40283203125]},{"page":17,"text":"a new proponent. See introductory table-4 on page xix for new terms.","rect":[107.9599838256836,419.0340270996094,385.9728956222534,409.92584228515627]},{"page":17,"text":"Introductory table-1. Removed terms","rect":[227.718994140625,436.54901123046877,402.18824671936036,427.2504577636719]},{"page":17,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":17,"text":"Introductory table-2. Modified terms and definitions","rect":[192.72000122070313,633.1741943359375,437.20802210998536,623.7854614257813]},{"page":17,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":17,"text":"xv","rect":[511.97698974609377,754.0800170898438,521.9579794921875,749.4089965820313]},{"page":18,"text":"Introduction","rect":[72.0,44.55902099609375,124.53839819335937,38.016021728515628]},{"page":18,"text":"xvi","rect":[72.1199951171875,754.0800170898438,84.63899340820312,747.635986328125]},{"page":18,"text":"Introductory table-2. Modified terms and","rect":[145.9199981689453,89.51416015625,337.08056378555298,80.12541961669922]},{"page":18,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":18,"text":"definitions (continued)","rect":[339.8370666503906,89.51416015625,447.63725829696656,80.12541961669922]},{"page":18,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":19,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":19,"text":"Introductory table-2. Modified terms and","rect":[163.85740661621095,101.029296875,355.0179722328186,91.64055633544922]},{"page":19,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":19,"text":"definitions (continued)","rect":[357.77447509765627,101.029296875,465.57463622665406,91.64055633544922]},{"page":19,"text":"Introduction","rect":[487.5,44.55902099609375,540.0384287109375,38.016021728515628]},{"page":19,"text":"xvii","rect":[506.9909973144531,754.0800170898438,522.0300151367187,747.635986328125]},{"page":20,"text":"Introduction","rect":[72.0,44.55902099609375,124.53839819335937,38.016021728515628]},{"page":20,"text":"xviii","rect":[72.1199951171875,754.0800170898438,89.68169512939453,747.635986328125]},{"page":20,"text":"Introductory table-2. Modified terms and definitions (continued)","rect":[145.86000061035157,89.51416015625,447.5772607383728,80.12541961669922]},{"page":20,"text":"Introductory table-3. Modified proponent","rect":[200.5800018310547,530.1541748046875,393.40788817977906,520.7654418945313]},{"page":20,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":20,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":21,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":21,"text":"Introductory table-4. New terms","rect":[240.0,83.51416015625,390.0495138092041,74.2155990600586]},{"page":21,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":21,"text":"Introduction","rect":[487.5,44.55902099609375,540.0384287109375,38.016021728515628]},{"page":21,"text":"xix","rect":[509.4570007324219,754.0800170898438,521.957125,747.635986328125]},{"page":22,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":23,"text":"PART ONE","rect":[283.97998046875,127.39201354980469,345.98398046875,118.52400970458985]},{"page":23,"text":"Tactics Overview","rect":[237.36000061035157,156.80918884277345,392.6069475631714,142.75341796875]},{"page":23,"text":"Part One introduces tactics and forms of maneuver. Chapter 1 describes the role of","rect":[108.0,185.11404418945313,521.9712631149292,174.93557739257813]},{"page":23,"text":"tactics, operational and mission variables, and the general considerations for tactics.","rect":[108.00003814697266,197.8947296142578,521.924082939148,187.60647583007813]},{"page":23,"text":"Chapter 2 covers the movement formations, techniques, and the forms of maneuver.","rect":[107.98906707763672,210.43392944335938,518.8277694625855,200.26644897460938]},{"page":23,"text":"Chapter 1","rect":[287.3399963378906,281.23199462890627,342.6731901855469,270.1440124511719]},{"page":23,"text":"Army Tactics","rect":[264.7200012207031,305.7481689453125,365.2278905181885,290.9296875]},{"page":23,"text":"This chapter introduces the role of Army tactics and discusses how the tactics","rect":[126.0,340.40069580078127,503.9546304664612,330.4198913574219]},{"page":23,"text":"taxonomy nests within multidomain operations. This chapter discusses the operational","rect":[125.98900604248047,353.0606384277344,503.98429412078857,343.079833984375]},{"page":23,"text":"environment, the role of tactics, and general tactical considerations by warfighting","rect":[125.9780502319336,365.7205810546875,504.02820777893069,355.7397766113281]},{"page":23,"text":"function that apply to offensive, defensive, and enabling operations.","rect":[125.97807312011719,378.32562255859377,424.85919666290286,368.3448181152344]},{"page":23,"text":"INTRODUCTION TO TACTICS","rect":[90.0,403.6496887207031,291.3929969329834,393.9755554199219]},{"page":23,"text":"1-1. Tactics are the employment, ordered arrangement and directed actions of forces in relation to each","rect":[108.0,423.95428466796877,540.0323390960693,414.8460998535156]},{"page":23,"text":"other (ADP 3-90). Units employ tactics during the conduct of operations. An operation is a sequence of","rect":[108.0,435.477294921875,540.0243432579041,426.3691101074219]},{"page":23,"text":"tactical actions with a common purpose or unifying theme (JP 1, Vol 1). Tacticians use the art and science of","rect":[107.99996185302735,447.0002746582031,539.9691064414978,437.89208984375]},{"page":23,"text":"tactics to maneuver and position formations. Maneuver is movement in conjunction with fires (ADP 3-90).","rect":[107.99993896484375,458.4631652832031,540.0422925949097,449.344970703125]},{"page":23,"text":"The purpose of maneuver is to gain and exploit positions of relative advantage to accomplish the mission.","rect":[107.99996185302735,469.9861755371094,539.9782667160034,460.87799072265627]},{"page":23,"text":"(See ADP 3-90 for more information on the art and science of tactics.)","rect":[107.99996185302735,481.4891052246094,389.84160400009156,472.4009704589844]},{"page":23,"text":"1-2. Successful tactical operations are the result of integrating and synchronizing the warfighting functions","rect":[107.98994445800781,498.9740295410156,540.0493304710388,489.8658447265625]},{"page":23,"text":"in time, space, and purpose. The starting point for planning, preparing, and executing tactical operations is","rect":[107.98994445800781,510.4970397949219,539.8888690452576,501.38885498046877]},{"page":23,"text":"understanding the operational environment.","rect":[107.98994445800781,522.02001953125,282.4532423019409,512.911865234375]},{"page":23,"text":"THE OPERATIONAL ENVIRONMENT","rect":[90.0,547.2757568359375,338.87898098373418,537.6155395507813]},{"page":23,"text":"1-3. Army forces conduct offensive, defensive, and enabling operations within operational environments","rect":[108.0,567.5942993164063,539.9793841819763,558.4861450195313]},{"page":23,"text":"spanning the globe. An operational environment is the aggregate of the conditions, circumstances, and","rect":[108.0,579.0571899414063,540.0234279632568,569.9490356445313]},{"page":23,"text":"influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0).","rect":[108.0000228881836,590.5802001953125,539.9822950363159,581.4720458984375]},{"page":23,"text":"For Army forces, an operational environment consists of five domains (land, air, maritime, space, and","rect":[108.0,602.1031494140625,540.0006008148193,592.9949951171875]},{"page":23,"text":"cyberspace) understood through three dimensions (physical, human, and information).","rect":[108.00000762939453,613.5660400390625,453.2221632003784,604.4578857421875]},{"page":23,"text":"1-4. The purpose of understanding an operational environment is to aid in accounting for the totality of","rect":[108.00000762939453,631.091064453125,539.9551293907166,621.98291015625]},{"page":23,"text":"factors and conditions that impact the conduct of operations. This understanding enables leaders to better","rect":[108.0,642.553955078125,539.9960839805603,633.44580078125]},{"page":23,"text":"identify problems; anticipate potential outcomes; and understand the results of various friendly, enemy,","rect":[108.0,654.076904296875,539.9061231613159,644.96875]},{"page":23,"text":"adversary, and neutral actions and the effects these actions have on achieving the military end state. A","rect":[108.0,665.5999145507813,539.9558758773803,656.4917602539063]},{"page":23,"text":"description of an operational environment includes all the factors that the commander and staff need to","rect":[108.0,677.0427856445313,540.0612697601318,667.9546508789063]},{"page":23,"text":"capture and understand to inform the conduct of operations. (See FM 3-0 for more information on operational","rect":[108.0,688.5657958984375,540.0895152053834,679.4776611328125]},{"page":23,"text":"environments.)","rect":[107.98998260498047,700.0887451171875,168.26628661727907,691.0006103515625]},{"page":23,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":23,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":23,"text":"1-1","rect":[508.97100830078127,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":24,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":24,"text":"OPERATIONAL VARIABLES","rect":[72.0,83.38796997070313,204.22147178649903,75.0959701538086]},{"page":24,"text":"1-5. Army planners use the operational variables to describe an operational environment. Operational","rect":[90.0,103.3143310546875,522.0343394241334,94.2061538696289]},{"page":24,"text":"variables are a comprehensive set of information categories used to describe an operational environment","rect":[90.01001739501953,114.7772216796875,522.0864634475709,105.6690444946289]},{"page":24,"text":"(ADP 1-01). They are the aspects of an operational environment that affect operations, and they differ from","rect":[90.01001739501953,126.30023193359375,522.0602698287964,117.19205474853516]},{"page":24,"text":"one assigned area to another. The eight operational variables are: political, military, economic, social,","rect":[90.010009765625,137.8232421875,521.9251661300659,128.71505737304688]},{"page":24,"text":"information, infrastructure, physical environment, and time (also known as PMESII-PT).","rect":[90.010009765625,149.28607177734376,445.79217052459719,140.17788696289063]},{"page":24,"text":"1-6. When commanders and staff analyze their specific operational environment, they also discern what","rect":[90.00997924804688,166.81109619140626,522.0062022171021,157.70291137695313]},{"page":24,"text":"parts or aspects of each domain and the relevant information aspects and considerations to their operation.","rect":[90.00997161865235,178.31407165527345,521.9981031417847,169.22592163085938]},{"page":24,"text":"They continue to refine and update their analysis even after receiving a mission and throughout the course of","rect":[90.00997161865235,189.79693603515626,521.9418847618103,180.68875122070313]},{"page":24,"text":"the ensuing operation. (See FM 5-0 for more information on the operational variables.)","rect":[90.00997161865235,201.3199462890625,437.7412011680603,192.21176147460938]},{"page":24,"text":"MISSION VARIABLES","rect":[72.0,224.68795776367188,175.06175804138185,216.57595825195313]},{"page":24,"text":"1-7. The mission variables are categories of specific information needed to conduct operations (ADP 1-","rect":[90.0,244.5543212890625,522.0323388633728,235.44613647460938]},{"page":24,"text":"01). The purpose of mission variables is to provide a set of informational categories focused on what leaders","rect":[89.99996185302735,256.07733154296877,522.0660541038513,246.96914672851563]},{"page":24,"text":"need to know to achieve situational understanding once assigned a mission. This ensures Army leaders","rect":[89.99996185302735,267.600341796875,521.9912250022888,258.4921569824219]},{"page":24,"text":"understand the context in which they perform their missions and if necessary, take actions to modify their","rect":[89.99996185302735,279.063232421875,521.9938867149353,269.9550476074219]},{"page":24,"text":"chosen tactic. The seven mission variables are mission, enemy, terrain and weather, troops and support","rect":[89.99996185302735,290.5862121582031,522.0083384475709,281.47802734375]},{"page":24,"text":"available—time available, civil considerations, and informational considerations [METT-TC(I)].","rect":[89.98994445800781,302.0891418457031,477.0224561691284,293.0010070800781]},{"page":24,"text":"1-8. METT-TC (I) represents the mission variables leaders use to analyze and understand a situation in","rect":[89.97993469238281,319.5740661621094,521.9288234710693,310.46588134765627]},{"page":24,"text":"relationship to the unit’s mission. The first six variables are not new. However, the pervasiveness of","rect":[89.9800033569336,331.0770263671875,522.0080468711853,321.9888916015625]},{"page":24,"text":"information and its applicability in different military contexts requires leaders to continuously assess its","rect":[89.9799575805664,342.62005615234377,521.8841083030701,333.5118713378906]},{"page":24,"text":"various aspects during operations. Due to this, “I” has been added to the METT-TC mnemonic. Information","rect":[89.9799575805664,354.08294677734377,521.9423732757568,344.9747619628906]},{"page":24,"text":"considerations are expressed as a parenthetical variable because it is not an independent consideration, but","rect":[89.96990203857422,365.5859069824219,522.0123667678834,356.4977722167969]},{"page":24,"text":"an important component of each variable of METT-TC that leaders must understand when developing","rect":[89.96994018554688,377.12896728515627,521.9923610687256,368.0207824707031]},{"page":24,"text":"understanding of a situation. (See FM 5-0 for additional information on the mission variables.)","rect":[89.96994018554688,388.5918273925781,468.54765868759156,379.483642578125]},{"page":24,"text":"ROLE OF TACTICS","rect":[72.0,413.8497009277344,200.30702891540529,404.1755676269531]},{"page":24,"text":"1-9. Tactical actions always link to operational or strategic objectives; they are never employed in isolation.","rect":[90.0,434.154296875,522.1435499191284,425.0361022949219]},{"page":24,"text":"Tactics serve a distinct purpose and are nested within a larger military campaign. Military operations are","rect":[90.0,445.67730712890627,521.9470491485596,436.5691223144531]},{"page":24,"text":"inherently joint and frequently multinational in nature. Understanding how tactics fit into the larger picture","rect":[90.0,457.2002868652344,522.0154085235596,448.08209228515627]},{"page":24,"text":"is the starting point to planning, preparing, executing, and assessing successful tactical operations.","rect":[90.0,468.6631774902344,482.68365001678469,459.55499267578127]},{"page":24,"text":"JOINT OPERATIONS","rect":[72.0,492.0480041503906,169.37836265563966,483.7560119628906]},{"page":24,"text":"1-10. The joint force conducts joint operations through unified action. Unified action is the synchronization,","rect":[90.0,511.97430419921877,522.0002393722534,502.8561096191406]},{"page":24,"text":"coordination, and/or integration of the activities of governmental and nongovernmental entities with military","rect":[90.01005554199219,523.4371948242188,521.9352321624756,514.3290405273438]},{"page":24,"text":"operations to achieve unity of effort (JP 1, Vol 1). The Army accomplishes its mission by supporting the joint","rect":[90.01005554199219,534.960205078125,522.0503306350709,525.8419799804688]},{"page":24,"text":"force and unified action partners in four strategic roles:","rect":[90.01005554199219,546.483154296875,310.53418683624269,537.375]},{"page":24,"text":" Shape operational environments.","rect":[115.19999694824219,559.9542846679688,264.58428478240969,550.8661499023438]},{"page":24,"text":" Counter aggression on land during crisis.","rect":[115.19999694824219,573.4743041992188,297.67925548553469,564.3661499023438]},{"page":24,"text":" Prevail in large-scale ground combat.","rect":[115.19999694824219,586.9743041992188,282.8787794113159,577.8661499023438]},{"page":24,"text":" Consolidate gains.","rect":[115.19999694824219,600.4743041992188,207.10549449920655,591.3661499023438]},{"page":24,"text":"1-11. These strategic roles are not tasks assigned to subordinate units. The U.S. Army’s primary mission","rect":[90.00376892089844,617.9391479492188,522.0462551116943,608.8309936523438]},{"page":24,"text":"supports the joint force by organizing, training, and equipping its forces to conduct prompt and sustained","rect":[90.00376892089844,629.462158203125,521.9919338226318,620.3439331054688]},{"page":24,"text":"land combat to defeat enemy ground forces and seize, occupy, and defend land areas.","rect":[90.00376892089844,640.9851684570313,430.9555616378784,631.8770141601563]},{"page":24,"text":"MULTIDOMAIN OPERATIONS","rect":[72.0,664.3680419921875,214.30698204040528,656.0759887695313]},{"page":24,"text":"1-12. The Army’s contribution to joint operations is multidomain operations. Multidomain operations are","rect":[90.0,684.2343139648438,522.1264925079346,675.1160888671875]},{"page":24,"text":"the combined arms employment of joint and Army capabilities to create and exploit relative advantages that","rect":[90.0,695.75732421875,521.9704966506959,686.6390991210938]},{"page":24,"text":"achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force commanders (FM 3-","rect":[90.0,707.2802734375,522.0323388633728,698.1620483398438]},{"page":24,"text":"0). Multidomain operations are how Army forces operate as part of the joint force against threats able to","rect":[89.99992370605469,718.7431640625,521.9635524749756,709.6249389648438]},{"page":24,"text":"1-2","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":24,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":24,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":25,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":25,"text":"contest the joint force in all domains. Army forces simultaneously support and are supported by the joint","rect":[108.0,83.51434326171875,540.0460581741334,74.39614868164063]},{"page":25,"text":"force across all domains. This interdependent relationship between the Army and the rest of the joint force","rect":[108.0,94.97723388671875,540.0230989532471,85.85903930664063]},{"page":25,"text":"allows joint force commanders to impose multiple dilemmas on the enemy. This interdependence is also why","rect":[108.0,106.500244140625,540.0661525726318,97.38204956054688]},{"page":25,"text":"all Army operations are multidomain operations. ","rect":[108.0,118.023193359375,305.50420665740969,108.9150161743164]},{"page":25,"text":"1-13. At the tactical level of warfare, Army formations provide unique capabilities to the joint force. These","rect":[108.0,135.48809814453126,540.0572786407471,126.36990356445313]},{"page":25,"text":"capabilities include but are not limited to ground maneuver forces able to seize and hold terrain, surface based","rect":[107.98997497558594,147.0111083984375,540.0601711273193,137.90292358398438]},{"page":25,"text":"indirect fires, air and missile defense, and sustainment. Army tactical formations also use joint force","rect":[107.98997497558594,158.5340576171875,540.0484285430908,149.41586303710938]},{"page":25,"text":"capabilities including fixed- and rotary-wing aviation, unmanned aircraft systems (UAS), satellite","rect":[107.98997497558594,169.9969482421875,539.9570589141846,160.88876342773438]},{"page":25,"text":"communications, and the global positioning system during offensive, defensive, and stability operations.","rect":[107.98998260498047,181.51995849609376,525.8701124191284,172.41177368164063]},{"page":25,"text":"1-14. All Army operations are multidomain operations. This is because every operation requires integrating","rect":[107.98998260498047,199.044921875,539.8969020843506,189.93673706054688]},{"page":25,"text":"capabilities from all domains to succeed. For example, at the lower tactical levels companies and platoons","rect":[107.98998260498047,210.48777770996095,540.0379168968201,201.39962768554688]},{"page":25,"text":"employ capabilities from other domains such as aviation (including UAS), joint fires, satellite","rect":[107.98998260498047,222.03082275390626,540.0094270782471,212.91262817382813]},{"page":25,"text":"communications, and the global positioning system. As part of the joint force, Army forces execute","rect":[107.98998260498047,233.49371337890626,539.9350252227783,224.37551879882813]},{"page":25,"text":"multidomain operations throughout the competition, crisis, and conflict contexts. Army tactical formations","rect":[107.98998260498047,245.0167236328125,540.1035296897888,235.90853881835938]},{"page":25,"text":"typically conduct operations dominated by one context at a time. (See FM 3-0 for more information on Army","rect":[107.98998260498047,256.5396728515625,539.9667873382568,247.43148803710938]},{"page":25,"text":"operations during competition and crisis).","rect":[107.98999786376953,268.0025634765625,274.89419078826907,258.8943786621094]},{"page":25,"text":"1-15. During combat operations tactical-level Army forces execute offensive, defensive, and stability","rect":[107.98998260498047,285.527587890625,539.8840847015381,276.4194030761719]},{"page":25,"text":"operations supported by enabling operations to achieve tactical objectives that support operational and","rect":[107.97994995117188,297.05059814453127,540.0604152679443,287.9324035644531]},{"page":25,"text":"strategic objectives. While a division possesses the capability and capacity to conduct simultaneous","rect":[107.97994995117188,308.5134582519531,539.9231708030701,299.395263671875]},{"page":25,"text":"offensive, defensive, and stability operations, brigade combat teams (BCTs) and below are typically only","rect":[107.97994995117188,320.03643798828127,539.9341945648193,310.9282531738281]},{"page":25,"text":"capable of executing a single type of operation at a given time.","rect":[107.9800033569336,331.5594482421875,359.00307750701907,322.4512634277344]},{"page":25,"text":"1-16. FM 3-90 focuses on the tactics associated with large-scale combat operations at the tactical level with","rect":[107.9799575805664,349.0243225097656,540.0744533538818,339.9161376953125]},{"page":25,"text":"particular emphasis on offensive, defensive, and enabling operations. (See ADP 3-07 for more information","rect":[107.99000549316406,360.54730224609377,539.9391994476318,351.4391174316406]},{"page":25,"text":"on stability operations and ADP 3-28 for more information on defense support to civil authorities).","rect":[107.99002075195313,372.0703125,503.2530469894409,362.9621276855469]},{"page":25,"text":"OFFENSIVE, DEFENSIVE, STABILITY, AND ENABLING OPERATIONS","rect":[90.0,397.3080139160156,414.1783504486084,387.09600830078127]},{"page":25,"text":"1-17. An offensive operation is an operation to defeat or destroy enemy forces and gain control of terrain,","rect":[108.0,415.2543029785156,540.0143995285034,406.1461181640625]},{"page":25,"text":"resources, and population centers (ADP 3-0). Adefensive operation is an operation to defeat an enemy attack,","rect":[108.00000762939453,426.7773132324219,539.9962110519409,417.66912841796877]},{"page":25,"text":"gain time, economize forces, and develop conditions favorable for offensive or stability operations (ADP 3-","rect":[108.0,438.30029296875,540.0323388633728,429.1921081542969]},{"page":25,"text":"0). A stability operation is an operation conducted outside the United States in coordination with other","rect":[107.99996185302735,449.76318359375,540.0209863243103,440.6549987792969]},{"page":25,"text":"instruments of national power to establish or maintain a secure environment and provide essential","rect":[107.99996948242188,461.2661437988281,539.9802012405396,452.1780090332031]},{"page":25,"text":"governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP 3-0). Every","rect":[107.99996948242188,472.74908447265627,540.0228176116943,463.640869140625]},{"page":25,"text":"type of operation has a mission that consists of a task and purpose.","rect":[108.0,484.2720642089844,374.3787794113159,475.16387939453127]},{"page":25,"text":"1-18. An enabling operation is an operation that sets the friendly conditions required for mission","rect":[108.0,501.79705810546877,539.9961690826416,492.8492126464844]},{"page":25,"text":"accomplishment. By themselves, enabling operations do not directly accomplish the commander’s end state","rect":[108.0,513.2599487304688,539.9692049102783,504.1517333984375]},{"page":25,"text":"and are not decisive on their own, but are required to conduct successful offensive, defensive, and stability","rect":[108.01002502441406,524.7828979492188,539.9270534515381,515.6748046875]},{"page":25,"text":"operations. Enabling operations can also be described or listed as key tasks during the execution of a mission.","rect":[108.01000213623047,536.305908203125,539.9594068527222,527.19775390625]},{"page":25,"text":"1-19. Offensive, defensive, and enabling operations arrange friendly forces by purpose. Purpose describes","rect":[108.01001739501953,553.7708129882813,540.1003558616638,544.6626586914063]},{"page":25,"text":"friendly force goals with respect to the enemy force’s ability to achieve its objectives. Objective is a location","rect":[108.01001739501953,565.2938232421875,540.0464992523193,556.1755981445313]},{"page":25,"text":"used to orient operations, phase operations, facilitate changes of direction, and provide for unity of effort","rect":[108.0201416015625,576.8167724609375,540.0405039749146,567.7086181640625]},{"page":25,"text":"(ADP 3-90). Based on the purpose assigned, the commander selects a type of offensive or defensive operation","rect":[108.0201416015625,588.2796630859375,540.0262355804443,579.1715087890625]},{"page":25,"text":"and any enabling operations required. The types of operations have subsets called variations. The variations","rect":[108.0199966430664,599.8026733398438,540.0131366233826,590.6945190429688]},{"page":25,"text":"share similar ways of organizing forces as the parent operation, with differing conditions and outcomes. The","rect":[108.0200424194336,611.32568359375,540.0301790313721,602.217529296875]},{"page":25,"text":"taxonomy provides, if needed, additional categories of methods and forms. Figure 1-1 illustrates the Army’s","rect":[108.0199966430664,622.78857421875,540.1325824241638,613.680419921875]},{"page":25,"text":"tactical taxonomy.","rect":[108.01001739501953,634.3115844726563,181.91454601287843,625.2034301757813]},{"page":25,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":25,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":25,"text":"1-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":26,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":26,"text":"Figure 1-1. Army tactical taxonomy","rect":[213.89999389648438,430.794189453125,380.0887288970947,421.4956359863281]},{"page":26,"text":"Offensive Operations","rect":[72.0,461.3387451171875,171.93116244888305,451.5555725097656]},{"page":26,"text":"1-20. Chapter 3 discusses general considerations for offensive operations. The four types of offensive","rect":[90.0,478.9142761230469,522.0002107696533,469.80609130859377]},{"page":26,"text":"operations are—","rect":[90.00000762939453,490.35711669921877,156.36246871948243,481.26898193359377]},{"page":26,"text":" Movement to contact. (See Chapter 4).","rect":[115.19999694824219,503.854248046875,288.46990489959719,494.76611328125]},{"page":26,"text":" Attack. (See Chapter 5).","rect":[115.19999694824219,517.354248046875,230.20362377166749,508.2660827636719]},{"page":26,"text":" Exploitation. (See Chapter 6).","rect":[115.19999694824219,530.854248046875,252.87888622283936,521.76611328125]},{"page":26,"text":" Pursuit. (See Chapter 7).","rect":[115.19999694824219,544.354248046875,231.87696361541749,535.26611328125]},{"page":26,"text":"Defensive Operations","rect":[72.0,568.978759765625,172.53177890396118,559.195556640625]},{"page":26,"text":"1-21. Chapter 8 discusses general considerations for defensive operations. The three types of defensive","rect":[90.0,586.5543212890625,522.0534944610596,577.4461669921875]},{"page":26,"text":"operations are—","rect":[90.0,597.9971313476563,156.36246871948243,588.9089965820313]},{"page":26,"text":" Area defense. (See Chapter 9).","rect":[115.19999694824219,611.4942626953125,255.88489818572999,602.4061279296875]},{"page":26,"text":" Mobile defense. (See Chapter 10).","rect":[115.19999694824219,624.9942626953125,270.40386486053469,615.9061279296875]},{"page":26,"text":" Retrograde. (See Chapter 11).","rect":[115.19999694824219,638.5142822265625,252.9390058517456,629.4061279296875]},{"page":26,"text":"Enabling Operations","rect":[72.0,663.1407470703125,170.09531650161743,653.3355712890625]},{"page":26,"text":"1-22. Chapters 12-20 discuss enabling operations. The nine types of enabling operations are—","rect":[90.0,680.6942749023438,469.61774826049807,671.5861206054688]},{"page":26,"text":" Reconnaissance. (See Chapter 12).","rect":[115.19999694824219,694.1742553710938,272.31768321990969,685.0861206054688]},{"page":26,"text":" Security operations. (See Chapter 13).","rect":[115.19999694824219,707.6942749023438,285.9518995285034,698.5861206054688]},{"page":26,"text":"1-4","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":26,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":26,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":27,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":27,"text":"","rect":[133.1999969482422,80.78548431396485,139.16105696249009,76.09324645996094]},{"page":27,"text":"","rect":[133.1999969482422,94.28548431396485,139.16105696249009,89.59324645996094]},{"page":27,"text":"","rect":[133.1999969482422,107.78548431396485,139.16105696249009,103.09324645996094]},{"page":27,"text":"","rect":[133.1999969482422,121.28548431396485,139.16105696249009,116.59324645996094]},{"page":27,"text":"","rect":[133.1999969482422,134.78549194335938,139.16105696249009,130.09324645996095]},{"page":27,"text":"","rect":[133.1999969482422,148.28549194335938,139.16105696249009,143.59324645996095]},{"page":27,"text":"","rect":[133.1999969482422,161.78549194335938,139.16105696249009,157.09324645996095]},{"page":27,"text":"Troop movement. (See Chapter 14).","rect":[151.1999969482422,83.49430847167969,295.6583204269409,74.40616607666016]},{"page":27,"text":"Relief in place. (See Chapter 15).","rect":[151.1999969482422,96.99430847167969,284.79665660858157,87.90616607666016]},{"page":27,"text":"Passage of lines. (See Chapter 16).","rect":[151.1999969482422,110.51434326171875,290.3778028488159,101.40616607666016]},{"page":27,"text":"Countermobility. (See Chapter 17).","rect":[151.1999969482422,124.01434326171875,292.60222911834719,114.90616607666016]},{"page":27,"text":"Mobility. (See Chapter 18).","rect":[151.1999969482422,137.51434326171876,261.52019786834719,128.40615844726563]},{"page":27,"text":"Tactical deception. (See Chapter 19).","rect":[151.1999969482422,150.9943084716797,300.0370740890503,141.90615844726563]},{"page":27,"text":"Linkup. (See Chapter 20).","rect":[151.1999969482422,164.4943084716797,255.3979902267456,155.40615844726563]},{"page":27,"text":"GENERAL CONSIDERATIONS FOR TACTICS","rect":[90.0,189.80967712402345,389.07833018493656,180.1215362548828]},{"page":27,"text":"1-23. The tasks assigned to subordinates are as much an aspect of tactics as employment and arrangement.","rect":[108.0,210.11431884765626,539.9614820480347,201.00613403320313]},{"page":27,"text":"Commanders and units use tactics as the basis for their concept of operations, which is derived from","rect":[108.0,221.5571746826172,540.0473303756714,212.46902465820313]},{"page":27,"text":"understanding the mission variables and operational environment. The three subcomponents of tactics are—","rect":[107.98994445800781,233.1002197265625,539.9922294616699,223.99203491210938]},{"page":27,"text":" Employment: the synchronization of warfighting functions. The characteristics of the offense and","rect":[133.1999969482422,246.59429931640626,540.0553493499756,237.48611450195313]},{"page":27,"text":"the defense assist in framing the synchronization of warfighting functions.","rect":[151.1999969482422,258.05718994140627,448.4254102706909,248.94900512695313]},{"page":27,"text":" Arrangement: formations in relation to friendly forces, enemy forces, and the terrain. The type","rect":[133.1999969482422,271.5543212890625,540.0661897735596,262.4461364746094]},{"page":27,"text":"of operations and forms of maneuver provide a baseline for these arrangements.","rect":[151.1999969482422,283.07733154296877,470.5085401535034,273.9691467285156]},{"page":27,"text":" Directed actions: the task and purpose directed by a commander to achieve objectives. The","rect":[133.1999969482422,296.5743103027344,540.0740633087158,287.45611572265627]},{"page":27,"text":"tactical mission tasks generally are used to direct the actions of subordinate forces.","rect":[151.20999145507813,308.0973205566406,481.9101514816284,298.9891357421875]},{"page":27,"text":"1-24. A warfighting function is a group of tasks and systems united by a common purpose that commanders","rect":[108.01377868652344,325.5621643066406,540.1394793968201,316.4539794921875]},{"page":27,"text":"use to accomplish missions and training objectives (ADP 3-0). Synchronizing the six warfighting functions","rect":[108.0238037109375,337.0851745605469,540.0071551780701,327.96697998046877]},{"page":27,"text":"through prior planning and preparation increases a unit’s effectiveness when executing operations. The six","rect":[108.02379608154297,348.6081848144531,539.9748439788818,339.5]},{"page":27,"text":"warfighting functions are—","rect":[108.01380157470703,360.071044921875,219.13560104370118,350.9628601074219]},{"page":27,"text":" Command and control.","rect":[133.1999969482422,371.540283203125,243.16955089569093,364.44610595703127]},{"page":27,"text":" Movement and maneuver.","rect":[133.1999969482422,385.0302429199219,255.88292980194093,377.94610595703127]},{"page":27,"text":" Intelligence.","rect":[133.1999969482422,400.5542907714844,200.9252576828003,391.44610595703127]},{"page":27,"text":" Fires.","rect":[133.1999969482422,412.0302429199219,173.74500560760499,404.94610595703127]},{"page":27,"text":" Sustainment.","rect":[133.1999969482422,425.540283203125,203.2047986984253,418.44610595703127]},{"page":27,"text":" Protection.","rect":[133.1999969482422,439.0302429199219,194.8651533126831,431.94610595703127]},{"page":27,"text":"See ADP 3-0 for detailed discussion on warfighting functions.","rect":[110.51879119873047,455.5732727050781,359.6170606613159,446.465087890625]},{"page":27,"text":"1-25. Each warfighting functions contributes to generating and applying combat power during operations.","rect":[107.9937515258789,473.0982666015625,540.0037794113159,463.9900817871094]},{"page":27,"text":"Combat power is the total means of destructive and/or disruptive force that a military unit/formation can","rect":[107.9937515258789,484.5611267089844,539.9327297210693,475.45294189453127]},{"page":27,"text":"apply against the opponent at a given time (JP 3-0). Synchronizing operations produces complementary and","rect":[107.99375915527344,496.0841369628906,539.9661769866943,486.97589111328127]},{"page":27,"text":"reinforcing effects that result in a powerful blow that overwhelms enemy forces and creates friendly","rect":[107.9937973022461,507.5469970703125,540.0157985687256,498.4388122558594]},{"page":27,"text":"momentum. Army forces deliver that blow through a combination of five dynamics. The dynamics of combat","rect":[107.99375915527344,519.0700073242188,540.0529551467896,509.9618225097656]},{"page":27,"text":"power are—","rect":[107.99375915527344,530.572998046875,157.7330436706543,523.8195190429688]},{"page":27,"text":" Leadership.","rect":[133.1999969482422,544.0542602539063,198.1607313156128,534.9661254882813]},{"page":27,"text":" Firepower.","rect":[133.1999969482422,557.5542602539063,194.85814952850343,548.4661254882813]},{"page":27,"text":" Information.","rect":[133.1999969482422,569.0502319335938,201.51642894744874,561.9661254882813]},{"page":27,"text":" Mobility.","rect":[133.1999969482422,584.5742797851563,188.74492931365968,575.4661254882813]},{"page":27,"text":" Survivability.","rect":[133.1999969482422,598.0742797851563,205.96428966522218,588.9661254882813]},{"page":27,"text":"See FM 3-0 for more information on each dynamic of combat power.","rect":[108.00376892089844,612.5331420898438,385.24724864959719,603.4249877929688]},{"page":27,"text":"1-26. Tactics don’t happen in isolation, and they are influenced by a large variety of considerations. The","rect":[107.9937744140625,630.05810546875,540.0245027618408,620.949951171875]},{"page":27,"text":"remainder of this chapter discusses general tactical considerations broken down by warfighting function and","rect":[107.9937973022461,641.5811767578125,540.0862331390381,632.4730224609375]},{"page":27,"text":"are applicable to all types of operations. These considerations are in addition to those offensive and defensive","rect":[107.99371337890625,653.0440063476563,540.0171785430908,643.9358520507813]},{"page":27,"text":"specific considerations discussed separately in Chapter 3 and Chapter 8.","rect":[107.99371337890625,664.5670166015625,396.2791395187378,655.4588623046875]},{"page":27,"text":"COMMAND AND CONTROL WARFIGHTING FUNCTION","rect":[90.0,687.9480590820313,350.81575107574465,679.656005859375]},{"page":27,"text":"1-27. The command and control warfighting function is the related tasks and a system that enable","rect":[108.0,707.874267578125,540.0653963165283,698.76611328125]},{"page":27,"text":"commanders to synchronize and converge all elements of power (ADP 3-0). The primary purpose of the","rect":[108.0,719.337158203125,539.9953279571533,710.22900390625]},{"page":27,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":27,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":27,"text":"1-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":28,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":28,"text":"command and control warfighting function is to assist commanders in integrating the other warfighting","rect":[90.0,83.51434326171875,522.0129909515381,74.40616607666016]},{"page":28,"text":"functions effectively at each echelon and to apply combat power to achieve objectives and accomplish","rect":[90.0,94.97723388671875,521.9489650726318,85.85903930664063]},{"page":28,"text":"missions. The command and control warfighting function consists of the command and control warfighting","rect":[90.0,106.500244140625,522.0902614593506,97.3920669555664]},{"page":28,"text":"function tasks and the command and control system. (See ADP 3-0 for a detailed description of the command","rect":[90.0,118.023193359375,522.0484523773193,108.9150161743164]},{"page":28,"text":"and control warfighting function.)","rect":[90.0,129.486083984375,226.12074828720095,120.3779067993164]},{"page":28,"text":"1-28. Commanders, assisted by their staffs, integrate numerous processes and activities within the","rect":[90.0,147.00103759765626,521.9599886016846,137.89285278320313]},{"page":28,"text":"headquarters and across the force as they exercise command and control. The commander’s mission and","rect":[90.0,158.5240478515625,521.9890651702881,149.41586303710938]},{"page":28,"text":"intent determine the scheme of maneuver and the allocation of available resources. Commanders issue intent","rect":[90.0,167.97291564941407,521.9637217483521,160.87875366210938]},{"page":28,"text":"linking the purpose of an operation with the conditions that define the desired end state.","rect":[90.0,181.50994873046876,440.7431592941284,172.40170288085938]},{"page":28,"text":"1-29. Units must prepare to execute operations with degraded or minimal communications. Throughout the","rect":[90.0,199.034912109375,522.0702791290283,189.92672729492188]},{"page":28,"text":"operations process, units may operate within range of enemy jamming capabilities. Situations will likely arise","rect":[90.0,210.497802734375,522.0241365509033,201.37960815429688]},{"page":28,"text":"requiring units to reduce their electromagnetic signature. These situations may require units to employ","rect":[90.0,222.02081298828126,522.0092678070068,212.91262817382813]},{"page":28,"text":"emission control procedures to reduce the effectiveness of enemy targeting efforts. Operations during these","rect":[90.0,233.483642578125,522.0724153594971,224.37545776367188]},{"page":28,"text":"periods require clearly understood and rehearsed standard operating procedures at all echelons. Successful","rect":[90.0,245.0067138671875,522.0592417678834,235.89852905273438]},{"page":28,"text":"operations during these periods requires that units have clearly developed emission control plans and exercise","rect":[90.0,256.5296630859375,521.9689607696533,247.42147827148438]},{"page":28,"text":"electromagnetic protection tasks focused on transmitting only mission essential information. (See FM 3-12","rect":[90.0,267.9925537109375,521.9652614593506,258.8843688964844]},{"page":28,"text":"for more information on emission control procedures.)","rect":[90.0,279.4955139160156,307.9870507774353,270.4073791503906]},{"page":28,"text":"Hasty and Deliberate Operations","rect":[72.0,304.1006774902344,226.88273105239868,294.2955627441406]},{"page":28,"text":"1-30. Most military operations lie somewhere along a continuum between a hasty operation and a deliberate","rect":[90.0,321.654296875,522.0048494415283,312.5461120605469]},{"page":28,"text":"operation. A hasty operation is an operation in which a commander directs immediately available forces,","rect":[90.0,333.1171875,521.9914503097534,324.0090026855469]},{"page":28,"text":"using fragmentary orders, to perform tasks with minimal preparation, trading planning and preparation time","rect":[89.98998260498047,344.6401672363281,521.9929475860596,335.531982421875]},{"page":28,"text":"for speed of execution (ADP 3-90). A deliberate operation is an operation in which the tactical situation","rect":[89.98998260498047,356.0830078125,521.9963283538818,346.994873046875]},{"page":28,"text":"allows the development and coordination of detailed plans, including multiple branches and sequels (ADP 3-","rect":[89.97997283935547,367.6260681152344,522.0123803672791,358.51788330078127]},{"page":28,"text":"90).","rect":[89.97997283935547,379.1289978027344,105.86468029022217,370.0408630371094]},{"page":28,"text":"1-31. Generally, hasty operations take advantage of fleeting tactical opportunities that provide their","rect":[89.97997283935547,396.6139221191406,522.0231835899353,387.5057373046875]},{"page":28,"text":"formations a position of advantage over the enemy. In doing so commanders accept the risk of reduced","rect":[89.97997283935547,408.13690185546877,521.9662990570068,399.0287170410156]},{"page":28,"text":"planning, preparation, and coordination. Some situations may require commanders to take more time to plan","rect":[89.97997283935547,419.659912109375,522.0060329437256,410.5517272949219]},{"page":28,"text":"and prepare their formations to ensure detailed integration and synchronization of the combined arms team.","rect":[89.97997283935547,431.122802734375,522.0203809738159,422.0146179199219]},{"page":28,"text":"Any type of operation can be characterized as hasty or deliberate. (See ADP 3-90 for more information on","rect":[89.97994995117188,442.6457824707031,521.9211330413818,433.53759765625]},{"page":28,"text":"hasty and deliberate operations.)","rect":[89.96991729736328,454.1687927246094,219.95934081649782,445.06060791015627]},{"page":28,"text":"Tactical Framework","rect":[72.0,476.48272705078127,168.18041075134279,468.89556884765627]},{"page":28,"text":"1-32. The tactical framework provides leaders with a framework to help visualize operations and to organize","rect":[90.0,496.2543029785156,522.0244417266846,487.1461181640625]},{"page":28,"text":"their force. The framework is applicable to all types of offensive and defensive operations. Figure 1-2 is a","rect":[90.01001739501953,507.7773132324219,521.9532136993408,498.66912841796877]},{"page":28,"text":"graphical depiction of the tactical framework. Inherent to the tactical framework is the concept of combined","rect":[90.01001739501953,519.2401733398438,521.9736232757568,510.1319885253906]},{"page":28,"text":"arms. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater","rect":[90.0,530.76318359375,521.8982446250916,521.655029296875]},{"page":28,"text":"than if each element was used separately or sequentially (ADP 3-0). FM 3-90 uses it to expand the discussion","rect":[89.98997497558594,542.2861938476563,522.0915431976318,533.1780395507813]},{"page":28,"text":"for each type of offensive and defensive operation. The tactical framework consists of—","rect":[89.98998260498047,553.7490844726563,444.1168327331543,544.6409301757813]},{"page":28,"text":" Find the enemy. Intel drives fires and maneuver.","rect":[115.19999694824219,567.2343139648438,327.28838634490969,558.1261596679688]},{"page":28,"text":" Fix the enemy. Prevent repositioning or reinforcement making them easier to destroy.","rect":[115.19999694824219,580.7343139648438,476.21172618865969,571.6261596679688]},{"page":28,"text":" Finish the enemy. Mass available combat power to accomplish the mission.","rect":[115.19999694824219,594.2343139648438,435.40325450897219,585.1261596679688]},{"page":28,"text":" Follow through. Defeat in detail, consolidate, reorganize, and transition.","rect":[115.19999694824219,607.7343139648438,421.7890577316284,598.6261596679688]},{"page":28,"text":"1-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":28,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":28,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":29,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":29,"text":"Figure 1-2. Tactical framework","rect":[243.0,420.7742004394531,386.9864034576416,411.3854675292969]},{"page":29,"text":"Find the Enemy","rect":[89.99459838867188,450.2330017089844,156.72980976867675,441.295166015625]},{"page":29,"text":"1-33. Units find the enemy through aggressive information collection activities that provide commanders","rect":[107.99052429199219,467.75799560546877,539.9575335960388,458.6498107910156]},{"page":29,"text":"with timely, detailed, and accurate intelligence. Once a unit gains contact with the enemy they fight to","rect":[107.99052429199219,479.2208557128906,539.9404811859131,470.1126708984375]},{"page":29,"text":"maintain contact unless directed otherwise by their higher headquarters. Information collection activities","rect":[107.98050689697266,490.7438659667969,539.9787738304138,481.63568115234377]},{"page":29,"text":"contribute to improving situational understanding regarding the enemy and terrain. Units use as many","rect":[107.98048400878906,502.266845703125,539.9426784515381,493.1586608886719]},{"page":29,"text":"capabilities as possible when performing information collection. Finding every enemy formation is likely","rect":[107.97050476074219,513.729736328125,539.9298000335693,504.6215515136719]},{"page":29,"text":"impractical within the time and assets available. Therefore, information collection focuses on reducing those","rect":[107.97048950195313,525.2527465820313,539.9845247344971,516.1445922851563]},{"page":29,"text":"uncertainties within the assigned area that directly impact mission accomplishment.","rect":[107.97048950195313,536.7757568359375,442.27447032928469,527.6676025390625]},{"page":29,"text":"1-34. Units use human and technical means to confirm suspected locations of enemy formations and","rect":[107.97048950195313,554.2406005859375,539.9382228851318,545.1324462890625]},{"page":29,"text":"capabilities. When successful, information collection enables commanders to use combined arms actions to","rect":[107.97050476074219,565.7435913085938,539.9133205413818,556.6554565429688]},{"page":29,"text":"fix and destroy enemy formations and shape the battlefield. If information collection efforts are unsuccessful,","rect":[107.96050262451172,577.28662109375,540.0168409347534,568.178466796875]},{"page":29,"text":"friendly forces conduct a movement to contact to find the enemy. Once the location of the enemy is known,","rect":[107.96046447753906,588.74951171875,539.9504957199097,579.641357421875]},{"page":29,"text":"friendly forces conduct actions on contact and maintain contact with the enemy.","rect":[107.96046447753906,600.2724609375,427.86406993865969,591.164306640625]},{"page":29,"text":"Fix the Enemy","rect":[89.96453857421875,623.7894287109375,151.18073750305175,614.8515625]},{"page":29,"text":"1-35. Fixing the enemy limits their maneuver options and prevents them from repositioning, reinforcing, or","rect":[107.97047424316406,641.2542724609375,539.9444482383728,632.1461181640625]},{"page":29,"text":"reorganizing. Fixing the enemy requires using combined arms and allows friendly forces to mass combat","rect":[107.97047424316406,652.7772827148438,539.9838023147584,643.6691284179688]},{"page":29,"text":"power against a relatively static enemy. Units seek to fix enemy forces with the minimum amount of combat","rect":[107.97048950195313,664.30029296875,540.0035777053834,655.192138671875]},{"page":29,"text":"power since fixing an enemy is typically a supporting effort.","rect":[107.97048950195313,675.76318359375,349.5738477706909,666.655029296875]},{"page":29,"text":"1-36. Units at all echelons use all capabilities at their disposal to gain and maintain contact with the enemy","rect":[107.97048950195313,693.2881469726563,539.9899196624756,684.1799926757813]},{"page":29,"text":"and use combined arms to fix the enemy. Units can also isolate the enemy by severing lines of","rect":[107.96049499511719,704.7509765625,539.9948632774353,695.642822265625]},{"page":29,"text":"communications to fix enemy forces and prevent reinforcement. Nearly every type of offensive or defensive","rect":[107.96054077148438,716.2739868164063,540.0981721954346,707.1658325195313]},{"page":29,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":29,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":29,"text":"1-7","rect":[508.97100830078127,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":30,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":30,"text":"operation incorporates some form of fixing an enemy force. For example, in an area defense friendly forces","rect":[90.0,83.51434326171875,521.9940326194763,74.40616607666016]},{"page":30,"text":"seek to fix enemy forces within engagement areas tied into obstacles to destroy them. In the attack, friendly","rect":[90.0,94.97723388671875,522.0320949554443,85.86905670166016]},{"page":30,"text":"forces fix an enemy while another force finishes the enemy by massing overwhelming combat power.","rect":[90.0,106.500244140625,496.8431348800659,97.3920669555664]},{"page":30,"text":"Finish the Enemy","rect":[71.99408721923828,130.01715087890626,145.92866230773925,121.07931518554688]},{"page":30,"text":"1-37. While the enemy is fixed, friendly forces maintain momentum and mass overwhelming combat power","rect":[89.9900131225586,147.4820556640625,522.0402734336853,138.37387084960938]},{"page":30,"text":"to assault an objective to destroy enemy forces. An assault is a short and violent well-ordered attack","rect":[89.9900131225586,159.0050048828125,521.9201192779541,149.88681030273438]},{"page":30,"text":"against a local objective. Assaults occur at all tactical echelons. They can range from a squad assaulting a","rect":[89.98998260498047,170.52801513671876,521.8791780548096,161.41983032226563]},{"page":30,"text":"single gun emplacement to a brigade assaulting an enemy strong point. An assault ends when enemy forces","rect":[89.98999786376953,181.99090576171876,522.1034686546326,172.88272094726563]},{"page":30,"text":"are destroyed or have capitulated to friendly forces. Finishing the enemy requires aggressive application of","rect":[89.9899673461914,193.513916015625,521.9900415000916,184.40573120117188]},{"page":30,"text":"combat power and small unit battle drills supported by all the forms of contact. The main effort of an","rect":[89.9899673461914,205.03692626953126,522.0544338226318,195.92874145507813]},{"page":30,"text":"operation finishes the enemy.","rect":[89.9899673461914,216.499755859375,207.75902843475343,207.39157104492188]},{"page":30,"text":"Follow Through","rect":[71.99404907226563,240.0167236328125,140.15110682678225,231.07888793945313]},{"page":30,"text":"1-38. Once an enemy is finished, actions by friendly forces are not complete. Small remaining elements of","rect":[89.9899673461914,257.4815673828125,521.9830834922791,248.37338256835938]},{"page":30,"text":"the enemy may require friendly forces to destroy them in detail. If all enemy forces are not neutralized,","rect":[89.9899673461914,269.00457763671877,521.9338941574097,259.8963928222656]},{"page":30,"text":"friendly forces maintain constant pressure to keep them off balance while capitalizing on successful tactical","rect":[89.9899673461914,280.527587890625,521.9963145217896,271.4194030761719]},{"page":30,"text":"actions.","rect":[89.97993469238281,289.9664001464844,120.86458110809326,282.88226318359377]},{"page":30,"text":"1-39. Follow through includes more than destroying remaining enemy forces. It also includes consolidating","rect":[89.97993469238281,309.5054016113281,522.0060329437256,300.397216796875]},{"page":30,"text":"and reorganizing activities and executing transitions. These actions aid in posturing friendly forces for future","rect":[89.97993469238281,321.02838134765627,521.9602327423096,311.9201965332031]},{"page":30,"text":"operations.","rect":[89.97993469238281,332.4712219238281,134.1841688156128,323.3830871582031]},{"page":30,"text":"1-40. Besides just consolidating and reorganizing friendly forces also execute a wide variety of activities","rect":[89.97993469238281,350.0162658691406,521.9423358421326,340.8980712890625]},{"page":30,"text":"such as casualty evacuation, detainee operations, and sustainment operations. To maintain momentum and","rect":[89.97993469238281,361.53924560546877,521.9771022796631,352.4310607910156]},{"page":30,"text":"tempo units account for these activities within their concept of operations. However, extensive consolidation","rect":[89.97993469238281,372.9820861816406,521.9573268890381,363.8939514160156]},{"page":30,"text":"or reorganization activities may result in a unit’s culmination and require a transition.","rect":[89.9800033569336,384.5251770019531,431.7839002609253,375.4169921875]},{"page":30,"text":"1-41. Transitions occur for a variety of reasons and are not just the result of a unit culminating or a temporary","rect":[89.9799575805664,402.0501708984375,522.0213527679443,392.9319763183594]},{"page":30,"text":"setback. They are a deliberate part of progress towards mission accomplishment, such as changing the phase","rect":[89.97997283935547,413.5130615234375,521.9408845977783,404.4048767089844]},{"page":30,"text":"of an operation or shifting from offensive operations to stability operations. Transitions can be difficult,","rect":[89.97997283935547,425.03607177734377,521.9622144699097,415.9278869628906]},{"page":30,"text":"particularly if they are unanticipated. During planning units identify potential transition points to reduce the","rect":[89.97997283935547,436.55908203125,522.0464754180908,427.4508972167969]},{"page":30,"text":"increased friction inherent in transitions and maintain an accurate common operational picture to assess the","rect":[89.97997283935547,448.0019226074219,522.0004549102783,438.9137878417969]},{"page":30,"text":"progress of operations.","rect":[89.97997283935547,459.54498291015627,181.34034252166749,450.4367980957031]},{"page":30,"text":"1-42. Offensive or defensive operations will likely continue unless all enemy forces are destroyed or","rect":[89.97997283935547,477.0599670410156,521.9965722618103,467.9517822265625]},{"page":30,"text":"capitulate. If this is the case, execution of follow through resets the cycle and units begin to find the enemy","rect":[89.97997283935547,488.5228576660156,521.9457912445068,479.4146728515625]},{"page":30,"text":"again. If finishing the enemy results in their total destruction or defeat and the cessation of offensive or","rect":[89.97997283935547,500.0458679199219,522.0074365196228,490.93768310546877]},{"page":30,"text":"defensive operations, friendly forces will likely transition to stability operations.","rect":[89.97994995117188,511.5087585449219,411.3392286300659,502.40057373046877]},{"page":30,"text":"Battle Drill","rect":[72.0,533.8427734375,124.79403227996827,526.2555541992188]},{"page":30,"text":"1-43. In addition to accomplishing the mission, every plan contains options for exploiting success or any","rect":[90.0,553.6143188476563,521.9568996429443,544.5061645507813]},{"page":30,"text":"advantages that may arise. Units exploit success by aggressively executing their plans, promoting subordinate","rect":[90.0,565.1373291015625,522.0420808868408,556.0291748046875]},{"page":30,"text":"leader initiative, and rapidly executing battle drills.","rect":[90.0,576.6002197265625,294.34380626678469,567.4920654296875]},{"page":30,"text":"1-44. A battle drill is rehearsed and well understood actions made in response to common battlefield","rect":[90.0,594.1051635742188,521.9544582366943,585.0170288085938]},{"page":30,"text":"occurrences (ADP 3-90). Battle drills are the actions of individual Soldiers and small units, typically when","rect":[89.99999237060547,605.648193359375,521.9227809906006,596.5400390625]},{"page":30,"text":"they meet the enemy. They require minimal leader orders to accomplish and are initiated on a cue, such as","rect":[89.99999237060547,617.111083984375,521.9275653343201,608.0029296875]},{"page":30,"text":"an enemy action or a leader’s order, and are a trained response to that cue. Battle drills are designed to be","rect":[89.99999237060547,628.634033203125,522.0113802032471,619.52587890625]},{"page":30,"text":"quickly executed without the application of a deliberate decision-making process. Examples include “react","rect":[89.98994445800781,640.096923828125,521.9320445022584,630.98876953125]},{"page":30,"text":"to indirect fire” or “vehicle recovery.” Although battle drills are commonly initiated when enemy contact is","rect":[89.98994445800781,651.6199340820313,521.9841449241638,642.5117797851563]},{"page":30,"text":"made during close combat, they can also occur within command posts when a specific type of information is","rect":[89.98994445800781,663.1429443359375,521.9245135765076,654.0347900390625]},{"page":30,"text":"received and action needs to be taken to support those units in contact. Leaders develop or use battle drills","rect":[89.98994445800781,674.5857543945313,521.9920184593201,665.4976196289063]},{"page":30,"text":"specific to their capabilities and operations to assist subordinates in execution of common instances during","rect":[89.98994445800781,686.1287841796875,521.9143581390381,677.0206298828125]},{"page":30,"text":"all operations.","rect":[89.98999786376953,697.6317749023438,146.67412853240968,688.5436401367188]},{"page":30,"text":"1-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":30,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":30,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":31,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":31,"text":"Battle Handover","rect":[90.0,82.40274810791016,167.90200578308106,74.99124908447266]},{"page":31,"text":"1-45. A battle handover is a coordinated mission between two units that transfers responsibility for","rect":[108.0,102.11431884765625,539.9775056915283,93.16645812988281]},{"page":31,"text":"fighting an enemy force from one unit to the other. It sustains continuity of the combined arms fight and","rect":[108.0,113.6373291015625,539.9131374359131,104.5291519165039]},{"page":31,"text":"protects the combat power of both forces involved. Battle handover is usually associated with conducting a","rect":[108.0,125.16033935546875,540.0200471954346,116.05216217041016]},{"page":31,"text":"passage of lines,arelief in place, and abreakout of an encircled force. Battle handover occurs along a general","rect":[108.0,136.6231689453125,540.1085581741334,127.5149917602539]},{"page":31,"text":"trace line designated as the battle handover line (BHL), generally a phase line forward of the stationary force.","rect":[108.00000762939453,148.14617919921876,540.0617628097534,139.03799438476563]},{"page":31,"text":"(See appendix A for more information on a battle handover line.)","rect":[108.00000762939453,159.64915466308595,368.67635131454468,150.56100463867188]},{"page":31,"text":"Control Measures","rect":[90.0,182.07369995117188,174.56247958755493,174.4865264892578]},{"page":31,"text":"1-46. Coordinating and synchronizing actions requires using control measures. Acontrol measure is a means","rect":[108.0,201.7742919921875,540.0654437522888,192.66610717773438]},{"page":31,"text":"of regulating forces or warfighting functions (ADP 6-0). Control measures help commanders’ direct actions","rect":[108.0,213.29730224609376,540.0554950218201,204.18911743164063]},{"page":31,"text":"by establishing responsibilities and limits that prevent subordinate unit actions from impeding one another","rect":[108.0,224.76019287109376,539.9272363243103,215.65200805664063]},{"page":31,"text":"and prevent fratricide. They also foster coordination and cooperation between forces without unnecessarily","rect":[108.0,236.283203125,540.0159816741943,227.17501831054688]},{"page":31,"text":"restricting freedom of action. Control measures may be detailed (such as an operation order) or simple (such","rect":[108.0,247.80615234375,540.0173244476318,238.69796752929688]},{"page":31,"text":"as a checkpoint). Control measures are prescriptive and provide control without requiring detailed","rect":[108.0,259.26904296875,539.9228420257568,250.16085815429688]},{"page":31,"text":"explanation. Good control measures foster freedom of action, decision making, initiative, reporting, and","rect":[108.0,270.79205322265627,540.0041408538818,261.6838684082031]},{"page":31,"text":"prevent fratricide.","rect":[108.0,282.2950134277344,179.6850996017456,273.2068786621094]},{"page":31,"text":"1-47. Control measures can be permissive or restrictive. Permissive control measures facilitate action while","rect":[108.0,299.7598571777344,540.0662508087158,290.6717224121094]},{"page":31,"text":"restrictive control measures limit action. Control measures may be graphical (such as phase lines) or","rect":[108.0,311.30291748046877,540.0314843711853,302.1947326660156]},{"page":31,"text":"procedural (such as target engagement priorities). Commanders should establish only the minimum control","rect":[108.0,322.825927734375,540.0751109085084,313.7177429199219]},{"page":31,"text":"measures necessary to provide essential coordination and deconfliction between units. Restrictive control","rect":[108.0,334.2887878417969,540.0044321975709,325.18060302734377]},{"page":31,"text":"measures only remain in place as long as required for mission accomplishment.","rect":[108.0,345.811767578125,425.7333936691284,336.7035827636719]},{"page":31,"text":"1-48. Determining what control measures are necessary to adequately command and control operations","rect":[108.0,363.3367614746094,540.0444476585388,354.22857666015627]},{"page":31,"text":"without overburdening subordinates is a key consideration for every unit. This is particularly important for","rect":[108.0,374.79962158203127,540.0029199180603,365.6914367675781]},{"page":31,"text":"company and below formations who may not possess the same digital systems or capabilities as their higher","rect":[108.0,386.3226318359375,540.0964868125916,377.2144470214844]},{"page":31,"text":"headquarters.","rect":[108.0,397.8255920410156,161.6220350265503,388.7374572753906]},{"page":31,"text":"Graphic Control Measures","rect":[90.00407409667969,421.2823791503906,200.63990664291382,412.3645935058594]},{"page":31,"text":"1-49. A graphic control measure is a symbol used on maps and displays to regulate forces and warfighting","rect":[107.99999237060547,438.82745361328127,540.0214748382568,429.7192687988281]},{"page":31,"text":"functions (ADP 6-0). Commander’s establish graphic control measures to regulate maneuver, movement,","rect":[107.9899673461914,450.3504333496094,540.0374708175659,441.24224853515627]},{"page":31,"text":"airspace, fires, and other aspects of operations. In general, all graphic control measures should relate to easily","rect":[107.98999786376953,461.8133544921875,540.0437526702881,452.7051086425781]},{"page":31,"text":"identifiable natural or man-made terrain. Regardless of their specific function, each control measure should","rect":[107.98998260498047,473.3363342285156,540.0113430023193,464.2281494140625]},{"page":31,"text":"have a specific purpose: mass the effects of combat power, synchronize subordinate forces’ operations,","rect":[107.9899673461914,484.7991943359375,540.0254468917847,475.6910095214844]},{"page":31,"text":"minimize the possibility of fratricide, or comply with the law of armed conflict.","rect":[107.9899673461914,496.32220458984377,426.2178602218628,487.2140197753906]},{"page":31,"text":"1-50. At battalion and higher echelons, graphic control measures are initially identified during course of","rect":[107.9899673461914,513.8472290039063,539.9621484336853,504.739013671875]},{"page":31,"text":"action development and refined throughout the operations process. However, a course of action sketch rarely","rect":[107.98999786376953,525.31005859375,539.9724636077881,516.201904296875]},{"page":31,"text":"provides the necessary detail to adequately command and control operations during execution. As plans and","rect":[107.98999786376953,536.8330688476563,540.0743312835693,527.7249145507813]},{"page":31,"text":"orders are refined subordinate echelons will typically add control measures to those from their higher","rect":[107.98998260498047,548.3560791015625,539.9623315391541,539.2479248046875]},{"page":31,"text":"headquarters. For example, a battalion may be tasked to seize an objective during an attack from their BCT","rect":[107.98998260498047,559.8189697265625,539.9164707679748,550.7007446289063]},{"page":31,"text":"headquarters. While the objective is assigned by the BCT, the battalion determines what control measures","rect":[107.98998260498047,571.342041015625,540.0423724632263,562.2238159179688]},{"page":31,"text":"are necessary within that objective to adequately command and control their forces. When units develop","rect":[107.98998260498047,582.864990234375,540.0150051116943,573.7467651367188]},{"page":31,"text":"control measures, they share those control measures with their subordinate units, higher headquarters, and","rect":[107.98999786376953,594.3278198242188,540.0834255218506,585.2196044921875]},{"page":31,"text":"adjacent units.","rect":[107.98999786376953,605.850830078125,165.75428295135499,596.7326049804688]},{"page":31,"text":"Digital and Analog Control Measures","rect":[89.99405670166016,629.3677978515625,245.69184756088257,620.429931640625]},{"page":31,"text":"1-51. Digital systems provide leaders numerous benefits to aid in developing, implementing, and modifying","rect":[107.98998260498047,646.8326416015625,540.0391750335693,637.7244873046875]},{"page":31,"text":"control measures. Many of these systems possess the capability to display active and inactive graphic control","rect":[108.00000762939453,658.3556518554688,540.0240244827271,649.2474975585938]},{"page":31,"text":"measure overlays as well as provide notifications for control measure violations even if that control measure","rect":[108.00000762939453,669.878662109375,540.0733919219971,660.7705078125]},{"page":31,"text":"is not actively displayed. An advantage of these digital systems is the ability to rapidly share information,","rect":[108.00000762939453,681.341552734375,539.9932203292847,672.2333984375]},{"page":31,"text":"such as adjustments to control measures, as well as the ability to maintain a clearer common operational","rect":[108.00000762939453,692.8646240234375,539.9991831741334,683.7463989257813]},{"page":31,"text":"picture within command posts. The disadvantage to these digital systems is that many are not resident at the","rect":[108.0,704.3875732421875,540.0251741485596,695.2794189453125]},{"page":31,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":31,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":31,"text":"1-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":32,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":32,"text":"lowest tactical echelons, and they create an electromagnetic signature which can either be jammed or used","rect":[90.0,83.51434326171875,522.0103054046631,74.39614868164063]},{"page":32,"text":"for targeting purposes.","rect":[89.98994445800781,94.97723388671875,180.28017711639405,85.86905670166016]},{"page":32,"text":"1-52. Analog control measures are hand-drawn on maps or overlays and are used by every echelon.","rect":[89.99996185302735,112.4921875,522.0925855636597,103.3840103149414]},{"page":32,"text":"Generally, battalion and above echelons use paper maps with overlays as a backup to many of their digital","rect":[89.98994445800781,124.01519775390625,521.9011607131959,114.9069595336914]},{"page":32,"text":"systems. Company and below echelons are more likely to use paper maps with overlays containing analog","rect":[89.98999786376953,135.47808837890626,522.0043849945068,126.36991119384766]},{"page":32,"text":"control measures as their primary means of command and control. These overlays consist of graphical control","rect":[89.98998260498047,147.00103759765626,521.9930796585084,137.89285278320313]},{"page":32,"text":"measures that allow the organization to maintain a common operational picture and continue operations","rect":[89.98999786376953,158.5240478515625,521.9733417015076,149.41586303710938]},{"page":32,"text":"within a degraded communications environment.","rect":[89.99000549316406,169.9869384765625,285.8139295578003,160.87875366210938]},{"page":32,"text":"Note. FM 3-90 contains numerous figures containing graphic control measures when describing","rect":[115.20032501220703,193.19427490234376,503.9480495452881,184.08609008789063]},{"page":32,"text":"offensive, defensive, and enabling operations. For clarity, these figures contain only the major","rect":[115.19999694824219,204.71429443359376,503.96697021102906,195.59609985351563]},{"page":32,"text":"applicable graphic control measures. Appendix A contains additional information on each of the","rect":[115.19999694824219,216.2373046875,503.9678011016846,207.12911987304688]},{"page":32,"text":"control measures discussed in FM 3-90. For a complete listing of all control measures see","rect":[115.19999694824219,227.76031494140626,504.0663118438721,218.65213012695313]},{"page":32,"text":"FM 1-02.2.","rect":[115.19999694824219,237.23924255371095,160.54551219940186,230.3555145263672]},{"page":32,"text":"Terrain Management","rect":[72.0,278.6006774902344,173.0544111366272,268.7955627441406]},{"page":32,"text":"1-53. Units manage terrain to coordinate and synchronize their operations with friendly forces. Terrain","rect":[90.0,296.154296875,521.9902486724853,287.0461120605469]},{"page":32,"text":"management is the process of allocating terrain by specifying locations for units and activities to","rect":[89.99996185302735,307.6171875,521.9536037445068,298.6693420410156]},{"page":32,"text":"deconflict activities that might interfere with each other. For example, an artillery unit is assigned a","rect":[90.0,319.1401672363281,521.9862947540283,310.031982421875]},{"page":32,"text":"position area for artillery (PAA) to provide indirect fires. The PAA frames for the artillery unit the area for","rect":[90.0,330.6631774902344,521.9102685508728,321.55499267578127]},{"page":32,"text":"executing their fire missions and lets other units know that they need to coordinate with the PAA owner if","rect":[90.0,342.1260681152344,521.9992578086853,333.01788330078127]},{"page":32,"text":"they need to move through that area. Examples of terrain management include but are not limited to—","rect":[90.0,353.6490478515625,499.6124687194824,344.5408630371094]},{"page":32,"text":" Assigned areas including area of operations, zone, and sector.","rect":[115.19999694824219,367.1343078613281,380.08196544647219,358.026123046875]},{"page":32,"text":" PAA.","rect":[115.19999694824219,378.4800109863281,155.74499034881593,371.69647216796877]},{"page":32,"text":" Assembly area.","rect":[115.19999694824219,394.1343078613281,194.8630781173706,385.026123046875]},{"page":32,"text":" Battle position.","rect":[115.19999694824219,407.6142578125,194.32801342010499,398.526123046875]},{"page":32,"text":" Route.","rect":[115.19999694824219,419.1102600097656,159.6477918624878,412.3467712402344]},{"page":32,"text":" Lane.","rect":[115.19999694824219,432.6102600097656,155.74299144744874,425.8467712402344]},{"page":32,"text":" Axis of advance.","rect":[115.19999694824219,446.1102600097656,200.68468761444093,439.026123046875]},{"page":32,"text":"1-54. Assigning areas to subordinates is a key operational framework and terrain management consideration","rect":[90.00376892089844,465.59918212890627,522.0369777679443,456.4909973144531]},{"page":32,"text":"for headquarters at every echelon. When appropriate units may further subdivide their assigned area into","rect":[90.00376892089844,477.1221618652344,522.0036525726318,468.01397705078127]},{"page":32,"text":"assigned areas for their subordinate formations. A higher headquarters remains responsible for any area not","rect":[90.00376892089844,488.6451721191406,522.0762095413209,479.5369873046875]},{"page":32,"text":"assigned to a subordinate unit. A unit moving through or delivering effects into another units assigned area","rect":[90.00376892089844,500.1080627441406,521.9716463165283,490.9998779296875]},{"page":32,"text":"must coordinate with the assigned unit.","rect":[90.00376892089844,511.63104248046877,246.65146923065186,502.5228576660156]},{"page":32,"text":"1-55. The types of assigned areas include area of operations, zone, and sector. While there are numerous","rect":[90.00376892089844,529.14599609375,521.9739520530701,520.037841796875]},{"page":32,"text":"other control measures that enable terrain management only area of operations, zone, and sector are part of","rect":[90.00376892089844,540.60888671875,521.9202172813416,531.500732421875]},{"page":32,"text":"the assigned area model. Each assigned area has unique characteristics and employment considerations","rect":[90.00376892089844,552.1318969726563,522.1264178733826,543.0237426757813]},{"page":32,"text":"outlined below.","rect":[90.00379943847656,561.630859375,152.20392894744874,554.5467529296875]},{"page":32,"text":"Area of Operations","rect":[72.00785827636719,587.1116943359375,150.90331911849976,578.163818359375]},{"page":32,"text":"1-56. An area of operations is an operational area defined by a commander for land and maritime forces that","rect":[90.00377655029297,604.626708984375,522.0422739944459,595.5185546875]},{"page":32,"text":"should be large enough to accomplish their missions and protect their forces (JP 3-0). Units can use an area","rect":[90.0037841796875,616.149658203125,522.0642366485596,607.04150390625]},{"page":32,"text":"of operations (AO) during offensive, defensive, and stability operations. An AO is defined by boundaries","rect":[89.9937744140625,627.612548828125,521.9679095726013,618.50439453125]},{"page":32,"text":"that fully enclose the area. An AO is useful when a higher headquarters requires a greater degree of control.","rect":[89.9937744140625,639.1355590820313,522.0405836105347,630.0274047851563]},{"page":32,"text":"Units assigned an AO must be capable of performing specific responsibilities. These responsibilities","rect":[89.9937744140625,650.598388671875,521.9339740257263,641.490234375]},{"page":32,"text":"include—","rect":[89.9937744140625,660.0973510742188,129.47257614135743,653.0132446289063]},{"page":32,"text":" Terrain management.","rect":[115.19999694824219,675.5942993164063,218.7417402267456,666.4861450195313]},{"page":32,"text":" Information collection, integration, and synchronization.","rect":[115.19999694824219,689.0942993164063,359.56472301483157,679.9861450195313]},{"page":32,"text":" Civil affairs operations.","rect":[115.19999694824219,702.5742797851563,227.92809581756593,693.4861450195313]},{"page":32,"text":" Movement control.","rect":[115.19999694824219,714.0702514648438,209.86199474334718,706.9861450195313]},{"page":32,"text":"1-10","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":32,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":32,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":33,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":33,"text":"","rect":[133.1999969482422,80.78548431396485,139.16105696249009,76.09324645996094]},{"page":33,"text":"","rect":[133.1999969482422,94.28548431396485,139.16105696249009,89.59324645996094]},{"page":33,"text":"","rect":[133.1999969482422,107.78548431396485,139.16105696249009,103.09324645996094]},{"page":33,"text":"","rect":[133.1999969482422,121.28548431396485,139.16105696249009,116.59324645996094]},{"page":33,"text":"","rect":[133.1999969482422,134.78549194335938,139.16105696249009,130.09324645996095]},{"page":33,"text":"Clearance of fires.","rect":[151.1999969482422,81.50032806396485,224.79792308807374,74.40616607666016]},{"page":33,"text":"Security.","rect":[151.1999969482422,97.01434326171875,187.06357860565186,87.90616607666016]},{"page":33,"text":"Personnel recovery.","rect":[151.1999969482422,110.51434326171875,230.68065929412843,101.40616607666016]},{"page":33,"text":"Airspace management.","rect":[151.1999969482422,124.01434326171875,242.86095714569093,114.90616607666016]},{"page":33,"text":"Minimum-essential stability operations tasks, which are—","rect":[151.1999969482422,137.51434326171876,384.5257377624512,128.40615844726563]},{"page":33,"text":" Establish civil security.","rect":[151.1999969482422,151.5543212890625,262.84490489959719,142.44613647460938]},{"page":33,"text":" Provide immediate needs (access to food, water, shelter, and medical treatment).","rect":[151.1999969482422,165.5742645263672,491.3111524581909,156.48611450195313]},{"page":33,"text":"1-57. Commanders can add, remove, or adjust a subordinate units’ AO responsibilities based on the situation","rect":[108.00785827636719,183.1192626953125,540.0480861663818,174.00106811523438]},{"page":33,"text":"and mission variables. However, when assigning an AO, a higher echelon headquarters must inform the","rect":[108.00784301757813,194.5821533203125,540.0529451446533,185.47396850585938]},{"page":33,"text":"subordinate unit of any changes to the responsibilities listed above.","rect":[108.00784301757813,206.10516357421876,376.37224864959719,196.99697875976563]},{"page":33,"text":"Zone and Sector","rect":[90.00189971923828,227.60804748535157,157.80221438217164,220.68423461914063]},{"page":33,"text":"1-58. A zone is an operational area assigned to a unit in the offense that only has rear and lateral boundaries","rect":[107.99781799316406,247.08697509765626,539.9309833030701,237.97879028320313]},{"page":33,"text":"(FM 3-0). The non-bounded side of a zone is open towards enemy forces. A higher echelon headquarters","rect":[107.99781036376953,258.6099853515625,539.9521014671326,249.50180053710938]},{"page":33,"text":"uses fire support coordination and maneuver control measures such as a limit of advance and a coordinated","rect":[107.98779296875,270.1128845214844,539.9770412445068,261.0247497558594]},{"page":33,"text":"fire line to synchronize its deep operations with those of a subordinate unit. Zones allow higher headquarters","rect":[107.98780822753906,281.5958251953125,539.9937884788513,272.4876403808594]},{"page":33,"text":"to adjust deep operations without having to change unit boundaries. This gives greater flexibility to the higher","rect":[107.98780822753906,293.11883544921877,540.0848290977478,284.0006408691406]},{"page":33,"text":"headquarters for controlling deep operations, allowing subordinate units to focus on close and rear operations.","rect":[107.98780822753906,304.58172607421877,540.0067701339722,295.4735412597656]},{"page":33,"text":"A zone is best for front-line units executing high-tempo offensive operations characterized by direct fire","rect":[107.98780822753906,316.1047058105469,539.9633455352783,306.99652099609377]},{"page":33,"text":"contact with the enemy and a fluid forward line of troops (FLOT). Units treat everything behind the forward","rect":[107.9778060913086,327.6277160644531,539.9594631195068,318.5195007324219]},{"page":33,"text":"line of troops as an AO with the associated nine responsibilities. Zone can be further subdivided as needed.","rect":[107.9778060913086,339.0705261230469,540.0238599777222,329.9823913574219]},{"page":33,"text":"(See appendix A for more information on zones.)","rect":[107.977783203125,350.5935363769531,305.1102502403259,341.5054016113281]},{"page":33,"text":"1-59. A sector is an operational area assigned to a unit in the defense that has rear and lateral boundaries","rect":[107.977783203125,368.1385803222656,539.8619525413513,359.0303955078125]},{"page":33,"text":"with interlocking fires (FM 3-0). The non-bounded side is open towards the enemy. A higher echelon","rect":[107.96775817871094,379.6014404296875,539.9861965179443,370.4932556152344]},{"page":33,"text":"headquarters uses fire support coordination and maneuver control measures such as battle positions and","rect":[107.9677734375,391.1044006347656,539.9351711273193,382.0162658691406]},{"page":33,"text":"trigger lines to synchronize subordinate units. Higher headquarters are responsible for synchronizing","rect":[107.96780395507813,402.6474609375,539.9927883148193,393.5392761230469]},{"page":33,"text":"operations forward of the main battle and security areas or coordinated fire line. Units use sectors to","rect":[107.9677734375,414.1103515625,539.8624172210693,405.0021667480469]},{"page":33,"text":"synchronize and coordinate engagement areas and allow for mutually supporting fields of fire, which do not","rect":[107.9677734375,425.6333312988281,540.0562510452271,416.525146484375]},{"page":33,"text":"require coordination between adjacent units. Units treat everything behind the forward line of troops as an","rect":[107.97779846191406,437.15631103515627,539.9106349945068,428.0381164550781]},{"page":33,"text":"AO with the associated nine responsibilities. Sectors can be further subdivided as needed. (See appendix A","rect":[107.9778060913086,448.5992126464844,539.9970746078491,439.5110778808594]},{"page":33,"text":"for more information on sectors.)","rect":[107.96773529052735,460.1221923828125,241.00627685165407,451.0340576171875]},{"page":33,"text":"Forms of Contact","rect":[90.0,482.49371337890627,172.49383374404909,474.9065246582031]},{"page":33,"text":"1-60.","rect":[108.0,500.1502380371094,128.8616361618042,493.2664794921875]},{"page":33,"text":"Contact is an interaction between two forces. There are three possible types of interactions:","rect":[133.20030212402345,502.1943054199219,498.14780377960207,493.08612060546877]},{"page":33,"text":" Both forces are in contact with each other.","rect":[133.1999969482422,513.6702880859375,320.6242322921753,506.5861511230469]},{"page":33,"text":" A friendly force is in contact with an enemy force, while the enemy force is out of contact with","rect":[133.1999969482422,529.1943359375,540.0461330413818,520.086181640625]},{"page":33,"text":"the friendly force.","rect":[151.1999969482422,540.71728515625,223.1205701828003,531.609130859375]},{"page":33,"text":" A friendly force is out of contact with an enemy force; however, the enemy force is in contact with","rect":[133.1999969482422,554.2142944335938,540.0590724945068,545.1061401367188]},{"page":33,"text":"the friendly force.","rect":[151.1999969482422,565.7373046875,223.1205701828003,556.629150390625]},{"page":33,"text":"1-61. The forms of contact describe the method of interaction that positively identifies the location or activity","rect":[108.00376892089844,583.2021484375,540.0087795257568,574.093994140625]},{"page":33,"text":"of a force. The forms of contact also—","rect":[108.00377655029297,592.7011108398438,263.5843315124512,585.6170043945313]},{"page":33,"text":" Quickly describe to others what is happening.","rect":[133.1999969482422,608.2142944335938,334.2424268722534,599.1061401367188]},{"page":33,"text":" Describe the method of engagement.","rect":[133.1999969482422,621.7142944335938,298.11822032928469,612.6061401367188]},{"page":33,"text":" Provide an understanding of a force’s capabilities and ranges.","rect":[133.1999969482422,635.2142944335938,397.4876356124878,626.1061401367188]},{"page":33,"text":" If a force is in contact, can trigger additional actions, typically in the form of battle drills.","rect":[133.1999969482422,648.7142944335938,508.0080518722534,639.6061401367188]},{"page":33,"text":"1-62. An exception to these forms of contact are interactions with friendly or neutral entities such as civilians,","rect":[108.00376892089844,666.2392578125,540.0311231613159,657.131103515625]},{"page":33,"text":"nongovernmental organizations, or friendly and neutral military forces. This interaction triggers a decision","rect":[108.00376892089844,677.7021484375,539.9537258148193,668.593994140625]},{"page":33,"text":"from friendly leaders and are usually categorized as a non-hostile form of contact.","rect":[108.00379943847656,689.2251586914063,435.9464063644409,680.1170043945313]},{"page":33,"text":"1-63. Whenever a force gains contact with another force, the gaining force can impede the freedom of action","rect":[107.99378967285156,706.6900634765625,540.0272121429443,697.5819091796875]},{"page":33,"text":"of that other force while enhancing their own freedom of action. For example, after gaining visual contact on","rect":[107.99382781982422,718.2130126953125,539.9885158538818,709.1048583984375]},{"page":33,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":33,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":33,"text":"1-11","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":34,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":34,"text":"an enemy, friendly forces are able to maneuver—out of enemy contact—to a position to best destroy the","rect":[90.0,83.51434326171875,521.9692659454346,74.40616607666016]},{"page":34,"text":"enemy force. Ideally, when friendly forces engage enemy forces, they use as many different forms of contact","rect":[90.0,94.97723388671875,521.9763560256959,85.86905670166016]},{"page":34,"text":"as possible to create a dilemma for the enemy and allow the friendly force to accomplish its mission. ","rect":[90.0,106.500244140625,495.21880626678469,97.3920669555664]},{"page":34,"text":"1-64. Leaders always account for how to defend or mitigate against the enemy using these forms of contact.","rect":[90.0,124.02520751953125,522.0373487472534,114.91703033447266]},{"page":34,"text":"They also make plans on how to use these forms of contact against the enemy. Not every unit or echelon will","rect":[90.00003814697266,135.48809814453126,521.9969859085084,126.3798599243164]},{"page":34,"text":"have all of these capabilities, but they will use as many as they have.","rect":[90.0,147.0111083984375,364.66823863983157,137.90286254882813]},{"page":34,"text":"1-65.","rect":[90.01001739501953,162.4919891357422,110.87165355682373,155.60826110839845]},{"page":34,"text":"The nine forms of contact are—","rect":[115.21031951904297,162.5120391845703,243.1857566833496,155.42788696289063]},{"page":34,"text":" Direct. Interactions from ground-based, line of sight weapons systems (including small arms, tank","rect":[115.19999694824219,178.01434326171876,522.0549831390381,168.90615844726563]},{"page":34,"text":"main guns, and anti-tank missiles).","rect":[133.21002197265626,189.47723388671876,272.62832164764407,180.36904907226563]},{"page":34,"text":" Indirect. Interactions from non-line of sight weapons systems (including cannon artillery,","rect":[115.19999694824219,202.97430419921876,521.9891309738159,193.86611938476563]},{"page":34,"text":"mortars, and rockets).","rect":[133.21002197265626,214.47727966308595,220.49224376678468,205.38912963867188]},{"page":34,"text":" Non-hostile. Neutral interactions that may degrade military operations (including civilians on the","rect":[115.19999694824219,227.99432373046876,522.0161409454346,218.88613891601563]},{"page":34,"text":"battlefield, nongovernmental organizations, or neutral forces).","rect":[133.1999969482422,239.45721435546876,381.46270275115969,230.34902954101563]},{"page":34,"text":" Obstacle. Interactions from natural and manmade obstacles (including rivers and minefields).","rect":[115.19999694824219,252.95428466796876,508.6074171066284,243.84609985351563]},{"page":34,"text":" Chemical, biological, radiological, and nuclear (CBRN). Interactions from friendly, enemy,","rect":[115.19999694824219,266.45428466796877,521.9789991378784,257.3460998535156]},{"page":34,"text":"and civilian CBRN effects (including chemical attacks, nuclear attacks, industrial accidents, and","rect":[133.1999969482422,277.977294921875,521.9582424163818,268.8691101074219]},{"page":34,"text":"toxic or hazardous).","rect":[133.1999969482422,289.480224609375,212.9251356124878,280.39208984375]},{"page":34,"text":" Aerial. Interactions from air-based combat platforms (including attack helicopters, armed UAS,","rect":[115.19999694824219,302.9942932128906,522.0031080245972,293.8861083984375]},{"page":34,"text":"and fixed-wing aircraft).","rect":[133.18997192382813,314.4571838378906,231.2637586593628,305.3489990234375]},{"page":34,"text":" Visual. Interaction from acquisition via the human eye, optical, or electro-optical systems","rect":[115.19999694824219,327.95428466796877,522.1162860374451,318.8460998535156]},{"page":34,"text":"(including ground reconnaissance, telescopic, thermal, and infrared sights on weapons and sensor","rect":[133.1999969482422,339.477294921875,521.9819848594666,330.3691101074219]},{"page":34,"text":"platforms such as UAS and satellites).","rect":[133.1999969482422,350.980224609375,285.8837537765503,341.89208984375]},{"page":34,"text":" Electromagnetic. Interactions via systems used to acquire, degrade, or destroy using select","rect":[115.19999694824219,364.4942932128906,522.0222544631959,355.3861083984375]},{"page":34,"text":"portions of the electromagnetic spectrum (including radar systems, jamming, cyberspace, and","rect":[133.1999969482422,375.9571838378906,521.9412746429443,366.8389892578125]},{"page":34,"text":"electromagnetic pulse).","rect":[133.1999969482422,387.48016357421877,226.53930187225343,378.3719787597656]},{"page":34,"text":" Influence. Interactions through the information dimension intended to shape the perceptions,","rect":[115.19999694824219,400.97430419921877,522.0222120285034,391.8661193847656]},{"page":34,"text":"behaviors, and decision making of people relative to a policy or military objective (including","rect":[133.1999969482422,412.497314453125,522.0090236663818,403.3791198730469]},{"page":34,"text":"through social media, telecommunications, human interaction, and other forms of communication","rect":[133.1999969482422,423.9601745605469,522.0400905609131,414.85198974609377]},{"page":34,"text":"and contact).","rect":[133.1999969482422,435.463134765625,184.90720653533936,426.375]},{"page":34,"text":"1-66. Visual contact allows a force to gain understanding of another other force with or without the other","rect":[90.00377655029297,453.0081787109375,521.9517724571228,443.8999938964844]},{"page":34,"text":"force’s knowledge. With direct, indirect, and aerial forms of contact, visual contact is assumed. For CBRN,","rect":[90.00377655029297,464.4710388183594,522.0540113449097,455.36285400390627]},{"page":34,"text":"obstacle, non-hostile, electromagnetic, and influence contact, visual contact is not assumed and must be","rect":[90.00377655029297,475.9940490722656,521.9811067657471,466.8858642578125]},{"page":34,"text":"confirmed to clearly describe what is happening. For example, an animal could trigger an electronic ground","rect":[89.99374389648438,487.4569091796875,522.0157985687256,478.3487243652344]},{"page":34,"text":"sensor and a unit must confirm with visual contact whether the ground sensor was activated by enemy forces","rect":[89.99374389648438,498.97991943359377,521.9398944358826,489.8717346191406]},{"page":34,"text":"or by an animal.","rect":[89.9937515258789,510.5029296875,154.9584150314331,501.3947448730469]},{"page":34,"text":"1-67. When friendly forces are directed to “gain and maintain contact,” units decide which form or forms of","rect":[89.9937515258789,527.9677734375,522.0248925743103,518.859619140625]},{"page":34,"text":"contact is best to use for the situation. Ultimately, they are required to understand where the enemy force is","rect":[89.9937515258789,539.4907836914063,521.9298846702576,530.3826293945313]},{"page":34,"text":"and what it is trying to do all while minimizing the forms of contact the enemy has on friendly forces.","rect":[89.9937515258789,551.0137939453125,497.13418102264407,541.9056396484375]},{"page":34,"text":"1-68. Friendly forces should expect that the enemy always has them under some form of visual,","rect":[89.9937515258789,568.4786376953125,522.0601148605347,559.3704833984375]},{"page":34,"text":"electromagnetic, and influence contact. The proliferation of communication capabilities results in an","rect":[89.9937515258789,580.0016479492188,521.9630031585693,570.8934936523438]},{"page":34,"text":"increasing ability of friendly, neutral, and adversarial actors to influence one another. The increasing use of","rect":[89.9937515258789,591.524658203125,521.8932397422791,582.41650390625]},{"page":34,"text":"social media on the battlefield by various actors will drive perceptions of all actors. This should not cause","rect":[89.9937515258789,602.9874877929688,521.9979524688721,593.8793334960938]},{"page":34,"text":"inaction by leaders, but rather encourage disciplined actions that will help to mitigate enemy contact.","rect":[89.9937973022461,614.510498046875,521.9669752120972,605.40234375]},{"page":34,"text":"Activities to mitigate this include, but are not limited to, masking, deception, electromagnetic spectrum","rect":[89.9937515258789,626.0335083007813,522.0260901412964,616.9253540039063]},{"page":34,"text":"discipline, and camouflage.","rect":[89.9937515258789,637.4963989257813,200.01433849334718,628.3882446289063]},{"page":34,"text":"Actions on Contact","rect":[72.0,659.853759765625,161.81091138076784,652.2555541992188]},{"page":34,"text":"1-69. Actions on contact is a process to help leaders understand what is happening and to take action.","rect":[90.0,679.6143188476563,521.9943189620972,670.6664428710938]},{"page":34,"text":"Actions on contact is not intended to generate a rigid, lockstep response to the enemy. Rather, the goal is to","rect":[90.0,691.0771484375,522.0234279632568,681.968994140625]},{"page":34,"text":"provide an orderly framework that enables leaders to apply sound decision making and timely actions to","rect":[89.98997497558594,702.6001586914063,522.0013942718506,693.4920043945313]},{"page":34,"text":"complete the operation.","rect":[90.0,714.1031494140625,184.18499279022218,705.0150146484375]},{"page":34,"text":"1-12","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":34,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":34,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":35,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":35,"text":"1-70. Actions on contact are applicable to all types of operations. Figure 1-3 is a graphical depiction of","rect":[108.0,83.51434326171875,539.9632470664978,74.40616607666016]},{"page":35,"text":"actions on contact. They are just as applicable to a squad coming into direct fire contact with an enemy during","rect":[108.0000228881836,94.97723388671875,540.0652980804443,85.85903930664063]},{"page":35,"text":"a movement to contact, an armor company observing enemy in the defense, a signal element ambushed by","rect":[108.0000228881836,106.500244140625,539.9611110687256,97.3920669555664]},{"page":35,"text":"the enemy, or a division in the attack. This framework is a way for leaders to quickly determine if things","rect":[108.0,118.023193359375,539.9463641624451,108.9150161743164]},{"page":35,"text":"are going according to plan and what actions they need to take to either stay on plan or adjust to the new","rect":[107.97994995117188,129.486083984375,539.8751263656616,120.36788940429688]},{"page":35,"text":"situation. Actions on contact are—","rect":[107.97993469238281,138.9850616455078,247.12466049194337,131.90090942382813]},{"page":35,"text":" React.","rect":[133.1999969482422,152.4702911376953,176.44237804412843,145.706787109375]},{"page":35,"text":" Develop the situation.","rect":[133.1999969482422,167.9742889404297,239.26478099822999,158.88613891601563]},{"page":35,"text":" Choose an action.","rect":[133.1999969482422,179.4803009033203,222.58246898651124,172.38613891601563]},{"page":35,"text":" Execute and report.","rect":[133.1999969482422,194.9742889404297,229.24376964569093,185.88613891601563]},{"page":35,"text":"Figure 1-3. Actions on contact","rect":[243.3639678955078,438.7709045410156,386.67903686141968,429.47235107421877]},{"page":35,"text":"1-71. No matter what a friendly force is or doing, once they make contact with the enemy, they conduct","rect":[108.00379943847656,462.22772216796877,540.0481944046021,453.1195373535156]},{"page":35,"text":"actions on contact. The unit carries out these actions on contact regardless of whether the enemy has detected","rect":[107.99378967285156,473.7507019042969,539.9100856781006,464.64251708984377]},{"page":35,"text":"its presence. Actions on contact are not to be confused with the battle drill of “react to contact” which is a","rect":[107.99378967285156,485.19354248046877,540.0570955352783,476.10540771484377]},{"page":35,"text":"trained response, requires minimal orders to accomplish, and is initiated by an enemy action. Actions on","rect":[107.99378967285156,496.736572265625,540.0146389007568,487.6283874511719]},{"page":35,"text":"contact can also start with a unit reacting to contact, which simultaneously starts the actions on contact","rect":[107.9937973022461,508.2596130371094,540.0080943069459,499.15142822265627]},{"page":35,"text":"process for different echelons.","rect":[107.9937744140625,519.7025146484375,229.06240367889405,510.6143493652344]},{"page":35,"text":"1-72. Typically, a unit’s standard operating procedure dictates specific actions, to include battle drills and","rect":[107.9937744140625,537.2474975585938,539.9490261077881,528.1393432617188]},{"page":35,"text":"reports, depending on the type of contact. Additionally, the mission variables, commander’s intent and","rect":[107.9937515258789,548.7705078125,539.9559841156006,539.6622314453125]},{"page":35,"text":"guidance, and scheme of maneuver guide the actions individual units take when they make contact with","rect":[107.9937973022461,560.2333984375,539.8726100921631,551.1251220703125]},{"page":35,"text":"enemy forces.","rect":[107.9937515258789,571.75634765625,164.13482189178468,562.658203125]},{"page":35,"text":"1-73. Leaders understand that at different echelons, actions on contact requires different amount of time to","rect":[107.9937515258789,589.2012329101563,540.0211086273193,580.1130981445313]},{"page":35,"text":"conduct with the biggest discriminator being the time it takes to develop the situation. For companies and","rect":[107.9937515258789,600.7442626953125,540.0200710296631,591.6361083984375]},{"page":35,"text":"below, units can quickly develop the situation and choose an action to execute. For battalions and higher, to","rect":[107.9937515258789,612.2672729492188,539.9609889984131,603.1591186523438]},{"page":35,"text":"synchronize their echelon properly to a new action, it may need to execute the rapid decision-making and","rect":[107.98373413085938,623.7301635742188,539.9369411468506,614.6219482421875]},{"page":35,"text":"synchronization process (known as RDSP) or a hasty military decisionmaking process (MDMP) session.","rect":[107.96369934082031,635.2531127929688,539.9208326339722,626.1449584960938]},{"page":35,"text":"Leaders balance the need to conduct their actions on contact with the need to maintain momentum.","rect":[107.943603515625,644.7520751953125,503.3428907394409,637.66796875]},{"page":35,"text":"React","rect":[89.93765258789063,668.2088623046875,113.30129193878175,661.4453735351563]},{"page":35,"text":"1-74. If the enemy initiates the contact, the element in contact conducts the react to contact battle drill. Any","rect":[107.93357849121094,687.7579345703125,539.9017848968506,678.6497802734375]},{"page":35,"text":"unengaged portion monitors the situation and prepares to either support the portion of the unit in contact or","rect":[107.93359375,699.2809448242188,539.9299218711853,690.1727905273438]},{"page":35,"text":"continue the mission. Simultaneously, the unit in contact reports the contact to their higher headquarters","rect":[107.93360900878906,710.7438354492188,539.9118792991638,701.6356811523438]},{"page":35,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":35,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":35,"text":"1-13","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":36,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":36,"text":"which helps them to develop the situation. This also alerts the higher echelon and allows the initiation of ","rect":[90.0,83.51434326171875,524.4662427902222,74.40616607666016]},{"page":36,"text":"necessary actions. ","rect":[89.9899673461914,94.97723388671875,164.73916149139405,85.86905670166016]},{"page":36,"text":"1-75. If friendly forces make contact first without the enemy being aware, they pause and determine if they","rect":[89.99999237060547,112.4921875,522.0163478851318,103.3840103149414]},{"page":36,"text":"have been detected, if not they move to a location where they won’t be observed and continue the actions on","rect":[89.98998260498047,124.01519775390625,521.9702053070068,114.90702056884766]},{"page":36,"text":"contact process. One of the tenets of multidomain operations is to make contact with the smallest element","rect":[89.98999786376953,135.4580535888672,522.0350718460084,126.36991119384766]},{"page":36,"text":"possible. This element is the one that reacts to contact, while the rest of the force begins conducting actions","rect":[89.98998260498047,147.00103759765626,522.1075580101013,137.89285278320313]},{"page":36,"text":"on contact at different tempos.","rect":[89.98998260498047,158.50401306152345,211.9584608078003,149.41586303710938]},{"page":36,"text":"Develop the Situation","rect":[71.99406433105469,181.9608612060547,160.96467494201662,173.04306030273438]},{"page":36,"text":"1-76. The unit in contact develops the situation to define the threat being faced. This helps to develop the","rect":[89.98998260498047,199.495849609375,522.0443391876221,190.38766479492188]},{"page":36,"text":"situation across the front of the unit and ultimately provides more maneuver space to execute further actions.","rect":[89.98994445800781,211.01885986328126,521.9970045089722,201.91067504882813]},{"page":36,"text":"As the situation develops and the enemy force’s dispositions, strength, and intentions become clearer, the","rect":[89.98994445800781,222.481689453125,521.9639558868408,213.37350463867188]},{"page":36,"text":"unit in contact submits additional reports. Typical things to consider include, but is not limited to—","rect":[89.98994445800781,234.00469970703126,488.0845756530762,224.89651489257813]},{"page":36,"text":" Size, activity, location, composition, and orientation of the enemy force.","rect":[115.19999694824219,247.49432373046876,422.6284132003784,238.38613891601563]},{"page":36,"text":" Impact of obstacles and terrain.","rect":[115.19999694824219,260.9742736816406,259.0581922531128,251.88613891601563]},{"page":36,"text":" Enemy capabilities.","rect":[115.19999694824219,274.49432373046877,212.0253553390503,265.3861389160156]},{"page":36,"text":" Probable enemy intentions.","rect":[115.19999694824219,287.9942932128906,242.38393688201905,278.8861083984375]},{"page":36,"text":" Method of gaining positional advantage over the enemy.","rect":[115.19999694824219,301.4942932128906,359.2061414718628,292.3861083984375]},{"page":36,"text":" Friendly situation (location, strength, and capabilities).","rect":[115.19999694824219,314.9942932128906,352.6048231124878,305.8861083984375]},{"page":36,"text":" Possible friendly actions to achieve the specified end state.","rect":[115.19999694824219,328.4942932128906,368.3725233078003,319.3861083984375]},{"page":36,"text":"1-77. For lower echelons such as companies and below, it will not take long to develop the situation based","rect":[90.00376892089844,345.95916748046877,521.9904689788818,336.8509826660156]},{"page":36,"text":"on their small frontage. Meanwhile for a brigade or division, based on their frontage, it will take longer to","rect":[90.01380157470703,357.4821472167969,521.8988552093506,348.37396240234377]},{"page":36,"text":"develop the situation and determine if the enemy is acting according to the plan before the commander can","rect":[90.01380157470703,369.0051574707031,521.9710597991943,359.89697265625]},{"page":36,"text":"make an informed decision.","rect":[90.00379943847656,378.4439697265625,201.16771984100343,371.3598327636719]},{"page":36,"text":"Choose an Action","rect":[72.00788879394531,401.9709777832031,145.38435267639162,395.0471496582031]},{"page":36,"text":"1-78. After the unit makes contact, its leader gathers information to make an assessment based on their","rect":[90.01382446289063,421.50994873046877,522.0372216758728,412.4017639160156]},{"page":36,"text":"understanding of the enemy and friendly forces’ composition and disposition and chooses an action consistent","rect":[90.01382446289063,432.97283935546877,522.0522227249146,423.8646545410156]},{"page":36,"text":"with the higher echelon commander’s intent and within the unit’s capabilities. These actions typically are—","rect":[90.02383422851563,444.4958190917969,521.3146781921387,435.38763427734377]},{"page":36,"text":" Attack.","rect":[115.19999694824219,455.95025634765627,162.40529918670655,448.8661193847656]},{"page":36,"text":" Bypass.","rect":[115.19999694824219,471.47430419921877,164.62572765350343,462.686767578125]},{"page":36,"text":" Defend.","rect":[115.19999694824219,482.95025634765627,165.16179943084718,475.8661193847656]},{"page":36,"text":" Delay.","rect":[115.19999694824219,498.47430419921877,159.64277172088624,489.3661193847656]},{"page":36,"text":" Withdrawal.","rect":[115.19999694824219,509.9602966308594,182.91523265838624,502.8661193847656]},{"page":36,"text":"1-79. For obstacles covered by fire, the unit can either seek a bypass or conduct breaching operations as part","rect":[90.00376892089844,529.439208984375,522.0218882522584,520.3310546875]},{"page":36,"text":"of a hasty attack. For obstacles not covered by fire, the unit can either seek a bypass or create the required","rect":[90.00376892089844,540.962158203125,521.8923244476318,531.85400390625]},{"page":36,"text":"number of lanes to support its maneuver or the maneuver of a supported unit.","rect":[90.00376892089844,552.4651489257813,398.8052930831909,543.3770141601563]},{"page":36,"text":"1-80. Circumstances may dictate that the action requires a higher commander’s approval. Reasons for","rect":[90.00376892089844,569.9500122070313,522.0942895469666,560.8418579101563]},{"page":36,"text":"needing a higher commander’s approval could include—","rect":[90.00376892089844,581.4730224609375,317.7082939147949,572.3648681640625]},{"page":36,"text":" Action requires additional resources.","rect":[115.19999694824219,594.9342651367188,280.42888927459719,585.8461303710938]},{"page":36,"text":" Action is not within the commander’s intent.","rect":[115.19999694824219,606.4302368164063,312.34759044647219,599.3461303710938]},{"page":36,"text":" Action sets conditions for the higher echelon to continue.","rect":[115.19999694824219,621.9542846679688,362.3193311691284,612.8461303710938]},{"page":36,"text":" Action changes their higher echelon’s scheme of maneuver.","rect":[115.19999694824219,635.4542846679688,372.5397901535034,626.3461303710938]},{"page":36,"text":"1-81. The leader of the unit in contact must report to the next higher echelon commander for action approval","rect":[90.02381896972656,652.979248046875,522.0620493850709,643.87109375]},{"page":36,"text":"if the circumstances in paragraph 1-80 apply. Higher approval is required since the unit in contact’s actions","rect":[90.02381896972656,664.442138671875,522.0733172874451,655.333984375]},{"page":36,"text":"could change the entire friendly force’s scheme of maneuver. The higher echelon carefully avoids focusing","rect":[90.0137939453125,675.9652099609375,521.9366359710693,666.8569946289063]},{"page":36,"text":"on initial security engagements to the detriment of operations directed against the enemy main body.","rect":[90.01380157470703,687.4881591796875,492.41411876678469,678.3800048828125]},{"page":36,"text":"1-82. If the action is within the commander’s intent and doesn’t meet any of the criteria in paragraph 1-80","rect":[90.01380157470703,704.9530029296875,522.0962429046631,695.8448486328125]},{"page":36,"text":"the unit in contact executes the chosen action with no additional approval needed. To avoid delay, unit","rect":[90.00379943847656,716.4760131835938,521.9490733108521,707.3678588867188]},{"page":36,"text":"1-14","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":36,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":36,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":37,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":37,"text":"standard operating procedures (SOPs) and commander guidance may provide automatic approval of certain","rect":[108.0,83.51434326171875,539.9663600921631,74.40616607666016]},{"page":37,"text":"actions. The next higher echelon commander always has the option of disapproving the unit in contact’s","rect":[108.00000762939453,94.97723388671875,540.0564105491638,85.86905670166016]},{"page":37,"text":"action based on its impact to the overall mission.","rect":[108.0,106.48020935058594,303.22869396209719,97.3920669555664]},{"page":37,"text":"Execute and Report","rect":[90.00408172607422,129.9971160888672,171.68714093780518,121.07931518554688]},{"page":37,"text":"1-83. With the action selected and, if needed, approved by their higher echelon, the unit in contact takes the","rect":[108.01002502441406,147.4820556640625,540.0754671173096,138.37387084960938]},{"page":37,"text":"appropriate actions. The unit initiates direct and indirect fires to gain the initiative if it is appropriate to engage","rect":[108.00000762939453,159.0050048828125,540.1306428985596,149.89682006835938]},{"page":37,"text":"enemy forces. If the action is to attack, the unit in contact immediately attacks if it has sufficient, immediately","rect":[108.00000762939453,170.52801513671876,540.0944728851318,161.41983032226563]},{"page":37,"text":"available combat power to overwhelm the enemy force. If the action is to defend or withdraw the unit in","rect":[108.00000762939453,181.99090576171876,539.8669338226318,172.88272094726563]},{"page":37,"text":"contact does so while maintaining contact and continuing to gain as much information as possible about the","rect":[108.00000762939453,193.513916015625,539.9458894805908,184.40573120117188]},{"page":37,"text":"enemy forces disposition and positions. If the action is to bypass the enemy, the unit in contact maintains","rect":[108.00000762939453,205.03692626953126,539.8669574241638,195.92874145507813]},{"page":37,"text":"contact and continues their mission. Unless specifically told by their higher headquarters to break contact,","rect":[108.0,216.499755859375,539.8897047042847,207.39157104492188]},{"page":37,"text":"the unit in contact will maintain contact no matter which action is chosen. Regardless of the chosen action,","rect":[108.0,228.02276611328126,540.0924024581909,218.91458129882813]},{"page":37,"text":"reporting to the next higher echelon is required to ensure the unit is staying within the commander’s intent.","rect":[107.99996185302735,239.48565673828126,535.6012525558472,230.37747192382813]},{"page":37,"text":"Tactical Mission Tasks","rect":[90.0,261.8627014160156,197.53699740982055,254.27552795410157]},{"page":37,"text":"1-84. A task is a clearly defined action or activity specifically assigned to an individual or organization, or","rect":[108.0,281.63427734375,540.0174462852478,272.5260925292969]},{"page":37,"text":"derived during mission analysis, that must be done as it is imposed by an appropriate authority (JP 1, Vol 1).","rect":[107.98999786376953,293.15728759765627,540.0453443527222,284.0491027832031]},{"page":37,"text":"A tactical mission task is the specific activity a unit performs while executing a tactical operation or","rect":[108.00003814697266,304.6201477050781,539.9775056915283,295.67230224609377]},{"page":37,"text":"form of maneuver. Tactical mission tasks are used as components of a mission statement or given as tasks","rect":[108.0,316.1431579589844,540.0511004905701,307.03497314453127]},{"page":37,"text":"to subordinate units. While all tactical mission tasks are defined, most have a symbol. Appendix B lists","rect":[107.99999237060547,327.6661682128906,539.9040057640076,318.5579833984375]},{"page":37,"text":"tactical mission tasks, their definitions, and shows their associated symbol.","rect":[107.99999237060547,339.1290283203125,407.3775587081909,330.0208435058594]},{"page":37,"text":"1-85. Tactical mission tasks are essential in the development of a mission statement. A mission statement is","rect":[107.98994445800781,356.63397216796877,540.0363910179138,347.54583740234377]},{"page":37,"text":"a short sentence or paragraph that describes the organization’s essential task(s), purpose, and action","rect":[107.9800033569336,368.1169128417969,539.9542751312256,359.00872802734377]},{"page":37,"text":"containing the elements of who, what, when, where, and why (JP 5-0). The “what” is either a task or a type","rect":[107.9800033569336,379.639892578125,539.9761018829346,370.5317077636719]},{"page":37,"text":"of operation or both and is expressed in terms of action verbs. For example, a higher headquarters can assign","rect":[107.9800033569336,391.16290283203127,540.0121974945068,382.0547180175781]},{"page":37,"text":"a subordinate unit to conduct an area defense and block the enemy to prevent the enemy from crossing a","rect":[107.98999786376953,402.62579345703127,539.9060335235596,393.5176086425781]},{"page":37,"text":"phase line. The purpose or the why of the mission statement is interconnected to the tactical task. The “why”","rect":[107.99000549316406,414.1487731933594,540.0050325469971,405.04058837890627]},{"page":37,"text":"provides the reason the unit is to execute the task and the method the unit contributes to the higher echelon’s","rect":[107.99000549316406,425.6717529296875,540.0460345726013,416.5635681152344]},{"page":37,"text":"headquarters. The purpose is critical in the formation of the mission statement. (See ATP 5-0.2-2 for an","rect":[107.99000549316406,437.1145935058594,539.9341945648193,428.0264587402344]},{"page":37,"text":"example list of purposes.)","rect":[107.96995544433594,448.6376037597656,211.26616454696657,439.5494689941406]},{"page":37,"text":"Multinational Operations Considerations","rect":[90.0,473.21875,283.7344461402893,463.4355773925781]},{"page":37,"text":"1-86. Army forces can expect to operate with multinational partners. Multinational operations is a collective","rect":[108.0,490.73431396484377,539.9521761016846,481.6261291503906]},{"page":37,"text":"term to describe military actions conducted by forces of two or more nations, usually undertaken within the","rect":[108.0,502.25732421875,540.0700960235596,493.1491394042969]},{"page":37,"text":"structure of a coalition or alliance (JP 3-16). Multinational operations present opportunities including—","rect":[108.0,513.7803344726563,522.7177543640137,504.672119140625]},{"page":37,"text":" Providing international legitimacy that helps isolate adversary or enemy forces.","rect":[133.1999969482422,527.2742919921875,468.88225841522219,518.1661376953125]},{"page":37,"text":" Partners may have different authorities allowing them to employ capabilities in multiple domains.","rect":[133.1999969482422,540.7742919921875,540.1292676925659,531.6661376953125]},{"page":37,"text":" Providing additional combat forces who may possess capabilities the joint force may lack.","rect":[133.1999969482422,554.2742919921875,511.9540967941284,545.1560668945313]},{"page":37,"text":"1-87.","rect":[108.00376892089844,569.715087890625,128.86540508270265,562.8113403320313]},{"page":37,"text":"Multinational operational operations also include numerous challenges including—","rect":[133.20407104492188,571.7391357421875,466.7999687194824,562.6309814453125]},{"page":37,"text":" Language issues.","rect":[133.1999969482422,585.2343139648438,219.52337169647218,576.1261596679688]},{"page":37,"text":" National caveats on the use of forces, rules of engagement, authorities, and approval to share","rect":[133.1999969482422,598.7343139648438,540.0691804962158,589.6261596679688]},{"page":37,"text":"information and intelligence.","rect":[151.1999969482422,610.25732421875,267.04021739959719,601.149169921875]},{"page":37,"text":" Interoperability concerns.","rect":[133.1999969482422,623.7542724609375,253.96410655975343,614.6461181640625]},{"page":37,"text":"1-88. Interoperability is the ability to act together coherently, effectively, and efficiently to achieve tactical,","rect":[108.00376892089844,641.279296875,539.9286451339722,632.171142578125]},{"page":37,"text":"operational, and strategic objectives (JP 3-0). The Army’s approach to interoperability encompasses all","rect":[108.00376892089844,652.7421875,540.0182261428834,643.6239624023438]},{"page":37,"text":"components and operational domains. This approach facilitates the ability of Army forces to operate with","rect":[108.00376892089844,664.26513671875,540.0190944671631,655.156982421875]},{"page":37,"text":"other unified action partners, including multinational partners. To increase multinational interoperability the","rect":[108.00376892089844,675.7881469726563,540.0127229766846,666.6799926757813]},{"page":37,"text":"Army participates in numerous bilateral and multilateral activities. Some of these activities result in","rect":[108.00376892089844,687.2510375976563,540.0282497406006,678.1428833007813]},{"page":37,"text":"standardization agreements or doctrine. These products serve as a baseline for cooperation among","rect":[108.00376892089844,698.7740478515625,539.9923610687256,689.6658935546875]},{"page":37,"text":"multinational partners. For tactical Army forces, these products can be transparent. For example, Army forces","rect":[108.00379943847656,710.2970581054688,540.0890643577576,701.1889038085938]},{"page":37,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":37,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":37,"text":"1-15","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":38,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":38,"text":"operating as part of the multinational North Atlantic Treaty Organization use the same military operational","rect":[90.0,83.51434326171875,522.0622324905396,74.40616607666016]},{"page":38,"text":"symbols as their multinational partners. These agreements streamline sharing and communicating graphic","rect":[90.0,94.97723388671875,521.9773225860596,85.86905670166016]},{"page":38,"text":"operational information such as overlays among members.","rect":[90.0,106.500244140625,324.1083936691284,97.3920669555664]},{"page":38,"text":"1-89. Situations may arise where Army forces execute operations with multinational partners without an","rect":[90.0,124.02520751953125,521.8858547210693,114.91703033447266]},{"page":38,"text":"existing standardization agreement. This is most likely to occur during ad-hoc multinational operations.","rect":[89.98998260498047,135.48809814453126,522.0233716964722,126.37992095947266]},{"page":38,"text":"During these situations units must rely on liaison officers, clear and uncomplicated orders, and sharing sound","rect":[89.97997283935547,147.0111083984375,521.9482326507568,137.90292358398438]},{"page":38,"text":"tactical advice with their partners. Whenever possible, units take advantage of opportunities to train with","rect":[89.97997283935547,158.5340576171875,521.8641262054443,149.42587280273438]},{"page":38,"text":"multinational forces to increase their skills in executing multinational operations. (See FM 3-16 for more","rect":[89.97997283935547,169.9969482421875,522.0403719024658,160.88876342773438]},{"page":38,"text":"information on multinational operations.)","rect":[89.96991729736328,181.4999237060547,255.49030089950564,172.41177368164063]},{"page":38,"text":"MOVEMENT AND MANEUVER WARFIGHTING FUNCTION","rect":[72.0,204.88796997070313,347.215744972229,196.77597045898438]},{"page":38,"text":"1-90. The movement and maneuver warfighting function is the related tasks and systems that move and","rect":[90.0,224.7542724609375,521.9603176116943,215.64608764648438]},{"page":38,"text":"employ forces to achieve a position of relative advantage over the enemy and other threats (ADP 3-0). Direct","rect":[90.0,236.27728271484376,522.0203623733521,227.16909790039063]},{"page":38,"text":"fire and close combat are inherent in maneuver. The movement and maneuver warfighting function includes","rect":[90.00003814697266,247.80029296875,522.0571429710388,238.69210815429688]},{"page":38,"text":"tasks associated with force projection. Movement is necessary to disperse and displace the force as a whole","rect":[90.00003814697266,259.26318359375,522.0498933868408,250.14498901367188]},{"page":38,"text":"or in part when maneuvering. Maneuver directly gains or exploits positions of relative advantage to","rect":[90.00003814697266,270.7861328125,522.0222682952881,261.6779479980469]},{"page":38,"text":"accomplish the mission.","rect":[90.0,282.2890930175781,186.4024305343628,273.2009582519531]},{"page":38,"text":"1-91.","rect":[90.0,297.7499694824219,110.8616361618042,290.84619140625]},{"page":38,"text":"The movement and maneuver warfighting function includes these tasks:","rect":[115.20030212402344,299.7740173339844,403.5268931350708,290.66583251953127]},{"page":38,"text":" Move.","rect":[115.19999694824219,311.2302551269531,159.04258251190186,304.4667663574219]},{"page":38,"text":" Maneuver.","rect":[115.19999694824219,324.7302551269531,176.26294994354249,317.9667663574219]},{"page":38,"text":" Employ direct fires.","rect":[115.19999694824219,340.2543029785156,212.92515087127686,331.1461181640625]},{"page":38,"text":" Occupy an area.","rect":[115.19999694824219,353.7543029785156,197.86107921600343,344.81646728515627]},{"page":38,"text":" Conduct mobility and countermobility.","rect":[115.19999694824219,367.2543029785156,289.3035840988159,358.1461181640625]},{"page":38,"text":" Conduct reconnaissance and surveillance.","rect":[115.19999694824219,378.74029541015627,300.4557752609253,371.6461181640625]},{"page":38,"text":" Employ battlefield obscuration.","rect":[115.19999694824219,394.2543029785156,259.6043348312378,385.1461181640625]},{"page":38,"text":"Local Security","rect":[72.0,418.8807067871094,140.1429843902588,409.0755920410156]},{"page":38,"text":"1-92. Local securityis the low-level security activities conducted near a unit to prevent surprise by the enemy","rect":[90.0,436.4342956542969,522.0510768890381,427.32611083984377]},{"page":38,"text":"(ADP 3-90). It includes any local measure taken by all friendly units against enemy actions to prevent a unit","rect":[90.00000762939453,447.8971862792969,522.0903696975709,438.78900146484377]},{"page":38,"text":"from being surprised and is an important part of maintaining the initiative. It involves avoiding enemy","rect":[90.01005554199219,459.4201965332031,521.9664211273193,450.3119812011719]},{"page":38,"text":"detection or deceiving enemy forces about friendly positions and intentions. It also includes finding any","rect":[90.01000213623047,470.94317626953127,521.9000759124756,461.8349914550781]},{"page":38,"text":"enemy forces in the immediate vicinity and knowing as much as possible about the enemy force’s positions","rect":[90.00997924804688,482.40606689453127,522.0049579124451,473.2978820800781]},{"page":38,"text":"and intentions. Local security prevents a unit from being surprised, and it is an important part of maintaining","rect":[90.00997924804688,493.9290466308594,522.0480861663818,484.82086181640627]},{"page":38,"text":"the initiative. All units perform local security when conducting operations.","rect":[90.00997924804688,505.4520568847656,388.49282360076907,496.3438720703125]},{"page":38,"text":"1-93. Units use both active and passive measures to provide local security. Active measures include using","rect":[90.00997924804688,522.9169311523438,521.9498195648193,513.8087768554688]},{"page":38,"text":"observation posts and patrols, establishing specific levels of alert in the unit, and establishing SOPs detailing","rect":[90.01000213623047,534.43994140625,522.0434474945068,525.331787109375]},{"page":38,"text":"alert procedures. Passive local security measures include using camouflage, movement control, noise and","rect":[90.01005554199219,545.962890625,522.0061550140381,536.854736328125]},{"page":38,"text":"light discipline, electromagnetic protection, and proper communications procedures. They also include","rect":[90.01005554199219,557.42578125,522.0672884063721,548.317626953125]},{"page":38,"text":"employing available sensors, night vision devices, and daylight sights to maintain surveillance over the","rect":[90.01005554199219,568.9487915039063,522.0024690704346,559.8406372070313]},{"page":38,"text":"immediate area.","rect":[90.00004577636719,578.44775390625,153.87855052947999,571.3636474609375]},{"page":38,"text":"Reserve","rect":[72.0,602.7827758789063,109.21999894714355,595.3712768554688]},{"page":38,"text":"1-94. A reserve is that portion of a body of troops that is withheld from action at the beginning of an","rect":[90.0,622.5543212890625,522.0123195648193,613.4461669921875]},{"page":38,"text":"engagement to be available for a decisive movement (ADP 3-90). Commanders employ their reserves to","rect":[90.0,634.0772705078125,521.9634914398193,624.9691162109375]},{"page":38,"text":"exploit success or prevent failure. A reserve provides the unit flexibility by responding to unexpected","rect":[90.0,645.5401611328125,521.8987941741943,636.4320068359375]},{"page":38,"text":"situations and enables friendly forces to exploit or regain the initiative quickly because it is an uncommitted","rect":[90.0,657.0631713867188,521.9761257171631,647.9550170898438]},{"page":38,"text":"force. Once committed, a reserve’s actions normally become or reinforce the echelon’s main effort. Often a","rect":[90.01000213623047,668.586181640625,521.9949617462158,659.47802734375]},{"page":38,"text":"commander’s most difficult and important decision concerns the time, place, and circumstances for","rect":[90.01000213623047,680.029052734375,522.0501000938416,670.94091796875]},{"page":38,"text":"committing the reserve. Commanders do not employ their reserve as a follow and support force or a follow","rect":[90.01001739501953,691.572021484375,521.9803509750366,682.4638671875]},{"page":38,"text":"and assume force. Other considerations for commanders are not placing artillery and other fire support","rect":[89.9999771118164,703.0950317382813,522.0007090530396,693.9868774414063]},{"page":38,"text":"1-16","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":38,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":38,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":39,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.95858984375,38.016021728515628]},{"page":39,"text":"systems and reconnaissance assets in reserve. Such systems committed to echelon support operations are not","rect":[108.0,83.51434326171875,540.0323862991334,74.40616607666016]},{"page":39,"text":"in reserve.","rect":[108.01005554199219,92.95319366455078,149.69326305389405,85.86905670166016]},{"page":39,"text":"1-95. Units also plan how to reconstitute their reserves after commitment of their original reserves. A higher","rect":[108.01005554199219,112.4921875,540.0613915977478,103.3840103149414]},{"page":39,"text":"unit can designate a subordinate unit’s reserves as its new echelon reserve or assign another subordinate unit","rect":[108.00003051757813,124.01519775390625,539.9797129592896,114.90702056884766]},{"page":39,"text":"to assume the mission of the reserve. Units have more flexibility and can take greater risk in employing their","rect":[108.0,135.47808837890626,540.0432031211853,126.36991119384766]},{"page":39,"text":"reserves if their higher echelon headquarters has not committed its reserve. Units never develop a course of","rect":[108.0,147.00103759765626,539.9150903282166,137.89285278320313]},{"page":39,"text":"action (COA) that assumes the use of a higher echelons reserve.","rect":[107.99996185302735,158.5240478515625,363.77349376678469,149.41586303710938]},{"page":39,"text":"1-96. Commander’s generally place their reserve where they can easily reinforce the main effort and","rect":[108.00997924804688,175.98895263671876,540.0746974945068,166.88076782226563]},{"page":39,"text":"whenever possible, beyond the enemy force’s direct fire range. Commanders decide whether to orient their","rect":[108.00997924804688,187.51190185546876,539.9882714805603,178.40371704101563]},{"page":39,"text":"reserves on their most likely mission or their most important mission when deciding where to place their","rect":[108.00997924804688,199.034912109375,539.8889672813416,189.92672729492188]},{"page":39,"text":"reserves. They generally position their reserves to the rear of their units, in a location that provides maximum","rect":[108.00997924804688,210.497802734375,540.0412268600464,201.38961791992188]},{"page":39,"text":"protection from enemy observation and fire. Units consider several factors when determining the exact","rect":[108.00997924804688,222.02081298828126,540.0884165725709,212.91262817382813]},{"page":39,"text":"location for their reserves. These factors include:","rect":[108.00997924804688,231.45960998535157,303.8077769241333,224.37545776367188]},{"page":39,"text":"","rect":[133.1999969482422,244.22543334960938,139.16105696249009,239.53318786621095]},{"page":39,"text":"","rect":[133.1999969482422,257.7254333496094,139.16105696249009,253.03318786621095]},{"page":39,"text":"","rect":[133.1999969482422,271.2254333496094,139.16105696249009,266.5331726074219]},{"page":39,"text":"","rect":[133.1999969482422,284.7254333496094,139.16105696249009,280.0331726074219]},{"page":39,"text":"","rect":[133.1999969482422,298.2254333496094,139.16105696249009,293.5331726074219]},{"page":39,"text":"","rect":[133.1999969482422,311.7254333496094,139.16105696249009,307.0331726074219]},{"page":39,"text":"Orientating on their most likely mission or their most important mission.","rect":[151.1999969482422,246.95428466796876,442.00823497772219,237.84609985351563]},{"page":39,"text":"Response time to various planning priorities.","rect":[151.1999969482422,260.45428466796877,330.65117931365969,251.34609985351563]},{"page":39,"text":"Access to main supply routes (MSRs).","rect":[151.1999969482422,273.95428466796877,305.14727306365969,264.8460998535156]},{"page":39,"text":"Locations of probable enemy penetrations.","rect":[151.1999969482422,287.45428466796877,322.0019178390503,278.3460998535156]},{"page":39,"text":"Terrain.","rect":[151.1999969482422,298.93023681640627,183.16379833221436,291.8460998535156]},{"page":39,"text":"Availability of cover and concealment.","rect":[151.1999969482422,314.45428466796877,307.0040235519409,305.3460998535156]},{"page":39,"text":"Initially units may position their reserves in forward locations to deceive enemy forces and obscure","rect":[151.1999969482422,327.95123291015627,539.9887971954346,318.8430480957031]},{"page":39,"text":"subordinate unit boundaries. Obscuring subordinate unit boundaries is especially important for","rect":[151.1999969482422,339.4742126464844,539.9558007774353,330.36602783203127]},{"page":39,"text":"dissimilar units such as armored and dismounted infantry.","rect":[151.1999969482422,350.9972229003906,382.8435010910034,341.8890380859375]},{"page":39,"text":"1-97. Units can task-organize their reserves into small elements and position them where they can react","rect":[108.00376892089844,368.46209716796877,540.0412974319459,359.3539123535156]},{"page":39,"text":"quickly to local combat developments in restrictive terrain that lacks movement routes. This dispersion","rect":[107.99375915527344,379.9850769042969,539.8958034515381,370.87689208984377]},{"page":39,"text":"provides increased protection, but it reduces the ability of a reserve to mass fires. Units look for the","rect":[107.9937515258789,391.5080871582031,540.0483675079346,382.39990234375]},{"page":39,"text":"availability of covered lateral and forward high-speed deployment routes for their reserves. These reserves","rect":[107.9937515258789,402.970947265625,539.9640033226013,393.8627624511719]},{"page":39,"text":"require movement priority along those routes when they are committed. Units ensure the maintenance of","rect":[107.99378204345703,414.49395751953127,540.0623681602478,405.3857727050781]},{"page":39,"text":"communications between these dispersed elements. This may require establishing retransmission nodes for","rect":[107.99378204345703,426.0169677734375,539.8663232383728,416.9087829589844]},{"page":39,"text":"combat net radios. Units maintain centrally located reserves positioned somewhat farther from the FLOT in","rect":[107.99378204345703,437.4798583984375,540.0121364593506,428.3716735839844]},{"page":39,"text":"open terrain. An enemy forces’ potential to employ weapons of mass destruction and conduct air interdiction","rect":[107.99378967285156,449.0028381347656,540.0429592132568,439.8946533203125]},{"page":39,"text":"are other factors commanders consider when deciding where to position their reserves.","rect":[107.99378967285156,460.4656982421875,454.59575939178469,451.3575134277344]},{"page":39,"text":"1-98. Units position their reserves beyond the enemy force’s direct fire range whenever possible. This is","rect":[107.99378967285156,477.99072265625,539.9680926780701,468.8825378417969]},{"page":39,"text":"easier to achieve at higher echelons than at lower echelons. Each reserve element takes defensive measures","rect":[107.99378967285156,489.5137023925781,539.9814593772888,480.405517578125]},{"page":39,"text":"to prevent its acquisition and attack by enemy indirect fire systems. These measures include camouflage,","rect":[107.99378967285156,500.9765625,539.9191236495972,491.8683776855469]},{"page":39,"text":"local security, and control of electronic emissions.","rect":[107.99378967285156,512.4995727539063,309.0380506515503,503.3913879394531]},{"page":39,"text":"1-99. A reserve must be able to move quickly to different locations in response to different contingencies.","rect":[107.99378967285156,530.0245361328125,539.9397535324097,520.9163818359375]},{"page":39,"text":"For example, a quick reaction force is a type of reserve used during stability operations. A quick reaction","rect":[107.99378967285156,541.4874267578125,540.0341329498291,532.3792724609375]},{"page":39,"text":"force is a commander designated force to respond to threat attacks or emergencies. For armored and","rect":[107.98381042480469,553.0104370117188,539.9430446624756,543.9022827148438]},{"page":39,"text":"Stryker reserves, an important consideration is cross-country mobility or road networks. For dismounted","rect":[107.98385620117188,564.533447265625,539.9426784515381,555.42529296875]},{"page":39,"text":"infantry forces, the key considerations are the existing road networks, the availability of ground and air","rect":[107.98370361328125,575.996337890625,540.0558984336853,566.8881225585938]},{"page":39,"text":"transportation, or the availability of pickup and landing zones for use by supporting assets that enable the","rect":[107.98373413085938,587.5193481445313,539.9496126251221,578.4111938476563]},{"page":39,"text":"reserve to conduct air assault operations. This is easier to achieve at higher echelons than at lower echelons.","rect":[107.98373413085938,599.0423583984375,540.0261182785034,589.9342041015625]},{"page":39,"text":"Each reserve element takes defensive measures to prevent its acquisition and attack by enemy indirect fire","rect":[107.98373413085938,610.5052490234375,539.9824495391846,601.3970947265625]},{"page":39,"text":"systems. These measures include camouflage, local security, and control of electromagnetic emissions.","rect":[107.98373413085938,622.0281982421875,519.7912549972534,612.9200439453125]},{"page":39,"text":"1-100. When issuing orders, commanders assign the reserve the task of “reserve” and assign it priorities for","rect":[107.98373413085938,639.55322265625,540.0399072227478,630.445068359375]},{"page":39,"text":"planning, which is unlike other subordinate elements that are assigned a tactical mission task and purpose.","rect":[107.98373413085938,651.01611328125,539.9830884933472,641.907958984375]},{"page":39,"text":"Commanders assign no more than three planning priorities based on the probability they could happen and","rect":[107.98373413085938,662.5390625,540.0398464202881,653.430908203125]},{"page":39,"text":"time to prepare. Commitment of the reserve is listed on the commander’s decision support matrix and","rect":[107.98373413085938,674.0421142578125,540.0551662445068,664.9539794921875]},{"page":39,"text":"decision support table.","rect":[107.98373413085938,685.5050048828125,198.27297496795655,676.4168701171875]},{"page":39,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":39,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":39,"text":"1-17","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":40,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":40,"text":"Daylight Operations","rect":[72.0,84.62071228027344,167.64457187271118,74.81556701660156]},{"page":40,"text":"1-101. Daylight operations allow friendly forces to use their equipment while facilitating control of their","rect":[90.0,102.11431884765625,522.0132958946228,93.00614166259766]},{"page":40,"text":"maneuver. They are psychologically and physically the least stressful on the units. Also, the unit can control","rect":[89.9999771118164,113.6373291015625,522.0229868850709,104.5291519165039]},{"page":40,"text":"movement more easily when all subordinates can see one another. Two major disadvantages to daylight","rect":[89.9999771118164,125.16033935546875,522.0561289749146,116.04214477539063]},{"page":40,"text":"operations are enemy forces can use their weapon systems more effectively to oppose friendly forces and","rect":[89.9999771118164,136.6231689453125,521.9976100921631,127.5149917602539]},{"page":40,"text":"friendly forces neutralize any technical overmatch they have for operations during limited visibility.","rect":[89.9999771118164,148.14617919921876,490.1247205734253,139.03799438476563]},{"page":40,"text":"Limited-Visibility Operations","rect":[72.0,172.76072692871095,211.03312167739868,162.95558166503907]},{"page":40,"text":"1-102. There are two general limited-visibility conditions: those in which technology, such as thermal","rect":[90.0,190.3143310546875,522.0061411819459,181.20614624023438]},{"page":40,"text":"sights, can overcome or partially overcome, and those that such technology cannot overcome. The first","rect":[89.98998260498047,201.7772216796875,522.0552134475709,192.66903686523438]},{"page":40,"text":"category includes darkness. The second category includes dense battlefield dust, smoke, heavy rain, snow,","rect":[89.98998260498047,213.30023193359376,521.9933423995972,204.19204711914063]},{"page":40,"text":"fog, or any other conditions that artificial illumination, image intensification, radar, or other sensors cannot","rect":[89.98998260498047,224.7630615234375,522.0303111038209,215.65487670898438]},{"page":40,"text":"partially overcome.","rect":[89.98998260498047,236.28607177734376,167.7942762374878,227.17788696289063]},{"page":40,"text":"1-103. The mission variables normally require an operation conducted during limited visibility to be more","rect":[89.98998260498047,253.801025390625,522.0502595977783,244.69284057617188]},{"page":40,"text":"deliberate than in daylight operations. The exception is when an attack occurs as part of the follow up to a","rect":[89.9800033569336,265.263916015625,521.9329500274658,256.1556701660156]},{"page":40,"text":"daylight attack or as part of an exploitation or pursuit. Units planning night attacks consider how limited","rect":[89.9799575805664,276.78692626953127,521.9699611663818,267.6787414550781]},{"page":40,"text":"visibility complicates controlling units, Soldiers, and fires. Limited visibility also complicates identifying","rect":[89.9799575805664,288.3099365234375,521.9289455413818,279.2017517089844]},{"page":40,"text":"and engaging targets; navigating and moving without detection; locating, treating, and evacuating casualties;","rect":[89.96994018554688,299.7728271484375,521.9483408889771,290.6646423339844]},{"page":40,"text":"and locating, bypassing, or breaching obstacles.","rect":[89.96990203857422,311.2958068847656,281.05242443084719,302.1876220703125]},{"page":40,"text":"1-104. Trained forces equipped for limited-visibility operations have significant advantages over enemy","rect":[89.96994018554688,328.810791015625,521.9711208343506,319.7026062011719]},{"page":40,"text":"forces that are unprepared for limited-visibility operations. Examples of limited-visibility operations are","rect":[89.95992279052735,340.2736511230469,521.9041414337158,331.16546630859377]},{"page":40,"text":"nighttime, weather (blizzards, sandstorms, and heavy rain), and thick vegetation. When enemy forces have","rect":[89.95994567871094,351.796630859375,522.0375642852783,342.6884460449219]},{"page":40,"text":"increased their limited-visibility capabilities, friendly forces must emphasize noise and light discipline during","rect":[89.95994567871094,363.31964111328127,522.0029201507568,354.2114562988281]},{"page":40,"text":"limited-visibility operations. For example, Soldiers who leave their laser sights on increase the likelihood of","rect":[89.9499282836914,374.78253173828127,521.9822290000916,365.6743469238281]},{"page":40,"text":"revealing their position and losing the element of surprise. Table 1-1 on page 1-19 outlines the advantages","rect":[89.94990539550781,386.3055419921875,521.9322040061951,377.1973571777344]},{"page":40,"text":"and disadvantages of conducting limited-visibility attacks.","rect":[89.93987274169922,397.82855224609377,323.26360607147219,388.7203674316406]},{"page":40,"text":"1-105. The organization of forces for a limited-visibility operation is the same during daylight operations.","rect":[89.93987274169922,415.29339599609377,521.8861036300659,406.1852111816406]},{"page":40,"text":"However, changing an existing task organization under limited-visibility conditions typically requires more","rect":[89.91983032226563,426.81640625,522.0494051055908,417.7082214355469]},{"page":40,"text":"time and effort than it does during daylight operations.","rect":[89.91983032226563,438.3393859863281,308.4840040206909,429.231201171875]},{"page":40,"text":"1-106. Non-illuminated attacks offer the best chance of gaining surprise. However, units plan for","rect":[89.91983032226563,455.80426025390627,521.9621484336853,446.6960754394531]},{"page":40,"text":"illumination for every limited-visibility operation, so that it is readily available if required. Units can choose","rect":[89.90980529785156,467.3272399902344,521.9748811798096,458.21905517578127]},{"page":40,"text":"to conduct a non-illuminated operation until subordinate forces make contact with enemy forces. At that","rect":[89.8997802734375,478.79010009765627,521.8979868850709,469.6819152832031]},{"page":40,"text":"point, they can direct the illumination of the objective. Enemy units can also choose to employ illumination","rect":[89.8997802734375,490.3131103515625,521.8668117523193,481.1949157714844]},{"page":40,"text":"to increase the effectiveness of their efforts. All leaders within an attacking unit must understand the time,","rect":[89.8997802734375,501.83612060546877,521.7717237472534,492.7279357910156]},{"page":40,"text":"conditions, and employment authority for illumination.","rect":[89.8997802734375,513.2990112304688,310.1442518234253,504.1908264160156]},{"page":40,"text":"1-107.","rect":[89.8997802734375,528.7999267578125,115.74135875701905,521.8961791992188]},{"page":40,"text":"","rect":[115.19999694824219,541.525390625,121.16105696249008,536.8331909179688]},{"page":40,"text":"","rect":[115.19999694824219,555.025390625,121.16105696249008,550.3331909179688]},{"page":40,"text":"","rect":[115.19999694824219,568.525390625,121.16105696249008,563.8331909179688]},{"page":40,"text":"","rect":[115.19999694824219,593.54541015625,121.16105696249008,588.8532104492188]},{"page":40,"text":"","rect":[115.19999694824219,618.5054321289063,121.16105696249008,613.813232421875]},{"page":40,"text":"","rect":[115.19999694824219,632.0054321289063,121.16105696249008,627.313232421875]},{"page":40,"text":"","rect":[115.19999694824219,645.5054321289063,121.16105696249008,640.813232421875]},{"page":40,"text":"Units plan for limited-visibility operations as they do for daylight operations while emphasizing—","rect":[124.44874572753906,530.823974609375,518.4032096862793,521.7158203125]},{"page":40,"text":"Keeping the plan simple.","rect":[133.1999969482422,544.2542724609375,233.20360851287843,535.1461181640625]},{"page":40,"text":"Taking additional time for reconnaissance.","rect":[133.1999969482422,557.7542724609375,304.0650587081909,548.6461181640625]},{"page":40,"text":"Taking advantage of easily identifiable terrain features, such as roads and railroad tracks, when","rect":[133.1999969482422,571.2542724609375,522.0311183929443,562.1461181640625]},{"page":40,"text":"establishing control measures.","rect":[133.1999969482422,582.7772827148438,254.02419567108155,573.6691284179688]},{"page":40,"text":"Using intermediate objectives as necessary to control and maintain the correct movement direction","rect":[133.1999969482422,596.2742919921875,522.0701198577881,587.1560668945313]},{"page":40,"text":"during the attack.","rect":[133.1999969482422,607.7371826171875,202.96125316619874,598.6290283203125]},{"page":40,"text":"Concealing preparations.","rect":[133.1999969482422,621.2343139648438,233.20765209197999,612.1261596679688]},{"page":40,"text":"Scheduling initial rehearsals during daylight, with the final rehearsal at night.","rect":[133.1999969482422,634.7343139648438,442.54546642303469,625.6261596679688]},{"page":40,"text":"Positioning security elements.","rect":[133.1999969482422,648.2343139648438,253.48510265350343,639.1261596679688]},{"page":40,"text":"1-18","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":40,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":40,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":41,"text":"Table 1-1. Considerations for limited-visibility operations","rect":[179.9399871826172,83.51416015625,449.9820089263916,74.12541961669922]},{"page":41,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":41,"text":"1-108. Units establish control measures to facilitate visualizing, describing, and directing subordinate and","rect":[108.0,529.3143310546875,539.9371242523193,520.2061767578125]},{"page":41,"text":"supporting forces during limited-visibility operations. Units also take advantage of the technical capabilities","rect":[108.0,540.8372802734375,539.9309222679138,531.7291259765625]},{"page":41,"text":"of advanced equipment as they become available.","rect":[107.98998260498047,552.3001708984375,306.5683546066284,543.1920166015625]},{"page":41,"text":"1-109. Absent positive information to the contrary, units must assume that enemy forces possess the same","rect":[107.98998260498047,569.8251953125,540.0431795196533,560.717041015625]},{"page":41,"text":"limited-visibility observation capabilities as friendly forces when conducting a limited-visibility operations.","rect":[107.97996520996094,581.34814453125,540.0123243331909,572.239990234375]},{"page":41,"text":"Using terrain to mask movement and deployment remains critical because limited visibility may create a","rect":[107.96991729736328,592.81103515625,540.0003938751221,583.702880859375]},{"page":41,"text":"false sense of protection from enemy observation. During movement, leaders reduce the distances between","rect":[107.96991729736328,604.3340454101563,539.9532985687256,595.2258911132813]},{"page":41,"text":"vehicles or individual Soldiers as necessary to allow one system or Soldier to observe the other. This","rect":[107.96991729736328,615.7969360351563,539.9508807640076,606.6887817382813]},{"page":41,"text":"decreases the time necessary to react to enemy contact.","rect":[107.96991729736328,627.3199462890625,328.20354747772219,618.2117919921875]},{"page":41,"text":"Movement","rect":[90.0,649.7027587890625,140.0446455116272,642.291259765625]},{"page":41,"text":"1-110. In the context of Army tactics, movement is the positioning of combat power to establish the","rect":[108.0,669.4743041992188,540.0514192657471,660.3661499023438]},{"page":41,"text":"conditions for maneuver (ADP 3-90). The distinction between movement and maneuver is whether or not","rect":[107.99002075195313,680.9171752929688,539.9903941116334,671.8290405273438]},{"page":41,"text":"friendly forces are moving in conjunction with friendly direct or established indirect fire support. A friendly","rect":[107.99002075195313,692.460205078125,539.9596462249756,683.3419799804688]},{"page":41,"text":"force chooses a movement technique based on the threat prior to enemy contact. To direct movement, Army","rect":[107.98999786376953,703.983154296875,540.0203762054443,694.875]},{"page":41,"text":"forces use the movement techniques, movement formations, and battle drills to mitigate the risk of making","rect":[107.98998260498047,715.446044921875,539.9769191741943,706.337890625]},{"page":41,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":41,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":41,"text":"1-19","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":42,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":42,"text":"contact with the enemy before maneuvering. (See Chapter 2 for more information on movement techniques","rect":[90.0,83.51434326171875,522.0043475608826,74.40616607666016]},{"page":42,"text":"and formations.)","rect":[90.01001739501953,94.95719909667969,156.10193420028689,85.86905670166016]},{"page":42,"text":"Employment of Direct Fires","rect":[72.0,119.60069274902344,202.99796542739868,109.79554748535156]},{"page":42,"text":"1-111. A field of fire is the area that a weapon or group of weapons may cover effectively from a given","rect":[90.0,137.154296875,522.0653829498291,128.20643615722657]},{"page":42,"text":"position. In selecting a position, a unit must balance how the field of fire will best gain an advantage while","rect":[90.01001739501953,148.6171875,522.0152254180908,139.50900268554688]},{"page":42,"text":"simultaneously providing cover and mitigating the effect of the enemy’s weapons systems.","rect":[90.01001739501953,160.14019775390626,453.2350721359253,151.03201293945313]},{"page":42,"text":"1-112. Fire control measures are the means by which leaders control direct fires. Application of these","rect":[90.01001739501953,177.6651611328125,522.0554475860596,168.55697631835938]},{"page":42,"text":"concepts, procedures, and techniques helps the unit acquire the enemy, focus fires on the enemy, distribute","rect":[90.0,189.1280517578125,521.9699983673096,180.01986694335938]},{"page":42,"text":"the results of the fires, and prevent fratricide. At the same time, no single measure suffices to control fires","rect":[90.0,200.65106201171876,522.0524432640076,191.54287719726563]},{"page":42,"text":"effectively. Common fire control measures are—","rect":[90.0,212.174072265625,286.6134452819824,203.06588745117188]},{"page":42,"text":" Target reference point.","rect":[115.19999694824219,225.654296875,224.56435680389405,216.54611206054688]},{"page":42,"text":" Rules of engagement.","rect":[115.19999694824219,239.154296875,220.18162059783936,230.04611206054688]},{"page":42,"text":" Engagement area.","rect":[115.19999694824219,252.654296875,204.82195568084718,243.86676025390626]},{"page":42,"text":" Sector of fire.","rect":[115.19999694824219,264.1402893066406,188.50239086151124,257.0461120605469]},{"page":42,"text":" Weapons safety posture.","rect":[115.19999694824219,279.654296875,231.22364330291749,270.55615234375]},{"page":42,"text":" Direction of fire.","rect":[115.19999694824219,291.1302490234375,200.68471813201905,284.0461120605469]},{"page":42,"text":" Weapons control status.","rect":[115.19999694824219,306.6342468261719,229.06536388397218,297.5461120605469]},{"page":42,"text":" Terrain-based quadrant.","rect":[115.19999694824219,320.1342468261719,228.7597303390503,311.0461120605469]},{"page":42,"text":" Engagement priorities.","rect":[115.19999694824219,333.654296875,224.26479625701905,324.5461120605469]},{"page":42,"text":" Friendly-based quadrant.","rect":[115.19999694824219,347.154296875,233.19561290740968,338.0461120605469]},{"page":42,"text":" Trigger.","rect":[115.19999694824219,360.59429931640627,165.7018690109253,351.4861145019531]},{"page":42,"text":" Maximum engagement line.","rect":[115.19999694824219,374.09429931640627,245.7426404953003,364.9861145019531]},{"page":42,"text":" Restrictive fire line (RFL).","rect":[115.19999694824219,387.5742492675781,240.47112560272218,378.4861145019531]},{"page":42,"text":" Final protective line (FPL).","rect":[115.19999694824219,401.0742492675781,242.67852306365968,391.9861145019531]},{"page":42,"text":" Engagement techniques.","rect":[115.19999694824219,414.59429931640627,230.98516368865968,405.4861145019531]},{"page":42,"text":" Fire patterns.","rect":[115.19999694824219,428.0742492675781,185.98437023162843,418.9861145019531]},{"page":42,"text":" Target array.","rect":[115.19999694824219,441.59429931640627,184.8420820236206,432.8067626953125]},{"page":42,"text":"Principles for Direct Fire Planning and Control","rect":[72.0,466.2206726074219,294.9840804977417,456.4155578613281]},{"page":42,"text":"1-113. Leaders apply eight fundamental principles during planning, preparing for, and executing direct","rect":[90.0,483.7743225097656,522.0585093460084,474.6661376953125]},{"page":42,"text":"fires. These principles are not to restrict the actions of subordinates but to facilitate their ability to acquire","rect":[90.0,495.2973327636719,522.0233430938721,486.18914794921877]},{"page":42,"text":"and to engage with direct fire against the threat. These principles are—","rect":[90.0,506.76019287109377,373.86274337768557,497.6520080566406]},{"page":42,"text":" Destroy the greatest threat first.","rect":[115.19999694824219,520.2542724609375,259.4851026535034,511.1460876464844]},{"page":42,"text":" Mass the effects of direct fire.","rect":[115.19999694824219,531.730224609375,253.17943859100343,524.6461181640625]},{"page":42,"text":" Employ the best weapon for the specific target.","rect":[115.19999694824219,547.2542724609375,321.9977979660034,538.1461181640625]},{"page":42,"text":" Avoid target overkill.","rect":[115.19999694824219,560.7542724609375,219.58445262908936,551.6461181640625]},{"page":42,"text":" Minimize exposure.","rect":[115.19999694824219,574.2342529296875,213.22170543670655,565.1461181640625]},{"page":42,"text":" Plan and implement control measures.","rect":[115.19999694824219,587.7342529296875,286.2434949874878,578.6461181640625]},{"page":42,"text":" Plan for limited-visibility conditions.","rect":[115.19999694824219,601.2542724609375,281.5571241378784,592.1461181640625]},{"page":42,"text":" Plan for degraded capabilities.","rect":[115.19999694824219,614.7542724609375,254.81374645233155,605.6461181640625]},{"page":42,"text":"Destroy the Greatest Threat First","rect":[72.01787567138672,638.271240234375,208.66669416046143,629.3333740234375]},{"page":42,"text":"1-114. The order in which the unit engages enemy forces directly relates to the danger they present and how","rect":[90.02381896972656,655.736083984375,522.1311688461303,646.6279296875]},{"page":42,"text":"the engagement will seize the initiative. Leaders should assess the greatest threat not only in terms of","rect":[90.0137939453125,667.2590942382813,522.0923364219666,658.1509399414063]},{"page":42,"text":"capability, but also how a given target nests within the enemy’s capabilities and desired friendly end state.","rect":[90.0137939453125,678.7821044921875,521.9698438644409,669.6739501953125]},{"page":42,"text":"The enemy forces’ threat depends on their weapons, range, and positioning in relation to and comparison to","rect":[90.01380157470703,690.2449951171875,521.9906520843506,681.1368408203125]},{"page":42,"text":"the friendly force. In general, a friendly force, when presented with multiple targets, should initially","rect":[90.01380157470703,701.7680053710938,521.9880275726318,692.6598510742188]},{"page":42,"text":"concentrate fires to destroy the greatest threat, and then distribute fires over the remainder of the enemy force.","rect":[90.01382446289063,713.291015625,522.0279493331909,704.182861328125]},{"page":42,"text":"1-20","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":42,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":42,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":43,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":43,"text":"At the tactical unit level, the greatest threat may be an enemy command and control system, which directs","rect":[108.0,83.51434326171875,539.9225604515076,74.40616607666016]},{"page":43,"text":"the fires and maneuver of the enemy force.","rect":[108.0,94.97723388671875,279.64263439178469,85.86905670166016]},{"page":43,"text":"Mass the Effects of Direct Fire","rect":[89.99405670166016,118.494140625,217.50260639953613,109.55630493164063]},{"page":43,"text":"1-115. Leader’s mass direct fires to achieve decisive results. Massing direct fires entails focusing available","rect":[107.98997497558594,136.0191650390625,540.0526399688721,126.9109878540039]},{"page":43,"text":"direct fires at critical points and distributing the effects. Random application of direct fires is unlikely to have","rect":[107.97996520996094,147.4820556640625,540.0603914337158,138.37387084960938]},{"page":43,"text":"a desired effect on the enemy.","rect":[107.97997283935547,159.0050048828125,227.9634656906128,149.89682006835938]},{"page":43,"text":"Employ the Best Weapon for the Specific Target","rect":[89.98404693603516,182.52197265625,288.6095652542114,173.58413696289063]},{"page":43,"text":"1-116. Using the appropriate weapon for the target increases the probability of rapid enemy destruction or","rect":[107.97997283935547,199.98681640625,540.0001733360291,190.87863159179688]},{"page":43,"text":"suppression while preserving resources. Key factors on determining the employment of weapon and","rect":[107.9699478149414,211.50982666015626,540.0033473968506,202.40164184570313]},{"page":43,"text":"ammunition type are target type, range, exposure, weapons and ammunition availability, and desired targets","rect":[107.96995544433594,223.0328369140625,540.0274798851013,213.92465209960938]},{"page":43,"text":"effects. Units array forces based on the mission variables.","rect":[107.96995544433594,234.4957275390625,338.5281934738159,225.38754272460938]},{"page":43,"text":"Avoid Target Overkill","rect":[89.97403717041016,258.01263427734377,179.40256452178955,249.0647735595703]},{"page":43,"text":"1-117. Target overkill—the overuse of weapon systems to achieve an effect—wastes ammunition and ties","rect":[107.96995544433594,275.4775390625,539.9572284202576,266.3693542480469]},{"page":43,"text":"up weapons that are better employed acquiring and engaging other threats. Having every weapon engage a","rect":[107.95992279052735,287.00048828125,539.9286165313721,277.8923034667969]},{"page":43,"text":"different threat, however, must be tempered by the requirement to destroy the greatest threats first.","rect":[107.95992279052735,298.52349853515627,539.9412183761597,289.4153137207031]},{"page":43,"text":"Commanders use only the amount of fire required to achieve the necessary effects. There may be reasons to","rect":[107.95994567871094,309.98638916015627,539.9145412445068,300.8782043457031]},{"page":43,"text":"demonstrate target overkill as a method directed against enemy morale in specific conditions related to","rect":[107.95994567871094,321.5093688964844,539.9558010101318,312.40118408203127]},{"page":43,"text":"commander’s intent.","rect":[107.95994567871094,331.00830078125,190.20408153533936,323.9241638183594]},{"page":43,"text":"Minimize Exposure","rect":[89.96401977539063,356.4691162109375,170.91160298156738,347.55133056640627]},{"page":43,"text":"1-118. The unit increases its survivability by exposing Soldiers to the minimal extent necessary to engage","rect":[107.96996307373047,374.0041198730469,540.0163240509033,364.89593505859377]},{"page":43,"text":"the enemy effectively. Natural or manmade defilades provide the best cover from lethal direct fire munitions.","rect":[107.95994567871094,385.5271301269531,539.9365797042847,376.4189453125]},{"page":43,"text":"Friendly units minimize exposure by constantly seeking effective available cover, attempting to engage the","rect":[107.95994567871094,396.989990234375,539.9360017852783,387.8818054199219]},{"page":43,"text":"enemy from the flank, remaining dispersed, firing from multiple positions, and limiting engagement times.","rect":[107.95994567871094,408.51300048828127,534.7816724777222,399.4048156738281]},{"page":43,"text":"Plan and Implement Control Measures","rect":[89.96401977539063,432.0098876953125,251.118712184906,423.09210205078127]},{"page":43,"text":"1-119. The unit has numerous tools to assist in the planning and implementation of controlling direct fires.","rect":[107.9699478149414,449.49481201171877,540.0732984542847,440.3866271972656]},{"page":43,"text":"These tools include graphic control measures for friendly forces, engagement criteria, identification training","rect":[107.96995544433594,461.017822265625,540.0561428070068,451.9096374511719]},{"page":43,"text":"for combat vehicles and aircraft, unit weapons safety posture, weapons control status, recognition markings,","rect":[107.96995544433594,472.54083251953127,539.9993238449097,463.4326477050781]},{"page":43,"text":"and a situational understanding to include range cards, area sketches, and rehearsals. Knowledge and","rect":[107.96995544433594,484.00372314453127,539.8595485687256,474.8955383300781]},{"page":43,"text":"employment of applicable control measures are the primary means of preventing fratricide and noncombatant","rect":[107.96995544433594,495.5267333984375,540.0121226272584,486.4185485839844]},{"page":43,"text":"casualties.","rect":[107.96995544433594,505.02569580078127,149.35155773162843,497.9415588378906]},{"page":43,"text":"Plan for Limited-Visibility Conditions","rect":[89.97403717041016,530.506591796875,245.85218691635132,521.5687255859375]},{"page":43,"text":"1-120. Units operating during hours of limited visibility can engage enemy forces at nearly the same range","rect":[107.96996307373047,548.0315551757813,540.0382967071533,538.9234008789063]},{"page":43,"text":"as during daylight hours with limited-visibility fire control equipment. Units should inspect and bring their","rect":[107.96996307373047,559.4944458007813,539.9720361289978,550.3862915039063]},{"page":43,"text":"limited-visibility equipment prior to conducting operations. This prevents Soldiers from becoming","rect":[107.96996307373047,571.0174560546875,540.0123805999756,561.9093017578125]},{"page":43,"text":"unprepared to the changes in the weather and from daylight to nighttime.","rect":[107.96996307373047,582.5404663085938,399.61529064178469,573.4323120117188]},{"page":43,"text":"1-121. Obscurants such as dense fog, heavy smoke, and blowing sand can reduce the capabilities of thermal","rect":[107.96996307373047,600.0053100585938,540.0702891311646,590.8971557617188]},{"page":43,"text":"and infrared equipment. Although decreased acquisition capabilities have minimal effect on area fire, point","rect":[107.96996307373047,611.5283813476563,540.0212779006959,602.4202270507813]},{"page":43,"text":"target engagements can occur at decreased ranges. The unit develops contingency plans for such extreme","rect":[107.96996307373047,623.0513916015625,539.9519929962158,613.9432373046875]},{"page":43,"text":"limited-visibility conditions, such as establishing listening posts, trigger lines, and target reference points","rect":[107.96996307373047,634.5142822265625,539.9381244163513,625.4061279296875]},{"page":43,"text":"capable of visual contact with thermals.","rect":[107.95994567871094,646.0172729492188,266.88006114959719,636.9291381835938]},{"page":43,"text":"Plan for Degraded Capabilities","rect":[89.96401977539063,669.55419921875,218.0046222190857,660.6163330078125]},{"page":43,"text":"1-122. The unit initially develops a plan based on the unit’s maximum effective capabilities. It then makes","rect":[107.95994567871094,687.0191040039063,539.9512469749451,677.9109497070313]},{"page":43,"text":"alternate plans for implementation in the event of casualties, weapon damage, or failure. While units cannot","rect":[107.9499282836914,698.5421142578125,539.9794077835084,689.4339599609375]},{"page":43,"text":"anticipate or plan for every situation, they plan for the most probable occurrences. Building redundancy into","rect":[107.9499282836914,710.0651245117188,539.9780178070068,700.9569702148438]},{"page":43,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":43,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":43,"text":"1-21","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":44,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":44,"text":"the plan, such as having two systems observe the same area, is an invaluable asset when the situation (and","rect":[90.0,83.51434326171875,521.9169826507568,74.40616607666016]},{"page":44,"text":"the number of available systems) permits. Designating alternate sectors of fire provides adjacent elements a","rect":[90.0,94.97723388671875,521.9286165313721,85.85903930664063]},{"page":44,"text":"means of shifting fires if the enemy knocks one of them out of action.","rect":[90.0,106.500244140625,368.8647413253784,97.3920669555664]},{"page":44,"text":"Consolidate","rect":[72.0,128.91372680664063,127.63345109558105,121.31556701660156]},{"page":44,"text":"1-123. Consolidate is to organize and strengthen a captured position to use it against the enemy. Units","rect":[90.0,148.61431884765626,522.0072772483826,139.50613403320313]},{"page":44,"text":"continuously assess their combat power and determine if they are achieving their objectives. At times, they","rect":[90.01001739501953,160.1373291015625,521.9186305999756,151.01913452148438]},{"page":44,"text":"may need to consolidate or reconstitute their forces. Units consolidate to ensure the friendly force maintains","rect":[90.01001739501953,171.66033935546876,522.0060565452576,162.55215454101563]},{"page":44,"text":"its capability and does not lose what it has gained or become disadvantaged. There is a difference between","rect":[90.01001739501953,183.1231689453125,521.9208278656006,174.01498413085938]},{"page":44,"text":"the actions taken to consolidate and to reconstitute.","rect":[90.01000213623047,192.6221466064453,294.41091442108157,185.53799438476563]},{"page":44,"text":"1-124. Units consolidate on seized positions by repelling enemy forces only if it is tactically necessary or","rect":[90.01001739501953,212.17120361328126,521.9972436485291,203.06301879882813]},{"page":44,"text":"advantageous. Normally, units exploit their successes. However, they may have to take tactical pauses while","rect":[90.0,223.634033203125,521.9953279571533,214.52584838867188]},{"page":44,"text":"performing their actions to consolidate, given the existing mission variables. Consolidate may vary from a","rect":[90.0,235.15704345703126,521.9332552032471,226.04885864257813]},{"page":44,"text":"rapid repositioning of forces and security elements to a reorganization of the friendly force and detailed","rect":[89.9999771118164,246.6800537109375,521.9381618499756,237.57186889648438]},{"page":44,"text":"improvement of the position for defense. Consolidate includes—","rect":[89.9999771118164,258.1228942871094,349.4979362487793,249.03475952148438]},{"page":44,"text":" Conducting reconnaissance.","rect":[115.19999694824219,271.61431884765627,245.44404125213624,262.5061340332031]},{"page":44,"text":" Establishing security.","rect":[115.19999694824219,285.1142883300781,219.34496593475343,276.006103515625]},{"page":44,"text":" Eliminating enemy pockets of resistance.","rect":[115.19999694824219,298.6142883300781,297.8847608566284,289.506103515625]},{"page":44,"text":" Positioning forces to enable them to defend against possible enemy counterattacks.","rect":[115.19999694824219,312.1142883300781,465.10357189178469,303.006103515625]},{"page":44,"text":" Adjusting direct and indirect fire planning.","rect":[115.19999694824219,325.6142883300781,304.3045606613159,316.49609375]},{"page":44,"text":" Preparing their units for potential follow-on missions.","rect":[115.19999694824219,339.1142883300781,348.45363903045657,330.006103515625]},{"page":44,"text":"Chapter 5 discusses consolidate in detail as part of the offense.","rect":[90.0037841796875,353.61322021484377,340.8514356613159,344.52508544921877]},{"page":44,"text":"Reconstitution","rect":[72.0,376.042724609375,140.45043028259279,368.45556640625]},{"page":44,"text":"1-125. Reconstitutionis an operation that commanders plan and implement to restore units to a desired level","rect":[90.0,395.7342529296875,522.0353159866334,386.6461181640625]},{"page":44,"text":"of combat effectiveness commensurate with mission requirements and available resources (ATP 3-94.4).","rect":[89.99996185302735,407.25726318359377,521.9812574386597,398.16912841796877]},{"page":44,"text":"Reconstitution consists of two major elements: reorganization and regeneration. Reconstitution operations","rect":[89.99992370605469,418.80029296875,522.0324237327576,409.6820983886719]},{"page":44,"text":"are essential to rebuilding the combat power of a degraded unit. This encompasses more than just","rect":[89.99992370605469,430.26318359375,522.0304331741334,421.1449890136719]},{"page":44,"text":"accumulating personnel and weapons systems and then projecting them forward. Because of the likely heavy","rect":[89.99992370605469,441.78619384765627,522.0289821624756,432.6679992675781]},{"page":44,"text":"casualties during combat operations, surviving leaders and undamaged equipment are likely to assume new","rect":[89.99992370605469,453.3091735839844,521.9591717758178,444.20098876953127]},{"page":44,"text":"roles in a reconstituted unit.","rect":[89.98994445800781,462.7480163574219,201.39434337615968,455.66387939453127]},{"page":44,"text":"Reorganization","rect":[71.99402618408203,488.28900146484377,135.34849452209475,479.3511657714844]},{"page":44,"text":"1-126. Reorganization is all measures taken by the commander to maintain unit combat effectiveness or","rect":[89.98994445800781,505.7538757324219,521.9724023399353,496.64569091796877]},{"page":44,"text":"return it to a specified level of combat capability (ATP 3-94.4). Reorganization is the action of expedient","rect":[89.97994232177735,517.27685546875,521.9961924514771,508.1686706542969]},{"page":44,"text":"cross leveling of internal resources in a degraded unit in place to restore or increase combat effectiveness.","rect":[89.96987915039063,528.7998657226563,521.9689893722534,519.6917114257813]},{"page":44,"text":"Reorganization is an option when the operating tempo is such that the risk for removing a unit from the","rect":[89.96987915039063,540.2627563476563,521.9928255157471,531.1546020507813]},{"page":44,"text":"operation risks the mission. There are two types of reorganization operations, immediate and deliberate. Units","rect":[89.96987915039063,551.7857666015625,521.9962909202576,542.6776123046875]},{"page":44,"text":"base the type of reorganization operation executed on mission variables. These actions include—","rect":[89.96987915039063,563.3087158203125,477.9342460632324,554.2005615234375]},{"page":44,"text":" Cross-leveling equipment and personnel.","rect":[115.19999694824219,576.7742919921875,297.1011915206909,567.6661376953125]},{"page":44,"text":" Matching operational weapon systems with crews.","rect":[115.19999694824219,590.2742919921875,335.38357067108157,581.1661376953125]},{"page":44,"text":" Forming composite units by joining two or more attrited units to form a single mission-capable","rect":[115.19999694824219,603.7742919921875,522.0015535430908,594.6560668945313]},{"page":44,"text":"unit.","rect":[133.1999969482422,613.213134765625,151.30512523651124,606.1290283203125]},{"page":44,"text":" Changing task organization in preparation for the next operation.","rect":[115.19999694824219,628.7343139648438,392.8644971847534,619.6261596679688]},{"page":44,"text":"1-127. Immediate reorganization is the quick and usually temporary restoration of degraded units to","rect":[89.9937515258789,646.25927734375,521.9943141937256,637.151123046875]},{"page":44,"text":"minimum levels of effectiveness. Normally, a unit implements immediate reorganization in its current","rect":[89.97370147705078,657.7822875976563,521.9820322952271,648.6741333007813]},{"page":44,"text":"combat position or as close to that site as possible to meet near-term needs. To accomplish this, units use","rect":[89.97370910644531,669.2251586914063,521.9590120391846,660.1370239257813]},{"page":44,"text":"information in orders, unit SOPs (such as battle rosters, redistribution criteria, and contingency manning","rect":[89.96366882324219,680.7681884765625,522.0358180999756,671.6600341796875]},{"page":44,"text":"standards), and immediately available assets.","rect":[89.96366882324219,692.2911376953125,269.93987560272219,683.1829833984375]},{"page":44,"text":"1-22","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":44,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":44,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":45,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":45,"text":"1-128. Units conduct deliberate reorganization when they have more time and resources available. It usually","rect":[108.0,83.51434326171875,540.0001735687256,74.40616607666016]},{"page":45,"text":"occurs farther to the rear than immediate reorganization. Procedures are similar to those for immediate","rect":[108.0,94.97723388671875,539.9990511016846,85.86905670166016]},{"page":45,"text":"reorganization, but some replacement personnel and equipment may be available, and the unit has additional","rect":[108.0,106.500244140625,540.0300669631959,97.3920669555664]},{"page":45,"text":"time to conduct resupply and maintenance activities.","rect":[108.0,118.023193359375,318.1644239425659,108.9150161743164]},{"page":45,"text":"1-129. Reorganization aims to improve a unit’s capability until more extensive efforts can occur if","rect":[108.0,135.48809814453126,540.0201928672791,126.37992095947266]},{"page":45,"text":"resources, the tactical situation, and time permit. Since reorganization involves activities internal to a unit, it","rect":[107.98997497558594,147.0111083984375,540.0185313186646,137.90292358398438]},{"page":45,"text":"is the most expedient means of maintaining combat power after contact with the enemy.","rect":[107.98997497558594,158.5340576171875,460.17498302459719,149.42587280273438]},{"page":45,"text":"Regeneration","rect":[89.99405670166016,181.99090576171876,145.60806178283694,173.05307006835938]},{"page":45,"text":"1-130. Regeneration is the rebuilding of a unit through large-scale replacement of personnel, equipment,","rect":[107.98997497558594,199.505859375,540.0033521652222,190.39767456054688]},{"page":45,"text":"and supplies, including the reestablishment of essential command and control and the conduct of mission-","rect":[107.96994018554688,211.02886962890626,539.9421899375916,201.92068481445313]},{"page":45,"text":"essential training for the unit (ATP 3-94.4). Regeneration is the deliberate restoration of a unit’s combat","rect":[107.96995544433594,222.49176025390626,539.9552988967896,213.38357543945313]},{"page":45,"text":"power; it is considerably more resource intensive than reorganization. Regeneration is time intensive and","rect":[107.95993041992188,234.0147705078125,540.0051174163818,224.90658569335938]},{"page":45,"text":"requires days to weeks to execute. Because of the intensive nature of regeneration, it occurs at a designated","rect":[107.95993041992188,245.4776611328125,539.9236354827881,236.36947631835938]},{"page":45,"text":"regeneration site after the unit disengages from operations. Commanders normally situate the regeneration","rect":[107.95993041992188,257.0006103515625,539.9639797210693,247.89242553710938]},{"page":45,"text":"site in a relatively secure location. Tactical units only execute and do not plan the regeneration process.","rect":[107.95993041992188,268.52362060546877,521.1480665206909,259.4154357910156]},{"page":45,"text":"INTELLIGENCE WARFIGHTING FUNCTION","rect":[90.0,291.88800048828127,295.4957437515259,283.7760009765625]},{"page":45,"text":"1-131. The intelligence warfighting function is the related tasks and systems that facilitate understanding","rect":[108.0,311.7543029785156,539.9911403656006,302.6461181640625]},{"page":45,"text":"the enemy, terrain, weather, civil considerations, and other significant aspects of the operational environment","rect":[107.98998260498047,323.2773132324219,540.0882945022584,314.16912841796877]},{"page":45,"text":"(ADP 3-0). The intelligence warfighting function fuses the information collected through with primary","rect":[107.98998260498047,334.80029296875,539.9479274749756,325.6921081542969]},{"page":45,"text":"tactical tasks of reconnaissance, surveillance, security operations, and intelligence operations.","rect":[107.98998260498047,346.26318359375,482.59698009490969,337.1549987792969]},{"page":45,"text":"1-132. Intelligence is a product, a process, and a function that enables the Army to conduct operations by","rect":[107.98998260498047,363.7882080078125,539.9312038421631,354.6799621582031]},{"page":45,"text":"supporting the commander and command and control (which is accomplished by supporting the rest of the","rect":[107.9800033569336,375.3111572265625,539.9970979766846,366.2029724121094]},{"page":45,"text":"staff). Commanders and staffs rely on many different types of intelligence products. The intelligence process","rect":[107.9799575805664,386.7740478515625,539.9900653343201,377.6658630371094]},{"page":45,"text":"is continuous and directly supports the operations process by developing information requirements, collecting","rect":[107.9799575805664,398.29705810546877,539.9748439788818,389.1888732910156]},{"page":45,"text":"on those requirements, processing data into information, analyzing information and intelligence from all","rect":[107.9799575805664,409.8200378417969,539.9803843460084,400.71185302734377]},{"page":45,"text":"sources, producing intelligence, and when necessary, developing the situation through operations.","rect":[107.9799575805664,421.2829284667969,499.04558849334719,412.17474365234377]},{"page":45,"text":"1-133. Intelligence supports decision makers and staffs by providing situational understanding of the threat,","rect":[107.97994995117188,438.8078918457031,540.0371656417847,429.69970703125]},{"page":45,"text":"terrain and weather, civil considerations, and other aspects of the operational environment. Intelligence","rect":[107.96993255615235,450.3309020996094,540.0198640899658,441.22271728515627]},{"page":45,"text":"supports the commander and staff with analysis and production of effective timely, relevant, accurate, and","rect":[107.96990203857422,461.79376220703127,539.9395046234131,452.6855773925781]},{"page":45,"text":"predictive assessments and products tailored to the commander’s and staff’s specific needs.","rect":[107.96994018554688,473.2967224121094,473.5356397628784,464.2085876464844]},{"page":45,"text":"1-134. The intelligence warfighting function supports the commander through a broad range of tasks. These","rect":[107.95992279052735,490.7816162109375,540.0191927032471,481.6734313964844]},{"page":45,"text":"tasks are interrelated, require the participation of the commander and staff, and are often conducted","rect":[107.94989776611328,502.2845764160156,539.9074611663818,493.1964416503906]},{"page":45,"text":"simultaneously. The intelligence warfighting function tasks facilitate the commander’s visualization and","rect":[107.94989776611328,513.82763671875,540.0333766937256,504.7194519042969]},{"page":45,"text":"understanding of the threat and other relevant aspects of the operational environment. The intelligence","rect":[107.94989013671875,525.29052734375,539.9970979766846,516.182373046875]},{"page":45,"text":"warfighting function includes the following tasks:","rect":[107.94989013671875,536.8134765625,307.7126841506958,527.705322265625]},{"page":45,"text":" Provide intelligence support to force generation—the task of generating intelligence knowledge","rect":[133.1999969482422,550.2542724609375,540.0472688751221,541.1461181640625]},{"page":45,"text":"concerning an operational environment, facilitating future intelligence operations, and tailoring","rect":[151.1999969482422,561.7772827148438,540.0690212249756,552.6691284179688]},{"page":45,"text":"the force.","rect":[151.1999969482422,571.2161254882813,188.98342418670655,564.1320190429688]},{"page":45,"text":"","rect":[133.1999969482422,584.0054321289063,139.16105696249009,579.313232421875]},{"page":45,"text":"","rect":[133.1999969482422,620.54541015625,139.16105696249009,615.8532104492188]},{"page":45,"text":"","rect":[133.1999969482422,657.025390625,139.16105696249009,652.3331909179688]},{"page":45,"text":"Provide support to situational understanding—the task of providing information and intelligence","rect":[151.1999969482422,586.7343139648438,539.9278230743408,577.6261596679688]},{"page":45,"text":"to commanders to assist them in achieving a clear understanding of the force’s current state with","rect":[151.1999969482422,598.25732421875,539.9730129241943,589.149169921875]},{"page":45,"text":"relation to the threat and other relevant aspects of the operational environment.","rect":[151.1999969482422,609.76025390625,466.6647901535034,600.672119140625]},{"page":45,"text":"Conduct information collection—the task that synchronizes and integrates the planning and","rect":[151.1999969482422,623.2742919921875,539.9702053070068,614.1661376953125]},{"page":45,"text":"employment of sensors and assets as well as the processing, exploitation, and dissemination","rect":[151.1999969482422,634.7371826171875,540.0822658538818,625.6290283203125]},{"page":45,"text":"systems in direct support of current and future operations.","rect":[151.1999969482422,646.2601928710938,382.5428419113159,637.1520385742188]},{"page":45,"text":"Provide intelligence support to targeting and information operations—the task of providing the","rect":[151.1999969482422,659.7542724609375,540.0652132110596,650.6461181640625]},{"page":45,"text":"commander information and intelligence support for targeting to achieve lethal and nonlethal","rect":[151.1999969482422,671.2772827148438,540.0780405960084,662.1691284179688]},{"page":45,"text":"effects.","rect":[151.1999969482422,680.7161254882813,180.40229320526124,673.6420288085938]},{"page":45,"text":"Table 1-2 on page 1-24 illustrates how the intelligence warfighting function tasks support the commander.","rect":[107.9937515258789,697.2591552734375,539.9948072433472,688.1510009765625]},{"page":45,"text":"See ADP 2-0 and FM 2-0 for more discussions on intelligence tasks.","rect":[107.98372650146485,708.7821655273438,382.40554332733157,699.6740112304688]},{"page":45,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":45,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":45,"text":"1-23","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":46,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":46,"text":"Table 1-2. Intelligence warfighting function tasks that support the commander","rect":[112.25999450683594,83.51416015625,481.75150942611699,74.12541961669922]},{"page":46,"text":"FIRES WARFIGHTING FUNCTION","rect":[72.0,558.8280639648438,232.68049716949464,550.7160034179688]},{"page":46,"text":"1-135. The fires warfighting function is the related tasks and systems that create and converge effects in all","rect":[90.0,578.7542724609375,522.0314097366334,569.6461181640625]},{"page":46,"text":"domains against the adversary or enemy to enable operations across the range of military operations (ADP 3-","rect":[90.0,590.2772827148438,522.0924584922791,581.1691284179688]},{"page":46,"text":"0). Units must execute and integrate fires, in combination with the other elements of combat power, to create","rect":[90.0,601.7401733398438,521.9611482696533,592.6320190429688]},{"page":46,"text":"and converge effects and achieve the desired end state.","rect":[90.0,613.26318359375,309.0943555831909,604.155029296875]},{"page":46,"text":"1-136.","rect":[90.0,628.7440795898438,115.84157848358155,621.8603515625]},{"page":46,"text":"","rect":[115.19999694824219,641.54541015625,121.16105696249008,636.8532104492188]},{"page":46,"text":"The fires warfighting function tasks are—","rect":[124.54896545410156,630.7881469726563,292.6044120788574,621.6799926757813]},{"page":46,"text":"Execute fires across the five domains and in the information environment, employing—","rect":[133.1999969482422,644.2742919921875,484.8689994812012,635.1661376953125]},{"page":46,"text":" Surface-to-surface fires.","rect":[133.1999969482422,656.30029296875,247.83188915252686,649.2061767578125]},{"page":46,"text":" Air-to-surface fires.","rect":[133.1999969482422,670.3302612304688,230.6656141281128,663.2461547851563]},{"page":46,"text":" Surface-to-air fires.","rect":[133.1999969482422,684.3802490234375,229.53335094451905,677.2861328125]},{"page":46,"text":" Cyberspace operations and electromagnetic warfare.","rect":[133.1999969482422,700.434326171875,360.87151622772219,691.326171875]},{"page":46,"text":" Space operations.","rect":[133.1999969482422,714.4542846679688,221.79992198944093,705.3661499023438]},{"page":46,"text":"1-24","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":46,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":46,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":47,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":47,"text":" Multinational fires.","rect":[151.1999969482422,82.03028106689453,246.4051160812378,74.9461441040039]},{"page":47,"text":"","rect":[133.1999969482422,122.9054183959961,139.16105696249009,118.21318054199219]},{"page":47,"text":" Special operations.","rect":[151.1999969482422,98.07426452636719,245.32494640350343,88.98612213134766]},{"page":47,"text":" Information operations.","rect":[151.1999969482422,112.11424255371094,263.6064405441284,103.0261001586914]},{"page":47,"text":"Integrate Army, multinational, and joint fires through—","rect":[151.1999969482422,125.63427734375,375.1169548034668,116.51608276367188]},{"page":47,"text":" Targeting.","rect":[151.1999969482422,139.67425537109376,210.64470958709718,130.56607055664063]},{"page":47,"text":" Operations process.","rect":[151.1999969482422,153.6942596435547,248.0864667892456,144.60610961914063]},{"page":47,"text":" Fire support planning.","rect":[151.1999969482422,167.8143310546875,257.8048505783081,158.70614624023438]},{"page":47,"text":" Airspace planning and management.","rect":[151.1999969482422,181.85430908203126,315.28362560272219,172.74612426757813]},{"page":47,"text":" Electromagnetic spectrum management.","rect":[151.1999969482422,195.894287109375,330.0359754562378,186.78610229492188]},{"page":47,"text":" Multinational integration.","rect":[151.1999969482422,209.93426513671876,271.96514415740969,200.82608032226563]},{"page":47,"text":" Rehearsals.","rect":[151.1999969482422,221.9502716064453,215.08059215545655,214.86611938476563]},{"page":47,"text":"For additional information on fires tasks see ADP 3-19, FM 3-09, and FM 3-01.","rect":[107.99783325195313,238.00230407714845,427.9665174484253,229.38510131835938]},{"page":47,"text":"1-137. The military decision-making process (MDMP) synchronizes the unit’s scheme of maneuver with","rect":[107.99783325195313,256.01824951171877,539.9902858734131,246.91006469726563]},{"page":47,"text":"the provision of fire support. The plan must identify critical times and places where units need the maximum","rect":[107.98782348632813,267.48114013671877,540.1273474655152,258.3729553222656]},{"page":47,"text":"effects from their fire support assets. That planning must consider existing limitations on employing fires,","rect":[107.98782348632813,279.004150390625,540.0201978683472,269.8959655761719]},{"page":47,"text":"such as rules of engagement, presence of friendly forces within the assigned area, desired conditions of","rect":[107.98782348632813,290.52716064453127,539.8856713829041,281.4189758300781]},{"page":47,"text":"subsequent phases, and requirements for collateral damage assessments. Each commander’s guidance gives","rect":[107.98782348632813,301.9900207519531,539.9207293968201,292.8818359375]},{"page":47,"text":"specified attack criteria for supporting fires assets, thus focusing the staff and unit planning and execution","rect":[107.98782348632813,313.5130310058594,539.9852199554443,304.40484619140627]},{"page":47,"text":"efforts on those critical times and events. Specified attack criteria are a compilation of commander’s","rect":[107.98782348632813,325.0159606933594,539.9781024436951,315.9278259277344]},{"page":47,"text":"guidance, desired effects, and high-payoff targets and attack priorities. The time available to plan operations","rect":[107.98782348632813,336.4989013671875,539.9831073265076,327.3907165527344]},{"page":47,"text":"constrains a commander’s ability to synchronize fire support operations that employ well-matched effects of","rect":[107.977783203125,348.02191162109377,540.0662133750916,338.9137268066406]},{"page":47,"text":"all available assets against high-payoff targets.","rect":[107.977783203125,359.5448913574219,294.5591993331909,350.43670654296877]},{"page":47,"text":"1-138. The integration of indirect fire support is fundamental to the success of a unit’s scheme of maneuver.","rect":[107.9677734375,377.009765625,540.0231885910034,367.9015808105469]},{"page":47,"text":"Indirect fire planning reconciles top-down planning and bottom-up refinement. Indirect fire supports the","rect":[107.96776580810547,388.53277587890627,539.9359407501221,379.4245910644531]},{"page":47,"text":"unit’s maneuver by planning preparation fires, which includes the different types of effects: harassing,","rect":[107.957763671875,400.0557556152344,539.9930982589722,390.94757080078127]},{"page":47,"text":"interdiction, suppressive, destruction, and deception fires. These fires can be time or event driven. (See FM","rect":[107.957763671875,411.4985656738281,539.9189498405457,402.4104309082031]},{"page":47,"text":"3-09 for definition of desired effects.)","rect":[107.95771789550781,423.0215759277344,259.0092217979431,413.9334411621094]},{"page":47,"text":"Fire Support Planning and Coordination","rect":[90.0,447.62066650390627,281.82283628845217,437.8155517578125]},{"page":47,"text":"1-139. The unit’s ability to orchestrate and employ all available fire support resources as a system and to","rect":[108.0,465.1142883300781,540.0523586273193,456.006103515625]},{"page":47,"text":"integrate and synchronize fire support with the concept of operations results from an established process","rect":[108.0,476.6372985839844,539.9160907249451,467.52911376953127]},{"page":47,"text":"known as fire support planning and coordination. Fire support planning is the continuous process of","rect":[108.0,488.1602783203125,539.9792382774353,479.0520935058594]},{"page":47,"text":"analyzing, allocating, integrating, synchronizing, and scheduling fires to describe how the effects of fires","rect":[108.0,499.6231689453125,539.9651629905701,490.5149841308594]},{"page":47,"text":"facilitate maneuver force actions (FM 3-09). Successful fire support planning is the result of the fire support","rect":[108.0,511.14617919921877,540.0815806350709,502.0379943847656]},{"page":47,"text":"coordinator’s aggressive contribution to the maneuver commander’s planning and decision-making process.","rect":[107.98998260498047,522.669189453125,539.9681959152222,513.56103515625]},{"page":47,"text":"Fire support coordination is the planning and executing of fire so targets are adequately covered by a suitable","rect":[107.97997283935547,534.132080078125,540.0111970977783,525.02392578125]},{"page":47,"text":"weapon or group of weapons (JP 3-09). Formal coordination binds fire support resources together to create","rect":[107.9800033569336,545.655029296875,539.9535799102783,536.546875]},{"page":47,"text":"a unity of effort so that the multiple effects of each fire support asset across all domains are rapidly and","rect":[107.9800033569336,557.1781005859375,539.9753322601318,548.0699462890625]},{"page":47,"text":"continuously integrated and synchronized with the scheme of maneuver.","rect":[107.97994995117188,568.6409301757813,397.64126110076907,559.5327758789063]},{"page":47,"text":"1-140. Fire supporters utilize the principles of fire support planning and coordination when advising the","rect":[107.97994995117188,586.1658935546875,540.0824861602783,577.0577392578125]},{"page":47,"text":"unit on the execution of fire support. These principles are extensions of the functions of fire support. The fire","rect":[107.96991729736328,597.6688842773438,540.0538606719971,588.5807495117188]},{"page":47,"text":"support planning and coordination principles are––","rect":[107.96991729736328,609.1517944335938,312.1173915863037,600.0436401367188]},{"page":47,"text":" Plan early and continuously.","rect":[133.1999969482422,622.6143188476563,265.1234083175659,613.5061645507813]},{"page":47,"text":" Ensure the continuous flow of targeting information.","rect":[133.1999969482422,636.1143188476563,362.0389356613159,627.0061645507813]},{"page":47,"text":" Consider the use of all lethal and nonlethal attack capabilities.","rect":[133.1999969482422,649.5942993164063,399.4674024581909,640.5061645507813]},{"page":47,"text":" Furnish the type of support requested.","rect":[133.1999969482422,663.1143188476563,302.8627576828003,654.0061645507813]},{"page":47,"text":" Use the most effective fire support attack/delivery system.","rect":[133.1999969482422,676.6143188476563,384.52862071990969,667.5061645507813]},{"page":47,"text":" Avoid unnecessary duplication.","rect":[133.1999969482422,690.1143188476563,277.5822401046753,681.0061645507813]},{"page":47,"text":" Consider airspace coordination.","rect":[133.1999969482422,703.5942993164063,278.1353712081909,694.5061645507813]},{"page":47,"text":" Provide adequate support.","rect":[133.1999969482422,717.0942993164063,255.39696788787843,708.0061645507813]},{"page":47,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":47,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":47,"text":"1-25","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":48,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":48,"text":" Provide for rapid and continuous coordination.","rect":[115.19999694824219,83.49430847167969,320.3826856613159,74.40616607666016]},{"page":48,"text":" Provide for flexibility.","rect":[115.19999694824219,97.01434326171875,222.9451551437378,87.90616607666016]},{"page":48,"text":" Use fire support coordination measures.","rect":[115.19999694824219,110.49430847167969,292.89870738983157,101.40616607666016]},{"page":48,"text":"1-141. During execution, fire supporters use the principles of fire support execution to anticipate the","rect":[90.00376892089844,127.97918701171875,522.0060701446533,118.87100982666016]},{"page":48,"text":"dynamics of combat operations, maintain situational awareness of the operational environment, and leverage","rect":[89.9937973022461,139.502197265625,522.0300569610596,130.39401245117188]},{"page":48,"text":"interoperable fire support command and control systems and attack and delivery capabilities. The fire support","rect":[89.9937515258789,151.02520751953126,521.9905772171021,141.91702270507813]},{"page":48,"text":"execution principles include––","rect":[89.9937515258789,162.4680633544922,212.72873497009278,153.37991333007813]},{"page":48,"text":" Adequate fire support for the committed units.","rect":[115.19999694824219,175.9542694091797,319.0079298019409,166.86611938476563]},{"page":48,"text":" Weight to the main effort.","rect":[115.19999694824219,189.47430419921876,237.40502452850343,180.36611938476563]},{"page":48,"text":" Immediately available fire support for the commander to influence the operation.","rect":[115.19999694824219,202.97430419921876,457.3061475753784,193.86611938476563]},{"page":48,"text":" Facilitate future operations.","rect":[115.19999694824219,216.4542694091797,243.5252332687378,207.36611938476563]},{"page":48,"text":" Maximize feasible centralized control.","rect":[115.19999694824219,227.9502716064453,287.07305431365969,220.86611938476563]},{"page":48,"text":" Never place artillery in reserve.","rect":[115.19999694824219,243.47430419921876,259.5391798019409,234.36611938476563]},{"page":48,"text":"1-142. Units emphasize accomplishing simple and rapidly integrated fire support plans using quick-fire","rect":[89.9937515258789,260.9892578125,522.0411653594971,251.88107299804688]},{"page":48,"text":"planning techniques and SOPs to focus fires on seizing the initiative. They integrate their fire assets as far","rect":[89.97372436523438,272.4521484375,521.9537255821228,263.3439636230469]},{"page":48,"text":"forward as possible in their movement formations to facilitate the early emplacement of those assets. One","rect":[89.97372436523438,283.97515869140627,522.0011873321533,274.8669738769531]},{"page":48,"text":"example of this integration is the use of an unmanned aircraft system forward site team from a combat","rect":[89.97372436523438,295.4981384277344,521.9758677444459,286.38995361328127]},{"page":48,"text":"aviation brigade temporarily attached to a field artillery brigade to identify targets for destruction.","rect":[89.97372436523438,306.9610290527344,480.9851942062378,297.85284423828127]},{"page":48,"text":"1-143. Artillery, mortars, and some electromagnetic attack capabilities must occupy positions that are well","rect":[89.98375701904297,324.48602294921877,521.9971079788209,315.3778381347656]},{"page":48,"text":"forward and still within supporting range of the flanks of maneuver forces to provide responsive indirect and","rect":[89.97373962402344,336.0090026855469,521.9568386077881,326.9007873535156]},{"page":48,"text":"nonlethal fires. Units consider the effect that movement by echelon or battery has on the amount of fire","rect":[89.97370147705078,347.4718933105469,522.0021028594971,338.36370849609377]},{"page":48,"text":"support available. They should support the unit’s main effort with priority of fires.","rect":[89.96368408203125,358.994873046875,419.34624767303469,349.8866882324219]},{"page":48,"text":"1-144.","rect":[89.96368408203125,374.3655700683594,115.80527019500733,367.592041015625]},{"page":48,"text":"","rect":[115.19999694824219,387.26544189453127,121.16105696249008,382.57318115234377]},{"page":48,"text":"","rect":[115.19999694824219,400.76544189453127,121.16105696249008,396.07318115234377]},{"page":48,"text":"","rect":[115.19999694824219,414.26544189453127,121.16105696249008,409.57318115234377]},{"page":48,"text":"","rect":[115.19999694824219,427.76544189453127,121.16105696249008,423.07318115234377]},{"page":48,"text":"","rect":[115.19999694824219,441.26544189453127,121.16105696249008,436.57318115234377]},{"page":48,"text":"","rect":[115.19999694824219,454.76544189453127,121.16105696249008,450.07318115234377]},{"page":48,"text":"","rect":[115.19999694824219,468.26544189453127,121.16105696249008,463.57318115234377]},{"page":48,"text":"","rect":[115.19999694824219,481.7054443359375,121.16105696249008,477.01318359375]},{"page":48,"text":"","rect":[115.19999694824219,495.2054443359375,121.16105696249008,490.51318359375]},{"page":48,"text":"Responsiveness can be achieved by the following:","rect":[124.51264953613281,376.5198669433594,325.60105084991457,367.41168212890627]},{"page":48,"text":"Training, especially digital sustainment training.","rect":[133.1999969482422,389.9942932128906,327.03692150115969,380.8861083984375]},{"page":48,"text":"Streamlining the call for fire by using digital systems.","rect":[133.1999969482422,403.4942932128906,348.4645948410034,394.3861083984375]},{"page":48,"text":"Planning fire support requirements in advance.","rect":[133.1999969482422,416.9942932128906,320.3866834640503,407.8861083984375]},{"page":48,"text":"Establishing a permissive battlefield design, to include airspace.","rect":[133.1999969482422,430.4942932128906,389.5635938644409,421.3861083984375]},{"page":48,"text":"Establishing permissive fire support coordination measures.","rect":[133.1999969482422,443.9942932128906,372.5847120285034,434.8861083984375]},{"page":48,"text":"Conducting rehearsals.","rect":[133.1999969482422,457.4942932128906,224.8629560470581,448.3861083984375]},{"page":48,"text":"Employing time on target.","rect":[133.1999969482422,470.9942932128906,238.24468517303468,461.8861083984375]},{"page":48,"text":"Continually training observers in all aspects of fire support.","rect":[133.1999969482422,484.4342956542969,371.2069044113159,475.32611083984377]},{"page":48,"text":"Limiting radio transmissions on fire networks to time-sensitive, mission-essential traffic only.","rect":[133.1999969482422,497.9342956542969,508.7766981124878,488.82611083984377]},{"page":48,"text":"1-145. The linking of Army forward observers, joint fires observers, and target acquisition assets to quick","rect":[89.9937515258789,515.4592895507813,522.0431423187256,506.3410949707031]},{"page":48,"text":"fire or exclusive networks also provides responsive fires. Responsive fire networks allow the lead observers","rect":[89.98373413085938,526.9622802734375,522.0409686546326,517.8741455078125]},{"page":48,"text":"to communicate directly with specific field artillery and mortar units. These kinds of communications","rect":[89.98373413085938,538.4451904296875,522.0379779319763,529.3370361328125]},{"page":48,"text":"arrangements ","rect":[89.98373413085938,549.9681396484375,146.36828136444093,541.8619384765625]},{"page":48,"text":"enhance ","rect":[151.89930725097657,548.0,187.2238416671753,540.8599853515625]},{"page":48,"text":"responsiveness ","rect":[192.7548828125,549.9481201171875,255.19858837127686,540.8599853515625]},{"page":48,"text":"through ","rect":[260.7296142578125,549.9681396484375,294.37578868865969,540.8599853515625]},{"page":48,"text":"streamlined ","rect":[299.9068603515625,548.0,349.0910291671753,540.8599853515625]},{"page":48,"text":"net ","rect":[354.5659484863281,548.0,369.3103895187378,541.8619384765625]},{"page":48,"text":"structures ","rect":[374.8414306640625,548.0,416.22600841522219,541.8619384765625]},{"page":48,"text":"and ","rect":[421.7570495605469,548.0,438.6617383956909,540.8599853515625]},{"page":48,"text":"focused ","rect":[444.1927490234375,548.0,477.83681774139407,540.8599853515625]},{"page":48,"text":"priorities.","rect":[483.3678283691406,549.9481201171875,521.9926710128784,540.8599853515625]},{"page":48,"text":"Communications planning should also include the need for communications networks for the clearing of","rect":[89.98373413085938,561.4911499023438,521.8705346641541,552.3829956054688]},{"page":48,"text":"targets for rotary- and fixed-wing attacks.","rect":[89.98373413085938,572.9540405273438,256.5963087081909,563.8458862304688]},{"page":48,"text":"1-146.","rect":[89.98372650146485,588.4349365234375,115.82531261444092,581.5512084960938]},{"page":48,"text":"Army units focus on integrating and synchronizing lethal and nonlethal activities. To preserve","rect":[124.5326919555664,590.47900390625,522.0262117462158,581.370849609375]},{"page":48,"text":"warfighting capabilities, and reduce the capabilities of potential adversaries, units utilize combinations of","rect":[89.97370910644531,602.0020141601563,521.9139306602478,592.8938598632813]},{"page":48,"text":"cyberspace, space operations, information operations, and electromagnetic warfare capabilities to seize,","rect":[89.97370910644531,613.4649047851563,521.8768873214722,604.3567504882813]},{"page":48,"text":"retain, and exploit the initiative. At the BCT level and above, units utilize cyberspace electromagnetic","rect":[89.97370910644531,624.9879150390625,521.9068269805908,615.8797607421875]},{"page":48,"text":"activities sections to assist in requesting cyberspace and electromagnetic warfare capabilities. These include","rect":[89.97370910644531,636.5108642578125,522.0461092071533,627.4027099609375]},{"page":48,"text":"offensive and defensive cyberspace, and Department of Defense information network operations,","rect":[89.97370147705078,647.9737548828125,521.9797925949097,638.8656005859375]},{"page":48,"text":"electromagnetic attack, electromagnetic protection, and electromagnetic warfare support. (For more","rect":[89.97370910644531,659.4967651367188,521.9745149688721,650.3886108398438]},{"page":48,"text":"information on cyberspace and electromagnetic warfare, see FM 3-12).","rect":[89.97370147705078,671.019775390625,374.3543653488159,661.91162109375]},{"page":48,"text":"1-26","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":48,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":48,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":49,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":49,"text":"Airspace Control and Airspace Management","rect":[90.0,84.62071228027344,300.1330244178772,74.81556701660156]},{"page":49,"text":"1-147. The joint force commander designates an airspace control authority to develop, coordinate, and","rect":[108.0,102.11431884765625,540.0692653656006,92.99612426757813]},{"page":49,"text":"publish airspace control procedures for operating the airspace control system in the joint operations area. The","rect":[108.0,113.6373291015625,540.0385408477783,104.51913452148438]},{"page":49,"text":"airspace control authority establishes an airspace control plan that provides specific planning guidance and","rect":[108.0,125.16033935546875,540.0542507171631,116.05216217041016]},{"page":49,"text":"procedures for the airspace control system for the joint operations area. The airspace control order is an order","rect":[108.0,136.6231689453125,540.0651757774353,127.50497436523438]},{"page":49,"text":"implementing the airspace control plan that provides the details of the approved requests for airspace","rect":[108.0,148.14617919921876,539.9100618438721,139.03799438476563]},{"page":49,"text":"coordinating measures (JP 3-52).","rect":[108.0,159.669189453125,240.2239179611206,150.56100463867188]},{"page":49,"text":"1-148. Airspace control is the exercise of delegated authority over designated airspace and users through","rect":[107.99999237060547,177.134033203125,539.9753322601318,168.02584838867188]},{"page":49,"text":"control procedures and coordination measures to maximize operational effectiveness (JP 3-52). Airspace","rect":[107.98997497558594,188.6370086669922,539.9321565704346,179.54885864257813]},{"page":49,"text":"control is not synonymous with airspace management. Airspace control is reliant on airspace management","rect":[107.99002075195313,200.1800537109375,539.9222788772584,191.07186889648438]},{"page":49,"text":"capabilities provided by airspace control elements including military, U.S. civil, and host-nation air traffic","rect":[107.98999786376953,211.6429443359375,539.9912386016846,202.53475952148438]},{"page":49,"text":"control. Airspace management is the planning, coordination, integration, and regulation of airspace by","rect":[107.98998260498047,223.16595458984376,540.0176296234131,214.05776977539063]},{"page":49,"text":"airspace control elements in support of airspace control (JP 3-52). Controlling and managing airspace is a","rect":[107.98999786376953,234.68896484375,539.9773225860596,225.58078002929688]},{"page":49,"text":"requirement to effectively integrate capabilities from multiple domains during military operations.","rect":[107.9899673461914,246.15185546875,500.97429943084719,237.04367065429688]},{"page":49,"text":"1-149. Any formation that employs aviation platforms (including UAS), surface-to-surface fires, or surface-","rect":[107.9899673461914,263.67681884765627,540.0723779258728,254.56863403320313]},{"page":49,"text":"to-air fires is an airspace user. Therefore, leaders at all echelons must understand the techniques and","rect":[107.97993469238281,275.1797790527344,539.9706935882568,266.0916442871094]},{"page":49,"text":"procedures used to integrate airspace capabilities into ground schemes of maneuver. At the tactical level,","rect":[107.96991729736328,286.66265869140627,539.9074048995972,277.5544738769531]},{"page":49,"text":"while numerous echelons can perform airspace management tasks, the division is the lowest echelon capable","rect":[107.96991729736328,298.1856689453125,539.9817171173096,289.0774841308594]},{"page":49,"text":"of performing airspace control. At battalion level and above, the U.S. Air Force provides tactical air control","rect":[107.96990203857422,309.70867919921877,539.9933237991334,300.6004943847656]},{"page":49,"text":"parties to assist in airspace management and provide terminal attack control of close air support missions.","rect":[107.96994018554688,321.17156982421877,530.5844678878784,312.0633850097656]},{"page":49,"text":"1-150. Army units develop unit airspace plans, which consist of airspace coordinating measures (ACMs)","rect":[107.96995544433594,338.696533203125,539.9019677696228,329.5883483886719]},{"page":49,"text":"that are integrated to support operations. BCT and above headquarters submit their unit airspace plans to their","rect":[107.9599380493164,350.159423828125,540.0495507774353,341.0512390136719]},{"page":49,"text":"higher headquarters for inclusion into that echelon’s unit airspace plan. Ultimately, the consolidated unit","rect":[107.9599380493164,361.6824035644531,540.0279917678834,352.57421875]},{"page":49,"text":"airspace plan reaches the battlefield coordination detachment and these ACMs, which are the Army’s","rect":[107.95993041992188,373.2054138183594,539.9324481468201,364.09722900390627]},{"page":49,"text":"requirements for airspace, are then combined with the other components of the joint force airspace","rect":[107.95993041992188,384.66827392578127,539.9151277618408,375.5500793457031]},{"page":49,"text":"requirements and integrated into the airspace control order produced by the Joint Force Air Component","rect":[107.95993041992188,396.1912841796875,539.9589610061646,387.0830993652344]},{"page":49,"text":"Command.","rect":[107.95993041992188,405.7002868652344,152.16416454315186,398.6061096191406]},{"page":49,"text":"1-151. ACMs are employed to facilitate the efficient use of airspace to accomplish missions and","rect":[107.95993041992188,425.17913818359377,539.9941921234131,416.0709533691406]},{"page":49,"text":"simultaneously provide safeguards for friendly forces. Airspace elements establish ACMs to accomplish one","rect":[107.94991302490235,436.7021484375,540.0191316680908,427.5939636230469]},{"page":49,"text":"or more functions:","rect":[107.94991302490235,446.20111083984377,181.89449262237549,439.1169738769531]},{"page":49,"text":" Establish coordinated airspace for specific airspace users.","rect":[133.1999969482422,461.6142578125,381.40554332733157,452.526123046875]},{"page":49,"text":" Restrict the actions of some airspace users.","rect":[133.1999969482422,475.1142578125,323.13714122772219,466.026123046875]},{"page":49,"text":" Create airspace in which units can use weapons with minimum risk to other friendly forces.","rect":[133.1999969482422,488.6343078613281,517.4891920089722,479.526123046875]},{"page":49,"text":" Control actions of specific airspace users.","rect":[133.1999969482422,502.1142578125,317.85357189178469,493.026123046875]},{"page":49,"text":" Require airspace users to accomplish specific actions.","rect":[133.1999969482422,515.6142578125,366.39556407928469,506.5260925292969]},{"page":49,"text":"See JP 3-52, FM 3-52, ATP 3-52.1/MCRP 3-20F.4 (MCWP 3-25.13)/NTTP 3-56.4/AFTTP 3-2.78, and","rect":[108.00376892089844,530.0731201171875,539.9469509124756,520.9849853515625]},{"page":49,"text":"ATP 3-91.1/AFTTP 3-2.86 for more information on airspace control and airspace management processes,","rect":[107.98373413085938,541.6161499023438,539.9329786300659,532.5079956054688]},{"page":49,"text":"procedures, and control measures.","rect":[107.98373413085938,553.119140625,244.3469648361206,544.031005859375]},{"page":49,"text":"SUSTAINMENT WARFIGHTING FUNCTION","rect":[90.0,576.5399780273438,292.25535678863528,568.2359619140625]},{"page":49,"text":"1-152. The sustainment warfighting function is the related tasks and systems that provide support and","rect":[108.0,596.394287109375,540.0111598968506,587.2861328125]},{"page":49,"text":"services to ensure freedom of action, extended operational reach, and prolong endurance (ADP 3-0).","rect":[108.0,607.9172973632813,539.9221754074097,598.8091430664063]},{"page":49,"text":"Sustainment determines the depth and duration of Army operations. Successful sustainment enables freedom","rect":[108.0,619.3801879882813,540.0642981491089,610.2720336914063]},{"page":49,"text":"of action by increasing the number of options available to the commander. Sustainment is essential for","rect":[108.0,630.9031982421875,540.0343530235291,621.7950439453125]},{"page":49,"text":"retaining and exploiting the initiative. The sustainment warfighting function consists of four elements:","rect":[108.0,642.4261474609375,517.1045298538209,633.3179931640625]},{"page":49,"text":" Logistics.","rect":[133.1999969482422,655.914306640625,190.36516857147218,646.80615234375]},{"page":49,"text":" Health service support.","rect":[133.1999969482422,669.394287109375,243.70464611053468,660.30615234375]},{"page":49,"text":" Financial management.","rect":[133.1999969482422,682.914306640625,244.5432996749878,673.80615234375]},{"page":49,"text":" Personnel services.","rect":[133.1999969482422,694.3902587890625,227.86101818084718,687.30615234375]},{"page":49,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":49,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":49,"text":"1-27","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":50,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":50,"text":"FM 3-90 focuses on logistics, and medical considerations as they apply to tactical operations. For additional","rect":[90.0,83.51434326171875,522.0825571975709,74.40616607666016]},{"page":50,"text":"information on the sustainment warfighting function see ADP 4-0.","rect":[90.0,94.97723388671875,355.8406629562378,85.86905670166016]},{"page":50,"text":"Logistics","rect":[72.0,119.60069274902344,113.53624209976197,109.79554748535156]},{"page":50,"text":"1-153. During planning, units assess their basic load to determine its adequacy to support an operation. A","rect":[90.0,137.154296875,521.9923138656616,128.04611206054688]},{"page":50,"text":"basic load is the quantity of supplies required to be on hand within, and moved by a unit formation, expressed","rect":[90.0,148.6171875,522.0294094085693,139.50894165039063]},{"page":50,"text":"according to the wartime organization of the unit or formation and maintained at the prescribed levels","rect":[90.01000213623047,160.14019775390626,521.9795062522888,151.03201293945313]},{"page":50,"text":"(JP 4-09). Units further configure their basic load into combat loads for specific missions. Combat loads are","rect":[90.01001739501953,171.6632080078125,522.0763826446533,162.55502319335938]},{"page":50,"text":"the minimum mission-essential equipment and supplies as determined by the commander responsible for","rect":[90.01000213623047,183.12603759765626,521.9622705039978,174.01785278320313]},{"page":50,"text":"carrying out the mission, required for Soldiers to fight and survive immediate combat operations (FM 4-40).","rect":[90.00000762939453,194.6490478515625,522.1054639816284,185.54086303710938]},{"page":50,"text":"Combat loads are not standardized nor are quantities established since all are mission dependent.","rect":[90.0,206.1520233154297,477.16372203826907,197.06387329101563]},{"page":50,"text":"1-154. Units can use logistics packages and throughput distribution of combat configured loads to resupply","rect":[90.0,223.63690185546876,521.9849758148193,214.52871704101563]},{"page":50,"text":"maneuver units maintaining momentum and tempo. A logistics package is a grouping of multiple classes","rect":[89.98999786376953,235.159912109375,522.0244281272888,226.05172729492188]},{"page":50,"text":"of supply and supply vehicles under the control of a single convoy commander. Throughput distribution","rect":[89.99000549316406,246.68292236328126,521.9391994476318,237.57473754882813]},{"page":50,"text":"is a method of distribution which bypasses one or more intermediate supply echelons in the supply system to","rect":[89.99002075195313,258.14581298828127,522.0190334320068,249.03762817382813]},{"page":50,"text":"avoid multiple handling. A combat configured load consists of packages of water, Class I, Class III (B), Class","rect":[89.99002075195313,269.6688232421875,522.0191180686951,260.5606384277344]},{"page":50,"text":"IV, Class V, Class VIII, and Class IX constructed to support the type and mission of a maneuver unit. The","rect":[89.99002075195313,281.1917724609375,521.8818025665283,272.0835876464844]},{"page":50,"text":"supporting unit calculates and recommends the composition of combat configured loads based upon the","rect":[89.99002075195313,292.6546630859375,521.9913606719971,283.5464782714844]},{"page":50,"text":"controlled supply rate, forecasting, and historical data. Units determine the amount of cross loading required","rect":[89.99002075195313,304.17767333984377,521.9727077484131,295.0694885253906]},{"page":50,"text":"for supplies to prevent all of one type of supply from loss by the destruction of a single vehicle or aircraft.","rect":[89.98999786376953,315.70068359375,521.9662427902222,306.5924987792969]},{"page":50,"text":"Units must also anticipate and plan for dynamic changes to task organization to ensure the appropriate","rect":[89.98998260498047,327.16357421875,521.9778719024658,318.0553894042969]},{"page":50,"text":"ammunition types, repair parts, and petroleum, oil, and lubrications products are packaged and distributed","rect":[89.98998260498047,338.6865539550781,521.9271755218506,329.578369140625]},{"page":50,"text":"accordingly.","rect":[89.98998260498047,350.1494140625,139.71222972869874,341.0412292480469]},{"page":50,"text":"1-155. Logistics units and materiel remain close to the maneuver force to ensure short turnaround time for","rect":[89.98998260498047,367.66436767578127,522.0003564414978,358.5561828613281]},{"page":50,"text":"supplies and services. This includes uploading as much critical materiel (such as ammunition and petroleum,","rect":[89.96995544433594,379.1873779296875,521.9579420089722,370.0791931152344]},{"page":50,"text":"oils, and lubricants) as possible and coordinating to preclude multiple units near each other. Units take into","rect":[89.96995544433594,390.6502685546875,521.8504543304443,381.5420837402344]},{"page":50,"text":"account the risk of enemy detection of logistics preparations for an attack.","rect":[89.96990203857422,402.1733093261719,386.05205821990969,393.06512451171877]},{"page":50,"text":"1-156. The availability of adequate supplies and transportation to sustain an operation from start to finish","rect":[89.96994018554688,419.69830322265627,521.9941310882568,410.5901184082031]},{"page":50,"text":"is critical to mission success. Sustainment planners must account for logistics requirements during mission","rect":[89.95992279052735,431.1611633300781,522.0181789398193,422.052978515625]},{"page":50,"text":"analysis to ensure the selected course of action and any potential branch plan is supportable. Based on the","rect":[89.94989776611328,442.68414306640627,521.9037752227783,433.5759582519531]},{"page":50,"text":"type of mission and expected consumption factors, they anticipate requirements and arrange for resupply via","rect":[89.94989776611328,454.2071533203125,522.0163850860596,445.0989685058594]},{"page":50,"text":"multiple means according to the concept of support. Additionally, logistics planners ensure their counterparts","rect":[89.94989013671875,465.6700134277344,522.0423114280701,456.56182861328127]},{"page":50,"text":"at the next higher echelon are fully aware of the sustainment requirements and priorities to aid in adding","rect":[89.94989013671875,477.19305419921877,521.9682521820068,468.0848693847656]},{"page":50,"text":"flexibility to the system (for example, potential need to throughput a class of supply for an urgent","rect":[89.94989013671875,488.716064453125,521.9748911819459,479.6078796386719]},{"page":50,"text":"requirement, such as ammunition or bulk fuel). Supply lines of communications are strained, and","rect":[89.94989013671875,500.178955078125,521.9331569671631,491.0707092285156]},{"page":50,"text":"requirements for repair and replacement of weapon systems increase. Requirements for petroleum, oils, and","rect":[89.94990539550781,511.7019348144531,521.9676418304443,502.59375]},{"page":50,"text":"lubricants increase because of the distance combat vehicles are likely to travel. Sustainment units in direct","rect":[89.94989776611328,523.2249755859375,521.9227061233521,514.1168212890625]},{"page":50,"text":"support of maneuver units must be as agile and mobile as the forces they support. One way to provide","rect":[89.94989776611328,534.6878662109375,521.8918733673096,525.5797119140625]},{"page":50,"text":"continuous support is to task-organize sustainment elements with their supported maneuver formations.","rect":[89.94989776611328,546.2108154296875,503.80877208709719,537.1026611328125]},{"page":50,"text":"1-157. Field maintenance assets move as far forward as possible and as the tactical situation allows to repair","rect":[89.93987274169922,563.7158203125,521.8904931602478,554.627685546875]},{"page":50,"text":"and return inoperable and damaged equipment to an operational status. Crews continue to perform their","rect":[89.93987274169922,575.19873046875,521.9503686485291,566.090576171875]},{"page":50,"text":"preventive maintenance checks and services in accordance with the operational climate and terrain. Battle","rect":[89.93987274169922,586.7017211914063,521.8285188751221,577.6135864257813]},{"page":50,"text":"damage assessment and repair is critical to sustaining offensive actions. Battle damage assessment is the","rect":[89.93987274169922,598.1846313476563,521.9432039337158,589.0764770507813]},{"page":50,"text":"estimate of damage composed of physical and functional damage assessment, as well as target system","rect":[89.93987274169922,609.7076416015625,521.8413367233277,600.5994873046875]},{"page":50,"text":"assessment, resulting from the application of fires (JP 3-0). Crews as well as maintenance and recovery teams","rect":[89.93987274169922,621.2306518554688,521.9532000999451,612.1224975585938]},{"page":50,"text":"conduct battle damage assessment and repair of disabled equipment by expeditiously fixing, bypassing, or","rect":[89.93987274169922,632.6935424804688,521.8820703086853,623.5853881835938]},{"page":50,"text":"using field expedient components. Battle damage assessment and repair restores the minimum-essential","rect":[89.93987274169922,644.216552734375,522.0192637405396,635.1083984375]},{"page":50,"text":"combat capabilities necessary to support a specific combat mission or to enable the equipment to self-recover.","rect":[89.92982482910156,655.7395629882813,521.9691724777222,646.6314086914063]},{"page":50,"text":"1-158. Establishing aerial resupply and forward logistics bases may be necessary to sustain operations such","rect":[89.92982482910156,673.2044677734375,521.9620265960693,664.0963134765625]},{"page":50,"text":"as exploitation and pursuit conducted at great distances from a unit’s sustaining base. The unit or support","rect":[89.92981719970703,684.7274780273438,521.9147105178834,675.6193237304688]},{"page":50,"text":"activity at an airlift’s point of origin is responsible for obtaining the required packing, shipping, and sling-","rect":[89.92981719970703,696.25048828125,521.9120996055603,687.142333984375]},{"page":50,"text":"load equipment. It prepares the load for aerial transport, prepares the pickup zone, and conducts air-loading","rect":[89.93983459472656,707.7130737304688,521.9529933929443,698.6049194335938]},{"page":50,"text":"operations. The unit located at the airlift destination is responsible for preparing the landing zone to","rect":[89.92990112304688,719.2361450195313,521.9590969085693,710.1279907226563]},{"page":50,"text":"1-28","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":50,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":50,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":51,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":51,"text":"accommodate aerial resupply, preparing to receive the load such as the right material handling equipment,","rect":[108.0,83.51434326171875,539.9755811691284,74.40616607666016]},{"page":51,"text":"and returning non-expendable equipment such as cargo pallets, sling-load equipment, or containers.","rect":[108.0,94.97723388671875,506.7990369796753,85.86905670166016]},{"page":51,"text":"Health Service Support","rect":[90.0,119.57872772216797,199.9449598426819,109.79554748535156]},{"page":51,"text":"1-159. Health service support encompasses all support and services performed, provided, and arranged by","rect":[108.0,137.154296875,540.0244655609131,128.04611206054688]},{"page":51,"text":"Army Medicine to promote, improve, conserve, or restore the behavioral and physical well-being of","rect":[108.0,148.6171875,540.0374047813416,139.50900268554688]},{"page":51,"text":"personnel by providing direct patient care that includes medical treatment (organic and area support),","rect":[108.0,160.14019775390626,540.0380811691284,151.03201293945313]},{"page":51,"text":"hospitalization, medical evacuation to include medical regulating, and medical logistics to include blood","rect":[108.0,171.6632080078125,540.0754299163818,162.55502319335938]},{"page":51,"text":"management (FM 4-02). Health service support also includes the treatment of CBRN patients and as directed,","rect":[107.98994445800781,183.12603759765626,540.0520582199097,174.01785278320313]},{"page":51,"text":"provides support to other Services, agencies, and organizations. (See FM 4-02 for additional information for","rect":[107.98993682861328,194.6490478515625,539.9301049766541,185.54086303710938]},{"page":51,"text":"health service support).","rect":[107.97991180419922,206.1520233154297,201.56371593475343,197.06387329101563]},{"page":51,"text":"Medical Treatment (Organic and Area Support)","rect":[89.97396850585938,229.62890625,287.4702050743103,220.68104553222657]},{"page":51,"text":"1-160. The medical treatment function encompasses Roles 1 and 2 medical treatment support. These roles","rect":[107.97991180419922,247.1338348388672,539.9084002952576,238.04568481445313]},{"page":51,"text":"of care are provided by organic assets (medical platoons in battalions and treatment teams assigned to","rect":[107.96989440917969,258.6768798828125,539.9636135101318,249.56869506835938]},{"page":51,"text":"sustainment units) or on an area support basis from supporting medical companies or detachments. Within","rect":[107.96989440917969,270.1397705078125,539.9360866546631,261.0315856933594]},{"page":51,"text":"the BCTs and echelons above brigade Army Health System units, this support is provided by the medical","rect":[107.96987915039063,281.6627197265625,539.8971934280396,272.5544738769531]},{"page":51,"text":"company (brigade support) and the medical company (area support). The area support mission encompasses","rect":[107.96990203857422,293.18572998046877,539.9029071311951,284.0775451660156]},{"page":51,"text":"routine sick call and support provided by all ten medical functions. (See FM 4-02 for additional information","rect":[107.96994018554688,304.64862060546877,539.9294948577881,295.5404357910156]},{"page":51,"text":"on medical treatment).","rect":[107.95990753173828,316.1515808105469,198.2451581954956,307.0634460449219]},{"page":51,"text":"Hospitalization","rect":[89.96399688720703,339.6684875488281,152.77537440490725,330.7507019042969]},{"page":51,"text":"1-161. Theater hospitalization provides essential care within the theater evacuation policy to either return a","rect":[107.95991516113281,357.1534423828125,539.9541292266846,348.0452575683594]},{"page":51,"text":"patient to duty or stabilize a patient for evacuation to a definitive care facility outside the AO. A hospital is","rect":[107.94990539550781,368.67645263671877,539.9603412132263,359.5682678222656]},{"page":51,"text":"a medical treatment facility capable of providing inpatient care. The Role 3 hospital centers execute the","rect":[107.94989776611328,380.1393127441406,539.8888216094971,371.0311279296875]},{"page":51,"text":"theater hospitalization mission. The Role 3 medical treatment facilities are appropriately staffed and equipped","rect":[107.94990539550781,391.66229248046877,539.9349880218506,382.5541076660156]},{"page":51,"text":"to provide diagnostic and therapeutic services, as well as the necessary supporting services required to","rect":[107.95990753173828,403.185302734375,539.9506740570068,394.0771179199219]},{"page":51,"text":"perform its assigned mission and functions. (See ATP 4-02.10 for additional information on hospitalization).","rect":[107.95992279052735,414.6481628417969,539.9412794113159,405.53997802734377]},{"page":51,"text":"Medical Evacuation","rect":[89.9639892578125,436.14105224609377,173.0588369293213,429.2272644042969]},{"page":51,"text":"1-162. Medical evacuation is the timely and effective movement of the wounded, injured, or ill to and","rect":[107.96992492675781,455.6800537109375,539.9040431976318,446.5618591308594]},{"page":51,"text":"between medical treatment facilities on dedicated and properly marked medical platforms with enroute care","rect":[107.95990753173828,467.1429443359375,539.9407014923096,458.0347595214844]},{"page":51,"text":"provided by medical personnel (ATP 4-02.2). Medical evacuation (MEDEVAC) refers to both ground and","rect":[107.95990753173828,478.6659851074219,539.9545803070068,469.55780029296877]},{"page":51,"text":"air evacuation of casualties and joint or partnered air evacuation elements. Air MEDEVAC employs air assets","rect":[107.95990753173828,490.18896484375,539.9687030296326,481.0707702636719]},{"page":51,"text":"from the air ambulance companies assigned to the combat aviation brigade to evacuate casualties. Leaders","rect":[107.95992279052735,501.65185546875,539.9561908226013,492.5436706542969]},{"page":51,"text":"must consider the basic tenets that influence the employment of MEDEVAC assets. These factors include","rect":[107.95990753173828,513.1748657226563,539.9889803009033,504.0666809082031]},{"page":51,"text":"the—","rect":[107.95990753173828,522.673828125,130.22434616088868,515.5897216796875]},{"page":51,"text":"","rect":[133.1999969482422,535.4053955078125,139.16105696249009,530.7131958007813]},{"page":51,"text":"","rect":[133.1999969482422,548.9053955078125,139.16105696249009,544.2131958007813]},{"page":51,"text":"","rect":[133.1999969482422,562.4053955078125,139.16105696249009,557.7131958007813]},{"page":51,"text":"","rect":[133.1999969482422,575.9053955078125,139.16105696249009,571.2131958007813]},{"page":51,"text":"","rect":[133.1999969482422,589.4053955078125,139.16105696249009,584.7131958007813]},{"page":51,"text":"","rect":[133.1999969482422,602.9053955078125,139.16105696249009,598.2131958007813]},{"page":51,"text":"","rect":[133.1999969482422,616.4053955078125,139.16105696249009,611.7131958007813]},{"page":51,"text":"","rect":[133.1999969482422,629.8453979492188,139.16105696249009,625.1531982421875]},{"page":51,"text":"","rect":[133.1999969482422,654.8654174804688,139.16105696249009,650.1732177734375]},{"page":51,"text":"","rect":[133.1999969482422,668.3654174804688,139.16105696249009,663.6732177734375]},{"page":51,"text":"","rect":[133.1999969482422,681.8654174804688,139.16105696249009,677.1732177734375]},{"page":51,"text":"","rect":[133.1999969482422,706.8854370117188,139.16105696249009,702.1932373046875]},{"page":51,"text":"Patient’s medical condition.","rect":[151.1999969482422,536.1102294921875,263.14446544647219,529.026123046875]},{"page":51,"text":"Forces employment.","rect":[151.1999969482422,551.63427734375,232.9010877609253,542.526123046875]},{"page":51,"text":"Enemy’s anticipated course of action and air defense capabilities.","rect":[151.1999969482422,565.13427734375,412.9023389816284,556.026123046875]},{"page":51,"text":"Anticipated patient load.","rect":[151.1999969482422,578.6142578125,249.82488536834718,569.526123046875]},{"page":51,"text":"Expected areas of patient density.","rect":[151.1999969482422,592.13427734375,285.88177013397219,583.026123046875]},{"page":51,"text":"Availability of MEDEVAC resources to include ground and air crews.","rect":[151.1999969482422,605.63427734375,433.36638927459719,596.526123046875]},{"page":51,"text":"Availability, location, and type of supporting medical treatment facilities.","rect":[151.1999969482422,619.13427734375,445.2446241378784,610.026123046875]},{"page":51,"text":"Adherence to the protections afforded to medical personnel, patients, medical units, and medical","rect":[151.1999969482422,632.5542602539063,540.0342173538209,623.4661254882813]},{"page":51,"text":"transports under the provisions of the Geneva Conventions.","rect":[151.1999969482422,644.0772705078125,388.96770763397219,634.9891357421875]},{"page":51,"text":"Unit airspace plan.","rect":[151.1999969482422,657.5742797851563,226.48028087615968,648.4861450195313]},{"page":51,"text":"Obstacle plans.","rect":[151.1999969482422,671.0742797851563,212.32000255584718,661.9861450195313]},{"page":51,"text":"Fire support plan (to ensure MEDEVAC assets are not dispatched onto routes and at the times","rect":[151.1999969482422,684.5742797851563,539.9690082054138,675.4861450195313]},{"page":51,"text":"affected by the fire support mission).","rect":[151.1999969482422,696.1173095703125,298.94387340545657,687.0091552734375]},{"page":51,"text":"Road network or dedicated MEDEVAC routes (contaminated and clean).","rect":[151.1999969482422,709.5942993164063,444.16387462615969,700.5061645507813]},{"page":51,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":51,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":51,"text":"1-29","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":52,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":52,"text":" Weather conditions.","rect":[115.19999694824219,81.50032806396485,213.76378917694093,74.40616607666016]},{"page":52,"text":"Medical Logistics","rect":[71.99783325195313,106.97119140625,144.47248720932007,98.03335571289063]},{"page":52,"text":"1-163. FM 3-90 does not discuss medical logistics. (See FM 4-02 and ATP 4-02.1 for more information on","rect":[90.00377655029297,124.48614501953125,521.9429225921631,115.37796783447266]},{"page":52,"text":"medical logistics.)","rect":[89.98373413085938,136.0091552734375,163.34015441513064,126.9009780883789]},{"page":52,"text":"Additional Medical Considerations","rect":[72.0,158.37368774414063,236.34427890396118,150.77552795410157]},{"page":52,"text":"1-164. Tactical combat casualty care and casualty evacuation are not medical support functions. However,","rect":[90.0,178.13427734375,521.9655714035034,169.02609252929688]},{"page":52,"text":"these are vital concepts for leaders to understand and implement during tactical operations.","rect":[90.0,189.65728759765626,453.52361583709719,180.54910278320313]},{"page":52,"text":"Tactical Combat Casualty Care","rect":[72.00407409667969,213.11407470703126,201.13586140441894,204.17623901367188]},{"page":52,"text":"1-165. Tactical combat casualty care is divided into the three phases: care under fire, tactical field care, and","rect":[89.99999237060547,230.63909912109376,521.9495754241943,221.53091430664063]},{"page":52,"text":"tactical evacuation care. Tactical combat casualty care occurs during a combat mission and is the military","rect":[89.9899673461914,242.162109375,521.8856716156006,233.05392456054688]},{"page":52,"text":"counterpart to prehospital emergency medical treatment. Tactical combat casualty care in the military is most","rect":[89.9899673461914,253.62493896484376,522.0204234085084,244.51675415039063]},{"page":52,"text":"commonly provided by enlisted personnel and includes self-aid and buddy aid (first aid), combat lifesaver","rect":[89.9899673461914,265.14794921875,521.9391381797791,256.0397644042969]},{"page":52,"text":"(enhanced first aid), Army combat medics and critical care flight paramedics, corpsmen from the Navy and","rect":[89.9899673461914,276.67095947265627,521.9551906585693,267.5627746582031]},{"page":52,"text":"Marine Corps and the U.S. Coast Guard, and both medics and pararescuemen in the U.S. Air Force.","rect":[89.97993469238281,288.1138000488281,488.86733531951907,279.0256652832031]},{"page":52,"text":"1-166. In the care under fire phase, combat medical personnel and their units are under effective hostile fire","rect":[89.98994445800781,305.6387634277344,522.0041780548096,296.5506286621094]},{"page":52,"text":"and are very limited in the care they can provide. During this phase, only those lifesaving interventions that","rect":[89.97992706298828,317.18182373046877,522.0571055374146,308.0736389160156]},{"page":52,"text":"must be performed immediately are undertaken. Soldiers mainly focus on stabilizing the casualties to","rect":[89.97992706298828,328.64471435546877,522.0014553070068,319.5365295410156]},{"page":52,"text":"transport them to the next higher medical facility.","rect":[89.97992706298828,340.1676940917969,288.20452404022219,331.05950927734377]},{"page":52,"text":"1-167. During the tactical field care phase, medical personnel and their patients are no longer under","rect":[89.97992706298828,357.69268798828127,521.9833886680603,348.5845031738281]},{"page":52,"text":"effective hostile fire and medical personnel can provide more extensive patient care. In this phase,","rect":[89.96990966796875,369.1355285644531,521.8843946456909,360.0473937988281]},{"page":52,"text":"interventions directed at other life-threatening conditions, as well as resuscitation and other measures to","rect":[89.96990966796875,380.6785583496094,521.9348659515381,371.57037353515627]},{"page":52,"text":"increase the comfort of the patient may be performed. During tactical field care, personnel must be prepared","rect":[89.96990203857422,392.14141845703127,521.9948024749756,383.0332336425781]},{"page":52,"text":"to transition back to care under fire, or to prepare the casualty for tactical evacuation, as the tactical situation","rect":[89.96994018554688,403.6644287109375,522.0065822601318,394.5562438964844]},{"page":52,"text":"changes.","rect":[89.96994018554688,415.18743896484377,124.69024181365967,406.0792541503906]},{"page":52,"text":"1-168. In the tactical evacuation care phase, casualties are transported from the battlefield to medical","rect":[89.96994018554688,432.6322326660156,522.0016245803834,423.5440979003906]},{"page":52,"text":"treatment facilities. Evacuation can be by either MEDEVAC or casualty evacuation. (See FM 4-02 for more","rect":[89.95992279052735,444.1752624511719,522.0313386993408,435.06707763671877]},{"page":52,"text":"information on tactical combat casualty care).","rect":[89.95990753173828,455.6982727050781,273.23269176483157,446.590087890625]},{"page":52,"text":"Casualty Evacuation","rect":[71.95396423339844,479.15509033203127,157.87147425842287,470.2172546386719]},{"page":52,"text":"1-169. If MEDEVAC platforms are available, casualties should be evacuated on these platforms to ensure","rect":[89.95990753173828,496.6499938964844,522.0076570587158,487.5618591308594]},{"page":52,"text":"that they receive proper enroute medical care. However, if dedicated medical evacuation assets are","rect":[89.94989013671875,508.19305419921877,522.0048494415283,499.0848693847656]},{"page":52,"text":"unavailable, units use non-dedicated vehicles to transport causalities. Casualty evacuation is the movement","rect":[89.94989013671875,519.6559448242188,522.0152964553834,510.5477600097656]},{"page":52,"text":"of casualties aboard nonmedical vehicles or aircraft without enroute medical care (FM 4-02). Casualty","rect":[89.93983459472656,531.178955078125,521.8439235687256,522.07080078125]},{"page":52,"text":"evacuation (CASEVAC) involves the unregulated movement of casualties using tactical or logistic aircraft","rect":[89.92986297607422,542.7019653320313,521.9634165725709,533.5938110351563]},{"page":52,"text":"and vehicles. These vehicles or aircraft are not staffed with medical personnel for enroute care (unless","rect":[89.92986297607422,554.1448364257813,522.0017230491638,545.0567016601563]},{"page":52,"text":"augmentation is planned for in the operation plan). These vehicles and aircraft do not have organic medical","rect":[89.92986297607422,565.6878662109375,521.8588633499146,556.5797119140625]},{"page":52,"text":"equipment. If the combat medic is not available to provide care enroute, the combat lifesaver may accompany","rect":[89.92990112304688,577.2108154296875,522.0635890960693,568.1026611328125]},{"page":52,"text":"the casualties to monitor their conditions.","rect":[89.92986297607422,586.649658203125,255.51842784881593,579.5655517578125]},{"page":52,"text":"1-170. Combat operations place a significant burden on medical resources due to the magnitude and","rect":[89.92986297607422,606.188720703125,522.0061550140381,597.08056640625]},{"page":52,"text":"lethality of the forces involved. Medical units must anticipate large numbers of casualties in a short period","rect":[89.92985534667969,617.7117309570313,521.9279079437256,608.6035766601563]},{"page":52,"text":"due to the capabilities of modern conventional weapons and the possible employment of weapons of mass","rect":[89.92986297607422,629.1746215820313,521.9469134788513,620.0664672851563]},{"page":52,"text":"destruction. These mass casualty situations can rapidly exceed the capabilities of medical assets. Mass","rect":[89.92986297607422,640.6976318359375,521.9221332054138,631.5894775390625]},{"page":52,"text":"casualty refers to any number of human casualties produced across a period of time that exceeds available","rect":[89.92990112304688,652.160400390625,521.9461336212158,643.05224609375]},{"page":52,"text":"medical support capabilities (JP 4-02). Careful planning and coordination are necessary to minimize the","rect":[89.92986297607422,663.6834716796875,521.9272737579346,654.5753173828125]},{"page":52,"text":"extent to which medical capabilities are overwhelmed. CASEVAC must occur concurrently with operations.","rect":[89.92987060546875,675.2064819335938,521.9823560714722,666.0983276367188]},{"page":52,"text":"Units that cease aggressive maneuver to evacuate casualties while in enemy contact are likely to both suffer","rect":[89.93989562988281,686.6693725585938,521.9537255821228,677.5612182617188]},{"page":52,"text":"additional casualties while stationary and fail their mission. Effective management of mass casualty situations","rect":[89.93989562988281,698.1923828125,522.0114276390076,689.084228515625]},{"page":52,"text":"1-30","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":52,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":52,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":53,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":53,"text":"depends on established and rehearsed unit-level mass casualty plans. There are a number of other variables","rect":[108.0,83.51434326171875,540.0214374046326,74.40616607666016]},{"page":53,"text":"which can ensure the success of a unit's mass casualty response. These include, but are not limited to—","rect":[108.0,94.97723388671875,521.1110038757324,85.86905670166016]},{"page":53,"text":" Coordination of additional medical support and augmentation of medical evacuation support,","rect":[133.1999969482422,108.47430419921875,540.0910596847534,99.36612701416016]},{"page":53,"text":"forward resuscitative and surgical detachments, combat support and field hospitals, casualty","rect":[151.1999969482422,119.997314453125,539.9680080413818,110.8891372680664]},{"page":53,"text":"collection points, ambulance exchange points, and established Class VIII resupply.","rect":[151.1999969482422,131.52032470703126,482.80388927459719,122.41214752197266]},{"page":53,"text":" Rapid clearance of casualties from the battlefield (independent of MEDEVAC).","rect":[133.1999969482422,144.9943084716797,470.5585889816284,135.90615844726563]},{"page":53,"text":" Providing effective tactical combat casualty care for the injured.","rect":[133.1999969482422,158.51434326171876,408.0297498703003,149.39614868164063]},{"page":53,"text":" Continuous flow of casualties to the medical treatment facilities at the next higher role of care.","rect":[133.1999969482422,172.01434326171876,529.4268140792847,162.90615844726563]},{"page":53,"text":" Use of alternative assets when the number of casualties overwhelms the capacity of available","rect":[133.1999969482422,185.51434326171876,539.9665803985596,176.40615844726563]},{"page":53,"text":"medical evacuation systems.","rect":[151.1999969482422,196.97723388671876,265.35381603240969,187.86904907226563]},{"page":53,"text":"PROTECTION WARFIGHTING FUNCTION","rect":[90.0,220.36801147460938,286.62019443511965,212.25601196289063]},{"page":53,"text":"1-171. The protection warfighting function is the related tasks, systems, and methods that prevent or","rect":[108.0,240.2943115234375,540.0214746055603,231.18612670898438]},{"page":53,"text":"mitigate detection, threat effects, and hazards to preserve combat power and enable freedom of action (FM","rect":[108.0,251.7572021484375,539.8521773796082,242.64901733398438]},{"page":53,"text":"3-0). Protection encompasses everything that makes the Army forces hard to detect and hard to destroy.","rect":[108.0,263.28021240234377,539.9499464035034,254.17202758789063]},{"page":53,"text":"Protection requires units to understand and visualize threats and hazards in an operational environment. This","rect":[108.0,274.7831726074219,539.9403216819763,265.6950378417969]},{"page":53,"text":"understanding allows units to prioritize their requirements and commit capabilities and resources according","rect":[108.0,286.2660827636719,539.9862575531006,277.15789794921877]},{"page":53,"text":"to those priorities. The protection warfighting function is the responsibility of all unit types and echelons in","rect":[108.0,297.7890625,540.0193996429443,288.6808776855469]},{"page":53,"text":"order to maintain the force’s integrity and combat power.","rect":[108.0,309.31207275390627,337.12041759490969,300.2038879394531]},{"page":53,"text":"1-172.","rect":[108.0,324.7528991699219,133.84157848358155,317.84912109375]},{"page":53,"text":"","rect":[133.1999969482422,337.52545166015627,139.16105696249009,332.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,351.02545166015627,139.16105696249009,346.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,364.52545166015627,139.16105696249009,359.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,378.02545166015627,139.16105696249009,373.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,391.52545166015627,139.16105696249009,386.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,405.02545166015627,139.16105696249009,400.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,418.52545166015627,139.16105696249009,413.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,432.02545166015627,139.16105696249009,427.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,445.52545166015627,139.16105696249009,440.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,459.02545166015627,139.16105696249009,454.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,472.52545166015627,139.16105696249009,467.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,486.02545166015627,139.16105696249009,481.33319091796877]},{"page":53,"text":"","rect":[133.1999969482422,499.52545166015627,139.16105696249009,494.83319091796877]},{"page":53,"text":"","rect":[133.1999969482422,513.025390625,139.16105696249009,508.3331604003906]},{"page":53,"text":"","rect":[133.1999969482422,526.525390625,139.16105696249009,521.8331909179688]},{"page":53,"text":"","rect":[133.1999969482422,540.025390625,139.16105696249009,535.3331909179688]},{"page":53,"text":"The protection warfighting function includes these tasks:","rect":[142.54896545410157,326.7769470214844,370.3447642288208,317.66876220703127]},{"page":53,"text":"Conduct survivability operations.","rect":[151.1999969482422,340.2543029785156,284.86785411834719,331.1461181640625]},{"page":53,"text":"Coordinate air and missile defense support.","rect":[151.1999969482422,353.7342529296875,324.5189161300659,344.6461181640625]},{"page":53,"text":"Conduct populace and resources control.","rect":[151.1999969482422,367.2342529296875,314.1962842941284,358.1461181640625]},{"page":53,"text":"Conduct electromagnetic protection.","rect":[151.1999969482422,380.7543029785156,296.9859571456909,371.6461181640625]},{"page":53,"text":"Perform cyberspace security and defense.","rect":[151.1999969482422,394.2543029785156,317.5570020675659,385.1461181640625]},{"page":53,"text":"Provide force health protection.","rect":[151.1999969482422,407.7342529296875,277.8387403488159,398.6461181640625]},{"page":53,"text":"Conduct CBRN operations.","rect":[151.1999969482422,421.2342529296875,261.53826427459719,412.1461181640625]},{"page":53,"text":"Provide explosive ordnance disposal support.","rect":[151.1999969482422,434.7342529296875,332.5640516281128,425.6461181640625]},{"page":53,"text":"Conduct personnel recovery.","rect":[151.1999969482422,448.2543029785156,266.4460401535034,439.1461181640625]},{"page":53,"text":"Conduct detention operations.","rect":[151.1999969482422,461.7342529296875,271.54522228240969,452.6461181640625]},{"page":53,"text":"Conduct risk management.","rect":[151.1999969482422,475.2543029785156,258.70156383514407,466.1461181640625]},{"page":53,"text":"Implement physical security procedures.","rect":[151.1999969482422,488.7543029785156,313.4167432785034,479.6461181640625]},{"page":53,"text":"Apply antiterrorism measures.","rect":[151.1999969482422,502.2543029785156,272.6243848800659,493.1461181640625]},{"page":53,"text":"Conduct police operations.","rect":[151.1999969482422,515.7342529296875,258.76772594451907,506.6460876464844]},{"page":53,"text":"Conduct area security.","rect":[151.1999969482422,529.2542724609375,240.88000011444093,520.1461181640625]},{"page":53,"text":"Implement operations security.","rect":[151.1999969482422,542.7542724609375,275.3247938156128,533.6461181640625]},{"page":53,"text":"Survivability Operations","rect":[90.0,567.3807373046875,206.4022928199768,557.5755615234375]},{"page":53,"text":"1-173. Survivability is a quality or capability of military forces which permits them to avoid or withstand","rect":[108.0,584.934326171875,540.0162258148193,575.826171875]},{"page":53,"text":"hostile actions or environmental conditions while retaining the ability to fulfill their primary mission","rect":[107.99999237060547,596.3971557617188,540.0233058929443,587.2890014648438]},{"page":53,"text":"(ATP 3-37.34/MCTP 3-34C). Survivability operations are those protection activities that alter the physical","rect":[107.99999237060547,607.920166015625,539.9520640335084,598.81201171875]},{"page":53,"text":"environment by providing or improving cover, camouflage, and concealment (ATP 3-37.34/MCTP 3-34C).","rect":[107.9999771118164,619.4431762695313,540.0353345870972,610.3350219726563]},{"page":53,"text":"Units exploit existing terrain features to enhance their survivability by altering the physical environment to","rect":[107.98998260498047,630.9060668945313,539.9106349945068,621.7979125976563]},{"page":53,"text":"provide or improve their cover and concealment. Likewise, units can use natural or manmade materials as","rect":[107.98999786376953,642.4090576171875,539.9502093772888,633.3209228515625]},{"page":53,"text":"camouflage to confuse, mislead, or evade the enemy to enhance their survivability.","rect":[107.99000549316406,653.8919677734375,439.51897716522219,644.7838134765625]},{"page":53,"text":"1-174. All units conduct survivability operations within the limits of their capabilities. These include","rect":[107.99000549316406,671.4169311523438,540.0943880157471,662.3087768554688]},{"page":53,"text":"camouflaging their positions and constructing individual or crew served fighting positions. Engineers and","rect":[107.97998046875,682.93994140625,540.0525417327881,673.831787109375]},{"page":53,"text":"CBRN units possess additional capabilities to assist survivability operations. These include hardening","rect":[107.97998046875,694.4027709960938,539.9561061859131,685.2946166992188]},{"page":53,"text":"structures and positions and the reconnaissance, surveillance, and decontamination of CBRN hazards.","rect":[107.97998046875,705.90576171875,515.1207838058472,696.817626953125]},{"page":53,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":53,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":53,"text":"1-31","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":54,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":54,"text":"1-175. Survivability operations enhance the ability to avoid or withstand hostile actions by altering the","rect":[90.0,83.51434326171875,522.0421419219971,74.40616607666016]},{"page":54,"text":"physical environment. They accomplish this through four tasks:","rect":[90.0,94.97723388671875,345.0231089553833,85.86905670166016]},{"page":54,"text":" Constructing fighting positions.","rect":[115.19999694824219,108.47430419921875,260.20754528045657,99.36612701416016]},{"page":54,"text":" Constructing protective positions.","rect":[115.19999694824219,121.97430419921875,268.49004650115969,112.86612701416016]},{"page":54,"text":" Hardening facilities.","rect":[115.19999694824219,135.47430419921876,214.78486156463624,126.36612701416016]},{"page":54,"text":" Employing camouflage and concealment.","rect":[115.19999694824219,148.97430419921876,299.2645215988159,139.86611938476563]},{"page":54,"text":"The first three tasks focus on providing cover, while the fourth task focuses on providing protection from","rect":[89.9937515258789,163.4932861328125,522.0166907272339,154.38510131835938]},{"page":54,"text":"observation and surveillance. These four tasks often have the added benefit of providing some degree of ","rect":[89.9937515258789,175.01629638671876,524.4659986495972,165.90811157226563]},{"page":54,"text":"shelter or protection from the elements. All four tasks are often addressed in combination. For example,","rect":[89.9937515258789,186.4591522216797,522.0007276535034,177.37100219726563]},{"page":54,"text":"constructing fighting positions and protective positions usually also requires employing camouflage and","rect":[89.9937515258789,198.002197265625,522.0027980804443,188.89401245117188]},{"page":54,"text":"concealment. Employing camouflage and concealment often accompanies activities to harden facilities.","rect":[89.9937515258789,209.46502685546876,504.1986951828003,200.35684204101563]},{"page":54,"text":"Air and Missile Defense","rect":[72.0,231.8627166748047,183.4952827606201,224.27552795410157]},{"page":54,"text":"1-176. Army air defense artillery forces provide low-to-high altitude air and missile defense (AMD), and","rect":[90.0,251.63427734375,521.9982814788818,242.52609252929688]},{"page":54,"text":"contribute to situational understanding, airspace management, freedom of movement, freedom from aerial","rect":[89.97993469238281,263.15728759765627,521.9881968460084,254.04910278320313]},{"page":54,"text":"attack, and early warning. These capabilities deter or defeat enemy aerial threats, protect the friendly force","rect":[89.97993469238281,274.62017822265627,521.8554964141846,265.5119934082031]},{"page":54,"text":"and high-value assets, and enable the friendly force’s freedom to operate. Enemy air threats include but are","rect":[89.97993469238281,286.1431579589844,522.0412874298096,277.03497314453127]},{"page":54,"text":"not limited to rockets, missiles, unmanned aircraft, and manned rotary- and fixed-wing aircraft. Counterair","rect":[89.97993469238281,297.6661682128906,522.0243060569763,288.5579833984375]},{"page":54,"text":"is a mission at the theater level that integrates offensive and defensive operations to attain and maintain a","rect":[89.95986938476563,309.1290283203125,521.9853792266846,300.0208435058594]},{"page":54,"text":"desired degree of control of the air and protection by neutralizing or destroying enemy aircraft and missiles,","rect":[89.95986938476563,320.65203857421877,521.9372510910034,311.5438537597656]},{"page":54,"text":"both before and after launch (JP 3-01). Counterair, from the active air defense perspective is a joint","rect":[89.95987701416016,332.175048828125,522.0364146194459,323.0568542480469]},{"page":54,"text":"responsibility and will vary based on assets available and priorities. The area air defense commander through","rect":[89.94985961914063,343.637939453125,521.9912014007568,334.5297546386719]},{"page":54,"text":"the area air defense plan executes this mission for a theater and provides the required integration and close","rect":[89.94986724853516,355.1609191894531,521.9008455352783,346.052734375]},{"page":54,"text":"coordination between Army air defense artillery forces and other counterair forces. Short-range air defense","rect":[89.94986724853516,366.6238098144531,521.9440584259033,357.515625]},{"page":54,"text":"(known as SHORAD) assets may be attached or in direct support of corps and divisions.","rect":[89.93990325927735,378.14678955078127,443.5057020187378,369.0386047363281]},{"page":54,"text":"1-177. Units employ both active and passive methods of air defense to include air defense artillery systems,","rect":[89.93988037109375,395.6717834472656,521.9971876144409,386.5635986328125]},{"page":54,"text":"direct fire weapons systems, and air guards. Active AMD are direct defensive actions taken to destroy,","rect":[89.92986297607422,407.1346435546875,521.9020948410034,398.0264587402344]},{"page":54,"text":"nullify, or reduce the effectiveness of hostile air and missile threats against friendly forces and assets. It","rect":[89.92984008789063,418.65765380859377,521.9111704788209,409.5494689941406]},{"page":54,"text":"includes the use of aircraft, air defense weapons, electromagnetic warfare, and other available weapons.","rect":[89.92984008789063,430.1806640625,521.8154249191284,421.0724792480469]},{"page":54,"text":"Active missile defense requires early detection of missiles in flight to permit cueing, acquisition, tracking,","rect":[89.92984008789063,441.6435546875,521.9390821456909,432.5353698730469]},{"page":54,"text":"classification, identification, and destruction as soon as possible after launch. Passive AMD are all measures,","rect":[89.92984008789063,453.146484375,521.9665479660034,444.058349609375]},{"page":54,"text":"other than active air defenses, taken to minimize the effects of hostile air and missile threats against friendly","rect":[89.92984008789063,464.68951416015627,521.9599514007568,455.5813293457031]},{"page":54,"text":"forces and assets. All units conduct passive actions to reduce the effectiveness of the enemy air threat. These","rect":[89.92984008789063,476.15240478515627,522.0032625274658,467.0442199707031]},{"page":54,"text":"measures include camouflage, concealment, military deception, dispersion, reconstitution, redundancy,","rect":[89.92986297607422,487.6754150390625,521.9774122238159,478.5672302246094]},{"page":54,"text":"detection and warning systems, and the use of protective construction. Passive actions are a unit’s first line","rect":[89.92986297607422,499.1983947753906,521.8301057891846,490.0902099609375]},{"page":54,"text":"of defense and improve survivability by reducing the likelihood of being detected and targeted from the air","rect":[89.92986297607422,510.6612548828125,521.8496606407166,501.5530700683594]},{"page":54,"text":"and by mitigating the potential effects of air surveillance and attack. Passive missile defense measures include","rect":[89.92986297607422,522.1842651367188,522.0442781524658,513.0761108398438]},{"page":54,"text":"detecting air and missile launches, predicting impact points, providing threat identification, and","rect":[89.92986297607422,533.707275390625,521.9849147796631,524.59912109375]},{"page":54,"text":"disseminating early warning. It includes measures initiated to reduce vulnerability and to minimize the effect","rect":[89.92986297607422,545.170166015625,521.9050059280396,536.06201171875]},{"page":54,"text":"of damage caused by missile attack.","rect":[89.92990112304688,556.6931762695313,233.7929334640503,547.5850219726563]},{"page":54,"text":"1-178. Generally, the joint force uses both offensive and defensive counterair operations to dominate enemy","rect":[89.92986297607422,574.2182006835938,521.9230251312256,565.0999145507813]},{"page":54,"text":"airspace and prevent the launch of threats. Offensive counterair operations include the suppression of enemy","rect":[89.91980743408203,585.6810302734375,521.9499416351318,576.5728759765625]},{"page":54,"text":"air defenses. Defensive counterair operations defeat enemy air and missile threats attempting to penetrate or","rect":[89.91983795166016,597.2040405273438,521.8765161094666,588.0958862304688]},{"page":54,"text":"attack through friendly airspace. Units integrate joint forces to exploit the mutually beneficial effects of","rect":[89.91983795166016,608.6669311523438,522.0053613243103,599.5487060546875]},{"page":54,"text":"offensive and defensive actions to destroy, neutralize, or minimize air and missile threats.","rect":[89.91984558105469,620.18994140625,448.40813732147219,611.081787109375]},{"page":54,"text":"1-179. Units coordinate and clear air and missile defense fires on the ground and through the airspace to","rect":[89.91984558105469,637.7149658203125,521.8395900726318,628.6068115234375]},{"page":54,"text":"enable rapid and timely engagement of threats while preventing fratricide. However, the ground force","rect":[89.91980743408203,649.1777954101563,521.9894075469971,640.0696411132813]},{"page":54,"text":"executing the defense ensures that as much as possible of their defended asset list is in range of these air and","rect":[89.91983795166016,660.7008056640625,521.9449367523193,651.5926513671875]},{"page":54,"text":"missile defense systems. Units take both active and passive air defense measures to protect themselves from","rect":[89.91983795166016,672.2238159179688,521.9121375045777,663.1156616210938]},{"page":54,"text":"aerial attack.","rect":[89.91984558105469,681.6626586914063,141.01784801483155,674.5785522460938]},{"page":54,"text":"1-180. A ground force’s organic weapons are its primary defense against short-range air threats. Units","rect":[89.91984558105469,701.211669921875,521.9632098655701,692.103515625]},{"page":54,"text":"weigh the air threat with their ability to mitigate the threat when considering options for operations. Units","rect":[89.90986633300781,712.7347412109375,521.8070819358826,703.6265869140625]},{"page":54,"text":"1-32","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":54,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":54,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":55,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":55,"text":"position available organic or supporting radars in locations to best support the operation. The selection of ","rect":[108.0,83.51434326171875,542.4711866378784,74.40616607666016]},{"page":55,"text":"those positions reflects a risk assessment designed to preclude their early loss to enemy action. Units establish","rect":[108.0,94.97723388671875,540.0140285491943,85.86905670166016]},{"page":55,"text":"air defense priorities based on the concept of operations, scheme of maneuver, air situation, and the air","rect":[108.0,106.48020935058594,539.9512841758728,97.3920669555664]},{"page":55,"text":"defense priorities. Friendly air defense communicates weapon status to friendly assets, balances protection","rect":[108.0,118.023193359375,539.9340114593506,108.9150161743164]},{"page":55,"text":"of ground units, and prevents fratricide of friendly air assets.","rect":[108.0,129.486083984375,350.35796642303469,120.3779067993164]},{"page":55,"text":"Populace and Resources Control","rect":[90.0,154.0787353515625,243.05900115203858,144.30653381347657]},{"page":55,"text":"1-181. Units include populace and resources control measures in their planning and execution of all","rect":[108.0,171.654296875,540.0161509475709,162.54611206054688]},{"page":55,"text":"operations. Ensuring proper implementation of populace and resources controls can keep civilians from","rect":[108.0,183.1171875,540.0379919967652,174.00900268554688]},{"page":55,"text":"potentially getting harmed by or disrupting military operations, increase OPSEC by limiting their access to","rect":[108.0,194.64019775390626,540.0052394866943,185.53201293945313]},{"page":55,"text":"sensitive areas, and disrupt illegal activities that can affect military logistics. During the conduct of large-","rect":[108.0,206.1632080078125,539.9722802696228,197.05502319335938]},{"page":55,"text":"scale combat operations, an indigenous civil government will probably not be able to define, enact, and","rect":[108.0,217.62603759765626,540.0223293304443,208.51785278320313]},{"page":55,"text":"enforce populace and resources control measures. (See FM 3-57, ATP 3-39.30, and ATP 3-57.10 for","rect":[108.0,229.12901306152345,540.0804956016541,220.04086303710938]},{"page":55,"text":"additional information on the conduct of populace and resource control.)","rect":[107.97997283935547,240.6520233154297,398.5399377403259,231.56387329101563]},{"page":55,"text":"Electromagnetic Protection","rect":[90.0,265.2207336425781,218.59663999938966,255.4156036376953]},{"page":55,"text":"1-182.","rect":[108.0,280.7302551269531,133.84157848358155,273.84649658203127]},{"page":55,"text":"Many ","rect":[142.55897521972657,282.7743225097656,168.40355968475343,273.9867858886719]},{"page":55,"text":"Army ","rect":[174.77627563476563,282.7743225097656,200.5607557296753,273.83648681640627]},{"page":55,"text":"capabilities—including ","rect":[206.9334716796875,282.7743225097656,302.74370861053469,273.6661376953125]},{"page":55,"text":"communications, ","rect":[309.1164245605469,281.0,380.2083387374878,273.6661376953125]},{"page":55,"text":"cyberspace ","rect":[386.5810546875,282.7743225097656,433.42556285858157,273.6661376953125]},{"page":55,"text":"operations, ","rect":[439.79827880859377,282.7542724609375,486.40334606170657,273.6661376953125]},{"page":55,"text":"information","rect":[492.77606201171877,281.0,539.9672145843506,273.6661376953125]},{"page":55,"text":"collection, space capabilities, target detection, and precision guided munitions—depend on assured access to","rect":[108.0,294.2973327636719,540.0323390960693,285.18914794921877]},{"page":55,"text":"the electromagnetic spectrum. The tasks to protect Army access to the electromagnetic spectrum are—","rect":[108.0,305.76019287109377,518.3991813659668,296.6520080566406]},{"page":55,"text":" Conduct electromagnetic protection actions.","rect":[133.1999969482422,319.2543029785156,327.82757091522219,310.1461181640625]},{"page":55,"text":" Conduct electromagnetic spectrum operations.","rect":[133.1999969482422,332.7543029785156,337.2382764816284,323.6461181640625]},{"page":55,"text":" Conduct defensive electromagnetic attack.","rect":[133.1999969482422,346.2543029785156,321.15517711639407,337.1461181640625]},{"page":55,"text":"For more information on electromagnetic protection, see JP 3-85.","rect":[108.00376892089844,360.7732849121094,369.58587169647219,351.66510009765627]},{"page":55,"text":"Conduct Electromagnetic Protection Actions","rect":[90.00785064697266,384.29022216796877,274.21449160385137,375.3523864746094]},{"page":55,"text":"1-183.","rect":[108.01380157470703,399.71099853515627,133.8553876876831,392.8272399902344]},{"page":55,"text":"Electromagnetic protection is a division of electromagnetic warfare involving actions taken to","rect":[142.56275939941407,401.75506591796877,539.9550685882568,392.6468811035156]},{"page":55,"text":"protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic","rect":[108.0037841796875,413.278076171875,539.9433260040283,404.1698913574219]},{"page":55,"text":"spectrum that degrade, neutralize, or destroy friendly combat capability (JP 3-85). This includes actions taken","rect":[108.0037841796875,424.80108642578127,540.0421657562256,415.6929016113281]},{"page":55,"text":"to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a radio or variable pulse","rect":[107.9937744140625,436.26397705078127,540.0008211212158,427.1557922363281]},{"page":55,"text":"repetition frequency in radar. Electromagnetic protection protects U.S. and allied systems from the effects of","rect":[107.9937744140625,447.7869567871094,540.0376489219666,438.67877197265627]},{"page":55,"text":"friendly and enemy electromagnetic attack and electromagnetic interference.","rect":[107.9937744140625,459.3099670410156,414.49770641326907,450.2017822265625]},{"page":55,"text":"1-184.","rect":[107.9937744140625,474.73077392578127,133.83535289764405,467.8470153808594]},{"page":55,"text":"","rect":[133.1999969482422,487.52545166015627,139.16105696249009,482.83319091796877]},{"page":55,"text":"","rect":[133.1999969482422,501.02545166015627,139.16105696249009,496.33319091796877]},{"page":55,"text":"","rect":[133.1999969482422,514.525390625,139.16105696249009,509.8331604003906]},{"page":55,"text":"","rect":[133.1999969482422,528.025390625,139.16105696249009,523.3331909179688]},{"page":55,"text":"","rect":[133.1999969482422,541.525390625,139.16105696249009,536.8331909179688]},{"page":55,"text":"Electromagnetic protection actions include—","rect":[142.54273986816407,476.77484130859377,323.9247856140137,467.6666564941406]},{"page":55,"text":"Electromagnetic compatibility.","rect":[151.1999969482422,490.2543029785156,275.02520275115969,481.1461181640625]},{"page":55,"text":"Electromagnetic hardening.","rect":[151.1999969482422,503.7543029785156,261.76369762420657,494.6461181640625]},{"page":55,"text":"Electronic masking.","rect":[151.1999969482422,517.2542724609375,231.22474193572999,508.1460876464844]},{"page":55,"text":"Emission control.","rect":[151.1999969482422,528.730224609375,221.80494213104249,521.6461181640625]},{"page":55,"text":"Wartime reserve modes.","rect":[151.1999969482422,542.240234375,248.67957592010499,535.1461181640625]},{"page":55,"text":"Conduct Electromagnetic Spectrum Operations","rect":[90.00785827636719,567.771240234375,285.30470156478887,558.8233642578125]},{"page":55,"text":"1-185. Electromagnetic spectrum operations is coordinated military actions to exploit, attack, protect, and","rect":[108.00376892089844,585.236083984375,540.0179347991943,576.1279296875]},{"page":55,"text":"manage the electromagnetic environment (JP 3-85). Electromagnetic spectrum operations enable","rect":[107.99374389648438,596.7590942382813,540.0451326446533,587.6509399414063]},{"page":55,"text":"electromagnetic systems to perform their functions in the intended environment without causing or suffering","rect":[107.98373413085938,608.2821044921875,539.9601955413818,599.1739501953125]},{"page":55,"text":"unacceptable interference.","rect":[107.98370361328125,619.7249755859375,212.96227550506593,610.6368408203125]},{"page":55,"text":"Conduct Defensive Electromagnetic Attack","rect":[89.98780822753906,643.261962890625,267.5071315765381,634.3240966796875]},{"page":55,"text":"1-186. Defensive electromagnetic attack primarily protects friendly personnel and equipment or platforms","rect":[107.98373413085938,660.7869262695313,540.0199115257263,651.6787719726563]},{"page":55,"text":"against lethal attacks by denying enemy use of the electromagnetic spectrum to guide or trigger weapons.","rect":[107.97370910644531,672.2498168945313,539.9816846847534,663.1416625976563]},{"page":55,"text":"Defensive electromagnetic attack uses the electromagnetic spectrum to protect personnel, facilities,","rect":[107.97370910644531,683.7727661132813,539.8932447433472,674.6646118164063]},{"page":55,"text":"capabilities, and equipment. Examples of self-protection and other protection measures include the use of","rect":[107.97370910644531,695.2757568359375,539.9881494102478,686.1876220703125]},{"page":55,"text":"expendables (flares and active decoys), jammers, towed decoys, directed-energy infrared countermeasures,","rect":[107.97370910644531,706.7586669921875,540.0009717941284,697.6404418945313]},{"page":55,"text":"and counter radio-controlled improvised explosive device systems.","rect":[107.96365356445313,718.2816162109375,375.42861461639407,709.1734619140625]},{"page":55,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":55,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":55,"text":"1-33","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":56,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":56,"text":"Perform Cyberspace Security and Cyberspace Defense","rect":[72.0,84.62071228027344,328.8518043670654,74.81556701660156]},{"page":56,"text":"1-187. The Army secures and defends the network through a defense-in-depth approach, incorporating","rect":[90.0,102.11431884765625,521.9529323577881,93.00614166259766]},{"page":56,"text":"layered security and defenses. The tasks to secure and defend cyberspace are—","rect":[89.98999786376953,113.6373291015625,407.0929374694824,104.52909088134766]},{"page":56,"text":" Perform cybersecurity activities.","rect":[115.19999694824219,127.13427734375,263.44500255584719,118.0261001586914]},{"page":56,"text":" Conduct defensive cyberspace operations-internal defensive measures.","rect":[115.19999694824219,140.63427734375,415.8952589035034,131.52609252929688]},{"page":56,"text":"1-188. Cyberspace security are actions taken within protected cyberspace to prevent unauthorized access","rect":[89.9937515258789,158.15924072265626,521.9951922874451,149.05105590820313]},{"page":56,"text":"to, an exploitation of, or damage to computers and networks, including platform information technology","rect":[89.9837417602539,169.62213134765626,521.9430446624756,160.51394653320313]},{"page":56,"text":"(JP 3-12). Cyberspace security is not specific to an enemy or adversary. Cyberspace security actions protect","rect":[89.98373413085938,181.1451416015625,521.9507212600709,172.03695678710938]},{"page":56,"text":"the networks and systems through all phases of network planning and implementation. Cyberspace security","rect":[89.98370361328125,192.66815185546876,522.0047512054443,183.55996704101563]},{"page":56,"text":"activities include vulnerability assessment and analysis, vulnerability management, incident handling,","rect":[89.98373413085938,204.13104248046876,522.0218458175659,195.02285766601563]},{"page":56,"text":"continuous monitoring, and detection and restoration capabilities to shield and preserve information and","rect":[89.98373413085938,215.654052734375,521.9858303070068,206.54586791992188]},{"page":56,"text":"information systems.","rect":[89.98373413085938,227.177001953125,173.90827465057374,218.06881713867188]},{"page":56,"text":"1-189. Cyberspace defense are actions taken within protected cyberspace to defeat specific threats that have","rect":[89.98373413085938,244.64190673828126,522.0491609649658,235.53372192382813]},{"page":56,"text":"breached or are threatening to breach cyberspace security measures (JP 3-12). The purpose of cyberspace","rect":[89.97368621826172,256.16485595703127,522.0301179962158,247.05667114257813]},{"page":56,"text":"defense includes actions to protect, detect, characterize, counter, and mitigate threats. Such defensive actions","rect":[89.97368621826172,267.6878662109375,521.9745013694763,258.5796813964844]},{"page":56,"text":"are usually created by the joint force command or Service that owns or operates the network, except in cases","rect":[89.97368621826172,279.1507568359375,522.0244891624451,270.0325622558594]},{"page":56,"text":"where these defensive actions would affect the operations of networks outside the responsibility of the","rect":[89.97368621826172,290.67376708984377,521.9676179962158,281.5655822753906]},{"page":56,"text":"respective joint force command or Service.","rect":[89.97368621826172,302.1967468261719,262.16042613983157,293.07855224609377]},{"page":56,"text":"Force Health Protection","rect":[72.0,324.5027160644531,184.98747862243654,316.9155578613281]},{"page":56,"text":"1-190. Force health protectionare measures that promote, improve, or conserve the behavioral and physical","rect":[90.0,344.2743225097656,522.1046519241334,335.1661376953125]},{"page":56,"text":"well-being of Soldiers comprised of preventive and treatment aspects of medical functions that include","rect":[89.99999237060547,355.7973327636719,521.9909944610596,346.68914794921877]},{"page":56,"text":"combat and operational stress control, dental services, veterinary services, operational public health, and","rect":[89.99999237060547,367.26019287109377,522.0162868499756,358.1520080566406]},{"page":56,"text":"laboratory services. Enabling a healthy and fit force, prevent injury and illness, and protect the force from","rect":[89.9999771118164,378.783203125,522.0029578170777,369.6650085449219]},{"page":56,"text":"health hazards (FM 4-02). (See FM 4-02 for additional information on force health protection).","rect":[89.9999771118164,390.2861633300781,470.1987257003784,381.1980285644531]},{"page":56,"text":"Chemical, Biological, Radiological, and Nuclear","rect":[72.0,414.8606872558594,295.8756080780029,405.0555725097656]},{"page":56,"text":"1-191. CBRN support to operations include the simultaneous application of the assess, protect, and mitigate","rect":[90.0,432.4142761230469,522.0964632110596,423.30609130859377]},{"page":56,"text":"functions guided by hazard awareness and understanding. CBRN units enable movement and maneuver of","rect":[90.0,443.9372863769531,521.9921777305603,434.8291015625]},{"page":56,"text":"supported units in accordance with the concept of operations and scheme of maneuver.","rect":[90.0,455.3800964355469,437.45073986053469,446.2919616699219]},{"page":56,"text":"1-192. CBRN staff assess potential CBRN threats and hazards and recommend mitigation measures to","rect":[90.0,472.9251403808594,522.0763454437256,463.81695556640627]},{"page":56,"text":"protect the force while minimizing degradation of units, personnel, equipment, and facilities from effects that","rect":[89.98997497558594,484.4481201171875,521.9805064163209,475.3399353027344]},{"page":56,"text":"would hinder operations. CBRN staffs advise units on risks and friendly vulnerabilities through their","rect":[89.98999786376953,495.9110107421875,521.9622705039978,486.8028259277344]},{"page":56,"text":"understanding of the operational environment and the enemy’s capabilities. Measures to protect against and","rect":[89.9899673461914,507.43402099609377,521.9586696624756,498.3258056640625]},{"page":56,"text":"mitigate CBRN effects include proper protective equipment, exposure guidance, and alarm conditions.","rect":[89.98999786376953,518.95703125,500.4443311691284,509.8488464355469]},{"page":56,"text":"1-193. CBRN operations include active measures to gain information on CBRN threats, enabling units to","rect":[89.98998260498047,536.421875,521.9861965179443,527.313720703125]},{"page":56,"text":"mitigate these threats and limit vulnerabilities while continuing operations. CBRN defense measures include","rect":[89.9799575805664,547.9448852539063,522.1465730743408,538.8367309570313]},{"page":56,"text":"individual, crew, and collective tasks. Units conduct CBRN reconnaissance and surveillance operations as","rect":[89.9799575805664,559.4478759765625,522.0083758811951,550.3597412109375]},{"page":56,"text":"complementary operations to facilitate maneuver by understanding the CBRN hazards. The time, techniques,","rect":[89.97998809814453,570.9307861328125,521.9880323410034,561.8226318359375]},{"page":56,"text":"and CBRN assets required to achieve reconnaissance objectives are determined by the intelligence","rect":[89.97998809814453,582.4537353515625,522.0458650665283,573.3355102539063]},{"page":56,"text":"requirements and mission variables. CBRN protection and mitigation measures increase the ability of the","rect":[89.97998809814453,593.9767456054688,521.9633455352783,584.8685913085938]},{"page":56,"text":"force to operate under CBRN conditions but may decrease operational tempo and increase sustainment","rect":[89.97998809814453,605.4396362304688,521.9737315139771,596.3314819335938]},{"page":56,"text":"requirements. (See FM 3-11 for more information on CBRN operations).","rect":[89.97998809814453,616.942626953125,381.86159801483157,607.8544921875]},{"page":56,"text":"Personnel Recovery","rect":[72.0,641.5407104492188,165.11586952209474,631.9112548828125]},{"page":56,"text":"1-194. Soldiers have an increased likelihood of becoming isolated during offensive operations. Units must","rect":[90.0,659.0343017578125,522.0853037796021,649.9261474609375]},{"page":56,"text":"train both the individual and staff on how to react when an isolating event occurs. Army personnel recovery","rect":[90.0,670.5573120117188,522.0653963165283,661.4491577148438]},{"page":56,"text":"is the military efforts taken to prepare for and execute the recovery and reintegration of isolated personnel","rect":[90.0,682.080322265625,521.9822154006959,672.97216796875]},{"page":56,"text":"(FM 3-50). Training includes the personnel recovery tasks of report, locate, support, recover, and reintegrate","rect":[90.0,693.5431518554688,522.0051546173096,684.4349975585938]},{"page":56,"text":"as well as the Code of Conduct and individual isolation tasks (survive, resist, escape, evade).","rect":[90.0,705.046142578125,461.01653575897219,695.9580078125]},{"page":56,"text":"1-34","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":56,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":56,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":57,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":57,"text":"Detention Operations","rect":[90.0,84.59874725341797,191.0994363746643,74.81556701660156]},{"page":57,"text":"1-195. Detention involves the detainment of a population or group that poses some level of threat to military","rect":[108.0,102.11431884765625,540.0644435882568,93.00614166259766]},{"page":57,"text":"operations. Unit staffs consider detention operations when developing plans. Detainee planning enables","rect":[108.0,113.6373291015625,540.0603778343201,104.5291519165039]},{"page":57,"text":"providing necessary resources to construct and operate detention facilities for the projected number of","rect":[108.0,125.16033935546875,540.0250146446228,116.04214477539063]},{"page":57,"text":"detainees. Units monitor the actual number of detainees closely to avoid devoting too many or too few","rect":[108.0,136.6231689453125,540.0081219711303,127.5149917602539]},{"page":57,"text":"resources to detention operations. It is essential to address all aspects of detainee operations while planning","rect":[108.0,148.14617919921876,539.9929714202881,139.03799438476563]},{"page":57,"text":"for the supported offensive operation. To ensure that units are prepared to incorporate detainee operations","rect":[108.0,159.64915466308595,540.0210711936951,150.56100463867188]},{"page":57,"text":"during planning, units establish mechanisms that ensure effective consideration of potential detainee","rect":[108.0,171.132080078125,540.0144319610596,162.02389526367188]},{"page":57,"text":"operations and their supporting activities.","rect":[108.0,182.65509033203126,273.8250379562378,173.54690551757813]},{"page":57,"text":"1-196. Detainee operations begin at the point of capture—the point at which a Soldier has the custody of,","rect":[108.0,200.1800537109375,540.0675001144409,191.07186889648438]},{"page":57,"text":"and is responsible for safeguarding, a detainee. Soldiers must be prepared to process and safeguard detainees.","rect":[107.9899673461914,211.6429443359375,540.0443677902222,202.53475952148438]},{"page":57,"text":"Actions at the point of capture—the point at which a Soldier has the custody of, and is responsible for","rect":[107.9899673461914,223.16595458984376,539.9382836875916,214.05776977539063]},{"page":57,"text":"safeguarding, a detainee—can directly affect mission success and could have a lasting impact on U.S. tactical,","rect":[107.9899673461914,234.68896484375,539.9313306808472,225.58078002929688]},{"page":57,"text":"operational, and strategic military objectives. All Soldiers must be prepared to process and safeguard","rect":[107.9899673461914,246.15179443359376,539.9500026702881,237.03359985351563]},{"page":57,"text":"detainees. Upon capture, Soldiers must use the five Ss and T technique (short for search, silence, segregate,","rect":[107.9899673461914,257.6748046875,539.9025220870972,248.56661987304688]},{"page":57,"text":"safeguard, speed, and tag) to process detainees. This technique provides a structure with which to guide","rect":[107.9899673461914,269.19781494140627,539.9813509063721,260.0896301269531]},{"page":57,"text":"Soldiers in conducting detainee operations until custody of the detainee transfers to another authority or","rect":[107.9899673461914,280.66070556640627,539.9919335899353,271.5525207519531]},{"page":57,"text":"location. (See FM 3-63 for additional details on detainee operations).","rect":[107.9899673461914,292.16363525390627,384.32949352264407,283.07550048828127]},{"page":57,"text":"1-197. During the conduct of operations, Soldiers may capture enemy prisoners of war (EPWs). At the point","rect":[107.98995971679688,309.70867919921877,540.1016612014771,300.6004943847656]},{"page":57,"text":"of capture, the detainees and EPWs share the same five Ss and T technique. However, the legal framework","rect":[107.97993469238281,321.1715393066406,539.9425563812256,312.0633544921875]},{"page":57,"text":"is different. The local nation has the legal authority for procedures for civilian detentions. However, Soldiers","rect":[107.97993469238281,332.69451904296877,539.9894549827576,323.5863342285156]},{"page":57,"text":"must handle EPWs in accordance with international law and treat them humanely; Soldiers must not abuse","rect":[107.97993469238281,344.15740966796877,539.8797884063721,335.0492248535156]},{"page":57,"text":"EPWs physically or mentally. EPWs must be allowed to keep their personal protective equipment. The unit","rect":[107.97993469238281,355.680419921875,540.0059580764771,346.5722351074219]},{"page":57,"text":"is responsible for their care. If a unit cannot evacuate EPWs in a reasonable time, they must give EPWs food,","rect":[107.97993469238281,367.2033996582031,539.9749097824097,358.09521484375]},{"page":57,"text":"water, and first aid. Soldiers should not give EPWs comfort items such as cigarettes or candy.","rect":[107.97993469238281,378.6662902832031,482.9643507003784,369.55810546875]},{"page":57,"text":"Risk Management","rect":[90.0,403.2206726074219,175.73843213272097,393.4155578613281]},{"page":57,"text":"1-198. Leaders must assume risk in knowing that subordinate leaders will not only accept, but also take","rect":[108.0,420.7743225097656,540.0362215118408,411.6661376953125]},{"page":57,"text":"risks to achieve mission success. Leaders identify and refine controls through continual dialogue with","rect":[108.0,432.2973327636719,540.0211086273193,423.18914794921877]},{"page":57,"text":"subordinate leaders to ensure their understanding of the commander’s intent. Time is a key factor in assessing","rect":[108.0,443.76019287109377,540.0293483734131,434.6520080566406]},{"page":57,"text":"and understanding risks that could impact successful operations. Reduced time impacts the tempo of","rect":[108.0,455.283203125,540.0300805625916,446.1750183105469]},{"page":57,"text":"operations as well as compresses planning timelines and asset requests. Such impacts can have significant","rect":[108.0,466.74609375,540.0318369827271,457.6379089355469]},{"page":57,"text":"downward implications to units on the ground. A compressed timeline can add additional risk to operations","rect":[108.0,478.2690734863281,539.9971454124451,469.160888671875]},{"page":57,"text":"with the following:","rect":[108.0,489.7920837402344,184.7051157913208,480.68389892578127]},{"page":57,"text":" Lack of implementing and resourcing potential deception activities.","rect":[133.1999969482422,503.2743225097656,421.6645460128784,494.1661376953125]},{"page":57,"text":" Rushed planning methodologies leading to incomplete plans.","rect":[133.1999969482422,516.7742919921875,395.3845167160034,507.6661071777344]},{"page":57,"text":" Confusing or unclear operation orders that lead to multiple fragmentary orders or verbal orders","rect":[133.1999969482422,530.2742919921875,539.9751117210388,521.1661376953125]},{"page":57,"text":"that can be misunderstood.","rect":[151.1999969482422,539.713134765625,258.40398693084719,532.6290283203125]},{"page":57,"text":"","rect":[133.1999969482422,552.5054321289063,139.16105696249009,547.813232421875]},{"page":57,"text":"","rect":[133.1999969482422,577.525390625,139.16105696249009,572.8331909179688]},{"page":57,"text":"","rect":[133.1999969482422,591.025390625,139.16105696249009,586.3331909179688]},{"page":57,"text":"","rect":[133.1999969482422,627.5054321289063,139.16105696249009,622.813232421875]},{"page":57,"text":"","rect":[133.1999969482422,641.0054321289063,139.16105696249009,636.313232421875]},{"page":57,"text":"An inability to request or use information collection assets resulting in ambiguity before","rect":[151.1999969482422,555.2343139648438,540.0209016876221,546.1261596679688]},{"page":57,"text":"operations.","rect":[151.1999969482422,566.7373046875,195.40423107147218,557.649169921875]},{"page":57,"text":"Lack of necessary rehearsals depending on the complexity and number of forces involved.","rect":[151.1999969482422,580.2542724609375,512.5092115402222,571.1461181640625]},{"page":57,"text":"An inability to provide necessary information for protection-related mitigation efforts in a CBRN","rect":[151.1999969482422,593.7542724609375,540.0522503890991,584.6461181640625]},{"page":57,"text":"environment such as mission-oriented protective posture, known as MOPP, or operational","rect":[151.1999969482422,605.2572631835938,540.0793223342896,596.1691284179688]},{"page":57,"text":"exposure guidance, known as OEG.","rect":[151.1999969482422,616.7401733398438,294.52712535858157,607.6320190429688]},{"page":57,"text":"Link-up procedures between organic and external forces.","rect":[151.1999969482422,630.2343139648438,379.2412061691284,621.1261596679688]},{"page":57,"text":"Lack of competing courses of action (COAs) resulting in an unnecessary limiting of options.","rect":[151.1999969482422,643.7343139648438,521.6845045089722,634.6261596679688]},{"page":57,"text":"1-199. When planning operations, leaders need to thoroughly understand the potential enemy formations","rect":[108.00376892089844,661.25927734375,539.9640643577576,652.151123046875]},{"page":57,"text":"they may encounter. This is achieved through a solid understanding of intelligence preparation of the","rect":[107.98373413085938,672.7822875976563,539.9806184844971,663.6741333007813]},{"page":57,"text":"battlefield and the threat template and situational template to ensure that friendly forces have the appropriate","rect":[107.98373413085938,684.2451782226563,539.9910554962158,675.1370239257813]},{"page":57,"text":"force ratio to execute both offensive and defensive operations. If the force ratio is not a preferred one, the","rect":[107.9937973022461,695.7481689453125,539.9576082305908,686.6600341796875]},{"page":57,"text":"unit assumes risk to the force and accomplishing directed mission objectives. This is also important for when","rect":[107.99375915527344,707.2911376953125,539.9308986663818,698.1729125976563]},{"page":57,"text":"units have to assume risk when planning branches, sequels, and follow-on operations.","rect":[107.99375915527344,718.7540283203125,450.75893688201907,709.6458740234375]},{"page":57,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":57,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":57,"text":"1-35","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":58,"text":"Chapter 1","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":58,"text":"1-200. Maintaining an awareness of the common operational picture (COP) as an operation progresses is","rect":[90.0,83.51434326171875,521.9529559593201,74.40616607666016]},{"page":58,"text":"another key risk reduction technique. To aid leaders and Soldiers in this process, units develop and employ","rect":[90.0,94.97723388671875,521.9391994476318,85.86905670166016]},{"page":58,"text":"effective techniques and standard operating procedures, including—","rect":[89.98998260498047,106.500244140625,362.9900321960449,97.3920669555664]},{"page":58,"text":" Monitoring the next higher echelon’s radio network.","rect":[115.19999694824219,119.99432373046875,342.94573497772219,110.88614654541016]},{"page":58,"text":" Having communication between units.","rect":[115.19999694824219,133.49432373046876,287.68340587615969,124.38614654541016]},{"page":58,"text":" Providing COP updates.","rect":[115.19999694824219,146.99432373046876,230.14348888397218,137.88613891601563]},{"page":58,"text":" Including accurate position reporting.","rect":[115.19999694824219,160.49432373046876,283.78362560272219,151.38613891601563]},{"page":58,"text":" Training and using liaison officers.","rect":[115.19999694824219,173.99432373046876,273.47198009490969,164.88613891601563]},{"page":58,"text":" Overseeing local security.","rect":[115.19999694824219,187.49432373046876,237.34185314178468,178.38613891601563]},{"page":58,"text":"For more information on risk management see ATP 5-19.","rect":[89.9937515258789,202.0133056640625,320.2633924484253,192.90512084960938]},{"page":58,"text":"Antiterrorism","rect":[72.0,224.3627166748047,137.97992726516726,216.77552795410157]},{"page":58,"text":"1-201. Antiterrorism consists of defensive measures used to reduce the vulnerability of individuals and","rect":[90.0,244.13427734375,521.9416408538818,235.02609252929688]},{"page":58,"text":"property to terrorist acts, including limited response and containment by local military and civilian forces (JP","rect":[89.98999786376953,255.65728759765626,522.1074361724853,246.54910278320313]},{"page":58,"text":"3-26). Antiterrorism is always a consideration for all forces. (See ATP 3-37.2 for additional information on","rect":[90.0,267.12017822265627,521.9471340179443,258.0119934082031]},{"page":58,"text":"antiterrorism operations).","rect":[90.0,278.6231384277344,191.6849775314331,269.5350036621094]},{"page":58,"text":"Police Operations","rect":[72.0,303.2387390136719,155.40845737075805,293.45556640625]},{"page":58,"text":"1-202. Police operations encompass two tasks—law enforcement and policing. These two tasks are","rect":[90.0,320.7543029785156,522.0593538360596,311.6461181640625]},{"page":58,"text":"complementary and interdependent but are conducted with a different intent. Law enforcement is conducted","rect":[89.9999771118164,332.2773132324219,521.8942165374756,323.16912841796877]},{"page":58,"text":"for the purpose of enforcing laws, investigating crimes, and apprehending (when warranted) persons for","rect":[89.9999771118164,343.80029296875,521.9706933555603,334.6921081542969]},{"page":58,"text":"adjudication within the appropriate judicial system. Policing is the application of control measures within an","rect":[89.9999771118164,355.26318359375,521.9791774749756,346.1449890136719]},{"page":58,"text":"area of operation to maintain law and order, safety, and other matters affecting the general welfare of the","rect":[90.00997924804688,366.78619384765627,521.9606599884033,357.6780090332031]},{"page":58,"text":"population (FM 3-39). Policing focuses on maintaining order and establishing security—not the enforcement","rect":[90.01000213623047,378.3091735839844,522.0964732131959,369.20098876953127]},{"page":58,"text":"of laws on the population or to compelling compliance at the risk of legal penalties. The relative emphasis","rect":[90.0,389.7720642089844,521.9010760765076,380.66387939453127]},{"page":58,"text":"given to policing and law enforcement tasks is based on the operational and mission variables, including the","rect":[90.0,401.2950744628906,522.0702180938721,392.1868896484375]},{"page":58,"text":"presence of the applicable rule of law. An operational environment characterized by general war will require","rect":[90.0,412.81805419921877,522.0122957305908,403.7098693847656]},{"page":58,"text":"police operations heavily weighted toward policing tasks, with minimal emphasis on law enforcement.","rect":[90.01001739501953,424.28094482421877,522.0434522628784,415.1727600097656]},{"page":58,"text":"Operational environments characterized by relative stability and governance under the rule of law will require","rect":[90.01001739501953,435.803955078125,522.1187410430908,426.6957702636719]},{"page":58,"text":"much more law enforcement activity and less focus on policing tasks. (See ATP 3-39.10 for additional","rect":[90.01001739501953,447.3269348144531,522.0423960647584,438.21875]},{"page":58,"text":"information on police operations).","rect":[90.02002716064453,458.769775390625,226.65774059295655,449.681640625]},{"page":58,"text":"Area Security","rect":[72.0,483.3807067871094,137.08396339416505,473.5755920410156]},{"page":58,"text":"1-203. Area security is a type of security operation conducted to protect friendly forces, lines of","rect":[90.0,500.9342956542969,522.0333154258728,491.9864501953125]},{"page":58,"text":"communications, and activities within a specific area. Area security operations occur regardless of which","rect":[89.99996185302735,512.397216796875,521.9020290374756,503.28900146484377]},{"page":58,"text":"operation is currently dominant. Area security is conducted through the following five variations—","rect":[89.99996185302735,523.920166015625,486.90217208862307,514.81201171875]},{"page":58,"text":" Site security. A unit conducting site security may protect locations such as base/base camps,","rect":[115.19999694824219,537.414306640625,522.0401563644409,528.30615234375]},{"page":58,"text":"tactical assembly areas, critical assets, port areas and piers.","rect":[133.1999969482422,548.937255859375,368.9064893722534,539.8291015625]},{"page":58,"text":" Line of communication and route security","rect":[115.19999694824219,562.434326171875,301.2284450531006,553.326171875]},{"page":58,"text":" Convoy security.","rect":[115.19999694824219,575.934326171875,201.5765027999878,566.826171875]},{"page":58,"text":" Response force operations. Types of response forces include a mobile security force, such as a","rect":[115.19999694824219,589.434326171875,522.0183992462158,580.326171875]},{"page":58,"text":"military police unit, and a tactical combat force, such as a combined arms battalion.","rect":[133.1999969482422,600.8971557617188,467.62758922576907,591.7890014648438]},{"page":58,"text":" Area damage control.","rect":[115.19999694824219,614.394287109375,219.58941173553468,605.2861328125]},{"page":58,"text":"1-204. Operations in noncontiguous assigned areas require units to emphasize area security. During","rect":[89.9937515258789,631.9193115234375,521.9583644866943,622.8111572265625]},{"page":58,"text":"offensive and retrograde operations, the speed at which the main body moves provides some measure of","rect":[89.98370361328125,643.3821411132813,521.9829614219666,634.2739868164063]},{"page":58,"text":"security. Rapidly moving units in open terrain will deploy a forward security force to provide advance","rect":[89.98373413085938,654.9051513671875,522.0308504180908,645.7969970703125]},{"page":58,"text":"warning of enemy forces. Technical assets can be used when no security force is assigned. In restrictive","rect":[89.98373413085938,666.4281616210938,521.9368562774658,657.3200073242188]},{"page":58,"text":"terrain, security forces focus on key terrain such as potential choke points.","rect":[89.98370361328125,677.8910522460938,386.7891798019409,668.7828979492188]},{"page":58,"text":"1-205. Commanders execute echelon support area and base security as part of an echelon’s sustaining","rect":[89.98371887207031,695.416015625,521.9683742523193,686.307861328125]},{"page":58,"text":"operations responsibilities. Area security is normally an economy of force measure ensuring the continued","rect":[89.97369384765625,706.9390258789063,521.9128322601318,697.8308715820313]},{"page":58,"text":"conduct of sustaining operations to support the echelon’s main and supporting efforts. All area security","rect":[89.97370147705078,718.4019165039063,521.9189357757568,709.2937622070313]},{"page":58,"text":"1-36","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":58,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":58,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":59,"text":"Army Tactics","rect":[483.47998046875,46.34102249145508,539.9523032226563,38.016021728515628]},{"page":59,"text":"operations take advantage of the local security measures performed by all units regardless of their location","rect":[108.0,83.51434326171875,539.9706935882568,74.40616607666016]},{"page":59,"text":"in the assigned area. (See ADP 3-37 for more information on the variations of area security.)","rect":[108.0,94.97723388671875,478.8452355918884,85.86905670166016]},{"page":59,"text":"1-206. A unit develops specific rules of engagement when conducting area security, particularly when","rect":[108.01005554199219,112.4921875,540.0142726898193,103.3840103149414]},{"page":59,"text":"civilians are present. However, commanders remain responsible for protecting the force, and they consider","rect":[108.00003051757813,124.01519775390625,539.9379785118103,114.90702056884766]},{"page":59,"text":"this responsibility when establishing rules of engagement. They explain restrictions on conducting operations","rect":[108.00003051757813,135.47808837890626,540.1465594749451,126.36991119384766]},{"page":59,"text":"to ensure everyone understands those restrictions. Soldiers must understand that their actions may have far-","rect":[108.00003051757813,147.00103759765626,539.9722802696228,137.89285278320313]},{"page":59,"text":"reaching positive or negative effects. Commanders iterate that media and adversaries can quickly exploit","rect":[108.00003814697266,158.5240478515625,539.9814829788209,149.41586303710938]},{"page":59,"text":"their Soldiers’ actions, especially the way they treat civilians.","rect":[108.00003814697266,169.9869384765625,353.56399059295657,160.87875366210938]},{"page":59,"text":"1-207. Sometimes area security forces must retain readiness over long periods without contact with enemy","rect":[108.00003814697266,187.50189208984376,540.0222682952881,178.39370727539063]},{"page":59,"text":"forces. This occurs most often when the enemy special purpose forces or insurgents are overmatched. Forces","rect":[107.9900131225586,199.02490234375,540.0604999046326,189.91671752929688]},{"page":59,"text":"conducting area security should not develop a sense of complacency, even if the enemy force appears to have","rect":[108.00003814697266,210.48779296875,540.1384553985596,201.37960815429688]},{"page":59,"text":"ceased operations in the secured area. Additionally, friendly forces should be mindful of mines and booby","rect":[108.00003814697266,222.01080322265626,539.9542751312256,212.90261840820313]},{"page":59,"text":"traps in these situations. Successful units assume that the enemy force regularly observes friendly operations","rect":[107.99002075195313,233.4736328125,540.0510394554138,224.36544799804688]},{"page":59,"text":"to identify routines, weak points, and lax security for the opportunity to strike with minimum risk. This","rect":[107.99002075195313,244.99664306640626,540.0110614280701,235.88845825195313]},{"page":59,"text":"requires leaders to maintain vigilance and discipline in their Soldiers to preclude that opportunity from","rect":[107.99002075195313,256.5196533203125,539.9710974655152,247.41146850585938]},{"page":59,"text":"developing.","rect":[107.99002075195313,267.9825439453125,154.95476818084718,258.8743591308594]},{"page":59,"text":"Operations Security","rect":[90.0,292.5806884765625,184.37310218811036,282.77557373046877]},{"page":59,"text":"1-208. Operations security is a capability that identifies and controls critical information, indicators of","rect":[108.0,310.1343078613281,540.0710961875916,301.026123046875]},{"page":59,"text":"friendly force actions attendant to military operations, and incorporates countermeasures to reduce the risk","rect":[108.0,321.6573181152344,539.9449367523193,312.54913330078127]},{"page":59,"text":"of an adversary exploiting vulnerabilities (JP 3-13.3). Operations security (OPSEC) is applied throughout all","rect":[108.0,333.12017822265627,540.0432505569459,324.0119934082031]},{"page":59,"text":"operations to protect any information or activities of friendly elements. The practice of OPSEC denies the","rect":[108.0,344.6431884765625,540.0453157501221,335.5350036621094]},{"page":59,"text":"enemy of information that it may use to disrupt or defeat actions by friendly forces.","rect":[107.9899673461914,356.1060791015625,441.51873302459719,346.9978942871094]},{"page":59,"text":"1-209. OPSEC is not only concerned with protecting planning and preparation activities, but also","rect":[107.9899673461914,373.63104248046877,539.9631862640381,364.5228576660156]},{"page":59,"text":"encompasses applying effective field craft, camouflage, concealment, and masking. These techniques deny","rect":[107.9800033569336,385.154052734375,539.9702663421631,376.0458679199219]},{"page":59,"text":"and disrupt the enemy’s ability to gain information through reconnaissance and surveillance. It includes","rect":[107.9799575805664,396.616943359375,539.9438617210388,387.5087585449219]},{"page":59,"text":"explaining to Soldiers methods the enemy uses to find and target their cell phones, gather geo-location tags","rect":[107.9799575805664,408.1399230957031,540.0343768577576,399.03173828125]},{"page":59,"text":"from personal photos, and collect information from posts to social media. Other examples include how all","rect":[107.97993469238281,419.6428527832031,540.0179820022584,410.5547180175781]},{"page":59,"text":"lead-up activities—to include pre-combat checks and pre-combat inspections, vehicle loading, and","rect":[107.97993469238281,431.12579345703127,540.0182399749756,422.0176086425781]},{"page":59,"text":"modifications—can indicate future movements or operations and can provide enemy forces with an initial","rect":[107.98994445800781,442.6488037109375,539.9334483108521,433.5406188964844]},{"page":59,"text":"understanding of friendly force activities.","rect":[107.98999786376953,454.17181396484377,273.75490856170657,445.0636291503906]},{"page":59,"text":"1-210. A units OPSEC program and any deception or survivability efforts should conceal the location of","rect":[107.98998260498047,471.63665771484377,539.9873559532166,462.5284729003906]},{"page":59,"text":"the friendly objective, the main effort, the disposition of forces, and the timing of the offense from enemy","rect":[107.96994018554688,483.1596984863281,539.9170436859131,474.0414733886719]},{"page":59,"text":"forces or mislead them regarding this information. These measures prevent enemy forces from launching","rect":[107.96990203857422,494.68267822265627,539.9073390960693,485.5744934082031]},{"page":59,"text":"effective spoiling attacks.","rect":[107.96990203857422,506.14556884765627,210.49358654022218,497.0373840332031]},{"page":59,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":59,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":59,"text":"1-37","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":60,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":61,"text":"Chapter 2","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":61,"text":"Movement and Forms of Maneuver","rect":[183.0,150.95619201660157,447.03521645736699,139.11740112304688]},{"page":61,"text":"This chapter discusses","rect":[126.0,188.75872802734376,228.9945779762268,178.79986572265626]},{"page":61,"text":"forms of maneuver. ","rect":[126.01095581054688,200.0,214.6195421218872,191.4707489013672]},{"page":61,"text":"movement","rect":[234.06515502929688,186.56272888183595,280.5006820602417,179.89785766601563]},{"page":61,"text":"formations,","rect":[285.60528564453127,187.0,335.99579334259036,178.79986572265626]},{"page":61,"text":"movement","rect":[341.1091613769531,186.56272888183595,387.49088591766357,179.89785766601563]},{"page":61,"text":"techniques, and the five","rect":[392.5943603515625,188.75872802734376,504.0534034881592,178.79986572265626]},{"page":61,"text":"MOVEMENT FORMATIONS","rect":[90.0,226.7696990966797,275.41255870056156,217.0955352783203]},{"page":61,"text":"2-1. A movement formation is an ordered arrangement of forces for a specific purpose and describes the","rect":[108.0,247.07427978515626,540.0155305938721,237.96609497070313]},{"page":61,"text":"general configuration of a unit on the ground (ADP 3-90). Movement formations allow a unit to move on the","rect":[107.98998260498047,258.5972900390625,539.9342928009033,249.48910522460938]},{"page":61,"text":"battlefield based on the terrain and enemy threat. Terrain characteristics and visibility determine the actual","rect":[107.98998260498047,270.12030029296877,539.9992442092896,261.0121154785156]},{"page":61,"text":"arrangement and location of the unit’s personnel and vehicles within a given formation. There are seven","rect":[107.98998260498047,281.5831298828125,540.0391139984131,272.4749450683594]},{"page":61,"text":"different movement formations:","rect":[107.98998260498047,291.0821228027344,235.81514691925049,283.99798583984377]},{"page":61,"text":"","rect":[133.1999969482422,303.8654479980469,139.16105696249009,299.1731872558594]},{"page":61,"text":"","rect":[133.1999969482422,317.3654479980469,139.16105696249009,312.6731872558594]},{"page":61,"text":"","rect":[133.1999969482422,330.8654479980469,139.16105696249009,326.1731872558594]},{"page":61,"text":"","rect":[133.1999969482422,344.3654479980469,139.16105696249009,339.6731872558594]},{"page":61,"text":"","rect":[133.1999969482422,357.8654479980469,139.16105696249009,353.1731872558594]},{"page":61,"text":"","rect":[133.1999969482422,371.3654479980469,139.16105696249009,366.6731872558594]},{"page":61,"text":"","rect":[133.1999969482422,384.8654479980469,139.16105696249009,380.1731872558594]},{"page":61,"text":"Column.","rect":[151.1999969482422,304.5802917480469,185.9854383468628,297.4861145019531]},{"page":61,"text":"Line.","rect":[151.1999969482422,318.07025146484377,172.06464672088624,310.9861145019531]},{"page":61,"text":"Wedge.","rect":[151.1999969482422,333.59429931640627,182.08364391326905,324.4861145019531]},{"page":61,"text":"Echelon (left or right).","rect":[151.1999969482422,347.09429931640627,241.17357921600343,337.9861145019531]},{"page":61,"text":"Vee.","rect":[151.1999969482422,358.5802917480469,169.84321117401124,351.8067626953125]},{"page":61,"text":"Diamond.","rect":[151.1999969482422,372.07025146484377,190.96135997772218,364.9861145019531]},{"page":61,"text":"Box.","rect":[151.1999969482422,385.57025146484377,170.38828563690186,378.8067626953125]},{"page":61,"text":"2-2. Each movement formation has its advantages and disadvantages. A unit may employ a series of","rect":[108.00377655029297,405.0591735839844,540.0841577110291,395.95098876953127]},{"page":61,"text":"movement formations during a movement or maneuver based on changing terrain or threat. Commanders","rect":[108.00377655029297,416.5821533203125,540.0453021507263,407.4739685058594]},{"page":61,"text":"consider the advantages and disadvantages that each formation has in the areas of command and control,","rect":[108.0037841796875,428.10516357421877,540.0038404464722,418.9969787597656]},{"page":61,"text":"firepower orientation, ability to mass fires, and flexibility. The use of standard formations allows units to","rect":[108.0037841796875,439.56805419921877,539.9350490570068,430.4598693847656]},{"page":61,"text":"transition from one formation to another, giving additional flexibility when adjusting to changes in the","rect":[108.0037841796875,451.0910339355469,539.9996614532471,441.97283935546877]},{"page":61,"text":"mission variables. Movement formations describe how combat or security elements maneuver in relation to","rect":[108.0037841796875,462.6140441894531,539.9728298187256,453.505859375]},{"page":61,"text":"each other and the main body. By designating the movement formation planned for use, units—","rect":[108.00379943847656,474.0769348144531,491.2887992858887,464.96875]},{"page":61,"text":" Establish the geographic relationship between units.","rect":[133.1999969482422,487.5542907714844,359.5028944015503,478.44610595703127]},{"page":61,"text":" Indicate probable reactions once an enemy force makes contact with the formation.","rect":[133.1999969482422,501.0542907714844,483.81109142303469,491.94610595703127]},{"page":61,"text":" Indicate the level of security desired.","rect":[133.1999969482422,514.5543212890625,298.96499156951907,505.4461364746094]},{"page":61,"text":" Establish the preponderant orientation of subordinate weapon systems.","rect":[133.1999969482422,528.0543212890625,433.9625196456909,518.9461669921875]},{"page":61,"text":" Posture friendly forces for the attack.","rect":[133.1999969482422,541.5543212890625,300.02105236053469,532.4461669921875]},{"page":61,"text":"COLUMN FORMATION","rect":[90.0,564.9480590820313,199.07954502105714,556.656005859375]},{"page":61,"text":"2-3. The column formation is a movement formation with elements arranged one behind another. A","rect":[108.0,584.874267578125,540.0323529281616,575.9263916015625]},{"page":61,"text":"unit moves in column formation when the unit does not anticipate early contact, the objective is distant, and","rect":[108.0,596.337158203125,540.0294094085693,587.2189331054688]},{"page":61,"text":"speed and control are critical. Figure 2-1 on page 2-2 depicts a column formation. The location of direct fire","rect":[108.0,607.8601684570313,540.0614290313721,598.7520141601563]},{"page":61,"text":"systems within the column reflects the column’s length and the range fans of those systems. Normally, the","rect":[108.00003814697266,619.3831787109375,539.9500398712158,610.2750244140625]},{"page":61,"text":"lead element uses a traveling overwatch technique while the following units are in traveling formation. A","rect":[108.00003814697266,630.8460693359375,540.0273480453491,621.7379150390625]},{"page":61,"text":"column formation—","rect":[108.0,640.3450317382813,190.0186882019043,633.2609252929688]},{"page":61,"text":"","rect":[133.1999969482422,653.1254272460938,139.16105696249009,648.4332275390625]},{"page":61,"text":"","rect":[133.1999969482422,678.1453857421875,139.16105696249009,673.4531860351563]},{"page":61,"text":"","rect":[133.1999969482422,703.1054077148438,139.16105696249009,698.4132080078125]},{"page":61,"text":"","rect":[133.1999969482422,716.6054077148438,139.16105696249009,711.9132080078125]},{"page":61,"text":"Provides the best formation to move large forces quickly, especially with limited routes and","rect":[151.1999969482422,655.8543090820313,540.0179958343506,646.7461547851563]},{"page":61,"text":"limited visibility.","rect":[151.1999969482422,667.3773193359375,220.12458324432374,658.2691650390625]},{"page":61,"text":"Makes enemy contact with a small part of the total force while facilitating control and allowing","rect":[151.1999969482422,680.874267578125,539.9809474945068,671.76611328125]},{"page":61,"text":"the unit to quickly mass forces.","rect":[151.1999969482422,692.337158203125,276.1694288253784,683.22900390625]},{"page":61,"text":"Provides a base for easy transition to other formations.","rect":[151.1999969482422,705.8342895507813,369.7623243331909,696.7261352539063]},{"page":61,"text":"Works in restricted terrain.","rect":[151.1999969482422,717.3202514648438,259.0052137374878,710.2261352539063]},{"page":61,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":61,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":61,"text":"2-1","rect":[508.9800109863281,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":62,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":62,"text":"2-4.","rect":[90.0,81.36004638671875,105.88170146942139,74.5865249633789]},{"page":62,"text":"There are also disadvantages to using a column formation. These include—","rect":[115.20030212402344,83.51434326171875,416.9927177429199,74.40616607666016]},{"page":62,"text":" Units can only immediately apply the majority of the column’s firepower on the column’s flanks.","rect":[115.19999694824219,97.01434326171875,522.1072340011597,87.89614868164063]},{"page":62,"text":" The length of the column affects movement and terrain management.","rect":[115.19999694824219,110.51434326171875,409.7882032394409,101.40616607666016]},{"page":62,"text":" Possibly inadvertently bypassing enemy units or positions and exposing the unit’s flanks.","rect":[115.19999694824219,124.01434326171875,490.42302989959719,114.90616607666016]},{"page":62,"text":" Running head-on into an enemy deployed perpendicular to the column’s direction of movement.","rect":[115.19999694824219,137.51434326171876,521.5050611495972,128.40615844726563]},{"page":62,"text":"Restricted terrain may limit the ability of friendly forces to maneuver if contact is made to the front of","rect":[115.20406341552735,151.01129150390626,521.9819238243103,141.90310668945313]},{"page":62,"text":"the formation.","rect":[115.20406341552735,160.4501495361328,171.88921642303468,153.36599731445313]},{"page":62,"text":"Figure 2-1. Column formation","rect":[227.27777099609376,486.771484375,366.7221043128967,477.38275146484377]},{"page":62,"text":"LINE FORMATION","rect":[72.0,516.0726928710938,160.923996925354,507.9960021972656]},{"page":62,"text":"2-5. A line formation is a movement formation in which elements move abreast of each other. A unit","rect":[90.0,536.0343017578125,522.0764536819459,526.9261474609375]},{"page":62,"text":"typically employs this formation when assaulting an objective because it concentrates firepower to the front","rect":[89.98998260498047,547.5573120117188,522.0159678421021,538.4390869140625]},{"page":62,"text":"in the direction of movement. Figure 2-2 depicts a line formation. A line formation also—","rect":[89.98998260498047,559.0202026367188,450.4695243835449,549.9120483398438]},{"page":62,"text":" Facilitates speed and shock in closing with an enemy force.","rect":[115.19999694824219,572.5142822265625,370.97368907928469,563.4061279296875]},{"page":62,"text":" Allows the coverage of wide frontages.","rect":[115.19999694824219,586.0142822265625,290.3816785812378,576.9061279296875]},{"page":62,"text":" Facilitates the occupation of attack by fire or support by fire positions.","rect":[115.19999694824219,599.5142822265625,414.76775646209719,590.4061279296875]},{"page":62,"text":"2-6.","rect":[90.00376892089844,614.9952392578125,105.88547039031983,608.1115112304688]},{"page":62,"text":"There are also disadvantages of a line formation:","rect":[115.20407104492188,617.039306640625,310.46790265655519,607.93115234375]},{"page":62,"text":" Provides less flexibility of maneuver than other formations since it does not distribute units in","rect":[115.19999694824219,630.5343017578125,522.0018215179443,621.4261474609375]},{"page":62,"text":"depth.","rect":[133.1999969482422,642.0372314453125,157.96442699432374,632.9490966796875]},{"page":62,"text":" Linear deployment allows a unit deployed on line to bring only limited firepower to bear on either","rect":[115.19999694824219,655.5543212890625,521.9788110313416,646.4461669921875]},{"page":62,"text":"flank.","rect":[133.1999969482422,664.9429931640625,156.2800703048706,657.9089965820313]},{"page":62,"text":" Provides limited or no reserve.","rect":[115.19999694824219,678.490234375,256.2446241378784,671.4061279296875]},{"page":62,"text":" Limits overwatch forces.","rect":[115.19999694824219,691.990234375,232.9611463546753,684.9061279296875]},{"page":62,"text":" Limits control of a unit using a line formation in restricted terrain or under conditions of limited","rect":[115.19999694824219,707.5142822265625,521.9860744476318,698.4061279296875]},{"page":62,"text":"visibility.","rect":[133.1999969482422,719.0372924804688,171.28501415252686,709.9291381835938]},{"page":62,"text":"2-2","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":62,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":62,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":63,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":63,"text":"Figure 2-2. Line formation","rect":[253.55999755859376,326.8141784667969,376.3771336097717,317.4254455566406]},{"page":63,"text":"WEDGE FORMATION","rect":[90.0,356.2080078125,192.9592752456665,348.09600830078127]},{"page":63,"text":"2-7. The wedge formation is a movement formation with one lead element and the trail elements are","rect":[108.0,376.0743103027344,540.1125154571533,367.12646484375]},{"page":63,"text":"paired off abreast of each other on the flanks. Units use this formation to attack an enemy appearing to","rect":[107.99002075195313,387.5973205566406,539.9893703460693,378.4891357421875]},{"page":63,"text":"the front and flanks. Figure 2-3 on page 2-4 depicts a wedge formation. Any unit can conduct a wedge","rect":[107.99002075195313,399.12030029296877,540.0344514923096,390.0121154785156]},{"page":63,"text":"formation; if there are an even number of maneuver elements, one side will be longer that the other. Leaders","rect":[107.98002624511719,410.58319091796877,540.0376727561951,401.4750061035156]},{"page":63,"text":"designate which side they want longer by directing a “heavy side.” For example, if a leader said they wanted","rect":[107.98002624511719,422.106201171875,540.0009059906006,412.9980163574219]},{"page":63,"text":"the unit in a “wedge formation—heavy left,” then the left side of the unit would have more elements than the","rect":[107.98002624511719,433.6291809082031,540.0525178985596,424.52099609375]},{"page":63,"text":"right side of the element. A unit uses the wedge when contact with an enemy force is possible or expected,","rect":[107.98002624511719,445.0920715332031,539.9119825363159,435.98388671875]},{"page":63,"text":"but the enemy force’s location and dispositions are vague. It is the preferred formation for a movement to","rect":[107.98002624511719,456.6150817871094,540.0211086273193,447.50689697265627]},{"page":63,"text":"contact in an organization with three subordinate maneuver units because it initiates contact with one unit","rect":[107.98002624511719,468.07794189453127,540.0232920608521,458.9697570800781]},{"page":63,"text":"while retaining two other subordinate uncommitted units positioned to maneuver and further develop the","rect":[107.98002624511719,479.6009521484375,540.0240755157471,470.4927673339844]},{"page":63,"text":"situation. Within the wedge, subordinate units employ the formation best suited to the terrain, visibility, and","rect":[107.98002624511719,491.12396240234377,540.0072536468506,482.0157775878906]},{"page":63,"text":"likelihood of contact. Employing a wedge formation—","rect":[107.98002624511719,502.5868225097656,327.6985893249512,493.4786376953125]},{"page":63,"text":" Provides maximum firepower forward and allows units to use a large portion of their firepower","rect":[133.1999969482422,516.0543212890625,540.0109155235291,506.9461364746094]},{"page":63,"text":"on the flanks.","rect":[151.1999969482422,525.55322265625,205.42422008514405,518.4691162109375]},{"page":63,"text":" Allows rapid crossing of open terrain when enemy contact is not expected.","rect":[133.1999969482422,541.0742797851563,449.97930431365969,531.9661254882813]},{"page":63,"text":" Facilitates control.","rect":[133.1999969482422,552.5502319335938,225.70472240447999,545.4661254882813]},{"page":63,"text":" Allows for rapid changes in the direction of movement.","rect":[133.1999969482422,568.0742797851563,373.0608777999878,558.9661254882813]},{"page":63,"text":" Facilitates the rapid change to other movement formations.","rect":[133.1999969482422,581.5742797851563,387.2912549972534,572.4661254882813]},{"page":63,"text":"2-8. The primary disadvantages to the wedge formation are that it—","rect":[108.01377868652344,599.0992431640625,387.3112602233887,589.9910888671875]},{"page":63,"text":" Requires sufficient maneuver space or multiple routes for dispersion laterally and in depth.","rect":[133.1999969482422,612.5942993164063,514.7195997238159,603.4861450195313]},{"page":63,"text":" Lacks ease of control in restricted terrain or poor visibility.","rect":[133.1999969482422,626.0942993164063,387.22219371795657,616.9861450195313]},{"page":63,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":63,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":63,"text":"2-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":64,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47380285644532,37.90802001953125]},{"page":64,"text":"Figure 2-3. Wedge formation","rect":[229.5,329.8141784667969,364.56356549453735,320.4254455566406]},{"page":64,"text":"ECHELON FORMATION","rect":[72.0,359.1727294921875,185.15954685211183,351.09600830078127]},{"page":64,"text":"2-9. An echelon formation is a movement formation with elements arranged on an angle to the left or","rect":[90.0,379.0743103027344,522.0144319610596,370.12646484375]},{"page":64,"text":"to the right of the direction of attack (echelon left, echelon right). This formation provides focused","rect":[90.01001739501953,390.5973205566406,522.0283718109131,381.4891357421875]},{"page":64,"text":"firepower forward and to the flank of the direction of the echelon. It facilitates control in open areas. It","rect":[90.0,402.1002502441406,522.0740122756959,393.0121154785156]},{"page":64,"text":"provides minimal security to the opposite flank in the direction of the echeloning. A unit with knowledge of","rect":[90.0,413.58319091796877,522.0432031211853,404.4750061035156]},{"page":64,"text":"potential enemy locations can use an echelon formation to deploy subordinate ground elements diagonally","rect":[90.0,425.106201171875,521.8718166351318,415.9980163574219]},{"page":64,"text":"left or right or as a way to work within a higher echelon movement formation. Figure 2-4 depicts an echelon","rect":[90.0,436.6291809082031,521.9603176116943,427.52099609375]},{"page":64,"text":"left formation and figure 2-5 depicts an echelon right formation. Units operating on the flank of a larger","rect":[89.98999786376953,448.0920715332031,522.0093896446228,438.98388671875]},{"page":64,"text":"formation commonly use this formation. An echelon formation—","rect":[89.98998260498047,459.6150817871094,352.2434501647949,450.50689697265627]},{"page":64,"text":" Facilitates control in open terrain.","rect":[115.19999694824219,473.0742492675781,268.4851026535034,463.9861145019531]},{"page":64,"text":" Allows the concentration of the unit’s firepower forward and to the flank in the direction of the","rect":[115.19999694824219,486.5742492675781,521.9788484649658,477.4861145019531]},{"page":64,"text":"echelon.","rect":[133.1999969482422,496.03314208984377,166.8411512374878,488.9490051269531]},{"page":64,"text":" Allows forces not in contact to maneuver against known enemy forces because all elements will","rect":[115.19999694824219,511.5542907714844,522.0274424514771,502.44610595703127]},{"page":64,"text":"not simultaneously make contact.","rect":[133.1999969482422,523.0772705078125,267.0441541671753,513.9691162109375]},{"page":64,"text":"2-10. The primary disadvantages of this formation are—","rect":[89.99375915527344,540.602294921875,317.9988822937012,531.494140625]},{"page":64,"text":" Difficult to maintain control over the unit in restricted terrain.","rect":[115.19999694824219,553.0,380.32326793670657,544.9861450195313]},{"page":64,"text":" Lacks security or firepower on the opposite side of the echelon.","rect":[115.19999694824219,567.5942993164063,387.3424024581909,558.4861450195313]},{"page":64,"text":"2-4","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":64,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":64,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":65,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":65,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":65,"text":"Figure 2-4. Echelon left formation","rect":[235.55999755859376,328.3141784667969,394.48824811172485,318.9254455566406]},{"page":65,"text":"Figure 2-5. Echelon right formation","rect":[231.94277954101563,586.4895629882813,398.09042096328735,577.100830078125]},{"page":65,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":65,"text":"2-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":66,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":66,"text":"VEE FORMATION","rect":[72.0,83.38796997070313,157.38398838043214,75.27597045898438]},{"page":66,"text":"2-11. A vee formation is a movement formation with two elements abreast and one or more elements","rect":[90.0,103.3143310546875,522.0323016624451,94.36647033691406]},{"page":66,"text":"trailing. If there are more elements after the trail element in the vee formation, the trail elements can be in","rect":[90.0000228881836,114.7772216796875,521.8959255218506,105.6690444946289]},{"page":66,"text":"front or behind the main body. This arrangement is suited for an advance against a known threat to the front.","rect":[89.98999786376953,126.30023193359375,522.0412549972534,117.19205474853516]},{"page":66,"text":"Figure 2-6 depicts a vee formation. Units use this formation when they know the enemy force’s location and","rect":[89.98999786376953,137.8232421875,521.9603176116943,128.71499633789063]},{"page":66,"text":"disposition and expect enemy contact. It—","rect":[89.9800033569336,149.28607177734376,261.10847091674807,140.17788696289063]},{"page":66,"text":" Provides maximum firepower forward and good firepower to the flanks, but the firepower on the","rect":[115.19999694824219,162.7742919921875,522.0782747344971,153.66610717773438]},{"page":66,"text":"flanks is less than that provided by the wedge.","rect":[133.1999969482422,174.29730224609376,317.92278575897219,165.18911743164063]},{"page":66,"text":" Facilitates a continued maneuver after making contact and a rapid transition to the assault.","rect":[115.19999694824219,187.7943115234375,494.2043409347534,178.68612670898438]},{"page":66,"text":" Allows a unit to change quickly to a line, wedge, or column formation.","rect":[115.19999694824219,201.2943115234375,416.8090772628784,192.18612670898438]},{"page":66,"text":"2-12.","rect":[90.00376892089844,216.6048583984375,110.86540508270264,209.8313446044922]},{"page":66,"text":"The primary disadvantages to this formation include:","rect":[115.20407104492188,218.7591552734375,327.45774030303957,209.65097045898438]},{"page":66,"text":" Reorientation in the direction of movement, such as a 90-degree turn, are more difficult than using","rect":[115.19999694824219,232.2542724609375,522.0372219085693,223.14608764648438]},{"page":66,"text":"the wedge.","rect":[133.18995666503907,243.77728271484376,176.55352306365968,234.66909790039063]},{"page":66,"text":" Control is difficult in restricted terrain and under limited-visibility conditions.","rect":[115.19999694824219,257.2742919921875,444.88311290740969,248.16610717773438]},{"page":66,"text":" Lead element masks fires of the trail element.","rect":[115.19999694824219,268.750244140625,315.8765821456909,261.6661071777344]},{"page":66,"text":" Requires sufficient maneuver space for dispersion laterally and in depth.","rect":[115.19999694824219,284.2743225097656,423.2220411300659,275.1661376953125]},{"page":66,"text":"2-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":66,"text":"Figure 2-6. Vee formation","rect":[236.9971923828125,528.5919799804688,357.05782818984985,519.2032470703125]},{"page":66,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":66,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":67,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":67,"text":"DIAMOND FORMATION","rect":[90.0,83.35269165039063,203.27954196929933,75.27597045898438]},{"page":67,"text":"2-13. A diamond formation is a movement formation with one element leading, one element positioned","rect":[108.0,103.3143310546875,540.0644063873291,94.36647033691406]},{"page":67,"text":"on each flank, and the remaining elements to the rear. The non-security units of the diamond usually","rect":[108.02005004882813,114.7772216796875,539.9702663421631,105.6690444946289]},{"page":67,"text":"move in a column formation inside of the diamond. It is most effective during approach marches,","rect":[108.02005004882813,126.30023193359375,539.9736890792847,117.19205474853516]},{"page":67,"text":"exploitations, or pursuits when the unit has only general knowledge about the enemy. Figure 2-7 depicts a","rect":[108.02005004882813,137.8232421875,540.0874910430908,128.71505737304688]},{"page":67,"text":"diamond formation. Advantages of employing a diamond formation include—","rect":[108.02002716064453,149.28607177734376,421.64606857299807,140.17788696289063]},{"page":67,"text":" Allowing units to maneuver to either flank immediately, regardless of which subordinate element","rect":[133.1999969482422,162.7742919921875,540.0170054397584,153.66610717773438]},{"page":67,"text":"makes enemy contact.","rect":[151.18995666503907,174.29730224609376,239.78982067108155,165.18911743164063]},{"page":67,"text":" Facilitates making enemy contact with the smallest possible force yet provides all around security.","rect":[133.1999969482422,187.7943115234375,540.0160474777222,178.68612670898438]},{"page":67,"text":" Provides firepower to the front and flanks.","rect":[133.1999969482422,201.27427673339845,320.9228467941284,192.18612670898438]},{"page":67,"text":" Changes easily and quickly to another formation.","rect":[133.1999969482422,214.7943115234375,348.1050977706909,205.68612670898438]},{"page":67,"text":" Facilitates speed of movement while remaining easy to control.","rect":[133.1999969482422,228.2943115234375,404.8041944503784,219.18612670898438]},{"page":67,"text":" Provides an uncommitted force for use as a reserve.","rect":[133.1999969482422,239.77027893066407,358.1231336593628,232.68612670898438]},{"page":67,"text":"2-14. The primary disadvantages of this formation are that it—","rect":[108.00376892089844,259.2591552734375,361.5599174499512,250.15097045898438]},{"page":67,"text":" Requires sufficient maneuver space or multiple routes for dispersion laterally and in depth.","rect":[133.1999969482422,272.7542724609375,514.7195997238159,263.6460876464844]},{"page":67,"text":" Requires four subordinate maneuver elements.","rect":[133.1999969482422,286.2342529296875,337.5389356613159,277.1461181640625]},{"page":67,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":67,"text":"Figure 2-7. Diamond formation","rect":[242.51226806640626,552.1751098632813,387.54073834609985,542.786376953125]},{"page":67,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":67,"text":"2-7","rect":[508.97100830078127,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":68,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":68,"text":"BOX FORMATION","rect":[72.0,83.35269165039063,158.28399753570558,75.27597045898438]},{"page":68,"text":"2-15. The box formation is a movement formation with elements arranged in a box or square, or two","rect":[90.0,103.3143310546875,521.9131984710693,94.36647033691406]},{"page":68,"text":"elements up and two elements back. This formation is only used when the unit has four security or combat","rect":[89.98997497558594,114.7772216796875,522.0154795608521,105.6690444946289]},{"page":68,"text":"elements. It is a flexible formation providing equal firepower in all directions. This formation can cause up","rect":[89.98997497558594,126.30023193359375,522.0614528656006,117.19205474853516]},{"page":68,"text":"to 50 percent of the force becoming decisively engaged simultaneously, thereby limiting the combat power","rect":[89.9899673461914,137.8232421875,521.9719750938416,128.71505737304688]},{"page":68,"text":"available to maneuver against an enemy force. The box formation arranges the unit with two forward and","rect":[89.9899673461914,149.28607177734376,521.9113674163818,140.17788696289063]},{"page":68,"text":"two trail maneuver elements. Figure 2-8 on page 2-8 depicts a box formation. Units with only three","rect":[89.98999786376953,160.80908203125,522.0484285430908,151.70089721679688]},{"page":68,"text":"subordinate maneuver elements cannot adopt the box formation unless reinforced with an additional","rect":[89.98001098632813,172.3120574951172,522.0682139358521,163.22390747070313]},{"page":68,"text":"maneuver element. The subordinate elements of the box usually move in a column formation within the box","rect":[89.98001098632813,183.79498291015626,521.9382228851318,174.68679809570313]},{"page":68,"text":"formation. Units often use this formation when executing an approach march, exploitation, or pursuit when","rect":[89.98001098632813,195.3179931640625,521.9601345062256,186.20980834960938]},{"page":68,"text":"they have only general knowledge about the enemy. Employing a box formation—","rect":[89.98001098632813,206.78082275390626,421.6019401550293,197.67263793945313]},{"page":68,"text":" Allows a unit to change quickly and easily to any other formation.","rect":[115.19999694824219,220.2542724609375,398.2089796066284,211.14608764648438]},{"page":68,"text":" Facilitates rapid movement yet still provides all around security.","rect":[115.19999694824219,233.7542724609375,390.64467906951907,224.64608764648438]},{"page":68,"text":" Provides firepower to the front and flanks.","rect":[115.19999694824219,247.23423767089845,302.9228467941284,238.14608764648438]},{"page":68,"text":" Maintains control more easily than a line formation.","rect":[115.19999694824219,260.7542724609375,341.5648145675659,251.64608764648438]},{"page":68,"text":"2-16. Using the box formation also has disadvantages. These include—","rect":[89.9937515258789,278.27923583984377,377.1569633483887,269.1710510253906]},{"page":68,"text":" The requirement for sufficient maneuver space or multiple routes for dispersion.","rect":[115.19999694824219,291.7542724609375,454.4683790206909,282.6661376953125]},{"page":68,"text":" At battalion and company echelons, the possibility exists of enemy units massing on one element","rect":[115.19999694824219,305.2743225097656,522.0230479202271,296.1661376953125]},{"page":68,"text":"at a time as the presence of other friendly forces can mask other element’s direct fires.","rect":[133.1999969482422,316.7973327636719,478.0673475265503,307.68914794921877]},{"page":68,"text":"2-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":68,"text":"Figure 2-8. Box formation","rect":[236.46612548828126,595.6138305664063,357.61092877578735,586.22509765625]},{"page":68,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":68,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":69,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":69,"text":"MOVEMENT TECHNIQUES","rect":[90.0,87.59635925292969,272.3593055267334,75.61549377441406]},{"page":69,"text":"2-17. Units use the movement formations in conjunction with three movement techniques: traveling,","rect":[108.0,105.59429931640625,539.9852247238159,96.47610473632813]},{"page":69,"text":"traveling overwatch, and bounding overwatch. Movement techniques limit the unit’s exposure to enemy fire","rect":[108.0,117.1173095703125,540.1333894805908,108.0091323852539]},{"page":69,"text":"and position the unit to react to enemy contact. Units select the appropriate movement technique based on","rect":[108.0100326538086,128.5802001953125,540.0490627288818,119.4720230102539]},{"page":69,"text":"the chance of enemy contact. Figure 2-9 illustrates when a unit is most likely to use each technique. While","rect":[108.0100326538086,140.1031494140625,540.0023470001221,130.99496459960938]},{"page":69,"text":"moving, individual Soldiers and vehicles use the terrain to protect themselves when enemy contact is possible","rect":[107.99002075195313,151.62615966796876,539.9782991485596,142.51797485351563]},{"page":69,"text":"or expected. They use natural cover and concealment to avoid enemy fires. Soldiers and vehicle crews—","rect":[107.99002075195313,163.08905029296876,527.0364799499512,153.98086547851563]},{"page":69,"text":" Take active countermeasures, such as using obscuration and direct and indirect fire, to suppress","rect":[133.1999969482422,176.57427978515626,539.9511249046326,167.46609497070313]},{"page":69,"text":"or obscure suspected enemy positions.","rect":[151.1999969482422,188.0972900390625,304.7835645675659,178.98910522460938]},{"page":69,"text":" Cross open areas quickly and avoid large open areas, especially areas surrounded by high ground","rect":[133.1999969482422,201.59429931640626,539.9673976898193,192.48611450195313]},{"page":69,"text":"or terrain that can cover and conceal enemy forces.","rect":[151.1999969482422,213.05718994140626,355.30742931365969,203.94900512695313]},{"page":69,"text":" Avoid possible kill zones because it is easier to cross difficult terrain than to fight enemy forces","rect":[133.1999969482422,226.5543212890625,539.9427020530701,217.44613647460938]},{"page":69,"text":"on unfavorable terms.","rect":[151.1999969482422,236.0532989501953,238.71670055389405,228.96914672851563]},{"page":69,"text":" Do not silhouette themselves against the skyline.","rect":[133.1999969482422,251.57427978515626,346.42864513397219,242.46609497070313]},{"page":69,"text":" Do not move directly forward from a concealed firing position.","rect":[133.1999969482422,265.07427978515627,403.90752696990969,255.96609497070313]},{"page":69,"text":"Figure 2-9. Movement techniques usages in relation to enemy contact","rect":[149.4064178466797,461.87713623046877,480.64958739852906,452.5785827636719]},{"page":69,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":69,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":69,"text":"2-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":70,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":70,"text":"TRAVELING","rect":[72.0,83.36216735839844,131.14640522003175,75.27597045898438]},{"page":70,"text":"2-18. Traveling is a movement technique used when speed is necessary and contact with enemy forces","rect":[90.0,103.3143310546875,522.0275409202576,94.36647033691406]},{"page":70,"text":"is not likely. All elements of the unit move simultaneously. Commanders or small-unit leaders are located","rect":[89.98998260498047,114.7772216796875,521.9371852874756,105.6690444946289]},{"page":70,"text":"where they can best control the situation. Trailing elements may move in parallel columns to shorten the","rect":[89.98994445800781,126.30023193359375,522.0732088165283,117.19205474853516]},{"page":70,"text":"column and reaction time. Figure 2-10 depicts the traveling movement technique.","rect":[89.98994445800781,137.8232421875,415.9506788253784,128.71505737304688]},{"page":70,"text":"Figure 2-10. Traveling movement technique","rect":[193.90737915039063,403.1427917480469,400.13001918029786,393.84423828125]},{"page":70,"text":"TRAVELING OVERWATCH","rect":[72.0,432.4679870605469,199.92255878448487,424.1759948730469]},{"page":70,"text":"2-19. Traveling overwatch is a movement technique used when contact with enemy forces is possible.","rect":[90.0,452.394287109375,521.9883985519409,443.4464416503906]},{"page":70,"text":"A short distance, which varies with the terrain, separates the lead element and trailing element. The trailing","rect":[89.98998260498047,463.91729736328127,521.9613552093506,454.8091125488281]},{"page":70,"text":"element moves at variable speeds and may pause for short periods to overwatch the lead element. It controls","rect":[89.98998260498047,475.3801574707031,521.9914081077576,466.27197265625]},{"page":70,"text":"its movement based on the terrain and the lead element. The rear element overwatches at such a distance that","rect":[89.98998260498047,484.8791198730469,522.0849986038209,477.79498291015627]},{"page":70,"text":"if enemy forces engage the lead element, it will not prevent the rear element from firing or moving to support","rect":[89.98998260498047,498.3660583496094,522.0143198928834,489.25787353515627]},{"page":70,"text":"the lead element. Figure 2-11 depicts this technique and shows how the overwatch can simultaneously occur","rect":[89.98998260498047,509.8890380859375,521.9642846641541,500.7808532714844]},{"page":70,"text":"at multiple echelons.","rect":[89.97997283935547,521.3920288085938,173.00469493865968,512.3038940429688]},{"page":70,"text":"2-10","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":70,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":70,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":71,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":71,"text":"Figure 2-11. Traveling overwatch movement technique","rect":[185.75999450683595,317.0341796875,444.2409200592041,307.7356262207031]},{"page":71,"text":"BOUNDING OVERWATCH","rect":[90.0,346.3680114746094,212.56644916534425,338.0760192871094]},{"page":71,"text":"2-20. Bounding overwatch is a movement technique used when contact with enemy forces is expected.","rect":[108.0,366.2943115234375,539.9532423019409,357.3464660644531]},{"page":71,"text":"The unit moves by bounds. One element always halts in position to overwatch another element while it","rect":[107.97994995117188,377.81732177734377,539.9234995803834,368.7091369628906]},{"page":71,"text":"moves. The overwatching element positions to support the moving unit by fire or maneuver. Units use the","rect":[107.9800033569336,389.2801818847656,540.0309724884033,380.1719970703125]},{"page":71,"text":"bounding overwatch movement technique when expecting to make contact with enemy forces. There are two","rect":[107.9799575805664,400.8031921386719,539.9843044281006,391.69500732421877]},{"page":71,"text":"variations of this technique: alternating bounds and successive bounds.","rect":[107.9800033569336,412.3262023925781,391.5239210128784,403.218017578125]},{"page":71,"text":"2-21. In both cases, the overwatching elements cover the bounding elements from covered or concealed","rect":[107.97996520996094,429.7910461425781,539.9310207366943,420.6828308105469]},{"page":71,"text":"positions with good observation and fields of fire against possible enemy positions. The support by fire","rect":[107.96990203857422,441.3140563964844,540.0039949493408,432.20587158203127]},{"page":71,"text":"positions also offer protection for stationary weapons platforms. They can immediately support the bounding","rect":[107.96994018554688,452.8370666503906,540.0851955413818,443.7288818359375]},{"page":71,"text":"elements with fires or maneuver against the enemy if the bounding elements make contact. Unless they make","rect":[107.96994018554688,464.2999267578125,540.0001497344971,455.1917419433594]},{"page":71,"text":"contact en-route, the bounding elements move via covered and concealed routes into the next set of support","rect":[107.96994018554688,475.82293701171877,540.0155405960084,466.7147521972656]},{"page":71,"text":"by fire positions. Leaders base the length of a bound on the terrain and the range of overwatching weapons.","rect":[107.96994018554688,487.28582763671877,540.0170850753784,478.1776428222656]},{"page":71,"text":"They can use the uncommitted part of their forces whenever needed as part of an immediate and controlled","rect":[107.96994018554688,498.8088073730469,539.9028224945068,489.70062255859377]},{"page":71,"text":"reaction to any threat to the bounding force.","rect":[107.96990203857422,510.3318176269531,283.4811964035034,501.2236328125]},{"page":71,"text":"2-22. If the unit uses alternate bounds, the bounding element moves forward, halts, and occupies a support","rect":[107.96994018554688,527.7966918945313,539.9133677444459,518.6885375976563]},{"page":71,"text":"by fire position. The stationary element always covers the bounding element’s movement, halt, and","rect":[107.96990203857422,539.3197021484375,539.8781642913818,530.2115478515625]},{"page":71,"text":"occupation of the bounding element’s support by fire position. The bounding element advances past the","rect":[107.96994018554688,550.8426513671875,540.0244417266846,541.7344970703125]},{"page":71,"text":"stationary element, takes an overwatch position, and becomes the new forward element. The former","rect":[107.96994018554688,562.3055419921875,539.9377954063416,553.1973876953125]},{"page":71,"text":"stationary element now becomes the bounding element, advances past the stationary element, and occupies","rect":[107.96990203857422,573.82861328125,539.9289081077576,564.720458984375]},{"page":71,"text":"a new support by fire position. This method is usually more rapid than successive bounds. Figure 2-12 on","rect":[107.96994018554688,585.3515625,539.9321804046631,576.243408203125]},{"page":71,"text":"page 2-12 illustrates a bounding overwatch using alternating bounds.","rect":[107.95994567871094,596.814453125,383.7604932785034,587.706298828125]},{"page":71,"text":"2-23. As depicted in figure 2-13 on page 2-12, if the unit uses successive bounds, the lead element, covered","rect":[107.94992065429688,614.3394165039063,539.9803371429443,605.2312622070313]},{"page":71,"text":"by the trail element, advances and occupies a support by fire position. The rear element advances to a support","rect":[107.94990539550781,625.8624267578125,540.0495371780396,616.7542724609375]},{"page":71,"text":"by fire position abreast of the lead element and halts. The lead element moves to the next position and the","rect":[107.94990539550781,637.3253173828125,539.9612703399658,628.2171630859375]},{"page":71,"text":"move continues. Only one element moves at a time, and the rear element avoids advancing beyond the lead","rect":[107.94990539550781,648.8482666015625,539.9197902679443,639.7401123046875]},{"page":71,"text":"element.","rect":[107.94990539550781,658.3472900390625,142.1271162033081,651.2631225585938]},{"page":71,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":71,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":71,"text":"2-11","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":72,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":72,"text":"Figure 2-12. Bounding overwatch movement technique (alternating bounds)","rect":[116.94000244140625,322.3141784667969,477.06575561141968,312.9254455566406]},{"page":72,"text":"Figure 2-13. Bounding overwatch movement technique (successive bounds)","rect":[115.85786437988281,566.6318359375,478.16606689071656,557.2431030273438]},{"page":72,"text":"FIVE FORMS OF MANEUVER","rect":[72.0,597.8697509765625,268.330955909729,588.195556640625]},{"page":72,"text":"2-24. Forms of maneuver are distinct tactical combinations of fire and movement with a unique set of","rect":[90.0,618.17431640625,522.0354516563416,609.066162109375]},{"page":72,"text":"doctrinal characteristics that differ primarily in the relationship between the maneuvering force and the","rect":[90.0100326538086,629.697265625,522.1192903594971,620.589111328125]},{"page":72,"text":"enemy (ADP 3-90). A form is a broad way of describing a scheme of maneuver. Units generally use the types","rect":[90.0100326538086,641.2203369140625,521.9983661155701,632.1121826171875]},{"page":72,"text":"of offensive and defensive operations to explain the overarching operation whereas the forms of maneuver","rect":[90.00007629394531,652.6831665039063,521.9474389610291,643.5750122070313]},{"page":72,"text":"are the basis for courses of action. Table 2-1 lists and illustrates the symbols for the five forms of maneuver.","rect":[90.00007629394531,664.2061767578125,522.0424757003784,655.0980224609375]},{"page":72,"text":"2-12","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":72,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":72,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":73,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":73,"text":"Table 2-1. Forms of maneuver and planning symbols","rect":[189.95999145507813,83.51416015625,440.0431966705322,74.12541961669922]},{"page":73,"text":"2-25. Combined arms organizations accomplish their mission by synchronizing the warfighting functions to","rect":[107.99638366699219,503.8131103515625,540.0324001312256,494.7049255371094]},{"page":73,"text":"execute these forms of maneuver. Combined arms is the synchronized and simultaneous application of arms","rect":[107.99638366699219,515.336181640625,540.0578753929138,506.2279968261719]},{"page":73,"text":"to achieve an effect greater than if each element was used separately or sequentially. Understanding the","rect":[108.00640869140625,526.859130859375,540.0628938751221,517.7509765625]},{"page":73,"text":"characteristics of an assigned area and the enemy’s dispositions helps units determine the best form of","rect":[108.00641632080078,538.322021484375,540.0828759727478,529.2138671875]},{"page":73,"text":"maneuver.","rect":[107.99638366699219,547.821044921875,149.98218822479249,543.0715942382813]},{"page":73,"text":"2-26. A single operation may contain multiple forms of maneuver, such as a frontal attack to clear a security","rect":[107.99638366699219,567.3600463867188,539.9084987640381,558.2518920898438]},{"page":73,"text":"area followed by a penetration to create a gap in enemy defenses. A form of maneuver can also be used in","rect":[107.99634552001953,578.8229370117188,539.8867702484131,569.7147827148438]},{"page":73,"text":"the defense. For example, in a mobile defense the striking force conducts an envelopment to destroy the","rect":[107.99634552001953,590.345947265625,540.0577669219971,581.23779296875]},{"page":73,"text":"enemy. Typically, a higher headquarters does not dictate what form of maneuver a subordinate should use,","rect":[107.99634552001953,601.8689575195313,539.9806470870972,592.7608032226563]},{"page":73,"text":"but if the situation warrants, a higher echelon may constrain a subordinate force to a specific form of","rect":[107.99634552001953,613.3318481445313,540.0259301719666,604.2236938476563]},{"page":73,"text":"maneuver. The successful execution of any forms of maneuver requires trained forces capable of shifting","rect":[107.99639129638672,624.854736328125,539.9416408538818,615.74658203125]},{"page":73,"text":"their formations quickly in response to a changing enemy situation.","rect":[107.99639129638672,636.377685546875,377.43633556365969,627.26953125]},{"page":73,"text":"FRONTAL ATTACK","rect":[90.0,659.7127075195313,182.74613666534425,651.468017578125]},{"page":73,"text":"2-27. A frontal attack is a form of maneuver in which an attacking force seeks to destroy a weaker","rect":[108.0,679.6143188476563,540.1096468048096,670.6664428710938]},{"page":73,"text":"enemy force or fix a larger enemy force in place over a broad front. As depicted in figure 2-14 on page","rect":[107.99999237060547,691.1373291015625,540.0594148712158,682.0291748046875]},{"page":73,"text":"2-14 an attacking force uses a frontal attack to overrun a weak enemy force. They normally employ a frontal","rect":[107.98990631103516,702.6602783203125,539.9717173538209,693.5521240234375]},{"page":73,"text":"attack to—","rect":[108.0,712.09912109375,152.21825790405274,705.0150146484375]},{"page":73,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":73,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":73,"text":"2-13","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":74,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":74,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":74,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":74,"text":"","rect":[115.19999694824219,107.78548431396485,121.16105696249008,103.09324645996094]},{"page":74,"text":"","rect":[115.19999694824219,121.28548431396485,121.16105696249008,116.59324645996094]},{"page":74,"text":"Clear enemy security forces.","rect":[133.1999969482422,83.51434326171875,247.59731578826905,74.40616607666016]},{"page":74,"text":"Overwhelm a shattered enemy force during an exploitation or pursuit.","rect":[133.1999969482422,97.01434326171875,412.60589122772219,87.90616607666016]},{"page":74,"text":"Fix enemy forces in place as part of another operation.","rect":[133.1999969482422,110.51434326171875,351.52178478240969,101.40616607666016]},{"page":74,"text":"Conduct a reconnaissance in force.","rect":[133.1999969482422,122.00032806396485,272.8597364425659,114.90616607666016]},{"page":74,"text":"Figure 2-14. Frontal attack","rect":[234.72264099121095,455.3957824707031,359.20609950256348,446.09722900390627]},{"page":74,"text":"2-28. A frontal attack is necessary when assailable flanks do not exist. Frontal attack maintain continuous","rect":[89.9937515258789,478.9127197265625,522.1062762718201,469.8045349121094]},{"page":74,"text":"pressure along the entire front until a breach occurs or the attacking forces succeed in pushing the enemy","rect":[89.99372863769531,490.3756103515625,521.8391628265381,481.2674255371094]},{"page":74,"text":"forces back. Consequently, units rarely conduct frontal attack when they lack overwhelming combat power","rect":[89.99372863769531,501.89862060546877,522.0401513633728,492.7904357910156]},{"page":74,"text":"unless fixing the enemy is vital to a larger operation’s success.","rect":[90.0037841796875,513.4216918945313,340.18413829803469,504.3134765625]},{"page":74,"text":"Organization of Forces","rect":[72.0,537.980712890625,180.14092502212524,528.175537109375]},{"page":74,"text":"2-29. There is no unique organization of forces associated with a frontal attack. Units executing a frontal","rect":[90.0,555.5343017578125,522.0193247756959,546.4261474609375]},{"page":74,"text":"attack organize into a security force, a main body, and a reserve. The mission variables dictate the specific","rect":[89.99996185302735,567.0572509765625,521.9316072540283,557.9490966796875]},{"page":74,"text":"task organization of a unit.","rect":[89.98999786376953,578.5201416015625,196.8903455734253,569.4119873046875]},{"page":74,"text":"Control Measures","rect":[72.0,600.9337768554688,156.56247958755493,593.3465576171875]},{"page":74,"text":"2-30. Units conducting a frontal attack may not require any additional control measures beyond those","rect":[90.0,620.6943359375,522.0554475860596,611.586181640625]},{"page":74,"text":"established to control the overall mission. This includes at a minimum an assigned area and an objective.","rect":[90.0,632.1571655273438,521.8831739425659,623.0389404296875]},{"page":74,"text":"Units can also use any other control measure necessary to control the frontal attack, including—","rect":[90.0,643.68017578125,474.5976676940918,634.572021484375]},{"page":74,"text":" Attack positions.","rect":[115.19999694824219,657.154296875,200.9853162765503,648.066162109375]},{"page":74,"text":" Lines of departure.","rect":[115.19999694824219,670.654296875,209.0243330001831,661.566162109375]},{"page":74,"text":" Phase lines.","rect":[115.19999694824219,682.1502685546875,180.46534252166749,675.066162109375]},{"page":74,"text":" Assault positions.","rect":[115.19999694824219,697.654296875,204.3450117111206,688.566162109375]},{"page":74,"text":"2-14","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":74,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":74,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":75,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":75,"text":" Limits of advance.","rect":[133.1999969482422,81.49030303955078,225.94118785858155,74.40616607666016]},{"page":75,"text":" Directions of attack or axes of advance for every maneuver unit.","rect":[133.1999969482422,97.01434326171875,408.64690685272219,87.90616607666016]},{"page":75,"text":"Planning a Frontal Attack","rect":[90.0,121.58067321777344,213.08577574157716,111.77552795410156]},{"page":75,"text":"2-31. It is seldom possible for a unit to exert sufficient pressure to overwhelm an enemy force using a frontal","rect":[108.0,139.13427734375,540.0492930374146,130.02609252929688]},{"page":75,"text":"attack, since it strikes the enemy force along a significant portion of the enemy’s front. There are many","rect":[108.0,150.65728759765626,540.0143337249756,141.54910278320313]},{"page":75,"text":"considerations for a force to execute a frontal attack. These considerations can include—","rect":[108.0,160.0961456298828,463.1388969421387,153.01199340820313]},{"page":75,"text":" A friendly force tasked to fix the enemy force in place.","rect":[133.1999969482422,175.61431884765626,370.84844493865969,166.50613403320313]},{"page":75,"text":" Terrain that dictates the unit cannot execute another form of maneuver.","rect":[133.1999969482422,187.0902862548828,435.8181104660034,180.00613403320313]},{"page":75,"text":" Friendly forces have overwhelming combat power to quickly finish the enemy in position.","rect":[133.1999969482422,202.61431884765626,512.6304578781128,193.50613403320313]},{"page":75,"text":"2-32. A unit’s planning efforts should reflect these considerations. When considering employing a frontal","rect":[107.9937515258789,220.1392822265625,540.0391001663209,211.03109741210938]},{"page":75,"text":"attack as a shaping operation, units also consider other means for fixing the enemy force in position, such as","rect":[107.9937515258789,231.66229248046876,539.9911639671326,222.55410766601563]},{"page":75,"text":"feints or demonstrations, and employing indirect fires to mitigate risk.","rect":[107.99375915527344,243.12518310546876,388.3052930831909,234.01699829101563]},{"page":75,"text":"Executing a Frontal Attack","rect":[90.0,267.7406921386719,218.00484312438966,257.9355773925781]},{"page":75,"text":"2-33. Units conducting frontal attack advance on a broad front, normally with their subordinate ground","rect":[108.0,285.2943115234375,540.0184230804443,276.1861267089844]},{"page":75,"text":"maneuver elements abreast (except for the reserve). The security force clears enemy reconnaissance,","rect":[107.98999786376953,296.7572021484375,540.0148267745972,287.6490173339844]},{"page":75,"text":"surveillance, and target acquisition assets while the main body advances. An attacking force seeks to fix","rect":[107.98999786376953,308.2801818847656,540.0012722015381,299.1719970703125]},{"page":75,"text":"enemy forces and gain positional advantage to destroy them using maneuver.","rect":[107.99000549316406,319.8031921386719,416.61419200897219,310.69500732421877]},{"page":75,"text":"2-34. If an attacking unit discovers a gap in the enemy force’s defenses, friendly units seek to exploit that","rect":[107.99000549316406,337.26806640625,539.9393076858521,328.1598815917969]},{"page":75,"text":"weakness and disrupt the integrity of the enemy force’s defense. Units assess the situation to ensure that","rect":[107.9800033569336,348.7910461425781,539.9842905960084,339.682861328125]},{"page":75,"text":"enemy forces are not luring them into an engagement area. Units synchronize the exploitation to prevent","rect":[107.97994995117188,360.3140563964844,540.0494761428834,351.20587158203127]},{"page":75,"text":"counterattacking enemy forces from isolating and destroying successful subordinate elements of the attacking","rect":[107.97997283935547,371.7769470214844,540.0330715179443,362.66876220703127]},{"page":75,"text":"friendly force.","rect":[107.97997283935547,383.2999267578125,165.1941785812378,374.1917419433594]},{"page":75,"text":"2-35. When units conducting a frontal attack can no longer advance, they transition to a defensive posture.","rect":[107.97997283935547,400.8249206542969,539.9943799972534,391.71673583984377]},{"page":75,"text":"Once set in the defense, they continue to perform reconnaissance of enemy positions to locate gaps or","rect":[107.97997283935547,412.28778076171877,539.9999902305603,403.1795959472656]},{"page":75,"text":"assailable flanks and may assist the forward passage of lines of follow-on forces.","rect":[107.97997283935547,423.810791015625,431.5428419113159,414.7026062011719]},{"page":75,"text":"PENETRATION","rect":[90.0,447.1327209472656,161.17633152008058,439.0559997558594]},{"page":75,"text":"2-36. A penetration is a form of maneuver in which a force attacks on a narrow front. Destroying the","rect":[108.0,467.09429931640627,539.9972810821533,457.9861145019531]},{"page":75,"text":"continuity of a defense enables the enemy force’s subsequent isolation and defeat in detail. The penetration","rect":[107.98994445800781,478.55718994140627,539.9419460296631,469.4490051269531]},{"page":75,"text":"extends from the enemy force’s disruption zone through the battle zone into the enemy support zone. Units","rect":[107.9800033569336,490.0801696777344,540.0113666038513,480.97198486328127]},{"page":75,"text":"employ a penetration when—","rect":[107.97997283935547,501.6031799316406,226.60375595092774,492.4949951171875]},{"page":75,"text":" Weak spots are identified in enemy defenses through reconnaissance, surveillance, and security","rect":[133.1999969482422,515.0343017578125,540.0672512054443,505.9261169433594]},{"page":75,"text":"operations.","rect":[151.21002197265626,526.5372924804688,195.41425609588624,517.4491577148438]},{"page":75,"text":" Conditions do not permit an envelopment, such as the enemy having no assailable flank.","rect":[133.1999969482422,540.0543212890625,504.7657423019409,530.9461669921875]},{"page":75,"text":"Organization of Forces","rect":[90.0,564.6807250976563,198.14092502212524,554.8755493164063]},{"page":75,"text":"2-37. Penetrating a defensive position requires overwhelming combat power at the point of penetration and","rect":[108.0,582.2343139648438,540.0324001312256,573.1261596679688]},{"page":75,"text":"combat superiority to continue the momentum of the attack. Units allocate combat power and designate","rect":[108.00003814697266,593.6971435546875,539.9817171173096,584.5889892578125]},{"page":75,"text":"control measures to fix enemy reserves and long-range weapons in their current locations and to isolate","rect":[108.0,605.22021484375,539.9331941680908,596.112060546875]},{"page":75,"text":"enemy forces within the area selected for penetration. Penetrations organize into a breach force, support","rect":[108.0,616.7431640625,540.0074229202271,607.635009765625]},{"page":75,"text":"force, assault force, and a reserve. These elements exist for each location the force is required to penetrate.","rect":[107.98998260498047,628.18603515625,539.8521680831909,619.097900390625]},{"page":75,"text":"Units should not withhold combat power from the initial penetration to conduct additional penetrations unless","rect":[107.98998260498047,639.7090454101563,539.9993426780701,630.6209106445313]},{"page":75,"text":"there is sufficient combat power to ensure the success of the initial penetration.","rect":[107.98998260498047,651.1719360351563,424.2214002609253,642.0838012695313]},{"page":75,"text":"Breach Force","rect":[89.99406433105469,672.684814453125,146.99985981750488,665.77099609375]},{"page":75,"text":"2-38. The breach force is responsible for executing the initial penetration of the enemy’s defense. The breach","rect":[108.0,692.23388671875,540.0126247406006,683.125732421875]},{"page":75,"text":"force. The breach force is typically the main effort until the breach is complete. Depending on the situation","rect":[108.0,703.69677734375,539.9839382171631,694.588623046875]},{"page":75,"text":"the breach force may also be responsible for widening the gaps of the initial penetration.","rect":[108.0,715.2197265625,461.50161266326907,706.111572265625]},{"page":75,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":75,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":75,"text":"2-15","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":76,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":76,"text":"Support Force","rect":[72.0,83.49430847167969,131.76430226135254,74.57650756835938]},{"page":76,"text":"2-39. The support force is responsible for fixing defending enemy forces along a broad front to allow the","rect":[89.99592590332031,100.97918701171875,522.0299348907471,91.87100982666016]},{"page":76,"text":"breach and assault forces to penetrate along a narrow front. The support force is a supporting effort to the","rect":[89.99592590332031,112.502197265625,522.1130647735596,103.3940200805664]},{"page":76,"text":"breach and assault forces.","rect":[89.99592590332031,122.00116729736328,192.75603771209718,114.91703033447266]},{"page":76,"text":"Assault Force","rect":[72.0,145.45802307128907,129.55588246154785,138.54421997070313]},{"page":76,"text":"2-40. The assault force is responsible for seizing the penetration objectives on the far side of the penetration.","rect":[90.00593566894531,164.99700927734376,521.9946241378784,155.87881469726563]},{"page":76,"text":"It is typically the main effort. Depending on the situation the assault force may have a follow-and-support","rect":[90.00593566894531,176.51995849609376,522.0239024124146,167.41177368164063]},{"page":76,"text":"mission to the breach force.","rect":[89.99589538574219,185.9588165283203,200.85619640350343,178.87466430664063]},{"page":76,"text":"Reserve","rect":[71.98997497558594,209.4757843017578,104.21529866027832,202.7122802734375]},{"page":76,"text":"2-41. The use of the reserve avoids diverting the assault element from attacking the final objective of the","rect":[89.98590087890625,229.0247802734375,521.9468050079346,219.90658569335938]},{"page":76,"text":"penetration. Units assign subordinate units the tactical mission tasks of follow-and-support or follow-and-","rect":[89.98590087890625,240.4876708984375,522.0081689414978,231.37948608398438]},{"page":76,"text":"assume to ensure rapid exploitation of initial success.","rect":[89.97579193115235,251.9906463623047,303.26446056365969,242.90249633789063]},{"page":76,"text":"See paragraphs 2-51 through 2-57 for how these forces execute a penetration.","rect":[89.97579193115235,266.46954345703127,399.8732862472534,257.3613586425781]},{"page":76,"text":"Control Measures","rect":[72.0,288.87371826171877,156.56247958755493,281.2865295410156]},{"page":76,"text":"2-42. A unit conducting a penetration normally has a narrower assigned area than a unit conducting a frontal","rect":[90.0,308.6343078613281,522.0965342483521,299.526123046875]},{"page":76,"text":"attack. The minimum control measures for a penetration are—","rect":[90.00003814697266,320.13726806640627,339.5982475280762,311.04913330078127]},{"page":76,"text":" An assigned area to every maneuver unit.","rect":[115.19999694824219,333.654296875,298.96392345428469,324.5461120605469]},{"page":76,"text":" Axis of advance or a direction of attack.","rect":[115.19999694824219,345.1302490234375,293.74038219451907,338.0461120605469]},{"page":76,"text":" A line of departure (LD) or line of contact (LC).","rect":[115.19999694824219,360.6342468261719,326.5058546066284,351.5461120605469]},{"page":76,"text":" The time of the attack or time of assault.","rect":[115.19999694824219,372.1302490234375,295.1252393722534,365.0461120605469]},{"page":76,"text":" Phase lines.","rect":[115.19999694824219,385.57025146484377,180.46534252166749,378.4861145019531]},{"page":76,"text":" An objective.","rect":[115.19999694824219,401.09429931640627,187.12462902069093,391.9761047363281]},{"page":76,"text":" Limits of advance (LOAs) to control and synchronize attacks. (Units can use BHLs instead of","rect":[115.19999694824219,414.59429931640627,521.9579980430603,405.4861145019531]},{"page":76,"text":"LOAs if they know where they will likely commit their follow and assume forces.)","rect":[133.1899871826172,426.1173095703125,464.7254540977478,417.0091247558594]},{"page":76,"text":" Checkpoints.","rect":[115.19999694824219,439.59423828125,185.7478895187378,430.506103515625]},{"page":76,"text":" Graphic control measures associated with breaching operations, such as points of breach and lanes.","rect":[115.19999694824219,453.1142883300781,522.0971021652222,444.006103515625]},{"page":76,"text":" Probable lines of deployment.","rect":[115.19999694824219,466.6142883300781,253.24961376190186,457.506103515625]},{"page":76,"text":" Support by fire positions and attack by fire positions.","rect":[115.19999694824219,480.1142883300781,345.7092237472534,471.006103515625]},{"page":76,"text":" Fire support coordination measures.","rect":[115.19999694824219,493.59423828125,277.0642042160034,484.506103515625]},{"page":76,"text":"2-43. The lateral boundaries of a unit or units assigned the main effort are narrow to help maintain the mass","rect":[89.9937515258789,511.1292419433594,522.0661151390076,502.02105712890627]},{"page":76,"text":"necessary at the area of penetration. Units locate LOAs far enough beyond the enemy’s main defensive","rect":[90.01380157470703,522.5921630859375,522.1263704376221,513.4840087890625]},{"page":76,"text":"positions to complete their breach of those positions. They adjust existing boundaries to accommodate the","rect":[90.0037841796875,534.1151123046875,521.9687166290283,524.9968872070313]},{"page":76,"text":"new situation if operations result in opportunities to exploit success and pursue retreating enemy forces or","rect":[90.0037841796875,545.6381225585938,521.9337670860291,536.5299682617188]},{"page":76,"text":"expand the penetration.","rect":[90.0037841796875,557.0809936523438,183.64768505096436,547.9928588867188]},{"page":76,"text":"Planning a Penetration","rect":[72.0,581.720703125,180.09041441345216,571.91552734375]},{"page":76,"text":"2-44. The success of a penetration depends primarily on a coordinated and synchronized plan executed at a","rect":[90.0,599.2742919921875,521.9832429962158,590.1661376953125]},{"page":76,"text":"high tempo against comparatively weak enemy defenses. The terrain behind an area selected to penetrate","rect":[90.0,610.7371826171875,521.8903474884033,601.6290283203125]},{"page":76,"text":"must allow follow-on forces to proceed from the breach to a deeper objective.","rect":[90.0,622.2601928710938,401.31450939178469,613.1419677734375]},{"page":76,"text":"2-45. The depth of an enemy position and the relative strength of attacking echelons determine the width of","rect":[89.98997497558594,639.78515625,522.0292260704041,630.677001953125]},{"page":76,"text":"a penetration. The availability of artillery, air support, and other combat enablers for an attacking force helps","rect":[89.98997497558594,651.248046875,522.0634906272888,642.139892578125]},{"page":76,"text":"units determine relative combat power. A wider gap allows friendly forces to pass through more quickly and","rect":[89.98997497558594,662.77099609375,522.0231838226318,653.662841796875]},{"page":76,"text":"in large-sized formations, making it more difficult for enemy forces to close the gap. The deeper a penetration,","rect":[89.98999786376953,674.2940673828125,522.0032911300659,665.1858520507813]},{"page":76,"text":"the easier it is to expose an enemy force’s flanks by the breach, and the less likely it is that an enemy force","rect":[89.98997497558594,685.7568969726563,522.0063753204346,676.6487426757813]},{"page":76,"text":"will be in a position to restore its front by falling back.","rect":[89.97994995117188,697.2799072265625,308.3067579269409,688.1717529296875]},{"page":76,"text":"2-16","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":76,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":76,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":77,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.0135122070312,37.90802001953125]},{"page":77,"text":"2-46. Plans for penetrating a defensive position include isolating, suppressing, and destroying by fire enemy","rect":[108.0,83.51434326171875,540.0372829437256,74.40616607666016]},{"page":77,"text":"forces in an area selected for the penetration. These plans should also address how to isolate the area of","rect":[108.0,94.95719909667969,539.9707543907166,85.86905670166016]},{"page":77,"text":"penetration from support or reinforcement by enemy forces located outside the area. A critical part of a plan","rect":[108.0,106.500244140625,540.0104885101318,97.3920669555664]},{"page":77,"text":"is positioning friendly assets so that units can mass the effects of their combat power to accomplish these","rect":[108.0,118.023193359375,539.9713411407471,108.9150161743164]},{"page":77,"text":"results without giving away the location of the penetration.","rect":[108.0,129.486083984375,343.7867383956909,120.3779067993164]},{"page":77,"text":"2-47. The majority of units and assets are in positions where the effects of their combat power apply to the","rect":[108.0,147.0111083984375,539.9552888946533,137.89291381835938]},{"page":77,"text":"area selected for penetration. Plans for the penetration normally have three phases:","rect":[108.0,158.5340576171875,438.43173932647707,149.42587280273438]},{"page":77,"text":" Breaching the enemy force’s main defensive positions.","rect":[133.1999969482422,172.01434326171876,370.8474073410034,162.90615844726563]},{"page":77,"text":" Widening the gap created to secure the penetration’s flanks.","rect":[133.1999969482422,185.51434326171876,390.7521619796753,176.40615844726563]},{"page":77,"text":" Seizing an objective and subsequently exploiting the success of the penetration.","rect":[133.1999969482422,199.01434326171876,469.78203868865969,189.89614868164063]},{"page":77,"text":"2-48. Planning the sequence of these phases depends on the situation. In some situations, if there are","rect":[107.9937515258789,216.47918701171876,540.0479402618408,207.37100219726563]},{"page":77,"text":"weaknesses or gaps in an enemy force’s front, it is possible for armored forces to breach the enemy force’s","rect":[107.9937515258789,228.002197265625,539.9859759788513,218.89401245117188]},{"page":77,"text":"defenses and proceed straight to an objective. Simultaneously, infantry units could conduct local","rect":[107.98370361328125,239.465087890625,539.9741587600709,230.34689331054688]},{"page":77,"text":"envelopment and exploitation operations.","rect":[107.98370361328125,250.9680633544922,273.50518321990969,241.87991333007813]},{"page":77,"text":"2-49. Supporting efforts for outside the area of penetration are normally to isolate enemy forces on the flanks","rect":[107.98373413085938,268.5030517578125,540.0592792015076,259.3948669433594]},{"page":77,"text":"of the penetration. Synchronizing the effects of rotary- and fixed-wing aircraft, artillery fires, and obscuration","rect":[107.98373413085938,279.9659423828125,539.9088649749756,270.8577575683594]},{"page":77,"text":"to delay or disrupt repositioning forces are examples of supporting efforts. Units usually attempt to penetrate","rect":[107.98371887207031,291.4889221191406,540.0531892852783,282.3807373046875]},{"page":77,"text":"the enemy’s defensive positions along a boundary between two enemy units because defenses tend to be less","rect":[107.98373413085938,303.01190185546877,540.0651385765076,293.9037170410156]},{"page":77,"text":"effective along a boundary.","rect":[107.9837417602539,314.47479248046877,217.39612865447999,305.3666076660156]},{"page":77,"text":"2-50. Units plan penetrating through the enemy force’s defensive positions in enough depth so enemy forces","rect":[107.9837417602539,331.98974609375,540.0531756858826,322.8815612792969]},{"page":77,"text":"cannot reestablish a viable defense in rearward positions. Units do not divert the strength of attacking forces","rect":[107.98375701904297,343.51275634765627,539.9315936546326,334.4045715332031]},{"page":77,"text":"to widening the gap to secure the flanks of the penetration until the forces achieve sufficient depth. However,","rect":[107.98375701904297,354.97564697265627,540.0690259933472,345.8674621582031]},{"page":77,"text":"plans should address contingencies, such as enemy counterattacks against the penetration’s flanks, if the unit","rect":[107.98375701904297,366.4986267089844,539.9520029983521,357.39044189453127]},{"page":77,"text":"culminates at any point during the operation or actions to take if the penetration is unsuccessful. Plans provide","rect":[107.97373962402344,378.0216369628906,540.0973177032471,368.9134521484375]},{"page":77,"text":"for uninterrupted support to attacking elements as they close with the enemy and accomplish their mission.","rect":[107.97373962402344,389.4844970703125,535.7544507980347,380.3763122558594]},{"page":77,"text":"Executing a Penetration","rect":[90.0,414.0806884765625,203.0083679046631,404.27557373046877]},{"page":77,"text":"2-51. After the initial breach of the enemy force’s defense, the situation determines the sequence of the","rect":[108.0,431.6343078613281,539.9232454376221,422.526123046875]},{"page":77,"text":"remaining two phases. If enemy forces are in a weak position, it may be possible for the lead attacking force","rect":[107.98998260498047,443.0971984863281,540.0013704376221,433.989013671875]},{"page":77,"text":"to seize the penetration’s final objective while simultaneously widening the initial breach. (See discussion","rect":[107.98999786376953,454.62017822265627,539.9421901702881,445.5019836425781]},{"page":77,"text":"beginning in paragraph 18-9 for more information on breaching.)","rect":[107.97997283935547,466.1431884765625,368.7705285606384,457.0350036621094]},{"page":77,"text":"Breaching the Enemy’s Main Defensive Positions","rect":[89.97404479980469,489.6000061035156,295.28785586166387,480.66217041015627]},{"page":77,"text":"2-52. The support force fixes the enemy along a broad front to allow the breach and assault forces to penetrate","rect":[107.9699935913086,507.125,540.0221223907471,498.0168151855469]},{"page":77,"text":"on a relatively narrow front. The support force can accomplish this by adjusting its lateral boundaries to the","rect":[107.95997619628906,518.6480102539063,539.9773225860596,509.5298156738281]},{"page":77,"text":"point or points of penetration or by extending its boundaries to fix the enemy on a broader front. This allows","rect":[107.96995544433594,530.11083984375,540.0404803733826,521.002685546875]},{"page":77,"text":"the force conducting the penetration to focus overwhelming combat power at that location. The support force","rect":[107.96995544433594,541.6339111328125,540.0080232696533,532.5257568359375]},{"page":77,"text":"locates where it can suppress the enemy for the breaching and the assaulting forces. The breach force","rect":[107.96995544433594,553.1568603515625,539.9592561798096,544.0487060546875]},{"page":77,"text":"establishes a lane or lanes to facilitate the assault force operation. The breach force can also be assigned near","rect":[107.96995544433594,564.6197509765625,539.9918725547791,555.5115966796875]},{"page":77,"text":"objectives to prepare the passing of the assault force. Figure 2-15 on page 2-18 depicts a penetration with","rect":[107.96995544433594,576.1427612304688,539.9742946624756,567.0245361328125]},{"page":77,"text":"two support forces fixing enemy forces on a broad front and the breach and assault forces executing the","rect":[107.94996643066406,587.665771484375,539.9270296173096,578.5576171875]},{"page":77,"text":"penetration.","rect":[107.94996643066406,599.1085815429688,155.45078563690186,590.0204467773438]},{"page":77,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":77,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":77,"text":"2-17","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":78,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":78,"text":"Figure 2-15. Penetration","rect":[240.0,334.3141784667969,354.00256085586548,325.015625]},{"page":78,"text":"2-53. Supporting efforts focus on the remainder of the enemy forces in their current positions and isolate the","rect":[90.00059509277344,357.77099609375,522.0589876251221,348.6628112792969]},{"page":78,"text":"objective from enemy forces. These operations prevent enemy forces from disengaging to reinforce enemy","rect":[89.99057006835938,369.29400634765627,521.9865016937256,360.1758117675781]},{"page":78,"text":"units opposing the main effort. Units track the battle’s progress to ensure that subordinate forces penetrate","rect":[89.9906005859375,380.8170166015625,521.9765291290283,371.7088317871094]},{"page":78,"text":"entirely through the enemy force’s main defensive positions and not just the enemy force’s disruption zone.","rect":[89.9906005859375,392.2798767089844,520.4738111495972,383.16168212890627]},{"page":78,"text":"2-54. Enemy forces normally try to slow down or stop a breach to gain time to react to the changing situation.","rect":[89.99058532714844,409.80487060546877,522.0718946456909,400.6966857910156]},{"page":78,"text":"The attacking unit must rapidly exploit and reinforce success. The attacker masses resources and additional","rect":[89.99058532714844,421.3278503417969,522.0651011428834,412.21966552734377]},{"page":78,"text":"units as necessary to ensure completing the penetration through the enemy force’s defensive positions.","rect":[89.99058532714844,432.7907409667969,499.8316297531128,423.68255615234377]},{"page":78,"text":"Widening the Gap to Secure the Penetration’s Flanks","rect":[71.98468017578125,456.30767822265627,295.3565204124451,447.3698425292969]},{"page":78,"text":"2-55. Once the attacking force penetrates the main defenses, it begins to widen the penetration of the enemy","rect":[89.98060607910156,473.8326416015625,522.0161037445068,464.7244567871094]},{"page":78,"text":"force’s defensive positions by conducting a series of shallow envelopments or attacks by fire. The task of","rect":[89.98062133789063,485.2955322265625,521.9737451133728,476.1873474121094]},{"page":78,"text":"widening the gap of the penetration is normally assigned to a follow-and-support force. Commanders also","rect":[89.98062133789063,496.81854248046877,521.9408473968506,487.7103576660156]},{"page":78,"text":"have the option of committing their reserve to accomplish that task. If the reserve is committed, the","rect":[89.97061157226563,508.28143310546877,522.0312166290283,499.1732482910156]},{"page":78,"text":"commander must designate another reserve, or the unit will not have the forces available to commit a reserve","rect":[89.97061157226563,519.804443359375,521.9999055938721,510.6962585449219]},{"page":78,"text":"to another operation. Units plan to meet enemy counterattacks by shifting fires or committing reserves or","rect":[89.98063659667969,531.327392578125,521.9716699180603,522.21923828125]},{"page":78,"text":"follow and assume forces. They can use obstacles on the flanks of the penetration as a combat multiplier to","rect":[89.98063659667969,542.790283203125,522.0035915374756,533.68212890625]},{"page":78,"text":"assist in defeating any local enemy counterattacks and to maintain the force’s tempo.","rect":[89.98063659667969,554.3132934570313,429.62661266326907,545.2051391601563]},{"page":78,"text":"Seizing an Objective and Subsequent Exploitation","rect":[71.98475646972656,577.8302001953125,277.8396749420166,568.88232421875]},{"page":78,"text":"2-56. The assault force attacks objectives to destroy the continuity of the enemy’s defensive position.","rect":[89.99070739746094,595.2950439453125,522.0391187667847,586.1768188476563]},{"page":78,"text":"Frequently, that objective is so far from the area of penetration that the unit or units initially conducting the","rect":[89.99075317382813,606.818115234375,521.9980745391846,597.6998901367188]},{"page":78,"text":"penetration cannot seize it without pausing. In that event, units plan to commit the reserve or attack with the","rect":[89.99075317382813,618.341064453125,521.9990511016846,609.23291015625]},{"page":78,"text":"assault force through the breaching force early. Exploitation beyond the objective tends to be executed by","rect":[89.99075317382813,629.803955078125,521.9852199554443,620.6857299804688]},{"page":78,"text":"divisions and corps. The exact force mix depends on the mission variables, while the armored, Stryker, and","rect":[89.99076843261719,641.326904296875,522.0167751312256,632.21875]},{"page":78,"text":"aviation forces are generally suited for subsequent exploitation.","rect":[89.99076843261719,652.8499755859375,343.8355665206909,643.7418212890625]},{"page":78,"text":"2-18","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":78,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":78,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":79,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":79,"text":"2-57. Divisions and corps may initiate an attack by simultaneously launching two or more convergent","rect":[108.0,83.51434326171875,540.0884776077271,74.40616607666016]},{"page":79,"text":"penetrations against weak locations on the enemy front. Often this method of attack helps isolate an extremely","rect":[108.0,94.97723388671875,540.0750637054443,85.86905670166016]},{"page":79,"text":"strong enemy defense. Units assign supporting efforts to contain any enemy positions that may influence the","rect":[108.0,106.500244140625,540.0945711212158,97.3920669555664]},{"page":79,"text":"penetration.","rect":[108.0100326538086,118.00315856933594,155.51085948944093,108.9150161743164]},{"page":79,"text":"ENVELOPMENT","rect":[90.0,141.37271118164063,166.10707998275758,133.29598999023438]},{"page":79,"text":"2-58. Envelopment is a form of maneuver in which an attacking force avoids an enemy’s principal","rect":[108.0,161.2742919921875,540.0203623733521,152.32643127441407]},{"page":79,"text":"defense by attacking along an assailable flank. An envelopment avoids the enemy force’s strength—the","rect":[107.98998260498047,172.79730224609376,539.9862337188721,163.68911743164063]},{"page":79,"text":"enemy’s front—where the effects of enemy fires and obstacles are generally the greatest and attacks the","rect":[107.97993469238281,184.3203125,540.0096101837158,175.21212768554688]},{"page":79,"text":"enemy to the flank or rear. Envelopments force the enemy to fight in two or more directions simultaneously","rect":[107.97993469238281,195.783203125,539.9537868499756,186.67501831054688]},{"page":79,"text":"to meet the converging efforts of an attack. Envelopments focus either on seizing terrain, destroying enemy","rect":[107.9800033569336,207.30615234375,539.9969997406006,198.19796752929688]},{"page":79,"text":"forces, or interdicting enemy withdrawal routes. Units prefer to conduct an envelopment instead of a","rect":[107.9799575805664,218.76904296875,540.0403108673096,209.66085815429688]},{"page":79,"text":"penetration or a frontal attack because generally the flanks of the defending forces are weaker and provide","rect":[107.9799575805664,230.29205322265626,539.9802522735596,221.18386840820313]},{"page":79,"text":"the attacking forces the most opportunities to destroy the enemy force. The main effort focuses on attacking","rect":[107.96995544433594,241.81512451171876,539.9842433929443,232.70687866210938]},{"page":79,"text":"an assailable flank. If no assailable flank is available, the attacking force creates one through the conduct of","rect":[107.96990203857422,253.2779541015625,539.9857080039978,244.16976928710938]},{"page":79,"text":"a penetration. The three variations of the envelopment are—","rect":[107.96994018554688,264.7808532714844,349.35175704956057,255.69271850585938]},{"page":79,"text":" Single envelopment.","rect":[133.1999969482422,278.2742919921875,233.4451551437378,269.1661071777344]},{"page":79,"text":" Double envelopment.","rect":[133.1999969482422,291.7542724609375,237.33294200897218,282.6661376953125]},{"page":79,"text":" Vertical envelopment.","rect":[133.1999969482422,305.2542724609375,240.10447216033936,296.1661376953125]},{"page":79,"text":"2-59. A single envelopment is a variation of envelopment where a force attacks along one flank of an","rect":[107.9937515258789,322.7892761230469,540.0132589263916,313.8414306640625]},{"page":79,"text":"enemy force. A single envelopment is generally easier to control and does not require a significant number","rect":[107.9937515258789,334.2521667480469,540.0220849571228,325.14398193359377]},{"page":79,"text":"of forces. See figure 2-16 on page 2-20 for an illustration of a single envelopment.","rect":[107.98373413085938,345.775146484375,437.3561964035034,336.6669616699219]},{"page":79,"text":"2-60. A double envelopment is a variation of envelopment where forces simultaneously attack along","rect":[107.97372436523438,363.3001403808594,539.9079494476318,354.352294921875]},{"page":79,"text":"both flanks of an enemy force. A force seeking to execute a double envelopment must also have a substantial","rect":[107.96370697021485,374.7630310058594,539.9551157913209,365.65484619140627]},{"page":79,"text":"mobility advantage over defending forces. A unit performs a double envelopment by conducting a frontal","rect":[107.96370697021485,386.2860107421875,539.9586558303834,377.1778259277344]},{"page":79,"text":"attack to fix enemy forces in place while enveloping both of the enemy force’s flanks. A double envelopment","rect":[107.96370697021485,397.80902099609377,539.9329600296021,388.7008361816406]},{"page":79,"text":"generally requires more forces than a single envelopment and are more difficult to control.","rect":[107.97368621826172,409.27191162109377,469.99734020233157,400.1637268066406]},{"page":79,"text":"2-61. A vertical envelopment is a variation of envelopment where air-dropped or airlanded troops","rect":[107.97368621826172,426.7768249511719,540.0351092796326,417.8490295410156]},{"page":79,"text":"attack an enemy forces’ rear, flank, or both. A force seeking to execute a vertical envelopment requires","rect":[107.97368621826172,438.31988525390627,539.9890887718201,429.2117004394531]},{"page":79,"text":"the necessary vertical lift capability and indirect fire assets to suppress enemy air defense capability. Because","rect":[107.96366882324219,449.78277587890627,540.0544099884033,440.6745910644531]},{"page":79,"text":"of the forces required, normally only divisions and larger organizations can conduct double and vertical","rect":[107.96366882324219,461.3057556152344,539.9071421585084,452.197509765625]},{"page":79,"text":"envelopments, since these organizations have the resources and the capability to control these envelopments.","rect":[107.96369934082031,472.7686767578125,540.0148267745972,463.6604919433594]},{"page":79,"text":"A vertical envelopment, by either airborne assault or air assault, allows the commander to—","rect":[107.96369934082031,484.2916564941406,477.0203666687012,475.1834716796875]},{"page":79,"text":" Overcome distances quickly, overfly barriers, and bypass enemy defenses.","rect":[133.1999969482422,497.7543029785156,449.20989513397219,488.6461181640625]},{"page":79,"text":" Extend the area over which the commander can exert influence.","rect":[133.1999969482422,509.2302551269531,406.1129102706909,502.1461181640625]},{"page":79,"text":" Leaves the enemy defenses more vulnerable to attack from the main body.","rect":[133.1999969482422,524.7542724609375,448.90435314178469,515.6461181640625]},{"page":79,"text":" Disperse reserve forces widely for survivability reasons while maintaining their capability for","rect":[133.1999969482422,538.2542724609375,540.0309960899353,529.1461181640625]},{"page":79,"text":"effective and rapid response.","rect":[151.1999969482422,549.7572631835938,266.14541149139407,540.6691284179688]},{"page":79,"text":" Exploit combat power by increasing tactical mobility.","rect":[133.1999969482422,563.2742919921875,366.40444469451907,554.1661376953125]},{"page":79,"text":" Seize key terrain to deny the enemy’s use.","rect":[133.1999969482422,576.7742919921875,320.0240430831909,567.6661376953125]},{"page":79,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":79,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":79,"text":"2-19","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":80,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":80,"text":"Figure 2-16. Single envelopment","rect":[220.25999450683595,350.8141784667969,373.72734618759156,341.4254455566406]},{"page":80,"text":"Organization of Forces","rect":[72.0,381.3807067871094,180.14420566177368,371.5755920410156]},{"page":80,"text":"2-62. During a single or double envelopment units organize their forces to perform two primary tasks: fixing","rect":[90.0,398.9342956542969,522.0480861663818,389.82611083984377]},{"page":80,"text":"the enemy force and executing the envelopment. Units conducting an envelopment task organize forces into","rect":[90.0,410.4573059082031,522.0323390960693,401.34912109375]},{"page":80,"text":"a fixing force, enveloping force, security force, and a reserve. The only organizational difference between a","rect":[90.0,421.920166015625,521.9800081329346,412.8119812011719]},{"page":80,"text":"single envelopment and double envelopment is that a double envelopment consists of two enveloping forces.","rect":[90.0,433.44317626953127,522.0631055831909,424.3349914550781]},{"page":80,"text":"The fixing force normally conducts a frontal attack to fix enemy forces in their current positions to prevent","rect":[90.0,444.9661865234375,522.0533823928834,435.8580017089844]},{"page":80,"text":"their escape and reduce their capability to react against the enveloping force. The fixing force should use the","rect":[89.98998260498047,456.4290466308594,522.0033235626221,447.32086181640627]},{"page":80,"text":"minimal amount of combat power to fix the enemy while ensuring the majority of combat power is in the","rect":[89.98998260498047,467.9520568847656,521.9457674102783,458.8338623046875]},{"page":80,"text":"enveloping force. During a double envelopment, commanders typically designate the most likely to succeed","rect":[89.98998260498047,479.4750671386719,522.0213527679443,470.36688232421877]},{"page":80,"text":"of the two envelopment operations as the main effort for resources. The enveloping force maneuvers behind","rect":[90.0000228881836,490.93792724609377,521.9761257171631,481.8296813964844]},{"page":80,"text":"the enemy’s battle zone to defeat enemy forces in their positions, but from an unexpected direction. The","rect":[90.0,502.4609375,522.0003328399658,493.3527526855469]},{"page":80,"text":"security force prevents the enemy from discovering friendly dispositions, capabilities, and intentions, or","rect":[90.0,513.9839477539063,522.0180566368103,504.8757629394531]},{"page":80,"text":"hindering the envelopment.","rect":[89.98997497558594,525.44677734375,199.71697521209718,516.338623046875]},{"page":80,"text":"2-63. Units executing a vertical envelopment organize friendly forces into an air assault task force or an","rect":[89.98997497558594,542.9617919921875,521.9904689788818,533.8536376953125]},{"page":80,"text":"airborne task force. The air assault task force is a temporary group of integrated forces tailored to a specific","rect":[89.98997497558594,554.4847412109375,521.9270906524658,545.3765869140625]},{"page":80,"text":"mission under the command of a single headquarters. The air assault task force consists of an air assault force","rect":[89.97994995117188,565.9476318359375,521.9925203399658,556.8394775390625]},{"page":80,"text":"and the ground assault force. The ground assault force is task-organized with enough combat power to seize","rect":[89.9800033569336,577.4706420898438,521.9222688751221,568.3624877929688]},{"page":80,"text":"or fix the objective or enemy force. The airborne task force is organized by an assault echelon, follow-on","rect":[89.97997283935547,588.99365234375,521.9421901702881,579.8754272460938]},{"page":80,"text":"echelon, and rear echelon. The assault echelon is task-organized with enough combat power to seize or fix","rect":[89.96995544433594,600.45654296875,521.9194850921631,591.348388671875]},{"page":80,"text":"the objective or enemy force. (See FM 3-99 for more information on airborne and air assault operations.)","rect":[89.96990203857422,611.9795532226563,509.8180139122009,602.861328125]},{"page":80,"text":"Control Measures","rect":[72.0,634.353759765625,156.56247958755493,626.7665405273438]},{"page":80,"text":"2-64. At a minimum, commanders assign an area for each unit participating in an envelopment. They also","rect":[90.0,654.0543212890625,521.9326686859131,644.9461669921875]},{"page":80,"text":"designate phase lines, support by fire and attack by fire positions, contact points, and appropriate fire","rect":[90.0,665.5772705078125,522.0525178985596,656.4691162109375]},{"page":80,"text":"coordination measures, such as a RFL or boundary between converging forces, and any other control","rect":[89.9899673461914,677.1002807617188,522.0651011428834,667.9921264648438]},{"page":80,"text":"measures necessary to control the envelopment. Figure 2-17 is an example of control measures used when","rect":[89.9899673461914,688.5631713867188,522.0684719085693,679.4550170898438]},{"page":80,"text":"conducting an envelopment.","rect":[89.97997283935547,700.086181640625,203.00457286834718,690.97802734375]},{"page":80,"text":"2-20","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":80,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":80,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":81,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":81,"text":"Figure 2-17. Envelopment control measures.","rect":[209.63999938964845,382.3141784667969,420.32858991241457,373.015625]},{"page":81,"text":"Planning an Envelopment","rect":[90.0,412.8807067871094,211.6045820350647,403.0755920410156]},{"page":81,"text":"2-65. Successful envelopment planning requires knowing and understanding enemy forces and their","rect":[108.0,430.4342956542969,539.9830834922791,421.32611083984377]},{"page":81,"text":"capabilities. Units seek to maneuver the enveloping force around or over the enemy force’s main defenses to","rect":[108.0,441.9573059082031,540.0314235687256,432.84912109375]},{"page":81,"text":"secure objectives on the enemy force’s flank or rear. From those objectives, the enveloping force can use its","rect":[108.0,453.420166015625,539.9950702171326,444.3019714355469]},{"page":81,"text":"positional advantage to employ superior combat power against a defending enemy force oriented in the wrong","rect":[108.0,464.94317626953127,539.9709377288818,455.8349914550781]},{"page":81,"text":"direction. A unit uses information collection assets to determine the disposition and capabilities of enemy","rect":[108.0,476.4661865234375,539.9323024749756,467.3580017089844]},{"page":81,"text":"forces to detect and react to their operations.","rect":[108.0,487.90899658203127,285.7016553878784,478.82086181640627]},{"page":81,"text":"2-66. Units plan for the force conducting the envelopment to remain within supporting distance of the fixing","rect":[108.0,505.45404052734377,539.9640407562256,496.3458557128906]},{"page":81,"text":"force. Supporting distance is the distance between two units that can be traveled in time for one to come to","rect":[107.98999786376953,516.97705078125,539.8954372406006,507.8688659667969]},{"page":81,"text":"the aid of the other and prevent its defeat by an enemy or ensure it regains control of a civil situation","rect":[107.9800033569336,528.43994140625,539.9743556976318,519.331787109375]},{"page":81,"text":"(ADP 3-0). Sustaining the enveloping force requires deliberate planning because only intermittent ground","rect":[107.9799575805664,539.962890625,539.9743556976318,530.854736328125]},{"page":81,"text":"lines of communications (LOCs) between the echelon support area and the enveloping force may exist.","rect":[107.9799575805664,551.4859008789063,520.2807569503784,542.3777465820313]},{"page":81,"text":"2-67. Units develop branch and sequel plans to the envelopment operation to exploit the envelopment’s","rect":[107.9799575805664,568.9307861328125,540.0263202171326,559.8426513671875]},{"page":81,"text":"success. These plans consider the transition to a pursuit in order to complete the destruction of the enemy","rect":[107.96995544433594,580.4737548828125,539.8976345062256,571.3656005859375]},{"page":81,"text":"force or to halt and pass forward the reserve or follow and support forces.","rect":[107.96990203857422,591.976806640625,402.36968517303469,582.888671875]},{"page":81,"text":"Executing an Envelopment","rect":[90.0,616.520751953125,216.4489881629944,606.715576171875]},{"page":81,"text":"2-68. A successful envelopment depends largely on the degree of surprise units achieve against enemy forces","rect":[108.0,634.0742797851563,540.1485125999451,624.9661254882813]},{"page":81,"text":"or the use of overwhelming combat power. The envelopment’s probability of success also increases when an","rect":[108.0,645.5972900390625,540.0302639007568,636.4891357421875]},{"page":81,"text":"enveloping force has superior mobility and intelligence, possesses air superiority, and has supporting efforts","rect":[108.0000228881836,657.0601806640625,540.0614154319763,647.9520263671875]},{"page":81,"text":"that fix the bulk of the enemy’s forces in their current positions.","rect":[108.01005554199219,668.5831909179688,363.5260877609253,659.4750366210938]},{"page":81,"text":"2-69. Normally, units orient the majority of their combat power toward where they expect to engage enemy","rect":[108.01005554199219,686.108154296875,540.0313625335693,676.9899291992188]},{"page":81,"text":"forces, while assuming risk by placing less combat power on their own flanks. The attacking unit creates an","rect":[108.00003051757813,697.571044921875,540.0225124359131,688.462890625]},{"page":81,"text":"assailable enemy flank using whatever means necessary. The enveloping force then moves rapidly to exploit","rect":[108.00003051757813,709.0940551757813,540.0159068069459,699.9859008789063]},{"page":81,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":81,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":81,"text":"2-21","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":82,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":82,"text":"the situation before enemy forces strengthen an assailable flank by preparing positions in depth or by","rect":[90.0,83.51434326171875,521.9642238616943,74.40616607666016]},{"page":82,"text":"engaging their reserve. Rapid movement around the enemy force’s flank is essential to prevent enemy forces","rect":[90.0,94.97723388671875,521.9961688499451,85.86905670166016]},{"page":82,"text":"from occupying previously prepared positions. Higher headquarters’ supporting efforts attempt to prevent","rect":[89.9899673461914,106.500244140625,522.0022959671021,97.3920669555664]},{"page":82,"text":"the enemy from reconstituting reserves from other portions of the enemy front.","rect":[89.97997283935547,118.023193359375,405.5078077316284,108.9150161743164]},{"page":82,"text":"2-70. After the initial envelopment of one flank, which places enemy forces at a disadvantage, units have","rect":[89.97998809814453,135.48809814453126,522.0071077423096,126.37992095947266]},{"page":82,"text":"many options. They may choose to exploit success by generating additional combat power along the same","rect":[89.97998809814453,147.0111083984375,521.8978548126221,137.90292358398438]},{"page":82,"text":"axis. Units can destroy or defeat the enveloped enemy force in place, or transition to another type of operation,","rect":[89.97998809814453,158.5340576171875,521.9930982589722,149.42587280273438]},{"page":82,"text":"such as an exploitation, pursuit, or encirclement.","rect":[89.97998809814453,169.97691345214845,284.12356090545657,160.88876342773438]},{"page":82,"text":"TURNING MOVEMENT","rect":[72.0,193.3422088623047,181.27907705307008,185.25601196289063]},{"page":82,"text":"2-71. A turning movement is a form of maneuver in which the attacking force seeks to avoid the","rect":[90.0,213.2943115234375,522.0713777618408,204.34645080566407]},{"page":82,"text":"enemy’s principal defensive positions by attacking to the rear of their current positions forcing them","rect":[90.0,224.7572021484375,522.0055348930359,215.80934143066407]},{"page":82,"text":"to move or divert forces to meet the threat. A turning movement differs from an envelopment because the","rect":[89.98998260498047,236.28021240234376,522.1277132110596,227.17202758789063]},{"page":82,"text":"force conducting a turning movement seeks to make enemy forces displace from their current locations,","rect":[90.00003814697266,247.80322265625,521.9509840011597,238.69503784179688]},{"page":82,"text":"whereas an enveloping force seeks to engage enemy forces in their current locations from an unexpected","rect":[90.00003814697266,259.26605224609377,521.8669338226318,250.15786743164063]},{"page":82,"text":"direction. It can also be conducted using waterborne or amphibious means. Figure 2-18 graphically depicts a","rect":[90.00003814697266,270.7890625,521.9422273712158,261.6808776855469]},{"page":82,"text":"turning movement. Units frequently transition this form of offensive maneuver from the attack into an","rect":[89.99002075195313,282.31207275390627,521.9442043304443,273.2038879394531]},{"page":82,"text":"exploitation or pursuit. The turning force must also be capable of operating outside supporting distances for","rect":[89.9800033569336,293.77496337890627,522.0090234336853,284.6667785644531]},{"page":82,"text":"a set time. Only divisions and above can execute a turning movement. This is due to these echelons possessing","rect":[89.9799575805664,305.2979431152344,522.0624294281006,296.18975830078127]},{"page":82,"text":"the organic resources to organize a turning force that can operate outside the supporting distance of the main","rect":[90.0,316.8209533691406,521.9846096038818,307.7127685546875]},{"page":82,"text":"body and force enemy units out of their current positions. execute a turning movement.","rect":[90.0,328.2838134765625,438.5819044113159,319.1756286621094]},{"page":82,"text":"2-22","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":82,"text":"Figure 2-18. Turning movement","rect":[222.54457092285157,709.404541015625,371.50691772079468,700.10595703125]},{"page":82,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":82,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":83,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":83,"text":"Organization of Forces","rect":[90.0,84.62071228027344,198.14092502212524,74.81556701660156]},{"page":83,"text":"2-72.","rect":[108.0,100.09027862548828,128.8616361618042,93.1865005493164]},{"page":83,"text":"The task organization for a turning movement are","rect":[133.20030212402345,102.11431884765625,331.74667073059086,93.00614166259766]},{"page":83,"text":" Security force.","rect":[133.1999969482422,115.61431884765625,210.1075849533081,106.50614166259766]},{"page":83,"text":" Diversion force.","rect":[133.1999969482422,127.09027862548828,216.16967296600343,120.00614166259766]},{"page":83,"text":" Turning force.","rect":[133.1999969482422,142.61431884765626,209.02541637420655,133.50613403320313]},{"page":83,"text":" Reserve.","rect":[133.1999969482422,154.0902862548828,185.92229747772218,147.3267822265625]},{"page":83,"text":"the following:","rect":[334.20147705078127,102.11431884765625,390.5640025100708,93.00614166259766]},{"page":83,"text":"2-73. The security force performs security and reconnaissance tasks as part of its enabling operations.A","rect":[108.00376892089844,173.6392822265625,540.0280804672241,164.53109741210938]},{"page":83,"text":"diversion force is task-organized to ensure the success of the turning force. The diversion force conducts","rect":[108.00376892089844,185.16229248046876,539.9760272483826,176.05410766601563]},{"page":83,"text":"operations, such as attacks designed to divert the enemy force’s attention away from the turning force. The","rect":[108.0037612915039,196.62518310546876,540.0640535430908,187.51699829101563]},{"page":83,"text":"force conducting the turning movement is the turning force. The turning force conducts the echelon’s main","rect":[107.9937973022461,208.148193359375,540.0219631195068,199.04000854492188]},{"page":83,"text":"effort and is resourced appropriately. The reserve is positioned to support the turning force. However, the","rect":[107.9937973022461,219.67120361328126,540.1032991485596,210.56301879882813]},{"page":83,"text":"reserve can support the security or diversion force if required.","rect":[107.9937744140625,231.134033203125,355.1170606613159,222.02584838867188]},{"page":83,"text":"Control Measures","rect":[90.0,253.53372192382813,174.56247958755493,245.94654846191407]},{"page":83,"text":"2-74. Units designate control measures as necessary to synchronize subordinate force’s operations. These","rect":[108.0,273.2943115234375,539.9972810821533,264.1861267089844]},{"page":83,"text":"control measures include—","rect":[107.99996185302735,282.733154296875,218.03959274291993,275.6490173339844]},{"page":83,"text":"","rect":[133.1999969482422,295.52545166015627,139.16105696249009,290.83319091796877]},{"page":83,"text":"","rect":[133.1999969482422,309.02545166015627,139.16105696249009,304.33319091796877]},{"page":83,"text":"","rect":[133.1999969482422,322.52545166015627,139.16105696249009,317.83319091796877]},{"page":83,"text":"","rect":[133.1999969482422,336.02545166015627,139.16105696249009,331.33319091796877]},{"page":83,"text":"","rect":[133.1999969482422,349.52545166015627,139.16105696249009,344.83319091796877]},{"page":83,"text":"Phase lines.","rect":[151.1999969482422,296.2302551269531,198.46534252166749,289.1461181640625]},{"page":83,"text":"Contact points.","rect":[151.1999969482422,311.7342529296875,211.78492259979249,302.6461181640625]},{"page":83,"text":"Objectives.","rect":[151.1999969482422,325.2543029785156,196.48438549041749,316.1361083984375]},{"page":83,"text":"Limits of advance.","rect":[151.1999969482422,336.7302551269531,225.94919872283936,329.6461181640625]},{"page":83,"text":"Appropriate fire control measures.","rect":[151.1999969482422,352.2342529296875,288.9449415206909,343.1461181640625]},{"page":83,"text":"Planning a Turning Movement","rect":[90.0,376.8807067871094,235.04034253311159,367.0755920410156]},{"page":83,"text":"2-75. Selecting the right terrain-oriented objective of a turning movement is of major importance to the","rect":[108.0,394.4342956542969,539.9783601837158,385.31610107421877]},{"page":83,"text":"success of the operation. This causes the enemy forces to relocate from their current position to meet the","rect":[108.0,405.8971862792969,539.9862337188721,396.78900146484377]},{"page":83,"text":"friendly force in a position away from their previous occupied position or risk catastrophic defeat. The unit’s","rect":[107.9999771118164,417.420166015625,540.0022723655701,408.3119812011719]},{"page":83,"text":"scheme of maneuver in a turning movement may vary depending on the specific situation and mission","rect":[108.0,428.94317626953127,540.0120143890381,419.8349914550781]},{"page":83,"text":"variables. In addition to common offensive planning considerations, units conducting a turning movement","rect":[108.0,440.40606689453127,539.9899058303834,431.2978820800781]},{"page":83,"text":"pay special attention to planning branches and sequels to the turning movement, including—","rect":[108.0,451.9290466308594,478.7400321960449,442.82086181640627]},{"page":83,"text":" Transitioning to an exploitation or pursuit.","rect":[133.1999969482422,465.4142761230469,321.1692762374878,456.30609130859377]},{"page":83,"text":" Transitioning to a defense.","rect":[133.1999969482422,478.9142761230469,257.86590099334719,469.80609130859377]},{"page":83,"text":" Linking up the turning force and diversion force.","rect":[133.1999969482422,492.4142761230469,346.7233533859253,483.30609130859377]},{"page":83,"text":" Retrograding the turning force.","rect":[133.1999969482422,505.9142761230469,275.56423473358157,496.80609130859377]},{"page":83,"text":"2-76. After developing the tactical plan, units plan how the turning force maneuvers to its objective. They","rect":[107.9937515258789,523.4293212890625,539.9652004241943,514.3109741210938]},{"page":83,"text":"develop the turning force’s movement, loading, and staging plans if they require outside transportation assets.","rect":[107.9937973022461,534.89208984375,540.0161695480347,525.783935546875]},{"page":83,"text":"Units plan to occupy key terrain that threatens the enemy force’s survival or remain mobile and seek ways to","rect":[107.98373413085938,546.4151000976563,540.0150661468506,537.3069458007813]},{"page":83,"text":"exploit the turning force’s success.","rect":[107.98373413085938,557.9381103515625,247.10644054412843,548.8299560546875]},{"page":83,"text":"2-77. If there is an early linkup with the main body during a turning movement, the turning force normally","rect":[107.98374938964844,575.4029541015625,539.8265285491943,566.2947998046875]},{"page":83,"text":"plans to defend the terrain required to protect itself. Once reinforcement or linkup with the main body occurs,","rect":[107.98374938964844,586.9259643554688,540.0479078292847,577.8178100585938]},{"page":83,"text":"units plan how to use the turning force to continue the attack or relieve the main body so it can prepare for","rect":[107.98374938964844,598.448974609375,539.7886865196228,589.3408203125]},{"page":83,"text":"subsequent missions.","rect":[107.98374938964844,609.891845703125,192.44732189178468,600.8037109375]},{"page":83,"text":"2-78. The distances between forces and the existence of intermittent LOCs magnify the problems inherent","rect":[107.98374938964844,627.4268188476563,540.0369029006959,618.3186645507813]},{"page":83,"text":"in providing sustainment to a maneuver force during a turning movement. Therefore, when planning a turning","rect":[107.98374938964844,638.8897094726563,539.9711818695068,629.7815551757813]},{"page":83,"text":"movement, units describe the sustainment conditions required or acceptable for the operation.","rect":[107.9937973022461,650.3927001953125,482.6715955734253,641.3045654296875]},{"page":83,"text":"2-79. Units consider the provision of all supplies and equipment required for mission accomplishment as an","rect":[107.99375915527344,667.9176635742188,540.0250148773193,658.8295288085938]},{"page":83,"text":"integral part of tactical planning. They plan and organize unit sustainment operations to support a rapid tempo","rect":[107.99375915527344,679.4005737304688,539.9934597015381,670.2924194335938]},{"page":83,"text":"of highly mobile and widely dispersed operations. Turning movements tend to have greater supporting","rect":[107.9937973022461,690.923583984375,540.0047512054443,681.8154296875]},{"page":83,"text":"distances and responsibilities. Sustainment planners recognize this and adjust their plans using available","rect":[107.99375915527344,702.446533203125,539.9239778594971,693.3283081054688]},{"page":83,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":83,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":83,"text":"2-23","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":84,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":84,"text":"resources. Subordinate units carry only those supplies required to meet their immediate needs","rect":[90.0,83.51434326171875,485.67701601791387,74.40616607666016]},{"page":84,"text":"operation.","rect":[90.0,94.95719909667969,130.30044078826905,85.86905670166016]},{"page":84,"text":"into the","rect":[490.0184631347656,81.49030303955078,522.0664339141846,74.40616607666016]},{"page":84,"text":"Executing a Turning Movement","rect":[72.0,119.60069274902344,221.96047803115847,109.79554748535156]},{"page":84,"text":"2-80. Successful turning movements threaten the enemy force into a dilemma.First, enemy forces must move","rect":[90.0,137.154296875,522.0774202423096,128.04611206054688]},{"page":84,"text":"from their original positions to meet the threat presented by the turning force. Often enemy forces must","rect":[89.99996185302735,148.6171875,522.0561900100709,139.50900268554688]},{"page":84,"text":"commit available reserves against this new threat, which exposes their reserves to friendly fires. After the","rect":[89.99996185302735,160.14019775390626,521.9652986602783,151.03201293945313]},{"page":84,"text":"turning movement, enemy forces must engage the friendly force on ground that they have not chosen or","rect":[89.99996185302735,171.6632080078125,522.0184228477478,162.55502319335938]},{"page":84,"text":"prepared. The other option for enemy forces is to continue to hold the terrain they occupy at the risk of","rect":[89.99993896484375,183.12603759765626,521.9970605430603,174.01785278320313]},{"page":84,"text":"becoming enveloped and potentially encircled by friendly forces. Whenever possible, units conducting a","rect":[89.99993896484375,194.6490478515625,522.0633821563721,185.54086303710938]},{"page":84,"text":"turning movement try to reach the terrain-oriented objective that compels enemy forces to reposition prior to","rect":[89.99993896484375,206.17205810546876,521.9960231781006,197.05386352539063]},{"page":84,"text":"encountering them. Friendly forces finding their way into the enemy force’s rear area to rapidly exploit the","rect":[89.98999786376953,217.63494873046876,522.0514192657471,208.52676391601563]},{"page":84,"text":"situation seek to achieve their objectives before the enemy can react. Rapid movement is essential to prevent","rect":[89.98998260498047,229.157958984375,522.0770029983521,220.03976440429688]},{"page":84,"text":"enemy forces from occupying previously prepared positions in the enemy force’s rear.","rect":[89.98998260498047,240.680908203125,435.45855236053469,231.57272338867188]},{"page":84,"text":"2-81. The maneuver of the turning force is what causes enemy forces to leave their positions. A turning force","rect":[89.98998260498047,258.14581298828127,522.0825471954346,249.03762817382813]},{"page":84,"text":"normally conducts most of its operations outside the supporting range of the diversion force and possibly","rect":[89.9899673461914,269.6688232421875,521.9240627288818,260.5606384277344]},{"page":84,"text":"outside its supporting distance. The turning force must contain sufficient maneuver, functional, and","rect":[89.98999786376953,281.1917724609375,522.0824489593506,272.0835876464844]},{"page":84,"text":"multifunctional capabilities to operate independently for a specified period. Units organize the reserve to","rect":[89.98999786376953,292.6546630859375,521.9912014007568,283.5464782714844]},{"page":84,"text":"exploit success by using either the turning force or the diversion force.","rect":[89.98998260498047,304.17767333984377,372.0892286300659,295.0694885253906]},{"page":84,"text":"INFILTRATION","rect":[72.0,327.4927062988281,143.7121286392212,319.4159851074219]},{"page":84,"text":"2-82. An infiltration is a form of maneuver in which an attacking force conducts undetected movement","rect":[90.0,347.45428466796877,521.9821679649353,338.5064392089844]},{"page":84,"text":"through or into an area occupied by enemy forces. Infiltration is also a march technique used well before","rect":[90.0100326538086,358.91717529296877,522.0271883087158,349.8089904785156]},{"page":84,"text":"encountering enemy forces to avoid enemy information collection assets. Infiltration occurs by land, water,","rect":[90.0199966430664,370.4401550292969,522.0150098800659,361.33197021484377]},{"page":84,"text":"air, or a combination of means. Moving and assembling forces covertly through enemy positions takes a lot","rect":[90.0200424194336,381.9030456542969,522.0420908889771,372.79486083984377]},{"page":84,"text":"of time. A successful infiltration requires the infiltrating force to avoid detection and engagement by enemy","rect":[90.0200424194336,393.4260559082031,522.0461330413818,384.31787109375]},{"page":84,"text":"forces. Since this requirement limits the size and strength of the infiltrating force, and infiltrated forces alone","rect":[90.0200424194336,404.94903564453127,522.0542879180908,395.8408508300781]},{"page":84,"text":"can rarely defeat an enemy force, units use infiltration in conjunction with and in support of other forms of","rect":[90.0200424194336,416.41192626953127,522.0029199180603,407.2937316894531]},{"page":84,"text":"offensive maneuver. Figure 2-19 depicts an infiltration.","rect":[90.0200424194336,427.9349365234375,311.6514539718628,418.8267517089844]},{"page":84,"text":"2-24","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":84,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":84,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":85,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":85,"text":"2-83.","rect":[107.98445129394531,481.7269287109375,128.8460874557495,474.8431701660156]},{"page":85,"text":"to—","rect":[107.97439575195313,493.26995849609377,125.78995895385742,487.1878356933594]},{"page":85,"text":"Figure 2-19. Infiltration","rect":[261.05999755859377,460.3141784667969,368.92931866836548,450.9254455566406]},{"page":85,"text":"Units conduct infiltration to move all or a portion of a unit through gaps in the enemy force’s defenses","rect":[133.1747283935547,483.77099609375,539.9156024436951,474.6628112792969]},{"page":85,"text":"","rect":[133.1999969482422,506.0654602050781,139.16105696249009,501.3731994628906]},{"page":85,"text":"","rect":[133.1999969482422,531.08544921875,139.16105696249009,526.3932495117188]},{"page":85,"text":"","rect":[133.1999969482422,544.58544921875,139.16105696249009,539.8932495117188]},{"page":85,"text":"","rect":[133.1999969482422,558.08544921875,139.16105696249009,553.3932495117188]},{"page":85,"text":"","rect":[133.1999969482422,571.58544921875,139.16105696249009,566.8932495117188]},{"page":85,"text":" Conduct a covert breach of an obstacle or obstacle complex.","rect":[133.1999969482422,610.7742919921875,392.3123426437378,601.6861572265625]},{"page":85,"text":"2-84. Special operations forces and dismounted infantry units up to brigade size are best suited to conduct","rect":[108.00376892089844,628.2591552734375,539.9758677444459,619.1510009765625]},{"page":85,"text":"an infiltration. In some circumstances, armored- and Stryker-equipped forces operating in small units can","rect":[108.00376892089844,639.7821655273438,540.0682277679443,630.6740112304688]},{"page":85,"text":"conduct an infiltration when the terrain can mask their force’s movement signature. The proliferation of","rect":[107.99371337890625,651.30517578125,540.0210473594666,642.197021484375]},{"page":85,"text":"technology leads to increased situational understanding for both friendly and enemy forces as well as an","rect":[107.99371337890625,662.76806640625,540.0191555023193,653.659912109375]},{"page":85,"text":"increased chance of detecting units conducting an infiltration. Understanding the capabilities of these","rect":[107.9937515258789,674.291015625,539.9968538360596,665.182861328125]},{"page":85,"text":"technologies informs the decision as to whether an infiltration is feasible.","rect":[107.9937515258789,685.8140258789063,401.07876110076907,676.7058715820313]},{"page":85,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":85,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":85,"text":"2-25","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":86,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":86,"text":"Organization of Forces","rect":[72.0,84.62071228027344,180.14092502212524,74.81556701660156]},{"page":86,"text":"2-85. Infiltrating units generally organize into a security force and a main body. Normally, to be successful,","rect":[90.0,102.11431884765625,522.0316724777222,93.00614166259766]},{"page":86,"text":"an infiltrating force must avoid detection until it reaches its objective rally point. The infiltrating unit","rect":[90.0,113.6373291015625,522.0724253616334,104.51913452148438]},{"page":86,"text":"organizes the main body into one or more infiltrating elements. These elements are the largest size element","rect":[90.0,125.16033935546875,522.0105357131959,116.05216217041016]},{"page":86,"text":"possible that meet requirements for stealth and ease of movement. This organization increases control and","rect":[90.0,136.6231689453125,522.0073146820068,127.5149917602539]},{"page":86,"text":"the speed of the infiltration while providing responsive combat power. Units determine the exact size and","rect":[89.98998260498047,148.14617919921876,521.9973049163818,139.03799438476563]},{"page":86,"text":"number of infiltrating elements based on the situation.","rect":[89.98998260498047,159.669189453125,306.6335096359253,150.56100463867188]},{"page":86,"text":"2-86. Units consider the following factors when determining how to organize available forces. Smaller","rect":[89.98998260498047,177.134033203125,521.8950707969666,168.02584838867188]},{"page":86,"text":"infiltrating elements are not as easy to detect as larger elements and can get through smaller defensive gaps.","rect":[89.98998260498047,188.65704345703126,522.0283765792847,179.54885864257813]},{"page":86,"text":"Even the detection of one or two small elements by enemy forces may not prevent an infiltrating unit from","rect":[89.98998260498047,200.1800537109375,521.9399085006714,191.07186889648438]},{"page":86,"text":"accomplishing its mission. Larger infiltrating elements are easier to detect, and their discovery is more apt to","rect":[89.98998260498047,211.6429443359375,522.0173854827881,202.53475952148438]},{"page":86,"text":"endanger the success of the mission but if compromised are better equipped to react. A unit with many smaller","rect":[89.98999786376953,223.16595458984376,521.9568383750916,214.05776977539063]},{"page":86,"text":"infiltrating elements requires more time to complete the infiltration and needs more linkup points than a","rect":[89.98998260498047,234.68896484375,521.9623079376221,225.58078002929688]},{"page":86,"text":"similar sized unit with only a few and larger infiltrating elements. Many smaller infiltrating elements are also","rect":[89.98998260498047,246.15185546875,522.0393581390381,237.04367065429688]},{"page":86,"text":"harder to control than fewer, larger elements.","rect":[89.98998260498047,257.6748046875,270.5134229660034,248.56661987304688]},{"page":86,"text":"2-87. If resources allow, units designate security forces that move ahead of, to the flanks of, and to the rear","rect":[89.98998260498047,275.1998291015625,522.0106713829041,266.0916442871094]},{"page":86,"text":"of each infiltrating element’s main body. These security forces may be assigned either screen or guard","rect":[89.98998260498047,286.66265869140627,521.9874782562256,277.5544738769531]},{"page":86,"text":"missions. They determine the sizes and orientation of security elements based on the situation. Each","rect":[89.97996520996094,298.1856689453125,522.0081081390381,289.0774841308594]},{"page":86,"text":"infiltrating element is responsible for its own reconnaissance effort.","rect":[89.97996520996094,309.70867919921877,360.1983289718628,300.6004943847656]},{"page":86,"text":"2-88. Sustainment of an infiltrating force normally depends on the force’s basic load of supplies and those","rect":[89.97994995117188,327.17352294921877,522.0344514923096,318.0653381347656]},{"page":86,"text":"medical and maintenance assets accompanying the infiltrating force. After completing the mission, units","rect":[89.97997283935547,338.696533203125,521.9502704124451,329.5883483886719]},{"page":86,"text":"reopen LOCs to conduct normal sustainment operations.","rect":[89.97997283935547,350.1393737792969,315.74663829803469,341.0512390136719]},{"page":86,"text":"Control Measures","rect":[72.0,372.5137023925781,156.56247958755493,364.926513671875]},{"page":86,"text":"2-89.","rect":[90.0,390.2502746582031,110.8616361618042,383.34649658203127]},{"page":86,"text":"Control measures for an infiltration include, at a minimum—","rect":[115.20030212402344,390.26031494140627,359.33759689331057,383.1661376953125]},{"page":86,"text":" One or more infiltration lanes.","rect":[115.19999694824219,403.76031494140627,254.62441539764405,396.6661376953125]},{"page":86,"text":" A LD or point of departure (PD).","rect":[115.19999694824219,419.2542724609375,265.7826795578003,410.1661376953125]},{"page":86,"text":" Movement routes with associated start points (SPs) and release points (RPs), or a direction or axis","rect":[115.19999694824219,432.7542724609375,522.0601336936951,423.6661376953125]},{"page":86,"text":"of attack.","rect":[133.19998168945313,442.2732849121094,170.44231700897218,435.18914794921877]},{"page":86,"text":" Linkup or rally points, including objective rally points.","rect":[115.19999694824219,457.7943115234375,352.9044141769409,448.6761169433594]},{"page":86,"text":" Assault positions.","rect":[115.19999694824219,471.2742614746094,204.3450117111206,462.1861267089844]},{"page":86,"text":" One or more objectives.","rect":[115.19999694824219,484.73431396484377,229.30581188201905,475.6161193847656]},{"page":86,"text":" A limit of advance.","rect":[115.19999694824219,496.21026611328127,210.47022533416749,489.1261291503906]},{"page":86,"text":" Phase lines.","rect":[115.19999694824219,509.71026611328127,180.46534252166749,502.6261291503906]},{"page":86,"text":" Checkpoints.","rect":[115.19999694824219,525.2142944335938,185.7478895187378,516.1261596679688]},{"page":86,"text":" Attack position.","rect":[115.19999694824219,538.7142944335938,197.08352184295655,529.6261596679688]},{"page":86,"text":"If it is not necessary for the entire infiltrating unit to reassemble to accomplish its mission, the objective may","rect":[89.9937515258789,553.2532958984375,522.0291652679443,544.1350708007813]},{"page":86,"text":"be broken into smaller objectives. Each infiltrating element would then move directly to its objective to","rect":[89.9937515258789,564.7762451171875,521.9255886077881,555.6580200195313]},{"page":86,"text":"conduct its mission.","rect":[89.9937515258789,574.215087890625,169.72089672088624,567.1309814453125]},{"page":86,"text":"Planning an Infiltration","rect":[72.0,600.8607177734375,183.82469786071779,591.0555419921875]},{"page":86,"text":"2-90. The activities and functions associated with the process of planning an infiltration are the same as with","rect":[90.0,618.414306640625,521.9762477874756,609.30615234375]},{"page":86,"text":"any other offensive operation. That planning takes advantage of that unit’s ability to surprise enemy forces.","rect":[90.0,629.877197265625,521.9812574386597,620.76904296875]},{"page":86,"text":"The planning process synchronizes the warfighting functions that support the infiltrating unit, especially","rect":[90.0,641.4002075195313,521.9556179046631,632.2920532226563]},{"page":86,"text":"precise information collection. Without precise, detailed intelligence, infiltration maneuvers become high-","rect":[90.0,652.9232177734375,522.0323388633728,643.8150634765625]},{"page":86,"text":"risk probing operations that can be costly and time consuming. Careful planning, full information collection","rect":[89.99996185302735,664.3860473632813,522.0259304046631,655.2778930664063]},{"page":86,"text":"integration, detailed analysis, and OPSEC enable an infiltrating force to avoid an enemy force. This","rect":[89.99996185302735,675.9090576171875,521.9362323265076,666.8009033203125]},{"page":86,"text":"minimizes direct contact and maximizes surprise.","rect":[89.99996185302735,687.4120483398438,287.7446241378784,678.3239135742188]},{"page":86,"text":"2-91. Sustaining infiltrations requires detailed planning with regard to medical evacuation, maintenance","rect":[89.99996185302735,704.8969116210938,522.0533113555908,695.7887573242188]},{"page":86,"text":"support, and resupply classes of supply for the infiltrating unit. Unlike the other forms of maneuver,","rect":[89.9999771118164,716.419921875,522.0412549972534,707.311767578125]},{"page":86,"text":"2-26","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":86,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":86,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":87,"text":"Movement and Forms of Maneuver","rect":[391.5,44.55902099609375,540.019798828125,37.90802001953125]},{"page":87,"text":"infiltration purposely maneuvers units out of sustainment range for longer periods to surprise the enemy. The","rect":[108.0,83.51434326171875,540.0915803985596,74.40616607666016]},{"page":87,"text":"prolonged time away from medical evacuation, maintenance, and resupply of classes of supply increases the","rect":[108.0,94.97723388671875,540.0113191680908,85.86905670166016]},{"page":87,"text":"risk to the infiltrating unit, which requires detailed planning to mitigate. After identifying gaps or weaknesses","rect":[108.01001739501953,106.500244140625,540.0410907249451,97.3920669555664]},{"page":87,"text":"in the enemy force’s defensive positions, units assign infiltration lanes, contact points, and objectives to","rect":[108.01001739501953,118.023193359375,540.0153713226318,108.90499877929688]},{"page":87,"text":"subordinate units. These objectives afford the infiltrating force positions of advantage over enemy forces (the","rect":[107.99999237060547,129.486083984375,540.0674104766846,120.36788940429688]},{"page":87,"text":"objectives are not required to be to the rear of the enemy force). Each subordinate unit picks one or more","rect":[107.99992370605469,141.00909423828126,540.0553255157471,131.89089965820313]},{"page":87,"text":"routes within the assigned lane and establishes additional contact points, rally points, assault points, and other","rect":[107.99992370605469,152.5321044921875,540.0634057579041,143.42391967773438]},{"page":87,"text":"control measures as required.","rect":[107.99992370605469,163.97496032714845,225.22088146209718,154.88681030273438]},{"page":87,"text":"2-92. Units require routes within an infiltration lane to be far enough apart to prevent an infiltrating element","rect":[107.99992370605469,181.50994873046876,540.0301279983521,172.40176391601563]},{"page":87,"text":"on one route from seeing other infiltrating elements, but close enough so that an infiltrating element could","rect":[107.99993133544922,193.032958984375,539.9772853851318,183.92477416992188]},{"page":87,"text":"switch quickly to another route if the situation requires it. They may use single or multiple infiltration lanes","rect":[107.99993133544922,204.495849609375,539.9439837913513,195.38766479492188]},{"page":87,"text":"depending on the infiltrating force’s size, the amount of detailed information on enemy dispositions, terrain,","rect":[108.00995635986328,216.018798828125,540.0540723800659,206.91061401367188]},{"page":87,"text":"time allowed, and number of lanes available. Units require each route to provide infiltrating elements cover","rect":[108.00995635986328,227.481689453125,540.0453393516541,218.37350463867188]},{"page":87,"text":"and concealment while avoiding known enemy and civilian locations and movement routes as much as","rect":[108.00995635986328,239.00469970703126,540.0002582054138,229.89651489257813]},{"page":87,"text":"possible. If possible, the subordinate unit selects the exact routes during the preparation phase after","rect":[108.00994110107422,250.5277099609375,539.9858911094666,241.41952514648438]},{"page":87,"text":"reconnoitering each infiltration lane. That subordinate decides whether the unit infiltrates as a whole or as","rect":[108.00994110107422,261.9906005859375,539.9516131858826,252.88241577148438]},{"page":87,"text":"smaller elements, depending on the enemy force’s density and strength.","rect":[108.00994110107422,273.5135498046875,394.37749767303469,264.4053649902344]},{"page":87,"text":"2-93. A single infiltration lane—","rect":[108.00991821289063,291.03857421875,241.26591110229493,281.9303894042969]},{"page":87,"text":" Facilitates navigation, control, and reassembly.","rect":[133.1999969482422,304.4942932128906,339.81743907928469,295.3861083984375]},{"page":87,"text":" Requires the existence or creation of only one gap in the enemy force’s position.","rect":[133.1999969482422,317.9942932128906,473.3861036300659,308.8861083984375]},{"page":87,"text":" Reduces the area for which detailed intelligence is required.","rect":[133.1999969482422,331.4942932128906,390.8874464035034,322.3861083984375]},{"page":87,"text":"2-94. Multiple infiltration lanes—","rect":[107.99375915527344,348.9391174316406,245.98920822143556,339.8509826660156]},{"page":87,"text":" Require the existence or creation of more gaps in the enemy force’s security area.","rect":[133.1999969482422,362.45428466796877,477.8249464035034,353.3460998535156]},{"page":87,"text":" Reduce the possibility of compromising the entire force.","rect":[133.1999969482422,375.95428466796877,376.7232313156128,366.8460998535156]},{"page":87,"text":" Increase difficulty with maintaining control.","rect":[133.1999969482422,389.45428466796877,328.12407970428469,380.3460998535156]},{"page":87,"text":"2-95. The sizes and numbers of infiltrating elements are major considerations for units when deciding","rect":[108.00376892089844,406.96923828125,540.0771389007568,397.8510437011719]},{"page":87,"text":"whether to use a single lane or multiple infiltration lanes. If the infiltration takes place using multiple","rect":[108.00376892089844,418.49224853515627,539.9287996368408,409.3840637207031]},{"page":87,"text":"elements, contingency plans must address the following situations:","rect":[108.00376892089844,429.95513916015627,375.27426862335207,420.8469543457031]},{"page":87,"text":" A lead element, possibly the security force, makes contact, but the trail elements have not started","rect":[133.1999969482422,443.45428466796877,540.0705471038818,434.3460998535156]},{"page":87,"text":"infiltrating.","rect":[151.1999969482422,454.977294921875,196.48438549041749,445.8691101074219]},{"page":87,"text":" A lead element infiltrates successfully but compromises one or more trailing elements.","rect":[133.1999969482422,468.47430419921877,497.8045606613159,459.3661193847656]},{"page":87,"text":" A linkup point is compromised.","rect":[133.1999969482422,481.9542541503906,278.2034864425659,472.8661193847656]},{"page":87,"text":" An element is isolated by the enemy.","rect":[133.1999969482422,495.47430419921877,299.27154064178469,486.3661193847656]},{"page":87,"text":"2-96.","rect":[108.00376892089844,510.9151306152344,128.86540508270265,504.0113525390625]},{"page":87,"text":"The","rect":[133.20407104492188,510.9151306152344,148.81322956848144,503.83099365234377]},{"page":87,"text":"","rect":[133.1999969482422,523.7054443359375,139.16105696249009,519.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,537.2054443359375,139.16105696249009,532.5132446289063]},{"page":87,"text":"","rect":[133.1999969482422,550.7054443359375,139.16105696249009,546.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,564.2054443359375,139.16105696249009,559.5132446289063]},{"page":87,"text":"","rect":[133.1999969482422,577.7054443359375,139.16105696249009,573.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,591.2054443359375,139.16105696249009,586.5132446289063]},{"page":87,"text":"","rect":[133.1999969482422,604.7054443359375,139.16105696249009,600.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,618.2054443359375,139.16105696249009,613.5132446289063]},{"page":87,"text":"","rect":[133.1999969482422,631.7054443359375,139.16105696249009,627.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,645.2054443359375,139.16105696249009,640.5132446289063]},{"page":87,"text":"","rect":[133.1999969482422,658.7054443359375,139.16105696249009,654.0132446289063]},{"page":87,"text":"","rect":[133.1999969482422,672.2054443359375,139.16105696249009,667.5132446289063]},{"page":87,"text":"infiltration plan also addresses the following considerations:","rect":[151.3202362060547,512.939208984375,392.42542218780519,503.83099365234377]},{"page":87,"text":"Availability of supporting fires throughout the operation.","rect":[151.1999969482422,526.434326171875,379.24407482147219,517.326171875]},{"page":87,"text":"Linkup or extraction of the infiltrating unit after mission completion.","rect":[151.1999969482422,539.934326171875,426.7637891769409,530.826171875]},{"page":87,"text":"Sustainment of the infiltrating force during the operation, including casualty evacuation.","rect":[151.1999969482422,553.434326171875,504.5173292160034,544.326171875]},{"page":87,"text":"Tactical deception operations.","rect":[151.1999969482422,566.914306640625,271.48003673553469,557.826171875]},{"page":87,"text":"Linkup of various infiltrating elements.","rect":[151.1999969482422,580.434326171875,308.7445020675659,571.326171875]},{"page":87,"text":"Command and control of forces.","rect":[151.1999969482422,591.9202880859375,280.90993785858157,584.826171875]},{"page":87,"text":"Positioning of combat vehicles to support the infiltrating elements.","rect":[151.1999969482422,607.434326171875,418.12456798553469,598.326171875]},{"page":87,"text":"Use of limited visibility and rough terrain to mask movement and reduce possible detection.","rect":[151.1999969482422,620.934326171875,519.4720411300659,611.826171875]},{"page":87,"text":"Infiltration of the largest elements possible to maintain speed and control.","rect":[151.1999969482422,634.434326171875,445.8422803878784,625.326171875]},{"page":87,"text":"Rehearsals.","rect":[151.1999969482422,645.9102783203125,197.08059215545655,638.826171875]},{"page":87,"text":"Abort criteria.","rect":[151.1999969482422,659.4102783203125,207.87612438201905,652.326171875]},{"page":87,"text":"Critical friendly zones.","rect":[151.1999969482422,674.934326171875,243.16759777069093,665.826171875]},{"page":87,"text":"2-97. Planned recognition signals and linkup procedures for the infiltration should be simple and quick. If","rect":[108.00376892089844,692.4592895507813,539.8366601524353,683.3511352539063]},{"page":87,"text":"there have not been any firing or other noises, users of signals should consider the probability of detection.","rect":[108.00376892089844,703.9822998046875,539.9927930831909,694.8741455078125]},{"page":87,"text":"However, if there have already been assaults, artillery, and small arms fire, stealth is less of a concern. A lack","rect":[108.00376892089844,715.4451904296875,540.0320949554443,706.3370361328125]},{"page":87,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":87,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":87,"text":"2-27","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":88,"text":"Chapter 2","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":88,"text":"of time and the short distance involved in many infiltration operations may make conducting formal linkup","rect":[90.0,83.51434326171875,521.9688625335693,74.40616607666016]},{"page":88,"text":"procedures unnecessary.","rect":[90.0,94.97723388671875,187.77917003631593,85.86905670166016]},{"page":88,"text":"Preparing an Infiltration","rect":[72.0,119.60069274902344,189.3322967376709,109.79554748535156]},{"page":88,"text":"2-98. Once the objective, infiltration lanes, and linkup or rally points are selected, commanders’ direct","rect":[90.0,137.154296875,522.0223154983521,128.03610229492188]},{"page":88,"text":"information collection operations to update and confirm intelligence requirements. Friendly information","rect":[90.00003814697266,148.6171875,521.9589138031006,139.50900268554688]},{"page":88,"text":"collection operations identify enemy sensors and surveillance systems. Units then revise the plan to reflect","rect":[90.0,160.14019775390626,521.9332041702271,151.03201293945313]},{"page":88,"text":"current conditions in the assigned area.","rect":[90.0,171.6632080078125,246.04253673553468,162.55502319335938]},{"page":88,"text":"Executing an Infiltration","rect":[72.0,196.2806854248047,188.7328094329834,186.4755401611328]},{"page":88,"text":"2-99. Moving undetected during an infiltration requires a considerable amount of time. The infiltrating unit","rect":[90.0,213.7742919921875,521.9642100296021,204.66610717773438]},{"page":88,"text":"moves from its assembly area or current position through the start point and then continues moving along the","rect":[90.0,225.29730224609376,522.0755891876221,216.18911743164063]},{"page":88,"text":"infiltration route to a release point. If small elements are conducting the infiltration, the unit uses a series of","rect":[90.00000762939453,236.76019287109376,522.0343530235291,227.65200805664063]},{"page":88,"text":"linkup points to reassemble into a coherent unit.","rect":[90.00000762939453,248.26316833496095,282.22271251678469,239.17501831054688]},{"page":88,"text":"2-100. If the complete unit is conducting the infiltration, the forward security force begins its movement","rect":[90.00000762939453,265.80816650390627,522.0342173538209,256.6999816894531]},{"page":88,"text":"first and the main body follows. The distance between the forward security force and the main body depends","rect":[89.98998260498047,277.27105712890627,521.9949481468201,268.1628723144531]},{"page":88,"text":"on the mission variables. The security force must be far enough ahead of the main body so that it can either","rect":[89.98998260498047,288.7940368652344,522.0220849571228,279.68585205078127]},{"page":88,"text":"deploy or move to another route if the forward security force discovers enemy forces. The forward security","rect":[89.98998260498047,300.3170471191406,521.9689846038818,291.2088623046875]},{"page":88,"text":"force in an infiltration needs enough time to move in a stealthy and secure manner. Enemy units should not","rect":[89.98998260498047,311.7799072265625,522.0741953811646,302.6717224121094]},{"page":88,"text":"be able to move undetected between the forward security force and the main body.","rect":[89.98998260498047,323.30291748046877,420.44280529022219,314.1947326660156]},{"page":88,"text":"2-101. As the infiltrating unit moves, the security force reports the cover and concealment of each route,","rect":[89.98998260498047,340.827880859375,521.9139966964722,331.7196960449219]},{"page":88,"text":"enemy activity, location of danger areas and linkup points, enemy activity on the objective, and other combat","rect":[89.97996520996094,352.290771484375,521.9593882522584,343.1725769042969]},{"page":88,"text":"information. The unit attempts to avoid enemy and civilian contact; however, contact does not always mean","rect":[89.97996520996094,363.81378173828127,521.9492092132568,354.7055969238281]},{"page":88,"text":"the mission is compromised. The infiltrating unit engages targets first with indirect fires to avoid revealing","rect":[89.97996520996094,375.3367614746094,522.0113430023193,366.22857666015627]},{"page":88,"text":"its presence and exact location.","rect":[89.97997283935547,386.7795715332031,214.69886302947999,377.6914367675781]},{"page":88,"text":"2-102. If necessary, the forward security force conducts actions on contact while the main body moves to","rect":[89.97997283935547,404.32464599609377,521.9500637054443,395.2164611816406]},{"page":88,"text":"another route, reconstitutes a forward security force, and continues the mission. If the main body makes","rect":[89.9699478149414,415.8476257324219,522.0020282249451,406.73944091796877]},{"page":88,"text":"contact unexpectedly, it either bypasses the encountered enemy force or attacks the enemy force if the enemy","rect":[89.9699478149414,427.31048583984377,521.9713039398193,418.2023010253906]},{"page":88,"text":"has little combat power or cannot be bypassed. During an infiltration, the forward security force ignores","rect":[89.95992279052735,438.83349609375,522.0063617210388,429.7253112792969]},{"page":88,"text":"ineffective enemy fire and continues to move.","rect":[89.9499282836914,450.35650634765627,273.4753065109253,441.2483215332031]},{"page":88,"text":"2-103. The infiltrating unit’s elements move to an assembly area or an objective rally point to consolidate","rect":[89.9499282836914,467.82135009765627,521.9011507110596,458.7031555175781]},{"page":88,"text":"and reorganize their combat power, refine the plan, and conduct any last-minute coordination before","rect":[89.92987823486328,479.3443298339844,521.9933137969971,470.23614501953127]},{"page":88,"text":"continuing the mission. The unit then conducts those tasks needed to accomplish its mission, which could be","rect":[89.92987823486328,490.8072204589844,521.9933137969971,481.69903564453127]},{"page":88,"text":"an attack, raid, ambush, seizing key terrain, or information collection.","rect":[89.92987823486328,502.3302001953125,368.8406934738159,493.2220153808594]},{"page":88,"text":"2-104. Units may need to abort an infiltration operation if the mission variables change during the","rect":[89.92987823486328,519.855224609375,522.0472078399658,510.7470397949219]},{"page":88,"text":"infiltration, creating a condition where units can no longer accomplish the infiltration. Examples of changes","rect":[89.91986083984375,531.3180541992188,521.9152362327576,522.2098999023438]},{"page":88,"text":"that might trigger such an action include—","rect":[89.91988372802735,542.841064453125,261.64265060424807,533.73291015625]},{"page":88,"text":" Significant portions of the infiltrating force’s combat power are lost through navigation errors,","rect":[115.19999694824219,556.2542724609375,521.9680738449097,547.1461181640625]},{"page":88,"text":"enemy action, accidents, or maintenance failures.","rect":[133.20001220703126,567.7772827148438,330.2703809738159,558.6691284179688]},{"page":88,"text":" Movement or significant reinforcement of a force-oriented objective.","rect":[115.19999694824219,581.2742919921875,409.1768445968628,572.1560668945313]},{"page":88,"text":" Detection of the infiltration by enemy forces.","rect":[115.19999694824219,594.7742919921875,313.9648389816284,585.6661376953125]},{"page":88,"text":" Changes in the tactical situation that make the mission no longer appropriate.","rect":[115.19999694824219,608.2742919921875,442.06719493865969,599.1661376953125]},{"page":88,"text":"Units develop criteria for aborting the infiltration as part of the planning process. They transmit the decision","rect":[89.9937515258789,622.733154296875,521.9670314788818,613.625]},{"page":88,"text":"to abort the infiltration to all appropriate headquarters for action and information.","rect":[89.9937515258789,634.2361450195313,415.53823375701907,625.1480102539063]},{"page":88,"text":"2-28","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":88,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":88,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":89,"text":"PART TWO","rect":[282.9599914550781,127.39201354980469,346.9559951171875,118.52400970458985]},{"page":89,"text":"Offensive Operations","rect":[218.8800048828125,160.32789611816407,411.07331971740725,142.75341796875]},{"page":89,"text":"Commanders use offensive operations to defeat and destroy enemy forces as well as","rect":[108.0,185.2348175048828,521.9679660797119,174.94656372070313]},{"page":89,"text":"to seize terrain, resources, and population centers. Part Two consists of five chapters","rect":[108.01097106933594,197.77395629882813,521.9437961578369,187.60647583007813]},{"page":89,"text":"that describe the fundamentals of the offense and the four types of offensive","rect":[108.01097106933594,210.55470275878907,522.0213836517334,200.26644897460938]},{"page":89,"text":"operations—movement to contact, attack, exploitation, and pursuit.","rect":[108.01097106933594,223.09384155273438,433.30655974578857,213.05812072753907]},{"page":89,"text":"Chapter 3","rect":[287.3399963378906,293.8320007324219,342.6731901855469,282.7440185546875]},{"page":89,"text":"The Offense","rect":[268.7400207519531,315.2362060546875,361.22346546936037,303.3974304199219]},{"page":89,"text":"Offensive actions are combat operations conducted to defeat and destroy forces and","rect":[126.0,353.0007019042969,503.9636631011963,343.0198974609375]},{"page":89,"text":"seize terrain, resources, and population centers. They impose the commander’s will on","rect":[126.0,365.7155456542969,504.09632301330569,355.7347412109375]},{"page":89,"text":"the enemy. The basics discussed in this chapter apply to the conduct of all types of ","rect":[126.0,378.3205871582031,506.77670764923098,368.33978271484377]},{"page":89,"text":"offensive operations.","rect":[126.0,390.9585876464844,218.02338123321534,380.9997253417969]},{"page":89,"text":"PURPOSES OF THE OFFENSE","rect":[90.0,416.3096923828125,287.1864455833435,406.63555908203127]},{"page":89,"text":"3-1. The offense is the decisive form of war. The offense is the ultimate means commanders have of","rect":[108.0,434.5902404785156,539.9926660118103,427.506103515625]},{"page":89,"text":"imposing their will on enemy forces. The main purposes of the offense are to defeat enemy forces, destroy","rect":[108.0,448.1372985839844,540.0004787445068,439.02911376953127]},{"page":89,"text":"enemy forces, and gain control of terrain, resources, and population centers. Additionally, units conduct the","rect":[108.0,459.6602783203125,540.0041780548096,450.5520935058594]},{"page":89,"text":"offense to—","rect":[108.0,469.09912109375,157.73928451538087,462.0250244140625]},{"page":89,"text":"","rect":[133.1999969482422,481.88543701171877,139.16105696249009,477.19317626953127]},{"page":89,"text":"","rect":[133.1999969482422,495.38543701171877,139.16105696249009,490.69317626953127]},{"page":89,"text":"","rect":[133.1999969482422,508.88543701171877,139.16105696249009,504.19317626953127]},{"page":89,"text":"","rect":[133.1999969482422,522.3853759765625,139.16105696249009,517.6931762695313]},{"page":89,"text":"","rect":[133.1999969482422,535.8854370117188,139.16105696249009,531.1932373046875]},{"page":89,"text":"","rect":[133.1999969482422,549.3854370117188,139.16105696249009,544.6932373046875]},{"page":89,"text":"Secure decisive terrain.","rect":[151.1999969482422,482.60028076171877,244.7777967453003,475.506103515625]},{"page":89,"text":"Deprive the enemy of resources.","rect":[151.1999969482422,498.1142883300781,280.8908643722534,489.006103515625]},{"page":89,"text":"Gain information.","rect":[151.1999969482422,509.60028076171877,222.88405895233155,502.506103515625]},{"page":89,"text":"Fix an enemy force in position.","rect":[151.1999969482422,525.1142578125,276.1634473800659,516.006103515625]},{"page":89,"text":"Disrupt an enemy force’s attack.","rect":[151.1999969482422,538.6143188476563,281.43996715545657,529.5061645507813]},{"page":89,"text":"Set the conditions for successful future operations.","rect":[151.1999969482422,552.0942993164063,353.73833751678469,543.0061645507813]},{"page":89,"text":"CHARACTERISTICS OF THE OFFENSE","rect":[90.0,575.5079956054688,270.3249297142029,567.2159423828125]},{"page":89,"text":"3-2. Successful offenses share these characteristics:","rect":[108.0,593.4202880859375,320.8949351272583,586.326171875]},{"page":89,"text":" Audacity.","rect":[133.1999969482422,608.934326171875,190.42829418182374,599.826171875]},{"page":89,"text":" Concentration.","rect":[133.1999969482422,620.4202880859375,210.40818309783936,613.326171875]},{"page":89,"text":" Surprise.","rect":[133.1999969482422,635.914306640625,187.06157970428468,626.826171875]},{"page":89,"text":" Tempo.","rect":[133.1999969482422,649.414306640625,182.08164501190186,640.6467895507813]},{"page":89,"text":"See ADP 3-90 for more information on the purposes and","rect":[107.9937515258789,663.8731689453125,334.94176292419436,654.7850341796875]},{"page":89,"text":"characteristics of the","rect":[337.4317321777344,661.869140625,420.17989826965336,654.7850341796875]},{"page":89,"text":"offense.","rect":[422.63177490234377,661.869140625,454.5895643234253,654.7950439453125]},{"page":89,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":89,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":89,"text":"3-1","rect":[508.9800109863281,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":90,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":90,"text":"TYPES OF OFFENSIVE OPERATIONS","rect":[72.0,83.38796997070313,245.63837242126466,75.0959701538086]},{"page":90,"text":"3-3. The types of offensive operations describe the general sequence of the offense and recommended","rect":[90.0,103.3143310546875,521.9559841156006,94.2061538696289]},{"page":90,"text":"formations. The purpose of the operation discriminates one from another. The four types of offensive","rect":[90.0,114.7772216796875,522.0545320587158,105.6690444946289]},{"page":90,"text":"operations are—","rect":[89.9999771118164,126.28019714355469,156.36249923706056,117.19205474853516]},{"page":90,"text":" Movement to contact.","rect":[115.19999694824219,137.77027893066407,220.72671031951905,131.00677490234376]},{"page":90,"text":" Attack.","rect":[115.19999694824219,151.27027893066407,162.40529918670655,144.18612670898438]},{"page":90,"text":" Exploitation.","rect":[115.19999694824219,166.77427673339845,185.2047986984253,157.68612670898438]},{"page":90,"text":" Pursuit.","rect":[115.19999694824219,178.27027893066407,164.0846357345581,171.18612670898438]},{"page":90,"text":"Table 3-1 contains the planning symbols associated with movement to contact, exploitation, and pursuit.","rect":[90.00376892089844,194.81329345703126,507.5811719894409,185.70510864257813]},{"page":90,"text":"Table 3-1. Types of the offensive operations and planning symbols","rect":[138.60076904296876,212.3282470703125,455.3639974517822,202.93951416015626]},{"page":90,"text":"Note. Attack does not have a planning symbol. Unless a commander deems it is necessary to","rect":[115.19999694824219,514.914306640625,504.0110683441162,505.8061218261719]},{"page":90,"text":"constrain their subordinates the default type of offensive operation is an attack and graphic control","rect":[115.19999694824219,526.434326171875,504.11411237335207,517.326171875]},{"page":90,"text":"measures such as an axis of advance or direction of attack can be used to convey the commander’s","rect":[115.19999694824219,537.957275390625,504.01612734603887,528.84912109375]},{"page":90,"text":"intent. Additionally, exploitations and pursuits are generally a branch or sequel to a successful","rect":[115.19999694824219,549.420166015625,504.04709577178957,540.31201171875]},{"page":90,"text":"attack.","rect":[115.19999694824219,558.9191284179688,141.58166027069093,551.8350219726563]},{"page":90,"text":"Movement to Contact","rect":[72.0,598.11376953125,174.06130810928347,590.5265502929688]},{"page":90,"text":"3-4. Movement to contact is a type of offensive operation designed to establish or regain contact to","rect":[90.0,617.8143310546875,521.9521999359131,608.866455078125]},{"page":90,"text":"develop the situation. It creates favorable conditions for subsequent tactical actions. Units conduct a","rect":[89.98994445800781,629.3172607421875,521.9971590118408,620.2291259765625]},{"page":90,"text":"movement to contact when the enemy situation is vague or not specific enough to conduct an attack. Forces","rect":[90.0,640.8602905273438,522.0481097679138,631.7521362304688]},{"page":90,"text":"conducting a movement to contact seek to make contact using the smallest friendly force feasible. If friendly","rect":[90.0,652.3231811523438,521.9782619476318,643.2150268554688]},{"page":90,"text":"forces make contact with an enemy, they have five options: attack, defend, bypass, delay, or withdraw. There","rect":[90.0,663.84619140625,522.0793733673096,654.738037109375]},{"page":90,"text":"are two variations of movement to contact:","rect":[90.0,673.2850341796875,261.6326060256958,666.200927734375]},{"page":90,"text":" Search and attack.","rect":[115.19999694824219,686.7802734375,206.2608289718628,679.6861572265625]},{"page":90,"text":" Cordon and search.","rect":[115.19999694824219,700.2802734375,210.7046766281128,693.1861572265625]},{"page":90,"text":"See Chapter 4 for more information on movement to contact.","rect":[90.00376892089844,716.7932739257813,334.34246349334719,707.7051391601563]},{"page":90,"text":"3-2","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":90,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":90,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":91,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.01620703125,37.90802001953125]},{"page":91,"text":"Attack","rect":[90.0,82.40274810791016,121.7256072845459,74.83753204345703]},{"page":91,"text":"3-5. An attack is a type of offensive operation that defeats enemy forces, seizes terrain or secures","rect":[108.0,102.11431884765625,540.0413959007263,93.16645812988281]},{"page":91,"text":"terrain. Attacks incorporate coordinated maneuver. An attack differs from a movement to contact since","rect":[108.0,113.61729431152344,540.0513582305908,104.5291519165039]},{"page":91,"text":"knowledge of the enemy’s disposition enables units to synchronize and employ combat power more","rect":[108.0,125.16033935546875,540.0655794219971,116.05216217041016]},{"page":91,"text":"effectively. There are four variations of an attack:","rect":[108.0,136.6231689453125,306.81687116241457,127.5149917602539]},{"page":91,"text":" Ambush.","rect":[133.1999969482422,148.0902862548828,187.66479015350343,141.00613403320313]},{"page":91,"text":" Counterattack.","rect":[133.1999969482422,161.6002960205078,209.80597972869874,154.50613403320313]},{"page":91,"text":" Raid.","rect":[133.1999969482422,175.0902862548828,172.60271739959718,168.00613403320313]},{"page":91,"text":" Spoiling attacks.","rect":[133.1999969482422,190.61431884765626,217.84301280975343,181.50613403320313]},{"page":91,"text":"See Chapter 5 for more information on attack.","rect":[108.00377655029297,205.11326599121095,292.43191051483157,196.02511596679688]},{"page":91,"text":"Exploitation","rect":[90.0,229.73876953125,148.0710204925537,219.95558166503907]},{"page":91,"text":"3-6. An exploitation is a type of offensive operation following a successful attack to disorganize the","rect":[108.0,247.2542724609375,540.0383577423096,238.30641174316407]},{"page":91,"text":"enemy in depth. Exploitations seek to disintegrate enemy forces to the extent that they have no alternative","rect":[107.97993469238281,258.77728271484377,540.0122346954346,249.66909790039063]},{"page":91,"text":"but surrender or retreat. Exploitations take advantage of tactical opportunities. Division and higher echelon","rect":[107.97993469238281,270.30029296875,539.9094142913818,261.1921081542969]},{"page":91,"text":"headquarters normally plan exploitations as branches or sequels to current operations. See chapter 6 for more","rect":[107.9800033569336,281.76318359375,539.9953279571533,272.6549987792969]},{"page":91,"text":"information on exploitation.","rect":[107.99002075195313,293.26611328125,220.47454357147218,284.177978515625]},{"page":91,"text":"Pursuit","rect":[90.0,315.6827392578125,124.7912275428772,308.0955810546875]},{"page":91,"text":"3-7. A pursuit is a type of offensive operation to catch or cut off a disorganized hostile force","rect":[108.0,335.45428466796877,540.0104646759033,326.5064392089844]},{"page":91,"text":"attempting to escape, with the aim of destroying it. Pursuits entail rapid movement and decentralized","rect":[108.0,346.91717529296877,539.8930568695068,337.8089904785156]},{"page":91,"text":"control. Pursuits require the pursuing force to retain more mobility than the enemy force. Any offensive","rect":[108.0000228881836,358.4401550292969,540.1173372344971,349.33197021484377]},{"page":91,"text":"operation can transition into a pursuit if enemy resistance breaks down and enemy forces flee. Pursuits","rect":[108.0000228881836,369.9030456542969,539.9241473655701,360.79486083984377]},{"page":91,"text":"generally follow successful exploitations with the purpose of completing the destruction of enemy forces","rect":[108.0,381.4260559082031,539.9750506858826,372.31787109375]},{"page":91,"text":"before they can reorganize. There are two variations of pursuits:","rect":[108.0,392.94903564453127,364.59217023468019,383.8408508300781]},{"page":91,"text":" Frontal.","rect":[133.1999969482422,404.4102478027344,182.61570262908936,397.32611083984377]},{"page":91,"text":" Combination.","rect":[133.1999969482422,417.9202880859375,205.9693250656128,410.82611083984377]},{"page":91,"text":"See Chapter 7 for more information on pursuit.","rect":[108.0137939453125,434.37310791015627,296.32464122772219,425.28497314453127]},{"page":91,"text":"COMMON OFFENSIVE PLANNING CONSIDERATIONS","rect":[90.0,459.689697265625,451.28938975524906,450.0015563964844]},{"page":91,"text":"3-8. The widespread application of highly accurate and lethal weapons, the high degree of tactical mobility,","rect":[108.0,479.9942932128906,540.0672559738159,470.8861083984375]},{"page":91,"text":"ever-present sensors, and a complex operational environment all characterize contemporary combined arms","rect":[108.0,491.5173034667969,539.9816424827576,482.40911865234377]},{"page":91,"text":"warfare. Units have a higher probability of tactical success when they can first visualize the battlefield,","rect":[108.0,503.040283203125,539.9762525558472,493.9320983886719]},{"page":91,"text":"understand the implications of existing friendly and enemy dispositions, and take effective action to impose","rect":[108.0,514.503173828125,540.0124178009033,505.3949890136719]},{"page":91,"text":"their will on the situation. The planning considerations for the offense also apply to the defense with","rect":[108.0,526.0261840820313,540.0253810882568,516.9180297851563]},{"page":91,"text":"situationally appropriate modifications.","rect":[108.0,537.5491943359375,265.54448986053469,528.4410400390625]},{"page":91,"text":"3-9. Only a determined offense, conducted at a high tempo and to great depth, attains the enemy force’s","rect":[108.0,555.0140380859375,539.9923236351013,545.9058837890625]},{"page":91,"text":"destruction. The attacker’s principal advantage is that it possesses the initiative. Maintaining the initiative","rect":[107.98999786376953,566.5370483398438,539.9762849884033,557.4288330078125]},{"page":91,"text":"allows units to engage the enemy at the time, and in a manner of their choosing. Attacking units have the","rect":[107.97994995117188,578.06005859375,540.0473299102783,568.951904296875]},{"page":91,"text":"time and opportunity to develop a plan and to concentrate the effects of subordinate forces and combat","rect":[107.9800033569336,589.52294921875,539.9659190139771,580.414794921875]},{"page":91,"text":"enablers to create conditions for success. Units strike the enemy in unexpected ways at unexpected times and","rect":[107.9799575805664,601.0458984375,540.0247707366943,591.937744140625]},{"page":91,"text":"places. They focus on attacking the right combination of targets, not necessarily the biggest or the closest.","rect":[107.9799575805664,612.5689086914063,539.9302930831909,603.4607543945313]},{"page":91,"text":"These attacks are rapidly and violently executed, unpredictable, and seek to disorient enemy forces.","rect":[107.97996520996094,624.0317993164063,506.12151622772219,614.9236450195313]},{"page":91,"text":"3-10. Attacking units maintain tempo by rapidly following up on attacks throughout the depth of the","rect":[107.97996520996094,641.5567626953125,540.0454378204346,632.4486083984375]},{"page":91,"text":"battlefield to keep enemy forces off-balance and deny them the ability to recover. Friendly forces develop","rect":[107.97997283935547,653.0196533203125,540.0063381195068,643.9114990234375]},{"page":91,"text":"flexible plans that allow them to take advantage of opportunities to maintain the initiative and dictate the","rect":[107.97997283935547,664.5426025390625,539.8911409454346,655.4344482421875]},{"page":91,"text":"tempo of operations against the enemy. Due to the intensity and high pace of offensive operations, units take","rect":[107.97997283935547,676.0656127929688,540.0473909454346,666.9574584960938]},{"page":91,"text":"proactive measures to prevent early culmination prior to accomplishing their assigned mission. The tempo of","rect":[107.97997283935547,687.5285034179688,540.0232446250916,678.4203491210938]},{"page":91,"text":"friendly operations must be fast enough to prevent effective counteraction and attacking units change their","rect":[107.97997283935547,699.051513671875,539.9222314414978,689.943359375]},{"page":91,"text":"means and methods before enemy forces can adapt to them.","rect":[107.97997283935547,710.574462890625,346.8147840499878,701.46630859375]},{"page":91,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":91,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":91,"text":"3-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":92,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":92,"text":"3-11. Table 3-2 illustrates some of the common control measures used during offensive operations.","rect":[90.0,83.51434326171875,522.0382032394409,74.40616607666016]},{"page":92,"text":"Additionally, paragraphs A-6 through A-61 define and discuss common offensive control measures used to","rect":[89.98998260498047,94.97723388671875,521.9843654632568,85.86905670166016]},{"page":92,"text":"synchronize the effects of combat power. Units use the minimum control measures required to complete their","rect":[89.96994018554688,106.500244140625,522.0216577110291,97.3920669555664]},{"page":92,"text":"missions while providing subordinates the flexibility needed to respond to changes in the situation while","rect":[89.96994018554688,118.023193359375,521.9171419219971,108.9150161743164]},{"page":92,"text":"preventing fratricide.","rect":[89.96995544433594,129.486083984375,174.43456554412843,120.3779067993164]},{"page":92,"text":"Table 3-2. Common offensive control measures","rect":[184.41848754882813,145.01707458496095,409.53285121154786,137.6123046875]},{"page":92,"text":"3-12. Line of sight overlays help protect the force by identifying intervisibility lines, where units cannot","rect":[90.0,281.7542724609375,522.0183482131959,272.6460876464844]},{"page":92,"text":"make visual and direct fire contact. An enemy force will have difficulty engaging friendly forces with direct","rect":[90.00003814697266,293.27728271484377,521.9720225296021,284.1690979003906]},{"page":92,"text":"fire weapons without line of sight. Situation templates also help protect the force. If units know how fast an","rect":[90.0,304.8002624511719,522.0178127288818,295.69207763671877]},{"page":92,"text":"enemy force can respond to their actions, they can sequence operations so they occur at times and places","rect":[90.0,316.2631530761719,521.9996478538513,307.15496826171877]},{"page":92,"text":"where an enemy force cannot respond effectively. Units calculate enemy response times by determining","rect":[90.0,327.7861633300781,522.0253200531006,318.677978515625]},{"page":92,"text":"enemy artillery range fans, movement times between enemy reserve assembly area locations and advancing","rect":[90.0,339.3092041015625,521.9735012054443,330.2009582519531]},{"page":92,"text":"friendly forces, and other related intelligence items.","rect":[90.0,350.77203369140627,296.5612745285034,341.6638488769531]},{"page":92,"text":"COMMAND AND CONTROL WARFIGHTING FUNCTION","rect":[72.0,374.14801025390627,332.81575107574465,365.85601806640627]},{"page":92,"text":"3-13. Synchronizing the six warfighting functions through planning and preparation increases a unit’s","rect":[90.0,394.0743103027344,522.0523822288513,384.96612548828127]},{"page":92,"text":"effectiveness when executing operations. However, the fluid nature of combat requires leaders to orchestrate","rect":[89.98999786376953,405.5973205566406,521.9469270782471,396.4891357421875]},{"page":92,"text":"the actions of subordinates during the execution phase. Leaders determine where they can best affect the flow","rect":[89.98998260498047,417.0601806640625,521.9722332992553,407.9519958496094]},{"page":92,"text":"of operations and influence critical events by redirecting the effects of committed forces, changing priorities","rect":[89.98998260498047,428.58319091796877,521.9902484397888,419.4750061035156]},{"page":92,"text":"of support, or employing echelon reserves. This redirection normally means that units are well forward in the","rect":[89.98998260498047,440.106201171875,522.0021638946533,430.9980163574219]},{"page":92,"text":"echelon’s formation, usually with the force designated to conduct the main effort or at a location where a key","rect":[89.98999786376953,451.5690612792969,522.0874538421631,442.46087646484377]},{"page":92,"text":"decision or task must be accomplished to enable the success of the main effort. Examples of key tasks or","rect":[89.98998260498047,463.0920715332031,522.0193383750916,453.98388671875]},{"page":92,"text":"decisions can include the execution of a forward passage of lines or a wet-gap crossing. Once the unit","rect":[89.98998260498047,474.6150817871094,522.0704722366334,465.50689697265627]},{"page":92,"text":"conducting the main effort makes contact with the enemy, friendly forces quickly move to where they best","rect":[89.98998260498047,486.07794189453127,521.9772715530396,476.9697570800781]},{"page":92,"text":"can assess the situation and direct the continuation of offensive operations.","rect":[89.9899673461914,497.5809020996094,389.0129346847534,488.4927673339844]},{"page":92,"text":"3-14. At battalion and above, units anticipate requirements to shift the main effort during an offense to press","rect":[89.9899673461914,515.0657958984375,522.0543963890076,505.9576110839844]},{"page":92,"text":"the battle and keep enemy forces off balance. They develop decision points to support these changes using","rect":[89.99996185302735,526.5888061523438,521.9880275726318,517.4806518554688]},{"page":92,"text":"both human and technical means to validate decision points.","rect":[89.99996185302735,538.091796875,330.8316602706909,529.003662109375]},{"page":92,"text":"3-15. In addition to assigning objectives and identifying decision points, leaders at all echelons consider how","rect":[90.00999450683594,555.57666015625,522.1283612289428,546.4584350585938]},{"page":92,"text":"to exploit advantages that arise during operations and the seizure of intermediate and final objectives. Leaders","rect":[90.00999450683594,567.0996704101563,522.1071917991638,557.9814453125]},{"page":92,"text":"exploit success by aggressively executing the plan, taking advantage of subordinate initiative, and employing","rect":[90.00999450683594,578.6226806640625,522.0651149749756,569.5145263671875]},{"page":92,"text":"trained units capable of rapidly executing standard drills. The echelon reserve also provides a flexible","rect":[90.00999450683594,590.0855712890625,521.9447298126221,580.9774169921875]},{"page":92,"text":"capability to exploit unforeseen advantages.","rect":[90.00999450683594,601.6085205078125,265.7939100265503,592.5003662109375]},{"page":92,"text":"3-16. Units maintain communications and comprehensive throughput of information among all units","rect":[90.00999450683594,619.133544921875,521.9492938499451,610.025390625]},{"page":92,"text":"throughout the offense. They plan how to position and reposition command and control systems to help","rect":[90.01000213623047,630.596435546875,522.0029811859131,621.48828125]},{"page":92,"text":"control operations. Units plan how to expand the communications coverage to accommodate increased","rect":[90.01000213623047,642.119384765625,521.9601345062256,633.01123046875]},{"page":92,"text":"distances and enemy efforts to deny friendly communications systems as the unit advances. Units provide","rect":[90.01000213623047,653.6423950195313,522.0754671173096,644.5342407226563]},{"page":92,"text":"for redundant communication means.","rect":[90.01001739501953,663.0811767578125,239.39724254608155,655.9970703125]},{"page":92,"text":"3-17. A unit maintains its common operating picture throughout an operation. For a common operating","rect":[90.01001739501953,682.6202392578125,522.0075588226318,673.5120239257813]},{"page":92,"text":"picture to aid a unit in maintaining situational awareness, the unit requires timely and frequent updates of","rect":[89.98999786376953,694.143310546875,521.9050805625916,685.03515625]},{"page":92,"text":"relevant information. All echelons report information on the disposition and activities of friendly and enemy","rect":[89.9799575805664,705.6061401367188,521.9626369476318,696.4979858398438]},{"page":92,"text":"forces.","rect":[89.9800033569336,715.1051025390625,116.95981884002686,708.0309448242188]},{"page":92,"text":"3-4","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":92,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":92,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":93,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.0206625976563,37.90802001953125]},{"page":93,"text":"3-18. A well-trained unit with rehearsed standard operating procedures, augmented with digital systems,","rect":[108.0,83.51434326171875,539.9703321456909,74.40616607666016]},{"page":93,"text":"enjoys reduced engagement times and an enhanced planning process. This enhances its ability to control the","rect":[107.98998260498047,94.97723388671875,539.9281282501221,85.85903930664063]},{"page":93,"text":"tempo of the battle and stay ahead of the enemy’s decision cycle. Greatly improved knowledge of enemy and","rect":[107.97989654541016,106.500244140625,539.8929958343506,97.3920669555664]},{"page":93,"text":"friendly situations facilitates the employment of fires and maneuver at extended ranges. Such knowledge also","rect":[107.96987915039063,118.023193359375,539.9972438812256,108.9150161743164]},{"page":93,"text":"enhances friendly forces’ freedom to move to those battlefield locations that best enable their ability to","rect":[107.96987915039063,129.486083984375,540.0300197601318,120.3779067993164]},{"page":93,"text":"influence the battle or engagement at the critical time and place.","rect":[107.96987915039063,141.00909423828126,364.20830821990969,131.90090942382813]},{"page":93,"text":"MOVEMENT AND MANEUVER WARFIGHTING FUNCTION","rect":[90.0,164.38796997070313,365.215744972229,156.27597045898438]},{"page":93,"text":"3-19. Attacking units maneuver to avoid enemy strengths and to seek positions of relative advantage that","rect":[108.0,184.3143310546875,539.9282603225709,175.20614624023438]},{"page":93,"text":"they can exploit to accomplish their mission. They seek to overwhelm enemy forces with one or more","rect":[107.99999237060547,195.7772216796875,540.0514192657471,186.66903686523438]},{"page":93,"text":"unexpected attacks before enemy forces have time to react in an organized fashion. Echelon security forces","rect":[108.0,207.30023193359376,539.9958026390076,198.19204711914063]},{"page":93,"text":"prevent an enemy force from discovering friendly dispositions, capabilities, and intentions, or from","rect":[108.0,218.7630615234375,540.0594153366089,209.65487670898438]},{"page":93,"text":"interfering with the preparations for the attack. Finally, units maneuver to close with and destroy enemy","rect":[108.0,230.28607177734376,540.0024318695068,221.17788696289063]},{"page":93,"text":"forces by close combat and shock effect. Close combat is warfare carried out on land in a direct-fire fight,","rect":[108.0,241.80908203125,540.0173902511597,232.70089721679688]},{"page":93,"text":"supported by direct and indirect fires and other assets (ADP 3-0). Close combat encompasses all actions that","rect":[107.99002075195313,253.27197265625,539.9481577835084,244.16378784179688]},{"page":93,"text":"place friendly forces in immediate contact with enemy forces where units use direct fire and movement in","rect":[107.99002075195313,264.79498291015627,539.9526271820068,255.68679809570313]},{"page":93,"text":"combination to defeat or destroy enemy forces or to seize and retain ground.","rect":[107.99002075195313,276.3179931640625,413.17922496795657,267.2098083496094]},{"page":93,"text":"3-20. The forward movement of subordinate units is critical to the unit maintaining the initiative necessary","rect":[107.99002075195313,293.7828369140625,539.9661769866943,284.6746520996094]},{"page":93,"text":"for successful offensive actions. By maintaining a high tempo, units deny enemy forces a chance to plan,","rect":[107.99002075195313,305.3058166503906,539.9912061691284,296.1976318359375]},{"page":93,"text":"prepare, and execute an effective response to friendly offensive actions. This is a key way to ensure the","rect":[107.99002075195313,316.8288269042969,539.9432039337158,307.72064208984377]},{"page":93,"text":"survivability of the force. Techniques for maintaining a high offensive tempo include using multiple routes,","rect":[107.99002075195313,328.29168701171877,539.9108839035034,319.1835021972656]},{"page":93,"text":"dispersion, highly mobile forces, piecemeal destruction of isolated enemy forces, scheduled rotation and","rect":[107.99002075195313,339.814697265625,540.0143947601318,330.7065124511719]},{"page":93,"text":"relief of forces before they culminate, and the wise use of terrain. The exact techniques employed in a specific","rect":[107.99002075195313,351.33770751953127,540.0941438751221,342.2295227050781]},{"page":93,"text":"situation must address the mission variables.","rect":[107.99002075195313,360.77655029296877,286.2949171066284,353.6924133300781]},{"page":93,"text":"3-21. Units can overwhelm an enemy force by seizing and retaining key and decisive terrain early. Key","rect":[107.99002075195313,380.3255615234375,540.0512971954346,371.2173767089844]},{"page":93,"text":"terrain is an identifiable characteristic whose seizure or retention affords a marked advantage to either","rect":[107.98999786376953,391.8486022949219,540.0438134727478,382.74041748046877]},{"page":93,"text":"combatant (ADP 3-90). When present, decisive terrain is key terrain whose seizure and retention is","rect":[107.97996520996094,403.31146240234377,540.0313861351013,394.2032775878906]},{"page":93,"text":"mandatory for successful mission accomplishment (ADP 3-90). If decisive terrain is present, commanders","rect":[107.96991729736328,414.83447265625,540.0183246116638,405.7262878417969]},{"page":93,"text":"designate it to communicate its importance to their concept of operations. A friendly force must control","rect":[107.95990753173828,426.35748291015627,540.0373911819459,417.2492980957031]},{"page":93,"text":"decisive terrain to accomplish its mission. (See ADP 3-90 and ATP 2-01.3 for more information on key","rect":[107.95990753173828,437.8203125,540.0333156585693,428.7121276855469]},{"page":93,"text":"terrain.)","rect":[107.9498519897461,449.3232727050781,139.9136560020447,440.2351379394531]},{"page":93,"text":"INTELLIGENCE WARFIGHTING FUNCTION","rect":[90.0,472.6679992675781,295.4957437515259,464.5559997558594]},{"page":93,"text":"3-22. Units use available information collection assets to study the terrain and confirm or deny the enemy","rect":[108.0,492.5343017578125,540.0392360687256,483.4261169433594]},{"page":93,"text":"force’s strengths, dispositions, and likely intentions, especially where and in what strength the enemy force","rect":[108.0,504.05731201171877,539.9101839141846,494.9491271972656]},{"page":93,"text":"defends. Indications of the location and composition of obstacles and the positioning of engineer assets may","rect":[108.0,515.580322265625,540.0270900726318,506.4721374511719]},{"page":93,"text":"be key in determining where and when an enemy force defends. These assets also gather information","rect":[108.0,527.043212890625,539.9662380218506,517.93505859375]},{"page":93,"text":"concerning the civilian population within an assigned area to confirm or deny their numbers, locations, and","rect":[108.0,538.566162109375,540.0725002288818,529.4580078125]},{"page":93,"text":"likely intentions, especially with regard to staying in shelters or fleeing from combat operations.","rect":[108.0,550.0891723632813,492.70379161834719,540.9810180664063]},{"page":93,"text":"3-23. By studying the terrain, units try to determine the principal mounted and dismounted avenues of","rect":[108.0,567.5540771484375,539.9559838829041,558.4459228515625]},{"page":93,"text":"approach to their objectives. They also try to determine the most advantageous areas for the enemy’s main","rect":[107.98997497558594,579.0770263671875,540.0113430023193,569.9588012695313]},{"page":93,"text":"defense, routes that enemy forces may use to conduct counterattacks, and other factors, such as observation","rect":[107.98998260498047,590.6000366210938,540.0223903656006,581.4918823242188]},{"page":93,"text":"and fields of fire, avenues of approach, key terrain, obstacles, and cover and concealment (known as","rect":[107.98998260498047,602.0629272460938,539.9892718772888,592.9547729492188]},{"page":93,"text":"OAKOC). Attacking units continuously conduct information collection (reconnaissance, surveillance,","rect":[107.98998260498047,613.5859375,540.0424146652222,604.477783203125]},{"page":93,"text":"intelligence operations, and security operations) during their offensive actions because it is unlikely that they","rect":[107.98998260498047,625.10888671875,539.9796657562256,616.000732421875]},{"page":93,"text":"have complete knowledge of the enemy force’s intentions and actions.","rect":[107.98999786376953,636.57177734375,389.6151075363159,627.463623046875]},{"page":93,"text":"3-24. Commander’s critical information requirements in the offense commonly include three to five focuses","rect":[107.98998260498047,654.0867919921875,540.0464007835388,644.9786376953125]},{"page":93,"text":"such as—","rect":[107.98998260498047,663.585693359375,147.22831344604493,656.5015869140625]},{"page":93,"text":" Locations, composition, equipment, strengths, and weaknesses of the enemy force, to include","rect":[133.1999969482422,679.0742797851563,539.9908723907471,669.9661254882813]},{"page":93,"text":"high-value targets and enemy reconnaissance and surveillance capabilities.","rect":[151.1999969482422,690.5371704101563,450.4464063644409,681.4290161132813]},{"page":93,"text":" Location of unmanned aircraft system ground control stations and launch and recovery sites.","rect":[133.1999969482422,704.0343017578125,521.3209180831909,694.9261474609375]},{"page":93,"text":" Probable locations of enemy reconnaissance objectives.","rect":[133.1999969482422,717.5343017578125,373.90362071990969,708.4160766601563]},{"page":93,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":93,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":93,"text":"3-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":94,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":94,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":94,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":94,"text":"","rect":[115.19999694824219,107.78548431396485,121.16105696249008,103.09324645996094]},{"page":94,"text":"","rect":[115.19999694824219,121.28548431396485,121.16105696249008,116.59324645996094]},{"page":94,"text":"","rect":[115.19999694824219,134.78549194335938,121.16105696249008,130.09324645996095]},{"page":94,"text":"","rect":[115.19999694824219,148.28549194335938,121.16105696249008,143.59324645996095]},{"page":94,"text":"","rect":[115.19999694824219,161.78549194335938,121.16105696249008,157.09324645996095]},{"page":94,"text":"","rect":[115.19999694824219,175.28549194335938,121.16105696249008,170.59324645996095]},{"page":94,"text":"","rect":[115.19999694824219,200.24545288085938,121.16105696249008,195.55320739746095]},{"page":94,"text":"","rect":[115.19999694824219,213.74545288085938,121.16105696249008,209.05320739746095]},{"page":94,"text":"","rect":[115.19999694824219,238.76547241210938,121.16105696249008,234.07322692871095]},{"page":94,"text":"","rect":[115.19999694824219,263.7254333496094,121.16105696249008,259.0331726074219]},{"page":94,"text":"","rect":[115.19999694824219,277.2254333496094,121.16105696249008,272.5331726074219]},{"page":94,"text":"Locations of possible enemy assembly areas.","rect":[133.1999969482422,83.51434326171875,313.1833143234253,74.40616607666016]},{"page":94,"text":"Locations of enemy indirect fire weapons systems and units.","rect":[133.1999969482422,97.01434326171875,375.0397596359253,87.90616607666016]},{"page":94,"text":"Locations of gaps, assailable flanks, and other enemy weaknesses.","rect":[133.1999969482422,110.51434326171875,398.4956007003784,101.40616607666016]},{"page":94,"text":"Locations of areas for friendly and enemy air assault and parachute assault operations.","rect":[133.1999969482422,124.01434326171875,478.47735118865969,114.90616607666016]},{"page":94,"text":"Locations of enemy air defense gun and missile units and air defense radars.","rect":[133.1999969482422,137.51434326171876,438.34124279022219,128.40615844726563]},{"page":94,"text":"Locations of enemy electromagnetic warfare units.","rect":[133.1999969482422,151.01434326171876,336.4687452316284,141.90615844726563]},{"page":94,"text":"Effects of weather and terrain on current and projected operations.","rect":[133.1999969482422,164.51434326171876,398.68191051483157,155.39614868164063]},{"page":94,"text":"Information related to areas, structures, capabilities, organizations, people, and events (known as","rect":[133.1999969482422,178.01434326171876,522.0020892601013,168.90615844726563]},{"page":94,"text":"ASCOPE) about civilians located within the unit’s assigned area.","rect":[133.1999969482422,189.47723388671876,394.00054454803469,180.36904907226563]},{"page":94,"text":"Likely withdrawal routes for enemy forces.","rect":[133.1999969482422,202.97430419921876,306.5248975753784,193.86611938476563]},{"page":94,"text":"Anticipated timetable schedules for the enemy force’s most likely course of action and other","rect":[133.1999969482422,216.47430419921876,522.0230615196228,207.36611938476563]},{"page":94,"text":"probable courses of action.","rect":[133.18994140625,227.97727966308595,240.99512767791749,218.88912963867188]},{"page":94,"text":"Locations of enemy command and control and intelligence nodes, reconnaissance and surveillance","rect":[133.1999969482422,241.49432373046876,522.0761995391846,232.38613891601563]},{"page":94,"text":"systems, and the frequencies used by the information systems linking these systems.","rect":[133.2100372314453,252.95721435546876,470.15456676483157,243.84902954101563]},{"page":94,"text":"Locations of enemy sustainment assets.","rect":[133.1999969482422,266.45428466796877,291.2835645675659,257.3460998535156]},{"page":94,"text":"Location of reserves, reserves movement routes, indications of enemy main effort, and indicators","rect":[133.1999969482422,279.95428466796877,522.0482928733826,270.8460998535156]},{"page":94,"text":"driving friendly force commander’s decisions.","rect":[133.18997192382813,291.477294921875,318.3926954269409,282.3691101074219]},{"page":94,"text":"3-25. If friendly information collection assets cannot answer the commander’s information requirements,","rect":[89.9937515258789,309.00225830078127,522.0140943527222,299.8940734863281]},{"page":94,"text":"units can commit additional internal resources, decide to execute the offense with the current information, or","rect":[89.9937515258789,318.44110107421877,522.0410058555603,311.3569641113281]},{"page":94,"text":"request additional information collection support from information to higher echelon and adjacent units.","rect":[89.9937515258789,331.9881591796875,506.2567090988159,322.8699645996094]},{"page":94,"text":"3-26.","rect":[89.9937744140625,347.46905517578127,110.8554105758667,340.5852966308594]},{"page":94,"text":"The","rect":[115.19407653808594,347.48907470703127,130.8032350616455,340.4049377441406]},{"page":94,"text":"","rect":[115.19999694824219,360.26544189453127,121.16105696249008,355.57318115234377]},{"page":94,"text":"","rect":[115.19999694824219,373.76544189453127,121.16105696249008,369.07318115234377]},{"page":94,"text":"","rect":[115.19999694824219,387.26544189453127,121.16105696249008,382.57318115234377]},{"page":94,"text":"","rect":[115.19999694824219,400.76544189453127,121.16105696249008,396.07318115234377]},{"page":94,"text":"intelligence preparation of the battlefield process assists the units in the offense","rect":[133.3102264404297,349.51312255859377,450.6633577423096,340.4049377441406]},{"page":94,"text":"Identification of key terrain features, and manmade and natural obstacles.","rect":[133.1999969482422,362.9942932128906,427.2369337081909,353.8861083984375]},{"page":94,"text":"Trafficability and cross-country mobility analysis.","rect":[133.1999969482422,376.4942932128906,334.0008192062378,367.3861083984375]},{"page":94,"text":"Line of sight overlays.","rect":[133.1999969482422,389.9942932128906,223.23571300506593,380.8861083984375]},{"page":94,"text":"Situation templates.","rect":[133.1999969482422,403.4742431640625,212.6245527267456,394.3861083984375]},{"page":94,"text":"with—","rect":[453.10858154296877,347.48907470703127,480.8840141296387,340.4049377441406]},{"page":94,"text":"FIRES WARFIGHTING FUNCTION","rect":[72.0,426.88800048828127,232.68049716949464,418.7760009765625]},{"page":94,"text":"3-27. The coordinated use of indirect fires and joint fires enable units to gain and maintain fire superiority","rect":[90.0,446.7543029785156,522.0093288421631,437.6361083984375]},{"page":94,"text":"throughout all offensive actions. Units use various methods and assets to achieve the desired effects on","rect":[89.9999771118164,458.2773132324219,521.9456691741943,449.16912841796877]},{"page":94,"text":"targeted enemy forces and thereby enable friendly maneuver. This includes Army indirect systems and joint","rect":[90.0,469.80029296875,522.0822520217896,460.6820983886719]},{"page":94,"text":"fires.","rect":[90.0,479.2391357421875,110.31956005096436,472.1549987792969]},{"page":94,"text":"Army Fire Support","rect":[72.0,505.8807067871094,162.98357983779909,496.0755920410156]},{"page":94,"text":"3-28. Indirect fire assets provide units with options for gaining and maintaining fire superiority. Fire","rect":[90.0,523.434326171875,522.0093050079346,514.326171875]},{"page":94,"text":"superiority are the dominating fires of one force over another force that permits that force to maneuver","rect":[89.99996185302735,534.897216796875,522.0147371368408,525.9493408203125]},{"page":94,"text":"at a given time and place without prohibitive interference by the other. They use long-range artillery","rect":[90.0,546.420166015625,521.9051418304443,537.31201171875]},{"page":94,"text":"systems (both cannon and rocket) along with rotary- and fixed-wing aircraft to engage enemy forces","rect":[90.0,557.9431762695313,522.0995013694763,548.8350219726563]},{"page":94,"text":"throughout the depth of the enemy’s positions.","rect":[89.98998260498047,569.4060668945313,276.33693981170657,560.2979125976563]},{"page":94,"text":"3-29. Fire support planning is the continuing process of analyzing, allocating, and scheduling fires. It","rect":[90.00000762939453,586.9210205078125,522.0139536819459,577.8128662109375]},{"page":94,"text":"determines how fires are used, what types of targets to attack, what collection assets units use to acquire and","rect":[90.00000762939453,598.4440307617188,522.0209255218506,589.3358764648438]},{"page":94,"text":"track those targets, what assets they use to attack targets, and what assets verify effects on these targets. This","rect":[90.00000762939453,609.9068603515625,522.0057513694763,600.7987060546875]},{"page":94,"text":"planning does not stop at the objective or the limit of advance. Units give attention to flanks and potential","rect":[90.00000762939453,621.429931640625,521.9167857131959,612.3117065429688]},{"page":94,"text":"enemy hide positions. Coordination among echelon fire cells and the proper use of fire support coordination","rect":[90.0,632.8927612304688,521.9714260101318,623.7846069335938]},{"page":94,"text":"measures are critical to prevent fratricide. Units plan to employ available fires to delay or neutralize","rect":[90.0,644.415771484375,522.0043001251221,635.3076171875]},{"page":94,"text":"repositioning enemy forces to include enemy reserves. They also use fires to suppress, neutralize, or destroy","rect":[90.0,655.9387817382813,522.0952053070068,646.8306274414063]},{"page":94,"text":"those enemy forces and systems that can most affect their units’ closure on their objectives. Units establish","rect":[90.0,667.4016723632813,522.0223293304443,658.283447265625]},{"page":94,"text":"triggers for the initiation, shifting, and lifting of fires based on the mission variables.","rect":[89.98999786376953,678.9246826171875,428.2498731613159,669.8165283203125]},{"page":94,"text":"3-30. The fire support coordinator (known as FSCOORD), or chief of fires depending on the echelon,","rect":[89.98998260498047,696.4496459960938,522.0234327316284,687.3414916992188]},{"page":94,"text":"integrates fires into the unit’s scheme of maneuver. Fire support coordinators plan the appropriate fire support","rect":[89.98998260498047,707.9125366210938,521.9704966506959,698.8043823242188]},{"page":94,"text":"for their unit. These fires can be time or event driven. The fire support coordinator plans fires on known and","rect":[89.98999786376953,719.41552734375,521.9624538421631,710.3273315429688]},{"page":94,"text":"3-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":94,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":94,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":95,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.01620703125,37.90802001953125]},{"page":95,"text":"likely enemy positions, which may include templated enemy positions. Successful massing of indirect fires","rect":[108.0,83.51434326171875,540.0012958030701,74.40616607666016]},{"page":95,"text":"and fixed-wing attacks requires a fire cell that can proficiently track friendly indirect fire asset positions and","rect":[108.0,94.97723388671875,540.0383205413818,85.86905670166016]},{"page":95,"text":"movements and that knows the various systems effective fire ranges. It also requires a tactical air control","rect":[108.0,106.500244140625,540.0495982131959,97.3920669555664]},{"page":95,"text":"party proficient in the timely execution of close air support.","rect":[108.0,118.023193359375,346.31569957733157,108.9150161743164]},{"page":95,"text":"3-31. Units must weigh the probable effects of preparation fires against achieving a greater degree of surprise","rect":[108.01001739501953,135.48809814453126,540.0530672149658,126.37992095947266]},{"page":95,"text":"against enemy forces. Friendly fires always run the risk of receiving counter fires. Units balance this risk","rect":[107.99999237060547,147.0111083984375,539.9819240570068,137.90292358398438]},{"page":95,"text":"with the requirements of the mission to determine whether to employ preparation fires. They may decide to","rect":[107.9899673461914,158.5340576171875,539.9461574554443,149.42587280273438]},{"page":95,"text":"employ terminally guided munitions to destroy select high-payoff targets or use these munitions in mass","rect":[107.97997283935547,169.9969482421875,540.0203387718201,160.88876342773438]},{"page":95,"text":"against part of the enemy defense to facilitate a breach and negate the requirement for long-duration","rect":[107.97997283935547,181.51995849609376,539.9455471038818,172.41177368164063]},{"page":95,"text":"preparation fires by using area fire munitions.","rect":[107.9800033569336,193.04296875,290.9642286300659,183.93478393554688]},{"page":95,"text":"3-32. Units may choose to make an initial assault without using preparation fires to achieve tactical surprise.","rect":[107.9799575805664,210.5078125,540.0322828292847,201.39962768554688]},{"page":95,"text":"However, they always plan fires to support their units’ operations so that they are available if needed.","rect":[107.9799575805664,222.03082275390626,540.0043897628784,212.92263793945313]},{"page":95,"text":"Preparation fires are normally high-volume fires delivered over a short period to maximize surprise and shock","rect":[107.96995544433594,233.49371337890626,540.0164089202881,224.38552856445313]},{"page":95,"text":"effect. These preparation fires also include the conduct of electromagnetic warfare and cyber operations.","rect":[107.96995544433594,245.0167236328125,540.0183668136597,235.90853881835938]},{"page":95,"text":"Preparation fires can continue while ground maneuver elements are moving. This consideration applies to","rect":[107.9699935913086,256.5396728515625,539.9011745452881,247.43148803710938]},{"page":95,"text":"the conduct of all offensive operations.","rect":[107.96990203857422,267.9825134277344,264.0685682296753,258.8943786621094]},{"page":95,"text":"3-33. Artillery and mortars must occupy positions that are well forward and still within supporting range of","rect":[107.96994018554688,285.527587890625,539.8881127891541,276.4194030761719]},{"page":95,"text":"the flanks of maneuver forces to provide responsive indirect fires. Units consider the effect that movement","rect":[107.96995544433594,297.0305480957031,539.9510264358521,287.9424133300781]},{"page":95,"text":"by echelon or battery has on the amount of fire support available. They should support the unit’s main effort","rect":[107.96995544433594,308.5134582519531,539.9913096389771,299.4052734375]},{"page":95,"text":"with priority of fires. If the operation contains phases, the main effort generally has priority of fires. Units","rect":[107.9699935913086,320.03643798828127,540.0032489280701,310.9282531738281]},{"page":95,"text":"place coordinated fire lines (CFLs) as close as possible to friendly maneuver forces and plan on-order CFLs","rect":[107.97001647949219,331.5594482421875,539.9701678733826,322.4512634277344]},{"page":95,"text":"on phase lines so that those CFLs can quickly shift as their forces advance. This allows the rapid engagement","rect":[107.96990203857422,343.0223388671875,540.0622324905396,333.9141540527344]},{"page":95,"text":"of targets beyond the CFL by the maximum number of available systems. Units establish critical friendly","rect":[107.96994018554688,354.5453186035156,539.9643459320068,345.4371337890625]},{"page":95,"text":"zones to protect critical actions, such as support-by-fire positions and breaching efforts.","rect":[107.96994018554688,366.0683288574219,458.22808361053469,356.96014404296877]},{"page":95,"text":"3-34. Linking Army forward observers, joint fires observers, and target acquisition assets to quick fire or","rect":[107.96991729736328,383.533203125,539.9810693321228,374.4150085449219]},{"page":95,"text":"exclusive networks also provides responsive fires. Responsive fire networks allow the lead observers to","rect":[107.96991729736328,395.0361328125,539.9764919281006,385.947998046875]},{"page":95,"text":"communicate directly with specific field artillery or mortar fire units. These kinds of communication","rect":[107.96990203857422,406.5791931152344,540.0002346038818,397.47100830078127]},{"page":95,"text":"arrangements enhance responsiveness through streamlined network structures and focused priorities.","rect":[107.96995544433594,418.0420837402344,539.9431715011597,408.93389892578127]},{"page":95,"text":"Communications planning should also include the need for communications networks for the clearing of","rect":[107.96994018554688,429.56512451171877,539.8620507774353,420.4569396972656]},{"page":95,"text":"targets for rotary- and fixed-wing attacks.","rect":[107.96995544433594,441.088134765625,274.58254528045657,431.9799499511719]},{"page":95,"text":"3-35. Units employ information capabilities to support the offense. As friendly forces move through the","rect":[107.96995544433594,458.552978515625,539.9662752227783,449.4447937011719]},{"page":95,"text":"enemy force’sdisruption zone and closeinto the enemy’s main battle zone,electromagnetic warfare jamming","rect":[107.9699935913086,470.07598876953127,540.0514430999756,460.9577941894531]},{"page":95,"text":"resources concentrate on neutralizing enemy fire control, target acquisition, unmanned systems control","rect":[107.9699935913086,481.53887939453127,540.0464243850709,472.4306945800781]},{"page":95,"text":"nodes, and information collection systems. They use military deception to prevent the enemy force from","rect":[107.9699935913086,493.0619201660156,539.9682898483277,483.9537353515625]},{"page":95,"text":"determining the location and objective of the friendly main effort. In addition, intelligence sensors continue","rect":[107.9699935913086,504.5849304199219,539.9823274688721,495.46673583984377]},{"page":95,"text":"to provide combat information and guidance to both friendly jammers and lethal indirect fire weapon systems,","rect":[107.96997833251953,516.0478515625,540.0414991378784,506.9296569824219]},{"page":95,"text":"so attacking units can destroy enemy command and control nodes, reconnaissance and surveillance assets,","rect":[107.96998596191406,527.57080078125,540.0198316574097,518.462646484375]},{"page":95,"text":"artillery, and other high-payoff targets. Units synchronize the timing and conduct of these offensive actions,","rect":[107.96998596191406,539.0938720703125,539.9442701339722,529.9857177734375]},{"page":95,"text":"so they achieve maximum effectiveness.","rect":[107.9599838256836,550.5567626953125,269.87407970428469,541.4486083984375]},{"page":95,"text":"Joint Fires","rect":[90.0,572.853759765625,140.40807590103149,565.2555541992188]},{"page":95,"text":"3-36. Joint fires assist ground forces in shaping operations. Joint fires are fires delivered during the","rect":[108.0,592.6143188476563,540.0564241485596,583.5061645507813]},{"page":95,"text":"employment of forces from two or more components in coordinated action to produce desired effects in","rect":[108.00003814697266,604.0771484375,539.9490261077881,594.968994140625]},{"page":95,"text":"support of a common objective (JP 3-0). The principles in the application of joint fires are generally the same","rect":[108.0,615.6002197265625,539.9630403594971,606.4819946289063]},{"page":95,"text":"between offensive, defensive, and enabling operations. Joint surface-to-surface fires include—","rect":[107.9999771118164,627.1231689453125,486.1567802429199,618.0150146484375]},{"page":95,"text":" Army indirect fire, cyber, and electromagnetic warfare assets tasked with supporting Air Force,","rect":[133.1999969482422,640.6143188476563,539.9580030441284,631.5061645507813]},{"page":95,"text":"Navy, or Marine Corps operations.","rect":[151.1999969482422,652.0771484375,290.68438243865969,642.968994140625]},{"page":95,"text":" Navy missile and naval gun fire, cyber, and electromagnetic warfareassets supporting Army units.","rect":[133.1999969482422,665.5742797851563,539.9980421066284,656.4661254882813]},{"page":95,"text":" Marine Corps indirect fire assets supporting Army units.","rect":[133.1999969482422,679.0742797851563,377.26018810272219,669.9661254882813]},{"page":95,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":95,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":95,"text":"3-7","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":96,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":96,"text":"Joint air-to-surface fires include—","rect":[90.0,81.50032806396485,228.04656600952149,74.40616607666016]},{"page":96,"text":" Army rotary-wing or UAS supporting Air Force, Navy or Marine Corps operations.","rect":[115.19999694824219,97.01434326171875,467.8580274581909,87.90616607666016]},{"page":96,"text":" Navy and Air Force fixed-wing, and electromagnetic warfare assets.","rect":[115.19999694824219,110.51434326171875,406.53457164764407,101.40616607666016]},{"page":96,"text":" Marine Corps fixed- or rotary-wing or UAS supporting Army units.","rect":[115.19999694824219,124.01434326171875,404.2630567550659,114.90616607666016]},{"page":96,"text":"See JP 3-09, ADP 3-19, FM 3-09, and ATP 3-09.32/MCRP 3-31.6/NTTP 3-09.2/AFTTP ","rect":[89.9937744140625,136.4591827392578,481.08843517303469,129.36502075195313]},{"page":96,"text":"information on joint fires. ","rect":[89.97368621826172,149.9962158203125,195.79491710662843,140.87802124023438]},{"page":96,"text":"3-2.6","rect":[484.0443420410156,136.4291229248047,504.8969326019287,129.54539489746095]},{"page":96,"text":"for","rect":[510.39288330078127,136.4491729736328,522.0692040977478,129.3750457763672]},{"page":96,"text":"SUSTAINMENT WARFIGHTING FUNCTION","rect":[72.0,173.39996337890626,274.2557535171509,165.09597778320313]},{"page":96,"text":"3-37. Offensive operations will require more reinforcements, fuel, medical, equipment, and materiel","rect":[90.0,193.29429626464845,522.0834727249146,184.20614624023438]},{"page":96,"text":"compared to defensive and enabling operations. Also, offensive operations increase the likelihood of","rect":[90.00003814697266,204.7772216796875,522.0361840782166,195.66903686523438]},{"page":96,"text":"generating mass casualties and replacing personnel and equipment. Offensive operations require greater","rect":[90.00003814697266,216.30023193359376,521.9581811485291,207.19204711914063]},{"page":96,"text":"precision in sustainment and will be executed at a higher operating tempo than other types of operations. This","rect":[89.98998260498047,227.7630615234375,522.0443866233826,218.65487670898438]},{"page":96,"text":"requires a flexible and adaptable sustainment structure to meet the demands of offensive operations. In the","rect":[89.98999786376953,239.2660369873047,521.9162874298096,230.17788696289063]},{"page":96,"text":"offense, the sustainment focus is on logistics and health service support. Proper echeloning of logistics and","rect":[90.0,250.80908203125,521.9401760101318,241.70089721679688]},{"page":96,"text":"medical assets are key to maintaining tempo and minimizing risk in offensive operations.","rect":[89.97993469238281,262.27197265625,446.84405040740969,253.16378784179688]},{"page":96,"text":"Logistics","rect":[72.0,286.8807067871094,113.53624209976197,277.0755920410156]},{"page":96,"text":"3-38. Logistic units and material remain close to the maneuver force to ensure short turnaround time for","rect":[90.0,304.4342956542969,521.9961450157166,295.32611083984377]},{"page":96,"text":"supplies and services. This includes uploading as much critical materiel, such as ammunition and petroleum,","rect":[90.0,315.9573059082031,521.9902296066284,306.84912109375]},{"page":96,"text":"oils, and lubricants, as possible and coordinating to preclude attempted occupation of a logistics release point","rect":[90.01001739501953,327.420166015625,522.0363535842896,318.3119812011719]},{"page":96,"text":"by more than one unit at a time. This allows units to reduce risk by lowering their physical and electronic","rect":[90.00997924804688,338.94317626953127,522.0653963165283,329.8349914550781]},{"page":96,"text":"signature during resupply operations. Units make decisions regarding the risk of enemy detection of logistics","rect":[90.00997924804688,350.4661865234375,521.9619891624451,341.3580017089844]},{"page":96,"text":"preparations for an attack.","rect":[90.00997924804688,361.90899658203127,194.4494276046753,352.82086181640627]},{"page":96,"text":"3-39. Responsive sustainment of the offense begins during mission analysis and continues throughout the","rect":[90.00997924804688,379.45404052734377,521.9511385040283,370.3458557128906]},{"page":96,"text":"operation based on the expertise of the planners and the preparation and agility of the sustainment units during","rect":[90.00994110107422,390.91693115234377,522.0388698577881,381.8087463378906]},{"page":96,"text":"execution as the potential for supplies to not be available increases as the operation progresses. Logisticians","rect":[90.00994110107422,402.4399108886719,522.0623309593201,393.33172607421877]},{"page":96,"text":"must assist with the development of feasible courses of action during planning and anticipate changes of","rect":[89.99992370605469,413.962890625,522.0753686485291,404.8547058105469]},{"page":96,"text":"requirements during execution. They must consider alternative routes and different means to accomplish the","rect":[89.99992370605469,425.42578125,522.0109529571533,416.3175964355469]},{"page":96,"text":"timely delivery of the required support and they must provide their leaders with options to overcome whatever","rect":[89.99992370605469,436.94879150390627,522.0554101524353,427.8406066894531]},{"page":96,"text":"obstacles appear. The laws of physics constrain the art of the possible, but ingenuity and innovation can","rect":[89.9999008178711,448.4718017578125,521.9959011077881,439.3636169433594]},{"page":96,"text":"deliver solutions to problems that appear insurmountable.","rect":[89.9999008178711,459.91461181640627,320.26360607147219,450.82647705078127]},{"page":96,"text":"3-40. The variety and complexity of offensive actions requires that units establish flexible and tailorable","rect":[89.9999008178711,477.44964599609377,522.0572176055908,468.3414611816406]},{"page":96,"text":"transportation systems. There may be a wide dispersion of forces and lengthening of lines of communication.","rect":[89.9999008178711,488.9726257324219,521.9821729660034,479.86444091796877]},{"page":96,"text":"Required capabilities include movement control, terminal operations, and mode operations.","rect":[89.99992370605469,500.4154357910156,455.5045118331909,491.3273010253906]},{"page":96,"text":"3-41. Units need to closely monitor emerging resupply and rearm requirements in conjunction with ongoing","rect":[89.99992370605469,517.96044921875,521.9621486663818,508.8422546386719]},{"page":96,"text":"operations. The prioritization of the requirements must be thought out and appropriate for the units with","rect":[89.99992370605469,529.4834594726563,521.9368190765381,520.3753051757813]},{"page":96,"text":"follow-on missions, rather than units that are most depleted in conjunction with the potential shift in mission","rect":[90.0,540.9464111328125,522.0303249359131,531.8281860351563]},{"page":96,"text":"priorities as the operation progresses.","rect":[90.0000228881836,552.4693603515625,239.14773082733155,543.3612060546875]},{"page":96,"text":"Health Service Support","rect":[72.0,577.0187377929688,181.9449598426819,567.2355346679688]},{"page":96,"text":"3-42. The burden on medical resources increases due to the intensity of offensive actions and the increased","rect":[90.0,594.5343017578125,521.9566555023193,585.4261474609375]},{"page":96,"text":"distances over which support is required as a force advances. The unit re-allocates medical resources as the","rect":[90.0,606.0372314453125,522.0343294219971,596.9490966796875]},{"page":96,"text":"tactical situation changes. Medical units can anticipate large numbers of casualties in a short period due to","rect":[89.98998260498047,617.580322265625,521.9711818695068,608.47216796875]},{"page":96,"text":"destructive capabilities of modern conventional weapons and the employment of weapons of mass","rect":[89.98998260498047,629.0431518554688,522.0524432640076,619.9349975585938]},{"page":96,"text":"destruction. These mass casualty situations can exceed the capabilities of organic and direct support medical","rect":[89.98998260498047,640.566162109375,521.9536509475709,631.4580078125]},{"page":96,"text":"assets to treat the numbers of casualties sustained. To prevent this from occurring, planners anticipate this","rect":[89.98998260498047,652.0891723632813,522.0092914085388,642.9810180664063]},{"page":96,"text":"possibility and coordinate with area support medical units to help absorb a rise in battlefield injuries. Careful","rect":[89.98998260498047,663.5520629882813,522.0953745803834,654.433837890625]},{"page":96,"text":"planning and coordination avoid compromising the standard of medical care for injured Soldiers. Effective","rect":[89.98998260498047,675.0750732421875,522.0194978790283,665.9568481445313]},{"page":96,"text":"management of mass casualty situations depends on established and rehearsed mass casualty plans and","rect":[89.98997497558594,686.5980224609375,522.0073757171631,677.4898681640625]},{"page":96,"text":"3-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":96,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":96,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":97,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.01620703125,37.90802001953125]},{"page":97,"text":"detailed medical planning. Units consider several other variables that ensure the success of mass casualty","rect":[108.0,83.51434326171875,539.9842433929443,74.40616607666016]},{"page":97,"text":"response plans. These include, but are not limited to—","rect":[107.98998260498047,94.95719909667969,326.2656669616699,85.86905670166016]},{"page":97,"text":" The coordination and synchronization of additional medical support or augmentation, such as","rect":[133.1999969482422,108.47430419921875,539.9808490257263,99.36612701416016]},{"page":97,"text":"medical evacuation support, forward resuscitative surgical intervention provided by forward","rect":[151.1999969482422,119.997314453125,540.0290431976318,110.8891372680664]},{"page":97,"text":"resuscitative and surgical detachments, combat support and field hospitals, casualty collection","rect":[151.1999969482422,131.52032470703126,540.0150051116943,122.41214752197266]},{"page":97,"text":"points, ambulance exchange points, and established Class VIII resupply.","rect":[151.1999969482422,142.983154296875,440.86529064178469,133.87496948242188]},{"page":97,"text":" Quick location and evacuation of injured personnel from the battlefield.","rect":[133.1999969482422,156.47430419921876,438.3422803878784,147.35610961914063]},{"page":97,"text":" Providing effective tactical combat casualty care and emergency medical treatment for injured","rect":[133.1999969482422,169.97430419921876,539.9773464202881,160.85610961914063]},{"page":97,"text":"personnel.","rect":[151.1999969482422,181.47727966308595,192.64472484588624,172.38912963867188]},{"page":97,"text":" Continuous flow of casualties to medical treatment facilities at the next higher role of care.","rect":[133.1999969482422,194.99432373046876,514.6685743331909,185.88613891601563]},{"page":97,"text":" Use of casualty evacuation assets when the number of casualties overwhelms the capacity of the","rect":[133.1999969482422,208.49432373046876,539.8957185821533,199.38613891601563]},{"page":97,"text":"medical evacuation system.","rect":[151.1999969482422,219.95721435546876,261.51919078826907,210.84902954101563]},{"page":97,"text":" Accurate triage and rapid medical evacuation of injured personnel to medical treatment facilities","rect":[133.1999969482422,233.45428466796876,539.9179217796326,224.33609008789063]},{"page":97,"text":"at the next higher role of care.","rect":[151.18995666503907,244.977294921875,271.4179639816284,235.86911010742188]},{"page":97,"text":" Planning of MEDEVAC routes (ground and air) along with contingencies during times of","rect":[133.1999969482422,258.47430419921877,540.0080468711853,249.36611938476563]},{"page":97,"text":"hazardous trafficability.","rect":[151.19998168945313,269.997314453125,246.70464611053468,260.8891296386719]},{"page":97,"text":" MEDAVAC capacity is rarely sufficient, and units must designate casualty evacuation capability","rect":[133.1999969482422,283.4942932128906,540.0171413421631,274.3861083984375]},{"page":97,"text":"within their formations.","rect":[151.1899871826172,292.9331359863281,245.9150800704956,285.8489990234375]},{"page":97,"text":"PROTECTION WARFIGHTING FUNCTION","rect":[90.0,318.3480224609375,286.6198892593384,310.23602294921877]},{"page":97,"text":"3-43. Protection prevents or mitigates detection, threat effects, and hazards to preserve combat power and","rect":[108.0,338.2743225097656,539.9257106781006,329.1661376953125]},{"page":97,"text":"enable freedom of action. To help preserve the force, units ensure they address all protection tasks during the","rect":[108.0,349.7973327636719,540.0084505157471,340.68914794921877]},{"page":97,"text":"unit’s planning, preparation, and execution, while also constantly assessing the effectiveness of those","rect":[107.9999771118164,361.26019287109377,540.0650911407471,352.1520080566406]},{"page":97,"text":"protection tasks. In the offense, protection is applied carefully and selectively to ensure that it does not hinder","rect":[107.9999771118164,372.783203125,539.9171655235291,363.6750183105469]},{"page":97,"text":"a unit’s freedom of action. This is accomplished through protection integration and synchronization where","rect":[108.0,384.30621337890627,540.0110139923096,375.1980285644531]},{"page":97,"text":"and when significant threats and hazards are projected in the offensive plan. The fluidity and rapid tempo of","rect":[108.0,395.7690734863281,540.0345361289978,386.65087890625]},{"page":97,"text":"the offense poses challenges when protecting friendly assets to deny enemy forces the ability to interfere with","rect":[108.0,407.2920837402344,539.9902248382568,398.18389892578127]},{"page":97,"text":"friendly force operations.","rect":[108.0,418.8150939941406,209.3823652267456,409.7069091796875]},{"page":97,"text":"3-44. Protection is a key consideration at every echelon and all military activities have some inherent or","rect":[107.99999237060547,436.2799377441406,540.0001123008728,427.1717529296875]},{"page":97,"text":"organic protection capability (such as survivability, antiterrorism measures, local security). Higher echelons","rect":[107.99999237060547,447.8029479980469,540.0631854515076,438.69476318359377]},{"page":97,"text":"employ protection systems to enable lower echelon maneuver and deny enemy forces the ability to interfere","rect":[108.0,459.325927734375,540.0073518829346,450.2177429199219]},{"page":97,"text":"with subordinate forces’ ongoing operations. Lower echelons use reconnaissance and security forces to","rect":[108.0,470.788818359375,540.0103054046631,461.6806335449219]},{"page":97,"text":"protect forward maneuver forces and exposed flanks. At the lowest tactical levels, units use deception, cover,","rect":[108.0000228881836,482.2917785644531,540.0010938644409,473.2036437988281]},{"page":97,"text":"concealment, and dispersion to counter threat capabilities and preserve critical capabilities, assets, and","rect":[108.0000228881836,493.7546691894531,539.9684963226318,484.66650390625]},{"page":97,"text":"activities. (See ADP 3-37 for information on protection tasks).","rect":[108.0,505.2776794433594,358.05913829803469,496.1895446777344]},{"page":97,"text":"Air and Missile Defense","rect":[90.0,527.6627807617188,201.4952827606201,520.0755615234375]},{"page":97,"text":"3-45. A ground force’s primary air defense systems are its organic weapons to defend against short-range air","rect":[108.0,547.434326171875,540.0313623008728,538.326171875]},{"page":97,"text":"threats, supported by joint fighter aircraft conducting offensive and defensive counterair operations. The joint","rect":[107.98998260498047,558.8971557617188,540.0293955764771,549.7789306640625]},{"page":97,"text":"force may not have air superiority or even air parity. Units weigh the air threat with their ability to mitigate","rect":[107.98998260498047,570.420166015625,539.9960603790283,561.31201171875]},{"page":97,"text":"the threat when considering options for offensive operations. During offensive actions, units direct the","rect":[107.98998260498047,581.9431762695313,540.0420808868408,572.8350219726563]},{"page":97,"text":"positioning of available organic or supporting radars in those locations where they can best initially support","rect":[107.98998260498047,593.4060668945313,540.0103526077271,584.2979125976563]},{"page":97,"text":"the unit’s attack. The selection of those positions reflects a risk assessment designed to preclude their early","rect":[107.98998260498047,604.9290771484375,539.9122829437256,595.8209228515625]},{"page":97,"text":"loss to enemy action. The air defense airspace management (known as ADAM) cell in the echelon staff","rect":[107.98998260498047,616.3919677734375,540.0063378868103,607.2838134765625]},{"page":97,"text":"communicates with the appropriate air and missile defense (AMD) command post. That AMD command post","rect":[107.97994995117188,627.8948974609375,540.1034922561646,618.8067626953125]},{"page":97,"text":"provides additional information to the supported unit to expand the fidelity of the air picture, including","rect":[107.97994995117188,639.4379272460938,539.9245510101318,630.3297729492188]},{"page":97,"text":"information on engaged air threats by the joint force air component unit, Army Patriot air defense systems,","rect":[107.9800033569336,650.9008178710938,540.0223340988159,641.7825927734375]},{"page":97,"text":"and short-range air defense. The attacking unit concentrates on conducting passive protection measures","rect":[107.97997283935547,662.423828125,539.9525287132263,653.315673828125]},{"page":97,"text":"during its offensive actions. If attacked by enemy aerial systems in assembly areas, attack positions, or while","rect":[107.97997283935547,673.9468383789063,539.9972810821533,664.8386840820313]},{"page":97,"text":"moving, the unit disperses and conducts small-arms air defense. Units at each echelon establish air defense","rect":[107.99002075195313,685.40966796875,540.0173616485596,676.301513671875]},{"page":97,"text":"priorities based on the concept of operations, scheme of maneuver, air situation, and air defense priorities","rect":[107.99002075195313,696.9126586914063,539.8908221702576,687.8245239257813]},{"page":97,"text":"established by higher headquarters. If units have Army air defense systems supporting their attack, they","rect":[107.99002075195313,708.4556884765625,539.9506130218506,699.3475341796875]},{"page":97,"text":"generally weight that coverage toward their main efforts and establish protective corridors over terrain","rect":[107.98999786376953,719.9185791015625,539.9876003265381,710.8104248046875]},{"page":97,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":97,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":97,"text":"3-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":98,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":98,"text":"traversed by subordinate units conducting that operation. Command of all air defense assets requires complete","rect":[90.0,83.51434326171875,521.9511995391846,74.40616607666016]},{"page":98,"text":"and timely communications to ensure proper weapon status for the protection of friendly air support assets.","rect":[90.0,94.97723388671875,518.2639722824097,85.86905670166016]},{"page":98,"text":"3-46. Protection measures are an essential part of air and missile defense planning at all levels. All units","rect":[90.0,112.4921875,522.0122821311951,103.3840103149414]},{"page":98,"text":"conduct passive actions in conjunction with their missions. Passive actions reduce the effectiveness of the","rect":[89.98997497558594,124.01519775390625,522.0232210235596,114.89700317382813]},{"page":98,"text":"enemy air threat.","rect":[89.98998260498047,135.47808837890626,157.41157054901124,126.36991119384766]},{"page":98,"text":"3-47. Tactical air defense support focuses on—","rect":[89.98998260498047,152.97300720214845,281.0312919616699,143.88485717773438]},{"page":98,"text":" Enemy UAS.","rect":[115.19999694824219,166.49432373046876,186.58655834197999,157.55648803710938]},{"page":98,"text":" Enemy rotary-wing aircraft.","rect":[115.19999694824219,179.99432373046876,245.1304121017456,170.88613891601563]},{"page":98,"text":" Enemy fixed-wing aircraft.","rect":[115.19999694824219,193.49432373046876,241.83384227752686,184.38613891601563]},{"page":98,"text":"Survivability","rect":[72.0,218.12071228027345,133.17176246643067,208.31556701660157]},{"page":98,"text":"3-48. All units have an inherent responsibility to improve their positions and take proactive measures to","rect":[90.0,235.61431884765626,521.9442043304443,226.50613403320313]},{"page":98,"text":"protect their forces, whether they are in an assembly area or maneuvering. Survivability operations consist","rect":[89.99000549316406,247.1373291015625,521.9392466506959,238.02914428710938]},{"page":98,"text":"of three areas designed to focus efforts on mitigating friendly losses to hostile actions or environments:","rect":[89.98001098632813,258.66033935546877,521.9352793655396,249.55215454101563]},{"page":98,"text":"providing or improving cover, concealment, and camouflage. Units normally consider the impact of","rect":[89.98001098632813,270.1231689453125,522.0192163047791,261.0149841308594]},{"page":98,"text":"constructing protective emplacements for artillery and sustainment concentrations as part of the planning","rect":[89.98001098632813,281.64617919921877,521.9086818695068,272.5379943847656]},{"page":98,"text":"process. Units do not employ protective positions in the offense as extensively as they do in the defense.","rect":[89.98001098632813,293.169189453125,521.9800977706909,284.0610046386719]},{"page":98,"text":"Such terrain modifications may require significant amounts of time, making them impractical for protecting","rect":[89.98001098632813,304.632080078125,522.0092678070068,295.5238952636719]},{"page":98,"text":"assets that must frequently move to keep pace with operations. However, units may require the hardening of","rect":[89.98001098632813,316.15509033203127,522.0201318321228,307.0469055175781]},{"page":98,"text":"key command and control facilities, especially those with detectable electronic signatures. Maneuver units","rect":[89.98001098632813,327.6780700683594,521.9827411155701,318.56988525390627]},{"page":98,"text":"construct hasty fighting positions as soon as possible when they halt or pause during the conduct of offensive","rect":[89.98001098632813,339.1409606933594,522.1045198516846,330.03277587890627]},{"page":98,"text":"operations. Forces conducting offensive actions continue to use camouflage, cover, concealment,","rect":[89.98001098632813,350.6639404296875,522.0432691574097,341.5557556152344]},{"page":98,"text":"survivability moves, maximum existing terrain, obscuration, and deception.","rect":[89.98001098632813,362.1268310546875,392.4238233566284,353.0186462402344]},{"page":98,"text":"Explosive Ordnance Disposal","rect":[72.0,386.69873046875,209.49268645477296,376.9155578613281]},{"page":98,"text":"3-49. Explosive ordnance disposal units assess and render safe hazards to protect the force. These elements","rect":[90.0,404.2542724609375,522.0464007835388,395.1661376953125]},{"page":98,"text":"can dispose of all explosive hazards to include foreign or U.S. ammunition, unexploded ordnance, mines,","rect":[89.98998260498047,415.7973327636719,522.0675001144409,406.68914794921877]},{"page":98,"text":"and CBRN munitions. Engineers identify, breach, and clear minefields. Explosive ordinance disposal forces","rect":[89.97996520996094,427.26019287109377,521.9502704124451,418.1520080566406]},{"page":98,"text":"render safe explosive hazards that restrict unit freedom of movement or deny access to or threaten critical","rect":[90.01001739501953,438.783203125,521.9526133499146,429.6750183105469]},{"page":98,"text":"assets or operations. (See ATP 4-32 for more information on explosive ordinance disposal operations.)","rect":[90.01001739501953,450.2861633300781,500.7399804649353,441.1980285644531]},{"page":98,"text":"Coordinate Air and Missile Defense","rect":[72.0,472.6537170410156,239.4153267059326,465.0555725097656]},{"page":98,"text":"3-50. Air and missile defense assets during an offensive operation can provide vital protection from air","rect":[90.0,492.4142761230469,522.0073144493103,483.30609130859377]},{"page":98,"text":"threats and contribute to the freedom of maneuver by friendly forces. Units coordinate and synchronize air","rect":[89.97994995117188,503.9372863769531,521.9039208946228,494.8291015625]},{"page":98,"text":"and missile defense assets for coverage over maneuver forces and their critical assets, to include denying","rect":[89.97994995117188,515.4002075195313,521.9088039398193,506.2919616699219]},{"page":98,"text":"surveillance by threat aerial platforms. Air and missile defense assets also protect forward-based","rect":[89.9800033569336,526.9231567382813,521.8840236663818,517.8150024414063]},{"page":98,"text":"infrastructure—such as lines of communications and command nodes—from aerial attack, determine and","rect":[89.97997283935547,536.422119140625,522.0013332366943,529.3380126953125]},{"page":98,"text":"predict reporting ballistic missile launch points and impact points, and provide early warning and","rect":[89.98001098632813,549.9090576171875,522.0230617523193,540.8009033203125]},{"page":98,"text":"surveillance.","rect":[89.98001098632813,559.407958984375,140.84154796600343,552.3238525390625]},{"page":98,"text":"3-51. Unit protection cell planners coordinate with the unit air and defense airspace management cell for","rect":[89.98001098632813,578.947021484375,521.9892480430603,569.8388671875]},{"page":98,"text":"AMD to protect the unit’s prioritized protection list, ensuring the protection of critical assets and forces from","rect":[89.98001098632813,590.409912109375,521.9753088912964,581.3017578125]},{"page":98,"text":"enemy air attack, missile attack, and surveillance.","rect":[89.98004913330078,601.932861328125,288.56145763397219,592.82470703125]},{"page":98,"text":"3-52. AMD assets integrate protective systems by using the six employment guidelines—mutual support,","rect":[89.98004913330078,619.4578857421875,521.9644117355347,610.3497314453125]},{"page":98,"text":"overlapping fires, balanced fires, weighted coverage, early engagement, and defense in depth—and additional","rect":[89.99006652832031,630.9207153320313,522.0955576858521,621.8125610351563]},{"page":98,"text":"considerations necessary to mass and mix AMD capabilities. These employment guidelines enable air","rect":[89.99006652832031,642.4437255859375,522.0151269493103,633.3355712890625]},{"page":98,"text":"defense artillery forces to successfully accomplish combat missions and support overall force objectives.","rect":[89.99006652832031,653.9066162109375,509.01055431365969,644.7883911132813]},{"page":98,"text":"Risk Management","rect":[72.0,678.500732421875,157.73843213272097,668.695556640625]},{"page":98,"text":"3-53. The likelihood of fratricide increases during offensive operations compared to defensive operations.","rect":[90.0,696.0543212890625,521.8948926925659,686.9461669921875]},{"page":98,"text":"During offensive operations, friendly forces maneuver towards enemy forces, while another friendly force","rect":[90.0,707.5772705078125,521.9149446563721,698.4691162109375]},{"page":98,"text":"3-10","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":98,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":98,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":99,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.01620703125,37.90802001953125]},{"page":99,"text":"gains fire superiority. The convergence of friendly forces at the decisive point is the riskiest part of any","rect":[108.0,83.51434326171875,540.0262966156006,74.40616607666016]},{"page":99,"text":"offensive operation.","rect":[108.0,94.95719909667969,188.02370738983155,85.86905670166016]},{"page":99,"text":"3-54. During offensive operations, various briefs and rehearsals are the primary tools for reducing risk","rect":[108.0,112.4921875,540.0042018890381,103.3840103149414]},{"page":99,"text":"identified during planning and preparation. The types of risks identified assist in determining the type of","rect":[107.98998260498047,124.01519775390625,540.0062768516541,114.90702056884766]},{"page":99,"text":"rehearsal conducted. Rehearsals should extend to all levels of command and involve all key players.","rect":[107.96995544433594,135.47808837890626,508.39116954803469,126.36991119384766]},{"page":99,"text":"3-55.","rect":[107.96995544433594,150.95896911621095,128.83159160614015,144.0752410888672]},{"page":99,"text":"Risk management considerations during offensive operations include—","rect":[133.1602325439453,153.0030517578125,419.7823600769043,143.89486694335938]},{"page":99,"text":" Confirmation briefs to ensure leaders understand their assigned mission and key tasks.","rect":[133.1999969482422,166.49432373046876,496.72768688201907,157.38613891601563]},{"page":99,"text":" Backbriefs to ensure subordinates’ course of actions meets their higher echelons commander’s","rect":[133.1999969482422,179.99432373046876,540.0210711936951,170.88613891601563]},{"page":99,"text":"intent.","rect":[151.1899871826172,189.49330139160157,176.49450206756593,182.40914916992188]},{"page":99,"text":" Rehearsals to ensure shared understanding between units and refine applicable control measures","rect":[133.1999969482422,205.01434326171876,540.0021502952576,195.90615844726563]},{"page":99,"text":"to synchronize operations.","rect":[151.1999969482422,216.47723388671876,256.48415660858157,207.36904907226563]},{"page":99,"text":"3-56.","rect":[107.9937515258789,231.94810485839845,128.8553876876831,225.0643768310547]},{"page":99,"text":"The following factors may reveal risks during rehearsals:","rect":[133.19406127929688,233.9921875,361.7563853225708,224.88400268554688]},{"page":99,"text":" Types of rehearsals such as combined arms or fires rehearsals.","rect":[133.1999969482422,247.49432373046876,400.54278087615969,238.38613891601563]},{"page":99,"text":" Training and proficiency levels of units and individuals.","rect":[133.1999969482422,260.99432373046877,375.5839796066284,251.88613891601563]},{"page":99,"text":" The habitual relationships between units conducting the offensive operation.","rect":[133.1999969482422,274.49432373046877,456.94436168670657,265.3861389160156]},{"page":99,"text":" The physical readiness of the troops conducting the offensive operation.","rect":[133.1999969482422,287.9942932128906,439.4244337081909,278.8861083984375]},{"page":99,"text":"Area Security","rect":[90.0,312.62066650390627,155.08396339416505,302.8155517578125]},{"page":99,"text":"3-57. Area security operations typically support offensive operations by ensuring the continual conduct of","rect":[108.0,330.1142883300781,539.9661767539978,321.006103515625]},{"page":99,"text":"sustainment operations that generate and maintain combat power to maintain tempo and extend operational","rect":[108.0000228881836,341.6372985839844,539.9840464553834,332.52911376953127]},{"page":99,"text":"reach. Additionally, area security operations allow units to provide protection to critical assets without a","rect":[108.0000228881836,353.1602783203125,539.9702425079346,344.0520935058594]},{"page":99,"text":"significant diversion of combat power. During the offense, various military organizations may be involved","rect":[108.0000228881836,364.6231689453125,539.9350490570068,355.5149841308594]},{"page":99,"text":"in conducting area security operations in an economy-of-force role to protect lines of communications,","rect":[108.0,376.14617919921877,539.9661817550659,367.0379943847656]},{"page":99,"text":"convoys, or critical fixed sites and radars. Bases and base camps employ local security measures (including","rect":[107.98998260498047,387.60906982421877,539.9536647796631,378.5008850097656]},{"page":99,"text":"explosive ordnance disposal, assessments and recommendations, random antiterrorism measures, and","rect":[107.98998260498047,399.11199951171877,539.9017848968506,390.02386474609377]},{"page":99,"text":"increased force protection conditions) but may be vulnerable to enemy or adversary remnant forces requiring","rect":[107.98998260498047,410.6550598144531,540.0421657562256,401.546875]},{"page":99,"text":"a response that is beyond base camp capabilities. In support areas, units conduct area damage control to","rect":[107.98998260498047,422.117919921875,539.8985500335693,413.0097351074219]},{"page":99,"text":"prevent and respond to the negative effects of enemy or adversary action that can diminish combat power.","rect":[107.98998260498047,433.64093017578127,531.9941358566284,424.5327453613281]},{"page":99,"text":"TRANSITIONS","rect":[90.0,458.9096984863281,186.3962928314209,449.2355651855469]},{"page":99,"text":"3-58. Units transition from offensive operations only when they result in complete victory and the end of","rect":[108.0,479.21429443359377,540.0084130821228,470.1061096191406]},{"page":99,"text":"hostilities, reach a culminating point, or receive a change in mission from a higher unit. Generally, units in","rect":[108.0,490.7373046875,540.0873928070068,481.6291198730469]},{"page":99,"text":"the offense transition to the defense or stability. All offensive actions that do not achieve complete victory","rect":[107.99996185302735,502.2001647949219,539.9280300140381,493.09197998046877]},{"page":99,"text":"reach a culminating point for a variety of reasons, such as when—","rect":[107.99996185302735,513.7232055664063,372.9579887390137,504.614990234375]},{"page":99,"text":" Initiative shifts from the attacking force to the enemy.","rect":[133.1999969482422,527.2142944335938,367.00469493865969,518.1061401367188]},{"page":99,"text":" Friendly forces encounter heavily defended areas that they cannot bypass.","rect":[133.1999969482422,540.7142944335938,446.68096446990969,531.6061401367188]},{"page":99,"text":" Fuel, ammunition, and other supplies fail to keep up with expenditures.","rect":[133.1999969482422,554.1942749023438,436.42742443084719,545.1061401367188]},{"page":99,"text":" Soldiers become physically exhausted.","rect":[133.1999969482422,567.7142944335938,306.2234754562378,558.6061401367188]},{"page":99,"text":" Casualties and equipment losses become too much for an organization to handle.","rect":[133.1999969482422,581.2142944335938,474.52654552459719,572.1061401367188]},{"page":99,"text":" Repairs and replacements do not keep pace with damage and losses.","rect":[133.1999969482422,594.7142944335938,423.70305919647219,585.6061401367188]},{"page":99,"text":" Reserves or follow-on forces are not available to continue the advance.","rect":[133.1999969482422,606.1902465820313,435.3311719894409,599.1061401367188]},{"page":99,"text":" Enemy reinforcements attack, or the defender counterattacks with fresh troops.","rect":[133.1999969482422,621.7142944335938,466.9514112472534,612.6061401367188]},{"page":99,"text":"Several of these causes may combine to halt an offense. In some cases, the unit can regain its momentum,","rect":[107.9937515258789,636.1731567382813,539.9727735519409,627.0650024414063]},{"page":99,"text":"but this only happens after difficult fighting or an operational pause.","rect":[107.9937515258789,647.6961669921875,380.97771739959719,638.5880126953125]},{"page":99,"text":"3-59. Transitions do not just occur between offense, defense, and stability operations. During offensive","rect":[107.9937515258789,665.22119140625,540.0470247344971,656.1029663085938]},{"page":99,"text":"operations it may be necessary, or planned, for units to execute a short halt to operations without necessarily","rect":[107.9937515258789,676.6840209960938,539.8998317718506,667.5758666992188]},{"page":99,"text":"executing a transition. An example would be a unit executing a short halt in an assault position prior to","rect":[107.9937515258789,688.20703125,539.9990749359131,679.098876953125]},{"page":99,"text":"maneuvering during an attack. The halt, or tactical pause, should be as brief as possible to ensure the unit","rect":[107.98371887207031,699.7300415039063,539.9585947952271,690.6218872070313]},{"page":99,"text":"does not lose momentum.","rect":[107.98371887207031,709.1688842773438,210.80895519256593,702.0847778320313]},{"page":99,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":99,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":99,"text":"3-11","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":100,"text":"Chapter 3","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":100,"text":"3-60. Units anticipate the reasons listed in paragraph 3-58, plan a pause to replenish combat power, and","rect":[90.0,83.51434326171875,521.9722805023193,74.40616607666016]},{"page":100,"text":"phase their operations accordingly before subordinate forces reach their culminating points. Simultaneously,","rect":[90.00003814697266,94.97723388671875,521.9953565597534,85.86905670166016]},{"page":100,"text":"units attempt to prevent enemy forces from knowing when friendly forces become overextended.","rect":[90.00003814697266,106.500244140625,478.0615186691284,97.3920669555664]},{"page":100,"text":"TRANSITION TO DEFENSIVE OPERATIONS","rect":[72.0,129.88796997070313,275.5783748626709,121.5959701538086]},{"page":100,"text":"3-61. Once offensive actions begin, the attacking unit tries to sense when subordinates reach, or are about to","rect":[90.0,149.8143310546875,522.0173854827881,140.70614624023438]},{"page":100,"text":"reach, their culminating points. Before they reach them, units transition to a focus on defensive operations.","rect":[89.98999786376953,161.2772216796875,521.9722852706909,152.16903686523438]},{"page":100,"text":"They have more freedom to choose where and when to halt an attack if they sense that subordinate forces are","rect":[89.98998260498047,172.80023193359376,522.0160799102783,163.69204711914063]},{"page":100,"text":"approaching culmination. Units plan future activities to aid the defense, minimize vulnerability to attack, and","rect":[89.98998260498047,184.3232421875,521.9730129241943,175.21505737304688]},{"page":100,"text":"facilitate renewal of the offense as the force transitions to branches or sequels of ongoing operations. For","rect":[89.98998260498047,195.78607177734376,521.9106347618103,186.67788696289063]},{"page":100,"text":"example, to prevent overburdening the extended LOCs that units should manage when and how they begin","rect":[89.98998260498047,207.30908203125,522.0084133148193,198.20089721679688]},{"page":100,"text":"to transition to prevent a LOC bottleneck.","rect":[89.98998260498047,218.75193786621095,256.89919567108157,209.66378784179688]},{"page":100,"text":"3-62. Units anticipate the ending of unit offensive actions by preparing branches and sequels and transmitting","rect":[89.98998260498047,236.29693603515626,521.9950466156006,227.18875122070313]},{"page":100,"text":"them to subordinates via orders. These orders include the time or circumstances under which the current","rect":[89.98998260498047,245.79591369628907,522.0503306350709,238.71176147460938]},{"page":100,"text":"offense transitions to a defensive operation, the missions and locations of subordinate units, and control","rect":[89.98998260498047,259.2627868652344,521.9910044631959,250.17465209960938]},{"page":100,"text":"measures. As units transition from an offensive focus to a defensive focus, they—","rect":[89.98998260498047,270.80584716796877,417.7742729187012,261.6976623535156]},{"page":100,"text":" Maintain contact and surveillance of enemy forces by combining reconnaissance units and","rect":[115.19999694824219,284.2743225097656,521.9684963226318,275.1661376953125]},{"page":100,"text":"surveillance assets to develop the information required to plan future actions.","rect":[133.1999969482422,295.77728271484377,441.7600049972534,286.68914794921877]},{"page":100,"text":" Establish a security area and local security measures.","rect":[115.19999694824219,309.2943115234375,345.3354444503784,300.1861267089844]},{"page":100,"text":" Position artillery assets to ensure the support of security forces.","rect":[115.19999694824219,322.7943115234375,386.4965772628784,313.6861267089844]},{"page":100,"text":" Position forces for probable future employment.","rect":[115.19999694824219,336.2943115234375,325.96477794647219,327.1861267089844]},{"page":100,"text":" Maintain or regain contact with adjacent friendly units in a contiguous assigned area and ensure","rect":[115.19999694824219,349.7943115234375,522.0444002227783,340.6761169433594]},{"page":100,"text":"that units remain capable of mutual support in a noncontiguous assigned area.","rect":[133.1999969482422,361.2572021484375,444.2208204269409,352.1490173339844]},{"page":100,"text":" Transition engineer effort by shifting emphasis from mobility to countermobility and survivability.","rect":[115.19999694824219,374.7543029785156,522.1392774581909,365.6461181640625]},{"page":100,"text":" Consolidate and reorganize.","rect":[115.19999694824219,388.2543029785156,245.14544200897218,379.1461181640625]},{"page":100,"text":" Explain the rationale for transitioning from the offense to their Soldiers.","rect":[115.19999694824219,401.7543029785156,421.2447462081909,392.6461181640625]},{"page":100,"text":" Emplace protective obstacles.","rect":[115.19999694824219,415.2342529296875,252.33777904510499,406.1461181640625]},{"page":100,"text":" Resupply with fuel and ammunition.","rect":[115.19999694824219,428.7543029785156,279.6473340988159,419.6461181640625]},{"page":100,"text":" Occupy defensible terrain.","rect":[115.19999694824219,442.2543029785156,239.02019786834718,433.1461181640625]},{"page":100,"text":"3-63. Units reorganize and resupply during transitions. This requires a transition in the sustainment effort","rect":[89.9937515258789,459.779296875,522.0368418655396,450.6711120605469]},{"page":100,"text":"with a shift in emphasis from ensuring the force’s ability to move forward to ensuring the force’s ability to","rect":[89.9937515258789,471.3022766113281,522.0110378265381,462.194091796875]},{"page":100,"text":"defend on its chosen location (by increasing forward stocks of construction, barrier, and obstacle material","rect":[89.99371337890625,482.7651672363281,521.9092173538209,473.656982421875]},{"page":100,"text":"and ammunition). A transition is often a time when units can perform equipment maintenance. Additional","rect":[89.99371337890625,494.2680969238281,521.9697031936646,485.1799621582031]},{"page":100,"text":"assets may also be available for casualty evacuation and medical treatment because of a reduced tempo of","rect":[89.99371337890625,505.75103759765627,521.9172265586853,496.6428527832031]},{"page":100,"text":"operations.","rect":[89.99371337890625,517.2540283203125,134.19794750213624,508.1658630371094]},{"page":100,"text":"3-64. Units should not wait too long to transition from the offense to the defense as subordinate forces","rect":[89.99371337890625,534.7990112304688,522.0158221702576,525.6908569335938]},{"page":100,"text":"approach their culminating points. Without prior planning, transitioning to defensive actions after reaching a","rect":[89.99371337890625,546.2619018554688,522.0140657501221,537.1537475585938]},{"page":100,"text":"culminating point is extremely difficult. There are several reasons for this:","rect":[89.99371337890625,557.784912109375,387.37802838897707,548.6767578125]},{"page":100,"text":" Defensive preparations are hasty, and forces are not adequately disposed for the defense.","rect":[115.19999694824219,571.2542724609375,488.0884962081909,562.1461181640625]},{"page":100,"text":" Defensive reorganization requires more time than an enemy force may allow.","rect":[115.19999694824219,584.7542724609375,442.83599376678469,575.6461181640625]},{"page":100,"text":" Usually attacking forces approaching culmination find themselves dispersed across the width and","rect":[115.19999694824219,598.2542724609375,522.0941677093506,589.1461181640625]},{"page":100,"text":"depth of their assigned areas with reduced combat power.","rect":[133.1999969482422,609.7772827148438,363.40651988983157,600.6691284179688]},{"page":100,"text":" The shift to the defense requires a psychological adjustment. Soldiers who have become","rect":[115.19999694824219,623.2742919921875,522.0147981719971,614.1560668945313]},{"page":100,"text":"accustomed to advancing must now halt and operate defensively on new and often unfavorable","rect":[133.1999969482422,634.7371826171875,521.9247713165283,625.6290283203125]},{"page":100,"text":"terms.","rect":[133.1999969482422,644.2361450195313,157.96543407440186,638.1539916992188]},{"page":100,"text":"3-65. Units can use two techniques when transitioning to a defensive operation. The first technique is for the","rect":[90.00376892089844,663.78515625,522.0828523712158,654.677001953125]},{"page":100,"text":"leading elements to commit forces and push forward to claim enough ground to establish a security area","rect":[90.00376892089844,675.248046875,521.9519319610596,666.139892578125]},{"page":100,"text":"anchored on defensible terrain. A security area is that area occupied by a unit’s security elements and includes","rect":[90.00376892089844,686.7710571289063,522.0772235374451,677.6629028320313]},{"page":100,"text":"the areas of influence of those security elements (ADP 3-90). The main force moves forward or rearward as","rect":[90.00376892089844,698.2940673828125,522.0551898460388,689.1859130859375]},{"page":100,"text":"necessary to occupy key terrain and institutes a hasty defense that progresses into a deliberate defense as time","rect":[90.00376892089844,709.7568969726563,522.0328645782471,700.6487426757813]},{"page":100,"text":"3-12","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":100,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":100,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":101,"text":"The Offense","rect":[487.97998046875,44.55902099609375,540.01620703125,37.90802001953125]},{"page":101,"text":"and resources allow. The second technique is to establish a security area generally along the unit’s final","rect":[108.0,83.51434326171875,540.0834116897584,74.40616607666016]},{"page":101,"text":"positions, moving the main body rearward to defensible terrain. The security force thins out and the remaining","rect":[107.99996185302735,94.97723388671875,540.0640773773193,85.86905670166016]},{"page":101,"text":"force deploys to organize the defense. In both methods, the unit keeps the security area with the appropriate","rect":[107.99996185302735,106.500244140625,539.9441194610596,97.3920669555664]},{"page":101,"text":"depth to enable dispersion and minimize early threat acquisition of friendly positions. ","rect":[107.99996185302735,118.023193359375,452.6779432296753,108.9150161743164]},{"page":101,"text":"3-66. In the first technique, the security area often lacks depth because the force lacks sufficient combat","rect":[107.99996185302735,135.48809814453126,540.0257334671021,126.37992095947266]},{"page":101,"text":"power to seize required terrain. In the second technique, enemy forces may accurately template the forward","rect":[107.98993682861328,147.0111083984375,539.8990383148193,137.90292358398438]},{"page":101,"text":"trace of friendly units and engage with artillery and other fire support systems. These actions often result in","rect":[107.98994445800781,158.5340576171875,540.0183620452881,149.42587280273438]},{"page":101,"text":"the loss of additional friendly Soldiers and equipment and expend more resources.","rect":[107.98994445800781,169.9969482421875,436.7722120285034,160.88876342773438]},{"page":101,"text":"3-67. If units determine the necessity of terminating an offense and conducting a retrograde, typically","rect":[107.98994445800781,187.51190185546876,539.9467067718506,178.40371704101563]},{"page":101,"text":"subordinate units initially conduct an area defense from their current locations. This lasts until their units can","rect":[107.98999786376953,199.034912109375,539.9692897796631,189.92672729492188]},{"page":101,"text":"synchronize their activities to conduct retrograde operations. The amount of effort expended in establishing","rect":[107.98998260498047,210.497802734375,540.0183620452881,201.38961791992188]},{"page":101,"text":"an area defense depends on the mission variables.","rect":[107.98998260498047,222.0007781982422,306.81389904022219,212.91262817382813]},{"page":101,"text":"TRANSITION TO STABILITY","rect":[90.0,245.39996337890626,223.39576816558839,237.09597778320313]},{"page":101,"text":"3-68. The end of focused offensive operations may not be the decisive act. The successful performance of","rect":[108.0,265.2542724609375,540.0012109336853,256.1460876464844]},{"page":101,"text":"stability tasks may be the main effort in a major operation or campaign. Units and staffs plan the transition","rect":[108.0,276.77728271484377,539.8860988616943,267.6590881347656]},{"page":101,"text":"to focus on the conduct of stability tasks from the conduct of offensive operations. To assist in this transition","rect":[108.0,288.3002624511719,540.0325832366943,279.19207763671877]},{"page":101,"text":"to stability-focused operations, units continuously consolidate gains. Units consider activities necessary to","rect":[108.0,299.7631530761719,540.0273342132568,290.65496826171877]},{"page":101,"text":"consolidate gains while seeking to achieve their end state. It is the final exploitation of tactical success.","rect":[108.0,311.2861633300781,520.1245679855347,302.177978515625]},{"page":101,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":101,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":101,"text":"3-13","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":102,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":103,"text":"Chapter 4","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":103,"text":"Movement to Contact","rect":[233.63999938964845,150.95619201660157,396.340702632904,139.11740112304688]},{"page":103,"text":"This chapter discusses movement to contact beginning with its general considerations.","rect":[126.0,188.7806854248047,503.9977159500122,178.79986572265626]},{"page":103,"text":"It then discusses organization, control measures, and conducting a movement to","rect":[126.0,201.4405975341797,504.05567359924319,191.45977783203126]},{"page":103,"text":"contact. It then discusses two variations of a movement to contact: search and attack","rect":[126.0,211.8826141357422,503.97657203674319,204.1197509765625]},{"page":103,"text":"and cordon and search. Lastly, it talks about transitioning from a movement to contact","rect":[126.01099395751953,226.76048278808595,503.9436752243042,216.7796630859375]},{"page":103,"text":"to another type of offensive or defensive operation.","rect":[126.0000228881836,239.4204559326172,351.30194568634036,229.43963623046876]},{"page":103,"text":"GENERAL CONSIDERATIONS FOR A MOVEMENT TO CONTACT","rect":[90.0,264.7496643066406,523.1746352806091,255.06153869628907]},{"page":103,"text":"4-1. A movement to contact is a type of offensive operation designed to establish or regain contact to","rect":[108.0,285.0542907714844,540.0754909515381,275.94610595703127]},{"page":103,"text":"develop the situation. Units perform a movement to contact when the tactical situation is unclear, or the","rect":[107.98998260498047,296.49713134765627,540.0501375274658,287.40899658203127]},{"page":103,"text":"enemy force succeeds in breaking contact with friendly forces. A properly executed movement to contact","rect":[107.9800033569336,308.0401611328125,539.9251475296021,298.9319763183594]},{"page":103,"text":"develops the situation and maintains the unit’s freedom of action after establishing contact with the enemy.","rect":[107.9800033569336,319.56317138671877,539.9860792160034,310.4549865722656]},{"page":103,"text":"This is essential in maintaining the initiative and achieving a position of advantage. Movement to contact","rect":[107.97994995117188,331.02606201171877,539.9982676467896,321.9178771972656]},{"page":103,"text":"allows units to create conditions for subsequent operations. Once contact is made with an enemy force, the","rect":[107.97993469238281,342.5490417480469,540.0734529571533,333.44085693359377]},{"page":103,"text":"friendly force quickly transitions either to an attack, a hasty defense, or bypasses enroute to their objective.","rect":[107.97993469238281,354.0720520019531,535.8940992355347,344.953857421875]},{"page":103,"text":"4-2. An enemy force’s use of terrain, operations security, and military deception operations can degrade","rect":[107.98994445800781,371.53692626953127,540.0021638946533,362.4287414550781]},{"page":103,"text":"the friendly forces situational understanding andrequiresmall tactical units to conduct movements to contact.","rect":[107.98999786376953,383.0599060058594,540.0683546066284,373.95172119140627]},{"page":103,"text":"A movement to contact employs purposeful and aggressive movement, decentralized control, and the hasty","rect":[108.0,394.5829162597656,539.9291896820068,385.4747314453125]},{"page":103,"text":"deployment of combined arms formations from the march. The fundamentals of a movement to contact are—","rect":[108.0,406.0457763671875,539.9521293640137,396.9375915527344]},{"page":103,"text":" Focus all efforts on finding enemy forces.","rect":[133.1999969482422,419.5142822265625,318.6433057785034,410.4060974121094]},{"page":103,"text":" The initial contact force should be small, mobile, self-contained, and avoid becoming decisively","rect":[133.1999969482422,433.0142822265625,540.0101222991943,423.9060974121094]},{"page":103,"text":"engaged by the enemy’s main body.","rect":[151.17996215820313,444.53729248046877,295.64333629608157,435.4291076660156]},{"page":103,"text":" Task-organize the force and use movement formationsand battle drillsto deploy and attack rapidly","rect":[133.1999969482422,458.0343017578125,539.9789943695068,448.9261169433594]},{"page":103,"text":"in any direction.","rect":[151.1999969482422,469.4971923828125,216.52839183807374,460.3890075683594]},{"page":103,"text":" Keep subordinate forces within supporting distances to facilitate gaining and maintaining contact.","rect":[133.1999969482422,482.9942932128906,540.0542554855347,473.8861083984375]},{"page":103,"text":" Upon gaining contact, maintain that contact regardless of the course of action (COA) adopted.","rect":[133.1999969482422,496.4942932128906,528.1113843917847,487.3861083984375]},{"page":103,"text":" Close air support, air interdiction, and counterair operations are essential to the success of large-","rect":[133.1999969482422,509.9942932128906,540.0361230430603,500.8861083984375]},{"page":103,"text":"scale movements to contact. Local air superiority or, at a minimum, air parity is vital to the","rect":[151.1999969482422,521.517333984375,540.0471468048096,512.4091796875]},{"page":103,"text":"operation’s success.","rect":[151.1999969482422,533.020263671875,231.21070384979249,523.93212890625]},{"page":103,"text":"4-3. A movement to contact increases the odds of a unit executing a meeting engagement. A meeting","rect":[107.99375915527344,550.505126953125,539.9709987640381,541.39697265625]},{"page":103,"text":"engagement is a combat action that occurs when a moving force engages an enemy at an unexpected","rect":[108.00372314453125,562.0281982421875,539.9971456451416,553.080322265625]},{"page":103,"text":"time and place. The enemy force encountered may be either stationary or moving. A meeting engagement","rect":[107.99371337890625,573.5511474609375,539.9080576858521,564.4429931640625]},{"page":103,"text":"does not require both forces to be surprised. The force making unexpected contact is the one conducting a","rect":[107.9937973022461,585.0140380859375,540.0301790313721,575.9058227539063]},{"page":103,"text":"meeting engagement. Such encounters often occur in small-unit operations when reconnaissance has been","rect":[107.99375915527344,596.5370483398438,540.0051174163818,587.4288940429688]},{"page":103,"text":"ineffective. The force that reacts first to the unexpected contact generally gains an advantage over its enemy.","rect":[107.9937515258789,608.06005859375,540.0967359542847,598.951904296875]},{"page":103,"text":"4-4. A meeting engagement may also occur when opponents are aware of each other, and both decide to","rect":[107.9937515258789,625.52490234375,539.9481716156006,616.416748046875]},{"page":103,"text":"attack to obtain a tactical advantage. Additionally, a meeting engagement may occur when one force attempts","rect":[107.98370361328125,637.0479125976563,539.9298846702576,627.9397583007813]},{"page":103,"text":"to deploy into a hasty defense while the other force attacks before its opponent can organize an effective","rect":[107.98371887207031,648.5709228515625,540.0079011993408,639.4627685546875]},{"page":103,"text":"defense. No matter how the force makes contact, seizing the initiative is the overriding imperative. Prompt","rect":[107.98371887207031,660.0338134765625,539.9439463577271,650.9256591796875]},{"page":103,"text":"execution of battle drills at platoon level and below, and standard actions on contact for larger units, can give","rect":[107.98373413085938,671.5567626953125,540.0802888946533,662.4486083984375]},{"page":103,"text":"that initiative to the friendly force.","rect":[107.98373413085938,683.0196533203125,245.72870922088624,673.9114990234375]},{"page":103,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":103,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":103,"text":"4-1","rect":[508.9800109863281,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":104,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":104,"text":"ORGANIZATION OF FORCES FOR A MOVEMENT TO CONTACT","rect":[72.0,85.28965759277344,500.9637282981873,75.60151672363281]},{"page":104,"text":"4-5. At a minimum, a movement to contact is organized with forward security forces—either a covering","rect":[90.0,105.59429931640625,521.8951320648193,96.48612213134766]},{"page":104,"text":"force or an advance guard—and a main body. The reserve, fires, engineer, and sustainment assets are included","rect":[90.0,117.1173095703125,522.1226711273193,108.0091323852539]},{"page":104,"text":"in the main body. Based on the mission variables, commanders may increase their unit’s security by","rect":[90.0,128.5802001953125,522.0149440765381,119.4720230102539]},{"page":104,"text":"resourcing an offensive covering force and an advance guard for each column, as well as flank and rear","rect":[90.0,140.1031494140625,521.9727075157166,130.99496459960938]},{"page":104,"text":"security. Figure 4-1 depicts a generic organization of forces for a movement to contact.","rect":[90.0,151.62615966796876,438.51980113983157,142.51797485351563]},{"page":104,"text":"Figure 4-1. Organization of forces for a movement to contact","rect":[153.35646057128907,468.6089172363281,440.6739404258728,459.2201843261719]},{"page":104,"text":"4-6. Initiating a movement to contact requires units to be out of contact with the enemy main body.","rect":[89.98994445800781,492.1258239746094,522.0103712081909,483.01763916015627]},{"page":104,"text":"However, units may have enough information to target enemy reconnaissance assets, uncommitted forces,","rect":[89.98994445800781,503.5887145996094,521.9796705245972,494.48052978515627]},{"page":104,"text":"reserves, or sustaining operations activities. Commanders normally designate forces, such as long-range","rect":[89.98994445800781,515.1117553710938,521.9959993438721,506.0035705566406]},{"page":104,"text":"artillery systems and fixed-wing aircraft to engage known enemy elements within their assigned area. The","rect":[89.98999786376953,526.5745849609375,521.9972810821533,517.4664306640625]},{"page":104,"text":"forward security element is critical to the protection of the main body and enables units to make contact on","rect":[89.98998260498047,538.09765625,521.8981227874756,528.989501953125]},{"page":104,"text":"their terms.","rect":[89.98998260498047,547.5965576171875,135.57497692108155,540.512451171875]},{"page":104,"text":"FORWARD SECURITY FORCES","rect":[72.0,573.0,218.8660945892334,564.6959838867188]},{"page":104,"text":"4-7. Units conducting a movement to contact can organize their security force as an advance guard force, a","rect":[90.0,592.8543090820313,522.0722932891846,583.7461547851563]},{"page":104,"text":"covering force, or both. This provides the main body with early warning, protects the movement of the main","rect":[90.0,604.3773193359375,521.9818019866943,595.2691650390625]},{"page":104,"text":"body, and develops the situation before committing the main body. A guard force is a force that contains","rect":[90.01000213623047,615.9002685546875,522.0394427757263,606.7921142578125]},{"page":104,"text":"sufficient combat power to defeat, cause the withdrawal of, or fix the lead elements of an enemy ground force","rect":[90.01001739501953,627.3631591796875,522.1143465118408,618.2550048828125]},{"page":104,"text":"before it can engage the main body with direct fire. A covering force is a self-contained force capable of","rect":[90.01001739501953,638.8861694335938,521.9722802696228,629.7780151367188]},{"page":104,"text":"operating independently of the main body, unlike a guard force to conduct the cover task. This covering force","rect":[90.01005554199219,650.4091796875,522.1062288360596,641.301025390625]},{"page":104,"text":"accomplishes the same effect as a guard and reports directly to the establishing commander.","rect":[90.01005554199219,661.8720703125,457.68398571014407,652.763916015625]},{"page":104,"text":"4-8. Each element of the force synchronizes its actions with adjacent and supporting units, maintaining","rect":[90.02010345458985,679.3970336914063,522.0193386077881,670.27880859375]},{"page":104,"text":"contact and coordination as prescribed in orders and unit SOPs. The lead elements of the main body maintain","rect":[90.02010345458985,690.9200439453125,522.0126247406006,681.8118896484375]},{"page":104,"text":"contact with the security force. The rear and flank security elements maintain contact with and orient on the","rect":[90.0199966430664,702.3829345703125,522.0106477813721,693.2747802734375]},{"page":104,"text":"main body’s movement. These security forces prevent unnecessary delay in the movement and premature","rect":[90.0199966430664,713.9059448242188,522.0456819610596,704.7977905273438]},{"page":104,"text":"4-2","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":104,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":104,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":105,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":105,"text":"deployment of the main body as long as possible. Commanders may instruct the advance guard to eliminate","rect":[108.0,83.51434326171875,540.0033235626221,74.40616607666016]},{"page":105,"text":"small pockets of resistance bypassed by the covering force (if both are used). The conduct of the security","rect":[108.0,94.97723388671875,540.0153713226318,85.86905670166016]},{"page":105,"text":"forces in the movement to contact are the same as those for security operations. (See Chapter 13 for additional","rect":[108.0,106.500244140625,540.0353770217896,97.3920669555664]},{"page":105,"text":"information on security operations.) ","rect":[108.01001739501953,118.023193359375,254.39220714569093,108.9150161743164]},{"page":105,"text":"MAIN BODY","rect":[90.0,141.37271118164063,150.17982578277589,133.29598999023438]},{"page":105,"text":"4-9. A main body consists of forces not assigned to security duties. It normally includes the maneuver","rect":[108.0,161.2742919921875,539.9611108360291,152.16610717773438]},{"page":105,"text":"forces conducting the main effort once contact is made with the enemy as well as fires, engineer, and","rect":[108.0,172.79730224609376,539.9816799163818,163.68911743164063]},{"page":105,"text":"sustainment assets to support the operation The combat elements of the main body prepare to respond to","rect":[108.0,184.3203125,539.9429836273193,175.21212768554688]},{"page":105,"text":"enemy contact that the unit’s security forces make. If the situation allows, commanders can assign a follow","rect":[108.0,195.783203125,540.0023846664428,186.67501831054688]},{"page":105,"text":"and support mission to a subordinate maneuver unit. This allows that subordinate unit to relieve security","rect":[107.98998260498047,207.30615234375,540.0122585296631,198.19796752929688]},{"page":105,"text":"forces and perform tasks such as containing bypassed enemy forces, handling dislocated civilians, and","rect":[107.97997283935547,218.76904296875,540.0615139007568,209.66085815429688]},{"page":105,"text":"clearing routes. Security forces can then continue their primary mission.","rect":[107.97997283935547,230.29205322265626,396.55800914764407,221.18386840820313]},{"page":105,"text":"4-10. Units frequently find that their main supply routes (MSRs) become extended as operations proceed.","rect":[107.96997833251953,247.8170166015625,539.9680128097534,238.70883178710938]},{"page":105,"text":"Aerial resupply may be necessary to support large-scale movement to contacts or to maintain the momentum","rect":[107.96997833251953,259.2799072265625,539.9722571334839,250.17172241210938]},{"page":105,"text":"of the main body. Combat trains containing fuel, ammunition, medical assets, and maintenance assets move","rect":[107.96997833251953,270.80291748046877,540.0352449493408,261.6947326660156]},{"page":105,"text":"with their supported battalion or company team. Fuel and ammunition stocks remain loaded on tactical","rect":[107.96997833251953,282.325927734375,539.9271006546021,273.2177429199219]},{"page":105,"text":"vehicles in the combat trains so they can quickly move when necessary. Battalion field trains move with a","rect":[107.96990203857422,293.788818359375,539.9999666290283,284.6806335449219]},{"page":105,"text":"higher support echelon, such as the brigade support battalion, in the main body of each BCT. Aviation units","rect":[107.96994018554688,305.3117980957031,540.0263202171326,296.20361328125]},{"page":105,"text":"use forward arming and refuel points (known as FARPs) to reduce aircraft turnaround time.","rect":[107.96991729736328,316.83477783203127,474.47552013397219,307.7265930175781]},{"page":105,"text":"RESERVE","rect":[90.0,340.1622314453125,136.64721059799195,332.0760192871094]},{"page":105,"text":"4-11. Commanders designate a portion of the main body for use as the reserve. The mission variables","rect":[108.0,360.0542907714844,539.9770038108826,350.94610595703127]},{"page":105,"text":"determine the size of the reserve, and the more unknown the enemy situation, the larger the size of the reserve.","rect":[108.0,371.5773010253906,540.0424146652222,362.4691162109375]},{"page":105,"text":"On contact with enemy forces, a reserve provides flexibility to react to unforeseen circumstances and allows","rect":[108.0,383.10028076171877,540.0553119163513,373.9920959472656]},{"page":105,"text":"a unit to resume its movement. See paragraphs 1-94 through 1-100 for more information on the reserve.","rect":[108.0,394.56317138671877,522.8550367355347,385.4549865722656]},{"page":105,"text":"COMMON CONTROL MEASURES FOR A MOVEMENT TO","rect":[90.0,419.8497009277344,473.4295097122192,410.1755676269531]},{"page":105,"text":"CONTACT","rect":[90.0,435.9826354980469,159.98528896713257,426.3224792480469]},{"page":105,"text":"4-12. Units use the minimal number and type of control measures possible in a movement to contact because","rect":[108.0,456.2943115234375,540.0482454376221,447.1861267089844]},{"page":105,"text":"of the uncertain enemy situation. These measures include designation of an assigned area with left, right,","rect":[108.0,467.7572021484375,540.0874586105347,458.6490173339844]},{"page":105,"text":"front, and rear boundaries, or a separate assigned area bounded by a continuous boundary in noncontiguous","rect":[107.98990631103516,479.2801818847656,540.0292499046326,470.1719970703125]},{"page":105,"text":"operations. Commanders further divide their assigned area into subordinate unit assigned areas to facilitate","rect":[107.98992919921875,490.7430725097656,539.9050569610596,481.6348876953125]},{"page":105,"text":"subordinate unit actions.","rect":[107.98994445800781,500.2420349121094,206.0747480392456,493.15789794921877]},{"page":105,"text":"4-13. A movement to contact usually starts from a LD at the time specified in the operation order.","rect":[107.98994445800781,519.791015625,540.0123243331909,510.6828308105469]},{"page":105,"text":"Commanders control a movement to contact by using phase lines, contact points, and checkpoints as required.","rect":[107.96991729736328,531.25390625,540.0530347824097,522.145751953125]},{"page":105,"text":"They also control the depth of the movement to contact by using a LOA or a forward boundary. Figure 4-2","rect":[107.96991729736328,542.7769165039063,539.9982814788818,533.6687622070313]},{"page":105,"text":"on page 4-4 depicts example common movement to contact control measures and also depicts a limit of","rect":[107.96991729736328,554.2999267578125,539.9843041954041,545.1917724609375]},{"page":105,"text":"advance and not a forward boundary. Commanders can designate one or more objectives to limit the extent","rect":[107.96991729736328,565.7628173828125,539.9629282913209,556.6445922851563]},{"page":105,"text":"of a movement to contact and orient the force. However, these are often terrain oriented and used only to","rect":[107.96992492675781,577.2857666015625,539.9446926116943,568.1776123046875]},{"page":105,"text":"guide movement. Although a movement to contact may result in taking a terrain objective, the primary focus","rect":[107.96992492675781,588.808837890625,540.0242450218201,579.6906127929688]},{"page":105,"text":"should be on gaining contact with enemy forces and developing the situation. If a unit has enough information","rect":[107.96991729736328,600.2716674804688,539.9351711273193,591.1635131835938]},{"page":105,"text":"to locate significant enemy forces, then it should plan an attack.","rect":[107.97997283935547,611.794677734375,362.8987989425659,602.6865234375]},{"page":105,"text":"4-14. Commanders use boundaries to separate the various organizational elements and clearly establish","rect":[107.97997283935547,629.3096313476563,539.8760280609131,620.2014770507813]},{"page":105,"text":"responsibilities between different organizations. They synchronize the movement to contact with control","rect":[107.97997283935547,640.7725219726563,539.9850230178834,631.6643676757813]},{"page":105,"text":"measures, battle drills, and formation discipline.","rect":[107.97997283935547,652.2755126953125,300.74468517303469,643.1873779296875]},{"page":105,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":105,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":105,"text":"4-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":106,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":106,"text":"Figure 4-2. Example movement to contact control measures","rect":[155.0399932861328,358.794189453125,439.00379847717286,349.4956359863281]},{"page":106,"text":"4-15. Commanders designate a series of phase lines that can successively become the new rear boundary of","rect":[90.00017547607422,382.2510070800781,521.9773461875916,373.142822265625]},{"page":106,"text":"the forward security elements as that force advances. Each security area rear boundary becomes the forward","rect":[90.00017547607422,393.7138977050781,522.0285549163818,384.605712890625]},{"page":106,"text":"boundary of the main body and shifts as the security force moves forward. The rear boundary of the main","rect":[90.00017547607422,405.23687744140627,521.9915065765381,396.1286926269531]},{"page":106,"text":"body designates the limit of responsibility of the rear security element. This line also shifts as the main body","rect":[89.99014282226563,416.7599182128906,521.9724636077881,407.6517028808594]},{"page":106,"text":"moves forward. Units may use an axis of advance to control movement. However, there is the risk that their","rect":[89.99019622802735,428.2227783203125,521.9694726524353,419.1145935058594]},{"page":106,"text":"forces may not detect and may inadvertently bypass enemy forces outside the axis.","rect":[89.99014282226563,439.74578857421877,420.69130992889407,430.6376037597656]},{"page":106,"text":"PLANNING A MOVEMENT TO CONTACT","rect":[72.0,465.0296936035156,346.4120315208435,455.341552734375]},{"page":106,"text":"4-16. Planning for a movement to contact requires units to balance competing requirements in the allocation","rect":[90.0,485.3343200683594,521.9842433929443,476.22613525390627]},{"page":106,"text":"of combat power. The first requirement is to determine an enemy force’s location and intent. The second","rect":[90.00997924804688,496.8573303222656,521.9540309906006,487.7491149902344]},{"page":106,"text":"requirement is to execute security operations to protect the main body. The main body focuses its planning","rect":[90.01000213623047,508.3202209472656,521.9572048187256,499.2120056152344]},{"page":106,"text":"and preparation on the conduct of hasty attacks, bypassing forces, and hasty defenses. The plan must address","rect":[90.0,519.8432006835938,522.0653827171326,510.7350158691406]},{"page":106,"text":"actions anticipated by the unit based on available information and anticipated times and locations of meeting","rect":[90.01001739501953,531.3662109375,521.9168605804443,522.258056640625]},{"page":106,"text":"engagements. Commanders also task their forward security forces with conducting route reconnaissance of","rect":[90.01001739501953,542.8291015625,522.0132348594666,533.720947265625]},{"page":106,"text":"routes the main body traverses.","rect":[90.01001739501953,554.35205078125,214.67388439178468,545.243896484375]},{"page":106,"text":"4-17. Units seek to gain contact by using the smallest elements possible. These elements are normally ground","rect":[90.01001739501953,571.8670654296875,522.0037136077881,562.7589111328125]},{"page":106,"text":"or aerial units performing reconnaissance but may include UAS or other collection assets. Units may task-","rect":[90.01001739501953,583.3299560546875,521.9922998008728,574.2218017578125]},{"page":106,"text":"organize their reconnaissance assets with additional combat power to allow them to develop the situation.","rect":[90.02002716064453,594.8529052734375,522.0134229660034,585.7447509765625]},{"page":106,"text":"The movement formation of the main body should also make initial contact with the smallest force possible.","rect":[90.02002716064453,606.3759155273438,522.0033521652222,597.2677612304688]},{"page":106,"text":"It should provide for efficient movement of the force and adequate reserves. Commanders choose to have all,","rect":[90.02002716064453,617.8187866210938,521.9421949386597,608.7306518554688]},{"page":106,"text":"or part of the main body conduct an approach march as part of the movement to contact to provide efficiency","rect":[90.02002716064453,629.36181640625,522.0626125335693,620.253662109375]},{"page":106,"text":"and freedom of action to the main body. (See Chapter 14 for additional information on troop movement.)","rect":[90.0300521850586,640.82470703125,510.4892785606384,631.716552734375]},{"page":106,"text":"4-18. The frontage assigned to a unit in a movement to contact must allow it to apply sufficient combat","rect":[90.03004455566406,658.339599609375,522.0121226272584,649.2314453125]},{"page":106,"text":"power to maintain the momentum of the operation. Reducing the frontage normally gives a unit more combat","rect":[90.03004455566406,669.8626708984375,522.0483775100709,660.7545166015625]},{"page":106,"text":"power to develop the situation upon contact while maintaining the required momentum. The forward security","rect":[90.01998901367188,681.3255004882813,522.1224269866943,672.2173461914063]},{"page":106,"text":"force should have uncommitted forces available to develop the situation without requiring the deployment of","rect":[90.03001403808594,692.8485107421875,522.0183618125916,683.7403564453125]},{"page":106,"text":"the main body. The benefits of a wider frontage include increasing the likelihood of making contact with the","rect":[90.04003143310547,704.3714599609375,522.1183748321533,695.2633056640625]},{"page":106,"text":"enemy and reducing the potential of inadvertently bypassing enemy formations.","rect":[90.04003143310547,715.8343505859375,409.46477794647219,706.7261962890625]},{"page":106,"text":"4-4","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":106,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":106,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":107,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":107,"text":"4-19. Units primarily rely on fires assets to weight the lead element’s combat power, but they also provide","rect":[108.0,83.51434326171875,539.9883089141846,74.40616607666016]},{"page":107,"text":"the lead element with the additional combat enablers needed to accomplish the mission. Indirect fires system","rect":[107.9899673461914,94.97723388671875,539.9801917037964,85.86905670166016]},{"page":107,"text":"support maneuver forces to get within direct fire range and engage enemy forces.","rect":[107.98994445800781,106.500244140625,432.6359815597534,97.3920669555664]},{"page":107,"text":"4-20. The reconnaissance effort may proceed faster in a movement to contact than in a zone reconnaissance","rect":[107.99996185302735,124.02520751953125,539.9922151641846,114.91703033447266]},{"page":107,"text":"because the emphasis is on making contact with enemy forces. However, commanders must recognize that","rect":[107.98993682861328,135.48809814453126,540.0221323928834,126.37992095947266]},{"page":107,"text":"there is an increased risk in bypassing enemy units when increasing the speed of the reconnaissance effort.","rect":[107.98993682861328,147.0111083984375,534.2697706222534,137.90292358398438]},{"page":107,"text":"4-21. Based on mission variables, commanders clearly state bypass criteria. For example, an armored or","rect":[107.98992919921875,164.53607177734376,539.9813134727478,155.42788696289063]},{"page":107,"text":"Stryker BCT commander in an open desert environment could state that the bypass criteria is an enemy-","rect":[107.97991180419922,175.99896240234376,539.9521386680603,166.89077758789063]},{"page":107,"text":"mounted force smaller than a platoon. The BCT clears all enemy forces larger than a mounted platoon from","rect":[107.97993469238281,187.52197265625,539.9732947311402,178.41378784179688]},{"page":107,"text":"that brigade’s axis of advance. Any force that bypassed an enemy unit must maintain contact with it until","rect":[107.97993469238281,199.044921875,539.9589610061646,189.93673706054688]},{"page":107,"text":"handing it off to another friendly element, usually a force assigned a follow and support mission. See","rect":[107.96991729736328,210.5078125,540.0323152618408,201.39962768554688]},{"page":107,"text":"paragraph 12-27 for a discussion on bypass criteria.","rect":[107.95990753173828,222.03082275390626,314.5292921066284,212.92263793945313]},{"page":107,"text":"4-22. The intelligence officer, assisted by engineer and air defense staff representatives, carefully analyzes","rect":[107.96993255615235,239.4957275390625,539.9722430686951,230.38754272460938]},{"page":107,"text":"the terrain, including air avenues of approach. At a minimum, the intelligence staff identifies the enemy","rect":[107.96991729736328,251.0186767578125,539.8517971038818,241.91049194335938]},{"page":107,"text":"force’s most dangerous and most likely COA in the mission analysis portion during the MDMP. Because of","rect":[107.96991729736328,262.54168701171877,540.0072534141541,253.43350219726563]},{"page":107,"text":"the force’s vulnerability, the intelligence officer must not underestimate enemy forces during a movement to","rect":[107.96987915039063,274.00457763671877,540.0762233734131,264.8963928222656]},{"page":107,"text":"contact. A thorough intelligence preparation of the battlefield (IPB) process—a modified combined obstacle","rect":[107.97989654541016,285.527587890625,539.9161043243408,276.4194030761719]},{"page":107,"text":"overlay that includes intervisibility overlays, threat courses of action, and event templates—enhances the","rect":[107.96986389160156,297.0505676269531,539.9080476837158,287.9423828125]},{"page":107,"text":"force’s security by indicating danger areas where the force is most likely to make contact with enemy forces.","rect":[107.96984100341797,308.513427734375,540.0191602706909,299.4052429199219]},{"page":107,"text":"It also helps to determine movement times between phase lines and other locations. Potential danger areas","rect":[107.96984100341797,320.03643798828127,539.9851825218201,310.9282531738281]},{"page":107,"text":"are likely enemy defensive locations, engagement areas, observation posts, and obstacles. The fires system","rect":[107.96984100341797,331.5594482421875,540.0062537155152,322.4512634277344]},{"page":107,"text":"targets these areas. They become on-order priority targets placed into effect or cancelled as the lead element","rect":[107.96984100341797,343.0223083496094,539.9733042678834,333.91412353515627]},{"page":107,"text":"can confirm or deny enemy force presence. The information collection annex of the movement to contact","rect":[107.95982360839844,354.5452880859375,540.0362925491334,345.4371032714844]},{"page":107,"text":"order must address coverage of these danger areas. If reconnaissance forces cannot clear these areas, more","rect":[107.95982360839844,366.06829833984377,539.9010896759033,356.9601135253906]},{"page":107,"text":"deliberate movement techniques are required. These areas and resource shortages should be identified during","rect":[107.95990753173828,377.5312194824219,539.9547023773193,368.42303466796877]},{"page":107,"text":"the MDMP process. Resources should be reallocated, or maneuver adjusted based on the results of COA","rect":[107.95990753173828,389.0542297363281,539.8660321273803,379.93603515625]},{"page":107,"text":"analysis.","rect":[107.96991729736328,400.57720947265627,142.75434398651124,391.4690246582031]},{"page":107,"text":"4-23. Commanders develop decision points to support changes in the force’s movement technique or","rect":[107.96991729736328,418.0420837402344,540.0032861289978,408.93389892578127]},{"page":107,"text":"movement formation. Using human and technical means to validate decision points, commanders determine","rect":[107.96991729736328,429.56512451171877,539.9713411407471,420.4569396972656]},{"page":107,"text":"the acceptable degree of risk based on the mission. The commander’s confidence in the products of the IPB","rect":[107.96991729736328,441.088134765625,540.0514433326721,431.9799499511719]},{"page":107,"text":"process and the acceptable risk determine the unit’s movement formation and scheme of maneuver. In a high-","rect":[107.96991729736328,452.551025390625,540.0623681602478,443.4428405761719]},{"page":107,"text":"risk environment, it is usually better to increase the distance between forward elements and the main body","rect":[107.96987915039063,464.07403564453127,539.8668727874756,454.9658508300781]},{"page":107,"text":"than to slow the speed of advance.","rect":[107.96987915039063,475.5168762207031,245.47437572479249,466.4287414550781]},{"page":107,"text":"4-24. Higher headquarters execute supporting operations in support of their subordinates as part of a","rect":[107.96987915039063,493.0619201660156,540.0343294219971,483.9537353515625]},{"page":107,"text":"movement to contact. This occurs when the information regarding the enemy reserves and follow-on forces","rect":[107.96991729736328,504.5849304199219,540.0163104515076,495.47674560546877]},{"page":107,"text":"is available, but information regarding enemy forces in proximity to the friendly force is not available. As in","rect":[107.95990753173828,516.0478515625,539.9923610687256,506.9396667480469]},{"page":107,"text":"any other type of operation, units plan to focus operations on finding enemy forces and then delaying,","rect":[107.95990753173828,527.57080078125,539.9979200363159,518.462646484375]},{"page":107,"text":"disrupting, or destroying each enemy force before it arrives in direct fire range. This allows maneuver forces","rect":[107.95990753173828,539.0938720703125,539.9542376976013,529.9857177734375]},{"page":107,"text":"to prepare to engage enemy units on their arrival.","rect":[107.95994567871094,550.5567626953125,304.8630323410034,541.4486083984375]},{"page":107,"text":"4-25. Commanders can opt not to designate amain effortuntil forces make contact with enemy forces, unless","rect":[107.95994567871094,568.0817260742188,539.9812762718201,558.9735717773438]},{"page":107,"text":"there is a specific reason to designate one. They retain resources under direct control to reinforce the main","rect":[107.96995544433594,579.604736328125,539.8754177093506,570.49658203125]},{"page":107,"text":"effort. Commanders may designate the main effort during the initial stages of a movement to contact because","rect":[107.96995544433594,591.067626953125,540.0594759063721,581.95947265625]},{"page":107,"text":"of the presence of a key piece of terrain or an avenue of approach.","rect":[107.96994018554688,602.5906372070313,372.30971813201907,593.4824829101563]},{"page":107,"text":"PREPARING A MOVEMENT TO CONTACT","rect":[90.0,627.749755859375,372.98176418685918,618.0615844726563]},{"page":107,"text":"4-26. The preparations for conducting a movement to contact are the same as those for an attack. (See","rect":[108.0,648.0543212890625,540.0314607696533,638.9461669921875]},{"page":107,"text":"paragraphs 5-32 through 5-46 for additional information on preparation for attacks.) The only difference is","rect":[108.0,659.5772705078125,539.8990619163513,650.4691162109375]},{"page":107,"text":"the focus on battle drills since the location and disposition of the enemy is unknown.","rect":[107.96991729736328,671.0401611328125,446.5928907394409,661.9320068359375]},{"page":107,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":107,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":107,"text":"4-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":108,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":108,"text":"EXECUTING A MOVEMENT TO CONTACT","rect":[72.0,85.28965759277344,356.5475295677185,75.60151672363281]},{"page":108,"text":"4-27. The commander of the forward security force chooses a movement formation (based on the mission","rect":[90.0,105.59429931640625,521.9472560882568,96.48612213134766]},{"page":108,"text":"variables) and makes contact with the smallest possible force while providing flexibility for maneuver.","rect":[90.0,117.1173095703125,521.9699659347534,108.0091323852539]},{"page":108,"text":"Whatever formation the unit chooses, it must be able to deploy appropriately once it determines an enemy","rect":[90.0,128.5802001953125,521.9843654632568,119.4720230102539]},{"page":108,"text":"force’s location. The unit ensures that the route or axis of advance traveled by the main body is free of enemy","rect":[90.0,140.1031494140625,521.9662380218506,130.99496459960938]},{"page":108,"text":"forces. The main body may move continuously (using traveling and traveling overwatch) or by bounds (using","rect":[90.00003814697266,151.62615966796876,522.0641994476318,142.51797485351563]},{"page":108,"text":"bounding overwatch). It moves by bounds when contact with an enemy force is expected and the terrain is","rect":[90.00003814697266,163.08905029296876,521.8819720726013,153.98086547851563]},{"page":108,"text":"favorable. The overall commander may position some indirect fire assets, such as a mortar platoon or artillery","rect":[90.00003814697266,174.61212158203126,521.9996852874756,165.50387573242188]},{"page":108,"text":"battery and forward observers, with the forward security force. These forward observers can help overwatch","rect":[90.0,186.13507080078126,522.0294704437256,177.02688598632813]},{"page":108,"text":"the forward security force movement while indirect fires focus on suppressing enemy weapons, obscuring","rect":[89.9999771118164,197.59796142578126,521.9673366546631,188.48977661132813]},{"page":108,"text":"enemy observation posts, and screening friendly movement.","rect":[90.0,209.1209716796875,330.5191602706909,200.01278686523438]},{"page":108,"text":"4-28. Behind the forward securityforce, themain bodyadvances over multiple parallel routes with numerous","rect":[90.0,226.5858154296875,521.9462420921326,217.47763061523438]},{"page":108,"text":"lateral branches to remain flexible and reduce the time needed to initiate maneuver. (While it is preferred for","rect":[90.0,238.08872985839845,522.0353906211853,229.00057983398438]},{"page":108,"text":"a battalion to use multiple routes, battalions and smaller units can move on a singular route.) In a movement","rect":[90.0,249.63177490234376,522.0845103225709,240.52359008789063]},{"page":108,"text":"to contact, the main body’s march disposition must allow maximum flexibility for maneuvering during","rect":[90.0,261.09466552734377,522.0189113616943,251.98648071289063]},{"page":108,"text":"movement and when establishing contact with an enemy force.","rect":[90.0,272.61767578125,341.86284923553469,263.5094909667969]},{"page":108,"text":"4-29. The main body keeps enough distance between itself and its forward security force to maintain","rect":[90.0,290.14263916015627,522.0373439788818,281.0344543457031]},{"page":108,"text":"flexibility for maneuver. This distance varies with the echelon of command, the terrain, and the availability","rect":[90.01001739501953,301.60552978515627,521.9752712249756,292.4973449707031]},{"page":108,"text":"of information about enemy forces. The main body may execute a tactical movement for all or part of the","rect":[90.01001739501953,313.1285400390625,522.0544710235596,304.0203552246094]},{"page":108,"text":"movement to contact to use the available road network efficiently or reduce the time needed to move from","rect":[90.01001739501953,324.6515197753906,521.9612097702027,315.5433349609375]},{"page":108,"text":"one location to another. Command posts and supply trains seek routes that allow them to remain responsive","rect":[90.01001739501953,336.1143798828125,522.0755891876221,327.0061950683594]},{"page":108,"text":"throughout an assigned area and occupy hasty positions as necessary.","rect":[90.01005554199219,347.63739013671877,367.1813611984253,338.5292053222656]},{"page":108,"text":"4-30. Fire support systems should focus on suppression missions to disrupt enemy forward security elements","rect":[90.00003814697266,365.1623840332031,522.0645282249451,356.05419921875]},{"page":108,"text":"as they make contact and focus on obscuration of enemy forces missions or screen exposed friendly forces","rect":[90.00007629394531,376.625244140625,522.0385272483826,367.5170593261719]},{"page":108,"text":"when conducting a movement to contact. They schedule synchronized movements of fire support systems","rect":[90.00007629394531,388.14825439453127,521.9608294944763,379.0400695800781]},{"page":108,"text":"with the movement of the rest of the force. Fire support systems that cannot match the cross-country mobility","rect":[90.00007629394531,399.6712341308594,521.9131984710693,390.56304931640627]},{"page":108,"text":"of ground maneuver units may cause them to slow their rate of advance. If these units do not slow down, they","rect":[90.00003814697266,411.13421630859377,522.0072536468506,402.02593994140627]},{"page":108,"text":"run the risk of outrunning their fire support. Units synchronize the employment of close air support to prevent","rect":[90.0,422.6571960449219,522.0834116897584,413.54901123046877]},{"page":108,"text":"enemy forces from regaining balance while ground fire support assets are repositioning. The main body","rect":[89.99996185302735,434.1802062988281,522.0069484710693,425.072021484375]},{"page":108,"text":"updates the high-payoff target list during a movement to contact operation as necessary.","rect":[89.99996185302735,445.6430969238281,441.86944103240969,436.534912109375]},{"page":108,"text":"4-31. Similar considerations apply to air and missile defense when enemy forces possess these capabilities.","rect":[89.99996185302735,463.1680908203125,521.9761304855347,454.0599060058594]},{"page":108,"text":"A unit conducting a movement to contact remains aware of the air and missile defense umbrella provided by","rect":[89.99996185302735,474.6309814453125,522.1050930023193,465.5227966308594]},{"page":108,"text":"radars, air defense systems, and the joint combat air patrol.","rect":[89.99996185302735,486.15399169921877,325.5431776046753,477.0357971191406]},{"page":108,"text":"4-32. The unit’s tempo, momentum, tactical dispersal, and attention to electromagnetic emission control","rect":[89.99996185302735,503.6689453125,521.9500498733521,494.5607604980469]},{"page":108,"text":"complicate an enemy force’s ability to detect and target the main body prior to making contact. Once a","rect":[89.9999771118164,515.1318359375,521.9819002227783,506.0236511230469]},{"page":108,"text":"friendly force makes contact and masses against detected enemy forces, it becomes vulnerable to strikes by","rect":[89.99999237060547,526.6549072265625,522.0765285491943,517.5467529296875]},{"page":108,"text":"enemy conventional weapons and weapons of mass destruction. A friendly force must mass effects rapidly","rect":[89.9999771118164,538.1778564453125,521.9652004241943,529.0697021484375]},{"page":108,"text":"in a meeting engagement and disperse again as soon as it overcomes resistance to avoid enemy","rect":[89.99996185302735,549.6407470703125,522.0336208343506,540.5325927734375]},{"page":108,"text":"counteractions.","rect":[89.99996185302735,559.1397705078125,150.82238292694093,552.0556640625]},{"page":108,"text":"4-33. Movement should be as rapid as the terrain, the mobility of the force, and the enemy situation permits.","rect":[89.99996185302735,578.6787719726563,521.9921216964722,569.5706176757813]},{"page":108,"text":"Open terrain provides maneuver space on either side of the line of march and facilitates high-speed","rect":[89.99996185302735,590.1416625976563,521.9642238616943,581.0335083007813]},{"page":108,"text":"movement. It also allows for greater dispersal and usually permits more separation between forward security","rect":[90.00003814697266,601.6646728515625,521.8591213226318,592.5565185546875]},{"page":108,"text":"elements and the main body than restricted terrain allows. Units should never commit their main bodies to","rect":[90.00003814697266,613.1876831054688,522.0042629241943,604.0795288085938]},{"page":108,"text":"canalizing terrain before forward security elements have ensured the main bodies can maintain freedom of","rect":[90.00003814697266,624.6505737304688,521.9807031211853,615.5424194335938]},{"page":108,"text":"movement within that terrain. Enemy forces may have established fire support control measures that allow","rect":[90.00003814697266,636.173583984375,522.0002484359741,627.0654296875]},{"page":108,"text":"enemy forces to employ non-observed harassing and interdiction fires on friendly forces traversing these","rect":[90.00003814697266,647.6965942382813,522.0545930938721,638.5884399414063]},{"page":108,"text":"choke points. Units may shorten the distance between elements to decrease reaction time or deploy their force","rect":[90.00003814697266,659.1594848632813,522.1603670196533,650.0513305664063]},{"page":108,"text":"to prepare for contact as the enemy situation develops.","rect":[90.00003814697266,670.6824951171875,308.0714063644409,661.5743408203125]},{"page":108,"text":"4-34. At battalion and company echelons, a force moves along covered or concealed positions along routes","rect":[90.00003814697266,688.20751953125,522.0442035179138,679.099365234375]},{"page":108,"text":"using terrain to minimize its vulnerability to enemy weapons. Further, an overwatching force should cover","rect":[89.9900131225586,699.67041015625,521.9880883750916,690.562255859375]},{"page":108,"text":"4-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":108,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":108,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":109,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":109,"text":"the moving force. Regardless of the specific movement technique employed, subordinate elements need to","rect":[108.0,83.51434326171875,539.9432277679443,74.40616607666016]},{"page":109,"text":"provide mutual support and be knowledgeable of each other’s sectors of fire.","rect":[108.0,94.97723388671875,415.1180372238159,85.86905670166016]},{"page":109,"text":"4-35. The moving force must attempt to cross any obstacles it encounters without loss of momentum by","rect":[107.98998260498047,112.4921875,539.9680690765381,103.3840103149414]},{"page":109,"text":"conducting hasty (in stride) breaches. Units use forward security forces in an attempt to seize intact bridges","rect":[107.97996520996094,124.01519775390625,540.0276629905701,114.90702056884766]},{"page":109,"text":"whenever possible. Lead security elements bypass or breach obstacles as quickly as possible to maintain the","rect":[107.97996520996094,135.47808837890626,539.9850130157471,126.36991119384766]},{"page":109,"text":"momentum of the movement. If lead security elements cannot overcome obstacles, commanders direct","rect":[107.97996520996094,147.00103759765626,540.0022349319459,137.89285278320313]},{"page":109,"text":"subsequent elements of the main body to breach the obstacle site. Following forces can also reduce obstacles","rect":[107.97993469238281,158.5240478515625,539.9131000022888,149.41586303710938]},{"page":109,"text":"and improve routes that hinder the unit’s sustainment flow.","rect":[107.98994445800781,169.96690368652345,344.3717908859253,160.87875366210938]},{"page":109,"text":"Find the Enemy","rect":[90.0,194.60069274902345,165.0669651031494,184.79554748535157]},{"page":109,"text":"4-36. Units gain and maintain enemy contact to further shape operations for a movement to contact. All","rect":[108.0,212.154296875,539.9494395217896,203.04611206054688]},{"page":109,"text":"information collection assets focus on determining an enemy force’s disposition and providing units with","rect":[108.0,223.6171875,539.9496364593506,214.50894165039063]},{"page":109,"text":"current intelligence and relevant combat information; this ensures that they can commit friendly forces under","rect":[107.98999786376953,235.14019775390626,540.0344750938416,226.03201293945313]},{"page":109,"text":"optimal conditions. Units use all available sources of combat information to find an enemy force’s location","rect":[107.98998260498047,246.6632080078125,539.9501857757568,237.55502319335938]},{"page":109,"text":"and disposition. Corps and divisions leverage collection assets from organic, attached, and direct support","rect":[107.97997283935547,258.12603759765627,540.0513682327271,249.01785278320313]},{"page":109,"text":"units; special operations forces; and joint and multinational assets to gain contact with enemy forces. BCTs","rect":[107.97997283935547,269.6490478515625,539.8719012718201,260.5308532714844]},{"page":109,"text":"and their subordinate battalions use their organic reconnaissance assets to gain contact. This contact may be","rect":[107.95993041992188,281.17205810546877,540.0230989532471,272.0638732910156]},{"page":109,"text":"in any of eight forms (see paragraphs 1-60 through 1-68 for a discussion on the nine forms of contact). Units","rect":[107.95993041992188,292.63494873046877,539.8920428733826,283.5267639160156]},{"page":109,"text":"use information collection systems to cue aerial and ground reconnaissance by their attached BCTs and","rect":[107.95994567871094,304.1579284667969,540.0433254241943,295.0497131347656]},{"page":109,"text":"combat aviation brigades.","rect":[107.94990539550781,315.6809387207031,211.01262950897218,306.57275390625]},{"page":109,"text":"4-37. The enemy situation becomes clearer as the unit’s forward security elements conduct actions on contact","rect":[107.94989776611328,333.14581298828127,539.9241099319459,324.0376281738281]},{"page":109,"text":"to develop the situation in accordance with their commander’s intent and plan. By determining the strength,","rect":[107.93987274169922,344.6687927246094,539.9232130050659,335.56060791015627]},{"page":109,"text":"location, and disposition of enemy forces, these security elements allow units to focus the effects of the main","rect":[107.93987274169922,356.1316833496094,539.9851589202881,347.02349853515627]},{"page":109,"text":"body’s combat power against the enemy main body. The overall force must remain flexible to exploit both","rect":[107.93987274169922,367.6546630859375,539.9069728851318,358.5464782714844]},{"page":109,"text":"intelligence and combat information. The security force should not allow an enemy force to break contact","rect":[107.93987274169922,379.17767333984377,539.9138560256959,370.0694885253906]},{"page":109,"text":"unless it receives an order from the friendly force commander. When a strong covering force has not preceded","rect":[107.93987274169922,390.64056396484377,540.0454006195068,381.5323791503906]},{"page":109,"text":"the advance guard, the advance guard should seize terrain that offers essential observation.","rect":[107.93987274169922,402.1635437011719,470.54763317108157,393.05535888671877]},{"page":109,"text":"4-38. The unit’s security force often gains a tactical advantage over an enemy force by using tempo and","rect":[107.92984771728516,419.68853759765627,539.9042873382568,410.5803527832031]},{"page":109,"text":"initiative to conduct actions on contact, allowing it to gain and maintain contact without becoming decisively","rect":[107.92985534667969,431.1513977050781,539.9922389984131,422.043212890625]},{"page":109,"text":"engaged. Decisively engaged is when a fully committed force or unit cannot maneuver or extricate itself.","rect":[107.92985534667969,442.67437744140627,539.9822950363159,433.5661926269531]},{"page":109,"text":"Once the lead elements of a force conducting a movement to contact encounter an enemy force, they conduct","rect":[107.93987274169922,454.1973876953125,540.0273203811646,445.0892028808594]},{"page":109,"text":"actions on contact. The unit treats obstacles like any other form of enemy contact, since it assumes that the","rect":[107.93991088867188,465.6602783203125,539.8730745391846,456.5520935058594]},{"page":109,"text":"enemy force has covered these obstacles by fire. The unit carries out actions on contact regardless of whether","rect":[107.93990325927735,477.18328857421877,539.9762475547791,468.0751037597656]},{"page":109,"text":"the enemy force has detected its presence. How quickly the unit develops the situation is directly related to","rect":[107.93983459472656,488.706298828125,539.8663845062256,479.5981140136719]},{"page":109,"text":"its security. This tempo is directly related to the unit’s previous training to execute SOPs and drills.","rect":[107.93990325927735,500.169189453125,505.1166944503784,491.0610046386719]},{"page":109,"text":"Fix the Enemy","rect":[90.0,524.720703125,158.35708045959474,514.91552734375]},{"page":109,"text":"4-39. On contact, the main body brings overwhelming fires on enemy forces to prevent the enemy forces","rect":[108.0,542.2742919921875,540.0272967796326,533.1661376953125]},{"page":109,"text":"from conducting either a spoiling attack, organizing a coherent defense, or withdrawing. With the enemy","rect":[108.00000762939453,553.7371826171875,539.9652004241943,544.6290283203125]},{"page":109,"text":"fixed, the security force maneuvers quickly to find gaps in the enemy force’s defenses. Units use information","rect":[108.0,565.2601928710938,539.9747219085693,556.1520385742188]},{"page":109,"text":"collection assets to gain as much information as possible about the enemy force’s dispositions, strengths,","rect":[108.0,576.783203125,539.9999341964722,567.675048828125]},{"page":109,"text":"capabilities, and intentions. As more intelligence becomes available, the main body attacks to destroy the","rect":[108.0,588.2460327148438,540.0773592071533,579.1378784179688]},{"page":109,"text":"enemy. The higher headquarters of the unit conducting the movement to contact conducts countermobility","rect":[108.01000213623047,599.76904296875,539.9131374359131,590.660888671875]},{"page":109,"text":"operations to prevent enemy reserves from moving to counter the unit’s actions.","rect":[108.01001739501953,611.2920532226563,427.9737501144409,602.1838989257813]},{"page":109,"text":"4-40. The security force does not allow enemy security and main body forces to maneuver against the","rect":[108.01001739501953,628.7569580078125,540.0692415313721,619.6488037109375]},{"page":109,"text":"friendly main body. The security force’s organization, size, and combat power are major factors that","rect":[108.01001739501953,640.2799072265625,539.9612803421021,631.1616821289063]},{"page":109,"text":"determine the size of the enemy force it can defeat or fix in place without deploying the main body.","rect":[108.01001739501953,651.8029174804688,505.91213512420657,642.6947631835938]},{"page":109,"text":"4-41. Units use aerial maneuver and fire support assets to fix enemy forces in their current positions by","rect":[108.01001739501953,669.267822265625,539.9785671234131,660.1596069335938]},{"page":109,"text":"directly attacking enemy maneuver elements and command and control systems and emplacing situational","rect":[108.01000213623047,680.790771484375,540.0213999710084,671.6826171875]},{"page":109,"text":"obstacles. The typical priorities are to attack—","rect":[108.0,692.3137817382813,294.9090385437012,683.2056274414063]},{"page":109,"text":" Enemy forces in contact.","rect":[133.1999969482422,705.7742919921875,250.66149425506593,696.6661376953125]},{"page":109,"text":" Enemy command and control (C2) and fire direction control facilities.","rect":[133.1999969482422,719.2742919921875,431.61675548553469,710.1661376953125]},{"page":109,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":109,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":109,"text":"4-7","rect":[508.97100830078127,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":110,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":110,"text":" Enemy fire support assets.","rect":[115.19999694824219,83.51434326171875,238.78271007537843,74.40616607666016]},{"page":110,"text":" Moving enemy forces not yet in contact, such as follow-on forces and reserves.","rect":[115.19999694824219,97.01434326171875,450.27288341522219,87.90616607666016]},{"page":110,"text":"4-42. Attack priorities vary with mission variables. Attack rotary- and fixed-wing aircraft can engage enemy","rect":[90.0037841796875,114.47918701171875,522.0331325531006,105.37100982666016]},{"page":110,"text":"forces throughout the depth of an assigned area (if the suppression of enemy air defenses can reduce the risk","rect":[90.0037841796875,126.002197265625,522.0411281585693,116.8940200805664]},{"page":110,"text":"to aircraft to an acceptable degree).","rect":[90.0037841796875,137.52520751953126,231.1054334640503,128.41702270507813]},{"page":110,"text":"4-43. The techniques units employ to fix enemy forces when both forces are moving differ from those","rect":[90.0037841796875,154.99005126953126,522.0742464141846,145.88186645507813]},{"page":110,"text":"employed when enemy forces are stationary during a meeting engagement. In both situations, when the","rect":[90.00379943847656,166.5130615234375,521.9827547149658,157.40487670898438]},{"page":110,"text":"security force cannot overrun enemy forces by conducting a hasty frontal attack, units deploy a portion of","rect":[90.00379943847656,178.03607177734376,521.9640405235291,168.92788696289063]},{"page":110,"text":"their main body. When this occurs, the unit transitions to an attack and is no longer conducting a movement","rect":[90.0037841796875,189.49896240234376,522.0822520217896,180.39077758789063]},{"page":110,"text":"to contact.","rect":[89.99378967285156,198.99794006347657,131.6789960861206,192.91580200195313]},{"page":110,"text":"Finish the Enemy","rect":[72.0,225.62071228027345,154.39170265197755,215.81556701660157]},{"page":110,"text":"4-44. If possible, friendly security forces overwhelm enemy security forces by executing a frontal attack to","rect":[90.0,243.11431884765626,521.9048976898193,234.00613403320313]},{"page":110,"text":"make contact with the enemy main body. If this is not possible, friendly security forces fix enemy security","rect":[90.0,254.6373291015625,522.0643825531006,245.52914428710938]},{"page":110,"text":"forces and the main body conducts a penetration or envelopment of the enemy security forces. This makes","rect":[89.98994445800781,266.16033935546877,522.0445086936951,257.0521545410156]},{"page":110,"text":"the main body the main effort of the movement to contact and is a key reason why units ensure that their","rect":[89.98999786376953,277.6231689453125,521.9021508750916,268.5149841308594]},{"page":110,"text":"main bodies avoid enemy engagement until a time and place of their choosing. They maneuver their main","rect":[89.98998260498047,289.1462097167969,521.9609279632568,280.03802490234377]},{"page":110,"text":"bodies at a tempo the enemy force cannot match. They do this to overwhelm the enemy before it can react","rect":[89.98998260498047,300.669189453125,521.9946055374146,291.5610046386719]},{"page":110,"text":"effectively or reinforce. Units attempt to defeat the enemy security force in detail while still maintaining the","rect":[89.98998260498047,312.132080078125,522.0724763946533,303.0238952636719]},{"page":110,"text":"momentum of the advance, until the unit makes contact with the enemy main body.","rect":[90.0,323.65509033203127,423.5880079269409,314.5469055175781]},{"page":110,"text":"4-45. If the main body initiates a frontal attack, it deploys rapidly to the vicinity of the line of contact.","rect":[90.0,341.1800537109375,522.0113477706909,332.0718688964844]},{"page":110,"text":"Commanders of maneuvering units coordinate forward passage through friendly forces in contact as required.","rect":[89.97994995117188,352.6429443359375,522.1161451339722,343.5347595214844]},{"page":110,"text":"The intent is to deliver the assault before the enemy force can deploy or reinforce its engaged forces.","rect":[89.97994995117188,364.16595458984377,521.9915723800659,355.0577697753906]},{"page":110,"text":"Commanders may order an attack from a march column. They can also wait to attack until they can deploy","rect":[89.97994995117188,375.6288146972656,521.9711818695068,366.5206298828125]},{"page":110,"text":"forward the bulk of their main body. They avoid piecemeal commitment, except when rapid action is","rect":[89.97994995117188,387.15179443359377,522.0270526390076,378.0436096191406]},{"page":110,"text":"essential, their units have combat superiority and can maintain that superiority throughout their attacks, or","rect":[89.97994995117188,398.6748046875,521.9421289024353,389.5666198730469]},{"page":110,"text":"when the terrain forces that COA.","rect":[89.96990203857422,408.1236877441406,225.49846935272218,401.0295104980469]},{"page":110,"text":"4-46. Units attempting an envelopment focus on attacking the enemy force’s flanks and rear before the","rect":[89.96992492675781,427.6627197265625,522.0173006134033,418.5545349121094]},{"page":110,"text":"enemy force can prepare to counter these actions. They use security forces to fix enemy forces while their","rect":[89.95990753173828,439.1856994628906,521.9539697227478,430.0775146484375]},{"page":110,"text":"main bodies maneuver to look for an assailable flank. Alternatively, they use their main body to fix the enemy","rect":[89.95990753173828,450.6485595703125,522.0370998382568,441.5403747558594]},{"page":110,"text":"force while their reserve finds an assailable flank.","rect":[89.95990753173828,460.14752197265627,288.8338575363159,453.0633850097656]},{"page":110,"text":"4-47. If the enemy force is not rapidly defeated, commanders have three options: bypass, transition to a","rect":[89.94989776611328,479.6865234375,521.9900178985596,470.5783386230469]},{"page":110,"text":"deliberate attack, or conduct a defense. In all cases, they make every effort to retain the initiative by","rect":[89.94989776611328,491.1493835449219,521.9428005218506,482.04119873046877]},{"page":110,"text":"conducting violent and resolute attacks and preventing enemy forces from countering them. Simultaneously,","rect":[89.94989776611328,502.6723937988281,521.9860792160034,493.564208984375]},{"page":110,"text":"units maintain momentum by synchronizing the actions of friendly maneuver, functional and multifunctional","rect":[89.94989776611328,514.1953735351563,522.0591196975709,505.0871887207031]},{"page":110,"text":"support, and sustainment elements.","rect":[89.94989776611328,525.6382446289063,230.27501964569093,516.5501098632813]},{"page":110,"text":"Follow Through","rect":[72.0,550.220703125,148.12322080993654,540.5912475585938]},{"page":110,"text":"4-48. After a successful attack, friendly forces either continue movement to their final objective or they","rect":[90.0,567.7742919921875,521.9943752288818,558.6560668945313]},{"page":110,"text":"conduct a hasty defense to consolidate and reorganize before continuing. If the location of the enemy main","rect":[90.0,579.2371826171875,521.9529933929443,570.1290283203125]},{"page":110,"text":"body is still unclear and friendly forces have not reached their limit of advance, the unit resumes their","rect":[90.0,590.7601928710938,522.0323998985291,581.6520385742188]},{"page":110,"text":"movement to contact.","rect":[90.00003814697266,600.2591552734375,176.38447093963624,594.177001953125]},{"page":110,"text":"VARIATIONS FOR A MOVEMENT TO CONTACT","rect":[72.0,627.5697021484375,394.2795547142029,617.8955078125]},{"page":110,"text":"4-49. Movement to contact has two variations: search and attack and cordon and search. Paragraphs 4-50","rect":[90.0,647.874267578125,521.9622707366943,638.76611328125]},{"page":110,"text":"through 4-82 further discuss these variations.","rect":[89.99002075195313,659.337158203125,270.5113477706909,650.22900390625]},{"page":110,"text":"SEARCH AND ATTACK","rect":[72.0,682.739990234375,180.6461305618286,674.4359741210938]},{"page":110,"text":"4-50. Search and attack is a variation of a movement to contact where a friendly force conducts","rect":[90.0,702.654296875,522.0463397483826,693.7064208984375]},{"page":110,"text":"coordinated attacks to defeat a distributed enemy force. Units employ this variation of a movement to","rect":[90.0000228881836,714.1773071289063,522.0023097991943,705.0691528320313]},{"page":110,"text":"4-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":110,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":110,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":111,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":111,"text":"contact when enemy forces are operating as small, dispersed elements, and the units cannot target them by","rect":[108.0,83.51434326171875,539.9586086273193,74.40616607666016]},{"page":111,"text":"any methods other than a physical search. Units may also use a search and attack when the task is to deny","rect":[108.0,94.97723388671875,540.0132961273193,85.86905670166016]},{"page":111,"text":"enemy forces the ability to move within a given area. Primarily, dismounted infantry forces conduct a search","rect":[107.98998260498047,106.500244140625,539.9583034515381,97.3920669555664]},{"page":111,"text":"and attack. Armored, mechanized, and Stryker-equipped forces often support dismounted infantry","rect":[107.98998260498047,118.023193359375,539.9662380218506,108.9150161743164]},{"page":111,"text":"performing this task. A search and attack often occurs during the conduct of irregular warfare. However, it","rect":[107.98998260498047,129.486083984375,539.9614024124146,120.3779067993164]},{"page":111,"text":"may also be necessary when conducting noncontiguous operations during combat operations and","rect":[107.97993469238281,141.00909423828126,539.9264430999756,131.90090942382813]},{"page":111,"text":"consolidating gains.","rect":[107.97993469238281,152.5321044921875,188.00466442108155,143.42391967773438]},{"page":111,"text":"4-51. All echelons can conduct search and attack operations. However, a division rarely conducts search and","rect":[107.97993469238281,169.9969482421875,540.0172634124756,160.88876342773438]},{"page":111,"text":"attack operations simultaneously throughout its assigned area. BCTs, maneuver battalions, and companies","rect":[107.97993469238281,181.51995849609376,539.9632098655701,172.41177368164063]},{"page":111,"text":"normally conduct search and attack operations. BCTs assist their subordinate maneuver battalions conducting","rect":[107.97993469238281,193.04296875,540.0302639007568,183.93478393554688]},{"page":111,"text":"a search and attack by ensuring the availability of indirect fires and other support.","rect":[107.97991180419922,204.505859375,434.4827833175659,195.39767456054688]},{"page":111,"text":"Organization of Forces for a Search and Attack","rect":[90.0,229.10069274902345,313.3232635345459,219.29554748535157]},{"page":111,"text":"4-52. Commander’s task-organize into reconnaissance, fixing, and finishing forces, each with a specific task","rect":[108.0,246.654296875,539.9714260101318,237.54611206054688]},{"page":111,"text":"and purpose. Alternatively, all units can be involved in the reconnaissance effort with individual subordinate","rect":[108.01001739501953,258.1171875,539.9522981719971,249.00900268554688]},{"page":111,"text":"elements performing the fixing and finishing functions based on the situation.","rect":[108.01001739501953,269.64019775390627,418.85760021209719,260.5320129394531]},{"page":111,"text":"4-53. Commanders base the size of their reconnaissance forces on available information about the size of","rect":[108.01001739501953,285.1511535644531,539.9907128868103,278.0569763183594]},{"page":111,"text":"enemy forces in their assigned areas, and the size of these assigned areas in terms of the geography and the","rect":[107.99999237060547,298.6280517578125,539.9712190704346,289.5198669433594]},{"page":111,"text":"size of the civilian population. The more uncertainty that exists within a situation, the larger the","rect":[107.9899673461914,310.1510314941406,540.0794344024658,301.0428466796875]},{"page":111,"text":"reconnaissance force. A reconnaissance force typically consists of scout, infantry, aviation, and","rect":[107.9899673461914,321.6740417480469,540.0454616546631,312.56585693359377]},{"page":111,"text":"electromagnetic warfare assets. A fixing force must have enough combat power to isolate enemy forces once","rect":[107.9899673461914,333.13690185546877,540.0655794219971,324.0287170410156]},{"page":111,"text":"the reconnaissance force finds them. The finishing force is normally the main body of that echelon. It must","rect":[107.9899673461914,344.659912109375,539.9738535842896,335.5517272949219]},{"page":111,"text":"have enough combat power to defeat the enemy forces expected within its assigned area. Commanders can","rect":[107.9899673461914,356.122802734375,540.0102443695068,347.0146179199219]},{"page":111,"text":"direct subordinate units to retain their own finishing force, or they can retain direct control of the finishing","rect":[107.98994445800781,367.6457824707031,539.9489040374756,358.53759765625]},{"page":111,"text":"force. Units may also rotate subordinate elements through the reconnaissance, fixing, and finishing roles.","rect":[107.98994445800781,379.1687927246094,539.9982862472534,370.06060791015627]},{"page":111,"text":"However, rotating roles may require a change in task organization and additional time for training and","rect":[107.98994445800781,390.63165283203127,539.9432277679443,381.5234680175781]},{"page":111,"text":"rehearsal.","rect":[107.98999786376953,400.130615234375,146.60906505584718,393.0464782714844]},{"page":111,"text":"Control Measures for a Search and Attack","rect":[90.0,424.5447082519531,289.77449644470217,416.946533203125]},{"page":111,"text":"4-54. Units establish control measures that allow decentralized action and small-unit initiative to the greatest","rect":[108.0,444.2943115234375,540.0303721389771,435.1861267089844]},{"page":111,"text":"extent possible. Figure 4-3 on page 4-10 depicts the minimum control measures for a search and attack which","rect":[108.0,455.7572021484375,539.9740505218506,446.6490173339844]},{"page":111,"text":"include an assigned area, target reference points (TRPs), objectives, checkpoints, and contact points. The use","rect":[107.98999786376953,467.2801818847656,539.9932527618408,458.1619873046875]},{"page":111,"text":"of target reference points facilitates responsive fire support upon making contact with enemy forces. They","rect":[107.98998260498047,478.7430725097656,540.0267238616943,469.6348876953125]},{"page":111,"text":"use objectives and checkpoints to guide the movement of subordinate elements. They use other control","rect":[107.98998260498047,490.2660827636719,539.9422373733521,481.14788818359377]},{"page":111,"text":"measures, such as phase lines and named areas of interest (NAIs), as necessary. (Appendix A discusses these","rect":[107.98999786376953,501.7890625,539.9990511016846,492.6808776855469]},{"page":111,"text":"common control measures.)","rect":[107.98999786376953,513.23193359375,219.3853356895447,504.1437683105469]},{"page":111,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":111,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":111,"text":"4-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":112,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":112,"text":"Figure 4-3. Search and attack control measures","rect":[184.4399871826172,397.3141784667969,409.5553731842041,387.9254455566406]},{"page":112,"text":"Planning a Search and Attack","rect":[72.0,427.8807067871094,212.50444639587404,418.0755920410156]},{"page":112,"text":"4-55. Units conduct a search and attack for one or more of the following purposes:","rect":[90.0,445.4342956542969,422.0068736038208,436.32611083984377]},{"page":112,"text":" Destroy enemy forces: render enemy forces in an assigned area combat ineffective.","rect":[115.19999694824219,458.9342956542969,465.9351758956909,449.82611083984377]},{"page":112,"text":" Deny the area: prevent enemy forces from operating unhindered in a given area, for example, in","rect":[115.19999694824219,472.4342956542969,521.9869899749756,463.32611083984377]},{"page":112,"text":"any area that the enemy is using for a base camp or for logistics support.","rect":[133.1999969482422,483.9573059082031,422.9244337081909,474.84912109375]},{"page":112,"text":" Protect the force: prevent enemy forces from massing to disrupt or destroy friendly military or","rect":[115.19999694824219,497.45428466796877,521.9468896446228,488.3460998535156]},{"page":112,"text":"civilian operations, equipment, property, and facilities.","rect":[133.1999969482422,508.91717529296877,352.2441053390503,499.8089904785156]},{"page":112,"text":" Collect information: gain information about enemy forces and the terrain to confirm the enemy","rect":[115.19999694824219,522.414306640625,521.9240627288818,513.30615234375]},{"page":112,"text":"COA predicted by the IPB process.","rect":[133.1999969482422,533.937255859375,274.2925977706909,524.8291015625]},{"page":112,"text":"The products of the IPB process are critical to conducting a search and attack. They focus the force’s","rect":[90.00376892089844,548.4562377929688,522.1162860374451,539.3480834960938]},{"page":112,"text":"reconnaissance efforts on likely enemy locations.","rect":[89.9937515258789,559.9191284179688,287.19842052459719,550.8109741210938]},{"page":112,"text":"4-56. The search and attack plan places the finishing force, as the main effort, where it can best maneuver to","rect":[89.9937515258789,577.43408203125,521.9689846038818,568.325927734375]},{"page":112,"text":"destroy enemy forces or essential facilities once located by reconnaissance assets. Typically, the finishing","rect":[90.00379943847656,588.9570922851563,521.9824733734131,579.8489379882813]},{"page":112,"text":"force occupies a central location in an assigned area. However, the terrain may allow units to position their","rect":[90.00377655029297,600.4199829101563,522.0019433555603,591.3118286132813]},{"page":112,"text":"finishing forces outside search and attack areas. Commanders weight their main effort by using priority of","rect":[90.00377655029297,611.9429931640625,521.9506127891541,602.8348388671875]},{"page":112,"text":"fires and assigning priorities of support to available combat enablers, such as engineer elements and","rect":[90.00377655029297,623.4659423828125,522.0270900726318,614.3577880859375]},{"page":112,"text":"helicopter lift support. Units establish control measures as necessary to consolidate and reorganize and","rect":[90.00376892089844,634.9288330078125,522.0162258148193,625.8206787109375]},{"page":112,"text":"concentrate the combat power of the force before the attack. Once a reconnaissance force locates an enemy","rect":[90.00376892089844,646.4518432617188,522.0421657562256,637.3436889648438]},{"page":112,"text":"force, fixing and finishing forces can destroy it. Units also develop contingency plans in the event of the","rect":[90.01377868652344,657.974853515625,521.9941682891846,648.86669921875]},{"page":112,"text":"compromise of their reconnaissance force.","rect":[90.01378631591797,669.417724609375,259.66836071014407,660.32958984375]},{"page":112,"text":"4-57. Fire support plans must provide flexible and rapidly delivered fires to achieve their commander’s","rect":[90.01378631591797,686.9526977539063,522.0661761741638,677.8445434570313]},{"page":112,"text":"desired effects throughout an assigned area. Units position fire support assets so they can support subordinate","rect":[90.00379943847656,698.4155883789063,521.9798860626221,689.3074340820313]},{"page":112,"text":"elements throughout their assigned areas. They must establish procedures for rapidly clearing fires. To clear","rect":[90.0037841796875,709.9385986328125,522.0342919883728,700.8304443359375]},{"page":112,"text":"4-10","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":112,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":112,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":113,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":113,"text":"fires rapidly, command posts and small-unit commanders track and report the locations of all subordinate","rect":[108.0,83.51434326171875,540.0434846954346,74.40616607666016]},{"page":113,"text":"elements. Because of the uncertain enemy situation, units assign clear fire support relationships.","rect":[108.0000228881836,94.97723388671875,492.10760021209719,85.86905670166016]},{"page":113,"text":"Executing a Search and Attack","rect":[90.0,119.60069274902344,235.4234832611084,109.79554748535156]},{"page":113,"text":"4-58. Each subordinate element operating in its own assigned area searches for and attacks enemy forces","rect":[108.0,137.154296875,540.0904071311951,128.04611206054688]},{"page":113,"text":"within its capability. Units may enter an assigned area by infiltrating as an entire unit and then splitting out","rect":[107.9899673461914,148.6171875,539.9200205764771,139.50900268554688]},{"page":113,"text":"or by infiltrating as smaller units via ground, air, or water. Units should use previously established control","rect":[107.9899673461914,160.14019775390626,540.0123057327271,151.03201293945313]},{"page":113,"text":"measures and communications means between any closing elements to prevent fratricide and friendly fire","rect":[107.98994445800781,171.6632080078125,539.9407014923096,162.55502319335938]},{"page":113,"text":"incidents. The reconnaissance force conducts an area reconnaissance to reconnoiter identified named areas","rect":[107.98999786376953,181.1020050048828,539.9225604515076,174.01785278320313]},{"page":113,"text":"of interests.","rect":[107.98998260498047,192.62501525878907,154.7152509689331,185.54086303710938]},{"page":113,"text":"4-59. Once the reconnaissance force finds enemy forces, the fixing force develops the situation and executes","rect":[108.0,212.174072265625,539.9964129905701,203.06588745117188]},{"page":113,"text":"one of two options based on the commander’s guidance and the mission variables. The first option is to block","rect":[107.98997497558594,223.63690185546876,539.9869289398193,214.52865600585938]},{"page":113,"text":"identified routes that the detected enemy forces can use to escape or employ reinforcements. The fixing force","rect":[107.98999786376953,235.159912109375,540.0573396759033,226.05160522460938]},{"page":113,"text":"maintains contact with enemy forces and positions to isolate and fix enemy forces before the finishing force","rect":[107.99000549316406,246.68292236328126,539.9349641876221,237.57473754882813]},{"page":113,"text":"attacks. The second option is to conduct an attack to fix enemy forces in their current positions until the","rect":[107.99000549316406,258.14581298828127,540.0564851837158,249.03762817382813]},{"page":113,"text":"finishing force arrives. The fixing force attacks if it meets the commander’s intent and if it can generate","rect":[107.99002075195313,269.6688232421875,540.0444612579346,260.5606384277344]},{"page":113,"text":"sufficient combat power against detected enemy forces. Units may need to position the fixing force before","rect":[107.99002075195313,281.1917724609375,539.9619417266846,272.0835876464844]},{"page":113,"text":"the reconnaissance force enters an assigned area, depending on the enemy force’s mobility and the probability","rect":[107.99002075195313,292.6546630859375,539.9161891937256,283.5464782714844]},{"page":113,"text":"of the compromise of the reconnaissance force.","rect":[107.99002075195313,304.1576232910156,297.1535596847534,295.0694885253906]},{"page":113,"text":"4-60. BCTs (and possibly battalions) may establish fire support bases to provide fire support coverage","rect":[107.99002075195313,321.692626953125,539.9762239532471,312.5844421386719]},{"page":113,"text":"throughout an assigned area during search and attack operations in complex terrain. These positions should","rect":[107.99002838134766,333.155517578125,539.9345607757568,324.0473327636719]},{"page":113,"text":"be mutually supporting and prepared for all around defense. Fire support bases are also located in positions","rect":[107.9800033569336,344.67852783203127,539.8904559593201,335.5703125]},{"page":113,"text":"that facilitate aerial resupply. The development of these positions depends on the mission variables because","rect":[107.9799575805664,356.14141845703127,539.9872713165283,347.0332336425781]},{"page":113,"text":"their establishment requires diverting combat power to protect assets in these fire support bases.","rect":[107.97994995117188,367.6643981933594,491.8461561203003,358.55621337890627]},{"page":113,"text":"4-61. If conditions are not right to use the finishing force or main body to attack detected enemy forces, the","rect":[107.98998260498047,385.18939208984377,539.9931306915283,376.0812072753906]},{"page":113,"text":"reconnaissance or the fixing force can continue to conduct reconnaissance and surveillance activities to","rect":[107.98998260498047,396.6522521972656,540.0592555999756,387.5440673828125]},{"page":113,"text":"develop the situation further. Whenever this occurs, the force maintaining surveillance must be careful to","rect":[107.98998260498047,408.1752624511719,539.9780178070068,399.06707763671877]},{"page":113,"text":"avoid detection and possible enemy ambushes.","rect":[107.98998260498047,419.6982421875,295.17266368865969,410.5900573730469]},{"page":113,"text":"4-62. The finishing force or main body may move behind the reconnaissance and fixing forces, or it may","rect":[107.98998260498047,437.1631164550781,540.0452785491943,428.054931640625]},{"page":113,"text":"locate at a pickup zone and conduct air assault movement into a landing zone near enemy forces, once enemy","rect":[107.98998260498047,448.68609619140627,539.9673976898193,439.5779113769531]},{"page":113,"text":"forces are located. The finishing force or main body must be responsive enough to engage enemy forces","rect":[107.98998260498047,460.2091064453125,539.9673602561951,451.1009216308594]},{"page":113,"text":"before they can break contact with the reconnaissance force or the fixing force. The echelon intelligence","rect":[107.98998260498047,471.6719970703125,540.0130281524658,462.5638122558594]},{"page":113,"text":"officer provides the commander with an estimate of the time it takes enemy forces to displace from their","rect":[107.98998260498047,483.19500732421877,539.9116113243103,474.0868225097656]},{"page":113,"text":"locations. The commander provides additional mobility assets, so the finishing force or main body can","rect":[107.98998260498047,494.718017578125,539.8788356781006,485.6098327636719]},{"page":113,"text":"respond within that timeframe.","rect":[107.98998260498047,506.1608581542969,231.2751111984253,497.0727233886719]},{"page":113,"text":"4-63. Units use their finishing force or main body to destroy detected and fixed enemy forces during a search","rect":[107.98998260498047,523.6959228515625,540.0432033538818,514.5877685546875]},{"page":113,"text":"and attack by conducting hasty or deliberate attacks. One unit maneuvers to block enemy escape routes while","rect":[107.98998260498047,535.2188720703125,539.9689607696533,526.1107177734375]},{"page":113,"text":"another unit conducts the attack, or units employ indirect fire or close air support to destroy enemy forces.","rect":[107.98998260498047,546.6817626953125,539.9209547042847,537.5736083984375]},{"page":113,"text":"Units may have the finishing force or main body establish area ambushes and use the reconnaissance and","rect":[107.98998260498047,558.204833984375,539.9832668304443,549.0966796875]},{"page":113,"text":"fixing forces to drive enemy forces into the ambushes.","rect":[107.98998260498047,569.727783203125,325.41506481170657,560.61962890625]},{"page":113,"text":"CORDON AND SEARCH","rect":[90.0,593.0399780273438,200.2712526321411,584.7359619140625]},{"page":113,"text":"4-64. The second variation to conduct a movement to contact is cordon and search. Cordon and search is a","rect":[108.0,610.8802490234375,539.9741725921631,603.7861328125]},{"page":113,"text":"variation of movement to contact where a friendly force isolates and searches a target area. Typically,","rect":[107.99996185302735,624.4172973632813,540.0463819503784,615.3091430664063]},{"page":113,"text":"units execute cordon and searches to capture or destroy possible enemy forces and contraband. Cordon and","rect":[107.99996185302735,635.8801879882813,540.0391750335693,626.7720336914063]},{"page":113,"text":"search operations take place throughout the range of military operations. Generally, cordon and search are","rect":[107.99996185302735,647.4031982421875,539.9352083282471,638.2950439453125]},{"page":113,"text":"conducted during stability operations or situations where the likelihood of large-scale organized violence is","rect":[107.99996185302735,658.9261474609375,539.9260394554138,649.8179931640625]},{"page":113,"text":"unlikely. Units conducting a cordon and search organize their subordinate units into four elements—","rect":[107.99996185302735,670.3890380859375,540.0022392272949,661.2808837890625]},{"page":113,"text":"command, security, search or assault, and support. The security element must be large enough to establish","rect":[107.99996185302735,681.9120483398438,539.9332180023193,672.8038940429688]},{"page":113,"text":"both an inner and an outer cordon around the target area of the search. In that regard, cordon and search","rect":[108.0,693.43505859375,539.9761257171631,684.326904296875]},{"page":113,"text":"operations are similar to encirclements. Maneuver battalions and lower echelons normally conduct cordons","rect":[108.0,704.89794921875,540.0985858421326,695.789794921875]},{"page":113,"text":"and searches.","rect":[108.0,714.3969116210938,161.32143688201905,707.3128051757813]},{"page":113,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":113,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":113,"text":"4-11","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":114,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":114,"text":"4-65. Cordon and search operations occur in five phases: reconnaissance, movement to the objective, cordon","rect":[90.0,83.51434326171875,521.9672145843506,74.39614868164063]},{"page":114,"text":"establishment, search, and retrograde. These phases are descriptive of a cordon and search and are not","rect":[90.0,94.97723388671875,522.0724253616334,85.86905670166016]},{"page":114,"text":"prescriptive.","rect":[90.01002502441406,106.48020935058594,139.73528575897218,97.3920669555664]},{"page":114,"text":"4-66. The reconnaissance phase is initiated upon receipt of mission and continues throughout the planning","rect":[90.0200424194336,124.02520751953125,521.9540309906006,114.91703033447266]},{"page":114,"text":"process. Planners conduct intelligence preparation of the battlefield, develop a scheme of maneuver, and","rect":[90.0199966430664,135.48809814453126,522.0383815765381,126.37992095947266]},{"page":114,"text":"refine the plan. The friendly force performs the necessary reconnaissance to gain information and complete","rect":[90.02002716064453,147.0111083984375,521.9582796173096,137.90292358398438]},{"page":114,"text":"the plan. A complete order is issued, allowing time for leaders to develop subordinate plans and conduct","rect":[90.02002716064453,158.5340576171875,522.0741953811646,149.42587280273438]},{"page":114,"text":"rehearsals. The planning phase ends when rehearsals, pre-combat checks, and inspections are complete, and","rect":[90.02002716064453,169.9969482421875,521.9742336273193,160.88876342773438]},{"page":114,"text":"the unit crosses the LD.","rect":[90.00997924804688,179.4959259033203,184.79918956756593,172.41177368164063]},{"page":114,"text":"4-67. Movement to the objective area occurs as a single unit or in separate serials sequenced along differing","rect":[90.0199966430664,199.044921875,521.9870510101318,189.92672729492188]},{"page":114,"text":"routes. Leaders consider terrain and threat assessments to determine appropriate movement formations and","rect":[90.0199966430664,210.48777770996095,522.0331935882568,201.39962768554688]},{"page":114,"text":"techniques. The movement phase ends when the security element reaches its release point and begins","rect":[90.0,222.03082275390626,522.0249164085388,212.92263793945313]},{"page":114,"text":"establishing the cordon.","rect":[90.0,233.49371337890626,185.24712657928468,224.38552856445313]},{"page":114,"text":"4-68. Establishing a cordon entails emplacing an outer and inner cordon, simultaneously or sequentially. The","rect":[90.0,251.0186767578125,522.0953645782471,241.91049194335938]},{"page":114,"text":"cordon is considered established when the objective area is isolated, and it continues until the force","rect":[90.0,262.54168701171877,522.0023470001221,253.42349243164063]},{"page":114,"text":"commences retrograde. Leaders consider allocating priority of intelligence, reconnaissance, surveillance,","rect":[90.0000228881836,274.00457763671877,522.0423536300659,264.8963928222656]},{"page":114,"text":"fires, and nonlethal assets to the cordon element once the cordon is established.","rect":[90.0,284.0,407.20415782928469,276.4194030761719]},{"page":114,"text":"4-69. Clearing the objective area and searching target areas occur once the objective area is isolated. Forces","rect":[90.0,303.0425109863281,522.0979144554138,293.92431640625]},{"page":114,"text":"may undertake additional activity after the objective is clear, including tactical questioning, site exploitation,","rect":[90.0,314.50537109375,522.0685987472534,305.3871765136719]},{"page":114,"text":"providing medical attention to local nationals, communicating with local leaders, and conducting other","rect":[90.0,326.02838134765627,522.0243432579041,316.9201965332031]},{"page":114,"text":"influence activities. The amount of time spent at an objective area depends on factors including the size of","rect":[90.0,337.5513916015625,521.9792993125916,328.4331970214844]},{"page":114,"text":"the objective, the number of adversaries to vet, the amount of material of likely intelligence-value present,","rect":[90.0,349.0142517089844,522.0303297042847,339.89605712890627]},{"page":114,"text":"the presence of explosive hazards, and the size and augmentation of the search element.","rect":[89.98994445800781,360.5372619628906,440.73308849334719,351.4290771484375]},{"page":114,"text":"4-70. The enemy may force cordon and search operations, or a unit may execute them voluntarily. A","rect":[89.9999771118164,378.0622253417969,522.0283856430053,368.95404052734377]},{"page":114,"text":"retrograde is a transitional operation; it is not conducted in isolation. Stay-behind reconnaissance forces may","rect":[90.0,389.5251159667969,522.0132961273193,380.41693115234377]},{"page":114,"text":"be employed to observe activity for a period after the cordon and search force departs the objective area.","rect":[89.98998260498047,401.048095703125,521.9075269699097,391.9299011230469]},{"page":114,"text":"Retrograde is not complete until all personnel, including stay-behind forces, arrive in the designated assembly","rect":[89.98998260498047,412.5711364746094,521.9650173187256,403.46295166015627]},{"page":114,"text":"area. Retrograde is the most vulnerable phase of cordon and search operations, possibly rife with personnel","rect":[89.9800033569336,424.0340881347656,522.0220103225709,414.9259033203125]},{"page":114,"text":"accountability issues and interdiction by enemy forces along anticipated retrograde routes. Leaders strongly","rect":[89.9799575805664,435.5570983886719,522.0073146820068,426.44891357421877]},{"page":114,"text":"consider using intelligence, surveillance, and reconnaissance and joint fires assets to support the retrograde.","rect":[89.97997283935547,447.0801086425781,522.0253858566284,437.9619140625]},{"page":114,"text":"(See Chapter 11 for additional information on retrograde operations.)","rect":[89.97997283935547,458.5429992675781,366.8626916465759,449.434814453125]},{"page":114,"text":"Principles for a Cordon and Search","rect":[72.0,483.0587463378906,238.49849546813966,473.27557373046877]},{"page":114,"text":"4-71. The principles of cordon and search are comprehensive and fundamental rules to guide battalions. The","rect":[90.0,500.6343078613281,522.0163240509033,491.526123046875]},{"page":114,"text":"principles are not a checklist. While the commander considers these principles, they do not apply in the same","rect":[90.00003814697266,512.0972290039063,522.0057649688721,502.989013671875]},{"page":114,"text":"way to every situation. Instead, the principles summarize characteristics of successful cordon and search","rect":[90.0,523.6201782226563,522.0674343109131,514.5120239257813]},{"page":114,"text":"operations. For the unit, the value in these principles lies in analyzing a pending operation while","rect":[90.0,535.1431884765625,521.9781770782471,526.0350341796875]},{"page":114,"text":"synchronizing efforts and determining if or when to deviate from the principles based on the current situation.","rect":[90.0,546.6060791015625,522.0555372238159,537.4979248046875]},{"page":114,"text":"The nine principles of cordon and search are—","rect":[90.0,558.1090698242188,277.9752006530762,549.0209350585938]},{"page":114,"text":" Speed.","rect":[115.19999694824219,571.5942993164063,160.18386363983155,562.5061645507813]},{"page":114,"text":" Surprise.","rect":[115.19999694824219,585.0942993164063,169.06157970428468,576.0061645507813]},{"page":114,"text":" Isolation.","rect":[115.19999694824219,596.5902709960938,170.74492931365968,589.5061645507813]},{"page":114,"text":" Proper target identification.","rect":[115.19999694824219,612.1143188476563,243.46007823944093,603.0061645507813]},{"page":114,"text":" Timeliness.","rect":[115.19999694824219,623.5902709960938,179.62266063690186,616.5061645507813]},{"page":114,"text":" Accountability.","rect":[115.19999694824219,639.1143188476563,195.1035566329956,630.0061645507813]},{"page":114,"text":" Minimization of collateral damage.","rect":[115.19999694824219,652.6143188476563,274.3016309738159,643.5061645507813]},{"page":114,"text":" Detailed search.","rect":[115.19999694824219,664.0902709960938,197.62458324432374,657.0061645507813]},{"page":114,"text":" Legitimacy.","rect":[115.19999694824219,679.6143188476563,181.30602550506593,670.5061645507813]},{"page":114,"text":"4-12","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":114,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":114,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":115,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":115,"text":"Methods of Cordon and Search","rect":[90.0,82.42471313476563,237.2395995941162,74.82655334472656]},{"page":115,"text":"4-72. Units have two methods for conducting a cordon and search: cordon and knock and cordon and enter.","rect":[108.0,102.11431884765625,540.0223340988159,93.00614166259766]},{"page":115,"text":"The primary difference in methods is the level of force required to gain access to the target. In a cordon and","rect":[107.97997283935547,113.6373291015625,540.0634670257568,104.5291519165039]},{"page":115,"text":"knock, the search element requests or demands access to the target. In a cordon and enter, the search element","rect":[107.9699935913086,125.16033935546875,540.0004038772584,116.05216217041016]},{"page":115,"text":"accesses the target by force. Regardless of the method, search elements must be prepared to escalate force","rect":[107.9699935913086,136.6231689453125,540.0337801055908,127.5149917602539]},{"page":115,"text":"appropriately to gain access to the target. Leaders consider the terminal effects of fires and ensure friendly","rect":[107.9699935913086,148.14617919921876,539.9504299163818,139.03799438476563]},{"page":115,"text":"location awareness to prevent fratricide and limit collateral damage to the greatest extent possible.","rect":[107.97000122070313,159.669189453125,500.65383434295657,150.56100463867188]},{"page":115,"text":"Control Measures for Cordon and Search","rect":[90.0,182.08468627929688,285.8260711517334,174.4865264892578]},{"page":115,"text":"4-73.","rect":[108.0,199.75025939941407,128.8616361618042,192.8464813232422]},{"page":115,"text":"Control measures useful for conducting cordon and search","rect":[133.20030212402345,201.7742919921875,366.73851585388186,192.66610717773438]},{"page":115,"text":" Assembly area.","rect":[133.1999969482422,215.2742919921875,212.8630781173706,206.16610717773438]},{"page":115,"text":" Line of departure.","rect":[133.1999969482422,228.75425720214845,223.12356090545655,219.66610717773438]},{"page":115,"text":" Checkpoints.","rect":[133.1999969482422,242.25425720214845,203.7478895187378,233.16610717773438]},{"page":115,"text":" Contact points.","rect":[133.1999969482422,255.75425720214845,211.78492259979249,246.66610717773438]},{"page":115,"text":" Objectives.","rect":[133.1999969482422,269.2742919921875,196.48037242889405,260.1560974121094]},{"page":115,"text":" Rally points.","rect":[133.1999969482422,282.7743225097656,202.3681287765503,273.6661376953125]},{"page":115,"text":" Phase lines.","rect":[133.1999969482422,294.2502746582031,198.46534252166749,287.1661376953125]},{"page":115,"text":" Routes.","rect":[133.1999969482422,307.7502746582031,181.5475721359253,300.9867858886719]},{"page":115,"text":" Restricted fire line.","rect":[133.1999969482422,321.2502746582031,228.10351085662843,314.1661376953125]},{"page":115,"text":"include—","rect":[369.2915344238281,199.75025939941407,408.7102165222168,192.66610717773438]},{"page":115,"text":"Planning a Cordon and Search","rect":[90.0,347.90069580078127,234.8174041595459,338.0955810546875]},{"page":115,"text":"4-74. During planning (includes preparation) and reconnaissance, mission analysis is conducted through","rect":[108.0,365.45428466796877,539.9974269866943,356.3460998535156]},{"page":115,"text":"either the MDMP or troop leading procedures process, focusing on the task and purpose, intelligence","rect":[108.0,376.91717529296877,540.0553865509033,367.8089904785156]},{"page":115,"text":"preparation of the battlefield (identification of target and target areas), and tentative scheme of maneuver.","rect":[107.9999771118164,388.4401550292969,540.0781812667847,379.33197021484377]},{"page":115,"text":"Detailed direct fire plans serve as risk mitigation measures to prevent fratricide between clearing elements","rect":[107.99999237060547,399.9030456542969,539.9802997093201,390.79486083984377]},{"page":115,"text":"and the cordon. Support forces external to the battalion are task-organized and warning orders are issued. As","rect":[107.9999771118164,411.4260559082031,539.9933001976013,402.31787109375]},{"page":115,"text":"planning serves to focus the information collection effort by identifying what to look for and where to look","rect":[108.0,422.94903564453127,539.9181423187256,413.8408508300781]},{"page":115,"text":"for it, reconnaissance helps to refine the planning process by answering through collection, information","rect":[108.0,434.41192626953127,539.9510402679443,425.3037414550781]},{"page":115,"text":"requirements, and priority intelligence requirements. Although the plan is continually updated with","rect":[108.0,445.9349365234375,539.9271755218506,436.8267517089844]},{"page":115,"text":"reconnaissance and surveillance throughout the operation, this phase ends with the unit issuing the completed","rect":[108.01005554199219,457.4579162597656,539.9885158538818,448.3497009277344]},{"page":115,"text":"order, conducting final rehearsals and inspections, and crossing the LD.","rect":[108.01000213623047,468.9208068847656,394.67742443084719,459.8126220703125]},{"page":115,"text":"Preparing a Cordon and Search","rect":[90.0,493.52069091796877,240.28653562927247,483.715576171875]},{"page":115,"text":"4-75. The level of rehearsal and extent of participation depend upon the time available and the physical","rect":[108.0,511.0743103027344,539.9992442092896,501.96612548828127]},{"page":115,"text":"location of participants. Rehearsals may be full or reduced force. Multiple rehearsal types and techniques","rect":[107.99999237060547,522.5372314453125,539.9672381858826,513.4290771484375]},{"page":115,"text":"may be used in preparation for a mission. For example, confirmation briefs and backbriefs may be required","rect":[107.99999237060547,534.0601806640625,540.0164089202881,524.9520263671875]},{"page":115,"text":"following the issuance of an operation order, and a map rehearsal may be conducted via remote","rect":[107.98999786376953,545.5831909179688,540.0080843048096,536.4750366210938]},{"page":115,"text":"communications equipment or in person once subordinate elements have completed their plans.","rect":[107.98998260498047,557.0260620117188,490.05047130584719,547.9379272460938]},{"page":115,"text":"4-76. Rehearsals should address non-mission-specific tasks and mission-specific execution details and be","rect":[107.98998260498047,574.551025390625,539.9833040313721,565.462890625]},{"page":115,"text":"more than a mere discussion of what is supposed to happen. Effective rehearsals test subordinate","rect":[107.97997283935547,586.0740356445313,540.0635042266846,576.9859008789063]},{"page":115,"text":"understanding of key activities, including the spatial relationships and timing of key actions; contingencies;","rect":[107.97996520996094,597.5569458007813,539.9432139358521,588.4487915039063]},{"page":115,"text":"communication; and purpose, priorities, allocation, and resourcing of support. Leaders normally issue","rect":[107.97996520996094,609.0799560546875,540.0434236602783,599.9718017578125]},{"page":115,"text":"rehearsal guidance via published warning orders.","rect":[107.97996520996094,620.6029052734375,304.04641246795657,611.4947509765625]},{"page":115,"text":"4-77.","rect":[107.97996520996094,636.043701171875,128.84160137176515,629.1399536132813]},{"page":115,"text":"Non-mission-specific task rehearsals might include—","rect":[133.18026733398438,638.0677490234375,348.1512870788574,628.9595947265625]},{"page":115,"text":" Battle drills and other standard operating procedures, such as assaulting a building or reacting to","rect":[133.1999969482422,651.5343017578125,539.9404811859131,642.4261474609375]},{"page":115,"text":"enemy contact.","rect":[151.1999969482422,663.0572509765625,211.78193187713624,654.9510498046875]},{"page":115,"text":" Breaching obstacles and doorways.","rect":[133.1999969482422,676.5543212890625,292.30764293670657,667.4461669921875]},{"page":115,"text":" Search techniques (such as individual, vehicle, and room).","rect":[133.1999969482422,690.0343017578125,384.5207166671753,680.9461669921875]},{"page":115,"text":" Detainee and captured materiel handling and processing.","rect":[133.1999969482422,703.5543212890625,378.04778575897219,694.4461669921875]},{"page":115,"text":" Tactical callout.","rect":[133.1999969482422,715.0302734375,215.56447887420655,707.9461669921875]},{"page":115,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":115,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":115,"text":"4-13","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":116,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47740393066407,37.90802001953125]},{"page":116,"text":"4-78. Mission-specific execution activity rehearsals might include—","rect":[90.0,83.51434326171875,365.9899101257324,74.40616607666016]},{"page":116,"text":" Emplacing inner and outer cordons.","rect":[115.19999694824219,97.01434326171875,276.2725782394409,87.90616607666016]},{"page":116,"text":" Target area clearance.","rect":[115.19999694824219,110.51434326171875,221.19764232635499,101.40616607666016]},{"page":116,"text":" Retrograde from the objective area.","rect":[115.19999694824219,124.01434326171875,275.0771436691284,114.89614868164063]},{"page":116,"text":"Executing a Cordon and Search","rect":[72.0,148.58067321777345,221.68591917419435,138.77552795410157]},{"page":116,"text":"4-79. The execution of the cordon may be executed sequentially or simultaneously using single or","rect":[90.0,166.13427734375,521.9833276329041,157.02609252929688]},{"page":116,"text":"multidirectional ingress routes. The methods may be used alone or combined. For example, the outer cordon","rect":[90.0,177.65728759765626,522.0300807952881,168.54910278320313]},{"page":116,"text":"position may be occupied sequentially via a single ingress route followed by a sequential occupation of the","rect":[90.0,189.12017822265626,522.0213899688721,180.01199340820313]},{"page":116,"text":"inner cordon positions via a single ingress route. Figure 4-4 depicts the symbol for a cordon and search.","rect":[90.0,200.6431884765625,504.69582653045657,191.53500366210938]},{"page":116,"text":"4-80. The search element prepares to move to the target area during cordon emplacement. The search and","rect":[89.99000549316406,218.16815185546876,522.0132350921631,209.05996704101563]},{"page":116,"text":"assault element movement to the target area may be simultaneous, nearly simultaneous, or sequential in","rect":[89.9800033569336,229.63104248046876,521.8780422210693,220.52285766601563]},{"page":116,"text":"relation to the cordon emplacement.","rect":[89.97994995117188,241.13401794433595,234.13965892791749,232.04586791992188]},{"page":116,"text":"Figure 4-4. Cordon and search symbol","rect":[205.84121704101563,593.4772338867188,388.09702252960207,584.0885009765625]},{"page":116,"text":"4-81. When combined, the outer cordon positions may be occupied simultaneously from multidirectional","rect":[89.97997283935547,616.93408203125,521.9253306350709,607.825927734375]},{"page":116,"text":"ingress routes, followed by a sequential occupation of the inner cordon positions via a single ingress route.","rect":[89.9800033569336,628.4570922851563,521.9814405441284,619.3489379882813]},{"page":116,"text":"Figure 4-5 depicts inner and outer cordons for a battalion level cordon and search.","rect":[89.9799575805664,639.9801025390625,418.21331310272219,630.8719482421875]},{"page":116,"text":"4-14","rect":[72.1199951171875,754.0800170898438,90.07499151611329,747.6090087890625]},{"page":116,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":116,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":117,"text":"Movement to Contact","rect":[448.5,44.55902099609375,539.995779296875,37.90802001953125]},{"page":117,"text":"4-82.","rect":[107.98863983154297,445.7269287109375,128.85027599334718,438.8431701660156]},{"page":117,"text":"Figure 4-5. Example inner and outer cordons","rect":[208.86000061035157,424.3141784667969,421.1447286529541,415.015625]},{"page":117,"text":"Considerations for each cordon and search technique follow:","rect":[133.18893432617188,447.7509460449219,376.17295026397707,438.6628112792969]},{"page":117,"text":" In a sequential occupation, the security element successively occupies inner and outer cordon","rect":[133.1999969482422,461.2743225097656,539.9536037445068,452.1661376953125]},{"page":117,"text":"positions. This occupation allows for ease of control and simplicity of maneuver but accepts the","rect":[151.1999969482422,472.7973327636719,540.0610628204346,463.68914794921877]},{"page":117,"text":"risk that an alert adversary may have an opportunity to react or escape the target area.","rect":[151.19000244140626,484.3203125,493.22564220428469,475.2121276855469]},{"page":117,"text":" In a simultaneous occupation, the security element occupies cordon positions simultaneously (or","rect":[133.1999969482422,497.8143005371094,539.9938256797791,488.70611572265627]},{"page":117,"text":"near simultaneously). This occupation achieves tactical surprise in the objective and target areas","rect":[151.1999969482422,509.2771911621094,540.0171039085388,500.15899658203127]},{"page":117,"text":"and reduces the opportunity for an adversary to react or escape the target area.","rect":[151.20001220703126,520.8001708984375,463.8821973800659,511.6919860839844]},{"page":117,"text":" Using a single ingress route, the cordon and search force moves to the objective area in a column","rect":[133.1999969482422,534.2943115234375,539.9726467132568,525.1760864257813]},{"page":117,"text":"along a single route or from a single landing zone until elements reach designated release points.","rect":[151.1999969482422,545.8173217773438,539.9819288253784,536.7091674804688]},{"page":117,"text":"Using a single ingress route maximizes control but increases the time required to isolate the","rect":[151.1999969482422,557.2802124023438,539.9839143829346,548.1720581054688]},{"page":117,"text":"objective area and offers an adversary the opportunity to more easily delay joint force access to","rect":[151.1999969482422,568.80322265625,539.9859523773193,559.6849975585938]},{"page":117,"text":"the objective area.","rect":[151.1999969482422,580.2660522460938,224.25884532928468,571.1478271484375]},{"page":117,"text":"","rect":[133.1999969482422,591.025390625,139.16105696249009,586.3331909179688]},{"page":117,"text":"TRANSITIONS","rect":[90.0,676.5897216796875,186.3962928314209,666.91552734375]},{"page":117,"text":"4-83. If the enemy force is not rapidly defeated, commanders have three options: bypass, transition to a","rect":[108.0,696.894287109375,540.0391511993408,687.7861328125]},{"page":117,"text":"deliberate attack, or conduct a defense. In all cases, commanders make every effort to retain the initiative by","rect":[108.0,708.357177734375,540.0293483734131,699.2490234375]},{"page":117,"text":"conducting violent and resolute attacks and preventing enemy forces from countering them. Simultaneously,","rect":[107.9999771118164,719.8801879882813,540.0122022628784,710.7720336914063]},{"page":117,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":117,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":117,"text":"4-15","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":118,"text":"Chapter 4","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":118,"text":"units maintain momentum by synchronizing the actions of friendly maneuver, functional and multifunctional","rect":[90.0,83.51434326171875,522.1122202835084,74.40616607666016]},{"page":118,"text":"support, and sustainment elements.","rect":[90.0,94.95719909667969,230.32514476776124,85.86905670166016]},{"page":118,"text":"TRANSITION TO AN ATTACK","rect":[72.0,118.34220886230469,210.76614093780518,110.0880126953125]},{"page":118,"text":"4-84. The decision to conduct a hasty or deliberate operation is based on the commander’s current knowledge","rect":[90.0,138.2943115234375,522.0554475860596,129.18612670898438]},{"page":118,"text":"of the enemy situation and assessment of whether the assets available (to include time) and the means to","rect":[89.99002075195313,149.81732177734376,521.9782619476318,140.70913696289063]},{"page":118,"text":"coordinate and synchronize those assets are adequate to accomplish the mission. If assets and means are","rect":[89.99002075195313,161.28021240234376,521.9762849884033,152.17202758789063]},{"page":118,"text":"lacking, the unit takes additional time to plan and prepare for the operation or bring additional forces to bear","rect":[89.9699935913086,172.80322265625,522.0723779258728,163.69503784179688]},{"page":118,"text":"on the problem. The commander makes that choice in an environment of uncertainty, which always entails","rect":[90.0400161743164,184.326171875,521.9881732444763,175.21798706054688]},{"page":118,"text":"some risk. Ongoing improvements in command and control systems continue to assist in the development of","rect":[89.9898681640625,195.7890625,522.0823876914978,186.68087768554688]},{"page":118,"text":"a common operational picture of friendly and enemy forces while facilitating decision making and","rect":[90.0400161743164,207.31207275390626,522.1344509124756,198.20388793945313]},{"page":118,"text":"communicating decisions to friendly forces.","rect":[90.03997802734375,218.77496337890626,265.8850049972534,209.66677856445313]},{"page":118,"text":"TRANSITION TO A DEFENSE","rect":[72.0,242.12217712402345,207.15096426010133,234.03598022460938]},{"page":118,"text":"4-85. Some transitions require friendly forces to transition into a defense. If the movement to contact does","rect":[90.0,262.07427978515627,522.0052630882263,252.96609497070313]},{"page":118,"text":"not defeat the enemy force or the friendly force has lost, then friendly forces get a different momentum. This","rect":[90.0,273.5972900390625,522.0691668968201,264.4891052246094]},{"page":118,"text":"changed momentum may dictate the transition into the defense. Friendly forces may lose their momentum","rect":[90.0,285.0601501464844,522.0434241256714,275.95196533203127]},{"page":118,"text":"and transition from a movement to contact to a defense for several reasons:","rect":[90.00003814697266,294.5591125488281,390.56796979522707,287.4749755859375]},{"page":118,"text":"","rect":[115.19999694824219,307.345458984375,121.16105696249008,302.6531982421875]},{"page":118,"text":"","rect":[115.19999694824219,332.3654479980469,121.16105696249008,327.6731872558594]},{"page":118,"text":"","rect":[115.19999694824219,368.845458984375,121.16105696249008,364.1531982421875]},{"page":118,"text":"","rect":[115.19999694824219,382.345458984375,121.16105696249008,377.6531982421875]},{"page":118,"text":"","rect":[115.19999694824219,395.845458984375,121.16105696249008,391.1531982421875]},{"page":118,"text":"The size, location, and composition of the enemy is significantly different than what was","rect":[133.1999969482422,310.0743103027344,522.0592181663513,300.96612548828127]},{"page":118,"text":"templated, and the friendly force risks destruction if they continue the movement to contact.","rect":[133.1999969482422,321.5973205566406,501.1043653488159,312.4891357421875]},{"page":118,"text":"If directed by their higher headquarters during planning. For example, if the unit was directed to","rect":[133.1999969482422,335.09429931640627,522.0430812835693,325.9861145019531]},{"page":118,"text":"conduct a movement to contact to a specified phase line and arrive without meeting the enemy","rect":[133.1999969482422,346.55718994140627,521.9619655609131,337.4490051269531]},{"page":118,"text":"then a hasty defense is needed to hold the terrain gained until directed to move on.","rect":[133.1999969482422,358.0801696777344,462.64470958709719,348.97198486328127]},{"page":118,"text":"Friendly forces outrun their logistics and risk culmination.","rect":[133.1999969482422,371.5743103027344,366.52459239959719,362.46612548828127]},{"page":118,"text":"Friendly combat losses prevent the unit from continuing to advance.","rect":[133.1999969482422,385.0743103027344,406.0015821456909,375.96612548828127]},{"page":118,"text":"The loss of external assets within range to support the continued advance of friendly forces.","rect":[133.1999969482422,398.5743103027344,500.0294141769409,389.46612548828127]},{"page":118,"text":"4-86. If friendly forces lose momentum, the commander decides when to transition to a defense. The","rect":[90.00376892089844,416.09930419921877,522.0633211212158,406.9911193847656]},{"page":118,"text":"commander must utilize all information available; especially combat power against combat ratios to make","rect":[90.00379943847656,427.5621643066406,522.0571565704346,418.4539794921875]},{"page":118,"text":"this decision. See Part Three for execution of the defense.","rect":[89.9937515258789,437.0711669921875,320.80047130584719,429.97698974609377]},{"page":118,"text":"4-16","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":118,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":118,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":119,"text":"Chapter 5","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":119,"text":"Attack","rect":[290.5199890136719,150.95619201660157,339.45466664123537,139.3096466064453]},{"page":119,"text":"This chapter addresses those considerations unique to an attack. The general offensive","rect":[126.0,188.7806854248047,504.0427223358154,178.79986572265626]},{"page":119,"text":"considerations discussed in chapter 3 continue to apply. This chapter addresses the","rect":[126.0,201.4405975341797,504.0513282928467,191.45977783203126]},{"page":119,"text":"general considerations, organization of forces, common control measures, planning,","rect":[126.0,214.10057067871095,503.97552967071536,204.1197509765625]},{"page":119,"text":"preparation, execution considerations, and the four variations of an attack.","rect":[126.0,226.738525390625,452.2125597000122,216.7796630859375]},{"page":119,"text":"GENERAL CONSIDERATIONS FOR THE ATTACK","rect":[90.0,252.08970642089845,419.7755485305786,242.4015655517578]},{"page":119,"text":"5-1. An attack is a type of offensive operation that defeats enemy forces, seizes terrain, or secures terrain.","rect":[108.0,272.394287109375,539.9722852706909,263.2861022949219]},{"page":119,"text":"An attack masses the effects of overwhelming combat power against selected portions of an enemy force","rect":[108.0,283.857177734375,540.0177278594971,274.7489929199219]},{"page":119,"text":"with a tempo and intensity that the enemy force cannot match. Attacking units seek positions of advantage","rect":[108.0,295.3801574707031,539.9942903594971,286.27197265625]},{"page":119,"text":"and deliberately synchronize their combined arms teams.","rect":[107.98994445800781,306.9031677246094,336.02813243865969,297.79498291015627]},{"page":119,"text":"ORGANIZATION OF FORCES FOR AN ATTACK","rect":[90.0,332.189697265625,406.09055097198486,322.5015563964844]},{"page":119,"text":"5-2. Commander’s task-organize their forces to give each unit enough combat power to accomplish its","rect":[108.0,352.4942932128906,540.0473773460388,343.3861083984375]},{"page":119,"text":"mission once the commander determines their schemes of maneuver. Units normally organize their forces","rect":[108.0,363.9571838378906,539.9633319358826,354.8489990234375]},{"page":119,"text":"into a security force, a main body, and a reserve, all supported by sustainment organizations. The best place","rect":[108.0,375.48016357421877,539.9380769805908,366.3719787597656]},{"page":119,"text":"and time for an attacking force to task-organize is when it is in an assembly area. This allows units to complete","rect":[108.0,387.003173828125,540.0544710235596,377.8949890136719]},{"page":119,"text":"any changes in task organization in time to conduct rehearsals with their attached and supporting elements.","rect":[108.0,398.466064453125,535.6003370285034,389.3578796386719]},{"page":119,"text":"FORWARD SECURITY FORCE","rect":[90.0,421.8600158691406,231.61892080307008,413.5560302734375]},{"page":119,"text":"5-3. While planning and preparing for operations, units have a security force to their front. Upon initiating","rect":[108.0,441.7743225097656,539.9775295257568,432.6661376953125]},{"page":119,"text":"movement toward their objective, they place a reconnaissance and security force to their front to identify","rect":[108.0,453.2973327636719,539.9733791351318,444.17913818359377]},{"page":119,"text":"enemy locations, dispositions, and strengths. These forces also confirm trafficability of axes of advance and","rect":[107.9899673461914,464.76019287109377,540.0102443695068,455.6520080566406]},{"page":119,"text":"cross-mobility corridors. They also destroy (within capabilities) as much of the enemy in the disruption zone","rect":[107.97989654541016,476.283203125,540.0544710235596,467.1750183105469]},{"page":119,"text":"as possible, enabling the main body to focus on the enemy in the battle zone. Units only resource dedicated","rect":[107.97990417480469,487.80621337890627,539.8760280609131,478.6980285644531]},{"page":119,"text":"flank or rear security forces during an attack if the attack uncovers one or more flank or the rear of the","rect":[107.96991729736328,499.2690734863281,539.9584627227783,490.160888671875]},{"page":119,"text":"attacking force as they advance. Commanders designate flank or rear security forces and assign them a guard","rect":[107.96990203857422,510.7920837402344,539.9406032562256,501.68389892578127]},{"page":119,"text":"or screen mission, depending on the mission variables. Attacking forces should maintain a forward security","rect":[107.96994018554688,522.3150634765625,539.8690090179443,513.2069091796875]},{"page":119,"text":"element. The size of the forward security element is based upon if the friendly force has gained and","rect":[107.95990753173828,533.7779541015625,539.9666652679443,524.6697998046875]},{"page":119,"text":"maintained visual contact of the enemy.","rect":[107.95990753173828,545.3009643554688,267.42327404022219,536.1928100585938]},{"page":119,"text":"MAIN BODY","rect":[90.0,568.6326904296875,150.17982578277589,560.5559692382813]},{"page":119,"text":"5-4. Units organize their main bodies into combined arms formations to conduct their main and supporting","rect":[108.0,588.5343017578125,540.0269680023193,579.4261474609375]},{"page":119,"text":"efforts. They aim their main effort towards decisive points. Decisive points can consist of the immediate","rect":[108.01000213623047,600.0572509765625,540.0011262969971,590.9490966796875]},{"page":119,"text":"destruction of selected enemy forces, the enemy force’s capability to resist, seizure of terrain objectives, or","rect":[108.00999450683594,611.580322265625,539.9702661094666,602.4620971679688]},{"page":119,"text":"the defeat of the enemy force’s plan. Units’ schemes of maneuver identify the focus of their main effort. All","rect":[108.01001739501953,623.0431518554688,540.0754771194459,613.9349975585938]},{"page":119,"text":"their forces’ available resources operate in concert to ensure the success of the main effort. The subordinate","rect":[108.0,634.546142578125,540.0443391876221,625.4580078125]},{"page":119,"text":"unit or units designated to conduct the main effort can change during the course of the attacks. Units designate","rect":[107.97997283935547,646.0891723632813,540.0675325469971,636.9810180664063]},{"page":119,"text":"assault, breach, and support forces if they expect to conduct breaching operations during their attack.","rect":[107.96991729736328,657.5520629882813,511.45403575897219,648.4439086914063]},{"page":119,"text":"5-5. Units retain flexibility by arranging their forces in depth, retaining strong reserves, and maintaining","rect":[107.96991729736328,675.0770263671875,539.9014186859131,665.9688720703125]},{"page":119,"text":"centralized control of long-range fire support systems. Units focus their available resources to support their","rect":[107.96990203857422,686.6000366210938,539.9102075157166,677.4918823242188]},{"page":119,"text":"main efforts achievement of its objective. Units cannot allow enemy actions, minor changes in the situation,","rect":[107.95992279052735,698.0629272460938,540.0115308761597,688.9447021484375]},{"page":119,"text":"or the lack of success by other supporting efforts to divert combat power from the main effort.","rect":[107.95992279052735,709.5859375,484.8020887374878,700.477783203125]},{"page":119,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":119,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":119,"text":"5-1","rect":[508.9800109863281,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":120,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":120,"text":"5-6. Commanders may need to designate one or more of their units to conduct supporting efforts to create","rect":[90.0,83.51434326171875,521.9986238555908,74.40616607666016]},{"page":120,"text":"windows of opportunity for executing their main effort. They use the minimal combat power necessary to","rect":[89.98999786376953,94.97723388671875,521.9316921234131,85.86905670166016]},{"page":120,"text":"accomplish their missions, since overwhelming combat power cannot be employed everywhere. Units","rect":[89.98999786376953,106.500244140625,521.9820697288513,97.3920669555664]},{"page":120,"text":"conducting supporting efforts usually have a wider assigned area than those conducting the main effort.","rect":[89.98998260498047,118.023193359375,522.0223951339722,108.9150161743164]},{"page":120,"text":"Commanders can assign the tasks of follow and assume or follow and support to subordinate units.","rect":[89.98001098632813,129.486083984375,485.48427867889407,120.3779067993164]},{"page":120,"text":"RESERVE","rect":[72.0,152.8422088623047,118.64721059799195,144.75601196289063]},{"page":120,"text":"5-7. The strength and composition of the reserve vary with the mission variables, the form of maneuver,","rect":[90.0,172.7943115234375,522.0784254074097,163.68612670898438]},{"page":120,"text":"and the risk accepted. In an attack, the combat power allocated to the reserve depends primarily on the level","rect":[90.0000228881836,184.31732177734376,522.0275034866334,175.20913696289063]},{"page":120,"text":"of uncertainty about enemy forces, especially the strength of any expected enemy counterattacks. For","rect":[90.0000228881836,195.78021240234376,522.0067040977478,186.67202758789063]},{"page":120,"text":"example, in a hasty attack a reserve can contain up to one third of a force’s combat power. Alternatively,","rect":[90.0000228881836,207.30322265625,522.1075391769409,198.19503784179688]},{"page":120,"text":"units size their reserve to defeat their enemy’s projected available counterattack forces in deliberate attacks.","rect":[90.00003814697266,218.76605224609376,522.0274610519409,209.64785766601563]},{"page":120,"text":"They should not constitute their reserves by weakening their main effort. A reserve requires mobility equal","rect":[90.00006103515625,230.2890625,522.0144419631959,221.18087768554688]},{"page":120,"text":"to or greater than the most dangerous enemy ground threat, and it should be able to counter that threat. See","rect":[90.00006103515625,241.81207275390626,522.0622835235596,232.70388793945313]},{"page":120,"text":"paragraphs 1-94 through 1-100 more information on a reserve.","rect":[89.98999786376953,253.27496337890626,340.29156017303469,244.16677856445313]},{"page":120,"text":"COMMON CONTROL MEASURES ASSOCIATED WITH AN ATTACK","rect":[72.0,278.5497131347656,520.8266044387817,268.8755798339844]},{"page":120,"text":"5-8. A higher echelon commander assigns the area to units conducting offensive actions within which they","rect":[90.0,298.85430908203127,522.0385036468506,289.7461242675781]},{"page":120,"text":"operate. Within these assigned areas, units at a minimum designate these control measures:","rect":[90.0,310.3773193359375,454.36728620147707,301.2691345214844]},{"page":120,"text":" A phase line as the LD, which may also be the line of contact (LC).","rect":[115.19999694824219,323.8742980957031,403.25005626678469,314.76611328125]},{"page":120,"text":" The time to initiate the operation.","rect":[115.19999694824219,337.354248046875,267.10830211639407,328.26611328125]},{"page":120,"text":" The objective.","rect":[115.19999694824219,350.8742980957031,190.42222118377686,341.756103515625]},{"page":120,"text":"If necessary, a commander can assign an area (zone or area of operations) or use axis of advance, direction","rect":[90.00376892089844,365.3932800292969,522.0031032562256,356.28509521484377]},{"page":120,"text":"of attack, routes, or additional phase lines to further control maneuver forces. Figure 5-1 depicts common","rect":[90.00376892089844,376.8561706542969,521.9539699554443,367.74798583984377]},{"page":120,"text":"control measures associated with an attack.","rect":[89.9937744140625,386.3551025390625,262.7094678878784,379.2709655761719]},{"page":120,"text":"5-2","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":120,"text":"Figure 5-1. Example of attack control measures","rect":[184.74290466308595,671.6947021484375,409.2530355377197,662.3059692382813]},{"page":120,"text":"5-9. Units can use any other control measures necessary to control an attack. Short of the LD, units may","rect":[89.99378967285156,695.1514892578125,521.9699611663818,686.0433349609375]},{"page":120,"text":"designate assembly areas and attack positions where they prepare for offensive actions or wait for established","rect":[90.00376892089844,706.674560546875,522.0370998382568,697.56640625]},{"page":120,"text":"required conditions to initiate the attack. Beyond the LD, units may designate checkpoints, PLs, probable","rect":[90.00376892089844,718.197509765625,521.9156160430908,709.08935546875]},{"page":120,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":120,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":121,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":121,"text":"lines of deployment (PLDs), assault positions, direct fire control measures, and indirect fire support","rect":[108.0,83.51434326171875,540.0250620803834,74.40616607666016]},{"page":121,"text":"coordination measures (FSCMs). Between the PLD and the objective, units can use a final coordination line","rect":[108.0,94.97723388671875,539.9391145782471,85.85903930664063]},{"page":121,"text":"(FCL), assault positions, support by fire and attack by fire positions, and a time of assault to further control","rect":[107.9999771118164,106.500244140625,540.0199961624146,97.3920669555664]},{"page":121,"text":"the final stage of their attacks. Beyond the objective, commanders can impose a LOA if they do not want","rect":[107.9999771118164,118.023193359375,540.0604014358521,108.90499877929688]},{"page":121,"text":"their units to conduct exploitation or a pursuit or template where they want their forces to position after the","rect":[108.0,129.486083984375,540.0292024688721,120.3779067993164]},{"page":121,"text":"completion of the attack such as a battle position or blocking position.","rect":[107.9899673461914,141.00909423828126,388.53505992889407,131.90090942382813]},{"page":121,"text":"5-10. Units increase control over the movement of all attacking elements in attacks during limited visibility","rect":[107.9899673461914,158.5340576171875,539.9491481781006,149.42587280273438]},{"page":121,"text":"conditions. Typically, they impose additional control measures beyond those used in daylight attacks. These","rect":[107.97994232177735,169.9969482421875,539.9248323516846,160.88876342773438]},{"page":121,"text":"additional measures may include using a PD and a direction of attack.","rect":[107.97994232177735,181.51995849609376,387.4367628097534,172.41177368164063]},{"page":121,"text":"PLANNING FOR AN ATTACK","rect":[90.0,206.78965759277345,284.70639569854736,197.1015167236328]},{"page":121,"text":"5-11. In an attack, units seek to keep enemy forces off balance while continually reducing the enemy force’s","rect":[108.0,227.09429931640626,540.0022723655701,217.98611450195313]},{"page":121,"text":"options. Friendly forces seek to place enemy forces into a position where they can easily be defeated or","rect":[108.0,238.55718994140626,539.9189965782166,229.44900512695313]},{"page":121,"text":"destroyed. Friendly forces focus effects on enemy forces that seek to prevent the unit from accomplishing its","rect":[108.0,250.0802001953125,540.0604388694763,240.97201538085938]},{"page":121,"text":"mission and seizing its objective. Planning helps commanders synchronize the effects of combat power","rect":[108.0,261.6031494140625,539.9579980430603,252.48495483398438]},{"page":121,"text":"through the MDMP and troop leading procedures.","rect":[108.0,273.0660400390625,308.32586193084719,263.9578552246094]},{"page":121,"text":"5-12. Units focus the effects of friendly systems to achieve fire superiority and allow their maneuver forces","rect":[108.0,290.5810241699219,540.0462176780701,281.47283935546877]},{"page":121,"text":"to breach enemy defensive networks. A friendly force must gain and maintain fire superiority at critical points","rect":[107.98997497558594,302.1040344238281,540.0810077171326,292.995849609375]},{"page":121,"text":"during an attack. The unit uses long-range artillery systems (cannon and rockets) and air support (rotary- and","rect":[107.98997497558594,313.56689453125,540.0934352874756,304.4587097167969]},{"page":121,"text":"fixed-wing) to engage the enemy throughout the depth of the enemy’s defensive positions. The warfighting","rect":[108.0,325.08990478515627,540.0824489593506,315.9817199707031]},{"page":121,"text":"functions provide a model of how units organize and employ the force to ensure all capabilities of the force","rect":[107.98998260498047,336.6129150390625,539.9361848907471,327.5047302246094]},{"page":121,"text":"are synchronized in time and maneuver space during an attack.","rect":[107.99002075195313,348.0757751464844,359.54909801483157,338.96759033203127]},{"page":121,"text":"COMMAND AND CONTROL","rect":[90.0,371.447998046875,219.68680715560914,363.156005859375]},{"page":121,"text":"5-13. Commanders assign subordinate units their missions and use control measures necessary to","rect":[108.0,391.3742980957031,540.0522365570068,382.26611328125]},{"page":121,"text":"synchronize and maintain control over the operation. Units plan to control the attack by determining the","rect":[108.0,402.8973083496094,540.0512361602783,393.78912353515627]},{"page":121,"text":"methods through command posts and signal assets and use graphic control measures (such as probable line","rect":[108.0,414.36016845703127,540.0424470977783,405.2519836425781]},{"page":121,"text":"of contact and enemy trigger lines) to manage the attack. They also control the attack by stating the desired","rect":[108.0000228881836,425.8831787109375,539.9641628265381,416.7749938964844]},{"page":121,"text":"effect of fires on the enemy weapons system such as suppression or destruction using previously developed","rect":[107.98999786376953,437.40618896484377,539.9604396820068,428.2980041503906]},{"page":121,"text":"enemy situational and weapons templates. Units match friendly weapon systems against selected enemy","rect":[107.98999786376953,448.8690490722656,539.9530544281006,439.7608642578125]},{"page":121,"text":"systems to determine the PLD as they array subordinate elements to shape the battlefield. They determine","rect":[107.98998260498047,460.3920593261719,540.0021638946533,451.28387451171877]},{"page":121,"text":"how long it takes subordinates to move from the LD to the PLD and any required support by fire positions","rect":[107.98999786376953,471.9150695800781,539.9219500999451,462.806884765625]},{"page":121,"text":"once they determine their respective PLDs. They establish when and where their forces must maneuver into","rect":[107.98998260498047,483.3779296875,539.9651393890381,474.2697448730469]},{"page":121,"text":"enemy direct fire range.","rect":[107.98999786376953,494.90093994140627,203.54973888397218,485.7927551269531]},{"page":121,"text":"5-14. In addition to accomplishing the mission, every attack plan contains provisions for exploiting success","rect":[107.98998260498047,512.3657836914063,540.0444476585388,503.2575988769531]},{"page":121,"text":"or any advantages that may arise during the operation. Units exploit success by aggressively executing their","rect":[107.98998260498047,523.8887939453125,539.9048364219666,514.7806396484375]},{"page":121,"text":"plans, promoting subordinate leader initiative, and rapidly executing battle drills.","rect":[107.98998260498047,535.4118041992188,431.7944288253784,526.3036499023438]},{"page":121,"text":"5-15. Information systems offer ways that units can gain and maintain enemy contact. Units enhance shared","rect":[107.98998260498047,552.8766479492188,540.0212306976318,543.7684936523438]},{"page":121,"text":"situational understanding by developing SOPs that govern the COP. Information systems improve the rapid,","rect":[107.98998260498047,564.399658203125,540.1035108566284,555.29150390625]},{"page":121,"text":"clear communication of orders and commander’s intent, thereby reducing the confusion and friction of battle.","rect":[108.0,575.9226684570313,539.9429883956909,566.8145141601563]},{"page":121,"text":"This is especially true when the lowest tactical echelons can rapidly update the data on the information","rect":[108.0,587.385498046875,539.9480495452881,578.27734375]},{"page":121,"text":"systems providing that common operational picture. The disposition and activities of friendly and enemy","rect":[108.0,598.9085693359375,539.9980983734131,589.8004150390625]},{"page":121,"text":"forces and third-party agencies are important elements of information. Service and joint intelligence systems","rect":[108.0,610.4315795898438,539.9915301780701,601.3133544921875]},{"page":121,"text":"feeding those information systems enable commanders and echelon staffs to detect and track enemy forces","rect":[108.01002502441406,621.8944091796875,539.9384906272888,612.7862548828125]},{"page":121,"text":"without having subordinate forces make physical contact with enemy forces. The ability to see and","rect":[108.01002502441406,633.4174194335938,539.9200344085693,624.3092651367188]},{"page":121,"text":"understand the situation before enemy forces do allows friendly forces to act first and maneuver out of direct","rect":[108.01002502441406,644.9404296875,540.0423960647584,635.832275390625]},{"page":121,"text":"contact with enemy forces at a high tempo. These abilities allow units to position their subordinate forces","rect":[108.02002716064453,656.4033203125,540.0083148460388,647.295166015625]},{"page":121,"text":"where those forces can overwhelm selected elements of the enemy force. This disrupts and destroys the","rect":[108.02002716064453,667.92626953125,540.0480623321533,658.818115234375]},{"page":121,"text":"enemy’s combined arms team. Such attacks—delivered simultaneously with precision by air, land, maritime,","rect":[108.02002716064453,679.4492797851563,539.9421949386597,670.3411254882813]},{"page":121,"text":"space, and cyberspace systems throughout the width, height, and depth of the battlefield—can stun enemy","rect":[108.02006530761719,690.9122314453125,540.0020656585693,681.8040161132813]},{"page":121,"text":"forces and rapidly lead to their defeat.","rect":[108.0199966430664,702.4351806640625,259.9181776046753,693.3270263671875]},{"page":121,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":121,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":121,"text":"5-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":122,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":122,"text":"MOVEMENT AND MANEUVER","rect":[72.0,83.36216735839844,215.9955759048462,75.27597045898438]},{"page":122,"text":"5-16. Units seek to surprise enemy forces through movement and maneuver by choosing an unexpected","rect":[90.0,103.3143310546875,522.0192775726318,94.2061538696289]},{"page":122,"text":"direction, time, type, or strength for the attack. Surprise delays enemy reactions, overloads and confuses","rect":[90.0,114.7772216796875,522.0271747093201,105.6690444946289]},{"page":122,"text":"enemy command and control systems, induces psychological shock in enemy forces, and reduces the","rect":[90.0,126.30023193359375,522.0561800079346,117.19205474853516]},{"page":122,"text":"coherence of the enemy defense. Units can achieve tactical surprise by attacking in bad weather and over","rect":[90.0,137.8232421875,522.0030419883728,128.71505737304688]},{"page":122,"text":"seemingly impassible terrain, conducting feints and demonstrations, and maintaining a high tempo, thereby","rect":[90.0,149.28607177734376,522.0203762054443,140.17788696289063]},{"page":122,"text":"destroying enemy forces. All of which is enhanced by the effective employment of OPSEC. For example, a","rect":[89.99005889892578,160.80908203125,521.9913606719971,151.70089721679688]},{"page":122,"text":"unit in extremely hilly or mountainous terrain may consider transporting dismounted infantry forces to the","rect":[89.98004913330078,172.33209228515626,521.9893465118408,163.22390747070313]},{"page":122,"text":"heights and have them maneuver down the terrain. Units may plan different attack times for their main and","rect":[89.98004913330078,183.79498291015626,521.9017848968506,174.68673706054688]},{"page":122,"text":"supporting efforts to mislead enemy forces and allow the shifting of supporting fires to successive attacking","rect":[89.9800033569336,195.3179931640625,522.0050563812256,186.20980834960938]},{"page":122,"text":"echelons. However, simultaneous attacks provide a means to maximize the effects of mass in the initial","rect":[89.97997283935547,206.76084899902345,521.8984141311646,197.67269897460938]},{"page":122,"text":"assault. Simultaneous attacks also prevent enemy forces from concentrating defensive fires against","rect":[89.97997283935547,218.3038330078125,522.0053477249146,209.19564819335938]},{"page":122,"text":"successive attacks.","rect":[89.97997283935547,227.8028106689453,165.01674938201905,220.71865844726563]},{"page":122,"text":"5-17. Commanders and their subordinate leaders focus on the routesandformations their units use to traverse","rect":[89.97997283935547,245.27772521972657,522.0063753204346,238.18356323242188]},{"page":122,"text":"the terrain from the LD or PD to the objective during the planning process. Some locations may require","rect":[89.98998260498047,258.814697265625,522.0280428009033,249.69650268554688]},{"page":122,"text":"attacking units to change formation, direction of movement, or movement technique when they reach those","rect":[89.98998260498047,270.33770751953127,521.9027376251221,261.2295227050781]},{"page":122,"text":"locations. Units designate contact points at critical locations to ensure coordination between adjacent units.","rect":[89.98998260498047,281.80059814453127,517.8941602706909,272.6824035644531]},{"page":122,"text":"5-18. Units attack targets throughout the depth of the enemy’s defense to keep the enemy force off balance","rect":[89.98998260498047,299.3255615234375,522.0625276641846,290.2173767089844]},{"page":122,"text":"and limit enemy freedom of action. However, for the main effort, units concentrate the effects of","rect":[89.9899673461914,310.84857177734377,521.9682519493103,301.7403869628906]},{"page":122,"text":"overwhelming combat power to shatter the cohesion of the enemy force’s defense. Units accomplish this by","rect":[89.9899673461914,322.3114318847656,521.9595241546631,313.2032165527344]},{"page":122,"text":"applying combat power against enemy forces at a level of violence and in a manner that enemy forces cannot","rect":[89.98999786376953,333.83447265625,522.0802378616334,324.7262878417969]},{"page":122,"text":"match. For example, a battalion commander can mass an Army combined arms battalion’s firepower and","rect":[89.98998260498047,345.35748291015627,521.9872951507568,336.2492980957031]},{"page":122,"text":"rapid advancement against an enemy rifle company’s hastily prepared defensive position.","rect":[89.96995544433594,356.8203125,447.9745740890503,347.7121276855469]},{"page":122,"text":"INTELLIGENCE","rect":[72.0,380.1222229003906,146.30680227279664,372.0360107421875]},{"page":122,"text":"5-19. Commanders require information on an enemy force’s organization, equipment, and tactics to","rect":[90.0,400.0743103027344,521.9854640960693,390.96612548828127]},{"page":122,"text":"determine the appropriate employment of unit and system capabilities and tactics. They need to understand","rect":[90.01000213623047,411.5973205566406,522.0432033538818,402.4891357421875]},{"page":122,"text":"an enemy force’s strengths and weaknesses. Units develop threat courses of action and enemy situational","rect":[90.01000213623047,423.0601806640625,522.0914683303834,413.9519958496094]},{"page":122,"text":"templates based on analysis of all available combat information and intelligence. Theseproducts address both","rect":[90.01001739501953,434.58319091796877,521.9261379241943,425.4750061035156]},{"page":122,"text":"conventional and unconventional threats and are useful in determining the feasibility of available COAs.","rect":[90.00997924804688,446.106201171875,522.0023145675659,436.9980163574219]},{"page":122,"text":"Ideally, this knowledge is available early in the planning phase.","rect":[90.01001739501953,457.5690612792969,344.0871534347534,448.46087646484377]},{"page":122,"text":"5-20. Units conduct information collection activities before they attack. Information requirements can","rect":[90.01001739501953,475.09405517578127,521.9762477874756,465.9858703613281]},{"page":122,"text":"include—","rect":[90.00999450683594,484.53289794921877,129.48879623413087,477.4487609863281]},{"page":122,"text":" The location and depth of enemy reserves.","rect":[115.19999694824219,500.0343017578125,302.8607130050659,490.9261169433594]},{"page":122,"text":" The location and extent of obstacles, potential breach sites, enemy engagement areas, and","rect":[115.19999694824219,513.5343017578125,522.0319118499756,504.4261169433594]},{"page":122,"text":"contaminated areas.","rect":[133.1999969482422,523.0332641601563,212.62053966522218,515.9491577148438]},{"page":122,"text":" The location of areas where attacking units can become disoriented, such as rough or restrictive","rect":[115.19999694824219,538.5543212890625,521.9708528594971,529.4461669921875]},{"page":122,"text":"terrain.","rect":[133.1999969482422,548.05322265625,161.86521434783936,540.9691162109375]},{"page":122,"text":" The most favorable routes of approach to the attack objective.","rect":[115.19999694824219,563.5742797851563,380.85637950897219,554.4560546875]},{"page":122,"text":" Areas that attack forces can use for flanking fire and maneuver, such as support by fire and attack","rect":[115.19999694824219,577.0742797851563,521.9717922210693,567.9661254882813]},{"page":122,"text":"by fire positions.","rect":[133.1999969482422,588.5371704101563,200.6666669845581,579.4290161132813]},{"page":122,"text":" Suitability of planned friendly assault, artillery, and sustainment positions.","rect":[115.19999694824219,602.0343017578125,431.26494884490969,592.9261474609375]},{"page":122,"text":" Enemy deception operations.","rect":[115.19999694824219,615.5343017578125,249.58332347869874,606.4261474609375]},{"page":122,"text":" Current and future weather impacts to operations.","rect":[115.19999694824219,629.0142822265625,331.72332286834719,619.9261474609375]},{"page":122,"text":" Anything that requires a commander’s decision.","rect":[115.19999694824219,642.5343017578125,325.42376232147219,633.4261474609375]},{"page":122,"text":"Commanders and leaders at all echelons personally participate in this process.","rect":[90.00376892089844,657.0532836914063,401.8107862472534,647.9451293945313]},{"page":122,"text":"5-21. Units take every opportunity to gain and refine combat information regarding enemy forces. They","rect":[90.00376892089844,674.5783081054688,521.9625148773193,665.4700927734375]},{"page":122,"text":"employ information collection assets to gather combat information and process it into intelligence.","rect":[90.00379943847656,686.0411376953125,521.9980421066284,676.9329833984375]},{"page":122,"text":"Information gathered during the planning phase is especially useful in determining the viability of each COA","rect":[90.00377655029297,697.5641479492188,522.1151166000366,688.4559936523438]},{"page":122,"text":"developed. Generally, units cannot conduct deliberate attacks if they do not know the location of most of the","rect":[90.00377655029297,709.087158203125,522.0802278594971,699.97900390625]},{"page":122,"text":"5-4","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":122,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":122,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":123,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":123,"text":"defending enemy force’s units and systems. If that is the case, units must conduct a movement to contact or","rect":[108.0,83.51434326171875,540.0323998985291,74.40616607666016]},{"page":123,"text":"spend more time collecting information.","rect":[108.00003814697266,94.97723388671875,268.7909803390503,85.86905670166016]},{"page":123,"text":"5-22. Units collect information through reconnaissance; this information is analyzed and combined with","rect":[108.01006317138672,112.4921875,540.0113430023193,103.3840103149414]},{"page":123,"text":"other available information to become intelligence. Units employ reconnaissance over a broad area that","rect":[108.00006103515625,124.01519775390625,540.0736460647584,114.90702056884766]},{"page":123,"text":"allows their reconnaissance elements to identify enemy weaknesses to exploit and identify enemy strengths","rect":[108.00006103515625,135.47808837890626,540.0060565452576,126.36991119384766]},{"page":123,"text":"to avoid. Units exploit the situation by choosing COAs that allow their main effort to attack enemy","rect":[108.00006103515625,147.00103759765626,540.0224514007568,137.89285278320313]},{"page":123,"text":"weaknesses and penetrate identified gaps in an enemy force’s defense. Commanders can then commit their","rect":[108.00006103515625,158.5240478515625,539.9573266563416,149.41586303710938]},{"page":123,"text":"forces to widen the gap and envelop enemy forces. Their reconnaissance elements continue to move, seeking","rect":[108.00006103515625,169.9869384765625,540.0330715179443,160.87875366210938]},{"page":123,"text":"paths of least resistance and pulling their main bodies deep into the enemy force’s rear.","rect":[108.00006103515625,181.50994873046876,456.52468395233157,172.40176391601563]},{"page":123,"text":"5-23. Once friendly reconnaissance elements gain contact with enemy forces, they develop the situation. If","rect":[108.00003814697266,199.034912109375,540.0031030235291,189.92672729492188]},{"page":123,"text":"the objective is an enemy force, the reconnaissance element orients on it to maintain contact and determine","rect":[108.00003814697266,210.497802734375,539.9118318634033,201.37960815429688]},{"page":123,"text":"as much as possible about its dispositions.","rect":[108.0,222.0007781982422,276.5865430831909,212.91262817382813]},{"page":123,"text":"5-24. Units ensure reconnaissance and surveillance of enemy defensive positions and terrain critical to their","rect":[108.01001739501953,239.4857177734375,539.9920556602478,230.37753295898438]},{"page":123,"text":"schemes of maneuver continue throughout their attacks. Reconnaissance and surveillance assets can detect","rect":[108.01001739501953,251.0086669921875,539.9164805374146,241.90048217773438]},{"page":123,"text":"attempts by enemy forces to modify their defenses. In turn, this allows units to adjust their schemes of","rect":[108.01001739501953,262.53167724609377,540.0234277305603,253.41348266601563]},{"page":123,"text":"maneuver as the enemy situation becomes clearer. They can use human and technological means, acting","rect":[108.01002502441406,273.99456787109377,539.9867458343506,264.8863830566406]},{"page":123,"text":"separately or in combination, to provide the required degree of reconnaissance and surveillance.","rect":[108.01002502441406,285.5175476074219,491.74993419647219,276.40936279296877]},{"page":123,"text":"FIRES","rect":[90.0,308.84222412109377,119.45485496520996,300.7560119628906]},{"page":123,"text":"5-25. The planning process synchronizes the unit’s maneuver with the provision of fire support. It must","rect":[108.0,328.7943115234375,540.0675425491334,319.6861267089844]},{"page":123,"text":"identify critical times and places where units need the maximum effects from their fire support assets. This","rect":[107.98994445800781,340.2572021484375,539.9241473655701,331.1490173339844]},{"page":123,"text":"planning considers existing limitations on employing fires, such as weapon ranges, presence of friendly","rect":[107.98994445800781,351.7801818847656,540.0193386077881,342.6719970703125]},{"page":123,"text":"forces within the assigned area, desired conditions of subsequent phases, rules of engagement and positive","rect":[107.98990631103516,363.3031921386719,539.9332552032471,354.19500732421877]},{"page":123,"text":"identification requirements, and requirements for collateral damage assessments. Units combine movement","rect":[107.98990631103516,374.7660827636719,539.9861826858521,365.65789794921877]},{"page":123,"text":"with fires to mass effects, achieve surprise, destroy enemy forces, and obtain decisive results. Each","rect":[107.98990631103516,386.2890625,540.0065822601318,377.1808776855469]},{"page":123,"text":"commander’s guidance identifies fire support tasks that supporting fires organizations must accomplish to","rect":[107.98990631103516,397.81207275390627,539.9933376312256,388.7038879394531]},{"page":123,"text":"support the scheme of maneuver. Throughout planning, units develop various targeting products to support","rect":[107.98990631103516,409.27496337890627,539.9321055374146,400.1667785644531]},{"page":123,"text":"fire support execution. These include a high-payoff target list, target selection standards, and an attack","rect":[107.9800033569336,420.7979736328125,539.9351100921631,411.6897888183594]},{"page":123,"text":"guidance matrix. The purpose of these products is to ensure the efficient and effective application of fire","rect":[107.97998809814453,432.3209533691406,540.0575227813721,423.2127685546875]},{"page":123,"text":"support that supports the scheme of maneuver. (See FM 3-09 for more information on fire support task","rect":[107.97998809814453,443.7637939453125,539.9161281585693,434.6756591796875]},{"page":123,"text":"development and targeting products.)","rect":[107.98002624511719,455.30682373046877,257.36321044540406,446.1986389160156]},{"page":123,"text":"5-26. Units emphasize accomplishing simple and rapidly integrated fire support plans using quick fire","rect":[107.99005126953125,472.7716979980469,539.9870882110596,463.66351318359377]},{"page":123,"text":"planning techniques and SOPs. They integrate their fire assets as far forward as possible in unit movement","rect":[107.99005126953125,484.294677734375,540.0134043655396,475.1864929199219]},{"page":123,"text":"formations to facilitate the early emplacement of those assets. Friendly forces concentrate fires on forward","rect":[107.99005889892578,495.81768798828127,540.0074367523193,486.7095031738281]},{"page":123,"text":"enemy elements to enable maneuver efforts to close with enemy positions. Fires can isolate forward enemy","rect":[107.99005889892578,507.28057861328127,539.9596462249756,498.1723937988281]},{"page":123,"text":"elements by using long-range fires, air support, and electromagnetic warfare.","rect":[107.99005889892578,518.8035888671875,415.71230602264407,509.6954040527344]},{"page":123,"text":"5-27. Fire support facilitates the attacking units’ maneuver by destroying or neutralizing strong enemy forces","rect":[107.99005889892578,536.3285522460938,540.0565326194763,527.2203979492188]},{"page":123,"text":"and positions. Fire support systems take full advantage of available preparation time to achieve these","rect":[107.99005889892578,547.7913818359375,540.0485506134033,538.6832275390625]},{"page":123,"text":"demanding effects criteria. Fire plans feature the following characteristics:","rect":[107.99005889892578,559.3143920898438,405.89780377960207,550.2062377929688]},{"page":123,"text":" Target locations confirmed or denied by information collection efforts.","rect":[133.1999969482422,572.7542724609375,434.73794078826907,563.6461181640625]},{"page":123,"text":" Designation of target sensor to shooter communication links.","rect":[133.1999969482422,586.2542724609375,395.08867931365969,577.1461181640625]},{"page":123,"text":" Possible use of preparation and deception fires to shape an enemy force’s defense.","rect":[133.1999969482422,599.7542724609375,480.28582286834719,590.6461181640625]},{"page":123,"text":" Air support to destroy high-payoff targets.","rect":[133.1999969482422,613.2542724609375,320.6161756515503,604.1461181640625]},{"page":123,"text":" Proactive suppression of enemy air defense efforts.","rect":[133.1999969482422,626.7542724609375,355.9637098312378,617.6461181640625]},{"page":123,"text":" Preparation fires that shift just as the maneuver force arrives on the objective.","rect":[133.1999969482422,640.2542724609375,461.38384532928469,631.1360473632813]},{"page":123,"text":" A suppression and obscuration fire plan to support operations.","rect":[133.1999969482422,653.7342529296875,399.8835401535034,644.6461181640625]},{"page":123,"text":" Pre-positioned ammunition backed by prepackaged munitions stocks capable of rapid delivery.","rect":[133.1999969482422,667.2542724609375,531.3378248214722,658.1461181640625]},{"page":123,"text":" Integration of nonlethal effects, such as electromagnetic attack and military information support","rect":[133.1999969482422,680.7542724609375,540.0762705764771,671.6461181640625]},{"page":123,"text":"operations, into the attack guidance matrix.","rect":[151.1999969482422,692.2772827148438,324.22442150115969,683.1691284179688]},{"page":123,"text":" Integration of primary and backup observers to engage high-payoff targets.","rect":[133.1999969482422,705.7742919921875,451.6586866378784,696.6661376953125]},{"page":123,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":123,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":123,"text":"5-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.7260131835938]},{"page":124,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":124,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":124,"text":"","rect":[115.19999694824219,105.74544525146485,121.16105696249008,101.05320739746094]},{"page":124,"text":"","rect":[115.19999694824219,119.24544525146485,121.16105696249008,114.55320739746094]},{"page":124,"text":"","rect":[115.19999694824219,144.26547241210938,121.16105696249008,139.57322692871095]},{"page":124,"text":"","rect":[115.19999694824219,157.76547241210938,121.16105696249008,153.07322692871095]},{"page":124,"text":"FSCMs—accounting for danger close and other technical constraints—allow maneuver forces to","rect":[133.1999969482422,83.51434326171875,521.9733180999756,74.40616607666016]},{"page":124,"text":"get as close as possible to the objective before lifting fires.","rect":[133.1999969482422,94.97723388671875,367.30413341522219,85.85903930664063]},{"page":124,"text":"Signals for lifting and shifting fires on the objective.","rect":[133.1999969482422,108.47430419921875,342.88445568084719,99.35610961914063]},{"page":124,"text":"Do not dilute fire support capabilities to the extent they are unable to concentrate in support of the","rect":[133.1999969482422,121.97430419921875,522.0121736602783,112.86612701416016]},{"page":124,"text":"main effort.","rect":[133.1999969482422,131.47328186035157,180.46050548553468,124.3891372680664]},{"page":124,"text":"Plan for echelonment of fires.","rect":[133.1999969482422,144.9702911376953,252.39289379119874,137.88613891601563]},{"page":124,"text":"Maximize use of organic fires.","rect":[133.1999969482422,160.49432373046876,255.6424207687378,151.38613891601563]},{"page":124,"text":"SUSTAINMENT","rect":[72.0,183.89996337890626,143.04435110092164,175.59597778320313]},{"page":124,"text":"5-28. Units prioritize their sustainment operations to support their attacking forces. They prioritize","rect":[90.0,203.8143310546875,521.9572420196533,194.70614624023438]},{"page":124,"text":"sustainment support by designating who has priority for resupply combined with task-organizing capabilities","rect":[90.01001739501953,215.2772216796875,521.9491717796326,206.16903686523438]},{"page":124,"text":"(for example, shifting fuel tankers and operators from one unit to another). Prioritization weights the main","rect":[90.00997924804688,226.80023193359376,521.9414577484131,217.69204711914063]},{"page":124,"text":"effort by ensuring the right forces have the required supplies and equipment to accomplish the most important","rect":[90.01000213623047,238.2630615234375,522.1417612991334,229.15487670898438]},{"page":124,"text":"tasks.","rect":[90.01001739501953,247.7620391845703,112.55100536346436,240.67788696289063]},{"page":124,"text":"5-29. Lines of communication typically increase during attacks. Therefore, units consider forward","rect":[90.01001739501953,267.301025390625,522.1068019866943,258.1928405761719]},{"page":124,"text":"positioning sustainment assets to increase their operational reach and flexibility. Units also consider the","rect":[90.01001739501953,278.763916015625,522.0563020782471,269.6557312011719]},{"page":124,"text":"availability and feasibility of using aerial assets to augment ground-based sustainment operations. This","rect":[90.01000213623047,290.28692626953127,522.0564715843201,281.1787414550781]},{"page":124,"text":"includes the ability to execute aerial resupply and aerial medical evacuation. Units must not assume the","rect":[89.99996185302735,301.8099365234375,521.9773225860596,292.7017517089844]},{"page":124,"text":"friendly forces possess air supremacy or air superiority which may preclude the use of aerial assets to execute","rect":[89.99996185302735,313.2728271484375,522.0945711212158,304.1646423339844]},{"page":124,"text":"sustainment operations.","rect":[89.99996185302735,324.7757568359375,184.48354625701905,315.6876220703125]},{"page":124,"text":"5-30. Units must balance positioning supporting sustainment assets forward to support the attacking force","rect":[89.99996185302735,342.310791015625,522.0901155548096,333.2026062011719]},{"page":124,"text":"with maintaining force protection. Forward positioning sustainment assets can create a risk. If the enemy is","rect":[89.99996185302735,353.7736511230469,522.0423724632263,344.66546630859377]},{"page":124,"text":"able to target and destroy these assets, then they may force the culmination of friendly operations prior to","rect":[90.0,365.296630859375,521.9477443695068,356.1884460449219]},{"page":124,"text":"their success. Commanders need to balance account for this risk when considering the placement of","rect":[90.0,376.8196716308594,521.9526879844666,367.71148681640627]},{"page":124,"text":"sustainment assets during an attack. From these forward locations, units can sustain attacking forces and","rect":[90.0,388.28253173828127,522.0446071624756,379.1743469238281]},{"page":124,"text":"when applicable, shift priority of support to the units conducting the main effort. As attacking forces advance,","rect":[90.0,399.8055419921875,522.0424757003784,390.6973571777344]},{"page":124,"text":"their supporting sustainment units and capabilities displace forward as required to shorten supply lines, using","rect":[90.0,411.32855224609377,522.0494899749756,402.2203674316406]},{"page":124,"text":"displacement techniques designed to ensure uninterrupted support to maneuver units.","rect":[90.0000228881836,422.7913818359375,430.48467540740969,413.6831970214844]},{"page":124,"text":"PROTECTION","rect":[72.0,446.11273193359377,137.40394687652589,438.0360107421875]},{"page":124,"text":"5-31. Prioritization of protection tasks is vital to supporting an attack, however the prioritization will vary","rect":[90.0,466.0743103027344,522.0243434906006,456.96612548828127]},{"page":124,"text":"by echelon based on the resources and capabilities available. The mission variables guide the priorities or","rect":[90.0,477.5973205566406,521.9232690391541,468.4891357421875]},{"page":124,"text":"protection tasks and resources. Protections tasks that support the attack include but are not limited to: OPSEC,","rect":[90.0,489.0401306152344,521.9619092941284,479.9519958496094]},{"page":124,"text":"detention operations, CBRN operations, survivability operations, area security, and air and missile defense.","rect":[90.01002502441406,500.58319091796877,519.1275587081909,491.4750061035156]},{"page":124,"text":"PREPARING FOR AN ATTACK","rect":[72.0,525.8697509765625,275.28452069854736,516.1815795898438]},{"page":124,"text":"5-32. Even in fluid situations, attacks are best organized and coordinated in assembly areas. Units may opt","rect":[90.0,546.17431640625,521.9789805374146,537.066162109375]},{"page":124,"text":"not to use assembly areas if they determine that rapid action is essential to retain tactical advantages. Detailed","rect":[90.0,557.63720703125,522.0032863616943,548.529052734375]},{"page":124,"text":"advance planning—combined with digital communications, SOPs, and battle drills—may reduce negative","rect":[90.0,569.16015625,522.0653963165283,560.052001953125]},{"page":124,"text":"impacts of such a decision.","rect":[90.0,580.6631469726563,198.10378551483155,571.5750122070313]},{"page":124,"text":"5-33. Attacking units move into their assembly areas during the preparation phase unless they are already","rect":[90.0,598.1480712890625,522.0122585296631,589.0399169921875]},{"page":124,"text":"located in their assembly area. They move with as much secrecy as possible, normally at night and along","rect":[89.9999771118164,609.6710205078125,521.9430446624756,600.5628662109375]},{"page":124,"text":"routes that prevent or degrade an enemy force’s capabilities to observe or detect their movement. They avoid","rect":[90.0,621.1940307617188,521.9794216156006,612.0858154296875]},{"page":124,"text":"congesting their assembly areas and occupy those areas for the minimum possible time. Units are responsible","rect":[90.0,632.6569213867188,522.0122957305908,623.5487670898438]},{"page":124,"text":"for their own protection activities, such as local ground security, while in their assembly areas.","rect":[89.9899673461914,644.179931640625,468.5143690109253,635.07177734375]},{"page":124,"text":"5-34. Attacking units continue priorities of work to the extent the situation and mission allow before moving","rect":[89.9899673461914,661.7048950195313,521.9850368499756,652.5967407226563]},{"page":124,"text":"to attack positions. Preparations include but are not necessarily limited to—","rect":[89.99998474121094,673.1677856445313,393.0649223327637,664.0596313476563]},{"page":124,"text":" Protecting the force.","rect":[115.19999694824219,686.63427734375,214.6005048751831,677.526123046875]},{"page":124,"text":" Task-organizing.","rect":[115.19999694824219,700.13427734375,201.27587413787843,691.026123046875]},{"page":124,"text":" Performing reconnaissance.","rect":[115.19999694824219,713.63427734375,244.30175304412843,704.526123046875]},{"page":124,"text":"5-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":124,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":124,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":125,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":125,"text":"","rect":[133.1999969482422,80.78548431396485,139.16105696249009,76.09324645996094]},{"page":125,"text":"","rect":[133.1999969482422,94.28548431396485,139.16105696249009,89.59324645996094]},{"page":125,"text":"","rect":[133.1999969482422,107.78548431396485,139.16105696249009,103.09324645996094]},{"page":125,"text":"","rect":[133.1999969482422,121.28548431396485,139.16105696249009,116.59324645996094]},{"page":125,"text":"","rect":[133.1999969482422,134.78549194335938,139.16105696249009,130.09324645996095]},{"page":125,"text":"","rect":[133.1999969482422,148.28549194335938,139.16105696249009,143.59324645996095]},{"page":125,"text":"","rect":[133.1999969482422,161.78549194335938,139.16105696249009,157.09324645996095]},{"page":125,"text":"","rect":[133.1999969482422,175.28549194335938,139.16105696249009,170.59324645996095]},{"page":125,"text":"Refining the plan.","rect":[151.1999969482422,83.51434326171875,223.1877088546753,74.40616607666016]},{"page":125,"text":"Briefing the troops.","rect":[151.1999969482422,97.01434326171875,229.30791759490968,87.90616607666016]},{"page":125,"text":"Pre-combat checks.","rect":[151.1999969482422,108.49030303955078,229.5353651046753,101.40616607666016]},{"page":125,"text":"Pre-combat inspections.","rect":[151.1999969482422,123.99430847167969,247.2917890548706,114.90616607666016]},{"page":125,"text":"Moving logistics and medical support forward.","rect":[151.1999969482422,137.51434326171876,338.8996229171753,128.40615844726563]},{"page":125,"text":"Conducting rehearsals.","rect":[151.1999969482422,151.01434326171876,242.86797618865968,141.90615844726563]},{"page":125,"text":"Promoting adequate rest for both leaders and Soldiers.","rect":[151.1999969482422,164.51434326171876,368.4437208175659,155.40615844726563]},{"page":125,"text":"Positioning the force for subsequent action.","rect":[151.1999969482422,178.01434326171876,325.12322521209719,168.90615844726563]},{"page":125,"text":"5-35. Leaders at all levels conduct a reconnaissance of the actual terrain when this does not compromise","rect":[107.9937515258789,195.4591522216797,540.0552034454346,186.37100219726563]},{"page":125,"text":"OPSEC or result in excessive risk. In some areas, geospatial intelligence databases can enable leaders to","rect":[107.9937744140625,207.002197265625,540.0312404632568,197.89401245117188]},{"page":125,"text":"conduct a virtual reconnaissance when a physical reconnaissance is not practical. Leaders should also","rect":[107.98374938964844,218.465087890625,539.9184474945068,209.35690307617188]},{"page":125,"text":"reconnoiter the terrain at night when preparing for a limited-visibility attack.","rect":[107.98374938964844,229.98809814453126,414.33123302459719,220.87991333007813]},{"page":125,"text":"5-36. A thorough reconnaissance of the objective, its foreground, and other enemy positions is a critical part","rect":[107.98375701904297,247.5030517578125,540.0209116897584,238.38485717773438]},{"page":125,"text":"of attack preparation. Units exploit all available information collection assets to provide commanders","rect":[107.98375701904297,258.9458923339844,539.9748065452576,249.85775756835938]},{"page":125,"text":"necessary information. This includes requesting joint surveillance feeds of enemy movements from higher","rect":[107.98375701904297,270.48895263671877,539.9146020469666,261.3707580566406]},{"page":125,"text":"echelons or imagery of enemy obstacles.","rect":[107.98375701904297,282.01190185546877,270.7466993331909,272.9037170410156]},{"page":125,"text":"5-37. Reconnaissance forces infiltrate through the enemy disruption zone to conduct a zone or area","rect":[107.98375701904297,299.4767761230469,539.9860506134033,290.36859130859377]},{"page":125,"text":"reconnaissance. They can employ precision munitions and conventional indirect fires to destroy detected","rect":[107.97370147705078,310.9997863769531,539.9233303070068,301.8915100097656]},{"page":125,"text":"enemy outposts while remaining undetected. They locate and attempt to infiltrate the enemy’s main defensive","rect":[107.97370147705078,322.5227966308594,540.0461092071533,313.41461181640627]},{"page":125,"text":"positions to confirm enemy unit dispositions. When properly task-organized, units may also give forces","rect":[107.97372436523438,333.98565673828127,540.0852801780701,324.8774719238281]},{"page":125,"text":"conducting reconnaissance the mission to conduct covert breaches in the enemy force’s obstacle complexes","rect":[107.97372436523438,345.5086669921875,540.0200946311951,336.4004821777344]},{"page":125,"text":"to facilitate rapid movement of their parent units’ decisive or shaping operations.","rect":[107.96370697021485,357.03167724609377,431.8261671066284,347.9234924316406]},{"page":125,"text":"5-38. Units exercise and refine their schemes of maneuver and fires during rehearsals. These rehearsals are","rect":[107.96371459960938,374.49652099609377,540.0184602813721,365.3883361816406]},{"page":125,"text":"an important part of ensuring their plans’ coordination and synchronization. Commanders review the","rect":[107.96371459960938,386.01953125,540.0303011016846,376.9113464355469]},{"page":125,"text":"anticipated battle sequence with subordinate leaders to ensure all units understand the plan, the relationship","rect":[107.96370697021485,397.5224609375,539.9930324554443,388.434326171875]},{"page":125,"text":"between fire and movement, and the synchronization of critical events as part of their rehearsal process.","rect":[107.96370697021485,409.00537109375,539.8675489425659,399.8971862792969]},{"page":125,"text":"Sample critical events to focus on at rehearsals include—","rect":[107.96370697021485,420.5083312988281,337.40168380737307,411.4201965332031]},{"page":125,"text":" Execution triggers.","rect":[133.1999969482422,433.97430419921877,227.32494640350343,424.8661193847656]},{"page":125,"text":" Moving from assembly areas to individual unit LDs.","rect":[133.1999969482422,447.47430419921877,361.19121837615969,438.3661193847656]},{"page":125,"text":" Maneuvering from the LD to the PLD.","rect":[133.1999969482422,460.97430419921877,305.97893810272219,451.8661193847656]},{"page":125,"text":" Occupying support by fire positions.","rect":[133.1999969482422,474.47430419921877,297.55910778045657,465.3661193847656]},{"page":125,"text":" Conducting a breach or gap crossing (as appropriate).","rect":[133.1999969482422,487.97430419921877,365.60891246795657,478.8661193847656]},{"page":125,"text":" Assaulting the objective.","rect":[133.1999969482422,501.47430419921877,250.3639326095581,492.3561096191406]},{"page":125,"text":" Consolidating on the objective.","rect":[133.1999969482422,514.9743041992188,276.1674451828003,505.8561096191406]},{"page":125,"text":" Exploiting success or pursuing a withdrawing enemy.","rect":[133.1999969482422,528.4743041992188,365.92556285858157,519.3661499023438]},{"page":125,"text":" Actions of echelon reserves.","rect":[133.1999969482422,539.9502563476563,264.52520275115969,532.8661499023438]},{"page":125,"text":"Units must also conduct separate, stand-alone warfighting function rehearsals such as sustainment, fires, and","rect":[108.00376892089844,556.4331665039063,539.9269313812256,547.3250122070313]},{"page":125,"text":"C2 as necessary. The rehearsals should account any adverse conditions that are possiblewhich would provide","rect":[108.01377868652344,567.9561767578125,540.0862093048096,558.8480224609375]},{"page":125,"text":"time to identify and prepare them to cope with problems. These rehearsals include battle drills, such as","rect":[108.01377868652344,579.4791259765625,540.0111224632263,570.3709716796875]},{"page":125,"text":"breaching minefields at lower tactical echelons.","rect":[108.02379608154297,590.9420166015625,298.4969434738159,581.8338623046875]},{"page":125,"text":"5-39. From their assembly areas, attacking units move to their attack positions. (See figure 5-2 on page 5-8.)","rect":[108.02379608154297,608.467041015625,540.0612084922791,599.3588256835938]},{"page":125,"text":"Units move from assembly areas to the attack positions in the same way as for any other tactical movement.","rect":[108.02379608154297,619.989990234375,540.0561475753784,610.8818359375]},{"page":125,"text":"The number of columns each unit employs in its movement depends on the availability of suitable routes and","rect":[108.02381896972656,631.452880859375,539.9944972991943,622.3447265625]},{"page":125,"text":"the friendly and enemy situation. The tactical situation and the order in which commanders want subordinate","rect":[108.02379608154297,642.9758911132813,540.1004304962158,633.8677368164063]},{"page":125,"text":"units to arrive at their attack positions governs the march formation. The LD facilitates the simultaneous","rect":[108.02381896972656,654.4989013671875,540.0131366233826,645.3907470703125]},{"page":125,"text":"initiation of the attack at the prescribed time by all attacking units.","rect":[108.02381896972656,665.9617919921875,373.5085401535034,656.8536376953125]},{"page":125,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":125,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":125,"text":"5-7","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.7260131835938]},{"page":126,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":126,"text":"Figure 5-2. Example control measures for movement from assembly area to attack position","rect":[81.05999755859375,354.47418212890627,512.8829929847717,345.08544921875]},{"page":126,"text":"5-40. Dismounted infantry units move by tactical vehicles to the maximum extent possibleprior to the arrival","rect":[89.99781799316406,377.9309997558594,521.9620737991334,368.82281494140627]},{"page":126,"text":"of identified dismount points to avoid prematurely exhausting their Soldiers. However, dismounted infantry","rect":[89.99781799316406,389.4540100097656,521.9792995452881,380.3458251953125]},{"page":126,"text":"forces should not travel too far forward in tactical vehicles. Enemy forces can detect the noise and other","rect":[90.00790405273438,400.9168701171875,521.9905297813416,391.8086853027344]},{"page":126,"text":"battlefield signatures associated with using tactical vehicles at a greater distance than they can detect","rect":[90.00785827636719,412.43988037109377,521.9365611038209,403.3316955566406]},{"page":126,"text":"dismounted infantry Soldiers. An enemy force will probably respond to friendly tactical vehicles with direct","rect":[90.00785827636719,423.962890625,522.0323252639771,414.8547058105469]},{"page":126,"text":"and indirect fire systems. Units weigh the need for security against the time required to conduct a foot march","rect":[90.00785827636719,435.42578125,521.9287624359131,426.3175964355469]},{"page":126,"text":"and its resulting effects on their Soldiers’ physical stamina.","rect":[90.00785827636719,446.9487609863281,326.9267530441284,437.840576171875]},{"page":126,"text":"5-41. Units move rapidly through their attack positions and across LDs controlled by friendly forces. Units","rect":[89.99781799316406,464.4737548828125,522.0539691429138,455.3655700683594]},{"page":126,"text":"use their designated attack positions only as needed. For example, it is a place they refuel before crossing the","rect":[89.99781799316406,475.9366149902344,521.9650545196533,466.82843017578127]},{"page":126,"text":"LD to ensure sufficient fuel to reach the objective. Units use attack positions when friendly conditions have","rect":[90.0078353881836,487.4595947265625,522.0122346954346,478.3414001464844]},{"page":126,"text":"not yet been set. Units should minimize the time they remain stationary in their attack positions. Generally,","rect":[90.0078353881836,498.98260498046877,521.9418897628784,489.8744201660156]},{"page":126,"text":"units should initiate actions to protect themselves and increase their survivability every 10 to 15 minutes.","rect":[90.0078353881836,510.44549560546877,521.9580640792847,501.3373107910156]},{"page":126,"text":"This includes such things as deploying local security, deploying camouflage nets, and starting the","rect":[90.0078125,521.968505859375,522.0862703399658,512.8603515625]},{"page":126,"text":"construction of fighting and survivability positions. Units can use quartering parties to assist in occupying","rect":[90.01785278320313,533.4915161132813,522.0139675140381,524.3833618164063]},{"page":126,"text":"their attack positions.","rect":[90.01785278320313,544.934326171875,175.86220836639405,535.84619140625]},{"page":126,"text":"5-42. Commanders may designate points of departure for their attacking units instead of an LD for units","rect":[90.01785278320313,562.4692993164063,521.9320209007263,553.3611450195313]},{"page":126,"text":"attacking on foot using infiltration and stealth. Armored and Stryker units normally use gaps or lanes through","rect":[90.01782989501953,573.9923095703125,522.0243434906006,564.8841552734375]},{"page":126,"text":"friendly positions to allow them to deploy into movement formations before they cross the LD.","rect":[90.01790618896485,585.4552612304688,470.26992321014407,576.3471069335938]},{"page":126,"text":"5-43. Preliminary operations for an attack may include using preparation fire and the relief of units in contact","rect":[90.01787567138672,602.980224609375,522.0512461624146,593.8720703125]},{"page":126,"text":"by executing a relief in place or a forward passage of lines. The relief of units may be desirable to continue","rect":[90.00785827636719,614.443115234375,522.0733308868408,605.3349609375]},{"page":126,"text":"the momentum of the attack with fresh troops, change the direction of the attack, exploit a weakness in the","rect":[90.00785827636719,625.966064453125,521.9057283477783,616.85791015625]},{"page":126,"text":"enemy position with reserves, or initiate an offensive on a stabilized front.","rect":[90.00785827636719,637.4891357421875,386.93365001678469,628.3809814453125]},{"page":126,"text":"5-44. Tactical commanders use artillery, mortar, fixed and rotary wing aircraft, electromagnetic warfare, and","rect":[90.00785827636719,654.9539794921875,521.9861354827881,645.8458251953125]},{"page":126,"text":"military information support operations to conduct preparation fire. They develop their preparation fire from","rect":[90.00785827636719,666.4769287109375,522.0653967819214,657.3687744140625]},{"page":126,"text":"the top down, with bottom-up refinement. Those subordinate units most affected by the effects of these","rect":[90.00785827636719,678.0,522.0533113555908,668.891845703125]},{"page":126,"text":"preparation fires must strongly emphasize the bottom-up refinement process. Preparation fire can—","rect":[90.00785827636719,689.462890625,488.83393478393557,680.354736328125]},{"page":126,"text":" Destroy enemy forces.","rect":[115.19999694824219,702.894287109375,223.48020458221436,693.796142578125]},{"page":126,"text":" Suppress, neutralize, or disrupt high-value or high-payoff targets.","rect":[115.19999694824219,716.394287109375,394.83623790740969,707.2861328125]},{"page":126,"text":"5-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":126,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":126,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":127,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":127,"text":"","rect":[133.1999969482422,80.78548431396485,139.16105696249009,76.09324645996094]},{"page":127,"text":"","rect":[133.1999969482422,94.28548431396485,139.16105696249009,89.59324645996094]},{"page":127,"text":"","rect":[133.1999969482422,107.78548431396485,139.16105696249009,103.09324645996094]},{"page":127,"text":"","rect":[133.1999969482422,121.28548431396485,139.16105696249009,116.59324645996094]},{"page":127,"text":"","rect":[133.1999969482422,134.78549194335938,139.16105696249009,130.09324645996095]},{"page":127,"text":"Gain fire superiority.","rect":[151.1999969482422,83.51434326171875,235.4211072921753,74.40616607666016]},{"page":127,"text":"Suppress enemy forces in their defensive positions.","rect":[151.1999969482422,97.01434326171875,356.44475841522219,87.90616607666016]},{"page":127,"text":"Facilitate the attacking force’s maneuver.","rect":[151.1999969482422,110.51434326171875,316.9568738937378,101.40616607666016]},{"page":127,"text":"Deceive enemy forces.","rect":[151.1999969482422,124.01434326171875,242.56338024139405,114.90616607666016]},{"page":127,"text":"Isolate enemy forces.","rect":[151.1999969482422,137.51434326171876,236.50329113006593,128.40615844726563]},{"page":127,"text":"5-45. These preparation fires may initially destroy or disrupt only the enemy’s reconnaissance and security","rect":[108.00376892089844,154.97918701171876,540.0120143890381,145.87100219726563]},{"page":127,"text":"forces and their positions if attacking forces are in contact with the enemy’s disruption zone. In either case,","rect":[107.99372863769531,166.502197265625,540.0251417160034,157.39401245117188]},{"page":127,"text":"counterfires conducted as part of preparation fire can degrade the enemy’s fire support systems and assist in","rect":[107.98377990722656,178.02520751953126,539.9289455413818,168.91702270507813]},{"page":127,"text":"achieving fire superiority.","rect":[107.98373413085938,189.48809814453126,211.59258556365968,180.37991333007813]},{"page":127,"text":"5-46. Commanders ensure that attacking maneuver forces have the functional and multifunctional support","rect":[107.98373413085938,207.0030517578125,540.0391001663209,197.89486694335938]},{"page":127,"text":"and sustainment assets necessary to conduct the operation and maintain the momentum of their attacks as","rect":[107.98373413085938,218.4659423828125,539.9845721702576,209.35775756835938]},{"page":127,"text":"part of the preparation process. That support and sustainment effort must anticipate future maneuvers to","rect":[107.98373413085938,229.9689178466797,539.9901027679443,220.88076782226563]},{"page":127,"text":"ensure the uninterrupted advance of maneuver forces.","rect":[107.98373413085938,241.4918670654297,322.63823986053469,232.40371704101563]},{"page":127,"text":"EXECUTING AN ATTACK","rect":[90.0,266.7896423339844,261.7876334915161,257.10150146484377]},{"page":127,"text":"5-47. An attack consists of a series of advances and assaults by attacking units until they accomplish their","rect":[108.0,287.09429931640627,540.0432641563416,277.9861145019531]},{"page":127,"text":"mission. Commanders at all echelons use their initiative to shift their main effort among units as necessary","rect":[108.0,298.55718994140627,540.0163478851318,289.4490051269531]},{"page":127,"text":"to take advantage of opportunities and momentum to ensure the enemy force’s rapid destruction. Attacking","rect":[108.0,310.0801696777344,540.0244045257568,300.97198486328127]},{"page":127,"text":"units move as quickly as possible, following reconnaissance elements through gaps in the enemy force’s","rect":[107.98998260498047,321.6031799316406,539.9221332054138,312.4949951171875]},{"page":127,"text":"defenses. Units shift their efforts to reinforce success and carry the battle deep into the enemy force’s rear.","rect":[107.9800033569336,333.0660705566406,540.0714673995972,323.9578857421875]},{"page":127,"text":"Commanders do not delay their attacks to preserve the alignment of subordinate units or adhere too closely","rect":[107.96995544433594,344.58905029296877,539.9952907562256,335.4808654785156]},{"page":127,"text":"to their preconceived plans.","rect":[107.96995544433594,356.0920104980469,218.53765392303468,347.0038757324219]},{"page":127,"text":"5-48. Units strive to retain their freedom of action while protecting their forces. They continually seek","rect":[107.96995544433594,373.5769348144531,539.9221096038818,364.46875]},{"page":127,"text":"opportunities to defeat, destroy, or reduce the enemy force’s combat power or shatter the enemy force’s","rect":[107.96995544433594,385.09991455078127,540.0222918968201,375.9917297363281]},{"page":127,"text":"cohesion and capability to fight even if those opportunities deviate from their previous detailed plans for","rect":[107.95990753173828,396.6229248046875,539.9689843711853,387.5147399902344]},{"page":127,"text":"defeating the enemy force. Units avoid strict adherence to plans no longer appropriate to battlefield","rect":[107.95992279052735,408.0858154296875,539.9219875335693,398.9776306152344]},{"page":127,"text":"conditions.","rect":[107.95992279052735,417.5847473144531,152.16515636444093,410.5006103515625]},{"page":127,"text":"5-49. Commanders avoid becoming so committed to their initial plan that they neglect opportunities. They","rect":[107.95992279052735,437.1337890625,539.9438381195068,428.0256042480469]},{"page":127,"text":"remain mentally prepared to abandon failed attacks and exploit unanticipated successes or enemy errors by","rect":[107.95992279052735,448.5967102050781,539.9171657562256,439.48846435546877]},{"page":127,"text":"designating other units to conduct their main effort in response to changing situations. Commanders follow","rect":[107.95990753173828,460.1196594238281,539.9912762680053,451.011474609375]},{"page":127,"text":"the tactical framework when attacking.","rect":[107.95994567871094,471.64263916015627,263.6967420578003,462.5344543457031]},{"page":127,"text":"FIND THE ENEMY","rect":[90.0,494.8927001953125,176.52793979644776,486.81597900390627]},{"page":127,"text":"5-50. Gaining and maintaining contact with an enemy force, who is determined to break contact, is vital to","rect":[108.0,514.8543090820313,539.8920803070068,505.7461242675781]},{"page":127,"text":"the success of offensive actions. A defending enemy force generally establishes a disruption zone around","rect":[107.99996185302735,526.3773193359375,540.0270290374756,517.2691650390625]},{"page":127,"text":"those forces occupying the main line of defense to make early contact with attacking forces to determine their","rect":[108.0,537.8402099609375,540.0631616172791,528.7320556640625]},{"page":127,"text":"capabilities, intent, COA, and to disrupt their approach. An enemy unit uses that disruption zone to defeat","rect":[108.0,549.3631591796875,540.0774302444459,540.2550048828125]},{"page":127,"text":"friendly reconnaissance forces and hide enemy dispositions, capabilities, and intent. An enemy commander’s","rect":[107.99002075195313,560.8861694335938,540.1024920921326,551.7780151367188]},{"page":127,"text":"goal is to compel the attacking force to conduct a movement to contact against defending enemy forces that","rect":[107.9800033569336,572.34912109375,540.0704722366334,563.2409057617188]},{"page":127,"text":"know the exact location of the attacking force.","rect":[107.97994995117188,583.8720703125,293.4190626144409,574.763916015625]},{"page":127,"text":"5-51. Units employ their combat power to overwhelm enemy forces based on their situational understanding.","rect":[107.97994995117188,601.3970947265625,540.1273756027222,592.2889404296875]},{"page":127,"text":"However, echelons below division do not normally have the detection, tracking, and weapon systems","rect":[107.97994995117188,612.8599243164063,539.9712665061951,603.7517700195313]},{"page":127,"text":"necessary to conduct supporting efforts directed against enemy forces not currently committed to close","rect":[107.97994995117188,624.3829345703125,540.0254182891846,615.2747802734375]},{"page":127,"text":"combat. The way a unit gains and maintains contact depends on whether the unit is in contact with the","rect":[107.96991729736328,635.9059448242188,540.0170564727783,626.7977905273438]},{"page":127,"text":"enemy’s disruption zone or the enemy’s battle zone. It also depends on the echelon of the unit in the nested","rect":[107.96991729736328,647.3687744140625,539.9445095062256,638.2606201171875]},{"page":127,"text":"layers of reconnaissance and security. For example, the intent of a corps’ reconnaissance effort is to determine","rect":[107.96990203857422,658.891845703125,539.9953279571533,649.7836303710938]},{"page":127,"text":"the dispositions, composition, direction of movement, and rate of movement of a defending enemy’s","rect":[107.96994018554688,670.414794921875,540.0324237327576,661.306640625]},{"page":127,"text":"significant forces. A reinforced armored BCT, task-organized as a covering force or advance guard, can fight","rect":[107.96990203857422,681.877685546875,540.0013804397584,672.76953125]},{"page":127,"text":"through most disruption zones, develop the situation, confirm information provided by technical means, and","rect":[107.96994018554688,693.4006958007813,539.8810939788818,684.2925415039063]},{"page":127,"text":"force enemy forces to reveal additional information prior to divisions executing close operations. This","rect":[107.96995544433594,704.9237060546875,539.9723041038513,695.8155517578125]},{"page":127,"text":"additional information often includes locating the enemy’s tactical and possibly operational reserves. At a","rect":[107.96990203857422,716.3865966796875,539.9021272735596,707.2784423828125]},{"page":127,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":127,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":127,"text":"5-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":128,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":128,"text":"lower echelon, a maneuver battalion constituting the advance guard of the main body of a BCT can use its","rect":[90.0,83.51434326171875,521.9772479515076,74.40616607666016]},{"page":128,"text":"scout platoon to conduct a zone reconnaissance that focuses on acquiring enemy positions and obstacles. ","rect":[89.98994445800781,94.97723388671875,510.93020153045657,85.86905670166016]},{"page":128,"text":"5-52. The ability of units to anticipate an enemy force’s actions by gaining and maintaining contact with all","rect":[89.98994445800781,112.4921875,522.0052866897584,103.3840103149414]},{"page":128,"text":"significant parts of their opposing enemy forces—to include tracking enemy reserves, fire support, and","rect":[89.97993469238281,124.01519775390625,521.9444484710693,114.9069595336914]},{"page":128,"text":"follow-on forces—increases the security of attacking forces. Units seek to detect enemy attempts to shift","rect":[89.9800033569336,135.47808837890626,521.9553599319459,126.36991119384766]},{"page":128,"text":"major elements of defending enemy forces or launch a counterattack. They can prevent enemy reconnaissance","rect":[89.96994018554688,147.00103759765626,521.9316072540283,137.88284301757813]},{"page":128,"text":"assets from detecting major friendly force attacking movements by sending out a force to conduct zone","rect":[89.96994018554688,158.5240478515625,522.1035432891846,149.40585327148438]},{"page":128,"text":"reconnaissance with an on-order security mission. The risks to an enemy force increase when friendly forces","rect":[89.96995544433594,169.9869384765625,521.9623553733826,160.87875366210938]},{"page":128,"text":"impede or deny success to enemy collection assets. These factors result in providing attacking units with","rect":[89.9699935913086,181.50994873046876,521.9609279632568,172.40176391601563]},{"page":128,"text":"additional time to take advantage of changing situations. Moving within an enemy force’s decision cycle","rect":[89.9699935913086,193.032958984375,522.0281648712158,183.92477416992188]},{"page":128,"text":"allows friendly units to take advantage of successes by transitioning to the tasks of exploitation and pursuit","rect":[89.95990753173828,204.495849609375,521.9767832717896,195.38766479492188]},{"page":128,"text":"and to complete the enemy’s destruction.","rect":[89.95992279052735,216.018798828125,254.35105419158936,206.91061401367188]},{"page":128,"text":"FIX THE ENEMY","rect":[72.0,239.35269165039063,151.62414646148683,231.27597045898438]},{"page":128,"text":"5-53. The purpose of fixing enemy forces is to prevent the enemy from repositioning within their battle zone.","rect":[90.0,259.2542724609375,522.0423536300659,250.14608764648438]},{"page":128,"text":"Every friendly move causes the enemy force to react. An enemy commander opposes friendly units","rect":[89.99996185302735,270.77728271484377,522.0590350608826,261.6690979003906]},{"page":128,"text":"attempting to fix enemy’s forces. Friendly units do everything possible to limit the options available to enemy","rect":[89.99996185302735,282.3003234863281,522.0134181976318,273.19207763671877]},{"page":128,"text":"forces. Fixing an enemy into a given position or COA and controlling the enemy force’s movements limit","rect":[89.98999786376953,293.7631530761719,521.9501719436646,284.65496826171877]},{"page":128,"text":"enemy options and reduce the amount of battlefield uncertainty and associated risk.","rect":[89.98998260498047,305.2861633300781,423.75930309295657,296.177978515625]},{"page":128,"text":"5-54. Units seek to fix enemy forces with the minimum amount of combat power. Commanders normally","rect":[89.98998260498047,322.8111267089844,521.9800930023193,313.70294189453127]},{"page":128,"text":"allocate the bulk of their friendly combat power to forces conducting their main effort. Thus, fixing operations","rect":[89.98998260498047,334.2740173339844,522.0594012718201,325.16583251953127]},{"page":128,"text":"are supporting efforts. Therefore, units carefully consider which enemy elements to fix and target only those","rect":[90.0,345.7970275878906,522.0875520782471,336.6888427734375]},{"page":128,"text":"that can significantly affect the outcome of their operations. The longer the requirement to fix these forces,","rect":[90.01002502441406,357.32000732421877,522.0114698410034,348.2118225097656]},{"page":128,"text":"the more resources units need to accomplish the mission. Generally, the support force engages enemy forces","rect":[90.01002502441406,368.78289794921877,522.0092914085388,359.6747131347656]},{"page":128,"text":"so they cannot respond to the friendly main effort. This may require units to slow the rate of movement of","rect":[90.01001739501953,380.305908203125,521.9702661094666,371.1977233886719]},{"page":128,"text":"selected enemy units to prevent them from influencing the outcome of the operation.","rect":[90.01001739501953,391.8288879394531,428.63296031951907,382.720703125]},{"page":128,"text":"5-55. Reducing uncertainty allows friendly forces to maneuver to mass the effects of overwhelming combat","rect":[90.01001739501953,409.29376220703127,522.0914072952271,400.1855773925781]},{"page":128,"text":"power against a portion of an enemy force. It gives units more time to modify their attack plan as necessary","rect":[90.01001739501953,420.8167419433594,521.9770412445068,411.70855712890627]},{"page":128,"text":"and synchronize their employment of friendly forces. It allows units to mass forces in one place by using","rect":[90.01001739501953,432.3398132324219,521.9396266937256,423.2315368652344]},{"page":128,"text":"economy of force measures in other areas. Units may also try to fix selected enemy units, such as the enemy","rect":[90.01000213623047,443.8027038574219,521.9925441741943,434.6944274902344]},{"page":128,"text":"reserve or follow-on force, to prevent them from repositioning or maneuvering against friendly forces","rect":[90.0199966430664,455.32562255859377,522.0655047874451,446.2174377441406]},{"page":128,"text":"conducting the main effort.","rect":[90.02003479003906,466.78851318359377,198.90737438201905,457.6803283691406]},{"page":128,"text":"5-56. Severing enemy lines of communications and main supply routes over prolonged periods by using","rect":[90.0300521850586,484.303466796875,522.0411281585693,475.1952819824219]},{"page":128,"text":"interdiction measures is another way to fix enemy forces. These measures can range from air interdiction that","rect":[90.0300521850586,495.8264465332031,522.0356821975709,486.71826171875]},{"page":128,"text":"destroys bridges and rail switching yards to ambushes of enemy resupply convoys conducted by infiltrating","rect":[90.0300521850586,507.289306640625,521.9337673187256,498.1811218261719]},{"page":128,"text":"combat patrols.","rect":[90.0300521850586,518.7922973632813,151.69411754608155,509.7041320800781]},{"page":128,"text":"5-57. Another method of fixing enemy forces is to tie obstacles into the existing terrain to further canalize","rect":[90.0300521850586,536.3372802734375,522.0592317657471,527.2291259765625]},{"page":128,"text":"and slow the movement of enemy reserves. At lower tactical echelons, scatterable minefields can isolate","rect":[90.03004455566406,547.8001708984375,521.9792146759033,538.6920166015625]},{"page":128,"text":"objectives from possible enemy reinforcement or counterattacks and block or disrupt enemy actions to the","rect":[90.03004455566406,559.3231811523438,522.0634431915283,550.2049560546875]},{"page":128,"text":"flanks. Units can use tactical deception operations and activities, such as demonstrations and false preparation","rect":[90.03004455566406,570.826171875,522.0012722015381,561.738037109375]},{"page":128,"text":"fires, to fix enemy forces. Using extensive obscuration and vehicle mockups in a tactical deception effort can","rect":[90.03004455566406,582.30908203125,522.0703639984131,573.200927734375]},{"page":128,"text":"also assist in fixing targeted enemy forces.","rect":[90.04005432128906,593.83203125,260.2968397140503,584.723876953125]},{"page":128,"text":"5-58. Another method of isolating the objective is to use lethal and nonlethal effects. Lethal effects may","rect":[90.04005432128906,611.3570556640625,522.0176296234131,602.2388305664063]},{"page":128,"text":"range from sniper fire to a joint fire plan designed to destroy a selected portion of an enemy force. Nonlethal","rect":[90.04005432128906,622.8199462890625,522.0640635452271,613.7017211914063]},{"page":128,"text":"effects, such as electromagnetic warfare, can prevent enemy forces from receiving orders or vital intelligence","rect":[90.04005432128906,634.3429565429688,522.0624666290283,625.2348022460938]},{"page":128,"text":"and information or disrupt enemy fire control systems.","rect":[90.05007934570313,645.865966796875,308.3758497238159,636.7578125]},{"page":128,"text":"FINISH THE ENEMY","rect":[72.0,669.1422119140625,167.99940586090089,661.0559692382813]},{"page":128,"text":"5-59. With the enemy force found and fixed, commanders maneuver subordinate forces to accomplish the","rect":[90.0,689.0343017578125,522.0674715118408,679.9261474609375]},{"page":128,"text":"mission. Units seek to avoid an enemy’s defensive strength by attacking through a point of relative weakness,","rect":[90.0,700.5573120117188,522.1354932785034,691.4491577148438]},{"page":128,"text":"such as a flank or rear.","rect":[90.0,710.0562744140625,180.58080577850343,702.97216796875]},{"page":128,"text":"5-10","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":128,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":128,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":129,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":129,"text":"5-60. The key to success is to strike hard and fast, overwhelm a portion of the enemy force, and then quickly","rect":[108.0,83.51434326171875,540.0212917327881,74.40616607666016]},{"page":129,"text":"transition to the next objective or phase. This maintains the momentum of the attack without reducing the","rect":[108.0,94.97723388671875,539.8947420196533,85.85903930664063]},{"page":129,"text":"pressure on enemy forces. Additionally, units make every effort to locate and track enemy reserves and","rect":[108.0,106.500244140625,539.9855861663818,97.3920669555664]},{"page":129,"text":"follow-on forces to prevent friendly forces from unexpected attack by significant enemy forces. It also allows","rect":[108.0,118.023193359375,540.1004168968201,108.9150161743164]},{"page":129,"text":"units time to delay, disrupt, or destroy these enemy forces before they can interfere with their attacks.","rect":[108.0,129.486083984375,513.6992750167847,120.3779067993164]},{"page":129,"text":"5-61. The rest of this section shows an example of how a friendly force would finish the enemy. It includes","rect":[108.0,147.0111083984375,539.9671771507263,137.90292358398438]},{"page":129,"text":"actions to disrupt the enemy; movement from the line of departure; actions at the probable line of deployment,","rect":[107.98998260498047,158.5340576171875,540.0621290206909,149.42587280273438]},{"page":129,"text":"assault position, final coordination line; and actions on the objective–both mounted and dismounted.","rect":[107.98998260498047,169.9969482421875,509.54848766326907,160.87875366210938]},{"page":129,"text":"Disrupting the Enemy","rect":[90.0,194.60069274902345,193.74671363830567,184.79554748535157]},{"page":129,"text":"5-62. As part of finishing the enemy, friendly units disrupt the enemy force to increase the likelihood of","rect":[108.0,212.154296875,540.0323998985291,203.04611206054688]},{"page":129,"text":"success during the attack. Disrupting one or more parts of the enemy combined arms team creates multiple","rect":[108.0,223.6171875,540.0022859649658,214.50900268554688]},{"page":129,"text":"dilemmas for the enemy, weakens the entire enemy force, and allows friendly units to attack selected portions","rect":[108.0,235.14019775390626,540.0814349632263,226.03201293945313]},{"page":129,"text":"of the remaining enemy force. This disruption effort usually occurs at echelons above brigade because lower","rect":[108.01001739501953,246.6632080078125,540.0526025352478,237.55502319335938]},{"page":129,"text":"echelons ","rect":[108.01001739501953,257.0,145.55195140838624,249.01785278320313]},{"page":129,"text":"lack ","rect":[150.96275329589845,257.0,170.02680492401124,249.01785278320313]},{"page":129,"text":"the ","rect":[175.43760681152345,257.0,190.18203258514405,249.01785278320313]},{"page":129,"text":"necessary ","rect":[195.59283447265626,258.12603759765627,236.97439098358155,251.0]},{"page":129,"text":"reconnaissance, ","rect":[242.330078125,257.0,307.8899793624878,249.01785278320313]},{"page":129,"text":"target ","rect":[313.30078125,258.12603759765627,338.54421520233157,250.01986694335938]},{"page":129,"text":"acquisition, ","rect":[343.89990234375,258.1059875488281,392.8796339035034,249.01785278320313]},{"page":129,"text":"intelligence ","rect":[398.2904357910156,258.12603759765627,447.4155225753784,249.01785278320313]},{"page":129,"text":"analysis, ","rect":[452.8262939453125,258.12603759765627,490.01055431365969,249.01785278320313]},{"page":129,"text":"cyber ","rect":[495.42132568359377,258.12603759765627,520.0665235519409,249.01785278320313]},{"page":129,"text":"and","rect":[525.4773559570313,257.0,539.9071559906006,249.01785278320313]},{"page":129,"text":"electromagnetic warfare, and target attack assets to engage enemy forces not committed to close combat.","rect":[108.01001739501953,269.6490478515625,539.9935865402222,260.5408630371094]},{"page":129,"text":"Their assessment and decisions regarding what to disrupt, when to disrupt, and for what purpose are critical","rect":[108.01001739501953,281.17205810546877,540.0349497756959,272.0638732910156]},{"page":129,"text":"Creating multiple dilemmas synchronized to deliver effects at the most opportune time overwhelms the","rect":[108.01001739501953,292.63494873046877,539.9931306915283,283.5267639160156]},{"page":129,"text":"enemy’s ability to command and control their forces and respond effectively.","rect":[108.01001739501953,304.1579284667969,416.5709180831909,295.04974365234377]},{"page":129,"text":"5-63. For example, the goal of disrupting an enemy fire support system is to allow friendly forces to","rect":[108.01001739501953,321.68292236328127,540.0294704437256,312.5747375488281]},{"page":129,"text":"maneuver and mass the effects of their weapon systems against the enemy without the enemy’s indirect fire","rect":[108.01000213623047,333.14581298828127,540.0634431915283,324.0376281738281]},{"page":129,"text":"weapons being able to engage friendly forces. Attacking forces can accomplish this by attacking enemy","rect":[108.01001739501953,344.6687927246094,539.9956569671631,335.56060791015627]},{"page":129,"text":"forward observers, fire direction centers, command posts, artillery and rocket systems, or ammunition storage","rect":[108.01001739501953,356.1316833496094,540.0981721954346,347.02349853515627]},{"page":129,"text":"areas. Each set of targets requires a different amount of resources. The probability of success, the","rect":[108.01001739501953,367.6546630859375,540.0052766876221,358.5464782714844]},{"page":129,"text":"effectiveness of the attack, and the time necessary to achieve the desired target effects varies with each set of","rect":[108.01000213623047,379.17767333984377,539.9838159141541,370.0694885253906]},{"page":129,"text":"targets. Timing is also important. If units execute their associated supporting efforts too early, an enemy force","rect":[108.01001739501953,390.64056396484377,540.0602693634033,381.5323791503906]},{"page":129,"text":"may have time to recover and respond before friendly forces conducting their main effort can complete their","rect":[108.01002502441406,402.16357421875,540.0484521446228,393.0553894042969]},{"page":129,"text":"maneuver.","rect":[108.01000213623047,411.66253662109377,149.99181652069093,406.9130554199219]},{"page":129,"text":"5-64. Units seek to use the element of surprise to conduct operations that strike at enemy forces upon making","rect":[108.01001739501953,431.15142822265627,540.0134792327881,422.0432434082031]},{"page":129,"text":"any type of contact with enemy forces. This surprise denies enemy forces the opportunity to focus and","rect":[108.01000213623047,442.6744384765625,539.9681301116943,433.56622314453127]},{"page":129,"text":"synchronize combat power against attacking friendly forces. It prevents enemy forces from massing","rect":[108.01000213623047,454.19744873046877,539.9810695648193,445.0892639160156]},{"page":129,"text":"defending enemy forces or fires at critical times and locations. Surprise can produce confusion, fear, and","rect":[108.01000213623047,465.6602783203125,539.9946193695068,456.5520935058594]},{"page":129,"text":"piecemeal resistance. These operations disrupt both the enemy’s combined arms team and the enemy","rect":[108.01001739501953,477.18328857421877,540.0342922210693,468.0751037597656]},{"page":129,"text":"commander’s ability to plan operations and control enemy forces. These operations, once initiated, continue","rect":[108.01001739501953,488.706298828125,540.1366243438721,479.5981140136719]},{"page":129,"text":"throughout their attacks. Units use any existing advantages over enemy forces in these areas to aid their","rect":[108.01001739501953,500.1691589355469,539.8957421836853,491.06097412109377]},{"page":129,"text":"disruption process through lethal and nonlethal effects.","rect":[108.01001739501953,511.6921691894531,327.72158336639407,502.583984375]},{"page":129,"text":"Movement from the Line of Departure","rect":[90.0,536.21875,271.1040626678467,526.435546875]},{"page":129,"text":"5-65. Units transition from movement to maneuver once they cross their LDs. If circumstances dictate","rect":[108.0,553.7343139648438,539.9371614532471,544.6261596679688]},{"page":129,"text":"crossing the LD not in their proper movement formation they establish a probable line of deployment to","rect":[108.0,565.25732421875,540.0273952484131,556.149169921875]},{"page":129,"text":"indicate where they will transition to their appropriate movement formation. They move aggressively and as","rect":[108.00003814697266,576.7802734375,540.0595233421326,567.672119140625]},{"page":129,"text":"quickly as the terrain and enemy situation allows. They move forward using appropriate movement","rect":[108.00003814697266,588.2431640625,540.0234751663209,579.135009765625]},{"page":129,"text":"techniques assisted by the fires of supporting units. Fire and movement are closely integrated and","rect":[108.00003814697266,599.7661743164063,540.0364894866943,590.6580200195313]},{"page":129,"text":"coordinated. Effective suppressive fires facilitate friendly movement, and friendly movement facilitates","rect":[108.00003814697266,611.2891845703125,539.9271380882263,602.1810302734375]},{"page":129,"text":"effective fires. Attacking units use avenues of approach that avoid strong enemy defensive positions, take","rect":[108.00003814697266,622.7520751953125,539.9482698516846,613.6439208984375]},{"page":129,"text":"advantage of all available cover and concealment, and maneuver forces to positions of advantage against the","rect":[108.00003814697266,634.2750244140625,539.9562044219971,625.1668701171875]},{"page":129,"text":"defending enemy forces. Units use obscurants to conceal their movement where cover and concealment are","rect":[108.01005554199219,645.798095703125,540.0191316680908,636.68994140625]},{"page":129,"text":"not available. Any delays in establishing obscuration and suppressive fires before crossing their LDs may","rect":[108.01005554199219,657.2609252929688,540.0064601898193,648.1527709960938]},{"page":129,"text":"require attacking units to occupy their assault positions.","rect":[108.01005554199219,668.783935546875,330.8347120285034,659.67578125]},{"page":129,"text":"5-66. Artillery and other ground-based fires assets move as necessary to ensure that attacking units remain","rect":[108.01005554199219,686.3088989257813,539.9323024749756,677.2007446289063]},{"page":129,"text":"within supporting range. Units analyze the time it takes maneuver units to move from their LDs to their PLDs","rect":[108.01005554199219,697.7717895507813,540.1137225608826,688.6636352539063]},{"page":129,"text":"and the distances involved. This analysis provides the data that units use to ensure supporting systems can","rect":[108.01005554199219,709.2947998046875,539.9579982757568,700.1866455078125]},{"page":129,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":129,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":129,"text":"5-11","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":130,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":130,"text":"provide the necessary fire support before their supported maneuver units move inside the effective range of","rect":[90.0,83.51434326171875,521.9753930625916,74.40616607666016]},{"page":130,"text":"enemy direct fire weapon systems. Units use fires delivered from fixed- and rotary-wing systems and the","rect":[90.0000228881836,94.97723388671875,521.9962434844971,85.86905670166016]},{"page":130,"text":"autonomous operation capabilities of artillery systems to help counter enemy artillery range advantages.","rect":[90.0,106.500244140625,506.2619276046753,97.3920669555664]},{"page":130,"text":"5-67. Units deploy to maintain maximum firepower against known enemy positions when they expect to","rect":[90.0,124.02520751953125,521.9276027679443,114.91703033447266]},{"page":130,"text":"make contact at or shortly beyond their LDs. Commanders select the formation that best balances firepower,","rect":[90.0,135.48809814453126,521.9860181808472,126.37992095947266]},{"page":130,"text":"tempo, security, and control for the specific situation. They have the option of deploying a security force in","rect":[90.0,147.0111083984375,521.9072170257568,137.90292358398438]},{"page":130,"text":"front of their attacking units. Units may also employ flank or rear security forces if required by the enemy","rect":[90.0,158.5340576171875,521.9849758148193,149.42587280273438]},{"page":130,"text":"situation. They may not want to change formations during the attack because of potential loss of momentum","rect":[90.0,169.9969482421875,522.1195349655152,160.88876342773438]},{"page":130,"text":"resulting from such changes. Attacking forces transition to the bounding overwatch movement technique","rect":[90.0,181.51995849609376,522.0411653594971,172.41177368164063]},{"page":130,"text":"when they expect enemy contact. See paragraphs 2-20 through 2-23 for more information on the bounding","rect":[90.0,193.04296875,521.9431667327881,183.93478393554688]},{"page":130,"text":"overwatch movement technique.","rect":[89.98999786376953,204.48582458496095,220.2961072921753,195.39767456054688]},{"page":130,"text":"5-68. Between the LD and the PLD, attackers seize intermediate objectives only to eliminate enemy positions","rect":[89.98998260498047,222.02081298828126,521.9962909202576,212.90261840820313]},{"page":130,"text":"or apply additional suppressive fires. Artillery, rocket, electromagnetic warfare, and aerial assets engage","rect":[89.98994445800781,233.48370361328126,522.0373201446533,224.37551879882813]},{"page":130,"text":"targets of opportunity and enemy security forces. They direct subordinate forces to occupy predesignated","rect":[89.97993469238281,245.0067138671875,521.9525051116943,235.89846801757813]},{"page":130,"text":"support by fire positions as their units approach suspected enemy positions or danger areas. Lethal fires,","rect":[89.9800033569336,256.5296630859375,521.9133863449097,247.42147827148438]},{"page":130,"text":"suppression, and obscuration enable attacking forces to occupy these support by fire positions. Units use","rect":[89.97996520996094,267.9925537109375,521.9454011993408,258.8843688964844]},{"page":130,"text":"direct fires from these positions to suppress enemy forces while the rest of their formation continues to","rect":[89.97996520996094,279.51556396484377,521.9471950531006,270.4073791503906]},{"page":130,"text":"advance toward their objectives.","rect":[89.97997283935547,291.03857421875,219.38531017303468,281.9203796386719]},{"page":130,"text":"5-69. Units engage known enemy forces with the maximum combat power to overwhelm them as quickly as","rect":[89.97997283935547,308.50341796875,522.0482318382263,299.3952331542969]},{"page":130,"text":"possible. Attacking units that encounter a small enemy unit on the way to their objectives either quickly","rect":[89.97997283935547,320.02642822265627,521.9451808929443,310.9082336425781]},{"page":130,"text":"overrun or bypass that small enemy unit if it meets the bypass criteria.","rect":[89.97993469238281,331.5494079589844,370.8285779953003,322.44122314453127]},{"page":130,"text":"Actions at the Probable Line of Deployment, Assault Position, or Final Coordination Line","rect":[72.0,356.0606994628906,491.7640052947998,346.2555847167969]},{"page":130,"text":"5-70. Attacking units maintain their pace of advance as they approach their PLDs. Commanders divide their","rect":[90.0,373.6142883300781,521.9822900352478,364.506103515625]},{"page":130,"text":"attacking units into one or more assault and support forces either before or on reaching the PLD. Infantry","rect":[89.9999771118164,385.1372985839844,521.8666286468506,376.02911376953127]},{"page":130,"text":"Soldiers dismount from their combat vehicles at their PLD, if necessary. All forces supporting the assault","rect":[89.9999771118164,396.60015869140627,521.9964365921021,387.4919738769531]},{"page":130,"text":"force are in their support by fire positions before the assault force crosses the PLD. Units synchronize the","rect":[89.9999771118164,408.1231689453125,521.9320345001221,399.0149841308594]},{"page":130,"text":"occupation of support by fire positions with the maneuver of their supported attacking units to limit the","rect":[90.0,419.64617919921877,521.9773225860596,410.5379943847656]},{"page":130,"text":"vulnerability of the forces occupying these positions. They use unit tactical SOPs, battle drills, prearranged","rect":[90.0,431.10906982421877,521.9390773773193,422.0008850097656]},{"page":130,"text":"signals, EAs, and target reference points (TRPs) to control the direct fires from these supporting positions.","rect":[90.0,442.6320495605469,521.8688917160034,433.52386474609377]},{"page":130,"text":"Units normally employ RFLs between converging forces.","rect":[90.0,454.1550598144531,320.2776746749878,445.046875]},{"page":130,"text":"5-71. Figure 5-3 shows that the PLD can be co-located or near the assault position. Units ensure that the final","rect":[90.01004028320313,471.6199035644531,522.1013560256959,462.51171875]},{"page":130,"text":"preparations of their breach forces in assault positions do not delay maneuver to breach points as soon as","rect":[90.0000228881836,483.1429138183594,522.0230853538513,474.03472900390627]},{"page":130,"text":"conditions are set. Whenever possible, assault forces rapidly pass through their assault positions. They may","rect":[90.0000228881836,494.6658935546875,522.0263576507568,485.5577087402344]},{"page":130,"text":"have to halt in their assault positions while supporting and suppressive fires lift and shift. In this case, if the","rect":[90.0000228881836,506.1287841796875,522.0594759063721,497.0205993652344]},{"page":130,"text":"defending enemy force anticipates the assault, assault forces deploy into covered positions, and obscure their","rect":[89.99000549316406,517.6517944335938,521.9682519493103,508.5436096191406]},{"page":130,"text":"positions with smoke. Support forces continue their suppressive fires on the objective for as long as assault","rect":[89.99002075195313,529.1748046875,522.0283579788209,520.0565795898438]},{"page":130,"text":"forces remain in their assault positions.","rect":[89.99002075195313,540.61767578125,246.6347303390503,531.529541015625]},{"page":130,"text":"5-12","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":130,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":130,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":131,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":131,"text":"Figure 5-3. Example of a probable line of deployment and assault position","rect":[139.739990234375,370.3141784667969,490.24963116836548,360.9254455566406]},{"page":131,"text":"5-72. Once support forces create the conditions, breach forces reduce, proof, and mark the required number","rect":[107.98661804199219,393.7509460449219,540.0162255821228,384.6628112792969]},{"page":131,"text":"of lanes through the enemy force’s tactical obstacles to support the maneuver of assault forces. Commanders","rect":[107.98661804199219,405.29400634765627,540.0026996116638,396.1858215332031]},{"page":131,"text":"clearly identify conditions that allow their breach forces to proceed to avoid confusion. From their probable","rect":[107.98661804199219,416.8170166015625,539.9929475860596,407.7088317871094]},{"page":131,"text":"lines of deployment, assault forces maneuver against or around enemy forces to take advantage of support","rect":[107.98666381835938,428.2798767089844,539.9729380569459,419.17169189453127]},{"page":131,"text":"forces’ efforts to suppress targeted enemy positions. Support forces employ direct and indirect fires against","rect":[107.98666381835938,439.8028869628906,539.9980235061646,430.6947021484375]},{"page":131,"text":"selected enemy positions to destroy, suppress, obscure, or neutralize enemy weapons and cover the assault","rect":[107.9766845703125,451.3258972167969,539.9432749710084,442.21771240234377]},{"page":131,"text":"forces’ maneuver. Assault forces closely follow these supporting fires to accomplish their mission.","rect":[107.9766845703125,462.78875732421877,503.00417613983157,453.6805725097656]},{"page":131,"text":"Actions on the Objective","rect":[90.0,487.40069580078127,205.13189469909669,477.5955810546875]},{"page":131,"text":"5-73. Units employ overwhelming and simultaneous fire, movement, and violence during their final assaults","rect":[108.0,504.95428466796877,540.0044085960388,495.8460998535156]},{"page":131,"text":"to finish the enemy. These violent assaults destroy, defeat, or drive enemy forces from their objective areas.","rect":[107.99999237060547,516.4171752929688,540.0265455245972,507.2989807128906]},{"page":131,"text":"Small units conduct the final assault while operating under the control of the appropriate echelon command","rect":[107.99999237060547,527.940185546875,540.0323390960693,518.83203125]},{"page":131,"text":"post. Armored forces have the option of conducting this final assault in either a mounted or dismounted","rect":[107.99999237060547,539.463134765625,539.9482326507568,530.35498046875]},{"page":131,"text":"configuration. Stryker forces typically conduct the assault with their dismounted forces with support from","rect":[108.0,550.926025390625,540.0364050827027,541.81787109375]},{"page":131,"text":"their vehicles.","rect":[107.98001098632813,560.4249877929688,164.12206554412843,553.3408813476563]},{"page":131,"text":"5-74. The key to forward movement when assault forces are under enemy direct fire is to return effective","rect":[107.9800033569336,579.9739990234375,540.0000276641846,570.8658447265625]},{"page":131,"text":"fire. Destructive or suppressive fires are most effective when fired by stationary support forces. These fires","rect":[107.96998596191406,591.4368896484375,539.9026019554138,582.3287353515625]},{"page":131,"text":"prevent enemy forces from firing effectively at moving assault forces. Support forces place a heavy volume","rect":[107.96998596191406,602.9598999023438,539.9627962188721,593.8517456054688]},{"page":131,"text":"of fires on enemy forces to destroy, neutralize, or suppress them once they are in position and assault forces","rect":[107.96990203857422,614.48291015625,540.0791766624451,605.374755859375]},{"page":131,"text":"are prepared to move. The ability of support forces to move to advantageous terrain is critical to ensuring","rect":[107.96994018554688,625.94580078125,539.9252223968506,616.837646484375]},{"page":131,"text":"success. They reduce their rate of fire to sustainable levels to conserve ammunition as assault forces close on","rect":[107.96994018554688,637.46875,539.8868312835693,628.360595703125]},{"page":131,"text":"their objectives once they suppress the enemy’s positions. This ensures that they have enough ammunition","rect":[107.96994018554688,648.931640625,539.8992824554443,639.8134155273438]},{"page":131,"text":"to support the assault. Support forces increase their rate of fire to ensure continued suppression when assault","rect":[107.96990203857422,660.4346313476563,540.0530772171021,651.3464965820313]},{"page":131,"text":"forces near their objectives. This allows assault forces to assault enemy positions before the enemy can react.","rect":[107.96994018554688,671.9776611328125,539.9531812667847,662.8594360351563]},{"page":131,"text":"Commanders provide specific signals for support forces to ceasefire, shift their fire to another target area, or","rect":[107.96994018554688,683.4405517578125,540.0024926719666,674.3323974609375]},{"page":131,"text":"walk their fire across the objective in front of the assault force. Alternatively, these later actions may occur","rect":[107.96994018554688,694.9635620117188,539.9376123008728,685.8453369140625]},{"page":131,"text":"when the assault begins.","rect":[107.96994018554688,706.486572265625,205.21404552459718,697.37841796875]},{"page":131,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":131,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":131,"text":"5-13","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":132,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":132,"text":"5-75. Units use screening smoke to conceal units and individual positions, or obscuration to blind enemy","rect":[90.0,83.51434326171875,521.9449977874756,74.40616607666016]},{"page":132,"text":"forces. Screening smoke is particularly effective during movement to, and assault on, the objective. Care","rect":[89.9999771118164,94.97723388671875,522.0196809844971,85.85903930664063]},{"page":132,"text":"must be taken to avoid screening smoke obscuring friendly units. Units place obscuration in front of enemy","rect":[89.9999771118164,106.500244140625,522.0201320648193,97.3920669555664]},{"page":132,"text":"positions, on the far side of obstacles, and in areas that restrict maneuver. They may use obscuration over","rect":[89.9999771118164,118.023193359375,521.9379174766541,108.9150161743164]},{"page":132,"text":"their support areas to limit enemy observation. The neutralization of enemy thermal viewers requires the use","rect":[89.9999771118164,129.486083984375,522.0651521759033,120.3779067993164]},{"page":132,"text":"of multispectral obscuration.","rect":[89.9999771118164,140.9890594482422,204.69692516326905,131.90090942382813]},{"page":132,"text":"5-76. Units employ all fire support means to destroy or suppress enemy forces and sustain the momentum of","rect":[89.9999771118164,158.5340576171875,522.0401513633728,149.42587280273438]},{"page":132,"text":"their attacks. They improve the likelihood of success by carefully synchronizing the effects of indirect fire","rect":[89.9999771118164,169.9969482421875,522.0143098907471,160.88876342773438]},{"page":132,"text":"systems or available air assets. Units plan fires in series or groups to support maneuver against enemy forces","rect":[89.9999771118164,181.51995849609376,521.9473407249451,172.41177368164063]},{"page":132,"text":"on or near their geographical objectives. Assault elements move rapidly across their objectives as their units","rect":[90.00999450683594,193.04296875,522.0058734397888,183.92477416992188]},{"page":132,"text":"shift artillery fires and obscurants from the objective to other targets. Support elements maintain suppressive","rect":[90.00999450683594,204.505859375,522.0754671173096,195.38766479492188]},{"page":132,"text":"fires to isolate objectives and prevent enemy forces from reinforcing or counterattacking. These support","rect":[90.00999450683594,216.02880859375,522.0070567092896,206.91061401367188]},{"page":132,"text":"elements also destroy escaping enemy forces and systems. Units employ information capabilities, such as","rect":[90.00999450683594,227.49169921875,522.0607440452576,218.38351440429688]},{"page":132,"text":"cyberspace operations and electromagnetic warfare, to attack enemy command and control information","rect":[90.01000213623047,239.01470947265626,522.0294094085693,229.90652465820313]},{"page":132,"text":"systems as part of this effort.","rect":[90.0100326538086,250.5377197265625,205.55471324920655,241.42953491210938]},{"page":132,"text":"5-77. Units limit position changes of fire support systems because position changes reduce the volume of","rect":[90.0100326538086,268.0025634765625,522.0091455039978,258.8943786621094]},{"page":132,"text":"available fires. Units balance the need to maintain that amount of artillery support against enemy counterfire","rect":[90.0100326538086,279.52557373046877,522.0772981719971,270.4173889160156]},{"page":132,"text":"capabilities with their need to provide continued coverage as attacking units continue to move forward.","rect":[90.0100326538086,291.048583984375,522.0260572433472,281.9403991699219]},{"page":132,"text":"Supporting indirect fire assets move into their new positions one subordinate unit at a time, by echelon, to","rect":[90.0100326538086,302.511474609375,522.0020656585693,293.4032897949219]},{"page":132,"text":"maintain support throughout the attack. Units can use any available air assets to provide supporting fires, in","rect":[90.0100326538086,314.0344543457031,522.0322780609131,304.92620849609377]},{"page":132,"text":"addition to organic mortar systems, while field artillery batteries displace.","rect":[90.01000213623047,325.5574951171875,385.1952772140503,316.4493103027344]},{"page":132,"text":"5-78. Small enemy units moving toward the penetrated area can disrupt the synchronization of the final","rect":[90.01002502441406,343.0223388671875,522.0151743850709,333.9141540527344]},{"page":132,"text":"assault. As friendly units and weapon systems crews engage enemy targets, they tend to focus on their","rect":[90.01002502441406,354.5453186035156,521.9619653282166,345.4371337890625]},{"page":132,"text":"immediate opponents rather than the overall situation. Loss of situational understanding combined with the","rect":[90.01002502441406,366.0683288574219,522.0620393829346,356.96014404296877]},{"page":132,"text":"defending enemy forces’ more detailed knowledge of the terrain allows small enemy forces to inflict a great","rect":[90.01002502441406,377.53118896484377,522.0826792678834,368.4230041503906]},{"page":132,"text":"deal of damage on friendly attacking forces. Attacking unit leaders need to understand the flow of combat","rect":[90.01001739501953,389.05419921875,522.0560679397584,379.9460144042969]},{"page":132,"text":"and retain the capability to engage these enemy forces before they can alter the outcome of their assaults.","rect":[90.01001739501953,400.57720947265627,521.9255933761597,391.4690246582031]},{"page":132,"text":"Commanders can commit their reserves to maintain the momentum of their attacks and keep pressure on","rect":[90.01001739501953,412.0200500488281,522.0154933929443,402.9319152832031]},{"page":132,"text":"enemy forces. This also hinders enemy attempts to stabilize the situation.","rect":[90.01001739501953,423.5631103515625,382.6708631515503,414.4549255371094]},{"page":132,"text":"5-79. Units isolate and destroy portions of the enemy defense in sequence when attacking well-prepared,","rect":[89.99999237060547,441.08807373046877,522.1024732589722,431.9798889160156]},{"page":132,"text":"integrated enemy defenses. See figures 5-4 and 5-5 to see this process illustrated. Friendly forces isolate,","rect":[90.0,452.55096435546877,521.8870801925659,443.4427795410156]},{"page":132,"text":"suppress, obscure, and bypass selected enemy positions. For example, obscuration delivered by field artillery","rect":[89.96995544433594,464.0740051269531,521.8948268890381,454.9658203125]},{"page":132,"text":"and mortars in front of the objective—between the force and the enemy—screens friendly breach and assault","rect":[89.96995544433594,475.5368957519531,521.9341196975709,466.418701171875]},{"page":132,"text":"force movement and obscures enemy weapon systems. Units place fires on and beyond the flanks of an","rect":[89.96994018554688,487.0599060058594,522.0504055023193,477.95172119140627]},{"page":132,"text":"objective to isolate an enemy position. These fires include obscuration; high-explosive, improved","rect":[89.96994018554688,498.5829162597656,521.9343776702881,489.4647216796875]},{"page":132,"text":"conventional munitions (if available); and precision-guided munitions delivered by a mix of field artillery,","rect":[89.95990753173828,510.0457458496094,521.9710645675659,500.93756103515627]},{"page":132,"text":"fixed-wing aviation assets, and attack helicopters. In addition, units may employ short duration scatterable","rect":[89.94989013671875,521.5687255859375,521.9710359649658,512.4605712890625]},{"page":132,"text":"mines in conjunction with terminally guided munitions to help isolate and impair an enemy force’s ability to","rect":[89.94989013671875,533.091796875,521.9822292327881,523.9735717773438]},{"page":132,"text":"counterattack. (Their use must not impede the conduct of exploitation and pursuit operations.) Units can","rect":[89.9498519897461,544.53466796875,521.8828029632568,535.446533203125]},{"page":132,"text":"employ jammers to cut information system links between enemy maneuver forces and their supporting","rect":[89.94990539550781,556.07763671875,521.8356838226318,546.9594116210938]},{"page":132,"text":"artillery.","rect":[89.94989776611328,567.6005859375,124.13513469696045,558.492431640625]},{"page":132,"text":"5-14","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":132,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":132,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":133,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":133,"text":"Figure 5-4. Attack of an objective, breach","rect":[217.4399871826172,386.8141784667969,412.56551861953735,377.4254455566406]},{"page":133,"text":"Figure 5-5. Attack of an objective, assault","rect":[216.65843200683595,701.9331665039063,413.37813354110718,692.54443359375]},{"page":133,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":133,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":133,"text":"5-15","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":134,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":134,"text":"5-80. Units mass overwhelming combat power in sequence against isolated centers of resistance. Assault","rect":[90.0,83.51434326171875,522.0385508499146,74.40616607666016]},{"page":134,"text":"element commanders can task-organize their elements to assault one portion of an objective at a time. The","rect":[90.0,94.97723388671875,522.0602693634033,85.85903930664063]},{"page":134,"text":"enemy force may attempt to reinforce its defending forces or counterattack during the friendly force’s attack.","rect":[89.98999786376953,106.500244140625,522.0333814620972,97.3920669555664]},{"page":134,"text":"Once the attacking force reaches the far side of the objective, selected elements clear remaining pockets of","rect":[89.98998260498047,118.023193359375,521.8824975547791,108.90499877929688]},{"page":134,"text":"resistance while the bulk of the assault force prepares for a possible enemy counterattack. After assault forces","rect":[89.98998260498047,129.486083984375,521.9997088890076,120.3779067993164]},{"page":134,"text":"reach their objectives, support forces leave their support by fire positions and rejoin assault forces or move","rect":[89.98998260498047,141.00909423828126,521.9170198516846,131.89089965820313]},{"page":134,"text":"to blocking positions to counter possible enemy counterattacks.","rect":[89.98999786376953,152.5321044921875,343.8889112472534,143.42391967773438]},{"page":134,"text":"Mounted Assault","rect":[71.98403930664063,173.9649200439453,142.27234601593018,167.05111694335938]},{"page":134,"text":"5-81. Units consider the terrain, obstacles, and the strength of enemy anti-armor defenses when determining","rect":[89.97996520996094,193.50390625,522.0203762054443,184.39572143554688]},{"page":134,"text":"whether to conduct a mounted or dismounted attack. Mounted assaults accelerate the operation’s execution","rect":[89.98998260498047,205.00682067871095,521.9567775726318,195.91867065429688]},{"page":134,"text":"by allowing the greatest speed and shock action and providing the best protection against small arms and","rect":[89.98999786376953,216.48974609375,521.8930568695068,207.38150024414063]},{"page":134,"text":"indirect fires while conserving the strength of the infantry Soldiers conducting the assault.","rect":[89.97993469238281,228.01275634765626,450.1999464035034,218.90457153320313]},{"page":134,"text":"5-82. Armored units can conduct a mounted assault when facing weak, hastily prepared, disorganized","rect":[89.97993469238281,245.4776611328125,521.9914455413818,236.36947631835938]},{"page":134,"text":"resistance, or when attacking with overwhelming combat power. They concentrate all supporting fires to","rect":[89.97994232177735,257.0006103515625,521.9223537445068,247.89242553710938]},{"page":134,"text":"destroy and neutralize enemy forces and fix local reserves when conducting a mounted assault. Tanks,","rect":[89.97994232177735,268.52362060546877,521.9866285324097,259.4154357910156]},{"page":134,"text":"infantry fighting vehicles, and amphibious assault carriers use cannons and machineguns to engage targets","rect":[89.97994232177735,279.98651123046877,521.9268939476013,270.8783264160156]},{"page":134,"text":"for as long as possible. Other weapons increase their rate of fire as commanders lift or shift fires from one","rect":[89.97994232177735,291.5094909667969,521.9363679962158,282.40130615234377]},{"page":134,"text":"type of weapon to another. The assault force advances close to its objective under the cover of these","rect":[89.97994232177735,303.032470703125,521.9562044219971,293.9142761230469]},{"page":134,"text":"supporting fires.","rect":[89.9800033569336,314.4953918457031,155.52981090545655,305.38720703125]},{"page":134,"text":"5-83. Assault forces attack using shock action and firepower to overrun enemy positions as soon as their","rect":[89.9799575805664,332.0203857421875,521.9692285118103,322.9122009277344]},{"page":134,"text":"commanders shift supporting fires beyond their objectives. Mechanized infantry elements move as close as","rect":[89.9799575805664,343.5433654785156,521.9726703147888,334.4251708984375]},{"page":134,"text":"possible to their objectives while remaining mounted in their combat vehicles. Commanders give the order","rect":[89.9799575805664,355.0062561035156,521.9399926719666,345.8880615234375]},{"page":134,"text":"for infantry elements to dismount from their carriers when the danger to the mounted infantry elements","rect":[89.9799575805664,366.52923583984377,521.9479510765076,357.4210510253906]},{"page":134,"text":"exceeds the protection offered by their combat vehicles.","rect":[89.9799575805664,378.05224609375,313.7546339035034,368.9440612792969]},{"page":134,"text":"5-84. Units may employ this technique with armored forces rapidly clearing an objective against an enemy","rect":[89.9799575805664,395.51708984375,522.0553493499756,386.3988952636719]},{"page":134,"text":"force that lacks a robust anti-armor capability. First, the assaulting forces overrun their objectives. Then, the","rect":[89.97993469238281,407.04010009765627,521.9798860626221,397.9219055175781]},{"page":134,"text":"accompanying mechanized infantry Soldiers dismount from their combat vehicles on the far side of their","rect":[89.96990966796875,418.5631103515625,521.9129540977478,409.4549255371094]},{"page":134,"text":"objectives and sweep their objectives from the far side back to the near side to clear any remaining pockets","rect":[89.96990966796875,430.0260009765625,521.8941791038513,420.9078063964844]},{"page":134,"text":"of enemy resistance. The ability of armored forces to closely follow friendly mortar and artillery fires as they","rect":[89.96990966796875,441.54901123046877,521.9345607757568,432.4408264160156]},{"page":134,"text":"shift across their objectives is a major advantage. Units secure their objectives immediately after they shift","rect":[89.96990966796875,453.0720520019531,521.9079966506959,443.953857421875]},{"page":134,"text":"their supporting fires to deny enemy forces time to move from protective to firing positions.","rect":[89.96990966796875,464.5349426269531,458.0505323410034,455.4267578125]},{"page":134,"text":"Dismounted Assault","rect":[71.97398376464844,486.02783203125,155.0989146194458,479.1140441894531]},{"page":134,"text":"5-85. Light infantry and Stryker units assault an objective utilizing dismounted infantry. Typically, Stryker","rect":[89.96990203857422,505.5167236328125,521.9521386680603,496.3985290527344]},{"page":134,"text":"units use their vehicle platforms in support of the dismounted assault.","rect":[89.97997283935547,517.0197143554688,368.0059766769409,507.9315490722656]},{"page":134,"text":"5-86. Units usually conduct dismounted assaults when—","rect":[89.98998260498047,534.564697265625,319.3678398132324,525.45654296875]},{"page":134,"text":" The terrain favors dismounted operations.","rect":[115.19999694824219,547.9542846679688,300.71035289764407,538.8661499023438]},{"page":134,"text":" Enemy forces have a strong anti-armor capability.","rect":[115.19999694824219,561.4743041992188,333.39861583709719,552.3661499023438]},{"page":134,"text":" Tanks and armored combat vehicles are not available to lead the assault even though the mission","rect":[115.19999694824219,574.9743041992188,522.0259914398193,565.8661499023438]},{"page":134,"text":"variables favor their employment.","rect":[133.1999969482422,586.4371337890625,268.72454357147219,577.3289794921875]},{"page":134,"text":" Enemy obstacles prevent maneuver across the objective.","rect":[115.19999694824219,599.934326171875,359.01677989959719,590.8161010742188]},{"page":134,"text":" Friendly forces require stealth to close on the objective.","rect":[115.19999694824219,613.434326171875,355.66103649139407,604.3161010742188]},{"page":134,"text":" Mounted assaults stall on or short of the objective.","rect":[115.19999694824219,626.934326171875,335.08303356170657,617.8161010742188]},{"page":134,"text":" Enemy forces are in prepared positions.","rect":[115.19999694824219,640.434326171875,292.05901622772219,631.326171875]},{"page":134,"text":"Commanders determine if, when, and where any Stryker infantry forces dismount from their combat vehicles","rect":[89.9937515258789,654.9532470703125,521.9999530296326,645.8450927734375]},{"page":134,"text":"based on analysis of the mission variables and the degree of risk involved.","rect":[89.9937515258789,666.4762573242188,386.86443614959719,657.3681030273438]},{"page":134,"text":"5-87. Commanders of attacking forces advance beyond the geographical boundaries of enemy defensive","rect":[89.99372863769531,683.941162109375,521.9858675079346,674.8330078125]},{"page":134,"text":"positions whenever possible before stopping to consolidate and reorganize. This is because enemy forces","rect":[89.99372863769531,695.464111328125,521.9929950218201,686.35595703125]},{"page":134,"text":"with considerable indirect fire capabilities are likely to have developed preplanned targets on those positions","rect":[89.99371337890625,706.9871215820313,522.1109759788513,697.8789672851563]},{"page":134,"text":"for rapid engagement in case of their loss and to support enemy counterattacks.","rect":[89.99371337890625,718.4500122070313,406.8964796066284,709.3418579101563]},{"page":134,"text":"5-16","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":134,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":134,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":135,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":135,"text":"FOLLOW THROUGH","rect":[90.0,83.36216735839844,187.8546724319458,75.27597045898438]},{"page":135,"text":"5-88. Once the objective is seized and friendly forces establish security, subordinate units clear their","rect":[108.0,103.3143310546875,540.0323998985291,94.19613647460938]},{"page":135,"text":"objective of enemy forces, consolidate and reorganize, and prepare for enemy counterattacks. Units position","rect":[108.0,114.7772216796875,540.0251369476318,105.65902709960938]},{"page":135,"text":"their armored and antitank systems in overwatch to cover likely enemy mounted avenues of approach.","rect":[108.0,126.30023193359375,540.0454053878784,117.19205474853516]},{"page":135,"text":"Mechanized infantry forces normally dismount and orient along likely dismounted and mounted avenues of","rect":[108.0,137.8232421875,539.9691064414978,128.71505737304688]},{"page":135,"text":"approach. Mortars, command posts, and sustainment assets move forward to consolidate. Units also dispatch","rect":[108.0,149.2660369873047,540.0341091156006,140.17788696289063]},{"page":135,"text":"patrols to ensure contact with any adjacent friendly forces. Otherwise, a gap would occur, which an enemy","rect":[108.0,160.80908203125,540.0023097991943,151.69088745117188]},{"page":135,"text":"force could exploit during a counterattack. Units are responsible for establishing contact with units to their","rect":[107.98998260498047,172.33209228515626,539.9791772422791,163.22390747070313]},{"page":135,"text":"left and right as defined by the direction to enemy forces.","rect":[107.98998260498047,183.79498291015626,337.11443614959719,174.68679809570313]},{"page":135,"text":"5-89. When the situation allows, units work to gain or maintain contact with those enemy forces that have","rect":[107.98998260498047,201.3199462890625,539.9653596954346,192.21176147460938]},{"page":135,"text":"abandoned their recent positions or objectives immediately after the friendly assaults conclude. Units send","rect":[107.98998260498047,212.7828369140625,539.9742946624756,203.66464233398438]},{"page":135,"text":"patrols in any direction required to maintain or regain contact with enemy forces in their assigned areas.","rect":[107.98998260498047,224.30584716796876,540.0102491378784,215.19766235351563]},{"page":135,"text":"Higher echelon commanders reposition their information collection assets and adjust their missions as","rect":[107.98998260498047,235.828857421875,539.9141986351013,226.71066284179688]},{"page":135,"text":"necessary to maintain contact. With an understanding of the friendly and enemy situation, commanders have","rect":[107.98998260498047,247.29168701171876,540.0631380157471,238.18350219726563]},{"page":135,"text":"a decision to make. They can exploit success and continue their attacks or terminate their attack. After seizing","rect":[107.98998260498047,258.814697265625,539.9284572601318,249.70651245117188]},{"page":135,"text":"an objective, the most likely on-order mission is to continue the attack.","rect":[108.00000762939453,270.33770751953127,391.5400342941284,261.2195129394531]},{"page":135,"text":"Continuing the Attack","rect":[90.0,294.9206848144531,195.0215057220459,285.1155700683594]},{"page":135,"text":"5-90. Units seek to achieve a breakthrough that can turn into an exploitation or a pursuit by continuing their","rect":[108.0,312.4142761230469,539.9750878868103,303.30609130859377]},{"page":135,"text":"attacks. A breakthrough is a rupturing of the enemy’s forward defense that occurs as a result of an","rect":[108.0,323.9372863769531,539.9472188873291,314.8291015625]},{"page":135,"text":"attack. At BCT echelon and below, units maintain contact and attempt to exploit their success. Normally, a","rect":[108.0,335.46026611328127,539.9872102813721,326.3520812988281]},{"page":135,"text":"division, corps, or higher echelon commander, makes the decision regarding whether to initiate an","rect":[107.97996520996094,346.92315673828127,539.9655055999756,337.8149719238281]},{"page":135,"text":"exploitation or pursuit or to terminate offensive actions.","rect":[107.9800033569336,358.4261169433594,331.28179454803469,349.3379821777344]},{"page":135,"text":"5-91. Units plan logical sequels to their attacks as part of their follow through. Attacking forces plan for","rect":[107.9799575805664,375.9110107421875,539.9743554649353,366.8028259277344]},{"page":135,"text":"exploitation. Exploiting forces plan for the pursuit of a defeated enemy force. Units seek to employ their","rect":[107.96994018554688,387.43402099609377,539.9089257774353,378.3258361816406]},{"page":135,"text":"subordinate forces during an exploitation without overextending their sustainment capabilities. Commanders","rect":[107.96994018554688,398.95703125,540.0333392601013,389.8488464355469]},{"page":135,"text":"plan to have fresh units pass around or through forward units to sustain their attacks’ momentum. They may","rect":[107.96991729736328,410.4198913574219,539.9982204437256,401.31170654296877]},{"page":135,"text":"assign these fresh units with the task of follow and support or follow and assume in an effort to maintain","rect":[107.96991729736328,421.9429016113281,539.8306179046631,412.834716796875]},{"page":135,"text":"tempo. Commanders of any unit conducting the offense envision how, under what conditions, where, and","rect":[107.96991729736328,433.46588134765627,540.0384426116943,424.3576965332031]},{"page":135,"text":"when their unit transitions to the defense, based on possible enemy countermoves and other events.","rect":[107.96991729736328,444.92877197265627,504.5553846359253,435.8205871582031]},{"page":135,"text":"5-92. Fire support assets move quickly to take advantage of the natural reduction in support requirements","rect":[107.96991729736328,462.4537353515625,539.9030902366638,453.3455505371094]},{"page":135,"text":"that occur when their supported unit takes enemy positions. Field artillery units reposition to where they can","rect":[107.96991729736328,473.97674560546877,539.9999294281006,464.8685607910156]},{"page":135,"text":"support renewed attacks when ammunition supplies and enemy actions permit. Attacks by manned and","rect":[107.96991729736328,485.43963623046877,539.9257106781006,476.3314514160156]},{"page":135,"text":"unmanned aircraft systems can provide support while these artillery systems reposition. Road conditions,","rect":[107.96990203857422,496.962646484375,540.0004224777222,487.8544616699219]},{"page":135,"text":"such as destroyed bridges or large numbers of dislocated civilians, and unit cross-country mobility","rect":[107.96994018554688,508.48565673828127,539.9942531585693,499.3774719238281]},{"page":135,"text":"capabilities affect the exact time of repositioning.","rect":[107.95990753173828,519.948486328125,306.0041456222534,510.8403015136719]},{"page":135,"text":"5-93. Units attempt to exploit the deterioration of enemy positions by attacking before enemy forces can","rect":[107.95990753173828,537.4735107421875,539.9712429046631,528.3653564453125]},{"page":135,"text":"reconstitute an effective defense. Units employ precision-guided munitions in combination with the","rect":[107.94989013671875,548.9964599609375,540.0243806915283,539.8883056640625]},{"page":135,"text":"maneuver of armor or Stryker formations, Army aviation, and air support to achieve decisive results.","rect":[107.94990539550781,560.4593505859375,510.96209239959719,551.3511962890625]},{"page":135,"text":"5-94. Ordinarily, defending enemy forces attempt to hold their positions until nightfall to be able to complete","rect":[107.94989013671875,577.984375,539.9861726837158,568.876220703125]},{"page":135,"text":"their withdrawal under the cover of darkness. Attacking units maintain pressure, continuing their attacks at","rect":[107.94989013671875,589.50732421875,539.9352183303834,580.399169921875]},{"page":135,"text":"night. Friendly units maintain enemy contact through these attacks. This keeps enemy forces off balance and","rect":[107.94989013671875,600.97021484375,539.9825344085693,591.862060546875]},{"page":135,"text":"makes their withdrawal from action extremely difficult. If enemy forces are too strong to overrun, friendly","rect":[107.94989013671875,612.4932861328125,539.8918972015381,603.3850708007813]},{"page":135,"text":"units concentrate their efforts on enveloping or encircling retrograding enemy forces when enemy forces try","rect":[107.94990539550781,623.9561767578125,539.9242458343506,614.8479614257813]},{"page":135,"text":"to conduct a delay. Attacks aggressively pushed through the hostile front may isolate major elements and","rect":[107.94990539550781,635.4791259765625,539.8887844085693,626.3609008789063]},{"page":135,"text":"force enemy forces to evacuate their entire defensive position before they can construct viable fallback","rect":[107.94990539550781,647.0020751953125,539.9469509124756,637.8939208984375]},{"page":135,"text":"positions.","rect":[107.94989776611328,658.4449462890625,146.63512706756593,649.3568115234375]},{"page":135,"text":"5-95. Successful attacking units penetrate deeply into hostile positions to attack enemy reserves, artillery,","rect":[107.94989776611328,675.97998046875,540.0333204269409,666.871826171875]},{"page":135,"text":"command and control nodes, and lines of communications. Either assault or support units attack the enemy","rect":[107.94989776611328,687.5029907226563,539.8776760101318,678.3948364257813]},{"page":135,"text":"force’s newly exposed flanks to widen gaps in the enemy’s defensive position. Units send forces that have a","rect":[107.94990539550781,698.9658203125,539.9522981719971,689.857666015625]},{"page":135,"text":"high degree of tactical mobility through those gaps to exploit the penetration, attack the enemy force from","rect":[107.93987274169922,710.4888916015625,539.9251379928589,701.3807373046875]},{"page":135,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":135,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":135,"text":"5-17","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":136,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":136,"text":"the rear, and prevent the enemy’s escape. Force multipliers—such as fixed-wing aviation assets—concentrate","rect":[90.0,83.51434326171875,522.0674104766846,74.40616607666016]},{"page":136,"text":"on supporting ground forces exploiting the penetration.","rect":[90.0,94.97723388671875,310.84392833709719,85.86905670166016]},{"page":136,"text":"5-96. Attacking units may have to bypass enemy units to maintain their tempo when they transition to an","rect":[90.0,112.4921875,521.9798488616943,103.3840103149414]},{"page":136,"text":"exploitation or pursuit. Units bypass enemy forces according to previously established bypass criteria. At a","rect":[89.98997497558594,124.01519775390625,521.9803133087158,114.90702056884766]},{"page":136,"text":"minimum, bypassed enemy forces remain under observation or fixed in place by other units until passed off","rect":[89.98998260498047,135.47808837890626,522.0811059532166,126.36991119384766]},{"page":136,"text":"to follow-on units.","rect":[89.98998260498047,144.9770050048828,164.1860761642456,137.89285278320313]},{"page":136,"text":"5-97. Units intensify their information collection efforts to obtain the situational understanding necessary to","rect":[89.98998260498047,164.5159912109375,522.0028591156006,155.40780639648438]},{"page":136,"text":"decide on a COA if enemy forces succeed in withdrawing major forces from action. Aggressive units may","rect":[89.98999786376953,175.9788818359375,521.9716091156006,166.86068725585938]},{"page":136,"text":"prevent enemy forces from reconstituting an effective defense in a rearward position. They may have to delay","rect":[89.98998260498047,187.50189208984376,521.9818019866943,178.39370727539063]},{"page":136,"text":"the renewal of their attacks until those information collection efforts are successful so they can formulate","rect":[89.98999786376953,199.02490234375,521.9450960235596,189.91671752929688]},{"page":136,"text":"tactically sound plans if the enemy succeeds in occupying new defensive positions.","rect":[89.98999786376953,210.48779296875,422.7322645187378,201.37960815429688]},{"page":136,"text":"Terminating the Attack","rect":[72.0,235.10069274902345,183.14615476989747,225.29554748535157]},{"page":136,"text":"5-98. If all objectives have been accomplished, or the unit has culminated, the unit terminates the attack and","rect":[90.0,252.654296875,522.0293483734131,243.53610229492188]},{"page":136,"text":"establishes a defense until relieved.","rect":[89.9999771118164,262.0931396484375,231.39916515350343,255.00900268554688]},{"page":136,"text":"5-99. Units preplan the location and future missions of each element. Artillery and other fire support systems","rect":[89.9999771118164,281.63214111328127,522.0222308616638,272.5239562988281]},{"page":136,"text":"mass fires on enemy assembly areas and enemy troops forming for counterattacks. Commanders may alert","rect":[89.98995971679688,293.1551513671875,521.9962534866334,284.0469665527344]},{"page":136,"text":"their reserves to protect the flanks of attacking units, hold ground seized by them, or counter enemy","rect":[89.9899673461914,304.6180114746094,522.0070095062256,295.50982666015627]},{"page":136,"text":"counterattacks. They may use antitank minefields or other obstacles to cover likely enemy avenues of","rect":[89.9899673461914,316.1410217285156,521.9997460899353,307.0328369140625]},{"page":136,"text":"approach. Units improve these obstacles and defensive positions when they have time and resources.","rect":[89.9899673461914,327.6640319824219,492.92241954803469,318.55584716796877]},{"page":136,"text":"5-100. Units designate target reference points, final protective fires (FPFs), engagement areas, and other","rect":[89.9899673461914,345.1288757324219,521.9625756797791,336.02069091796877]},{"page":136,"text":"direct and indirect fire control measures. Once in position, subordinate elements modify preplanned measures","rect":[89.97994232177735,356.6518859863281,521.9973285179138,347.543701171875]},{"page":136,"text":"and improve defensive capabilities as required. Echelon scout or cavalry units deploy beyond these local","rect":[89.98998260498047,368.11474609375,521.9800791702271,359.0065612792969]},{"page":136,"text":"security patrols to conduct their reconnaissance or security missions.","rect":[89.98998260498047,379.63775634765627,364.6540174484253,370.5295715332031]},{"page":136,"text":"VARIATIONS OF ATTACKS","rect":[72.0,404.9096984863281,255.50983348083498,395.2355651855469]},{"page":136,"text":"5-101. Units use variations of the attack to organize forces against specific enemy dispositions. Attack","rect":[90.0,425.21429443359377,522.0263576507568,416.1061096191406]},{"page":136,"text":"variations include—","rect":[90.0,434.7132568359375,171.42252731323243,427.6291198730469]},{"page":136,"text":" Ambush.","rect":[115.19999694824219,448.21026611328127,169.66479015350343,441.1261291503906]},{"page":136,"text":" Counterattack.","rect":[115.19999694824219,461.7203063964844,191.80797863006593,454.6261291503906]},{"page":136,"text":" Raid.","rect":[115.19999694824219,475.21026611328127,154.60772228240968,468.1261291503906]},{"page":136,"text":" Spoiling attack.","rect":[115.19999694824219,490.73431396484377,195.94524669647218,481.6261291503906]},{"page":136,"text":"The commander’s intent and mission variables determine the specific variation. As subordinate attack","rect":[89.9937515258789,505.1731262207031,521.9567775726318,496.0849914550781]},{"page":136,"text":"variations, they share many of the planning, preparation, and execution considerations of the attack.","rect":[89.99374389648438,516.7161865234375,522.0350294113159,507.6080017089844]},{"page":136,"text":"Paragraphs 5-102 through 5-150 discuss the unique considerations of each variation of the attack: ambush,","rect":[89.99374389648438,528.2391357421875,521.9199781417847,519.1309814453125]},{"page":136,"text":"counterattack, raid, and spoiling attack. ","rect":[89.97369384765625,539.7020263671875,249.98308849334718,530.5938720703125]},{"page":136,"text":"AMBUSH","rect":[72.0,563.0621948242188,115.43539142608643,554.8079833984375]},{"page":136,"text":"5-102. An ambush is a variation of attack from concealed positions against a moving or temporarily","rect":[90.0,583.0142822265625,521.9562892913818,574.06640625]},{"page":136,"text":"halted enemy. An ambush stops, denies, or destroys enemy forces by maximizing the element of surprise.","rect":[89.98997497558594,594.5372924804688,521.9942579269409,585.4291381835938]},{"page":136,"text":"Ambushes can employ direct fire systems as well as other destructive means, such as command-detonated","rect":[89.98998260498047,606.0001831054688,521.9020900726318,596.8920288085938]},{"page":136,"text":"mines, indirect fires, and supporting nonlethal effects. They may include an assault to close with and destroy","rect":[89.98998260498047,617.523193359375,522.0194606781006,608.4150390625]},{"page":136,"text":"enemy forces. In an ambush, the ambush force does not normally seize and hold ground objectives.","rect":[89.98998260498047,629.046142578125,487.1144971847534,619.9279174804688]},{"page":136,"text":"5-103. The two methods of an ambush are the point ambush and the area ambush. In a point ambush, a unit","rect":[89.98998260498047,646.4910278320313,521.9573130569459,637.4028930664063]},{"page":136,"text":"deploys to attack a single kill zone. In an area ambush, a unit deploys into two or more related point ambushes.","rect":[89.9800033569336,658.0340576171875,522.0750684738159,648.9258422851563]},{"page":136,"text":"A unit smaller than a platoon does not conduct an area ambush. The kill zone is the location where fires are","rect":[89.9799575805664,669.4769287109375,522.0583772735596,660.3887939453125]},{"page":136,"text":"concentrated in an ambush. Typically, kill zones use heavy direct fire for a short duration. Whereas","rect":[89.97994995117188,681.0198974609375,521.9682147483826,671.9117431640625]},{"page":136,"text":"engagement areas tend to use indirect and direct fires for longer duration over a larger area.","rect":[89.96995544433594,692.5429077148438,455.2852430343628,683.4347534179688]},{"page":136,"text":"5-18","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":136,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":136,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":137,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":137,"text":"5-104. A specific type of a point ambush is an anti-armor ambush. The anti-armor ambush is significantly","rect":[108.0,83.51434326171875,540.0262966156006,74.40616607666016]},{"page":137,"text":"different from a typical point ambush in that it typically involves only crew-served weapons and anti-armor","rect":[107.99996185302735,94.97723388671875,539.8900659141541,85.86905670166016]},{"page":137,"text":"systems and can be conducted at longer ranges.","rect":[107.96991729736328,106.500244140625,297.36797618865969,97.3920669555664]},{"page":137,"text":"5-105. Ambushes are hasty or deliberate, but they take place along a continuum. A hasty ambush is an","rect":[107.96991729736328,124.02520751953125,539.8995876312256,114.91703033447266]},{"page":137,"text":"immediate reaction to an unexpected opportunity conducted using SOPs and battle drills. Units plan","rect":[107.94990539550781,135.48809814453126,539.9221706390381,126.3798599243164]},{"page":137,"text":"deliberate ambushes as specific actions against specific targets. Detailed information about a target, such as","rect":[107.94990539550781,147.0111083984375,539.9306781272888,137.90286254882813]},{"page":137,"text":"size, organization, weapons, equipment carried, route, direction of movement, and times the target reaches","rect":[107.94989776611328,158.5340576171875,539.9740130882263,149.42587280273438]},{"page":137,"text":"or passes certain points on its route may be available. All forces may conduct an ambush. There are no","rect":[107.94989776611328,169.9969482421875,539.8179836273193,160.88876342773438]},{"page":137,"text":"ambush specific control measures. Ambushes are further categorized as near or far ambushes based on the","rect":[107.94989776611328,181.51995849609376,539.9511995391846,172.41177368164063]},{"page":137,"text":"proximity of the friendly force to the enemy force.","rect":[107.94989013671875,193.04296875,309.83391857147219,183.93478393554688]},{"page":137,"text":"5-106. The normal goal of an ambush is the death or capture of all enemy personnel located within the kill","rect":[107.94989013671875,210.5078125,539.9671397171021,201.39962768554688]},{"page":137,"text":"zone. Another goal could be to destroy certain designated vehicles. Ideally, the ambush force destroys the","rect":[107.93986511230469,222.03082275390626,539.9037141876221,212.92263793945313]},{"page":137,"text":"ambushed enemy so quickly that enemy personnel within the kill zone cannot report the engagement.","rect":[107.93986511230469,233.49371337890626,513.1677198410034,224.38552856445313]},{"page":137,"text":"Organization of Forces for an Ambush","rect":[90.0,258.0806579589844,271.7870086517334,248.27552795410157]},{"page":137,"text":"5-107. Units typically organize an ambush into three elements: assault, support, and security. The assault","rect":[108.0,275.63427734375,539.9720225296021,266.5260925292969]},{"page":137,"text":"element fires into the kill zone. Its goal is to destroy the enemy force. When used, the assault force attacks","rect":[108.0,287.15728759765627,539.9154803733826,278.0491027832031]},{"page":137,"text":"into and clears the kill zone. Commanders may assign additional tasks—including searching for items of","rect":[108.0,298.6201477050781,539.9622094688416,289.511962890625]},{"page":137,"text":"intelligence value, capturing prisoners, and completing the destruction of enemy equipment to preclude its","rect":[108.0,310.1431579589844,539.9548480491638,301.03497314453127]},{"page":137,"text":"immediate reuse—to their assault force. The support element supports the assault element by firing into and","rect":[108.0,321.6661682128906,539.9740505218506,312.5579833984375]},{"page":137,"text":"around the kill zone, and it provides the ambush’s primary killing power. The support element attempts to","rect":[108.0,333.1290283203125,540.0363063812256,324.0208435058594]},{"page":137,"text":"destroy most of the enemy’s combat power before the assault element moves into the objective or kill zone.","rect":[108.0,344.65203857421877,539.9281568527222,335.5338439941406]},{"page":137,"text":"The security element isolates the kill zone, provides early warning of the arrival of any enemy relief force,","rect":[108.0,356.11492919921877,539.9233350753784,347.0067443847656]},{"page":137,"text":"and provides security for the assault and support elements. It secures the objective rally point and blocks","rect":[108.0,367.6379089355469,539.8957660179138,358.51971435546877]},{"page":137,"text":"enemy avenues of approach into and out of the ambush site, which prevents enemy forces from entering or","rect":[108.0,379.1609191894531,539.9289453086853,370.052734375]},{"page":137,"text":"leaving.","rect":[108.0,390.623779296875,139.9648084640503,381.5155944824219]},{"page":137,"text":"Planning an Ambush","rect":[90.0,415.2206726074219,188.91002500915529,405.4155578613281]},{"page":137,"text":"5-108. During terrain analysis, leaders identify at least four different locations: the ambush site, the kill","rect":[108.0,432.7743225097656,539.9272227249146,423.6661376953125]},{"page":137,"text":"zone, security positions, and rally points. As far as possible, units avoid ideal ambush sites because alert","rect":[108.0,444.2973327636719,540.0051035842896,435.18914794921877]},{"page":137,"text":"enemies avoid them if possible. Since enemies increase their vigilance and security when they must enter","rect":[108.0,455.76019287109377,539.9175927696228,446.6520080566406]},{"page":137,"text":"them, surprise is difficult to achieve. Instead, units should choose unlikely sites when possible. Other","rect":[108.0,467.283203125,540.0313623008728,458.1750183105469]},{"page":137,"text":"planning considerations for an ambush include—","rect":[108.0,478.74609375,304.9831962585449,469.6379089355469]},{"page":137,"text":" A no-later-than time to establish the ambush.","rect":[133.1999969482422,490.21026611328127,331.47283458709719,483.1261291503906]},{"page":137,"text":" A tentative ambush formation or, for an area ambush, element locations.","rect":[133.1999969482422,504.0,440.9244337081909,496.6261291503906]},{"page":137,"text":" Insertion and exit routes.","rect":[133.1999969482422,517.2102661132813,250.6715497970581,510.1261291503906]},{"page":137,"text":" A forward passage of lines and movement to the ambush site in tactical formation.","rect":[133.1999969482422,532.7343139648438,481.1776075363159,523.6261596679688]},{"page":137,"text":" Actions if enemy forces detect the ambush before its initiation.","rect":[133.1999969482422,546.2343139648438,402.8279981613159,537.1261596679688]},{"page":137,"text":" A scheme of maneuver that maximizes engagement of the enemy force’s flank or rear, provides","rect":[133.1999969482422,559.7343139648438,539.9569842796326,550.6261596679688]},{"page":137,"text":"early warning of target approach, includes assault element actions in the kill zone, and details how","rect":[151.1999969482422,571.25732421875,540.0531659164428,562.149169921875]},{"page":137,"text":"the ambush element displaces from the ambush site.","rect":[151.21005249023438,582.76025390625,359.5679578781128,573.672119140625]},{"page":137,"text":" Actions on the objective.","rect":[133.1999969482422,596.2742919921875,251.2046308517456,587.1560668945313]},{"page":137,"text":" Obstacles to augment the effects of the friendly fire.","rect":[133.1999969482422,609.7742919921875,359.7441358566284,600.6661376953125]},{"page":137,"text":" A fire support plan that integrates the direct fire and obstacle plans, which results in the enemy","rect":[133.1999969482422,623.2742919921875,539.9583034515381,614.1661376953125]},{"page":137,"text":"force’s isolation, inflicts maximum damage, and supports ambush forces in their rally points.","rect":[151.1999969482422,634.7371826171875,523.0601758956909,625.6290283203125]},{"page":137,"text":" The criteria for initiating the ambush. For example, units only engage enemy formations of the","rect":[133.1999969482422,648.2343139648438,540.0901155548096,639.1261596679688]},{"page":137,"text":"same or smaller size and withhold fire until the target moves into the kill zone.","rect":[151.1999969482422,659.75732421875,465.88515758514407,650.649169921875]},{"page":137,"text":" Any required changes to the ambushing unit’s fire distribution SOP.","rect":[133.1999969482422,673.2542724609375,424.00359630584719,664.1461181640625]},{"page":137,"text":" Rear security measures.","rect":[133.1999969482422,686.7542724609375,246.52024364471436,677.6461181640625]},{"page":137,"text":" Selecting appropriate standoff ranges for anti-armor weapons and maintaining clear line of sight.","rect":[133.1999969482422,700.2542724609375,538.5441236495972,691.1461181640625]},{"page":137,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":137,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":137,"text":"5-19","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":138,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":138,"text":"5-109. Point ambush techniques include employing a linear or L-shaped formation. The names of these","rect":[90.0,83.51434326171875,521.9792146759033,74.40616607666016]},{"page":138,"text":"formations describe deployment of the support element around the kill zone. The ambush formation is","rect":[89.9800033569336,94.97723388671875,521.9529559593201,85.86905670166016]},{"page":138,"text":"important because it determines whether a point ambush can deliver the heavy volume of fire necessary to","rect":[89.9799575805664,106.500244140625,521.9351711273193,97.3920669555664]},{"page":138,"text":"isolate, fix, and destroy the enemy. Units determine the formation used based on the advantages and","rect":[89.97997283935547,118.023193359375,522.0070705413818,108.9150161743164]},{"page":138,"text":"disadvantages of each formation in relation to the mission variables.","rect":[89.97997283935547,129.486083984375,362.7842664718628,120.3779067993164]},{"page":138,"text":"5-110. In a linear ambush, the assault and support elements generally deploy parallel to the target’s route","rect":[89.97997283935547,147.0111083984375,521.9642610626221,137.90292358398438]},{"page":138,"text":"of movement—the long axis of the kill zone—that subjects the target to flanking fire in the line formation.","rect":[89.96994018554688,158.5340576171875,521.9870557785034,149.41586303710938]},{"page":138,"text":"(Figure 5-6 depicts a sketch of a linear ambush.) The security element positions itself where it can best","rect":[89.96994018554688,169.9969482421875,521.9540781936646,160.88876342773438]},{"page":138,"text":"provide security to the assault and support elements. The size of the area covered by the support element’s","rect":[89.95991516113281,181.51995849609376,521.8928363304138,172.41177368164063]},{"page":138,"text":"weapons limits the size of the target trapped in the kill zone. Natural, manmade, and military obstacles—","rect":[89.95991516113281,193.04296875,521.962230682373,183.93478393554688]},{"page":138,"text":"reinforced with tactical obstacles integrated with direct and indirect fires—trap the target in the kill zone. A","rect":[89.95994567871094,204.505859375,521.9953045883178,195.39767456054688]},{"page":138,"text":"disadvantage of the line formation is that the target may disperse so that it is larger than the kill zone.","rect":[89.95994567871094,216.02880859375,494.8841505050659,206.92062377929688]},{"page":138,"text":"5-111. The linear ambush formation is effective in close terrain, which restricts the target’s movement, and","rect":[89.95994567871094,233.49371337890626,521.9826564788818,224.38552856445313]},{"page":138,"text":"in open terrain where existing or reinforcing obstacles block one flank. Units may place similar obstacles","rect":[89.94992065429688,245.0167236328125,521.9699847679138,235.90853881835938]},{"page":138,"text":"between their assault and support elements and their kill zones to protect their ambush forces from the target’s","rect":[89.94992065429688,256.5396728515625,521.9472796897888,247.43148803710938]},{"page":138,"text":"counter ambush drills. When ambush forces deploy in a line formation, they leave access lanes through these","rect":[89.94992065429688,268.0025634765625,521.9568147735596,258.8943786621094]},{"page":138,"text":"protective obstacles so that they can assault the target. An advantage of the line formation is that it is relatively","rect":[89.94990539550781,279.52557373046877,522.0374050140381,270.4173889160156]},{"page":138,"text":"easy to control under all conditions of visibility.","rect":[89.94989776611328,291.048583984375,282.17263317108157,281.9403991699219]},{"page":138,"text":"Figure 5-6. Example of a linear ambush","rect":[204.1378173828125,564.1637573242188,389.7733738441467,554.7750244140625]},{"page":138,"text":"5-112. The L-shaped formation is a variation of the line formation as shown in figure 5-7. The long leg of","rect":[89.94990539550781,587.6205444335938,521.9813134727478,578.5123901367188]},{"page":138,"text":"the “L” (the assault element) is parallel to the kill zone and provides flanking fire. An advantage of the “L”","rect":[89.9499282836914,599.1435546875,521.9327058868408,590.035400390625]},{"page":138,"text":"formation is that the short leg (the support element) is at the end of the kill zone and at a right angle to it and","rect":[89.94990539550781,610.6064453125,521.9762477874756,601.498291015625]},{"page":138,"text":"blocks the enemy’s forward movement. It also provides enfilading fire that interlocks with fire from the other","rect":[89.94989776611328,622.1294555664063,522.0079248008728,613.0213012695313]},{"page":138,"text":"leg. Units can employ an L-shaped formation on a straight stretch of trail, road, stream, or at a sharp bend.","rect":[89.94989776611328,633.6524658203125,514.8461866378784,624.5443115234375]},{"page":138,"text":"5-20","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":138,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":138,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":139,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":139,"text":"Figure 5-7. Example of an L-shaped ambush","rect":[210.239990234375,352.3141784667969,419.7632114906311,342.9254455566406]},{"page":139,"text":"5-113. An area ambush is most effective when enemy movement is largely restricted to trails or roads.","rect":[107.99590301513672,375.77099609375,539.8790235519409,366.6628112792969]},{"page":139,"text":"Figure 5-8 on page 5-22 is a sketch of an area ambush. The area should offer several suitable point ambush","rect":[107.99590301513672,387.29400634765627,539.9477443695068,378.1858215332031]},{"page":139,"text":"sites. Units select a central ambush site around which to organize outlying ambushes. They determine the","rect":[107.97589874267578,398.8170166015625,539.9408235626221,389.7088317871094]},{"page":139,"text":"enemy force’s possible avenues of approach and escape routes once they select the central ambush site.","rect":[107.97586059570313,410.2798767089844,539.8789014816284,401.17169189453127]},{"page":139,"text":"Commanders assign outlying point ambush sites to subordinates to cover these avenues. Friendly ambushing","rect":[107.9758529663086,421.8028869628906,540.0179958343506,412.6947021484375]},{"page":139,"text":"forces report all enemy traffic going toward or away from the central ambush site to their higher headquarters","rect":[107.9758529663086,433.3258972167969,539.9845721702576,424.21771240234377]},{"page":139,"text":"after those forces occupy those outlying sites. These outlying ambushes allow enemy elements to pass","rect":[107.9758529663086,444.78875732421877,540.0080707054138,435.6805725097656]},{"page":139,"text":"through their kill zones until their commanders initiate their central ambush. Once the central ambush begins,","rect":[107.9758529663086,456.311767578125,539.9431715011597,447.2035827636719]},{"page":139,"text":"these outlying ambushes prevent enemy troops from escaping or entering the area.","rect":[107.9758529663086,467.83477783203127,437.3503370285034,458.7265930175781]},{"page":139,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":139,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":139,"text":"5-21","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":140,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":140,"text":"Figure 5-8. Area ambush","rect":[238.62001037597657,359.8141784667969,355.3800632972717,350.515625]},{"page":140,"text":"5-114. Leaders of forces performing an ambush specify the signals required to control the ambush. They","rect":[89.99334716796875,383.27099609375,522.0196437835693,374.1628112792969]},{"page":140,"text":"make frequent changes to the meaning of audible and visual signals to avoid setting patterns that enemy","rect":[89.98330688476563,394.79400634765627,521.9554958343506,385.6858215332031]},{"page":140,"text":"forces can recognize. Otherwise, enemy forces might recognize a signal and react in time to avoid the","rect":[89.9832992553711,406.3170166015625,521.9477205352783,397.2088317871094]},{"page":140,"text":"ambush’s full effects. For example, if ambushing forces always employ a white star cluster to signal","rect":[89.9832992553711,417.7798767089844,521.9443125686646,408.67169189453127]},{"page":140,"text":"withdrawal in a night ambush, an alert enemy force might fire one and cause a friendly ambushing force to","rect":[89.9832992553711,429.3028869628906,521.9462184906006,420.1947021484375]},{"page":140,"text":"withdraw prematurely. The subordinate elements of the ambush unit must receive communications—in the","rect":[89.98332214355469,440.82586669921877,521.9845857696533,431.7176818847656]},{"page":140,"text":"form of signals—that relay this information:","rect":[89.98332214355469,452.28875732421877,267.4896616897583,443.1805725097656]},{"page":140,"text":" Target approaching, normally given by a member of the security team to warn the ambush","rect":[115.19999694824219,465.7743225097656,522.0170803070068,456.6661376953125]},{"page":140,"text":"commander and the ambush elements of the target’s progress.","rect":[133.1999969482422,477.2973327636719,380.61895275115969,468.18914794921877]},{"page":140,"text":" Initiate the ambush, given by the ambushing element’s commander. (This signal should be the use","rect":[115.19999694824219,490.7943115234375,522.0731477813721,481.6861267089844]},{"page":140,"text":"of the most casualty-producing and reliable weapon or explosive, such as a main gun round from","rect":[133.1999969482422,502.2572021484375,522.0401282272339,493.1490173339844]},{"page":140,"text":"a tank or infantry carrier, the detonation of mines or explosives, or other direct fire crew-served","rect":[133.17994689941407,513.7802124023438,522.0038356781006,504.6719970703125]},{"page":140,"text":"weapons.)","rect":[133.16990661621095,525.283203125,174.01144958114626,516.195068359375]},{"page":140,"text":" Lift or shift fire, given when initiating the assault on the target; all fires must stop or shift at once","rect":[115.19999694824219,538.7943115234375,522.0681428985596,529.6861572265625]},{"page":140,"text":"so that the assault element can attack before the target can react.","rect":[133.1999969482422,550.2572021484375,389.6669874191284,541.1490478515625]},{"page":140,"text":" Assault, given when the assault force is to move into the kill zone and complete its activities.","rect":[115.19999694824219,563.7542724609375,505.24456310272219,554.6461181640625]},{"page":140,"text":" Cease fire, given to cease all fires.","rect":[115.19999694824219,577.2542724609375,270.3937940597534,568.1461181640625]},{"page":140,"text":" Withdraw from the kill zone or ambush site, given when the ambush is completed or an enemy","rect":[115.19999694824219,590.7542724609375,522.0532741546631,581.6461181640625]},{"page":140,"text":"relief force is approaching.","rect":[133.1999969482422,602.2772827148438,240.94005870819093,593.1691284179688]},{"page":140,"text":"5-115. Leaders use various signals to communicate this information, such as radio transmissions, voice","rect":[90.00376892089844,619.80224609375,521.9218416290283,610.694091796875]},{"page":140,"text":"commands, vehicle horns, whistles, or pyrotechnics. All signals must have at least one backup. For example,","rect":[89.9937515258789,631.26513671875,522.0361280441284,622.156982421875]},{"page":140,"text":"if the signal to shift fire fails, the assault element should not attack the target unless it receives the backup","rect":[89.9937515258789,642.7881469726563,521.9550075531006,633.6799926757813]},{"page":140,"text":"signal. Signals sent out before initiation of the ambush should not expose the ambush to enemy detection.","rect":[89.9937515258789,654.3111572265625,521.9307813644409,645.2030029296875]},{"page":140,"text":"Units review SOP signals to see if they need to be revised or augmented to meet specific situational","rect":[89.9937515258789,665.7740478515625,522.0051646194459,656.6658935546875]},{"page":140,"text":"requirements.","rect":[89.99375915527344,677.2770385742188,144.7590742111206,668.1889038085938]},{"page":140,"text":"5-22","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":140,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":140,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":141,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":141,"text":"Preparation for an Ambush","rect":[90.0,84.59874725341797,220.39299620056154,74.81556701660156]},{"page":141,"text":"5-116. The keys to a successful ambush are surprise, coordinated fires, and control. Surprise allows the","rect":[108.0,102.11431884765625,540.0392122344971,93.00614166259766]},{"page":141,"text":"ambush force to seize control of the situation. If total surprise is not possible, it must be so nearly complete","rect":[108.0,113.6373291015625,540.0039339141846,104.5291519165039]},{"page":141,"text":"that the target does not expect the ambush until it is too late to react effectively. Thorough planning,","rect":[108.0,125.16033935546875,540.0834913253784,116.05216217041016]},{"page":141,"text":"preparation, and execution help achieve surprise.","rect":[108.0,136.60313415527345,303.70366954803469,127.5149917602539]},{"page":141,"text":"5-117. Leaders conduct their leader’s reconnaissance with key personnel to confirm or modify the plan.","rect":[108.0,154.148193359375,539.9800977706909,145.04000854492188]},{"page":141,"text":"This reconnaissance should be covert to remain undetected and preclude alerting enemy forces. If necessary,","rect":[107.98997497558594,165.67120361328126,539.9596509933472,156.56301879882813]},{"page":141,"text":"commanders modify their ambush plans and immediately disseminate those changes to subordinate leaders","rect":[107.98997497558594,177.134033203125,539.9762713890076,168.02584838867188]},{"page":141,"text":"and other affected organizations. Leaders maintain close control during movement to, occupation of, and","rect":[107.98998260498047,188.65704345703126,539.9880275726318,179.54885864257813]},{"page":141,"text":"withdrawal from ambush sites. Control is most critical when ambush units are approaching their targets.","rect":[107.98998260498047,200.1800537109375,540.0631055831909,191.07186889648438]},{"page":141,"text":"Leaders enforce camouflage, noise, and light discipline. All ambush force elements reconnoiter their routes","rect":[107.98998260498047,211.6429443359375,539.9850604515076,202.53475952148438]},{"page":141,"text":"of withdrawal to selected rally points. When possible, all Soldiers within the ambush force reconnoiter the","rect":[107.98998260498047,223.16595458984376,540.0172395782471,214.05776977539063]},{"page":141,"text":"routes they use.","rect":[107.98998260498047,234.68896484375,170.49372386932374,225.58078002929688]},{"page":141,"text":"5-118. The ambush unit’s security element remains at full alert and uses all available observation devices","rect":[107.98998260498047,252.15380859375,540.0032489280701,243.04562377929688]},{"page":141,"text":"to detect the enemy’s approach to the ambush site. Small-unit leaders within each ambush element rotate","rect":[107.96995544433594,263.6767578125,539.8930330352783,254.56857299804688]},{"page":141,"text":"each Soldier’s duties as necessary to maintain alertness.","rect":[107.96994018554688,275.19976806640627,331.2035779953003,266.0915832519531]},{"page":141,"text":"5-119. Leaders position and coordinate all weapons, including mines and demolitions, to obtain the","rect":[107.96994018554688,292.6646728515625,539.9662141876221,283.5564880371094]},{"page":141,"text":"maximum effectiveness against targets in their kill zones. All fires, including those of supporting artillery","rect":[107.95990753173828,304.1876525878906,539.8881740570068,295.0794677734375]},{"page":141,"text":"and mortars, are coordinated. Each support element isolates its kill zone, prevents the target’s escape or","rect":[107.95990753173828,315.71063232421877,540.0068872032166,306.6024475097656]},{"page":141,"text":"reinforcement, and delivers a large volume of highly concentrated surprise fire into that kill zone. This fire","rect":[107.95990753173828,327.17352294921877,539.9098177032471,318.0653381347656]},{"page":141,"text":"must inflict maximum damage so assault elements can quickly assault and destroy their targets.","rect":[107.95990753173828,338.696533203125,489.60454845428469,329.5883483886719]},{"page":141,"text":"Execution of an Ambush","rect":[90.0,361.042724609375,205.75334776306154,353.45556640625]},{"page":141,"text":"5-120. Fire discipline is a key part of any ambush. Soldiers withhold fire until the ambush leader gives the","rect":[108.0,380.7543029785156,540.0594148712158,371.6461181640625]},{"page":141,"text":"signal to initiate the ambush. The initiation signal should be from the most deadly and reliable weapon in the","rect":[107.98998260498047,392.2773132324219,540.0100984649658,383.16912841796877]},{"page":141,"text":"ambush. Once initiated, the support and assault elements deliver accurate fires at the maximum rate possible.","rect":[107.98998260498047,403.7802429199219,540.0344190597534,394.6921081542969]},{"page":141,"text":"Failure to deliver accurate and rapid fires delays the assault, giving the target time to react and increasing the","rect":[107.98998260498047,415.26318359375,540.0113802032471,406.1549987792969]},{"page":141,"text":"possibility of fratricide. Accurate fires help achieve surprise and destroy targeted elements. When it is","rect":[107.98999786376953,426.78619384765627,539.9862811546326,417.6780090332031]},{"page":141,"text":"necessary to assault the target, the lifting or shifting of fires must be precise. The assault element does not","rect":[107.98994445800781,438.3092041015625,539.9660410842896,429.2010192871094]},{"page":141,"text":"conduct its assault until achieving elimination of enemy fires or resistance.","rect":[107.98994445800781,449.7720642089844,407.13372325897219,440.66387939453127]},{"page":141,"text":"5-121. The ambush force may have to withdraw by bounds if the ambush fails and the enemy force pursues.","rect":[107.98994445800781,467.29705810546877,540.0363111495972,458.1888732910156]},{"page":141,"text":"It should use obscuration to help conceal its withdrawal. Activating limited duration minefields along","rect":[107.97994995117188,478.7599182128906,539.9963283538818,469.6517333984375]},{"page":141,"text":"withdrawal routes after the passage of the withdrawing ambush force can help stop or delay enemy pursuit.","rect":[107.97994995117188,490.2829284667969,539.8604078292847,481.17474365234377]},{"page":141,"text":"Commanders position their support elements to assist the withdrawal of their assault elements.","rect":[107.97994995117188,501.7858581542969,486.02923107147219,492.6977233886719]},{"page":141,"text":"5-122. Ambush forces withdraw to their rally points, reorganize, and start their return march on their","rect":[107.97994995117188,519.270751953125,539.9280297813416,510.1625671386719]},{"page":141,"text":"commanders’ orders. Assault forces halt and disseminate any combat information obtained to all ambush","rect":[107.96993255615235,530.7937622070313,539.9261379241943,521.6856079101563]},{"page":141,"text":"elements at previously established locations. Ambushing forces do not need to halt if their assault force’s","rect":[107.96991729736328,542.3167724609375,539.9216449241638,533.2086181640625]},{"page":141,"text":"information systems are able to disseminate this combat information.","rect":[107.96991729736328,553.7796630859375,384.37441539764407,544.6715087890625]},{"page":141,"text":"5-123. Once ambush forces return, commanders or their representatives debrief them to help identify enemy","rect":[107.96991729736328,571.2946166992188,539.9412136077881,562.1864624023438]},{"page":141,"text":"patterns of response, activities, and procedures, both inside and outside the ambush area. Unit assistant chiefs","rect":[107.94990539550781,582.797607421875,539.9710223655701,573.70947265625]},{"page":141,"text":"of staff and intelligence personnel report this information to all appropriate organizations through intelligence","rect":[107.94989776611328,594.280517578125,539.9573640899658,585.17236328125]},{"page":141,"text":"channels. Units adjust tactics, techniques, and procedures to account for new enemy information. (See ATP","rect":[107.94989776611328,605.803466796875,539.9865865631103,596.6852416992188]},{"page":141,"text":"3-21.8 for additional information on the conduct of small unit ambushes.)","rect":[107.94989776611328,617.3065185546875,402.34163451766968,608.2183837890625]},{"page":141,"text":"COUNTERATTACK","rect":[90.0,640.6680297851563,179.861798286438,632.3759765625]},{"page":141,"text":"5-124. A counterattack is a variation of attack by a defending force against an attacking enemy force.","rect":[108.0,660.5343017578125,540.0534009933472,651.58642578125]},{"page":141,"text":"Units should not counterattack unless there is a reasonable chance of success. Units executing a counterattack","rect":[108.01001739501953,672.0573120117188,539.9902858734131,662.9491577148438]},{"page":141,"text":"can use all or part of the defending force, to include their reserve, against an attacking enemy. The specific","rect":[108.01001739501953,683.580322265625,540.0060091094971,674.47216796875]},{"page":141,"text":"purpose for a counterattack is to deny to the enemy the attainment of the enemy’s purpose and regain the","rect":[108.01000213623047,695.0431518554688,539.9502229766846,685.9349975585938]},{"page":141,"text":"initiative from the enemy through offensive action. Counterattacking forces maneuver to isolate and destroy","rect":[108.01005554199219,706.566162109375,539.9852199554443,697.4580078125]},{"page":141,"text":"designated enemy forces. Counterattacking forces can attack by fire into an engagement area to defeat or","rect":[108.01005554199219,718.0891723632813,540.0303857383728,708.9810180664063]},{"page":141,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":141,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":141,"text":"5-23","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":142,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":142,"text":"destroy an enemy force, restore the original position, or block an enemy penetration. In sustained defensive","rect":[90.0,83.51434326171875,522.0122957305908,74.40616607666016]},{"page":142,"text":"actions, units counterattack toward limited objectives, such as regaining lost battle positions (BPs). Once","rect":[90.0,94.97723388671875,522.0694246368408,85.85903930664063]},{"page":142,"text":"launched, counterattacks become their echelon’s main effort. (Figure 5-9 illustrates projected major","rect":[90.0,106.500244140625,521.9692895469666,97.38204956054688]},{"page":142,"text":"counterattacks.)","rect":[89.98998260498047,118.00315856933594,153.56288695907595,108.9150161743164]},{"page":142,"text":"Figure 5-9. Example of counterattacks","rect":[206.6829071044922,486.8393859863281,387.33854579162598,477.4506530761719]},{"page":142,"text":"5-125. It is difficult for enemy forces to fight a defensive battle in response to friendly counterattacks after","rect":[89.97994995117188,510.29620361328127,521.9583642539978,501.1880187988281]},{"page":142,"text":"they reach their culminating point because—","rect":[89.97994995117188,521.8192138671875,269.6786308288574,512.7110595703125]},{"page":142,"text":" Defensive preparations are hasty.","rect":[115.19999694824219,535.3143310546875,266.50710582733157,526.2061767578125]},{"page":142,"text":" Enemy forces are not adequately organized for defense.","rect":[115.19999694824219,548.8143310546875,355.90362071990969,539.7061767578125]},{"page":142,"text":" Reorganizing for a defense requires more time than the friendly commander allows.","rect":[115.19999694824219,562.3143310546875,468.6415967941284,553.2061767578125]},{"page":142,"text":" Enemy forces have reduced combat power, and they are dispersed across the battlefield.","rect":[115.19999694824219,575.7542724609375,485.36626720428469,566.6461181640625]},{"page":142,"text":" Enemy forces are physically fatigued.","rect":[115.19999694824219,589.2542724609375,284.6321973800659,580.1461181640625]},{"page":142,"text":"5-126. Units plan and conduct counterattacks to attack enemy forces when and where enemy forces are","rect":[90.00376892089844,606.779296875,522.0102815704346,597.671142578125]},{"page":142,"text":"most vulnerable. This is often when an enemy force is attempting to overcome friendly defensive positions.","rect":[89.9937515258789,618.30224609375,521.9127149581909,609.194091796875]},{"page":142,"text":"Normally, enemy forces attempt to retain a reserve or striking force to reinforce these vulnerabilities, once","rect":[89.9937515258789,629.76513671875,521.9958772735596,620.656982421875]},{"page":142,"text":"opposing units commit their counterattack forces. Commanders assign terrain objectives to counterattacking","rect":[89.98370361328125,641.2881469726563,522.0090847015381,632.169921875]},{"page":142,"text":"forces even when their counterattacks are force oriented to control the maneuver of their counterattacking","rect":[89.98373413085938,652.8111572265625,521.9514064788818,643.7030029296875]},{"page":142,"text":"forces. Units normally assign attack by fire positions when counterattacking using primarily direct and","rect":[89.98373413085938,664.2740478515625,522.0090847015381,655.1658935546875]},{"page":142,"text":"indirect fires.","rect":[89.98370361328125,673.7730102539063,143.3081464767456,666.6889038085938]},{"page":142,"text":"5-127. The two methods of counterattacks are major and local. Local counterattacks are attacks to retake","rect":[89.98370361328125,693.322021484375,521.9748811798096,684.2037963867188]},{"page":142,"text":"positions lost to enemy action or to exploit targets of opportunity. A major counterattack seizes the initiative","rect":[89.97370147705078,704.784912109375,522.0440950469971,695.6666870117188]},{"page":142,"text":"from an enemy force through offensive action after an enemy force launches an attack. Units also conduct","rect":[89.97372436523438,716.3079223632813,521.9992442092896,707.1997680664063]},{"page":142,"text":"5-24","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":142,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":142,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":143,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":143,"text":"major counterattacks to defeat or block an enemy penetration that endangers the integrity of their entire","rect":[108.0,83.51434326171875,539.9809846954346,74.39614868164063]},{"page":143,"text":"defense, or to attrit an enemy force by the defeat or destruction of isolated portions of it. In both cases, waiting","rect":[108.0,94.97723388671875,539.9822902679443,85.86905670166016]},{"page":143,"text":"for an enemy force to act first may reveal the enemy’s main effort and create an assailable flank to exploit.","rect":[108.00003814697266,106.500244140625,534.4457349777222,97.3920669555664]},{"page":143,"text":"Organization of Forces for a Counterattack","rect":[90.0,131.12071228027345,294.3608306732178,121.31556701660156]},{"page":143,"text":"5-128. Units conductingalocal counterattack often consist of defending forces that survive after completing","rect":[108.0,148.61431884765626,540.1066188812256,139.50613403320313]},{"page":143,"text":"their withdrawal from lost positions and the unit’s reserve. Units performing a local counterattack are unlikely","rect":[108.0,160.1373291015625,540.0374660491943,151.02914428710938]},{"page":143,"text":"to change the internal task organization of these immediately available forces because this most likely will","rect":[108.0,171.66033935546876,539.9495005569459,162.55215454101563]},{"page":143,"text":"delay initiation of these local counterattacks. Units may be able to designate elements to conduct","rect":[108.0,183.1231689453125,540.0839610061646,174.01498413085938]},{"page":143,"text":"reconnaissance.","rect":[108.0,192.6221466064453,171.03884410858155,185.53799438476563]},{"page":143,"text":"5-129. Units conducting a major counterattack typically organize their combined arms assets into forces for","rect":[108.0,212.1611328125,539.9953515586853,203.04293823242188]},{"page":143,"text":"security, reconnaissance, main body, and reserve. They use defending forces already in contact with enemy","rect":[107.98997497558594,223.6240234375,539.9631252288818,214.51583862304688]},{"page":143,"text":"forces to fix or contain those same enemy forces. Commanders may use a force committed to the","rect":[107.98999786376953,235.14703369140626,539.9916658477783,226.03884887695313]},{"page":143,"text":"counterattack, their reserve, another echelon’s reserve, or commanders may designate any other force to be","rect":[107.98999786376953,246.6700439453125,540.0945100860596,237.56185913085938]},{"page":143,"text":"their counterattack force. Units complete changes in task organization in time to allow subordinate forces to","rect":[107.97994995117188,258.1329345703125,540.0093898773193,249.02474975585938]},{"page":143,"text":"conduct rehearsals with their attached or supporting elements as time allows.","rect":[107.97994995117188,269.6558837890625,415.4035596847534,260.5476989746094]},{"page":143,"text":"5-130. A counterattack force is a committed force if its commander’s defensive scheme hinges on a","rect":[107.97993469238281,287.180908203125,540.0234041290283,278.0727233886719]},{"page":143,"text":"counterattack to destroy, dislocate, disintegrate, or isolate the attacking enemy force. The reserve becomes a","rect":[107.95988464355469,298.6437683105469,539.9606599884033,289.53558349609377]},{"page":143,"text":"committed force when ordered to conduct planned counterattacks. Units conducting mobile defenses allocate","rect":[107.95990753173828,310.16680908203127,539.9060945587158,301.0586242675781]},{"page":143,"text":"field artillery, engineers, and other combat enablers to their striking forces because their defensive schemes","rect":[107.95990753173828,321.6897888183594,540.0139300804138,312.58160400390627]},{"page":143,"text":"hinge on counterattacks by their striking forces. In this case, commanders designate other forces as their","rect":[107.95990753173828,333.15264892578127,539.8384912071228,324.0444641113281]},{"page":143,"text":"reserves.","rect":[107.95990753173828,342.651611328125,143.2814130783081,337.9021301269531]},{"page":143,"text":"Planning a Counterattack","rect":[90.0,369.26068115234377,211.60130918884279,359.45556640625]},{"page":143,"text":"5-131. Units plan their counterattacks against enemy forces when those enemy forces are vulnerable. Their","rect":[108.0,386.7543029785156,540.0493066368103,377.6461181640625]},{"page":143,"text":"defenses create gaps between attacking enemy units, exposing the flanks and rear of elements of attacking","rect":[108.0,398.2773132324219,539.9194240570068,389.16912841796877]},{"page":143,"text":"enemy forces as they advance. The seizure of defended positions typically leaves attacking enemy forces","rect":[108.0,409.80029296875,539.9773700218201,400.6921081542969]},{"page":143,"text":"temporarily disorganized, depleted, and ill prepared to meet sudden counterattacks. Units must assess their","rect":[108.0,421.26318359375,539.9960839805603,412.1549987792969]},{"page":143,"text":"situations rapidly since opportunities for effective local counterattacks are usually brief and must execute","rect":[108.0,432.78619384765627,540.0033235626221,423.6780090332031]},{"page":143,"text":"their counterattacks swiftly. They assign objectives or attack by fire positions to counterattacking forces,","rect":[108.0,444.3091735839844,539.9571485519409,435.19097900390627]},{"page":143,"text":"depending on if they intend their counterattacking forces to close with and assault enemy forces. Local","rect":[108.0,455.7720642089844,539.9601817092896,446.66387939453127]},{"page":143,"text":"counterattacks may or may not be the result of previous deliberate planning.","rect":[108.0,467.2950744628906,412.36260509490969,458.1868896484375]},{"page":143,"text":"5-132. Units normally develop their major counterattack plans as branches or sequels to their main","rect":[108.0,484.7599182128906,540.0152492523193,475.6417236328125]},{"page":143,"text":"defensive plans. A major counterattack may achieve surprise when it strikes enemy forces from an","rect":[107.98997497558594,496.2829284667969,540.0075588226318,487.16473388671877]},{"page":143,"text":"unanticipated direction. For that reason, units involve forces allocated to the performance of a major","rect":[107.98997497558594,507.805908203125,539.9601953086853,498.6877136230469]},{"page":143,"text":"counterattack, such as the strike force in a mobile defense, in developing those plans as well as any plans to","rect":[107.98998260498047,519.268798828125,540.0190944671631,510.1606140136719]},{"page":143,"text":"exploit potential success.","rect":[107.98998260498047,530.7717895507813,208.23005199432374,521.6836547851563]},{"page":143,"text":"5-133. Units generally have two options when executing a counterattack. The first, and generally preferred,","rect":[107.98998260498047,548.3167724609375,539.9572095870972,539.2086181640625]},{"page":143,"text":"technique is to attack using forces not previously committed to the defense. This is because defending units","rect":[107.98998260498047,559.7796630859375,539.9850604515076,550.6715087890625]},{"page":143,"text":"may still be decisively engaged. Attacking forces may come from the reserve or consist of reinforcements.","rect":[107.98998260498047,571.3026123046875,539.9940748214722,562.1944580078125]},{"page":143,"text":"Since these forces were not recently or actively involved in combat, they are more likely to—","rect":[107.98998260498047,582.8256225585938,482.3293876647949,573.7174682617188]},{"page":143,"text":" Be at authorized strength levels.","rect":[133.1999969482422,596.2742919921875,279.7676649093628,587.1661376953125]},{"page":143,"text":" Enjoy a higher combat system operationally ready rate.","rect":[133.1999969482422,609.7742919921875,372.28338146209719,600.6560668945313]},{"page":143,"text":" Have leaders and Soldiers who are more likely to be rested and thus capable of prolonged,","rect":[133.1999969482422,623.2742919921875,540.0349683761597,614.1661376953125]},{"page":143,"text":"continuous operations.","rect":[151.1999969482422,634.7171630859375,241.78881359100343,625.6290283203125]},{"page":143,"text":" Have a complete basic load of supplies.","rect":[133.1999969482422,648.2142944335938,309.7635450363159,639.1261596679688]},{"page":143,"text":" Have the time and energy to plan and prepare for offensive action.","rect":[133.1999969482422,661.7343139648438,416.68206310272219,652.6261596679688]},{"page":143,"text":" Be able to maneuver out of physical contact with enemy forces.","rect":[133.1999969482422,675.2343139648438,405.81634044647219,666.1261596679688]},{"page":143,"text":"5-134. Potential drawbacks to using forces not previously committed to the defense:","rect":[108.00376892089844,692.75927734375,450.85108136749269,683.651123046875]},{"page":143,"text":" Forces are required to conduct a forward passage of lines.","rect":[133.1999969482422,706.2542724609375,382.2963819503784,697.1461181640625]},{"page":143,"text":" Enemy information collection assets are likely to detect the arrival of significant reinforcements.","rect":[133.1999969482422,719.7542724609375,537.5064649581909,710.6461181640625]},{"page":143,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":143,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":143,"text":"5-25","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":144,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":144,"text":" Defending in noncontiguous assigned areas has different requirements. To mass overwhelming","rect":[115.19999694824219,83.51434326171875,522.0291042327881,74.40616607666016]},{"page":144,"text":"combat power in the main effort might require friendly forces to adopt economy of force measures","rect":[133.1999969482422,94.97723388671875,522.0723407249451,85.86905670166016]},{"page":144,"text":"in some assigned areas while temporarily abandoning others in order to concentrate sufficient","rect":[133.1999969482422,106.500244140625,521.9939951858521,97.3920669555664]},{"page":144,"text":"combat power.","rect":[133.1999969482422,118.00315856933594,192.64165782928468,108.9150161743164]},{"page":144,"text":"5-135. The second technique when transitioning to the offense is to use the currently defending forces to","rect":[89.9937515258789,135.48809814453126,521.9688625335693,126.37992095947266]},{"page":144,"text":"attack. This technique generally has these advantages:","rect":[89.98373413085938,147.0111083984375,306.3667368850708,137.90292358398438]},{"page":144,"text":" Speed of execution:","rect":[115.19999694824219,160.4742889404297,212.6645884475708,151.38613891601563]},{"page":144,"text":" Units do not have to move from an assembly area or potentially other assigned areas.","rect":[133.1999969482422,174.5343017578125,491.4462842941284,165.42611694335938]},{"page":144,"text":" Units do not have to conduct a forward passage of line.","rect":[133.1999969482422,188.57427978515626,371.98577404022219,179.46609497070313]},{"page":144,"text":" Units already have a common operational picture that includes knowledge of the enemy","rect":[133.1999969482422,202.61431884765626,522.0101222991943,193.50613403320313]},{"page":144,"text":"force’s patterns of operation.","rect":[151.1999969482422,214.11729431152345,266.7446241378784,205.02914428710938]},{"page":144,"text":" Increased likelihood of catching enemy forces by surprise. Units move less and so avoid","rect":[115.19999694824219,227.63427734375,522.0920925140381,218.52609252929688]},{"page":144,"text":"potentially alerting enemy forces to potential offensive operations.","rect":[133.1999969482422,239.15728759765626,399.28887462615969,230.04910278320313]},{"page":144,"text":"5-136. Potential disadvantages of this technique are that the attacking force generally lacks stamina and","rect":[90.00376892089844,256.62213134765627,521.9920558929443,247.51394653320313]},{"page":144,"text":"sustainment, specifically ammunition. The attacking force must be quickly replaced if friendly offensive","rect":[89.9937515258789,268.1451416015625,521.9720125274658,259.0369567871094]},{"page":144,"text":"actions are not to culminate quickly.","rect":[89.9937515258789,279.66815185546877,235.47413158416749,270.5599670410156]},{"page":144,"text":"Preparing a Counterattack","rect":[72.0,304.28070068359377,199.0791992034912,294.4755859375]},{"page":144,"text":"5-137. The keys topreparinga successful counterattack are surprise, control, and coordinated fires. Surprise","rect":[90.0,321.7743225097656,522.0164461212158,312.6661376953125]},{"page":144,"text":"allows a counterattacking force to seize control of a situation. If total surprise is not possible, it must be so","rect":[89.9899673461914,333.2973327636719,522.0053615570068,324.18914794921877]},{"page":144,"text":"nearly complete that the targeted enemy force does not expect the attack until it is too late to react effectively.","rect":[89.9899673461914,344.76019287109377,522.0768384933472,335.6520080566406]},{"page":144,"text":"Thorough planning and preparation help achieve surprise. Units adjust the positioning of their information","rect":[89.9899673461914,356.283203125,521.9280300140381,347.1650085449219]},{"page":144,"text":"collection assets and the missions given those assets to determine the location and targets for their","rect":[89.98999786376953,367.80621337890627,522.0254418907166,358.6980285644531]},{"page":144,"text":"counterattacks.","rect":[89.98998260498047,377.24505615234377,150.2713270187378,370.1609191894531]},{"page":144,"text":"5-138. Control of a counterattack begins with a unit’s plan. Commanders conduct their leader’s","rect":[89.98998260498047,396.7840576171875,522.0324237327576,387.6758728027344]},{"page":144,"text":"reconnaissance with key personnel to confirm or modify their counterattack plans. They modify their plans","rect":[89.96990203857422,408.3070373535156,521.9969623069763,399.1988525390625]},{"page":144,"text":"and disseminate those changes to subordinate leaders and other affected organizations as necessary. If","rect":[89.96994018554688,419.7699279785156,522.0022485313416,410.6617431640625]},{"page":144,"text":"possible, each counterattack force element reconnoiters its planned axis of advance and the routes it takes.","rect":[89.96990203857422,431.2728576660156,521.9475049972534,422.1847229003906]},{"page":144,"text":"Units maintain close control during movement to and occupation of hide positions and the information","rect":[89.9699478149414,442.81591796875,521.9197292327881,433.7077331542969]},{"page":144,"text":"collection process. This control is necessary so enemy forces do not detect the presence of counterattacking","rect":[89.96990203857422,454.27880859375,521.9921169281006,445.1706237792969]},{"page":144,"text":"forces before they can initiate their counterattacks. Leaders enforce camouflage, noise, and light discipline.","rect":[89.96994018554688,465.80181884765627,518.4072217941284,456.6936340332031]},{"page":144,"text":"5-139. Units coordinate their fire support by adjusting the planned positions of weapon systems to obtain","rect":[89.96994018554688,483.3267822265625,521.9529933929443,474.2085876464844]},{"page":144,"text":"maximum effectiveness against targets in the planned objectives, and they request support from assets not","rect":[89.95992279052735,494.7896728515625,521.9782481155396,485.6714782714844]},{"page":144,"text":"typically available to their echelon. Units coordinate all fires, including those of supporting artillery and","rect":[89.95994567871094,506.3126525878906,522.0224514007568,497.2044677734375]},{"page":144,"text":"mortars. They use these fires to isolate a targeted enemy force in planned locations or engagement areaswhile","rect":[89.95994567871094,517.8356323242188,522.0263948516846,508.7274475097656]},{"page":144,"text":"preventing its escape or reinforcement. These fires inflict maximum damage quickly before enemy forces","rect":[89.9599838256836,529.2985229492188,521.8662250022888,520.1903686523438]},{"page":144,"text":"can respond to the counterattack.","rect":[89.9599838256836,540.801513671875,221.9403944015503,531.71337890625]},{"page":144,"text":"Executing a Counterattack","rect":[72.0,565.4007568359375,198.47090757751466,555.5955810546875]},{"page":144,"text":"5-140. Units conduct counterattacks in the same way they conduct any other attack. Subordinates initiate","rect":[90.0,582.894287109375,521.9078645782471,573.7861328125]},{"page":144,"text":"local counterattacks with available forces when those actions fit within their higher echelon commander’s","rect":[90.0,594.4172973632813,521.9923236351013,585.3091430664063]},{"page":144,"text":"intent. A local counterattack should be swift and violent. Units exploit enemy disorganization, such as the","rect":[89.98999786376953,605.9403076171875,522.0073518829346,596.8321533203125]},{"page":144,"text":"confusion that temporarily exists in an attacking force after it seizes a defended position. A rapidly mounted","rect":[89.98998260498047,617.4031982421875,521.9562282562256,608.2950439453125]},{"page":144,"text":"local counterattack may yield better results than a more deliberate counterattack executed by a higher echelon","rect":[89.98998260498047,628.9261474609375,522.0378322601318,619.8179931640625]},{"page":144,"text":"because of the speed at which forces can launch them.","rect":[89.98998260498047,640.42919921875,306.56130504608157,631.341064453125]},{"page":144,"text":"5-141. Units may conduct local counterattacks to retain or seize positions on the flanks of a strong enemy","rect":[89.98998260498047,657.9140625,522.0021877288818,648.805908203125]},{"page":144,"text":"penetration. This prevents enemy forces from widening the penetration while forces from other defending","rect":[89.9799575805664,669.4370727539063,521.9225368499756,660.3289184570313]},{"page":144,"text":"units engage the penetrating enemy forces. Holding these flanks can also prevent the sacrifice of positional","rect":[89.9800033569336,680.9600219726563,522.0533823928834,671.8518676757813]},{"page":144,"text":"depth because the limited gap in the defensive position prevents an attacking enemy force from fully","rect":[89.96995544433594,692.4229125976563,521.9319362640381,683.3147583007813]},{"page":144,"text":"exploiting its success.","rect":[89.96990203857422,703.9459228515625,177.4936170578003,694.8377685546875]},{"page":144,"text":"5-26","rect":[72.1199951171875,754.1790161132813,90.07499151611329,747.6090087890625]},{"page":144,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":144,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":145,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":145,"text":"RAID","rect":[90.0,83.219970703125,116.03958988189697,75.27597045898438]},{"page":145,"text":"5-142. A raid is a variation of attack to temporarily seize an objective with a planned withdrawal. The","rect":[108.0,103.3143310546875,540.0902986602783,94.2061538696289]},{"page":145,"text":"purposes of the raid are to: secure information, capture personnel or equipment, destroy a capability, rescue","rect":[108.0199966430664,114.7772216796875,540.0866365509033,105.6690444946289]},{"page":145,"text":"and recover individuals and equipment, or confuse an adversary. Raids are usually small, involving battalion-","rect":[108.02003479003906,126.30023193359375,540.0023095664978,117.19205474853516]},{"page":145,"text":"sized or smaller forces. Figure 5-10 illustrates the five phases of a raid. In the first phase, the raiding force","rect":[108.03008270263672,137.8232421875,540.0033845977783,128.71505737304688]},{"page":145,"text":"inserts or infiltrates into the objective area. In phase two, the raiding force isolates the objective area from","rect":[108.01005554199219,149.28607177734376,539.9916663131714,140.16787719726563]},{"page":145,"text":"outside support or reinforcement, including enemy air assets. In phase three, the unit overcomes any enemy","rect":[108.01005554199219,160.80914306640626,539.9747219085693,151.70089721679688]},{"page":145,"text":"forces at or near the objective in a violently executed surprise attack using all available firepower for shock","rect":[108.0,172.33209228515626,539.9486598968506,163.21389770507813]},{"page":145,"text":"effect. In phase four, the force seizes the objective and accomplishes its assigned task quickly before any","rect":[108.0,183.79498291015626,539.9714260101318,174.67678833007813]},{"page":145,"text":"surviving enemy forces in the objective area can recover or receive outside reinforcements. Lastly, in phase","rect":[108.0,195.3179931640625,539.9825716094971,186.19979858398438]},{"page":145,"text":"five the raiding force withdraws from the objective area and is extracted, usually using a different route than","rect":[108.0,206.7808837890625,539.9722194671631,197.66268920898438]},{"page":145,"text":"that used for movement to the objective.","rect":[108.0,218.3038330078125,269.3200330734253,209.18563842773438]},{"page":145,"text":"Figure 5-10. Five phases of a raid","rect":[236.09568786621095,555.6271362304688,393.96078229141235,546.2384033203125]},{"page":145,"text":"5-143. A simplified raid chain of command is an essential organizational requirement. A raid usually","rect":[107.98994445800781,579.083984375,540.0062160491943,569.975830078125]},{"page":145,"text":"requires a force carefully tailored to neutralize specific enemy forces operating near an objective and to","rect":[107.98994445800781,590.60693359375,539.9532985687256,581.4887084960938]},{"page":145,"text":"perform whatever additional functions are required to accomplish the objectives of the raid. These additional","rect":[107.98999786376953,602.1300048828125,540.0782847366334,593.0117797851563]},{"page":145,"text":"functions can consist of the demolition of bridges over major water obstacles or the recovery of an attack","rect":[107.98998260498047,613.5928955078125,539.9247341156006,604.4746704101563]},{"page":145,"text":"helicopter pilot shot down forward of the forward line of own troops (FLOT). Units incorporate any necessary","rect":[107.98999786376953,625.1159057617188,540.0563869476318,616.0076293945313]},{"page":145,"text":"support specialists during the initial planning stage of the operation.","rect":[107.98998260498047,636.638916015625,379.59389781951907,627.53076171875]},{"page":145,"text":"5-144. When commanders and staffs plan raids, they require precise, time-sensitive intelligence. The","rect":[107.98998260498047,654.103759765625,540.0502595977783,644.99560546875]},{"page":145,"text":"planning process determines how control, sustainment, and target acquisition occur during a raid. Planners","rect":[107.9800033569336,665.626708984375,540.0203998069763,656.5185546875]},{"page":145,"text":"also develop techniques and procedures for conducting operations across the FLOT given specific mission","rect":[107.96991729736328,677.1497192382813,539.9344997406006,668.0415649414063]},{"page":145,"text":"variables expected to exist during the conduct of the raid. Commanders and staffs develop as many alternative","rect":[107.96990203857422,688.6126098632813,540.0614900665283,679.5044555664063]},{"page":145,"text":"COAs as time and the situation permit. They carefully weigh each alternative. Commanders and staffs","rect":[107.96994018554688,700.1356201171875,539.8900897483826,691.0274658203125]},{"page":145,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":145,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":145,"text":"5-27","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":146,"text":"Chapter 5","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":146,"text":"determine the risks associated with conducting the mission and possible repercussions in addition to those","rect":[90.0,83.51434326171875,522.0469636993408,74.40616607666016]},{"page":146,"text":"planning considerations associated with other offensive operations.","rect":[90.0,94.97723388671875,358.6012830734253,85.86905670166016]},{"page":146,"text":"5-145. At a minimum, all elements involved in a raid must rehearse their individual missions and tasks. If","rect":[90.0,111.0,521.9622094688416,103.3840103149414]},{"page":146,"text":"time permits all elements involved in a raid rehearse the entire mission together to ensure synchronization","rect":[89.98994445800781,124.01519775390625,522.0003566741943,114.90702056884766]},{"page":146,"text":"and understanding. The key elements in determining the level of detail and the opportunities for rehearsal","rect":[89.98994445800781,135.47808837890626,522.0411143264771,126.36991119384766]},{"page":146,"text":"before mission execution are time, OPSEC, and deception requirements.","rect":[89.98994445800781,146.9810028076172,379.6512403488159,137.89285278320313]},{"page":146,"text":"5-146. Raids conducted by ground maneuver forces within the depths of the enemy’s support zones tend to","rect":[89.98994445800781,164.52606201171876,522.0099391937256,155.41787719726563]},{"page":146,"text":"be audacious, rapid, and of short duration. Logistics support is minimal; units carry as much ammunition and","rect":[89.9800033569336,175.98895263671876,521.9532375335693,166.88070678710938]},{"page":146,"text":"petroleum, oils, and lubricants as possible, taking advantage of any captured enemy supplies. Once the raiding","rect":[89.98001098632813,187.51190185546876,522.0134181976318,178.40371704101563]},{"page":146,"text":"force crosses its LD, only limited, emergency aerial resupply of critical supplies and medical evacuation are","rect":[89.98001098632813,199.034912109375,521.9269075469971,189.92672729492188]},{"page":146,"text":"feasible because of the absence of a secure LOC. Units must thoroughly plan for aerial resupply of a raiding","rect":[89.9800033569336,210.497802734375,522.0120754241943,201.38961791992188]},{"page":146,"text":"force since it entails greater risk than normal operations.","rect":[89.9800033569336,222.02081298828126,315.2606153488159,212.91262817382813]},{"page":146,"text":"SPOILING ATTACK","rect":[72.0,245.39996337890626,164.566143989563,237.09597778320313]},{"page":146,"text":"5-147. A spoilingattack isa variation of an attack employed against an enemy preparing for an attack.","rect":[90.0,265.2542724609375,522.0032300949097,256.3064270019531]},{"page":146,"text":"The objective of a spoiling attack is to disrupt the enemy force’s offensive capabilities and timelines while","rect":[90.01001739501953,276.77728271484377,522.0092439727783,267.6590881347656]},{"page":146,"text":"destroying targeted enemy personnel and equipment. A spoiling attack is not to seize terrain or other physical","rect":[89.99996185302735,288.3002624511719,521.9759898147584,279.19207763671877]},{"page":146,"text":"objectives. Units perform spoiling attacks whenever possible during their performance of defensive tasks.","rect":[90.01000213623047,299.7632141113281,522.0191602706909,290.64501953125]},{"page":146,"text":"Spoiling attacks strike enemy forces while they are halted in assembly areas or attack positions, often when","rect":[90.01001739501953,311.2861633300781,522.0326442718506,302.177978515625]},{"page":146,"text":"they are preparing for their own offensive operations. A spoiling attack usually involves armored, attack","rect":[90.01001739501953,322.80914306640627,521.8898220062256,313.7009582519531]},{"page":146,"text":"helicopter, or fire support elements attacking enemy assembly positions in front of the main battle area.","rect":[90.01001739501953,334.27203369140627,521.9812574386597,325.1638488769531]},{"page":146,"text":"Figure 5-11 depicts a spoiling attack.","rect":[90.01001739501953,345.7950439453125,238.31806468963624,336.6868591308594]},{"page":146,"text":"5-148.","rect":[90.010009765625,361.26593017578127,115.85158824920655,354.3821716308594]},{"page":146,"text":"","rect":[115.19999694824219,374.0654602050781,121.16105696249008,369.3731994628906]},{"page":146,"text":"","rect":[115.19999694824219,387.5654602050781,121.16105696249008,382.8731994628906]},{"page":146,"text":"","rect":[115.19999694824219,412.52545166015627,121.16105696249008,407.83319091796877]},{"page":146,"text":"","rect":[115.19999694824219,426.02545166015627,121.16105696249008,421.33319091796877]},{"page":146,"text":"Units conduct spoiling attacks to—","rect":[124.55897521972656,363.30999755859377,265.740779876709,354.2018127441406]},{"page":146,"text":"Disrupt the enemy force’s offensive preparations.","rect":[133.1999969482422,376.7943115234375,331.4246778488159,367.6861267089844]},{"page":146,"text":"Destroy key assets that the enemy force requires to attack, such as fire support systems, fuel and","rect":[133.1999969482422,390.2943115234375,521.9405422210693,381.1861267089844]},{"page":146,"text":"ammunition stocks, and bridging equipment.","rect":[133.1999969482422,401.7572021484375,312.1041212081909,392.6490173339844]},{"page":146,"text":"Gain additional time for defending forces to prepare their positions.","rect":[133.1999969482422,415.2543029785156,403.7221632003784,406.1461181640625]},{"page":146,"text":"Reduce the enemy force’s current advantage in the correlation of forces.","rect":[133.1999969482422,428.7543029785156,422.31707286834719,419.6461181640625]},{"page":146,"text":"5-28","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":146,"text":"Figure 5-11. Spoiling attack","rect":[231.95712280273438,719.8754272460938,362.02775477600098,710.4866943359375]},{"page":146,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":146,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":147,"text":"Attack","rect":[512.52001953125,44.55902099609375,539.958345703125,38.016021728515628]},{"page":147,"text":"5-149. Units can employ their reserves in spoiling attacks to throw the enemy’s offensive preparations off","rect":[108.0,83.51434326171875,540.0383813438416,74.40616607666016]},{"page":147,"text":"their timetable. In this case, commanders assume the risk of not having a reserve or designate other forces as","rect":[108.0,94.97723388671875,539.9948260765076,85.86905670166016]},{"page":147,"text":"their echelon reserve. The following considerations affect a spoiling attack:","rect":[108.0,106.500244140625,409.52085065460207,97.3920669555664]},{"page":147,"text":" Commanders may want to limit the size of the forces used in executing their spoiling attacks.","rect":[133.1999969482422,119.99432373046875,523.9078931808472,110.88614654541016]},{"page":147,"text":" Units do not conduct spoiling attacks if the loss or destruction of the friendly attacking force would","rect":[133.1999969482422,133.49432373046876,540.0620632171631,124.38614654541016]},{"page":147,"text":"jeopardize the defending force’s ability to accomplish the defensive mission.","rect":[151.1999969482422,145.017333984375,458.3300733566284,135.89913940429688]},{"page":147,"text":" The mobility of the force available for the spoiling attack should be equal to or greater than that","rect":[133.1999969482422,158.51434326171876,539.9728159866334,149.40615844726563]},{"page":147,"text":"of the targeted enemy force.","rect":[151.1999969482422,169.97723388671876,263.67849254608157,160.86904907226563]},{"page":147,"text":" Operations by artillery, aviation, or electromagnetic systems to prevent enemy elements not in","rect":[133.1999969482422,183.47430419921876,540.0341701507568,174.36611938476563]},{"page":147,"text":"contact from interfering with the spoiling attack are necessary to ensure the success of the","rect":[151.22003173828126,194.997314453125,540.1412630157471,185.88912963867188]},{"page":147,"text":"operation.","rect":[151.22003173828126,206.44017028808595,191.52448558807374,197.35202026367188]},{"page":147,"text":"5-150. There are two conditions that must be met to conduct a successful spoiling attack:","rect":[108.0238037109375,223.98516845703126,470.0171275100708,214.87698364257813]},{"page":147,"text":" The spoiling attack’s objective must be obtainable before theenemy force can respond to the attack","rect":[133.1999969482422,237.47430419921876,539.9729518890381,228.35610961914063]},{"page":147,"text":"in a synchronized and coordinated manner.","rect":[151.19998168945313,248.997314453125,323.37160778045657,239.88912963867188]},{"page":147,"text":" Commanders must prevent the overextension of forces conducting their spoiling attacks.","rect":[133.1999969482422,262.49432373046877,505.25567150115969,253.38613891601563]},{"page":147,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":147,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":147,"text":"5-29","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":148,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":149,"text":"Chapter 6","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":149,"text":"Exploitation","rect":[269.2200012207031,153.91989135742188,360.8463867835999,139.3096466064453]},{"page":149,"text":"An exploitation takes full advantage of offensive success. Commanders at all echelons","rect":[126.0,188.7806854248047,504.1052652320862,178.79986572265626]},{"page":149,"text":"exploit successful offensive actions. Exploiting success at every opportunity denies an","rect":[126.0,201.4405975341797,503.98560523986819,191.45977783203126]},{"page":149,"text":"enemy force time to reconstitute an effective defense by shifting forces or by regaining","rect":[126.0,214.10057067871095,504.03479957580569,204.1197509765625]},{"page":149,"text":"the ","rect":[126.0,225.0,142.18890857696534,216.7796630859375]},{"page":149,"text":"initiative ","rect":[148.98553466796876,225.0,190.8588457107544,216.7796630859375]},{"page":149,"text":"through ","rect":[197.65545654296876,226.76048278808595,234.72064685821534,216.7796630859375]},{"page":149,"text":"a ","rect":[241.4557647705078,225.0,249.06491565704347,218.0]},{"page":149,"text":"counterattack. ","rect":[255.8615264892578,225.0,320.66766834259036,216.7796630859375]},{"page":149,"text":"This ","rect":[327.162353515625,225.0,349.4682664871216,216.7796630859375]},{"page":149,"text":"chapter ","rect":[356.264892578125,226.738525390625,391.4184923171997,216.7796630859375]},{"page":149,"text":"discusses ","rect":[398.2151184082031,225.0,441.8891954421997,216.7796630859375]},{"page":149,"text":"the ","rect":[448.68585205078127,225.0,464.8747606277466,216.7796630859375]},{"page":149,"text":"general","rect":[471.6714172363281,226.76048278808595,504.0734359664917,216.7796630859375]},{"page":149,"text":"considerations, organization of forces, control measures, planning and preparation","rect":[126.0,239.4204559326172,503.98755836486819,229.43963623046876]},{"page":149,"text":"considerations, and execution considerations for an exploitation. All units, regardless","rect":[126.0,252.0803680419922,503.9645486793518,242.09954833984376]},{"page":149,"text":"of their size, conduct exploitations.","rect":[126.0,264.6634521484375,280.6104784011841,254.70458984375]},{"page":149,"text":"GENERAL CONSIDERATIONS FOR AN EXPLOITATION","rect":[90.0,290.0096740722656,459.4452747573853,280.321533203125]},{"page":149,"text":"6-1. An exploitation is a type of offensive operation following a successful attack to disorganize the enemy","rect":[108.0,310.3143005371094,540.0324611663818,301.20611572265627]},{"page":149,"text":"in depth. Exploitation reinforces disorganization and confusion in the enemy’s command and control (C2)","rect":[107.99999237060547,321.8373107910156,539.9682519493103,312.7291259765625]},{"page":149,"text":"systems. The enemy force’s tactical defeat reduces its ability to react and adds confusion in the enemy’s C2","rect":[108.0,333.36029052734377,540.0762844085693,324.2521057128906]},{"page":149,"text":"structure. Units conduct exploitations to take advantage of this reduction in enemy capabilities to make","rect":[107.98999786376953,344.82318115234377,540.0313997344971,335.7149963378906]},{"page":149,"text":"permanent what would be only a temporary tactical effect.","rect":[107.98998260498047,356.34619140625,341.4899854660034,347.2380065917969]},{"page":149,"text":"6-2. A unit conducts an exploitation when it capitalizes on tactical opportunities created while","rect":[107.98998260498047,373.8511047363281,540.0574007110596,364.7629699707031]},{"page":149,"text":"accomplishing successful offensive operations. A unit exploits to maintain or increase their successes by","rect":[107.98998260498047,385.33404541015627,540.0123805999756,376.225830078125]},{"page":149,"text":"preventing enemy forces from reconstituting an effective defense or to recover from the initial attack.","rect":[107.9800033569336,396.8570556640625,539.9121046066284,387.7488708496094]},{"page":149,"text":"Whenever possible, the lead attacking unit transitions directly to the exploitation after accomplishing its","rect":[107.98998260498047,408.3199157714844,539.9571673851013,399.21173095703127]},{"page":149,"text":"mission. If this is not feasible, units pass additional forces into the lead. They act quickly to capitalize on","rect":[107.98998260498047,419.8429260253906,539.9319362640381,410.7347412109375]},{"page":149,"text":"these successes. Although exploitations may appear insignificant, their cumulative effects can be decisive.","rect":[107.9800033569336,431.3659362792969,539.9320631027222,422.25775146484377]},{"page":149,"text":"Subordinate commanders, working within their higher echelon commander’s intent, use their initiative to","rect":[107.9799575805664,442.82879638671877,539.8820705413818,433.7206115722656]},{"page":149,"text":"launch exploitations. Units inform their higher headquarters when initiating exploitations. This prevents","rect":[107.97994995117188,454.351806640625,539.9597918968201,445.2436218261719]},{"page":149,"text":"disruption of the higher echelon’s battle and allows the higher echelon headquarters to assess the possibility","rect":[107.97994995117188,465.87481689453127,540.0020046234131,456.7666320800781]},{"page":149,"text":"of the enemy forces fleeing. This would lead to the initiation of pursuit operations.","rect":[107.96991729736328,477.3376770019531,438.25799083709719,468.2294921875]},{"page":149,"text":"ORGANIZATION OF FORCES FOR AN EXPLOITATION","rect":[90.0,500.6880187988281,342.96772861480715,492.3960266113281]},{"page":149,"text":"6-3. The forces conducting an attack are also the forces that initially exploit that attack’s success—","rect":[108.0,520.6142578125,539.9922904968262,511.5060729980469]},{"page":149,"text":"reconnaissance and security, main body, and reserve. Typically, commanders do not assign a subordinate","rect":[107.99002075195313,532.1373291015625,540.0444612579346,523.0291748046875]},{"page":149,"text":"unit the mission of exploitation before starting a movement to contact or attack. Units reorganize internally","rect":[107.99002075195313,543.6001586914063,539.8821315765381,534.4920043945313]},{"page":149,"text":"to reflect the specific mission variables when an opportunity to exploit success occurs. Units request any","rect":[107.99002075195313,555.1231689453125,540.0644435882568,546.0150146484375]},{"page":149,"text":"required additional resources to support the exploitation from the appropriate headquarters. Additional","rect":[107.99002075195313,566.6261596679688,539.9518198928834,557.5380249023438]},{"page":149,"text":"resources may include assets that allow the exploiting force to identify and attack targets in depth. Resources","rect":[107.98999786376953,578.1090698242188,540.0620868186951,569.0009155273438]},{"page":149,"text":"may also include assets that have the capability to conceal or mislead the enemy of the actions of the","rect":[107.98998260498047,589.632080078125,539.9781770782471,580.52392578125]},{"page":149,"text":"exploiting force. Each exploitation force should be large enough to defend itself from enemy forces it expects","rect":[107.98997497558594,601.155029296875,539.9510028343201,592.046875]},{"page":149,"text":"to encounter. It should also be a reasonably self-sufficient combined arms force capable of operations beyond","rect":[107.98997497558594,612.617919921875,539.9750270843506,603.509765625]},{"page":149,"text":"the supporting range of the main body.","rect":[107.98999786376953,624.1409301757813,263.25396251678469,615.0327758789063]},{"page":149,"text":"6-4. Commanders should not expect those units that create the conditions for an exploitation to continue","rect":[107.98998260498047,641.6458740234375,539.8978548126221,632.5577392578125]},{"page":149,"text":"the exploitation in depth. If they plan to exploit with specific subordinate units, they specify the degree of","rect":[107.98997497558594,653.1287841796875,539.9637963829041,644.0206298828125]},{"page":149,"text":"damage or risk to those units that they are willing to accept during the operation. If the initial attacking units","rect":[107.98997497558594,664.6517944335938,539.9287250022888,655.5436401367188]},{"page":149,"text":"incur significant losses of combat power, commanders relieve them as soon as possible. Units continue the","rect":[107.98997497558594,676.1146850585938,540.0531282501221,667.0065307617188]},{"page":149,"text":"exploitation with a previously uncommitted force once the initial exploiting force’s combat power weakens","rect":[107.98997497558594,687.6376953125,540.0443866233826,678.529541015625]},{"page":149,"text":"because of fatigue, disorganization, attrition, or need to resupply. They also commit fresh forces when the","rect":[107.98994445800781,699.16064453125,540.0058870391846,690.052490234375]},{"page":149,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":149,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":149,"text":"6-1","rect":[508.9800109863281,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":150,"text":"Chapter 6","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":150,"text":"initial exploiting force needs to hold ground or resupply. The relieving force requires a high degree of tactical","rect":[90.0,83.51434326171875,522.0303721389771,74.40616607666016]},{"page":150,"text":"mobility so it can continue the exploitation.","rect":[90.0,94.97723388671875,264.16765880584719,85.86905670166016]},{"page":150,"text":"6-5. An exploitation may be more effective if units commit additional forces and assign them the task of","rect":[90.0100326538086,112.4921875,521.9341332969666,103.3840103149414]},{"page":150,"text":"follow and support or follow and assume. They assign follow and support missions to units designated to","rect":[90.0100326538086,124.01519775390625,522.0063381195068,114.90702056884766]},{"page":150,"text":"assist exploiting forces by relieving them of tasks that would slow their advances. The lead unit and any","rect":[90.0100326538086,135.47808837890626,522.0021266937256,126.36991119384766]},{"page":150,"text":"follow and assume or follow and support units exchange liaison teams to facilitate the transfer of","rect":[90.0100326538086,147.00103759765626,522.0034692344666,137.89285278320313]},{"page":150,"text":"responsibilities. Units designated to follow and assume conduct a forward passage of lines and replace the","rect":[90.0100326538086,158.5240478515625,521.9782381134033,149.41586303710938]},{"page":150,"text":"initial exploiting forces before they approach their culminating point. Normally, the next higher echelon","rect":[90.0100326538086,169.9869384765625,522.0150661468506,160.87875366210938]},{"page":150,"text":"commander retains control of the forces performing the task of follow and support or follow and assume.","rect":[90.0100326538086,181.50994873046876,521.9442701339722,172.40176391601563]},{"page":150,"text":"When possible, units assigned these tasks should possess mobility equal to that of the exploiting unit or","rect":[90.0100326538086,193.032958984375,522.0128686485291,183.92477416992188]},{"page":150,"text":"receive additional engineer and transportation assets to provide the necessary mobility. Once organized, they","rect":[90.0100326538086,204.495849609375,521.9934597015381,195.38766479492188]},{"page":150,"text":"are committed forces and receive artillery, air defense, engineer, and other functional and multifunctional","rect":[90.01000213623047,216.018798828125,521.9797739944459,206.91061401367188]},{"page":150,"text":"support and sustainment forces based on the mission variables. In an exploitation operation projected to","rect":[90.01001739501953,227.481689453125,521.9447536468506,218.36349487304688]},{"page":150,"text":"achieve significant depth, commanders may attach elements of a follow and support unit to the exploiting","rect":[90.01000213623047,239.00469970703126,521.8766384124756,229.89651489257813]},{"page":150,"text":"force to ensure unity of command and effort. Units retain only those reserves necessary to ensure flexibility","rect":[90.01001739501953,250.5277099609375,521.9830226898193,241.41952514648438]},{"page":150,"text":"of operation, continued momentum in the advance, and likely enemy responses to the exploitation.","rect":[90.01000213623047,261.9906005859375,484.3049268722534,252.88241577148438]},{"page":150,"text":"6-6. Since the force conducting an exploitation operation typically covers a wider front than an attacking","rect":[90.01001739501953,279.51556396484377,521.9419460296631,270.4073791503906]},{"page":150,"text":"force, fire support assets may find their supported elements operating outside normal supporting ranges. Fire","rect":[90.01000213623047,291.03857421875,522.0146761016846,281.9303894042969]},{"page":150,"text":"support assets must displace forward to ensure continued fire support on and beyond enemy formations, but","rect":[90.01000213623047,302.5014343261719,521.9810557327271,293.39324951171877]},{"page":150,"text":"this may impede the support to an exploiting force’s flank elements. Commanders typically establish a","rect":[90.01000213623047,314.0244445800781,522.0106477813721,304.916259765625]},{"page":150,"text":"command or support relationship between the exploiting force’s subordinate elements and fire support units","rect":[90.01000213623047,325.54742431640627,522.0594623069763,316.4392395019531]},{"page":150,"text":"(and other combat enablers) to provide the required support. Alternatively, they may move additional","rect":[89.99996185302735,337.01031494140627,522.0751109085084,327.9021301269531]},{"page":150,"text":"reinforcing fire support elements forward to ensure fires coverage.","rect":[89.99996185302735,348.5333251953125,355.74367809295657,339.4251403808594]},{"page":150,"text":"6-7. The joint air and missile defense coverage for the initial attack is likely to remain effective throughout","rect":[89.99996185302735,366.05828857421877,522.0904917678834,356.9400939941406]},{"page":150,"text":"an exploitation. However, this air and missile defense coverage may become less effective when tactical","rect":[89.99996185302735,377.52117919921877,522.0551524124146,368.4129943847656]},{"page":150,"text":"commanders accept risk and require these air and missile defense assets to cover more area as their forces","rect":[89.99996185302735,389.02410888671877,521.9644916038513,379.93597412109377]},{"page":150,"text":"advance. Commanders consider the risks with moving out of air and missile defense coverage. Units request","rect":[89.99996185302735,400.5671691894531,522.0240855178834,391.458984375]},{"page":150,"text":"adjustments in that coverage to conform to the unit’s tactical maneuvers.","rect":[89.99996185302735,412.030029296875,380.79238414764407,402.9118347167969]},{"page":150,"text":"6-8. An exploitation mission demands a force with a significant mobility advantage over enemy forces.","rect":[89.98992919921875,429.5550231933594,521.9411573410034,420.44683837890627]},{"page":150,"text":"This mobility advantage may favor forces with tracked or wheeled armored combat vehicles. Attack","rect":[89.98992919921875,441.0780334472656,521.9647121429443,431.96978759765627]},{"page":150,"text":"helicopters and air assault assets may constitute a portion of an exploiting force’s combat power. Dismounted","rect":[89.98999786376953,452.5409240722656,522.0262966156006,443.4327087402344]},{"page":150,"text":"infantry conducting a vertical envelopment are extremely useful in seizing key terrain such as defiles and","rect":[89.99996185302735,464.0639343261719,521.9206447601318,454.95574951171877]},{"page":150,"text":"crossing obstacles. They can also disrupt enemy transportation nodes along the exploiting force’s route of","rect":[89.99996185302735,475.5268249511719,522.0204370079041,466.41864013671877]},{"page":150,"text":"advance into and through the enemy force’s rear. Units integrate combat engineers into the exploiting force","rect":[89.98999786376953,487.0498046875,522.0625276641846,477.9416198730469]},{"page":150,"text":"to breach obstacles, keep ground forces maneuvering, and provide countermobility protection to the flanks.","rect":[89.9899673461914,498.57281494140627,521.9959058761597,489.4646301269531]},{"page":150,"text":"They also use engineers to maintain the force’s supply routes.","rect":[89.9899673461914,510.03570556640627,337.1733350753784,500.9275207519531]},{"page":150,"text":"Reconnaissance and Security Forces","rect":[72.0,534.5607299804688,242.19874057388305,524.7555541992188]},{"page":150,"text":"6-9. When units initiate an exploitation operation, the exact enemy situation may not be clear. They order","rect":[90.0,552.1143188476563,521.9260156211853,543.0061645507813]},{"page":150,"text":"one or more subordinates to conduct reconnaissance to gain and maintain enemy contact. Those forces","rect":[90.0,563.6373291015625,522.0951678733826,554.5291748046875]},{"page":150,"text":"conducting reconnaissance also provide a degree of security. Supporting collection assets, other information","rect":[90.0,575.1002197265625,521.9719142913818,565.9920654296875]},{"page":150,"text":"collection assets, and intelligence produced by adjacent, higher, and lower echelons complement their","rect":[90.0,586.6231689453125,521.9495751914978,577.5049438476563]},{"page":150,"text":"reconnaissance efforts. These assets assist units in maintaining a situational understanding of the strength,","rect":[90.0,598.0860595703125,522.0273389816284,588.9779052734375]},{"page":150,"text":"dispositions, capabilities, and intentions of all significant enemy elements within their areas of interest.","rect":[89.98994445800781,609.6090698242188,521.9511671066284,600.5009155273438]},{"page":150,"text":"Commanders normally emphasize reconnaissance more than security operations when conducting","rect":[89.98994445800781,621.132080078125,522.0441188812256,612.02392578125]},{"page":150,"text":"exploitation. Nevertheless, since forces exploiting success tend to move independently, the overall","rect":[89.98994445800781,632.594970703125,522.0222544631959,623.48681640625]},{"page":150,"text":"commander addresses the total force’s security requirements.","rect":[89.98994445800781,644.117919921875,334.59316539764407,635.009765625]},{"page":150,"text":"6-10. Units assign the appropriate security missions to appropriate subordinates in the same way they do for","rect":[89.98994445800781,661.6329345703125,522.0401513633728,652.5247802734375]},{"page":150,"text":"a movement to contact (discussed in Chapter 4). Exploiting commanders typically organize the forward most","rect":[89.98994445800781,673.0957641601563,522.0975108108521,663.9876098632813]},{"page":150,"text":"security element into a covering force to protect their main body’s movement and develop the situation before","rect":[89.9999771118164,684.6187744140625,522.0784578399658,675.5106201171875]},{"page":150,"text":"they commit their main body. These security elements respond directly to the overall commander.","rect":[89.9999771118164,696.1417846679688,481.8313856124878,687.0336303710938]},{"page":150,"text":"6-2","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":150,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":150,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":151,"text":"Exploitation","rect":[488.5199890136719,46.224021911621097,540.0369028320313,38.016021728515628]},{"page":151,"text":"6-11. If they are unable to resource a covering force for independent operations, exploiting units may use an","rect":[108.0,83.51434326171875,539.9783229827881,74.40616607666016]},{"page":151,"text":"advance guard in place of a covering force. This is typical for a BCT conducting exploitation on its own. In","rect":[108.0,94.97723388671875,540.0164089202881,85.86905670166016]},{"page":151,"text":"some cases when the higher echelon (corps or division) creates a covering force, a BCT subordinate to that","rect":[107.99002075195313,106.500244140625,540.0003428421021,97.3920669555664]},{"page":151,"text":"corps or division may still push out its own advance guard behind the covering force. This normally occurs","rect":[107.98001098632813,118.023193359375,539.9909808616638,108.9150161743164]},{"page":151,"text":"when subordinate exploiting units advance in multiple parallel columns.","rect":[107.98001098632813,129.486083984375,396.5661268234253,120.3779067993164]},{"page":151,"text":"Main Body","rect":[90.0,154.10069274902345,142.29883766174317,144.29554748535157]},{"page":151,"text":"6-12. The actions of the unit’s main body during the exploitation are the same as the actions during a","rect":[108.0,171.654296875,540.0444612579346,162.54611206054688]},{"page":151,"text":"movement to contact. See discussion beginning in paragraph 4-9 for more information on the actions for the","rect":[108.00000762939453,183.1171875,540.0393953399658,174.00900268554688]},{"page":151,"text":"main body during a movement to contact.","rect":[108.0000228881836,194.64019775390626,274.90322399139407,185.53201293945313]},{"page":151,"text":"Reserve","rect":[90.0,217.0427703857422,127.21999894714355,209.6312713623047]},{"page":151,"text":"6-13. The actions of the unit’s reserve during the exploitation are the same as the actions during a movement","rect":[108.0,236.7542724609375,540.0273203811646,227.64608764648438]},{"page":151,"text":"to contact. See discussion in paragraph 4-11 for more information on the actions for the reserve during a","rect":[107.99996185302735,248.27728271484376,540.0395174102783,239.16909790039063]},{"page":151,"text":"movement to contact.","rect":[107.98994445800781,257.7762451171875,194.37438488006593,251.69412231445313]},{"page":151,"text":"COMMON CONTROL MEASURES FOR AN EXPLOITATION","rect":[90.0,283.1880187988281,364.45530796051028,274.8960266113281]},{"page":151,"text":"6-14. Exploitation uses fewer control measures than many other operations because of the uncertain enemy","rect":[108.0,303.0542907714844,539.9742336273193,293.94610595703127]},{"page":151,"text":"situation and the need to provide subordinate commanders with the maximum flexibility to accomplish the","rect":[108.0,314.5773010253906,540.0593538360596,305.4691162109375]},{"page":151,"text":"mission. Figure 6-1 on page 6-4 depicts example control measures for an exploitation. Commanders can use","rect":[107.99996185302735,326.10028076171877,540.0533723907471,316.9920959472656]},{"page":151,"text":"a limit of advance instead of objectives. Planners develop control measures as part of the planning process.","rect":[107.98992919921875,337.56317138671877,539.9786329269409,328.4449768066406]},{"page":151,"text":"They issue these control measures as part of the attack order to facilitate the transition to exploitation.","rect":[107.98992919921875,349.086181640625,514.8832960128784,339.9779968261719]},{"page":151,"text":"6-15. A unit conducting exploitation normally operates in the same assigned area its higher commander","rect":[107.98992919921875,366.61114501953127,539.9471337852478,357.5029602050781]},{"page":151,"text":"assigned it for the attack. The exploiting unit assigns subordinate units their own assigned areas. Units may","rect":[107.96987915039063,378.07403564453127,539.9381008148193,368.9658508300781]},{"page":151,"text":"change boundaries between subordinate forces often to take advantage of opportunities. Since an exploiting","rect":[107.96987915039063,389.5970458984375,539.9405422210693,380.4888610839844]},{"page":151,"text":"unit deploys reconnaissance and security forces, units adjust boundaries as the exploiting force advances.","rect":[107.96990203857422,401.1200256347656,539.9069166183472,392.0018310546875]},{"page":151,"text":"They designate obstacle-restricted areas to prevent friendly obstacles from hindering the movement of the","rect":[107.96994018554688,412.5829162597656,540.0234651641846,403.4747314453125]},{"page":151,"text":"exploiting force. To enhance security, commanders designate obstacle zones or belts (depending on the","rect":[107.96994018554688,424.10589599609377,539.9558382110596,414.9977111816406]},{"page":151,"text":"echelon) on the flanks of the exploiting force’s mobility corridors. Units use phase lines and subsequent","rect":[107.96994018554688,435.62890625,540.0393443069459,426.5207214355469]},{"page":151,"text":"objectives to control the conduct of the exploitation. They use objectives to orient the movement of exploiting","rect":[107.95990753173828,447.091796875,540.0410060882568,437.9736022949219]},{"page":151,"text":"forces. Although exploitation may result in seizing terrain as an objective, it focuses primarily on completing","rect":[107.95990753173828,458.61480712890627,539.9377346038818,449.4966125488281]},{"page":151,"text":"the destruction of the enemy force. Commanders establish a limit of advance if they anticipate culmination","rect":[107.96990203857422,470.1377868652344,539.8790187835693,461.02960205078127]},{"page":151,"text":"or some other restriction influencing their operations, such as extending operations beyond supporting ranges","rect":[107.96994018554688,481.60064697265627,540.0304095726013,472.4924621582031]},{"page":151,"text":"and being unable to mitigate this risk.","rect":[107.96994018554688,493.1236572265625,258.7950391769409,484.0154724121094]},{"page":151,"text":"6-16. Units normally employ permissive FSCMs during exploitation. A coordinated fire line (CFL) ensures","rect":[107.96994018554688,510.5885009765625,539.9582049827576,501.4803161621094]},{"page":151,"text":"rapid response. Movement of the CFL is particularly important to provide adequate support as the force","rect":[107.95994567871094,522.1115112304688,539.9530305938721,513.0033569335938]},{"page":151,"text":"continues to advance. Even if commanders do not anticipate culminating, the establishment of a forward","rect":[107.95992279052735,533.634521484375,539.9473171234131,524.5263671875]},{"page":151,"text":"control measure is important to facilitate operations by a higher echelon headquarters beyond that control","rect":[107.95992279052735,545.097412109375,539.9428477249146,535.9892578125]},{"page":151,"text":"measure. Units can use additional control measures, such as target reference points and checkpoints, as","rect":[107.95992279052735,556.620361328125,540.0103900413513,547.51220703125]},{"page":151,"text":"required.","rect":[107.95994567871094,568.1233520507813,143.81952953338624,559.0352172851563]},{"page":151,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":151,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":151,"text":"6-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":152,"text":"Chapter 6","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":152,"text":"Figure 6-1. Example exploitation control measures","rect":[177.239990234375,343.6741943359375,416.7620687408447,334.3756408691406]},{"page":152,"text":"PLANNING AN EXPLOITATION","rect":[72.0,374.9096984863281,282.7386402359009,365.2215576171875]},{"page":152,"text":"6-17. The commander’s ability to deny enemy forces flexibility by anticipating enemy counteractions is","rect":[90.0,395.21429443359377,522.0233905296326,386.1061096191406]},{"page":152,"text":"critical to a successful exploitation. Commanders arrange operations to deny enemy forces the ability to","rect":[89.98999786376953,406.7373046875,522.0092678070068,397.6291198730469]},{"page":152,"text":"respond to attacks by disrupting the enemy’s decision cycles.","rect":[89.98998260498047,418.2602844238281,334.59926891326907,409.152099609375]},{"page":152,"text":"6-18. Exploitation planning begins during the preparation phase of all offensive actions. To avoid losing","rect":[89.98998260498047,435.7252197265625,521.9308376312256,426.6169738769531]},{"page":152,"text":"critical time during the transition from a movement to contact or an attack to an exploitation, commanders","rect":[89.98999786376953,447.2481689453125,522.0363910179138,438.1399841308594]},{"page":152,"text":"tentatively identify forces, objectives, and assigned areas for subordinate units before the mission begins.","rect":[89.9899673461914,458.7711486816406,522.0020704269409,449.6529541015625]},{"page":152,"text":"The defeat of enemy forces and the seizure of objectives deny the enemy forces routes of escape, resulting","rect":[89.9899673461914,470.2340393066406,521.9456081390381,461.1158447265625]},{"page":152,"text":"in the encirclement of selected enemy forces and the destruction of enemy C2 nodes and sustainment","rect":[89.9899673461914,481.7570495605469,522.0001597366334,472.64886474609377]},{"page":152,"text":"facilities. BCT and higher echelon commanders initiate an exploitation as a branch or a sequel to their existing","rect":[89.9899673461914,493.280029296875,522.0712795257568,484.1718444824219]},{"page":152,"text":"operations once they recognize that the opportunity to conduct an exploitation exists. Higher echelon","rect":[89.98997497558594,504.742919921875,522.0162258148193,495.6347351074219]},{"page":152,"text":"commanders may direct that lower tactical commanders immediately exploit the successes of their units.","rect":[89.9899673461914,516.2659301757813,508.21914196014407,507.1577453613281]},{"page":152,"text":"6-19. Commanders plan for decentralized execution during the conduct of an exploitation. The commander’s","rect":[89.9899673461914,533.7908935546875,522.0152118186951,524.6827392578125]},{"page":152,"text":"intent prepares subordinates to exercise initiative throughout the operation. Commanders state the purpose","rect":[89.9899673461914,545.2537841796875,522.0263338165283,536.1456298828125]},{"page":152,"text":"of the exploitation, which may be to force the retrograde of enemy forces from an area, encircle enemy forces","rect":[89.9899673461914,556.7767333984375,522.0907123069763,547.6685791015625]},{"page":152,"text":"so they cannot withdraw, expand a lane or gap, attack along a flank, or destroy enemy artillery and other fire","rect":[89.9899673461914,568.2997436523438,521.9572420196533,559.1915893554688]},{"page":152,"text":"support systems. The intent must describe the desired end state. That intent also determines the force’s main","rect":[89.99998474121094,579.7626342773438,522.0250759124756,570.6544799804688]},{"page":152,"text":"and supporting efforts.","rect":[89.99998474121094,591.28564453125,180.83129405975343,582.177490234375]},{"page":152,"text":"6-20. A clear commander’s intent provides subordinates with guidance on integrating their operations into","rect":[90.01000213623047,608.75048828125,522.0114040374756,599.642333984375]},{"page":152,"text":"the overall operations of the higher echelon headquarters. Subordinates seize all opportunities to damage","rect":[90.01000213623047,620.2734985351563,521.9828767852783,611.1653442382813]},{"page":152,"text":"enemy forces or accelerate the tempo of friendly operations. Commanders place few restrictions on","rect":[90.01000213623047,631.7965087890625,522.0245876312256,622.6883544921875]},{"page":152,"text":"subordinates. These restrictions may include clear instructions regarding the seizure of key terrain and the","rect":[90.01000213623047,643.2593383789063,521.9533357696533,634.1511840820313]},{"page":152,"text":"bypass criteria for enemy forces. Reliable, secure communications among the exploiting force, the follow","rect":[90.01000213623047,654.7823486328125,522.0273480453491,645.6741943359375]},{"page":152,"text":"and support force, and the commander facilitates coordination that maximizes the impact of the exploitation.","rect":[90.0100326538086,666.285400390625,522.1176710128784,657.197265625]},{"page":152,"text":"However, all subordinate commands use the higher commander’s intent to continue to the desired end state,","rect":[90.0100326538086,677.7682495117188,521.9913282394409,668.6600952148438]},{"page":152,"text":"even if they lose communications.","rect":[90.01005554199219,689.291259765625,226.9704236984253,680.18310546875]},{"page":152,"text":"6-21. During exploitation planning and execution, commanders balance the force conducting the","rect":[90.00003051757813,706.8062133789063,521.9591341094971,697.6980590820313]},{"page":152,"text":"exploitation’s need for speed and momentum against its need for security as it begins to move beyond","rect":[90.00003051757813,718.2691040039063,521.9445705413818,709.1609497070313]},{"page":152,"text":"6-4","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":152,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":152,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":153,"text":"Exploitation","rect":[488.5199890136719,46.224021911621097,540.0350717773438,38.016021728515628]},{"page":153,"text":"supporting range of the rest of the force. Generally, commanders prevent a force conducting an exploitation","rect":[108.0,83.51434326171875,540.0292263031006,74.40616607666016]},{"page":153,"text":"to move outside of supporting distance of the main body. Determining the supporting distance requires some","rect":[108.0,94.97723388671875,539.9475984649658,85.86905670166016]},{"page":153,"text":"knowledge of the enemy force’s remaining capabilities. Generally, units approach exploitation planning with","rect":[108.0,106.500244140625,539.9863796234131,97.3920669555664]},{"page":153,"text":"a sense of guarded optimism. It is an excellent opportunity to shatter enemy cohesion and exploit a position","rect":[107.99999237060547,118.023193359375,539.9642238616943,108.9150161743164]},{"page":153,"text":"of relative advantage over enemy forces. However, units cannot allow enemy forces to draw their exploiting","rect":[107.98998260498047,129.486083984375,540.0200710296631,120.3779067993164]},{"page":153,"text":"force into a salient where it is subject to defeat in detail by an enemy counterattack.","rect":[107.98998260498047,141.00909423828126,441.7569532394409,131.89089965820313]},{"page":153,"text":"6-22. An exploitation may take the form of a movement to contact ","rect":[108.0,158.5340576171875,406.00066661834719,149.42587280273438]},{"page":153,"text":"Commanders usually issue a series of fragmentary orders that designate—","rect":[107.98997497558594,169.9969482421875,404.93268966674807,160.88876342773438]},{"page":153,"text":" Movement formation.","rect":[133.1999969482422,181.4502716064453,239.02227306365968,174.36611938476563]},{"page":153,"text":" The unit positions.","rect":[133.1999969482422,196.9542694091797,225.94520092010499,187.86611938476563]},{"page":153,"text":" Required modifications to task organization.","rect":[133.1999969482422,210.47430419921876,329.26543712615969,201.36611938476563]},{"page":153,"text":" Bypass criteria.","rect":[133.1999969482422,223.97430419921876,213.4081678390503,214.86611938476563]},{"page":153,"text":" Revised or new control measures that assist with the maneuver.","rect":[133.1999969482422,235.4502716064453,405.0428419113159,228.36611938476563]},{"page":153,"text":"with ","rect":[408.8363037109375,157.0,429.0406141281128,149.42587280273438]},{"page":153,"text":"a ","rect":[431.8762512207031,157.0,438.8211317062378,151.0]},{"page":153,"text":"series ","rect":[441.6567687988281,157.0,466.90215587615969,149.42587280273438]},{"page":153,"text":"of ","rect":[469.67669677734377,157.0,480.5213575363159,149.43589782714845]},{"page":153,"text":"hasty ","rect":[483.2969055175781,158.5340576171875,506.92214488983157,149.42587280273438]},{"page":153,"text":"attacks.","rect":[509.7578125,157.0,540.0423536300659,149.42587280273438]},{"page":153,"text":"6-23. Forces conducting exploitation normally maneuver on a wide front and on at least two axes. The forces","rect":[107.9937515258789,254.9892578125,540.0149676780701,245.88107299804688]},{"page":153,"text":"on each axis are capable of independent action, depending on the mobility of the force, the road network, and","rect":[107.9937515258789,266.4521484375,540.0441799163818,257.3439636230469]},{"page":153,"text":"other aspects of the terrain. In some cases, rather than assigning subordinates their own assigned areas,","rect":[108.00376892089844,277.97515869140627,540.0461378097534,268.8669738769531]},{"page":153,"text":"commanders may designate a movement formation for the entire unit to concentrate all combat power against","rect":[108.00376892089844,289.4981384277344,540.1211924514771,280.38995361328127]},{"page":153,"text":"a specific enemy element. (See Chapter 2 for more information on movement formations.)","rect":[108.00376892089844,300.9610290527344,469.6065881309509,291.85284423828127]},{"page":153,"text":"6-24. The fire support plan includes allocating support for meeting engagements or hasty attacks that occur","rect":[108.01377868652344,318.48602294921877,539.9789941368103,309.3778381347656]},{"page":153,"text":"during the exploitation. The fire support coordinator plans targets beyond the projected locations of the","rect":[108.01376342773438,330.0090026855469,539.9928255157471,320.89080810546877]},{"page":153,"text":"exploiting maneuver forces to shield those forces from enemy counterattacks. The fire support coordinator","rect":[108.01376342773438,341.4718933105469,540.0010888633728,332.36370849609377]},{"page":153,"text":"then addresses how to provide fire support to the force in its movement to the LOA and targets locations","rect":[108.01376342773438,352.994873046875,540.1182391624451,343.8866882324219]},{"page":153,"text":"beyond the LOA to disrupt enemy LOCs.","rect":[108.01374816894531,364.51788330078127,273.8297071456909,355.4096984863281]},{"page":153,"text":"6-25. Units plan for fires displacement as an integral part of an exploitation. Indirect fire assets must displace","rect":[108.01374816894531,381.98272705078127,540.1051302032471,372.8745422363281]},{"page":153,"text":"at a faster pace than during normal offensive actions while maintaining the capability to provide accurate and","rect":[108.01374816894531,393.5057373046875,540.1101589202881,384.3975524902344]},{"page":153,"text":"lethal fires. Units plan on subordinate forces using less ammunition during an exploitation than in an attack","rect":[108.01374816894531,405.02874755859377,539.9832057952881,395.9205017089844]},{"page":153,"text":"because retrograding enemy forces are normally not in prepared positions. Units also consider requesting","rect":[108.01380157470703,416.49163818359377,540.0261745452881,407.3833923339844]},{"page":153,"text":"close air support in an exploitation, especially to support those forces moving beyond the supporting range","rect":[108.0037841796875,428.0146179199219,539.9443636016846,418.90643310546877]},{"page":153,"text":"of the main body. There may be an increase in risk if enemy forces retreat into an integrated air defense","rect":[108.0037841796875,439.53759765625,540.0002718048096,430.4294128417969]},{"page":153,"text":"network. Army aviation and joint aircraft can help identify and track high-payoff targets forward of the","rect":[107.9937973022461,451.00048828125,539.9779939727783,441.8822937011719]},{"page":153,"text":"exploiting force.","rect":[107.9937515258789,462.52349853515627,174.09768199920655,453.4153137207031]},{"page":153,"text":"6-26. Commanders anticipate the exploitation and ensure that the sustainment plan supports the force all the","rect":[107.9937515258789,479.96832275390627,539.9426546173096,470.88018798828127]},{"page":153,"text":"way to the LOA. Planning for sustainment in the exploitation includes designating—","rect":[107.9937515258789,491.5113525390625,447.4713554382324,482.4031677246094]},{"page":153,"text":" Future MSRs.","rect":[133.1999969482422,502.9402770996094,207.34907054901124,496.0164489746094]},{"page":153,"text":" Logistics release points.","rect":[133.1999969482422,518.4542846679688,247.6044569015503,509.3460998535156]},{"page":153,"text":" Maintenance collection points.","rect":[133.1999969482422,531.9342651367188,274.1814832687378,522.8461303710938]},{"page":153,"text":" Casualty collection points.","rect":[133.1999969482422,545.4542846679688,257.6274366378784,536.3461303710938]},{"page":153,"text":" Medical treatment facilities.","rect":[133.1999969482422,556.9302368164063,263.6284132003784,549.8461303710938]},{"page":153,"text":" Ambulance exchange points.","rect":[133.1999969482422,572.4542846679688,267.04522228240969,563.3461303710938]},{"page":153,"text":" Prisoner of war collection points.","rect":[133.1999969482422,585.9342651367188,284.26763439178469,576.8461303710938]},{"page":153,"text":"6-27. Functional and multifunctional sustainment arrangements must remain flexible during exploitation","rect":[107.9937515258789,603.479248046875,539.9479885101318,594.37109375]},{"page":153,"text":"operations. Units can attach functional and multifunctional sustainment units to exploiting maneuver forces.","rect":[107.9937515258789,614.942138671875,540.0380201339722,605.833984375]},{"page":153,"text":"This changes the normal support relationship between the two forces to a command relationship for the","rect":[107.9937515258789,626.4651489257813,540.0390291290283,617.3569946289063]},{"page":153,"text":"duration of the operation. Alternatively, supporting sustainment assets can follow an exploiting force in an","rect":[107.9937515258789,637.9881591796875,539.9077663421631,628.8800048828125]},{"page":153,"text":"echeloned manner along MSRs. Transportation and supplies to sustain the force become more complicated","rect":[107.9937515258789,649.4510498046875,539.9282741546631,640.3428955078125]},{"page":153,"text":"as an exploitation progresses. Sustainment units must accompany the force with enough fuel, spare parts,","rect":[107.9937515258789,660.9740600585938,540.0018262863159,651.8659057617188]},{"page":153,"text":"ammunition, and so on, to prevent culmination. Supply lines become a challenge during the exploitation as","rect":[107.9937515258789,672.4970703125,539.9976947288513,663.388916015625]},{"page":153,"text":"routes degrade and the conduct of route and convoy security can occur.","rect":[107.9937515258789,683.9598999023438,392.91567516326907,674.8517456054688]},{"page":153,"text":"6-28. In sustaining an exploitation, planners primarily focus on petroleum, oil, and lubricants consumption","rect":[107.98373413085938,701.4849243164063,539.9717311859131,692.3767700195313]},{"page":153,"text":"and vehicle maintenance. A significant factor is that an exploiting force tends to travel on a broad front,","rect":[107.98373413085938,713.0078735351563,539.9847364425659,703.8997192382813]},{"page":153,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":153,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":153,"text":"6-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":154,"text":"Chapter 6","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":154,"text":"which may necessitate designating one or more MSRs to handle the dispersion. Sustainment operators remain","rect":[90.0,83.51434326171875,522.0000514984131,74.40616607666016]},{"page":154,"text":"prepared to move their sustainment assets forward and move them more often than in an attack.","rect":[90.0,94.95719909667969,472.0666151046753,85.86905670166016]},{"page":154,"text":"6-29. Selecting a flexible MSR is critical because sustainment units must respond to changes in the direction","rect":[90.0,112.4921875,521.9858303070068,103.3840103149414]},{"page":154,"text":"of the exploitation. Engineers have responsibility for MSR maintenance. During planning, commanders","rect":[89.98999786376953,124.01519775390625,521.9772479515076,114.90702056884766]},{"page":154,"text":"address the control of sustainment unit positioning and convoys. The tactical commander calls supporting as","rect":[89.97994995117188,135.47808837890626,521.9728534202576,126.36991119384766]},{"page":154,"text":"well as organic sustainment units forward and redirects them as needed. Units may have to plan for guides","rect":[89.97994995117188,147.00103759765626,522.0383441429138,137.89285278320313]},{"page":154,"text":"to assist the movement of these sustainment assets around bypassed enemy positions and obstacles.","rect":[89.97994995117188,158.5240478515625,521.9017286300659,149.41586303710938]},{"page":154,"text":"Commanders may assign elements from the reserve to conduct support area security to help protect","rect":[89.97994995117188,169.9869384765625,522.0017466506959,160.87875366210938]},{"page":154,"text":"sustainment and other supporting elements or to secure their MSRs. They plan for controlling dislocated","rect":[89.97994995117188,181.50994873046876,521.9980373382568,172.40176391601563]},{"page":154,"text":"civilians on the battlefield so that their presence does not interfere with follow-on maneuver and support","rect":[89.97994995117188,193.01292419433595,521.9922862014771,183.92477416992188]},{"page":154,"text":"assets.","rect":[89.96991729736328,202.47181701660157,115.80749034881592,196.38967895507813]},{"page":154,"text":"6-30. Units plan situational obstacles for each phase of the operation. For example, commanders direct the","rect":[89.96991729736328,221.9907684326172,521.9931917266846,212.90261840820313]},{"page":154,"text":"emplacement of scatterable minefields to deny enemy counterattacking forces specific avenues of approach.","rect":[89.96992492675781,233.4736328125,521.9334669113159,224.36544799804688]},{"page":154,"text":"PREPARING AN EXPLOITATION","rect":[72.0,258.7496643066406,291.3000416030884,249.06153869628907]},{"page":154,"text":"6-31. The preparations for the conduct of an exploitation are the same as those for an attack. See paragraphs","rect":[90.0,279.0543212890625,522.0022723655701,269.9461364746094]},{"page":154,"text":"5-32 through 5-46 for additional information on preparing for an attack.","rect":[89.99996185302735,290.57733154296877,377.47780895233157,281.4691467285156]},{"page":154,"text":"EXECUTING AN EXPLOITATION","rect":[72.0,315.86968994140627,292.87139170074468,306.1815490722656]},{"page":154,"text":"6-32. An exploitation may be initiated through orders or when reaching prescribed objectives or phase lines.","rect":[90.0,336.17431640625,522.0442457199097,327.0561218261719]},{"page":154,"text":"Units weigh the risk when conducting exploitations for limited visibility, fatigue, inclement weather,","rect":[90.0,347.69732666015627,522.0432691574097,338.5891418457031]},{"page":154,"text":"fratricide, and the exhaustion from extended operations. An exploitation typically requires reconnaissance,","rect":[90.0,359.1601867675781,522.0303907394409,350.052001953125]},{"page":154,"text":"firepower, and maneuver of previously uncommitted units. Units support exploiting forces with tactical air","rect":[90.00003814697266,370.6831970214844,521.9481713829041,361.57501220703127]},{"page":154,"text":"support, attack aviation, artillery fires, and other fires assets. Units participating in an exploitation apply the","rect":[90.00003814697266,382.2062072753906,522.0644197540283,373.0980224609375]},{"page":154,"text":"doctrine, tactics, techniques, and procedures appropriate for a unit of their size conducting a movement to","rect":[90.00003814697266,393.6690673828125,521.9810085296631,384.5608825683594]},{"page":154,"text":"contact and an attack.","rect":[90.00003814697266,403.16802978515627,176.61992931365968,396.0838928222656]},{"page":154,"text":"6-33. To maintain sufficient forces to conduct exploitation, commanders ensure that subordinates focus on","rect":[90.00003814697266,422.6869812011719,521.9356594085693,413.5988464355469]},{"page":154,"text":"the commander’s intent. Subordinate commands should not dissipate their combat power by seeking minor","rect":[90.0,434.169921875,521.9351708946228,425.0617370605469]},{"page":154,"text":"tactical successes or becoming fixed by engaging enemy forces smaller than those in the bypass criteria. They","rect":[89.99999237060547,445.69293212890627,522.0599880218506,436.5847473144531]},{"page":154,"text":"strive to reach their assigned objective with the maximum possible strength as rapidly as possible.","rect":[89.99999237060547,457.2159118652344,481.92238903045657,448.09771728515627]},{"page":154,"text":"6-34. A transition from attack to exploitation may be hard to distinguish. An abrupt transition may occur","rect":[90.02002716064453,474.6807861328125,522.0152490196228,465.5726013183594]},{"page":154,"text":"when a force uses large numbers of precision munitions, achieves surprise, or overwhelms a much weaker","rect":[90.02002716064453,486.2037658691406,521.9425561485291,477.0955810546875]},{"page":154,"text":"enemy force. Normally, commanders order an exploitation after their force seizes or secures its objective.","rect":[90.02002716064453,497.6666564941406,522.0097608566284,488.5484619140625]},{"page":154,"text":"With adequate support, they can launch an exploitation with the initial assault or at any time after that,","rect":[90.02002716064453,509.18963623046877,521.9130201339722,500.0814514160156]},{"page":154,"text":"depending on the effects of the fires and their guidance.","rect":[90.02002716064453,520.712646484375,312.78264904022219,511.6044616699219]},{"page":154,"text":"6-35. Since an exploitation takes advantage of previous success, forces previously allocated to attack enemy","rect":[90.00999450683594,538.177490234375,522.0808010101318,529.0693359375]},{"page":154,"text":"forces normally continue their ongoing activities. These activities include—","rect":[90.00999450683594,549.7005004882813,394.0869560241699,540.5923461914063]},{"page":154,"text":" Attrition or defeat of enemy reserves before their commitment.","rect":[115.19999694824219,563.154296875,385.06670665740969,554.046142578125]},{"page":154,"text":" Destruction of enemy countermobility assets before their employment on a friendly axis of","rect":[115.19999694824219,576.654296875,522.0851953086853,567.546142578125]},{"page":154,"text":"advance for the exploiting force.","rect":[133.1999969482422,588.1773071289063,263.4399366378784,579.0691528320313]},{"page":154,"text":" Disruption of enemy units attempting to reestablish a coherent defense.","rect":[115.19999694824219,601.67431640625,418.12188243865969,592.566162109375]},{"page":154,"text":" Disruption of enemy sustaining operations.","rect":[115.19999694824219,615.17431640625,305.7424268722534,606.066162109375]},{"page":154,"text":"An exploitation assumes units have timely, relevant, and accurate intelligence to target these enemy actions.","rect":[90.00376892089844,629.6331787109375,521.9820508956909,620.5250244140625]},{"page":154,"text":"6-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":154,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":154,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":155,"text":"Exploitation","rect":[488.5199890136719,46.224021911621097,540.0350717773438,38.016021728515628]},{"page":155,"text":"6-36. Commanders can also initiate an exploitation when they realize that an enemy force is having difficulty","rect":[108.0,83.51434326171875,540.0000514984131,74.40616607666016]},{"page":155,"text":"maintaining its position or cohesion. Updated intelligence is crucial to commanders, since it is difficult to","rect":[108.0,94.97723388671875,539.9333400726318,85.86905670166016]},{"page":155,"text":"predict the exact conditions required to transition from an attack to exploitation. Therefore, commanders and","rect":[108.0,106.48020935058594,540.0422267913818,97.3920669555664]},{"page":155,"text":"subordinates watch the enemy force’s defenses for indications of disintegration that may signal the","rect":[108.0,118.023193359375,540.0585603790283,108.9150161743164]},{"page":155,"text":"opportunity to transition to exploitation. Indicators may include—","rect":[107.98997497558594,129.486083984375,372.4678764343262,120.3779067993164]},{"page":155,"text":" The threat or use of weapons of mass destruction by enemy forces.","rect":[133.1999969482422,142.97430419921876,418.41448497772219,133.86611938476563]},{"page":155,"text":" A flood of civilians on the attack axis.","rect":[133.1999969482422,154.4502716064453,303.9999952316284,147.36611938476563]},{"page":155,"text":" An increase in enemy reconnaissance.","rect":[133.1999969482422,169.97430419921876,303.6352186203003,160.86611938476563]},{"page":155,"text":" An increase in rearward movement, especially by fire support elements and reserves.","rect":[133.1999969482422,183.47430419921876,490.7750196456909,174.36611938476563]},{"page":155,"text":" Enemy preparation to demolish or destroy facilities, installations, equipment, and supply","rect":[133.1999969482422,196.97430419921876,539.9822292327881,187.86611938476563]},{"page":155,"text":"stockpiles.","rect":[151.1999969482422,208.47727966308595,193.7228651046753,199.38912963867188]},{"page":155,"text":" Various units intermix their vehicles and personnel in movement formations or march columns.","rect":[133.1999969482422,221.9742889404297,533.5631666183472,212.88613891601563]},{"page":155,"text":" Significant increases in the number of prisoners captured.","rect":[133.1999969482422,235.49432373046876,381.7623243331909,226.38613891601563]},{"page":155,"text":" A decrease in the intensity of enemy fire.","rect":[133.1999969482422,248.99432373046876,316.17922496795657,239.88613891601563]},{"page":155,"text":" Fires increasing in one or more portions of the line of contact that do not reflect the developing","rect":[133.1999969482422,262.49432373046877,539.9136257171631,253.38613891601563]},{"page":155,"text":"situation and occur at a time when the amount of defensive fires appears to be decreasing.","rect":[151.1999969482422,273.95721435546877,510.4632520675659,264.8490295410156]},{"page":155,"text":" A considerable decrease in an enemy force’s resistance.","rect":[133.1999969482422,287.45428466796877,374.38149547576907,278.3460998535156]},{"page":155,"text":" Disorganized enemy defenses.","rect":[133.1999969482422,300.95428466796877,273.1033582687378,291.8460998535156]},{"page":155,"text":" A significant increase in abandoned enemy war materiel.","rect":[133.1999969482422,314.45428466796877,378.87749767303469,305.3460998535156]},{"page":155,"text":" Reports confirming the capture or absence of enemy leaders.","rect":[133.1999969482422,327.95428466796877,394.12298107147219,318.8460998535156]},{"page":155,"text":" Friendly forces overrunning enemy artillery, C2 facilities, and supply points.","rect":[133.1999969482422,341.45428466796877,458.39113903045657,332.3460998535156]},{"page":155,"text":" Enemy units disintegrating and friendly companies and battalions defeating enemy battalion and","rect":[133.1999969482422,354.95428466796877,539.8736476898193,345.8460998535156]},{"page":155,"text":"brigade-sized units, respectively.","rect":[151.1999969482422,366.477294921875,282.88186168670657,357.3691101074219]},{"page":155,"text":"6-37. Commanders have two general methods to exploit battlefield success. The first method is to exploit","rect":[107.99375915527344,384.00225830078127,540.0708994827271,374.8940734863281]},{"page":155,"text":"with the forces that achieved the initial battlefield success. In this method, commanders expect those forces","rect":[108.00377655029297,395.4450988769531,539.9339740257263,386.3569641113281]},{"page":155,"text":"to exploit their own success. This is extremely common at low tactical echelons, such as at battalion echelons","rect":[107.99372863769531,406.9881591796875,540.0268695335388,397.8799743652344]},{"page":155,"text":"and below, at all points along the range of operations. Commanders select this method when an attacking","rect":[107.99372863769531,418.5111999511719,539.9249782562256,409.4029541015625]},{"page":155,"text":"unit has accomplished its mission with minimum loss, and it is the force most readily available to continue","rect":[107.9937973022461,429.9740295410156,539.9961214141846,420.8658447265625]},{"page":155,"text":"the advance. It may become necessary to reorganize and resupply these forces while they are still moving to","rect":[107.9937515258789,441.4970397949219,540.0850734710693,432.38885498046877]},{"page":155,"text":"maintain the momentum of the exploitation.","rect":[107.9937515258789,452.9999694824219,284.0782117843628,443.9118347167969]},{"page":155,"text":"6-38. The second method is to exploit with forces other than the unit that achieved the initial battlefield","rect":[107.9937515258789,470.46484375,539.9278469085693,461.376708984375]},{"page":155,"text":"success. This other force may be the echelon reserve or specifically designated follow and assume forces. In","rect":[107.9937515258789,482.00787353515627,539.9656276702881,472.8996887207031]},{"page":155,"text":"this method, this other force is committed by passing around, over, or through the forces that achieved the","rect":[107.9937973022461,493.47076416015627,539.8825960235596,484.3625793457031]},{"page":155,"text":"initial success. This method is generally indicated when the attacking echelon still has essential tasks to","rect":[107.9937515258789,504.9937744140625,540.0161037445068,495.8855895996094]},{"page":155,"text":"accomplish, is still actively engaged with enemy forces, or requires reorganization before it can continue the","rect":[107.99372863769531,516.5167846679688,540.0028352813721,507.4085998535156]},{"page":155,"text":"advance. This commonly occurs in exploitations by brigades and larger units.","rect":[107.99372863769531,527.9796142578125,417.9425001144409,518.8714599609375]},{"page":155,"text":"FIND THE ENEMY","rect":[90.0,551.292724609375,176.52793979644776,543.2160034179688]},{"page":155,"text":"6-39. When an offensive mission is accomplished, units at all echelons deploy their reconnaissance and","rect":[108.0,571.2542724609375,540.0634670257568,562.1461181640625]},{"page":155,"text":"security forces to discover whether the opportunity exists to initiate exploitation. This effort must start almost","rect":[108.00000762939453,582.7772827148438,539.9741587600709,573.6691284179688]},{"page":155,"text":"immediately after an attacking unit seizes its objective. These reconnaissance and security forces must gain","rect":[108.00000762939453,594.2401733398438,540.0031642913818,585.1219482421875]},{"page":155,"text":"and maintain enemy contact while remaining within the supporting range of their parent organization.","rect":[108.00000762939453,605.76318359375,540.0319776535034,596.655029296875]},{"page":155,"text":"Gaining and maintaining contact with enemy forces is critical since enemy forces may be trying to break","rect":[108.00000762939453,617.2861938476563,539.9202785491943,608.1780395507813]},{"page":155,"text":"contact or reorganize.","rect":[108.0,628.7490844726563,194.97861766815186,619.6409301757813]},{"page":155,"text":"6-40. The commander’s intent determines how much contact is required to maintain pressure on an enemy","rect":[107.98998260498047,646.2740478515625,539.9653835296631,637.1658935546875]},{"page":155,"text":"force, increase their disorganization, or seize key or decisive terrain. Units employ their reconnaissance assets","rect":[107.97996520996094,657.7970581054688,539.9857928733826,648.6889038085938]},{"page":155,"text":"to observe enemy force movements and search for weakly defended enemy positions. If those assets are not","rect":[107.97996520996094,669.2599487304688,540.0601572952271,660.1517944335938]},{"page":155,"text":"available, other maneuver units perform those reconnaissance tasks. While maintaining observation of enemy","rect":[107.97996520996094,680.782958984375,540.0330715179443,671.6748046875]},{"page":155,"text":"forces, the reconnaissance force tries to locate enemy reserves, uncommitted forces, and blocking positions.","rect":[107.97996520996094,692.305908203125,540.0065259933472,683.19775390625]},{"page":155,"text":"This effort helps the exploiting force avoid ambushes as the enemy force seeks to recover the initiative by","rect":[107.97996520996094,703.768798828125,539.8923244476318,694.66064453125]},{"page":155,"text":"counterattacking.","rect":[107.9800033569336,715.2918090820313,177.14101696014405,706.1836547851563]},{"page":155,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":155,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":155,"text":"6-7","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":156,"text":"Chapter 6","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":156,"text":"6-41. Units use aerial reconnaissance to augment ground reconnaissance. They employ aerial sensors, such","rect":[90.0,83.51434326171875,521.9617824554443,74.40616607666016]},{"page":156,"text":"as manned and unmanned aircraft systems, in advance of ground maneuver reconnaissance. This allows aerial","rect":[89.98999786376953,94.97723388671875,522.0288462600709,85.86905670166016]},{"page":156,"text":"observation of named and targeted areas of interest that facilitate their maneuver and cue the attack of targets.","rect":[89.98998260498047,106.500244140625,521.9898023605347,97.3920669555664]},{"page":156,"text":"Armed manned and unmanned aircraft can locate enemy positions and engage enemy forces to disrupt their","rect":[89.98998260498047,118.023193359375,521.9629418907166,108.9150161743164]},{"page":156,"text":"movement and preparations. Aerial assets maintain constant contact and pressure on the enemy.","rect":[89.98998260498047,129.486083984375,473.1811170578003,120.3779067993164]},{"page":156,"text":"6-42. A commander’s decision to exploit stems from the assumption that enemy forces have already been","rect":[89.98998260498047,147.0111083984375,521.9721584320068,137.90292358398438]},{"page":156,"text":"somewhat disrupted. Units use all available resources to maintain pressure and overwhelm enemy forces.","rect":[89.98998260498047,158.5340576171875,521.9352979660034,149.42587280273438]},{"page":156,"text":"Units combine the effects of operations against enemy reserves and uncommitted forces with the rapid","rect":[89.98998260498047,169.9969482421875,521.9929103851318,160.88876342773438]},{"page":156,"text":"maneuver of ground forces to maintain this disruption. When permissible, attack aviation elements can","rect":[89.98998260498047,181.51995849609376,522.0082912445068,172.41177368164063]},{"page":156,"text":"maneuver in front of or over exploiting ground maneuver forces to destroy targets. Units seek to integrate","rect":[89.98998260498047,193.04296875,522.0280428009033,183.93478393554688]},{"page":156,"text":"fixed-wing aircraft into the fires plan for attacking these targets. The exploiting force advances to keep the","rect":[89.98998260498047,204.505859375,521.9878206329346,195.39767456054688]},{"page":156,"text":"enemy force off balance and degrade enemy intelligence, surveillance, and reconnaissance capabilities. The","rect":[89.9800033569336,216.02886962890626,522.0494051055908,206.92068481445313]},{"page":156,"text":"exploiting force’s fire support system must deliver massed fires quickly to respond to any contingencies that","rect":[89.97997283935547,227.49169921875,521.9952769241334,218.38351440429688]},{"page":156,"text":"arise during the exploitation.","rect":[89.96995544433594,239.01470947265626,204.97454357147218,229.90652465820313]},{"page":156,"text":"FIX THE ENEMY","rect":[72.0,262.3327331542969,151.6239938735962,254.25601196289063]},{"page":156,"text":"6-43. As part of its shaping operations, an exploiting force has three goals in fixing an enemy force. First,","rect":[90.0,282.2943115234375,521.9891309738159,273.1861267089844]},{"page":156,"text":"fix enemy units in positions out of supporting distance of each other. This allows the exploiting force to","rect":[90.0,293.7572021484375,521.9495143890381,284.6490173339844]},{"page":156,"text":"defeat enemy forces in detail. Second, units attack out of contact enemy forces before they can affect the","rect":[90.0,305.2801818847656,522.0218782501221,296.1719970703125]},{"page":156,"text":"exploitation. By attacking these enemy forces, units seek to fix them in their current positions or force them","rect":[90.0,316.8031921386719,521.9889197311402,307.69500732421877]},{"page":156,"text":"to move to locations where they can be contained until the exploiting force, or a follow and support force can","rect":[90.0,328.2660827636719,522.0376491546631,319.15789794921877]},{"page":156,"text":"engage and defeat them. Third, it achieves a specific targeting effect—such as causing 15 percent casualties—","rect":[90.0,339.7890625,522.002269744873,330.6808776855469]},{"page":156,"text":"that disrupts the enemy commander’s plan.","rect":[90.0,351.31207275390627,262.2468214035034,342.2038879394531]},{"page":156,"text":"FINISH THE ENEMY","rect":[72.0,374.6622314453125,167.99940586090089,366.5760192871094]},{"page":156,"text":"6-44. The exploiting force maneuvers to maintain pressure on the enemy and to prevent their reorganization","rect":[90.0,394.5542907714844,522.0261135101318,385.44610595703127]},{"page":156,"text":"or escape. Units take advantage of any available vertical envelopment capabilities to accomplish these","rect":[90.0,406.0773010253906,522.0298128204346,396.9691162109375]},{"page":156,"text":"missions. The exploiting force clears only enough of its assigned area to permit its advance. It cuts through","rect":[90.0,417.6003112792969,522.0087795257568,408.4920959472656]},{"page":156,"text":"enemy logistics units and LOCs to seize objectives vital to the enemy force’s defense. It attacks from the","rect":[89.98999786376953,429.06317138671877,521.9765291290283,419.9449768066406]},{"page":156,"text":"march to overrun weak enemy formations. Exploiting forces can, based on the bypass criteria, contain and","rect":[89.98999786376953,440.586181640625,521.9790554046631,431.4779968261719]},{"page":156,"text":"bypass those enemy pockets of resistance too small to jeopardize the mission. Commanders report enemy","rect":[89.98998260498047,452.10919189453127,521.9228420257568,442.9909973144531]},{"page":156,"text":"forces to adjacent units, following units, and higher echelon headquarters.","rect":[89.98998260498047,463.5720520019531,385.4749402999878,454.453857421875]},{"page":156,"text":"6-45. If an enemy unit is too strong for the leading elements of the exploiting force to overrun and destroy,","rect":[89.98998260498047,481.0970458984375,522.0291090011597,471.9888610839844]},{"page":156,"text":"succeeding elements of the force conduct a hasty attack based on the combat information provided by its","rect":[89.98998260498047,492.5599060058594,521.8928973655701,483.45172119140627]},{"page":156,"text":"leading elements. In almost all cases, units use forms of maneuver other than the frontal attack, to produce","rect":[89.98998260498047,504.0829162597656,521.9221468048096,494.9747314453125]},{"page":156,"text":"faster and better results with fewer casualties. While the exploiting force is seeking one or more assailable","rect":[89.98998260498047,515.6058959960938,521.9415559844971,506.4977111816406]},{"page":156,"text":"flanks, available fire support systems continue to engage enemy forces to divert attention from the attempted","rect":[89.98999786376953,527.0687866210938,522.0193996429443,517.9606323242188]},{"page":156,"text":"envelopment and destroy as much enemy combat power as possible.","rect":[89.98998260498047,538.591796875,363.2174940109253,529.483642578125]},{"page":156,"text":"6-46. An exploiting force may face prepared belts of defensive positions in depth when it is exploiting the","rect":[89.98998260498047,556.1168212890625,521.9520540313721,547.0086669921875]},{"page":156,"text":"initial success of the attack. Therefore, the exploiting force must move to attack and destroy enemy defending","rect":[89.98998260498047,567.5796508789063,522.0364894866943,558.4714965820313]},{"page":156,"text":"forces before they can occupy subsequent or supplemental positions. The faster the exploiting force moves,","rect":[89.98998260498047,579.1026611328125,522.0300245285034,569.9945068359375]},{"page":156,"text":"the less likely it is that succeeding defensive lines will be fully prepared and the less effort it will take to","rect":[89.98998260498047,590.6256713867188,521.9573268890381,581.5175170898438]},{"page":156,"text":"penetrate each successive defensive position. The exploiting force attacks and maneuvers as many times as","rect":[89.98998260498047,602.0885009765625,521.9225604515076,592.9803466796875]},{"page":156,"text":"necessary until it breaks completely through the enemy force’s defenses.","rect":[89.98998260498047,613.6115112304688,380.4307508468628,604.5033569335938]},{"page":156,"text":"6-47. A commander’s primary concern when initiating an exploitation resulting from a successful attack is","rect":[89.97997283935547,631.136474609375,522.0233905296326,622.0283203125]},{"page":156,"text":"rapidly shifting the force into the appropriate task organization to take advantage of a window of opportunity.","rect":[89.97994995117188,642.599365234375,521.9999341964722,633.4912109375]},{"page":156,"text":"Commanders control their formation as it moves and prevent its overextension. They anticipate the enemy","rect":[89.97994995117188,654.1223754882813,521.9069118499756,645.0142211914063]},{"page":156,"text":"force’s reactions to friendly actions. The real danger to the exploiting force is not the immediate enemy force,","rect":[89.9800033569336,665.6453857421875,522.0512647628784,656.5372314453125]},{"page":156,"text":"but the enemy forces not yet engaged. Overextension is a risk inherent in exploitation. While commanders","rect":[89.9799575805664,677.1082763671875,521.9930560569763,668.0001220703125]},{"page":156,"text":"avoid overextension, they must also guard against being overcautious.","rect":[89.9799575805664,688.6312255859375,370.52492809295657,679.5230712890625]},{"page":156,"text":"6-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":156,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":156,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":157,"text":"Exploitation","rect":[488.5199890136719,46.224021911621097,540.0350717773438,38.016021728515628]},{"page":157,"text":"FOLLOW THROUGH","rect":[90.0,83.36216735839844,187.8546724319458,75.27597045898438]},{"page":157,"text":"6-48. Once the exploitation begins, friendly forces quickly move to attack enemy forces. The exploitation","rect":[108.0,103.3143310546875,539.9850368499756,94.2061538696289]},{"page":157,"text":"continues so enemy forces cannot escape. The exploiting force retains terrain only as necessary to accomplish","rect":[108.0,114.7772216796875,539.9346828460693,105.6690444946289]},{"page":157,"text":"its mission. Commanders are careful not to dissipate combat power to achieve minor tactical successes or to","rect":[108.0,126.28019714355469,540.0117702484131,117.19205474853516]},{"page":157,"text":"reduce small enemy forces. They shift operations to reconnaissance and surveillance, countermobility, and","rect":[108.0,137.8232421875,539.9850368499756,128.71505737304688]},{"page":157,"text":"protection tasks because of the possibility of an enemy counterattack once their exploiting forces reach their","rect":[108.0,149.28607177734376,539.9632470664978,140.17788696289063]},{"page":157,"text":"respective objectives.","rect":[108.0,160.80908203125,194.08181285858155,151.69088745117188]},{"page":157,"text":"6-49. During anexploitation, units often surround or bypass enemy forces. Surrender appeals and ultimatums","rect":[107.99999237060547,178.3341064453125,540.0453021507263,169.22592163085938]},{"page":157,"text":"are particularly effective when directed against surrounded, isolated, or bypassed enemy units. While the","rect":[107.98997497558594,189.79693603515626,539.9842805938721,180.68875122070313]},{"page":157,"text":"exploiting force conducts its operations, the follow and support force, if available—","rect":[107.9899673461914,201.3199462890625,443.8102836608887,192.21176147460938]},{"page":157,"text":" Widens or secures the flanks.","rect":[133.1999969482422,212.78028869628907,268.72561168670657,205.68612670898438]},{"page":157,"text":" Destroys bypassed enemy units.","rect":[133.1999969482422,228.2943115234375,279.52715587615969,219.18612670898438]},{"page":157,"text":" Relieves supported units that have halted to contain enemy forces.","rect":[133.1999969482422,241.7943115234375,416.1477003097534,232.68612670898438]},{"page":157,"text":" Blocks the movement of enemy reinforcements.","rect":[133.1999969482422,255.2943115234375,343.41961193084719,246.18612670898438]},{"page":157,"text":" Opens and secures LOCs.","rect":[133.1999969482422,268.7742614746094,254.56931591033936,259.6861267089844]},{"page":157,"text":" Guards prisoners, key areas, seized enemy bases and installations, and routes.","rect":[133.1999969482422,282.2943115234375,461.6297559738159,273.1861267089844]},{"page":157,"text":" Controls dislocated civilians.","rect":[133.1999969482422,293.7803039550781,267.6474561691284,286.6861267089844]},{"page":157,"text":" Secures key terrain.","rect":[133.1999969482422,309.2943115234375,230.38805675506593,300.1861267089844]},{"page":157,"text":" Secures potential threats (abandoned enemy equipment, weapons, ordnance, explosives, and toxic","rect":[133.1999969482422,322.7943115234375,540.0110750274658,313.6861267089844]},{"page":157,"text":"information materials including chemical, biological, radiological, and nuclear).","rect":[151.1999969482422,334.2572021484375,471.39910411834719,325.1490173339844]},{"page":157,"text":"6-50. At some point, units conducting exploitation either reach their culminating point or transition to a","rect":[108.00376892089844,351.78216552734377,539.9890413360596,342.6739807128906]},{"page":157,"text":"pursuit. Culmination can occur for various reasons, such as friendly losses or the enemy’s commitment of a","rect":[108.00376892089844,363.30517578125,540.0741853790283,354.1969909667969]},{"page":157,"text":"reserve. Units transition to another type of operation once they make an assessment that their force is","rect":[108.0037841796875,374.76806640625,540.0315692405701,365.6598815917969]},{"page":157,"text":"approaching culmination. For example, a pursuit enables units to complete the enemy force’s destruction.","rect":[108.0037841796875,386.2910461425781,530.1444044113159,377.182861328125]},{"page":157,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":157,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":157,"text":"6-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":158,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":159,"text":"Chapter 7","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":159,"text":"Pursuit","rect":[287.3999938964844,150.95619201660157,342.6001020469665,139.3096466064453]},{"page":159,"text":"This chapter discusses pursuit and its general considerations. It then discusses","rect":[126.0,188.7806854248047,504.04380282974247,178.79986572265626]},{"page":159,"text":"organization of forces, control measures, planning, and the execution of a pursuit.","rect":[126.0,201.4405975341797,485.38641834259036,191.45977783203126]},{"page":159,"text":"GENERAL CONSIDERATIONS FOR A PURSUIT","rect":[90.0,226.7696990966797,401.9091628684998,217.08155822753907]},{"page":159,"text":"7-1. A pursuit is a type of offensive operation to catch or cut off a disorganized hostile force attempting to","rect":[108.0,247.07427978515626,539.9702053070068,237.96609497070313]},{"page":159,"text":"escape, with the aim of destroying it. Pursuit operations begin when an enemy force loses internal cohesion","rect":[108.0,258.5972900390625,540.0295314788818,249.48910522460938]},{"page":159,"text":"and is unable to mount an organized defense. A pursuit leaves enemy forces trapped, unprepared, unable to","rect":[108.0,270.12030029296877,539.9849758148193,261.0121154785156]},{"page":159,"text":"defend, and faced with the options of surrender or destruction. Pursuits include the rapid shifting of units,","rect":[108.0,281.5831298828125,539.9651441574097,272.4749450683594]},{"page":159,"text":"continuous day and night movements, hasty attacks, containment of bypassed enemy forces, large numbers","rect":[108.0,293.1061706542969,540.0822894554138,283.99798583984377]},{"page":159,"text":"of prisoners, and a willingness to forgo some synchronization to maintain pressure on a fleeing enemy.","rect":[108.0,304.56903076171877,540.0924024581909,295.4608459472656]},{"page":159,"text":"Pursuits require swift maneuver and attacks by friendly forces to strike the enemy force’s most vulnerable","rect":[108.01002502441406,316.092041015625,540.0754671173096,306.9838562011719]},{"page":159,"text":"areas. A successful pursuit requires flexible forces, initiative by commanders at all echelons, and a high","rect":[108.01001739501953,327.61505126953127,540.0994777679443,318.5068664550781]},{"page":159,"text":"tempo during execution.","rect":[108.01001739501953,339.07794189453127,205.53570079803468,329.9697570800781]},{"page":159,"text":"7-2. A pursuit focuses on the complete destruction of fleeing enemy force. Attriting hostile forces on their","rect":[108.01001739501953,356.5928955078125,540.0422265586853,347.4847106933594]},{"page":159,"text":"LOCs does not effectively ensure the destruction of an enemy force. Units in a pursuit try to combine direct","rect":[108.0100326538086,368.1158752441406,539.9737315139771,359.0076904296875]},{"page":159,"text":"pressure against fleeing forces with an enveloping or encircling maneuver to prevent the enemy force from","rect":[108.01000213623047,379.5787658691406,540.0484290084839,370.4705810546875]},{"page":159,"text":"fleeing. This fixes the enemy force in positions where the enemy force can be defeated in detail. If it becomes","rect":[108.01001739501953,391.10174560546877,540.1479632835388,381.9935607910156]},{"page":159,"text":"apparent that enemy resistance has broken down entirely, and the enemy is fleeing the battlefield, any","rect":[108.01001739501953,402.624755859375,540.0036525726318,393.5165710449219]},{"page":159,"text":"offensive operation can transition to a pursuit.","rect":[108.01001739501953,414.0675964355469,292.14458751678469,404.9794616699219]},{"page":159,"text":"7-3. Conducting a pursuit requires a deliberate decision by a commander, as friendly forces face increased","rect":[108.02003479003906,431.60260009765627,540.0346584320068,422.4944152832031]},{"page":159,"text":"risk of becoming isolated and encircled by the enemy. Typically, corps and division commanders order","rect":[108.02003479003906,443.1256103515625,540.0494897422791,434.0174255371094]},{"page":159,"text":"subordinate units to conduct a pursuit. Once the pursuit begins, the subordinate unit maintains contact with","rect":[108.02002716064453,454.58843994140627,539.9357204437256,445.4802551269531]},{"page":159,"text":"the enemy forces and pursues fleeing enemy forces without further orders. The unit maintains the pursuit as","rect":[108.0199966430664,466.1114807128906,540.0090472679138,457.0032958984375]},{"page":159,"text":"long as the enemy force appears disorganized. The attacker risks becoming disorganized if they move too","rect":[108.0200424194336,477.63446044921877,539.9752712249756,468.5262756347656]},{"page":159,"text":"quickly. To sustain the pursuit, units must be prepared for increased physical and mental effort.","rect":[108.0199966430664,489.09735107421877,489.3019971847534,479.9891662597656]},{"page":159,"text":"7-4. Units must be aware of any approaching culmination points. Enemy forces are usually displacing back","rect":[108.0200424194336,506.6123046875,540.0703029632568,497.5041198730469]},{"page":159,"text":"to their supply bases, and potentially their own forces, while friendly forces become less effective as they","rect":[108.02003479003906,518.1353149414063,540.0204372406006,509.0271301269531]},{"page":159,"text":"expend resources faster than they can replace them. Reasons to stop a pursuit may include—","rect":[108.02002716064453,529.59814453125,478.1460990905762,520.489990234375]},{"page":159,"text":" The presence of reorganized enemy forces.","rect":[133.1999969482422,543.0543212890625,323.37661266326907,533.9461669921875]},{"page":159,"text":" Increased enemy resistance.","rect":[133.1999969482422,556.5543212890625,263.0793409347534,547.4461669921875]},{"page":159,"text":" Fatigue.","rect":[133.1999969482422,570.0543212890625,183.76600170135499,560.9461669921875]},{"page":159,"text":" A lack of supplies.","rect":[133.1999969482422,583.5343017578125,226.17466259002686,574.4461669921875]},{"page":159,"text":" Inability to secure flanks.","rect":[133.1999969482422,597.0543212890625,252.8228406906128,587.9461669921875]},{"page":159,"text":" A diversion of friendly units to security missions.","rect":[133.1999969482422,610.5543212890625,349.4847364425659,601.4461669921875]},{"page":159,"text":" The need to contain bypassed enemy units.","rect":[133.1999969482422,624.0543212890625,323.14324474334719,614.9461669921875]},{"page":159,"text":" Inability to maintain adequate contact with adjacent friendly units.","rect":[133.1999969482422,637.5543212890625,416.9240674972534,628.4360961914063]},{"page":159,"text":"The unit staff should develop a decision support template that depicts decision points, timelines associated","rect":[108.00376892089844,652.05322265625,539.9377346038818,642.965087890625]},{"page":159,"text":"with the movement of forces and the flow of the operation, and other relevant information before the unit","rect":[108.00376892089844,663.51611328125,539.9316172561646,654.427978515625]},{"page":159,"text":"reaches an unidentified culmination point.","rect":[108.00376892089844,675.0391235351563,276.58730602264407,665.9509887695313]},{"page":159,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":159,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":159,"text":"7-1","rect":[508.9800109863281,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":160,"text":"Chapter 7","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":160,"text":"ORGANIZATION OF FORCES FOR A PURSUIT","rect":[72.0,85.28965759277344,379.587934841156,75.60151672363281]},{"page":160,"text":"7-5. Normally, commanders do not organize specifically for pursuit operations ahead of time, although unit","rect":[90.0,105.59429931640625,522.0411143264771,96.48612213134766]},{"page":160,"text":"staffs may plan for a pursuit as a branch or sequel to the current order. Therefore, units must be flexible to","rect":[90.0,117.1173095703125,521.9109401702881,108.0091323852539]},{"page":160,"text":"react when the situation presents itself. A unit’s maneuver and sustainment forces continue their ongoing","rect":[90.0,128.5802001953125,522.0163478851318,119.4720230102539]},{"page":160,"text":"activities, while the commander readjusts priorities to better support the pursuit and ensures subordinate units","rect":[89.9999771118164,140.1031494140625,522.0915667991638,130.98495483398438]},{"page":160,"text":"are as self-sufficient as resources permit. Units request and acquire additional support from higher echelon","rect":[89.9999771118164,151.62615966796876,522.0123195648193,142.51797485351563]},{"page":160,"text":"headquarters based on the mission variables. For most pursuits, commanders assign subordinate forces","rect":[89.9999771118164,163.08905029296876,521.9840228538513,153.98086547851563]},{"page":160,"text":"security, direct pressure, encircling, follow and support, and reserve missions. The direct pressure force is a","rect":[89.9999771118164,174.612060546875,521.9742336273193,165.50387573242188]},{"page":160,"text":"force employed in a pursuit that orients on the enemy main body to prevent enemy disengagement or","rect":[90.00003814697266,186.13507080078126,521.9893465118408,177.1872100830078]},{"page":160,"text":"defensive reconstitution. The encircling force is the force that maneuvers to the rear or flank of the","rect":[90.0,197.59796142578126,522.0454378204346,188.6501007080078]},{"page":160,"text":"enemy to prevent the enemy’s escape. The enemy can be destroyed between the direct pressure force and","rect":[90.0,209.1209716796875,521.9591579437256,200.01278686523438]},{"page":160,"text":"encircling force. The encircling force advances or flies along routes parallel to the enemy’s line of retreat. If","rect":[89.9999771118164,220.58380126953126,522.0187280235291,211.47561645507813]},{"page":160,"text":"the encircling force cannot outdistance the enemy to cut the enemy off, the encircling force may also attack","rect":[89.9999771118164,232.1068115234375,521.9746608734131,222.99862670898438]},{"page":160,"text":"the flank of a retreating enemy. Given sufficient resources, units can assign more than one force the","rect":[89.9999771118164,243.62982177734376,521.9898347930908,234.52163696289063]},{"page":160,"text":"encirclement mission. The subordinate unit assigned the follow and support mission polices the battlefield to","rect":[90.0,255.09271240234376,521.9794826507568,245.98452758789063]},{"page":160,"text":"prevent the dissipation of the combat power of the unit assigned the direct pressure mission. The discussion","rect":[90.0,266.61572265625,521.9739284515381,257.5075378417969]},{"page":160,"text":"beginning in paragraph B-42 addresses the duties of a follow and support force. Reserves allow commanders","rect":[90.0,278.13873291015627,522.0564105491638,269.0304870605469]},{"page":160,"text":"to take advantage of unforeseen opportunities or respond to enemy counterattacks.","rect":[90.0,289.6015930175781,419.68215465545657,280.493408203125]},{"page":160,"text":"7-6. There are two variations of a pursuit; each involves assigning a subordinate the mission of maintaining","rect":[90.0,307.1165466308594,521.9973659515381,298.00836181640627]},{"page":160,"text":"direct pressure on the rearward moving enemy force. The first is a frontal pursuit that employs only direct","rect":[90.0,318.6395568847656,521.9449839553834,309.53131103515627]},{"page":160,"text":"pressure. The second is a combination that uses one subordinate element to maintain direct pressure and one","rect":[90.0,330.0823669433594,521.9917879180908,320.9942321777344]},{"page":160,"text":"or more other subordinate forces to encircling the retrograding enemy force. The combination pursuit is","rect":[90.0,341.62542724609377,521.9361712913513,332.5172424316406]},{"page":160,"text":"generally more effective. Either the subordinate applying direct pressure or the subordinate conducting the","rect":[90.00003814697266,353.1484375,521.9411287384033,344.0402526855469]},{"page":160,"text":"encirclement can be conducting the main effort in a combination pursuit.","rect":[90.0,364.6112976074219,381.27639293670657,355.50311279296877]},{"page":160,"text":"7-7. The force providing direct pressure must be strong enough to defeat enemy rear guard actions and","rect":[89.9899673461914,382.1262512207031,522.0042629241943,373.01806640625]},{"page":160,"text":"maintain pressure on the enemy’s main body. It forces the enemy force to deploy frequently in an attempt to","rect":[89.9899673461914,393.64923095703127,522.0234889984131,384.5410461425781]},{"page":160,"text":"delay the advance of the force applying direct pressure and restricts the enemy force’s ability to break contact.","rect":[89.98997497558594,405.11212158203127,521.9652662277222,396.0039367675781]},{"page":160,"text":"The force applying direct pressure must be as mobile as the enemy force. Armored and Stryker units are","rect":[89.98998260498047,416.6351013183594,521.9539461212158,407.52691650390627]},{"page":160,"text":"ideally suited to this role in open terrain, but commanders can employ dismounted infantry forces if the","rect":[89.98998260498047,428.15814208984377,522.0219392852783,419.0499572753906]},{"page":160,"text":"enemy force is also dismounted and the terrain prevents the use of more mobile forces.","rect":[89.98998260498047,439.62103271484377,437.49468517303469,430.5128479003906]},{"page":160,"text":"7-8. The encircling force’s mobility must be equal—preferably superior—to the withdrawing enemy force.","rect":[89.97994995117188,457.135986328125,521.9772901535034,448.0278015136719]},{"page":160,"text":"If there is no inherent mobility differential, units must create one. This differential can also result from the","rect":[89.97994995117188,468.598876953125,521.9922761993408,459.4906921386719]},{"page":160,"text":"force applying direct pressure to force the enemy force to deploy. Units can also enhance and sometimes","rect":[89.9800033569336,480.1218566894531,521.8574359397888,471.013671875]},{"page":160,"text":"create this mobility advantage by conducting countermobility operations against the enemy force, specifically","rect":[89.9799575805664,491.6448669433594,521.9869289398193,482.53668212890627]},{"page":160,"text":"targeting locations—including choke points or bridges—that hinder the fleeing enemy force’s withdrawal.","rect":[89.9799575805664,503.1077575683594,521.9611158370972,493.99957275390627]},{"page":160,"text":"Armored, air assault, and airborne forces are well suited for this encircling mission. Attack aviation elements","rect":[89.9800033569336,514.6307373046875,522.0693500022888,505.5225524902344]},{"page":160,"text":"are also effective when used as part of this encircling force.","rect":[89.9799575805664,526.1537475585938,327.9800672531128,517.0455932617188]},{"page":160,"text":"7-9. The encircling force must be strong enough to defend itself from the enemy force’s main body and","rect":[89.9799575805664,543.61865234375,521.9992580413818,534.510498046875]},{"page":160,"text":"slow or fix the enemy force until the friendly force applying direct pressure can combine with the encircling","rect":[89.97997283935547,555.1416015625,521.9573268890381,546.033447265625]},{"page":160,"text":"force to destroy the enemy force. It must be capable of mounting a hasty defense without placing itself at risk","rect":[89.9800033569336,566.6646118164063,521.9662990570068,557.5564575195313]},{"page":160,"text":"of defeat. The force conducting the encirclement must be self-contained, since it normally operates out of","rect":[89.9899673461914,578.1275024414063,522.0012719688416,569.0193481445313]},{"page":160,"text":"supporting range of friendly indirect fire systems. Therefore, it frequently has additional supporting artillery.","rect":[89.98994445800781,589.6505126953125,522.0491285324097,580.5423583984375]},{"page":160,"text":"7-10. The primary mission of this encircling force is to prevent the enemy force’s escape, but commanders","rect":[89.98994445800781,607.175537109375,522.0222918968201,598.0673828125]},{"page":160,"text":"can assign other missions to their forces conducting the encirclement. These other missions can include—","rect":[89.97993469238281,618.638427734375,513.395092010498,609.5302734375]},{"page":160,"text":" Detecting or identifying weapons of mass destruction and marking the site for sensitive site","rect":[115.19999694824219,632.0343017578125,521.9449739532471,622.9261474609375]},{"page":160,"text":"exploitation.","rect":[133.19998168945313,643.5372314453125,183.52443981170655,634.4490966796875]},{"page":160,"text":" Linking up with airborne or air assault forces in their airheads.","rect":[115.19999694824219,657.0543212890625,383.50774669647219,647.9461669921875]},{"page":160,"text":" Reporting terrain conditions and other combat information beyond what is normally addressed in","rect":[115.19999694824219,670.5543212890625,522.0159816741943,661.4461669921875]},{"page":160,"text":"the unit standard operating procedures.","rect":[133.1999969482422,682.0772705078125,289.0039930343628,672.9691162109375]},{"page":160,"text":"7-11. Direct pressure and encircling forces require engineer support to create lanes through obstacles, which","rect":[90.00377655029297,699.5421752929688,521.9814968109131,690.4340209960938]},{"page":160,"text":"enables them to move rapidly and continuously. Units should place combat engineers well forward in unit","rect":[90.00377655029297,711.065185546875,522.0387949905396,701.95703125]},{"page":160,"text":"7-2","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":160,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":160,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":161,"text":"Pursuit","rect":[508.97998046875,44.55902099609375,539.9966948242187,38.016021728515628]},{"page":161,"text":"movement formations to breach any unpassable obstacles quickly. Engineers accompanying the encircling","rect":[108.0,83.51434326171875,539.9402980804443,74.40616607666016]},{"page":161,"text":"force must also be prepared to conduct survivability tasks.","rect":[108.0,94.97723388671875,341.0231885910034,85.86905670166016]},{"page":161,"text":"FRONTAL PURSUIT","rect":[90.0,118.34220886230469,183.49913930892945,110.25601196289063]},{"page":161,"text":"7-12. In a frontal pursuit, units employ a single force to maintain direct pressure on the fleeing enemy along","rect":[108.0,138.2943115234375,540.0403347015381,129.18612670898438]},{"page":161,"text":"the same routes used by that enemy. Commanders choose this option in two situations. The first is when they","rect":[108.0,149.81732177734376,540.1011867523193,140.70913696289063]},{"page":161,"text":"cannot create a subordinate force with a sufficient mobility advantage to get behind a retrograding enemy","rect":[108.0,161.28021240234376,539.9728908538818,152.17202758789063]},{"page":161,"text":"force. The second is when they cannot provide enough resources to the force conducting the encirclement to","rect":[108.0,172.80322265625,539.9763698577881,163.69503784179688]},{"page":161,"text":"allow that force to survive and sustain itself until achieving linkup with the direct pressure force. Either","rect":[108.0,184.326171875,539.9372460899353,175.21798706054688]},{"page":161,"text":"situation can occur because of restrictive terrain or because an enemy force withdraws in a disciplined,","rect":[108.0,195.7890625,540.0444288253784,186.68087768554688]},{"page":161,"text":"cohesive formation and still has significant combat power. Figure 7-1 depicts a frontal pursuit.","rect":[108.0,207.31207275390626,485.98049449920657,198.20388793945313]},{"page":161,"text":"Figure 7-1. Frontal pursuit","rect":[253.0094451904297,509.2347412109375,376.95284057235718,499.9361877441406]},{"page":161,"text":"COMBINATION PURSUIT","rect":[90.0,538.5480346679688,208.6388487815857,530.2559814453125]},{"page":161,"text":"7-13. In the combination pursuit a direct pressure force and an encircling force work together to destroy the","rect":[108.0,558.4743041992188,540.0102815704346,549.3661499023438]},{"page":161,"text":"enemy. The direct pressure force normally conducts a series of attacks to slow the enemy force’s retirement","rect":[108.01001739501953,569.997314453125,540.0323862991334,560.88916015625]},{"page":161,"text":"by forcing the enemy force to stand and defend. In the combination pursuit, the force providing direct pressure","rect":[108.01001739501953,581.460205078125,540.1712923126221,572.35205078125]},{"page":161,"text":"initiates a frontal pursuit immediately on discovering the enemy force fleeing from the battlefield. This slows","rect":[108.01001739501953,592.983154296875,540.1607196311951,583.875]},{"page":161,"text":"the tempo of the enemy force’s withdrawal (or fixes the enemy force in its current position if possible) and","rect":[108.02003479003906,604.5061645507813,540.0010280609131,595.3980102539063]},{"page":161,"text":"may destroy the enemy’s rear security force. By maintaining constant pressure, the force providing direct","rect":[108.01001739501953,615.9690551757813,540.0213999710084,606.8609008789063]},{"page":161,"text":"pressure helps to maintain conditions necessary for the success of the force conducting the envelopment","rect":[108.0100326538086,627.4920654296875,540.0622324905396,618.3839111328125]},{"page":161,"text":"operation. This latter force advances or flies along routes parallel to the fleeing enemy force. If the encircling","rect":[108.0100326538086,639.0150146484375,539.9752712249756,629.9068603515625]},{"page":161,"text":"force cannot outdistance the enemy force to cut the enemy force off, the encircling force may also attack the","rect":[108.01001739501953,650.4779052734375,540.0740633087158,641.3697509765625]},{"page":161,"text":"flank of a fleeing enemy force. The force conducting the encircling operation conducts an envelopment or a","rect":[108.01001739501953,662.0009155273438,540.0751009063721,652.8927612304688]},{"page":161,"text":"turning movement to position itself where it can block the enemy force’s escape and trap the enemy force","rect":[108.01001739501953,673.52392578125,539.9810457305908,664.415771484375]},{"page":161,"text":"between the direct pressure force and the encircling force. Figure 7-2 on page 7-4 depicts a combination","rect":[108.01000213623047,684.98681640625,540.0163478851318,675.878662109375]},{"page":161,"text":"pursuit.","rect":[108.00003814697266,696.4898071289063,138.28448009490968,687.4016723632813]},{"page":161,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":161,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":161,"text":"7-3","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":162,"text":"Chapter 7","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":162,"text":"Figure 7-2. Combination pursuit","rect":[221.45999145507813,469.6741943359375,372.5856835899353,460.28546142578127]},{"page":162,"text":"CONTROL MEASURES FOR A PURSUIT","rect":[72.0,500.9096984863281,335.6557754173279,491.2355651855469]},{"page":162,"text":"7-14. Pursuit control measures should be flexible and allow adjustments to reflect changing conditions.Units","rect":[90.0,521.2142944335938,522.0273578147888,512.0960693359375]},{"page":162,"text":"use control measures in the pursuit to—","rect":[90.0,532.71728515625,249.47834396362306,523.629150390625]},{"page":162,"text":" Retain tactical options to converge on the most important axis or to redirect the pursuit effort on","rect":[115.19999694824219,546.2343139648438,521.9708766937256,537.1261596679688]},{"page":162,"text":"a new axis.","rect":[133.1999969482422,555.7332763671875,177.94732189178468,548.649169921875]},{"page":162,"text":" Provide subordinate units as much freedom of action as possible, consistent with security and","rect":[115.19999694824219,571.2542724609375,521.9958400726318,562.1461181640625]},{"page":162,"text":"maintenance of command integrity.","rect":[133.1999969482422,582.7171630859375,275.38384532928469,573.6090087890625]},{"page":162,"text":" Provide units the flexibility to engage enemy reserves or counterattack forces.","rect":[115.19999694824219,596.2142944335938,445.00347423553469,587.1061401367188]},{"page":162,"text":" Prevent fratricide.","rect":[115.19999694824219,607.6902465820313,205.42617321014405,600.6061401367188]},{"page":162,"text":"7-15. Commanders employ centralized planning and decentralized execution during a pursuit. They balance","rect":[90.00376892089844,627.229248046875,522.0643587188721,618.12109375]},{"page":162,"text":"the need to prevent fratricide and friendly fire incidents with the need to allow subordinates to take advantage","rect":[90.00376892089844,638.7522583007813,522.0920686798096,629.6441040039063]},{"page":162,"text":"of fleeting opportunities in a pursuit with rapidly moving forces and an evolving situation. Commanders","rect":[90.00376892089844,650.2151489257813,521.9900653343201,641.1069946289063]},{"page":162,"text":"designate assigned areas for each maneuver unit involved in the pursuit. During a pursuit, they establish few","rect":[90.00376892089844,661.7381591796875,522.0368084945678,652.6300048828125]},{"page":162,"text":"control measures for the direct pressure force other than phase lines, checkpoints, and some fire control","rect":[90.00376892089844,673.2411499023438,522.0171275100709,664.1530151367188]},{"page":162,"text":"measures such as a restrictive fire line. Units use phase lines to designate a forward and rearward boundary","rect":[90.00379943847656,684.7240600585938,521.9758205413818,675.6159057617188]},{"page":162,"text":"for the direct pressure force. The forward boundary relieves the direct pressure force of any responsibility","rect":[90.00379943847656,696.2470092773438,521.9183864593506,687.1388549804688]},{"page":162,"text":"beyond the forward boundary. It also gives the higher echelon headquarters flexibility to coordinate with the","rect":[90.00377655029297,707.77001953125,522.0738802032471,698.661865234375]},{"page":162,"text":"7-4","rect":[72.1199951171875,754.0800170898438,85.097994140625,747.6090087890625]},{"page":162,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":162,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":163,"text":"Pursuit","rect":[508.97998046875,44.55902099609375,539.9966948242187,38.016021728515628]},{"page":163,"text":"encircling force and address enemy elements located beyond that forward boundary. The rear boundary","rect":[108.0,83.51434326171875,540.0060939788818,74.40616607666016]},{"page":163,"text":"becomes the boundary between the direct pressure force and the follow and support force.","rect":[108.0,94.97723388671875,467.8022108078003,85.86905670166016]},{"page":163,"text":"7-16. If the encircling force is a ground element, the control measures are almost identical to those used","rect":[108.00003814697266,112.4921875,539.9637355804443,103.3840103149414]},{"page":163,"text":"during an envelopment, as shown in figure 7-3. Units designate routes, axis of advance, or assigned areas","rect":[107.9900131225586,124.01519775390625,539.9483172874451,114.90702056884766]},{"page":163,"text":"adjacent to that of direct pressure forces to allow the encircling force to move parallel to retrograding enemy","rect":[107.98002624511719,135.47808837890626,539.9559230804443,126.35989379882813]},{"page":163,"text":"forces and eventually move ahead of those enemy forces. Commanders can designate terrain objectives as","rect":[107.9800033569336,147.0010986328125,539.9246356468201,137.88290405273438]},{"page":163,"text":"guides for encircling forces. However, commanders may change these objectives rapidly and frequently,","rect":[107.9799575805664,158.5240478515625,539.9588575363159,149.40585327148438]},{"page":163,"text":"based on the progress of encircling forces and enemy actions. These objectives should be terrain features that","rect":[107.9799575805664,169.9869384765625,540.0127329788209,160.86874389648438]},{"page":163,"text":"provide encircling forces defensible terrain that enemy forces cannot easily bypass. Units often select choke","rect":[107.9799575805664,181.50994873046876,539.9890413360596,172.40176391601563]},{"page":163,"text":"points, such as defiles and bridges, as objectives for the encircling force.","rect":[107.9799575805664,193.032958984375,397.87563610076907,183.91476440429688]},{"page":163,"text":"Figure 7-3. Example pursuit control measures","rect":[206.31625366210938,509.35430908203127,423.63505458068848,500.0557556152344]},{"page":163,"text":"7-17. Units establish boundaries or RFLs between the forces conducting the encircling and direct pressure","rect":[107.96997833251953,532.8111572265625,540.0044221954346,523.7030029296875]},{"page":163,"text":"forces before those encircling forces reach their objectives. Other FSCMs should relieve encircling forces of","rect":[107.96997833251953,544.2740478515625,540.0634667930603,535.1558227539063]},{"page":163,"text":"unnecessary fire support coordination responsibilities. The overall commander directs security operations","rect":[107.96997833251953,555.7969970703125,539.9980609397888,546.6888427734375]},{"page":163,"text":"beyond those encircling forces, allowing them to engage retrograding enemy forces without devoting","rect":[107.96997833251953,567.320068359375,539.9418239593506,558.2119140625]},{"page":163,"text":"resources to flank and rear security. The overall commander establishes additional control measures to control","rect":[107.96990203857422,578.782958984375,540.0127329788209,569.6748046875]},{"page":163,"text":"the convergence of both elements of the friendly force, such as RFLs, phase lines, and contact points.","rect":[107.96994018554688,590.3059692382813,513.4392957687378,581.1978149414063]},{"page":163,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":163,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":163,"text":"7-5","rect":[508.97100830078127,754.1790161132813,521.9490073242188,747.7260131835938]},{"page":164,"text":"Chapter 7","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":164,"text":"PLANNING A PURSUIT","rect":[72.0,85.28965759277344,225.14109646224976,75.60151672363281]},{"page":164,"text":"7-18. Units anticipate an enemy fleeing from the battlefield as either a branch or a sequel to the plan. The","rect":[90.0,105.59429931640625,522.0122346954346,96.48612213134766]},{"page":164,"text":"plan identifies possible forces for security, direct pressure, encircling, follow and support, and reserve as well","rect":[90.0,117.1173095703125,522.0416636428834,108.0091323852539]},{"page":164,"text":"as issue an on-order or be-prepared mission to these forces. They should employ the maximum number of","rect":[90.0,128.5802001953125,521.9852197227478,119.4720230102539]},{"page":164,"text":"available maneuver forces in the pursuit. Units base the details of their plans on the enemy force’s anticipated","rect":[89.98998260498047,140.1031494140625,521.9561672210693,130.99496459960938]},{"page":164,"text":"actions, the formation of attacking troops, and the amount of planning time available. Commanders and staffs","rect":[89.97993469238281,151.62615966796876,521.9442889671326,142.51797485351563]},{"page":164,"text":"also consider—","rect":[89.97993469238281,161.0650177001953,152.50474166870118,153.98086547851563]},{"page":164,"text":"","rect":[115.19999694824219,173.84542846679688,121.16105696249008,169.15318298339845]},{"page":164,"text":"","rect":[115.19999694824219,187.34542846679688,121.16105696249008,182.65318298339845]},{"page":164,"text":"","rect":[115.19999694824219,200.84542846679688,121.16105696249008,196.15318298339845]},{"page":164,"text":"","rect":[115.19999694824219,214.34542846679688,121.16105696249008,209.65318298339845]},{"page":164,"text":"","rect":[115.19999694824219,227.84542846679688,121.16105696249008,223.15318298339845]},{"page":164,"text":"","rect":[115.19999694824219,241.34542846679688,121.16105696249008,236.65318298339845]},{"page":164,"text":"","rect":[115.19999694824219,254.84542846679688,121.16105696249008,250.15318298339845]},{"page":164,"text":"","rect":[115.19999694824219,268.3454284667969,121.16105696249008,263.6531677246094]},{"page":164,"text":"","rect":[115.19999694824219,281.845458984375,121.16105696249008,277.1531982421875]},{"page":164,"text":"Possible routes the enemy force might use to flee from the battlefield.","rect":[133.1999969482422,176.57427978515626,412.0557813644409,167.46609497070313]},{"page":164,"text":"Availability of information collection assets to detect enemy forces and acquire targets in depth.","rect":[133.1999969482422,190.07427978515626,517.5314893722534,180.96609497070313]},{"page":164,"text":"Scheme of movement and maneuver.","rect":[133.1999969482422,201.5602569580078,281.80364513397219,194.46609497070313]},{"page":164,"text":"Availability and condition of pursuit routes.","rect":[133.1999969482422,217.07427978515626,308.80251598358157,207.96609497070313]},{"page":164,"text":"Availability of forces to keep the pressure on the enemy force until its destruction is complete.","rect":[133.1999969482422,230.57427978515626,510.7645215988159,221.46609497070313]},{"page":164,"text":"Critical terrain features.","rect":[133.1999969482422,242.0602569580078,228.46819591522218,234.96609497070313]},{"page":164,"text":"Use of reconnaissance and security forces.","rect":[133.1999969482422,257.57427978515627,303.1581983566284,248.46609497070313]},{"page":164,"text":"Allocation of munitions and aviation support.","rect":[133.1999969482422,271.0542297363281,315.4648084640503,261.9660949707031]},{"page":164,"text":"Availability of functional and multifunctional support and sustainment resources.","rect":[133.1999969482422,284.5743103027344,458.43630504608157,275.46612548828127]},{"page":164,"text":"7-19. Pursuit planning addresses the possibility of defending temporarily during operational pauses while","rect":[90.00376892089844,302.09930419921877,522.0409212188721,292.9911193847656]},{"page":164,"text":"preparing to continue the pursuit or to consolidate gains. However, using an operational pause generally","rect":[90.00376892089844,313.5621643066406,522.0331325531006,304.4539794921875]},{"page":164,"text":"results in the abandonment of the pursuit because the enemy force is able to use that time to organize a","rect":[90.00376892089844,325.0851745605469,522.0248079376221,315.97698974609377]},{"page":164,"text":"coherent defense. The pursuit plan results in forces prepared to conduct wide-ranging operations using all","rect":[90.00376892089844,336.608154296875,521.9585337600709,327.4999694824219]},{"page":164,"text":"available maneuver assets throughout the assigned area to complete the destruction of the enemy force.","rect":[90.00379943847656,348.071044921875,502.3107557296753,338.9628601074219]},{"page":164,"text":"7-20. Units must address how to detect the enemy force from fleeing the battlefield. Otherwise, the enemy","rect":[90.01377868652344,365.5960388183594,521.9327907562256,356.48785400390627]},{"page":164,"text":"force may succeed in reorganizing and establish a hasty defense. Units look for indicators of an enemy","rect":[90.01377868652344,377.1190185546875,521.9623317718506,368.0108337402344]},{"page":164,"text":"fleeing, such as when the enemy force—","rect":[90.01380157470703,388.5819091796875,253.08929061889649,379.4737243652344]},{"page":164,"text":" Lacks the capability to maintain its current position or cohesion.","rect":[115.19999694824219,402.0542907714844,390.34405040740969,392.94610595703127]},{"page":164,"text":" Conducts limited local counterattacks.","rect":[115.19999694824219,413.540283203125,286.5480909347534,406.44610595703127]},{"page":164,"text":" Intensifies reconnaissance and intelligence efforts.","rect":[115.19999694824219,429.0542907714844,335.0849256515503,419.94610595703127]},{"page":164,"text":" Increases the amount of rearward movements and changes the type of elements conducting them,","rect":[115.19999694824219,442.5542907714844,521.9791212081909,433.44610595703127]},{"page":164,"text":"especially by fire support and reserves.","rect":[133.1999969482422,454.0773010253906,289.29751110076907,444.9691162109375]},{"page":164,"text":" Prepares facilities, installations, equipment, and supply stockpiles for demolition and destruction.","rect":[115.19999694824219,467.5743103027344,521.9879102706909,458.46612548828127]},{"page":164,"text":" Decreases fire in intensity and effectiveness through the assigned area.","rect":[115.19999694824219,481.0743103027344,415.9042921066284,471.96612548828127]},{"page":164,"text":" Increases fires in one or more individual portions of the front that do not relate to the developing","rect":[115.19999694824219,494.5743103027344,521.9731960296631,485.46612548828127]},{"page":164,"text":"situation, or when the amount of defensive fires seems to be decreasing.","rect":[133.1999969482422,506.0372009277344,421.17193126678469,496.92901611328127]},{"page":164,"text":"7-21. The presence or absence of any of these signs may not necessarily indicate the start of a retrograde","rect":[90.00377655029297,523.5521240234375,522.0214510040283,514.4439697265625]},{"page":164,"text":"operation. The enemy force could be attempting to draw friendly forces into an ambush or setting up a","rect":[90.00377655029297,535.0751342773438,521.9836702423096,525.9669799804688]},{"page":164,"text":"counterattack as part of its defense. When commanders initiate a pursuit, they often create the encircling","rect":[90.00377655029297,546.5380249023438,521.9824123382568,537.4298706054688]},{"page":164,"text":"force from uncommitted or reserve elements. Normally, these forces do not have allocated fire support assets.","rect":[90.00377655029297,558.06103515625,521.9623365402222,548.952880859375]},{"page":164,"text":"Units plan how to redistribute fire support assets to support the encircling forces. Attack helicopters and","rect":[90.00377655029297,569.5840454101563,522.0098171234131,560.4758911132813]},{"page":164,"text":"fixed-wing aircraft are well suited to support the encircling force.","rect":[90.00377655029297,581.046875,351.6450147628784,571.938720703125]},{"page":164,"text":"7-22. Engineer mobility and countermobility assets sustain the rate of advance and hinder the enemy force’s","rect":[90.0037841796875,598.5618896484375,522.0561664085388,589.4537353515625]},{"page":164,"text":"withdrawal. Engineers prepare the route of advance and support the lateral dispersion of units transitioning","rect":[89.9937973022461,610.0848999023438,521.9916896820068,600.9767456054688]},{"page":164,"text":"to the pursuit and the movement of the reserve. During the pursuit, units plan for engineers to provide assault","rect":[89.99375915527344,621.5477294921875,522.0197520217896,612.4395751953125]},{"page":164,"text":"bridging and emergency road repairs to sustain the tempo of the pursuit. Units also plan to use engineer assets","rect":[89.99375915527344,633.0707397460938,522.0208880882263,623.9625854492188]},{"page":164,"text":"to block any bypassed enemy force’s withdrawal routes by using antitank and command-operated mines,","rect":[89.99375915527344,644.59375,522.0290479660034,635.485595703125]},{"page":164,"text":"demolitions, and obstacles.","rect":[89.98370361328125,654.0325927734375,198.32898998260499,646.948486328125]},{"page":164,"text":"7-23. Sustainment units plan for increased demand for fuel and maintenance as the tempo of operations","rect":[89.98370361328125,673.5515747070313,522.0158832054138,664.4634399414063]},{"page":164,"text":"increases. In the pursuit, priority for sustainment normally goes to units having the greatest success.","rect":[89.98370361328125,685.0946044921875,521.9578809738159,675.9864501953125]},{"page":164,"text":"Sustainment planners need to anticipate success, since the depth of the pursuit depends on the capability of","rect":[89.98370361328125,696.5574340820313,521.9636132774353,687.4492797851563]},{"page":164,"text":"sustainment assets to support the operation. Units should plan to sustain as far forward as possible during the","rect":[89.98370361328125,708.0804443359375,521.9977693634033,698.9722900390625]},{"page":164,"text":"pursuit, including attaching bulk sustainment assets further down than normally considered. The sustainment","rect":[89.98370361328125,719.6034545898438,522.0309214553834,710.4953002929688]},{"page":164,"text":"7-6","rect":[72.1199951171875,754.1790161132813,85.097994140625,747.6090087890625]},{"page":164,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":164,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":165,"text":"Pursuit","rect":[508.97998046875,44.55902099609375,539.9966948242187,38.016021728515628]},{"page":165,"text":"elements supporting the pursuing force should be as mobile as possible. Sustainment planners support the","rect":[108.0,83.51434326171875,539.9919710235596,74.40616607666016]},{"page":165,"text":"pursuing force by coordinating items such as providing casualty evacuation over unsecured routes. Units may","rect":[108.0,94.97723388671875,540.0622463226318,85.86905670166016]},{"page":165,"text":"need aerial resupply or well secured convoys to support this force. Security for sustainment convoys and","rect":[108.0,106.500244140625,539.9973049163818,97.3920669555664]},{"page":165,"text":"lines of communications are major planning considerations. Units use all available sustainment assets to","rect":[107.98997497558594,118.023193359375,539.8767604827881,108.90499877929688]},{"page":165,"text":"provide essential support to the forces pursuing enemy forces. ","rect":[107.98997497558594,129.486083984375,358.53005504608157,120.3779067993164]},{"page":165,"text":"PREPARING A PURSUIT","rect":[90.0,154.7696990966797,251.72901760482788,145.08155822753907]},{"page":165,"text":"7-24. The considerations for preparing a pursuit are the same as an attack which is outlined in Chapter 5. See","rect":[108.0,175.07427978515626,540.0111970977783,165.96609497070313]},{"page":165,"text":"paragraphs 5-32 through 5-46 for additional information on preparing for a pursuit.","rect":[108.0,186.5972900390625,440.7381544113159,177.48910522460938]},{"page":165,"text":"EXECUTING A PURSUIT","rect":[90.0,211.8896942138672,253.28916775131226,202.20155334472657]},{"page":165,"text":"7-25. The purpose of a pursuit is to destroy the enemy forces while the enemy force is disorganized and","rect":[108.0,232.19427490234376,540.0073757171631,223.08609008789063]},{"page":165,"text":"fleeing from the battlefield. This generally occurs by trapping enemy forces between direct pressure forces","rect":[107.9899673461914,243.65716552734376,540.0052020530701,234.54898071289063]},{"page":165,"text":"and encircling forces or a major geographic barrier—such as an unfordable river—followed by the enemy","rect":[107.9899673461914,255.18017578125,539.9969387054443,246.06198120117188]},{"page":165,"text":"force’s destruction. Timeliness in deciding to initiate a pursuit is critical to its success. If the enemy force","rect":[108.0,266.703125,539.9621858673096,257.5949401855469]},{"page":165,"text":"begins to take flight undetected, it avoids the disruption that would come from the constant pressure resultant","rect":[108.0,278.166015625,540.1122202835084,269.0578308105469]},{"page":165,"text":"of a pursuit. Units should anticipate that enemy forces will flee at times of limited visibility.","rect":[108.0,289.68902587890627,476.03032970428469,280.5808410644531]},{"page":165,"text":"7-26. Units often conduct pursuits as a series of encirclements in which they intercept, isolate, and capture","rect":[108.0,307.2140197753906,539.9481477813721,298.1058349609375]},{"page":165,"text":"or destroy successive portions of a fleeing enemy force. Direct pressure forces conduct a series of hasty","rect":[107.98997497558594,318.6768798828125,539.9191799163818,309.5686950683594]},{"page":165,"text":"attacks to destroy any enemy forces executing security missions, maintain constant pressure on the enemy","rect":[107.98997497558594,330.19989013671877,539.9778957366943,321.0917053222656]},{"page":165,"text":"main body, and slow the rate at which enemy forces can flee. These forces fix, disrupt, and destroy enemy","rect":[107.98997497558594,341.722900390625,539.9236965179443,332.6147155761719]},{"page":165,"text":"elements, provided such actions do not interfere with their primary mission of maintaining constant pressure","rect":[107.98999786376953,353.185791015625,540.0520296173096,344.0776062011719]},{"page":165,"text":"on the enemy’s main body. To maintain tempo, the direct pressure force can pass off large enemy forces to","rect":[107.98998260498047,364.7087707519531,539.9622097015381,355.6005859375]},{"page":165,"text":"follow and support units, if the bypassed enemy forces do not pose a significant risk to the direct pressure","rect":[107.97996520996094,376.23175048828127,539.9542512969971,367.1235656738281]},{"page":165,"text":"force on the fleeing enemy.","rect":[107.97997283935547,387.69464111328127,217.70899486541749,378.5864562988281]},{"page":165,"text":"FIND THE ENEMY","rect":[90.0,411.0127258300781,176.52793979644776,402.9360046386719]},{"page":165,"text":"7-27. The echelon that discovers the enemy fleeing first acts to maintain contact with the enemy force across","rect":[108.0,430.97430419921877,540.0186297874451,421.8661193847656]},{"page":165,"text":"a wide area without waiting for orders from higher echelon headquarters. This ensures that the enemy force","rect":[108.0,442.497314453125,539.9921541290283,433.3891296386719]},{"page":165,"text":"does not consolidate and reorganize into a unit capable of mounting an organized defense. These forces in","rect":[108.0,453.9601745605469,539.9291896820068,444.85198974609377]},{"page":165,"text":"contact constitute the core of the direct pressure force. As the situation permits, they re-form into a movement","rect":[108.0,465.4831848144531,540.0250620803834,456.375]},{"page":165,"text":"column with reconnaissance and security elements in the lead and, if necessary, to the flank.","rect":[108.0,477.0061950683594,477.10479259490969,467.89801025390627]},{"page":165,"text":"7-28. During a pursuit, the intelligence effort is intensive. Information collection assets concentrate on all","rect":[108.0,494.4710388183594,540.0353159866334,485.36285400390627]},{"page":165,"text":"routes that enemy forces could use when conducting a retrograde operation. These assets report on the","rect":[107.98997497558594,505.9940490722656,539.9863557891846,496.8858642578125]},{"page":165,"text":"disposition of fleeing enemy forces and on the movement of the enemy reserves as the pursuit develops. The","rect":[107.98997497558594,517.4569091796875,540.0620393829346,508.3487243652344]},{"page":165,"text":"tactical situation during a pursuit may become obscure because of its depth. Much of the information needed","rect":[107.98997497558594,528.9799194335938,540.0365505218506,519.8717651367188]},{"page":165,"text":"during a pursuit concerns areas and activities beyond the fleeing enemy force. Therefore, the information","rect":[107.98997497558594,540.5029296875,539.9263210296631,531.394775390625]},{"page":165,"text":"provided by higher echelon information collection assets can give a commander an understanding of what is","rect":[107.98999786376953,551.9658203125,540.0501239280701,542.857666015625]},{"page":165,"text":"beyond the enemy force. However, commanders need to confirm this information with reconnaissance","rect":[107.98998260498047,563.48876953125,539.9239168243408,554.380615234375]},{"page":165,"text":"enablers. They can determine—","rect":[107.98998260498047,575.0117797851563,235.73496627807618,565.9036254882813]},{"page":165,"text":" The rearward movement of enemy sustainment forces.","rect":[133.1999969482422,588.4743041992188,369.2863721847534,579.3661499023438]},{"page":165,"text":" The composition of retrograding forces and their direction of movement.","rect":[133.1999969482422,601.9743041992188,442.3041944503784,592.8661499023438]},{"page":165,"text":" The composition and direction of movement of enemy reserves.","rect":[133.1999969482422,615.4743041992188,406.9636182785034,606.3661499023438]},{"page":165,"text":" The nature of obstacles and intermediate defensive positions.","rect":[133.1999969482422,628.9542846679688,395.6119337081909,619.8661499023438]},{"page":165,"text":"Information about uncommitted enemy reserves and prepared positions is vital when a pursuit force may be","rect":[107.9937515258789,643.4331665039063,540.1219759063721,634.3250122070313]},{"page":165,"text":"approaching a culminating point; it may be the basis for terminating the pursuit.","rect":[107.9937515258789,654.9561767578125,427.65288829803469,645.8480224609375]},{"page":165,"text":"FIX THE ENEMY","rect":[90.0,678.3126831054688,169.62414646148683,670.2359619140625]},{"page":165,"text":"7-29. Keeping enemy forces from reconstituting and reorganizing an effective defense is critical to success.","rect":[108.0,698.2742919921875,540.0267286300659,689.1661376953125]},{"page":165,"text":"Constant pressure by direct pressure forces and echelon fire support systems disrupts and weakens enemy","rect":[108.0,709.7371826171875,540.0213527679443,700.6290283203125]},{"page":165,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":165,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":165,"text":"7-7","rect":[508.97100830078127,754.0800170898438,521.9490073242188,747.7260131835938]},{"page":166,"text":"Chapter 7","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":166,"text":"forces during a pursuit. Units use fires to keep pressure on enemy forces. They do not allow enemy","rect":[90.0,83.51434326171875,522.0211086273193,74.40616607666016]},{"page":166,"text":"commanders to adjust their forces freely to counter friendly force actions. Indirect and joint fires harass and","rect":[90.0,94.97723388671875,522.0260524749756,85.85903930664063]},{"page":166,"text":"disrupt the enemy force’s attempts to move engaged forces to the rear or bring previously uncommitted forces","rect":[90.0,106.500244140625,521.9563739280701,97.3920669555664]},{"page":166,"text":"into action. In a pursuit, main efforts may include the ground maneuver of the direct pressure or the encircling","rect":[89.98997497558594,118.023193359375,522.0425319671631,108.9150161743164]},{"page":166,"text":"force. Fire support targets in a pursuit include fires on enemy columns and troop or vehicle concentrations.","rect":[89.98997497558594,129.486083984375,522.0209913253784,120.3779067993164]},{"page":166,"text":"Units may use fire support assets to repulse enemy counterattacks, destroy or delay enemy reserves, and","rect":[89.98997497558594,141.00909423828126,522.0327663421631,131.90090942382813]},{"page":166,"text":"destroy enemy fire support systems. They use all nonlethal and lethal effects at their disposal against the","rect":[89.98997497558594,152.5321044921875,521.9602327423096,143.42391967773438]},{"page":166,"text":"enemy force’s C2 system as an integral part of fixing the enemy while they concentrate on destroying or","rect":[89.98997497558594,163.9949951171875,522.0203149375916,154.88681030273438]},{"page":166,"text":"degrading the enemy force’s capability to reconstitute and synchronize an effective defense.","rect":[89.98998260498047,175.51800537109376,458.1810255050659,166.40982055664063]},{"page":166,"text":"7-30. Units fix fleeing enemy forces by pressuring enemy forces with maneuver or with nonlethal and lethal","rect":[89.99002075195313,193.04296875,522.0134043655396,183.93478393554688]},{"page":166,"text":"fires. Disruption of enemy C2 systems by direct pressure forces significantly degrades enemy force","rect":[89.99000549316406,204.505859375,521.9851961212158,195.39767456054688]},{"page":166,"text":"capabilities to counter friendly efforts. This makes the goal of fixing an enemy force much easier to","rect":[89.98999786376953,216.02886962890626,522.0071926116943,206.92068481445313]},{"page":166,"text":"accomplish.","rect":[89.98998260498047,227.47166442871095,138.0920057296753,218.38351440429688]},{"page":166,"text":"7-31. An enemy force attempts to use its reserves to reestablish the organization of its forces or facilitate the","rect":[89.98998260498047,245.0167236328125,521.9411897735596,235.90853881835938]},{"page":166,"text":"fleeing of enemy forces. Fixing enemy reserves is essential to the pursuit’s success and is normally the focus","rect":[89.98998260498047,256.5396728515625,521.9893329124451,247.43148803710938]},{"page":166,"text":"of echelon shaping operations. The direct pressure force fixes enemy reserves in place or slows them down","rect":[89.97994995117188,268.0025634765625,521.9652004241943,258.8943786621094]},{"page":166,"text":"so that they remain outside supporting distance until the destruction of the withdrawing enemy force.","rect":[89.97994995117188,279.52557373046877,494.1245069503784,270.4173889160156]},{"page":166,"text":"FINISH THE ENEMY","rect":[72.0,302.84222412109377,167.99940586090089,294.7560119628906]},{"page":166,"text":"7-32. The overall commander of the pursuit normally combines the actions of a subordinate conducting a","rect":[90.0,322.7943115234375,522.0624055938721,313.6861267089844]},{"page":166,"text":"frontal pursuit to provide direct pressure on the fleeing enemy force with the actions of a second subordinate","rect":[90.0,334.2572021484375,522.0721101837158,325.1490173339844]},{"page":166,"text":"attempting to encircle that same fleeing enemy. The force providing direct pressure advances in a column","rect":[90.0,345.7801818847656,521.9637355804443,336.6719970703125]},{"page":166,"text":"formation as quickly as possible. After a successful penetration of a defending enemy force, existing gaps","rect":[90.0,357.3031921386719,522.0094134788513,348.19500732421877]},{"page":166,"text":"among the different elements of the force and the direct pressure force often increase. To prevent the","rect":[90.0,368.7660827636719,521.9300813751221,359.65789794921877]},{"page":166,"text":"vulnerability of open flanks, the overall commander can deploy uncommitted elements with a reserve mission","rect":[90.0,380.2890625,521.9842433929443,371.1808776855469]},{"page":166,"text":"where they can respond to flank dangers. The overall commander does not expect a uniform rate of advance","rect":[90.0,391.81207275390627,522.1118440704346,382.7038879394531]},{"page":166,"text":"on all axes. Some columns may move rapidly while others may engage in penetrating the enemy force’s rear","rect":[90.0,403.27496337890627,522.0383203086853,394.1667785644531]},{"page":166,"text":"guard defensive positions or opposing enemy counterattacks.","rect":[89.99992370605469,414.7979431152344,334.12432384490969,405.68975830078127]},{"page":166,"text":"7-33. The actions of the force applying direct pressure should facilitate the commitment of another force","rect":[89.99992370605469,432.31292724609377,522.0245637969971,423.2047424316406]},{"page":166,"text":"moving parallel to the rearward moving enemy force in an attempt to encircle that enemy force. The depth","rect":[89.99992370605469,443.7757873535156,521.9290676116943,434.6676025390625]},{"page":166,"text":"of the pursuit depends on the size of the forces involved. The commander directing the initiation of a pursuit","rect":[90.0,455.2987976074219,522.0220103225709,446.19061279296877]},{"page":166,"text":"informs the higher echelon commander of this intention. This allows the higher echelon headquarters to avoid","rect":[90.0,466.76165771484377,522.0093288421631,457.6534729003906]},{"page":166,"text":"desynchronizing other operations and ensures the necessary resources are devoted to the unit conducting the","rect":[90.0,478.28466796875,522.0094270782471,469.1764831542969]},{"page":166,"text":"pursuit.","rect":[90.0,489.7876281738281,120.28444194793701,480.6994934082031]},{"page":166,"text":"7-34. The force providing direct pressure normally tasks its forward subordinate element to provide an","rect":[90.0,507.2725524902344,522.0050563812256,498.16436767578127]},{"page":166,"text":"advance guard to prevent enemy forces from ambushing its main body and to overrun or bypass small enemy","rect":[90.0,518.7955322265625,522.0294094085693,509.6873474121094]},{"page":166,"text":"forces. This advance guard moves on multiple routes. If it encounters enemy units beyond its capacity to","rect":[90.0,530.3185424804688,521.8637599945068,521.2103881835938]},{"page":166,"text":"defeat, it conducts actions on contact to develop the situation. The commander of the direct pressure force","rect":[90.0,541.7614135742188,522.0229768829346,532.6732788085938]},{"page":166,"text":"uses combat information from actions on contact to guide the main body to a position of advantage where it","rect":[90.0,553.304443359375,521.9668345413209,544.1962890625]},{"page":166,"text":"can seriously degrade or destroy the retrograding enemy force. The actions of the force providing direct","rect":[90.0,564.827392578125,521.9441904983521,555.71923828125]},{"page":166,"text":"pressure may or may not be in conjunction with the actions of any encircling force.","rect":[90.0,576.290283203125,422.43950939178469,567.1720581054688]},{"page":166,"text":"7-35. The overall pursuit commander does everything possible to place a friendly force behind a retrograding","rect":[89.98994445800781,593.8153076171875,522.0421047210693,584.7071533203125]},{"page":166,"text":"enemy force to trap the bulk of the enemy force between the encircling force and the force providing direct","rect":[89.98994445800781,605.3383178710938,521.9977183303834,596.2301635742188]},{"page":166,"text":"pressure. The force providing direct pressure maintains enough pressure on the retrograding enemy force so","rect":[89.98994445800781,616.8011474609375,522.0133571624756,607.6929931640625]},{"page":166,"text":"that the encircling force can envelop it. To envelop the enemy force, the direct pressure force must be strong","rect":[89.98994445800781,628.3241577148438,522.0217800140381,619.2160034179688]},{"page":166,"text":"enough to overcome any enemy rear guard before the enemy’s main body can complete its retrograde and","rect":[89.98994445800781,639.84716796875,521.9791164398193,630.739013671875]},{"page":166,"text":"reestablish a coherent defense. Once in position, the encircling force defends or attacks as necessary,","rect":[89.97993469238281,651.31005859375,522.0017652511597,642.201904296875]},{"page":166,"text":"responding to the enemy force’s actions and those of the force providing direct pressure, to complete the","rect":[89.97993469238281,662.8330688476563,521.9862337188721,653.7249145507813]},{"page":166,"text":"enemy force’s isolation.","rect":[89.97993469238281,674.3560791015625,186.3803358078003,665.2479248046875]},{"page":166,"text":"7-36. If the enemy force succeeds in reorganizing and forming a perimeter, the pursuing unit should encircle","rect":[89.96990966796875,691.8209228515625,522.0370760040283,682.7127685546875]},{"page":166,"text":"the enemy force. (See Appendix C for more information on encirclements.)","rect":[89.96990966796875,703.3439331054688,391.6220605430603,694.2357788085938]},{"page":166,"text":"7-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":166,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":166,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":167,"text":"Pursuit","rect":[508.97998046875,44.55902099609375,539.9966948242187,38.016021728515628]},{"page":167,"text":"FOLLOW THROUGH","rect":[90.0,83.36216735839844,187.8546724319458,75.27597045898438]},{"page":167,"text":"7-37. Once a commander initiates a pursuit, it continues until a higher echelon commander terminates the","rect":[108.0,103.3143310546875,540.1013460235596,94.2061538696289]},{"page":167,"text":"pursuit or their intent and end state are achieved. This typically occurs when one of the following conditions","rect":[108.0,114.7772216796875,540.0703875999451,105.6690444946289]},{"page":167,"text":"are met:","rect":[108.01001739501953,124.27619171142578,140.5549693069458,118.19405364990235]},{"page":167,"text":" The pursuing force destroys or captures the enemy force and resistance ceases.","rect":[133.1999969482422,139.7943115234375,466.05547618865969,130.68612670898438]},{"page":167,"text":" The pursuing force fixes the enemy force for follow-on forces.","rect":[133.1999969482422,153.2943115234375,401.6258497238159,144.18612670898438]},{"page":167,"text":" That commander makes an assessment that the pursuing force is close to a culminating point.","rect":[133.1999969482422,166.7943115234375,524.0220899581909,157.68612670898438]},{"page":167,"text":" The higher echelon cannot support a pursuing force.","rect":[133.1999969482422,180.2943115234375,360.0518751144409,171.18612670898438]},{"page":167,"text":"7-38. Units often transition from a pursuit into other types of offensive and defensive actions. If the enemy","rect":[108.00377655029297,197.80926513671876,540.0202541351318,188.70108032226563]},{"page":167,"text":"force attempts to reorganize, forces conducting a pursuit execute hasty attacks. They conduct an exploitation","rect":[107.99374389648438,209.27215576171876,540.0328884124756,200.16397094726563]},{"page":167,"text":"to capitalize on the success of these attacks and then move back into pursuit. Forces conducting a pursuit","rect":[107.99374389648438,220.795166015625,540.0602183303834,211.68698120117188]},{"page":167,"text":"may also transition into a defense if the pursuing force reaches a culminating point. This usually occurs when","rect":[107.98373413085938,232.258056640625,540.0432643890381,223.14987182617188]},{"page":167,"text":"the enemy force introduces strong reinforcements to prepare for a counteroffensive. The higher echelon","rect":[107.9937515258789,243.781005859375,539.9388332366943,234.67282104492188]},{"page":167,"text":"commander may transition to stability operations and begin consolidating gains if the pursuit successfully","rect":[107.9937515258789,255.30401611328126,540.0090847015381,246.19583129882813]},{"page":167,"text":"destroys the enemy force.","rect":[107.98375701904297,266.76690673828127,210.80498790740968,257.6587219238281]},{"page":167,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":167,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":167,"text":"7-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":168,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":169,"text":"PART THREE","rect":[276.6600036621094,127.260009765625,353.30398779296879,118.66800689697266]},{"page":169,"text":"Defensive Operations","rect":[217.32000732421876,160.32789611816407,412.7485821685791,142.75341796875]},{"page":169,"text":"Commanders use defensive operations to destroy enemy forces; to retain terrain,","rect":[108.0,185.2348175048828,521.984385673523,174.94656372070313]},{"page":169,"text":"resources, and population centers; and to regain the initiative. Part Three consists of","rect":[108.0,197.8947296142578,521.9448959274292,187.60647583007813]},{"page":169,"text":"four chapters that describe the fundamentals of the defense and the three types of","rect":[107.99996185302735,210.55470275878907,521.9525253219605,200.26644897460938]},{"page":169,"text":"defensive operations—area defense, mobile defense, and retrograde.","rect":[107.99996185302735,223.21461486816407,446.6823837203979,212.92636108398438]},{"page":169,"text":"Chapter 8","rect":[287.3399963378906,293.8320007324219,342.6731901855469,282.7440185546875]},{"page":169,"text":"The Defense","rect":[267.41998291015627,315.2362060546875,362.6012120513916,303.3974304199219]},{"page":169,"text":"Defensive actions are operations that create conditions for the offense that allow Army","rect":[126.0,353.0007019042969,504.01392555236819,343.0198974609375]},{"page":169,"text":"forces to regain the initiative. This chapter covers the purpose, characteristics, types,","rect":[125.99999237060547,365.7155456542969,503.9820909500122,355.7347412109375]},{"page":169,"text":"common control measures, common planning considerations, and transitions for the","rect":[125.9999771118164,378.3205871582031,504.0402504119873,368.33978271484377]},{"page":169,"text":"defense.","rect":[125.9999771118164,388.7625732421875,162.29767322540284,380.9997253417969]},{"page":169,"text":"PURPOSE OF THE DEFENSE","rect":[90.0,416.3096923828125,279.3717178001404,406.63555908203127]},{"page":169,"text":"8-1. While the offense is more decisive, the defense is usually stronger. However, the conduct of the defense","rect":[108.0,436.6142883300781,540.1774568634033,427.506103515625]},{"page":169,"text":"alone normally cannot determine the outcome of battles. The purpose of the defense is to create conditions","rect":[108.0,448.1372985839844,539.9414203147888,439.02911376953127]},{"page":169,"text":"for the offense that allow Army forces to regain the initiative. Other reasons for conducting the defense","rect":[108.0,459.6602783203125,540.0404329376221,450.5520935058594]},{"page":169,"text":"include—","rect":[108.0,469.09912109375,147.47880172729493,462.0149841308594]},{"page":169,"text":"","rect":[133.1999969482422,481.88543701171877,139.16105696249009,477.19317626953127]},{"page":169,"text":"","rect":[133.1999969482422,495.38543701171877,139.16105696249009,490.69317626953127]},{"page":169,"text":"","rect":[133.1999969482422,508.88543701171877,139.16105696249009,504.19317626953127]},{"page":169,"text":"","rect":[133.1999969482422,522.3853759765625,139.16105696249009,517.6931762695313]},{"page":169,"text":"Countering enemy action.","rect":[151.1999969482422,484.6142883300781,254.8659315109253,475.506103515625]},{"page":169,"text":"Retaining decisive terrain or denying a vital area to an enemy.","rect":[151.1999969482422,498.1142883300781,399.7050428390503,489.006103515625]},{"page":169,"text":"Attriting or fixing an enemy as a prelude to the offense.","rect":[151.1999969482422,511.6142883300781,373.6030225753784,502.506103515625]},{"page":169,"text":"Increasing an enemy’s vulnerability by forcing an enemy commander to concentrate subordinate","rect":[151.1999969482422,525.1142578125,539.9740877227783,516.006103515625]},{"page":169,"text":"forces.","rect":[151.18997192382813,534.61328125,178.17283153533936,527.5391845703125]},{"page":169,"text":"8-2. A defensive operation is an operation to defeat an enemy attack, gain time, economize forces, and","rect":[107.99374389648438,554.1021728515625,539.9811916351318,544.9940185546875]},{"page":169,"text":"develop conditions favorable for offensive or stability operations. The inherent strengths of the defense are","rect":[107.9937515258789,565.6251220703125,539.9731111602783,556.5169677734375]},{"page":169,"text":"the defender’s ability to occupy positions before an attack and use the available time to improve those","rect":[107.98373413085938,577.148193359375,540.1042757110596,568.0400390625]},{"page":169,"text":"defenses. A defending force stops improving its defensive preparations only when it retrogrades or begins to","rect":[107.98375701904297,588.6110229492188,540.0156764984131,579.5028686523438]},{"page":169,"text":"engage enemy forces. A defending force continuously takes opportunities afforded by lulls in action to","rect":[107.98375701904297,600.134033203125,540.0021877288818,591.02587890625]},{"page":169,"text":"improve its positions and repair combat damage during execution of the defense.","rect":[107.98377990722656,611.6570434570313,431.2490186691284,602.5488891601563]},{"page":169,"text":"8-3. A defending force does not wait passively to be attacked. A defending force aggressively seeks ways","rect":[107.99382781982422,629.1218872070313,540.0375506858826,620.0137329101563]},{"page":169,"text":"of attriting and weakening enemy forces before close combat begins. A defending force maneuvers to place","rect":[107.99382781982422,640.6448974609375,539.9380159454346,631.5367431640625]},{"page":169,"text":"enemy forces in a position of disadvantage and attacks those enemy forces at every opportunity. The static","rect":[107.99382781982422,652.1678466796875,539.8976717071533,643.0596923828125]},{"page":169,"text":"and mobile elements of a defense combine to deprive enemy forces of the initiative. A defending force","rect":[107.99382781982422,663.6307373046875,539.9767732696533,654.5225830078125]},{"page":169,"text":"contains enemy forces while seeking every opportunity to transition to the offense.","rect":[107.99382781982422,675.1537475585938,439.12087535858157,666.0455932617188]},{"page":169,"text":"8-4. Units can visualize their defensive assigned area using a main battle area (MBA), a security area,","rect":[108.00385284423828,692.6787719726563,539.9700880050659,683.5706176757813]},{"page":169,"text":"forward edge of the battle area (FEBA), the FLOT, and rear area. The main battle area is the area where","rect":[107.99382781982422,704.1416015625,539.9230012969971,695.033447265625]},{"page":169,"text":"the commander intends to deploy the bulk of their unit to defeat an attacking enemy. The security area","rect":[107.98381042480469,715.6646118164063,540.0149202423096,706.5564575195313]},{"page":169,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":169,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":169,"text":"8-1","rect":[508.9800109863281,754.18798828125,521.9580405273438,747.6090087890625]},{"page":170,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":170,"text":"is that area occupied by a unit’s security elements and includes the areas of influence of those security","rect":[90.0,83.51434326171875,521.9963283538818,74.40616607666016]},{"page":170,"text":"elements. The forward edge of the battle area is the foremost limits of a series of areas in which ground","rect":[90.0,94.97723388671875,521.9391384124756,85.86905670166016]},{"page":170,"text":"combat units are deployed to coordinate fire support, the positioning of forces, or the maneuver of units,","rect":[89.9899673461914,106.500244140625,522.0060377120972,97.3920669555664]},{"page":170,"text":"excluding areas in which covering or screening forces are operating (JP 3-09.3). The forward line of own","rect":[89.9899673461914,118.023193359375,522.0092678070068,108.9150161743164]},{"page":170,"text":"troops is a line that indicates the most forward positions of friendly forces in any kind of military operation","rect":[89.98994445800781,129.486083984375,522.0168361663818,120.3779067993164]},{"page":170,"text":"at a specific time. ","rect":[89.98994445800781,140.9890594482422,163.05579662322999,131.90090942382813]},{"page":170,"text":"Note. Throughout chapters 8 through 11, this publication will use the terms MBA, security area,","rect":[115.20026397705078,164.21429443359376,504.0130567550659,155.10610961914063]},{"page":170,"text":"forward edge of battle area, and FLOT as a visualization method of describing the assigned area","rect":[115.19999694824219,175.7342529296875,504.04830647277836,166.62606811523438]},{"page":170,"text":"for defending units.","rect":[115.18997955322266,187.25726318359376,193.83393383026124,178.14907836914063]},{"page":170,"text":"8-5. Units generally place their reserve where they can easily reinforce the main effort. However, the","rect":[90.0,219.47430419921876,521.9963045196533,210.36611938476563]},{"page":170,"text":"reserve may reinforce other priorities in the defense. Units use a reserve to—","rect":[90.0,230.997314453125,398.0449028015137,221.88912963867188]},{"page":170,"text":" Seize the initiative.","rect":[115.19999694824219,242.4803009033203,210.10451793670655,235.38613891601563]},{"page":170,"text":" Destroy enemy forces.","rect":[115.19999694824219,257.99432373046877,223.48020458221436,248.8961639404297]},{"page":170,"text":" Reinforce forces.","rect":[115.19999694824219,269.47027587890627,202.06145763397218,262.3861389160156]},{"page":170,"text":" Block enemy avenues of approach.","rect":[115.19999694824219,284.9942932128906,273.46502208709719,275.8861083984375]},{"page":170,"text":" Counterattack.","rect":[115.19999694824219,296.48028564453127,191.80398082733155,289.3861083984375]},{"page":170,"text":"CHARACTERISTICS OF THE DEFENSE","rect":[72.0,323.7897033691406,332.17890774154668,314.1155700683594]},{"page":170,"text":"8-6. Successful defenses share these characteristics:","rect":[90.0,342.0802917480469,304.0352244338989,334.9861145019531]},{"page":170,"text":" Disruption.","rect":[115.19999694824219,357.5742492675781,178.54448986053468,348.4861145019531]},{"page":170,"text":" Flexibility.","rect":[115.19999694824219,371.09429931640627,177.40522289276124,361.9861145019531]},{"page":170,"text":" Maneuver.","rect":[115.19999694824219,382.57025146484377,176.26294994354249,375.8067626953125]},{"page":170,"text":" Mass and concentration.","rect":[115.19999694824219,397.0,230.6815595626831,388.9861145019531]},{"page":170,"text":" Depth.","rect":[115.19999694824219,411.5742492675781,160.19387340545655,402.4861145019531]},{"page":170,"text":" Preparation.","rect":[115.19999694824219,425.0742492675781,181.84508800506593,415.9861145019531]},{"page":170,"text":" Security.","rect":[115.19999694824219,438.59429931640627,169.06458568572999,429.4861145019531]},{"page":170,"text":"See ADP 3-90 for more information on the characteristics of the","rect":[71.99783325195313,448.0431823730469,329.21725178527836,440.9490051269531]},{"page":170,"text":"defense.","rect":[331.67620849609377,449.0,364.7221632003784,440.9490051269531]},{"page":170,"text":"TYPES OF DEFENSIVE OPERATIONS","rect":[72.0,475.3497009277344,319.7535926361084,465.6755676269531]},{"page":170,"text":"8-7. There are three types of defensive operations:","rect":[90.0,495.654296875,297.86691999053957,486.5461120605469]},{"page":170,"text":" Area defense.","rect":[115.19999694824219,507.1302490234375,188.1987714767456,500.0461120605469]},{"page":170,"text":" Mobile defense.","rect":[115.19999694824219,520.6302490234375,197.62258434295655,513.546142578125]},{"page":170,"text":" Retrograde.","rect":[115.19999694824219,536.154296875,180.15772533416749,527.046142578125]},{"page":170,"text":"These three types of operations have significantly different concepts and present different problems. Units","rect":[89.9937515258789,550.6732788085938,521.9024798851013,541.5651245117188]},{"page":170,"text":"consider each independently when planning and executing the defense. Although the names of these types","rect":[89.9937515258789,562.1361694335938,521.9840228538513,553.0280151367188]},{"page":170,"text":"convey the overall aim of a selected operation, each type usually contains elements of the other and combines","rect":[89.9937515258789,573.6591796875,522.0636126976013,564.551025390625]},{"page":170,"text":"static and mobile elements. Table 8-1 depicts the symbols for an area defense and mobile defense. Table 8-2","rect":[89.9937515258789,585.18212890625,522.0261135101318,576.073974609375]},{"page":170,"text":"depicts the symbols for retrograde operations.","rect":[89.99378967285156,596.64501953125,273.3196973800659,587.536865234375]},{"page":170,"text":"8-2","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":170,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":170,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":171,"text":"Table 8-1. Defensive operations symbols","rect":[218.27999877929688,83.51416015625,411.7161397857666,74.12541961669922]},{"page":171,"text":"Table 8-2. Retrograde task symbols","rect":[230.82000732421876,266.8741455078125,399.23319911193848,257.5755920410156]},{"page":171,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":171,"text":"AREA DEFENSE","rect":[90.0,485.6622314453125,166.7071623802185,477.40802001953127]},{"page":171,"text":"8-8. An area defense is a type of defensive operation that concentrates on denying enemy forces access to","rect":[108.0,505.6142883300781,539.9423732757568,496.506103515625]},{"page":171,"text":"designated terrain for a specific time rather than destroying the enemy outright (ADP 3-90). The purpose of","rect":[107.9899673461914,517.0771484375,540.0183007774353,507.9689636230469]},{"page":171,"text":"an area defense is to retain the terrain where the bulk of the defending force positions itself in mutually","rect":[107.97989654541016,528.6001586914063,539.9371242523193,519.4920043945313]},{"page":171,"text":"supporting prepared positions. Units maintain their positions and control the terrain between these positions.","rect":[107.97989654541016,540.1231689453125,539.9618482589722,531.0150146484375]},{"page":171,"text":"The main effort focuses fires into engagement areas, possibly supplemented by a counterattack. Units at all","rect":[107.97989654541016,551.5860595703125,539.9421153030396,542.4779052734375]},{"page":171,"text":"echelons can conduct an area defense. They may use an area defense to transition to offensive operations,","rect":[107.97989654541016,563.1090698242188,539.9197950363159,554.0009155273438]},{"page":171,"text":"retrograde, or stability operations. The variations of an area defense are defense of linear obstacle, perimeter","rect":[107.97989654541016,574.5718994140625,539.8971459922791,565.4637451171875]},{"page":171,"text":"defense, and reverse slope defense. (See Chapter 9 for more information on area defense.)","rect":[107.98992919921875,586.0748901367188,467.85332275009156,576.9867553710938]},{"page":171,"text":"MOBILE DEFENSE","rect":[90.0,609.4421997070313,179.36647939682008,601.35595703125]},{"page":171,"text":"8-9. A mobile defense is a type of defensive operation that concentrates on the destruction or defeat of the","rect":[108.0,629.394287109375,540.0564241485596,620.2861328125]},{"page":171,"text":"enemy through a decisive attack by a striking force (ADP 3-90). The mobile defense focuses on defeating or","rect":[107.99002075195313,640.857177734375,540.0255029258728,631.7490234375]},{"page":171,"text":"destroying enemy forces by allowing them to advance to a point where they are exposed to a decisive","rect":[107.99000549316406,652.3801879882813,539.9168977813721,643.2720336914063]},{"page":171,"text":"counterattack. A mobile defense includes a fixing force and a striking force:","rect":[107.99000549316406,663.9031982421875,412.33750104522707,654.7950439453125]},{"page":171,"text":" A fixing force is a force designated to supplement the striking force by preventing the enemy from","rect":[133.1999969482422,677.394287109375,540.0833411178589,668.2861328125]},{"page":171,"text":"moving from a specific area for a specific time (ADP 3-90). Units use the fixing force to hold","rect":[151.1999969482422,688.857177734375,540.0722560882568,679.7490234375]},{"page":171,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":171,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":171,"text":"8-3","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":172,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":172,"text":"attacking enemy forces in position, to turn attacking enemy forces into ambush areas, and to retain","rect":[133.1999969482422,83.51434326171875,522.1173000335693,74.40616607666016]},{"page":172,"text":"areas from which to launch the striking force.","rect":[133.1999969482422,94.97723388671875,315.39861583709719,85.86905670166016]},{"page":172,"text":" The striking force is a dedicated counterattack force in a mobile defense constituted with the bulk","rect":[115.19999694824219,108.47430419921875,522.0457668304443,99.36612701416016]},{"page":172,"text":"of available combat power (ADP 3-90).","rect":[133.22003173828126,119.97727966308594,292.0771436691284,110.8891372680664]},{"page":172,"text":"8-10. A mobile defense requires assigned areas of considerable depth. Units shape the battlefield causing an","rect":[90.0137939453125,137.52227783203126,521.9930324554443,128.41409301757813]},{"page":172,"text":"enemy force to overextend its LOCs, expose its flanks, and dissipate its combat power. Likewise, they must","rect":[90.01380157470703,148.98516845703126,522.1000132522584,139.87698364257813]},{"page":172,"text":"be able to move their forces into a position where they can defeat the attacking force. Divisions and larger","rect":[90.0137939453125,160.5081787109375,521.9850366172791,151.39999389648438]},{"page":172,"text":"formations normally execute mobile defenses. In limited circumstances a BCT can execute a mobile defense","rect":[90.01377868652344,172.03118896484376,522.0761995391846,162.92300415039063]},{"page":172,"text":"unilaterally. (See Chapter 10 for more information on mobile defense.)","rect":[90.01382446289063,183.4940185546875,373.5547998008728,174.38583374023438]},{"page":172,"text":"RETROGRADE","rect":[72.0,206.8422088623047,141.84951162338258,198.75601196289063]},{"page":172,"text":"8-11. A retrograde is a type of defensive operation involving organized movement away from the enemy","rect":[90.0,226.7943115234375,522.0725612640381,217.68612670898438]},{"page":172,"text":"(ADP 3-90). An enemy force may compel these operations, or units may execute them voluntarily. In either","rect":[89.99999237060547,238.2572021484375,522.0912988243103,229.14901733398438]},{"page":172,"text":"case, the higher echelon headquarters executing the retrograde must approve the operation before its","rect":[89.99999237060547,249.78021240234376,521.9318988304138,240.67202758789063]},{"page":172,"text":"initiation. The retrograde is not conducted in isolation; it is a transitional operation. It is part of a larger","rect":[89.99999237060547,261.30322265625,522.0273339805603,252.19503784179688]},{"page":172,"text":"maneuver scheme designed to preserve combat power in order to regain the initiative in future operations.","rect":[90.0,272.76605224609377,522.0423536300659,263.6578674316406]},{"page":172,"text":"The three variations of the retrograde are delay, withdraw, and retirement. (See Chapter 11 for more","rect":[90.0,284.2890625,522.0102815704346,275.1808776855469]},{"page":172,"text":"information on retrograde.)","rect":[90.00997924804688,295.81207275390627,199.16786742782595,286.7038879394531]},{"page":172,"text":"COMMON DEFENSIVE CONTROL MEASURES","rect":[72.0,321.0896911621094,379.59078135681156,311.4155578613281]},{"page":172,"text":"8-12. Paragraphs A-63 through A-88 define common control measures specific to defensive operations.","rect":[90.0,341.394287109375,522.0344190597534,332.2861022949219]},{"page":172,"text":"Units use the minimum control measures required to complete their missions while providing subordinates","rect":[89.99000549316406,352.857177734375,521.9571063499451,343.7489929199219]},{"page":172,"text":"the flexibility needed to respond to changes in the situation.","rect":[89.99000549316406,364.3801574707031,328.8919630050659,355.27197265625]},{"page":172,"text":"8-13. Units control the defense by using control measures that provide the flexibility needed to respond to","rect":[89.99000549316406,381.9051513671875,521.9954738616943,372.7969665527344]},{"page":172,"text":"changes in the situation and allow them to concentrate combat power at the decisive point. Common","rect":[89.99000549316406,393.3680419921875,521.9523220062256,384.2598571777344]},{"page":172,"text":"defensive control measures are:","rect":[89.98999786376953,402.8669738769531,216.36920880889893,395.7828063964844]},{"page":172,"text":"","rect":[115.19999694824219,415.64544677734377,121.16105696249008,410.95318603515627]},{"page":172,"text":"","rect":[115.19999694824219,429.14544677734377,121.16105696249008,424.45318603515627]},{"page":172,"text":"","rect":[115.19999694824219,442.64544677734377,121.16105696249008,437.95318603515627]},{"page":172,"text":"","rect":[115.19999694824219,456.14544677734377,121.16105696249008,451.45318603515627]},{"page":172,"text":"","rect":[115.19999694824219,469.64544677734377,121.16105696249008,464.95318603515627]},{"page":172,"text":"","rect":[115.19999694824219,483.14544677734377,121.16105696249008,478.45318603515627]},{"page":172,"text":"","rect":[115.19999694824219,496.64544677734377,121.16105696249008,491.95318603515627]},{"page":172,"text":"","rect":[115.19999694824219,510.14544677734377,121.16105696249008,505.45318603515627]},{"page":172,"text":"Engagement area (EA).","rect":[133.1999969482422,418.3742980957031,227.32787609100343,409.26611328125]},{"page":172,"text":"Battle position (BP).","rect":[133.1999969482422,431.854248046875,215.75477123260499,422.76611328125]},{"page":172,"text":"Battle handover line (BHL).","rect":[133.1999969482422,445.354248046875,245.97512340545655,436.26611328125]},{"page":172,"text":"Named area of interest (NAI).","rect":[133.1999969482422,458.854248046875,253.49108409881593,449.76611328125]},{"page":172,"text":"Target areas of interest (TAI).","rect":[133.1999969482422,472.3742980957031,253.42998790740968,463.26611328125]},{"page":172,"text":"Fire support coordination measures (FSCMs).","rect":[133.1999969482422,485.854248046875,316.78643321990969,476.76611328125]},{"page":172,"text":"Disengagement line.","rect":[133.1999969482422,499.3742980957031,215.38503551483155,490.26611328125]},{"page":172,"text":"Phase lines.","rect":[133.1999969482422,510.8502502441406,180.46534252166749,503.76611328125]},{"page":172,"text":"COMMON DEFENSIVE PLANNING CONSIDERATIONS","rect":[72.0,538.1697387695313,433.3495399017334,528.4815673828125]},{"page":172,"text":"8-14. A defense is more effective when there is adequate time to thoroughly plan and prepare defensive","rect":[90.0,558.4743041992188,522.0321321563721,549.3661499023438]},{"page":172,"text":"positions. Lack of preparation time may cause units to maintain a larger reserve force or accept greater risks","rect":[90.0,569.9371337890625,522.0377948265076,560.8289794921875]},{"page":172,"text":"than usual. All units must be capable of mounting a defense with minimal preparation, but a strong defense","rect":[90.0,581.460205078125,522.1316194610596,572.35205078125]},{"page":172,"text":"takes time to organize and prepare. Time is always a critical factor so units must establish clear priorities of","rect":[90.0,592.983154296875,522.0370996055603,583.875]},{"page":172,"text":"work to provide focus for critical capabilities such as countermobility assets. If an enemy attack does not","rect":[90.0,604.446044921875,522.0173106155396,595.337890625]},{"page":172,"text":"take place at the predicted time, units use the additional time to continue improving their position. Units","rect":[90.0,615.9690551757813,522.0254046897888,606.8609008789063]},{"page":172,"text":"increase the effectiveness of the security area, establish additional fighting positions (alternate,","rect":[90.0,627.4920654296875,522.0033521652222,618.3839111328125]},{"page":172,"text":"supplementary, and subsequent), refine the defensive plan (to include branches and sequels), conduct","rect":[90.0,638.9549560546875,521.9618296585084,629.8468017578125]},{"page":172,"text":"defensive rehearsals, and maintain vehicles and personnel.","rect":[90.0,650.4578857421875,323.8629102706909,641.3697509765625]},{"page":172,"text":"8-15. To gain time to organize a defense, units may order the security force to conduct a delay while the","rect":[90.0,668.0029296875,522.0197420196533,658.894775390625]},{"page":172,"text":"main body disengages and moves to more advantageous positions. The security force must know how long","rect":[90.0,679.4658203125,521.9811916351318,670.357666015625]},{"page":172,"text":"it needs to delay enemy forces for the main body so that it can task-organize and prepare its defense. Security","rect":[90.0,690.98876953125,521.9752712249756,681.880615234375]},{"page":172,"text":"forces are also given additional tasks to disrupt the enemy’s attack and attrit key enemy formations or","rect":[90.01001739501953,702.5117797851563,522.0434472618103,693.4036254882813]},{"page":172,"text":"8-4","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":172,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":172,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":173,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":173,"text":"capabilities. These additional tasks help to set the conditions for a successful defense in the main battle area","rect":[108.0,83.49430847167969,539.9480867462158,74.40616607666016]},{"page":173,"text":"by separating enemy forces from each other and denying them the ability to mass at their decisive points.","rect":[108.0,94.97723388671875,528.4632520675659,85.86905670166016]},{"page":173,"text":"8-16. At the attack’s onset, defending units yield the initiative to enemy forces. However, they exploit the","rect":[107.99992370605469,112.4921875,539.9550447540283,103.3840103149414]},{"page":173,"text":"advantages of prepared, mutually supporting positions organized for all around defense and knowledge of","rect":[107.98989868164063,124.01519775390625,540.0009667930603,114.90702056884766]},{"page":173,"text":"the terrain to slow the enemy’s momentum. Defending units hinder enemy offensive preparations by using","rect":[107.98989868164063,135.47808837890626,539.9310207366943,126.36991119384766]},{"page":173,"text":"lethal and nonlethal means to reduce the coherence of the enemy force’s attack and begin to wrest the","rect":[107.9800033569336,147.0010986328125,540.0423860626221,137.89285278320313]},{"page":173,"text":"initiative from the enemy force. The defending force draws the enemy into engagement areas where","rect":[107.97994995117188,158.5240478515625,539.9322176055908,149.41586303710938]},{"page":173,"text":"defending forces can initiate combat on their own terms. The defending force surprises the enemy with","rect":[107.9800033569336,169.9869384765625,539.9210109710693,160.87869262695313]},{"page":173,"text":"concentrated and integrated fires that violently erupt on exposed enemy formations from concealed and","rect":[107.9800033569336,181.50994873046876,539.9870510101318,172.40176391601563]},{"page":173,"text":"protected positions. Defending units then counterattack enemy forces with repeated unexpected attacks and","rect":[107.9799575805664,193.032958984375,539.9432277679443,183.92477416992188]},{"page":173,"text":"they exploit small tactical successes and opportunities to stop the attacker’s momentum.","rect":[107.97994995117188,204.495849609375,460.1589002609253,195.38766479492188]},{"page":173,"text":"8-17. The defending force does not have to kill every enemy soldier, squad, or combat system to be","rect":[107.96990203857422,222.02081298828126,540.0250520782471,212.91262817382813]},{"page":173,"text":"successful. It only has to destroy the enemy’s ability to synchronize a combined arms team or the enemy","rect":[107.96990203857422,233.483642578125,539.9633693695068,224.37545776367188]},{"page":173,"text":"soldiers’ will to fight. Those events signal a transition period that affords the defending commander the","rect":[107.96991729736328,245.0067138671875,540.0102815704346,235.89852905273438]},{"page":173,"text":"opportunity to seize the initiative and return to the offense.","rect":[107.96991729736328,256.5296630859375,342.91472911834719,247.42147827148438]},{"page":173,"text":"8-18. Units consider the implications of combat on the civilian population. Civilians often affect friendly","rect":[107.96991729736328,273.9945068359375,539.9178981781006,264.8863220214844]},{"page":173,"text":"combat operations. Units conduct operations in accordance with U.S. and international law. This may mean","rect":[107.96991729736328,285.51751708984377,540.0021877288818,276.4093322753906]},{"page":173,"text":"that civilians place demands on logistics systems or place themselves in combat areas, influencing fire","rect":[107.96991729736328,297.04052734375,540.0273714141846,287.9323425292969]},{"page":173,"text":"coordination measures and synchronization of warfighting functions.","rect":[107.96991729736328,308.50341796875,383.8316602706909,299.3952331542969]},{"page":173,"text":"8-19. The common defensive planning considerations addressed in paragraphs 8-20 through 8-133 apply to","rect":[107.96991729736328,326.02838134765627,539.9678249359131,316.9201965332031]},{"page":173,"text":"all defensive operations. In the defense, synchronizing the elements of combat power allows units to","rect":[107.94990539550781,337.5513916015625,539.9161281585693,328.4432067871094]},{"page":173,"text":"desynchronize and destroy the enemy. Defensive synchronization normally results from detailed planning","rect":[107.94989013671875,349.0142822265625,539.9678859710693,339.9060974121094]},{"page":173,"text":"and preparation among the various units participating in an operation. While these activities may be separated","rect":[107.93990325927735,360.5373229980469,539.9883327484131,351.42913818359377]},{"page":173,"text":"in time and maneuver space, they are synchronized so the enemy feels their combined consequences at","rect":[107.93985748291016,372.060302734375,539.8786997756959,362.9521179199219]},{"page":173,"text":"decisive times and places. All defenses are a mix of static and dynamic actions. As an operation evolves,","rect":[107.93990325927735,383.5231628417969,539.8704786300659,374.4148864746094]},{"page":173,"text":"units shift main and supporting efforts to press the engagement and keep the enemy off balance. Synchronized","rect":[107.93988037109375,395.0461730957031,539.9711818695068,385.93798828125]},{"page":173,"text":"prior planning and preparation bolsters the unit’s combat power and increases the effectiveness of the","rect":[107.93987274169922,406.5691833496094,539.9258089141846,397.46099853515627]},{"page":173,"text":"defense.","rect":[107.92990112304688,416.0080261230469,141.0329236984253,408.9237976074219]},{"page":173,"text":"COMMAND AND CONTROL","rect":[90.0,441.3480224609375,219.68680715560914,433.0560302734375]},{"page":173,"text":"8-20. A defense generally imposes few restrictions on the defending unit. It allows freedom of maneuver","rect":[108.0,461.2743225097656,540.0554711875916,452.1661376953125]},{"page":173,"text":"within assigned boundaries but requires units to prevent enemy penetration of the rear boundary. This mission","rect":[108.0,472.7372131347656,540.0037136077881,463.6290283203125]},{"page":173,"text":"allows units to distribute forces to suit the terrain and plan an engagement that integrates direct and indirect","rect":[108.0,484.26019287109377,540.0224375686646,475.1520080566406]},{"page":173,"text":"fires. Commanders ensure that subordinate unit defensive plans are compatible and that control measures,","rect":[108.0,495.7631530761719,540.0063428878784,486.6750183105469]},{"page":173,"text":"such as contact points and phase lines, are sufficient for coordination when assigning areas. The defensive","rect":[108.0,507.24609375,540.0130891876221,498.1379089355469]},{"page":173,"text":"plan addresses what happens when the defense transitions.","rect":[108.0,518.7490234375,341.8708448410034,509.6608581542969]},{"page":173,"text":"8-21. Defensive operations are often difficult to conduct because the enemy force possesses the initiative","rect":[108.0,536.2940673828125,539.9672517852783,527.1859130859375]},{"page":173,"text":"and usually has superior combat power. Defending units may have to frequently shift supporting efforts to","rect":[107.98997497558594,547.7569580078125,539.8586940765381,538.6488037109375]},{"page":173,"text":"contain the enemy’s attack until the defending force can seize the initiative. This may require units to adjust","rect":[107.98997497558594,559.2799072265625,540.0633311233521,550.1616821289063]},{"page":173,"text":"subordinate units’ assigned areas, repeatedly commit and reconstitute the reserve, and modify the original","rect":[107.97994995117188,570.8029174804688,540.0321421585084,561.6947631835938]},{"page":173,"text":"plan.","rect":[107.97994995117188,582.2457885742188,127.7644453048706,573.1576538085938]},{"page":173,"text":"8-22. Units begin defensive preparations immediately upon moving into position. A technique that units use","rect":[107.97994995117188,599.78076171875,540.0563631134033,590.672607421875]},{"page":173,"text":"is reporting set and established to indicate their level of preparation. “Set” occurs when defending units are","rect":[107.98994445800781,611.3037719726563,540.0393343048096,602.1956176757813]},{"page":173,"text":"in position and prepared to conduct a hasty defense. “Established” occurs when defending units are prepared","rect":[107.96987915039063,622.7666625976563,540.0083522796631,613.6585083007813]},{"page":173,"text":"to conduct a deliberate defense according to the base plan.","rect":[107.97987365722656,634.2896728515625,341.2354688644409,625.1815185546875]},{"page":173,"text":"8-23. Defending units may change task organization to respond to the existing or projected situation, such","rect":[107.97987365722656,651.8146362304688,539.9648342132568,642.6964111328125]},{"page":173,"text":"as forming a detachment to be left in contact before conducting a withdrawal. Whenever possible, task","rect":[107.97987365722656,663.2775268554688,539.9549465179443,654.1693115234375]},{"page":173,"text":"organization changes take place between units that have previously trained or operated together to take","rect":[107.9800033569336,674.800537109375,540.0160799102783,665.6923828125]},{"page":173,"text":"advantage of established interpersonal relationships. Task-organized units place special attention on ensuring","rect":[107.9799575805664,686.323486328125,540.0674343109131,677.21533203125]},{"page":173,"text":"that each element directs its efforts toward accomplishing the overall unit’s mission. This requires","rect":[107.96991729736328,697.786376953125,540.0233294944763,688.67822265625]},{"page":173,"text":"commanders to ensure the synchronizing of objectives, control measures, movement routes, and defensive","rect":[107.95990753173828,709.3093872070313,540.0230379180908,700.191162109375]},{"page":173,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":173,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":173,"text":"8-5","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":174,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":174,"text":"positions as well as ensuring their subordinates understand their specifically assigned tasks. It also requires","rect":[90.0,83.51434326171875,521.9912250022888,74.40616607666016]},{"page":174,"text":"using a SOP common to each element of the task-organized unit. Failure to synchronize task-organized","rect":[89.98998260498047,94.97723388671875,522.0243434906006,85.86905670166016]},{"page":174,"text":"elements has often resulted in mission failure during operations.","rect":[89.98998260498047,106.500244140625,346.3617811203003,97.3920669555664]},{"page":174,"text":"8-24. To break through the MBA, the enemy often attacks along boundaries of defending units when they","rect":[89.98998260498047,124.02520751953125,522.0721950531006,114.91703033447266]},{"page":174,"text":"can be identified. Therefore, units at every echelon ensure that the plan for their part of the defense is properly","rect":[89.98998260498047,135.48809814453126,522.0531520843506,126.37992095947266]},{"page":174,"text":"coordinated, not only within their units, but also with adjacent and supporting units. Commanders coordinate","rect":[89.98998260498047,147.0111083984375,522.0142488555908,137.89291381835938]},{"page":174,"text":"by personally visiting subordinate commanders on the ground when possible or by establishing contact","rect":[89.98998260498047,158.5340576171875,521.9001231155396,149.42587280273438]},{"page":174,"text":"points. Staffs rapidly disseminate coordination decisions to all concerned. Leaders consider these planning","rect":[89.98997497558594,169.9969482421875,521.9261379241943,160.88876342773438]},{"page":174,"text":"aspects in the coordination process:","rect":[89.98999786376953,181.4999237060547,232.2148814163208,172.41177368164063]},{"page":174,"text":" The higher commander’s intent and concept of operations.","rect":[115.19999694824219,194.99432373046876,366.9826612472534,185.88613891601563]},{"page":174,"text":" The tactics applied by adjacent and supporting units.","rect":[115.19999694824219,208.49432373046876,343.78130626678469,199.37612915039063]},{"page":174,"text":" Control measures that enhance coordination between units.","rect":[115.19999694824219,219.9803009033203,369.58294200897219,212.88613891601563]},{"page":174,"text":" Planning for mutual support.","rect":[115.19999694824219,235.49432373046876,248.26769542694093,226.38613891601563]},{"page":174,"text":" Information collection and target acquisition.","rect":[115.19999694824219,248.99432373046876,314.0248975753784,239.88613891601563]},{"page":174,"text":" Location and composition of security forces.","rect":[115.19999694824219,262.49432373046877,312.0409803390503,253.38613891601563]},{"page":174,"text":" Obstacles and demolitions.","rect":[115.19999694824219,273.9803161621094,241.30482006072999,266.8861389160156]},{"page":174,"text":" Fires, including employing antitank systems, illumination, and obscuration.","rect":[115.19999694824219,289.4942932128906,435.10430431365969,280.3861083984375]},{"page":174,"text":" Air defense coverage areas.","rect":[115.19999694824219,302.9942932128906,243.7576551437378,293.8861083984375]},{"page":174,"text":" Employing the reserve in conjunction with fire support systems.","rect":[115.19999694824219,316.4942932128906,389.56280040740969,307.3760986328125]},{"page":174,"text":" Communications.","rect":[115.19999694824219,327.98028564453127,204.10753917694093,320.8861083984375]},{"page":174,"text":"8-25. Because command posts tend to be stationary in the defense, units place them in hardened areas or","rect":[90.00376892089844,347.45916748046877,521.9368798789978,338.3509826660156]},{"page":174,"text":"protective terrain and reduce their electronic signature. Command posts must remain capable of rapidly","rect":[90.00376892089844,358.9821472167969,521.9629421234131,349.87396240234377]},{"page":174,"text":"relocating to respond to battlefield developments.","rect":[90.00376892089844,370.5051574707031,288.2866163253784,361.39697265625]},{"page":174,"text":"8-26. Defending units typically yield terrain along with the civilian inhabitants—which makes dealing with","rect":[90.00376892089844,387.97003173828127,521.9811916351318,378.86181640625]},{"page":174,"text":"those civilians more difficult in the defense than in the offense. However, defending units need to prevent","rect":[90.00379943847656,399.4930114746094,522.0508189163209,390.38482666015627]},{"page":174,"text":"the uncoordinated movement of dislocated civilians within their assigned area. Such uncoordinated","rect":[90.00376892089844,411.0160217285156,522.0287990570068,401.9078369140625]},{"page":174,"text":"movements hamper the execution of friendly defenses by hindering the repositioning of defending forces,","rect":[90.00376892089844,422.4789123535156,522.0352125167847,413.3707275390625]},{"page":174,"text":"the sustainment of defending forces, and the evacuation of casualties. It is also important that the defending","rect":[90.00376892089844,434.00189208984377,521.9058132171631,424.8937072753906]},{"page":174,"text":"units meet their legal obligations to the civilian inhabitants within their assigned areas.","rect":[90.00376892089844,445.52490234375,436.30767345428469,436.4167175292969]},{"page":174,"text":"8-27. Conditions that require conducting denial and stay-behind operations can arise during defensive","rect":[90.00376892089844,462.98974609375,522.0712556915283,453.8815612792969]},{"page":174,"text":"operations. These two operations have their own unique planning and execution considerations.","rect":[90.00374603271485,474.51275634765627,472.54546642303469,465.4045715332031]},{"page":174,"text":"Denial Operations","rect":[72.0,499.0787353515625,157.8635965309143,489.2955627441406]},{"page":174,"text":"8-28. Sometimes, enemy units capture a friendly force's equipment and supplies. This situation often occurs","rect":[90.0,516.5942993164063,522.0531756858826,507.4861145019531]},{"page":174,"text":"during the conduct of defensive and retrograde operations. To prevent this, defending commanders conduct","rect":[90.0,528.1173095703125,522.0904917678834,519.0091552734375]},{"page":174,"text":"denial operations. Denial operations are actions to hinder or deny the enemy the use of terrain, supplies,","rect":[90.01001739501953,539.6403198242188,521.9953565597534,530.5321655273438]},{"page":174,"text":"or facilities. They may include destroying, removing, and contaminating those supplies and facilities or","rect":[90.02003479003906,551.1031494140625,521.9691064414978,541.9949951171875]},{"page":174,"text":"erecting obstacles. The principles of denial are—","rect":[90.02003479003906,562.6261596679688,286.3418998718262,553.5180053710938]},{"page":174,"text":" Commanders order the destruction of military equipment and supplies only when friendly forces","rect":[115.19999694824219,576.1143188476563,522.0299212913513,567.0061645507813]},{"page":174,"text":"cannot prevent them from falling into enemy hands.","rect":[133.1999969482422,587.6373291015625,340.9657850265503,578.5291748046875]},{"page":174,"text":" Commanders deny enemy forces the use of military equipment and supplies by means of its","rect":[115.19999694824219,601.13427734375,522.0491473655701,592.026123046875]},{"page":174,"text":"destruction, removal, or contamination.","rect":[133.1899871826172,611.0,290.9147901535034,603.489013671875]},{"page":174,"text":" Steps taken to deny stocks do not preclude their later use by friendly forces, if possible.","rect":[115.19999694824219,626.0942993164063,482.9842481613159,616.9861450195313]},{"page":174,"text":" Deliberately destroying medical equipment and supplies and making food and water unfit for","rect":[115.19999694824219,639.5942993164063,522.0189721641541,630.4861450195313]},{"page":174,"text":"consumption is unlawful under the terms of the Geneva Conventions.","rect":[133.1999969482422,651.0972900390625,410.9835157394409,642.0091552734375]},{"page":174,"text":"8-29. In denial operations, the definition of a unit's military equipment and supplies could expand to include","rect":[90.00376892089844,668.5821533203125,522.0753450469971,659.4739990234375]},{"page":174,"text":"military installations and any civilian equipment and supplies used by the friendly force. Only immediate","rect":[90.00376892089844,680.1051635742188,521.9499788360596,670.9970092773438]},{"page":174,"text":"military necessity permits the destruction of civilian property under the law of war. Determining whether","rect":[90.00376892089844,691.628173828125,521.9520165977478,682.52001953125]},{"page":174,"text":"there is sufficient necessity to justify destruction is a complex decision that requires consideration of moral,","rect":[90.00376892089844,703.091064453125,521.9870557785034,693.9728393554688]},{"page":174,"text":"8-6","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":174,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":174,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":175,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":175,"text":"political, and legal considerations. Additionally, civil instability increased by the destruction of civilian","rect":[108.0,83.51434326171875,539.8951320648193,74.40616607666016]},{"page":175,"text":"property, material, and equipment could have adverse effects on the outcomes of future operations.","rect":[108.0,94.97723388671875,504.0443983078003,85.86905670166016]},{"page":175,"text":"8-30. Commanders who order denial operations consider the potential value of the military equipment and","rect":[108.0,112.4921875,540.0071315765381,103.3840103149414]},{"page":175,"text":"supplies to an enemy force when determining the priorities and the extent of the operation. Examples of high","rect":[107.98997497558594,124.01519775390625,540.0170803070068,114.90702056884766]},{"page":175,"text":"priorities for denial include—","rect":[107.98997497558594,135.4580535888672,227.20795822143556,126.36991119384766]},{"page":175,"text":" Classified equipment, material, and documents.","rect":[133.1999969482422,148.9542694091797,341.4477491378784,139.86611938476563]},{"page":175,"text":" Petroleum, oils, and lubricants (known as POL).","rect":[133.1999969482422,162.4542694091797,344.27236461639407,153.36611938476563]},{"page":175,"text":" Sophisticated weapon systems or electronic equipment.","rect":[133.1999969482422,175.97430419921876,372.87844371795657,166.86611938476563]},{"page":175,"text":" Heavy weapons and associated ammunition.","rect":[133.1999969482422,189.47430419921876,328.6591749191284,180.36611938476563]},{"page":175,"text":" Communications equipment.","rect":[133.1999969482422,202.9542694091797,266.80474376678469,193.86611938476563]},{"page":175,"text":" Ferrying and bridging equipment.","rect":[133.1999969482422,216.47430419921876,286.18548107147219,207.36611938476563]},{"page":175,"text":" Air, sea, and land transport systems.","rect":[133.1999969482422,229.97430419921876,296.18535900115969,220.86611938476563]},{"page":175,"text":" Any other military supplies, equipment, or facilities are a lesser priority in denial operations.","rect":[133.1999969482422,243.47430419921876,521.6865186691284,234.36611938476563]},{"page":175,"text":"8-31. Denial also prevents an enemy from repairing a system by cannibalizing several systems. Commanders","rect":[108.00376892089844,260.999267578125,540.1262958030701,251.89108276367188]},{"page":175,"text":"issue detailed instructions to deny military equipment and supplies to prevent an enemy force from using","rect":[108.00379943847656,272.462158203125,539.9977931976318,263.3539733886719]},{"page":175,"text":"them. The unit must destroy the same parts in each type of system.","rect":[108.00376892089844,283.98516845703127,374.62688732147219,274.8769836425781]},{"page":175,"text":"8-32. Denial differs from countermobility operations because commanders design denial operations to","rect":[108.00376892089844,301.5101318359375,539.9716701507568,292.4019470214844]},{"page":175,"text":"deprive the enemy force of some, or all, of the short-term benefits of capturing an area. The impact of denial","rect":[108.00379943847656,312.9730224609375,540.0361704788209,303.86480712890627]},{"page":175,"text":"operations on civilian inhabitants and the environment of the area act as a moral and a legal constraint on","rect":[108.0037841796875,324.49603271484377,539.9887599945068,315.3878479003906]},{"page":175,"text":"their use by U.S. forces. Commanders involve their legal advisor and civil affairs operations staff in planning","rect":[108.0037841796875,336.01904296875,540.0552883148193,326.9108581542969]},{"page":175,"text":"denial operations.","rect":[108.0037841796875,347.46185302734377,179.14777660369874,338.37371826171877]},{"page":175,"text":"8-33. Commanders ensure that executing the denial plan does not adversely affect the unit's future","rect":[108.0037841796875,365.00689697265627,540.0664339141846,355.8987121582031]},{"page":175,"text":"operations. This includes carefully considering the force's demolition policy in relation to the purpose of the","rect":[108.0037841796875,376.5298767089844,539.9476595001221,367.42169189453127]},{"page":175,"text":"rearward movement and the contemplated subsequent actions of the force. Widespread demolitions during a","rect":[108.0037841796875,387.9927673339844,540.0091829376221,378.88458251953127]},{"page":175,"text":"retrograde may greatly hinder a friendly force moving back into the area more than enemy forces during a","rect":[108.0037841796875,399.5157470703125,539.9683504180908,390.4075622558594]},{"page":175,"text":"friendly retrograde. For example, destroying the transportation infrastructure increases friendly force","rect":[108.0037841796875,411.03875732421877,540.1390657501221,401.9305725097656]},{"page":175,"text":"logistics difficulties once friendly forces recapture an area. Removing or destroying militarily significant","rect":[108.0037841796875,422.50164794921877,539.9548716506959,413.3934631347656]},{"page":175,"text":"supplies and equipment, such as fuel, obstacle materials, and rail cars, from an area requires friendly forces","rect":[108.00379943847656,434.024658203125,540.0405414085388,424.9164733886719]},{"page":175,"text":"to bring similar assets with them when they reoccupy an area.","rect":[108.00376892089844,445.54766845703127,354.8825635910034,436.4394836425781]},{"page":175,"text":"8-34.","rect":[107.9937515258789,460.96844482421877,128.8553876876831,454.0846862792969]},{"page":175,"text":"as—","rect":[107.9937515258789,472.511474609375,126.35039138793946,467.77203369140627]},{"page":175,"text":"Commanders can expand a denial operation to prevent enemy forces from exploiting resources, such","rect":[133.19406127929688,463.01251220703127,539.9717311859131,453.9043273925781]},{"page":175,"text":" Fuel, minerals, and the civilian population.","rect":[133.1999969482422,487.9542541503906,322.9067335128784,478.8661193847656]},{"page":175,"text":" Facilities, such as river locks, railroad switching yards, road interchanges, bridges, and industrial","rect":[133.1999969482422,501.47430419921877,540.0301890335084,492.3661193847656]},{"page":175,"text":"plants.","rect":[151.1999969482422,512.9171752929688,177.64478588104249,503.8290100097656]},{"page":175,"text":" Routes of communication, such as telephone exchanges, radio stations, and television stations.","rect":[133.1999969482422,526.434326171875,529.2434644699097,517.326171875]},{"page":175,"text":"8-35. The defending force can assist civil authorities in evacuating civilians. The defending force either","rect":[108.00376892089844,543.9592895507813,540.0003564414978,534.8511352539063]},{"page":175,"text":"removes the resources, supplies, and facilities from areas abandoned to enemy forces or destroys them in","rect":[108.00376892089844,555.4822998046875,539.9362087249756,546.3741455078125]},{"page":175,"text":"place. Denial operations may be either total or limited.","rect":[108.00379943847656,566.9451904296875,326.26836681365969,557.8370361328125]},{"page":175,"text":"8-36. Total denial operations can produce long-term political, economic, military, and environmental effects.","rect":[108.00377655029297,584.4701538085938,540.0670728683472,575.3619995117188]},{"page":175,"text":"Total denial operations have operational level, and possibly strategic level, impact. Total denial operations","rect":[108.00377655029297,595.9931640625,540.0218036155701,586.885009765625]},{"page":175,"text":"consume large quantities of transportation and engineer resources and require considerable time to plan and","rect":[108.00377655029297,607.4560546875,540.0880641937256,598.347900390625]},{"page":175,"text":"execute.","rect":[108.00377655029297,616.9549560546875,141.1038465499878,610.872802734375]},{"page":175,"text":"8-37. Limited or partial denial operations are particularly suitable if a defending force expects to regain","rect":[108.00377655029297,636.4939575195313,539.9579372406006,627.3858032226563]},{"page":175,"text":"control of the area within a short time. The removal or destruction of only a few key components can reduce","rect":[108.00379943847656,647.9569091796875,540.0129060821533,638.8487548828125]},{"page":175,"text":"a facility to limited utility, yet it allows for the facility's quick restoration of all functions upon its return to","rect":[108.00377655029297,659.4798583984375,540.0281276702881,650.3717041015625]},{"page":175,"text":"friendly control. American forces only destroy discrete targets of significant military value. Limited denial","rect":[108.00376892089844,671.0028686523438,539.9870371780396,661.8947143554688]},{"page":175,"text":"operations normally do not affect the advance of properly supported enemy formations possessing cross-","rect":[108.00376892089844,682.4657592773438,540.0308129844666,673.3576049804688]},{"page":175,"text":"country mobility. However, they can seriously impede an enemy force's road bound and rail bound logistics","rect":[108.00376892089844,693.98876953125,540.0547625999451,684.880615234375]},{"page":175,"text":"support if commanders properly plan and execute them.","rect":[108.00376892089844,705.51171875,331.3066053390503,696.403564453125]},{"page":175,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":175,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":175,"text":"8-7","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":176,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":176,"text":"Stay-Behind Operations","rect":[72.0,84.62071228027344,185.32786044692993,74.81556701660156]},{"page":176,"text":"8-38. A stay-behind operation is an operation in which a unit remains in position to conduct a specified","rect":[90.0,102.11431884765625,522.0701436920166,93.16645812988281]},{"page":176,"text":"mission while the remainder of the force withdraws or retires from an area. The force for this operation","rect":[90.00000762939453,113.61729431152344,521.9737453460693,104.5291519165039]},{"page":176,"text":"consists of enough combat, functional and multifunctional support, and sustainment elements to protect and","rect":[90.0,125.16033935546875,522.0851955413818,116.05216217041016]},{"page":176,"text":"sustain its fighting capability for the duration of the mission. A stay-behind force may also result from enemy","rect":[90.0,136.6231689453125,521.9702053070068,127.5149917602539]},{"page":176,"text":"actions that bypass friendly forces.","rect":[89.98998260498047,148.14617919921876,229.11370372772218,139.03799438476563]},{"page":176,"text":"8-39. The primary purpose of the stay-behind force is to deceive an enemy force into believing the parent","rect":[89.98998260498047,165.67120361328126,522.0364756546021,156.56301879882813]},{"page":176,"text":"unit is still in position while most of the unit withdraws and disrupts enemy forces. A stay-behind force is a","rect":[89.98999786376953,177.134033203125,521.9322176055908,168.02584838867188]},{"page":176,"text":"high-risk mission because of the potential for its encirclement and destruction by enemy forces. Resupply","rect":[89.9800033569336,188.65704345703126,521.9752712249756,179.54873657226563]},{"page":176,"text":"and casualty evacuation are also extremely difficult. Commanders consider assigning these missions only","rect":[89.96994018554688,200.1800537109375,521.9363307952881,191.07186889648438]},{"page":176,"text":"after a thorough analysis of the mission variables. A stay-behind force attacks enemy combat forces and","rect":[89.96990203857422,211.6429443359375,522.0373439788818,202.53475952148438]},{"page":176,"text":"command nodes, functional and multifunctional support, and sustainment elements from unexpected","rect":[89.96995544433594,223.1459197998047,522.0000514984131,214.05776977539063]},{"page":176,"text":"directions. These attacks may cause enemy follow-on forces to be more cautious and to slow down to clear","rect":[89.96995544433594,234.68896484375,521.9763085899353,225.58078002929688]},{"page":176,"text":"possible attack and ambush sites. Commanders may require the stay-behind force to conduct a breakout from","rect":[89.96995544433594,246.15179443359376,521.9742102584839,237.04360961914063]},{"page":176,"text":"encirclement and linkup operations after it completes its mission.","rect":[89.95990753173828,257.6547546386719,350.7040967941284,248.56661987304688]},{"page":176,"text":"8-40. A dismounted, stay-behind infantry force surprises an enemy force by conducting a series of raids and","rect":[89.95990753173828,275.19976806640627,521.9252223968506,266.0915832519531]},{"page":176,"text":"ambushes. Commanders can insert this infantry force via infiltration, air assault, or airborne operations; it","rect":[89.95990753173828,286.66265869140627,522.0414195022584,277.5544738769531]},{"page":176,"text":"can also be a bypassed force. Attacks in the enemy support area by friendly armored forces can cover a larger","rect":[89.95990753173828,298.1856689453125,521.9391992149353,289.0774841308594]},{"page":176,"text":"area than attacks by dismounted infantry forces.","rect":[89.95990753173828,309.7086486816406,281.8830518722534,300.6004638671875]},{"page":176,"text":"8-41. Stay-behind operations eventually require the stay-behind force to reenter friendly lines or link up with","rect":[89.95990753173828,327.17352294921877,521.9992580413818,318.0653381347656]},{"page":176,"text":"other elements, often in more than one location. Commanders carefully coordinate this reentry to prevent","rect":[89.94989013671875,338.696533203125,521.9562144241334,329.5883483886719]},{"page":176,"text":"friendly fire incidents. Commanders select the best return routes available for the stay-behind force, and they","rect":[89.94989013671875,350.15936279296877,522.0393581390381,341.0511779785156]},{"page":176,"text":"guard gaps or lanes through obstacles along these routes.","rect":[89.94989013671875,361.682373046875,317.3919630050659,352.5741882324219]},{"page":176,"text":"8-42. Commanders conduct stay-behind operations only when confident that the stay-behind force will rejoin","rect":[89.94989013671875,379.19732666015627,521.9852809906006,370.0791320800781]},{"page":176,"text":"the main body, extract itself in alternative ways, or the main body will fight its way forward to link up with","rect":[89.9499282836914,390.66021728515627,521.9782619476318,381.5520324707031]},{"page":176,"text":"the stay-behind force. It is critical that the commander and staff develop detailed isolated Soldier guidance","rect":[89.9499282836914,402.1831970214844,522.0053377227783,393.07501220703127]},{"page":176,"text":"when planning the stay-behind operation. (See FM 3-50 for more information on isolated Soldier guidance.)","rect":[89.9499282836914,413.7062072753906,521.9854028282166,404.5980224609375]},{"page":176,"text":"8-43. A detachment left in contact is an element left in contact as part of the previously designated","rect":[89.93989562988281,431.1710510253906,521.9492330474853,422.22320556640627]},{"page":176,"text":"security force while the main body conducts its withdrawal. It simulates—as nearly as possible—the","rect":[89.93990325927735,442.6940612792969,521.9562044219971,433.58587646484377]},{"page":176,"text":"continued presence of the main body until it is too late for an enemy force to react by conducting activities","rect":[89.9499282836914,454.21710205078127,521.8851459007263,445.1089172363281]},{"page":176,"text":"such as electronic transmissions or attacks. The detachment left in contact (DLIC) requires specific","rect":[89.9499282836914,465.6599426269531,521.9600496368408,456.5718078613281]},{"page":176,"text":"instructions about what to do when the enemy force attacks and when and under what circumstances to delay","rect":[89.95990753173828,477.2030334472656,521.9900417327881,468.0948181152344]},{"page":176,"text":"or withdraw. If the detachment left in contact must disengage from the enemy force, it uses the same","rect":[89.95992279052735,488.7260437011719,522.0164461212158,479.61785888671877]},{"page":176,"text":"techniques as in the delay. If required, commanders provide these detachments additional recovery,","rect":[89.95992279052735,500.1889343261719,521.9471387863159,491.08074951171877]},{"page":176,"text":"evacuation, and transportation assets to use after disengagement to speed their rearward movement.","rect":[89.95992279052735,511.7119445800781,487.6089735031128,502.603759765625]},{"page":176,"text":"8-44. While both a detachment left in contact and a stay-behind force delay and disrupt the enemy, the","rect":[89.96994018554688,529.2369384765625,522.0874910430908,520.1287841796875]},{"page":176,"text":"biggest difference is the level of stealth. A stay-behind force delays the enemy through small scale","rect":[89.96995544433594,540.6998291015625,521.9698152618408,531.5916748046875]},{"page":176,"text":"engagements such as raids and ambushes. A stay-behind force only masses its combat power when combat","rect":[89.95990753173828,552.2227783203125,521.9632945022584,543.1146240234375]},{"page":176,"text":"power ratios and the tactical situation are in its favor. A detachment left in contact engages the enemy and","rect":[89.95988464355469,563.7457885742188,521.9542140960693,554.6376342773438]},{"page":176,"text":"tries to represent itself as a larger force, so its presence must be known as it fights in a very conventional","rect":[89.96990203857422,575.2086791992188,521.9758067092896,566.1005249023438]},{"page":176,"text":"manner. Both forces seek to link-up with friendly forces when they accomplish their commander’s intent.","rect":[89.96990203857422,586.731689453125,511.9811964035034,577.62353515625]},{"page":176,"text":"8-45. Two methods exist to resource the detachment left in contact. The first method is for each major","rect":[89.95988464355469,604.196533203125,521.9625146446228,595.0783081054688]},{"page":176,"text":"subordinate element of the withdrawing force to leave a sub element in place. For example, in a BCT","rect":[89.95988464355469,615.7195434570313,521.8662998695373,606.6113891601563]},{"page":176,"text":"withdrawal, each maneuver battalion leaves a task-organized company team in contact. Typically, these","rect":[89.95988464355469,627.2426147460938,521.9942293243408,618.1344604492188]},{"page":176,"text":"teams fall under a senior DLIC commander designated by the brigade commander. The second method is","rect":[89.9498519897461,638.7055053710938,521.9027240257263,629.5973510742188]},{"page":176,"text":"one major subordinate command of the withdrawing force can stay behind as the DLIC. Figure 8-1 depicts a","rect":[89.9498519897461,650.228515625,521.9585237579346,641.1102905273438]},{"page":176,"text":"BCT with three maneuver battalions leaving one task-organized battalion as the detachment left in contact.","rect":[89.94990539550781,661.7513427734375,521.9000806808472,652.6431884765625]},{"page":176,"text":"That battalion expands its security responsibilities to cover the width of the BCTs' assigned area.","rect":[89.94989013671875,673.2142333984375,477.0013074874878,664.1060791015625]},{"page":176,"text":"8-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":176,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":176,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":177,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":177,"text":"Figure 8-1. Example detachment left in contact","rect":[204.4199981689453,390.47418212890627,425.6225488243103,381.08544921875]},{"page":177,"text":"8-46. When a DLIC is used, commanders create an additional security force behind the existing main","rect":[107.98751068115235,413.9309997558594,539.9436550140381,404.82281494140627]},{"page":177,"text":"defensive positions to assist the withdrawal process. They can create an additional force from the","rect":[107.98751068115235,425.4540100097656,540.0697298126221,416.3458251953125]},{"page":177,"text":"withdrawing unit or from an assisting unit. The DLIC can conduct a delay for this additional security force","rect":[107.98751068115235,436.9168701171875,540.0329866485596,427.8086853027344]},{"page":177,"text":"and then join it, or the DLIC can conduct a battle handover and then conduct a rearward passage of lines. In","rect":[107.98751068115235,448.43988037109377,539.9681301116943,439.3216857910156]},{"page":177,"text":"either case, the additional security force becomes the rear guard.","rect":[107.98751068115235,459.962890625,365.4735059738159,450.8547058105469]},{"page":177,"text":"Civil Considerations","rect":[90.0,482.37371826171877,186.2495828590393,474.77557373046877]},{"page":177,"text":"8-47. Units’ defensive concepts of operations address how the preparation and conduct of the defense will","rect":[108.0,502.05426025390627,540.0473399124146,492.96612548828127]},{"page":177,"text":"influence the civilian population in their assigned areas. This includes the conduct of noncombatant","rect":[108.0,513.5973510742188,539.9675669631959,504.4891357421875]},{"page":177,"text":"evacuation operations for U.S. civilians and other authorized groups. Commanders have legal obligations to","rect":[108.0,525.1203002929688,540.0872707366943,516.0121459960938]},{"page":177,"text":"civilian populations in their assigned areas. Ideally, the local nation government will have the capability to","rect":[108.0,536.5831909179688,539.9402370452881,527.4750366210938]},{"page":177,"text":"conduct the six primary stability tasks. Defending units conduct only those minimum-essential stability tasks","rect":[107.9899673461914,548.106201171875,539.9862811546326,538.998046875]},{"page":177,"text":"required by the mission variables and expend only the minimum-essential resources to meet their legal and","rect":[107.97989654541016,559.569091796875,539.9241237640381,550.4609375]},{"page":177,"text":"ethical responsibilities to civilians during the execution of a defense.","rect":[107.97989654541016,571.092041015625,382.40862560272219,561.98388671875]},{"page":177,"text":"MOVEMENT AND MANEUVER","rect":[90.0,594.4421997070313,233.9955759048462,586.35595703125]},{"page":177,"text":"8-48. Defending units intend to defeat an enemy force’s attack by overwhelming it with direct and indirect","rect":[108.0,614.394287109375,540.0334849319459,605.2861328125]},{"page":177,"text":"fires before it conducts its final assault on friendly defensive positions. As an enemy force’s attack fails, it","rect":[108.0,625.857177734375,539.9551768264771,616.7490234375]},{"page":177,"text":"attempts to withdraw or transition to a defense in the face of friendly counterattacks. If enemy forces succeed","rect":[107.99996185302735,637.3801879882813,540.0313014984131,628.2720336914063]},{"page":177,"text":"in overrunning a key defensive position, the defending force counterattacks to overwhelm enemy forces","rect":[107.99996185302735,648.9031982421875,539.9535052757263,639.7950439453125]},{"page":177,"text":"before they can either organize a defense or exploit their initial success.","rect":[107.99996185302735,660.3660888671875,394.60210704803469,651.2579345703125]},{"page":177,"text":"Exploit the Advantages of Terrain","rect":[90.0,684.980712890625,250.72742308044435,675.175537109375]},{"page":177,"text":"8-49. Units exploit the advantages of occupying the terrain where the battle will occur. The defending force","rect":[108.0,702.5343017578125,540.0674715118408,693.4261474609375]},{"page":177,"text":"engages the attacker from locations that give the defending force an advantage. These locations include","rect":[107.9999771118164,713.9971923828125,540.0555086212158,704.8890380859375]},{"page":177,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":177,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":177,"text":"8-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":178,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":178,"text":"defiles, rivers, thick woods, swamps, cliffs, canals, built-up areas, and reverse slopes. Effective defensive","rect":[90.0,83.49430847167969,522.0344514923096,74.40616607666016]},{"page":178,"text":"positions in the MBA use natural and man-made obstacles. Units may choose to shape the battlefield by","rect":[90.0,94.97723388671875,521.9511013031006,85.86905670166016]},{"page":178,"text":"defending in one area to deny terrain to enemy forces while delaying in another area to deceive the enemy","rect":[90.0,106.500244140625,521.9361476898193,97.3920669555664]},{"page":178,"text":"into believing that the attacking enemy force has achieved success.","rect":[90.0,118.023193359375,357.7615613937378,108.9150161743164]},{"page":178,"text":"8-50. Defending units use key terrain to impede an enemy force’s movement and place overwatching","rect":[90.0,135.48809814453126,521.9664821624756,126.37992095947266]},{"page":178,"text":"elements in positions to provide early warning and engage enemy forces with indirect fires. These positions","rect":[89.98999786376953,147.0111083984375,522.0464618186951,137.90292358398438]},{"page":178,"text":"can be located forward of the topographical crest and on the flanks of positions in a valley or depression.","rect":[89.9899673461914,158.5340576171875,522.0323438644409,149.42587280273438]},{"page":178,"text":"Defending units select terrain that allows the massing of friendly fires and forces the enemy to commit its","rect":[89.98994445800781,169.9969482421875,521.9311053733826,160.88876342773438]},{"page":178,"text":"forces piecemeal into friendly engagement areas. This exposes portions of the enemy force to destruction","rect":[89.98994445800781,181.51995849609376,521.9436550140381,172.41177368164063]},{"page":178,"text":"without giving up the advantages of fighting from protected positions. Examples of key terrain include terrain","rect":[89.96990203857422,193.04296875,521.9683132171631,183.93478393554688]},{"page":178,"text":"that permits the defending force to cover a major obstacle system by fire and important road junctions or","rect":[89.96990203857422,204.505859375,521.9803979454041,195.38766479492188]},{"page":178,"text":"choke points that affect troop movements.","rect":[89.96994018554688,216.00877380371095,258.2497663497925,206.92062377929688]},{"page":178,"text":"8-51. Units determine the probable combat power ratios the defenders will face and establish positions","rect":[89.96994018554688,233.4736785888672,522.0092303733826,224.38552856445313]},{"page":178,"text":"accordingly. Once defending units arrive at acceptable force ratios—or the degree of risk is clear—they","rect":[89.96994018554688,245.0167236328125,521.9982814788818,235.90853881835938]},{"page":178,"text":"allocate available forces and begin planning engagement areas. They determine where to engage enemy","rect":[89.96991729736328,256.5396728515625,521.9962673187256,247.43148803710938]},{"page":178,"text":"forces on each enemy avenue of approach. Defending units array forces on those avenues of approach and","rect":[89.96987915039063,268.0025634765625,521.9455471038818,258.8943786621094]},{"page":178,"text":"establish engagement areas using obstacles and fires to canalize enemy forces into them. They take actions","rect":[89.96990203857422,279.52557373046877,521.9813983421326,270.4173889160156]},{"page":178,"text":"to increase the kill probabilities of various weapons systems at different ranges. This includes establishing","rect":[89.95991516113281,291.048583984375,521.9802761077881,281.9403991699219]},{"page":178,"text":"range markers for direct fire weapons, confirming the zero on weapons, and clearing obstacles that might","rect":[89.94989013671875,302.511474609375,521.9183726272584,293.4032897949219]},{"page":178,"text":"impede wire-guided munitions.","rect":[89.93987274169922,314.0344543457031,215.19988536834718,304.92626953125]},{"page":178,"text":"8-52. The seven steps of engagement area development include the following:","rect":[89.93987274169922,331.5494079589844,404.25025128936769,322.44122314453127]},{"page":178,"text":" Identify likely enemy avenues of approach.","rect":[115.19999694824219,344.9942932128906,306.52300548553469,335.8861083984375]},{"page":178,"text":" Identify most likely enemy course of action.","rect":[115.19999694824219,358.4942932128906,310.12420177459719,349.3861083984375]},{"page":178,"text":" Determine where to kill the enemy.","rect":[115.19999694824219,371.9942932128906,274.9049024581909,362.8861083984375]},{"page":178,"text":" Position subordinate forces and weapons systems.","rect":[115.19999694824219,385.4942932128906,333.1370496749878,376.3861083984375]},{"page":178,"text":" Plan and integrate obstacles.","rect":[115.19999694824219,398.9942932128906,247.06530284881593,389.8861083984375]},{"page":178,"text":" Plan and integrate fires.","rect":[115.19999694824219,412.4942932128906,228.2246961593628,403.3861083984375]},{"page":178,"text":" Rehearse the execution of operations within the engagement area.","rect":[115.19999694824219,425.9942932128906,396.15996837615969,416.8861083984375]},{"page":178,"text":"For more information on engagement area development see ATP 3-21.10.","rect":[89.99374389648438,440.4531555175781,385.71901988983157,431.344970703125]},{"page":178,"text":"8-53. Generally, defending forces have the advantage of preparing the terrain by reinforcing natural","rect":[89.9937515258789,457.9781494140625,522.0829844436646,448.8699645996094]},{"page":178,"text":"obstacles, fortifying positions, and rehearsing operations. First, they prepare the ground to force the","rect":[89.9937515258789,469.4410095214844,522.0370149688721,460.33282470703127]},{"page":178,"text":"piecemeal commitment of the enemy and its subsequent defeat in detail. Second, they identify good locations","rect":[89.9937515258789,480.9640197753906,521.9960467796326,471.8558349609375]},{"page":178,"text":"for engagement areas along the enemy’s expected avenue of approach, such as in open areas dominated by","rect":[89.9937515258789,492.48699951171877,521.9459743499756,483.3788146972656]},{"page":178,"text":"terrain that offers adequate cover and concealment for the defending forces. Defending forces use natural and","rect":[89.99371337890625,503.94989013671877,522.0340480804443,494.8417053222656]},{"page":178,"text":"reinforcing obstacles to compel the enemy into these prepared engagement areas. Units employ and","rect":[89.99371337890625,515.472900390625,522.0201320648193,506.3647155761719]},{"page":178,"text":"continuously strengthen obstacles and fortifications to improve the natural defensive strength of a position,","rect":[89.9937973022461,526.9959106445313,521.9411573410034,517.8877563476563]},{"page":178,"text":"which has a direct bearing on the distribution of forces, frontages, and depth of the defense. Lastly, defending","rect":[89.99375915527344,538.4588012695313,521.9668483734131,529.3505859375]},{"page":178,"text":"forces rehearse defensive operations.","rect":[89.9937973022461,549.9617919921875,237.75371837615968,540.8736572265625]},{"page":178,"text":"8-54.","rect":[89.99375915527344,565.45263671875,110.85539531707764,558.5689086914063]},{"page":178,"text":"Examples of terrain features that favor the defense include—","rect":[115.19406127929688,567.4766845703125,359.0408134460449,558.3885498046875]},{"page":178,"text":" A series of parallel ridges across the line of hostile advance.","rect":[115.19999694824219,580.9743041992188,373.3644971847534,571.8661499023438]},{"page":178,"text":" Unfordable streams, swamps, lakes, and other obstacles on the front and flanks.","rect":[115.19999694824219,594.4542846679688,451.6628370285034,585.3661499023438]},{"page":178,"text":" High ground with good observation and long-range fields of fire.","rect":[115.19999694824219,607.9743041992188,393.15288829803469,598.8661499023438]},{"page":178,"text":" Concealed movement routes immediately behind defensive positions.","rect":[115.19999694824219,621.4743041992188,411.2230176925659,612.3661499023438]},{"page":178,"text":" A limited road network in front of the line of contact to confine enemy forces to predictable","rect":[115.19999694824219,634.9743041992188,521.9759187774658,625.8661499023438]},{"page":178,"text":"avenues of approach.","rect":[133.1999969482422,646.4171142578125,217.96418285369874,637.3289794921875]},{"page":178,"text":" A good road network behind the line of contact that allows a defending unit to reposition forces","rect":[115.19999694824219,659.934326171875,521.9248797874451,650.826171875]},{"page":178,"text":"as the battle progresses.","rect":[133.1999969482422,671.457275390625,228.1635389328003,662.34912109375]},{"page":178,"text":"8-55. The opposite of terrain conditions listed in paragraph 8-54 degrades a force’s ability to conduct","rect":[90.00376892089844,688.9822998046875,522.0732188186646,679.8741455078125]},{"page":178,"text":"defensive operations. For example, terrain with a limited road network that canalizes the defending force","rect":[89.99371337890625,700.4451904296875,521.9860506134033,691.3370361328125]},{"page":178,"text":"allows enemy forces to predict its movement and take steps to interdict that movement.","rect":[90.00372314453125,711.9681396484375,438.8167676925659,702.8599853515625]},{"page":178,"text":"8-10","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":178,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":178,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":179,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":179,"text":"8-56. Units conduct survivability moves among their primary, alternate, supplementary, and subsequent","rect":[108.0,83.51434326171875,540.0843882522584,74.40616607666016]},{"page":179,"text":"positions based on the mission variables. A survivability move is a move that involves rapidly displacing a","rect":[108.0,94.97723388671875,540.0995760040283,85.86905670166016]},{"page":179,"text":"unit, command post, or facility in response to direct and indirect fires, the approach of a threat or as a","rect":[108.0,106.500244140625,540.0410432891846,97.3920669555664]},{"page":179,"text":"proactive measure based on intelligence, meteorological data, and risk assessment of enemy capabilities and","rect":[108.0,118.023193359375,539.9687404632568,108.9150161743164]},{"page":179,"text":"intentions (ADP 3-90).","rect":[108.0,129.46604919433595,199.9535322189331,120.3779067993164]},{"page":179,"text":"Maintain Security","rect":[90.0,154.10069274902345,175.15537452697755,144.29554748535157]},{"page":179,"text":"8-57. Units use security operations to prevent enemy forces from determining friendly locations, strengths,","rect":[108.0,171.654296875,539.8837842941284,162.54611206054688]},{"page":179,"text":"weaknesses, and to preserve combat power. They also try to delay and disrupt an attacking force by making","rect":[108.0,183.1171875,539.9576930999756,174.00900268554688]},{"page":179,"text":"it deploy prematurely. Defending units can mitigate an attacker’s inherent advantage of initiative regarding","rect":[107.98999786376953,194.64019775390626,539.9923610687256,185.53195190429688]},{"page":179,"text":"the time, place, plan, direction, strength, and composition of the attack by disrupting enemy formations and","rect":[107.98998260498047,206.1632080078125,540.0025539398193,197.05496215820313]},{"page":179,"text":"countering reconnaissance efforts, causing them to blindly attack into prepared defenses. Defending units","rect":[107.9800033569336,217.62603759765626,539.9732806663513,208.51785278320313]},{"page":179,"text":"counter enemy reconnaissance through both active and passive measures. They must not permit enemy","rect":[107.97997283935547,229.1490478515625,539.9777126312256,220.04086303710938]},{"page":179,"text":"information collection assets to determine the precise location and strength of defensive positions, obstacles,","rect":[107.97997283935547,240.67205810546876,539.9058179855347,231.56387329101563]},{"page":179,"text":"engagement areas, and reserves. First, the defending force conducts reconnaissance to gain and maintain","rect":[107.97997283935547,252.13494873046876,539.8582668304443,243.02676391601563]},{"page":179,"text":"contact with the enemy. Second, each echelon normally establishes a security area forward of its MBA. The","rect":[107.97997283935547,263.657958984375,540.0888338165283,254.54977416992188]},{"page":179,"text":"security area is separated from the MBA by the FEBA. It extends as far to the front and flanks as necessary","rect":[107.97997283935547,275.180908203125,540.0624294281006,266.0727233886719]},{"page":179,"text":"for the security force to deploy. Forces in the security area furnish information on enemy forces and delay,","rect":[107.96995544433594,286.643798828125,539.9152784347534,277.5356140136719]},{"page":179,"text":"deceive, and disrupt enemy forces and conduct counterreconnaissance. All units conduct local security","rect":[107.96995544433594,298.16680908203127,539.9341945648193,289.0586242675781]},{"page":179,"text":"operations within their assigned areas to prevent enemy forces from disrupting operations, to include echelon","rect":[107.96995544433594,309.6898193359375,539.9612941741943,300.5816345214844]},{"page":179,"text":"support areas. Units implement OPSEC and other protection measures to deny enemy forces information","rect":[107.9800033569336,321.1527099609375,539.9873561859131,312.0445251464844]},{"page":179,"text":"about friendly dispositions.","rect":[107.97997283935547,332.67572021484377,217.16491222381593,323.5675354003906]},{"page":179,"text":"Disrupt the Enemy Attack at Every Opportunity","rect":[90.0,357.26068115234377,318.4839267730713,347.45556640625]},{"page":179,"text":"8-58. The defending force conducts operations throughout the depth of the enemy’s formation to destroy key","rect":[108.0,374.7543029785156,539.9612331390381,365.6461181640625]},{"page":179,"text":"enemy units and assets, particularly their artillery and reserves, or disrupt their timely introduction into battle","rect":[107.99996185302735,386.2773132324219,540.0394563751221,377.16912841796877]},{"page":179,"text":"at the point of engagement. This allows the defending force to regain the initiative. The defending force","rect":[107.99996185302735,397.80029296875,539.9590120391846,388.6921081542969]},{"page":179,"text":"conducts spoiling attacks to disrupt the enemy force’s concentrations and attack preparations. The defending","rect":[108.0,409.26318359375,540.0355129241943,400.1549987792969]},{"page":179,"text":"force counterattacks enemy successes rapidly with a friendly reserve, the forces at hand, or a striking force","rect":[108.0,420.78619384765627,540.0384798126221,411.6780090332031]},{"page":179,"text":"before enemy forces can exploit success. Units use direct fires to mass combat power. Units designate direct","rect":[108.0,432.3091735839844,540.0842661819459,423.20098876953127]},{"page":179,"text":"fire control measures to focus, shift, or distribute direct fires on enemy formations or within engagement","rect":[108.0,443.7720642089844,540.0854868850709,434.66387939453127]},{"page":179,"text":"areas.","rect":[108.00003814697266,453.2710266113281,131.0821180343628,448.52154541015627]},{"page":179,"text":"Mass the Effects of Combat Power","rect":[90.0,477.6937255859375,252.18554460144044,470.1065368652344]},{"page":179,"text":"8-59. A defending force must mass its combat power to overwhelm enemy forces and regain the initiative.","rect":[108.0,497.394287109375,539.9358472824097,488.2861022949219]},{"page":179,"text":"When required, units use economy of force measures in areas that do not involve the main effort to mass","rect":[108.0,508.91729736328127,540.0553729515076,499.8091125488281]},{"page":179,"text":"forces for use at the decisive point. In an area defense, defending units use engagement areas to concentrate","rect":[107.99996185302735,520.4403076171875,539.9451570587158,511.3321228027344]},{"page":179,"text":"combat power from mutually supporting positions. In a mobile defense, units use the striking force to","rect":[107.99996185302735,531.9031982421875,540.0150051116943,522.7950439453125]},{"page":179,"text":"generate combat power at decisive points. Another way forces can apply the effects of mass is by committing","rect":[107.99996185302735,543.4262084960938,540.0006618499756,534.3179931640625]},{"page":179,"text":"the reserve.","rect":[108.01000213623047,552.9251098632813,154.12707042694093,545.8410034179688]},{"page":179,"text":"8-60. Typically, defending units engage advancing enemy forces using two primary methods—echelonment","rect":[108.01001739501953,572.4140625,540.0253062210084,563.305908203125]},{"page":179,"text":"of fires and simultaneous fires. In echelonment of fires, units engage an advancing enemy force at the","rect":[108.0,583.93701171875,539.9940462188721,574.828857421875]},{"page":179,"text":"maximum effective range of available weapon systems. They then employ an increasing volume of fire by","rect":[107.98999786376953,595.4600219726563,539.9700222015381,586.3518676757813]},{"page":179,"text":"engaging with shorter range systems as the attacking enemy force continues to close on their positions while","rect":[107.98998260498047,606.9229125976563,540.0253572540283,597.8147583007813]},{"page":179,"text":"continuing to engage the attacker with longer range systems. This allows for defending units to attrit and","rect":[108.0,618.4459228515625,540.0051174163818,609.3377685546875]},{"page":179,"text":"defeat enemy forces as far forward of friendly defensive positions as is possible. It also allows the defender","rect":[108.0,629.9088134765625,539.9769189414978,620.8006591796875]},{"page":179,"text":"to engage the enemy for longer periods which normally allows for more kills forward of the defender’s","rect":[108.0,641.4317626953125,539.9923236351013,632.3236083984375]},{"page":179,"text":"positions. Defending units normally employ this method of engagement against enemy formations of similar","rect":[107.98999786376953,652.954833984375,539.9650170860291,643.8466796875]},{"page":179,"text":"or larger size than defending forces. The major disadvantage of this method is that once defenders employ","rect":[107.98998260498047,664.417724609375,539.9211940765381,655.2994384765625]},{"page":179,"text":"indirect fire systems, it allows enemy forces to locate the firing positions of those systems. This allows enemy","rect":[107.98999786376953,675.940673828125,540.0443019866943,666.83251953125]},{"page":179,"text":"forces to engage the defending forces with fires. Also at lower tactical levels, it may make flank shots against","rect":[107.98997497558594,687.4636840820313,540.0624766311646,678.3555297851563]},{"page":179,"text":"enemy armored systems more difficult to obtain at longer ranges. (See ATP 3-09.42 for more information on","rect":[107.98997497558594,698.926513671875,540.0222682952881,689.818359375]},{"page":179,"text":"echelonment of fires.)","rect":[107.98998260498047,710.4295043945313,195.98561645126345,701.3413696289063]},{"page":179,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":179,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":179,"text":"8-11","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":180,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":180,"text":"8-61. Another method of engaging an advancing enemy force uses the simultaneous employment of all","rect":[90.0,83.51434326171875,521.9437022171021,74.40616607666016]},{"page":180,"text":"weapon systems. This method can draw more enemy forces into an engagement area before firing, preventing","rect":[90.0,94.97723388671875,522.0091457366943,85.86905670166016]},{"page":180,"text":"forces further back from bypassing and resulting in a greater shock effect and more kills on first engagement.","rect":[90.01000213623047,106.500244140625,522.0029249191284,97.3920669555664]},{"page":180,"text":"However, the engagement occurs at a much closer range, and the mass and momentum of attacking enemy","rect":[90.01001739501953,118.023193359375,521.9951686859131,108.9150161743164]},{"page":180,"text":"forces may still carry them into friendly positions. This method is ideal for use in situations where parts of","rect":[90.01001739501953,129.486083984375,522.0361230430603,120.3779067993164]},{"page":180,"text":"the attacking enemy force are isolated from the direct fire support of the rest of the enemy force. This might","rect":[90.01001739501953,141.00909423828126,522.0403819046021,131.90090942382813]},{"page":180,"text":"occur when employing a reverse slope defense or defending from an attacking enemy element that is","rect":[90.02002716064453,152.5321044921875,522.0144793968201,143.42391967773438]},{"page":180,"text":"considerably smaller or possesses significantly less lethal capabilities than the defending force. In this case,","rect":[90.02002716064453,163.9949951171875,522.0032300949097,154.88681030273438]},{"page":180,"text":"the defending unit entices the majority of the attacking enemy force to enter friendly engagement areas.","rect":[90.02002716064453,175.51800537109376,504.24685192108157,166.39981079101563]},{"page":180,"text":"Armored and Stryker Forces","rect":[72.0,200.12071228027345,208.47368869400024,190.32655334472657]},{"page":180,"text":"8-62. When most of a defending force consists of units equipped with armored combat vehicles, units","rect":[90.0,217.61431884765626,521.9741351585388,208.50613403320313]},{"page":180,"text":"conduct a defense designed to take advantage of the tactical mobility and protection offered by them. Combat","rect":[90.0,229.1373291015625,522.0602183303834,220.02914428710938]},{"page":180,"text":"vehicles provide defending forces with the capability to maneuver and delay the advance of an enemy force","rect":[90.0,240.66033935546876,522.0703401641846,231.55215454101563]},{"page":180,"text":"and then immediately change from a delay to a mobile defense or counterattack. Forces equipped with","rect":[90.0,252.1231689453125,521.8746242523193,243.01498413085938]},{"page":180,"text":"armored combat vehicles are well suited for use as security and MBA forces. Armored and Stryker forces are","rect":[90.0,263.64617919921877,522.0773592071533,254.53799438476563]},{"page":180,"text":"better suited for operations within a CBRN environment than dismounted infantry forces are because of their","rect":[90.01000213623047,275.169189453125,521.9351098594666,266.0609436035156]},{"page":180,"text":"organic collective protection systems.","rect":[90.01002502441406,286.632080078125,241.15172863006593,277.5238952636719]},{"page":180,"text":"Dismounted Infantry Forces","rect":[72.0,311.2406921386719,205.16761264419555,301.4355773925781]},{"page":180,"text":"8-63. When facing enemy dismounted forces, units deploy and use defending dismounted infantry forces in","rect":[90.0,328.7943115234375,521.9746608734131,319.6861267089844]},{"page":180,"text":"the same way as they use defending armored and Stryker forces against enemy armored and motorized forces.","rect":[90.0,340.2572021484375,522.0120801925659,331.1490173339844]},{"page":180,"text":"Dismounted infantry forces facing an armored enemy force are primarily used in static roles within the MBA","rect":[90.0,351.7801818847656,521.9822430648803,342.6719970703125]},{"page":180,"text":"or in security roles in the echelon support area. They are also most effective when fighting from prepared","rect":[90.0,363.3031921386719,521.8474025726318,354.19500732421877]},{"page":180,"text":"defenses or in restricted terrain, such as swamps, woods, hilly and mountainous areas, and urban areas.","rect":[90.0,374.7660827636719,522.0091505050659,365.65789794921877]},{"page":180,"text":"Dismounted infantry forces can take advantage of their stealth and ability to move through restrictive terrain","rect":[90.0,386.2890625,521.9621486663818,377.1808776855469]},{"page":180,"text":"to place weapon systems in unexpected locations undetected. However, they are far more vulnerable than","rect":[89.98998260498047,397.81207275390627,521.9739284515381,388.7038879394531]},{"page":180,"text":"armored forces to direct and indirect fires, especially when away from prepared defenses and overhead cover.","rect":[89.98998260498047,409.27496337890627,521.9992628097534,400.1667785644531]},{"page":180,"text":"8-64. Units use airborne and air assault units in the same manner as other dismounted forces once they deploy","rect":[89.98998260498047,426.7999267578125,522.0551662445068,417.6917419433594]},{"page":180,"text":"into their drop zones or landing zones. However, there may be problems in extracting a committed airborne","rect":[89.98998260498047,438.32293701171877,522.0623445587158,429.2147521972656]},{"page":180,"text":"or air assault force, particularly if it is in direct contact with the enemy. Use of an airborne force in a reserve","rect":[89.98999786376953,449.78582763671877,522.1244783477783,440.6776428222656]},{"page":180,"text":"role requires its proximity to readily available certified airdrop crews and aircraft and is therefore generally","rect":[89.9899673461914,461.3088073730469,521.9661769866943,452.20062255859377]},{"page":180,"text":"unsuited as a reserve. Because of its inherent mobility and potential reaction speed, an air assault force is","rect":[89.99996185302735,472.7716979980469,521.9301288108826,463.66351318359377]},{"page":180,"text":"often well suited for a reserve role during the conduct of the defense, but also faces restrictions based on","rect":[90.0,484.294677734375,521.9581813812256,475.1864929199219]},{"page":180,"text":"weather. Their role as a dismounted reserve might include the following tasks:","rect":[90.0,495.81768798828127,403.83643292999269,486.7095031738281]},{"page":180,"text":" Rapid reinforcement of a threatened position.","rect":[115.19999694824219,509.2542724609375,314.8074903488159,500.1661376953125]},{"page":180,"text":" Establishment of a blocking position, possibly in conjunction with existing defensive positions.","rect":[115.19999694824219,522.7742919921875,514.6064405441284,513.6560668945313]},{"page":180,"text":" Echelon support area security operations, such as containment of an enemy airborne or air assault.","rect":[115.19999694824219,536.2742919921875,522.0030469894409,527.1661376953125]},{"page":180,"text":" Reinforcement of encircled friendly forces.","rect":[115.19999694824219,549.7742919921875,306.1591749191284,540.6661376953125]},{"page":180,"text":" Flank protection.","rect":[115.19999694824219,563.2542724609375,201.58449840545655,554.1661376953125]},{"page":180,"text":"Aviation Forces","rect":[72.0,585.6828002929688,146.16988620376586,578.0955810546875]},{"page":180,"text":"8-65. Aviation forces—rotary, fixed wing, and unmanned aircraft systems—are particularly valuable in the","rect":[90.0,605.394287109375,521.9912996368408,596.2861328125]},{"page":180,"text":"defense because of their speed, mobility, and versatility. Their tasks can include—","rect":[89.9899673461914,616.9172973632813,419.9886589050293,607.8091430664063]},{"page":180,"text":" Reconnaissance and security operations.","rect":[115.19999694824219,630.414306640625,294.82265758514407,621.30615234375]},{"page":180,"text":" Disrupting, destroying, and delaying enemy forces in the deep and close areas.","rect":[115.19999694824219,643.914306640625,447.53740978240969,634.80615234375]},{"page":180,"text":" Counterattacks and spoiling attacks.","rect":[115.19999694824219,657.414306640625,277.66738414764407,648.30615234375]},{"page":180,"text":" Controlling the ground for limited periods where a unit does not wish to commit ground forces","rect":[115.19999694824219,670.914306640625,522.0228412132263,661.80615234375]},{"page":180,"text":"irrevocably (for example, forward of an executed obstacle).","rect":[133.1999969482422,682.377197265625,371.1340284347534,673.26904296875]},{"page":180,"text":" Closing gaps in a defense plan before the arrival of ground maneuver forces.","rect":[115.19999694824219,695.874267578125,439.5476026535034,686.76611328125]},{"page":180,"text":" Defeating enemy penetrations.","rect":[115.19999694824219,709.374267578125,255.6484022140503,700.26611328125]},{"page":180,"text":"8-12","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":180,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":180,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":181,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":181,"text":" Facilitating the disengagement of ground forces.","rect":[133.1999969482422,83.51434326171875,345.04397106170657,74.40616607666016]},{"page":181,"text":" Countering enemy activities in the echelon support area, in particular enemy airborne or air assault","rect":[133.1999969482422,97.01434326171875,539.9952158889771,87.90616607666016]},{"page":181,"text":"forces.","rect":[151.1999969482422,106.45319366455078,178.18285655975343,99.37907409667969]},{"page":181,"text":" Resupplying defending forces with Class IV barrier material or facilitating casualty evacuation.","rect":[133.1999969482422,121.97430419921875,533.3306837081909,112.86612701416016]},{"page":181,"text":" Assisting in the countermobility effort.","rect":[133.1999969482422,135.47430419921876,307.00503063201907,126.36612701416016]},{"page":181,"text":"These tasks may require additional ground forces to achieve the desired effect.","rect":[108.00376892089844,149.9932861328125,422.26897716522219,140.88510131835938]},{"page":181,"text":"Ensure Mutual Support","rect":[90.0,174.5987548828125,202.4549696083069,164.82655334472657]},{"page":181,"text":"8-66. Mutual support exists when positions and units reinforce each other with direct and indirect fires, thus","rect":[108.0,192.0942840576172,540.0575091819763,183.00613403320313]},{"page":181,"text":"preventing the enemy from attacking one position without one or more adjacent positions subjecting it to","rect":[108.0,203.6373291015625,539.9622097015381,194.51913452148438]},{"page":181,"text":"fires. Mutual support increases the strength of all defensive positions, prevents defeat in detail, and helps","rect":[108.0,215.16033935546876,540.0792987327576,206.05215454101563]},{"page":181,"text":"prevent infiltration between positions. Tactical positions achieve maximum degree of mutual support when","rect":[108.0,226.6231689453125,539.9993801116943,217.51498413085938]},{"page":181,"text":"they are located to observe or monitor the ground between their positions or conduct patrols to prevent any","rect":[108.0,238.14617919921876,540.0411281585693,229.03799438476563]},{"page":181,"text":"enemy infiltration. During periods of limited visibility, units position small tactical units closer together to","rect":[108.0,249.669189453125,539.9932765960693,240.56100463867188]},{"page":181,"text":"retain the advantages of mutual support. Unit leaders coordinate the nature and extent of their mutual support.","rect":[108.0,261.132080078125,540.0675001144409,252.02389526367188]},{"page":181,"text":"Countermobility","rect":[90.0,285.7406921386719,168.2116184234619,275.9355773925781]},{"page":181,"text":"8-67. In the defense, units normally prioritize engineer efforts on countermobility and survivability over","rect":[108.0,303.2943115234375,539.9429833946228,294.1861267089844]},{"page":181,"text":"mobility. This means that defending units typically require large quantities of Class IV and Class V material","rect":[108.0,314.7572021484375,540.0795054397584,305.6490173339844]},{"page":181,"text":"and specialized equipment to construct obstacles and fighting and survivability positions. Units ensure that","rect":[108.00003814697266,326.2801818847656,539.9220347366334,317.1719970703125]},{"page":181,"text":"they synchronize these efforts with their sustainment plans.","rect":[108.0,337.8031921386719,345.23049449920657,328.69500732421877]},{"page":181,"text":"8-68. Units plan to canalize enemy forces into a salient. In this case, they take advantage of the enemy force’s","rect":[108.0100326538086,355.26806640625,539.9923236351013,346.1598815917969]},{"page":181,"text":"forward orientation by fixing the enemy force and then delivering a blow to the enemy force’s flank or rear.","rect":[107.98999786376953,366.7910461425781,540.0823926925659,357.682861328125]},{"page":181,"text":"As an enemy’s attacking force culminates and assumes a defensive posture, friendly defending units rapidly","rect":[107.98990631103516,378.3140563964844,540.0193996429443,369.20587158203127]},{"page":181,"text":"coordinate and concentrate all fires against unprepared and unsupported segments of the attacking enemy","rect":[107.98990631103516,389.7769470214844,539.9094142913818,380.66876220703127]},{"page":181,"text":"force. Friendly forces may deliver these fires simultaneously or sequentially.","rect":[107.98990631103516,401.2999267578125,414.87258434295657,392.1917419433594]},{"page":181,"text":"8-69. When planning obstacles, units consider not only current operations but also future operations. They","rect":[107.98990631103516,418.8249206542969,540.0591945648193,409.71673583984377]},{"page":181,"text":"design obstacles for current operations, so they do not hinder future operations. Units can designate certain","rect":[107.98990631103516,430.28778076171877,539.8620510101318,421.1795959472656]},{"page":181,"text":"obstacles to shape the battlefield as high priority reserved obstacles. Units assign responsibility for","rect":[107.97989654541016,441.810791015625,539.9521386680603,432.7026062011719]},{"page":181,"text":"preparation of reserved obstacles to a subordinate unit but retain authority for ordering their completion. One","rect":[107.9800033569336,453.33380126953127,539.9378938751221,444.2256164550781]},{"page":181,"text":"example of a reserved obstacle is a destruction of a highway bridge over a major river. Such obstacles receive","rect":[107.9799575805664,464.7966613769531,539.9569978790283,455.678466796875]},{"page":181,"text":"the highest priority in preparation and, if ordered, execution by the designated subordinate unit.","rect":[107.9799575805664,476.31964111328127,489.5034132003784,467.2114562988281]},{"page":181,"text":"8-70. Units integrate reinforcing obstacles with existing obstacles to improve the natural restrictive nature","rect":[107.9799575805664,493.7845153808594,540.0201692657471,484.67633056640627]},{"page":181,"text":"of the terrain to halt or slow enemy movement, canalize enemy movement into engagement areas, and protect","rect":[107.9799575805664,505.3074951171875,540.0145640335084,496.1993103027344]},{"page":181,"text":"friendly positions and maneuver. They must integrate their obstacles with fires to be effective. This requires","rect":[107.9800033569336,516.83056640625,539.9141986351013,507.7223815917969]},{"page":181,"text":"the ability to deliver effective fires well beyond the obstacle’s location. When possible, units conceal","rect":[107.9799575805664,528.2933959960938,539.9280161819459,519.1852416992188]},{"page":181,"text":"obstacles from hostile observation. They coordinate obstacle plans with adjacent units and conform to the","rect":[107.96991729736328,539.81640625,539.9981355743408,530.6981811523438]},{"page":181,"text":"obstacle zone or belts of higher echelons.","rect":[107.96991729736328,551.3394165039063,273.2589063644409,542.2312622070313]},{"page":181,"text":"8-71. Effective obstacles block, turn, fix, disrupt, or force the enemy to attempt to breach them. A defending","rect":[107.96991729736328,568.8042602539063,540.0131130218506,559.6961059570313]},{"page":181,"text":"unit tries to predict enemy points of breach based on terrain and probable enemy objectives. A defending","rect":[107.96991729736328,580.3272705078125,539.9088039398193,571.2090454101563]},{"page":181,"text":"force develops means to counter enemy breach attempts, such as pre-coordinated fires. The attacker will try","rect":[107.96990203857422,591.8502807617188,539.9943752288818,582.7421264648438]},{"page":181,"text":"to conceal the time and location of the breach. The defending unit’s plan addresses how to counter such a","rect":[107.95990753173828,603.3131713867188,539.9972200469971,594.2050170898438]},{"page":181,"text":"breach, to include reestablishing the obstacle by using scatterable mines and other techniques.","rect":[107.95988464355469,614.836181640625,483.4824171066284,605.72802734375]},{"page":181,"text":"8-72. Improvement to the defense is continuous. Given time and resources, a defending force constructs","rect":[107.95988464355469,632.3611450195313,539.9830462913513,623.2529907226563]},{"page":181,"text":"additional obstacle systems in depth, paying special attention to its assailable flanks and rear. The rear is","rect":[107.95988464355469,643.8240356445313,539.9689471702576,634.7158813476563]},{"page":181,"text":"especially vulnerable if noncontiguous assigned areas or nontraditional threats exist. Obstacle systems can","rect":[107.95988464355469,655.3470458984375,539.9441432952881,646.2388916015625]},{"page":181,"text":"provide additional protection from enemy attacks by forcing an enemy to spend time and resources to breach","rect":[107.95988464355469,666.8700561523438,539.9301662445068,657.7619018554688]},{"page":181,"text":"or bypass them. This gives the defending force more time to engage enemy forces attempting to execute","rect":[107.95988464355469,678.3329467773438,539.9288606719971,669.2247924804688]},{"page":181,"text":"breach or bypass operations.","rect":[107.95988464355469,689.85595703125,221.82317638397218,680.747802734375]},{"page":181,"text":"8-73. Units designate the subordinate unit responsible for establishing and securing each obstacle. They may","rect":[107.95988464355469,707.3809814453125,539.9882106781006,698.2728271484375]},{"page":181,"text":"retain execution authority for some obstacles or restrict the use of some types of obstacles to allow other","rect":[107.95988464355469,718.8438720703125,539.8988549766541,709.7357177734375]},{"page":181,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":181,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":181,"text":"8-13","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":182,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47380285644532,37.90802001953125]},{"page":182,"text":"battlefield activities to occur. Units allow subordinate units some flexibility in selecting the exact positioning","rect":[90.0,83.51434326171875,522.0454006195068,74.40616607666016]},{"page":182,"text":"of obstacles. However, all units must know which gaps or lanes—through obstacles and crossing sites—to","rect":[90.0,94.97723388671875,522.0323390960693,85.86905670166016]},{"page":182,"text":"keep open for movements, as well as the firing and self-destruct times of scatterable mines to prevent delays","rect":[90.01001739501953,106.500244140625,522.0022113304138,97.3920669555664]},{"page":182,"text":"in movement. Units follow specific and clear orders for executing reserve obstacles and closing lanes. As","rect":[90.00997924804688,118.023193359375,521.9152362327576,108.9150161743164]},{"page":182,"text":"each lane closes, the closing unit reports the lane’s closure to the higher echelon, subordinate, and adjacent","rect":[89.99996185302735,129.486083984375,521.9332652053834,120.36788940429688]},{"page":182,"text":"headquarters to preclude displacing units from moving into unmarked or abandoned obstacles.","rect":[89.99996185302735,141.00909423828126,467.68084239959719,131.90090942382813]},{"page":182,"text":"8-74. Primarily company-sized and smaller units construct protective obstacles. Leaders within these small","rect":[89.99996185302735,158.5340576171875,522.0404429397584,149.42587280273438]},{"page":182,"text":"units ensure that observation and fires cover all obstacles to hinder breaching. Deliberate protective obstacles","rect":[89.99996185302735,169.9969482421875,522.0150287132263,160.88876342773438]},{"page":182,"text":"are common around fixed sites. Protective obstacles are a key component of survivability operations. They","rect":[89.99996185302735,181.51995849609376,521.9490261077881,172.41177368164063]},{"page":182,"text":"are tied in with final protective fires and provide friendly forces with close-in protection. Units at all echelons","rect":[90.0,193.04296875,522.0012958030701,183.93478393554688]},{"page":182,"text":"track defensive preparations, such as establishing Class IV and Class V supply points and start or completion","rect":[89.9899673461914,204.505859375,522.0283718109131,195.39767456054688]},{"page":182,"text":"times of obstacle belts and groups. Commanders use artillery, air, or ground systems to reseed minefields","rect":[89.98998260498047,216.02880859375,521.9990375022888,206.92062377929688]},{"page":182,"text":"that an enemy has breached. (See Chapter 17 for further information on combined arms countermobility","rect":[89.98998260498047,227.49169921875,521.9030666351318,218.38351440429688]},{"page":182,"text":"operations.)","rect":[89.97997283935547,238.9946746826172,137.47478271102907,229.90652465820313]},{"page":182,"text":"Mobility","rect":[72.0,263.6006774902344,112.35258674621582,253.79554748535157]},{"page":182,"text":"8-75. During the defense, mobility tasks include maintaining routes, coordinating gaps in existing obstacles,","rect":[90.0,281.154296875,522.0451612472534,272.0461120605469]},{"page":182,"text":"and supporting counterattacks. Engineers also open helicopter landing zones and tactical landing strips for","rect":[90.0,292.6171875,521.9462792930603,283.5090026855469]},{"page":182,"text":"fixed-wing aircraft. Maintaining and improving routes and creating bypass or alternate routes at critical points","rect":[90.0,304.1401672363281,522.0260150413513,295.031982421875]},{"page":182,"text":"are major engineering tasks because movement routes are subject to fires from enemy artillery and air support","rect":[90.0,315.6631774902344,522.0024790725709,306.54498291015627]},{"page":182,"text":"systems. These enemy fires may necessitate deploying engineer equipment forward, such as assault bridging","rect":[90.0,327.1260681152344,521.9601955413818,318.01788330078127]},{"page":182,"text":"and bulldozers. Units can also evacuate or restrict movement of dislocated civilians to routes not required by","rect":[90.0,338.6490478515625,522.0280666351318,329.5408630371094]},{"page":182,"text":"friendly forces to avoid detracting from the mobility of the defending force. A unit’s coordination with","rect":[90.0,350.1119384765625,521.9423732757568,341.0037536621094]},{"page":182,"text":"available civil affairs forces, intergovernmental and nongovernmental entities, and potentially local nation","rect":[90.0,361.63494873046877,522.0052394866943,352.5267639160156]},{"page":182,"text":"government officials can also assist units in preserving their combat power.","rect":[90.0,373.1579284667969,391.9042921066284,364.04974365234377]},{"page":182,"text":"8-76. Typically, a unit’s priority of mobility support is to routes used by counterattacking forces, then to","rect":[90.0,390.622802734375,522.0142726898193,381.5146179199219]},{"page":182,"text":"routes used by main body forces displacing to subsequent positions. Mobility support mainly involves","rect":[90.0,402.14581298828127,521.9962909202576,393.0376281738281]},{"page":182,"text":"reducing obstacles and improving or constructing combat roads and trails to allow tactical support vehicles","rect":[90.0,413.6687927246094,521.8941180686951,404.56060791015627]},{"page":182,"text":"to accompany moving combat vehicles. Units coordinate carefully to ensure units leave lanes or gaps in","rect":[90.0,425.1316833496094,521.9411525726318,416.02349853515627]},{"page":182,"text":"obstacles for repositioning main body units and committing the counterattack force. CBRN reconnaissance","rect":[90.0,436.6546630859375,522.0033845977783,427.5464782714844]},{"page":182,"text":"systems also contribute to the force’s mobility in a contaminated environment.","rect":[90.0,448.17767333984377,404.14104747772219,439.0694885253906]},{"page":182,"text":"Obscuration","rect":[72.0,470.49371337890627,130.6738265838623,462.89556884765627]},{"page":182,"text":"8-77. Units use obscuration to disrupt the enemy’s assault or movement formations and to deny the enemy’s","rect":[90.0,490.2543029785156,522.0423724632263,481.1461181640625]},{"page":182,"text":"use of target acquisition optics, visual navigation aids, air avenues of approach, landing zones, and drop","rect":[89.9800033569336,501.7773132324219,521.9233303070068,492.66912841796877]},{"page":182,"text":"zones. Obscuration creates gaps in enemy formations, separates or isolates attacking units, and disrupts","rect":[89.9800033569336,513.2401733398438,521.9762713890076,504.1319885253906]},{"page":182,"text":"enemy planned movements. Bispectral obscuration can blind attackers who lack thermal viewers or other","rect":[89.97997283935547,524.76318359375,521.9892480430603,515.655029296875]},{"page":182,"text":"enhanced optical systems. It prevents overwatching enemy elements from observing and engaging the","rect":[89.97997283935547,536.2861938476563,522.0390291290283,527.1780395507813]},{"page":182,"text":"defender, while defending forces with advanced optical systems can acquire and engage the enemy within","rect":[89.97997283935547,547.7490844726563,521.9576930999756,538.6409301757813]},{"page":182,"text":"the smoke. The commander can use smoke to facilitate friendly target acquisition by highlighting enemy","rect":[89.97997283935547,559.2720947265625,521.9780178070068,550.1639404296875]},{"page":182,"text":"systems against a light background while degrading the enemy’s optics. Smoke used to mask obstacles","rect":[89.97997283935547,570.7950439453125,521.9693133811951,561.6868896484375]},{"page":182,"text":"located in low-level flight corridors and on landing and drop zones can prevent an enemy from using these","rect":[89.97997283935547,582.2579345703125,522.0136995391846,573.1497802734375]},{"page":182,"text":"drop zones or greatly increase the enemy’s risk.","rect":[89.9800033569336,593.7809448242188,281.0663709640503,584.6727294921875]},{"page":182,"text":"8-78. Units use smoke-generation capabilities to mark targets and screen or obscure friendly positions. They","rect":[89.97993469238281,611.305908203125,522.0143337249756,602.19775390625]},{"page":182,"text":"must carefully employ obscurants with regard to enemy systems and friendly capabilities. Improper use can","rect":[89.98994445800781,622.768798828125,521.9651393890381,613.66064453125]},{"page":182,"text":"create an advantage for the enemy. The effectiveness of smoke depends on weather conditions and the","rect":[89.98999786376953,634.2918090820313,521.9752473907471,625.1836547851563]},{"page":182,"text":"quantity of smoke employed. Units coordinate the use of smoke generators, artillery or mortar smoke, and","rect":[89.98994445800781,645.8148193359375,522.0320339202881,636.7066650390625]},{"page":182,"text":"smoke pot employment. These smoke-producing systems are most effective when used together to achieve","rect":[89.98994445800781,657.2777099609375,522.0304842071533,648.1695556640625]},{"page":182,"text":"synergistic effects. Using smoke can also enhance military deception operations and cover friendly","rect":[89.98993682861328,668.8006591796875,521.9631252288818,659.6925048828125]},{"page":182,"text":"movements. (See ATP 3-11.50 for more information on planning, preparing, and executing battlefield","rect":[89.98999786376953,680.3236694335938,522.0063381195068,671.2155151367188]},{"page":182,"text":"obscuration.)","rect":[89.97996520996094,691.7665405273438,142.51482177352907,682.6784057617188]},{"page":182,"text":"8-14","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":182,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":182,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":183,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":183,"text":"Limited-Visibility Adjustments","rect":[90.0,84.62071228027344,236.28544101333618,74.81556701660156]},{"page":183,"text":"8-79. The ability of attacking forces to create conditions of limited visibility—including thermal neutralizing","rect":[108.0,102.11431884765625,540.0303249359131,93.00614166259766]},{"page":183,"text":"smoke—and the smoke and dust associated with a battle also means that defending units must be able to","rect":[107.99996185302735,113.6373291015625,539.9279689788818,104.5291519165039]},{"page":183,"text":"rapidly modify their defense to one that is effective during limited visibility. Defending units should plan for","rect":[108.0,125.16033935546875,540.0392968711853,116.05216217041016]},{"page":183,"text":"limited visibility rather than full visibility during defensive planning. In this case, defending units may need","rect":[107.99996185302735,136.6231689453125,540.0082302093506,127.5149917602539]},{"page":183,"text":"to move closer to the avenues of approach they are guarding. Sensors may still have some value in these","rect":[108.0,148.14617919921876,539.9530305938721,139.03799438476563]},{"page":183,"text":"conditions.","rect":[108.0,157.64515686035157,152.20522594451905,150.56100463867188]},{"page":183,"text":"8-80. Units can expect attacking enemy forces to create or take advantage of limited-visibility conditions.","rect":[108.0,177.134033203125,539.9672193527222,168.02584838867188]},{"page":183,"text":"Defending units expect attacking forces to take advantage of limited-visibility conditions to—","rect":[107.98994445800781,188.65704345703126,484.2510185241699,179.54885864257813]},{"page":183,"text":" Conduct reconnaissance operations to locate the defending force’s weapons, defensive obstacles,","rect":[133.1999969482422,202.13427734375,539.9719190597534,193.02609252929688]},{"page":183,"text":"and positions.","rect":[151.18995666503907,213.6372528076172,206.78293895721436,204.54910278320313]},{"page":183,"text":" Breach or reduce defensive obstacles.","rect":[133.1999969482422,225.13026428222657,301.9548292160034,218.04611206054688]},{"page":183,"text":" Move elements through gaps in the defending forces coverage caused by reduced weapon ranges.","rect":[133.1999969482422,240.654296875,539.9809522628784,231.54611206054688]},{"page":183,"text":"8-81.","rect":[107.9937515258789,256.0750732421875,128.8553876876831,249.1913299560547]},{"page":183,"text":"A valid defensive plan includes these items to help overcome potential limited-visibility problems:","rect":[133.19406127929688,258.119140625,528.1313853225709,249.01095581054688]},{"page":183,"text":" Long-range detection equipment, such as radar, sensors, and thermal imaging devices, focused on","rect":[133.1999969482422,271.61431884765627,540.0380764007568,262.5061340332031]},{"page":183,"text":"well-defined avenues of approach. Employing multiple means in the same area of interest","rect":[151.1999969482422,283.1373291015625,540.0260386428834,274.0291442871094]},{"page":183,"text":"improves the likelihood of detection.","rect":[151.1999969482422,294.6402587890625,298.7244825363159,285.5521240234375]},{"page":183,"text":" Deployed weapons systems and some units along avenues of approach that follow terrain features","rect":[133.1999969482422,308.154296875,540.0562274436951,299.0461120605469]},{"page":183,"text":"potentially used by an enemy force for orientation in darkness, such as wood lines and water","rect":[151.1999969482422,319.6171875,540.0101220664978,310.5090026855469]},{"page":183,"text":"courses.","rect":[151.1999969482422,329.1161193847656,183.70388317108155,324.36663818359377]},{"page":183,"text":" Increased numbers of infantry, scouts, observation posts, combat patrols, and anti-armor teams","rect":[133.1999969482422,344.6343078613281,540.0481708030701,335.526123046875]},{"page":183,"text":"deployed forward on secondary avenues of approach and between subordinate unit defensive","rect":[151.199951171875,356.0971984863281,539.9909334259033,346.989013671875]},{"page":183,"text":"positions to detect and slow enemy movement, especially enemy infiltration attempts, and protect","rect":[151.199951171875,367.62017822265627,540.0881113967896,358.5119934082031]},{"page":183,"text":"obstacles against enemy breaching attempts.","rect":[151.199951171875,379.1431884765625,328.6010389328003,370.0350036621094]},{"page":183,"text":" Emplaced point obstacles and early warning devices along likely night approaches to slow","rect":[133.1999969482422,392.6343078613281,539.9763226547241,383.526123046875]},{"page":183,"text":"advancing enemy forces or to alert defenders to enemy presence.","rect":[151.1999969482422,404.0971984863281,410.6219434738159,394.989013671875]},{"page":183,"text":" Planned and rehearsed weapons systems and unit displacements and the massing of fires on","rect":[133.1999969482422,417.59429931640627,539.9487819671631,408.4861145019531]},{"page":183,"text":"projected enemy approaches. (Defending units moving over previously reconnoitered routes","rect":[151.1800079345703,429.1173095703125,539.9831073265076,419.9991149902344]},{"page":183,"text":"should be able to move faster than an enemy force moving through unfamiliar terrain.)","rect":[151.17996215820313,440.6402893066406,497.7145898399353,431.5321044921875]},{"page":183,"text":" Planned illumination on or behind likely engagement areas to silhouette enemy forces while","rect":[133.1999969482422,454.1343078613281,539.9981355743408,445.026123046875]},{"page":183,"text":"leaving defenders in shadows and darkness.","rect":[151.199951171875,465.5971984863281,326.20733165740969,456.489013671875]},{"page":183,"text":" Adjustments to the organization of the defense for limited visibility that commence before dark","rect":[133.1999969482422,479.09429931640627,539.9384670257568,469.9761047363281]},{"page":183,"text":"and are completely reversed to their daylight configuration before dawn.","rect":[151.1999969482422,490.6173095703125,441.10781383514407,481.5091247558594]},{"page":183,"text":"INTELLIGENCE","rect":[90.0,513.982177734375,164.30680227279664,505.8959655761719]},{"page":183,"text":"8-82. During the planning process, units use intelligence to identify probable enemy objectives and avenues","rect":[108.0,533.934326171875,540.0092914085388,524.8161010742188]},{"page":183,"text":"of approach. From those probable objectives and avenues of approach, they develop NAIs and TAIs. Units","rect":[108.01005554199219,545.3971557617188,539.9412372093201,536.2789306640625]},{"page":183,"text":"study patterns of enemy operations and an enemy force’s vulnerability to counterattack, interdiction,","rect":[108.01009368896485,556.920166015625,540.0514478683472,547.81201171875]},{"page":183,"text":"electromagnetic warfare, air attacks, and canalization by obstacles. Units also examine an enemy force’s","rect":[108.01009368896485,568.4431762695313,540.0122821311951,559.3350219726563]},{"page":183,"text":"capability to conduct air attacks, insert forces behind friendly units, and employ CBRN weapons. Units also","rect":[108.01000213623047,579.9060668945313,539.9802761077881,570.7979125976563]},{"page":183,"text":"determine how soon a follow-on enemy force can join an engagement when they are defending against an","rect":[108.01001739501953,591.4290771484375,539.9496974945068,582.3108520507813]},{"page":183,"text":"enemy attacking in echelons.","rect":[108.01000213623047,602.8919677734375,224.08669567108155,593.7838134765625]},{"page":183,"text":"8-83. Commanders direct their information collection assets to determine the locations, strengths, and","rect":[108.01001739501953,620.4068603515625,539.9762477874756,611.2987060546875]},{"page":183,"text":"probable intentions of attacking enemy forces before and throughout their defense. They prioritize early","rect":[108.01001739501953,631.929931640625,539.9433498382568,622.82177734375]},{"page":183,"text":"identification of the enemy's main effort within their assigned areas. Commanders may need to complement","rect":[108.01002502441406,643.3927612304688,540.0281138381959,634.2846069335938]},{"page":183,"text":"information collection operations with combat actions that test enemy intentions. Fighting for information","rect":[108.01002502441406,654.915771484375,539.9412746429443,645.8076171875]},{"page":183,"text":"can have two benefits: it can make enemy forces reveal their intentions and their preparations.","rect":[108.01002502441406,666.4387817382813,484.24029064178469,657.3306274414063]},{"page":183,"text":"8-84. Units use available information collection assets—such as geospatial intelligence, ground surveillance,","rect":[108.01002502441406,683.9036254882813,540.1176099777222,674.7954711914063]},{"page":183,"text":"and reconnaissance—to study the terrain. By studying the terrain, they try to determine the principal enemy","rect":[108.01001739501953,695.4266357421875,539.9807033538818,686.3184814453125]},{"page":183,"text":"and friendly mounted, dismounted, and air avenues of approach. Units determine the most advantageous area","rect":[108.01000213623047,706.9496459960938,540.1094026641846,697.8414916992188]},{"page":183,"text":"for the enemy force’s main attack, as well as other mission variables. Just as in the offense, the echelon","rect":[108.01001739501953,718.4125366210938,539.9031887054443,709.3043823242188]},{"page":183,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":183,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":183,"text":"8-15","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":184,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":184,"text":"intelligence and operations officers, in coordination with the rest of the staff, develop a synchronized and","rect":[90.0,83.51434326171875,521.9350490570068,74.40616607666016]},{"page":184,"text":"integrated information collection plan that satisfies the unit’s maneuver, targeting, and information","rect":[90.0,94.97723388671875,522.0242824554443,85.86905670166016]},{"page":184,"text":"requirements.","rect":[89.98998260498047,106.48020935058594,144.75530529022218,97.3920669555664]},{"page":184,"text":"8-85. A unit’s ability to see enemy forces is critical to the conduct of the defense. Defensive plans must","rect":[89.98998260498047,124.02520751953125,522.0312876663209,114.91703033447266]},{"page":184,"text":"address the sustainment, replacement, and reconstitution of information collection assets throughout the","rect":[89.98998260498047,135.48809814453126,522.0359773712158,126.37992095947266]},{"page":184,"text":"preparation and execution of the defense. In the defense, the performance of information collection tasks","rect":[89.98998260498047,146.99107360839845,522.0254657249451,137.90292358398438]},{"page":184,"text":"overlaps unit planning and preparing phases. Leaders performing these tasks often deploy within their","rect":[89.98998260498047,158.5340576171875,522.0091455039978,149.42587280273438]},{"page":184,"text":"assigned areas before their units fully develop their plans. These leaders need to respond to changes in","rect":[89.98998260498047,169.9969482421875,522.0143337249756,160.88876342773438]},{"page":184,"text":"orientation and mission. Commanders ensure that their staffs fully plan, prepare, and assess the execution of","rect":[89.98998260498047,181.51995849609376,522.0240380821228,172.41177368164063]},{"page":184,"text":"their information collection synchronization plans to ensure that all their commander's critical information","rect":[89.98998260498047,193.04296875,521.9811916351318,183.93478393554688]},{"page":184,"text":"requirements are answered to inform their overall plans.","rect":[89.98998260498047,204.48582458496095,314.3727979660034,195.39767456054688]},{"page":184,"text":"FIRES","rect":[72.0,227.8422088623047,101.45485496520996,219.75601196289063]},{"page":184,"text":"8-86. In the defense, units use fires to neutralize, suppress, or destroy enemy forces; to delay or disrupt an","rect":[90.0,247.7943115234375,521.9861354827881,238.68612670898438]},{"page":184,"text":"enemy force’s ability to execute a given COA; and to enhance the effects of massed direct fires. Thus, fire","rect":[90.0,259.2572021484375,521.9371614532471,250.14901733398438]},{"page":184,"text":"support systems support both the commander’s main and supporting efforts.","rect":[89.98998260498047,270.78021240234377,394.41762828826907,261.6720275878906]},{"page":184,"text":"8-87. A defending force is more effective if it can locate and attack enemy forces while they are stationary","rect":[89.9899673461914,288.295166015625,521.9345607757568,279.1869812011719]},{"page":184,"text":"and concentrated in assembly areas or advancing along LOCs, as opposed to when attacking enemy forces","rect":[89.9899673461914,299.7580261230469,521.9702289085388,290.64984130859377]},{"page":184,"text":"deploy in combat formations within the MBA. To accomplish this, a defending force must employ available","rect":[89.9899673461914,311.2810363769531,521.9319734649658,302.1728515625]},{"page":184,"text":"indirect and joint fires throughout its assigned area and closely link them to target acquisition means, such as","rect":[89.9899673461914,322.8040466308594,522.0122821311951,313.68585205078127]},{"page":184,"text":"information collection assets.","rect":[89.9899673461914,332.24285888671877,207.5195722579956,325.1587219238281]},{"page":184,"text":"8-88. As defensive plans develop, units visualize how to synchronize, coordinate, and distribute the effects","rect":[89.9899673461914,351.7818603515625,522.0020282249451,342.6736755371094]},{"page":184,"text":"of indirect and direct fire at the decisive time and place. They place permissive FSCMs as close as possible","rect":[89.9899673461914,363.30487060546877,521.9271516876221,354.1966857910156]},{"page":184,"text":"to friendly positions to enable the rapid engagement of attacking enemy forces by indirect and joint fires.","rect":[89.98998260498047,374.76776123046877,521.9909009933472,365.6495666503906]},{"page":184,"text":"Units coordinate the massing of fires effects on enemy targets, concentrated at obstacles and other choke","rect":[89.98998260498047,386.290771484375,522.0096712188721,377.1825866699219]},{"page":184,"text":"points, before enemy forces can disperse. Proper distribution of fires ensures the massing of overwhelming","rect":[89.98998260498047,397.8137512207031,521.9993190765381,388.70556640625]},{"page":184,"text":"combat power at these points and ensures the destruction or neutralization of high-payoff targets without","rect":[89.98998260498047,409.276611328125,522.0644297561646,400.1684265136719]},{"page":184,"text":"wasting assets through repetitive engagements by multiple friendly systems.","rect":[89.98001098632813,420.79962158203127,394.7039442062378,411.6914367675781]},{"page":184,"text":"8-89. Effects from multiple domains have the greatest impact on an enemy when units synchronize them","rect":[89.98001098632813,438.3145751953125,522.0214514694214,429.2063903808594]},{"page":184,"text":"with direct fires, obstacles, and counterattack plans. Units integrate the fire support and obstacle plans from","rect":[89.9699935913086,449.7774658203125,522.0063757858277,440.6692810058594]},{"page":184,"text":"the beginning of planning for a defense. Indirect fires complement the effects of obstacles and can disrupt","rect":[89.94996643066406,461.3004455566406,521.9025034866334,452.1922607421875]},{"page":184,"text":"enemy attempts to breach or bypass these obstacles. All elements in the fire support chain must understand","rect":[89.94990539550781,472.76336669921877,521.9159450531006,463.6551208496094]},{"page":184,"text":"the commander’s intent, the scheme of maneuver, and the obstacle plan.","rect":[89.94990539550781,484.2663269042969,378.4738721847534,475.1781921386719]},{"page":184,"text":"8-90. Various fire support considerations exist for each phase of the defense. As part of shaping operations","rect":[89.94989776611328,501.81134033203127,522.0011126976013,492.7031555175781]},{"page":184,"text":"or supporting efforts during defense preparations, units try to disrupt an enemy force’s attack preparations","rect":[89.94989776611328,513.2742309570313,521.9942767601013,504.1660461425781]},{"page":184,"text":"by—","rect":[89.9499282836914,524.7972412109375,109.98992538452149,515.6890869140625]},{"page":184,"text":" Employing indirect fires on choke points and likely enemy force assembly areas.","rect":[115.19999694824219,538.2542724609375,456.46633434295657,529.1461181640625]},{"page":184,"text":" Employing air support on known, suspected, and likely enemy force locations.","rect":[115.19999694824219,551.7542724609375,447.3421583175659,542.6461181640625]},{"page":184,"text":" Attriting enemy resources by continuously engaging high-payoff targets.","rect":[115.19999694824219,565.2542724609375,424.2990369796753,556.1461181640625]},{"page":184,"text":" Conducting electromagnetic warfare to degrade the enemy force’s ability to command and control","rect":[115.19999694824219,578.7542724609375,521.9844737014771,569.6461181640625]},{"page":184,"text":"forces.","rect":[133.20999145507813,588.2532348632813,160.1898603439331,581.1791381835938]},{"page":184,"text":" Employing counterfires to engage and destroy enemy artillery and mortar systems attempting to","rect":[115.19999694824219,603.7742919921875,521.9819240570068,594.6661376953125]},{"page":184,"text":"deliver suppressive fires.","rect":[133.1999969482422,615.2171630859375,232.96010875701905,606.1290283203125]},{"page":184,"text":" Providing fires in support of the unit’s security operations, such as a unit conducting the tactical","rect":[115.19999694824219,628.7343139648438,521.9462046585084,619.6261596679688]},{"page":184,"text":"mission task of counterreconnaissance.","rect":[133.1999969482422,638.2332763671875,289.3016004562378,631.149169921875]},{"page":184,"text":"8-91. Units may want to wait to execute a counterfire mission until an engagement begins in the MBA.","rect":[90.0037841796875,657.7822875976563,522.0739698410034,648.6741333007813]},{"page":184,"text":"However, when defending forces enjoy qualitative advantages in fire support, the advantages gained from a","rect":[90.0037841796875,669.2451782226563,522.1361360626221,660.126953125]},{"page":184,"text":"counterfire battle usually outweigh the risks to the defending force. The defender’s ability to mass fires","rect":[90.0037841796875,680.7681884765625,522.0492084007263,671.6600341796875]},{"page":184,"text":"quickly and then rapidly reposition forces is a major factor in disrupting enemy forces and establishing the","rect":[89.99378967285156,692.2911376953125,521.9317293243408,683.1729125976563]},{"page":184,"text":"conditions for successful defensive operations.","rect":[89.99378967285156,703.7340087890625,276.86980724334719,694.6458740234375]},{"page":184,"text":"8-16","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":184,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":184,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":185,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":185,"text":"8-92. Units employ fires to support the security force, using precision and other munitions to destroy enemy","rect":[108.0,83.51434326171875,539.9995021820068,74.40616607666016]},{"page":185,"text":"reconnaissance elements and other high-payoff targets. This also helps to deceive enemy forces about the","rect":[108.01000213623047,94.97723388671875,540.0364046173096,85.86905670166016]},{"page":185,"text":"location of the MBA. Units support their security forces by planning the delivery of fires at appropriate times","rect":[108.0100326538086,106.500244140625,540.0163104515076,97.3920669555664]},{"page":185,"text":"and places throughout their assigned areas to slow and canalize an enemy force as it approaches the security","rect":[108.01001739501953,118.023193359375,540.0403347015381,108.9150161743164]},{"page":185,"text":"area. This allows defending security forces to engage enemy forces on favorable terms. To prevent fratricide","rect":[108.00997924804688,129.486083984375,539.9615755157471,120.3779067993164]},{"page":185,"text":"and friendly fire incidents, units place no-fire areas over security force elements. Finally, defending units use","rect":[108.00997924804688,141.00909423828126,540.0815706329346,131.90090942382813]},{"page":185,"text":"fires to support the withdrawal of the security force once the security force’s shaping operation is complete","rect":[108.00997924804688,152.5321044921875,540.0032625274658,143.42391967773438]},{"page":185,"text":"and the defending unit is prepared to conduct MBA operations.","rect":[108.00997924804688,163.9949951171875,360.7746534347534,154.88681030273438]},{"page":185,"text":"8-93. Air support can play an important part in attriting or destroying enemy forces. Often, only aircraft are","rect":[107.99995422363281,181.50994873046876,540.0650911407471,172.40176391601563]},{"page":185,"text":"available to oppose an enemy penetration until ground forces can redeploy. Units use air interdiction and","rect":[107.99995422363281,193.032958984375,539.9455471038818,183.92471313476563]},{"page":185,"text":"close air support to disrupt an enemy advance. Close air support can operate with Army helicopters and","rect":[108.0,204.495849609375,539.9913234710693,195.38766479492188]},{"page":185,"text":"artillery assets. Additionally, units can incorporate artillery fires with electromagnetic warfare and joint","rect":[108.00000762939453,216.018798828125,540.0323862991334,206.90060424804688]},{"page":185,"text":"systems to suppress enemy air defenses while aircraft engage targets. Air interdiction can delay, destroy, or","rect":[108.01001739501953,227.481689453125,539.9924829063416,218.37350463867188]},{"page":185,"text":"neutralize enemy follow-on forces, thereby providing the unit with additional time to prepare defensive","rect":[108.01001739501953,239.00469970703126,539.9342317657471,229.89651489257813]},{"page":185,"text":"positions.","rect":[108.01000213623047,250.50767517089845,146.69521617889405,241.41952514648438]},{"page":185,"text":"8-94. Once the engagement moves into the MBA, fire support assets continue to target enemy combat units","rect":[108.01000213623047,267.9925537109375,540.0632464866638,258.8843688964844]},{"page":185,"text":"to force them to deploy. At the same time, these assets inflict casualties, disrupt the cohesion of the enemy’s","rect":[108.01000213623047,279.51556396484377,540.0122821311951,270.4073791503906]},{"page":185,"text":"attack, and impede the enemy’s ability to mass combat power. Fire support assets continue to attack anenemy","rect":[108.01000213623047,291.03857421875,540.0391139984131,281.9303894042969]},{"page":185,"text":"follow-on force before it can be committed to the MBA. Fire support assets attack enemy command and","rect":[108.01000213623047,302.5014343261719,540.0024318695068,293.39324951171877]},{"page":185,"text":"control facilities and logistics sites in depth to isolate the attacking enemy force. Units take advantage of the","rect":[108.01002502441406,314.0244140625,540.0854768829346,304.9162292480469]},{"page":185,"text":"range and flexibility of fire support weapons to mass fires at critical points, such as obstacles and engagement","rect":[108.01002502441406,325.54742431640627,540.0414195022584,316.4392395019531]},{"page":185,"text":"areas, to slow and canalize the enemy force to provide better targets for direct fire systems. Fire support","rect":[108.02010345458985,337.01031494140627,540.0007700881959,327.9021301269531]},{"page":185,"text":"systems cover barriers, gaps, and open areas within the MBA. Units assign tasks to these fire support systems,","rect":[108.02010345458985,348.5332946777344,540.0400342941284,339.42510986328127]},{"page":185,"text":"including closing obstacle gaps or reseeding previously breached obstacles in accordance with the rules of","rect":[108.02010345458985,360.0562744140625,539.9652001914978,350.9480895996094]},{"page":185,"text":"engagement. Other tasks include—","rect":[108.02010345458985,371.5191650390625,248.60070419311524,362.4109802246094]},{"page":185,"text":" Massing fires to suppress enemy direct and indirect fire systems to facilitate defensive maneuver,","rect":[133.1999969482422,384.95428466796877,539.9722852706909,375.8460998535156]},{"page":185,"text":"especially counterattack and disengagement.","rect":[151.1999969482422,396.477294921875,329.50091075897219,387.3691101074219]},{"page":185,"text":" Neutralizing or isolating enemy forces that have penetrated the defensive area and impeding the","rect":[133.1999969482422,409.97430419921877,540.0221223907471,400.8661193847656]},{"page":185,"text":"movement of enemy reserves.","rect":[151.1999969482422,421.497314453125,271.2436475753784,412.399169921875]},{"page":185,"text":" Attacking enemy artillery and forward air defense elements.","rect":[133.1999969482422,434.9942932128906,391.66485118865969,425.8861083984375]},{"page":185,"text":" Using jamming to degrade or disrupt the enemy force’s ability to transmit data and information.","rect":[133.1999969482422,448.4342956542969,534.8217725753784,439.31610107421877]},{"page":185,"text":" Reallocating fire support assets, after identifying the enemy’s main effort, to reinforce fires in the","rect":[133.1999969482422,461.9342956542969,540.0401277618408,452.82611083984377]},{"page":185,"text":"most vulnerable areas.","rect":[151.18995666503907,471.4332580566406,240.93609142303468,464.34912109375]},{"page":185,"text":" Disrupting the enemy combined arms team through such action as separating attacking enemy","rect":[133.1999969482422,486.95428466796877,540.0261135101318,477.8460998535156]},{"page":185,"text":"combat vehicles from enemy dismounted infantry.","rect":[151.1999969482422,498.477294921875,352.84255504608157,489.3691101074219]},{"page":185,"text":"8-95. In response to shallow enemy penetrations, artillery units normally reposition their systems laterally,","rect":[108.00376892089844,515.942138671875,539.9537305831909,506.8339538574219]},{"page":185,"text":"away from the points of enemy penetration. This allows the defender’s artillery systems to provide fire","rect":[108.00376892089844,527.4651489257813,540.0060701446533,518.3569946289063]},{"page":185,"text":"support throughout the area of penetration.","rect":[107.9937973022461,538.9881591796875,279.0993299484253,529.8800048828125]},{"page":185,"text":"SUSTAINMENT","rect":[90.0,562.3800048828125,161.04435110092164,554.0759887695313]},{"page":185,"text":"8-96. Units address several unique sustainment considerations in the defensive plan. Priorities for","rect":[108.0,582.2142944335938,540.0551049766541,573.1261596679688]},{"page":185,"text":"replenishment are normally ammunition and materials to construct caching ammunition and limited amounts","rect":[108.0,593.75732421875,540.0855243186951,584.649169921875]},{"page":185,"text":"of petroleum products. Units place these materials in centrally located positions within obstacles and","rect":[108.0,605.2802734375,539.9642238616943,596.172119140625]},{"page":185,"text":"defensive positions. There is normally a reduced need for bulk fuel in the defense compared to the offense.","rect":[108.0,616.7431640625,539.9349317550659,607.635009765625]},{"page":185,"text":"There may be an increased demand for decontaminants and CBRN collective and personal protective","rect":[108.0,628.2661743164063,540.0172395782471,619.1580200195313]},{"page":185,"text":"equipment. Units consider stockpiling for the MBA. If necessary, units plan to destroy those stocks as part","rect":[108.0,639.7891845703125,539.9983286819459,630.6810302734375]},{"page":185,"text":"of a delay. The supply of obstacle materials in a defense can be a significant problem that requires detailed","rect":[107.98994445800781,651.2520751953125,540.0112819671631,642.1439208984375]},{"page":185,"text":"coordination and long lead times. Units are careful to not overlook the transportation assets and personnel","rect":[107.98994445800781,662.7750244140625,540.0554575881959,653.6668701171875]},{"page":185,"text":"required in obtaining, moving, and uncrating barrier material and associated obstacle-creating munitions,","rect":[107.98994445800781,674.2980346679688,539.9682569503784,665.1898803710938]},{"page":185,"text":"such as demolition charges and mines.","rect":[107.98998260498047,685.7609252929688,261.93328380584719,676.6527709960938]},{"page":185,"text":"8-97. Commanders ensure that echelon sustainment officers and sustainment unit commanders supporting","rect":[107.98998260498047,703.285888671875,539.9899806976318,694.177734375]},{"page":185,"text":"the defending force understand the commander’s tactical intent. Sustainment officers can then establish","rect":[107.98998260498047,714.8088989257813,540.0062160491943,705.7007446289063]},{"page":185,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":185,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":185,"text":"8-17","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":186,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":186,"text":"support priorities in accordance with the commander’s intent and plan sustainment operations to ensure the","rect":[90.0,83.49430847167969,522.0273714141846,74.40616607666016]},{"page":186,"text":"supportability of the operation. Units also address sustainment during branches and sequels to the defense","rect":[89.9899673461914,94.97723388671875,521.9517488555908,85.86905670166016]},{"page":186,"text":"plan, such as a counterattack into the flank of an adjacent unit.","rect":[89.9899673461914,106.500244140625,339.6213026046753,97.38204956054688]},{"page":186,"text":"8-98. Maneuver units resupply regularly and maintain supply stocks in case an enemy breakthrough disrupts","rect":[89.9899673461914,124.02520751953125,521.9934222679138,114.91703033447266]},{"page":186,"text":"the replenishment flow. At the battalion and BCT levels, units ensure combat configured loads are delivered","rect":[89.98995971679688,135.48809814453126,522.0844631195068,126.37992095947266]},{"page":186,"text":"to maneuver units regularly. Combat configured loads are packages of potable and non-potable water; CBRN","rect":[89.98994445800781,147.0111083984375,522.0434002914428,137.90292358398438]},{"page":186,"text":"defense supplies; barrier materials; ammunition; petroleum, oils, and lubricants; medical supplies; and repair","rect":[89.98998260498047,158.51402282714845,522.0323388633728,149.42587280273438]},{"page":186,"text":"parts tailored to a specific-sized unit. This eliminates the need to request supplies and reduces the chance that","rect":[89.98998260498047,169.97691345214845,522.0795054397584,160.88876342773438]},{"page":186,"text":"a lapse in communications interrupts the supply flow and jeopardizes the integrity of the defense. Units","rect":[89.99002075195313,181.51995849609376,521.9550311546326,172.40176391601563]},{"page":186,"text":"resupply the supported maneuver unit using this push system until it requests otherwise. Units can use utility","rect":[89.99002075195313,193.04296875,521.9742336273193,183.93478393554688]},{"page":186,"text":"and cargo helicopters to deliver supplies directly from the echelon support area to the defending unit. Units","rect":[89.98999786376953,204.505859375,521.9538104515076,195.39767456054688]},{"page":186,"text":"use information systems to tailor these combat-configured push packages to the demands of the supported","rect":[89.98998260498047,216.02880859375,521.9893703460693,206.92062377929688]},{"page":186,"text":"maneuver units.","rect":[89.98998260498047,225.46766662597657,153.87548351287843,218.38351440429688]},{"page":186,"text":"8-99. Ifdefending units do not expect enemy forces to conduct a limited-visibility attack, the defending force","rect":[89.98998260498047,245.0167236328125,522.0624666290283,235.90853881835938]},{"page":186,"text":"can conduct resupply during periods of limited visibility. This reduces the chance for enemy interference","rect":[89.98998260498047,256.5396728515625,522.0322542266846,247.43148803710938]},{"page":186,"text":"with the resupply process, but it also lengthens the amount of time it takes to complete the process. If","rect":[89.98998260498047,268.0025634765625,521.9651391563416,258.8943786621094]},{"page":186,"text":"defending units expect the enemy to conduct a limited-visibility attack, they conduct resupply during","rect":[89.98999786376953,279.52557373046877,522.0213527679443,270.4173278808594]},{"page":186,"text":"daylight. When enemy forces possess significant air, satellite, or unmanned aircraft capabilities, friendly","rect":[89.98998260498047,291.048583984375,521.9932765960693,281.9403991699219]},{"page":186,"text":"forces may be required to infiltrate resupply vehicles to reduce the chance of enemy detection.","rect":[89.98998260498047,302.511474609375,467.37737560272219,293.4032897949219]},{"page":186,"text":"8-100. Terrain management is a critical consideration in the echelon support area. Units position each","rect":[89.98998260498047,320.03643798828127,521.9872341156006,310.9282531738281]},{"page":186,"text":"sustainment unit where it can best fulfill its support tasks while using minimal resources to maintain security","rect":[89.97996520996094,331.5594482421875,522.0193996429443,322.4512634277344]},{"page":186,"text":"in conjunction with other units located in the echelon support area. In contiguous operations, units position","rect":[89.99002075195313,343.0223083496094,521.9709377288818,333.90411376953127]},{"page":186,"text":"echelon sustainment facilities farther away from the forward edge of the battle area in a defense than in an","rect":[89.99002075195313,354.5453186035156,521.9843044281006,345.4371337890625]},{"page":186,"text":"offense to avoid interfering with the movement of units between BPs or the forward movement of","rect":[89.97997283935547,366.06829833984377,521.9551904258728,356.9601135253906]},{"page":186,"text":"counterattack forces. These facilities are located far enough behind friendly lines that likely enemy advances","rect":[89.98998260498047,377.53118896484377,522.0478656272888,368.4230041503906]},{"page":186,"text":"do not compel the relocation of critical sustainment capabilities at inopportune times. However, those","rect":[89.98998260498047,389.03411865234377,521.9904451446533,379.94598388671877]},{"page":186,"text":"sustainment capabilities supporting the unit must be close enough to provide responsive support. In","rect":[89.98999786376953,400.5772399902344,521.9708156585693,391.46905517578127]},{"page":186,"text":"noncontiguous operations, units position sustainment facilities in areas within the perimeters of ground","rect":[89.98999786376953,412.0401306152344,521.8881130218506,402.93194580078127]},{"page":186,"text":"maneuver units to provide security and avoid interrupting their sustainment functions. Units distribute similar","rect":[89.98998260498047,423.5631408691406,522.0018212852478,414.4549560546875]},{"page":186,"text":"functional sustainment units throughout the defensive area in both environments. This distribution allows","rect":[89.98997497558594,435.0861511230469,522.0139911155701,425.97796630859377]},{"page":186,"text":"them to designate one sustainment unit to pick up the workload of a displacing second sustainment until the","rect":[89.98997497558594,446.5490417480469,521.9949617462158,437.44085693359377]},{"page":186,"text":"second sustainment unit is once again operational.","rect":[89.98997497558594,458.0720520019531,290.7857618331909,448.9638671875]},{"page":186,"text":"8-101. Defending units provide maintenance support as far forward as possible at maintenance collection","rect":[89.98997497558594,475.53692626953127,521.9566555023193,466.4287414550781]},{"page":186,"text":"points to reduce the need to evacuate equipment. The purpose of the maintenance effort is to fix as far forward","rect":[89.98997497558594,487.0398864746094,522.0403347015381,477.9517517089844]},{"page":186,"text":"as possible those systems that can return to maneuver units in combat-ready condition. Units ensure that","rect":[90.0,498.58294677734377,522.0704722366334,489.4747619628906]},{"page":186,"text":"multifunctional forward logistics elements contain the maximum variety of maintenance personnel with","rect":[89.98994445800781,510.04583740234377,521.9481716156006,500.9376525878906]},{"page":186,"text":"appropriate equipment, such as repair sets, kits, and outfits, to repair weapon systems quickly.","rect":[89.98994445800781,521.56884765625,466.0004529953003,512.460693359375]},{"page":186,"text":"8-102. Medical support associated with the defense anticipates significant casualties just as in the offense.","rect":[89.99992370605469,539.0938720703125,521.9820508956909,529.9756469726563]},{"page":186,"text":"Units plan to augment available ambulances if a mass casualty situation develops. Units should always plan","rect":[89.99992370605469,550.5567626953125,522.0860500335693,541.4486083984375]},{"page":186,"text":"for mass casualties and have an evacuation plan, including ambulance exchange points and air evacuation,","rect":[89.99992370605469,562.0797119140625,522.0009717941284,552.9715576171875]},{"page":186,"text":"which accounts for the use of both standard and nonstandard air and ground platforms.","rect":[89.99992370605469,573.602783203125,436.6027784347534,564.49462890625]},{"page":186,"text":"8-103. The conduct of troop movements and resupply convoys is critical to a successful defense. Units","rect":[89.99992370605469,591.067626953125,522.0304095726013,581.95947265625]},{"page":186,"text":"balance terrain management, movement planning, and traffic circulation control priorities. They plan","rect":[89.99992370605469,602.5906372070313,521.9738063812256,593.4824829101563]},{"page":186,"text":"multiple routes throughout the assigned areas and closely control their use. They may allocate mobility","rect":[90.0,614.1134643554688,522.0244045257568,605.0053100585938]},{"page":186,"text":"resources to maintain main supply routes to support units and supplies moving forward and to evacuate","rect":[89.9999771118164,625.5763549804688,521.9739046173096,616.4682006835938]},{"page":186,"text":"personnel and equipment to the rear. Military police ease these movements, prevent congestion, and respond","rect":[89.9999771118164,637.099365234375,522.0280666351318,627.9912109375]},{"page":186,"text":"to maneuver plan changes. Units plan for dislocated civilians and the effect that they have on friendly military","rect":[89.9999771118164,648.6223754882813,522.0010890960693,639.5142211914063]},{"page":186,"text":"operations. Civil affairs staff assist units in planning populace and resources control measures. Local nation","rect":[89.9999771118164,660.0852661132813,522.0323390960693,650.9771118164063]},{"page":186,"text":"and international organizations minimize the impact of disaster or conflict on dislocated civilians. Units","rect":[89.99996185302735,671.6082763671875,521.9900653343201,662.5001220703125]},{"page":186,"text":"coordinate air and ground movements supporting their scheme of maneuver with any other affected Services.","rect":[89.99996185302735,683.1312866210938,522.0771436691284,674.0231323242188]},{"page":186,"text":"They also coordinate such movements with any affected organic and external Army aviation, fire support,","rect":[89.99996185302735,694.5941772460938,522.0383253097534,685.4860229492188]},{"page":186,"text":"air defense, and ground maneuver units.","rect":[89.99996185302735,706.1172485351563,250.24285411834718,697.0090942382813]},{"page":186,"text":"8-18","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":186,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":186,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":187,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":187,"text":"8-104. During the preparatory phase of the defense, sustainment operators normally pre-position supply","rect":[108.0,83.51434326171875,540.0243434906006,74.40616607666016]},{"page":187,"text":"stocks, particularly ammunition and barrier materials, in the BPs of defending forces. They also establish","rect":[108.0,94.97723388671875,539.9556179046631,85.8689956665039]},{"page":187,"text":"maintenance and casualty collection points. Sustainment operators address these and other sustainment","rect":[108.0,106.500244140625,540.0761485061646,97.3920669555664]},{"page":187,"text":"preparations in the planning process to avoid compromising the operation. Units can include sustainment","rect":[108.0,118.023193359375,539.9333872756959,108.9150161743164]},{"page":187,"text":"preparations in their military deception plans.","rect":[108.0,129.486083984375,290.14458751678469,120.3779067993164]},{"page":187,"text":"PROTECTION","rect":[90.0,152.83273315429688,155.4096384048462,144.75601196289063]},{"page":187,"text":"8-105. Unit survivability is critical to defensive success. Protection preserves subordinate unit capabilities","rect":[108.0,172.7943115234375,539.9951312522888,163.68612670898438]},{"page":187,"text":"so that units can use those capabilities to apply maximum combat power at the desired times and places.","rect":[108.0,184.31732177734376,540.0030469894409,175.20913696289063]},{"page":187,"text":"Criticality, vulnerability, and recoverability are some of the most significant considerations for units in","rect":[108.0,195.78021240234376,540.0164699554443,186.67202758789063]},{"page":187,"text":"determining protection priorities. They use available decision support tools and analyses to assess the unit’s","rect":[108.0,207.30322265625,539.9923236351013,198.19503784179688]},{"page":187,"text":"critical assets and key vulnerabilities. Units plan and prepare for enemy attacks by predicting where the next","rect":[107.98999786376953,218.76605224609376,540.0683970413209,209.65786743164063]},{"page":187,"text":"attack will occur and applying measures to mitigate the attack. These enemy attacks may be from","rect":[107.98998260498047,230.2890625,540.0274939498902,221.18087768554688]},{"page":187,"text":"conventional, irregular, or terrorist forces and drive changes in local unit protection or individual protective","rect":[107.9899673461914,241.81207275390626,539.9959383087158,232.70388793945313]},{"page":187,"text":"measures. Incident management plans and environmental considerations integrate the protection tasks and","rect":[107.9899673461914,253.27496337890626,539.9930324554443,244.16677856445313]},{"page":187,"text":"their associated systems. The protection tasks discussed in paragraphs 8-106 through 8-133 have additional","rect":[107.9899673461914,264.7979736328125,539.9319834671021,255.68972778320313]},{"page":187,"text":"defense-specific planning considerations not addressed in Chapter 1. (See ADP 3-37 for more information","rect":[107.96990203857422,276.3209228515625,539.9235134124756,267.2126770019531]},{"page":187,"text":"on protection tasks.)","rect":[107.96990203857422,287.7637634277344,189.37140441513064,278.6756286621094]},{"page":187,"text":"Survivability","rect":[90.0,312.3807067871094,151.17176246643067,302.5755920410156]},{"page":187,"text":"8-106. Since an attacking enemy force usually has the initiative in terms of where and when it will attack,","rect":[108.0,329.9342956542969,540.0422315597534,320.82611083984377]},{"page":187,"text":"a defending unit takes many actions to protect the force from losses due to enemy actions. The survivability","rect":[108.0,341.4573059082031,539.9022121429443,332.34912109375]},{"page":187,"text":"effort for the defense enables units to concentrate firepower from fixed positions. To avoid detection through","rect":[107.98998260498047,352.9201965332031,540.0150661468506,343.8119812011719]},{"page":187,"text":"the forms of contact and destruction by enemy forces, units move frequently and establish survivability","rect":[107.98999786376953,364.44317626953127,539.9582424163818,355.3349914550781]},{"page":187,"text":"positions quickly. To provide flexibility, units may need primary, alternate, supplementary, and sequential","rect":[107.99002075195313,375.90606689453127,539.9191660842896,366.7978820800781]},{"page":187,"text":"positions. This is particularly true of units defending key or decisive terrain. Units enhance their survivability","rect":[107.99002075195313,387.4290466308594,539.9612941741943,378.32086181640627]},{"page":187,"text":"by using concealment, military deception, dispersion, masking, and field fortifications. Units avoid","rect":[107.99005889892578,398.9520568847656,539.9673976898193,389.8438720703125]},{"page":187,"text":"predictable defensive preparations because enemy forces tend to attack lightly defended areas.","rect":[107.99005889892578,410.4149169921875,485.0570020675659,401.3067321777344]},{"page":187,"text":"8-107. When preparing area and mobile defenses, engineers supporting the defensive effort help maneuver","rect":[107.99005889892578,427.9399108886719,539.9614160118103,418.83172607421877]},{"page":187,"text":"and supporting units prepare fighting and survivability positions. Units locate these positions throughout the","rect":[107.98004913330078,439.462890625,540.0475740509033,430.3547058105469]},{"page":187,"text":"defending unit’s assigned areas from the security area, through the MBA, to the echelon support area. BCTs","rect":[107.98004913330078,450.92578125,539.9762713890076,441.8175964355469]},{"page":187,"text":"pass survivability requirements beyond the capabilities of their brigade engineer battalions to the current","rect":[107.97003173828125,462.44879150390627,539.9620737991334,453.3406066894531]},{"page":187,"text":"operations integrating cell in their higher echelon headquarters. That headquarters then tasks a maneuver","rect":[107.97003173828125,473.9718017578125,539.9442651329041,464.8636169433594]},{"page":187,"text":"enhancement brigade or functional engineer brigade to provide the required support based on the mission","rect":[107.97003173828125,485.4346618652344,539.9644680023193,476.32647705078127]},{"page":187,"text":"variables. These engineers also prepare any strongpoints required by the concept of operations.","rect":[107.97003936767578,496.9576721191406,487.8131055831909,487.8494873046875]},{"page":187,"text":"8-108. Survivability tasks include preparing and constructing trenches; command post shelters; and artillery","rect":[107.97003936767578,514.482666015625,539.9933986663818,505.3744812011719]},{"page":187,"text":"firing, radar, and combat vehicle fighting positions. Units provide guidance on the level of protection—such","rect":[107.96002197265625,525.945556640625,540.0463161468506,516.8373413085938]},{"page":187,"text":"as hull defilade or overhead cover, system priorities, and early use of specialized engineer systems that can","rect":[107.95990753173828,537.4685668945313,539.8665065765381,528.3604125976563]},{"page":187,"text":"construct survivability positions. Their priority in engineer survivability planning during defensive operations","rect":[107.95992279052735,548.9915771484375,540.0919940452576,539.8834228515625]},{"page":187,"text":"is determining the most appropriate locations and standards for the construction of survivability positions.","rect":[107.95992279052735,560.4544677734375,539.9046583175659,551.3463134765625]},{"page":187,"text":"This includes such things as determining overhead cover standards, such as capable of resisting penetration","rect":[107.95992279052735,571.9774169921875,540.0200099945068,562.8692626953125]},{"page":187,"text":"by 82mm mortar or 152mm howitzer shells.","rect":[107.95992279052735,583.5004272460938,284.3900098800659,574.3922729492188]},{"page":187,"text":"8-109. Units protect supplies against blast, shrapnel, incendiaries, and CBRN contamination. They can","rect":[107.95992279052735,600.9652709960938,539.9550685882568,591.8571166992188]},{"page":187,"text":"protect supplies loaded on tactical vehicles against almost anything but a direct hit by constructing berms","rect":[107.94989776611328,612.48828125,539.9812762718201,603.380126953125]},{"page":187,"text":"large enough to accommodate vehicles and deep enough to keep supplies below ground level. These berms","rect":[107.94989013671875,623.951171875,539.8977191429138,614.843017578125]},{"page":187,"text":"may not provide the desired degree of protection against an enemy force using indirect fire or cluster","rect":[107.94989013671875,635.47412109375,539.9058129844666,626.365966796875]},{"page":187,"text":"munitions. The echelon engineer officer can advise sustainment operators about storage area sites that reduce","rect":[107.94989013671875,646.9971923828125,539.9726839141846,637.8890380859375]},{"page":187,"text":"the requirements for engineer survivability support without reducing the degree of protection provided.","rect":[107.94990539550781,658.4600830078125,520.3067579269409,649.3519287109375]},{"page":187,"text":"8-110. The defending unit’s subordinate maneuver elementsoccupy their assigned areas as soon as possible.","rect":[107.94989776611328,675.985107421875,539.9372510910034,666.876953125]},{"page":187,"text":"This allows those units to have as much time as possible to prepare their defensive positions and enhance the","rect":[107.92986297607422,687.488037109375,539.8897981719971,678.39990234375]},{"page":187,"text":"defensive characteristics of the terrain within those assigned areas. This includes the construction of fighting","rect":[107.92986297607422,698.970947265625,539.9432277679443,689.86279296875]},{"page":187,"text":"and survivability positions.","rect":[107.92990112304688,710.4939575195313,216.57374095916749,701.3858032226563]},{"page":187,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":187,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":187,"text":"8-19","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":188,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":188,"text":"8-111. Units employ three principles to enhance the concealment of their defensive positions from ground","rect":[90.0,83.51434326171875,522.0270900726318,74.40616607666016]},{"page":188,"text":"and aerial observation—siting, discipline, and construction:","rect":[90.0,94.97723388671875,328.58127545928957,85.86905670166016]},{"page":188,"text":" Siting means selecting the most advantageous position in which to hide a person, an object, or an","rect":[115.19999694824219,108.47430419921875,522.0832424163818,99.35610961914063]},{"page":188,"text":"activity. This is often the shadows provided by wood lines and buildings.","rect":[133.1999969482422,119.997314453125,425.6278028488159,110.8891372680664]},{"page":188,"text":" Strict concealment discipline by units and individual Soldiers is required for success in any","rect":[115.19999694824219,133.49432373046876,521.9578762054443,124.38614654541016]},{"page":188,"text":"concealment effort. Units avoid activities that change the appearance of an area or reveal the","rect":[133.1999969482422,145.017333984375,522.0351839141846,135.90914916992188]},{"page":188,"text":"presence of military equipment. Laxness and carelessness reveal positions. Tracks, spoil, and","rect":[133.1999969482422,156.480224609375,521.8968410491943,147.37203979492188]},{"page":188,"text":"debris are the most common signs of military activity that indicate concealed objects. Units ensure","rect":[133.1899871826172,168.003173828125,522.1492586212158,158.88497924804688]},{"page":188,"text":"that new tracks follow existing paths, roads, fences, or natural lines in the terrain pattern. Units do","rect":[133.1899871826172,179.52618408203126,521.9760036468506,170.41799926757813]},{"page":188,"text":"not end exposed routes at a position but extend them to another logical termination. Units brush","rect":[133.19000244140626,190.98907470703126,521.9377346038818,181.88088989257813]},{"page":188,"text":"out, camouflage, or cover their tracks, if practical. Units cover or place spoil and debris on","rect":[133.19000244140626,202.5120849609375,521.8797512054443,193.40390014648438]},{"page":188,"text":"positions and equipment to blend with the surroundings. Units add artificial camouflage when the","rect":[133.18995666503907,213.9749755859375,522.0780916290283,204.86679077148438]},{"page":188,"text":"terrain and natural vegetation are inadequate for concealment.","rect":[133.18995666503907,225.49798583984376,380.84731578826907,216.38980102539063]},{"page":188,"text":" Construction involves adding natural materials to blend with the surrounding terrain.","rect":[115.19999694824219,238.97430419921876,472.36101818084719,229.86611938476563]},{"page":188,"text":"8-112. Leaders ensure Soldiers understand the importance, principles, and techniques of camouflage. All","rect":[89.9937515258789,256.499267578125,522.0011362991334,247.39108276367188]},{"page":188,"text":"personnel must ensure the effectiveness of all camouflage measures and maintain strict camouflage","rect":[89.98373413085938,267.962158203125,521.9233675079346,258.8539733886719]},{"page":188,"text":"discipline. In addition to hiding equipment, units can avoid detection by using techniques such as placing","rect":[89.98373413085938,279.4852294921875,521.9314479827881,270.3769836425781]},{"page":188,"text":"mud on glassy surfaces and unfilled sandbags over windshields.","rect":[89.98370361328125,291.0081787109375,345.80547618865969,281.8999938964844]},{"page":188,"text":"8-113. Major defensive positions, sustainment sites, command posts, and other facilities may require special","rect":[89.9937515258789,308.4730224609375,522.0890269241334,299.3548278808594]},{"page":188,"text":"camouflage. Camouflage measures that provide this protection include constructing dummy positions and","rect":[89.98373413085938,319.99603271484377,521.9212551116943,310.8878173828125]},{"page":188,"text":"decoys. Units carefully plan the use of such measures within the framework of real positions and ongoing","rect":[89.98370361328125,331.5190124511719,521.9164333343506,322.4107971191406]},{"page":188,"text":"and future operations. Five fundamental methods work to camouflage and conceal individual weapons, units,","rect":[89.98370361328125,342.9819030761719,521.9740552902222,333.87371826171877]},{"page":188,"text":"installations, and activities—hiding, blending, disguising, disrupting, and decoying:","rect":[89.98373413085938,354.5049133300781,425.05258893585207,345.396728515625]},{"page":188,"text":" Hiding is the complete concealment of an object by some form of physical screen. For example,","rect":[115.19999694824219,367.97430419921877,521.9822340011597,358.8561096191406]},{"page":188,"text":"sod placed over mines hides the mines; the overhead canopy of trees hides the objects beneath","rect":[133.1999969482422,379.497314453125,521.9468898773193,370.3791198730469]},{"page":188,"text":"from aerial observation; tunnels hide objects located within them; a building’s roof and walls,","rect":[133.1999969482422,390.9601745605469,522.0290479660034,381.84197998046877]},{"page":188,"text":"camouflage net, or tarpaulin hides objects beneath them; anda defilade position hides objects from","rect":[133.1999969482422,402.4831848144531,522.1263709030152,393.364990234375]},{"page":188,"text":"ground observation. In some cases, the screen may be invisible. In other instances, the screen may","rect":[133.20001220703126,414.0061950683594,522.0463771820068,404.89801025390627]},{"page":188,"text":"be visible, but it hides the activity behind it.","rect":[133.20001220703126,425.46905517578127,308.74444103240969,416.3608703613281]},{"page":188,"text":" Blending is arranging or applying camouflage materials on, over, and around an object so that it","rect":[115.19999694824219,438.95428466796877,521.9708628616334,429.8360900878906]},{"page":188,"text":"appears to be part of the background. Examples include applying face paint to the exposed areas","rect":[133.1999969482422,450.477294921875,522.0101459007263,441.3691101074219]},{"page":188,"text":"of skin, and adding burlap, paint, and live vegetation to helmets and clothing to closely resemble","rect":[133.1999969482422,461.9401550292969,522.0079622344971,452.83197021484377]},{"page":188,"text":"or blend into the background. Units can apply the same technique for equipment or structures.","rect":[133.1999969482422,473.4631652832031,509.25161266326907,464.35498046875]},{"page":188,"text":" Disguising is the intentional misleading of the enemy about the friendly force’s identity, strength,","rect":[115.19999694824219,486.95428466796877,522.0421705245972,477.8460998535156]},{"page":188,"text":"and intention, and may draw enemy fire from real assets. Therefore, the simulation of objects,","rect":[133.18995666503907,498.477294921875,521.9468336105347,489.3591003417969]},{"page":188,"text":"pieces of equipment, or activities may have military significance. Inflatable tanks, tents, and","rect":[133.18995666503907,509.9401550292969,521.9479274749756,500.83197021484377]},{"page":188,"text":"buildings can look like the real thing to an aerial observer.","rect":[133.18995666503907,521.463134765625,366.1530714035034,512.35498046875]},{"page":188,"text":" Disrupting is the technique that alters or eliminates regular patterns and target characteristics.","rect":[115.19999694824219,534.9542846679688,521.8906812667847,525.8461303710938]},{"page":188,"text":"Disrupting techniques include pattern painting, deploying camouflage nets over selected portions","rect":[133.1999969482422,546.477294921875,521.9959857444763,537.369140625]},{"page":188,"text":"of a target, and using shape disrupters (such as camouflage sails) to eliminate regular target","rect":[133.1999969482422,557.940185546875,522.0524668655396,548.83203125]},{"page":188,"text":"patterns.","rect":[133.1999969482422,569.443115234375,167.38523387908936,561.35693359375]},{"page":188,"text":" Decoying is the technique that deploys a false or simulated target within a target scene or in a","rect":[115.19999694824219,582.9542846679688,522.0730867462158,573.8461303710938]},{"page":188,"text":"position where the enemy might conclude that it has found the correct target. Decoys generally","rect":[133.1999969482422,594.477294921875,521.9938259124756,585.369140625]},{"page":188,"text":"draw fire away from real targets. Depending on their fidelity and deployment, decoys greatly","rect":[133.1999969482422,605.940185546875,521.9594631195068,596.83203125]},{"page":188,"text":"enhance survivability.","rect":[133.1999969482422,617.4631958007813,221.5042371749878,608.3550415039063]},{"page":188,"text":"8-114. Units employ damage limiting measures as part of unit survivability measures. These measures","rect":[89.9937515258789,634.9881591796875,522.0271747093201,625.8800048828125]},{"page":188,"text":"attempt to limit damage if enemy forces detect the position. Damage limiting measures make enemy forces","rect":[89.97370910644531,646.4510498046875,521.9102313499451,637.3428955078125]},{"page":188,"text":"destroy friendly equipment one piece at a time and use multiple attacks. Enemy forces should never be able","rect":[89.97370910644531,657.9740600585938,522.0408601837158,648.8659057617188]},{"page":188,"text":"to put a unit out of action with just a single attack. One type of damage limiting measure is units disperse to","rect":[89.97370910644531,669.4970703125,521.8838405609131,660.3788452148438]},{"page":188,"text":"limit the damage done by an enemy attack. Dispersed troops and vehicles make attacking forces concentrate","rect":[89.97370910644531,680.9598999023438,521.9793367462158,671.8517456054688]},{"page":188,"text":"on single, small targets in which system or target location inaccuracies may cause enemy weapons systems","rect":[89.97370147705078,692.48291015625,521.9850604515076,683.374755859375]},{"page":188,"text":"to miss intended targets. An enemy force may employ any cluster munitions to counter friendly dispersion","rect":[89.97370910644531,703.94580078125,522.0187892913818,694.837646484375]},{"page":188,"text":"efforts. The wider the dispersion of unit personnel and equipment, the greater the potential for limiting","rect":[89.97370910644531,715.4688110351563,521.9810695648193,706.3606567382813]},{"page":188,"text":"8-20","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":188,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":188,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":189,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":189,"text":"damage. This can also make it harder to mass effects. Units position forces and installations to avoid","rect":[108.0,83.51434326171875,540.0233058929443,74.40616607666016]},{"page":189,"text":"congestion, but do not disperse them to the extent that there is a risk of defeat in detail by an enemy force","rect":[108.0,94.97723388671875,539.9499788360596,85.86905670166016]},{"page":189,"text":"employing conventional munitions or weapons of mass destruction.","rect":[108.0,106.500244140625,378.52602672576907,97.3920669555664]},{"page":189,"text":"8-115. Units also use cover to limit the amount of damage and casualties that they can receive because of","rect":[108.0000228881836,124.02520751953125,540.0225732383728,114.91703033447266]},{"page":189,"text":"an enemy attack. Folds in the earth, natural depressions, trees, buildings, and walls offer cover; individuals","rect":[107.98999786376953,135.48809814453126,539.9368426780701,126.37992095947266]},{"page":189,"text":"and units seek them out and use them habitually. If units deploy in flat terrain lacking cover, digging in or","rect":[107.98999786376953,147.0111083984375,539.9058740196228,137.90292358398438]},{"page":189,"text":"sandbagging can offer some protection. The unit employs obscuration if it is moving and cannot use natural","rect":[107.98999786376953,158.5340576171875,540.0099863967896,149.42587280273438]},{"page":189,"text":"cover or cannot build fortifications. Obscurants (including smoke) make target acquisition much more","rect":[107.98999786376953,169.9969482421875,540.1156282501221,160.88876342773438]},{"page":189,"text":"difficult for attacking forces. The defending unit must do everything it can to avoid an attack in the first place","rect":[107.99000549316406,181.51995849609376,539.9720125274658,172.41177368164063]},{"page":189,"text":"as part of its survivability measures, but if it is attacked, it uses cover and dispersion to limit the amount of","rect":[107.99000549316406,193.04296875,539.8840844688416,183.93478393554688]},{"page":189,"text":"damage.","rect":[107.99000549316406,204.505859375,141.63315868377686,195.39767456054688]},{"page":189,"text":"8-116. In addition to cover and concealment units employ tactical deception to increase their survivability.","rect":[107.99000549316406,222.02081298828126,539.9633741378784,212.91262817382813]},{"page":189,"text":"This can include use of decoys, frequent repositioning of units, and construction of false battle positions.","rect":[107.97998046875,233.483642578125,539.9949293136597,224.37545776367188]},{"page":189,"text":"(See Chapter 19 for more information on tactical deception.)","rect":[107.97998046875,244.98667907714845,350.42390990829468,235.89852905273438]},{"page":189,"text":"Air and Missile Defense","rect":[90.0,267.3827209472656,201.4952827606201,259.7955627441406]},{"page":189,"text":"8-117. Army AMD units will not normally be positioned to provide AMD support to security forces in the","rect":[108.0,287.154296875,540.0113802032471,278.0461120605469]},{"page":189,"text":"defending unit’s security area. Short-range air defense units may be assigned or attached to defending units","rect":[107.99999237060547,298.6171875,540.0254046897888,289.5090026855469]},{"page":189,"text":"to support maneuver forces and protect critical static assets. They may be able to range portions of the MBA","rect":[107.98998260498047,310.1401672363281,539.9828534164428,301.031982421875]},{"page":189,"text":"to provide some general support. Generally, defending ground forces depend on offensive and defensive","rect":[108.0,321.6631774902344,540.0402498321533,312.55499267578127]},{"page":189,"text":"counterair warfare operations conducted by fixed-wing aircraft and short- and long-range surface-to-air","rect":[108.0,333.1260681152344,540.0183007774353,324.01788330078127]},{"page":189,"text":"missiles for defense against enemy aircraft and missiles. Defending ground units employ small arms air","rect":[107.9800033569336,344.6490478515625,539.9214379844666,335.5408630371094]},{"page":189,"text":"defense against enemy aircraft attacking their positions and enemy UASs.","rect":[107.97996520996094,356.1119384765625,403.58001232147219,347.0037536621094]},{"page":189,"text":"8-118. Air and missile defense supports the conduct of the defense by engaging targets throughout the","rect":[107.96995544433594,373.63690185546877,539.9440584259033,364.5287170410156]},{"page":189,"text":"assigned area with air and missile defense fires and defensive counterair operations. In the defense, general","rect":[107.9599380493164,385.159912109375,539.9095835647584,376.0517272949219]},{"page":189,"text":"fire support considerations for supporting the concept of operations include—","rect":[107.9599380493164,396.622802734375,419.3014030456543,387.5146179199219]},{"page":189,"text":" Planning for target acquisition and sensors to provide coverage of NAIs, TAIs, and critical assets.","rect":[133.1999969482422,410.09429931640627,539.9900465011597,400.9861145019531]},{"page":189,"text":" Providing fires in support of defensive counterair operations to prevent enemy aerial attacks.","rect":[133.1999969482422,423.59429931640627,521.9219923019409,414.4861145019531]},{"page":189,"text":" Providing integrated air and missile defense fires in synchronization with maneuver and","rect":[133.1999969482422,437.09429931640627,540.0429592132568,427.9861145019531]},{"page":189,"text":"electromagnetic warfare countermeasures in the conduct of decisive and shaping operations.","rect":[151.1999969482422,448.6173095703125,520.2417554855347,439.5091247558594]},{"page":189,"text":" Providing fires to support counterattacks.","rect":[133.1999969482422,462.1142883300781,316.42385387420657,453.006103515625]},{"page":189,"text":" Providing fires in support of main and supporting efforts.","rect":[133.1999969482422,475.6142883300781,380.31731700897219,466.506103515625]},{"page":189,"text":"See JP 3-01 for additional information on joint counterair operations.","rect":[107.9937744140625,490.1332702636719,384.63201427459719,481.01507568359377]},{"page":189,"text":"Force Health Protection","rect":[90.0,512.4827270507813,202.98747862243654,504.8955383300781]},{"page":189,"text":"8-119. Defensive operations can result in prolonged occupation of static positions and corresponding","rect":[108.0,532.2542724609375,539.9654445648193,523.1461181640625]},{"page":189,"text":"exposure of personnel and equipment to weather and other environmental effects or health threats that can","rect":[108.0,543.7572631835938,540.0041408538818,534.6691284179688]},{"page":189,"text":"quickly degrade readiness. Proper planning and employment of force health protection asset to mitigate","rect":[108.0,555.2401733398438,539.9272127227783,546.1320190429688]},{"page":189,"text":"potential health threats is critical to conducting defensive operations. Units enforce environmental","rect":[108.0,566.76318359375,539.9809946975709,557.655029296875]},{"page":189,"text":"disciplines, such as hydration, field hygiene and sanitation, protective clothing, and maintenance. Defensive","rect":[108.0,578.2861938476563,540.0661897735596,569.1780395507813]},{"page":189,"text":"operations also may entail sustained enemy bombardments resulting in dramatic effects on the mental and","rect":[108.0,589.7490844726563,539.9921169281006,580.6409301757813]},{"page":189,"text":"behavioral health of unit personnel. Soldiers can become combat ineffective from heavy indirect fire, even if","rect":[108.0,601.2720947265625,540.0353295860291,592.1639404296875]},{"page":189,"text":"exposure is for short durations. Units deliberately emplace systems for combat and operational stress","rect":[108.0,612.7950439453125,539.9922625999451,603.6868896484375]},{"page":189,"text":"identification and treatment to reduce the return to duty time of affected personnel.","rect":[108.0,624.2579345703125,439.23614025115969,615.1497802734375]},{"page":189,"text":"Chemical, Biological, Radiological, and Nuclear","rect":[90.0,648.8607177734375,313.8756080780029,639.0555419921875]},{"page":189,"text":"8-120. Defending units in static positions are vulnerable to CBRN threats and hazards. Units specify the","rect":[108.0,666.414306640625,540.0855379180908,657.30615234375]},{"page":189,"text":"degree of acceptable risk and establish priorities for their CBRN assets. They must balance the dispersion of","rect":[108.0,677.877197265625,539.9070947227478,668.76904296875]},{"page":189,"text":"forces and installations to increase CBRN survivability with the ability to mass overwhelming combat power","rect":[107.98998260498047,689.400146484375,539.9944360313416,680.2919921875]},{"page":189,"text":"to defeat enemy forces.","rect":[107.98998260498047,700.9231567382813,201.3293104171753,691.8150024414063]},{"page":189,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":189,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":189,"text":"8-21","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":190,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":190,"text":"8-121. Units develop, train, and rehearse a CBRN protection plan to protect personnel and equipment from","rect":[90.0,83.49430847167969,522.0664954147339,74.40616607666016]},{"page":190,"text":"CBRN hazards. Units conduct mission-oriented protective posture level analysis results to determine initial","rect":[90.0100326538086,94.97723388671875,522.0243906936646,85.86905670166016]},{"page":190,"text":"individual protective equipment levels, decontaminants, water, and other CBRN equipment requirements.","rect":[90.0100326538086,106.48020935058594,522.1144971847534,97.3920669555664]},{"page":190,"text":"Higher echelon headquarters often establish the mission-oriented protective posture level. Force health","rect":[90.01005554199219,118.023193359375,521.9111232757568,108.9150161743164]},{"page":190,"text":"personnel maintain situational awareness and surveillance of personnel strength information for indications","rect":[90.01007080078125,129.486083984375,521.9668719749451,120.3779067993164]},{"page":190,"text":"of force contamination, epidemics, or other anomalies apparent in force health data. Units ensure that they","rect":[90.01007080078125,141.00909423828126,522.0324001312256,131.90090942382813]},{"page":190,"text":"can conduct CBRN defense measures including surveillance, protection and decontamination of military","rect":[90.01005554199219,152.5321044921875,521.9813137054443,143.42391967773438]},{"page":190,"text":"personnel and equipment. Commanders are responsible for CBRN passive defense training to prepare the","rect":[90.01005554199219,163.9949951171875,521.9839754180908,154.88681030273438]},{"page":190,"text":"unit to operate in a CBRN environment.","rect":[90.01005554199219,175.4979705810547,250.25490856170655,166.40982055664063]},{"page":190,"text":"8-122. CBRN personnel contribute to the overall protection of units located in defensive positions. Units","rect":[90.01005554199219,193.01292419433595,521.9963519554138,183.92477416992188]},{"page":190,"text":"employ CBRN reconnaissance and surveillance elements along movement routes and at potential choke","rect":[90.00003814697266,204.495849609375,522.0441560821533,195.38766479492188]},{"page":190,"text":"points. CBRN vulnerability assessments provide a list of recommended preventive measures for units to","rect":[90.00003814697266,216.018798828125,521.9623317718506,206.91061401367188]},{"page":190,"text":"consider before and after they move into their defensive positions. These assessments provide a list of","rect":[90.0,227.481689453125,522.0214135704041,218.37350463867188]},{"page":190,"text":"preventive measures that can range from mission-oriented protective posture levels, CBRN agent","rect":[90.0,239.00469970703126,522.0904917678834,229.89651489257813]},{"page":190,"text":"characteristics on persistency and volatility, to establishing or activating collective protection systems and","rect":[89.98998260498047,250.5277099609375,522.0232448577881,241.41952514648438]},{"page":190,"text":"establishing personnel and equipment decontamination sites. Proper use of CBRN assets enables units to","rect":[89.98999786376953,261.9906005859375,522.0122585296631,252.88241577148438]},{"page":190,"text":"reduce casualties and complete the mission. (See FM 3-11 for more information on CBRN operations.)","rect":[89.98999786376953,273.4935607910156,502.1226708946228,264.4054260253906]},{"page":190,"text":"Operations Security","rect":[72.0,298.1006774902344,166.37310218811036,288.2955627441406]},{"page":190,"text":"8-123. As part of the defense, the echelon’s OPSEC program and any military deception or survivability","rect":[90.0,315.654296875,521.9561061859131,306.5461120605469]},{"page":190,"text":"efforts should conceal the locations of defensive positions, engineer support, the disposition of forces, and","rect":[89.9999771118164,327.1171875,522.0324001312256,318.0090026855469]},{"page":190,"text":"the timing of any offensive operations from the enemy or mislead the enemy regarding this information.","rect":[90.02002716064453,338.6401672363281,521.9773511886597,329.531982421875]},{"page":190,"text":"These measures prevent the enemy from launching effective spoiling attacks. (For more information on","rect":[90.01001739501953,350.1030578613281,521.9562282562256,340.994873046875]},{"page":190,"text":"military deception see FM 3-13.4. For more information on operations security see ATP 3-13.3.)","rect":[90.01001739501953,361.6260681152344,476.92729735946656,352.51788330078127]},{"page":190,"text":"Explosive Ordnance Disposal","rect":[72.0,386.21875,209.49268645477296,376.4355773925781]},{"page":190,"text":"8-124. Explosive ordnance disposal elements provide the capability to detect, identify, evaluate, render safe,","rect":[90.0,403.7943115234375,522.0120191574097,394.6861267089844]},{"page":190,"text":"exploit, and dispose of explosive hazards to ensure friendly forces maintain their freedom of movement.","rect":[90.0,415.2572021484375,522.0323438644409,406.1490173339844]},{"page":190,"text":"These elements can also render safe and dispose of explosive hazards that deny access to or threaten supplies,","rect":[89.98994445800781,426.7801818847656,521.9210767745972,417.6719970703125]},{"page":190,"text":"facilities, and other critical assets. These hazards can include conventional unexploded ordnance, high-yield","rect":[89.97993469238281,438.3031921386719,521.8820095062256,429.19500732421877]},{"page":190,"text":"explosives and associated materials, improvised explosive devices, and weapons of mass destruction.","rect":[89.96991729736328,449.74603271484377,522.0123853683472,440.65789794921877]},{"page":190,"text":"Explosive ordnance disposal may dispose of hazardous foreign or U.S. ammunition; unexploded ordnance;","rect":[89.96991729736328,461.2890625,521.9648814163209,452.1808776855469]},{"page":190,"text":"and individual, booby-trapped, and chemical mines. Breaching and clearance of minefields is primarily an","rect":[89.96991729736328,472.751953125,521.8801174163818,463.6437683105469]},{"page":190,"text":"engineer responsibility (See ATP 4-32 for more information on explosive ordnance disposal operations).","rect":[89.95989227294922,484.27496337890627,508.4993848800659,475.1667785644531]},{"page":190,"text":"Detention Operations","rect":[72.0,508.8587646484375,173.0994363746643,499.0755920410156]},{"page":190,"text":"8-125. During the defense, units must plan for capturing numerousdetainees, mostof whom are categorized","rect":[90.0,526.434326171875,522.0323390960693,517.326171875]},{"page":190,"text":"as enemy prisoners of war. The classification of these detainees varies according to operational environments.","rect":[90.0,537.897216796875,522.0495557785034,528.7890625]},{"page":190,"text":"Defending units may capture individual detainees or entire enemy units separated and disorganized from","rect":[90.0,549.420166015625,521.9629187545777,540.31201171875]},{"page":190,"text":"combat. Unit staffs consider detention operations when developing defensive plans. Planners account for all","rect":[90.0,560.9431762695313,521.9674448928834,551.8350219726563]},{"page":190,"text":"aspects of detainee operations while planning for the supported operation. To ensure that units are prepared","rect":[90.0,572.4060668945313,521.9734401702881,563.2979125976563]},{"page":190,"text":"to incorporate detainee operations during planning, units establish mechanisms that ensure effective","rect":[90.0,583.9290771484375,522.0171175079346,574.8209228515625]},{"page":190,"text":"consideration of potential detainee operations and their supporting activities. Units monitor the actual number","rect":[89.9999771118164,595.4520263671875,522.0804956016541,586.3438720703125]},{"page":190,"text":"of detainees closely to avoid devoting too many or too few resources to detainee operations.","rect":[89.9999771118164,606.9149169921875,458.0206251144409,597.8067626953125]},{"page":190,"text":"8-126. All Soldiers participating in military operations must be prepared to process and safeguard detainees.","rect":[90.0,624.43994140625,522.0603590011597,615.331787109375]},{"page":190,"text":"Actions at the point of capture—the point at which a Soldier has the custody of, and is responsible for","rect":[89.98997497558594,635.90283203125,521.9382836875916,626.794677734375]},{"page":190,"text":"safeguarding, a detainee—can directly affect mission success and could have a lasting impact on U.S. tactical,","rect":[89.98997497558594,647.42578125,521.9222364425659,638.317626953125]},{"page":190,"text":"operational, and theater strategic military objectives. Military police are trained in detainee operations and","rect":[89.98997497558594,658.9487915039063,521.9919338226318,649.83056640625]},{"page":190,"text":"support the force by relieving units of detainees to reduce the impact on combat forces. (See FM 3-63 for","rect":[89.97994232177735,670.4116821289063,521.9451806602478,661.3035278320313]},{"page":190,"text":"more information on detainee operations.)","rect":[89.96991729736328,681.9146728515625,258.4963128623962,672.8265380859375]},{"page":190,"text":"8-22","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":190,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":190,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":191,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":191,"text":"Area Security","rect":[90.0,84.62071228027344,155.08175086975099,74.81556701660156]},{"page":191,"text":"8-127. The enemy will employ of mix of long-range fires, aircraft, cannons, missiles, and rockets, as well","rect":[108.0,102.11431884765625,539.9812388381959,93.00614166259766]},{"page":191,"text":"as ground maneuver and special purpose forces, to attack defending forces, command and control nodes,","rect":[107.9999771118164,113.6373291015625,539.9852247238159,104.5291519165039]},{"page":191,"text":"lines of communication (LOCs), sustainment sites, and civilian population centers to disrupt a unit’s defense.","rect":[107.99996185302735,125.14030456542969,540.0313673019409,116.05216217041016]},{"page":191,"text":"Units pay attention to area and local security throughout the conduct of the defense. This is especially true","rect":[107.97993469238281,136.6231689453125,539.9902010040283,127.5149917602539]},{"page":191,"text":"when the defending unit conducts noncontiguous operations. Units protect their forces and critical assets","rect":[107.97993469238281,148.14617919921876,539.9549701194763,139.03799438476563]},{"page":191,"text":"through a variety of measures. Forces conducting area security in the defense can deter, detect, or defeat","rect":[107.97993469238281,159.669189453125,540.0333018264771,150.56100463867188]},{"page":191,"text":"terrorist elements in addition to providing protection from more conventional threats.","rect":[107.97993469238281,171.132080078125,448.77431774139407,162.02389526367188]},{"page":191,"text":"8-128. The success of unit defensive actions may depend on protecting the echelon support area from enemy","rect":[107.97993469238281,188.65704345703126,540.0331935882568,179.54885864257813]},{"page":191,"text":"attacks. Units address any early detection and immediate destruction of enemy forces attempting to operate","rect":[107.96990966796875,200.1800537109375,540.0293245391846,191.07186889648438]},{"page":191,"text":"in the echelon support area or interdict LOCs between support areas and maneuver forces. Enemy attacks in","rect":[107.96991729736328,211.6429443359375,539.9411525726318,202.53475952148438]},{"page":191,"text":"the echelon support area can range in size from individual saboteurs to enemy airborne or air assault insertions","rect":[107.96990203857422,223.16595458984376,540.0088641624451,214.05776977539063]},{"page":191,"text":"targeted against key facilities and capabilities. These enemy activities, especially at smaller unit levels, may","rect":[107.96994018554688,234.68896484375,539.9949855804443,225.58078002929688]},{"page":191,"text":"even precede the onset of hostilities and may be almost indistinguishable from terrorist acts.","rect":[107.96994018554688,246.15185546875,476.1136121749878,237.04367065429688]},{"page":191,"text":"8-129. Units clearly define responsibilities for the security of units in the echelon support area. The unit","rect":[107.96994018554688,263.67681884765627,539.9640269241334,254.56857299804688]},{"page":191,"text":"designated as responsible for a given echelon support area (for example, the maneuver enhancement brigade","rect":[107.95990753173828,275.1998291015625,540.0422029571533,266.0915832519531]},{"page":191,"text":"for the division support area) is responsible for defensive planning and risk mitigation in that area. That unit","rect":[107.95992279052735,286.66265869140627,540.0463023147584,277.5544738769531]},{"page":191,"text":"can designate the commanders of tenant units (except medical corps officers) as base and base cluster","rect":[107.95990753173828,298.1856689453125,539.9664819297791,289.0774841308594]},{"page":191,"text":"commanders. Those base and base cluster units are responsible for the local security of their respective bases","rect":[107.95990753173828,309.70867919921877,540.0167987327576,300.6004943847656]},{"page":191,"text":"and base clusters. The unit responsible for the echelon support area can also designate protection standards","rect":[107.95990753173828,321.1715393066406,539.9873797874451,312.0633544921875]},{"page":191,"text":"and defensive readiness conditions for tenant units and units transiting through the area. Higher protection","rect":[107.95990753173828,332.69451904296877,539.9056301116943,323.5863342285156]},{"page":191,"text":"standards can affect the ability of those supporting sustainment units to perform their primary mission—","rect":[107.95990753173828,344.157470703125,540.0223197937012,335.0492858886719]},{"page":191,"text":"support the operations of maneuver and other forces. Units coordinate to mitigate effects of security","rect":[107.95990753173828,355.6804504394531,539.9870510101318,346.572265625]},{"page":191,"text":"operations on the primary functions of the echelon support area.","rect":[107.95990753173828,367.20343017578127,364.0241651535034,358.0952453613281]},{"page":191,"text":"8-130. The echelon’s OPSEC program and any deception or survivability efforts should conceal the","rect":[107.95990753173828,384.6683044433594,540.0144319610596,375.56011962890627]},{"page":191,"text":"location of the friendly objective, the main effort, the disposition of forces, and the timing of the defense","rect":[107.94986724853516,396.1913146972656,540.0192537384033,387.0731201171875]},{"page":191,"text":"from enemy forces or mislead enemy forces regarding this information. These measures prevent enemy forces","rect":[107.9498519897461,407.71429443359377,540.0155780296326,398.6061096191406]},{"page":191,"text":"from launching effective spoiling attacks.","rect":[107.9498519897461,419.17718505859377,274.3129835128784,410.0690002441406]},{"page":191,"text":"8-131. Planners determine how military police elements supporting the defending unit enhance unit","rect":[107.9498519897461,436.692138671875,540.0271372756959,427.5839538574219]},{"page":191,"text":"protection capabilities by conducting area security (including reconnaissance, surveillance, base security,","rect":[107.93982696533203,448.21514892578127,539.8814649581909,439.1069641113281]},{"page":191,"text":"protective services, secure routes and convoys, and physical security measures) inside and outside the echelon","rect":[107.93982696533203,459.67803955078127,540.0538845062256,450.5698547363281]},{"page":191,"text":"support area. Military police also perform response force operations to defeat Level II threats against bases","rect":[107.93982696533203,471.2010498046875,539.8854510765076,462.0928649902344]},{"page":191,"text":"and base clusters located in that support area. Military police maintain contact with Level III threats in the","rect":[107.93982696533203,482.7240905761719,539.9463167266846,473.61590576171877]},{"page":191,"text":"echelon support area until a tactical combat force can respond.","rect":[107.93982696533203,494.16693115234377,357.80962657928469,485.07879638671877]},{"page":191,"text":"Risk Management","rect":[90.0,518.720703125,175.73843213272097,508.9155578613281]},{"page":191,"text":"8-132. The likelihood of fratricide decreases during defensive operations compared to offensive operations.","rect":[108.0,536.2742919921875,540.0534620285034,527.1661376953125]},{"page":191,"text":"During defensive operations, friendly forces are typically stationary and the enemy is maneuvering towards","rect":[108.0,547.7371826171875,540.0536639671326,538.6290283203125]},{"page":191,"text":"them. However, instances for fratricide are typically higher during transitions, such as going on the offense","rect":[108.0,559.2601928710938,539.9833040313721,550.1520385742188]},{"page":191,"text":"or retrograding.","rect":[108.0,570.783203125,170.73623180389405,561.675048828125]},{"page":191,"text":"8-133. During the preparation phase of defensive actions, planning and rehearsals are the primary tools for","rect":[108.0,588.248046875,540.0302636680603,579.139892578125]},{"page":191,"text":"identifying and reducing risk. The types of risks identified determine the type of rehearsal conducted.","rect":[107.98994445800781,599.7710571289063,540.0811719894409,590.6629028320313]},{"page":191,"text":"Rehearsals should extend to all levels of command and involve all key players. Considerations for their use","rect":[107.98994445800781,611.2940673828125,540.1100740509033,602.1859130859375]},{"page":191,"text":"include—","rect":[107.98994445800781,620.73291015625,147.46874618530274,613.6488037109375]},{"page":191,"text":" Confirmation briefs to ensure leaders understand what they have been told to do.","rect":[133.1999969482422,636.2343139648438,474.2239942550659,627.1261596679688]},{"page":191,"text":" Backbriefs to ensure subordinates course of actions meets their higher echelon commander’s","rect":[133.1999969482422,649.7343139648438,540.0561664085388,640.6261596679688]},{"page":191,"text":"intent.","rect":[151.1999969482422,659.2332763671875,176.50048351287843,652.149169921875]},{"page":191,"text":" Rehearsals to ensure all Soldiers understand how their organization synchronizes with the rest of","rect":[133.1999969482422,674.7542724609375,540.0941674766541,665.6461181640625]},{"page":191,"text":"the friendly forces in offensive operations.","rect":[151.1999969482422,686.2772827148438,321.22939586639407,677.1691284179688]},{"page":191,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":191,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":191,"text":"8-23","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":192,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":192,"text":"TRANSITIONS","rect":[72.0,85.28965759277344,168.3962928314209,75.61549377441406]},{"page":192,"text":"8-134. If a defense is successful, units anticipate and transition to either offensive operations or stability","rect":[90.0,105.59429931640625,521.9612941741943,96.48612213134766]},{"page":192,"text":"operations. If an area or a mobile defense is unsuccessful, forces transition into a retrograde. Transition from","rect":[89.99002075195313,117.1173095703125,522.0053992233277,108.0091323852539]},{"page":192,"text":"one type of operation to another requires accurate situational assessment capabilities as well as mental and","rect":[90.01005554199219,128.5802001953125,522.0394191741943,119.4720230102539]},{"page":192,"text":"physical agility of all those involved.","rect":[90.01005554199219,140.1031494140625,238.3151044845581,130.99496459960938]},{"page":192,"text":"8-135. Units deliberately plan for branch or sequel operations, which assist the transition process and allow","rect":[90.01005554199219,157.6181640625,522.0462689437866,148.50997924804688]},{"page":192,"text":"them to create conditions necessary for a successful transition. Such planning addresses the need to control","rect":[90.0000228881836,169.08099365234376,521.9244151077271,159.97280883789063]},{"page":192,"text":"the tempo of operations, maintain contact with both enemy and friendly forces, and keep the enemy force off","rect":[90.0,180.60400390625,522.0483911094666,171.49581909179688]},{"page":192,"text":"balance. Transition planning establishes the procedures and priorities by which a unit prepares for the next","rect":[90.0,192.12701416015626,521.9845347366334,183.01882934570313]},{"page":192,"text":"mission. Based on the mission variables, it establishes the required organization of forces and control","rect":[90.0,203.58990478515626,522.0120005569459,194.48171997070313]},{"page":192,"text":"measures necessary for success. Probable transitions should be identified by units with a staff and reflect on","rect":[90.0,215.1129150390625,521.9702053070068,206.00473022460938]},{"page":192,"text":"the commanders’ decision support products.","rect":[90.0,226.55577087402345,266.9180860519409,217.46762084960938]},{"page":192,"text":"8-136. Prior contingency planning decreases the time needed to adjust the tempo of combat operations when","rect":[90.01001739501953,244.09075927734376,522.0100612640381,234.97256469726563]},{"page":192,"text":"a unit transitions from a focus on the defense to other operations. It does this by allowing subordinate units","rect":[90.0,255.61376953125,522.0193011741638,246.50558471679688]},{"page":192,"text":"to simultaneously plan and prepare for subsequent operations. Preparations typically include resupplying unit","rect":[90.0,267.07659912109377,521.9826426467896,257.9684143066406]},{"page":192,"text":"basic loads and repositioning or reallocating supporting systems.","rect":[90.0,278.599609375,348.88271617889407,269.4914245605469]},{"page":192,"text":"8-137. A unit’scontingency planning also reduces the amount of time and confusion when itis unsuccessful","rect":[90.01001739501953,296.1246337890625,522.0824961624146,287.0164489746094]},{"page":192,"text":"in its defensive efforts and must transition to retrograde operations. Units designate subordinate units to","rect":[90.00003814697266,307.5874938964844,521.9483547210693,298.47930908203127]},{"page":192,"text":"conduct delaying operations and to evacuate casualties and inoperative equipment. They use retrograde","rect":[90.00003814697266,319.1104736328125,522.0531892852783,310.0022888183594]},{"page":192,"text":"operations to preserve the force as a combat-capable formation until they can establish those conditions","rect":[90.00003814697266,330.63348388671877,521.9791400413513,321.5252990722656]},{"page":192,"text":"necessary for a successful defense.","rect":[90.00003814697266,342.09637451171877,229.11767101287843,332.9881896972656]},{"page":192,"text":"TRANSITION TO OFFENSIVE OPERATIONS","rect":[72.0,365.447998046875,275.6983699798584,357.156005859375]},{"page":192,"text":"8-138. A defending unit transitions to the offense by anticipating when and where an enemy force will reach","rect":[90.0,385.3742980957031,522.0622463226318,376.26611328125]},{"page":192,"text":"its culminating point or require an operational pause before it can continue. At those moments, the defending","rect":[90.0,396.8973083496094,522.0983791351318,387.78912353515627]},{"page":192,"text":"force has odds that are more favorable. Combat power ratios favor a defending force. The enemy force will","rect":[90.0,408.36016845703127,521.9525523147584,399.2519836425781]},{"page":192,"text":"do everything it can to keep friendly forces from knowing it is approaching that culmination point and thus","rect":[90.0,419.8831787109375,521.9752948265076,410.7749938964844]},{"page":192,"text":"is overextended. Indicators that the enemy force is becoming overextended include when—","rect":[90.0100326538086,431.40618896484377,456.01057052612307,422.2980041503906]},{"page":192,"text":" Enemy forces begin to transition to the defense; this defense may be by forces in or out of contact","rect":[115.19999694824219,444.894287109375,522.0248789749146,435.7861022949219]},{"page":192,"text":"with friendly forces.","rect":[133.1999969482422,456.357177734375,214.60247325897218,447.2489929199219]},{"page":192,"text":" Enemy forces suffer heavy losses.","rect":[115.19999694824219,469.85430908203127,269.6252393722534,460.7461242675781]},{"page":192,"text":" Enemy forces start to deploy before encountering friendly forces.","rect":[115.19999694824219,483.35430908203127,394.54278087615969,474.2461242675781]},{"page":192,"text":" Enemy forces are defeated in most engagements.","rect":[115.19999694824219,496.85430908203127,328.9697217941284,487.7461242675781]},{"page":192,"text":" Enemy forces are committed piecemeal in continued enemy attacks.","rect":[115.19999694824219,510.35430908203127,405.6289014816284,501.2461242675781]},{"page":192,"text":" Enemy reserves are identified among the attacking forces.","rect":[115.19999694824219,523.8543090820313,365.37847423553469,514.7461547851563]},{"page":192,"text":" Examination of captured or killed enemy soldiers and captured or destroyed enemy equipment and","rect":[115.19999694824219,537.3543090820313,521.9927272796631,528.2461547851563]},{"page":192,"text":"supplies shows that the enemy force is unable to sustain itself.","rect":[133.1999969482422,548.8773193359375,381.8220167160034,539.7691650390625]},{"page":192,"text":" Enemy operations show a noticeable reduction in tempo.","rect":[115.19999694824219,562.374267578125,360.34649181365969,553.26611328125]},{"page":192,"text":" Local counterattacks meet with unexpected success.","rect":[115.19999694824219,575.854248046875,341.49367809295657,566.76611328125]},{"page":192,"text":"8-139. In a mobile defense, transitioning to the offense generally follows the striking force’s counterattack.","rect":[89.9937515258789,593.3391723632813,522.0211133956909,584.2310180664063]},{"page":192,"text":"In an area defense, units designate a portion of their force to conduct the attack. This force usually includes","rect":[89.98373413085938,604.8621826171875,522.0387713890076,595.7540283203125]},{"page":192,"text":"the echelon’s available reserves.","rect":[89.98373413085938,614.361083984375,219.3179121017456,607.2769775390625]},{"page":192,"text":"8-140. As units transition their forces from the defense to the offense, they—","rect":[89.97370910644531,633.8500366210938,404.5437431335449,624.7418823242188]},{"page":192,"text":" Establish a LD. This may require the conduct of local, small-scale attacks to seize terrain necessary","rect":[115.19999694824219,647.3342895507813,521.9629421234131,638.2261352539063]},{"page":192,"text":"for the conduct of offensive operations or to destroy enemy forces that could threaten the larger","rect":[133.1999969482422,658.8572998046875,522.0110986289978,649.7491455078125]},{"page":192,"text":"offensive action.","rect":[133.1999969482422,668.3562622070313,199.90114879608155,661.2721557617188]},{"page":192,"text":" Maintain contact with enemy forces, using combinations of available information collection assets","rect":[115.19999694824219,683.874267578125,522.0921771507263,674.76611328125]},{"page":192,"text":"to develop the information required to plan future operations and avoid falling for enemy military","rect":[133.1999969482422,695.337158203125,522.0341091156006,686.22900390625]},{"page":192,"text":"deception operations.","rect":[133.1999969482422,706.8401489257813,218.80384349822999,697.7520141601563]},{"page":192,"text":"8-24","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":192,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":192,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":193,"text":"The Defense","rect":[486.47998046875,44.55902099609375,539.9526083984375,37.90802001953125]},{"page":193,"text":"","rect":[133.1999969482422,80.78548431396485,139.16105696249009,76.09324645996094]},{"page":193,"text":"","rect":[133.1999969482422,105.74544525146485,139.16105696249009,101.05320739746094]},{"page":193,"text":"","rect":[133.1999969482422,130.76547241210938,139.16105696249009,126.07322692871094]},{"page":193,"text":"","rect":[133.1999969482422,144.26547241210938,139.16105696249009,139.57322692871095]},{"page":193,"text":"Maintain or regain contact with adjacent units in a contiguous assigned area and ensure that","rect":[151.1999969482422,83.51434326171875,539.9503550491334,74.39614868164063]},{"page":193,"text":"subordinate units remain capable of mutual support in a noncontiguous assigned area.","rect":[151.1999969482422,94.97723388671875,493.9632520675659,85.86905670166016]},{"page":193,"text":"Maneuver capabilities based on probable future employment. For example, fire support assets tend","rect":[151.1999969482422,108.47430419921875,539.9679470062256,99.36612701416016]},{"page":193,"text":"to move forward so that their range encompasses additional enemy forces and terrain.","rect":[151.1999969482422,119.997314453125,493.60341930389407,110.8891372680664]},{"page":193,"text":"Transition the focus of engineer efforts from countermobility and survivability to mobility.","rect":[151.1999969482422,133.49432373046876,514.9670362472534,124.38614654541016]},{"page":193,"text":"Submit a prioritized protection list to influence the positioning of these air and missile defense","rect":[151.1999969482422,146.99432373046876,539.9207429962158,137.88613891601563]},{"page":193,"text":"assets.","rect":[151.20001220703126,156.49330139160157,177.0415906906128,150.41116333007813]},{"page":193,"text":"8-141. Units reorganize and resupply concurrently with other transition activities. This requires sustainment","rect":[108.0037841796875,175.982177734375,540.0379404983521,166.87399291992188]},{"page":193,"text":"to transition from a chosen location to an emphasis on ensuring the force’s ability to advance and maneuver.","rect":[107.99376678466797,187.50518798828126,540.0401563644409,178.39700317382813]},{"page":193,"text":"For example, in the defense, the sustainment effort may focus on Class IV and Class V items and evacuation","rect":[107.99372863769531,199.0281982421875,539.9681911468506,189.92001342773438]},{"page":193,"text":"of combat-damaged systems. In the offense, the sustainment effort may focus on providing Class III and","rect":[107.98370361328125,210.4910888671875,539.9789943695068,201.38290405273438]},{"page":193,"text":"forward repair of maintenance and combat losses. A transition is often a time to perform deferred equipment","rect":[107.98373413085938,221.99400329589845,540.0819468460084,212.90585327148438]},{"page":193,"text":"maintenance. Additional assets may also be available on a temporary basis for casualty evacuation and","rect":[107.98373413085938,233.4769287109375,539.9735622406006,224.36874389648438]},{"page":193,"text":"medical treatment because of a reduction in the tempo of operations.","rect":[107.98373413085938,244.9799041748047,382.0478162765503,235.89175415039063]},{"page":193,"text":"8-142. Units should not wait too long to transition from the defense to the offense as the enemy force","rect":[107.98373413085938,262.52490234375,540.0110139923096,253.41671752929688]},{"page":193,"text":"approaches its culminating point. At that point, enemy forces are dispersed, extended in depth, and weakened.","rect":[107.97371673583985,273.98779296875,540.1180982589722,264.8796081542969]},{"page":193,"text":"At that time, any enemy defensive preparations will be hasty, and they will not have their forces adequately","rect":[107.97371673583985,285.51080322265627,540.0007839202881,276.4026184082031]},{"page":193,"text":"positioned for the defense. Units want the enemy force in this posture when they transition to the offense.","rect":[107.97371673583985,297.0338134765625,539.9666090011597,287.9256286621094]},{"page":193,"text":"They do not want to give the enemy force time to prepare for the defense. Additionally, the psychological","rect":[107.97371673583985,308.4966735839844,539.9887461624146,299.38848876953127]},{"page":193,"text":"shock on enemy soldiers will be greater if they suddenly find themselves desperately defending on new and","rect":[107.97371673583985,320.0196533203125,539.9968776702881,310.9114685058594]},{"page":193,"text":"often unfavorable terms while friendly Soldiers will enjoy a psychological boost by going on the offense.","rect":[107.97371673583985,331.54266357421877,528.9186353683472,322.4244689941406]},{"page":193,"text":"8-143. If units in contact transitions to the attack, they must retain sufficient forces in contact to fix enemy","rect":[107.97371673583985,349.00750732421877,539.9959011077881,339.8993225097656]},{"page":193,"text":"forces. Units concentrate their attacks by reinforcing select subordinate units so they can execute the attack,","rect":[107.96369934082031,360.530517578125,539.8692579269409,351.4223327636719]},{"page":193,"text":"and if necessary, maintain the existing defense. They can also adjust the defensive boundaries of subordinate","rect":[107.96369934082031,372.05352783203127,539.9698152618408,362.9353332519531]},{"page":193,"text":"units so entire units can withdraw and concentrate for the attack. For more information on transitioning to","rect":[107.96369934082031,383.5163879394531,539.9399318695068,374.408203125]},{"page":193,"text":"the offense, see counterattacks in Chapter 5.","rect":[107.97370147705078,395.0193786621094,284.59722423553469,385.9312438964844]},{"page":193,"text":"8-144. If a defensive operation leads to a stalemate with both forces left in contact, defending units seek to","rect":[107.97370910644531,412.5644226074219,540.0038967132568,403.45623779296877]},{"page":193,"text":"retain the initiative and create conditions for future operations. Commanders prepare their defending units to","rect":[107.97370910644531,424.02728271484377,540.0612087249756,414.9190979003906]},{"page":193,"text":"move rapidly to subsequent defensive positions during battle lulls because of the risks associated with","rect":[107.97372436523438,435.55029296875,539.9401760101318,426.4421081542969]},{"page":193,"text":"defending twice from the same positions. This is because the enemy force now knows the location of friendly","rect":[107.97370147705078,447.07330322265627,540.0347805023193,437.9651184082031]},{"page":193,"text":"defensive positions and can target them with supporting fires unless those defending forces can displace.","rect":[107.97371673583985,458.5361633300781,539.9480543136597,449.427978515625]},{"page":193,"text":"Defending units stay in place and continue to fight unless they can suppress enemy forces or take other actions","rect":[107.97371673583985,470.0591735839844,540.0187518577576,460.95098876953127]},{"page":193,"text":"to break contact with enemy forces if there are no battle lulls. This is because of the risk when units try to","rect":[107.97371673583985,481.5220642089844,539.8980007171631,472.41387939453127]},{"page":193,"text":"displace from prepared positions while still under enemy pressure.","rect":[107.97370147705078,493.0450439453125,373.7523145675659,483.9367980957031]},{"page":193,"text":"TRANSITION TO THE RETROGRADE","rect":[90.0,516.322265625,262.57453298568728,508.2360534667969]},{"page":193,"text":"8-145. Defending units unable to maintain the integrity of their defense must transition to a retrograde","rect":[108.0,536.2742919921875,540.0452547149658,527.1661376953125]},{"page":193,"text":"operation or risk destruction. A retrograde involves either a delay, withdrawal, or retirement operation. These","rect":[108.0,547.7371826171875,540.0865144805908,538.6290283203125]},{"page":193,"text":"operations may occur simultaneously or sequentially. As in other operations, the commander’s intent and","rect":[108.01005554199219,559.2601928710938,539.9702663421631,550.1520385742188]},{"page":193,"text":"concept of operations drive planning for retrograde operations. Each variation of the retrograde operation has","rect":[108.01005554199219,570.783203125,540.0745379905701,561.675048828125]},{"page":193,"text":"its unique planning considerations, but considerations common to all retrograde operations are risk, the","rect":[108.01007080078125,582.24609375,540.0000276641846,573.137939453125]},{"page":193,"text":"synchronization of forces, and rear operations. Chapter 11 addresses planning, preparing, and executing","rect":[108.01007080078125,593.7691040039063,539.9787502288818,584.6609497070313]},{"page":193,"text":"considerations for retrograde operations. However, many key considerations receive special emphasis during","rect":[108.01000213623047,605.2921142578125,540.1047878265381,596.1839599609375]},{"page":193,"text":"the transition from the defense to the retrograde.","rect":[108.01001739501953,616.7549438476563,301.3158826828003,607.6467895507813]},{"page":193,"text":"8-146.","rect":[108.01001739501953,632.23583984375,133.8516035079956,625.3521118164063]},{"page":193,"text":"","rect":[133.1999969482422,645.025390625,139.16105696249009,640.3331909179688]},{"page":193,"text":"","rect":[133.1999969482422,658.525390625,139.16105696249009,653.8331909179688]},{"page":193,"text":"","rect":[133.1999969482422,672.025390625,139.16105696249009,667.3331909179688]},{"page":193,"text":"","rect":[133.1999969482422,685.525390625,139.16105696249009,680.8331909179688]},{"page":193,"text":"","rect":[133.1999969482422,699.025390625,139.16105696249009,694.3331909179688]},{"page":193,"text":"The transition to retrograde operations must be accompanied by efforts designed to—","rect":[142.55897521972657,634.2799072265625,484.97858810424807,625.1717529296875]},{"page":193,"text":"Reduce the enemy force’s strength and combat power.","rect":[151.1999969482422,647.7542724609375,368.98772716522219,638.6461181640625]},{"page":193,"text":"Provide friendly reinforcements.","rect":[151.1999969482422,661.2542724609375,281.3818311691284,652.1461181640625]},{"page":193,"text":"Concentrate forces elsewhere for the attack.","rect":[151.1999969482422,672.740234375,326.7363233566284,665.6461181640625]},{"page":193,"text":"Prepare stronger defenses elsewhere in the assigned area.","rect":[151.1999969482422,688.2542724609375,380.02175426483157,679.1461181640625]},{"page":193,"text":"Lure or force part or all of the enemy force into areas where it can be counterattacked.","rect":[151.1999969482422,701.7542724609375,495.74700450897219,692.6461181640625]},{"page":193,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":193,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":193,"text":"8-25","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":194,"text":"Chapter 8","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":194,"text":"8-147. The complexity and fluidity of retrograde operations and the absolute need to synchronize the entire","rect":[90.0,83.51434326171875,522.0211458282471,74.40616607666016]},{"page":194,"text":"operation dictates the need for detailed, centralized planning and decentralized execution. Planning for","rect":[90.0,94.97723388671875,522.0084130821228,85.86905670166016]},{"page":194,"text":"retrograde operations begins with the preparation of plans for the follow-on mission. The concept of","rect":[90.0,106.500244140625,521.9712426719666,97.3920669555664]},{"page":194,"text":"operations and commander’s intent drive those plans.","rect":[90.0,118.00315856933594,303.5762891769409,108.9150161743164]},{"page":194,"text":"8-148. The nature of retrograde operations involves an inherent risk of degrading the defending force’s","rect":[90.0,135.48809814453126,521.9823138694763,126.37992095947266]},{"page":194,"text":"morale. Commanders remain well forward and visible. They ensure that subordinate leaders and Soldiers","rect":[89.9800033569336,147.0111083984375,521.9983661155701,137.90292358398438]},{"page":194,"text":"understand the purpose and intent of the operation as well as their role in accomplishing the mission.","rect":[89.97994995117188,158.5340576171875,522.0203199386597,149.42587280273438]},{"page":194,"text":"Thorough planning, effective control, and aggressive leadership minimize risk during a retrograde and","rect":[89.97993469238281,169.9969482421875,521.9453639984131,160.88870239257813]},{"page":194,"text":"enhance the probability of success.","rect":[89.9800033569336,181.51995849609376,229.7029218673706,172.41177368164063]},{"page":194,"text":"8-149. Intelligence requirements dramatically increase as friendly forces begin their movement to other","rect":[89.9799575805664,199.044921875,522.0411279258728,189.93673706054688]},{"page":194,"text":"locations and the combat capabilities of units in contact are reduced. Units develop a synchronized and","rect":[89.96994018554688,210.5078125,521.9126491546631,201.39962768554688]},{"page":194,"text":"integrated information collection plan to identify and locate enemy attempts to pursue, outflank, and isolate","rect":[89.96990203857422,222.03082275390626,522.0330476837158,212.92263793945313]},{"page":194,"text":"the defending force as it transitions to the retrograde. As units transition to the retrograde, they make every","rect":[89.96994018554688,233.49371337890626,521.9672145843506,224.38552856445313]},{"page":194,"text":"effort to conserve combat power. Units consider the need to—","rect":[89.96994018554688,244.99668884277345,339.3276786804199,235.90853881835938]},{"page":194,"text":" Balance the risk of conserving combat power while remaining disposed to the intent of the","rect":[115.19999694824219,258.47430419921877,522.0590486602783,249.36611938476563]},{"page":194,"text":"defensive mission.","rect":[133.1999969482422,267.9732666015625,207.7046766281128,260.8891296386719]},{"page":194,"text":"","rect":[115.19999694824219,280.76544189453127,121.16105696249008,276.07318115234377]},{"page":194,"text":"","rect":[115.19999694824219,305.7254333496094,121.16105696249008,301.0331726074219]},{"page":194,"text":"","rect":[115.19999694824219,319.2254333496094,121.16105696249008,314.5331726074219]},{"page":194,"text":"Disengage and withdraw units lacking tactical mobility and nonessential elements before the","rect":[133.1999969482422,283.4942932128906,521.9710359649658,274.3861083984375]},{"page":194,"text":"retrograde of the main body.","rect":[133.1999969482422,294.9571838378906,247.35985851287843,285.8489990234375]},{"page":194,"text":"Use mobile forces to cover the retrograde of less mobile forces.","rect":[133.1999969482422,308.45428466796877,387.3373670578003,299.3460998535156]},{"page":194,"text":"Use the minimum-essential combat power necessary to provide security for the retrograde of the","rect":[133.1999969482422,321.95428466796877,521.9555330352783,312.8460998535156]},{"page":194,"text":"main body.","rect":[133.1999969482422,333.477294921875,178.24892711639405,324.3691101074219]},{"page":194,"text":"TRANSITION TO STABILITY","rect":[72.0,356.8800048828125,205.39576816558839,348.5760192871094]},{"page":194,"text":"8-150. Units may transition to stability operations if the defense retained decisive terrain, denied vital areas","rect":[90.0,376.7943115234375,522.0723407249451,367.6861267089844]},{"page":194,"text":"to enemy forces, and successfully defended against attacking enemy forces removing the need for an","rect":[90.0,388.2572021484375,522.0150661468506,379.1490173339844]},{"page":194,"text":"offensive operation. As in other operations, the commander’s intent and concept of operations drive the","rect":[90.0,399.7601318359375,522.0474519805908,390.6719970703125]},{"page":194,"text":"planning for stability tasks. Generally, units focus on meeting immediate essential service and civil security","rect":[89.98998260498047,411.3031921386719,522.0193386077881,402.19500732421877]},{"page":194,"text":"needs for civilians in the assigned area while coordinating with any existing local nation government and","rect":[89.98998260498047,422.7660827636719,522.0173854827881,413.65789794921877]},{"page":194,"text":"nongovernmental organizations before addressing the other primary stability tasks. Support requirements","rect":[89.99002075195313,434.2890625,522.0524432640076,425.1808776855469]},{"page":194,"text":"may change dramatically. Units will probably need to change their rules of engagement and ensure that those","rect":[89.99002075195313,445.81207275390627,522.0342073516846,436.7038879394531]},{"page":194,"text":"changes are quickly distributed to all levels.","rect":[89.99002075195313,457.27496337890627,265.77089977264407,448.1667785644531]},{"page":194,"text":"8-151. When a unit transitions from a defense to stability, the unit will generally execute a sequel to its","rect":[90.00003814697266,474.7899169921875,521.9962298851013,465.6817321777344]},{"page":194,"text":"previous defensive order. Units reorganize to introduce those capabilities required by changes in the mission","rect":[89.9900131225586,486.2528076171875,521.9613552093506,477.1446228027344]},{"page":194,"text":"variables. If commanders and staffs are unfamiliar with the civil considerations of their assigned area, they","rect":[89.98999786376953,497.77581787109377,522.0080471038818,488.6676025390625]},{"page":194,"text":"should refer to assigned or attached civil affairs units operating in their area or their higher headquarters if","rect":[89.98999786376953,509.2987976074219,521.9531152305603,500.19061279296877]},{"page":194,"text":"they have no command or support relationship with a civil affairs unit. The command and control and","rect":[89.98998260498047,520.7616577148438,522.0694484710693,511.6534729003906]},{"page":194,"text":"protection functions remain relevant to prevent Soldiers from relaxing discipline and safety standards as the","rect":[89.9899673461914,532.28466796875,522.0514803009033,523.176513671875]},{"page":194,"text":"stress of active defensive actions disappears.","rect":[89.9899673461914,543.7876586914063,268.22768688201907,534.6995239257813]},{"page":194,"text":"8-26","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":194,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":194,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":195,"text":"Chapter 9","rect":[287.3399963378906,129.6120147705078,342.6731901855469,118.52400970458985]},{"page":195,"text":"Area Defense","rect":[263.8199768066406,150.95619201660157,366.14131214904787,139.11740112304688]},{"page":195,"text":"This chapter addresses general considerations, organization of forces, and control","rect":[126.0,188.7806854248047,504.0589401168823,178.79986572265626]},{"page":195,"text":"measures typical to an area defense. It then discusses how to plan, prepare, and execute","rect":[126.0,201.4405975341797,503.9711280975342,191.45977783203126]},{"page":195,"text":"an area defense. Lastly, this chapter discusses the variations of the area defense.","rect":[125.98900604248047,214.10057067871095,476.8131151199341,204.1197509765625]},{"page":195,"text":"GENERAL CONSIDERATIONS FOR AN AREA DEFENSE","rect":[90.0,239.42967224121095,458.29609524154668,229.7415313720703]},{"page":195,"text":"9-1. An area defense capitalizes on the strength inherent in a closely integrated defensive operation. An","rect":[108.0,259.7342529296875,539.9081325531006,250.62606811523438]},{"page":195,"text":"area defense enables forces to consolidate, reorganize, and transition to another tactical operation, such as","rect":[107.99996185302735,271.25726318359377,540.0072772483826,262.1490783691406]},{"page":195,"text":"the offense. Commanders may assign their subordinate units the task of conducting an area defense.","rect":[107.99996185302735,282.7201232910156,540.0423536300659,273.6119384765625]},{"page":195,"text":"Subordinate echelons defend within their assigned areas as part of their higher echelon’s operations.","rect":[107.99996185302735,294.2431335449219,508.42522716522219,285.13494873046877]},{"page":195,"text":"9-2.","rect":[107.99996185302735,309.74407958984377,123.88166332244873,302.8403015136719]},{"page":195,"text":"Units conduct an area defense when—","rect":[133.20025634765626,309.7641296386719,287.3379325866699,302.6599426269531]},{"page":195,"text":" Directed to defend or retain specified terrain.","rect":[133.1999969482422,325.2342529296875,331.35052013397219,316.1461181640625]},{"page":195,"text":" They cannot resource a striking force.","rect":[133.1999969482422,338.7543029785156,302.8046522140503,329.6461181640625]},{"page":195,"text":" Their available forces possess less mobility than enemy forces.","rect":[133.1999969482422,352.2543029785156,403.11590099334719,343.1461181640625]},{"page":195,"text":" The terrain affords natural lines of resistance and limits the enemy force to a few well-defined","rect":[133.1999969482422,365.7543029785156,540.0240993499756,356.6461181640625]},{"page":195,"text":"avenues of approach, thereby restricting the enemy force’s maneuver.","rect":[151.1999969482422,377.2171936035156,430.06463146209719,368.1090087890625]},{"page":195,"text":" They have enough time to organize their defensive positions.","rect":[133.1999969482422,390.71429443359377,395.32339000701907,381.6061096191406]},{"page":195,"text":" Terrain constraints and lack of friendly air superiority limit the striking force’s options in a mobile","rect":[133.1999969482422,404.21429443359377,539.9549837188721,395.1061096191406]},{"page":195,"text":"defense to a few probable employment options.","rect":[151.1899871826172,415.7373046875,340.8967237472534,406.6291198730469]},{"page":195,"text":" Conditions require the preservation of forces when transitioning from a focus on the performance","rect":[133.1999969482422,429.23431396484377,540.0069856719971,420.1261291503906]},{"page":195,"text":"of offensive operations to stability tasks.","rect":[151.1999969482422,440.69720458984377,313.42486095428469,431.5890197753906]},{"page":195,"text":"9-3. Units conducting an area defense combine static and mobile tasks to accomplish their missions. Static","rect":[108.00376892089844,458.22216796875,540.0160188751221,449.1139831542969]},{"page":195,"text":"actions usually consist of fires from prepared positions. Mobile actions include using the fires provided by","rect":[108.00376892089844,469.7452087402344,539.9323635101318,460.6369934082031]},{"page":195,"text":"units in prepared positions as a base for counterattacks and repositioning units between defensive positions.","rect":[108.00379943847656,481.20806884765627,539.9787549972534,472.09979248046877]},{"page":195,"text":"Units can use their reserves and uncommitted forces to conduct counterattacks and spoiling attacks to","rect":[108.00377655029297,492.7310485839844,540.0156764984131,483.62286376953127]},{"page":195,"text":"desynchronize enemy forces or prevent them from massing.","rect":[108.00377655029297,504.2540588378906,347.38674449920657,495.1458740234375]},{"page":195,"text":"ORGANIZATION OF FORCES FOR AN AREA DEFENSE","rect":[90.0,529.5297241210938,454.00996242904668,519.841552734375]},{"page":195,"text":"9-4. An area defense is organized with a security force, main body, and a reserve. Since an area defense","rect":[108.0,549.8342895507813,540.0534334259033,540.7261352539063]},{"page":195,"text":"focuses on retaining key terrain, most of the unit’s combat power in the main battle area is positioned to","rect":[108.00003814697266,561.2971801757813,539.9431056976318,552.1890258789063]},{"page":195,"text":"support the defense of that terrain, while security forces provide early warning. See paragraphs 9-24 through","rect":[108.00006103515625,572.8201904296875,540.0300807952881,563.7120361328125]},{"page":195,"text":"9-37 for more information on position selection in the defense.","rect":[108.0,584.3231201171875,359.06817150115969,575.2349853515625]},{"page":195,"text":"SECURITY FORCE","rect":[90.0,607.739990234375,177.55350637435914,599.4359741210938]},{"page":195,"text":"9-5. Units balance their need for strong security forces to shape their operation and their main body’s main","rect":[108.0,627.5942993164063,540.0924587249756,618.4861450195313]},{"page":195,"text":"effort. They usually allocate security forces to provide early warning and protect those main body forces,","rect":[108.0,639.1173095703125,540.0141553878784,630.0091552734375]},{"page":195,"text":"systems, and locations necessary to conduct their main effort from unexpected enemy contact. The location","rect":[108.0,650.6403198242188,539.9645900726318,641.5321655273438]},{"page":195,"text":"of these security forces is usually in front of the main defensive positions where forces are contiguous with","rect":[107.98999786376953,662.1031494140625,539.9669094085693,652.9949951171875]},{"page":195,"text":"one another. These security forces locate on avenues of approach between their respective protected forces","rect":[107.98998260498047,673.6261596679688,539.9746234397888,664.5180053710938]},{"page":195,"text":"and known or suspected enemy force locations on noncontiguous battlefields.","rect":[107.98998260498047,685.149169921875,418.4708204269409,676.041015625]},{"page":195,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":195,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":195,"text":"9-1","rect":[508.9800109863281,754.18798828125,521.9580405273438,747.6090087890625]},{"page":196,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":196,"text":"9-6. Maneuver battalion and BCT security forces normally conduct forward screen or guard operations.","rect":[90.0,83.51434326171875,521.9693555831909,74.40616607666016]},{"page":196,"text":"Division and corps commanders may employ a forward covering force. Division commanders may have their","rect":[90.0,94.97723388671875,522.0625512657166,85.86905670166016]},{"page":196,"text":"forward security forces conduct a guard if their parent corps employs a forward covering force.","rect":[90.01001739501953,106.500244140625,470.7422742843628,97.3920669555664]},{"page":196,"text":"9-7. Commanders designate flank security forces to cover gaps on the unit’s flanks. This occurs when gaps","rect":[90.01001739501953,124.02520751953125,522.0083148460388,114.91703033447266]},{"page":196,"text":"between units develop during the conduct of defensive operations. A flank screen or guard is critical if an","rect":[90.00999450683594,135.48809814453126,522.0060329437256,126.37992095947266]},{"page":196,"text":"enemy avenue of approach into the defended area from the flanks could be uncovered during the defense.","rect":[90.00999450683594,147.0111083984375,511.73162364959719,137.90292358398438]},{"page":196,"text":"MAIN BODY","rect":[72.0,170.35269165039063,132.17981052398683,162.27597045898438]},{"page":196,"text":"9-8. Units build their main effort around identified key terrain. A unit’s main effort in an area defense","rect":[90.0,190.3143310546875,522.0484285430908,181.20614624023438]},{"page":196,"text":"focuses on retaining that key terrain by using fires from mutually supporting, prepared positions","rect":[90.0000228881836,201.7772216796875,522.0692889671326,192.66903686523438]},{"page":196,"text":"supplemented by one or more counterattacks and repositioning forces. A unit’s main effort normally involves","rect":[90.0000228881836,213.30023193359376,522.0023334007263,204.19204711914063]},{"page":196,"text":"close combat since an area defense emphasizes terrain retention.","rect":[90.0,224.74302673339845,347.4309034347534,215.65487670898438]},{"page":196,"text":"9-9. Units normally position their echelon’s main body—the bulk of combat power—in their MBA where","rect":[90.0,242.2880859375,522.1174593048096,233.17990112304688]},{"page":196,"text":"they want to conduct their main effort. They organize their main body to fix and finish attacking enemy","rect":[89.98994445800781,253.81109619140626,521.9982204437256,244.70291137695313]},{"page":196,"text":"forces. Most of the units in a main body deploy into prepared defensive positions within their MBA.","rect":[89.97993469238281,265.27392578125,521.9581861495972,256.1657409667969]},{"page":196,"text":"However, some mobile elements may hide and are ready to deploy where and when needed.","rect":[89.97991180419922,276.79693603515627,458.24199962615969,267.6887512207031]},{"page":196,"text":"RESERVE","rect":[72.0,300.1422119140625,118.64721059799195,292.0559997558594]},{"page":196,"text":"9-10. Units’ defensive plans should be able to succeed without use of their reserves. However, their reserves’","rect":[90.0,320.0742492675781,521.9822900352478,310.9861145019531]},{"page":196,"text":"most likely task is to conduct counterattacks based on previously prepared plans. Lower echelon commanders","rect":[90.0,331.55718994140627,522.0844256858826,322.4490051269531]},{"page":196,"text":"use their reserves primarily to conduct local counterattacks to restore the integrity of their defense or to","rect":[90.0,343.0801696777344,521.9321193695068,333.97198486328127]},{"page":196,"text":"exploit opportunities. Senior commanders use their reserves to seize the initiative from enemy forces when","rect":[90.0,354.6031799316406,521.9962062835693,345.4949951171875]},{"page":196,"text":"opportunities to do so present themselves. For example, a corps commander may choose to employ their","rect":[90.0,366.0660705566406,521.8732202110291,356.9578857421875]},{"page":196,"text":"reserve against enemy fire support assets and follow-on forces to limit the enemy commander’s ability to","rect":[90.0,377.58905029296877,522.0082912445068,368.4808654785156]},{"page":196,"text":"mass combat power on the corps main effort.","rect":[89.97997283935547,389.0920104980469,270.52031993865969,380.0038757324219]},{"page":196,"text":"9-11. Commanders can assign their reserve a wide variety of tasks to accomplish, and their reserves need to","rect":[90.0,406.5769348144531,522.0226345062256,397.46875]},{"page":196,"text":"be flexible enough to perform other tasks. Commanders may find it necessary to commit their reserves to","rect":[90.0,418.09991455078127,521.9809474945068,408.9917297363281]},{"page":196,"text":"restore the integrity of their defenses by blocking enemy penetrations or reinforcing fires into engagement","rect":[90.0,429.6229248046875,522.0470957717896,420.5147399902344]},{"page":196,"text":"areas. Secondary tasks for a reserve may also include—","rect":[90.0,441.0858154296875,313.0251579284668,431.9776306152344]},{"page":196,"text":" Reinforcing the defense of committed forces.","rect":[115.19999694824219,454.5542907714844,314.1992139816284,445.44610595703127]},{"page":196,"text":" Blocking or containing enemy forces that penetrate friendly defensive positions.","rect":[115.19999694824219,468.0542907714844,454.36419200897219,458.94610595703127]},{"page":196,"text":" Relieving depleted units and providing for continuous operations.","rect":[115.19999694824219,481.5542907714844,395.98662853240969,472.44610595703127]},{"page":196,"text":" Reacting to threats directed against friendly sustainment efforts.","rect":[115.19999694824219,495.0542907714844,389.2681531906128,485.94610595703127]},{"page":196,"text":" Extending the flanks of defending units to prevent their envelopment.","rect":[115.19999694824219,508.5542907714844,411.5227003097534,499.44610595703127]},{"page":196,"text":" Covering retrograde movements.","rect":[115.19999694824219,522.0543212890625,265.1884717941284,512.9461669921875]},{"page":196,"text":"9-12. Defending units usually have difficulties establishing and resourcing their reserves because they are","rect":[90.00376892089844,539.5792846679688,521.9758577423096,530.4711303710938]},{"page":196,"text":"normally facing enemy forces with superior combat power. Nevertheless, commanders at each echelon down","rect":[90.00376892089844,551.0421142578125,521.9741115570068,541.9339599609375]},{"page":196,"text":"to the battalion retain reserves as a means of ensuring mission accomplishment and for exploiting","rect":[90.00377655029297,562.565185546875,521.9872341156006,553.45703125]},{"page":196,"text":"opportunities through offensive action.","rect":[90.00379943847656,574.088134765625,245.5683240890503,564.97998046875]},{"page":196,"text":"9-13. Units may not be able to resource separate reserves in some situations. Therefore, they may constitute","rect":[90.00377655029297,591.552978515625,522.0149202423096,582.44482421875]},{"page":196,"text":"all or a portion of their reserves from their security forces (after those forces conduct a rearward passage of","rect":[90.00377655029297,603.0760498046875,521.9664208946228,593.9678955078125]},{"page":196,"text":"lines through MBA units). If units employ a security force as the reserve for an area defense, they withdraw","rect":[90.00377655029297,614.5989990234375,521.9616742172241,605.4908447265625]},{"page":196,"text":"the force so it has sufficient time to occupy the reserve positions, perform the necessary degree of","rect":[90.00379943847656,626.0618896484375,521.9011743125916,616.9537353515625]},{"page":196,"text":"reconstitution, and prepare plans for reserve roles. However, this is not the preferred option. Before battle","rect":[90.00376892089844,637.5648803710938,521.9846468048096,628.4767456054688]},{"page":196,"text":"handover, the senior commander must state the acceptable risk to security forces or the disengagement criteria","rect":[90.00376892089844,649.10791015625,522.0344514923096,639.999755859375]},{"page":196,"text":"in quantifiable terms, such as friendly strength levels, time, or event. In this case, after completing the","rect":[90.00376892089844,660.57080078125,522.0491609649658,651.462646484375]},{"page":196,"text":"rearward passage, security forces move to assembly areas to prepare for their subsequent operations. These","rect":[90.00376892089844,672.09375,521.9330110626221,662.985595703125]},{"page":196,"text":"areas should be free from enemy interference and clear of MBA units, LOCs, and MSRs.","rect":[90.0037841796875,683.6167602539063,446.28896617889407,674.5086059570313]},{"page":196,"text":"9-2","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":196,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":196,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":197,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":197,"text":"CONTROL MEASURES FOR AN AREA DEFENSE","rect":[90.0,85.28965759277344,410.09736477279668,75.61549377441406]},{"page":197,"text":"9-14. Units organize their area defense by designating engagement areas. Using the seven steps of EA","rect":[108.0,105.59429931640625,540.0854535140991,96.48612213134766]},{"page":197,"text":"development, defending units determine where to place BPs and how best to assign areas to subordinate units.","rect":[107.98998260498047,117.1173095703125,540.0723218917847,108.0091323852539]},{"page":197,"text":"Units create security areas in front of their MBAs. Security areas should be deep enough to make enemy","rect":[107.98998260498047,128.5802001953125,539.9636135101318,119.4720230102539]},{"page":197,"text":"forces displace as much of their supporting forces as possible, such as cannon artillery, sensors, and air","rect":[107.98998260498047,140.1031494140625,539.9711206016541,130.99496459960938]},{"page":197,"text":"defense artillery gun systems, before attacking. Units also designate echelon support areas.","rect":[107.98998260498047,151.62615966796876,471.19695568084719,142.51797485351563]},{"page":197,"text":"9-15.","rect":[107.97998809814453,167.06703186035157,128.84162425994874,160.1632537841797]},{"page":197,"text":"Area defense maneuver graphic control measures may include‒","rect":[133.17027282714845,169.091064453125,387.24181175231936,159.8826904296875]},{"page":197,"text":" Engagement areas.","rect":[133.1999969482422,182.57427978515626,226.72072887420655,173.7867431640625]},{"page":197,"text":" Boundaries.","rect":[133.1999969482422,194.0502471923828,199.30102062225343,186.96609497070313]},{"page":197,"text":" FEBA.","rect":[133.1999969482422,207.41998291015626,179.32514476776124,200.63644409179688]},{"page":197,"text":" Battle handover lines.","rect":[133.1999969482422,222.0,238.7246961593628,213.96609497070313]},{"page":197,"text":" Strong points.","rect":[133.1999969482422,236.57427978515626,207.34405040740968,227.46609497070313]},{"page":197,"text":" TRPs.","rect":[133.1999969482422,248.0502471923828,175.96442699432374,241.2867431640625]},{"page":197,"text":" NAIs.","rect":[133.1999969482422,261.55023193359377,175.42234325408936,254.63644409179688]},{"page":197,"text":" TAIs.","rect":[133.1999969482422,275.05023193359377,174.27605724334718,268.1364440917969]},{"page":197,"text":" Decision points.","rect":[133.1999969482422,290.55426025390627,216.2247724533081,281.46612548828127]},{"page":197,"text":" Passage points.","rect":[133.1999969482422,304.0743103027344,212.32200145721436,294.96612548828127]},{"page":197,"text":" Various other fire control and countermobility control measures.","rect":[133.1999969482422,317.5743103027344,409.4215040206909,308.46612548828127]},{"page":197,"text":"9-16. Figure 9-1 depicts example area defense control measures. Appendix A defines these defensive control","rect":[107.9937515258789,335.09930419921877,540.0983653030396,325.9911193847656]},{"page":197,"text":"measures.","rect":[107.99375915527344,344.5381164550781,147.75612926483155,339.78863525390627]},{"page":197,"text":"Figure 9-1. Example area defense control measures","rect":[192.71286010742188,659.997802734375,437.20790003967286,650.6090698242188]},{"page":197,"text":"9-17. Commanders give their subordinate commanders specific guidance on the initial positioning of forces.","rect":[107.98373413085938,683.45458984375,540.0943555831909,674.346435546875]},{"page":197,"text":"Commanders ensure the synchronization of subordinate units’ defensive plans, and that control measures,","rect":[107.9937515258789,694.9776611328125,539.9560499191284,685.8695068359375]},{"page":197,"text":"such as contact points and phase lines, enable subordinate commanders and prevent fratricide. If subordinate","rect":[107.98371887207031,706.4805908203125,539.9900789337158,697.3924560546875]},{"page":197,"text":"unit commanders prepare their defensive plans in isolation, assailable flanks between subordinate units could","rect":[107.98373413085938,717.9434814453125,539.9801540374756,708.8553466796875]},{"page":197,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":197,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":197,"text":"9-3","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":198,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":198,"text":"easily develop. Commanders are responsible for fires and movement planning between the positions of their","rect":[90.0,83.51434326171875,522.0351464805603,74.40616607666016]},{"page":198,"text":"subordinate units.","rect":[90.0,92.95319366455078,161.07187938690186,85.86905670166016]},{"page":198,"text":"PLANNING AN AREA DEFENSE","rect":[72.0,120.26969909667969,281.6091140403748,110.58155822753906]},{"page":198,"text":"9-18. The key to a successful area defense is the integration and synchronization of all available assets. The","rect":[90.0,140.57427978515626,522.0557527618408,131.46609497070313]},{"page":198,"text":"general defensive planning considerations addressed in Chapter 8 apply to the area defense. They assign","rect":[90.0,152.0972900390625,521.9707546234131,142.98910522460938]},{"page":198,"text":"missions, allocate forces, and apportion functional and multifunctional support and sustainment resources.","rect":[90.0,163.6002655029297,522.0013380050659,154.51211547851563]},{"page":198,"text":"Commanders decide where to concentrate their efforts and where to take risks. They can rapidly redirect","rect":[90.0,175.0831298828125,522.0794444046021,165.97494506835938]},{"page":198,"text":"attack aviation and field artillery systems initially allocated to supporting efforts to support their main effort","rect":[90.0,186.60614013671876,521.9562144241334,177.49795532226563]},{"page":198,"text":"at the appropriate time.","rect":[90.0,198.10911560058595,182.75013256072999,189.02096557617188]},{"page":198,"text":"9-19. Units organize their forces differently for contiguous and noncontiguous assigned areas. Figure 9-2","rect":[90.01001739501953,215.593994140625,521.9722194671631,206.48580932617188]},{"page":198,"text":"graphically depicts the organization of forces for an area defense in contiguous assigned areas while figure","rect":[90.0,227.11700439453126,522.0231599884033,218.00881958007813]},{"page":198,"text":"9-3 graphically depicts the organization of forces for an area defense in noncontiguous assigned areas. Figure","rect":[90.0,238.57989501953126,522.0935945587158,229.47171020507813]},{"page":198,"text":"9-2 does not designate the exact security missions performed by security forces because those vary from","rect":[90.00000762939453,250.1029052734375,522.0192542037964,240.99472045898438]},{"page":198,"text":"screen to cover based on the mission variables.","rect":[90.00000762939453,259.60186767578127,277.72878551483157,252.51773071289063]},{"page":198,"text":"9-4","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":198,"text":"Figure 9-2. Organization of forces for an area defense, contiguous assigned areas","rect":[102.7755126953125,598.1075439453125,491.27686976623536,588.7188110351563]},{"page":198,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":198,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":199,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":199,"text":"Figure 9-3. Organization of forces for an area defense, noncontiguous assigned areas","rect":[111.5999984741211,335.0341796875,518.4179830474853,325.64544677734377]},{"page":199,"text":"9-20. Commanders describe their concept of operations in sufficient detail so that their staffs and subordinate","rect":[107.99279022216797,358.470947265625,540.0451326446533,349.3828125]},{"page":199,"text":"commanders understand precisely how commanders intend to fight their battles. Commanders ensure the","rect":[107.99279022216797,370.0140075683594,540.0259676055908,360.90582275390627]},{"page":199,"text":"coordination of maneuver and supporting actions among subordinates.","rect":[107.99279022216797,381.47686767578127,389.6751661300659,372.3686828613281]},{"page":199,"text":"9-21.","rect":[107.99279022216797,396.9778137207031,128.85442638397218,390.07403564453127]},{"page":199,"text":"Commanders’ keys to successful area defense include—","rect":[133.19309997558595,399.0018615722656,358.72419357299807,389.8936767578125]},{"page":199,"text":" Concentrating effects.","rect":[133.1999969482422,412.4942932128906,239.56037425994874,403.3861083984375]},{"page":199,"text":" Depth of the defensive area.","rect":[133.1999969482422,425.9742431640625,263.6855421066284,416.8861083984375]},{"page":199,"text":" Security.","rect":[133.1999969482422,439.4942932128906,187.06458568572999,430.3861083984375]},{"page":199,"text":" Taking full advantage of the terrain.","rect":[133.1999969482422,452.9942932128906,295.6553602218628,443.8861083984375]},{"page":199,"text":" Flexibility of defensive actions.","rect":[133.1999969482422,466.4942932128906,277.8448133468628,457.3861083984375]},{"page":199,"text":" Timely resumption of offensive actions.","rect":[133.1999969482422,479.9942932128906,311.5040235519409,470.8861083984375]},{"page":199,"text":"9-22. Units organize their defensive efforts based on their analysis of the mission variables and their higher","rect":[108.00376892089844,497.45916748046877,540.0352075157166,488.3509826660156]},{"page":199,"text":"echelon commander’s concept. They decide where to concentrate their efforts and how to economize forces.","rect":[108.0037841796875,508.9821472167969,539.9822340011597,499.87396240234377]},{"page":199,"text":"Initial friendly actions force enemy units to enter established engagement areas. Friendly forces regain the","rect":[108.0037841796875,520.505126953125,540.0000276641846,511.3969421386719]},{"page":199,"text":"initiative from enemy forces when they successfully perform their area defense. They take advantage of","rect":[107.99371337890625,531.968017578125,539.9850976524353,522.85986328125]},{"page":199,"text":"available offensive opportunities that do not risk the integrity of their defenses.","rect":[107.99371337890625,543.4910278320313,424.0557508468628,534.3828735351563]},{"page":199,"text":"9-23. Sustainment units in an area defense require a careful balance among establishing forward supply","rect":[108.00373840332031,561.0059814453125,539.9496974945068,551.8978271484375]},{"page":199,"text":"stocks of petroleum, oils, and lubricants; barrier material; and ammunition in adequate amounts to support","rect":[108.00379943847656,572.4488525390625,539.9817881546021,563.3607177734375]},{"page":199,"text":"defending units. These units avoid having so many supplies located in forward locations that units cannot","rect":[108.00377655029297,583.9918823242188,540.0557627639771,574.8837280273438]},{"page":199,"text":"rapidly move them to counter or avoid enemy advances. Commanders can lawfully obtain from local civilian","rect":[108.00377655029297,595.514892578125,540.0421657562256,586.40673828125]},{"page":199,"text":"infrastructure any suitable petroleum, oils, and lubricants, barrier material, construction equipment, and","rect":[108.0037841796875,606.977783203125,540.0168972015381,597.86962890625]},{"page":199,"text":"laborers which will reduce the defending unit’s transportation requirements. Proper forecasting of supply and","rect":[108.0037841796875,618.500732421875,540.0136013031006,609.392578125]},{"page":199,"text":"support requirements is important to the success of the area defense. Likewise, units forward deploy","rect":[108.00379943847656,630.0237426757813,540.0280055999756,620.9155883789063]},{"page":199,"text":"maintenance and medical support with their associated repair parts and medical supplies. Those systems and","rect":[108.00377655029297,641.4866333007813,540.1039943695068,632.3784790039063]},{"page":199,"text":"Soldiers or equipment that cannot return quickly to the battle are rapidly evacuated from forward defensive","rect":[108.00377655029297,653.0096435546875,540.0111970977783,643.9014892578125]},{"page":199,"text":"positions to avoid unduly burdening medical and maintenance elements.","rect":[108.00377655029297,664.5325927734375,397.1249647140503,655.4244384765625]},{"page":199,"text":"POSITION SELECTION","rect":[90.0,687.8999633789063,197.1160135269165,679.595947265625]},{"page":199,"text":"9-24. Successful units carefully design their defense plan to ensure they can halt enemy attacks and develop","rect":[108.0,707.7542724609375,540.0352687835693,698.6461181640625]},{"page":199,"text":"opportunities to seize the initiative and resume offensive operations. The cohesion of defending forces","rect":[108.0,719.2772827148438,540.0431659202576,710.1691284179688]},{"page":199,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":199,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":199,"text":"9-5","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":200,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":200,"text":"significantly affects the overall effectiveness of the area defense. Units prepare to adjust their defensive","rect":[90.0,83.51434326171875,521.9923372344971,74.39614868164063]},{"page":200,"text":"dispositions to meet changes in the enemy’s dispositions to maintain that cohesion.","rect":[90.0,94.97723388671875,422.13494396209719,85.86905670166016]},{"page":200,"text":"9-25. The area defense requires units in defensive positions to accomplish their mission independently or in","rect":[89.98994445800781,112.4921875,521.9531764984131,103.3840103149414]},{"page":200,"text":"combination by defeating enemy forces by fire, absorbing the strength of the attack within their positions, or","rect":[89.9800033569336,124.01519775390625,521.9027612266541,114.90702056884766]},{"page":200,"text":"destroying enemy forces with local counterattacks. Units combine the advantages of fighting from prepared","rect":[89.9799575805664,135.47808837890626,522.0082912445068,126.36991119384766]},{"page":200,"text":"positions, obstacles, planned fires, and local counterattacks to isolate and overwhelm selected enemy","rect":[89.9799575805664,147.00103759765626,521.9896144866943,137.89285278320313]},{"page":200,"text":"formations. They rapidly shift the purpose and location of their main effort throughout their assigned areas","rect":[89.9799575805664,158.5240478515625,521.9542987327576,149.41586303710938]},{"page":200,"text":"as conditions change. Commanders may have to reposition defending units within their defensive positions","rect":[89.97994995117188,169.9869384765625,522.0078875999451,160.87875366210938]},{"page":200,"text":"or reposition between terrain features to mass the effects of overwhelming fires against attacking enemy","rect":[89.97994995117188,181.50994873046876,522.0089626312256,172.40176391601563]},{"page":200,"text":"units. The defensive plans designate axes of advance and routes for the commitment or movement of their","rect":[89.9800033569336,193.032958984375,521.9689843711853,183.92471313476563]},{"page":200,"text":"reserves, or the forward or rearward passage of one unit through another. Those plans identify air axes for","rect":[89.9799575805664,204.495849609375,521.9058129844666,195.38766479492188]},{"page":200,"text":"aerial maneuver by attack aviation elements, air assault units, or fixed-wing aircraft. Their operations","rect":[89.9799575805664,216.018798828125,522.0774066429138,206.91061401367188]},{"page":200,"text":"processes identify decision points associated with the initiation of these counterattacks, the repositioning of","rect":[89.97991180419922,227.481689453125,522.0188500938416,218.37350463867188]},{"page":200,"text":"forces, and other actions.","rect":[89.97991180419922,237.0,190.2790937423706,229.89651489257813]},{"page":200,"text":"9-26. The capability to reposition relies on defending forces having tactical mobility. Defending forces stay","rect":[89.97991180419922,256.5196533203125,522.0114040374756,247.41146850585938]},{"page":200,"text":"in their prepared positions and accept the possibility ofbecomingdecisively engagedif they lack this mobility","rect":[89.97989654541016,267.9825439453125,521.9621486663818,258.8743591308594]},{"page":200,"text":"advantage.","rect":[89.97989654541016,279.5054931640625,133.0458631515503,270.3973083496094]},{"page":200,"text":"9-27. Commanders assigning defensive missions define their defended areas. They have to accept gaps and","rect":[89.97989654541016,297.0204772949219,522.0041408538818,287.91229248046877]},{"page":200,"text":"conduct noncontiguous operations when defending on broad fronts with minimal forces. This results in a","rect":[89.97989654541016,308.48333740234377,522.0129671173096,299.3751525878906]},{"page":200,"text":"noncontiguous FLOT. Defending shallow assigned areas requires units to operate well forward with a","rect":[89.97989654541016,320.00634765625,521.9964876251221,310.8981628417969]},{"page":200,"text":"corresponding reduction in their flexibility.","rect":[89.97988891601563,331.52935791015627,263.0042676925659,322.4211730957031]},{"page":200,"text":"9-28. The ideal area defense is one where effective mutual support exists throughout the width and depth of","rect":[89.97988891601563,348.99420166015627,521.9569604454041,339.8860168457031]},{"page":200,"text":"the defender’s tactical positions. Units organize and occupy defensive positions based on their natural","rect":[89.97988891601563,360.5172119140625,521.9913096389771,351.4090270996094]},{"page":200,"text":"defensive strength. Defending units maintain tactical integrity within their defensive areas. Units conducting","rect":[89.97989654541016,372.0401916503906,522.0163478851318,362.9320068359375]},{"page":200,"text":"an area defense normally address flank security requirements by assigning those responsibilities to","rect":[89.97989654541016,383.5030822753906,522.0183010101318,374.3948974609375]},{"page":200,"text":"subordinate elements or organizing a separate security force to perform that task.","rect":[89.97987365722656,395.02606201171877,413.71026134490969,385.9178771972656]},{"page":200,"text":"9-29. Units typically have twomethodsfor the placementof their positions when conducting an area defense:","rect":[89.97987365722656,412.5510559082031,522.0622935256959,403.44287109375]},{"page":200,"text":"defense in depth and forward defense. A higher echelon commander may dictate the method to their","rect":[89.9798583984375,424.0139465332031,521.9570825157166,414.90576171875]},{"page":200,"text":"subordinates or subordinates may retain the flexibility to choose the method of an area defense. These two","rect":[89.97982025146485,435.5369567871094,521.9741115570068,426.42877197265627]},{"page":200,"text":"methods are not exclusionary. Part of a defending unit can conduct a forward defense while the other part","rect":[89.96978759765625,447.0599670410156,521.9302134475709,437.9517822265625]},{"page":200,"text":"conducts a defense in depth.","rect":[89.96990203857422,458.50286865234377,203.05065441131593,449.41473388671877]},{"page":200,"text":"Defense in Depth","rect":[72.0,483.0587463378906,152.0310272064209,473.27557373046877]},{"page":200,"text":"9-30. Units normally prefer to perform a defense in depth. Forces defending in depth absorb the momentum","rect":[90.0,500.6343078613281,522.0562415084839,491.526123046875]},{"page":200,"text":"of enemy attacks by making enemy forces attack repeatedly through a series of mutually supporting positions.","rect":[90.0,512.0972290039063,522.0795850753784,502.989013671875]},{"page":200,"text":"Building these positions requires significant time and engineer support to increase the survivability and","rect":[90.0,523.6201782226563,522.0052394866943,514.5120239257813]},{"page":200,"text":"countermobility of those positions. Depth gives fire support assets time to deliver effects on multiple","rect":[90.0,535.1431884765625,521.9391756134033,526.0350341796875]},{"page":200,"text":"locations against selected elements of the attacking enemy force. Depth provides more reaction time for","rect":[90.0,546.6060791015625,522.0609033164978,537.4979248046875]},{"page":200,"text":"defending forces to respond by repositioning or counterattacking. Units continuously employ their","rect":[90.0,558.1290893554688,522.0530297813416,549.0209350585938]},{"page":200,"text":"information collection assets to gather additional information about the attacking enemy’s intentions and","rect":[90.0,569.652099609375,522.0313625335693,560.5439453125]},{"page":200,"text":"capabilities between the time combat starts and the time the enemy commits to a COA. Depth reduces the","rect":[90.0,581.1149291992188,522.0172395782471,572.0067749023438]},{"page":200,"text":"risk of enemy forces rapidly penetrating the MBA along unexpected directions.","rect":[90.0,592.637939453125,407.3846387863159,583.52978515625]},{"page":200,"text":"9-31. Units also employ a defense in depth when enemy forces can employ large quantities of indirect fires.","rect":[90.0,610.102783203125,521.9920606613159,600.99462890625]},{"page":200,"text":"Units disperse their forces throughout their assigned area when conducting a defense in depth. They take area","rect":[90.0,621.6257934570313,522.0862093048096,612.5176391601563]},{"page":200,"text":"damage control measures to reduce the effects of these munitions and weapons on defending friendly forces,","rect":[90.0,633.1488037109375,521.9722852706909,624.0406494140625]},{"page":200,"text":"and they deny enemy forces lucrative targets. The degree of dispersal adopted by defending forces is a","rect":[90.0,644.6116943359375,521.9229402618408,635.5035400390625]},{"page":200,"text":"function of the enemy and friendly forces’ capabilities as well as the terrain to rapidly concentrate combat","rect":[90.0,656.1346435546875,521.9953379592896,647.0264892578125]},{"page":200,"text":"power at decisive points.","rect":[89.97994995117188,667.6376953125,189.4495038986206,658.549560546875]},{"page":200,"text":"9-32. Commanders can position their defending units in successive layers of BPsalong likelyenemy avenues","rect":[89.98997497558594,685.12255859375,521.9962909202576,676.014404296875]},{"page":200,"text":"of approach when conducting a defense in depth. (Figure 9-4 is a sketch illustrating this concept. It depicts a","rect":[89.98998260498047,696.6455078125,521.9932527618408,687.537353515625]},{"page":200,"text":"9-6","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":200,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":200,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":201,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":201,"text":"division conducting a defense in depth with subordinate BCTs deployed in noncontiguous assigned areas","rect":[108.0,83.51434326171875,539.9192035179138,74.40616607666016]},{"page":201,"text":"with enemy avenues of approach shown.) Commanders usually decide to conduct a defense in depth when—","rect":[107.98998260498047,94.97723388671875,540.0523490905762,85.86905670166016]},{"page":201,"text":" Their defensive missions are not restrictive and allow them to operate throughout the depths of","rect":[133.1999969482422,108.47430419921875,540.0040185508728,99.36612701416016]},{"page":201,"text":"their assigned areas.","rect":[151.1999969482422,119.997314453125,232.06042003631593,110.8891372680664]},{"page":201,"text":" The terrain within their assigned areas does not favor a forward defense, and there is better","rect":[133.1999969482422,133.49432373046876,539.9559228477478,124.38614654541016]},{"page":201,"text":"defensible terrain deeper within their assigned areas.","rect":[151.1999969482422,145.017333984375,361.42669200897219,135.90914916992188]},{"page":201,"text":" There is significant depth available, allowing the trading of space for time.","rect":[133.1999969482422,158.51434326171876,449.74590587615969,149.40615844726563]},{"page":201,"text":" The cover and concealment on or near the FEBA is limited.","rect":[133.1999969482422,169.9903106689453,389.74224376678469,162.90615844726563]},{"page":201,"text":"Figure 9-4. Example defense in depth","rect":[226.6806640625,480.83074951171877,403.3873875160217,471.4420166015625]},{"page":201,"text":"9-33. Large units, such as divisions or corps, employing a defense in depth can conduct an area defense on","rect":[107.9937515258789,504.2875671386719,539.8525295257568,495.17938232421877]},{"page":201,"text":"a wider frontage than they can if they adopt a forward defense. This is because a forward defense has no time","rect":[107.9937515258789,515.75048828125,540.0140047149658,506.6423034667969]},{"page":201,"text":"or maneuver space to reposition forces. A defense in depth allows units to use security forces in the forward","rect":[107.9937973022461,527.2734375,539.9108180999756,518.165283203125]},{"page":201,"text":"part of their MBA to identify the enemy force’s main effort and control the depth of the enemy force’s","rect":[108.00377655029297,538.7965087890625,539.9859759788513,529.6883544921875]},{"page":201,"text":"penetration into their MBA. By their defensive actions, these forces provide units with time to react to enemy","rect":[107.98370361328125,550.2593383789063,540.0419826507568,541.1511840820313]},{"page":201,"text":"actions and allow defending units to take offensive steps to eliminate enemy options, such as conducting","rect":[107.98373413085938,561.7823486328125,539.9797267913818,552.6741943359375]},{"page":201,"text":"counterattacks into the flanks of advancing enemy forces.","rect":[107.98373413085938,573.305419921875,338.48281383514407,564.197265625]},{"page":201,"text":"Forward Defense","rect":[90.0,595.7027587890625,170.90282975769044,588.1265258789063]},{"page":201,"text":"9-34. When units defend forward within their assigned areas, they organize their forces so they can commit","rect":[108.0,615.414306640625,540.0241465530396,606.30615234375]},{"page":201,"text":"most of their available combat power early in their defensive efforts. To accomplish this, units may deploy","rect":[108.0,626.9373168945313,539.9184474945068,617.8291625976563]},{"page":201,"text":"their forces forward in their respective assigned areas or plan counterattacks well forward in the MBA or","rect":[108.0,638.4603271484375,539.9553735313416,629.3521728515625]},{"page":201,"text":"even beyond the MBA. Units can conduct their main effort from forward defensive positions near the FEBA","rect":[108.0,649.9232177734375,540.0464520492553,640.8150634765625]},{"page":201,"text":"in a forward defense. Figure 9-5 on page 9-8 is a sketch illustrating this concept. Units concentrate significant","rect":[107.9999771118164,661.4461669921875,540.0143198928834,652.3380126953125]},{"page":201,"text":"portions of their available combat power toward engagement areas located along their FEBA. The intent is","rect":[107.98998260498047,672.9090576171875,539.9021747093201,663.8009033203125]},{"page":201,"text":"to prevent significant enemy penetrations into their defensive areas. Units conduct forward defense","rect":[107.97997283935547,684.4320678710938,540.0542879180908,675.3239135742188]},{"page":201,"text":"operations to retain these positions along their FEBA and counterattack any enemy penetrations. However,","rect":[107.97997283935547,695.955078125,539.9901075363159,686.846923828125]},{"page":201,"text":"the defending force’s lack of depth may allow enemy forces to exploit success if they penetrate the friendly","rect":[107.97997283935547,707.41796875,540.0012722015381,698.309814453125]},{"page":201,"text":"force’s main defensive positions.","rect":[107.9699478149414,718.9208984375,240.19286632537843,709.832763671875]},{"page":201,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":201,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":201,"text":"9-7","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":202,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":202,"text":"Figure 9-5. Example forward defense","rect":[209.75999450683595,368.8741760253906,384.2913350982666,359.4854431152344]},{"page":202,"text":"9-35.","rect":[90.0009536743164,390.30694580078127,110.8625898361206,383.4031677246094]},{"page":202,"text":"Commanders may choose to conduct a forward defense when—","rect":[115.20125579833985,392.33099365234377,371.2823905944824,383.2228088378906]},{"page":202,"text":" The best defensive positions, natural obstacles, and natural engagement areas","rect":[115.19999694824219,405.8343200683594,448.93531679916387,396.72613525390627]},{"page":202,"text":"the FEBA.","rect":[133.1999969482422,415.3332824707031,176.02749156951905,408.2491455078125]},{"page":202,"text":" Cover and concealment in the rear portion of their assigned areas are limited.","rect":[115.19999694824219,430.85430908203127,441.6999464035034,421.7461242675781]},{"page":202,"text":" The higher commander directs them to retain forward terrain.","rect":[115.19999694824219,444.35430908203127,378.9465284347534,435.2461242675781]},{"page":202,"text":" The terrain in the assigned area does not support a mobile defense.","rect":[115.19999694824219,457.85430908203127,399.8172559738159,448.7461242675781]},{"page":202,"text":" The enemy has superior mobility.","rect":[115.19999694824219,471.35430908203127,267.88482189178469,462.2461242675781]},{"page":202,"text":"are located along","rect":[452.21673583984377,405.8343200683594,522.0160427093506,396.72613525390627]},{"page":202,"text":"Positioning the Reserve","rect":[72.0,495.980712890625,181.92297135925294,486.17559814453127]},{"page":202,"text":"9-36. Defending units have the ability to seize the initiative by counterattacking over familiar ground to","rect":[90.0,513.4743041992188,522.0164699554443,504.3661193847656]},{"page":202,"text":"destroy halted or disorganized enemy forces. Their reserve is a key component of these counterattacks.","rect":[90.0,524.997314453125,522.0201368331909,515.88916015625]},{"page":202,"text":"Defending units protect their counterattacking forces by employing overwatching fires from friendly","rect":[90.0,536.460205078125,522.0281276702881,527.35205078125]},{"page":202,"text":"positions. Commanders direct counterattacks against an enemy force’s exposed rear or flanks whenever","rect":[90.0,547.983154296875,522.0244042930603,538.875]},{"page":202,"text":"possible.","rect":[90.0,559.4861450195313,125.3245038986206,550.3980102539063]},{"page":202,"text":"9-37. Units expend significant effort during the planning process to ensure the effective use of their reserves.","rect":[90.0,576.9710693359375,522.0201368331909,567.8629150390625]},{"page":202,"text":"They may locate their reserves within their assigned areas where those reserves can employ existing road","rect":[90.0,588.4940185546875,521.8890895843506,579.3858642578125]},{"page":202,"text":"networks. Those road networks allow the rapid displacement of these reserves throughout their assigned areas","rect":[90.0,600.01708984375,522.0390155296326,590.908935546875]},{"page":202,"text":"in response to different opportunities or contingencies. Commanders have more flexibility and can take","rect":[90.0,611.4799194335938,522.0580110626221,602.3717651367188]},{"page":202,"text":"greater risk in employing their reserves if their higher echelon headquarters has not committed its reserve.","rect":[90.0,623.0029296875,521.9862012863159,613.894775390625]},{"page":202,"text":"See Chapter 1 for more information on general considerations for positioning the reserve.","rect":[90.0,634.5259399414063,447.95061779022219,625.4177856445313]},{"page":202,"text":"SPOILING ATTACKS AND COUNTERATTACKS","rect":[72.0,657.8999633789063,290.3726863861084,649.595947265625]},{"page":202,"text":"9-38. Units do not wait for the enemy to initiate an attack when developing their defensive plans. They seek","rect":[90.0,677.7542724609375,522.0316066741943,668.6461181640625]},{"page":202,"text":"opportunities to conduct spoiling attacks and counterattacks against enemy forces. Units execute spoiling","rect":[90.0,689.2772827148438,521.8760280609131,680.1691284179688]},{"page":202,"text":"attacks and local counterattacks to disrupt the enemy’s attack preparations and buy time and maneuver space","rect":[90.0,700.80029296875,522.0896272735596,691.692138671875]},{"page":202,"text":"9-8","rect":[72.1199951171875,754.18798828125,85.097994140625,747.6090087890625]},{"page":202,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":202,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":203,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":203,"text":"for defensive preparations. In an area defense, units plan major counterattacks as a branch or sequel to the","rect":[108.0,83.51434326171875,539.9413118438721,74.39614868164063]},{"page":203,"text":"main defensive operation.","rect":[107.98997497558594,94.95719909667969,211.59377574920655,85.86905670166016]},{"page":203,"text":"9-39. A spoiling attack preempts or disrupts an enemy force’s ability to launch an attack, while a","rect":[107.98997497558594,112.4921875,540.0494661407471,103.3840103149414]},{"page":203,"text":"counterattack prevents an enemy force from exploiting successes. The forces conducting either variation of","rect":[107.97997283935547,124.01519775390625,539.9026391563416,114.90702056884766]},{"page":203,"text":"attack need to be capable to develop the situation, defend themselves, and force the enemy to react. This","rect":[107.97997283935547,135.47808837890626,539.9243915061951,126.36991119384766]},{"page":203,"text":"allows friendly forces to place the enemy’s attack plan at risk. See Chapter 5 for more information on spoiling","rect":[107.97997283935547,147.00103759765626,540.0046901702881,137.89285278320313]},{"page":203,"text":"attacks and counterattacks.","rect":[107.9800033569336,156.50001525878907,215.47252941131593,149.41586303710938]},{"page":203,"text":"PREPARATION CONSIDERATIONS FOR AN AREA DEFENSE","rect":[90.0,183.80967712402345,491.7166885032654,174.13551330566407]},{"page":203,"text":"9-40. When planning for an area defense, units focus their collection activities on confirming templated","rect":[108.0,204.11431884765626,540.0323390960693,195.00613403320313]},{"page":203,"text":"enemy courses of action, identifying favorable terrain for the defense, and answering the commander’s","rect":[108.00003814697266,215.57720947265626,539.9653460960388,206.46902465820313]},{"page":203,"text":"critical information requirements. Information obtained from those activities may or may not cause units to","rect":[108.00003814697266,227.1002197265625,539.9316921234131,217.99203491210938]},{"page":203,"text":"refine their plans. Defensive preparations allow time for any necessary additional coordination and","rect":[108.0,238.5631103515625,539.9872341156006,229.45492553710938]},{"page":203,"text":"synchronization among different headquarters. They also allow for the conduct of those supporting efforts","rect":[108.0,250.0860595703125,539.9201800804138,240.97787475585938]},{"page":203,"text":"that fall within their defensive capabilities and OPSEC guidelines. Defending units may have to commit","rect":[108.0,261.60906982421877,540.0795054397584,252.50088500976563]},{"page":203,"text":"substantial forces to security operations or conduct spoiling attacks if they know that enemy forces will attack","rect":[107.9999771118164,273.07196044921877,539.9321193695068,263.9637756347656]},{"page":203,"text":"before they finish their defensive preparations.","rect":[107.99996185302735,284.594970703125,294.58645153045657,275.4867858886719]},{"page":203,"text":"9-41. Units normally establish an area defense after they complete the deployment process of force","rect":[107.99996185302735,302.11993408203127,539.9986848907471,293.0117492675781]},{"page":203,"text":"projection, complete their offensive actions, or are in assembly areas. Commanders issue warning orders","rect":[108.0,313.58282470703127,539.9953143577576,304.4646301269531]},{"page":203,"text":"stating the mission and identifying any special considerations. While subordinate units complete their current","rect":[108.0,325.1058349609375,539.9632334671021,315.9976501464844]},{"page":203,"text":"missions, unit staffs perform detailed planning. Staffs coordinate for the pre-positioning of ammunition and","rect":[107.98994445800781,336.6288146972656,539.9582424163818,327.5206298828125]},{"page":203,"text":"barrier material in secure areas near the unit’s projected defensive positions before starting the operation.","rect":[107.98994445800781,348.0917053222656,528.0913648605347,338.9735107421875]},{"page":203,"text":"9-42. Upon receiving initial mission orders, defending units establish a local security posture and occupy","rect":[107.98998260498047,365.61669921875,539.9296169281006,356.5085144042969]},{"page":203,"text":"hide positions in sector before beginning defensive preparations. Security forces immediately assume their","rect":[107.98999786376953,377.1396789550781,539.8681542930603,368.031494140625]},{"page":203,"text":"security mission and prepare positions simultaneously. Commanders conduct reconnaissance of their","rect":[107.98998260498047,388.6025390625,540.0253808555603,379.4943542480469]},{"page":203,"text":"defensive areas and establish forward security areas before their units occupy their defensive positions. Units","rect":[108.0,400.12554931640627,539.9422137718201,391.0173645019531]},{"page":203,"text":"may pre-position supplies, such as ammunition and barrier materiel, once they can secure those positions and","rect":[108.0,411.6485595703125,539.9944972991943,402.5403137207031]},{"page":203,"text":"supplies. The mission variables are the deciding consideration in establishing priorities. Those priorities can","rect":[108.0,423.1114501953125,540.0260524749756,414.0032653808594]},{"page":203,"text":"include—","rect":[108.0,432.6103820800781,147.47880172729493,425.5262451171875]},{"page":203,"text":"","rect":[133.1999969482422,445.345458984375,139.16105696249009,440.6531982421875]},{"page":203,"text":"","rect":[133.1999969482422,458.845458984375,139.16105696249009,454.1531982421875]},{"page":203,"text":"","rect":[133.1999969482422,483.8054504394531,139.16105696249009,479.1131896972656]},{"page":203,"text":"","rect":[133.1999969482422,508.825439453125,139.16105696249009,504.1331787109375]},{"page":203,"text":"","rect":[133.1999969482422,522.325439453125,139.16105696249009,517.6332397460938]},{"page":203,"text":"","rect":[133.1999969482422,535.825439453125,139.16105696249009,531.1332397460938]},{"page":203,"text":"","rect":[133.1999969482422,549.325439453125,139.16105696249009,544.6332397460938]},{"page":203,"text":"","rect":[133.1999969482422,574.3453979492188,139.16105696249009,569.6531982421875]},{"page":203,"text":"","rect":[133.1999969482422,587.8453979492188,139.16105696249009,583.1531982421875]},{"page":203,"text":"","rect":[133.1999969482422,601.3453979492188,139.16105696249009,596.6531982421875]},{"page":203,"text":"","rect":[133.1999969482422,626.305419921875,139.16105696249009,621.6132202148438]},{"page":203,"text":"Establishing local security and deploying security forces.","rect":[151.1999969482422,448.0743103027344,379.7192029953003,438.96612548828127]},{"page":203,"text":"Emplacing communications assets to support the unit’s primary, alternate, contingency, and","rect":[151.1999969482422,461.5743103027344,540.0240383148193,452.46612548828127]},{"page":203,"text":"emergency communications for each primary, supplemental, and alternative positions.","rect":[151.1999969482422,473.0372009277344,496.48223400115969,463.92901611328127]},{"page":203,"text":"Establishing contact points with any adjacent units so that their commanders can coordinate and","rect":[151.1999969482422,486.5343017578125,539.9829006195068,477.4161071777344]},{"page":203,"text":"synchronize their defensive efforts.","rect":[151.1999969482422,498.05731201171877,292.35967540740969,488.9491271972656]},{"page":203,"text":"Identifying engagement areas where commanders seek to engage and destroy enemy forces.","rect":[151.1999969482422,511.5542907714844,518.9250440597534,502.44610595703127]},{"page":203,"text":"Emplacing obstacles and surveying indirect fire targets to support these obstacles.","rect":[151.1999969482422,525.0543212890625,478.54238414764407,515.9461669921875]},{"page":203,"text":"Positioning key weapon systems to engage into engagement areas and cover obstacles.","rect":[151.1999969482422,538.5543212890625,497.7407178878784,529.4461669921875]},{"page":203,"text":"Planning fire control measures, such as TRPs, trigger lines, and FPFs to support these engagement","rect":[151.1999969482422,552.0543212890625,540.0530772171021,542.9461669921875]},{"page":203,"text":"areas.","rect":[151.1999969482422,561.55322265625,174.2820692062378,556.8037719726563]},{"page":203,"text":"Positioning the reserve.","rect":[151.1999969482422,577.0742797851563,245.38503551483155,567.9661254882813]},{"page":203,"text":"Designating and appropriately clearing fields of fire.","rect":[151.1999969482422,590.5742797851563,361.36345958709719,581.4661254882813]},{"page":203,"text":"Preparing primary fighting positions based on the anticipated fighting conditions, such as the time","rect":[151.1999969482422,604.0742797851563,540.0960359649658,594.9661254882813]},{"page":203,"text":"of day and weather conditions.","rect":[151.1999969482422,615.5371704101563,274.1874952316284,606.4290161132813]},{"page":203,"text":"Providing concealment and camouflage for fighting and survivability positions as they are","rect":[151.1999969482422,629.0343017578125,539.9460725860596,619.9261474609375]},{"page":203,"text":"constructed.","rect":[151.1999969482422,638.5332641601563,199.84308910369874,631.4490966796875]},{"page":203,"text":"","rect":[133.1999969482422,651.325439453125,139.16105696249009,646.6332397460938]},{"page":203,"text":"","rect":[133.1999969482422,664.825439453125,139.16105696249009,660.1332397460938]},{"page":203,"text":"","rect":[133.1999969482422,689.8453979492188,139.16105696249009,685.1531982421875]},{"page":203,"text":"","rect":[133.1999969482422,703.3453979492188,139.16105696249009,698.6531982421875]},{"page":203,"text":"","rect":[133.1999969482422,716.8453979492188,139.16105696249009,712.1531982421875]},{"page":203,"text":"Positioning observers who can see both targets and trigger lines.","rect":[151.1999969482422,654.0543212890625,408.4041700363159,644.9461669921875]},{"page":203,"text":"Positioning any available critical friendly zones over friendly positions by establishing sensor","rect":[151.1999969482422,667.5543212890625,540.0099999961853,658.4461669921875]},{"page":203,"text":"coverage and direct communications links between sensors and shooters.","rect":[151.1999969482422,679.0772705078125,443.07754039764407,669.9691162109375]},{"page":203,"text":"Installing limited-visibility aids, such as thermal hot spots and chemical lights on TRPs.","rect":[151.1999969482422,692.5742797851563,502.8416395187378,683.4661254882813]},{"page":203,"text":"Updating range cards and sector sketches as required.","rect":[151.1999969482422,706.0742797851563,365.61699962615969,696.9661254882813]},{"page":203,"text":"Preparing alternate fighting positions.","rect":[151.1999969482422,719.5742797851563,302.3247022628784,710.4661254882813]},{"page":203,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":203,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":203,"text":"9-9","rect":[508.97100830078127,754.18798828125,521.9490073242188,747.6090087890625]},{"page":204,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":204,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":204,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":204,"text":"","rect":[115.19999694824219,119.24544525146485,121.16105696249008,114.55320739746094]},{"page":204,"text":"","rect":[115.19999694824219,132.74545288085938,121.16105696249008,128.05320739746095]},{"page":204,"text":"","rect":[115.19999694824219,146.24545288085938,121.16105696249008,141.55320739746095]},{"page":204,"text":"","rect":[115.19999694824219,159.74545288085938,121.16105696249008,155.05320739746095]},{"page":204,"text":"","rect":[115.19999694824219,173.24545288085938,121.16105696249008,168.55320739746095]},{"page":204,"text":"","rect":[115.19999694824219,186.74545288085938,121.16105696249008,182.05320739746095]},{"page":204,"text":"Designating and preparing supplementary positions.","rect":[133.1999969482422,83.51434326171875,341.74334239959719,74.40616607666016]},{"page":204,"text":"Designating hide positions and rehearsing movements to and from all fighting positions. (Units","rect":[133.1999969482422,97.01434326171875,522.0542132835388,87.90616607666016]},{"page":204,"text":"may place their vehicles in hide positions at any time while preparing the defensive position.)","rect":[133.20001220703126,108.47723388671875,507.2746484336853,99.36905670166016]},{"page":204,"text":"Improving trafficability of projected counterattack routes.","rect":[133.1999969482422,121.97430419921875,364.30239391326907,112.85610961914063]},{"page":204,"text":"Pre-stocking ammunition in positions where it can survive anticipated enemy preparation fires.","rect":[133.1999969482422,135.47430419921876,513.0972547531128,126.36612701416016]},{"page":204,"text":"Positioning barrier material for constructing fighting positions and obstacles.","rect":[133.1999969482422,148.97430419921876,440.6316785812378,139.86611938476563]},{"page":204,"text":"Rehearsing movements under daylight and limited-visibility conditions.","rect":[133.1999969482422,162.47430419921876,420.6447706222534,153.36611938476563]},{"page":204,"text":"Establishing sleep and rest plans.","rect":[133.1999969482422,175.97430419921876,265.72353649139407,166.86611938476563]},{"page":204,"text":"Continuing to improve the defense.","rect":[133.1999969482422,189.47430419921876,274.60528087615969,180.36611938476563]},{"page":204,"text":"9-43. Survivability positions enhance the strength of a defensive position by providing Soldiers and weapons","rect":[90.00376892089844,206.9892578125,522.1411883811951,197.88107299804688]},{"page":204,"text":"systems with specified degrees of cover from enemy fires. Units initiate construction of survivability","rect":[90.00376892089844,218.4521484375,521.9691066741943,209.34396362304688]},{"page":204,"text":"positions based on their priorities of work, and they continue to build and improve them until the last possible","rect":[90.00376892089844,229.97515869140626,522.1233186798096,220.86697387695313]},{"page":204,"text":"moment. The degree of overhead, frontal, and side protection provided varies with the location of the","rect":[90.00376892089844,241.4981689453125,522.0559969024658,232.38998413085938]},{"page":204,"text":"sheltered troops and enemy capabilities. Defending units improve communications routes throughout their","rect":[90.00376892089844,252.96099853515626,522.0291040000916,243.85281372070313]},{"page":204,"text":"defensive positions to ease movement of supplies and forces as time and resources allow. Communications","rect":[90.00376892089844,264.4639587402344,521.9566791038513,255.37582397460938]},{"page":204,"text":"routes are particularly important for reserves. Units establish tactical communications with their various","rect":[90.00376892089844,276.00701904296877,522.0581805686951,266.8988342285156]},{"page":204,"text":"subordinate elements and offsite antennas to reduce their electromagnetic signature.","rect":[90.00376892089844,287.46990966796877,425.4315137863159,278.3617248535156]},{"page":204,"text":"9-44. Defending units rehearse how they move to and from primary,alternate,supplementary, and sequential","rect":[90.00376892089844,304.994873046875,521.9880137405396,295.8866882324219]},{"page":204,"text":"positions. These rehearsals establish the time necessary to conduct these movements under different","rect":[90.01377868652344,316.51788330078127,521.9697031936646,307.4096984863281]},{"page":204,"text":"environmental conditions. Units modify their existing defensive plans based on the results of these rehearsals","rect":[90.01380157470703,327.98077392578127,522.0999896507263,318.8725891113281]},{"page":204,"text":"and changes in the mission variables. They check that the routes taken during these rehearsals do not show","rect":[90.0137939453125,339.5037841796875,522.0428509750366,330.3955993652344]},{"page":204,"text":"obvious signs of heavy use. These steps can include the conduct of only dismounted rehearsals, only moving","rect":[90.0137939453125,351.02679443359377,522.0438137054443,341.9186096191406]},{"page":204,"text":"one vehicle per platoon, and taking steps to eliminate signs of movement such as sweeping snow back over","rect":[90.0137939453125,362.4896545410156,522.0449121055603,353.3814697265625]},{"page":204,"text":"the tracks made during the rehearsal.","rect":[90.0137939453125,374.01263427734377,237.23459911346436,364.9044494628906]},{"page":204,"text":"9-45. Commanders ensure close coordination among their subordinates. One way to do this during the","rect":[90.0137939453125,391.53765869140627,522.0048494415283,382.4294738769531]},{"page":204,"text":"preparation phase is for them to take their subordinate commanders to vantage points in the MBA if such","rect":[90.01380157470703,403.00048828125,521.9343776702881,393.8923034667969]},{"page":204,"text":"sites are available. They can conduct rehearsals and finalize coordination from those positions. This technique","rect":[90.01380157470703,414.52349853515627,522.1063509063721,405.4153137207031]},{"page":204,"text":"also helps commanders transmit their intent and share their situational understanding.","rect":[90.0137939453125,426.0465087890625,431.9352979660034,416.9383239746094]},{"page":204,"text":"9-46. The location, composition, and movement of echelon reserves are typically essential elements of","rect":[90.0137939453125,443.5113525390625,522.0421655235291,434.4031677246094]},{"page":204,"text":"friendly information. Other typical essential elements of friendly information in the defense include location","rect":[90.01377868652344,455.03436279296877,521.9927883148193,445.9261779785156]},{"page":204,"text":"of main obstacle belts, location of critical countermobility assets, indirect fire assets, and supply points.","rect":[90.02379608154297,466.4972839355469,521.9800977706909,457.38909912109377]},{"page":204,"text":"Enemy reconnaissance focuses on finding these reserves and reporting when and where they commit.","rect":[90.02381896972656,478.020263671875,495.3669385910034,468.9120788574219]},{"page":204,"text":"9-47. Units integrate sustainment into their maneuver rehearsals to verify that routes for support do not cross","rect":[90.02381896972656,495.5452575683594,522.1691424827576,486.43707275390627]},{"page":204,"text":"or conflict with routes used by their reserves or other maneuver elements. They balance the use of","rect":[90.02381896972656,507.00811767578127,522.0446069297791,497.8999328613281]},{"page":204,"text":"ammunition and other supply caches against their ability to secure those caches. Units also ensure the","rect":[90.02381896972656,518.5311279296875,522.0131502227783,509.4229431152344]},{"page":204,"text":"availability of alternate lines of communications and MSRs to support their contingency plans and changes","rect":[90.02381896972656,530.0541381835938,522.0218036155701,520.9459838867188]},{"page":204,"text":"in tactical situations.","rect":[90.02381896972656,539.4929809570313,172.56859874725343,532.4088745117188]},{"page":204,"text":"9-48. Units ensure the integration of available combat enablers into their plans. During this phase,","rect":[90.02381896972656,559.0419921875,522.0201978683472,549.933837890625]},{"page":204,"text":"commanders verify that their subordinate commanders and other leaders have a shared understanding of their","rect":[90.03384399414063,570.5650634765625,522.0110986289978,561.4569091796875]},{"page":204,"text":"plans and can execute them with minimal guidance. One technique that commanders use to ensure","rect":[90.0338134765625,582.0279541015625,522.1614046173096,572.9197998046875]},{"page":204,"text":"subordinate understanding is the receipt of backbriefs from their subordinates after they issue their orders.","rect":[90.03379821777344,593.5509033203125,514.0319471359253,584.4427490234375]},{"page":204,"text":"EXECUTION CONSIDERATIONS FOR AN AREA DEFENSE","rect":[72.0,618.749755859375,455.89912258529668,609.0755615234375]},{"page":204,"text":"9-49. In an area defense, units use various techniques and procedures to accomplish their missions.","rect":[90.0,639.0343017578125,521.9913892745972,629.9461669921875]},{"page":204,"text":"Defending forces repeatedly seek to force the enemy to maneuver into engagement areas where they can","rect":[90.01002502441406,650.5772705078125,522.0173244476318,641.4691162109375]},{"page":204,"text":"target them. Defending forces operate mainly from prepared, protected positions to concentrate combat power","rect":[90.0,662.0401611328125,522.0673730430603,652.9320068359375]},{"page":204,"text":"against attempted enemy breakthroughs and flanking movements. Units use their mobile forces to cover gaps","rect":[90.0,673.5631713867188,522.0855243186951,664.4550170898438]},{"page":204,"text":"between their defensive positions, reinforce those positions as necessary, and counterattack to seal","rect":[90.0,685.086181640625,521.9646372756959,675.97802734375]},{"page":204,"text":"penetrations or block enemy attempts at flanking movements. Figure 9-6 illustrates control measures that","rect":[90.0,696.549072265625,522.0744395217896,687.44091796875]},{"page":204,"text":"units can use when mixing static and mobile elements in an area defense.","rect":[89.9899673461914,708.072021484375,382.40774059295657,698.9638671875]},{"page":204,"text":"9-10","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":204,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":204,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":205,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":205,"text":"Figure 9-6. Example area defense","rect":[235.8000030517578,386.8741760253906,394.2582845611572,377.4854431152344]},{"page":205,"text":"9-50. The mission variables—most importantly time—determine how closely units can synchronize their","rect":[107.9948959350586,410.33099365234377,540.0062768516541,401.2228088378906]},{"page":205,"text":"supporting efforts with their main efforts. Units conduct supporting efforts designed to regain the initiative","rect":[107.98487091064453,421.85400390625,539.9046297149658,412.7458190917969]},{"page":205,"text":"by limiting an attacking enemy force’s options and disrupting an enemy force’s plan. Supporting efforts","rect":[107.98487091064453,433.31689453125,540.0342547874451,424.2087097167969]},{"page":205,"text":"prevent enemy forces from massing and creating windows of opportunity for the conduct of the main effort.","rect":[107.97486114501953,444.8398742675781,539.9570875167847,435.731689453125]},{"page":205,"text":"This allows defending forces to defeat attacking enemy forces in detail. Units also employ supporting efforts","rect":[107.97486114501953,456.3628845214844,539.9759051780701,447.25469970703127]},{"page":205,"text":"to disrupt enemy operations by attacking enemy command posts at critical stages in a battle or by striking","rect":[107.97486114501953,467.8258361816406,540.0071926116943,458.7175598144531]},{"page":205,"text":"and eliminating key enemy elements and capabilities. This could be river crossing equipment and supplies in","rect":[107.97489929199219,479.3487548828125,539.9594020843506,470.2405700683594]},{"page":205,"text":"regions that contain numerous unfordable rivers. Reconnaissance and security operations are normally","rect":[107.97489929199219,490.8717956542969,539.9385280609131,481.7635803222656]},{"page":205,"text":"components of the echelon’s shaping operations and supporting efforts.","rect":[107.97489929199219,502.33465576171877,393.7983350753784,493.2264709472656]},{"page":205,"text":"9-51. Gaining and maintaining enemy contact in the face of an enemy force’s determined efforts to destroy","rect":[107.97486877441406,519.849609375,540.0012722015381,510.7414245605469]},{"page":205,"text":"friendly information collection assets is vital to the success of defensive actions. As an enemy force’s attack","rect":[107.9748764038086,531.3726196289063,539.8729763031006,522.2644653320313]},{"page":205,"text":"begins, defending units strive to identify the locations and capabilities of committed enemy units, to","rect":[107.96485900878906,542.83544921875,539.9258937835693,533.727294921875]},{"page":205,"text":"determine the enemy’s intent and direction of attack, and to gain time to react. Initially, defending units","rect":[107.96485900878906,554.3584594726563,539.9368426780701,545.2503051757813]},{"page":205,"text":"accomplish these goals in their security areas. The sources of this type of intelligence include reconnaissance","rect":[107.96487426757813,565.8814697265625,540.0384187774658,556.7733154296875]},{"page":205,"text":"and security forces, intelligence units, special operations forces, and aviation elements. Battalions and","rect":[107.97489929199219,577.3443603515625,540.0574245452881,568.2362060546875]},{"page":205,"text":"companies are increasingly able to access combat information provided by technical means belonging to","rect":[107.97489929199219,588.8673095703125,539.9471950531006,579.7591552734375]},{"page":205,"text":"higher echelons, such as UAS and signals intelligence, to provide the required reaction time. Units ensure","rect":[107.97489929199219,600.390380859375,539.9587678985596,591.2822265625]},{"page":205,"text":"the distribution of a COP throughout their forces during the battle as a basis for subordinate commanders’","rect":[107.97486877441406,611.8532104492188,540.0172631797791,602.7450561523438]},{"page":205,"text":"actions. Units use the information available, in conjunction with military judgment, to determine the point at","rect":[107.97482299804688,623.376220703125,540.0043101272584,614.2579956054688]},{"page":205,"text":"which enemy forces commit to a given COA.","rect":[107.97482299804688,634.839111328125,289.51824474334719,625.73095703125]},{"page":205,"text":"9-52. Units’ security forces seek to disrupt enemy reconnaissance forces and mask dispositions, capabilities,","rect":[107.97482299804688,652.3540649414063,539.9684400558472,643.2459106445313]},{"page":205,"text":"and intent of their defending forces. This occurs simultaneously with friendly information collection assets","rect":[107.9748306274414,663.8770751953125,539.9551532249451,654.7689208984375]},{"page":205,"text":"helping to determine an enemy forces’ chosen COA. Ideally, security area engagements cause enemy forces","rect":[107.9748306274414,675.3399658203125,539.9733417015076,666.2318115234375]},{"page":205,"text":"to conduct a movement to contact against friendly prepared defenses.","rect":[107.97482299804688,686.8629150390625,385.0981092453003,677.7547607421875]},{"page":205,"text":"9-53. Security forces use every opportunity to gain information, delay, and disrupt the enemy. Their","rect":[107.97482299804688,704.387939453125,540.0111596641541,695.27978515625]},{"page":205,"text":"commanders prepare to pass through or around MBA forces as quickly as possible by using multiple passage","rect":[107.97482299804688,715.850830078125,539.9929475860596,706.74267578125]},{"page":205,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":205,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":205,"text":"9-11","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":206,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":206,"text":"points, gaps, or lanes along the FEBA as the security forces displaces. This usually occurs in one location at","rect":[90.0,83.51434326171875,522.0716319046021,74.40616607666016]},{"page":206,"text":"a time until all security forces complete their retrograde. However, the security force may pass in sequence","rect":[90.0,94.97723388671875,521.9477815704346,85.86905670166016]},{"page":206,"text":"based on enemy pressure. Transfer of responsibility occurs forward of the FEBA at the BHL. Security forces","rect":[90.0,106.500244140625,522.0023334007263,97.3920669555664]},{"page":206,"text":"make any required last-minute coordination with MBA forces at contact points to ensure their rapid passage","rect":[90.0,118.023193359375,521.9999055938721,108.9150161743164]},{"page":206,"text":"through the MBA. Figure 9-7 illustrates the use of a BHL and other control measures associated with the","rect":[89.98998260498047,129.486083984375,521.9529085235596,120.3779067993164]},{"page":206,"text":"rearward movement of forward security forces.","rect":[89.97996520996094,141.00909423828126,278.84405040740969,131.90090942382813]},{"page":206,"text":"VARIATIONS OF THE AREA DEFENSE","rect":[72.0,166.28965759277345,328.6392654075623,156.61549377441407]},{"page":206,"text":"9-54. The variations of the area defense have unique conditions and their own planning considerations. The","rect":[90.0,186.59429931640626,522.1326570587158,177.48611450195313]},{"page":206,"text":"three variations of area defense are:","rect":[90.00000762939453,196.09327697753907,232.4593882522583,189.00912475585938]},{"page":206,"text":" Defense of a linear obstacle.","rect":[115.19999694824219,209.53028869628907,246.7586317062378,202.44613647460938]},{"page":206,"text":" Perimeter defense.","rect":[115.19999694824219,223.03028869628907,207.64062023162843,215.94613647460938]},{"page":206,"text":" Reverse slope defense.","rect":[115.19999694824219,238.53428649902345,224.62549877166749,229.44613647460938]},{"page":206,"text":"9-55. When determining their variation of the area defense, units decide the location of defensible terrain","rect":[90.00376892089844,256.06927490234377,522.0648708343506,246.96109008789063]},{"page":206,"text":"within their assigned areas based on terrain characteristics and their estimate of the enemy force’s chosen","rect":[90.00376892089844,267.59228515625,521.9379787445068,258.4841003417969]},{"page":206,"text":"COA. Those terrain characteristics include terrain relief patterns, avenues of approach into and within the","rect":[90.00376892089844,279.0351257324219,522.0332918243408,269.9469909667969]},{"page":206,"text":"assigned areas, the location of any key or decisive terrain, and existing obstacles and choke points, including","rect":[90.00376892089844,290.5781555175781,522.0351467132568,281.469970703125]},{"page":206,"text":"rivers and fording sites. The other mission variables also influence this decision.","rect":[90.00376892089844,302.1011657714844,411.2872266769409,292.99298095703127]},{"page":206,"text":"DEFENSE OF A LINEAR OBSTACLE","rect":[72.0,325.4880065917969,239.49047231674195,317.1960144042969]},{"page":206,"text":"9-56. Units may conduct a variation of an area defense along or behind a linear obstacle (see figure 9-7).","rect":[90.0,345.35430908203127,522.0323438644409,336.2461242675781]},{"page":206,"text":"Linear obstacles, such as mountain ranges or rivers generally favor a forward defense. The planning,","rect":[89.98998260498047,356.8773193359375,522.0292921066284,347.7691345214844]},{"page":206,"text":"preparation, and execution of a defense of a linear obstacle is not different than any other area defense. The","rect":[89.98998260498047,368.4002990722656,522.0564851837158,359.2921142578125]},{"page":206,"text":"main difference is that the defense focuses on the linear natural or man-made obstacle as opposed to a separate","rect":[89.98999786376953,379.8431396484375,521.9461336212158,370.7550048828125]},{"page":206,"text":"key terrain feature, such as an urban area or hill.","rect":[89.98998260498047,391.3861999511719,282.9280958175659,382.27801513671877]},{"page":206,"text":"9-57. A defending force seeks to defeat any enemy forces attempting to seize a bridgehead across a linear","rect":[89.98998260498047,408.9111633300781,521.9454858360291,399.802978515625]},{"page":206,"text":"obstacle. Local defending units immediately counterattack any enemy bridgeheads to destroy enemy forces","rect":[89.98998260498047,420.3740539550781,521.9547870140076,411.265869140625]},{"page":206,"text":"located within the bridgehead, while higher echelons attempt to isolate enemy bridgehead sites. If an enemy","rect":[89.98998260498047,431.8970642089844,521.9634914398193,422.78887939453127]},{"page":206,"text":"force seizes a bridgehead and strikes out rapidly, it could quickly penetrate the defending force. An enemy","rect":[89.98999786376953,443.4200439453125,521.9632472991943,434.3118591308594]},{"page":206,"text":"penetration requires units to conduct either a counterattack, delay, or a withdrawal.","rect":[89.98998260498047,454.8829345703125,421.5307264328003,445.7747497558594]},{"page":206,"text":"9-58. It is extremely difficult to deploy in strength along the entire length of a linear obstacle. Defending","rect":[90.0,472.40789794921877,521.9211940765381,463.2997131347656]},{"page":206,"text":"units must conduct economy of force measures in some areas. In an area defense, units’ use of a defense in","rect":[90.0,483.930908203125,521.8870754241943,474.8227233886719]},{"page":206,"text":"depth accepts the possibility that enemy forces may conduct a crossing at a given point. The depth of the","rect":[89.98998260498047,495.393798828125,522.0050325469971,486.2856140136719]},{"page":206,"text":"defense should prevent an enemy force from rapidly exploiting its success. It also diffuses the enemy force’s","rect":[89.98998260498047,506.9167785644531,521.9923236351013,497.80859375]},{"page":206,"text":"combat power by causing enemy forces to contain bypassed friendly defensive positions in addition to","rect":[89.98999786376953,518.379638671875,521.9960231781006,509.2714538574219]},{"page":206,"text":"continuing to attack friendly positions in greater depth. Once the enemy force secures several bridgeheads,","rect":[89.98998260498047,529.9026489257813,522.0102491378784,520.7944946289063]},{"page":206,"text":"the defending force moves to contain them. Defending commanders may choose not to counterattack until","rect":[89.98998260498047,541.4256591796875,521.9358286819459,532.3175048828125]},{"page":206,"text":"they can mass overwhelming combat power. They will probably choose to eliminate the bridgeheads","rect":[89.98999786376953,552.8885498046875,522.0390155296326,543.7803955078125]},{"page":206,"text":"sequentially in this case. However, defenders risk allowing enemy forces to establish and fortify bridgeheads","rect":[89.98998260498047,564.4115600585938,522.0465838890076,555.3034057617188]},{"page":206,"text":"and crossing sites to the extent that a counterattack force is unable to eliminate them.","rect":[89.98998260498047,575.9345703125,429.6369276046753,566.826416015625]},{"page":206,"text":"9-12","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":206,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":206,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":207,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":207,"text":"Figure 9-7. Example of a defense of a linear obstacle","rect":[190.5,511.3141784667969,439.4389181060791,501.9254455566406]},{"page":207,"text":"PERIMETER DEFENSE","rect":[90.0,540.6822509765625,197.00649404525758,532.5960083007813]},{"page":207,"text":"9-59. Units may employ the perimeter defense as a variation when conducting an area defense when the unit","rect":[108.0,560.5742797851563,540.1044688186646,551.4661254882813]},{"page":207,"text":"is required to orient on all directions. They also use it in other circumstances, such as when 360-degree","rect":[108.01001739501953,572.0972900390625,540.0772981719971,562.9891357421875]},{"page":207,"text":"security is required when taking a temporary halt during a troop movement.","rect":[108.01000213623047,583.6203002929688,410.5938673019409,574.5121459960938]},{"page":207,"text":"9-60. The prerequisites for a successful perimeter defense are aggressive patrolling and security operations","rect":[108.01001739501953,601.0851440429688,540.0698382835388,591.9769897460938]},{"page":207,"text":"outside the perimeter. A unit within the perimeter can perform these activities, or another force, such as the","rect":[108.0,612.588134765625,540.0497713165283,603.5]},{"page":207,"text":"territorial defense forces of a local nation in which hostilities occur, can perform them. A unit can organize","rect":[107.98998260498047,624.1311645507813,540.0023470001221,615.0230102539063]},{"page":207,"text":"a perimeter defense to accomplish a specific mission, such as protecting a firebase or providing immediate","rect":[107.98998260498047,635.5940551757813,539.8759431915283,626.4859008789063]},{"page":207,"text":"self-protection, such as during resupply operations when all around security is required. Commanders","rect":[107.98998260498047,647.1170654296875,540.0382220726013,638.0089111328125]},{"page":207,"text":"establish a perimeter when a unit must hold key terrain, such as a strong point, or when it must defend itself","rect":[107.98998260498047,658.5799560546875,539.9712426719666,649.4718017578125]},{"page":207,"text":"in noncontiguous areas where a unit cannot tie its defense in with adjacent units. This occurs when a unit is","rect":[107.98998260498047,670.1029052734375,539.9217669944763,660.9846801757813]},{"page":207,"text":"operating behind enemy lines or when it is securing an isolated objective, such as a bridge, mountain pass,","rect":[107.98998260498047,681.6259155273438,539.9138746261597,672.5076904296875]},{"page":207,"text":"or airfield. Bypassed or isolated friendly forces also need to form a perimeter to allow them to defend in","rect":[107.98998260498047,693.0888061523438,539.9308376312256,683.9806518554688]},{"page":207,"text":"place. Forces located within the confines of a base or base cluster in their echelon support also need to","rect":[107.98999786376953,704.591796875,539.9707546234131,695.503662109375]},{"page":207,"text":"establish a perimeter defense. Figure 9-8 on page 9-14 depicts an example of a perimeter defense.","rect":[107.98998260498047,716.134765625,498.6797742843628,707.026611328125]},{"page":207,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":207,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":207,"text":"9-13","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":208,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.48730688476563,37.90802001953125]},{"page":208,"text":"Figure 9-8. Example of a perimeter defense","rect":[195.05999755859376,334.3141784667969,398.9951009674072,324.9254455566406]},{"page":208,"text":"9-61. A major characteristic of a perimeter defense is a secure inner area with most of the combat power","rect":[90.00028991699219,357.77099609375,521.8586328086853,348.6528015136719]},{"page":208,"text":"located on the perimeter. Another characteristic is the ease of access for resupply operations. Units coordinate","rect":[89.99026489257813,369.29400634765627,522.0085725860596,360.1858215332031]},{"page":208,"text":"direct and indirect fire plans to prevent accidentally engaging neighboring friendly units and noncombatants.","rect":[89.99027252197266,380.8170166015625,522.0012769699097,371.7088317871094]},{"page":208,"text":"Normally, the reserve centrally locates to react to a penetration of the perimeter at any point.","rect":[89.99027252197266,392.2798767089844,460.17409801483157,383.17169189453127]},{"page":208,"text":"9-62. Perimeters vary in shape depending on the terrain and situation. Units may reinforce those most","rect":[89.99027252197266,409.80487060546877,522.0627818069459,400.6966857910156]},{"page":208,"text":"vulnerable parts of their perimeter with additional resources once they determine the most probable direction","rect":[89.99028015136719,421.327880859375,522.0324001312256,412.2196960449219]},{"page":208,"text":"of enemy attack. The perimeter shape conforms to the terrain features that best use friendly observation and","rect":[89.99028015136719,432.7907409667969,522.0132961273193,423.68255615234377]},{"page":208,"text":"fields of fire. Units can increase the effectiveness of a perimeter by tying it into a natural obstacle, such as a","rect":[89.99028015136719,444.3137512207031,522.0461092071533,435.20556640625]},{"page":208,"text":"river, which allows a defending unit to concentrate its combat power in more threatened areas.","rect":[89.99028015136719,455.83673095703127,467.6148633956909,446.7285461425781]},{"page":208,"text":"Organization of Forces","rect":[72.0,480.3807067871094,180.13981113052368,470.5755920410156]},{"page":208,"text":"9-63. A perimeter defense has no special organization of forces. They organize in the traditional","rect":[90.0,497.9342956542969,522.0411753616334,488.82611083984377]},{"page":208,"text":"reconnaissance and security force, main body, and reserve. Units may employ all defending forces forward","rect":[90.0,509.4573059082031,521.9194240570068,500.34912109375]},{"page":208,"text":"along a perimeter or establish a defense in depth within a perimeter. They employ patrols, raids, ambushes,","rect":[90.0,520.920166015625,522.0214796066284,511.8119812011719]},{"page":208,"text":"air attacks, and supporting fires to harass and destroy enemy forces before they make contact with the","rect":[90.0,532.4431762695313,522.0390901641846,523.3350219726563]},{"page":208,"text":"perimeter, thus providing defense in depth with both techniques.","rect":[90.0,543.9661865234375,347.80266857147219,534.8580322265625]},{"page":208,"text":"9-64. In a forward defense, commanders place all subordinate units in positions along the perimeter. Figure","rect":[90.0,561.4310302734375,522.0029573516846,552.3228759765625]},{"page":208,"text":"9-9 illustrates how a battalion commander could divide the perimeter into subordinate unit assigned areas","rect":[89.99999237060547,572.9540405273438,521.8938128929138,563.8458862304688]},{"page":208,"text":"with boundaries and contact points. This method reduces the possibility of fratricide and friendly fire","rect":[89.99999237060547,584.47705078125,522.0093660430908,575.368896484375]},{"page":208,"text":"incidents within the perimeter and maximizes combat power on the perimeter.","rect":[90.0100326538086,595.919921875,402.42080211639407,586.831787109375]},{"page":208,"text":"9-65. Constructing an outer and inner perimeter creating defensive depth is atechnique of a defense in depth.","rect":[90.0100326538086,613.4548950195313,522.0624341964722,604.3467407226563]},{"page":208,"text":"Figure 9-9 illustrates this technique using an infantry BCT occupying an assembly area while waiting for its","rect":[90.02006530761719,624.917724609375,522.0825335960388,615.8095703125]},{"page":208,"text":"engineer battalion and third infantry battalion to arrive in the joint operations area. The infantry BCT","rect":[90.02008819580078,636.4407958984375,521.9723179359436,627.3225708007813]},{"page":208,"text":"commander directs the two subordinate infantry battalion commanders to place two of their companies along","rect":[90.02010345458985,647.9637451171875,522.0544338226318,638.8555908203125]},{"page":208,"text":"the outer perimeter reinforced with detachments from their weapons companies and one company in reserve.","rect":[90.02010345458985,659.4266357421875,522.0782423019409,650.3184814453125]},{"page":208,"text":"This configuration gives depth to each battalion’s positions and facilitates control. The figure does not depict","rect":[90.02010345458985,670.9496459960938,521.9905772171021,661.8414916992188]},{"page":208,"text":"the cavalry squadron since it occupies positions outside the perimeter in this example. Alternatively, figure","rect":[90.01000213623047,682.47265625,521.9680452423096,673.364501953125]},{"page":208,"text":"9-10 illustrates how this infantryBCTcommander could elect to assign the outer perimeter to the two infantry","rect":[90.01001739501953,693.935546875,522.1306667327881,684.827392578125]},{"page":208,"text":"battalions and have the cavalry squadron resource an inner perimeter, retaining a larger, more tactically","rect":[90.01002502441406,705.45849609375,521.8754787445068,696.350341796875]},{"page":208,"text":"mobile central reserve.","rect":[90.01002502441406,714.9574584960938,181.43151378631593,707.8733520507813]},{"page":208,"text":"9-14","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":208,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":208,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":209,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":209,"text":"Figure 9-9. Example of a perimeter defense in depth","rect":[192.239990234375,379.6741943359375,437.81918072891235,370.28546142578127]},{"page":209,"text":"Figure 9-10. Battalion perimeter, squadron reserve","rect":[195.16580200195313,705.9555053710938,434.80116175842286,696.6569213867188]},{"page":209,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":209,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":209,"text":"9-15","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":210,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":210,"text":"9-66. Commanders position forces within a perimeter to decrease the possibility of an enemy force","rect":[90.0,83.51434326171875,522.0693636016846,74.40616607666016]},{"page":210,"text":"simultaneously suppressing the inner and outer perimeter forces with the same fires. Friendly forces within","rect":[90.0,94.97723388671875,521.9746608734131,85.86905670166016]},{"page":210,"text":"the perimeter provide mutual support. In open terrain, they cover gaps on the outer perimeter between units","rect":[90.0,106.500244140625,521.9329364280701,97.3920669555664]},{"page":210,"text":"with fires. They do not allow gaps between defensive fighting positions when the unit is in restrictive terrain","rect":[90.0,118.023193359375,522.0329494476318,108.9150161743164]},{"page":210,"text":"with restricted fields of fire and observation. This may mean that a unit defends along a narrower frontage","rect":[90.0,129.486083984375,522.0374422149658,120.3779067993164]},{"page":210,"text":"than on more open terrain. Commanders may also have to employ all subordinate units on the line formed by","rect":[90.0,141.00909423828126,522.0490627288818,131.90090942382813]},{"page":210,"text":"the perimeter. Units ensure that outer perimeter positions have rearward protection from inner perimeter","rect":[90.0,152.51206970214845,521.9722192344666,143.42391967773438]},{"page":210,"text":"weapons if an inner perimeter is established.","rect":[90.0,163.97496032714845,268.0644483566284,154.88681030273438]},{"page":210,"text":"9-67. Units can assign combat vehicles supporting defense firing positions on the perimeter to cover the most","rect":[90.0,181.50994873046876,522.0504527053834,172.40176391601563]},{"page":210,"text":"likely mounted avenues of approach. Based on their mobility, combat vehicles can also form the unit’s","rect":[89.99999237060547,193.032958984375,522.1195819358826,183.92477416992188]},{"page":210,"text":"reserve. Vehicle commanders select and prepare alternate and supplemental firing positions and routes to and","rect":[90.01001739501953,204.495849609375,522.0326442718506,195.38766479492188]},{"page":210,"text":"from them. If a perimeter has several mounted avenues of approach leading to it, units may elect to hold","rect":[90.01001739501953,216.018798828125,521.9445705413818,206.91061401367188]},{"page":210,"text":"combat vehicles in hide positions until an enemy force approaches. Units prepare routes, firing positions, and","rect":[90.01000213623047,227.481689453125,522.1111965179443,218.37350463867188]},{"page":210,"text":"range cards for all positions. Small-unit leaders must ensure that vehicles do not destroy communications","rect":[90.01001739501953,239.00469970703126,522.0334613304138,229.89651489257813]},{"page":210,"text":"wires when vehicles move from one position to another.","rect":[90.0,250.50767517089845,314.7405958175659,241.41952514648438]},{"page":210,"text":"9-68. The need to hold or protect terrain features—such as bridges, airfields, or landing zones—from enemy","rect":[89.98997497558594,267.9925537109375,522.0197658538818,258.8843688964844]},{"page":210,"text":"observation and fires may restrict the positioning of units within a perimeter. These factors, as well as the","rect":[89.98999786376953,279.51556396484377,521.9591951446533,270.4073791503906]},{"page":210,"text":"inability to achieve depth, make a perimeter defense vulnerable to penetration by heavy enemy forces. Units","rect":[89.98998260498047,291.03857421875,521.9883563499451,281.9303894042969]},{"page":210,"text":"reduce these vulnerabilities by—","rect":[89.98998260498047,302.5014343261719,221.9333610534668,293.39324951171877]},{"page":210,"text":" Developing information collection plans that provide early warning.","rect":[115.19999694824219,315.95428466796877,405.8884229660034,306.8460998535156]},{"page":210,"text":" Positioning anti-armor systems on restrictive terrain to concentrate fires on armor approaches.","rect":[115.19999694824219,329.45428466796877,509.18560314178469,320.3460998535156]},{"page":210,"text":" Providing as much depth as the diameter of the perimeter to allow the proper placement of security","rect":[115.19999694824219,342.95428466796877,522.0571193695068,333.8460998535156]},{"page":210,"text":"elements and the reserve and the designation of secondary sectors of fire for anti-armor weapons.","rect":[133.1999969482422,354.477294921875,521.9840650558472,345.3691101074219]},{"page":210,"text":" Constructing obstacles to fix or block enemy forces, so friendly units can effectively engage them.","rect":[115.19999694824219,367.97430419921877,522.0532789230347,358.8661193847656]},{"page":210,"text":" Using obscurants and military deception.","rect":[115.19999694824219,381.47430419921877,297.4047803878784,372.3661193847656]},{"page":210,"text":"9-69. If isolation from other friendly units drives commanders to form a perimeter, such as when conducting","rect":[89.9937515258789,398.9992980957031,522.0219020843506,389.89111328125]},{"page":210,"text":"echelon support area security or when encircled, functional and multifunctional support and sustainment","rect":[89.9937515258789,410.462158203125,522.0021128616334,401.3539733886719]},{"page":210,"text":"elements from other units may seek to take advantage of that perimeter’s protection. The base commander","rect":[89.98372650146485,421.98516845703127,521.9999902305603,412.8769836425781]},{"page":210,"text":"gives these elements defensive missions based on their capabilities within the base formed by the perimeter.","rect":[89.97366333007813,433.5081787109375,521.9606885910034,424.3999938964844]},{"page":210,"text":"Units coordinate and integrate any fire support provided from outside the perimeter into the overall defensive","rect":[89.97366333007813,444.9710388183594,521.9417390899658,435.86285400390627]},{"page":210,"text":"plan. This extra fire support conserves the ammunition of units within the perimeter.","rect":[89.97366333007813,456.4739990234375,427.69585704803469,447.3858642578125]},{"page":210,"text":"9-70. Units normally employ reconnaissance assets, such as a scout platoon, outside the perimeter to provide","rect":[89.97366333007813,473.9588928222656,522.0521516876221,464.8507080078125]},{"page":210,"text":"early warning. They augment perimeter security with squad sized or smaller observation posts forward of the","rect":[89.97366333007813,485.4819030761719,522.0017366485596,476.37371826171877]},{"page":210,"text":"perimeter provided and controlled by units positioned along that perimeter. These security elements position","rect":[89.97366333007813,497.0048828125,521.9492702484131,487.8966979980469]},{"page":210,"text":"to observe avenues of approach. Patrols examine areas not under observation by stationary elements. Any","rect":[89.97370147705078,508.4678039550781,521.9216213226318,499.3595886230469]},{"page":210,"text":"security forces operating outside the perimeter coordinate their passage of lines into and out of the perimeter","rect":[89.97370147705078,519.9907836914063,521.9495751914978,510.8825988769531]},{"page":210,"text":"with the appropriate perimeter units.","rect":[89.97370910644531,531.4937744140625,235.81788158416749,522.4056396484375]},{"page":210,"text":"9-71. The reserve may be a designated unit or a provisional force organized from available personnel and","rect":[89.97370910644531,548.9786376953125,521.9748439788818,539.8704833984375]},{"page":210,"text":"equipment. The reserve forms a second line of defense behind the perimeter forces. Ideally, the reserve is","rect":[89.97370910644531,560.5016479492188,521.8502948265076,551.3934936523438]},{"page":210,"text":"mobile enough to react to enemy action along any part of the perimeter. Units position the reserve to block","rect":[89.97370910644531,572.024658203125,521.8544216156006,562.9164428710938]},{"page":210,"text":"the most dangerous avenue of approach and assigns on-order positions on other critical avenues. They may","rect":[89.97370147705078,583.487548828125,521.9379787445068,574.37939453125]},{"page":210,"text":"task combat vehicles initially occupying firing positions on the perimeter with the mission of reinforcing the","rect":[89.97370147705078,595.010498046875,521.9129304962158,585.90234375]},{"page":210,"text":"reserve.","rect":[89.97372436523438,604.5094604492188,121.39544200897217,599.760009765625]},{"page":210,"text":"Control Measures","rect":[72.0,628.833740234375,156.56247958755493,621.2465209960938]},{"page":210,"text":"9-72. Commanders, in a perimeter defense, use control measures to designate the trace of the perimeter, BPs,","rect":[90.0,648.5942993164063,522.1024732589722,639.4861450195313]},{"page":210,"text":"contact points, and lateral and forward boundaries. They can use engagement areas (EAs), target reference","rect":[89.99996185302735,660.1173095703125,522.0567903594971,651.0091552734375]},{"page":210,"text":"points (TRPs), final protective fires (FPFs), and principal direction of fire as fire control measures. Units","rect":[90.0,671.5601806640625,521.9770648460388,662.4720458984375]},{"page":210,"text":"designate checkpoints, contact points, passage points, and passage routes for use by local reconnaissance,","rect":[89.9999771118164,683.1031494140625,521.9550123214722,673.9949951171875]},{"page":210,"text":"surveillance, and security elements operating outside the perimeter boundary. Figure 9-11 illustrates some of","rect":[89.9999771118164,694.6261596679688,522.0474145469666,685.5180053710938]},{"page":210,"text":"these control measures.","rect":[90.01005554199219,704.0650024414063,183.65497875213624,696.9808959960938]},{"page":210,"text":"9-16","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":210,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":210,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":211,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":211,"text":"Planning a Perimeter Defense","rect":[90.0,84.62071228027344,229.52612077331544,74.81556701660156]},{"page":211,"text":"9-73. Defending units position their forces and plan fire and movement so they can respond to the widest","rect":[108.0,102.11431884765625,540.0033335647584,93.00614166259766]},{"page":211,"text":"possible range of enemy actions. Defending commanders, assisted by their staffs, prepare plans, including","rect":[107.99000549316406,113.6373291015625,540.0029811859131,104.5291519165039]},{"page":211,"text":"counterattack plans. Units rehearse, evaluate, and revise their plans as needed. The availability of landing","rect":[107.99000549316406,125.16033935546875,540.0128688812256,116.05216217041016]},{"page":211,"text":"and drop zones protected from enemy observation and fire is a major consideration when selecting and","rect":[107.99000549316406,136.6231689453125,539.9400539398193,127.50497436523438]},{"page":211,"text":"organizing the perimeter defense. Units must emphasize supply economy and protect existing supply stocks","rect":[107.98999786376953,148.14617919921876,540.0404193382263,139.03799438476563]},{"page":211,"text":"since aerial resupply is vulnerable to weather and enemy fires. Commanders consider the fundamentals of an","rect":[107.98998260498047,159.669189453125,540.0261135101318,150.56100463867188]},{"page":211,"text":"area defense in paragraphs 9-18 through 9-39 when planning a perimeter defense.","rect":[107.98999786376953,171.132080078125,434.5618848800659,162.02389526367188]},{"page":211,"text":"Figure 9-11. Example perimeter defense control measures","rect":[177.4185791015625,497.95440673828127,452.56776332092286,488.565673828125]},{"page":211,"text":"9-74. The mission variables considered when commanders and staffs developed their counterattack plans as","rect":[108.0,521.4512939453125,540.0532367210388,512.3631591796875]},{"page":211,"text":"branches or sequels to their defensive plans may not correspond exactly with the situation when the moment","rect":[108.0,532.9342041015625,540.0962290725709,523.8260498046875]},{"page":211,"text":"comes to execute those counterattacks. Units reassess and revise their counterattack plans based on their","rect":[108.0,544.437255859375,540.0034081993103,535.34912109375]},{"page":211,"text":"revised situational understanding as their defenses unfold. This revised understanding results from an updated","rect":[108.0,555.9802856445313,539.9268703460693,546.8721313476563]},{"page":211,"text":"common operational picture as new intelligence and combat information becomes available to answer these","rect":[108.0,567.4431762695313,540.0664339141846,558.3350219726563]},{"page":211,"text":"questions:","rect":[108.0,578.9461669921875,148.6451334915161,569.8580322265625]},{"page":211,"text":" Is a counterattack feasible or should commanders use the reserve to contain enemy successes?","rect":[133.1999969482422,592.434326171875,527.4522981719971,583.326171875]},{"page":211,"text":" When and where should defending forces counterattack?","rect":[133.1999969482422,605.934326171875,378.43066120910648,596.826171875]},{"page":211,"text":" What parts of the defending force should counterattack?","rect":[133.1999969482422,619.434326171875,375.9076509552002,610.326171875]},{"page":211,"text":" What should defending forces block or contain in the case of successful enemy penetrations?","rect":[133.1999969482422,632.934326171875,523.0202913360596,623.826171875]},{"page":211,"text":" Is there enough time to complete the counterattack before the arrival of enemy follow-on forces?","rect":[133.1999969482422,646.434326171875,538.3296785430908,637.326171875]},{"page":211,"text":" Can commanders conduct their counterattack using only available fires or must ground maneuver","rect":[133.1999969482422,659.934326171875,540.0371606407166,650.826171875]},{"page":211,"text":"forces be committed?","rect":[151.1999969482422,669.3731079101563,237.30839253234863,662.2890014648438]},{"page":211,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":211,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":211,"text":"9-17","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":212,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":212,"text":"Use of Terrain","rect":[72.0,83.51434326171875,132.58893489074709,74.57650756835938]},{"page":212,"text":"9-75. Proper evaluation and organization of an area’s terrain are essential to maximize the effectiveness of a","rect":[89.99592590332031,100.97918701171875,522.0603914337158,91.87100982666016]},{"page":212,"text":"force conducting perimeter defense. Units consider—","rect":[89.99591827392578,112.502197265625,304.4339408874512,103.3940200805664]},{"page":212,"text":" Natural defensive characteristics of the terrain.","rect":[115.19999694824219,123.97028350830078,320.3755750656128,116.88614654541016]},{"page":212,"text":" Using artificial obstacles to enhance the natural defensive characteristics of the terrain.","rect":[115.19999694824219,139.49432373046876,480.26800060272219,130.38613891601563]},{"page":212,"text":" Existing roads, railways, and waterways used for military LOCs and civilian commerce.","rect":[115.19999694824219,152.99432373046876,485.8665723800659,143.88613891601563]},{"page":212,"text":" Controlled land areas surrounding the perimeter to a range beyond that of enemy mortars and","rect":[115.19999694824219,166.49432373046876,522.0227565765381,157.38613891601563]},{"page":212,"text":"rockets.","rect":[133.1999969482422,175.99330139160157,164.62171459197999,168.90914916992188]},{"page":212,"text":"Security","rect":[71.99783325195313,201.47412109375,105.90650654602051,192.53628540039063]},{"page":212,"text":"9-76. An effective security requires early warnings. Early warnings of pending enemy actions allow units","rect":[89.99375915527344,218.9891357421875,521.9647357444763,209.88095092773438]},{"page":212,"text":"the time to react to any threat. Combat outposts, patrols, sensors, target acquisition radars, and aerial","rect":[89.99375915527344,230.45196533203126,521.9509043655396,221.34378051757813]},{"page":212,"text":"surveillance provide early warning. Civil information, human intelligence, and observed changes in a","rect":[89.99375915527344,241.9749755859375,521.9970979766846,232.86679077148438]},{"page":212,"text":"populations pattern of life near the position are excellent indicators of pending enemy actions. Security","rect":[89.9937515258789,253.49798583984376,522.0002956390381,244.38980102539063]},{"page":212,"text":"measures vary with the enemy threat, forces available, and the other mission variables; however, all around","rect":[89.9937515258789,264.96087646484377,522.0208644866943,255.85263061523438]},{"page":212,"text":"security is essential.","rect":[89.9937973022461,276.48388671875,170.25695323944093,267.3757019042969]},{"page":212,"text":"Mutual Support","rect":[71.99783325195313,299.9807434082031,137.90036725616455,291.0629577636719]},{"page":212,"text":"9-77. Units position defending forces to ensure mutual employment of defensive resources, such as crew-","rect":[90.0037841796875,317.4656677246094,522.0361840782166,308.35748291015627]},{"page":212,"text":"served weapons, observation, and maneuver elements. Mutual support between defensive elements requires","rect":[90.00376892089844,328.9685974121094,521.9843890647888,319.8804626464844]},{"page":212,"text":"careful planning, positioning, and coordination because of the circular aspects of the perimeter defense. They","rect":[90.00376892089844,340.51165771484377,521.9966335296631,331.4034729003906]},{"page":212,"text":"use surveillance, obstacles, prearranged indirect fires, and maneuver elements to exploit or reinforce fires to","rect":[90.00379943847656,351.97454833984377,522.0288600921631,342.8663635253906]},{"page":212,"text":"control any gaps in the perimeter. Defensive plans provide for using all available support, including indirect","rect":[90.00377655029297,363.49755859375,522.0279917678834,354.3893737792969]},{"page":212,"text":"fire, attack helicopters, and fixed-wing aircraft.","rect":[90.00377655029297,375.0205383300781,278.80764293670657,365.912353515625]},{"page":212,"text":"All-Around Defense","rect":[72.00785827636719,398.47735595703127,155.11375141906738,389.5395202636719]},{"page":212,"text":"9-78. In defensive planning, units prepare to defend against an enemy attack from any directionand designate","rect":[90.01380157470703,416.0023498535156,522.0301179962158,406.8941650390625]},{"page":212,"text":"the unit defending the most likely enemy avenue of approach the main effort. They employ flexible plans","rect":[90.01382446289063,427.52532958984377,522.0011126976013,418.4171447753906]},{"page":212,"text":"and position their reserve to react to any threat. They commit maneuver elements and supporting weapons to","rect":[90.01382446289063,438.98822021484377,522.0028591156006,429.8800354003906]},{"page":212,"text":"detect, engage, and destroy an attacking enemy force. Commanders assign defensive positions and sectors of","rect":[90.01380157470703,450.51123046875,521.9991967735291,441.40301513671877]},{"page":212,"text":"fire to all personnel within the perimeter.","rect":[90.01378631591797,462.0141906738281,254.15844249725343,452.9260559082031]},{"page":212,"text":"Defense in Depth","rect":[72.00784301757813,485.4910583496094,143.6909170074463,476.55322265625]},{"page":212,"text":"9-79. Alternate, subsequent, and supplementary positions, combat outposts, and mutually supporting strong","rect":[90.01378631591797,503.0060119628906,522.0552883148193,493.8978271484375]},{"page":212,"text":"points forward of the perimeter extend the depth of a defense. Units plan fires to the maximum range","rect":[90.02381134033203,514.4688720703125,522.0752229766846,505.3606872558594]},{"page":212,"text":"throughout a defensive area. They may place protective obstacles around critical locations within the","rect":[90.02381134033203,525.991943359375,522.0952425079346,516.8837890625]},{"page":212,"text":"perimeter during periods of reduced visibility to disrupt the enemy’s plan and add depth to the defense.","rect":[90.02381896972656,537.514892578125,502.5703077316284,528.40673828125]},{"page":212,"text":"Responsiveness","rect":[72.02789306640625,560.9517211914063,135.92143130111695,552.0338745117188]},{"page":212,"text":"9-80. An attacking enemy force has the advantage of deciding when, where, and with what force to attack.","rect":[90.03384399414063,578.4967041015625,522.0309400558472,569.3885498046875]},{"page":212,"text":"Defending units prepare plans—including counterattack plans—and rehearse, assess, and revise them as","rect":[90.02381896972656,590.019775390625,522.0000750999451,580.91162109375]},{"page":212,"text":"necessary. The defensive plan contains procedures for timely responses by fire support teams and maneuver","rect":[90.02383422851563,601.482666015625,521.9999291954041,592.37451171875]},{"page":212,"text":"forces.","rect":[90.02383422851563,610.9816284179688,117.00669384002686,603.9075317382813]},{"page":212,"text":"Maximum Use of Offensive Action","rect":[72.02790832519531,636.5225830078125,215.36204432678225,627.57470703125]},{"page":212,"text":"9-81. Since the objective of a perimeter defense is to maintain a secure position, units use offensive actions","rect":[90.02383422851563,653.9874267578125,522.0791766624451,644.8692016601563]},{"page":212,"text":"to engage enemy forces outside the perimeter. On initial occupation of a perimeter, friendly forces take","rect":[90.02383422851563,665.510498046875,521.9888582305908,656.40234375]},{"page":212,"text":"offensive actions to destroy enemy forces in the immediate area. Once the perimeter area is clear, a relatively","rect":[90.02379608154297,677.0333862304688,521.9974269866943,667.9252319335938]},{"page":212,"text":"smaller force can defend the perimeter, thereby releasing other forces for other operations. Units employ","rect":[90.02381896972656,688.4962768554688,521.9839382171631,679.3881225585938]},{"page":212,"text":"patrols, raids, ambushes, aerial attacks, and supporting fires to harass and destroy enemy forces to prevent","rect":[90.02379608154297,700.019287109375,522.0749278030396,690.9111328125]},{"page":212,"text":"them from threatening the perimeter. They maintain constant communications and a COP with subordinates","rect":[90.02381896972656,711.5422973632813,521.9619891624451,702.4341430664063]},{"page":212,"text":"9-18","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":212,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":212,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":213,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":213,"text":"within the perimeter. Commanders direct their subordinates to conduct appropriate actions to remove threats","rect":[108.0,83.49430847167969,540.0042254905701,74.40616607666016]},{"page":213,"text":"located within their assigned areas and sectors of fire.","rect":[108.0,94.97723388671875,322.6664991378784,85.86905670166016]},{"page":213,"text":"Executing a Perimeter Defense","rect":[90.0,119.60069274902344,234.4528480682373,109.79554748535156]},{"page":213,"text":"9-82. Attacks against a perimeter may range from long-range sniper, mortar, rocket fire, or attacks by suicide","rect":[108.0,137.154296875,540.1345491485596,128.04611206054688]},{"page":213,"text":"demolition squads to attacks by major enemy ground and air forces. Mortars, artillery, tanks, and anti-armor","rect":[108.00003814697266,148.6171875,540.0284326133728,139.49899291992188]},{"page":213,"text":"missile systems from within the perimeter engage enemy forces at long ranges. As an attack comes within","rect":[107.98999786376953,160.14019775390626,540.0022487640381,151.03201293945313]},{"page":213,"text":"small-arms range, other weapons on the perimeter engage enemy forces. If the assault continues, the","rect":[107.98998260498047,171.6632080078125,539.9890413360596,162.55502319335938]},{"page":213,"text":"defending force employs its FPFs. If enemy forces penetrate the perimeter, the reserve blocks the penetration","rect":[107.98998260498047,183.12603759765626,540.0390529632568,174.01785278320313]},{"page":213,"text":"or counterattacks to restore the perimeter. After committing the initial reserve, commanders reconstitute","rect":[107.98998260498047,194.6490478515625,539.9198274688721,185.54086303710938]},{"page":213,"text":"another reserve to meet other threats. This force normally comes from an unengaged unit on a different","rect":[107.98998260498047,206.17205810546876,539.9828867874146,197.06387329101563]},{"page":213,"text":"portion of the perimeter. If commanders use an unengaged force to constitute a new reserve, they must retain","rect":[107.98998260498047,217.63494873046876,539.9622097015381,208.52676391601563]},{"page":213,"text":"sufficient forces to defend the vacated sector, unless the situation forces commanders to assume that degree","rect":[108.00003814697266,229.157958984375,540.1243562774658,220.04977416992188]},{"page":213,"text":"of risk.","rect":[108.00003814697266,238.65687561035157,136.36464977264405,231.57272338867188]},{"page":213,"text":"9-83. Sustainment elements may provide support from within the perimeter or from outside locations,","rect":[108.00003814697266,258.14581298828127,539.9770460128784,249.03762817382813]},{"page":213,"text":"depending on the mission and the status of the unit providing the defensive perimeter, type of transport","rect":[108.00003814697266,269.6688232421875,539.9972300491334,260.5606384277344]},{"page":213,"text":"available, weather, and terrain. Commanders often sustain units in contested areas without secure ground","rect":[108.00003814697266,281.1917724609375,539.9356594085693,272.0835876464844]},{"page":213,"text":"LOCs by air.","rect":[108.0,292.6546630859375,160.00982189178468,283.5464782714844]},{"page":213,"text":"Find the Enemy","rect":[90.00408172607422,316.171630859375,156.7382936553955,307.2337951660156]},{"page":213,"text":"9-84. This typically occurs once friendly security forces make initial enemy contact. The security force does","rect":[108.0,333.69659423828127,540.1145770530701,324.5884094238281]},{"page":213,"text":"not idly await the arrival of the enemy. They take an active role as part of the information collection activities","rect":[108.0,345.15948486328127,540.0364520530701,336.0513000488281]},{"page":213,"text":"to find the enemy and understand their location, disposition, strength, and course of action.","rect":[108.0,356.6824645996094,471.5747022628784,347.57427978515627]},{"page":213,"text":"9-85. The security force also conducts counterreconnaissance against enemy reconnaissance and intelligence","rect":[108.01001739501953,374.1473388671875,540.0265169219971,365.0391540527344]},{"page":213,"text":"assets. Destroying these assets allows units to force enemy units to deploy into formations on the ground of","rect":[108.01000213623047,385.67034912109377,540.0384423789978,376.5621643066406]},{"page":213,"text":"those commanders’ choosing, thus helping to disrupt and desynchronize the enemy force’s plan. This also","rect":[108.01002502441406,397.193359375,539.9652004241943,388.0851745605469]},{"page":213,"text":"prevents the enemy from understanding the composition and disposition of the main effort of the defense and","rect":[107.99996185302735,408.6562194824219,540.0521755218506,399.54803466796877]},{"page":213,"text":"forces the enemy to attack into an unknown situation.","rect":[107.99996185302735,420.17919921875,322.1283826828003,411.0710144042969]},{"page":213,"text":"Fix the Enemy","rect":[90.01408386230469,443.6961669921875,151.23026753234863,434.7583312988281]},{"page":213,"text":"9-86. Units do everything possible to limit an enemy force’s options when conducting an area defense. They","rect":[108.01000213623047,461.1610107421875,540.0344753265381,452.0528259277344]},{"page":213,"text":"conduct supporting efforts to constrain the enemy into specific COAs, control enemy movements, or fix","rect":[107.9999771118164,472.68402099609377,540.0054225921631,463.5758361816406]},{"page":213,"text":"enemy forces in given locations. Units continue to find, delay, or attrit enemy forces for follow on and reserve","rect":[107.99996948242188,484.2070617675781,540.1001863555908,475.098876953125]},{"page":213,"text":"to keep them from entering the MBA when executing these operations.","rect":[107.99996948242188,495.6699523925781,392.14626598358157,486.561767578125]},{"page":213,"text":"9-87. Units have several options to help fix attacking enemy forces. They can design supporting efforts—","rect":[107.99996948242188,513.1949462890625,540.0623588562012,504.08673095703127]},{"page":213,"text":"such as securing the flanks and point of a penetration—to fix enemy forces and allow friendly forces to","rect":[107.99996185302735,524.7179565429688,540.0034084320068,515.6098022460938]},{"page":213,"text":"execute decisive maneuver elsewhere. Combat outposts and strong points can also deny enemy force’s","rect":[107.99996185302735,536.1808471679688,540.1225116233826,527.0726928710938]},{"page":213,"text":"movement to or through a location.","rect":[108.0,547.7037353515625,249.13369274139405,538.5955810546875]},{"page":213,"text":"9-88. Units use obstacles to fix, turn, block, or disrupt to limit the enemy force’s options. Properly executed","rect":[108.0,565.21875,540.0253200531006,556.110595703125]},{"page":213,"text":"obstacles result from top-down and bottom-up obstacle planning and emplacement. Blocking forces can also","rect":[107.9999771118164,576.681640625,540.0224514007568,567.573486328125]},{"page":213,"text":"affect enemy movement. A blocking force may achieve its mission from a variety of positions depending on","rect":[107.98998260498047,588.2046508789063,540.0140285491943,579.0964965820313]},{"page":213,"text":"the mission variables.","rect":[107.98998260498047,597.70361328125,194.91450023651124,590.6195068359375]},{"page":213,"text":"Finish the Enemy","rect":[89.99406433105469,623.1844482421875,163.92864704895019,614.24658203125]},{"page":213,"text":"9-89. The main effort occurs in the MBA in an area defense. This is where the effects of supporting efforts,","rect":[107.98998260498047,640.699462890625,539.9622144699097,631.59130859375]},{"page":213,"text":"coupled with sustaining operations, combine with the main effort of the main body forces to defeat enemy","rect":[107.97997283935547,652.162353515625,539.9852809906006,643.05419921875]},{"page":213,"text":"forces. Commanders’ goals are to prevent enemy forces from further advances by using a combination of","rect":[107.95990753173828,663.6853637695313,539.9472558555603,654.5772094726563]},{"page":213,"text":"fires from prepared positions, obstacles, and mobile reserves.","rect":[107.94989013671875,675.1883544921875,352.9679822921753,666.1002197265625]},{"page":213,"text":"9-90. Generating massed effects is especially critical to units conducting the defense of large areas against","rect":[107.94989013671875,692.6732177734375,539.9451670608521,683.5650634765625]},{"page":213,"text":"enemy forces with significant advantages in combat power. An attacking enemy force has the ability to select","rect":[107.93987274169922,704.1962280273438,539.9676279983521,695.0880737304688]},{"page":213,"text":"the point and time of attack. Therefore, an attacking enemy force can mass forces at specific points, thus","rect":[107.93987274169922,715.7192993164063,539.8795306663513,706.6111450195313]},{"page":213,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":213,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":213,"text":"9-19","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":214,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":214,"text":"dramatically influencing the ratio of forces at these points of attack. Defending units quickly determine their","rect":[90.0,83.51434326171875,522.0323998985291,74.40616607666016]},{"page":214,"text":"enemy force’s intent and the effects of terrain. This allows defending units and their weapon systems to","rect":[90.0,94.97723388671875,521.8760280609131,85.86905670166016]},{"page":214,"text":"concentrate the effects of combat power against enemy forces at those points and restore a more favorable","rect":[90.0,106.500244140625,521.8881502227783,97.3920669555664]},{"page":214,"text":"force ratio.","rect":[90.0,115.99915313720703,133.90264415740968,108.9150161743164]},{"page":214,"text":"9-91. Units carefully plan and coordinate the withdrawal of their forward security forces through MBA","rect":[90.0,135.48809814453126,522.0122113265991,126.37992095947266]},{"page":214,"text":"forward positions. MBA forces assume responsibility for a battle at the BHL. Units may find it necessary to","rect":[90.0,147.0111083984375,522.0933742523193,137.90292358398438]},{"page":214,"text":"increase the intensity of the direct and indirect fire support they provide to these forward security forces. This","rect":[90.0,158.5340576171875,522.0720965843201,149.42587280273438]},{"page":214,"text":"support allows those security forces to break direct contact with an enemy force as they approach the BHL","rect":[90.0,169.9969482421875,521.8652622718811,160.88876342773438]},{"page":214,"text":"and FEBA and conduct a rearward passage of lines. Units may also employ obscuration to assist in the","rect":[90.0,181.51995849609376,522.1013460235596,172.41177368164063]},{"page":214,"text":"retrograde maneuver of their security forces. Units guard rearward passage lanes in obstacle complexes left","rect":[90.0,193.04296875,522.0256724319459,183.93478393554688]},{"page":214,"text":"for the withdrawal of their security forces and arrange for closing those lanes after the passage of those forces.","rect":[90.0,204.505859375,521.9982252120972,195.39767456054688]},{"page":214,"text":"MBA forces provide other support as required to assist the withdrawal of these security forces.","rect":[90.0,216.02880859375,469.0595350265503,206.92062377929688]},{"page":214,"text":"9-92. Attacking enemy forces try to find vulnerabilities and passage points after they reach the MBA,","rect":[90.0,233.49371337890626,521.9691114425659,224.38552856445313]},{"page":214,"text":"possibly by conducting a series of probing attacks. Defending units engage enemy lead forces as these attacks","rect":[90.0,245.0167236328125,521.9741961936951,235.90853881835938]},{"page":214,"text":"develop. Defending units select and reinforce terrain to canalize attacking enemy forces and limit the","rect":[90.0,256.5396728515625,521.9656648712158,247.43148803710938]},{"page":214,"text":"available maneuver space. This limited maneuver space tends to slow enemy advances and cause enemy","rect":[90.0,268.0025634765625,521.9531154632568,258.8943786621094]},{"page":214,"text":"formations to compress with resulting increased force densities. These conditions favor the employment of","rect":[90.0,279.52557373046877,521.9840600547791,270.4173889160156]},{"page":214,"text":"defensive fires and air support. Defending units employ simultaneous and sequential fires to impose the","rect":[90.0,291.048583984375,522.0425081329346,281.9403991699219]},{"page":214,"text":"maximum possible enemy losses at this stage of a battle.","rect":[90.0,302.511474609375,316.0691785812378,293.4032897949219]},{"page":214,"text":"9-93. Subordinate elements maneuver using massed direct and indirect fire and movement to gain positional","rect":[90.0,320.03643798828127,522.0261607131959,310.9282531738281]},{"page":214,"text":"advantage over assaulting enemy forces. Commanders also direct engineer obstacle and sustainment efforts","rect":[90.0,331.5594482421875,522.0574481468201,322.4512634277344]},{"page":214,"text":"by assigning priorities. They reposition forces to meet enemy forces where they actually are rather than where","rect":[90.0,343.0223083496094,522.1092805938721,333.91412353515627]},{"page":214,"text":"they projected enemy forces would be. Commanders direct operations and support subordinate elements by","rect":[90.0,354.5453186035156,521.9791164398193,345.4271240234375]},{"page":214,"text":"providing the necessary functional and multifunctional support and sustainment assets. They control the","rect":[90.0,366.068359375,522.0494661407471,356.9601745605469]},{"page":214,"text":"commitment of their reserves. Units engage enemy follow-on forces with long-range rockets and air support","rect":[90.01001739501953,377.5312194824219,522.0954966506959,368.42303466796877]},{"page":214,"text":"at division echelons and above. Units can defeat an echeloned enemy’s attack in detail, one echelon at a time,","rect":[90.01001739501953,389.0542297363281,522.0482740402222,379.946044921875]},{"page":214,"text":"if they can delay the entry of enemy follow-on forces into the MBA. This is because disrupting the enemy","rect":[89.99996185302735,400.57720947265627,521.9300441741943,391.4690246582031]},{"page":214,"text":"force’s timetable can lead to the creation of exploitable gaps between the enemy force’s committed and","rect":[90.0,412.0401306152344,521.9592189788818,402.93194580078127]},{"page":214,"text":"subsequent echelons.","rect":[90.0,423.5430908203125,174.4685926437378,414.4549560546875]},{"page":214,"text":"9-94. Gaps between defensive positions may be necessary within the MBA due to a lack of defending forces.","rect":[90.01001739501953,441.088134765625,522.0843458175659,431.9799499511719]},{"page":214,"text":"Units do not leave gaps in or near points where they project enemy forces will commit their main effort.","rect":[90.01001739501953,452.551025390625,521.9000806808472,443.4328308105469]},{"page":214,"text":"Units continue to observe these gaps and cover them with their available fires. Where possible, units block","rect":[90.01001739501953,464.07403564453127,522.0090847015381,454.9658508300781]},{"page":214,"text":"these gaps by emplacing obstacles or moving in friendly forces.","rect":[90.01001739501953,475.53692626953127,345.05315685272219,466.4287414550781]},{"page":214,"text":"9-95. Commanders clearly define responsibilities for dealing with each enemy penetration. They take steps","rect":[90.01001739501953,493.0619201660156,522.0701434593201,483.9537353515625]},{"page":214,"text":"to block enemy MBA penetrations and destroy any penetrating enemy forces as soon as possible. This usually","rect":[90.01001739501953,504.5849304199219,521.9457912445068,495.47674560546877]},{"page":214,"text":"requires the employment of friendly reserves. Units may need to extend defensive actions within the depth","rect":[90.01001739501953,516.0478515625,522.0081691741943,506.9396667480469]},{"page":214,"text":"of their assigned areas to counter enemy penetrations not stopped farther forward.","rect":[90.01001739501953,527.57080078125,417.0988721847534,518.462646484375]},{"page":214,"text":"9-96. Units do not allow attacking enemy forces to consolidate on any newly won objectives, unless this fits","rect":[90.01001739501953,545.0958251953125,522.0144183616638,535.9776000976563]},{"page":214,"text":"in their operational concepts for the defense. Generally, units conduct local counterattacks with available","rect":[90.01001739501953,556.5587158203125,521.9903841094971,547.4505615234375]},{"page":214,"text":"local resources to prevent enemy forces from consolidating on those objectives. The smallest possible units","rect":[90.01001739501953,568.0817260742188,521.9702289085388,558.9635009765625]},{"page":214,"text":"conduct these local counterattacks. However, commanders remain aware of the need to avoid piecemeal","rect":[90.01001739501953,579.584716796875,521.9847788772584,570.49658203125]},{"page":214,"text":"commitment. Units do not abandon their positions unless this action aligns with their higher echelon","rect":[90.01001739501953,591.067626953125,521.9221096038818,581.95947265625]},{"page":214,"text":"commander’s intent or that higher echelon commander grants them permission to do so. Defending forces","rect":[90.01001739501953,602.5906372070313,521.9000995140076,593.4824829101563]},{"page":214,"text":"contain enemy penetrations if they are unable to repulse enemy forces until they can act in concert with major","rect":[90.01001739501953,614.1136474609375,522.0812890586853,604.9954223632813]},{"page":214,"text":"counterattacking forces. Units orchestrate their counterattacks with the effects of all their elements of combat","rect":[90.01001739501953,625.5765380859375,522.0596690139771,616.4683837890625]},{"page":214,"text":"power, such as their supporting fire support systems.","rect":[90.01001739501953,637.0995483398438,300.8359022140503,627.9913940429688]},{"page":214,"text":"9-97. Units employ all available resources necessary to ensure success when counterattacking. Their","rect":[90.01001739501953,654.6245727539063,522.0297753868103,645.5164184570313]},{"page":214,"text":"reserves’ counterattack usually becomes their main effort on their commitment. One of commanders’ most","rect":[90.01001739501953,666.0874633789063,522.0193858108521,656.9793090820313]},{"page":214,"text":"critical decisions is the commitment of their reserve. Therefore, commanders avoid premature or piecemeal","rect":[89.99002075195313,677.5904541015625,522.0588755569459,668.5023193359375]},{"page":214,"text":"commitment of reserves. Commanders may reinforce their reserves before commitment to give them greater","rect":[89.99002075195313,689.1334838867188,521.9071557579041,680.0253295898438]},{"page":214,"text":"capabilities to counter enemy action. Units do not counterattack as an automatic reaction to an enemy","rect":[89.99002075195313,700.5963745117188,521.9962673187256,691.4882202148438]},{"page":214,"text":"penetration. Nor do commanders commit reserves solely because enemy forces reach a certain phase line or","rect":[89.99002075195313,712.119384765625,522.0058496055603,703.01123046875]},{"page":214,"text":"9-20","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":214,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":214,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":215,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":215,"text":"other location. Units may employ fire support assets and local counterattacks by forces already defending to","rect":[108.0,83.51434326171875,539.9536037445068,74.40616607666016]},{"page":215,"text":"destroy, disrupt, or attrit enemy penetrations, thus avoiding the need to commit reserves. Units launch their","rect":[108.0,94.97723388671875,539.9088037071228,85.86905670166016]},{"page":215,"text":"counterattacks when enemy forces present their flanks, overextend, or the enemy forces’ momentum","rect":[108.0,106.500244140625,540.0574011764527,97.3920669555664]},{"page":215,"text":"dissipates. Units can target counterattacks to isolate and destroy selected enemy forces within the MBA once","rect":[108.0,118.023193359375,540.0698518829346,108.9150161743164]},{"page":215,"text":"they can identify the flanks of the enemy force’s main effort.","rect":[108.0,129.486083984375,351.5180616378784,120.3779067993164]},{"page":215,"text":"9-98. Sometimes commanders may determine that their reserves are unable to conduct successful","rect":[108.0000228881836,147.0111083984375,540.0814585647584,137.90292358398438]},{"page":215,"text":"counterattacks. Units use their available resources to block, contain, or delay enemy forces in this situation.","rect":[107.98998260498047,158.5340576171875,540.0891065597534,149.42587280273438]},{"page":215,"text":"This gains time for the employment of higher echelon reserves. Commanders and staffs adjust their existing","rect":[107.98998260498047,169.9969482421875,539.9552516937256,160.87875366210938]},{"page":215,"text":"defensive plans to integrate these high-echelon reserves into their defensive and counterattack schemes. Units","rect":[107.98998260498047,181.51995849609376,539.9943988304138,172.41177368164063]},{"page":215,"text":"adjust boundaries and designate additional BPs for occupation. They plan the routes units will use and any","rect":[107.98998260498047,193.04296875,539.8691310882568,183.92477416992188]},{"page":215,"text":"necessary adjustments to existing command and support relationships. They can speed the process of","rect":[107.9899673461914,204.505859375,540.0202539024353,195.38766479492188]},{"page":215,"text":"positioning and moving these reserves by designating routes, allocating mobility assets, and providing traffic","rect":[107.9899673461914,216.02880859375,540.0230379180908,206.92062377929688]},{"page":215,"text":"control personnel and guides at designated contact points to lead and brief them on the situation. Units employ","rect":[107.9899673461914,227.49169921875,539.9841823577881,218.38351440429688]},{"page":215,"text":"maneuver battalion scouts, military police, and cavalry units to provide traffic control during the movement","rect":[107.9899673461914,239.01470947265626,540.0130381546021,229.90652465820313]},{"page":215,"text":"of these reserves because they have the combat power to protect themselves from those small enemy forces","rect":[107.9899673461914,250.5377197265625,539.9831073265076,241.42953491210938]},{"page":215,"text":"that units may encounter in this situation.","rect":[107.9899673461914,262.0006103515625,273.34002208709719,252.89242553710938]},{"page":215,"text":"Follow Through","rect":[90.00406646728516,285.51751708984377,158.16111659240725,276.5796813964844]},{"page":215,"text":"9-99. Defensive actions aim to retain terrain and create conditions for a counteroffensive that regains the","rect":[107.99998474121094,303.032470703125,539.9439363555908,293.9242858886719]},{"page":215,"text":"initiative. The area defense does this by causing enemy forces to sustain unacceptable losses before reaching","rect":[108.0,314.4953918457031,539.9616603851318,305.3871154785156]},{"page":215,"text":"their objectives.","rect":[108.0,326.01837158203127,171.8865156173706,316.9001770019531]},{"page":215,"text":"9-100. Upon defeating the enemy attack, commanders have a decision to make. They can consolidate,","rect":[108.0,343.5333557128906,539.8889722824097,334.4251708984375]},{"page":215,"text":"reorganize, and begin the counterattack. They can consolidate and reorganize and prepare to defend again. If","rect":[107.98997497558594,354.9962158203125,539.9791162071228,345.8880310058594]},{"page":215,"text":"they are unable to defeat the enemy attack, they need to transition to a retrograde. Any decision to withdraw","rect":[107.98998260498047,366.51922607421877,539.9612469711303,357.4110412597656]},{"page":215,"text":"must account for the current situation in adjacent defensive areas. Only the higher echelon commander who","rect":[107.98998260498047,378.0422058105469,540.0121974945068,368.92401123046877]},{"page":215,"text":"ordered the defense can designate a new FEBA or authorize a retrograde operation. No matter what option is","rect":[107.98998260498047,389.50506591796877,539.9231708030701,380.3968811035156]},{"page":215,"text":"chosen, units must continue to conduct MEDEVAC and CASEVAC, battle damage assessment and repair,","rect":[107.98998260498047,401.028076171875,539.9822950363159,391.9198913574219]},{"page":215,"text":"detainee operations, and begin setting conditions for the branch or sequel to their defense.","rect":[108.0,412.55108642578127,467.14287853240969,403.4429016113281]},{"page":215,"text":"REVERSE SLOPE DEFENSE","rect":[90.0,435.8999938964844,219.56649160385133,427.59600830078127]},{"page":215,"text":"9-101. For a reverse slope defense, units organize their defense on the portion of a terrain feature or slope","rect":[108.0,455.7543029785156,539.9591951446533,446.6461181640625]},{"page":215,"text":"with a topographical crest that masks the main defensive positions from enemy observation and direct fire.","rect":[108.0000228881836,467.2773132324219,540.0020093917847,458.16912841796877]},{"page":215,"text":"All or part of the defending force may employ this technique. It is generally useful at lower tactical echelons,","rect":[108.0000228881836,478.74017333984377,540.0591382980347,469.6319885253906]},{"page":215,"text":"such as battalion and below.","rect":[108.0000228881836,488.2391357421875,221.08776378631593,481.1549987792969]},{"page":215,"text":"9-102. Units base a successful reverse slope defense on denying enemy forces the topographical crest.","rect":[108.0000228881836,507.78814697265627,539.9481153488159,498.6799621582031]},{"page":215,"text":"Although a defender may not occupy a crest in strength, controlling the crest by fire is essential for success.","rect":[107.98999786376953,519.2510375976563,540.0301465988159,510.1428527832031]},{"page":215,"text":"Controlling the crest reduces the effects of indirect fire (mortar, artillery, and close air support) and draws","rect":[107.98999786376953,530.7740478515625,539.9582660179138,521.6658935546875]},{"page":215,"text":"the battle into small-arms range. Units use a reverse slope defense to provide a defending force an opportunity","rect":[107.99000549316406,542.2970581054688,540.0293483734131,533.1889038085938]},{"page":215,"text":"to gain surprise. Their goal is to make enemy forces commit forces against the forward slope of the defense,","rect":[107.99002075195313,553.7598876953125,539.9721632003784,544.6517333984375]},{"page":215,"text":"causing enemy forces to attack in an uncoordinated fashion across the exposed topographical crest. Firing","rect":[107.99002075195313,565.282958984375,539.8505764007568,556.1748046875]},{"page":215,"text":"from covered and concealed positions throughout the battle area, the defending force maintains a distinct","rect":[107.99002075195313,576.805908203125,539.9862437210084,567.69775390625]},{"page":215,"text":"advantage over the exposed enemy forces and canalizes them through unfamiliar terrain into engagement","rect":[107.99002075195313,588.268798828125,540.0336680374146,579.16064453125]},{"page":215,"text":"areas Figure 9-12 on page 9-22 shows the terminology associated with the reverse slope defense.","rect":[107.99002075195313,599.7918090820313,495.45339488983157,590.6836547851563]},{"page":215,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":215,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":215,"text":"9-21","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":216,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":216,"text":"Figure 9-12. Slope terminology","rect":[223.9199981689453,287.8141784667969,370.07072352600098,278.4254455566406]},{"page":216,"text":"9-103.","rect":[90.00267028808594,309.2469482421875,115.84424877166748,302.3431701660156]},{"page":216,"text":"","rect":[115.19999694824219,322.04547119140627,121.16105696249008,317.35321044921877]},{"page":216,"text":"","rect":[115.19999694824219,347.0654602050781,121.16105696249008,342.3731994628906]},{"page":216,"text":"","rect":[115.19999694824219,360.5654602050781,121.16105696249008,355.8731994628906]},{"page":216,"text":"","rect":[115.19999694824219,374.0654602050781,121.16105696249008,369.3731994628906]},{"page":216,"text":"","rect":[115.19999694824219,387.5654602050781,121.16105696249008,382.8731994628906]},{"page":216,"text":"","rect":[115.19999694824219,401.0654602050781,121.16105696249008,396.3731994628906]},{"page":216,"text":"","rect":[115.19999694824219,414.5654602050781,121.16105696249008,409.8731994628906]},{"page":216,"text":"Units choose to conduct a reverse slope defense when—","rect":[124.5516357421875,311.2509460449219,350.0918388366699,302.1628112792969]},{"page":216,"text":"The crest and forward slope are untenable because the enemy force enjoys a quantitative or","rect":[133.1999969482422,324.7743225097656,522.0150659141541,315.6561279296875]},{"page":216,"text":"qualitative advantage in firepower at that point.","rect":[133.1999969482422,336.2973327636719,322.8424940109253,327.18914794921877]},{"page":216,"text":"Enemy forces cannot depress enough to engage friendly forces.","rect":[133.1999969482422,349.7943115234375,386.79925060272219,340.6861267089844]},{"page":216,"text":"The crest and forward slope offer little or no cover and concealment.","rect":[133.1999969482422,363.2742614746094,408.10686779022219,354.1861267089844]},{"page":216,"text":"The forward slope has been lost to enemy action or not seized.","rect":[133.1999969482422,376.7943115234375,383.1469678878784,367.6861267089844]},{"page":216,"text":"Mutual support by flank units can adequately cover the forward slope.","rect":[133.1999969482422,390.2943115234375,413.9764356613159,381.1861267089844]},{"page":216,"text":"Variance in the friendly force’s tactical pattern is advisable to deceive or surprise enemy forces.","rect":[133.1999969482422,403.7943115234375,516.6794996261597,394.6861267089844]},{"page":216,"text":"Forced to assume a hasty defense while in contact with or close to enemy forces.","rect":[133.1999969482422,417.2943115234375,456.1497755050659,408.1861267089844]},{"page":216,"text":"9-104. A reverse slope defense may deceive enemy forces regarding the true location and organization of","rect":[90.00376892089844,434.7591857910156,522.0061547813416,425.6510009765625]},{"page":216,"text":"its main defensive positions. This defense protects the main defensive positions from preparation fires and","rect":[89.9937744140625,446.2621154785156,521.9918117523193,437.1739807128906]},{"page":216,"text":"causes enemy forces to deploy into assault formations prematurely. The forward crest of the main defensive","rect":[89.9937744140625,457.80517578125,522.0080232696533,448.6969909667969]},{"page":216,"text":"positions limits the enemy force’s observation. It reduces the effectiveness of enemy indirect fires and close","rect":[89.9937973022461,469.26806640625,521.9338655548096,460.1598815917969]},{"page":216,"text":"air support rendering the enemy force’s direct fire weapons ineffective. The defending force may surprise","rect":[89.98370361328125,480.7910461425781,522.0332307891846,471.682861328125]},{"page":216,"text":"enemy forces as they crest the high ground, engaging them with massed fires. Units on the reverse slope have","rect":[89.97367858886719,492.3140563964844,522.1243562774658,483.20587158203127]},{"page":216,"text":"more freedom of movement until the crest is lost. The reverse slope defense also removes any direct fire","rect":[89.97367858886719,503.77691650390627,522.0221223907471,494.6687316894531]},{"page":216,"text":"stand-off advantage the enemy may have.","rect":[89.96360778808594,515.2999267578125,256.62729930877688,506.1917419433594]},{"page":216,"text":"9-105.","rect":[89.96360778808594,530.8008422851563,115.80519390106201,523.8970947265625]},{"page":216,"text":"","rect":[115.19999694824219,543.5654296875,121.16105696249008,538.8732299804688]},{"page":216,"text":"","rect":[115.19999694824219,557.0654296875,121.16105696249008,552.3732299804688]},{"page":216,"text":"","rect":[115.19999694824219,582.025390625,121.16105696249008,577.3331909179688]},{"page":216,"text":"","rect":[115.19999694824219,595.525390625,121.16105696249008,590.8331909179688]},{"page":216,"text":"","rect":[115.19999694824219,609.025390625,121.16105696249008,604.3331909179688]},{"page":216,"text":"However, using a reverse slope defense has several disadvantages:","rect":[124.5125732421875,532.8248901367188,390.8773875198364,523.7167358398438]},{"page":216,"text":"The effective range of direct fire weapons may be limited.","rect":[133.1999969482422,546.2943115234375,365.9145460128784,537.1861572265625]},{"page":216,"text":"Once security elements withdraw, enemy forces can advance largely unimpeded until attacking","rect":[133.1999969482422,559.7943115234375,522.0039577484131,550.6861572265625]},{"page":216,"text":"elements crest the high ground in front of the main defensive positions.","rect":[133.1999969482422,571.2572021484375,418.18694591522219,562.1490478515625]},{"page":216,"text":"The enemy force has the advantage of attacking downhill.","rect":[133.1999969482422,584.7542724609375,365.0228223800659,575.6461181640625]},{"page":216,"text":"Maintaining observation of the enemy force is difficult.","rect":[133.1999969482422,598.2542724609375,355.36428356170657,589.1461181640625]},{"page":216,"text":"In some cases, units can cover obstacles only from positions on the forward slope.","rect":[133.1999969482422,611.7542724609375,461.8010206222534,602.6461181640625]},{"page":216,"text":"Organizations of Forces","rect":[72.0,636.3807373046875,184.40116366958618,626.5755615234375]},{"page":216,"text":"9-106. Commanders task-organize their forces to give each unit enough combat power to accomplish its","rect":[90.0,653.934326171875,522.0194232444763,644.826171875]},{"page":216,"text":"mission once their schemes of maneuver are determined. A unit conducting a reverse slope defense normally","rect":[89.98998260498047,665.397216796875,521.9776515960693,656.2890014648438]},{"page":216,"text":"task-organize their forces into a security force, a main body, and a reserve.","rect":[89.98999786376953,676.920166015625,388.51897716522219,667.81201171875]},{"page":216,"text":"9-107. Units position the security force where they can observe the forward slope, the terrain forward of it,","rect":[89.98998260498047,694.4451904296875,522.0122632980347,685.3370361328125]},{"page":216,"text":"and other approaches to the defending position. Security elements destroy enemy reconnaissance assets,","rect":[89.97994995117188,705.9080200195313,521.8828077316284,696.7998657226563]},{"page":216,"text":"delay enemy forces, disorganize the enemy force’s attack, and deceive enemy forces regarding the exact","rect":[89.97994995117188,717.4310302734375,521.9261851272584,708.3228759765625]},{"page":216,"text":"9-22","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":216,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":216,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":217,"text":"Area Defense","rect":[482.4599914550781,44.55902099609375,539.95468359375,37.90802001953125]},{"page":217,"text":"location of the main defense. They position information collection assets and observation posts near or","rect":[108.0,83.51434326171875,540.0343530235291,74.40616607666016]},{"page":217,"text":"forward of the topographical crest to provide long-range observation of both the enemy force’s flanks and","rect":[108.0,94.97723388671875,539.9562282562256,85.86905670166016]},{"page":217,"text":"front. An observation post may vary in size from a two-man team to a rifle squad or to a multiple combat","rect":[107.98998260498047,106.500244140625,540.0443491897584,97.3920669555664]},{"page":217,"text":"vehicle section in each position. Units employ sufficient forces to provide observation and a usually a screen","rect":[107.98998260498047,118.023193359375,540.0193386077881,108.9150161743164]},{"page":217,"text":"for the MBA. During periods of reduced visibility, units should increase the numbers and sizes of these","rect":[107.98998260498047,129.486083984375,540.0123567657471,120.3779067993164]},{"page":217,"text":"detachments to provide security against infiltration or unexpected attack. Aggressive night combat patrols","rect":[107.98998260498047,141.00909423828126,539.8917987327576,131.90090942382813]},{"page":217,"text":"and ambushes are an essential part of the security process.","rect":[107.98998260498047,152.5321044921875,340.7055311203003,143.42391967773438]},{"page":217,"text":"9-108. To achieve surprise and limit an enemy force’s ability to maneuver, units organize the main body","rect":[107.98998260498047,169.9969482421875,539.9979152679443,160.88870239257813]},{"page":217,"text":"into defensive positions to mass fires on attacking enemy forces as they cross the topographic crest. In a","rect":[107.9800033569336,181.51995849609376,540.0016756134033,172.41165161132813]},{"page":217,"text":"reverse slope defense, the key position denies enemy penetration and supports forward elements by fire. The","rect":[107.9799575805664,193.04296875,540.1136140899658,183.93478393554688]},{"page":217,"text":"defending force maintains observation and fires over the entire forward slope as long as possible to destroy","rect":[107.9799575805664,204.505859375,539.8980007171631,195.39767456054688]},{"page":217,"text":"enemy forces, thus preventing enemy forces from massing for a final assault. From defensive positions on","rect":[107.9800033569336,216.02886962890626,539.9738674163818,206.92068481445313]},{"page":217,"text":"the reverse slope, the close-in battle builds in intensity. The defending force does not fire its direct fire","rect":[107.9799575805664,227.49169921875,539.9138460235596,218.38351440429688]},{"page":217,"text":"weapons, which are located throughout the MBA (on adjacent slope positions, counterslope positions, or","rect":[107.97996520996094,239.01470947265626,539.9198510704041,229.89651489257813]},{"page":217,"text":"reverse slope positions) until suitable targets appear. At the same time, the defending force shifts the effects","rect":[107.97996520996094,250.5377197265625,539.9110858421326,241.42953491210938]},{"page":217,"text":"of its indirect fires to those areas forward of the crest and forward military slope.","rect":[107.97997283935547,262.0006103515625,431.0043592453003,252.89242553710938]},{"page":217,"text":"9-109. When possible, other units on complementary terrain support units in reverse slope positions. This","rect":[107.97997283935547,279.52557373046877,539.9780414085388,270.4173889160156]},{"page":217,"text":"is especially desirable when those supporting units can observe and place fires on the crest and forward slope.","rect":[107.9699478149414,291.048583984375,539.9722852706909,281.9403991699219]},{"page":217,"text":"In a defense on a counterslope (reverse forward slope), fires must cover the area immediately in front of the","rect":[107.9699478149414,302.511474609375,540.0381136016846,293.4032897949219]},{"page":217,"text":"reverse slope positions to the topographical crest. Units organize defensive positions to permit fires on enemy","rect":[107.9699478149414,314.0344543457031,540.0134181976318,304.92626953125]},{"page":217,"text":"approaches around and over the crest and on the forward slopes of adjacent terrain features, if applicable.","rect":[107.96995544433594,325.55743408203127,539.9606275558472,316.4392395019531]},{"page":217,"text":"The key factors that affect the organization of these areas are mutually supporting covered and concealed","rect":[107.96995544433594,337.02032470703127,539.9251613616943,327.9121398925781]},{"page":217,"text":"positions, numerous existing and reinforcing obstacles, the ability to bring devastating fires from all available","rect":[107.96995544433594,348.5433349609375,540.0053377227783,339.4351501464844]},{"page":217,"text":"weapons onto the crest, and a counterattack force. Depending on the terrain, the most desirable location for","rect":[107.96995544433594,360.0663146972656,539.8865258750916,350.9581298828125]},{"page":217,"text":"the reserve may be on the counterslope or the reverse military crest of the counterslope.","rect":[107.96995544433594,371.5292053222656,458.17071056365969,362.4210205078125]},{"page":217,"text":"Control Measures","rect":[90.0,393.87371826171877,174.56247958755493,386.2865295410156]},{"page":217,"text":"9-110. Defensive control measures introduced in previous chapters continue to apply. Units place","rect":[108.0,413.6343078613281,540.1464510040283,404.526123046875]},{"page":217,"text":"engagement areas and obstacles on the reverse slope. The topographical crest normally marks the far edge of","rect":[108.0,425.0971984863281,539.9943749961853,415.989013671875]},{"page":217,"text":"the engagement area. Defending forces must dominate the crest with fires to prevent enemy forces from","rect":[108.01001739501953,436.62017822265627,540.0584387741089,427.5119934082031]},{"page":217,"text":"successfully engaging the main body.","rect":[108.00999450683594,448.1431884765625,258.2949628829956,439.0350036621094]},{"page":217,"text":"Executing a Reverse Slope Defense","rect":[90.0,472.70068359375,253.10235368347169,462.89556884765627]},{"page":217,"text":"9-111.","rect":[108.0,488.2302551269531,133.84157848358155,481.32647705078127]},{"page":217,"text":"","rect":[133.1999969482422,501.02545166015627,139.16105696249009,496.33319091796877]},{"page":217,"text":"","rect":[133.1999969482422,526.04541015625,139.16105696249009,521.3532104492188]},{"page":217,"text":"","rect":[133.1999969482422,539.54541015625,139.16105696249009,534.8532104492188]},{"page":217,"text":"When executing a reverse slope defense, units place special emphasis on—","rect":[142.55897521972657,490.2543029785156,443.2792167663574,481.1461181640625]},{"page":217,"text":"The proper organization of the forward slope to provide observation across the entire front and","rect":[151.1999969482422,503.7543029785156,539.9939479827881,494.6461181640625]},{"page":217,"text":"security to the main BPs.","rect":[151.1999969482422,515.27734375,251.5102186203003,506.1691589355469]},{"page":217,"text":"A fire support plan to prevent the enemy force’s occupation and use of the topographical crest.","rect":[151.1999969482422,528.7742919921875,530.0140943527222,519.6661376953125]},{"page":217,"text":"A counterattack plan that specifies measures necessary to clear the crest or regain it from enemy","rect":[151.1999969482422,542.2742919921875,539.9700832366943,533.1661376953125]},{"page":217,"text":"control.","rect":[151.1999969482422,551.713134765625,182.08465099334718,544.6290283203125]},{"page":217,"text":" Fire support to destroy, disrupt, and attrit enemy forces on the forward slope.","rect":[133.1999969482422,567.2343139648438,459.28313732147219,558.1261596679688]},{"page":217,"text":"9-112. Units normally place FPFs along the topographical crest and employ them as enemy forces reach","rect":[108.00376892089844,584.75927734375,539.9539699554443,575.651123046875]},{"page":217,"text":"the first row of defiladed obstacles. Units use the reserve to counterattack and expel the enemy from the","rect":[107.9937515258789,596.2822875976563,539.8902254180908,587.1741333007813]},{"page":217,"text":"topographical crest if massed indirect fires do not defeat the attack.","rect":[107.9937515258789,607.7451782226563,376.47744274139407,598.6370239257813]},{"page":217,"text":"9-113. A reverse slope defense pursues offensive opportunities through surprise and deceptive actions. It is","rect":[107.9937515258789,625.2701416015625,540.0553119163513,616.1619873046875]},{"page":217,"text":"uniquely suited to infantry forces in mountainous terrain. When conducting a reverse slope defense, surprise","rect":[107.98373413085938,636.7931518554688,540.0538606719971,627.6849975585938]},{"page":217,"text":"results from defending in a manner for which the enemy forces are not prepared. Once this defense","rect":[107.98373413085938,648.2559814453125,540.1090364532471,639.1478271484375]},{"page":217,"text":"successfully halts an enemy attack, it may have limited further value because the effect of surprise is difficult","rect":[107.98373413085938,659.779052734375,539.9563364944459,650.6708984375]},{"page":217,"text":"to attain.","rect":[107.98373413085938,669.2779541015625,143.00864696502686,662.19384765625]},{"page":217,"text":"9-114. The entire forward security force should not withdraw automatically as soon as the first enemy units","rect":[107.98373413085938,688.766845703125,539.9787738304138,679.65869140625]},{"page":217,"text":"reach the FEBA. Units can leave in place security elements located in areas where enemy forces have not","rect":[107.97370910644531,700.2898559570313,540.0235362014771,691.1817016601563]},{"page":217,"text":"advanced. These security forces adjust to the enemy force’s advance and continue to conduct security","rect":[107.97370910644531,711.8128662109375,539.9357204437256,702.6946411132813]},{"page":217,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":217,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":217,"text":"9-23","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":218,"text":"Chapter 9","rect":[72.0,46.224021911621097,113.47830419921876,37.90802001953125]},{"page":218,"text":"operations as far forward as possible. They continue to resist enemy supporting efforts, such as the enemy’s","rect":[90.0,83.51434326171875,521.9321429710388,74.40616607666016]},{"page":218,"text":"reconnaissance effort, thereby upsetting the enemy’s coordination and allowing MBA units to fight one","rect":[89.98998260498047,94.97723388671875,521.9782991485596,85.86905670166016]},{"page":218,"text":"engagement or battle at a time. Doing this increases the chances for success even if the enemy attack","rect":[89.9899673461914,106.500244140625,521.9195461273193,97.3920669555664]},{"page":218,"text":"penetrates the MBA in one or more areas. In some cases, security forces can attack enemy elements from the","rect":[89.9899673461914,118.023193359375,521.9361848907471,108.9150161743164]},{"page":218,"text":"rear, engage high-payoff targets, or operate between echelons to isolate leading enemy units.","rect":[89.98998260498047,129.486083984375,460.6569471359253,120.3779067993164]},{"page":218,"text":"9-115. Commanders may order security force information collection assets to displace to one or both sides","rect":[89.98994445800781,147.0111083984375,522.0393817405701,137.90292358398438]},{"page":218,"text":"of an enemy penetration and continue to maintain observation of enemy forces approaching the MBA. These","rect":[89.97992706298828,158.5340576171875,521.9940462188721,149.42587280273438]},{"page":218,"text":"information collection assets can facilitate friendly counterattacks by observing and providing access to the","rect":[89.97992706298828,169.9969482421875,521.9776887969971,160.88876342773438]},{"page":218,"text":"enemy force’s flanks. Alternatively, units may plan to monitor those areas where enemy forces have not","rect":[89.97992706298828,181.51995849609376,522.0624155960084,172.41177368164063]},{"page":218,"text":"advanced into the MBA solely by technical means to prevent the isolation and possible encirclement of these","rect":[89.97989654541016,193.04296875,522.0029573516846,183.93478393554688]},{"page":218,"text":"assets.","rect":[89.97989654541016,202.48182678222657,115.8174695968628,196.39968872070313]},{"page":218,"text":"9-116. Units coordinate battle handover between their security forces and MBA forces as quickly and","rect":[89.97989654541016,222.02081298828126,521.9771022796631,212.91262817382813]},{"page":218,"text":"efficiently as possible to minimize vulnerability to enemy fire. Security forces need to retain freedom of","rect":[89.9698715209961,233.483642578125,521.9191186485291,224.37545776367188]},{"page":218,"text":"maneuver until the start of their passage of lines. Fire support assets help cover the withdrawal of these","rect":[89.96987915039063,245.0067138671875,521.8859529571533,235.89852905273438]},{"page":218,"text":"security forces. Support and sustainment elements of the security force leave the security area as early as","rect":[89.96987915039063,256.5296630859375,522.0092303733826,247.42147827148438]},{"page":218,"text":"possible to avoid hampering the movement of maneuver forces. Normally, the security force hands off the","rect":[89.96987915039063,267.9925537109375,521.9908723907471,258.8843688964844]},{"page":218,"text":"battle to the nearest MBA force.","rect":[89.96987915039063,277.49151611328127,218.83812999725343,270.4073791503906]},{"page":218,"text":"9-117. Units consider their security force’s next mission before initiating battle handover between their","rect":[89.96987915039063,297.030517578125,521.9783227500916,287.9223327636719]},{"page":218,"text":"security and MBA force. Factors that may affect this decision are the status of their security forces, their","rect":[89.9498291015625,308.49334716796877,521.8685205039978,299.3851623535156]},{"page":218,"text":"subsequent mission preparation requirements, and the size and nature of the reserve required by the situation.","rect":[89.9498291015625,320.016357421875,521.9979810714722,310.9081726074219]},{"page":218,"text":"Commanders may decide to employ their security forces immediately as their reserve, which would release","rect":[89.9498291015625,331.53936767578127,522.0083284454346,322.4311828613281]},{"page":218,"text":"their initial reserves for other tasks. Alternately, they may decide to use their security forces to conduct","rect":[89.9498291015625,343.0022277832031,521.9451670608521,333.89404296875]},{"page":218,"text":"additional security operations on the flanks of MBA forces as a battle progresses. However, it may be some","rect":[89.9498291015625,354.5252380371094,522.0192537384033,345.41705322265627]},{"page":218,"text":"time before a given security force is ready for commitment. Therefore, units more often wait until their","rect":[89.9498291015625,366.0482177734375,521.9662988243103,356.9400329589844]},{"page":218,"text":"security forces reconstitute and they commit their initial reserves before designating their former security","rect":[89.9498291015625,377.5111083984375,521.9490871429443,368.4029235839844]},{"page":218,"text":"forces as their new reserves.","rect":[89.9498291015625,387.0100402832031,202.96741771697999,379.9259033203125]},{"page":218,"text":"9-118. Units plan the location of their security forces assembly areas on the follow-on missions they assign","rect":[89.9498291015625,406.5490417480469,522.0071926116943,397.44085693359377]},{"page":218,"text":"to those security forces. They locate those assembly areas to rapidly support their ongoing operations yet","rect":[89.9297866821289,418.0119323730469,521.9119029006959,408.90374755859377]},{"page":218,"text":"keep withdrawn security units from interfering with ongoing decisive and shaping operations. After passage,","rect":[89.9297866821289,429.5349426269531,521.9833326339722,420.4267578125]},{"page":218,"text":"their security forces normally move to these locations to prepare for subsequent operations. At a minimum,","rect":[89.9297866821289,441.0579528808594,521.9758253097534,431.94976806640627]},{"page":218,"text":"units rearm and refuel their security forces as soon as possible after their relief from the security mission.","rect":[89.9297866821289,452.5208435058594,521.9172315597534,443.41265869140627]},{"page":218,"text":"Additional sustainment concerns include casualty evacuation, maintenance requirements, and resupply of","rect":[89.9297866821289,464.04388427734377,521.9398706016541,454.9356994628906]},{"page":218,"text":"other classes of supply.","rect":[89.9297866821289,475.50677490234377,183.27309703826905,466.3985900878906]},{"page":218,"text":"9-24","rect":[72.1199951171875,754.18798828125,90.07499151611329,747.6090087890625]},{"page":218,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":218,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":219,"text":"Chapter 10","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":219,"text":"Mobile Defense","rect":[256.3199768066406,150.95619201660157,373.6456456451416,139.11740112304688]},{"page":219,"text":"This chapter first discusses mobile defense and its general considerations. It then","rect":[126.0,188.7806854248047,504.0854892730713,178.79986572265626]},{"page":219,"text":"discusses organization of forces and control measures. Lastly, this chapter discusses","rect":[126.0,201.4405975341797,503.95579013442997,191.45977783203126]},{"page":219,"text":"how to plan, prepare, and execute a mobile defense.","rect":[126.0,214.07861328125,354.1215867996216,204.1197509765625]},{"page":219,"text":"GENERAL CONSIDERATIONS FOR A MOBILE DEFENSE","rect":[90.0,239.42967224121095,466.0940993919373,229.7415313720703]},{"page":219,"text":"10-1. A mobile defense focuses on defeating or destroying enemy forces by allowing them to advance to a","rect":[108.0,259.7342529296875,540.0162019805908,250.62606811523438]},{"page":219,"text":"point where the striking force can conduct a decisive counterattack. The area defense, on the other hand,","rect":[108.0,271.25726318359377,540.0344190597534,262.1490783691406]},{"page":219,"text":"focuses on retaining terrain by absorbing an attacking force into an interlocked series of positions where units","rect":[108.0000228881836,282.7201232910156,540.0330951194763,273.6119384765625]},{"page":219,"text":"destroy the attacking force largely by fires.","rect":[108.0000228881836,294.2431335449219,279.9411573410034,285.13494873046877]},{"page":219,"text":"10-2. Units smaller than a division do not normally conduct a mobile defense because of their limited","rect":[108.01004028320313,311.76812744140627,539.9734401702881,302.6599426269531]},{"page":219,"text":"capabilities to conduct multiple engagements throughout the width and depth of an assigned area while","rect":[108.01000213623047,323.2309875488281,540.0093660430908,314.122802734375]},{"page":219,"text":"simultaneously resourcing forces for striking, fixing, and reserve. Typically, the striking force in a mobile","rect":[108.01005554199219,334.7539978027344,539.9728670196533,325.64581298828127]},{"page":219,"text":"defense may consist of one-half to two-thirds of the defender’s combat power. BCTs and smaller units","rect":[108.01005554199219,346.2770080566406,540.0524432640076,337.1688232421875]},{"page":219,"text":"generally conduct an area defense or a delay as part of the fixing force as units shape the enemy force’s","rect":[108.00003814697266,357.7398681640625,540.0022723655701,348.6316833496094]},{"page":219,"text":"penetration, or they attack as part of the striking force. Alternatively, they can constitute a portion of the","rect":[108.0,369.26287841796877,540.0300569610596,360.1546936035156]},{"page":219,"text":"reserve.","rect":[108.0,378.7618408203125,139.4217176437378,374.0123596191406]},{"page":219,"text":"10-3. The mission variables may dictate that a unit conducts a mobile defense when defending against an","rect":[108.0,398.250732421875,539.9921169281006,389.1425476074219]},{"page":219,"text":"enemy force with greater combat power but less mobility. The following circumstances favor when to","rect":[108.0,409.77374267578127,540.0192775726318,400.6655578613281]},{"page":219,"text":"conduct a mobile defense:","rect":[108.0,419.2125549316406,212.7190318069458,412.12841796875]},{"page":219,"text":"","rect":[133.1999969482422,431.9654541015625,139.16105696249009,427.273193359375]},{"page":219,"text":"","rect":[133.1999969482422,445.4654541015625,139.16105696249009,440.773193359375]},{"page":219,"text":"","rect":[133.1999969482422,470.4854431152344,139.16105696249009,465.7931823730469]},{"page":219,"text":"","rect":[133.1999969482422,495.5054626464844,139.16105696249009,490.8132019042969]},{"page":219,"text":"","rect":[133.1999969482422,509.0054626464844,139.16105696249009,504.3132019042969]},{"page":219,"text":"","rect":[133.1999969482422,533.9654541015625,139.16105696249009,529.2732543945313]},{"page":219,"text":"","rect":[133.1999969482422,547.4654541015625,139.16105696249009,542.7732543945313]},{"page":219,"text":"The defending force possesses equal or greater mobility than the enemy force.","rect":[151.1999969482422,434.6943054199219,463.90920543670657,425.58612060546877]},{"page":219,"text":"The frontage assigned exceeds the defending force’s capability to establish an effective area or","rect":[151.1999969482422,448.1943054199219,540.0742089805603,439.08612060546877]},{"page":219,"text":"positional defense.","rect":[151.1999969482422,459.697265625,226.24376964569093,450.609130859375]},{"page":219,"text":"The depth of the assigned area encourages attacking enemy forces to overextend and move into","rect":[151.1999969482422,473.21429443359377,539.9898586273193,464.1061096191406]},{"page":219,"text":"unfavorable positions where they are vulnerable to a counterattack.","rect":[151.1999969482422,484.7373046875,419.68804454803469,475.6291198730469]},{"page":219,"text":"Time for preparing defensive positions is limited.","rect":[151.1999969482422,498.23431396484377,349.1841688156128,489.1261291503906]},{"page":219,"text":"Sufficient armored, Stryker, aviation, Army, and joint fires are available to allow rapid","rect":[151.1999969482422,511.73431396484377,540.0461330413818,502.6161193847656]},{"page":219,"text":"concentration of combat power.","rect":[151.19998168945313,523.1771850585938,278.44399547576907,514.0890502929688]},{"page":219,"text":"The assigned area lacks well-defined avenues of approach and consists largely of flat, open terrain.","rect":[151.1999969482422,536.6943359375,540.0763502120972,527.586181640625]},{"page":219,"text":"The mission does not require denying the enemy specific terrain.","rect":[151.1999969482422,550.1943359375,410.5667676925659,541.086181640625]},{"page":219,"text":"10-4. Units conducting a mobile defense anticipate enemy penetrations into defended areas and use obstacles","rect":[107.9937515258789,567.7192993164063,540.0675799827576,558.6111450195313]},{"page":219,"text":"and defensive positions to shape and control penetrations. They also use counterattacks either to draw enemy","rect":[107.9937515258789,579.2423095703125,540.0409450531006,570.1341552734375]},{"page":219,"text":"forces into entering planned penetration areas or to deceive the enemy commander as to the nature of the","rect":[107.9937515258789,590.7052001953125,540.0075960235596,581.5970458984375]},{"page":219,"text":"defense. Risks associated with the conduct of a mobile defense include—","rect":[107.9937515258789,600.2041015625,401.5597343444824,593.1199951171875]},{"page":219,"text":"","rect":[133.1999969482422,612.9854125976563,139.16105696249009,608.293212890625]},{"page":219,"text":"","rect":[133.1999969482422,638.0054321289063,139.16105696249009,633.313232421875]},{"page":219,"text":"","rect":[133.1999969482422,651.5054321289063,139.16105696249009,646.813232421875]},{"page":219,"text":"","rect":[133.1999969482422,665.0054321289063,139.16105696249009,660.313232421875]},{"page":219,"text":"The fixing force may be isolated and defeated in detail because of the need to resource the striking","rect":[151.1999969482422,615.7142944335938,540.0499782562256,606.6061401367188]},{"page":219,"text":"force to the detriment of the fixing force.","rect":[151.1999969482422,627.2373046875,315.03994274139407,618.129150390625]},{"page":219,"text":"Enemy operations may impair the ability of the striking force to react at critical points.","rect":[151.1999969482422,640.7343139648438,498.04336071014407,631.6261596679688]},{"page":219,"text":"The enemy force may not move into the area intended by the defending commander.","rect":[151.1999969482422,654.2343139648438,489.46221446990969,645.1261596679688]},{"page":219,"text":"The attacking enemy force may retain some momentum as it approaches desired engagement","rect":[151.1999969482422,667.7343139648438,540.0061411819459,658.6261596679688]},{"page":219,"text":"areas.","rect":[151.18994140625,677.1731567382813,174.27602672576905,672.4237060546875]},{"page":219,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":219,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":219,"text":"10-1","rect":[504.00299072265627,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":220,"text":"Chapter 10","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":220,"text":" The defending force may not gain a timely, accurate picture of the attacking enemy force’s","rect":[115.19999694824219,83.51434326171875,521.9359271507263,74.40616607666016]},{"page":220,"text":"locations and dispositions required by the striking force to execute the main effort.","rect":[133.1999969482422,94.97723388671875,463.41912364959719,85.8689956665039]},{"page":220,"text":" The decentralized operations required in a mobile defense may increase potential for friendly fire","rect":[115.19999694824219,108.47430419921875,522.0039339141846,99.36612701416016]},{"page":220,"text":"incidents.","rect":[133.1999969482422,117.97327423095703,171.82509899139405,110.8891372680664]},{"page":220,"text":"Command and control systems improve the ability of the friendly force to gain and maintain a COP, which","rect":[89.9937515258789,134.51629638671876,521.9619655609131,125.40811920166016]},{"page":220,"text":"reduces the risk associated with this type of defense. Figure 10-1 depicts a mobile defense.","rect":[89.9937515258789,145.97918701171876,452.67266368865969,136.87100219726563]},{"page":220,"text":"Figure 10-1. Mobile defense","rect":[231.40603637695313,426.2987060546875,362.61695765686036,416.90997314453127]},{"page":220,"text":"10-5. Just as in an area defense, commanders of a mobile defense consider how their operations impact the","rect":[89.97373962402344,449.7956237792969,522.0379915313721,440.7074890136719]},{"page":220,"text":"civilian population within the assigned area. The impact of the population is of more concern during a mobile","rect":[89.97373962402344,461.278564453125,522.0017366485596,452.1703796386719]},{"page":220,"text":"defense than it is during an area defense because the scope of maneuver and tempo of operations is much","rect":[89.97373962402344,472.80157470703127,521.9068508148193,463.6933898925781]},{"page":220,"text":"larger. Civilian attempts to avoid advancing enemy formations and locations where combat occurs will","rect":[89.97373962402344,484.26446533203127,521.9286875686646,475.15625]},{"page":220,"text":"impede the ground maneuver of defending units unless commanders account for their presence and provide","rect":[89.97370147705078,495.7873840332031,522.0401277618408,486.67919921875]},{"page":220,"text":"alternative routes for dislocated civilians. Units communicate these routes to the civilian population using","rect":[89.97368621826172,507.3104248046875,521.9160060882568,498.2022399902344]},{"page":220,"text":"various means to ensure they receive the information. Ideally, local nation civilian or military organizations","rect":[89.97368621826172,518.7733154296875,522.0310809593201,509.6651306152344]},{"page":220,"text":"provide civilian traffic regulations and immediate essential services along those civilian evacuation routes","rect":[89.97368621826172,530.2963256835938,522.0572650413513,521.1881713867188]},{"page":220,"text":"(along with the other five primary stability tasks). However, if the local nation cannot perform these tasks,","rect":[89.97368621826172,541.8193359375,521.9519605636597,532.711181640625]},{"page":220,"text":"the defending unit will have to perform them. Screening of civilians by units is necessary in this case to","rect":[89.97364807128906,553.2822265625,522.0400905609131,544.174072265625]},{"page":220,"text":"preclude enemy agents from using these routes to infiltrate friendly defensive positions. At all times,","rect":[89.97364807128906,564.8052368164063,521.9465284347534,555.6970825195313]},{"page":220,"text":"commanders must meet legal obligations to local civilian populations.","rect":[89.97364807128906,576.3282470703125,370.2177686691284,567.2200927734375]},{"page":220,"text":"ORGANIZATION OF FORCES FOR A MOBILE DEFENSE","rect":[72.0,601.5897216796875,443.7841018333435,591.9015502929688]},{"page":220,"text":"10-6. Units organize the main body into two principal groups: the fixing force and the striking force. In a","rect":[90.0,621.894287109375,522.0841341094971,612.7861328125]},{"page":220,"text":"mobile defense, reconnaissance and security, reserve, and sustaining forces accomplish the same tasks as in","rect":[90.0,633.357177734375,521.8925075531006,624.2490234375]},{"page":220,"text":"an area defense. Units adjust their task organization before committing subordinate units to combat. Figure","rect":[90.0,644.8801879882813,521.8957185821533,635.761962890625]},{"page":220,"text":"10-2 illustrates the organization of forces for a mobile defense.","rect":[90.0,656.4031982421875,341.5609998703003,647.2950439453125]},{"page":220,"text":"10-2","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":220,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":220,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":221,"text":"Mobile Defense","rect":[474.0,44.55902099609375,540.0114462890625,37.90802001953125]},{"page":221,"text":"Figure 10-2. Organization of forces for a mobile defense","rect":[182.39999389648438,424.3141784667969,447.5933370513916,414.9254455566406]},{"page":221,"text":"10-7. A fixing force is a force designated to supplement the striking force by preventing the enemy from","rect":[107.99144744873047,447.77099609375,540.0258460006714,438.6628112792969]},{"page":221,"text":"moving from a specific area for a specific time. The fixing force is used to hold attacking enemy forces in","rect":[107.98141479492188,459.29400634765627,539.9554958343506,450.1858215332031]},{"page":221,"text":"position, by canalizing attacking enemy forces into engagement areas, and to retain areas from which to","rect":[107.98141479492188,470.8170166015625,539.9255886077881,461.7088317871094]},{"page":221,"text":"launch the striking force. A fixing force is organized with the minimum combat power needed to accomplish","rect":[107.97139739990235,482.2798767089844,540.0139064788818,473.17169189453127]},{"page":221,"text":"its mission. The fixing force turns, blocks, and delays an attacking enemy force. It tries to shape an enemy","rect":[107.98139953613281,493.80291748046877,539.9037990570068,484.6947021484375]},{"page":221,"text":"penetration or contain an enemy force’s advance. Typically, it has most of the countermobility assets of the","rect":[107.98150634765625,505.32586669921877,539.9935579376221,496.2176818847656]},{"page":221,"text":"defending unit. The fixing force may conduct defensive actions over considerable depth within the MBA.","rect":[107.98143768310547,516.7887573242188,540.0338697433472,507.6805725097656]},{"page":221,"text":"However, it must be prepared to stop and hold terrain on short notice to assist the striking force on its","rect":[107.99148559570313,528.311767578125,539.9536883811951,519.20361328125]},{"page":221,"text":"commitment. The operations of the fixing force establish the conditions for a decisive attack by the striking","rect":[107.99148559570313,539.834716796875,540.0175685882568,530.7265625]},{"page":221,"text":"force at a favorable location. The fixing force sets the condition for the striking force. The fixing force","rect":[107.99148559570313,551.297607421875,539.9654817657471,542.189453125]},{"page":221,"text":"executes its portion of the defense by combining an area defense and a delaying action.","rect":[107.99148559570313,562.8206176757813,456.52434825897219,553.7124633789063]},{"page":221,"text":"10-8. The striking force is a dedicated counterattack force in a mobile defense constituted with the bulk of","rect":[108.00151062011719,580.2855224609375,539.9909570274353,571.1773681640625]},{"page":221,"text":"available combat power. The commander’s most critical decisions are when, where, and under what","rect":[107.99148559570313,591.7884521484375,539.9567637405396,582.7003173828125]},{"page":221,"text":"conditions they should commit the striking force. The striking force contains the maximum combat power","rect":[107.99150085449219,603.3314819335938,539.9775292930603,594.2233276367188]},{"page":221,"text":"available to commanders at the time of its counterattack. This is the main effort for the unit during the mobile","rect":[107.99150085449219,614.7943725585938,540.0639925079346,605.6862182617188]},{"page":221,"text":"defense. The striking force is a combined arms force that has greater combat power and mobility than the","rect":[107.99150085449219,626.3173828125,540.0264558868408,617.209228515625]},{"page":221,"text":"force it seeks to defeat or destroy. Units consider the effects of surprise when determining the relative combat","rect":[107.99150085449219,637.84033203125,540.0577158889771,628.732177734375]},{"page":221,"text":"power of their striking forces and their targeted enemy units. The striking force is normally task-organized","rect":[107.99150085449219,649.30322265625,539.9652004241943,640.195068359375]},{"page":221,"text":"with all support and sustainment assets before its commitment. Units should position mobility enhancing","rect":[107.99150085449219,660.8262939453125,539.9888210296631,651.7181396484375]},{"page":221,"text":"assets near the lead elements of their striking forces.","rect":[107.99147033691406,672.3492431640625,317.07375621795657,663.2410888671875]},{"page":221,"text":"10-9. A striking force is the key to a successful mobile defense. All its contingencies relate to its attack. If","rect":[107.99147033691406,689.8140869140625,540.0046289024353,680.7059326171875]},{"page":221,"text":"the opportunity does not exist to commit the striking force, the defending unit repositions forces to establish","rect":[107.99146270751953,701.337158203125,539.9607448577881,692.22900390625]},{"page":221,"text":"the conditions for success. The striking force must have mobility equal to or greater than that of its targeted","rect":[107.99146270751953,712.860107421875,539.9576930999756,703.751953125]},{"page":221,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":221,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":221,"text":"10-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":222,"text":"Chapter 10","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":222,"text":"enemy force. It can obtain this mobility through task organization, countermobility operations to slow and","rect":[90.0,83.51434326171875,521.9348049163818,74.40616607666016]},{"page":222,"text":"disrupt enemy movements, and mobility operations to facilitate the rapid shifting of friendly formations. The","rect":[90.0,94.97723388671875,521.9579744415283,85.86905670166016]},{"page":222,"text":"striking force requires access to multiple routes because an attacking enemy force normally denies the","rect":[90.0,106.500244140625,522.0397005157471,97.3920669555664]},{"page":222,"text":"defending force freedom of action.","rect":[90.0,118.023193359375,229.12372875213624,108.9150161743164]},{"page":222,"text":"10-10. Resourcing a reserve in a mobile defense is difficult and requires commanders to analyze risk. The","rect":[90.0,135.48809814453126,522.1253938751221,126.37992095947266]},{"page":222,"text":"unit must balance the size of the reserve with taking forces away from either the fixing or strike force.","rect":[90.0,147.0111083984375,521.9623975753784,137.90292358398438]},{"page":222,"text":"Commanders generally plan priorities for the reserve to prevent the fixing force from failing or to exploit the","rect":[90.0,158.5340576171875,522.0814485626221,149.42587280273438]},{"page":222,"text":"success of the striking force.","rect":[90.01001739501953,169.9969482421875,204.1708631515503,160.88876342773438]},{"page":222,"text":"CONTROL MEASURES FOR A MOBILE DEFENSE","rect":[72.0,195.2696990966797,399.8631728782654,185.5955352783203]},{"page":222,"text":"10-11. Since the mobile defense is the combination of a unit conducting an area defense and a separate unit","rect":[90.0,215.57427978515626,522.0247569046021,206.46609497070313]},{"page":222,"text":"conducting a counterattack, it takes control measures from both. These control measures include designating","rect":[90.0,227.0972900390625,522.0323390960693,217.98910522460938]},{"page":222,"text":"assigned areas of the fixing and striking forces with their associated boundaries, BPs, and phase lines. Units","rect":[90.0,238.5601806640625,522.0563495140076,229.45199584960938]},{"page":222,"text":"designate a LD or a line of contact as part of the graphic control measures for the striking force. They may","rect":[90.0,250.0831298828125,521.9433498382568,240.97494506835938]},{"page":222,"text":"designate an axis of advance for the striking force. Units can designate attack by fire or support by fire","rect":[90.00000762939453,261.60614013671877,521.9842195587158,252.49795532226563]},{"page":222,"text":"positions. They use engagement areas, TRPs, TAIs, and FPFs as necessary. They designate NAIs to focus","rect":[90.0,273.06903076171877,521.9962909202576,263.9608459472656]},{"page":222,"text":"the efforts of reconnaissance and surveillance assets. This allows units to determine an enemy force’s course","rect":[90.01005554199219,284.592041015625,522.0782747344971,275.4838562011719]},{"page":222,"text":"of action. Units also designate checkpoints, contact points, passage points, passage routes, and passage lanes","rect":[90.01000213623047,296.11505126953127,522.0756366233826,287.0068664550781]},{"page":222,"text":"for use by reconnaissance and surveillance assets, security units, and the striking force. Figure 10-3 depicts","rect":[90.01001739501953,307.57794189453127,522.0033099632263,298.4697570800781]},{"page":222,"text":"example control measures for a mobile defense.","rect":[90.01001739501953,319.08087158203127,281.39409923553469,309.99273681640627]},{"page":222,"text":"Figure 10-3. Example of mobile defense control measures","rect":[160.02978515625,647.416259765625,434.0467061920166,638.0275268554688]},{"page":222,"text":"10-12. Commanders provide the striking force commander with control measures to focus the striking force","rect":[90.01005554199219,670.873046875,522.1113557891846,661.764892578125]},{"page":222,"text":"at the decisive time and place and to deconflict fires with the fixing force. At a minimum, the striking force","rect":[90.01004791259766,682.3961181640625,522.0754671173096,673.2879638671875]},{"page":222,"text":"commander needs to know decision points that lead to the commitment of the striking force, the limit of","rect":[90.01005554199219,693.9190673828125,521.8862206993103,684.8109130859375]},{"page":222,"text":"advance, and boundaries of the striking force’s assigned area. If the overall commander imposes either an","rect":[90.01005554199219,705.3819580078125,521.9727687835693,696.2738037109375]},{"page":222,"text":"axis of attack or a direction of attack as a control measure, that higher echelon commander restricts the","rect":[90.01005554199219,716.905029296875,521.9859285430908,707.796875]},{"page":222,"text":"10-4","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":222,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":222,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":223,"text":"Mobile Defense","rect":[474.0,44.55902099609375,540.0114462890625,37.90802001953125]},{"page":223,"text":"striking force commander’s freedom of maneuver. However, such restrictions may be necessary to avoid","rect":[108.0,83.51434326171875,539.9459133148193,74.40616607666016]},{"page":223,"text":"contact with enemy forces that could distract the striking force from accomplishing its primary mission. Units","rect":[108.0,94.97723388671875,540.0043475608826,85.86905670166016]},{"page":223,"text":"may have to determine and transmit these control measures rapidly for subordinates to take advantage of an","rect":[108.0,106.500244140625,540.0261135101318,97.3920669555664]},{"page":223,"text":"opportunity to commit the striking force in the counterattack. Units also develop graphics that help them","rect":[108.0,118.023193359375,539.9649939498902,108.9150161743164]},{"page":223,"text":"recover the defense’s integrity if the striking force is not successful in its attack. (Appendix A explains these","rect":[108.0,129.486083984375,540.0111970977783,120.3779067993164]},{"page":223,"text":"control measures.)","rect":[108.0,140.9890594482422,181.89452148056032,131.90090942382813]},{"page":223,"text":"PLANNING A MOBILE DEFENSE","rect":[90.0,166.28965759277345,307.3399795188904,156.6015167236328]},{"page":223,"text":"10-13. The key to a successful mobile defense is the integration and synchronization of all available assets","rect":[108.0,186.59429931640626,540.0553119163513,177.48611450195313]},{"page":223,"text":"to maximize the combat power of the defending unit, particularly the striking force. Units integrate and","rect":[108.0,198.1173095703125,539.9992580413818,189.00912475585938]},{"page":223,"text":"synchronize their plans to deliver combined effects at decisive times and places.","rect":[108.0,209.5802001953125,428.48992443084719,200.47201538085938]},{"page":223,"text":"10-14. In a mobile defense, units may take advantage of terrain or obscurants to hide a striking force until","rect":[108.0,227.10516357421876,540.0764536819459,217.99697875976563]},{"page":223,"text":"the enemy force's forward elements pass the striking force. Until committed, the striking force maintains a","rect":[107.98998260498047,238.56805419921876,539.8759431915283,229.45986938476563]},{"page":223,"text":"defense. This technique closely resembles the use of stay-behind forces. Similarly, commanders may order","rect":[107.98998260498047,250.091064453125,540.0084130821228,240.98287963867188]},{"page":223,"text":"friendly units inadvertently bypassed by enemy forces not to break out immediately so that they may","rect":[107.98998260498047,261.614013671875,540.0063991546631,252.50582885742188]},{"page":223,"text":"capitalize on their position to destroy enemy forces.","rect":[107.98998260498047,273.076904296875,315.1584424972534,263.9687194824219]},{"page":223,"text":"10-15. A mobile defense gives enemy forces an opportunity to conduct a limited penetration or advance","rect":[107.98998260498047,290.5918884277344,540.0151033477783,281.48370361328127]},{"page":223,"text":"along a limited frontage with a portion of their forces. Units conducting a mobile defense employ minimal","rect":[107.98998260498047,302.1148681640625,539.9264903030396,293.0066833496094]},{"page":223,"text":"forces as the fixing force. This generally allows enemy forces to penetrate or cross an obstacle in at least one","rect":[107.9800033569336,313.5777587890625,540.0557527618408,304.4695739746094]},{"page":223,"text":"location. Once this occurs, the fixing force isolates and fixes the enemy penetration. Once the penetration is","rect":[107.9799575805664,325.10076904296877,540.0173480491638,315.9925842285156]},{"page":223,"text":"fixed, defending units launch a counterattack by using the striking force to destroy the fixed enemy. Units","rect":[107.95990753173828,336.623779296875,539.9571673851013,327.5155944824219]},{"page":223,"text":"may also choose this variation when an enemy force is likely to use weapons of mass destruction.","rect":[107.95990753173828,348.0866394042969,498.18291759490969,338.97845458984377]},{"page":223,"text":"MOVEMENT AND MANEUVER","rect":[90.0,371.4222106933594,233.9955759048462,363.33599853515627]},{"page":223,"text":"10-16. The ability to maintain the mobility advantage of a defending force is an important aspect of the","rect":[108.0,391.3742980957031,540.0322542266846,382.26611328125]},{"page":223,"text":"mobile defense. This mobility advantage may result from or be enhanced by countermobility actions directed","rect":[108.0,402.8973083496094,540.0579738616943,393.78912353515627]},{"page":223,"text":"against an attacking enemy force. In the mobile defense plan, units ensure their reserves and striking force","rect":[108.0,414.36016845703127,539.9734163360596,405.2519836425781]},{"page":223,"text":"have freedom of maneuver. Simultaneously, the fixing forces restrict the enemy’s mobility and momentum,","rect":[108.0,425.8831787109375,540.0424146652222,416.7749938964844]},{"page":223,"text":"while guiding or forcing the enemy into areas that favor the defense.","rect":[108.00003814697266,437.40618896484377,381.8217725753784,428.2980041503906]},{"page":223,"text":"10-17. Most countermobility assets support the operations of the fixing force. Most mobility assets support","rect":[108.00003814697266,454.87103271484377,540.0392222366334,445.7628479003906]},{"page":223,"text":"the operations of the striking force. Situational obstacles provide a tremendous advantage to defending forces","rect":[108.00004577636719,466.39404296875,540.0742938499451,457.2858581542969]},{"page":223,"text":"in a mobile defense. These obstacles are a combat multiplier because they enable economy of force measures.","rect":[108.00004577636719,477.91705322265627,540.0559644699097,468.8088684082031]},{"page":223,"text":"Units use situational obstacles to exploit enemy vulnerabilities, exploit success, separate enemy follow-on","rect":[108.00004577636719,489.3799133300781,540.0824489593506,480.271728515625]},{"page":223,"text":"forces, and provide flank protection.","rect":[107.98999786376953,500.88287353515627,253.53052806854249,491.79473876953127]},{"page":223,"text":"FIRES","rect":[90.0,524.2421875,119.45485496520996,516.1559448242188]},{"page":223,"text":"10-18. The carefully planned indirect fires of all weapons is the basis for an effective mobile defense. The","rect":[108.0,544.13427734375,540.0635042266846,535.026123046875]},{"page":223,"text":"striking force conducts the main effort in a mobile defense. It requires continuous and concentrated fire","rect":[107.9999771118164,555.6572875976563,540.0525178985596,546.5491333007813]},{"page":223,"text":"support. Commanders weight their main effort, in part, by allocating field artillery and other weapon systems","rect":[107.9999771118164,567.1802978515625,539.9431292991638,558.0721435546875]},{"page":223,"text":"to it. They rapidly shift indirect fire support from the fixing force to the striking force. These fire support","rect":[108.00997924804688,578.6431884765625,539.9900279006959,569.5350341796875]},{"page":223,"text":"systems do not have to move with the striking force if it remains within supporting range.","rect":[108.00997924804688,590.1661376953125,466.25380992889407,581.0579833984375]},{"page":223,"text":"10-19. Units plan to move their fire support assets to locations where they can support the fixing and strike","rect":[108.00997924804688,607.691162109375,540.0254182891846,598.5830078125]},{"page":223,"text":"force. Fire support assets, especially when employing precision munitions, can partially compensate for a","rect":[108.0099868774414,619.154052734375,540.0411043243408,610.0458984375]},{"page":223,"text":"lack of maneuver forces in the striking force. Units take precautions to prevent fratricide as the striking force","rect":[108.0099868774414,630.677001953125,540.0774202423096,621.56884765625]},{"page":223,"text":"approaches the fixing force’s engagement areas by establishing RFLs while supporting air and artillery assets","rect":[108.00999450683594,642.2000732421875,540.0915057640076,633.0919189453125]},{"page":223,"text":"interdict enemy movements.","rect":[108.02001190185547,653.6629028320313,221.64483165740968,644.5547485351563]},{"page":223,"text":"SUSTAINMENT","rect":[90.0,677.0399780273438,161.04435110092164,668.7359619140625]},{"page":223,"text":"10-20. When planning to sustain the mobile defense, planners must look beyond the fixing force’s","rect":[108.0,696.9542846679688,539.9923236351013,687.8461303710938]},{"page":223,"text":"supporting effort to support the striking force’s counterattack. The greater the distance the striking force must","rect":[107.98999786376953,708.477294921875,539.9572520217896,699.369140625]},{"page":223,"text":"cover when moving from its assembly area to its final objective, the greater the amount of supplies needed","rect":[107.97994995117188,719.940185546875,540.0091457366943,710.8219604492188]},{"page":223,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":223,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":223,"text":"10-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":224,"text":"Chapter 10","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":224,"text":"to support that move. Once committed, units in the striking force require priority of fuel, ammunition, and","rect":[90.0,83.51434326171875,521.9249782562256,74.40616607666016]},{"page":224,"text":"maintenance support over comparable units in the fixing force. Units establish casualty treatment and","rect":[90.0,94.97723388671875,522.0180568695068,85.86905670166016]},{"page":224,"text":"evacuation procedures for both the fixing force and the striking force. The fixing force will likely suffer a","rect":[90.0,106.500244140625,522.0462923126221,97.3920669555664]},{"page":224,"text":"higher percentage of casualties than the striking force as it absorbs the enemy force’s attack. When the","rect":[89.98998260498047,118.023193359375,521.9862337188721,108.9150161743164]},{"page":224,"text":"striking force must move a considerable distance from its assembly area, units should consider establishing","rect":[89.98998260498047,129.486083984375,521.9470119476318,120.3779067993164]},{"page":224,"text":"a tactical assembly area near the fixing force prior to the assault on the enemy. Commanders weigh the","rect":[89.98998260498047,141.00909423828126,521.9895296173096,131.90090942382813]},{"page":224,"text":"benefits of establishing these bases against the cost in terms of combat power or effort diverted from the","rect":[89.98998260498047,152.5321044921875,522.0190706329346,143.42391967773438]},{"page":224,"text":"support mission to secure intermediate staging bases before establishing them. (See ATP 3-35 for additional","rect":[89.98998260498047,163.9949951171875,522.0132212600709,154.88681030273438]},{"page":224,"text":"information on intermediate staging bases.)","rect":[89.98990631103516,175.51800537109376,263.54634643173218,166.40982055664063]},{"page":224,"text":"PREPARING A MOBILE DEFENSE","rect":[72.0,200.78965759277345,297.92512356185918,191.1015167236328]},{"page":224,"text":"10-21. Preparations for a mobile defense include developing the fixing force’s defensive positions and","rect":[90.0,221.09429931640626,522.0153102874756,211.98611450195313]},{"page":224,"text":"engagement areas. Units aggressively use information collection assets to track enemy forces as they","rect":[89.98994445800781,232.55718994140626,522.0103054046631,223.44900512695313]},{"page":224,"text":"approach. Engineers participate in conducting route and area reconnaissance to find and classify existing","rect":[89.98994445800781,244.0802001953125,521.9677028656006,234.97201538085938]},{"page":224,"text":"routes. They improve existing routes and open new routes for use during the battle by the striking force. They","rect":[89.98994445800781,255.60321044921876,521.9714260101318,246.49496459960938]},{"page":224,"text":"also conduct counter mobility and survivability operations for the fixing force.","rect":[90.0,267.0660400390625,404.02093029022219,257.9578552246094]},{"page":224,"text":"10-22. The striking force assembles in one or more areas depending on the width of the assigned area, the","rect":[90.0,284.5910339355469,522.0662508087158,275.48284912109377]},{"page":224,"text":"terrain, enemy capabilities, and their commander’s intent. Before the enemy attack begins, the striking force","rect":[90.0,296.1140441894531,522.0625886993408,287.005859375]},{"page":224,"text":"may deploy some or all of its elements forward in the MBA to—","rect":[90.0000228881836,307.576904296875,349.4378776550293,298.4687194824219]},{"page":224,"text":" Deceive the enemy force regarding the purpose of the striking force.","rect":[115.19999694824219,321.0542907714844,406.72405529022219,311.94610595703127]},{"page":224,"text":" Occupy dummy BPs.","rect":[115.19999694824219,334.5542907714844,218.51027965545655,325.44610595703127]},{"page":224,"text":" Create a false impression of unit boundaries, which is important when operating with a mix of","rect":[115.19999694824219,348.0542907714844,522.0762841758728,338.94610595703127]},{"page":224,"text":"armored, Stryker, and light infantry forces or multinational forces.","rect":[133.1999969482422,359.5773010253906,398.4475049972534,350.4691162109375]},{"page":224,"text":" Conduct reconnaissance of routes between the striking force’s assembly areas and potential","rect":[115.19999694824219,373.0743103027344,522.0761485061646,363.96612548828127]},{"page":224,"text":"objectives.","rect":[133.19998168945313,384.5973205566406,176.2649335861206,375.4791259765625]},{"page":224,"text":"10-23. The enemy force attempts to discover the strength, composition, and location of units that constitute","rect":[89.99372863769531,402.0621643066406,522.0663118438721,392.9539794921875]},{"page":224,"text":"the fixing force and the striking force. Units use protective measures, such as security forces and OPSEC, to","rect":[89.99372863769531,413.5851745605469,522.0259304046631,404.47698974609377]},{"page":224,"text":"deny the enemy force information. Friendly units use those measures to degrade the collection capabilities","rect":[90.00379943847656,425.108154296875,521.9169452171326,415.9999694824219]},{"page":224,"text":"of enemy reconnaissance and surveillance assets. Commanders routinely reposition units to mislead the","rect":[89.9937744140625,436.571044921875,522.0448274688721,427.4628601074219]},{"page":224,"text":"enemy force and to protect the friendly force. In addition, units incorporate OPSEC, tactical deception, and","rect":[89.9937744140625,448.09405517578127,521.9559841156006,438.9858093261719]},{"page":224,"text":"other protective measures into plans and preparations. They attempt to portray an area defense to the enemy","rect":[89.98370361328125,459.6170654296875,521.9559841156006,450.5088806152344]},{"page":224,"text":"force while hiding the striking force.","rect":[89.98370361328125,471.0799255371094,236.66457653045655,461.97174072265627]},{"page":224,"text":"EXECUTING A MOBILE DEFENSE","rect":[72.0,496.3497009277344,299.4546035423279,486.66156005859377]},{"page":224,"text":"10-24. The first two steps of the tactical framework are normally done by the fixing force. The finish step","rect":[90.0,516.654296875,522.0293483734131,507.5461120605469]},{"page":224,"text":"is normally the mobile defense’s main effort, while the follow through step is normally a branch or sequel","rect":[90.0,528.1773071289063,521.9983897171021,519.0691528320313]},{"page":224,"text":"operation done by both forces.","rect":[90.0,539.6401977539063,211.89330577850343,530.5320434570313]},{"page":224,"text":"10-25. Units executing a mobile defense maintain the flexibility to yield terrain and shape the enemy","rect":[89.98999786376953,557.1651611328125,521.9462184906006,548.0570068359375]},{"page":224,"text":"penetration. They may even entice the enemy force by appearing to uncover an objective of strategic or","rect":[89.98999786376953,568.6881713867188,521.9308373985291,559.5699462890625]},{"page":224,"text":"operational value to the enemy force. The striking force maneuvers to conduct the main effort—the","rect":[89.98998260498047,580.1510009765625,522.0073518829346,571.0428466796875]},{"page":224,"text":"counterattack—once the results of the actions of the fixing force shape the situation to meet the commander’s","rect":[90.00003814697266,591.674072265625,522.0523822288513,582.56591796875]},{"page":224,"text":"intent.","rect":[89.98999786376953,601.1729736328125,115.29048442840576,594.0888671875]},{"page":224,"text":"FIND THE ENEMY","rect":[72.0,626.53271484375,158.52793979644776,618.4559936523438]},{"page":224,"text":"10-26. Units conducting a mobile defense focus on discovering the enemy’s strength and exact locations to","rect":[90.0,646.434326171875,522.1005764007568,637.326171875]},{"page":224,"text":"facilitate the effectiveness of the striking force. The security force (guard or cover) or the fixing force","rect":[90.0,657.957275390625,522.0393343048096,648.84912109375]},{"page":224,"text":"confirms the enemy force’s course of action and the main avenues of approach used by the enemy force.","rect":[90.0,669.4802856445313,522.0184888839722,660.3721313476563]},{"page":224,"text":"Commanders normally task other information collection assets to determine the location of enemy reserves","rect":[90.0000228881836,680.9431762695313,522.0194842796326,671.8350219726563]},{"page":224,"text":"and follow-on forces. Early detection of an enemy force’s main effort provides units with reaction time to","rect":[90.0000228881836,692.4661865234375,521.8831081390381,683.3580322265625]},{"page":224,"text":"adjust their fixing force’s positions and shape the enemy penetration, which, in turn, provides the time","rect":[89.99002075195313,703.9891967773438,521.9773225860596,694.8709716796875]},{"page":224,"text":"10-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":224,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":224,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":225,"text":"Mobile Defense","rect":[474.0,44.55902099609375,540.0114462890625,37.90802001953125]},{"page":225,"text":"necessary to commit the striking force. The striking force commander requires timely updates of the enemy","rect":[108.0,83.51434326171875,540.0252590179443,74.40616607666016]},{"page":225,"text":"situation to ensure that the striking force engages the enemy force at the right location and time.","rect":[108.0,94.97723388671875,491.50249767303469,85.86905670166016]},{"page":225,"text":"10-27. While conducting delaying tasks, the security force determines what routes the enemy force is using,","rect":[108.0,112.4921875,540.0763502120972,103.3840103149414]},{"page":225,"text":"where the enemy force is strong or weak, and where gaps exist within enemy formations. This information","rect":[108.0,124.01519775390625,539.9461574554443,114.90702056884766]},{"page":225,"text":"aids units in seizing the initiative by identifying opportunities. Further, it helps direct the striking force along","rect":[107.9899673461914,135.47808837890626,540.0473537445068,126.36991119384766]},{"page":225,"text":"the path of least resistance, as it maneuvers to employ its combat power at the critical time and place.","rect":[107.9899673461914,147.00103759765626,512.8448438644409,137.89285278320313]},{"page":225,"text":"FIX THE ENEMY","rect":[90.0,170.35269165039063,169.62414646148683,162.27597045898438]},{"page":225,"text":"10-28. In a mobile defense, units conduct supporting efforts to disrupt the enemy force’s commitment of","rect":[108.0,190.3143310546875,540.0233056602478,181.20614624023438]},{"page":225,"text":"reserves and follow-on echelons into the battle. These supporting efforts create the conditions for committing","rect":[107.98998260498047,201.7772216796875,540.0263576507568,192.66903686523438]},{"page":225,"text":"the striking force by isolating the object of the striking force and destroying the enemy force’s key command","rect":[107.9999771118164,213.30023193359376,540.0323390960693,204.18203735351563]},{"page":225,"text":"and control nodes, logistics resupply units, and reserves. Whenever possible, units sequence these supporting","rect":[108.0,224.76312255859376,540.0167751312256,215.65487670898438]},{"page":225,"text":"efforts, including the use of electromagnetic warfare, so that their effects coincide with the commitment of","rect":[108.0,236.28607177734376,539.9250390586853,227.17788696289063]},{"page":225,"text":"the striking force. To generate a tempo that temporarily paralyzes enemy C2, units increase the intensity of","rect":[108.0,247.80908203125,539.9737451133728,238.70089721679688]},{"page":225,"text":"these supporting efforts on the commitmentof the striking force. Units continue to conductsupporting efforts","rect":[108.0,259.27197265625,539.9892718772888,250.16378784179688]},{"page":225,"text":"once the striking force commits to prevent enemy forces outside the objective area from interfering with the","rect":[108.0,270.79498291015627,540.0621614532471,261.6767883300781]},{"page":225,"text":"decisive counterattack.","rect":[108.0,280.2939147949219,199.65996837615968,273.20977783203127]},{"page":225,"text":"10-29. Fixing the enemy force establishes conditions necessary for the main effort by the striking force.","rect":[108.0,299.7828369140625,540.0253248214722,290.6746520996094]},{"page":225,"text":"Typically, commanders of the defending force allow the enemy force to penetrate the MBA before the","rect":[107.98994445800781,311.3058166503906,539.9709138946533,302.1976318359375]},{"page":225,"text":"striking force attacks as shown in figure 10-4 on page 10-8. The fixing force may employ a combination of","rect":[107.98994445800781,322.8288269042969,539.9441430625916,313.72064208984377]},{"page":225,"text":"area defense, delay, and strong point techniques to shape the enemy penetration. The intent of the fixing force","rect":[107.98992919921875,334.29168701171877,540.0340852813721,325.1835021972656]},{"page":225,"text":"is not necessarily to defeat the enemy force but to shape the penetration of the enemy force to facilitate a","rect":[107.98992919921875,345.814697265625,539.9216585235596,336.7065124511719]},{"page":225,"text":"decisive counterattack by the striking force. Commanders ensure that the missions and task organization of","rect":[107.98999786376953,357.33770751953127,539.9941308555603,348.2294921875]},{"page":225,"text":"subordinate units within the fixing force are consistent with the concept for preventing the enemy penetration.","rect":[107.98998260498047,368.80059814453127,540.0831861495972,359.6924133300781]},{"page":225,"text":"Defensive positions within the fixing force may not be contiguous since the fixing force contains only the","rect":[107.98998260498047,380.3236083984375,539.9662752227783,371.2154235839844]},{"page":225,"text":"minimum-essential combat power to accomplish its mission.","rect":[107.98998260498047,391.8265380859375,350.42885875701907,382.7384033203125]},{"page":225,"text":"10-30. In a mobile defense, units retain ground only to facilitate the commitment of the striking force. Units","rect":[107.97996520996094,409.31146240234377,539.9972674827576,400.2032775878906]},{"page":225,"text":"can yield ground to make the enemy commander think that their attack is successful or to entice the enemy","rect":[107.96994018554688,420.8344421386719,539.9011135101318,411.72625732421877]},{"page":225,"text":"to move to a point where the striking force can attack. The fixing force’s use of obstacles supports this shaping","rect":[107.96994018554688,432.357421875,539.9928493499756,423.2492370605469]},{"page":225,"text":"effort and helps it gain a mobility advantage over enemy forces.","rect":[107.96994018554688,443.8203125,363.7315626144409,434.7121276855469]},{"page":225,"text":"10-31. During a mobile defense, commanders may need to commit the reserve to reinforce the fixing force","rect":[107.96994018554688,461.3453063964844,540.0284700469971,452.23712158203127]},{"page":225,"text":"and help shape the battlefield. They position their reserves so they can effectively react to the enemy force’s","rect":[107.95992279052735,472.80816650390627,539.9540545921326,463.6999816894531]},{"page":225,"text":"most likely and most dangerous course of action. Without a reserve, commanders assume significant risk in","rect":[107.95992279052735,484.3311767578125,539.9321804046631,475.2229919433594]},{"page":225,"text":"attempting to shape enemy penetrations. Circumstances may also force them to employ elements of the","rect":[107.95994567871094,495.8541564941406,539.9270906524658,486.7459716796875]},{"page":225,"text":"striking force to assist the fixing force. If that occurs, units can use available long-range fire support assets","rect":[107.95990753173828,507.3171081542969,540.0022113304138,498.20892333984377]},{"page":225,"text":"and attack helicopters. These assets allow them to rapidly disengage and shift support during the striking","rect":[107.95986938476563,518.840087890625,539.8419094085693,509.7319030761719]},{"page":225,"text":"force’s commitment.","rect":[107.95986938476563,528.339111328125,191.2821912765503,521.2550048828125]},{"page":225,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":225,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":225,"text":"10-7","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":226,"text":"Chapter 10","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":226,"text":"Figure 10-4. Mobile defense before commitment of striking force","rect":[144.4199981689453,359.8141784667969,449.52394007873536,350.4254455566406]},{"page":226,"text":"FINISH THE ENEMY","rect":[72.0,389.1822204589844,167.99940586090089,381.09600830078127]},{"page":226,"text":"10-32. Commanders’ situational understanding is critical in establishing the conditions that initiate the","rect":[90.0,409.0743103027344,521.9768953399658,399.96612548828127]},{"page":226,"text":"striking force’s movement and in determining the general area that serves as a focus for the counterattack.","rect":[89.98997497558594,420.5973205566406,521.9604444503784,411.4891357421875]},{"page":226,"text":"Situational understanding includes identifying those points in time and maneuver space where the","rect":[89.9799575805664,432.12030029296877,521.9301424102783,423.0121154785156]},{"page":226,"text":"counterattack proves decisive. The unit staff synchronizes the unit’s activities in time and maneuver space to","rect":[89.97993469238281,443.58319091796877,521.8859767913818,434.4750061035156]},{"page":226,"text":"mass the effects of the striking force at the right time and place by establishing decision points.","rect":[89.97989654541016,455.106201171875,470.1246290206909,445.9980163574219]},{"page":226,"text":"10-33. The actions of the striking force are the echelon’s main effort on its commitment. Information","rect":[89.97989654541016,472.63116455078127,521.9441432952881,463.5229797363281]},{"page":226,"text":"collection assets focus on tracking the enemy force’s advance. The striking force commander continuously","rect":[89.97991180419922,484.09405517578127,521.9300441741943,474.9858703613281]},{"page":226,"text":"receives intelligence and information updates that allow that commander to adjust the counterattack to defeat","rect":[89.9800033569336,495.6170654296875,522.0734019241334,486.4988708496094]},{"page":226,"text":"the enemy. Once the enemy starts its attack, any forward-deployed elements of the striking force withdraw","rect":[89.9799575805664,507.0799255371094,521.9932293930053,497.97174072265627]},{"page":226,"text":"to assembly areas or attack positions and prepare for their commitment.","rect":[89.97993469238281,518.6029052734375,376.27349376678469,509.4947204589844]},{"page":226,"text":"10-34. The defending commander launches the striking force in a counterattack when its offensive power","rect":[89.97993469238281,536.1279296875,521.9092309532166,527.019775390625]},{"page":226,"text":"is greater than the targeted attacking enemy force. Piecemeal commitment of the striking force in support of","rect":[89.97992706298828,547.5908203125,521.9406030235291,538.482666015625]},{"page":226,"text":"local objectives jeopardizes the success of the overall operation. The striking force must execute the","rect":[89.97992706298828,559.11376953125,521.9271516876221,549.9955444335938]},{"page":226,"text":"counterattack rapidly and violently, employing all combat power necessary to ensure success. The striking","rect":[89.97993469238281,570.6367797851563,521.9699611663818,561.5286254882813]},{"page":226,"text":"force may be committed at a different time and area than anticipated. Thus, it must be able to respond to","rect":[89.97993469238281,582.0996704101563,521.9489040374756,572.9915161132813]},{"page":226,"text":"unexpected developments rapidly and decisively. Figure 10-5 depicts a mobile defense after commitment of","rect":[89.97993469238281,593.6226806640625,522.0142724571228,584.5145263671875]},{"page":226,"text":"a striking force.","rect":[89.97994995117188,605.1456298828125,153.02480602264405,596.0374755859375]},{"page":226,"text":"10-35. Because the striking force normally attacks a moving enemy force, it generally assumes a formation","rect":[89.97994995117188,622.6104736328125,522.0087184906006,613.5023193359375]},{"page":226,"text":"with a covering force, an advance guard, a main body, and either a follow and support or a follow and assume","rect":[89.96993255615235,634.133544921875,522.1256380157471,625.025390625]},{"page":226,"text":"force. The strike force commander designates flank responsibilities and may even allocate a force against a","rect":[89.96994018554688,645.656494140625,521.8384065704346,636.54833984375]},{"page":226,"text":"particularly vulnerable flank. The striking force takes advantage of obstacles, such as rivers or obstacle zones,","rect":[89.96994018554688,657.119384765625,521.9631910324097,648.01123046875]},{"page":226,"text":"to prevent the enemy from counterattacking the strike force. However, the striking force moves quickly and","rect":[89.96991729736328,668.642333984375,521.9348049163818,659.5341796875]},{"page":226,"text":"mitigates risk to its flanks, using speed and situational understanding to provide security.","rect":[89.95990753173828,680.1654052734375,445.49761486053469,671.0572509765625]},{"page":226,"text":"10-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":226,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":226,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":227,"text":"Mobile Defense","rect":[474.0,44.55902099609375,540.0114462890625,37.90802001953125]},{"page":227,"text":"Figure 10-5. Mobile defense after commitment of striking force","rect":[166.86000061035157,409.9141845703125,463.1374044342041,400.52545166015627]},{"page":227,"text":"10-36. The striking force attacks in a formation that provides maximum combat power forward to destroy","rect":[107.99249267578125,433.3710021972656,539.9796047210693,424.2628173828125]},{"page":227,"text":"the enemy force. The striking force takes advantage of its mobility and firepower to seize the initiative by","rect":[107.99249267578125,444.8940124511719,539.9623928070068,435.78582763671877]},{"page":227,"text":"overwhelming the enemy force with swift strikes that cripple the enemy force’s C2 system, disrupt attacking","rect":[107.99249267578125,456.4169921875,539.9777736663818,447.3088073730469]},{"page":227,"text":"enemy formations, and destroy enemy combat systems. Units ensure that fire support and fixing force efforts","rect":[107.99247741699219,467.8798828125,539.9893939476013,458.7716979980469]},{"page":227,"text":"capture the enemy force’s attention and posture the enemy force for attack by the striking force. During the","rect":[107.99247741699219,479.40289306640627,540.0580110626221,470.2947082519531]},{"page":227,"text":"counterattack, the striking force commander may have one element of the striking force occupy support by","rect":[107.99247741699219,490.9259033203125,539.9096584320068,481.8177185058594]},{"page":227,"text":"fire positions to suppress the enemy force, while another striking force element prepares to assault the","rect":[107.99250030517578,502.3887634277344,539.9736604766846,493.28057861328127]},{"page":227,"text":"objective. Armored, Stryker, and light infantry forces may make this assault.","rect":[107.99249267578125,513.9118041992188,414.58550548553469,504.7935791015625]},{"page":227,"text":"10-37. Engineers should be well forward to enhance the mobility of the striking force. These lead engineers","rect":[108.00251770019531,531.436767578125,540.1360003929138,522.32861328125]},{"page":227,"text":"search for existing obstacles and clear routes within their capabilities. Follow-on engineers expand breaches,","rect":[108.00251770019531,542.899658203125,540.0529737472534,533.79150390625]},{"page":227,"text":"improve routes, and replace assault bridges with more permanent structures. Engineers with flank forces","rect":[108.00254821777344,554.422607421875,539.9735248069763,545.314453125]},{"page":227,"text":"focus on countermobility to protect the striking force’s flanks.","rect":[108.00254821777344,565.885498046875,356.6227979660034,556.77734375]},{"page":227,"text":"FOLLOW THROUGH","rect":[90.0,589.2222290039063,187.8546724319458,581.135986328125]},{"page":227,"text":"10-38. Units use defensive actions to create the opportunity to transition to the offense. In a mobile defense,","rect":[108.0,609.17431640625,540.0084180831909,600.066162109375]},{"page":227,"text":"that transitional opportunity generally results from the success of the striking force’s attack. Units exploit","rect":[108.0,620.697265625,540.0113291702271,611.589111328125]},{"page":227,"text":"success and attempt to establish conditions for a pursuit or an exploitation, based on the success of the striking","rect":[107.98998260498047,632.16015625,540.0394191741943,623.052001953125]},{"page":227,"text":"force’s attack. If the mobile defense is unsuccessful and the enemy force retains the initiative, units must","rect":[107.98998260498047,643.6831665039063,540.0331797561646,634.5750122070313]},{"page":227,"text":"either reestablish a defense or conduct retrograde operations.","rect":[107.98998260498047,655.2061767578125,351.26458263397219,646.0980224609375]},{"page":227,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":227,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":227,"text":"10-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":228,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":229,"text":"Chapter 11","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":229,"text":"Retrograde","rect":[272.3399963378906,154.12814331054688,357.67854359436037,139.3096466064453]},{"page":229,"text":"This chapter discusses the retrograde and its general considerations. It then discusses","rect":[126.0,188.7806854248047,504.07566318130497,178.79986572265626]},{"page":229,"text":"the three variations of the retrograde: delay, withdrawal, and retirement.","rect":[126.0,201.4405975341797,442.2790880203247,191.45977783203126]},{"page":229,"text":"GENERAL CONSIDERATIONS FOR THE RETROGRADE","rect":[90.0,226.7696990966797,460.2352126731873,217.08155822753907]},{"page":229,"text":"11-1. A retrograde is organized movement away from the enemy. It may be forced by enemy actions, or it","rect":[108.0,247.07427978515626,540.0604624710084,237.96609497070313]},{"page":229,"text":"may be made voluntarily. In either case, the higher echelon commander of the force must approve the","rect":[108.0000228881836,258.5972900390625,540.0492220001221,249.48910522460938]},{"page":229,"text":"retrograde prior to execution. The three variations of the retrograde are delay, withdrawal, and retirement.","rect":[108.0000228881836,270.12030029296877,539.9722852706909,261.0121154785156]},{"page":229,"text":"Units may execute retrogrades to—","rect":[108.0000228881836,281.5831298828125,250.26398849487306,272.4749450683594]},{"page":229,"text":" Transition to other operations.","rect":[133.1999969482422,295.05426025390627,272.27166271209719,285.96612548828127]},{"page":229,"text":" Gain time without becoming decisively engaged.","rect":[133.1999969482422,308.5743103027344,347.2613477706909,299.46612548828127]},{"page":229,"text":" Resist, exhaust, and damage an enemy force in situations that do not favor a defense.","rect":[133.1999969482422,322.0743103027344,490.7808790206909,312.96612548828127]},{"page":229,"text":" Draw enemy forces into an unfavorable situation or extend the enemy’s LOCs.","rect":[133.1999969482422,335.5743103027344,466.72979259490969,326.46612548828127]},{"page":229,"text":" Preserve the force or avoid combat under undesirable conditions, such as continuing an operation","rect":[133.1999969482422,349.0743103027344,540.0300197601318,339.96612548828127]},{"page":229,"text":"that no longer promises success.","rect":[151.1999969482422,360.5973205566406,280.3638563156128,351.4891357421875]},{"page":229,"text":" Reposition forces to conform to movements of other friendly troops.","rect":[133.1999969482422,374.09429931640627,425.02569103240969,364.9861145019531]},{"page":229,"text":" Position the force for use elsewhere in other missions.","rect":[133.1999969482422,385.57025146484377,367.5458936691284,378.4861145019531]},{"page":229,"text":" Simplify sustainment of the force by shortening LOCs.","rect":[133.1999969482422,401.09429931640627,371.20916271209719,391.9861145019531]},{"page":229,"text":" Position the force where it can safely conduct reconstitution.","rect":[133.1999969482422,414.59429931640627,393.6487989425659,405.4861145019531]},{"page":229,"text":" Adjust the defensive scheme to secure terrain more favorable to the defense.","rect":[133.1999969482422,428.09429931640627,456.58254528045657,418.9761047363281]},{"page":229,"text":" Deceive enemy forces.","rect":[133.1999969482422,441.59429931640627,242.56338024139405,432.4861145019531]},{"page":229,"text":"11-2. Leaders ensure Soldiers remain disciplined and aggressive during retrograde operations to preserve","rect":[108.00376892089844,459.0591735839844,540.0469026641846,449.95098876953127]},{"page":229,"text":"unit morale. Additionally, units can counter any negative effects on morale by planning and efficiently","rect":[108.00376892089844,470.5821533203125,540.0162868499756,461.4739685058594]},{"page":229,"text":"executing the retrograde and ensuring Soldiers understand their task, purpose, and the duration of the","rect":[108.00376892089844,482.10516357421877,540.0000276641846,472.9969787597656]},{"page":229,"text":"operation. Retrogrades can negatively affect Soldiers’ morale more than any other type of operation because","rect":[108.00376892089844,493.56805419921877,540.0132112579346,484.4598693847656]},{"page":229,"text":"they may view a retrograde as a defeat. After completing a retrograde operation, commanders may","rect":[108.0037841796875,505.0910339355469,540.0344753265381,495.98284912109377]},{"page":229,"text":"reconstitute their forces.","rect":[108.0037841796875,514.5899658203125,204.94829845428468,507.5058288574219]},{"page":229,"text":"11-3. Military police conduct security and mobility support to preserve the retrograde force’s freedom of","rect":[108.0037841796875,534.0789184570313,539.9418847618103,524.9707641601563]},{"page":229,"text":"movement. They augment supporting military forces by establishing traffic control posts and enable route","rect":[108.0037841796875,545.6019287109375,540.0110750274658,536.4937744140625]},{"page":229,"text":"and convoy security. Military police also provide support through the execution of detainee operations.","rect":[108.01377868652344,557.0648193359375,520.4427442550659,547.9566650390625]},{"page":229,"text":"11-4. The extended frontages and ranges common to retrograde operations make the provision of fire support","rect":[108.01377868652344,574.5897827148438,540.1280283889771,565.4816284179688]},{"page":229,"text":"difficult and limit the ability to mass fires. Therefore, retrograde forces, especially delay forces, often have","rect":[108.01377868652344,586.11279296875,539.9701814727783,577.004638671875]},{"page":229,"text":"more fire support assets. Commanders’ risk of losing supporting artillery systems and their ammunition","rect":[108.01380157470703,597.57568359375,540.0179347991943,588.467529296875]},{"page":229,"text":"stocks increases when conducting retrograde operations. Therefore, they balance their decision to commit","rect":[108.00376892089844,609.0986328125,539.9468760452271,599.990478515625]},{"page":229,"text":"fire support systems forward against anticipated requirements in subsequent battle stages. In particular, units","rect":[108.00376892089844,620.6216430664063,539.9570453147888,611.5134887695313]},{"page":229,"text":"take steps to protect their artillery systems against the direct fires of mobile enemy elements. Units can use","rect":[108.00376892089844,632.0845336914063,540.0191927032471,622.9763793945313]},{"page":229,"text":"available rotary- and fixed-wing aircraft to augment or replace artillery systems.","rect":[108.00376892089844,643.6075439453125,428.75591564178469,634.4993896484375]},{"page":229,"text":"11-5. During a retrograde, sustainment units echelon their movements to maintain adequate support to the","rect":[108.01377868652344,661.1325073242188,540.0938997344971,652.0243530273438]},{"page":229,"text":"committed force. They maintain maximum dispersion consistent with control and local security. They aim to","rect":[108.01377868652344,672.5953979492188,540.1132717132568,663.4872436523438]},{"page":229,"text":"provide uninterrupted support and maximum protection during the time it takes to conduct the retrograde","rect":[108.01377868652344,684.118408203125,540.0951204376221,675.01025390625]},{"page":229,"text":"operation. By echeloning support, units reduce the time each sustainment unit spends moving, preventing it","rect":[108.01377868652344,695.641357421875,539.9820322952271,686.533203125]},{"page":229,"text":"from performing its primary support tasks. High-priority assets may require added protection to prevent their","rect":[108.01380157470703,707.104248046875,539.9250390586853,697.99609375]},{"page":229,"text":"loss or capture. To reduce congestion and interference with the operations of combat, functional and","rect":[108.01380157470703,718.6272583007813,540.0991115570068,709.5191040039063]},{"page":229,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":229,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":229,"text":"11-1","rect":[504.00299072265627,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":230,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":230,"text":"multifunctional support units and supporting sustainment assets displace as early as possible, normally during","rect":[90.0,83.51434326171875,521.9792385101318,74.40616607666016]},{"page":230,"text":"periods of limited visibility. The early displacement of sustainment units can also prevent revealing friendly","rect":[89.9899673461914,94.97723388671875,521.9568386077881,85.86905670166016]},{"page":230,"text":"future operations to the enemy force.","rect":[89.9899673461914,106.500244140625,237.75295543670655,97.3920669555664]},{"page":230,"text":"11-6. A retrograde movement is any movement to the rear or away from the enemy. Such movements","rect":[89.9899673461914,124.02520751953125,521.9671771507263,114.91703033447266]},{"page":230,"text":"may be classified as a withdrawal, retirement, or delaying action. Retrograde operations generally require","rect":[89.96991729736328,135.48809814453126,522.0033845977783,126.37992095947266]},{"page":230,"text":"more Class III and possibly more Class V supplies than during the conduct of other defensive operations.","rect":[89.96991729736328,147.0111083984375,521.8577222824097,137.90292358398438]},{"page":230,"text":"These supplies must be available for emergency issue. These two factors combine to increase the demand for","rect":[89.96991729736328,158.5340576171875,522.0042626914978,149.42587280273438]},{"page":230,"text":"transportation assets and maneuver space on MSRs. This, in turn, increases the need for movement","rect":[89.96991729736328,169.97691345214845,521.9873423538209,160.88876342773438]},{"page":230,"text":"management and pre-positioned services and supplies. Sustainment units carry and cache necessary fuel and","rect":[89.95990753173828,181.51995849609376,521.9811916351318,172.41177368164063]},{"page":230,"text":"ammunition stocks as required by the specific situation.","rect":[89.95992279052735,193.04296875,312.72463512420657,183.93478393554688]},{"page":230,"text":"11-7. The sustainment provided must be mobile to cope with demands of the tactical situation that typically","rect":[89.95992279052735,210.5078125,521.9332180023193,201.39962768554688]},{"page":230,"text":"occur during a retrograde operation. Units prevent unnecessary supplies from accumulating in areas projected","rect":[89.95992279052735,222.03082275390626,522.0244045257568,212.91262817382813]},{"page":230,"text":"for abandonment. Only essential medical and logistics support should be located in the area involved in the","rect":[89.95992279052735,233.49371337890626,521.9757356719971,224.38552856445313]},{"page":230,"text":"retrograde operation.","rect":[89.95992279052735,245.0167236328125,173.88042736053468,235.90853881835938]},{"page":230,"text":"11-8. Commanders establish maintenance, recovery, evacuation priorities, and destruction criteria for","rect":[89.95992279052735,262.5316162109375,521.9902856407166,253.42343139648438]},{"page":230,"text":"inoperable equipment. Maintenance requirements generally overwhelm the organic capabilities of forward","rect":[89.94989013671875,273.9945068359375,521.9539699554443,264.8863220214844]},{"page":230,"text":"units during a retrograde operation. Higher headquarters place as much maintenance, recovery, and","rect":[89.94989013671875,285.51751708984377,521.9711818695068,276.4093322753906]},{"page":230,"text":"evacuation assets forward as possible to augment or relieve combat elements of the burden of repairing","rect":[89.94990539550781,297.04052734375,521.9040431976318,287.9323425292969]},{"page":230,"text":"unserviceable equipment. Recovery and evacuation vehicles position themselves at critical locations to keep","rect":[89.94990539550781,308.50341796875,522.0443019866943,299.3952331542969]},{"page":230,"text":"disabled vehicles from blocking movement routes. Forward units evacuate systems that they cannot repair","rect":[89.94989776611328,320.02642822265627,521.9151513633728,310.9182434082031]},{"page":230,"text":"within established timelines. They use all available means to accomplish this, including equipment","rect":[89.94989013671875,331.5494079589844,521.9853892288209,322.44122314453127]},{"page":230,"text":"transporters and armored vehicles with inoperative weapon systems. Units destroy inoperable equipment to","rect":[89.94989013671875,343.0122985839844,521.8946437835693,333.90411376953127]},{"page":230,"text":"prevent its capture when recovery and evacuation are impossible. When possible, units destroy the same vital","rect":[89.94990539550781,354.5353088378906,521.9250254592896,345.4270935058594]},{"page":230,"text":"components in each type of system to prevent the enemy from rapidly exploiting captured friendly systems","rect":[89.94990539550781,366.0583190917969,521.8367450218201,356.95013427734377]},{"page":230,"text":"through battlefield cannibalization.","rect":[89.94989776611328,377.52117919921877,230.21490001678468,368.4129943847656]},{"page":230,"text":"11-9. Commanders assign transportation priorities for the movement of combat troops and their supplies, the","rect":[89.94989776611328,395.0361328125,522.0300569610596,385.9279479980469]},{"page":230,"text":"movement of obstacle materials to impede enemy forces, and the evacuation of casualties and repairable","rect":[89.94989776611328,406.55914306640627,521.9556551055908,397.4509582519531]},{"page":230,"text":"equipment. Units keep MSRs open and decontaminated as necessary. They also increase the amount of","rect":[89.94989776611328,418.02203369140627,521.9752709922791,408.9138488769531]},{"page":230,"text":"transportation assets available to assist in the retrograde.","rect":[89.94989013671875,429.5450439453125,315.4739637374878,420.4368591308594]},{"page":230,"text":"11-10. Generally, units use alternate supply routes rather than just a few main supply routes. Some routes","rect":[89.94989013671875,447.0700378417969,521.9399554710388,437.95184326171877]},{"page":230,"text":"remain open for traffic moving to the front while the bulk of functional and multifunctional support and","rect":[89.93986511230469,458.5329284667969,521.8786525726318,449.42462158203127]},{"page":230,"text":"sustainment units displace farther rearward. Commanders designate and reserve routes for civilian traffic","rect":[89.93990325927735,470.055908203125,522.0023470001221,460.9477233886719]},{"page":230,"text":"including dislocating civilians. Commanders avoid designating routes that cross or otherwise interfere with","rect":[89.93991088867188,481.518798828125,521.8209743499756,472.4106140136719]},{"page":230,"text":"the unit’s MSRs as much as possible.","rect":[89.92988586425781,493.0217590332031,239.1988172531128,483.9336242675781]},{"page":230,"text":"11-11. The senior military person present determines when to request medical evacuation and assigns","rect":[89.93991088867188,510.5668029785156,521.9740741233826,501.4586181640625]},{"page":230,"text":"precedence of evacuation. The advice of the senior medical person at the scene, the patient’s condition, and","rect":[89.93991088867188,522.0096435546875,522.0123805999756,512.9215087890625]},{"page":230,"text":"the tactical situation all influence this decision. Assignment of medical evacuation precedence is necessary.","rect":[89.92990112304688,533.552734375,521.8441724777222,524.444580078125]},{"page":230,"text":"The precedence provides the supporting medical unit and controlling headquarters with information used in","rect":[89.92990112304688,545.07568359375,521.9578762054443,535.967529296875]},{"page":230,"text":"determining priorities for committing their evacuation assets. For this reason, correct assignment of","rect":[89.92990112304688,556.53857421875,521.8348290977478,547.430419921875]},{"page":230,"text":"precedence cannot be overemphasized; overclassification remains a continuing challenge. Medical assets","rect":[89.92990112304688,568.0616455078125,521.9191424827576,558.9534912109375]},{"page":230,"text":"evacuate patients as quickly as possible, consistent with available resources and pending missions. Medical","rect":[89.92990112304688,579.5845947265625,521.9122691116334,570.4764404296875]},{"page":230,"text":"elements supporting the retrograding force provide rapid evacuation of casualties to medical facilities.","rect":[89.92990112304688,591.0474853515625,521.9662427902222,581.9393310546875]},{"page":230,"text":"Medical evacuation requirements are especially demanding in the large assigned areas common to the","rect":[89.92990112304688,602.570556640625,521.9912996368408,593.46240234375]},{"page":230,"text":"retrograde. Units may augment the ground ambulance capabilities of supporting forward medical units.","rect":[89.92986297607422,614.0935668945313,502.6527051925659,604.9854125976563]},{"page":230,"text":"VARIATIONS OF RETROGRADE","rect":[72.0,639.2697143554688,288.14472805404668,629.58154296875]},{"page":230,"text":"11-12. Variations of retrograde have unique conditions and their own planning considerations. The three","rect":[90.0,659.5742797851563,522.1235017852783,650.4661254882813]},{"page":230,"text":"variations of retrograde are—","rect":[89.98999786376953,671.0371704101563,208.60674667358399,661.9290161132813]},{"page":230,"text":" Delay.","rect":[115.19999694824219,684.5343017578125,159.64277172088624,675.4261474609375]},{"page":230,"text":" Withdraw.","rect":[115.19999694824219,696.020263671875,175.71486949920655,688.9261474609375]},{"page":230,"text":" Retirement.","rect":[115.19999694824219,709.51025390625,180.16775035858155,702.4261474609375]},{"page":230,"text":"11-2","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":230,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":230,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":231,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":231,"text":"DELAY","rect":[90.0,83.219970703125,124.98491764068604,75.27597045898438]},{"page":231,"text":"11-13. A delay is when a force under pressure trades space for time by slowing down the enemy’s","rect":[108.0,103.3143310546875,540.0474994163513,94.2061538696289]},{"page":231,"text":"momentum and inflicting maximum damage on enemy forces without becoming decisively engaged","rect":[108.01001739501953,114.7772216796875,540.0441188812256,105.6690444946289]},{"page":231,"text":"(ADP 3-90). A delay is one of the most demanding of all ground combat operations. A delay wears down","rect":[108.01001739501953,126.30023193359375,539.9740505218506,117.19205474853516]},{"page":231,"text":"enemy forces so that friendly forces can regain the initiative through offensive action, buys time to establish","rect":[108.0,137.8232421875,540.0353298187256,128.71505737304688]},{"page":231,"text":"an effective defense, or determines enemy intentions as part of a security operation. Normally in a delay,","rect":[107.99996185302735,149.28607177734376,540.0010938644409,140.17788696289063]},{"page":231,"text":"inflicting casualties on enemy forces is secondary to gaining time. For example, a flank security force","rect":[107.98994445800781,160.80908203125,539.9793977813721,151.70089721679688]},{"page":231,"text":"conducts a delay operation to provide time for the protected force to establish a viable defense along its","rect":[107.98994445800781,172.33209228515626,540.0060565452576,163.22390747070313]},{"page":231,"text":"threatened flank. A force conducting a delay normally avoids a decisive engagement except when preventing","rect":[107.98994445800781,183.79498291015626,540.0233058929443,174.68679809570313]},{"page":231,"text":"enemy penetration of a phase line for a specific duration.","rect":[107.98994445800781,195.3179931640625,335.72259044647219,186.20980834960938]},{"page":231,"text":"11-14. A delay operation can occur when units do not have enough forces to attack or defend. It may also","rect":[107.98994445800781,212.7828369140625,539.9234523773193,203.67465209960938]},{"page":231,"text":"occur, based on a unit’s mission, in conjunction with a higher echelon commander’s intent. Commanders","rect":[107.98999786376953,224.30584716796876,539.9552142601013,215.18765258789063]},{"page":231,"text":"may base their decision to conduct a delay not on the unit’s combat power, but on other mission variables.","rect":[107.98998260498047,235.828857421875,539.9229078292847,226.72067260742188]},{"page":231,"text":"For example, during security operations, units may conduct a delay as a supporting effort to draw enemy","rect":[107.98998260498047,247.291748046875,540.0215969085693,238.18356323242188]},{"page":231,"text":"forces into an area where they are vulnerable to a friendly counterattack. Another example is a delay instituted","rect":[107.98999786376953,258.814697265625,540.0569362640381,249.70651245117188]},{"page":231,"text":"as an economy of force effort to allow units to conduct offensive actions elsewhere.","rect":[107.98998260498047,270.33770751953127,442.89065074920657,261.2295227050781]},{"page":231,"text":"11-15. The ability of a force to trade maneuver space for time requires depth within the delaying force’s","rect":[107.98998260498047,287.8025817871094,540.0464007835388,278.69439697265627]},{"page":231,"text":"assigned area. The amount of depth required depends on several factors, including the—","rect":[107.98998260498047,299.3255615234375,461.8061943054199,290.2173767089844]},{"page":231,"text":" Amount of time to be gained.","rect":[133.1999969482422,312.7743225097656,269.02419567108157,303.6661376953125]},{"page":231,"text":" Relative combat power of friendly and enemy forces.","rect":[133.1999969482422,326.2743225097656,364.4887342453003,317.1661376953125]},{"page":231,"text":" Relative mobility of the forces.","rect":[133.1999969482422,339.7743225097656,275.92800426483157,330.6661376953125]},{"page":231,"text":" Nature of the terrain.","rect":[133.1999969482422,351.2502746582031,235.06139659881593,344.1661376953125]},{"page":231,"text":" Ability to shape the assigned area with obstacles and fires.","rect":[133.1999969482422,366.7743225097656,385.13198375701907,357.6661376953125]},{"page":231,"text":" Degree of acceptable risk.","rect":[133.1999969482422,380.2743225097656,255.6364393234253,371.1661376953125]},{"page":231,"text":"Ordinarily, the greater the depth, the lower the risk involved to the delaying force and the greater the chance","rect":[107.9937515258789,394.7933044433594,539.9980745391846,385.68511962890627]},{"page":231,"text":"for success.","rect":[107.9937515258789,404.2321472167969,154.65589427947999,397.1580505371094]},{"page":231,"text":"11-16. A delay succeeds by causing enemy forces to fight through a series of defensive positions. A","rect":[107.9937515258789,423.7711486816406,539.9949994125366,414.6629638671875]},{"page":231,"text":"delaying force must offer a continued threat of serious opposition, causing enemy forces to repeatedly deploy","rect":[107.98373413085938,435.2941589355469,539.9136867523193,426.18597412109377]},{"page":231,"text":"and maneuver. Delaying forces displace to subsequent positions before enemy forces are able to concentrate","rect":[107.98373413085938,446.75701904296877,539.9941682891846,437.6488342285156]},{"page":231,"text":"sufficient resources to decisively engage and defeat delaying forces in their current position. The length of","rect":[107.98373413085938,458.280029296875,539.9005639610291,449.1718444824219]},{"page":231,"text":"time a force can remain in a position without facing the danger of decisive engagement is primarily a function","rect":[107.98373413085938,469.742919921875,540.0503444671631,460.6347351074219]},{"page":231,"text":"of relative combat power and the mission variables, such as terrain and weather.","rect":[107.98373413085938,481.245849609375,428.47964000701907,472.15771484375]},{"page":231,"text":"11-17. Commanders normally assign subordinate units contiguous assigned areas deeper than they are wide.","rect":[107.98373413085938,498.7908935546875,539.9898023605347,489.6827087402344]},{"page":231,"text":"They use obstacles, implement fires, and move throughout the depth of each assigned area. If units plan the","rect":[107.97371673583985,510.2537536621094,540.0412874298096,501.14556884765627]},{"page":231,"text":"delay to last a short time or the assigned area’s depth is limited, the delaying unit may need to delay from a","rect":[107.97372436523438,521.7767333984375,540.0407991485596,512.6685791015625]},{"page":231,"text":"single set of positions. If units expect the delay to last for a longer period, or if sufficient depth is available,","rect":[107.97372436523438,533.2997436523438,539.9009351730347,524.1915893554688]},{"page":231,"text":"the delaying unit may delay using either an alternating or subsequent bounding technique to execute the","rect":[107.97372436523438,544.7626342773438,540.0304842071533,535.6544799804688]},{"page":231,"text":"delay.","rect":[107.97370147705078,556.28564453125,132.20208263397218,547.1774291992188]},{"page":231,"text":"11-18. In both techniques, delaying forces normally reconnoiter their next positions before occupying them","rect":[107.98373413085938,573.8106689453125,540.0381751022339,564.7025146484375]},{"page":231,"text":"and, if possible, post guides at their next position. Additionally, in executing both techniques, it is critical","rect":[107.97370910644531,585.2734985351563,539.9035410842896,576.1653442382813]},{"page":231,"text":"that the delaying force maintains contact with enemy forces between delay positions. Table 11-1 on page","rect":[107.97370910644531,596.7965087890625,540.0371370391846,587.6883544921875]},{"page":231,"text":"11-4 summarizes the advantages and disadvantages of these two techniques.","rect":[107.97368621826172,608.3195190429688,412.8021192550659,599.2113647460938]},{"page":231,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":231,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":231,"text":"11-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":232,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":232,"text":"Table 11-1. Considerations for delay techniques","rect":[183.3000030517578,83.51416015625,410.70194911193848,74.12541961669922]},{"page":232,"text":"11-19. Units normally prefer to bound from alternating positions when adequate forces are available and","rect":[90.0,256.19427490234377,522.0153713226318,247.08609008789063]},{"page":232,"text":"the assigned area has sufficient depth. In a delay using alternating bounds, two or more units in a single","rect":[90.0000228881836,267.65716552734377,522.0393953399658,258.5489807128906]},{"page":232,"text":"assigned area occupy delaying positions in depth. As the first unit engages enemy forces, the second unit","rect":[89.99000549316406,279.18017578125,521.9200205764771,270.0719909667969]},{"page":232,"text":"occupies the next position in depth and prepares to assume responsibility for the operation. The first force","rect":[89.98999786376953,290.7031555175781,521.9968538360596,281.594970703125]},{"page":232,"text":"disengages and passes around or through the second force. It then moves to the next position and prepares to","rect":[89.98998260498047,302.1660461425781,521.9689846038818,293.057861328125]},{"page":232,"text":"reengage enemy forces while the second force engages enemy forces. Units normally use alternate positions","rect":[89.98999786376953,313.68902587890627,522.0993182640076,304.5808410644531]},{"page":232,"text":"when their delaying forces operate on narrow fronts. A delay using alternating bounds is particularly useful","rect":[89.98998260498047,325.2120361328125,522.0624766311646,316.1038513183594]},{"page":232,"text":"on the most dangerous avenues of approach because it offers greater security than a delay using subsequent","rect":[89.97997283935547,336.6749267578125,522.0083384475709,327.5667419433594]},{"page":232,"text":"bounds. However, it requires more forces and continuous maneuver coordination. Additionally, delaying","rect":[89.98001098632813,348.1979064941406,521.9478664398193,339.0897216796875]},{"page":232,"text":"forces risk losing contact with enemy forces between their delay positions. Figure 11-1 depicts a delay from","rect":[89.9800033569336,359.7209167480469,522.0273718795777,350.61273193359377]},{"page":232,"text":"alternating positions.","rect":[89.96991729736328,371.1838073730469,173.89446544647218,362.07562255859377]},{"page":232,"text":"Figure 11-1. Delay from alternating positions","rect":[191.1318359375,674.539306640625,402.8675069732666,665.1505737304688]},{"page":232,"text":"11-20. Units delaying using subsequent positions when the assigned area is so wide that available forces","rect":[89.95986938476563,697.99609375,521.9822528343201,688.887939453125]},{"page":232,"text":"cannot occupy more than a single tier of positions. In a delay using subsequent bounds, all delaying units are","rect":[89.95988464355469,709.5191650390625,521.9931917266846,700.4110107421875]},{"page":232,"text":"11-4","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":232,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":232,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":233,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":233,"text":"committed to each of the series of BPs or across the assigned area on the same PL. Most of the delaying force","rect":[108.0,83.51434326171875,540.0794344024658,74.40616607666016]},{"page":233,"text":"is located well forward. The mission dictates the delay from one BP or PL to the next. Units stagger the","rect":[108.0,94.97723388671875,540.0434846954346,85.86905670166016]},{"page":233,"text":"movement of delaying elements so that elements are not moving at the same time. Figure 11-2 illustrates a","rect":[108.0,106.500244140625,540.0553255157471,97.3920669555664]},{"page":233,"text":"delay from subsequent positions.","rect":[107.98990631103516,118.023193359375,239.73388195037843,108.9150161743164]},{"page":233,"text":"Figure 11-2. Delay from subsequent positions","rect":[206.63681030273438,419.9458923339844,423.41956996154786,410.5571594238281]},{"page":233,"text":"Organization of Forces","rect":[90.0,450.5007019042969,198.14092502212524,440.6955871582031]},{"page":233,"text":"11-21. Units normally organize the delaying force into a main body, a security force, and a reserve. The","rect":[108.0,468.0542907714844,540.0180940704346,458.94610595703127]},{"page":233,"text":"security force usually conducts a screen forward of the initial delay positions.","rect":[108.0,479.5171813964844,417.8876905441284,470.40899658203127]},{"page":233,"text":"11-22. The main body, which contains the majority of the delaying force’s combat power, uses alternating","rect":[108.0,497.0321350097656,540.0864162445068,487.9139404296875]},{"page":233,"text":"or subsequent bounds to conduct the delay. Commanders usually deploy their main bodies as complete units","rect":[107.98994445800781,508.55511474609377,540.0433490257263,499.4469299316406]},{"page":233,"text":"into forward positions when conducting a delay from subsequent positions. They divide the main body into","rect":[107.98993682861328,520.0180053710938,539.9379787445068,510.9098205566406]},{"page":233,"text":"two parts, roughly equal in combat power, to occupy each set of positions when conducting a delay using","rect":[107.98999786376953,531.541015625,539.9349880218506,522.432861328125]},{"page":233,"text":"alternating bounds.","rect":[107.98999786376953,543.0640258789063,184.65301036834718,533.955810546875]},{"page":233,"text":"11-23. Commanders retain a reserve to contain enemy penetrations between positions, to reinforce fires into","rect":[107.98997497558594,560.5288696289063,540.1058254241943,551.4207153320313]},{"page":233,"text":"engagement areas, or to help a unit disengage from enemy forces. All these missions require a reserve with","rect":[107.98997497558594,572.0518798828125,539.9781398773193,562.9437255859375]},{"page":233,"text":"enough combat power and mobility to attack the enemy ensuring its reaction to the attack.","rect":[107.98997497558594,583.5748291015625,468.15484142303469,574.4666748046875]},{"page":233,"text":"11-24. Functional and multifunctional support and sustainment assets are widely dispersed and often","rect":[107.9999771118164,601.0397338867188,539.9697780609131,591.9315795898438]},{"page":233,"text":"attached to the units they support because of the width of the assigned areas normally assigned in a delay.","rect":[108.0,612.562744140625,539.9814405441284,603.45458984375]},{"page":233,"text":"Engineer priorities are normally countermobility first, then mobility. However, restrictive terrain that","rect":[108.0,624.0857543945313,540.0212779006959,614.9776000976563]},{"page":233,"text":"impedes friendly movement may require units to reverse priorities. Close coordination is necessary so","rect":[108.0,635.548583984375,540.0170803070068,626.4404296875]},{"page":233,"text":"engineer obstacles are covered by fire and do not impede planned withdrawal routes of delaying forces or the","rect":[108.0,647.0715942382813,540.0163240509033,637.9634399414063]},{"page":233,"text":"commitment of a counterattacking reserve force. The delaying force should have a greater allocation of fire","rect":[108.01001739501953,658.5344848632813,539.9921541290283,649.4263305664063]},{"page":233,"text":"support systems, including Service and joint aviation, to enable the delay force to break contact if necessary.","rect":[108.01000213623047,670.0574951171875,540.0024366378784,660.9392700195313]},{"page":233,"text":"11-25. The requirement to maintain continuous support during the delay requires sustainment organizations","rect":[108.01001739501953,687.58251953125,540.0191791038513,678.474365234375]},{"page":233,"text":"to echelon their assets throughout the area. This echeloning, coupled with the wide dispersion of combat","rect":[107.99999237060547,699.0453491210938,540.0502085647584,689.9371948242188]},{"page":233,"text":"forces inherent in a delay, complicates the execution of the delay.","rect":[107.99999237060547,710.568359375,370.17238903045657,701.460205078125]},{"page":233,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":233,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":233,"text":"11-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":234,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":234,"text":"Delay Control Measures","rect":[72.0,84.62071228027344,186.20408115005493,74.82655334472656]},{"page":234,"text":"11-26. The delay consists of a series of independent small-unit actions that occur simultaneously across the","rect":[90.0,102.11431884765625,522.0644807891846,93.00614166259766]},{"page":234,"text":"front. Subordinate units need freedom of action. Figure 11-3 depicts common graphics used in a delay","rect":[90.0,113.6373291015625,522.0164089202881,104.5291519165039]},{"page":234,"text":"including assigned areas, PLs, BPs, contact points, checkpoints, engagement areas, trigger lines, points,","rect":[90.0000228881836,125.16033935546875,522.0843458175659,116.05216217041016]},{"page":234,"text":"TRPs, and disengagement lines. Commanders designate contact points in front of, between, and behind units","rect":[90.0000228881836,136.6231689453125,522.0100848655701,127.5149917602539]},{"page":234,"text":"to assist coordination, ensure continuity of the delay, and draw attention to enemy avenues of approach into","rect":[90.0000228881836,148.14617919921876,522.0204372406006,139.03799438476563]},{"page":234,"text":"unit flanks.","rect":[90.0,157.64515686035157,135.04491710662843,150.56100463867188]},{"page":234,"text":"Figure 11-3. Example of common delay control measures","rect":[161.40252685546876,475.9906005859375,432.66191004943848,466.60186767578127]},{"page":234,"text":"11-27. Commanders assign each likely enemy avenue of approach to only one subordinate unit when","rect":[89.99002075195313,499.4474182128906,521.9933376312256,490.3392333984375]},{"page":234,"text":"designating subordinate units’ assigned areas. When commanders assign subordinates their assigned areas,","rect":[89.9800033569336,510.9704284667969,521.9522657394409,501.86224365234377]},{"page":234,"text":"terrain that controls fire and observation into those areas is included.","rect":[89.9699935913086,520.4093017578125,364.09792613983157,513.3251953125]},{"page":234,"text":"11-28. Units designate additional PLs beyond those established by the higher echelon as necessary to","rect":[89.9699935913086,539.9583129882813,521.9832057952881,530.8501586914063]},{"page":234,"text":"control the unit’s movement during the delay. A delay line is a phase line over which an enemy is not","rect":[89.9699935913086,551.4813232421875,521.9913232383728,542.3731689453125]},{"page":234,"text":"allowed to cross before a specific date and time or enemy condition. The delay line is depicted as part of","rect":[89.9599609375,562.9442138671875,522.0845239219666,553.8360595703125]},{"page":234,"text":"the graphic control measure. Designating delay lines is a command decision that imposes a high degree of","rect":[89.99002075195313,574.4672241210938,522.0261743125916,565.3590698242188]},{"page":234,"text":"risk on the delaying unit. The delaying unit does everything in its power—including becoming decisively","rect":[89.99002075195313,585.990234375,521.9592800140381,576.882080078125]},{"page":234,"text":"engaged—to prevent enemy forces from crossing that line before the time indicated. A delay line may also","rect":[89.99002075195313,597.453125,521.9782009124756,588.344970703125]},{"page":234,"text":"be event driven. For example, commanders can order delaying units to prevent penetration of the delay line","rect":[89.99002075195313,608.9761352539063,521.9367952423096,599.8679809570313]},{"page":234,"text":"until supporting engineers complete construction of rearward obstacle belts.","rect":[89.99002075195313,620.4991455078125,393.57094860076907,611.3909912109375]},{"page":234,"text":"Planning a Delay","rect":[72.0,645.020751953125,152.0584659576416,635.215576171875]},{"page":234,"text":"11-29. Units must understand and exercise the basic defensive tactics outlined in Chapter 8 to conduct a","rect":[90.0,662.5542602539063,522.0504427032471,653.4661254882813]},{"page":234,"text":"successful delay. However, these defensive basics for a delay have unique considerations, and the","rect":[89.99002075195313,674.0972900390625,522.0053987579346,664.9891357421875]},{"page":234,"text":"significance of these considerations varies based on the mission variables. In a delay, units operate on","rect":[89.99002075195313,685.5601806640625,521.9990139007568,676.4520263671875]},{"page":234,"text":"extended frontages at great risk from advancing enemy forces. The tactical situation constantly changes and","rect":[89.98999786376953,697.0831909179688,521.9987697601318,687.9750366210938]},{"page":234,"text":"the opportunities for maneuver are few. Subordinate units must have the flexibility to take immediate actions","rect":[89.98998260498047,708.606201171875,522.0571429710388,699.498046875]},{"page":234,"text":"11-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":234,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":234,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":235,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":235,"text":"to retain the integrity of their forces. This helps retain their freedom of maneuver and inflict maximum","rect":[108.0,83.51434326171875,540.0262732467652,74.40616607666016]},{"page":235,"text":"destruction on enemy forces.","rect":[107.99999237060547,94.97723388671875,223.5987195968628,85.86905670166016]},{"page":235,"text":"11-30. Commanders and their staffs identify ground and air avenues for enemy attacks and friendly","rect":[107.99999237060547,112.4921875,540.0182399749756,103.3840103149414]},{"page":235,"text":"counterattacks. When avenues of approach diverge or pass from one assigned area to another, adjacent units","rect":[107.99998474121094,124.01519775390625,539.9351336936951,114.89700317382813]},{"page":235,"text":"coordinate with each other. Using the results of IPB, units designate initial and subsequent delay positions","rect":[107.99992370605469,135.47808837890626,539.9812152366638,126.36991119384766]},{"page":235,"text":"on key terrain that covers likely enemy avenues of approach throughout the depth of the assigned area","rect":[107.99992370605469,147.00103759765626,540.0072298126221,137.89285278320313]},{"page":235,"text":"allocated to the delay mission.","rect":[107.99992370605469,158.5240478515625,229.42431163787843,149.41586303710938]},{"page":235,"text":"11-31. Commanders of delaying forces must maintain a mobility advantage over their attackers. They","rect":[107.99992370605469,175.98895263671876,540.0150051116943,166.88076782226563]},{"page":235,"text":"maintain this advantage by fully using the mobility inherent in their available combat and tactical systems.","rect":[107.99992370605469,187.51190185546876,539.9319410324097,178.40371704101563]},{"page":235,"text":"Engineering and fire support enablers are critical to this effort. Units take additional steps to enhance friendly","rect":[107.99992370605469,199.034912109375,540.0463161468506,189.92672729492188]},{"page":235,"text":"mobility and degrade enemy mobility, such as building combat trails between delaying positions and","rect":[107.99992370605469,210.497802734375,540.0259304046631,201.38961791992188]},{"page":235,"text":"preparing bridges over major rivers for demolition. The delaying force should be capable of constructing","rect":[107.99992370605469,222.02081298828126,539.8898830413818,212.90261840820313]},{"page":235,"text":"large numbers of obstacles and delivering long-range fires. For example, while the enemy force travels in","rect":[107.99992370605469,233.483642578125,539.9521999359131,224.37545776367188]},{"page":235,"text":"movement formations that allow it to press its attack, the delaying force aims to engage the enemy force as","rect":[108.0,245.0067138671875,540.0464618186951,235.89852905273438]},{"page":235,"text":"early and often as possible. This forces the enemy out of their preferred formations and into a series of time-","rect":[107.99002075195313,256.5296630859375,539.9722802696228,247.42147827148438]},{"page":235,"text":"consuming deployments into assault formations.","rect":[108.00003814697266,267.9925537109375,301.6646680831909,258.8843688964844]},{"page":235,"text":"11-32. Air defense of a delaying force has three main considerations: the protection of the force while it is","rect":[108.00003814697266,285.5175476074219,540.0554339866638,276.40936279296877]},{"page":235,"text":"in position, the protection of any forces left in contact, and the protection of the force as it moves to the rear.","rect":[108.00003814697266,297.04052734375,540.0492506027222,287.9323425292969]},{"page":235,"text":"Priority should be toward maintaining the mobility of the force. Air defense assets remain mobile yet able to","rect":[108.00003814697266,308.50341796875,540.0364284515381,299.3952331542969]},{"page":235,"text":"engage aerial targets with little advance warning. These assets should work in teams and be able to move to","rect":[108.00003814697266,320.02642822265627,540.0283107757568,310.9182434082031]},{"page":235,"text":"the rear in alternating bounds. This ensures that dedicated air defense assets are in position and that they have","rect":[108.00003814697266,331.5494079589844,540.0106477813721,322.44122314453127]},{"page":235,"text":"the flexibility needed to keep pace with operations. Air defense firing points are not obvious positions that","rect":[108.0,343.0122985839844,539.9297251663209,333.90411376953127]},{"page":235,"text":"an enemy force would target as part of preparation or supporting fires. The brigade air defense and airspace","rect":[108.0,354.5353088378906,539.9522371368408,345.4271240234375]},{"page":235,"text":"management element provide early warning of enemy air attack over combat net radios using the command","rect":[108.01001739501953,366.0583190917969,539.9597682952881,356.9501037597656]},{"page":235,"text":"net at brigade echelons and below.","rect":[108.0,377.5212097167969,246.3421277999878,368.41302490234377]},{"page":235,"text":"11-33. Flanks and gaps between units are always areas of concern. In a linear deployment, attacking enemy","rect":[108.0,395.0361633300781,540.0353908538818,385.927978515625]},{"page":235,"text":"forces can bypass or outflank the delaying force if coordination between adjacent friendly units is weak or if","rect":[107.98997497558594,406.5591735839844,540.0824487266541,397.44097900390627]},{"page":235,"text":"one unit creates a gap by moving rearward too rapidly. Therefore, units designate BPs to guard approaches","rect":[107.98998260498047,418.0220642089844,539.9318377952576,408.91387939453127]},{"page":235,"text":"into the assigned area. Adjacent units of different commands exchange liaisons to ensure coordination.","rect":[107.98998260498047,429.5450744628906,518.7860670089722,420.4268798828125]},{"page":235,"text":"11-34. Displacement criteria should specify at what point—either event or time driven—the delaying force","rect":[107.98998260498047,447.070068359375,540.0614290313721,437.9618835449219]},{"page":235,"text":"should begin its displacement. Units calculate enemy closure rates for the terrain and compare them to","rect":[107.98994445800781,458.532958984375,539.9756984710693,449.4247741699219]},{"page":235,"text":"friendly displacement rates between positions. Units can calculate movement times by comparing time and","rect":[107.98994445800781,470.05596923828127,540.0116481781006,460.9477844238281]},{"page":235,"text":"distance factors. Units determine required obstacle effects and emplacement locations by applying the enemy","rect":[107.98994445800781,481.51885986328127,540.0297756195068,472.4106750488281]},{"page":235,"text":"force’s probable closure rates and formations to available mobility corridors. This also helps them determine","rect":[107.98994445800781,493.0418701171875,540.0011262969971,483.9336853027344]},{"page":235,"text":"if and where delay forces will be required to or likely to be decisively engaged to achieve their delay","rect":[107.98994445800781,504.5649108886719,540.0003566741943,495.45672607421877]},{"page":235,"text":"objective. Careful consideration of the mission variables, especially terrain analysis, is an inherent part of","rect":[107.98994445800781,516.02783203125,539.9201562461853,506.9096374511719]},{"page":235,"text":"delay planning.","rect":[107.98994445800781,527.55078125,169.65502452850343,518.442626953125]},{"page":235,"text":"Characteristics of the Delay","rect":[89.99402618408203,551.0677490234375,204.78619099426269,542.1298828125]},{"page":235,"text":"11-35. Commanders must clearly describe three certain characteristics to their subordinate conducting a","rect":[107.98992919921875,568.5325927734375,540.0570345001221,559.4244384765625]},{"page":235,"text":"delay mission. First, they direct one of two methods: delay within the assigned area or delay forward of a","rect":[107.98999786376953,580.0554809570313,539.9662752227783,570.947265625]},{"page":235,"text":"specified line or terrain feature for a specified time. Commanders usually base that time on another unit","rect":[107.98001098632813,591.5784912109375,539.9593882522584,582.4703369140625]},{"page":235,"text":"completing its activities, such as establishing rearward defensive positions. A mission of delay in the assigned","rect":[107.98001098632813,603.0413818359375,539.9818019866943,593.93310546875]},{"page":235,"text":"area implies that force integrity is a prime consideration. In this case, the delaying force delays enemy forces","rect":[107.9800033569336,614.5643310546875,539.9752337913513,605.4561767578125]},{"page":235,"text":"as long as possible while avoiding decisive engagement. Generally, this force displaces upon meeting","rect":[107.97997283935547,626.0873413085938,539.9949855804443,616.9791870117188]},{"page":235,"text":"predetermined criteria, such as when an enemy force reaches a disengagement line. The control measures are","rect":[107.97997283935547,637.5502319335938,539.9274568634033,628.4420776367188]},{"page":235,"text":"the same for both alternatives except that during a delay forward of a specified line for a specified time,","rect":[107.97997283935547,649.0733032226563,539.9323072433472,639.9651489257813]},{"page":235,"text":"commanders annotate the PL with the specified time. If commanders establish delay lines, mission","rect":[107.97997283935547,660.5963134765625,540.0185451507568,651.4881591796875]},{"page":235,"text":"accomplishment outweighs preservation of the force’s integrity. It may require that delaying force hold a","rect":[107.97997283935547,672.0592041015625,539.9712190704346,662.9510498046875]},{"page":235,"text":"given position until ordered to displace. Figure 11-4 on page 11-8 depicts a delay forward of a specified line","rect":[107.96995544433594,683.5822143554688,539.9101839141846,674.4740600585938]},{"page":235,"text":"for a specified time.","rect":[107.95994567871094,695.085205078125,187.92455577850343,685.9970703125]},{"page":235,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":235,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":235,"text":"11-7","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":236,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":236,"text":"Figure 11-4. Example of a delay forward of a specified line for a specified time","rect":[112.5,398.3941650390625,481.5023946685791,389.00543212890627]},{"page":236,"text":"11-36. The second characteristic is that the commander must specify the acceptable level of risk for the","rect":[89.99505615234375,421.8509826660156,521.9953279571533,412.7427978515625]},{"page":236,"text":"security force to take. Acceptable risk ranges from accepting decisive engagement in an attempt to hold","rect":[89.9950180053711,433.3138732910156,522.0004177093506,424.2056884765625]},{"page":236,"text":"terrain for a given time to maintaining the integrity of the delaying force. The depth of the assigned area","rect":[89.99501037597656,444.83685302734377,522.0151643829346,435.7286682128906]},{"page":236,"text":"available for the delay, the time needed by the higher echelon headquarters, and the delaying force’s","rect":[89.99501037597656,456.35986328125,521.9873797874451,447.2516784667969]},{"page":236,"text":"subsequent missions determine the amount of acceptable risk.","rect":[89.98509979248047,467.8027038574219,337.22564220428469,458.7145690917969]},{"page":236,"text":"11-37. The third characteristic is that the commander must specify whether the delaying force may use the","rect":[89.98506164550781,485.34771728515627,521.9734163360596,476.2395324707031]},{"page":236,"text":"entire assigned area or must delay from specific BPs. A delay using the entire assigned area is preferable, but","rect":[89.96503448486328,496.8707275390625,522.0425181350709,487.7625427246094]},{"page":236,"text":"a delay from specific positions may be required to coordinate two or more units in the delay. To enhance","rect":[89.96504974365235,508.3336181640625,521.9761018829346,499.2254333496094]},{"page":236,"text":"command and control and to coordinate the battle across a broad front, commanders can assign specific BPs","rect":[89.96504974365235,519.8565673828125,521.9072406272888,510.7483825683594]},{"page":236,"text":"down to platoon level. Commanders may direct units to delay within their assigned area if that best supports","rect":[89.96504974365235,531.3795776367188,522.0284564476013,522.2714233398438]},{"page":236,"text":"the scheme of maneuver.","rect":[89.97506713867188,540.8184204101563,189.98266124725343,533.7343139648438]},{"page":236,"text":"Command and Control in a Delay","rect":[71.97914123535156,566.359375,211.79723835754394,557.4215087890625]},{"page":236,"text":"11-38. Communications are essential to the success of this variation of a retrograde, and commanders build","rect":[89.97505187988281,583.8843994140625,521.9937038421631,574.7762451171875]},{"page":236,"text":"redundancy into the communications architecture. Digital and analog systems help ensure redundancy by","rect":[89.96499633789063,595.3472900390625,521.9114894866943,586.2391357421875]},{"page":236,"text":"providing a COP. This allows one command post to temporarily assume the duties of another command post","rect":[89.96499633789063,606.8703002929688,521.9359507522584,597.7621459960938]},{"page":236,"text":"if it is destroyed, displaced, or has suffered an enemy cyberspace or electromagnetic attack.","rect":[89.9749984741211,618.393310546875,455.8974256515503,609.28515625]},{"page":236,"text":"11-39. While planning a delay, the main command post is normally the first command post to displace,","rect":[89.97504425048828,635.858154296875,522.0574903488159,626.75]},{"page":236,"text":"leaving the tactical command post to control the delay until the reestablishment of the main command post","rect":[89.95500183105469,647.381103515625,521.9773325881959,638.27294921875]},{"page":236,"text":"in a secure location. The main command post may displace by echelon, leaving a residual command and","rect":[89.95500183105469,658.9041748046875,521.9603176116943,649.7960205078125]},{"page":236,"text":"control capability in the original location.","rect":[89.95500183105469,670.3670043945313,256.07961559295657,661.2588500976563]},{"page":236,"text":"11-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":236,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":236,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":237,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":237,"text":"Intelligence in a Delay","rect":[90.0,83.51434326171875,183.66897297668457,74.57650756835938]},{"page":237,"text":"11-40. When conducting a delay operation, commanders may not get the most effective use of supporting","rect":[107.99592590332031,100.97918701171875,540.0128688812256,91.87100982666016]},{"page":237,"text":"intelligence assets. They echelon organic and supporting information collection systems rearward to maintain","rect":[107.99589538574219,112.502197265625,540.0532741546631,103.3940200805664]},{"page":237,"text":"partial coverage of the assigned area during the delay. This increases the importance of effective collection","rect":[107.99591827392578,124.02520751953125,539.9832668304443,114.91703033447266]},{"page":237,"text":"management. However, commanders must rely on the dissemination of intelligence from higher echelons","rect":[107.99592590332031,135.48809814453126,540.0230853538513,126.37992095947266]},{"page":237,"text":"and combat information, such as that from manned and unmanned aircraft systems, to make up for the","rect":[107.99592590332031,147.0111083984375,540.0193758087158,137.90292358398438]},{"page":237,"text":"degradation in collection when systems displace.","rect":[107.99592590332031,158.5340576171875,303.51922130584719,149.42587280273438]},{"page":237,"text":"Effects of Terrain in a Delay","rect":[90.0,181.99090576171876,208.68191242980957,173.05307006835938]},{"page":237,"text":"11-41. Commanders take advantage of the terrain when planning how to position forces and conduct","rect":[107.99593353271485,199.505859375,540.0000987014771,190.39767456054688]},{"page":237,"text":"operations. They select terrain that favors friendly actions and hampers enemy actions. The terrain dictates","rect":[107.99593353271485,211.02886962890626,539.8773944358826,201.92068481445313]},{"page":237,"text":"where a delaying force can orient on a moving enemy force and ambush it. During a delay, restrictive terrain","rect":[107.99593353271485,222.49176025390626,539.9761867523193,213.38357543945313]},{"page":237,"text":"facilitates shorter displacements initiated at closer range to enemy forces. Commanders conducting","rect":[108.00591278076172,234.0147705078125,540.0295925140381,224.90658569335938]},{"page":237,"text":"operations in restrictive terrain select locations that restrict the enemy force’s movement and prevent the","rect":[108.00591278076172,245.4776611328125,539.9580354766846,236.36947631835938]},{"page":237,"text":"enemy force from massing its combat power. On the other hand, flat or open terrain requires earlier","rect":[108.00591278076172,257.0006103515625,539.9384057579041,247.89242553710938]},{"page":237,"text":"displacements at greater distances to stay in front of the advancing enemy force. In open terrain, the most","rect":[108.00589752197266,268.52362060546877,539.9014048538209,259.4154357910156]},{"page":237,"text":"important consideration in selecting a position is a good, long-range field of fire.","rect":[108.00593566894531,279.98651123046877,430.65191173553469,270.8783264160156]},{"page":237,"text":"11-42. In restricted terrain, positions tend to be closer together. In open terrain, delay positions are often far","rect":[108.00591278076172,297.511474609375,540.0490624961853,288.4032897949219]},{"page":237,"text":"apart. In selecting positions, commanders consider natural and manmade obstacles, particularly when the","rect":[108.00590515136719,309.03448486328127,539.9908723907471,299.9263000488281]},{"page":237,"text":"enemy force has numerous armored combat systems.","rect":[107.99589538574219,320.49737548828127,319.8929090499878,311.3891906738281]},{"page":237,"text":"11-43. Commanders identify routes that reinforcements, artillery units, command posts, and sustainment","rect":[107.99591827392578,338.0223388671875,540.0743174514771,328.9141540527344]},{"page":237,"text":"elements will use and keep under their control and free of obstacles. Alternate routes should be available so","rect":[107.99593353271485,349.5252990722656,539.8865261077881,340.4371643066406]},{"page":237,"text":"that a friendly force can bypass closed or contaminated choke points.","rect":[107.99593353271485,361.0082092285156,384.33462047576907,351.9000244140625]},{"page":237,"text":"11-44. Disengaging from an enemy force while displacing from one position to the next has challenges.","rect":[107.98591613769531,378.533203125,539.9860792160034,369.4250183105469]},{"page":237,"text":"The unit’s disengagement plans include—","rect":[107.98591613769531,390.05621337890627,276.8830375671387,380.9480285644531]},{"page":237,"text":" The maneuver concept of operations for tactical elements after disengagement, which includes the","rect":[133.1999969482422,403.4942932128906,540.0832796173096,394.3861083984375]},{"page":237,"text":"movement routes for each small unit.","rect":[151.1999969482422,412.9331359863281,300.1042432785034,405.8489990234375]},{"page":237,"text":" Fires to suppress enemy forces and cover the unit’s movement.","rect":[133.1999969482422,428.45428466796877,403.4264783859253,419.3460998535156]},{"page":237,"text":" Electromagnetic warfare activities to disrupt enemy command and control at critical moments.","rect":[133.1999969482422,441.95428466796877,529.3665723800659,432.8460998535156]},{"page":237,"text":" Obscurants to conceal the unit’s movement, conduct a military deception operation, or cover","rect":[133.1999969482422,455.45428466796877,540.0262353477478,446.3460998535156]},{"page":237,"text":"passage points.","rect":[151.20001220703126,466.977294921875,211.78393077850343,457.8691101074219]},{"page":237,"text":" Contact points and passage points if moving through friendly lines.","rect":[133.1999969482422,480.47430419921877,420.04372692108157,471.3661193847656]},{"page":237,"text":" Disengagement start times.","rect":[133.1999969482422,493.97430419921877,259.7847547531128,484.8661193847656]},{"page":237,"text":" The earliest time for functional and multifunctional support and sustainment elements to move.","rect":[133.1999969482422,507.4542541503906,531.9428663253784,498.3661193847656]},{"page":237,"text":" Designated units responsible for closing lanes through obstacles and executing reserved obstacles.","rect":[133.1999969482422,520.9743041992188,539.9420118331909,511.8661193847656]},{"page":237,"text":"Movement and Maneuver in a Delay","rect":[90.00785827636719,544.43115234375,240.91499043273925,535.4932861328125]},{"page":237,"text":"11-45. A delay is one of the most difficult tasks to execute. The primary reason is that the delaying force","rect":[108.01380157470703,561.9561157226563,540.0190095977783,552.8479614257813]},{"page":237,"text":"must engage attacking enemy forces to slow their movement, yet not become decisively engaged. In certain","rect":[108.01380157470703,573.4791259765625,540.0378932952881,564.3709716796875]},{"page":237,"text":"situations, commanders may direct a decisive engagement to prevent an enemy force from prematurely","rect":[108.0137939453125,584.9420166015625,539.9706935882568,575.8338623046875]},{"page":237,"text":"crossing a delay line or to risk a part of the force to avoid jeopardizing the entire delaying force. The delaying","rect":[108.01380157470703,596.4649658203125,540.0006618499756,587.3467407226563]},{"page":237,"text":"unit maintains continuous coordination with any flank units as it displaces rearward.","rect":[108.01380157470703,607.9879760742188,445.25771617889407,598.8798217773438]},{"page":237,"text":"11-46. Armored and Stryker-equipped forces, supported by lethal and nonlethal capabilities, are highly","rect":[108.0137939453125,625.452880859375,540.0183010101318,616.3446044921875]},{"page":237,"text":"suitable for delay operations in most terrain. Their organic firepower allows them to engage enemy forces","rect":[108.00379943847656,636.975830078125,540.0224139671326,627.86767578125]},{"page":237,"text":"effectively at long ranges, and their mobility allows them to move quickly between subsequent positions or","rect":[108.00376892089844,648.4988403320313,539.9609887657166,639.3906860351563]},{"page":237,"text":"to a flank. These same characteristics also allow these forces as a reserve to launch rapid counterattacks to","rect":[108.00376892089844,659.9417114257813,539.9639797210693,650.8535766601563]},{"page":237,"text":"extract delaying forces from untenable situations.","rect":[108.00376892089844,671.4847412109375,305.80669689178469,662.3765869140625]},{"page":237,"text":"11-47. Dismounted infantry forces are especially suited to conduct delays in restricted and severely","rect":[108.00376892089844,689.0097045898438,539.9453029632568,679.9015502929688]},{"page":237,"text":"restricted terrain. They take advantage of such terrain, reinforced by the use of obstacles, to hinder the","rect":[107.99374389648438,700.4725341796875,540.0160188751221,691.3643798828125]},{"page":237,"text":"mobility of enemy combat systems and their supporting tactical vehicles. Dismounted infantry forces can","rect":[107.9937515258789,711.9955444335938,539.9920558929443,702.8873901367188]},{"page":237,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":237,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":237,"text":"11-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":238,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":238,"text":"also participate in stay-behind operations. This type of terrain offers cover for the movement of friendly","rect":[90.0,83.51434326171875,522.0123195648193,74.40616607666016]},{"page":238,"text":"infantry forces and favors using ambushes against enemy forces. Because of the restrictions on organic","rect":[90.0,94.97723388671875,521.9799470977783,85.86905670166016]},{"page":238,"text":"motorized transportation assets and the limited protection available to infantry units, commanders","rect":[90.0,106.500244140625,522.0784442405701,97.3920669555664]},{"page":238,"text":"specifically plan for their displacement.","rect":[90.0,118.023193359375,248.56855297088624,108.9150161743164]},{"page":238,"text":"11-48. Commanders may employ air assault forces in a manner similar to that of other dismounted infantry","rect":[90.0,135.48809814453126,521.9834499359131,126.37992095947266]},{"page":238,"text":"units in a delay. However, air assault forces possess additional useful capabilities in a delay operation.","rect":[90.0,147.0111083984375,521.9612989425659,137.90292358398438]},{"page":238,"text":"Because of their habitual relationship with helicopter units, they can rapidly deploy, redeploy, and disperse","rect":[90.0,158.5340576171875,521.9833650665283,149.42587280273438]},{"page":238,"text":"in open terrain if the weather is suitable and the necessary landing and pickup zones exist. The combination","rect":[90.0,169.9969482421875,522.0842800140381,160.88876342773438]},{"page":238,"text":"of dismounted infantry, attack and assault helicopters, and fire support systems found in air assault units","rect":[90.0,181.51995849609376,522.0484149436951,172.41177368164063]},{"page":238,"text":"allows delaying commanders to concentrate combat power rapidly at key locations to attrit enemy forces","rect":[90.0,193.04296875,521.9029071311951,183.93478393554688]},{"page":238,"text":"through repeated ambushes. The combined arms nature of air assault units also makes them extremely useful","rect":[90.0,204.505859375,522.0341563186646,195.39767456054688]},{"page":238,"text":"for conducting security and reserve operations over large geographical areas against mechanized and","rect":[90.0,216.02880859375,522.0124416351318,206.92062377929688]},{"page":238,"text":"dismounted enemy forces. However, their extraction is a high-risk activity when pressured by an armored","rect":[90.0,227.49169921875,522.0174465179443,218.38351440429688]},{"page":238,"text":"enemy force or in the presence of a significant air defense threat.","rect":[90.0,239.01470947265626,349.41494274139407,229.90652465820313]},{"page":238,"text":"11-49. The mobility, lethality, and long range of rotary-wing and fixed-wing aviation make these assets","rect":[90.0,256.5296630859375,521.9712054710388,247.42147827148438]},{"page":238,"text":"invaluable to a force conducting a delay. Commanders can also use air assault forces to conduct","rect":[89.9899673461914,267.9925537109375,522.0895762405396,258.8843688964844]},{"page":238,"text":"counterattacks and spoiling attacks as part of a combined arms force. Other uses of rotary-wing assets in a","rect":[89.9899673461914,279.51556396484377,522.0503816680908,270.4073791503906]},{"page":238,"text":"delay include the rapid rearward movement of sustainment assets, the deployment of infantry, and the","rect":[89.98998260498047,291.0385437011719,522.0572786407471,281.93035888671877]},{"page":238,"text":"deployment of reconnaissance forces.","rect":[89.98999786376953,302.5014343261719,240.50841808319093,293.3932189941406]},{"page":238,"text":"11-50. During a delay, countermobility is the most important engineer planning consideration. However, if","rect":[89.98998260498047,320.02642822265627,522.0263574180603,310.9182434082031]},{"page":238,"text":"the delaying force must cross one or more major obstacles, the major engineer planning consideration is","rect":[90.00003814697266,331.5494079589844,521.9650409202576,322.43121337890627]},{"page":238,"text":"mobility. Commanders set realistic and specific priorities for the engineer effort. They monitor its progress","rect":[90.00003814697266,343.0122985839844,521.9544208030701,333.90411376953127]},{"page":238,"text":"to prevent it from dissipating countermobility efforts throughout the area. Commanders employ engineers in","rect":[90.00003814697266,354.5352783203125,521.9739284515381,345.4270935058594]},{"page":238,"text":"depth. This is crucial when commanders conduct noncontiguous operations, or when enemy forces attack","rect":[90.0,366.0583190917969,521.9631862640381,356.9501037597656]},{"page":238,"text":"deep into the support area of a force conducting contiguous operations, or when enemy forces have the ability","rect":[90.01001739501953,377.52117919921877,521.9973659515381,368.4129943847656]},{"page":238,"text":"to employ weapons of mass destruction. The maneuver element provides security for the engineers so that","rect":[90.01000213623047,389.044189453125,521.9929575881959,379.9360046386719]},{"page":238,"text":"they can concentrate their efforts on engineer tasks.","rect":[90.01001739501953,400.56719970703127,296.0363416671753,391.4590148925781]},{"page":238,"text":"11-51. Because of the importance of mobility and countermobility tasks, a unit conducting a delay probably","rect":[90.01001739501953,418.0320739746094,522.0464382171631,408.92388916015627]},{"page":238,"text":"has few engineer assets to devote to survivability tasks. Units should maximize the use of obscurants to","rect":[90.0,429.5550842285156,522.0040187835693,420.4468994140625]},{"page":238,"text":"provide concealment for movement and assembly when weather conditions are favorable. Smoke curtains,","rect":[90.0,441.078125,522.0060377120972,431.9699401855469]},{"page":238,"text":"blankets, and haze may protect withdrawing columns, critical points, and routes. Commanders take","rect":[90.0,452.541015625,522.0162019805908,443.4328308105469]},{"page":238,"text":"precautions to ensure that the smoke does not provide a screen for the enemy’s advance. (See ATP 3-11.50","rect":[90.0,464.06402587890627,522.0874538421631,454.9558410644531]},{"page":238,"text":"for more information on battlefield obscuration.)","rect":[90.0,475.5068664550781,284.97612548446656,466.4187316894531]},{"page":238,"text":"Preparing for a Delay","rect":[72.0,500.0606994628906,174.33689308166505,490.2555847167969]},{"page":238,"text":"11-52. The defensive preparations outlined in Chapter 8 apply when conducting a delay. Resources,","rect":[90.0,517.6142578125,522.0494337081909,508.5060729980469]},{"page":238,"text":"including time available, determine the extent of preparations. Commanders’ top priority is reconnaissance.","rect":[90.0100326538086,529.1373291015625,521.9000806808472,520.0291748046875]},{"page":238,"text":"Additionally, the preparation of subsequent positions receives a higher priority than it does in either a mobile","rect":[90.0,540.6001586914063,522.0792512969971,531.4920043945313]},{"page":238,"text":"or an area defense. It is not always possible to complete all preparations before starting delay operations.","rect":[90.0,552.1231689453125,522.0032911300659,543.0150146484375]},{"page":238,"text":"Consequently, delaying units continue to prepare and adapt plans as a situation develops.","rect":[90.0,563.6461791992188,446.02260875701907,554.5380249023438]},{"page":238,"text":"11-53. In the delay, commanders use BPs in a manner similar to the mobile defense. However, commanders","rect":[89.9999771118164,581.1110229492188,522.0282733421326,572.0028686523438]},{"page":238,"text":"place more emphasis on width than depth. Within each BP, most of the available firepower is oriented toward","rect":[89.9999771118164,592.614013671875,522.0128078460693,583.5258178710938]},{"page":238,"text":"the expected enemy avenue of approach. Commanders must provide adequate flank and rear security, since","rect":[90.0,604.096923828125,521.9963655548096,594.98876953125]},{"page":238,"text":"the delaying unit must furnish its own security. Each crew and squad learn the routes from its primary","rect":[90.0,615.619873046875,522.0203151702881,606.51171875]},{"page":238,"text":"positions to alternate, supplementary, and sequential positions. Furthermore, commanders conduct","rect":[90.0,627.1429443359375,521.9672007522584,618.0347900390625]},{"page":238,"text":"reconnaissance of subsequent BPs and prepare routes for displacing. In preparing a BP, commanders","rect":[90.0,638.6057739257813,522.1062762718201,629.4976196289063]},{"page":238,"text":"conducting a delay place less emphasis on installing protective obstacles, establishing final protective lines,","rect":[90.0,650.1287841796875,521.9832715988159,641.0206298828125]},{"page":238,"text":"and stockpiling ammunition in either an area or a mobile defense. Leaders sometimes refer to BPs as delay","rect":[90.0,661.6517944335938,521.8550319671631,652.5436401367188]},{"page":238,"text":"positions during the conduct of a delay.","rect":[89.98998260498047,673.1146850585938,248.01446056365968,664.0065307617188]},{"page":238,"text":"11-54. Commanders deploy their security force well forward of the initial delay positions to give early","rect":[89.98998260498047,690.6396484375,522.0564479827881,681.531494140625]},{"page":238,"text":"warning of any enemy forces approaching. When the security force detects and reports enemy forces","rect":[89.98998260498047,702.1626586914063,521.9683368186951,693.0545043945313]},{"page":238,"text":"approaching, commanders reconcile these reports against decision support matrixes and event templates to","rect":[89.98998260498047,713.62548828125,521.9749660491943,704.517333984375]},{"page":238,"text":"11-10","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":238,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":238,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":239,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":239,"text":"support their decisions and identify enemy COAs. Based on an analysis of ongoing events and a prediction","rect":[108.0,83.51434326171875,540.0223293304443,74.40616607666016]},{"page":239,"text":"of how the battle will unfold, commanders can direct one subordinate element to maneuver in a manner","rect":[108.00003814697266,93.0,540.0040795860291,85.86905670166016]},{"page":239,"text":"designed to draw the advancing enemy force into a position of disadvantage.","rect":[108.00003814697266,106.500244140625,414.5871229171753,97.3920669555664]},{"page":239,"text":"Executing a Delay","rect":[90.0,131.12071228027345,174.92041969299317,121.31556701660156]},{"page":239,"text":"11-55. The complexity of a delay requires the subordinate elements of a force to execute different, yet","rect":[108.0,148.61431884765626,539.9982066116334,139.50613403320313]},{"page":239,"text":"complementary, actions. In a delay, attacks, area defenses, mobile defenses, and other actions may occur in","rect":[108.0,160.1373291015625,540.0137844085693,151.02914428710938]},{"page":239,"text":"any sequence or simultaneously. For example, commanders may elect to assign one force the task of securing","rect":[108.0,171.66033935546876,540.0561428070068,162.55215454101563]},{"page":239,"text":"a key road intersection for a set amount of time, while another force can attack the enemy flank. Therefore,","rect":[108.0,183.1231689453125,539.9760084152222,174.01498413085938]},{"page":239,"text":"the enemy force must deploy into a hasty defense, which delays any further enemy attacks.","rect":[107.98997497558594,194.64617919921876,471.75615978240969,185.53799438476563]},{"page":239,"text":"11-56. Intelligence preparation of the battlefield defines enemy COAs. Initially, intelligence assets attempt","rect":[107.98997497558594,212.17120361328126,540.0754771194459,203.06301879882813]},{"page":239,"text":"to determine if enemy forces recognize the delay. Subsequently, they focus on how enemy forces react to the","rect":[107.9899673461914,223.634033203125,540.0782136993408,214.52584838867188]},{"page":239,"text":"delay. Information collection assets monitor enemy attempts to envelop the flanks or strike the rear of the","rect":[107.9899673461914,235.15704345703126,540.0574007110596,226.04885864257813]},{"page":239,"text":"rearward moving friendly force. They also focus on actions of any enemy airborne, air assault, and attack","rect":[107.98994445800781,246.6800537109375,539.9633693695068,237.57186889648438]},{"page":239,"text":"aviation units that may try to interdict the movement of the friendly force. Commanders conducting delays","rect":[107.97993469238281,258.1429443359375,539.9890887718201,249.03475952148438]},{"page":239,"text":"attempt to detect the enemy force’s advance early to adjust the scheme of maneuver and concentrate sufficient","rect":[107.97993469238281,269.66595458984377,539.9632945022584,260.5477600097656]},{"page":239,"text":"combat power to delay the enemy force effectively.","rect":[107.97993469238281,281.18896484375,313.9410352706909,272.0807800292969]},{"page":239,"text":"11-57. The security force fixes, defeats, and destroys the enemy force’s reconnaissance and security","rect":[107.97993469238281,298.65380859375,540.0563259124756,289.5456237792969]},{"page":239,"text":"elements without risk of becoming decisively engaged. It directs fires at the approaching enemy force as far","rect":[107.96990203857422,310.1767883300781,539.8751123008728,301.068603515625]},{"page":239,"text":"forward of the delay positions as possible. Engaging a moving enemy force at long ranges inflicts more","rect":[107.96990203857422,321.69976806640627,540.0119905548096,312.5915832519531]},{"page":239,"text":"casualties on an attacking enemy force before it can engage the delaying force; it also slows the enemy force’s","rect":[107.96990203857422,333.16265869140627,539.9622333030701,324.0544738769531]},{"page":239,"text":"tempo of operations. The more a delaying force can eliminate an enemy force’s reconnaissance assets, the","rect":[107.95990753173828,344.6856689453125,540.0122957305908,335.5774841308594]},{"page":239,"text":"more likely the enemy force will move with caution.","rect":[107.95994567871094,356.1485595703125,318.2446241378784,347.0403747558594]},{"page":239,"text":"11-58. Once the security force makes contact with the enemy force, it maintains contact. As an enemy force","rect":[107.95994567871094,373.66351318359377,539.9123811798096,364.5553283691406]},{"page":239,"text":"approaches, it moves by bounds back to the flanks of the defending units, keeping the enemy force under","rect":[107.94992065429688,385.1864929199219,539.8837792930603,376.07830810546877]},{"page":239,"text":"constant observation. This prevents the enemy force from finding gaps between delaying units and attacking","rect":[107.94992065429688,396.64935302734377,539.8647365570068,387.5411682128906]},{"page":239,"text":"the exposed flanks of delaying units. The security force uses covered, concealed, and coordinated routes to","rect":[107.94992065429688,408.17236328125,539.7966213226318,399.0641784667969]},{"page":239,"text":"avoid enemy and friendly fires.","rect":[107.94992065429688,419.69537353515627,233.2129774093628,410.5871887207031]},{"page":239,"text":"11-59. Recovering security assets may be more difficult if the security force needs to pass through the range","rect":[107.94992065429688,437.16021728515627,540.0273103790283,428.0520324707031]},{"page":239,"text":"of the delaying force. Recovery should be to the flanks of delay positions and not through friendly","rect":[107.93990325927735,448.6832275390625,539.9159450531006,439.5750427246094]},{"page":239,"text":"engagement areas or TRPs unless a tactical situation makes such movement necessary. Security forces move","rect":[107.93990325927735,460.2062683105469,540.0835237579346,451.09808349609377]},{"page":239,"text":"so that they do not reveal the locations of other friendly elements.","rect":[107.95991516113281,471.6691589355469,370.74553966522219,462.56097412109377]},{"page":239,"text":"11-60. The main body uses various techniques to execute the delay. These include ambushes,","rect":[107.95991516113281,489.19415283203127,540.0002393722534,480.0859680175781]},{"page":239,"text":"counterattacks, spoiling attacks, artillery raids, electromagnetic warfare, and close air support. Commanders","rect":[107.94986724853516,500.7171630859375,539.9832293968201,491.6089782714844]},{"page":239,"text":"of delaying forces preserve the force’s freedom to maneuver by engaging enemy forces with sufficient force","rect":[107.94986724853516,512.1800537109375,539.8979768829346,503.0718688964844]},{"page":239,"text":"to stop their advance temporarily. The delaying forces use obstacles and defensive positions in depth to slow","rect":[107.94986724853516,523.7030639648438,539.9349408187866,514.5949096679688]},{"page":239,"text":"and canalize enemy forces and exploit the mobility of their combat systems to confuse and defeat them. Once","rect":[107.94990539550781,535.22607421875,540.0225496368408,526.117919921875]},{"page":239,"text":"a delay starts, units displace rapidly between positions. Whenever possible, commanders grasp any","rect":[107.94989776611328,546.68896484375,539.9891262054443,537.580810546875]},{"page":239,"text":"opportunity to seize the initiative, even if only temporarily. Delaying forces may conduct counterattacks from","rect":[107.94989776611328,558.2119140625,540.0333533248902,549.103759765625]},{"page":239,"text":"unexpected directions to confuse enemy commanders.","rect":[107.94989776611328,569.7349853515625,324.5993604660034,560.6268310546875]},{"page":239,"text":"11-61. In a delay, commanders use lethal andnonlethal capabilities to delay enemy forces, inflict casualties,","rect":[107.95992279052735,587.1998291015625,539.9511060714722,578.0916748046875]},{"page":239,"text":"and assist the friendly force in gaining a mobility advantage over enemy forces. Lethal and nonlethal effects","rect":[107.96997833251953,598.7228393554688,540.0233905296326,589.6146850585938]},{"page":239,"text":"continue throughout the delay. These assets can disrupt the enemy’s follow-on forces and restrict the","rect":[107.96995544433594,610.1857299804688,539.9041414337158,601.0775756835938]},{"page":239,"text":"immediate battle to the enemy’s committed forces. Fixed- and rotary-wing assets can engage enemy forces","rect":[107.95994567871094,621.708740234375,539.9221332054138,612.6005859375]},{"page":239,"text":"before they come in range of other supporting lethal and nonlethal assets.","rect":[107.9499282836914,633.2318115234375,401.2824354171753,624.1236572265625]},{"page":239,"text":"11-62. Effects generated by lethal and nonlethal assets support direct fire engagements to prevent an enemy","rect":[107.95994567871094,650.6966552734375,540.0635280609131,641.5885009765625]},{"page":239,"text":"force from conducting an attack on the delay position. Lethal and nonlethal assets separate enemy formations","rect":[107.95994567871094,662.2196655273438,540.0302875022888,653.1115112304688]},{"page":239,"text":"by attacking an enemy force when it concentrates near choke points and in engagement areas. Integrating","rect":[107.96994018554688,673.74267578125,539.9391384124756,664.634521484375]},{"page":239,"text":"fires and obstacles makes it difficult for an enemy force to maneuver through engagement areas. The delaying","rect":[107.96991729736328,685.20556640625,540.0063381195068,676.097412109375]},{"page":239,"text":"force disrupts an enemy’s momentum by forcing deployment and by inflicting casualties. Lethal and","rect":[107.96991729736328,696.7285766601563,539.9943141937256,687.6204223632813]},{"page":239,"text":"nonlethal capabilities assist delaying forces by—","rect":[107.96991729736328,708.2515869140625,303.7607231140137,699.1434326171875]},{"page":239,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":239,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":239,"text":"11-11","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":240,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":240,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":240,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":240,"text":"","rect":[115.19999694824219,107.78548431396485,121.16105696249008,103.09324645996094]},{"page":240,"text":"","rect":[115.19999694824219,121.28548431396485,121.16105696249008,116.59324645996094]},{"page":240,"text":"","rect":[115.19999694824219,146.24545288085938,121.16105696249008,141.55320739746095]},{"page":240,"text":"","rect":[115.19999694824219,159.74545288085938,121.16105696249008,155.05320739746095]},{"page":240,"text":"","rect":[115.19999694824219,173.24545288085938,121.16105696249008,168.55320739746095]},{"page":240,"text":"","rect":[115.19999694824219,198.26547241210938,121.16105696249008,193.57322692871095]},{"page":240,"text":"","rect":[115.19999694824219,211.76547241210938,121.16105696249008,207.07322692871095]},{"page":240,"text":"Assisting in disengaging maneuver forces.","rect":[133.1999969482422,83.51434326171875,302.9238233566284,74.40616607666016]},{"page":240,"text":"Suppressing enemy forces.","rect":[133.1999969482422,97.01434326171875,240.7045545578003,87.90616607666016]},{"page":240,"text":"Degrading an enemy force’s ability to move and communicate.","rect":[133.1999969482422,110.51434326171875,385.5938367843628,101.40616607666016]},{"page":240,"text":"Obscuring an enemy force’s overwatching support by fire positions and degrading enemy","rect":[133.1999969482422,124.01434326171875,522.0232448577881,114.90616607666016]},{"page":240,"text":"intelligence and target acquisition systems.","rect":[133.1899871826172,135.47723388671876,305.07412242889407,126.36905670166016]},{"page":240,"text":"Reinforcing or closing breaches or lanes in obstacles.","rect":[133.1999969482422,148.97430419921876,346.47674083709719,139.86611938476563]},{"page":240,"text":"Executing FPFs.","rect":[133.1999969482422,162.47430419921876,199.30793285369874,153.36611938476563]},{"page":240,"text":"Screening friendly displacements and disengagements by using obscurants. (This also degrades","rect":[133.1999969482422,175.97430419921876,522.0402362327576,166.86611938476563]},{"page":240,"text":"an enemy force’s terminal guidance of precision-guided munitions.)","rect":[133.1999969482422,187.497314453125,405.3281457481384,178.38912963867188]},{"page":240,"text":"Destroying high-payoff targets.","rect":[133.1999969482422,200.99432373046876,259.0041151046753,191.88613891601563]},{"page":240,"text":"Supporting limited counterattacks.","rect":[133.1999969482422,214.49432373046876,271.3046827316284,205.38613891601563]},{"page":240,"text":"11-63. As an advancing enemy force approaches the delay position, they cross one or more trigger lines","rect":[89.9937515258789,231.95916748046876,521.9628436546326,222.85098266601563]},{"page":240,"text":"and move into engagement areas within the range of the delaying force’s anti-armor missiles, tank cannons,","rect":[89.9937515258789,243.482177734375,522.0341749191284,234.37399291992188]},{"page":240,"text":"and small arms. Commanders hold their delaying force’s direct fire until enemy forces are positioned where","rect":[89.99372863769531,255.00518798828126,522.0701570587158,245.89700317382813]},{"page":240,"text":"their fire plans and schemes of maneuver require their use. They control fires of the delaying forces in the","rect":[89.9937515258789,266.46807861328127,521.9997835235596,257.3598937988281]},{"page":240,"text":"same manner as in any defense. The more damage a delaying force can inflict on enemy forces, the longer it","rect":[89.9937515258789,277.9910888671875,522.0239024124146,268.8829040527344]},{"page":240,"text":"can stay in position.","rect":[89.9937515258789,289.5140686035156,170.01850414276124,280.4058837890625]},{"page":240,"text":"11-64. As an enemy force attacks and maneuvers against a delaying force, delaying commanders","rect":[89.9937515258789,306.97894287109377,522.0353534202576,297.8707580566406]},{"page":240,"text":"continuously assess the situation to guide the displacements of the delay force to avoid becoming decisively","rect":[89.98373413085938,318.5019226074219,522.0108547210693,309.39373779296877]},{"page":240,"text":"engaged. Units use lethal and nonlethal capabilities from multiple domains to engage enemy forces while the","rect":[89.98373413085938,330.0249328613281,522.0638704376221,320.916748046875]},{"page":240,"text":"delaying force disengages and withdraws from delay positions. Integrated fires and FPFs directed at and in","rect":[89.9937973022461,341.48779296875,521.9970607757568,332.3796081542969]},{"page":240,"text":"front of enemy positions allow a delaying force to disengage.","rect":[89.98373413085938,353.01080322265627,334.94781017303469,343.9026184082031]},{"page":240,"text":"11-65. Division and brigade commanders collaboratively plan and facilitate decentralized execution of a","rect":[89.98373413085938,370.5357666015625,521.9547395782471,361.4275817871094]},{"page":240,"text":"delay to battalion and lower echelons. Senior commanders rely on their subordinates to accomplish the","rect":[89.97370147705078,381.9986877441406,521.9399080352783,372.8904113769531]},{"page":240,"text":"mission and request help when needed. Commanders establish the acceptable risk and displacement criteria.","rect":[89.97370147705078,393.5016174316406,521.9539747238159,384.4134826660156]},{"page":240,"text":"Subordinates displace once they meet the previously established delay criteria. A displacement may be a","rect":[89.97372436523438,405.044677734375,521.8997469024658,395.9364929199219]},{"page":240,"text":"preplanned event or time dependent. The senior commander monitors the delay and intervenes when the","rect":[89.97372436523438,416.50750732421877,521.9468050079346,407.3993225097656]},{"page":240,"text":"displacement of one unit threatens the survival of another.","rect":[89.97372436523438,428.0104675292969,322.39776134490969,418.9223327636719]},{"page":240,"text":"11-66. The delaying force relies heavily on lethal and nonlethal effects to suppress and disrupt enemy","rect":[89.96369934082031,445.5555114746094,521.9759426116943,436.44732666015627]},{"page":240,"text":"forces, so the delaying force can disengage, move, and occupy new positions. If a subordinate element cannot","rect":[89.96370697021485,457.01837158203127,522.0690684280396,447.9101867675781]},{"page":240,"text":"maintain separation from enemy forces, commanders can shift additional combat enablers and other resources","rect":[89.96370697021485,468.5413818359375,522.0452411155701,459.4331970214844]},{"page":240,"text":"to that particular assigned area to counter the enemy forces’ success. As one subordinate element displaces,","rect":[89.96370697021485,480.0042419433594,521.9349317550659,470.89605712890627]},{"page":240,"text":"delaying commanders order other subordinate elements to change their orientation to cover the move. Each","rect":[89.96372985839844,491.5272521972656,521.9624538421631,482.4190673828125]},{"page":240,"text":"displacing element travels along its designated route, using demolitions as required and requesting additional","rect":[89.96369934082031,503.05029296875,522.0659556350709,493.9421081542969]},{"page":240,"text":"fire support if the enemy force continues to maintain contact.","rect":[89.96369934082031,514.51318359375,334.2674207687378,505.4049987792969]},{"page":240,"text":"11-67. Passing through obstacle lanes during displacement between positions poses significant risks to the","rect":[89.96369934082031,532.0381469726563,522.0331697540283,522.9299926757813]},{"page":240,"text":"delaying force. The unit passing through a linear obstacle may become more vulnerable to an enemy force’s","rect":[89.96370697021485,543.5611572265625,522.0160663108826,534.4530029296875]},{"page":240,"text":"attack because of the danger of the delaying force bunching up on the far side of an obstacle. Obstacle lanes","rect":[89.95370483398438,555.0240478515625,522.0110614280701,545.9158935546875]},{"page":240,"text":"also increase the time required for a passing unit to transit through an area. Commanders prevent an enemy","rect":[89.95361328125,566.547119140625,521.8605861663818,557.43896484375]},{"page":240,"text":"force from engaging passing units until they can redeploy into a tactical formation.","rect":[89.95370483398438,578.070068359375,421.31316661834719,568.9619140625]},{"page":240,"text":"11-68. Reserves and air assets should not be committed early in the delay unless its integrity is threatened.","rect":[89.95367431640625,595.534912109375,522.0010328292847,586.4267578125]},{"page":240,"text":"Typically, commanders commit their reserves to help a unit disengage and regain its ability to maneuver or","rect":[89.95367431640625,607.0579833984375,521.8744409141541,597.9498291015625]},{"page":240,"text":"to prevent an enemy force from exploiting an advantage. Commanders’ early commitment of their initial","rect":[89.95367431640625,618.5809326171875,521.9009165725709,609.4727783203125]},{"page":240,"text":"reserves reduces their ability to influence the battle unless they can reconstitute new reserves. Commanders","rect":[89.94364166259766,630.0438232421875,521.9212176780701,620.9356689453125]},{"page":240,"text":"that can extract, re-designate, or otherwise reconstitute their reserves can quickly commit their reserves","rect":[89.94364166259766,641.56689453125,521.9702289085388,632.458740234375]},{"page":240,"text":"several times through the delay.","rect":[89.93362426757813,653.0899047851563,217.47016429901124,643.9817504882813]},{"page":240,"text":"11-69. In the delay, commanders balance the location of their force’s sustainment elements with capability","rect":[89.93362426757813,670.5547485351563,521.8478298187256,661.4465942382813]},{"page":240,"text":"to provide adequate support and protection from enemy indirect fire. Artillery ammunition stocks must be","rect":[89.93362426757813,682.0777587890625,521.9209261016846,672.9696044921875]},{"page":240,"text":"capable of sustaining the quantity of fire support required in the delay. Maintenance operations in a delay","rect":[89.92359161376953,693.600830078125,521.9228420257568,684.49267578125]},{"page":240,"text":"focus on evacuating rather than returning disabled or damaged vehicles to combat. Units evacuate these","rect":[89.92359161376953,705.063720703125,521.9087801055908,695.95556640625]},{"page":240,"text":"11-12","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":240,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":240,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":241,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":241,"text":"vehicles from the security area unless they can quickly repair them. Units destroy inoperative vehicles that","rect":[108.0,83.51434326171875,540.0834727249146,74.40616607666016]},{"page":241,"text":"they cannot evacuate to prevent their capture.","rect":[108.0,94.97723388671875,289.89702892303469,85.86905670166016]},{"page":241,"text":"Terminating the Delay","rect":[90.0,119.60069274902344,196.28750038146974,109.79554748535156]},{"page":241,"text":"11-70. A delay operation terminates when the delaying force conducts a rearward passage of lines through","rect":[108.0,137.154296875,539.9525661468506,128.04611206054688]},{"page":241,"text":"a defending force, the delaying force reaches defensible terrain and transitions to the defense, the advancing","rect":[108.0,148.6171875,540.0444850921631,139.50900268554688]},{"page":241,"text":"enemy force reaches a culminating point, or the delaying force transitions to the offense. If the advancing","rect":[108.0100326538086,160.14019775390626,539.8877468109131,151.03201293945313]},{"page":241,"text":"enemy force reaches a culmination point, the delaying force maintains contact in current positions, withdraws","rect":[108.0100326538086,171.6632080078125,540.0724627952576,162.55502319335938]},{"page":241,"text":"to perform another mission, or transitions to the offense. In all cases, the senior commander must plan for the","rect":[108.01005554199219,183.1060028076172,540.0149812774658,174.01785278320313]},{"page":241,"text":"expected outcome of the delay. If commanders expect a friendly counterattack, they plan for the forward","rect":[108.01000213623047,194.6490478515625,539.9962062835693,185.54086303710938]},{"page":241,"text":"passage of the counterattack force, conserve resources to ensure combat superiority, and handover","rect":[108.01001739501953,206.17205810546876,539.9973657188416,197.06387329101563]},{"page":241,"text":"appropriate assigned areas.","rect":[108.01002502441406,217.63494873046876,216.05568981170655,208.52676391601563]},{"page":241,"text":"WITHDRAW","rect":[90.0,241.00802612304688,149.45119094848634,232.89602661132813]},{"page":241,"text":"11-71. A withdraw is to disengage from an enemy force and move in a direction away from the enemy","rect":[108.0,260.93426513671877,539.9853420257568,251.82608032226563]},{"page":241,"text":"(ADP 3-90). Commanders may or may not conduct a withdrawal under enemy pressure. Subordinate units","rect":[108.0,272.457275390625,540.0342547874451,263.3490905761719]},{"page":241,"text":"may withdraw without the entire force withdrawing. A unit conducts a withdrawal for the reasons listed at","rect":[107.98997497558594,283.9201354980469,539.9672617874146,274.81195068359377]},{"page":241,"text":"the beginning of this chapter. In addition, a withdrawal may precede a retirement operation.","rect":[107.98997497558594,295.4431457519531,474.4565382003784,286.3349609375]},{"page":241,"text":"11-72. Although commanders avoid withdrawing from action under enemy pressure, this is not always","rect":[107.98997497558594,312.9681396484375,539.9764544944763,303.8599548339844]},{"page":241,"text":"possible. They may conduct a withdrawal when the situation requires rapid action to save the command from","rect":[107.9899673461914,324.4309997558594,540.0631384811402,315.32281494140627]},{"page":241,"text":"disaster. This usually occurs after a tactical reverse or after a unit reaches its culminating point. When an","rect":[107.9899673461914,335.9540100097656,540.0073146820068,326.8458251953125]},{"page":241,"text":"aggressive enemy force becomes aware of a friendly force’s withdrawal or its intention to withdraw, the","rect":[107.9899673461914,347.4770202636719,540.0393343048096,338.36883544921877]},{"page":241,"text":"attacking enemy commander attempts to exploit the withdrawal, using all available capabilities to turn the","rect":[107.9899673461914,358.93988037109377,539.9522371368408,349.8316955566406]},{"page":241,"text":"friendly force’s withdrawal into a rout. The attacking enemy force may have ground and air superiority and","rect":[107.9899673461914,370.462890625,539.9173488616943,361.3547058105469]},{"page":241,"text":"continuously attempt to pursue, encircle, and destroy the withdrawing force. The attacking enemy","rect":[107.9899673461914,381.92578125,540.0304470062256,372.8175964355469]},{"page":241,"text":"commander may use a combination of direct pressure and enveloping forces and fires to isolate the","rect":[107.9899673461914,393.4487609863281,539.9973421173096,384.340576171875]},{"page":241,"text":"withdrawing friendly force.","rect":[107.9899673461914,404.97174072265627,218.2550916671753,395.8635559082031]},{"page":241,"text":"11-73. Withdrawals are inherently dangerous because they involve moving units to the rear and away from","rect":[107.9899673461914,422.4366455078125,540.0511755905152,413.3284606933594]},{"page":241,"text":"an enemy force. The heavier the fighting and the closer the contact with an enemy force, the more difficult","rect":[107.9899673461914,433.9596252441406,539.9531626663209,424.8514404296875]},{"page":241,"text":"the withdrawal. OPSEC is extremely important. A unit usually confines its rearward movement to times and","rect":[107.98994445800781,445.48260498046877,540.0891017913818,436.3744201660156]},{"page":241,"text":"conditions when an advancing enemy force cannot observe the movement, so that the enemy force cannot","rect":[107.99996948242188,456.94549560546877,539.9880747756959,447.8373107910156]},{"page":241,"text":"easily detect the operation. To retain the element of surprise and freedom of action, commanders consider","rect":[107.99996948242188,468.468505859375,540.0057275352478,459.3603210449219]},{"page":241,"text":"the enemy’s abilities to observe friendly movements. OPSEC is critical during the initial stages of a","rect":[107.99996948242188,479.9914855957031,540.0063142852783,470.88330078125]},{"page":241,"text":"withdrawal, when most of the functional and multifunctional support and sustainment elements displace.","rect":[107.99993896484375,491.4342956542969,526.7197217941284,482.3461608886719]},{"page":241,"text":"11-74. Units withdraw to assembly areas or new defensive positions. Alternatively, they can withdraw","rect":[107.99996185302735,508.9793701171875,540.0111737289428,499.8711853027344]},{"page":241,"text":"indirectly to either area through one or more intermediate positions. When preparing new positions,","rect":[107.98993682861328,520.5023193359375,539.9698438644409,511.3941345214844]},{"page":241,"text":"commanders balance the need for security with the need to establish the defense.","rect":[107.98993682861328,531.9652099609375,431.0107374191284,522.8570556640625]},{"page":241,"text":"Organization of Forces for a Withdrawal","rect":[90.0,556.520751953125,282.7813827438354,546.715576171875]},{"page":241,"text":"11-75. Commanders organize a withdrawing unit into a security force, a main body, and a reserve. They","rect":[108.0,574.0742797851563,540.0412502288818,564.9661254882813]},{"page":241,"text":"also organize a detachment left in contact and stay-behind forces if the scheme of maneuver requires them.","rect":[108.0,585.5371704101563,539.9421949386597,576.4290161132813]},{"page":241,"text":"Commanders avoid changing task organization unless subordinates have sufficient planning time. However,","rect":[107.9899673461914,597.0601806640625,539.9760084152222,587.9520263671875]},{"page":241,"text":"circumstances may dictate rapid task organization changes immediately before a withdrawal, such as when","rect":[107.9899673461914,608.5831909179688,539.9735012054443,599.4750366210938]},{"page":241,"text":"the unit must conduct an immediate withdrawal to prevent encirclement.","rect":[107.9899673461914,620.0260009765625,397.95449352264407,610.9378662109375]},{"page":241,"text":"11-76. The security force maintains contact with the enemy force until ordered to disengage or until another","rect":[107.9899673461914,637.571044921875,539.9831445274353,628.462890625]},{"page":241,"text":"force takes over. It simulates the continued presence of the main body, which requires additional allocation","rect":[107.9899673461914,649.0940551757813,540.0103664398193,639.9859008789063]},{"page":241,"text":"of combat multipliers beyond those normally allocated to a force of its size. The greater its mobility and","rect":[107.9899673461914,660.556884765625,540.0454616546631,651.44873046875]},{"page":241,"text":"range advantages over the enemy force, then the easier for the security force to cover the main body’s","rect":[107.9899673461914,672.0798950195313,539.9221332054138,662.9717407226563]},{"page":241,"text":"withdrawal. Commanders organize most available combat power to their security forces as a rear guard or a","rect":[107.9800033569336,683.6029052734375,540.0366487579346,674.4947509765625]},{"page":241,"text":"rear covering force, since the most probable threat to a withdrawing force is a pursuing enemy. However,","rect":[107.97996520996094,695.0657958984375,539.9222364425659,685.9576416015625]},{"page":241,"text":"security forces must maintain all around security of the withdrawing force. When an enemy force can","rect":[107.96994018554688,706.5888061523438,539.9733791351318,697.4806518554688]},{"page":241,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":241,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":241,"text":"11-13","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":242,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":242,"text":"infiltrate or insert forces ahead of the withdrawing force, commanders may establish an advance guard to","rect":[90.0,83.51434326171875,521.9186916351318,74.40616607666016]},{"page":242,"text":"clear the route or assigned areas. They designate a flank guard or screen, as the situation requires.","rect":[90.0,94.97723388671875,480.22112560272219,85.86905670166016]},{"page":242,"text":"11-77. When a security zone exists between the two main opposing forces, the existing security force can","rect":[90.01001739501953,112.4921875,521.9334621429443,103.3840103149414]},{"page":242,"text":"transition on order to a rear guard or rear covering force. It then conducts delay operations until commanders","rect":[90.01000213623047,124.01519775390625,521.9816424827576,114.90702056884766]},{"page":242,"text":"order it to disengage and break contact with the enemy force. When the withdrawing force is in close contact","rect":[90.01001739501953,135.47808837890626,521.9663462600709,126.36991119384766]},{"page":242,"text":"with the enemy force, a security zone does not normally exist. Withdrawals under these conditions require","rect":[90.01001739501953,147.00103759765626,521.9768953399658,137.89285278320313]},{"page":242,"text":"that security forces adopt different techniques. For example, the detachment left in contact establishes a way","rect":[90.01001739501953,158.5240478515625,521.9882717132568,149.41586303710938]},{"page":242,"text":"to break contact sequentially with the enemy force.","rect":[90.02002716064453,169.9869384765625,294.42312145233157,160.87875366210938]},{"page":242,"text":"11-78. The main body of the withdrawing force consists of all elements remaining after the senior","rect":[90.02002716064453,187.50189208984376,521.9941918907166,178.39370727539063]},{"page":242,"text":"commander resources a security force and reserve. Commanders in a withdrawal generally find it difficult to","rect":[90.02002716064453,199.02490234375,521.9440212249756,189.91671752929688]},{"page":242,"text":"resource a reserve, but they make every attempt to do so. When the complete formation withdraws under","rect":[90.02002716064453,210.48779296875,521.9549462852478,201.37960815429688]},{"page":242,"text":"pressure, the reserve may take limited offensive action, such as spoiling attacks, to disorganize, disrupt, and","rect":[90.02002716064453,222.01080322265626,522.1030788421631,212.90261840820313]},{"page":242,"text":"delay the enemy force. It can counter penetrations between positions, reinforce threatened areas, protect","rect":[90.02002716064453,233.4736328125,522.0597910842896,224.36544799804688]},{"page":242,"text":"withdrawal routes, and free encircled or heavily engaged forces.","rect":[90.02002716064453,244.99664306640626,346.6311902999878,235.88845825195313]},{"page":242,"text":"Withdrawal Control Measures","rect":[72.0,267.3937072753906,216.1399179420471,259.7955627441406]},{"page":242,"text":"11-79. Withdrawing forces protect themselves while simultaneously moving combat power away from","rect":[90.0,287.154296875,522.0433020553589,278.0461120605469]},{"page":242,"text":"enemy forces. This requires careful coordination among all forces. Throughout an operation, commanders","rect":[90.0,298.6171875,521.9846942405701,289.5090026855469]},{"page":242,"text":"strictly control rearward movement and maintain the ability to concentrate combat power at key times and","rect":[90.0,310.1401672363281,521.9731349945068,301.031982421875]},{"page":242,"text":"places. Figure 11-5 illustrates that commanders use the same control measures in the withdrawal that they","rect":[90.0,321.6632080078125,522.0131130218506,312.55499267578127]},{"page":242,"text":"employ in the delay or the defense. Withdrawal control measures also include the routes used by each unit in","rect":[89.98999786376953,333.1260681152344,521.9811305999756,324.01788330078127]},{"page":242,"text":"the withdrawal and their movement times.","rect":[89.98999786376953,342.625,258.8640089035034,335.5408630371094]},{"page":242,"text":"Figure 11-5. Example control measures for a withdrawal using a detachment left in contact","rect":[82.24452209472656,689.7679443359375,511.7698876914978,680.3792114257813]},{"page":242,"text":"11-14","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":242,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":242,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":243,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":243,"text":"Planning a Withdrawal","rect":[90.0,84.62071228027344,199.96250457000733,74.81556701660156]},{"page":243,"text":"11-80. Commanders plan and coordinate a withdrawal in the same manner as a delay, although some","rect":[108.0,102.11431884765625,540.0471468048096,93.00614166259766]},{"page":243,"text":"mission variables apply differently between a delay and a withdrawal. A withdrawal always begins under the","rect":[108.0,113.6373291015625,540.0631380157471,104.5291519165039]},{"page":243,"text":"threat of enemy interference. Because the force is most vulnerable if the enemy force attacks, commanders","rect":[108.0,125.16033935546875,539.9975116233826,116.05216217041016]},{"page":243,"text":"always plan for a withdrawal under pressure. They then develop contingencies for a withdrawal without","rect":[108.0,136.6231689453125,540.0641245803834,127.5149917602539]},{"page":243,"text":"pressure. In both cases, their main considerations are to—","rect":[108.0,148.1261444091797,339.5922660827637,139.03799438476563]},{"page":243,"text":" Plan a deliberate break from the enemy force.","rect":[133.1999969482422,161.63427734375,333.88469982147219,152.52609252929688]},{"page":243,"text":" Displace the main body rapidly, free of enemy interference.","rect":[133.1999969482422,175.13427734375,390.04387950897219,166.02609252929688]},{"page":243,"text":" Safeguard the withdrawal routes.","rect":[133.1999969482422,188.63427734375,283.42495250701907,179.52609252929688]},{"page":243,"text":" Retain sufficient maneuver and functional and multifunctional support and sustainment","rect":[133.1999969482422,202.11424255371095,540.0550303421021,193.02609252929688]},{"page":243,"text":"capabilities throughout the operation to support forces in contact with the enemy force.","rect":[151.1999969482422,213.65728759765626,499.2478895187378,204.54910278320313]},{"page":243,"text":"11-81. A withdrawal may be assisted or unassisted. It may or may not take place under enemy pressure.","rect":[108.00376892089844,231.12213134765626,539.9313306808472,222.01394653320313]},{"page":243,"text":"These two factors combined produce the four techniques shown in figure 11-6. The figure also depicts the","rect":[108.00376892089844,242.6451416015625,539.9956331329346,233.53695678710938]},{"page":243,"text":"tactical mission symbols for a withdrawal and a withdrawal under enemy pressure.","rect":[108.00379943847656,254.16815185546876,439.0041151046753,245.05996704101563]},{"page":243,"text":"Figure 11-6. Withdrawal techniques","rect":[231.06942749023438,493.98681640625,398.9474630279541,484.6882629394531]},{"page":243,"text":"11-82. Commanders prefer to conduct a withdrawal while not under pressure and without assistance. An","rect":[108.00376892089844,517.423583984375,540.0019435882568,508.3354187011719]},{"page":243,"text":"assisting unit requires commanders to add additional coordination and prompt unit actions. In a withdrawal","rect":[108.00376892089844,528.9666748046875,540.0771861038209,519.8585205078125]},{"page":243,"text":"under enemy pressure, all units withdraw simultaneously when available routes allow, using the tactics of a","rect":[108.00379943847656,540.4295654296875,540.0111360626221,531.3214111328125]},{"page":243,"text":"delay to fight their way to the rear. When the simultaneous withdrawal of all forces is not practical,","rect":[108.00379943847656,551.9525146484375,539.9219923019409,542.8443603515625]},{"page":243,"text":"commanders decide the order of withdrawal. Several factors influence their decision, including—","rect":[108.00379943847656,563.4755859375,498.2501640319824,554.367431640625]},{"page":243,"text":" Subsequent missions.","rect":[133.1999969482422,576.874267578125,237.34392833709718,567.7861328125]},{"page":243,"text":" Availability of transportation assets and routes.","rect":[133.1999969482422,590.394287109375,340.0048780441284,581.2861328125]},{"page":243,"text":" Disposition of friendly and enemy forces.","rect":[133.1999969482422,603.894287109375,317.83758068084719,594.7861328125]},{"page":243,"text":" Level and nature of enemy pressure.","rect":[133.1999969482422,617.394287109375,296.68239879608157,608.2861328125]},{"page":243,"text":" Degree of urgency associated with the withdrawal.","rect":[133.1999969482422,630.894287109375,354.15606212615969,621.7861328125]},{"page":243,"text":"11-83. Commanders must make three interrelated key decisions: when to start the movement of selected","rect":[107.9937515258789,648.4193115234375,539.9338283538818,639.3111572265625]},{"page":243,"text":"functional and multifunctional support and sustainment elements, when to start displacing forward elements,","rect":[107.9937973022461,659.9422607421875,539.9689893722534,650.8341064453125]},{"page":243,"text":"and when to start the security force’s disengagement operations. Commanders avoid premature actions that","rect":[107.9937744140625,671.4051513671875,539.9890513381959,662.2969970703125]},{"page":243,"text":"indicate a withdrawal to enemy forces. They anticipate enemy means of interference and plan for employing","rect":[107.99378204345703,682.92822265625,539.9771022796631,673.8200073242188]},{"page":243,"text":"security forces, lethal and nonlethal capabilities, and air assets.","rect":[107.9937973022461,694.451171875,359.3154249191284,685.343017578125]},{"page":243,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":243,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":243,"text":"11-15","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":244,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":244,"text":"11-84. Commanders conducting a withdrawal without enemy pressure can plan when to begin the","rect":[90.0,83.51434326171875,522.0230379180908,74.40616607666016]},{"page":244,"text":"withdrawal. They have the option of taking risks to increase the displacement capabilities of the withdrawing","rect":[90.0,94.97723388671875,521.9928493499756,85.86905670166016]},{"page":244,"text":"force. For example, commanders may order their main bodies to conduct tactical road marches instead of","rect":[90.0,106.500244140625,521.8739526329041,97.3920669555664]},{"page":244,"text":"moving in tactical formations. They can plan for stay-behind forces as part of their operations.","rect":[90.00000762939453,118.023193359375,467.1448926925659,108.9150161743164]},{"page":244,"text":"11-85.","rect":[90.0,133.4440155029297,115.84157848358155,126.5602798461914]},{"page":244,"text":"","rect":[115.19999694824219,146.24545288085938,121.16105696249008,141.55320739746095]},{"page":244,"text":"","rect":[115.19999694824219,159.74545288085938,121.16105696249008,155.05320739746095]},{"page":244,"text":"","rect":[115.19999694824219,173.24545288085938,121.16105696249008,168.55320739746095]},{"page":244,"text":"","rect":[115.19999694824219,186.74545288085938,121.16105696249008,182.05320739746095]},{"page":244,"text":"","rect":[115.19999694824219,200.24545288085938,121.16105696249008,195.55320739746095]},{"page":244,"text":"A withdrawing force can receive assistance from another force in the form of—","rect":[124.55897521972656,135.48809814453126,443.2641410827637,126.37992095947266]},{"page":244,"text":"Additional security for the area through which the withdrawing force will pass.","rect":[133.1999969482422,148.97430419921876,449.7445020675659,139.86611938476563]},{"page":244,"text":"Information concerning withdrawal routes.","rect":[133.1999969482422,162.47430419921876,304.8175001144409,153.36611938476563]},{"page":244,"text":"Forces to secure choke points or key terrain along withdrawal routes.","rect":[133.1999969482422,175.97430419921876,409.4846143722534,166.86611938476563]},{"page":244,"text":"Elements to assist in movement control, such as military police to conduct traffic control points.","rect":[133.1999969482422,189.47430419921876,517.5972852706909,180.36611938476563]},{"page":244,"text":"Required maneuver and functional and multifunctional support and sustainment, which can","rect":[133.1999969482422,202.9542694091797,522.0250148773193,193.86611938476563]},{"page":244,"text":"involve conducting a counterattack to assist the withdrawing unit in disengaging from enemy","rect":[133.1999969482422,214.497314453125,522.0059108734131,205.38912963867188]},{"page":244,"text":"forces.","rect":[133.1999969482422,223.93617248535157,160.18285655975343,216.86204528808595]},{"page":244,"text":"Preparing for a Withdrawal","rect":[72.0,250.58067321777345,204.29252165985108,240.77552795410157]},{"page":244,"text":"11-86. Before withdrawing, the main body dispatches quartering parties to help it occupy the new position.","rect":[90.0,268.13427734375,521.9901685714722,259.0260925292969]},{"page":244,"text":"In an unassisted withdrawal, the withdrawing unit establishes its own security force and reserve. It","rect":[90.0,279.65728759765627,522.0262827835084,270.5491027832031]},{"page":244,"text":"reconnoiters and secures the routes it uses for its rearward movement while sustaining itself during the","rect":[90.0,291.1201477050781,522.0371370391846,282.011962890625]},{"page":244,"text":"withdrawal. The withdrawing unit must disengage from enemy forces.","rect":[90.0,302.6431579589844,371.6272840499878,293.53497314453127]},{"page":244,"text":"11-87. Concealing supplies along movement routes can simplify support requirements and reduce the","rect":[90.0,320.16815185546877,522.0502595977783,311.0599670410156]},{"page":244,"text":"enemy force’s ability to interfere with logistics operations. This allows sustainment units to withdraw earlier","rect":[90.0,331.6310119628906,521.9800927696228,322.5228271484375]},{"page":244,"text":"than they otherwise could. Commanders carefully consider whether to place supplies in caches. Once cached,","rect":[90.00000762939453,343.1540222167969,522.0713453292847,334.04583740234377]},{"page":244,"text":"supplies are difficult to recover if an operation does not go as planned. Other than medical items, a","rect":[90.00000762939453,354.61688232421877,522.0093660430908,345.5086975097656]},{"page":244,"text":"withdrawing unit evacuates or destroys all supplies that it cannot evacuate to prevent their capture.","rect":[89.9999771118164,366.139892578125,522.0342969894409,357.0317077636719]},{"page":244,"text":"Commanders establish destruction criteria for each class of supply by both time and event.","rect":[89.9999771118164,377.66290283203127,452.08758068084719,368.5547180175781]},{"page":244,"text":"Executing a Withdrawal","rect":[72.0,402.26068115234377,186.8881332321167,392.45556640625]},{"page":244,"text":"11-88. Typically, when under enemy pressure, the force facing the least amount of contact withdraws first.","rect":[90.0,419.7543029785156,521.9840650558472,410.6461181640625]},{"page":244,"text":"The more heavily engaged forces generally withdraw supported by indirect fires and a security force, if","rect":[90.0,431.2773132324219,522.0283715782166,422.16912841796877]},{"page":244,"text":"available. Withdrawing forces take advantage of obstacles to assist in breaking contact with the enemy force.","rect":[90.0,442.80029296875,522.0084180831909,433.6921081542969]},{"page":244,"text":"They conduct night movements and use obscuration to screen friendly movement reducing the accuracy of","rect":[90.0,454.26318359375,521.9016015586853,445.1549987792969]},{"page":244,"text":"enemy direct and indirect fires and enemy observations of friendly movements. The security force continues","rect":[90.0,465.78619384765627,522.0564105491638,456.6780090332031]},{"page":244,"text":"to use alternate and subsequent positions until the entire friendly force breaks contact with the enemy force.","rect":[90.0,477.3091735839844,520.7274732589722,468.20098876953127]},{"page":244,"text":"11-89. The security force may remain in position as part of tactical deception. The main body moves","rect":[90.0,494.7740478515625,522.0402362327576,485.6658630371094]},{"page":244,"text":"rearward to intermediate or final positions as rapidly as possible. After the main body withdraws to a safe","rect":[90.0,506.29705810546877,521.9743928985596,497.1888732910156]},{"page":244,"text":"distance, the security force begins its rearward movement. Once the security force begins moving, it assumes","rect":[90.0,517.7598876953125,522.0371844749451,508.6517028808594]},{"page":244,"text":"the duties of a rear guard. Even if the enemy force does not pursue the withdrawing force, the security force","rect":[90.0,529.282958984375,522.0383577423096,520.1748046875]},{"page":244,"text":"continues to act as the rear guard unless commanders assign that mission to another element. However, if not","rect":[90.0,540.805908203125,522.0937876663209,531.69775390625]},{"page":244,"text":"pursued by the enemy force, the security force may remain in a march column.","rect":[90.0,552.268798828125,405.2864942550659,543.16064453125]},{"page":244,"text":"11-90. The main body moves rapidly on multiple routes to reconnoitered positions. It may occupy a series","rect":[90.0,569.7837524414063,522.0522601585388,560.6755981445313]},{"page":244,"text":"of intermediate positions before completing the withdrawal. Usually functional and multifunctional support","rect":[89.98997497558594,581.3067626953125,522.0744395217896,572.1986083984375]},{"page":244,"text":"units and their convoy escorts, move first, and precede combat units in the withdrawal. Commanders ensure","rect":[89.98997497558594,592.7696533203125,522.1125154571533,583.6614990234375]},{"page":244,"text":"the disciplined use of routes during a withdrawal, despite confusion and enemy pressure.","rect":[89.9999771118164,604.2926025390625,444.94744396209719,595.1844482421875]},{"page":244,"text":"11-91. When the main body withdraws, its reserve remains well forward to assist the security force and","rect":[89.9999771118164,621.817626953125,521.9835109710693,612.70947265625]},{"page":244,"text":"other units by employing supporting direct and indirect fires and counterattacks. The reserve can launch","rect":[89.9999771118164,633.280517578125,521.9932765960693,624.17236328125]},{"page":244,"text":"spoiling attacks to disorganize and delay the enemy force and extricate encircled or heavily engaged forces.","rect":[89.9999771118164,644.803466796875,520.3413648605347,635.6953125]},{"page":244,"text":"11-92. If the security force and the reserve cannot prevent the enemy force from closing on the main body,","rect":[89.9999771118164,662.3284912109375,522.0973463058472,653.2203369140625]},{"page":244,"text":"commanders commit some or all of the main body to prevent the enemy force from further interfering with","rect":[89.98995971679688,673.7913208007813,521.8486232757568,664.6831665039063]},{"page":244,"text":"the withdrawal. If the security force fails to slow the enemy force, the main body delays or defends. In this","rect":[89.98995971679688,685.3143310546875,521.9868915061951,676.2061767578125]},{"page":244,"text":"event, the withdrawal resumes at the earliest possible time. If the enemy force blocks movement to the rear,","rect":[89.98995971679688,696.8373413085938,522.0274610519409,687.7291870117188]},{"page":244,"text":"commanders can direct their units to alternate routes to bypass the enemy force. Alternatively, the","rect":[89.98995971679688,708.3001708984375,521.9823885040283,699.1920166015625]},{"page":244,"text":"withdrawing force can attack through the enemy force.","rect":[89.98999786376953,719.8232421875,309.39702892303469,710.715087890625]},{"page":244,"text":"11-16","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":244,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":244,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":245,"text":"Retrograde","rect":[492.0,46.34102249145508,539.9700034179688,38.016021728515628]},{"page":245,"text":"Terminating a Withdrawal","rect":[90.0,84.62071228027344,217.14071196746827,74.81556701660156]},{"page":245,"text":"11-93. Once the withdrawing force successfully disengages from the enemy force, it has two options. It can","rect":[108.0,102.11431884765625,540.0513210296631,93.00614166259766]},{"page":245,"text":"rejoin the overall defense under conditions that are more favorable, or it can transition into a retirement and","rect":[108.0,113.6373291015625,540.0273342132568,104.51913452148438]},{"page":245,"text":"continue to move away from the enemy force and toward its next mission.","rect":[108.0,125.16033935546875,404.86358165740969,116.05216217041016]},{"page":245,"text":"RETIREMENT","rect":[90.0,148.51272583007813,156.7467131614685,140.43600463867188]},{"page":245,"text":"11-94. A retirement is when a force out of contact moves away from the enemy (ADP 3-90). A retiring unit","rect":[108.0,168.414306640625,540.0984873733521,159.30612182617188]},{"page":245,"text":"organizes for combat, but it does not anticipate interference from enemy ground forces. Retirement operations","rect":[108.00997924804688,179.93731689453126,540.0703875999451,170.82913208007813]},{"page":245,"text":"are usually conducted to reposition forces for future operations or to accommodate the current concept of","rect":[108.00997924804688,191.4603271484375,539.9914453086853,182.35214233398438]},{"page":245,"text":"operations. Typically, another unit’s security force covers the movement of one formation as the unit","rect":[108.00997924804688,202.9232177734375,540.0804820022584,193.81503295898438]},{"page":245,"text":"conducts a retirement. However, enemy mobile forces, unconventional forces, air strikes, air assault","rect":[107.99995422363281,214.4461669921875,540.0172495803834,205.33798217773438]},{"page":245,"text":"operations, or long-range fires may attempt to interdict the retiring unit. Commanders plan for enemy actions","rect":[107.99996185302735,225.96917724609376,540.1243426780701,216.86099243164063]},{"page":245,"text":"and organize their forces to fight in self-defense.","rect":[107.99996948242188,237.43206787109376,302.4350538253784,228.32388305664063]},{"page":245,"text":"11-95. When a withdrawal from action precedes a retirement, the actual retirement begins after the unit","rect":[107.98992919921875,254.95703125,540.0513071975709,245.84884643554688]},{"page":245,"text":"breaks contact and organizes into its march formation organization. (While a force withdrawing without","rect":[107.98990631103516,266.48004150390627,540.0510020217896,257.3718566894531]},{"page":245,"text":"enemy pressure can also use march columns, the difference between the two situations is the probability of","rect":[107.98990631103516,277.94293212890627,540.0262963829041,268.8347473144531]},{"page":245,"text":"enemy interference.) Units conduct retirements as tactical road marches where security and speed are the","rect":[107.98990631103516,289.4659423828125,539.9342317657471,280.3577575683594]},{"page":245,"text":"most important considerations.","rect":[107.98999786376953,300.9689025878906,231.57067394256593,291.8807678222656]},{"page":245,"text":"11-96. Each retiring unit generally moves toward an assembly area, which should support the preparations","rect":[107.98998260498047,318.45379638671877,540.0482318382263,309.3456115722656]},{"page":245,"text":"for the unit’s next mission. Commanders consider unit capabilities to support defensive actions, if combat","rect":[107.98997497558594,329.9567565917969,539.9791636428834,320.8686218261719]},{"page":245,"text":"occurs during the retirement, when determining routes to assembly areas.","rect":[107.98997497558594,341.49981689453127,401.0200147628784,332.3916320800781]},{"page":245,"text":"11-97. The initial action in a retirement is to move sustainment units and supplies to the rear. At the","rect":[107.98997497558594,358.9446105957031,540.0572786407471,349.8564758300781]},{"page":245,"text":"designated time, the retiring unit executes a withdrawal from action and forms into a march formation. The","rect":[107.98999786376953,370.4876708984375,540.0044221954346,361.37939453125]},{"page":245,"text":"unit can first move into an assembly area, if this step is necessary, before moving into a march formation to","rect":[107.98998260498047,381.9505310058594,540.0151271820068,372.84234619140627]},{"page":245,"text":"reestablish command and control or resupply. Once it forms a march formation, the force is prepared to","rect":[107.98998260498047,393.4735107421875,539.9735622406006,384.3653259277344]},{"page":245,"text":"initiate the retirement. During the initial phase, the force retires in multiple small columns. As the distance","rect":[107.97994995117188,404.99652099609377,539.8779573516846,395.8883361816406]},{"page":245,"text":"from the enemy force increases, smaller columns can consolidate into larger ones for ease of movement","rect":[107.97994995117188,416.45941162109377,539.9922862014771,407.3512268066406]},{"page":245,"text":"control. The number of routes and the potential for enemy contact influence how and when this occurs.","rect":[107.97994995117188,427.9823913574219,520.1024122238159,418.87420654296877]},{"page":245,"text":"Organization of Forces for a Retirement","rect":[90.0,452.54071044921877,279.0722334022522,442.735595703125]},{"page":245,"text":"11-98. Commanders normally designate security elements and a main body in a retirement. Figure 11-7 on","rect":[108.0,470.09429931640627,540.0271511077881,460.9861145019531]},{"page":245,"text":"page 11-18 illustrates this organization of forces. The formations employed during a retirement depend on","rect":[108.0,481.55718994140627,539.9992580413818,472.4490051269531]},{"page":245,"text":"the number of available routes and the potential for enemy interference. Commanders typically move major","rect":[108.0,493.0801696777344,539.9719140586853,483.96197509765627]},{"page":245,"text":"elements to the rear simultaneously. However, limited roles or a flank threat may require echeloning of the","rect":[108.0,504.5430603027344,540.0344514923096,495.43487548828127]},{"page":245,"text":"movement in terms of time and ground locations.","rect":[108.0,516.0660400390625,305.26470470428469,506.9578552246094]},{"page":245,"text":"11-99. The terrain and the enemy threat dictate whether a retiring force establishes a single rear security","rect":[108.0,533.591064453125,539.8954982757568,524.48291015625]},{"page":245,"text":"force, which is usually a rear guard, or whether each column forms a separate rear security force. These","rect":[108.0,545.053955078125,540.0225496368408,535.94580078125]},{"page":245,"text":"security forces protect the rearward moving columns from surprise, harassment, and attack by any pursuing","rect":[108.0,556.576904296875,540.0320949554443,547.46875]},{"page":245,"text":"enemy force. Their size and composition depend on the strength and imminence of the enemy threat. These","rect":[108.0,568.0999145507813,540.0035677032471,558.9917602539063]},{"page":245,"text":"security elements generally remain in march columns unless potential exists for enemy interference. If an","rect":[108.0,579.5628051757813,539.9861354827881,570.4546508789063]},{"page":245,"text":"enemy force establishes contact, the rear security element conducts a delay.","rect":[108.0,591.0858154296875,410.12920665740969,581.9776611328125]},{"page":245,"text":"11-100. The retiring march columns normally require an advance guard augmented by engineers focused on","rect":[108.0,608.6107788085938,540.0875759124756,599.5026245117188]},{"page":245,"text":"mobility. Commanders focus their engineers supporting their rear guards on countermobility. They assign","rect":[107.9999771118164,620.07373046875,539.9300441741943,610.9655151367188]},{"page":245,"text":"flank security elements to prevent potential enemy interference with their retiring force’s extended columns.","rect":[108.0,631.5966796875,539.9822950363159,622.488525390625]},{"page":245,"text":"Commanders may designate flank security responsibilities to subordinate march units.","rect":[107.99996185302735,643.11962890625,452.9836072921753,634.011474609375]},{"page":245,"text":"11-101. The main body organizes in a manner opposite that of an approach march. The movement of","rect":[107.99996185302735,660.5845336914063,539.9631860313416,651.4763793945313]},{"page":245,"text":"functional and multifunctional support and sustainment units ideally precedes the movement of combat","rect":[107.99996185302735,672.1075439453125,540.0652232131959,662.9993896484375]},{"page":245,"text":"forces. When necessary, elements of the main body can reinforce the rear guard or any other security element.","rect":[107.99996185302735,683.6304931640625,540.0087842941284,674.5223388671875]},{"page":245,"text":"Because fire support elements and attack aviation elements of the main body can respond rapidly, they are","rect":[107.99996185302735,695.0933837890625,539.9258089141846,685.9852294921875]},{"page":245,"text":"usually the first elements tasked for this mission.","rect":[108.0,706.6163940429688,303.58343029022219,697.5082397460938]},{"page":245,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":245,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":245,"text":"11-17","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":246,"text":"Chapter 11","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":246,"text":"Figure 11-7. Example organization of forces for a retirement","rect":[155.27999877929688,424.3141784667969,438.69869018173218,414.9254455566406]},{"page":246,"text":"Retirement Control Measures ","rect":[72.0,452.6737365722656,215.16269397735597,445.0755920410156]},{"page":246,"text":"11-102. The control measures used in a retirement are the same as those in a delay and a withdrawal. As in","rect":[90.0,472.4342956542969,522.0006008148193,463.32611083984377]},{"page":246,"text":"a withdrawal, thorough planning and strict adherence to routes and movement times facilitate an orderly","rect":[89.98998260498047,483.9573059082031,521.9376735687256,474.84912109375]},{"page":246,"text":"retirement. Typically, commanders control movement using movement times, routes, and checkpoints.","rect":[89.98999786376953,495.420166015625,500.73064708709719,486.3119812011719]},{"page":246,"text":"11-18","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":246,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":246,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":247,"text":"PART FOUR","rect":[280.0199890136719,127.39201354980469,350.0039963378906,118.52400970458985]},{"page":247,"text":"Enabling Operations","rect":[222.05999755859376,160.5751495361328,407.881608291626,142.75341796875]},{"page":247,"text":"Enabling operations are operations that connect offensive, defensive, and stability","rect":[108.0,185.2348175048828,521.9943332672119,174.94656372070313]},{"page":247,"text":"operations together. On their own, they are not decisive, but they help set conditions","rect":[108.0,197.8947296142578,521.9702243804932,187.59548950195313]},{"page":247,"text":"for the execution of all operations. They are complex enough that they require a either","rect":[107.98900604248047,210.55470275878907,521.9909956092835,200.26644897460938]},{"page":247,"text":"a deliberate planning effort or a well developed and understood SOP to execute. Part","rect":[107.98902893066406,223.21461486816407,521.9754135055542,212.91537475585938]},{"page":247,"text":"Four consists of nine chapters that describe reconnaissance, security operations,","rect":[107.98902893066406,235.8745880126953,522.0448104782105,225.58633422851563]},{"page":247,"text":"troop movement, relief in place, passage of lines, countermobility, mobility, tactical","rect":[107.98902893066406,248.47962951660157,521.9577625350952,238.19137573242188]},{"page":247,"text":"deception, and link-up operations.","rect":[107.98902893066406,261.0187683105469,273.13920134735107,250.98304748535157]},{"page":247,"text":"Chapter 12","rect":[283.97998046875,331.8119812011719,345.97317797851567,320.7239990234375]},{"page":247,"text":"Reconnaissance","rect":[251.8800048828125,353.1562194824219,378.1272130279541,341.50970458984377]},{"page":247,"text":"This chapter ","rect":[126.0,390.9587707519531,189.35460376739503,380.9999084472656]},{"page":247,"text":"addresses ","rect":[195.30575561523438,389.0,240.12390613555909,380.9999084472656]},{"page":247,"text":"general ","rect":[246.13983154296876,390.980712890625,281.23740100860598,380.9999084472656]},{"page":247,"text":"reconnaissance ","rect":[287.18853759765627,389.0,356.50095081329348,380.9999084472656]},{"page":247,"text":"considerations,","rect":[362.4521179199219,389.0,428.8076219558716,380.9999084472656]},{"page":247,"text":"reconnaissance","rect":[437.4587707519531,388.76275634765627,504.0305153045654,380.9999084472656]},{"page":247,"text":"fundamentals, reconnaissance management,","rect":[126.0,403.6406555175781,327.01739978790286,393.65985107421877]},{"page":247,"text":"forms","rect":[333.7855224609375,401.4226989746094,359.4095560035706,393.67083740234377]},{"page":247,"text":"of reconnaissance operations,","rect":[366.24237060546877,403.61871337890627,504.07867908477786,393.65985107421877]},{"page":247,"text":"reconnaissance methods, and recuperation and reconstitution of reconnaissance assets.","rect":[126.0,416.2786560058594,504.0581407546997,406.3197937011719]},{"page":247,"text":"(See FM 3-98 for more detail on reconnaissance operations.)","rect":[126.0,428.9385986328125,393.2312605018616,418.979736328125]},{"page":247,"text":"GENERAL RECONNAISSANCE CONSIDERATIONS","rect":[90.0,454.2897033691406,425.26000132751468,444.6015625]},{"page":247,"text":"12-1. Reconnaissance is a mission undertaken to obtain information about the activities and resources of an","rect":[108.0,472.57025146484377,540.0804958343506,465.4861145019531]},{"page":247,"text":"enemy or adversary, or to secure data concerning the meteorological, hydrographic, geographic or other","rect":[107.98997497558594,486.05718994140627,540.0203149375916,476.9490051269531]},{"page":247,"text":"characteristics of a particular area, by visual observation or other detection methods (JP 2-0). Reconnaissance","rect":[107.98998260498047,497.5801696777344,540.0031404571533,488.47198486328127]},{"page":247,"text":"is one part of information collection; the other three parts that comprise information collection are security,","rect":[108.0,509.1031799316406,539.8666334152222,499.9949951171875]},{"page":247,"text":"intelligence operations, and surveillance. Surveillance is the systematic observation of aerospace, cyberspace,","rect":[108.0,520.5660400390625,540.0472974777222,511.4578552246094]},{"page":247,"text":"surface or subsurface areas, places, persons, or things by visual, aural, electronic, photographic, or other","rect":[107.99996185302735,532.0890502929688,539.9967553672791,522.9808959960938]},{"page":247,"text":"means (JP 3-0). Although there are similarities between reconnaissance and surveillance to facilitate","rect":[107.99996185302735,543.612060546875,539.9419221954346,534.50390625]},{"page":247,"text":"information collection, reconnaissance collection uses multiple means, including surveillance, to find","rect":[107.98994445800781,555.074951171875,540.0223903656006,545.966796875]},{"page":247,"text":"information by systematically checking multiple locations in a designated operational area. Instead of","rect":[107.98994445800781,566.597900390625,540.0844018516541,557.48974609375]},{"page":247,"text":"focusing on one specific piece of required information, reconnaissance can help provide units with a broader","rect":[107.9898681640625,578.1209716796875,540.0891015586853,569.0128173828125]},{"page":247,"text":"understanding of the impacts the terrain, weather, and enemy that ultimately assists the higher headquarters","rect":[107.9898681640625,589.5838012695313,539.9199969749451,580.4756469726563]},{"page":247,"text":"planning efforts. Whereas surveillance is more persistent and looming and tends to be more passive. Units","rect":[107.9798583984375,601.1068115234375,539.9761493186951,591.9986572265625]},{"page":247,"text":"perform reconnaissance tasks before, during, and after other operations to obtain information that","rect":[107.9798583984375,612.5697021484375,540.0190195999146,603.4615478515625]},{"page":247,"text":"commanders and their staffs use in the IPB process so they can formulate, confirm, or modify enemy courses","rect":[107.9798583984375,624.0926513671875,540.0393207054138,614.9844970703125]},{"page":247,"text":"of action and to drive planned or unplanned commander decisions within the friendly plan.","rect":[107.9798583984375,635.6156616210938,471.2740125656128,626.5075073242188]},{"page":247,"text":"12-2. Reconnaissance identifies terrain characteristics, enemy and friendly obstacles to movement, and the","rect":[107.9798583984375,653.08056640625,540.0051546173096,643.972412109375]},{"page":247,"text":"disposition of enemy forces and the civilian population, so units can maneuver their forces freely and rapidly.","rect":[107.9798583984375,664.603515625,540.0974683761597,655.495361328125]},{"page":247,"text":"Reconnaissance prior to unit movements and occupation of assembly areas is critical to protecting friendly","rect":[107.9798583984375,676.1265258789063,539.9761867523193,667.0183715820313]},{"page":247,"text":"forces and preserving combat power. Units also perform reconnaissance to keep their forces free from contact","rect":[107.9798583984375,687.5894165039063,540.0723032913209,678.4812622070313]},{"page":247,"text":"as long as possible so that they can concentrate on their main effort. Leaders at every echelon disseminate","rect":[107.9798583984375,699.1124267578125,539.9615755157471,690.0042724609375]},{"page":247,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":247,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":247,"text":"12-1","rect":[504.00299072265627,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":248,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":248,"text":"information to emphasize the importance of reporting to their Soldiers and rapidly updating digital and analog","rect":[90.0,83.51434326171875,522.0223293304443,74.40616607666016]},{"page":248,"text":"systems to reflect friendly, enemy, and neutral activities.","rect":[90.0,94.97723388671875,316.5440320968628,85.86905670166016]},{"page":248,"text":"RECONNAISSANCE FUNDAMENTALS","rect":[72.0,118.34220886230469,247.07620811462403,110.25601196289063]},{"page":248,"text":"12-3.","rect":[90.0,136.25022888183595,110.86164379119873,129.3665008544922]},{"page":248,"text":"There are seven fundamentals of successful reconnaissance operations:","rect":[115.20030212402344,138.27427673339845,399.26731061553957,129.18612670898438]},{"page":248,"text":" Ensure continuous reconnaissance.","rect":[115.19999694824219,149.77027893066407,272.9239454269409,142.68612670898438]},{"page":248,"text":" Do not keep reconnaissance assets in reserve.","rect":[115.19999694824219,165.27427673339845,315.0980176925659,156.18612670898438]},{"page":248,"text":" Orient on the reconnaissance objective.","rect":[115.19999694824219,178.7943115234375,290.68032360076907,169.67611694335938]},{"page":248,"text":" Report all required information rapidly and accurately.","rect":[115.19999694824219,192.2943115234375,352.3034315109253,183.18612670898438]},{"page":248,"text":" Retain freedom of maneuver.","rect":[115.19999694824219,203.77027893066407,250.36083507537843,196.68612670898438]},{"page":248,"text":" Gain and maintain enemy contact.","rect":[115.19999694824219,219.2943115234375,270.04314708709719,210.18612670898438]},{"page":248,"text":" Develop the situation rapidly.","rect":[115.19999694824219,232.7943115234375,252.10334300994874,223.68612670898438]},{"page":248,"text":"Ensure Continuous Reconnaissance","rect":[72.0,255.21371459960938,239.4240852508545,247.6155548095703]},{"page":248,"text":"12-4. Effective reconnaissance is continuous. Units conduct reconnaissance before, during, and after all their","rect":[90.0,274.914306640625,522.0537011680603,265.8061218261719]},{"page":248,"text":"operations. Reconnaissance gathers information that commanders use when deciding to execute current,","rect":[90.0,286.43731689453127,521.9709424972534,277.3291320800781]},{"page":248,"text":"branch, or sequel plans. The nature of priority intelligence requirements (PIRs) and information requirements","rect":[90.0,297.9602966308594,522.0614154319763,288.85211181640627]},{"page":248,"text":"change as operations transition. Units employ reconnaissance assets to report friendly unit locations, status,","rect":[89.99996185302735,309.4231872558594,521.9828443527222,300.31500244140627]},{"page":248,"text":"and sustainment requirements during chaotic situations. It is important that all Soldiers act as sensors and","rect":[89.99996185302735,320.9461975097656,522.0472927093506,311.8380126953125]},{"page":248,"text":"report their observations in a timely manner.","rect":[89.99996185302735,332.46917724609377,268.0654249191284,323.3609924316406]},{"page":248,"text":"12-5. Before operations, reconnaissance fills gaps in information about enemy forces, the terrain, and civil","rect":[89.99996185302735,349.9340515136719,521.9123911819459,340.82586669921877]},{"page":248,"text":"considerations. During operations, reconnaissance assets provide units with updated information that verifies","rect":[89.99996185302735,361.4570617675781,521.9488666038513,352.348876953125]},{"page":248,"text":"their enemy forces’ composition, dispositions, and intentions. This allows those commanders to verify which","rect":[89.99996185302735,372.919921875,522.0431423187256,363.8117370605469]},{"page":248,"text":"potential COAs enemy forces are attempting to execute. It also allows commanders to determine if their plans","rect":[89.99996948242188,384.44293212890627,522.1388690452576,375.3347473144531]},{"page":248,"text":"are still valid based on ongoing events within their assigned areas. After operations, reconnaissance elements","rect":[90.0099868774414,395.9659423828125,522.0071551780701,386.8577575683594]},{"page":248,"text":"maintain contact with enemy forces to determine the enemy’s next move. At a minimum, units ensure the","rect":[90.0099868774414,407.4288024902344,521.9872102813721,398.32061767578127]},{"page":248,"text":"continuous conduct of reconnaissance as part of all their security missions. This includes the performance of","rect":[89.99996185302735,418.9517822265625,522.0351464805603,409.8435974121094]},{"page":248,"text":"local security by forces not currently in contact.","rect":[89.99996185302735,430.47479248046877,281.0242567062378,421.3666076660156]},{"page":248,"text":"12-6. Reconnaissance performed over extended distances and time requires units to pace or rotate their","rect":[89.99996185302735,447.9195861816406,521.9521386680603,438.8314514160156]},{"page":248,"text":"reconnaissance assets to maintain continuous coverage. Scouts require time for rest, resupply, training, and","rect":[89.99996185302735,459.462646484375,521.9145412445068,450.3544616699219]},{"page":248,"text":"the performance of troop leading procedures. Technical reconnaissance assets require time for preventive","rect":[89.99996185302735,470.98565673828127,522.0062532501221,461.8774719238281]},{"page":248,"text":"maintenance checks and services. Commanders determine where, and when, they require maximum","rect":[89.99992370605469,482.4485168457031,522.0581946334839,473.34033203125]},{"page":248,"text":"reconnaissance efforts and then manage their available reconnaissance assets to ensure their availability at","rect":[89.99992370605469,493.97149658203127,522.0228648147584,484.8633117675781]},{"page":248,"text":"critical times and places.","rect":[89.99992370605469,505.4744567871094,188.85525035858155,496.3863220214844]},{"page":248,"text":"Do Not Keep Reconnaissance Assets in Reserve","rect":[72.0,529.978759765625,293.12185441589357,520.195556640625]},{"page":248,"text":"12-7. Commanders never keep their reconnaissance assets in reserve. This does not mean that units commit","rect":[90.0,547.5343017578125,522.0117564163209,538.4461669921875]},{"page":248,"text":"all their assets all the time. When committed, reconnaissance assets use all their resources to accomplish the","rect":[90.0,559.0572509765625,522.0509309844971,549.9691162109375]},{"page":248,"text":"mission. They use their reconnaissance assets based on their capabilities and the mission variables to achieve","rect":[90.0,570.5401611328125,522.0768098907471,561.4320068359375]},{"page":248,"text":"the maximum coverage needed to answer their critical information requirements. At times, this requires them","rect":[90.01001739501953,582.0631713867188,522.0884070358277,572.9550170898438]},{"page":248,"text":"to task, re-assign, or minimize the reconnaissance assets to ensure their availability at critical times and","rect":[90.01001739501953,593.586181640625,522.0262966156006,584.47802734375]},{"page":248,"text":"places. They do not recover and sustain reconnaissance assets by placing them in the reserve. They consider","rect":[90.01001739501953,605.049072265625,522.0461328086853,595.94091796875]},{"page":248,"text":"all their reconnaissance assets as committed assets with specific missions at all times. They may keep units","rect":[90.01001739501953,616.572021484375,521.9481952171326,607.4638671875]},{"page":248,"text":"with multiple roles that can conduct reconnaissance, security, and other combat missions in an economy of","rect":[90.01005554199219,628.0950927734375,521.9870507774353,618.9869384765625]},{"page":248,"text":"force role as their reserve for future security or combat missions.","rect":[90.01005554199219,639.5579223632813,349.0721387863159,630.4497680664063]},{"page":248,"text":"Orient on the Reconnaissance Objective","rect":[72.0,664.1607055664063,259.65144120788576,654.3555297851563]},{"page":248,"text":"12-8. Commanders use their reconnaissance objectives to focus reconnaissance efforts. Reconnaissance","rect":[90.0,681.7142944335938,522.0674104766846,672.5960693359375]},{"page":248,"text":"objective is the most important result desired from that specific reconnaissance effort. The objective can","rect":[89.99996185302735,693.1771850585938,521.9772243499756,684.0589599609375]},{"page":248,"text":"be either threat or terrain based, depending on what type of operation a battalion or higher echelon is","rect":[89.99996185302735,704.7001953125,522.0453631858826,695.592041015625]},{"page":248,"text":"conducting. Every reconnaissance mission specifies a reconnaissance objective by priority, intent, and the","rect":[89.98994445800781,716.22314453125,521.9383821563721,707.1049194335938]},{"page":248,"text":"12-2","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":248,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":248,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":249,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":249,"text":"information to obtain. Commanders assign reconnaissance objectives based on PIRs resulting from the IPB","rect":[108.0,83.51434326171875,540.0439970436096,74.39614868164063]},{"page":249,"text":"process and the reconnaissance asset’s capabilities and limitations. A reconnaissance objective can be","rect":[108.0,94.97723388671875,539.9346590118408,85.85903930664063]},{"page":249,"text":"information about a specific geographic location, such as the cross-country trafficability of a specific area,","rect":[108.0,106.500244140625,540.0122632980347,97.3920669555664]},{"page":249,"text":"to confirm or deny a specific activity of a threat, or to specify the location of a threat such as a specific piece","rect":[108.0,118.023193359375,539.9541292266846,108.9150161743164]},{"page":249,"text":"of equipment or an entire system. Furthermore, reconnaissance units use their reconnaissance objective to","rect":[108.01001739501953,129.486083984375,539.9429836273193,120.36788940429688]},{"page":249,"text":"guide them in setting priorities when they lack time to complete all the tasks associated with performing a","rect":[108.01001739501953,141.00909423828126,540.0173006134033,131.90090942382813]},{"page":249,"text":"specific type of reconnaissance. Reconnaissance assets remain focused on achieving these objectives","rect":[108.01001739501953,152.5321044921875,540.0545184593201,143.41390991210938]},{"page":249,"text":"regardless of what they encounter during their missions. These assets implement reconnaissance objectives","rect":[108.01001739501953,163.9949951171875,539.9912860374451,154.87680053710938]},{"page":249,"text":"to focus their efforts when time, enemy action, or other factors prevent them from performing all the tasks","rect":[108.0,175.51800537109376,539.9463641624451,166.40982055664063]},{"page":249,"text":"normally associated with a particular form of reconnaissance.","rect":[108.0,187.04095458984376,353.97503185272219,177.93276977539063]},{"page":249,"text":"Report All Required Information Rapidly and Accurately","rect":[90.0,211.58067321777345,361.29603004455569,201.77552795410157]},{"page":249,"text":"12-9. Reconnaissance assets acquire and report accurate and timely combat information about their","rect":[108.0,229.13427734375,540.0353906211853,220.02609252929688]},{"page":249,"text":"reconnaissance objectives. This information may quickly lose its value, which is why it is important that the","rect":[108.00003814697266,240.65728759765626,540.0545930938721,231.53909301757813]},{"page":249,"text":"latest time information of value is included with information requirements to aid in timely reporting and","rect":[108.00003814697266,252.12017822265626,539.9321193695068,243.01199340820313]},{"page":249,"text":"avoid wasting reconnaissance assets. Reconnaissance assets report exactly what they see and, if appropriate,","rect":[108.00003814697266,263.6431884765625,539.9113721847534,254.53500366210938]},{"page":249,"text":"what they do not see as this information is potentially tied to PIRs or information requirements. Seemingly","rect":[108.00003814697266,275.1661376953125,540.0924587249756,266.0579528808594]},{"page":249,"text":"unimportant information may be extremely important when combined with other information. Reports of no","rect":[108.01005554199219,286.6290283203125,539.9810085296631,277.5208435058594]},{"page":249,"text":"enemy activity are as important as reports of enemy activity. Unit information management plans ensure that","rect":[108.01000213623047,298.15203857421877,540.0543589553834,289.0438537597656]},{"page":249,"text":"unit reconnaissance assets have the proper communications equipment to support the echelon’s integrated","rect":[108.01001739501953,309.675048828125,540.0344142913818,300.5668640136719]},{"page":249,"text":"information collection plan.","rect":[108.01001739501953,321.1178894042969,219.41440868377686,312.0297546386719]},{"page":249,"text":"Retain Freedom of Maneuver","rect":[90.0,343.5227355957031,228.98701249694825,335.9355773925781]},{"page":249,"text":"12-10. Reconnaissance assets need to retain their battlefield mobility, refine tactical knowledge of terrain","rect":[108.0,363.2943115234375,540.0173854827881,354.1861267089844]},{"page":249,"text":"and the enemy, and maintain their initiative to complete their missions. Reconnaissance stops and battle","rect":[108.0000228881836,374.7572021484375,539.9471712188721,365.6490173339844]},{"page":249,"text":"begins when these assets become decisively engaged. Reconnaissance assets require clear engagement and","rect":[108.0,386.2801818847656,540.0307521820068,377.1719970703125]},{"page":249,"text":"disengagement criteria that support their commander’s intent. They employ proper movement and","rect":[108.0,397.8031921386719,540.0925197601318,388.69500732421877]},{"page":249,"text":"reconnaissance ","rect":[107.98994445800781,408.0,171.0287733078003,400.15789794921877]},{"page":249,"text":"techniques, ","rect":[177.40150451660157,409.24603271484377,225.14275646209718,400.15789794921877]},{"page":249,"text":"use ","rect":[231.51547241210938,408.0,247.34104442596436,402.0]},{"page":249,"text":"overwatching ","rect":[253.65664672851563,409.2660827636719,310.64141368865969,400.15789794921877]},{"page":249,"text":"fires,","rect":[317.0141296386719,408.0,337.27862071990969,400.15789794921877]},{"page":249,"text":"and follow","rect":[346.11126708984377,407.2420349121094,395.5228924789429,400.15789794921877]},{"page":249,"text":"standard ","rect":[404.3915710449219,408.0,440.79522228240969,400.15789794921877]},{"page":249,"text":"operating ","rect":[447.10784912109377,409.2660827636719,487.41128063201907,400.15789794921877]},{"page":249,"text":"procedures.","rect":[493.723876953125,409.24603271484377,540.0924634933472,400.15789794921877]},{"page":249,"text":"Reconnaissance assets adopt formations designed to gain contact with the smallest friendly element prior to","rect":[107.98994445800781,420.7890625,540.0212306976318,411.6808776855469]},{"page":249,"text":"approaching areas where enemy contact is expected. This provides friendly elements maximum maneuver","rect":[107.98994445800781,432.31207275390627,539.9930932579041,423.2038879394531]},{"page":249,"text":"space and prevents the entire reconnaissance element from becoming decisively engaged. Units use the IPB","rect":[107.98994445800781,443.77496337890627,540.0653593482971,434.6667785644531]},{"page":249,"text":"process to identify anticipated areas of likely contact. Use of indirect fires to provide suppression and","rect":[107.98994445800781,455.2979431152344,539.9442043304443,446.18975830078127]},{"page":249,"text":"obscuration as well as to destroy point targets is a method reconnaissance elements use to retain their freedom","rect":[107.97991180419922,466.7608337402344,540.0052771530152,457.65264892578127]},{"page":249,"text":"of maneuver. Reconnaissance units have a working relationship with Army aviation reconnaissance assets","rect":[107.97991180419922,478.2838134765625,539.8870379905701,469.1756286621094]},{"page":249,"text":"that can enable freedom of maneuver through early warning as well as destruction of direct threats to ground","rect":[107.95988464355469,489.80682373046877,539.9959011077881,480.6986389160156]},{"page":249,"text":"reconnaissance forces.","rect":[107.95988464355469,499.24566650390627,197.93749523162843,492.1615295410156]},{"page":249,"text":"Gain and Maintain Enemy Contact","rect":[90.0,525.8607177734375,255.55869885635378,516.0555419921875]},{"page":249,"text":"12-11. Reconnaissance assets gaining contact with enemy forces maintain contact unless their commander","rect":[108.0,543.414306640625,540.0784814414978,534.30615234375]},{"page":249,"text":"orders otherwise, or their survival is at risk. This does not mean individual scout and reconnaissance teams","rect":[107.9899673461914,553.0,539.9633319358826,545.8291625976563]},{"page":249,"text":"cannot break contact with enemy forces. Units conducting reconnaissance are responsible for maintaining","rect":[107.98998260498047,566.4002075195313,539.8940944671631,557.2920532226563]},{"page":249,"text":"contact once it occurs. Contact can range from visual to direct fire contact. After contact the unit decides","rect":[107.98998260498047,577.9232177734375,539.9206683616638,568.8150634765625]},{"page":249,"text":"which form or forms of contact is best formaintaining enemy contactso they can continue to provide required","rect":[107.98998260498047,589.4461669921875,540.0344142913818,580.3380126953125]},{"page":249,"text":"information. Survivability is a key consideration for the unit in determining which forms of contact to","rect":[107.98998260498047,600.9090576171875,539.9428615570068,591.8009033203125]},{"page":249,"text":"maintain. Leaders at all echelons must decide which forms of contact, through available assets, will enable","rect":[107.98998260498047,612.4320678710938,539.9275789337158,603.3239135742188]},{"page":249,"text":"the reconnaissance force to maintain contact and can switch between them as needed. Surveillance, combined","rect":[107.98999786376953,622.0,539.9766750335693,614.7868041992188]},{"page":249,"text":"with stealth, is often sufficient to maintain contact and is the preferred method. Units conducting","rect":[107.98998260498047,635.41796875,539.9763088226318,626.309814453125]},{"page":249,"text":"reconnaissance avoid direct fire contact with enemy forces unless it is necessary to gain essential information.","rect":[107.98998260498047,646.94091796875,540.0569410324097,637.832763671875]},{"page":249,"text":"Develop the Situation Rapidly","rect":[90.0,671.5407104492188,230.8240146636963,661.7355346679688]},{"page":249,"text":"12-12. Reconnaissance assets develop the situation immediately upon contact with enemy forces or","rect":[108.0,689.0343017578125,539.9821069297791,679.9261474609375]},{"page":249,"text":"obstacles. Report enemy force composition, dispositions, activities, and movements and maneuver. If contact","rect":[108.0,700.5573120117188,540.1093516311646,691.4491577148438]},{"page":249,"text":"is made with an obstacle, then reconnaissance assets determine the type and extent of the obstacle and if the","rect":[108.0,712.080322265625,539.9282503204346,702.97216796875]},{"page":249,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":249,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":249,"text":"12-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":250,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":250,"text":"obstacle is actively being overwatched and covered with either direct or indirect fires. Enemy obstacle","rect":[90.0,83.51434326171875,521.9165315704346,74.40616607666016]},{"page":250,"text":"locations and compositions can provide information concerning enemy force positions, weapon capabilities,","rect":[90.0,94.97723388671875,521.9893751144409,85.86905670166016]},{"page":250,"text":"and scheme of fires. Reconnaissance assets develop the situation using action on contact drills.","rect":[90.0,106.500244140625,468.98882579803469,97.3920669555664]},{"page":250,"text":"RECONNAISSANCE MANAGEMENT","rect":[72.0,131.78965759277345,312.6796096458435,122.10151672363281]},{"page":250,"text":"12-13. No single reconnaissance asset can answer every information collection requirement, and there are","rect":[90.0,152.09429931640626,522.0190706329346,142.98611450195313]},{"page":250,"text":"rarely enough reconnaissance assets to cover every requirement. Staffs use a mix of reconnaissance","rect":[90.0,163.6173095703125,521.9923372344971,154.50912475585938]},{"page":250,"text":"management methods, such as cueing, mixing, redundancy, and task-organizing, to use their limited assets","rect":[90.0,175.0802001953125,522.0343768577576,165.97201538085938]},{"page":250,"text":"most effectively and collect the most critical information as quickly as possible.","rect":[89.9999771118164,186.6031494140625,409.36745738983157,177.49496459960938]},{"page":250,"text":"12-14. Cueing is the integration of one or more types of reconnaissance or surveillance systems to","rect":[89.9999771118164,204.1181640625,522.0425319671631,195.17030334472657]},{"page":250,"text":"provide information that directs follow-on collecting of more detailed information by another system.","rect":[89.9999771118164,215.58099365234376,522.0253248214722,206.6331329345703]},{"page":250,"text":"Cueing helps to focus limited reconnaissance and surveillance assets, especially limited ground assets, which","rect":[89.9999771118164,227.10400390625,522.0254421234131,217.99581909179688]},{"page":250,"text":"can rarely examine every part of a large area closely. Electronic, thermal, visual, audio, and other technical","rect":[89.9999771118164,238.56689453125,522.0068125686646,229.45870971679688]},{"page":250,"text":"assets with wide-area surveillance capabilities (often working from aerial platforms) can quickly determine","rect":[89.9999771118164,250.08990478515626,521.9902620391846,240.98171997070313]},{"page":250,"text":"areas of enemy concentration or areas without an enemy presence. These assets may cue ground and aerial","rect":[89.98994445800781,261.6129150390625,521.8772959671021,252.50473022460938]},{"page":250,"text":"reconnaissance assets to investigate specific areas to confirm and amplify information developed by technical","rect":[89.98994445800781,273.0758056640625,522.0428233108521,263.9676208496094]},{"page":250,"text":"assets. For example, Joint Surveillance Target Attack Radar System and Guardrail-equipped aircraft can","rect":[89.98994445800781,284.5987548828125,522.0703639984131,275.4905700683594]},{"page":250,"text":"cover large areas and cue ground reconnaissance or unmanned aircraft once they identify the presence of","rect":[89.98990631103516,296.12176513671877,521.9739892539978,287.0135803222656]},{"page":250,"text":"enemy forces. Units may dispatch ground reconnaissance or UAS to verify this information and track enemy","rect":[89.98990631103516,307.58465576171877,522.0283718109131,298.4764709472656]},{"page":250,"text":"assets for targeting purposes. Similarly, a ground reconnaissance asset can cue surveillance assets. Units use","rect":[89.99992370605469,319.107666015625,522.0569124298096,309.9994812011719]},{"page":250,"text":"reconnaissance assets based on their capabilities and use the complementary capabilities of other assets to","rect":[89.99992370605469,330.63067626953127,521.9572048187256,321.5224914550781]},{"page":250,"text":"verify and expand information.","rect":[89.98999786376953,342.09356689453127,214.45940685272218,332.9853820800781]},{"page":250,"text":"12-15. Mixing is using two or more different capabilities to collect against the same information","rect":[89.98998260498047,359.6185302734375,522.0016012115478,350.6706848144531]},{"page":250,"text":"requirement. Employing a mix of systems not only increases the probability of collection, but also provides","rect":[89.98997497558594,371.14154052734377,522.0523211936951,362.0333557128906]},{"page":250,"text":"information that is more complete. For example, a Joint Surveillance Target Attack Radar System aircraft","rect":[90.0,382.6044006347656,521.9134898147584,373.4962158203125]},{"page":250,"text":"may detect and locate a moving enemy tactical force, while the division or corps analysis and control element","rect":[90.0,394.12738037109377,522.1173472366334,385.0191955566406]},{"page":250,"text":"uses organic and supporting assets to determine its identity, organizational structure, and indications of its","rect":[90.0,405.650390625,521.9079120140076,396.5422058105469]},{"page":250,"text":"future plans. Employing a mix of systems is always desirable if the situation and available resources permit.","rect":[89.9899673461914,417.11328125,522.0380811691284,408.0050964355469]},{"page":250,"text":"Mixing systems can also help uncover enemy deception attempts by revealing discrepancies in reports from","rect":[89.9899673461914,428.6362609863281,522.0381140670777,419.528076171875]},{"page":250,"text":"different collectors.","rect":[89.9899673461914,438.1352233886719,168.33436107635499,431.05108642578127]},{"page":250,"text":"12-16. Redundancy is using two or more like capabilities to collect against the same information","rect":[89.9899673461914,457.6241149902344,521.9393453521728,448.67626953125]},{"page":250,"text":"requirement. Commanders decide which NAIs justify having more than one asset covering them based on","rect":[89.97994232177735,469.1471252441406,521.9642848968506,460.0289306640625]},{"page":250,"text":"the priority of their information requirements. When more than one asset covers the same NAI, a backup is","rect":[89.95990753173828,480.6099853515625,521.9271380882263,471.5018005371094]},{"page":250,"text":"available in the event that one asset cannot reach the NAI in time, the first asset suffers mechanical failure,","rect":[89.95990753173828,490.10894775390627,521.8734083175659,483.0248107910156]},{"page":250,"text":"or the enemy force detects and engages the first asset. For example, two observation posts overwatching the","rect":[89.95990753173828,503.656005859375,522.0364046173096,494.5478210449219]},{"page":250,"text":"same NAI from two different locations. Redundancy also improves the chances of successful information","rect":[89.95992279052735,515.118896484375,521.9446315765381,506.0107116699219]},{"page":250,"text":"collection.","rect":[89.95992279052735,524.617919921875,131.94472789764405,517.5338134765625]},{"page":250,"text":"12-17. Commanders may task-organize their reconnaissance assets by placing additional assets under their","rect":[89.95992279052735,544.1668701171875,521.9912622032166,535.0587158203125]},{"page":250,"text":"subordinates’ control to increase asset effectiveness and survivability. These assets may include additional","rect":[89.95990753173828,555.6297607421875,521.9891734085084,546.5216064453125]},{"page":250,"text":"signal retransmission elements, engineer reconnaissance elements, civil affairs teams, or additional security","rect":[89.94988250732422,567.15283203125,521.9221706390381,558.044677734375]},{"page":250,"text":"forces such as an infantry platoon.","rect":[89.94989013671875,578.6758422851563,227.1587781906128,569.5676879882813]},{"page":250,"text":"COMMANDER’S RECONNAISSANCE GUIDANCE","rect":[72.0,601.97998046875,298.38419485092165,593.6640014648438]},{"page":250,"text":"12-18. The guidance the commander provides to the reconnaissance assets is key in collecting PIR to aid in","rect":[90.0,621.8342895507813,522.0306911468506,612.7261352539063]},{"page":250,"text":"the decision making of higher echelons. There are three sections to the commander’s reconnaissance","rect":[90.0,633.3572998046875,522.0574007110596,624.2491455078125]},{"page":250,"text":"guidance: focus, tempo, and engagement and disengagement criteria. Tempo is a key element to the","rect":[89.98998260498047,644.8803100585938,522.0523347930908,635.7721557617188]},{"page":250,"text":"commander’s reconnaissance guidance as it refers to the level of detail and level of aggressiveness required","rect":[89.9899673461914,656.3431396484375,522.0153713226318,647.2349853515625]},{"page":250,"text":"to accomplish the reconnaissance mission. (See FM 3-98 for more information on commander’s","rect":[89.9899673461914,667.8461303710938,522.0453631858826,658.7579956054688]},{"page":250,"text":"reconnaissance guidance.)","rect":[89.9899673461914,679.38916015625,194.9695184288025,670.281005859375]},{"page":250,"text":"12-4","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":250,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":250,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":251,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":251,"text":"Focus","rect":[90.0,82.40274810791016,117.48733005142212,74.99124908447266]},{"page":251,"text":"12-19. The focus of the reconnaissance defines the reconnaissance unit’s area of emphasis and is composed","rect":[108.0,102.09428405761719,540.0794582366943,93.00614166259766]},{"page":251,"text":"of four categories: threat, civil, terrain, and weather effects. A focus aids the reconnaissance effort by","rect":[107.98998260498047,113.6373291015625,540.0173854827881,104.5291519165039]},{"page":251,"text":"narrowing the scope of operations to obtain the information that is most important to developing the situation","rect":[107.9899673461914,125.16033935546875,539.9789333343506,116.05216217041016]},{"page":251,"text":"and aid in planning for future operations. Commanders and staffs further the reconnaissance efforts by","rect":[107.9899673461914,136.6231689453125,539.9990139007568,127.5149917602539]},{"page":251,"text":"focusing on specific reconnaissance objectives. The objective should directly support the end state stated","rect":[107.9899673461914,148.14617919921876,539.9466457366943,139.02798461914063]},{"page":251,"text":"within the commander’s intent.","rect":[107.9899673461914,157.64515686035157,232.95139598846436,150.56100463867188]},{"page":251,"text":"Tempo","rect":[90.0,184.25872802734376,122.91474342346192,174.65122985839845]},{"page":251,"text":"12-20. The reconnaissance tempo is the level of detail and level of aggressiveness required to accomplish","rect":[108.0,201.7742919921875,539.9172267913818,192.66610717773438]},{"page":251,"text":"reconnaissance operations. The level of detail is conveyed using the terms “rapid” and “deliberate” to","rect":[107.98999786376953,213.29730224609376,539.9512233734131,204.18911743164063]},{"page":251,"text":"establish the necessary number of tasks required, based on the amount of time available, in a reconnaissance","rect":[107.9899673461914,224.76019287109376,540.0178499298096,215.65200805664063]},{"page":251,"text":"operation to sufficiently answer the supported commander’s PIR. The level of aggressiveness addresses the","rect":[108.01000213623047,236.283203125,540.0033235626221,227.17501831054688]},{"page":251,"text":"necessity to avoid either detection or engagement and is conveyed through the terms “forceful” and","rect":[108.0100326538086,247.80615234375,539.9782619476318,238.69796752929688]},{"page":251,"text":"“stealthy”. Commanders analyze the mission variables of METT-TC(I) to assist them in determining the best","rect":[108.01005554199219,259.26904296875,539.9742808303834,250.16085815429688]},{"page":251,"text":"reconnaissance tempo for a specific form of reconnaissance. Although the terms may not be mutually","rect":[108.01005554199219,270.79205322265627,539.9713039398193,261.6838684082031]},{"page":251,"text":"exclusive, the three major factors that drive the selection of the specific terms will be time, commander’s","rect":[108.0000228881836,282.3150634765625,540.0423724632263,273.1968688964844]},{"page":251,"text":"intent, and the known enemy situation.","rect":[107.9800033569336,293.7779541015625,263.24990367889407,284.6697082519531]},{"page":251,"text":"Level of Detail","rect":[89.98403930664063,317.2948913574219,150.54592084503174,308.3570556640625]},{"page":251,"text":"12-21. Reconnaissance tempo has two levels of detail: rapid or deliberate. Commanders first identify the","rect":[107.98997497558594,334.8098449707031,540.0448274688721,325.70166015625]},{"page":251,"text":"tasks associated with the assigned reconnaissance mission. Rapid or deliberate is used by the commander to","rect":[107.98999786376953,346.272705078125,540.0150661468506,337.1645202636719]},{"page":251,"text":"focus on the appropriate level of detail necessary for the supported commander to make decisions.","rect":[107.98998260498047,357.79571533203127,500.9904737472534,348.6875305175781]},{"page":251,"text":"12-22. In a rapid reconnaissance, commanders prescribe the minimum number of tasks necessary to","rect":[108.00003814697266,375.3106689453125,540.0184841156006,366.2024841308594]},{"page":251,"text":"accomplish the mission. By assigning a rapid reconnaissance, the commander is focusing on a reduced","rect":[108.00003051757813,386.7735595703125,539.8964748382568,377.6653747558594]},{"page":251,"text":"number of tasks and specificity of information associated with the assigned tasks. This is more easily","rect":[108.00003051757813,398.29656982421877,539.9632472991943,389.1883850097656]},{"page":251,"text":"accomplished with a greater understanding of the operational environment, or when only specific information","rect":[108.00003814697266,409.8195495605469,539.9910793304443,400.71136474609377]},{"page":251,"text":"is needed to facilitate the supported commander’s decisions. The limitation of rapid reconnaissance is a","rect":[108.00003814697266,421.2623596191406,540.0453767852783,412.1742248535156]},{"page":251,"text":"higher risk to the force due to reduced specificity and less detailed information about the operational","rect":[108.00003814697266,432.805419921875,539.9974741897584,423.6972351074219]},{"page":251,"text":"environment.","rect":[108.00003814697266,442.30438232421877,161.08399486541749,435.2202453613281]},{"page":251,"text":"12-23. In a deliberate reconnaissance all tasks for that mission must be accomplished to ensure success and","rect":[108.00003814697266,461.7732238769531,540.0137233734131,452.6850891113281]},{"page":251,"text":"answer PIRs. This is inherently more time intensive due to the amount of required information to collect and","rect":[107.9900131225586,473.3162841796875,540.0244045257568,464.2080993652344]},{"page":251,"text":"tasks to complete and is necessary when the understanding of the operational environment is vague.","rect":[107.99000549316406,484.7791442871094,539.9699048995972,475.67095947265627]},{"page":251,"text":"Deliberate reconnaissance requires meticulous information collection, and is conducted when there is limited","rect":[107.99000549316406,496.2820739746094,539.9616603851318,487.1939392089844]},{"page":251,"text":"enemy presence, when more time is available, or the commander requires more detailed information about","rect":[107.99000549316406,507.82513427734377,540.0263438186646,498.7169494628906]},{"page":251,"text":"the operational environment. The limitation of a deliberate reconnaissance is that it may require augmentation","rect":[107.99000549316406,519.2879638671875,540.0565090179443,510.1797790527344]},{"page":251,"text":"to include more detailed information collection assets and may require more deliberate sustainment planning.","rect":[107.99000549316406,530.81103515625,540.0525465011597,521.702880859375]},{"page":251,"text":"Level of Aggressiveness","rect":[89.99408721923828,554.3279418945313,187.78227114486695,545.3900756835938]},{"page":251,"text":"12-24. Reconnaissance tempo has two levels of aggressiveness: forceful or stealthy. A forceful level of","rect":[107.99000549316406,571.7928466796875,539.9989526329041,562.6846923828125]},{"page":251,"text":"aggressiveness develops the situation by employing air and ground reconnaissance, technical means, and","rect":[107.97998046875,583.3157958984375,539.8780422210693,574.2076416015625]},{"page":251,"text":"direct and indirect fire systems to rapidly develop the situation. Forceful reconnaissance is appropriate when","rect":[107.97998809814453,594.8388671875,539.9933376312256,585.730712890625]},{"page":251,"text":"favorable relative combat power analysis permits, when limited time necessitates, or when aggressive","rect":[107.96990203857422,606.3017578125,540.0058870391846,597.193603515625]},{"page":251,"text":"engagement is necessary to gain the required information. Units conducting forceful reconnaissance can","rect":[107.96994018554688,617.82470703125,539.9812526702881,608.716552734375]},{"page":251,"text":"move overtly as direct and indirect contact will not hinder or may enable the collection effort. A stealthy","rect":[107.96994018554688,629.3477783203125,539.9944362640381,620.2396240234375]},{"page":251,"text":"level of aggressiveness emphasizes avoiding detection and direct and indirect contact as it will hinder","rect":[107.96994018554688,640.8106689453125,539.9982812461853,631.7025146484375]},{"page":251,"text":"collection efforts and could limit freedom of maneuver. Stealthy reconnaissance typically takes more time","rect":[107.96994018554688,652.3336791992188,539.9040803985596,643.2255249023438]},{"page":251,"text":"than forceful reconnaissance and is appropriate when time is available and the unit is either unable to fight","rect":[107.96991729736328,663.856689453125,540.0403208694459,654.74853515625]},{"page":251,"text":"for information based on relative combat analysis, the commander wants forces to remain undetected, or","rect":[107.9498519897461,675.319580078125,540.0087182579041,666.21142578125]},{"page":251,"text":"when a higher headquarters is unwilling to accept a higher threshold of risk. Units also use UAS","rect":[107.9498519897461,686.8425903320313,539.9501485748291,677.7344360351563]},{"page":251,"text":"independently, or in conjunction with ground reconnaissance assets, to execute stealthy reconnaissance.","rect":[107.9498519897461,698.3656005859375,522.8280591964722,689.2473754882813]},{"page":251,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":251,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":251,"text":"12-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":252,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":252,"text":"12-25. The levels of detail and aggressiveness combine to give the commander four combinations of tempo","rect":[90.0,83.51434326171875,521.9119167327881,74.40616607666016]},{"page":252,"text":"to choose from. The four combinations of reconnaissance tempo are—","rect":[90.0,94.95719909667969,372.1832695007324,85.86905670166016]},{"page":252,"text":" Rapid and forceful.","rect":[115.19999694824219,108.45426940917969,210.70470714569093,99.36612701416016]},{"page":252,"text":" Limited information requirements.","rect":[133.1999969482422,122.49430847167969,289.7866163253784,113.40616607666016]},{"page":252,"text":" Mission timeline emphasizes prompt collection.","rect":[133.1999969482422,136.53428649902345,343.1832227706909,127.4461441040039]},{"page":252,"text":" Overt movement is acceptable.","rect":[133.1999969482422,150.63426208496095,275.01613903045657,141.54611206054688]},{"page":252,"text":" Direct and indirect fires will not hinder or may enhance collection efforts.","rect":[133.1999969482422,164.69427490234376,446.6898145675659,155.58609008789063]},{"page":252,"text":" Rapid and stealthy.","rect":[115.19999694824219,178.19427490234376,210.16363048553468,169.08609008789063]},{"page":252,"text":" Limited information requirements.","rect":[133.1999969482422,192.21421813964845,289.7866163253784,183.12606811523438]},{"page":252,"text":" Mission timeline emphasizes prompt collection.","rect":[133.1999969482422,206.25425720214845,343.1932325363159,197.16610717773438]},{"page":252,"text":" Covert movement is required.","rect":[133.1999969482422,220.29429626464845,270.64544200897219,211.20614624023438]},{"page":252,"text":" Direct and indirect fire contact will hinder collection efforts and movement and maneuver.","rect":[133.1999969482422,232.39027404785157,513.6434888839722,225.30612182617188]},{"page":252,"text":" Deliberate and forceful.","rect":[115.19999694824219,245.89027404785157,228.46013927459718,238.80612182617188]},{"page":252,"text":" Extensive information requirements.","rect":[133.1999969482422,261.9342346191406,297.58217906951907,252.84609985351563]},{"page":252,"text":" Mission timeline allows comprehensive collection.","rect":[133.1999969482422,275.9742736816406,354.8214063644409,266.8861389160156]},{"page":252,"text":" Overt movement is acceptable.","rect":[133.1999969482422,290.0142517089844,275.01909923553469,280.9261169433594]},{"page":252,"text":" Direct and indirect fires will not hinder or may enhance collection efforts.","rect":[133.1999969482422,304.0743103027344,446.6898145675659,294.96612548828127]},{"page":252,"text":" Deliberate and stealthy.","rect":[115.19999694824219,317.5743103027344,227.92907238006593,308.46612548828127]},{"page":252,"text":" Mission timeline allows detailed collection.","rect":[133.1999969482422,329.5902404785156,325.9688673019409,322.506103515625]},{"page":252,"text":" Extensive information requirements.","rect":[133.1999969482422,345.6942443847656,297.58217906951907,336.6061096191406]},{"page":252,"text":" Covert movement is required.","rect":[133.1999969482422,359.7342529296875,270.6484327316284,350.6461181640625]},{"page":252,"text":" Direct and indirect fire contact will hinder collection efforts and movement and maneuver.","rect":[133.1999969482422,371.770263671875,513.6434888839722,364.6861267089844]},{"page":252,"text":"12-26. It is less important that commanders use the specific terms (rapid or deliberate, forceful or stealthy)","rect":[89.99785614013672,391.3193054199219,521.9670312461853,382.21112060546877]},{"page":252,"text":"to communicate an organization's reconnaissance tempo. Instead, commanders should strive to provide","rect":[89.98783111572266,402.84228515625,521.9850740509033,393.7341003417969]},{"page":252,"text":"guidance within each area of tempo to assist subordinate units in understanding how the reconnaissance effort","rect":[89.97782897949219,414.30517578125,521.9781870803834,405.1969909667969]},{"page":252,"text":"is nested within the supported organization’s operating tempo. Generally speaking, commanders should","rect":[89.9778060913086,425.82818603515627,522.0049953460693,416.7200012207031]},{"page":252,"text":"inform the reconnaissance force how much information pertaining to the enemy and terrain they need to","rect":[89.9778060913086,437.2910461425781,521.9564113616943,428.1828308105469]},{"page":252,"text":"gather, how quickly that information must be gathered, and how aggressively to pursue that information.","rect":[89.9778060913086,448.8140563964844,508.5242872238159,439.70587158203127]},{"page":252,"text":"Engagement and Disengagement Criteria","rect":[72.0,473.4206848144531,266.02317237854006,463.6155700683594]},{"page":252,"text":"12-27. Engagement criteria are protocols that specify those circumstances for initiating engagement","rect":[90.0,490.97430419921877,521.9903466758728,482.0264587402344]},{"page":252,"text":"with an enemy force. Commanders must clearly define the size or type of enemy force they want their","rect":[89.98998260498047,502.43719482421877,521.9292504844666,493.3290100097656]},{"page":252,"text":"subordinate elements to engage or avoid. The commander ensures that subordinate leaders understand this to","rect":[89.98998260498047,513.960205078125,522.0304470062256,504.85198974609377]},{"page":252,"text":"avoid becoming decisively engaged which prevents the unit from continuing reconnaissance operations.","rect":[89.9899673461914,525.483154296875,521.9560499191284,516.375]},{"page":252,"text":"Commanders use bypass criteria to direct bypassing or handing off certain sizes or types of units to maintain","rect":[89.9899673461914,536.946044921875,521.8980617523193,527.837890625]},{"page":252,"text":"the tempo of the operation based upon subsequent planned operations and guidance from higher. Bypass","rect":[89.98994445800781,548.4690551757813,521.9822528343201,539.3609008789063]},{"page":252,"text":"criteria are measures established by higher echelon headquarters that specify the conditions and size","rect":[89.97993469238281,559.9920654296875,521.8662386016846,551.044189453125]},{"page":252,"text":"under which enemy units and contact may be avoided. Reconnaissance assets direct and rehearse","rect":[89.97993469238281,571.4549560546875,521.9659090118408,562.3468017578125]},{"page":252,"text":"handover of enemy targets between friendly units as required when specified enemy formations are bypassed.","rect":[89.96990203857422,582.9779663085938,521.9810743331909,573.8697509765625]},{"page":252,"text":"12-28. Disengagement criteria are protocols that specify those circumstances where a friendly force","rect":[89.96994018554688,600.4428100585938,521.9342317657471,591.4949340820313]},{"page":252,"text":"must break contact with direct fire and observed indirect fire to avoid becoming decisively engaged or","rect":[89.96990203857422,611.9658203125,521.9812288360596,603.0179443359375]},{"page":252,"text":"to preserve friendly combat power. Just like engagement criteria, it is critical for the commander to clearly","rect":[89.9800033569336,623.4888305664063,522.0372219085693,614.3806762695313]},{"page":252,"text":"state when the subordinate elements must break contact with direct fire with enemy forces to prevent","rect":[89.99000549316406,634.95166015625,522.0713877639771,625.843505859375]},{"page":252,"text":"becoming decisively engaged and more importantly retain freedom of maneuver.","rect":[89.99000549316406,646.4746704101563,413.7363233566284,637.3665161132813]},{"page":252,"text":"CHARACTERISTICS OF RECONNAISSANCE ASSETS","rect":[72.0,669.8280029296875,314.6312007904053,661.5359497070313]},{"page":252,"text":"12-29. Every unit has a requirement to report information about the terrain, weather, civilian activities, and","rect":[90.0,689.7542724609375,522.0313625335693,680.6461181640625]},{"page":252,"text":"friendly and enemy dispositions. Troops in close combat and reconnaissance patrols of maneuver units at all","rect":[90.00003814697266,701.2171630859375,521.9689707717896,692.1090087890625]},{"page":252,"text":"echelons collect information on enemy units with which they are in contact. In echelon support areas, reserve","rect":[90.0,712.7401733398438,522.0962190704346,703.6320190429688]},{"page":252,"text":"12-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":252,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":252,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":253,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":253,"text":"maneuver forces, functional and multifunctional support, sustainment elements, other government agencies,","rect":[108.0,83.51434326171875,539.9833326339722,74.40616607666016]},{"page":253,"text":"and multinational forces observe and report civilian and enemy activity and significant changes in terrain","rect":[107.9999771118164,94.97723388671875,539.9932765960693,85.86905670166016]},{"page":253,"text":"trafficability. Although all units conduct reconnaissance, those specifically trained in reconnaissance","rect":[107.9999771118164,106.500244140625,540.0022859649658,97.3920669555664]},{"page":253,"text":"operations are cavalry, manned and unmanned aviation reconnaissance, scouts, and special forces. Some","rect":[107.99996185302735,118.023193359375,539.9882478790283,108.9150161743164]},{"page":253,"text":"branches, such as engineers, civil affairs, and chemical, have specific ground reconnaissance tasks to perform","rect":[107.99995422363281,129.486083984375,539.9952063522339,120.3779067993164]},{"page":253,"text":"that complement the force’s overall reconnaissance effort. However, maneuver battalions, BCTs, divisions,","rect":[107.99996185302735,140.9890594482422,539.9821729660034,131.90090942382813]},{"page":253,"text":"and corps commanders primarily use their organic or attached ground and aerial reconnaissance assets, and","rect":[107.99996185302735,152.5321044921875,540.0132961273193,143.42391967773438]},{"page":253,"text":"their space operations, target acquisition, and intelligence elements to conduct reconnaissance operations.","rect":[107.97993469238281,163.9949951171875,530.0543775558472,154.88681030273438]},{"page":253,"text":"12-30. Battalion and higher echelon commanders assign missions to their reconnaissance assets based on","rect":[107.96991729736328,181.50994873046876,539.9464626312256,172.40176391601563]},{"page":253,"text":"the organization, equipment, and training of those assets. They know the capabilities and limitations of their","rect":[107.96991729736328,193.032958984375,539.9463403282166,183.92477416992188]},{"page":253,"text":"available reconnaissance assets. This ensures the appropriate employment of these assets based on their","rect":[107.96991729736328,204.495849609375,539.9576318321228,195.38766479492188]},{"page":253,"text":"capabilities. They will also augment their reconnaissance assets with enablers if they recognize that the","rect":[107.96991729736328,216.018798828125,539.8979768829346,206.91061401367188]},{"page":253,"text":"reconnaissance task requires additional augmentation to be successful. Table 12-1 shows the typical nesting","rect":[107.96991729736328,227.481689453125,540.0403957366943,218.37350463867188]},{"page":253,"text":"of reconnaissance and surveillance assets available at different echelons.","rect":[107.94989013671875,236.9806671142578,398.14129161834719,229.89651489257813]},{"page":253,"text":"Table 12-1. Typical reconnaissance and surveillance assets available","rect":[151.266357421875,256.5196533203125,478.69581507873536,247.22109985351563]},{"page":253,"text":"12-31. Commanders primarily employ a combination of manned ground and air assets supported by","rect":[108.0,570.2343139648438,540.0231227874756,561.1261596679688]},{"page":253,"text":"technical systems to perform reconnaissance. These assets use the strengths of one system to overcome the","rect":[108.0,581.6971435546875,540.0039949493408,572.5889892578125]},{"page":253,"text":"weaknesses of another. They delineate reporting procedures for all units to disseminate information gathered","rect":[108.0,593.22021484375,539.9884548187256,584.112060546875]},{"page":253,"text":"during reconnaissance that facilitates mission accomplishment.","rect":[108.0,604.7431640625,360.1641798019409,595.635009765625]},{"page":253,"text":"12-32. Commanders employ all available resources, not just reconnaissance units, to satisfy their existing","rect":[108.0,622.2080078125,539.9511623382568,613.0897827148438]},{"page":253,"text":"information requirements. Joint forward observers and fire support teams report combat information.","rect":[107.98998260498047,633.7110595703125,539.9758863449097,624.6229248046875]},{"page":253,"text":"Forward deployed air defense units observe and report enemy aircraft and air corridors in use as well as","rect":[107.98998260498047,645.1939086914063,539.9366595726013,636.0857543945313]},{"page":253,"text":"supplement available air control radars. Specialized reconnaissance assets such as these will have unique","rect":[107.98998260498047,656.6968994140625,540.0254182891846,647.6087646484375]},{"page":253,"text":"requirements of time on objective, distance to objective, and movement. Planning and integration are required","rect":[107.98998260498047,668.2399291992188,540.0219020843506,659.1217041015625]},{"page":253,"text":"to ensure that requirements of the mission variables of the reconnaissance commander and the collection","rect":[108.0,679.6828002929688,539.9169216156006,670.5946655273438]},{"page":253,"text":"requirements are effectively balanced. Ground reconnaissance can involve assets not specifically tailored for","rect":[108.0,691.225830078125,540.0187890586853,682.11767578125]},{"page":253,"text":"the mission.","rect":[108.0,700.7247314453125,156.40461254119874,693.640625]},{"page":253,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":253,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":253,"text":"12-7","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":254,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":254,"text":"12-33. During the conduct of any form of reconnaissance, the commander may require information abouta","rect":[90.0,83.51434326171875,522.0821809844971,74.40616607666016]},{"page":254,"text":"specific aspect of the area of operations. To obtain this information the commander may direct a specific","rect":[90.01000213623047,94.97723388671875,521.9220247344971,85.86905670166016]},{"page":254,"text":"focus task which typically requires the use of an organization uniquely trained and equipped for the mission.","rect":[90.01002502441406,106.500244140625,522.0670728683472,97.3920669555664]},{"page":254,"text":"Focus tasks include CBRN, civil, electromagnetic, and engineer reconnaissance.","rect":[90.01002502441406,118.023193359375,411.5798292160034,108.9150161743164]},{"page":254,"text":"12-34. CBRN reconnaissance includes missions to obtain information on suspected or confirmed chemical,","rect":[90.01002502441406,135.4680633544922,522.0792798995972,126.37992095947266]},{"page":254,"text":"biological, radiological, or nuclear threats and hazards in an assigned area. CBRN reconnaissance identifies","rect":[90.01002502441406,147.0111083984375,521.9275653343201,137.90292358398438]},{"page":254,"text":"indicators of enemy CBRN production or employment, and indicators related to civilian or industrial facilities","rect":[90.01002502441406,158.5340576171875,521.9829852561951,149.42587280273438]},{"page":254,"text":"that could be weaponized or produce hazards when damaged or destroyed. (See ATP 3-11.37/MCRP","rect":[90.0100326538086,169.9969482421875,521.9401998443603,160.88876342773438]},{"page":254,"text":"10-10E.7/NTTP 3-11.29/AFTTP 3-22.44 for more on CBRN reconnaissance.)","rect":[90.01005554199219,181.4999237060547,403.0488488731384,172.41177368164063]},{"page":254,"text":"12-35. Civil reconnaissance is a targeted, planned, and coordinated observation and evaluation of specific","rect":[89.99000549316406,199.044921875,521.9874544219971,189.93673706054688]},{"page":254,"text":"civil aspects of the environment such as areas, structures, capabilities, organizations, people, or events (JP 3-","rect":[89.97998046875,210.5078125,521.9521997032166,201.39962768554688]},{"page":254,"text":"57). Civil reconnaissance verifies or refutes civil information, supports operational environment assessments,","rect":[89.97997283935547,222.0107879638672,522.0573072433472,212.92263793945313]},{"page":254,"text":"and detects and monitors changes in the civil component. It is conducted over time through routine","rect":[89.97997283935547,233.49371337890626,522.1062288360596,224.38552856445313]},{"page":254,"text":"engagement and patterned civil observance using active and passive sensors, virtual sensors, and other means.","rect":[89.97997283935547,245.0167236328125,521.9803419113159,235.90853881835938]},{"page":254,"text":"(See FM 3-57 for more information on civil reconnaissance.)","rect":[89.97994995117188,256.5196228027344,334.1003320274353,247.43148803710938]},{"page":254,"text":"12-36. Electromagnetic reconnaissance is the detection, location, identification, and evaluation of foreign","rect":[89.97994995117188,274.0045166015625,521.9240627288818,264.8963317871094]},{"page":254,"text":"electromagnetic radiations (JP 3-85). Electromagnetic reconnaissance supports information collection at","rect":[89.97993469238281,285.52752685546877,521.9252085647584,276.4193420410156]},{"page":254,"text":"brigade and higher echelons using assigned electromagnetic warfare personnel and capabilities. Information","rect":[89.97993469238281,297.050537109375,521.9556789398193,287.9423522949219]},{"page":254,"text":"obtained through electromagnetic reconnaissance assists the commander with situational understanding and","rect":[89.9800033569336,308.513427734375,521.9453639984131,299.40521240234377]},{"page":254,"text":"can support signals intelligence activities. Electromagnetic reconnaissance may result in electromagnetic","rect":[89.9800033569336,320.03643798828127,521.9132356719971,310.9282531738281]},{"page":254,"text":"protection modifications or lead to an electromagnetic attack against enemy capabilities. (See FM 3-12 for","rect":[89.9799575805664,331.5594482421875,522.0123193321228,322.4512634277344]},{"page":254,"text":"more information on electromagnetic reconnaissance.)","rect":[89.9800033569336,343.0223388671875,307.9330041465759,333.9141540527344]},{"page":254,"text":"12-37. Engineer reconnaissance obtains information about the infrastructure, terrain, or threat. This may","rect":[89.96994018554688,360.5473327636719,522.0096950531006,351.43914794921877]},{"page":254,"text":"include data on obstacles, gap crossing sites, airfields, bridges, tunnels, roads, and trails. Engineer units do","rect":[89.95992279052735,372.0703125,521.9561061859131,362.9621276855469]},{"page":254,"text":"not have designated reconnaissance teams. Engineer reconnaissance is directed and task-organized based on","rect":[89.95992279052735,383.533203125,521.9772243499756,374.4250183105469]},{"page":254,"text":"mission ","rect":[89.94989013671875,394.0,123.65516948699951,385.947998046875]},{"page":254,"text":"requirements ","rect":[128.7703857421875,395.0361328125,183.47454357147218,385.947998046875]},{"page":254,"text":"using ","rect":[188.64889526367188,395.0561828613281,212.81414318084718,385.947998046875]},{"page":254,"text":"assets ","rect":[217.98947143554688,394.0,243.83408641815186,386.95001220703127]},{"page":254,"text":"that ","rect":[249.0084228515625,394.0,266.5143995285034,385.947998046875]},{"page":254,"text":"would ","rect":[271.689697265625,394.0,299.2737989425659,385.947998046875]},{"page":254,"text":"otherwise ","rect":[304.3890075683594,394.0,345.77361583709719,385.947998046875]},{"page":254,"text":"support ","rect":[350.9479675292969,395.0361328125,383.51296520233157,386.95001220703127]},{"page":254,"text":"other ","rect":[388.6271667480469,394.0,411.7122755050659,385.947998046875]},{"page":254,"text":"engineer ","rect":[416.8876037597656,395.0561828613281,453.8322401046753,385.947998046875]},{"page":254,"text":"missions. ","rect":[459.0075378417969,394.0,499.07134532928469,385.947998046875]},{"page":254,"text":"(See","rect":[504.1865234375,395.0361328125,521.9611482696533,385.947998046875]},{"page":254,"text":"ATP 3-34.81/MCWP 3-17.4 for more on engineer reconnaissance.)","rect":[89.94990539550781,406.5791931152344,359.31450439071656,397.47100830078127]},{"page":254,"text":"12-38. Ground reconnaissance elements are generally limited in the depth to which they can conduct","rect":[89.93989562988281,424.0440673828125,522.0043101272584,414.9358825683594]},{"page":254,"text":"reconnaissance. However, they can operate in weather conditions that prohibit aerial reconnaissance","rect":[89.92987823486328,435.56707763671877,521.9252595977783,426.4588928222656]},{"page":254,"text":"operations. Reconnaissance conducted by manned and unmanned aircraft systems complement ground","rect":[89.91980743408203,447.090087890625,521.9325466156006,437.9818115234375]},{"page":254,"text":"reconnaissance by increasing the speed and depth of reconnaissance over designated areas. Aerial","rect":[89.91980743408203,458.5529479980469,522.0002818069459,449.44476318359377]},{"page":254,"text":"reconnaissance assets can operate over terrain that hinders ground operations, such as swamps, extremely","rect":[89.9097900390625,470.0759582519531,521.9012355804443,460.9677734375]},{"page":254,"text":"rugged terrain, or deep snow. Aviation assets can operate at a considerable depth, far in advance of dedicated","rect":[89.90980529785156,481.5388488769531,521.9253444671631,472.4306640625]},{"page":254,"text":"ground reconnaissance elements focused on close operations. Thus, aviation assets provide units with","rect":[89.90980529785156,493.0618591308594,521.8781032562256,483.95361328125]},{"page":254,"text":"additional time to react to enemy forces. Manned and unmanned aerial reconnaissance assets use their optics,","rect":[89.90980529785156,504.5848083496094,521.9662427902222,495.47662353515627]},{"page":254,"text":"video, thermal imaging, electronic sensors, and communications capabilities to detect and report enemy","rect":[89.91988372802735,516.0477294921875,521.9218654632568,506.9395446777344]},{"page":254,"text":"activities. All types of aviation units generate pilot reports when conducting their primary missions. These","rect":[89.91988372802735,527.5706787109375,521.9321565704346,518.4625244140625]},{"page":254,"text":"reports are often a source of valuable combat information.","rect":[89.91988372802735,539.07373046875,322.3367567062378,529.985595703125]},{"page":254,"text":"12-39. While several technical systems can perform reconnaissance, most of these systems are surveillance","rect":[89.91988372802735,556.55859375,521.9238557891846,547.450439453125]},{"page":254,"text":"platforms. Surveillance complements reconnaissance by cueing the commitment of reconnaissance assets","rect":[89.91980743408203,568.08154296875,521.8795306663513,558.973388671875]},{"page":254,"text":"against specific locations or specially targeted enemy units.","rect":[89.91983795166016,579.6046142578125,327.6933546066284,570.4964599609375]},{"page":254,"text":"12-40. Military intelligence units conduct supporting intelligence operations. They provide electronic","rect":[89.91983795166016,597.0694580078125,521.9175691680908,587.9613037109375]},{"page":254,"text":"intercept, UAS sensor feeds, and human intelligence, counterintelligence, and downlinks from theater and","rect":[89.91980743408203,608.5924072265625,521.8619289398193,599.4842529296875]},{"page":254,"text":"national assets. Theater and national reconnaissance and surveillance systems broadcast information and","rect":[89.91983795166016,620.1154174804688,521.8149318695068,611.0072631835938]},{"page":254,"text":"intelligence to commanders and provide near real-time imagery as a part of an integrated intelligence effort.","rect":[89.91980743408203,631.5783081054688,522.0162305831909,622.4701538085938]},{"page":254,"text":"Artillery and air defense target acquisition radars complement military intelligence surveillance systems as a","rect":[89.90977478027344,643.101318359375,521.9228792266846,633.9931640625]},{"page":254,"text":"part of that effort. Examples of human intelligence collection include face-to-face interrogation of captured","rect":[89.90977478027344,654.6243896484375,521.8715724945068,645.5160522460938]},{"page":254,"text":"enemy Soldiers, screening of the civilian population, and debriefing of friendly Soldiers, such as scouts and","rect":[89.8998031616211,666.087158203125,521.9219875335693,656.97900390625]},{"page":254,"text":"special operations forces. (See JP 2-0 or FM 2-22.3 for more information about human intelligence","rect":[89.8998031616211,677.6101684570313,521.9543733673096,668.5020141601563]},{"page":254,"text":"collection.)","rect":[89.88980102539063,689.1132202148438,135.16617370224,680.0250854492188]},{"page":254,"text":"12-41. Division and corps headquarters have various ways to obtain information from space reconnaissance","rect":[89.88980102539063,706.5980834960938,521.9813509063721,697.4899291992188]},{"page":254,"text":"assets. Various sensors found on these assets use the breadth of the electromagnetic spectrum (EMS) to gather","rect":[89.89979553222656,718.12109375,521.9532983360291,709.012939453125]},{"page":254,"text":"12-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":254,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":254,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":255,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":255,"text":"data for situational awareness, planning, intelligence, and operations by ground forces. Space reconnaissance","rect":[108.0,83.51434326171875,540.0634431915283,74.40616607666016]},{"page":255,"text":"assets can continue reconnaissance regardless of the enemy capability to defend against air and ground","rect":[108.0,94.97723388671875,540.0040798187256,85.86905670166016]},{"page":255,"text":"reconnaissance assets. Space and terrestrial weather may have varying effects on the different space-based","rect":[108.0,106.500244140625,540.0264186859131,97.3920669555664]},{"page":255,"text":"sensors and the portion of the EMS being used. Certain space-based reconnaissance assets can be limited in","rect":[108.0,118.023193359375,539.9611721038818,108.9150161743164]},{"page":255,"text":"the amount of support provided due to the physical limitations of their orbit and revisit times.","rect":[108.0,129.486083984375,481.2438611984253,120.3779067993164]},{"page":255,"text":"FORMS OF RECONNAISSANCE","rect":[90.0,154.7696990966797,298.4599441184998,145.0955352783203]},{"page":255,"text":"12-42.","rect":[108.0,172.91998291015626,133.84157848358155,166.14646911621095]},{"page":255,"text":"","rect":[133.1999969482422,185.84542846679688,139.16105696249009,181.15318298339845]},{"page":255,"text":"","rect":[133.1999969482422,199.34542846679688,139.16105696249009,194.65318298339845]},{"page":255,"text":"","rect":[133.1999969482422,212.84542846679688,139.16105696249009,208.15318298339845]},{"page":255,"text":"","rect":[133.1999969482422,226.34542846679688,139.16105696249009,221.65318298339845]},{"page":255,"text":"","rect":[133.1999969482422,239.84542846679688,139.16105696249009,235.15318298339845]},{"page":255,"text":"The five forms of reconnaissance operations are—","rect":[142.55897521972657,175.0542449951172,344.7605400085449,165.96609497070313]},{"page":255,"text":"Zone reconnaissance.","rect":[151.1999969482422,186.5502471923828,237.33994579315186,179.46609497070313]},{"page":255,"text":"Area reconnaissance.","rect":[151.1999969482422,200.0502471923828,236.19965648651124,192.96609497070313]},{"page":255,"text":"Route reconnaissance.","rect":[151.1999969482422,213.5502471923828,240.63653087615968,206.46609497070313]},{"page":255,"text":"Reconnaissance in force.","rect":[151.1999969482422,227.0502471923828,250.89800548553468,219.96609497070313]},{"page":255,"text":"Special reconnaissance.","rect":[151.1999969482422,242.5542449951172,246.21766185760499,233.46609497070313]},{"page":255,"text":"12-43. Table 12-2 shows what types of Army reconnaissance units are typically assigned the forms of","rect":[108.00376892089844,260.0992431640625,539.9559228477478,250.99105834960938]},{"page":255,"text":"reconnaissance operations. Special operations forces conduct special reconnaissance.","rect":[108.00376892089844,271.5420837402344,448.22793102264407,262.4539489746094]},{"page":255,"text":"Table 12-2. Dedicated reconnaissance units and forms of reconnaissance operations","rect":[113.58489990234375,288.94683837890627,516.4640645904541,279.6883544921875]},{"page":255,"text":"ZONE RECONNAISSANCE","rect":[90.0,436.58221435546877,211.98972463607789,428.4960021972656]},{"page":255,"text":"12-44. Zone reconnaissance is a form of reconnaissance operation that involves a directed effort to","rect":[108.0,456.5142517089844,539.9903469085693,447.5864562988281]},{"page":255,"text":"obtain detailed information on all routes, obstacles, terrain, and enemy forces within a zone defined","rect":[107.98998260498047,467.9971923828125,539.9292745513916,459.0493469238281]},{"page":255,"text":"by boundaries. Commanders assign a zone reconnaissance mission when they need additional information","rect":[107.97997283935547,479.5201721191406,539.9996852874756,470.4119873046875]},{"page":255,"text":"on a zone before committing other forces. It is appropriate when the enemy situation is vague, existing","rect":[107.96990203857422,491.0431823730469,539.9129543304443,481.93499755859377]},{"page":255,"text":"knowledge of the terrain is limited, or combat operations have altered the terrain. A zone reconnaissance may","rect":[107.96990203857422,502.5060729980469,540.0226345062256,493.39788818359377]},{"page":255,"text":"include several route or area reconnaissance missions assigned to subordinate units.","rect":[107.96994018554688,514.029052734375,442.6290235519409,504.9208679199219]},{"page":255,"text":"12-45. Zone reconnaissance is normally a deliberate process and units need to allow adequate time to","rect":[107.96994018554688,531.5540771484375,540.0197658538818,522.4459228515625]},{"page":255,"text":"perform this task. It takes more time than any other reconnaissance operation. It normally involves extended","rect":[107.96994018554688,543.0169067382813,539.9532375335693,533.9087524414063]},{"page":255,"text":"distances and starts from a LD. It requires the employment of all ground elements executing the zone","rect":[107.97994995117188,554.5399169921875,540.0294466094971,545.4317626953125]},{"page":255,"text":"reconnaissance abreast of each other. Commanders may forgo detailed reconnaissance of these zones and","rect":[107.97994995117188,566.0629272460938,539.9506130218506,556.9547729492188]},{"page":255,"text":"focus assets on NAIs that reveal enemy dispositions and intentions when their reconnaissance objectives are","rect":[107.97994995117188,577.5257568359375,539.9820833282471,568.4075317382813]},{"page":255,"text":"enemy forces. Reconnaissance units do not disregard terrain when focusing on enemy forces. However, they","rect":[107.97994995117188,589.048828125,540.0112209320068,579.940673828125]},{"page":255,"text":"minimize their terrain reconnaissance efforts to what influences the NAIs.","rect":[107.97994995117188,598.5477294921875,404.00457286834719,591.463623046875]},{"page":255,"text":"Tasks Associated with Zone Reconnaissance","rect":[90.0,622.8827514648438,297.0871559295654,615.2955322265625]},{"page":255,"text":"12-46. Units performing","rect":[108.0,642.654296875,213.38634300231935,633.546142578125]},{"page":255,"text":"otherwise ordered):","rect":[107.98998260498047,654.1572875976563,186.0618052444458,645.0691528320313]},{"page":255,"text":"zone","rect":[217.55465698242188,640.6302490234375,236.4032869415283,635.8807983398438]},{"page":255,"text":"reconnaissance accomplish the following tasks within capability (unless","rect":[240.53456115722657,642.654296875,539.9903705101013,633.546142578125]},{"page":255,"text":" Find and report all enemy forces within the zone.","rect":[133.1999969482422,667.67431640625,348.04802989959719,658.566162109375]},{"page":255,"text":" Based on engagement criteria, clear all enemy forces in the designated assigned area of the unit","rect":[133.1999969482422,681.17431640625,540.0832285842896,672.066162109375]},{"page":255,"text":"conducting reconnaissance.","rect":[151.1999969482422,692.63720703125,261.2185926437378,683.529052734375]},{"page":255,"text":" Determine the trafficability of all terrain in the zone including built-up areas.","rect":[133.1999969482422,706.13427734375,458.79595470428469,697.026123046875]},{"page":255,"text":" Locate and determine the extent of all contaminated areas in the zone.","rect":[133.1999969482422,717.6102294921875,431.13689708709719,710.526123046875]},{"page":255,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":255,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":255,"text":"12-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":256,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":256,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":256,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":256,"text":"","rect":[115.19999694824219,107.78548431396485,121.16105696249008,103.09324645996094]},{"page":256,"text":"","rect":[115.19999694824219,121.28548431396485,121.16105696249008,116.59324645996094]},{"page":256,"text":"","rect":[115.19999694824219,134.78549194335938,121.16105696249008,130.09324645996095]},{"page":256,"text":"","rect":[115.19999694824219,148.28549194335938,121.16105696249008,143.59324645996095]},{"page":256,"text":"","rect":[115.19999694824219,161.78549194335938,121.16105696249008,157.09324645996095]},{"page":256,"text":"","rect":[115.19999694824219,175.28549194335938,121.16105696249008,170.59324645996095]},{"page":256,"text":"","rect":[115.19999694824219,188.78549194335938,121.16105696249008,184.09324645996095]},{"page":256,"text":"Inspect and classify all bridges in the zone.","rect":[133.1999969482422,83.51434326171875,305.3847303390503,74.40616607666016]},{"page":256,"text":"Inspect and classify all overpasses, underpasses, and culverts.","rect":[133.1999969482422,97.01434326171875,379.72417736053469,87.90616607666016]},{"page":256,"text":"Locate fords, crossing sites, or obstacle bypasses in the zone.","rect":[133.1999969482422,110.51434326171875,377.55779552459719,101.40616607666016]},{"page":256,"text":"Locate and clear all mines, obstacles, and barriers in the zone.","rect":[133.1999969482422,122.0,381.22405529022219,114.90616607666016]},{"page":256,"text":"Report reconnaissance information.","rect":[133.1999969482422,137.4943084716797,275.74456310272219,128.40615844726563]},{"page":256,"text":"Reconnoiter all terrain in the zone.","rect":[133.1999969482422,148.9903106689453,272.0882520675659,141.90615844726563]},{"page":256,"text":"Locate bypass around built-up areas, obstacles, and contaminated areas.","rect":[133.1999969482422,164.51434326171876,420.63872814178469,155.40615844726563]},{"page":256,"text":"Reconnoiter specific terrain in the zone.","rect":[133.1999969482422,177.9943084716797,293.1473035812378,168.90615844726563]},{"page":256,"text":"Reconnoiter defiles along the route. Clear them of enemy and obstacles or locate a bypass.","rect":[133.1999969482422,191.51434326171876,495.34307384490969,182.40615844726563]},{"page":256,"text":"Organization of Forces for a Zone Reconnaissance","rect":[72.0,216.08067321777345,308.4312111053467,206.27552795410157]},{"page":256,"text":"12-47. Several subordinate units operate abreast within their assigned area when performing a zone","rect":[90.0,233.63427734375,522.0664339141846,224.52609252929688]},{"page":256,"text":"reconnaissance. Commanders directing their forces to perform a zone reconnaissance designate a maneuver","rect":[90.0,245.15728759765626,521.9692285118103,236.04910278320313]},{"page":256,"text":"reserve when they expect to encounter significant enemy forces. That reserve should contain significant","rect":[90.0,256.62017822265627,521.9894175491334,247.51199340820313]},{"page":256,"text":"combat power. For example, armored company teams normally perform this task for a cavalry squadron in","rect":[90.0,268.1431884765625,521.9326686859131,259.0350036621094]},{"page":256,"text":"an armored BCT. Units conducting a zone reconnaissance ensure fires assets can adequately support","rect":[90.0,279.6661376953125,522.0004038772584,270.5579528808594]},{"page":256,"text":"throughout the execution of the operation.","rect":[89.98998260498047,291.1290283203125,258.33306407928469,282.0208435058594]},{"page":256,"text":"Control Measures for a Zone Reconnaissance","rect":[72.0,313.5337219238281,284.9098488006592,305.9355773925781]},{"page":256,"text":"12-48. Commanders control the performance of zone reconnaissance by assigning areas to units conducting","rect":[90.0,333.2943115234375,522.0444240570068,324.1861267089844]},{"page":256,"text":"the reconnaissance. They may designate their zone by designating lateral boundaries, lines of departure, and","rect":[90.01001739501953,344.7572021484375,522.0433864593506,335.6490173339844]},{"page":256,"text":"LOAs. Units conducting zone reconnaissance can further divide their zone with additional lateral boundaries","rect":[90.01005554199219,356.2801818847656,522.0153949241638,347.1719970703125]},{"page":256,"text":"to define subordinate unit’s zones. Figure 12-1 is an example of a sketch showing how commanders control","rect":[90.01005554199219,367.8031921386719,522.0132822952271,358.69500732421877]},{"page":256,"text":"zone reconnaissance. The primary difference between an area reconnaissance and a zone reconnaissance is","rect":[89.98998260498047,379.2660827636719,521.9085223655701,370.15789794921877]},{"page":256,"text":"that a zone reconnaissance typically involves larger areas than those associated with the performance of area","rect":[89.98998260498047,390.7890625,521.9411897735596,381.6808776855469]},{"page":256,"text":"reconnaissance.","rect":[89.99002075195313,400.28802490234377,153.02886486053468,393.2038879394531]},{"page":256,"text":"12-10","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":256,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":256,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":257,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":257,"text":"Figure 12-1. Example of zone reconnaissance control measures","rect":[163.8000030517578,489.11419677734377,466.2005147857666,479.7254638671875]},{"page":257,"text":"AREA RECONNAISSANCE","rect":[90.0,518.482177734375,212.104989528656,510.22796630859377]},{"page":257,"text":"12-49. Area reconnaissance is a form of reconnaissance operation that focuses on obtaining detailed","rect":[108.0,538.374267578125,540.0304708404541,529.4263916015625]},{"page":257,"text":"information about the terrain or enemy activity within a prescribed area. This area may consist of a","rect":[108.0,549.8972778320313,539.9983186798096,540.7891235351563]},{"page":257,"text":"single location, such as a town, a ridgeline, a forest, an airhead, a bridge, an installation, or any other critical","rect":[108.01001739501953,561.4202880859375,539.9716563186646,552.3121337890625]},{"page":257,"text":"operational feature such as obstacles. Obstacles are considered as either natural or man-made and can include","rect":[108.01000213623047,572.8631591796875,540.0874910430908,563.7750244140625]},{"page":257,"text":"areas with CBRN contamination. Commanders assign an area reconnaissance when information on the","rect":[108.01005554199219,584.4061889648438,540.0612459259033,575.2980346679688]},{"page":257,"text":"enemy situation is limited or when focused reconnaissance yields specific information on the area in question.","rect":[108.01005554199219,595.92919921875,540.0333814620972,586.821044921875]},{"page":257,"text":"Area reconnaissance is normally smaller than zone reconnaissance and is not usually contiguous to other","rect":[108.01005554199219,607.39208984375,540.0110986289978,598.283935546875]},{"page":257,"text":"friendly areas targeted for reconnaissance.","rect":[108.01005554199219,618.9150390625,277.06643199920657,609.806884765625]},{"page":257,"text":"12-50. Commanders may forgo detailed reconnaissance of their respective areas and focus their assets on","rect":[108.01005554199219,636.3798828125,539.9914455413818,627.271728515625]},{"page":257,"text":"NAIs that reveal enemy compositions, dispositions, and intentions when their reconnaissance objectives are","rect":[108.01004028320313,647.9029541015625,540.0762605743408,638.7847290039063]},{"page":257,"text":"oriented on enemy forces. Reconnaissance units cannot disregard terrain while focusing on enemy forces in","rect":[108.01004028320313,659.4259033203125,539.9782009124756,650.3177490234375]},{"page":257,"text":"this situation. However, they minimize their terrain reconnaissance efforts to those that may influence NAIs.","rect":[108.01000213623047,670.8887939453125,540.0534009933472,661.7806396484375]},{"page":257,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":257,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":257,"text":"12-11","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":258,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":258,"text":"Tasks Associated with the Performance of an Area Reconnaissance","rect":[72.0,82.40274810791016,386.00283586120607,74.81556701660156]},{"page":258,"text":"12-51. Units performing an area reconnaissance perform the following tasks within capability (unless","rect":[90.0,102.11431884765625,521.9802997093201,93.00614166259766]},{"page":258,"text":"otherwise ordered):","rect":[90.0,113.61729431152344,168.07183026885986,104.5291519165039]},{"page":258,"text":" Confirm or deny commander’s PIRs.","rect":[115.19999694824219,127.13427734375,281.26552867889407,118.0261001586914]},{"page":258,"text":" Reconnoiter specific terrain in the area.","rect":[115.19999694824219,140.61424255371095,290.91375255584719,131.52609252929688]},{"page":258,"text":" Find and report all enemy forces within the area.","rect":[115.19999694824219,154.13427734375,327.81548595428469,145.02609252929688]},{"page":258,"text":" Determine the trafficability of all terrain in the area, to include built-up areas.","rect":[115.19999694824219,167.63427734375,443.0214490890503,158.52609252929688]},{"page":258,"text":" Locate and determine the extent of all contamination in the area.","rect":[115.19999694824219,179.11024475097657,391.17791271209719,172.02609252929688]},{"page":258,"text":" Inspect and classify all overpasses, underpasses, defiles, and culverts.","rect":[115.19999694824219,194.63427734375,411.4034376144409,185.52609252929688]},{"page":258,"text":" Locate fords or crossing sites near all bridges in the area.","rect":[115.19999694824219,208.13427734375,361.17605113983157,199.02609252929688]},{"page":258,"text":" Inspect and classify all bridges in the area.","rect":[115.19999694824219,221.63427734375,303.16826915740969,212.52609252929688]},{"page":258,"text":" Locate a bypass around built-up areas, obstacles, and contamination in area.","rect":[115.19999694824219,235.13427734375,437.2619581222534,226.02609252929688]},{"page":258,"text":" Locate any bypasses for existing obstacles in the area.","rect":[115.19999694824219,248.63427734375,349.47771739959719,239.52609252929688]},{"page":258,"text":" Locate and clear all mines, obstacles, and barriers in the area.","rect":[115.19999694824219,260.1102294921875,378.9305372238159,253.02609252929688]},{"page":258,"text":" Report reconnaissance information.","rect":[115.19999694824219,275.6142272949219,275.74456310272219,266.5260925292969]},{"page":258,"text":"Organization of Forces for an Area Reconnaissance","rect":[72.0,300.26068115234377,313.9442726287842,290.45556640625]},{"page":258,"text":"12-52. Considerations for the organization of forces for an area reconnaissance are the same as organizing","rect":[90.0,317.7543029785156,522.0263576507568,308.6461181640625]},{"page":258,"text":"a zone reconnaissance. (See paragraph 12-47.) The overall commander of those units performing the area","rect":[90.0,329.2773132324219,522.0575227813721,320.16912841796877]},{"page":258,"text":"reconnaissance establishes a maneuver reserve if that individual expects units to encounter significant enemy","rect":[90.0,340.8003234863281,522.0024929046631,331.6921081542969]},{"page":258,"text":"forces. This reserve needs adequate combat power to reinforce decisively engaged reconnaissance forces. A","rect":[90.01000213623047,352.26318359375,522.0934491195678,343.1549987792969]},{"page":258,"text":"tank-heavy company team normally performs this task for a cavalry squadron of an armored BCT.","rect":[90.01001739501953,363.78619384765627,522.0523633956909,354.6780090332031]},{"page":258,"text":"Commanders ordering the performance of an area reconnaissance provide their reconnaissance elements with","rect":[90.00997924804688,375.3091735839844,522.0488796234131,366.20098876953127]},{"page":258,"text":"adequate fire support assets that move with those elements if the areas they are reconnoitering are located","rect":[90.00997924804688,386.7720642089844,521.8493556976318,377.66387939453127]},{"page":258,"text":"beyond supporting range of their main bodies.","rect":[90.00997924804688,398.2950744628906,274.7076368331909,389.1868896484375]},{"page":258,"text":"Control Measures for an Area Reconnaissance","rect":[72.0,420.6937255859375,290.4316993865967,413.0955810546875]},{"page":258,"text":"12-53. Figure 12-2 is a sketch showing that commanders control an area reconnaissance using the same","rect":[90.0,440.394287109375,522.1105623321533,431.2861022949219]},{"page":258,"text":"control measures as in a zone reconnaissance. The primary difference between an area and a zone","rect":[90.0,451.91729736328127,522.0577669219971,442.8091125488281]},{"page":258,"text":"reconnaissance is that a zone reconnaissance typically involves larger areas than those associated with the","rect":[90.0,463.4402770996094,522.0108308868408,454.33209228515627]},{"page":258,"text":"performance of area reconnaissance. Units conducting area reconnaissance can further divide their assigned","rect":[90.0,474.9031677246094,522.0914821624756,465.79498291015627]},{"page":258,"text":"area with additional lateral boundaries to define subordinate unit assigned areas. These subordinates’","rect":[90.0,486.4261779785156,521.9221093711853,477.3179931640625]},{"page":258,"text":"assigned areas are not necessarily the same size.","rect":[90.0,497.94915771484377,282.76775646209719,488.8409729003906]},{"page":258,"text":"12-12","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":258,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":258,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":259,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9457114257813,38.016021728515628]},{"page":259,"text":"Figure 12-2. Example of area reconnaissance control measures","rect":[164.9399871826172,503.8141784667969,465.06498622131348,494.4254455566406]},{"page":259,"text":"12-54. Units place additional control measures on recognizable terrain where possible. They locate contact","rect":[107.99635314941406,527.27099609375,540.0561900100709,518.162841796875]},{"page":259,"text":"points where they determine that it is necessary for adjacent units to make physical contact and the time the","rect":[107.986328125,538.7940063476563,540.0516634063721,529.67578125]},{"page":259,"text":"contact takes place. They use phase lines to coordinate the movement of elements operating abreast.","rect":[107.986328125,550.3170166015625,539.9549512863159,541.2088623046875]},{"page":259,"text":"Checkpoints indicate critical terrain features and help to control ground movement and coordinate air-ground","rect":[107.986328125,561.7799072265625,540.0125026702881,552.6717529296875]},{"page":259,"text":"integration. Commanders use FSCMs to control direct and indirect fires. They use additional control","rect":[107.98629760742188,573.3028564453125,539.9567637405396,564.1947021484375]},{"page":259,"text":"measures as necessary. In addition, commanders assigning the area reconnaissance mission specify the routes","rect":[107.98629760742188,584.8258666992188,539.9951312522888,575.7177124023438]},{"page":259,"text":"their reconnaissance units will use to enter their assigned areas. Units depart these assigned areas on different","rect":[107.9863052368164,596.2887573242188,539.9610972366334,587.1806030273438]},{"page":259,"text":"routes upon completion of their area reconnaissance tasks.","rect":[107.99629211425781,607.791748046875,341.24993419647219,598.70361328125]},{"page":259,"text":"12-55. Units inform the commander assigning the mission if they lack the time or resources to complete all","rect":[107.99632263183594,625.3267211914063,540.0255503616334,616.2185668945313]},{"page":259,"text":"the tasks listed in paragraph 12-51. Their respective commanders then issue further guidance on which tasks","rect":[107.99632263183594,636.7896118164063,540.0458514671326,627.6814575195313]},{"page":259,"text":"each unit needs to complete or the respective priority of these tasks. Their different reconnaissance objectives","rect":[107.98629760742188,648.3126220703125,540.0436542015076,639.1943969726563]},{"page":259,"text":"may make it clear which tasks are more important. These units report and await further instruction if they","rect":[107.9863052368164,659.7755126953125,540.0051174163818,650.6673583984375]},{"page":259,"text":"determine that they cannot complete assigned tasks after initiating their reconnaissance efforts. This includes","rect":[107.9863052368164,671.2984619140625,539.9953143577576,662.1903076171875]},{"page":259,"text":"such things as clearing enemy forces from their assigned areas or supporting the maneuver of their respective","rect":[107.9863052368164,682.8214721679688,540.0758333282471,673.7133178710938]},{"page":259,"text":"main bodies by reducing obstacles to create lanes. (See FM 3-98 for additional information on the","rect":[107.996337890625,694.2843627929688,540.1269807891846,685.1762084960938]},{"page":259,"text":"performance of area reconnaissance.)","rect":[107.996337890625,705.787353515625,257.35942626571656,696.69921875]},{"page":259,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":259,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":259,"text":"12-13","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":260,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":260,"text":"ROUTE RECONNAISSANCE","rect":[72.0,83.36216735839844,200.9632658958435,75.27597045898438]},{"page":260,"text":"12-56. Route reconnaissance is a form of reconnaissance operation to obtain detailed information of","rect":[90.0,103.29429626464844,521.9582421836853,94.36647033691406]},{"page":260,"text":"a specified route and all terrain from which the enemy could influence movement along that route. The","rect":[89.98998260498047,114.7772216796875,522.0703401641846,105.6690444946289]},{"page":260,"text":"route may be a road, highway, trail, mobility corridor, avenue of approach, or axis of advance. The","rect":[90.0,126.30023193359375,522.0023470001221,117.19205474853516]},{"page":260,"text":"reconnaissance effort provides new or updated information on route conditions, such as obstacles and bridge","rect":[90.0,137.8232421875,522.0701570587158,128.71505737304688]},{"page":260,"text":"classifications, and enemy, adversary, and civilian activity along the route. Commanders normally assign this","rect":[90.0,149.28607177734376,522.0614154319763,140.17788696289063]},{"page":260,"text":"mission during a zone or area reconnaissance when they require more information on a specific route for","rect":[90.0,160.80908203125,521.9920556602478,151.70089721679688]},{"page":260,"text":"friendly movement.","rect":[90.0,172.33209228515626,168.87244701385499,163.22390747070313]},{"page":260,"text":"Tasks Associated with a Route Reconnaissance","rect":[72.0,194.66270446777345,291.6680580291748,187.0755157470703]},{"page":260,"text":"12-57. Units conducting route reconnaissance perform specific tasks, unless ordered otherwise by their","rect":[90.0,214.43426513671876,522.0353906211853,205.32608032226563]},{"page":260,"text":"commanders. If they do not have the time or resources to complete all the tasks associated with the","rect":[90.0,225.957275390625,522.0634431915283,216.84909057617188]},{"page":260,"text":"performance of a route reconnaissance, units inform their higher echelon commanders. Those higher echelon","rect":[89.9999771118164,237.420166015625,522.0552272796631,228.31198120117188]},{"page":260,"text":"commanders then issue further guidance on which tasks these units must complete or the priority of each","rect":[89.9999771118164,248.943115234375,521.9949245452881,239.83493041992188]},{"page":260,"text":"task. (This guidance is usually clear from their individual reconnaissance objectives.) If they determine that","rect":[89.9999771118164,260.46612548828127,521.9684824905396,251.34793090820313]},{"page":260,"text":"they cannot complete all assigned tasks after initiating their route reconnaissance, such as clearing enemy","rect":[90.0,271.92901611328127,522.0112819671631,262.8208312988281]},{"page":260,"text":"forces or reducing obstacles, units report and continue to execute the mission within capability while","rect":[90.0,283.4520263671875,522.0040559844971,274.3438415527344]},{"page":260,"text":"simultaneously waiting for further guidance from their higher headquarters. (See FM 3-98 and ATP 3-34.81/","rect":[90.0,294.97503662109377,522.0774302444459,285.8668518066406]},{"page":260,"text":"MCWP 3-17.4 for additional information concerning route reconnaissance.)","rect":[89.98998260498047,306.43792724609377,394.03694701766968,297.3297424316406]},{"page":260,"text":"12-58.","rect":[89.98998260498047,321.9188232421875,115.83156871795655,315.0350646972656]},{"page":260,"text":"","rect":[115.19999694824219,334.7054443359375,121.16105696249008,330.01318359375]},{"page":260,"text":"","rect":[115.19999694824219,359.6654357910156,121.16105696249008,354.9731750488281]},{"page":260,"text":"","rect":[115.19999694824219,373.1654357910156,121.16105696249008,368.4731750488281]},{"page":260,"text":"","rect":[115.19999694824219,398.1854248046875,121.16105696249008,393.4931640625]},{"page":260,"text":"","rect":[115.19999694824219,411.6854248046875,121.16105696249008,406.9931640625]},{"page":260,"text":"","rect":[115.19999694824219,425.1854248046875,121.16105696249008,420.4931640625]},{"page":260,"text":"","rect":[115.19999694824219,438.6854248046875,121.16105696249008,433.9931640625]},{"page":260,"text":"","rect":[115.19999694824219,452.1854248046875,121.16105696249008,447.4931640625]},{"page":260,"text":"","rect":[115.19999694824219,465.6854248046875,121.16105696249008,460.9931640625]},{"page":260,"text":"","rect":[115.19999694824219,479.1854248046875,121.16105696249008,474.4931640625]},{"page":260,"text":"","rect":[115.19999694824219,492.6854248046875,121.16105696249008,487.9931640625]},{"page":260,"text":"","rect":[115.19999694824219,506.1854248046875,121.16105696249008,501.4931640625]},{"page":260,"text":"Route reconnaissance tasks (within capability) include—","rect":[124.54896545410156,323.962890625,352.5440483093262,314.8547058105469]},{"page":260,"text":"Find, report, and, based on engagement criteria, clear all enemy forces that can influence","rect":[133.1999969482422,337.4342956542969,522.1086092071533,328.32611083984377]},{"page":260,"text":"movement along the route.","rect":[133.1999969482422,348.8971862792969,240.46410655975343,339.78900146484377]},{"page":260,"text":"Reconnoiter and determine the trafficability of the route.","rect":[133.1999969482422,362.394287109375,359.8053846359253,353.2861022949219]},{"page":260,"text":"Reconnoiter all terrain that the enemy can use to influence movement along the route, such as","rect":[133.1999969482422,375.894287109375,521.9559466819763,366.7861022949219]},{"page":260,"text":"choke points, ambush sites, pickup zones, landing zones, and drop zones.","rect":[133.1999969482422,387.41729736328127,426.2239942550659,378.3091125488281]},{"page":260,"text":"Reconnoiter all built-up areas along route.","rect":[133.1999969482422,400.9142761230469,302.0841016769409,391.80609130859377]},{"page":260,"text":"Reconnoiter all lateral routes.","rect":[133.1999969482422,412.3902282714844,251.56728649139405,405.30609130859377]},{"page":260,"text":"Locate bypasses around built-up areas, obstacles, and contaminated areas.","rect":[133.1999969482422,427.9142761230469,428.97234630584719,418.80609130859377]},{"page":260,"text":"Inspect and classify all bridges within the area.","rect":[133.1999969482422,441.4142761230469,320.9297742843628,432.30609130859377]},{"page":260,"text":"Reconnoiter defiles along the route. Clear them of enemy and obstacles or locate a bypass.","rect":[133.1999969482422,454.9142761230469,495.3509168624878,445.80609130859377]},{"page":260,"text":"Inspect and classify all overpasses, underpasses, and culverts.","rect":[133.1999969482422,468.4142761230469,379.7202100753784,459.30609130859377]},{"page":260,"text":"Locate fords or crossing sites near all bridges on the route.","rect":[133.1999969482422,481.9142761230469,367.2972364425659,472.80609130859377]},{"page":260,"text":"Locate and clear all mines, obstacles, and barriers on the route.","rect":[133.1999969482422,493.3902282714844,385.1108350753784,486.30609130859377]},{"page":260,"text":"Submit route report.","rect":[133.1999969482422,508.89422607421877,214.0644178390503,499.80609130859377]},{"page":260,"text":"Organization of Forces for a Route Reconnaissance","rect":[72.0,533.540771484375,312.7397438201904,523.735595703125]},{"page":260,"text":"12-59. Commanders assign route reconnaissance as a separate mission or as a specified task for units","rect":[90.0,551.0343017578125,521.9646747093201,541.9261474609375]},{"page":260,"text":"conducting a zone or area reconnaissance. A platoon conducts a route reconnaissance over only one route at","rect":[90.0,562.5572509765625,521.9457163772584,553.4490966796875]},{"page":260,"text":"a time. For larger organizations, the number of platoons available directly influences the number of routes","rect":[90.0,574.080322265625,522.0374896507263,564.97216796875]},{"page":260,"text":"covered simultaneously. Integrating ground, air, and technical assets ensures a faster and more complete","rect":[90.0,585.5431518554688,522.0370760040283,576.4349975585938]},{"page":260,"text":"route reconnaissance.","rect":[90.0,595.0421142578125,176.13894176483155,587.9580078125]},{"page":260,"text":"12-60. A ground reconnaissance effort is essential if the mission is to conduct detailed reconnaissance of","rect":[90.0,614.5911865234375,521.9582421836853,605.4830322265625]},{"page":260,"text":"one or more routes or the mission requires clearing enemy forces from those routes and adjacent terrain.","rect":[90.0,626.0540161132813,522.0702466964722,616.935791015625]},{"page":260,"text":"Commanders operate and equip forces conducting ground reconnaissance to enable them to respond to enemy","rect":[90.0,637.5770263671875,522.0084743499756,628.4688720703125]},{"page":260,"text":"forces they encounter. Ground reconnaissance forces require immediate access to responsive fire support and","rect":[90.0,649.1000366210938,522.1006984710693,639.9918823242188]},{"page":260,"text":"other combat enablers. This is especially true when units expect to make contact with significant enemy","rect":[90.0,660.5629272460938,521.9963283538818,651.4547729492188]},{"page":260,"text":"forces. If commanders require detailed information on specific routes, engineer assets can determine the","rect":[90.0,672.0859375,521.9800691680908,662.977783203125]},{"page":260,"text":"classification of critical points along routes more quickly and accurately than scouts can. If commanders","rect":[89.98999786376953,683.60888671875,522.0621478538513,674.500732421875]},{"page":260,"text":"anticipate encountering significant obstacles, they include combat engineers as part of their ground","rect":[89.98998260498047,695.07177734375,522.0250759124756,685.963623046875]},{"page":260,"text":"reconnaissance forces. Commanders can also include CBRN, civil affairs, or EMS reconnaissance assets as","rect":[89.98998260498047,705.0,522.0503070335388,697.4866333007813]},{"page":260,"text":"required.","rect":[90.0,718.0977783203125,125.86158275604248,709.0096435546875]},{"page":260,"text":"12-14","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":260,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":260,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":261,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":261,"text":"12-61. Commanders employ aerial reconnaissance when required by the mission variables. However, aerial","rect":[108.0,83.51434326171875,540.0405650100709,74.40616607666016]},{"page":261,"text":"reconnaissance can rarely clear enemy forces from locations where they can affect movement on these routes","rect":[107.99999237060547,94.97723388671875,540.0036151390076,85.86905670166016]},{"page":261,"text":"and aircraft cannot breach obstacles. When time is limited, aerial reconnaissance is essential to determine","rect":[107.99999237060547,105.0,539.9290437774658,97.3920669555664]},{"page":261,"text":"which areas are clear of enemy forces and obstacles. Aerial reconnaissance can also cue ground","rect":[107.9999771118164,118.023193359375,539.9722194671631,108.9150161743164]},{"page":261,"text":"reconnaissance assets regarding where to focus their efforts.","rect":[108.0,129.486083984375,348.4529981613159,120.3779067993164]},{"page":261,"text":"Control Measures Associated with a Route Reconnaissance","rect":[90.0,151.89370727539063,366.8036476287842,144.29554748535157]},{"page":261,"text":"12-62. Commanders create an assigned area for the unit conducting the reconnaissance. They place lateral","rect":[108.0,171.654296875,540.0123667678834,162.54611206054688]},{"page":261,"text":"boundaries on both sides of reconnoitered routes. These lateral boundaries are far enough out from these","rect":[108.0,183.1171875,540.0304231719971,174.00900268554688]},{"page":261,"text":"routes to allow reconnaissance of all terrain from which an enemy force could influence each reconnoitered","rect":[108.0,194.64019775390626,539.9642238616943,185.53201293945313]},{"page":261,"text":"route. They draw lines of departure with reference to battlefield locations where enemy contact is possible.","rect":[108.00003814697266,206.1632080078125,539.9280347824097,197.05502319335938]},{"page":261,"text":"Commanders generally place these lines of departure before and perpendicular to the reconnoitered routes.","rect":[108.00003814697266,217.62603759765626,539.9230909347534,208.51785278320313]},{"page":261,"text":"This allows adequate maneuver space for the unit conducting the reconnaissance to deploy into a movement","rect":[108.00003814697266,229.1490478515625,540.0796275100709,220.04086303710938]},{"page":261,"text":"formation. These lines of departure create the rear boundary of the assigned area occupied by the units","rect":[108.00003814697266,240.67205810546876,539.9862811546326,231.56387329101563]},{"page":261,"text":"conducting the route reconnaissance. Commanders place LOAs far enough beyond the RP for each examined","rect":[107.99002075195313,252.13494873046876,540.0173854827881,243.02676391601563]},{"page":261,"text":"route, including any terrain from which an enemy force could influence that route. Together a SP and an","rect":[107.99002075195313,263.657958984375,539.9341945648193,254.54977416992188]},{"page":261,"text":"associated release point define a reconnoitered route. Commanders require detailed information on these","rect":[107.97997283935547,275.1608581542969,539.9412508087158,266.0727233886719]},{"page":261,"text":"routes and may add phase lines and checkpoints to coordinate reconnaissance, control movement, or","rect":[107.9800033569336,286.643798828125,539.9459130821228,277.5356140136719]},{"page":261,"text":"designate critical points. They place additional control measures on terrain features identifiable from the","rect":[107.9799575805664,298.16680908203127,539.9552278594971,289.0586242675781]},{"page":261,"text":"ground and the air to coordinate indirect and direct fires and assist in air to ground coordination. Figure 12-3","rect":[107.97996520996094,309.6898193359375,540.0023097991943,300.5816345214844]},{"page":261,"text":"depicts control measures associated with performing a route reconnaissance.","rect":[107.96987915039063,321.1526794433594,413.6580762863159,312.04449462890627]},{"page":261,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":261,"text":"Figure 12-3. Example of route reconnaissance control measures","rect":[162.6991424560547,697.3535766601563,467.2389974517822,687.96484375]},{"page":261,"text":"12-15","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":262,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":262,"text":"RECONNAISSANCE IN FORCE","rect":[72.0,83.36216735839844,213.01349782943727,75.27597045898438]},{"page":262,"text":"12-63. A reconnaissance in force is a form of reconnaissance operation designed to discover or test","rect":[90.0,103.3143310546875,522.0624902305603,94.36647033691406]},{"page":262,"text":"the enemy’s strength, dispositions, and reactions or to obtain other information. Battalion-sized task","rect":[89.9899673461914,114.7772216796875,521.9551906585693,105.6690444946289]},{"page":262,"text":"forces or larger organizations usually conduct a reconnaissance in force. Commanders assign this operation","rect":[89.98994445800781,126.30023193359375,521.9637355804443,117.19205474853516]},{"page":262,"text":"when an enemy force is operating within an area and they cannot obtain adequate intelligence about the","rect":[89.98999786376953,137.8232421875,521.8939485626221,128.71505737304688]},{"page":262,"text":"enemy force by other means. Units may also conduct a reconnaissance in force in restrictive terrain where an","rect":[89.98998260498047,149.28607177734376,522.0327663421631,140.17788696289063]},{"page":262,"text":"enemy is likely to ambush smaller reconnaissance forces. Reconnaissance in force is forceful reconnaissance,","rect":[89.98998260498047,160.80908203125,522.0383863449097,151.70089721679688]},{"page":262,"text":"conducted as an offensive operation with clearly stated reconnaissance objectives. The overall goal of a","rect":[90.0,172.33209228515626,522.0187654571533,163.21389770507813]},{"page":262,"text":"reconnaissance in force is to determine exploitable enemy weaknesses. It differs from other reconnaissance","rect":[90.0,183.79498291015626,522.0514192657471,174.68679809570313]},{"page":262,"text":"operations because commanders direct their performance to gain information solely about an enemy force.","rect":[90.0,195.3179931640625,522.0303297042847,186.20980834960938]},{"page":262,"text":"Commanders plan for both the reinforcement and the retrograde of their forces. They plan a reinforcement","rect":[90.0,206.78082275390626,521.9800791702271,197.67263793945313]},{"page":262,"text":"so they can exploit success and they plan a retrograde if they encounter superior enemy forces.","rect":[90.0,218.3038330078125,468.8253126144409,209.19564819335938]},{"page":262,"text":"Tasks Associated with a Reconnaissance in Force","rect":[72.0,240.68272399902345,302.3560157928467,233.0955352783203]},{"page":262,"text":"12-64.","rect":[90.0,258.41021728515627,115.84157848358155,251.52647399902345]},{"page":262,"text":"","rect":[115.19999694824219,271.2254333496094,121.16105696249008,266.5331726074219]},{"page":262,"text":"","rect":[115.19999694824219,284.7254333496094,121.16105696249008,280.0331726074219]},{"page":262,"text":"","rect":[115.19999694824219,298.2254333496094,121.16105696249008,293.5331726074219]},{"page":262,"text":"","rect":[115.19999694824219,334.7054443359375,121.16105696249008,330.01318359375]},{"page":262,"text":"","rect":[115.19999694824219,348.2054443359375,121.16105696249008,343.51318359375]},{"page":262,"text":"","rect":[115.19999694824219,361.7054443359375,121.16105696249008,357.01318359375]},{"page":262,"text":"Units performing a reconnaissance in force carry out these tasks:","rect":[124.55897521972656,260.45428466796877,383.71530866241457,251.34609985351563]},{"page":262,"text":"Penetrate the enemy’s disruption zone and determine its size and depth.","rect":[133.1999969482422,273.95428466796877,419.56960582733157,264.8460998535156]},{"page":262,"text":"Determine the location and disposition of enemy forces.","rect":[133.1999969482422,287.45428466796877,357.52385997772219,278.3460998535156]},{"page":262,"text":"Attack enemy positions and attempt to force the enemy to react by using local reserves or major","rect":[133.1999969482422,300.95428466796877,521.9717919883728,291.8360900878906]},{"page":262,"text":"counterattack forces, employing fires, adjusting positions, and employing specific weapon","rect":[133.1999969482422,312.41717529296877,522.0341091156006,303.2989807128906]},{"page":262,"text":"systems.","rect":[133.1999969482422,323.9401550292969,167.38022899627686,315.833984375]},{"page":262,"text":"Determine weaknesses in the enemy’s disposition to exploit.","rect":[133.1999969482422,337.4342956542969,375.28725719451907,328.32611083984377]},{"page":262,"text":"Locate obstacles and create lanes as specified.","rect":[133.1999969482422,350.91424560546877,317.8515577316284,341.82611083984377]},{"page":262,"text":"Enter areas of operation in complex terrain not previously occupied by friendly forces such as","rect":[133.1999969482422,364.4342956542969,521.9709613304138,355.32611083984377]},{"page":262,"text":"urban environments.","rect":[133.1999969482422,373.8731384277344,215.44414806365968,366.78900146484377]},{"page":262,"text":"As with other reconnaissance tasks, units performing reconnaissance in force report and continue to conduct","rect":[90.0137939453125,390.4161682128906,522.0992197952271,381.3079833984375]},{"page":262,"text":"their mission as they await further guidance from their higher headquarters if they cannot complete their","rect":[90.0137939453125,401.93914794921877,522.0128686485291,392.8309631347656]},{"page":262,"text":"assigned tasks.","rect":[90.0137939453125,413.40203857421877,149.51856517791749,404.2938537597656]},{"page":262,"text":"Organization of Forces for a Reconnaissance in Force","rect":[72.0,438.02069091796877,323.3706642303467,428.215576171875]},{"page":262,"text":"12-65. While specifically trained and equipped units usually conduct the other reconnaissance tasks, any","rect":[90.0,455.5743103027344,521.9900417327881,446.46612548828127]},{"page":262,"text":"maneuver force can conduct a reconnaissance in force. Commanders directing the performance of a","rect":[90.0,467.0973205566406,521.9829988555908,457.9891357421875]},{"page":262,"text":"reconnaissance in force organize their forces in the same way as they organize offensive operations. They","rect":[90.0,478.5601806640625,522.0098171234131,469.4519958496094]},{"page":262,"text":"normally direct the performance of a reconnaissance in force as a movement to contact or a series of frontal","rect":[90.0,490.08319091796877,522.0126719436646,480.9750061035156]},{"page":262,"text":"attacks across broad frontages. The lack of enemy information dictates that these forces are large and strong","rect":[90.0,501.54608154296877,522.0343532562256,492.4378967285156]},{"page":262,"text":"enough to develop the situation. They need to be capable of protecting themselves long enough to receive","rect":[89.99996185302735,513.069091796875,521.9037141876221,503.96087646484377]},{"page":262,"text":"support from other friendly assets. The less commanders know about their opposing enemy forces, the","rect":[89.99996185302735,524.592041015625,522.0561189727783,515.48388671875]},{"page":262,"text":"stronger they organize each friendly force.","rect":[89.99996185302735,536.054931640625,259.9663038253784,526.94677734375]},{"page":262,"text":"Control Measures for a Reconnaissance in Force","rect":[72.0,558.4537353515625,299.91299211120607,550.8555297851563]},{"page":262,"text":"12-66. The control measures associated with a reconnaissance in force are the same as for offensive","rect":[90.0,576.1902465820313,522.0367097930908,569.1061401367188]},{"page":262,"text":"operations. See paragraphs A-44 through A-61 for offensive operations control measures.","rect":[90.0,589.7373046875,448.1879529953003,580.629150390625]},{"page":262,"text":"SPECIAL RECONNAISSANCE","rect":[72.0,613.1400146484375,207.90622854232789,604.8359985351563]},{"page":262,"text":"12-67. Special reconnaissance is reconnaissance and surveillance actions conducted as a special operation","rect":[90.0,632.9742431640625,522.0094509124756,623.8861083984375]},{"page":262,"text":"in hostile, denied, or diplomatically and/or politically sensitive environments to collect or verify information","rect":[89.9899673461914,644.5172729492188,521.9739894866943,635.4091186523438]},{"page":262,"text":"of strategic or operational significance, employing military capabilities not normally found in conventional","rect":[89.9899673461914,655.9801635742188,522.0364756546021,646.8720092773438]},{"page":262,"text":"forces (JP 3-05). These actions provide an additional capability for commanders and supplement other","rect":[89.9899673461914,667.503173828125,521.9471337852478,658.39501953125]},{"page":262,"text":"conventional reconnaissance actions. Sometimes only visual observation or other collection methods in the","rect":[89.98995971679688,679.0261840820313,521.9793367462158,669.9180297851563]},{"page":262,"text":"target area can obtain the desired information, even with offensive cyber electromagnetic warfare techniques,","rect":[89.98995971679688,690.4890747070313,522.0423536300659,681.3809204101563]},{"page":262,"text":"long-range sensors, and overhead platforms. Special operations forces are equipped and possess capabilities","rect":[89.99996185302735,702.0120849609375,521.9141986351013,692.9039306640625]},{"page":262,"text":"12-16","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":262,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":262,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":263,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":263,"text":"enabling them to conduct reconnaissance on denied and hostile areas normally inaccessible to other forces or","rect":[108.0,83.51434326171875,540.0429589805603,74.40616607666016]},{"page":263,"text":"assets. Special reconnaissance activities include—","rect":[108.0,94.95719909667969,309.3619194030762,85.86905670166016]},{"page":263,"text":" Environmental reconnaissance.","rect":[133.1999969482422,106.45026397705078,276.10332775115969,99.36612701416016]},{"page":263,"text":" Armed reconnaissance.","rect":[133.1999969482422,119.95026397705078,244.53832530975343,112.86612701416016]},{"page":263,"text":" Target and threat assessment.","rect":[133.1999969482422,135.47430419921876,268.9610242843628,126.36612701416016]},{"page":263,"text":" Post-strike reconnaissance.","rect":[133.1999969482422,146.9502716064453,259.5412549972534,139.86611938476563]},{"page":263,"text":"See ATP 3-18.4 for additional information on special reconnaissance activities.","rect":[108.00376892089844,163.47325134277345,425.32094860076907,154.38510131835938]},{"page":263,"text":"RECONNAISSANCE STAFF INTEGRATION","rect":[90.0,186.89996337890626,286.80784702301028,178.59597778320313]},{"page":263,"text":"12-68. The performance of reconnaissance operations contributes significantly to each commander’s","rect":[108.0,206.8143310546875,540.1125018577576,197.70614624023438]},{"page":263,"text":"battlefield visualization. Staffs develop Annex B (Intelligence) to the base plan or order to support their","rect":[107.98999786376953,218.2772216796875,539.9782617149353,209.16897583007813]},{"page":263,"text":"commander’s decision-making process.","rect":[107.98998260498047,229.80023193359376,266.61257457733157,220.69204711914063]},{"page":263,"text":"12-69. Commanders make judicious, yet aggressive, use of their available reconnaissance assets.","rect":[107.98997497558594,247.26507568359376,539.9752759933472,238.14688110351563]},{"page":263,"text":"Reconnaissance planning ensures that available reconnaissance assets produce the greatest results.","rect":[107.98998260498047,258.7880859375,539.9195508956909,249.67990112304688]},{"page":263,"text":"Commanders set priorities for their reconnaissance assets as time and the assets themselves are limited.","rect":[107.98998260498047,270.2910461425781,539.9956617355347,261.2029113769531]},{"page":263,"text":"Generating many unfocused missions rapidly wears down these assets, making them less effective and","rect":[107.98998260498047,281.77392578125,540.0071315765381,272.6657409667969]},{"page":263,"text":"potentially leaving enemy vulnerabilities undiscovered.","rect":[107.98998260498047,293.29693603515627,329.97317028045657,284.1887512207031]},{"page":263,"text":"12-70. Commanders ensure the coordination and synchronization of all subordinate echelons for the","rect":[107.98998260498047,310.8219299316406,539.9971590118408,301.7137451171875]},{"page":263,"text":"reconnaissance effort. Since the need for information gained by reconnaissance is integral to all elements of","rect":[107.98998260498047,322.2847900390625,540.0283105430603,313.1766052246094]},{"page":263,"text":"operations and warfighting functions, reconnaissance operations demand an integrated approach to planning,","rect":[107.98998260498047,333.80780029296877,540.0502271652222,324.6996154785156]},{"page":263,"text":"preparation, and execution. The two habitual participants in the reconnaissance planning process are the","rect":[107.98998260498047,345.330810546875,539.9860506134033,336.2226257324219]},{"page":263,"text":"operations and intelligence staff officers. Operations staff officers have primary staff responsibility for","rect":[107.98998260498047,356.793701171875,540.0113427696228,347.6855163574219]},{"page":263,"text":"reconnaissance planning, allocating, and tasking resources. Normally, they are responsible for ground and","rect":[107.98998260498047,368.3166809082031,539.9566555023193,359.20849609375]},{"page":263,"text":"aerial reconnaissance assets, which include manned aviation, small UAS, engineers, CBRN, and artillery.","rect":[107.98999786376953,379.8396911621094,540.0161085128784,370.73150634765627]},{"page":263,"text":"Intelligence staff officers have primary responsibility for ground surveillance systems, larger UAS, and","rect":[107.99000549316406,391.30255126953127,540.0784206390381,382.1943359375]},{"page":263,"text":"special electronics mission aircraft. Civil affairs operations staff officers have primary responsibility for","rect":[107.98999786376953,402.8255615234375,540.0150659141541,393.7173767089844]},{"page":263,"text":"planning civil reconnaissance, civil engagement, and the analysis, evaluation, and integration of civil","rect":[107.98997497558594,414.34857177734377,540.0704722366334,405.2403869628906]},{"page":263,"text":"information into the common operational picture. Commanders ensure their staffs adopt an integrated","rect":[107.98998260498047,425.81146240234377,540.0163478851318,416.7032775878906]},{"page":263,"text":"combined arms approach to planning, preparing, executing, and assessing reconnaissance as an integral part","rect":[107.98998260498047,437.3344421386719,539.9560313186646,428.22625732421877]},{"page":263,"text":"of their information collection plans.","rect":[107.98999786376953,448.8374328613281,254.9152479171753,439.7492980957031]},{"page":263,"text":"INFORMATION COLLECTION PLAN","rect":[90.0,472.1880187988281,259.9882974624634,463.8960266113281]},{"page":263,"text":"12-71. Units coordinate their reconnaissance efforts with other higher echelon and lateral units to maximize","rect":[108.0,492.0542907714844,540.1625032501221,482.94610595703127]},{"page":263,"text":"information collection. Staffs, primarily intelligence staff officers, identify gaps in available intelligence,","rect":[108.0,503.5773010253906,540.0423536300659,494.4691162109375]},{"page":263,"text":"based on their initial IPB and their commanders’ critical information requirements. The IPB process identifies","rect":[108.0,515.0201416015625,540.0202167015076,505.9319763183594]},{"page":263,"text":"factors that impact their information collection efforts, such as—","rect":[108.0,526.5431518554688,367.6783256530762,517.4550170898438]},{"page":263,"text":" Avenues of approach that support friendly movement and exploit enemy weaknesses.","rect":[133.1999969482422,540.0543212890625,493.0633497238159,530.9461669921875]},{"page":263,"text":" Key terrain, choke points, obstacles, and hazard areas.","rect":[133.1999969482422,553.5543212890625,368.07290172576907,544.4461669921875]},{"page":263,"text":" Enemy positions, especially exploitable flanks.","rect":[133.1999969482422,567.0543212890625,339.4647169113159,557.9461669921875]},{"page":263,"text":" Observation points.","rect":[133.1999969482422,580.5343017578125,229.54438304901124,571.4461669921875]},{"page":263,"text":"12-72. The performance of reconnaissance tasks (part of their information collection efforts) and the IPB","rect":[107.9937515258789,598.0592651367188,540.0183012428283,588.9711303710938]},{"page":263,"text":"process are interactive and iterative, each feeding the other. (See FM 3-55 for more information on the","rect":[107.9937515258789,609.5421142578125,539.9820222930908,600.4339599609375]},{"page":263,"text":"information collection process and ATP 2-01.3 for more information on the IPB process.)","rect":[107.99372863769531,621.045166015625,466.77791381454468,611.95703125]},{"page":263,"text":"12-73. Intelligence and operations staff officers develop their initial synchronization plans to acquire","rect":[108.0037841796875,638.5901489257813,540.0581331329346,629.4819946289063]},{"page":263,"text":"information to help answer PIRs based on available information collection assets. These plans assign specific","rect":[107.99376678466797,650.052978515625,540.0137605743408,640.94482421875]},{"page":263,"text":"information collection tasks to specific units for action. They integrate information collection into the","rect":[107.9937744140625,661.5760498046875,539.9340486602783,652.4678955078125]},{"page":263,"text":"operation order and appropriate annexes.","rect":[107.9937744140625,673.0789794921875,271.5953016281128,663.9908447265625]},{"page":263,"text":"12-74. Operations staff officers use these synchronization plans when they prepare Annex L (Information","rect":[107.9937744140625,690.5638427734375,539.9479274749756,681.4556884765625]},{"page":263,"text":"Collection) to the operation orders. This annex provides for the flexible execution of reconnaissance","rect":[107.98373413085938,702.0668334960938,540.0503206329346,692.9786987304688]},{"page":263,"text":"operations, including the provision for adequate synchronization of fire support, sustainment, and other","rect":[107.98375701904297,713.60986328125,539.9730126914978,704.501708984375]},{"page":263,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":263,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":263,"text":"12-17","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":264,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":264,"text":"warfighting functions when completed to ensure the reconnaissance mission is adequately supported. (See","rect":[90.0,83.51434326171875,521.9411287384033,74.40616607666016]},{"page":264,"text":"ADP 5-0 for more information on the integration of information collection—including reconnaissance—into","rect":[89.98994445800781,94.97723388671875,522.0212917327881,85.86905670166016]},{"page":264,"text":"the military decision-making process.)","rect":[89.98994445800781,106.500244140625,243.86607909774782,97.3920669555664]},{"page":264,"text":"12-75. Civil affairs operations staff officers plan for civil reconnaissance and civil engagement similar to","rect":[89.98994445800781,124.02520751953125,521.9801540374756,114.91703033447266]},{"page":264,"text":"the way intelligence cells plan information collection. The civil affairs operations staff officers prioritize their","rect":[89.98994445800781,135.48809814453126,522.0343530235291,126.37992095947266]},{"page":264,"text":"civil reconnaissance and civil engagement information collection tasks to fill existing information gaps. The","rect":[89.98994445800781,147.0111083984375,522.0013094024658,137.90292358398438]},{"page":264,"text":"information collected allows them to update the civil affairs operations running estimates. The civil affairs","rect":[89.98994445800781,158.5340576171875,521.9120624046326,149.42587280273438]},{"page":264,"text":"operations concept of operations takes into account the quality of existing area assessments and civil","rect":[89.97993469238281,169.9969482421875,522.0041880569459,160.88876342773438]},{"page":264,"text":"information databases. (See FM 3-57 for additional information on civil reconnaissance and civil","rect":[89.97991180419922,181.4999237060547,522.0130381546021,172.41177368164063]},{"page":264,"text":"engagement.)","rect":[89.97991180419922,193.04296875,144.13600707626345,183.93478393554688]},{"page":264,"text":"RECONNAISSANCE TECHNIQUES","rect":[72.0,217.8863983154297,230.32712364196778,208.23599243164063]},{"page":264,"text":"12-76. There are two reconnaissance techniques commanders employ to answer information requirements:","rect":[90.0,236.2742919921875,522.0875620803834,227.16610717773438]},{"page":264,"text":"reconnaissance push and reconnaissance pull. Commanders employ these techniques based on their level of","rect":[90.0,247.79730224609376,522.0311791954041,238.68911743164063]},{"page":264,"text":"understanding of the operational environment combined with the time available to refine their understanding.","rect":[90.0,259.26019287109377,521.9280958175659,250.15200805664063]},{"page":264,"text":"In selecting one technique over the other, the commander considers the following:","rect":[90.0,270.783203125,418.83252667999269,261.6750183105469]},{"page":264,"text":" Degree of the situational understanding of the enemy.","rect":[115.19999694824219,284.2743225097656,348.16314220428469,275.1661376953125]},{"page":264,"text":" Time available to collect the information.","rect":[115.19999694824219,295.7502746582031,299.2645215988159,288.6661376953125]},{"page":264,"text":" Leadership ability of subordinate commanders.","rect":[115.19999694824219,311.2743225097656,321.7634229660034,302.1661376953125]},{"page":264,"text":" Proficiency of subordinate units to plan and rapidly react for uncertain situations.","rect":[115.19999694824219,324.7743225097656,458.1467237472534,315.6661376953125]},{"page":264,"text":"12-77. Reconnaissance pullisreconnaissancethat determines which routes are suitable for maneuver,","rect":[90.00377655029297,342.2792663574219,522.0020704269409,333.3514709472656]},{"page":264,"text":"where the enemy is strong and weak, and where gaps exist, thus pulling the main body toward and","rect":[90.0137939453125,353.7621765136719,522.0327901763916,344.8143310546875]},{"page":264,"text":"along the path of least resistance. This facilitates the commander’s initiative and agility. Reconnaissance","rect":[90.0137939453125,365.2851867675781,522.0661897735596,356.177001953125]},{"page":264,"text":"assets initially work over a broad area to develop the enemy situation. As units gain an understanding of","rect":[90.00372314453125,376.80816650390627,522.0320947227478,367.6999816894531]},{"page":264,"text":"enemy weaknesses, they then “pull” the main body to positions of tactical advantage. Reconnaissance pull","rect":[90.00369262695313,388.27105712890627,522.0010752639771,379.1628723144531]},{"page":264,"text":"knowingly emphasizes opportunity at the expense of a detailed, well-rehearsed plan, and unity of effort.","rect":[90.00369262695313,399.7940673828125,522.0169630050659,390.6858825683594]},{"page":264,"text":"Commanders base plans on several viable branches or COAs triggered by decision points. These decision","rect":[89.97358703613281,411.31707763671877,521.9366359710693,402.2088928222656]},{"page":264,"text":"points are tied to reconnaissance assets’ ability to answer commander’s critical information requirements.","rect":[89.97370147705078,422.7799377441406,521.9359693527222,413.6717529296875]},{"page":264,"text":"Leaders at all levels must understand and rehearse branches and sequels. A reconnaissance pull can also be","rect":[89.95368957519531,434.28289794921877,521.8855257110596,425.19476318359377]},{"page":264,"text":"used when higher echelons have not selected a specific COA while the unit conducting the reconnaissance","rect":[89.92359924316406,445.8259582519531,521.9800691680908,436.7177734375]},{"page":264,"text":"answers key PIRs to help develop the plan. This facilitates commanders’ initiative and agility.","rect":[89.92359161376953,457.288818359375,466.17364025115969,448.1806335449219]},{"page":264,"text":"12-78. Reconnaissance push is reconnaissance that refines the common operational picture, enabling","rect":[89.92361450195313,474.8138122558594,521.9379177093506,465.865966796875]},{"page":264,"text":"the commander to finalize the plan and support main and supporting efforts. It is normally used once","rect":[89.91358947753906,486.27667236328127,521.9550447540283,477.1684875488281]},{"page":264,"text":"the commander commits to a scheme of maneuver or COA. In these cases, commanders “push”","rect":[89.91363525390625,497.7796325683594,522.0492220001221,488.6914978027344]},{"page":264,"text":"reconnaissance assets into specific portions of their areasofoperation to confirm,deny, and validate planning","rect":[89.91363525390625,509.32269287109377,521.9069118499756,500.2145080566406]},{"page":264,"text":"assumptions that impact operations. Reconnaissance push emphasizes detailed, well-rehearsed planning.","rect":[89.94371795654297,520.7855224609375,521.9780836105347,511.6773376464844]},{"page":264,"text":"Typically, a COA has already been selected for the echelon executing the mission when a reconnaissance","rect":[89.93370056152344,532.3085327148438,521.8791780548096,523.2003784179688]},{"page":264,"text":"push is used.","rect":[89.92359924316406,543.8114624023438,141.32721996307374,534.723388671875]},{"page":264,"text":"12-79. The primary reason for using one method instead of the other is the time available. The time required","rect":[89.92361450195313,561.2964477539063,521.9250392913818,552.188232421875]},{"page":264,"text":"to develop a COA can give enemy forces more time to recover and prepare, thereby increasing the risk of","rect":[89.92359924316406,572.8194580078125,521.8804833946228,563.7113037109375]},{"page":264,"text":"higher casualties than necessary. Commanders balance the time needed to develop a COA with the need to","rect":[89.92361450195313,584.3424072265625,521.8784084320068,575.2342529296875]},{"page":264,"text":"act rapidly and decisively on the battlefield. There is no available model a commander can use to determine","rect":[89.92361450195313,595.8052978515625,521.8551302032471,586.6971435546875]},{"page":264,"text":"how much time is enough; that determination is part of the tactical art.","rect":[89.92361450195313,607.3282470703125,371.20110607147219,598.2200927734375]},{"page":264,"text":"SUSTAINMENT SUPPORT","rect":[72.0,630.6599731445313,191.18415212631227,622.35595703125]},{"page":264,"text":"12-80. Sustaining reconnaissance assets before, during, and after their commitment is a vital part of","rect":[90.0,650.5742797851563,522.0262353477478,641.4661254882813]},{"page":264,"text":"maintaining reconnaissance capabilities. The methods employed by units to sustain their deployed","rect":[90.0,662.0371704101563,522.0445461273193,652.9290161132813]},{"page":264,"text":"reconnaissance assets depend on the situations. Units address reconnaissance asset sustainment as part of","rect":[90.0,673.5401611328125,521.9275415000916,664.4520263671875]},{"page":264,"text":"their planning process for each reconnaissance operation.","rect":[90.0,685.0831909179688,319.11736583709719,675.9750366210938]},{"page":264,"text":"12-81. Reconnaissance elements frequently operate in locations distant from their sustaining base. They","rect":[90.0,702.5480346679688,522.0331935882568,693.4398803710938]},{"page":264,"text":"either carry a large enough basic load, or their units task-organize them with assets necessary to sustain them","rect":[90.0,714.071044921875,521.9852576217652,704.962890625]},{"page":264,"text":"12-18","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":264,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":264,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":265,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":265,"text":"until they can be relieved. Units carefully plan for casualty evacuation in both COAs. An alternative solution","rect":[108.0,83.51434326171875,539.9731960296631,74.40616607666016]},{"page":265,"text":"is to plan and coordinate for sustainment from nearby units.","rect":[108.0,94.97723388671875,346.8437452316284,85.86905670166016]},{"page":265,"text":"RECONNAISSANCE METHODS","rect":[90.0,120.26969909667969,296.43419566345218,110.59553527832031]},{"page":265,"text":"12-82. Commanders consider the mission variables and the capabilities of their reconnaissance assets when","rect":[108.0,140.5542449951172,540.0994167327881,131.46609497070313]},{"page":265,"text":"deciding on a reconnaissance method. When possible, commanders typically employ combinations of these","rect":[108.01000213623047,152.0972900390625,540.0163850860596,142.98910522460938]},{"page":265,"text":"methods to increase the reconnaissance operation’s effectiveness. The reconnaissance methods include","rect":[108.01002502441406,163.6002655029297,540.0645418243408,154.51211547851563]},{"page":265,"text":"dismounted, mounted, aerial (manned and unmanned), and reconnaissance by fire.","rect":[108.0000228881836,175.0831298828125,437.6160535812378,165.97494506835938]},{"page":265,"text":"DISMOUNTED RECONNAISSANCE","rect":[90.0,198.4421844482422,250.55985403060914,190.35598754882813]},{"page":265,"text":"12-83. Dismounted reconnaissance is the most time-consuming method used by ground units. However, it","rect":[108.0,218.394287109375,540.0163950881959,209.28610229492188]},{"page":265,"text":"permits the most detailed information collection about the enemy, terrain, civil considerations, and","rect":[107.9899673461914,229.857177734375,539.9703273773193,220.74899291992188]},{"page":265,"text":"infrastructure. A commander considers using dismounted reconnaissance when—","rect":[107.9899673461914,241.38018798828126,434.6371269226074,232.27200317382813]},{"page":265,"text":" Stealth is required, or security is the primary concern.","rect":[133.1999969482422,254.874267578125,366.16912364959719,245.76608276367188]},{"page":265,"text":" Time is available.","rect":[133.1999969482422,266.3502197265625,222.58849620819093,259.2660827636719]},{"page":265,"text":" Detailed information is required.","rect":[133.1999969482422,281.8542175292969,282.2846632003784,272.7660827636719]},{"page":265,"text":" The reconnaissance objective is a stationary threat, fixed site, or terrain feature.","rect":[133.1999969482422,295.3742980957031,468.86931896209719,286.256103515625]},{"page":265,"text":" Unit expects, or has made, enemy contact through visual and/or electromagnetic means.","rect":[133.1999969482422,308.8742980957031,502.7195997238159,299.76611328125]},{"page":265,"text":" Environment conditions favor dismounted reconnaissanceor hinder mounted reconnaissance. (For","rect":[133.1999969482422,322.354248046875,539.9809472618103,313.26611328125]},{"page":265,"text":"example, terrain is muddy or swampy and is easier to traverse on foot.)","rect":[151.1999969482422,333.8973083496094,435.56880736923218,324.78912353515627]},{"page":265,"text":" The terrain or threat preclude use of reconnaissance vehicles.","rect":[133.1999969482422,347.3742370605469,395.8032178878784,338.2861022949219]},{"page":265,"text":" Vehicles are not available.","rect":[133.1999969482422,358.8802795410156,257.25666332244875,351.7861022949219]},{"page":265,"text":" Terrain creates a visual dead space that prevents using optics or sensors.","rect":[133.1999969482422,374.394287109375,440.0125684738159,365.2861022949219]},{"page":265,"text":"MOUNTED RECONNAISSANCE","rect":[90.0,397.7622375488281,235.32526540756227,389.676025390625]},{"page":265,"text":"12-84. Mounted reconnaissance enables a more rapid tempo while increasing the potential compromise of","rect":[108.0,417.654296875,540.0206811485291,408.5461120605469]},{"page":265,"text":"reconnaissance operations. Mounted reconnaissance should take advantage of standoff capabilities provided","rect":[108.0,429.17730712890627,540.0245265960693,420.0691223144531]},{"page":265,"text":"by surveillance and weapon systems to observe and engage from greater ranges. A commander considers","rect":[108.0,440.7002868652344,540.0312030296326,431.59210205078127]},{"page":265,"text":"using mounted reconnaissance when—","rect":[108.0,452.1631774902344,264.362117767334,443.05499267578127]},{"page":265,"text":" Time is limited.","rect":[133.1999969482422,463.6302490234375,214.7889051437378,456.5461120605469]},{"page":265,"text":" Distance to reconnaissance objective requires mounted movement.","rect":[133.1999969482422,479.154296875,418.11977672576907,470.0361022949219]},{"page":265,"text":" Stealth and security are not primary concerns.","rect":[133.1999969482422,492.654296875,334.7763624191284,483.5461120605469]},{"page":265,"text":" Detailed information is not required, or the mounted method affords the same scope as the","rect":[133.1999969482422,506.1342468261719,539.9929475860596,497.0461120605469]},{"page":265,"text":"dismounted method.","rect":[151.1999969482422,515.6532592773438,232.90404796600343,508.5691223144531]},{"page":265,"text":" Environmental conditions permit this type of reconnaissance. (For example, the terrain is","rect":[133.1999969482422,531.17431640625,539.9348895530701,522.066162109375]},{"page":265,"text":"relatively flat and dry and tracked and wheeled vehicles can traverse with little difficulty.)","rect":[151.1999969482422,542.63720703125,511.66728759384156,533.529052734375]},{"page":265,"text":" Enemy location is known.","rect":[133.1999969482422,556.13427734375,255.64446544647218,547.026123046875]},{"page":265,"text":"AERIAL RECONNAISSANCE","rect":[90.0,579.502197265625,222.12526845932008,571.2479858398438]},{"page":265,"text":"12-85. Manned and unmanned aircraft system organizations are specifically equipped, organized, and","rect":[108.0,599.4542846679688,540.0223293304443,590.3461303710938]},{"page":265,"text":"trained to conduct reconnaissance. These capabilities are a key component of BCTs and above echelons","rect":[108.0,610.977294921875,539.9823138694763,601.869140625]},{"page":265,"text":"information collection activities. Both UAS and manned aircraft possess the capability to operate","rect":[108.0,622.440185546875,540.0364046173096,613.33203125]},{"page":265,"text":"independently or in conjunction with ground reconnaissance elements.","rect":[108.0,633.9631958007813,390.1581983566284,624.844970703125]},{"page":265,"text":"12-86. Implementing airspace coordinating measures (ACMs) is a key requirement for the effective","rect":[108.0,651.4881591796875,540.0556917266846,642.3800048828125]},{"page":265,"text":"integration of aerial reconnaissance into all operations. At the BCT level and above units must ensure ACMs","rect":[108.0,662.9510498046875,540.0454242210388,653.8428955078125]},{"page":265,"text":"are planned and included in their unit airspace plans.","rect":[108.0,674.4540405273438,318.82583141326907,665.3659057617188]},{"page":265,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":265,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":265,"text":"12-19","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":266,"text":"Chapter 12","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":266,"text":"Manned Aerial Reconnaissance","rect":[72.0,82.40274810791016,219.86213456726075,74.81556701660156]},{"page":266,"text":"12-87. Manned aerial reconnaissance units are specifically equipped, trained, and organized to conduct","rect":[90.0,102.11431884765625,522.0223154983521,93.00614166259766]},{"page":266,"text":"zone, area, and route reconnaissance. If properly task-organized they are capable of executing a","rect":[90.0,113.6373291015625,522.0875520782471,104.5291519165039]},{"page":266,"text":"reconnaissance in force. Both aviation formations are organized and trained to conduct reconnaissance in","rect":[90.0,125.16033935546875,522.0222682952881,116.05204010009766]},{"page":266,"text":"support of the division’s maneuver plan. Aviation units employed at the troop and squadron levels,","rect":[90.0,136.6231689453125,522.0423536300659,127.5149917602539]},{"page":266,"text":"particularly the air cavalry squadron, can conduct reconnaissance at distance (up to 100 km beyond the","rect":[90.0,148.14617919921876,522.0113191680908,139.03799438476563]},{"page":266,"text":"FLOT), across restrictive terrain, and at a high tempo (weather permitting). Aviation units can insert","rect":[90.00997924804688,159.669189453125,522.0350718460084,150.56100463867188]},{"page":266,"text":"surveillance teams at, or near, observation posts. Aircrews can observe and provide security on station for","rect":[90.01998901367188,171.132080078125,521.9658105430603,162.02389526367188]},{"page":266,"text":"extended times using rotation techniques if they have detailed requirements in advance. Alternatively,","rect":[90.01998901367188,182.65509033203126,522.0562696456909,173.54690551757813]},{"page":266,"text":"aviation units may be task-organized with ground reconnaissance assets to evaluate routes and obstacles and","rect":[90.01998901367188,194.1781005859375,522.0573635101318,185.06991577148438]},{"page":266,"text":"classify bridges. Units use aerial reconnaissance to cue other reconnaissance methods or sensors to specific","rect":[90.03004455566406,205.6409912109375,521.9964876251221,196.53280639648438]},{"page":266,"text":"areas increasing the overall information collection capability. (See FM 3-04 for more information on Army","rect":[90.0199966430664,217.1639404296875,522.1145534515381,208.05575561523438]},{"page":266,"text":"aviation and reconnaissance).","rect":[90.02006530761719,228.6669158935547,208.0296277999878,219.57876586914063]},{"page":266,"text":"Unmanned Aircraft System Aerial Reconnaissance","rect":[72.0,253.2207489013672,310.3560157928467,243.4156036376953]},{"page":266,"text":"12-88. UAS are best suited to execute route, zone, and area reconnaissance. UAS offer numerous","rect":[90.0,269.0,522.0406024436951,261.6661071777344]},{"page":266,"text":"advantages to commanders including the ability to—","rect":[89.99999237060547,282.29730224609377,301.6185111999512,273.1891174316406]},{"page":266,"text":" Observe areas and objectives where terrain or a threat can hinder ground or manned aerial","rect":[115.19999694824219,295.7943115234375,522.0583872756959,286.6761169433594]},{"page":266,"text":"reconnaissance.","rect":[133.1999969482422,305.233154296875,196.23882579803468,298.1490173339844]},{"page":266,"text":" Operate at extended distances or extended durations, or both.","rect":[115.19999694824219,320.7342529296875,377.56386852264407,311.6461181640625]},{"page":266,"text":" Maximize standoff distance to retain the element of surprise and increase force security.","rect":[115.19999694824219,334.2543029785156,485.5633192062378,325.1461181640625]},{"page":266,"text":"12-89. When employing UAS units must have procedures to execute a battle handover between a UAS and","rect":[90.00376892089844,351.779296875,522.1182155609131,342.6711120605469]},{"page":266,"text":"other reconnaissance assets. This could include a reconnaissance handover to another UAS platform, manned","rect":[90.00376892089844,363.2822265625,522.0483303070068,354.194091796875]},{"page":266,"text":"aircraft, or ground reconnaissance asset. Furthermore, units must have procedures in place in the event of a","rect":[90.00376892089844,374.7651672363281,522.0292024688721,365.656982421875]},{"page":266,"text":"loss of data link between the UAS and its operators.","rect":[89.9937515258789,386.2680969238281,297.7583875656128,377.1799621582031]},{"page":266,"text":"RECONNAISSANCE BY FIRE","rect":[72.0,409.6422119140625,205.16359853744508,401.5559997558594]},{"page":266,"text":"12-90. Reconnaissance by fireis a reconnaissance technique in which a unit fires on a suspected enemy","rect":[90.0,429.59429931640627,522.0464382171631,420.6464538574219]},{"page":266,"text":"position. This technique is appropriate when time is critical and stealthy maneuver to develop the situation","rect":[89.99999237060547,441.05718994140627,521.9291896820068,431.9490051269531]},{"page":266,"text":"further is not possible. The fires may be either direct, indirect, or a combination of both to cause the enemy","rect":[89.99998474121094,452.5801696777344,522.0233669281006,443.47198486328127]},{"page":266,"text":"forces to disclose their presence by movement or return fire. The advantage of indirect fire is that it does not","rect":[90.0,464.1031799316406,522.0894541702271,454.9949951171875]},{"page":266,"text":"give away friendly locations and usually causes enemy forces to displace from the impact area. However,","rect":[90.01001739501953,475.5660705566406,521.9580030441284,466.4578857421875]},{"page":266,"text":"reconnaissance by fire may not cause a seasoned or prepared enemy force to react.","rect":[90.01001739501953,487.08905029296877,419.86159801483157,477.9808654785156]},{"page":266,"text":"RECONNAISSANCE UNDER LIMITED-VISIBILITY CONDITIONS","rect":[72.0,510.47998046875,371.2019100189209,502.1759948730469]},{"page":266,"text":"12-91. Battlefield obscuration, fog, rain, and snow reduce visibility. Generally, reconnaissance during","rect":[90.0,530.3343505859375,522.0222682952881,521.2261962890625]},{"page":266,"text":"limited visibility takes more time than during periods of normal visibility. However, limited-visibility","rect":[90.0,541.8572998046875,521.9712429046631,532.7491455078125]},{"page":266,"text":"conditions provide better stealth and enhance the survivability of reconnaissance assets. Units frequently","rect":[90.0,553.3803100585938,521.9431667327881,544.2721557617188]},{"page":266,"text":"employ dismounted reconnaissance patrols at night. These patrols use light amplification devices, thermal","rect":[90.0,564.8432006835938,521.9899058303834,555.7350463867188]},{"page":266,"text":"observation devices, and electronic surveillance devices to compensate for reduced visibility conditions.","rect":[90.0,576.3662109375,506.92397594451907,567.258056640625]},{"page":266,"text":"12-92. Mounted reconnaissance normally focuses on road networks during limited-visibility conditions. An","rect":[90.0,593.8911743164063,522.0344142913818,584.7830200195313]},{"page":266,"text":"enemy force can detect engine and track noises of friendly mounted reconnaissance elements at considerable","rect":[90.0,605.3540649414063,522.0118684844971,596.2459106445313]},{"page":266,"text":"distances at night. This makes mounted reconnaissance elements susceptible to ambush. Strict noise and light","rect":[90.0,616.8770751953125,522.0591196975709,607.768798828125]},{"page":266,"text":"discipline, along with masking sounds, such as artillery fires, help mounted reconnaissance forces avoid","rect":[90.0,628.4000244140625,522.0070705413818,619.2918701171875]},{"page":266,"text":"compromise or ambush.","rect":[90.0,639.8428955078125,186.40441417694093,630.7547607421875]},{"page":266,"text":"12-93. High winds, extreme temperature, loose topsoil, or sand may adversely affect aerial reconnaissance.","rect":[90.0,657.387939453125,522.0485792160034,648.27978515625]},{"page":266,"text":"Aerial reconnaissance units plan their missions in much the same way as ground units. They use the same","rect":[90.0,668.910888671875,521.9077425079346,659.802734375]},{"page":266,"text":"type of operations graphic control measures and consider the same critical tasks. Aerial reconnaissance units","rect":[90.0,680.373779296875,521.9391620140076,671.265625]},{"page":266,"text":"organize aviation assets to accomplish missions by considering the same IPB aspects as ground forces.","rect":[90.0,691.8967895507813,522.0180616378784,682.7886352539063]},{"page":266,"text":"Commanders focus on air hazards to navigation and anticipated enemy air defense capabilities. (See ATP 2-","rect":[90.0,703.4197998046875,521.9722802696228,694.3116455078125]},{"page":266,"text":"01.3 for more information on the effects of weather and atmospheric conditions.)","rect":[90.0,714.8626708984375,414.2282617149353,705.7745361328125]},{"page":266,"text":"12-20","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":266,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":266,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":267,"text":"Reconnaissance","rect":[468.9599914550781,44.55902099609375,539.9430258789063,38.016021728515628]},{"page":267,"text":"RECUPERATION AND RECONSTITUTION OF RECONNAISSANCE","rect":[90.0,85.28965759277344,527.1826308860779,75.61549377441406]},{"page":267,"text":"ASSETS","rect":[90.0,101.36668395996094,142.04613414001467,91.69252014160156]},{"page":267,"text":"12-94. Units must plan for the recuperation and reconstitution of reconnaissance forces. The relieving unit","rect":[108.0,121.67425537109375,540.0813364944459,112.56607818603516]},{"page":267,"text":"or units must be capable of accomplishing the reconnaissance objective assigned. Relieving units must","rect":[108.0,133.197265625,540.0724863967896,124.07907104492188]},{"page":267,"text":"complete a deliberate relief in place to ensure continuous reconnaissance while maintaining contact with the","rect":[108.0,144.72027587890626,540.0675325469971,135.61209106445313]},{"page":267,"text":"enemy force. When a commander employs small units continuously for extended periods, they can become","rect":[108.0,156.18310546875,539.9793977813721,147.07492065429688]},{"page":267,"text":"ineffective. When this occurs, restoring these units to acceptable levels of effectiveness may require either","rect":[108.0,167.70611572265626,539.9766748008728,158.59793090820313]},{"page":267,"text":"recuperation or reconstitution. Recuperation—a short break for rest, resupply, and maintenance—is often","rect":[108.0,179.2291259765625,540.0283718109131,170.12094116210938]},{"page":267,"text":"sufficient to return units to effectiveness. Units can extend these recuperation periods to conduct refresher","rect":[108.0,190.67198181152345,539.9890039024353,181.58383178710938]},{"page":267,"text":"training, new equipment training, or any required specialized training for the next mission.","rect":[108.0,202.21502685546876,470.44939708709719,193.10684204101563]},{"page":267,"text":"12-95. Reconnaissance units and systems are vulnerable to detection, engagement, and destruction by","rect":[108.0,219.67987060546876,540.0213527679443,210.57168579101563]},{"page":267,"text":"enemy forces. Commanders determine whether to reconstitute, by either regenerating or reorganizing these","rect":[107.9899673461914,231.202880859375,539.9405794219971,222.09469604492188]},{"page":267,"text":"units, when this occurs and they can no longer perform their primary missions.","rect":[107.98999786376953,242.72589111328126,422.90972423553469,233.61764526367188]},{"page":267,"text":"12-96. Regenerating a unit requires significant resources. The organization two echelons above the unit","rect":[107.98998260498047,260.19073486328127,539.9812998733521,251.08255004882813]},{"page":267,"text":"being regenerated directs the regeneration procedure and coordinates for the necessary personnel, equipment,","rect":[107.98998260498047,271.7137451171875,539.9901075363159,262.6055603027344]},{"page":267,"text":"and supplies from the appropriate theater sustainment command supporting organization if that headquarters","rect":[107.98998260498047,283.23675537109377,539.9882342796326,274.1285705566406]},{"page":267,"text":"lacks organic, assigned, or attached sustainment assets. For example, a BCT can regenerate one of its cavalry","rect":[107.98998260498047,294.6996154785156,539.9631862640381,285.5914306640625]},{"page":267,"text":"troops. In the regeneration process, the BCT could use a combination of weapon system replacement","rect":[108.0000228881836,306.22259521484377,540.0775523147584,297.1144104003906]},{"page":267,"text":"operations, battle damage assessment and repair, normal replacement operations, and medical returnees to","rect":[108.00003814697266,317.74560546875,539.9422512054443,308.6374206542969]},{"page":267,"text":"provide the needed resources. Units could use these resources, combined with training, to regenerate the","rect":[108.0,329.2085266113281,540.0371370391846,320.100341796875]},{"page":267,"text":"degraded troop’s combat power. Alternatively, they could designate one of their maneuver companies to","rect":[108.0,340.73150634765627,539.9700222015381,331.6233215332031]},{"page":267,"text":"perform cavalry troop functions.","rect":[108.0,352.2545166015625,238.00352001190186,343.1463317871094]},{"page":267,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":267,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":267,"text":"12-21","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":268,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":269,"text":"Chapter 13","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":269,"text":"Security Operations","rect":[238.97999572753907,154.12814331054688,391.043442276001,139.11740112304688]},{"page":269,"text":"This chapter addresses those considerations unique to the performance of security","rect":[126.0,188.7806854248047,504.0724277496338,178.79986572265626]},{"page":269,"text":"operations. General offensive and defensive considerations discussed previously in this","rect":[126.0,201.4405975341797,504.17881259536747,191.45977783203126]},{"page":269,"text":"manual continue to apply to security operations. This chapter addresses the general","rect":[126.0,214.10057067871095,504.1096908493042,204.1197509765625]},{"page":269,"text":"security considerations and types of security operations.","rect":[126.0,226.76048278808595,372.5229539871216,216.7796630859375]},{"page":269,"text":"GENERAL SECURITY OPERATIONS CONSIDERATIONS","rect":[90.0,252.08970642089845,462.1573707122803,242.4015655517578]},{"page":269,"text":"13-1. Security operations are those operations performed by commanders to provide early and accurate","rect":[108.0,272.394287109375,539.9964265899658,263.2861022949219]},{"page":269,"text":"warning of enemy operations, to provide the forces being protected with time and maneuver space within","rect":[108.0,283.857177734375,539.9363307952881,274.7489929199219]},{"page":269,"text":"which to react to the enemy, and to develop the situation to allow commanders to effectively use their","rect":[108.0,295.3801574707031,539.8839013633728,286.27197265625]},{"page":269,"text":"protected forces (ADP 3-90). They prevent surprise, reduce uncertainty, and provide early warning of enemy","rect":[108.0,306.9031677246094,540.0335597991943,297.79498291015627]},{"page":269,"text":"activities. Security operations are a dynamic effort that anticipates and thwarts enemy collection efforts.","rect":[108.00000762939453,318.3660583496094,540.0242872238159,309.25787353515627]},{"page":269,"text":"When successful, security operations allow the force to maintain the initiative.","rect":[108.00000762939453,329.8890380859375,421.7840528488159,320.7808532714844]},{"page":269,"text":"13-2. Security operations are not to be confused with the more general term of security. Security is measures","rect":[108.00000762939453,347.4140319824219,539.9962909202576,338.30584716796877]},{"page":269,"text":"taken by a military unit, activity, or installation to protect itself against all acts designed to, or which may,","rect":[108.00003814697266,358.87689208984377,540.0223340988159,349.7687072753906]},{"page":269,"text":"impair its effectiveness (JP 3-10). Security includes a wide range of activities such as preventing unauthorized","rect":[108.00003814697266,370.39990234375,539.9782619476318,361.2917175292969]},{"page":269,"text":"access into secure areas or establishing perimeter security around an operating base. Security is inherent in","rect":[107.99000549316406,381.92291259765627,539.8790798187256,372.8147277832031]},{"page":269,"text":"all operations and is always the first priority of work. Furthermore, security is the responsibility of every","rect":[107.97997283935547,393.3857727050781,539.9713649749756,384.277587890625]},{"page":269,"text":"Soldier and unit whereas security operations are distinct missions.","rect":[107.97997283935547,404.9087829589844,372.0971632003784,395.80059814453127]},{"page":269,"text":"13-3. The main difference between the performance of security operations and reconnaissance operations is","rect":[108.0000228881836,422.43377685546877,540.1165912132263,413.3255920410156]},{"page":269,"text":"that security operations orient on the force, area, or facility, while reconnaissance operations orient on enemy","rect":[108.0,433.8966979980469,539.9681301116943,424.7884826660156]},{"page":269,"text":"and terrain. Security operations are supporting efforts. As a supporting effort, economy of force is often a","rect":[107.98999786376953,445.4196472167969,539.9912996368408,436.31146240234377]},{"page":269,"text":"condition associated with the performance of security operations. Security operations are essential for","rect":[107.98998260498047,456.942626953125,540.0183007774353,447.8344421386719]},{"page":269,"text":"preserving friendly forces combat power. Paragraphs 13-4 through 13-9 include general security","rect":[107.98998260498047,468.405517578125,539.9714870452881,459.2973327636719]},{"page":269,"text":"considerations that are applicable to all security operations and units.","rect":[107.98999786376953,479.9285583496094,384.0309705734253,470.82037353515627]},{"page":269,"text":"LOCAL SECURITY","rect":[90.0,503.2799987792969,178.26043796539308,494.97601318359377]},{"page":269,"text":"13-4. Local security is the low-level security activities conducted near a unit to prevent surprise by the","rect":[108.0,523.1943359375,539.9710359649658,514.086181640625]},{"page":269,"text":"enemy. All units are responsible for their own local security and responding to Level I threats. Local security","rect":[107.98999786376953,534.6572265625,540.0934963226318,525.549072265625]},{"page":269,"text":"is not an operation of its own. It includes any local measure taken by units that protect against enemy actions.","rect":[108.0,546.18017578125,539.9981641769409,537.072021484375]},{"page":269,"text":"It involves avoiding enemy detection or deceiving the enemy about friendly positions and intention. Local","rect":[108.0,557.64306640625,540.0349497756959,548.534912109375]},{"page":269,"text":"security provides immediate protection to friendly forces and is typically performed by a unit for self-","rect":[108.0,569.1660766601563,539.9649560508728,560.0579223632813]},{"page":269,"text":"protection, but it may also be provided by another unit when the security requirements are greater than the","rect":[108.0,580.6890869140625,540.0151643829346,571.5809326171875]},{"page":269,"text":"unit security capabilities. Local security may include countermobility and survivability activities as well as","rect":[108.0,592.1519775390625,539.9272601585388,583.0438232421875]},{"page":269,"text":"the use of active and passive measures to provide local security.","rect":[108.0,603.6749267578125,363.69240856170657,594.5667724609375]},{"page":269,"text":"OBSERVATION POSTS","rect":[90.0,627.0480346679688,196.07086753845216,618.7559814453125]},{"page":269,"text":"13-5. An observation post is a position from which observations are made or fires are directed and","rect":[108.0,646.9542846679688,540.0103902740478,638.0264282226563]},{"page":269,"text":"adjusted. All observation posts should possess appropriate communications. While aerial observers and","rect":[108.0,658.4371337890625,540.0164089202881,649.3289794921875]},{"page":269,"text":"sensor systems are extremely useful, those systems do not constitute aerial observation posts. The security","rect":[107.9899673461914,669.960205078125,539.9211940765381,660.8519897460938]},{"page":269,"text":"force unit determines tentative initial observation post locations along or behind the screen line to ensure","rect":[107.98999786376953,681.483154296875,540.0022859649658,672.375]},{"page":269,"text":"effective surveillance of their sectors of observation and designated NAIs. The unit or asset that occupies","rect":[107.98999786376953,692.946044921875,539.9376971702576,683.837890625]},{"page":269,"text":"each observation post may shift its exact location to achieve the commander’s intent. Units may place more","rect":[107.98998260498047,704.4690551757813,540.0407381134033,695.3609008789063]},{"page":269,"text":"than one observation post along high-speed avenues of approach to allow the tracking of an enemy contact","rect":[107.98998260498047,715.9920654296875,539.9432139358521,706.8839111328125]},{"page":269,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":269,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":269,"text":"13-1","rect":[504.00299072265627,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":270,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":270,"text":"from one observation post to another, which allows the maintaining of the enemy contact without requiring","rect":[90.0,83.51434326171875,521.9752101898193,74.40616607666016]},{"page":270,"text":"security forces to displace. Security force commanders task subordinate units to perform reconnaissance and","rect":[90.0000228881836,94.97723388671875,522.0884914398193,85.86905670166016]},{"page":270,"text":"combat patrols to cover gaps between observation posts. Units place restrictive FSCMs around observation","rect":[90.0,106.500244140625,521.9949855804443,97.3920669555664]},{"page":270,"text":"post locations to prevent fratricide.","rect":[90.0,118.00315856933594,229.66282176971436,108.9150161743164]},{"page":270,"text":"13-6. Observation posts may be either mounted or dismounted. Mounted observation posts can use their","rect":[90.0,135.48809814453126,522.0323388633728,126.37992095947266]},{"page":270,"text":"vehicular optics, weapons systems, and tactical mobility to displace rapidly when necessary. However, an","rect":[90.0,147.0111083984375,521.9553127288818,137.90292358398438]},{"page":270,"text":"enemy force can detect them more readily than dismounted observation posts. Dismounted observation posts","rect":[90.0,158.5340576171875,522.0180804710388,149.42587280273438]},{"page":270,"text":"provide maximum stealth but lack the speed of displacement, optics, and weapons of mounted ones. It takes","rect":[90.0,169.97691345214845,522.0595233421326,160.88876342773438]},{"page":270,"text":"a minimum of two Soldiers to establish an observation post, and then they can only operate effectively for","rect":[90.0,181.51995849609376,521.9315087852478,172.41177368164063]},{"page":270,"text":"no more than 12 hours. Observation posts manned for more than 12 hours require a minimum of an infantry","rect":[90.0,193.04290771484376,521.9714870452881,183.93478393554688]},{"page":270,"text":"squad or scout section to ensure continuous operation. The screening force patrols dead maneuver space and","rect":[90.0,204.505859375,522.0237941741943,195.39767456054688]},{"page":270,"text":"the area between observation posts, conducts resupply operations, and rests or sustains its personnel. In","rect":[90.0,216.02880859375,521.9556179046631,206.92062377929688]},{"page":270,"text":"addition, under limited-visibility conditions, units can establish observation posts as listening posts to take","rect":[90.0,227.49169921875,522.0410432891846,218.38351440429688]},{"page":270,"text":"advantage of the increased auditory acuteness that occurs when Soldier vision is degraded.","rect":[89.99999237060547,239.01470947265626,452.44744396209719,229.90652465820313]},{"page":270,"text":"COMBAT OUTPOSTS","rect":[72.0,262.3680114746094,171.5305995941162,254.07601928710938]},{"page":270,"text":"13-7. A combat outpost is a reinforced observation post capable of conducting limited combat","rect":[90.0,282.2943115234375,522.0353906211853,273.3464660644531]},{"page":270,"text":"operations. Using combat outposts is a technique for employing security forces in restrictive terrain that","rect":[90.0000228881836,293.7572021484375,522.0513682327271,284.6490173339844]},{"page":270,"text":"precludes mounted security forces from covering the area. Units also use combat outposts when enemy forces","rect":[90.00001525878906,305.2801818847656,521.9550311546326,296.1719970703125]},{"page":270,"text":"infiltrating into and through the security area could overrun smaller observation posts. They use a combat","rect":[90.00001525878906,316.8031921386719,521.9921030960084,307.69500732421877]},{"page":270,"text":"outpost to extend the depth of the security area, to keep friendly forward observation posts in place until they","rect":[90.00001525878906,328.2660827636719,522.0400295257568,319.15789794921877]},{"page":270,"text":"can observe the enemy force’s main body, or to secure friendly forward observation posts that enemy forces","rect":[90.00001525878906,339.7890625,522.0604999046326,330.6808776855469]},{"page":270,"text":"might encircle. Both mounted and dismounted forces can employ combat outposts.","rect":[90.0000228881836,351.31207275390627,421.6621961593628,342.2038879394531]},{"page":270,"text":"13-8. While the mission variables determine the size, location, and number of combat outposts a unit","rect":[90.0000228881836,368.75689697265627,522.0130991897584,359.66876220703127]},{"page":270,"text":"establishes, a reinforced platoon typically occupies each combat outpost. A combat outpost requires enough","rect":[90.0000228881836,380.2999267578125,521.9794826507568,371.1917419433594]},{"page":270,"text":"resources to accomplish its missions, but it should not seriously deplete the strength of the main body. It is","rect":[90.01000213623047,391.82293701171877,521.8961322288513,382.7147521972656]},{"page":270,"text":"usually located far enough forward of the protected force to preclude enemy ground reconnaissance elements","rect":[90.01001739501953,403.28582763671877,522.0688617210388,394.1776428222656]},{"page":270,"text":"from observing the actions of the protected force.","rect":[90.01001739501953,414.8088073730469,287.69158458709719,405.70062255859377]},{"page":270,"text":"13-9. Units organize the combat outpost to provide an all-around defense to withstand a superior enemy","rect":[90.01001739501953,432.33380126953127,522.0204372406006,423.2256164550781]},{"page":270,"text":"force. When the enemy force has significant armored capability, commanders may give combat outposts","rect":[90.0,443.7966613769531,521.9644305686951,434.6884765625]},{"page":270,"text":"more antitank weapons. Forces operating combat outposts can conduct aggressive patrolling, engage and","rect":[90.0,455.31964111328127,522.0711574554443,446.2114562988281]},{"page":270,"text":"destroy enemy reconnaissance elements, and engage the enemy main body before their extraction. Units plan","rect":[90.0,466.78253173828127,521.9199123382568,457.6743469238281]},{"page":270,"text":"to extract friendly forces from their outposts before enemy forces overrun them.","rect":[90.0,478.3055419921875,409.95879650115969,469.1973571777344]},{"page":270,"text":"SECURITY OPERATIONS CONSIDERATIONS","rect":[72.0,503.5496826171875,371.43480601501468,493.87554931640627]},{"page":270,"text":"13-10. Commanders designate a security force when using any of the types of security operations. The","rect":[90.0,523.8543090820313,522.0502595977783,514.7461547851563]},{"page":270,"text":"protected force may not always be a military force; it can also be a civilian population, civil institutions, and","rect":[89.9800033569336,535.3773193359375,522.0124416351318,526.2691650390625]},{"page":270,"text":"civilian infrastructure in the unit’s assigned area. FM 3-90 describes security operations that focus on","rect":[89.9799575805664,546.8402099609375,521.9410305023193,537.7320556640625]},{"page":270,"text":"securing a force. Units may perform security operations to the front, flanks, or rear of their main body. All","rect":[89.9800033569336,558.3631591796875,522.0023570022584,549.2550048828125]},{"page":270,"text":"maneuver forces are capable of conducting security operations. To obtain proficiency in security operations,","rect":[89.98004913330078,569.8861694335938,521.9028272628784,560.7780151367188]},{"page":270,"text":"units need habitual support relationships with attachments and established SOPs. Commanders ensure that","rect":[89.98004913330078,581.3290405273438,522.0492320022584,572.2409057617188]},{"page":270,"text":"subordinate units perform the associated security tasks in support of their security operation.","rect":[89.98004913330078,592.8720703125,459.63885021209719,583.763916015625]},{"page":270,"text":"13-11. In addition to the operational and mission variables, there are several general considerations when","rect":[89.97005462646485,610.3970947265625,521.9833278656006,601.2889404296875]},{"page":270,"text":"performing security operations. These apply to all security operations, but they are most applicable to the","rect":[89.95999908447266,621.8599243164063,521.8701448516846,612.7517700195313]},{"page":270,"text":"performance of screen, guard, and cover operations. These additional considerations include—","rect":[89.94998168945313,633.3829345703125,469.02668380737307,624.2747802734375]},{"page":270,"text":" Security fundamentals.","rect":[115.19999694824219,646.8543090820313,225.4651746749878,637.7461547851563]},{"page":270,"text":" Commander’s security guidance.","rect":[115.19999694824219,660.3543090820313,265.1192579269409,651.2461547851563]},{"page":270,"text":" Security forces size.","rect":[115.19999694824219,673.8543090820313,214.00026988983155,664.7461547851563]},{"page":270,"text":" Location and orientation of the security forces.","rect":[115.19999694824219,687.3543090820313,320.59099864959719,678.2461547851563]},{"page":270,"text":" Time the security force must be established.","rect":[115.19999694824219,700.8543090820313,309.5219678878784,691.7461547851563]},{"page":270,"text":" Criteria for ending the security mission.","rect":[115.19999694824219,714.3543090820313,292.6673536300659,705.2461547851563]},{"page":270,"text":"13-2","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":270,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":270,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":271,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":271,"text":" Augmentation of security forces.","rect":[133.1999969482422,83.51434326171875,282.82476329803469,74.40616607666016]},{"page":271,"text":" Special requirements or constraints.","rect":[133.1999969482422,96.99430847167969,294.5251111984253,87.90616607666016]},{"page":271,"text":" Fires planning.","rect":[133.1999969482422,110.51434326171875,211.24485301971436,101.40616607666016]},{"page":271,"text":" Integration of ground and Army aviation.","rect":[133.1999969482422,124.01434326171875,316.7264051437378,114.90616607666016]},{"page":271,"text":" Engineer planning","rect":[133.1999969482422,137.51434326171876,224.77786827087403,128.40615844726563]},{"page":271,"text":" Sustainment.","rect":[133.1999969482422,149.0003204345703,203.20379161834718,141.90615844726563]},{"page":271,"text":" Positioning of command posts and combat trains.","rect":[133.1999969482422,164.51434326171876,348.76433849334719,155.40615844726563]},{"page":271,"text":" Reporting.","rect":[133.1999969482422,178.01434326171876,193.7278699874878,168.90615844726563]},{"page":271,"text":"These considerations are in addition to the planning considerations applicable to other types of operations","rect":[108.00376892089844,192.47320556640626,540.0296771507263,183.36502075195313]},{"page":271,"text":"discussed in this publication.","rect":[108.00376892089844,203.97618103027345,223.5484266281128,194.88803100585938]},{"page":271,"text":"SECURITY FUNDAMENTALS","rect":[90.0,227.39996337890626,224.50035667419435,219.09597778320313]},{"page":271,"text":"13-12.","rect":[108.0,245.21018981933595,133.84157848358155,238.3264617919922]},{"page":271,"text":"","rect":[133.1999969482422,258.0254211425781,139.16105696249009,253.3331756591797]},{"page":271,"text":"","rect":[133.1999969482422,271.5254211425781,139.16105696249009,266.8331604003906]},{"page":271,"text":"","rect":[133.1999969482422,285.02545166015627,139.16105696249009,280.33319091796877]},{"page":271,"text":"","rect":[133.1999969482422,298.52545166015627,139.16105696249009,293.83319091796877]},{"page":271,"text":"","rect":[133.1999969482422,312.02545166015627,139.16105696249009,307.33319091796877]},{"page":271,"text":"Successful security operations depend on properly applying the five fundamentals:","rect":[142.55897521972657,247.2542724609375,473.36337995147707,238.14608764648438]},{"page":271,"text":"Provide early and accurate warning.","rect":[151.1999969482422,260.7542724609375,295.2976026535034,251.64608764648438]},{"page":271,"text":"Provide reaction time and maneuver space.","rect":[151.1999969482422,274.2342224121094,323.37761974334719,265.1460876464844]},{"page":271,"text":"Orient of the protected force, area, or facility to be secured.","rect":[151.1999969482422,287.7543029785156,388.65703868865969,278.6461181640625]},{"page":271,"text":"Perform continuous reconnaissance.","rect":[151.1999969482422,299.2302551269531,295.88982677459719,292.1461181640625]},{"page":271,"text":"Maintain enemy contact.","rect":[151.1999969482422,314.7543029785156,250.36292552947999,305.6461181640625]},{"page":271,"text":"Provide Early and Accurate Warning","rect":[90.0,339.3807067871094,266.51889991760256,329.5755920410156]},{"page":271,"text":"13-13. The security force provides early warning by detecting enemy forces quickly and reporting","rect":[108.0,356.9342956542969,540.0341701507568,347.82611083984377]},{"page":271,"text":"information accurately to the main body. The security force operates at varying distances from the main body","rect":[108.0,368.4573059082031,539.9081325531006,359.34912109375]},{"page":271,"text":"based on the mission variables. At a minimum, it operates far enough from the main body to prevent enemy","rect":[108.0,379.9201965332031,539.9753322601318,370.8119812011719]},{"page":271,"text":"ground forces from observing or engaging the main body with direct fires. The earlier the security force","rect":[108.0,391.44317626953127,540.0942659454346,382.3349914550781]},{"page":271,"text":"detects enemy forces, the more time the main body has to assess the changing situation and react.","rect":[108.0,402.90606689453127,497.3251905441284,393.7978820800781]},{"page":271,"text":"Provide Reaction Time and Maneuver Space","rect":[90.0,427.4987487792969,299.84756242370607,417.715576171875]},{"page":271,"text":"13-14. Each security force provides its main body with enough reaction time and maneuver space to respond","rect":[108.0,445.0743103027344,540.0732326507568,435.96612548828127]},{"page":271,"text":"effectively to likely enemy actions by operating at a distance from the main body and by offering resistance","rect":[108.0,456.5973205566406,540.0029573516846,447.4891357421875]},{"page":271,"text":"to approaching enemy forces. Units determine the amount of time and space required to respond to","rect":[108.0,468.0601806640625,540.0250148773193,458.9519958496094]},{"page":271,"text":"information provided by their IPB process and the time their main bodies require to react to enemy COAs.","rect":[108.0,479.58319091796877,539.9289503097534,470.4750061035156]},{"page":271,"text":"Security forces operating at a distance from their main bodies offer more time and space to their main bodies","rect":[108.0,491.106201171875,539.9997699241638,481.9980163574219]},{"page":271,"text":"to react to enemy forces. Each security force attempts to hinder an enemy force’s advance by acting within","rect":[108.0,502.5690612792969,539.9710597991943,493.46087646484377]},{"page":271,"text":"its capabilities and mission constraints.","rect":[108.0,514.072021484375,264.4062147140503,504.98388671875]},{"page":271,"text":"Orient on the Force, Area, of Facility to be Secured","rect":[90.0,538.70068359375,330.37642515563967,528.8955078125]},{"page":271,"text":"13-15. Security forces focus all their actions on protecting and providing early warning to force, area, or","rect":[108.0,556.1943359375,540.0223290977478,547.086181640625]},{"page":271,"text":"facility they are securing. They operate between the force, area, or facility and known or suspected enemy","rect":[107.99996185302735,567.71728515625,539.9496974945068,558.609130859375]},{"page":271,"text":"units. If the force they are securing moves, security forces move ","rect":[107.9800033569336,579.2402954101563,375.20135021209719,570.1321411132813]},{"page":271,"text":"moves and orients on their movement.","rect":[382.6582336425781,577.2162475585938,539.9612379074097,570.1321411132813]},{"page":271,"text":"Security force units need to know the moving forces’ scheme of maneuver to keep their security force","rect":[107.98001098632813,590.7031860351563,540.0935335235596,581.5950317382813]},{"page":271,"text":"between these main bodies and approaching enemy forces. The value of terrain occupied by security forces","rect":[107.98001098632813,602.2261962890625,539.9700458030701,593.1180419921875]},{"page":271,"text":"hinges on the degree of resistance those security forces can provide to their respective main bodies from that","rect":[107.98001098632813,613.7492065429688,540.0568613967896,604.6410522460938]},{"page":271,"text":"terrain.","rect":[107.98001098632813,623.18798828125,136.6452283859253,616.1038818359375]},{"page":271,"text":"Perform Continuous Reconnaissance","rect":[90.0,647.61376953125,263.4817482147217,640.0155639648438]},{"page":271,"text":"13-16. Security forces aggressively and continuously seek out enemy forces and reconnoiter key terrain","rect":[108.0,667.374267578125,539.9476833343506,658.26611328125]},{"page":271,"text":"within their assigned areas. They perform area or zone reconnaissance to detect enemy movement or enemy","rect":[108.0,678.837158203125,539.8975124359131,669.72900390625]},{"page":271,"text":"preparations for action and to learn as much as possible about the terrain. In stability-focused operations,","rect":[108.0,690.3601684570313,540.0363721847534,681.2520141601563]},{"page":271,"text":"terrain information includes a larger focus on the civilian population. The ultimate goal of security forces is","rect":[108.0,701.8831787109375,539.9290301780701,692.7750244140625]},{"page":271,"text":"to determine the enemy force’s COA and assist their main bodies to counter it. Terrain information focuses","rect":[107.9899673461914,713.3460693359375,539.8750140647888,704.2379150390625]},{"page":271,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":271,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":271,"text":"13-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":272,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":272,"text":"on terrain advantages or disadvantages to both the enemy and friendly forces for the performance of offensive","rect":[90.0,83.51434326171875,521.9792146759033,74.40616607666016]},{"page":272,"text":"or defensive operations. Stationary security forces use combinations of observation posts, aviation elements,","rect":[90.0,94.97723388671875,521.9829053878784,85.86905670166016]},{"page":272,"text":"patrols, and information collection assets to perform reconnaissance. Moving security forces perform area,","rect":[90.0,106.500244140625,522.0173902511597,97.3920669555664]},{"page":272,"text":"route, or zone reconnaissance as well as using observation posts to detect enemy movements and","rect":[90.0,118.023193359375,521.9675807952881,108.9150161743164]},{"page":272,"text":"preparations.","rect":[90.0,129.46604919433595,141.9446668624878,120.3779067993164]},{"page":272,"text":"Maintain Enemy Contact","rect":[72.0,154.10069274902345,191.08030530166628,144.29554748535157]},{"page":272,"text":"13-17. Once security forces make enemy contact, they do not break contact unless specifically directed by","rect":[90.0,171.654296875,521.9482936859131,162.54611206054688]},{"page":272,"text":"their main body commander. However, the first security asset that makes contact does not have to maintain","rect":[90.0,183.1171875,522.0339260101318,174.00900268554688]},{"page":272,"text":"contact if the entire security force maintains contact with the enemy force. The security force ensures that","rect":[90.0,194.64019775390626,522.0173106155396,185.53201293945313]},{"page":272,"text":"their subordinate security assets handover contact with the enemy force from one asset to another. Security","rect":[89.99002075195313,206.1632080078125,521.9720363616943,197.05502319335938]},{"page":272,"text":"forces continuously collect information on the enemy force’s activities to assist their main body in","rect":[89.99002075195313,217.62603759765626,522.0253810882568,208.51785278320313]},{"page":272,"text":"determining potential and actual enemy COAs, thus preventing those enemy forces from surprising their","rect":[89.99002075195313,229.1490478515625,521.9488427696228,220.04086303710938]},{"page":272,"text":"main bodies. Maintaining continuous visual contact allows security forces freedom of maneuver and","rect":[89.99002075195313,240.67205810546876,522.0181179046631,231.56387329101563]},{"page":272,"text":"flexibility to use direct or indirect fires on enemy forces. These considerations require security forces to have","rect":[89.99002075195313,252.13494873046876,522.0633211212158,243.02676391601563]},{"page":272,"text":"depth in space and time to maneuver.","rect":[89.98999786376953,263.6379089355469,239.13161754608155,254.54965209960938]},{"page":272,"text":"COMMANDER’S SECURITY GUIDANCE","rect":[72.0,287.03997802734377,257.89435720443728,278.7239990234375]},{"page":272,"text":"13-18. During security operations, it is important for the ground elements conducting security operations to","rect":[90.0,306.95428466796877,521.9925441741943,297.8460998535156]},{"page":272,"text":"understand the commander’s intent in a clear and concise manner so that they can accomplish the stated","rect":[90.0,318.41717529296877,521.9020900726318,309.3089904785156]},{"page":272,"text":"objectives within the required timeframe. The commander provides the guidance through dialogue","rect":[90.0,329.9401550292969,522.0835847930908,320.82196044921877]},{"page":272,"text":"throughout mission planning and the final operation order. The security guidance has three sections: focus,","rect":[90.0100326538086,341.4631652832031,521.9893140792847,332.35498046875]},{"page":272,"text":"duration, and engagement and disengagement criteria. Paragraphs 13-19 through 13-22 outline the contents","rect":[90.01005554199219,352.9260559082031,521.9823138694763,343.81787109375]},{"page":272,"text":"of the commander’s security guidance. (See FM 3-98 for more information on commander’s security","rect":[89.9800033569336,364.44903564453127,522.0013332366943,355.3408508300781]},{"page":272,"text":"guidance.)","rect":[89.97997283935547,375.91192626953127,131.9557702598572,366.8037414550781]},{"page":272,"text":"Focus","rect":[72.0,398.302734375,99.48733005142212,390.8912353515625]},{"page":272,"text":"13-19. Commanders focus their forces by identifying a security objective in support of the force, area, or","rect":[90.0,418.0743103027344,522.0033471641541,408.95611572265627]},{"page":272,"text":"facility being protected. Security objective is the most important entity to protect during that specific","rect":[90.01001739501953,429.5973205566406,521.9454011993408,420.4891357421875]},{"page":272,"text":"security effort. Commanders and leaders of units conducting security operations should anticipate the focus","rect":[89.9899673461914,441.0601806640625,522.0462787132263,431.9519958496094]},{"page":272,"text":"to change throughout the phases in an operation as the security objective may change to enable the execution","rect":[89.9899673461914,452.58319091796877,521.9598293304443,443.4649963378906]},{"page":272,"text":"of current and future operations. A security objective can range from creating time to allow forces to establish","rect":[89.98999786376953,464.106201171875,522.0190334320068,454.9880065917969]},{"page":272,"text":"a defense to forcing an enemy force to travel down an avenue of approach. Furthermore, units use their","rect":[89.98998260498047,475.569091796875,521.8707788047791,466.4609069824219]},{"page":272,"text":"security objective to guide them in setting priorities when they lack time to complete all the tasks associated","rect":[89.98998260498047,487.0920715332031,522.0234279632568,477.973876953125]},{"page":272,"text":"with performing a specific type of security operation. Units conducting security operations need to establish,","rect":[89.98998260498047,498.5549621582031,522.0485181808472,489.44677734375]},{"page":272,"text":"clarify, and prioritize security tasks that enable the security objective to remain protected.","rect":[90.0000228881836,510.07794189453127,448.1768445968628,500.9597473144531]},{"page":272,"text":"Duration","rect":[72.0,532.4627685546875,114.76709593200684,524.8755493164063]},{"page":272,"text":"13-20. The second section of a commander’s security guidance covers duration. A duration can be either","rect":[90.0,552.2343139648438,521.9612939414978,543.1261596679688]},{"page":272,"text":"short or long. Short duration security operations will last no longer than 12 hours. Units usually use these","rect":[90.0000228881836,563.6971435546875,522.0599641876221,554.5889892578125]},{"page":272,"text":"security operations to take advantage of time available and to maximize the massing of reconnaissance assets","rect":[90.0000228881836,575.22021484375,521.9887225608826,566.112060546875]},{"page":272,"text":"through observation posts and other observing capabilities. Long duration security operations will last 12","rect":[90.0000228881836,586.7431640625,521.9473781585693,577.635009765625]},{"page":272,"text":"hours or longer. The number of observation posts and capabilities will be less than short duration due to the","rect":[90.0000228881836,598.2060546875,522.0404329376221,589.097900390625]},{"page":272,"text":"number of personnel and support needed to continuously enable the operation. The smaller number of","rect":[90.0000228881836,609.7290649414063,522.0293481407166,600.6209106445313]},{"page":272,"text":"observation posts is due to implementing a rest cycle to ensure that dismounted Soldiers in the observation","rect":[90.0,621.1919555664063,522.0183010101318,612.0838012695313]},{"page":272,"text":"posts stay focused when in position.","rect":[89.98994445800781,632.7149658203125,234.43422985076905,623.6068115234375]},{"page":272,"text":"Engagement and Disengagement Criteria","rect":[72.0,657.3207397460938,266.02317237854006,647.5155639648438]},{"page":272,"text":"13-21. Commanders must clearly define the size or type of enemy force they want their subordinate","rect":[90.0,674.874267578125,521.9950838165283,665.76611328125]},{"page":272,"text":"elements to engage or avoid. The commander ensures that subordinate leaders understand this in order to","rect":[90.0,686.337158203125,521.9839992523193,677.22900390625]},{"page":272,"text":"avoid becoming decisively engaged which prevents the unit from continuing security operations.","rect":[90.0,697.8601684570313,477.1606092453003,688.7520141601563]},{"page":272,"text":"13-4","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":272,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":272,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":273,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":273,"text":"13-22. Just like engagement criteria, it is critical for the commander to clearly state when the subordinate","rect":[108.0,83.51434326171875,540.0112581329346,74.40616607666016]},{"page":273,"text":"elements must break contact with enemy forces to prevent becoming decisively engaged and more","rect":[108.0,94.97723388671875,540.0722322540283,85.86905670166016]},{"page":273,"text":"importantly retain the ability to secure the identified protected objective. During security operations these","rect":[108.0,106.500244140625,539.9983186798096,97.38204956054688]},{"page":273,"text":"criteria are often tied to planned transitions that are based on conditions for the security force to break contact","rect":[108.0,118.023193359375,539.9723277053834,108.9150161743164]},{"page":273,"text":"with the enemy or the anticipated duration of the security operation.","rect":[108.0,129.486083984375,379.9045362472534,120.3779067993164]},{"page":273,"text":"Security Force Size","rect":[90.0,154.10069274902345,180.38186418151856,144.29554748535157]},{"page":273,"text":"13-23. Main body commanders designate the size of the security force and its mission. This designation","rect":[108.0,171.654296875,539.9482326507568,162.54611206054688]},{"page":273,"text":"determines the limits of the security forces’ responsibilities. Table 13-1 shows typical sizes of security forces","rect":[107.99002075195313,183.1171875,540.0623919944763,174.00900268554688]},{"page":273,"text":"at various echelons in relation to their missions. The limited capabilities of most maneuver platoons prohibit","rect":[107.97998809814453,194.6201629638672,540.0083384475709,185.53201293945313]},{"page":273,"text":"them from having a mission separate from their parent company. Scout platoons are the exception to this","rect":[107.97998809814453,206.1632080078125,539.8768451194763,197.05502319335938]},{"page":273,"text":"rule.","rect":[107.97998809814453,215.6020050048828,126.0851240158081,208.51785278320313]},{"page":273,"text":"Table 13-1. Typical size of security forces for a given mission and echelon","rect":[139.052001953125,235.14105224609376,490.96932721328735,225.7523193359375]},{"page":273,"text":"LOCATION AND ORIENTATION OF THE SECURITY AREA","rect":[90.0,552.239990234375,361.204514503479,543.9359741210938]},{"page":273,"text":"13-24. Main body units determine the location, orientation, and depth of the security area where their","rect":[108.0,572.154296875,540.0753076133728,563.046142578125]},{"page":273,"text":"security forces operate. Units identify avenues of approach and NAIs. Depth in the security area provides the","rect":[108.0,583.6773071289063,540.0902376251221,574.5691528320313]},{"page":273,"text":"main body with time to react to approaching enemy. Occupying a deep security area allows the security force","rect":[108.0,595.1401977539063,540.0366487579346,586.0320434570313]},{"page":273,"text":"to destroy enemy reconnaissance assets without compromising critical observation posts or positions. It also","rect":[108.0,606.6632080078125,540.0293483734131,597.5550537109375]},{"page":273,"text":"prevents enemy forces from penetrating the security area and prevents gaps from occurring when observation","rect":[108.0,618.1861572265625,539.9693508148193,609.0780029296875]},{"page":273,"text":"posts or units displace or are lost. Security forces cover less depth in a wide area because they have fewer","rect":[108.0,629.6490478515625,539.9252221641541,620.5408935546875]},{"page":273,"text":"resources to position in depth. Very shallow security areas may require units to resource their security forces","rect":[108.0,641.1720581054688,540.0713031272888,632.0639038085938]},{"page":273,"text":"to perform guard operations to provide more reaction time.","rect":[108.0,652.695068359375,343.7846326828003,643.5869140625]},{"page":273,"text":"13-25. Security force units conduct a detailed analysis of the terrain in the security area. They establish the","rect":[108.0,670.159912109375,540.1305208282471,661.0517578125]},{"page":273,"text":"initial dispositions of their security forces (usually a screen line) as far forward as possible on terrain that","rect":[108.0,681.6829223632813,539.9622569046021,672.5747680664063]},{"page":273,"text":"provides good observation of avenues of approach. Next, they assign clear responsibility for identified","rect":[108.0,693.2059326171875,539.9568996429443,684.0977172851563]},{"page":273,"text":"avenues of approach and designated NAIs. When conducting screen or guard operations, their initial screen","rect":[108.0,704.6688232421875,540.0230007171631,695.5606689453125]},{"page":273,"text":"lines are within supporting range of their main bodies yet provide the desired amount of early warning.","rect":[108.0,716.1917724609375,519.8903150558472,707.0836181640625]},{"page":273,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":273,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":273,"text":"13-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":274,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":274,"text":"TIME THE SECURITY FORCE MUST BE ESTABLISHED","rect":[72.0,83.39997100830078,327.30537509918215,75.0959701538086]},{"page":274,"text":"13-26. Main body units determine when to establish their security forces. They base their decision on the","rect":[90.0,103.3143310546875,521.9660921173096,94.2061538696289]},{"page":274,"text":"actions of the main body and enemy forces. They allow enough time for their security force to move and","rect":[90.0,114.7772216796875,522.0582790374756,105.6690444946289]},{"page":274,"text":"occupy their security areas to prevent enemy forces from penetrating those security areas undetected. The","rect":[89.9899673461914,126.30023193359375,522.0017366485596,117.19205474853516]},{"page":274,"text":"mission variables influence how these security forces deploy and occupy their positions. Units position their","rect":[89.9899673461914,137.8232421875,522.0373437461853,128.71505737304688]},{"page":274,"text":"security forces so they can continue performing security tasks after completing their initial mission. This","rect":[90.00003814697266,149.28607177734376,521.9643695335388,140.17788696289063]},{"page":274,"text":"frequently occurs when a reconnaissance mission halts at a designated phase line.","rect":[90.00003814697266,160.80908203125,416.02080821990969,151.70089721679688]},{"page":274,"text":"CRITERIA FOR ENDING THE SECURITY MISSION","rect":[72.0,184.199951171875,306.9653787612915,175.89596557617188]},{"page":274,"text":"13-27. Security missions are usually time or event driven and determined by the security force’s higher","rect":[90.0,204.11431884765626,522.0143334922791,195.00613403320313]},{"page":274,"text":"headquarters. The commander gives the unit the necessary details through the commander’s security","rect":[89.98998260498047,215.57720947265626,521.9984035491943,206.46896362304688]},{"page":274,"text":"guidance. The criteria for ending a security mission can be an action by the main body (such as completing","rect":[89.98999786376953,227.1002197265625,521.9639797210693,217.99197387695313]},{"page":274,"text":"a specific mission), a fixed time (for example, not allowing an enemy force to penetrate a PL for two hours),","rect":[89.98998260498047,238.56304931640626,522.0458326339722,229.45486450195313]},{"page":274,"text":"or criteria based on the enemy force (such as its size). Security force units normally require the permission","rect":[89.98998260498047,250.0860595703125,521.9380397796631,240.97787475585938]},{"page":274,"text":"of their main body commanders to withdraw behind their rear boundaries to terminate their security missions.","rect":[89.98998260498047,261.60906982421877,521.9638624191284,252.50088500976563]},{"page":274,"text":"AUGMENTATION OF SECURITY FORCES","rect":[72.0,285.0,265.3016414642334,276.6960144042969]},{"page":274,"text":"13-28. The assignment of security areas larger than the areas of influence of these security forces’ organic","rect":[90.0,304.85430908203127,522.0013094024658,295.7461242675781]},{"page":274,"text":"weapons requires the augmentation of those forces’ organic combat power. Main body units are responsible","rect":[89.98998260498047,316.3773193359375,521.9631624298096,307.2691345214844]},{"page":274,"text":"for reinforcing their security forces in this case. They place additional maneuver and functional and","rect":[89.97998809814453,327.9002990722656,522.0123195648193,318.7921142578125]},{"page":274,"text":"multifunctional support assets under the operational control or in support of their security force. Units","rect":[89.9800033569336,339.3631896972656,521.9582660179138,330.2550048828125]},{"page":274,"text":"commonly attach engineers, chemical, civil affairs, or EMS reconnaissance elements to their security forces","rect":[89.9799575805664,350.8861999511719,522.0974261741638,341.77801513671877]},{"page":274,"text":"at the company or troop level. Additionally, any unique security mission requirements may require assets not","rect":[89.98998260498047,362.4091796875,522.0932993850709,353.3009948730469]},{"page":274,"text":"organic to these security forces.","rect":[89.98998260498047,373.8720703125,216.86919689178468,364.7638854980469]},{"page":274,"text":"13-29. Information collection assets greatly enhance the performance of security tasks. These assets","rect":[89.98998260498047,391.38702392578127,522.0937030296326,382.2788391113281]},{"page":274,"text":"conduct rapid surveillance of large areas to detect enemy presence. Data from remote sensors, UAS sensors,","rect":[89.98998260498047,402.9100341796875,522.0283765792847,393.8018493652344]},{"page":274,"text":"unattended ground sensors, signals intelligence systems, and downlinks from national assets can expand the","rect":[89.98998260498047,414.3729248046875,522.0561189727783,405.2647399902344]},{"page":274,"text":"areas under surveillance and cue security forces. Rotary-wing aircraft detect and report enemy forces at","rect":[89.98998260498047,425.8959045410156,522.0133433303834,416.7877197265625]},{"page":274,"text":"extended ranges with thermal imaging and other advanced detection equipment. This permits security force","rect":[89.98998260498047,437.41888427734377,522.0009431915283,428.3106994628906]},{"page":274,"text":"units to concentrate their forces on likely enemy avenues of approach, NAIs, targeted areas of interest, and","rect":[89.98998260498047,448.88177490234377,521.8975124359131,439.7735900878906]},{"page":274,"text":"restrictive terrain that degrades sensor performance. They employ their information collection assets to detect","rect":[89.98999786376953,460.40478515625,521.9910044631959,451.2966003417969]},{"page":274,"text":"enemy force movements. This gains time to reposition their security forces and mass other assets to counter","rect":[89.98999786376953,471.92779541015627,521.9608666954041,462.8196105957031]},{"page":274,"text":"enemy actions. Main body units request higher echelon support if their security force intelligence assets","rect":[89.98998260498047,483.39068603515627,522.0444476585388,474.2825012207031]},{"page":274,"text":"cannot provide sufficient advance warning.","rect":[89.98998260498047,494.9136657714844,263.01748180389407,485.80548095703127]},{"page":274,"text":"SPECIAL REQUIREMENTS OR CONSTRAINTS","rect":[72.0,519.806396484375,286.1769771575928,509.9759826660156]},{"page":274,"text":"13-30. Main body commanders may impose special requirements or constraints, including engagement,","rect":[90.0,538.13427734375,522.0111646652222,529.026123046875]},{"page":274,"text":"disengagement, and bypass criteria (located in the commander’s security guidance). They may order their","rect":[90.0,549.6572875976563,522.0223901329041,540.5491333007813]},{"page":274,"text":"security forces to avoid decisive engagements or avoid falling below a certain combat strength. Units may","rect":[90.0,561.1802978515625,522.0123195648193,552.0721435546875]},{"page":274,"text":"be willing to accept a lesser degree of security, which results from either the loss of more terrain or reduced","rect":[90.0,572.6431884765625,522.0718898773193,563.5350341796875]},{"page":274,"text":"preparation time by the main body, to preserve their security forces for later use. The opposite is also true,","rect":[90.0,584.1661987304688,521.9792432785034,575.0580444335938]},{"page":274,"text":"main body commanders may be willing to risk their security force becoming decisively engaged to create","rect":[90.0,595.689208984375,521.9629182891846,586.5810546875]},{"page":274,"text":"time for the main body.","rect":[90.0,607.152099609375,184.16796398162843,598.0439453125]},{"page":274,"text":"FIRES PLANNING","rect":[72.0,630.502197265625,156.0460023880005,622.4159545898438]},{"page":274,"text":"13-31. Main body unitsrequest nonlethal effects andpositionfire supportassets to support screen and guard","rect":[90.0,650.4542846679688,522.0353908538818,641.3461303710938]},{"page":274,"text":"forces. They allocate additional artillery to support covering forces. If they assign their security forces wide","rect":[89.9899673461914,661.977294921875,522.0564851837158,652.869140625]},{"page":274,"text":"assigned areas, units may have to position fire support assts and other nonlethal capabilities to provide","rect":[89.9899673461914,673.440185546875,522.0302400665283,664.33203125]},{"page":274,"text":"effective coverage of only the most likely enemy avenues of approach. This is particularly important for a","rect":[89.9899673461914,684.9631958007813,521.8959016876221,675.8550415039063]},{"page":274,"text":"screen because often the screening force relies on indirect fire to delay or disrupt enemy forces. Providing","rect":[89.9899673461914,696.4862060546875,521.9024562835693,687.3780517578125]},{"page":274,"text":"adequate indirect fire support to their security forces may require main body units to position their artillery","rect":[89.9899673461914,707.9490966796875,521.9983425140381,698.8409423828125]},{"page":274,"text":"systems well forward in the main body formation.","rect":[89.9899673461914,719.4720458984375,290.02224254608157,710.3638916015625]},{"page":274,"text":"13-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":274,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":274,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":275,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":275,"text":"INTEGRATION OF GROUND AND ARMY AVIATION OPERATIONS","rect":[90.0,83.39997100830078,398.2669734954834,75.08396911621094]},{"page":275,"text":"13-32. Integrating ground and Army aviation operations is critical to the successful performance of security","rect":[108.0,103.3143310546875,540.1164455413818,94.2061538696289]},{"page":275,"text":"tasks. Aviation units and systems, including rotary-, fixed-wing, and UAS can conduct reconnaissance of the","rect":[108.0,114.7772216796875,539.9682283477783,105.6690444946289]},{"page":275,"text":"security area while the ground element of the security force moves forward. They can perform these tasks:","rect":[108.01001739501953,126.30023193359375,533.7199473342896,117.19205474853516]},{"page":275,"text":" Screen beyond the location of the security force (front, flank, or rear).","rect":[133.1999969482422,139.7943115234375,430.52566051483157,130.68612670898438]},{"page":275,"text":" Conduct reconnaissance of areas between ground maneuver units.","rect":[133.1999969482422,153.2943115234375,415.0648145675659,144.18612670898438]},{"page":275,"text":" Assist in maintaining contact between the security force and the main body.","rect":[133.1999969482422,166.7943115234375,454.48406505584719,157.68612670898438]},{"page":275,"text":" Assist in clearing areas between flank security elements and their main body during the","rect":[133.1999969482422,180.2943115234375,539.9991731719971,171.18612670898438]},{"page":275,"text":"performance of moving flank security tasks.","rect":[151.1999969482422,191.81732177734376,327.8816785812378,182.70913696289063]},{"page":275,"text":" Assist in disengaging security forces, especially when conducting battle handover and passage of","rect":[133.1999969482422,205.3143310546875,539.9729516563416,196.20614624023438]},{"page":275,"text":"lines with their main bodies.","rect":[151.1999969482422,214.75318908691407,264.8248243331909,207.66903686523438]},{"page":275,"text":" Surveilling terrain that is hard to reach or would require too much time to cover with ground","rect":[133.1999969482422,230.2742919921875,539.9428615570068,221.16610717773438]},{"page":275,"text":"reconnaissance assets.","rect":[151.1999969482422,239.7732696533203,240.10447216033936,232.68911743164063]},{"page":275,"text":"ENGINEER PLANNING","rect":[90.0,265.16217041015627,196.84626483917237,257.0759582519531]},{"page":275,"text":"13-33. Countermobility plays a critical role in providing security. Security forces can maintain a mobility","rect":[108.0,285.0542907714844,539.9812526702881,275.94610595703127]},{"page":275,"text":"advantage over enemy forces by employing properly integrated obstacles. In the defense, units may initially","rect":[108.0,296.5773010253906,540.0320949554443,287.4691162109375]},{"page":275,"text":"mass engineer support in their security area and then shift support to their MBAs once their MBA units are","rect":[108.0,308.10028076171877,539.9568147735596,298.9920959472656]},{"page":275,"text":"prepared to begin developing engagement areas. They also enhance security force mobility by identifying","rect":[108.0,319.5632019042969,539.9452419281006,310.4549865722656]},{"page":275,"text":"alternate routes that allow them to reposition and task-organize engineers to provide breaching capabilities.","rect":[108.0,331.086181640625,539.8920850753784,321.9779968261719]},{"page":275,"text":"Main body units determine the risk of prioritizing their countermobility efforts in their security areas rather","rect":[108.0000228881836,342.60919189453127,539.9181420860291,333.5010070800781]},{"page":275,"text":"than in their MBAs. In the offense, units can employ situational obstacles (covered by fire) on the flanks of","rect":[108.0000228881836,354.0720520019531,539.9742333946228,344.9638671875]},{"page":275,"text":"an advancing force to provide additional security.","rect":[108.0,365.5950622558594,306.5834608078003,356.48687744140627]},{"page":275,"text":"SUSTAINMENT","rect":[90.0,388.97998046875,161.04435110092164,380.6759948730469]},{"page":275,"text":"13-34. Main body staffs embed their security force sustainment requirements in the operation order and","rect":[108.0,408.894287109375,539.9962062835693,399.7861022949219]},{"page":275,"text":"annexes. A key component in security force sustainment is developing, maintaining, and using SOPs.","rect":[108.0,420.357177734375,540.0274000167847,411.2489929199219]},{"page":275,"text":"Sustainment requirements ensure that staffs include their security force requirements in their sustainment","rect":[108.0,431.8801574707031,539.9397349319459,422.77197265625]},{"page":275,"text":"rehearsals.","rect":[108.0,441.3791198730469,150.5198621749878,434.29498291015627]},{"page":275,"text":"13-35. Security force units designate an individual or element in their security force who is responsible for","rect":[108.0,460.8680419921875,540.0391748008728,451.7598571777344]},{"page":275,"text":"sustaining their force. They also designate individuals and elements who coordinate for sustainment support.","rect":[108.0,472.3910217285156,540.0512647628784,463.2828369140625]},{"page":275,"text":"This is normally a senior noncommissioned officer in platoons and companies (or troops) assigned to perform","rect":[107.99999237060547,483.9140319824219,540.0179114303589,474.80584716796877]},{"page":275,"text":"security tasks. For example, the platoon sergeant of a scout platoon establishing a flank screen for a battalion","rect":[107.99999237060547,495.3769226074219,540.0442409515381,486.26873779296877]},{"page":275,"text":"task force may have to coordinate with the first sergeant of the adjacent company team to ensure sustainment","rect":[108.0,506.89990234375,540.0894541702271,497.7817077636719]},{"page":275,"text":"of the scout platoon. Likewise, the first sergeant or executive officer of a cavalry troop accomplishing a","rect":[108.0,518.36279296875,540.0583772735596,509.2546081542969]},{"page":275,"text":"screening mission away from the rest of the cavalry squadron may coordinate directly with the BCT logistics","rect":[108.0,529.8858032226563,540.0032489280701,520.7776489257813]},{"page":275,"text":"staff officer or the forward support company of the maneuver battalion closest to the troop’s assigned area","rect":[108.00997924804688,541.4088134765625,539.9081697540283,532.3006591796875]},{"page":275,"text":"and the brigade support battalion staff for resupply and medical treatment. This individual requires access to","rect":[107.99995422363281,552.8717041015625,540.0240383148193,543.7635498046875]},{"page":275,"text":"the appropriate communications networks to coordinate logistics support and medical evacuation.","rect":[107.99995422363281,564.3946533203125,498.76092052459719,555.2864990234375]},{"page":275,"text":"13-36. The individual responsible for sustaining the security force coordinates with the appropriate","rect":[107.99995422363281,581.9096069335938,539.9522981719971,572.8014526367188]},{"page":275,"text":"supporting sustainment points of contact as soon as possible after receiving the mission warning order. The","rect":[107.99995422363281,593.3724975585938,540.0703401641846,584.2643432617188]},{"page":275,"text":"security force commander gives the exact sustainment requirements for the security force—including any","rect":[108.0,604.8955078125,540.0376491546631,595.787353515625]},{"page":275,"text":"specialized items of supply required by the mission, such as cratering charges—to the supporting sustainment","rect":[108.0,616.4185180664063,540.0754160842896,607.3103637695313]},{"page":275,"text":"organization. Security force units ensure that the supporting sustainment organization establishes","rect":[108.0000228881836,627.88134765625,540.0842425804138,618.773193359375]},{"page":275,"text":"communication links with the security force and receives a copy of the supported security force’s sustainment","rect":[108.0000228881836,639.4043579101563,540.0904917678834,630.2962036132813]},{"page":275,"text":"overlay or concept of sustainment.","rect":[108.0000228881836,650.9273681640625,246.1037244796753,641.8192138671875]},{"page":275,"text":"13-37. Units place special attention on treating and evacuating casualties for security forces operating away","rect":[108.0000228881836,668.3922119140625,539.9775295257568,659.2840576171875]},{"page":275,"text":"from normal medical support because of time, terrain, or distance factors, or a need for the security force to","rect":[107.98999786376953,679.9152221679688,539.9543361663818,670.8070678710938]},{"page":275,"text":"remain undetected by enemy forces. For this reason, the security force should include as many Soldiers","rect":[107.9800033569336,691.438232421875,539.9284808616638,682.330078125]},{"page":275,"text":"trained as combat lifesavers as possible. The more combat lifesavers in the security force, the more prepared","rect":[107.9799575805664,702.901123046875,540.0116481781006,693.79296875]},{"page":275,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":275,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":275,"text":"13-7","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":276,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":276,"text":"it is for casualties. Rehearsals at all levels within the security force are also paramount to prepare for potential","rect":[90.0,83.51434326171875,522.0714487991334,74.40616607666016]},{"page":276,"text":"casualties.","rect":[90.0,92.95319366455078,131.38160228729249,85.86905670166016]},{"page":276,"text":"POSITIONING OF SECURITY FORCE COMMAND POST AND COMBAT TRAINS","rect":[72.0,118.38001251220703,439.01349449157717,110.07601165771485]},{"page":276,"text":"13-38. Security force commanders move to where they can best control the operation. This is often where","rect":[90.0,138.2943115234375,522.0714387969971,129.18612670898438]},{"page":276,"text":"they can observe the most dangerous enemy avenue of approach. Security force units position their command","rect":[90.0,149.81732177734376,522.0370998382568,140.70913696289063]},{"page":276,"text":"post to provide continuous control and reporting during initial movements. They position the security force’s","rect":[90.0,161.28021240234376,522.0078875999451,152.17202758789063]},{"page":276,"text":"combat trains behind masking terrain, but the combat trains remain close enough to the combat elements of","rect":[90.0,172.80322265625,521.9684960899353,163.69503784179688]},{"page":276,"text":"the security force to provide rapid response. Units position the combat trains along routes that provide good","rect":[90.0,184.326171875,521.9725246429443,175.21798706054688]},{"page":276,"text":"mobility laterally and in depth.","rect":[90.0,195.7890625,213.58068370819093,186.68087768554688]},{"page":276,"text":"REPORTING","rect":[72.0,219.14219665527345,131.28310108184815,211.05599975585938]},{"page":276,"text":"13-39. Security forces report enemy force activities to their main bodies. The main body headquarters is","rect":[90.0,239.09429931640626,522.0055682640076,229.98611450195313]},{"page":276,"text":"responsible for disseminating that information to other affected friendly forces. Main body units ensure their","rect":[90.0,250.55718994140626,521.9749658164978,241.44900512695313]},{"page":276,"text":"security forces are provided the current intelligence assessment and combat information obtained by their","rect":[90.0,262.0802001953125,521.9672753868103,252.97201538085938]},{"page":276,"text":"main bodies. This supplements their security forces’ information collection capabilities. By continuously","rect":[89.9999771118164,273.6031494140625,522.0063381195068,264.4949645996094]},{"page":276,"text":"exchanging information, security force units and main body units have time to choose suitable COAs. Digital","rect":[89.9999771118164,285.0660705566406,521.9621958694459,275.9578857421875]},{"page":276,"text":"systems greatly assist units in maintaining situational understanding to create a common operational picture.","rect":[90.0,296.58905029296877,521.9822950363159,287.4808654785156]},{"page":276,"text":"MOVEMENT CONSIDERATIONS FOR SECURITY MISSIONS","rect":[72.0,319.97998046875,349.6114864349365,311.6759948730469]},{"page":276,"text":"13-40. Security forces use different movement techniques between stationary and moving security missions","rect":[90.0,339.894287109375,522.0584247093201,330.7861022949219]},{"page":276,"text":"based on the operational and mission variables and the commander’s security guidance. These techniques are","rect":[90.0,351.357177734375,522.0902986602783,342.2489929199219]},{"page":276,"text":"divided into those used during stationary missions and those used during moving missions.","rect":[90.0,362.8801574707031,453.6447401046753,353.77197265625]},{"page":276,"text":"Movement into Security Areas for Stationary Security Missions","rect":[72.0,387.5007019042969,369.8390603981018,377.6955871582031]},{"page":276,"text":"13-41. When deploying into the security area, the security force addresses two competing requirements: to","rect":[90.0,404.9942932128906,522.0331935882568,395.8861083984375]},{"page":276,"text":"establish the security area quickly to meet mission requirements and to provide the necessary level of security","rect":[90.0,416.5173034667969,521.9459743499756,407.40911865234377]},{"page":276,"text":"for itself. The security force moves into the security area using one of three methods: tactical movement,","rect":[90.0,428.040283203125,522.0055494308472,418.9320983886719]},{"page":276,"text":"movement to contact, or zone reconnaissance.","rect":[90.0,438.0,274.0624952316284,430.3949890136719]},{"page":276,"text":"13-42. The first technique of deploying is a tactical movement from the rear boundary of the security area","rect":[90.0,457.02813720703127,522.0024690704346,447.9199523925781]},{"page":276,"text":"to the initial positions. This method is the fastest but least secure. The security force moves to a release point","rect":[90.0,468.5511474609375,522.0353159866334,459.4429626464844]},{"page":276,"text":"on the rear boundary. From the release point, subordinate elements deploy to occupy initial positions, moving","rect":[90.0,480.0140380859375,522.0650539398193,470.9058532714844]},{"page":276,"text":"by the quickest means possible. This method is appropriate when the security force unit does not expect","rect":[90.0,491.53704833984377,521.9721445999146,482.4288635253906]},{"page":276,"text":"enemy contact, time is critical, or previous zone reconnaissance of the security area conducted by aviation","rect":[90.0,503.0600280761719,521.9586696624756,493.95184326171877]},{"page":276,"text":"units or aerial assets found no enemy in the security area.","rect":[90.0,514.52294921875,319.11541271209719,505.4147644042969]},{"page":276,"text":"13-43. In the second technique, the security force conducts a movement to contact from a LD (usually the","rect":[90.0,532.0478515625,521.9972810821533,522.939697265625]},{"page":276,"text":"rear boundary of the security area) to the initial positions. This method is slower than a tactical road march","rect":[89.98998260498047,543.5709228515625,521.9000148773193,534.4627685546875]},{"page":276,"text":"but more secure. It is appropriate when enemy contact is likely, time is limited, the situation does not require","rect":[89.98998260498047,555.0337524414063,522.0655183868408,545.9255981445313]},{"page":276,"text":"detailed reconnaissance of the terrain, or aviation elements or other assets conducting zone reconnaissance","rect":[89.98998260498047,566.5567626953125,521.9351472930908,557.4486083984375]},{"page":276,"text":"forward of the ground element detect enemy forces in the security area.","rect":[89.98999786376953,578.0797729492188,375.3827772140503,568.9716186523438]},{"page":276,"text":"13-44. The third technique for moving to the initial position is for the security force to conduct a zone","rect":[89.98998260498047,595.544677734375,522.0284700469971,586.4365234375]},{"page":276,"text":"reconnaissance from the security area’s rear boundary to its initial security line positions or the forward limit","rect":[89.97994995117188,607.067626953125,522.0120005569459,597.95947265625]},{"page":276,"text":"of the security area. This is the most secure method. Given adequate time, this method is preferred because","rect":[89.97994995117188,618.5906372070313,522.0363435821533,609.4824829101563]},{"page":276,"text":"it allows the security force to clear the security area and become familiar with the terrain that it may have to","rect":[89.97993469238281,630.0535278320313,521.8644924163818,620.9453735351563]},{"page":276,"text":"defend. The security force reconnoiters potential subsequent positions and fire support system firing positions","rect":[89.97993469238281,641.5765380859375,522.1240375022888,632.4683837890625]},{"page":276,"text":"as it moves to its initial positions. A zone reconnaissance is appropriate when time is available and","rect":[89.97993469238281,653.0193481445313,522.0060939788818,643.9312133789063]},{"page":276,"text":"information about enemy forces or terrain is unknown. While this technique provides information of tactical","rect":[89.97993469238281,664.5623779296875,522.0124278030396,655.4542236328125]},{"page":276,"text":"value on the enemy forces and terrain in the area, it also consumes time. Using aerial reconnaissance forward","rect":[89.97993469238281,676.0853271484375,522.0112819671631,666.9771728515625]},{"page":276,"text":"of the ground units increases the speed and security of the movement.","rect":[89.97993469238281,687.5482177734375,368.7835645675659,678.4400634765625]},{"page":276,"text":"13-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":276,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":276,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":277,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":277,"text":"Movement During Moving Flank Security Missions","rect":[90.0,84.62071228027344,330.98899325942997,74.81556701660156]},{"page":277,"text":"13-45. There are three techniques of occupying and moving in a flank security area for moving security","rect":[108.0,102.11431884765625,539.9692287445068,93.00614166259766]},{"page":277,"text":"missions. These techniques are based on how the security force crosses the LD:","rect":[108.0,113.6373291015625,426.02478742218019,104.5291519165039]},{"page":277,"text":" Separately from the main body and deploys to perform the mission.","rect":[133.1999969482422,127.13427734375,421.4265089035034,118.0261001586914]},{"page":277,"text":" Separately from main body, lead elements conduct a movement to contact.","rect":[133.1999969482422,140.63427734375,449.92425060272219,131.52609252929688]},{"page":277,"text":" With the main body and conducts a zone reconnaissance out to the limit of the security area.","rect":[133.1999969482422,154.13427734375,520.2404737472534,145.02609252929688]},{"page":277,"text":"13-46. Commanders should not require the security force to make its own penetration when it faces prepared","rect":[107.9937515258789,171.65924072265626,540.0569362640381,162.55105590820313]},{"page":277,"text":"enemy defenses. This may prevent or significantly delay the security force from assuming its duties. They","rect":[107.9937515258789,183.12213134765626,540.0034694671631,174.01394653320313]},{"page":277,"text":"often combine the three techniques described in paragraphs 13-47 through 13-49.","rect":[107.98370361328125,194.6451416015625,433.22295665740969,185.53695678710938]},{"page":277,"text":"Separately from the Main Body and Deploys to Perform the Mission","rect":[89.98782348632813,218.16204833984376,370.5959310455322,209.22421264648438]},{"page":277,"text":"13-47. In the first technique, the security force crosses the LD separately from the main body and deploys","rect":[107.98373413085938,235.626953125,540.0260150413513,226.51876831054688]},{"page":277,"text":"to execute the mission. The security force then conducts a tactical movement parallel to the main body and","rect":[107.97371673583985,247.14990234375,539.9236354827881,238.04171752929688]},{"page":277,"text":"drops off observation posts or occupies BPs along the flank of the main body. This technique keeps the two","rect":[107.97370147705078,258.67291259765627,540.0522365570068,249.56472778320313]},{"page":277,"text":"forces from interfering with each other during deployment. When another force penetrates the line of contact","rect":[107.96370697021485,270.13580322265627,539.9338755569459,261.0276184082031]},{"page":277,"text":"and the main body is not in contact with the enemy force and moves quickly, it is appropriate that the LD is","rect":[107.96370697021485,281.6588134765625,540.0090472679138,272.5506286621094]},{"page":277,"text":"uncontested, and outputs from the IPB process indicate unlikely enemy contact. It is the fastest but least","rect":[107.95365905761719,293.18182373046877,539.9689707717896,284.0736389160156]},{"page":277,"text":"secure technique. Figure 13-1 depicts this technique.","rect":[107.9536361694336,304.64471435546877,318.4758253097534,295.5365295410156]},{"page":277,"text":"Figure 13-1. Example of the security force crossing LD separately to deploy and establish a","rect":[98.17411041259766,626.9680786132813,531.6604146881103,617.579345703125]},{"page":277,"text":"flank screen","rect":[285.728515625,636.5071411132813,344.1771824378967,629.1023559570313]},{"page":277,"text":"Separately from the Main Body and Lead Elements Conduct a Movement to Contact","rect":[89.94774627685547,667.9498901367188,437.20191144561769,659.0120239257813]},{"page":277,"text":"13-48. Figure 13-2 on page 13-10 illustrates a second technique. The security force crosses the LD","rect":[107.9637451171875,685.46484375,539.9841961898803,676.356689453125]},{"page":277,"text":"separately from the main body, and its lead elements conduct a movement to contact. Follow-on elements","rect":[107.96376037597656,696.927734375,539.9530169944763,687.819580078125]},{"page":277,"text":"occupy positions as they reach them. This technique is appropriate when the main body is moving slower","rect":[107.9637451171875,708.4507446289063,539.8804833946228,699.3425903320313]},{"page":277,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":277,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":277,"text":"13-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":278,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":278,"text":"than in the first method, the LD is uncontested, and the IPB process estimates possible enemy contact. It is","rect":[90.0,83.51434326171875,521.9177997093201,74.40616607666016]},{"page":278,"text":"slower than the previous technique but provides better security.","rect":[90.0,94.97723388671875,343.48809337615969,85.86905670166016]},{"page":278,"text":"Figure 13-2. Example of the security force crossing separately and the lead element","rect":[98.51700592041016,416.278564453125,495.37712646102906,406.88983154296877]},{"page":278,"text":"conducting a movement to contact","rect":[214.1778564453125,427.80157470703127,379.77641845321656,418.5330810546875]},{"page":278,"text":"With the Main Body and Conducts a Zone Reconnaissance out to the Limit of the Security Area","rect":[71.9739990234375,457.3204650878906,466.40331077575686,448.38262939453127]},{"page":278,"text":"13-49. Finally, in the third technique, the security force crosses the LD with the main body and conducts a","rect":[89.98994445800781,474.78533935546877,521.9931306915283,465.6771545410156]},{"page":278,"text":"zone reconnaissance out to the far limit of the security area. This technique is appropriate when the LD is","rect":[89.98994445800781,486.308349609375,521.9840838890076,477.2001647949219]},{"page":278,"text":"also the line of contact, the main body makes its own penetration of the enemy defenses along the line of","rect":[89.98994445800781,497.83135986328127,521.9117944297791,488.7231750488281]},{"page":278,"text":"contact, the main body is moving slowly, and leaders do not clearly understand the enemy situation. The","rect":[89.98994445800781,509.29425048828127,521.9991731719971,500.1860656738281]},{"page":278,"text":"security force may follow the lead element of the main body through the gap and deploy when the situation","rect":[89.98992919921875,520.8172607421875,522.0230617523193,511.7090759277344]},{"page":278,"text":"permits. This technique provides increased security for both the security force and the main body; it is also","rect":[89.98992919921875,532.2801513671875,521.9491481781006,523.1719970703125]},{"page":278,"text":"the most time consuming. Figure 13-3 depicts this third technique.","rect":[89.97993469238281,543.80322265625,355.81960582733157,534.695068359375]},{"page":278,"text":"13-10","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":278,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":278,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":279,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":279,"text":"Figure 13-3. Example of the security force crossing with the main body and conducting a zone","rect":[91.31999969482422,394.3141784667969,538.6649312896728,384.9254455566406]},{"page":279,"text":"reconnaissance","rect":[277.18096923828127,403.8532409667969,352.8369893951416,396.5686950683594]},{"page":279,"text":"TYPES OF SECURITY OPERATIONS","rect":[90.0,437.0696716308594,329.97228160095218,427.3955383300781]},{"page":279,"text":"13-50. Commanders assign security missions based on the degree of security desired and the amount of","rect":[108.0,457.3742980957031,539.9714257774353,448.26611328125]},{"page":279,"text":"combat power required. The four types of security operations and their associated methods and formations","rect":[108.0,468.8973083496094,540.0612323265076,459.78912353515627]},{"page":279,"text":"are—","rect":[108.0,478.396240234375,130.25842666625977,473.6467590332031]},{"page":279,"text":" Screen.","rect":[133.1999969482422,491.9002685546875,180.94236278533936,484.9764404296875]},{"page":279,"text":" Stationary.","rect":[151.1999969482422,507.95428466796877,212.86516857147218,498.8460998535156]},{"page":279,"text":" Moving (flank and rear).","rect":[151.1999969482422,521.9942626953125,268.06435680389407,512.8861083984375]},{"page":279,"text":" Guard.","rect":[133.1999969482422,533.480224609375,178.7249402999878,526.3861083984375]},{"page":279,"text":" Advance guard (stationary and moving).","rect":[151.1999969482422,549.5343017578125,331.0620985031128,540.4261474609375]},{"page":279,"text":" Flank guard (stationary and moving).","rect":[151.1999969482422,563.5742797851563,318.40285778045657,554.4661254882813]},{"page":279,"text":" Rear guard.","rect":[151.1999969482422,577.6143188476563,215.86414623260499,568.5061645507813]},{"page":279,"text":" Cover.","rect":[133.1999969482422,589.1002807617188,178.18586254119874,582.1764526367188]},{"page":279,"text":" Offensive cover (advance and flank).","rect":[151.1999969482422,605.13427734375,317.8056592941284,596.046142578125]},{"page":279,"text":" Defensive cover (front, flank, and rear).","rect":[151.1999969482422,619.2342529296875,328.59014415740969,610.1461181640625]},{"page":279,"text":" Area security.","rect":[133.1999969482422,632.7542724609375,207.34307384490968,623.6461181640625]},{"page":279,"text":" Site security.","rect":[151.1999969482422,646.7943115234375,221.4452772140503,637.6861572265625]},{"page":279,"text":" Line of communication and route security.","rect":[151.1999969482422,660.8342895507813,339.76348400115969,651.7261352539063]},{"page":279,"text":" Convoy security.","rect":[151.1999969482422,674.874267578125,237.5765027999878,665.76611328125]},{"page":279,"text":" Response force operations.","rect":[151.1999969482422,688.894287109375,277.29375743865969,679.80615234375]},{"page":279,"text":" Area damage control.","rect":[151.1999969482422,703.0142822265625,255.58941173553468,693.9061279296875]},{"page":279,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":279,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":279,"text":"13-11","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":280,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.46430426025391,37.90802001953125]},{"page":280,"text":"13-51. The four types of security operations provide increasing levels of security for the main body.","rect":[90.0,83.51434326171875,521.9803419113159,74.40616607666016]},{"page":280,"text":"However, more combat power in the security force means less for the main body. Screen operations provide","rect":[90.0,94.97723388671875,522.0603914337158,85.86905670166016]},{"page":280,"text":"early warning to the main body. Guard operations prevent enemy observation and direct fire on the main","rect":[90.0,106.500244140625,521.8822536468506,97.3920669555664]},{"page":280,"text":"body. Cover operations protect the main body from enemy observation and effective direct fire. Area security","rect":[90.0,118.023193359375,521.9988307952881,108.9150161743164]},{"page":280,"text":"protects friendly installations, routes, units, and facilities within a prescribed area. All types of security","rect":[90.0,129.48614501953126,521.9699001312256,120.3779067993164]},{"page":280,"text":"operations provide protection and early warning to the protected forces, which provides reaction time and","rect":[90.0,141.00909423828126,522.0471096038818,131.90090942382813]},{"page":280,"text":"maneuver space to the commander preserving freedom of action.","rect":[90.0,152.5321044921875,349.6643934249878,143.42391967773438]},{"page":280,"text":"13-52. The screen, guard, and cover operations share many common control measures, starting with","rect":[90.0,169.9969482421875,522.0193996429443,160.88876342773438]},{"page":280,"text":"boundaries defining the security area. The force’s main body establishes the security area. For a security","rect":[90.0,181.51995849609376,521.9923000335693,172.41177368164063]},{"page":280,"text":"force operating to the front of the main body, the lateral boundaries of the security area are normally an","rect":[90.0,193.04296875,521.9675197601318,183.93478393554688]},{"page":280,"text":"extension of the lateral boundaries of the main body. The security force’s rear boundary is normally the battle","rect":[90.0,204.505859375,521.9867220001221,195.39767456054688]},{"page":280,"text":"handover line.","rect":[90.0,214.00477600097657,147.2242078781128,206.92062377929688]},{"page":280,"text":"13-53. Commanders depict the performance of security operations on overlays using a lightning bolt on","rect":[90.0,233.49371337890626,522.0173244476318,224.38552856445313]},{"page":280,"text":"either side of the symbol representing the unit performing the security operations. They are labeled with the","rect":[90.0,245.0167236328125,522.0574007110596,235.90853881835938]},{"page":280,"text":"letter S, G, or C to denote screen, guard, or cover. The end of the lightning bolt has arrowheads that touch","rect":[89.98994445800781,256.5396728515625,521.9578762054443,247.43148803710938]},{"page":280,"text":"the designated control measures, which define the left and right limits of the security operation. Figure 13-4","rect":[89.98994445800781,268.0025634765625,522.0123195648193,258.8943786621094]},{"page":280,"text":"depicts guard and screen control measures for the security forces performing those operations.","rect":[89.9800033569336,279.52557373046877,466.7609815597534,270.4173278808594]},{"page":280,"text":"Figure 13-4. Example security operations control measures","rect":[156.34242248535157,641.20751953125,437.62187098693848,631.908935546875]},{"page":280,"text":"13-54. The main body or the security force may designate additional PLs to control the operation. These","rect":[89.96995544433594,664.664306640625,522.0183382110596,655.55615234375]},{"page":280,"text":"PLs may serve as subsequent screen or delay lines. Each security force element reports to the commander","rect":[89.96994018554688,676.1873168945313,521.9549462852478,667.0791625976563]},{"page":280,"text":"when crossing PLs or occupying screen or delay lines. Displacement to these subsequent PLs is event driven","rect":[89.96994018554688,687.6502075195313,521.9559230804443,678.5420532226563]},{"page":280,"text":"(enemy or friendly) or time driven. The approach of an enemy force, relief of a friendly unit, or movement","rect":[89.96990203857422,699.1732177734375,522.0083384475709,690.0650634765625]},{"page":280,"text":"13-12","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":280,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":280,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":281,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":281,"text":"of the protected force dictates the movement of security forces. Security force commanders normally assign","rect":[108.0,83.51434326171875,540.0148220062256,74.40616607666016]},{"page":281,"text":"additional lateral boundaries in their security areas to delineate assigned areas for subordinate units.","rect":[108.0,94.97723388671875,506.7409620285034,85.86905670166016]},{"page":281,"text":"13-55. Units use checkpoints and NAIs to coordinate and synchronize movement and collection. They use","rect":[108.01001739501953,112.4921875,540.0752840118408,103.3840103149414]},{"page":281,"text":"contact points to facilitate coordination with flank units during front and rear security missions or between","rect":[108.010009765625,124.01519775390625,540.0333156585693,114.90702056884766]},{"page":281,"text":"elements of a security force in the security area. Units conducting flank security for a moving force physically","rect":[108.00997924804688,135.47808837890626,539.9722805023193,126.36991119384766]},{"page":281,"text":"contact their main bodies at contact points. Security force units establish observation posts or coordinate for","rect":[108.00997924804688,147.00103759765626,540.0440576133728,137.89285278320313]},{"page":281,"text":"aerial assets to ensure coverage of specific NAIs or avenues of approach as necessary.","rect":[108.00997924804688,158.5240478515625,452.27239513397219,149.41586303710938]},{"page":281,"text":"Note. For the descriptions below, the security force’s security objective is their higher","rect":[133.20025634765626,181.7342529296875,522.0499169883728,172.61605834960938]},{"page":281,"text":"headquarters’ main body.","rect":[133.1999969482422,193.2542724609375,235.18557262420655,184.14608764648438]},{"page":281,"text":"SCREEN","rect":[90.0,231.41998291015626,129.84852695465089,223.11599731445313]},{"page":281,"text":"13-56. Screen is a type of security operation that primarily provides early warning to the protected force","rect":[108.0,251.2742919921875,539.9911165313721,242.16610717773438]},{"page":281,"text":"(ADP 3-90). Screens provide less protection than guards or covers. Screen missions are defensive in nature","rect":[108.0,262.79730224609377,540.0722322540283,253.68911743164063]},{"page":281,"text":"and accomplished by establishing a series of observation posts and patrols to ensure observation of the","rect":[108.0,274.26019287109377,539.9392366485596,265.1520080566406]},{"page":281,"text":"assigned sector. The screen force gains and maintains enemy contact consistent with the fundamentals and","rect":[108.0,285.7831726074219,539.9291896820068,276.67498779296877]},{"page":281,"text":"destroys or repels enemy reconnaissance units by conducting counterreconnaissance. Counterreconnaissance","rect":[108.0,297.3061828613281,540.0705843048096,288.197998046875]},{"page":281,"text":"is a tactical mission task that encompasses all measures taken by a unit to counter enemy reconnaissance and","rect":[108.0,308.76904296875,540.0876369476318,299.6608581542969]},{"page":281,"text":"surveillance efforts. A unit performing a screen observes, identifies, and reports enemy actions. Generally, a","rect":[108.0,320.29205322265627,540.0735139923096,311.1838684082031]},{"page":281,"text":"screening force engages and destroys enemy reconnaissance elements within its capabilities—augmented by","rect":[107.99999237060547,331.8150939941406,540.0256862640381,322.7068786621094]},{"page":281,"text":"indirect fires—but otherwise fights only in self-defense. The screen has the minimum combat power","rect":[108.0,343.2779541015625,539.9582421836853,334.1697082519531]},{"page":281,"text":"necessary to provide early warning and allows commanders to retain the bulk of the main body’s combat","rect":[107.99000549316406,354.8009338378906,540.0724863967896,345.6927490234375]},{"page":281,"text":"power for commitment at the decisive place and time. A screen provides the least amount of protection of","rect":[107.98998260498047,366.3038635253906,539.8681542930603,357.2157287597656]},{"page":281,"text":"any security mission; it does not have the combat power to develop the situation.","rect":[107.98998260498047,377.78680419921877,431.19524669647219,368.6786193847656]},{"page":281,"text":"13-57. A screen is appropriate to cover gaps between forces, exposed flanks, or the rear of stationary and","rect":[107.98998260498047,395.311767578125,539.9691677093506,386.2035827636719]},{"page":281,"text":"moving forces. Units can place a screen in front of a stationary formation. Designed to provide minimum","rect":[107.98998260498047,406.83477783203127,540.0303626022339,397.7265930175781]},{"page":281,"text":"security with minimum forces, a screen is usually an economy of force operation. Units assign and resource","rect":[107.97997283935547,418.29766845703127,539.9356966094971,409.1894836425781]},{"page":281,"text":"a guard or cover mission instead of a screen if they expect significant enemy forces or they require a","rect":[107.97997283935547,429.8206787109375,539.9490633087158,420.7124938964844]},{"page":281,"text":"significant amount of time and space to provide the required degree of protection. The security element","rect":[107.9800033569336,441.34368896484377,539.9690318069459,432.2355041503906]},{"page":281,"text":"forward of a moving force conducts a guard or cover because a moving screen lacks the combat power to","rect":[107.9799575805664,452.8065490722656,540.0002956390381,443.6983642578125]},{"page":281,"text":"defeat or contain the lead elements of an enemy force.","rect":[107.97997283935547,464.32952880859377,324.6133985519409,455.2213439941406]},{"page":281,"text":"13-58. A security force normally conducts a screen by establishing a series of observation posts and patrols","rect":[107.97997283935547,481.85455322265627,539.9762103538513,472.7463684082031]},{"page":281,"text":"to ensure adequate surveillance of the assigned area. Units use reconnaissance patrols (mounted, dismounted,","rect":[107.96991729736328,493.3173828125,540.0233106613159,484.2091979980469]},{"page":281,"text":"and aerial), relocate observation posts, and employ technical assets to ensure continuous and overlapping","rect":[107.96991729736328,504.84039306640627,539.8550930023193,495.7322082519531]},{"page":281,"text":"surveillance. They also employ terrain data-base analytical support systems to ensure the integration of","rect":[107.96990966796875,516.3032836914063,539.9932763633728,507.1950988769531]},{"page":281,"text":"friendly information collection assets to provide necessary coverage.","rect":[107.96991729736328,527.8262939453125,382.93487071990969,518.7181396484375]},{"page":281,"text":"Screen Tasks","rect":[90.0,550.1846923828125,152.00406894302368,542.5865478515625]},{"page":281,"text":"13-59. Unless the commander orders otherwise, a security force conducting a screen performs these tasks","rect":[108.0,569.934326171875,539.9945819358826,560.826171875]},{"page":281,"text":"within the limits of its capabilities:","rect":[108.0,581.3771362304688,247.1057047805786,572.2890014648438]},{"page":281,"text":" Detect and report all enemy elements attempting to pass through the screen, both ground and","rect":[133.1999969482422,594.894287109375,539.9581813812256,585.7861328125]},{"page":281,"text":"aerial, and provide the protected force commander early warning of enemy activities.","rect":[151.1999969482422,606.4172973632813,491.9042921066284,597.3091430664063]},{"page":281,"text":" Conduct counterreconnaissance to destroy, defeat, or disrupt all enemy reconnaissance elements","rect":[133.1999969482422,619.914306640625,539.9622943382263,610.80615234375]},{"page":281,"text":"within capabilities and according to engagement criteria. Allow no enemy ground element to pass","rect":[151.1999969482422,631.377197265625,540.0712420921326,622.26904296875]},{"page":281,"text":"through the screen undetected and unreported.","rect":[151.2100372314453,642.9002075195313,336.23443126678469,633.7920532226563]},{"page":281,"text":" Maintain contact with the protected force and other forces operating on its flank.","rect":[133.1999969482422,656.394287109375,473.6242628097534,647.2861328125]},{"page":281,"text":" Maintain contact with enemy forces and report activity in the assigned area.","rect":[133.1999969482422,669.894287109375,454.4252882003784,660.7861328125]},{"page":281,"text":" Maintain continuous observation of all avenues of approach that affect the main body’s mission.","rect":[133.1999969482422,683.394287109375,536.6724195480347,674.2861328125]},{"page":281,"text":" Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[133.1999969482422,696.894287109375,539.9682893829346,687.7861328125]},{"page":281,"text":"enemy’s order of battle based on the IPB (when facing an echeloned enemy force).","rect":[151.19000244140626,708.4172973632813,482.73269176483157,699.3091430664063]},{"page":281,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":281,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":281,"text":"13-13","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":282,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":282,"text":" While displacing, determine the direction of enemy movement, maintain contact, and report threat","rect":[115.19999694824219,83.51434326171875,522.0480112991334,74.40616607666016]},{"page":282,"text":"activities.","rect":[133.1999969482422,92.95319366455078,171.76496410369874,85.86905670166016]},{"page":282,"text":"13-60. A unit can normally screen an avenue of approach two echelons larger than itself, such as a battalion","rect":[89.9937515258789,112.4921875,521.9809474945068,103.3840103149414]},{"page":282,"text":"scout platoon screening a battalion-sized avenue of approach or a cavalry troop screening a brigade-sized","rect":[89.9937973022461,124.01519775390625,522.0140895843506,114.90702056884766]},{"page":282,"text":"avenue of approach. Security force units inform their higher echelon commanders of shortfalls when their","rect":[89.98373413085938,135.47808837890626,521.9946801719666,126.36991119384766]},{"page":282,"text":"forces lack the time or other resources to complete all screen operations. They request guidance on which","rect":[89.98373413085938,147.00103759765626,521.9901027679443,137.89285278320313]},{"page":282,"text":"tasks they must complete and their priority. After initiating the screen, if security force units determine their","rect":[89.97370910644531,158.5240478515625,521.8898828086853,149.41586303710938]},{"page":282,"text":"forces cannot complete all assigned tasks—such as maintain continuous observation of all avenues of","rect":[89.97370910644531,169.9869384765625,522.0011498985291,160.87875366210938]},{"page":282,"text":"approach that affect the main body’s mission—they inform their higher echelon commanders and await","rect":[89.97370910644531,181.50994873046876,521.9790415725709,172.40176391601563]},{"page":282,"text":"further instructions while the unit continues to screen to the best of their ability.","rect":[89.97369384765625,193.032958984375,408.7399854660034,183.92477416992188]},{"page":282,"text":"Organization of Forces","rect":[72.0,217.58067321777345,180.14092502212524,207.77552795410157]},{"page":282,"text":"13-61. A screen normally requires the subordinate elements of the security force to deploy abreast. A screen","rect":[90.0,235.13427734375,522.0497951507568,226.02609252929688]},{"page":282,"text":"force normally organizes itself into a number of observation posts determined by the number of avenues of","rect":[90.0,246.65728759765626,522.0143945274353,237.54910278320313]},{"page":282,"text":"approach into the main body and any additional NAIs the security force must cover, as specified by the main","rect":[90.0,258.12017822265627,521.9692897796631,249.01199340820313]},{"page":282,"text":"force commander. The screening force may retain a small reserve to extract endangered observation posts.","rect":[90.0,269.6431884765625,515.3890943527222,260.5350036621094]},{"page":282,"text":"Screen Control Measures","rect":[72.0,292.064697265625,191.0769754371643,284.4665222167969]},{"page":282,"text":"13-62. The control measures necessary to conduct a screen include phase lines, observation posts, named","rect":[90.0,311.7543029785156,522.0644435882568,302.6461181640625]},{"page":282,"text":"areas of interest, handover lines, and contact points. Figure 13-5 depicts example screen control measures.","rect":[89.9899673461914,323.2773132324219,514.8260450363159,314.16912841796877]},{"page":282,"text":"Figure 13-5. Control measures used in a screen mission","rect":[164.13796997070313,654.5986328125,429.82726788711548,645.2098999023438]},{"page":282,"text":"Executing a Stationary Screen","rect":[72.0,685.220703125,214.0174774017334,675.41552734375]},{"page":282,"text":"13-63. Screening forces establish observation posts with overlapping fields of observation when","rect":[90.0,702.7142944335938,522.0364284515381,693.6061401367188]},{"page":282,"text":"establishing screens. Security force units adjust the locations of subordinate screening elements to take","rect":[90.0,714.2373046875,522.0475130157471,705.1190795898438]},{"page":282,"text":"13-14","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":282,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":282,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":283,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":283,"text":"advantage of established links with higher echelon sensors and collection assets. Patrols reconnoiter areas","rect":[108.0,83.51434326171875,540.0501239280701,74.40616607666016]},{"page":283,"text":"that observation posts cannot observe. The force retains a small reserve, if possible. The screening force","rect":[108.0,94.97723388671875,540.0285921173096,85.86905670166016]},{"page":283,"text":"establishesobservation posts in depth on high-speed avenues of approach if forces are available and the depth","rect":[108.0,106.500244140625,540.0384426116943,97.3920669555664]},{"page":283,"text":"of the security area allows. Screening force units plan routes between their initial and subsequent screen lines","rect":[108.0,118.023193359375,540.0203998069763,108.9150161743164]},{"page":283,"text":"to facilitate rapid occupation of these subsequent screen lines. They deploy their assets in depth in positions","rect":[108.0,129.486083984375,539.9918963890076,120.3779067993164]},{"page":283,"text":"where those assets can react to contingencies that develop during the screen mission. They take advantage of ","rect":[108.0,141.00909423828126,542.5002393722534,131.90090942382813]},{"page":283,"text":"surveillance, target acquisition, and night observation equipment and information provided by higher level","rect":[108.0,152.5321044921875,540.0774912796021,143.42391967773438]},{"page":283,"text":"systems to expand the area and quality of security provided.","rect":[107.98998260498047,163.9949951171875,347.97207164764407,154.88681030273438]},{"page":283,"text":"13-64. Established observation posts employ cover and concealment to remain undetected. They report the","rect":[107.98998260498047,181.50994873046876,540.0633821563721,172.40176391601563]},{"page":283,"text":"presence of enemy elements. Prompt, accurate reporting of enemy force locations is essential to keep enemy","rect":[107.98998260498047,193.032958984375,539.9608058929443,183.92477416992188]},{"page":283,"text":"forces from overrunning friendly observation posts. Units can reposition observation posts to keep contact","rect":[107.98998260498047,204.495849609375,539.9452280960084,195.38766479492188]},{"page":283,"text":"with enemy forces. Observation posts employ fire support channels to request and control indirect fires to","rect":[107.98998260498047,216.018798828125,539.9251613616943,206.91061401367188]},{"page":283,"text":"engage detected enemy forces. This helps screening observation posts avoid detection and prevents enemy","rect":[107.9800033569336,227.481689453125,539.9872951507568,218.37350463867188]},{"page":283,"text":"forces from penetrating the screen line. Observation posts may engage enemy reconnaissance assets with","rect":[107.96995544433594,239.00469970703126,539.9130764007568,229.89651489257813]},{"page":283,"text":"their direct fire systems if indirect fires cannot destroy those enemy reconnaissance assets. Observation posts","rect":[107.95994567871094,250.5277099609375,539.8881366233826,241.41952514648438]},{"page":283,"text":"also attempt to slow the movement of other enemy elements, primarily using indirect fires and close air","rect":[107.95994567871094,261.9906005859375,539.9271752891541,252.88241577148438]},{"page":283,"text":"support.","rect":[107.95994567871094,273.4935607910156,140.5199384689331,265.4074401855469]},{"page":283,"text":"13-65. Observation posts report and request to move to the next screen line as enemy pressure threatens","rect":[107.95994567871094,291.028564453125,540.0135028343201,281.9203796386719]},{"page":283,"text":"their security. Commanders establish criteria based on certain enemy or friendly actions that allow their","rect":[107.94992065429688,302.49139404296877,539.8982446250916,293.3832092285156]},{"page":283,"text":"screening forces to displace to subsequent screen lines. These criteria allow subordinates to use their initiative","rect":[107.94992065429688,314.014404296875,540.0572176055908,304.9062194824219]},{"page":283,"text":"when conducting operations. Screening forces emphasize rapid movement while maintaining contact with","rect":[107.94992065429688,325.53741455078127,539.8958034515381,316.42919921875]},{"page":283,"text":"enemy forces when displacing from one screen line to another. This ensures the rapid closing of any gaps in","rect":[107.94990539550781,337.00030517578127,539.9282131195068,327.8921203613281]},{"page":283,"text":"observation that occurred during movement. Likewise, screening force command elements displace as","rect":[107.94990539550781,348.5233154296875,539.9245135765076,339.4151306152344]},{"page":283,"text":"required to maintain control and avoid enemy detection and destruction. Screening forces repeat this","rect":[107.94989776611328,360.04632568359377,539.8816058616638,350.9381408691406]},{"page":283,"text":"procedure as often as necessary.","rect":[107.94989776611328,371.5091857910156,236.51148509979249,362.4010009765625]},{"page":283,"text":"13-66. Screening force commanders decide when to move from one screen to another. However, main body","rect":[107.94989776611328,389.0241394042969,539.9744167327881,379.9158935546875]},{"page":283,"text":"commanders decide when the screening force can conduct either a reconnaissance handover with the next","rect":[107.93990325927735,400.54718017578127,539.9993052444459,391.4389953613281]},{"page":283,"text":"echelon of reconnaissance or a battle handover with the main body.","rect":[107.93987274169922,412.0100402832031,377.5329542160034,402.90185546875]},{"page":283,"text":"Executing a Moving Screen","rect":[90.0,436.5806884765625,218.6427673187256,426.77557373046877]},{"page":283,"text":"13-67. A screening force maintains a moving screen along the flanks and rear of the protected force, never","rect":[108.0,454.1343078613281,539.9742333946228,445.026123046875]},{"page":283,"text":"to the front of a moving formation. A screening force is not employed in front of a moving formation because","rect":[108.0,465.5971984863281,540.0694246368408,456.489013671875]},{"page":283,"text":"a screen does not prevent enemy forces from penetrating it and making contact with the protected force. Zone","rect":[108.0,477.12017822265627,540.0511751251221,468.0119934082031]},{"page":283,"text":"reconnaissance, reconnaissance in force, and guard are missions given to units in front of a moving force.","rect":[108.0,488.6431884765625,540.0204420089722,479.5350036621094]},{"page":283,"text":"The screen movement is keyed to time and distance factors associated with the main body’s movement. (See","rect":[108.0,500.1060791015625,539.9999055938721,490.9978942871094]},{"page":283,"text":"figure 13-6 on page 13-16.) Responsibilities for a moving flank screen begin at the front of the main body’s","rect":[108.0,511.6290588378906,540.0615375022888,502.5208740234375]},{"page":283,"text":"lead combat element and end at the rear of the protected force. They do not include front and rear security","rect":[108.01001739501953,523.152099609375,539.9540309906006,514.0439453125]},{"page":283,"text":"forces. A force executes a moving screen in the same way it conducts a stationary screen, except for the","rect":[108.01000213623047,534.6149291992188,539.9541902618408,525.5067749023438]},{"page":283,"text":"movement techniques.","rect":[108.01000213623047,546.117919921875,198.04775524139405,537.02978515625]},{"page":283,"text":"13-68. The lead element of a moving screen performs three tasks. It maintains contact with the protected","rect":[108.01001739501953,563.6529541015625,540.0344142913818,554.5447998046875]},{"page":283,"text":"force’s main body, reconnoiters the area between the main body and the security force’s routes of advance,","rect":[108.01001739501953,575.1157836914063,539.9755811691284,566.0076293945313]},{"page":283,"text":"and reconnoiters the security force’s route. It performs these tasks by conducting a zone reconnaissance.","rect":[108.01001739501953,586.6387939453125,525.2191114425659,577.5306396484375]},{"page":283,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":283,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":283,"text":"13-15","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":284,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":284,"text":"Figure 13-6. Moving flank screen","rect":[219.4199981689453,338.6341857910156,374.5816929359436,329.2454528808594]},{"page":284,"text":"13-69. The screening force may use several methods to move the screen as the protected force moves.","rect":[90.00169372558594,362.09100341796877,521.9962720870972,352.9828186035156]},{"page":284,"text":"Table 13-2 summarizes each method’s advantages and disadvantages.","rect":[90.00169372558594,373.614013671875,369.3362684249878,364.5058288574219]},{"page":284,"text":"Table 13-2. Screen movement methods","rect":[204.48019409179688,389.155029296875,389.5135335845947,381.740234375]},{"page":284,"text":"13-16","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":284,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":284,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":285,"text":"Table 13-2. Screen movement methods (continued)","rect":[193.9199981689453,89.51416015625,436.18559814071656,80.12541961669922]},{"page":285,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":285,"text":"13-70. Units consider the mission variables when deciding which movement method to employ. Figures","rect":[108.0,224.154296875,540.0983417015076,215.04611206054688]},{"page":285,"text":"13-7 below and 13-8 on page 13-18 illustrate four methods of controlling movement along a screen line.","rect":[108.0,235.6171875,539.9392042160034,226.50900268554688]},{"page":285,"text":"These methods are—","rect":[107.9699478149414,245.1161651611328,192.98466110229493,238.03201293945313]},{"page":285,"text":"","rect":[133.1999969482422,257.9054260253906,139.16105696249009,253.2131805419922]},{"page":285,"text":"","rect":[133.1999969482422,282.9254455566406,139.16105696249009,278.2331848144531]},{"page":285,"text":"","rect":[133.1999969482422,296.4254455566406,139.16105696249009,291.7331848144531]},{"page":285,"text":"","rect":[133.1999969482422,309.9254455566406,139.16105696249009,305.2331848144531]},{"page":285,"text":"Alternate bounds by individual observation posts from the rear to the front. (Company-sized and","rect":[151.1999969482422,260.63427734375,540.0290431976318,251.52609252929688]},{"page":285,"text":"smaller units usually employ this method.)","rect":[151.199951171875,272.15728759765627,321.75639892196656,263.0491027832031]},{"page":285,"text":"Alternate bounds by subordinate units from the rear to the front.","rect":[151.1999969482422,285.654296875,407.5627393722534,276.5461120605469]},{"page":285,"text":"Successive bounds by units along the screen line.","rect":[151.1999969482422,299.154296875,348.4026746749878,290.0461120605469]},{"page":285,"text":"Continuous marching along the route of advance.","rect":[151.1999969482422,312.654296875,348.7053174972534,303.5461120605469]},{"page":285,"text":"Figure 13-7.","rect":[134.40647888183595,636.8313598632813,190.5886149368286,627.5327758789063]},{"page":285,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":285,"text":"Examples of alternate bound by OP and alternate bound by unit","rect":[193.32408142089845,636.8313598632813,495.60942626571656,627.442626953125]},{"page":285,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":285,"text":"13-17","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":286,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":286,"text":"Figure 13-8. Example of successive bound by unit and continuous marching methods of","rect":[87.4800033569336,400.4941711425781,506.54448485946656,391.1054382324219]},{"page":286,"text":"displacement","rect":[265.0143737792969,411.8869323730469,328.9540002403259,402.7486877441406]},{"page":286,"text":"Screening Operations During Limited Visibility","rect":[72.0,442.5806884765625,295.5714511871338,432.77557373046877]},{"page":286,"text":"13-71. Limited visibility often affects the screening force’s ground and air observation. During limited","rect":[90.0,460.1343078613281,522.0103054046631,451.026123046875]},{"page":286,"text":"visibility, the screening force uses all available night and thermal observation devices and electronic","rect":[90.0,471.6573181152344,522.0063753204346,462.54913330078127]},{"page":286,"text":"surveillance devices. Although the screening force can use technical information collection assets to offset","rect":[90.0,483.12017822265627,521.9726328811646,474.0119934082031]},{"page":286,"text":"limited visibility, it should also adjust its techniques and procedures to the conditions. For example, screening","rect":[90.0,494.6431884765625,522.0353908538818,485.5249938964844]},{"page":286,"text":"force units may adjust the number and location of observation posts in limited-visibility conditions. They can","rect":[90.0,506.16619873046877,522.0253810882568,497.0480041503906]},{"page":286,"text":"establish more observation posts to cover avenues of approach that these conditions mask. They plan for","rect":[89.98998260498047,517.6290283203125,521.9402978477478,508.5208435058594]},{"page":286,"text":"illumination and use it when necessary. Screening force units closely coordinate their combat and","rect":[89.98998260498047,529.152099609375,522.0933132171631,520.0439453125]},{"page":286,"text":"reconnaissance patrols to prevent misidentification and friendly fire incidents. Noise and light discipline","rect":[89.98998260498047,540.675048828125,521.9902620391846,531.56689453125]},{"page":286,"text":"prevents compromise of observation posts by enemy reconnaissance forces. Additional observation posts","rect":[89.97993469238281,552.137939453125,521.9150531272888,543.02978515625]},{"page":286,"text":"along enemy avenues of approach can provide depth to facilitate the detection of enemy forces that eluded","rect":[89.97993469238281,563.6609497070313,521.9579982757568,554.5527954101563]},{"page":286,"text":"forward security elements.","rect":[89.97993469238281,575.1839599609375,196.3291883468628,566.0758056640625]},{"page":286,"text":"GUARD","rect":[72.0,598.5599975585938,108.71548557281494,590.2440185546875]},{"page":286,"text":"13-72. Guard is a type of security operation conducted to protect the main body by fighting to gain time","rect":[90.0,618.414306640625,522.0182771759033,609.30615234375]},{"page":286,"text":"while preventing enemy ground observation of and direct fire against the main body (ADP 3-90). A guard","rect":[89.98997497558594,629.9373168945313,521.8890895843506,620.8291625976563]},{"page":286,"text":"differs from a screen in that a guard force contains sufficient combat power to defeat, cause the withdrawal","rect":[89.98998260498047,641.4603271484375,521.9452280960084,632.3521728515625]},{"page":286,"text":"of, or fix the lead elements of an enemy ground force before it can engage the main body with direct fire. A","rect":[89.98998260498047,652.9232177734375,521.9589886703491,643.8150634765625]},{"page":286,"text":"guard force routinely engages enemy forces with direct and indirect fires. A screening force, however,","rect":[89.98998260498047,664.4461669921875,521.9591627120972,655.3380126953125]},{"page":286,"text":"primarily uses indirect fires or close air support to destroy enemy reconnaissance elements and slow the","rect":[89.98998260498047,675.9090576171875,521.9081697540283,666.8009033203125]},{"page":286,"text":"movement of other enemy forces. A guard force uses all means at its disposal to prevent enemy forces from","rect":[89.98998260498047,687.4320678710938,521.9736609420777,678.3239135742188]},{"page":286,"text":"penetrating to a position to observe and engage the main body. It operates within the range of the main body’s","rect":[89.98998260498047,698.955078125,522.0806415061951,689.846923828125]},{"page":286,"text":"13-18","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":286,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":286,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":287,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":287,"text":"fire support weapons, deploying over a narrower front than a comparable-sized screening force to permit","rect":[108.0,83.51434326171875,540.0122446975709,74.40616607666016]},{"page":287,"text":"concentrating combat power.","rect":[107.9999771118164,94.97723388671875,224.38831615447999,85.86905670166016]},{"page":287,"text":"13-73. Units employ a guard when enemy contact is expected, and they require additional security beyond","rect":[107.9999771118164,112.4921875,540.0201320648193,103.3840103149414]},{"page":287,"text":"that provided by a screen. The multiple requirements of the guard mission often occur simultaneously over","rect":[107.9999771118164,124.01519775390625,539.9839379844666,114.90702056884766]},{"page":287,"text":"large areas. While the guard force’s exact size is determined by prevailing mission variables, table 13-1 on","rect":[107.9999771118164,135.47808837890626,539.9020290374756,126.36991119384766]},{"page":287,"text":"page 13-5 provides guidance on the size of an echelon’s guard force.","rect":[107.99996185302735,147.00103759765626,382.90468883514407,137.89285278320313]},{"page":287,"text":"13-74. The three types of guard operations are advance, flank, and rear guard. Commanders can assign a","rect":[107.99996185302735,164.52606201171876,540.0240755157471,155.41787719726563]},{"page":287,"text":"guard mission to protect either a stationary or a moving force.","rect":[107.99996185302735,175.98895263671876,355.4229383468628,166.88076782226563]},{"page":287,"text":"13-75. A unit conducting a guard performs tasks within its capabilities unless ordered otherwise. If a unit","rect":[107.99996185302735,193.513916015625,539.9752573928834,184.40573120117188]},{"page":287,"text":"lacks the time, lacks resources, or is unable to complete all tasks, it must inform the higher echelon assigning","rect":[107.98994445800781,205.03692626953126,540.0484523773193,195.92874145507813]},{"page":287,"text":"the mission of the shortfall and request guidance on which tasks to complete or the priority of tasks. Guard","rect":[107.98994445800781,216.499755859375,539.9138088226318,207.39151000976563]},{"page":287,"text":"tasks, within capability are to—","rect":[107.98999786376953,228.0228271484375,235.49448776245118,218.91464233398438]},{"page":287,"text":" Detect and report all enemy elements attempting to pass through the guard, both ground and aerial,","rect":[133.1999969482422,241.49432373046876,540.0831861495972,232.38613891601563]},{"page":287,"text":"and provide the protected force commander early warning of enemy activities.","rect":[151.1999969482422,252.95721435546876,464.6868848800659,243.84902954101563]},{"page":287,"text":" Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements according","rect":[133.1999969482422,266.45428466796877,540.0214138031006,257.3460998535156]},{"page":287,"text":"to engagement criteria. Must prevent ground observation and direct fire against the main body.","rect":[151.1999969482422,277.977294921875,530.3299512863159,268.8691101074219]},{"page":287,"text":" Maintain contact with the protected force and other forces operating on its flanks.","rect":[133.1999969482422,291.47430419921877,477.51629161834719,282.3661193847656]},{"page":287,"text":" Maintain contact with enemy forces and report activity in the assigned area.","rect":[133.1999969482422,304.97430419921877,454.4252882003784,295.8661193847656]},{"page":287,"text":" Maintain observation of avenues of approach that affect the protected forces mission.","rect":[133.1999969482422,318.4542541503906,492.21197032928469,309.3661193847656]},{"page":287,"text":" Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[133.1999969482422,331.97430419921877,539.9782991485596,322.8661193847656]},{"page":287,"text":"enemy’s order of battle based upon IPB (when facing an echeloned enemy force).","rect":[151.1999969482422,343.497314453125,478.0095167160034,334.3891296386719]},{"page":287,"text":" While displacing, determine the direction of enemy movement, maintain contact, and report threat","rect":[133.1999969482422,356.9942932128906,540.0480112991334,347.8861083984375]},{"page":287,"text":"activities.","rect":[151.1999969482422,366.4331359863281,189.76496410369874,359.3489990234375]},{"page":287,"text":"","rect":[133.1999969482422,379.2254333496094,139.16105696249009,374.5331726074219]},{"page":287,"text":"","rect":[133.1999969482422,404.2454528808594,139.16105696249009,399.5531921386719]},{"page":287,"text":"","rect":[133.1999969482422,417.7454528808594,139.16105696249009,413.0531921386719]},{"page":287,"text":"","rect":[133.1999969482422,431.2454528808594,139.16105696249009,426.5531921386719]},{"page":287,"text":"While displacing, impede and harasses the enemy, within capability, to provide the protected force","rect":[151.1999969482422,381.95428466796877,539.9679842071533,372.8460998535156]},{"page":287,"text":"commander with additional time and maneuver space.","rect":[151.19998168945313,393.4572448730469,367.5338087081909,384.3691101074219]},{"page":287,"text":"Cause the enemy main body to deploy prematurely.","rect":[151.1999969482422,406.97430419921877,357.88762950897219,397.8661193847656]},{"page":287,"text":"Prevent visual contact and direct fire against the protected force.","rect":[151.1999969482422,420.47430419921877,408.8843641281128,411.3661193847656]},{"page":287,"text":"Deny the enemy information about the size, strength, composition, and objective of the main body.","rect":[151.1999969482422,433.97430419921877,540.0199537277222,424.8561096191406]},{"page":287,"text":"13-76.","rect":[107.9937515258789,449.4752502441406,133.83533763885499,442.57147216796877]},{"page":287,"text":"","rect":[133.1999969482422,462.26544189453127,139.16105696249009,457.57318115234377]},{"page":287,"text":"","rect":[133.1999969482422,475.7054443359375,139.16105696249009,471.01318359375]},{"page":287,"text":"","rect":[133.1999969482422,489.2054443359375,139.16105696249009,484.51318359375]},{"page":287,"text":"If a guard turns into a meeting engagement—","rect":[142.552734375,451.4992980957031,324.4758720397949,442.39111328125]},{"page":287,"text":"Destroy enemy reconnaissance and lead elements of the main body.","rect":[151.1999969482422,464.9942932128906,422.1939649581909,455.8861083984375]},{"page":287,"text":"Determine the location of enemy assailable flanks.","rect":[151.1999969482422,478.4342956542969,353.62310314178469,469.32611083984377]},{"page":287,"text":"Fix enemy forces to allow the main body to maneuver around enemy ","rect":[151.1999969482422,491.9342956542969,453.0203809738159,482.82611083984377]},{"page":287,"text":"weaknesses.","rect":[151.1999969482422,501.4332580566406,200.3871717453003,494.34912109375]},{"page":287,"text":"strengths ","rect":[455.1947021484375,491.9342956542969,493.8157911300659,482.82611083984377]},{"page":287,"text":"or ","rect":[495.93096923828127,490.0,506.7756299972534,484.0]},{"page":287,"text":"through","rect":[508.949951171875,491.9342956542969,539.9960231781006,482.82611083984377]},{"page":287,"text":"Organization of a Guard Force","rect":[90.0,528.0806884765625,236.0021644744873,518.2755126953125]},{"page":287,"text":"13-77. Whether the guard force is stationary or moving, the types of guard missions, knowledge of the","rect":[108.0,545.63427734375,539.9761629180908,536.526123046875]},{"page":287,"text":"terrain, and enemy dictate the task organization of the guard force. The guard force commander normally","rect":[108.0,557.09716796875,540.0021877288818,547.989013671875]},{"page":287,"text":"organizes the guard force as an area defense, a delay, a zone reconnaissance, or a movement to contact.","rect":[108.0,568.6201782226563,520.8244581222534,559.5120239257813]},{"page":287,"text":"Control Measures","rect":[90.0,591.0337524414063,174.56247958755493,583.446533203125]},{"page":287,"text":"13-78. Units use control measures to control the operations of guard forces in the security area. The mission","rect":[108.0,610.7343139648438,539.9191188812256,601.6261596679688]},{"page":287,"text":"also influences the size of the assigned areas given to subordinate elements. For example, a movement to","rect":[108.0,622.25732421875,539.9974269866943,613.149169921875]},{"page":287,"text":"contact normally occurs across a narrower unit frontage than a zone reconnaissance to allow adequate","rect":[107.98998260498047,633.7802734375,539.9840974884033,624.672119140625]},{"page":287,"text":"concentration of combat power.","rect":[107.98998260498047,645.22314453125,235.2339735031128,636.135009765625]},{"page":287,"text":"13-79. Guard force commanders may task subordinate elements to conduct screen missions to the front and","rect":[107.98998260498047,662.7681884765625,539.9940700531006,653.6600341796875]},{"page":287,"text":"flanks of the guard force. This provides early warning of enemy forces and helps maintain contact with flank","rect":[107.98999786376953,674.2911376953125,539.9731349945068,665.1829833984375]},{"page":287,"text":"forces and any higher echelon security force. An example is a cavalry squadron screen in front of a brigade","rect":[107.98999786376953,685.7540283203125,539.9869661407471,676.6458740234375]},{"page":287,"text":"operating as a division advance guard. The presence of a higher echelon security force also influences how","rect":[107.98998260498047,697.2770385742188,540.0271039047241,688.1688842773438]},{"page":287,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":287,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":287,"text":"13-19","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":288,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":288,"text":"guard force commanders organize available forces and conduct their tasks. It specifically influences the areas","rect":[90.0,83.51434326171875,522.0184466819763,74.40616607666016]},{"page":288,"text":"of fire support and sustainment.","rect":[90.0,94.95719909667969,216.94341564178468,85.86905670166016]},{"page":288,"text":"Advance Guard","rect":[72.0,117.40469360351563,146.87151182556154,109.79554748535156]},{"page":288,"text":"13-80. An advance guard for a stationary force operates defensively. It defends or delays in accordance","rect":[90.0,137.154296875,521.9150667266846,128.04611206054688]},{"page":288,"text":"with the main body commander’s intent. An advance guard for a moving force operates offensively as","rect":[90.0,148.6171875,522.0533587913513,139.50900268554688]},{"page":288,"text":"depicted in figure 13-9. The advance guard develops the situation so the main body can use its combat power","rect":[90.0,160.14019775390626,522.0495507774353,151.03195190429688]},{"page":288,"text":"to the greatest effect. Units do not dissipate the main body’s combat power through piecemeal commitment.","rect":[90.01001739501953,171.6632080078125,521.9792432785034,162.55502319335938]},{"page":288,"text":"The full combat power of the main body must be available to mass and defeat the main enemy force.","rect":[90.0,183.12603759765626,492.99456310272219,174.01785278320313]},{"page":288,"text":"Figure 13-9. Advance guard for division attack","rect":[187.20401000976563,509.4073486328125,406.8043966217041,500.01861572265627]},{"page":288,"text":"13-81. An advance guard for a moving force normally conducts a movement to contact. It organizes and","rect":[89.9999771118164,532.92431640625,521.9234523773193,523.816162109375]},{"page":288,"text":"uses the control measures typically associated with the conduct of a movement to contact. Advance guard","rect":[90.0,544.3871459960938,521.9793605804443,535.2789916992188]},{"page":288,"text":"force units normally deploy their ground elements abreast to cover the axis of advance or the main body’s","rect":[90.0,555.91015625,521.9923236351013,546.802001953125]},{"page":288,"text":"assigned area.","rect":[89.98999786376953,567.373046875,146.1320447921753,558.264892578125]},{"page":288,"text":"13-82. The advance guard clears enemy elements from the axis of advance or designated portions of the","rect":[89.98998260498047,584.8880615234375,522.0473909454346,575.7799072265625]},{"page":288,"text":"assigned area. This allows the main body to move unimpeded, prevents the unnecessary delay of the main","rect":[89.98998260498047,596.4110107421875,521.9791164398193,587.3028564453125]},{"page":288,"text":"body, and defers the deployment of the main body for as long as possible.","rect":[89.98998260498047,607.8739013671875,385.29152965545657,598.7657470703125]},{"page":288,"text":"13-83. The advance guard can operate behind the security force of a higher echelon. For example, a division","rect":[89.98998260498047,625.388916015625,522.1076564788818,616.28076171875]},{"page":288,"text":"may use a reinforced reconnaissance squadron as an advanced guard, while each brigade column organizes","rect":[90.00000762939453,636.911865234375,521.9462420921326,627.8037109375]},{"page":288,"text":"one of its battalion task forces into an advance guard. (See figure 13-9.) The higher echelon security force","rect":[90.00000762939453,648.374755859375,522.0474519805908,639.2666015625]},{"page":288,"text":"initially develops the situation. Commanders may task the advance guard within their capability to—","rect":[89.98998260498047,659.8978271484375,493.8519096374512,650.7896728515625]},{"page":288,"text":" Coordinate and conduct the rearward passage of lines of the security force.","rect":[115.19999694824219,673.374267578125,432.58977794647219,664.26611328125]},{"page":288,"text":" Reduce obstacles to create lanes or improve existing lanes as required to support the maneuver of","rect":[115.19999694824219,686.874267578125,522.0410668907166,677.76611328125]},{"page":288,"text":"the main body.","rect":[133.1999969482422,698.3972778320313,192.9362440109253,689.2891235351563]},{"page":288,"text":"13-20","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":288,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":288,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":289,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":289,"text":" Eliminate enemy forces bypassed by the security force.","rect":[133.1999969482422,83.51434326171875,372.2192335128784,74.40616607666016]},{"page":289,"text":" Coordinate and conduct a forward passage of lines through the security force and fix enemy forces","rect":[133.1999969482422,97.01434326171875,540.0141131858826,87.90616607666016]},{"page":289,"text":"in the enemy’s main defensive positions to allow the friendly main body to maneuver.","rect":[151.1999969482422,108.47723388671875,495.5815076828003,99.36905670166016]},{"page":289,"text":"13-84. The movement of multiple security forces and the handover of a detected enemy force from the","rect":[107.9937515258789,125.9921875,540.0411043243408,116.8840103149414]},{"page":289,"text":"higher echelon security force to the lower echelon security force are controlled using checkpoints, contact","rect":[107.9937515258789,137.51519775390626,540.0288462600709,128.40701293945313]},{"page":289,"text":"points, PLs, handover lines, and disengagement criteria, in addition to other graphic control measures. At a","rect":[107.9937515258789,148.97808837890626,539.9670686798096,139.86990356445313]},{"page":289,"text":"minimum, the higher echelon security force has a rear boundary that is also the forward boundary of the","rect":[107.9937515258789,160.50103759765626,539.9631013946533,151.39285278320313]},{"page":289,"text":"advance guard.","rect":[107.98373413085938,172.0240478515625,168.56865978240968,162.91586303710938]},{"page":289,"text":"13-85. The advance guard engages in offensive operations when necessary to accomplish the mission. After","rect":[107.98373413085938,189.48895263671876,540.0320336875916,180.38076782226563]},{"page":289,"text":"the guard makes enemy contact, the commander determines whether the guard mission requires an attack, a","rect":[107.97371673583985,201.01190185546876,540.1050691680908,191.90371704101563]},{"page":289,"text":"defense, or a delay based on the mission variables. For example, if the guard force has sufficient combat","rect":[107.97371673583985,212.47479248046876,539.9667124710084,203.36660766601563]},{"page":289,"text":"power to defeat an enemy force, it conducts a hasty attack. The guard force avoids assaulting strong enemy","rect":[107.97371673583985,223.997802734375,540.0001125335693,214.88961791992188]},{"page":289,"text":"positions from the front. If the enemy forces attempt to withdraw, the advance guard continues the attack","rect":[107.97372436523438,235.52081298828126,539.8818264007568,226.41262817382813]},{"page":289,"text":"with the intent to destroy the enemy force. If the advance guard encounters an enemy force that it cannot stop","rect":[107.97372436523438,246.983642578125,540.0252590179443,237.87545776367188]},{"page":289,"text":"from interfering with the movement of the main body, the security force reports its presence to the main","rect":[107.97371673583985,258.5067138671875,539.9097805023193,249.39852905273438]},{"page":289,"text":"body. It then establishes a defense, continues conducting reconnaissance, and prepares to pass elements of","rect":[107.96368408203125,270.0296630859375,539.9545800743103,260.9214782714844]},{"page":289,"text":"the main body forward while facilitating the deployment of the main body.","rect":[107.96368408203125,281.4925537109375,407.3520460128784,272.3843688964844]},{"page":289,"text":"13-86. Guard force units can delay rearward one or more positions to avoid decisive engagement if the","rect":[107.96368408203125,299.01751708984377,540.0574007110596,289.9093322753906]},{"page":289,"text":"depth of the security area permits, and they do not have enough combat power to defeat an approaching","rect":[107.94365692138672,310.54052734375,539.9397487640381,301.4323425292969]},{"page":289,"text":"enemy force. This reduces the enemy force’s combat power. Guard forces accept decisive engagement to","rect":[107.94365692138672,322.00341796875,540.0060939788818,312.8952331542969]},{"page":289,"text":"prevent enemy ground forces from employing their direct-fire systems to engage the main body unless their","rect":[107.94366455078125,333.5263977050781,539.9750878868103,324.418212890625]},{"page":289,"text":"higher echelon commanders relieve them of their mission.","rect":[107.94369506835938,345.04937744140627,340.6572217941284,335.9411926269531]},{"page":289,"text":"Flank Guard","rect":[90.0,367.3647155761719,151.41223753356935,359.7555847167969]},{"page":289,"text":"13-87. A flank guard protects an exposed flank of the main body. A flank guard is similar to a flank screen","rect":[108.0,387.1142883300781,540.0923976898193,378.006103515625]},{"page":289,"text":"except that the unit plans defensive positions in addition to observation posts.","rect":[108.0,398.61724853515627,417.8885450363159,389.52911376953127]},{"page":289,"text":"13-88. Main body units assign an area to each flank guard that is sufficiently deep to provide early warning","rect":[108.0,416.1022033691406,539.9796657562256,406.99395751953127]},{"page":289,"text":"and reaction time. However, each flank guard remains within supporting range of the main body’s indirect","rect":[108.0,427.6251525878906,540.0113291702271,418.5169677734375]},{"page":289,"text":"fire systems. Flank guard units consider the front and rear of the flank of the main body, the axis taken by","rect":[107.98994445800781,439.14813232421877,539.8358058929443,430.0399475097656]},{"page":289,"text":"the main body, the enemy’s capabilities, and the available avenues of approach when determining the exact","rect":[107.98994445800781,450.61102294921877,540.0635142288209,441.5028381347656]},{"page":289,"text":"positions their forces initially occupy.","rect":[107.97993469238281,462.134033203125,259.4052381515503,453.0258483886719]},{"page":289,"text":"13-89. Each flank guard moves to its initial positions using one of the movement techniques. On reaching","rect":[107.97993469238281,479.64898681640627,539.9516506195068,470.5408020019531]},{"page":289,"text":"its initial position, the flank guard establishes defensive positions in assigned BPs or in its assigned area and","rect":[107.9800033569336,491.11187744140627,540.0734157562256,482.0036926269531]},{"page":289,"text":"establishes a screening element forward of these positions. In situations where knowledge about the enemy","rect":[107.9800033569336,502.6348876953125,539.9193019866943,493.5267028808594]},{"page":289,"text":"force is vague, the flank guard maintains a larger reserve than in situations where the enemy force’s actions","rect":[107.9800033569336,514.1578369140625,540.0323626976013,505.0496520996094]},{"page":289,"text":"are more predictable. Figure 13-10 on page 13-22 depicts an example stationary flank guard.","rect":[107.96991729736328,525.6207275390625,478.70598888397219,516.5125732421875]},{"page":289,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":289,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":289,"text":"13-21","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":290,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":290,"text":"Figure 13-10. Stationary flank guard","rect":[211.97999572753907,403.3141784667969,382.0785191078186,393.9254455566406]},{"page":290,"text":"13-90. When conducting a moving flank guard, units address additional considerations beyond those","rect":[89.98648071289063,426.77099609375,522.0447664337158,417.6628112792969]},{"page":290,"text":"applying to a moving flank screen. Instead of occupying a series of observation posts, the security force plans","rect":[89.98648071289063,438.29400634765627,522.0528705101013,429.1858215332031]},{"page":290,"text":"a series of BPs. Figure 13-11 depicts example control measures for a moving flank guard. The security force","rect":[89.98645782470703,449.8170166015625,522.1110506134033,440.7088317871094]},{"page":290,"text":"monitors potential enemy avenues of approach for as long as the enemy threatens the main body. Once the","rect":[89.98644256591797,461.2798767089844,522.0506258087158,452.17169189453127]},{"page":290,"text":"flank guard makes contact with enemy forces, it can attack, defend to defeat, or fix enemy ground forces in","rect":[89.98650360107422,472.8028869628906,522.0095729827881,463.6947021484375]},{"page":290,"text":"their current positions before they can engage the friendly main body or conduct a delay as the situation","rect":[89.98648834228516,484.32586669921877,521.9387111663818,475.2176818847656]},{"page":290,"text":"requires.","rect":[89.98650360107422,495.7687072753906,124.70077800750733,486.6805725097656]},{"page":290,"text":"13-91. The lead element of a moving flank guard performs three tasks. It maintains contact with the","rect":[89.98648834228516,513.3037109375,522.0337190704346,504.1955261230469]},{"page":290,"text":"protected force’s main body, reconnoiters the area between that main body and the flank guard’s routes of","rect":[89.98648834228516,524.8267211914063,522.0157373008728,515.7185668945313]},{"page":290,"text":"advance, and reconnoiters the flank guard’s route. It performs these tasks by conducting a zone","rect":[89.98644256591797,536.2896118164063,522.1210603790283,527.1814575195313]},{"page":290,"text":"reconnaissance.","rect":[89.9864501953125,545.78857421875,153.02529430389405,538.7044677734375]},{"page":290,"text":"13-22","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":290,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":290,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":291,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":291,"text":"Figure 13-11. Moving flank guard control measures","rect":[193.86000061035157,417.11419677734377,436.13160609436036,407.7254638671875]},{"page":291,"text":"13-92. The speed the guard force can maintain needs to be a deliberate planning consideration as generally","rect":[107.97858428955078,440.5710144042969,540.0018215179443,431.46282958984377]},{"page":291,"text":"the guard force will be in less desirable terrain on the flank compared to the main body, which normally is","rect":[107.97858428955078,452.0940246582031,539.9939715843201,442.98583984375]},{"page":291,"text":"on an avenue of approach suited to support its movement. The exact size of the assigned area for any unit","rect":[107.97858428955078,463.61700439453127,539.8891978225709,454.5088195800781]},{"page":291,"text":"conducting a guard depends on the mission variables. For example, a commander assigns an armor brigade","rect":[107.97860717773438,475.07989501953127,540.0420198516846,465.9717102050781]},{"page":291,"text":"combat team cavalry squadron an assigned area with a frontage no larger than 13km. In this example an","rect":[107.97854614257813,486.6029052734375,539.9888820648193,477.4947204589844]},{"page":291,"text":"armored cavalry troop would be assigned an area with a frontage no larger than 5km. If the security force is","rect":[107.9685287475586,498.1258850097656,539.9054706077576,489.0177001953125]},{"page":291,"text":"assigned a frontage larger than they can support, the main body commander can mitigate the lack of coverage","rect":[107.9685287475586,509.5887756347656,540.0718050079346,500.4805908203125]},{"page":291,"text":"by providing additional ground or aerial assets to supplement the security force’s mission and maintain","rect":[107.9685287475586,521.1117553710938,539.8492336273193,512.0036010742188]},{"page":291,"text":"contact between the security force and main body.","rect":[107.9685287475586,532.634765625,309.0810499191284,523.526611328125]},{"page":291,"text":"13-93. The rest of the flank guard marches along the route of advance and occupies BPs as necessary. The","rect":[107.9685287475586,550.099609375,540.0310945587158,540.991455078125]},{"page":291,"text":"criteria for the route are the same as in a moving flank screen. The unit designates company-sized BPs parallel","rect":[107.9685287475586,561.6226196289063,539.9888682327271,552.5144653320313]},{"page":291,"text":"to the axis of the main body. The flank guard unit places BPs outside the flank guard’s route of advance and","rect":[107.9585189819336,573.0855102539063,539.9266872406006,563.9773559570313]},{"page":291,"text":"along avenues of approach into the flank guard. The flank guard occupies observation posts along a screen","rect":[107.9485092163086,584.6085205078125,539.9628200531006,575.5003662109375]},{"page":291,"text":"line forward of these BPs.","rect":[107.94852447509766,594.1074829101563,212.16054821014405,587.0233764648438]},{"page":291,"text":"13-94. Since the flank guard is moving in one direction and orienting on providing protection to the secured","rect":[107.94852447509766,613.5963745117188,539.9695949554443,604.4882202148438]},{"page":291,"text":"force in another direction, the flank guard unit plans control measures to facilitate this dual orientation. These","rect":[107.9485092163086,625.119384765625,540.0450716094971,616.01123046875]},{"page":291,"text":"control measures are normally associated with the moving screen, as well as PLs that run parallel to the","rect":[107.94852447509766,636.6423950195313,539.9829988555908,627.5342407226563]},{"page":291,"text":"direction of movement of the main body. Units use these PLs to control the delay or defense if enemy forces","rect":[107.94852447509766,648.105224609375,540.0119769554138,638.9970703125]},{"page":291,"text":"attack from the protected flank. (See figure 13-12 on page 13-29 for an attack using a covering force.) The","rect":[107.95853424072266,659.6282348632813,539.9838533477783,650.5200805664063]},{"page":291,"text":"main body commander may also assign the flank guard a new security objective that secures the flank for the","rect":[107.94852447509766,671.1512451171875,540.0689973907471,662.0330200195313]},{"page":291,"text":"main body’s objective during the main body’s actions on the objective.","rect":[107.93849182128906,682.6141357421875,392.08562755584719,673.4959106445313]},{"page":291,"text":"13-95. The flank guard regulates its movement along the route of advance by the pace of the main body,","rect":[107.948486328125,700.1390991210938,539.8886060714722,691.0309448242188]},{"page":291,"text":"the distance to the objective, and the enemy force’s situation. The three methods of movement are successive","rect":[107.948486328125,711.662109375,540.0159578399658,702.5438842773438]},{"page":291,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":291,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":291,"text":"13-23","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":292,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":292,"text":"bounds, alternate bounds, or continuous marching. If the main body stops, the flank guard occupies blocking","rect":[90.0,83.51434326171875,521.9151515960693,74.40616607666016]},{"page":292,"text":"positions. As the speed of the main body changes, the flank guard changes its movement methods, which","rect":[90.0,94.97723388671875,521.9299221038818,85.86905670166016]},{"page":292,"text":"could result in the ability of the guard force’s capability to fight to gain time for the main body. If the main","rect":[90.0,106.500244140625,521.9130764007568,97.3920669555664]},{"page":292,"text":"body continues to increase its rate of march, the guard force will either need to have additional resources","rect":[90.0,118.023193359375,522.0293719749451,108.9150161743164]},{"page":292,"text":"attached to maintain tempo or the main body assumes more risk by screening a portion of the flank. The","rect":[89.9999771118164,129.486083984375,521.9746980743408,120.3779067993164]},{"page":292,"text":"guard commander must not allow the force to fall behind the main body or stay stationary along the route","rect":[89.9999771118164,141.00909423828126,522.0273103790283,131.90090942382813]},{"page":292,"text":"becoming a lucrative target.","rect":[89.9999771118164,152.5321044921875,201.64382457733155,143.42391967773438]},{"page":292,"text":"13-96. If the flank guard becomes overextended, the guard commander informs the main body commander","rect":[89.9999771118164,169.9969482421875,522.0923974571228,160.88876342773438]},{"page":292,"text":"and recommends one of the following COAs:","rect":[89.9999771118164,181.51995849609376,272.18369245147707,172.41177368164063]},{"page":292,"text":" Reinforce the flank guard.","rect":[115.19999694824219,194.99432373046876,238.1835584640503,185.88613891601563]},{"page":292,"text":" Reduce the size of the flank guard’s assigned area.","rect":[115.19999694824219,208.49432373046876,335.6841688156128,199.38613891601563]},{"page":292,"text":" Screen a portion of the area and guard the rest.","rect":[115.19999694824219,221.99432373046876,319.78350353240969,212.88613891601563]},{"page":292,"text":"Rear Guard","rect":[72.0,244.42471313476563,129.05098570251466,236.81556701660157]},{"page":292,"text":"13-97. The rear guard protects the exposed rear of the main body. This occurs during offensive operations","rect":[90.0,264.11431884765627,521.9930560569763,255.00613403320313]},{"page":292,"text":"when the main body breaks contact with flanking forces or during a retrograde. Units may deploy a rear guard","rect":[90.0,275.6373291015625,522.0240383148193,266.5290832519531]},{"page":292,"text":"behind both moving and stationary main bodies. The rear guard for a moving force displaces to successive","rect":[90.0,287.1603088378906,521.9690218048096,278.0521240234375]},{"page":292,"text":"BPs along PLs or delay lines in depth as the main body moves. The nature of enemy contact determines the","rect":[90.0,298.6231994628906,522.0673494415283,289.5150146484375]},{"page":292,"text":"exact movement method or combination of methods used in the displacement (successive bounds, alternate","rect":[90.0,310.12615966796877,522.0339632110596,301.03802490234377]},{"page":292,"text":"bounds, and continuous marching).","rect":[90.0,321.669189453125,230.80309581756593,312.5610046386719]},{"page":292,"text":"13-98. During a retrograde, the rear guard normally deploys its ground maneuver elements abreast, behind","rect":[90.0,339.1340637207031,522.0292263031006,330.02587890625]},{"page":292,"text":"the main body’s forward maneuver units, generally across the entire assigned area. After the main body","rect":[90.0,350.6570739746094,521.9431667327881,341.54888916015627]},{"page":292,"text":"conducts a rearward passage of lines, the rear guard accepts battle handover and then defends or delays.","rect":[89.98998260498047,362.11993408203127,522.0572462081909,353.0117492675781]},{"page":292,"text":"Alternatively, the rear guard may conduct a relief in place as part of a military deception plan or may take","rect":[89.98998260498047,373.6429443359375,521.9970369415283,364.5347595214844]},{"page":292,"text":"advantage of defendable terrain. In both cases, the rear guard establishes passage points and assists the","rect":[89.98999786376953,385.16595458984377,522.0379915313721,376.0577697753906]},{"page":292,"text":"rearward passage of the main body, if necessary. The rear guard accomplishes its defensive mission in the","rect":[89.98998260498047,396.62884521484377,521.9496736602783,387.5206604003906]},{"page":292,"text":"same way as any other guard operation after the main body clears the security area. As the main body moves,","rect":[89.98998260498047,408.1518249511719,522.0621900558472,399.04364013671877]},{"page":292,"text":"the rear guard moves to subsequent PLs in depth. Contact with the enemy force may eventually be lost if it","rect":[89.98998260498047,419.6748046875,521.9507822952271,410.5666198730469]},{"page":292,"text":"does not follow the retrograding friendly force. Fighting a defense or a delay is necessary if an enemy force","rect":[89.98998260498047,431.1376953125,522.1324739532471,422.0295104980469]},{"page":292,"text":"detects the movement and attacks.","rect":[89.98998260498047,440.63665771484377,226.94732189178468,433.5525207519531]},{"page":292,"text":"COVER","rect":[72.0,466.00799560546877,108.06848239898682,457.71600341796877]},{"page":292,"text":"13-99. Cover is a type of security operation done independent of the main body to protect them by fighting","rect":[90.0,485.9342956542969,521.9866847991943,476.82611083984377]},{"page":292,"text":"to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-","rect":[90.0,497.3971862792969,521.9822290000916,488.28900146484377]},{"page":292,"text":"90). The covering force’s distance forward of the main body depends on the main body commander’s","rect":[90.00997924804688,508.920166015625,522.1225116233826,499.8119812011719]},{"page":292,"text":"intentions and instructions, the terrain, the enemy location and strength, and the main body and covering","rect":[90.0,520.4431762695313,522.0273952484131,511.3349914550781]},{"page":292,"text":"force’s rates of march. The frontage assigned to a security force executing a cover is the same frontage as the","rect":[90.0,531.9060668945313,522.0866975860596,522.7979125976563]},{"page":292,"text":"assigned area of the main body. It is here that the covering force executes assigned tasks. The biggest","rect":[90.00000762939453,543.4290771484375,521.9587168655396,534.3209228515625]},{"page":292,"text":"difference between a guard force and a covering force is that a covering force is able to operate independently","rect":[90.0,554.9520263671875,522.0529689788818,545.8438720703125]},{"page":292,"text":"of the main body, while a guard force relies on indirect support from the main body.","rect":[90.0,566.4149169921875,426.8865613937378,557.3067626953125]},{"page":292,"text":"13-100. A covering force, or portions of it, often become decisively engaged with enemy forces. Therefore,","rect":[90.0,583.93994140625,522.0374097824097,574.831787109375]},{"page":292,"text":"the covering force must have substantial combat power to engage the enemy and accomplish its mission. A","rect":[90.0,595.462890625,521.9118084945678,586.354736328125]},{"page":292,"text":"covering force develops the situation earlier than a screen or a guard force. It engages longer and more often","rect":[90.0,606.92578125,522.0308132171631,597.817626953125]},{"page":292,"text":"and defeats larger enemy forces.","rect":[90.01000213623047,618.4487915039063,219.70887279510499,609.3406372070313]},{"page":292,"text":"13-101. While a covering force provides more security than a screen or guard force, it also requires more","rect":[90.01001739501953,635.9136962890625,521.9563264923096,626.8055419921875]},{"page":292,"text":"resources. Before assigning a cover mission, the main body commander determines if the unit has enough","rect":[90.01000213623047,647.4366455078125,521.9509792327881,638.3284912109375]},{"page":292,"text":"combat power to resource a covering force and the main effort. When the commander lacks the resources to","rect":[90.01000213623047,658.9596557617188,522.0925197601318,649.8515014648438]},{"page":292,"text":"support both, the main body commander must assign the security force a less resource intensive security","rect":[90.0100326538086,670.4225463867188,521.9572048187256,661.3143920898438]},{"page":292,"text":"mission, either a screen or a guard.","rect":[90.01000213623047,681.945556640625,229.43126964569093,672.83740234375]},{"page":292,"text":"13-102. A covering force performs all the tasks of screening and guard forces. A covering force for a","rect":[90.01001739501953,699.4705200195313,521.9719514923096,690.3623657226563]},{"page":292,"text":"stationary force performs a defensive mission, while a covering force for a moving force generally conducts","rect":[89.98999786376953,710.933349609375,522.0929095726013,701.8251953125]},{"page":292,"text":"13-24","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":292,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":292,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":293,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":293,"text":"offensive actions. A covering force normally operates forward of the main body in the offense or defense, or","rect":[108.0,83.51434326171875,539.9365136680603,74.40616607666016]},{"page":293,"text":"to the rear for a retrograde operation. Unusual circumstances could dictate a flank covering force, but this is","rect":[108.0,94.97723388671875,539.9827411155701,85.86905670166016]},{"page":293,"text":"normally a screen or guard mission.","rect":[108.0,106.500244140625,251.32810497283936,97.3920669555664]},{"page":293,"text":"Organization of a Covering Force","rect":[90.0,131.12071228027345,248.24926530456544,121.31556701660156]},{"page":293,"text":"13-103. Whether the cover is for a stationary (defending) or moving (attacking) force, the various types of","rect":[108.0,148.61431884765626,539.9844873008728,139.50613403320313]},{"page":293,"text":"cover missions, as well as knowledge of the terrain and enemy forces, dictate the specific task organization","rect":[107.98998260498047,160.1373291015625,539.8975124359131,151.02914428710938]},{"page":293,"text":"of the covering force. The covering force unit normally plans to conduct the cover mission as an area defense.","rect":[107.98998260498047,171.66033935546876,540.0334424972534,162.55215454101563]},{"page":293,"text":"The covering force also normally employs tactics associated with the conduct of a delay, a zone","rect":[107.98998260498047,183.1231689453125,540.0599031524658,174.01498413085938]},{"page":293,"text":"reconnaissance, and a movement to contact.","rect":[107.98998260498047,193.0,283.76983165740969,185.53799438476563]},{"page":293,"text":"13-104. Commanders normally assign subordinate units one of these missions or the mission of screen or","rect":[107.98998260498047,212.17120361328126,539.9621484336853,203.06301879882813]},{"page":293,"text":"guard. The covering force organizes and uses control measures associated with the before-mentioned","rect":[107.98999786376953,223.634033203125,540.0173244476318,214.52584838867188]},{"page":293,"text":"missions. In addition, units establish control measures necessary for conducting the covering force’s passage","rect":[107.98990631103516,235.15704345703126,540.0600252227783,226.04885864257813]},{"page":293,"text":"of lines (forward and rearward).","rect":[107.98999786376953,246.66001892089845,236.00152111053468,237.57186889648438]},{"page":293,"text":"13-105. Corps normally build their covering force around a reinforced armored BCT or a division, although","rect":[107.98998260498047,264.1448974609375,540.0222682952881,255.03671264648438]},{"page":293,"text":"they can deploy any mobile force as their covering force. Both have the control structures necessary for the","rect":[107.98998260498047,275.66790771484377,540.0590486602783,266.5597229003906]},{"page":293,"text":"forces involved and the capability to cover the geographic area typically required in a cover security mission.","rect":[107.98998260498047,287.19091796875,540.0333204269409,278.0827331542969]},{"page":293,"text":"Corps tailor these units to be self-contained by reinforcing them with assets such as joint fires, attack","rect":[107.98998260498047,298.65380859375,539.9519557952881,289.5356140136719]},{"page":293,"text":"helicopters, field artillery, engineers, air defense, tanks, and infantry units with appropriate sustainment","rect":[107.98998260498047,310.1767883300781,540.0804820022584,301.068603515625]},{"page":293,"text":"assets. They usually allocate additional artillery and engineer support to their covering force because it","rect":[107.98998260498047,321.69976806640627,539.9336924514771,312.5915832519531]},{"page":293,"text":"operates beyond support range of their main body. Covering force commanders normally maintain a sizable","rect":[107.98999786376953,333.16265869140627,539.9941682891846,324.0544738769531]},{"page":293,"text":"reserve to conduct counterattacks in the defense and to defeat enemy counterattacks in the offense.","rect":[107.98998260498047,344.6856689453125,502.5906934738159,335.5774841308594]},{"page":293,"text":"13-106. A division covering force is normally a reinforced BCT. It performs reconnaissance or other security","rect":[107.98997497558594,362.1505432128906,540.0122585296631,353.0423583984375]},{"page":293,"text":"missions. If the division assigned area is narrow enough, an adequately reinforced combined arms battalion,","rect":[107.97997283935547,373.67352294921877,539.9631910324097,364.5653381347656]},{"page":293,"text":"reconnaissance squadron, or Stryker battalion may perform a cover mission. At both corps and division","rect":[107.97993469238281,385.196533203125,539.9899806976318,376.0883483886719]},{"page":293,"text":"echelons, the amount of reinforcement provided to the covering force determines the distance and time it can","rect":[107.97993469238281,396.659423828125,539.9736232757568,387.5512390136719]},{"page":293,"text":"operate away from the main body. These reinforcements typically revert to their parent organizations once","rect":[107.9800033569336,408.1824035644531,540.1134920196533,399.07421875]},{"page":293,"text":"the covering mission is complete. BCTs and battalions typically organize a guard force instead of a covering","rect":[107.97997283935547,419.7054138183594,539.9542140960693,410.59722900390627]},{"page":293,"text":"force because their resources are limited.","rect":[107.9800033569336,429.144287109375,271.8149061203003,422.0601501464844]},{"page":293,"text":"13-107. Since one task of the covering force is to deceive the enemy commander into thinking enemy forces","rect":[107.9799575805664,448.68328857421877,540.0364520530701,439.5751037597656]},{"page":293,"text":"have found the main body, commanders should supply the covering force with combat systems that are","rect":[107.96992492675781,460.2062683105469,539.9539461212158,451.09808349609377]},{"page":293,"text":"representative of the main body. For example, if the main body has organic or reinforcing systems (such as","rect":[107.96992492675781,471.6691589355469,539.9066302757263,462.56097412109377]},{"page":293,"text":"the M270 multiple launch rocket system) available to it, they should organize the covering force with the","rect":[107.96992492675781,483.1921691894531,539.9969148712158,474.083984375]},{"page":293,"text":"same systems.","rect":[107.96992492675781,494.7152099609375,165.2512617111206,486.6090393066406]},{"page":293,"text":"Offensive Cover","rect":[90.0,516.9937133789063,166.04638444519044,509.3955383300781]},{"page":293,"text":"13-108. An offensive covering force seizes the initiative early for the main body, allowing the main body to","rect":[108.0,536.7542724609375,540.0223903656006,527.6461181640625]},{"page":293,"text":"attack decisively. Figure 13-12 on page 13-26 shows an attacking main body with an advance covering force","rect":[107.98998260498047,548.2772827148438,540.0574007110596,539.1691284179688]},{"page":293,"text":"and a flank guard.","rect":[107.9999771118164,559.7401733398438,180.22411632537843,550.6320190429688]},{"page":293,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":293,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":293,"text":"13-25","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":294,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":294,"text":"Figure 13-12. Attack using a covering force","rect":[194.6999969482422,427.3141784667969,399.2984151763916,417.9254455566406]},{"page":294,"text":"13-109. Unless the higher echelon orders otherwise, an offensive covering force performs specific tasks","rect":[90.00101470947266,450.77099609375,522.0995013694763,441.6628112792969]},{"page":294,"text":"within its capabilities. If a covering force lacks the time or other resources to complete all these tasks, it must","rect":[89.98097229003906,462.29400634765627,522.0945811233521,453.1858215332031]},{"page":294,"text":"inform the higher headquarters assigning the mission of the shortfall and request guidance on which tasks to","rect":[89.98097229003906,473.8170166015625,522.0671291351318,464.7088317871094]},{"page":294,"text":"complete or the priority of tasks. After starting the mission, if the unit determines that it cannot complete an","rect":[89.98097229003906,485.2798767089844,521.8898220062256,476.17169189453127]},{"page":294,"text":"assigned task, such as destroying or repelling enemy reconnaissance and security forces in the enemy security","rect":[89.98097229003906,496.8028869628906,521.9119777679443,487.6947021484375]},{"page":294,"text":"area, it must report to the higher echelon and await further instructions while the unit continues to execute","rect":[89.98097229003906,508.3258972167969,522.0211458282471,499.21771240234377]},{"page":294,"text":"their assigned mission. Offensive covering force tasks include—","rect":[89.98097229003906,519.7887573242188,348.2765312194824,510.6805725097656]},{"page":294,"text":" Destroy, disrupt, or fix enemy forces and reconnaissance assets in the disruption zone.","rect":[115.19999694824219,533.2742919921875,478.42217540740969,524.1661376953125]},{"page":294,"text":" Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. Must","rect":[115.19999694824219,546.7742919921875,522.0100474319459,537.6661376953125]},{"page":294,"text":"prevent ground observation and direct fire against the main body.","rect":[133.1999969482422,558.2973022460938,394.8424024581909,549.1891479492188]},{"page":294,"text":" Maintain contact with the protected force and other forces operating on its flanks.","rect":[115.19999694824219,571.7943115234375,459.5240430831909,562.6861572265625]},{"page":294,"text":" Gain and maintain contact with enemy forces and report activity in the assigned area.","rect":[115.19999694824219,585.2943115234375,474.22075939178469,576.1861572265625]},{"page":294,"text":" Maintain observation of avenues of approach that affect the protected forces’ mission.","rect":[115.19999694824219,598.7742919921875,477.5172986984253,589.6861572265625]},{"page":294,"text":" Locate and identify enemy forces in the battle zone and conduct handover to follow-on forces.","rect":[115.19999694824219,612.2943115234375,510.5802869796753,603.1861572265625]},{"page":294,"text":" Cause the enemy to commit resources to counter the cover force that would have been used against","rect":[115.19999694824219,625.7943115234375,522.0431895217896,616.6861572265625]},{"page":294,"text":"the main body.","rect":[133.2100067138672,637.2572021484375,192.9462537765503,628.1490478515625]},{"page":294,"text":" Deny the enemy information about the size, strength, composition, and objective of the main body.","rect":[115.19999694824219,650.7542724609375,522.0209302902222,641.6360473632813]},{"page":294,"text":" Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main","rect":[115.19999694824219,664.2542724609375,522.0240993499756,655.1461181640625]},{"page":294,"text":"body forces are committed.","rect":[133.1999969482422,675.7772827148438,242.62038707733155,666.6691284179688]},{"page":294,"text":" Clear or bypass enemy forces in the assigned area in accordance with engagement criteria.","rect":[115.19999694824219,689.2742919921875,494.7396192550659,680.1661376953125]},{"page":294,"text":" Conduct reconnaissance along the main body’s axis of advance.","rect":[115.19999694824219,702.7742919921875,389.0186414718628,693.6661376953125]},{"page":294,"text":" Penetrate the enemy’s disruption zone to locate enemy main defensive positions.","rect":[115.19999694824219,716.2742919921875,456.21978282928469,707.1661376953125]},{"page":294,"text":"13-26","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":294,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":294,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":295,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":295,"text":" Locate gaps or weaknesses in the enemy’s defensive scheme.","rect":[133.1999969482422,83.51434326171875,396.40542125701907,74.40616607666016]},{"page":295,"text":" Defeat or repel enemy forces as directed by the higher commander.","rect":[133.1999969482422,97.01434326171875,420.15191173553469,87.90616607666016]},{"page":295,"text":" Fix enemy forces to allow the main body to maneuver around enemy strengths or through enemy","rect":[133.1999969482422,110.51434326171875,540.0259914398193,101.40616607666016]},{"page":295,"text":"weaknesses.","rect":[151.1999969482422,119.95319366455078,200.38317394256593,112.86905670166016]},{"page":295,"text":"13-110.","rect":[107.9937515258789,137.44810485839845,138.87539196014405,130.5643768310547]},{"page":295,"text":"","rect":[133.1999969482422,150.26547241210938,139.16105696249009,145.57322692871095]},{"page":295,"text":"","rect":[133.1999969482422,163.76547241210938,139.16105696249009,159.07322692871095]},{"page":295,"text":"","rect":[133.1999969482422,177.26547241210938,139.16105696249009,172.57322692871095]},{"page":295,"text":"If the mission turns into a meeting engagement—","rect":[142.552734375,139.4921875,340.6080741882324,130.38400268554688]},{"page":295,"text":"Destroy enemy reconnaissance and lead elements of the main body.","rect":[151.1999969482422,152.99432373046876,422.1939649581909,143.88613891601563]},{"page":295,"text":"Determine the location of enemy assailable flanks.","rect":[151.1999969482422,166.49432373046876,353.62310314178469,157.38613891601563]},{"page":295,"text":"Fix enemy forces to allow the main body to maneuver around enemy ","rect":[151.1999969482422,179.99432373046876,453.01433849334719,170.88613891601563]},{"page":295,"text":"weaknesses.","rect":[151.1999969482422,189.49330139160157,200.38015270233155,182.40914916992188]},{"page":295,"text":"strengths ","rect":[455.18865966796877,179.99432373046876,493.8088331222534,170.88613891601563]},{"page":295,"text":"or ","rect":[495.924072265625,178.0,506.7697706222534,172.0]},{"page":295,"text":"through","rect":[508.94415283203127,179.99432373046876,539.9892482757568,170.88613891601563]},{"page":295,"text":"13-111. Planning for offensive covering force operations is similar to planning for zone reconnaissance or","rect":[107.99375915527344,208.982177734375,539.9969384727478,199.87399291992188]},{"page":295,"text":"movement to contact. Mission analysis using the products of the IPB process helps determine the width of","rect":[107.99375915527344,220.50518798828126,539.9858300743103,211.39700317382813]},{"page":295,"text":"the area to cover and areas (NAIs and TAIs) or routes of special importance. Commanders determine specific","rect":[107.99375915527344,231.9480438232422,540.0219392852783,222.85989379882813]},{"page":295,"text":"missions for subordinate elements and assign boundaries. The covering force retains a reserve that is ready","rect":[107.9937515258789,243.4910888671875,539.8743190765381,234.38290405273438]},{"page":295,"text":"to deploy anywhere in the covering force area. This reserve may be centrally located; the commander","rect":[107.9937515258789,255.0140380859375,539.9460961875916,245.90585327148438]},{"page":295,"text":"typically locates it on the most dangerous or critical avenue of approach in the security area.","rect":[107.9937515258789,266.4769287109375,476.79580211639407,257.3687438964844]},{"page":295,"text":"13-112. The covering force advances on a broad front, normally with its subordinate ground maneuver","rect":[107.9937515258789,284.0019226074219,540.0018823204041,274.89373779296877]},{"page":295,"text":"elements abreast (except for the reserve). This force clears the enemy’s disruption zone of small combat","rect":[107.98373413085938,295.5249328613281,540.0501475296021,286.416748046875]},{"page":295,"text":"elements while penetrating the enemy force’s main defenses. Attack reconnaissance aircraft normally","rect":[107.97372436523438,306.98779296875,539.9300441741943,297.8796081542969]},{"page":295,"text":"reconnoiter forward of advancing ground covering force elements. On enemy contact, the attack","rect":[107.97372436523438,318.51080322265627,539.9473171234131,309.4026184082031]},{"page":295,"text":"reconnaissance aircrews report the enemy force’s location to the appropriate ground unit and maintain","rect":[107.97372436523438,330.0338134765625,539.9960842132568,320.9256286621094]},{"page":295,"text":"contact. Once attack reconnaissance aircraft make contact, the covering force rapidly develops the situation.","rect":[107.97369384765625,341.4966735839844,539.9395704269409,332.38848876953127]},{"page":295,"text":"It reports enemy dispositions immediately to the main body, so that the main body can exploit enemy","rect":[107.97369384765625,353.0196838378906,539.9329738616943,343.9114685058594]},{"page":295,"text":"weaknesses. The covering force fixes encountered enemy forces and destroys them. The covering force does","rect":[107.96369934082031,364.54266357421877,539.9698626976013,355.4344787597656]},{"page":295,"text":"not bypass enemy forces without the guidance of the main body commander.","rect":[107.96369934082031,376.00555419921877,415.62380504608157,366.8973693847656]},{"page":295,"text":"13-113. If the covering force discovers a gap in the enemy force’s defenses, it prepares to exploit the gap","rect":[107.96368408203125,393.5305480957031,539.9610500335693,384.42236328125]},{"page":295,"text":"and disrupt the integrity of that defense. The covering force immediately reports this to the main body, so the","rect":[107.94364166259766,405.05352783203127,539.9777498321533,395.9453430175781]},{"page":295,"text":"main body commander can divert main body follow-on forces to support the penetration. The main body","rect":[107.94364166259766,416.51641845703127,539.8740139007568,407.4082336425781]},{"page":295,"text":"synchronizes the covering force’s penetration with the other arriving maneuver units, functional and","rect":[107.93360137939453,428.0394287109375,540.0272121429443,418.9312438964844]},{"page":295,"text":"multifunctional support units, and sustainment units to prevent counterattacking enemy forces from isolating","rect":[107.93363952636719,439.5624084472656,539.9209499359131,430.4542236328125]},{"page":295,"text":"and destroying the penetrating elements of the covering force.","rect":[107.93360137939453,451.02532958984377,355.88262462615969,441.9171447753906]},{"page":295,"text":"13-114. When the covering force cannot advance, it defends and prepares to assist the forward passage of","rect":[107.93363952636719,468.540283203125,539.8527734336853,459.4320983886719]},{"page":295,"text":"lines of main body units. It continues to perform reconnaissance of enemy positions to locate gaps or","rect":[107.92361450195313,480.0031433105469,539.8211572227478,470.89495849609377]},{"page":295,"text":"assailable flanks. The covering force may guide main body units as they attack through or around the covering","rect":[107.92361450195313,491.5261535644531,539.9551296234131,482.41796875]},{"page":295,"text":"force. If the covering force has accomplished its mission, the main body attacks the enemy’s weak point with","rect":[107.92361450195313,503.0491638183594,539.8947048187256,493.9408874511719]},{"page":295,"text":"previously uncommitted main body forces at the appropriate time.","rect":[107.91360473632813,514.5120849609375,372.6190137863159,505.4039001464844]},{"page":295,"text":"Flank Cover","rect":[90.0,536.853759765625,148.98565446472169,529.2665405273438]},{"page":295,"text":"13-115. When the main body commander perceives a significant threat to a flank, the main body normally","rect":[108.0,556.6143188476563,539.9642238616943,547.5061645507813]},{"page":295,"text":"establishes a flank covering force. That force conducts its mission in much the same way as a flank guard","rect":[107.98998260498047,568.1373291015625,539.8232936859131,559.0291748046875]},{"page":295,"text":"performs its mission. The main differences between the two missions are the scope of operations and the","rect":[107.98998260498047,579.5802001953125,540.0836458282471,570.4920654296875]},{"page":295,"text":"distance the covering force operates away from the main body.","rect":[107.98998260498047,591.1231689453125,359.54217052459719,582.0150146484375]},{"page":295,"text":"13-116. Flank covering forces clear the area between their route of advance and their main body just as flank","rect":[107.98998260498047,608.5880126953125,540.0086574554443,599.4697875976563]},{"page":295,"text":"guards do. They also maintain contact with specified main body elements. These elements are normally part","rect":[107.97996520996094,620.111083984375,539.9855112991334,611.0029296875]},{"page":295,"text":"of the advance guard for the flank unit of the main body.","rect":[107.97996520996094,631.634033203125,334.5823621749878,622.52587890625]},{"page":295,"text":"Defensive Cover","rect":[90.0,654.0337524414063,166.64806901550294,646.435546875]},{"page":295,"text":"13-117. A defensive covering force prevents enemy forces from attacking at the time, place, and combat","rect":[108.0,673.7343139648438,540.0173716506959,664.6261596679688]},{"page":295,"text":"strength of their choosing. Defensive cover gains time for the main body, enabling it to deploy, move, or","rect":[107.99002075195313,685.25732421875,539.9273583946228,676.149169921875]},{"page":295,"text":"prepare defenses in the MBA. It accomplishes this by disrupting the enemy force’s attack, contesting the","rect":[107.99002075195313,696.7802734375,540.0444612579346,687.672119140625]},{"page":295,"text":"enemy’s possession of the initiative, and establishing the conditions for friendly operations. The covering","rect":[107.98998260498047,708.2431640625,539.9995021820068,699.135009765625]},{"page":295,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":295,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":295,"text":"13-27","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":296,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":296,"text":"force makes the enemy force deploy repeatedly to fight through the covering force and commit the enemy","rect":[90.0,83.51434326171875,521.9789333343506,74.40616607666016]},{"page":296,"text":"force’s reserve or follow-on forces to sustain momentum. Figure 13-13 depicts a defensive cover.","rect":[90.0,94.97723388671875,480.1568250656128,85.86905670166016]},{"page":296,"text":"Figure 13-13 Example of a defensive cover","rect":[196.07174682617188,394.01409912109377,397.9096515159607,384.6253662109375]},{"page":296,"text":"13-118. Unless the higher echelon commander orders otherwise, a defensive covering force performs certain","rect":[89.97998809814453,417.4709167480469,521.9561672210693,408.36273193359377]},{"page":296,"text":"tasks within its capabilities. If a unit does not have the time or resources to complete all of these tasks, it must","rect":[89.96990203857422,428.973876953125,522.0524668655396,419.8857421875]},{"page":296,"text":"inform the headquarters assigning the mission of the shortfall and request guidance on which tasks to","rect":[89.96994018554688,440.5169677734375,521.9820461273193,431.4087829589844]},{"page":296,"text":"complete or on the priority of tasks. After starting the mission, if the unit determines it cannot complete an","rect":[89.96994018554688,451.9798583984375,521.8297023773193,442.8716735839844]},{"page":296,"text":"assigned task, such as defeat enemy advance guard formations, it must report to the higher echelon","rect":[89.96994018554688,463.50286865234377,521.9990139007568,454.3946838378906]},{"page":296,"text":"commander and await further instructions while the unit continues its assigned mission. A defensive covering","rect":[89.96994018554688,475.02587890625,522.0310573577881,465.9176940917969]},{"page":296,"text":"force emphasizes these tasks within their capability:","rect":[89.96994018554688,486.48876953125,298.3147349319458,477.3805847167969]},{"page":296,"text":" Detect, report, and destroy all enemy elements attempting to pass through the cover, both ground","rect":[115.19999694824219,499.97430419921877,522.0312404632568,490.8661193847656]},{"page":296,"text":"and aerial, and provide the protected force commander early warning of enemy activities.","rect":[133.1999969482422,511.497314453125,490.7719678878784,502.3891296386719]},{"page":296,"text":" Conduct counterreconnaissance to destroy or defeat all enemy reconnaissance elements. Must","rect":[115.19999694824219,524.9942626953125,522.0281138381959,515.8861083984375]},{"page":296,"text":"prevent ground observation and direct fire against the main body.","rect":[133.1999969482422,536.4571533203125,394.8443555831909,527.3489990234375]},{"page":296,"text":" Maintain contact with the protected force and other forces operating on its flanks.","rect":[115.19999694824219,549.9542846679688,459.5240430831909,540.8461303710938]},{"page":296,"text":" Maintain contact with enemy forces and report activity in the assigned area.","rect":[115.19999694824219,563.4542846679688,436.4252882003784,554.3461303710938]},{"page":296,"text":" Maintain observation of avenues of approach that affect the protected forces mission.","rect":[115.19999694824219,576.9342651367188,474.21197032928469,567.8461303710938]},{"page":296,"text":" Locate and identify the lead elements that indicate the enemy’s main attack, as prescribed in the","rect":[115.19999694824219,590.4542846679688,522.0000276641846,581.3461303710938]},{"page":296,"text":"enemy’s order of battle based upon IPB (when facing an echeloned enemy force).","rect":[133.18994140625,601.977294921875,459.99944591522219,592.869140625]},{"page":296,"text":" While displacing, determine the direction of enemy movement, maintain contact, and report threat","rect":[115.19999694824219,615.4743041992188,522.0480112991334,606.3661499023438]},{"page":296,"text":"activities.","rect":[133.1999969482422,624.9732666015625,171.76496410369874,617.88916015625]},{"page":296,"text":"","rect":[115.19999694824219,637.765380859375,121.16105696249008,633.0731811523438]},{"page":296,"text":"","rect":[115.19999694824219,662.7254028320313,121.16105696249008,658.033203125]},{"page":296,"text":"","rect":[115.19999694824219,676.2254028320313,121.16105696249008,671.533203125]},{"page":296,"text":"","rect":[115.19999694824219,689.7254028320313,121.16105696249008,685.033203125]},{"page":296,"text":"While displacing, impede and harasses the enemy to provide the protected force commander with","rect":[133.1999969482422,640.4942626953125,521.9639186859131,631.3861083984375]},{"page":296,"text":"additional time and maneuver space.","rect":[133.1999969482422,651.9371337890625,279.5832166671753,642.8489990234375]},{"page":296,"text":"Cause the enemy main body to deploy prematurely and then report its direction of travel.","rect":[133.1999969482422,665.4542846679688,488.9841260910034,656.3461303710938]},{"page":296,"text":"Deny the enemy information about the size, strength, composition, and location of the MBA.","rect":[133.1999969482422,678.9542846679688,505.12237071990969,669.8461303710938]},{"page":296,"text":"Determine enemy strengths, weaknesses, and disposition, and exploit opportunities until main","rect":[133.1999969482422,692.4542846679688,522.0157375335693,683.3461303710938]},{"page":296,"text":"body forces are committed.","rect":[133.1999969482422,703.977294921875,242.62038707733155,694.869140625]},{"page":296,"text":"13-28","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":296,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":296,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":297,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":297,"text":"13-119. The defensive covering force may be required to defend, delay, or counterattack. The covering force","rect":[108.0,83.51434326171875,540.0152254180908,74.40616607666016]},{"page":297,"text":"may have to reconnoiter and clear the area before establishing the cover if another unit is not currently","rect":[107.98998260498047,94.97723388671875,540.0033473968506,85.86905670166016]},{"page":297,"text":"occupying the covering force area. As in offensive operations, aerial reconnaissance is necessary to extend","rect":[107.98998260498047,106.500244140625,539.9667263031006,97.3920669555664]},{"page":297,"text":"the covered area. Army aviation units can screen less threatened areas and rapidly reinforce with their fires","rect":[107.98998260498047,118.023193359375,540.0193011741638,108.9150161743164]},{"page":297,"text":"when an enemy force heavily engages other elements of the covering force.","rect":[107.98998260498047,129.486083984375,410.0711622238159,120.3779067993164]},{"page":297,"text":"13-120. Enemy forces may attempt to force the covering force back toward the MBA during the operation.","rect":[107.98998260498047,147.0111083984375,539.9735059738159,137.90292358398438]},{"page":297,"text":"If this happens, the covering force conducts a rearward passage of lines and a battle handover with the main","rect":[107.98998260498047,158.5340576171875,540.0213527679443,149.42587280273438]},{"page":297,"text":"body. Once the covering force completes its battle handover with the main body, they can do one of three","rect":[107.98998260498047,169.9969482421875,540.0200471954346,160.88876342773438]},{"page":297,"text":"things, separately or in combination. They can undergo reconstitution, execute economy of force missions,","rect":[107.98998260498047,181.51995849609376,539.9258985519409,172.41177368164063]},{"page":297,"text":"or become part of the echelon reserve. Alternatively, they may use them to locate and follow the movement","rect":[107.98998260498047,193.04296875,539.9576182327271,183.93478393554688]},{"page":297,"text":"of the enemy’s follow-on forces. They only establish BPs in the MBA as a last resort.","rect":[107.98999786376953,204.505859375,450.3942823410034,195.39767456054688]},{"page":297,"text":"13-121. The conduct of a rearward passage of lines is part of a defensive cover with its associated","rect":[107.97994995117188,222.03082275390626,539.9936428070068,212.92263793945313]},{"page":297,"text":"requirement to transfer responsibility for the battle between units. Units thoroughly plan this complex task","rect":[107.97994995117188,233.49371337890626,539.9641628265381,224.38552856445313]},{"page":297,"text":"as an integral part of the covering force mission. Covering force elements begin their rearward passage of","rect":[107.97994995117188,245.0167236328125,539.9311425743103,235.90853881835938]},{"page":297,"text":"lines either upon meeting disengagement criteria or upon order of the covering force commander. When any","rect":[107.97994995117188,256.5396728515625,539.9670925140381,247.43148803710938]},{"page":297,"text":"element of the covering force begins rearward movement to pass through the MBA, the higher commander","rect":[107.9800033569336,268.0025634765625,539.9521386680603,258.8943786621094]},{"page":297,"text":"must be informed. Passage of lines may not occur simultaneously for all covering force units. As some units","rect":[107.9800033569336,279.52557373046877,539.9802997093201,270.4173889160156]},{"page":297,"text":"begin passage, others may still be taking advantage of offensive opportunities in other parts of the security","rect":[107.9799575805664,291.048583984375,539.9025173187256,281.9403991699219]},{"page":297,"text":"area. The covering force prepares to continue fighting in those portions of the security area where friendly","rect":[107.9800033569336,302.511474609375,539.9241847991943,293.4032897949219]},{"page":297,"text":"subordinate forces are successful to set up offensive opportunities for the main body.","rect":[107.9800033569336,314.03448486328127,447.62200450897219,304.9263000488281]},{"page":297,"text":"13-122. The covering force exercises caution when issuing orders. Commanders at each echelon have a","rect":[107.9799575805664,331.5494384765625,539.9985628204346,322.4412536621094]},{"page":297,"text":"different perspective of the battle. This is never truer than in a covering force action. For example, while the","rect":[107.96994018554688,343.0122985839844,540.0374422149658,333.90411376953127]},{"page":297,"text":"covering force may be told to delay forward of a river line for 72 hours, the covering force commander may","rect":[107.96994018554688,354.5353088378906,540.0002346038818,345.4271240234375]},{"page":297,"text":"tell subordinate task force units to defend in certain BPs, perhaps for a specified period. Once the period","rect":[107.96994018554688,366.0382385253906,539.9196681976318,356.9501037597656]},{"page":297,"text":"expires, the covering force should not automatically retire from the covering force area. It must create enough","rect":[107.96990203857422,377.5212097167969,539.9727077484131,368.41302490234377]},{"page":297,"text":"resistance to force the enemy commander to deploy the enemy’s main forces. Commanders at each echelon","rect":[107.96994018554688,389.044189453125,539.9972438812256,379.9360046386719]},{"page":297,"text":"precisely state the mission to their subordinate units without telling them how to do it. (See ADP 6-0 for","rect":[107.96995544433594,400.56719970703127,539.9922998008728,391.4590148925781]},{"page":297,"text":"doctrine on mission command.) Units, when told to delay, must fight the urge to shoot too little, pull back","rect":[107.95990753173828,412.0301208496094,539.8732814788818,402.92181396484377]},{"page":297,"text":"too early, and move back too far. It is imperative that commanders convey to subordinates precisely what","rect":[107.95990753173828,423.5531005859375,539.9354014358521,414.4449157714844]},{"page":297,"text":"their purpose is in the context of the overall mission.","rect":[107.95991516113281,435.0560607910156,318.5441846847534,425.9679260253906]},{"page":297,"text":"Rear Cover","rect":[90.0,457.3537292480469,144.617810836792,449.76654052734377]},{"page":297,"text":"13-123. A rear cover mission is similar to a rear guard mission. A rear covering force protects the main body","rect":[108.0,477.1142883300781,540.0223293304443,468.006103515625]},{"page":297,"text":"moving away from the enemy. The covering force deploys behind the forward maneuver units of the main","rect":[107.98999786376953,488.6372985839844,539.9160060882568,479.52911376953127]},{"page":297,"text":"body, conducts battle handover and passage of lines, and then defends or delays. Alternatively, the covering","rect":[107.98999786376953,500.1002197265625,539.9675197601318,490.9919738769531]},{"page":297,"text":"force may conduct a relief in place as part of a deception plan or to take advantage of the best defensive","rect":[107.98999786376953,511.6231689453125,539.9753694610596,502.5149841308594]},{"page":297,"text":"terrain.","rect":[107.9899673461914,521.1221313476563,136.65517711639405,514.0380249023438]},{"page":297,"text":"13-124. The covering force establishes passage points and assists the rearward passage of the main body.","rect":[107.9899673461914,540.6110229492188,539.9622755050659,531.5028686523438]},{"page":297,"text":"Following the passage of the main body, the mission is conducted the same as any other defensive cover","rect":[107.98994445800781,552.134033203125,540.0153100547791,543.02587890625]},{"page":297,"text":"operation. As the main body moves, the covering force displaces to subsequent phase lines in depth. If the","rect":[107.98994445800781,563.6570434570313,540.0110139923096,554.5488891601563]},{"page":297,"text":"enemy does not follow the withdrawing forces, contact may eventually be lost. Fighting a defense or delay","rect":[107.98994445800781,575.119873046875,539.8547267913818,566.01171875]},{"page":297,"text":"is necessary if the enemy detects the movement and attacks.","rect":[107.98994445800781,586.6429443359375,347.91277599334719,577.5347900390625]},{"page":297,"text":"AREA SECURITY","rect":[90.0,610.0199584960938,171.548020362854,601.7159423828125]},{"page":297,"text":"13-125. Area security is a type of security operation conducted to protect friendly forces, lines of","rect":[108.0,629.874267578125,539.9774072227478,620.76611328125]},{"page":297,"text":"communications, and activities within a specific area. Area security operations occur during all types of","rect":[107.98997497558594,641.3972778320313,539.9141748008728,632.2891235351563]},{"page":297,"text":"operations. The synchronization and integration of area and local security are essential to protecting the force.","rect":[107.98999786376953,652.9202880859375,540.0107374191284,643.8121337890625]},{"page":297,"text":"Area security operations support a higher echelon’s overall operation and require them to take advantage of","rect":[107.98997497558594,664.3831787109375,540.0076806602478,655.2750244140625]},{"page":297,"text":"local security measures performed by all units in the area, regardless of their command and control","rect":[107.98997497558594,675.9061889648438,540.0141978225709,666.7980346679688]},{"page":297,"text":"relationships. Although vital to the success of military operations, area security is normally an economy-of-","rect":[107.98998260498047,687.42919921875,540.0825097618103,678.321044921875]},{"page":297,"text":"force mission, often designed to ensure the continued conduct of sustainment operations that generate and","rect":[107.98998260498047,698.89208984375,539.9482326507568,689.783935546875]},{"page":297,"text":"maintain combat power.","rect":[107.98998260498047,710.39501953125,204.93450450897218,701.306884765625]},{"page":297,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":297,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":297,"text":"13-29","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":298,"text":"Chapter 13","rect":[72.0,46.224021911621097,118.45439367675782,37.90802001953125]},{"page":298,"text":"13-126. Units executing area security focus on the protected force, installation, route, or area. Protected","rect":[90.0,83.51434326171875,521.9754543304443,74.40616607666016]},{"page":298,"text":"forces range from echelon headquarters, artillery, and echelon reserves to the sustaining base. Protected","rect":[89.98998260498047,94.97723388671875,521.9195461273193,85.86905670166016]},{"page":298,"text":"installations can also be part of the sustaining base, or they can constitute part of the area’s infrastructure.","rect":[89.98998260498047,106.500244140625,521.9880933761597,97.3920669555664]},{"page":298,"text":"Areas to secure range from specific points (bridges and defiles) to terrain features (ridgelines and hills), to","rect":[89.98998260498047,118.023193359375,521.8985500335693,108.9150161743164]},{"page":298,"text":"large civilian population centers and their adjacent areas. Population-centric area security missions are","rect":[89.98998260498047,129.486083984375,521.9872713165283,120.36788940429688]},{"page":298,"text":"conducted at any time but are almost a fixture during irregular warfare. These population-centric area security","rect":[89.97993469238281,141.00909423828126,521.9461574554443,131.90090942382813]},{"page":298,"text":"missions typically combine aspects of the area defensive and offensive operations to eliminate the effect of","rect":[89.96987915039063,152.5321044921875,521.9842431602478,143.42391967773438]},{"page":298,"text":"internal defense threats.","rect":[89.96987915039063,161.97096252441407,185.2891492843628,154.88681030273438]},{"page":298,"text":"13-127. Typically, units assigned an area security mission operate in a division or higher echelon’s rear area","rect":[89.96987915039063,181.50994873046876,522.0433626251221,172.40176391601563]},{"page":298,"text":"and facilitate the positioning, employment, and protection of resources required to sustain, enable, and control","rect":[89.97991180419922,193.032958984375,522.0112681350709,183.92477416992188]},{"page":298,"text":"forces. Area security in the rear area preserves the commander’s freedom to move reserves, position fire","rect":[89.97989654541016,204.495849609375,522.0343904571533,195.38766479492188]},{"page":298,"text":"support capabilities, provide command and control, and conduct sustaining operations.","rect":[89.97991180419922,216.018798828125,436.6429090499878,206.91061401367188]},{"page":298,"text":"13-128. Forces engaged in area security are typically organized in a manner that emphasizes their mobility,","rect":[89.97991180419922,233.483642578125,522.0844678878784,224.37545776367188]},{"page":298,"text":"lethality, and communications capabilities. The task organization of the unit assigned the area security","rect":[89.97993469238281,245.0067138671875,521.9350490570068,235.89852905273438]},{"page":298,"text":"mission should correspond with the level of threat. For example, if the threat is a Level II threat, a military","rect":[89.9800033569336,256.5296630859375,522.0013332366943,247.42147827148438]},{"page":298,"text":"police company should be sufficient. If the threat is a Level III threat, a combined arms team from a brigade","rect":[89.97993469238281,267.9925537109375,522.0481844024658,258.8843688964844]},{"page":298,"text":"combat team is a more appropriate unit. Friendly forces conducting area security initially provide early","rect":[89.97993469238281,279.51556396484377,521.9759426116943,270.4073791503906]},{"page":298,"text":"warning against an unexpected enemy or adversary attack and then, within capabilities, defeat those attacks.","rect":[89.97993469238281,291.03857421875,522.0145215988159,281.9303894042969]},{"page":298,"text":"Early warning may come from ground, aerial, or space-based sensors. Area security may provide","rect":[89.97993469238281,302.5014343261719,522.0503816680908,293.39324951171877]},{"page":298,"text":"reconnaissance on NAIs to answer commander’s critical information requirements, aiding in tactical decision","rect":[89.97993469238281,314.0244140625,522.0283107757568,304.9162292480469]},{"page":298,"text":"making and confirming or denying threat intentions.","rect":[89.98990631103516,325.54742431640627,299.1334180831909,316.4392395019531]},{"page":298,"text":"13-129. All commanders apportion combat power and dedicate assets based on an analysis of the operational","rect":[89.98990631103516,343.0122985839844,522.0082774124146,333.90411376953127]},{"page":298,"text":"environment, the likelihood of threat action, the relative value of friendly resources, and risk to civilian","rect":[89.97993469238281,354.5352783203125,521.8467922210693,345.4270935058594]},{"page":298,"text":"populations. Although all friendly resources have value, the mission variables of METT-TC (I) make some","rect":[89.97993469238281,366.05828857421877,522.0333528594971,356.9501037597656]},{"page":298,"text":"resources, assets, or key terrain more essential to successful mission accomplishment from enemy or","rect":[89.96991729736328,377.5211486816406,521.8683373985291,368.4129638671875]},{"page":298,"text":"adversary and friendly perspectives. Commanders create and use a decision support matrix and template to","rect":[89.96991729736328,389.0441589355469,521.9066066741943,379.93597412109377]},{"page":298,"text":"facilitate ","rect":[89.96990203857422,399.0,127.39163494110108,391.45904541015627]},{"page":298,"text":"decision ","rect":[132.5068359375,399.0,168.37145519256593,391.45904541015627]},{"page":298,"text":"making, ","rect":[173.48666381835938,400.5672302246094,208.45147228240968,391.45904541015627]},{"page":298,"text":"issue ","rect":[213.56668090820313,399.0,236.05156993865968,391.45904541015627]},{"page":298,"text":"guidance, ","rect":[241.10665893554688,400.5672302246094,282.19158458709719,391.45904541015627]},{"page":298,"text":"and ","rect":[287.3067932128906,399.0,304.2115125656128,391.45904541015627]},{"page":298,"text":"allocate ","rect":[309.3257141113281,399.0,342.85158824920657,391.45904541015627]},{"page":298,"text":"resources. ","rect":[347.9657897949219,399.0,390.7310743331909,393.0]},{"page":298,"text":"Criticality, ","rect":[395.8462829589844,400.5672302246094,441.3111219406128,391.45904541015627]},{"page":298,"text":"vulnerability, ","rect":[446.42633056640627,400.5672302246094,502.51055431365969,391.45904541015627]},{"page":298,"text":"and","rect":[507.6257629394531,399.0,521.9954738616943,391.45904541015627]},{"page":298,"text":"recoverability are some of the most significant considerations in determining protection priorities that","rect":[89.96994018554688,412.0301208496094,521.9372935256959,402.92193603515627]},{"page":298,"text":"become the focus of area security.","rect":[89.96994018554688,423.5531311035156,226.6266736984253,414.4449462890625]},{"page":298,"text":"13-130. A unit restrains its use of force when conducting area security operations when civilians are present.","rect":[89.96994018554688,441.078125,522.0191602706909,431.9699401855469]},{"page":298,"text":"However, commanders remain responsible for protecting the force, and they consider this responsibility when","rect":[89.95991516113281,452.541015625,522.0165920257568,443.4328308105469]},{"page":298,"text":"establishing rules of engagement. They explain restrictions on conducting operations to ensure everyone","rect":[89.95991516113281,464.06402587890627,522.0050325469971,454.9558410644531]},{"page":298,"text":"understands those restrictions. Soldiers must understand that their actions may have far-reaching positive or","rect":[89.95991516113281,475.52691650390627,522.0493066368103,466.4187316894531]},{"page":298,"text":"negative effects. Commanders communicatethat media and adversaries can quickly exploitSoldiers’ actions,","rect":[89.9498519897461,487.0499267578125,521.9351148605347,477.9417419433594]},{"page":298,"text":"especially the way they treat civilians.","rect":[89.9498519897461,498.57293701171877,242.6947889328003,489.4647521972656]},{"page":298,"text":"13-131. Sometimes area security forces must retain readiness over long periods without contact with enemy","rect":[89.9498519897461,516.037841796875,521.9740505218506,506.9296569824219]},{"page":298,"text":"forces. This occurs most often when the enemy special purpose forces or insurgents are overmatched. In this","rect":[89.93983459472656,527.560791015625,521.9992206077576,518.45263671875]},{"page":298,"text":"case, the enemy normally tries to avoid engaging friendly forces unless it is on terms favorable to the enemy.","rect":[89.93983459472656,539.0838623046875,521.9882764816284,529.9757080078125]},{"page":298,"text":"Forces conducting area security should not develop a sense of complacency, even if the enemy force appears","rect":[89.93983459472656,550.5467529296875,521.9489886741638,541.4385986328125]},{"page":298,"text":"to have ceased operations in the secured area. Additionally, friendly forces should be mindful of mines and","rect":[89.93983459472656,562.0697021484375,521.9461574554443,552.9613647460938]},{"page":298,"text":"booby traps in these situations. Successful units assume that the enemy force regularly observes friendly","rect":[89.93990325927735,573.592529296875,521.9298610687256,564.484375]},{"page":298,"text":"operations to identify routines, weak points, and lax security for the opportunity to strike with minimum risk.","rect":[89.93988037109375,585.055419921875,521.9921827316284,575.947265625]},{"page":298,"text":"This requires leaders to maintain vigilance and discipline in their Soldiers to prevent that opportunity from","rect":[89.93988037109375,596.5784912109375,521.9772620162964,587.4703369140625]},{"page":298,"text":"developing.","rect":[89.94989013671875,608.1015014648438,136.9146375656128,598.9933471679688]},{"page":298,"text":"13-132.","rect":[89.94989013671875,623.5222778320313,120.83153057098389,616.6385498046875]},{"page":298,"text":"","rect":[115.19999694824219,636.2054443359375,121.16105696249008,631.5132446289063]},{"page":298,"text":"Area security focuses on the following activities:","rect":[124.49885559082031,625.5663452148438,320.48398542022707,616.4581909179688]},{"page":298,"text":"Site security. Area security forces provide protection through area security techniques that involve","rect":[133.1999969482422,638.934326171875,522.0812044219971,629.826171875]},{"page":298,"text":"the employment of protection and security assets in a layered, integrated, redundant manner. A","rect":[133.1999969482422,650.457275390625,521.9408612289428,641.34912109375]},{"page":298,"text":"unit conducting site security may protect locations such as—","rect":[133.1999969482422,661.9802856445313,376.5056571960449,652.8721313476563]},{"page":298,"text":" Base/base camp defense. Base defense consists of the local military measures, both normal","rect":[133.1999969482422,676.0142822265625,522.0061411819459,666.9061279296875]},{"page":298,"text":"and emergency, required to nullify or reduce the effectiveness of enemy attacks on, or","rect":[151.20001220703126,687.4771728515625,522.0272119102478,678.3690185546875]},{"page":298,"text":"sabotage of, a base, to ensure that the maximum capacity of its facilities is available to United","rect":[151.20001220703126,699.0001831054688,521.9069118499756,689.8920288085938]},{"page":298,"text":"States forces (JP 3-10).","rect":[151.1999969482422,710.503173828125,243.9992322921753,701.4150390625]},{"page":298,"text":"13-30","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":298,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":298,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":299,"text":"","rect":[133.1999969482422,237.92544555664063,139.16105696249009,233.2332000732422]},{"page":299,"text":"","rect":[133.1999969482422,320.4254455566406,139.16105696249009,315.7331848144531]},{"page":299,"text":"","rect":[133.1999969482422,437.3654479980469,139.16105696249009,432.6731872558594]},{"page":299,"text":"","rect":[133.1999969482422,631.04541015625,139.16105696249009,626.3532104492188]},{"page":299,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":299,"text":"Security Operations","rect":[454.44000244140627,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":299,"text":" Assembly area security. Protection is critical for forces that are arrayed in tactical assembly","rect":[151.1999969482422,84.0543212890625,539.9573268890381,74.9461441040039]},{"page":299,"text":"areas and do not possess comprehensive, organic protection capabilities or are focused on","rect":[169.1999969482422,95.57733154296875,539.9991359710693,86.46915435791016]},{"page":299,"text":"other mission objectives.","rect":[169.1999969482422,107.04022216796875,268.9040174484253,97.92202758789063]},{"page":299,"text":"","rect":[151.1999969482422,116.53732299804688,156.22883673858645,113.28724670410156]},{"page":299,"text":"Critical asset security. Critical asset security is the protection and security of personnel and","rect":[169.1999969482422,121.07427978515625,539.9597072601318,111.96610260009766]},{"page":299,"text":"physical assets or information that is analyzed and deemed essential to the operation and","rect":[169.20999145507813,132.5972900390625,539.9933986663818,123.4891128540039]},{"page":299,"text":"success of the mission and to resources required for protection (ADP 3-37). For example,","rect":[169.21002197265626,144.1002655029297,540.0491895675659,135.01211547851563]},{"page":299,"text":"command posts and operations centers are often protected through area security techniques","rect":[169.2100067138672,155.5831298828125,539.9148700218201,146.47494506835938]},{"page":299,"text":"that involve the employment of protection and security assets in a layered, integrated, and","rect":[169.2100067138672,167.10614013671876,540.0031032562256,157.99795532226563]},{"page":299,"text":"redundant manner. This can often keep hostile threats at a distance by maximizing the standoff ","rect":[169.2100067138672,178.629150390625,542.5292921066284,169.52096557617188]},{"page":299,"text":"distance from explosive effects, while keeping the protected asset outside the range of enemy","rect":[169.2100067138672,190.092041015625,540.0441799163818,180.98385620117188]},{"page":299,"text":"or adversary direct-fire weapons and observation.","rect":[169.2100067138672,201.61505126953126,367.49480724334719,192.50686645507813]},{"page":299,"text":" Port area and pier security. Ground forces may provide area security for air and seaports along","rect":[151.1999969482422,215.63427734375,539.9653224945068,206.52609252929688]},{"page":299,"text":"with pier areas. (See JP 3-10 for additional information on dedicated port security units.)","rect":[169.1999969482422,227.15728759765626,523.8879296836853,218.04910278320313]},{"page":299,"text":"Line of communication and route security. The security and protection of lines of communications","rect":[151.1999969482422,240.654296875,540.0291278343201,231.54611206054688]},{"page":299,"text":"and supply routes are critical to military operations because most support traffic moves along these","rect":[151.1999969482422,252.1171875,540.0201692657471,243.00900268554688]},{"page":299,"text":"routes. The security of lines of communications and supply routes (rail, pipeline, highway, and","rect":[151.1999969482422,263.64019775390627,540.0029811859131,254.53201293945313]},{"page":299,"text":"waterway) presents one of the greatest security challenges in an AO. Line of communication and","rect":[151.1999969482422,275.1632080078125,540.0279445648193,266.0550231933594]},{"page":299,"text":"route security operations are defensive in nature and are terrain oriented. A route security force","rect":[151.1999969482422,286.6260681152344,540.0481844024658,277.51788330078127]},{"page":299,"text":"prevents an enemy or adversary force from impeding, harassing, or destroying traffic along a route","rect":[151.1999969482422,298.1490478515625,540.0450716094971,289.0408630371094]},{"page":299,"text":"or portions of a route.","rect":[151.1999969482422,309.6520080566406,238.18358898162843,300.5638732910156]},{"page":299,"text":"Convoy security. A convoy security operation is a specialized type of line of communication or","rect":[151.1999969482422,323.154296875,540.0049340782166,314.0461120605469]},{"page":299,"text":"route security operations. Units conduct convoy security operations when there are insufficient","rect":[151.1999969482422,334.6171875,540.0571055374146,325.5090026855469]},{"page":299,"text":"friendly forces to continuously secure routes in an AO and there is a significant danger of enemy","rect":[151.1999969482422,346.1401672363281,540.0240383148193,337.031982421875]},{"page":299,"text":"or adversary ground action directed against the convoy. Commanders may also conduct convoy","rect":[151.1999969482422,357.6632080078125,539.9582424163818,348.55499267578127]},{"page":299,"text":"security operations in conjunction with route security operations. Planning includes designating","rect":[151.1999969482422,369.1260681152344,539.9998683929443,360.00787353515627]},{"page":299,"text":"units for convoy security; providing guidance on techniques for units to provide for their own","rect":[151.1999969482422,380.6490478515625,539.9954738616943,371.5408630371094]},{"page":299,"text":"security during convoys; or establishing protection and security requirements for convoys carrying","rect":[151.1999969482422,392.17205810546877,540.0540676116943,383.0638732910156]},{"page":299,"text":"critical assets. Local or theater policy typically dictates when and which convoys receive security","rect":[151.1999969482422,403.63494873046877,540.0274562835693,394.5267639160156]},{"page":299,"text":"and protection. (See ATP 4-01.45/MCRP 3-40F.7/NTTP 4-01.6/AFTTP 3-2.58 for more","rect":[151.1999969482422,415.13787841796877,540.0611848907471,406.04974365234377]},{"page":299,"text":"information on convoy security training.)","rect":[151.18994140625,426.6208190917969,316.4437463340759,417.51263427734377]},{"page":299,"text":"Response force operations. Response forces take measures to prevent enemy attacks. Response","rect":[151.1999969482422,440.09429931640627,540.0106477813721,430.9861145019531]},{"page":299,"text":"force operations expediently reinforce unit organic protection capabilities or complement that","rect":[151.1999969482422,451.6173095703125,540.0220713577271,442.5091247558594]},{"page":299,"text":"protection with maneuver capabilities based on the threat. (See FM 3-39 for more information on","rect":[151.1999969482422,463.1202392578125,540.0028591156006,454.0321044921875]},{"page":299,"text":"quick response force operations.)","rect":[151.19000244140626,474.5831604003906,283.9449670372009,465.4949951171875]},{"page":299,"text":" Mobile security force. A mobile security force is a highly mobile and dedicated security force","rect":[151.1999969482422,488.6343078613281,540.0843782501221,479.526123046875]},{"page":299,"text":"with the capability to defeat Level I and II threats in a joint security area (JP 3-10). Typically,","rect":[169.1999969482422,500.1573181152344,540.0372266769409,491.03912353515627]},{"page":299,"text":"a mobile security force is a military police unit.","rect":[169.18995666503907,511.6802978515625,358.83449840545657,502.5721130371094]},{"page":299,"text":" Tactical combat force. A tactical combat force is a rapidly deployable, air-ground, mobile","rect":[151.1999969482422,525.7142944335938,539.9941682891846,516.6061401367188]},{"page":299,"text":"combat unit with appropriate combat support and combat service support assets assigned to,","rect":[169.20001220703126,537.2373046875,540.0090284347534,528.129150390625]},{"page":299,"text":"and capable of defeating Level III threats, including combined arms (JP 3-10). Typically, a","rect":[169.20001220703126,548.7001953125,540.0462312774658,539.592041015625]},{"page":299,"text":"tactical combat force is either a combined arms battalion, Stryker infantry battalion, or a","rect":[169.1899871826172,560.22314453125,539.9850130157471,551.114990234375]},{"page":299,"text":"cavalry squadron.","rect":[169.1899871826172,571.7461547851563,240.27385997772218,562.6380004882813]},{"page":299,"text":" Quick response force. Quick response forces are a dedicated force on a base with adequate","rect":[151.1999969482422,585.7742919921875,539.9767122344971,576.6661376953125]},{"page":299,"text":"tactical mobility and fire support designated to defeat Level I and Level II threats and shape","rect":[169.1999969482422,597.2973022460938,540.0240144805908,588.1891479492188]},{"page":299,"text":"Level III threats until they can be defeated by a tactical combat force or other available","rect":[169.1999969482422,608.7601928710938,539.9052400665283,599.6520385742188]},{"page":299,"text":"response forces (ATP 3-37.10/MCRP 3-4D.13).","rect":[169.1999969482422,620.26318359375,361.1731824874878,611.175048828125]},{"page":299,"text":"Area damage control. Area damage control consists of measures taken before, during, and/or after","rect":[151.1999969482422,633.7742919921875,539.9881494102478,624.6661376953125]},{"page":299,"text":"hostile actions or natural or man-made disasters to reduce the probability of damage and minimize","rect":[151.1999969482422,645.2371826171875,540.0282259063721,636.1290283203125]},{"page":299,"text":"its effects (JP 3-10). Units assigned this activity immediately begin hardening critical assets and","rect":[151.20001220703126,656.7601928710938,540.0548000335693,647.6520385742188]},{"page":299,"text":"take action to prevent damage before hostile actions. During and after hostile action, when the","rect":[151.1999969482422,668.283203125,540.0651521759033,659.175048828125]},{"page":299,"text":"damage and scope of the attack is limited, units respond and recover with local assets and","rect":[151.1999969482422,679.7460327148438,539.9471950531006,670.6378784179688]},{"page":299,"text":"resources. This recovery involves resuming operations, maintaining or restoring order, evacuating","rect":[151.1999969482422,691.26904296875,540.0410060882568,682.160888671875]},{"page":299,"text":"casualties, isolating danger or hazard areas, and mitigating personnel and material losses. (See JP","rect":[151.1999969482422,702.7920532226563,540.0442037506103,693.6838989257813]},{"page":299,"text":"3-10 for more information on area damage control.)","rect":[151.1899871826172,714.2549438476563,358.40361571884156,705.1467895507813]},{"page":299,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":299,"text":"13-31","rect":[498.9540100097656,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":300,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":301,"text":"Chapter 14","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":301,"text":"Troop Movement","rect":[250.55999755859376,153.91989135742188,379.4873701133728,139.3096466064453]},{"page":301,"text":"This chapter ","rect":[126.0,188.75872802734376,188.2192735671997,178.79986572265626]},{"page":301,"text":"discusses the general ","rect":[192.97361755371095,188.7806854248047,297.4998826980591,178.79986572265626]},{"page":301,"text":"considerations ","rect":[302.3157043457031,187.0,368.61520862579348,178.79986572265626]},{"page":301,"text":"of ","rect":[373.36956787109377,187.0,385.2949571609497,178.8108367919922]},{"page":301,"text":"troop ","rect":[390.0492858886719,188.75872802734376,416.0741319656372,179.89785766601563]},{"page":301,"text":"movement.","rect":[420.8284606933594,187.0,469.9628953933716,179.89785766601563]},{"page":301,"text":"Those","rect":[477.1842956542969,186.56272888183595,504.0841957244873,178.79986572265626]},{"page":301,"text":"considerations include types of troop movements, methods of troop movements, how","rect":[126.0,201.4405975341797,504.09854965972905,191.45977783203126]},{"page":301,"text":"to organize, march techniques, and graphic control measures. This chapter also","rect":[126.00000762939453,214.10057067871095,503.98316383361819,204.1197509765625]},{"page":301,"text":"discusses the planning, preparation, and execution of troop movements.","rect":[126.0,226.76048278808595,440.97125720977786,216.7796630859375]},{"page":301,"text":"GENERAL CONSIDERATIONS OF TROOP MOVEMENT","rect":[90.0,252.08970642089845,455.52522121810918,242.4015655517578]},{"page":301,"text":"14-1. The ability of units to posture friendly forces in the right starting location to conduct operations","rect":[108.0,272.394287109375,540.1074969749451,263.2861022949219]},{"page":301,"text":"depends on their ability to move forces. The essence of battlefield agility is the capability to conduct rapid","rect":[107.9999771118164,283.857177734375,539.9209499359131,274.7489929199219]},{"page":301,"text":"and orderly movement to concentrate combat power at decisive points and times. Units can expect the enemy","rect":[107.9999771118164,295.3801574707031,540.0603542327881,286.27197265625]},{"page":301,"text":"to attempt to deny freedom of movement throughout their assigned area. Successful movement places troops","rect":[107.9999771118164,306.9031677246094,540.0532977561951,297.79498291015627]},{"page":301,"text":"and equipment at their destination at the proper time, ready for combat. Units can expedite dismounted and","rect":[107.9999771118164,318.3660583496094,540.0350246429443,309.25787353515627]},{"page":301,"text":"mounted movements by the conduct of forced marches when necessary.","rect":[107.9999771118164,329.8890380859375,395.68731212615969,320.7808532714844]},{"page":301,"text":"TYPES OF TROOP MOVEMENT","rect":[90.0,353.2422180175781,238.47055959701539,345.156005859375]},{"page":301,"text":"14-2. Troop movementis the movement of Soldiers and units from one place to another by any available","rect":[108.0,373.1943054199219,540.1134309844971,364.2464599609375]},{"page":301,"text":"means. Units perform troop movements using different methods such as dismounted and mounted","rect":[108.01002502441406,384.6571960449219,540.0106105804443,375.54901123046877]},{"page":301,"text":"movements using tactical vehicles and motor transport for air, rail, and water means in various combinations.","rect":[108.0199966430664,396.18017578125,540.0562696456909,387.0719909667969]},{"page":301,"text":"The method employed depends on the situation, the size and composition of the moving unit, the distance","rect":[108.01001739501953,407.70318603515627,540.0389680938721,398.5950012207031]},{"page":301,"text":"the unit must cover, the urgency of execution, and the condition of the troops. It also depends on the","rect":[108.01001739501953,419.16607666015627,540.0621614532471,410.0578918457031]},{"page":301,"text":"availability, suitability, and capacity of the different means of transportation. Troop movements over","rect":[108.01001739501953,430.6890563964844,540.0976464805603,421.58087158203127]},{"page":301,"text":"extended distances have extensive sustainment considerations. The two types of troop movement are","rect":[108.01000213623047,442.2120666503906,540.0190095977783,433.1038818359375]},{"page":301,"text":"nontactical and tactical movement.","rect":[108.01000213623047,451.65087890625,247.42522716522218,444.5667419433594]},{"page":301,"text":"Nontactical Movement","rect":[90.0,476.07373046875,196.55981274795534,468.4755859375]},{"page":301,"text":"14-3. Nontactical movement is a movement in which troops and vehicles are arranged to expedite their","rect":[108.0,495.8343200683594,540.0223665313721,486.886474609375]},{"page":301,"text":"movement and conserve time and energy when no enemy ground interference is anticipated. Units only","rect":[108.01000213623047,507.2972106933594,539.9792385101318,498.18902587890627]},{"page":301,"text":"conduct nontactical movements in secure areas. Examples of nontactical movements include rail and highway","rect":[108.01001739501953,518.8201904296875,540.0394191741943,509.7120056152344]},{"page":301,"text":"movement in the continental United States. Once units deploy into a theater of operations, they do not","rect":[108.01001739501953,530.3432006835938,540.0721201858521,521.2350463867188]},{"page":301,"text":"normally conduct nontactical movements.","rect":[108.01001739501953,541.8060913085938,275.71975231170657,532.6979370117188]},{"page":301,"text":"Tactical Movement","rect":[90.0,564.2027587890625,180.67175122451784,556.6155395507813]},{"page":301,"text":"14-4. A tactical movement is a movement in which troops and vehicles are arranged to protect combat","rect":[108.0,583.9743041992188,540.0253198204041,575.0264282226563]},{"page":301,"text":"forces during movement when a threat of enemy interference is possible. Units maintain security against","rect":[107.98994445800781,595.4371337890625,539.9672007522584,586.3289794921875]},{"page":301,"text":"enemy attacks from both the air and ground and prepare to take immediate action against enemy ambushes,","rect":[107.98994445800781,606.960205078125,539.9592847824097,597.85205078125]},{"page":301,"text":"although they do not expect contact with significant enemy ground forces. During movement, the moving","rect":[107.98994445800781,618.483154296875,539.9321193695068,609.375]},{"page":301,"text":"force employs security measures, even when contact with enemy ground forces is not expected. During a","rect":[107.97991180419922,629.946044921875,539.9865388946533,620.837890625]},{"page":301,"text":"tactical movement, units are always prepared to take immediate action. There are three methods of a tactical","rect":[107.97991180419922,641.4690551757813,540.0142588577271,632.3609008789063]},{"page":301,"text":"movements that units of all types can conduct: approach march, forced march, and tactical road march.","rect":[107.98994445800781,652.9920654296875,539.9722852706909,643.8839111328125]},{"page":301,"text":"Figure 14-1 on page 14-2 depicts a tactical movement.","rect":[107.97997283935547,664.4549560546875,326.0703077316284,655.3468017578125]},{"page":301,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":301,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":301,"text":"14-1","rect":[504.00299072265627,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":302,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":302,"text":"Figure 14-1. Tactical movement","rect":[222.47999572753907,311.8141784667969,371.49846435165406,302.515625]},{"page":302,"text":"Approach March","rect":[71.9996337890625,341.2529296875,142.85505580139162,332.33514404296877]},{"page":302,"text":"14-5. An approach march is the advance of a combat unit when direct contact with the enemy is","rect":[90.00556945800781,358.7979736328125,522.0339496116638,349.8501281738281]},{"page":302,"text":"intended. Units employ an approach march when they know the approximate location of enemy forces.","rect":[90.00556945800781,370.3209533691406,521.9587354660034,361.2127685546875]},{"page":302,"text":"Commanders task-organize units conducting an approach march before the march begins to allow them to","rect":[90.00556945800781,381.7838439941406,522.0029201507568,372.6756591796875]},{"page":302,"text":"transition to an on-order or be-prepared mission without making major organizational adjustments. For","rect":[90.00556945800781,393.30682373046877,521.9799096641541,384.1886291503906]},{"page":302,"text":"example, commanders direct artillery units to march in their supported unit’s columns, while engineer units","rect":[90.00556945800781,404.829833984375,522.0016620140076,395.7216491699219]},{"page":302,"text":"are well forward to facilitate mobility. The approach march terminates in a march objective—such as an","rect":[90.00558471679688,416.292724609375,521.9741115570068,407.1745300292969]},{"page":302,"text":"attack position, assembly area, assault position—or it can be used to transition to an attack. Reserve and","rect":[90.00558471679688,427.8157043457031,522.0890407562256,418.70751953125]},{"page":302,"text":"follow and assume forces may also conduct an approach march forward of a LD. Figure 14-2 depicts an","rect":[90.00558471679688,439.3387145996094,522.0249538421631,430.23052978515627]},{"page":302,"text":"approach march.","rect":[89.99559020996094,450.7815246582031,156.63762950897218,441.6933898925781]},{"page":302,"text":"14-2","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":302,"text":"Figure 14-2. Approach march","rect":[227.82069396972657,693.6763916015625,366.23998761367798,684.3778076171875]},{"page":302,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":302,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":303,"text":"Troop Movement","rect":[467.5199890136719,46.224021911621097,539.9960844726562,38.016021728515628]},{"page":303,"text":"14-6. Based on the products of the IPB process, the overall commander assigns an area or an axis of advance","rect":[108.0,83.51434326171875,540.1346101837158,74.40616607666016]},{"page":303,"text":"in combination with routes to a unit conducting an approach march. These routes, assigned areas, or axes","rect":[108.01005554199219,94.97723388671875,540.0033099632263,85.86905670166016]},{"page":303,"text":"facilitate the force’s movement and maximize its use of concealment. Commanders assign the force","rect":[108.01005554199219,106.500244140625,540.0714998321533,97.3920669555664]},{"page":303,"text":"conducting the main effort and forces conducting each supporting effort separate routes, assigned areas, or","rect":[108.00003814697266,118.023193359375,539.9671533164978,108.9150161743164]},{"page":303,"text":"axes of advance unless an individual subordinate unit has the task of either follow and assume or follow and","rect":[107.98999786376953,127.46204376220703,540.0833644866943,120.3779067993164]},{"page":303,"text":"support.","rect":[107.9899673461914,140.9890594482422,140.54995250701905,132.90292358398438]},{"page":303,"text":"14-7. As the approach march nears areas of likely enemy interference, commanders divide their unit’s main","rect":[107.9899673461914,158.5340576171875,539.9591579437256,149.42587280273438]},{"page":303,"text":"body into smaller, less vulnerable columns that move on additional multiple routes or cross country while","rect":[107.98994445800781,169.9969482421875,539.9507722930908,160.88876342773438]},{"page":303,"text":"continuing to employ security elements. They take advantage of successful reconnaissance and security","rect":[107.98994445800781,181.51995849609376,539.9990749359131,172.41177368164063]},{"page":303,"text":"operations to increase the distance traveled before the main body begins to maneuver. As discussed in Chapter","rect":[107.98994445800781,193.04296875,540.0614526329041,183.93478393554688]},{"page":303,"text":"13, the advance and any flank guards remain within supporting distance of the main body, which stays in","rect":[107.98994445800781,204.505859375,539.9675807952881,195.39767456054688]},{"page":303,"text":"these smaller columns to conceal their movement.","rect":[107.98999786376953,214.0048370361328,308.1905469894409,206.92068481445313]},{"page":303,"text":"Forced March","rect":[89.99406433105469,237.4616241455078,149.74331568908694,230.54782104492188]},{"page":303,"text":"14-8. A forced march is a march longer or faster than usual or in adverse conditions. Forced marches","rect":[107.98998260498047,257.0106201171875,540.0353534202576,247.90243530273438]},{"page":303,"text":"require speed, exertion, and an increase in the number of hours marched each day beyond normal standards.","rect":[107.97997283935547,268.53363037109377,539.9570264816284,259.4254455566406]},{"page":303,"text":"Soldiers cannot sustain forced marches for more than a short period. In a forced march, a unit may not halt","rect":[107.97997283935547,279.99652099609377,539.9519419631959,270.8883361816406]},{"page":303,"text":"as often or for as long as recommended for maintenance, rest, feeding, and fuel. Units must understand that","rect":[107.97997283935547,291.51953125,540.0539317092896,282.4113464355469]},{"page":303,"text":"immediately following a long and fast march, Soldiers and combat vehicles experience a temporary","rect":[107.97997283935547,303.0425109863281,540.0101222991943,293.934326171875]},{"page":303,"text":"deterioration in their physical condition. The combat effectiveness and cohesion of the unit also temporarily","rect":[107.97997283935547,314.50537109375,539.9492702484131,305.3971862792969]},{"page":303,"text":"decreases. The plan must accommodate stragglers and address increased maintenance failures.","rect":[107.97997283935547,326.02838134765627,485.66082286834719,316.9201965332031]},{"page":303,"text":"Tactical Road March","rect":[89.98403930664063,347.5212707519531,177.82537745666506,340.60748291015627]},{"page":303,"text":"14-9. A tactical road march is a rapid movement used to relocate units within an assigned area to","rect":[107.98997497558594,367.01019287109377,539.9401760101318,358.0623474121094]},{"page":303,"text":"prepare for combat operations. The primary consideration of the tactical road march is rapid movement.","rect":[107.9899673461914,378.5331726074219,540.0423536300659,369.42498779296877]},{"page":303,"text":"Typically, a unit executes a tactical road march using the mounted method of troop movement. Based on the","rect":[108.0,390.0561828613281,540.0123567657471,380.947998046875]},{"page":303,"text":"mission variables a unit can execute a dismounted tactical road march. However, the moving force employs","rect":[108.00003814697266,401.51904296875,540.1256244163513,392.4108581542969]},{"page":303,"text":"security measures, even when contact with enemy ground forces is not expected. Units conducting tactical","rect":[108.01009368896485,413.0420837402344,540.0665049514771,403.93389892578127]},{"page":303,"text":"road marches may or may not be organized into combined arms formation. For example, a forward support","rect":[108.0101089477539,424.5650939941406,540.0705943069459,415.4569091796875]},{"page":303,"text":"company providing supplies to its supported maneuver companies can execute a tactical road march. During","rect":[108.0101089477539,436.0279846191406,540.0450954437256,426.9197082519531]},{"page":303,"text":"a tactical road march, the commander is always prepared to take immediate action if the enemy attacks.","rect":[108.0199966430664,447.55096435546877,521.6811475753784,438.4427795410156]},{"page":303,"text":"METHODS OF TROOP MOVEMENTS","rect":[90.0,470.84222412109377,262.258581161499,462.7560119628906]},{"page":303,"text":"14-10. There are five methods of troop movements that units can execute. These methods are—","rect":[108.0,490.7142639160156,496.9055595397949,481.6261291503906]},{"page":303,"text":" Dismounted movement (foot marches).","rect":[133.1999969482422,504.2142639160156,308.38372325897219,495.1261291503906]},{"page":303,"text":" Mounted movement (road marches).","rect":[133.1999969482422,517.7142944335938,297.3316602706909,508.6261291503906]},{"page":303,"text":" Air movement.","rect":[133.1999969482422,529.2102661132813,211.78493785858155,522.1261596679688]},{"page":303,"text":" Rail movement.","rect":[133.1999969482422,542.7102661132813,215.08751964569093,535.6261596679688]},{"page":303,"text":" Water movement.","rect":[133.1999969482422,556.2202758789063,222.88610363006593,549.44677734375]},{"page":303,"text":"Generally, units can execute these methods in combination. For example, a unit can initially execute a","rect":[108.00376892089844,572.7532958984375,540.0100984649658,563.6451416015625]},{"page":303,"text":"mounted movement and then transition to a dismounted movement.Additionally, each method can be applied","rect":[108.00376892089844,584.2762451171875,539.9318752288818,575.1680908203125]},{"page":303,"text":"to nontactical or tactical movement.","rect":[108.02379608154297,593.715087890625,251.6485242843628,586.6309814453125]},{"page":303,"text":"Dismounted Movement","rect":[90.0,618.1427612304688,199.62212964248659,610.5555419921875]},{"page":303,"text":"14-11. A dismounted movement is a movement of troops and equipment mainly by foot, with limited","rect":[108.0,637.914306640625,540.0141134185791,628.9664306640625]},{"page":303,"text":"support by vehicles. Dismounted movements are also called foot marches. Dismounted movements increase","rect":[107.98997497558594,649.377197265625,539.9942903594971,640.26904296875]},{"page":303,"text":"units’ maneuver options. Their positive characteristics include combat readiness (because all Soldiers can","rect":[107.98998260498047,660.8801879882813,539.8353176116943,651.7920532226563]},{"page":303,"text":"immediately respond to enemy attack without the need to dismount), ease of control, adaptability to terrain,","rect":[107.97996520996094,672.4232177734375,540.0824537277222,663.3150634765625]},{"page":303,"text":"and independence from the existing road network. Their limitations include a slow movement rate and","rect":[107.97997283935547,683.8860473632813,539.9930324554443,674.7778930664063]},{"page":303,"text":"increased personnel fatigue. A unit conducts a dismounted movement when the situation requires stealth, the","rect":[107.97997283935547,695.4090576171875,540.0564241485596,686.3009033203125]},{"page":303,"text":"distance to travel is short, transportation or fuel is limited, or the situation or terrain precludes moving other","rect":[107.99002075195313,706.9320678710938,539.9622705039978,697.8239135742188]},{"page":303,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":303,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":303,"text":"14-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":304,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":304,"text":"ways. (See ATP 3-21.18 for more information on the techniques and procedures for conducting dismounted","rect":[90.0,83.51434326171875,521.9682521820068,74.40616607666016]},{"page":304,"text":"movement.)","rect":[90.00000762939453,94.95719909667969,138.10101867294314,85.86905670166016]},{"page":304,"text":"Mounted Movement","rect":[72.0,117.38272857666016,167.58967419815066,109.97122955322266]},{"page":304,"text":"14-12. A mounted movement is the movement of troops and equipment by combat and tactical","rect":[90.0,137.154296875,522.0705332717896,128.20643615722657]},{"page":304,"text":"vehicles. Mounted movements are also called road marches. Armored and mechanized units routinely","rect":[90.01002502441406,148.6171875,522.0264186859131,139.50900268554688]},{"page":304,"text":"conduct mounted movements. The speed of the march and the increased supplies that can accompany the","rect":[90.01001739501953,160.14019775390626,522.0274324493408,151.03201293945313]},{"page":304,"text":"unit characterize this movement method. Armored and Stryker maneuver units are normally self-sufficient","rect":[90.01002502441406,171.6632080078125,521.9651865921021,162.55502319335938]},{"page":304,"text":"when conducting mounted movements over short distances. Infantry maneuver units cannot move themselves","rect":[90.00997924804688,183.12603759765626,522.0163104515076,174.01785278320313]},{"page":304,"text":"with organic truck assets and require assistance from transportation elements to conduct mounted","rect":[90.00997924804688,194.6490478515625,521.9370021820068,185.54086303710938]},{"page":304,"text":"movements. Considerations for mounted movements over extended distances include—","rect":[90.00997924804688,204.1580352783203,441.3813591003418,197.06387329101563]},{"page":304,"text":" The ability of routes to support the numbers, sizes, and weights of the tactical and combat vehicles","rect":[115.19999694824219,219.654296875,522.0330340843201,210.54611206054688]},{"page":304,"text":"assigned to or supporting the moving unit.","rect":[133.1999969482422,231.1171875,302.38872814178469,222.00900268554688]},{"page":304,"text":" Available refueling and maintenance sites and crew rest areas.","rect":[115.19999694824219,244.61431884765626,382.23015880584719,235.50613403320313]},{"page":304,"text":" The need for recovery and evacuation assets.","rect":[115.19999694824219,258.11431884765627,312.9428663253784,249.00613403320313]},{"page":304,"text":"See ATP 4-16 for more information on route synchronization and movement planning.","rect":[92.51879119873047,272.63330078125,439.65874767303469,263.5251159667969]},{"page":304,"text":"Air Movement","rect":[72.0,295.042724609375,140.6985761756897,287.45556640625]},{"page":304,"text":"14-13. Air movement is an air transport of units, personnel, supplies, and equipment including airdrops and","rect":[90.0,314.7543029785156,521.9827175140381,305.6461181640625]},{"page":304,"text":"air landings (JP 3-36). Units conduct air movements to move troops and equipment; to emplace systems; and","rect":[90.0,326.2773132324219,522.0995998382568,317.16912841796877]},{"page":304,"text":"to transport ammunition, fuel, and other high-value supplies through transport by helicopter and fixed wing","rect":[89.98998260498047,337.80029296875,522.0053615570068,328.6921081542969]},{"page":304,"text":"aircraft. They may employ air movements as a substitute for ground tactical movements or to augment ground","rect":[89.97997283935547,349.26318359375,521.9634304046631,340.1549987792969]},{"page":304,"text":"tactical movements. Air movements are generally faster than ground tactical movements and they can bypass","rect":[89.9800033569336,360.78619384765627,521.9903094749451,351.6780090332031]},{"page":304,"text":"ground threats. (See FM 3-04 for additional information concerning air movement.)","rect":[89.97996520996094,372.3092041015625,424.9206445274353,363.2010192871094]},{"page":304,"text":"Rail Movement","rect":[72.0,394.6427307128906,144.35821362686159,387.0555725097656]},{"page":304,"text":"14-14. Units use rail assets to conduct troop movement if they are available in an assigned area. Rail","rect":[90.0,414.4142761230469,521.9999766311646,405.30609130859377]},{"page":304,"text":"movements involve United States, partner nation, and local nation commercial trains. Rail movement can","rect":[90.0,425.917236328125,522.0093288421631,416.8291015625]},{"page":304,"text":"move a significant quantity of supplies and vehicles over extended distances on land quickly. Responsibility","rect":[89.99000549316406,437.400146484375,521.9031276702881,428.2919616699219]},{"page":304,"text":"for coordinating the use of railroads resides in the Army Forces headquarters in the theater of operations.","rect":[89.99000549316406,448.92315673828127,521.9431104660034,439.8149719238281]},{"page":304,"text":"(See ATP 4-14 for additional information concerning rail movement.)","rect":[89.97998809814453,460.4461669921875,369.66826415634156,451.3379821777344]},{"page":304,"text":"Water Movement","rect":[72.0,482.8537292480469,154.6903974647522,475.4312438964844]},{"page":304,"text":"14-15. Water movements use vessels to transport equipment, supplies, and personnel. Water movement","rect":[90.0,502.53424072265627,522.0834727249146,493.44610595703127]},{"page":304,"text":"involves United States, partner nation and local nation commercial and military vessels. Water movements","rect":[90.00003814697266,514.0773315429688,521.9743182640076,504.9691162109375]},{"page":304,"text":"are slower than air movements, however they can move larger quantities of equipment and supplies and are","rect":[89.98998260498047,525.5401611328125,522.0531282501221,516.4320068359375]},{"page":304,"text":"more cost efficient than air movement. (See ATP 4-15 for additional information concerning water","rect":[89.98998260498047,537.0631713867188,522.0123193321228,527.9550170898438]},{"page":304,"text":"movement.)","rect":[89.97993469238281,548.566162109375,138.07092834091189,539.47802734375]},{"page":304,"text":"ORGANIZATION FOR TACTICAL TROOP MOVEMENTS","rect":[72.0,571.968017578125,334.4388790130615,563.6759643554688]},{"page":304,"text":"14-16. There are several differences between the organization of troop movements. An approach march","rect":[90.0,591.8342895507813,522.0153102874756,582.7261352539063]},{"page":304,"text":"prioritizes security over speed while nontactical movement, tactical road march, and forced march prioritizes","rect":[89.98998260498047,603.3572998046875,522.0123431663513,594.2491455078125]},{"page":304,"text":"speed over security. A unit conducting an approach march employs larger security forces because of its","rect":[90.01001739501953,614.8803100585938,522.0381000022888,605.7721557617188]},{"page":304,"text":"greater chance for enemy contact. Units conducting approach marches arrange into combined arms","rect":[90.01001739501953,626.3431396484375,522.0705707054138,617.2349853515625]},{"page":304,"text":"organizations. An approach march allows units to disperse their task-organized forces into tactical formations","rect":[90.01000213623047,637.8661499023438,522.0623309593201,628.7579956054688]},{"page":304,"text":"without being constrained to existing roads and trails. A nontactical movement, tactical road march, or forced","rect":[89.99996185302735,649.38916015625,521.9848537445068,640.281005859375]},{"page":304,"text":"march can organize into columns for rapid movement. For example, vehicles of similar type, speed, and","rect":[90.01000213623047,660.85205078125,522.0273342132568,651.743896484375]},{"page":304,"text":"cross-country capabilities move together. Units conducting troop movements establish appropriate tactical","rect":[90.01001739501953,672.3750610351563,521.9511485061646,663.2669067382813]},{"page":304,"text":"intervals between vehicles. They also use fewer routes than units conducting approach marches.","rect":[89.9999771118164,683.8980712890625,473.73903942108157,674.7899169921875]},{"page":304,"text":"14-4","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":304,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":304,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":305,"text":"Troop Movement","rect":[467.5199890136719,46.224021911621097,539.9960844726562,38.016021728515628]},{"page":305,"text":"Approach March Organization","rect":[90.0,84.62071228027344,236.61482847595216,74.81556701660156]},{"page":305,"text":"14-17. Units use approach marches in a theater of operations when contact with an enemy force is possible","rect":[108.0,102.11431884765625,540.0162019805908,93.00614166259766]},{"page":305,"text":"or anticipated. This style of movement emphasizes tactical considerations such as security over the efficiency","rect":[108.0,113.6373291015625,540.0428371429443,104.5291519165039]},{"page":305,"text":"of movement. Units organize their subordinate forces to conduct combat operations in an approach march","rect":[108.0,125.16033935546875,539.9823513031006,116.05216217041016]},{"page":305,"text":"and generally maintain unit integrity throughout its movement. Units plan for enemy interference while","rect":[108.0,136.6231689453125,540.0644197540283,127.5149917602539]},{"page":305,"text":"moving or shortly after arriving at its destination. Units conducting an approach march use formations and","rect":[107.99996185302735,148.14617919921876,539.9656887054443,139.03799438476563]},{"page":305,"text":"techniques consistent with the mission variables. The unit may conduct them over unsecured routes if no","rect":[108.0,159.669189453125,540.0541896820068,150.56100463867188]},{"page":305,"text":"friendly forces exist between the foremost elements of the moving force and enemy forces. The echelon","rect":[108.0,171.132080078125,539.9824123382568,162.02389526367188]},{"page":305,"text":"operations officer is responsible for planning these tactical movements with input from other staff members.","rect":[108.0,182.65509033203126,539.9860792160034,173.54690551757813]},{"page":305,"text":"14-18. During approach marches, units use movement formations and movement techniques to balance","rect":[108.0,200.1800537109375,540.1025667266846,191.07186889648438]},{"page":305,"text":"security and speed throughout the operation. The seven movement formations are—","rect":[107.98998260498047,211.6429443359375,444.35139083862307,202.53475952148438]},{"page":305,"text":" Column.","rect":[133.1999969482422,223.1002960205078,185.9854383468628,216.00613403320313]},{"page":305,"text":" Line.","rect":[133.1999969482422,236.5902862548828,172.06464672088624,229.50613403320313]},{"page":305,"text":" Wedge.","rect":[133.1999969482422,252.11431884765626,182.08265209197999,243.00613403320313]},{"page":305,"text":" Echelon (left or right).","rect":[133.1999969482422,265.61431884765627,241.17357921600343,256.5061340332031]},{"page":305,"text":" Vee.","rect":[133.1999969482422,277.1003112792969,169.84321117401124,270.3267822265625]},{"page":305,"text":" Diamond.","rect":[133.1999969482422,290.5902404785156,190.96135997772218,283.506103515625]},{"page":305,"text":" Box.","rect":[133.1999969482422,304.0902404785156,170.3852949142456,297.3267517089844]},{"page":305,"text":"14-19. The three movement techniques are—","rect":[107.9937515258789,323.60919189453127,295.3617057800293,314.52105712890627]},{"page":305,"text":" Traveling.","rect":[133.1999969482422,337.1343078613281,192.64470958709718,328.026123046875]},{"page":305,"text":" Traveling overwatch.","rect":[133.1999969482422,350.6343078613281,236.7988691329956,341.526123046875]},{"page":305,"text":" Bounding overwatch.","rect":[133.1999969482422,364.1343078613281,237.34592723846436,355.026123046875]},{"page":305,"text":"See Chapter 2 for more information on movement formations and movement techniques.","rect":[108.00376892089844,378.5731201171875,463.5142469406128,369.4849853515625]},{"page":305,"text":"Tactical Road March or Forced March Organization","rect":[90.0,403.2206726074219,338.68929136657717,393.4155578613281]},{"page":305,"text":"14-20. The organization for a tactical road march and forced march is the march column. A march column","rect":[108.0,420.7743225097656,540.0694112701416,411.6661376953125]},{"page":305,"text":"is all march serials using the same route for a single movement under control of a single commander.","rect":[108.01005554199219,432.2973327636719,539.9145460128784,423.3494873046875]},{"page":305,"text":"The subordinate element for a march column is a march serial. A march serial is a subdivision of a march","rect":[108.01005554199219,441.73614501953127,539.9953145904541,434.6520080566406]},{"page":305,"text":"column organized under one commander. An example is a battalion serial formed from a brigade-sized","rect":[108.0,455.283203125,540.0193386077881,446.1750183105469]},{"page":305,"text":"march column. The subordinate element for the march serial is a march unit. A march unit is a subdivision","rect":[107.98998260498047,464.78216552734377,540.0634298248291,457.6980285644531]},{"page":305,"text":"of a march serial. It moves and halts under the control of a single commander who uses voice and visual","rect":[108.01005554199219,478.2690734863281,539.9881968460084,469.160888671875]},{"page":305,"text":"signals. An example of a march unit is a company from a battalion-sized march serial.","rect":[108.01004791259766,489.7920837402344,452.32732677459719,480.68389892578127]},{"page":305,"text":"14-21. A march column provides excellent speed, control, and flexibility but only provides local security.","rect":[108.01005554199219,507.2569580078125,540.0073194503784,498.1487731933594]},{"page":305,"text":"Units use a march column when speed is essential and enemy contact is unlikely. However, units space","rect":[108.01004791259766,518.7799072265625,539.9980135040283,509.6717224121094]},{"page":305,"text":"functional and multifunctional support elements, such as air defense and engineers, throughout the column","rect":[108.01004791259766,530.302978515625,539.9385280609131,521.19482421875]},{"page":305,"text":"to protect and support the movement. Prior to movement, reconnaissance elements conduct route","rect":[108.01000213623047,541.7457885742188,540.0885286407471,532.6576538085938]},{"page":305,"text":"reconnaissance of the predetermined march route to determine trafficability. Units organize a march column","rect":[108.01001739501953,553.288818359375,540.0402126312256,544.1806640625]},{"page":305,"text":"into four elements: reconnaissance, quartering party, main body, and trail party.","rect":[108.01001739501953,564.8118286132813,426.8315382003784,555.7036743164063]},{"page":305,"text":"14-22. The reconnaissance element conducts route reconnaissance and area reconnaissance of the assembly","rect":[108.01001739501953,582.2766723632813,540.0353908538818,573.1685180664063]},{"page":305,"text":"areas. A thorough reconnaissance of the route leading to the start point will assist units in crossing the start","rect":[108.01001739501953,593.7996826171875,539.9708018264771,584.6915283203125]},{"page":305,"text":"point on time. Each serial should conduct its own reconnaissance. The reconnaissance element uses the","rect":[108.01001739501953,605.3026733398438,540.0773592071533,596.2145385742188]},{"page":305,"text":"reconnaissance fundamentals and executes reconnaissance tasks discussed in Chapter 12.","rect":[108.01000213623047,616.7655639648438,464.63189220428469,607.6774291992188]},{"page":305,"text":"14-23. A quartering party is a group dispatched to a new assigned area in advance of the main body.","rect":[108.01005554199219,634.310546875,540.0324048995972,625.3626708984375]},{"page":305,"text":"A unit quartering party usually accompanies the route reconnaissance effort to the designated assembly area","rect":[107.99002075195313,645.8335571289063,540.0554475860596,636.7254028320313]},{"page":305,"text":"or established RP. Unit SOPs establish the exact composition of the quartering party and its transportation,","rect":[107.99002075195313,657.2964477539063,539.9498243331909,648.1882934570313]},{"page":305,"text":"security, communications equipment needs, and specific duties. However, it is small enough to move quickly","rect":[107.97998809814453,668.8194580078125,540.0371608734131,659.7113037109375]},{"page":305,"text":"while still maintaining a significant self-defense capability. The leader of the quartering party is empowered","rect":[107.97998809814453,680.3424072265625,539.9923000335693,671.2342529296875]},{"page":305,"text":"by the commander of the main body to make tactical decisions. The quartering party secures, reconnoiters,","rect":[107.96995544433594,691.8052978515625,539.9138746261597,682.6971435546875]},{"page":305,"text":"and organizes an area for the main body’s arrival and occupation. It typically reconnoiters and confirms the","rect":[107.96995544433594,703.3282470703125,540.0361604766846,694.2200927734375]},{"page":305,"text":"tentative locations selected by the commander of its parent element based on a map reconnaissance. When","rect":[107.96995544433594,714.851318359375,539.9456691741943,705.7431640625]},{"page":305,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":305,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":305,"text":"14-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":306,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":306,"text":"necessary, the quartering party changes previously assigned unit locations in the assembly area. The","rect":[90.0,83.51434326171875,522.1235628204346,74.40616607666016]},{"page":306,"text":"quartering party guides the main body into position from the RP to precise locations in the assembly area.","rect":[90.0,94.97723388671875,512.743800163269,85.86905670166016]},{"page":306,"text":"14-24. The main body of the march column consists of the remainder of the unit, including attachments and","rect":[89.99996185302735,112.4921875,521.9894313812256,103.38394927978516]},{"page":306,"text":"minus the trail party. The main body is the principal part of a tactical command or formation. It does not","rect":[90.0,124.01519775390625,521.9853892288209,114.90702056884766]},{"page":306,"text":"include detached elements of the command, such as advance guards, flank guards, and covering forces (ADP","rect":[89.9899673461914,135.47808837890626,521.9820089263916,126.36991119384766]},{"page":306,"text":"3-90). The trail party is the last march unit in a march column. It maintains communications with the","rect":[89.9899673461914,147.00103759765626,522.0343904571533,137.89285278320313]},{"page":306,"text":"main body. The function of the trail party is to recover disabled vehicles or control stragglers during a","rect":[89.96991729736328,158.5240478515625,522.0139436798096,149.41586303710938]},{"page":306,"text":"movement. If the trail party cannot repair a disabled vehicle immediately, it tows the disabled vehicle and","rect":[89.96991729736328,169.9869384765625,521.8960475921631,160.87875366210938]},{"page":306,"text":"moves its crew and passengers to a secure maintenance collection point along the movement route.","rect":[89.96991729736328,181.50994873046876,485.6578016281128,172.40176391601563]},{"page":306,"text":"14-25. During extended movements, halts are necessary to rest personnel, service vehicles, and adjust","rect":[89.96991729736328,199.034912109375,521.9730601272584,189.91671752929688]},{"page":306,"text":"movement schedules. The march order or unit SOP regulates when to take halts. In short motor movements,","rect":[89.96991729736328,210.497802734375,521.9511671066284,201.38961791992188]},{"page":306,"text":"units schedule short halts every two to three hours of movement, and a halt may last up to an hour. Long halts","rect":[89.96991729736328,222.02081298828126,521.9508807640076,212.91262817382813]},{"page":306,"text":"occur on marches that exceed 24 hours. When possible, these halts are not to exceed two hours. Units do not","rect":[89.96991729736328,233.46360778808595,522.0670542678834,224.37545776367188]},{"page":306,"text":"schedule long halts at night to allow maximum time for night movement. During halts, each unit normally","rect":[89.96991729736328,245.0067138671875,521.9580593109131,235.89852905273438]},{"page":306,"text":"clears the march route and moves to a previously selected assembly area to prevent route congestion and","rect":[89.96991729736328,256.5296630859375,521.9772243499756,247.42147827148438]},{"page":306,"text":"avoid possible enemy attack. Units establish security and take other measures to protect the force. Unit","rect":[89.95986938476563,267.9925537109375,521.9147105178834,258.8843688964844]},{"page":306,"text":"leaders promptly notify commanders of the time and approximate length of unscheduled halts.","rect":[89.95990753173828,279.51556396484377,467.33816051483157,270.4073181152344]},{"page":306,"text":"MARCH TECHNIQUES","rect":[72.0,304.4064025878906,178.66238975524903,294.7560119628906]},{"page":306,"text":"14-26. Organized march columns employ three march techniques: open column, close column, and","rect":[90.0,322.7943115234375,521.9642238616943,313.6861267089844]},{"page":306,"text":"infiltration march. All techniques use scheduled halts to control and sustain the road march. The mission","rect":[90.0,334.2371520996094,521.9952297210693,325.1490173339844]},{"page":306,"text":"variables influence the distances between vehicles and dismounted Soldiers. During movement, elements in","rect":[90.0,345.7801818847656,521.9058742523193,336.6719970703125]},{"page":306,"text":"a column may encounter many different types of routes and obstacles simultaneously. Consequently, parts","rect":[90.0,357.3031921386719,522.0564715843201,348.19500732421877]},{"page":306,"text":"of the column may be moving at different speeds, which can produce an undesirable accordion effect. The","rect":[90.0,368.7660827636719,522.0121736602783,359.65789794921877]},{"page":306,"text":"movement order establishes the order of march, rate of march, interval or time gaps between units, column","rect":[90.0,380.2890625,521.9576320648193,371.1808776855469]},{"page":306,"text":"gap, and maximum catch up speed. Unless commanders direct them not to do so for security reasons, march","rect":[90.0,391.81207275390627,521.9794216156006,382.7038879394531]},{"page":306,"text":"units report when they have crossed each control point. Units maintain air and ground security throughout","rect":[90.01000213623047,403.27496337890627,522.0570445022584,394.1667175292969]},{"page":306,"text":"the movement.","rect":[90.01001739501953,412.7738952636719,149.45466136932374,405.68975830078127]},{"page":306,"text":"Open Column","rect":[72.0,439.3787536621094,138.27088011169435,429.6065368652344]},{"page":306,"text":"14-27. In an open column, units increase distances between vehicles and dismounted Soldiers for greater","rect":[90.0,456.894287109375,521.9973657188416,447.7861022949219]},{"page":306,"text":"dispersion. The distance between vehicles varies from 50 to 100 meters (54 to 110 yards), and it may be","rect":[89.99999237060547,468.41729736328127,522.0450716094971,459.3091125488281]},{"page":306,"text":"greater if required. The distance between dismounted Soldiers varies from two to five meters (2 to 5 yards)","rect":[89.98999786376953,479.9402770996094,522.0313623008728,470.83209228515627]},{"page":306,"text":"to allow for dispersion and maneuver space for marching comfort. Any distance that exceeds five meters (5","rect":[89.98994445800781,491.4031677246094,521.9622097015381,482.29498291015627]},{"page":306,"text":"yards) between dismounted Soldiers increases the length of the column and hinders control. Units normally","rect":[89.98994445800781,502.9261779785156,521.8939723968506,493.8179931640625]},{"page":306,"text":"use the open column technique during daylight. They may also employ it at night by use of infrared lights,","rect":[89.98994445800781,514.4491577148438,521.9057569503784,505.3409729003906]},{"page":306,"text":"blackout lights, or passive night vision equipment. Using an open column roughly doubles the column’s","rect":[89.98994445800781,525.9120483398438,521.9823138694763,516.8038940429688]},{"page":306,"text":"length and thereby doubles the time it takes to clear a point when compared to a close column moving at the","rect":[89.9800033569336,537.43505859375,521.9843416290283,528.326904296875]},{"page":306,"text":"same speed. The open column is the most common march technique because it offers the most security while","rect":[89.97994995117188,548.9580078125,521.9989290313721,539.849853515625]},{"page":306,"text":"still providing leaders a reasonable degree of control. In an open column, vehicle density varies from 15 to","rect":[89.97994995117188,560.4208984375,521.9471340179443,551.312744140625]},{"page":306,"text":"20 vehicles per kilometer. A single infantry company, with intervals between its platoons, occupies roughly","rect":[89.97993469238281,571.9439086914063,522.0099391937256,562.8357543945313]},{"page":306,"text":"a kilometer of road or trail.","rect":[89.97993469238281,581.44287109375,198.26812267303468,574.3587646484375]},{"page":306,"text":"Close Column","rect":[72.0,605.7937622070313,138.28296507263185,598.20654296875]},{"page":306,"text":"14-28. In a close column, units space vehicles approximately 20 to 25 meters apart. At night, vehicles are","rect":[90.0,625.5543212890625,522.1195955352783,616.4461669921875]},{"page":306,"text":"spaced so each driver can see the two lights in the blackout marker of the vehicle ahead. Units normally","rect":[90.0000228881836,637.0772705078125,521.9282131195068,627.9691162109375]},{"page":306,"text":"employ a close column for marches during darkness under blackout driving conditions or for marches in","rect":[90.0,648.5401611328125,521.9990139007568,639.4320068359375]},{"page":306,"text":"restricted terrain. This method of marching provides maximum traffic capacity of a route, but it provides","rect":[90.0,660.0631713867188,522.0153338890076,650.9550170898438]},{"page":306,"text":"little dispersion. Normally, vehicle density is 40 to 50 vehicles per kilometer along the route in a close","rect":[90.0,671.586181640625,522.0422639923096,662.47802734375]},{"page":306,"text":"column. During dismounted movements, leaders reduce the distance between individual Soldiers to one to","rect":[90.0,683.049072265625,522.0524196624756,673.94091796875]},{"page":306,"text":"three meters to help maintain contact and facilitate control.","rect":[90.0,694.552001953125,325.7875928878784,685.4638671875]},{"page":306,"text":"14-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":306,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":306,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":307,"text":"Troop Movement","rect":[467.5199890136719,46.224021911621097,539.9960844726562,38.016021728515628]},{"page":307,"text":"Infiltration March","rect":[90.0,82.40274810791016,177.04613340759279,74.81556701660156]},{"page":307,"text":"14-29. Units dispatch vehicles in small groups, or at irregular intervals, at a rate that keeps the traffic density","rect":[108.0,102.11431884765625,540.0834865570068,93.00614166259766]},{"page":307,"text":"down and prevents undue massing of vehicles during a move by infiltration. Infiltration provides the best","rect":[108.0,113.6373291015625,540.0524058303834,104.5291519165039]},{"page":307,"text":"passive defense against enemy observation and attack. It is suited for tactical movements when there is","rect":[108.0,125.16033935546875,540.0434100608826,116.05216217041016]},{"page":307,"text":"enough time and road space and a commander desires the maximum security, military deception, and","rect":[107.98998260498047,136.6231689453125,540.0651149749756,127.5149917602539]},{"page":307,"text":"dispersion. The disadvantages of an infiltration are that more time is required to complete the move, column","rect":[107.98998260498047,148.14617919921876,539.9677028656006,139.03799438476563]},{"page":307,"text":"control is challenging, and it protracts the recovery of broken-down vehicles by the trail party when compared","rect":[107.98999786376953,159.669189453125,540.0283718109131,150.56100463867188]},{"page":307,"text":"to vehicle recovery in close and open columns. Additionally, units cannot restore their unit integrity until the","rect":[107.9899673461914,171.132080078125,540.0139436798096,162.02389526367188]},{"page":307,"text":"last vehicle arrives at the destination, complicating the unit’s onward deployment.","rect":[107.9899673461914,182.65509033203126,435.69106578826907,173.54690551757813]},{"page":307,"text":"Note. Infiltration as a tactical march technique during troop movement differs from Chapter 2’s","rect":[133.1902618408203,205.87139892578126,521.9362323265076,196.76321411132813]},{"page":307,"text":"discussion of infiltration as a form of maneuver.","rect":[133.1999969482422,215.4102325439453,325.9057264328003,208.32608032226563]},{"page":307,"text":"14-30. Units emphasize security during halts. Soldiers tend to let their guard down and relax their vigilance","rect":[108.0,249.654296875,540.0101595001221,240.54611206054688]},{"page":307,"text":"during halts. Units address this by defining unit actions in SOPs for various types of halts, such as","rect":[108.0,261.1171875,539.9329974632263,252.00900268554688]},{"page":307,"text":"maintenance or security halts.","rect":[107.99999237060547,272.64019775390627,227.43935680389405,263.5320129394531]},{"page":307,"text":"GRAPHIC CONTROL MEASURES","rect":[90.0,296.03997802734377,246.46149253845216,287.7239990234375]},{"page":307,"text":"14-31. Units executing tactical and nontactical movements often use strip maps or overlays to depict critical","rect":[108.0,315.95428466796877,540.0162730178834,306.8460998535156]},{"page":307,"text":"information graphically about the route to subordinates. The overlay or strip map shows the route, SPs, RPs,","rect":[108.0,327.41717529296877,539.9261426925659,318.3089904785156]},{"page":307,"text":"checkpoints, critical points (such as bridges), light lines, and traffic control posts (TCPs). Figure 14-3 depicts","rect":[108.01001739501953,338.9401550292969,539.9331805686951,329.83197021484377]},{"page":307,"text":"some of these route control measures. A light line is a designated line forward of which vehicles are","rect":[107.98998260498047,350.4631652832031,540.0384798126221,341.35498046875]},{"page":307,"text":"required to use blackout lights during periods of limited visibility. (Figure 14-4 on page 14-8 showsa","rect":[107.99000549316406,361.9260559082031,540.0423860626221,352.81787109375]},{"page":307,"text":"sample strip map.) Other graphic control measures include assembly areas and phase lines.","rect":[107.96990203857422,373.44903564453127,471.12478160858157,364.3408508300781]},{"page":307,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":307,"text":"Figure 14-3. Example overlay with route control measures","rect":[177.68905639648438,710.7723388671875,452.3081808013916,701.4737548828125]},{"page":307,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":307,"text":"14-7","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":308,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":308,"text":"Figure 14-4. Example strip map","rect":[223.0800018310547,482.8141784667969,370.9822056312561,473.515625]},{"page":308,"text":"14-32. The start point is a point on a route on which marching elements fall under the control of a designated","rect":[89.99433898925781,506.27099609375,522.0635280609131,497.1628112792969]},{"page":308,"text":"march commander. All routes have a designated SP. It is an easily recognizable point on a map and on the","rect":[89.99433898925781,517.7940063476563,522.0218172149658,508.6858215332031]},{"page":308,"text":"ground, such as a road junction. It is far enough from the assembly area to allow units to organize and move","rect":[89.99435424804688,529.3170166015625,522.0728426055908,520.1987915039063]},{"page":308,"text":"at the prescribed speed and interval when the unit reaches the SP.","rect":[90.00437927246094,540.7598876953125,351.64666271209719,531.6717529296875]},{"page":308,"text":"14-33. A release point is a point on a route where marching elements move out of centralized control. Each","rect":[89.99435424804688,558.3048706054688,522.0257472991943,549.1967163085938]},{"page":308,"text":"SP has a corresponding RP. It is an easily recognizable point on the map and on the ground. Marching units","rect":[89.99433898925781,569.827880859375,522.0427997093201,560.7197265625]},{"page":308,"text":"do not stop at their RPs. Instead, as they move through their RPs, either they transition to a follow-on mission","rect":[89.98431396484375,581.290771484375,522.0737819671631,572.1826171875]},{"page":308,"text":"or a unit guide meets marching units and leads them to assembly areas. For example, a unit conducting a","rect":[89.98432922363281,592.813720703125,522.0347566680908,583.70556640625]},{"page":308,"text":"route reconnaissance reaching their RP can transition to a screen.","rect":[89.98432922363281,604.3367309570313,350.4162549972534,595.2285766601563]},{"page":308,"text":"14-34. Units designate checkpoints along routes to facilitate control over the movement of marching forces.","rect":[89.97430419921875,621.8016357421875,522.0388135910034,612.6934814453125]},{"page":308,"text":"The movement overlay identifies critical points along the route where interference with movement might","rect":[89.96429443359375,633.3245849609375,521.9535288772584,624.2164306640625]},{"page":308,"text":"occur. Units position TCPs along routes to prevent congestion and confusion. Military police or unit","rect":[89.96429443359375,644.7874755859375,521.9866709671021,635.6793212890625]},{"page":308,"text":"personnel may operate TCPs. These Soldiers report to the appropriate area movement control organization","rect":[89.96429443359375,656.3104858398438,521.8951320648193,647.2023315429688]},{"page":308,"text":"when each convoy, march column, and march serial arrives at their TCP.","rect":[89.96429443359375,667.83349609375,381.55947399139407,658.725341796875]},{"page":308,"text":"14-35. There are five route classification designations: open route, supervised route, dispatch route,","rect":[89.96429443359375,685.29833984375,521.9966993331909,676.190185546875]},{"page":308,"text":"prohibited route, and reserved route. Each route’s designation varies based on the mission variables. See table","rect":[89.95426940917969,696.8213500976563,521.8954744415283,687.7131958007813]},{"page":308,"text":"14-1.","rect":[89.94427490234375,706.1900634765625,110.80591869354248,699.4165649414063]},{"page":308,"text":"14-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":308,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":308,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":309,"text":"Table 14-1. Route designations","rect":[241.32000732421876,83.51416015625,388.6721029205322,74.2155990600586]},{"page":309,"text":"Troop Movement","rect":[467.5199890136719,46.224021911621097,539.9960844726562,38.016021728515628]},{"page":309,"text":"PLANNING A TROOP MOVEMENT","rect":[90.0,326.0696716308594,320.5455459251404,316.38153076171877]},{"page":309,"text":"14-36. Commander’s plan, prepare, execute, and assess troop movements to ensure the organized and","rect":[108.0,346.3742980957031,539.9622097015381,337.26611328125]},{"page":309,"text":"uninterrupted flow of units throughout an area. The objective of a successful move is for a unit to arrive at","rect":[108.0,357.8973083496094,539.9061655960084,348.77911376953127]},{"page":309,"text":"its destination in a condition suitable to its probable employment. The goal of all movement planning is to","rect":[108.0,369.36016845703127,539.9370632171631,360.2519836425781]},{"page":309,"text":"retain flexibility to execute a variety of plans to meet ever-changing conditions. Leaders ensure that unit","rect":[108.0,380.8831787109375,540.0103526077271,371.7749938964844]},{"page":309,"text":"movement SOPs contain specifics. Leaders conduct rehearsals to ensure that the unit’s Soldiers and","rect":[107.9999771118164,392.3861389160156,540.0793972015381,383.2980041503906]},{"page":309,"text":"subordinate leaders understand the movement SOPs. These SOPs use standard task organizations to simplify","rect":[107.98994445800781,403.86907958984377,539.9811305999756,394.7608642578125]},{"page":309,"text":"planning, provide flexibility, and allow greater responsiveness by establishing habitual relationships among","rect":[107.98999786376953,415.3920593261719,540.0181179046631,406.28387451171877]},{"page":309,"text":"the unit’s subordinate elements and outside supporting elements.","rect":[107.98999786376953,426.9150695800781,366.87273693084719,417.806884765625]},{"page":309,"text":"14-37. The movement order is the result of the unit’s planning process. The Army movement order is","rect":[107.98998260498047,444.3799133300781,540.0404193382263,435.271728515625]},{"page":309,"text":"prepared as Tab C (Transportation) of Annex F (Sustainment) to an operation order or as a separate operation","rect":[107.9899673461914,455.88287353515627,540.0383205413818,446.79473876953127]},{"page":309,"text":"order. Prepared in five-paragraph format, Tab C provides critical information to plan and execute movement.","rect":[107.99996185302735,467.4259033203125,539.9943189620972,458.3177185058594]},{"page":309,"text":"Information normally found in Tab C includes the destination, routes, orders of march, rates of march, times","rect":[107.99996185302735,478.8887939453125,539.8995501976013,469.7806091308594]},{"page":309,"text":"that each serial (or march element for serial movement orders) arrives and clears its SP, intervals, speeds,","rect":[107.99996185302735,490.3917541503906,539.9703931808472,481.3036193847656]},{"page":309,"text":"scheduled maintenance halts, communications, and location of the commander. Units also identify logistics","rect":[107.99996185302735,501.87469482421877,539.9326922874451,492.7665100097656]},{"page":309,"text":"sites and services in Tab C. Information and procedures contained in the unit’s movement SOP are not","rect":[107.99996185302735,513.3776245117188,540.0813975296021,504.28948974609377]},{"page":309,"text":"included. The movement order should include a strip map or overlay. (See FM 5-0 for more information on","rect":[107.99996185302735,524.920654296875,540.0323390960693,515.8125]},{"page":309,"text":"operation orders.)","rect":[108.0,536.363525390625,179.1369988975525,527.275390625]},{"page":309,"text":"14-38. The movement order discusses procedures for succession of command in the march unit, march","rect":[108.0,553.8885498046875,540.0031642913818,544.8004150390625]},{"page":309,"text":"serial, and march column if those procedures vary from the unit’s established SOP. It also addresses the","rect":[108.0,565.4315185546875,539.9932527618408,556.3233642578125]},{"page":309,"text":"procedures for disseminating information; the transmission of changes in command location, including the","rect":[107.98998260498047,576.8944091796875,539.9652376251221,567.7862548828125]},{"page":309,"text":"activation of alternate command nodes. The alternate means of internal and external communications to each","rect":[107.98998260498047,586.3933715820313,540.0093288421631,579.3092651367188]},{"page":309,"text":"march unit that vary from established SOPs are included. It also addresses who has the authority to activate","rect":[107.97997283935547,599.9404296875,539.9711580352783,590.832275390625]},{"page":309,"text":"alternative routes.","rect":[107.95992279052735,609.3792724609375,179.58391857147218,602.295166015625]},{"page":309,"text":"14-39. Units base the movement order on the mission variables. The movement order establishes how the","rect":[107.95992279052735,626.9242553710938,539.9811067657471,619.820068359375]},{"page":309,"text":"unit moves from its current location to the desired location. The integration of and support from maneuver","rect":[107.94989776611328,640.4512939453125,539.9493310508728,631.3431396484375]},{"page":309,"text":"and functional and multifunctional support—such as artillery, intelligence, military police, engineers,","rect":[107.94989776611328,651.9141235351563,539.9321851730347,642.8059692382813]},{"page":309,"text":"aviation, and air support—are critical for successful tactical and nontactical movement. The commander’s","rect":[107.9499282836914,663.4171142578125,539.8921649436951,654.3289794921875]},{"page":309,"text":"staff develops the detailed movement order based on established priorities.","rect":[107.94990539550781,674.940185546875,406.73040294647219,665.85205078125]},{"page":309,"text":"14-40. The movement order and unit SOP address the possibility of ambushes, indirect fires, and air attacks.","rect":[107.94989776611328,692.425048828125,540.0281934738159,683.31689453125]},{"page":309,"text":"These SOP includes drills for reacting to these circumstances. Passive measures mitigating an air attack","rect":[107.93988037109375,703.947998046875,539.8681545257568,694.83984375]},{"page":309,"text":"include route selection, vehicle intervals, and movement during limited visibility. In case of attack, units have","rect":[107.93988037109375,715.4710693359375,540.0523958282471,706.3629150390625]},{"page":309,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":309,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":309,"text":"14-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":310,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":310,"text":"casualty evacuation plans. These plans take into account SOP items such as using combat lifesavers and","rect":[90.0,83.51434326171875,521.9041042327881,74.40616607666016]},{"page":310,"text":"dispersing medical evacuation assets throughout the convoy.","rect":[90.0,94.97723388671875,332.4669141769409,85.86905670166016]},{"page":310,"text":"14-41. For units that are not completely mobile with organic vehicles, such as an Army division","rect":[90.0,112.4921875,521.9840602874756,103.3840103149414]},{"page":310,"text":"headquarters and many sustainment units, units can either conduct a shuttle with organic vehicles or request","rect":[90.0,124.01519775390625,522.0824351272584,114.9069595336914]},{"page":310,"text":"assistance from transportation units. Shuttling requires transporting troops, equipment, and supplies by a","rect":[90.0,135.47808837890626,522.0410432891846,126.36991119384766]},{"page":310,"text":"series of round trips with the same vehicles. Units may also shuttle by carrying successive parts of a load for","rect":[90.0,147.00103759765626,521.9839379844666,137.89285278320313]},{"page":310,"text":"short distances while the remaining Soldiers continue on foot.","rect":[90.0,158.5240478515625,337.4850721359253,149.41586303710938]},{"page":310,"text":"14-42. The higher headquarters sustainment staff normally coordinates the sustainment to moving units,","rect":[90.0,175.98895263671876,522.0161695480347,166.88076782226563]},{"page":310,"text":"although units carry sufficient fuel and lubricants in their unit trains to conduct local movements. In","rect":[90.0,187.51190185546876,521.9650173187256,178.40371704101563]},{"page":310,"text":"coordination with the engineers, the sustainment staff ensures that routes suffice for the projected types and","rect":[90.0,199.034912109375,522.0853176116943,189.91671752929688]},{"page":310,"text":"numbers of vehicles and supplies. Units need to know the load carrying capability of routes and the maximum","rect":[90.0,210.497802734375,522.1012854537964,201.38961791992188]},{"page":310,"text":"distances that they can support their forces. Also, units may to need to re-task or consolidate troop carry","rect":[90.0,222.02081298828126,521.9637966156006,212.91262817382813]},{"page":310,"text":"capacity if troop transport is not provided. Sustainment operators determine if any sustainment assets displace","rect":[90.0,233.48370361328126,522.1053743438721,224.37551879882813]},{"page":310,"text":"to support the mission. Units also establish halts for refueling as part of the movement plan. Halt times should","rect":[90.0,245.0067138671875,522.0421657562256,235.89852905273438]},{"page":310,"text":"be long enough and locations large enough to allow the entire march unit to refuel.","rect":[89.9999771118164,256.5296630859375,420.7673292160034,247.42147827148438]},{"page":310,"text":"14-43. The simplest troop movement to plan and conduct is one where the commander directing the","rect":[89.9999771118164,273.99456787109377,521.9308748321533,264.8863830566406]},{"page":310,"text":"movement controls the assigned area. In this situation, units use established command and control systems.","rect":[89.9999771118164,285.5175476074219,522.0323438644409,276.40936279296877]},{"page":310,"text":"The headquarters ordering the movement schedules the movement times and approves the routes, while its","rect":[89.98994445800781,297.04052734375,522.0009906272888,287.9323425292969]},{"page":310,"text":"movements control organization allocates the required space and time on the approved routes. If the","rect":[89.98994445800781,308.50341796875,522.0574007110596,299.3952331542969]},{"page":310,"text":"movement results in a unit going outside its parent headquarters’ area, that unit requires coordination through","rect":[89.98994445800781,320.02642822265627,522.0314235687256,310.9182434082031]},{"page":310,"text":"various movement control centers. Otherwise, a higher headquarters must plan and control the movement.","rect":[89.98994445800781,331.5494079589844,514.4179639816284,322.44122314453127]},{"page":310,"text":"14-44. Whenever possible, units disperse their forces by using multiple routes to move their forces. This","rect":[89.98994445800781,349.0142822265625,522.0133197288513,339.9060974121094]},{"page":310,"text":"reduces the length of columns, vulnerability to enemy air attack, and amount of time the routes are","rect":[89.96991729736328,360.5372619628906,522.0310335235596,351.4290771484375]},{"page":310,"text":"unavailable to other units. Multiple routes provide units with the flexibility to react to unexpected situations","rect":[89.96991729736328,372.0602722167969,522.0253436546326,362.95208740234377]},{"page":310,"text":"and permit more rapid concentration of combat power. The three primary challenges of using multiple routes","rect":[89.96991729736328,383.52313232421877,522.0393817405701,374.4149475097656]},{"page":310,"text":"are in exercising command and control, providing logistic and maintenance support on all routes, and the","rect":[89.96991729736328,395.046142578125,521.9682893829346,385.9379577636719]},{"page":310,"text":"reassembly or consolidation of forces at the movement’s conclusion.","rect":[89.96991729736328,406.56915283203127,364.6381788253784,397.4609680175781]},{"page":310,"text":"14-45. Since enemy contact is less likely for troop movements that occur behind the forward line of troops","rect":[89.97994995117188,424.0340270996094,521.9058978538513,414.92584228515627]},{"page":310,"text":"or line of departure, units use march columns and serials to control the movement of forces on limited routes.","rect":[89.96993255615235,435.5369873046875,521.9541578292847,426.4488525390625]},{"page":310,"text":"Units use dispersion and multiple routes to avoid detection and increase survivability. Units plan for","rect":[89.96991729736328,447.0800476074219,522.0028588829041,437.97186279296877]},{"page":310,"text":"reconsolidation to occur after the march column or march serial passes their assigned release point.","rect":[89.96991729736328,458.5429382324219,522.0037183761597,449.43475341796877]},{"page":310,"text":"Regardless of the type of area a unit will occupy at the movement’s conclusion, planners must ensure the","rect":[89.96991729736328,470.0659484863281,521.8948030548096,460.957763671875]},{"page":310,"text":"area where forces will consolidate is defendable and large enough for all forces.","rect":[89.96991729736328,481.5288391113281,409.6200819015503,472.420654296875]},{"page":310,"text":"14-46. For movements beyond the forward line of troops or line of departure units use their preferred","rect":[89.96991729736328,499.0538330078125,521.9730129241943,489.9456481933594]},{"page":310,"text":"tactical movement formations and techniques. Tactical units do not use march columns or serials unless","rect":[89.96991729736328,510.5567932128906,521.9399554710388,501.4686584472656]},{"page":310,"text":"necessary, since enemy contact is likely and security should be balanced with speed. Units maintain","rect":[89.96991729736328,522.0397338867188,521.9195461273193,512.9315795898438]},{"page":310,"text":"dispersion between formations and plan to consolidate forces prior to entering their assault positions.","rect":[89.96991729736328,533.562744140625,493.75591564178469,524.45458984375]},{"page":310,"text":"14-47. The echelon transportation officer uses route classification components, such as route widths, route","rect":[89.96991729736328,551.0677490234375,522.0382356719971,541.9796142578125]},{"page":310,"text":"types, military load classifications, overhead clearance, route obstructions, and special conditions to","rect":[89.96991729736328,562.5506591796875,521.8871364593506,553.4425048828125]},{"page":310,"text":"determine the traffic circulation plan. A supporting geospatial engineer team provides most of this","rect":[89.96991729736328,574.0736083984375,521.9101092796326,564.9654541015625]},{"page":310,"text":"information. Engineer reconnaissance obtains necessary information not contained in existing geospatial","rect":[89.96991729736328,585.5966796875,521.9243540725709,576.4883422851563]},{"page":310,"text":"databases.","rect":[89.96990203857422,595.0353393554688,130.81145763397218,587.951171875]},{"page":310,"text":"14-48. The staff depicts the echelon traffic circulation plan on overlays using transportation control","rect":[89.96994018554688,614.5844116210938,521.9943003616334,605.4762573242188]},{"page":310,"text":"measures. The traffic circulation plan considers—","rect":[89.96995544433594,626.08740234375,289.9491081237793,616.999267578125]},{"page":310,"text":" The most restrictive route features and route designations.","rect":[115.19999694824219,639.4743041992188,365.3834180831909,630.3661499023438]},{"page":310,"text":" Direction of movement over each route.","rect":[115.19999694824219,650.9502563476563,293.1422071456909,643.8661499023438]},{"page":310,"text":" Location of boundaries, units, highway regulation points, TCPs, and principal supply points.","rect":[115.19999694824219,666.4743041992188,503.14544200897219,657.3661499023438]},{"page":310,"text":" Major geographic features.","rect":[115.19999694824219,679.9743041992188,241.24164867401124,670.8560791015625]},{"page":310,"text":" Routes designated for one-way traffic.","rect":[115.19999694824219,693.4743041992188,286.82964611053469,684.3661499023438]},{"page":310,"text":" Separate routes for sustainment and tactical units.","rect":[115.19999694824219,706.9542846679688,331.7842969894409,697.8661499023438]},{"page":310,"text":"14-10","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":310,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":310,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":311,"text":"Troop Movement","rect":[467.5199890136719,46.224021911621097,539.9960844726562,38.016021728515628]},{"page":311,"text":" Current data on traffic regulations and control restrictions, obstructions, detours, defiles,","rect":[133.1999969482422,83.51434326171875,540.0560255050659,74.40616607666016]},{"page":311,"text":"capacities, surface conditions, and enemy activities that affect the highway net.","rect":[151.1999969482422,94.97723388671875,467.50551891326907,85.86905670166016]},{"page":311,"text":"14-49. The provost marshal prepares a traffic control plan from information contained in the traffic","rect":[108.00377655029297,112.47215270996094,540.0050325469971,103.3840103149414]},{"page":311,"text":"circulation plan. The traffic control plan is normally prepared in the form of an overlay. Units use available","rect":[108.00376892089844,124.01519775390625,540.0052766876221,114.90702056884766]},{"page":311,"text":"aviation elements, movement regulating teams, and military police units to assist in traffic control, but they","rect":[108.00379943847656,135.47808837890626,539.9741115570068,126.36991119384766]},{"page":311,"text":"can assign this mission to other elements, such as battalion scout platoons.","rect":[108.00377655029297,147.00103759765626,405.52675914764407,137.89285278320313]},{"page":311,"text":"PREPARING A TROOP MOVEMENT","rect":[90.0,172.28965759277345,329.1208633079529,162.6015167236328]},{"page":311,"text":"14-50. Reconnaissance precedes unit movement. Before a unit starts any march, a reconnaissance element","rect":[108.0,192.59429931640626,540.0777964553834,183.48611450195313]},{"page":311,"text":"from that unit reconnoiters the route from its current location to the SP and determines how long it will take","rect":[108.0,204.1173095703125,540.0083284454346,195.00912475585938]},{"page":311,"text":"the unit to reach the SP. This reconnaissance element continues beyond the SP and carefully examines the","rect":[108.0,215.5802001953125,540.0021028594971,206.47201538085938]},{"page":311,"text":"route’s trafficability, including the impact of weather, road surfaces, and terrain and civil considerations, such","rect":[108.0,227.1031494140625,539.9736843109131,217.99496459960938]},{"page":311,"text":"as local nation use. This reconnaissance also includes alternative routes and choke points, such as defiles,","rect":[107.98999786376953,238.54600524902345,540.0003004074097,229.45785522460938]},{"page":311,"text":"bridges, and fords, which could slow the march. This reconnaissance element complements map and technical","rect":[107.97994995117188,250.08905029296876,539.9667124710084,240.98086547851563]},{"page":311,"text":"reconnaissance and provides units with important information about the terrain, obstacles, and potential","rect":[107.97994995117188,261.5920104980469,540.0584483108521,252.50387573242188]},{"page":311,"text":"enemy forces in the area. Units then establish TCPs at critical locations or mark important information to","rect":[107.97994995117188,273.074951171875,539.9147853851318,263.9667663574219]},{"page":311,"text":"avoid confusion.","rect":[107.97994995117188,282.5738830566406,174.68407726287843,275.48974609375]},{"page":311,"text":"14-51. A quartering party often accompanies reconnaissance elements to mark routes and BPs. The","rect":[107.97994995117188,302.1129150390625,540.0451936798096,293.0047302246094]},{"page":311,"text":"quartering party may also secure new positions with observation posts or limited forces until the unit","rect":[107.9800033569336,313.5757751464844,540.0600962600709,304.46759033203127]},{"page":311,"text":"conducting the movement arrives.","rect":[107.9799575805664,325.0987548828125,244.10366344451905,315.9905700683594]},{"page":311,"text":"14-52. The unit begins a tactical movement, such as an approach march, fully supplied. The unit refuels at","rect":[107.9799575805664,342.6237487792969,540.0001597366334,333.51556396484377]},{"page":311,"text":"every opportunity, such as at halts and on arrival at the final destination. The transportation of fuel and the","rect":[107.9799575805664,354.0866394042969,540.0030183868408,344.97845458984377]},{"page":311,"text":"security of existing stockpiles are major factors in any mounted movement. Commanders may choose to","rect":[107.97996520996094,365.609619140625,540.0009670257568,356.4914245605469]},{"page":311,"text":"conduct a refuel on the move to extend the range of the unit’s vehicles. Refuel on the move is a technique","rect":[107.98999786376953,377.13262939453127,539.9705476837158,368.0244445800781]},{"page":311,"text":"where units position tankers just off the route to refuel vehicles rapidly. Such refueling provides only","rect":[107.98999786376953,388.59552001953127,539.9521999359131,379.4773254394531]},{"page":311,"text":"established quantities necessary to extend the vehicles’ range to the desired distance. The type and method","rect":[107.98999786376953,400.1185302734375,539.9803371429443,391.0103454589844]},{"page":311,"text":"of movement selected will determine the need for pre-positioned sustainment assets to conduct rapid and","rect":[107.97997283935547,411.6214904785156,539.9901638031006,402.5333557128906]},{"page":311,"text":"efficient refueling and resupply.","rect":[107.97994995117188,423.1044006347656,236.24293041229249,413.9962158203125]},{"page":311,"text":"EXECUTING A TROOP MOVEMENT","rect":[90.0,448.3497009277344,330.682417263031,438.66156005859377]},{"page":311,"text":"14-53. A unit’s ability to move depends on its march discipline and ability to maintain required movement","rect":[108.0,468.654296875,540.0784678421021,459.5461120605469]},{"page":311,"text":"standards and procedures as prescribed by its movement SOP and movement order. This includes staying on","rect":[107.99002075195313,480.17730712890627,539.9047756195068,471.0691223144531]},{"page":311,"text":"the route and maintaining start, passage, and clear times. March discipline is essential throughout the","rect":[107.99002075195313,491.6401672363281,540.0486116485596,482.531982421875]},{"page":311,"text":"movement. Any deviation from the movement order may interfere with the movements of other units and","rect":[107.99002075195313,503.1631774902344,539.9418239593506,494.05499267578127]},{"page":311,"text":"may have serious consequences. However, march discipline can only be maintained with established","rect":[107.98999786376953,514.6861572265625,539.8978786468506,505.5779724121094]},{"page":311,"text":"movement control.","rect":[107.98998260498047,524.125,183.5708417892456,517.0408935546875]},{"page":311,"text":"14-54. Movement control is the dual process of committing allocated transportation assets and regulating","rect":[107.98998260498047,543.674072265625,540.0006008148193,534.5658569335938]},{"page":311,"text":"movements according to command priorities to synchronize distribution flow over lines of communications","rect":[107.98999786376953,555.197021484375,539.9809710960388,546.0888671875]},{"page":311,"text":"to sustain land forces (ADP 4-0). It is on a continuum involving coordinating and integrating logistics,","rect":[107.98998260498047,566.659912109375,539.8881788253784,557.5517578125]},{"page":311,"text":"movement information, and programs that span all the levels of warfare. The balancing of requirements","rect":[107.97994995117188,578.1829223632813,539.9641864280701,569.0747680664063]},{"page":311,"text":"against capabilities and assigning resources based on the commander’s priorities guide the conduct of","rect":[107.97994995117188,589.7059326171875,540.0423486289978,580.5977783203125]},{"page":311,"text":"movement control. Movement control gives commanders the ability to deconflict the movement of units—","rect":[107.97994995117188,601.1688232421875,539.9822807312012,592.0606689453125]},{"page":311,"text":"troop movement—and the distribution of supplies and services inherent in sustainment.","rect":[107.97997283935547,612.6717529296875,457.6440382003784,603.5836181640625]},{"page":311,"text":"14-55. Units may not move across boundaries into another unit’s assigned area without receiving clearance","rect":[107.97997283935547,630.216796875,540.1134920196533,621.108642578125]},{"page":311,"text":"from the owning unit. The designation, maintenance, route security, and control of movement along routes","rect":[107.98001098632813,641.6796264648438,539.9513080101013,632.5714721679688]},{"page":311,"text":"in an assigned area are the responsibility of the owning unit unless the higher echelon’s coordinating","rect":[107.98002624511719,653.2026977539063,539.9894313812256,644.094482421875]},{"page":311,"text":"instructions direct otherwise. An example is when one or more routes are reserved for the exclusive use of a","rect":[107.96990203857422,664.7056274414063,540.0984773712158,655.6174926757813]},{"page":311,"text":"combined arms battalion operating forward of a BCT as a guard force. (See ATP 4-16 for a more information","rect":[107.96995544433594,676.1885375976563,539.9441432952881,667.0803833007813]},{"page":311,"text":"on movement control and the establishment of route synchronization measures.)","rect":[107.96991729736328,687.7115478515625,428.46480346298218,678.6033935546875]},{"page":311,"text":"14-56. The strength and composition of the moving unit’s security elements vary depending on the mission","rect":[107.96991729736328,705.2365112304688,539.9324855804443,696.1283569335938]},{"page":311,"text":"variables. Units employ organic assets and supporting security assets to protect forces from enemy activities.","rect":[107.94990539550781,716.6994018554688,539.8724317550659,707.5912475585938]},{"page":311,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":311,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":311,"text":"14-11","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":312,"text":"Chapter 14","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":312,"text":"They position them to the front, rear, flanks, and above, of formations while moving and at the halt to provide","rect":[90.0,83.51434326171875,522.0122957305908,74.40616607666016]},{"page":312,"text":"all around security for the main body. Units can also enhance security by adopting a march formation and","rect":[90.0,94.97723388671875,521.9678859710693,85.86905670166016]},{"page":312,"text":"movement technique that facilitates applying combat power in the direction enemy contact is expected.","rect":[90.0,106.500244140625,502.6430311203003,97.3920669555664]},{"page":312,"text":"14-57. Higher echelon sustainment organizations may support some tactical movements. When the","rect":[90.0,124.02520751953125,522.0042390899658,114.91703033447266]},{"page":312,"text":"situation permits, sustainment organizations establish maintenance, ambulance exchange, and supply points","rect":[90.0,135.48809814453126,522.0541522483826,126.37992095947266]},{"page":312,"text":"along the route to support the movement. While procedures, amounts, and types of external support vary,","rect":[90.0,147.0111083984375,522.0001173019409,137.90292358398438]},{"page":312,"text":"each sustainment organization ensures that these sites are operational at the designated times and locations.","rect":[90.0,158.5340576171875,521.9687452316284,149.42587280273438]},{"page":312,"text":"External sustainment along the route may include aeromedical evacuation, maintenance, water, petroleum,","rect":[90.0,169.9969482421875,521.9866895675659,160.88876342773438]},{"page":312,"text":"oils, and lubricants. Maintenance sites generally consist of maintenance collection points where disabled","rect":[90.0,181.51995849609376,521.9576930999756,172.41165161132813]},{"page":312,"text":"vehicles can be moved for limited maintenance and Class IX supplies. Vehicles unable to continue the","rect":[90.0,193.02293395996095,521.9272737579346,183.93478393554688]},{"page":312,"text":"movement remain at maintenance collection points and join their parent organization when repaired. The","rect":[90.0,204.505859375,522.0652742462158,195.38766479492188]},{"page":312,"text":"troop movement is complete when the last march unit clears the RP.","rect":[90.0,216.0088348388672,362.7385206222534,206.92068481445313]},{"page":312,"text":"14-12","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":312,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":312,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":313,"text":"Chapter 15","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":313,"text":"Relief in Place","rect":[260.760009765625,150.95619201660157,369.2618565826416,139.11740112304688]},{"page":313,"text":"This chapter discusses the general considerations of conducting a relief in place. It then","rect":[126.0,188.7806854248047,504.1107578277588,178.79986572265626]},{"page":313,"text":"discusses the organization of forces, control measures, planning, and preparation","rect":[126.0,201.4405975341797,503.9483127593994,191.45977783203126]},{"page":313,"text":"associated with a relief in place. Lastly, this chapter discusses the execution of a relief ","rect":[126.0,214.10057067871095,506.78891468048098,204.1197509765625]},{"page":313,"text":"in place.","rect":[126.0,226.738525390625,163.25403308868409,216.7796630859375]},{"page":313,"text":"GENERAL CONSIDERATIONS OF A RELIEF IN PLACE","rect":[90.0,252.08970642089845,452.4385818138123,242.4015655517578]},{"page":313,"text":"15-1. Units conduct a relief in place as part of a larger operation, primarily to maintain the combat","rect":[108.0,272.394287109375,540.0755991897584,263.2861022949219]},{"page":313,"text":"effectiveness of committed force. The higher echelon headquarters directs when and where to conduct the","rect":[108.0,283.857177734375,539.9117708282471,274.7489929199219]},{"page":313,"text":"relief and establishes the appropriate control measures. A relief may serve to free the relieved unit for other","rect":[108.0,295.3801574707031,539.9733178672791,286.27197265625]},{"page":313,"text":"tasks such as decontamination, reconstitution, routine rest, resupply, maintenance, specialized training,","rect":[108.0,306.9031677246094,540.0350294113159,297.79498291015627]},{"page":313,"text":"resuming offensive operations, or as part of a deception operation. For example, the enemy’s reaction to","rect":[108.0,318.3660583496094,539.9020900726318,309.25787353515627]},{"page":313,"text":"friendly forces conducting a relief may cause it to move reserves from an area where the friendly commander","rect":[108.0,329.8890380859375,540.0714013633728,320.7808532714844]},{"page":313,"text":"wants to conduct a penetration.","rect":[108.0,341.3919982910156,232.72500133514405,332.3038635253906]},{"page":313,"text":"15-2. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is","rect":[108.0,358.8769226074219,539.9634540061951,349.76873779296877]},{"page":313,"text":"replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and","rect":[108.00000762939453,370.39990234375,540.0244045257568,361.2917175292969]},{"page":313,"text":"the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). In this operation, the","rect":[108.00000762939453,381.92291259765627,539.9852571563721,372.8147277832031]},{"page":313,"text":"responsibilities of the replaced elements for the mission and the assigned area transfer to the incoming unit.","rect":[108.0000228881836,393.38580322265627,539.9822950363159,384.2776184082031]},{"page":313,"text":"The three variations of a relief are sequential, simultaneous, or staggered:","rect":[108.00003814697266,404.9087829589844,401.8336863479614,395.80059814453127]},{"page":313,"text":" A sequential relief in place occurs when each element within the relieved unit is relieved in","rect":[133.1999969482422,418.3742980957031,540.0231838226318,409.26611328125]},{"page":313,"text":"succession, from right to left, left to right, front to rear, or rear to front (ADP 3-90).","rect":[151.20004272460938,429.8973083496094,484.66570568084719,420.78912353515627]},{"page":313,"text":" A simultaneous relief in place occurs when all elements are relieved at the same time (ADP 3-90).","rect":[133.1999969482422,443.394287109375,539.9960279464722,434.2861022949219]},{"page":313,"text":" A staggered relief in place occurs when each element is relieved in a sequence determined by the","rect":[133.1999969482422,456.894287109375,540.0868196563721,447.7861022949219]},{"page":313,"text":"tactical situation, not its geographical orientation (ADP 3-90).","rect":[151.20999145507813,468.357177734375,399.2350721359253,459.2489929199219]},{"page":313,"text":"15-3. Simultaneous relief takes the least time to execute but is more easily detected by enemy forces.","rect":[108.01377868652344,485.88214111328127,540.0410108566284,476.7739562988281]},{"page":313,"text":"Sequential or staggered reliefs can occur over a significant amount of time. These three relief techniques can","rect":[108.01377868652344,497.4051513671875,539.9785060882568,488.2969665527344]},{"page":313,"text":"occur regardless of the type of operation in which the unit is participating.","rect":[108.01377868652344,508.8680419921875,404.3953809738159,499.7598571777344]},{"page":313,"text":"15-4. A relief in place is characterized as either deliberate or hasty, depending on the amount of planning","rect":[108.0137939453125,526.3930053710938,539.9576930999756,517.2848510742188]},{"page":313,"text":"and preparations associated with the relief in place. The major differences are the depth and detail of planning","rect":[108.01380157470703,537.916015625,540.0107326507568,528.7977905273438]},{"page":313,"text":"and, potentially, the execution time. Detailed planning generally facilitates shorter execution time by","rect":[108.0137939453125,549.37890625,540.0401515960693,540.270751953125]},{"page":313,"text":"determining exactly what units need to do and the resources needed to accomplish the mission. Deliberate","rect":[108.01380157470703,560.90185546875,539.9099397735596,551.793701171875]},{"page":313,"text":"planning allows commanders and staffs to identify, develop, and coordinate solutions to potential problems","rect":[108.01380157470703,572.36474609375,539.9044330101013,563.256591796875]},{"page":313,"text":"before they occur and to ensure the availability of resources when and where needed.","rect":[108.01380157470703,583.8877563476563,448.4985303878784,574.7796020507813]},{"page":313,"text":"ORGANIZATION OF FORCES FOR A RELIEF IN PLACE","rect":[90.0,609.1497192382813,458.2317947044373,599.4615478515625]},{"page":313,"text":"15-5. When possible, both units involved in a relief in place should be of similar type—such as Armor","rect":[108.0,629.4542846679688,539.9731347618103,620.3461303710938]},{"page":313,"text":"company or light infantry battalion—and task-organized to help maintain operations security. If not, the","rect":[108.0,640.977294921875,540.0063142852783,631.869140625]},{"page":313,"text":"incoming commander decides on which positions to man, which to not man, and where to establish new","rect":[108.00003814697266,652.440185546875,540.0144085922241,643.33203125]},{"page":313,"text":"positions. The incoming unit assumes the same task organization as the outgoing unit but adjusts it based on","rect":[108.00003051757813,663.9631958007813,540.0262355804443,654.844970703125]},{"page":313,"text":"its modified tables of organization and equipment. It assigns responsibilities and deploys in a configuration","rect":[108.00003051757813,675.4862060546875,539.9189357757568,666.3780517578125]},{"page":313,"text":"similar to the outgoing unit.","rect":[108.0,686.9490966796875,219.4064130783081,677.8409423828125]},{"page":313,"text":"15-6. The incoming unit establishes advance parties to conduct detailed coordination and preparations for","rect":[108.0,704.4740600585938,540.0009667930603,695.3659057617188]},{"page":313,"text":"the operation, down to the company level and possibly to the platoon level. These advance parties infiltrate","rect":[108.0,715.9970703125,539.9548616485596,706.888916015625]},{"page":313,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":313,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":313,"text":"15-1","rect":[504.00299072265627,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":314,"text":"Chapter 15","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":314,"text":"forward to avoid detection. They normally include the echelon’s tactical command post, which co-locates","rect":[90.0,83.51434326171875,521.9331805686951,74.40616607666016]},{"page":314,"text":"with the main command post of the outgoing unit. Commanders may also attach liaison personnel to","rect":[90.0,94.97723388671875,521.9269924163818,85.86905670166016]},{"page":314,"text":"subordinate units to ensure a smooth transition between units.","rect":[90.0,104.47620391845703,336.8426160812378,97.3920669555664]},{"page":314,"text":"CONTROL MEASURES FOR A RELIEF IN PLACE","rect":[72.0,131.78965759277345,396.37653957748418,122.11549377441406]},{"page":314,"text":"15-7. Control measures associated with a relief in place are generally restrictive to prevent fratricide. At a","rect":[90.0,152.09429931640626,522.0240755157471,142.98611450195313]},{"page":314,"text":"minimum, these measures include the assigned area with its associated boundaries and current positions.","rect":[89.98997497558594,163.6173095703125,521.9703931808472,154.50912475585938]},{"page":314,"text":"Other graphics to help with the coordination of the relief in place include—","rect":[89.98997497558594,175.0802001953125,392.1530876159668,165.97201538085938]},{"page":314,"text":" Point control measures such as coordination points, contact points, start points, and release points.","rect":[115.19999694824219,188.5542449951172,522.0523023605347,179.46609497070313]},{"page":314,"text":" Movement control measures such as routes, passage lanes, and gaps.","rect":[115.19999694824219,202.07427978515626,407.5607862472534,192.96609497070313]},{"page":314,"text":" Assembly areas.","rect":[115.19999694824219,215.57427978515626,198.76287364959718,206.46609497070313]},{"page":314,"text":" Fire support coordination measures such as target reference points and engagement areas and","rect":[115.19999694824219,229.07427978515626,522.0270900726318,219.96609497070313]},{"page":314,"text":"defensive direct fire control measures, such as TRPs and engagement areas.","rect":[133.1999969482422,240.5972900390625,435.8341016769409,231.48910522460938]},{"page":314,"text":"Units may use any additional graphic control measures necessary to prevent fratricide and to control a relief ","rect":[90.01380157470703,255.05615234375,524.5120801925659,245.94796752929688]},{"page":314,"text":"in place. Figure 15-1 depicts an example brigade relief in place.","rect":[90.01380157470703,266.57916259765627,344.85747814178469,257.4709777832031]},{"page":314,"text":"Figure 15-1. Example of a brigade relief in place","rect":[183.90121459960938,585.0548706054688,410.0967550201416,575.6661376953125]},{"page":314,"text":"PLANNING A RELIEF IN PLACE","rect":[72.0,616.3497314453125,285.8534072532654,606.6615600585938]},{"page":314,"text":"15-8. Once ordered to conduct a relief in place, the incoming unit contacts the outgoing unit. If possible,","rect":[90.0,636.654296875,521.9270582199097,627.546142578125]},{"page":314,"text":"they coordinate to co-locate their command posts to facilitate coordination between the two units. If the","rect":[90.0,648.1171875,522.0524568634033,639.009033203125]},{"page":314,"text":"outgoing unit’s forward elements can defend the assigned area, the incoming unit executes the relief in place","rect":[90.0000228881836,659.6401977539063,521.9503450469971,650.5320434570313]},{"page":314,"text":"from the rear to the front. This facilitates movement and terrain management.","rect":[89.99002075195313,671.10302734375,399.63323497772219,661.994873046875]},{"page":314,"text":"15-9. In a deliberate relief, units exchange plans and liaison personnel, conduct briefings, perform detailed","rect":[89.99002075195313,688.6180419921875,522.0133571624756,679.5098876953125]},{"page":314,"text":"reconnaissance, and publish orders with detailed instructions. In a hasty relief, commanders abbreviate the","rect":[89.98998260498047,700.1409912109375,521.9966707305908,691.0328369140625]},{"page":314,"text":"planning process and control execution. In both cases, the outgoing unit designates liaison personnel from its","rect":[89.98998260498047,711.6038818359375,522.0440204124451,702.4957275390625]},{"page":314,"text":"15-2","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":314,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":314,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":315,"text":"Relief in Place","rect":[478.97998046875,44.55902099609375,540.0126059570313,37.90802001953125]},{"page":315,"text":"combat, functional, and multifunctional support and sustainment elements to remain with the incoming unit","rect":[108.0,83.51434326171875,540.0220103225709,74.40616607666016]},{"page":315,"text":"until completing the necessary plans. The incoming unit receives current intelligence, operations, and","rect":[108.0,94.97723388671875,540.0843410491943,85.86905670166016]},{"page":315,"text":"sustainment information from the outgoing unit as well as from common higher echelon headquarters,","rect":[108.0,106.500244140625,540.0382032394409,97.3920669555664]},{"page":315,"text":"adjacent units, and subordinate elements. The complexity of a relief in place requires extensive liaison and","rect":[108.0,118.023193359375,539.9016017913818,108.90499877929688]},{"page":315,"text":"reconnaissance. Exchanging information about enemy forces and civilian situations, friendly dispositions,","rect":[108.0,129.486083984375,540.0119581222534,120.3779067993164]},{"page":315,"text":"terrain analysis, and fire support and obstacle plans—coupled with reconnaissance—helps relieving units","rect":[108.0,141.00909423828126,540.0484149436951,131.90090942382813]},{"page":315,"text":"plan and execute the mission.","rect":[108.0,152.51206970214845,226.0045576095581,143.42391967773438]},{"page":315,"text":"15-10. The relief is a vulnerable operation. The units involved concentrate on security while preparing for","rect":[108.0,169.9969482421875,539.9720361289978,160.88876342773438]},{"page":315,"text":"and executing the operation. The intent of the operation is to complete the relief without discovery by enemy","rect":[108.0,181.51995849609376,539.9940700531006,172.41177368164063]},{"page":315,"text":"forces. Consequently, units typically plan reliefs for execution during periods of reduced visibility such as","rect":[108.0,193.04296875,540.0069110374451,183.93478393554688]},{"page":315,"text":"night or fog. Concealing the relief from enemy forces is a primary concern when the unit conducts the relief","rect":[108.0,204.505859375,539.9791162071228,195.39767456054688]},{"page":315,"text":"as part of an economy of force measure to free forces for other operations. Enemy forces should perceive","rect":[108.0,216.02880859375,539.9386873321533,206.92062377929688]},{"page":315,"text":"only one unit’s command structure in operation—the outgoing unit—until the operation is complete. This","rect":[108.0,227.49169921875,539.9923236351013,218.38351440429688]},{"page":315,"text":"requires a detailed knowledge of friendly vulnerabilities. If the enemy should detect the relief and attack","rect":[108.0,239.01470947265626,539.8980617523193,229.90652465820313]},{"page":315,"text":"during the transition, the outgoing unit commander controls all units in the assigned area unless otherwise","rect":[108.0,250.5377197265625,539.9599275665283,241.42953491210938]},{"page":315,"text":"specified in the operation order.","rect":[108.0,261.9805603027344,235.48745250701905,252.89242553710938]},{"page":315,"text":"15-11. Generally, as soon as the mutual higher echelon headquarters issues the warning order, the","rect":[107.98998260498047,279.52557373046877,540.1254549102783,270.4173889160156]},{"page":315,"text":"commander of the incoming unit co-locates the tactical command post—with the main command post of the","rect":[107.98997497558594,291.048583984375,540.0412874298096,281.9403991699219]},{"page":315,"text":"outgoing unit. At a minimum, the incoming unit establishes communications and liaison with the outgoing","rect":[107.9899673461914,302.511474609375,539.9472560882568,293.4032897949219]},{"page":315,"text":"unit. The warning order designates the time of relief, relieving and relieved units, and sequence of events. It","rect":[107.98999786376953,314.03448486328127,540.0090708694459,304.92620849609377]},{"page":315,"text":"specifies the future missions of the outgoing unit, route priorities, any restrictions on advance parties, any","rect":[107.98998260498047,325.5574951171875,539.9542140960693,316.4493103027344]},{"page":315,"text":"extraordinary security measures, and the time and place for issuing the complete order. During a relief in","rect":[107.98998260498047,337.02032470703127,539.9769802093506,327.9121398925781]},{"page":315,"text":"place, commanders and leaders from the incoming unit conduct a reconnaissance of the area they are to","rect":[107.98998260498047,348.5433349609375,539.9115505218506,339.4351501464844]},{"page":315,"text":"assume. The reconnaissance focuses on routes into the area, routes to positions, the positions themselves, the","rect":[107.98998260498047,360.0462951660156,540.0665559844971,350.9581604003906]},{"page":315,"text":"current disposition of the outgoing unit, and any obstacles that could affect troop movement.","rect":[107.98998260498047,371.5292053222656,478.1749219894409,362.4210205078125]},{"page":315,"text":"15-12. The two commanders of the units conducting the relief decide on a time or an event that initiates the","rect":[107.98998260498047,389.05419921875,540.0483675079346,379.9460144042969]},{"page":315,"text":"passage of command. This allows the smooth transition of command from one commander to another.","rect":[107.97989654541016,400.57720947265627,540.0079908370972,391.4690246582031]},{"page":315,"text":"Normally, this occurs when the frontline subordinate commanders have assumed responsibility for their","rect":[107.97989654541016,412.04010009765627,539.8726708946228,402.9319152832031]},{"page":315,"text":"respective assigned areas, and the incoming commander has established sufficient communications to control","rect":[107.97989654541016,423.5631103515625,540.0181040725709,414.4549255371094]},{"page":315,"text":"the operation. Regardless of their parent organization, all units in the assigned area come under the","rect":[107.97989654541016,435.08612060546877,540.0483675079346,425.9779357910156]},{"page":315,"text":"operational control of a single commander if the units come under attack or when a specified event occurs","rect":[107.97993469238281,446.54901123046877,540.0263202171326,437.4408264160156]},{"page":315,"text":"during the relief.","rect":[107.96991729736328,458.072021484375,174.91456127166749,448.9638366699219]},{"page":315,"text":"15-13. The fire support coordinators establish FSCMs and identify artillery and other available fire support","rect":[107.96991729736328,475.5368957519531,540.0693736038209,466.4287109375]},{"page":315,"text":"units to support the relief. The incoming unit adopts the fire plan of the outgoing unit, and both units support","rect":[107.97993469238281,487.0599060058594,540.0178599319459,477.95172119140627]},{"page":315,"text":"the relief. This maintains fire support if enemy forces detect the relief and try to exploit the situation. Units","rect":[107.97993469238281,498.5829162597656,539.8592059593201,489.4747314453125]},{"page":315,"text":"plan their fires to deceive enemy forces and expedite the relief. Units also ensure that they maintain normal","rect":[107.97993469238281,510.0458068847656,539.9305186233521,500.9376220703125]},{"page":315,"text":"activity patterns. For example, a unit continues to expend the same average number of artillery rounds per","rect":[107.97993469238281,521.56884765625,539.9922998008728,512.460693359375]},{"page":315,"text":"day during the relief that it expended before the initiation of the relief. Units do not relieve fire support or","rect":[107.97993469238281,533.091796875,539.9521997032166,523.983642578125]},{"page":315,"text":"functional and multifunctional support and sustainment units at the same time as the maneuver units they","rect":[107.96991729736328,544.5546875,539.9882717132568,535.446533203125]},{"page":315,"text":"support. They relieve those organizations before or after the primary relief operation.","rect":[107.96991729736328,556.0777587890625,448.0949354171753,546.9696044921875]},{"page":315,"text":"15-14. The relief plan specifies the method used in relieving artillery units. If terrain allows, incoming","rect":[107.96991729736328,573.6027221679688,539.9700832366943,564.4945678710938]},{"page":315,"text":"artillery units do not occupy previously used firing positions. Instead, incoming firing units establish firing","rect":[107.96991729736328,585.0656127929688,539.8420925140381,575.9574584960938]},{"page":315,"text":"positions near the firing positions of the outgoing unit and carefully integrate their fires with the relieved","rect":[107.96991729736328,596.588623046875,540.0371608734131,587.48046875]},{"page":315,"text":"unit. Occupying firing positions at night or during periods of poor visibility enhances OPSEC.","rect":[107.96991729736328,608.1116333007813,484.9323682785034,599.0034790039063]},{"page":315,"text":"15-15. Units ensure air and missile defense units provide area coverage of the incoming forces. Typically,","rect":[107.95994567871094,625.5765380859375,539.9892530441284,616.4683837890625]},{"page":315,"text":"air defense units focus their available assets at critical sites, such as identified choke points, BPs, assembly","rect":[107.9499282836914,637.0995483398438,539.9763088226318,627.9913940429688]},{"page":315,"text":"areas, and command posts.","rect":[107.9499282836914,648.6025390625,215.45550060272218,639.514404296875]},{"page":315,"text":"15-16. Handover of obstacles is a complex procedure. The incoming unit verifies the obstacle records of","rect":[107.9499282836914,666.08740234375,540.0102441368103,656.979248046875]},{"page":315,"text":"the outgoing unit. Initially, the engineer priority is to provide mobility to the incoming unit. It focuses on the","rect":[107.9499282836914,677.6104125976563,540.0371980743408,668.5022583007813]},{"page":315,"text":"routes and lanes leading into the assigned area. Once the relief occurs, priority of the mobility and","rect":[107.9499282836914,689.1334228515625,539.9832668304443,680.0252685546875]},{"page":315,"text":"survivability effort transitions to support the incoming unit’s continuing mission. Units may require","rect":[107.9499282836914,700.5963134765625,539.9542512969971,691.4881591796875]},{"page":315,"text":"additional engineer support to assist with survivability tasks to support the incoming force.","rect":[107.9499282836914,712.1193237304688,470.9324903488159,703.0111694335938]},{"page":315,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":315,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":315,"text":"15-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":316,"text":"Chapter 15","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":316,"text":"15-17. Force intermingling is inherent in a relief. The consequences of mutual interference between the","rect":[90.0,83.51434326171875,522.0363435821533,74.40616607666016]},{"page":316,"text":"units and the complexity associated with such areas as traffic control, fire support coordination, obstacle","rect":[89.98998260498047,94.97723388671875,521.9119539337158,85.86905670166016]},{"page":316,"text":"plans, and communications require close coordination among all headquarters involved. Commanders","rect":[89.98998260498047,106.500244140625,522.1062152366638,97.3920669555664]},{"page":316,"text":"establish early liaison between the incoming and outgoing forces. The relief plan also addresses the relief in","rect":[89.98998260498047,118.023193359375,522.0132350921631,108.9150161743164]},{"page":316,"text":"place of these computer networks and information systems.","rect":[89.98998260498047,129.486083984375,327.69353771209719,120.3779067993164]},{"page":316,"text":"15-18. The incoming unit is responsible for all sustainment operations. As the support elements of the","rect":[89.98998260498047,147.0111083984375,522.0873689727783,137.90292358398438]},{"page":316,"text":"outgoing unit displace, they leave the incoming unit supply stocks based on previous coordination. If the","rect":[89.98998260498047,158.5340576171875,521.9623689727783,149.42587280273438]},{"page":316,"text":"units conducting the relief have different modified tables of organization and equipment, units conduct a","rect":[89.98998260498047,169.9969482421875,521.9733553009033,160.88876342773438]},{"page":316,"text":"mission analysis to determine the method the relieving unit will use to meet its responsibilities and the","rect":[89.98999786376953,181.51995849609376,522.0574007110596,172.41177368164063]},{"page":316,"text":"weapons systems it will use. The unit staff must determine any special support requirements the incoming","rect":[89.98994445800781,193.04296875,521.9802761077881,183.93478393554688]},{"page":316,"text":"unit will have and address supporting those requirements with the available supporting sustainment","rect":[89.98994445800781,204.505859375,522.0243906936646,195.39767456054688]},{"page":316,"text":"organizations. The unit sustainment staff ensures that both commanders are aware of constraints that may","rect":[89.98994445800781,216.02880859375,521.9843044281006,206.92062377929688]},{"page":316,"text":"affect the incoming unit. The headquarters of the outgoing unit coordinates traffic movement into and out of","rect":[89.98994445800781,227.49169921875,521.9648950157166,218.38351440429688]},{"page":316,"text":"the assigned area.","rect":[89.98994445800781,239.01470947265626,160.77123546600343,229.90652465820313]},{"page":316,"text":"PREPARING FOR A RELIEF IN PLACE","rect":[72.0,264.2696838378906,327.43830715560918,254.58155822753907]},{"page":316,"text":"15-19. Units conceal the relief from enemy forces for as long as possible. At the first indication that a relief","rect":[90.0,284.5743103027344,522.0442407188416,275.46612548828127]},{"page":316,"text":"is necessary, which is usually the warning order for the incoming unit, both the outgoing and incoming units","rect":[90.0,296.0973205566406,521.9959247093201,286.9891357421875]},{"page":316,"text":"review their OPSEC plans and procedures. Units may use military deception measures when conducting a","rect":[90.0,307.5601806640625,521.9762239532471,298.4519958496094]},{"page":316,"text":"relief in place to maintain secrecy. To maintain security during a relief in place, the incoming unit makes","rect":[90.0,319.08319091796877,522.0027606468201,309.9750061035156]},{"page":316,"text":"maximum use of the outgoing unit’s radio networks and operators. Both units involved in the relief operate","rect":[90.0,330.606201171875,521.9763460235596,321.4980163574219]},{"page":316,"text":"on the command frequencies and encryption variables of the combat net radios of the outgoing unit at all","rect":[90.0,342.0690612792969,521.9829478225709,332.96087646484377]},{"page":316,"text":"levels.","rect":[90.0,351.5680236816406,115.84458446502686,344.48388671875]},{"page":316,"text":"15-20. The units conducting a relief in place conduct rehearsals to discover any weaknesses in the plan and","rect":[90.0,371.1070251464844,522.0527858734131,361.99884033203127]},{"page":316,"text":"familiarize all elements of both forces with the plan. Finding time for rehearsals requires commanders and","rect":[90.0,382.5699157714844,522.0574855804443,373.46173095703127]},{"page":316,"text":"staffs to focus on time management.","rect":[90.0,394.0928955078125,235.0044813156128,384.9847106933594]},{"page":316,"text":"15-21. Reconnaissance elements of the incoming unit precede its movement with a route reconnaissance of","rect":[90.0,411.6178894042969,522.0413110313416,402.50970458984377]},{"page":316,"text":"the assembly area. They conduct reconnaissance of the routes leading from the assembly areas to the positions","rect":[90.0,423.08074951171877,522.0634295921326,413.9725646972656]},{"page":316,"text":"of the outgoing unit. The commander of the incoming unit normally conducts a leader’s reconnaissance","rect":[90.00003814697266,434.603759765625,522.0574617462158,425.4955749511719]},{"page":316,"text":"before starting the operation.","rect":[90.00007629394531,446.12677001953127,205.54473400115968,437.0185852050781]},{"page":316,"text":"15-22. While the units are conducting the relief in place, their common higher headquarters and other units","rect":[90.00007629394531,463.59161376953127,522.0514667015076,454.4834289550781]},{"page":316,"text":"continue actions to mask the relief and prevent enemy forces from detecting or interfering with the relief.","rect":[90.00011444091797,475.1146240234375,521.9823560714722,466.0064392089844]},{"page":316,"text":"These include using demonstrations, feints, smoke, and indirect fires.","rect":[90.00011444091797,486.5775146484375,367.1923780441284,477.4693298339844]},{"page":316,"text":"EXECUTING A RELIEF IN PLACE","rect":[72.0,511.8297119140625,295.92610012435918,502.1415710449219]},{"page":316,"text":"15-23. Units strive to conceal the relief from enemy forces. For example, during a sequential or staggered","rect":[90.0,532.13427734375,521.9863796234131,523.026123046875]},{"page":316,"text":"relief, the incoming unit may occupy the same positions as the outgoing unit. Alternatively, the incoming","rect":[89.98998260498047,543.6572875976563,521.9699001312256,534.5491333007813]},{"page":316,"text":"unit may establish positions near the outgoing unit. However, occupying different positions makes early","rect":[89.98998260498047,555.1802978515625,521.9974880218506,546.0721435546875]},{"page":316,"text":"discovery by enemy forces more likely. Any increase in activity in forward positions can reveal the relief to","rect":[89.98998260498047,566.6431884765625,522.0179958343506,557.5350341796875]},{"page":316,"text":"enemy forces. Information-collection efforts focus on establishing if enemy forces have discovered the relief","rect":[89.98998260498047,578.1661987304688,521.9053247032166,569.0580444335938]},{"page":316,"text":"before its completion.","rect":[89.98998260498047,589.669189453125,177.52170848846436,580.5810546875]},{"page":316,"text":"15-24. An enemy force usually detects a relief effort from the increased activity from the movement of the","rect":[89.98998260498047,607.154052734375,521.9983186798096,598.0458984375]},{"page":316,"text":"incoming and outgoing units by Soldiers and equipment moving into and out of positions. Additionally, after","rect":[89.98998260498047,618.6770629882813,521.9598901329041,609.5689086914063]},{"page":316,"text":"any period of combat, differences in the types and amount of equipment exist between the incoming unit and","rect":[89.98998260498047,630.2000732421875,521.9651393890381,621.0918579101563]},{"page":316,"text":"the outgoing unit even if they have the same modified tables of organization and equipment. These","rect":[89.98999786376953,641.6629638671875,522.0491609649658,632.5548095703125]},{"page":316,"text":"differences can also reveal the relief to enemy forces. The two units establish guidelines for exchanging","rect":[89.98998260498047,653.1859130859375,522.0754299163818,644.0777587890625]},{"page":316,"text":"compatible equipment and supplies to limit these differences. It may be necessary to exchange certain","rect":[89.98998260498047,664.7089233398438,522.0012111663818,655.6007690429688]},{"page":316,"text":"weapons, supplies, equipment, and occasionally, vehicles between units. When major differences in the","rect":[89.98998260498047,676.1718139648438,522.0288362579346,667.0535888671875]},{"page":316,"text":"number of combat systems between the units exist—for example, when a tank-heavy task force relieves a","rect":[89.98998260498047,687.69482421875,522.0994539337158,678.586669921875]},{"page":316,"text":"mechanized infantry task force—inoperable equipment or vehicle decoys may assist in hiding the change of","rect":[89.98994445800781,699.2177734375,521.9603173789978,690.109619140625]},{"page":316,"text":"units.","rect":[89.98994445800781,708.6566162109375,111.99486827850342,701.572509765625]},{"page":316,"text":"15-4","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":316,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":316,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":317,"text":"Relief in Place","rect":[478.97998046875,44.55902099609375,540.0126059570313,37.90802001953125]},{"page":317,"text":"15-25. In a simultaneous relief, the incoming unit begins moving from its current location to assembly areas","rect":[108.0,83.51434326171875,539.9491717796326,74.40616607666016]},{"page":317,"text":"in the assigned area of the outgoing unit. Once the relief begins, all elements involved execute the relief as","rect":[108.0,94.97723388671875,540.0124652366638,85.86905670166016]},{"page":317,"text":"quickly as possible. Both units are vulnerable to enemy attack because of the concentration, movement, and","rect":[107.98997497558594,106.500244140625,539.9631862640381,97.39200592041016]},{"page":317,"text":"intermingling of forces in a simultaneous relief. Any unnecessary delay during execution provides enemy","rect":[107.98999786376953,118.023193359375,539.9901027679443,108.9150161743164]},{"page":317,"text":"forces additional time to acquire and engage the forces involved. All units in the assigned area start under the","rect":[107.98998260498047,129.486083984375,540.0584383087158,120.3779067993164]},{"page":317,"text":"operational control of the outgoing going unit commander until the time or event established in the operation","rect":[107.98998260498047,141.00909423828126,539.9031276702881,131.90090942382813]},{"page":317,"text":"order when the responsibility and authorities change to the incoming unit commander. Usually, the trigger to","rect":[107.9899673461914,152.5321044921875,540.0473537445068,143.42391967773438]},{"page":317,"text":"change from the outgoing commander to the incoming commander is when the incoming commander has","rect":[108.01001739501953,163.9949951171875,539.9481952171326,154.88681030273438]},{"page":317,"text":"sufficient communications to control the operation and roughly two thirds of the personnel responsible or","rect":[108.01001739501953,175.51800537109376,539.9612939414978,166.40982055664063]},{"page":317,"text":"security active in the assigned area.","rect":[108.0,187.04095458984376,249.6947889328003,177.93276977539063]},{"page":317,"text":"15-26. As the first incoming element arrives from the assembly area to assume the position, it establishes a","rect":[108.0,204.505859375,540.0753450469971,195.39767456054688]},{"page":317,"text":"screen of the outgoing unit’s positions as the tactical situation permits. The remainder of the incoming unit","rect":[108.0,216.02886962890626,539.9188609085084,206.92068481445313]},{"page":317,"text":"moves forward to positions behind the outgoing unit. The incoming unit may use the outgoing unit’s alternate","rect":[107.9899673461914,227.49169921875,540.0015535430908,218.38351440429688]},{"page":317,"text":"and supplementary defensive positions to take advantage of any previous defensive preparations. At the","rect":[107.98999786376953,239.01470947265626,539.9800081329346,229.90652465820313]},{"page":317,"text":"previously established time or event, passage of command takes place. At that point the commander of the","rect":[107.98998260498047,250.5377197265625,540.0031404571533,241.42953491210938]},{"page":317,"text":"incoming unit informs all units involved in the relief of the passage of command.","rect":[107.98998260498047,262.0006103515625,432.39263439178469,252.89242553710938]},{"page":317,"text":"15-27. The relieved unit continues to defend. The incoming unit’s advance parties coordinate procedures","rect":[107.98998260498047,279.52557373046877,539.9711444358826,270.4173889160156]},{"page":317,"text":"for the rearward passage of the outgoing unit. On order, the outgoing unit begins withdrawing through the","rect":[107.98998260498047,291.048583984375,540.0209627227783,281.9403991699219]},{"page":317,"text":"incoming unit and moves to assembly areas. Crew-served weapons are usually the first elements relieved","rect":[107.98998260498047,302.511474609375,540.0013332366943,293.4032897949219]},{"page":317,"text":"after exchanging range cards. The incoming unit replaces them on a one for one basis to the maximum extent","rect":[107.98998260498047,314.0344543457031,540.0781626663209,304.92626953125]},{"page":317,"text":"possible to maintain the illusion of routine activity. The outgoing unit’s functional and multifunctional","rect":[107.98998260498047,325.55743408203127,539.9535288772584,316.44921875]},{"page":317,"text":"support and sustainment assets assist both the outgoing and incoming units during this period.","rect":[107.98999786376953,337.02032470703127,483.5745496749878,327.9121398925781]},{"page":317,"text":"15-28. A relief does not normally require artillery units to relieve weapon system for weapon system unless","rect":[107.98998260498047,354.5453186035156,540.0674579124451,345.4371337890625]},{"page":317,"text":"the terrain limits the number of firing positions available. Generally, the outgoing unit’s artillery and other","rect":[107.9799575805664,366.0683288574219,540.0023095664978,356.96014404296877]},{"page":317,"text":"fire support assets remain in place until all other outgoing elements displace and are available to reinforce","rect":[107.96995544433594,377.53118896484377,539.9626131134033,368.4230041503906]},{"page":317,"text":"the fires of the incoming unit in case the enemy tries to interfere. If the purpose of the relief is to continue","rect":[107.96995544433594,389.05419921875,540.0185213165283,379.9460144042969]},{"page":317,"text":"the attack, the artillery of both forces generally remains in place to support the subsequent operation.","rect":[107.96995544433594,400.57720947265627,510.91411876678469,391.4690246582031]},{"page":317,"text":"15-29. Multiple routes that allow only one-way traffic can simplify the forward and rearward movement of","rect":[107.96995544433594,418.04205322265627,539.9923608360291,408.9338684082031]},{"page":317,"text":"both units. The incoming unit controls both units’ traffic management assets. Commanders use these assets","rect":[107.95994567871094,429.5650634765625,539.9071795921326,420.4568786621094]},{"page":317,"text":"to help control unit and convoy movement on LOCs throughout their assigned area.","rect":[107.94994354248047,441.08807373046877,442.61794567108157,431.9798889160156]},{"page":317,"text":"15-30. A relief in place may involve the relief of an allied or coalition multinational force. Units consider","rect":[107.9599838256836,458.5529479980469,539.8840234336853,449.44476318359377]},{"page":317,"text":"these additional points when such reliefs occur:","rect":[107.94995880126953,470.055908203125,297.9963755569458,460.9677734375]},{"page":317,"text":" Dissimilar unit organizations may require special adjustments in assigned areas.","rect":[133.1999969482422,483.47430419921877,471.10418224334719,474.3561096191406]},{"page":317,"text":" Control of fire support may require special liaison.","rect":[133.1999969482422,496.97430419921877,353.9276075363159,487.8661193847656]},{"page":317,"text":" Language difficulties may require an increased use of guides and translators and require more time","rect":[133.1999969482422,510.47430419921877,540.0146761016846,501.3661193847656]},{"page":317,"text":"to execute.","rect":[151.1999969482422,519.9131469726563,194.5575361251831,513.8309936523438]},{"page":317,"text":" Using outgoing unit communications requires special signal arrangements and additional","rect":[133.1999969482422,535.434326171875,540.0981211624146,526.326171875]},{"page":317,"text":"operators.","rect":[151.1999969482422,546.937255859375,190.95835399627686,538.85107421875]},{"page":317,"text":" Ammunition and equipment incompatibility may make exchanging assets more difficult.","rect":[133.1999969482422,560.4542846679688,506.08135509490969,551.3461303710938]},{"page":317,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":317,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":317,"text":"15-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":318,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":319,"text":"Chapter 16","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":319,"text":"Passage of Lines","rect":[249.60000610351563,154.12814331054688,380.36323597717287,139.11740112304688]},{"page":319,"text":"This chapter discusses the performance of forward and rearward passages of lines. It","rect":[126.0,188.7806854248047,503.9568588180542,178.79986572265626]},{"page":319,"text":"first discusses general considerations, organization of forces, and control measures for","rect":[126.0,201.4405975341797,503.98538037490848,191.45977783203126]},{"page":319,"text":"a passage of lines. Next, the chapter discusses planning considerations associated with","rect":[125.97802734375,214.10057067871095,504.02732276916506,204.1197509765625]},{"page":319,"text":"a passage of lines. Finally, it discusses a forward and rearward passage of lines.","rect":[125.97802734375,226.76048278808595,475.37286853790286,216.7796630859375]},{"page":319,"text":"GENERAL CONSIDERATIONS FOR A PASSAGE OF LINES","rect":[90.0,252.08970642089845,473.44209971618656,242.4015655517578]},{"page":319,"text":"16-1. A passage of lines is an operation in which a force moves forward or rearward through another force’s","rect":[108.0,272.394287109375,540.0143573265076,263.2861022949219]},{"page":319,"text":"combat positions with the intention of moving into or out of contact with the enemy (JP 3-18). There are two","rect":[108.01002502441406,283.857177734375,540.0994777679443,274.7489929199219]},{"page":319,"text":"types: a forward passage of lines and a rearward passage of lines. Units perform a passage of lines to continue","rect":[108.01001739501953,295.3801574707031,540.1596956329346,286.27197265625]},{"page":319,"text":"their attacks or perform counterattack, retrograde, and security operations that involve advancing or","rect":[108.01001739501953,306.9031677246094,540.0523583946228,297.79498291015627]},{"page":319,"text":"withdrawing through other units’ positions. A passage of lines potentially involves close combat. It involves","rect":[108.01001739501953,318.3660583496094,540.0634295921326,309.25787353515627]},{"page":319,"text":"transferring the responsibility for the assigned area between two units. That transfer of authority usually","rect":[108.01005554199219,329.8890686035156,539.9534816741943,320.7808532714844]},{"page":319,"text":"occurs when roughly two thirds of the passing force have moved through one or more passage points. The","rect":[108.01000213623047,341.41204833984377,539.9923372344971,332.3038635253906]},{"page":319,"text":"headquarters directing the passage of lines is responsible for determining when the passage of lines starts and","rect":[108.0,352.87493896484377,539.9260158538818,343.7667541503906]},{"page":319,"text":"ends. If not directed by higher authority, the stationary unit commander and the passing unit commanders","rect":[108.0,364.3979187011719,539.8937518577576,355.28973388671877]},{"page":319,"text":"determine—by mutual agreement—the time to pass command. They disseminate this information to the","rect":[108.0,375.9209289550781,540.0621004180908,366.812744140625]},{"page":319,"text":"lowest levels of both organizations.","rect":[108.0,387.3837890625,250.0074872970581,378.2756042480469]},{"page":319,"text":"16-2.","rect":[108.0,402.8647155761719,128.86164379119874,395.98095703125]},{"page":319,"text":"Units have several reasons for conducting a passage of lines. These reasons include to—","rect":[133.20030212402345,404.9087829589844,487.0164909362793,395.80059814453127]},{"page":319,"text":" Sustain offensive tempo.","rect":[133.1999969482422,418.354248046875,250.36391735076905,409.26611328125]},{"page":319,"text":" Maintain the viability of the defense by transferring responsibility from one unit to another.","rect":[133.1999969482422,431.8742980957031,517.2306470870972,422.76611328125]},{"page":319,"text":" Transition from the performance of delay or security operation by one force to the defense.","rect":[133.1999969482422,445.3742980957031,515.1965284347534,436.26611328125]},{"page":319,"text":" Transition a unit for another mission or task.","rect":[133.1999969482422,456.8502502441406,329.48784923553469,449.76611328125]},{"page":319,"text":"16-3. Units can conduct two variations of a passage of lines: a forward passage of lines or a rearward passage","rect":[108.00376892089844,476.3892517089844,540.1002473907471,467.28106689453127]},{"page":319,"text":"of lines. A forward passage of lines occurs when a unit passes through another unit’s positions while moving","rect":[108.00376892089844,487.8521423339844,540.0983791351318,478.74395751953127]},{"page":319,"text":"toward the enemy (ADP 3-90). A rearward passage of lines occurs when a unit passes through another unit’s","rect":[108.00376892089844,499.3751220703125,540.0792376976013,490.2669372558594]},{"page":319,"text":"positions while moving away from the enemy (ADP 3-90). Ideally, the passing unit’s operations do not","rect":[108.01377868652344,510.89813232421877,540.0261607131959,501.7899475097656]},{"page":319,"text":"interfere with the stationary unit.","rect":[108.01377868652344,522.3610229492188,239.33794689178468,513.2528686523438]},{"page":319,"text":"16-4. The headquarters directing the passage of lines is responsible for determining when the passage of","rect":[108.01377868652344,539.8759765625,540.0219628868103,530.767822265625]},{"page":319,"text":"lines starts and finishes. Because of the difficulty and risks inherent in a passage of lines, the headquarters","rect":[108.01377868652344,551.3388671875,540.0512225608826,542.230712890625]},{"page":319,"text":"directing the passage of lines usually positions C2 to oversee and deconflict the operation. The passing unit","rect":[108.01377868652344,562.86181640625,540.0982432327271,553.753662109375]},{"page":319,"text":"is responsible for establishing communications with the stationary unit. The only exception to this is when","rect":[108.01377868652344,574.3848876953125,539.9368190765381,565.2767333984375]},{"page":319,"text":"the passing unit is in direct contact, at which point to assist the unit in contact the stationary unit works to","rect":[108.01377868652344,585.8477172851563,539.9660549163818,576.7395629882813]},{"page":319,"text":"establish communications. Ideally, the headquarters responsible for the passage of lines co-locates the","rect":[108.01377868652344,597.3707275390625,540.0223054962158,588.2625732421875]},{"page":319,"text":"stationary force. If the headquarters responsible for the passage of lines is unable to co-locate with the","rect":[108.01380157470703,608.8937377929688,540.0872469024658,599.7855834960938]},{"page":319,"text":"stationary unit, then the passing unit establishes communications with the stationary unit.","rect":[108.02379608154297,620.3566284179688,464.9472608566284,611.2484741210938]},{"page":319,"text":"16-5. After receiving the warning order that directs a passage of lines, the passing unit’s commander and key","rect":[108.02379608154297,637.881591796875,540.1202907562256,628.7734375]},{"page":319,"text":"staff representatives generally co-locate with the command post of the stationary unit to facilitate in planning","rect":[108.02379608154297,649.4046020507813,540.1190700531006,640.2964477539063]},{"page":319,"text":"the passage and establishing common situational understanding. If the passing unit cannot co-locate one of","rect":[108.02379608154297,660.8674926757813,540.0501611289978,651.7593383789063]},{"page":319,"text":"its command posts to help plan the passage, it conducts extensive liaison with the stationary unit.","rect":[108.02379608154297,672.3905029296875,496.0258741378784,663.2823486328125]},{"page":319,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":319,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":319,"text":"16-1","rect":[504.00299072265627,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":320,"text":"Chapter 16","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":320,"text":"16-6. The planning focus for both the passing unit and the stationary unit is on operations following the","rect":[90.0,83.51434326171875,521.9770174102783,74.40616607666016]},{"page":320,"text":"passage. While this occurs, the two units involved coordinate the following:","rect":[90.0,94.97723388671875,393.8514780960083,85.86905670166016]},{"page":320,"text":" The exchange of intelligence and combat information to include products and databases.","rect":[115.19999694824219,108.47430419921875,487.07146739959719,99.36612701416016]},{"page":320,"text":" Current friendly dispositions and tactical plans, especially deception and obstacle plans.","rect":[115.19999694824219,121.97430419921875,484.84673595428469,112.86612701416016]},{"page":320,"text":" Direct and indirect fires and close air support plans.","rect":[115.19999694824219,135.4542694091797,340.06484508514407,126.36612701416016]},{"page":320,"text":" Any graphic control measures and graphics not directed by the higher headquarters, such as","rect":[115.19999694824219,148.97430419921876,522.1023700218201,139.86611938476563]},{"page":320,"text":"boundary changes, the battle handover lines, emergency logistics points, and assembly area and","rect":[133.1999969482422,160.497314453125,521.9436550140381,151.38912963867188]},{"page":320,"text":"firing positions for artillery, air defense, and other units.","rect":[133.1999969482422,172.02032470703126,357.94549083709719,162.91213989257813]},{"page":320,"text":" Long-range and short-range recognition symbols and vehicle markings to reduce the probability","rect":[115.19999694824219,185.51434326171876,521.9435329437256,176.40615844726563]},{"page":320,"text":"of fratricide.","rect":[133.1999969482422,194.9532012939453,183.22484874725343,187.86904907226563]},{"page":320,"text":"","rect":[115.19999694824219,207.74545288085938,121.16105696249008,203.05320739746095]},{"page":320,"text":"","rect":[115.19999694824219,221.24545288085938,121.16105696249008,216.55320739746095]},{"page":320,"text":"","rect":[115.19999694824219,246.26547241210938,121.16105696249008,241.57322692871095]},{"page":320,"text":"","rect":[115.19999694824219,282.7454528808594,121.16105696249008,278.0531921386719]},{"page":320,"text":"","rect":[115.19999694824219,296.2454528808594,121.16105696249008,291.5531921386719]},{"page":320,"text":"","rect":[115.19999694824219,321.26544189453127,121.16105696249008,316.57318115234377]},{"page":320,"text":"","rect":[115.19999694824219,334.76544189453127,121.16105696249008,330.07318115234377]},{"page":320,"text":"","rect":[115.19999694824219,348.26544189453127,121.16105696249008,343.57318115234377]},{"page":320,"text":"","rect":[115.19999694824219,361.76544189453127,121.16105696249008,357.07318115234377]},{"page":320,"text":"","rect":[115.19999694824219,375.26544189453127,121.16105696249008,370.57318115234377]},{"page":320,"text":"","rect":[115.19999694824219,388.76544189453127,121.16105696249008,384.07318115234377]},{"page":320,"text":"Signal operating instruction details, such as call signs, frequencies, and recognition signals.","rect":[133.1999969482422,210.47430419921876,498.46392345428469,201.36611938476563]},{"page":320,"text":"Time and conditions for transfer control of the assigned areas from one headquarters to the other,","rect":[133.1999969482422,223.97430419921876,521.9829053878784,214.86611938476563]},{"page":320,"text":"if not previously established.","rect":[133.1999969482422,235.497314453125,248.74363231658936,226.38912963867188]},{"page":320,"text":"Provisions for movement control, including contact points, start and release points, primary and","rect":[133.1999969482422,248.99432373046876,522.0009059906006,239.88613891601563]},{"page":320,"text":"alternate routes, route selection, priorities for using routes and facilities, passage points, and","rect":[133.1999969482422,260.45721435546877,521.9558620452881,251.34902954101563]},{"page":320,"text":"provision for guides.","rect":[133.1999969482422,271.980224609375,216.28081798553468,262.8720397949219]},{"page":320,"text":"Reconnaissance by elements of the passing unit.","rect":[133.1999969482422,285.47430419921877,326.20733165740969,276.3661193847656]},{"page":320,"text":"Security measures during the passage, including nuclear, biological, and chemical reconnaissance","rect":[133.1999969482422,298.97430419921877,522.0614900665283,289.8661193847656]},{"page":320,"text":"or biological detection systems.","rect":[133.1999969482422,310.497314453125,259.8448133468628,301.3891296386719]},{"page":320,"text":"Fires, obscurants, and any other combat sustainment provided by the stationary unit.","rect":[133.1999969482422,323.9942932128906,470.39113903045657,314.8861083984375]},{"page":320,"text":"Measures to reduce both units’ vulnerability to attack by enemy weapons of mass destruction.","rect":[133.1999969482422,337.4942932128906,508.6011915206909,328.3861083984375]},{"page":320,"text":"Operations security measures required before or during the passage.","rect":[133.1999969482422,350.9942932128906,405.1019239425659,341.8861083984375]},{"page":320,"text":"Allocation of terrain for use by the passing force.","rect":[133.1999969482422,364.4942932128906,330.04290294647219,355.3861083984375]},{"page":320,"text":"Air defense cover—up to and forward of the battle handover line.","rect":[133.1999969482422,377.9742431640625,395.68499279022219,368.8861083984375]},{"page":320,"text":"Sustainment support for the passing unit provided by the stationary unit, especially fuel,","rect":[133.1999969482422,391.4942932128906,521.9931592941284,382.3861083984375]},{"page":320,"text":"maintenance, and medical treatment.","rect":[133.1999969482422,401.0,280.05803966522219,393.8489990234375]},{"page":320,"text":" Population of icons within computer systems that track friendly system and unit locations to","rect":[115.19999694824219,416.45428466796877,521.9500637054443,407.3460998535156]},{"page":320,"text":"increase situational awareness and reduce the probability of friendly fire incidents.","rect":[133.1999969482422,427.977294921875,463.3637647628784,418.8691101074219]},{"page":320,"text":" Detailed isolated Soldier guidance.","rect":[115.19999694824219,441.47430419921877,273.15728282928469,432.3661193847656]},{"page":320,"text":"ORGANIZATION OF FORCES FOR A PASSAGE OF LINES","rect":[72.0,466.7696838378906,451.1586219329834,457.08154296875]},{"page":320,"text":"16-7. A unit may participate in a passage of lines as either the passing or the stationary force. Performance","rect":[90.0,487.0743103027344,522.0695467071533,477.96612548828127]},{"page":320,"text":"of a passage of lines does not require a special task organization with the exception that the stationary force","rect":[90.0,498.5372009277344,522.1302766876221,489.42901611328127]},{"page":320,"text":"provides guides and sustainment assets to expedite the movement of the passing force. Both the passing and","rect":[90.0,510.0601806640625,521.9620876312256,500.9519958496094]},{"page":320,"text":"stationary forces maintain their previous combat organization during the passage. The stationary unit","rect":[90.0,521.5831909179688,522.0812144241334,512.4750366210938]},{"page":320,"text":"conducts operations against enemy forces that can interfere with the passage if it has the capability to do so.","rect":[90.0,533.0460815429688,522.1021680831909,523.9379272460938]},{"page":320,"text":"However, operations directed against enemy forces may be the responsibility of a higher echelon, depending","rect":[90.0,544.569091796875,522.0325832366943,535.4609375]},{"page":320,"text":"on the echelon at which the passage takes place.","rect":[90.0,556.092041015625,282.3479871749878,546.98388671875]},{"page":320,"text":"16-8. A forward passing unit’s order of march is generally reconnaissance and security elements first. The","rect":[90.0,573.5569458007813,522.0381746368408,564.4487915039063]},{"page":320,"text":"main body moves next, followed by functional and multifunctional support and sustainment elements. The","rect":[90.0,585.0799560546875,521.9763460235596,575.9718017578125]},{"page":320,"text":"overall headquarters integrates artillery and engineers into the order of march based on the mission variables.","rect":[90.0,596.6029052734375,521.9971265792847,587.4947509765625]},{"page":320,"text":"The passing unit reverses this order of march in a rearward passage of lines. Attack helicopters and armed","rect":[90.0,608.0657958984375,521.9536647796631,598.9576416015625]},{"page":320,"text":"UASs are useful in providing security to the passing force.","rect":[90.0,619.5888061523438,324.46709728240969,610.4806518554688]},{"page":320,"text":"CONTROL MEASURES FOR A PASSAGE OF LINES","rect":[72.0,644.8497314453125,407.18587413024906,635.1615600585938]},{"page":320,"text":"16-9. Control measures associated with a passage of lines are generally restrictive to prevent fratricide. At a","rect":[90.0,665.154296875,522.0703401641846,656.046142578125]},{"page":320,"text":"minimum, they include:","rect":[90.0,676.6773071289063,185.84230756378174,667.5691528320313]},{"page":320,"text":" Assigned area.","rect":[115.19999694824219,690.17431640625,192.10357189178468,681.066162109375]},{"page":320,"text":" Assembly areas.","rect":[115.19999694824219,703.67431640625,198.76287364959718,694.566162109375]},{"page":320,"text":" Attack positions.","rect":[115.19999694824219,717.154296875,200.9853162765503,708.066162109375]},{"page":320,"text":"16-2","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":320,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":320,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":321,"text":"Passage of Lines","rect":[466.5,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":321,"text":" BHL.","rect":[133.1999969482422,81.36004638671875,173.7480115890503,74.726806640625]},{"page":321,"text":" Contact points.","rect":[133.1999969482422,96.99430847167969,211.78492259979249,87.90616607666016]},{"page":321,"text":" Passage points.","rect":[133.1999969482422,110.51434326171875,212.32400035858155,101.40616607666016]},{"page":321,"text":" Passage lanes","rect":[133.1999969482422,124.01434326171875,205.97433352279664,114.90616607666016]},{"page":321,"text":" Routes.","rect":[133.1999969482422,135.4903106689453,181.5475721359253,128.726806640625]},{"page":321,"text":" Gaps.","rect":[133.1999969482422,150.9943084716797,174.28307628631593,142.07650756835938]},{"page":321,"text":" Phase lines.","rect":[133.1999969482422,162.4903106689453,198.46433544158936,155.40615844726563]},{"page":321,"text":" Recognition signals.","rect":[133.1999969482422,178.01434326171876,232.8479871749878,168.90615844726563]},{"page":321,"text":" The headquarters directing the passage of lines designates or recommends:","rect":[133.1999969482422,191.51434326171876,450.32114362335207,182.40615844726563]},{"page":321,"text":" Routes.","rect":[133.1999969482422,202.9903106689453,181.5475721359253,196.226806640625]},{"page":321,"text":" Start and end times for the passage of lines.","rect":[133.1999969482422,218.45428466796876,325.42473888397219,209.34609985351563]},{"page":321,"text":"Units may also use SPs, RPs, FSCMs such as CFLs, and other control measures as necessary to conduct this","rect":[108.00376892089844,232.9732666015625,539.9396502952576,223.86508178710938]},{"page":321,"text":"operation. Figure 16-1 depicts these control measures.","rect":[108.00376892089844,244.49627685546876,324.5860242843628,235.38809204101563]},{"page":321,"text":"Figure 16-1. Control measures associated with a rearward passage of lines","rect":[137.40245056152345,615.4767456054688,492.5373067779541,606.0880126953125]},{"page":321,"text":"16-10. The stationary unit establishes the necessary graphic control measures for the passage after","rect":[107.9937515258789,638.99365234375,539.9709374961853,629.885498046875]},{"page":321,"text":"coordination with the passing unit commander. The stationary unit establishes these measures because it","rect":[107.9937515258789,650.45654296875,539.9389414749146,641.348388671875]},{"page":321,"text":"controls the terrain. It knows the location of its obstacles and the tactical plan. In some cases, the higher","rect":[107.9937973022461,661.9796142578125,539.9802148399353,652.8714599609375]},{"page":321,"text":"echelon headquarters directing the passage may have previously established the necessary control measures.","rect":[107.99375915527344,673.5026245117188,540.0379590988159,664.3944702148438]},{"page":321,"text":"If the control measures dictated by the higher echelon headquarters are not sufficient—because they do not","rect":[107.99375915527344,684.9655151367188,539.9469981155396,675.8573608398438]},{"page":321,"text":"contain enough passage points, lanes, and so forth—the two units can agree to add the necessary measures","rect":[107.9937515258789,696.488525390625,540.0060565452576,687.38037109375]},{"page":321,"text":"and report to higher the additional control measures.","rect":[107.9937515258789,708.0115966796875,317.43889904022219,698.9034423828125]},{"page":321,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":321,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":321,"text":"16-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":322,"text":"Chapter 16","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":322,"text":"16-11. A passage point is a designated place where passing units pass through the stationary unit. (See","rect":[90.0,83.51434326171875,522.0652742462158,74.40616607666016]},{"page":322,"text":"paragraph A-32 for more information and symbol.) The location of this point is where the commander wants","rect":[90.0,94.97723388671875,521.9533832054138,85.86905670166016]},{"page":322,"text":"subordinate units to execute a passage of lines. In a forward passage of lines, the passage point marks the","rect":[90.01001739501953,106.500244140625,522.0202913360596,97.3920669555664]},{"page":322,"text":"location where stationary force restrictions placed on the passing unit no longer bind the actions of the passing","rect":[90.02002716064453,118.023193359375,522.0870265960693,108.9150161743164]},{"page":322,"text":"unit. On the other hand, in a rearward passage of lines, the passage point marks the location where the","rect":[90.02002716064453,129.486083984375,521.9989900665283,120.3779067993164]},{"page":322,"text":"stationary unit can restrict the movement and maneuver of the passing force. Between the contact point and","rect":[90.02002716064453,141.00909423828126,522.0347805023193,131.90090942382813]},{"page":322,"text":"the release point, the stationary unit controls the passing force’s movement.","rect":[90.02002716064453,152.5321044921875,392.10207653045657,143.42391967773438]},{"page":322,"text":"16-12. A passage lane is a lane through an enemy or friendly obstacle that provides safe passage for a","rect":[90.02002716064453,169.9969482421875,521.9922151641846,160.88876342773438]},{"page":322,"text":"passing force. (See paragraph A-30 for more information and symbol). The lane may be cleared, including","rect":[90.02002716064453,181.51995849609376,522.0254421234131,172.41177368164063]},{"page":322,"text":"being reduced and proofed, as part of a breach operation, or it may be included as part of the design of a","rect":[90.0100326538086,193.04296875,522.0281038360596,183.93478393554688]},{"page":322,"text":"friendly obstacle. It is a clear route through an obstacle. Passage lanes normally end where a route begins.","rect":[90.0100326538086,204.505859375,521.9946241378784,195.39767456054688]},{"page":322,"text":"That route should allow the passing unit to move rapidly through the stationary unit’s area.","rect":[90.0100326538086,216.02880859375,453.60390758514407,206.92062377929688]},{"page":322,"text":"PLANNING A PASSAGE OF LINES","rect":[72.0,241.28965759277345,296.6669227142334,231.6015167236328]},{"page":322,"text":"16-13. As with any activity involving transferred combat responsibility from one unit to another, the","rect":[90.0,261.59429931640627,522.0531892852783,252.48611450195313]},{"page":322,"text":"complex nature of a passage of lines involves risk. The passage of lines is either hasty or deliberate. In a","rect":[90.0,273.05718994140627,521.9496736602783,263.9490051269531]},{"page":322,"text":"hasty passage of lines, commanders use verbal orders. In a deliberate passage of lines, both the stationary","rect":[90.0,284.5801696777344,521.9950466156006,275.47198486328127]},{"page":322,"text":"and moving force have time to—","rect":[90.0,296.1031799316406,222.54258346557618,286.9949951171875]},{"page":322,"text":" Exchange plans, intelligence, databases, and liaison personnel.","rect":[115.19999694824219,309.59429931640627,383.6809949874878,300.4861145019531]},{"page":322,"text":" Conduct reconnaissance.","rect":[115.19999694824219,321.0802917480469,232.66051769256593,313.9861145019531]},{"page":322,"text":" Publish written orders.","rect":[115.19999694824219,334.57025146484377,224.0844373703003,327.4861145019531]},{"page":322,"text":" Conduct briefings and rehearsals.","rect":[115.19999694824219,350.09429931640627,267.0491895675659,340.9861145019531]},{"page":322,"text":"16-14. The higher commander directing the passage of lines is responsible for designating—","rect":[89.9937515258789,367.5591735839844,466.5535087585449,358.45098876953127]},{"page":322,"text":" Subsequent missions for both forces.","rect":[115.19999694824219,381.03424072265627,280.7235059738159,371.94610595703127]},{"page":322,"text":" When and under what conditions passage of command takes place.","rect":[115.19999694824219,394.5542907714844,400.9584608078003,385.44610595703127]},{"page":322,"text":" Start and end times for the passage.","rect":[115.19999694824219,408.0542907714844,275.2013807296753,398.94610595703127]},{"page":322,"text":" Contact points between the units involved.","rect":[115.19999694824219,421.53424072265627,303.7654981613159,412.44610595703127]},{"page":322,"text":" Any necessary common control measures.","rect":[115.19999694824219,435.0542907714844,302.3226270675659,425.94610595703127]},{"page":322,"text":"That higher echelon commander normally establishes this designated information in an order directing the","rect":[89.9937515258789,449.5732727050781,521.9595613555908,440.465087890625]},{"page":322,"text":"passage. Close coordination and understanding between the units are essential in the absence of higher","rect":[89.9937515258789,461.0962829589844,521.9539086875916,451.98809814453127]},{"page":322,"text":"guidance.","rect":[89.9937515258789,472.55914306640627,128.61784648895265,463.4509582519531]},{"page":322,"text":"COMMAND AND CONTROL","rect":[72.0,495.947998046875,201.68680715560914,487.656005859375]},{"page":322,"text":"16-15. Units plan their passages of lines to maintain enemy contact and provide constant fires on enemy","rect":[90.0,515.874267578125,521.8678493499756,506.7660827636719]},{"page":322,"text":"forces. They reduce risk and ensure synchronization through detailed planning and centralized execution.","rect":[90.0,527.337158203125,521.9672193527222,518.22900390625]},{"page":322,"text":"The need for positive control increases during the passage because of the intermingling of passing and","rect":[90.0,538.8601684570313,522.0742092132568,529.7520141601563]},{"page":322,"text":"stationary forces. The passage requires close coordination, clearly understood control measures, and liaison","rect":[90.0,550.3831787109375,522.0155544281006,541.2750244140625]},{"page":322,"text":"among all headquarters and echelons involved in the passage. Clear identification of the moment or event","rect":[90.0,561.8460693359375,521.9859995803834,552.7379150390625]},{"page":322,"text":"that causes one force to assume responsibility for the assigned area from another is vital to successfully","rect":[90.0,573.3690795898438,521.9919948577881,564.2609252929688]},{"page":322,"text":"performing this task.","rect":[90.0,584.89208984375,173.0838270187378,575.783935546875]},{"page":322,"text":"16-16. A passage of lines requires clear determination of responsibilities. During a passage of lines, two","rect":[90.0,602.35693359375,521.9902248382568,593.248779296875]},{"page":322,"text":"parallel chains of command operate simultaneously in one area, and this may cause confusion. The passing","rect":[89.99999237060547,613.8798828125,521.9759426116943,604.771728515625]},{"page":322,"text":"unit’s command posts may co-locate at the stationary unit’s command post after receiving the warning order.","rect":[89.99999237060547,625.4029541015625,522.0404005050659,616.2947998046875]},{"page":322,"text":"This co-location reduces the risk associated with a passage because it makes it easier to coordinate between","rect":[89.9999771118164,636.8657836914063,521.9445095062256,627.7576293945313]},{"page":322,"text":"the two units. It facilitates planning the passage and establishing common situational understanding. If the","rect":[89.99998474121094,648.3887939453125,522.0444002227783,639.2806396484375]},{"page":322,"text":"passing unit cannot co-locate one of its command posts to help plan the passage, it conducts extensive liaison","rect":[90.0,659.9118041992188,521.9955348968506,650.8036499023438]},{"page":322,"text":"with the stationary unit. Following completion of the passage, the planning focus for both units is on their","rect":[90.0,671.3746948242188,521.9958398399353,662.2665405273438]},{"page":322,"text":"operations.","rect":[90.0,682.877685546875,134.20423412322999,673.78955078125]},{"page":322,"text":"16-17. Passing forces focus their planning efforts on two general areas: coordination with stationary forces","rect":[90.0,700.4126586914063,522.1195209007263,691.3045043945313]},{"page":322,"text":"and guidance to their subordinate units performing these passages. These planning efforts occur","rect":[89.98998260498047,711.87548828125,522.0513207969666,702.767333984375]},{"page":322,"text":"16-4","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":322,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":322,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":323,"text":"Passage of Lines","rect":[466.5,46.34102249145508,540.0210288085938,37.90802001953125]},{"page":323,"text":"simultaneously. Passing forces’ plans address necessary branches and sequels in case enemy forces attack","rect":[108.0,83.51434326171875,539.9371242523193,74.40616607666016]},{"page":323,"text":"them during the execution of their passages to prevent degrading friendly maneuver.","rect":[108.0,94.97723388671875,445.7202100753784,85.86905670166016]},{"page":323,"text":"16-18. The passage of lines requires effective communication between passing and stationary forces. Units","rect":[108.0,112.4921875,539.9876849632263,103.3840103149414]},{"page":323,"text":"build redundancy of communication signals and means into their passage plans. They also designate contact","rect":[108.0,124.01519775390625,539.9800791702271,114.90702056884766]},{"page":323,"text":"points to ensure effective communication between these forces at the lowest possible tactical level.","rect":[108.0,135.4580535888672,503.24431896209719,126.36991119384766]},{"page":323,"text":"MOVEMENT AND MANEUVER","rect":[90.0,158.8422088623047,233.9955759048462,150.75601196289063]},{"page":323,"text":"16-19. The stationary unit identifies multiple routes through its assigned area. The passing unit begins","rect":[108.0,178.7943115234375,540.0523822288513,169.68612670898438]},{"page":323,"text":"reconnaissance of these routes as soon as possible. The stationary unit physically shows all obstacles, routes,","rect":[108.00003814697266,190.31732177734376,540.0521192550659,181.20913696289063]},{"page":323,"text":"and gaps through them to the passing unit. It provides guides for the passing unit—especially through","rect":[108.00003814697266,201.78021240234376,539.9711818695068,192.67196655273438]},{"page":323,"text":"obstacles—and occupies contact points and passage points. The passing unit begins to reconnoiter its routes","rect":[108.0,213.30322265625,540.0561664085388,204.19503784179688]},{"page":323,"text":"to the established contact points with the stationary unit’s troops. The stationary unit establishes a security","rect":[108.0,224.76605224609376,540.0162868499756,215.65786743164063]},{"page":323,"text":"area in which responsibility transitions from the stationary force to the moving force. Normally, a BHL","rect":[107.98994445800781,236.2890625,539.9782383460998,227.18087768554688]},{"page":323,"text":"designates the forward edge of this area. The BHL is within direct fire range and observed indirect fire range","rect":[107.97993469238281,247.81207275390626,540.0685091094971,238.70388793945313]},{"page":323,"text":"of the stationary force.","rect":[107.97993469238281,259.27496337890627,198.56072521209718,250.16677856445313]},{"page":323,"text":"16-20. Passing unit commanders prefer to perform their passages through gaps in stationary unit positions","rect":[107.97993469238281,276.7999267578125,540.0351092796326,267.6917419433594]},{"page":323,"text":"rather than through lanes or routes that traverse those positions. This reduces the vulnerability of both passing","rect":[107.97992706298828,288.32293701171877,540.0360622406006,279.2147521972656]},{"page":323,"text":"and stationary units resulting from concentrating systems when units pass directly through the positions of","rect":[107.97992706298828,299.7857971191406,539.9973046836853,290.6776123046875]},{"page":323,"text":"other units. It also avoids the danger associated with concentrating passing units into passage lanes.","rect":[107.97993469238281,311.3088073730469,505.71074962615969,302.20062255859377]},{"page":323,"text":"16-21. Table 16-1 depicts the minimum number of passage lanes a BCT requires to execute a passage of","rect":[107.97993469238281,328.83380126953127,539.8419702110291,319.7256164550781]},{"page":323,"text":"lines. The routes and lanes should provide cover, concealment, and rapid movement of the passing force.","rect":[107.97993469238281,340.2966613769531,539.9911451339722,331.1884765625]},{"page":323,"text":"Units may designate alternative routes and lanes for CBRN-contaminated elements of the moving force.","rect":[107.97993469238281,351.81964111328127,540.0142774581909,342.7114562988281]},{"page":323,"text":"These lanes disrupt the combat capability of the stationary unit to the minimal possible amount. If the terrain","rect":[107.97994995117188,363.3426513671875,540.0982570648193,354.2344665527344]},{"page":323,"text":"and enemy situation allow, units seek additional lanes to speed the process.","rect":[107.97994995117188,374.8055419921875,408.80413341522219,365.6973571777344]},{"page":323,"text":"Table 16-1. Brigade Combat Team passage lane requirements","rect":[168.82139587402345,392.32049560546877,461.18095301818848,382.9317626953125]},{"page":323,"text":"16-22. Passing units normally have priority of route use to and within stationary unit assigned areas.","rect":[108.0,479.21429443359377,539.9622144699097,470.1061096191406]},{"page":323,"text":"Clearing and maintaining passage routes up to the BHL are the responsibility of the stationary force.","rect":[108.0,490.7373046875,539.9854688644409,481.6291198730469]},{"page":323,"text":"Stationary forces provide passing forces with obstacle overlays. Passing units prepare to help maintain these","rect":[108.0,502.2001647949219,540.0080232696533,493.09197998046877]},{"page":323,"text":"routes, and they position their engineer equipment accordingly. Stationary units control traffic within their","rect":[108.0,513.7232055664063,539.8738915977478,504.614990234375]},{"page":323,"text":"assigned areas until passing units assume control. Passing units augment the traffic control capabilities of","rect":[108.0,525.2462158203125,539.9902856407166,516.1380615234375]},{"page":323,"text":"stationary units as required during the passage.","rect":[108.0,536.7090454101563,295.48223400115969,527.6008911132813]},{"page":323,"text":"INTELLIGENCE","rect":[90.0,560.0621948242188,164.30680227279664,551.9759521484375]},{"page":323,"text":"16-23. Prior to a passage of lines, the stationary unit’s intelligence staff must exchange all intelligence","rect":[108.0,580.0142822265625,540.0372591094971,570.9061279296875]},{"page":323,"text":"products and databases with the intelligence staff of the passing force. This intelligence includes known and","rect":[108.0,591.5372924804688,539.9716091156006,582.4291381835938]},{"page":323,"text":"suspected enemy locations, enemy unit strengths, and enemy activity focusing on the previous 72 hours.","rect":[108.0,603.0001831054688,524.8701734542847,593.8920288085938]},{"page":323,"text":"16-24. In a forward passage of lines information collection assets are primarily tasked to support offensive","rect":[108.0000228881836,620.525146484375,540.0674104766846,611.4169921875]},{"page":323,"text":"operations following passage of lines completion. In a rearward passage of lines information collection assets","rect":[108.00001525878906,632.0481567382813,539.9705340843201,622.9400024414063]},{"page":323,"text":"are primarily tasked to support defensive operations following passage of lines completion.","rect":[108.00001525878906,643.5110473632813,472.9023389816284,634.4028930664063]},{"page":323,"text":"FIRES","rect":[90.0,666.8621826171875,119.45485496520996,658.7759399414063]},{"page":323,"text":"16-25. Generally, the stationary unit commander controls the allocation of firing positions until the","rect":[108.0,686.8142700195313,540.0674104766846,677.7061157226563]},{"page":323,"text":"execution of the BHL. The fires cells of the stationary and the passing units agree on the allocation of firing","rect":[108.0,698.2771606445313,539.9659328460693,689.1690063476563]},{"page":323,"text":"positions. These positions are far enough forward to support the performance of the passage without having","rect":[108.0,709.8001708984375,540.0251369476318,700.6920166015625]},{"page":323,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":323,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":323,"text":"16-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":324,"text":"Chapter 16","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":324,"text":"to displace artillery assets during critical stages of the passage. Ideally, enemy forces have not previously","rect":[90.0,83.51434326171875,521.9553127288818,74.40616607666016]},{"page":324,"text":"identified these positions.","rect":[90.0,94.95719909667969,192.52465343475343,85.86905670166016]},{"page":324,"text":"16-26. Detailed air and missile defense planning is essential. Passing units tend to move slowly and often","rect":[90.0,112.4921875,521.9731960296631,103.3840103149414]},{"page":324,"text":"in some type of column formation during their passage. Passing and stationary unit vehicle congestion","rect":[90.0,124.01519775390625,522.0273342132568,114.90702056884766]},{"page":324,"text":"presents lucrative targets to enemy aircraft and missiles. Dissemination of early warning and airspace control","rect":[90.0,135.47808837890626,521.9846568069459,126.36991119384766]},{"page":324,"text":"information reduces the risk of fratricide to friendly aviation assets while increasing the probability of the","rect":[90.0,147.00103759765626,521.9623079376221,137.89285278320313]},{"page":324,"text":"timely detection of enemy aircraft and missiles. Strict weapons control status among pilots and air and missile","rect":[90.0,158.5240478515625,521.9944124298096,149.41586303710938]},{"page":324,"text":"defense units is critical, especially during limited visibility.","rect":[90.0,169.9869384765625,326.92470836639407,160.87875366210938]},{"page":324,"text":"SUSTAINMENT AND PROTECTION","rect":[72.0,193.3800048828125,233.76802158355714,185.07601928710938]},{"page":324,"text":"16-27. Stationary forces furnish passing forces with necessary assistance (within their capabilities) as far","rect":[90.0,213.2943115234375,522.0264184532166,204.18612670898438]},{"page":324,"text":"forward as possible, but behind the BHL. Staffs can coordinate this assistance in advance or provide it on an","rect":[90.0,224.73716735839845,521.9820461273193,215.64901733398438]},{"page":324,"text":"emergency basis. The types of assistance typically provided includes—","rect":[90.0,236.28021240234376,375.2393608093262,227.17202758789063]},{"page":324,"text":" Evacuating casualties and detainees.","rect":[115.19999694824219,249.7742919921875,278.73443126678469,240.66610717773438]},{"page":324,"text":" Using areas and facilities such as water points and medical facilities.","rect":[115.19999694824219,263.2742919921875,407.80694103240969,254.16610717773438]},{"page":324,"text":" Controlling routes and traffic management.","rect":[115.19999694824219,276.7742919921875,306.22735118865969,267.6661071777344]},{"page":324,"text":" Recovering disabled vehicles and equipment.","rect":[115.19999694824219,290.2743225097656,314.5050001144409,281.1661376953125]},{"page":324,"text":" Controlling dislocated civilians.","rect":[115.19999694824219,303.7743225097656,261.2877149581909,294.6661376953125]},{"page":324,"text":"This assistance expedites the passage of lines.","rect":[89.9937515258789,318.2933044433594,273.5020704269409,309.18511962890627]},{"page":324,"text":"FORWARD PASSAGE OF LINES","rect":[72.0,343.5896911621094,282.31371226501468,333.90155029296877]},{"page":324,"text":"16-28. The purpose of a forward passage of lines is to move forces forward to conduct offensive operations.","rect":[90.0,363.894287109375,522.0303907394409,354.7861022949219]},{"page":324,"text":"Units performing forward passages of lines maintain enemy contact while allowing the relief of previously","rect":[89.98998260498047,375.357177734375,521.9849758148193,366.2489929199219]},{"page":324,"text":"committed forces. Stationary units control and secure their assigned areas far enough to their front that","rect":[89.98998260498047,386.8801574707031,521.9386973342896,377.77197265625]},{"page":324,"text":"moving units can pass through them and deploy into movement formations prior to those moving units","rect":[89.98999786376953,398.4031677246094,522.0200335960388,389.29498291015627]},{"page":324,"text":"making enemy contact. Generally, stationary units support passing units with direct fires until those passing","rect":[89.98998260498047,409.8660583496094,522.0834865570068,400.75787353515627]},{"page":324,"text":"units mask those direct fires. Stationary units continue providing fire support to passing units until those","rect":[89.98998260498047,421.3890380859375,522.0185213165283,412.2808532714844]},{"page":324,"text":"passing units move beyond the range of those systems. Stationary units secure the lines of departure of","rect":[89.98998260498047,432.91204833984377,521.9979760704041,423.8038635253906]},{"page":324,"text":"forward passing units until these later units can assume those responsibilities. The boundaries of forward","rect":[89.98998260498047,444.37493896484377,521.9839992523193,435.2667541503906]},{"page":324,"text":"passing units after they complete their passage do not have to coincide with the boundaries of stationary units.","rect":[89.98998260498047,455.8979187011719,522.0060377120972,446.78973388671877]},{"page":324,"text":"Figure 16-2 depicts a forward passage of lines.","rect":[89.98998260498047,467.4209289550781,277.16555309295657,458.312744140625]},{"page":324,"text":"16-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":324,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":324,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":325,"text":"Passage of Lines","rect":[466.5,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":325,"text":"Figure 16-2. Forward passage of lines","rect":[225.47999572753907,394.794189453125,404.44523524475098,385.40545654296877]},{"page":325,"text":"PLANNING A FORWARD PASSAGE","rect":[90.0,424.1022033691406,253.10370779037477,416.0159912109375]},{"page":325,"text":"16-29. Planning considerations discussed in paragraphs 16-13 through 16-27 apply during forward passage","rect":[108.0,444.0542907714844,540.0103426055908,434.94610595703127]},{"page":325,"text":"of lines. Close coordination between the passing and stationary force is crucial to enable the successful","rect":[108.0000228881836,455.5171813964844,540.0601572952271,446.40899658203127]},{"page":325,"text":"execution of the forward passage and subsequent transfer of responsibility. The stationary force controls and","rect":[108.0000228881836,467.0401611328125,540.0370998382568,457.9319763183594]},{"page":325,"text":"secures the assigned area far enough to its front that the moving force can pass through the stationary force","rect":[108.0000228881836,478.56317138671877,539.9458284454346,469.4549865722656]},{"page":325,"text":"and reform into a combat formation before contact with an enemy force. Generally, passing units assume","rect":[108.0000228881836,490.02606201171877,540.0310945587158,480.9178771972656]},{"page":325,"text":"control of their respective assigned areas forward of the BHL after two-thirds of forward passing combat","rect":[108.0000228881836,501.5490417480469,540.0764536819459,492.44085693359377]},{"page":325,"text":"elements move through their passage points.","rect":[108.0000228881836,513.0720825195313,285.76690196990969,503.9638671875]},{"page":325,"text":"PREPARING A FORWARD PASSAGE","rect":[90.0,536.4222412109375,258.92369985580447,528.3359985351563]},{"page":325,"text":"16-30. Passing units perform reconnaissance from their current locations to their designated assembly areas","rect":[108.0,556.3143310546875,540.0624530296326,547.2061767578125]},{"page":325,"text":"for the passage of lines. These assembly areas are generally located to the rear of stationary units. These","rect":[108.00003814697266,567.8372802734375,539.9947176055908,558.7291259765625]},{"page":325,"text":"passing units occupy their designated assembly areas after completing this reconnaissance. Commanders","rect":[108.00003814697266,579.3602905273438,540.0808246116638,570.2521362304688]},{"page":325,"text":"task-organize their passing units in those assembly areas for their subsequent missions before initiating their","rect":[108.00003814697266,590.8231811523438,539.9738671836853,581.7150268554688]},{"page":325,"text":"forward passages of lines. Units preparing for forward passages of lines avoid regrouping in their attack","rect":[108.00003814697266,602.34619140625,540.0021266937256,593.238037109375]},{"page":325,"text":"positions.","rect":[108.00003814697266,613.8491821289063,146.68525218963624,604.7610473632813]},{"page":325,"text":"EXECUTING A FORWARD PASSAGE","rect":[90.0,637.2222290039063,260.17394399642947,629.135986328125]},{"page":325,"text":"16-31. Ideally, forward passing forces move in their desired movement formations as move through gaps","rect":[108.0,657.1143188476563,540.1165912132263,648.0061645507813]},{"page":325,"text":"in stationary unit positions without halting. This minimizes the time both forces are concentrated in forward","rect":[108.01005554199219,668.6373291015625,540.0395412445068,659.5291748046875]},{"page":325,"text":"areas and makes them less vulnerable to enemy attack. If not, they deploy to their desired movement","rect":[108.01005554199219,680.1001586914063,540.0804820022584,670.9920043945313]},{"page":325,"text":"formation as soon as they can.","rect":[108.00003814697266,691.6231689453125,229.1238203048706,682.5150146484375]},{"page":325,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":325,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":325,"text":"16-7","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":326,"text":"Chapter 16","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":326,"text":"16-32. Passages of lines occur rapidly once initiated. Units perform a passage of lines when and where","rect":[90.0,83.51434326171875,522.0453157501221,74.40616607666016]},{"page":326,"text":"enemy forces have the least capability to detect it, such as at night or during periods of reduced visibility.","rect":[90.0,94.97723388671875,521.9821729660034,85.86905670166016]},{"page":326,"text":"Units consider using obscuration to screen friendly movement in any passage of lines, even at night. Each","rect":[90.0,106.500244140625,521.9601955413818,97.3920669555664]},{"page":326,"text":"forward passing force’s command post passes through the stationary force’s lines as soon as possible after","rect":[89.98998260498047,118.023193359375,521.9799706993103,108.9150161743164]},{"page":326,"text":"its lead elements complete their forward passage and locates where it can best control operations.","rect":[89.98998260498047,129.486083984375,479.0685987472534,120.3779067993164]},{"page":326,"text":"16-33. Direct fire support by stationary forces ends when combat elements of passing forces, including their","rect":[89.9999771118164,147.0111083984375,522.0692651329041,137.90292358398438]},{"page":326,"text":"reserves, mask that support or move beyond direct fire range. However, artillery, air defense, and other long-","rect":[89.9999771118164,158.5340576171875,522.0323388633728,149.42587280273438]},{"page":326,"text":"range systems continue to support forward passing forces until previously designated events occur or a higher","rect":[89.99996185302735,169.9969482421875,522.0721337852478,160.88876342773438]},{"page":326,"text":"echelon headquarters directs them to conduct another mission.","rect":[89.99996185302735,181.4999237060547,339.39077281951907,172.41177368164063]},{"page":326,"text":"16-34. Stationary forces provide security throughout the performance of the forward passages of lines. The","rect":[89.99996185302735,199.044921875,522.1314973907471,189.93673706054688]},{"page":326,"text":"movement of the forward passing main body units begin from their assembly areas to attack positions.","rect":[89.99993896484375,210.5078125,522.0208692550659,201.39962768554688]},{"page":326,"text":"Passing forces conduct their final preparations for the passage of lines and the attack in those attack positions.","rect":[89.99993896484375,222.03082275390626,522.0137281417847,212.92263793945313]},{"page":326,"text":"Passing forces move to and occupy attack positions when enemy observation is unlikely. Stationary forces","rect":[89.99993896484375,233.49371337890626,521.9690692405701,224.38552856445313]},{"page":326,"text":"clear any obstacles from designated passage gaps, lanes, or routes. They guide passing force elements from","rect":[89.99993896484375,245.0167236328125,522.0050330123902,235.90853881835938]},{"page":326,"text":"contact points through passage points.","rect":[89.99993896484375,256.5396728515625,242.50239086151124,247.43148803710938]},{"page":326,"text":"16-35. Stationary forces’ direct and indirect fire assets normally support the movement of passing forces.","rect":[89.99993896484375,274.0045166015625,522.0082960128784,264.8963317871094]},{"page":326,"text":"Commanders direct any supporting electromagnetic warfare capabilities—especially electromagnetic","rect":[89.99993896484375,285.52752685546877,521.9431428985596,276.4193420410156]},{"page":326,"text":"attack—against enemy command and control nodes. Their objective is to disrupt the enemy force’s","rect":[89.99992370605469,297.050537109375,521.9900653343201,287.9323425292969]},{"page":326,"text":"dissemination of information and ability to react effectively to friendly operations. Any preparation or","rect":[89.99992370605469,308.513427734375,522.0218408164978,299.4052429199219]},{"page":326,"text":"covering fires coincide with the movement of passing forces from their attack positions to passage lanes.","rect":[89.99992370605469,320.0364074707031,508.7214307785034,310.92822265625]},{"page":326,"text":"16-36. After the forward moving unit commander assumes responsibility for the area, that commander","rect":[89.99992370605469,337.5614013671875,522.0030419883728,328.4532165527344]},{"page":326,"text":"coordinates all fire support. Depending on the situation, the passing commander may continue to use only","rect":[89.98989868164063,349.0242919921875,521.9301662445068,339.91607666015627]},{"page":326,"text":"the fire support assets of the stationary force until the passage of lines is complete. This allows forward","rect":[89.98999786376953,360.5473327636719,521.9542140960693,351.43914794921877]},{"page":326,"text":"passing force fire support assets to move forward with the rest of their unit and conserve their ammunition","rect":[89.99002075195313,372.0703125,521.9042263031006,362.9621276855469]},{"page":326,"text":"for later expenditures. On passage of responsibility, the passing unit commander also assumes control of fire","rect":[89.98999786376953,383.533203125,522.0002718048096,374.4250183105469]},{"page":326,"text":"forward of the BHL. For example, the passing unit commander moves the CFL forward to conform to the","rect":[89.98998260498047,395.05621337890627,521.9510774688721,385.9480285644531]},{"page":326,"text":"movement of forward security elements.","rect":[89.98998260498047,406.5791931152344,251.91726207733155,397.47100830078127]},{"page":326,"text":"16-37. The stationary unit provides the passing unit with the previously coordinated sustainment as far","rect":[89.98998260498047,424.0440673828125,521.9901635704041,414.9358825683594]},{"page":326,"text":"forward as possible. The stationary unit concentrates on providing the passing unit with emergency medical,","rect":[89.97996520996094,435.56707763671877,521.9612989425659,426.4588928222656]},{"page":326,"text":"recovery, and fuel supplies to enable the passing unit to move through the stationary unit’s positions rapidly.","rect":[89.97996520996094,447.090087890625,522.0238599777222,437.9819030761719]},{"page":326,"text":"16-38. The principles of a forward passage of lines are the same when dissimilar forces, such as dismounted","rect":[89.97996520996094,464.5549621582031,522.0183010101318,455.44677734375]},{"page":326,"text":"infantry and armored forces, are involved. However, the execution differs in that the type and amount of","rect":[89.9799575805664,476.0779724121094,521.9189965782166,466.96978759765627]},{"page":326,"text":"assistance provided by stationary forces changes because of the different capabilities and requirements of","rect":[89.9799575805664,487.5408630371094,521.9696557579041,478.43267822265627]},{"page":326,"text":"these different types of forces. The higher echelon commander ordering the passage can direct the provision","rect":[89.9799575805664,499.0638732910156,522.0101222991943,489.9556884765625]},{"page":326,"text":"of additional resources from other sources to meet the assistance requirements of forward passing forces.","rect":[89.9799575805664,510.5868835449219,509.5379285812378,501.47869873046877]},{"page":326,"text":"REARWARD PASSAGE OF LINES","rect":[72.0,535.7697143554688,292.4771033782959,526.08154296875]},{"page":326,"text":"16-39. A rearward passage of lines is similar in concept to a forward passage of lines. It continues the","rect":[90.0,556.0742797851563,521.9749422149658,546.9661254882813]},{"page":326,"text":"defense, maintaining enemy contact while allowing for recovery of security or other forward deployed forces.","rect":[90.0,567.5371704101563,522.0169630050659,558.4290161132813]},{"page":326,"text":"Units may or may not conduct this operation under enemy pressure.","rect":[90.0,579.0601806640625,361.33547496795657,569.9520263671875]},{"page":326,"text":"PLANNING A REARWARD PASSAGE","rect":[72.0,602.4222412109375,242.29393911361695,594.3359985351563]},{"page":326,"text":"16-40. The planning considerations discussed in paragraphs 16-13 through 16-27 continue to apply during","rect":[90.0,622.374267578125,522.0343532562256,613.26611328125]},{"page":326,"text":"a rearward passage of lines. However, rearward movement is likely to be more difficult because—","rect":[90.01001739501953,633.837158203125,483.7923698425293,624.72900390625]},{"page":326,"text":" The enemy force probably has the initiative, which tends to reduce the time available to perform","rect":[115.19999694824219,647.3342895507813,522.0529456100464,638.2261352539063]},{"page":326,"text":"liaison, reconnoiter, and make detailed plans.","rect":[133.1999969482422,658.8372802734375,314.2643995285034,649.7491455078125]},{"page":326,"text":" If rearward moving forces have been in action, Soldiers are tired and possibly disorganized.","rect":[115.19999694824219,672.3543090820313,500.0253553390503,663.2461547851563]},{"page":326,"text":" The enemy force may be applying pressure on the passing force.","rect":[115.19999694824219,685.8543090820313,391.12298107147219,676.7461547851563]},{"page":326,"text":" Possible intermixing of friendly and enemy forces increases the probability of fratricide.","rect":[115.19999694824219,699.3543090820313,486.5253858566284,690.2461547851563]},{"page":326,"text":"16-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":326,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":326,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":327,"text":"Passage of Lines","rect":[466.5,46.34102249145508,540.0093100585938,37.90802001953125]},{"page":327,"text":"16-41. Close coordination between the passing and stationary force is crucial to successful execution of the","rect":[108.0,83.51434326171875,540.1567049102783,74.40616607666016]},{"page":327,"text":"rearward passage and subsequent transfer of responsibility. This requirement for close coordination is even","rect":[108.0,94.97723388671875,539.9869289398193,85.86905670166016]},{"page":327,"text":"more critical when the tactical situation results in a staggered or incremental rearward passage across an","rect":[108.0,106.500244140625,539.8770656585693,97.3920669555664]},{"page":327,"text":"assigned area. Passing force commanders relinquish control of their subordinate elements remaining in","rect":[108.0,118.023193359375,540.0143947601318,108.9150161743164]},{"page":327,"text":"contact at the time of the transfer of responsibility to stationary force commanders. Generally, stationary units","rect":[108.0,129.486083984375,539.9854266624451,120.3779067993164]},{"page":327,"text":"assume control of their respective assigned areas forward of the BHL after two-thirds of rearward passing","rect":[108.0,141.0091552734375,539.9536647796631,131.90090942382813]},{"page":327,"text":"combat elements move through their passage points.","rect":[107.98999786376953,152.5321044921875,317.67360973358157,143.42391967773438]},{"page":327,"text":"PREPARING A REARWARD PASSAGE","rect":[90.0,175.88218688964845,266.11396169662478,167.79598999023438]},{"page":327,"text":"16-42. Rearward passing forces begin coordination with those stationary forces through which they are","rect":[108.0,195.7742919921875,539.9840974884033,186.66610717773438]},{"page":327,"text":"going to move after receiving their warning orders. The command posts of both forces involved move to a","rect":[108.0,207.29730224609376,539.9770784454346,198.18911743164063]},{"page":327,"text":"position where they can co-locate as part of the preparations for the rearward passage.","rect":[108.0,218.76019287109376,451.77520275115969,209.65200805664063]},{"page":327,"text":"16-43. The commanders of these forces coordinate the same details as those outlined for a forward passage","rect":[108.00000762939453,236.28515625,540.0648470001221,227.17697143554688]},{"page":327,"text":"of lines. If necessary, fire support assets from the stationary force occupy positions forward of their primary","rect":[108.00000762939453,247.8082275390625,539.9705104827881,238.69998168945313]},{"page":327,"text":"positions to give maximum coverage of forces to the rearward moving unit. The two staffs coordinate those","rect":[108.0,259.27105712890627,539.9439973907471,250.16287231445313]},{"page":327,"text":"control measures necessary to support retrograde operations and their associated rearward passage of lines.","rect":[108.0,270.7940673828125,539.9584913253784,261.6858825683594]},{"page":327,"text":"(See paragraphs 16-9 through 16-12 for a discussion of control measures.) These two commanders establish","rect":[108.0,282.3170471191406,539.9162502288818,273.2088623046875]},{"page":327,"text":"a probable time to initiate passage.","rect":[107.99999237060547,293.7799072265625,246.94436168670655,284.6717224121094]},{"page":327,"text":"EXECUTING A REARWARD PASSAGE","rect":[90.0,317.1222229003906,267.3139433860779,309.0360107421875]},{"page":327,"text":"16-44. Passing forces maintain command of their subordinate elements throughout their retrograde and","rect":[108.0,337.0743103027344,540.0042018890381,327.96612548828127]},{"page":327,"text":"rearward passage. The normal order of march in a rearward passage of lines is sustainment elements, main","rect":[108.0,348.5973205566406,539.9125270843506,339.4891357421875]},{"page":327,"text":"command post, functional and multifunctional support elements, tactical command post, and combat units.","rect":[108.0,360.0401306152344,539.8861036300659,350.9519958496094]},{"page":327,"text":"Passage points mark the locations where rearward passing forces come under the control of restrictions placed","rect":[108.0,371.58319091796877,540.0464382171631,362.4750061035156]},{"page":327,"text":"by stationary forces. If enemy forces continue to press their attacks, passing forces continue to control","rect":[108.0,383.106201171875,540.0549082717896,373.9980163574219]},{"page":327,"text":"operations from the co-located command posts while stationary forces monitor and control the passage of","rect":[108.0,394.5690612792969,539.9582421836853,385.46087646484377]},{"page":327,"text":"lines in their assigned areas until battle handover occurs. Passing force command posts pass through the lines","rect":[108.0,406.0920715332031,539.9719989280701,396.98388671875]},{"page":327,"text":"as soon as possible after the lead elements complete their passage. On passage of command, stationary forces","rect":[108.0,417.6150817871094,540.0537860374451,408.50689697265627]},{"page":327,"text":"assume control of ongoing operations.","rect":[108.0,429.07794189453127,261.04546642303469,419.9697570800781]},{"page":327,"text":"16-45. Stationary forces provide rearward passing forces with as much assistance as possible, just as they","rect":[107.98997497558594,446.5929260253906,539.9555568695068,437.4747314453125]},{"page":327,"text":"do during a forward passage of lines. The provision of indirect and direct fire support to passing forces by","rect":[107.98997497558594,458.11590576171877,539.9141139984131,449.0077209472656]},{"page":327,"text":"stationary forces is crucial for the success of these passages. This is especially important in covering the","rect":[107.98999786376953,469.57879638671877,539.9412508087158,460.4706115722656]},{"page":327,"text":"withdrawal of detachments left in contact during a delay. Stationary force fire support assets answer calls for","rect":[107.98999786376953,481.101806640625,540.0258691368103,471.9936218261719]},{"page":327,"text":"fire from the passing force until battle handover occurs. The passing force’s fire support assets echelon","rect":[107.98998260498047,492.5646667480469,539.9884548187256,483.45648193359377]},{"page":327,"text":"rearward to provide continuous fire support for the passing force until it can successfully disengage.","rect":[107.98999786376953,504.0876770019531,540.0200757980347,494.9794921875]},{"page":327,"text":"Stationary forces initiate and clear calls for all fires forward of their locations once passing forces transfer","rect":[107.98998260498047,515.6106567382813,540.0173852500916,506.5024719238281]},{"page":327,"text":"control operations to them. The same procedure applies to any direct support air and missile defense assets.","rect":[107.98998260498047,527.0735473632813,537.2601881027222,517.9653930664063]},{"page":327,"text":"16-46. Stationary forces ensure that passing forces are able to move through passage routes and lanes. They","rect":[107.98998260498047,544.5985107421875,540.0236110687256,535.4903564453125]},{"page":327,"text":"employ available engineer assets to maintain these routes and lanes for use by passing forces. Stationary","rect":[107.98998260498047,556.1215209960938,539.9447536468506,547.0133666992188]},{"page":327,"text":"force commanders shift these assets to close gaps in their obstacles and defensive positions once passing","rect":[107.98999786376953,567.5844116210938,540.0411281585693,558.4762573242188]},{"page":327,"text":"forces and their forward security elements disengage and withdraw through their forward security areas.","rect":[107.98998260498047,579.107421875,524.5384473800659,569.999267578125]},{"page":327,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":327,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":327,"text":"16-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":328,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":329,"text":"Chapter 17","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":329,"text":"Countermobility","rect":[253.6800079345703,154.12814331054688,376.3419347076416,139.11740112304688]},{"page":329,"text":"Countermobility operations is a combined arms activity. This chapter addresses the","rect":[126.0,188.7806854248047,503.9744239959717,178.79986572265626]},{"page":329,"text":"general considerations for countermobility, terrain reinforcement,","rect":[125.989013671875,201.4405975341797,428.7142686843872,191.45977783203126]},{"page":329,"text":"obstacle","rect":[434.4875793457031,199.22264099121095,470.51077043151857,191.45977783203126]},{"page":329,"text":"intent,","rect":[476.1521911621094,200.90257263183595,504.0413866043091,191.45977783203126]},{"page":329,"text":"obstacle employment principles, and obstacle emplacement. ","rect":[126.0,214.10057067871095,392.92377185821536,204.1197509765625]},{"page":329,"text":"GENERAL COUNTERMOBILITY CONSIDERATIONS","rect":[90.0,239.42967224121095,436.8606483001709,229.7415313720703]},{"page":329,"text":"17-1. Countermobility is a set of combined arms activities that use or enhance the effects of natural and man-","rect":[108.0,259.7342529296875,539.9722802696228,250.62606811523438]},{"page":329,"text":"made obstacles to prevent the enemy freedom of movement and maneuver (ATP 3-90.8/MCTP 3-34B). The","rect":[108.0,271.25726318359377,540.0674104766846,262.1490783691406]},{"page":329,"text":"primary purposes of countermobility are to shape enemy movement and maneuver and to prevent the enemy","rect":[108.0,282.7201232910156,540.0280666351318,273.6119384765625]},{"page":329,"text":"from gaining a position of advantage. Countermobility directly supports offensive and defensive operations,","rect":[108.0,294.2431335449219,539.9840040206909,285.13494873046877]},{"page":329,"text":"but only indirectly supports stability and defense support of civil authorities tasks. Offensive and defensive","rect":[108.0,305.7661437988281,539.9031038360596,296.657958984375]},{"page":329,"text":"operations are always combined with stability operations; defense support of civil authorities tasks are","rect":[108.0,317.22900390625,540.0542879180908,308.1208190917969]},{"page":329,"text":"typically only performed in support of homeland defense.","rect":[108.0,328.75201416015627,338.56231212615969,319.6438293457031]},{"page":329,"text":"17-2. Countermobility can be confused with other tasks or activities that may also employ obstacles. An","rect":[108.0,346.2770080566406,539.9451808929443,337.1688232421875]},{"page":329,"text":"obstacle is any barrier designed or employed to disrupt, fix, turn, or block the movement and maneuver, and","rect":[108.0,357.7398681640625,540.0424098968506,348.6316833496094]},{"page":329,"text":"to impose additional losses in personnel, time, and equipment (JP 3-15). Antiterrorism, physical security,","rect":[108.01001739501953,369.26287841796877,539.9923048019409,360.1546936035156]},{"page":329,"text":"survivability, safety, and traffic operations often employ obstacles such as perimeter fencing, concrete walls,","rect":[108.0100326538086,380.785888671875,540.0024366378784,371.6777038574219]},{"page":329,"text":"and vehicular barriers. However, only countermobility involves tactical obstacle employment with effects","rect":[108.0100326538086,392.2487487792969,539.9872577171326,383.14056396484377]},{"page":329,"text":"directly linked to tactical mission tasks. Another discernible difference of countermobility is that it is a","rect":[108.0100326538086,403.771728515625,539.9864168243408,394.6635437011719]},{"page":329,"text":"combined arms activity conducted to directly support offensive and defensive operations, which may be","rect":[108.0100326538086,415.234619140625,539.9542512969971,406.1264343261719]},{"page":329,"text":"combined with stability and defense support of civil authorities tasks.","rect":[108.01009368896485,426.75762939453127,385.7304334640503,417.6494445800781]},{"page":329,"text":"17-3. Countermobility enables combined arms forces to shape enemy movement and maneuver and prevent","rect":[108.01009368896485,444.2825927734375,540.0342173538209,435.1744079589844]},{"page":329,"text":"the enemy from gaining a position of advantage. In the offense, countermobility is conducted to help isolate","rect":[108.01000213623047,455.7454833984375,539.9539461212158,446.6372985839844]},{"page":329,"text":"objectives and prevent the enemy from repositioning, reinforcing, and counterattacking. It enables flank","rect":[108.01001739501953,467.26849365234377,540.0190334320068,458.1502990722656]},{"page":329,"text":"protection along an axis of advance or as an integrated economy-of-force effort to provide general flank","rect":[108.01001739501953,478.79150390625,539.9575099945068,469.6833190917969]},{"page":329,"text":"security. In the defense, countermobility disrupts enemy attack formations and enables friendly forces to","rect":[107.98999786376953,490.25439453125,539.9316921234131,481.1462097167969]},{"page":329,"text":"defeat the enemy in detail. Obstacles help channel the enemy into engagement areas throughout and protect","rect":[107.98999786376953,501.77740478515627,540.0113902053834,492.6692199707031]},{"page":329,"text":"the flanks of friendly forces conducting a counterattack.","rect":[107.98998260498047,513.3004150390625,331.83291149139407,504.19219970703127]},{"page":329,"text":"17-4. In support of offensive operations, countermobility may be required to defend a lodgment and protect","rect":[107.98998260498047,530.7652587890625,539.9597544631959,521.6571044921875]},{"page":329,"text":"selected sites and positions from which combat power must be generated and sustained. The unit’s options","rect":[107.98999786376953,542.2882690429688,540.0816180686951,533.1801147460938]},{"page":329,"text":"for emplacing reinforcing obstacles in the offense are often limited because of challenges in gaining early","rect":[107.98995971679688,553.811279296875,539.9116725921631,544.703125]},{"page":329,"text":"access to much of the assigned area. This increases the importance of taking advantage of existing obstacles","rect":[107.98995971679688,565.274169921875,539.9183490257263,556.166015625]},{"page":329,"text":"and the natural restrictiveness of the terrain. It also increases the unit’s reliance on rapid obstacle","rect":[107.97993469238281,576.777099609375,539.9723177032471,567.68896484375]},{"page":329,"text":"emplacement capabilities, especially remotely delivered obstacles to reinforce the terrain.","rect":[107.9800033569336,588.3201293945313,465.8365125656128,579.2119750976563]},{"page":329,"text":"17-5. In support of defensive operations, countermobility operations use tactical obstacles to shape","rect":[107.9799575805664,605.7849731445313,539.9980745391846,596.6768188476563]},{"page":329,"text":"engagements and maximize the effects of fires and use protective obstacles to provide close-in protection","rect":[107.9799575805664,617.3079833984375,539.9452419281006,608.1998291015625]},{"page":329,"text":"around defensive positions. Protective obstacles help warn, prevent, and mitigate intrusion into critical fixed","rect":[107.97997283935547,628.8310546875,539.9492092132568,619.722900390625]},{"page":329,"text":"sites such as assembly areas and sustainment sites, or a final enemy assault onto a unit position. Erecting","rect":[107.97997283935547,640.2939453125,539.9080104827881,631.185791015625]},{"page":329,"text":"obstacles is also a critical supportive task to conducting denial operations. In the defense, earlier access to","rect":[107.9800033569336,651.8168334960938,539.9355373382568,642.7086791992188]},{"page":329,"text":"more of the assigned areas typically provides units with the time and information to consider a broader range","rect":[107.9799575805664,663.2797241210938,540.0586214141846,654.1715698242188]},{"page":329,"text":"of options for reinforcing the terrain. In addition to the rapid obstacle emplacement capabilities often used in","rect":[107.98998260498047,674.802734375,540.0170192718506,665.694580078125]},{"page":329,"text":"the offense, units can often use more time- and resource-intensive techniques to reinforce the terrain for","rect":[107.98998260498047,686.3057861328125,539.9962670860291,677.2176513671875]},{"page":329,"text":"longer periods. This may or may not be the case in support of lodgments. Such techniques include mostly","rect":[107.97994995117188,697.7886962890625,539.9070339202881,688.6805419921875]},{"page":329,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":329,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":329,"text":"17-1","rect":[504.00299072265627,754.0800170898438,521.9580405273438,747.6090087890625]},{"page":330,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":330,"text":"constructed obstacles and some demolition obstacles. During a retrograde, including security force passage,","rect":[90.0,83.51434326171875,522.0424146652222,74.40616607666016]},{"page":330,"text":"the requirement for obstacle control will typically be increased.","rect":[90.0,94.97723388671875,343.6011915206909,85.86905670166016]},{"page":330,"text":"17-6. Units must weigh the risks of employing obstacles, especially lethal obstacles, near civilians and","rect":[90.0000228881836,112.4921875,522.0073146820068,103.3840103149414]},{"page":330,"text":"consider enhancing marking and restrictions to mitigate their risk. Units rely heavily on command-detonated,","rect":[90.0000228881836,124.01519775390625,522.0444288253784,114.90702056884766]},{"page":330,"text":"self-deactivating, or nonexplosive obstacles to deny the enemy freedom of movement and provide close-in","rect":[90.0,135.47808837890626,521.9662380218506,126.36991119384766]},{"page":330,"text":"protection. Denying enemy freedom of movement may involve disrupting the transportation of weapons and","rect":[90.0,147.00103759765626,521.9747219085693,137.89285278320313]},{"page":330,"text":"supplies and the emplacement of explosive hazards along roads or routes. Networked munitions are ideal","rect":[90.0,158.5240478515625,522.0553965530396,149.41586303710938]},{"page":330,"text":"when conducting countermobility in support defensive efforts around base camps and other critical fixed","rect":[89.99999237060547,169.9869384765625,521.8705348968506,160.87875366210938]},{"page":330,"text":"sites and infrastructure.","rect":[89.99999237060547,179.4859161376953,183.64893627166749,172.40176391601563]},{"page":330,"text":"17-7. The conduct of countermobility typically involves engineers and includes proper obstacle integration","rect":[89.99999237060547,199.034912109375,521.9482326507568,189.92672729492188]},{"page":330,"text":"with the maneuver plan, adherence to obstacle emplacement authority, and positive obstacle control.","rect":[90.0,210.497802734375,522.0490674972534,201.38961791992188]},{"page":330,"text":"Combined arms obstacle integration synchronizes countermobility into the concept of operations. Because","rect":[90.0,222.02081298828126,522.0634431915283,212.91262817382813]},{"page":330,"text":"most obstacles have the potential to deny freedom of movement and maneuver to friendly forces and enemy","rect":[90.0,233.48370361328126,522.0261135101318,224.37551879882813]},{"page":330,"text":"forces, it is critical that units properly weigh the risks and evaluate the trade-offs of employing various types","rect":[90.0,245.0067138671875,521.9882342796326,235.89852905273438]},{"page":330,"text":"of obstacles. Countermobility includes the following tasks:","rect":[90.0000228881836,256.5296630859375,325.8899302444458,247.42147827148438]},{"page":330,"text":" Site obstacles.","rect":[115.19999694824219,267.9803161621094,190.42522716522218,260.8861389160156]},{"page":330,"text":" Construct, emplace, or detonate obstacles.","rect":[115.19999694824219,283.4742431640625,301.77642345428469,274.3861083984375]},{"page":330,"text":" Mark, report, and record obstacles.","rect":[115.19999694824219,296.9742431640625,272.8618116378784,287.8861083984375]},{"page":330,"text":" Maintain obstacle integration.","rect":[115.19999694824219,310.4942932128906,252.9450330734253,301.3861083984375]},{"page":330,"text":"TERRAIN REINFORCEMENT","rect":[72.0,335.7757263183594,266.0466140403748,326.1155700683594]},{"page":330,"text":"17-8. Units reinforce terrain by employing existing, reinforcing, tactical, and protective obstacles to prevent","rect":[90.0,356.09429931640627,522.0284190139771,346.9861145019531]},{"page":330,"text":"the enemy from gaining a position of advantage. They take full advantage of the natural restrictiveness of the","rect":[90.0,367.55718994140627,522.0791902618408,358.4490051269531]},{"page":330,"text":"existing terrain to minimize the time, effort, and materiel needed to achieve the desired effects and offset the","rect":[90.0,379.0801696777344,522.0122957305908,369.97198486328127]},{"page":330,"text":"limited, available quantities of scatterable mines and networked munitions.","rect":[90.0,390.5831298828125,389.9203748703003,381.4949951171875]},{"page":330,"text":"EXISTING OBSTACLES","rect":[72.0,413.9880065917969,181.3785915374756,405.6960144042969]},{"page":330,"text":"17-9. Existing obstacles are inherent aspects of the terrain that impede movement and maneuver. Existing","rect":[90.0,433.85430908203127,521.9860744476318,424.7461242675781]},{"page":330,"text":"obstacles may be natural (intractable soils, rivers, mountains, wooded areas) or manmade (enemy explosive","rect":[90.0,445.3773193359375,521.9513216094971,436.2691345214844]},{"page":330,"text":"and nonexplosive obstacles and structures, including bridges, canals, railroads, and embankments associated","rect":[90.0,456.9002990722656,521.9058742523193,447.7921142578125]},{"page":330,"text":"with them). Although not specifically designed or intended as an obstacle, structures may pose as an obstacle","rect":[90.0,468.3631896972656,522.0644197540283,459.2550048828125]},{"page":330,"text":"based on existing characteristics or altered characteristics that result from combat operations or a catastrophic","rect":[90.0,479.8861999511719,522.0235261993408,470.77801513671877]},{"page":330,"text":"event. Structures such as bridges and overpasses present an inherent impediment to mobility based on weight","rect":[90.0,491.34906005859377,522.0361704788209,482.2408752441406]},{"page":330,"text":"and clearance restrictions. Existing obstacles are shown on the modified combined obstacle overlay (also","rect":[90.0,502.8720703125,522.0110988616943,493.7638854980469]},{"page":330,"text":"known as a MCOO) developed as part of the IPB process.","rect":[90.0,514.3750610351563,321.94390392303469,505.2868957519531]},{"page":330,"text":"REINFORCING OBSTACLES","rect":[72.0,537.7680053710938,203.70238304138185,529.4759521484375]},{"page":330,"text":"17-10. Reinforcing obstacles are those manmade obstacles that strengthen existing terrain to achieve a","rect":[90.0,557.63427734375,521.9681673126221,548.526123046875]},{"page":330,"text":"desired effect. For U.S. forces, reinforcing obstacles on land consist of land mines, networked munitions, and","rect":[90.0,569.1572875976563,522.0471706390381,560.0491333007813]},{"page":330,"text":"demolition and constructed obstacles:","rect":[90.0,578.65625,240.74492597198486,571.5721435546875]},{"page":330,"text":"","rect":[115.19999694824219,591.4454345703125,121.16105696249008,586.7532348632813]},{"page":330,"text":"Land mines.A land mine is a munition on or near the ground or other surface area that is designed","rect":[133.1999969482422,594.17431640625,522.0563869476318,585.066162109375]},{"page":330,"text":"to be exploded by the presence, proximity, or contact of a person or vehicle (ATP 3-90.8/MCTP","rect":[133.2100067138672,605.63720703125,522.0601339263916,596.529052734375]},{"page":330,"text":"3-34B). Land mines can be employed in quantities within a specific area to form a minefield, or","rect":[133.20997619628907,617.16015625,521.8776147422791,608.052001953125]},{"page":330,"text":"they can be used individually to reinforce nonexplosive obstacles. Land mines fall into the two","rect":[133.20997619628907,628.6831665039063,521.9409694671631,619.5750122070313]},{"page":330,"text":"general categories:","rect":[133.20997619628907,640.1460571289063,208.41109418487549,631.0379028320313]},{"page":330,"text":" Nonpersistent. Nonpersistent land mines are capable of self-destructing or self-deactivating.","rect":[133.1999969482422,654.17431640625,522.0421705245972,645.066162109375]},{"page":330,"text":"Land mines can be further defined as antivehicle or antipersonnel. They can be air-, artillery-","rect":[151.19998168945313,665.697265625,522.1002709922791,656.589111328125]},{"page":330,"text":", or ground-delivered.","rect":[151.199951171875,677.2203369140625,238.42907238006593,668.1121826171875]},{"page":330,"text":" Persistent. Persistent land mines are not capable of self-destructing or self-deactivating.","rect":[133.1999969482422,691.2542724609375,504.46709728240969,682.1461181640625]},{"page":330,"text":"17-2","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":330,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":330,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":331,"text":"Countermobility","rect":[471.0,46.34102249145508,540.0236533203125,37.90802001953125]},{"page":331,"text":"Note. As of 1 January 2011, U.S. forces are no longer authorized to employ persistent (those that","rect":[133.1999969482422,89.21429443359375,522.0852427444459,80.10611724853516]},{"page":331,"text":"are not self-destructing or self-deactivating) or nondetectable land mines.","rect":[133.1999969482422,100.7342529296875,426.1647596359253,91.6260757446289]},{"page":331,"text":"","rect":[133.1999969482422,126.26546478271485,139.16105696249009,121.57322692871094]},{"page":331,"text":"","rect":[133.1999969482422,162.74545288085938,139.16105696249009,158.05320739746095]},{"page":331,"text":"","rect":[133.1999969482422,199.28549194335938,139.16105696249009,194.59324645996095]},{"page":331,"text":"Networked munitions. Networked munitions are remotely controlled, interconnected, weapons","rect":[151.1999969482422,128.99432373046876,540.0370624046326,119.88614654541016]},{"page":331,"text":"systems designed to provide rapidly emplaced ground-based countermobility and protection","rect":[151.20004272460938,140.517333984375,539.9648952484131,131.40914916992188]},{"page":331,"text":"capability through scalable application of lethal and nonlethal means (JP 3-15).","rect":[151.19000244140626,151.980224609375,468.0253858566284,142.87203979492188]},{"page":331,"text":"Demolition obstacles. Demolition obstacles are created using explosives. Examples include","rect":[151.1999969482422,165.47430419921876,539.9942903594971,156.36611938476563]},{"page":331,"text":"bridge or other structure demolition (rubble) and road craters. (See ATP 3-90.8/MCTP 3-34B for","rect":[151.1999969482422,176.997314453125,540.0281274375916,167.88912963867188]},{"page":331,"text":"more information on demolition obstacles.)","rect":[151.19000244140626,188.5002899169922,324.7424218711853,179.41213989257813]},{"page":331,"text":"Constructed obstacles. Constructed obstacles are created without the direct use of explosives.","rect":[151.1999969482422,201.9943084716797,539.9429883956909,192.90615844726563]},{"page":331,"text":"Examples include wire obstacles, antivehicle ditches, or similar construction that typically","rect":[151.18997192382813,213.47723388671876,540.0239162445068,204.36904907226563]},{"page":331,"text":"involves the use of heavy equipment. (See ATP 3-90.8/MCTP 3-34B for more information on","rect":[151.18997192382813,225.000244140625,539.9559841156006,215.89205932617188]},{"page":331,"text":"constructed obstacles.)","rect":[151.1900177001953,236.4430389404297,242.30188537216189,227.35488891601563]},{"page":331,"text":"17-11. The use of some obstacles, specifically mines, is governed by U.S. law, U.S. policies, and","rect":[107.98377990722656,253.98809814453126,539.9913234710693,244.87991333007813]},{"page":331,"text":"international treaties or agreements. The United States regards mines as lawful weapons when employed","rect":[107.97377014160156,265.5111083984375,539.9615383148193,256.4029235839844]},{"page":331,"text":"according to accepted legal standards. These laws and policies are complex and subject to change; therefore,","rect":[107.97377014160156,276.9739990234375,539.9744825363159,267.8558044433594]},{"page":331,"text":"it is essential that commanders coordinate with legal advisors when developing local rules of engagement","rect":[107.97377014160156,288.4969482421875,539.9657969436646,279.3887634277344]},{"page":331,"text":"(ROE) and ensure that legal advisors review law and policies for legal sufficiency. (See JP 3-15 for more","rect":[107.97377014160156,300.01995849609377,540.0913362579346,290.9117736816406]},{"page":331,"text":"information on the laws, agreements, and policies that are most significant to the employment of obstacles.)","rect":[107.97376251220703,311.48284912109377,538.9299829063416,302.3746643066406]},{"page":331,"text":"TACTICAL OBSTACLES","rect":[90.0,334.8480224609375,203.1023769378662,326.5560302734375]},{"page":331,"text":"17-12. The primary purposes of tactical obstacles are to shape enemy maneuver and to maximize the effects","rect":[108.0,354.7743225097656,540.0533587913513,345.6661376953125]},{"page":331,"text":"of fires. Tactical obstacles directly attack the ability of a force to move, mass, and reinforce; therefore, they","rect":[107.99996185302735,366.2973327636719,539.8914089202881,357.18914794921877]},{"page":331,"text":"affect the tempo of operations. Units integrate obstacles into the scheme of maneuver to enhance the effects","rect":[107.99996185302735,377.76019287109377,539.9185321311951,368.6520080566406]},{"page":331,"text":"of fires. Preexisting obstacles that a unit reinforces and integrates with observation and fires may become","rect":[107.99996185302735,389.283203125,540.0304231719971,380.1750183105469]},{"page":331,"text":"tactical obstacles. The types of tactical obstacles are clearly distinguished by the differences in execution","rect":[107.99996185302735,400.80621337890627,539.9133815765381,391.6980285644531]},{"page":331,"text":"criteria. The three types are—","rect":[107.99996185302735,412.2690734863281,227.7509880065918,403.160888671875]},{"page":331,"text":" Directed obstacles.","rect":[133.1999969482422,423.7302551269531,227.25983715057374,416.6461181640625]},{"page":331,"text":" Situational obstacles.","rect":[133.1999969482422,437.24029541015627,236.14455699920655,430.1461181640625]},{"page":331,"text":" Reserved obstacles.","rect":[133.1999969482422,450.7302551269531,230.0784559249878,443.6461181640625]},{"page":331,"text":"17-13. Adirected obstacleis an obstacle directed by a higher commander as a specified task to a subordinate","rect":[108.00376892089844,470.279296875,540.1083040313721,461.1711120605469]},{"page":331,"text":"unit (ATP 3-90.8/MCTP 3-34B). The higher commander directs and resources these obstacles as specified","rect":[108.00377655029297,481.8022766113281,539.9180812835693,472.694091796875]},{"page":331,"text":"tasks to a subordinate unit. Units plan, prepare, and execute directed obstacles during the preparation of the","rect":[107.99375915527344,493.2651672363281,540.0652742462158,484.156982421875]},{"page":331,"text":"area of operations. Most tactical obstacles are directed obstacles.","rect":[107.9937515258789,504.7680969238281,366.7423048019409,495.6799621582031]},{"page":331,"text":"17-14. A situational obstacle is an obstacle that a unit plans and possibly prepares prior to starting an","rect":[107.9937515258789,522.2530517578125,540.0543117523193,513.1448974609375]},{"page":331,"text":"operation but does not execute unless specific criteria are met (ATP 3-90.8/MCTP 3-34B). Situational","rect":[107.98373413085938,533.7559814453125,540.0030894241334,524.6678466796875]},{"page":331,"text":"obstacles are preplanned obstacles as part of a TAI. They provide the commander with flexibility for","rect":[107.97373962402344,545.2990112304688,539.9948022422791,536.1908569335938]},{"page":331,"text":"emplacing tactical obstacles based on battlefield development.","rect":[107.97373962402344,556.7619018554688,357.60406017303469,547.6537475585938]},{"page":331,"text":"17-15. Areserved obstacleis an obstacle of any type, for which the commander restricts execution authority","rect":[107.97373962402344,574.27685546875,539.9890041351318,565.168701171875]},{"page":331,"text":"(ATP 3-90.8). The commander specifies a unit that is responsible for preparing, guarding, and executing","rect":[107.96371459960938,585.7999267578125,539.9047145843506,576.6917114257813]},{"page":331,"text":"reserved-obstacle emplacement. Units execute reserved obstacles only on command of the authorized","rect":[107.95370483398438,597.2627563476563,539.9199123382568,588.1546020507813]},{"page":331,"text":"commander or based on specific criteria identified by the commander. The purpose of a reserved obstacle is","rect":[107.95361328125,608.7857666015625,539.8855731468201,599.6776123046875]},{"page":331,"text":"to retain control over the mobility along an avenue of approach. Commanders use reserved obstacles when","rect":[107.95361328125,620.3087158203125,539.9407253265381,611.2005615234375]},{"page":331,"text":"failure to maintain control over the mobility along an avenue of approach will have disastrous effects on the","rect":[107.95361328125,631.7716064453125,539.9629793243408,622.6634521484375]},{"page":331,"text":"current battle or future operations.","rect":[107.95361328125,643.2745971679688,244.8528242111206,634.1864624023438]},{"page":331,"text":"PROTECTIVE OBSTACLES","rect":[90.0,666.6480102539063,215.6423854827881,658.35595703125]},{"page":331,"text":"17-16. Protective obstacles are employed to protect people, equipment, supplies, and facilities against","rect":[108.0,686.5742797851563,540.0082163772584,677.4661254882813]},{"page":331,"text":"threats. Protective obstacles have two primary roles, defense and security:","rect":[108.0,698.0371704101563,403.81955670928957,688.9290161132813]},{"page":331,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":331,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":331,"text":"17-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":332,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":332,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":332,"text":"","rect":[115.19999694824219,128.78549194335938,121.16105696249008,124.09324645996094]},{"page":332,"text":"Defense. Protective obstacles provide friendly forces with local, close-in protection. They prevent","rect":[133.1999969482422,83.51434326171875,522.0290904006959,74.40616607666016]},{"page":332,"text":"the enemy from delivering a surprise assault from areas close to a position and are integrated with","rect":[133.20001220703126,94.97723388671875,522.0541896820068,85.86905670166016]},{"page":332,"text":"FPFs to defeat the final assault of the enemy. Protective obstacles are employed to defeat mounted","rect":[133.20001220703126,106.500244140625,522.0453395843506,97.3920669555664]},{"page":332,"text":"and dismounted threats.","rect":[133.2100372314453,115.99915313720703,228.51728343963624,108.9150161743164]},{"page":332,"text":"Security. Protective obstacles are used to prevent or mitigate hostile actions against friendly forces","rect":[133.1999969482422,131.51434326171876,522.0288836936951,122.40616607666016]},{"page":332,"text":"and critical fixed sites (such as air facilities, bases or base camps, critical infrastructure, and","rect":[133.1999969482422,142.9571990966797,521.9450588226318,133.86904907226563]},{"page":332,"text":"sustainment sites). Protective obstacles used for security produce scalable effects that range from","rect":[133.19998168945313,154.500244140625,521.9782996139527,145.39205932617188]},{"page":332,"text":"lethal to nonlethal and are appropriate for the situation based on the ROE.","rect":[133.19998168945313,166.00315856933595,428.3839063644409,156.91500854492188]},{"page":332,"text":"17-17. Protective obstacles are key enablers to survivability operations, physical security, and antiterrorism.","rect":[90.0037612915039,183.48809814453126,522.0051221847534,174.37991333007813]},{"page":332,"text":"Units on the move rely on rapidly emplaced protective obstacles that units can quickly recover, deactivate,","rect":[89.99374389648438,195.0111083984375,521.8775587081909,185.90292358398438]},{"page":332,"text":"or destroy. Stationary units continuously improve their security posture. (See ADP 3-37 for more information","rect":[89.99374389648438,206.4739990234375,522.0161037445068,197.36581420898438]},{"page":332,"text":"on the use of obstacles in supporting protection tasks that are not considered countermobility tasks.)","rect":[89.99372863769531,217.9969482421875,489.6263330039978,208.88876342773438]},{"page":332,"text":"OBSTACLE INTENT","rect":[72.0,243.2696990966797,205.3929427757263,233.5955352783203]},{"page":332,"text":"17-18. Obstacle intent describes how obstacles support the commander’s concept of operations. Obstacle","rect":[90.0,263.5542297363281,522.0038728790283,254.46609497070313]},{"page":332,"text":"intent consists of the—","rect":[90.0,273.0732421875,182.5848045349121,265.9891052246094]},{"page":332,"text":" Target.","rect":[115.19999694824219,288.59429931640627,161.86321544647218,279.8067626953125]},{"page":332,"text":" Effect.","rect":[115.19999694824219,300.07025146484377,160.18386363983155,292.99615478515627]},{"page":332,"text":" Relative location.","rect":[115.19999694824219,313.57025146484377,203.74782848358155,306.4861145019531]},{"page":332,"text":"TARGET","rect":[72.0,338.96221923828127,113.71837759017945,330.8760070800781]},{"page":332,"text":"17-19. The target is the enemy force that the commander wants to affect with tactical obstacles. The","rect":[90.0,358.85430908203127,522.0346956329346,349.7461242675781]},{"page":332,"text":"commander usually identifies the target in terms of the enemy size and type, the echelon, the avenue of","rect":[90.0,370.3773193359375,522.0211083946228,361.2691345214844]},{"page":332,"text":"approach, or a combination of these things.","rect":[90.0,381.9002990722656,262.7839307785034,372.7921142578125]},{"page":332,"text":"EFFECT","rect":[72.0,405.25274658203127,111.08483266830445,397.176025390625]},{"page":332,"text":"17-20. Tactical obstacles and fires—direct and indirect—manipulate the enemy in a way that supports the","rect":[90.0,425.154296875,522.0393343048096,416.0461120605469]},{"page":332,"text":"commander’s intent and scheme of movement and maneuver (or scheme of maneuver). Obstacle effect","rect":[89.98998260498047,436.6572570800781,522.0123057327271,427.5691223144531]},{"page":332,"text":"describes the effect that the commander wants the obstacles, combined with fires, to have on the enemy. The","rect":[89.98998260498047,448.2002868652344,522.0190706329346,439.09210205078127]},{"page":332,"text":"obstacle effect—","rect":[89.98998260498047,457.6391296386719,158.02578353881837,450.55499267578127]},{"page":332,"text":" Drives integration.","rect":[115.19999694824219,473.154296875,208.24376964569093,464.0461120605469]},{"page":332,"text":" Focuses subordinate fires.","rect":[115.19999694824219,484.6302490234375,237.4040174484253,477.5461120605469]},{"page":332,"text":" Focuses obstacle effort.","rect":[115.19999694824219,498.1302490234375,227.92205333709718,491.0461120605469]},{"page":332,"text":" Multiplies firepower effects.","rect":[115.19999694824219,513.63427734375,247.3649091720581,504.5461120605469]},{"page":332,"text":"17-21. It is important to remember that obstacle effects occur because of the combined effects of fires and","rect":[89.9937515258789,531.1492309570313,521.9570217132568,522.0610961914063]},{"page":332,"text":"obstacles, rather than from obstacles alone. Tactical obstacles produce one of the following effects (see","rect":[89.9937515258789,542.6321411132813,521.9544954376221,533.5239868164063]},{"page":332,"text":"paragraphs 17-24 through 17-45 for protective obstacle effects):","rect":[89.9937973022461,554.1551513671875,346.3243784866333,545.0469970703125]},{"page":332,"text":" Block.","rect":[115.19999694824219,565.6302490234375,159.6477918624878,558.546142578125]},{"page":332,"text":" Disrupt.","rect":[115.19999694824219,581.13427734375,165.76499462127686,572.046142578125]},{"page":332,"text":" Fix.","rect":[115.19999694824219,592.5,149.08471202850343,585.546142578125]},{"page":332,"text":" Turn.","rect":[115.19999694824219,606.1302490234375,155.2049207687378,599.3667602539063]},{"page":332,"text":"17-22. Each obstacle effect is graphically represented by an obstacle effect symbol, as shown in table 17-1.","rect":[90.00376892089844,625.6692504882813,521.9860181808472,616.5610961914063]},{"page":332,"text":"Obstacle effect symbols are used as control measures for obstacle groups and as elements of the control","rect":[90.00376892089844,637.1321411132813,521.9704966506959,628.0239868164063]},{"page":332,"text":"measures for obstacle zones and belts. During COA development, obstacle effect symbols are also used in","rect":[90.00376892089844,648.6551513671875,522.0191555023193,639.5469970703125]},{"page":332,"text":"developing and showing the initial obstacle plan that supports each COA.","rect":[90.00376892089844,660.1781005859375,384.1650342941284,651.0699462890625]},{"page":332,"text":"17-4","rect":[72.1199951171875,754.0800170898438,90.07499914550782,747.6090087890625]},{"page":332,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":332,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":333,"text":"Table 17-1. Tactical obstacle effects","rect":[229.9199981689453,81.53020477294922,400.0796651763916,74.12541961669922]},{"page":333,"text":"Countermobility","rect":[471.0,46.34102249145508,540.0236533203125,37.90802001953125]},{"page":333,"text":"17-23. Obstacle effects and their symbols resemble some of the tactical mission tasks and symbols","rect":[108.0,631.9743041992188,539.9942157249451,622.8661499023438]},{"page":333,"text":"described in Appendix A. However, obstacle effects and obstacle effect symbols differ from tactical mission","rect":[108.0,643.4371337890625,540.0925197601318,634.3289794921875]},{"page":333,"text":"tasks and tactical mission task symbols. Tactical mission task symbols are used during COA development to","rect":[108.0,654.960205078125,540.0283107757568,645.85205078125]},{"page":333,"text":"show information (the what or why) about a friendly force action. Obstacle effect symbols are used during","rect":[108.0,666.483154296875,539.8701076507568,657.375]},{"page":333,"text":"COA development to show how obstacles will support each COA. Obstacle effects must support tactical","rect":[108.0,677.926025390625,539.9361948928834,668.837890625]},{"page":333,"text":"mission tasks, but the best way to do that may require designating an obstacle effect that differs from the","rect":[108.0,689.4690551757813,540.0230989532471,680.3609008789063]},{"page":333,"text":"supported tactical mission task or placing it in a different location; for example, achieving the tactical mission","rect":[108.0,700.9920654296875,540.0383205413818,691.8839111328125]},{"page":333,"text":"task fix in a specified location may require turn or block obstacle effects in front of, behind, or adjacent to","rect":[108.0,712.4549560546875,539.9810695648193,703.3367309570313]},{"page":333,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":333,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":333,"text":"17-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":334,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":334,"text":"that location depending on the effects of terrain. Similarly, the obstacle effect symbols in table 17-1 have","rect":[90.0,83.51434326171875,522.0634431915283,74.40616607666016]},{"page":334,"text":"different orientation, meaning, and application than the tactical mission task symbols they resemble.","rect":[90.00003814697266,94.97723388671875,490.7276563644409,85.86905670166016]},{"page":334,"text":"Block Effect","rect":[90.0,111.38272857666016,147.6482832069397,103.80653381347656]},{"page":334,"text":"17-24. Block is an obstacle effect that integrates fire planning and obstacle efforts to stop an attacker along","rect":[90.0,131.154296875,521.9695949554443,122.0461196899414]},{"page":334,"text":"a specific avenue of approach or to prevent the attacking force from passing through an engagement area. To","rect":[89.99999237060547,142.6171875,522.0423488616943,133.50900268554688]},{"page":334,"text":"accomplish the block effect, the obstacles and fires must—","rect":[90.01005554199219,154.1201629638672,325.8157768249512,145.03201293945313]},{"page":334,"text":" Prevent the enemy from bypassing or breaching the obstacles.","rect":[115.19999694824219,167.63427734375,381.1650037765503,158.52609252929688]},{"page":334,"text":" Maximize available standoff.","rect":[115.19999694824219,179.11024475097657,250.1173505783081,172.02609252929688]},{"page":334,"text":" Stop enemy forward movement.","rect":[115.19999694824219,194.63427734375,262.0682325363159,185.52609252929688]},{"page":334,"text":"17-25. Units consider obstacle protection when planning fire control measures. The first mission of the","rect":[89.9937515258789,212.15924072265626,522.0390291290283,203.05105590820313]},{"page":334,"text":"overwatching force is to stop any bypassing or breaching attempt. They respond to any attempt to breach or","rect":[89.99374389648438,223.62213134765626,521.9844873008728,214.51394653320313]},{"page":334,"text":"bypass with direct and indirect fires. Block obstacles stop enemy maneuver and cause the enemy to commit","rect":[89.99374389648438,235.1451416015625,522.0201792678834,226.03695678710938]},{"page":334,"text":"breaching assets that can be destroyed by fire.","rect":[89.9937515258789,246.66815185546876,273.80962657928469,237.55996704101563]},{"page":334,"text":"17-26. To support survivability, units position forces to provide standoff so that the force can survive. The","rect":[89.9937515258789,264.13299560546877,522.0479402618408,255.02481079101563]},{"page":334,"text":"engagement area must cover the width of the entire avenue of approach. The maximum effective range of the","rect":[89.98373413085938,275.656005859375,522.0101595001221,266.5478210449219]},{"page":334,"text":"overwatching weapons minus the standoff distance limits the depth of the engagement area. The commander","rect":[89.9937515258789,287.1789855957031,522.0460107383728,278.07080078125]},{"page":334,"text":"positions forces so that they can mass interlocking fires across the entire avenue of approach. The defending","rect":[89.9937515258789,298.6418762207031,522.0169582366943,289.53369140625]},{"page":334,"text":"force must be able to concentrate all available fires within the obstacle group. Units array weapon systems in","rect":[89.9937973022461,310.1648864746094,521.9545803070068,301.05670166015627]},{"page":334,"text":"depth based on their maximum effective ranges.","rect":[89.99375915527344,321.6878662109375,282.5109815597534,312.5796813964844]},{"page":334,"text":"17-27. The success of a block obstacle is measured by its impact on the enemy advance, not by enemy","rect":[89.99375915527344,339.1528015136719,521.9559841156006,330.0445556640625]},{"page":334,"text":"losses. The block effect is the most resource-intensive obstacle effect to achieve and is usually only limited","rect":[89.98370361328125,350.6757507324219,521.8536281585693,341.56756591796877]},{"page":334,"text":"to critical points on the battlefield. Normally, the purposes of forces overwatching a block obstacle is to","rect":[89.97370910644531,362.13861083984377,521.9700832366943,353.0304260253906]},{"page":334,"text":"defeat lead enemy units and cause the attacker to reconsider the deployment of follow-on forces.","rect":[89.97370910644531,373.66162109375,522.0170850753784,364.5534362792969]},{"page":334,"text":"Commanders allocate sufficient combat power to achieve all effects of the obstacle which demand protecting","rect":[89.97372436523438,385.18463134765627,522.0146389007568,376.0764465332031]},{"page":334,"text":"the obstacle and defeating enemy forces encountering it.","rect":[89.97372436523438,396.6474609375,315.4378614425659,387.5392761230469]},{"page":334,"text":"17-28. Achieving the block effect requires the integration of complex obstacles—those that require more","rect":[89.97372436523438,414.16241455078127,521.9690218048096,405.0542297363281]},{"page":334,"text":"than one reduction technique to create a lane—with massed fires to defeat the breaching effort of the attacking","rect":[89.96372985839844,425.6854248046875,521.9480495452881,416.5772399902344]},{"page":334,"text":"force. Units array obstacles successively in a concentrated area. When the attacking force reduces one","rect":[89.96372985839844,437.1483154296875,522.0256013946533,428.0401306152344]},{"page":334,"text":"obstacle integrated with massed fires, it encounters another obstacle integrated with massed fires. Obstacles","rect":[89.96372985839844,448.6712951660156,521.8999164085388,439.5631103515625]},{"page":334,"text":"must defeat the mounted and dismounted breaching efforts of the attacking force. They must span the entire","rect":[89.96372985839844,460.1943054199219,522.0288362579346,451.08612060546877]},{"page":334,"text":"width of the assembly area, allowing no bypass. Obstacles intended to prevent an attacking force from using","rect":[89.96372985839844,471.65716552734377,521.9292507171631,462.5489807128906]},{"page":334,"text":"a specific assembly area should be readily visible to discourage further progress forward. Obstacles used to","rect":[89.96372985839844,483.18017578125,521.9027004241943,474.0719909667969]},{"page":334,"text":"prevent an attacking force from passing through an engagement area should be less visible to avoid","rect":[89.96369934082031,494.7032470703125,521.9332180023193,485.59503173828127]},{"page":334,"text":"discouraging the enemy from entering the engagement area. Fires should be planned, not on the obstacles,","rect":[89.96369934082031,506.1661071777344,521.9656934738159,497.05792236328127]},{"page":334,"text":"but on the locations where enemy forces will move to when they are blocked.","rect":[89.96369934082031,517.6890869140625,399.91460704803469,508.5809020996094]},{"page":334,"text":"Disrupt Effect","rect":[90.0,536.21875,156.89785596084597,526.435546875]},{"page":334,"text":"17-29. Disrupt is an obstacle effect that focuses fire planning and obstacle effort to cause the enemy to","rect":[90.0,553.7343139648438,521.9233303070068,544.6261596679688]},{"page":334,"text":"break up its formation and tempo, interrupt its timetable, commit breaching assets prematurely, and attack in","rect":[90.0,565.25732421875,522.0464382171631,556.149169921875]},{"page":334,"text":"a piecemeal effort. The disrupt effect also helps to deceive the enemy concerning the location of friendly","rect":[90.0,576.7802734375,521.9498195648193,567.672119140625]},{"page":334,"text":"defensive positions, separate combat echelons, or separate combat forces from its logistics support. To","rect":[90.0,588.2431640625,522.0070095062256,579.135009765625]},{"page":334,"text":"accomplish the disrupt effect, the obstacles and fires must—","rect":[90.0,599.7461547851563,331.3216972351074,590.6580200195313]},{"page":334,"text":" Cause the enemy to deploy early.","rect":[115.19999694824219,613.2542724609375,266.56719493865969,604.1461181640625]},{"page":334,"text":" Slow and disrupt part of the enemy force.","rect":[115.19999694824219,626.7542724609375,299.3195753097534,617.6461181640625]},{"page":334,"text":" Allow part of the enemy force to advance unimpeded.","rect":[115.19999694824219,640.2542724609375,349.00384044647219,631.1461181640625]},{"page":334,"text":"17-30. Obstacles must normally attack half of the targeted avenue of approach to achieve the disrupt effect.","rect":[90.00376892089844,657.779296875,522.1141309738159,648.671142578125]},{"page":334,"text":"The obstacles should not require extensive resources for construction or emplacement. Units normally use","rect":[90.00376892089844,669.2421875,522.0581941680908,660.134033203125]},{"page":334,"text":"the disrupt effect beyond engagement areas, while being careful not to inadvertently discourage the enemy","rect":[90.00376892089844,680.76513671875,521.9948635101318,671.656982421875]},{"page":334,"text":"from entering the engagement area.","rect":[90.00376892089844,692.2881469726563,231.9491376876831,683.1799926757813]},{"page":334,"text":"17-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":334,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":334,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":335,"text":"Countermobility","rect":[471.0,46.34102249145508,540.0236533203125,37.90802001953125]},{"page":335,"text":"17-31. Indirect fires and long-range direct fires are used to cause the enemy to change from a march","rect":[108.0,83.51434326171875,540.0123195648193,74.40616607666016]},{"page":335,"text":"formation to a prebattle or attack formation, resulting in reduced closure speed and increased time to engage","rect":[107.98998260498047,94.97723388671875,540.0439119415283,85.86905670166016]},{"page":335,"text":"the enemy in the engagement area. Generally, indirect fires alone will not force an enemy to deploy except","rect":[107.98998260498047,106.500244140625,540.0060801467896,97.3920669555664]},{"page":335,"text":"when dismounted.","rect":[107.98998260498047,115.99915313720703,181.35439586639405,108.9150161743164]},{"page":335,"text":"17-32. Units plan suppression and neutralization indirect fire targets or groups on the obstacles in a disrupt","rect":[107.98998260498047,135.48809814453126,540.0193247756959,126.37992095947266]},{"page":335,"text":"obstacle group. Indirect fires are used with the obstacles to slow the part of the enemy force that makes","rect":[107.98998260498047,147.0111083984375,539.9907367210388,137.90292358398438]},{"page":335,"text":"contact with the obstacles. Units also use every means available to disrupt enemy command and control","rect":[107.98998260498047,158.5340576171875,539.9864878616334,149.42587280273438]},{"page":335,"text":"throughout the enemy formation. Units use electromagnetic warfare, obscuration, and indirect fires to disrupt","rect":[107.98998260498047,169.9969482421875,540.0970835647584,160.88876342773438]},{"page":335,"text":"the decision cycle of the enemy and increase the direct fire window on the unimpeded part of the enemy","rect":[107.98998260498047,181.51995849609376,540.0181789398193,172.41177368164063]},{"page":335,"text":"force.","rect":[107.98999786376953,191.01893615722657,131.07004833221436,183.9447479248047]},{"page":335,"text":"17-33. Units use target reference points to mass direct fires against the part of the enemy formation that is","rect":[107.98998260498047,210.5078125,539.9823138694763,201.39962768554688]},{"page":335,"text":"not impeded by obstacles and indirect fires. Units do not execute those fires until the enemy force separates","rect":[107.98998260498047,222.03082275390626,539.9832904319763,212.92263793945313]},{"page":335,"text":"from its parent formation. They use direct fire weapons that can deliver a lethal initial volley of fire. A quick","rect":[107.98998260498047,233.49371337890626,539.9563503265381,224.38552856445313]},{"page":335,"text":"volley is critical if the enemy has good command and control and can react quickly to the disruption of its","rect":[107.98998260498047,245.0167236328125,539.8467547874451,235.90853881835938]},{"page":335,"text":"formation. Disengagement criteria are also a consideration in weapons selection. If units plan a short","rect":[107.98998260498047,256.5396728515625,539.9543833694459,247.43148803710938]},{"page":335,"text":"engagement, they choose a weapon system that can fire and maneuver without becoming decisively engaged.","rect":[107.98998260498047,268.0025634765625,539.9960889816284,258.8943786621094]},{"page":335,"text":"If they expect a long engagement, they select a weapon system that can sustain rapid fire with sufficient","rect":[107.98998260498047,279.52557373046877,540.0116953811646,270.4173889160156]},{"page":335,"text":"survivability to support the engagement.","rect":[107.98998260498047,291.048583984375,269.43926525115969,281.9403991699219]},{"page":335,"text":"17-34. Units plan fire control measures that allow for the shift of direct or indirect fires to the enemy that","rect":[107.98998260498047,308.513427734375,539.9381480178834,299.4052429199219]},{"page":335,"text":"are slowed by the obstacle or to the enemy bypassing the obstacle. Key leaders are positioned where they can","rect":[107.97996520996094,320.03643798828127,540.0096340179443,310.9282531738281]},{"page":335,"text":"best assess the obstacle effect. If the enemy is rapidly breaching the obstacles, they may shift direct fires","rect":[107.97996520996094,331.5594482421875,539.9224383811951,322.4512634277344]},{"page":335,"text":"against the enemy breaching assets. If a large force bypasses, units may shift all fires against the unimpeded","rect":[107.97996520996094,343.0223083496094,539.9946804046631,333.91412353515627]},{"page":335,"text":"enemy to inflict maximum losses and then reposition friendly forces to subsequent positions.","rect":[107.97996520996094,354.5452880859375,479.4194288253784,345.4371032714844]},{"page":335,"text":"Fix Effect","rect":[108.0,370.8827209472656,154.06878491592409,363.2955627441406]},{"page":335,"text":"17-35. Fix is an obstacle effect that focuses fire planning and obstacle effort to slow an attacker’s movement","rect":[108.0,390.59429931640627,540.1057505569459,381.4861145019531]},{"page":335,"text":"within a specified area, normally an engagement area. The fix effect allows time to acquire, target, and","rect":[108.0,402.1173095703125,540.0238552093506,393.0091247558594]},{"page":335,"text":"destroy the enemy with direct and indirect fires throughout the depth of an engagement area or avenue of","rect":[108.0,413.6402893066406,539.9409692344666,404.5321044921875]},{"page":335,"text":"approach. The fix effect helps fires to defeat the enemy in detail or to gain the necessary time for forces to","rect":[108.0,425.1031799316406,539.8874416351318,415.9949951171875]},{"page":335,"text":"reposition while inflicting maximum casualties. To accomplish the fix effect, the obstacles and fires must—","rect":[108.0,436.6261901855469,539.5213432312012,427.51800537109377]},{"page":335,"text":" Cause the enemy to deploy into attack formation early.","rect":[133.1999969482422,450.1142883300781,370.9066114425659,441.006103515625]},{"page":335,"text":" Cause the enemy to advance slowly into the engagement area.","rect":[133.1999969482422,463.6142883300781,399.4626417160034,454.506103515625]},{"page":335,"text":" Make the enemy fight in multiple directions within the engagement area.","rect":[133.1999969482422,477.1142883300781,442.6015272140503,468.006103515625]},{"page":335,"text":"17-36. Units specify the amount of time or effect that the combined effect of fires and obstacles must","rect":[108.00376892089844,494.6392822265625,539.9844737014771,485.5310974121094]},{"page":335,"text":"achieve. The fix effect may generate the time necessary for the defending force to break contact and disengage","rect":[108.00376892089844,506.1021423339844,540.1067171173096,496.99395751953127]},{"page":335,"text":"as the attacking force maneuvers into the area. To achieve the fix effect, units array obstacles in depth to","rect":[108.00376892089844,517.6251220703125,539.9179592132568,508.5169372558594]},{"page":335,"text":"cause the attacking formation to react and breach repeatedly. The obstacles must influence the entire width","rect":[107.9937515258789,529.1481323242188,540.0145168304443,520.0399780273438]},{"page":335,"text":"of the avenue of approach but not make the terrain impenetrable. The individual obstacles must look as if","rect":[107.9937515258789,540.5910034179688,539.9539697227478,531.5028686523438]},{"page":335,"text":"they could be easily bypassed or reduced. Units combine obstacles that are clearly visible with others that are","rect":[107.9937515258789,552.134033203125,540.0748567657471,543.02587890625]},{"page":335,"text":"unseen (such as obstacles on the reverse slope help to confuse the attacking force once it encounters the","rect":[107.9937515258789,563.6570434570313,540.0126009063721,554.5488891601563]},{"page":335,"text":"obstacles).","rect":[107.9937515258789,575.099853515625,150.5146131515503,566.01171875]},{"page":335,"text":"17-37. Units plan artillery- and aviation-delivered fires forward of the obstacles to suppress or neutralize","rect":[107.98373413085938,592.6348876953125,539.9303255157471,583.5267333984375]},{"page":335,"text":"the enemy. They synchronize indirect fires with long-range direct fires that cause the enemy to deploy out of","rect":[107.96369934082031,604.0977783203125,539.9970605430603,594.9896240234375]},{"page":335,"text":"a march or a prebattle formation. If the enemy is in an attack formation, this allows obstacles and fires to","rect":[107.96370697021485,615.6207275390625,539.9527492523193,606.5125732421875]},{"page":335,"text":"attack the full frontage of the enemy.","rect":[107.96370697021485,627.1437377929688,255.96718883514405,618.0355834960938]},{"page":335,"text":"17-38. Initially, units’ orient fires on the enemy force as a whole; however, destroying enemy breaching","rect":[107.96370697021485,644.608642578125,539.9518947601318,635.50048828125]},{"page":335,"text":"assets becomes increasingly important as the enemy continues to advance into the engagement area. To","rect":[107.95368957519531,656.131591796875,540.0131740570068,647.0234375]},{"page":335,"text":"maximize obstacle effect and inflict maximum losses on the enemy, the fire plan requires an increase in the","rect":[107.95368957519531,667.6546020507813,539.9438753204346,658.5464477539063]},{"page":335,"text":"intensity of fires as the enemy advances. Units plan successive TRPs, integrated with obstacles closer to the","rect":[107.95370483398438,679.1174926757813,539.9599886016846,670.0093383789063]},{"page":335,"text":"BPs, which trigger engagement by additional weapons. They vary the intensity of fires through fire control","rect":[107.95368957519531,690.6405029296875,539.8760142288209,681.5323486328125]},{"page":335,"text":"to allow the enemy to continue a slowed advance. When the enemy fully commits, friendly forces complete","rect":[107.95370483398438,702.1634521484375,539.9564485626221,693.0552978515625]},{"page":335,"text":"its destruction.","rect":[107.95367431640625,711.602294921875,166.85825634002686,704.5181884765625]},{"page":335,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":335,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":335,"text":"17-7","rect":[503.9940185546875,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":336,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":336,"text":"17-39. Once the enemy commits in the engagement area, the fire plan causes the enemy to fight in as many","rect":[90.0,83.51434326171875,522.0374050140381,74.40616607666016]},{"page":336,"text":"directions as possible. This serves to further slow its advance, disrupt its command and control, and reduce","rect":[90.0,94.95719909667969,522.0030794219971,85.86905670166016]},{"page":336,"text":"its ability to mass, allowing friendly forces to provide interlocking fires with flank shots on individual targets.","rect":[90.0,106.500244140625,522.0944776535034,97.3920669555664]},{"page":336,"text":"Combining fires from multiple directions with the random orientation of individual obstacles further confuses","rect":[90.0,118.023193359375,522.0404193382263,108.9150161743164]},{"page":336,"text":"the attacker. For direct fires, units consider the use of TRPs and supplementary positions to reorient fires.","rect":[90.0,129.486083984375,521.9300489425659,120.3779067993164]},{"page":336,"text":"They also consider the use of protective obstacles to protect the force. The fire support officer and fire support","rect":[90.0,141.00909423828126,522.0639414749146,131.90090942382813]},{"page":336,"text":"teams plan targets to hold the enemy in the engagement area and aim final protective fires on critical mobility","rect":[90.0,152.5321044921875,522.0565700531006,143.42391967773438]},{"page":336,"text":"corridors that may let the enemy threaten friendly positions.","rect":[90.0,163.9949951171875,329.64739513397219,154.88681030273438]},{"page":336,"text":"Turn Effect","rect":[90.0,180.3827362060547,145.2513563270569,172.80653381347657]},{"page":336,"text":"17-40. Turn is an obstacle effect that integrates fire planning and obstacle effort to divert an enemy","rect":[90.0,200.154296875,522.0056667327881,191.04611206054688]},{"page":336,"text":"formation from one avenue of approach to an adjacent avenue of approach or into an engagement area. To","rect":[90.0,211.6171875,521.9722194671631,202.49899291992188]},{"page":336,"text":"accomplish the turn effect, the obstacles and fires must—","rect":[89.99996185302735,223.1201629638672,319.7385063171387,214.03201293945313]},{"page":336,"text":" Prevent the enemy from bypassing or breaching the obstacle.","rect":[115.19999694824219,236.63427734375,377.2581434249878,227.52609252929688]},{"page":336,"text":" Cause the enemy to bypass in the desired direction.","rect":[115.19999694824219,250.13427734375,338.50286388397219,241.02609252929688]},{"page":336,"text":" Maintain pressure on the enemy throughout the turn and exploit its exposed flank.","rect":[115.19999694824219,263.63427734375,461.19570446014407,254.52609252929688]},{"page":336,"text":"17-41. Developing a turn obstacle requires mobility corridors and avenues of approach that are well defined","rect":[89.9937744140625,281.15924072265627,522.0371608734131,272.0510559082031]},{"page":336,"text":"by restricted terrain. To achieve a turn effect, the obstacles must have a subtle orientation relative to the","rect":[89.99372863769531,292.62213134765627,522.0005769805908,283.5139465332031]},{"page":336,"text":"approach of the attacking force. The obstacles and fires allow bypasses in the direction that is desired by the","rect":[89.99372863769531,304.1451416015625,521.9926424102783,295.0369567871094]},{"page":336,"text":"friendly scheme of movement and maneuver (or scheme of maneuver). Obstacles at the start of the turn are","rect":[89.9937973022461,315.66815185546877,521.9894685821533,306.5599670410156]},{"page":336,"text":"visible to the attacking force and look more complex than those in the direction of the turn.","rect":[89.99375915527344,327.1310119628906,453.99846935272219,318.0228271484375]},{"page":336,"text":"17-42. The anchor point, the initial point of the turn, is where most turn obstacles fail. Therefore, it is critical","rect":[90.00377655029297,344.6359558105469,522.0783457717896,335.5478210449219]},{"page":336,"text":"that units reinforce the anchor point with concentrated direct and indirect fires to achieve the turn effect.","rect":[89.99375915527344,356.09881591796877,521.9368238449097,347.01068115234377]},{"page":336,"text":"Units normally anchor turn obstacle groups to restricted terrain or to a strong point. They approve fire support","rect":[89.99375915527344,367.6418762207031,521.9739756546021,358.53369140625]},{"page":336,"text":"coordination measures, which enable the focus of all available fires first at the anchor point. When the enemy","rect":[90.00379943847656,379.1649169921875,522.0161647796631,370.05670166015627]},{"page":336,"text":"encounters the obstacle, the combination of fires, obstacles, and terrain must limit their ability to breach or","rect":[90.00379943847656,390.62774658203127,522.0770776329041,381.5195617675781]},{"page":336,"text":"bypass at the anchor point.","rect":[90.00376892089844,402.1507568359375,196.9672498703003,393.0425720214844]},{"page":336,"text":"17-43. Units plan an indirect fire target or group to turn the enemy away from the anchor point. They focus","rect":[90.00376892089844,419.66571044921877,522.1172015647888,410.5575256347656]},{"page":336,"text":"enough direct fire assets to deal with the size of the enemy force expected at that point; for example, if an","rect":[89.99374389648438,431.12860107421877,521.9601345062256,422.0204162597656]},{"page":336,"text":"enemy company is expected at the anchor point, then at least one friendly platoon should be allocated to mass","rect":[89.99374389648438,442.651611328125,521.9628436546326,433.5434265136719]},{"page":336,"text":"fires at that point. If the enemy breaches the obstacle at the anchor point, the turning effect could be lost—","rect":[89.99374389648438,454.1745910644531,521.9358940124512,445.06640625]},{"page":336,"text":"compromising the friendly defensive plan.","rect":[89.9937515258789,465.637451171875,259.77968883514407,456.5292663574219]},{"page":336,"text":"17-44. The critical task in achieving the turn effect is to use obstacles and overwhelming fires to cause the","rect":[89.9937515258789,483.15240478515627,522.0558748321533,474.0442199707031]},{"page":336,"text":"enemy to move in the direction that is desired by the friendly unit. As the engagement progresses, the friendly","rect":[89.9937515258789,494.6754150390625,522.0191555023193,485.5672302246094]},{"page":336,"text":"force prevents enemy attempts to breach the obstacle by designating enemy breaching assets as priority","rect":[89.9937515258789,506.1383056640625,521.9704494476318,497.0301208496094]},{"page":336,"text":"targets. Direct fire weapon systems are the primary means for destroying enemy breaching equipment.","rect":[89.9937515258789,517.6612548828125,522.0169630050659,508.5530700683594]},{"page":336,"text":"Artillery- and aviation-delivered fires can attack individual targets, but they may be less timely. Plan indirect","rect":[89.9937515258789,529.1842651367188,522.0078501663209,520.0761108398438]},{"page":336,"text":"fires—artillery and mortars—in front of, on top of, to the side of, and behind obstacles to maximize their","rect":[89.98373413085938,540.6471557617188,521.9099633750916,531.5390014648438]},{"page":336,"text":"effect as combat multipliers. Developing fire control measures through the planning of NAIs, TAIs, triggers,","rect":[89.97370910644531,552.170166015625,522.0631666183472,543.06201171875]},{"page":336,"text":"and targets to support obstacles in the obstacle group will make indirect fires more responsive and effective.","rect":[89.97372436523438,563.693115234375,521.9433546066284,554.5849609375]},{"page":336,"text":"17-45. Units develop a fire plan with fire control measures that allow them to shift fires as necessary to","rect":[89.97372436523438,581.1580200195313,521.9514064788818,572.0498657226563]},{"page":336,"text":"cover the turn effect. Direct and indirect fires shift in unison to attack and maintain pressure on the enemy","rect":[89.97372436523438,592.6810913085938,521.8983058929443,583.5728759765625]},{"page":336,"text":"force’s flank. Fires covering the length of the turn effect are less focused than at the turn point. Company","rect":[89.97370147705078,604.1439819335938,521.9485988616943,595.0358276367188]},{"page":336,"text":"commanders facilitate this by assigning platoon sectors of fire between TRPs. Units usually execute indirect","rect":[89.97370910644531,615.6669921875,522.0602183303834,606.558837890625]},{"page":336,"text":"fires in groups instead of aiming at individual targets. Direct and indirect fires continue throughout the length","rect":[89.97370910644531,627.1900024414063,522.0248317718506,618.0818481445313]},{"page":336,"text":"and depth of the turn effect. These fires simultaneously exploit the vulnerability created by the turn effect","rect":[89.97370910644531,638.6528930664063,522.0500864944459,629.5447387695313]},{"page":336,"text":"and protect the integrity of the obstacles.","rect":[89.97370910644531,650.1759033203125,252.97809886932374,641.0677490234375]},{"page":336,"text":"RELATIVE LOCATION","rect":[72.0,673.4526977539063,179.1646432876587,665.3759765625]},{"page":336,"text":"17-46. Relative location refers to the location of a tactical or protective obstacle in relation to maneuver or","rect":[90.0,693.394287109375,521.9821679649353,684.30615234375]},{"page":336,"text":"fire control measures such as avenues of approach, BPs, or engagement areas. Engineers and other","rect":[90.0,704.877197265625,522.0280664024353,695.76904296875]},{"page":336,"text":"countermobility planners describe planned obstacle locations in relation to maneuver or fire control measures","rect":[90.0,716.400146484375,522.0752093772888,707.2919921875]},{"page":336,"text":"17-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":336,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":336,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":337,"text":"Countermobility","rect":[471.0,46.34102249145508,540.0236533203125,37.90802001953125]},{"page":337,"text":"to help maneuver commanders visualize linkages between obstacles, fires, and maneuver and to ensure","rect":[108.0,83.51434326171875,540.0490999298096,74.40616607666016]},{"page":337,"text":"obstacle integration.","rect":[108.0,94.97723388671875,189.1048994064331,85.86905670166016]},{"page":337,"text":"OBSTACLES EMPLOYMENT PRINCIPLES","rect":[90.0,120.26969909667969,369.16796031188968,110.59553527832031]},{"page":337,"text":"17-47. The basic employment principles for obstacles are—","rect":[108.0,140.57427978515626,353.6883964538574,131.46609497070313]},{"page":337,"text":" Support the maneuver commander’s plan.","rect":[133.1999969482422,154.0542449951172,318.70440196990969,144.96609497070313]},{"page":337,"text":" Integrate with observation and fires.","rect":[133.1999969482422,167.57427978515626,295.9670362472534,158.46609497070313]},{"page":337,"text":" Integrate with other obstacles.","rect":[133.1999969482422,181.07427978515626,271.7246046066284,171.96609497070313]},{"page":337,"text":" Employ in depth.","rect":[133.1999969482422,194.57427978515626,220.3650312423706,185.46609497070313]},{"page":337,"text":" Employ for surprise.","rect":[133.1999969482422,208.07427978515626,233.74575328826905,198.96609497070313]},{"page":337,"text":"See ATP 3-90.8/MCTP 3-34B for more information on obstacle employment principles.","rect":[108.00376892089844,222.59326171875,461.2177686691284,213.48507690429688]},{"page":337,"text":"OBSTACLE EMPLACEMENT AUTHORITY","rect":[90.0,247.8896942138672,371.5655140151978,238.2155303955078]},{"page":337,"text":"17-48. Obstacle emplacement authority is the authority to emplace reinforcing obstacles. Geographic","rect":[108.0,268.19427490234377,540.0603914337158,259.0860900878906]},{"page":337,"text":"combatant commanders have the authority to emplace obstacles in their areas of responsibility within the","rect":[108.0,279.65716552734377,539.9530305938721,270.5489807128906]},{"page":337,"text":"ROE. They may delegate emplacement authority to subordinate commanders, down to the lowest echelon","rect":[108.0,291.1801452636719,539.9808254241943,282.07196044921877]},{"page":337,"text":"necessary to allow for maximum flexibility in executing tactical missions, while ensuring that the","rect":[108.0,302.7031555175781,540.0193147735596,293.594970703125]},{"page":337,"text":"employment of reinforcing obstacles is consistent with the ROE and supportive of current and future","rect":[108.0,314.1660461425781,540.0000276641846,305.057861328125]},{"page":337,"text":"operations. Commanders consider the particular system characteristics, including inherent hazards that it","rect":[108.0,325.68902587890627,539.9459605178834,316.5808410644531]},{"page":337,"text":"might pose to friendly forces and civilians and the ROE in determining the emplacement authority for","rect":[108.0,337.2120361328125,540.0123193321228,328.1038513183594]},{"page":337,"text":"scatterable mines. The duration of scatterable mines employment is a primary consideration in determining","rect":[108.0,348.6749267578125,540.0297756195068,339.5667419433594]},{"page":337,"text":"the extent to which emplacement authority should be delegated. When used as protective obstacles, higher","rect":[108.0,360.1979064941406,539.9120996055603,351.0897216796875]},{"page":337,"text":"commanders typically delegate emplacement authority to the commanders of small units (platoon or","rect":[108.0,371.7209167480469,540.0341699180603,362.61273193359377]},{"page":337,"text":"company or team) and base camps. The commander’s guidance on emplacement authority is stated in the","rect":[108.0,383.18377685546877,540.0279207305908,374.0755920410156]},{"page":337,"text":"unit’s order.","rect":[108.0,392.6827392578125,156.94469738006593,385.5986022949219]},{"page":337,"text":"17-49. Commanders use obstacle control measures and other specific guidance or orders to grant or","rect":[108.0,412.22174072265627,540.0284326133728,403.1135559082031]},{"page":337,"text":"withhold obstacle emplacement authority to subordinate commanders and provide obstacle control. For","rect":[107.98994445800781,423.68463134765627,539.9509179649353,414.5764465332031]},{"page":337,"text":"example, a commander may withhold authority by shaping obstacle control measures within the area of","rect":[107.98994445800781,435.2076416015625,539.9910180625916,426.0994567871094]},{"page":337,"text":"operations of a subordinate unit so that a specific area is not included, such as a counterattack axis, to ensure","rect":[107.98994445800781,446.7106018066406,540.0647859649658,437.6224670410156]},{"page":337,"text":"the freedom of movement and maneuver of other units in that area. Likewise, the commander may also state","rect":[107.98994445800781,458.1934814453125,539.9889803009033,449.0852966308594]},{"page":337,"text":"in an order that a specific area, such as a counterattack axis, is an obstacle-restricted area.","rect":[107.98999786376953,469.6965026855469,465.6348829269409,460.60833740234377]},{"page":337,"text":"17-50. Subordinate commanders who desire to emplace an obstacle outside a zone, belt, or group must","rect":[107.99000549316406,487.181396484375,539.9701914749146,478.0732116699219]},{"page":337,"text":"submit a report of intention for that obstacle. The report doubles as a request when units initiate it at levels","rect":[107.97998046875,498.6843566894531,539.9782855491638,489.5962219238281]},{"page":337,"text":"below emplacement authority. Units do not submit the report if the higher headquarters grants emplacement","rect":[107.97997283935547,510.2273864746094,540.0053477249146,501.11920166015627]},{"page":337,"text":"authority. Commanders give the authorization to emplace obstacles when they establish obstacle control","rect":[107.97997283935547,521.6902465820313,540.0445322952271,512.5820922851563]},{"page":337,"text":"measures. As an exception, units do not submit reports of intention for directed obstacles that are part of an","rect":[107.97997283935547,533.1932373046875,539.8908596038818,524.1051025390625]},{"page":337,"text":"operation plan or operation order approved by the obstacle emplacement authority.","rect":[107.97997283935547,544.7362670898438,439.28740978240969,535.6281127929688]},{"page":337,"text":"17-51. Commanders and staffs consider time, width, and depth when planning for obstacle control. For","rect":[107.97997283935547,562.2011108398438,539.9219873008728,553.0929565429688]},{"page":337,"text":"example, a commander may use an on-order obstacle zone to give a subordinate obstacle emplacement","rect":[107.9699478149414,573.72412109375,540.0234141311646,564.615966796875]},{"page":337,"text":"authority only after a certain time or event. Likewise, a commander may direct that only scatterable mines","rect":[107.95994567871094,585.2470703125,539.9773089866638,576.138916015625]},{"page":337,"text":"with a certain self-destruct time or networked munitions with on and off features can be emplaced in a specific","rect":[107.95994567871094,596.68994140625,539.9752473907471,587.601806640625]},{"page":337,"text":"area. Maneuver control measures can aid in focusing the width and depth of obstacle control measures.","rect":[107.9499282836914,608.2330322265625,519.7698316574097,599.1248779296875]},{"page":337,"text":"17-52.","rect":[107.9499282836914,623.7339477539063,133.79151439666749,616.8302001953125]},{"page":337,"text":"","rect":[133.1999969482422,636.4454345703125,139.16105696249009,631.7532348632813]},{"page":337,"text":"","rect":[133.1999969482422,649.9454345703125,139.16105696249009,645.2532348632813]},{"page":337,"text":"","rect":[133.1999969482422,663.4454345703125,139.16105696249009,658.7532348632813]},{"page":337,"text":"","rect":[133.1999969482422,676.9454345703125,139.16105696249009,672.2532348632813]},{"page":337,"text":"","rect":[133.1999969482422,690.4454345703125,139.16105696249009,685.7532348632813]},{"page":337,"text":"Typical graphics that may be used include—","rect":[142.49888610839845,625.7579956054688,321.3558769226074,616.6498413085938]},{"page":337,"text":"Unit boundaries and PLs.","rect":[151.1999969482422,637.1703491210938,252.8839521408081,630.066162109375]},{"page":337,"text":"BHLs and forward edges of the battle area.","rect":[151.1999969482422,652.67431640625,323.3776502609253,643.566162109375]},{"page":337,"text":"Lines of departure and lines of contact.","rect":[151.1999969482422,666.154296875,307.60525035858157,657.066162109375]},{"page":337,"text":"Fire support coordination line, no-fire areas, and coordinated fire lines.","rect":[151.1999969482422,679.654296875,434.9693555831909,670.566162109375]},{"page":337,"text":"Passage lanes and corridors.","rect":[151.1999969482422,693.17431640625,263.98110485076907,684.066162109375]},{"page":337,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":337,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":337,"text":"17-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":338,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":338,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":338,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":338,"text":"17-53.","rect":[90.00376892089844,112.45514678955078,115.84534740447998,105.5513687133789]},{"page":338,"text":"","rect":[115.19999694824219,125.24544525146485,121.16105696249008,120.55320739746094]},{"page":338,"text":"","rect":[115.19999694824219,138.74545288085938,121.16105696249008,134.05320739746095]},{"page":338,"text":"","rect":[115.19999694824219,152.24545288085938,121.16105696249008,147.55320739746095]},{"page":338,"text":"Counterattack axis and movement routes.","rect":[133.1999969482422,81.50032806396485,299.02505016326907,74.40616607666016]},{"page":338,"text":"Objectives, future BPs, and avenues of approach.","rect":[133.1999969482422,97.01434326171875,330.1041212081909,87.89614868164063]},{"page":338,"text":"Obstacle control planning is guided by—","rect":[124.56275177001953,114.47918701171875,289.3196220397949,105.37100982666016]},{"page":338,"text":"Supporting current operations.","rect":[133.1999969482422,127.97430419921875,255.08928966522218,118.86612701416016]},{"page":338,"text":"Maximizing subordinate flexibility.","rect":[133.1999969482422,141.47430419921876,275.6844434738159,132.36611938476563]},{"page":338,"text":"Facilitating future operations.","rect":[133.1999969482422,154.97430419921876,251.8047742843628,145.86611938476563]},{"page":338,"text":"17-54. Commanders use obstacle control to focus obstacle effort where it will clearly support their intent","rect":[89.9937515258789,172.4892578125,521.9789195022584,163.38107299804688]},{"page":338,"text":"and concept of operations. They also use obstacle control to ensure that obstacles will not interfere with","rect":[89.9937515258789,184.01226806640626,522.0018215179443,174.90408325195313]},{"page":338,"text":"current operations or limit their ability to respond to unforeseen situations.","rect":[89.9937515258789,195.47515869140626,387.9983777999878,186.36697387695313]},{"page":338,"text":"OBSTACLE CONTROL MEASURES","rect":[72.0,220.7696990966797,303.8401404876709,211.0955352783203]},{"page":338,"text":"17-55. Obstacles can be natural, manmade, or a combination of both. Forces emplace tactical and protective","rect":[90.0,241.0542449951172,522.1295442657471,231.96609497070313]},{"page":338,"text":"obstacles that reinforce terrain restrictions and existing obstacles and integrate them with fires to affect enemy","rect":[90.00003814697266,252.5972900390625,521.9937648773193,243.48910522460938]},{"page":338,"text":"movement or maneuver and shape engagements. Obstacle control measures are specific measures that","rect":[90.00003814697266,264.0601806640625,522.0193383750916,254.95199584960938]},{"page":338,"text":"grant obstacle-emplacing authority. They consist of—","rect":[90.0000228881836,275.5831298828125,316.6754570007324,266.4749450683594]},{"page":338,"text":" Zones.","rect":[115.19999694824219,287.0502624511719,160.1848554611206,280.2867736816406]},{"page":338,"text":" Belts.","rect":[115.19999694824219,300.5502624511719,156.22796154022218,293.46612548828127]},{"page":338,"text":" Groups.","rect":[115.19999694824219,316.05426025390627,165.16480541229249,307.136474609375]},{"page":338,"text":" Restrictions.","rect":[115.19999694824219,327.5502624511719,183.52744579315186,320.46612548828127]},{"page":338,"text":"The remainder of this chapter discusses these control measure with Figure 17-1 on page 17-12 providing a","rect":[90.00376892089844,344.0932922363281,521.9289217071533,334.985107421875]},{"page":338,"text":"brief summary of each control measure in a single graphic. Commanders with an assigned area can only","rect":[89.98373413085938,355.5561828613281,521.9990139007568,346.447998046875]},{"page":338,"text":"emplace protective obstacles unless authorized by a higher echelon commander.","rect":[89.98373413085938,367.07916259765627,410.35634899139407,357.9709777832031]},{"page":338,"text":"17-56. An analysis of the higher echelon headquarters’ mission and commander’s intent identifies","rect":[89.98373413085938,384.6041564941406,521.9729754905701,375.4959716796875]},{"page":338,"text":"information that may impact the mission. The components of this analysis are intent, assigned areas, military","rect":[89.97372436523438,396.0670166015625,521.9643459320068,386.9588317871094]},{"page":338,"text":"deception, directed and implied tasks, limitations, available assets, risk, and emplacement timelines and risk.","rect":[89.97370147705078,407.5699768066406,521.9829664230347,398.4818115234375]},{"page":338,"text":"Among the directed obstacle tasks are the planning, preparation, and execution of reserve obstacles. Reserve","rect":[89.97370910644531,419.113037109375,522.0470247344971,410.0048522949219]},{"page":338,"text":"obstacles allow the force to retain control over the mobility along a given avenue of approach.","rect":[89.97371673583985,430.575927734375,466.57949352264407,421.4677429199219]},{"page":338,"text":"Obstacle Zones","rect":[90.0,446.9737243652344,161.78064975357055,439.38653564453127]},{"page":338,"text":"17-57. An obstacle zone is a division-level command and control measure to designate specific land areas","rect":[90.0,466.73431396484377,522.0303485374451,457.6261291503906]},{"page":338,"text":"where lower echelons are allowed to employ tactical obstacles (JP 3-15). Corps and division commanders","rect":[89.97993469238281,478.19720458984377,521.9552142601013,469.0890197753906]},{"page":338,"text":"use them to grant obstacle emplacement authority to brigades (including other major subordinate units).","rect":[89.96990203857422,489.7201843261719,522.0142774581909,480.60198974609377]},{"page":338,"text":"Obstacle zones are permissive, allowing a brigade combat team to place reinforcing obstacles to support its","rect":[89.96991729736328,501.2431945800781,521.9085834007263,492.135009765625]},{"page":338,"text":"scheme of maneuver without interfering with future operations.","rect":[89.96991729736328,512.7061157226563,343.81472301483157,503.597900390625]},{"page":338,"text":"17-58. If the obstacle zone encompasses the entire brigade combat team assigned area, another graphic is","rect":[89.96991729736328,530.2310791015625,522.0626361351013,521.1229248046875]},{"page":338,"text":"unnecessary. Commanders may designate the entire assigned area as an obstacle zone with the unit","rect":[89.96991729736328,541.7540283203125,522.0010752639771,532.6458740234375]},{"page":338,"text":"boundaries defining the geographic limits of the zone. Obstacle zones do not cross brigade combat team","rect":[89.96991729736328,553.2169189453125,521.8749060592652,544.1087646484375]},{"page":338,"text":"boundaries. Commanders assign obstacle zones to a single subordinate unit to ensure unity of effort, just as","rect":[89.96991729736328,564.7399291992188,521.9011981468201,555.6217041015625]},{"page":338,"text":"they would when assigning defensive assigned areas or BPs. This keeps tactical obstacle responsibility along","rect":[89.96990203857422,576.262939453125,522.0200099945068,567.15478515625]},{"page":338,"text":"the same lines as control of direct and indirect fires. This does not normally create vulnerabilities on the","rect":[89.96990203857422,587.725830078125,521.9712190704346,578.61767578125]},{"page":338,"text":"boundary between units since the commander bases the assignment of both subordinate assigned areas and","rect":[89.96990203857422,599.248779296875,521.9949855804443,590.140625]},{"page":338,"text":"obstacle zones on defined avenues of approach.","rect":[89.96990203857422,610.7517700195313,280.21270275115969,601.6636352539063]},{"page":338,"text":"17-59. A commander does not normally assign an obstacle effect (block, fix, turn, or disrupt) to an obstacle","rect":[89.96990203857422,628.2366943359375,521.9831819610596,619.1285400390625]},{"page":338,"text":"zone. This allows subordinate commander’s flexibility in using obstacles. The commander should establish","rect":[89.96987915039063,639.7596435546875,521.8979396820068,630.6514892578125]},{"page":338,"text":"construction and resourcing priorities between different obstacle zones.","rect":[89.96987915039063,651.2225341796875,375.4288282394409,642.1143798828125]},{"page":338,"text":"Obstacle Belts","rect":[90.0,667.59375,156.92090854263305,660.0065307617188]},{"page":338,"text":"17-60. An obstacle belt is a brigade-level command and control measure, normally depicted graphically, to","rect":[90.0,687.3543090820313,522.0394802093506,678.2461547851563]},{"page":338,"text":"show where within an obstacle zone the ground tactical commander plans to limit friendly obstacle","rect":[89.9999771118164,698.8773193359375,522.0104646759033,689.7691650390625]},{"page":338,"text":"employment and focus the defense (JP 3-15). It assigns an intent to the obstacle plan and provides the","rect":[89.9999771118164,710.3401489257813,522.0465364532471,701.2319946289063]},{"page":338,"text":"17-10","rect":[72.1199951171875,754.1790161132813,95.11499243164063,747.6090087890625]},{"page":338,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":338,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":339,"text":"Countermobility","rect":[471.0,46.34102249145508,540.0236533203125,37.90802001953125]},{"page":339,"text":"necessary guidance on the overall effect of obstacles within a belt. Commanders plan obstacle belts within","rect":[108.0,83.51434326171875,539.9096584320068,74.40616607666016]},{"page":339,"text":"assigned obstacle zones to grant obstacle emplacement authority to their major subordinate units. Obstacle","rect":[108.0,94.97723388671875,539.9072542266846,85.85903930664063]},{"page":339,"text":"belts also focus obstacles to support the brigade scheme of maneuver and ensure that obstacles do not interfere","rect":[108.0,106.500244140625,539.9813509063721,97.3920669555664]},{"page":339,"text":"with the maneuver of any higher headquarters.","rect":[108.0,118.023193359375,294.34502696990969,108.9150161743164]},{"page":339,"text":"17-61. Obstacle belts are restrictive. Commanders can direct a subordinate unit to construct one or more","rect":[108.0,133.4740753173828,540.0177888946533,126.37992095947266]},{"page":339,"text":"obstacles to create an effect in an area. They do not specify the type or number of obstacles. Obstacle belts","rect":[108.0,147.0111083984375,539.9002215843201,137.90292358398438]},{"page":339,"text":"do not cross unit boundaries for the same reasons discussed in obstacle zones. (See discussion beginning in","rect":[108.0,158.5340576171875,539.9809474945068,149.42587280273438]},{"page":339,"text":"paragraph 17-57 for more information). A single unit is responsible for a belt; however, a commander may","rect":[108.0,169.9969482421875,539.9229640960693,160.88876342773438]},{"page":339,"text":"assign more than one belt to a unit.","rect":[107.9800033569336,181.51995849609376,247.9463758468628,172.41177368164063]},{"page":339,"text":"17-62. A brigade combat team commander normally assigns an obstacle effect and priority to each obstacle","rect":[107.9799575805664,199.044921875,540.0672884063721,189.93673706054688]},{"page":339,"text":"belt. As with the obstacle zone, the target and relative location are apparent. Adding a specific obstacle effect","rect":[107.9799575805664,210.5078125,539.9585947952271,201.39962768554688]},{"page":339,"text":"gives purpose and direction to subordinate battalion obstacle planning. When brigade combat team","rect":[107.9799575805664,222.03082275390626,539.9820837936402,212.92263793945313]},{"page":339,"text":"commanders assign an obstacle effect, they ensure that obstacles within the belt complement the brigade","rect":[107.9799575805664,233.49371337890626,540.0130891876221,224.38552856445313]},{"page":339,"text":"combat team fire plan.","rect":[107.9799575805664,244.99668884277345,198.02369213104249,235.90853881835938]},{"page":339,"text":"17-63. A corps, division, or brigade commander may authorize emplacement certain types of protective","rect":[107.9799575805664,262.53167724609377,540.0191927032471,253.42349243164063]},{"page":339,"text":"obstacles outside obstacle zones or belts. Normally, the commander authorizes company team and base","rect":[107.9799575805664,273.9945068359375,540.0417757110596,264.8863220214844]},{"page":339,"text":"commanders to emplace protective obstacles within 500 meters (546 yards) of their positions, depending on","rect":[107.9799575805664,285.51751708984377,539.9583644866943,276.4093322753906]},{"page":339,"text":"the mission variables. The commander usually limits the types of obstacles a unit may use for protective","rect":[107.9800033569336,297.04052734375,539.8908357696533,287.9323425292969]},{"page":339,"text":"obstacles that are outside obstacle control measures. For example, the commander may allow only wire- and","rect":[107.9799575805664,308.50341796875,540.0131740570068,299.3952331542969]},{"page":339,"text":"command-detonated mines outside of control measures for protective obstacles. Furthermore, commanders","rect":[107.9800033569336,320.0063781738281,539.9344012718201,310.9182434082031]},{"page":339,"text":"may require that minefields be fenced on all sides, after obtaining legal guidance concerning current rules","rect":[107.97996520996094,331.5494384765625,539.8971698265076,322.4412536621094]},{"page":339,"text":"and policies on mine emplacement, to prevent friendly fire incidents.","rect":[107.97997283935547,343.0122985839844,383.72649669647219,333.90411376953127]},{"page":339,"text":"Obstacle Groups","rect":[108.0,361.5587463378906,187.14383945083618,351.77557373046877]},{"page":339,"text":"17-64. Obstacle groups are one or more individual obstacles that provide a specific obstacle effect.","rect":[108.0,379.1343078613281,540.0013380050659,370.18646240234377]},{"page":339,"text":"Battalions use obstacle groups to ensure that company teams emplace individual obstacles supporting their","rect":[108.0,390.5971984863281,540.0099999961853,381.489013671875]},{"page":339,"text":"maneuver schemes. In rare cases, brigades, divisions, or even corps may use obstacle groups for specific","rect":[108.0,402.12017822265627,539.9217805938721,393.0119934082031]},{"page":339,"text":"tactical obstacles. Units integrate obstacle groups with their direct and indirect fire plans. Brigade and","rect":[108.0,413.6431884765625,540.0844631195068,404.5350036621094]},{"page":339,"text":"maneuver battalion commanders plan their placement within designated obstacle zones or belts, respectively.","rect":[108.0,425.1060791015625,539.9905958175659,415.9978942871094]},{"page":339,"text":"17-65. Unlike obstacle zones or belts, obstacle groups are not areas but relative locations for actual","rect":[108.0,442.63104248046877,540.0016245803834,433.5228576660156]},{"page":339,"text":"obstacles. Commanders normally show obstacle groups using the obstacle effect symbols. When detailed","rect":[108.0,454.154052734375,539.8732814788818,445.0458679199219]},{"page":339,"text":"planning is possible (including detailed ground reconnaissance), commanders may show obstacle groups","rect":[108.0,465.616943359375,539.9779803733826,456.5087585449219]},{"page":339,"text":"using individual obstacle symbols.","rect":[108.0,477.1399230957031,246.34418773651124,468.03173828125]},{"page":339,"text":"17-66. Company team commanders and engineers can adjust obstacles in the group if the intent and link to","rect":[108.0,494.6649169921875,540.0234889984131,485.5467224121094]},{"page":339,"text":"the fire plan remain intact. They make minor changes to obstacles and fire control measures based on terrain","rect":[107.9899673461914,506.1277770996094,539.9526882171631,497.01959228515627]},{"page":339,"text":"realities. For example, a commander may move a fixing obstacle group and direct fire TRPs 100 meters (109","rect":[107.9899673461914,517.6507568359375,539.9704494476318,508.5425720214844]},{"page":339,"text":"yards) to avoid having them masked by rolling terrain. However, a major change to the obstacle group","rect":[107.98999786376953,529.173828125,540.0541286468506,520.0555419921875]},{"page":339,"text":"location requires the approval of the commander who ordered the obstacle group emplacement.","rect":[107.98998260498047,540.6366577148438,489.21197032928469,531.5285034179688]},{"page":339,"text":"Individual Obstacles","rect":[108.0,557.0137329101563,204.8424783668518,549.41552734375]},{"page":339,"text":"17-67. Each type of individual obstacle, such as abatis and antitank ditches, has its associated symbol. Once","rect":[108.0,576.7742919921875,540.0885896759033,567.6661376953125]},{"page":339,"text":"a unit constructs an individual obstacle, it records the obstacle’s location and reports its emplacement through","rect":[108.0,588.2371826171875,540.0075588226318,579.1290283203125]},{"page":339,"text":"the chain of command. Commanders must report individual obstacles in sufficient detail so that any unit","rect":[108.0,599.7601928710938,540.0082774124146,590.6520385742188]},{"page":339,"text":"moving through the area can bypass or reduce the obstacle without excessive risk. Each headquarters is","rect":[108.0000228881836,611.283203125,539.9690692405701,602.175048828125]},{"page":339,"text":"responsible to ensure the dissemination of exact obstacle locations throughout its organization. Commanders","rect":[108.0000228881836,622.7460327148438,540.0564105491638,613.6378784179688]},{"page":339,"text":"rarely depict individual obstacle symbols on maps above the battalion echelon. This publication does not","rect":[108.0,634.26904296875,539.9899058303834,625.160888671875]},{"page":339,"text":"depict individual obstacle symbols. TM 3-34.85/MCRP 3-17A discusses individual obstacles.","rect":[108.0,645.7920532226563,482.97954845428469,636.6838989257813]},{"page":339,"text":"Obstacle Restrictions","rect":[108.0,662.1337280273438,207.87188205337524,654.5355224609375]},{"page":339,"text":"17-68. Commanders may use obstacle restrictions to provide additional obstacle control and to limit the","rect":[108.0,681.894287109375,540.0270662384033,672.7861328125]},{"page":339,"text":"specific types of obstacles used, such as restricting the use of buried mines. These restrictions ensure that","rect":[108.0,693.4172973632813,539.9737925491334,684.3091430664063]},{"page":339,"text":"subordinates do not use obstacles with characteristics that impair future operations. These restrictions also","rect":[108.0,704.8601684570313,539.9020900726318,695.7720336914063]},{"page":339,"text":"allow commanders to focus the use of limited resources for the main effort by restricting their use elsewhere.","rect":[108.0,716.4031982421875,539.9977979660034,707.2950439453125]},{"page":339,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":339,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":339,"text":"17-11","rect":[498.9540100097656,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":340,"text":"Chapter 17","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":340,"text":"Obstacle restricted areas is a command and control measure used to limit the type or number of obstacles","rect":[90.0,83.51434326171875,521.9572284202576,74.40616607666016]},{"page":340,"text":"within an area (JP 3-15). The commander with emplacement authority uses obstacle restricted areas to restrict","rect":[90.0,94.97723388671875,521.9856333694459,85.86905670166016]},{"page":340,"text":"obstacle placement. The graphic for obstacle restricted areas depicts the impacted area, the unit imposing the","rect":[90.00000762939453,106.500244140625,522.0179109649658,97.3920669555664]},{"page":340,"text":"restriction, and the restrictions in effect. (See ATP 3-90.8/MCTP 3-34B for more information on obstacle","rect":[90.00000762939453,118.00315856933594,521.9812898712158,108.9150161743164]},{"page":340,"text":"control measures.)","rect":[89.97994995117188,129.46604919433595,163.8744714317322,120.3779067993164]},{"page":340,"text":"17-12","rect":[72.1199951171875,754.0800170898438,95.11499243164063,747.6090087890625]},{"page":340,"text":"Figure 17-1. Obstacle control measures and intent symbols","rect":[156.39251708984376,612.8509521484375,437.6128683013916,603.4622192382813]},{"page":340,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":340,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":341,"text":"Chapter 18","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":341,"text":"Mobility","rect":[284.760009765625,154.12814331054688,345.18586781311037,139.3096466064453]},{"page":341,"text":"Mobility is a combined arms activity. This chapter focuses on mobility and the different","rect":[126.0,188.7806854248047,504.0249740524292,178.79986572265626]},{"page":341,"text":"mission and tasks associated with combined arms mobility. ","rect":[126.0,201.4405975341797,391.71600818634036,191.45977783203126]},{"page":341,"text":"MOBILITY","rect":[90.0,226.75572204589845,163.08324472808838,217.0955352783203]},{"page":341,"text":"18-1. Freedom to move and maneuver in an operational area is essential to the application of combat power","rect":[108.0,247.0542449951172,540.0267236289978,237.96609497070313]},{"page":341,"text":"and mission accomplishment. The operational environment will present numerous challenges to movement","rect":[108.0,258.5972900390625,539.9924082717896,249.48910522460938]},{"page":341,"text":"and maneuver. Combined arms mobility overcomes these challenges by integrating the framework of assured","rect":[108.0,270.12030029296877,539.9329738616943,261.0121154785156]},{"page":341,"text":"mobility in support of offensive, defensive, and other enabling operations.","rect":[108.0,281.5831298828125,404.5621290206909,272.4749450683594]},{"page":341,"text":"18-2. Mobility is a quality or capability of military forces which permits them to move from place to place","rect":[108.0,299.108154296875,539.9499178009033,289.9999694824219]},{"page":341,"text":"while retaining the ability to fulfill their primary mission (JP 3-36). Mobility is necessary for the conduct of","rect":[107.98999786376953,310.5710144042969,540.0204370079041,301.46282958984377]},{"page":341,"text":"successful offensive operations. When discussing Army tactics, mobility includes both movement and","rect":[107.99000549316406,322.0940246582031,540.0153713226318,312.98583984375]},{"page":341,"text":"maneuver, generally, applying to both collectively unless stated as movement or maneuver. Its major focus","rect":[107.98998260498047,333.6170349121094,539.9508807640076,324.49884033203127]},{"page":341,"text":"is to enable friendly forces to move and maneuver freely on the battlefield or an assigned area. Units require","rect":[107.98998260498047,345.07989501953127,540.0553255157471,335.9717102050781]},{"page":341,"text":"the capability to move, exploit, and pursue the enemy across a wide front.","rect":[107.98999786376953,356.6029052734375,403.16933727264407,347.4947204589844]},{"page":341,"text":"18-3. When attacking, the commander wants to concentrate the effects of combat power at select locations.","rect":[107.98998260498047,374.12786865234377,539.9565992355347,365.0196838378906]},{"page":341,"text":"This may require the unit to improve or construct combat trails through areas where routes do not exist. The","rect":[107.98998260498047,385.59075927734377,540.0561800079346,376.4825744628906]},{"page":341,"text":"surprise achieved by attacking through an area believed to be impassable may justify the effort expended in","rect":[107.98998260498047,397.11376953125,539.9608058929443,387.9955749511719]},{"page":341,"text":"constructing these trails. The force bypasses existing obstacles that are identified before starting the offense","rect":[107.98999786376953,408.63677978515627,539.9951448516846,399.5285949707031]},{"page":341,"text":"instead of breaching them, when possible. However, this must be done with caution because it might give","rect":[107.98998260498047,420.0996398925781,540.0260896759033,410.991455078125]},{"page":341,"text":"the enemy an advantage. Bypassed obstacles are reported to higher headquarters, and they are marked as the","rect":[107.98998260498047,431.62261962890627,539.9990511016846,422.5144348144531]},{"page":341,"text":"situation allows.","rect":[107.98998260498047,441.12158203125,173.55486583709718,434.0374450683594]},{"page":341,"text":"18-4. Maintaining the momentum of an offensive operation requires the attacking force to quickly pass","rect":[107.98998260498047,460.6105041503906,539.9580218772888,451.5023193359375]},{"page":341,"text":"through obstacles as it encounters them. This involves a deliberate effort to capture enemy bridges and other","rect":[107.98997497558594,472.13348388671877,539.9789941368103,463.0252990722656]},{"page":341,"text":"enemy reserved obstacles intact. In some cases, using air assault and airborne forces is an effective technique","rect":[107.98997497558594,483.656494140625,540.0014925079346,474.5483093261719]},{"page":341,"text":"to accomplish this goal. Hasty breaching is the preferred method when time and resources are unavailable to","rect":[107.98999786376953,495.119384765625,539.8934841156006,486.0111999511719]},{"page":341,"text":"conduct a deliberate breach. The commander plans how and where subordinate forces conduct breaching.","rect":[107.98998260498047,506.6423645019531,529.7561597824097,497.5341796875]},{"page":341,"text":"18-5. Rivers and other gaps larger than navigable by mounted and dismounted forces remain major obstacles","rect":[107.98998260498047,524.1673583984375,539.9982440452576,515.0491333007813]},{"page":341,"text":"despite advances in high-mobility vehicles and increased aviation support. Wet-gap crossings are among the","rect":[107.99996185302735,535.6302490234375,540.0704011993408,526.5220947265625]},{"page":341,"text":"most critical, complex, and vulnerable combined arms missions. While units conduct hasty crossings, when","rect":[107.99996185302735,547.1531982421875,539.9775295257568,538.0450439453125]},{"page":341,"text":"possible, they continue the attack with speed. Operational risk is much higher with hasty crossings, and staff","rect":[108.01000213623047,558.6161499023438,540.0464379844666,549.5079956054688]},{"page":341,"text":"planning must still incorporate the breaching tenets and gap crossing fundamentals. The size of the gap and","rect":[108.01001739501953,570.13916015625,539.9722805023193,561.031005859375]},{"page":341,"text":"the enemy and friendly situation will dictate the specific tactics, techniques, and procedures used in","rect":[108.0,581.6621704101563,539.9581203460693,572.5540161132813]},{"page":341,"text":"conducting the crossing. Gap crossing includes the deliberate, hasty, and covert capabilities. Initial combat","rect":[108.0,593.1250610351563,539.9859995803834,584.0169067382813]},{"page":341,"text":"crossings may be further developed in support of LOCs.","rect":[108.0,604.6480712890625,332.73858165740969,595.5399169921875]},{"page":341,"text":"MOBILITY TASKS","rect":[90.0,629.8497314453125,212.5416785736084,620.175537109375]},{"page":341,"text":"18-6. Mobility tasks are combined arms activities that mitigates the effects of obstacles to enable freedom of","rect":[108.0,650.154296875,539.9792382774353,641.046142578125]},{"page":341,"text":"movement and maneuver (ATP 3-90.4/MCTP 3-34A). There are six primary mobility tasks:","rect":[108.01001739501953,661.6773071289063,476.5957407913208,652.5691528320313]},{"page":341,"text":" Breach.","rect":[133.1999969482422,673.1502685546875,182.08164501190186,666.066162109375]},{"page":341,"text":" Gap crossing.","rect":[133.1999969482422,688.67431640625,206.20580577850343,679.566162109375]},{"page":341,"text":" Clear (areas and routes).","rect":[133.1999969482422,702.154296875,248.92408275604249,693.066162109375]},{"page":341,"text":" Combat roads and trails.","rect":[133.1999969482422,713.6602783203125,248.98821544647218,706.566162109375]},{"page":341,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":341,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":341,"text":"18-1","rect":[504.00299072265627,754.18798828125,521.9580405273438,747.6090087890625]},{"page":342,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":342,"text":" Construct and maintain forward airfields and landing zones.","rect":[115.19999694824219,83.51434326171875,373.1048536300659,74.40616607666016]},{"page":342,"text":" Traffic management and enforcement.","rect":[115.19999694824219,97.01434326171875,286.4809217453003,87.90616607666016]},{"page":342,"text":"Note. Chapter 18 only discusses breaching, gap crossing, and clearing. For additional information","rect":[115.19405364990235,120.2342529296875,504.0309352874756,111.1225357055664]},{"page":342,"text":"on combat roads and trails, forward airfield and landing zones, and traffic management and","rect":[115.19999694824219,131.7542724609375,504.01708030700686,122.6460952758789]},{"page":342,"text":"enforcement, see ATP 3-90.4/MCTP 3-34A.","rect":[115.19999694824219,141.2632598876953,293.25542736053469,134.16909790039063]},{"page":342,"text":"18-7. Mobility tasks are conducted to enable friendly forces to move and maneuver freely on the battlefield.","rect":[90.0,175.49432373046876,522.0521192550659,166.38613891601563]},{"page":342,"text":"Mobility tasks depend on information collection and intelligence. Breaching and gap crossing in support of","rect":[90.0,187.017333984375,521.9197290000916,177.90914916992188]},{"page":342,"text":"maneuver are primarily conducted using combat engineer units that have, or are augmented by, gap-crossing","rect":[90.0,198.480224609375,522.0203762054443,189.37203979492188]},{"page":342,"text":"equipment. Gap-crossing equipment includes the rapidly emplaced bridge system that is organic to the","rect":[90.0,210.003173828125,522.0674104766846,200.89498901367188]},{"page":342,"text":"Stryker BCT and the joint assault bridge organic to the armored BCT. Units may also receive gap crossing","rect":[90.01001739501953,221.52618408203126,522.0824489593506,212.40798950195313]},{"page":342,"text":"assets from echelons above brigade such as those typically found in a multi-role bridge company. These","rect":[90.0,232.98907470703126,522.0584383087158,223.88088989257813]},{"page":342,"text":"echelons above brigade assets may include the dry support bridgefixed bridging for dry-gaps or the improved","rect":[89.98998260498047,244.5120849609375,522.0233058929443,235.40390014648438]},{"page":342,"text":"ribbon bridge, which is also capable of rafting, for wet-gap crossing.","rect":[89.98998260498047,255.9749755859375,364.11614513397219,246.86679077148438]},{"page":342,"text":"18-8. Typically, BCTs are able to execute breaches, dry-crossing, and wet- gap crossings up to a certain","rect":[89.9899673461914,273.49993896484377,521.9435329437256,264.3917541503906]},{"page":342,"text":"width with little assistance from a division or corps headquarters. Any wet-gap crossing that requires a multi-","rect":[89.98999786376953,285.02294921875,522.0223290977478,275.9147644042969]},{"page":342,"text":"role bridge company will usually be at least a division level operation and require additional assistance from","rect":[89.98994445800781,296.48583984375,522.0444006881714,287.3776550292969]},{"page":342,"text":"a corps. Engineers at all echelons and can conduct clearing operations.","rect":[89.98994445800781,308.0088195800781,372.13921642303469,298.900634765625]},{"page":342,"text":"BREACH","rect":[72.0,331.3327331542969,114.2264986038208,323.2560119628906]},{"page":342,"text":"18-9. A successful obstacle breach is a synchronized and rehearsed combined arms activity, under the control","rect":[90.0,351.2943115234375,522.0562510452271,342.1861267089844]},{"page":342,"text":"of the maneuver unit. Breaching is a mission undertaken to execute a breach. Breaching allows maneuver","rect":[90.0,362.7572021484375,521.8577172813416,353.6490173339844]},{"page":342,"text":"despite the presence of the enemy reinforcing obstacles with direct and indirect fire. For additional","rect":[90.0,374.2801818847656,522.0717539749146,365.1719970703125]},{"page":342,"text":"information, see paragraph Chapter 20B-7.","rect":[90.0,385.8031921386719,261.64263439178469,376.69500732421877]},{"page":342,"text":"18-10. Breaching begins when friendly forces detect an obstacle and begin to apply the breaching","rect":[90.0100326538086,403.26806640625,521.9818019866943,394.1598815917969]},{"page":342,"text":"fundamentals. Breaching ends when battle handover occurs between follow-on forces and the unit conducting","rect":[90.01000213623047,414.7910461425781,522.0413722991943,405.682861328125]},{"page":342,"text":"the breach. A breach includes the reduction of minefields, other explosive hazards, and other obstacles.","rect":[90.01001739501953,426.29400634765627,521.9823560714722,417.20587158203127]},{"page":342,"text":"Generally, breaching requires significant combat engineer support to accomplish.","rect":[90.01001739501953,437.7769470214844,415.4327039718628,428.66876220703127]},{"page":342,"text":"18-11. Reduction is the creation of lanes through a minefield or obstacle to allow passage of the attacking","rect":[90.01001739501953,455.3019104003906,521.9142971038818,446.1937255859375]},{"page":342,"text":"ground force (JP 3-15). A lane is a route through, over, or around an enemy or friendly obstacle that provides","rect":[90.01001739501953,466.8249206542969,522.0935809593201,457.71673583984377]},{"page":342,"text":"passage of a force (ATP 3-90.4/ MCTP 3-34A). The route may be reduced and proofed as part of breaching,","rect":[90.03004455566406,478.28778076171877,522.0595045089722,469.1795959472656]},{"page":342,"text":"constructed as part of the obstacle, or marked as a bypass. The number and width of lanes vary depending on","rect":[90.02002716064453,489.810791015625,522.0522365570068,480.7026062011719]},{"page":342,"text":"the enemy situation, size and composition of the assaulting force, and the scheme of movement and","rect":[90.02002716064453,501.273681640625,522.0401515960693,492.1654968261719]},{"page":342,"text":"maneuver. Proof is the verification that a lane is free of mines or explosive hazards and that the width and","rect":[90.02002716064453,512.7966918945313,522.0445461273193,503.6885070800781]},{"page":342,"text":"trafficability at the point of breach are suitable for the passing force (ATP 3-90.4/ MCTP 3-34A). Proofing","rect":[90.01000213623047,524.3197021484375,522.0232448577881,515.2115478515625]},{"page":342,"text":"can be conducted visually, electronically, or mechanically. Some mines are resistant to reduction assets and","rect":[89.99992370605469,535.7825317382813,522.0104885101318,526.6743774414063]},{"page":342,"text":"may require a combination of breaching techniques; for example, magnetic and double impulse mines may","rect":[89.99992370605469,547.3055419921875,521.9222316741943,538.1973876953125]},{"page":342,"text":"resist a mine clearing line charge blast. Proofing is an important component of breaching considering the","rect":[90.0,558.82861328125,521.9962434844971,549.720458984375]},{"page":342,"text":"wide variety of explosive obstacle threats in use today.","rect":[89.9999771118164,570.2914428710938,309.1635694503784,561.1832885742188]},{"page":342,"text":"Breach Control Measures","rect":[72.0,592.6537475585938,192.91944369888305,585.0665283203125]},{"page":342,"text":"18-12. The breach area is a defined area where a breach occurs (ATP 3-90.4/ MCTP 3-34A). It is","rect":[90.0,612.394287109375,522.0433490257263,603.30615234375]},{"page":342,"text":"established and fully defined by the higher headquarters of the unit conducting the breach. Within the breach","rect":[89.98994445800781,623.9373168945313,521.9929714202881,614.8291625976563]},{"page":342,"text":"area is the point of breach, the reduction area, the far side objective, and the point of penetration. Their","rect":[89.98999786376953,635.4002075195313,521.9869287071228,626.281982421875]},{"page":342,"text":"definitions follow in paragraphs 18-13 through 18-16.","rect":[89.98998260498047,646.9232177734375,305.86089611053469,637.8150634765625]},{"page":342,"text":"18-13. Point of breach is the location at an obstacle where the creation of a lane is being attempted","rect":[90.0,664.3880615234375,521.9913234710693,655.2799072265625]},{"page":342,"text":"(ATP 3-90.4/ MCTP 3-34A). Initially, points of breach are planned locations only within the directed breach","rect":[89.9899673461914,675.9110717773438,521.9782619476318,666.8029174804688]},{"page":342,"text":"area. Normally, the breach force determines the actual point of breach during the breach.","rect":[90.01001739501953,687.43408203125,444.8735303878784,678.325927734375]},{"page":342,"text":"18-14. Reduction area is a number of adjacent points of breach that are under the control of the breaching","rect":[90.01001739501953,704.89892578125,521.9778347015381,695.7807006835938]},{"page":342,"text":"commander (ATP 3-90.4/ MCTP 3-34A). The commander conducting the attack determines the size and","rect":[90.01000213623047,716.4219360351563,521.9993190765381,707.3137817382813]},{"page":342,"text":"18-2","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":342,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":342,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":343,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":343,"text":"location of the reduction area that supports the seizure of a point of penetration. The reduction area is","rect":[108.0,83.49430847167969,539.9331195335388,74.40616607666016]},{"page":343,"text":"indicated by the area located between the arms of the control graphic for breach. As shown in figure 18-1,","rect":[108.0,94.97723388671875,540.0423536300659,85.86905670166016]},{"page":343,"text":"the length and width of the arms extend to include the entire depth of the area that must be reduced.","rect":[108.0,106.500244140625,506.2067518234253,97.3920669555664]},{"page":343,"text":"18-15. Far side objective is a defined location oriented on the terrain or on an enemy force that an assaulting","rect":[108.0,124.02520751953125,539.9722194671631,114.91703033447266]},{"page":343,"text":"force seizes to eliminate enemy direct fires to prevent the enemy from interfering with the reduction of the","rect":[108.0,135.48809814453126,539.9892854766846,126.37992095947266]},{"page":343,"text":"obstacles and allows follow-on forces to move securely through created lanes (ATP 3-90.4/ MCTP 3-34A).","rect":[107.98998260498047,147.0111083984375,539.9522047042847,137.90292358398438]},{"page":343,"text":"A far side objective can be oriented on the terrain or on an enemy force. The higher headquarters assigns the","rect":[107.96995544433594,158.5340576171875,539.9860506134033,149.41586303710938]},{"page":343,"text":"objective; however, the attacking unit normally subdivides the objective into smaller objectives to assign","rect":[107.96995544433594,169.9969482421875,539.9642238616943,160.87875366210938]},{"page":343,"text":"responsibilities and to control and focus the assault of subordinate forces. When breaching as part of a larger","rect":[107.96995544433594,181.51995849609376,539.9489038047791,172.41177368164063]},{"page":343,"text":"force, seizing the far side objective provides the necessary maneuver space for the higher unit follow-on","rect":[107.96995544433594,193.04296875,539.9922389984131,183.92477416992188]},{"page":343,"text":"forces to move securely through the lanes, assemble or deploy, and continue the attack without enemy","rect":[107.95990753173828,204.505859375,539.9733180999756,195.39767456054688]},{"page":343,"text":"interference.","rect":[107.95991516113281,214.00477600097657,158.21523571014405,206.92062377929688]},{"page":343,"text":"18-16. Point of penetration is the location, identified on the ground, where the commanders concentrate","rect":[107.95991516113281,233.49371337890626,540.0169954376221,224.38552856445313]},{"page":343,"text":"their efforts at the weakest point of the enemy to seize a foothold on the far side objective (ATP 3-90.4/","rect":[107.94990539550781,245.0167236328125,539.9621958694459,235.89852905273438]},{"page":343,"text":"MCTP 3-34A). This is achieved along a narrow front through maneuver and direct and indirect fires that are","rect":[107.92990112304688,256.5396728515625,539.8750276641846,247.43148803710938]},{"page":343,"text":"accurately placed against enemy forces. A commander conducting a breach establishes a point of penetration","rect":[107.92989349365235,268.0025634765625,539.9091091156006,258.8943786621094]},{"page":343,"text":"that supports planning locations for the reduction area and the seizure of the far side objective.","rect":[107.92990112304688,279.52557373046877,485.55633068084719,270.4073791503906]},{"page":343,"text":"Figure 18-1. Breach","rect":[268.4903564453125,576.4081420898438,361.37072491836548,567.1095581054688]},{"page":343,"text":"Breach Types","rect":[90.0,606.9207153320313,154.4613748512268,597.291259765625]},{"page":343,"text":"18-17. Breaching activities must be adapted to best exploit the situation. The level and type of planning","rect":[108.0,624.4743041992188,539.9324855804443,615.3661499023438]},{"page":343,"text":"distinguish which of the three general types of breaching:","rect":[108.0,635.997314453125,337.94898175811769,626.88916015625]},{"page":343,"text":" Deliberate.","rect":[133.1999969482422,647.47021484375,195.40122509002686,640.3861083984375]},{"page":343,"text":" Hasty.","rect":[133.1999969482422,662.9942626953125,177.04058361053468,654.2067260742188]},{"page":343,"text":" Covert.","rect":[133.1999969482422,674.4802856445313,180.94736766815186,667.5564575195313]},{"page":343,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":343,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":343,"text":"18-3","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":344,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":344,"text":"Deliberate Breach","rect":[72.0,81.49030303955078,147.29328822326662,74.57650756835938]},{"page":344,"text":"18-18. A deliberate breach is the systematically planned and executed creation of a lane through a barrier","rect":[90.00593566894531,100.97918701171875,522.0374658164978,91.87100982666016]},{"page":344,"text":"or obstacle (ATP 3-90.4/MCTP 3-34A). Typically, a unit uses a deliberate breach against a strong defense or","rect":[90.00593566894531,112.502197265625,521.9190576133728,103.3940200805664]},{"page":344,"text":"complex obstacle system. It is characterized by the most planning, preparation, and buildup of combat power","rect":[89.9959716796875,124.02520751953125,521.9689233360291,114.91703033447266]},{"page":344,"text":"on the near side of obstacles. It is similar to a deliberate attack, requiring detailed knowledge of the defense","rect":[89.9959716796875,135.48809814453126,522.0602083282471,126.37992095947266]},{"page":344,"text":"and obstacle systems. Subordinate units are task-organized to accomplish the breach. The breach may require","rect":[89.9959716796875,147.0111083984375,522.0561800079346,137.90292358398438]},{"page":344,"text":"securing the far side of the obstacle with an assault force before or during reduction.","rect":[89.98590087890625,158.5340576171875,426.9316358566284,149.42587280273438]},{"page":344,"text":"Hasty Breach","rect":[71.98997497558594,181.99090576171876,128.44366358947756,173.05307006835938]},{"page":344,"text":"18-19. A hasty breach is the creation of lanes through enemy minefields by expedient methods such as","rect":[89.99591064453125,199.505859375,521.9582660179138,190.39767456054688]},{"page":344,"text":"blasting with demolitions, pushing rollers or disabled vehicles through the minefields when the time factor","rect":[89.99591827392578,211.02886962890626,521.9399926719666,201.92068481445313]},{"page":344,"text":"does not permit detailed reconnaissance, deliberate breaching, or bypassing the obstacle (JP 3-15). A hasty","rect":[89.99591827392578,222.49176025390626,522.0204982757568,213.38357543945313]},{"page":344,"text":"breach is an adaptation to the deliberate breach and is conducted when less time is available. It may be","rect":[89.99589538574219,234.0147705078125,521.8874178009033,224.90652465820313]},{"page":344,"text":"conducted during a deliberate or hasty attack due to lack of clarity on enemy obstacles or changing enemy","rect":[89.99591827392578,245.4776611328125,521.9251613616943,236.36947631835938]},{"page":344,"text":"situations.","rect":[89.99589538574219,254.9766387939453,130.89855480194093,247.89242553710938]},{"page":344,"text":"18-20. An in-stride breach is a type of hasty breach used to describe the situation when a subordinate unit","rect":[89.99591827392578,274.51556396484377,521.9711070022584,265.4073791503906]},{"page":344,"text":"is expected to be able to organize for a conduct a hasty breach with its organic or task-organized assets,","rect":[89.99591827392578,285.97845458984377,521.9691724777222,276.8702697753906]},{"page":344,"text":"without affecting the higher unit scheme of movement and maneuver or commander’s intent. In-stride breach","rect":[89.98588562011719,297.50146484375,521.9570827484131,288.3932800292969]},{"page":344,"text":"is generally not used below the company level since a platoon is unable to form effective support, breach,","rect":[89.98583984375,309.0244445800781,521.9710645675659,299.916259765625]},{"page":344,"text":"and assault forces with its squads.","rect":[89.98583984375,320.4672546386719,225.57050609588624,311.3791198730469]},{"page":344,"text":"Covert Breach","rect":[71.98992156982422,341.990234375,131.74719905090334,335.06640625]},{"page":344,"text":"18-21. A covert breach is the creation of lanes through minefields or other obstacles that is planned and","rect":[89.98584747314453,361.52923583984377,522.0311183929443,352.4210510253906]},{"page":344,"text":"intended to be executed without detection by an adversary. Its primary purpose is to reduce obstacles in an","rect":[89.98584747314453,372.99212646484377,521.9830837249756,363.8839416503906]},{"page":344,"text":"undetected fashion to facilitate the passage of maneuver forces. A covert breach is conducted when surprise","rect":[89.98583984375,384.5151062011719,522.0376863555908,375.40692138671877]},{"page":344,"text":"is necessary or desirable and when limited visibility and terrain present the opportunity to reduce enemy","rect":[89.98583984375,396.0381164550781,521.9898586273193,386.929931640625]},{"page":344,"text":"obstacles without being seen. Through surprise, the commander conceals their capabilities and intentions and","rect":[89.98583984375,407.5010070800781,522.0283107757568,398.392822265625]},{"page":344,"text":"creates the opportunity to position support and assault forces to strike the enemy while unaware or","rect":[89.98583984375,419.0240173339844,522.0241601524353,409.91583251953127]},{"page":344,"text":"unprepared. The support force does not usually provide suppressive fire until the initiation of the assault or","rect":[89.98583984375,430.5470275878906,521.9951074180603,421.4388427734375]},{"page":344,"text":"in the event that the breach force is detected. Covert breaches are usually conducted during limited visibility.","rect":[89.98583984375,442.0099182128906,521.9868726730347,432.9017333984375]},{"page":344,"text":"It uses elements of deliberate and hasty breaching, as required.","rect":[89.98583984375,453.5329284667969,340.82851696014407,444.42474365234377]},{"page":344,"text":"Breaching Tenets","rect":[72.0,478.1006774902344,154.16114291763305,468.2955627441406]},{"page":344,"text":"18-22. Successful breaching missions are characterized by applying breaching tenets. See table 18-1. These","rect":[90.0,495.59429931640627,522.1235628204346,486.4861145019531]},{"page":344,"text":"tenets are integrated into the planning process. The tenets are—","rect":[90.00003814697266,507.1173095703125,344.3848686218262,498.0091247558594]},{"page":344,"text":" Intelligence.","rect":[115.19999694824219,520.6142578125,182.9252576828003,511.5060729980469]},{"page":344,"text":" Breaching fundamentals (suppress, obscure, secure, reduce, and assault [SOSRA]).","rect":[115.19999694824219,534.1142578125,465.6365613937378,525.006103515625]},{"page":344,"text":" Breaching organization.","rect":[115.19999694824219,547.6143188476563,229.36492443084718,538.5061645507813]},{"page":344,"text":" Mass.","rect":[115.19999694824219,559.0902709960938,156.88025951385499,552.3267822265625]},{"page":344,"text":" Synchronization.","rect":[115.19999694824219,574.6143188476563,201.28386974334718,565.5061645507813]},{"page":344,"text":"See ATP 3-90.4/MCTP 3-34A for more information on the breaching tenets.","rect":[89.9937515258789,589.13330078125,396.5366163253784,580.025146484375]},{"page":344,"text":"Breach Fundamentals","rect":[72.0,611.4827270507813,175.55127963638305,604.0712280273438]},{"page":344,"text":"18-23. Breaching fundamentals are integrated into the planning process and applied when a defended","rect":[90.0,631.2542724609375,522.0172634124756,622.1461181640625]},{"page":344,"text":"obstacle must be reduced. This includes breaching, gap crossing, and route clearance missions. The","rect":[90.0,642.7772827148438,522.0692415313721,633.6691284179688]},{"page":344,"text":"fundamentals are described by the memory aid SOSRA:","rect":[90.0,654.2401733398438,311.90293073272707,645.1320190429688]},{"page":344,"text":" Suppress.","rect":[115.19999694824219,667.7142944335938,171.8852186203003,658.7964477539063]},{"page":344,"text":" Obscure.","rect":[115.19999694824219,679.2202758789063,169.06859874725343,672.1261596679688]},{"page":344,"text":" Secure.","rect":[115.19999694824219,692.7202758789063,162.94236278533936,685.7964477539063]},{"page":344,"text":" Reduce.","rect":[115.19999694824219,706.2102661132813,165.70287609100343,699.1261596679688]},{"page":344,"text":"18-4","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":344,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":344,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":345,"text":" Assault.","rect":[133.1999969482422,81.49030303955078,183.7048749923706,74.40616607666016]},{"page":345,"text":"See ATP 3-90.4/MCTP 3-34A for information on breaching.","rect":[108.00376892089844,97.97320556640625,351.02285289764407,88.86502838134766]},{"page":345,"text":"Table 18-1. Breaching tenets","rect":[247.18157958984376,115.4881591796875,382.82838343811036,106.1895980834961]},{"page":345,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":345,"text":"Suppress","rect":[90.0,684.0942993164063,127.31347536849975,675.1764526367188]},{"page":345,"text":"18-24. Suppressive fires in sufficient volume serve to secure the reduction area. The purpose of suppression","rect":[108.00594329833985,701.5591430664063,540.0084133148193,692.4710083007813]},{"page":345,"text":"during breaching is to protect forces reducing obstacles and maneuvering through the reduction area.","rect":[108.00593566894531,713.1021728515625,539.9838819503784,703.9940185546875]},{"page":345,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":345,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":345,"text":"18-5","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":346,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":346,"text":"Successful suppression generally triggers the rest of the actions at the POB. Fire control measures ensure that","rect":[90.0,83.51434326171875,522.0718150100709,74.40616607666016]},{"page":346,"text":"all fires are synchronized with other actions at the POB. The mission of the support force is to suppress the","rect":[90.0,94.97723388671875,521.9649934844971,85.86905670166016]},{"page":346,"text":"enemy overwatching the obstacle. The breach force also provides additional suppressive fires as the situation","rect":[90.0,106.500244140625,522.0338039398193,97.3920669555664]},{"page":346,"text":"dictates; however, it’s primary roles are first, to secure the near side objective, and then to reduce the obstacle.","rect":[90.0,118.023193359375,521.9721632003784,108.90499877929688]},{"page":346,"text":"18-25. In complex or restrictive terrain, effective suppression may have to be achieved through close-in","rect":[90.0,135.48809814453126,522.0273342132568,126.37992095947266]},{"page":346,"text":"fighting. Defenders will tend to be more fortified when defending in urban terrain and may be more difficult","rect":[90.0,147.0111083984375,521.9672617874146,137.90292358398438]},{"page":346,"text":"to suppress. Forces tasked with suppressing the enemy may find it necessary to seize terrain at or on the far","rect":[90.00003814697266,158.5340576171875,522.0258081016541,149.42587280273438]},{"page":346,"text":"side of the obstacle to achieve their mission. Fighting to achieve enemy suppression will likely be","rect":[90.00003814697266,169.9969482421875,522.1366853790283,160.88876342773438]},{"page":346,"text":"decentralized, and the ability to use indirect fires will be restricted due to the proximity of friendly and enemy","rect":[90.00003814697266,181.51995849609376,522.0585842132568,172.41177368164063]},{"page":346,"text":"forces and civilians.","rect":[90.00003051757813,191.01893615722657,170.26223278045655,183.93478393554688]},{"page":346,"text":"Obscure","rect":[72.00410461425781,214.49575805664063,106.50797749328614,207.55189514160157]},{"page":346,"text":"18-26. Breach forces conduct breaching using available natural cover and concealment. They employ","rect":[90.00003051757813,234.0147705078125,522.0106105804443,224.90658569335938]},{"page":346,"text":"battlefield obscuration, which hampers enemy observation and target acquisition of the breach force as it","rect":[90.00003051757813,245.47760009765626,521.9241099319459,236.36941528320313]},{"page":346,"text":"reduces the obstacle and the assault force as it passes through the obstacle. Obscuration requires close","rect":[90.0000228881836,257.0006103515625,522.0328035430908,247.89242553710938]},{"page":346,"text":"coordination, control, and detailed planning to maximize the desired effects on the enemy while not degrading","rect":[90.0000228881836,268.52362060546877,522.0283718109131,259.4154357910156]},{"page":346,"text":"friendly capabilities. This is especially important when conducting breaching in complex or restrictive terrain","rect":[90.00003814697266,279.9864501953125,521.9963893890381,270.8782653808594]},{"page":346,"text":"due to the close-in nature of the fighting. In urban areas, indirect delivered obscuration and suppressive fires","rect":[90.00003814697266,291.50946044921877,522.1144549827576,282.4012756347656]},{"page":346,"text":"will be more restricted. In some situations, using mortars (because of the ability to fire high-level trajectory),","rect":[90.00003814697266,303.032470703125,522.0995435714722,293.9142761230469]},{"page":346,"text":"smoke pots, and smoke grenades rather than artillery-fired obscurants may be more effective. Planners","rect":[89.98998260498047,314.4953308105469,522.0415179710388,305.38714599609377]},{"page":346,"text":"consider the effects of wind and the time and assets required to build and maintain effective obscuration for","rect":[89.99000549316406,325.998291015625,522.0284326133728,316.91015625]},{"page":346,"text":"the desired duration. Using indirect fire to provide obscuration often competes with other mission","rect":[89.99000549316406,337.54132080078127,521.9721584320068,328.4331359863281]},{"page":346,"text":"requirements and requires priorities to be established. Obscuration employed in multiple locations and at","rect":[89.98999786376953,349.0042724609375,522.0734629592896,339.8960876464844]},{"page":346,"text":"various times can confuse the enemy on the specific location and timing of breaching. (See ATP 3-11.50 for","rect":[89.98994445800781,360.52728271484377,521.9601953086853,351.4190979003906]},{"page":346,"text":"more information on obscuration.)","rect":[89.97993469238281,372.03021240234377,227.7198083457947,362.94207763671877]},{"page":346,"text":"Secure","rect":[71.97399139404297,393.4930725097656,100.36165333557129,386.5692443847656]},{"page":346,"text":"18-27. Forces conducting a breach secure the reduction area to prevent the enemy from interfering with","rect":[89.96990966796875,413.02203369140627,522.0042018890381,403.9138488769531]},{"page":346,"text":"obstacle reduction and the passage of the assault force through the created lanes. The reduction area must be","rect":[89.95989227294922,424.5450439453125,522.0287141876221,415.4368591308594]},{"page":346,"text":"secured before attempting to reduce the obstacle. The higher headquarters breaching unit is responsible for","rect":[89.95989227294922,436.0079345703125,521.8926904258728,426.8997497558594]},{"page":346,"text":"isolating the breach area by fixing enemy forces in their current positions, attacking enemy reserves in-depth,","rect":[89.95989227294922,447.5309753417969,522.0072584152222,438.42279052734377]},{"page":346,"text":"and providing counterfire.","rect":[89.95986938476563,459.0539855957031,194.70495128631593,449.94580078125]},{"page":346,"text":"18-28. Identifying the extent of the enemy defense is critical in selecting the appropriate technique to secure","rect":[89.95986938476563,476.5188293457031,522.0492220001221,467.41064453125]},{"page":346,"text":"the point of breach. The point of breach is secured before reducing the obstacle.","rect":[89.9598617553711,488.0418701171875,409.03277111053469,478.9336853027344]},{"page":346,"text":"18-29. The breach force is resourced with sufficient maneuver assets to provide local security against the","rect":[89.96990203857422,505.5067138671875,521.9392976837158,496.3985290527344]},{"page":346,"text":"enemy that the support force cannot adequately engage. Elements within the breach force that secure the","rect":[89.96990203857422,517.0297241210938,521.8673372344971,507.9215393066406]},{"page":346,"text":"reduction area may also be used to suppress the enemy once reduction is complete. Breaching elements","rect":[89.96990203857422,528.552734375,522.0213153343201,519.444580078125]},{"page":346,"text":"prepare their breaching assets for employment throughout the secure phase.","rect":[89.96987915039063,540.015625,392.11406993865969,530.907470703125]},{"page":346,"text":"Reduce","rect":[71.97395324707031,561.508544921875,102.58104420471192,554.5947265625]},{"page":346,"text":"18-30. Normally, engineers and reduction assets (mobility capabilities) are used to reduce an obstacle. The","rect":[89.96987915039063,581.0575561523438,522.0360994415283,571.9494018554688]},{"page":346,"text":"number and width of lanes needed depend on the enemy situation, terrain, size and composition of the assault","rect":[89.96987915039063,592.5204467773438,522.0120005569459,583.4122924804688]},{"page":346,"text":"force, and scheme of maneuver. The lanes must allow the assault force to pass through the obstacle rapidly.","rect":[89.96987915039063,604.04345703125,522.0159254074097,594.935302734375]},{"page":346,"text":"In complex or restrictive terrain, the assault force may be constrained to a single lane and the assault force","rect":[89.96987915039063,615.5664672851563,521.9913606719971,606.4583129882813]},{"page":346,"text":"commander must ensure that the sequencing of forces through the lane is appropriate to achieve the mission.","rect":[89.96988677978516,627.0293579101563,522.0148878097534,617.9212036132813]},{"page":346,"text":"The breach force will reduce, proof, mark, and report lane locations and the lane marking method to higher","rect":[89.96988677978516,638.5523681640625,521.9461572227478,629.4442138671875]},{"page":346,"text":"headquarters. Follow-on units will further reduce or clear the obstacle, as required. Reduction begins when","rect":[89.96987915039063,650.075439453125,521.9653224945068,640.96728515625]},{"page":346,"text":"effective suppression and obscuration have been established, the obstacle has been confirmed, and the","rect":[89.96988677978516,661.518310546875,521.9659090118408,652.43017578125]},{"page":346,"text":"reduction area is secure.","rect":[89.96988677978516,671.0372924804688,186.60979747772218,663.9531860351563]},{"page":346,"text":"18-6","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":346,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":346,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":347,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":347,"text":"Assault","rect":[90.0,81.49030303955078,120.6281352005005,74.57650756835938]},{"page":347,"text":"18-31. A breach is complete when the attacking force has assaulted through the obstacle, seized the far side","rect":[108.00593566894531,100.97918701171875,540.0866975860596,91.87100982666016]},{"page":347,"text":"objective, eliminated enemy direct and observed indirect fires on the reduction area and, if planned, the battle","rect":[108.00593566894531,112.502197265625,539.9714632110596,103.38400268554688]},{"page":347,"text":"handover with follow-on forces. Engineers support the flow of combat forces through the lanes or bridges to","rect":[108.00593566894531,124.02520751953125,540.0189723968506,114.91703033447266]},{"page":347,"text":"build combat power quickly on the far side. These forces may entail follow-on breakout forces if the initial","rect":[108.01599884033203,135.48809814453126,539.9571909866334,126.3798599243164]},{"page":347,"text":"assault forces culminate or establishes defensive areas to manage operational reach and sustainment for future","rect":[108.00595092773438,147.0111083984375,540.0434236602783,137.90292358398438]},{"page":347,"text":"operations.","rect":[108.00595092773438,158.51402282714845,152.21018505096436,149.42587280273438]},{"page":347,"text":"Breach Organization","rect":[90.0,183.08067321777345,188.70360411071779,173.27552795410157]},{"page":347,"text":"18-32. Units organize into the following three forces to conduct a breach:","rect":[108.0,200.63427734375,408.08899640655519,191.52609252929688]},{"page":347,"text":" Support.","rect":[133.1999969482422,214.11424255371095,185.38523387908936,205.19644165039063]},{"page":347,"text":" Breach.","rect":[133.1999969482422,225.61024475097657,182.08164501190186,218.52609252929688]},{"page":347,"text":" Assault.","rect":[133.1999969482422,239.11024475097657,183.7048749923706,232.02609252929688]},{"page":347,"text":"Establishing the breach organization facilitates the application of the breaching fundamentals. Table","rect":[108.00376892089844,255.65325927734376,518.2967195587158,246.54507446289063]},{"page":347,"text":"shows the responsibilities of the support, breach, and assault forces.","rect":[108.00379943847656,267.0960998535156,379.0710401535034,258.0079650878906]},{"page":347,"text":"Table 18-2. Support, breach, and assault force responsibilities","rect":[167.46250915527345,284.5008544921875,462.54652308654786,275.24237060546877]},{"page":347,"text":"18-2","rect":[521.6494140625,253.6091766357422,540.0361232757568,246.72544860839845]},{"page":347,"text":"Planning a Breach","rect":[90.0,632.960693359375,176.75078428649904,623.155517578125]},{"page":347,"text":"18-33. Units use the reverse planning process when planning a breach. The reverse planning process begins","rect":[108.0,650.5142822265625,540.0132586936951,641.4061279296875]},{"page":347,"text":"with actions on the objective and moves backward to the LD, since seizing an objective is typically the","rect":[108.0,662.0372924804688,539.9983186798096,652.9190673828125]},{"page":347,"text":"decisive point at the tactical level and directly tied to mission accomplishment. Maneuver planners use","rect":[108.0,673.5001831054688,540.0451936798096,664.3920288085938]},{"page":347,"text":"reverse planning and force ratios to determine the size and composition of the maneuver forces that will","rect":[108.0,685.023193359375,539.9892954788209,675.9150390625]},{"page":347,"text":"perform the tasks that support the main and supporting effort for each COA. Actions on the objective drive","rect":[108.0,696.486083984375,540.0353059844971,687.3678588867188]},{"page":347,"text":"the size and composition of the force that conducts the final assault onto the objective as part of an attack,","rect":[108.0000228881836,708.009033203125,539.9993238449097,698.8908081054688]},{"page":347,"text":"which dictates lane requirements (the number and location of required lanes). Lane requirements and the","rect":[108.0000228881836,719.5120239257813,540.0673494415283,710.4238891601563]},{"page":347,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":347,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":347,"text":"18-7","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":348,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":348,"text":"composition of obstacles drive the amount and type of reduction assets needed by the breach force. The","rect":[90.0,83.51434326171875,521.9800081329346,74.40616607666016]},{"page":348,"text":"engineer staff officer and other planners use reverse planning to determine how best to allocate mobility","rect":[90.0,94.97723388671875,521.8861598968506,85.86905670166016]},{"page":348,"text":"assets within the arrayed forces to facilitate the scheme of movement and maneuver for each COA. The","rect":[90.0,106.500244140625,522.0465364532471,97.3920669555664]},{"page":348,"text":"engineer staff officer focuses on the allocation of reduction assets. The situational template depicting enemy","rect":[90.0,118.023193359375,522.0304470062256,108.9150161743164]},{"page":348,"text":"direct- and indirect fire coverage of template enemy obstacles determines the size and composition of the","rect":[90.0,129.486083984375,522.0504427032471,120.3779067993164]},{"page":348,"text":"support force. Reverse planning for breaching is performed using the following steps:","rect":[89.98998260498047,141.00909423828126,432.73413800811769,131.90090942382813]},{"page":348,"text":" Step 1. Identify available reduction assets.","rect":[115.19999694824219,154.49432373046876,302.3847303390503,145.38613891601563]},{"page":348,"text":" Step 2. Template enemy obstacles.","rect":[115.19999694824219,167.99432373046876,272.07512950897219,158.88613891601563]},{"page":348,"text":" Step 3. Understand the scheme of movement and maneuver.","rect":[115.19999694824219,181.4742889404297,373.78435802459719,172.38613891601563]},{"page":348,"text":" Step 4. Identify the number of required breach lanes.","rect":[115.19999694824219,194.99432373046876,344.2663221359253,185.88613891601563]},{"page":348,"text":" Step 5. Identify the assets required to reduce, proof, and mark lanes.","rect":[115.19999694824219,208.49432373046876,405.7040967941284,199.38613891601563]},{"page":348,"text":" Step 6. Task-organize reduction assets within the maneuver force.","rect":[115.19999694824219,221.99432373046876,397.0036573410034,212.88613891601563]},{"page":348,"text":"See ATP 3-90.4/MCTP 3-34A for more information on the reverse planning process for a breach.","rect":[89.9937515258789,236.45318603515626,480.43108654022219,227.34500122070313]},{"page":348,"text":"18-34. Successful breaching depends on preparation and planning. During preparation, units continue to","rect":[89.97368621826172,253.9781494140625,522.0601100921631,244.86996459960938]},{"page":348,"text":"review IPB products against the current situation and redirect information collection assets to focus on the","rect":[89.97370147705078,265.50115966796877,521.9949007110596,256.3929748535156]},{"page":348,"text":"most important requirements remaining,","rect":[89.97370910644531,276.96405029296877,264.93093395233157,267.8558654785156]},{"page":348,"text":"while emphasizing the","rect":[272.0170593261719,276.96405029296877,371.26717854309086,267.8558654785156]},{"page":348,"text":"commander’s critical information","rect":[378.4013977050781,274.94000244140627,522.0151271820068,267.8558654785156]},{"page":348,"text":"requirements. Plans are continuously refined based on IPB updates and reporting from information collection","rect":[89.97370910644531,288.487060546875,522.0280055999756,279.3788757324219]},{"page":348,"text":"assets.","rect":[89.97370910644531,297.9859924316406,115.81128215789795,291.90386962890627]},{"page":348,"text":"18-35.","rect":[89.97370910644531,315.43084716796877,115.81528759002686,308.5470886230469]},{"page":348,"text":"","rect":[115.19999694824219,328.2254333496094,121.16105696249008,323.5331726074219]},{"page":348,"text":"","rect":[115.19999694824219,364.76544189453127,121.16105696249008,360.07318115234377]},{"page":348,"text":"","rect":[115.19999694824219,401.2454528808594,121.16105696249008,396.5531921386719]},{"page":348,"text":"","rect":[115.19999694824219,414.7454528808594,121.16105696249008,410.0531921386719]},{"page":348,"text":"","rect":[115.19999694824219,428.2454528808594,121.16105696249008,423.5531921386719]},{"page":348,"text":"Key preparation activities for breaching include—","rect":[124.52266693115235,317.47491455078127,325.88459396362307,308.3667297363281]},{"page":348,"text":"Planning refinement based on IPB updates and reporting from information collection assets, to","rect":[133.1999969482422,330.95428466796877,522.0082302093506,321.8460998535156]},{"page":348,"text":"include adjustments to the breach organization (support, breach, and assault forces), the scheme","rect":[133.1999969482422,342.477294921875,521.9466219024658,333.3591003417969]},{"page":348,"text":"of movement and maneuver, and the fire support plan.","rect":[133.1999969482422,353.980224609375,350.4446973800659,344.89208984375]},{"page":348,"text":"Implementing the task organization (breach organization), to include coordinating the linkup of","rect":[133.1999969482422,367.4942932128906,522.0683496055603,358.3861083984375]},{"page":348,"text":"breaching assets (units and equipment) with the supported unit to allow combined arms breaching","rect":[133.1999969482422,378.9571838378906,522.0330104827881,369.8489990234375]},{"page":348,"text":"rehearsals to be conducted.","rect":[133.1999969482422,388.45611572265627,241.5392255783081,381.3719787597656]},{"page":348,"text":"Performing pre-combat checks and inspections.","rect":[133.1999969482422,403.97430419921877,323.4977979660034,394.8661193847656]},{"page":348,"text":"Rehearsals with key breaching assets.","rect":[133.1999969482422,417.47430419921877,284.02105236053469,408.3661193847656]},{"page":348,"text":"Position and staging of breaching assets.","rect":[133.1999969482422,430.97430419921877,295.4237928390503,421.8661193847656]},{"page":348,"text":"18-36. A breaching rehearsal site should reflect the actual obstacle system in as much detail as possible","rect":[90.00377655029297,448.4992980957031,521.9449129180908,439.39111328125]},{"page":348,"text":"based on obstacle intelligence. At a minimum, rehearsals should include a leader and key personnel walk-","rect":[90.00379943847656,459.962158203125,521.9760644493103,450.8539733886719]},{"page":348,"text":"through and individual rehearsals by support, breach, and assault forces. As time permits, full-scale rehearsals","rect":[90.00379943847656,471.48516845703127,521.9369037132263,462.3769836425781]},{"page":348,"text":"should be conducted. When possible, friendly forces rehearse the mission under the same conditions","rect":[90.00376892089844,482.94805908203127,522.0548846702576,473.8398742675781]},{"page":348,"text":"(obscuration and darkness) expected during the actual mission. Rehearsals should also include contingencies","rect":[90.00376892089844,494.4710388183594,522.0008685569763,485.36285400390627]},{"page":348,"text":"such as enemy counterattacks and attacks by enemy indirect-fire systems, attack helicopters, other air assets,","rect":[90.00376892089844,505.9940490722656,522.0421094894409,496.8858642578125]},{"page":348,"text":"and enemy use of CBRN material. If updates become available after the last possible rehearsal, the","rect":[89.99371337890625,517.4569091796875,521.9828157501221,508.3487243652344]},{"page":348,"text":"information should be immediately passed on to affected elements. A key output of rehearsals is that all","rect":[89.9937973022461,528.9799194335938,521.9559702835084,519.8717041015625]},{"page":348,"text":"participants understand unit-specific brevity codes, and signals associated with the breach.","rect":[90.0037841796875,540.5029296875,451.6055860519409,531.394775390625]},{"page":348,"text":"18-37. Executing task organization changes of critical reduction assets during mission execution may be","rect":[90.00379943847656,557.9677734375,522.0060091094971,548.859619140625]},{"page":348,"text":"required. This situation presents even more challenges, especially with regard to terrain management, because","rect":[89.9937973022461,569.4907836914063,521.9686555938721,560.3826293945313]},{"page":348,"text":"unit positions and fire control measures may have shifted. War gaming these actions during mission planning","rect":[89.99375915527344,581.0137939453125,522.0409450531006,571.9056396484375]},{"page":348,"text":"and rehearsals, implementing the necessary control measures, and coordinating instructions are critical to","rect":[89.99375915527344,592.4766845703125,521.9941310882568,583.3685302734375]},{"page":348,"text":"avoid fratricide.","rect":[89.98371887207031,601.9755859375,153.86822032928468,594.8914794921875]},{"page":348,"text":"18-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":348,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":348,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":349,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0152915039063,38.016021728515628]},{"page":349,"text":"Execution","rect":[90.0,82.40274810791016,137.02403868103029,74.81556701660156]},{"page":349,"text":"18-38. Execution involves monitoring the situation, assessing the mission, and adjusting the order as","rect":[108.0,102.11431884765625,540.0421283226013,92.99612426757813]},{"page":349,"text":"needed. When the situation deviates from the order, commanders direct adjustments to exploit opportunities","rect":[108.0,113.6373291015625,540.0032489280701,104.51913452148438]},{"page":349,"text":"and counter threats. Adjustments that may be necessary during breaching might include—","rect":[108.00999450683594,125.16033935546875,468.5496940612793,116.04214477539063]},{"page":349,"text":" Allocating additional assets to the support, breach, or assault force due to attrition.","rect":[133.1999969482422,138.654296875,480.88372325897219,129.54611206054688]},{"page":349,"text":" Changing the location of the POB or point of penetration.","rect":[133.1999969482422,152.154296875,381.7000684738159,143.04611206054688]},{"page":349,"text":" Modifying the scheme of movement and maneuver and changing the order of the units passing","rect":[133.1999969482422,165.654296875,539.9352321624756,156.54611206054688]},{"page":349,"text":"through the created lane.","rect":[151.1999969482422,177.1171875,250.06029796600343,168.00900268554688]},{"page":349,"text":"18-39. For breaching, the commander focuses on monitoring, assessing, and adjusting the critical events of","rect":[107.99375915527344,194.63214111328126,540.0339257774353,185.51394653320313]},{"page":349,"text":"a breach that were rehearsed. The critical events that are generally associated with a breach are—","rect":[107.99375915527344,206.1551513671875,497.2558403015137,197.04696655273438]},{"page":349,"text":" Occupying support by fire positions.","rect":[133.1999969482422,219.654296875,297.55910778045657,210.54611206054688]},{"page":349,"text":" Suppressing the far side objective.","rect":[133.1999969482422,233.154296875,288.6222791671753,224.03610229492188]},{"page":349,"text":" Employing obscuration.","rect":[133.1999969482422,246.654296875,247.36493968963624,237.54611206054688]},{"page":349,"text":" Reducing the obstacle.","rect":[133.1999969482422,260.154296875,242.01928234100343,251.04611206054688]},{"page":349,"text":" Assaulting the far side objective.","rect":[133.1999969482422,273.654296875,282.58428478240969,264.5361022949219]},{"page":349,"text":" Consolidating on the far side objective.","rect":[133.1999969482422,287.154296875,308.3818006515503,278.0361022949219]},{"page":349,"text":" Passage of follow-on forces.","rect":[133.1999969482422,300.654296875,265.0612745285034,291.5461120605469]},{"page":349,"text":"GAP CROSSING","rect":[90.0,324.05999755859377,165.77592182159425,315.7440185546875]},{"page":349,"text":"18-40. A gap is a ravine, mountain pass, river, or other terrain feature that presents an obstacle that may be","rect":[108.0,343.9142761230469,540.0050325469971,334.80609130859377]},{"page":349,"text":"bridged (ATP 3-90.4/MCTP 3-34A). Gap crossing in support of maneuver is similar to a breach in that the","rect":[108.0,355.4372863769531,539.9040803985596,346.3291015625]},{"page":349,"text":"force is vulnerable while moving through a lane or across a gap. Maneuver units are forced to break","rect":[107.97996520996094,366.900146484375,539.9920558929443,357.7919616699219]},{"page":349,"text":"movement formations, concentrate within lanes or at crossing points, and reform on the far side before","rect":[107.97996520996094,378.42315673828127,540.0414095001221,369.3149719238281]},{"page":349,"text":"continuing to maneuver. While much of the terminology and planning associated with gap crossing is the","rect":[107.97997283935547,389.9461669921875,539.9579134063721,380.8379821777344]},{"page":349,"text":"same as that used in a breach, gap crossing and breach differ in scope. The amount and type of assets involved","rect":[107.97997283935547,401.4090270996094,540.1033229827881,392.30084228515627]},{"page":349,"text":"also differ. Combined arms breaching sometimes includes gap crossings as a reduction method. Since the","rect":[107.97997283935547,412.9320373535156,539.9518709259033,403.8238525390625]},{"page":349,"text":"primary focus of planning and preparation is on the breach, they are typically discussed as a subordinate part","rect":[107.97997283935547,424.4550476074219,540.0071787796021,415.34686279296877]},{"page":349,"text":"of the breach rather than as a separate gap crossing.","rect":[107.97997283935547,435.91790771484377,313.99920177459719,426.8097229003906]},{"page":349,"text":"18-41. Gaps will exist in the operational environment and present a significant challenge to movement and","rect":[107.97997283935547,453.4328918457031,540.0715236663818,444.32470703125]},{"page":349,"text":"maneuver. A gap crossing is the projection of combat power across a linear obstacle (wet or dry gap) (ATP","rect":[107.97996520996094,464.95587158203127,540.0191183013916,455.8376770019531]},{"page":349,"text":"3-90.4/MCTP 3-34A). Historically, gap crossings were described only in the context of crossing rivers. A","rect":[107.96990203857422,476.41876220703127,539.9613080062866,467.3105773925781]},{"page":349,"text":"river crossing is a special type of gap crossing required before ground combat power can be projected and","rect":[107.94989013671875,487.9417724609375,539.9339504241943,478.8235778808594]},{"page":349,"text":"sustained across a water obstacle. A centrally planned and controlled offensive mission requires the allocation","rect":[107.94989013671875,499.4647521972656,539.9231472015381,490.3565673828125]},{"page":349,"text":"of specialized crossing resources and a force dedicated to the security of the bridgehead. While river crossing","rect":[107.94989013671875,510.9276428222656,539.9345607757568,501.8194580078125]},{"page":349,"text":"is still considered one of the most challenging of gap crossings, a river is only one type of gap that can","rect":[107.94989013671875,522.4506225585938,540.0019435882568,513.3424682617188]},{"page":349,"text":"obstruct freedom of mobility. The fundamentals of crossing any type of gap are essentially the same as those","rect":[107.94989013671875,533.9736328125,539.9563875274658,524.865478515625]},{"page":349,"text":"fundamentals that have been associated with river crossing. River crossings are simply one focused set of","rect":[107.94989013671875,545.4365234375,539.9683129844666,536.328369140625]},{"page":349,"text":"challenges among all of the possible types of gap crossings. A gap crossing encompasses wet or dry gaps in","rect":[107.94990539550781,556.95947265625,539.9913234710693,547.851318359375]},{"page":349,"text":"any type of environment or uses organic and augmenting engineer (and other) elements best suited to","rect":[107.95992279052735,568.4824829101563,539.8630886077881,559.3743286132813]},{"page":349,"text":"accomplish the mission.","rect":[107.95992279052735,579.9253540039063,204.3653211593628,570.8372192382813]},{"page":349,"text":"Types of Gap Crossing","rect":[90.0,604.520751953125,197.18784523010255,594.715576171875]},{"page":349,"text":"18-42. The gap crossing types are―","rect":[108.0,622.0742797851563,259.2579154968262,612.8659057617188]},{"page":349,"text":" Deliberate.","rect":[133.1999969482422,633.5502319335938,195.40122509002686,626.4661254882813]},{"page":349,"text":" Hasty.","rect":[133.1999969482422,649.0742797851563,177.04058361053468,640.2867431640625]},{"page":349,"text":" Covert.","rect":[133.1999969482422,660.5602416992188,180.94736766815186,653.6364135742188]},{"page":349,"text":"18-43. Each gap crossing type has a general list of conditions that help define the category. The planning","rect":[108.00376892089844,680.0391845703125,539.8586330413818,670.9310302734375]},{"page":349,"text":"requirements for each type of gap crossing are similar. However, the required degree of detail and necessary","rect":[108.00376892089844,691.5621337890625,539.9197292327881,682.4539794921875]},{"page":349,"text":"conditions for a high degree of success will vary based on the type and the unique features associated with a","rect":[108.00376892089844,703.0851440429688,540.1394319610596,693.9769897460938]},{"page":349,"text":"crossing mission. In all cases, the ability to conduct any type of crossing begins by providing a crossing force","rect":[108.00376892089844,714.5480346679688,540.1610994415283,705.4398803710938]},{"page":349,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":349,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":349,"text":"18-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":350,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":350,"text":"with the necessary gap-crossing means and control elements and identifying those requirements early during","rect":[90.0,83.51434326171875,522.0263576507568,74.40616607666016]},{"page":350,"text":"planning.","rect":[90.00003814697266,94.97723388671875,127.54497814178467,85.86905670166016]},{"page":350,"text":"Note. A retrograde gap crossing is not a fourth type of gap crossing. In reality, it is merely a","rect":[115.2003402709961,118.19427490234375,504.03307820129398,109.08609771728516]},{"page":350,"text":"variation of a deliberate or hasty gap crossing, and it is typically performed as a deliberate gap","rect":[115.19999694824219,129.71429443359376,503.9823513031006,120.60611724853516]},{"page":350,"text":"crossing. It may be performed with or without enemy pressure on the crossing force. Clearly, it is","rect":[115.19999694824219,141.2373046875,503.95268130111699,132.12911987304688]},{"page":350,"text":"more difficult when performed under enemy pressure.","rect":[115.19999694824219,152.76031494140626,331.54192638397219,143.65213012695313]},{"page":350,"text":"Deliberate Gap Crossing","rect":[72.0,192.08067321777345,188.0618839263916,182.27552795410157]},{"page":350,"text":"18-44. A deliberate crossing is the crossing of an inland water obstacle or other gap that requires extensive","rect":[90.0,209.63427734375,522.0044832305908,200.52609252929688]},{"page":350,"text":"planning and detailed preparations (ATP 3-90.4/MCTP 3-34A). A deliberate gap crossing is classified as wet","rect":[90.00000762939453,221.15728759765626,522.0203013381959,212.04910278320313]},{"page":350,"text":"or dry, and it is usually accomplished with one or more bridge companies in support of combat maneuver. It","rect":[89.97994995117188,232.62017822265626,522.0080332717896,223.51199340820313]},{"page":350,"text":"is normally accomplished when a hasty crossing is not feasible or has failed. Any deliberate crossing requires","rect":[89.97994995117188,244.1431884765625,522.0464007835388,235.03500366210938]},{"page":350,"text":"detailed reconnaissance, detailed planning, coordination of fire plans, extensive preparations and rehearsals,","rect":[89.97994995117188,255.6661376953125,521.9008741378784,246.55795288085938]},{"page":350,"text":"and significant engineer assets. While a BCT is capable of making a deliberate crossing, this type of crossing","rect":[89.97994995117188,267.1290283203125,522.0193386077881,258.0208435058594]},{"page":350,"text":"normally requires a higher headquarters to assist in planning and command and control since it generally","rect":[89.97997283935547,278.652099609375,521.9084377288818,269.5438537597656]},{"page":350,"text":"involves more than one BCT. Deliberate crossings can involve general and combat engineering elements.","rect":[89.9800033569336,290.175048828125,521.9793653488159,281.0668640136719]},{"page":350,"text":"Some additional considerations for conducting deliberate gap crossings include the—","rect":[89.97994995117188,301.637939453125,431.86237716674807,292.5297546386719]},{"page":350,"text":" Complexity and the assets required to accomplish the crossing.","rect":[115.19999694824219,315.1142883300781,385.1229200363159,306.006103515625]},{"page":350,"text":" Opposition from a defending enemy and obstacle severity.","rect":[115.19999694824219,328.6142883300781,367.0628614425659,319.506103515625]},{"page":350,"text":" Necessity to clear entry and exit crossing points of enemy forces.","rect":[115.19999694824219,342.1142883300781,393.87639904022219,333.006103515625]},{"page":350,"text":"18-45. Normally, deliberate crossings involve gaps that are greater than 65 feet (20 meters). A gap of this","rect":[90.00376892089844,359.6292419433594,522.0612323265076,350.52105712890627]},{"page":350,"text":"length limits the effectiveness of tactical bridging assets, and the gap will typically require other bridging","rect":[90.00379943847656,371.0921325683594,521.8718166351318,361.98394775390627]},{"page":350,"text":"assets. Crossing gaps of this magnitude normally require support bridging in the form of float bridging (wet-","rect":[90.00379943847656,382.6151123046875,521.9860742149353,373.5069274902344]},{"page":350,"text":"gap) or other types of standard bridging (dry-gap).","rect":[90.01382446289063,394.13812255859377,291.65032482147219,385.0299377441406]},{"page":350,"text":"Deliberate Wet-Gap Crossing","rect":[71.99786376953125,417.594970703125,193.15970420837403,408.6571350097656]},{"page":350,"text":"18-46. The deliberate wet-gap crossing is one that requires the use of rafting (non-bridging) and bridging","rect":[90.00379943847656,435.11993408203127,521.9610500335693,426.0117492675781]},{"page":350,"text":"assets. The use of assault craft (boats and helicopters), rafting, or ferries and the emplacement of bridging","rect":[89.9937973022461,446.6429138183594,521.9789333343506,437.53472900390627]},{"page":350,"text":"assets may occur sequentially or concurrently. The objective in deliberate wet-gap crossings is to project","rect":[89.9937515258789,458.1058044433594,521.9471812210084,448.98760986328127]},{"page":350,"text":"combat power to the exit bank of a river or other type of significant water obstacle at a faster rate than the","rect":[89.9937973022461,469.6288146972656,521.9473543243408,460.5206298828125]},{"page":350,"text":"enemy can concentrate forces for a counterattack. Typically, wet-gap crossings are one of the most difficult","rect":[89.9937973022461,481.15179443359377,522.0121226272584,472.0436096191406]},{"page":350,"text":"types. They generally require significant augmentation of mobility support assets.","rect":[89.9937515258789,492.61468505859377,416.91643810272219,483.5065002441406]},{"page":350,"text":"Deliberate Dry-Gap Crossing","rect":[71.99783325195313,516.131591796875,192.6185817718506,507.1937561035156]},{"page":350,"text":"18-47. Deliberate dry-gap crossings are usually determined by the strength of the enemy defense and the","rect":[89.9937515258789,533.6466064453125,521.9469270782471,524.5384521484375]},{"page":350,"text":"magnitude of the gap. These assets are labor intensive and expose personnel to enemy fire during","rect":[89.97370910644531,545.1094360351563,522.0117702484131,536.0012817382813]},{"page":350,"text":"construction, while providing stable gap-crossing support for continuous mobility.","rect":[89.97370910644531,556.6324462890625,419.3200635910034,547.5242919921875]},{"page":350,"text":"Hasty Gap Crossing","rect":[72.0,581.24072265625,166.70908546447755,571.435546875]},{"page":350,"text":"18-48. A hasty crossing is the crossing of an inland water obstacle or other gap using the crossing means","rect":[90.0,598.7343139648438,522.0074603538513,589.6261596679688]},{"page":350,"text":"on hand or those readily available and made without pausing for elaborate preparations (ATP 3-90.4/MCTP","rect":[89.98997497558594,610.25732421875,521.9722433013916,601.149169921875]},{"page":350,"text":"3-34A). Hasty gap crossings are usually focused on a combined arms activity to project combat power across","rect":[89.97993469238281,621.7802734375,522.0121600608826,612.6620483398438]},{"page":350,"text":"a terrain feature (wet or dry) that can be overcome by self-bridging assets within the BCT. These assets may","rect":[89.97993469238281,633.2431640625,522.0602931976318,624.135009765625]},{"page":350,"text":"be organic, provided to the BCT as augmentation, or found as expedient crossing materials within the","rect":[89.96984100341797,644.7661743164063,522.0249910430908,635.6580200195313]},{"page":350,"text":"assigned area. Typically, a hasty gap crossing is a gap that is under 20 meters (65 feet) or less in width. They","rect":[89.95980834960938,656.2891845703125,522.0102443695068,647.1810302734375]},{"page":350,"text":"are normally accomplished with tactical bridging assets.","rect":[89.96987915039063,667.7520751953125,314.59023571014407,658.6439208984375]},{"page":350,"text":"18-49. Hasty gap crossings are most often used when enemy resistance is weak, and the gap is not a severe","rect":[89.96987915039063,685.2770385742188,522.0407991485596,676.1688842773438]},{"page":350,"text":"obstacle. Hasty gap crossings also feature decentralized control at the BCT level and below, using a task-","rect":[89.96990203857422,696.800048828125,521.9301049766541,687.69189453125]},{"page":350,"text":"organized mobility augmentation company, organic assets, or expedient crossing means at multiple sites","rect":[89.95990753173828,708.262939453125,521.8770282249451,699.15478515625]},{"page":350,"text":"along a broad front. Due to the limited organic crossing assets, additional support from echelons above the","rect":[89.95989990234375,719.785888671875,521.9188509063721,710.677734375]},{"page":350,"text":"18-10","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":350,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":350,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":351,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":351,"text":"BCT is often necessary. That support is only available when those headquarters have taken purposeful action","rect":[108.0,83.51434326171875,540.0405178070068,74.40616607666016]},{"page":351,"text":"to position the assets at the right time and place and to integrate them with the maneuver force to make a","rect":[107.9999771118164,94.97723388671875,539.9842805938721,85.86905670166016]},{"page":351,"text":"hasty gap crossing feasible. Coordination for these assets must be made early in the planning phase. Some","rect":[107.9999771118164,106.500244140625,540.0633821563721,97.3920669555664]},{"page":351,"text":"additional considerations for conducting hasty gap crossings include the—","rect":[107.99996185302735,118.023193359375,406.3755302429199,108.9150161743164]},{"page":351,"text":" Size of the gaps in the maneuver area.","rect":[133.1999969482422,131.51434326171876,303.39776134490969,122.40616607666016]},{"page":351,"text":" Availability of existing bridges, fords, bypasses, or expedient crossing materials.","rect":[133.1999969482422,145.01434326171876,474.1617383956909,135.90615844726563]},{"page":351,"text":" Recovery of assets.","rect":[133.1999969482422,158.51434326171876,228.69970226287843,149.4161834716797]},{"page":351,"text":" Aviation (rotary-wing) asset availability.","rect":[133.1999969482422,172.01434326171876,314.4959363937378,162.90615844726563]},{"page":351,"text":"18-50. A hasty crossing is conducted in an effort to maintain the momentum of the maneuver force by","rect":[107.99375915527344,189.47918701171876,539.9298000335693,180.37100219726563]},{"page":351,"text":"quickly massing combat power on the far side of the gap with no intentional pause. This promotes speed,","rect":[107.9937973022461,201.002197265625,539.9306592941284,191.89401245117188]},{"page":351,"text":"facilitates surprise, and provides a continuation of maneuver momentum. The planning process is critical to","rect":[107.9937515258789,212.465087890625,540.0201320648193,203.35690307617188]},{"page":351,"text":"identify gap locations and their dimensions and request or allocate the necessary assets to ensure unimpeded","rect":[107.9937515258789,223.98809814453126,540.0269069671631,214.87991333007813]},{"page":351,"text":"movement.","rect":[107.9937515258789,233.48707580566407,152.73806285858155,227.40493774414063]},{"page":351,"text":"18-51. Hasty crossings are planned, organized, and executed much like a hasty breach. The unit must","rect":[107.9937515258789,252.9759521484375,539.9980235061646,243.86776733398438]},{"page":351,"text":"consider the integration of the crossing assets in its movement formation, redundancy in crossing means,","rect":[107.98371887207031,264.49896240234377,539.9938306808472,255.39077758789063]},{"page":351,"text":"traffic flow across the gap, and the recovery of the crossing assets. Units task-organize their force in a manner","rect":[107.98371887207031,276.02197265625,539.9699609336853,266.9137878417969]},{"page":351,"text":"that supports the overall mission and facilitates a successful gap crossing followed by a quick recovery. To","rect":[107.97372436523438,287.48480224609377,539.9649562835693,278.3766174316406]},{"page":351,"text":"accomplish gap crossing efficiently, bridging assets should be in a position within the maneuver formation","rect":[107.97371673583985,299.0078125,539.9880886077881,289.8996276855469]},{"page":351,"text":"where positive control can be maintained. This is an important consideration, as all gap-crossing equipment","rect":[107.97372436523438,310.53082275390627,539.9960703811646,301.4226379394531]},{"page":351,"text":"does not have the necessary communications means to maneuver effectively as maneuver formations.","rect":[107.97376251220703,321.99371337890627,539.9536695480347,312.8855285644531]},{"page":351,"text":"Additionally, some of the gap-crossing equipment is less maneuverable and slower than the combat vehicles","rect":[107.97376251220703,333.5166931152344,540.0363299827576,324.40850830078127]},{"page":351,"text":"support and it is also less survivable in some cases. This may slow down the movement speed for the","rect":[107.9637451171875,345.0396728515625,540.0018587188721,335.9314880371094]},{"page":351,"text":"maneuver elements. In spite of these challenges, proper planning and command and control can minimize","rect":[107.9637451171875,356.5025634765625,539.8735628204346,347.3943786621094]},{"page":351,"text":"these negative impacts.","rect":[107.9637451171875,368.02557373046877,201.00745677947999,358.9173889160156]},{"page":351,"text":"18-52. Two other considerations are the desirability for redundancy of crossing equipment and the","rect":[107.9637451171875,385.550537109375,540.0373201446533,376.4423522949219]},{"page":351,"text":"capability to rapidly recover the crossing means. Tactical bridging is designed with these considerations in","rect":[107.96376037597656,397.013427734375,539.8859157562256,387.9052429199219]},{"page":351,"text":"mind. Commanders should plan on the use of multiple crossing means, depending on the criticality of the","rect":[107.96376037597656,408.5364074707031,539.9730501251221,399.42822265625]},{"page":351,"text":"crossing and the time available. The terrain, transporter, and bridge maintenance, as well as crew training,","rect":[107.9637451171875,420.05938720703127,539.9333448410034,410.9512023925781]},{"page":351,"text":"rehearsals, and experience can impact bridge launch and recovery.","rect":[107.9637451171875,431.52227783203127,373.3755750656128,422.4140930175781]},{"page":351,"text":"18-53. The recovery of crossing assets and transition after the crossing is important for units to sustain their","rect":[107.9637451171875,449.0472717285156,540.0051782188416,439.9390869140625]},{"page":351,"text":"momentum. Typically, units can expect crossing assets to recover and join the maneuver force on the far side","rect":[107.97376251220703,460.5101318359375,540.0533723907471,451.3919372558594]},{"page":351,"text":"of the gap. The units have at least two options:","rect":[107.97376251220703,472.03314208984377,294.59128522491457,462.9249572753906]},{"page":351,"text":" The unit can halt movement on the far side of the gap and wait for the crossing asset to recover","rect":[133.1999969482422,485.45428466796877,540.0671289024353,476.3460998535156]},{"page":351,"text":"the bridge.","rect":[151.1999969482422,496.977294921875,194.0154676437378,487.8691101074219]},{"page":351,"text":" The unit can continue movement and leave an adequate security force during the recovery, which","rect":[133.1999969482422,510.47430419921877,540.0942897796631,501.3661193847656]},{"page":351,"text":"can also assist the crossing asset in rejoining the maneuver force.","rect":[151.1999969482422,521.9371948242188,411.45354747772219,512.8189697265625]},{"page":351,"text":"If the assets are intended to stay with the unit, consideration must be given to follow-on support or LOC","rect":[108.00377655029297,536.4561767578125,539.9710600318908,527.3480224609375]},{"page":351,"text":"bridging assets to ensure that support or follow-on forces can adequately continue to follow the maneuver","rect":[108.00384521484375,547.9791870117188,539.9621484336853,538.8710327148438]},{"page":351,"text":"force. The higher headquarters may direct the unit to keep its crossing assets in place for follow-on forces to","rect":[108.00385284423828,559.4420166015625,539.9610500335693,550.3338623046875]},{"page":351,"text":"use, which will degrade or eliminate that unit’s ability to cross any subsequent gaps unless it has been","rect":[107.99378967285156,570.965087890625,540.0151882171631,561.85693359375]},{"page":351,"text":"resourced with sufficient tactical bridging. If the higher headquarters intends for tactical bridging to remain","rect":[107.9937744140625,582.488037109375,539.9580593109131,573.3798828125]},{"page":351,"text":"in place, it must augment the unit with sufficient assets to accomplish this task while retaining sufficient","rect":[108.00379943847656,593.950927734375,540.0732798538209,584.8427734375]},{"page":351,"text":"tactical gap-crossing capability to facilitate continued maneuver and movement.","rect":[107.99378967285156,605.4739379882813,428.13665294647219,596.3657836914063]},{"page":351,"text":"18-54. Because a gap crossing constricts and splits the maneuver force at the crossing site, the plan must be","rect":[107.99378967285156,622.9989013671875,540.0060091094971,613.8907470703125]},{"page":351,"text":"flexible enough for the commanders or their designated representative to execute decisions based on","rect":[107.98377227783203,634.4617919921875,539.9360256195068,625.3536376953125]},{"page":351,"text":"acceptable opportunity and threat variances. The unit’s command post can assist the command group by","rect":[107.98377990722656,645.9848022460938,539.8597927093506,636.8766479492188]},{"page":351,"text":"controlling the execution of the crossing and maintaining a status of the location and operational readiness","rect":[107.97376251220703,657.5078125,539.9660174827576,648.399658203125]},{"page":351,"text":"of the crossing assets.","rect":[107.97376251220703,668.9706420898438,195.18786144256593,659.8624877929688]},{"page":351,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":351,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":351,"text":"18-11","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":352,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":352,"text":"Hasty Wet-Gap Crossing","rect":[72.0,83.51434326171875,174.2150173187256,74.57650756835938]},{"page":352,"text":"18-55. The depth and width of the wet gap, bank conditions, and the current velocity are major factors that","rect":[90.00593566894531,100.97918701171875,522.0924448928834,91.86099243164063]},{"page":352,"text":"impact the ability of a maneuver unit to conduct a hasty wet-gap crossing. These factors will determine if the","rect":[90.00593566894531,112.502197265625,522.1415071563721,103.3940200805664]},{"page":352,"text":"maneuver force can cross by fording, if expedient materials can be used, or if specific bridging assets are","rect":[90.00591278076172,124.02520751953125,521.9006013946533,114.91703033447266]},{"page":352,"text":"required. Identifying wet gaps early and deploying the required resources allow hasty crossings of known or","rect":[90.00591278076172,135.48809814453126,522.0459497032166,126.37992095947266]},{"page":352,"text":"anticipated gaps to occur.","rect":[90.00591278076172,147.0111083984375,192.23696422576905,137.90292358398438]},{"page":352,"text":"Hasty Dry-Gap Crossing","rect":[72.0099868774414,170.52801513671876,173.68393516540528,161.59017944335938]},{"page":352,"text":"18-56. An antivehicle ditch, crater, dry riverbed, partially blown bridge, or similar obstacle is normally","rect":[90.01593017578125,187.992919921875,522.0211696624756,178.88473510742188]},{"page":352,"text":"what maneuver forces encounter as a dry-gap crossing obstacle. Maneuver forces can use equipment to push","rect":[90.01592254638672,199.515869140625,522.0449733734131,190.40762329101563]},{"page":352,"text":"down the sides of ditches or fill in craters. Substantial fill material placed in the dry gaps allows the passage","rect":[90.01599884033203,211.03887939453126,522.0831575469971,201.93063354492188]},{"page":352,"text":"of combat tracked vehicles. The crossing site can be improved and maintained for wheeled traffic use by","rect":[90.01596069335938,222.50177001953126,521.9865627288818,213.39358520507813]},{"page":352,"text":"follow-on forces.","rect":[90.01596069335938,232.00074768066407,158.8804121017456,224.91659545898438]},{"page":352,"text":"In-Stride Gap Crossing","rect":[72.01001739501953,257.4815673828125,168.15895652770997,248.54373168945313]},{"page":352,"text":"18-57. The in-stride gap crossing is a variant of the hasty gap (wet or dry) crossing that consists of a rapid","rect":[90.00594329833985,275.006591796875,522.0873317718506,265.8984069824219]},{"page":352,"text":"gap-crossing adaptation conducted by forces organic to (or task-organized with) the attacking force. It","rect":[90.00592803955078,286.5295715332031,521.9592051467896,277.42138671875]},{"page":352,"text":"consists of preplanned, well-trained, and well-rehearsed gap-crossing battle drills and the use of the unit","rect":[89.99591827392578,297.992431640625,521.9972300491334,288.8842468261719]},{"page":352,"text":"SOPs. The in-stride gap crossing takes advantage of surprise and momentum to bridge or defeat gaps and","rect":[89.98588562011719,309.51544189453127,521.9780788421631,300.4072570800781]},{"page":352,"text":"relies on good and timely reconnaissance for its success as well. The force uses the in-stride gap crossing","rect":[89.99591064453125,321.0384521484375,522.0884304046631,311.9302673339844]},{"page":352,"text":"against weak defenders or very simple gaps and executes the battle drills on the move. Attacking maneuver","rect":[89.99589538574219,332.5013427734375,522.0259912071228,323.3931579589844]},{"page":352,"text":"forces generally move configured to be able to execute an in-stride gap crossing, except when a deliberate","rect":[89.99592590332031,344.02435302734377,521.9862337188721,334.9161682128906]},{"page":352,"text":"gap crossing is planned. In-stride gap crossings may occur when a gap is not the same as the unit planned or","rect":[89.99591827392578,355.5473327636719,521.9703271446228,346.43914794921877]},{"page":352,"text":"anticipated. To conduct an in-stride crossing, the unit must be well trained, have established SOPs, and be","rect":[89.99592590332031,367.0102233886719,522.1134920196533,357.90203857421877]},{"page":352,"text":"task-organized with the necessary tactical bridging assets and capabilities.","rect":[89.99593353271485,378.533203125,386.25908946990969,369.4250183105469]},{"page":352,"text":"18-58. Generally, the battalion is the principal unit to plan, coordinate, and control an in-stride gap crossing;","rect":[89.99593353271485,396.0581970214844,522.0242686233521,386.95001220703127]},{"page":352,"text":"but a company will normally conduct the actual crossing. The battalion will normally designate specific","rect":[89.99589538574219,407.52105712890627,521.9070100860596,398.4128723144531]},{"page":352,"text":"support forces, and it is responsible for synchronizing the breaching fundamentals as they apply to a gap","rect":[89.99589538574219,419.0440673828125,522.0601100921631,409.9358825683594]},{"page":352,"text":"crossing through detailed planning and well-rehearsed immediate action drills. (See paragraph 18-23 for","rect":[89.99589538574219,430.5671081542969,521.8979394493103,421.45892333984377]},{"page":352,"text":"breaching fundamentals.)","rect":[89.98576354980469,442.0299987792969,191.65668273544314,432.92181396484377]},{"page":352,"text":"18-59. The commander planning for an in-stride gap crossing must also plan for a transition to a deliberate","rect":[89.98576354980469,459.5549621582031,522.0362825469971,450.44677734375]},{"page":352,"text":"gap crossing should an in-stride gap crossing be unsuccessful. An unclear situation (enemy and exact gap","rect":[89.9657211303711,471.0780029296875,522.0312404632568,461.9698181152344]},{"page":352,"text":"dimensions and conditions) will make it necessary for several lead company-sized units to be capable of","rect":[89.9657211303711,482.5408935546875,521.9860131797791,473.4327087402344]},{"page":352,"text":"conducting an independent gap crossing. Accurate and timely reconnaissance of the gap (obstacle) and the","rect":[89.95565032958985,494.06390380859377,521.9198274688721,484.9557189941406]},{"page":352,"text":"enemy force that defend the gap set the conditions for properly focusing the location of the in-stride gap","rect":[89.94563293457031,505.52679443359377,521.9155178070068,496.4186096191406]},{"page":352,"text":"crossing.","rect":[89.94580078125,517.0496826171875,125.80439281463623,507.9414978027344]},{"page":352,"text":"Covert Gap Crossing","rect":[72.0,541.5806884765625,171.51172828674317,531.7755126953125]},{"page":352,"text":"18-60. A covert crossing is a planned crossing of an inlandwater obstacle or other gapin which the crossing","rect":[90.0,559.13427734375,521.9692287445068,550.026123046875]},{"page":352,"text":"is intended to be undetected (ATP 3-90.4/MCTP 3-34A). The primary purpose of the covert crossing is to","rect":[90.0,570.59716796875,522.0063381195068,561.489013671875]},{"page":352,"text":"facilitate undetected infiltration of the far side of a gap. Battalion and smaller forces normally conduct a","rect":[89.98994445800781,582.1201782226563,521.9611482696533,573.0120239257813]},{"page":352,"text":"covert crossing. It is used when surprise is essential to infiltrate over a gap and when limited visibility and","rect":[89.98994445800781,593.6431884765625,521.9670925140381,584.5350341796875]},{"page":352,"text":"terrain present the opportunity to reduce or defeat the enemy obstacle (gap) without being seen. Through","rect":[89.98994445800781,605.1060791015625,521.9910793304443,595.9979248046875]},{"page":352,"text":"surprise, the commander conceals capabilities and intentions and creates the opportunity to position support","rect":[89.98994445800781,616.6290283203125,522.0109019241334,607.5208740234375]},{"page":352,"text":"and assault forces to strike the enemy unaware or unprepared. Like a covert breach, it is normally conducted","rect":[89.98999786376953,628.0919189453125,522.0153713226318,618.9837646484375]},{"page":352,"text":"by a battalion or smaller unit (dismounted or in wheeled vehicles). A BCT is typically too large to maintain","rect":[89.98998260498047,639.6149291992188,521.9512233734131,630.5067749023438]},{"page":352,"text":"the level of stealth necessary to conduct a successful covert gap crossing. A covert gap crossing requires a","rect":[89.97994995117188,651.137939453125,522.0444002227783,642.02978515625]},{"page":352,"text":"level of detailed planning, information collection, and command and control that is normally beyond the","rect":[89.98001098632813,662.600830078125,521.9812288360596,653.49267578125]},{"page":352,"text":"capability of a company.","rect":[89.98001098632813,674.123779296875,188.9044599533081,665.015625]},{"page":352,"text":"18-61. A covert gap crossing can be used in a variety of situations to support various missions but should","rect":[89.98001098632813,691.6488037109375,521.9938259124756,682.5406494140625]},{"page":352,"text":"be considered (as opposed to deliberate or hasty) only when there is a need or opportunity to cross a gap","rect":[89.9800033569336,703.1116943359375,521.9599514007568,694.0035400390625]},{"page":352,"text":"without being discovered. The covert crossing can be used to cross forces that will support a follow-on","rect":[89.9799575805664,714.6346435546875,522.0022487640381,705.5264892578125]},{"page":352,"text":"18-12","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":352,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":352,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":353,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":353,"text":"crossing of a larger or similar size element; however, it is planned and conducted as a separate mission. If ","rect":[108.0,83.51434326171875,542.4593458175659,74.40616607666016]},{"page":353,"text":"conducted as a mission that does not involve crossing additional elements, planning and consideration should","rect":[108.0,94.97723388671875,539.9338283538818,85.86905670166016]},{"page":353,"text":"be given to the recovery of the crossing assets. If the crossing is a precursor to a larger, follow-on crossing,","rect":[108.0,106.500244140625,539.9802198410034,97.3920669555664]},{"page":353,"text":"recovery of the crossing assets may be accomplished as part of that follow-on task. If the covert gap crossing","rect":[107.99996185302735,118.023193359375,540.0263576507568,108.9150161743164]},{"page":353,"text":"is being used as a precursor to a deliberate crossing and is detected by the enemy, the higher headquarters","rect":[107.98992919921875,129.486083984375,539.9862811546326,120.3779067993164]},{"page":353,"text":"may need to reevaluate other potential crossing sites before conducting the deliberate crossing. A contingency","rect":[107.98994445800781,141.00909423828126,540.1071071624756,131.90090942382813]},{"page":353,"text":"plan must always be included in the planning of covert missions in the event that the mission is compromised.","rect":[107.98994445800781,152.5321044921875,540.0992994308472,143.42391967773438]},{"page":353,"text":"A covert crossing should not be confused with the assault phase of a deliberate gap crossing.","rect":[107.98994445800781,163.9949951171875,478.4855909347534,154.88681030273438]},{"page":353,"text":"Gap Fundamentals","rect":[90.0,188.5787353515625,180.11394748306274,178.79554748535157]},{"page":353,"text":"18-62.","rect":[108.0,204.11021423339845,133.84157848358155,197.2264862060547]},{"page":353,"text":"Successful ","rect":[142.55897521972657,205.0,187.84336376190186,197.04611206054688]},{"page":353,"text":"gap ","rect":[193.1940460205078,206.154296875,210.1589002609253,199.0]},{"page":353,"text":"crossing ","rect":[215.50958251953126,206.154296875,251.3140516281128,197.04611206054688]},{"page":353,"text":"is ","rect":[256.66473388671877,205.0,265.7689161300659,197.04611206054688]},{"page":353,"text":"characterized ","rect":[271.1195983886719,205.0,326.90398693084719,197.04611206054688]},{"page":353,"text":"by ","rect":[332.2546691894531,206.154296875,344.7796583175659,197.04611206054688]},{"page":353,"text":"applying ","rect":[350.13037109375,206.154296875,387.5540723800659,197.04611206054688]},{"page":353,"text":"gap-crossing ","rect":[392.9047546386719,206.154296875,446.49465465545657,197.04611206054688]},{"page":353,"text":"fundamentals. ","rect":[451.8453369140625,205.0,510.7428846359253,197.04611206054688]},{"page":353,"text":"These","rect":[516.0935668945313,205.0,539.9822053985596,197.04611206054688]},{"page":353,"text":"fundamentals are applied when a gap is encountered in the operational area. These fundamentals are—","rect":[107.9899673461914,217.6171875,518.6296195983887,208.50900268554688]},{"page":353,"text":" Surprise.","rect":[133.1999969482422,231.0942840576172,187.06157970428468,222.00613403320313]},{"page":353,"text":" Extensive preparation (less for hasty crossing).","rect":[133.1999969482422,244.61431884765626,338.92278575897219,235.50613403320313]},{"page":353,"text":" Flexible planning.","rect":[133.1999969482422,258.11431884765627,223.96422863006593,249.00613403320313]},{"page":353,"text":" Traffic management.","rect":[133.1999969482422,271.61431884765627,235.06141185760499,262.5061340332031]},{"page":353,"text":" Organization.","rect":[133.1999969482422,285.1142883300781,205.96430492401124,276.006103515625]},{"page":353,"text":" Speed.","rect":[133.1999969482422,298.59423828125,178.18487071990968,289.506103515625]},{"page":353,"text":"See ATP 3-90.4/MCTP 3-34A for more information on gap fundamentals.","rect":[108.00376892089844,313.1332702636719,405.42742443084719,304.02508544921877]},{"page":353,"text":"Task Organization for Gap Crossing","rect":[90.0,337.76068115234377,262.28931617736819,327.95556640625]},{"page":353,"text":"18-63. Units use the same organic command and control nodes for gap crossings as they do for other","rect":[108.0,355.2543029785156,540.0110986289978,346.1461181640625]},{"page":353,"text":"missions. These nodes, however, take on additional functions in deliberate gap crossings. For this reason,","rect":[108.0,366.7773132324219,539.9518995285034,357.66912841796877]},{"page":353,"text":"commanders specify which nodes and staff positions have specific planning and control duties for the","rect":[108.0,378.30029296875,540.0501375274658,369.1921081542969]},{"page":353,"text":"crossing. Typically, units designate a crossing area commander, engineer, and headquarters to focus","rect":[108.0,389.76318359375,540.0545184593201,380.6549987792969]},{"page":353,"text":"specifically on the efforts needed to cross the gap. Additional engineer units may also provide additional","rect":[108.00000762939453,401.28619384765627,540.0734629592896,392.1780090332031]},{"page":353,"text":"command and control nodes depending on the size and complexity of the gap crossing. This may require","rect":[108.0,412.8091735839844,539.9670686798096,403.70098876953127]},{"page":353,"text":"some temporary co-location of headquarters cells (or individual augmentation) and an increase in","rect":[108.0,424.2720642089844,539.9152736663818,415.16387939453127]},{"page":353,"text":"communication means. Units conducting a deliberate gap crossing organize into the following groups:","rect":[107.98998260498047,435.7950744628906,517.1487193069459,426.6868896484375]},{"page":353,"text":" Assault force.","rect":[133.1999969482422,447.2502746582031,206.80498790740968,440.1661376953125]},{"page":353,"text":" Assured mobility units.","rect":[133.1999969482422,462.7743225097656,244.84792613983155,453.6661376953125]},{"page":353,"text":" Bridgehead force.","rect":[133.1999969482422,476.2743225097656,222.8239393234253,467.1661376953125]},{"page":353,"text":" Breakout forces.","rect":[133.1999969482422,487.7502746582031,217.30495738983155,480.6661376953125]},{"page":353,"text":"Assault Force","rect":[89.99783325195313,511.20709228515627,147.55370808410644,504.2933044433594]},{"page":353,"text":"18-64. Assault forces seize the far side objective to eliminate direct fire on the crossing sites. Assault forces","rect":[108.00377655029297,530.74609375,540.0872943382263,521.6278686523438]},{"page":353,"text":"may cross by any means to include rubber pneumatic boats, air assault, or the use of civilian boats if available.","rect":[108.00377655029297,542.2691040039063,540.0601758956909,533.1609497070313]},{"page":353,"text":"The assault force may also be the unit that first secured terrain on the near side and identified if existing","rect":[108.00376892089844,553.7319946289063,540.0461330413818,544.6238403320313]},{"page":353,"text":"bridges were operational and where enemy forces are fighting or defending. The assault force normally","rect":[108.00376892089844,565.2550048828125,539.8939723968506,556.1468505859375]},{"page":353,"text":"crosses in waves, as sufficient boats are seldom available to carry the entire force across at once. It is a very","rect":[108.00376892089844,576.7779541015625,540.0104274749756,567.6697998046875]},{"page":353,"text":"complex operation, requiring synchronization, training and extensive rehearsals.","rect":[108.00376892089844,588.2408447265625,429.04571056365969,579.1326904296875]},{"page":353,"text":"Assured Mobility","rect":[90.00784301757813,611.7578125,160.28110981750488,602.8199462890625]},{"page":353,"text":"18-65. Mobility support forces (such as combat engineer companies, multi role bridge companies, and","rect":[108.00376892089844,629.2827758789063,539.9951686859131,620.1746215820313]},{"page":353,"text":"military police units) provide crossing means, traffic control, and other critical tasks supporting the crossing","rect":[107.99374389648438,640.7456665039063,540.0822658538818,631.6375122070313]},{"page":353,"text":"site. These supporting units are task-organized to perform specific tasks and are controlled using specified","rect":[107.9937515258789,652.2686767578125,540.0101222991943,643.1605224609375]},{"page":353,"text":"procedures that are clear, simple, and rehearsed by all elements to ensure responsive support of the plan and","rect":[107.9937515258789,663.7916259765625,540.0229396820068,654.6834716796875]},{"page":353,"text":"unity of command and effort.","rect":[107.9937515258789,675.2545166015625,225.45019054412843,666.1463623046875]},{"page":353,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":353,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":353,"text":"18-13","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":354,"text":"Chapter 18","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":354,"text":"Bridgehead Force","rect":[72.0,83.51434326171875,146.76821614074707,74.57650756835938]},{"page":354,"text":"18-66. A bridgehead force is a force that assaults across a gap, after the crossing is established, to secure","rect":[89.99592590332031,100.97918701171875,522.0483675079346,91.87100982666016]},{"page":354,"text":"the enemy side (the bridgehead) to allow the buildup and passage of a breakout force during gap crossing","rect":[89.98591613769531,112.502197265625,522.0228786468506,103.3940200805664]},{"page":354,"text":"(ATP 3-90.4/MCTP 3-34A). The bridgehead is an area on the enemy side of the linear obstacle that is large","rect":[89.98591613769531,124.02520751953125,522.0373811798096,114.91703033447266]},{"page":354,"text":"enough to accommodate the majority of the crossing force, has adequate terrain to permit defense of the","rect":[89.96587371826172,135.48809814453126,521.9836092071533,126.36990356445313]},{"page":354,"text":"crossing sites, provides security of crossing forces from enemy direct fire, and provides a base for continuing","rect":[89.96587371826172,147.0111083984375,521.9688014984131,137.90292358398438]},{"page":354,"text":"the attack (ATP 3-90.4/MCTP 3-34A). The bridgehead line is the limit of the objective area in the","rect":[89.96589660644531,158.5340576171875,521.9030428009033,149.41586303710938]},{"page":354,"text":"development of the bridgehead (ATP 3-90.4/MCTP 3-34A).","rect":[89.95580291748047,169.9969482421875,331.0670118331909,160.88876342773438]},{"page":354,"text":"Breakout Force","rect":[71.94981384277344,191.48988342285157,137.2381258087158,184.57608032226563]},{"page":354,"text":"18-67. Breakout forces attack to seize objectives beyond the bridgehead as a continuation of the offense.","rect":[89.94573974609375,211.02886962890626,521.9943799972534,201.91067504882813]},{"page":354,"text":"(See ATP 3-90.4/MCTP 3-34A for more information on gap organization.)","rect":[89.94573974609375,222.49176025390626,390.14494872665406,213.38357543945313]},{"page":354,"text":"Gap Crossing Planning","rect":[72.0,247.10069274902345,181.45740699768067,237.29554748535157]},{"page":354,"text":"18-68. The discussion on planning mobility applies to gap crossing in ATP 3-90.4/MCTP 3-34A; however,","rect":[90.0,264.654296875,522.0402784347534,255.54611206054688]},{"page":354,"text":"force allocation against enemy units has an added dimension of time that is affected by the crossing rate.","rect":[89.99992370605469,276.1171875,521.9661207199097,267.0090026855469]},{"page":354,"text":"Friendly forces can only arrive at the crossing site at the rate at which they can cross the gap. This rate will","rect":[89.99992370605469,287.6401672363281,522.0212779006959,278.531982421875]},{"page":354,"text":"change at various times throughout the crossing. The rate at which combat forces need to cross will directly","rect":[89.99992370605469,299.1631774902344,521.9050197601318,290.05499267578127]},{"page":354,"text":"affect the number of crossing sites.","rect":[89.99992370605469,310.6260681152344,229.9001111984253,301.51788330078127]},{"page":354,"text":"18-69. A major control mechanism category is graphic control measures. The unit uses graphic control","rect":[89.99992370605469,328.1510314941406,522.0491709671021,319.0328369140625]},{"page":354,"text":"measures to delineate areas of responsibility for subordinates and to ease traffic control. (See ATP 3-90.4/","rect":[89.99992370605469,339.6740417480469,522.0723032913209,330.56585693359377]},{"page":354,"text":"MCTP 3-34A for more information on graphic control measures for a gap crossing.)","rect":[89.9798583984375,351.13690185546877,427.4634912071228,342.0287170410156]},{"page":354,"text":"Gap Crossing Execution","rect":[72.0,375.7406921386719,186.22823179626466,365.9355773925781]},{"page":354,"text":"18-70. A deliberate river crossing is costly in terms of manpower, equipment, and time. Generally, units","rect":[90.0,393.2943115234375,521.9973285179138,384.1861267089844]},{"page":354,"text":"conduct it against a well-organized defense when a hasty river crossing is not possible or when one has failed.","rect":[90.0,404.7572021484375,522.0034132003784,395.6490173339844]},{"page":354,"text":"A deliberate river crossing requires the concentration of combat power on a narrow front, capitalizing on the","rect":[90.0,416.2801818847656,522.1432161407471,407.1719970703125]},{"page":354,"text":"element of surprise.","rect":[90.0,427.78314208984377,169.1860761642456,418.69500732421877]},{"page":354,"text":"18-71. A division or corps deliberate river crossing is an operation conducted as part of an offensive","rect":[90.0,445.26806640625,522.0634431915283,436.1598815917969]},{"page":354,"text":"operation. A division is normally the smallest organization that can conduct a deliberate wet-gap crossing. It","rect":[89.9999771118164,456.7910461425781,522.0794444046021,447.682861328125]},{"page":354,"text":"is usually an implied task in a larger mission given by the corps. A gap crossing is usually not the final","rect":[89.99996185302735,468.3140563964844,521.9894175491334,459.20587158203127]},{"page":354,"text":"objective; however, units must quickly cross a river and rapidly secure the bridgehead line to support follow-","rect":[89.99996185302735,479.77691650390627,522.0022485313416,470.6587219238281]},{"page":354,"text":"on offensive action against the enemy. The enemy will normally use the gap as a tactical obstacle system to","rect":[90.0300064086914,491.2999267578125,521.9973049163818,482.1917419433594]},{"page":354,"text":"slow and gain positional advantage against the division advance. The intent of the division is to maintain its","rect":[90.0300064086914,502.7628173828125,522.0232074241638,493.6546325683594]},{"page":354,"text":"momentum through the crossing.","rect":[90.0300064086914,514.2857666015625,222.25796031951905,505.1775817871094]},{"page":354,"text":"18-72. A deliberate wet-gap crossing has six phases. They are distinct phases for planning, but there is no","rect":[90.0300064086914,531.810791015625,522.0173244476318,522.70263671875]},{"page":354,"text":"pause between them in execution. See table 18-3 for the phases.","rect":[90.0300064086914,543.253662109375,345.50994396209719,534.16552734375]},{"page":354,"text":"Table 18-3. Deliberate wet-gap crossing phases","rect":[184.48854064941407,560.7886352539063,409.6499776763916,551.4900512695313]},{"page":354,"text":"18-14","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":354,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":354,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":355,"text":"Mobility","rect":[505.97998046875,46.34102249145508,540.0179770507813,38.016021728515628]},{"page":355,"text":"CLEAR","rect":[90.0,201.52804565429688,124.98491764068604,193.23605346679688]},{"page":355,"text":"18-73. Clear is both a tactical mobility task and a mobility task. The mobility task involves the total","rect":[108.0,221.45428466796876,540.0093150100709,212.34609985351563]},{"page":355,"text":"elimination of an obstacle that is usually performed by follow-on engineers and explosive ordnance disposal","rect":[107.98994445800781,232.91717529296876,539.9531626663209,223.80899047851563]},{"page":355,"text":"units. Itis not normally performedunder the threat of direct or indirect fire. Clearing is conducted to eliminate","rect":[107.98992919921875,244.440185546875,539.9792757110596,235.33200073242188]},{"page":355,"text":"tactical and protective obstacles affecting the operational area. Units may order clearing to facilitate","rect":[107.99993896484375,255.963134765625,539.9491243438721,246.85494995117188]},{"page":355,"text":"movement within an assigned area based on the mission variables. They may also order a critical route or","rect":[107.99993896484375,267.426025390625,539.9440209922791,258.3178405761719]},{"page":355,"text":"area cleared of obstacles. The task is conducted as a single mission to open or reopen routes not under","rect":[107.99993896484375,278.94903564453127,539.9235131797791,269.8408508300781]},{"page":355,"text":"persistent surveillance or it may be conducted on a recurring basis in support of movement along routes here","rect":[107.99993896484375,290.4720458984375,539.9519319610596,281.3638610839844]},{"page":355,"text":"a sustained threat exists along critical routes. (See ATP 3-90.4/MCTP 3-34A for more information on","rect":[107.99993896484375,301.9349365234375,540.0011501312256,292.8267517089844]},{"page":355,"text":"clearing.)","rect":[107.98999786376953,313.45794677734377,146.06598449325564,304.3497009277344]},{"page":355,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":355,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":355,"text":"18-15","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":356,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":357,"text":"Chapter 19","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":357,"text":"Tactical Deception","rect":[244.32000732421876,153.91989135742188,385.6660889320374,139.3096466064453]},{"page":357,"text":"This chapter addresses those considerations unique to tactical deception operations. It","rect":[126.0,188.75872802734376,504.04154509735107,178.79986572265626]},{"page":357,"text":"provides an overview of tactical deception, principles, types, means, and variations. It","rect":[126.0,201.4405975341797,504.0863754196167,191.45977783203126]},{"page":357,"text":"then discusses tactical deception planning, tactical deception in offensive and","rect":[126.0000228881836,214.10057067871095,504.01307106018069,204.1197509765625]},{"page":357,"text":"defensive operations, and risk.","rect":[126.0000228881836,226.738525390625,260.1020860671997,216.7796630859375]},{"page":357,"text":"OVERVIEW OF DECEPTION","rect":[90.0,252.0757293701172,278.9424976577759,242.41554260253907]},{"page":357,"text":"19-1. As a principle of war surprise is a combat multiplier that amplifies the effects of the other principles","rect":[108.0,272.3742370605469,540.0110614280701,263.2861022949219]},{"page":357,"text":"of war. Its effective use allows friendly units to strike at a time and place or in a manner that the enemy is","rect":[108.0,283.857177734375,539.9239642601013,274.7489929199219]},{"page":357,"text":"unprepared for, which induces shock and causes hesitation. Every echelon works to achieve surprise in an","rect":[108.0,295.3801574707031,539.9728908538818,286.27197265625]},{"page":357,"text":"operation and only by multiple echelons working together is surprise achieved.","rect":[108.0,306.9031677246094,423.70330333709719,297.79498291015627]},{"page":357,"text":"19-2. The easiest way to achieve surprise is to use deception. Units throughout history have used deception","rect":[108.0,324.3680419921875,539.9683132171631,315.2598571777344]},{"page":357,"text":"to their advantage. It is an effective way to cause the enemy to dissipate their efforts and resources. Deception","rect":[108.0,335.8910217285156,539.9752101898193,326.7828369140625]},{"page":357,"text":"enhances the conditions that allow friendly units to concentrate forces at decisive times and locations.","rect":[108.0,347.4140319824219,540.0322217941284,338.30584716796877]},{"page":357,"text":"Executing tactical deception comes with costs. These costs include time, material, and risk. However, history","rect":[108.0,358.8769226074219,539.9662380218506,349.76873779296877]},{"page":357,"text":"shows that executing deception at any scale and echelon is almost always worth the costs.","rect":[108.0,370.39990234375,467.0867872238159,361.2917175292969]},{"page":357,"text":"19-3. The enemy commander is the focus of tactical deception, but the enemy can delegate command","rect":[108.01001739501953,387.9248962402344,540.0106105804443,378.81671142578127]},{"page":357,"text":"authority to an alternate decision maker. This means that someone other than the commander needs to be","rect":[108.01001739501953,399.38775634765627,540.0342073516846,390.2795715332031]},{"page":357,"text":"deceived. Therefore, this chapter will refer to the enemy decision maker or commander as the deception","rect":[108.01001739501953,410.9107666015625,540.0173854827881,401.8025817871094]},{"page":357,"text":"target. The deception target is the adversary decision maker with the authority to make the decision that will","rect":[108.01001739501953,422.43377685546877,539.9859995803834,413.3255920410156]},{"page":357,"text":"achieve the deception objective (JP 3-13.4).","rect":[108.01001739501953,433.8966369628906,283.24480724334719,424.7784423828125]},{"page":357,"text":"19-4. Well planned and executed deception, not luck, achieves surprise and its benefits—in both the offense","rect":[107.99999237060547,451.4015808105469,540.0763826446533,442.3134460449219]},{"page":357,"text":"and defense. Deception can be as simple as using camouflage to conceal friendly forces’ locations,","rect":[107.99996185302735,462.94464111328127,540.0480909347534,453.8364562988281]},{"page":357,"text":"capabilities, or intent. It could be the use of decoys to create false data for the deception target to deal with.","rect":[107.99996185302735,474.407470703125,540.0423536300659,465.2992858886719]},{"page":357,"text":"Or it could be as complicated as a multi-phase and echelon operation that works in accordance to a larger","rect":[107.99996185302735,485.93048095703127,539.9833276329041,476.8222961425781]},{"page":357,"text":"deception operation. To understand this better, there are two types of deception—military deception and","rect":[107.98992919921875,497.4534912109375,539.9542140960693,488.3453063964844]},{"page":357,"text":"tactical deception.","rect":[107.98994445800781,508.89630126953127,180.74717235565186,499.80816650390627]},{"page":357,"text":"MILITARY DECEPTION","rect":[90.0,532.2127075195313,202.5718698501587,524.135986328125]},{"page":357,"text":"19-5. Military deception is actions executed to deliberately mislead adversary military, paramilitary, or","rect":[108.0,552.17431640625,539.9542138633728,543.066162109375]},{"page":357,"text":"violent extremist organization decision makers, thereby causing the adversary to take specific actions (or","rect":[107.97997283935547,563.63720703125,539.9222314414978,554.529052734375]},{"page":357,"text":"inactions) that will contribute to the accomplishment of the friendly mission. (JP 3-13.4). Military deception","rect":[107.97996520996094,575.16015625,540.0023097991943,566.052001953125]},{"page":357,"text":"is typically executed at the combatant command level and requires planning, approval, and execution to","rect":[107.96995544433594,586.6831665039063,539.9639797210693,577.5750122070313]},{"page":357,"text":"adhere to theater-level instructions and AR 525-21. Additionally, information pertaining to tactical deception","rect":[107.96995544433594,598.1460571289063,540.0053005218506,589.0379028320313]},{"page":357,"text":"(TAC-D) executed in support of a military deception, to include operations, training, and exercises are","rect":[107.96991729736328,609.6690673828125,540.0062532501221,600.5609130859375]},{"page":357,"text":"generally classified at the Secret or higher level. The rest of this chapter is focused on tactical deception and","rect":[107.95989990234375,621.1920776367188,539.9850978851318,612.0839233398438]},{"page":357,"text":"the principles, types, means, and variations used. (See FM 3-13.4 for more information and details on military","rect":[107.95989990234375,632.6549072265625,539.9471340179443,623.5467529296875]},{"page":357,"text":"deception planning.)","rect":[107.95990753173828,644.177978515625,190.13393188095095,635.06982421875]},{"page":357,"text":"TACTICAL DECEPTION","rect":[90.0,667.5126953125,202.39187717437745,659.4359741210938]},{"page":357,"text":"19-6. Tactical deception concepts do not tie into an overall military deception operation. Units must","rect":[108.0,687.4743041992188,540.0263438186646,678.3661499023438]},{"page":357,"text":"understand that when executing TAC-D, they are not executing military deception at the tactical level.","rect":[108.0,698.9371948242188,540.0423536300659,689.8290405273438]},{"page":357,"text":"Tactical deception is a friendly activity that causes enemy commanders to take action or cause inaction","rect":[108.0,710.460205078125,540.0476217193603,701.5123291015625]},{"page":357,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":357,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":357,"text":"19-1","rect":[504.00299072265627,754.18798828125,521.9580405273438,747.6090087890625]},{"page":358,"text":"Chapter 19","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":358,"text":"detrimental to their objectives. Tactical deception operations are designed to support the commander’s plan","rect":[90.0,83.51434326171875,522.0595607757568,74.40616607666016]},{"page":358,"text":"by enhancing the probability of mission success. It allows units to create windows of opportunity by causing","rect":[90.0,94.97723388671875,522.0313625335693,85.86905670166016]},{"page":358,"text":"the target to react or falsely interpret friendly operations. The purpose of TAC-D is to—","rect":[90.00003814697266,106.500244140625,442.4435234069824,97.3920669555664]},{"page":358,"text":" Gain the initiative.","rect":[115.19999694824219,117.98030853271485,207.94520092010499,110.88614654541016]},{"page":358,"text":" Reduce overall operational risk.","rect":[115.19999694824219,133.4742889404297,260.9789991378784,124.38614654541016]},{"page":358,"text":" Preserve combat power.","rect":[115.19999694824219,146.9742889404297,229.59138011932374,137.88613891601563]},{"page":358,"text":"19-7. Properly planned and executed deception operations will make it possible for units to “hide the real”","rect":[89.9937515258789,164.519287109375,521.9688386993408,155.41110229492188]},{"page":358,"text":"and “display the false.” Units use all available types, means, and variations of tactical deception to conceal","rect":[89.99374389648438,175.982177734375,521.9178843460084,166.87399291992188]},{"page":358,"text":"friendly locations, capability, or intent until a time and place of the friendly commander’s choosing.","rect":[89.9937515258789,187.50518798828126,489.5793409347534,178.39700317382813]},{"page":358,"text":"19-8. TAC-D by itself is never decisive, although it may be a main effort at some point during the operation.","rect":[89.9937515258789,205.0301513671875,522.0469923019409,195.92196655273438]},{"page":358,"text":"This distinguishes TAC-D from offensive, defensive, or stability operations and solidifies it as an enabling","rect":[89.9937515258789,216.4930419921875,521.9691066741943,207.38485717773438]},{"page":358,"text":"operation. As with all enabling operations, units use TAC-D operations to complement current operations;","rect":[89.9937515258789,228.01605224609376,521.9980845413209,218.90786743164063]},{"page":358,"text":"transition between phases; transition between offense, defense, or stability; or set conditions for future","rect":[89.9937515258789,239.47894287109376,521.9907503204346,230.37075805664063]},{"page":358,"text":"operations.","rect":[89.9937515258789,250.98191833496095,134.19799327850343,241.89376831054688]},{"page":358,"text":"19-9. Tactical deception is an effective way to cause the enemy to squander time and resources on irrelevant","rect":[89.9937515258789,268.51690673828127,522.0181651077271,259.4087219238281]},{"page":358,"text":"objectives. Leaders conduct TAC-D at every echelon with either the resources they have or with assistance","rect":[89.9937515258789,279.979736328125,522.0080843048096,270.8615417480469]},{"page":358,"text":"from their higher echelon. Integrating deception between echelons can be a useful tool in altering how the","rect":[89.9937515258789,291.50274658203127,522.0560579376221,282.3945617675781]},{"page":358,"text":"enemy views, analyzes, decides, and acts in response to friendly operations.","rect":[89.98370361328125,303.0257568359375,393.25518321990969,293.9175720214844]},{"page":358,"text":"19-10. If the deception effect would affect the friendly force scheme of maneuver outside the echelon’s","rect":[89.98373413085938,320.4906005859375,521.9823749046326,311.3824157714844]},{"page":358,"text":"assigned area, it needs to be approved by the commander two echelons above the executing unit. For example,","rect":[89.97371673583985,332.01361083984377,521.9587354660034,322.9054260253906]},{"page":358,"text":"by using decoys in the defense to make friendly forces look three times bigger than it is and cause the enemy","rect":[89.97371673583985,343.53662109375,521.9600124359131,334.4284362792969]},{"page":358,"text":"to attack elsewhere needs to be coordinated and approved by higher echelon commanders. If a unit is directly","rect":[89.97370147705078,354.99951171875,521.9046535491943,345.8913269042969]},{"page":358,"text":"told to execute a deception action by their higher headquarters, the assumption is the higher headquarters has","rect":[89.97370910644531,366.52252197265627,522.0298602561951,357.4143371582031]},{"page":358,"text":"already received approval for that order.","rect":[89.97370910644531,378.0455322265625,251.05630016326905,368.9373474121094]},{"page":358,"text":"19-11. TAC-D is a commander driven activity that is structured around principles, types, means, and","rect":[89.97370910644531,395.5103759765625,521.9349269866943,386.4021911621094]},{"page":358,"text":"variations used to set favorable conditions to achieve friendly objectives. Commanders decide the location","rect":[89.97372436523438,407.03338623046877,521.8860988616943,397.9151916503906]},{"page":358,"text":"and time to employ deception in support of operations. The principles of tactical deception provide","rect":[89.97370910644531,418.5563659667969,522.0409212188721,409.44818115234377]},{"page":358,"text":"subordinates fundamental guidance during the planning of all tactical deception operations. The desired effect","rect":[89.97370910644531,430.01922607421877,521.9939951858521,420.9110412597656]},{"page":358,"text":"describes the level of uncertainty that the friendly commander wants to achieve against an enemy decision","rect":[89.97370910644531,441.542236328125,521.9667873382568,432.4340515136719]},{"page":358,"text":"maker. The means are the tools that friendly commanders use to accomplish tactical deception. Typically,","rect":[89.97370910644531,453.06524658203127,521.8992261886597,443.9570617675781]},{"page":358,"text":"the means are found in either the coordinating instructions of an order or through commander’s guidance.","rect":[89.97370910644531,464.5281066894531,521.9737501144409,455.419921875]},{"page":358,"text":"Variations of tactical deception are missions that a higher headquarters can assign to a subordinate unit. Vital","rect":[89.97370910644531,476.0511169433594,522.0823130569459,466.94293212890627]},{"page":358,"text":"to the unit’s ability to execute tactical deception is through maintaining operational security and ensuring the","rect":[89.97370910644531,487.5140075683594,522.0392122344971,478.40582275390627]},{"page":358,"text":"realism.","rect":[89.97370910644531,497.0129699707031,121.93850994110108,489.9288330078125]},{"page":358,"text":"PRINCIPLES OF TACTICAL DECEPTION","rect":[72.0,524.249755859375,343.85234873199468,514.5755615234375]},{"page":358,"text":"19-12. Just as the principles of war provide general guidance for the conduct of military operations, the six","rect":[90.0,544.5543212890625,522.0240993499756,535.4461669921875]},{"page":358,"text":"principles of tactical deception provide guidance to planning deception. The principles of deception are—","rect":[90.0,556.0772705078125,513.1847038269043,546.9691162109375]},{"page":358,"text":" Centralized planning and control.","rect":[115.19999694824219,569.5742797851563,267.10332775115969,560.4661254882813]},{"page":358,"text":" Focus.","rect":[115.19999694824219,581.0502319335938,159.64478588104249,574.2867431640625]},{"page":358,"text":" Integration.","rect":[115.19999694824219,596.5742797851563,179.62465953826905,587.4661254882813]},{"page":358,"text":" Objective.","rect":[115.19999694824219,610.0742797851563,174.64472484588624,600.9560546875]},{"page":358,"text":" Security.","rect":[115.19999694824219,623.5742797851563,169.06458568572999,614.4661254882813]},{"page":358,"text":" Timing.","rect":[115.19999694824219,637.0742797851563,165.16480541229249,627.9661254882813]},{"page":358,"text":"CENTRALIZED PLANNING AND CONTROL","rect":[72.0,660.468017578125,273.1468291282654,652.1759643554688]},{"page":358,"text":"19-13. A centralized approach is necessary to provide clarity and to ensure various elements portray the","rect":[90.0,680.3342895507813,522.0504427032471,671.2261352539063]},{"page":358,"text":"same story and do not conflict with other objectives or evolving conditions in an operational environment.","rect":[89.9899673461914,691.8572998046875,521.9258375167847,682.7390747070313]},{"page":358,"text":"Execution of tactical deception may be decentralized as long as all participating organizations adhere to a","rect":[89.9899673461914,703.3803100585938,521.9628572540283,694.2721557617188]},{"page":358,"text":"single plan. Once the commander approves the deception plan, the designated operational element monitors","rect":[89.9899673461914,714.8432006835938,521.9901263694763,705.7350463867188]},{"page":358,"text":"19-2","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":358,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":358,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":359,"text":"Tactical Deception","rect":[460.5,46.224021911621097,540.0213388671875,38.016021728515628]},{"page":359,"text":"the situation and its effects on the target, as well as friendly and partnered forces to ensure synchronization,","rect":[108.0,83.51434326171875,540.0401563644409,74.40616607666016]},{"page":359,"text":"deconfliction, and OPSEC.","rect":[108.0,93.0,216.4123945236206,85.86905670166016]},{"page":359,"text":"FOCUS","rect":[90.0,118.34220886230469,123.6412181854248,110.25601196289063]},{"page":359,"text":"19-14. The deception plan should focus on the thought process of the deception target since they have the","rect":[108.0,138.2943115234375,540.0202913360596,129.18612670898438]},{"page":359,"text":"authority and capability of triggering the desired actions. The enemy’s intelligence, surveillance, and","rect":[108.0,149.81732177734376,540.0294094085693,140.70913696289063]},{"page":359,"text":"reconnaissance assets are normally targeted. The nine forms of contact are the primary conduit used in the","rect":[108.0,161.28021240234376,540.0367097930908,152.17202758789063]},{"page":359,"text":"deception plan to convey selected information to the deception target. Focused deception must cause the","rect":[108.0,172.80322265625,540.0311555938721,163.69503784179688]},{"page":359,"text":"enemy force to commit an action or inaction. See discussion beginning in paragraph 1-60 for the nine forms","rect":[108.0,184.326171875,540.0664203147888,175.21798706054688]},{"page":359,"text":"of contact.","rect":[108.02002716064453,193.76502990722657,150.24531078338624,186.69090270996095]},{"page":359,"text":"INTEGRATION","rect":[90.0,219.14219665527345,159.55163669586183,211.05599975585938]},{"page":359,"text":"19-15. Units should integrate deception throughout the planning process at all levels since deception is an","rect":[108.0,239.09429931640626,540.0401515960693,229.98611450195313]},{"page":359,"text":"integral part of any operation. This integration includes developing a concept for deception that supports the","rect":[108.0,250.55718994140626,540.0102815704346,241.44900512695313]},{"page":359,"text":"overall mission as part of COA development. An integration of the deception operation throughout all phases","rect":[107.99999237060547,262.0802001953125,540.0350482444763,252.97201538085938]},{"page":359,"text":"of the operation begins with planning, continues through execution, and concludes with the termination of","rect":[107.99999237060547,273.6031494140625,539.9662988243103,264.4949645996094]},{"page":359,"text":"the deception.","rect":[108.0,285.0460205078125,164.14405345916749,275.9578857421875]},{"page":359,"text":"OBJECTIVE","rect":[90.0,308.447998046875,146.78653860092164,300.156005859375]},{"page":359,"text":"19-16. Deception plans focus actions and resources that motivate an enemy to cause desired actions or","rect":[108.0,328.3742980957031,539.9896752891541,319.26611328125]},{"page":359,"text":"inactions. The plan cannot focus solely on motivating the deception target to believe certain things. It must","rect":[108.0,339.8973083496094,540.0740122756959,330.78912353515627]},{"page":359,"text":"lead to the deception target taking a specific course of action, known as the objective of the deception.","rect":[108.0,351.36016845703127,516.9847364425659,342.2419738769531]},{"page":359,"text":"SECURITY","rect":[90.0,374.760009765625,140.4120798110962,366.4560241699219]},{"page":359,"text":"19-17. Successful deception requires strict security that begins before execution with measures to deny the","rect":[108.0,394.67431640625,540.0061311798096,385.5661315917969]},{"page":359,"text":"enemy knowledge of the friendly force’s intent to deceive. Successful deceptions apply strict need to know","rect":[108.0,406.19732666015627,539.9261517562866,397.0891418457031]},{"page":359,"text":"criteria to each aspect of the plan. Maintaining this operational security means limiting the number of planners","rect":[107.98997497558594,417.6601867675781,540.0784442405701,408.552001953125]},{"page":359,"text":"and participants to those needed.","rect":[107.98997497558594,429.16314697265627,238.83416271209718,420.07501220703127]},{"page":359,"text":"TIMING","rect":[90.0,452.5422058105469,128.57101154327393,444.45599365234377]},{"page":359,"text":"19-18. Critical to deception planning is proper synchronization with the commander’s intent and","rect":[108.0,472.4942932128906,539.9846706390381,463.3861083984375]},{"page":359,"text":"maintaining synchronization during execution. Timing in deception operations is crucial. The challenge is to","rect":[108.0,483.9571838378906,539.9089260101318,474.8489990234375]},{"page":359,"text":"get the deception target to act in accordance with the deception plan within the timelines required by the","rect":[108.0,495.48016357421877,540.0574617462158,486.3719787597656]},{"page":359,"text":"friendly operation. Planners should conduct a thorough analysis to understand the amount of time required","rect":[107.9999771118164,507.003173828125,539.9304714202881,497.8949890136719]},{"page":359,"text":"for an effect to pass through the forms of contact before reaching a deception target. Friendly deception","rect":[108.0,518.466064453125,539.9990749359131,509.3578796386719]},{"page":359,"text":"executions must be completed in a manner that accounts for the time consumed by the enemy’s intelligence","rect":[108.0,529.989013671875,540.0061922149658,520.880859375]},{"page":359,"text":"collection and analysis process. The enemy’s decision-making process and current activity is what must be","rect":[108.0,541.451904296875,540.0344514923096,532.34375]},{"page":359,"text":"exploited by friendly forces.","rect":[107.9899673461914,552.9749145507813,221.31316661834718,543.8667602539063]},{"page":359,"text":"TYPES OF TACTICAL DECEPTION","rect":[90.0,578.249755859375,322.20781748199468,568.5755615234375]},{"page":359,"text":"19-19. All deception aims to either increase or decrease the level of uncertainty in the mind of the deception","rect":[108.0,598.5543212890625,539.9912014007568,589.4461669921875]},{"page":359,"text":"target. This dilemma has the potential to compel the deception target to mistakenly perceive friendly motives,","rect":[108.0,610.0772705078125,540.0234327316284,600.9691162109375]},{"page":359,"text":"intentions, capabilities, and vulnerabilities thereby altering the enemy’s assessment and ultimately their","rect":[108.0,621.5401611328125,539.9614160118103,612.4320068359375]},{"page":359,"text":"actions. Two generally recognized types of deception are—","rect":[108.0,633.0631713867188,346.2656059265137,623.9550170898438]},{"page":359,"text":" Ambiguity-increasing (confusion effect).","rect":[133.1999969482422,646.5543212890625,315.35064220428469,637.4461669921875]},{"page":359,"text":" Ambiguity-decreasing (confirmation effect).","rect":[133.1999969482422,660.0543212890625,329.1952772140503,650.9461669921875]},{"page":359,"text":"AMBIGUITY-INCREASING DECEPTION (CONFUSION EFFECT)","rect":[90.0,685.6680297851563,385.7160012207031,675.156005859375]},{"page":359,"text":"19-20. Ambiguity-increasing deception provides the presentation of excessive true and false information to","rect":[108.0,703.374267578125,539.9593410491943,694.26611328125]},{"page":359,"text":"confuse the deception target and create internal conflict. This provides the enemy with many plausible","rect":[107.9899673461914,714.837158203125,539.9800081329346,705.72900390625]},{"page":359,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":359,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":359,"text":"19-3","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":360,"text":"Chapter 19","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":360,"text":"friendly courses of action through evidence of intentions and capabilities that the friendly force does not","rect":[90.0,83.51434326171875,522.0472788772584,74.40616607666016]},{"page":360,"text":"possess. Critical to the confusion effect is that the evidence presented must be doctrinally feasible. The","rect":[90.0,94.97723388671875,522.0464754180908,85.86905670166016]},{"page":360,"text":"desired outcome would be action or inaction from the enemy that would lead to a tactical advantage for the","rect":[90.0,106.500244140625,522.1215486602783,97.3920669555664]},{"page":360,"text":"friendly force. These actions could include a delay of a specific decision, operational paralysis, or the","rect":[90.0,118.023193359375,522.0492220001221,108.9150161743164]},{"page":360,"text":"distribution of enemy forces to locations that cannot influence friendly efforts. This effect is best used when","rect":[90.0,129.486083984375,522.0291042327881,120.3779067993164]},{"page":360,"text":"the deception target tends to be indecisive or risk adverse.","rect":[90.0,141.00909423828126,321.58925914764407,131.90090942382813]},{"page":360,"text":"AMBIGUITY-DECREASING DECEPTION (CONFIRMATION EFFECT)","rect":[72.0,166.60797119140626,391.77599877929688,156.09597778320313]},{"page":360,"text":"19-21. Ambiguity-decreasing deception exploits deception targets’ pre-existing beliefs by confirming their","rect":[90.0,184.3143310546875,522.0273950157166,175.20614624023438]},{"page":360,"text":"desired expectations. This is provided to them through conditioning and diversion of intentional observations","rect":[89.98998260498047,195.7772216796875,522.0094745140076,186.66903686523438]},{"page":360,"text":"that convinces the enemy to be at the wrong place, at the wrong time, and under equipped. The intent is to","rect":[89.98998260498047,207.30023193359376,521.9559230804443,198.19204711914063]},{"page":360,"text":"hide the real friendly intentions and current capabilities from the enemy through a vigorous defense of","rect":[89.98998260498047,218.7630615234375,522.0273339805603,209.65487670898438]},{"page":360,"text":"friendly force information requirements. This information, if uncovered, would be detrimental to the","rect":[89.98998260498047,230.28607177734376,521.9959383087158,221.17788696289063]},{"page":360,"text":"accomplishment of the mission for the friendly unit. The confirmation effect is best employed when deception","rect":[89.98998260498047,241.80908203125,522.0621852874756,232.70089721679688]},{"page":360,"text":"targets tend to accept higher levels of risk with their force and are resolute in their decision making.","rect":[89.98998260498047,253.27197265625,488.7880811691284,244.16378784179688]},{"page":360,"text":"19-22. Both types are applied by using the deception principles. These principles can be best employed","rect":[89.98998260498047,270.79693603515627,522.0515041351318,261.6887512207031]},{"page":360,"text":"when the friendly unit has a reliable understanding of the current situation because desired effects of tactical","rect":[89.97996520996094,282.3199462890625,521.9392466506959,273.2117614746094]},{"page":360,"text":"deception provide a foundation to build their deception plan on in the planning process.","rect":[89.97997283935547,293.7828369140625,439.88552379608157,284.6746520996094]},{"page":360,"text":"TACTICAL DECEPTION MEANS","rect":[72.0,319.0496826171875,286.6223670501709,309.37554931640627]},{"page":360,"text":"19-23. Deceptions means are applied to observables to increase the probability of being accepted by the","rect":[90.0,339.35430908203127,522.0242586212158,330.2461242675781]},{"page":360,"text":"deception target. Deception means are methods, resources, and techniques that can be used to convey","rect":[90.0,350.8773193359375,522.0174465179443,341.7691345214844]},{"page":360,"text":"information to the deception target (JP 3-13.4). There are two tactical deception means categories: physical","rect":[89.99999237060547,362.4002990722656,521.9111704788209,353.2921142578125]},{"page":360,"text":"and technical. Planners normally employ deception plans to supplement several means that aim to mislead","rect":[89.9899673461914,373.8631896972656,521.9912014007568,364.7550048828125]},{"page":360,"text":"multiple types of enemy sensors. This increases credibility and the likelihood of deceiving the deception","rect":[89.9899673461914,385.3861999511719,521.9351100921631,376.27801513671877]},{"page":360,"text":"target. Tactical deception means provide the signatures, associations, and profiles of friendly alleged","rect":[89.98999786376953,396.9091796875,521.9986476898193,387.8009948730469]},{"page":360,"text":"activities to the enemy. Units employ as many means as possible within their capabilities to support tactical","rect":[89.98998260498047,408.3720703125,522.0143809280396,399.2638854980469]},{"page":360,"text":"deception during all types of operations.","rect":[89.98998260498047,419.89508056640627,251.13469982147218,410.7868957519531]},{"page":360,"text":"PHYSICAL MEANS","rect":[72.0,443.2422180175781,161.5614528656006,435.156005859375]},{"page":360,"text":"19-24. Physical means are resources, methods, and techniques used to convey information normally derived","rect":[90.0,463.1943054199219,521.9929714202881,454.08612060546877]},{"page":360,"text":"from direct observation or active sensors by the deception target. Most physical means also have technical","rect":[90.0,474.6571960449219,521.8975596389771,465.54901123046877]},{"page":360,"text":"signatures visible to sensors that collect scientifically or electronically. Planners typically evaluate physical","rect":[90.0,486.18017578125,521.9181895217896,477.0719909667969]},{"page":360,"text":"means using characteristics such as shape, size, function, quantity, movement pattern, location, activity, and","rect":[90.0,497.64306640625,521.9653224945068,488.5348815917969]},{"page":360,"text":"association with the surroundings. Examples might include—","rect":[89.98999786376953,509.16607666015627,336.3517265319824,500.0578918457031]},{"page":360,"text":" Movement of forces.","rect":[115.19999694824219,520.6302490234375,216.82189464569093,513.55615234375]},{"page":360,"text":" Decoy equipment and devices.","rect":[115.19999694824219,536.154296875,255.9440107345581,527.046142578125]},{"page":360,"text":" Security measures, such as camouflage and concealment.","rect":[115.19999694824219,549.654296875,362.0167188644409,540.546142578125]},{"page":360,"text":" Tactical actions, such as feints and demonstrations.","rect":[115.19999694824219,561.1302490234375,338.14907360076907,554.046142578125]},{"page":360,"text":" Reconnaissance, security, and surveillance activities.","rect":[115.19999694824219,576.654296875,344.9876356124878,567.546142578125]},{"page":360,"text":"Movement of Forces","rect":[72.0,599.062744140625,167.84330234146118,591.4865112304688]},{"page":360,"text":"19-25. Units frequently reposition forces to increase ambiguity to ongoing or planned operations. They also","rect":[90.0,618.8342895507813,521.9979763031006,609.7261352539063]},{"page":360,"text":"do this to hide the main effort. This repositioning is not limited to only maneuver forces but can also apply","rect":[90.0,630.2971801757813,521.9830226898193,621.1890258789063]},{"page":360,"text":"to command and control nodes, fires, and sustainment assets. This frequent repositioning requires detailed","rect":[89.98998260498047,641.8201904296875,522.0013942718506,632.7120361328125]},{"page":360,"text":"terrain management and coordination across all echelons to prevent inadvertent concentration of forces,","rect":[89.98998260498047,653.2830810546875,522.0160474777222,644.1749267578125]},{"page":360,"text":"unnecessary congestion of routes, and reduce the likelihood of the repositioning creating unanticipated seams","rect":[89.98998260498047,664.8060302734375,522.0534198265076,655.6978759765625]},{"page":360,"text":"and gaps between units.","rect":[89.98998260498047,676.3290405273438,185.55372142791749,667.2208862304688]},{"page":360,"text":"19-4","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":360,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":360,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":361,"text":"Tactical Deception","rect":[460.5,46.224021911621097,540.0213388671875,38.016021728515628]},{"page":361,"text":"Decoy Equipment and Devices","rect":[90.0,84.62071228027344,232.59839877700805,74.81556701660156]},{"page":361,"text":"19-26. Within their capabilities units use decoys to mislead enemy intelligence collection and direct the","rect":[108.0,102.11431884765625,540.0303011016846,93.00614166259766]},{"page":361,"text":"enemy’s attention away from actual forces. These actions can include creating artificial pieces of equipment","rect":[108.0,113.6373291015625,540.0223765335084,104.5291519165039]},{"page":361,"text":"to constructing false battle positions that include appropriate cover and concealment. These include using","rect":[108.0,125.16033935546875,540.0855007171631,116.05216217041016]},{"page":361,"text":"devices that create false electromagnetic signatures.","rect":[108.0,136.6231689453125,315.15349864959719,127.5149917602539]},{"page":361,"text":"Security Measures","rect":[90.0,161.24070739746095,177.02857455825805,151.43556213378907]},{"page":361,"text":"19-27. Units employ OPSEC and execute survivability operations to protect friendly forces from enemy","rect":[108.0,178.7943115234375,539.9886989593506,169.68612670898438]},{"page":361,"text":"detection. Camouflage blends friendly actions and capabilities with their surroundings while concealment","rect":[108.0,190.31732177734376,540.0622324905396,181.20907592773438]},{"page":361,"text":"makes those actions and capabilities unobservable to the enemy. When used in conjunction with other","rect":[108.0,201.78021240234376,539.9559838829041,192.66201782226563]},{"page":361,"text":"physical and technical means, camouflage and concealment aid in protecting friendly forces while","rect":[108.0,213.30322265625,540.0608186798096,204.19503784179688]},{"page":361,"text":"simultaneously seeking to deceive an enemy. OPSEC includes denying the enemy access to information on","rect":[108.0,224.76605224609376,539.9019069671631,215.65786743164063]},{"page":361,"text":"friendly forces. From a physical means perspective examples include but are not limited to denying personnel","rect":[108.0,236.2890625,540.0854868850709,227.18087768554688]},{"page":361,"text":"access to friendly bases and locations and establishing blocking positions to hinder an enemy’s ability to","rect":[108.0,247.81207275390626,539.9446926116943,238.70388793945313]},{"page":361,"text":"obtain visual contact on unit assembly areas by establishing checkpoints along routes.","rect":[107.98999786376953,259.27496337890627,451.29522228240969,250.16671752929688]},{"page":361,"text":"Tactical Actions","rect":[90.0,281.6627502441406,166.0979715309143,274.0755920410156]},{"page":361,"text":"19-28. Units can employ any number of actions to support tactical deception. These can range from larger","rect":[108.0,301.4342956542969,540.0323998985291,292.32611083984377]},{"page":361,"text":"scale actions, such as feints and demonstrations, to small unit actions such as frequent repositioning of forces.","rect":[108.0,312.9573059082031,540.0030469894409,303.84912109375]},{"page":361,"text":"Commanders at all levels ensure their units incorporate tactical deception within their plans.","rect":[108.0,324.4001159667969,476.55959606170657,315.3119812011719]},{"page":361,"text":"Reconnaissance, Security Operations, and Surveillance","rect":[90.0,349.04071044921877,347.8432594451904,339.235595703125]},{"page":361,"text":"19-29. As the enemy begins to lose its active intelligence collection capability, its ability to detect the","rect":[108.0,366.59429931640627,540.0342073516846,357.4861145019531]},{"page":361,"text":"friendly force’s deception becomes progressively more difficult. Established procedures and doctrine make","rect":[108.0,378.05718994140627,540.0473909454346,368.9490051269531]},{"page":361,"text":"friendly deception operations easier to conduct. These procedures result in distinct and recognizable offensive","rect":[108.0,389.5801696777344,540.0789461212158,380.47198486328127]},{"page":361,"text":"patterns. Many units have enhanced their offensive capabilities by applying deception variations.","rect":[108.0,401.1031799316406,496.0014600753784,391.9949951171875]},{"page":361,"text":"19-30. Increasing patrol and reconnaissance activities in areas away from the main attack may confuse the","rect":[108.0,418.56805419921877,539.9828157501221,409.4598693847656]},{"page":361,"text":"enemy. However, friendly activities should not vary with normal procedures to the extent that they reveal","rect":[108.0,430.0910339355469,539.9456553421021,420.9828186035156]},{"page":361,"text":"friendly forces who are engaged in deception. For example, a friendly commander may conduct","rect":[108.0,441.6140441894531,540.0260996780396,432.505859375]},{"page":361,"text":"reconnaissance in an area away from the main effort’s objective, potentially causing the enemy to shift focus","rect":[108.0,453.076904296875,540.0090472679138,443.9587097167969]},{"page":361,"text":"away from the friendly force’s main effort.","rect":[108.0,464.59991455078127,279.86504650115969,455.4917297363281]},{"page":361,"text":"TECHNICAL MEANS","rect":[90.0,487.94219970703127,188.20143699645997,479.8559875488281]},{"page":361,"text":"19-31. Technical means are resources, methods, and techniques used to convey or deny selected","rect":[108.0,507.894287109375,540.0186672210693,498.7861022949219]},{"page":361,"text":"information or signatures. Often technical means use technical equipment, to or from the deception target,","rect":[108.0,519.357177734375,539.9265089035034,510.2489929199219]},{"page":361,"text":"by manipulating electromagnetic, acoustic, or other forms of energy, or through smell. Technical means may","rect":[108.0,530.880126953125,540.0333766937256,521.77197265625]},{"page":361,"text":"be applied with corresponding physical means or alone to replicate something physical that is absent from","rect":[108.00003814697266,542.343017578125,540.0190100631714,533.23486328125]},{"page":361,"text":"visual contact. Planners integrate technical means with other technical activities of the operation. Higher","rect":[108.00003814697266,553.8660278320313,540.0034081993103,544.7578735351563]},{"page":361,"text":"headquarters may impose restrictions and limitations on the use of specific technical means for TAC-D. This","rect":[108.00003814697266,565.3890380859375,540.0644671897888,556.2808837890625]},{"page":361,"text":"is because they might interfere with an ongoing military deception or the effects of the technical means might","rect":[108.00003814697266,576.8519287109375,540.0403208694459,567.7437744140625]},{"page":361,"text":"extend into another friendly units assigned area. Examples of technical means might include—","rect":[108.00003814697266,588.3749389648438,487.0265922546387,579.2667846679688]},{"page":361,"text":" The establishment of communications networks and interactive transmissions that replicate a","rect":[133.1999969482422,601.8342895507813,539.9949007110596,592.7461547851563]},{"page":361,"text":"specific unit type, size, or activity.","rect":[151.1999969482422,613.3773193359375,288.94497203826907,604.2691650390625]},{"page":361,"text":" Emission or suppression of chemical or biological odors associated with a specific capability or","rect":[133.1999969482422,626.874267578125,539.9998681602478,617.76611328125]},{"page":361,"text":"activity.","rect":[151.1999969482422,638.337158203125,183.70287609100343,629.22900390625]},{"page":361,"text":" Organic capabilities that disrupt an enemy sensor or affect data transmission.","rect":[133.1999969482422,651.8342895507813,459.1644239425659,642.7261352539063]},{"page":361,"text":"Table 19-1 on page 19-6 describes how both physical and technical means enable techniques to provide","rect":[108.00376892089844,666.353271484375,539.9872102813721,657.2451171875]},{"page":361,"text":"deception.","rect":[107.99374389648438,677.8562622070313,149.4354658126831,668.7681274414063]},{"page":361,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":361,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":361,"text":"19-5","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":362,"text":"Chapter 19","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":362,"text":"Table 19-1. Sample deception techniques","rect":[199.1999969482422,83.38390350341797,394.8545675201416,74.12541961669922]},{"page":362,"text":"VARIATIONS OF TACTICAL DECEPTION","rect":[72.0,435.2096862792969,348.4880298843384,425.5355529785156]},{"page":362,"text":"19-32. Tactical deception variations are operational constructs that encompass a broad range of deceptive","rect":[90.0,455.5142822265625,522.0392732696533,446.4060974121094]},{"page":362,"text":"activity and information integrated as a component of the overall plan. A unit may be told to conduct one of","rect":[90.0,467.03729248046877,522.0444238243103,457.9291076660156]},{"page":362,"text":"the two variations of TAC-D: feints and demonstrations. These variations are often best employed in TAC-","rect":[90.01009368896485,478.5001525878906,521.9822900352478,469.3919677734375]},{"page":362,"text":"D to support the commander’s objectives. These variations should not be confused with the tactical deception","rect":[90.01009368896485,490.0231628417969,522.0394191741943,480.90496826171877]},{"page":362,"text":"means; they are deliberate operations that require higher echelons approval. The selected variation and its","rect":[90.01005554199219,501.5461730957031,521.9572894554138,492.43798828125]},{"page":362,"text":"use depend on the planners’ understanding of the current situation as well as the commander’s desired end","rect":[90.00003051757813,513.009033203125,522.0543727874756,503.9008483886719]},{"page":362,"text":"state. All other deception guidance should be issued in the coordinating instructions or done to accomplish","rect":[89.9900131225586,524.5320434570313,521.8547878265381,515.4238891601563]},{"page":362,"text":"the commander’s intent.","rect":[89.9900131225586,534.031005859375,186.93352794647218,526.9468994140625]},{"page":362,"text":"19-33. Units should consider cost of tactical deception in terms of resource expenditure. For tactical","rect":[89.9900131225586,553.4998779296875,522.0043711624146,544.4117431640625]},{"page":362,"text":"deception to appear real, units must dedicate adequate resources. Units should also measure costs in risk and","rect":[89.9900131225586,565.0228881835938,522.0212917327881,555.9347534179688]},{"page":362,"text":"flexibility. For example, it may be very risky for the success of a unit’s main effort to rely solely on the","rect":[90.00003814697266,576.56591796875,521.9669466094971,567.457763671875]},{"page":362,"text":"success of a planned demonstration. Should the demonstration not produce the expected enemy reaction, it","rect":[90.00003814697266,588.02880859375,522.0002818069459,578.920654296875]},{"page":362,"text":"could cause the main effort to fail. Flexibility is built into the plan by using branches, sequels, or executable","rect":[90.00006103515625,599.5517578125,522.0041780548096,590.443603515625]},{"page":362,"text":"deceptions.","rect":[90.00006103515625,611.0547485351563,135.2814588546753,601.9666137695313]},{"page":362,"text":"19-34. While feints and demonstrations are specific tactical deception operations, they are not the sole way","rect":[90.00006103515625,628.5396118164063,521.9732570648193,619.4314575195313]},{"page":362,"text":"a unit should use tactical deception. Units can use many of the variations of offensive and defensive","rect":[90.00007629394531,640.0626220703125,522.0550813751221,630.9544677734375]},{"page":362,"text":"operations to deceive an enemy. For example, units can incorporate a retrograde that forces the enemy into","rect":[90.00007629394531,651.5255126953125,521.9864406585693,642.4173583984375]},{"page":362,"text":"an engagement area. Units use their collective creativity, within the time, resources, and authorities allowed","rect":[90.00007629394531,663.0484619140625,522.0281887054443,653.9403076171875]},{"page":362,"text":"to develop plans that achieve the commander’s end state.","rect":[90.00007629394531,674.5514526367188,317.98220348358157,665.4633178710938]},{"page":362,"text":"19-35. Whenever units determine to use feints, demonstrations, or another variation of offensive or","rect":[90.00007629394531,690.0223388671875,522.0814111289978,682.92822265625]},{"page":362,"text":"defensive operations as a means of deception they are required to gain approval. This approval comes from","rect":[89.99005126953125,703.559326171875,521.9859900436402,694.451171875]},{"page":362,"text":"the commander that is two echelons higher than the requesting units, for example a corps commander is the","rect":[89.99005126953125,715.0823364257813,522.0523958282471,705.9741821289063]},{"page":362,"text":"19-6","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":362,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":362,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":363,"text":"Tactical Deception","rect":[460.5,46.224021911621097,540.0213388671875,38.016021728515628]},{"page":363,"text":"approval authority for a brigade commander requesting to execute a feint or demonstration as part of their","rect":[108.0,83.51434326171875,539.9227807579041,74.40616607666016]},{"page":363,"text":"plan,","rect":[108.0,94.95719909667969,127.78449535369873,85.86905670166016]},{"page":363,"text":"19-36. Units have two options to disseminate the tactical deception plan to their subordinates. It is","rect":[108.0,112.47215270996094,540.0583636741638,103.3840103149414]},{"page":363,"text":"imperative that the unit maintains operational security for the success of the operation. The first option is for","rect":[108.0,124.01519775390625,539.9864404258728,114.90702056884766]},{"page":363,"text":"the unit’s leaders to know the true task and purpose of the organization, subordinates may receive a different","rect":[108.0,135.47808837890626,540.0831675491334,126.36991119384766]},{"page":363,"text":"task and purpose in order to maintain operational security. The second option is for the unit to provide","rect":[108.0,147.00103759765626,539.9930696563721,137.89285278320313]},{"page":363,"text":"complete briefings to their subordinates. In both options, caution must be exercised to ensure that deception","rect":[108.0,158.5240478515625,540.0251369476318,149.41586303710938]},{"page":363,"text":"details are not mentioned in their operation orders. OPSEC must be recognized as a vital element of the","rect":[108.0,169.9869384765625,540.0483675079346,160.87875366210938]},{"page":363,"text":"variation of the tactical deception.","rect":[108.0,181.4899139404297,244.35610485076905,172.40176391601563]},{"page":363,"text":"FEINT","rect":[90.0,204.85269165039063,120.5071349143982,196.77597045898438]},{"page":363,"text":"19-37. A feint is a variation of tactical deception that makes contact solely to deceive the adversary as","rect":[108.0,224.7542724609375,540.1265399436951,215.80641174316407]},{"page":363,"text":"to the location, time of attack, or both. The feint leads the enemy into erroneous conclusions about friendly","rect":[108.0100326538086,236.27728271484376,539.9936428070068,227.16909790039063]},{"page":363,"text":"dispositions. Feints are usually offensive in nature and closely resemble an attack; however, they can be","rect":[108.01000213623047,247.80029296875,540.0451936798096,238.69210815429688]},{"page":363,"text":"executed during other operations. A feint requires engagement with the enemy to give the appearance of the","rect":[108.01001739501953,259.26318359375,540.0212068634033,250.15499877929688]},{"page":363,"text":"main attack. See table 19-2 on page 19-9 for the tactical planning symbol.","rect":[108.01001739501953,270.7861328125,406.00786876678469,261.6779479980469]},{"page":363,"text":"19-38. The principal difference between a feint and an attack is that friendly forces assign their troops an","rect":[108.0,288.3111267089844,539.9065456390381,279.20294189453127]},{"page":363,"text":"objective limited in size, scope, or some other measure. It should contribute to the overall accomplishment","rect":[108.0,299.7740173339844,540.0213999710084,290.65582275390627]},{"page":363,"text":"of the mission and deceive the enemy. Forces conducting feints make direct fire contact with enemy forces","rect":[108.0,311.2970275878906,539.9286029319763,302.1888427734375]},{"page":363,"text":"and potentially decisively engage to draw resources from the enemy to enable the success of the friendly","rect":[108.0,322.82000732421877,539.9874172210693,313.7118225097656]},{"page":363,"text":"force’s main effort. Several purposes for feints include causing the deception target to—","rect":[108.0,334.28289794921877,461.63898849487307,325.1747131347656]},{"page":363,"text":" Employ their second-echelon forces other than intended.","rect":[133.1999969482422,347.7543029785156,377.55584239959719,338.6461181640625]},{"page":363,"text":" Move away from the main attack toward the feint or to hold the enemy’s second echelon force in","rect":[133.1999969482422,361.2543029785156,540.0269680023193,352.1461181640625]},{"page":363,"text":"its current location.","rect":[151.1999969482422,370.7532653808594,228.70470714569093,363.66912841796877]},{"page":363,"text":" Shift its supporting fires from the friendly main attack to the feint.","rect":[133.1999969482422,386.2743225097656,416.20708751678469,377.1661376953125]},{"page":363,"text":" Reveal enemy defensive fires and capabilities.","rect":[133.1999969482422,399.7743225097656,336.6470899581909,390.6661376953125]},{"page":363,"text":"19-39. A single event feint might not always deliver the desired effect. Instead, a series of recurring feints","rect":[107.9937515258789,417.2892761230469,539.9878680686951,408.18109130859377]},{"page":363,"text":"might be necessary to deceive the enemy decision maker. For example, repeated raids may condition the","rect":[107.9937515258789,428.7521667480469,540.0355501251221,419.64398193359377]},{"page":363,"text":"enemy to confirm the commander’s perception that the friendly commander lacks the combat power to","rect":[107.9937515258789,440.275146484375,539.9440822601318,431.1669616699219]},{"page":363,"text":"conduct a main attack. The enemy may become so accustomed to the pattern of raids that it takes little or no","rect":[107.9937973022461,451.79815673828127,539.9629421234131,442.6899719238281]},{"page":363,"text":"action when the friendly main attack actually occurs. The enemy will consider it as another raid.","rect":[107.99371337890625,463.26104736328127,493.10183238983157,454.1528625488281]},{"page":363,"text":"19-40. Another important consideration for the execution of a feint is the location. Observing the terrain","rect":[107.99371337890625,480.7860107421875,539.9667263031006,471.6778259277344]},{"page":363,"text":"and enemy disposition, the commander or staff considers—","rect":[107.98369598388672,492.2489013671875,346.3595390319824,483.1407165527344]},{"page":363,"text":" The enemy’s area of interest. The deception target may not react as desired to the presented threat","rect":[133.1999969482422,505.73431396484377,540.0876231155396,496.6261291503906]},{"page":363,"text":"because it is of little value to the enemy.","rect":[151.1999969482422,517.25732421875,312.5851697921753,508.1491394042969]},{"page":363,"text":" Whether or not the enemy may displace its force if the feint is deployed beyond the range of its","rect":[133.1999969482422,530.7542724609375,539.9428851585388,521.6461181640625]},{"page":363,"text":"direct and indirect fires, based on its current positions.","rect":[151.1999969482422,542.2572631835938,368.4465284347534,533.1691284179688]},{"page":363,"text":" An assigned area that is sufficient for the successful execution of the feint without interfering with","rect":[133.1999969482422,555.7742919921875,540.0062160491943,546.6661376953125]},{"page":363,"text":"the main attack.","rect":[151.1999969482422,565.213134765625,214.77489757537843,558.1290283203125]},{"page":363,"text":"19-41. Units conduct feints before or during the main attack. Therefore, planners consider the timing of the","rect":[107.99375915527344,584.7521362304688,540.0610017852783,575.6439819335938]},{"page":363,"text":"main attack in determining the time for the feint. The estimated time necessary for the enemy to react in the","rect":[107.99375915527344,596.275146484375,540.0415926055908,587.1669921875]},{"page":363,"text":"desired manner also influences the timing of the tactical deception. A feint before a main attack usually","rect":[107.99375915527344,607.738037109375,539.8756618499756,598.6298828125]},{"page":363,"text":"requires carefully determined lead time.","rect":[107.9937515258789,619.260986328125,267.70354747772219,610.15283203125]},{"page":363,"text":"19-42. The precise time a feint occurs will vary depending on the commander’s intent. Moving additional","rect":[107.9937515258789,636.7760009765625,540.0248789749146,627.6678466796875]},{"page":363,"text":"forces will require more time than shifting fires. For example, if the intent is to move the second echelon","rect":[107.98373413085938,648.2388916015625,539.9570217132568,639.1307373046875]},{"page":363,"text":"forces, the feint has to be initiated well ahead of the main effort.","rect":[107.98373413085938,658.0,364.64409923553469,650.6536865234375]},{"page":363,"text":"19-43. A feint conducted simultaneously with the main attack may cause the enemy to divert its attention","rect":[107.97370910644531,677.2868041992188,539.9468288421631,668.1786499023438]},{"page":363,"text":"and possibly a portion of its forces and supporting fires. A feint conducted after the main attack is launched","rect":[107.96368408203125,688.7496948242188,540.0490016937256,679.6415405273438]},{"page":363,"text":"can hold the enemy’s uncommitted forces in its present location. Faced with a new threat, the enemy becomes","rect":[107.96368408203125,700.272705078125,540.1142108421326,691.16455078125]},{"page":363,"text":"uncertain about the location of the main effort.","rect":[107.96368408203125,709.7716674804688,294.60821056365969,702.6875610351563]},{"page":363,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":363,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":363,"text":"19-7","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":364,"text":"Chapter 19","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":364,"text":"19-44. Friendly forces consider the pattern of previous operations. For example, if friendly forces have","rect":[90.0,83.51434326171875,521.9851350860596,74.40616607666016]},{"page":364,"text":"regularly made attacks two hours before daylight, it may be desirable to conduct a feint at this time. Although","rect":[90.0,94.97723388671875,522.0603542327881,85.86905670166016]},{"page":364,"text":"the timing of a feint is influenced by such factors, the timing of the main effort would most likely be the main","rect":[90.0,106.500244140625,522.0173244476318,97.3920669555664]},{"page":364,"text":"consideration.","rect":[90.0,115.99915313720703,146.3725233078003,108.9150161743164]},{"page":364,"text":"DEMONSTRATION","rect":[72.0,141.38218688964845,159.79609775543214,133.29598999023438]},{"page":364,"text":"19-45. A demonstration is a variation of tactical deception used as a show of force in an area where a","rect":[90.0,161.25425720214845,522.0124416351318,152.32643127441407]},{"page":364,"text":"unit does not seek a decision and attempts to mislead an adversary. It is similar to a feint, but direct or","rect":[89.98998260498047,172.79730224609376,521.9352319297791,163.68911743164063]},{"page":364,"text":"indirect contact with the adversary is not intended. A demonstration may be conducted for the purpose of","rect":[89.98998260498047,184.3203125,521.8571069297791,175.21212768554688]},{"page":364,"text":"deceiving the enemy by visual contact with the expectation of luring them into a COA favorable to friendly","rect":[89.98998260498047,195.783203125,521.9678249359131,186.67501831054688]},{"page":364,"text":"lines of operation. While a demonstration has certain advantages over the feint, it lacks the realism.","rect":[89.98999786376953,207.30615234375,521.9692335128784,198.19796752929688]},{"page":364,"text":"Paragraphs 19-46 and 19-47 lists some advantages and disadvantages of using a demonstration. See","rect":[89.98998260498047,218.76904296875,521.9311189727783,209.66085815429688]},{"page":364,"text":"table 19-2 for the tactical planning symbol.","rect":[89.97989654541016,230.29205322265626,262.4702100753784,221.18386840820313]},{"page":364,"text":"19-46. The advantages of a demonstration are—","rect":[89.97989654541016,247.8170166015625,289.23762130737307,238.70883178710938]},{"page":364,"text":" Absence of direct and indirect contact with the enemy facilitates subsequent employment of the","rect":[115.19999694824219,261.2943115234375,522.0210237579346,252.18612670898438]},{"page":364,"text":"demonstration force elsewhere.","rect":[133.1999969482422,270.733154296875,258.4008741378784,263.6490173339844]},{"page":364,"text":" A full force is not always necessary because no contact is made with the enemy. It is essential that","rect":[115.19999694824219,286.2543029785156,522.0322642288209,277.1461181640625]},{"page":364,"text":"a demonstration is combined with real capabilities to provide a creditable threat.","rect":[133.1999969482422,297.75726318359377,454.2445020675659,288.66912841796877]},{"page":364,"text":" It permits the use of simulation devices, when available, in place of real items to deceive the","rect":[115.19999694824219,311.2542724609375,522.0060091094971,302.1661376953125]},{"page":364,"text":"enemy’s information collection.","rect":[133.1999969482422,322.7973327636719,261.22356700897219,313.68914794921877]},{"page":364,"text":"19-47. The disadvantages of a demonstration are—","rect":[89.9937515258789,340.2621765136719,300.9548454284668,331.15399169921877]},{"page":364,"text":" It is more difficult to validate the threat to the enemy without direct or indirect contact.","rect":[115.19999694824219,353.7543029785156,480.8276319503784,344.6461181640625]},{"page":364,"text":" It is more likely that a demonstration will be identified as a deception earlier in the operation than","rect":[115.19999694824219,367.2543029785156,522.0872097015381,358.1461181640625]},{"page":364,"text":"a feint.","rect":[133.1999969482422,376.7532653808594,161.02453136444093,369.66912841796877]},{"page":364,"text":"19-48. A demonstration can be used successfully when there is time and distance between the enemy","rect":[89.9937515258789,396.2922668457031,522.0029201507568,387.18408203125]},{"page":364,"text":"positions and the demonstration force that makes the lack of contact appear realistic to enemy forces. In","rect":[89.9937515258789,407.755126953125,522.0211086273193,398.6469421386719]},{"page":364,"text":"essence, a demonstration attempts to gain enemy response in an area where a friendly force is displayed.","rect":[89.9937515258789,419.27813720703127,521.9447584152222,410.1699523925781]},{"page":364,"text":"However, as the enemy reacts the friendly force withdraws without engagement.","rect":[89.9937515258789,430.8011474609375,412.10683727264407,421.6929626464844]},{"page":364,"text":"19-49. The direct exposure of sustainment operations can illustrate a demonstration. Many times,","rect":[90.00376892089844,448.2659912109375,521.9949903488159,439.1578063964844]},{"page":364,"text":"sustainment operations are much more visible than combat preparations and become a key indicator of","rect":[89.9937515258789,459.78900146484377,521.9547631797791,450.6808166503906]},{"page":364,"text":"location, type, and time for when combat operations will be conducted. Sustainment operations used in","rect":[89.9937515258789,471.31201171875,522.0046901702881,462.2038269042969]},{"page":364,"text":"support of tactical deception seek to confirm the deception target’s perceptions as to where friendly forces","rect":[89.9937515258789,482.7748718261719,522.0963885765076,473.66668701171877]},{"page":364,"text":"will commit their main efforts.","rect":[89.9937515258789,492.2738342285156,212.97924327850343,485.189697265625]},{"page":364,"text":"19-50. After the unit determines what variation of tactical deception it wants to use to enable its operation,","rect":[89.9937515258789,511.7427062988281,522.0270338058472,502.6545715332031]},{"page":364,"text":"the unit determines its observables. Observables are often made up of executions, which can include events,","rect":[89.98373413085938,523.2657470703125,522.0322217941284,514.1776123046875]},{"page":364,"text":"activities, or elements of information that must be seen or sensed by the target to form the desired perceptions.","rect":[89.9937744140625,534.8087158203125,522.0208692550659,525.7005615234375]},{"page":364,"text":"19-8","rect":[72.1199951171875,754.18798828125,90.07499914550782,747.6090087890625]},{"page":364,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":364,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":365,"text":"Tactical Deception","rect":[460.5,46.224021911621097,540.0213388671875,38.016021728515628]},{"page":365,"text":"Table 19-2. Forms of tactical deception and planning symbols","rect":[168.60000610351563,83.51416015625,461.47660731506348,74.12541961669922]},{"page":365,"text":"Forms of Tactical Deception","rect":[95.8800048828125,103.85394287109375,229.87046551895143,94.58544158935547]},{"page":365,"text":"Tactical Symbol","rect":[320.2799987792969,103.97418212890625,396.4485545120239,94.58544158935547]},{"page":365,"text":"Feint","rect":[95.8800048828125,134.99021911621095,119.80075622177124,127.70568084716797]},{"page":365,"text":"Demonstration","rect":[95.8800048828125,245.0301971435547,166.44686627578737,237.74566650390626]},{"page":365,"text":"TACTICAL DECEPTION PLANNING","rect":[90.0,311.9096984863281,328.7267204055786,302.2215576171875]},{"page":365,"text":"19-51. Units should consider deception in all activities of the operations process. It is unlikely that an under","rect":[108.0,332.21429443359377,540.0573022422791,323.1061096191406]},{"page":365,"text":"resourced and nonintegrated tactical deception will succeed, and the longer tactical deception is not accounted","rect":[108.0,343.67718505859377,540.0489406585693,334.5690002441406]},{"page":365,"text":"for in the operations process, the more probability it will fail. Tactical deception can be used to support a","rect":[108.0,355.2001647949219,540.0204744415283,346.09197998046877]},{"page":365,"text":"range of missions and to prevent duplication of deception efforts; therefore, leaders should coordinate tactical","rect":[108.0,366.7231750488281,539.9702525100709,357.614990234375]},{"page":365,"text":"deceptions both laterally and vertically. Preparing and executing a tactical deception requires the same","rect":[108.0,378.1860656738281,539.9566927032471,369.077880859375]},{"page":365,"text":"considerations as any operation but has some key additions in the planning phase.","rect":[108.0,389.70904541015627,434.86565685272219,380.6008605957031]},{"page":365,"text":"19-52. Tactical deception is integrated early during the planning process to increase its effectiveness in","rect":[108.0,407.1739196777344,539.9880886077881,398.06573486328127]},{"page":365,"text":"causing the enemy to act or react in a desired manner. Prior to the integration of deception, commanders must","rect":[108.0,418.6968994140625,540.1213755569459,409.5887145996094]},{"page":365,"text":"determine the desired effects on the enemy. Tactical deception focuses on the enemy’s decision-making","rect":[108.0,430.21990966796877,539.9001369476318,421.1117248535156]},{"page":365,"text":"process. Tactical deception must end in an enemy decision to act or not act in a way that supports an operation.","rect":[107.99002075195313,441.68280029296877,540.0950880050659,432.5746154785156]},{"page":365,"text":"The enemy decision-making process occurs in the see-think-do planning methodology:","rect":[107.99002075195313,453.2057800292969,456.0106577835083,444.09759521484377]},{"page":365,"text":" See: What significant physical and technical indicators can the enemy see, sense, or detect?","rect":[133.1999969482422,466.67431640625,516.8969392852783,457.5661315917969]},{"page":365,"text":" Think: Do these indicators lead the enemy to believe what it sees, senses, or detects?","rect":[133.1999969482422,480.17431640625,490.0145540313721,471.0661315917969]},{"page":365,"text":" Do: Has the enemy decided on an action or inaction based on what it believes?","rect":[133.1999969482422,493.67431640625,466.1338167266846,484.5661315917969]},{"page":365,"text":"19-53. Planners use the see-think-do planning methodology in reverse to guide deception planning,","rect":[107.9937515258789,511.1993103027344,540.0361280441284,502.09112548828127]},{"page":365,"text":"execution, and assessment. Planners begin by identifying what they want the enemy to do, then determining","rect":[107.9937744140625,522.6621704101563,539.9076442718506,513.5540161132813]},{"page":365,"text":"what the enemy must think in order to act as desired, and finally establishing what the deception target must","rect":[107.9937744140625,534.1851806640625,540.0809702835084,525.0770263671875]},{"page":365,"text":"see to encourage thinking that way. Successful deception operations are those that do more than make the","rect":[107.9937744140625,545.7081909179688,540.0230379180908,536.6000366210938]},{"page":365,"text":"target believe or think the deception is true. The deception target must make a decision to act or not act in a","rect":[107.9937744140625,557.1710205078125,540.0610017852783,548.0628662109375]},{"page":365,"text":"way that favors friendly operations.","rect":[107.9937744140625,568.694091796875,250.53834056854249,559.5859375]},{"page":365,"text":"19-54. Deception planners use this planning methodology to ensure that each tactical deception is properly","rect":[107.9937744140625,586.208984375,540.0159206390381,577.100830078125]},{"page":365,"text":"constructed. They develop courses of action based on the tactical plan. They integrate any revised","rect":[107.98374938964844,597.671875,539.8842678070068,588.563720703125]},{"page":365,"text":"commander’s guidance and updated intelligence analysis to refine and complete their deception plan using","rect":[107.98374938964844,609.1948852539063,539.9268703460693,600.0867309570313]},{"page":365,"text":"the six-step deception planning process. (See FM 3-13.4 for more detail on tactical deception planning","rect":[107.98375701904297,620.7178955078125,539.9343776702881,611.6097412109375]},{"page":365,"text":"process.)","rect":[107.97370147705078,632.1607666015625,143.8252770957947,623.0726318359375]},{"page":365,"text":"TACTICAL DECEPTION IN OFFENSIVE OPERATIONS","rect":[90.0,657.44970703125,449.3587867279053,647.7755126953125]},{"page":365,"text":"19-55. The intent of TAC-D in the offense is to enhance the friendly force’s course of action by avoiding","rect":[108.0,677.7542724609375,539.9801540374756,668.6461181640625]},{"page":365,"text":"the enemy’s strengths, striking their weaknesses, and gaining overall surprise. An important consideration in","rect":[108.0,689.2772827148438,539.9821681976318,680.1691284179688]},{"page":365,"text":"tactical deception is that the unit must be able to exercise some influence over its assigned area. The unit","rect":[108.0,700.7401733398438,539.9603648147584,691.6320190429688]},{"page":365,"text":"needs to influence through some offensive action and not merely react to the enemy’s defensive actions.","rect":[108.0,712.26318359375,539.9450025558472,703.155029296875]},{"page":365,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":365,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":365,"text":"19-9","rect":[503.9940185546875,754.18798828125,521.9490073242188,747.6090087890625]},{"page":366,"text":"Chapter 19","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":366,"text":"Showing the enemy multiple observables of a particular intention is the most convincing way to sell the","rect":[90.0,83.51434326171875,522.0300569610596,74.40616607666016]},{"page":366,"text":"tactical deception.","rect":[90.0,94.95719909667969,162.75722789764405,85.86905670166016]},{"page":366,"text":"19-56. The unit’s tactical deception should be employed in an environment in which the unit has more","rect":[90.0,112.4921875,522.0464143829346,103.3840103149414]},{"page":366,"text":"options available than the enemy has combat power to cover. If the enemy can effectively defend against all","rect":[89.98997497558594,124.01519775390625,522.0101695022584,114.90702056884766]},{"page":366,"text":"avenues of approach, then deceiving it as to the friendly choice becomes much less significant. As influence","rect":[89.98997497558594,135.47808837890626,522.0540437774658,126.36991119384766]},{"page":366,"text":"over the assigned area begins to increase, the unit’s options and, therefore, its opportunity for deception begin","rect":[89.98997497558594,147.00103759765626,522.0431423187256,137.89285278320313]},{"page":366,"text":"to increase. As the enemy’s influence begins to diminish, its intelligence collection capability becomes more","rect":[89.98997497558594,158.5240478515625,522.0621614532471,149.41586303710938]},{"page":366,"text":"degraded by increasing friendly control of the assigned area. Consequently, the enemy’s ability to assess","rect":[89.98999786376953,169.9869384765625,521.9448993186951,160.87869262695313]},{"page":366,"text":"friendly capabilities and probable intentions shifts to an environment of relative uncertainty. The","rect":[89.98998260498047,181.50994873046876,522.1362581329346,172.40176391601563]},{"page":366,"text":"opportunities for deception continue to increase. The enemy is required to make more tactical decisions based","rect":[89.98998260498047,193.032958984375,522.0405178070068,183.92477416992188]},{"page":366,"text":"on the remaining, often uncorroborated, intelligence.","rect":[89.98998260498047,204.495849609375,301.11345958709719,195.38766479492188]},{"page":366,"text":"19-57. Deception operations induce the enemy decision maker to view the operation from multiple courses","rect":[89.98998260498047,222.01080322265626,522.0572040061951,212.90261840820313]},{"page":366,"text":"of action. This provides friendly commanders the ability to develop favorable and exploitable courses of","rect":[89.98998260498047,233.4736328125,522.0010278282166,224.36544799804688]},{"page":366,"text":"action. Because of induced misperceptions of the battlefield, the enemy in defense is not given time to identify","rect":[89.98998260498047,244.99664306640626,522.0639553070068,235.88845825195313]},{"page":366,"text":"the composition, location, and time of the friendly force’s attack.","rect":[89.98998260498047,256.5196533203125,349.95464611053469,247.41146850585938]},{"page":366,"text":"19-58. As the enemy begins to lose its active intelligence collection capability, its ability to detect the","rect":[89.98998260498047,273.9844970703125,522.0302400665283,264.8763122558594]},{"page":366,"text":"friendly force’s deception becomes progressively more difficult. Established procedures and doctrine make","rect":[89.98998260498047,285.50750732421877,522.0187654571533,276.3993225097656]},{"page":366,"text":"friendly deception operations easier to conduct. These procedures result in distinct and recognizable offensive","rect":[89.98998260498047,297.030517578125,522.0705232696533,287.9223327636719]},{"page":366,"text":"patterns. Many units have enhanced their offensive capabilities by applying deception variations.","rect":[89.98998260498047,308.493408203125,477.99529552459719,299.3852233886719]},{"page":366,"text":"19-59. Increasing patrol and reconnaissance activities in areas away from the main attack may confuse the","rect":[89.98998260498047,326.01837158203127,521.9862947540283,316.9101867675781]},{"page":366,"text":"enemy. However, friendly activities should not vary with normal procedures to the extent that they reveal","rect":[89.97997283935547,337.5413818359375,521.9266123733521,328.43310546875]},{"page":366,"text":"friendly forces who are engaged in deception. For example, a friendly commander may conduct","rect":[89.9800033569336,349.0042724609375,522.0231089553834,339.8960876464844]},{"page":366,"text":"reconnaissance in an area away from the main effort’s objective, potentially causing the enemy to shift focus","rect":[89.9799575805664,360.52728271484377,521.9904315452576,351.4090881347656]},{"page":366,"text":"away from the friendly force’s main effort.","rect":[89.97994995117188,372.0502624511719,261.84600353240969,362.94207763671877]},{"page":366,"text":"TACTICAL DECEPTION IN DEFENSIVE OPERATIONS","rect":[72.0,397.2897033691406,431.3560096282959,387.6155700683594]},{"page":366,"text":"19-60. Due to the relatively static nature of defensive operations at the lower tactical levels, tactical","rect":[90.0,417.59429931640627,521.9906992874146,408.4861145019531]},{"page":366,"text":"deception takes on an increased importance. Tactical deception is used in the defense to preserve combat","rect":[90.0,429.0371398925781,522.0364146194459,419.9490051269531]},{"page":366,"text":"power by hiding the location of friendly forces in the main battle area, the main effort, and friendly reserves.","rect":[90.0,440.5801696777344,521.9839429855347,431.47198486328127]},{"page":366,"text":"By concealing friendly defensive positions, this preserves combat power and improves survivability. This","rect":[90.0,452.1031799316406,521.9760272483826,442.9949951171875]},{"page":366,"text":"causes the enemy to expend combat power and exhaust intelligence efforts and resources unprofitably.","rect":[90.0,463.5660705566406,522.0004835128784,454.4578857421875]},{"page":366,"text":"Creating false targets to cause the enemy to misuse reconnaissance efforts and firepower is a concurrent,","rect":[90.0,475.08905029296877,522.0473585128784,465.9808654785156]},{"page":366,"text":"coordinated activity during all phases of the defense to cause the enemy to pursue a COA favorable to friendly","rect":[90.0,486.55194091796877,522.0023708343506,477.4437561035156]},{"page":366,"text":"operations.","rect":[90.0,498.0548400878906,134.20824718475343,488.9667663574219]},{"page":366,"text":"19-61. At the point of the attack, the enemy has decided on its course of action. It is easier to convince the","rect":[90.00000762939453,515.5899047851563,521.9865999298096,506.4817199707031]},{"page":366,"text":"enemy to continue that course rather than alter its plans or tactics. A successful tactical deception operation","rect":[90.0,527.0527954101563,521.9670314788818,517.9446411132813]},{"page":366,"text":"conducted by a defender can result in the inappropriate deployment of attacking enemy forces. Maintaining","rect":[90.0,538.5758056640625,521.9047756195068,529.4676513671875]},{"page":366,"text":"that tactical deception can result in the continued commitment of enemy forces at a time and location least","rect":[90.0,550.0987548828125,521.9271006546021,540.9906005859375]},{"page":366,"text":"advantageous to the enemy.","rect":[90.0,561.5616455078125,201.10576915740968,552.4534912109375]},{"page":366,"text":"19-62. In the defense, operational security is an ally of tactical deception. For example, the enemy has","rect":[90.0,579.0765991210938,521.9572284202576,569.9684448242188]},{"page":366,"text":"decided on a course of action, it is easier to convince them to continue their course of action than alter their","rect":[89.99999237060547,589.0,521.9111230430603,581.491455078125]},{"page":366,"text":"plan. A successful deception in the defense can result in the inappropriate deployment of attacking enemy","rect":[90.0,602.0625,521.9970607757568,592.954345703125]},{"page":366,"text":"forces. The far easier task of maintaining that deception can result in the continued commitment of enemy","rect":[90.0,613.58544921875,521.9644680023193,604.477294921875]},{"page":366,"text":"forces at a time and location least advantageous to them.","rect":[90.0,625.1084594726563,316.12224864959719,616.0003051757813]},{"page":366,"text":"RISK TO TACTICAL DECEPTION","rect":[72.0,650.3697509765625,294.04155771636968,640.695556640625]},{"page":366,"text":"19-63. Tactical deception, by its very nature, implies taking calculated risks to gain the tactical advantage","rect":[90.0,670.67431640625,522.0722932891846,661.566162109375]},{"page":366,"text":"over the enemy. Planned deceptions allow friendly forces to sequence the presentation of the battlefield to","rect":[90.0,682.13720703125,522.0184230804443,673.029052734375]},{"page":366,"text":"the enemy in the manner in which friendly forces allows the enemy to view the battlefield.","rect":[90.0,693.66015625,452.14467906951907,684.552001953125]},{"page":366,"text":"19-10","rect":[72.1199951171875,754.18798828125,95.11499243164063,747.6090087890625]},{"page":366,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":366,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":367,"text":"Tactical Deception","rect":[460.5,46.224021911621097,540.0213388671875,38.016021728515628]},{"page":367,"text":"19-64. Units should be aware that deceptions may produce unintended and unwanted consequences.","rect":[108.0,83.51434326171875,539.9821729660034,74.40616607666016]},{"page":367,"text":"Believing that a threat is real, an enemy can act unpredictably. Proper planning and coordination and knowing","rect":[108.0,94.97723388671875,539.9944972991943,85.86905670166016]},{"page":367,"text":"the enemy can reduce the chance that deceptions will result in unfavorable action. Friendly forces consider","rect":[108.0,106.500244140625,539.9719750938416,97.3920669555664]},{"page":367,"text":"second- and third-order effects of the deception plan to mitigate unintended consequences. The possibility of","rect":[108.0,118.023193359375,540.0425317344666,108.9150161743164]},{"page":367,"text":"failure stems from the uncertainties surrounding how the target receives and interprets information intended","rect":[107.98998260498047,129.486083984375,540.0193386077881,120.3779067993164]},{"page":367,"text":"for the target and, eventually, how it affects the target’s desired perceptions. If discovered, resources used","rect":[107.98998260498047,141.00909423828126,539.9779567718506,131.90090942382813]},{"page":367,"text":"for the deception may be in jeopardy. As with any military operation that puts forces at risk, leaders decide","rect":[107.98998260498047,152.5321044921875,540.0171175079346,143.41390991210938]},{"page":367,"text":"to use deception after a deliberate assessment that weighs opportunity against need and cost against benefit.","rect":[107.98998260498047,163.9949951171875,538.5343580245972,154.88681030273438]},{"page":367,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":367,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":367,"text":"19-11","rect":[498.9540100097656,754.18798828125,521.9490073242188,747.6090087890625]},{"page":368,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":369,"text":"Chapter 20","rect":[283.97998046875,129.6120147705078,345.97317797851567,118.52400970458985]},{"page":369,"text":"Linkup","rect":[288.7799987792969,153.91989135742188,341.2887695960999,139.3096466064453]},{"page":369,"text":"This chapter addresses those considerations unique to a linkup. This chapter addresses","rect":[126.0,188.75872802734376,503.9757181129456,178.79986572265626]},{"page":369,"text":"the general considerations for a linkup, planning and preparing a linkup, and types of ","rect":[126.0,201.4405975341797,506.7885789871216,191.45977783203126]},{"page":369,"text":"linkup.","rect":[126.01097106933594,214.07861328125,156.90210437774659,204.1197509765625]},{"page":369,"text":"LINKUP OPERATIONS","rect":[90.0,239.42967224121095,240.4527350921631,229.75550842285157]},{"page":369,"text":"20-1. A linkup is a type of enabling operation that involves the meeting of friendly ground forces, which","rect":[108.0,259.7342529296875,540.0655050201416,250.78639221191407]},{"page":369,"text":"occurs in a variety of circumstances. For example, when converging maneuver forces meet, when an","rect":[108.0,271.25726318359377,539.9606227874756,262.1490783691406]},{"page":369,"text":"advancing force reaches an objective area previously seized by an airborne or air assault force, when an","rect":[108.0,282.7201232910156,539.9678249359131,273.6019287109375]},{"page":369,"text":"encircled force breaks out to rejoin friendly forces, and when a force comes to the relief of an encircled force.","rect":[108.0,294.2431335449219,540.0081129074097,285.12493896484377]},{"page":369,"text":"During optimal linkup conditions, there is a stationary force and a linkup force. However, both forces may","rect":[108.0,305.7661437988281,539.8043117523193,296.657958984375]},{"page":369,"text":"be moving toward each other simultaneously. Whenever possible, the joining forces exchange as much","rect":[108.0,317.22900390625,539.9022731781006,308.1108093261719]},{"page":369,"text":"information as possible prior to starting the linkup.","rect":[108.0,328.75201416015627,311.32790660858157,319.6438293457031]},{"page":369,"text":"PLANNING A LINKUP","rect":[90.0,352.1022033691406,192.32256841659547,344.0159912109375]},{"page":369,"text":"20-2. A linkup is a complex operation that requires detailed planning and coordination. Planning for a linkup","rect":[108.0,372.0542907714844,540.0020656585693,362.94610595703127]},{"page":369,"text":"is coordinated as far in advance as possible to allow coordination between the two or more friendly units.","rect":[108.0,383.5171813964844,539.8715772628784,374.40899658203127]},{"page":369,"text":"Commanders and staffs coordinate responsibilities to preventing fratricide and ensure mission success.","rect":[108.0,395.0401611328125,518.9721632003784,385.9319763183594]},{"page":369,"text":"Command and Control","rect":[90.0,417.4537048339844,199.4036361618042,409.86651611328127]},{"page":369,"text":"20-3. The headquarters directing the linkup operation must establish command relationships and","rect":[108.0,437.154296875,540.0076808929443,428.0461120605469]},{"page":369,"text":"responsibilities of the forces involved. Both the linkup force and the force with which linkup is to be made","rect":[108.0,448.6572570800781,539.9939851837158,439.5691223144531]},{"page":369,"text":"can remain under control of the directing headquarters. The communications plan includes the channels for","rect":[108.0,460.2002868652344,539.9188134727478,451.09210205078127]},{"page":369,"text":"radio communications between the two forces. It must prescribe day and night identification procedures,","rect":[108.0,471.6631774902344,539.9008741378784,462.55499267578127]},{"page":369,"text":"including primary and alternate means. Aircraft can extend communications range. Units can use visual","rect":[108.0,483.1861877441406,539.9974741897584,474.0780029296875]},{"page":369,"text":"signals such as flares or panels during daylight and flashlights or infrared devices during darkness. To prevent","rect":[108.0,494.70916748046877,540.0509409866334,485.6009826660156]},{"page":369,"text":"friendly troops from exchanging fires, recognition signals must be established and communicated between","rect":[108.0,506.17205810546877,540.0683498382568,497.0638732910156]},{"page":369,"text":"the linkup forces. They may be pyrotechnics, armbands, vehicle markings, panels, colored smoke, distinctive","rect":[107.9899673461914,517.695068359375,540.0090608673096,508.5868835449219]},{"page":369,"text":"light patterns, and passwords.","rect":[107.9899673461914,529.218017578125,226.59470653533936,520.10986328125]},{"page":369,"text":"20-4.","rect":[107.9899673461914,544.6388549804688,128.85161113739015,537.755126953125]},{"page":369,"text":"The headquarters ordering the linkup establishes—","rect":[133.19027709960938,546.6829223632813,337.3677787780762,537.5747680664063]},{"page":369,"text":" A common operational picture using available command and control systems, ideally both","rect":[133.1999969482422,560.154296875,540.0272121429443,551.046142578125]},{"page":369,"text":"digitally and analog.","rect":[151.1999969482422,571.6773071289063,233.14458751678468,562.5691528320313]},{"page":369,"text":" Command relationship and responsibilities of each force before, during, and after linkup.","rect":[133.1999969482422,585.17431640625,507.2828321456909,576.066162109375]},{"page":369,"text":" Coordination of fire support before, during, and after linkup, including control measures.","rect":[133.1999969482422,598.67431640625,507.0462598800659,589.566162109375]},{"page":369,"text":" A linkup method.","rect":[133.1999969482422,612.154296875,221.49232006072999,603.066162109375]},{"page":369,"text":" Recognition signals (near and far) and communication procedures, such as pyrotechnics, vehicle","rect":[133.1999969482422,625.67431640625,539.9157381134033,616.566162109375]},{"page":369,"text":"markings, gun tube orientation, panels, colored smoke, lights, and challenge and passwords.","rect":[151.1999969482422,637.13720703125,519.1604566574097,628.029052734375]},{"page":369,"text":" Operations to conduct following linkup.","rect":[133.1999969482422,650.63427734375,311.5090284347534,641.526123046875]},{"page":369,"text":"Intelligence","rect":[90.0,675.2607421875,144.33123551940919,665.45556640625]},{"page":369,"text":"20-5. The linkup force will begin the IPB process in preparation for the operation essentially as for any","rect":[108.0,692.8142700195313,539.9294948577881,683.7061157226563]},{"page":369,"text":"offensive or defensive operation. The significant difference is that the commander and staff will have to","rect":[108.0,704.3372802734375,539.8676662445068,695.2291259765625]},{"page":369,"text":"consider the location and effect of other friendly forces on the enemy forces within the assigned area. As a","rect":[108.0,715.8001708984375,540.0461702423096,706.6920166015625]},{"page":369,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":369,"text":"FM 3-90","rect":[289.26300048828127,754.18798828125,322.76098852539067,747.6090087890625]},{"page":369,"text":"20-1","rect":[504.00299072265627,754.1790161132813,521.9580405273438,747.6090087890625]},{"page":370,"text":"Chapter 20","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":370,"text":"result, the probable enemy course of action, situation template, and event template must include both the","rect":[90.0,83.51434326171875,522.0280428009033,74.40616607666016]},{"page":370,"text":"stationary and maneuvering forces perspective of the operation.","rect":[90.0,94.97723388671875,344.38189220428469,85.86905670166016]},{"page":370,"text":"Movement and Maneuver","rect":[72.0,117.38272857666016,193.53872453308106,109.97122955322266]},{"page":370,"text":"20-6.","rect":[90.0,135.11021423339845,110.86164379119873,128.2264862060547]},{"page":370,"text":"Linkup operations of two or more friendly forces are conducted to—","rect":[115.20030212402344,137.154296875,390.1791801452637,128.04611206054688]},{"page":370,"text":" Complete the encirclement of an enemy force.","rect":[115.19999694824219,150.654296875,318.3986463546753,141.54611206054688]},{"page":370,"text":" Assist the breakout of an encircled friendly force.","rect":[115.19999694824219,164.154296875,331.42376232147219,155.04611206054688]},{"page":370,"text":" Join an attacking force with a force operating adjacent to it.","rect":[115.19999694824219,177.654296875,371.2090711593628,168.53610229492188]},{"page":370,"text":" Join an attacking force with airborne or air assault elements following a vertical","rect":[115.19999694824219,191.154296875,452.55139875030519,182.04611206054688]},{"page":370,"text":"envelopment.","rect":[455.04241943359377,191.13426208496095,509.26665782928469,182.04611206054688]},{"page":370,"text":"20-7. The two forces carefully define and coordinate their schemes of maneuver, placing particular attention","rect":[90.00376892089844,208.619140625,522.0936794281006,199.51095581054688]},{"page":370,"text":"to graphic control measures and the subsequent mission to be performed by each force after linkup is","rect":[90.00376892089844,220.14215087890626,522.0401751976013,211.03396606445313]},{"page":370,"text":"complete. A linkup point is normally positioned behind or along one flank of the enemy’s positions.","rect":[90.00376892089844,231.6651611328125,490.2504835128784,222.55697631835938]},{"page":370,"text":"20-8. A linkup point is a designated place where two forces are scheduled to meet. This point should be large","rect":[90.00376892089844,249.1300048828125,521.9649934844971,240.02182006835938]},{"page":370,"text":"enough for all forces to assemble and it should offer cover and concealment for these forces. When planning","rect":[90.00376892089844,260.65301513671877,521.9694728851318,251.54483032226563]},{"page":370,"text":"a linkup point, the staff should look for an easily identifiable point on the ground. The staff should position","rect":[90.00379943847656,272.176025390625,522.0331935882568,263.0678405761719]},{"page":370,"text":"linkup points on defensible terrain located away from normal enemy movement routes. Planned alternate","rect":[90.0037841796875,283.6388854980469,522.0010652618408,274.53070068359377]},{"page":370,"text":"linkup points provide needed flexibility. A liaison is normally established during planning and continues","rect":[90.0037841796875,295.1618957519531,522.0348041038513,286.0537109375]},{"page":370,"text":"throughout the operation to facilitate coordination between the two forces. See paragraph A-27 for definition","rect":[90.0037841796875,306.68487548828127,521.9946804046631,297.5766906738281]},{"page":370,"text":"and symbol.","rect":[90.02379608154297,318.14776611328127,138.96851634979249,309.0395812988281]},{"page":370,"text":"20-9. Units carefully coordinate linkup operations with forces of other nations. This is especially true if the","rect":[90.02381896972656,335.6627502441406,522.0310335235596,326.5545654296875]},{"page":370,"text":"two forces are not both members of an alliance with established internationally standardized procedures, or","rect":[90.02381896972656,347.18572998046877,521.9449975547791,338.0775451660156]},{"page":370,"text":"if the forces involved have not previously established the necessary procedures. In such situations, extensive","rect":[90.02381896972656,358.64862060546877,521.9746980743408,349.5404357910156]},{"page":370,"text":"use of liaison is necessary to ensure understanding and synchronization of operations. Additional rehearsals","rect":[90.02381896972656,370.171630859375,522.0160663108826,361.0634460449219]},{"page":370,"text":"may be necessary to ensure maneuver forces clearly understand the operation or to ensure no hostile actions","rect":[90.02381896972656,381.6344909667969,522.0157611351013,372.52630615234377]},{"page":370,"text":"affect the stationary force. Aircraft can improve and expedite this coordination.","rect":[90.02381896972656,393.157470703125,407.0969190597534,384.0492858886719]},{"page":370,"text":"20-10. The engineers will be task-organized to conduct mobility operations. The speed of the operation will","rect":[90.02381896972656,410.6824645996094,522.0571665725709,401.57427978515627]},{"page":370,"text":"be essential, whether it is designed to assist in the movement towards the linkup point with an encircled force","rect":[90.01377868652344,422.14532470703127,522.0960359649658,413.0371398925781]},{"page":370,"text":"or to complete the encirclement of the enemy.","rect":[90.01377868652344,433.6683349609375,273.83977794647219,424.5601501464844]},{"page":370,"text":"Fires","rect":[72.0,456.0227355957031,95.77938327407837,448.4355773925781]},{"page":370,"text":"20-11. When a division or corps directs a linkup operation, they normally establish fire support coordination","rect":[90.0,475.7943115234375,522.0444240570068,466.6861267089844]},{"page":370,"text":"measures for both forces. Fire support coordination measures are adjusted as one force moves toward the","rect":[89.9999771118164,487.2572021484375,522.0333528594971,478.1390075683594]},{"page":370,"text":"other. A restricted fire line is established between the forces when necessary, usually at the point where the","rect":[90.0,498.7801818847656,522.0063753204346,489.6719970703125]},{"page":370,"text":"two forces plan to establish contact. During linkup operations, particularly with airborne or air assault forces,","rect":[90.00003814697266,510.2430725097656,522.0003614425659,501.1348876953125]},{"page":370,"text":"indirect fire support becomes extremely important. The division artillery headquarters must ensure timely","rect":[90.00003814697266,521.76611328125,521.9973049163818,512.657958984375]},{"page":370,"text":"dissemination of information and coordination so that fires do not engage friendly aircraft supporting the","rect":[90.00003814697266,533.2890625,521.9720735626221,524.180908203125]},{"page":370,"text":"airborne or air assault forces.","rect":[90.00003814697266,542.7279052734375,206.3813123703003,535.643798828125]},{"page":370,"text":"Sustainment","rect":[72.0,567.1646728515625,130.60354443740847,559.5555419921875]},{"page":370,"text":"20-12. Sustainment support requirements may be greater during linkup operations than during other","rect":[90.0,586.914306640625,522.0311181602478,577.80615234375]},{"page":370,"text":"operations. Additional considerations for planning logistics support in linkup operations include—","rect":[90.0,598.4373168945313,484.2068901062012,589.3291625976563]},{"page":370,"text":" Distance to the objective area.","rect":[115.19999694824219,611.934326171875,254.01711559295655,602.8161010742188]},{"page":370,"text":" Duration to hold the objective area.","rect":[115.19999694824219,625.434326171875,274.84475231170657,616.3161010742188]},{"page":370,"text":" Planned operations or movement out of the objective area.","rect":[115.19999694824219,638.874267578125,366.7633008956909,629.7560424804688]},{"page":370,"text":" Resupply of the stationary force.","rect":[115.19999694824219,652.374267578125,263.9789991378784,643.26611328125]},{"page":370,"text":" Movement of drop zones and landing zones of airborne or air assault forces involved in the linkup.","rect":[115.19999694824219,665.874267578125,522.0664014816284,656.76611328125]},{"page":370,"text":" LOCs secured by follow-on forces.","rect":[115.19999694824219,679.374267578125,273.99602794647219,670.26611328125]},{"page":370,"text":"20-13. Supply requirements for a linkup operation may exceed the transportation capability of the unit","rect":[89.9937515258789,696.8992919921875,521.9463267288209,687.7911376953125]},{"page":370,"text":"conducting the linkup. The sustainment elements may have to request additional vehicles or resupply by air.","rect":[89.98370361328125,708.4223022460938,521.9741163253784,699.3141479492188]},{"page":370,"text":"In linkup operations with airborne and air assault forces, priority for supply by air is given to the forces","rect":[89.9937744140625,719.8851318359375,521.9536883811951,710.7769775390625]},{"page":370,"text":"20-2","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":370,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":370,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":371,"text":"Linkup","rect":[510.47998046875,46.224021911621097,540.0386728515625,38.016021728515628]},{"page":371,"text":"assaulting the objective area. Supplies for the linkup forces normally move by land transportation. However,","rect":[108.0,83.51434326171875,539.9923048019409,74.39614868164063]},{"page":371,"text":"when the objective area is to be defended jointly by the linkup and airborne or air assault force, supplies for","rect":[108.0,94.97723388671875,540.0330102500916,85.85903930664063]},{"page":371,"text":"the linkup force maybe flown into the objective area and stockpiled.","rect":[108.0,106.500244140625,380.4428663253784,97.38204956054688]},{"page":371,"text":"20-14. Evacuation of equipment and wounded may create major problems for a linkup force. If supply","rect":[108.0,124.02520751953125,539.9615993499756,114.90701293945313]},{"page":371,"text":"routes are open, the normal evacuation procedures apply. When ground routes are not secure, helicopters","rect":[108.0,135.48809814453126,539.9018084983826,126.37992095947266]},{"page":371,"text":"may be used for evacuation of wounded while damaged equipment may be moved forward with the linkup","rect":[108.0,147.0111083984375,539.8708400726318,137.90292358398438]},{"page":371,"text":"forces until a suitable opportunity for evacuation is available.","rect":[108.0,158.5340576171875,353.20940685272219,149.42587280273438]},{"page":371,"text":"PREPARATION FOR A LINKUP","rect":[90.0,181.88218688964845,233.78257513046266,173.79598999023438]},{"page":371,"text":"20-15. Preparation creates conditions that improve friendly forces opportunities for success during the","rect":[108.0,201.7742919921875,540.1073274688721,192.66610717773438]},{"page":371,"text":"linkup. Units rehearse, refine the linkup plan, and conduct liaison activities prior to the execution for the","rect":[108.0,213.2772674560547,540.0240755157471,204.18911743164063]},{"page":371,"text":"linkup.","rect":[108.0,224.7401580810547,136.12514781951905,215.65200805664063]},{"page":371,"text":"Command and Control","rect":[90.0,247.17367553710938,199.4036361618042,239.5865020751953]},{"page":371,"text":"20-16. Staffs will walk the subordinate forces through a rehearsal of the operation. While this occurs, they","rect":[108.0,266.93426513671877,539.9729518890381,257.8260803222656]},{"page":371,"text":"will ensure that the control measures established for the operation are effective. Specifically, they will want","rect":[108.0,278.457275390625,540.0243296585084,269.3490905761719]},{"page":371,"text":"to monitor the progress of the subordinate forces as they maneuver along the axis of advance. Simultaneously,","rect":[108.0,289.9201354980469,540.0230665206909,280.81195068359377]},{"page":371,"text":"they will be prepared to issue a fragmentary order for a hasty defense or attack, depending on the situation.","rect":[108.0,301.4431457519531,539.9228467941284,292.3349609375]},{"page":371,"text":"Actions on contact and operating within the commander’s guidance are aspects of the operation that the","rect":[108.0,312.9661560058594,539.9753084259033,303.85797119140627]},{"page":371,"text":"commander will want to ensure that subordinates completely understand.","rect":[108.0,324.42901611328127,400.4909620285034,315.3208312988281]},{"page":371,"text":"Intelligence","rect":[90.0,349.04071044921877,144.31805192565919,339.235595703125]},{"page":371,"text":"20-17. The intelligence staffs will prepare for the linkup by war-gaming the operation with the commander.","rect":[108.0,366.59429931640627,539.9802198410034,357.4861145019531]},{"page":371,"text":"They will want to ensure that the unit is prepared for likely enemy’s actions, preventing the linkup from","rect":[107.9899673461914,378.05718994140627,540.0363440475464,368.9490051269531]},{"page":371,"text":"occurring. Additionally, they will want to practice the conduct of the linkup and subsequent operations within","rect":[107.97997283935547,389.5801696777344,540.0400295257568,380.47198486328127]},{"page":371,"text":"the context of the enemy situation.","rect":[107.97997283935547,401.1031799316406,246.3251142501831,391.9949951171875]},{"page":371,"text":"Movement and Maneuver","rect":[90.0,423.4427185058594,211.53872453308106,416.0312194824219]},{"page":371,"text":"20-18. There will probably be little time to conduct a combined arms rehearsal for movement and maneuver,","rect":[108.0,443.21429443359377,540.1473951339722,434.1061096191406]},{"page":371,"text":"especially due to the time-sensitive nature of the operation. The commanders will issue the order and attempt","rect":[108.0,454.7373046875,540.0924448928834,445.6291198730469]},{"page":371,"text":"to walk the executing forces through the operation. The rehearsal will stress the linkup and the coordination","rect":[108.0100326538086,466.2001647949219,539.9844264984131,457.09197998046877]},{"page":371,"text":"required to linkup without confusion. Moreover, it will ensure that each force is prepared to respond to a","rect":[108.01000213623047,477.703125,539.9546175079346,468.614990234375]},{"page":371,"text":"meeting engagement or enemy attack during the linkup. A commander’s primary concern is that subordinate","rect":[108.01001739501953,489.2461853027344,540.0215120391846,480.13800048828127]},{"page":371,"text":"forces focus on the complexity of the linkup.","rect":[108.0100326538086,500.70904541015627,287.3951063156128,491.6008605957031]},{"page":371,"text":"Fires","rect":[90.0,523.1027221679688,113.77938327407837,515.5155029296875]},{"page":371,"text":"20-19. The fire support coordination cell will ensure that the counterpart force in the linkup operation,","rect":[108.0,542.854248046875,539.9562330245972,533.76611328125]},{"page":371,"text":"whether moving or stationary, has the fire support plan. Specifically, the cell will want to ensure that both","rect":[108.0,554.337158203125,539.9811916351318,545.22900390625]},{"page":371,"text":"forces completely understand the fire control measures, coordinated fire lines and restricted fire lines. Further,","rect":[108.0,565.8601684570313,540.0740919113159,556.7520141601563]},{"page":371,"text":"if these control measures shift during the operation, the conditions and signals under which the change occurs","rect":[108.01002502441406,577.3831787109375,540.1425311546326,568.2750244140625]},{"page":371,"text":"must also be coordinated. Units position air defense assets to support the force as in a movement to contact","rect":[108.01998901367188,588.8260498046875,539.9811167678834,579.7379150390625]},{"page":371,"text":"or deliberate attack. Units will want to ensure that air defense will be prepared to protect the forces at the","rect":[108.01998901367188,600.3490600585938,540.0443391876221,591.2609252929688]},{"page":371,"text":"linkup point. This is where the two forces could collide and become congested.","rect":[108.01998901367188,611.89208984375,424.5148878097534,602.783935546875]},{"page":371,"text":"Sustainment","rect":[90.0,634.3046875,148.60354443740847,626.695556640625]},{"page":371,"text":"20-20. The sustainment elements will organize as they do for any other offensive operation. However, as","rect":[108.0,653.9942626953125,539.9583270530701,644.8861083984375]},{"page":371,"text":"mentioned earlier, they will carry additional supplies and material if they are conducting the linkup with an","rect":[107.98998260498047,665.5172729492188,539.9714870452881,656.4091186523438]},{"page":371,"text":"encircled force. Generally, this will include Class I, III, V, and VIII items. The logistic staffs will also ensure","rect":[107.9800033569336,676.9801635742188,540.0063753204346,667.8720092773438]},{"page":371,"text":"that each force understands the distribution plan, including traffic control. They will want to push as much","rect":[107.9799575805664,688.503173828125,539.8984279632568,679.39501953125]},{"page":371,"text":"material forward as possible during this operation. This is because the force will not only expend supplies as","rect":[107.9800033569336,700.0261840820313,540.0399920921326,690.9180297851563]},{"page":371,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":371,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":371,"text":"20-3","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":372,"text":"Chapter 20","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":372,"text":"it attacks, but once having conducted the linkup, it can expect to continue the mission (even if it is to remain","rect":[90.0,83.51434326171875,521.9722805023193,74.40616607666016]},{"page":372,"text":"in place and defend), which will require even more supplies.","rect":[90.0,94.95719909667969,331.9028272628784,85.86905670166016]},{"page":372,"text":"EXECUTION FOR A LINKUP","rect":[72.0,118.34220886230469,203.8425726890564,110.25601196289063]},{"page":372,"text":"20-21. The commander must be able to observe the progress of the operation. Generally, this means that","rect":[90.0,138.2943115234375,522.0421519241334,129.18612670898438]},{"page":372,"text":"the commander will follow the lead force. If a particular flank is of concern during the operation or a","rect":[90.0,149.81732177734376,521.9628572540283,140.70913696289063]},{"page":372,"text":"supporting attack is required to penetrate the enemy’s lines, then the unit will place a headquarters where it","rect":[90.0,161.28021240234376,521.9464487991334,152.17202758789063]},{"page":372,"text":"can observe the force’s secondary action. The commander and operations officer must remain in","rect":[89.98999786376953,172.80322265625,522.0351467132568,163.69503784179688]},{"page":372,"text":"communication throughout the operation, using the main command post if necessary to relay messages. The","rect":[89.98998260498047,184.326171875,521.9873933868408,175.21798706054688]},{"page":372,"text":"staff must maintain the tempo of the operation because a stalled force is difficult to get moving again. Forces","rect":[89.98999786376953,195.7890625,522.1215350608826,186.68087768554688]},{"page":372,"text":"must have the ability to move forward from time to time to continue the forward momentum on the operation.","rect":[89.98998260498047,207.31207275390626,522.0363721847534,198.20388793945313]},{"page":372,"text":"The staff monitors the actions of subordinate forces to ensure that the control measures established in","rect":[89.98994445800781,216.7509307861328,521.8757839202881,209.66677856445313]},{"page":372,"text":"planning the operation are still valid. The staff will issue a fragmentary order for changes as necessary.","rect":[89.98994445800781,230.2979736328125,501.45415782928469,221.18978881835938]},{"page":372,"text":"20-22. As the force begins to maneuver, the intelligence staffs will monitor the enemy situation. They will","rect":[89.98994445800781,247.82293701171876,522.0130991897584,238.71475219726563]},{"page":372,"text":"also monitor the situation facing the linkup force. Together this information will portray an overall enemy","rect":[89.98994445800781,259.28582763671877,521.9130764007568,250.17764282226563]},{"page":372,"text":"disposition which will greatly assist the intelligence staffs in calculating the enemy’s most probable course","rect":[89.98994445800781,270.808837890625,521.9802522735596,261.7006530761719]},{"page":372,"text":"of action. The intelligence staffs identify as far in advance as possible the direction, strength, and time of the","rect":[89.9899673461914,282.331787109375,521.9413728790283,273.2236022949219]},{"page":372,"text":"enemy counterattack. Likewise, they will also advise the commander of any identifiable weaknesses within","rect":[89.9899673461914,293.794677734375,521.8596706390381,284.6864929199219]},{"page":372,"text":"the counterattack.","rect":[89.9899673461914,303.29364013671877,161.1299695968628,296.2095031738281]},{"page":372,"text":"20-23. The initial conduct of the linkup will be identical to a movement to contact or deliberate attack,","rect":[89.9899673461914,322.8125915527344,522.0511426925659,313.7244567871094]},{"page":372,"text":"depending on the enemy situation. As the forces begin to maneuver, they will attempt to establish and","rect":[89.9899673461914,334.2955322265625,521.9433498382568,325.1873474121094]},{"page":372,"text":"maintain contact with their corresponding friendly force. Each force will monitor the progress of the other,","rect":[89.98999786376953,345.81854248046877,521.9804639816284,336.7103576660156]},{"page":372,"text":"adjusting the plan as necessary. The linkup point can be moved closer to the linkup force if it is unable to","rect":[89.98998260498047,357.341552734375,521.9059352874756,348.2233581542969]},{"page":372,"text":"travel at a speed proportionate with the plan. Similarly, the fire control measures will also adjust. As the two","rect":[89.98999786376953,368.8044128417969,522.0764675140381,359.68621826171877]},{"page":372,"text":"forces draw closer, higher headquarters controls the maneuvering forces. If possible, the forces will also","rect":[89.99002075195313,380.327392578125,521.9267482757568,371.2192077636719]},{"page":372,"text":"attempt to establish contact on a predesignated frequency to control the actual linkup. At this point, the","rect":[89.99002075195313,391.85040283203127,521.9695100860596,382.7422180175781]},{"page":372,"text":"momentum of the operation will slow to help prevent fratricide. The tradeoff may be that some enemy forces","rect":[89.99002075195313,403.31329345703127,522.0534808616638,394.2051086425781]},{"page":372,"text":"may slip between the two closing forces. Coordination signals identify each force as it approaches the linkup","rect":[89.99002075195313,414.8362731933594,521.9810695648193,405.72808837890627]},{"page":372,"text":"point.","rect":[89.98999786376953,426.3392333984375,113.07104778289795,417.2510986328125]},{"page":372,"text":"20-24. The fire control measures shift based on the progress of the forces and the enemy situation.","rect":[89.98998260498047,443.8241882324219,522.0134229660034,434.71600341796877]},{"page":372,"text":"Specifically, the coordinated fire lines, which will initially protect each force as it maneuvers, change to","rect":[89.9799575805664,455.3471984863281,521.8550319671631,446.239013671875]},{"page":372,"text":"protect the two forces as they begin to meet. Restricted fire lines prevent fratricide between the linkup forces.","rect":[89.9799575805664,466.8100891113281,521.9661817550659,457.701904296875]},{"page":372,"text":"Once the linkup has occurred, the stationary and linkup forces organize as per the higher headquarters’ plan","rect":[89.97997283935547,478.3330993652344,522.0060329437256,469.22491455078127]},{"page":372,"text":"for future operations. If possible, the air defense elements in both linkup forces should monitor the same early","rect":[89.97997283935547,489.8561096191406,522.0330715179443,480.7479248046875]},{"page":372,"text":"warning net. This is particularly important if the linkup is attempting to reach an encircled force. This unity","rect":[89.97997283935547,501.3190002441406,522.0081691741943,492.2108154296875]},{"page":372,"text":"of air defense effort will ensure the most appropriate use of weapon systems and reduce unnecessary","rect":[89.97997283935547,512.842041015625,521.9886989593506,503.73382568359377]},{"page":372,"text":"redundancy. Once the linkup is complete, air defense assets may be reorganized to support the next operation.","rect":[89.97997283935547,524.364990234375,521.9813184738159,515.2568359375]},{"page":372,"text":"20-25. The engineers will provide mobility support to the higher headquarters, probably as attached","rect":[89.97994995117188,541.8298950195313,522.0002346038818,532.7217407226563]},{"page":372,"text":"elements of the lead forces. Once the linkup is complete, engineers may assist in countermobility or","rect":[89.97994995117188,553.3529052734375,521.9406030235291,544.2447509765625]},{"page":372,"text":"survivability operations depending on the plan. Another task organization may be required on the objective","rect":[89.97994995117188,564.8759155273438,521.9653596954346,555.7576904296875]},{"page":372,"text":"to accomplish the new missions.","rect":[89.97994995117188,576.3187866210938,219.74297618865968,567.2306518554688]},{"page":372,"text":"20-26. Sustainment priorities focus on the forward movement of the force. Evacuation will be forward to","rect":[89.97994995117188,593.833740234375,521.9229640960693,584.74560546875]},{"page":372,"text":"logistics resupply points, reducing the turnaround time for recovery assets. As the linkup forces begin to","rect":[89.9800033569336,605.3765869140625,521.9311428070068,596.2684326171875]},{"page":372,"text":"close, sustainment assets must be as far forward as possible. Time is essential to the success of this operation,","rect":[89.9800033569336,616.8194580078125,522.0463819503784,607.7313232421875]},{"page":372,"text":"so assets must be prepared to keep pace with extremely fast operations. They must be prepared to address the","rect":[89.97994995117188,628.362548828125,522.0733308868408,619.25439453125]},{"page":372,"text":"immediate needs of the encircled force, to stockpile ammunition, or to move to other positions if the force","rect":[89.98999786376953,639.865478515625,521.8857698516846,630.77734375]},{"page":372,"text":"should revert to a defensive posture.","rect":[89.98998260498047,651.328369140625,234.99746227264405,642.240234375]},{"page":372,"text":"20-4","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":372,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":372,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":373,"text":"Linkup","rect":[510.47998046875,46.224021911621097,540.0386728515625,38.016021728515628]},{"page":373,"text":"TYPES OF LINKUPS","rect":[90.0,85.28965759277344,223.77600779724123,75.61549377441406]},{"page":373,"text":"20-27. The linkup force concentrates its efforts on completing the linkup. Linkup operations frequently will","rect":[108.0,105.59429931640625,540.0393443069459,96.48612213134766]},{"page":373,"text":"require a passage of lines. Regardless of the purpose of the linkup, the operation will take on one of two","rect":[108.0,117.1173095703125,539.9860744476318,108.0091323852539]},{"page":373,"text":"forms:","rect":[108.0,126.55615997314453,134.1782603225708,119.48204040527344]},{"page":373,"text":" Linkup of a moving force with a stationary force.","rect":[133.1999969482422,142.07427978515626,348.6431837081909,132.96609497070313]},{"page":373,"text":" Linkup of two moving forces.","rect":[133.1999969482422,155.57427978515626,270.9379835128784,146.46609497070313]},{"page":373,"text":"LINKUP OF A MOVING FORCE WITH A STATIONARY FORCE","rect":[90.0,178.97998046875,379.28336477279665,170.67599487304688]},{"page":373,"text":"20-28. To ensure the forces join without engaging one another, linkup points are at locations where the axis","rect":[108.0,198.894287109375,540.0873553733826,189.77609252929688]},{"page":373,"text":"of advance of the linkup force intersects the security elements of the stationary force. (See figure 20-1.) These","rect":[108.0,210.41729736328126,540.0752840118408,201.30911254882813]},{"page":373,"text":"points must be readily recognizable to both forces. Units plan alternate points in the event enemy activities","rect":[108.01000213623047,221.88018798828126,539.8940570335388,212.77200317382813]},{"page":373,"text":"cause linkup at places other than those planned. The number of linkup points selected depends on the terrain","rect":[108.01001739501953,233.38316345214845,540.0419826507568,224.29501342773438]},{"page":373,"text":"and number of routes used by the linkup force. Personnel in the linkup force must be thoroughly familiar","rect":[108.01001739501953,244.86602783203126,539.9472558555603,235.75784301757813]},{"page":373,"text":"with mutual identification procedures and plans for rapid passage of lines. Stationary forces assist in the","rect":[108.0,256.3890380859375,539.9742708282471,247.28085327148438]},{"page":373,"text":"linkup by opening lanes in minefields, breaching or removing selected obstacles, furnishing guides, and","rect":[108.0,267.91204833984377,539.9589748382568,258.8038635253906]},{"page":373,"text":"designating avenues of approach.","rect":[108.0,279.37493896484377,253.96938610076905,270.2666931152344]},{"page":373,"text":"Use of a common radio frequency enhances coordination and","rect":[260.704833984375,279.37493896484377,540.0035305023193,270.2666931152344]},{"page":373,"text":"responsiveness between forces.","rect":[108.0,290.8778991699219,233.26003551483155,281.7897644042969]},{"page":373,"text":"Figure 20-1. Linkup of a moving force with a stationary force","rect":[171.59693908691407,634.2131958007813,458.4014425201416,624.824462890625]},{"page":373,"text":"LINKUP OF TWO MOVING FORCES","rect":[90.0,663.5621948242188,259.73106956481936,655.4759521484375]},{"page":373,"text":"20-29. Linkup between two moving forces is one of the most difficult operations often conducted to","rect":[108.0,683.4542846679688,540.0203762054443,674.3461303710938]},{"page":373,"text":"complete the encirclement of an enemy force. Units plan primary and alternate linkup points for two moving","rect":[108.0,694.977294921875,539.9780178070068,685.869140625]},{"page":373,"text":"forces on boundaries where the two forces are expected to converge. As linking forces move closer, positive","rect":[108.0,706.5003051757813,540.0136995391846,697.3921508789063]},{"page":373,"text":"control must be coordinated to ensure they avoid firing on one another. This deliberate coordination ensures","rect":[108.01000213623047,717.9631958007813,540.1243426780701,708.8550415039063]},{"page":373,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":373,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":373,"text":"20-5","rect":[503.9940185546875,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":374,"text":"Chapter 20","rect":[72.0,46.224021911621097,118.45530157470704,37.90802001953125]},{"page":374,"text":"the enemy does not escape between the two forces. Leading elements of each force should monitor a common","rect":[90.0,83.51434326171875,522.0692043304443,74.40616607666016]},{"page":374,"text":"radio network. Figure 20-2 depicts a linkup of two moving forces.","rect":[90.0,94.97723388671875,354.4078321456909,85.86905670166016]},{"page":374,"text":"Figure 20-2. Linkup of two moving forces","rect":[199.49856567382813,430.79754638671877,394.56593226623536,421.4088134765625]},{"page":374,"text":"ACTIONS FOLLOWING LINKUP","rect":[72.0,460.1622314453125,222.62257146835328,451.90802001953127]},{"page":374,"text":"20-30. When the linkup is made, the linkup force may join the stationary force, or it may pass through or","rect":[90.0,480.1142883300781,522.0322167930603,470.99609375]},{"page":374,"text":"around to continue the attack. If the linkup force is to continue operations in conjunction with the stationary","rect":[90.0,491.57720947265627,521.9776515960693,482.458984375]},{"page":374,"text":"force, a single commander for the overall force should be designated. The linkup force may immediately pass","rect":[90.0,503.10015869140627,522.0554950218201,493.9919738769531]},{"page":374,"text":"through the perimeter of the stationary forces, be assigned objectives within the perimeter, or be assigned","rect":[89.9999771118164,514.6231689453125,521.9949855804443,505.5049743652344]},{"page":374,"text":"objectives outside the perimeter, depending on its mission. Plans for these operations must be made in","rect":[89.9999771118164,526.0860595703125,521.9601955413818,516.9678344726563]},{"page":374,"text":"advance.","rect":[89.99996185302735,535.5849609375,125.32246685028076,528.5008544921875]},{"page":374,"text":"20-6","rect":[72.1199951171875,754.1790161132813,90.07499914550782,747.6090087890625]},{"page":374,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":374,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":375,"text":"Appendix A","rect":[281.6400146484375,125.65198516845703,348.32400366210939,114.7079849243164]},{"page":375,"text":"Tactical Control Measures","rect":[215.39999389648438,146.99623107910157,414.60224964904787,135.15744018554688]},{"page":375,"text":"This appendix expands the control measure discussion from Chapter 1 and explains","rect":[126.0,184.73876953125,503.9656473121643,174.7799072265625]},{"page":375,"text":"maneuver control measures, fire support coordination measures, and airspace","rect":[126.01099395751953,197.45361328125,504.0415626678467,187.4947509765625]},{"page":375,"text":"coordination measures common to offensive, defensive, and enabling operations.","rect":[126.01099395751953,210.0806121826172,503.9974412918091,200.09979248046876]},{"page":375,"text":"These control measures apply to both automated and hand drawn graphics or symbols,","rect":[126.01097106933594,222.7405242919922,503.95465564727786,212.75970458984376]},{"page":375,"text":"displays, and overlays. Most tactical control measures are used in both planning","rect":[126.01097106933594,235.40049743652345,504.10950660705569,225.419677734375]},{"page":375,"text":"products and operation overlays.","rect":[126.01097106933594,248.06040954589845,269.6030321121216,238.07958984375]},{"page":375,"text":"GENERAL CONSIDERATIONS FOR CONTROL MEASURES","rect":[90.0,271.4696960449219,478.90132823181156,261.78155517578127]},{"page":375,"text":"A-1. Units use control measures to assign responsibilities, coordinate the warfighting functions, control","rect":[108.0,291.59429931640627,540.0323862991334,282.4861145019531]},{"page":375,"text":"operations, and prevent fratricide. Well-conceived control measures facilitate current and future operations.","rect":[108.01001739501953,303.0371398925781,540.0484571456909,293.9490051269531]},{"page":375,"text":"Throughout an operation, commanders adjust control measures as necessary to maintain synchronization and","rect":[108.01001739501953,314.5801696777344,540.0535182952881,305.46197509765627]},{"page":375,"text":"ensure mission accomplishment.","rect":[108.02002716064453,326.0831298828125,238.2680311203003,316.9949951171875]},{"page":375,"text":"A-2. Control measures apply to all forces. Control measures are used throughout the operations process and","rect":[108.02002716064453,343.56805419921877,540.0643215179443,334.4598693847656]},{"page":375,"text":"are graphically depicted within digital systems and on analog map overlays. Commanders ensure that all","rect":[108.03004455566406,355.0910339355469,540.0211558303834,345.98284912109377]},{"page":375,"text":"higher echelon control measures are incorporated into their units’ orders and common operational picture.","rect":[108.03004455566406,366.6140441894531,539.9521436691284,357.505859375]},{"page":375,"text":"Subordinate units develop additional control measures to command and control their forces and ensure those","rect":[108.03004455566406,378.0568542480469,540.0420198516846,368.9687194824219]},{"page":375,"text":"control measures are shared with adjacent, higher, and subordinate units and staffs. They reference the control","rect":[108.03004455566406,389.59991455078127,540.0621714553834,380.4817199707031]},{"page":375,"text":"measures established by higher headquarters when making reports to that headquarters.","rect":[108.03004455566406,401.1229248046875,457.0880079269409,392.0147399902344]},{"page":375,"text":"A-3. Units generally establish and follow standard operating procedures for naming common control","rect":[108.03004455566406,418.5877685546875,540.0057749710084,409.4795837402344]},{"page":375,"text":"measures. During operations, units follow the timelines or procedures prescribed by their higher headquarters","rect":[108.04010009765625,430.11077880859377,540.0565936546326,421.0025939941406]},{"page":375,"text":"regarding control measure updates. For example, a division artillery headquarters will normally establish","rect":[108.05010223388672,441.6337890625,540.0544338226318,432.5256042480469]},{"page":375,"text":"rhythmic times for subordinate units to provide updates to their current and planned fire support coordination","rect":[108.05010223388672,453.0966796875,540.0219631195068,443.9884948730469]},{"page":375,"text":"measures.","rect":[108.05010223388672,462.5956115722656,147.8074598312378,457.84613037109377]},{"page":375,"text":"A-4. The sections below consist of common maneuver control measures, fire support coordination","rect":[108.05010223388672,482.1246032714844,540.0446071624756,473.0364074707031]},{"page":375,"text":"measures, airspace coordination measures, and obstacle control measures. These control measures are not a","rect":[108.06009674072266,493.5874938964844,540.1039095001221,484.4993591308594]},{"page":375,"text":"comprehensive listing of all possible control measures a unit may employ during operations. (See FM 1-02.2","rect":[108.06011962890625,505.1305236816406,540.0273342132568,496.0223388671875]},{"page":375,"text":"for a listing of all control measures.)","rect":[108.06012725830078,516.6535034179688,253.96135497665407,507.5453186035156]},{"page":375,"text":"MOVEMENT AND MANEUVER CONTROL MEASURES","rect":[90.0,539.9697265625,450.7805701751709,530.2955322265625]},{"page":375,"text":"A-5. Maneuver control measures are used by maneuver forces and headquarters at all echelons to control","rect":[108.0,560.0942993164063,539.9814219436646,550.9861450195313]},{"page":375,"text":"the movement and maneuver of forces. Paragraphs A-7 through A-41 list and describe control measures","rect":[108.01001739501953,571.5571899414063,540.0543963890076,562.4490356445313]},{"page":375,"text":"commonly used during offensive, defensive, and enabling operations. Paragraphs A-44 through A-61 list and","rect":[107.99996185302735,583.0802001953125,540.0543727874756,573.9720458984375]},{"page":375,"text":"describe control measures commonly used in offensive operations while paragraphs A-62 through A-79","rect":[108.01998901367188,594.5430908203125,540.1124782562256,585.4349365234375]},{"page":375,"text":"include those control measures that are only applicable to defensive operations. Paragraphs A-80 through A-","rect":[108.02002716064453,606.0660400390625,540.0223901329041,596.9578857421875]},{"page":375,"text":"88 include direct fire control measures.","rect":[108.0501480102539,615.5650024414063,264.75188732147219,608.4808959960938]},{"page":375,"text":"COMMON CONTROL MEASURES","rect":[90.0,640.968017578125,247.9014949798584,632.6759643554688]},{"page":375,"text":"A-6. Many graphical control measures are applicable to offensive, defensive, and enabling operations. The","rect":[108.0,660.8342895507813,540.0763826446533,651.7261352539063]},{"page":375,"text":"following are control measures discussed throughout FM 3-90. However, this list is not inclusive of all","rect":[108.00994110107422,672.3572998046875,540.0192637405396,663.2491455078125]},{"page":375,"text":"control measures. For a comprehensive listing of all approved control measures see FM 1-02.2.","rect":[108.00991821289063,683.8803100585938,489.1155958175659,674.7721557617188]},{"page":375,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":375,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":375,"text":"A-1","rect":[507.47698974609377,754.0800170898438,521.9579794921875,747.6090087890625]},{"page":376,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":376,"text":"Area of Operations","rect":[72.0,84.59874725341797,162.43238315200805,74.81556701660156]},{"page":376,"text":"A-7. An area of operations is an operational area defined by a commander for land and maritime forces that","rect":[90.0,102.11431884765625,522.0373911819459,93.00614166259766]},{"page":376,"text":"should be large enough to accomplish their missions and protect their forces (JP 3-0). An area of operations","rect":[90.0100326538086,113.6373291015625,522.0604388694763,104.5291519165039]},{"page":376,"text":"(AO) is always completed enclosed by boundaries. An AO could consist of a singular boundary. An AO can","rect":[90.00003814697266,125.16033935546875,521.9576930999756,116.05216217041016]},{"page":376,"text":"also be enclosed with forward, rear, and lateral boundaries as shown in figure A-1. Figure A-2 depicts a","rect":[90.00003814697266,136.6231689453125,521.9945955352783,127.5149917602539]},{"page":376,"text":"division AO with subordinate BCT assigned areas. See paragraph 1-56 for more information on an AO.","rect":[89.98999786376953,148.14617919921876,504.0314893722534,139.03799438476563]},{"page":376,"text":"A-2","rect":[72.1199951171875,754.0800170898438,86.60099249267579,747.6090087890625]},{"page":376,"text":"Figure A-1. AO with forward, rear, and lateral boundaries","rect":[162.46466064453126,455.289306640625,431.4876241607666,445.90057373046877]},{"page":376,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":376,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":377,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":377,"text":"Figure A-2. Division AO with single boundary and contiguous BCT assigned areas","rect":[119.94000244140625,423.59417724609377,510.0656270904541,414.2054443359375]},{"page":377,"text":"Assembly Areas","rect":[90.0,454.2206726074219,165.42600497817993,444.4375]},{"page":377,"text":"A-8. An assembly area is an area a unit occupies to prepare for an operation. Units of all types and","rect":[108.0,471.71429443359377,540.0243434906006,462.6061096191406]},{"page":377,"text":"echelons can be assigned assembly areas. In figure A-3 on page A-4, are examples of multiple units","rect":[108.0,483.2373046875,540.0504291038513,474.1291198730469]},{"page":377,"text":"occupying one assembly area is a graphical shortcut taken when the map scale makes depiction of multiple","rect":[107.99002075195313,494.7602844238281,539.9883699493408,485.652099609375]},{"page":377,"text":"assembly areas unreadable. In reality, the higher echelon commander would subdivide ASSEMBLY AREA","rect":[107.98004913330078,506.2231750488281,540.0224652328491,497.114990234375]},{"page":377,"text":"THOMAS into two smaller assembly areas, one for each unit. A unit assembly area is normally within the","rect":[107.98008728027344,517.7462158203125,539.9322786407471,508.6380310058594]},{"page":377,"text":"assigned area of a higher headquarters and are typically noncontiguous. This means that a unit has the same","rect":[107.98008728027344,529.2691650390625,539.9262971954346,520.1610107421875]},{"page":377,"text":"responsibilities within its assigned assembly area as it has for any other assigned area.","rect":[107.98008728027344,540.7320556640625,451.8242139816284,531.6239013671875]},{"page":377,"text":"A-9. A tactical assembly area is an area that is generally out of the reach of light artillery and the location","rect":[107.98008728027344,558.257080078125,539.9461574554443,549.14892578125]},{"page":377,"text":"where units make final preparations (precombat checks and inspections) and rest, prior to moving to the line","rect":[107.98008728027344,569.780029296875,539.9880647735596,560.671875]},{"page":377,"text":"of departure (JP 3-35). Tactical assembly areas are where enemy contact is likely and the commitment of a","rect":[107.98008728027344,581.242919921875,539.9077425079346,572.134765625]},{"page":377,"text":"unit into combat is possible or anticipated. Examples of tactical assembly areas include locations occupied","rect":[107.96990203857422,592.7659301757813,539.9923000335693,583.6577758789063]},{"page":377,"text":"by units designated as tactical reserves, by units after completing a rearward passage of lines, temporarily by","rect":[107.96995544433594,604.2889404296875,539.9968166351318,595.1807861328125]},{"page":377,"text":"units during tactical movement, and by units during reconstitution. Units in tactical assembly areas are","rect":[107.96995544433594,615.7518310546875,539.9761018829346,606.6436767578125]},{"page":377,"text":"typically preparing to move forward to execute a forward passage of lines followed by offensive operations","rect":[107.96990203857422,627.2747802734375,540.0841815452576,618.1666259765625]},{"page":377,"text":"or have been assigned a reserve mission by their higher commander.","rect":[107.96994018554688,638.7978515625,381.55715465545657,629.689697265625]},{"page":377,"text":"A-10. Planning for, occupying, and departing an assembly area is difficult and time consuming and requires","rect":[107.96994018554688,656.2626953125,539.9652850608826,647.154541015625]},{"page":377,"text":"careful consideration. Ideally, an assembly area provides—","rect":[107.96995544433594,667.78564453125,345.0832328796387,658.677490234375]},{"page":377,"text":" Concealment from air and ground observation.","rect":[133.1999969482422,681.2343139648438,338.38369274139407,672.1261596679688]},{"page":377,"text":" Adequate entrances, exits, and internal routes.","rect":[133.1999969482422,694.7142944335938,335.5559034347534,685.6261596679688]},{"page":377,"text":" Space for dispersion","rect":[133.1999969482422,708.2142944335938,232.82694053649903,699.1261596679688]},{"page":377,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":377,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":377,"text":"A-3","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.6090087890625]},{"page":378,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":378,"text":"","rect":[115.19999694824219,80.78548431396485,121.16105696249008,76.09324645996094]},{"page":378,"text":"","rect":[115.19999694824219,94.28548431396485,121.16105696249008,89.59324645996094]},{"page":378,"text":"","rect":[115.19999694824219,107.78548431396485,121.16105696249008,103.09324645996094]},{"page":378,"text":"","rect":[115.19999694824219,132.74545288085938,121.16105696249008,128.05320739746095]},{"page":378,"text":"","rect":[115.19999694824219,146.24545288085938,121.16105696249008,141.55320739746095]},{"page":378,"text":"","rect":[115.19999694824219,159.74545288085938,121.16105696249008,155.05320739746095]},{"page":378,"text":"Enough distance from other areas and units to preclude mutual interference.","rect":[133.1999969482422,83.51434326171875,436.66277599334719,74.40616607666016]},{"page":378,"text":"Cover from direct fire.","rect":[133.1999969482422,95.00032806396485,223.78783702850343,87.90616607666016]},{"page":378,"text":"Good drainage and soil conditions that can sustain unit vehicles and individual Soldier","rect":[133.1999969482422,110.51434326171875,522.0558984336853,101.40616607666016]},{"page":378,"text":"movements.","rect":[133.1999969482422,119.95319366455078,181.8440809249878,113.87105560302735]},{"page":378,"text":"Terrain masking of electromagnetic signatures.","rect":[133.1999969482422,135.47430419921876,321.6982374191284,126.36612701416016]},{"page":378,"text":"Terrain allowing observation of ground and air avenues into the assembly area.","rect":[133.1999969482422,148.97430419921876,449.86516857147219,139.86611938476563]},{"page":378,"text":"A location beyond enemy medium artillery range.","rect":[133.1999969482422,162.47430419921876,332.86858654022219,153.36611938476563]},{"page":378,"text":"A-4","rect":[72.1199951171875,754.0800170898438,86.60099249267579,747.6090087890625]},{"page":378,"text":"Figure A-3. Assembly areas","rect":[231.41604614257813,436.7918395996094,362.6299581451416,427.4932861328125]},{"page":378,"text":"A-11. The proper location and size of assembly areas contributes significantly to both security and flexibility.","rect":[89.9937515258789,460.30877685546877,522.0317945480347,451.2005920410156]},{"page":378,"text":"The location should facilitate future operations, so movement to subsequent positions can take place smoothly","rect":[90.00376892089844,471.77166748046877,522.0649318695068,462.6634826660156]},{"page":378,"text":"and quickly by concealed routes. An assembly area must be large enough to accommodate the type and size","rect":[90.00376892089844,483.2946472167969,521.9438753204346,474.18646240234377]},{"page":378,"text":"of the force occupying it. Generally, dismounted infantry assembly areas are smaller than those assigned to","rect":[90.00376892089844,494.7575378417969,521.9816799163818,485.64935302734377]},{"page":378,"text":"armored or Stryker units. Because of their smaller signature, infantry units can use assembly areas closer to","rect":[90.00376892089844,506.2805480957031,521.8980617523193,497.17236328125]},{"page":378,"text":"enemy forces than armored and Stryker units without excessive risk of enemy detection. The tactical mobility","rect":[90.00376892089844,517.8035888671875,521.9558010101318,508.6954040527344]},{"page":378,"text":"of armored and Stryker units allows them to occupy assembly areas at a greater distance from the LD than","rect":[90.00376892089844,529.2664794921875,521.9722805023193,520.1583251953125]},{"page":378,"text":"infantry units.","rect":[90.00376892089844,540.7894897460938,146.14882946014405,531.6813354492188]},{"page":378,"text":"A-12. There are three methods to organize an assembly area: as a single area, as part of a large assembly area,","rect":[90.00376892089844,558.314453125,522.0704298019409,549.206298828125]},{"page":378,"text":"or dispersed. The biggest difference between the three methods is the amount of security required since every","rect":[90.01378631591797,569.77734375,522.0203151702881,560.669189453125]},{"page":378,"text":"assembly area inherently conducts a perimeter defense. See Figures A-4, A-5, and A-6 for examples of each","rect":[90.01380157470703,581.30029296875,522.0551662445068,572.192138671875]},{"page":378,"text":"method.","rect":[90.03384399414063,590.7992553710938,122.5988416671753,583.7151489257813]},{"page":378,"text":"A-13. The single area method configures a unit in a perimeter defense with maneuver units deployed along","rect":[90.03384399414063,610.2882080078125,521.9828395843506,601.1800537109375]},{"page":378,"text":"the entire perimeter. Command and control, sustainment, and any other supporting units are located within","rect":[90.04389953613281,621.8111572265625,522.0198879241943,612.7030029296875]},{"page":378,"text":"the interior of the assembly area. Figure A-4 is an example of a single area assembly area for a battalion task","rect":[90.04385375976563,633.3341674804688,522.0692653656006,624.2260131835938]},{"page":378,"text":"force.","rect":[90.04386138916016,642.7730102539063,113.12993907928467,635.6989135742188]},{"page":378,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":378,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":379,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":379,"text":"Figure A-4. Single assembly area method","rect":[217.13999938964845,262.31414794921877,412.8546421546936,252.9254150390625]},{"page":379,"text":"A-14. A unit can also occupy a portion of a larger assembly area. This typically occurs when a subordinate","rect":[107.99211120605469,285.7709655761719,539.9503450469971,276.66278076171877]},{"page":379,"text":"formation occupies a portion of their higher headquarters assembly area. With this method, a unit has","rect":[108.00213623046875,297.2939758300781,540.0473163108826,288.185791015625]},{"page":379,"text":"boundaries with adjacent units and may only have a portion of their assembly area focused on a perimeter.","rect":[108.00213623046875,308.81695556640627,539.9260206222534,299.6987609863281]},{"page":379,"text":"See figure A-5 for an example of an armor battalion occupying a portion of a larger assembly area.","rect":[108.00213623046875,320.27984619140627,503.44756603240969,311.1716613769531]},{"page":379,"text":"Figure A-5. Portion of a larger assembly area method","rect":[189.12405395507813,573.9562377929688,440.89559674453735,564.5675048828125]},{"page":379,"text":"A-15. A unit may also use a dispersed method to assign assembly areas. In this method subordinate units are","rect":[108.00215148925781,597.4130249023438,540.0655794219971,588.3048706054688]},{"page":379,"text":"assigned individual assembly areas. These subordinate units maintain their own 360-degree security. Similar","rect":[108.0121841430664,608.93603515625,539.9814355430603,599.827880859375]},{"page":379,"text":"to the single assembly area method, maneuver units occupy perimeter assembly areas with command and","rect":[108.00218963623047,620.4590454101563,539.9839382171631,611.3508911132813]},{"page":379,"text":"control, sustainment, and other units located within the interior. See figure A-6 on page A-6 for an example","rect":[108.00218963623047,631.9219360351563,539.9824495391846,622.8137817382813]},{"page":379,"text":"of the dispersed method by a division.","rect":[107.97216796875,643.4449462890625,260.53667736053469,634.3367919921875]},{"page":379,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":379,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":379,"text":"A-5","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.635986328125]},{"page":380,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":380,"text":"Figure A-6. Dispersed assembly area method","rect":[189.95999145507813,352.3141784667969,404.05135846328735,343.015625]},{"page":380,"text":"Boundaries","rect":[72.0,380.6627502441406,125.76136264419556,373.0755920410156]},{"page":380,"text":"A-16. A boundary is a line that delineates surface areas for the purpose of facilitating coordination and","rect":[90.0,400.4342956542969,522.0004177093506,391.32611083984377]},{"page":380,"text":"deconfliction of operations between adjacent units, formations, or areas (JP 3-0). Boundaries are normally","rect":[90.0,411.9573059082031,521.9531764984131,402.839111328125]},{"page":380,"text":"drawn along identifiable terrain features and are used to delineate responsibility between adjacent units and","rect":[89.99002075195313,423.420166015625,521.9635524749756,414.3019714355469]},{"page":380,"text":"between higher and lower echelon headquarters. Boundaries should not split responsibilities for key or","rect":[89.98999786376953,434.94317626953127,521.9631249961853,425.8349914550781]},{"page":380,"text":"decisive terrain, roads, rivers, or railways. Within their assigned areas, units may maneuver within the overall","rect":[89.9899673461914,446.4661865234375,522.0865244827271,437.3580017089844]},{"page":380,"text":"plan without close coordination with neighboring units unless otherwise restricted. Direct fire may be placed","rect":[89.9899673461914,457.9290466308594,522.0132961273193,448.82086181640627]},{"page":380,"text":"across boundaries on clearly identified enemy targets without prior coordination, provided friendly forces are","rect":[89.98994445800781,469.4520568847656,522.0180330352783,460.3438720703125]},{"page":380,"text":"not endangered. Indirect fire also may be used after prior coordination with the adjacent unit. Commanders","rect":[89.98994445800781,480.9750671386719,522.0543963890076,471.85687255859377]},{"page":380,"text":"adjust boundaries as necessary in response to the evolving tactical situation.","rect":[89.99996185302735,492.43792724609377,393.51101207733157,483.3197326660156]},{"page":380,"text":"A-17. Boundaries by themselves or with other control can be used to define a unit’s assigned area: area of","rect":[89.99996185302735,509.9629211425781,521.9960839805603,500.854736328125]},{"page":380,"text":"operations, zone, or sector. A forward boundary is a boundary that delineates the forward edge of a unit’s","rect":[90.00997924804688,521.4859008789063,522.1044452171326,512.3777465820313]},{"page":380,"text":"area of operation. A lateral boundary is a boundary defining the left or right limit of a unit’s assigned","rect":[90.02001190185547,532.9487915039063,522.0573873443603,524.0009155273438]},{"page":380,"text":"area. A rear boundary is a boundary that delineates the rearward limits of a unit’s assigned area. The","rect":[90.00999450683594,544.4718017578125,522.0703401641846,535.3636474609375]},{"page":380,"text":"forward boundary is the farthest limit in the direction of the enemy, of an organization’s responsibility. The","rect":[90.0,555.9948120117188,522.0602693634033,546.8866577148438]},{"page":380,"text":"rear boundary also defines the start of the next echelon’s rear area. Figure A-1 on page A-2 depicts an AO","rect":[89.98999786376953,567.4577026367188,521.9469037094116,558.3495483398438]},{"page":380,"text":"with forward, rear, and lateral boundaries.","rect":[89.9800033569336,577.0,258.24380016326907,569.87255859375]},{"page":380,"text":"A-6","rect":[72.1199951171875,754.1790161132813,86.60099249267579,747.6090087890625]},{"page":380,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":380,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":381,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":381,"text":"Checkpoint","rect":[90.0,84.59874725341797,144.34222241592409,74.81556701660156]},{"page":381,"text":"A-18. A checkpoint is a predetermined point on the ground used to","rect":[108.0,102.11431884765625,396.08107566833498,93.16645812988281]},{"page":381,"text":"control movement, tactical maneuver, and orientation. Checkpoints","rect":[108.01002502441406,113.61729431152344,396.13615298080449,104.5291519165039]},{"page":381,"text":"are used by all units in all types of operations. Units may use checkpoints","rect":[108.02006530761719,125.16033935546875,396.1040790061951,116.05216217041016]},{"page":381,"text":"to supplement or as substitutes for phase lines. Units can also use a","rect":[108.02006530761719,136.60313415527345,396.0830354766846,127.5149917602539]},{"page":381,"text":"checkpoint as a fire control measure in lieu of the preferred control","rect":[108.02006530761719,148.1261444091797,396.08518170928957,139.03799438476563]},{"page":381,"text":"measure, a TRP. Figure A-7 depicts CHECKPOINT 13.","rect":[108.02006530761719,159.669189453125,332.46804332733157,150.56100463867188]},{"page":381,"text":"Contact Point","rect":[90.0,182.07369995117188,155.08613415908816,174.4755401611328]},{"page":381,"text":"A-19. In land warfare, a contact point is a point on the terrain, easily","rect":[108.0,201.7742919921875,396.1371669769287,192.66610717773438]},{"page":381,"text":"identifiable, where two or more units are required to make contact (JP 3-","rect":[108.0,213.2772674560547,396.09505248641968,204.18911743164063]},{"page":381,"text":"Figure A-7. Checkpoint 13","rect":[410.4599914550781,206.4542236328125,533.8733053131103,197.06549072265626]},{"page":381,"text":"50). A commander establishes a contact point where a PL crosses a lateral boundary or another identifiable","rect":[108.0,224.76019287109376,540.0002718048096,215.65200805664063]},{"page":381,"text":"terrain feature as a technique to ensure coordination between two units. The commander provides a date-time","rect":[107.98998260498047,236.26316833496095,540.0554475860596,227.17501831054688]},{"page":381,"text":"group to indicate when to make that physical contact. Figure A-8","rect":[107.98998260498047,247.80615234375,391.63722801208498,238.69796752929688]},{"page":381,"text":"depicts CONTACT POINT 8.","rect":[107.98998260498047,259.2489929199219,227.97947216033936,250.16085815429688]},{"page":381,"text":"A-20. If both units are moving or are stationary, the mutual higher","rect":[108.0,276.7940673828125,391.6070764122009,267.6858825683594]},{"page":381,"text":"echelon commander normally designates the location of contact points","rect":[108.0100326538086,288.3170471191406,391.6802813987732,279.2088623046875]},{"page":381,"text":"and times of contact. When one unit is stationary, its commander","rect":[108.0,299.7799072265625,391.7124230918884,290.6717224121094]},{"page":381,"text":"normally designates the location of the contact point and the meeting","rect":[108.0,311.30291748046877,391.6722927093506,302.1947326660156]},{"page":381,"text":"time and transmits this information to the commander of the moving","rect":[108.0,322.825927734375,391.6232204437256,313.7177429199219]},{"page":381,"text":"unit.","rect":[108.0,332.2647399902344,126.1051435470581,325.18060302734377]},{"page":381,"text":"Coordination Point","rect":[90.0,356.6737365722656,180.76505871963503,349.0755920410156]},{"page":381,"text":"Figure A-8. Contact point 8","rect":[406.0199890136719,344.6941833496094,533.7940206451416,335.3054504394531]},{"page":381,"text":"A-21. A coordination point is a point that indicates a specific","rect":[108.0,376.41424560546877,375.00036335754398,367.4864501953125]},{"page":381,"text":"location for the coordination of tactical actions between","rect":[108.01000213623047,385.8731384277344,375.0731954498291,378.9493408203125]},{"page":381,"text":"adjacent units. It is used when a PL crosses a lateral boundary","rect":[108.01001739501953,399.420166015625,374.9628200531006,390.3119812011719]},{"page":381,"text":"between two units or whenever a boundary crosses the forward","rect":[108.01001739501953,410.94317626953127,375.0210781097412,401.8349914550781]},{"page":381,"text":"edge of the battle area (FEBA). The difference between a contact","rect":[108.01001739501953,422.40606689453127,375.00891828155519,413.2978820800781]},{"page":381,"text":"point and a coordination point is that the establishing headquarters","rect":[107.99999237060547,433.9290466308594,375.05509829330449,424.82086181640627]},{"page":381,"text":"does not dictate the exact time when contact is required. Figure A-9","rect":[107.99999237060547,445.4520568847656,375.0830898284912,436.3438720703125]},{"page":381,"text":"depicts a coordination point.","rect":[107.98999786376953,456.8948669433594,221.91637706756593,447.80670166015627]},{"page":381,"text":"Figure A-9. Coordination point","rect":[389.3999938964844,458.33416748046877,533.8663232383728,448.9454345703125]},{"page":381,"text":"Forward Line of Own Troops","rect":[90.0,481.4987487792969,229.3032937965393,471.715576171875]},{"page":381,"text":"A-22. The forward line of own troops is a line","rect":[108.0,499.0743103027344,297.4912386016846,489.96612548828127]},{"page":381,"text":"that indicates the most forward positions of","rect":[107.99999237060547,510.51715087890627,297.47624755477906,501.58935546875]},{"page":381,"text":"friendly forces in any kind of military","rect":[107.99999237060547,522.0601806640625,297.52123069763186,513.1123046875]},{"page":381,"text":"operation at a specific time. The forward line","rect":[107.99999237060547,533.5631713867188,297.47115803527836,524.4750366210938]},{"page":381,"text":"of own troops (FLOT) normally identifies the","rect":[107.98997497558594,545.0460815429688,297.46517658996586,535.9379272460938]},{"page":381,"text":"forward location of security forces. In the","rect":[107.97994995117188,556.569091796875,297.47518635559086,547.4609375]},{"page":381,"text":"defense, it may be beyond, at, or short of the","rect":[107.98997497558594,568.092041015625,297.4652376251221,558.98388671875]},{"page":381,"text":"FEBA. It does not include small, long-range","rect":[107.98997497558594,579.554931640625,297.5432710723877,570.44677734375]},{"page":381,"text":"reconnaissance assets and similar stay-behind","rect":[107.98999786376953,591.0779418945313,297.4290065765381,581.9697265625]},{"page":381,"text":"forces. Friendly forces forward of the FLOT","rect":[107.9800033569336,602.6009521484375,297.43212628555298,593.4927978515625]},{"page":381,"text":"may ","rect":[107.9799575805664,614.0638427734375,127.70533275604248,606.0]},{"page":381,"text":"have ","rect":[134.13816833496095,613.0,155.48278331756593,604.9556884765625]},{"page":381,"text":"a ","rect":[161.91561889648438,613.0,168.80036449432374,606.0]},{"page":381,"text":"restrictive ","rect":[175.23321533203126,613.0,217.69800853729249,604.9556884765625]},{"page":381,"text":"fire ","rect":[224.13084411621095,613.0,240.49550914764405,604.9556884765625]},{"page":381,"text":"coordination","rect":[246.92837524414063,613.0,297.4791774749756,604.9556884765625]},{"page":381,"text":"measure, such as a restrictive fire area (RFA),","rect":[107.9799575805664,625.5667724609375,297.4982557296753,616.4786376953125]},{"page":381,"text":"placed around them to preclude friendly fire","rect":[107.96995544433594,637.10986328125,297.4250764923096,628.001708984375]},{"page":381,"text":"incidents.","rect":[107.96995544433594,646.5486450195313,146.5950574874878,639.4645385742188]},{"page":381,"text":"An enemy FLOT indicates the","rect":[154.41265869140626,648.5726928710938,297.4521761016846,639.4645385742188]},{"page":381,"text":"forward most position of enemy forces. Figure","rect":[107.96995544433594,660.095703125,297.5096712188721,650.987548828125]},{"page":381,"text":"A-10 depicts the symbol for the FLOT.","rect":[107.96990203857422,671.6187133789063,264.91424083709719,662.5105590820313]},{"page":381,"text":"Figure A-10. Forward line of own troops","rect":[328.3799743652344,663.774169921875,517.2549886627197,654.3854370117188]},{"page":381,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":381,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":381,"text":"A-7","rect":[507.47698974609377,754.0800170898438,521.9579794921875,747.635986328125]},{"page":382,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":382,"text":"Gap","rect":[72.0,84.59874725341797,92.14500273132325,74.81556701660156]},{"page":382,"text":"A-23. A gap is an area free of obstacles that enables forces to maneuver in a","rect":[90.0,102.11431884765625,421.38646507263186,93.16645812988281]},{"page":382,"text":"tactical formation. It is wide enough to allow a friendlyforce to pass through while","rect":[90.0,113.6373291015625,421.46764851379398,104.5291519165039]},{"page":382,"text":"dispersed in a tactical formation. The presence of gaps prevents inadvertent","rect":[90.01005554199219,125.16033935546875,421.47580670928957,116.05216217041016]},{"page":382,"text":"concentrations of Soldiers and equipment around the entry points of lanes. Figure","rect":[90.01005554199219,136.6231689453125,421.42660237121586,127.5149917602539]},{"page":382,"text":"A-11 depicts the graphic control measure for a gap.","rect":[90.01005554199219,148.14617919921876,295.7937879562378,139.03799438476563]},{"page":382,"text":"Infiltration Lane","rect":[72.0,182.06272888183595,151.14822160339356,174.4755401611328]},{"page":382,"text":"Figure A-11. Gap","rect":[435.7799987792969,179.21417236328126,515.8227818031311,169.825439453125]},{"page":382,"text":"A-24. An infiltration lane is a control measure that coordinates","rect":[90.0,201.7742919921875,370.3795917015076,192.82643127441407]},{"page":382,"text":"forward and lateral movement of infiltrating units and fixes fire","rect":[90.02002716064453,213.29730224609376,370.3548860626221,204.3494415283203]},{"page":382,"text":"planning responsibilities. Commanders select infiltration lanes that","rect":[90.02002716064453,224.76019287109376,370.4147105178833,215.65200805664063]},{"page":382,"text":"avoid enemy forces, provide cover and concealment, and facilitate","rect":[90.02002716064453,236.283203125,370.33666706848148,227.17501831054688]},{"page":382,"text":"navigation. Each unit assigned an infiltration lane picks its own routes","rect":[90.02002716064453,247.80615234375,370.3947589378357,238.69796752929688]},{"page":382,"text":"within the lane and switches routes as necessary. The left and right","rect":[90.02002716064453,259.26910400390627,370.34506940460207,250.16085815429688]},{"page":382,"text":"limits of the infiltration lane act as lateral boundaries for the unit","rect":[90.0199966430664,268.76800537109377,370.4678416213989,261.6838684082031]},{"page":382,"text":"conducting the infiltration. Staffs must coordinate with the infiltrating","rect":[90.02002716064453,282.3150634765625,370.36937522888186,273.2068786621094]},{"page":382,"text":"unit any attacks by rotary- or fixed-wing aircraft, indirect fires, or","rect":[90.02002716064453,293.7779541015625,370.40666747665406,284.6697692871094]},{"page":382,"text":"munitions effects that impact the lane. Units leaving their assigned lane","rect":[90.01002502441406,305.3009338378906,370.43050862121586,296.1927490234375]},{"page":382,"text":"run the risk of impact by friendly fires. Company-sized units normally","rect":[90.01002502441406,316.82391357421877,370.42775535583498,307.7157287597656]},{"page":382,"text":"have a single infiltration lane, although they can use more than one","rect":[90.02002716064453,328.28680419921877,370.44689656066898,319.1786193847656]},{"page":382,"text":"Figure A-12. Infiltration","rect":[395.5799865722656,313.61419677734377,505.07955670547485,304.2254638671875]},{"page":382,"text":"lane MICHAEL","rect":[416.16107177734377,323.15325927734377,484.5064976234436,315.74847412109377]},{"page":382,"text":"lane. Larger organizations are always assigned more than one","rect":[90.02002716064453,339.809814453125,370.4267854766846,330.7016296386719]},{"page":382,"text":"infiltration lane. Figure A-12 depicts the graphic control measure for INFILTRATION LANE MICHAEL.","rect":[90.02002716064453,351.33282470703127,516.6386671066284,342.2246398925781]},{"page":382,"text":"Line of Contact","rect":[72.0,373.6537170410156,145.31236096572878,366.0555725097656]},{"page":382,"text":"A-25. The line of contact is a general trace","rect":[90.0,393.4142761230469,291.49657917785648,384.30609130859377]},{"page":382,"text":"delineating the location where friendly and","rect":[90.01000213623047,404.9372863769531,291.4821309967041,395.98944091796877]},{"page":382,"text":"enemy forces are engaged. Units develop their","rect":[90.01001739501953,416.400146484375,291.52727294540406,407.2919616699219]},{"page":382,"text":"line of contact (LC) based on the maximum","rect":[90.01001739501953,427.9031066894531,291.4411292037964,418.8149719238281]},{"page":382,"text":"effective range of the direct fire weapons systems","rect":[90.01001739501953,439.4461669921875,291.45509218978887,430.3379821777344]},{"page":382,"text":"or the visual line of sight from known or templated","rect":[90.01001739501953,450.9090270996094,291.46520042419436,441.80084228515627]},{"page":382,"text":"enemy locations. The commander designates the","rect":[90.01001739501953,462.4320373535156,291.54732991027836,453.3238525390625]},{"page":382,"text":"enemy side of the LC by the abbreviation “ENY.”","rect":[90.01001739501953,473.9550476074219,291.5003023223877,464.84686279296877]},{"page":382,"text":"In the defense, a LC is often synonymous with the","rect":[90.01001739501953,485.41790771484377,291.55541706848148,476.3097229003906]},{"page":382,"text":"FLOT. In the offense, commanders may combine","rect":[90.01001739501953,496.94091796875,291.5623140411377,487.8327331542969]},{"page":382,"text":"the LC with the LD. When combined with the LD,","rect":[90.01001739501953,506.4499206542969,291.47719860076907,499.3557434082031]},{"page":382,"text":"it is represented by a phase line with LD/LC","rect":[90.01001739501953,519.9267578125,291.5131742897034,510.8185729980469]},{"page":382,"text":"written next to the name. Figure A-19 on page A-","rect":[90.01001739501953,531.4498291015625,291.5222375450134,522.3416748046875]},{"page":382,"text":"11 depicts PL JOHN being used as a LD/LC.","rect":[90.01001739501953,542.9727783203125,270.3029432296753,533.8646240234375]},{"page":382,"text":"A-26. For other forms of contact, a phase line can","rect":[90.02003479003906,560.4176025390625,291.4622097015381,551.3294677734375]},{"page":382,"text":"be designated as a probable line of contact. For","rect":[90.0300521850586,571.9606323242188,291.5312402305603,562.8524780273438]},{"page":382,"text":"Figure A-13. Line of contact","rect":[345.0,571.8541870117188,476.68584228134156,562.4654541015625]},{"page":382,"text":"example, based on IPB and information collection","rect":[90.0300521850586,583.463623046875,291.47716331481936,574.37548828125]},{"page":382,"text":"friendly forces can depict known or anticipated locations of enemy artillery assets and determine a probable","rect":[90.0300521850586,594.946533203125,522.0818758087158,585.83837890625]},{"page":382,"text":"line of contact for enemy indirect fires. Figure A-13 shows an example line of contact.","rect":[90.0300521850586,606.469482421875,436.0867567062378,597.361328125]},{"page":382,"text":"A-8","rect":[72.1199951171875,754.18798828125,86.60099249267579,747.6090087890625]},{"page":382,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":382,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":383,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":383,"text":"Linkup Point","rect":[90.0,84.59874725341797,152.62222119522097,74.81556701660156]},{"page":383,"text":"A-27. A linkup point is a designated place where two forces are","rect":[108.0,102.11431884765625,390.5970735626221,93.16645812988281]},{"page":383,"text":"scheduled to meet. This easily identifiable point on the ground is","rect":[108.01001739501953,113.6373291015625,390.6632831077576,104.5291519165039]},{"page":383,"text":"where two forces meet or consolidate before proceeding on with their","rect":[108.01000213623047,125.16033935546875,390.5561425743103,116.05216217041016]},{"page":383,"text":"mission. Besides being easily identifiable, the linkup point must also be","rect":[108.01001739501953,136.6231689453125,390.6231050567627,127.5149917602539]},{"page":383,"text":"rather inconspicuous, or the enemy will be able to predict the location","rect":[108.01001739501953,148.14617919921876,390.5430202484131,139.03799438476563]},{"page":383,"text":"of the coordination and quickly target it. It should also be relatively","rect":[108.01001739501953,159.669189453125,390.5720729827881,150.56100463867188]},{"page":383,"text":"isolated from direct fire and observation of possible enemy elements","rect":[108.0100326538086,171.132080078125,390.59220766830449,162.02389526367188]},{"page":383,"text":"located on the surrounding terrain. Alternate linkup points must meet","rect":[108.0100326538086,182.65509033203126,390.5499644241333,173.54690551757813]},{"page":383,"text":"the same criteria and should be reconnoitered to the same degree as","rect":[108.0100326538086,194.1781005859375,390.51502871322637,185.06991577148438]},{"page":383,"text":"primary linkup points. Linkup points are normally positioned behind or","rect":[108.0100326538086,205.6409912109375,390.59514403915406,196.53280639648438]},{"page":383,"text":"along one flank of the enemy’s positions on defensible terrain and","rect":[108.02006530761719,217.1639404296875,390.57921409606936,208.05575561523438]},{"page":383,"text":"Figure A-14. Linkup point 8","rect":[404.94000244140627,208.55419921875,533.8192891998291,199.25564575195313]},{"page":383,"text":"located away from normal enemy troop movement routes. The linkup point should be large enough for all","rect":[108.02006530761719,228.68695068359376,539.9371714553834,219.57864379882813]},{"page":383,"text":"infiltrating elements to assemble, and it should offer cover and concealment for these elements. Figure A-14","rect":[108.0199966430664,240.14984130859376,539.9822902679443,231.04159545898438]},{"page":383,"text":"depicts LINKUP POINT 8.","rect":[108.01000213623047,251.65281677246095,217.49856090545655,242.56460571289063]},{"page":383,"text":"Named Area of Interest","rect":[90.0,274.0537414550781,200.82551404190066,266.466552734375]},{"page":383,"text":"A-28. A named area of interest is the geospatial","rect":[108.0,293.7543029785156,298.8489451370239,284.6461181640625]},{"page":383,"text":"area or systems node or link against which","rect":[108.02003479003906,305.2773132324219,298.8510341644287,296.16912841796877]},{"page":383,"text":"information ","rect":[108.02003479003906,315.0,157.74529552459718,307.6921081542969]},{"page":383,"text":"that ","rect":[165.56088256835938,315.0,183.00573253631593,307.6921081542969]},{"page":383,"text":"will ","rect":[190.76119995117188,315.0,208.8062391281128,307.6921081542969]},{"page":383,"text":"satisfy ","rect":[216.62184143066407,316.80029296875,245.22695446014405,307.6921081542969]},{"page":383,"text":"a ","rect":[253.04254150390626,315.0,259.9874219894409,309.0]},{"page":383,"text":"specific","rect":[267.7428894042969,316.7802429199219,298.83187580871586,307.6921081542969]},{"page":383,"text":"information ","rect":[108.02003479003906,327.0,157.8044080734253,319.1549987792969]},{"page":383,"text":"requirement ","rect":[163.57891845703126,328.2431335449219,214.38332653045655,319.1549987792969]},{"page":383,"text":"can ","rect":[220.21498107910157,327.0,236.63978099822999,321.0]},{"page":383,"text":"be ","rect":[242.471435546875,327.0,254.45637035369874,319.1549987792969]},{"page":383,"text":"collected,","rect":[260.28802490234377,327.0,298.8539991378784,319.1549987792969]},{"page":383,"text":"usually to capture indications of enemy and","rect":[108.02003479003906,339.78619384765627,298.9101161956787,330.6780090332031]},{"page":383,"text":"adversary courses of action (JP 2-0). In this","rect":[108.02003479003906,351.3091735839844,298.75175356674199,342.20098876953127]},{"page":383,"text":"latter case, the NAI may be a person, group, or","rect":[108.01002502441406,362.7720642089844,298.83794189071656,353.66387939453127]},{"page":383,"text":"portion of cyberspace. Staffs tailor the shape of","rect":[108.01002502441406,374.2950744628906,298.84087157821656,365.1868896484375]},{"page":383,"text":"their NAI symbols to the actual area they want","rect":[108.01002502441406,385.81805419921877,298.8659129104614,376.7098693847656]},{"page":383,"text":"observed rather than using a prescribed shape. It","rect":[108.01002502441406,397.28094482421877,298.9092173538208,388.1727600097656]},{"page":383,"text":"is possible to re-designate a NAI as a target area","rect":[108.01002502441406,408.803955078125,298.8152132110596,399.6957702636719]},{"page":383,"text":"of interest (TAI) when Soldiers confirm enemy","rect":[108.01000213623047,420.3269348144531,298.7734889984131,411.2187805175781]},{"page":383,"text":"activity in the area and have assets that can","rect":[108.01000213623047,431.7898254394531,298.7737636566162,422.681640625]},{"page":383,"text":"target it. This allows commanders to mass the","rect":[108.01001739501953,443.31280517578127,298.87203694152836,434.2046203613281]},{"page":383,"text":"effects of combat power on that area. Figure A-","rect":[108.01001739501953,454.77569580078127,298.91106200790406,445.6675109863281]},{"page":383,"text":"15 depicts NAI AUGUSTA.","rect":[108.01001739501953,466.2786560058594,221.9374189376831,457.1905212402344]},{"page":383,"text":"Figure A-15. Named area of interest AUGUSTA","rect":[313.20001220703127,444.7742004394531,533.7993817367553,435.3854675292969]},{"page":383,"text":"Objective","rect":[90.0,490.8807067871094,135.14426957702637,481.0755920410156]},{"page":383,"text":"A-29. An objective is a location used to orient operations, phase operations, facilitate changes of direction,","rect":[108.0,508.4342956542969,540.0424146652222,499.32611083984377]},{"page":383,"text":"and provide for unity of effort (ADP 3-90). Objectives should be easily identifiable on the ground to facilitate","rect":[108.01001739501953,519.897216796875,539.9790315704346,510.7790222167969]},{"page":383,"text":"their recognition. They normally assign subordinate commanders only their final objectives, but they can","rect":[108.01001739501953,531.420166015625,539.9595851898193,522.3019409179688]},{"page":383,"text":"assign intermediate objectives as necessary. Figure A-19 on page A-11 depicts OBJECTIVE PAT.","rect":[108.01000213623047,542.9431762695313,540.0544385910034,533.824951171875]},{"page":383,"text":"OBJECTIVE PAT is further divided into two subordinate objectives: OBJECTIVE KAI and OBJECTIVE","rect":[108.01001739501953,554.4060668945313,540.0653965492248,545.287841796875]},{"page":383,"text":"ZEKE.","rect":[108.0,563.7747802734375,136.06902599334718,557.1415405273438]},{"page":383,"text":"Passage Lane","rect":[90.0,590.5407104492188,153.26455461120606,580.9112548828125]},{"page":383,"text":"A-30. A passage lane is a lane through an obstacle that provides safe","rect":[108.0,608.0343017578125,395.5610628204346,599.08642578125]},{"page":383,"text":"passage for a passing force. It is a clear route through an obstacle. The","rect":[108.02005004882813,619.5572509765625,395.6119661407471,610.4490966796875]},{"page":383,"text":"lane may be cleared, including being reduced and proofed, as part of a","rect":[108.0199966430664,631.080322265625,395.4989595489502,621.97216796875]},{"page":383,"text":"breach operation, or it may be included as part of the design of a friendly","rect":[108.0199966430664,642.5431518554688,395.45079612731936,633.4349975585938]},{"page":383,"text":"obstacle. Passage lanes normally end where a route begins. That route","rect":[108.02005004882813,654.066162109375,395.4609651641846,644.9580078125]},{"page":383,"text":"should allow the passing unit to move rapidly through the stationary","rect":[108.02005004882813,665.5891723632813,395.5540370941162,656.4810180664063]},{"page":383,"text":"unit’s area. Figure A-16 depicts the graphic control measure for a","rect":[108.02005004882813,677.0520629882813,395.61214924621586,667.9439086914063]},{"page":383,"text":"passage lane.","rect":[108.02005004882813,688.5750732421875,160.80140209197999,679.4669189453125]},{"page":383,"text":"Figure A-16. Passage lane","rect":[409.91998291015627,710.8742065429688,533.8764181060791,701.5756225585938]},{"page":383,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":383,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":383,"text":"A-9","rect":[507.47698974609377,754.18798828125,521.9579794921875,747.6090087890625]},{"page":384,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":384,"text":"Passage of Lines","rect":[72.0,84.62071228027344,148.9928689918518,74.81556701660156]},{"page":384,"text":"A-31. A passage of lines occurs under two conditions. A forward","rect":[90.0,102.11431884765625,372.27443504333498,93.00614166259766]},{"page":384,"text":"passage of lines occurs when a unit passes through another unit’s","rect":[90.0,113.6373291015625,372.28654360580449,104.5291519165039]},{"page":384,"text":"positions while moving toward the enemy (ADP 3-90). A rearward","rect":[90.00000762939453,125.16033935546875,372.26341819763186,116.05216217041016]},{"page":384,"text":"passage of lines occurs when a unit passes through another unit’s","rect":[89.98998260498047,136.6231689453125,372.27653384017949,127.5149917602539]},{"page":384,"text":"positions while moving away from the enemy (ADP 3-90). Ideally, a","rect":[89.989990234375,148.14617919921876,372.2233247833252,139.03799438476563]},{"page":384,"text":"passage of lines does not interfere with the conduct of the stationary","rect":[89.98998260498047,159.669189453125,372.25035667419436,150.56100463867188]},{"page":384,"text":"unit’s operations. Figure A-17 shows the symbols for both a forward","rect":[89.97994995117188,171.132080078125,372.2183132171631,162.02389526367188]},{"page":384,"text":"and a rearward passage of lines. The arrow goes in the direction the","rect":[89.96990203857422,182.65509033203126,372.1974458770752,173.54690551757813]},{"page":384,"text":"passing unit is moving.","rect":[89.96994018554688,194.1781005859375,182.77419567108155,185.06991577148438]},{"page":384,"text":"Passage Point","rect":[72.0,230.24070739746095,136.44380017471316,220.43556213378907]},{"page":384,"text":"A-32. A passage point is a designated place where the passing units","rect":[90.0,247.7943115234375,373.2123553733826,238.84645080566407]},{"page":384,"text":"pass through the stationary unit. The location of this point is where","rect":[90.01001739501953,259.2572021484375,373.06405354309086,250.14901733398438]},{"page":384,"text":"the commander wants subordinate units physically to execute a passage","rect":[89.99999237060547,270.78021240234377,373.1622896270752,261.6720275878906]},{"page":384,"text":"of lines. Figure A-18 depicts the graphic control measure for","rect":[89.99999237060547,282.3031921386719,373.06404662704468,273.19500732421877]},{"page":384,"text":"PASSAGE POINT 7.","rect":[90.0,291.7520751953125,176.4425458908081,284.8282470703125]},{"page":384,"text":"Figure A-17. Forward and","rect":[390.9599914550781,195.9542236328125,511.5647251625061,186.65567016601563]},{"page":384,"text":"rearward passage of lines","rect":[389.7575988769531,207.47723388671876,512.6358785552978,198.0885009765625]},{"page":384,"text":"Figure A-18. Passage point","rect":[387.41998291015627,332.5741882324219,515.8012597618103,323.275634765625]},{"page":384,"text":"Phase Line","rect":[72.0,350.6627502441406,123.60490190124512,343.0755920410156]},{"page":384,"text":"A-33. A phase line is an easily identified feature in the operational area utilized for control and coordination","rect":[90.0,370.4342956542969,522.0494289398193,361.32611083984377]},{"page":384,"text":"of military operations (JP 3-09). A commander establishes PLs to control the maneuver of the units. PLs are","rect":[90.02005004882813,381.8971862792969,522.0224886016846,372.78900146484377]},{"page":384,"text":"not boundaries unless designated as such and do not establish any specific responsibilities between units,","rect":[90.0100326538086,393.420166015625,522.0189771652222,384.3119812011719]},{"page":384,"text":"unless the operation order so specifies. When possible, commanders place them along easily recognizable","rect":[90.0100326538086,404.94317626953127,521.9880647735596,395.8349914550781]},{"page":384,"text":"terrain features—such as roads, railroad tracks, rivers, and ridgelines—to ensure easy identification. Units","rect":[90.0100326538086,416.40606689453127,522.0073382835388,407.2978820800781]},{"page":384,"text":"normally report crossing PLs, but do not halt unless specifically directed. Some PLs have additional","rect":[90.01005554199219,427.9290466308594,522.0975718460084,418.82086181640627]},{"page":384,"text":"designations for specific purposes, such as an LD or a PLD. Figure A-19 depicts five phase lines being used","rect":[90.01005554199219,439.4520568847656,521.9761257171631,430.3438720703125]},{"page":384,"text":"for an offensive operation.","rect":[90.01000213623047,450.8948669433594,196.11880016326905,441.8067321777344]},{"page":384,"text":"A-10","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":384,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":384,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":385,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":385,"text":"Figure A-19. Phase lines","rect":[257.2200012207031,395.8141784667969,372.83476161193848,386.515625]},{"page":385,"text":"Position Area for Artillery","rect":[90.0,426.3807067871094,214.29358863830567,416.5755920410156]},{"page":385,"text":"A-34. Apositionarea for artilleryis an area assigned","rect":[108.0,443.9342956542969,324.49110316467286,434.9864501953125]},{"page":385,"text":"to an artillery unit to deliver surface to surface","rect":[108.02002716064453,455.4573059082031,324.50011921691898,446.50946044921877]},{"page":385,"text":"fires. A position area for artillery (PAA) is not an AO","rect":[108.02002716064453,466.920166015625,324.4821209945679,457.8119812011719]},{"page":385,"text":"for the artillery unit occupying it. Commanders assign","rect":[108.03004455566406,478.44317626953127,324.4829921722412,469.3349914550781]},{"page":385,"text":"PAAs for terrain management and for locations where","rect":[108.03004455566406,489.9661865234375,324.49325276184086,480.8580017089844]},{"page":385,"text":"individual artillery systems can maneuver to increase","rect":[108.03004455566406,501.4290466308594,324.49422932434086,492.32086181640627]},{"page":385,"text":"their survivability. Establishing a PAA lets other","rect":[108.03004455566406,512.9520874023438,324.5010888633728,503.8438720703125]},{"page":385,"text":"subordinate units know they should avoid occupying","rect":[108.03004455566406,524.47509765625,324.4721279144287,515.366943359375]},{"page":385,"text":"that same terrain. While the exact size of a PAA","rect":[108.03004455566406,533.9238891601563,324.47510195159915,526.8297729492188]},{"page":385,"text":"depends on mission variables, a Paladin platoon","rect":[108.03004455566406,547.44091796875,324.4911708831787,538.352783203125]},{"page":385,"text":"normally requires a PAA encompassing over 4 square","rect":[108.03004455566406,558.9839477539063,324.5121431427002,549.8757934570313]},{"page":385,"text":"kilometers whereas a multiple launch rocket system","rect":[108.03004455566406,570.44677734375,324.55520391082765,561.338623046875]},{"page":385,"text":"(known as MLRS) platoon requires 9 square","rect":[108.03004455566406,581.9498291015625,324.50118733215336,572.8616943359375]},{"page":385,"text":"kilometers. Figure A-20 depicts a PAA.","rect":[108.02002716064453,593.4927978515625,267.25185680389407,584.3846435546875]},{"page":385,"text":"A-35. The maneuver echelon operations officer of the","rect":[108.03004455566406,610.9376220703125,324.5272493438721,601.8494873046875]},{"page":385,"text":"Figure A-20. Position area for artillery","rect":[347.1000061035156,606.774169921875,525.4730977935791,597.3854370117188]},{"page":385,"text":"unit that owns the terrain establishes the PAA. The","rect":[108.0400619506836,620.4566040039063,324.52026081848148,613.3724975585938]},{"page":385,"text":"occupying artillery unit does not have the same authority and responsibilities toward the PAA that are","rect":[108.0400619506836,634.003662109375,539.9731721954346,624.8955078125]},{"page":385,"text":"associated with a unit assigned an assigned area. For example, other units can move through a PAA without","rect":[108.04005432128906,645.466552734375,540.0640635452271,636.3583984375]},{"page":385,"text":"clearing that movement with the artillery unit. However, to prevent fratricide or inadvertently concentrating","rect":[108.04005432128906,656.989501953125,540.0053615570068,647.88134765625]},{"page":385,"text":"forces units should make attempt to contact the artillery unit to determine if the PAA is occupied.","rect":[108.04005432128906,668.452392578125,540.0825147628784,659.34423828125]},{"page":385,"text":"Additionally, units moving through or occupying terrain within a PAA should be cognizant of the increased","rect":[108.04009246826172,679.9754028320313,540.0120754241943,670.8672485351563]},{"page":385,"text":"risk of receiving indirect fire from enemy artillery due to enemy counterbattery or preparatory fires. The","rect":[108.04009246826172,691.4984130859375,540.1004915313721,682.3902587890625]},{"page":385,"text":"artillery unit occupying a PAA establishes liaison with the unit that owns the assigned area where the PAA","rect":[108.03008270263672,702.9613037109375,539.9582562484741,693.8531494140625]},{"page":385,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":385,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":385,"text":"A-11","rect":[502.4909973144531,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":386,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":386,"text":"is located. The echelon fire support officer usually conducts this liaison in accordance with standard","rect":[90.0,83.51434326171875,522.0223293304443,74.40616607666016]},{"page":386,"text":"command and support relationships.","rect":[89.99002075195313,94.95719909667969,234.9965009689331,85.86905670166016]},{"page":386,"text":"A-36. The decision to establish a PAA affects airspace control for rotary-wing, fixed-wing, unmanned, and","rect":[89.9800033569336,112.4921875,522.0232448577881,103.38394927978516]},{"page":386,"text":"tilt-rotor aircraft integration. A PAA is a base upon which to establish future grid target lines for lateral","rect":[89.98999786376953,124.01519775390625,521.9753184280396,114.90702056884766]},{"page":386,"text":"deconfliction and areas for rotary-wing, fixed-wing, unmanned, and tilt-rotor aircraft to avoid, depending on","rect":[89.98998260498047,135.47808837890626,522.0073757171631,126.36991119384766]},{"page":386,"text":"high or low angle artillery fires.","rect":[89.96994018554688,147.00103759765626,217.15484142303468,137.89285278320313]},{"page":386,"text":"Rally Point","rect":[72.0,171.62071228027345,124.91700574111938,161.81556701660157]},{"page":386,"text":"A-37. A rally point is an easily identifiable point on the ground","rect":[90.0,189.11431884765626,357.87773036193848,180.1664581298828]},{"page":386,"text":"at which units can reassemble and reorganize if they become","rect":[90.0,200.6373291015625,357.88668537902836,191.68946838378907]},{"page":386,"text":"dispersed. Forces conducting a patrol or an infiltration commonly","rect":[90.0,212.16033935546876,357.78844261169436,203.05215454101563]},{"page":386,"text":"use this control measure. Figure A-21 depicts RALLY POINT 14.","rect":[90.00000762939453,223.6231689453125,354.7083692550659,214.51498413085938]},{"page":386,"text":"Release Point","rect":[72.0,292.042724609375,135.24149914932253,284.45556640625]},{"page":386,"text":"Figure A-21. Rally point 14","rect":[381.2400207519531,287.6341857910156,506.8086690826416,278.33563232421877]},{"page":386,"text":"A-38. A release point is a designated place on a route where elements are released from centralized","rect":[90.0,311.7543029785156,521.9473409576416,302.80645751953127]},{"page":386,"text":"control. Once released from centralized control they are released back to the authority of their respective","rect":[90.0,323.2773132324219,522.0464754180908,314.16912841796877]},{"page":386,"text":"commanders. Each start point (SP) must have a corresponding release point (RP), which must also be easy","rect":[90.0000228881836,334.8003234863281,521.9574489593506,325.6921081542969]},{"page":386,"text":"to recognize on the ground. Marching units do not stop at the RP; instead, as they move through the RP and","rect":[90.0,346.26318359375,522.0231838226318,337.1549987792969]},{"page":386,"text":"continue toward their own appropriate destination. Figure A-23 shows RP 3 on ROUTE IRON.","rect":[89.98999786376953,357.78619384765627,471.4213514328003,348.6780090332031]},{"page":386,"text":"Relief in Place","rect":[72.0,380.1827392578125,139.15476762390137,372.5955810546875]},{"page":386,"text":"A-39. A relief in place is an operation in which, by direction of","rect":[90.0,399.894287109375,342.4840295372009,390.7861022949219]},{"page":386,"text":"higher authority, all or part of a unit is replaced in an area by","rect":[90.0300521850586,411.41729736328127,342.4399929046631,402.3091125488281]},{"page":386,"text":"the incoming unit and the responsibilities of the replaced","rect":[90.0300521850586,422.9402770996094,342.48708152770998,413.83209228515627]},{"page":386,"text":"elements for the mission and the assigned zone of operations are","rect":[90.0300521850586,434.4031677246094,342.4809846954346,425.29498291015627]},{"page":386,"text":"transferred to the incoming unit (JP 3-07.3).","rect":[90.0300521850586,445.9261779785156,283.75173473358157,436.8179931640625]},{"page":386,"text":"Figure A-22","rect":[289.828857421875,445.9261779785156,342.5339870452881,436.8179931640625]},{"page":386,"text":"depicts a relief in place. (See Chapter 15 for more information","rect":[90.0199966430664,457.4291076660156,342.4466152191162,448.3409729003906]},{"page":386,"text":"on relief in place.)","rect":[90.01000213623047,468.8919982910156,163.3023278770447,459.8038635253906]},{"page":386,"text":"Route","rect":[72.0,537.32275390625,100.09232865905762,529.9112548828125]},{"page":386,"text":"Figure A-22. Relief in place","rect":[372.41998291015627,528.2341918945313,500.2090597076416,518.845458984375]},{"page":386,"text":"A-40. A route is the prescribed course to be traveled from a point of origin to a destination. Routes can","rect":[90.0,557.0343017578125,521.9812526702881,548.08642578125]},{"page":386,"text":"have different functions. Commanders can add those functions as adjectives to specify different types of","rect":[90.01001739501953,568.5572509765625,521.9489038047791,559.4390258789063]},{"page":386,"text":"routes. Examples of such routes include a passing route, main supply route, and alternate supply route.","rect":[90.01001739501953,580.080322265625,522.0523633956909,570.97216796875]},{"page":386,"text":"Commanders can further designate routes as open, supervised, dispatch, reserved, or prohibited. They can","rect":[90.01001739501953,591.5431518554688,521.9609279632568,582.4349975585938]},{"page":386,"text":"assign names, numbers, or alphanumeric designations to routes within their assigned areas. Figure A-23","rect":[90.0,603.066162109375,522.0924587249756,593.9580078125]},{"page":386,"text":"depicts ROUTE IRON.","rect":[90.0,614.5691528320313,183.63589000701905,605.4810180664063]},{"page":386,"text":"A-12","rect":[72.1199951171875,754.0800170898438,91.57798986816407,747.6090087890625]},{"page":386,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":386,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":387,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":387,"text":"Figure A-23. Routes","rect":[267.7799987792969,358.794189453125,362.26258753967286,349.4956359863281]},{"page":387,"text":"Start Point","rect":[90.0,387.1647033691406,141.6477186317444,379.5555725097656]},{"page":387,"text":"A-41. The start point is a designated place on a route where elements fall under the control of a","rect":[108.0,406.9142761230469,540.0114040374756,397.9664306640625]},{"page":387,"text":"designated march commander. All routes have a designated SP and RP that are easily recognizable on the","rect":[108.01001739501953,418.3771667480469,539.9591951446533,409.26898193359377]},{"page":387,"text":"map and on the ground, such as a road junction. It is far enough from the assembly area to allow units to","rect":[108.01005554199219,429.900146484375,540.0612697601318,420.7819519042969]},{"page":387,"text":"organize and move at the prescribed speed and interval when they reach the SP. Figure A-23 depicts SP 7 on","rect":[108.01005554199219,441.42315673828127,540.0424098968506,432.3149719238281]},{"page":387,"text":"ROUTE IRON.","rect":[108.01005554199219,450.8820495605469,170.80138683319093,443.9482116699219]},{"page":387,"text":"Target Area of Interest","rect":[90.0,477.5007019042969,198.97648450088503,467.70654296875]},{"page":387,"text":"A-42. A target area of interest is the geographical area","rect":[108.0,495.0542907714844,325.99914265441898,485.94610595703127]},{"page":387,"text":"where high-value targets can be acquired and engaged","rect":[108.02005004882813,506.5171813964844,325.9651393890381,497.40899658203127]},{"page":387,"text":"by friendly forces (JP 2-0). Commanders use TAIs to","rect":[108.0200424194336,518.0401611328125,325.9510097503662,508.9319763183594]},{"page":387,"text":"apply a specific effect against a specific target with a","rect":[108.02005004882813,529.5631713867188,325.95907307434086,520.4550170898438]},{"page":387,"text":"defined outcome. The difference between a TAI and an","rect":[108.02005004882813,539.0020141601563,325.9790859222412,531.9179077148438]},{"page":387,"text":"NAI is that an NAI is established to obtain information","rect":[108.02005004882813,550.5250244140625,325.98009300231936,543.44091796875]},{"page":387,"text":"and answer a specific information requirement whereas","rect":[108.02005004882813,564.052001953125,326.0121600608826,554.9638671875]},{"page":387,"text":"a TAI is established to create a pre-determined effect.","rect":[108.02005004882813,575.514892578125,325.97503185272219,566.4267578125]},{"page":387,"text":"The unit staff develops TAIs during the MDMP, based","rect":[108.02005004882813,587.0579223632813,325.9152126312256,577.9497680664063]},{"page":387,"text":"on the currently available products resulting from the","rect":[108.0199966430664,598.5809326171875,325.9920930938721,589.4727783203125]},{"page":387,"text":"IPB. These TAIs are further refined during course of","rect":[108.0200424194336,610.0438232421875,325.92513061141968,600.9356689453125]},{"page":387,"text":"action analysis and finally approved by the commander","rect":[108.0200424194336,621.5667724609375,325.99321532821656,612.4586181640625]},{"page":387,"text":"during course of action approval. The shape of a TAI","rect":[108.0200424194336,633.0296630859375,326.0152795372009,623.9215087890625]},{"page":387,"text":"reflects the target and effect intended for the TAI.","rect":[108.0200424194336,644.5526733398438,325.9810743331909,635.4445190429688]},{"page":387,"text":"Information collection assets normally cue their use.","rect":[108.02005004882813,656.07568359375,326.0341444015503,646.967529296875]},{"page":387,"text":"Commanders designate TAIs for any organic or","rect":[108.02005767822266,667.53857421875,325.99324584579468,658.430419921875]},{"page":387,"text":"supporting systems. TAIs differ from engagement","rect":[108.02005767822266,679.0615844726563,326.0372691116333,669.9534301757813]},{"page":387,"text":"Figure A-24. Target area of interest","rect":[354.2400207519531,666.8341674804688,519.8776147422791,657.4454345703125]},{"page":387,"text":"WHITETAIL","rect":[409.86102294921877,676.2630004882813,464.33675885391235,669.0886840820313]},{"page":387,"text":"areas. Engagement areas plan for the use of all","rect":[108.03008270263672,690.5845947265625,325.97812604522707,681.4764404296875]},{"page":387,"text":"available weapons, while TAIs might be engaged by a single weapon or system. Figure A-24 depicts TAI","rect":[108.03008270263672,702.0474243164063,540.1084497032166,692.9392700195313]},{"page":387,"text":"WHITETAIL.","rect":[108.02002716064453,711.556396484375,165.54485607147218,704.632568359375]},{"page":387,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":387,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":387,"text":"A-13","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":388,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":388,"text":"OFFENSIVE OPERATIONS CONTROL MEASURES","rect":[72.0,83.38796997070313,305.09882164001467,75.0959701538086]},{"page":388,"text":"A-43. This section defines in alphabetical order those common offensive control measures commanders use","rect":[90.0,103.29429626464844,522.0773592071533,94.2061538696289]},{"page":388,"text":"to synchronize the effects of combat power. The commander uses the minimum control measures required to","rect":[90.01001739501953,114.7772216796875,521.9831447601318,105.6690444946289]},{"page":388,"text":"successfully complete the mission while providing subordinates the flexibility needed to respond to changes","rect":[90.01001739501953,126.30023193359375,522.0751483421326,117.19205474853516]},{"page":388,"text":"in the situation. Figure A-25 depicts some of the common offensive control measures that will be further","rect":[90.01001739501953,137.8232421875,522.0140893516541,128.71505737304688]},{"page":388,"text":"discussed throughout this section.","rect":[90.0,149.28607177734376,225.04555797576905,140.17788696289063]},{"page":388,"text":"Figure A-25. Common offensive control measures","rect":[178.61688232421876,473.1024475097656,415.38151454162598,463.7137145996094]},{"page":388,"text":"Assault Position","rect":[72.0,501.5027160644531,147.46663511657716,493.9155578613281]},{"page":388,"text":"A-44. An assault position is a covered and concealed position short of the objective from which final","rect":[90.0,521.2142944335938,522.0735239944459,512.0960693359375]},{"page":388,"text":"preparations are made to assault the objective (ADP 3-90). Assault positions are typically only assigned to","rect":[90.01001739501953,532.7373046875,521.9482326507568,523.6190795898438]},{"page":388,"text":"attacking maneuver formations. Units supporting and maneuvering with the maneuver force execute their","rect":[90.0,544.2603149414063,522.0081689414978,535.1521606445313]},{"page":388,"text":"final preparations in the same assault positions as the maneuver force. These final preparations can involve","rect":[90.0,555.703125,522.0259676055908,546.614990234375]},{"page":388,"text":"tactical considerations, such as a short halt to coordinate the final assault, reorganize to adjust to combat","rect":[90.0,567.2461547851563,521.9617075881959,558.1279296875]},{"page":388,"text":"losses, or make necessary adjustments in the attacking force’s dispositions. These preparations can also","rect":[90.0,578.7691650390625,521.9967555999756,569.6509399414063]},{"page":388,"text":"involve technical activities, such as engineers conducting their final checks on obstacle clearing systems and","rect":[90.0,590.2320556640625,521.9701442718506,581.1239013671875]},{"page":388,"text":"the crews of plow and roller equipped tanks removing their locking pins. Commanders may locate their","rect":[90.0,601.7550659179688,521.9399926719666,592.6469116210938]},{"page":388,"text":"assault positions near either a final coordination line (FCL) or a probable line of deployment (PLD). Figure","rect":[90.0,613.278076171875,522.0574007110596,604.169921875]},{"page":388,"text":"A-25 depicts ASSAULT POSITION PEGGY. (Paragraphs A-52 and A-57 define a FCL and PLD","rect":[90.0,624.740966796875,522.0401043930053,615.6328125]},{"page":388,"text":"respectively.)","rect":[90.01000213623047,636.263916015625,144.15910888290407,627.15576171875]},{"page":388,"text":"Assault Time","rect":[72.0,658.6427612304688,133.9886909637451,651.0555419921875]},{"page":388,"text":"A-45. The assault time is the moment to attack the initial objectives throughout the geographical scope of the","rect":[90.0,678.3543090820313,522.1073885040283,669.236083984375]},{"page":388,"text":"operation (ADP 3-90). Higher echelon headquarters impose this control measure to achieve simultaneous","rect":[90.02005004882813,689.8773193359375,522.0473773460388,680.7691650390625]},{"page":388,"text":"results from several different units. Using an assault time synchronizes the moment an enemy force feels the","rect":[90.01002502441406,701.4002685546875,522.0163240509033,692.2921142578125]},{"page":388,"text":"effects of friendly combat power. Assault times are similar to the time-on-target control method used by field","rect":[90.01000213623047,712.8631591796875,522.0424098968506,703.7550048828125]},{"page":388,"text":"A-14","rect":[72.1199951171875,754.0800170898438,91.57798986816407,747.6090087890625]},{"page":388,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":388,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":389,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":389,"text":"artillery units when processing fire missions. A commander uses an assault time instead of a time of attack","rect":[108.0,83.51434326171875,539.9102687835693,74.40616607666016]},{"page":389,"text":"because of differences in distance, tactical mobility, and known obstacles among subordinate units. (See","rect":[108.0,94.97723388671875,540.0237703399658,85.86905670166016]},{"page":389,"text":"paragraph A-59 for more information on a time of attack).","rect":[108.0,106.500244140625,340.76555919647219,97.3920669555664]},{"page":389,"text":"Attack by Fire Position","rect":[90.0,131.12071228027345,199.05228269958497,121.31556701660156]},{"page":389,"text":"A-46. An attack by fire position designates the general","rect":[108.0,148.61431884765626,354.03208112335207,139.50613403320313]},{"page":389,"text":"position from which a unit performs the tactical task of attack","rect":[108.0100326538086,160.11729431152345,353.9828701019287,151.02914428710938]},{"page":389,"text":"by fire (ADP 3-90). The purpose of these positions is to mass","rect":[108.0100326538086,171.66033935546876,353.98393130111699,162.55215454101563]},{"page":389,"text":"the effects of direct fire systems for one or multiple locations","rect":[108.0100326538086,183.1231689453125,354.0670001487732,174.01498413085938]},{"page":389,"text":"toward enemy forces. Attack by fire positions rarely apply to","rect":[108.0100326538086,194.64617919921876,353.90807151794436,185.53799438476563]},{"page":389,"text":"units larger than a company. An attack by fire position does","rect":[108.0,206.169189453125,353.9289081077576,197.06094360351563]},{"page":389,"text":"not indicate the specific site. Figure A-26 depicts ATTACK","rect":[108.0,217.632080078125,353.9739728012085,208.52389526367188]},{"page":389,"text":"BY FIRE POSITION BRANDON. (See paragraph B-3 for","rect":[108.0,229.15509033203126,353.9739892539978,220.04690551757813]},{"page":389,"text":"more information on the tactical mission task of attack by","rect":[108.0,240.6781005859375,353.9607753753662,231.56991577148438]},{"page":389,"text":"fire).","rect":[108.0,252.12095642089845,127.71936321258545,243.03280639648438]},{"page":389,"text":"Attack Position","rect":[90.0,274.5227355957031,162.4021209564209,266.9355773925781]},{"page":389,"text":"Figure A-26. Attack by fire","rect":[389.1000061035156,255.05419921875,512.9942769927978,245.66546630859376]},{"page":389,"text":"position JAMES","rect":[413.03778076171877,266.44696044921877,489.14571213150028,257.1884765625]},{"page":389,"text":"A-47. The attack position is the last position an attacking force occupies or passes through before crossing","rect":[108.0,294.2943115234375,539.9934597015381,285.1861267089844]},{"page":389,"text":"the line of departure (ADP 3-90). An attack position facilitates an attacking force’s deployment and last-","rect":[108.0,305.7572021484375,539.9722802696228,296.6490173339844]},{"page":389,"text":"minute coordination before it crosses the LD. Located on the friendly side of the LD, an attack position offers","rect":[108.0,317.2801818847656,540.0996234397888,308.1719970703125]},{"page":389,"text":"cover and concealment for the attacking force. Commanders use it primarily at battalion level and below.","rect":[108.0,328.8031921386719,540.0528516769409,319.69500732421877]},{"page":389,"text":"Whenever possible, units move through the attack position without stopping. An attacking unit occupies an","rect":[108.0,340.2660827636719,540.0263576507568,331.15789794921877]},{"page":389,"text":"attack position for various reasons, including when the unit is waiting for specific results from preparation","rect":[108.0,351.7890625,539.9842433929443,342.6808776855469]},{"page":389,"text":"fires or when it is necessary to conduct additional coordination, such as a forward passage of lines. If the","rect":[108.0,363.31207275390627,539.9588899688721,354.2038879394531]},{"page":389,"text":"attacking unit occupies the attack position, it stays there for the shortest amount of time possible to avoid","rect":[108.0,374.77496337890627,539.9813137054443,365.6667785644531]},{"page":389,"text":"offering enemy forces a lucrative target. Figure A-25 on page A-14 depicts ATTACK POSITIONS BLUE","rect":[108.0,386.2979431152344,540.0554478187561,377.18975830078127]},{"page":389,"text":"and GOLD.","rect":[107.98998260498047,395.80694580078127,155.25031566619874,388.7127685546875]},{"page":389,"text":"Axis of Advance","rect":[90.0,420.1427307128906,166.32526933288575,412.5555725097656]},{"page":389,"text":"A-48. An axis of advance designates the general area through which the bulk of a unit’s combat power must","rect":[108.0,439.9142761230469,540.0815806350709,430.80609130859377]},{"page":389,"text":"move (ADP 3-90). A commander uses an axis of advance for three primary reasons:","rect":[108.0,451.4372863769531,444.5659556350708,442.3291015625]},{"page":389,"text":" To direct the bypass of locations that could delay the progress of the advancing force, such as","rect":[133.1999969482422,464.9342956542969,539.9900653343201,455.82611083984377]},{"page":389,"text":"known contaminated areas.","rect":[151.20004272460938,474.3731384277344,260.3809461593628,467.28900146484377]},{"page":389,"text":" To indicate that the force is not required to clear the entire assigned area as it advances. The force","rect":[133.1999969482422,489.894287109375,540.0002107696533,480.7861022949219]},{"page":389,"text":"will be required to clear the axis based on specified bypass criteria.","rect":[151.1999969482422,501.41729736328127,419.4334669113159,492.3091125488281]},{"page":389,"text":" To indicate to a unit involved in offensive encirclement, exploitation, or pursuit operations the","rect":[133.1999969482422,514.894287109375,540.0572176055908,505.8061218261719]},{"page":389,"text":"need to move rapidly toward an objective.","rect":[151.1999969482422,526.437255859375,319.7865858078003,517.3190307617188]},{"page":389,"text":"A-49. An axis of advance can be used by any maneuver echelon. Subordinate maneuver units can develop","rect":[107.9937515258789,543.902099609375,539.9808254241943,534.7939453125]},{"page":389,"text":"their own axis of advance within the confines of their higher headquarters axis of advance. For example, a","rect":[107.99374389648438,555.4251708984375,540.0001497344971,546.3170166015625]},{"page":389,"text":"battalion can establish multiple company level axis of advance as long as each company’s axis of advance","rect":[107.99374389648438,566.9481201171875,539.9833040313721,557.8399658203125]},{"page":389,"text":"remains within the bounds of the battalion’s axis of advance. The width of the axis varies based on factors","rect":[107.99374389648438,576.386962890625,539.9378802757263,569.3028564453125]},{"page":389,"text":"such as terrain, size and type of friendly forces, and time. Generally, a wider axis of advance is used in","rect":[107.98371887207031,589.9340209960938,539.9108791351318,580.8258666992188]},{"page":389,"text":"unrestricted terrain. When using an axis of advance, the risk is that friendly forces do not detect enemy forces","rect":[107.97370910644531,601.45703125,539.9930560569763,592.348876953125]},{"page":389,"text":"outside the axis and the enemy is inadvertently bypassed. Figure A-25 on page A-14 depicts AXIS OF","rect":[107.99372863769531,612.919921875,540.0250997467041,603.811767578125]},{"page":389,"text":"ADVANCE JAN. When developing the axis of advance, commanders also establish bypass criteria (see","rect":[107.98370361328125,624.44287109375,539.9046907501221,615.334716796875]},{"page":389,"text":"paragraph 12-27 for bypass criteria).","rect":[107.98370361328125,635.90576171875,254.31280040740968,626.797607421875]},{"page":389,"text":"Battle Handover Line","rect":[90.0,658.2827758789063,191.99981462097169,650.695556640625]},{"page":389,"text":"A-50. The battle handover line is a designated phase line where responsibility transitions from the stationary","rect":[108.0,678.0543212890625,539.9929714202881,668.9461669921875]},{"page":389,"text":"force to the moving force and vice versa (ADP 3-90). The common higher echelon commander of the two","rect":[108.0100326538086,689.5772705078125,540.0323390960693,680.4691162109375]},{"page":389,"text":"forces establishes the battle handover line (BHL) after consulting both commanders. The stationary","rect":[108.0,701.0402221679688,539.9688014984131,691.9320068359375]},{"page":389,"text":"commander determines the location of the line. The BHL is forward of the FEBA in the defense or the FLOT","rect":[108.0,710.5491333007813,540.0260899085998,703.4550170898438]},{"page":389,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":389,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":389,"text":"A-15","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":390,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":390,"text":"in the offense. Commanders draw it where the direct fires of forward combat elements of the stationary unit","rect":[90.0,83.51434326171875,521.9570689163209,74.40616607666016]},{"page":390,"text":"can effectively support the passing unit until completion of the passage of lines. The area between the BHL","rect":[90.0,94.97723388671875,522.0621616859436,85.86905670166016]},{"page":390,"text":"and the stationary force belongs to the stationary force commander. The stationary force commander may","rect":[90.0,106.500244140625,521.9611721038818,97.3920669555664]},{"page":390,"text":"employ security forces, obstacles, and fires in the area. Figure A-27 depicts a BHL at PL DANIEL used in","rect":[90.0,118.023193359375,522.0053615570068,108.9150161743164]},{"page":390,"text":"conjunction with other control measures during a forward passage of lines. ","rect":[89.99000549316406,129.486083984375,391.53188610076907,120.36788940429688]},{"page":390,"text":"Figure A-27. Battle handover line DANIEL","rect":[198.94749450683595,440.0460205078125,395.0319187660217,430.7474670410156]},{"page":390,"text":"Direction of Attack","rect":[72.0,468.3827209472656,162.3258727874756,460.7955627441406]},{"page":390,"text":"A-51. The direction of attack is a specific direction or assigned route a force uses and does not deviate from","rect":[90.0,488.154296875,522.0415320358277,479.0461120605469]},{"page":390,"text":"when attacking (ADP 3-90). It is a restrictive control measure that requires a subordinate unit to attack as","rect":[90.0,499.6171875,522.0742328147888,490.5090026855469]},{"page":390,"text":"indicated and is not normally allowed to bypass the enemy. It is normally used at battalion and lower levels.","rect":[90.0,511.1401672363281,521.9953565597534,502.031982421875]},{"page":390,"text":"Direction of attack is a more restrictive control measure than axis of advance and units are not free to","rect":[90.01001739501953,520.63916015625,521.9937038421631,513.5550537109375]},{"page":390,"text":"maneuver off the assigned route. Direction of attack is normally used in counterattacks or to ensure that","rect":[90.01001739501953,534.1260986328125,522.0163340530396,525.0179443359375]},{"page":390,"text":"supporting attacks make maximal contribution to the main attack. It is also used during night attacks,","rect":[89.9999771118164,545.6490478515625,521.9872388839722,536.5408935546875]},{"page":390,"text":"infiltrations, and when attacking through obscuration. When using a direction of attack, commanders","rect":[90.00997924804688,557.1720581054688,522.0681903343201,548.0639038085938]},{"page":390,"text":"designate a PD at the beginning. Figure A-25 on page A-14 depicts DIRECTION OF ATTACK JOAN.","rect":[90.00997924804688,568.6349487304688,504.1646375656128,559.5267944335938]},{"page":390,"text":"Final Coordination Line","rect":[72.0,591.0337524414063,186.29852067565919,583.435546875]},{"page":390,"text":"A-52. The final coordination line is a phase line close to the enemy position used to coordinate the lifting or","rect":[90.0,610.7943115234375,522.0464990196228,601.6861572265625]},{"page":390,"text":"shifting of supporting fires with the final deployment of maneuver elements (ADP 3-90). Brigade and below","rect":[90.01000213623047,622.2572021484375,521.9211468734741,613.1490478515625]},{"page":390,"text":"maneuver formations typically use an FCL. The FCL should be placed on easily recognizable terrain. Final","rect":[90.01001739501953,633.7801513671875,522.0845103225709,624.6719970703125]},{"page":390,"text":"adjustments to supporting fires necessary to reflect the actual versus the planned tactical situation take place","rect":[90.01001739501953,645.3031616210938,522.0184602813721,636.1849365234375]},{"page":390,"text":"before crossing the FCL. The FCL is not a FSCM. Figure A-25 on page A-14 depicts PL ROBERT as an","rect":[90.01001739501953,656.7660522460938,521.9711818695068,647.6578979492188]},{"page":390,"text":"FCL.","rect":[90.0,666.2750244140625,110.86164379119873,659.3511962890625]},{"page":390,"text":"A-16","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":390,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":390,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":391,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9561484375,37.90802001953125]},{"page":391,"text":"Limit of Advance","rect":[90.0,82.40274810791016,171.84490739440919,74.81556701660156]},{"page":391,"text":"A-53. The limit of advance is a phase line used to control forward progress of the attack (ADP 3-90). A LOA","rect":[108.0,102.11431884765625,540.0914349594116,93.00614166259766]},{"page":391,"text":"is a restrictive control measure because the attacking unit does not advance any of its elements or assets","rect":[108.01001739501953,113.6373291015625,539.9090106468201,104.5291519165039]},{"page":391,"text":"beyond the LOA, but the attacking unit can push its security forces to that limit. Units can employ direct and","rect":[108.01001739501953,125.16033935546875,539.9849758148193,116.05216217041016]},{"page":391,"text":"indirect fires beyond the LOA. A LOA is typically established by a higher echelon headquarters.","rect":[108.01001739501953,136.6231689453125,540.0751295089722,127.5149917602539]},{"page":391,"text":"Commanders usually select linear terrain features, perpendicular to the direction of attack, on the far side of","rect":[108.01001739501953,148.14617919921876,540.0523583946228,139.03799438476563]},{"page":391,"text":"the objective as LOAs because such terrain features are easily identifiable. They employ LOAs to prevent","rect":[108.0199966430664,159.669189453125,540.0338511428834,150.55099487304688]},{"page":391,"text":"overextending the attacking force and to reduce the possibility of fratricide and friendly fire incidents by fires","rect":[108.0200424194336,171.132080078125,540.0991351585388,162.02389526367188]},{"page":391,"text":"supporting the attack. They position LOAs far enough beyond their objectives to allow their units to defend","rect":[108.0200424194336,182.65509033203126,540.0491237640381,173.53689575195313]},{"page":391,"text":"the objective. A LOA prevents units from exploiting success and launching a pursuit; therefore, commanders","rect":[108.0200424194336,194.1781005859375,540.1132342796326,185.05990600585938]},{"page":391,"text":"should only use LOAs if they do not want to perform an exploitation or pursuit. A forward boundary is always","rect":[108.0200424194336,205.6409912109375,540.0501239280701,196.53280639648438]},{"page":391,"text":"a LOA, but a LOA is not necessarily a forward boundary. In fact, a LOA and the unit’s forward boundary","rect":[108.0200424194336,217.1639404296875,540.0050563812256,208.05575561523438]},{"page":391,"text":"should rarely coincide because of the resulting limitations that a forward boundary places on supporting fires","rect":[108.0200424194336,228.68695068359376,540.0704486351013,219.57876586914063]},{"page":391,"text":"beyond the forward boundary. Figure A-25 on page A-14 shows PL BASIL used as a LOA.","rect":[108.02002716064453,240.14984130859376,474.90337657928469,231.04165649414063]},{"page":391,"text":"Line of Departure","rect":[90.0,264.71875,174.85894548034669,254.93556213378907]},{"page":391,"text":"A-54. In land warfare, the line of departure is a line designated to coordinate the departure of attack elements","rect":[108.0,282.2943115234375,540.0391986351013,273.1861267089844]},{"page":391,"text":"(JP 3-31). The purpose of the LD is to coordinate the advance of the attacking force so that its elements strike","rect":[108.03005981445313,293.7572021484375,540.1223421173096,284.6490173339844]},{"page":391,"text":"the enemy in the order and at the time desired. The LD also marks where the unit often transitions from","rect":[108.03006744384766,305.2801818847656,540.0355505905152,296.1719970703125]},{"page":391,"text":"movement to maneuver. Commanders can also use it to facilitate the coordination of fires. Generally, it","rect":[108.03006744384766,316.8031921386719,539.9723887405396,307.69500732421877]},{"page":391,"text":"should be perpendicular to the direction the attacking force will take on its way to the objective. Friendly","rect":[108.03006744384766,328.26611328125,539.9617824554443,319.14788818359377]},{"page":391,"text":"forces should control the LD. Commanders analyze the terrain before designating an LD. Different units have","rect":[108.03009796142578,339.7890625,540.1404695587158,330.6808776855469]},{"page":391,"text":"different movement rates on leaving their assembly areas based on their inherent mobility characteristics and","rect":[108.03009796142578,351.31207275390627,540.0478420257568,342.2038879394531]},{"page":391,"text":"the terrain traversed. Commanders consider these different characteristics when establishing an LD to prevent","rect":[108.03005981445313,362.77496337890627,540.0699839553834,353.6667785644531]},{"page":391,"text":"these differences from affecting the synchronization of the operation. When possible, commanders select the","rect":[108.03005981445313,374.2979431152344,540.0515413360596,365.18975830078127]},{"page":391,"text":"LD so that the terrain the attack unit traverses before crossing the LD provides sufficient cover for the","rect":[108.03005981445313,385.8209533691406,540.0711946563721,376.7127685546875]},{"page":391,"text":"attacking unit’s final deployment into a maneuver formation before crossing the LD. In many cases, the LD","rect":[108.03005981445313,397.2838134765625,539.9361615219116,388.1756286621094]},{"page":391,"text":"is also the LC because the unit in contact is conducting the attack from its current positions. Figure A-25 on","rect":[108.03005981445313,408.80682373046877,540.1124782562256,399.6986389160156]},{"page":391,"text":"page A-14 depicts PL JOHN as a combined LD and LC.","rect":[108.0199966430664,420.329833984375,333.3057813644409,411.2216491699219]},{"page":391,"text":"Objective Rally Point","rect":[90.0,444.8606872558594,190.8589765663147,435.0555725097656]},{"page":391,"text":"A-55. The objective rally point is an easily identifiable point where all elements of the infiltrating unit","rect":[108.0,462.4142761230469,540.0203623733521,453.30609130859377]},{"page":391,"text":"assemble and prepare to attack the objective (ADP 3-90). It is typically near the infiltrating unit’s objective;","rect":[108.0000228881836,473.9372863769531,540.0222544631959,464.819091796875]},{"page":391,"text":"however, there is no standard distance from the objective to the objective rally point. It should be far enough","rect":[108.0000228881836,485.400146484375,540.0174465179443,476.2819519042969]},{"page":391,"text":"away from the objective so that the enemy will not detect the infiltrating unit’s attack preparations.","rect":[108.0,496.92315673828127,503.38701915740969,487.8049621582031]},{"page":391,"text":"Point of Departure","rect":[90.0,521.518798828125,178.55479203796387,511.7356262207031]},{"page":391,"text":"A-56. The point of departure is the point where the unit crosses","rect":[108.0,539.0343017578125,364.41383242416387,529.9261474609375]},{"page":391,"text":"the line of departure and begins moving along a direction of","rect":[107.99999237060547,550.5572509765625,364.40083861923218,541.4490966796875]},{"page":391,"text":"attack (ADP 3-90). Units conducting reconnaissance and","rect":[107.99999237060547,562.080322265625,364.4720058441162,552.97216796875]},{"page":391,"text":"security ","rect":[107.99999237060547,573.5431518554688,142.18422985076905,564.4349975585938]},{"page":391,"text":"patrols ","rect":[147.47979736328126,573.5231323242188,177.16503429412843,564.4349975585938]},{"page":391,"text":"and ","rect":[182.51571655273438,572.0,199.48058605194093,564.4349975585938]},{"page":391,"text":"other ","rect":[204.775146484375,572.0,227.8001356124878,564.4349975585938]},{"page":391,"text":"operations ","rect":[233.15081787109376,573.5231323242188,277.2969923019409,564.4349975585938]},{"page":391,"text":"in ","rect":[282.6476745605469,572.0,292.89211559295657,564.4349975585938]},{"page":391,"text":"a ","rect":[298.2427978515625,572.0,305.1285352706909,566.0]},{"page":391,"text":"low-visibility","rect":[310.4792175292969,573.5431518554688,364.29054832458498,564.4349975585938]},{"page":391,"text":"environment commonly use a point of departure (PD) as a","rect":[107.9999771118164,585.066162109375,364.3735933380127,575.9580078125]},{"page":391,"text":"control measure. Like the LD, it marks the point where the unit","rect":[107.98999786376953,596.5691528320313,364.41590070343019,587.4810180664063]},{"page":391,"text":"transitions from movement to maneuver under conditions of","rect":[107.98998260498047,606.0280151367188,364.4008691368103,598.9439086914063]},{"page":391,"text":"limited visibility. Figure A-28 depicts PD 7.","rect":[107.98998260498047,619.5750732421875,284.6796522140503,610.4669189453125]},{"page":391,"text":"Probable Line of Deployment","rect":[90.0,667.1607055664063,228.33154126358034,657.3555297851563]},{"page":391,"text":"Figure A-28. Point of departure 7","rect":[378.7799987792969,652.3742065429688,533.8224630279541,642.9854736328125]},{"page":391,"text":"A-57. Aprobable line of deployment is a phase line that designates the location where the commander intends","rect":[108.0,684.7142944335938,540.1657855491638,675.6061401367188]},{"page":391,"text":"to deploy the unit into assault formation before beginning the assault (ADP 3-90). Commanders at battalion-","rect":[108.01002502441406,696.1771850585938,540.0423486289978,687.0690307617188]},{"page":391,"text":"sized and smaller units primarily employ PLDs when their units do not cross their LD in an assault formation.","rect":[108.00997924804688,707.7001953125,540.0684156417847,698.592041015625]},{"page":391,"text":"It is usually a linear terrain feature perpendicular to the direction of attack and recognizable under conditions","rect":[108.01998901367188,719.22314453125,540.0932147483826,710.114990234375]},{"page":391,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":391,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":391,"text":"A-17","rect":[502.4909973144531,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":392,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":392,"text":"of limited visibility. The PLD should be located outside the range where enemy forces can place the attacking","rect":[90.0,83.51434326171875,522.0323390960693,74.40616607666016]},{"page":392,"text":"force under effective direct fire. In figure A-25 on page A-14, PL ROBERT is designated as the PLD.","rect":[90.0,94.97723388671875,497.1466932296753,85.86905670166016]},{"page":392,"text":"Support by Fire Position","rect":[72.0,119.60069274902344,187.76436460876466,109.79554748535156]},{"page":392,"text":"A-58. A support by fire position designates the general position","rect":[90.0,137.154296875,346.10622215270998,128.04611206054688]},{"page":392,"text":"from which a unit performs the tactical mission task of support","rect":[90.0,148.59715270996095,346.0691599807739,139.50900268554688]},{"page":392,"text":"by fire (ADP 3-90). Paragraph B-58 defines the tactical mission","rect":[90.0,160.14019775390626,346.15431785583498,151.03201293945313]},{"page":392,"text":"task of support by fire. The purpose of these positions is to","rect":[89.97996520996094,171.6632080078125,346.0219020843506,162.55502319335938]},{"page":392,"text":"increase the supported force’s freedom of maneuver by placing","rect":[89.9800033569336,183.12603759765626,346.05113792419436,174.01785278320313]},{"page":392,"text":"direct fires on an objective that a friendly force is going to","rect":[89.9799575805664,194.6490478515625,346.1440944671631,185.53085327148438]},{"page":392,"text":"assault. Support by fire positions are located within the","rect":[89.9799575805664,206.17205810546876,346.1480989532471,197.06387329101563]},{"page":392,"text":"maximum friendly direct fire range of the enemy positions.","rect":[89.9799575805664,217.63494873046876,346.1012830734253,208.52676391601563]},{"page":392,"text":"Commanders select them so that a moving assault force does not","rect":[89.9799575805664,229.157958984375,346.15833234405519,220.04977416992188]},{"page":392,"text":"mask its supporting fires. For this reason, support by fire","rect":[89.9799575805664,240.680908203125,346.10204792785648,231.57272338867188]},{"page":392,"text":"positions are normally located on the flank of an assault force,","rect":[89.9799575805664,252.143798828125,346.0261182785034,243.03561401367188]},{"page":392,"text":"elevated above the objective if possible. Support by fire positions","rect":[89.9799575805664,263.66680908203127,346.19447207260137,254.54861450195313]},{"page":392,"text":"Figure A-29. Support by fire","rect":[372.29998779296877,249.294189453125,503.9367513580322,239.90545654296876]},{"page":392,"text":"position","rect":[418.68255615234377,260.68695068359377,457.63131451797485,251.5487060546875]},{"page":392,"text":"are rarely applicable to units larger than company size. When","rect":[89.9799575805664,275.1898193359375,346.0801296234131,266.0816345214844]},{"page":392,"text":"used as a planning symbol, the support by fire position depicted in figure A-29 indicates the general location","rect":[89.97996520996094,286.6526794433594,522.0093288421631,277.54449462890627]},{"page":392,"text":"and direction from which the unit provides fires. When used as a control measure, the position of the symbol","rect":[89.97994995117188,298.1756591796875,521.9442515335084,289.0674743652344]},{"page":392,"text":"dictates the actual location of the position, and the arrows define the left and right limits of the unit’s sector","rect":[89.98001098632813,309.69866943359377,521.9543359336853,300.5904846191406]},{"page":392,"text":"of fire.","rect":[89.98001098632813,319.13751220703127,117.19733715057373,312.0533752441406]},{"page":392,"text":"Time of Attack","rect":[72.0,343.5227355957031,142.83089292907716,335.9355773925781]},{"page":392,"text":"A-59. The time of attack is the moment the leading elements of the main body cross the line of departure, or","rect":[90.0,363.2943115234375,521.9843652305603,354.1861267089844]},{"page":392,"text":"in a limited-visibility attack, the point of departure (ADP 3-90). Commanders use it when conducting","rect":[90.02003479003906,374.7572326660156,522.0221462249756,365.6490173339844]},{"page":392,"text":"simultaneous operations where supporting efforts must accomplish their mission to create conditions for the","rect":[90.01000213623047,386.2801818847656,522.0794954376221,377.1719970703125]},{"page":392,"text":"success of the main effort. When determining a time of attack, they consider the time subordinates require","rect":[90.01001739501953,397.8031921386719,522.0127229766846,388.69500732421877]},{"page":392,"text":"to—","rect":[90.01001739501953,407.2420349121094,107.8255729675293,401.159912109375]},{"page":392,"text":" Conduct necessary reconnaissance, prepare plans, and issue orders.","rect":[115.19999694824219,422.7543029785156,402.03472423553469,413.6461181640625]},{"page":392,"text":" Synchronize plans among all subordinate units.","rect":[115.19999694824219,436.2543029785156,322.54094982147219,427.1461181640625]},{"page":392,"text":" Complete attack preparations, such as pre-combat inspections.","rect":[115.19999694824219,449.7342529296875,382.60381603240969,440.6461181640625]},{"page":392,"text":" Move to the LD or PD.","rect":[115.19999694824219,461.2302551269531,226.00222301483155,454.1461181640625]},{"page":392,"text":"A-60. Orders normally designate the time of attack as H hour. This occurs when the main body crosses the","rect":[89.9937515258789,480.779296875,521.9557771759033,471.6711120605469]},{"page":392,"text":"LD. However, H-hour can also designate the time to implement a phase of an operation, such as an airborne","rect":[89.99374389648438,492.2421569824219,522.0011873321533,483.13397216796877]},{"page":392,"text":"or air assault phase. The headquarters planning the operation specifies the term’s exact meaning. This is","rect":[89.99373626708985,503.7651672363281,521.9589984397888,494.656982421875]},{"page":392,"text":"usually a part of the unit’s standard operating procedures.","rect":[89.99372863769531,515.2881469726563,320.25738048553469,506.1799621582031]},{"page":392,"text":"Zone","rect":[72.0,537.6828002929688,95.83868180847168,530.2713012695313]},{"page":392,"text":"A-61. A zone is an operational area assigned to a unit in the offense that only has rear and lateral boundaries","rect":[90.0,557.394287109375,521.9361712913513,548.2861328125]},{"page":392,"text":"(FM 3-0). By not emplacing a boundary to a unit’s front it allows them to move quicker and synchronize","rect":[90.00000762939453,568.9172973632813,521.9179964141846,559.8091430664063]},{"page":392,"text":"fires better against the enemy they are facing. A zone is different from an area of operations in that instead","rect":[90.00000762939453,580.4403076171875,521.9406642913818,571.3321533203125]},{"page":392,"text":"of a forward boundary to restrict movement and fires a higher headquarters uses maneuver control measures","rect":[90.00000762939453,591.9031982421875,522.0644671897888,582.7950439453125]},{"page":392,"text":"and fire support coordination measures. Example control measures to use include things such as a limit of","rect":[90.0,603.4261474609375,521.8644921836853,594.3179931640625]},{"page":392,"text":"advance and a coordinated fire line. Zones are most appropriate for any unit likely to make direct fire contact","rect":[90.0,614.8890380859375,522.0898814163209,605.7808837890625]},{"page":392,"text":"with the enemy during high-tempo offensive operations or when there is a fluid FLOT. Units assigned a zone","rect":[90.0,626.4120483398438,522.0224886016846,617.3038940429688]},{"page":392,"text":"treat areas behind the FLOT as an AO. Zone can be further subdivided as needed into area of operations,","rect":[89.98998260498047,637.9150390625,521.9849195480347,628.826904296875]},{"page":392,"text":"zones, or sectors as appropriate. Any unit not expecting to be in direct fire contact with the enemy should use","rect":[89.98998260498047,649.39794921875,521.9856844024658,640.289794921875]},{"page":392,"text":"an area of operations or other means of terrain management. If a unit is attacking in a zone and culminates","rect":[89.98999786376953,660.9209594726563,521.9134662132263,651.8128051757813]},{"page":392,"text":"and transitions to a hasty defense, they will continue to use the zone because they eventually expect to go","rect":[89.98998260498047,672.4439697265625,522.0671901702881,663.3358154296875]},{"page":392,"text":"back on the offense and the defense is a temporary thing. Figure A-30 depicts a battalion zone for 1-66 Armor.","rect":[89.98998260498047,683.9067993164063,521.9221143722534,674.7986450195313]},{"page":392,"text":"A-18","rect":[72.1199951171875,754.18798828125,91.57798986816407,747.6090087890625]},{"page":392,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":392,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":393,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":393,"text":"Figure A-30. Example zone for 1-66 Armor","rect":[215.45999145507813,352.3141784667969,414.4792315940857,342.9254455566406]},{"page":393,"text":"DEFENSIVE OPERATIONS CONTROL MEASURES","rect":[90.0,381.7080078125,322.9788570404053,373.416015625]},{"page":393,"text":"A-62. The commander controls the defense by using control measures to provide the flexibility needed to","rect":[108.0,401.5743103027344,540.0211696624756,392.46612548828127]},{"page":393,"text":"respond to changes in the situation and allow the defending commander to rapidly concentrate combat power","rect":[108.01001739501953,413.0973205566406,539.9892480430603,403.9891357421875]},{"page":393,"text":"at the decisive point. Defensive control measures within a commander’s assigned area include designating","rect":[108.01000213623047,424.62030029296877,539.9709987640381,415.5121154785156]},{"page":393,"text":"the security area, BHL, MBA with its associated FEBA, and the echelon support area. The commander can","rect":[108.01000213623047,436.08319091796877,539.9992580413818,426.9750061035156]},{"page":393,"text":"use battle positions and additional direct fire control and FSCMs in addition to those control measures","rect":[108.0,447.5861511230469,540.1005389671326,438.4980163574219]},{"page":393,"text":"discussed earlier in appendix A to further synchronize the employment of combat power. The commander","rect":[108.0,459.1291809082031,539.9493310508728,450.02099609375]},{"page":393,"text":"designates disengagement lines to trigger the displacement of subordinate forces. These common defensive","rect":[107.98998260498047,470.5920715332031,539.9610261993408,461.48388671875]},{"page":393,"text":"control measures are discussed in alphabetical order in paragraphs A-63 through A-79.","rect":[107.98999786376953,482.1150817871094,455.15297985076907,473.00689697265627]},{"page":393,"text":"Battle Positions","rect":[90.0,504.5027160644531,163.03126010513305,496.9155578613281]},{"page":393,"text":"A-63. A battle position is a defensive location oriented on a likely enemy avenue of approach (ADP 3-90).","rect":[108.0,524.2142944335938,539.9824171066284,515.1061401367188]},{"page":393,"text":"A battle position is generally only used during defensive operations. The battle position (BP) is a symbol that","rect":[107.99999237060547,535.7373046875,540.1114878616334,526.629150390625]},{"page":393,"text":"depicts the location and general orientation of most of the defending forces. A commander’s use of a battle","rect":[108.01998901367188,547.2603149414063,539.9789095001221,538.1521606445313]},{"page":393,"text":"position does not direct the position of the subordinate’s entire force within its bounds since it is not an","rect":[108.01998901367188,558.703125,539.9611110687256,549.614990234375]},{"page":393,"text":"assigned area. There are five kinds of BPs—primary, alternate, supplementary, subsequent, and strong point.","rect":[108.0199966430664,570.2462158203125,540.0064649581909,561.1380615234375]},{"page":393,"text":"When assigning BPs, the higher echelon always designates the primary BP. The subordinate unit designates","rect":[108.01001739501953,581.7691650390625,539.9428851585388,572.6610107421875]},{"page":393,"text":"and prepares alternate, supplementary, and subsequent positions as time and other resources permit and if the","rect":[108.01001739501953,593.2320556640625,540.0333528594971,584.1239013671875]},{"page":393,"text":"terrain or situation requires them. Figure A-31 on page A-20 depicts the five kinds of BPs.","rect":[108.01001739501953,604.7550659179688,469.93145275115969,595.6469116210938]},{"page":393,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":393,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":393,"text":"A-19","rect":[502.4909973144531,754.18798828125,521.9490073242188,747.6090087890625]},{"page":394,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":394,"text":"Figure A-31. Five kinds of battle positions","rect":[197.82000732421876,373.3141784667969,396.17899989318848,363.9254455566406]},{"page":394,"text":"A-64. The primary position is the position that covers the enemy’s most likely avenue of approach into","rect":[89.99478912353516,396.77099609375,522.0782375335693,387.6628112792969]},{"page":394,"text":"the assigned area. It is the best position from which to accomplish the mission, such as cover an engagement","rect":[89.9947738647461,408.29400634765627,522.0582652053834,399.1858215332031]},{"page":394,"text":"area.","rect":[89.9947738647461,417.79296875,109.17705821990967,413.0434875488281]},{"page":394,"text":"A-65. An alternate position is a defensive position that the commander assigns to a unit or weapon","rect":[89.9947738647461,437.2818603515625,522.0342550201416,428.3340148925781]},{"page":394,"text":"system for occupation when the primary position becomes untenable or unsuitable for carrying out","rect":[90.00479888916016,448.80487060546877,521.9517114219666,439.8570251464844]},{"page":394,"text":"the assigned task. It covers the same area as the primary position. Commanders locate alternate positions so","rect":[90.00479888916016,460.327880859375,522.0510768890381,451.2196960449219]},{"page":394,"text":"the occupants can continue to fulfill their original tasks, such as covering the same avenue of approach or","rect":[90.00479888916016,471.7907409667969,521.9289453086853,462.68255615234377]},{"page":394,"text":"engagement area as their primary positions. These positions increase the defenders’ survivability by allowing","rect":[90.00479888916016,483.3137512207031,522.0126247406006,474.20556640625]},{"page":394,"text":"defenders to engage enemy forces from multiple positions. For example, a unit moves to its alternate positions","rect":[90.00479888916016,494.8367614746094,522.0531146507263,485.728515625]},{"page":394,"text":"when enemy forces bring suppressive fires on the primary position.","rect":[90.00479888916016,506.29962158203127,359.38759899139407,497.1914367675781]},{"page":394,"text":"A-66. A supplementary position is a defensive position located within a unit’s assigned area that","rect":[90.00479888916016,523.8245849609375,522.0513207969666,514.876708984375]},{"page":394,"text":"provides the best sectors of fire and defensive terrain along an avenue of approach that is not the","rect":[90.01481628417969,535.2874755859375,522.0322542266846,526.339599609375]},{"page":394,"text":"primary avenue where the enemy is expected to attack. For example, an avenue of approach into a unit’s","rect":[90.01481628417969,546.8104858398438,522.0722186546326,537.7023315429688]},{"page":394,"text":"assigned area from one of its flanks normally requires establishing supplementary positions to allow a unit","rect":[90.01481628417969,558.33349609375,522.0067515335084,549.225341796875]},{"page":394,"text":"or weapon system to engage enemy forces traveling along that avenue.","rect":[90.01481628417969,569.79638671875,373.0076856613159,560.688232421875]},{"page":394,"text":"A-67. A subsequent position is a position that a unit expects to move to during the course of battle. A","rect":[90.01481628417969,587.3213500976563,521.9920697250366,578.3734741210938]},{"page":394,"text":"planned and, to some extent, prepared location for a defense or delay that is behind the primary positions","rect":[90.02484893798828,598.8443603515625,522.0879657249451,589.7362060546875]},{"page":394,"text":"initially occupied for a defense. A defending unit may have a series of subsequent positions. Subsequent","rect":[90.02484893798828,610.3071899414063,522.0802988967896,601.1990356445313]},{"page":394,"text":"positions can be further organized into primary, alternate, and supplementary positions.","rect":[90.02484893798828,621.8302001953125,439.68865489959719,612.7220458984375]},{"page":394,"text":"A-68. A strong point is a heavily fortified battle position tied to a natural or reinforcing obstacle to create an","rect":[90.02484893798828,639.355224609375,522.0640773773193,630.2470703125]},{"page":394,"text":"anchor for the defense or to deny the enemy decisive or key terrain (ADP 3-90). Strong points require","rect":[90.03484344482422,650.8180541992188,522.0882234649658,641.7098999023438]},{"page":394,"text":"extensive engineer support to create obstacles and increase survivability efforts. This include providing all","rect":[90.03480529785156,662.341064453125,522.0689463577271,653.23291015625]},{"page":394,"text":"assets overhead protection, trenches, and other protective construction using both natural and man-made","rect":[90.03480529785156,673.864013671875,522.1031770782471,664.755859375]},{"page":394,"text":"terrain. Commanders prepare a strong point for all around defense. Commanders also establish a strong point","rect":[90.03489685058594,685.3270263671875,522.0255503616334,676.2188720703125]},{"page":394,"text":"when anticipating that enemy actions will isolate a defending force retaining terrain critical to the defense.","rect":[90.03489685058594,696.8499755859375,515.4280958175659,687.7418212890625]},{"page":394,"text":"A-20","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":394,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":394,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":395,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":395,"text":"A-69. Before assigning a strong point mission, commanders ensure that the strong point force has sufficient","rect":[108.0,83.51434326171875,540.0301890335084,74.40616607666016]},{"page":395,"text":"time and resources to construct the position. A minimally effective strong point typically requires one day of","rect":[108.01001739501953,94.97723388671875,540.0441186485291,85.86905670166016]},{"page":395,"text":"effort from an engineer unit the same size as the unit defending the strong point. Normally, companies and","rect":[108.01001739501953,106.500244140625,539.9910793304443,97.3920669555664]},{"page":395,"text":"battalions occupy strong points, although brigades may construct them. Units do not normally establish strong","rect":[108.01001739501953,118.023193359375,540.0068874359131,108.9150161743164]},{"page":395,"text":"points for units smaller than company size. This is because a platoon or squad cannot secure a perimeter large","rect":[108.01001739501953,129.486083984375,540.1117830352783,120.3779067993164]},{"page":395,"text":"enough to contain all required assets and supplies.","rect":[108.01001739501953,141.00909423828126,308.5723829269409,131.90090942382813]},{"page":395,"text":"A-70. Units as large as battalion task forces and as small as squads or sections use BPs. Commanders select","rect":[108.01001739501953,158.5340576171875,539.9755015335084,149.42587280273438]},{"page":395,"text":"positions based on terrain, enemy capabilities, and friendly capabilities. A commander can assign all or some","rect":[108.02003479003906,169.9969482421875,540.0472688751221,160.88876342773438]},{"page":395,"text":"subordinates’ BPs within their BP. Figure A-32 depicts a combined arms battalion BP.","rect":[108.02003479003906,181.51995849609376,454.7431592941284,172.41177368164063]},{"page":395,"text":"A-71. A commander may assign subordinates BPs in situations when there is a need to retain a greater degree","rect":[108.01001739501953,199.044921875,539.9812288360596,189.93673706054688]},{"page":395,"text":"of control over the maneuver of subordinate units than that provided through only using an assigned area, as","rect":[108.02002716064453,210.5078125,540.0140521507263,201.39962768554688]},{"page":395,"text":"the higher unit controls maneuver outside the general location of the BP. A commander can assign multiple","rect":[108.02002716064453,222.03082275390626,540.0260896759033,212.92263793945313]},{"page":395,"text":"BPs to a single unit, which allows that unit to maneuver between BPs. The commander specifies mission and","rect":[108.02002716064453,233.49371337890626,540.0834255218506,224.38552856445313]},{"page":395,"text":"engagement criteria to the unit assigned to a BP. Security, functional and multifunctional support, and","rect":[108.02002716064453,245.0167236328125,540.0260524749756,235.90853881835938]},{"page":395,"text":"sustainment forces typically operate outside a unit’s BP. Figure A-33 on page A-22 depicts a brigade assigned","rect":[108.02002716064453,256.5396728515625,540.0060329437256,247.43148803710938]},{"page":395,"text":"area with battalion BPs.","rect":[108.03009796142578,265.978515625,203.59682750701905,258.8943786621094]},{"page":395,"text":"A-72. Units occupy or depart BPs as part of the overall plan. The commander assigning a unit to a BP should","rect":[108.03005981445313,285.527587890625,540.0711574554443,276.4194030761719]},{"page":395,"text":"specify when and under what conditions the unit can displace from the position, since a BP is not normally","rect":[108.03005981445313,297.05059814453127,539.9482936859131,287.9424133300781]},{"page":395,"text":"held at all costs. If a higher echelon commander orders a unit to defend a BP, its commander has the option","rect":[108.03005981445313,308.5134582519531,540.0042629241943,299.4052734375]},{"page":395,"text":"of moving off the BP. If a higher echelon commander directs a unit to retain a BP, the subordinate commander","rect":[108.03009796142578,320.03643798828127,540.1063134727478,310.9282531738281]},{"page":395,"text":"needs to know the specific conditions that need to exist before the unit can displace.","rect":[108.03005981445313,331.5393981933594,443.77285289764407,322.4512634277344]},{"page":395,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":395,"text":"Figure A-32.","rect":[151.64712524414063,601.3779907226563,209.5126109085083,592.0794067382813]},{"page":395,"text":"Combined arms battalion","rect":[212.18795776367188,599.39404296875,332.2606480140686,591.9892578125]},{"page":395,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":395,"text":"with company","rect":[335.00311279296877,601.3779907226563,401.71827601623536,592.1094970703125]},{"page":395,"text":"battle positions","rect":[404.4817810058594,601.2477416992188,478.38932704162598,592.1094970703125]},{"page":395,"text":"A-21","rect":[502.4909973144531,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":396,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":396,"text":"Figure A-33. Brigade assigned area with battalion battle positions","rect":[141.4199981689453,347.8141784667969,452.59110926818848,338.515625]},{"page":396,"text":"Disengagement Line","rect":[72.0,378.3807067871094,167.5995765838623,368.5755920410156]},{"page":396,"text":"A-73. A disengagement line is a phase line located on identifiable terrain that, when crossed by the enemy,","rect":[90.0,395.9342956542969,522.0054883956909,386.82611083984377]},{"page":396,"text":"signals to defending elements that it is time to displace to their next position (ADP 3-90). Commanders use","rect":[89.99999237060547,407.4573059082031,522.0072908477783,398.34912109375]},{"page":396,"text":"these lines in the delay and the defense when they want their defending units to avoid becoming decisively","rect":[89.99996185302735,418.920166015625,521.9661769866943,409.8119812011719]},{"page":396,"text":"engaged. They establish criteria, either time or condition based, for disengagement, such as number of enemy","rect":[89.98994445800781,430.44317626953127,522.0313625335693,421.3349914550781]},{"page":396,"text":"vehicles by type, friendly losses, or enemy movement to flanking locations. They may designate multiple","rect":[89.9999771118164,441.9661865234375,521.9328279571533,432.8580017089844]},{"page":396,"text":"disengagement lines, one for each system in the defense, or if they want the unit to conduct multiple","rect":[89.9999771118164,453.4290466308594,521.9929475860596,444.32086181640627]},{"page":396,"text":"displacements. Figure A-34 depicts PL JOAN as a disengagement line.","rect":[89.9999771118164,464.9520568847656,374.15911388397219,455.8438720703125]},{"page":396,"text":"Engagement Area","rect":[72.0,489.5606994628906,156.58005714416505,479.77752685546877]},{"page":396,"text":"A-74. An engagement area is an area where the commander masses effects to contain and destroy an","rect":[90.0,507.0542907714844,522.0964498443603,498.1064453125]},{"page":396,"text":"enemy force. This includes organic direct fire systems and supporting systems, such as close air support.","rect":[90.0100326538086,518.5772705078125,522.0122022628784,509.4690856933594]},{"page":396,"text":"The size and shape of the engagement area is determined by the relatively unobstructed intervisibility from","rect":[90.0100326538086,530.1002807617188,521.9657874069214,520.9921264648438]},{"page":396,"text":"the weapon systems in their firing positions and the maximum effective range of those system. Commanders","rect":[90.0100326538086,541.5631713867188,522.0743548851013,532.4550170898438]},{"page":396,"text":"designate EAs to cover each enemy avenue of approach into unit positions. The commander routinely","rect":[90.0100326538086,553.086181640625,521.9625148773193,543.97802734375]},{"page":396,"text":"subdivides their EA into smaller EAs for subordinates using one or more target reference points or by","rect":[90.0,564.6091918945313,521.9483547210693,555.5010375976563]},{"page":396,"text":"prominent terrain features. While subordinates are assigned sectors of fire, responsibility for an avenue of","rect":[89.98999786376953,576.072021484375,521.9798486289978,566.9638671875]},{"page":396,"text":"approach or key terrain is never split. Commanders at battalion and below typically use this control measure.","rect":[89.98998260498047,587.5950927734375,521.9662427902222,578.4869384765625]},{"page":396,"text":"The seven steps of engagement area development are: identify all likely enemy avenues of approach,","rect":[89.98998260498047,599.1180419921875,521.9722852706909,590.0098876953125]},{"page":396,"text":"determine likely enemy schemes of maneuver, determine where to kill the enemy force, plan and integrate","rect":[89.98998260498047,610.5809326171875,521.8878450469971,601.4727783203125]},{"page":396,"text":"obstacles, emplace weapon systems, plan and integrate indirect fires, and rehearse. Figure A-34 depicts a","rect":[89.98998260498047,622.1039428710938,522.0550813751221,612.9957885742188]},{"page":396,"text":"sketch of several engagement areas used within the context of a reinforced battalion task force defense.","rect":[89.98999786376953,633.626953125,502.69509410858157,624.518798828125]},{"page":396,"text":"A-22","rect":[72.1199951171875,754.0800170898438,91.57798986816407,747.6090087890625]},{"page":396,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":396,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":397,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":397,"text":"Figure A-34. Task force engagement areas","rect":[214.3800048828125,345.11419677734377,415.6187276763916,335.7254638671875]},{"page":397,"text":"Final Protective Fire","rect":[90.0,373.4627380371094,187.09612809753419,365.8755798339844]},{"page":397,"text":"A-75. Final","rect":[108.0,391.21026611328127,154.95774030303955,384.1261291503906]},{"page":397,"text":"protective ","rect":[163.3304443359375,393.2142639160156,205.7952070236206,384.7073059082031]},{"page":397,"text":"fire","rect":[211.74708557128907,393.23431396484377,225.61576557922363,384.1261291503906]},{"page":397,"text":"is ","rect":[234.07164001464845,392.0,243.23693370819093,384.1261291503906]},{"page":397,"text":"an ","rect":[249.18881225585938,392.0,261.17373180389407,386.0]},{"page":397,"text":"immediately ","rect":[267.1256103515625,393.23431396484377,319.61040782928469,384.1261291503906]},{"page":397,"text":"available,","rect":[325.5622863769531,392.0,364.1272840499878,384.1261291503906]},{"page":397,"text":"prearranged barrier of fire designed to impede enemy movement","rect":[108.01001739501953,404.75732421875,364.1814341506958,395.6491394042969]},{"page":397,"text":"across defensive lines or areas (JP 3-09.3). Both direct and","rect":[108.01001739501953,416.20013427734377,364.1041774749756,407.11199951171877]},{"page":397,"text":"indirect fire weapons can provide final protective fires (FPFs).A","rect":[108.0,427.72314453125,364.11121035003665,418.635009765625]},{"page":397,"text":"commander can only assign each firing battery or platoon a","rect":[108.0,439.2662048339844,364.11214924621586,430.15802001953127]},{"page":397,"text":"single FPF. Firing units should lay on their FPFs (or other","rect":[108.0,450.72906494140627,364.1130273399353,441.6208801269531]},{"page":397,"text":"assigned priority targets) but do not “engage” or fire them unless","rect":[108.0,462.2520751953125,364.1524188499451,453.1438903808594]},{"page":397,"text":"directed. A FPF is a priority target for an element or system, and","rect":[108.0,473.77508544921877,364.1140651702881,464.6669006347656]},{"page":397,"text":"those fire units engage that target when they are not engaged in","rect":[108.0,485.23797607421877,364.06422996520998,476.1297912597656]},{"page":397,"text":"other fire missions. When an enemy force initiates its final","rect":[108.0,496.7609558105469,364.1631236038208,487.65277099609377]},{"page":397,"text":"assault into a defensive position, the defending unit initiates its","rect":[108.0,508.283935546875,364.1129901390076,499.1757507324219]},{"page":397,"text":"Figure A-35. Final protective fire","rect":[379.7400207519531,501.11419677734377,532.5440206451416,491.7254638671875]},{"page":397,"text":"FPFs to engage enemy infantry soldiers and armored vehicles. Figure A-35 depicts an FPF to be fired by","rect":[108.0,519.746826171875,540.0103054046631,510.6386413574219]},{"page":397,"text":"A/1-16 Field Artillery.","rect":[107.98998260498047,531.2698364257813,198.82128429412843,522.1616821289063]},{"page":397,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":397,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":397,"text":"A-23","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":398,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":398,"text":"Final Protective Line","rect":[72.0,82.40274810791016,170.95066606140137,74.81556701660156]},{"page":398,"text":"A-76. A final protective line is a selected","rect":[90.0,102.11431884765625,267.4732503814697,93.16645812988281]},{"page":398,"text":"line of fire where an enemy assault is to be","rect":[90.01002502441406,113.6373291015625,267.5052766876221,104.68946838378906]},{"page":398,"text":"checked by interlocking fire from all","rect":[90.01002502441406,125.16033935546875,267.5143198928833,116.21247863769531]},{"page":398,"text":"available ","rect":[90.01002502441406,135.0,130.91466808319093,127.67530822753906]},{"page":398,"text":"weapons ","rect":[143.52984619140626,136.60313415527345,182.75414562225343,129.0]},{"page":398,"text":"and ","rect":[195.36932373046876,135.0,213.95342540740968,127.83563232421875]},{"page":398,"text":"obstacles.","rect":[226.62872314453126,135.0,267.4742383956909,127.83563232421875]},{"page":398,"text":"Whenever possible, units reinforce the final","rect":[90.01001739501953,148.1261444091797,267.3790965042114,139.03799438476563]},{"page":398,"text":"protective ","rect":[90.01001739501953,159.64915466308595,132.53489208221436,150.56100463867188]},{"page":398,"text":"line ","rect":[140.23025512695313,158.0,157.67507457733155,150.56100463867188]},{"page":398,"text":"(FPL)","rect":[165.3704376220703,159.64915466308595,189.2871911582947,150.56100463867188]},{"page":398,"text":"with protective","rect":[199.50857543945313,159.64915466308595,267.49828816223148,150.56100463867188]},{"page":398,"text":"obstacles. All company and below echelons","rect":[90.01000213623047,171.132080078125,267.4802997093201,162.02389526367188]},{"page":398,"text":"identify their final protective lines as part of","rect":[90.01000213623047,182.65509033203126,267.4642236289978,173.54690551757813]},{"page":398,"text":"their ","rect":[90.01001739501953,193.0,110.87465953826905,185.06991577148438]},{"page":398,"text":"defensive ","rect":[117.72834777832031,193.0,158.5728406906128,185.06991577148438]},{"page":398,"text":"preparations.","rect":[165.42652893066407,194.15806579589845,217.37026500701905,185.06991577148438]},{"page":398,"text":"Typically,","rect":[226.75296020507813,194.1781005859375,267.4782361984253,185.06991577148438]},{"page":398,"text":"initiation of FPFs is the signal for all","rect":[90.01001739501953,205.6409912109375,267.52637433624269,196.53280639648438]},{"page":398,"text":"elements to shift fires to their assigned","rect":[90.01001739501953,217.1639404296875,267.4772548675537,208.05575561523438]},{"page":398,"text":"portion of the final protective line and spare","rect":[90.01001739501953,228.6669158935547,267.4773531036377,219.57876586914063]},{"page":398,"text":"no ammunition in repelling the enemy","rect":[90.01001739501953,240.14984130859376,267.4642848968506,231.04165649414063]},{"page":398,"text":"assault. Figure A-36 depicts a FPL.","rect":[90.01001739501953,251.6728515625,231.47939586639405,242.56466674804688]},{"page":398,"text":"Forward Edge of the Battle Area","rect":[72.0,310.76068115234377,226.17344093322755,300.9665222167969]},{"page":398,"text":"Figure A-36. Final protective line","rect":[321.6000061035156,299.45416259765627,476.0292806549072,290.1556091308594]},{"page":398,"text":"A-77. Forward edge of the battle area is","rect":[90.0,328.2543029785156,261.48625063705449,319.1461181640625]},{"page":398,"text":"the foremost limits of a series of areas in","rect":[90.01000213623047,337.7532653808594,261.4352321624756,330.66912841796877]},{"page":398,"text":"which ground combat units are deployed to","rect":[90.01001739501953,351.30029296875,261.52541160583498,342.1921081542969]},{"page":398,"text":"coordinate fire support, the positioning of","rect":[90.01001739501953,362.76318359375,261.4482629356384,353.6549987792969]},{"page":398,"text":"forces, or the maneuver of units, excluding","rect":[90.01001739501953,374.28619384765627,261.4583034515381,365.1780090332031]},{"page":398,"text":"areas in which covering or screening forces","rect":[90.01001739501953,385.8091735839844,261.44422793197637,376.70098876953127]},{"page":398,"text":"are operating (JP 3-09.3). A FEBA is not a","rect":[90.02003479003906,397.2720642089844,261.5103120880127,388.16387939453127]},{"page":398,"text":"boundary, but a phase line designating the","rect":[90.02002716064453,408.7950744628906,261.4842805938721,399.6868896484375]},{"page":398,"text":"forward most point of the MBA and helps","rect":[90.02002716064453,420.2980041503906,261.5444171409607,411.2098693847656]},{"page":398,"text":"convey the commander’s intent. It marks","rect":[90.02002716064453,431.78094482421877,261.48731875228887,422.6727600097656]},{"page":398,"text":"the foremost limits of the areas in which","rect":[90.02002716064453,441.2799072265625,261.45726585388186,434.1957702636719]},{"page":398,"text":"most ground combat units deploy,","rect":[90.02002716064453,454.7668151855469,261.48928356170657,445.65863037109377]},{"page":398,"text":"excluding the areas in which security","rect":[90.02002716064453,466.2898254394531,261.47630882263186,457.181640625]},{"page":398,"text":"forces are operating. MBA forces can","rect":[90.02002716064453,477.81280517578127,261.4731960296631,468.7046203613281]},{"page":398,"text":"temporarily move forward of the FEBA to","rect":[90.02002716064453,489.27569580078127,261.45824241638186,480.1675109863281]},{"page":398,"text":"expedite ","rect":[90.02002716064453,500.7786560058594,126.42469310760498,491.6905212402344]},{"page":398,"text":"the ","rect":[132.49981689453126,499.0,147.1841230392456,491.6905212402344]},{"page":398,"text":"retrograde ","rect":[153.25924682617188,500.7987060546875,196.86330699920655,491.6905212402344]},{"page":398,"text":"operations ","rect":[202.87530517578126,500.7786560058594,247.08056163787843,491.6905212402344]},{"page":398,"text":"of","rect":[253.09255981445313,499.0,261.46928954696656,491.7005615234375]},{"page":398,"text":"security forces. A commander designates a","rect":[90.02002716064453,512.3217163085938,261.50524617004398,503.2135009765625]},{"page":398,"text":"FEBA to coordinate fire support and to","rect":[90.02002716064453,523.7645263671875,261.4541835784912,514.6763916015625]},{"page":398,"text":"help maneuver subordinate forces. The","rect":[90.02002716064453,535.2875366210938,261.5173921661377,526.1994018554688]},{"page":398,"text":"Figure A-37. Forward edge of the battle area","rect":[291.3599853515625,527.5741577148438,500.33915614318848,518.1854248046875]},{"page":398,"text":"FEBA shows the senior commander’s planned limit for the effects of direct fires. Defending units must","rect":[90.02002716064453,546.83056640625,522.0791392288209,537.722412109375]},{"page":398,"text":"address this area in their scheme of maneuver and exchange information regarding tactical plans at contact","rect":[90.02002716064453,558.2933959960938,521.9114756546021,549.1852416992188]},{"page":398,"text":"points. The Army only uses a FEBA during defensive operations. Figure A-37 depicts the current FEBA and","rect":[90.02002716064453,569.81640625,521.9959621429443,560.708251953125]},{"page":398,"text":"a proposed FEBA.","rect":[90.03009796142578,581.3194580078125,164.23919200897218,572.2313232421875]},{"page":398,"text":"Main Battle Area","rect":[72.0,603.6227416992188,153.81089210510255,596.0355224609375]},{"page":398,"text":"A-78. The main battle area is the area where the commander intends to deploy the bulk of their unit to","rect":[90.0,623.394287109375,521.9351711273193,614.2861328125]},{"page":398,"text":"defeat an attacking enemy. The bulk of a unit’s combat power is deployed in MBA. The MBA extends","rect":[90.02002716064453,634.9172973632813,522.0132586936951,625.8091430664063]},{"page":398,"text":"from the FEBA to the unit’s rear boundary. Security forces are located outside of the MBA.","rect":[90.01998901367188,646.3801879882813,456.89922618865969,637.2720336914063]},{"page":398,"text":"Sector","rect":[72.0,668.8046875,101.90402757263183,661.20654296875]},{"page":398,"text":"A-79. A sector is an operational area assigned to a unit in the defense that has rear and lateral boundaries","rect":[90.0,688.5543212890625,521.9020526390076,679.4461669921875]},{"page":398,"text":"with interlocking fires (FM 3-0). By not emplacing a boundary to a unit’s front it allows them to synchronize","rect":[90.01001739501953,700.0772705078125,522.0704622344971,690.9691162109375]},{"page":398,"text":"fires better against the enemy they are facing. A sector is different from an area of operations in that instead","rect":[90.01001739501953,711.5401611328125,522.0343532562256,702.4320068359375]},{"page":398,"text":"A-24","rect":[72.1199951171875,754.0800170898438,91.57798986816407,747.6090087890625]},{"page":398,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":398,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":399,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":399,"text":"of a forward boundary to restrict movement and fires a higher headquarters uses maneuver control measures","rect":[108.0,83.51434326171875,540.0602557640076,74.40616607666016]},{"page":399,"text":"and fire support coordination measures. Example control measures to use include things such as a battle","rect":[108.0,94.97723388671875,539.9462556915283,85.86905670166016]},{"page":399,"text":"position and a coordinated fire line.Sectorsare most appropriate for any unit likely to make direct fire contact","rect":[108.00003814697266,106.500244140625,540.1194224319459,97.3920669555664]},{"page":399,"text":"with the enemy during high-tempo defensive operations or when there is a fluid FLOT. Units assigned a","rect":[108.01005554199219,118.023193359375,539.9984407501221,108.9150161743164]},{"page":399,"text":"sector treat areas behind the FLOT as an AO. Sectors can be further subdivided as needed into area of ","rect":[108.0100326538086,127.4720687866211,542.5013380050659,120.3779067993164]},{"page":399,"text":"operations, sectors, or zones as appropriate. Any unit not expecting to be in direct fire contact with the enemy","rect":[108.01005554199219,141.00909423828126,540.0064601898193,131.90090942382813]},{"page":399,"text":"should use an area of operations or other means of terrain management. If a unit is defending in a sector and","rect":[108.01005554199219,152.5321044921875,539.9932765960693,143.42391967773438]},{"page":399,"text":"transitions to a hasty attack to exploit the enemy, they will continue to use the sector until an order can be","rect":[108.02006530761719,163.9949951171875,540.0153474884033,154.88681030273438]},{"page":399,"text":"issued that will better control the attack, which will then change it to either a zone or area of operations.","rect":[108.01005554199219,175.51800537109376,539.9942579269409,166.40982055664063]},{"page":399,"text":"Figure A-38 depicts a battalion sector for 1-66 Armor. ","rect":[108.01005554199219,187.04095458984376,328.0091505050659,177.93276977539063]},{"page":399,"text":"Figure A-38. Example sector for 1-66 Armor","rect":[211.86732482910157,461.3584899902344,418.0889728050232,451.9697570800781]},{"page":399,"text":"DIRECT FIRE CONTROL MEASURES","rect":[90.0,490.6679992675781,265.018835067749,482.3760070800781]},{"page":399,"text":"A-80. Commanders communicate to subordinates the manner, method, and time to initiate, shift, and mass","rect":[108.0,509.0,540.1005389671326,501.4861145019531]},{"page":399,"text":"direct fires by using direct fire control measures. The commander controls unit fires to direct the engagement","rect":[108.01005554199219,522.0571899414063,540.0414805374146,512.9490356445313]},{"page":399,"text":"of enemy systems and gain the greatest effect. The commander uses IPB products and reconnaissance to","rect":[108.01007080078125,533.5802001953125,539.9433498382568,524.4720458984375]},{"page":399,"text":"determine the most advantageous way to use direct fire control measures to mass the effects on the enemy","rect":[108.01007080078125,545.1031494140625,539.9145412445068,535.9949951171875]},{"page":399,"text":"and reduce friendly fire incidents from direct fire systems. The commander must understand the","rect":[108.01007080078125,556.5660400390625,540.0204134063721,547.4578857421875]},{"page":399,"text":"characteristics of weapon systems and available munitions (such as the danger to unprotected Soldiers when","rect":[108.01007080078125,568.0890502929688,540.0441188812256,558.9808959960938]},{"page":399,"text":"tanks fire discarding sabot ammunition over their heads or near them). Direct fire control measures defined","rect":[108.01007080078125,579.612060546875,540.0063381195068,570.50390625]},{"page":399,"text":"in this publication include engagement criteria, engagement priorities, sectors of fire, TRPs, and trigger line.","rect":[108.00003814697266,591.074951171875,539.9822950363159,581.966796875]},{"page":399,"text":"Maneuver platoon and company publications address and go into further detail on other direct fire control","rect":[108.00003814697266,602.597900390625,539.9913096389771,593.48974609375]},{"page":399,"text":"measures, such as frontal, cross, or depth fire patterns and simultaneous, alternating, or observed techniques","rect":[107.99002075195313,614.1209716796875,539.9784076194763,605.0128173828125]},{"page":399,"text":"of fire. Figure A-39 on page A-26 depicts common graphical direct fire control measures.","rect":[107.99002075195313,625.5838012695313,466.5487012863159,616.4756469726563]},{"page":399,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":399,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":399,"text":"A-25","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":400,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":400,"text":"Figure A-39. Direct fire control measures","rect":[200.33999633789063,417.11419677734377,393.71803187561036,407.7254638671875]},{"page":400,"text":"Engagement Criteria","rect":[72.0,447.6806945800781,171.2240695953369,437.8755798339844]},{"page":400,"text":"A-81. Engagement criteria are protocols that specify those circumstances for initiating engagement with an","rect":[90.0,465.23431396484377,522.0202541351318,456.1261291503906]},{"page":400,"text":"enemy force. They may be restrictive or permissive. Commanders establish engagement criteria during direct","rect":[90.01001739501953,476.75732421875,522.1206431350709,467.6491394042969]},{"page":400,"text":"fire planning. Commanders and leaders of small tactical units use engagement criteria in conjunction with","rect":[90.02001190185547,488.2201843261719,521.9861965179443,479.10198974609377]},{"page":400,"text":"engagement priorities and other direct fire control measures to mass fires and control fire distribution.","rect":[90.02002716064453,499.7431945800781,497.4042615890503,490.635009765625]},{"page":400,"text":"Engagement Priority","rect":[72.0,524.3607177734375,170.66297340393067,514.5555419921875]},{"page":400,"text":"A-82. Engagement priority identifies the order in which the unit engages enemy systems or functions.","rect":[90.0,541.914306640625,521.9403028488159,532.9664306640625]},{"page":400,"text":"Commanders assign engagement priorities based on the type or level of threat at different ranges to match","rect":[90.01001739501953,553.377197265625,521.9302883148193,544.26904296875]},{"page":400,"text":"organic weapon systems capabilities against enemy vulnerabilities. Engagement priorities depend on","rect":[90.01001739501953,564.9002075195313,522.0440578460693,555.7920532226563]},{"page":400,"text":"situations. Commanders use engagement priorities to distribute fires rapidly and effectively. Subordinate","rect":[90.01001739501953,576.363037109375,522.0039949493408,567.2548828125]},{"page":400,"text":"elements can have different engagement priorities. Normally, units engage the most dangerous targets first,","rect":[90.01000213623047,587.8860473632813,522.0180006027222,578.7778930664063]},{"page":400,"text":"followed by targets in depth or specialized systems, such as engineer vehicles.","rect":[90.01001739501953,599.4090576171875,402.9448194503784,590.3009033203125]},{"page":400,"text":"A-26","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":400,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":400,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":401,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":401,"text":"Sector of Fire","rect":[90.0,82.42471313476563,154.1045356903076,74.81556701660156]},{"page":401,"text":"A-83. A sector of fire is the area assigned to","rect":[108.0,102.11431884765625,294.43312644958498,93.16645812988281]},{"page":401,"text":"a unit or weapon system in which it will","rect":[107.9899673461914,113.6373291015625,294.4331431350708,104.68946838378906]},{"page":401,"text":"engage ","rect":[107.9899673461914,125.16033935546875,139.95476818084718,118.0]},{"page":401,"text":"the ","rect":[145.54592895507813,124.0,161.3705244064331,116.372802734375]},{"page":401,"text":"enemy ","rect":[166.90557861328126,125.16033935546875,197.1850233078003,118.0]},{"page":401,"text":"in ","rect":[202.7761688232422,124.0,213.62079906463624,116.21247863769531]},{"page":401,"text":"accordance ","rect":[219.15585327148438,124.0,269.95720958709719,116.372802734375]},{"page":401,"text":"with","rect":[275.5483703613281,124.0,294.44007777404786,116.21247863769531]},{"page":401,"text":"established engagement priorities. Battalions","rect":[107.9899673461914,136.6231689453125,294.48222231674199,127.5149917602539]},{"page":401,"text":"and smaller echelons primarily use this direct","rect":[107.99999237060547,148.14617919921876,294.42710065460207,139.03799438476563]},{"page":401,"text":"fire control measure. Each sector of fire can","rect":[107.99999237060547,157.64515686035157,294.4181423187256,150.56100463867188]},{"page":401,"text":"extend from a firing position to the maximum","rect":[107.99999237060547,171.132080078125,294.45818852996828,162.02389526367188]},{"page":401,"text":"engagement range of the weapon, or it can be","rect":[107.99999237060547,182.65509033203126,294.4752779083252,173.54690551757813]},{"page":401,"text":"an enclosed area at a distance from the firing","rect":[107.99999237060547,194.1781005859375,294.4782009124756,185.06991577148438]},{"page":401,"text":"position. Commanders assign each subordinate","rect":[107.99999237060547,205.6409912109375,294.4309663848877,196.53280639648438]},{"page":401,"text":"unit or available weapon system a primary","rect":[108.0,217.1639404296875,294.5043544769287,208.05563354492188]},{"page":401,"text":"sector of fire and a secondary sector of fire to","rect":[108.0,228.68695068359376,294.39012718200686,219.57876586914063]},{"page":401,"text":"increase the capability of concentrating fire in","rect":[108.0,240.14984130859376,294.42909812927248,231.04165649414063]},{"page":401,"text":"certain areas. The primary sector of fire is that","rect":[108.0,251.6728515625,294.4992136917114,242.56466674804688]},{"page":401,"text":"area in which the assigned unit, individual, or","rect":[108.0,263.19580078125,294.41106200790406,254.08761596679688]},{"page":401,"text":"Figure A-40. Sectors of fire","rect":[357.41998291015627,261.1141357421875,485.2150411529541,251.72540283203126]},{"page":401,"text":"crew-served weapon is initially responsible for","rect":[108.0,274.65869140625,294.51335692977906,265.5505065917969]},{"page":401,"text":"engaging and destroying enemy targets located in that sector based on established priorities for engagement.","rect":[108.0,286.18170166015627,540.0400342941284,277.0735168457031]},{"page":401,"text":"Fire shifts to the secondary sector on order when there are no targets in the primary sector or when the","rect":[108.0,297.7047119140625,539.9381380157471,288.5965270996094]},{"page":401,"text":"movement of another friendly element needs covering. This secondary sector of fire should correspond to","rect":[108.0,309.1675720214844,539.9236354827881,300.05938720703127]},{"page":401,"text":"another element’s primary sector of fire to obtain mutual support. Subordinate commanders may impose","rect":[108.0,320.69061279296877,539.9850740509033,311.5824279785156]},{"page":401,"text":"additional fire control measures as required. Figure A-40 depicts primary, secondary, and enclosed sectors","rect":[108.0,332.1534729003906,539.9693133811951,323.0452880859375]},{"page":401,"text":"of fire.","rect":[107.98998260498047,341.65240478515627,135.2073163986206,334.5682678222656]},{"page":401,"text":"Target Reference Point","rect":[90.0,368.2406921386719,199.33006116104128,358.4355773925781]},{"page":401,"text":"A-84. A target reference point is a predetermined point of","rect":[108.0,385.7943115234375,364.1202294883728,376.6861267089844]},{"page":401,"text":"reference, normally a permanent structure or terrain feature that","rect":[107.99999237060547,397.2572021484375,364.1533884963989,388.1490173339844]},{"page":401,"text":"can be used when describing a target location (JP 3-09.3). A","rect":[107.99999237060547,408.7801818847656,364.1041913070679,399.6719970703125]},{"page":401,"text":"target reference point (TRP) is an easily recognizable point on","rect":[107.9899673461914,420.3031921386719,364.0691432952881,411.19500732421877]},{"page":401,"text":"the ground, either natural or manmade used to initiate, distribute,","rect":[107.97994995117188,431.7660827636719,364.12530040740969,422.65789794921877]},{"page":401,"text":"and control fires. Maneuver leaders at battalion and lower","rect":[107.97994995117188,441.2650146484375,364.0951135215759,434.1808776855469]},{"page":401,"text":"echelons designate TRPs to define unit or individual sectors of","rect":[107.97994995117188,454.751953125,364.0571191368103,445.6437683105469]},{"page":401,"text":"fire and observation, usually within an engagement area. A TRP","rect":[107.97994995117188,466.27496337890627,364.11305140686036,457.1667785644531]},{"page":401,"text":"can also designate the center of an area where a commander","rect":[107.97994995117188,477.7979431152344,364.0821435508728,468.68975830078127]},{"page":401,"text":"plans to rapidly distribute or converge fires. Leaders designate","rect":[107.97994995117188,489.2608337402344,364.0549898223877,480.15264892578127]},{"page":401,"text":"TRPs using the standard target symbol and numbers. Once","rect":[107.9800033569336,500.7838134765625,364.1944856719971,491.6756286621094]},{"page":401,"text":"approved by the echelon fire support officer, TRPs can be","rect":[107.9799575805664,512.3068237304688,364.14327717590336,503.1986389160156]},{"page":401,"text":"Figure A-41. Target reference","rect":[386.6400146484375,500.8141784667969,525.5945577545166,491.4254455566406]},{"page":401,"text":"point 032","rect":[434.15478515625,512.2069091796875,478.12760829162598,503.03863525390627]},{"page":401,"text":"designated as indirect fire targets by using the standard target","rect":[107.9899673461914,523.7697143554688,364.14026593780519,514.6615600585938]},{"page":401,"text":"symbol and target numbering identification (using two letters and four numbers). If a TRP is not also used as","rect":[107.97994995117188,535.292724609375,540.0023334007263,526.1845703125]},{"page":401,"text":"an indirect fire target, it is designated using numeric marking only. Figure A-41 depicts the symbol for TRP","rect":[107.97994995117188,546.815673828125,539.9161519927978,537.70751953125]},{"page":401,"text":"032, a direct fire only TRP. The rest of the TRPs in the figures in this publication are both direct and indirect","rect":[107.97997283935547,558.278564453125,539.9709849319459,549.17041015625]},{"page":401,"text":"fire targets and are thus designated using indirect fire procedures.","rect":[107.97997283935547,569.8015747070313,369.5620985031128,560.6934204101563]},{"page":401,"text":"Trigger Line","rect":[90.0,594.3807373046875,150.14513932800294,584.5755615234375]},{"page":401,"text":"A-85. A trigger line is a phase line used to initiate and mass fires into an engagement area or an","rect":[108.0,611.874267578125,540.0634908599853,602.9263916015625]},{"page":401,"text":"objective at a predetermined range for all or like weapon systems. Event or time-oriented criteria are","rect":[108.01005554199219,623.3972778320313,539.9432039337158,614.2891235351563]},{"page":401,"text":"used to initiate planned actions directed toward achieving surprise and inflicting maximum destruction on","rect":[108.00003814697266,634.9202880859375,539.9362697601318,625.8121337890625]},{"page":401,"text":"the enemy. Commanders can designate one trigger line for all weapon systems or separate trigger lines for","rect":[108.00003814697266,646.3831787109375,539.9864404258728,637.2750244140625]},{"page":401,"text":"each weapon or type of weapon system. Commanders specify the engagement criteria for this situation. The","rect":[108.00003814697266,657.9061889648438,540.0741243438721,648.7980346679688]},{"page":401,"text":"criteria may be either time or event driven, such as when a certain number or certain types of vehicles cross","rect":[108.00003814697266,669.42919921875,540.0554950218201,660.321044921875]},{"page":401,"text":"the trigger line before initiating engagement. Commanders can use a time-based fires delivery method or a","rect":[108.00003814697266,680.89208984375,539.9372224884033,671.783935546875]},{"page":401,"text":"geography-based fires delivery. Commanders may reserve the authority to initiate engagement by firing the","rect":[108.00003814697266,692.4150390625,539.9449739532471,683.306884765625]},{"page":401,"text":"commander’s own individual weapon or giving the command to fire.","rect":[108.00003814697266,703.9380493164063,383.56414318084719,694.8298950195313]},{"page":401,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":401,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":401,"text":"A-27","rect":[502.4909973144531,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":402,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":402,"text":"A-86. Commanders designate a PL as the","rect":[90.0,83.51434326171875,278.00521565246586,74.40616607666016]},{"page":402,"text":"trigger line for available supporting fire support","rect":[90.01001739501953,94.97723388671875,278.0353159866333,85.86905670166016]},{"page":402,"text":"systems. They base the location of the trigger","rect":[90.01001739501953,106.500244140625,278.0073449668884,97.3920669555664]},{"page":402,"text":"line on the mission variables, including such","rect":[90.01001739501953,118.023193359375,277.9551601409912,108.9150161743164]},{"page":402,"text":"variables as the time of flight for artillery","rect":[90.01001739501953,129.486083984375,277.96816062927248,120.3779067993164]},{"page":402,"text":"shells, ","rect":[90.01001739501953,140.0,117.82553386688233,131.90090942382813]},{"page":402,"text":"positioning ","rect":[123.47682189941406,141.00909423828126,170.96462535858155,131.90090942382813]},{"page":402,"text":"of ","rect":[176.61590576171876,140.0,187.46154308319093,131.9109344482422]},{"page":402,"text":"the ","rect":[193.17596435546876,140.0,207.80114269256593,131.90090942382813]},{"page":402,"text":"guns,","rect":[213.5165557861328,141.00909423828126,234.92125988006593,133.0]},{"page":402,"text":"and the","rect":[243.12564086914063,138.9850616455078,277.9301118927002,131.90090942382813]},{"page":402,"text":"existence of quick-fire links. The trigger line’s","rect":[90.01001739501953,152.5321044921875,277.96720766830449,143.42391967773438]},{"page":402,"text":"location varies from situation to situation. Its","rect":[90.0,161.97096252441407,277.90605044174199,154.88681030273438]},{"page":402,"text":"position reflects the distance an enemy force is","rect":[90.0,175.51800537109376,277.97425722885137,166.40982055664063]},{"page":402,"text":"likely to traverse in the time it takes from when","rect":[90.0,187.04095458984376,277.97020530700686,177.93276977539063]},{"page":402,"text":"fires are requested to when artillery rounds","rect":[90.0,198.50384521484376,277.97010683822637,189.39566040039063]},{"page":402,"text":"impact at a given enemy’s movement speed.","rect":[90.0,210.02685546875,277.95305919647219,200.91867065429688]},{"page":402,"text":"This gives time for supporting fire support","rect":[90.0,221.48974609375,278.01135968780519,212.38156127929688]},{"page":402,"text":"systems to respond to the initial call for fire. For","rect":[90.0,233.0126953125,278.0473535118103,223.90451049804688]},{"page":402,"text":"example, in a desert environment an enemy","rect":[90.0,244.53570556640626,277.9491786956787,235.42752075195313]},{"page":402,"text":"force is expected to travel two kilometers in","rect":[90.0,255.9785614013672,277.94017601013186,246.89041137695313]},{"page":402,"text":"three minutes. The battalion creates an indirect","rect":[90.0,265.49755859375,277.9441599807739,258.4134216308594]},{"page":402,"text":"fire","rect":[90.0,277.0205078125,103.9227876739502,269.9363708496094]},{"page":402,"text":"trigger line","rect":[110.28047943115235,279.0445556640625,158.23119831848144,269.9363708496094]},{"page":402,"text":"that","rect":[164.58587646484376,276.9704284667969,179.55074262237549,269.9363708496094]},{"page":402,"text":"is approximately","rect":[185.88137817382813,279.0445556640625,256.5945339202881,269.9363708496094]},{"page":402,"text":"two","rect":[262.9873046875,277.0205078125,277.95717430114748,270.9383850097656]},{"page":402,"text":"Figure A-42. Trigger line","rect":[346.55999755859377,277.794189453125,461.5745687408447,268.4956359863281]},{"page":402,"text":"kilometers ","rect":[90.0,289.0,134.74431896209718,281.3992614746094]},{"page":402,"text":"beyond ","rect":[141.5989990234375,290.5074462890625,173.56377696990968,281.3992614746094]},{"page":402,"text":"the ","rect":[180.47760009765626,289.0,195.10277843475343,281.3992614746094]},{"page":402,"text":"point ","rect":[202.0166015625,290.4873962402344,225.04157543182374,281.3992614746094]},{"page":402,"text":"where ","rect":[231.95538330078126,289.0,258.8801221847534,281.3992614746094]},{"page":402,"text":"the","rect":[265.7939453125,289.0,277.98327351379398,281.3992614746094]},{"page":402,"text":"commander wants to engage enemy forces with indirect fires since it takes three minutes to process a call for","rect":[90.0,302.03045654296877,522.0554101524353,292.9222717285156]},{"page":402,"text":"fire and for rounds to impact. Figure A-42 depicts both direct fire and fire support trigger lines based on","rect":[90.0,313.553466796875,521.9463405609131,304.4452819824219]},{"page":402,"text":"enemy movement.","rect":[90.0,325.01641845703127,163.90151500701905,316.9102478027344]},{"page":402,"text":"A-87. Commanders can establish another trigger line for the unit’s most accurate long-range weapon system","rect":[90.0,342.5313720703125,522.0634436569214,333.4231872558594]},{"page":402,"text":"in the vicinity of the area where the fire support impacts to capitalize on the asymmetric attack. However,","rect":[90.01005554199219,354.0543518066406,521.9880323410034,344.9461669921875]},{"page":402,"text":"dust and debris resulting from the artillery fire may prevent direct fire systems from engaging enemy forces.","rect":[90.01005554199219,365.5172119140625,521.9910840988159,356.4090270996094]},{"page":402,"text":"Commanders establish other trigger lines and TRPs for shorter-range systems. Commanders may give","rect":[90.01005554199219,377.04022216796877,522.0735139923096,367.9320373535156]},{"page":402,"text":"guidance to extremely proficient crews to engage enemy forces at longer than normal ranges or give them","rect":[90.0100326538086,388.563232421875,521.9021887741089,379.4550476074219]},{"page":402,"text":"different engagement priorities than the rest of the force, such as giving priority to engaging air defense or","rect":[90.0100326538086,400.0260925292969,522.0561425743103,390.91790771484377]},{"page":402,"text":"engineer breaching systems.","rect":[90.0100326538086,411.5491027832031,203.02959728240968,402.44091796875]},{"page":402,"text":"A-88. As enemy forces advance, commanders establish a decision point to help force a determination on","rect":[90.0100326538086,429.0640869140625,521.9650783538818,419.9559020996094]},{"page":402,"text":"whether to continue to fire in depth or to concentrate unit fires on a single point. Many factors impact this","rect":[90.02006530761719,440.5269775390625,522.0270526390076,431.4187927246094]},{"page":402,"text":"decision, most of which concern enemy forces regarding their methods of maneuver and the effects of the","rect":[90.02006530761719,452.04998779296877,521.9492464141846,442.9418029785156]},{"page":402,"text":"defending force’s fires.","rect":[90.02006530761719,463.51287841796877,183.04873180389405,454.4046936035156]},{"page":402,"text":"COMMON FIRE SUPPORT COORDINATION MEASURES","rect":[72.0,486.8096923828125,444.45650401306156,477.13555908203127]},{"page":402,"text":"A-89. Commanders employ FSCMs to facilitate rapid target engagement and simultaneously provide","rect":[90.0,506.9342956542969,522.1466341094971,497.82611083984377]},{"page":402,"text":"safeguards for friendly forces. The fire support coordinator recommends FSCMs to the commander based on","rect":[90.01001739501953,518.457275390625,521.9191188812256,509.3490905761719]},{"page":402,"text":"the commander’s guidance, location of friendly forces, scheme of maneuver, and anticipated enemy actions.","rect":[90.01001739501953,529.9802856445313,521.9940748214722,520.8721313476563]},{"page":402,"text":"Locations and implementing instructions for FSCMs are disseminated electronically and via overlays through","rect":[90.01001739501953,541.4431762695313,522.0806789398193,532.3350219726563]},{"page":402,"text":"command and fire support channels to higher, lower, and adjacent units. Once established, FSCMs are entered","rect":[90.01001739501953,552.9661865234375,522.0781154632568,543.8479614257813]},{"page":402,"text":"into or posted on all the command’s displays and databases. Below are some of the most commonly used","rect":[90.01001739501953,564.4891967773438,521.9681301116943,555.3810424804688]},{"page":402,"text":"FSCMs. FSCMs are either permissive or restrictive. (See ADP 3-19 and FM 3-09 for a detailed explanation","rect":[90.01000213623047,575.9320068359375,522.0273342132568,566.8438720703125]},{"page":402,"text":"on the use of all FSCMs.)","rect":[90.0,587.455078125,192.8242547569275,578.366943359375]},{"page":402,"text":"PERMISSIVE FIRE SUPPORT COORDINATION MEASURES","rect":[72.0,610.8599853515625,346.0188045501709,602.5559692382813]},{"page":402,"text":"A-90. Permissive FSCMs facilitate the attack of surface targets. Permissive FSCMs do not include the","rect":[90.0,630.7742919921875,522.0534334259033,621.6661376953125]},{"page":402,"text":"clearance of airspace and all fires require terrain and airspace clearance prior to engagement. FSCMs will","rect":[90.01001739501953,642.2371826171875,522.0093150100709,633.1290283203125]},{"page":402,"text":"change frequently during operations and the commander adjusts FSCMs as required to keep pace with","rect":[90.00999450683594,653.7601928710938,522.0181789398193,644.6419677734375]},{"page":402,"text":"operations Common permissive FSCMs include a coordinated fire line (CFL), a fire support coordination","rect":[90.00999450683594,665.26318359375,521.9677639007568,656.175048828125]},{"page":402,"text":"line (FSCL), kill box, and a free-fire area (FFA).","rect":[90.0,676.7260131835938,284.72466564178469,667.6378784179688]},{"page":402,"text":"A-28","rect":[72.1199951171875,754.18798828125,91.57798986816407,747.6090087890625]},{"page":402,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":402,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":403,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":403,"text":"Coordinated Fire Line","rect":[90.0,82.41372680664063,195.65945207214356,74.81556701660156]},{"page":403,"text":"A-91. A coordinated fire line is a line","rect":[108.0,102.11431884765625,274.9512300567627,93.00614166259766]},{"page":403,"text":"beyond which conventional surface-to-","rect":[108.02002716064453,113.6373291015625,274.9732873497009,104.5291519165039]},{"page":403,"text":"surface direct fire and indirect fire support","rect":[108.02002716064453,125.14030456542969,275.03232526397707,116.05216217041016]},{"page":403,"text":"means may fire at any time within the","rect":[108.02002716064453,136.6231689453125,275.0063753204346,127.5149917602539]},{"page":403,"text":"boundaries ","rect":[108.02002716064453,147.0,154.38457775115968,139.03799438476563]},{"page":403,"text":"of ","rect":[170.1189727783203,147.0,180.96462535858155,139.0480194091797]},{"page":403,"text":"the ","rect":[196.7561492919922,147.0,211.4424695968628,139.03799438476563]},{"page":403,"text":"establishing","rect":[227.23399353027345,148.14617919921876,274.9633083343506,139.03799438476563]},{"page":403,"text":"headquarters ","rect":[108.02002716064453,159.64915466308595,161.58495616912843,150.56100463867188]},{"page":403,"text":"without ","rect":[181.76022338867188,158.0,214.80520153045655,150.56100463867188]},{"page":403,"text":"additional","rect":[234.97946166992188,158.0,274.9652781448364,150.56100463867188]},{"page":403,"text":"coordination but does not eliminate the","rect":[108.02002716064453,169.10804748535157,275.00439167785648,162.02389526367188]},{"page":403,"text":"responsibility to coordinate the airspace","rect":[108.02002716064453,182.65509033203126,275.0023470001221,173.54690551757813]},{"page":403,"text":"required to conduct the mission (JP 3-09).","rect":[108.02002716064453,194.15806579589845,274.98330211639407,185.06991577148438]},{"page":403,"text":"The purpose of the CFL is to expedite the","rect":[108.02002716064453,205.62095642089845,275.0063753204346,196.53280639648438]},{"page":403,"text":"surface-to-surface ","rect":[108.02002716064453,216.0,182.6980848312378,208.06578063964845]},{"page":403,"text":"attack ","rect":[192.19705200195313,216.0,218.57871532440186,208.05575561523438]},{"page":403,"text":"of ","rect":[228.0135498046875,216.0,238.85818004608155,208.06578063964845]},{"page":403,"text":"targets","rect":[248.35714721679688,217.1639404296875,274.99330019760137,209.05776977539063]},{"page":403,"text":"beyond the CFL without coordination","rect":[108.02002716064453,228.68695068359376,274.94814109802248,219.57864379882813]},{"page":403,"text":"with the ground commander in whose area","rect":[108.0199966430664,240.14984130859376,275.03548908996586,231.04165649414063]},{"page":403,"text":"the targets are located. Such fires still","rect":[108.0200424194336,251.6728515625,275.0264048538208,242.56466674804688]},{"page":403,"text":"comply with rules of engagement and law","rect":[108.02003479003906,263.19580078125,274.97635317230228,254.08761596679688]},{"page":403,"text":"of war targeting constraints; designation","rect":[108.02003479003906,274.65869140625,275.02541160583498,265.5505065917969]},{"page":403,"text":"of a CFL is not authorization to fire","rect":[108.02003479003906,284.1676940917969,275.02340412902836,277.0735168457031]},{"page":403,"text":"indiscriminately into the area. Brigade","rect":[108.02003479003906,297.7047119140625,275.07552815246586,288.5965270996094]},{"page":403,"text":"Figure A-43. Coordinated fire line","rect":[332.70001220703127,293.45416259765627,490.43287562561036,284.0654296875]},{"page":403,"text":"combat teams or divisions usually","rect":[108.02003479003906,309.1675720214844,274.96935081481936,300.05938720703127]},{"page":403,"text":"establish a CFL although a maneuver battalion may establish one, particularly during amphibious operations.","rect":[108.02003479003906,320.6905517578125,540.0193433761597,311.5823669433594]},{"page":403,"text":"It is possible for each echelon to establish a CFL so a unit would need to be aware of the several constraints.","rect":[108.02002716064453,332.1333923339844,539.9957838058472,323.0452575683594]},{"page":403,"text":"A CFL should be placed on identifiable terrain, however, additional considerations include the limits of","rect":[108.02002716064453,343.6564025878906,540.0472924766541,334.5682678222656]},{"page":403,"text":"ground observation, the location of the initial objectives in the offense, and the requirement for maximum","rect":[108.02005004882813,355.1994323730469,540.0309729537964,346.08123779296877]},{"page":403,"text":"flexibility in both maneuver and the delivery of supporting fires. Subordinate CFLs may be consolidated by","rect":[108.02005004882813,366.66229248046877,540.0451564788818,357.5541076660156]},{"page":403,"text":"higher headquarters. Figure A-43 depicts a CFL.","rect":[108.02005004882813,378.185302734375,302.46819591522219,369.0771179199219]},{"page":403,"text":"Fire Support Coordination Line","rect":[90.0,402.71875,240.58193742370606,392.9355773925781]},{"page":403,"text":"A-92. The fire support coordination line is a fire support","rect":[108.0,420.2943115234375,342.38587140655519,411.1861267089844]},{"page":403,"text":"coordination ","rect":[108.0100326538086,430.0,161.09398937225343,422.6490173339844]},{"page":403,"text":"measure ","rect":[168.249267578125,430.0,204.11387157440186,424.0]},{"page":403,"text":"established ","rect":[211.32827758789063,430.0,258.2319288253784,422.6490173339844]},{"page":403,"text":"by ","rect":[265.4463195800781,431.7572021484375,277.97133922576907,422.6490173339844]},{"page":403,"text":"the ","rect":[285.18572998046877,430.0,299.87102794647219,422.6490173339844]},{"page":403,"text":"land ","rect":[307.0854187011719,430.0,326.8107862472534,422.6490173339844]},{"page":403,"text":"or","rect":[333.9660949707031,430.0,342.3427941856384,424.0]},{"page":403,"text":"amphibious ","rect":[108.0100326538086,443.2601318359375,157.19420909881593,434.1719970703125]},{"page":403,"text":"force ","rect":[164.1090087890625,442.0,187.13396739959718,434.1820373535156]},{"page":403,"text":"commander ","rect":[194.10787963867188,442.0,243.77306652069093,434.1719970703125]},{"page":403,"text":"to ","rect":[250.74697875976563,442.0,260.9914503097534,435.17401123046877]},{"page":403,"text":"support ","rect":[267.9653625488281,443.2601318359375,300.41115856170657,435.17401123046877]},{"page":403,"text":"common","rect":[307.38507080078127,442.0,342.3949489593506,436.0]},{"page":403,"text":"objectives within an area of operations, beyond which all","rect":[108.0100326538086,454.7430725097656,342.37793683624269,445.6248779296875]},{"page":403,"text":"fires must be coordinated with affected commanders prior","rect":[108.0100326538086,466.24603271484377,342.32280517196656,457.15789794921877]},{"page":403,"text":"to engagement and, short of the line, all fires must be","rect":[108.0100326538086,477.7890625,342.44100666809086,468.6808776855469]},{"page":403,"text":"coordinated with the establishing commander prior to","rect":[108.0100326538086,489.251953125,342.4077968597412,480.1437683105469]},{"page":403,"text":"engagement (JP 3-09). FSCLs facilitate the expeditious","rect":[108.0100326538086,500.77496337890627,342.3778827171326,491.6667785644531]},{"page":403,"text":"attack of surface targets of opportunity beyond the","rect":[108.02005767822266,512.2979736328125,342.4630708770752,503.18975830078127]},{"page":403,"text":"coordinating measure. The FSCL is not a boundary, the","rect":[108.02005767822266,523.7608642578125,342.44286824035648,514.6527099609375]},{"page":403,"text":"synchronization of operations on either side of the FSCL is","rect":[108.01000213623047,535.2838134765625,342.3719012718201,526.1756591796875]},{"page":403,"text":"the responsibility of the establishing commander, out to the","rect":[108.01001739501953,546.8068237304688,342.44506550598148,537.6986694335938]},{"page":403,"text":"limits of the land or amphibious force boundary. FSCLs","rect":[108.01001739501953,558.2697143554688,342.42191958236699,549.1615600585938]},{"page":403,"text":"apply to all fires of air-, land-, and sea-based weapon","rect":[108.0,569.792724609375,342.3802089691162,560.6845703125]},{"page":403,"text":"systems using any type of ammunition.","rect":[107.98999786376953,581.3157348632813,272.1847791671753,572.2075805664063]},{"page":403,"text":"If possible, the","rect":[280.1836853027344,581.2957153320313,342.4078950958252,572.2075805664063]},{"page":403,"text":"FSCL should follow well-defined terrain features to assist","rect":[107.98998260498047,590.7645263671875,342.29770612335207,583.67041015625]},{"page":403,"text":"identification from the air. The joint force land component","rect":[107.97997283935547,604.3015747070313,342.3557810745239,595.183349609375]},{"page":403,"text":"commander (JFLCC) and joint force maritime component","rect":[107.9699478149414,615.8245849609375,342.3437876663208,606.7063598632813]},{"page":403,"text":"Figure A-44. Fire support","rect":[385.8599853515625,605.8742065429688,504.7633264122009,596.5756225585938]},{"page":403,"text":"coordination line","rect":[405.05828857421877,615.4132080078125,485.5810079498291,608.128662109375]},{"page":403,"text":"commander","rect":[107.96994018554688,625.263427734375,155.22527099227907,618.1793212890625]},{"page":403,"text":"(JFMCC) cannot employ fires long of the","rect":[160.3544921875,627.2874755859375,342.34179402160648,618.1793212890625]},{"page":403,"text":"FSCL without coordination with affected commanders, and the joint force air component commander","rect":[107.96994018554688,638.8104248046875,539.9963281211853,629.6921997070313]},{"page":403,"text":"(JFACC) cannot employ fires short of the FSCL without coordination with the JFLCC or JFMCC. Supporting","rect":[107.95990753173828,650.3334350585938,539.9952907562256,641.2252807617188]},{"page":403,"text":"elements attacking targets beyond the FSCL must ensure that an attack will not produce adverse effects on,","rect":[107.95990753173828,661.7963256835938,539.9171094894409,652.6881713867188]},{"page":403,"text":"or to the rear of, the line. Short of a FSCL, all air-to-ground and surface-to-surface attack operations are","rect":[107.95990753173828,673.3193359375,539.9892244415283,664.211181640625]},{"page":403,"text":"controlled by the appropriate land or amphibious force commander. Coordination of attacks beyond the FSCL","rect":[107.93985748291016,684.84228515625,540.0238926429748,675.734130859375]},{"page":403,"text":"is especially critical to commanders of air, land, and special operations forces. Figure A-44 depicts an","rect":[107.93985748291016,696.30517578125,539.9020900726318,687.197021484375]},{"page":403,"text":"example FSCL.","rect":[107.93983459472656,707.8081665039063,170.74219799041749,698.7200317382813]},{"page":403,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":403,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":403,"text":"A-29","rect":[502.4909973144531,754.18798828125,521.9490073242188,747.6090087890625]},{"page":404,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":404,"text":"A-93. The decision on where to place or even whether to use a FSCL requires careful consideration. If used,","rect":[90.0,83.49430847167969,522.0153150558472,74.40616607666016]},{"page":404,"text":"its location is based on estimates of the situation and concept of operations. The establishment of a FSCL","rect":[90.03008270263672,94.95719909667969,521.9892246742248,85.86905670166016]},{"page":404,"text":"does not create a free-fire area (FFA) beyond the FSCL. Engagements beyond the FSCL must be consistent","rect":[90.03008270263672,106.500244140625,521.9880137405396,97.3920669555664]},{"page":404,"text":"with the establishing commander's priorities, timing, and desired effects. Location of enemy forces,","rect":[90.0199966430664,118.023193359375,522.0111036300659,108.9150161743164]},{"page":404,"text":"anticipated rates of movement, concept and tempo of the operation, organic weapon capabilities such as wide-","rect":[90.0200424194336,129.486083984375,521.9922998008728,120.3779067993164]},{"page":404,"text":"area munitions, or those with delayed effects, and other factors are all considered by the commander. The","rect":[90.02002716064453,141.00909423828126,522.0480623321533,131.90090942382813]},{"page":404,"text":"establishing commander adjusts the location of the FSCL as required to keep pace with operations. A series","rect":[90.02002716064453,152.5321044921875,522.0730731468201,143.41390991210938]},{"page":404,"text":"of disseminated \"on-order\" FSCLs will help accelerate the coordination required. The establishing","rect":[90.02002716064453,163.9949951171875,522.0652370452881,154.88681030273438]},{"page":404,"text":"commander quickly transmits the change to higher, lower, adjacent, and supporting headquarters to ensure","rect":[90.02002716064453,175.51800537109376,522.0832185821533,166.39981079101563]},{"page":404,"text":"that appropriate controlling agencies coordinate engagement operations. Changes to the FSCL require","rect":[90.0199966430664,187.041015625,521.9581575469971,177.93283081054688]},{"page":404,"text":"notification of all affected forces within the AO and must allow sufficient time for these forces and/or","rect":[90.0200424194336,196.4898223876953,521.9744165000916,189.39566040039063]},{"page":404,"text":"components to incorporate the FSCL change. Current technology and collaboration tools between the","rect":[90.0200424194336,210.02685546875,521.9599886016846,200.91867065429688]},{"page":404,"text":"elements of the joint force determine the times required for changing the FSCL. The FSCL is normally","rect":[90.0200424194336,221.48974609375,522.0381984710693,212.37155151367188]},{"page":404,"text":"positioned closer to the forward line of own troops in the defense than in the offense; however, the exact","rect":[90.02005004882813,232.9927215576172,522.0552744827271,223.90457153320313]},{"page":404,"text":"positioning depends on the situation. Placing the FSCL at greater depths will typically require support from","rect":[90.02005004882813,244.5357666015625,522.0113196334839,235.42758178710938]},{"page":404,"text":"higher headquarters and other supporting commanders. Also, when the FSCL is positioned at greater depth,","rect":[90.02006530761719,255.99859619140626,521.9932813644409,246.89041137695313]},{"page":404,"text":"there is greater requirement for detailed coordination with the establishing commander and can slow the","rect":[90.0100326538086,267.5216064453125,522.1152620391846,258.4134216308594]},{"page":404,"text":"expeditious clearance of fires short of the FSCL. By establishing a FSCL close in, yet at sufficient depth so","rect":[90.0100326538086,279.04461669921877,521.9811305999756,269.9364318847656]},{"page":404,"text":"as to not limit high tempo maneuver, land and amphibious force commanders ease the coordination","rect":[90.01001739501953,290.5074768066406,522.0340480804443,281.3992919921875]},{"page":404,"text":"requirements for engaging targets within their assigned areas by forces not under their control, such as naval","rect":[90.01001739501953,302.0304870605469,522.0340342483521,292.92230224609377]},{"page":404,"text":"surface fire support or air interdiction.","rect":[90.01001739501953,313.5334167480469,242.75493907928468,304.4452819824219]},{"page":404,"text":"Note. During large-scale combat operations, it is likely that divisions and corps are operating as a","rect":[115.2002944946289,336.71429443359377,504.0281343536377,327.6061096191406]},{"page":404,"text":"tactical headquarters and will only provide input on proposed FSCL locations to the land","rect":[115.19999694824219,348.23431396484377,504.01808738708498,339.1261291503906]},{"page":404,"text":"component commander.","rect":[115.19999694824219,359.7372741699219,211.84389781951905,350.6491394042969]},{"page":404,"text":"Free-Fire Area","rect":[72.0,396.86273193359377,142.4806308746338,389.27557373046877]},{"page":404,"text":"A-94. A free-fire area is a specific region into which any","rect":[90.0,416.6343078613281,338.7936305999756,407.526123046875]},{"page":404,"text":"weapon system may fire without additional coordination with","rect":[90.01002502441406,428.0971984863281,338.7183132171631,418.989013671875]},{"page":404,"text":"the establishing headquarters (JP 3-09). Where indirect fires","rect":[90.01002502441406,439.62017822265627,338.76356386947637,430.5119934082031]},{"page":404,"text":"and aircraft share a FFA, units should establish an airspace","rect":[90.0100326538086,451.1231384277344,338.6935091094971,442.0350036621094]},{"page":404,"text":"coordination ","rect":[90.0100326538086,460.58203125,143.09499645233155,453.4978942871094]},{"page":404,"text":"area ","rect":[148.44967651367188,460.58203125,167.63498973846436,455.0]},{"page":404,"text":"to ","rect":[173.04579162597657,460.58203125,183.2902479171753,454.4999084472656]},{"page":404,"text":"assist ","rect":[188.7010498046875,460.58203125,212.80515575408936,453.4978942871094]},{"page":404,"text":"in ","rect":[218.21597290039063,460.4517822265625,228.52053356170655,453.4978942871094]},{"page":404,"text":"deconflicting ","rect":[233.93133544921876,462.6060791015625,289.18963146209719,453.4978942871094]},{"page":404,"text":"operations.","rect":[294.540283203125,462.5860290527344,338.74456310272219,453.4978942871094]},{"page":404,"text":"Normally, division or higher echelon headquarters establish a","rect":[90.0100326538086,474.1290588378906,338.7606477813721,465.0208740234375]},{"page":404,"text":"FFA on identifiable terrain. Figure A-45 depicts a FFA.","rect":[90.0100326538086,485.6520690917969,312.8348340988159,476.54388427734377]},{"page":404,"text":"Kill Box","rect":[72.0,576.9827270507813,110.79233741760254,569.3955078125]},{"page":404,"text":"Figure A-45. Free fire area","rect":[372.8399963378906,564.4141845703125,496.19520472717286,555.0254516601563]},{"page":404,"text":"A-95. A kill box is a three-dimensional permissive fire support coordination measure with an associated","rect":[90.0,596.7342529296875,522.0210475921631,587.6461181640625]},{"page":404,"text":"airspace coordinating measure used to facilitate the integration of fires (JP 3-09). It is used to facilitate","rect":[90.01002502441406,608.2772827148438,521.9432039337158,599.1691284179688]},{"page":404,"text":"integrating joint fires and coordinating associated airspace. The two types of kill boxes are blue kill box and","rect":[89.99996185302735,619.7401733398438,522.0284328460693,610.6219482421875]},{"page":404,"text":"purple kill box. A blue kill box facilitates the attack of surface targets with air-to-surface munitions without","rect":[89.99996185302735,631.26318359375,522.0784068069459,622.155029296875]},{"page":404,"text":"coordination with the AO commander’s headquarters. Within its boundaries a blue kill box extends from the","rect":[89.98994445800781,642.7661743164063,521.9991731719971,633.6780395507813]},{"page":404,"text":"surface to a ceiling altitude agreed upon by the requesting unit, AO commander, and airspace control","rect":[89.98994445800781,654.2490844726563,522.0029063186646,645.1409301757813]},{"page":404,"text":"authority. A purple kill box facilitates the attack of surface targets with subsurface-to-surface, surface-to-","rect":[89.98994445800781,665.7720947265625,521.9521386680603,656.6639404296875]},{"page":404,"text":"surface, and air-to-surface munitions without coordination with the AO commander’s headquarters. Within","rect":[89.97989654541016,677.2750244140625,521.9839992523193,668.1868896484375]},{"page":404,"text":"its boundaries a purple kill box extends from the surface, through an airspace coordinating measure floor to","rect":[89.9698715209961,688.7579345703125,521.9957790374756,679.6497802734375]},{"page":404,"text":"a ceiling altitude agreed upon by the requesting unit, AO commander, and airspace control authority.","rect":[89.9698715209961,700.2809448242188,522.0172681808472,691.1727905273438]},{"page":404,"text":"A-30","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":404,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":404,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":405,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":405,"text":"Figure A-46 depicts a blue kill box. Figure A-47 depicts a purple kill box. (See ATP 3-09.34/MCRP 3-","rect":[108.0,83.51434326171875,539.9822290000916,74.40616607666016]},{"page":405,"text":"31.4/NTTP 3-09.2.1/AFTTP 3-2.59 for more information on kill box planning and employment.)","rect":[108.00997924804688,94.97723388671875,496.2708642539978,85.86905670166016]},{"page":405,"text":"Figure A-46. Blue kill box","rect":[255.2438507080078,347.220703125,374.6942891998291,337.9221496582031]},{"page":405,"text":"Figure A-47. Purple kill box","rect":[250.5644989013672,606.8389282226563,379.4988546295166,597.5403442382813]},{"page":405,"text":"RESTRICTIVE FIRE SUPPORT COORDINATION MEASURES","rect":[90.0,636.239990234375,370.6187801361084,627.9359741210938]},{"page":405,"text":"A-96. Restrictive fire support coordination measures prevent fires into or beyond the control measure without","rect":[108.0,656.154296875,540.1075205764771,647.046142578125]},{"page":405,"text":"detailed coordination. Their primary purpose is to provide safeguards for friendly forces, noncombatants,","rect":[108.01001739501953,667.6171875,540.0604200363159,658.509033203125]},{"page":405,"text":"facilities, or terrain. Restrictive FSCMs include a no-fire area (NFA), a restrictive fire area (RFA), and a","rect":[108.02002716064453,679.1201782226563,540.0254182891846,670.0320434570313]},{"page":405,"text":"restrictive fire line (RFL). Establishing a restrictive measure imposes certain requirements for specific","rect":[108.02002716064453,690.6632080078125,539.9549837188721,681.5550537109375]},{"page":405,"text":"coordination before the engagement of those targets affected by the measure.","rect":[108.01001739501953,702.1260375976563,415.96575450897219,693.0178833007813]},{"page":405,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":405,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":405,"text":"A-31","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":406,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":406,"text":"No-Fire Area","rect":[72.0,82.41372680664063,134.6079502105713,74.81556701660156]},{"page":406,"text":"A-97. A no-fire area is an area designated by the","rect":[90.0,102.11431884765625,303.19079304504398,93.00614166259766]},{"page":406,"text":"appropriate commander into which fires or their","rect":[90.01000213623047,113.61729431152344,303.23869872665406,104.5291519165039]},{"page":406,"text":"effects are prohibited (JP 3-09.3). Any echelon","rect":[90.01001739501953,125.16033935546875,303.22301292419436,116.05216217041016]},{"page":406,"text":"commander ","rect":[90.01000213623047,134.59913635253907,139.73327159881593,127.5149917602539]},{"page":406,"text":"uses ","rect":[148.02981567382813,134.59913635253907,167.75420665740968,129.0]},{"page":406,"text":"a ","rect":[176.10887145996095,134.5490264892578,183.05272960662843,129.0]},{"page":406,"text":"no-fire ","rect":[191.34927368164063,135.0,221.03257274627686,127.5149917602539]},{"page":406,"text":"area ","rect":[229.38925170898438,135.0,248.51142406463624,129.0]},{"page":406,"text":"to ","rect":[256.86810302734377,135.0,267.11355113983157,128.51699829101563]},{"page":406,"text":"protect","rect":[275.4702453613281,136.60313415527345,303.2747263870239,128.51699829101563]},{"page":406,"text":"independently operating elements, such as forward","rect":[90.01004028320313,148.14617919921876,303.21571922302248,139.03799438476563]},{"page":406,"text":"observers ","rect":[90.01004028320313,158.0,130.85256481170655,150.56100463867188]},{"page":406,"text":"and ","rect":[139.75033569335938,158.0,156.7141981124878,150.56100463867188]},{"page":406,"text":"special ","rect":[165.61195373535157,159.64915466308595,195.8322401046753,150.56100463867188]},{"page":406,"text":"operations ","rect":[204.73001098632813,159.64915466308595,248.87307262420655,150.56100463867188]},{"page":406,"text":"forces. ","rect":[257.7708435058594,158.0,287.21868419647219,150.57102966308595]},{"page":406,"text":"A","rect":[295.9962158203125,157.514892578125,303.2306561508179,150.73135375976563]},{"page":406,"text":"commander can also use it to protect friendly forces","rect":[90.01005554199219,171.132080078125,303.27882265853887,162.02389526367188]},{"page":406,"text":"in the echelon support area and for humanitarian","rect":[90.01005554199219,182.6350555419922,303.2146511077881,173.54690551757813]},{"page":406,"text":"reasons, ","rect":[90.01005554199219,193.0,125.03596782684326,187.0]},{"page":406,"text":"such ","rect":[133.39263916015626,193.0,154.19716930389405,185.06991577148438]},{"page":406,"text":"as ","rect":[162.5538330078125,193.0,173.33938121795655,187.0]},{"page":406,"text":"preventing ","rect":[181.63394165039063,194.1781005859375,226.91836071014405,185.06991577148438]},{"page":406,"text":"the ","rect":[235.27505493164063,193.0,249.95937633514405,185.06991577148438]},{"page":406,"text":"inadvertent","rect":[258.3160705566406,193.0,303.2808299026489,185.06991577148438]},{"page":406,"text":"engagement of dislocated civilian concentrations, or","rect":[90.01005554199219,205.6409912109375,303.21172118759156,196.53280639648438]},{"page":406,"text":"to protect sensitive areas, such as cultural monuments.","rect":[90.01005554199219,217.14390563964845,303.23565196990969,208.05575561523438]},{"page":406,"text":"Figure A-48 depicts a no-fire area. This rule has two","rect":[90.02006530761719,228.68695068359376,303.27062034606936,219.57876586914063]},{"page":406,"text":"exceptions:","rect":[90.01000213623047,240.1298065185547,135.63108014678955,231.04165649414063]},{"page":406,"text":"","rect":[115.19999694824219,250.88546752929688,121.16105696249008,246.19322204589845]},{"page":406,"text":"The","rect":[133.1999969482422,251.5902862548828,148.80915547180175,244.50613403320313]},{"page":406,"text":"establishing ","rect":[161.57664489746095,253.61431884765626,211.84197521209718,244.50613403320313]},{"page":406,"text":"headquarters ","rect":[222.11648559570313,253.5942840576172,275.68142223358157,244.50613403320313]},{"page":406,"text":"may","rect":[286.01605224609377,253.61431884765626,303.2063503265381,246.0]},{"page":406,"text":"approve fires within a no-fire area on a","rect":[133.1999969482422,265.1172790527344,303.2344026641846,256.0291442871094]},{"page":406,"text":"case-by-case mission basis.","rect":[133.18997192382813,276.66033935546877,242.96508312225343,267.5521545410156]},{"page":406,"text":"Figure A-48. No fire area","rect":[358.91998291015627,275.4542236328125,474.53272914123536,266.06549072265627]},{"page":406,"text":" When an enemy force within a no-fire area","rect":[115.19999694824219,290.154296875,303.24511433410648,281.0461120605469]},{"page":406,"text":"engages a friendly force, the friendly force may engage a positively identified enemy force to","rect":[133.19000244140626,301.6171875,521.9819240570068,292.5090026855469]},{"page":406,"text":"defend itself.","rect":[133.18997192382813,311.1161193847656,185.43525218963624,304.031982421875]},{"page":406,"text":"Restrictive Fire Area","rect":[72.0,335.542724609375,170.9254093170166,327.95556640625]},{"page":406,"text":"A-98. A restrictive fire area is a location in which","rect":[90.0,355.2543029785156,302.78676414489748,346.1461181640625]},{"page":406,"text":"specific restrictions are imposed and into which fires","rect":[90.0,366.75726318359377,302.8078143577576,357.66912841796877]},{"page":406,"text":"that exceed those restrictions will not be delivered","rect":[90.0,376.2762451171875,302.7245388031006,369.1921081542969]},{"page":406,"text":"without ","rect":[90.0,388.0,123.10507488250733,380.6549987792969]},{"page":406,"text":"coordination ","rect":[134.09701538085938,388.0,187.06176280975343,380.6549987792969]},{"page":406,"text":"with ","rect":[198.0537109375,388.0,218.31916332244874,380.6549987792969]},{"page":406,"text":"the ","rect":[229.3111114501953,388.0,243.99541759490968,380.6549987792969]},{"page":406,"text":"establishing","rect":[254.9873504638672,389.76318359375,302.71755027770998,380.6549987792969]},{"page":406,"text":"headquarters (JP 3-09). The purpose of the RFA is to","rect":[90.0,401.2661437988281,302.7299098968506,392.1780090332031]},{"page":406,"text":"regulate fires into an area according to the stated","rect":[89.98999786376953,412.8091735839844,302.7005214691162,403.70098876953127]},{"page":406,"text":"restrictions, such as no unguided conventional or dud-","rect":[89.98998260498047,424.2720642089844,302.79985595321656,415.16387939453127]},{"page":406,"text":"producing munitions. Maneuver battalion or larger","rect":[89.98998260498047,435.7950744628906,302.77876830673218,426.6868896484375]},{"page":406,"text":"ground forces normally establish RFAs. On occasion,","rect":[89.98998260498047,447.31805419921877,302.7456922531128,438.2098693847656]},{"page":406,"text":"a company operating independently may establish an","rect":[89.98998260498047,458.78094482421877,302.7747402191162,449.6727600097656]},{"page":406,"text":"RFA. Usually, it is located on identifiable terrain by","rect":[89.97997283935547,470.303955078125,302.6883144378662,461.1957702636719]},{"page":406,"text":"grid or by a radius (in meters) from a center point.","rect":[89.96990203857422,481.766845703125,302.74871349334719,472.6586608886719]},{"page":406,"text":"Commanders may depict RFA restrictions on a map","rect":[89.96994018554688,493.2898254394531,302.74474143981936,484.181640625]},{"page":406,"text":"or overlay, or they can reference an operation order","rect":[89.96994018554688,504.81280517578127,302.74773192977906,495.7046203613281]},{"page":406,"text":"that contains the restrictions. Figure A-49 depicts a","rect":[89.96994018554688,516.2756958007813,302.78768635559086,507.1675109863281]},{"page":406,"text":"restricted fire area.","rect":[89.95990753173828,525.774658203125,165.24016857147218,518.6905517578125]},{"page":406,"text":"Figure A-49. Restrictive fire area","rect":[339.8399963378906,527.2141723632813,493.2521810455322,517.825439453125]},{"page":406,"text":"A-32","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":406,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":406,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":407,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":407,"text":"Restrictive Fire Line","rect":[90.0,82.40274810791016,187.11041032409669,74.81556701660156]},{"page":407,"text":"A-99. A","rect":[108.0,100.09027862548828,140.44476747894289,93.17648315429688]},{"page":407,"text":"restrictive","rect":[147.7894287109375,100.07024383544922,188.29827595520019,93.5873031616211]},{"page":407,"text":"fire line","rect":[195.6148681640625,102.11431884765625,231.80810261535644,93.00614166259766]},{"page":407,"text":"is a specific","rect":[239.12171936035157,102.09428405761719,296.0102815704346,93.00614166259766]},{"page":407,"text":"boundary ","rect":[108.02003479003906,113.6373291015625,148.32448863983155,104.5291519165039]},{"page":407,"text":"established ","rect":[154.1561279296875,112.0,201.06072521209718,104.5291519165039]},{"page":407,"text":"between ","rect":[206.8362579345703,112.0,242.7008924484253,104.5291519165039]},{"page":407,"text":"converging,","rect":[248.53253173828126,113.6373291015625,295.9772901535034,104.5291519165039]},{"page":407,"text":"friendly surface forces that prohibits fires or","rect":[108.02003479003906,125.16033935546875,295.9711816368103,116.05216217041016]},{"page":407,"text":"their effects from crossing (JP 3-09). Both or","rect":[108.02003479003906,136.6231689453125,296.02730346298218,127.5149917602539]},{"page":407,"text":"only one of those converging forces may be","rect":[108.01001739501953,148.14617919921876,295.9883089141846,139.03799438476563]},{"page":407,"text":"moving. Fires and their effects can cross a RFL","rect":[108.01001739501953,159.669189453125,295.9481480140686,150.56100463867188]},{"page":407,"text":"when the event has been coordinated with the","rect":[108.01001739501953,169.10804748535157,295.9962434844971,162.02389526367188]},{"page":407,"text":"affected force. The purpose of the line is to","rect":[108.01001739501953,182.6350555419922,295.95717430114748,173.54690551757813]},{"page":407,"text":"prevent ","rect":[108.01001739501953,194.15806579589845,140.51490306854249,186.07192993164063]},{"page":407,"text":"interference ","rect":[148.69122314453126,193.0,198.89544200897218,185.06991577148438]},{"page":407,"text":"between ","rect":[207.01063537597657,193.0,242.87526988983155,185.06991577148438]},{"page":407,"text":"converging","rect":[251.05157470703126,194.1781005859375,296.02138328552248,185.06991577148438]},{"page":407,"text":"friendly forces, such as what occurs during a","rect":[108.01001739501953,205.6409912109375,295.9751558380127,196.53280639648438]},{"page":407,"text":"linkup operation. The next higher common","rect":[108.01001739501953,217.1639404296875,295.96425437927248,208.05575561523438]},{"page":407,"text":"commander ","rect":[108.01001739501953,227.0,157.73426342010499,219.57876586914063]},{"page":407,"text":"of ","rect":[167.8895263671875,227.0,178.73418712615968,219.5887908935547]},{"page":407,"text":"the ","rect":[188.94955444335938,227.0,203.6940107345581,219.57876586914063]},{"page":407,"text":"converging ","rect":[213.90939331054688,228.68695068359376,261.3531446456909,219.57876586914063]},{"page":407,"text":"forces","rect":[271.5084228515625,227.0,295.92616152572637,219.5887908935547]},{"page":407,"text":"establishes the RFL. Located on identifiable","rect":[108.01001739501953,238.1258087158203,295.99825764465336,231.04165649414063]},{"page":407,"text":"terrain, it is usually located closer to the","rect":[108.01001739501953,251.6728515625,296.0162935333252,242.56466674804688]},{"page":407,"text":"stationary force—if there is one—than to the","rect":[108.01001739501953,263.19580078125,295.98922444152836,254.08761596679688]},{"page":407,"text":"Figure A-50. Restrictive fire line","rect":[347.0400085449219,254.6341552734375,497.0344076080322,245.24542236328126]},{"page":407,"text":"moving force. Alternatively, a commander can use an RFL to protect sensitive areas, such as cultural","rect":[108.01001739501953,274.65869140625,540.0597910842896,265.5505065917969]},{"page":407,"text":"monuments. Figure A-50 depicts a restricted fire line.","rect":[108.01001739501953,286.18170166015627,322.74563121795657,277.0735168457031]},{"page":407,"text":"FIRE SUPPORT TARGETS","rect":[90.0,309.53997802734377,211.73448753356935,301.2359924316406]},{"page":407,"text":"A-100. A target is an entity or object","rect":[108.0,329.45428466796877,259.60462140655519,320.3360900878906]},{"page":407,"text":"that performs a function for the threat","rect":[108.02003479003906,340.8971252441406,259.6658091506958,331.8089904785156]},{"page":407,"text":"considered for possible engagement","rect":[108.02003479003906,352.4401550292969,259.60568952178957,343.33197021484377]},{"page":407,"text":"or other action (JP 3-60). There are","rect":[108.02003479003906,363.88299560546877,259.6316652374268,354.79486083984377]},{"page":407,"text":"control measures for point targets,","rect":[108.01001739501953,375.4260559082031,259.67779064178469,366.31787109375]},{"page":407,"text":"circular targets, rectangular targets,","rect":[108.01001739501953,386.94903564453127,259.61358165740969,377.8408508300781]},{"page":407,"text":"and linear targets. Commanders","rect":[108.01001739501953,398.41192626953127,259.6255938987732,389.3037414550781]},{"page":407,"text":"designate fire support targets using a","rect":[108.01001739501953,409.9349365234375,259.57455158996586,400.8267517089844]},{"page":407,"text":"two-letter ","rect":[108.01001739501953,419.4338684082031,149.39161205291749,412.3497314453125]},{"page":407,"text":"and ","rect":[160.56692504882813,419.4338684082031,177.59191417694093,412.3497314453125]},{"page":407,"text":"four-digit ","rect":[188.7041015625,421.4579162597656,229.48549938201905,412.3497314453125]},{"page":407,"text":"code","rect":[240.65780639648438,420.0,259.6266603546143,412.3497314453125]},{"page":407,"text":"established in field artillery doctrine.","rect":[108.0,432.9208068847656,255.46438121795655,423.8126220703125]},{"page":407,"text":"A-101. Commanders may choose to","rect":[108.0,450.4457702636719,259.5891933441162,441.33758544921877]},{"page":407,"text":"attack two or more targets","rect":[108.01000213623047,461.96881103515627,259.5595538597107,452.8606262207031]},{"page":407,"text":"simultaneously ","rect":[108.01001739501953,473.4316711425781,171.05384349822999,464.323486328125]},{"page":407,"text":"or ","rect":[176.76524353027345,472.0,187.60988903045655,466.0]},{"page":407,"text":"sequentially. ","rect":[193.3212890625,473.4316711425781,246.64477062225343,464.323486328125]},{"page":407,"text":"A","rect":[252.356201171875,471.2773742675781,259.5906415023804,464.49383544921877]},{"page":407,"text":"group of targets consists of","rect":[108.01001739501953,484.95465087890627,259.65474486923218,475.8464660644531]},{"page":407,"text":"simultaneously engaging two or more","rect":[108.01001739501953,496.4776611328125,259.63671589660648,487.3694763183594]},{"page":407,"text":"targets. ","rect":[108.01001739501953,507.9405517578125,139.73533153533936,499.8343811035156]},{"page":407,"text":"Commanders ","rect":[149.29441833496095,506.0,205.06775951385499,498.8323669433594]},{"page":407,"text":"graphically","rect":[214.62684631347657,507.9405517578125,259.59557151794436,498.8323669433594]},{"page":407,"text":"show a group of targets by circling the","rect":[108.01001739501953,519.4635620117188,259.6487398223877,510.3553771972656]},{"page":407,"text":"targets and identifying the group with","rect":[108.01001739501953,530.986572265625,259.5385341644287,521.87841796875]},{"page":407,"text":"a ","rect":[108.01001739501953,541.0,114.95488262176514,535.0]},{"page":407,"text":"group ","rect":[122.10916137695313,542.4494018554688,147.95374584197999,535.0]},{"page":407,"text":"designator. ","rect":[155.0489044189453,542.4494018554688,201.70403575897218,533.3412475585938]},{"page":407,"text":"This ","rect":[208.85830688476563,541.0,229.1187391281128,533.3412475585938]},{"page":407,"text":"group","rect":[236.27301025390626,542.4494018554688,259.58254051208498,535.0]},{"page":407,"text":"Figure A-51. Fire support targets","rect":[326.3999938964844,537.3541870117188,481.49757289123536,528.0556030273438]},{"page":407,"text":"designator consists of the two letters","rect":[108.01001739501953,553.972412109375,259.61366152572637,544.8642578125]},{"page":407,"text":"assigned to the block of target numbers assigned to a unit with a number inserted between the two letters. A","rect":[108.01001739501953,565.4954223632813,539.9832196273803,556.3872680664063]},{"page":407,"text":"series of targets consists of engaging two or more targets sequentially. A series can include individual targets","rect":[108.01001739501953,576.958251953125,540.0701434593201,567.85009765625]},{"page":407,"text":"or combinations of individual and group targets. Commanders show a series of targets as individual targets","rect":[108.01001739501953,588.4812622070313,539.9551532249451,579.3731079101563]},{"page":407,"text":"or groups of targets within a prescribed area. Commanders assign each series a code name or nickname. The","rect":[108.01001739501953,599.9441528320313,540.0917635040283,590.8359985351563]},{"page":407,"text":"designation of a series or group of targets does not preclude the attack of individual targets within the series","rect":[108.01001739501953,611.4671630859375,540.0073993186951,602.3590087890625]},{"page":407,"text":"or group. It also does not preclude the attack of one or more groups of targets within the series. Figure A-51","rect":[108.01001739501953,622.9901123046875,540.0222682952881,613.8819580078125]},{"page":407,"text":"depicts the different fire support targets.","rect":[107.98994445800781,634.4530029296875,268.5945692062378,625.3448486328125]},{"page":407,"text":"COMMON AIRSPACE COORDINATING MEASURES","rect":[90.0,657.749755859375,431.8557349700928,648.0615844726563]},{"page":407,"text":"A-102. Airspace coordinating measures are measures employed to facilitate the efficient use of airspace to","rect":[108.0,677.874267578125,539.9593410491943,668.76611328125]},{"page":407,"text":"accomplish missions and simultaneously provide safeguards for friendly forces (JP 3-52). Airspace","rect":[108.0,689.3972778320313,539.9522371368408,680.2891235351563]},{"page":407,"text":"coordinating measures (ACMs) are employed to facilitate the efficient use of airspace to accomplish missions","rect":[108.01001739501953,700.9202880859375,540.0744159202576,691.8121337890625]},{"page":407,"text":"and simultaneously provide safeguards for friendly forces. ACMs provide the three-dimensional description","rect":[108.02002716064453,712.3831787109375,539.9924831390381,703.2750244140625]},{"page":407,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":407,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":407,"text":"A-33","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":408,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":408,"text":"of the airspace, associated restrictions, requests for access and other applicable coordination procedures. The","rect":[90.0,83.49430847167969,522.0648470001221,74.40616607666016]},{"page":408,"text":"details of each ACM are provided in the airspace control order. Airspace elements establish ACMs to","rect":[90.0,94.95719909667969,522.0124416351318,85.86905670166016]},{"page":408,"text":"accomplish one or more functions:","rect":[90.0,106.48020935058594,228.92732953643799,97.3920669555664]},{"page":408,"text":" Establish reserved airspace for specific airspace users.","rect":[115.19999694824219,119.97428894042969,350.1330213546753,110.88614654541016]},{"page":408,"text":" Restrict the actions of some airspace users.","rect":[115.19999694824219,133.4742889404297,305.13714122772219,124.38614654541016]},{"page":408,"text":" Create airspace in which units can use weapons with minimal risk of friendly fire incidents.","rect":[115.19999694824219,146.99432373046876,522.0279493331909,137.88613891601563]},{"page":408,"text":"(Friendly fire incidents include death by fratricide, injury, and property damage.)","rect":[133.1999969482422,158.517333984375,457.29704833602906,149.39913940429688]},{"page":408,"text":" Control actions of specific airspace users.","rect":[115.19999694824219,171.9943084716797,299.85357189178469,162.90615844726563]},{"page":408,"text":" Require airspace users to accomplish specific actions.","rect":[115.19999694824219,185.4943084716797,348.39556407928469,176.40615844726563]},{"page":408,"text":"A-103. Paragraphs A-104 through A-112 discusssome of the common airspace coordinating measures. (See","rect":[90.00376892089844,202.97918701171876,522.0332918243408,193.87100219726563]},{"page":408,"text":"JP 3-52 for a complete listing of ACMs and their uses see.)","rect":[90.01380157470703,214.502197265625,326.69621825790406,205.39401245117188]},{"page":408,"text":"AIR CORRIDORS","rect":[72.0,237.88796997070313,153.39218711853028,229.59597778320313]},{"page":408,"text":"A-104. An air corridor is a restricted air route of travel specified for use by friendly aircraft established for","rect":[90.0,257.7542724609375,521.9974877891541,248.64608764648438]},{"page":408,"text":"the purpose of preventing friendly aircraft from being fired upon by friendly forces (JP 3-52). It is used to","rect":[90.01002502441406,269.27728271484377,521.9674587249756,260.1690979003906]},{"page":408,"text":"route Army aviation elements between areas such as holding areas and forward arming and refueling points.","rect":[90.01000213623047,280.80029296875,521.9919385910034,271.6921081542969]},{"page":408,"text":"An air corridor’s altitude will not exceed the coordinating altitude prescribed in the airspace control order.","rect":[90.01001739501953,292.2631530761719,521.9480543136597,283.15496826171877]},{"page":408,"text":"There are seven specific uses of air corridors. Two examples of these uses are the minimum risk route and","rect":[90.01001739501953,303.76611328125,522.0436305999756,294.677978515625]},{"page":408,"text":"standard use army aircraft flight route.","rect":[90.01001739501953,315.30914306640627,243.8952283859253,306.2009582519531]},{"page":408,"text":"Minimum Risk Route","rect":[72.0,337.7027282714844,173.99212419128419,330.1155700683594]},{"page":408,"text":"A-105. A minimum risk route is a temporary air corridor of defined dimensions recommended for use by","rect":[90.0,357.4142761230469,521.9974269866943,348.30609130859377]},{"page":408,"text":"aircraft that presents the minimum known hazards to low-flying aircraft transiting the combat zone (JP 3-52).","rect":[89.9899673461914,368.9372863769531,522.0954542160034,359.8291015625]},{"page":408,"text":"These routes are recommended by the ground commander and are used primarily for cross FLOT operations.","rect":[89.98998260498047,380.400146484375,521.9929151535034,371.2919616699219]},{"page":408,"text":"They are established based on known threats and friendly unit locations. Aircraft executing close air support","rect":[89.98998260498047,391.92315673828127,522.0920786819459,382.8149719238281]},{"page":408,"text":"missions do not usually use these routes in the vicinity of the target area.","rect":[89.98998260498047,403.4461669921875,380.5548963546753,394.3379821777344]},{"page":408,"text":"Standard Use Army Aircraft Flight Route","rect":[72.0,428.0606994628906,269.01858293151857,418.2555847167969]},{"page":408,"text":"A-106. A standard use Army aircraft flight route is a route established below the coordination level to","rect":[90.0,445.5542907714844,522.0132350921631,436.44610595703127]},{"page":408,"text":"facilitate the movement of Army aircraft (JP 3-52). It is generally used by Army aircraft for administrative","rect":[89.9999771118164,457.0773010253906,521.9109163360596,447.9691162109375]},{"page":408,"text":"and logistic purposes. If a coordination level has been established the using authority can implement it as","rect":[89.9899673461914,468.60028076171877,521.9201190452576,459.4920959472656]},{"page":408,"text":"long as it remains below the coordination level. If no coordination level has been established the airspace","rect":[89.98994445800781,480.06317138671877,521.9578523712158,470.9549865722656]},{"page":408,"text":"control authority establishes it upon the ground commander’s request.","rect":[89.98994445800781,491.586181640625,369.6923780441284,482.4779968261719]},{"page":408,"text":"A-34","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":408,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":408,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":409,"text":"Tactical Control Measures","rect":[427.97998046875,44.55902099609375,539.9399741210938,37.90802001953125]},{"page":409,"text":"COORDINATING ALTITUDE","rect":[90.0,83.38796997070313,222.62722158432008,75.0959701538086]},{"page":409,"text":"A-107. A coordinating altitude is an airspace","rect":[108.0,103.3143310546875,302.05834675598148,94.2061538696289]},{"page":409,"text":"coordinating ","rect":[108.01001739501953,114.7772216796875,161.09498119354249,105.6690444946289]},{"page":409,"text":"measure ","rect":[166.56991577148438,113.0,202.43450450897218,107.0]},{"page":409,"text":"that ","rect":[207.96554565429688,113.0,225.4103651046753,105.6690444946289]},{"page":409,"text":"uses ","rect":[230.94140625,113.0,250.66677379608155,107.0]},{"page":409,"text":"altitude ","rect":[256.19781494140627,113.0,288.6425428390503,105.6690444946289]},{"page":409,"text":"to","rect":[294.173583984375,113.0,301.9430751800537,106.6710433959961]},{"page":409,"text":"separate users and as the transition between","rect":[108.01001739501953,126.28019714355469,301.8949794769287,117.19205474853516]},{"page":409,"text":"different airspace control elements (JP 3-52).","rect":[108.01001739501953,137.80320739746095,301.9701795578003,128.71505737304688]},{"page":409,"text":"The establishment of a coordinating","rect":[108.01001739501953,149.28607177734376,265.96535301208498,140.17788696289063]},{"page":409,"text":"altitude","rect":[271.99737548828127,147.2620391845703,302.0062837677002,140.17788696289063]},{"page":409,"text":"allows the airspace control authority to assign a","rect":[108.01001739501953,160.80908203125,301.91000080871586,151.70089721679688]},{"page":409,"text":"volume of airspace to another airspace control","rect":[108.01001739501953,172.3120574951172,301.99719953155519,163.22390747070313]},{"page":409,"text":"organization. Army forces must be aware that","rect":[108.01001739501953,183.79498291015626,301.9542612991333,174.68679809570313]},{"page":409,"text":"any airspace user that transits or fires through an","rect":[108.01001739501953,195.3179931640625,301.9572048187256,186.20980834960938]},{"page":409,"text":"established ","rect":[108.01001739501953,205.0,154.97475719451905,197.67263793945313]},{"page":409,"text":"coordinating ","rect":[168.96969604492188,206.78082275390626,221.99456310272218,197.67263793945313]},{"page":409,"text":"altitude ","rect":[236.0526123046875,205.0,268.4974012374878,197.67263793945313]},{"page":409,"text":"must","rect":[282.5554504394531,205.0,302.0212779006958,198.67465209960938]},{"page":409,"text":"coordinate with the appropriate airspace control","rect":[108.01001739501953,218.28379821777345,301.93613385772707,209.19564819335938]},{"page":409,"text":"agency. For example, all artillery fires that","rect":[108.01001739501953,229.82684326171876,301.9661326370239,220.71865844726563]},{"page":409,"text":"exceed ","rect":[108.01001739501953,240.0,138.29445934295655,232.18154907226563]},{"page":409,"text":"the ","rect":[144.72731018066407,240.0,159.41262340545655,232.18154907226563]},{"page":409,"text":"coordinating ","rect":[165.78733825683595,241.28973388671876,218.87232494354249,232.18154907226563]},{"page":409,"text":"altitude ","rect":[225.24703979492188,240.0,257.75197887420657,232.18154907226563]},{"page":409,"text":"must ","rect":[264.184814453125,240.0,286.06948375701907,233.18356323242188]},{"page":409,"text":"be","rect":[292.5023193359375,240.0,301.9912691192627,232.18154907226563]},{"page":409,"text":"coordinated and approved prior to execution.","rect":[108.01001739501953,252.79270935058595,301.97622203826907,243.70455932617188]},{"page":409,"text":"The coordinating altitude is normally expressed","rect":[108.01001739501953,264.335693359375,301.9411220550537,255.22750854492188]},{"page":409,"text":"in feet above mean sea level.","rect":[108.01001739501953,273.7745361328125,223.54662609100343,266.6903991699219]},{"page":409,"text":"A-108. The joint force airspace control","rect":[108.01001739501953,293.3235778808594,302.0172495803833,284.20538330078127]},{"page":409,"text":"authority establishes the coordinating altitude,","rect":[108.01001739501953,304.8465576171875,301.9741163253784,295.7383728027344]},{"page":409,"text":"typically ","rect":[108.01001739501953,316.3094482421875,145.55495738983155,307.2012634277344]},{"page":409,"text":"after ","rect":[151.32647705078126,315.0,172.0708875656128,307.2113037109375]},{"page":409,"text":"consultation ","rect":[177.84242248535157,315.0,229.18792247772218,307.2012634277344]},{"page":409,"text":"with ","rect":[234.95944213867188,315.0,255.22490978240968,307.2012634277344]},{"page":409,"text":"the ","rect":[260.9964294433594,315.0,275.6817274093628,307.2012634277344]},{"page":409,"text":"other","rect":[281.3961181640625,315.0,301.9531152305603,307.2012634277344]},{"page":409,"text":"Service","rect":[108.01001739501953,325.8184509277344,138.01691914367675,318.7242736816406]},{"page":409,"text":"components. ","rect":[147.1280975341797,327.8124084472656,200.51264476776124,319.7262878417969]},{"page":409,"text":"The ","rect":[207.12583923339845,326.0,225.11074352264405,318.7242736816406]},{"page":409,"text":"airspace ","rect":[231.72393798828126,327.8124084472656,267.04851818084719,318.7242736816406]},{"page":409,"text":"control","rect":[273.66168212890627,326.0,301.9471812210083,318.7242736816406]},{"page":409,"text":"authority publishes the coordinating altitude as","rect":[108.01001739501953,339.3554382324219,301.97816347885137,330.24725341796877]},{"page":409,"text":"part of the airspace control order. Army forces","rect":[108.01001739501953,350.81829833984377,302.03227114486699,341.7101135253906]},{"page":409,"text":"Figure A-52. Coordinating altitude and","rect":[334.260009765625,350.09417724609377,515.8955357093811,340.7054443359375]},{"page":409,"text":"can request adjustments to the coordinating","rect":[108.01001739501953,362.34130859375,301.9712429046631,353.2231140136719]},{"page":409,"text":"coordination level","rect":[382.25579833984377,359.63323974609377,467.85166120147707,352.34869384765627]},{"page":409,"text":"altitude based on mission requirements for","rect":[108.01001739501953,373.84423828125,301.9692285118103,364.756103515625]},{"page":409,"text":"approval by the airspace control authority. Typically, the only echelon that does this is a division if has a","rect":[108.01001739501953,385.3271789550781,540.0239534454346,376.218994140625]},{"page":409,"text":"joint air-ground integration center. Figure A-52 depicts a coordinating altitude of 13,000 feet mean sea level.","rect":[108.01001739501953,396.85015869140627,540.0523633956909,387.7319641113281]},{"page":409,"text":"COORDINATION LEVEL","rect":[90.0,420.1679992675781,205.05111074447633,411.8760070800781]},{"page":409,"text":"A-109. A coordination level is an airspace coordinating measure below which fixed-wing aircraft by","rect":[108.0,440.09429931640627,540.0324001312256,430.9861145019531]},{"page":409,"text":"normally will not fly (JP 3-52). The coordination level and coordinating altitude are not synonymous terms.","rect":[108.01005554199219,451.55718994140627,539.9903516769409,442.4490051269531]},{"page":409,"text":"The key distinction being that a coordination level is used to separate fixed- and rotary-wing aircraft while a","rect":[108.00003814697266,463.0801696777344,540.0234041290283,453.97198486328127]},{"page":409,"text":"coordinating altitude is used to separate different airspace control elements. Additionally, a coordination level","rect":[108.01005554199219,474.5430603027344,540.1067271194459,465.43487548828127]},{"page":409,"text":"can be established with or without a coordinating altitude. Army forces recommend a coordination level, or","rect":[108.01005554199219,486.0660705566406,539.9821679649353,476.9578857421875]},{"page":409,"text":"any adjustments to an existing coordination level to the airspace control authority for approval. BCTs and","rect":[108.01005554199219,497.58905029296877,540.0439968109131,488.4708557128906]},{"page":409,"text":"above can initiate a request for a coordination level within their air defense airspace management/brigade","rect":[108.01005554199219,509.05194091796877,540.1176424102783,499.9437561035156]},{"page":409,"text":"aviation element cell or joint air-ground integration center. A coordination level is established by the airspace","rect":[108.0000228881836,520.574951171875,539.9653596954346,511.4567565917969]},{"page":409,"text":"control authority and is reflected in the airspace control order. The coordination level is normally expressed","rect":[108.00003051757813,532.097900390625,540.0120143890381,522.98974609375]},{"page":409,"text":"in feet above ground level. Figure A-52 depicts a coordination level.","rect":[107.98999786376953,543.560791015625,381.87969493865969,534.45263671875]},{"page":409,"text":"RESTRICTED OPERATIONS ZONE","rect":[90.0,566.9280395507813,251.66288137435914,558.635986328125]},{"page":409,"text":"A-110. A restricted operations zone is airspace reserved for specific activities in which the operations of","rect":[108.0,586.8342895507813,539.9412744102478,577.7461547851563]},{"page":409,"text":"one or more airspace users is restricted (JP 3-52). A restricted operations zone (ROZ) ACM has fourteen","rect":[108.0100326538086,598.3572998046875,539.9743556976318,589.2691650390625]},{"page":409,"text":"specific uses. Example uses include close air support and unmanned aircraft.","rect":[108.0100326538086,609.8201904296875,414.5339307785034,600.7320556640625]},{"page":409,"text":"Close Air Support ROZ","rect":[90.0,634.438720703125,202.0739496116638,624.655517578125]},{"page":409,"text":"A-111. A close air support ROZ is airspace designated for holding orbits and is used by rotary- and fixed-","rect":[108.0,652.0142822265625,540.0363671836853,642.9061279296875]},{"page":409,"text":"wing aircraft in proximity to friendly forces. This ROZ is used in support of air assets performing close air","rect":[108.00003814697266,663.4771728515625,539.9921777305603,654.3690185546875]},{"page":409,"text":"support missions in support of ground maneuver forces. When determining the appropriate ROZ size units","rect":[107.99000549316406,675.0001831054688,539.8922870140076,665.8920288085938]},{"page":409,"text":"need to consider the type of aircraft providing support and altitude limits This ROZ is requested by the","rect":[107.99000549316406,686.523193359375,539.9703035430908,677.4150390625]},{"page":409,"text":"applicable ground maneuver force and is established by the airspace control authority.","rect":[107.99000549316406,697.986083984375,452.37053966522219,688.8779296875]},{"page":409,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":409,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":409,"text":"A-35","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":410,"text":"Appendix A","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":410,"text":"Unmanned Aircraft ROZ","rect":[72.0,82.42471313476563,191.769796169281,74.81556701660156]},{"page":410,"text":"A-112. An unmanned aircraft ROZ is airspace of defined dimensions created specifically for UAS","rect":[90.0,102.11431884765625,522.0604391021728,93.00614166259766]},{"page":410,"text":"operations. Generally, this airspace defines where UAS operations are conducted, and does not include en","rect":[90.01001739501953,113.6373291015625,522.0040187835693,104.5291519165039]},{"page":410,"text":"route airspace. This ROZ is only for use with UAS. Requesting units should request sufficient airspace to","rect":[90.01001739501953,125.16033935546875,521.9617824554443,116.05216217041016]},{"page":410,"text":"facilitate the requirements unique to the UAS platform such as turn radius requirements. This ROZ is","rect":[90.01000213623047,136.60313415527345,522.0481097679138,127.5149917602539]},{"page":410,"text":"requested by the applicable ground maneuver for and is established by the airspace control authority.","rect":[90.01001739501953,148.14617919921876,493.5605421066284,139.03799438476563]},{"page":410,"text":"A-36","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":410,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":410,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":411,"text":"Appendix B","rect":[281.6400146484375,125.65198516845703,348.32400366210939,114.7079849243164]},{"page":411,"text":"Tactical Mission Tasks","rect":[228.3000030517578,146.99623107910157,401.69404652404787,135.3496856689453]},{"page":411,"text":"The tactical mission tasks in this appendix describe the results or effects commanders","rect":[126.0,184.73876953125,504.1238504371643,174.7799072265625]},{"page":411,"text":"want to achieve—the what of a mission statement. These tasks have specific military","rect":[126.0,197.47557067871095,503.95142555236819,187.4947509765625]},{"page":411,"text":"definitions.","rect":[126.00000762939453,207.86265563964845,175.85907459259034,200.09979248046876]},{"page":411,"text":"TASKS FOR TACTICAL MISSIONS","rect":[90.0,233.4896697998047,318.33104624938968,223.8155059814453]},{"page":411,"text":"B-1. Tactical mission tasks are the “what” of a mission statement. Most of these actions and effects have","rect":[108.0,251.5902862548828,540.0493440704346,244.50613403320313]},{"page":411,"text":"associated military symbols. Staffs use them in course of action development and sketches as part of the","rect":[108.0,265.1373291015625,539.9629182891846,256.0291442871094]},{"page":411,"text":"military decision-making process. Some are also graphic control measures or obstacle effects and are used","rect":[108.0,276.66033935546877,539.9556179046631,267.5520324707031]},{"page":411,"text":"as such. See table B-1 for a list of all tactical mission tasks.","rect":[107.98999786376953,286.10919189453127,345.21551036834719,279.0150146484375]},{"page":411,"text":"Table B-1. Tactical mission tasks","rect":[236.6367645263672,303.6542053222656,393.4086751861572,296.339599609375]},{"page":411,"text":"Attack by fire","rect":[157.1999969482422,324.98101806640627,209.24339514160156,316.5480041503906]},{"page":411,"text":"Block","rect":[157.1999969482422,336.5190124511719,179.16270446777345,329.97601318359377]},{"page":411,"text":"Breach","rect":[157.1999969482422,349.9020080566406,185.66429357910156,343.3590087890625]},{"page":411,"text":"Bypass","rect":[157.1999969482422,365.0040283203125,186.6623992919922,356.67901611328127]},{"page":411,"text":"Canalize","rect":[157.1999969482422,376.6050109863281,192.20369177246094,369.9540100097656]},{"page":411,"text":"Clear","rect":[157.1999969482422,389.92498779296877,178.61099841308596,383.27398681640627]},{"page":411,"text":"Contain","rect":[157.1999969482422,403.29901123046877,188.17799597167969,396.64801025390627]},{"page":411,"text":"Control","rect":[220.02000427246095,323.1990051269531,249.01170239257812,316.5480041503906]},{"page":411,"text":" ","rect":[249.0,324.0,251.502,323.0]},{"page":411,"text":"Counterreconnaissance","rect":[220.02000427246095,336.5190124511719,315.0042136230469,329.8680114746094]},{"page":411,"text":"Destroy","rect":[220.02000427246095,351.68402099609377,250.974609375,343.3590087890625]},{"page":411,"text":"Disengage","rect":[220.02000427246095,365.0040283203125,262.99499731445317,356.67901611328127]},{"page":411,"text":"Disrupt ","rect":[220.02000427246095,378.28802490234377,250.9620067138672,370.06201171875]},{"page":411,"text":"Exfiltrate","rect":[220.02000427246095,389.92498779296877,255.02369909667969,383.27398681640627]},{"page":411,"text":"Fix","rect":[325.9230041503906,323.1090087890625,337.9226989746094,316.6650085449219]},{"page":411,"text":"Follow and assume","rect":[325.9230041503906,336.52801513671877,403.4039938964844,329.9850158691406]},{"page":411,"text":"Follow and support","rect":[325.9320068359375,351.5940246582031,401.91362109375,343.3680114746094]},{"page":411,"text":"Interdict","rect":[325.9320068359375,363.23101806640627,357.8846904296875,356.6880187988281]},{"page":411,"text":"Isolate","rect":[325.9320068359375,376.614013671875,352.410005859375,370.0710144042969]},{"page":411,"text":"Neutralize ","rect":[325.9320068359375,390.0,368.8710185546875,383.3910217285156]},{"page":411,"text":"Occupy","rect":[325.91998291015627,405.0810241699219,356.4002685546875,396.6390075683594]},{"page":411,"text":"Reduce","rect":[414.29998779296877,323.1990051269531,445.27890234375,316.656005859375]},{"page":411,"text":"Retain","rect":[414.29998779296877,336.5190124511719,440.2982810058594,329.97601318359377]},{"page":411,"text":"Secure","rect":[414.29998779296877,349.9020080566406,442.7633994140625,343.2510070800781]},{"page":411,"text":"Seize","rect":[414.29998779296877,363.2220153808594,436.7666953125,356.5710144042969]},{"page":411,"text":"Support by fire","rect":[414.29998779296877,378.38702392578127,472.8117087402344,369.9540100097656]},{"page":411,"text":"Suppress","rect":[414.29998779296877,391.6080017089844,452.2682800292969,383.27398681640627]},{"page":411,"text":"Turn","rect":[414.29998779296877,403.29901123046877,432.80038671875,396.7560119628906]},{"page":411,"text":"B-2. Commanders are not limited to the tactical mission tasks listed in this appendix in specifying desired","rect":[108.0,424.5542907714844,539.9681301116943,415.44610595703127]},{"page":411,"text":"subordinate actions in operation orders or operation plans. Many of the words and terms used to describe the","rect":[108.0,436.0773010253906,540.0751009063721,426.9691162109375]},{"page":411,"text":"what of a mission statement do not have special connotations beyond their common English language","rect":[108.0,447.60028076171877,540.0000276641846,438.4920959472656]},{"page":411,"text":"meanings. However, units must have a shared understanding of the what of the operation. Tasks involving","rect":[108.0,459.06317138671877,540.0724391937256,449.9549865722656]},{"page":411,"text":"only actions by friendly forces rarely provide sufficient clarity for a mission statement, thus the addition of a","rect":[107.98994445800781,470.586181640625,539.9882478790283,461.4779968261719]},{"page":411,"text":"solid purpose coupled with the task adds understanding and clarity. Commanders ensure that missions","rect":[107.98994445800781,482.1091613769531,539.9708392601013,473.0009765625]},{"page":411,"text":"assigned to subordinate units are consistent with their schemes of maneuver and resources allocated to those","rect":[107.98994445800781,493.5720520019531,539.9378938751221,484.4638671875]},{"page":411,"text":"subordinates. For example, a defending unit requires far greater effort (resources) to destroy an enemy force","rect":[107.98994445800781,505.0950622558594,539.9884920196533,495.98687744140627]},{"page":411,"text":"than to disrupt it. Likewise, an attacking unit requires more combat power to clear enemy forces from a given","rect":[107.98999786376953,516.6180419921875,539.9684352874756,507.5098571777344]},{"page":411,"text":"area than to contain enemy forces in that same area.","rect":[107.98997497558594,528.0809326171875,315.1445264816284,518.9727783203125]},{"page":411,"text":"ATTACK BY FIRE","rect":[90.0,551.4127197265625,174.61818838119508,543.1680297851563]},{"page":411,"text":"B-3. Attack by fire is a tactical mission task using direct and","rect":[108.0,571.374267578125,378.2714681549072,562.4263916015625]},{"page":411,"text":"indirect fires to engage anenemy from a distance. Friendly forces","rect":[107.98997497558594,582.8972778320313,378.30155825424199,573.7891235351563]},{"page":411,"text":"use direct fires, supported by indirect fires, to engage an enemy force","rect":[108.0100326538086,594.3601684570313,378.3367281036377,585.2520141601563]},{"page":411,"text":"without closing with the enemy to destroy, suppress, fix, or deceive","rect":[108.0100326538086,605.8831787109375,378.3207368927002,596.7750244140625]},{"page":411,"text":"that enemy. This task is usually given when the mission does not","rect":[108.0100326538086,617.3460693359375,378.30258893585207,608.2379150390625]},{"page":411,"text":"dictate or support occupation of the objective. An attack by fire is","rect":[108.0100326538086,628.8690795898438,378.26344179916387,619.7508544921875]},{"page":411,"text":"not done in conjunction with a maneuvering force. When assigning","rect":[108.0100326538086,640.39208984375,378.28063011169436,631.2738647460938]},{"page":411,"text":"this task, the commander must state the desired effect on enemy","rect":[108.0100326538086,651.8549194335938,378.20030784606936,642.7467651367188]},{"page":411,"text":"forces, such as neutralize, fix, or disrupt. A commander may assign","rect":[108.0100326538086,663.3779296875,378.2755947113037,654.269775390625]},{"page":411,"text":"the force conducting an attack by fire to a battle position with either","rect":[108.0100326538086,674.9009399414063,378.2404687461853,665.7927856445313]},{"page":411,"text":"a sector of fire or an engagement area. The arrow points at the","rect":[108.01004028320313,686.3638305664063,378.2936067657471,677.2556762695313]},{"page":411,"text":"Figure B-1. Attack by fire task","rect":[392.6400146484375,676.3141479492188,533.8759298248291,666.9254150390625]},{"page":411,"text":"targeted force or objective, and the commander places the base of the arrow in the general area from which","rect":[108.01004028320313,697.8868408203125,539.9770412445068,688.7686157226563]},{"page":411,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":411,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":411,"text":"B-1","rect":[507.47698974609377,754.0800170898438,521.9579794921875,747.6090087890625]},{"page":412,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":412,"text":"the commander wants to deliver the attack. Attack by fire positions are rarely applicable to units larger than","rect":[90.0,83.51434326171875,522.0291652679443,74.40616607666016]},{"page":412,"text":"company size. Figure B-1 on page B-1 depicts the attack by fire tactical mission task.","rect":[90.0,94.97723388671875,431.56374645233157,85.86905670166016]},{"page":412,"text":"B-4. An attack by fire closely resembles the task of support by fire. The chief difference is that one unit","rect":[89.99996185302735,112.4921875,521.9586558303834,103.3840103149414]},{"page":412,"text":"conducts the support by fire task to support another unit, so the second unit can maneuver against enemy","rect":[90.0,124.01519775390625,521.9340724945068,114.90702056884766]},{"page":412,"text":"forces. The attack by fire task includes—","rect":[90.0,135.47808837890626,254.7588768005371,126.36991119384766]},{"page":412,"text":" Assigning sectors of fire or engagement areas to each subordinate weapon system to include the","rect":[115.19999694824219,148.97430419921876,521.9649324493408,139.86611938476563]},{"page":412,"text":"enemy force’s defensive positions or avenues of approach.","rect":[133.1999969482422,160.497314453125,367.5518445968628,151.38912963867188]},{"page":412,"text":" Designating control measures for massing, distributing, and shifting of direct and indirect fires.","rect":[115.19999694824219,173.99432373046876,514.0038404464722,164.88613891601563]},{"page":412,"text":" Designating BPs, an assigned area, or an axis of advance to allow the friendly force to engage the","rect":[115.19999694824219,187.49432373046876,522.0681428985596,178.38613891601563]},{"page":412,"text":"enemy force.","rect":[133.1999969482422,199.017333984375,185.44628429412843,189.91917419433595]},{"page":412,"text":" Providing for security and all-around defense, including control measures to ensure tie in of","rect":[115.19999694824219,212.45428466796876,521.9318749961853,203.34609985351563]},{"page":412,"text":"subordinate elements and maximum use of hide positions.","rect":[133.1999969482422,223.95726013183595,365.44365978240969,214.86911010742188]},{"page":412,"text":" Using OPSEC to deceive enemy forces about movement, occupation, and intent of the operation.","rect":[115.19999694824219,237.47430419921876,521.4468336105347,228.36611938476563]},{"page":412,"text":" Reconnoitering, preparing, and securing movement routes and firing positions before the","rect":[115.19999694824219,250.97430419921876,522.0362825469971,241.86611938476563]},{"page":412,"text":"movement of the main body, and stocking class V items.","rect":[133.1999969482422,262.497314453125,360.1450147628784,253.38912963867188]},{"page":412,"text":" Providing movement instructions to the initial battle positions.","rect":[115.19999694824219,275.99432373046877,383.1446485519409,266.8861389160156]},{"page":412,"text":"BLOCK","rect":[72.0,299.35272216796877,107.93557453155518,291.2760009765625]},{"page":412,"text":"B-5. Block is a tactical mission task that denies the enemy access to","rect":[90.0,319.2543029785156,376.9488124847412,310.30645751953127]},{"page":412,"text":"an area or an avenue of approach. A blocking task normally requires","rect":[90.00000762939453,330.7773132324219,376.97584414291387,321.66912841796877]},{"page":412,"text":"the friendly force to block the enemy force for a certain time, or until a","rect":[90.00000762939453,342.30029296875,376.8896761016846,333.1921081542969]},{"page":412,"text":"specific event has occurred. The line perpendicular to the enemy’s line","rect":[90.00000762939453,353.76318359375,376.97726155090336,344.6549987792969]},{"page":412,"text":"of advance indicates the limit of enemy advance. A blocking unit may","rect":[90.0,365.28619384765627,376.9077968597412,356.1780090332031]},{"page":412,"text":"have to hold terrain and become decisively engaged. Block as a tactical","rect":[90.0,376.8092041015625,377.00196027374269,367.7010192871094]},{"page":412,"text":"mission task differs from the tactical mission task of fix. A blocked","rect":[90.0,386.2480163574219,376.93956565856936,379.16387939453127]},{"page":412,"text":"enemy force can move in any direction other than the obstructed one,","rect":[90.0,399.7950744628906,377.0189161300659,390.6868896484375]},{"page":412,"text":"while a fixed enemy force cannot move in any direction. Figure B-2","rect":[90.0,411.31805419921877,376.9427089691162,402.2098693847656]},{"page":412,"text":"depicts the block tactical mission task.","rect":[89.98999786376953,422.7608947753906,243.9342908859253,413.6727294921875]},{"page":412,"text":"Figure B-2. Block task","rect":[401.0400085449219,427.794189453125,506.15382289123536,418.4956359863281]},{"page":412,"text":"B-6. Block is also an obstacle effect that integrates fire","rect":[89.98998260498047,440.2958984375,346.4088411407471,431.3480529785156]},{"page":412,"text":"planning and obstacle effort to stop an attacker along a","rect":[89.98998260498047,451.81890869140627,346.39586448669436,442.8710632324219]},{"page":412,"text":"specific avenue of approach or prevent the attacking force","rect":[89.98998260498047,463.28179931640627,346.3478059844971,454.3339538574219]},{"page":412,"text":"from passing through an engagement area. The vertical line","rect":[89.98999786376953,474.8048095703125,346.3727083282471,465.6966247558594]},{"page":412,"text":"in the obstacle effect graphic indicates the limit of enemy","rect":[89.9899673461914,486.2676696777344,346.39381980895998,477.15948486328127]},{"page":412,"text":"advance. It also indicates where the obstacle ties in to restricted","rect":[89.9899673461914,495.7666015625,346.38280296325686,488.6824645996094]},{"page":412,"text":"terrain. A force may employ blocking obstacles to assist in the","rect":[89.9899673461914,509.31365966796877,346.4177827911377,500.2054748535156]},{"page":412,"text":"task. Blocking obstacles are complex, employed in depth, and","rect":[89.9899673461914,520.7765502929688,346.3788356781006,511.6683654785156]},{"page":412,"text":"integrated with fires to prevent enemy forces from proceeding","rect":[89.9899673461914,532.299560546875,346.38890647888186,523.19140625]},{"page":412,"text":"along an avenue of approach or to proceed only at unacceptable","rect":[89.9899673461914,543.822509765625,346.42980671691898,534.71435546875]},{"page":412,"text":"cost. When employed, blocking obstacles serve as a limit, not","rect":[89.9899673461914,555.285400390625,346.4359507522583,546.17724609375]},{"page":412,"text":"Figure B-3. Block obstacle effect","rect":[360.7799987792969,548.8141479492188,515.9227197227478,539.4254150390625]},{"page":412,"text":"allowing enemy forces beyond that point. Obstacles alone cannot accomplish a blocking task. Figure B-3","rect":[89.9899673461914,566.8084106445313,522.0824489593506,557.7002563476563]},{"page":412,"text":"depicts the block obstacle effect. (See Chapter 17 for more information on the block obstacle effect.)","rect":[89.98999786376953,578.3114013671875,492.9193017539978,569.2232666015625]},{"page":412,"text":"BREACH","rect":[72.0,601.6326904296875,114.2264986038208,593.5559692382813]},{"page":412,"text":"B-7. Breach is a tactical mission task in which a unit breaks through or establishes a passage through","rect":[90.0,621.5343017578125,522.1364278717041,612.58642578125]},{"page":412,"text":"an enemy obstacle. An enemy obstacle can include enemy defenses, obstacles, minefields, or fortifications.","rect":[90.01002502441406,633.0572509765625,521.9451856613159,623.9490966796875]},{"page":412,"text":"Units attempt to bypass and avoid obstacles and enemy defensive positions to the maximum extent possible","rect":[90.01002502441406,644.580322265625,522.0149812774658,635.47216796875]},{"page":412,"text":"to maintain tempo and momentum. Breaching enemy defenses and obstacle systems is normally the last","rect":[90.01002502441406,656.0431518554688,522.0040049514771,646.9349975585938]},{"page":412,"text":"choice. If a breach is necessary, units employ all available means to break through or establish a passage. A","rect":[90.01002502441406,667.566162109375,522.0374188461303,658.4580078125]},{"page":412,"text":"breach is a synchronized combined arms operation under the control of the maneuver commander.","rect":[90.00003814697266,679.0891723632813,483.22088146209719,669.9810180664063]},{"page":412,"text":"B-2","rect":[72.1199951171875,754.0800170898438,86.60099249267579,747.6090087890625]},{"page":412,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":412,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":413,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.9969809570313,38.016021728515628]},{"page":413,"text":"B-8. The area located between the arms of the graphic","rect":[108.0,83.51434326171875,350.35180378723148,74.40616607666016]},{"page":413,"text":"shows the general location for the breach. The length of the","rect":[108.0,94.97723388671875,350.2409944610596,85.86905670166016]},{"page":413,"text":"arms extend to include the entire depth of the area that must","rect":[108.0,106.48020935058594,350.19040631866457,97.3920669555664]},{"page":413,"text":"be breached. Breaching operations may be required to","rect":[108.0,118.023193359375,350.3076992034912,108.9150161743164]},{"page":413,"text":"support an attack anywhere along the continuum from a","rect":[108.0,129.486083984375,350.27856159973148,120.3779067993164]},{"page":413,"text":"deliberate to a hasty attack. Regardless of where the attack","rect":[108.0,141.00909423828126,350.23241233825686,131.90090942382813]},{"page":413,"text":"falls ","rect":[108.0,151.0,127.72537517547608,143.42391967773438]},{"page":413,"text":"along ","rect":[135.3004913330078,152.5321044921875,160.06592845916749,143.42391967773438]},{"page":413,"text":"the ","rect":[167.5809326171875,151.0,182.32636547088624,143.42391967773438]},{"page":413,"text":"continuum, ","rect":[189.9014892578125,151.0,237.64577770233155,143.42391967773438]},{"page":413,"text":"the ","rect":[245.22091674804688,151.0,259.9062452316284,143.42391967773438]},{"page":413,"text":"breaching ","rect":[267.4813537597656,152.5321044921875,309.4059705734253,143.42391967773438]},{"page":413,"text":"tenets—","rect":[316.9810791015625,151.0,350.2836112976074,144.42593383789063]},{"page":413,"text":"intelligence, ","rect":[108.0,163.9949951171875,159.6410779953003,154.88681030273438]},{"page":413,"text":"breaching ","rect":[176.4546356201172,163.9949951171875,218.3772840499878,154.88681030273438]},{"page":413,"text":"fundamentals, ","rect":[235.19085693359376,162.0,294.0333204269409,154.88681030273438]},{"page":413,"text":"breaching","rect":[310.8468933105469,163.9949951171875,350.2345485687256,154.88681030273438]},{"page":413,"text":"organization, ","rect":[108.0,175.51800537109376,163.00478649139405,166.40982055664063]},{"page":413,"text":"mass, ","rect":[169.26026916503907,174.0,194.2651777267456,168.0]},{"page":413,"text":"and ","rect":[200.57778930664063,174.0,217.48253917694093,166.40982055664063]},{"page":413,"text":"synchronization—apply ","rect":[223.79513549804688,175.51800537109376,322.3588819503784,166.40982055664063]},{"page":413,"text":"when","rect":[328.6113586425781,174.0,350.3011074066162,166.40982055664063]},{"page":413,"text":"conducting breaching operations in support of an attack.","rect":[108.0,187.041015625,350.26662731170657,177.93283081054688]},{"page":413,"text":"Figure B-4. Breach task","rect":[393.3599853515625,184.67413330078126,505.13209437561036,175.37557983398438]},{"page":413,"text":"Figure B-4 depicts the breach tactical mission task. (See","rect":[108.0,198.50384521484376,350.2826509552002,189.39566040039063]},{"page":413,"text":"ATP 3-90.4/MCTP 3-34A for more information concerning breaching operations.)","rect":[107.9899673461914,210.02685546875,439.0447900352478,200.91867065429688]},{"page":413,"text":"BYPASS","rect":[90.0,233.36216735839845,128.02591514587403,225.27597045898438]},{"page":413,"text":"B-9. Bypass is a tactical mission task in which a unit","rect":[108.0,253.2542724609375,350.3066308555603,244.30641174316407]},{"page":413,"text":"deliberately avoids contact with an obstacle or an enemy","rect":[108.0,264.77728271484377,350.2497158050537,255.8294219970703]},{"page":413,"text":"force. A commander orders a bypass to maintain momentum","rect":[108.0,276.30029296875,350.21047734832765,267.1921081542969]},{"page":413,"text":"while deliberately avoiding combat with an enemy force. A","rect":[108.01002502441406,287.7631530761719,350.26358461761478,278.65496826171877]},{"page":413,"text":"bypass can take place in offensive or defensive actions. The","rect":[108.01005554199219,299.2861633300781,350.3268098907471,290.177978515625]},{"page":413,"text":"arms of the graphic go on both sides of the location or unit","rect":[108.01005554199219,310.80914306640627,350.29871320343019,301.7009582519531]},{"page":413,"text":"that will be bypassed. Figure B-5 depicts the bypass tactical","rect":[108.01005554199219,322.27203369140627,350.24057721710207,313.1638488769531]},{"page":413,"text":"mission task.","rect":[108.01005554199219,331.77099609375,160.2553358078003,324.6868591308594]},{"page":413,"text":"B-10. Commanders base the bypass decision on—","rect":[108.01005554199219,351.30999755859377,309.6124687194824,342.2018127441406]},{"page":413,"text":" The requirement to maintain momentum and","rect":[133.1999969482422,364.7742614746094,350.3245143890381,355.6861267089844]},{"page":413,"text":"Figure B-5. Bypass task","rect":[392.5199890136719,362.3941650390625,505.9754476470947,353.12567138671877]},{"page":413,"text":"aggressive action.","rect":[151.1999969482422,376.2572021484375,222.88007640838624,367.1490173339844]},{"page":413,"text":" Knowledge of the enemy force’s strength, intent, or mission.","rect":[133.1999969482422,389.7543029785156,394.1810255050659,380.6461181640625]},{"page":413,"text":" The degree to which the bypassed enemy force can interfere with the advance.","rect":[133.1999969482422,403.2543029785156,464.6849317550659,394.1461181640625]},{"page":413,"text":" The general state of the enemy force; for example, if enemy resistance is crumbling, the friendly","rect":[133.1999969482422,416.7543029785156,540.0175075531006,407.6461181640625]},{"page":413,"text":"force can take greater risks.","rect":[151.1999969482422,428.2773132324219,261.4590711593628,419.16912841796877]},{"page":413,"text":" Any bypass criteria established by a higher echelon headquarters.","rect":[133.1999969482422,441.7743225097656,413.0856885910034,432.6661376953125]},{"page":413,"text":"B-11. The force conducting the bypass immediately reports any bypassed obstacles and enemy forces to its","rect":[108.00377655029297,459.2892761230469,539.9527118186951,450.18109130859377]},{"page":413,"text":"higher echelon headquarters. This force normally keeps the bypassed enemy force under observation until","rect":[108.00377655029297,470.7521667480469,540.0017466506959,461.64398193359377]},{"page":413,"text":"relieved by another force unless it is part of a raid. A senior commander does not normally delegate authority","rect":[108.00377655029297,482.275146484375,540.0320949554443,473.1669616699219]},{"page":413,"text":"to bypass below the battalion task force level. Commanders establish bypass criteria to limit the size of enemy","rect":[108.00377655029297,493.738037109375,540.0803127288818,484.6298522949219]},{"page":413,"text":"forces that subordinates can bypass without their approval. Before approving the bypass, commanders ensure","rect":[108.00377655029297,505.26104736328127,540.1000642852783,496.1528625488281]},{"page":413,"text":"that the bypassing force checks the bypass route for enemy presence and trafficability. The bypassing force","rect":[108.00377655029297,516.7840576171875,540.0238313751221,507.6758728027344]},{"page":413,"text":"prevents the bypassed enemy force from interfering with the moving friendly force.","rect":[108.00377655029297,528.2469482421875,442.36431407928469,519.1387939453125]},{"page":413,"text":"B-12. The two bypass techniques that a force can employ are—","rect":[108.00377655029297,545.7619018554688,362.3374443054199,536.6537475585938]},{"page":413,"text":" Avoiding the enemy force totally.","rect":[133.1999969482422,559.2542724609375,286.48406505584719,550.1461181640625]},{"page":413,"text":" Fixing the enemy force in place with fires and then conducting the bypass.","rect":[133.1999969482422,572.7542724609375,449.14788341522219,563.6461181640625]},{"page":413,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":413,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":413,"text":"B-3","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.6090087890625]},{"page":414,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":414,"text":"B-13. If the bypassing force cannot avoid the enemy force, then the bypassing force fixes the enemy force","rect":[90.0,83.51434326171875,521.9699983673096,74.40616607666016]},{"page":414,"text":"with part of its maneuver elements and bypasses it with the","rect":[90.0,94.97723388671875,328.6282014923096,85.86905670166016]},{"page":414,"text":"balance of the force.","rect":[90.0,104.47620391845703,185.02668285369874,97.3920669555664]},{"page":414,"text":"(See figure B-6.)","rect":[191.9434814453125,106.500244140625,268.36101317977906,97.3920669555664]},{"page":414,"text":"Generally, a","rect":[275.2798156738281,106.500244140625,328.68941975402836,97.3920669555664]},{"page":414,"text":"commander will not attempt to bypass an enemy force if","rect":[90.0,118.023193359375,328.65535522079468,108.9150161743164]},{"page":414,"text":"more than a third of the unit’s combat power is required to","rect":[90.0,129.46604919433595,328.67629051208498,120.3779067993164]},{"page":414,"text":"fix ","rect":[90.0,140.0,103.66527843475342,131.90090942382813]},{"page":414,"text":"the ","rect":[109.67727661132813,140.0,124.36159038543701,131.90090942382813]},{"page":414,"text":"enemy ","rect":[130.3735809326172,141.00909423828126,159.57886791229249,133.0]},{"page":414,"text":"force. ","rect":[165.53375244140626,140.0,191.0787763595581,131.9109344482422]},{"page":414,"text":"The ","rect":[197.09078979492188,140.0,215.13581371307374,131.90090942382813]},{"page":414,"text":"commander ","rect":[221.14781188964845,140.0,270.8119764328003,131.90090942382813]},{"page":414,"text":"assigns ","rect":[276.823974609375,141.00909423828126,308.24871349334719,131.90090942382813]},{"page":414,"text":"one","rect":[314.20361328125,140.0,328.67248249816898,133.0]},{"page":414,"text":"subordinate unit the mission of fixing the enemy force in this","rect":[90.0,152.5321044921875,328.77064394760137,143.42391967773438]},{"page":414,"text":"situation, reinforcing the fixing force as required by the","rect":[90.0,163.9949951171875,328.68356037902836,154.88681030273438]},{"page":414,"text":"mission variables. The fixing force coordinates with the unit","rect":[90.0,175.51800537109376,328.64939069366457,166.40982055664063]},{"page":414,"text":"assigned to relieve the fixing force as soon as possible and","rect":[90.0,187.04095458984376,328.6243495941162,177.93276977539063]},{"page":414,"text":"provides the new unit with all available information about","rect":[90.0,198.4838104248047,328.6291880569458,189.39566040039063]},{"page":414,"text":"the enemy and terrain. The relieving unit is normally another","rect":[90.0,210.02685546875,328.6774804649353,200.91867065429688]},{"page":414,"text":"unit assigned a follow and support task. Once relieved, the","rect":[90.0,221.48974609375,328.5951204376221,212.38156127929688]},{"page":414,"text":"force fixing the enemy force either rejoins its parent","rect":[90.0,233.01275634765626,328.71250104522707,223.89456176757813]},{"page":414,"text":"organization or becomes part of the following element and","rect":[90.0,244.5357666015625,328.63243675231936,235.42758178710938]},{"page":414,"text":"comes under its control.","rect":[90.0,253.9745635986328,186.10280895233155,246.89041137695313]},{"page":414,"text":"B-14. Occasionally a commander may direct the fixing","rect":[90.0,273.52362060546877,328.70445823669436,264.4154357910156]},{"page":414,"text":"force to break contact with the enemy force after the","rect":[90.0,285.0466003417969,328.63036824035648,275.93841552734377]},{"page":414,"text":"bypassing force completes the bypass. This occurs when the","rect":[90.0,296.5094909667969,328.6162691192627,287.4012145996094]},{"page":414,"text":"bypassing ","rect":[90.0,308.032470703125,132.52488231658936,298.9242858886719]},{"page":414,"text":"force ","rect":[137.7593231201172,307.0,160.78428173065186,298.934326171875]},{"page":414,"text":"has ","rect":[166.01873779296876,307.0,181.8443250656128,298.9242858886719]},{"page":414,"text":"no ","rect":[187.1348876953125,307.0,199.59978771209718,300.0]},{"page":414,"text":"requirement ","rect":[204.89035034179688,308.0124206542969,255.69480419158936,298.9242858886719]},{"page":414,"text":"to ","rect":[260.9853515625,307.0,271.16970348358157,299.9263000488281]},{"page":414,"text":"maintain ","rect":[276.46026611328127,307.0,313.94512462615969,298.9242858886719]},{"page":414,"text":"an","rect":[319.23565673828127,307.0,328.6254177093506,300.0]},{"page":414,"text":"Figure B-6. Task force conducting a","rect":[344.3399963378906,292.4941711425781,514.4380025787353,283.1054382324219]},{"page":414,"text":"fix and a bypass","rect":[390.4820861816406,304.0171813964844,468.35853480529786,294.6284484863281]},{"page":414,"text":"uninterrupted logistics flow, such as in a raid. In this case,","rect":[90.0,319.55548095703127,328.5712842941284,310.4472961425781]},{"page":414,"text":"the fixing force fixes the enemy force by employing defensive and limited offensive actions in","rect":[90.0,331.01837158203127,522.0403957366943,321.9101867675781]},{"page":414,"text":"synchronization with all available fire support until ordered to rejoin the bypassing force.","rect":[90.0,342.5413513183594,446.8641004562378,333.42315673828127]},{"page":414,"text":"CANALIZE","rect":[72.0,365.8680114746094,123.91904592514038,357.5760192871094]},{"page":414,"text":"B-15. Canalize is a tactical mission task in which a unit restricts","rect":[90.0,384.481689453125,373.5399005393982,376.8464660644531]},{"page":414,"text":"enemy movement to a narrow zone. Friendly forces do this by","rect":[90.0,397.2572326660156,373.6017665863037,388.1490173339844]},{"page":414,"text":"exploiting terrain coupled with the use of obstacles, fires, or friendly","rect":[90.01000213623047,408.78021240234377,373.57900047302248,399.6719970703125]},{"page":414,"text":"maneuver. Successful canalization results in moving the enemy","rect":[90.01000213623047,420.30322265625,373.6274013519287,411.19500732421877]},{"page":414,"text":"formation, individual Soldiers, or weapon systems into a predetermined","rect":[90.01000213623047,431.7660827636719,373.6703395843506,422.65789794921877]},{"page":414,"text":"position where they are vulnerable to piecemeal destruction. Figure B-7","rect":[90.01001739501953,443.2890625,373.59605979919436,434.1808776855469]},{"page":414,"text":"depicts the canalize tactical mission task.","rect":[90.0100326538086,454.7319030761719,254.44216442108155,445.6437683105469]},{"page":414,"text":"CLEAR","rect":[72.0,489.64801025390627,106.98491764068604,481.35601806640627]},{"page":414,"text":"Figure B-7. Canalize task","rect":[391.79998779296877,480.8941650390625,510.17326258850098,471.50543212890627]},{"page":414,"text":"B-16. Clear is a tactical mission task in which a unit eliminates all","rect":[90.0,507.560302734375,376.9125437698364,500.62646484375]},{"page":414,"text":"enemy forces within an assigned area. Friendly forces do this by","rect":[89.98998260498047,521.0372314453125,376.93370628356936,511.9290466308594]},{"page":414,"text":"destroying, capturing, or forcing the withdrawal of enemy forces, so they","rect":[89.97991180419922,532.5601806640625,376.9056911468506,523.4520263671875]},{"page":414,"text":"cannot execute organized resistance and interfere with thefriendly unit’s","rect":[89.9800033569336,544.0831909179688,376.8415057640076,534.9750366210938]},{"page":414,"text":"mission. In all cases, this task requires a thorough reconnaissance to","rect":[89.97994995117188,555.5460815429688,376.85521507263186,546.4379272460938]},{"page":414,"text":"discover the enemy force’s locations. After discovering the enemy","rect":[89.9800033569336,567.069091796875,376.8738613128662,557.9609375]},{"page":414,"text":"force’s location, the clearing force maneuvers against the enemy force.","rect":[89.9800033569336,578.592041015625,376.83669567108157,569.48388671875]},{"page":414,"text":"The bar connecting the arrows designates the desired limit of advance","rect":[89.9799575805664,590.054931640625,376.9388704376221,580.94677734375]},{"page":414,"text":"for the clearing force. The bar also establishes the width of the area to","rect":[89.9799575805664,601.5779418945313,376.87978172302248,592.4697875976563]},{"page":414,"text":"clear. Figure B-8 depicts the clear tactical mission task.","rect":[89.9799575805664,613.1009521484375,311.5452527999878,603.9927978515625]},{"page":414,"text":"Figure B-8. Clear task","rect":[402.17999267578127,614.9942016601563,505.07438563537598,605.60546875]},{"page":414,"text":"B-17. This task requires significant time and other resources. In the","rect":[89.97996520996094,630.5657958984375,376.8872652130127,621.4576416015625]},{"page":414,"text":"mission statement, a commander can modify the objective associated with this task to destroying, capturing,","rect":[89.9800033569336,642.0888061523438,522.0864210128784,632.9705810546875]},{"page":414,"text":"or forcing the withdrawal of only enemy forces larger than a stated size. In this case, the clearing force keeps","rect":[89.9799575805664,653.61181640625,522.0399310569763,644.503662109375]},{"page":414,"text":"smaller enemy forces under observation, while the rest of the friendly force bypasses them.","rect":[89.9799575805664,665.07470703125,454.58669567108157,655.966552734375]},{"page":414,"text":"B-18. Clear is also a mobility task that involves the total elimination of an obstacle that is usually performed","rect":[89.97994995117188,682.5896606445313,522.0153102874756,673.4815063476563]},{"page":414,"text":"by follow-on engineers and is not done under fire. Units conduct clearing operations to eliminate completely","rect":[89.97994995117188,694.1126708984375,521.8919582366943,685.0045166015625]},{"page":414,"text":"the enemy’s obstacle effort or the residual obstacles affecting the operational area. (See FM 3-90.4 for more","rect":[89.96992492675781,705.5755615234375,522.0213289337158,696.4674072265625]},{"page":414,"text":"information on mobility clearing operations.)","rect":[89.95994567871094,717.0985107421875,270.7808740196228,707.9903564453125]},{"page":414,"text":"B-4","rect":[72.1199951171875,754.0800170898438,86.60099249267579,747.6090087890625]},{"page":414,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":414,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":415,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.9969809570313,38.016021728515628]},{"page":415,"text":"CONTAIN","rect":[90.0,83.38796997070313,136.62825107574464,75.0959701538086]},{"page":415,"text":"B-19. Contain is a tactical mission task in which a unit stops, holds,","rect":[108.0,103.29429626464844,393.4566602706909,94.36647033691406]},{"page":415,"text":"or surrounds an enemy force. This causes the enemy to center their","rect":[107.98998260498047,114.7772216796875,393.47575927352906,105.6690444946289]},{"page":415,"text":"activity on a given front and prevent them from withdrawing any part of","rect":[107.97996520996094,126.30023193359375,393.52007079696656,117.19205474853516]},{"page":415,"text":"their forces for use elsewhere. Contain may identify a specific enemy","rect":[107.97996520996094,137.8232421875,393.4257411956787,128.71505737304688]},{"page":415,"text":"unit, or geographic terms or time may express the limits of the","rect":[107.97997283935547,149.28607177734376,393.4846773223877,140.17788696289063]},{"page":415,"text":"containment. Containment allows an enemy force to reposition itself","rect":[107.97997283935547,160.80908203125,393.42647338485718,151.70089721679688]},{"page":415,"text":"within the designated geographic area, while fixing an enemy does not.","rect":[107.97997283935547,172.33209228515626,393.38381481170657,163.22390747070313]},{"page":415,"text":"The contain graphic encompasses the entire area desired to contain","rect":[107.97997283935547,183.79498291015626,393.4207363128662,174.68679809570313]},{"page":415,"text":"enemy forces during the development of alternative courses of action.","rect":[107.97997283935547,195.3179931640625,393.35967540740969,186.20980834960938]},{"page":415,"text":"Figure B-9 depicts the contain tactical mission task.","rect":[107.97997283935547,206.78082275390626,315.2066602706909,197.67263793945313]},{"page":415,"text":"Figure B-9. Contain task","rect":[413.2799987792969,211.4342041015625,528.3416891021728,202.04547119140626]},{"page":415,"text":"CONTROL","rect":[90.0,230.14797973632813,139.82680654525758,221.85598754882813]},{"page":415,"text":"B-20. Control is a tactical mission task in which a unit maintains","rect":[108.0,248.0602569580078,397.84742617416387,241.1264190673828]},{"page":415,"text":"physical influence over an assigned area. By controlling an area, units","rect":[108.00000762939453,261.5972900390625,397.8014667015076,252.48910522460938]},{"page":415,"text":"prevent its use by an enemy force or create conditions necessary for","rect":[108.0,273.0601806640625,397.75835204696656,263.9519958496094]},{"page":415,"text":"friendly operations.","rect":[108.0,284.5831604003906,189.70608043670655,275.4749755859375]},{"page":415,"text":"That influence can result from friendly forces","rect":[195.54473876953126,284.5831604003906,397.80143618392949,275.4749755859375]},{"page":415,"text":"occupying the specified area or dominating that area by their weapon","rect":[108.0,296.1061706542969,397.7994899749756,286.99798583984377]},{"page":415,"text":"systems. Control of an area does not require the complete clearance of all","rect":[108.0,307.56903076171877,397.8867564163208,298.4608459472656]},{"page":415,"text":"enemy soldiers from that area. The tactical mission task of control differs","rect":[108.0,319.092041015625,397.8773944358826,309.9838562011719]},{"page":415,"text":"from that of secure because secure does not allow enemy fires to impact","rect":[108.0,330.61505126953127,397.8736948928833,321.5068664550781]},{"page":415,"text":"on the secured area. Enemy forces can engage targets within the","rect":[108.0,342.07794189453127,397.88171101379398,332.9697570800781]},{"page":415,"text":"controlled area, but they cannot move ground forces through that area. A","rect":[108.0,353.6009216308594,397.8345685043335,344.49273681640627]},{"page":415,"text":"Figure B-10. Control task","rect":[413.5799865722656,354.5341796875,532.4923238677978,345.14544677734377]},{"page":415,"text":"unit designated to control a route or area directs and regulates the use of","rect":[108.0,365.1239013671875,397.8827111778259,356.0157165527344]},{"page":415,"text":"the area, to include movement of friendly traffic through the designated area or route. Control may also mean","rect":[108.0,376.5867919921875,539.9970607757568,367.4786071777344]},{"page":415,"text":"a command relationship or a function commanders exercise through their command and control systems.","rect":[108.0,388.10980224609377,540.0122022628784,379.0016174316406]},{"page":415,"text":"Figure B-10 depicts the control tactical mission task. (See ADP 3-0 and ADP 6-0 for more information on","rect":[108.0,399.6328125,539.9439601898193,390.5246276855469]},{"page":415,"text":"command and control.)","rect":[107.9800033569336,411.0756530761719,201.01564574813845,401.9875183105469]},{"page":415,"text":"COUNTERRECONNAISSANCE","rect":[90.0,434.447998046875,228.48090505599977,426.156005859375]},{"page":415,"text":"B-21. Counterreconnaissance is a tactical mission task that encompasses all measures taken by a unit","rect":[108.0,454.3742980957031,540.0003564414978,445.42645263671877]},{"page":415,"text":"to counter enemy reconnaissance and surveillance efforts. Counterreconnaissance is not a distinct","rect":[107.98997497558594,465.8973083496094,540.0184092483521,456.78912353515627]},{"page":415,"text":"mission, but a component of all security operations and local security measures. It prevents hostile","rect":[107.98998260498047,477.36016845703127,539.9418001251221,468.2519836425781]},{"page":415,"text":"observation of a force or area. It involves both active and passive elements and includes combat action to","rect":[107.98998260498047,488.8631286621094,539.9629421234131,479.7749938964844]},{"page":415,"text":"destroy or repel enemy reconnaissance units and surveillance assets, such as unmanned aircraft systems.","rect":[107.98998260498047,500.3460693359375,524.7919874191284,491.2378845214844]},{"page":415,"text":"B-22. Destroying enemy ground and aerial reconnaissance assets while denying the enemy information","rect":[107.98998260498047,517.8710327148438,539.9532985687256,508.7627868652344]},{"page":415,"text":"through other collection systems allows friendly force commanders to operate against an enemy who is","rect":[107.98999786376953,529.39404296875,539.9029681663513,520.285888671875]},{"page":415,"text":"operating blindly. The enemy commander’s inability to see the battlefield eventually desynchronizes the","rect":[107.98998260498047,540.85693359375,540.0340852813721,531.748779296875]},{"page":415,"text":"enemy commander’s actions and renders that commander’s force vulnerable to aggressive action by friendly","rect":[107.98998260498047,552.3798828125,540.0300807952881,543.271728515625]},{"page":415,"text":"forces. (See Chapter 13 for additional information on counterreconnaissance.)","rect":[107.98998260498047,563.8828735351563,419.4888818321228,554.7947387695313]},{"page":415,"text":"DESTROY","rect":[90.0,587.2421875,137.70802402496339,579.1559448242188]},{"page":415,"text":"B-23. Destroy is a tactical mission task that physically renders an","rect":[108.0,607.13427734375,394.9606771392822,598.1864013671875]},{"page":415,"text":"enemy ","rect":[108.00000762939453,618.6572875976563,138.27944469451905,611.0]},{"page":415,"text":"force ","rect":[146.99685668945313,617.0,171.09997081756593,609.7194213867188]},{"page":415,"text":"combat-ineffective ","rect":[179.8173828125,617.0,261.21584606170657,609.7094116210938]},{"page":415,"text":"until ","rect":[269.9332275390625,616.6332397460938,292.3590040206909,609.7094116210938]},{"page":415,"text":"it ","rect":[301.076416015625,616.5531005859375,309.7016248703003,609.7094116210938]},{"page":415,"text":"is ","rect":[318.41900634765627,616.6332397460938,327.5843152999878,609.7094116210938]},{"page":415,"text":"reconstituted.","rect":[336.30169677734377,616.6332397460938,394.9467725753784,609.7094116210938]},{"page":415,"text":"Alternatively, to destroy a combat system is to damage it so badly that it","rect":[107.98998260498047,630.1802978515625,395.00058698272707,621.0721435546875]},{"page":415,"text":"cannot perform any function or be restored to a usable condition without","rect":[107.98998260498047,641.6431884765625,395.0100474319458,632.5350341796875]},{"page":415,"text":"being entirely rebuilt. The amount of damage needed to render a unit","rect":[107.98998260498047,653.1661376953125,394.91687726593019,644.0579833984375]},{"page":415,"text":"combat ineffective depends on the unit’s type, discipline, and morale.","rect":[107.98998260498047,664.689208984375,394.99602794647219,655.5810546875]},{"page":415,"text":"Destroying armored or dug in targets with area fire weapons requires","rect":[107.98998260498047,676.1520385742188,394.9999530296326,667.0438842773438]},{"page":415,"text":"considerable ammunition and time, so forces do not normally attempt it","rect":[107.98998260498047,687.675048828125,394.99460553741457,678.56689453125]},{"page":415,"text":"unless they have terminally guided munitions. Figure B-11 depicts the","rect":[107.98998260498047,699.1980590820313,394.9097261505127,690.0899047851563]},{"page":415,"text":"destroy tactical mission task.","rect":[107.99000549316406,710.6609497070313,223.53466320037843,701.5527954101563]},{"page":415,"text":"Figure B-11. Destroy task","rect":[411.29998779296877,713.2141723632813,531.8936910552978,703.9155883789063]},{"page":415,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":415,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":415,"text":"B-5","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.635986328125]},{"page":416,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":416,"text":"DISENGAGE","rect":[72.0,83.36216735839844,130.7588667869568,75.27597045898438]},{"page":416,"text":"B-24. Disengage is a tactical mission task in which a unit breaks contact with an enemy to conduct","rect":[90.0,103.3143310546875,521.9572656211853,94.36647033691406]},{"page":416,"text":"another mission or to avoid becoming decisively engaged. It involves moving to a location where enemy","rect":[89.9899673461914,114.7772216796875,522.0013332366943,105.6690444946289]},{"page":416,"text":"forces cannot engage the friendly force with either direct fires or observed indirect fires. Disengaging from","rect":[89.96991729736328,126.30023193359375,521.9137854537964,117.19205474853516]},{"page":416,"text":"enemy forces while displacing from one position to the next is a difficult procedure. Figure B-12 depicts the","rect":[89.96991729736328,137.8232421875,521.9240999298096,128.71505737304688]},{"page":416,"text":"disengage tactical mission task.","rect":[89.97993469238281,149.28607177734376,216.0846815109253,140.17788696289063]},{"page":416,"text":"B-25. A disengagement plan includes—","rect":[89.97993469238281,166.801025390625,250.4201774597168,157.69284057617188]},{"page":416,"text":" The maneuver concept of operations for tactical elements","rect":[115.19999694824219,180.27427673339845,367.4726092796326,171.18612670898438]},{"page":416,"text":"after disengagement, along with the movement routes for","rect":[133.1999969482422,191.81732177734376,367.5197656211853,182.70913696289063]},{"page":416,"text":"each subordinate unit.","rect":[133.1999969482422,201.2561798095703,221.26476573944093,194.17202758789063]},{"page":416,"text":" Fires to suppress enemy forces and cover the unit’s","rect":[115.19999694824219,216.7742919921875,367.55778384017949,207.66610717773438]},{"page":416,"text":"movement.","rect":[133.1999969482422,226.2732696533203,177.94030284881593,220.19113159179688]},{"page":416,"text":" Screening smoke to conceal the unit’s movement, as part","rect":[115.19999694824219,241.7943115234375,367.5718150100708,232.68612670898438]},{"page":416,"text":"of a military deception operation, or to cover passage","rect":[133.1899871826172,253.2572021484375,367.55785847473148,244.14901733398438]},{"page":416,"text":"points.","rect":[133.1899871826172,264.7601623535156,160.1748456954956,255.67202758789063]},{"page":416,"text":" Contact and passage points if moving through friendly","rect":[115.19999694824219,278.2742919921875,367.4702968597412,269.1661071777344]},{"page":416,"text":"lines.","rect":[133.1999969482422,287.77325439453127,154.60070323944093,280.6891174316406]},{"page":416,"text":"Figure B-12. Disengage task","rect":[381.8999938964844,274.49420166015627,515.8784017486572,265.1956481933594]},{"page":416,"text":" The time disengagement starts.","rect":[115.19999694824219,303.2943115234375,257.56223583221438,294.1861267089844]},{"page":416,"text":" The earliest time that functional and multifunctional support and sustainment elements move.","rect":[115.19999694824219,316.7742614746094,506.9838819503784,307.6861267089844]},{"page":416,"text":"B-26. The senior headquarters conducts operations to support the disengaging forces and relieve pressure on","rect":[89.9937515258789,334.2591857910156,522.0198879241943,325.1510009765625]},{"page":416,"text":"units in contact with enemy forces. For example, if a division is conducting a delay, the division commander","rect":[89.9937515258789,345.78216552734377,522.0312402305603,336.6739807128906]},{"page":416,"text":"uses attached aviation assets to help a BCT disengage from close operations. Simultaneously, the division","rect":[89.9937515258789,357.30517578125,521.9998683929443,348.1969909667969]},{"page":416,"text":"uses its long-range artillery, rocket, and electromagnetic warfare systems to destroy or disrupt enemy follow-","rect":[89.99378204345703,368.76806640625,521.9760644493103,359.6598815917969]},{"page":416,"text":"on echelons to prevent them from interfering with the disengagement. The intent is to create conditions that","rect":[90.00379943847656,380.2910461425781,521.9671397171021,371.182861328125]},{"page":416,"text":"allow the unit to disengage while avoiding decisive combat.","rect":[90.00379943847656,391.8140563964844,329.6321973800659,382.70587158203127]},{"page":416,"text":"B-27. To facilitate disengagement, units suppress the enemy force in contact by bombarding the enemy force","rect":[90.00379943847656,409.2789306640625,522.0131502227783,400.1707458496094]},{"page":416,"text":"with large volumes of both direct and indirect fires provided by forces other than the disengaging unit. In","rect":[90.00379943847656,420.8019104003906,521.9385280609131,411.6937255859375]},{"page":416,"text":"open terrain, a unit generally moves its short-range systems first. In close terrain, a unit generally moves its","rect":[90.00379943847656,432.3249206542969,521.9948871116638,423.21673583984377]},{"page":416,"text":"long-range systems first to support by fire positions. The time involved to move a system to its next position","rect":[89.99372863769531,443.78778076171877,522.0151271820068,434.6795959472656]},{"page":416,"text":"also affects when that system moves. Small-unit leaders usually direct this movement because of the limited","rect":[89.98370361328125,455.310791015625,521.9464626312256,446.2026062011719]},{"page":416,"text":"range of combat net radios and the fact that the tactical situation varies across a unit’s front. This process is","rect":[89.97370147705078,466.773681640625,521.9632709007263,457.6654968261719]},{"page":416,"text":"repeated as necessary. Once disengagement starts, units must complete it rapidly. A commander can employ","rect":[89.97370147705078,478.29669189453127,521.9252834320068,469.1885070800781]},{"page":416,"text":"supporting units or reserves to protect the disengaging unit’s flanks and assist in freeing any closely engaged","rect":[89.97370910644531,489.8196716308594,522.0591945648193,480.71148681640627]},{"page":416,"text":"elements. The unit then moves to its next position using the appropriate movement techniques.","rect":[89.96366882324219,501.28253173828127,468.5482130050659,492.1743469238281]},{"page":416,"text":"B-28. If enemy combat systems have not closed within direct fire range of the friendly disengaging unit, all","rect":[89.96366882324219,518.8075561523438,522.0438609085084,509.6993713378906]},{"page":416,"text":"its elements may be able to move simultaneously under the cover of massed fires and smoke. Speed of","rect":[89.96366882324219,530.33056640625,521.9980371055603,521.222412109375]},{"page":416,"text":"execution and continued coordination are essential to the success of this task.","rect":[89.96368408203125,539.7693481445313,398.8243360519409,532.6852416992188]},{"page":416,"text":"DISRUPT","rect":[72.0,565.1022338867188,115.454354763031,557.0159912109375]},{"page":416,"text":"B-29. Disrupt is a tactical mission task in which a unit upsets an","rect":[90.0,585.0343017578125,376.9597921295166,576.1064453125]},{"page":416,"text":"enemy’s formation or tempo and causes the enemy force to attack","rect":[89.99000549316406,596.5772705078125,376.9397725982666,587.62939453125]},{"page":416,"text":"prematurely or in a piecemeal fashion. Units disrupt an enemy force","rect":[89.99002075195313,608.0401611328125,376.9367952423096,598.9320068359375]},{"page":416,"text":"by integrating direct and indirect fires, terrain, and obstacles. This","rect":[89.98001098632813,619.5631713867188,376.90247988510137,610.4550170898438]},{"page":416,"text":"increases an enemy force’s vulnerability to friendly fires. It may","rect":[89.9800033569336,631.086181640625,376.9248561859131,621.97802734375]},{"page":416,"text":"temporarily knock a unit out of a battle. Disruption is not an end; it is","rect":[89.9799575805664,642.549072265625,376.7962481956482,633.44091796875]},{"page":416,"text":"the means to an end. The center arrow points toward the targeted enemy","rect":[89.9799575805664,654.0720825195313,376.88368797302248,644.9638671875]},{"page":416,"text":"unit. Figure B-13 depicts the disrupt tactical mission task.","rect":[89.98999786376953,665.5950927734375,321.09832286834719,656.4869384765625]},{"page":416,"text":"B-30. The maneuver force attempting to disrupt an enemy force must","rect":[89.98997497558594,683.0599365234375,376.97095441436769,673.9517822265625]},{"page":416,"text":"attack the defending enemy force with enough combat power to achieve","rect":[89.98997497558594,694.5828857421875,376.9248323516846,685.4747314453125]},{"page":416,"text":"Figure B-13. Disrupt task","rect":[394.44000244140627,692.8742065429688,512.8052511138916,683.5756225585938]},{"page":416,"text":"the desired results with one mass attack or sustain the attack until it","rect":[89.98997497558594,704.0818481445313,376.8592905960083,696.9977416992188]},{"page":416,"text":"achieves the desired results. It may involve attacking the enemy force while it is still in its assembly areas or","rect":[89.98997497558594,717.5687866210938,522.0189111289978,708.4606323242188]},{"page":416,"text":"B-6","rect":[72.1199951171875,754.1790161132813,86.60099249267579,747.6090087890625]},{"page":416,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":416,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":417,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.9969809570313,38.016021728515628]},{"page":417,"text":"in an approach march before it can deploy into a movement formation. A commander determines the degree","rect":[108.0,83.51434326171875,540.1215486602783,74.40616607666016]},{"page":417,"text":"of acceptable risk based on anticipated friendly losses, the location of the attack, the number of attacks, and","rect":[108.0,94.97723388671875,540.0117092132568,85.86905670166016]},{"page":417,"text":"other risk management factors.","rect":[108.0,106.500244140625,231.88430309295655,97.3920669555664]},{"page":417,"text":"B-31. Disrupt is an obstacle effect that focuses fire planning","rect":[108.0,124.02520751953125,360.0972194671631,115.07734680175781]},{"page":417,"text":"and obstacle effort to cause the enemy to break up its","rect":[108.0100326538086,135.48809814453126,360.0571124534607,126.54023742675781]},{"page":417,"text":"formation and tempo, interrupt its timetable, commit","rect":[108.0100326538086,146.99107360839845,360.10933471298218,138.06324768066407]},{"page":417,"text":"breaching assets prematurely, and attack in a piecemeal","rect":[108.0100326538086,158.5340576171875,360.0771861038208,149.58619689941407]},{"page":417,"text":"effort. It also helps to deceive an enemy force concerning the","rect":[108.0100326538086,169.9969482421875,360.1012239532471,160.88876342773438]},{"page":417,"text":"location of friendly defensive positions, to separate combat","rect":[108.0100326538086,181.51995849609376,360.0973277053833,172.41177368164063]},{"page":417,"text":"echelons, or to separate combat forces from their logistics","rect":[108.0100326538086,193.04296875,360.0000750999451,183.93478393554688]},{"page":417,"text":"support. The short arrows in the obstacle effect graphic indicate","rect":[108.0100326538086,204.505859375,360.0798921661377,195.39767456054688]},{"page":417,"text":"where obstacles impact the enemy’s ability to maneuver. The","rect":[108.01000213623047,216.02886962890626,360.06222248840336,206.92068481445313]},{"page":417,"text":"longer arrows indicate where units allow enemy forces to","rect":[108.01001739501953,227.49169921875,360.0420436859131,218.38351440429688]},{"page":417,"text":"bypass the obstacle effect, so the defending force can engage","rect":[108.01001739501953,239.01470947265626,360.09716511535648,229.90652465820313]},{"page":417,"text":"the enemy force with fires. The arrows indicate the direction of","rect":[108.01001739501953,250.5377197265625,360.1063134727478,241.42953491210938]},{"page":417,"text":"Figure B-14. Disrupt obstacle","rect":[384.7200012207031,231.774169921875,523.6162252349853,222.47561645507813]},{"page":417,"text":"effect","rect":[440.8219909667969,241.31321716308595,467.56136108016968,233.908447265625]},{"page":417,"text":"an enemy attack. A defending unit normally uses the disrupt obstacle effect forward of engagement areas.","rect":[108.01001739501953,262.0006103515625,540.0023145675659,252.89242553710938]},{"page":417,"text":"Obstacles alone cannot disrupt an enemy unit. Figure B-14 depicts the disrupt obstacle effect. (See Chapter","rect":[108.02002716064453,273.52362060546877,540.0483911094666,264.4154357910156]},{"page":417,"text":"17 for more information on the disrupt obstacle effect.)","rect":[108.01001739501953,285.02655029296877,328.7837121543884,275.93841552734377]},{"page":417,"text":"EXFILTRATE","rect":[90.0,308.2200012207031,153.4342131614685,300.2760009765625]},{"page":417,"text":"B-32. Exfiltrate is a tactical mission task in which a unit removes","rect":[108.0,328.2543029785156,393.2303302268982,319.30645751953127]},{"page":417,"text":"Soldiers or units from areas under enemy control by stealth,","rect":[108.0,339.7773132324219,393.22634410858157,330.8294677734375]},{"page":417,"text":"deception, surprise, or clandestine means. Friendly forces use stealth,","rect":[108.01001739501953,351.30029296875,393.3094434738159,342.1921081542969]},{"page":417,"text":"deception, surprise, or other clandestine means to exfiltrate the area.","rect":[108.02001190185547,362.7431335449219,393.27151012420657,353.6549987792969]},{"page":417,"text":"Friendly forces exfiltrate when they have been encircled by enemy","rect":[108.02001190185547,374.28619384765627,393.27147483825686,365.1780090332031]},{"page":417,"text":"forces and cannot conduct a breakout or be relieved by other friendly","rect":[108.02001190185547,385.8091735839844,393.33250999450686,376.70098876953127]},{"page":417,"text":"forces. Forces returning from a raid, an infiltration, or a patrol behind","rect":[108.02001190185547,397.2720642089844,393.20409202575686,388.16387939453127]},{"page":417,"text":"enemy lines can also conduct an exfiltration. A commander exfiltrates","rect":[108.0199966430664,408.7950744628906,393.2200763206482,399.6868896484375]},{"page":417,"text":"an encircled force to preserve a portion of the force; it is preferable to","rect":[108.0200424194336,420.2980041503906,393.1893825531006,411.2098693847656]},{"page":417,"text":"the capture of the entire force. A force exfiltrates only after destroying","rect":[108.0200424194336,431.78094482421877,393.31627464294436,422.6727600097656]},{"page":417,"text":"or incapacitating all equipment, except medical, that it must leave","rect":[108.0200424194336,443.303955078125,393.3864107208252,434.1957702636719]},{"page":417,"text":"Figure B-15. Exfiltrate task","rect":[407.6400146484375,436.3141784667969,533.7537984771728,426.9254455566406]},{"page":417,"text":"behind. Only as a last resort, when the alternative is the capture of the entire force, does a force conducting","rect":[108.0200424194336,454.7668151855469,539.9797267913818,445.65863037109377]},{"page":417,"text":"an exfiltration leave its casualties in place with supplies, chaplain support, and medical personnel.","rect":[108.0200424194336,466.269775390625,540.0133619308472,457.181640625]},{"page":417,"text":"Figure B-15 depicts the exfiltrate tactical mission task.","rect":[108.0200424194336,477.81280517578127,326.8969373703003,468.7046203613281]},{"page":417,"text":"B-33. Exfiltration is most feasible through rough or difficult terrain in areas lightly covered by enemy","rect":[108.04008483886719,495.2776794433594,540.0123195648193,486.16949462890627]},{"page":417,"text":"observation and fire. These conditions often allow undetected movement of small elements when movement","rect":[108.04010009765625,504.77667236328127,540.1244273147584,497.6925048828125]},{"page":417,"text":"of the entire force would present more risk. Exfiltration requires resourcefulness, a high degree of discipline,","rect":[108.04007720947266,518.3236694335938,540.0830640792847,509.2154846191406]},{"page":417,"text":"expert land navigation skills, and motivation. It is unlikely that the entire force will be able to exfiltrate since","rect":[108.04007720947266,529.7865600585938,539.9832429962158,520.6784057617188]},{"page":417,"text":"part of it may have to create a diversion. Good, small-unit leadership is essential in this type of operation.","rect":[108.03005981445313,541.3095703125,529.9361524581909,532.201416015625]},{"page":417,"text":"B-34. The exfiltrating force first establishes its rally points and exfiltration lanes. It coordinates its linkup","rect":[108.03005981445313,558.8345336914063,540.0472927093506,549.7263793945313]},{"page":417,"text":"plans with other friendly units. A commander designates exfiltration lanes as RFAs or no-fire areas. The","rect":[108.03005981445313,570.2974243164063,540.0934724884033,561.1892700195313]},{"page":417,"text":"exfiltrating force uses preparation fires to cover its movement and to expend stockpiled ammunition. Based","rect":[108.03008270263672,581.8204345703125,540.0535793304443,572.7122802734375]},{"page":417,"text":"on reconnaissance and available intelligence, the exfiltrating force subdivides into small groups and","rect":[108.03009033203125,593.3433837890625,540.0631008148193,584.2352294921875]},{"page":417,"text":"exfiltrates during periods of limited visibility, passing through or around enemy defensive positions. If","rect":[108.03009033203125,604.8062744140625,540.0491845664978,595.6981201171875]},{"page":417,"text":"detected, it tries to bypass enemy forces. Exfiltration may be more difficult with combat and tactical vehicles","rect":[108.03009033203125,616.3292846679688,540.0362689476013,607.2211303710938]},{"page":417,"text":"because the noise they make and the limitations they impose on exfiltration routes make detection more","rect":[108.03009033203125,627.852294921875,540.0631380157471,618.744140625]},{"page":417,"text":"likely.","rect":[108.03009033203125,639.315185546875,133.33460521697999,630.20703125]},{"page":417,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":417,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":417,"text":"B-7","rect":[507.47698974609377,754.0800170898438,521.9579794921875,747.635986328125]},{"page":418,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":418,"text":"FIX","rect":[72.0,83.219970703125,89.88072299957276,75.27597045898438]},{"page":418,"text":"B-35. Fix is a tactical mission task in which a unit prevents the","rect":[90.0,103.29429626464844,376.9197359161377,94.36647033691406]},{"page":418,"text":"enemy from moving from a specific location for a specific period.","rect":[90.0,114.7772216796875,376.94167613983157,105.82936096191406]},{"page":418,"text":"This may occur by engaging an enemy force to prevent its withdrawal","rect":[90.0,126.30023193359375,376.9719614944458,117.19205474853516]},{"page":418,"text":"for use elsewhere, or by using deception, such as transmitting false","rect":[90.0,137.8232421875,376.9297456817627,128.71505737304688]},{"page":418,"text":"orders. A commander uses fix in offensive and defensive actions; it is","rect":[90.0,148.7950897216797,376.8335711936951,140.17788696289063]},{"page":418,"text":"always a supporting effort. The point of the arrow faces toward the","rect":[90.0,160.80908203125,376.90682698059086,151.70089721679688]},{"page":418,"text":"desired enemy unit to fix. The broken part of the arrow indicates the","rect":[90.0,172.33209228515626,376.9608430938721,163.22390747070313]},{"page":418,"text":"desired location for that event to occur. Figure B-16 depicts the fix","rect":[90.0,183.79498291015626,376.9497890472412,174.68679809570313]},{"page":418,"text":"tactical mission task.","rect":[90.0,193.29396057128907,173.62493419647218,186.20980834960938]},{"page":418,"text":"B-36. Fixing an enemy force does not mean destroying it. The friendly","rect":[90.0,212.7828369140625,376.92284202575686,203.67465209960938]},{"page":418,"text":"Figure B-16. Fix task","rect":[404.70001220703127,210.5341796875,502.55433558654786,201.23562622070313]},{"page":418,"text":"force has to prevent the enemy force from moving in any direction. This","rect":[90.0,224.30584716796876,376.98002505111699,215.19766235351563]},{"page":418,"text":"task usually has a time constraint, such as “fix the enemy reserve force until OBJECTIVE FALON is","rect":[90.0,235.828857421875,521.9962909202576,226.72067260742188]},{"page":418,"text":"secured.” The tactical mission task of fix differs from that of block in that a fixed enemy force cannot move","rect":[90.0,247.29168701171876,522.0000886993408,238.18350219726563]},{"page":418,"text":"from a given location, but a blocked enemy force can move in any direction other than the one obstructed.","rect":[90.0,258.814697265625,514.302638053894,249.70651245117188]},{"page":418,"text":"B-37. Fix is an obstacle effect that focuses fire planning and","rect":[90.0,276.33966064453127,353.6652364654541,267.3918151855469]},{"page":418,"text":"obstacle effort to slow an attacker’s movement within a","rect":[90.0,285.77850341796877,353.60521507263186,278.8547058105469]},{"page":418,"text":"specified area, normally an engagement area. The primary use","rect":[90.0,299.3255615234375,353.6341829376221,290.2173767089844]},{"page":418,"text":"of this effect is to give a friendly force time to acquire, target, and","rect":[89.9899673461914,310.8485412597656,353.52806663513186,301.7403564453125]},{"page":418,"text":"destroy an attacking enemy force with direct and indirect fires","rect":[89.9899673461914,322.3114013671875,353.6022479515076,313.2032165527344]},{"page":418,"text":"throughout the depth of an engagement area or avenue of","rect":[89.9899673461914,333.83441162109377,353.60918212509156,324.7262268066406]},{"page":418,"text":"approach. The irregular part of the arrow in the obstacle intent","rect":[89.9899673461914,345.357421875,353.65125226593019,336.2492370605469]},{"page":418,"text":"graphic indicates the location where complex obstacles slow the","rect":[89.98998260498047,356.8202819824219,353.61703205871586,347.71209716796877]},{"page":418,"text":"enemy force’s rate of advance. The arrow indicates the direction","rect":[89.98998260498047,368.34326171875,353.62230491638186,359.2350769042969]},{"page":418,"text":"of enemy force’s advance. Figure B-17 depicts the fix obstacle","rect":[89.98998260498047,379.86627197265627,353.56710530090336,370.7580871582031]},{"page":418,"text":"effect.","rect":[89.97994995117188,389.3050842285156,115.28245830535889,382.2309875488281]},{"page":418,"text":"Figure B-17. Fix obstacle effect","rect":[367.97998046875,382.9141845703125,515.8631494102478,373.52545166015627]},{"page":418,"text":"FOLLOW AND ASSUME","rect":[72.0,414.6222229003906,182.9639983177185,406.3680114746094]},{"page":418,"text":"B-38. Follow and assume is a tactical mission task in which","rect":[90.0,432.5502624511719,343.82765101623536,425.62646484375]},{"page":418,"text":"a committed force follows and supports a lead force","rect":[90.00000762939453,446.0772705078125,343.82198811340336,437.14947509765627]},{"page":418,"text":"conducting an offensive operation and continues the mission","rect":[90.0,457.5601806640625,343.84767054748536,448.6123352050781]},{"page":418,"text":"if the lead force cannot continue. The lead force may be unable","rect":[90.0000228881836,469.08319091796877,343.83166218566898,459.9750061035156]},{"page":418,"text":"to continue for several reasons such as becoming fixed or","rect":[90.02005767822266,480.54608154296877,343.79265380477906,471.4378967285156]},{"page":418,"text":"attrited by enemy forces. The follow and assume force is not a","rect":[90.02005767822266,492.0690612792969,343.8587923126221,482.96087646484377]},{"page":418,"text":"reserve, but it is committed to accomplish specific tasks.","rect":[90.02005767822266,503.572021484375,343.9406385421753,494.48388671875]},{"page":418,"text":"Planners place the box part of the associated task military","rect":[90.02005767822266,515.054931640625,343.84670066833498,505.9467468261719]},{"page":418,"text":"symbol around the icons of units assigned this task. Figure B-18","rect":[90.02006530761719,526.5779418945313,343.7865810394287,517.4697875976563]},{"page":418,"text":"depicts the follow and assume tactical mission task.","rect":[90.02006530761719,538.0809326171875,296.6444044113159,528.9927978515625]},{"page":418,"text":"B-39. Tasks for a follow and assume force include—","rect":[90.02006530761719,553.541748046875,302.1234245300293,546.4576416015625]},{"page":418,"text":"Figure B-18. Follow and assume","rect":[360.6000061035156,542.51416015625,513.4120016021728,533.215576171875]},{"page":418,"text":"task","rect":[426.96246337890627,552.05322265625,447.05555628967286,544.7686767578125]},{"page":418,"text":" Preparing to execute all missions of the followed","rect":[115.19999694824219,569.0343017578125,343.76662254333498,559.9261474609375]},{"page":418,"text":"unit.","rect":[133.1999969482422,578.5332641601563,151.30512523651124,571.4490966796875]},{"page":418,"text":"","rect":[115.19999694824219,591.325439453125,121.16105696249008,586.6332397460938]},{"page":418,"text":"","rect":[115.19999694824219,604.825439453125,121.16105696249008,600.1332397460938]},{"page":418,"text":"","rect":[115.19999694824219,618.325439453125,121.16105696249008,613.6332397460938]},{"page":418,"text":"","rect":[115.19999694824219,643.3453979492188,121.16105696249008,638.6531982421875]},{"page":418,"text":"Maintaining contact with the trail elements of the leading force.","rect":[133.1999969482422,594.0543212890625,388.1137647628784,584.9461669921875]},{"page":418,"text":"Preparing to conduct a forward passage of lines through the force it is following.","rect":[133.1999969482422,607.5543212890625,455.92534923553469,598.4461669921875]},{"page":418,"text":"Monitoring all combat information and intelligence being provided to and from the force it is","rect":[133.1999969482422,621.0543212890625,521.9598529319763,611.9461669921875]},{"page":418,"text":"following.","rect":[133.1999969482422,632.5772705078125,174.64472484588624,623.4691162109375]},{"page":418,"text":"Avoiding engaging enemy forces bypassed by the force it is following.","rect":[133.1999969482422,646.0742797851563,416.74712657928469,636.9661254882813]},{"page":418,"text":"B-40. A commander assigns a follow and assume mission to ensure that the attacking force maintains the","rect":[90.00376892089844,663.5391845703125,521.9687776641846,654.4310302734375]},{"page":418,"text":"momentum of its offensive action. The follow and assume force ensures it can immediately execute a forward","rect":[90.00376892089844,675.0621337890625,522.0095729827881,665.9539794921875]},{"page":418,"text":"passage of lines and assume the lead force’s mission.","rect":[90.00376892089844,686.5851440429688,302.4307813644409,677.4769897460938]},{"page":418,"text":"B-41. A commander assigning a unit mission the task of follow and assume has two options in establishing","rect":[89.99374389648438,704.050048828125,521.9202175140381,694.94189453125]},{"page":418,"text":"the relationship between the lead and trail units. Commanders normally retain command of both units and","rect":[89.9937973022461,715.572998046875,521.9839992523193,706.46484375]},{"page":418,"text":"B-8","rect":[72.1199951171875,754.18798828125,86.60099249267579,747.6090087890625]},{"page":418,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":418,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":419,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.9969809570313,38.016021728515628]},{"page":419,"text":"require that all requests for support from the supported unit to the supporting unit pass through their","rect":[108.0,83.51434326171875,540.0190942344666,74.40616607666016]},{"page":419,"text":"headquarters. Alternatively, in situations where a commander will not be able to maintain control over both","rect":[108.0,94.97723388671875,540.0283107757568,85.86905670166016]},{"page":419,"text":"units, the supporting unit is placed in a standard command relationship with the supported unit, such as","rect":[108.0,106.500244140625,540.0343768577576,97.3920669555664]},{"page":419,"text":"attached or operational control. An example of this occurs when both units are trying to encircle a","rect":[108.0,118.023193359375,540.0060091094971,108.9150161743164]},{"page":419,"text":"retrograding enemy force and the commander remains with the direct pressure force.","rect":[108.0,129.486083984375,446.73235607147219,120.3779067993164]},{"page":419,"text":"FOLLOW AND SUPPORT","rect":[90.0,152.8800048828125,205.2739806175232,144.57601928710938]},{"page":419,"text":"B-42. Follow and support is a tactical mission task in which a","rect":[108.0,172.77427673339845,375.31358909606936,163.84645080566407]},{"page":419,"text":"committed force follows and supports a lead force conducting","rect":[107.99999237060547,184.31732177734376,375.3486843109131,175.3694610595703]},{"page":419,"text":"an offensive operation. A follow and support force is not a reserve","rect":[107.99999237060547,195.7601776123047,375.43587971496586,186.67202758789063]},{"page":419,"text":"but is a force committed to specific tasks. It contains an arrow","rect":[107.9899673461914,207.28318786621095,375.44080019378665,198.19503784179688]},{"page":419,"text":"graphic around the symbol of the unit being assigned this task.","rect":[107.98994445800781,218.76605224609376,375.3216505050659,209.65786743164063]},{"page":419,"text":"Figure B-19 depicts the follow and support tactical mission task.","rect":[107.98994445800781,230.2890625,366.27639293670657,221.18087768554688]},{"page":419,"text":"B-43. Missions of a follow and support force include—","rect":[107.99996948242188,247.79405212402345,330.1233329772949,238.70590209960938]},{"page":419,"text":" Destroying bypassed enemy units when the lead unit","rect":[133.1999969482422,261.2943115234375,375.37949323272707,252.18612670898438]},{"page":419,"text":"does not clear the assigned area as it advances.","rect":[151.1999969482422,272.7572021484375,338.0229139328003,263.6490173339844]},{"page":419,"text":" Blocking movement of enemy reinforcements.","rect":[133.1999969482422,286.2543029785156,337.5440626144409,277.1461181640625]},{"page":419,"text":" Relieving in place any direct pressure or encircling force","rect":[133.1999969482422,299.7543029785156,375.36535359191898,290.6461181640625]},{"page":419,"text":"halted to contain enemy forces.","rect":[151.1999969482422,311.2773132324219,276.4069471359253,302.16912841796877]},{"page":419,"text":" Securing lines of communications.","rect":[133.1999969482422,324.7743225097656,290.0832471847534,315.6661376953125]},{"page":419,"text":" Clearing obstacles.","rect":[133.1999969482422,338.2743225097656,227.26784801483155,329.1661376953125]},{"page":419,"text":" Guarding prisoners, key areas, and installations.","rect":[133.1999969482422,351.7743225097656,343.42876720428469,342.6661376953125]},{"page":419,"text":" Recovering friendly battle losses.","rect":[133.1999969482422,365.2743225097656,285.0432081222534,356.1661376953125]},{"page":419,"text":" Securing key terrain.","rect":[133.1999969482422,378.7743225097656,234.82192516326905,369.6661376953125]},{"page":419,"text":" Controlling dislocated civilians.","rect":[133.1999969482422,392.2743225097656,279.2877149581909,383.1661376953125]},{"page":419,"text":"Figure B-19. Follow and","rect":[405.41998291015627,280.73419189453127,518.2261631507873,271.4356384277344]},{"page":419,"text":"support task","rect":[431.82269287109377,292.126953125,491.88258265686036,282.98870849609377]},{"page":419,"text":"B-44. A commander assigns a unit the task of follow and support to keep the supported force from having to","rect":[107.9937515258789,409.7892761230469,540.0900783538818,400.68109130859377]},{"page":419,"text":"commit its combat power to tasks other than the main effort, which would slow the momentum and tempo of","rect":[107.9937515258789,421.23211669921877,539.9749658164978,412.14398193359377]},{"page":419,"text":"the offense. The follow and support force accomplishes its tasks to prevent enemy forces, obstacles, and other","rect":[107.9937515258789,432.775146484375,540.0672509727478,423.6669616699219]},{"page":419,"text":"factors from interfering with offensive actions, especially along the lines of communications.","rect":[107.9937515258789,444.29815673828127,480.3377637863159,435.1899719238281]},{"page":419,"text":"B-45. A commander assigning the follow and support task has two options in establishing the relationship","rect":[107.9937515258789,461.7630310058594,540.0221462249756,452.65484619140627]},{"page":419,"text":"between the supported and the supporting units. A commander can place the follow and support unit in a","rect":[107.9937515258789,473.2860107421875,539.9707918243408,464.1778259277344]},{"page":419,"text":"standard command relationship with the supported unit, such as attached or operational control. Alternatively,","rect":[107.9937515258789,484.7489013671875,540.0708570480347,475.6407165527344]},{"page":419,"text":"a commander can retain command of the follow and support force and require that all tasking requests from","rect":[107.9937515258789,496.27191162109377,540.0442175827027,487.1637268066406]},{"page":419,"text":"the supported unit go through that commander’s headquarters.","rect":[107.9937515258789,507.7948913574219,356.79641246795657,498.68670654296877]},{"page":419,"text":"INTERDICT","rect":[90.0,531.1326904296875,144.78937673568727,523.0559692382813]},{"page":419,"text":"B-46. Interdict is a tactical mission task where a unit prevents,","rect":[108.0,551.0142822265625,394.1782178878784,542.08642578125]},{"page":419,"text":"disrupts, or delays the enemy’s use of an area or route in any","rect":[108.00000762939453,562.5572509765625,394.16417503356936,553.609375]},{"page":419,"text":"domain. It is an offensive action that desynchronizes the enemy.","rect":[107.98994445800781,574.080322265625,394.29140758514407,565.1324462890625]},{"page":419,"text":"Interdiction is a supporting effort conducted to complement and","rect":[107.98994445800781,585.5431518554688,394.20570945739748,576.4349975585938]},{"page":419,"text":"reinforce other ongoing offensive or defensive operations. The two","rect":[107.98999786376953,597.066162109375,394.14320945739748,587.9580078125]},{"page":419,"text":"arrows should cross on the unit or location targeted for interdiction. An","rect":[107.98999786376953,608.5891723632813,394.1531276702881,599.4810180664063]},{"page":419,"text":"interdiction tasking must specify how long to interdict, defined as a","rect":[107.97996520996094,620.0520629882813,394.2971468048096,610.9439086914063]},{"page":419,"text":"length of time or some event that must occur before the interdiction is","rect":[107.97996520996094,631.5750732421875,394.14027285385137,622.4669189453125]},{"page":419,"text":"lifted, and the exact effect desired from the interdiction. Figure B-20","rect":[107.97996520996094,643.0980224609375,394.21132469177248,633.9898681640625]},{"page":419,"text":"depicts the interdict tactical mission task.","rect":[107.97997283935547,654.5408935546875,272.9643201828003,645.4527587890625]},{"page":419,"text":"Figure B-20. Interdict task","rect":[409.79998779296877,659.0341796875,532.6101217193603,649.735595703125]},{"page":419,"text":"B-47. A friendly force’s capability to interdict may have a devastating","rect":[107.97997283935547,672.0758666992188,394.1893825531006,662.9677124023438]},{"page":419,"text":"impact on an enemy force’s plans and ability to respond to friendly actions. For example, interdiction efforts","rect":[107.97997283935547,683.598876953125,539.9242084007263,674.49072265625]},{"page":419,"text":"that result in an enemy force’s maneuver being delayed or disrupted enhance the friendly force’s ability to","rect":[107.97997283935547,695.061767578125,539.9693508148193,685.95361328125]},{"page":419,"text":"achieve tactical advantages. Delaying or disrupting enemy resupply efforts limits the enemy force’s ability","rect":[107.97997283935547,706.5847778320313,539.9109401702881,697.4766235351563]},{"page":419,"text":"to sustain intense, high tempo offensive or defensive actions and restricts enemy mobility. Space and","rect":[107.97997283935547,718.1077880859375,540.0123805999756,708.9996337890625]},{"page":419,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":419,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":419,"text":"B-9","rect":[507.47698974609377,754.18798828125,521.9579794921875,747.6090087890625]},{"page":420,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":420,"text":"cyberspace capabilities prevent, disrupt, or delay enemy communications capabilities, which degrades the","rect":[90.0,83.51434326171875,521.9709749298096,74.40616607666016]},{"page":420,"text":"enemy’s ability to command and control their forces.","rect":[90.0,94.97723388671875,302.20366954803469,85.86905670166016]},{"page":420,"text":"B-48. The depth at which the attacking force conducts the interdiction generally determines the friendly","rect":[90.0,112.4921875,522.0121364593506,103.3840103149414]},{"page":420,"text":"force’s freedom of action. Increasing the depth of operations reduces the danger of fratricide to air and surface","rect":[90.0,124.01519775390625,522.0899934844971,114.90702056884766]},{"page":420,"text":"forces, reduces the coordination required, and allows increasingly flexible operations. Aerial forces, such as","rect":[90.0,135.47808837890626,522.0518939476013,126.36991119384766]},{"page":420,"text":"manned and unmanned aircraft, can attack enemy forces to interdict their movement throughout the assigned","rect":[90.0,147.0010986328125,522.0325222015381,137.89291381835938]},{"page":420,"text":"area.","rect":[89.99999237060547,156.50001525878907,109.18227672576905,151.7505340576172]},{"page":420,"text":"B-49. The depth at which interdiction takes place also determines the speed with which units observe its","rect":[89.99999237060547,175.9689178466797,522.0323626976013,166.88076782226563]},{"page":420,"text":"effects. Normally, ground maneuver units first focus on targets close to the FLOT. Interdiction efforts there","rect":[89.99999237060547,187.51190185546876,522.0644197540283,178.40371704101563]},{"page":420,"text":"immediately impact enemy forces near the interdiction target, but they do not affect the enemy force’s ability","rect":[89.9999771118164,199.034912109375,521.9449367523193,189.92672729492188]},{"page":420,"text":"to mass effects. Attacks at greater distances from the FLOT have a delayed impact on close combat but","rect":[89.9999771118164,210.497802734375,521.9912486038209,201.38961791992188]},{"page":420,"text":"eventually degrade the enemy force’s ability to mass effects.","rect":[89.98994445800781,222.02081298828126,332.31865978240969,212.91262817382813]},{"page":420,"text":"B-50. Interdicting the movement of enemy units can be extremely effective in assisting the encirclement of","rect":[89.98994445800781,239.48565673828126,521.9612329063416,230.37747192382813]},{"page":420,"text":"those forces and their eventual destruction. Fixed enemy ground forces—or those trapped by the loss of their","rect":[89.98994445800781,251.0086669921875,522.0323388633728,241.90048217773438]},{"page":420,"text":"mobility—provide lucrative targets. A commander plans to interdict withdrawing enemy forces to enhance","rect":[89.99992370605469,262.53167724609377,522.0241975860596,253.42349243164063]},{"page":420,"text":"the pursuit. While interdiction can contribute to success by hampering reinforcement and resupply, it can also","rect":[89.99992370605469,273.9945068359375,522.0470485687256,264.8863220214844]},{"page":420,"text":"contribute by trapping enemy forces or canalizing their maneuvers, leading to their destruction in detail.","rect":[89.99992370605469,285.51751708984377,506.03216075897219,276.4093322753906]},{"page":420,"text":"ISOLATE","rect":[72.0,308.84222412109377,115.17069387435913,300.7560119628906]},{"page":420,"text":"B-51. Isolate is a tactical mission task in which a unit seals off an","rect":[90.0,326.770263671875,376.94349574279786,319.8464660644531]},{"page":420,"text":"enemy, physically and psychologically, from sources of support and","rect":[90.0,340.2572021484375,376.9108724517822,331.3093566894531]},{"page":420,"text":"denies it freedom of movement. An isolated force is prevented from","rect":[90.0,351.7601318359375,376.89858769989015,342.6719970703125]},{"page":420,"text":"having contact with other enemy forces. A unit does not allow an","rect":[90.0,363.3031921386719,376.9538173675537,354.19500732421877]},{"page":420,"text":"isolated enemy force sanctuary within its present position. Instead, a unit","rect":[90.0,374.7660827636719,376.9174265823364,365.65789794921877]},{"page":420,"text":"continues to conduct offensive actions against an enemy force. The","rect":[90.0,386.2890625,376.97494221496586,377.1808776855469]},{"page":420,"text":"position or direction of the arrow has no significance, but the graphic","rect":[90.0,397.81207275390627,376.96688557434086,388.7038879394531]},{"page":420,"text":"surrounds the targeted enemy unit. Figure B-21 depicts the isolate","rect":[90.0,409.27496337890627,376.85860920715336,400.1667785644531]},{"page":420,"text":"tactical mission task.","rect":[89.99000549316406,418.7738952636719,173.61493968963624,411.68975830078127]},{"page":420,"text":"NEUTRALIZE","rect":[72.0,444.1679992675781,136.59475088119508,436.0559997558594]},{"page":420,"text":"B-52. Neutralize is a tactical mission task in which a unit renders","rect":[90.0,462.78167724609377,370.1552569847107,455.1464538574219]},{"page":420,"text":"the enemy incapable of interfering with an operation. The two lines","rect":[89.98997497558594,475.55718994140627,370.2643878440857,466.4490051269531]},{"page":420,"text":"cross over the symbol of the unit or facility targeted for neutralization.","rect":[89.9999771118164,487.0801696777344,370.30324840545657,477.97198486328127]},{"page":420,"text":"When assigning a task to neutralize, a commander specifies the enemy","rect":[89.9999771118164,498.5430603027344,370.24547386169436,489.43487548828127]},{"page":420,"text":"force or materiel to neutralize and the duration, which is time or event","rect":[89.9999771118164,508.0420227050781,370.28516339874269,500.9578857421875]},{"page":420,"text":"driven. The neutralized target may become effective again when","rect":[89.9999771118164,521.5890502929688,370.2224636077881,512.4808959960938]},{"page":420,"text":"casualties are replaced, damage is repaired, or effort resulting in the","rect":[89.9999771118164,533.0519409179688,370.2875032501221,523.9437866210938]},{"page":420,"text":"neutralization is lifted. A unit normally uses a combination of lethal","rect":[89.9999771118164,544.574951171875,370.27219342803957,535.466796875]},{"page":420,"text":"and nonlethal effects to neutralize enemy personnel or materiel. The","rect":[89.9999771118164,556.097900390625,370.22948933410648,546.98974609375]},{"page":420,"text":"assets required to neutralize a target vary according to the type and size","rect":[90.0,567.560791015625,370.2184114532471,558.45263671875]},{"page":420,"text":"of the target and the weapon and munitions combination used.","rect":[90.0,579.0838623046875,370.3166151046753,569.9757080078125]},{"page":420,"text":"Figure B-22 depicts the neutralize tactical mission task.","rect":[90.0,590.6068115234375,312.17849254608157,581.4986572265625]},{"page":420,"text":"Figure B-21. Isolate task","rect":[396.05999755859377,432.7742004394531,511.1356954498291,423.47564697265627]},{"page":420,"text":"Figure B-22. Neutralize task","rect":[384.7200012207031,568.6141967773438,515.8757772369385,559.3156127929688]},{"page":420,"text":"OCCUPY","rect":[72.0,613.968017578125,114.53526401519776,605.6759643554688]},{"page":420,"text":"B-53. Occupy is a tactical mission task in which a unit moves into an","rect":[90.0,633.8342895507813,381.4195089263916,624.8864135742188]},{"page":420,"text":"area to control it without enemy opposition. Both the friendly force’s","rect":[90.0,645.3572998046875,381.4817645530701,636.2491455078125]},{"page":420,"text":"movement to and occupation of the area occur without enemy opposition.","rect":[90.0,656.8803100585938,381.4869337081909,647.7721557617188]},{"page":420,"text":"A unit can control an area without occupying it, but not vice versa. That","rect":[90.0,668.3431396484375,381.3362498245239,659.2349853515625]},{"page":420,"text":"is the difference between the tactical mission tasks of occupy and control.","rect":[90.0,679.8662109375,381.41582775115969,670.758056640625]},{"page":420,"text":"The symbol should encompass the entire area that a commander desires","rect":[90.0,691.38916015625,381.3986346702576,682.281005859375]},{"page":420,"text":"to occupy. Units typically occupy assembly areas, objectives, and","rect":[90.0,702.85205078125,381.4599208831787,693.7338256835938]},{"page":420,"text":"defensive positions. Figure B-23 depicts the occupy tactical mission task.","rect":[90.0,714.3750610351563,381.42071056365969,705.2669067382813]},{"page":420,"text":"Figure B-23. Occupy task","rect":[395.8199768066406,708.4141845703125,515.8745870513916,699.0254516601563]},{"page":420,"text":"B-10","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.6090087890625]},{"page":420,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":420,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":421,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.9969809570313,38.016021728515628]},{"page":421,"text":"REDUCE","rect":[90.0,83.36216735839844,131.90626668930055,75.27597045898438]},{"page":421,"text":"B-54. Reduce is a tactical mission task in which a unit destroys an encircled or bypassed enemy force.","rect":[108.0,103.3143310546875,539.9671583175659,94.36647033691406]},{"page":421,"text":"This task can occur at any location on the battlefield. Reduce is also a mobility task to create and mark lanes","rect":[107.99000549316406,114.7772216796875,540.0323626976013,105.6690444946289]},{"page":421,"text":"through, over, or around an obstacle to allow the attacking force to accomplish its mission (ATP 3-","rect":[107.97997283935547,126.30023193359375,540.0660913047791,117.19205474853516]},{"page":421,"text":"90.4/MCTP 3-34A). There is no symbol for this task.","rect":[107.97997283935547,137.8232421875,321.0212354660034,128.71505737304688]},{"page":421,"text":"RETAIN","rect":[90.0,161.17269897460938,128.70486545562745,153.09597778320313]},{"page":421,"text":"B-55. Retain is a tactical mission task in which a unit prevents","rect":[108.0,181.0542449951172,393.5429522972107,172.1264190673828]},{"page":421,"text":"enemy occupation or use of terrain. A commander assigning this task","rect":[108.0000228881836,192.5972900390625,393.5780849456787,183.48910522460938]},{"page":421,"text":"specifies the area to retain and the duration of the retention, which is","rect":[108.01004028320313,204.1002655029297,393.6019122581482,195.01211547851563]},{"page":421,"text":"time or event driven. While a unit is conducting this task, it expects","rect":[108.01004028320313,215.5831298828125,393.52372622299199,206.47494506835938]},{"page":421,"text":"enemy forces to attack and prepares for decisive engagement. A unit","rect":[108.01004028320313,227.10614013671876,393.55005597686769,217.99795532226563]},{"page":421,"text":"tasked to retain a specific piece of terrain does not necessarily have to","rect":[108.01004028320313,238.56903076171876,393.5640163421631,229.46084594726563]},{"page":421,"text":"occupy it. The direction of the arrow has no significance, but the symbol","rect":[108.0000228881836,250.092041015625,393.5871958694458,240.98385620117188]},{"page":421,"text":"includes the entire area to be retained. Figure B-24 depicts the retain","rect":[108.0000228881836,261.61505126953127,393.55101585388186,252.50686645507813]},{"page":421,"text":"tactical mission task.","rect":[107.99000549316406,271.05389404296877,191.61493968963624,263.9697570800781]},{"page":421,"text":"Figure B-24. Retain task","rect":[413.94000244140627,275.81414794921877,527.8754415435791,266.5155944824219]},{"page":421,"text":"SECURE","rect":[90.0,296.4599914550781,129.85895681381227,288.156005859375]},{"page":421,"text":"B-56. Secure is a tactical mission task in which a unit prevents the","rect":[108.0,316.354248046875,394.9107027130127,307.42645263671877]},{"page":421,"text":"enemy ","rect":[107.99000549316406,327.8973083496094,138.2744550704956,320.0]},{"page":421,"text":"from ","rect":[144.65017700195313,326.0,168.21421337127686,318.95947265625]},{"page":421,"text":"damaging ","rect":[174.58892822265626,327.8973083496094,219.33425426483155,318.949462890625]},{"page":421,"text":"or ","rect":[225.6468505859375,326.0,237.63178539276124,320.0]},{"page":421,"text":"destroying ","rect":[244.0065155029297,327.8973083496094,291.5113477706909,318.949462890625]},{"page":421,"text":"a ","rect":[297.823974609375,326.0,305.3690137863159,320.0]},{"page":421,"text":"force, ","rect":[311.681640625,326.0,338.3669385910034,318.95947265625]},{"page":421,"text":"facility, ","rect":[344.6795654296875,327.8973083496094,379.16436290740969,318.949462890625]},{"page":421,"text":"or","rect":[385.47698974609377,326.0,394.9659700469971,320.0]},{"page":421,"text":"geographical location. This task normally involves conducting area","rect":[107.99000549316406,339.36016845703127,394.9118013458252,330.2519836425781]},{"page":421,"text":"security operations. A force given the mission of securing a unit, facility,","rect":[107.9900131225586,350.8831787109375,394.97271251678469,341.7749938964844]},{"page":421,"text":"or geographic location, such as a route or base, not only prevents enemy","rect":[107.9900131225586,362.40618896484377,394.9437770843506,353.2980041503906]},{"page":421,"text":"forces from over running or occupying the secured location, but also","rect":[107.99000549316406,373.8690490722656,394.8668727874756,364.7608642578125]},{"page":421,"text":"prevents enemy direct fires and observed indirect fires from impacting","rect":[107.98999786376953,385.3920593261719,394.90672874450686,376.28387451171877]},{"page":421,"text":"the secured location, unit, or facility. Stated simply, the secured area or","rect":[107.98998260498047,396.9150695800781,394.94377685165406,387.806884765625]},{"page":421,"text":"location is safe enough to build and project combat power. There is a","rect":[107.98998260498047,408.3779296875,394.9828462677002,399.2597351074219]},{"page":421,"text":"difference between control and secure. The control tactical mission task","rect":[107.98998260498047,417.87689208984377,394.8817958831787,410.7927551269531]},{"page":421,"text":"allows enemy direct and indirect fires to affect the location being","rect":[107.98998260498047,431.4239501953125,394.9268398284912,422.3157653808594]},{"page":421,"text":"Figure B-25. Secure task","rect":[413.2200012207031,424.0741882324219,529.9770650787353,414.6854553222656]},{"page":421,"text":"controlled while secure does not. A unit does not have to physically occupy the area immediately around the","rect":[107.98998260498047,442.8868103027344,540.0603303985596,433.77862548828127]},{"page":421,"text":"unit, facility, or geographic location it is securing if it can prevent the enemy from occupying or firing at that","rect":[107.98998260498047,454.4098205566406,540.0260996780396,445.3016357421875]},{"page":421,"text":"location by other means. The commander states the mission duration in terms of time or event when assigning","rect":[107.98998260498047,465.93280029296877,540.0213527679443,456.8246154785156]},{"page":421,"text":"a mission to secure a given unit, facility, or geographic location. The direction of the arrow has no","rect":[107.98998260498047,477.39569091796877,540.0141506195068,468.2875061035156]},{"page":421,"text":"significance, but the symbol includes the entire area to be secured. Figure B-25 depicts the secure tactical","rect":[107.98998260498047,488.918701171875,539.9321665725709,479.8105163574219]},{"page":421,"text":"mission task.","rect":[107.97997283935547,498.35748291015627,160.2252607345581,491.2733459472656]},{"page":421,"text":"SEIZE","rect":[90.0,523.739990234375,119.367440700531,515.4359741210938]},{"page":421,"text":"B-57. Seize is a tactical mission task in which a unit takes possession","rect":[108.0,543.63427734375,394.9978780670166,534.7064208984375]},{"page":421,"text":"of a designated area by using overwhelming force. An enemy force","rect":[108.01001739501953,555.1773071289063,394.9938325958252,546.0791625976563]},{"page":421,"text":"can no longer place direct fire on a seized objective. The arrow points to","rect":[108.01001739501953,566.6401977539063,394.9618434906006,557.52197265625]},{"page":421,"text":"the location or objective to seize. This task differs from secure because","rect":[108.01001739501953,578.1632080078125,394.8406343536377,569.0449829101563]},{"page":421,"text":"it requires offensive action to obtain control of the designated area or","rect":[108.01001739501953,589.6861572265625,394.8766992149353,580.5780029296875]},{"page":421,"text":"objective. It differs from the task of occupy because it involves","rect":[108.01001739501953,601.1490478515625,394.93983340072637,592.0308227539063]},{"page":421,"text":"overcoming anticipated enemy opposition. Once a friendly force seizes","rect":[108.01001739501953,612.6720581054688,394.95484804916387,603.5639038085938]},{"page":421,"text":"a physical objective, it clears the terrain within that objective by killing,","rect":[108.01001739501953,624.195068359375,394.9815320968628,615.0768432617188]},{"page":421,"text":"capturing, or forcing the withdrawal of all enemy forces. Figure B-26","rect":[108.01001739501953,635.657958984375,394.82753562927248,626.5498046875]},{"page":421,"text":"depicts the seize tactical mission task.","rect":[108.0,647.160888671875,259.60464000701907,638.07275390625]},{"page":421,"text":"Figure B-26. Seize task","rect":[417.1199951171875,644.274169921875,526.0684957427978,634.8854370117188]},{"page":421,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":421,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":421,"text":"B-11","rect":[502.4909973144531,754.0800170898438,521.9490073242188,747.6090087890625]},{"page":422,"text":"Appendix B","rect":[72.0,46.224021911621097,122.05709729003907,38.016021728515628]},{"page":422,"text":"SUPPORT BY FIRE","rect":[72.0,83.39997100830078,159.91819143295289,75.0959701538086]},{"page":422,"text":"B-58. Support by fire is a tactical mission task in which a unit","rect":[90.0,103.3143310546875,369.45882201766968,94.36647033691406]},{"page":422,"text":"engages the enemy by direct fire in support of another","rect":[90.0000228881836,114.7772216796875,369.44686604309086,105.82936096191406]},{"page":422,"text":"maneuvering force. The primary objective of the support force is","rect":[90.0000228881836,126.30023193359375,369.4638507347107,117.18203735351563]},{"page":422,"text":"normally to fix and suppress enemy forces so that they cannot","rect":[90.0100326538086,137.8232421875,369.50989484405519,128.71505737304688]},{"page":422,"text":"effectively fire on the maneuvering force. The secondary objective is","rect":[90.0100326538086,149.28607177734376,369.4439227561951,140.16787719726563]},{"page":422,"text":"to destroy enemy forces if they try to reposition. The commander","rect":[90.0100326538086,160.80908203125,369.51506591415406,151.70089721679688]},{"page":422,"text":"specifies the desired effect on enemy forces when assigning this task.","rect":[90.0100326538086,172.33209228515626,369.52801036834719,163.22390747070313]},{"page":422,"text":"The support by fire tasked is rarely applicable to units larger than","rect":[90.01002502441406,183.79498291015626,369.44286155700686,174.68679809570313]},{"page":422,"text":"company size. Figure B-27 depicts the support by fire tactical mission","rect":[90.01002502441406,195.3179931640625,369.46788597106936,186.20980834960938]},{"page":422,"text":"task.","rect":[90.01002502441406,204.7567901611328,108.6552381515503,197.67263793945313]},{"page":422,"text":"Figure B-27. Support by fire","rect":[384.0,203.57415771484376,515.6377706451416,194.1854248046875]},{"page":422,"text":"task","rect":[439.8013916015625,213.1132049560547,459.8944845123291,205.82867431640626]},{"page":422,"text":"B-59. A unit conducting the task of support by fire does not maneuver","rect":[90.01002502441406,224.30584716796876,369.46184325790406,215.19766235351563]},{"page":422,"text":"to capture enemy forces or terrain. A commander gives this task to another unit as part of a larger maneuver.","rect":[90.01005554199219,235.828857421875,522.0551099777222,226.72067260742188]},{"page":422,"text":"When assigning a support by fire mission, a commander designates the enemy force, when to attack, the","rect":[90.01005554199219,247.29168701171876,522.0432405548096,238.18350219726563]},{"page":422,"text":"general location from which to operate, the friendly force to support, and the purpose of the task, such as fix","rect":[90.01005554199219,258.814697265625,522.0302028656006,249.70651245117188]},{"page":422,"text":"or suppress. The ends of the arrows point in the general direction of the targeted unit or location. The base of","rect":[90.01005554199219,270.33770751953127,522.0532128868103,261.2295227050781]},{"page":422,"text":"the area indicates the general area from which to deliver fires.","rect":[90.01005554199219,281.80059814453127,337.42095470428469,272.6924133300781]},{"page":422,"text":"B-60. Once a commander gives an element the task of support by fire, it should occupy support by fire","rect":[90.02007293701172,299.3255615234375,521.9991121368408,290.2173767089844]},{"page":422,"text":"positions that have cover and concealment, good observation, and clear fields of fire. Elements occupying","rect":[90.02007293701172,310.84857177734377,522.0180568695068,301.7403869628906]},{"page":422,"text":"support by fire positions should—","rect":[90.02007293701172,322.3114318847656,226.76005172729493,313.2032470703125]},{"page":422,"text":" Check the security of the position.","rect":[115.19999694824219,335.7543029785156,270.4679822921753,326.6461181640625]},{"page":422,"text":" Search for targets.","rect":[115.19999694824219,349.2543029785156,206.20070934295655,340.1461181640625]},{"page":422,"text":" Orient weapons on likely or suspected enemy positions.","rect":[115.19999694824219,362.7543029785156,356.56389904022219,353.6461181640625]},{"page":422,"text":" Occupy fighting positions providing some degree of protection. Armored and Stryker forces","rect":[115.19999694824219,376.2543029785156,522.0459125022888,367.1461181640625]},{"page":422,"text":"occupy hull-down firing positions, while infantry forces use trees, natural berms, and similar","rect":[133.1999969482422,387.7773132324219,521.9639794883728,378.66912841796877]},{"page":422,"text":"existing terrain features.","rect":[133.18995666503907,399.30029296875,230.12945079803468,390.1921081542969]},{"page":422,"text":" Assign observation sectors to each Soldier or weapon system in the support by fire element.","rect":[115.19999694824219,412.7943115234375,500.68560314178469,403.6861267089844]},{"page":422,"text":" Use available thermal sights to locate heat sources not visible to the naked eye, such as vehicles","rect":[115.19999694824219,426.2943115234375,521.9853045921326,417.1861267089844]},{"page":422,"text":"concealed in tree lines or other wooded areas or personnel serving at observation posts.","rect":[133.1999969482422,437.7572021484375,482.02239513397219,428.6490173339844]},{"page":422,"text":"B-61. Support by fire closely resembles the task of attack by fire. The difference is that support by fire","rect":[90.00376892089844,455.28216552734377,521.9828157501221,446.1739807128906]},{"page":422,"text":"supports another force so that it can maneuver against enemy forces, while an attack by fire does not support","rect":[90.00376892089844,466.74505615234377,521.9669566116334,457.6368713378906]},{"page":422,"text":"the maneuver of another friendly force.","rect":[90.00376892089844,478.26806640625,247.18757152557374,469.1598815917969]},{"page":422,"text":"SUPPRESS","rect":[72.0,501.6600036621094,120.82134819030762,493.35601806640627]},{"page":422,"text":"B-62. Suppressis a tactical mission task in which a unit temporarily","rect":[90.0,521.5743408203125,372.57399559020998,512.62646484375]},{"page":422,"text":"degrades a force or weapon system from accomplishing its mission.","rect":[90.0,533.0372314453125,372.5238904953003,524.08935546875]},{"page":422,"text":"It occurs when a unit employs direct or indirect lethal and nonlethal","rect":[89.99996185302735,544.5601806640625,372.5397410354614,535.4520263671875]},{"page":422,"text":"effects, such as artillery, electromagnetic warfare, or smoke on enemy","rect":[89.99996185302735,556.0831909179688,372.45409202575686,546.9750366210938]},{"page":422,"text":"personnel, weapons, and equipment to prevent or degrade enemy fires,","rect":[90.0,567.5460815429688,372.5220594406128,558.4379272460938]},{"page":422,"text":"sensors, and visual observation of friendly forces. Unlike the","rect":[90.0,579.069091796875,372.6070833282471,569.9609375]},{"page":422,"text":"neutralization task, the original target regains its effectiveness without","rect":[90.0,590.592041015625,372.5356821975708,581.48388671875]},{"page":422,"text":"needing to reconstitute once the effects of the systems involved in the","rect":[90.0,602.054931640625,372.5150423126221,592.94677734375]},{"page":422,"text":"suppression effort lift or shift to another target. Figure B-28 depicts the","rect":[90.0,613.5779418945313,372.5509615020752,604.4697875976563]},{"page":422,"text":"suppress tactical mission task.","rect":[89.9999771118164,625.0809326171875,210.58169078826905,615.9927978515625]},{"page":422,"text":"Figure B-28. Suppress task","rect":[386.8799743652344,624.4141845703125,515.816328994751,615.0254516601563]},{"page":422,"text":"B-12","rect":[72.1199951171875,754.0800170898438,91.57798986816407,747.6090087890625]},{"page":422,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":422,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":423,"text":"Tactical Mission Tasks","rect":[442.5,44.55902099609375,539.997896484375,38.016021728515628]},{"page":423,"text":"TURN","rect":[90.0,83.36216735839844,118.500412940979,75.27597045898438]},{"page":423,"text":"B-63. Turn is a tactical mission task in which a unit forces an enemy","rect":[108.0,103.3143310546875,394.95778465270998,94.36647033691406]},{"page":423,"text":"force from one avenue of approach or movement corridor to","rect":[108.01001739501953,114.75718688964844,394.96690940856936,105.82936096191406]},{"page":423,"text":"another. A commander relates obstacles, fires, and terrain to improve","rect":[108.01001739501953,126.28019714355469,394.9045686798096,117.19205474853516]},{"page":423,"text":"the friendly tactical situation while degrading the enemy force’s","rect":[108.01000213623047,137.8232421875,394.9827716331482,128.71505737304688]},{"page":423,"text":"situation. For example, in the offense, a commander might want to turn","rect":[108.01000213623047,149.28607177734376,394.8396511077881,140.17788696289063]},{"page":423,"text":"a pursued enemy force to place it in a position where the friendly force","rect":[108.01001739501953,160.80908203125,394.9598665313721,151.70089721679688]},{"page":423,"text":"can destroy it. In the defense, a commander might want to turn an","rect":[108.01001739501953,172.33209228515626,394.88866233825686,163.22390747070313]},{"page":423,"text":"attacking enemy force to allow the friendly force to conduct a","rect":[108.01001739501953,183.79498291015626,394.9558382110596,174.68679809570313]},{"page":423,"text":"counterattack into the enemy force’s flank. The place where the arrow","rect":[108.01001739501953,195.3179931640625,394.94470644378665,186.20980834960938]},{"page":423,"text":"breaks indicates the general location of the obstacle complex that will","rect":[108.01002502441406,206.78082275390626,394.99460553741457,197.67263793945313]},{"page":423,"text":"make enemy forces move from one avenue of approach to another.","rect":[108.01002502441406,218.3038330078125,394.90871715545657,209.19564819335938]},{"page":423,"text":"Figure B-29 depicts the turn tactical mission task.","rect":[108.01001739501953,229.82684326171876,306.89702892303469,220.71865844726563]},{"page":423,"text":"Figure B-29. Turn task","rect":[418.79998779296877,206.9342041015625,524.3907613677978,197.63565063476563]},{"page":423,"text":"B-64. Turn is an obstacle effect that integrates fire planning","rect":[108.02003479003906,247.29168701171876,363.90382957458498,238.3438262939453]},{"page":423,"text":"and obstacle effort to divert an enemy formation from one","rect":[108.02003479003906,258.814697265625,363.9109163360596,249.86683654785157]},{"page":423,"text":"avenue of approach to an adjacent avenue of approach or","rect":[108.02003479003906,270.33770751953127,363.9178743438721,261.3998718261719]},{"page":423,"text":"into an engagement area. Its development requires well-","rect":[108.02003479003906,281.80059814453127,363.90080810165406,272.6924133300781]},{"page":423,"text":"defined mobility corridors and avenues of approach. To achieve","rect":[108.02005004882813,293.3235778808594,363.8668794708252,284.21539306640627]},{"page":423,"text":"this effect, the obstacles have a subtle orientation relative to the","rect":[108.02005004882813,303.0,363.9276399688721,295.7383728027344]},{"page":423,"text":"enemy force’s approach. The obstacles and their associated fires","rect":[108.02005004882813,316.3094482421875,363.92375063705449,307.2012634277344]},{"page":423,"text":"allow bypasses in the direction desired by the friendly scheme of","rect":[108.02005767822266,327.83245849609377,363.9049279747009,318.7242736816406]},{"page":423,"text":"maneuver. Finally, the obstacles tie into restrictive terrain at the","rect":[108.02005767822266,339.3554382324219,363.8685884552002,330.24725341796877]},{"page":423,"text":"initial point of the turn. A commander normally uses the turn","rect":[108.02005767822266,350.81829833984377,363.93068504333498,341.7101135253906]},{"page":423,"text":"Figure B-30. Turn obstacle effect","rect":[378.2400207519531,350.8741760253906,533.8616235313416,341.4854431152344]},{"page":423,"text":"effect on the flanks of an engagement area. The direction of the","rect":[108.02005767822266,362.34130859375,363.91882038879398,353.2331237792969]},{"page":423,"text":"arrow indicates the desired direction of turn. Figure B-30 depicts the turn obstacle effect.","rect":[108.0100326538086,373.8642883300781,463.7280225753784,364.756103515625]},{"page":423,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":423,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":423,"text":"B-13","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.6090087890625]},{"page":424,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":425,"text":"Appendix C","rect":[281.6400146484375,125.65198516845703,348.32400366210939,114.5639877319336]},{"page":425,"text":"Encirclements","rect":[260.2799987792969,146.99623107910157,369.6805882720947,135.3496856689453]},{"page":425,"text":"Encirclements are an outcome that can result from offensive operations to isolate and","rect":[126.0,184.73876953125,503.91623878479006,174.7799072265625]},{"page":425,"text":"destroy enemy forces or result from a friendly force being isolated by enemy forces.","rect":[126.0,197.47557067871095,503.99530506134036,187.4947509765625]},{"page":425,"text":"This appendix provides an overview of encirclement operations and consists of the","rect":[126.0,210.05865478515626,504.0689064178467,200.09979248046876]},{"page":425,"text":"organization of forces for an encirclement, control measures, and planning and","rect":[126.0,222.7405242919922,504.08423805236819,212.75970458984376]},{"page":425,"text":"execution of encirclement operations. It also includes what to do if a unit is encircled","rect":[126.0,235.3785400390625,503.97107887268069,225.419677734375]},{"page":425,"text":"and how to break out from an encirclement.","rect":[126.0000228881836,245.8424530029297,318.4772996902466,238.07958984375]},{"page":425,"text":"ENCIRCLEMENT OVERVIEW","rect":[90.0,271.4557189941406,288.64738845825198,261.7955627441406]},{"page":425,"text":"C-1. Encirclement is where one force loses its freedom of maneuver because an opposing force is able","rect":[108.0,291.59429931640627,539.9413118438721,282.6464538574219]},{"page":425,"text":"to isolate it by controlling all ground lines of communications and reinforcement. A unit can conduct","rect":[107.98998260498047,303.05718994140627,540.0654063186646,293.9490051269531]},{"page":425,"text":"offensive encirclement operations designed to isolate an enemy force or they could become encircled","rect":[107.98998260498047,314.5801696777344,540.0223293304443,305.47198486328127]},{"page":425,"text":"resulting from the unit's isolation by the actions of an enemy force. Encirclements occur because combat","rect":[107.98999786376953,326.1031799316406,540.0063242874146,316.9949951171875]},{"page":425,"text":"operations involving modernized forces are likely to be chaotic, intense, and highly destructive, extending","rect":[107.98998260498047,337.5660705566406,540.0411281585693,328.4578857421875]},{"page":425,"text":"across large areas containing relatively few units as each side maneuvers against the other to obtain positional","rect":[107.98998260498047,349.08905029296877,540.0554575881959,339.9808654785156]},{"page":425,"text":"advantage.","rect":[107.98998260498047,360.612060546875,151.05593395233155,351.5038757324219]},{"page":425,"text":"C-2. Typically, encirclements result from penetrations and envelopments, or are extensions of exploitation","rect":[107.98998260498047,378.0769348144531,539.9644680023193,368.96875]},{"page":425,"text":"and pursuit operations that bypass large enemy forces in order to maintain momentum. As such, they are not","rect":[107.98999786376953,389.59991455078127,540.0794444046021,380.4917297363281]},{"page":425,"text":"a separate form of maneuver but an extension of an ongoing operation. They may be planned sequels or result","rect":[108.0,401.1229248046875,540.0651621780396,392.0147399902344]},{"page":425,"text":"from exploiting an unforeseen opportunity. They usually result from the linkup of two encircling arms","rect":[108.0,412.5858154296875,539.9167010765076,403.4776306152344]},{"page":425,"text":"conducting a double envelopment. However, they can occur in situations where an attacking unit uses a major","rect":[108.0,424.1087951660156,540.0233056602478,414.9906005859375]},{"page":425,"text":"obstacle, such as a shoreline, as a second encircling force. Although a commander may designate terrain","rect":[108.00000762939453,435.63177490234377,539.9866847991943,426.5235900878906]},{"page":425,"text":"objectives in an encirclement, isolating and destroying or defeating enemy forces are the focus. Ideally, an","rect":[108.00000762939453,447.09466552734377,539.9592189788818,437.9764709472656]},{"page":425,"text":"encirclement results in the surrender of the encircled force. This minimizes friendly force losses and resource","rect":[108.0,458.61767578125,540.0979280548096,449.5094909667969]},{"page":425,"text":"expenditures. A key consideration prior to executing an encirclement is understanding that the encircling","rect":[108.0,470.14068603515627,540.0213527679443,461.0325012207031]},{"page":425,"text":"force is fixed and therefore unavailable for other operations until the enemy force being encircled is reduced.","rect":[108.0,481.6035461425781,539.9909620285034,472.495361328125]},{"page":425,"text":"ORGANIZATION OF FORCES FOR AN ENCIRCLEMENT","rect":[90.0,504.947998046875,347.71439504623415,496.656005859375]},{"page":425,"text":"C-3. An encirclement operation usually has at least two phases—the actual encirclement and actions taken","rect":[108.0,524.874267578125,540.0262966156006,515.76611328125]},{"page":425,"text":"against the isolated enemy forces. Commanders consider adjusting subordinate units’ task organizations","rect":[108.01001739501953,536.3973388671875,539.9992816429138,527.2791137695313]},{"page":425,"text":"between phases to maximize unit effectiveness in each phase. The first phase is the actual encirclement that","rect":[108.0,547.8401489257813,540.0097422561646,538.7520141601563]},{"page":425,"text":"results in the enemy force’s isolation. The organization of forces for an encirclement is similar to that of a","rect":[108.0,559.3831787109375,539.9679231719971,550.2750244140625]},{"page":425,"text":"movement to contact or an envelopment. The unit executing an encirclement organizes encircling forces into","rect":[108.00000762939453,570.8460693359375,540.0360622406006,561.7379150390625]},{"page":425,"text":"a direct pressure force and one or more encircling arms. Armored, mechanized, and motorized infantry, air","rect":[108.00000762939453,582.3690795898438,539.9000756797791,573.2609252929688]},{"page":425,"text":"assault, and airborne units are especially well suited for use as an encircling force since they have the tactical","rect":[107.99002075195313,593.89208984375,539.9662852249146,584.783935546875]},{"page":425,"text":"mobility to reach positions that cut enemy ground lines of communication. Bypassed and non-encircled","rect":[108.00003814697266,605.3549194335938,539.9662990570068,596.2467651367188]},{"page":425,"text":"enemy forces on the flanks and rear of advancing friendly forces require all around security.","rect":[108.00003814697266,616.8779296875,476.44451427459719,607.769775390625]},{"page":425,"text":"C-4. A commander should direct the encirclement effort. However, there must also be unity of command","rect":[108.00003814697266,634.3928833007813,539.9962673187256,625.2847290039063]},{"page":425,"text":"for each encircling arm. The encircling force headquarters may name one of its subordinate units as the","rect":[108.00003814697266,645.8557739257813,540.0310945587158,636.7476196289063]},{"page":425,"text":"headquarters for an encircling arm. Alternatively, that force’s headquarters may create a temporary command","rect":[108.00003814697266,657.3787841796875,539.9171047210693,648.2706298828125]},{"page":425,"text":"post from organic assets, such as its tactical command post, to control one or more arms of the encirclement.","rect":[108.00003814697266,668.9017333984375,539.9820508956909,659.7935791015625]},{"page":425,"text":"If that encircling arm has subordinate inner and outer arms, each of them also requires separate subordinate","rect":[108.00003814697266,680.3646240234375,540.0026521759033,671.2564697265625]},{"page":425,"text":"commanders. The missions and spatial orientation between the inner and outer encircling arms are","rect":[108.00003814697266,691.8876953125,540.1366853790283,682.779541015625]},{"page":425,"text":"sufficiently different; therefore, one force cannot act in both directions at once. Figure C-1 on page C-2","rect":[108.00003814697266,703.41064453125,539.9521999359131,694.302490234375]},{"page":425,"text":"depicts an encirclement.","rect":[107.97993469238281,714.853515625,204.9184217453003,705.765380859375]},{"page":425,"text":"01 May 2023","rect":[90.11700439453125,755.9639892578125,142.43191748046875,747.5130004882813]},{"page":425,"text":"FM 3-90","rect":[289.2510070800781,754.1909790039063,322.7489951171875,747.6119995117188]},{"page":425,"text":"C-1","rect":[507.4739990234375,754.1820068359375,521.9549887695313,747.531005859375]},{"page":426,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":426,"text":"Figure C-1. Inner and outer arms of an encirclement","rect":[174.1800079345703,360.23419189453127,419.80730224227906,350.845458984375]},{"page":426,"text":"C-5. The encirclement unit organizes only an encircling arm if there is no possibility of the encircled forces","rect":[90.0019760131836,383.6910095214844,522.0773456077576,374.58282470703127]},{"page":426,"text":"receiving relief from enemy forces outside the encirclement. If there is danger of an enemy relief force","rect":[90.0019760131836,395.2140197753906,521.9114656524658,386.1058349609375]},{"page":426,"text":"reaching the encircled enemy force, the unit organizes both an inner and outer encircling arms. The","rect":[90.0019760131836,406.6768798828125,522.0613069610596,397.5686950683594]},{"page":426,"text":"commander assigns the outer encircling arm a security mission, an offensive mission to drive away any","rect":[90.0019760131836,418.1999206542969,521.9491481781006,409.0917053222656]},{"page":426,"text":"enemy relief force, or a defensive mission to prevent the enemy relief force from making contact with the","rect":[90.00199890136719,429.722900390625,521.9800081329346,420.6147155761719]},{"page":426,"text":"encircled enemy force. Once the encirclement is complete, these inner or outer encircling arms form a","rect":[90.00199890136719,441.185791015625,522.0337190704346,432.0776062011719]},{"page":426,"text":"perimeter.","rect":[90.00198364257813,452.688720703125,130.84650707244874,443.6005859375]},{"page":426,"text":"C-6. The second phase of an encirclement operation involves actions taken against an isolated enemy force.","rect":[90.00198364257813,470.2237243652344,522.0483350753784,461.11553955078127]},{"page":426,"text":"The commander’s decision to fix, contain, or destroy isolated enemy forces affects the task organization of","rect":[90.0019760131836,481.6866149902344,521.9901025352478,472.57843017578127]},{"page":426,"text":"subordinate units, as do enemy attempts to break out from the encirclement or linkup with the encircled force.","rect":[90.0019760131836,493.2095947265625,522.0214185714722,484.1014099121094]},{"page":426,"text":"All these possible outcomes require resources in terms of units and supplies, but some require more resources","rect":[90.0019760131836,504.6524353027344,522.0326678733826,495.5643005371094]},{"page":426,"text":"than others do. If the unit’s mission is to contain or fix an isolated enemy force, the unit organizes subordinate","rect":[90.0019760131836,516.1954956054688,521.9913606719971,507.0873107910156]},{"page":426,"text":"forces for defensive action and arranges them around the enemy force’s perimeter. If the unit’s mission is to","rect":[89.99195098876953,527.718505859375,521.9501857757568,518.6103515625]},{"page":426,"text":"reduce or destroy that same enemy force, that unit organizes subordinate forces for offensive action. A higher","rect":[89.98194885253906,539.181396484375,521.9899194297791,530.0732421875]},{"page":426,"text":"echelon commander often assigns either mission to the commander of a follow and support force.","rect":[89.98194885253906,550.704345703125,480.1446485519409,541.59619140625]},{"page":426,"text":"C-7. Regardless of whether a commander decides to fix, contain, or destroy enemy forces, the unit conducts","rect":[89.98194885253906,568.2293701171875,522.0612933616638,559.1212158203125]},{"page":426,"text":"reconnaissance to maintain contact and monitor enemy force actions in response to the encirclement. This","rect":[89.98194885253906,579.6921997070313,521.8817279319763,570.5840454101563]},{"page":426,"text":"allows the unit to respond effectively to any enemy movement. The most effective reconnaissance combines","rect":[89.98194885253906,591.2152099609375,522.0413959007263,582.1070556640625]},{"page":426,"text":"ground, aerial, and surveillance systems to provide constant coverage and multiple assessments of enemy","rect":[89.98194885253906,602.7382202148438,521.9771022796631,593.6300659179688]},{"page":426,"text":"activities throughout the encircled area.","rect":[89.98194885253906,614.2010498046875,248.00641918182374,605.0928955078125]},{"page":426,"text":"ENCIRCLEMENT CONTROL MEASURES","rect":[72.0,637.5480346679688,262.01569175720217,629.2559814453125]},{"page":426,"text":"C-8. As shown in figure C-2, control measures for an encirclement are similar to those of other offensive","rect":[90.0,657.4743041992188,521.9753694610596,648.3661499023438]},{"page":426,"text":"operations, especially an envelopment, but with a few additional considerations. If the encirclement unit uses","rect":[90.0,668.997314453125,521.9639422874451,659.88916015625]},{"page":426,"text":"both an inner and an outer encircling arm, the unit must establish a boundary between them. The unit places","rect":[90.0,680.4601440429688,521.9901874046326,671.3519897460938]},{"page":426,"text":"the boundary so that each element has enough space to accomplish their mission. The inner force requires","rect":[90.0,691.983154296875,522.0393817405701,682.875]},{"page":426,"text":"enough space to fight a defensive battle to prevent the encircled force from breaking out. The outer force","rect":[89.9899673461914,703.5061645507813,522.0039949493408,694.3980102539063]},{"page":426,"text":"requires adequate terrain and depth in its assigned area to defeat any attempt to relieve the encircled force.","rect":[89.9899673461914,714.9690551757813,514.7507886886597,705.8609008789063]},{"page":426,"text":"C-2","rect":[72.1199951171875,754.1790161132813,86.60099249267579,747.5280151367188]},{"page":426,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":426,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":427,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":427,"text":"Figure C-2. Example of encirclement control measures","rect":[185.52000427246095,354.47418212890627,444.5390157623291,345.08544921875]},{"page":427,"text":"C-9. The commander who controls both converging forces establishes a RFL between them. The unit may","rect":[107.99522399902344,377.9309997558594,540.0205593109131,368.82281494140627]},{"page":427,"text":"also establish a free-fire area, which encloses the area occupied by a bypassed or encircled enemy forces.","rect":[107.98519134521485,389.4540100097656,539.9404859542847,380.3458251953125]},{"page":427,"text":"The unit may also establish contact points.","rect":[107.99520874023438,400.9168701171875,278.26006603240969,391.8086853027344]},{"page":427,"text":"PLANNING AN ENCIRCLEMENT","rect":[90.0,424.2822265625,240.9134612083435,416.1960144042969]},{"page":427,"text":"C-10. Encirclement operations may require allocating large forces and significant resources. They take a","rect":[108.0,444.23431396484377,540.0534334259033,435.1261291503906]},{"page":427,"text":"great deal of time and usually slow an advance. The encircling force maintains contact with an encircled","rect":[108.0,455.75732421875,539.9662380218506,446.6491394042969]},{"page":427,"text":"enemy force, the following general planning considerations apply. Units—","rect":[108.0,467.2201843261719,407.3975944519043,458.11199951171877]},{"page":427,"text":" Determine the best available assets that gain and maintain contact with enemy forces.","rect":[133.1999969482422,480.71429443359377,493.0002393722534,471.6061096191406]},{"page":427,"text":" Keep encircled enemy forces isolated and incapable of receiving intelligence, logistics, and fire","rect":[133.1999969482422,494.21429443359377,540.0195589141846,485.1061096191406]},{"page":427,"text":"support from enemy formations outside of the encirclement.","rect":[151.1999969482422,505.7373046875,391.7221632003784,496.6291198730469]},{"page":427,"text":" Use reconnaissance and surveillance assets so that they know the capabilities of the encircled force","rect":[133.1999969482422,519.2343139648438,540.0895662384033,510.1261291503906]},{"page":427,"text":"and, as much as possible, its commander’s intentions.","rect":[151.1999969482422,530.7373046875,365.5658826828003,521.649169921875]},{"page":427,"text":" Retain freedom of maneuver.","rect":[133.1999969482422,542.230224609375,268.3608350753784,535.1461181640625]},{"page":427,"text":" Control fires and fields of fire to avoid fratricide.","rect":[133.1999969482422,555.740234375,347.56789684295657,548.6461181640625]},{"page":427,"text":"C-11. Units apply the general planning considerations for the offense or the defense depending on the overall","rect":[108.00376892089844,575.2191772460938,540.0370860061646,566.1110229492188]},{"page":427,"text":"mission. Units plan to rotate the forces involved in reducing the encircled pocket to maintain constant","rect":[108.00372314453125,586.7421875,539.9440073928834,577.634033203125]},{"page":427,"text":"pressure on the enemy.","rect":[108.00379943847656,598.26513671875,200.26992321014405,589.156982421875]},{"page":427,"text":"C-12. Every encircled enemy unit reacts differently. Initially, some become demoralized and cannot offer","rect":[108.00377655029297,615.7300415039063,539.9498803672791,606.6218872070313]},{"page":427,"text":"any serious resistance. Additional methods for psychologically affecting enemy personnel and reducing their","rect":[108.00377655029297,627.2530517578125,540.0261132774353,618.1448974609375]},{"page":427,"text":"mental and physical capabilities is by disrupting their sleep and rest patterns. However, if left undisturbed,","rect":[107.99378967285156,638.7159423828125,539.9479932785034,629.6077880859375]},{"page":427,"text":"most enemy units recover and attempt to break out and regain contact with their main force or attack the","rect":[107.99378967285156,650.2388916015625,539.9849519805908,641.1307373046875]},{"page":427,"text":"flank and rear of advancing friendly units. The encircling force must plan for the enemy force’s most probable","rect":[107.99378967285156,661.7619018554688,540.0091219024658,652.6537475585938]},{"page":427,"text":"reactions.","rect":[107.99378967285156,671.2007446289063,146.61487865447999,664.1166381835938]},{"page":427,"text":"C-13. If the enemy force is not reduced, and it can be resupplied or has access to considerable supply stocks,","rect":[107.99378967285156,690.73974609375,540.0341749191284,681.631591796875]},{"page":427,"text":"then it continues to be a serious threat to encirclement units in future operations. The encircling force must","rect":[107.99378967285156,702.2627563476563,540.0072398147584,693.1546020507813]},{"page":427,"text":"be approximately equal in size to this type of encircled force to fix or contain it. This situation occurred when","rect":[107.99378967285156,713.7255859375,540.0593776702881,704.617431640625]},{"page":427,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":427,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":427,"text":"C-3","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.5280151367188]},{"page":428,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":428,"text":"German forces occupied various fortified French ports after Allied armies liberated the rest of France in 1944.","rect":[90.0,83.49430847167969,522.0106763839722,74.40616607666016]},{"page":428,"text":"Each encircled German division took approximately one Allied division to maintain its isolation. Conversely,","rect":[90.0,94.97723388671875,522.0119581222534,85.86905670166016]},{"page":428,"text":"an enemy force isolated without adequate supplies either surrenders or faces containment by considerably","rect":[90.0,106.500244140625,521.8928737640381,97.3920669555664]},{"page":428,"text":"smaller forces. This situation occurred in Egypt during the 1973 Arab-Israeli War when an Israeli division","rect":[90.0,118.023193359375,521.9562892913818,108.9150161743164]},{"page":428,"text":"isolated the Egyptian 3rd Army.","rect":[90.0,129.486083984375,218.62673473358155,120.3779067993164]},{"page":428,"text":"EXECUTING AN ENCIRCLEMENT","rect":[72.0,152.8422088623047,229.93467092514039,144.75601196289063]},{"page":428,"text":"C-14. When feasible, encircling forces advance parallel to the enemy’s direction of movement. They attempt","rect":[90.0,172.7943115234375,522.0263438186646,163.68612670898438]},{"page":428,"text":"to reach key passes, bridges, and other critical points before the main enemy force reaches them. When the","rect":[89.98992919921875,184.31732177734376,521.9966096954346,175.20913696289063]},{"page":428,"text":"encircling force cannot outdistance the enemy force, it engages the enemy force’s flanks to force the enemy","rect":[89.98992919921875,195.78021240234376,522.0103054046631,186.67202758789063]},{"page":428,"text":"to fight under the most unfavorable conditions possible, ultimately in two or more directions simultaneously.","rect":[89.98994445800781,207.30322265625,521.9828443527222,198.19503784179688]},{"page":428,"text":"Engineer units rapidly breach obstacles in the path of the encircling force. Friendly forces emplace obstacle","rect":[89.98994445800781,218.76605224609376,521.9348421173096,209.65786743164063]},{"page":428,"text":"complexes, supported by fires, to block probable avenues of escape, as they counter attempted enemy","rect":[89.98994445800781,230.28912353515626,521.9600124359131,221.18087768554688]},{"page":428,"text":"breakouts from encirclement. Units may use air assault and airborne forces to seize key passes or other critical","rect":[89.98999786376953,241.81207275390626,521.9717783889771,232.70388793945313]},{"page":428,"text":"terrain objectives to cut enemy LOCs. The encircling force completes the encirclement when it cuts all enemy","rect":[89.98998260498047,253.27496337890626,522.0544338226318,244.15676879882813]},{"page":428,"text":"ground LOCs. This generally occurs when the two arms of a double envelopment complete their linkup.","rect":[89.98998260498047,264.7979736328125,506.2526502609253,255.68978881835938]},{"page":428,"text":"C-15. Intervals in an attacking force can also occur during combat operations as the result of different rates","rect":[89.98998260498047,282.32293701171877,522.0363299827576,273.2147521972656]},{"page":428,"text":"of advance by movement formations that face different levels of enemy resistance and different terrain. An","rect":[89.97993469238281,293.7857971191406,521.8263454437256,284.6776123046875]},{"page":428,"text":"encircled enemy force attempts to discover intervals and take advantage of them as it tries to escape or","rect":[89.97993469238281,305.3088073730469,521.8974511680603,296.20062255859377]},{"page":428,"text":"breakout of the encirclement. Once the enveloping force completes the linkup that creates the encirclement,","rect":[89.97993469238281,316.831787109375,521.9492750167847,307.7236022949219]},{"page":428,"text":"it must close these intervals as quickly as possible to prevent enemy forces from exploiting them.","rect":[89.97993469238281,328.294677734375,478.8239698410034,319.1864929199219]},{"page":428,"text":"C-16. An enemy force may attempt to cut off an encircling force and extend its flank beyond the area of the","rect":[89.97993469238281,345.81964111328127,522.1197786407471,336.7114562988281]},{"page":428,"text":"friendly attack. If the enveloping unit attempts to outflank such a hostile extension, it may lead to the","rect":[89.97993469238281,357.3426513671875,522.0234041290283,348.2344665527344]},{"page":428,"text":"overextension of the enveloping force or to a dangerous separation of the enveloping force from support. It","rect":[89.97993469238281,368.8055419921875,521.9527964553834,359.6973571777344]},{"page":428,"text":"is usually better to take advantage of the enemy force’s extension and subsequent weakness by penetrating","rect":[89.97993469238281,380.3285217285156,521.9247341156006,371.2203369140625]},{"page":428,"text":"the thinly held front of an enemy force rather than risk the overextension of the enveloping force in an effort","rect":[89.9800033569336,391.8515625,522.0701670608521,382.7433776855469]},{"page":428,"text":"to outflank the enemy force’s positions completely. Alternatively, in response to the unfolding encirclement","rect":[89.9799575805664,403.3144226074219,522.0604624710084,394.20623779296877]},{"page":428,"text":"an enemy force may attempt a frontal, spoiling attack. In this case, the friendly force in contact defends itself","rect":[89.97994995117188,414.83740234375,521.9330956993103,405.7292175292969]},{"page":428,"text":"or engages in a delaying operation, while the enveloping force continues the envelopment or moves directly","rect":[89.97994995117188,426.36041259765627,521.8857936859131,417.2522277832031]},{"page":428,"text":"toward the enemy force in a counterattack.","rect":[89.97994995117188,437.82330322265627,260.71868419647219,428.7151184082031]},{"page":428,"text":"C-17. Commanders of highly mobile forces forming the inner encircling arm may choose not to establish a","rect":[89.97994995117188,455.3482666015625,521.9900178985596,446.2400817871094]},{"page":428,"text":"continuous series of positions around an encircled enemy force. They may order subordinate forces to occupy","rect":[89.97994995117188,466.81121826171877,522.0131130218506,457.7029724121094]},{"page":428,"text":"only key terrain from which they can strike at encircled enemy forces to prevent them from concentrating","rect":[89.9800033569336,478.3341979980469,521.9539699554443,469.22601318359377]},{"page":428,"text":"forces and to isolate them further. Units who adopt this technique need to be able to detect enemy attempts","rect":[89.9799575805664,489.857177734375,521.9229266624451,480.7489929199219]},{"page":428,"text":"to breakout and concentrate sufficient combat power against these attempts to thwart their efforts to isolate","rect":[89.9799575805664,501.320068359375,521.9430208282471,492.2118835449219]},{"page":428,"text":"encircled enemy forces. Units of the outer encircling arms prevent additional enemy forces from reinforcing","rect":[89.97996520996094,512.8430786132813,522.0071926116943,503.7348937988281]},{"page":428,"text":"the isolated enemy force or interfering with the activities of the inner encircling arm.","rect":[89.97996520996094,524.3660888671875,428.8470411300659,515.2579345703125]},{"page":428,"text":"C-18. Once units decide to destroy encircled enemy forces, they reduce those enemy forces as rapidly as","rect":[89.98998260498047,541.8309326171875,521.9455096702576,532.7227783203125]},{"page":428,"text":"possible to free resources for use elsewhere. The reduction of an encircled enemy force continues without","rect":[89.98998260498047,553.35400390625,522.0280528030396,544.245849609375]},{"page":428,"text":"interruption, using the maximum concentration of forces and fires, until the encircled enemy force’s complete","rect":[89.98998260498047,564.876953125,521.9902620391846,555.768798828125]},{"page":428,"text":"destruction or surrender. Units may destroy encircled enemy forces by fires or by maneuver.","rect":[89.97993469238281,576.33984375,459.56765270233157,567.231689453125]},{"page":428,"text":"Reduction by Fires","rect":[72.0,600.8607177734375,161.15099582290649,591.0555419921875]},{"page":428,"text":"C-19. Reducing an encircled enemy force by fires alone is the least preferred method to destroy an enemy","rect":[90.0,618.414306640625,521.8473415374756,609.30615234375]},{"page":428,"text":"force. This method implies that the encircling friendly forces commander will use fire support as the primary","rect":[90.0,629.877197265625,522.1133937835693,620.76904296875]},{"page":428,"text":"or sole means of reducing the encircled enemy force. It includes the use of artillery, mortars, direct fires,","rect":[90.0,641.4002075195313,521.9924268722534,632.2920532226563]},{"page":428,"text":"fixed- and rotary-wing aviation (including armed UAS), and cyber and electromagnetic warfare capabilities.","rect":[90.0,652.9232177734375,521.9241895675659,643.8150634765625]},{"page":428,"text":"C-20. This method has advantages and disadvantages. An advantage is that it generally reduces the number","rect":[90.0,670.3880615234375,522.0344140586853,661.2799072265625]},{"page":428,"text":"of casualties suffered by the encircling force. Disadvantages of this method include an extensive amount of","rect":[90.00003814697266,681.9110717773438,521.9929711875916,672.8029174804688]},{"page":428,"text":"attack/delivery systems, ammunition, and time to reduce the encircled force. Additionally, fires alone might","rect":[90.00003814697266,693.43408203125,522.0254893264771,684.325927734375]},{"page":428,"text":"not be sufficient to force the surrender of the encircled enemy force. In most cases, reducing an encircled","rect":[90.00003814697266,704.8969116210938,522.0165920257568,695.7887573242188]},{"page":428,"text":"enemy force requires using fires and movement.","rect":[90.00003814697266,716.419921875,283.0012159347534,707.311767578125]},{"page":428,"text":"C-4","rect":[72.1199951171875,754.1790161132813,86.60099249267579,747.5280151367188]},{"page":428,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":428,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":429,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":429,"text":"Reduction by Maneuver","rect":[90.0,84.62071228027344,203.6407905731201,74.81556701660156]},{"page":429,"text":"C-21. Reduction by maneuver uses a combination of fire and ground maneuver forces to attack and destroy","rect":[108.0,102.11431884765625,540.0355129241943,93.00614166259766]},{"page":429,"text":"an encircled enemy force. In many cases the constraints of time, munitions, and availability of sufficient fires","rect":[108.01001739501953,113.6373291015625,539.9766986351013,104.5291519165039]},{"page":429,"text":"assets will lead a commander to use the reduction by fires and movement method. The four techniques for","rect":[108.01001739501953,125.16033935546875,540.0393579063416,116.05216217041016]},{"page":429,"text":"reducing an encircled enemy are squeeze, hammer and anvil, wedge, and escape route.","rect":[108.01001739501953,136.6231689453125,454.5548048019409,127.5149917602539]},{"page":429,"text":"Squeeze Technique","rect":[90.01409912109375,160.12010192871095,169.8194246368408,151.20230102539063]},{"page":429,"text":"C-22. The squeeze technique uses simultaneous, coordinated attacks on enemy forces from various","rect":[108.01002502441406,177.66510009765626,540.0161883811951,168.55691528320313]},{"page":429,"text":"directions. Following the initial encirclement, the capture or destruction of an enemy force is methodical and","rect":[108.01002502441406,189.12799072265626,540.0423488616943,180.01980590820313]},{"page":429,"text":"thorough. Units use fire and movement together in a controlled contraction of the encirclement. As an","rect":[108.01000213623047,200.6510009765625,540.0051174163818,191.54281616210938]},{"page":429,"text":"enemy’s perimeter contracts, commanders remove units from the inner perimeter and add them to the reserve","rect":[108.01001739501953,212.17401123046876,540.0967073516846,203.06582641601563]},{"page":429,"text":"depending on the terrain and other mission variables. This technique is effective against battalion-size or","rect":[108.01001739501953,223.63690185546876,540.0403955039978,214.52871704101563]},{"page":429,"text":"smaller groups of encircled enemy forces. Figure C-3 depicts the squeeze technique.","rect":[108.01001739501953,235.159912109375,445.3814649581909,226.05172729492188]},{"page":429,"text":"Figure C-3. Squeeze technique","rect":[242.2379608154297,515.4794311523438,387.86161708068848,506.0906982421875]},{"page":429,"text":"C-23. The squeeze technique promotes an enemy force’s confusion and rapid dispersion of combat power","rect":[108.02002716064453,538.9362182617188,540.0473535118103,529.8280639648438]},{"page":429,"text":"and prevents an enemy commander from using the enemy’s reserves in a decisive manner. The friendly unit","rect":[108.01998901367188,550.459228515625,540.0362925491334,541.35107421875]},{"page":429,"text":"shapes the operation by initially concentrating on destroying enemy command nodes, air defense systems,","rect":[108.02001190185547,561.9822387695313,540.0379590988159,552.8740844726563]},{"page":429,"text":"artillery systems, and sustainment capabilities. These sustainment capabilities include any drop zones,","rect":[108.02001190185547,573.4451293945313,540.0564527511597,564.3369750976563]},{"page":429,"text":"landing zones, or airstrips available to the enemy forces that would allow them to receive support from","rect":[108.02001190185547,584.9681396484375,540.0483069381714,575.8599853515625]},{"page":429,"text":"outside the encirclement.","rect":[108.02001190185547,594.4671630859375,208.32322216033936,587.383056640625]},{"page":429,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":429,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":429,"text":"C-5","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.5280151367188]},{"page":430,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":430,"text":"Hammer and Anvil Technique","rect":[72.0,83.49430847167969,197.8923006134033,74.57650756835938]},{"page":430,"text":"C-24. The hammer and anvil technique employs a stationary blocking force as an anvil on one or more sides","rect":[90.00595092773438,100.97918701171875,522.0053241233826,91.87100982666016]},{"page":430,"text":"of the inner perimeter, while other elements of the encircling force use offensive action as a hammer to force","rect":[90.00595092773438,112.502197265625,522.0207185821533,103.3940200805664]},{"page":430,"text":"the encircled enemy force against the blocking force. Either the anvil or the hammer can destroy the enemy","rect":[90.00589752197266,124.02520751953125,522.0283718109131,114.91703033447266]},{"page":430,"text":"force. Usually the hammer, as the attacking element, accomplishes this task. This technique is most effective","rect":[90.00595092773438,135.48809814453126,521.9676790313721,126.37992095947266]},{"page":430,"text":"when the blocking force is located on or to the rear of a natural terrain obstacle. On favorable terrain, units","rect":[90.00595092773438,147.0111083984375,521.9163959007263,137.90292358398438]},{"page":430,"text":"can use an airborne or air assault force as the anvil or blocking element. Figure C-4 depicts the hammer","rect":[90.00595092773438,158.5340576171875,521.9731957969666,149.42587280273438]},{"page":430,"text":"technique.","rect":[90.00595092773438,169.97691345214845,131.44867992401124,160.88876342773438]},{"page":430,"text":"Figure C-4. Hammer technique","rect":[224.46432495117188,434.5950927734375,369.5408773345947,425.20635986328127]},{"page":430,"text":"Wedge Technique","rect":[71.9999771118164,464.05389404296877,146.22611714172363,455.1160583496094]},{"page":430,"text":"C-25. The wedge technique uses a unit to divide enemy forces in the pocket while the rest of the encircling","rect":[89.99590301513672,481.56884765625,521.9440822601318,472.4606628417969]},{"page":430,"text":"force remains in place. This technique allows units to concentrate against a small portion of the encircled","rect":[89.99589538574219,493.03173828125,521.8934230804443,483.9235534667969]},{"page":430,"text":"enemy force. However, the encircling force maintains pressure on other encircled enemy forces to prevent","rect":[89.99589538574219,504.5547790527344,522.0295786819459,495.44659423828127]},{"page":430,"text":"them from reinforcing or supporting the threatened area. The unit dividing the pocket conducts sudden and","rect":[89.99589538574219,516.0777587890625,521.9482326507568,506.9695739746094]},{"page":430,"text":"swift attacks immediately after the end of supporting preparation fires. Figure C-5 depicts the wedge","rect":[89.99589538574219,527.5406494140625,522.1234407501221,518.4324951171875]},{"page":430,"text":"technique.","rect":[89.99585723876953,539.043701171875,131.43857860565186,529.95556640625]},{"page":430,"text":"C-6","rect":[72.1199951171875,754.1790161132813,86.60099249267579,747.5280151367188]},{"page":430,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":430,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":431,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":431,"text":"Figure C-5. Wedge technique","rect":[246.12001037597657,332.2742004394531,383.9370870513916,322.8854675292969]},{"page":431,"text":"Escape Route Technique","rect":[89.99838256835938,361.71295166015627,192.79259968566894,352.795166015625]},{"page":431,"text":"C-26. The escape route technique involves leaving one or more gaps in the inner encircling arm to entice","rect":[108.00433349609375,379.25799560546877,539.9133577423096,370.1498107910156]},{"page":431,"text":"enemy forces to attempt a breakout. Once an enemy force starts moving and is no longer sheltered in","rect":[108.00433349609375,390.7208557128906,540.0144557952881,381.6126708984375]},{"page":431,"text":"defensive positions, that moving enemy force is more vulnerable to acquisition, attack, and destruction. A","rect":[108.00433349609375,402.2438659667969,539.9656415023803,393.13568115234377]},{"page":431,"text":"unit using this technique should integrate military information support operations with constant offensive","rect":[108.00433349609375,413.766845703125,540.1137971954346,404.6586608886719]},{"page":431,"text":"action to demoralize the escaping enemy force.","rect":[107.98426818847656,425.229736328125,296.48247814178469,416.1215515136719]},{"page":431,"text":"C-27. The negative aspect of these techniques is that they require considerable forces and supplies, which","rect":[107.98426818847656,442.7547302246094,539.9477443695068,433.6465148925781]},{"page":431,"text":"are not always available. Therefore, at times the encircling force has to limit itself to less decisive measures.","rect":[107.98429870605469,454.2777099609375,540.0162305831909,445.1695251464844]},{"page":431,"text":"These include temporarily containing or fixing bypassed enemy forces until resources become available to","rect":[107.98428344726563,465.7406005859375,540.0065822601318,456.6324157714844]},{"page":431,"text":"enable the encircling force to destroy the enemy force. Continued isolation of the encircled force can only be","rect":[107.98429870605469,477.26361083984377,540.0585603790283,468.1554260253906]},{"page":431,"text":"guaranteed when the enemy force cannot strengthen its forces by inserting additional units and supplies by","rect":[107.98428344726563,488.78662109375,540.0173854827881,479.6784362792969]},{"page":431,"text":"air. Even total, long-term isolation does not necessarily lead to decisive defeat of an encircled enemy. It is a","rect":[107.98428344726563,500.2494812011719,540.0338411407471,491.14129638671877]},{"page":431,"text":"temporary measure designed to provide additional time to the attacking force.","rect":[107.98429870605469,511.7724609375,418.69951915740969,502.6642761230469]},{"page":431,"text":"DEFENDING ENCIRCLED","rect":[90.0,535.1097412109375,261.49265329742436,525.4215698242188]},{"page":431,"text":"C-28. Encirclement of a friendly force is likely to occur during highly mobile and fluid operations or when","rect":[108.0,555.2343139648438,540.0764064788818,546.1261596679688]},{"page":431,"text":"operating in restrictive terrain. Unit offensive actions may result in encirclement. Likewise, encirclements","rect":[108.0,566.75732421875,540.0214374046326,557.649169921875]},{"page":431,"text":"may occur when units employ detachments left in contact. Units anticipate becoming encircled when assigned","rect":[108.0,578.22021484375,540.0459499359131,569.112060546875]},{"page":431,"text":"stay-behind missions or when occupying either a strong point or a combat outpost. Units make appropriate","rect":[108.0,589.7431640625,539.8978548126221,580.635009765625]},{"page":431,"text":"preparations in these situations.","rect":[108.0,601.2461547851563,234.10473155975343,592.1580200195313]},{"page":431,"text":"C-29. If a unit finds itself encircled, they immediately form a perimeter defense which can evolve into","rect":[108.0,618.7310791015625,539.9601955413818,609.6229248046875]},{"page":431,"text":"defending an encirclement. If this happens, distinct tactics exist for the encircled force. An encircled force","rect":[107.98999786376953,630.2540283203125,540.0234041290283,621.1458740234375]},{"page":431,"text":"has the following options: continue to defend encircled, conduct a breakout, exfiltrate toward other friendly","rect":[107.98997497558594,641.7169189453125,539.9628200531006,632.6087646484375]},{"page":431,"text":"forces, or attack deeper into enemy-controlled territory. Once encircled, the unit’s form of maneuver depends","rect":[107.98999786376953,653.2399291992188,540.1024310569763,644.1317749023438]},{"page":431,"text":"on the senior commander’s intent and mission variables, including the—","rect":[107.97993469238281,664.762939453125,398.4998588562012,655.65478515625]},{"page":431,"text":" Availability of defensible terrain.","rect":[133.1999969482422,678.2343139648438,284.5051221847534,669.1261596679688]},{"page":431,"text":" Relative combat power of friendly and enemy forces.","rect":[133.1999969482422,691.7343139648438,364.48479747772219,682.6261596679688]},{"page":431,"text":" Sustainment status of the encircled force and its ability to be resupplied, including the ability to","rect":[133.1999969482422,705.2343139648438,539.9241847991943,696.1261596679688]},{"page":431,"text":"treat and evacuate wounded Soldiers.","rect":[151.1999969482422,714.6831665039063,300.3336133956909,707.5890502929688]},{"page":431,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":431,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":431,"text":"C-7","rect":[507.47698974609377,754.1790161132813,521.9579794921875,747.5280151367188]},{"page":432,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":432,"text":" Morale and fighting capacity of the Soldiers.","rect":[115.19999694824219,83.51434326171875,312.34160900115969,74.40616607666016]},{"page":432,"text":"C-30. The senior commander in an encirclement assumes command over all encircled forces and takes","rect":[89.9937515258789,98.96517181396485,522.0202777366638,91.87100982666016]},{"page":432,"text":"immediate action to protect them. In the confusion leading to an encirclement, it may be difficult to determine","rect":[89.9937515258789,112.502197265625,522.1103181915283,103.3940200805664]},{"page":432,"text":"what units are encircled, let alone identify the senior commander. However, the senior commander is","rect":[89.9937515258789,124.02520751953125,522.0377948265076,114.91703033447266]},{"page":432,"text":"identified within the encirclement as quickly as possible. That senior commander needs to decide quickly","rect":[89.9937515258789,135.48809814453126,521.9564113616943,126.37992095947266]},{"page":432,"text":"what assets should stay within the potential encircled pocket and what assets should leave. The senior","rect":[89.9937973022461,147.0111083984375,521.9382836875916,137.90292358398438]},{"page":432,"text":"commander immediately informs their higher echelon headquarters of the situation. Simultaneously, the","rect":[89.99375915527344,158.5340576171875,521.9881868438721,149.42587280273438]},{"page":432,"text":"senior commander directs the performance of the following tasks:","rect":[89.99375915527344,169.9969482421875,353.3594431838989,160.88876342773438]},{"page":432,"text":" Establish security.","rect":[115.19999694824219,183.47430419921876,206.50532054901124,174.36611938476563]},{"page":432,"text":" Re-establish a chain of command.","rect":[115.19999694824219,194.9502716064453,269.02309703826907,187.86611938476563]},{"page":432,"text":" Establish a reserve.","rect":[115.19999694824219,208.4502716064453,210.70470714569093,201.36611938476563]},{"page":432,"text":" Establish security elements as far forward as possible to provide early warning.","rect":[115.19999694824219,223.97430419921876,450.28594493865969,214.86611938476563]},{"page":432,"text":" Reorganize and centralize control of all artillery.","rect":[115.19999694824219,237.47430419921876,327.94765758514407,228.36611938476563]},{"page":432,"text":" Maintain morale.","rect":[115.19999694824219,248.9502716064453,202.06444835662843,241.86611938476563]},{"page":432,"text":" Centralize the control of all supplies.","rect":[115.19999694824219,264.4542541503906,280.9679822921753,255.36611938476563]},{"page":432,"text":"C-31. The senior commander positions security elements as far forward as possible to reestablish contact","rect":[90.00376892089844,281.9892578125,522.0051646194459,272.8810729980469]},{"page":432,"text":"with enemy forces and provide early warning. Vigorous patrolling begins immediately. Each unit clears its","rect":[90.00376892089844,293.4521484375,521.9709002952576,284.3439636230469]},{"page":432,"text":"position to ensure that there are no enemy forces within the perimeter. Units use technical assets and","rect":[90.00376892089844,304.97515869140627,521.9501247406006,295.8669738769531]},{"page":432,"text":"electromagnetic warfare systems to augment local security and locate areas along the perimeter where enemy","rect":[90.00376892089844,316.4981384277344,521.9899806976318,307.38995361328127]},{"page":432,"text":"forces are deploying additional forces.","rect":[90.01377868652344,327.9610290527344,243.5912733078003,318.85284423828127]},{"page":432,"text":"C-32. The senior commander re-establishes unity of command. The senior commander reorganizes any","rect":[90.01377868652344,345.4759826660156,522.0342922210693,336.3677978515625]},{"page":432,"text":"fragmented units and places Soldiers separated from their parent units under the control of other units. The","rect":[90.01377868652344,356.99896240234377,521.9990511016846,347.8907775878906]},{"page":432,"text":"senior commander establishes a clear chain of command throughout the entire encircled force, adjusts support","rect":[90.00374603271485,368.46185302734377,522.0585703811646,359.3436584472656]},{"page":432,"text":"relationships with the encirclement, and re-establishes communications with units outside the encircled force.","rect":[90.00374603271485,379.9648132324219,522.0151319503784,370.8766784667969]},{"page":432,"text":"ORGANIZATION OF FORCES FOR AN ENCIRCLED DEFENDER","rect":[72.0,403.3680114746094,364.45222568511965,395.0760192871094]},{"page":432,"text":"C-33. With the establishment of a perimeter defense, the commander learns about the specific capabilities","rect":[90.0,423.2742614746094,521.9261615257263,414.1861267089844]},{"page":432,"text":"and limitations of the different friendly units isolated in the encirclement. The commander uses this","rect":[89.99002075195313,434.7572021484375,522.0481097679138,425.6490173339844]},{"page":432,"text":"information to design a defense to maximize the capabilities of available forces. Forward units establish","rect":[89.99002075195313,446.2801818847656,521.9249172210693,437.1719970703125]},{"page":432,"text":"mutually supporting positions around the perimeter and in depth along principal avenues of approach. Units","rect":[89.98001098632813,457.8031921386719,522.0391375999451,448.69500732421877]},{"page":432,"text":"occupy the best available defensible terrain. It may be necessary to attack to seize key or decisive terrain to","rect":[89.98001098632813,469.2660827636719,521.9857082366943,460.15789794921877]},{"page":432,"text":"incorporate that terrain into the perimeter defense. Once a unit is given an assigned area, preparations are the","rect":[89.98001098632813,480.7890625,522.0444612579346,471.6808776855469]},{"page":432,"text":"same as in the defense. Figure C-6 illustrates an encircled division’s perimeter defense. Encircled units make","rect":[89.98001098632813,492.251953125,522.0393953399658,483.1437683105469]},{"page":432,"text":"their defensive positions as strong as possible, given time and resource constraints. The unit anticipates that","rect":[89.96997833251953,503.77496337890627,522.0512461624146,494.6667785644531]},{"page":432,"text":"enemy forces will attempt to split the defenses of the encircled force and defeat it in detail.","rect":[89.96997833251953,515.2979736328125,452.8942823410034,506.1897888183594]},{"page":432,"text":"C-8","rect":[72.1199951171875,754.18798828125,86.60099249267579,747.5280151367188]},{"page":432,"text":"FM 3-90","rect":[271.2540283203125,754.18798828125,304.75198583984379,747.6090087890625]},{"page":432,"text":"01 May 2023","rect":[448.4369812011719,755.9609985351563,500.7518942871094,747.510009765625]},{"page":433,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":433,"text":"Figure C-6. Encircled division perimeter defense","rect":[200.22000122070313,422.9341735839844,429.8433370513916,413.5454406738281]},{"page":433,"text":"C-34. The encircled force commander establishes a reserve that is mobile enough to react quickly to events","rect":[107.99593353271485,446.45111083984377,539.9339129905701,437.3429260253906]},{"page":433,"text":"anywhere along the perimeter. Therefore, given the availability of sufficient fuel, the unit constitutes a reserve","rect":[107.99593353271485,457.91400146484377,540.1735506134033,448.8058166503906]},{"page":433,"text":"using some of any available armored, mechanized, and Stryker units. The unit centrally positions this mobile","rect":[107.99593353271485,469.4369812011719,540.0629549102783,460.32879638671877]},{"page":433,"text":"reserve to take advantage of interior lines, which exist if the encircled force commander can maneuver the","rect":[107.99593353271485,480.9599914550781,539.9240999298096,471.851806640625]},{"page":433,"text":"reserve or reinforce threatened positions on the perimeter faster than an enemy force can shift location or","rect":[107.99589538574219,492.4228820800781,539.9812524375916,483.314697265625]},{"page":433,"text":"reinforce. A unit can achieve interior lines through a central position (with operations diverging from a central","rect":[107.99591064453125,503.94586181640627,540.0809092483521,494.8376770019531]},{"page":433,"text":"point) from superior lateral LOCs or greater tactical mobility. If only dismounted infantry forces are","rect":[107.99591064453125,515.4688720703125,540.0583162384033,506.3606872558594]},{"page":433,"text":"available, the unit establishes small local reserves to react to potential threats. The unit organizes a mobile","rect":[107.99591064453125,526.9317626953125,539.8960237579346,517.8236083984375]},{"page":433,"text":"anti-armor element from the best available anti-armor systems. If possible, subordinate echelons also retain","rect":[107.99591064453125,538.4547119140625,539.8719387054443,529.3465576171875]},{"page":433,"text":"reserves.","rect":[107.98590087890625,547.9537353515625,143.30739879608155,543.2042846679688]},{"page":433,"text":"C-35. While defending encircled, a unit may use the reserve to limit penetrations along the perimeter. The","rect":[107.98590087890625,567.442626953125,540.0099763946533,558.33447265625]},{"page":433,"text":"reserve may conduct spoiling attacks or counterattacks. The commander initiates a counterattack at the","rect":[107.98590087890625,578.965576171875,540.0156526641846,569.857421875]},{"page":433,"text":"decisive moment and location as the enemy force attempts to penetrate friendly defensive positions.","rect":[107.98590087890625,590.4885864257813,507.3310499191284,581.3804321289063]},{"page":433,"text":"BREAK OUT FROM AN ENCIRCLEMENT","rect":[90.0,613.8297119140625,362.9344314231873,604.155517578125]},{"page":433,"text":"C-36. A breakout is an operation conducted by an encircled force to regain freedom of movement or contact","rect":[108.0,633.9542846679688,539.9810557327271,624.8461303710938]},{"page":433,"text":"with friendly units (ADP 3-90). It differs from other attacks only in that a simultaneous defense in other areas","rect":[108.01000213623047,645.4171752929688,540.0084979515076,636.3090209960938]},{"page":433,"text":"of the perimeter must be maintained. A breakout is both an offensive and a defensive operation. An encircled","rect":[108.01002502441406,656.920166015625,540.0022487640381,647.83203125]},{"page":433,"text":"force normally attempts to conduct breakouts when one of the following four conditions exist:","rect":[108.01000213623047,668.4631958007813,484.8902049026489,659.3550415039063]},{"page":433,"text":" The commander directs the breakout or the breakout falls within the intent of a higher echelon","rect":[133.1999969482422,681.9542846679688,539.9841213226318,672.8461303710938]},{"page":433,"text":"commander.","rect":[151.1999969482422,691.3931274414063,200.92324352264405,684.3090209960938]},{"page":433,"text":" The encircled force lacks sufficient relative combat power to defend itself against enemy forces","rect":[133.1999969482422,706.914306640625,539.9311053733826,697.80615234375]},{"page":433,"text":"attempting to reduce the encirclement.","rect":[151.1999969482422,718.4373168945313,304.7804822921753,709.3291625976563]},{"page":433,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":433,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":433,"text":"C-9","rect":[507.47698974609377,754.18798828125,521.9579794921875,747.5280151367188]},{"page":434,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":434,"text":" The encircled force lacks adequate terrain available to conduct its defense.","rect":[115.19999694824219,83.49430847167969,431.1368360519409,74.40616607666016]},{"page":434,"text":" The encircled force cannot sustain itself long enough for relief by forces from outside the encircled","rect":[115.19999694824219,97.01434326171875,522.1076564788818,87.90616607666016]},{"page":434,"text":"pocket.","rect":[133.1999969482422,108.45719909667969,162.40429210662843,99.36905670166016]},{"page":434,"text":"ORGANIZATION OF FORCES FOR A BREAKOUT","rect":[72.0,131.86801147460938,298.57428884506228,123.57601165771485]},{"page":434,"text":"C-37. Encircled units conducting a breakout attack typically task-organize to perform rupture, follow and","rect":[90.0,151.7943115234375,521.9492092132568,142.68612670898438]},{"page":434,"text":"assume, main body, and rear guard missions. The senior commander within an encirclement organizes a","rect":[90.0,163.31732177734376,521.9659090118408,154.20913696289063]},{"page":434,"text":"reserve and a separate deception force if sufficient forces exist. Previous combat may have attired the combat","rect":[90.0,174.78021240234376,522.0263438186646,165.67202758789063]},{"page":434,"text":"power of encircled units. The commander prioritizes which ones to resource if sufficient combat power does","rect":[90.0,186.28318786621095,522.0673358421326,177.19503784179688]},{"page":434,"text":"not exist to resource each of the forces. See the applicable organization depicted in figure C-7.","rect":[90.0,197.826171875,467.3832960128784,188.71798706054688]},{"page":434,"text":"Figure C-7. Organization of forces for a breakout operation","rect":[157.50473022460938,480.2499694824219,436.5066196937561,470.8612365722656]},{"page":434,"text":"C-38. Normally, the commander’s first priority is to resource the force with the rupture mission. The","rect":[89.9999771118164,503.76690673828127,522.0022249298096,494.6587219238281]},{"page":434,"text":"commander typically assigns multiple missions to subordinate forces because there are typically not enough","rect":[89.9999771118164,515.2297973632813,522.0260524749756,506.1216125488281]},{"page":434,"text":"forces in the encirclement to have separate forces for each required mission. For example, the follow and","rect":[89.9999771118164,526.7327880859375,521.9766750335693,517.64453125]},{"page":434,"text":"assume force could receive a be-prepared mission to help extract the rear guard, a mission generally given to","rect":[90.0,538.2757568359375,522.0956935882568,529.1676025390625]},{"page":434,"text":"the reserve. Forces located outside the encirclement assist the breakout by conducting shaping operations.","rect":[90.00000762939453,549.7386474609375,522.0443677902222,540.6304931640625]},{"page":434,"text":"Above all, the encircled force maintains the momentum of the breakout attack; otherwise, it is more","rect":[90.0,560.7706909179688,522.0498323516846,552.1535034179688]},{"page":434,"text":"vulnerable to destruction than it was before the breakout attempt.","rect":[90.0,572.7646484375,350.51809215545657,563.676513671875]},{"page":434,"text":"C-39. The encircled force reorganizes to conduct the breakout based on available resources. Without","rect":[90.0,590.24951171875,521.9524912796021,581.141357421875]},{"page":434,"text":"resupply, armored, mechanized, and motorized infantry units may not be able to move all their vehicles","rect":[90.0,601.7725830078125,521.9589374046326,592.6644287109375]},{"page":434,"text":"during the breakout attack. Priority of support may be limited to the rupture force and the rear guard, with","rect":[90.0,613.2955322265625,521.9485378265381,604.1873779296875]},{"page":434,"text":"the remaining force keeping only sufficient transportation assets to move the wounded and critical assets and","rect":[90.0,624.7583618164063,522.0258693695068,615.6502075195313]},{"page":434,"text":"supplies. The breakout plan outlines the commander’s destruction criteria for equipment or supplies left","rect":[90.0,636.2613525390625,522.0193247756959,627.1732177734375]},{"page":434,"text":"behind. The unit destroys all vehicles, critical munitions, supplies, and equipment (except medical supplies)","rect":[90.0,647.7442626953125,522.0363671836853,638.6361083984375]},{"page":434,"text":"it cannot move.","rect":[90.0,657.2432861328125,151.90857982635499,650.1591796875]},{"page":434,"text":"C-40. An encircled force attacks using the rupture force to penetrate the enemy defensive positions in at least","rect":[90.0,676.7822875976563,521.9596323928834,667.6741333007813]},{"page":434,"text":"one location. The unit produces overwhelming combat power at each breakout point. The unit assigns the","rect":[90.0,688.2451782226563,521.9748811798096,679.1370239257813]},{"page":434,"text":"rupture force, which varies in size from one-third to two-thirds of the total encircled force, the mission to","rect":[90.0,699.7481689453125,521.9972438812256,690.6600341796875]},{"page":434,"text":"penetrate the enemy force’s encircling position, widen the gap, and hold the shoulders of the gap until all","rect":[89.98998260498047,711.2911987304688,521.9285044631959,702.1829223632813]},{"page":434,"text":"C-10","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.5280151367188]},{"page":434,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":434,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":435,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":435,"text":"other encircled forces can move through. The rupture force must have sufficient strength to penetrate the","rect":[108.0,83.51434326171875,540.0240755157471,74.40616607666016]},{"page":435,"text":"enemy force’s position. This force must use surprise, mobility, and firepower to achieve a favorable combat","rect":[108.0,94.97723388671875,540.0835337600709,85.86905670166016]},{"page":435,"text":"power ratio over the enemy force at the point of attack.","rect":[108.0,106.500244140625,328.24456310272219,97.3920669555664]},{"page":435,"text":"C-41. Initially, the rupture force is the main effort. The attack occurs where the unit anticipates a successful","rect":[108.0,124.02520751953125,540.0669321975709,114.91703033447266]},{"page":435,"text":"rupture of the enemy force’s inner ring, which facilitates subsequent operations by enabling the unit to attack","rect":[108.0,135.48809814453126,539.9812526702881,126.37992095947266]},{"page":435,"text":"enemy units from their flanks and rear. The rupture force unit probably has additional attached assets, such","rect":[108.01001739501953,147.0111083984375,539.9395046234131,137.90286254882813]},{"page":435,"text":"as additional maneuver forces and engineers. The unit should integrate these assets to achieve the rupture.","rect":[108.01000213623047,158.5340576171875,531.3964796066284,149.42587280273438]},{"page":435,"text":"C-42. The follow and assume force follows the rupture attack and is committed to maintain the momentum","rect":[108.01001739501953,175.9789276123047,539.8849158248902,166.89077758789063]},{"page":435,"text":"of the attack and seize objectives past the rupture. After the rupture force seizes a gap in the enemy","rect":[108.00000762939453,187.52197265625,539.9938259124756,178.40377807617188]},{"page":435,"text":"encirclement, the follow and assume force normally main effort until completing linkup operations with","rect":[108.00000762939453,199.044921875,539.9562892913818,189.93673706054688]},{"page":435,"text":"another friendly force. When a unit receives a follow and assume mission in a breakout, its commander must","rect":[108.0000228881836,210.5078125,540.0843272171021,201.39962768554688]},{"page":435,"text":"coordinate closely with the rupture force commander regarding the location of the gap, the enemy situation","rect":[108.0000228881836,222.03082275390626,539.9729518890381,212.92263793945313]},{"page":435,"text":"at the rupture point, and the enemy situation, if known, along the direction of attack past the rupture point.","rect":[108.0000228881836,233.49371337890626,539.9370069503784,224.38552856445313]},{"page":435,"text":"The commander does not assign this force supporting shaping tasks, such as clear routes and fix bypassed","rect":[108.0000228881836,245.0167236328125,539.9799098968506,235.90853881835938]},{"page":435,"text":"enemy forces, if those tasks dissipate its available combat power. If executing these support tasks is vital to","rect":[108.0000228881836,256.5396728515625,540.0251369476318,247.43148803710938]},{"page":435,"text":"the success of the breakout and resources permit, then the unit designates a separate follow and support force","rect":[108.0000228881836,268.0025634765625,540.0300569610596,258.8943786621094]},{"page":435,"text":"to perform these tasks.","rect":[108.0000228881836,279.5055236816406,198.5838270187378,270.4173889160156]},{"page":435,"text":"C-43. The main body consists of the main command post, the bulk of encircled sustainment assets, the unit’s","rect":[108.0000228881836,297.04052734375,539.9881732444763,287.9323425292969]},{"page":435,"text":"casualties, and some functional and multifunctional support assets. It contains combat forces not required for","rect":[108.0000228881836,308.48333740234377,540.0490014610291,299.39520263671877]},{"page":435,"text":"other missions and has sufficient combat power to protect itself. The overall commander places one","rect":[108.0000228881836,320.0063171386719,540.0723543243408,310.9181823730469]},{"page":435,"text":"subordinate commander in charge of the various elements of the main body to ensure orderly movement.","rect":[108.0,331.5494384765625,540.0081129074097,322.4412536621094]},{"page":435,"text":"Typically, the main body establishes a flank security force that deploys once the main body passes through","rect":[108.0,343.0122985839844,539.9746608734131,333.90411376953127]},{"page":435,"text":"the point of penetration and performs a flank screen or guard mission for the main body.","rect":[108.0,354.5353088378906,461.32729625701907,345.4271240234375]},{"page":435,"text":"C-44. The rear guard consists of Soldiers and equipment left on the perimeter to provide protection for the","rect":[108.01001739501953,372.0602722167969,539.9641389923096,362.95208740234377]},{"page":435,"text":"rupture attack and any supporting efforts, such as deception forces. Forces left in contact must conduct a","rect":[108.01002502441406,383.5231628417969,539.9848299102783,374.41497802734377]},{"page":435,"text":"vigorous delaying operation on the perimeter so that the enemy force cannot isolate any portion of the rear","rect":[108.01000213623047,395.0461730957031,539.8653466758728,385.93798828125]},{"page":435,"text":"guard. Under a single commander, the rear guard protects the main body from attack while it moves from the","rect":[108.01001739501953,406.5691833496094,540.1491975860596,397.46099853515627]},{"page":435,"text":"area. In addition to providing security, the rear guard deceives the enemy forces about the intentions of the","rect":[108.01001739501953,418.0320739746094,539.9640169219971,408.92388916015627]},{"page":435,"text":"encircled force, simulating its activities until the main body clears the gap.","rect":[108.01000213623047,429.5550537109375,406.01360607147219,420.4468688964844]},{"page":435,"text":"C-45. A reserve primarily aims to retain flexibility through offensive action. The unit makes every attempt","rect":[108.01001739501953,447.0800476074219,540.0582652053834,437.97186279296877]},{"page":435,"text":"to keep a small portion of the encircled force uncommitted for employment at the decisive moment to ensure","rect":[108.01002502441406,458.5429382324219,540.1614656524658,449.43475341796877]},{"page":435,"text":"the breakout’s success. The unit may be unable to establish a separate reserve force because of the need to","rect":[108.01002502441406,470.0659484863281,540.0317897796631,460.957763671875]},{"page":435,"text":"resource either the rupture force, the follow and assume force, or the rear guard. In this event, the unit assigns","rect":[108.01002502441406,481.5288391113281,540.0905292015076,472.420654296875]},{"page":435,"text":"and prioritizes various be-prepared missions to the follow and assume force.","rect":[108.01001739501953,493.03179931640627,413.2163038253784,483.94366455078127]},{"page":435,"text":"C-46. A successful diversion is important to the success of any breakout operation. If the diversion fails to","rect":[108.0100326538086,510.57684326171877,540.0483913421631,501.4686584472656]},{"page":435,"text":"deceive the enemy commander regarding the intentions of the encircled force, the enemy commander could","rect":[108.0100326538086,522.0397338867188,540.0342311859131,512.9315795898438]},{"page":435,"text":"direct the enemy’s full combat power at the rupture point. On the other hand, the deception force may rupture","rect":[108.0100326538086,533.562744140625,540.0251741485596,524.45458984375]},{"page":435,"text":"the enemy’s lines. If a rupture occurs, the diversion force commander follows the intent of the commander","rect":[108.01000213623047,545.085693359375,540.0220849571228,535.9775390625]},{"page":435,"text":"of the encircled force. The encircled force commander may choose to exploit the success of forces conducting","rect":[108.01001739501953,556.548583984375,540.0799465179443,547.4404296875]},{"page":435,"text":"a diversion, or the commander may have to disengage them for use elsewhere in the breakout attempt.","rect":[108.01001739501953,568.0715942382813,516.1737623214722,558.9634399414063]},{"page":435,"text":"CONTROL MEASURES FOR A BREAKOUT","rect":[90.0,591.3480224609375,287.3536162376404,583.0559692382813]},{"page":435,"text":"C-47. At a minimum, units use boundaries, a LD or line of contact, a time of the attack, phase lines, an axis","rect":[108.0,611.2542724609375,539.9952533226013,602.1661376953125]},{"page":435,"text":"of advance or direction of attack, objectives, and a limit of advance to control and synchronize breakouts.","rect":[108.0,622.7371826171875,539.8697462081909,613.6189575195313]},{"page":435,"text":"Units only impose those control measures necessary to synchronize operations.","rect":[108.0,634.2601928710938,424.6020460128784,625.1520385742188]},{"page":435,"text":"PLANNING A BREAKOUT","rect":[90.0,657.6221923828125,209.7743010520935,649.5359497070313]},{"page":435,"text":"C-48. The encircled commander initiates a breakout attack as quickly as possible after encirclement by enemy","rect":[108.0,677.5742797851563,539.9926662445068,668.4661254882813]},{"page":435,"text":"forces. At this time, enemy forces are normally also somewhat disorganized, and they may not respond in a","rect":[108.0,689.0371704101563,540.0654573516846,679.9290161132813]},{"page":435,"text":"coordinated manner. Commanders should initiate a breakout attack even though detailed combat information","rect":[108.0,700.5601806640625,540.0565090179443,691.4520263671875]},{"page":435,"text":"about the enemy force’s dispositions is probably not available. The enemy force probably has not yet brought","rect":[108.0,712.0831909179688,540.0972056350709,702.9750366210938]},{"page":435,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":435,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":435,"text":"C-11","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.5280151367188]},{"page":436,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":436,"text":"in sufficient combat power to encircle the friendly force in strength, and weak points probably exist in the","rect":[90.0,83.51434326171875,522.0219392852783,74.40616607666016]},{"page":436,"text":"enemy force’s perimeter.","rect":[90.0,94.97723388671875,190.2441053390503,85.86905670166016]},{"page":436,"text":"C-49. Early in an encirclement, there are gaps between or weaknesses in the enemy’s encircling forces. The","rect":[90.0,112.4921875,521.9826936798096,103.3840103149414]},{"page":436,"text":"friendly unit uses available reconnaissance and surveillance assets, including available joint systems, to","rect":[90.0,124.01519775390625,521.9415187835693,114.89700317382813]},{"page":436,"text":"provide information that increases the accuracy of the unit’s situational understanding and determines enemy","rect":[90.0,135.47808837890626,522.0247707366943,126.36991119384766]},{"page":436,"text":"weak points. The unit’s plans for the breakout attack capitalize on those identified weak points. Although the","rect":[90.0,147.00103759765626,522.0685091094971,137.89285278320313]},{"page":436,"text":"resulting attack may be along a less direct route or over less favorable terrain, it is the best COA because it","rect":[90.0,158.5240478515625,521.9736704788209,149.41586303710938]},{"page":436,"text":"avoids enemy strength and increases the chance for surprise.","rect":[90.0,169.9869384765625,331.9060010910034,160.87875366210938]},{"page":436,"text":"C-50. An encircled force may be operating under adverse conditions and may not have its normalinformation","rect":[90.0,187.50189208984376,522.0542507171631,178.39370727539063]},{"page":436,"text":"collection capabilities. This forces the encircled unit to conduct aggressive reconnaissance to collect","rect":[90.0,199.02490234375,522.0124888381959,189.91671752929688]},{"page":436,"text":"information on enemy forces. The encircled unit also obtains information from joint assets, stay-behind units,","rect":[90.0,210.48779296875,521.9160718917847,201.36959838867188]},{"page":436,"text":"and special operations forces in the area. If the enemy force is in close contact, the encircled unit may need","rect":[89.99996185302735,222.01080322265626,522.0067043304443,212.90261840820313]},{"page":436,"text":"to conduct a reconnaissance in force to ascertain enemy strengths. In any case, the unit quickly selects a COA","rect":[89.99996185302735,233.4736328125,522.0772137680053,224.36544799804688]},{"page":436,"text":"and develops a plan accordingly.","rect":[89.99996185302735,244.99664306640626,221.38820934295655,235.88845825195313]},{"page":436,"text":"C-51. A supporting effort, such as a deception, assists a breakout by diverting enemy attention and resources","rect":[89.99996185302735,262.5115966796875,522.0033099632263,253.40341186523438]},{"page":436,"text":"away from the rupture effort. The force conducting a supporting effort may be located either inside or outside","rect":[89.99996185302735,273.9744873046875,522.0072908477783,264.8663024902344]},{"page":436,"text":"the encirclement area. The enemy force must regard the efforts of this force as credible and a threat to the","rect":[90.0,285.49749755859377,521.9946565704346,276.3893127441406]},{"page":436,"text":"continuity of the enemy force’s maneuver plan. The encircled commander directs the friendly force’s","rect":[90.0,297.0205078125,521.9860370140076,287.9123229980469]},{"page":436,"text":"deception efforts to a point where the enemy force might expect a breakout or relief effort. The deception","rect":[90.0,308.4833679199219,522.0965480804443,299.37518310546877]},{"page":436,"text":"force is as mobile as available vehicles, fuel stocks, and trafficability allow, so it can reposition to take part","rect":[90.0,320.00634765625,522.0834116897584,310.8981628417969]},{"page":436,"text":"in the breakout or maneuver elsewhere to support the breakout. Mobile, self-propelled weapons systems suit","rect":[90.0,331.52935791015627,522.0313487014771,322.4211730957031]},{"page":436,"text":"the needs of forces conducting supporting efforts. Additionally, the probability of a successful breakout","rect":[90.00997924804688,342.99224853515627,522.0203013381959,333.8840637207031]},{"page":436,"text":"increases measurably if another friendly force attacks toward the encircled force as it attempts to breakout.","rect":[90.00997924804688,354.5152282714844,516.5158033370972,345.40704345703127]},{"page":436,"text":"C-52. The encircled unit conducts tactical deception along with cyberspace electromagnetic activities tasks","rect":[90.00997924804688,372.04022216796877,521.9791400413513,362.9320373535156]},{"page":436,"text":"to assist the breakout attempt. Cyberspace electromagnetic activities is the process of planning, integrating,","rect":[90.00999450683594,383.5030822753906,521.9893140792847,374.3948974609375]},{"page":436,"text":"and synchronizing cyberspace operations and electromagnetic warfare operations in support of unified land","rect":[90.00997924804688,395.0260925292969,522.0374050140381,385.91790771484377]},{"page":436,"text":"operations (ADP 3-0). Tactical deception operations mislead enemy forces about the intentions of the","rect":[90.00997924804688,406.549072265625,521.9562044219971,397.4408874511719]},{"page":436,"text":"encircled force, especially the location of the breakout attempt. For example, unmanned aircraft can","rect":[90.01998901367188,418.011962890625,522.0256252288818,408.9037780761719]},{"page":436,"text":"concentrate their activities in an area away from where the rupture effort occurs to deceive enemy forces as","rect":[90.01998901367188,429.5350036621094,522.0036151390076,420.42681884765627]},{"page":436,"text":"to the exact location of the rupture. If it is not possible to breakout immediately, the encircled unit attempts","rect":[90.01998901367188,441.0580139160156,522.0154559593201,431.9498291015625]},{"page":436,"text":"to deceive enemy forces regarding the time and place of the breakout by concealing friendly breakout","rect":[90.01998901367188,452.5209045410156,522.0965342483521,443.4127197265625]},{"page":436,"text":"preparations and changing positions. The encircled unit can also make it appear that the encircled force will","rect":[90.01998901367188,464.0439147949219,521.9854502639771,454.93560791015627]},{"page":436,"text":"make a resolute stand and await relief.","rect":[90.0199966430664,473.48272705078127,243.5915174484253,466.3985900878906]},{"page":436,"text":"C-53. Units can use dummy radio traffic for the enemy to monitor or landlines that the enemy might be able","rect":[90.0200424194336,493.03173828125,522.0945100860596,483.9235534667969]},{"page":436,"text":"tap to convey false information. The breakout should not be along the obvious route toward friendly lines,","rect":[90.02005004882813,504.5547790527344,521.9599561691284,495.44659423828127]},{"page":436,"text":"unless there is no other alternative. In this respect, breakout preparations mirror the preparations for any other","rect":[90.02005004882813,516.0177001953125,522.0823266563416,506.9095153808594]},{"page":436,"text":"offensive operation. As in other offensive actions, secrecy, tactical deception, and surprise allow for success.","rect":[90.02005004882813,527.5406494140625,522.0643873214722,518.4324951171875]},{"page":436,"text":"The other planning considerations for the breakout are the same as for any other attack.","rect":[90.02005004882813,539.063720703125,439.1420545578003,529.95556640625]},{"page":436,"text":"EXECUTING A BREAKOUT","rect":[72.0,562.3422241210938,198.8543028831482,554.2559814453125]},{"page":436,"text":"C-54. The unit exploits darkness and limited visibility during a breakout if friendly encircled forces have","rect":[90.0,582.2343139648438,522.0594148712158,573.1261596679688]},{"page":436,"text":"superior night vision capabilities. Concealment provided by darkness, fog, smoke, or severe weather","rect":[89.9999771118164,593.75732421875,522.0391137657166,584.649169921875]},{"page":436,"text":"conditions favor breakout by mitigating the effectiveness of the encircling enemy weapon systems or night","rect":[89.9999771118164,605.2802734375,522.0764536819459,596.172119140625]},{"page":436,"text":"vision devices/optics. The enemy has difficulty following the movements of the breakout force during","rect":[89.9999771118164,616.7431640625,521.8917751312256,607.635009765625]},{"page":436,"text":"conditions of limited visibility. However, if the encircled force waits for darkness or limited visibility, the","rect":[89.9999771118164,628.2661743164063,521.9712801055908,619.1580200195313]},{"page":436,"text":"encircling enemy may have time to consolidate containment positions. If friendly forces have air superiority,","rect":[89.9999771118164,639.7891845703125,522.0714673995972,630.6810302734375]},{"page":436,"text":"they may initiate a daylight breakout attack to exploit close air support capabilities.","rect":[89.9999771118164,651.2520751953125,422.92422008514407,642.1439208984375]},{"page":436,"text":"C-55. The encircled force takes all possible precautions to deceive the enemy force about the location of the","rect":[89.9999771118164,668.7770385742188,522.0084505157471,659.6688842773438]},{"page":436,"text":"main effort. The rupture force minimizes occupation of attack positions before starting the breakout. An","rect":[90.0,680.300048828125,521.9354763031006,671.19189453125]},{"page":436,"text":"encircled unit may require one or more supporting effort to assist the rupture force in penetrating enemy","rect":[90.0,691.762939453125,522.0082302093506,682.65478515625]},{"page":436,"text":"positions and expanding the shoulders of the rupture. The encircled unit may use feints and demonstrations","rect":[90.0,703.285888671875,521.9539935569763,694.177734375]},{"page":436,"text":"C-12","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.5280151367188]},{"page":436,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":436,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":437,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":437,"text":"to deceive enemy forces concerning the location and time of the main effort. However, deception attacks","rect":[108.0,83.51434326171875,539.9912860374451,74.40616607666016]},{"page":437,"text":"need not always occur first.","rect":[108.0,94.97723388671875,218.26513195037843,85.86905670166016]},{"page":437,"text":"C-56. The encircled commander organizes and controls the rupture force in the same manner as during an","rect":[108.0,112.4921875,539.9924221038818,103.3840103149414]},{"page":437,"text":"attack or movement to contact. Figure C-8 illustrates an example organization of forces for a breakout by an","rect":[108.0,124.01519775390625,540.0233058929443,114.90702056884766]},{"page":437,"text":"encircled division. The rupture force generates overwhelming combat power at the point of penetration and","rect":[107.98999786376953,135.47808837890626,539.8951930999756,126.36991119384766]},{"page":437,"text":"rapidly overwhelms enemy positions and expands the penetration. Encircled units unable to generate","rect":[107.98998260498047,147.00103759765626,540.0541048126221,137.89285278320313]},{"page":437,"text":"sufficient combat power for both the rupture force and the perimeter defense can thin their defensive","rect":[107.98998260498047,158.50401306152345,539.9829378204346,149.41586303710938]},{"page":437,"text":"perimeter in certain areas by using a detachment left in contact in conjunction with a withdrawal before","rect":[107.98998260498047,169.9869384765625,539.9690218048096,160.86874389648438]},{"page":437,"text":"executing the attack. They may also shorten the perimeter’s length, which reduces the size of the area","rect":[107.98997497558594,181.50994873046876,540.0168123321533,172.40176391601563]},{"page":437,"text":"occupied by the encircled force.","rect":[107.98997497558594,193.032958984375,235.94634532928468,183.92477416992188]},{"page":437,"text":"Figure C-8. Example breakout organization of forces by an encircled division","rect":[132.70932006835938,462.85150146484377,497.2229282875061,453.4627685546875]},{"page":437,"text":"C-57. The rupture force applies the breaching fundamentals of suppress, obscure, secure, reduce, and assault","rect":[107.98998260498047,486.3083190917969,539.9504771194459,477.20013427734377]},{"page":437,"text":"to ensure its success at the point of penetration. These fundamentals always apply, but their application varies","rect":[107.98998260498047,497.7712097167969,540.0335223655701,488.66302490234377]},{"page":437,"text":"based on the prevailing mission variables.","rect":[107.98998260498047,509.2942199707031,275.79400157928469,500.18603515625]},{"page":437,"text":"C-58. The encircled commander orders the rupture force to hold the shoulders of the penetration while the","rect":[107.989990234375,526.7891845703125,539.9580354766846,517.7010498046875]},{"page":437,"text":"follow and assume force moves forward, if enemy forces at the penetration point have roughly the same","rect":[107.989990234375,538.2720947265625,539.9761018829346,529.1639404296875]},{"page":437,"text":"combat power as the rupture force. As depicted in figure C-9 on page C-14, the actions of the follow and","rect":[107.989990234375,549.7951049804688,540.0554103851318,540.6869506835938]},{"page":437,"text":"assume force then become the main effort. The encircled commander may have the rupture force continue","rect":[107.98998260498047,561.318115234375,540.0986604766846,552.2099609375]},{"page":437,"text":"its attack if enemy forces are not strong. If there are no identified enemy forces beyond the penetration, the","rect":[107.99000549316406,572.781005859375,540.0615511016846,563.6728515625]},{"page":437,"text":"rupture force may transition to a movement to contact. After the encircled friendly force breaks out, it moves","rect":[107.99000549316406,584.3040161132813,540.0458514671326,575.1958618164063]},{"page":437,"text":"toward other friendly forces and links up with them.","rect":[107.99000549316406,595.8270263671875,316.59649181365969,586.7188720703125]},{"page":437,"text":"C-59. Initially, the follow and assume force passes through the gap created by the rupture force. This force","rect":[107.99000549316406,613.2918701171875,539.9923982696533,604.1837158203125]},{"page":437,"text":"continues to move rapidly from the encircled area toward its final objective. If the follow and assume force","rect":[107.99000549316406,624.81494140625,539.9978914337158,615.6967163085938]},{"page":437,"text":"becomes the encircled unit’s main effort, it cannot allow itself to become bogged down. Preparation fires by","rect":[107.99000549316406,636.3379516601563,539.9642848968506,627.2297973632813]},{"page":437,"text":"artillery, Army aviation, close air support, and air interdiction help the follow and assume force in","rect":[107.99002075195313,647.8008422851563,540.0233058929443,638.6926879882813]},{"page":437,"text":"maintaining momentum out of the encircled area.","rect":[107.99002075195313,659.3238525390625,305.4351758956909,650.2156982421875]},{"page":437,"text":"C-60. Once the breakout attack starts, the rear guard and any deception forces disengage or delay toward the","rect":[107.99002075195313,676.8488159179688,540.0604524688721,667.7406616210938]},{"page":437,"text":"area of the rupture. Perimeter forces integrate smoothly into the rear of the breakout column. Once the","rect":[107.98998260498047,688.3117065429688,539.9513826446533,679.2035522460938]},{"page":437,"text":"breakout succeeds, the commander shifts priority of fires as required by the mission variables.","rect":[107.98999786376953,699.8345336914063,484.34817028045657,690.726318359375]},{"page":437,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":437,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":437,"text":"C-13","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.5280151367188]},{"page":438,"text":"Appendix C","rect":[72.0,46.224021911621097,122.05709729003907,37.90802001953125]},{"page":438,"text":"C-61. As other encircled units support or move through the area of penetration, the rear-guard commander","rect":[90.0,83.51434326171875,522.0243432579041,74.40616607666016]},{"page":438,"text":"must deploy forces over an extended area. The rear guard requires flexibility and mobility. The rear guard","rect":[89.98998260498047,94.97723388671875,521.9196681976318,85.8689956665039]},{"page":438,"text":"maintains the perimeter against enemy pressure. If the enemy force succeeds in destroying or encircling the","rect":[89.98999786376953,106.500244140625,522.0594759063721,97.3920669555664]},{"page":438,"text":"original rear guard in the breakout process, then the unit must reconstitute a new rear guard.","rect":[89.98998260498047,118.023193359375,457.3542432785034,108.9150161743164]},{"page":438,"text":"Figure C-9. Example breakout by an encircled division","rect":[168.35641479492188,411.8396911621094,425.64999127578735,402.4509582519531]},{"page":438,"text":"C-62. The main body follows the follow and assume force. It moves rapidly on multiple routes in an approach","rect":[90.0000228881836,435.2965087890625,522.1364650726318,426.1883239746094]},{"page":438,"text":"march immediately behind the follow and assume force, protected on its flanks by security elements. It should","rect":[90.0000228881836,446.81951904296877,522.0730495452881,437.7113342285156]},{"page":438,"text":"contain sufficient combat power to protect itself and reinforce the flank or rear security forces if they come","rect":[90.0000228881836,458.28240966796877,522.0685091094971,449.1742248535156]},{"page":438,"text":"under attack.","rect":[90.0,467.7813720703125,141.70220470428468,460.6972351074219]},{"page":438,"text":"C-63. Normally, the rear guard initially conducts a withdrawal to break contact with the enemy forces around","rect":[90.0,487.3204040527344,522.0483303070068,478.21221923828127]},{"page":438,"text":"the perimeter. It contracts the perimeter as it delays behind the main body. If enemy forces closely pursue the","rect":[90.0,498.7832946777344,521.9602937774658,489.67510986328127]},{"page":438,"text":"breakout force, the efforts of the rear guard may become the main effort for the encircled force. The unit","rect":[90.0,510.3063049316406,521.9532237014771,501.1981201171875]},{"page":438,"text":"should position the reserve where it can also support the rear guard.","rect":[90.0,521.7691040039063,360.40093517303469,512.6609497070313]},{"page":438,"text":"C-64. Initially, the priority for fire support is with the rupture force. Those fires focus on suppressing and","rect":[90.0,539.2940673828125,522.0103664398193,530.1859130859375]},{"page":438,"text":"obscuring the point of penetration. Fire support assets move as part of the main body and rear guard so","rect":[90.0,550.817138671875,522.0571804046631,541.708984375]},{"page":438,"text":"security forces have adequate fire support. Target identification difficulties resulting from proximity and","rect":[90.0,562.280029296875,521.9562282562256,553.171875]},{"page":438,"text":"intermixing of forces, as well as the rapidly changing ground situation during the execution of a breakout,","rect":[90.0,573.802978515625,521.9998731613159,564.69482421875]},{"page":438,"text":"make close air support difficult.","rect":[90.0,585.3060302734375,217.42129039764405,576.2178955078125]},{"page":438,"text":"C-65. Engineers with the rupture force focus on mobility operations. Engineers with the follow and assume","rect":[90.0,602.7908935546875,522.0722932891846,593.6827392578125]},{"page":438,"text":"force or the reserve improve routes as necessary. Engineers supporting flank security elements focus on","rect":[90.0,614.3139038085938,521.9950466156006,605.2057495117188]},{"page":438,"text":"conducting countermobility operations. The rear guard must also have enough engineer support to conduct","rect":[90.0,625.8369140625,521.9790415725709,616.728759765625]},{"page":438,"text":"countermobility operations.","rect":[90.0,637.2998046875,200.56472301483155,628.191650390625]},{"page":438,"text":"C-66. The senior commander prioritizes supporting AMD assets to protect the rupture force, the rear guard,","rect":[90.0,654.8247680664063,522.0335645675659,645.7166137695313]},{"page":438,"text":"and the main body. This support may come from outside the encircled perimeter. The rear guard is second in","rect":[90.0,666.3477783203125,522.0290431976318,657.2396240234375]},{"page":438,"text":"priority of protection to help prevent enemy forces targeting the main body from overrunning it.","rect":[90.0,677.8106689453125,474.1037244796753,668.7025146484375]},{"page":438,"text":"C-67. Commanders can relieve sustainment shortfalls by using aerial resupply, ordering external forces to","rect":[90.0,695.3356323242188,521.9991359710693,686.2274780273438]},{"page":438,"text":"establish support areas, and using captured supplies. All units and vehicles carry the maximum supplies","rect":[90.0,706.8587036132813,522.0331561546326,697.7505493164063]},{"page":438,"text":"possible, with emphasis on carrying petroleum, oils, and lubricants and ammunition. The encircled force only","rect":[90.0,718.3215942382813,521.9846096038818,709.2134399414063]},{"page":438,"text":"C-14","rect":[72.1199951171875,754.1790161132813,91.57798986816407,747.5280151367188]},{"page":438,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":438,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":439,"text":"Appendix C","rect":[490.0199890136719,46.224021911621097,540.0771015625,37.90802001953125]},{"page":439,"text":"takes vehicles it can support. It may be possible for the higher echelon headquarters of the encircled force to","rect":[108.0,83.51434326171875,539.9660549163818,74.40616607666016]},{"page":439,"text":"establish an intermediate staging base as the breakout attack moves toward a linkup with other friendly forces.","rect":[108.0,94.97723388671875,540.1406202316284,85.86905670166016]},{"page":439,"text":"CONSIDERATIONS FOR AN ENCIRCLED DEFENDER","rect":[90.0,118.36801147460938,334.32624912261965,110.07601165771485]},{"page":439,"text":"C-68. When defending an encircled area, units consider employing aviation, fires, engineer, and sustainment","rect":[108.0,138.2943115234375,540.0282359085084,129.18612670898438]},{"page":439,"text":"assets. Divisions and corps may consider relocating aviation systems from any attached combat aviation","rect":[108.0,149.81732177734376,539.8901271820068,140.70913696289063]},{"page":439,"text":"brigades to locations that are not in danger of encirclement. Aviation assets can rapidly bring additional","rect":[107.9899673461914,161.28021240234376,539.9858775100709,152.17202758789063]},{"page":439,"text":"firepower to bear on an encircling enemy force or rapidly move reaction forces to threatened locations along","rect":[107.9899673461914,172.80322265625,539.9648342132568,163.69503784179688]},{"page":439,"text":"a defensive perimeter. Generally, aviation assets fly out of an encirclement when it becomes small enough to","rect":[107.98999786376953,184.326171875,540.0278224945068,175.21798706054688]},{"page":439,"text":"allow the enemy force’s artillery to range throughout the area.","rect":[107.98998260498047,195.7890625,356.2465772628784,186.68087768554688]},{"page":439,"text":"C-69. The commander centrally controls fire support systems, such as artillery, to provide support at","rect":[107.98998260498047,213.3140869140625,540.0016856155396,204.20590209960938]},{"page":439,"text":"numerous points along the perimeter and mass fires. The commander designates the senior field artillery staff","rect":[107.98999786376953,224.77691650390626,540.0455834922791,215.66873168945313]},{"page":439,"text":"officer, such as the chief of fires or brigade fire support officer, to control fire support. At the BCT level, the","rect":[107.98998260498047,236.2999267578125,540.0571565704346,227.19174194335938]},{"page":439,"text":"field artillery battalion commander also advises the commander. At lower echelons, commanders may co-","rect":[107.98999786376953,247.82293701171876,539.9300439414978,238.71475219726563]},{"page":439,"text":"locate mortars from various units under centralized control, especially if there are insufficient artillery assets.","rect":[107.97996520996094,259.28582763671877,540.0554761886597,250.17764282226563]},{"page":439,"text":"C-70. Generally, engineers concentrate first on countermobility, then survivability, and then mobility.","rect":[107.97996520996094,276.810791015625,539.9663038253784,267.7026062011719]},{"page":439,"text":"Defensive protective positions include, but are not limited to, command posts, signal nodes (and other","rect":[107.97997283935547,288.33380126953127,539.9438989219666,279.2256164550781]},{"page":439,"text":"facilities for the command and control warfighting function), critical equipment (to include sensors), supply","rect":[107.97997283935547,299.7967224121094,540.0191555023193,290.6884765625]},{"page":439,"text":"and ammunition storage/holding areas, and other items that are likely to be targeted by enemy action.","rect":[107.9800033569336,311.3196716308594,540.0073194503784,302.21148681640627]},{"page":439,"text":"Dispersal is difficult in a perimeter type defense; therefore, the next best alternative is position hardening by","rect":[107.9799575805664,322.8426513671875,540.0124416351318,313.7344665527344]},{"page":439,"text":"constructing field fortifications.","rect":[107.9799575805664,334.3055419921875,234.92434215545655,325.1973571777344]},{"page":439,"text":"C-71. Encircled units closely monitor their sustainment assets and supply stocks, especially if they cannot be","rect":[107.97996520996094,351.8305358886719,540.0520906524658,342.72235107421877]},{"page":439,"text":"resupplied for an extended period. Leader’s conserve and centrally control available resources. A commander","rect":[107.97996520996094,363.353515625,540.0381372032166,354.2453308105469]},{"page":439,"text":"may force units on the perimeter to cease all vehicle movement to allocate remaining fuel assets to the reserve.","rect":[107.97996520996094,374.81640625,540.0490064620972,365.7082214355469]},{"page":439,"text":"The senior commander within an encirclement retains essential sustainment capabilities to sustain the defense","rect":[107.97996520996094,386.3193664550781,540.0886507110596,377.2312316894531]},{"page":439,"text":"under the control of a senior sustainment operator or commander. When possible, that commander positions","rect":[107.97996520996094,397.84234619140627,540.1025531272888,388.75421142578127]},{"page":439,"text":"these units and their assets beyond the reach of potential penetrations in protected and concealed locations.","rect":[107.97994995117188,409.32525634765627,539.9457349777222,400.2170715332031]},{"page":439,"text":"The senior commander may incorporate other sustainment units into defensive positions in depth or around","rect":[107.97994995117188,420.8482666015625,539.9147243499756,411.7400817871094]},{"page":439,"text":"key facilities. A commander may choose to augment maneuver units with non-maneuver Soldiers, although","rect":[107.9800033569336,432.3713073730469,539.9939479827881,423.26312255859377]},{"page":439,"text":"this action may affect the non-maneuver (sustainment) capabilities of the encircled force.","rect":[107.96990203857422,443.8341979980469,464.5075635910034,434.72601318359377]},{"page":439,"text":"C-72. Casualty evacuation and mortuary affairs pose challenges for an encircled force. The unit evacuates","rect":[107.94989013671875,461.3591613769531,539.9822528343201,452.2509765625]},{"page":439,"text":"wounded from the encirclement whenever possible for humanitarian reasons. This also reduces the burden","rect":[107.93985748291016,472.802001953125,539.8737697601318,463.7138671875]},{"page":439,"text":"of providing long-term medical care to wounded Soldiers.","rect":[107.93990325927735,484.34503173828127,340.1132459640503,475.2368469238281]},{"page":439,"text":"C-73. Soldiers have an inherent fear of encirclement by enemy forces. Unchecked, this fear can lead to a","rect":[107.92986297607422,501.8700256347656,539.9812288360596,492.7618408203125]},{"page":439,"text":"degradation in morale and discipline. When encircled, Soldiers under the firm control of their leaders can","rect":[107.92986297607422,513.3329467773438,539.9199123382568,504.2247314453125]},{"page":439,"text":"withstand the mental strain. Discipline can disintegrate rapidly in an encirclement. Officers and","rect":[107.92986297607422,524.85595703125,539.9872341156006,515.747802734375]},{"page":439,"text":"noncommissioned officers must uphold the highest standards of discipline. Their personal conduct sets the","rect":[107.92986297607422,536.37890625,539.9651155548096,527.270751953125]},{"page":439,"text":"example. Encircled Soldiers need to see their senior commander and other leaders frequently. Leaders at all","rect":[107.92986297607422,547.841796875,539.8814463577271,538.733642578125]},{"page":439,"text":"levels need to display a calm and confident manner. Soldiers in an encirclement must not regard their situation","rect":[107.92986297607422,559.3648681640625,539.9251003265381,550.2567138671875]},{"page":439,"text":"as desperate or hopeless. Commanders and leaders at all levels maintain the confidence of Soldiers by resolute","rect":[107.92986297607422,570.8878784179688,539.9126253204346,561.7797241210938]},{"page":439,"text":"action and a positive attitude. They must keep their Soldiers informed to suppress rumors and counter enemy","rect":[107.92986297607422,582.3507690429688,539.9634304046631,573.2426147460938]},{"page":439,"text":"propaganda.","rect":[107.92990112304688,593.8736572265625,157.11103343963624,584.7655029296875]},{"page":439,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":439,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":439,"text":"C-15","rect":[502.4909973144531,754.1790161132813,521.9490073242188,747.5280151367188]},{"page":440,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":441,"text":"Glossary","rect":[280.7400207519531,134.32815551757813,349.217514541626,119.31742095947266]},{"page":441,"text":"The glossary lists acronyms and terms with Army, multi-Service, or joint definitions,","rect":[126.0,168.98069763183595,504.0073595046997,158.9888916015625]},{"page":441,"text":"and other selected terms. Where Army and joint definitions are different, (Army)","rect":[126.0,181.64060974121095,504.08093091201786,171.6488037109375]},{"page":441,"text":"follows the term. Terms for which FM 3-90 is the proponent publication (the authority)","rect":[126.0,194.3005828857422,504.08755322647098,184.31976318359376]},{"page":441,"text":"are marked with an asterisk (*). The proponent publication for other terms is listed in","rect":[126.0,206.93853759765626,504.04917335510256,196.97967529296876]},{"page":441,"text":"parentheses after the definition.","rect":[126.0,219.5985107421875,264.7103319168091,209.6396484375]},{"page":441,"text":"SECTION I – ACRONYMS AND ABBREVIATIONS","rect":[99.36000061035156,243.6239776611328,374.784029296875,234.74398803710938]},{"page":441,"text":"ACM","rect":[155.8800048828125,260.9002990722656,179.79373455810549,253.97647094726563]},{"page":441,"text":"ADP","rect":[159.18551635742188,276.301025390625,179.8227055091858,269.5274963378906]},{"page":441,"text":"AMD","rect":[155.8800048828125,291.7799987792969,179.79373598480226,285.0064697265625]},{"page":441,"text":"airspace coordinating measure","rect":[226.55999755859376,262.914306640625,348.1837434844971,253.80612182617188]},{"page":441,"text":"Army doctrine publication","rect":[226.5700225830078,278.455322265625,332.6798610687256,269.3471374511719]},{"page":441,"text":"air and missile defense","rect":[226.55999755859376,291.9102478027344,318.01257038879398,284.82611083984377]},{"page":441,"text":"AO","rect":[164.70654296875,307.40118408203127,179.761594291687,300.47735595703127]},{"page":441,"text":"ATP","rect":[159.77999877929688,322.79998779296877,179.82601666641237,316.0264587402344]},{"page":441,"text":"AR","rect":[165.29771423339845,338.2808837890625,179.79265261077883,331.5073547363281]},{"page":441,"text":"BCT","rect":[159.1800079345703,353.9002685546875,179.78613876724243,346.9764404296875]},{"page":441,"text":"BHL","rect":[158.63441467285157,369.3009948730469,179.78063034439087,362.6677551269531]},{"page":441,"text":"BP","rect":[166.97999572753907,384.7799987792969,179.76551556777955,378.1467590332031]},{"page":441,"text":"C2","rect":[167.52215576171876,400.40118408203127,179.7926540374756,393.47735595703127]},{"page":441,"text":"CASEVAC","rect":[131.39999389648438,415.9502868652344,179.7845654525757,409.0164489746094]},{"page":441,"text":"CBRN","rect":[151.4400634765625,431.4211730957031,179.79466677093508,424.4973449707031]},{"page":441,"text":"CFL","rect":[159.77999877929688,446.9002685546875,179.8460447731018,439.9764404296875]},{"page":441,"text":"COA","rect":[157.56228637695313,462.38116455078127,179.79666567230226,455.45733642578127]},{"page":441,"text":"COP","rect":[158.63999938964845,477.9202880859375,179.82227826309205,470.9964599609375]},{"page":441,"text":"DA","rect":[165.30775451660157,493.2608947753906,179.80269289398195,486.48736572265627]},{"page":441,"text":"DLIC","rect":[154.739990234375,508.8802795410156,179.79800844573976,501.9564514160156]},{"page":441,"text":"area of operations","rect":[226.55999755859376,309.3951416015625,298.2541034202576,300.3070068359375]},{"page":441,"text":"Army techniques publication","rect":[226.55999755859376,324.95428466796877,342.60561180114748,315.8460998535156]},{"page":441,"text":"Army regulation","rect":[226.55999755859376,340.4351806640625,292.9495143890381,331.3269958496094]},{"page":441,"text":"brigade combat team","rect":[226.55999755859376,355.9142761230469,310.43243169403078,346.80609130859377]},{"page":441,"text":"battle handover line","rect":[226.5499725341797,369.4312438964844,305.99755574035648,362.34710693359377]},{"page":441,"text":"battle position","rect":[226.55999755859376,386.91424560546877,283.5297145843506,377.82611083984377]},{"page":441,"text":"command and control","rect":[226.5700225830078,400.3911437988281,313.8341746292114,393.3070068359375]},{"page":441,"text":"casualty evacuation","rect":[226.55999755859376,417.95428466796877,305.1248378753662,408.8460998535156]},{"page":441,"text":"chemical, biological, radiological, and nuclear","rect":[226.55999755859376,433.4351806640625,411.7536523399353,424.3269958496094]},{"page":441,"text":"coordinated fire line","rect":[226.55999755859376,446.8902282714844,307.68896199035648,439.80609130859377]},{"page":441,"text":"course of action","rect":[226.5700225830078,462.3711242675781,290.44151878356936,455.2869873046875]},{"page":441,"text":"common operational picture","rect":[226.55999755859376,479.91424560546877,339.36718464660648,470.82611083984377]},{"page":441,"text":"Department of the Army","rect":[226.57003784179688,495.4151916503906,325.1708278656006,486.3070068359375]},{"page":441,"text":"detachment left in contact","rect":[226.55999755859376,508.8702392578125,330.19882917022707,501.7861022949219]},{"page":441,"text":"DOD","rect":[157.55223083496095,524.4212646484375,179.78661013031008,517.4974365234375]},{"page":441,"text":"DODD","rect":[150.3000030517578,539.9002685546875,179.79488039398195,532.9764404296875]},{"page":441,"text":"EA","rect":[165.83880615234376,555.2409057617188,179.736546043396,548.4674072265625]},{"page":441,"text":"EMS","rect":[158.10000610351563,570.9303588867188,179.81434535217287,563.9964599609375]},{"page":441,"text":"EPW","rect":[156.9510498046875,586.401123046875,179.75356674194337,579.6276245117188]},{"page":441,"text":"FCL","rect":[159.77999877929688,601.8802490234375,179.84505295181274,594.9564208984375]},{"page":441,"text":"Department of Defense","rect":[226.5599822998047,526.415283203125,319.9203157501221,517.337158203125]},{"page":441,"text":"Department of Defense Directive","rect":[226.55999755859376,541.894287109375,359.57247639465336,532.80615234375]},{"page":441,"text":"engagement area","rect":[226.55999755859376,557.3952026367188,294.0066194610596,549.2890014648438]},{"page":441,"text":"electromagnetic spectrum","rect":[226.55999755859376,572.934326171875,329.62872075653078,563.826171875]},{"page":441,"text":"enemy prisoner of war","rect":[226.5499725341797,588.4151611328125,316.8361718711853,579.3070068359375]},{"page":441,"text":"final coordination line","rect":[226.55999755859376,601.8702392578125,315.48852253723148,594.7861328125]},{"page":441,"text":"FEBA","rect":[153.1134033203125,617.281005859375,179.79466677093508,610.5075073242188]},{"page":441,"text":"FLOT","rect":[152.52000427246095,632.9002685546875,179.78743576431274,625.9764404296875]},{"page":441,"text":"FM","rect":[164.22557067871095,648.2409057617188,179.80667401123049,641.607666015625]},{"page":441,"text":"FPF","rect":[161.45999145507813,663.780029296875,179.82665753555299,657.1467895507813]},{"page":441,"text":"FPL","rect":[160.86886596679688,679.2608642578125,179.79665207290649,672.6276245117188]},{"page":441,"text":"FSCL","rect":[154.1999969482422,694.8903198242188,179.8451902809143,687.9564208984375]},{"page":441,"text":"FSCM","rect":[151.4400634765625,710.4313354492188,179.79365826416018,703.4974365234375]},{"page":441,"text":"forward edge of the battle area","rect":[226.5600128173828,619.435302734375,349.02648640441898,610.3271484375]},{"page":441,"text":"forward line of own troops","rect":[226.55999755859376,634.894287109375,333.84815859603887,625.80615234375]},{"page":441,"text":"field manual","rect":[226.57000732421876,648.3711547851563,276.8754343948364,641.2870483398438]},{"page":441,"text":"final protective fire","rect":[226.55999755859376,665.914306640625,303.78817463684086,656.826171875]},{"page":441,"text":"final protective line","rect":[226.5700225830078,681.3951416015625,304.8783540802002,672.3070068359375]},{"page":441,"text":"fire support coordination line","rect":[226.55999755859376,696.874267578125,343.56857014465336,687.7861328125]},{"page":441,"text":"fire support coordination measure","rect":[226.5600128173828,712.415283203125,361.8670930938721,703.3271484375]},{"page":441,"text":"01 May 2023","rect":[90.11700439453125,755.9639892578125,142.43191748046875,747.5130004882813]},{"page":441,"text":"FM 3-90","rect":[289.260009765625,754.1909790039063,322.7579978027344,747.6119995117188]},{"page":441,"text":"Glossary-1","rect":[475.49700927734377,755.9639892578125,521.9451010742188,747.531005859375]},{"page":442,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":442,"text":"IPB","rect":[145.0800018310547,83.34002685546875,161.78334640884399,76.706787109375]},{"page":442,"text":"JP","rect":[150.66000366210938,98.96028900146485,161.82227826309205,92.186767578125]},{"page":442,"text":"LC","rect":[147.83999633789063,114.50032806396485,161.73773622894289,107.57650756835938]},{"page":442,"text":"LD","rect":[147.83999633789063,129.84002685546876,161.73773622894289,123.206787109375]},{"page":442,"text":"LOA","rect":[140.10340881347657,145.46119689941407,161.79671144866945,138.53738403320313]},{"page":442,"text":"LOC","rect":[140.10000610351563,161.0003204345703,161.79732180023195,154.07650756835938]},{"page":442,"text":"MBA","rect":[138.4199981689453,176.3409423828125,161.79666567230226,169.5674285888672]},{"page":442,"text":"MDMP","rect":[129.54229736328126,191.82183837890626,161.8267338294983,185.1885986328125]},{"page":442,"text":"MEDEVAC","rect":[110.0999984741211,207.5003204345703,161.7881817855835,200.57650756835938]},{"page":442,"text":"METT-TC(I)","rect":[104.5199966430664,224.83399963378907,161.7873132286072,216.05648803710938]},{"page":442,"text":"MSR","rect":[139.55999755859376,249.99032592773438,161.795383934021,243.05648803710938]},{"page":442,"text":"NAI","rect":[143.39990234375,265.4612121582031,161.81666445541382,258.5473937988281]},{"page":442,"text":"OPSEC","rect":[128.39999389648438,280.95208740234377,161.7966504135132,274.01824951171877]},{"page":442,"text":"PAA","rect":[141.1800079345703,296.3399963378906,161.7961621322632,289.56646728515627]},{"page":442,"text":"PD","rect":[148.4399871826172,311.82000732421877,161.7966504135132,305.186767578125]},{"page":442,"text":"PIR","rect":[144.5421905517578,327.3009033203125,161.79663515472414,320.66766357421877]},{"page":442,"text":"PL","rect":[148.97999572753907,342.8399963378906,161.78555893325805,336.2067565917969]},{"page":442,"text":"PLD","rect":[141.77670288085938,358.3208923339844,161.79666567230226,351.6876525878906]},{"page":442,"text":"POB","rect":[141.1800079345703,373.9402770996094,161.78113388442993,367.0164489746094]},{"page":442,"text":"RFA","rect":[141.1800079345703,389.3399963378906,161.79715395355226,382.56646728515627]},{"page":442,"text":"RFL","rect":[141.77999877929688,404.82000732421877,161.8460447731018,398.186767578125]},{"page":442,"text":"ROE","rect":[140.0933074951172,420.4411926269531,161.8467314186096,413.5173645019531]},{"page":442,"text":"ROZ","rect":[140.10000610351563,435.98028564453127,161.84340500259399,429.05645751953127]},{"page":442,"text":"RP","rect":[148.4499969482422,451.3208923339844,161.83671307754518,444.6876525878906]},{"page":442,"text":"SOP","rect":[142.32000732421876,466.9502868652344,161.82293439102174,460.0164489746094]},{"page":442,"text":"SP","rect":[150.1234130859375,482.4913024902344,161.82677960586549,475.5574645996094]},{"page":442,"text":"TAC-D","rect":[130.0800018310547,497.9602966308594,161.79443788909914,491.0364685058594]},{"page":442,"text":"TAI","rect":[144.00111389160157,513.3009033203125,161.82668947982789,506.5273742675781]},{"page":442,"text":"TCP","rect":[141.77999877929688,528.980224609375,161.82500958633424,522.056396484375]},{"page":442,"text":"TM","rect":[145.6745147705078,544.3208618164063,161.7966947631836,537.6876220703125]},{"page":442,"text":"TRP","rect":[141.77999877929688,559.7999877929688,161.82500958633424,553.166748046875]},{"page":442,"text":"UAS","rect":[141.77670288085938,575.4312133789063,161.8066854400635,568.497314453125]},{"page":442,"text":"U.S.","rect":[144.0,590.9703369140625,161.80553722381593,584.0364379882813]},{"page":442,"text":"intelligence preparation of the battlefield","rect":[208.55999755859376,85.49432373046875,371.81456565856936,76.38614654541016]},{"page":442,"text":"joint publication","rect":[208.5659942626953,100.872314453125,274.4026699066162,91.75411987304688]},{"page":442,"text":"line of contact","rect":[208.55999755859376,114.22626495361328,265.8161082229614,107.14212799072266]},{"page":442,"text":"line of departure","rect":[208.55999755859376,131.60826110839845,274.68139363098148,122.5201187133789]},{"page":442,"text":"limit of advance","rect":[208.5699920654297,144.9822540283203,273.54806233215336,137.89810180664063]},{"page":442,"text":"line of communication","rect":[208.55999755859376,160.36024475097657,299.11351585388186,153.27609252929688]},{"page":442,"text":"main battle area","rect":[208.55999755859376,175.7382354736328,272.3948335723877,168.65408325195313]},{"page":442,"text":"military decision-making process","rect":[208.5699920654297,193.1402587890625,341.8677813987732,184.03207397460938]},{"page":442,"text":"medical evacuation","rect":[208.55999755859376,206.4942169189453,286.02965354919436,199.41006469726563]},{"page":442,"text":"mission, enemy, terrain and weather, troops and support available,","rect":[208.55801391601563,223.896240234375,474.0800428390503,214.78805541992188]},{"page":442,"text":"available, civil considerations, and informational considerations","rect":[208.55799865722657,238.78330993652345,464.30836367416387,230.16610717773438]},{"page":442,"text":"main supply route","rect":[208.55999755859376,254.65228271484376,280.8019075469971,245.54409790039063]},{"page":442,"text":"named area of interest","rect":[208.5600128173828,268.0062255859375,297.1406626663208,260.9220886230469]},{"page":442,"text":"operations security","rect":[208.5600128173828,285.4082946777344,284.41783714294436,276.30010986328127]},{"page":442,"text":"position area for artillery","rect":[208.5600128173828,300.7862548828125,308.23448753356936,291.6780700683594]},{"page":442,"text":"point of departure","rect":[208.55999755859376,316.1442565917969,280.2630891876221,307.0561218261719]},{"page":442,"text":"priority intelligence requirement","rect":[208.57000732421876,331.54229736328127,338.5333628616333,322.4341125488281]},{"page":442,"text":"phase line","rect":[208.5600128173828,346.9002685546875,248.885632522583,337.8121032714844]},{"page":442,"text":"probable line of deployment","rect":[208.55999755859376,362.29827880859377,321.6722788772583,353.1900939941406]},{"page":442,"text":"point of breach","rect":[208.55999755859376,377.65625,269.12315940856936,368.568115234375]},{"page":442,"text":"restrictive fire area","rect":[208.55999755859376,391.0302429199219,284.0925874786377,383.94610595703127]},{"page":442,"text":"restrictive fire line","rect":[208.55999755859376,406.40826416015627,282.41662312316898,399.3241271972656]},{"page":442,"text":"rules of engagement","rect":[208.55999755859376,423.810302734375,289.69397687530519,414.7021179199219]},{"page":442,"text":"restricted operations zone","rect":[208.55999755859376,439.1682434082031,311.3328218536377,430.0801086425781]},{"page":442,"text":"release point","rect":[208.57000732421876,454.5462646484375,259.4654002151489,445.4581298828125]},{"page":442,"text":"standard operating procedure","rect":[208.55999755859376,469.94427490234377,325.2558870391846,460.8360900878906]},{"page":442,"text":"start point","rect":[208.5700225830078,485.3022155761719,248.91208600616455,476.2140808105469]},{"page":442,"text":"tactical deception","rect":[208.56002807617188,500.68023681640627,278.8336696624756,491.59210205078127]},{"page":442,"text":"target area of interest","rect":[208.56002807617188,516.0782470703125,293.28870343780519,506.9700622558594]},{"page":442,"text":"traffic control post","rect":[208.55801391601563,531.436279296875,282.77686261749269,522.34814453125]},{"page":442,"text":"technical manual","rect":[208.55801391601563,544.8102416992188,276.5925974807739,537.6259155273438]},{"page":442,"text":"target reference point","rect":[208.56002807617188,562.2122802734375,294.1294321975708,553.1041259765625]},{"page":442,"text":"unmanned aircraft system","rect":[208.56002807617188,577.5902709960938,311.92141484832765,568.4821166992188]},{"page":442,"text":"United States","rect":[208.56002807617188,590.9642944335938,262.19377016830449,583.860107421875]},{"page":442,"text":"time","rect":[476.61505126953127,221.8722686767578,494.37899494934086,214.78811645507813]},{"page":442,"text":"SECTION II – TERMS","rect":[81.36000061035156,618.9240112304688,200.06399755859375,610.0440063476563]},{"page":442,"text":"*actions on contact","rect":[72.0,638.230224609375,153.6930749473572,631.306396484375]},{"page":442,"text":"A process to help leaders understand what is happening and to take action.","rect":[108.00186157226563,654.7733154296875,406.0076856613159,645.6651611328125]},{"page":442,"text":"air and missile defense","rect":[72.00003814697266,668.2301025390625,168.42852497863769,661.3062744140625]},{"page":442,"text":"Direct [active and passive] defensive actions taken to destroy, nullify, or reduce the effectiveness of ","rect":[108.00190734863281,684.773193359375,509.7300977706909,675.6650390625]},{"page":442,"text":"hostile air and ballistic missile threats against friendly forces and assets. (JP 3-01)","rect":[108.00190734863281,696.2360229492188,435.3953759727478,687.1278686523438]},{"page":442,"text":"Glossary-2","rect":[72.1199951171875,755.9609985351563,118.56809454345704,747.5280151367188]},{"page":442,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":442,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":443,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":443,"text":"air corridor","rect":[90.0,81.43024444580078,140.88456440734863,74.50642395019531]},{"page":443,"text":"A restricted air route of travel specified for use by friendly aircraft established for the purpose of ","rect":[125.99183654785156,97.9732666015625,515.0764112472534,88.8650894165039]},{"page":443,"text":"preventing friendly aircraft from being fired upon by friendly forces. (JP 3-52)","rect":[125.99183654785156,109.49627685546875,440.4394738731384,100.38809967041016]},{"page":443,"text":"air movement","rect":[89.99996185302735,122.95313262939453,149.1911218223572,116.02931213378906]},{"page":443,"text":"An air transport of units, personnel, supplies, and equipment including airdrops and air landings.","rect":[126.00182342529297,139.49615478515626,512.3830213546753,130.38796997070313]},{"page":443,"text":"(JP 3-36)","rect":[126.0018081665039,150.99913024902345,162.99565673446657,141.91098022460938]},{"page":443,"text":"airspace control","rect":[89.99995422363281,166.4800262451172,158.66901349639893,157.5522003173828]},{"page":443,"text":"The exercise of delegated authority over designated airspace and users through control procedures and","rect":[126.00181579589844,181.01904296875,535.5881862640381,171.91085815429688]},{"page":443,"text":"coordination measures to maximize operational effectiveness. (JP 3-52)","rect":[126.00181579589844,192.46189880371095,412.5938928184509,183.37374877929688]},{"page":443,"text":"airspace control order","rect":[89.98998260498047,207.9427947998047,185.04169941711425,199.0149688720703]},{"page":443,"text":"An order implementing the airspace control plan that provides the details of the approved requests for","rect":[125.99183654785156,222.4818115234375,532.8277490196228,213.37362670898438]},{"page":443,"text":"airspace coordinating measures. (JP 3-52)","rect":[125.99183654785156,234.0047607421875,293.4260461387634,224.89657592773438]},{"page":443,"text":"airspace coordinating measures","rect":[89.9899673461914,249.4857177734375,224.9804065208435,240.53785705566407]},{"page":443,"text":"Measures employed to facilitate the efficient use of airspace to accomplish missions and","rect":[125.99183654785156,264.004638671875,479.2852077484131,254.89645385742188]},{"page":443,"text":"simultaneously provide safeguards for friendly forces. (JP 3-52)","rect":[125.99183654785156,275.467529296875,382.04289794540406,266.3593444824219]},{"page":443,"text":"airspace management","rect":[89.97993469238281,290.94842529296877,183.06975341415407,282.0005798339844]},{"page":443,"text":"The planning, coordination, integration, and regulation of airspace by airspace control elements in","rect":[125.97177124023438,305.4674072265625,518.3399562835693,296.3592224121094]},{"page":443,"text":"support of airspace control. (JP 3-52)","rect":[125.97176361083985,316.9703674316406,274.86894775009156,307.8822326660156]},{"page":443,"text":"*alternate position","rect":[89.96987915039063,332.4512634277344,169.6980428619385,323.5234680175781]},{"page":443,"text":"A defensive position that the commander assigns to a unit or weapon system for occupation when the","rect":[125.97174072265625,346.99029541015627,531.5180940704346,337.8821105957031]},{"page":443,"text":"primary position becomes untenable or unsuitable for carrying out the assigned task.","rect":[125.97174072265625,358.5132751464844,463.69582653045657,349.40509033203127]},{"page":443,"text":"*ambush","rect":[89.97989654541016,371.9701232910156,128.91261195373537,365.05633544921877]},{"page":443,"text":"A variation of attack from concealed positions against a moving or temporarily halted enemy.","rect":[125.98175048828125,388.5131530761719,500.9020643234253,379.40496826171877]},{"page":443,"text":"antiterrorism","rect":[89.99992370605469,401.9700012207031,147.84238792037966,395.04620361328127]},{"page":443,"text":"Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts,","rect":[125.99176025390625,418.5130310058594,510.87993907928469,409.40484619140627]},{"page":443,"text":"including limited response and containment by local military and civilian forces. (JP 3-26)","rect":[125.99176025390625,429.9759216308594,487.77388549423218,420.86773681640627]},{"page":443,"text":"*approach march","rect":[89.98990631103516,445.436767578125,165.81526087951662,436.51898193359377]},{"page":443,"text":"The advance of a combat unit when direct contact with the enemy is intended.","rect":[125.99177551269531,459.9757995605469,438.1560010910034,450.86761474609377]},{"page":443,"text":"area damage control","rect":[89.98990631103516,475.4566955566406,177.79413556671143,466.6691589355469]},{"page":443,"text":"Measures taken before, during, and/or after hostile actions or natural or man-made disasters to reduce","rect":[125.98175048828125,489.9756774902344,532.0032014923096,480.86749267578127]},{"page":443,"text":"the probability of damage and minimize its effects. (JP 3-10)","rect":[125.97171020507813,501.4986877441406,369.3174035606384,492.3905029296875]},{"page":443,"text":"area defense","rect":[89.97987365722656,514.95556640625,143.0868806915283,508.0417785644531]},{"page":443,"text":"A type of defensive operation that concentrates on denying enemy forces access to designated terrain","rect":[125.97171020507813,531.49853515625,530.3212184906006,522.390380859375]},{"page":443,"text":"for a specific time rather than destroying the enemy outright. (ADP 3-90)","rect":[125.97171020507813,542.96142578125,419.28716064071656,533.853271484375]},{"page":443,"text":"area of influence","rect":[89.96984100341797,556.4183349609375,161.07677937316894,549.4945068359375]},{"page":443,"text":"A geographical area wherein a commander is directly capable of influencing operations by maneuver","rect":[125.9717025756836,572.9613037109375,530.5852563438416,563.8531494140625]},{"page":443,"text":"or fire support systems normally under the commander’s command or control. (JP 3-0)","rect":[125.9717025756836,584.484375,473.40520263290406,575.376220703125]},{"page":443,"text":"area of operations","rect":[89.96984100341797,599.9451904296875,167.24706911849976,591.017333984375]},{"page":443,"text":"An operational area defined by a commander for land and maritime forces that should be large enough","rect":[125.97169494628906,614.4842529296875,535.8569850921631,605.3760986328125]},{"page":443,"text":"to accomplish their missions and protect their forces. (JP 3-0)","rect":[125.97169494628906,625.9872436523438,372.0027978477478,616.8991088867188]},{"page":443,"text":"*area reconnaissance","rect":[89.95980834960938,639.4640502929688,180.86628437805175,632.5402221679688]},{"page":443,"text":"A form of reconnaissance operation that focuses on obtaining detailed information about the terrain or","rect":[125.961669921875,656.0071411132813,534.7205712852478,646.8989868164063]},{"page":443,"text":"enemy activity within a prescribed area.","rect":[125.961669921875,667.4700317382813,285.96609020233157,658.3618774414063]},{"page":443,"text":"*area security","rect":[89.95982360839844,682.9508666992188,150.28624534606935,674.0029907226563]},{"page":443,"text":"A type of security operation conducted to protect friendly forces, lines of communications, installation","rect":[125.96168518066406,697.4699096679688,536.1492214202881,688.3617553710938]},{"page":443,"text":"routes and actions within a specific area.","rect":[125.96168518066406,708.972900390625,288.4830274581909,699.884765625]},{"page":443,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":443,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":443,"text":"Glossary-3","rect":[475.4909973144531,755.9609985351563,521.9391196289063,747.5280151367188]},{"page":444,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":444,"text":"Army personnel recovery","rect":[72.0,83.45428466796875,180.9183864593506,74.5264663696289]},{"page":444,"text":"The military efforts taken to prepare for and execute the recovery and reintegration of isolated","rect":[108.00186157226563,97.9732666015625,484.4693202972412,88.8650894165039]},{"page":444,"text":"personnel. (FM 3-50)","rect":[108.00186157226563,109.47624206542969,193.84320617294314,100.38809967041016]},{"page":444,"text":"*assault","rect":[71.99999237060547,122.95313262939453,106.47681212997436,116.03933715820313]},{"page":444,"text":"(Army) A short and violent well-ordered attack against a local objective.","rect":[108.00184631347656,139.49615478515626,398.7412061691284,130.37796020507813]},{"page":444,"text":"assault position","rect":[71.98998260498047,154.95701599121095,137.86146449279787,146.02919006347657]},{"page":444,"text":"A covered and concealed position short of the objective from which final preparations are made to","rect":[107.99185180664063,169.49603271484376,501.44032859802248,160.37783813476563]},{"page":444,"text":"assault the objective. (ADP 3-90)","rect":[107.99185180664063,181.01904296875,241.58853698349,171.90084838867188]},{"page":444,"text":"assault time","rect":[71.98998260498047,194.4759063720703,122.87855244445801,187.5520782470703]},{"page":444,"text":"The moment to attack the initial objectives throughout the geographical scope of the operation.","rect":[107.99185180664063,211.0189208984375,487.89406871795657,201.90072631835938]},{"page":444,"text":"(ADP 3-90)","rect":[107.99185180664063,222.46177673339845,155.54677367782595,213.37362670898438]},{"page":444,"text":"*assembly area","rect":[71.98998260498047,237.962646484375,137.23622703552247,229.17510986328126]},{"page":444,"text":"An area a unit occupies to prepare for an operation.","rect":[107.99185180664063,252.46165466308595,313.4851026535034,243.37350463867188]},{"page":444,"text":"*attack","rect":[72.00000762939453,265.93853759765627,103.72733210754395,259.0247497558594]},{"page":444,"text":"A type of offensive operation that defeats enemy forces, seizes terrain, or secures terrain.","rect":[108.00186157226563,282.4815368652344,463.96242809295657,273.37335205078127]},{"page":444,"text":"*attack by fire","rect":[72.00003814697266,297.96246337890627,134.23028279113769,289.0146179199219]},{"page":444,"text":"A tactical mission task using direct and indirect fires to engage an enemy from a distance.","rect":[108.00189971923828,312.4814147949219,467.32012462615969,303.37322998046877]},{"page":444,"text":"attack by fire position","rect":[72.00003814697266,327.96234130859377,165.64996241760256,319.0144958496094]},{"page":444,"text":"The general position from which a unit performs the tactical task of attack by fire. (ADP 3-90)","rect":[108.00190734863281,342.4812927246094,485.85613036727906,333.37310791015627]},{"page":444,"text":"attack position","rect":[72.00003814697266,357.942138671875,135.04988002014162,349.01434326171877]},{"page":444,"text":"(Army) The last position an attacking force occupies or passes through before crossing the line of ","rect":[107.99188232421875,372.4811706542969,500.7346143722534,363.37298583984377]},{"page":444,"text":"departure. (ADP 3-90)","rect":[107.99188232421875,383.984130859375,198.26205993270876,374.89599609375]},{"page":444,"text":"axis of advance","rect":[71.9800033569336,397.4610290527344,136.96874714660644,390.5372314453125]},{"page":444,"text":"The general area through which the bulk of a unit’s combat power must move. (ADP 3-90)","rect":[107.98186492919922,414.0040588378906,471.78801513290406,404.8958740234375]},{"page":444,"text":"base defense","rect":[71.96995544433594,427.4609069824219,125.08096028137207,420.547119140625]},{"page":444,"text":"Consists of the local military measures, both normal and emergency, required to nullify or reduce the","rect":[107.9617919921875,444.0039367675781,512.7337007598877,434.895751953125]},{"page":444,"text":"effectiveness of enemy attacks on, or sabotage of, a base, to ensure that the maximum capacity of its","rect":[107.9617919921875,455.4668273925781,509.53651308822637,446.358642578125]},{"page":444,"text":"facilities is available to United States forces. (JP 3-10).","rect":[107.9617919921875,466.96978759765627,327.9749402999878,457.88165283203127]},{"page":444,"text":"basic load","rect":[71.96994018554688,480.4466857910156,114.50083827209473,473.52288818359377]},{"page":444,"text":"(DOD) The quantity of supplies required to be on hand within, and moved by a unit or formation,","rect":[107.97179412841797,496.9897155761719,498.19463634490969,487.88153076171877]},{"page":444,"text":"expressed according to the wartime organization of the unit or formation and maintained at the","rect":[107.97179412841797,508.4526062011719,486.6448030548096,499.34442138671877]},{"page":444,"text":"prescribed levels. (JP 4-09)","rect":[107.98181915283203,519.95556640625,217.3902185020447,510.8674011230469]},{"page":444,"text":"battle damage assessment","rect":[71.96994018554688,535.45654296875,181.3803308067322,526.6690063476563]},{"page":444,"text":"The estimate of damage composed of physical and functional damage assessment, as well as target","rect":[107.97179412841797,549.9754638671875,503.13889264678957,540.8673095703125]},{"page":444,"text":"system assessment, resulting from the application of fires. (JP 3-0)","rect":[107.97179412841797,561.49853515625,374.3434960899353,552.390380859375]},{"page":444,"text":"battle drill","rect":[71.95992279052735,574.955322265625,117.28538465118409,568.031494140625]},{"page":444,"text":"Rehearsed and well understood actions made in response to common battlefield occurrences.","rect":[107.96178436279297,591.4783935546875,479.5254774093628,582.3902587890625]},{"page":444,"text":"(ADP 3-90)","rect":[107.9617919921875,602.9412841796875,155.51671386337282,593.8531494140625]},{"page":444,"text":"*battle handover","rect":[71.95992279052735,616.4181518554688,144.50771809387207,609.6546630859375]},{"page":444,"text":"A coordinated mission between two units that transfers responsibility for fighting an enemy force from","rect":[107.96178436279297,632.961181640625,519.6133704147339,623.85302734375]},{"page":444,"text":"one unit to another. ","rect":[107.96178436279297,643.0,188.22198009490968,635.3760375976563]},{"page":444,"text":"battle handover line","rect":[71.95991516113281,657.9410400390625,157.52872944641113,651.0172119140625]},{"page":444,"text":"A designated phase line where responsibility transitions from the stationary force to the moving force","rect":[107.9617691040039,674.4840698242188,514.0530672149658,665.3759155273438]},{"page":444,"text":"and vice versa. (ADP 3-90)","rect":[107.9617691040039,685.987060546875,217.67076659774782,676.89892578125]},{"page":444,"text":"battle position","rect":[71.94989013671875,701.4679565429688,132.84042262268069,692.5401000976563]},{"page":444,"text":"A defensive location oriented on a likely enemy avenue of approach. (ADP 3-90)","rect":[107.95175170898438,716.0069580078125,433.1808984336853,706.8988037109375]},{"page":444,"text":"Glossary-4","rect":[72.1199951171875,755.9609985351563,118.56809454345704,747.5280151367188]},{"page":444,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":444,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":445,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":445,"text":"*block","rect":[90.0,81.43024444580078,118.37062739562988,74.666748046875]},{"page":445,"text":"1. A tactical mission task that denies the enemy access to an area or an avenue of approach. 2. An","rect":[125.99183654785156,97.9732666015625,516.4392604827881,88.8650894165039]},{"page":445,"text":"obstacle effect that integrates fire planning and obstacle effort to stop an attacker along a specific","rect":[125.99183654785156,109.49627685546875,514.5340852813721,100.38809967041016]},{"page":445,"text":"avenue of approach or prevent the attacking force from passing through an engagement area.","rect":[125.9917984008789,121.019287109375,497.0164747238159,111.9111099243164]},{"page":445,"text":"boundary","rect":[89.98998260498047,136.50018310546876,131.72228050231935,127.712646484375]},{"page":445,"text":"A line that delineates surface areas for the purpose of facilitating coordination and deconfliction of","rect":[125.99183654785156,151.0191650390625,520.8881127891541,141.91098022460938]},{"page":445,"text":"operations between adjacent units, formations, or areas. (JP 3-0)","rect":[125.99183654785156,162.4820556640625,382.8244836387634,153.36386108398438]},{"page":445,"text":"*bounding overwatch","rect":[89.97991180419922,177.96295166015626,182.5456991119385,169.0150909423828]},{"page":445,"text":"A movement technique used when contact with enemy forces is expected.","rect":[125.98177337646485,192.48193359375,421.6480360031128,183.37374877929688]},{"page":445,"text":"*box formation","rect":[89.97991180419922,205.9387969970703,155.79026698303225,199.0149688720703]},{"page":445,"text":"A movement formation with elements arranged in a box or square, or two elements up and two","rect":[125.97175598144531,222.4818115234375,505.55653953552248,213.37362670898438]},{"page":445,"text":"elements back. ","rect":[125.96173095703125,232.0,187.86529064178468,224.89657592773438]},{"page":445,"text":"*breach","rect":[89.96987915039063,247.46168518066407,124.45972346496582,240.69818115234376]},{"page":445,"text":"A tactical mission task in which a unit breaks through or establishes a passage through an enemy","rect":[125.97174072265625,264.004638671875,513.1194972991943,254.89645385742188]},{"page":445,"text":"obstacle.","rect":[125.97176361083985,273.4434814453125,161.2942762374878,266.3593444824219]},{"page":445,"text":"breach area","rect":[89.96990203857422,288.92437744140627,140.8153896331787,282.160888671875]},{"page":445,"text":"The area where a breaching operation occurs. (ATP 3-90.4/MCTP 3-34A)","rect":[125.97175598144531,305.4674072265625,422.2731835899353,296.3592224121094]},{"page":445,"text":"breakout","rect":[89.94989013671875,318.92425537109377,128.868566280365,312.1607666015625]},{"page":445,"text":"An operation conducted by an encircled force to regain freedom of movement or contact with friendly","rect":[125.95175170898438,335.46728515625,534.4039211273193,326.3591003417969]},{"page":445,"text":"units. (ADP 3-90)","rect":[125.95175170898438,346.9702453613281,197.92542052841189,337.8821105957031]},{"page":445,"text":"*breakthrough","rect":[89.94989776611328,362.47119140625,154.3804922027588,353.68365478515627]},{"page":445,"text":"A rupturing of the enemy’s forward defense that occurs as a result of an attack.","rect":[125.9517593383789,376.99017333984377,442.25115489959719,367.8819885253906]},{"page":445,"text":"bridgehead","rect":[89.94990539550781,392.4710693359375,138.36353968811037,383.5232238769531]},{"page":445,"text":"An area on the enemy’s side of the linear obstacle that is large enough to accommodate the majority of","rect":[125.94175720214844,406.99005126953127,536.9739282188416,397.8718566894531]},{"page":445,"text":"the crossing force, has adequate terrain to permit defense of the crossing sites, provides security of ","rect":[125.93173217773438,418.5130615234375,522.5742750167847,409.4048767089844]},{"page":445,"text":"crossing forces from enemy direct fire, and provides a base for continuing the attack. (ATP 3-90.4/","rect":[125.93173217773438,429.9759521484375,521.4812998733521,420.8677673339844]},{"page":445,"text":"MCTP 3-34A)","rect":[125.93177795410156,441.47894287109377,184.58885741806032,432.39080810546877]},{"page":445,"text":"bridgehead force","rect":[89.92991638183594,456.9798583984375,162.41560078430175,448.0320129394531]},{"page":445,"text":"A force that assaults across a gap, after the crossing is established, to secure the enemy side (the","rect":[125.93177795410156,471.49884033203127,509.95126057434086,462.3906555175781]},{"page":445,"text":"bridgehead) to allow the buildup and passage of a breakout force during gap crossing.","rect":[125.94178009033203,483.0218811035156,469.24819469451907,473.9136962890625]},{"page":445,"text":"(ATP 3-90.4/MCTP 3-34A)","rect":[125.94178009033203,494.4647216796875,237.94533324813845,485.3765869140625]},{"page":445,"text":"bridgehead line","rect":[89.94993591308594,509.96563720703127,156.38152790832519,501.0177917480469]},{"page":445,"text":"The limit of the objective area in the development of the bridgehead. (ATP 3-90.4/MCTP 3-34A)","rect":[125.95179748535156,524.484619140625,515.3190209922791,515.3663940429688]},{"page":445,"text":"*bypass","rect":[89.93994903564453,539.9655151367188,123.89773440170288,531.177978515625]},{"page":445,"text":"A tactical mission task in which a unit deliberately avoids contact with an obstacle or enemy force.","rect":[125.94181060791016,554.4844970703125,521.6817579269409,545.3763427734375]},{"page":445,"text":"*bypass criteria","rect":[89.93998718261719,569.9653930664063,157.94774436950685,561.0175170898438]},{"page":445,"text":"Measures established by higher echelon headquarters that specify the conditions and size under which","rect":[125.93183135986328,584.484375,533.8408718109131,575.376220703125]},{"page":445,"text":"enemy units and contact may be avoided.","rect":[125.93183135986328,596.0073852539063,291.16070079803469,586.8992309570313]},{"page":445,"text":"*canalize","rect":[89.92997741699219,609.4642333984375,129.41879750061035,602.5404052734375]},{"page":445,"text":"(Army) A tactical mission task in which a unit restricts enemy movement to a narrow zone.","rect":[125.93183898925781,626.0072631835938,491.3813123703003,616.8991088867188]},{"page":445,"text":"casualty evacuation","rect":[89.94002532958985,641.4881591796875,173.630049697876,632.540283203125]},{"page":445,"text":"(Army) Nonmedical units use this to refer to the movement of casualties aboard nonmedical vehicles","rect":[125.94188690185547,656.0071411132813,529.6766498069763,646.8989868164063]},{"page":445,"text":"or aircraft without en route medical care. (FM 4-02)","rect":[125.94188690185547,667.4500122070313,333.8769433555603,658.3618774414063]},{"page":445,"text":"*checkpoint","rect":[89.94004821777344,682.930908203125,141.63322997665407,674.0030517578125]},{"page":445,"text":"A predetermined point on the ground used to control movement, tactical maneuver, and orientation.","rect":[125.94190979003906,697.4699096679688,524.7447462081909,688.3617553710938]},{"page":445,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":445,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":445,"text":"Glossary-5","rect":[475.4909973144531,755.9609985351563,521.9391196289063,747.5280151367188]},{"page":446,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":446,"text":"civil reconnaissance","rect":[72.0,81.43024444580078,156.78425312805175,74.50642395019531]},{"page":446,"text":"A targeted, planned, and coordinated observation and evaluation of specific civil aspects of the","rect":[108.00186157226563,97.0113525390625,487.6876497344971,87.9031753540039]},{"page":446,"text":"environment such as areas, structures, capabilities, organizations, people, or events. (JP 3-57) ","rect":[108.00186157226563,108.53436279296875,486.5374708175659,99.42618560791016]},{"page":446,"text":"*clear","rect":[72.02010345458985,123.97516632080078,98.18732929992676,117.06137084960938]},{"page":446,"text":"A tactical mission task in which a unit eliminates all enemy forces within an assigned area.","rect":[108.02196502685547,140.5181884765625,471.7880506515503,131.41000366210938]},{"page":446,"text":"close combat","rect":[72.03012084960938,153.9750518798828,126.78241515731811,147.2115478515625]},{"page":446,"text":"Warfare carried out on land in a direct-fire fight, supported by direct and indirect fires, and other","rect":[108.031982421875,170.51806640625,494.64278197860718,161.40988159179688]},{"page":446,"text":"assets. (ADP 3-0)","rect":[108.0320053100586,181.96092224121095,178.86337829208376,172.87277221679688]},{"page":446,"text":"*column formation","rect":[72.02012634277344,195.4378204345703,153.97169398498537,188.5139923095703]},{"page":446,"text":"A movement formation with elements arranged one behind another.","rect":[108.02198791503906,211.9808349609375,379.33462047576907,202.87265014648438]},{"page":446,"text":"combat load","rect":[72.03015899658203,225.4376983642578,124.5850591583252,218.6741943359375]},{"page":446,"text":"The minimum mission-essential equipment and supplies as determined by the commander responsible","rect":[108.03202056884766,241.980712890625,516.5785188751221,232.87252807617188]},{"page":446,"text":"for carrying out the mission, required for Soldiers to fight and survive immediate combat operations.","rect":[108.03204345703125,253.503662109375,510.7928419113159,244.39547729492188]},{"page":446,"text":"(FM 4-40)","rect":[108.03204345703125,264.9465026855469,150.00583434677126,255.85836791992188]},{"page":446,"text":"*combat outpost","rect":[72.03018188476563,280.4274597167969,142.92567992782595,271.65997314453127]},{"page":446,"text":"A reinforced observation post capable of conducting limited combat operations.","rect":[108.03204345703125,294.9664306640625,427.3946485519409,285.8582458496094]},{"page":446,"text":"combat power","rect":[72.03015899658203,310.4272766113281,132.933728225708,301.6597900390625]},{"page":446,"text":"The total means of destructive and/or disruptive force that a military unit/formation can apply against","rect":[108.03202056884766,324.96630859375,513.4800791702271,315.8581237792969]},{"page":446,"text":"an opponent at a given time. (JP 3-0) ","rect":[108.03201293945313,336.48931884765627,258.3721113204956,327.3811340332031]},{"page":446,"text":"combined arms","rect":[72.03015899658203,349.9461669921875,137.844542263031,343.0223693847656]},{"page":446,"text":"The synchronized and simultaneous application of arms to achieve an effect greater than if each","rect":[108.03201293945313,366.48919677734377,491.20314598083498,357.3810119628906]},{"page":446,"text":"element was used separately or sequentially. (ADP 3-0)","rect":[108.03201293945313,378.01220703125,330.71651244735718,368.9040222167969]},{"page":446,"text":"command and control warfighting function","rect":[72.0201416015625,393.49310302734377,256.4493246002197,384.5452575683594]},{"page":446,"text":"The related tasks and a system that enable commanders to synchronize and converge all elements of ","rect":[108.02200317382813,408.0120544433594,510.72170543670657,398.90386962890627]},{"page":446,"text":"power. (ADP 3-0)","rect":[108.02200317382813,419.45489501953127,180.53673339462282,410.36676025390627]},{"page":446,"text":"*consolidate","rect":[72.02013397216797,432.9317932128906,124.88566304016114,426.00799560546877]},{"page":446,"text":"To organize and strengthen a captured position to use it against the enemy.","rect":[108.01197814941406,449.4748229980469,407.15911388397219,440.36663818359377]},{"page":446,"text":"contact point","rect":[72.01016998291016,464.9356689453125,127.85062194442749,456.00787353515627]},{"page":446,"text":"In land warfare, a point on the terrain, easily identifiable, where two or more units are required to make","rect":[108.01202392578125,479.4747009277344,521.5382356719971,470.36651611328127]},{"page":446,"text":"contact. (JP 3-50)","rect":[108.01202392578125,490.9776916503906,178.84341979599,481.8895568847656]},{"page":446,"text":"*contain","rect":[72.0001449584961,504.4545593261719,108.71041773986816,497.53076171875]},{"page":446,"text":"A tactical mission task in which a unit stops, holds, or surrounds an enemy force.","rect":[108.00199890136719,520.9976196289063,432.7081251144409,511.8894348144531]},{"page":446,"text":"*control","rect":[72.01016998291016,534.4544677734375,107.61524152374268,527.6909790039063]},{"page":446,"text":"(Army) A tactical mission task in which a unit maintains physical influence over an assigned area.","rect":[108.01202392578125,550.9974365234375,501.2239942550659,541.8892822265625]},{"page":446,"text":"control measure","rect":[72.02017974853516,564.454345703125,141.1431551055908,557.6908569335938]},{"page":446,"text":"A means of regulating forces or warfighting functions. (ADP 6-0)","rect":[108.02204132080078,580.997314453125,371.3376367149353,571.88916015625]},{"page":446,"text":"coordinated fire line","rect":[72.02020263671875,594.4541625976563,158.66515827941894,587.5303344726563]},{"page":446,"text":"A line beyond which conventional surface-to-surface direct fire and indirect fire support means may","rect":[108.02206420898438,610.9972534179688,508.71080589294436,601.8890991210938]},{"page":446,"text":"fire at any time within the boundaries of the establishing headquarters without additional coordination","rect":[108.01200866699219,622.4601440429688,515.9812526702881,613.3519897460938]},{"page":446,"text":"but does not eliminate the responsibility to coordinate the airspace required to conduct the mission.","rect":[108.01200866699219,633.983154296875,504.35113048553469,624.875]},{"page":446,"text":"(JP 3-09)","rect":[108.01200866699219,645.4861450195313,145.00586486434939,636.3980102539063]},{"page":446,"text":"coordinating altitude","rect":[72.0101547241211,660.987060546875,161.77935505676269,652.0391845703125]},{"page":446,"text":"An airspace coordinating measure that uses altitude to separate users and as the transition between","rect":[108.01200866699219,675.5060424804688,501.1667995452881,666.3978881835938]},{"page":446,"text":"different airspace control elements. (JP 3-52)","rect":[108.01200866699219,686.9489135742188,288.5323388633728,677.8607788085938]},{"page":446,"text":"coordination level","rect":[72.01016998291016,700.42578125,148.41367292022705,693.501953125]},{"page":446,"text":"An airspace coordinating measure below which fixed-wing aircraft normally will not fly. (JP 3-52)","rect":[108.01202392578125,716.9688110351563,503.4613244590759,707.8606567382813]},{"page":446,"text":"Glossary-6","rect":[72.1199951171875,755.9609985351563,118.56809454345704,747.5280151367188]},{"page":446,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":446,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":447,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":447,"text":"*coordination point","rect":[90.0,83.43424987792969,174.22009826278689,74.50642395019531]},{"page":447,"text":"A point that indicates a specific location for the coordination of tactical actions between adjacent units.","rect":[126.00186157226563,97.9732666015625,538.1108350753784,88.85507202148438]},{"page":447,"text":"*cordon and search","rect":[90.0,111.43012237548828,173.9275350494385,104.6666259765625]},{"page":447,"text":"A variation of movement to contact where a friendly force isolates and searches a target area.","rect":[126.00186157226563,127.97314453125,499.1165723800659,118.8649673461914]},{"page":447,"text":"counterair","rect":[90.01001739501953,141.4300079345703,135.01784992980957,134.5061798095703]},{"page":447,"text":"A mission at the theater level that integrates offensive and defensive operations to attain and maintain a","rect":[126.01187133789063,157.9730224609375,539.9000520782471,148.86483764648438]},{"page":447,"text":"desired degree of control of the air and protection by neutralizing or destroying enemy aircraft and","rect":[126.01187133789063,169.49603271484376,520.1135158538818,160.38784790039063]},{"page":447,"text":"missiles, both before and after launch. (JP 3-01)","rect":[126.01185607910156,180.99900817871095,317.86482787704468,171.91085815429688]},{"page":447,"text":"*counterattack","rect":[89.9999771118164,194.4759063720703,154.42860316467287,187.71240234375]},{"page":447,"text":"A variation of attack by a defending force against an attacking enemy force.","rect":[126.00184631347656,211.0189208984375,430.0086622238159,201.91073608398438]},{"page":447,"text":"countermobility","rect":[90.0,226.49981689453126,158.36948204040528,217.5519561767578]},{"page":447,"text":"A set of combined arms activities that use or enhance the effects of natural and man-made obstacles to","rect":[125.9918441772461,238.9346466064453,535.6345119476318,231.85049438476563]},{"page":447,"text":"prevent the enemy freedom of movement and maneuver. (ATP 3-90.8/MCTP 3-34B)","rect":[125.99179077148438,252.481689453125,466.4212853965759,243.37350463867188]},{"page":447,"text":"*counterreconnaissance","rect":[89.99992370605469,265.93853759765627,192.30212117004394,259.0147399902344]},{"page":447,"text":"A tactical mission task that encompasses all measures taken by a unit to counter enemy reconnaissance","rect":[126.00178527832031,282.4815368652344,537.8478670196533,273.37335205078127]},{"page":447,"text":"and surveillance efforts.","rect":[126.00178527832031,291.9804992675781,222.3420820236206,284.8963623046875]},{"page":447,"text":"cover","rect":[89.99993133544922,307.4613952636719,113.4066515045166,302.6217346191406]},{"page":447,"text":"(Army) A type of security operation done independent of the main body to protect them by fighting to","rect":[125.99177551269531,324.00439453125,534.4388332366943,314.8962097167969]},{"page":447,"text":"gain time while preventing enemy ground observation of and direct fire against the main body.","rect":[125.99177551269531,335.46728515625,505.05837535858157,326.3591003417969]},{"page":447,"text":"(ADP 3-90)","rect":[125.99176025390625,346.9702453613281,173.54668212509157,337.8821105957031]},{"page":447,"text":"covert crossing","rect":[89.9898910522461,362.47119140625,154.1569881439209,353.5233459472656]},{"page":447,"text":"A planned crossing of an inland water obstacle or other gap in which the crossing is intended to be","rect":[125.99175262451172,376.99017333984377,520.4460725860596,367.8819885253906]},{"page":447,"text":"undetected. (ATP 3-90.4/MCTP 3-34A)","rect":[126.00177001953125,388.49310302734377,286.28169799423218,379.40496826171877]},{"page":447,"text":"combined arms","rect":[89.97987365722656,401.9700012207031,155.79426455307007,395.04620361328127]},{"page":447,"text":"The synchronized and simultaneous application of arms to achieve an effect greater than if each","rect":[125.98173522949219,418.5130310058594,509.15761375427248,409.40484619140627]},{"page":447,"text":"element was used seperately or sequentially. (ADP 3-0)","rect":[125.97172546386719,429.9759216308594,348.66621947860718,420.86773681640627]},{"page":447,"text":"critical asset security","rect":[89.96986389160156,445.4568176269531,179.3933620452881,436.50897216796877]},{"page":447,"text":"The protection and security of personnel and physical assets or information that is analyzed and","rect":[125.97172546386719,459.9757995605469,508.6775417327881,450.86761474609377]},{"page":447,"text":"deemed essential to the operation and success of the mission and to resources required for protection.","rect":[125.97172546386719,471.478759765625,530.8947706222534,462.390625]},{"page":447,"text":"(ADP 3-37)","rect":[125.97172546386719,483.00177001953127,173.5266473350525,473.91363525390627]},{"page":447,"text":"*cueing","rect":[89.9698486328125,498.5027160644531,122.75829887390137,489.55487060546877]},{"page":447,"text":"The integration of one or more types of reconnaissance or surveillance systems to provide information","rect":[125.9616928100586,512.9616088867188,535.2484645843506,503.8533935546875]},{"page":447,"text":"that directs follow-on collecting of more detailed information by another system.","rect":[125.9616928100586,524.484619140625,449.57851696014407,515.37646484375]},{"page":447,"text":"cyberspace defense","rect":[89.95978546142578,539.9654541015625,171.38232136535644,531.027587890625]},{"page":447,"text":"Actions taken within protected cyberspace to defeat specific threats that have breached or are","rect":[125.95162963867188,554.4844970703125,498.8412141876221,545.3763427734375]},{"page":447,"text":"threatening to breach cyberspace security measures. (JP 3-12)","rect":[125.95162963867188,566.0074462890625,373.06487060165406,556.8992919921875]},{"page":447,"text":"cyberspace electromagnetic activities","rect":[89.94979095458985,581.4884033203125,247.68055605697632,572.54052734375]},{"page":447,"text":"The process of planning, integrating, and synchronizing cyberspace operations and electromagnetic","rect":[125.95164489746094,596.0073852539063,523.6334505157471,586.8992309570313]},{"page":447,"text":"warfare operations in support of unified land operations. (ADP 3-0)","rect":[125.95164489746094,607.4502563476563,396.4014794883728,598.3621215820313]},{"page":447,"text":"cyberspace security","rect":[89.93975830078125,622.9511108398438,173.5436611175537,614.0032348632813]},{"page":447,"text":"Actions taken within protected cyberspace to prevent unauthorized access to, exploitation of, or","rect":[125.93161010742188,637.4701538085938,508.52522826766968,628.3619995117188]},{"page":447,"text":"damage to computers and networks, including platform information technology. (JP 3-12)","rect":[125.93161010742188,648.9931640625,485.84001708602906,639.885009765625]},{"page":447,"text":"deception goal","rect":[89.91976928710938,664.4740600585938,151.38648175811768,655.5261840820313]},{"page":447,"text":"Commander’s statement of the purpose of military deception as it contributes to the successful","rect":[125.921630859375,678.9930419921875,503.88172101593019,669.8848876953125]},{"page":447,"text":"accomplishment of the assigned mission. (JP 3-13.4)","rect":[125.92163848876953,690.5160522460938,337.0981347618103,681.4078979492188]},{"page":447,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":447,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":447,"text":"Glossary-7","rect":[475.4909973144531,755.9609985351563,521.9391196289063,747.5280151367188]},{"page":448,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":448,"text":"deception means","rect":[72.0,83.43424987792969,142.8504474143982,74.50642395019531]},{"page":448,"text":"Methods, resources, and techniques that can be used to convey information to the deception target.","rect":[108.00186157226563,97.9732666015625,502.6645460128784,88.8650894165039]},{"page":448,"text":"(JP 3-13.4)","rect":[108.00186157226563,109.47624206542969,152.49567199325564,100.38809967041016]},{"page":448,"text":"deception objective","rect":[72.0,124.9771728515625,153.96763325500488,116.02931213378906]},{"page":448,"text":"The desired result of a deception operation expressed in terms of what the adversary is to do or not to","rect":[108.00186157226563,139.49615478515626,513.2115383148193,130.38796997070313]},{"page":448,"text":"do at the critical time and/or location. (JP 3-13.4)","rect":[108.00186157226563,150.99913024902345,305.1904504356384,141.91098022460938]},{"page":448,"text":"deception target","rect":[71.9999771118164,166.50006103515626,141.15703368759157,157.5522003173828]},{"page":448,"text":"The adversary decision maker with the authority to make the decision that will achieve the deception","rect":[108.00184631347656,181.01904296875,511.4109401702881,171.91085815429688]},{"page":448,"text":"objective. (JP 3-13.4)","rect":[108.00184631347656,192.48193359375,194.13878417587282,183.36373901367188]},{"page":448,"text":"decisive terrain","rect":[71.99999237060547,205.9387969970703,137.80735682678225,199.0149688720703]},{"page":448,"text":"Key terrain whose seizure and retention is mandatory for successful mission accomplishment.","rect":[108.00184631347656,222.4818115234375,483.5234327316284,213.37362670898438]},{"page":448,"text":"(ADP 3-90)","rect":[108.00184631347656,233.98472595214845,155.55676818466189,224.89657592773438]},{"page":448,"text":"*decisively engaged","rect":[71.9999771118164,249.4857177734375,155.6870565338135,240.53785705566407]},{"page":448,"text":"A fully committed force or unit that cannot maneuver or extricate itself.","rect":[108.00184631347656,264.004638671875,395.1589307785034,254.89645385742188]},{"page":448,"text":"decoy","rect":[72.01000213623047,279.485595703125,96.51791954040528,270.69805908203127]},{"page":448,"text":"An imitation in any sense of a person, object, or phenomenon that is intended to deceive enemy","rect":[108.01187133789063,294.0045471191406,490.1195583343506,284.8863525390625]},{"page":448,"text":"surveillance devices or mislead enemy evaluation. (JP 3-13.4)","rect":[108.01187133789063,305.4674072265625,356.03191161727906,296.3592224121094]},{"page":448,"text":"defeat","rect":[72.02002716064453,318.92425537109377,98.15519500350952,312.0104675292969]},{"page":448,"text":"To render a force incapable of achieving its objectives. (ADP 3-0)","rect":[108.02188873291016,335.46728515625,372.7102258262634,326.3490905761719]},{"page":448,"text":"defense support of civil authorities","rect":[72.00999450683594,350.9281311035156,219.30294680404664,342.0003356933594]},{"page":448,"text":"(DOD) Support provided by U.S. Federal military forces, Department of Defense civilians, Department","rect":[108.01185607910156,365.4671630859375,521.7478404006959,356.3589782714844]},{"page":448,"text":"of Defense contract personnel, Department of Defense component assets, and National Guard forces","rect":[108.01185607910156,376.9701232910156,509.5756366233826,367.8819885253906]},{"page":448,"text":"(when the Secretary of Defense, in coordination with the governors of the affected States, elects and","rect":[108.01185607910156,388.5131530761719,508.70494651794436,379.40496826171877]},{"page":448,"text":"requests to use those forces in Title 32, United States Code, status) in response to requests for","rect":[108.01185607910156,399.95599365234377,482.43623900985718,390.86785888671877]},{"page":448,"text":"assistance from civil authorities for domestic emergencies, law enforcement support, and other","rect":[108.01185607910156,411.4990234375,487.0546777305603,402.3908386230469]},{"page":448,"text":"domestic activities, or from qualifying entities for special events. (DODD 3025.18)","rect":[108.01185607910156,423.02203369140627,441.0472314414978,413.9138488769531]},{"page":448,"text":"defensive operation","rect":[72.02002716064453,438.4828796386719,155.10688685607912,429.5550842285156]},{"page":448,"text":"An operation to defeat an enemy attack, gain time, economize forces, and develop conditions favorable","rect":[108.02188873291016,453.02191162109377,520.9499178009033,443.9137268066406]},{"page":448,"text":"for offensive or stability operations. (ADP 3-0)","rect":[108.02188873291016,464.48480224609377,296.5782678184509,455.3766174316406]},{"page":448,"text":"delay","rect":[72.02002716064453,479.9656982421875,94.8455867767334,471.17816162109377]},{"page":448,"text":"When a force under pressure trades space for time by slowing down the enemy’s momentum and","rect":[108.02188873291016,494.48468017578127,495.94920921325686,485.3764953613281]},{"page":448,"text":"inflicting maximum damage on enemy forces without becoming decisively engaged. (ADP 3-90)","rect":[108.02189636230469,506.0076904296875,496.37703490829468,496.8995056152344]},{"page":448,"text":"*delay line","rect":[72.01998901367188,521.4885864257813,117.9286241607666,512.5407104492188]},{"page":448,"text":"A phase line over which an enemy is not allowed to cross before a specific date and time or enemy","rect":[108.0218505859375,536.007568359375,503.1555690765381,526.8994140625]},{"page":448,"text":"condition.","rect":[108.02183532714844,545.4464111328125,148.32229137420655,538.3623046875]},{"page":448,"text":"deliberate breach","rect":[72.01997375488281,560.9273071289063,146.76618861389162,554.0034790039063]},{"page":448,"text":"The systematically planned and executed creation of a lane through a barrier or obstacle. (ATP 3-90.4/","rect":[108.02184295654297,577.4703369140625,518.0803599319459,568.3621826171875]},{"page":448,"text":"MCTP 3-34A)","rect":[108.01182556152344,588.9733276367188,166.6689050254822,579.8851928710938]},{"page":448,"text":"deliberate crossing","rect":[72.00995635986328,604.4742431640625,152.3142604827881,595.5263671875]},{"page":448,"text":"The crossing of an inland water obstacle or other gap that requires extensive planning and detailed","rect":[108.0118179321289,618.9932250976563,501.4580593109131,609.8850708007813]},{"page":448,"text":"preparations. (ATP 3-90.4/MCTP 3-34A)","rect":[108.0118179321289,630.4962158203125,274.41399169540406,621.4080810546875]},{"page":448,"text":"deliberate operation","rect":[71.98992919921875,645.9771118164063,158.377364151001,637.0492553710938]},{"page":448,"text":"An operation in which the tactical situation allows the development and coordination of detailed plans,","rect":[107.99179077148438,660.49609375,519.2708082199097,651.407958984375]},{"page":448,"text":"including multiple branches and sequels. (ADP 3-90)","rect":[107.99180603027344,671.97900390625,321.02702880477906,662.870849609375]},{"page":448,"text":"*demonstration","rect":[71.9899673461914,685.4358520507813,139.24018763732912,678.5120239257813]},{"page":448,"text":"A variation of tactical deception used as a show of force in an area where a unit does not seek a","rect":[107.99182891845703,701.9588623046875,489.6035432891846,692.8707275390625]},{"page":448,"text":"decision and attempts to mislead an adversary.","rect":[107.99183654785156,713.5018920898438,294.33376598358157,704.3937377929688]},{"page":448,"text":"Glossary-8","rect":[72.1199951171875,755.9609985351563,118.56809454345704,747.5280151367188]},{"page":448,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":448,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":449,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":449,"text":"*denial operations","rect":[90.0,83.43424987792969,168.6609942893982,74.50642395019531]},{"page":449,"text":"Actions to hinder or deny the enemy the use of terrain, supplies, or facilities.","rect":[126.00186157226563,97.9732666015625,432.58782482147219,88.8650894165039]},{"page":449,"text":"*destroy","rect":[89.99996185302735,113.45416259765625,126.74831199645996,104.6666259765625]},{"page":449,"text":"A tactical mission task that physically renders an enemy force combat-ineffective until reconstituted.","rect":[126.00182342529297,127.97314453125,529.5482740402222,118.8649673461914]},{"page":449,"text":"*detachment left in contact","rect":[89.99996185302735,141.4300079345703,205.8301599082947,134.5061798095703]},{"page":449,"text":"An element left in contact as part of the previously designated security force while the main body","rect":[126.00182342529297,157.9730224609375,515.9682521820068,148.86483764648438]},{"page":449,"text":"conducts its withdrawal.","rect":[126.0018310546875,167.4720001220703,223.54653453826905,160.38784790039063]},{"page":449,"text":"*diamond formation","rect":[90.00999450683594,182.95289611816407,178.13987635803225,176.02906799316407]},{"page":449,"text":"A movement formation with one element leading, one element positioned on each flank, and the","rect":[126.00183868408203,199.49591064453126,511.50634480285648,190.38772583007813]},{"page":449,"text":"remaining elements to the rear. ","rect":[126.00188446044922,211.0189208984375,252.7047986984253,201.91073608398438]},{"page":449,"text":"*direct pressure force","rect":[89.9900131225586,226.4797821044922,183.28898335266113,217.5519561767578]},{"page":449,"text":"A force employed in a pursuit that orients on the enemy main body to prevent enemy disengagement or","rect":[125.9917984008789,240.95867919921876,539.5512597618103,231.85049438476563]},{"page":449,"text":"defensive reconstitution.","rect":[125.99185180664063,250.45765686035157,224.31713390350343,243.37350463867188]},{"page":449,"text":"directed obstacle","rect":[89.98997497558594,265.93853759765627,161.87347126770019,259.0147399902344]},{"page":449,"text":"An obstacle directed by a higher commander as a specified task to a subordinate unit.","rect":[125.99183654785156,282.4815368652344,467.1921339035034,273.37335205078127]},{"page":449,"text":"(ATP 3-90.8/MCTP 3-34B)","rect":[125.99183654785156,293.9844970703125,237.45432067489626,284.8963623046875]},{"page":449,"text":"direction of attack","rect":[89.98997497558594,307.4613952636719,168.3383779449463,300.53759765625]},{"page":449,"text":"A specific direction or assigned route a force uses and does not deviate from when attacking.","rect":[125.98182678222656,324.00439453125,497.5457715988159,314.8962097167969]},{"page":449,"text":"(ADP 3-90)","rect":[125.98182678222656,335.4472351074219,173.53674865341189,326.3591003417969]},{"page":449,"text":"*disengage","rect":[89.97996520996094,350.94818115234377,136.72826863098144,342.0003356933594]},{"page":449,"text":"A tactical mission task in which a unit breaks contact with an enemy to conduct another mission or to","rect":[125.98182678222656,365.4671630859375,531.9050807952881,356.3589782714844]},{"page":449,"text":"avoid becoming decisively engaged.","rect":[125.9718017578125,376.99017333984377,271.5714063644409,367.8819885253906]},{"page":449,"text":"*disengagement criteria","rect":[89.96994018554688,392.4710693359375,192.4705410003662,383.5232238769531]},{"page":449,"text":"Protocols that specify those circumstances where a friendly force must break contact with the direct","rect":[125.9718017578125,406.99005126953127,524.8147349319459,397.8818664550781]},{"page":449,"text":"fire and observed indirect fire to avoid becoming decisively engaged or to preserve friendly combat","rect":[125.9718017578125,418.5130615234375,524.2750010452271,409.4048767089844]},{"page":449,"text":"power.","rect":[125.9718017578125,429.9559020996094,153.4937391281128,423.2024230957031]},{"page":449,"text":"disengagement line","rect":[89.97994995117188,445.45684814453127,171.402478225708,436.5090026855469]},{"page":449,"text":"A phase line located on identifiable terrain that, when crossed by the enemy, signals to defending","rect":[125.98182678222656,459.975830078125,514.9952297210693,450.8676452636719]},{"page":449,"text":"elements that it is time to displace to their next position. (ADP 3-90)","rect":[125.98182678222656,471.4787902832031,400.15910888290406,462.3906555175781]},{"page":449,"text":"*dismounted movement","rect":[89.97994995117188,484.9556884765625,191.95349670028689,478.0318908691406]},{"page":449,"text":"A movement of troops and equipment mainly by foot, with limited support by vehicles.","rect":[125.9818115234375,501.49871826171877,475.70794200897219,492.3905334472656]},{"page":449,"text":"*disrupt","rect":[89.97994995117188,516.9595947265625,126.13812804794311,508.0317687988281]},{"page":449,"text":"1. A tactical mission task in which a unit upsets an enemy’s formation or tempo and causes the enemy","rect":[125.9818115234375,531.4985961914063,534.4927272796631,522.3904418945313]},{"page":449,"text":"force to attack prematurely or in a piecemeal fashion.. 2. An obstacle effect that focuses fire planning","rect":[125.98180389404297,542.96142578125,531.1294460296631,533.853271484375]},{"page":449,"text":"and obstacle effort to cause the enemy to break up its formation and tempo, interrupt its timetable,","rect":[125.98181915283203,554.4844970703125,518.6665601730347,545.3763427734375]},{"page":449,"text":"commit breaching assets prematurely, and attack in a piecemeal effort.","rect":[125.98181915283203,566.0074462890625,408.3785047531128,556.8992919921875]},{"page":449,"text":"*double envelopment","rect":[89.97994995117188,581.4683837890625,180.85234618759157,572.7008666992188]},{"page":449,"text":"A variation of envelopment where forces simultaneously attack along both flanks of an enemy force.","rect":[125.9818115234375,596.0073852539063,529.0472364425659,586.8992309570313]},{"page":449,"text":"*echelon formation","rect":[89.98998260498047,609.4641723632813,172.537764541626,602.5403442382813]},{"page":449,"text":"A movement formation with elements arranged on an angle to the left or to the right of the direction of ","rect":[125.99185180664063,626.0072631835938,539.2014112472534,616.8991088867188]},{"page":449,"text":"attack (echelon left, echelon right).","rect":[125.99185180664063,637.4701538085938,265.95415782928469,628.3619995117188]},{"page":449,"text":"electromagnetic protection","rect":[89.98998260498047,652.9509887695313,204.15183924865725,644.0031127929688]},{"page":449,"text":"A division of electromagnetic warfare involving actions taken to protect personnel, facilities, and","rect":[125.99185180664063,667.4700317382813,514.6956996917725,658.3618774414063]},{"page":449,"text":"equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade,","rect":[125.98181915283203,678.9930419921875,522.2077589035034,669.8848876953125]},{"page":449,"text":"neutralize, or destroy friendly combat capability. (JP 3-85)","rect":[125.98185729980469,690.5160522460938,360.61018920516968,681.4078979492188]},{"page":449,"text":"electromagnetic reconnaissance","rect":[89.96997833251953,705.9969482421875,224.67486286926269,697.049072265625]},{"page":449,"text":"The detection, location, identification, and evaluation of foreign electromagnetic radiations. (JP 3-85)","rect":[125.97183227539063,719.4938354492188,532.3329980430603,710.3856811523438]},{"page":449,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":449,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":449,"text":"Glossary-9","rect":[475.4909973144531,755.9609985351563,521.9391196289063,747.5280151367188]},{"page":450,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":450,"text":"electromagnetic spectrum operations","rect":[72.0,83.45428466796875,229.79797243881226,74.50642395019531]},{"page":450,"text":"Coordinated military actions to exploit, attack, protect, and manage the electromagnetic environment.","rect":[108.00186157226563,97.9732666015625,514.299952507019,88.8650894165039]},{"page":450,"text":"(JP 3-85)","rect":[107.99186706542969,109.47624206542969,144.98570800399782,100.38809967041016]},{"page":450,"text":"emission control","rect":[71.9900131225586,122.95313262939453,141.73023175811768,116.02931213378906]},{"page":450,"text":"The selective and controlled use of electromagnetic, acoustic, or other emitters to optimize command","rect":[107.99186706542969,139.49615478515626,512.5818386077881,130.38796997070313]},{"page":450,"text":"and control capabilities while minimizing, for operations security: a. detection by enemy sensors, b.","rect":[107.99186706542969,151.0191650390625,507.09661388397219,141.91098022460938]},{"page":450,"text":"mutual interference among friendly systems, and/or c. enemy interference with the ability to execute a","rect":[107.99185180664063,162.4820556640625,516.7176179962158,153.37387084960938]},{"page":450,"text":"military deception plan. (JP 3-85)","rect":[107.99185180664063,174.0050048828125,242.66066527938845,164.89682006835938]},{"page":450,"text":"*enabling operation","rect":[71.97997283935547,189.48590087890626,157.29023646545412,180.5380401611328]},{"page":450,"text":"An operation that sets the friendly conditions required for mission accomplishment.","rect":[107.98182678222656,204.0048828125,442.5887403488159,194.89669799804688]},{"page":450,"text":"*encirclement","rect":[71.97997283935547,217.46180725097657,131.94768310165407,210.53797912597657]},{"page":450,"text":"Where one force loses its freedom of maneuver because an opposing force is able to isolate it by","rect":[107.98182678222656,234.0047607421875,493.7477626800537,224.89657592773438]},{"page":450,"text":"controlling all ground lines of communications and reinforcement. ","rect":[107.98182678222656,245.4676513671875,376.57793712615969,236.35946655273438]},{"page":450,"text":"*encircling force","rect":[71.97997283935547,260.94854736328127,143.32339192199707,252.0006866455078]},{"page":450,"text":"The force that maneuvers to the rear or flank of the enemy to prevent the enemy’s escape.","rect":[107.98182678222656,275.467529296875,467.0685987472534,266.3593444824219]},{"page":450,"text":"*engagement area","rect":[71.97997283935547,290.94842529296877,149.5227565765381,282.0105895996094]},{"page":450,"text":"An area where the commander masses effects to contain and destroy an enemy force.","rect":[107.98182678222656,305.4674072265625,448.39654064178469,296.3592224121094]},{"page":450,"text":"*engagement criteria","rect":[71.97997283935547,320.94830322265627,162.24013328552247,312.0004577636719]},{"page":450,"text":"Protocols that specify those circumstances for initiating engagement with an enemy force.","rect":[107.98182678222656,335.46728515625,467.8552198410034,326.3591003417969]},{"page":450,"text":"*engagement priority","rect":[71.97997283935547,350.94818115234377,163.98764610290528,342.0003356933594]},{"page":450,"text":"Identifies the order in which the unit engages enemy systems or functions.","rect":[107.98182678222656,365.4671630859375,405.2032423019409,356.3589782714844]},{"page":450,"text":"*envelopment","rect":[71.98998260498047,380.9280090332031,131.47974181747439,372.1605224609375]},{"page":450,"text":"A form of maneuver in which an attacking force avoids an enemy’s principal defense by attacking","rect":[107.99185180664063,395.467041015625,500.9050807952881,386.3588562011719]},{"page":450,"text":"along an assailable flank.","rect":[107.99183654785156,406.99005126953127,209.07360363006593,397.8818664550781]},{"page":450,"text":"*exfiltrate","rect":[71.98997497558594,420.4468994140625,115.90964985656739,413.5231018066406]},{"page":450,"text":"A tactical mission task in which a unit removes Soldiers or units from areas under enemy control by","rect":[107.99183654785156,436.98992919921877,508.23265647888186,427.8817443847656]},{"page":450,"text":"stealth, deception, surprise, or clandestine means. ","rect":[108.00186157226563,448.4928894042969,308.5722303390503,439.4047546386719]},{"page":450,"text":"*exploitation","rect":[72.00999450683594,463.9737854003906,127.62100123596191,455.0459899902344]},{"page":450,"text":"(Army) A type of offensive operation following a successful attack to disorganize the enemy in depth.","rect":[108.01185607910156,478.5128173828125,516.8440504074097,469.4046325683594]},{"page":450,"text":"far side objective","rect":[72.02002716064453,493.99371337890627,144.80633259582519,485.0458679199219]},{"page":450,"text":"A defined location oriented on terrain or an enemy force that an assaulting force seizes to eliminate","rect":[108.02188873291016,508.45257568359377,505.11349201965336,499.3443908691406]},{"page":450,"text":"enemy direct fires to prevent the enemy from interfering with the reduction of the obstacles and allow","rect":[108.02188110351563,519.9755859375,515.1525311508178,510.8674011230469]},{"page":450,"text":"follow-on forces to move securely through the created lanes. (ATP 3-90.4/MCTP 3-34A)","rect":[108.02188110351563,531.4985961914063,464.93428588485718,522.3904418945313]},{"page":450,"text":"*feint","rect":[72.00997924804688,544.9554443359375,96.46779418563843,538.0316162109375]},{"page":450,"text":"A variation of tactical deception that makes contact solely to deceive the adversary as to the location,","rect":[108.0118408203125,561.4984741210938,512.6395215988159,552.3903198242188]},{"page":450,"text":"time of attack or both.","rect":[108.01190185546875,570.9373168945313,196.61876964569093,563.8532104492188]},{"page":450,"text":"*field of fire","rect":[72.0100326538086,586.418212890625,124.27836323547364,579.494384765625]},{"page":450,"text":"The area that a weapon or group of weapons may cover effectively from a given position.","rect":[108.01189422607422,602.9612426757813,466.1909132003784,593.8530883789063]},{"page":450,"text":"final coordination line","rect":[72.0100326538086,616.4180908203125,166.4585847930908,609.4942626953125]},{"page":450,"text":"A phase line close to the enemy position used to coordinate the lifting or shifting of supporting fires","rect":[108.01190185546875,632.9611206054688,507.7274920921326,623.8529663085938]},{"page":450,"text":"with the final deployment of maneuver elements. (ADP 3-90)","rect":[108.01190185546875,644.484130859375,354.46379638290406,635.3759765625]},{"page":450,"text":"final protective fire","rect":[72.0,659.9450073242188,154.20409870910644,651.0171508789063]},{"page":450,"text":"An immediately available, prearranged barrier of fire designed to impede enemy movement across","rect":[108.00186920166016,674.4840087890625,502.0774981956482,665.3758544921875]},{"page":450,"text":"defensive lines or areas. (JP 3-09.3)","rect":[108.00186920166016,685.9869995117188,251.07245421981814,676.8988647460938]},{"page":450,"text":"Glossary-10","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":450,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":450,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":451,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":451,"text":"*final protective line","rect":[90.0,83.43424987792969,177.78924275207519,74.50642395019531]},{"page":451,"text":"A selected line of fire where an enemy assault is to be checked by interlocking fire from all available","rect":[126.00186157226563,97.9732666015625,529.7350740509033,88.8650894165039]},{"page":451,"text":"weapons and obstacles.","rect":[126.00186157226563,109.47624206542969,219.5886640548706,100.38809967041016]},{"page":451,"text":"*fire superiority","rect":[89.99999237060547,124.9771728515625,159.7462215423584,116.02931213378906]},{"page":451,"text":"The dominating fires of one force over another force that permits that force to maneuver at a given","rect":[126.00184631347656,139.49615478515626,520.5915431976318,130.38796997070313]},{"page":451,"text":"time and place without prohibitive interference by the other.","rect":[126.00184631347656,151.0191650390625,366.77028942108157,141.91098022460938]},{"page":451,"text":"fire support coordination","rect":[89.9999771118164,166.4800262451172,197.81519984436037,157.5522003173828]},{"page":451,"text":"The planning and executing of fire so targets are adequately covered by a suitable weapon or group of","rect":[125.9918212890625,181.01904296875,533.9099023399353,171.91085815429688]},{"page":451,"text":"weapons. (JP 3-09)","rect":[125.9918212890625,192.46189880371095,203.01556945419314,183.37374877929688]},{"page":451,"text":"fire support coordination line","rect":[89.9999771118164,207.9427947998047,215.8892488555908,199.0149688720703]},{"page":451,"text":"A fire support coordination measure established by the land or amphibious force commander to","rect":[125.99183654785156,222.4818115234375,507.8590602874756,213.37362670898438]},{"page":451,"text":"support common objectives within an area of operation, beyond which all fires must be coordinated","rect":[125.99183654785156,234.0047607421875,524.6093654632568,224.88656616210938]},{"page":451,"text":"with affected commanders prior to engagement and, short of the line, all fires must be coordinated with","rect":[125.99183654785156,245.4676513671875,539.1213283538818,236.35946655273438]},{"page":451,"text":"the establishing commander prior to engagement. (JP 3-09)","rect":[125.99183654785156,256.99066162109377,363.14519286727906,247.88247680664063]},{"page":451,"text":"fire support planning","rect":[89.98998260498047,272.4715576171875,181.1038417816162,263.5237121582031]},{"page":451,"text":"The continuing process of analyzing, allocating, and scheduling fires to describe how fires are used to","rect":[125.99185180664063,286.99053955078127,533.3598537445068,277.8823547363281]},{"page":451,"text":"facilitate the actions of the maneuver force. (FM 3-09)","rect":[125.99185180664063,298.4934997558594,343.9969689903259,289.4053649902344]},{"page":451,"text":"fires warfighting function","rect":[89.97994995117188,313.99444580078127,199.45545863342287,305.0466003417969]},{"page":451,"text":"The related tasks and systems that create and converge effects in all domains against the adversary or","rect":[125.9818115234375,328.513427734375,530.8232324180603,319.4052429199219]},{"page":451,"text":"enemy to enable operations across the range of military operations. (ADP 3-0)","rect":[125.9818115234375,339.9762878417969,439.15694213485718,330.86810302734377]},{"page":451,"text":"*fix","rect":[89.97993469238281,353.3028869628906,106.15021324157715,346.50933837890627]},{"page":451,"text":"1. A tactical mission task in which a unit prevents the enemy from moving from a specific location for","rect":[125.98179626464844,369.9761657714844,535.5773217735291,360.86798095703127]},{"page":451,"text":"a specific period. 2. An obstacle effect that focuses fire planning and obstacle effort to slow an","rect":[125.98179626464844,381.4991455078125,504.1306972503662,372.3909606933594]},{"page":451,"text":"attacker’s movement within a specified area, normally an engagement area.","rect":[125.99180603027344,393.02215576171877,427.7741651535034,383.9139709472656]},{"page":451,"text":"fixing force","rect":[89.98990631103516,408.5030517578125,138.65905476379394,399.5552062988281]},{"page":451,"text":"A force designated to supplement the striking force by preventing the enemy from moving from a","rect":[125.99177551269531,423.02203369140627,516.7757845001221,413.9138488769531]},{"page":451,"text":"specific area for a specific time. (ADP 3-90)","rect":[125.99177551269531,434.4648742675781,303.7465722618103,425.3767395019531]},{"page":451,"text":"*follow and assume","rect":[89.98990631103516,447.9417724609375,173.39738179016113,441.0279846191406]},{"page":451,"text":"A tactical mission task in which a committed force follows and supports a lead force conducting an","rect":[125.98175048828125,464.48480224609377,523.0253200531006,455.3766174316406]},{"page":451,"text":"offensive operation and continues mission if lead force cannot continue.","rect":[125.98174285888672,475.9877624511719,414.20705699920657,466.8996276855469]},{"page":451,"text":"*follow and support","rect":[89.98990631103516,491.4686584472656,175.58574462509157,482.5508728027344]},{"page":451,"text":"A tactical mission task in which a committed force follows and supports a lead force conducting an","rect":[125.99177551269531,506.0076904296875,523.0411891937256,496.8995056152344]},{"page":451,"text":"offensive operation.","rect":[125.99177551269531,517.4505615234375,206.02151012420655,508.3623962402344]},{"page":451,"text":"force health protection","rect":[89.99992370605469,532.9314575195313,187.24803065490725,524.0036010742188]},{"page":451,"text":"(Army) Measures that promote, improve, or conserve the behavioral or physical well-being of Soldiers","rect":[126.00178527832031,547.470458984375,537.3528583030701,538.3623046875]},{"page":451,"text":"comprised of preventative and treatment aspects of medical functions that include: combat and","rect":[125.99176025390625,558.9734497070313,504.8047389984131,549.8853149414063]},{"page":451,"text":"operational stress control, dental services, veterinary services, operational public health, and laboratory","rect":[125.99176025390625,570.5164794921875,538.3318996429443,561.4083251953125]},{"page":451,"text":"services. (FM 4-02) ","rect":[125.99174499511719,581.9593505859375,207.69483470916749,572.8712158203125]},{"page":451,"text":"*forced march","rect":[89.9898910522461,595.4362182617188,152.49165248107912,588.5223999023438]},{"page":451,"text":"A march longer or faster than usual or in adverse conditions.","rect":[125.99175262451172,611.979248046875,368.34340953826907,602.87109375]},{"page":451,"text":"forms of maneuver","rect":[89.99992370605469,625.4360961914063,171.125866897583,618.5222778320313]},{"page":451,"text":"Distinct tactical combinations of fire and movement with a unique set of doctrinal characteristics that","rect":[126.00178527832031,641.9591064453125,530.8509287796021,632.8709716796875]},{"page":451,"text":"differ primarily in the relationship between the maneuvering force and the enemy. (ADP 3-90)","rect":[126.00177001953125,653.5021362304688,504.21672607040406,644.3939819335938]},{"page":451,"text":"*forward boundary","rect":[89.99992370605469,668.9830322265625,174.2741298675537,660.045166015625]},{"page":451,"text":"A boundary that delineates the forward edge of a unit’s area of operation.","rect":[126.00178527832031,683.5020141601563,419.5577344894409,674.3938598632813]},{"page":451,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":451,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":451,"text":"Glossary-11","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":452,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":452,"text":"forward edge of the battle area","rect":[72.0,83.45428466796875,203.90834617614747,74.51644897460938]},{"page":452,"text":"The foremost limits of a series of areas in which ground combat units are deployed to coordinate fire","rect":[108.00186157226563,97.9732666015625,511.02816487121586,88.8650894165039]},{"page":452,"text":"support, the positioning of forces, or the maneuver of units, excluding areas in which covering or","rect":[108.00186157226563,109.49627685546875,496.23369384384156,100.38809967041016]},{"page":452,"text":"screening forces are operating. (JP 3-09.3)","rect":[108.00186157226563,121.019287109375,277.71562743759156,111.9111099243164]},{"page":452,"text":"*forward line of own troops","rect":[72.0,136.4801483154297,190.92036318588257,127.55232238769531]},{"page":452,"text":"A line that indicates the most forward positions of friendly forces in any kind of military operation at a","rect":[108.00186157226563,151.0191650390625,519.0693636016846,141.91098022460938]},{"page":452,"text":"specific time.","rect":[108.00186157226563,162.46202087402345,161.92649364471436,153.37387084960938]},{"page":452,"text":"forward passage of lines","rect":[72.0,177.96295166015626,175.07775759506226,169.0150909423828]},{"page":452,"text":"Occurs when a unit passes through another unit’s positions while moving toward the enemy.","rect":[107.99183654785156,192.48193359375,477.98733043670657,183.37374877929688]},{"page":452,"text":"(ADP 3-90)","rect":[107.98181915283203,203.98484802246095,155.52672362899782,194.89669799804688]},{"page":452,"text":"free-fire area","rect":[71.96994018554688,217.46180725097657,128.3364543914795,210.53797912597657]},{"page":452,"text":"A specific region into which any weapon system may fire without additional coordination with the","rect":[107.9718017578125,234.0047607421875,502.3600130157471,224.89657592773438]},{"page":452,"text":"establishing headquarters. (JP 3-09)","rect":[107.9718017578125,245.4676513671875,251.28786254501345,236.35946655273438]},{"page":452,"text":"friendly force information requirement","rect":[71.96994018554688,260.94854736328127,239.45319152450564,252.0006866455078]},{"page":452,"text":"Information the commander and staff need to understand the status of friendly force and supporting","rect":[107.9718017578125,275.467529296875,505.61559104919436,266.3593444824219]},{"page":452,"text":"capabilities. (JP 3-0)","rect":[107.9718017578125,286.9704895019531,190.50653625106814,277.8823547363281]},{"page":452,"text":"*frontal attack","rect":[71.9699478149414,300.4473876953125,135.563887588501,293.5335998535156]},{"page":452,"text":"A form of maneuver in which an attacking force seeks to destroy a weaker enemy force or fix a larger","rect":[107.98182678222656,316.99041748046877,515.3442285118103,307.8822326660156]},{"page":452,"text":"enemy force in place over a broad front.","rect":[107.98182678222656,328.513427734375,268.4621534347534,319.4052429199219]},{"page":452,"text":"*gap","rect":[71.97997283935547,343.9942932128906,92.61115168762207,337.0]},{"page":452,"text":"An area free of obstacles that enables forces to maneuver in a tactical formation.","rect":[107.98182678222656,356.4892272949219,429.57778453826907,349.40509033203127]},{"page":452,"text":"gap","rect":[71.98998260498047,373.9941711425781,87.58109950256348,367.1304626464844]},{"page":452,"text":"A ravine, mountain pass, river, or other terrain feature that presents an obstacle that may be bridged.","rect":[107.99185180664063,388.5131530761719,508.9550733566284,379.40496826171877]},{"page":452,"text":"(ATP 3-90.4/MCTP 3-34A)","rect":[107.99185180664063,399.95599365234377,219.97536254501345,390.86785888671877]},{"page":452,"text":"graphic control measure","rect":[71.97996520996094,415.4569396972656,176.44445515441894,406.50909423828127]},{"page":452,"text":"A symbol used on maps and displays to regulate forces and warfighting functions. (ADP 6-0)","rect":[107.98181915283203,429.9759216308594,481.5174462852478,420.86773681640627]},{"page":452,"text":"gap crossing","rect":[71.97997283935547,445.4568176269531,125.04489707946778,436.50897216796877]},{"page":452,"text":"The projection of combat power across a linear obstacle (wet or dry gap). (ATP 3-90.4/MCTP 3-34A)","rect":[107.97180938720703,459.9757995605469,515.9561059532166,450.85760498046877]},{"page":452,"text":"guard","rect":[71.97989654541016,475.4566955566406,97.5910177154541,466.6691589355469]},{"page":452,"text":"A type of security operation conducted to protect the main body by fighting to gain time while","rect":[107.98175048828125,489.9756774902344,485.6908540802002,480.86749267578127]},{"page":452,"text":"preventing enemy ground observation of and direct fire against the main body. (ADP 3-90)","rect":[107.98175048828125,501.4986877441406,472.3390100059509,492.3905029296875]},{"page":452,"text":"hasty breach","rect":[71.9798583984375,516.9796142578125,126.74918269348145,508.19207763671877]},{"page":452,"text":"The creation of lanes through enemy minefields by expedient methods such as blasting with","rect":[107.98171997070313,531.49853515625,475.9301052093506,522.390380859375]},{"page":452,"text":"demolitions, pushing rollers or disabled vehicles through the minefields when the time factor does not","rect":[107.98171997070313,542.96142578125,516.0122446975709,533.853271484375]},{"page":452,"text":"permit detailed reconnaissance, deliberate breaching, or bypassing the obstacle. (JP 3-15)","rect":[107.98171997070313,554.4844970703125,465.37505126571656,545.3763427734375]},{"page":452,"text":"hasty crossing","rect":[71.97982025146485,569.96533203125,132.30422019958497,561.0174560546875]},{"page":452,"text":"The crossing of an inland water obstacle or other gap using the crossing means at hand or those readily","rect":[107.98167419433594,584.484375,519.5471706390381,575.376220703125]},{"page":452,"text":"available, and made without pausing for elaborate preparations. (ATP 3-90.4/MCTP 3-34A)","rect":[107.9816665649414,596.0073852539063,476.40706420516968,586.8992309570313]},{"page":452,"text":"hasty operation","rect":[71.96980285644531,611.4882202148438,138.377364151001,602.5403442382813]},{"page":452,"text":"An operation in which a commander directs immediately available forces, using fragmentary orders, to","rect":[107.97166442871094,626.0072631835938,519.8375759124756,616.8991088867188]},{"page":452,"text":"perform tasks with minimal preparation, trading planning and preparation time for speed of execution.","rect":[107.97166442871094,637.4701538085938,516.9731397628784,628.3619995117188]},{"page":452,"text":"(ADP 3-90)","rect":[107.97166442871094,648.97314453125,155.52658629989626,639.885009765625]},{"page":452,"text":"Glossary-12","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":452,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":452,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":453,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":453,"text":"health service support","rect":[90.0,83.43424987792969,184.47255492782595,74.50642395019531]},{"page":453,"text":"(Army) The support and services performed, provided, and arranged by the Army Medicine to","rect":[126.00186157226563,97.9732666015625,503.43431663513186,88.8650894165039]},{"page":453,"text":"promote, improve, conserve, or restore the behavioral and physical well-being of personnel by","rect":[126.00186157226563,109.49627685546875,503.3571071624756,100.38809967041016]},{"page":453,"text":"providing direct patient care that include medical treatment (organic and area support) and","rect":[125.99183654785156,121.019287109375,487.58067893981936,111.9111099243164]},{"page":453,"text":"hospitalization, medical evacuation to include medical regulating, and medical logistics to include","rect":[125.99183654785156,132.482177734375,518.4602327423096,123.3740005493164]},{"page":453,"text":"blood management. (FM 4-02)","rect":[125.99183654785156,144.005126953125,249.32802367782595,134.89694213867188]},{"page":453,"text":"*infiltration","rect":[89.9899673461914,157.46205139160157,141.70118617248537,150.53822326660157]},{"page":453,"text":"A form of maneuver in which an attacking force conducts undetected movement through or into an","rect":[125.99182891845703,174.0050048828125,522.2576808929443,164.89682006835938]},{"page":453,"text":"area occupied by enemy forces.","rect":[125.9918212890625,185.52801513671876,252.33401012420655,176.41983032226563]},{"page":453,"text":"*infiltration lane","rect":[89.9899673461914,198.98487854003907,161.99868489074707,192.06105041503907]},{"page":453,"text":"A control measure that coordinates forward and lateral movement of infiltrating units and fixes fire","rect":[125.99182891845703,215.4677734375,522.5413484649658,206.35958862304688]},{"page":453,"text":"planning responsibilities.","rect":[125.99183654785156,226.99078369140626,226.53655529022218,217.88259887695313]},{"page":453,"text":"intelligence warfighting function","rect":[89.98995971679688,242.4716796875,228.88023280334475,233.52381896972657]},{"page":453,"text":"The related tasks and systems that facilitate understanding the enemy, terrain, weather, civil","rect":[125.99181365966797,256.99066162109377,493.40003156280519,247.88247680664063]},{"page":453,"text":"considerations, and other significant aspects of the operational environment. (ADP 3-0)","rect":[125.99181365966797,268.513671875,475.8802392539978,259.4054870605469]},{"page":453,"text":"*interdict","rect":[89.97997283935547,281.97052001953127,131.6531579551697,275.0467224121094]},{"page":453,"text":"A tactical mission task in which a unit prevents, disrupts, or delays the enemy’s use of an area or route","rect":[125.97181701660156,298.5135498046875,536.1424837188721,289.4053649902344]},{"page":453,"text":"in any domain.","rect":[125.9718017578125,309.9764404296875,185.71605968475343,300.8682556152344]},{"page":453,"text":"interoperability","rect":[89.9699478149414,325.45733642578127,157.2001552581787,316.5094909667969]},{"page":453,"text":"The ability to act together coherently, effectively, and efficiently to achieve tactical, operational, and","rect":[125.97180938720703,339.9762878417969,528.8408718109131,330.86810302734377]},{"page":453,"text":"strategic objectives. (JP 3-0)","rect":[125.97180938720703,351.4992980957031,239.82907653427126,342.381103515625]},{"page":453,"text":"*isolate","rect":[89.96996307373047,364.9561462402344,122.25841236877442,358.0323486328125]},{"page":453,"text":"A tactical mission task in which a unit seals off an enemy, physically and psychologically, from","rect":[125.97183227539063,381.4991760253906,509.546506401062,372.3909912109375]},{"page":453,"text":"sources of support and denies it freedom of movement.","rect":[125.97183990478516,393.0021057128906,346.1613721847534,383.9139709472656]},{"page":453,"text":"joint fires","rect":[89.98001098632813,408.5030517578125,131.36862826156617,399.5552062988281]},{"page":453,"text":"Fires delivered during the employment of forces from two or more components in coordinated action","rect":[125.98187255859375,423.02203369140627,530.3579006195068,413.9138488769531]},{"page":453,"text":"to produce desired effects in support of a common objective. (JP 3-0)","rect":[125.98187255859375,434.48492431640627,403.09502196884156,425.3667297363281]},{"page":453,"text":"key terrain","rect":[89.98001098632813,449.9658203125,137.48884486389162,441.0179748535156]},{"page":453,"text":"(Army) An identifiable characteristic whose seizure or retention affords a marked advantage to either","rect":[125.98187255859375,464.48480224609377,531.1219384727478,455.3766174316406]},{"page":453,"text":"combatant. (ADP 3-90)","rect":[125.98187255859375,475.9877624511719,220.15985656356814,466.8996276855469]},{"page":453,"text":"kill box","rect":[89.98001098632813,489.46466064453127,121.99390983581543,482.5408630371094]},{"page":453,"text":"A three-dimensional permissive fire support coordination measure with an associated airspace","rect":[125.98187255859375,505.9876403808594,502.5907564239502,496.8995056152344]},{"page":453,"text":"coordinating measure used to facilitate the integration of fires. (JP 3-09)","rect":[125.98187255859375,517.4705810546875,414.5578820762634,508.3623962402344]},{"page":453,"text":"*kill zone","rect":[89.98001098632813,530.9274291992188,130.9087038116455,524.0036010742188]},{"page":453,"text":"The location where fires are concentrated in an ambush.","rect":[125.98187255859375,545.4464111328125,350.0691785812378,538.3623046875]},{"page":453,"text":"land mine","rect":[89.99002075195313,560.9273071289063,132.5419588165283,554.0034790039063]},{"page":453,"text":"A munition on or near the ground or other surface area that is designed to be exploded by the presence,","rect":[125.99188232421875,577.4703369140625,538.0553541183472,568.3621826171875]},{"page":453,"text":"proximity, or contact of a person or vehicle. (ATP 3-90.8/MCTP 3-34B)","rect":[125.99188232421875,588.9933471679688,415.6400353965759,579.8851928710938]},{"page":453,"text":"lane","rect":[89.98001098632813,602.4501953125,107.80859852600098,595.6867065429688]},{"page":453,"text":"A route through, over, or around an enemy or friendly obstacle that provides passage of a force.","rect":[125.97184753417969,618.9932250976563,509.00640392303469,609.8850708007813]},{"page":453,"text":"(ATP 3-90.4/MCTP 3-34A)","rect":[125.98185729980469,630.4962158203125,237.98541808700564,621.4080810546875]},{"page":453,"text":"*lateral boundary","rect":[89.99002075195313,645.9971313476563,166.9967555999756,637.2095947265625]},{"page":453,"text":"A boundary defining the left or right limit of a unit’s assigned area.","rect":[125.99188232421875,660.51611328125,395.0779981613159,651.407958984375]},{"page":453,"text":"*light line","rect":[89.99002075195313,675.9970092773438,132.53893757629394,667.0491333007813]},{"page":453,"text":"A designated line forward of which vehicles are required to use blackout lights during periods of","rect":[125.99188232421875,690.5159912109375,512.8441674766541,681.4078369140625]},{"page":453,"text":"limited visibility.","rect":[125.99188995361328,701.9788818359375,194.9164686203003,692.8707275390625]},{"page":453,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":453,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":453,"text":"Glossary-13","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":454,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":454,"text":"limit of advance","rect":[72.0,81.43024444580078,140.34843159484863,74.50642395019531]},{"page":454,"text":"A phase line used to control forward progress of the attack. (ADP 3-90)","rect":[107.9918441772461,97.9732666015625,394.8845117149353,88.8650894165039]},{"page":454,"text":"*line formation","rect":[71.97997283935547,111.43012237548828,137.7903280181885,104.50630187988281]},{"page":454,"text":"A movement formation in which elements move abreast of each other.","rect":[107.98182678222656,125.94910430908203,389.8444471359253,118.8649673461914]},{"page":454,"text":"*line of contact","rect":[71.97997283935547,141.4300079345703,136.98874450302126,134.5061798095703]},{"page":454,"text":"A general trace delineating the location where friendly and enemy forces are engaged.","rect":[107.98182678222656,157.9730224609375,452.58892345428469,148.86483764648438]},{"page":454,"text":"line of departure","rect":[71.97993469238281,173.4338836669922,143.68508625793457,164.5060577392578]},{"page":454,"text":"In land warfare, a line designated to coordinate the departure of attack elements. (JP 3-31)","rect":[107.98179626464844,187.972900390625,468.43120360946656,178.86471557617188]},{"page":454,"text":"*linkup","rect":[71.96984100341797,203.4337615966797,104.84446620178223,194.5059356689453]},{"page":454,"text":"A type of enabling operation that involves the meeting of friendly ground forces, which occurs in a","rect":[107.9717025756836,217.9727783203125,504.3407259063721,208.86459350585938]},{"page":454,"text":"variety of circumstances.","rect":[107.9717025756836,229.49578857421876,208.27491283416749,220.38760375976563]},{"page":454,"text":"*linkup point","rect":[71.96983337402344,244.95664978027345,129.55075622177126,236.02882385253907]},{"page":454,"text":"A designated place where two forces are scheduled to meet.","rect":[107.97169494628906,259.49566650390627,347.40163707733157,250.38748168945313]},{"page":454,"text":"local security","rect":[71.97985076904297,274.9765625,128.40949058532716,266.0287170410156]},{"page":454,"text":"The low-level security activities conducted near a unit to prevent surprise by the enemy. (ADP 3-90)","rect":[107.98170471191406,289.49554443359377,510.7356164512634,280.3873596191406]},{"page":454,"text":"*logistics package","rect":[71.97978210449219,304.9764404296875,148.42837239074707,296.0285949707031]},{"page":454,"text":"A grouping of multiple classes of supply and supply vehicles under the control of a single convoy","rect":[107.98164367675781,319.49542236328127,499.09728050231936,310.3872375488281]},{"page":454,"text":"commander.","rect":[107.99166107177735,328.9342346191406,157.71491527557374,321.85009765625]},{"page":454,"text":"*main battle area","rect":[71.98979187011719,344.4151306152344,146.95743370056153,337.4913330078125]},{"page":454,"text":"The area where the commander intends to deploy the bulk of their unit to defeat an attacking enemy.","rect":[107.99165344238281,360.9581604003906,510.1473340988159,351.8499755859375]},{"page":454,"text":"main body","rect":[71.98975372314453,376.4390563964844,117.38236045837403,367.4912109375]},{"page":454,"text":"The principal part of a tactical command or formation. It does not include detached elements of the","rect":[107.99161529541016,390.93798828125,504.2819185333252,381.849853515625]},{"page":454,"text":"command, such as advance guards, flank guards, and covering forces. (ADP 3-90)","rect":[107.99161529541016,402.48101806640627,437.0684716758728,393.3728332519531]},{"page":454,"text":"main effort","rect":[71.98975372314453,415.9378967285156,120.08276153182983,409.01409912109377]},{"page":454,"text":"A designated subordinate unit whose mission at a given point in time is most critical to overall mission","rect":[107.98159790039063,432.4809265136719,519.8504543304443,423.37274169921877]},{"page":454,"text":"success. (ADP 3-0)","rect":[107.98159790039063,443.98388671875,185.53639770126345,434.895751953125]},{"page":454,"text":"maneuver","rect":[71.97972869873047,457.4607849121094,114.82324696350098,452.6211242675781]},{"page":454,"text":"Movement in conjunction with fires. (ADP 3-90)","rect":[107.97157287597656,474.0038146972656,304.3234765586853,464.8856201171875]},{"page":454,"text":"*march column","rect":[71.95967102050781,487.4606628417969,138.90229701232912,480.6971740722656]},{"page":454,"text":"All march serials using the same route for a single movement under control of a single commander.","rect":[107.96153259277344,504.0036926269531,505.91485118865969,494.8955078125]},{"page":454,"text":"*march serial","rect":[71.95967102050781,517.4605712890625,130.60172986602783,510.5367736816406]},{"page":454,"text":"A subdivision of a march column organized under one commander.","rect":[107.96153259277344,533.9434814453125,377.88543224334719,524.8353271484375]},{"page":454,"text":"*march unit","rect":[71.95967102050781,547.4002685546875,124.49854064559936,540.4764404296875]},{"page":454,"text":"A subdivision of a march serial.","rect":[107.96153259277344,561.9193115234375,235.6855115890503,554.835205078125]},{"page":454,"text":"mass casualty","rect":[71.95967102050781,579.4241943359375,130.66884422302247,570.6366577148438]},{"page":454,"text":"any number of human casualties produced across a period of time that exceeds available medical","rect":[107.96153259277344,593.9432373046875,495.08460187530519,584.8350830078125]},{"page":454,"text":"support capabilities. (JP 4-02).","rect":[107.96153259277344,605.4461669921875,230.45603466033936,596.3580322265625]},{"page":454,"text":"medical evacuation","rect":[71.95968627929688,618.9230346679688,153.91024684143069,611.9992065429688]},{"page":454,"text":"The timely and effective movement of the wounded, injured, or ill to and between medical treatment","rect":[107.9615478515625,635.466064453125,510.3465037307739,626.3478393554688]},{"page":454,"text":"facilities on dedicated and properly marked medical platforms with en route care provided by medical","rect":[107.9615478515625,646.9890747070313,515.5629649124146,637.8809204101563]},{"page":454,"text":"personnel. (ATP 4-02.2)","rect":[107.9615478515625,658.4319458007813,205.74171996688845,649.3438110351563]},{"page":454,"text":"*meeting engagement","rect":[71.96971130371094,673.932861328125,164.45534301376345,664.9849853515625]},{"page":454,"text":"A combat action that occurs when a moving force engages an enemy at an unexpected time and place.","rect":[107.97157287597656,688.4518432617188,516.1943922042847,679.3436889648438]},{"page":454,"text":"Glossary-14","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":454,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":454,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":455,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":455,"text":"military deception","rect":[90.0,83.45428466796875,168.10391139221194,74.50642395019531]},{"page":455,"text":"Actions executed to deliberately mislead adversary military, paramilitary, or violent extremist","rect":[125.99183654785156,97.9732666015625,501.4422984085083,88.8650894165039]},{"page":455,"text":"organization decision makers, thereby causing the adversary to take specific actions (or inactions) that","rect":[126.00186157226563,109.49627685546875,534.7359995803834,100.38809967041016]},{"page":455,"text":"will contribute to the accomplishment of the friendly mission. (JP 3-13.4)","rect":[126.00186157226563,121.019287109375,420.39446044540406,111.9111099243164]},{"page":455,"text":"minimum-risk route","rect":[89.99996185302735,134.4761505126953,176.99761677551269,127.55232238769531]},{"page":455,"text":"A temporary air corridor of defined dimensions recommended for use by aircraft that presents the","rect":[125.9917984008789,151.0191650390625,516.4872713165283,141.91098022460938]},{"page":455,"text":"minimum known hazards to low-flying aircraft transiting the combat zone. (JP 3-52)","rect":[126.0018310546875,162.4820556640625,464.2469689903259,153.37387084960938]},{"page":455,"text":"mission statement","rect":[89.98990631103516,175.9389190673828,166.40044189071657,169.0150909423828]},{"page":455,"text":"A short sentence or paragraph that describes the organization’s essential task(s), purpose, and action","rect":[125.99176025390625,192.48193359375,526.7496242523193,183.37374877929688]},{"page":455,"text":"containing the elements of who, what, when, where, and why. (JP 5-0)","rect":[125.98171997070313,204.0048828125,408.07478881454468,194.89669799804688]},{"page":455,"text":"mission variables","rect":[89.96980285644531,217.46180725097657,163.58776736068726,210.53797912597657]},{"page":455,"text":"Categories of specific information needed to conduct operations. (ADP 1-01)","rect":[125.97166442871094,234.0047607421875,434.88826537704468,224.89657592773438]},{"page":455,"text":"*mixing","rect":[89.96980285644531,249.4857177734375,124.43960380554199,240.53785705566407]},{"page":455,"text":"Using two or more different capabilities to collect against the same information requirement.","rect":[125.97166442871094,264.004638671875,497.23675060272219,254.89645385742188]},{"page":455,"text":"mobile defense","rect":[89.96980285644531,277.4615478515625,153.0337038116455,270.5377502441406]},{"page":455,"text":"A type of defensive operation that concentrates on the destruction or defeat of the enemy through a","rect":[125.97166442871094,294.0045471191406,521.9761018829346,284.8963623046875]},{"page":455,"text":"decisive attack by a striking force. (ADP 3-90)","rect":[125.97166442871094,305.4674072265625,313.20537353134156,296.3592224121094]},{"page":455,"text":"mobile security force","rect":[89.96980285644531,320.94830322265627,179.42939472961425,312.0004577636719]},{"page":455,"text":"A highly mobile and dedicated security force with the capability to defeat Level I and II threats in a","rect":[125.97166442871094,335.46728515625,524.2547884063721,326.3591003417969]},{"page":455,"text":"joint security area. (JP 3-10)","rect":[125.97166442871094,346.99029541015627,239.52834106063845,337.8721008300781]},{"page":455,"text":"mobility","rect":[89.96980285644531,362.47119140625,125.57987785339356,353.5233459472656]},{"page":455,"text":"A quality or capability of military forces which permits them to move from place to place while","rect":[125.97166442871094,376.99017333984377,509.19955158996586,367.8819885253906]},{"page":455,"text":"retaining the ability to fulfill their primary mission. (JP 3-36)","rect":[125.97166442871094,388.5131530761719,370.32942748641968,379.40496826171877]},{"page":455,"text":"mobility tasks","rect":[89.9698257446289,403.9940490722656,149.72709536361695,395.04620361328127]},{"page":455,"text":"Combined arms activities that mitigates the effects of obstacles to enable freedom of movement and","rect":[125.97168731689453,418.5130310058594,525.9550685882568,409.40484619140627]},{"page":455,"text":"maneuver. (ATP 3-90.4/MCTP 3-34A)","rect":[125.97168731689453,429.95587158203127,282.35384154891968,420.86773681640627]},{"page":455,"text":"*mounted movement","rect":[89.95980834960938,443.4327697753906,179.6929071006775,436.6692810058594]},{"page":455,"text":"The movement of troops and equipment by combat and tactical vehicles.","rect":[125.961669921875,459.9757995605469,416.70412731170657,450.86761474609377]},{"page":455,"text":"movement","rect":[89.95982360839844,473.4326477050781,134.3885095176697,467.0499267578125]},{"page":455,"text":"The positioning of combat power to establish the conditions for maneuver. (ADP 3-90)","rect":[125.96168518066406,489.9756774902344,474.5374658164978,480.86749267578127]},{"page":455,"text":"movement and maneuver warfighting function","rect":[89.95982360839844,505.4565734863281,288.8417806549072,496.50872802734377]},{"page":455,"text":"The related tasks and systems that move and employ forces to achieve a position of relative advantage","rect":[125.9616928100586,519.9755859375,534.6873445587158,510.8674011230469]},{"page":455,"text":"over the enemy and other threats. (ADP 3-0)","rect":[125.9616928100586,531.49853515625,304.2575891075134,522.390380859375]},{"page":455,"text":"movement control","rect":[89.95982360839844,544.9554443359375,167.43848371124268,538.1919555664063]},{"page":455,"text":"The dual process of committing allocated transportation assets and regulating movements according to","rect":[125.96168518066406,561.4984130859375,536.3245754241943,552.3902587890625]},{"page":455,"text":"command priorities to synchronize distribution flow over lines of communications to sustain land","rect":[125.96168518066406,572.9613037109375,515.8698024749756,563.8531494140625]},{"page":455,"text":"forces. (ADP 4-0)","rect":[125.96168518066406,584.46435546875,197.87523437118532,575.376220703125]},{"page":455,"text":"movement corridor","rect":[89.95982360839844,597.941162109375,173.01060200500488,591.017333984375]},{"page":455,"text":"A designated area established to protect and enable ground movement along a route. (ADP 3-37)","rect":[125.96168518066406,614.4842529296875,513.4150292930603,605.3760986328125]},{"page":455,"text":"movement formation","rect":[89.95978546142578,627.9410400390625,179.70091151428225,621.0172119140625]},{"page":455,"text":"An ordered arrangement of forces for a specific purpose and describes the general configuration of a","rect":[125.9616470336914,644.484130859375,527.7218904571533,635.3759765625]},{"page":455,"text":"unit on the ground. (ADP 3-90)","rect":[125.9616470336914,656.0071411132813,252.11345458602907,646.8989868164063]},{"page":455,"text":"*movement to contact","rect":[89.94975280761719,669.4639282226563,183.81712890243532,662.5501098632813]},{"page":455,"text":"(Army) A type of offensive operation designed to establish or regain contact to develop the situation.","rect":[125.95161437988281,686.0070190429688,530.2756299972534,676.8988647460938]},{"page":455,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":455,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":455,"text":"Glossary-15","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":456,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":456,"text":"multidomain operations","rect":[72.0,83.43424987792969,174.54469179916382,74.50642395019531]},{"page":456,"text":"The combined arms employment of joint and Army capabilities to create and exploit relative","rect":[108.00186157226563,97.9732666015625,478.8089876251221,88.85507202148438]},{"page":456,"text":"advantages that achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force","rect":[108.00188446044922,109.49627685546875,517.3379182891846,100.37808227539063]},{"page":456,"text":"commanders. (FM 3-0)","rect":[108.00186157226563,120.99925231933594,201.03757262802126,111.9111099243164]},{"page":456,"text":"multinational operations","rect":[72.0000228881836,136.4801483154297,177.36332583236695,127.55232238769531]},{"page":456,"text":"A collective term to describe military actions conducted by forces of two or more nations, usually","rect":[108.00187683105469,151.0191650390625,499.1216640472412,141.91098022460938]},{"page":456,"text":"undertaken within the structure of a coalition or alliance. (JP 3-16)","rect":[108.00187683105469,162.46202087402345,374.31343627548218,153.37387084960938]},{"page":456,"text":"named area of interest","rect":[71.99000549316406,175.9389190673828,167.77818847274782,169.0150909423828]},{"page":456,"text":"The geospatial area or systems node or link against which information that will satisfy a specific","rect":[107.99186706542969,192.48193359375,493.79977131652836,183.37374877929688]},{"page":456,"text":"information requirement can be collected, usually to capture indications of enemy and adversary","rect":[107.99186706542969,204.0048828125,493.7037868499756,194.89669799804688]},{"page":456,"text":"courses of action. (JP 2-0)","rect":[107.99186706542969,215.44773864746095,212.72092223739626,206.35958862304688]},{"page":456,"text":"networked munitions","rect":[71.9800033569336,228.92469787597657,162.8814532737732,222.00086975097657]},{"page":456,"text":"Remotely controlled, interconnected, weapons systems designed to provide rapidly emplaced ground-","rect":[107.98185729980469,245.4676513671875,515.1164758262635,236.35946655273438]},{"page":456,"text":"based countermobility and protection capability through scalable application of lethal and nonlethal","rect":[107.98185729980469,256.99066162109377,506.52304792022707,247.88247680664063]},{"page":456,"text":"means. (JP 3-15)","rect":[107.98185729980469,268.4936218261719,175.51666808700564,259.4054870605469]},{"page":456,"text":"*neutralize","rect":[71.9800033569336,281.97052001953127,119.7483491973877,275.0467224121094]},{"page":456,"text":"A tactical mission task in which a unit renders the enemy incapable of interfering with an operation.","rect":[107.97183990478516,298.5135498046875,508.16067028045657,289.4053649902344]},{"page":456,"text":"no-fire area","rect":[71.98001098632813,311.97039794921877,122.28342247009278,305.0466003417969]},{"page":456,"text":"An area designated by the appropriate commander into which fires or their effects are prohibited.","rect":[107.98187255859375,328.513427734375,496.5264844894409,319.4052429199219]},{"page":456,"text":"(JP 3-09.3)","rect":[107.98186492919922,339.95623779296877,152.4656579551697,330.86810302734377]},{"page":456,"text":"*nontactical movement","rect":[71.96998596191406,353.4331359863281,171.11789489364626,346.50933837890627]},{"page":456,"text":"A movement in which troops and vehicles are arranged to expedite their movement and conserve time","rect":[107.97184753417969,369.9761657714844,516.5233430938721,360.86798095703127]},{"page":456,"text":"and energy when no enemy ground interference is anticipated.","rect":[107.97184753417969,381.4991760253906,357.1332654953003,372.3909912109375]},{"page":456,"text":"objective","rect":[71.9699935913086,396.9800720214844,110.37666035461426,388.0322265625]},{"page":456,"text":"(Army) A location used to orient operations, phase operations, facilitate changes of direction, and","rect":[107.96183776855469,411.4990539550781,498.4091091156006,402.390869140625]},{"page":456,"text":"provide for unity of effort. (ADP 3-90)","rect":[107.96183776855469,423.0220947265625,263.81294799423218,413.9139099121094]},{"page":456,"text":"objective rally point","rect":[71.94996643066406,438.5029602050781,157.48671508407595,429.55511474609377]},{"page":456,"text":"An easily identifiable point where all elements of the infiltrating unit assemble and prepare to attack","rect":[107.95182800292969,453.0219421386719,508.6005153656006,443.91375732421877]},{"page":456,"text":"the objective. (ADP 3-90)","rect":[107.95181274414063,464.4848327636719,211.8492028770447,455.36663818359377]},{"page":456,"text":"*observation post","rect":[71.94994354248047,479.9456787109375,147.2251794395447,471.01788330078127]},{"page":456,"text":"A position from which observations are made or fires are directed and adjusted.","rect":[107.95181274414063,494.4847106933594,426.47356700897219,485.36651611328127]},{"page":456,"text":"obstacle","rect":[71.9599838256836,507.9415588378906,106.46886921691895,501.1780700683594]},{"page":456,"text":"Any barrier designed or employed to disrupt, fix, turn, or block the movement and maneuver, and to","rect":[107.96183776855469,524.484619140625,509.0424098968506,515.37646484375]},{"page":456,"text":"impose additional losses in personnel, time, and equipment. (JP 3-15)","rect":[107.97183990478516,535.9876098632813,386.2873742637634,526.8994750976563]},{"page":456,"text":"obstacle belt","rect":[71.97001647949219,549.4644775390625,125.04495788192749,542.7009887695313]},{"page":456,"text":"A brigade-level command and control measure, normally depicted graphically, to show where within","rect":[107.96185302734375,566.0074462890625,512.2708644866943,556.8992919921875]},{"page":456,"text":"an obstacle zone the ground tactical commander plans to limit friendly obstacle employment and focus","rect":[107.96185302734375,577.4703369140625,518.9541766624451,568.3621826171875]},{"page":456,"text":"the defense. (JP 3-15)","rect":[107.96184539794922,588.973388671875,195.17593932724,579.88525390625]},{"page":456,"text":"*obstacle control measures","rect":[71.9599838256836,602.4502563476563,186.97453188705445,595.686767578125]},{"page":456,"text":"Specific measures that grant obstacle-emplacing authority.","rect":[107.96183776855469,618.9932861328125,342.29961681365969,609.8851318359375]},{"page":456,"text":"*obstacle group","rect":[71.9599609375,634.4741821289063,139.50880335998537,625.5363159179688]},{"page":456,"text":"One or more individual obstacles that provide a specific obstacle effect.","rect":[107.96182250976563,648.97314453125,394.8604383468628,639.885009765625]},{"page":456,"text":"obstacle restricted areas","rect":[71.9599838256836,662.4500122070313,175.27218508529664,655.5261840820313]},{"page":456,"text":"A command and control measure used to limit the type or number of obstacles within an area.","rect":[107.95182800292969,678.9930419921875,483.1155958175659,669.8848876953125]},{"page":456,"text":"(JP 3-15)","rect":[107.95182800292969,690.4960327148438,144.94566894149782,681.4078979492188]},{"page":456,"text":"Glossary-16","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":456,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":456,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":457,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":457,"text":"obstacle zone","rect":[90.0,81.43024444580078,146.4687166290283,74.666748046875]},{"page":457,"text":"A division-level command and control measure to designate specific land areas where lower echelons","rect":[126.00186157226563,97.9732666015625,532.7830340843201,88.8650894165039]},{"page":457,"text":"are allowed to employ tactical obstacles. (JP 3-15)","rect":[126.00186157226563,109.49627685546875,327.6944787559509,100.38809967041016]},{"page":457,"text":"*occupy","rect":[89.98998260498047,124.9771728515625,125.06198692321778,118.0]},{"page":457,"text":"A tactical mission task in which a unit moves into an area to control it without enemy opposition.","rect":[125.99185180664063,139.49615478515626,515.4433546066284,130.38796997070313]},{"page":457,"text":"offensive operation","rect":[89.97996520996094,154.95701599121095,171.39045619201662,146.02919006347657]},{"page":457,"text":"An operation to defeat or destroy enemy forces and gain control of terrain, resources, and population","rect":[125.98182678222656,169.49603271484376,528.9680080413818,160.38784790039063]},{"page":457,"text":"centers. (ADP 3-0)","rect":[125.98182678222656,180.99900817871095,201.85327697372439,171.91085815429688]},{"page":457,"text":"operation","rect":[89.9699478149414,196.4799041748047,131.1210927886963,187.5520782470703]},{"page":457,"text":"A sequence of tactical actions with a common purpose or unifying theme. (JP 1, Vol 1)","rect":[125.9718017578125,211.0189208984375,474.5475976524353,201.91073608398438]},{"page":457,"text":"operational environment","rect":[89.96995544433594,226.4797821044922,195.84528136825564,217.5519561767578]},{"page":457,"text":"The aggregate of the conditions, circumstances, and influences that affect the employment of ","rect":[125.97181701660156,240.95867919921876,500.59673595428469,231.85049438476563]},{"page":457,"text":"capabilities and bear on the decisions of the commander. (JP 3-0)","rect":[125.98184204101563,252.46165466308595,387.25337768173218,243.37350463867188]},{"page":457,"text":"operations security","rect":[89.96997833251953,267.96258544921877,171.3584499359131,259.0147399902344]},{"page":457,"text":"A capability that identifies and controls critical information, indicators of friendly force actions","rect":[125.97184753417969,282.4815368652344,507.26881289291387,273.37335205078127]},{"page":457,"text":"attendant to military operations, and incorporates countermeasures to reduce the risk of an adversary","rect":[125.97184753417969,294.0045471191406,528.0573024749756,284.8963623046875]},{"page":457,"text":"exploiting vulnerabilities. (JP 3-13.3)","rect":[125.97184753417969,305.4674072265625,275.6956994590759,296.3592224121094]},{"page":457,"text":"operational variables","rect":[89.9599609375,320.9282531738281,180.2571856956482,312.0004577636719]},{"page":457,"text":"A comprehensive set of information categories used to describe an operational environment.","rect":[125.96182250976563,335.46728515625,495.3050184249878,326.3591003417969]},{"page":457,"text":"(ADP 1-01)","rect":[125.96182250976563,346.9702453613281,173.51674438095095,337.8821105957031]},{"page":457,"text":"*passage lane","rect":[89.95995330810547,362.47119140625,148.10900593566894,353.68365478515627]},{"page":457,"text":"A lane through an obstacle that provides safe passage for a passing force.","rect":[125.95179748535156,376.99017333984377,418.96685314178469,367.8819885253906]},{"page":457,"text":"passage of lines","rect":[89.9599838256836,392.4710693359375,155.52987551498414,383.5232238769531]},{"page":457,"text":"An operation in which a force moves forward or rearward through another force’s combat positions","rect":[125.95182037353516,406.99005126953127,524.2257831077576,397.8818664550781]},{"page":457,"text":"with the intention of moving into or out of contact with the enemy. (JP 3-18)","rect":[125.95185089111328,418.5130615234375,432.82439208602906,409.4048767089844]},{"page":457,"text":"*passage point","rect":[89.93998718261719,433.99395751953127,152.43572021102907,425.0461120605469]},{"page":457,"text":"A designated place where passing units pass through the stationary unit.","rect":[125.94184875488281,448.512939453125,413.98379039764407,439.4047546386719]},{"page":457,"text":"*penetration","rect":[89.93998718261719,463.9737854003906,144.40872096252444,455.0459899902344]},{"page":457,"text":"A form of maneuver in which a force attacks on a narrow front.","rect":[125.94184875488281,476.48876953125,380.0291700363159,469.4046325683594]},{"page":457,"text":"phase line","rect":[89.93997192382813,493.9736633300781,132.49090290832519,485.0458679199219]},{"page":457,"text":"An easily identified feature in the operational area utilized for control and coordination of military","rect":[125.94183349609375,508.45257568359377,519.2116603851318,499.3443908691406]},{"page":457,"text":"operations. (JP 3-09)","rect":[125.94183349609375,519.95556640625,209.61884093856814,510.8674011230469]},{"page":457,"text":"point of breach","rect":[89.9399642944336,535.4364624023438,154.97776698303225,526.5086059570313]},{"page":457,"text":"The location at an obstacle where the creation of a lane is being attempted. (ATP 3-90.4/MCTP 3-34A)","rect":[125.94181823730469,549.9754638671875,539.2568261680603,540.8673095703125]},{"page":457,"text":"point of departure","rect":[89.93994903564453,565.4363403320313,168.3163728790283,556.5084838867188]},{"page":457,"text":"The point where the unit crosses the line of departure and begins moving along a direction of attack.","rect":[125.93180084228516,579.975341796875,526.8980665206909,570.8671875]},{"page":457,"text":"(ADP 3-90)","rect":[125.93180084228516,591.4783325195313,173.486730342865,582.3901977539063]},{"page":457,"text":"point of penetration","rect":[89.92993927001953,606.959228515625,174.94862269592287,598.0313720703125]},{"page":457,"text":"The location, identified on the ground, where the commanders concentrate their efforts at weakest","rect":[125.93179321289063,621.4982299804688,517.7639536819459,612.3900756835938]},{"page":457,"text":"point of the enemy to seize a foothold on the far side objective. (ATP 3-90.4/MCTP 3-34A)","rect":[125.94180297851563,632.9611206054688,492.74397826766968,623.8428955078125]},{"page":457,"text":"policing","rect":[89.919921875,648.4420166015625,123.84964561462403,639.494140625]},{"page":457,"text":"The application of control measures within an area of operation to maintain law and order, safety, and","rect":[125.92178344726563,662.9609985351563,533.6485500335693,653.8528442382813]},{"page":457,"text":"other matters affecting the general welfare of the population. (FM 3-39)","rect":[125.92178344726563,674.4840087890625,413.2954003868103,665.3758544921875]},{"page":457,"text":"*position area for artillery","rect":[89.919921875,689.9649047851563,202.98859214782716,681.0170288085938]},{"page":457,"text":"An area assigned to an artillery unit to deliver surface to surface fires.","rect":[125.91175842285156,704.48388671875,404.95876598358157,695.375732421875]},{"page":457,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":457,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":457,"text":"Glossary-17","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":458,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":458,"text":"*primary position","rect":[72.0,83.45428466796875,149.03077601623537,74.50642395019531]},{"page":458,"text":"The position that covers the enemy’s most likely avenue of approach into the assigned area.","rect":[108.00186157226563,97.9732666015625,474.88418102264407,88.8650894165039]},{"page":458,"text":"probable line of deployment","rect":[72.0,113.45416259765625,191.79009032821657,104.50630187988281]},{"page":458,"text":"A phase line that designates the location where the commander intends to deploy the unit into assault","rect":[108.00186157226563,127.97314453125,512.373847480774,118.8649673461914]},{"page":458,"text":"formation before beginning the assault. (ADP 3-90)","rect":[108.00186157226563,139.49615478515626,314.91487670516968,130.38796997070313]},{"page":458,"text":"proof","rect":[71.9899673461914,154.95701599121095,95.36662841415405,146.03921508789063]},{"page":458,"text":"The verification that a lane is free of mines or explosive hazards and that the width and trafficability at","rect":[107.9818115234375,169.49603271484376,518.4689097366334,160.38784790039063]},{"page":458,"text":"the point of breach are suitable for the passing force. (ATP 3-90.4/MCTP 3-34A)","rect":[107.9818115234375,181.01904296875,432.91036010360718,171.91085815429688]},{"page":458,"text":"protection warfighting function","rect":[71.96987915039063,196.49993896484376,206.46531581115725,187.5520782470703]},{"page":458,"text":"The related tasks, systems, and methods that prevent or mitigate detection, threat effects, and hazards","rect":[107.97174072265625,211.0189208984375,512.7875201683045,201.91073608398438]},{"page":458,"text":"to preserve combat power and enable freedom of action. (FM 3-0)","rect":[107.97172546386719,222.46177673339845,372.6199853477478,213.37362670898438]},{"page":458,"text":"*pursuit","rect":[71.97987365722656,237.94261169433595,108.1390512046814,229.01478576660157]},{"page":458,"text":"A type of offensive operation to catch or cut off a disorganized hostile force attempting to escape, with","rect":[107.98173522949219,252.481689453125,519.4731349945068,243.37350463867188]},{"page":458,"text":"the aim of destroying it.","rect":[107.97176361083985,264.004638671875,203.83613109588624,254.89645385742188]},{"page":458,"text":"*quartering party","rect":[71.96990966796875,279.485595703125,148.9766139984131,270.5377502441406]},{"page":458,"text":"A group dispatched to a new assigned area in advance of the main body.","rect":[107.97177124023438,294.0045471191406,397.46071910858157,284.8963623046875]},{"page":458,"text":"quick response force","rect":[71.96990966796875,309.46539306640627,159.75413227844238,300.53759765625]},{"page":458,"text":"A dedicated force on a base with adequate tactical mobility and fire support designated to defeat Level","rect":[107.97177124023438,324.00439453125,518.3803477249146,314.8962097167969]},{"page":458,"text":"I and Level II threats and shape Level III threats until they can be defeated by a tactical combat force","rect":[107.97177124023438,335.46728515625,511.94555378723148,326.3591003417969]},{"page":458,"text":"or other available response forces. (ATP 3-37.10/MCRP 3-4D.13) ","rect":[107.97177124023438,346.9702453613281,374.8845167160034,337.8821105957031]},{"page":458,"text":"*quick reaction force","rect":[71.95988464355469,362.4511413574219,162.56475544738769,353.5233459472656]},{"page":458,"text":"A commander designated force to respond to threat attacks or emergencies.","rect":[107.95172119140625,376.99017333984377,409.1929883956909,367.8819885253906]},{"page":458,"text":"radio silence","rect":[71.94981384277344,390.447021484375,125.59889698791504,383.5232238769531]},{"page":458,"text":"The status on a radio network in which all stations are directed to continuously monitor without","rect":[107.95167541503906,406.99005126953127,490.4169077835083,397.8818664550781]},{"page":458,"text":"transmitting, except under established criteria. (ATP 6-02.53)","rect":[107.95167541503906,418.5130615234375,354.3485009727478,409.4048767089844]},{"page":458,"text":"*raid","rect":[71.94981384277344,431.96990966796877,94.80042933654785,425.0461120605469]},{"page":458,"text":"(Army) A variation of attack to temporarily seize an objective with a planned withdrawal.","rect":[107.941650390625,448.512939453125,467.27691173553469,439.3947448730469]},{"page":458,"text":"*rally point","rect":[71.9397964477539,463.99383544921877,121.71614623641968,455.0459899902344]},{"page":458,"text":"An easily identifiable point on the ground at which units can reassemble and reorganize if they become","rect":[107.94165802001953,478.5128173828125,520.6272859649658,469.4046325683594]},{"page":458,"text":"dispersed.","rect":[107.94165802001953,489.9556579589844,148.24610424041749,480.8675231933594]},{"page":458,"text":"*rear boundary","rect":[71.9397964477539,505.45660400390627,139.46759605407716,496.6690673828125]},{"page":458,"text":"A boundary that delineates the rearward limits of a unit’s assigned area.","rect":[107.94165802001953,519.9755859375,395.15993785858157,510.8674011230469]},{"page":458,"text":"rearward passage of lines","rect":[71.95982360839844,535.4564819335938,180.61369204330445,526.5086059570313]},{"page":458,"text":"Occurs when a unit passes through another unit’s positions while moving away from the enemy.","rect":[107.95167541503906,549.9754638671875,493.19268321990969,540.8673095703125]},{"page":458,"text":"(ADP 3-90)","rect":[107.95166015625,561.4784545898438,155.50659728622439,552.3903198242188]},{"page":458,"text":"reconnaissance","rect":[71.94979095458985,574.955322265625,136.39544392395019,568.031494140625]},{"page":458,"text":"A mission undertaken to obtain information about the activities and resources of an enemy or","rect":[107.95166015625,591.4983520507813,481.1845910606384,582.3901977539063]},{"page":458,"text":"adversary, or to secure data concerning the meteorological, hydrographic, geographic or other","rect":[107.95166015625,602.9612426757813,483.3549706993103,593.8530883789063]},{"page":458,"text":"characteristics of a particular area, by visual observation or other detection methods. (JP 2-0)","rect":[107.961669921875,614.4842529296875,479.81392455673218,605.3760986328125]},{"page":458,"text":"*reconnaissance by fire","rect":[71.94981384277344,629.9651489257813,171.97747517395019,621.0172729492188]},{"page":458,"text":"A technique in which a unit fires on a suspected enemy position.","rect":[107.95167541503906,644.484130859375,366.2944288253784,635.3759765625]},{"page":458,"text":"*reconnaissance in force","rect":[71.9498291015625,657.9409790039063,176.41033650207519,651.0171508789063]},{"page":458,"text":"A form of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and","rect":[107.95169067382813,674.4840087890625,521.2636623382568,665.3758544921875]},{"page":458,"text":"reactions or to obtain other information.","rect":[107.95169830322266,683.9829711914063,267.95513439178469,676.8988647460938]},{"page":458,"text":"*reconnaissance objective","rect":[71.9498519897461,701.4879150390625,182.23095417785644,692.5400390625]},{"page":458,"text":"The most important result desired from that specific reconnaissance effort.","rect":[107.95171356201172,715.9868774414063,406.19805431365969,706.8987426757813]},{"page":458,"text":"Glossary-18","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":458,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":458,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":459,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":459,"text":"*reconnaissance-pull","rect":[90.0,83.43424987792969,179.48261212921143,74.50642395019531]},{"page":459,"text":"Reconnaissance that determines which routes are suitable for maneuver, where the enemy is strong and","rect":[126.00186157226563,97.9732666015625,538.8909206390381,88.8650894165039]},{"page":459,"text":"weak, and where gaps exist, thus pulling the main body toward and along the path of least resistance.","rect":[126.00186157226563,109.49627685546875,530.4511671066284,100.38809967041016]},{"page":459,"text":"*reconnaissance-push","rect":[89.99996185302735,124.95713806152344,183.34628199768069,116.02931213378906]},{"page":459,"text":"Reconnaissance that refines the common operational picture, enabling the commander to finalize the","rect":[125.9917984008789,139.49615478515626,528.4189119415283,130.38796997070313]},{"page":459,"text":"plan and support main and supporting efforts.","rect":[125.9917984008789,151.0191650390625,308.4689893722534,141.91098022460938]},{"page":459,"text":"reconstitution","rect":[89.9999771118164,164.4760284423828,149.50776576232912,157.5522003173828]},{"page":459,"text":"An operation that commanders plan and implement to restore units to a desired level of combat","rect":[126.00184631347656,180.99900817871095,506.7839732131958,171.91085815429688]},{"page":459,"text":"effectiveness commensurate with mission requirements and available resources. (ATP 3-94.4)","rect":[126.00184631347656,192.46189880371095,502.2377831993103,183.37374877929688]},{"page":459,"text":"*reduce","rect":[89.99996185302735,205.9387969970703,123.9657564239502,199.02499389648438]},{"page":459,"text":"A tactical mission task in which a unit destroys an encircled or bypassed enemy force.","rect":[128.516845703125,222.4818115234375,473.1398572921753,213.37362670898438]},{"page":459,"text":"reduce","rect":[89.99996185302735,235.9386749267578,118.92570210266114,229.1751708984375]},{"page":459,"text":"A mobility task to create and mark lanes through, over, or around an obstacle to allow the attacking","rect":[126.00182342529297,252.481689453125,523.9504909515381,243.37350463867188]},{"page":459,"text":"force to accomplish its mission. (ATP 3-90.4/MCTP 3-34A)","rect":[126.00182342529297,263.9845886230469,367.35356689071656,254.89645385742188]},{"page":459,"text":"reduction","rect":[89.98992919921875,277.4615478515625,131.1380605621338,270.5377502441406]},{"page":459,"text":"The creation of lanes through a minefield or obstacle to allow passage of the attacking ground force.","rect":[125.99179077148438,294.0045471191406,527.2586011886597,284.8963623046875]},{"page":459,"text":"(JP 3-15)","rect":[125.99179077148438,305.4473571777344,162.9856317100525,296.3592224121094]},{"page":459,"text":"reduction area","rect":[89.98992919921875,318.92425537109377,152.4796657562256,312.0004577636719]},{"page":459,"text":"A number of adjacent points of breach that are under the control of the breaching commander.","rect":[125.99179077148438,335.46728515625,502.47426891326907,326.3490905761719]},{"page":459,"text":"(ATP 3-90.4/MCTP 3-34A)","rect":[125.99179077148438,346.9702453613281,237.98534179306032,337.8821105957031]},{"page":459,"text":"*redundancy","rect":[89.98993682861328,362.47119140625,146.17709922790528,353.68365478515627]},{"page":459,"text":"Using two or more like capabilities to collect against the same information requirement.","rect":[125.9917984008789,376.99017333984377,477.94008922576907,367.8819885253906]},{"page":459,"text":"regeneration","rect":[89.98994445800781,392.4710693359375,144.45667933654787,383.5232238769531]},{"page":459,"text":"The rebuilding of a unit through large-scale replacement of personnel, equipment, and supplies,","rect":[125.99181365966797,406.99005126953127,508.5253553390503,397.8818664550781]},{"page":459,"text":"including the reestablishment of essential command and control and the conduct of mission-essential","rect":[125.99180603027344,418.5130615234375,529.1535410842896,409.4048767089844]},{"page":459,"text":"training for the unit. (ATP 3-94.4)","rect":[125.99183654785156,429.9759521484375,262.9401757774353,420.8677673339844]},{"page":459,"text":"*release point","rect":[89.9899673461914,445.4367980957031,149.18413329696657,436.5090026855469]},{"page":459,"text":"A designated place on a route where elements are released from centralized control.","rect":[125.99182891845703,459.975830078125,461.18987560272219,450.8676452636719]},{"page":459,"text":"relief in place","rect":[90.0,475.4366760253906,147.8484773712158,466.5088806152344]},{"page":459,"text":"An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by","rect":[125.99183654785156,489.9757080078125,525.3188991546631,480.8675231933594]},{"page":459,"text":"the incoming unit and the responsibilities of the replaced elements for the mission and the assigned","rect":[125.99183654785156,501.49871826171877,522.3169460296631,492.3905334472656]},{"page":459,"text":"zone of operations are transferred to the incoming unit. (JP 3-07.3)","rect":[125.99183654785156,512.9616088867188,393.15007567977906,503.8534240722656]},{"page":459,"text":"reorganization","rect":[89.9999771118164,528.4425048828125,152.74822901916506,519.49462890625]},{"page":459,"text":"All measures taken by the commander to maintain unit combat effectiveness or return it to a specified","rect":[125.9918212890625,542.9614868164063,533.0477199554443,533.8533325195313]},{"page":459,"text":"level of combat capability. (ATP 3-94.4)","rect":[125.9918212890625,554.4844970703125,288.9821679649353,545.3763427734375]},{"page":459,"text":"reserve","rect":[89.9899673461914,567.9413452148438,121.13513661193848,563.1016845703125]},{"page":459,"text":"(Army) That portion of a body of troops that is withheld from action at the beginning of an","rect":[125.99182891845703,584.484375,489.5686550140381,575.376220703125]},{"page":459,"text":"engagement to be available for a decisive movement. (ADP 3-90)","rect":[125.99182891845703,596.0073852539063,388.64607787704468,586.8992309570313]},{"page":459,"text":"reserved obstacle","rect":[89.9899673461914,609.4642333984375,163.61393452453613,602.7007446289063]},{"page":459,"text":"(Army) An obstacle of any type, for which the commander restricts execution authority. (ATP 3-90.8)","rect":[125.99182891845703,626.0072631835938,534.5172631797791,616.8991088867188]},{"page":459,"text":"restricted operations zone","rect":[90.0,641.4681396484375,200.5837068634033,632.540283203125]},{"page":459,"text":"Airspace reserved for specific activities in which the operations of one or more airspace users is","rect":[126.00186157226563,655.9871215820313,509.51466250228887,646.8989868164063]},{"page":459,"text":"restricted. (JP 3-52)","rect":[126.00186157226563,667.4500122070313,205.17990661239626,658.3618774414063]},{"page":459,"text":"restrictive fire area","rect":[89.99999237060547,680.9268798828125,172.1649990081787,674.0030517578125]},{"page":459,"text":"A location in which specific restrictions are imposed and into which fires that exceed those restrictions","rect":[126.00186157226563,697.4498901367188,537.3559100608826,688.3617553710938]},{"page":459,"text":"will not be delivered without coordination with the establishing headquarters. (JP 3-09)","rect":[126.00186157226563,708.992919921875,475.35921264266968,699.884765625]},{"page":459,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":459,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":459,"text":"Glossary-19","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":460,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":460,"text":"restrictive fire line","rect":[72.0,81.43024444580078,150.8484010772705,74.50642395019531]},{"page":460,"text":"A specific boundary established between converging, friendly surface forces that prohibits fires or their","rect":[108.00186157226563,97.9732666015625,521.7375390586853,88.8650894165039]},{"page":460,"text":"effects from crossing. (JP 3-09)","rect":[108.00186157226563,109.49627685546875,234.39415526962282,100.38809967041016]},{"page":460,"text":"*retain","rect":[71.98998260498047,122.95313262939453,102.58004664611816,116.02931213378906]},{"page":460,"text":"A tactical mission task in which a unit prevents enemy occupation or use of terrain.","rect":[107.99185180664063,139.49615478515626,441.5186719894409,130.38796997070313]},{"page":460,"text":"retirement","rect":[71.98998260498047,152.95301818847657,117.55794311141968,146.02919006347657]},{"page":460,"text":"When a force out of contact moves away from the enemy. (ADP 3-90)","rect":[107.99185180664063,169.49603271484376,389.9045617637634,160.38784790039063]},{"page":460,"text":"retrograde","rect":[71.97997283935547,184.9769287109375,118.12609577941895,176.18939208984376]},{"page":460,"text":"(Army) A type of defensive operation that involves organized movement away from the enemy.","rect":[107.98182678222656,199.49591064453126,491.7929639816284,190.38772583007813]},{"page":460,"text":"(ADP 3-90)","rect":[107.98182678222656,210.99888610839845,155.53674865341189,201.91073608398438]},{"page":460,"text":"*retrograde movement","rect":[71.97997283935547,226.49981689453126,169.98358703231814,217.7122802734375]},{"page":460,"text":"Any movement to the rear or away from the enemy.","rect":[107.97181701660156,240.95867919921876,315.73650646209719,231.85049438476563]},{"page":460,"text":"*route","rect":[71.96995544433594,254.41554260253907,99.81954670715332,248.0327911376953]},{"page":460,"text":"The prescribed course to be traveled from a point of origin to a destination.","rect":[107.96179962158203,270.95849609375,408.4236707687378,261.8503112792969]},{"page":460,"text":"*route reconnaissance","rect":[71.95990753173828,284.4153747558594,166.70403767395019,277.4915771484375]},{"page":460,"text":"A form of reconnaissance operation to obtain detailed information of a specified route and all terrain","rect":[107.96176147460938,300.9383544921875,510.28050804138186,291.8502197265625]},{"page":460,"text":"from which the enemy could influence movement along that route.","rect":[107.95174407958985,312.48138427734377,375.1171522140503,303.3731994628906]},{"page":460,"text":"screen","rect":[71.95990753173828,325.938232421875,99.1862554473877,321.09857177734377]},{"page":460,"text":"A type of security operation that primarily provides early warning to the protected force. (ADP 3-90)","rect":[107.96176147460938,342.48126220703127,512.3389184532166,333.3730773925781]},{"page":460,"text":"*search and attack","rect":[71.95994567871094,355.9381408691406,152.52973841857912,349.02435302734377]},{"page":460,"text":"A variation of a movement to contact where a friendly force conducts coordinated attacks to defeat a","rect":[107.96180725097656,372.48114013671877,510.62264729309086,363.3729553222656]},{"page":460,"text":"distributed enemy force.","rect":[107.96180725097656,384.004150390625,205.5065107345581,374.8959655761719]},{"page":460,"text":"sector","rect":[71.95994567871094,397.46099853515627,97.5860948638916,391.0782775878906]},{"page":460,"text":"An operational area assigned to a unit in the defense that has rear and lateral boundaries with","rect":[107.96180725097656,414.0040283203125,479.4375514984131,404.8958435058594]},{"page":460,"text":"interlocking fires. (FM 3-0)","rect":[107.96180725097656,425.4669189453125,218.52248168563845,416.3587341308594]},{"page":460,"text":"*sector of fire","rect":[71.95993041992188,438.9237365722656,130.888562210083,431.99993896484377]},{"page":460,"text":"That area assigned to a unit or weapon system in which it will engage the enemy according to the","rect":[107.9617919921875,455.466796875,497.31698323059086,446.3586120605469]},{"page":460,"text":"established engagement priorities.","rect":[107.9617919921875,466.98980712890627,244.32702159881593,457.8816223144531]},{"page":460,"text":"*secure","rect":[71.95990753173828,480.4466552734375,104.24535084533692,475.0]},{"page":460,"text":"A tactical mission task in which a unit prevents the enemy from damaging or destroying a force,","rect":[107.96176147460938,496.98968505859377,493.20669078826907,487.8815002441406]},{"page":460,"text":"facility, or geographical location.","rect":[107.96174621582031,508.45257568359377,241.02733898162843,499.3443908691406]},{"page":460,"text":"security","rect":[71.96987915039063,523.9334716796875,105.89659690856934,514.985595703125]},{"page":460,"text":"Measures taken by a military unit, activity, or installation to protect itself against all acts designed to,","rect":[107.97174072265625,538.4524536132813,512.5932569503784,529.3442993164063]},{"page":460,"text":"or which may, impair its effectiveness. (JP 3-10)","rect":[107.97174072265625,549.9754638671875,302.7104394493103,540.8673095703125]},{"page":460,"text":"security area","rect":[71.96987915039063,565.4563598632813,127.25523948669434,556.5084838867188]},{"page":460,"text":"That area occupied by a unit’s security elements and includes the areas of influence of those security","rect":[107.97174072265625,579.975341796875,510.58046531677248,570.8671875]},{"page":460,"text":"elements. (ADP 3-90)","rect":[107.96172332763672,591.4783325195313,196.017492061615,582.3901977539063]},{"page":460,"text":"*security objective","rect":[71.95986938476563,606.979248046875,151.70506001281738,598.0313720703125]},{"page":460,"text":"The most important entity to protect during that specific security effort.","rect":[107.96173095703125,621.4982299804688,393.7271680831909,612.3900756835938]},{"page":460,"text":"security operations","rect":[71.95990753173828,636.9791259765625,153.4325549583435,628.03125]},{"page":460,"text":"Those operations performed by commanders to provide early and accurate warning of enemy","rect":[107.9617691040039,651.4981079101563,480.6548366546631,642.3899536132813]},{"page":460,"text":"operations, to provide the forces being protected with time and maneuver space within which to react","rect":[107.9617691040039,662.9609985351563,512.8708262405396,653.8528442382813]},{"page":460,"text":"to the enemy, and to develop the situation to allow commanders to effectively use their protected","rect":[107.9617691040039,674.4840087890625,495.5915126800537,665.3758544921875]},{"page":460,"text":"forces. (ADP 3-90)","rect":[107.96174621582031,685.9869995117188,184.91534972763064,676.8988647460938]},{"page":460,"text":"Glossary-20","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":460,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":460,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":461,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":461,"text":"*seize","rect":[90.0,81.43024444580078,115.02695942687989,74.50642395019531]},{"page":461,"text":"(Army) A tactical mission task in which a unit takes possession of a designated area by using","rect":[126.00186157226563,97.9732666015625,498.62669944763186,88.8650894165039]},{"page":461,"text":"overwhelming force.","rect":[125.99185180664063,109.49627685546875,209.32017040252686,100.38809967041016]},{"page":461,"text":"sequential relief in place","rect":[89.99000549316406,124.95713806152344,193.67899800109863,116.02931213378906]},{"page":461,"text":"Occurs when each element within the relieved unit is relieved in succession, from right to left, left to","rect":[125.99187469482422,139.49615478515626,528.9191188812256,130.38796997070313]},{"page":461,"text":"right, front to rear, or rear to front. (ADP 3-90)","rect":[125.99191284179688,151.0191650390625,313.8268029747009,141.91098022460938]},{"page":461,"text":"simultaneous relief in place","rect":[89.99004364013672,166.4800262451172,206.45855427551269,157.5522003173828]},{"page":461,"text":"Occurs when all elements are relieved at the same time. (ADP 3-90)","rect":[125.99191284179688,180.99900817871095,398.6661584434509,171.91085815429688]},{"page":461,"text":"*single envelopment","rect":[89.99004364013672,196.49993896484376,176.42157531356814,187.5520782470703]},{"page":461,"text":"A variation of envelopment where a force attacks along one flank of an enemy force.","rect":[125.99190521240235,211.0189208984375,465.69997692108157,201.91073608398438]},{"page":461,"text":"situational obstacle","rect":[89.99002075195313,224.4757843017578,172.0187654571533,217.5519561767578]},{"page":461,"text":"An obstacle that a unit plans and possibly prepares prior to starting an operation, but does not execute","rect":[125.99188995361328,240.95867919921876,532.5552644805908,231.85049438476563]},{"page":461,"text":"unless specific criteria are met. (ATP 3-90.8/MCTP 3-34B)","rect":[125.99188995361328,252.46165466308595,364.04704833602906,243.37350463867188]},{"page":461,"text":"special reconnaissance","rect":[89.99000549316406,267.9425354003906,185.87438679504394,259.0147399902344]},{"page":461,"text":"Reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or","rect":[125.99186706542969,282.46148681640627,504.7932031211853,273.37335205078127]},{"page":461,"text":"diplomatically and/or politically sensitive environments to collect or verify information of strategic or","rect":[125.99186706542969,294.0045471191406,533.6675317344666,284.8963623046875]},{"page":461,"text":"operational significance, employing military capabilities not normally found in conventional forces.","rect":[125.99186706542969,305.4674072265625,525.2706861495972,296.3592224121094]},{"page":461,"text":"(JP 3-05)","rect":[125.99186706542969,316.9703674316406,162.98570800399782,307.8822326660156]},{"page":461,"text":"*spoiling attack","rect":[89.9900131225586,332.4713134765625,157.4807119293213,323.5234680175781]},{"page":461,"text":"A variation of an attack employed against an enemy preparing for an attack.","rect":[125.99186706542969,346.99029541015627,430.1159315109253,337.8821105957031]},{"page":461,"text":"stability operation","rect":[89.98998260498047,362.47119140625,168.10090541076662,353.5233459472656]},{"page":461,"text":"An operation conducted outside the United States in coordination with other instruments of national","rect":[125.98182678222656,376.9701232910156,525.6695933303834,367.8819885253906]},{"page":461,"text":"power to establish or maintain a secure environment and provide essential governmental services,","rect":[125.98181915283203,388.5131530761719,516.7466993331909,379.40496826171877]},{"page":461,"text":"emergency infrastructure reconstruction, and humanitarian relief. (ADP 3-0)","rect":[125.98181915283203,399.9760437011719,431.7120568809509,390.86785888671877]},{"page":461,"text":"staggered relief in place","rect":[89.96995544433594,415.4569396972656,191.37133503723144,406.50909423828127]},{"page":461,"text":"Occurs when each element is relieved in a sequence determined by the tactical situation, not its","rect":[125.97181701660156,429.9759216308594,506.4142901878357,420.86773681640627]},{"page":461,"text":"geographical orientation. (ADP 3-90)","rect":[125.97181701660156,441.4989318847656,275.9411523399353,432.3907470703125]},{"page":461,"text":"standard use Army aircraft flight route","rect":[89.95994567871094,456.9798278808594,258.02840901184086,448.031982421875]},{"page":461,"text":"Route established below the coordination level to facilitate the movement of Army aircraft. (JP 3-52)","rect":[125.96180725097656,471.4988098144531,530.5793359336853,462.390625]},{"page":461,"text":"*start point","rect":[89.95982360839844,486.95965576171877,139.73717284774782,478.0318603515625]},{"page":461,"text":"A designated place on a route where elements fall under the control of a designated march commander.","rect":[125.96168518066406,501.4986877441406,538.8658399581909,492.3905029296875]},{"page":461,"text":"*stay-behind operation","rect":[89.95982360839844,516.9796142578125,188.65582179260256,508.0317687988281]},{"page":461,"text":"An operation in which a unit remains in position to conduct a specified mission while the remainder of ","rect":[125.96168518066406,531.478515625,539.2366895675659,522.390380859375]},{"page":461,"text":"the force withdraws or retires from an area.","rect":[125.97172546386719,540.9373779296875,299.2936964035034,533.853271484375]},{"page":461,"text":"striking force","rect":[89.96986389160156,558.4423828125,147.51572895812988,549.4945068359375]},{"page":461,"text":"A dedicated counterattack force in a mobile defense constituted with the bulk of available combat","rect":[125.97172546386719,570.937255859375,516.9525523147584,563.8531494140625]},{"page":461,"text":"power. (ADP 3-90)","rect":[125.97172546386719,584.46435546875,203.52652526474,575.376220703125]},{"page":461,"text":"strong point","rect":[89.9698486328125,599.9652099609375,141.96263671493532,591.017333984375]},{"page":461,"text":"A heavily fortified battle position tied to a natural or reinforcing obstacle to create an anchor for the","rect":[125.97171020507813,614.4842529296875,524.9739046173096,605.3760986328125]},{"page":461,"text":"defense or to deny the enemy decisive or key terrain. (ADP 3-90)","rect":[125.97171020507813,626.0072631835938,387.5438134727478,616.8991088867188]},{"page":461,"text":"*subsequent position","rect":[89.95984649658203,641.4680786132813,179.17390345764162,632.5402221679688]},{"page":461,"text":"A position that a unit expects to move to during the course of battle.","rect":[125.96170806884766,656.0071411132813,398.1651563644409,646.8989868164063]},{"page":461,"text":"*supplementary position","rect":[89.95984649658203,671.4879760742188,195.305098526001,662.5401000976563]},{"page":461,"text":"A defensive position located within a unit’s assigned area that provides the best sectors of fire and","rect":[125.96170806884766,686.0070190429688,518.7516994476318,676.8988647460938]},{"page":461,"text":"defensive terrain along an avenue of approach that is not the primary avenue where the enemy is","rect":[125.97172546386719,697.4699096679688,511.8870379905701,688.3617553710938]},{"page":461,"text":"expected to attack.","rect":[125.97172546386719,708.972900390625,200.7099256515503,699.884765625]},{"page":461,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":461,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":461,"text":"Glossary-21","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":462,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":462,"text":"*support by fire","rect":[72.0,83.45428466796875,140.89147663879394,74.50642395019531]},{"page":462,"text":"A tactical mission task in which a in which a unit engages the enemy by direct fire in support of ","rect":[108.00186157226563,97.9732666015625,494.02138805389407,88.8650894165039]},{"page":462,"text":"another maneuvering force.","rect":[108.01187896728516,109.49627685546875,218.28199291229249,100.38809967041016]},{"page":462,"text":"support by fire position","rect":[72.02003479003906,124.9771728515625,172.39338587951662,116.02931213378906]},{"page":462,"text":"The general position from which a unit performs the tactical mission task of support by fire.","rect":[108.02189636230469,139.49615478515626,475.56341075897219,130.38796997070313]},{"page":462,"text":"(ADP 3-90)","rect":[108.02189636230469,150.99913024902345,155.57681823349,141.91098022460938]},{"page":462,"text":"supporting distance","rect":[72.02003479003906,166.50006103515626,156.27319050598144,157.5522003173828]},{"page":462,"text":"The distance between two units that can be traveled in time for one to come to the aid of the other and","rect":[108.02189636230469,178.99501037597657,515.9912624359131,171.91085815429688]},{"page":462,"text":"prevent its defeat by an enemy or ensure it regains control of a civil situation. (ADP 3-0)","rect":[108.02189636230469,192.48193359375,462.6597802696228,183.37374877929688]},{"page":462,"text":"*suppress","rect":[72.02002716064453,207.9427947998047,114.31545138168335,201.0]},{"page":462,"text":"A tactical mission task in which a unit temporarily degrades a force or weapon system from","rect":[108.02188873291016,222.4818115234375,474.8540930709839,213.37362670898438]},{"page":462,"text":"accomplishing its mission.","rect":[108.02191162109375,234.0047607421875,214.4473524093628,224.89657592773438]},{"page":462,"text":"surveillance","rect":[72.02005767822266,247.46168518066407,123.20923329162598,240.53785705566407]},{"page":462,"text":"The systematic observation of aerospace, cyberspace, surface, or subsurface areas, places, persons, or","rect":[108.02191925048828,264.004638671875,513.9404809532166,254.89645385742188]},{"page":462,"text":"things by visual, aural, electronic, photographic, or other means. (JP 3-0)","rect":[108.02191925048828,275.467529296875,399.8945214805603,266.3593444824219]},{"page":462,"text":"survivability","rect":[72.01005554199219,290.94842529296877,125.9196605682373,282.0005798339844]},{"page":462,"text":"(Army, Marine Corps) A quality or capability of military forces which permits them to avoid or","rect":[108.01191711425781,305.4674072265625,490.78703857040406,296.3592224121094]},{"page":462,"text":"withstand hostile actions or environmental conditions while retaining the ability to fulfill their primary","rect":[108.01191711425781,316.99041748046877,520.6615505218506,307.8822326660156]},{"page":462,"text":"mission. (ATP 3-37.34/MCTP 3-34C)","rect":[108.01191711425781,328.4933776855469,260.5664269981384,319.4052429199219]},{"page":462,"text":"survivability move","rect":[72.01007080078125,343.9942932128906,151.20617390441894,335.04644775390627]},{"page":462,"text":"A move that involves rapidly displacing a unit, command post, or facility in response to direct and","rect":[108.01193237304688,358.5132751464844,501.22069358825686,349.40509033203127]},{"page":462,"text":"indirect fires, the approach of a threat or as a proactive measure based on intelligence, meteorological","rect":[108.01193237304688,369.9761657714844,514.1600413284302,360.86798095703127]},{"page":462,"text":"data, and risk assessment of enemy capabilities and intentions. (ADP 3-90)","rect":[108.01193237304688,381.4991455078125,407.98067260360718,372.3909606933594]},{"page":462,"text":"survivability operations","rect":[72.00003814697266,396.98004150390627,173.45455813217164,388.0321960449219]},{"page":462,"text":"Those protection activities that alter the physical environment by providing or improving cover,","rect":[108.00189971923828,411.4990234375,491.5050916671753,402.3908386230469]},{"page":462,"text":"camouflage, and concealment. (ATP 3-37.34/MCTP 3-34C)","rect":[107.99187469482422,423.02203369140627,348.57207275009156,413.9138488769531]},{"page":462,"text":"sustainment warfighting function","rect":[71.98998260498047,438.5029296875,214.22389125061037,429.5550842285156]},{"page":462,"text":"The related tasks and systems that provide support and services to ensure freedom of action, extend","rect":[107.99185180664063,453.02191162109377,505.6334743499756,443.9137268066406]},{"page":462,"text":"operational reach, and prolong endurance. (ADP 3-0)","rect":[107.99185180664063,464.48480224609377,321.3276574668884,455.3766174316406]},{"page":462,"text":"tactical assembly area","rect":[71.98998260498047,479.9656982421875,165.92148399353028,471.0178527832031]},{"page":462,"text":"An area that is generally out of the reach of light artillery and the location where units make final","rect":[107.99185180664063,494.48468017578127,496.82077741241457,485.3764953613281]},{"page":462,"text":"preparations (precombat checks and inspections) and rest, prior to moving to the line of departure.","rect":[107.99185180664063,506.0076904296875,500.7358045578003,496.8995056152344]},{"page":462,"text":"(JP 3-35)","rect":[107.99183654785156,517.4505615234375,144.9856774864197,508.3623962402344]},{"page":462,"text":"tactical combat force","rect":[71.98997497558594,530.9274291992188,161.45354939270019,524.0036010742188]},{"page":462,"text":"A rapidly deployable, air-ground, mobile combat unit with appropriate combat support and combat","rect":[107.99183654785156,547.470458984375,504.1316294631958,538.3623046875]},{"page":462,"text":"service support assets assigned to, and capable of defeating level III threats, including combined arms.","rect":[107.99183654785156,558.9934692382813,517.6596021652222,549.8853149414063]},{"page":462,"text":"(JP 3-10)","rect":[107.99183654785156,570.4964599609375,144.9856774864197,561.4083251953125]},{"page":462,"text":"*tactical deception","rect":[71.98997497558594,585.9773559570313,151.78123377990725,577.0494995117188]},{"page":462,"text":"A friendly activity that causes enemy commanders to take action or cause inaction detrimental to their","rect":[107.99183654785156,600.516357421875,516.5083520469666,591.408203125]},{"page":462,"text":"objectives.","rect":[107.99183654785156,611.979248046875,151.05678844451905,602.8610229492188]},{"page":462,"text":"*tactical mission task","rect":[71.9899673461914,625.4360961914063,163.11985682678225,618.5122680664063]},{"page":462,"text":"The specific activity a unit performs while executing a tactical operation or form of maneuver.","rect":[107.99182891845703,641.9791259765625,485.91619396209719,632.8709716796875]},{"page":462,"text":"*tactical movement","rect":[71.98994445800781,655.4359741210938,155.0657556114197,648.5121459960938]},{"page":462,"text":"A movement in which troops and vehicles are arranged to protect combat forces during movement","rect":[107.9817886352539,671.97900390625,501.7898325881958,662.870849609375]},{"page":462,"text":"when a threat of enemy interference is possible.","rect":[107.9817886352539,683.5020141601563,299.00515270233157,674.3938598632813]},{"page":462,"text":"*tactical road march","rect":[71.97993469238281,696.9588623046875,160.886397354126,690.0350341796875]},{"page":462,"text":"A rapid movement used to relocate units within an assigned area to prepare for combat operations.","rect":[107.98179626464844,713.5018920898438,501.7297010421753,704.3937377929688]},{"page":462,"text":"Glossary-22","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":462,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":462,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":463,"text":"Glossary","rect":[501.47998046875,46.34102249145508,539.9540732421875,37.90802001953125]},{"page":463,"text":"tactics","rect":[90.0,81.43024444580078,117.23035311508179,74.50642395019531]},{"page":463,"text":"(Army) The employment, ordered arrangement, and directed actions of forces in relation to each other.","rect":[126.00186157226563,97.9732666015625,537.1043043136597,88.8650894165039]},{"page":463,"text":"(ADP 3-90)","rect":[126.00186157226563,109.47624206542969,173.55678344345095,100.38809967041016]},{"page":463,"text":"target","rect":[89.99999237060547,124.9771728515625,115.5960824546814,116.57039642333985]},{"page":463,"text":"An entity or object that performs a function for the threat considered for possible engagement or other","rect":[126.00184631347656,139.49615478515626,534.2178247032166,130.37796020507813]},{"page":463,"text":"action. (JP 3-60)","rect":[126.00184631347656,150.99913024902345,192.39438415145876,141.91098022460938]},{"page":463,"text":"target area of interest","rect":[89.98997497558594,166.50006103515626,182.4836022911072,157.5522003173828]},{"page":463,"text":"The geographical area where high-value targets can be acquired and engaged by friendly forces.","rect":[125.99183654785156,181.01904296875,510.27996349334719,171.91085815429688]},{"page":463,"text":"(JP 2-0) ","rect":[125.99183654785156,192.46189880371095,160.47065258026124,183.37374877929688]},{"page":463,"text":"target reference point","rect":[89.98997497558594,207.96282958984376,182.71904540634157,199.0149688720703]},{"page":463,"text":"A predetermined point of reference, normally a permanent structure or terrain feature that can be used","rect":[125.99183654785156,222.4818115234375,533.5835475921631,213.37362670898438]},{"page":463,"text":"when describing a target location. (JP 3-09.3)","rect":[125.99183654785156,234.0047607421875,308.19048095321656,224.89657592773438]},{"page":463,"text":"task","rect":[89.9999771118164,247.46168518066407,107.8085241241455,240.69818115234376]},{"page":463,"text":"A clearly defined action or activity specifically assigned to an individual or organization, or derived","rect":[125.9918212890625,264.004638671875,525.5573635101318,254.89645385742188]},{"page":463,"text":"during mission analysis, that must be done as it is imposed by an appropriate authority. (JP 1, Vol 1)","rect":[125.99183654785156,275.467529296875,527.7938134727478,266.3593444824219]},{"page":463,"text":"tempo","rect":[89.98994445800781,290.9283752441406,116.65517234802246,282.5416564941406]},{"page":463,"text":"The relative speed and rhythm of military operations over time with respect to the enemy. (ADP 3-0)","rect":[125.99180603027344,305.4674072265625,529.9480493125916,296.3592224121094]},{"page":463,"text":"*terrain management","rect":[89.98990631103516,320.94830322265627,182.47853637313845,312.0004577636719]},{"page":463,"text":"The process of allocating terrain by specifying locations for units and activities to deconflict activities","rect":[125.99177551269531,335.46728515625,533.5670917015076,326.3591003417969]},{"page":463,"text":"that might interfere with each other.","rect":[125.99177551269531,346.99029541015627,269.85698986053469,337.8821105957031]},{"page":463,"text":"time of attack","rect":[89.98990631103516,360.4471435546875,148.89549159240725,353.5233459472656]},{"page":463,"text":"The moment the leading elements of the main body cross the line of departure, or in a limited-visibility","rect":[125.99177551269531,376.99017333984377,538.7045803070068,367.8819885253906]},{"page":463,"text":"attack, the point of departure. (ADP 3-90)","rect":[125.99179077148438,388.49310302734377,293.78670287704468,379.40496826171877]},{"page":463,"text":"*trail party","rect":[89.98994445800781,403.9940490722656,139.2191982269287,395.04620361328127]},{"page":463,"text":"The last march unit in a march column.","rect":[125.99180603027344,416.4889831542969,283.23565196990969,409.40484619140627]},{"page":463,"text":"*traveling","rect":[89.99996185302735,433.9939270019531,133.34947776794435,425.04608154296877]},{"page":463,"text":"A movement technique used when speed is necessary and contact with enemy forces is not likely.","rect":[125.99180603027344,448.5129089355469,517.0591993331909,439.40472412109377]},{"page":463,"text":"*traveling overwatch","rect":[89.98998260498047,463.9938049316406,180.28419398498537,455.04595947265627]},{"page":463,"text":"A movement technique used when contact with enemy forces is possible.","rect":[125.99185180664063,478.5127868652344,418.95766735076907,469.40460205078127]},{"page":463,"text":"*trigger line","rect":[90.00003814697266,493.9936828613281,142.50884724426269,485.04583740234377]},{"page":463,"text":"A phase line located on identifiable terrain used to initiate and mass fires into an engagement area at a","rect":[126.00189971923828,508.4525451660156,534.2418489532471,499.3443603515625]},{"page":463,"text":"predetermined range. ","rect":[126.00190734863281,519.9755859375,213.46648693084718,510.8674011230469]},{"page":463,"text":"*troop movement","rect":[90.01005554199219,535.4364013671875,165.2803094444275,526.5185546875]},{"page":463,"text":"The movement of Soldiers and units from one place to another by any available means.","rect":[126.01191711425781,549.9754638671875,475.0777540206909,540.8673095703125]},{"page":463,"text":"*turn","rect":[90.01005554199219,563.4322509765625,113.93781184387207,557.0494995117188]},{"page":463,"text":"1. A tactical mission task in which a unit forces an enemy force from one avenue of approach or","rect":[126.01191711425781,579.975341796875,510.5855615196228,570.8671875]},{"page":463,"text":"movement corridor to another. 2. An obstacle effect that integrates fire planning and obstacle effort to","rect":[126.01191711425781,591.498291015625,533.3309230804443,582.39013671875]},{"page":463,"text":"divert an enemy formation from one avenue of approach to an adjacent avenue of approach or into an","rect":[126.02192687988281,602.961181640625,531.6474514007568,593.8429565429688]},{"page":463,"text":"engagement area.","rect":[126.02192687988281,614.4842529296875,195.96352672576905,606.3780517578125]},{"page":463,"text":"*turning movement","rect":[90.02006530761719,629.965087890625,174.23016906356814,621.0172119140625]},{"page":463,"text":"(Army) A form of maneuver in which the attacking force seeks to avoid the enemy’s principal","rect":[126.02192687988281,644.484130859375,502.8522105178833,635.3759765625]},{"page":463,"text":"defensive positions by attacking to the rear of their current positions forcing them to move or divert","rect":[126.02192687988281,656.0071411132813,524.2657237014771,646.8989868164063]},{"page":463,"text":"forces to meet the threat.","rect":[126.02192687988281,665.4459838867188,225.19587230682374,658.3618774414063]},{"page":463,"text":"unified action","rect":[90.03008270263672,680.9268188476563,148.70818995666506,674.0029907226563]},{"page":463,"text":"The synchronization, coordination, and/or integration of the activities of governmental and","rect":[126.03195190429688,697.4699096679688,489.3632411956787,688.3617553710938]},{"page":463,"text":"nongovernmental entities with military operations to achieve unity of effort. (JP 1, Vol 1)","rect":[126.03195190429688,708.992919921875,484.0365197715759,699.884765625]},{"page":463,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.434908203125,747.510009765625]},{"page":463,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":463,"text":"Glossary-23","rect":[470.45098876953127,755.9609985351563,521.93905859375,747.5280151367188]},{"page":464,"text":"Glossary","rect":[72.0,46.34102249145508,110.47410040283204,37.90802001953125]},{"page":464,"text":"*vee formation","rect":[72.0,81.43024444580078,136.132002822876,74.50642395019531]},{"page":464,"text":"A movement formation with two elements abreast and one or more elements trailing.","rect":[108.00186157226563,97.9732666015625,448.18291759490969,88.8650894165039]},{"page":464,"text":"*vertical envelopment","rect":[72.0,113.43412780761719,166.17699218368532,104.50630187988281]},{"page":464,"text":"A variation of envelopment where air-dropped or airlanded troops attack an enemy forces rear, flank,","rect":[108.00186157226563,127.97314453125,512.8559522628784,118.8649673461914]},{"page":464,"text":"or both.","rect":[107.99186706542969,137.4721221923828,139.11298656463624,130.38796997070313]},{"page":464,"text":"warfighting function","rect":[71.9900131225586,154.97705078125,160.048750869751,146.02919006347657]},{"page":464,"text":"A group of tasks and systems united by a common purpose that commanders use to accomplish","rect":[107.98184967041016,169.49603271484376,489.24486351013186,160.38784790039063]},{"page":464,"text":"missions and training objectives. (ADP 3-0)","rect":[107.98184967041016,181.01904296875,284.05330443954468,171.90084838867188]},{"page":464,"text":"*wedge formation","rect":[71.96997833251953,196.49993896484376,148.9446248931885,187.5520782470703]},{"page":464,"text":"A movement formation with one lead element and the trail elements are paired off abreast of each","rect":[107.97183227539063,210.99888610839845,499.4284267425537,201.91073608398438]},{"page":464,"text":"other on the flanks.","rect":[107.97183227539063,220.45777893066407,185.17592906951905,213.37362670898438]},{"page":464,"text":"withdraw","rect":[71.96997833251953,235.93861389160157,113.10609102630615,229.01478576660157]},{"page":464,"text":"To disengage from an enemy force and move in a direction away from the enemy. (ADP 3-90)","rect":[107.97183227539063,252.481689453125,486.48738647079468,243.37350463867188]},{"page":464,"text":"zone","rect":[71.96995544433594,265.93853759765627,91.47789479064942,261.098876953125]},{"page":464,"text":"An operational area assigned to a unit in the offense that only has rear and lateral boundaries. (FM 3-0)","rect":[107.97181701660156,282.4815368652344,520.3348901329041,273.37335205078127]},{"page":464,"text":"*zone reconnaissance","rect":[71.96991729736328,295.93841552734377,163.4124422149658,289.0146179199219]},{"page":464,"text":"A form of reconnaissance operation that involves a directed effort to obtain detailed information on all","rect":[107.9717788696289,312.46136474609377,518.1474986038209,303.37322998046877]},{"page":464,"text":"routes, obstacles, terrain, and enemy forces within a zone defined by boundaries.","rect":[107.96176147460938,324.00439453125,431.0466260910034,314.8962097167969]},{"page":464,"text":"Glossary-24","rect":[72.1199951171875,755.9609985351563,123.60810308837891,747.5280151367188]},{"page":464,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":464,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.7609274902344,747.510009765625]},{"page":465,"text":"References","rect":[271.8599853515625,142.6762237548828,358.164536026001,130.83743286132813]},{"page":465,"text":"URLs accessed on 11April 2023.","rect":[126.0,180.478759765625,273.46140003204348,170.5198974609375]},{"page":465,"text":"REQUIRED PUBLICATIONS","rect":[90.0,206.21641540527345,275.4935828704834,194.2355499267578]},{"page":465,"text":"These documents must be available to intended users of this publication.","rect":[108.0,221.01426696777345,398.2039747238159,211.92611694335938]},{"page":465,"text":"DOD Dictionary of Military and Associated Terms. February 2023.","rect":[108.0,235.55328369140626,377.9818983078003,226.44509887695313]},{"page":465,"text":"FM 1-02.1. Operational Terms. 9 March 2021.","rect":[108.0000228881836,249.9921112060547,295.8399610519409,240.90396118164063]},{"page":465,"text":"FM 1-02.2. Military Symbols. 18 May 2022.","rect":[107.98998260498047,264.5311279296875,285.2147169113159,255.42294311523438]},{"page":465,"text":"RELATED PUBLICATIONS","rect":[90.0,287.9096984863281,267.75011363220218,278.2355651855469]},{"page":465,"text":"These documents contain relevant supplemental information.","rect":[108.0,305.0142517089844,352.3637342453003,295.9261169433594]},{"page":465,"text":"JOINT AND DEPARTMENT OF DEFENSE PUBLICATIONS","rect":[90.0,328.427978515625,354.658483505249,320.31597900390627]},{"page":465,"text":"Most Department of Defense publications are available online: https://www.esd.whs.mil/DD/.","rect":[108.0,345.3342590332031,484.0666456222534,336.2461242675781]},{"page":465,"text":"Most joint publications are available online: https://www.jcs.mil/doctrine.","rect":[108.0,359.8143005371094,403.84047985076907,350.69610595703127]},{"page":465,"text":"DODD 3025.18. Defense Support to Civil Authorities (DSCA). 29 December 2010.","rect":[108.0,374.3343200683594,440.16302013397219,365.22613525390627]},{"page":465,"text":"JP 1, Volume 1. Joint Warfighting. 29 June 2020.","rect":[108.02006530761719,388.8533020019531,306.3789930343628,379.7451171875]},{"page":465,"text":"JP 2-0. Joint Intelligence. 26 May 2022.","rect":[108.04009246826172,403.3121643066406,268.8220167160034,394.2039794921875]},{"page":465,"text":"JP 3-0. Joint Campaigns and Operations. 18 June 2022.","rect":[108.04007720947266,417.8311462402344,332.25261974334719,408.72296142578127]},{"page":465,"text":"JP 3-01. Countering Air and Missile Threats. 6 April 2023.","rect":[108.05010986328125,432.3501281738281,344.7465772628784,423.241943359375]},{"page":465,"text":"JP 3-05. Joint Doctrine for Special Operations. 22 September 2020.","rect":[108.06012725830078,446.8089599609375,380.27849864959719,437.7007751464844]},{"page":465,"text":"JP 3-07.3. Peace Operations. 1 March 2018.","rect":[108.07013702392578,461.3078918457031,286.44619274139407,452.2197570800781]},{"page":465,"text":"JP 3-09. Joint Fire Support. 10 April 2019.","rect":[108.08015441894531,475.8268737792969,280.86504650115969,466.7387390136719]},{"page":465,"text":"JP 3-09.3. Close Air Support. 10 June 2019.","rect":[108.08013153076172,490.2857360839844,283.9191541671753,481.1976013183594]},{"page":465,"text":"JP 3-10. Joint Security Operations in Theater. 25 July 2019.","rect":[108.08013153076172,504.82476806640627,349.2134656906128,495.7165832519531]},{"page":465,"text":"JP 3-12. Joint Cyberspace Operations. 19 December 2022. ","rect":[108.08013153076172,519.2836303710938,346.70644664764407,510.1754455566406]},{"page":465,"text":"JP 3-13.3. Operations Security. 6 January 2016.","rect":[108.11019897460938,533.8026123046875,299.80584239959719,524.86474609375]},{"page":465,"text":"JP 3-13.4. Military Deception. 14 February 2017.","rect":[108.12023162841797,548.3215942382813,305.93206310272219,539.2134399414063]},{"page":465,"text":"JP 3-15. Barriers, Obstacles, and Mines in Joint Operations.","rect":[108.12020874023438,562.7604370117188,351.4659376144409,553.6723022460938]},{"page":465,"text":"JP 3-16. Multinational Operations. 1 March 2019.","rect":[108.12020874023438,577.2794189453125,309.52822399139407,568.1912841796875]},{"page":465,"text":"JP 3-18. Joint Forcible Entry Operations. 27 June 2018.","rect":[108.12020874023438,591.8184204101563,333.4039258956909,582.7102661132813]},{"page":465,"text":"JP 3-26. Joint Combating Terrorism. 30 July 2020.","rect":[108.11017608642578,606.2772827148438,312.6324110031128,597.1691284179688]},{"page":465,"text":"JP 3-31. Joint Land Operations. 3 October 2019.","rect":[108.11017608642578,620.7762451171875,303.6955518722534,611.6881103515625]},{"page":465,"text":"26 May 2022. ","rect":[354.0009765625,562.7804565429688,412.3675184249878,553.8526611328125]},{"page":465,"text":"JP 3-35.","rect":[108.12019348144531,633.3011474609375,140.92568492889405,626.3873901367188]},{"page":465,"text":"JP 3-36.","rect":[108.12017059326172,647.7600708007813,140.92565441131593,640.8463134765625]},{"page":465,"text":"JP 3-50.","rect":[108.12017059326172,662.279052734375,140.92565441131593,655.3652954101563]},{"page":465,"text":"JP 3-52.","rect":[108.12017822265625,676.7979736328125,140.92566967010499,669.8842163085938]},{"page":465,"text":"JP 3-57.","rect":[108.13021087646485,691.2568359375,140.93569469451905,684.3430786132813]},{"page":465,"text":"Joint Deployment and Redeployment Operations. 31 March 2022.","rect":[143.4607391357422,635.315185546875,407.0819044113159,626.20703125]},{"page":465,"text":"Joint Air Mobility and Sealift Operations. 4 January 2021.","rect":[143.46072387695313,649.7741088867188,376.66424083709719,640.6659545898438]},{"page":465,"text":"Personnel Recovery. 2 October 2015.","rect":[143.46072387695313,664.2930908203125,293.38897228240969,655.1849365234375]},{"page":465,"text":"Joint Airspace Control. 22 October 2022.","rect":[143.46072387695313,678.7919921875,309.82778453826907,669.703857421875]},{"page":465,"text":"Civil-Military Operations. 9 July 2018.","rect":[143.4707489013672,693.2708740234375,300.71160411834719,684.1627197265625]},{"page":465,"text":"JP 3-60. Joint Targeting. 28 September 2018.","rect":[108.12019348144531,707.7899169921875,290.63051891326907,698.6817626953125]},{"page":465,"text":"01 May 2023","rect":[90.11700439453125,755.9639892578125,142.4670126953125,747.5130004882813]},{"page":465,"text":"FM 3-90","rect":[289.2510070800781,754.1909790039063,322.7489951171875,747.6119995117188]},{"page":465,"text":"References-1","rect":[465.47100830078127,754.1820068359375,521.9378989257813,747.531005859375]},{"page":466,"text":"References","rect":[72.0,44.55902099609375,120.49290686035157,37.90802001953125]},{"page":466,"text":"JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020.","rect":[90.0,94.19427490234375,362.4548292160034,85.08609771728516]},{"page":466,"text":"JP 4-02. Joint Health Services. 11 December 2017.","rect":[90.01001739501953,106.6992416381836,294.4831495285034,99.6050796508789]},{"page":466,"text":"JP 4-09. Distribution Operations (U//FOUO). 14 March 2019.","rect":[90.02002716064453,123.15208435058594,340.03811168670657,114.0639419555664]},{"page":466,"text":"JP 5-0. Joint Planning. 1 December 2020.","rect":[90.03004455566406,137.69110107421876,258.07046031951907,128.58291625976563]},{"page":466,"text":"ARMY PUBLICATIONS","rect":[72.0,161.0621795654297,179.50238609313966,152.8079833984375]},{"page":466,"text":"Most Army doctrinal publications are available online: https://armypubs.army.mil.","rect":[90.0,178.01434326171876,420.46966075897219,168.90615844726563]},{"page":466,"text":"ADP 1-01. Doctrine Primer. 31 July 2019.","rect":[90.0,192.47430419921876,261.4682569503784,183.36611938476563]},{"page":466,"text":"ADP 2-0. Intelligence. 31 July 2019.","rect":[90.0,206.9932861328125,237.22988414764405,197.88510131835938]},{"page":466,"text":"ADP 3-0. Operations. 31 July 2019.","rect":[90.00000762939453,221.4521484375,235.06556224822999,212.34396362304688]},{"page":466,"text":"ADP 3-07. Stability. 31 July 2019.","rect":[90.0000228881836,235.97113037109376,228.41228771209718,226.86294555664063]},{"page":466,"text":"ADP 3-19. Fires. 31 July 2019.","rect":[90.0100326538086,250.4901123046875,216.17786693572999,241.38192749023438]},{"page":466,"text":"ADP 3-28. Defense Support of Civil Authorities. 31 July 2019.","rect":[90.0100326538086,264.948974609375,340.6132459640503,255.84078979492188]},{"page":466,"text":"ADP 3-37. Protection. 31 July 2019.","rect":[90.01001739501953,279.46795654296877,237.29802989959718,270.3597717285156]},{"page":466,"text":"ADP 3-90. Offense and Defense. 31 July 2019.","rect":[90.01001739501953,293.9869079589844,277.7878370285034,284.87872314453127]},{"page":466,"text":"ADP 4-0. Sustainment. 31 July 2019.","rect":[89.9999771118164,308.4457702636719,238.90320873260499,299.33758544921877]},{"page":466,"text":"ADP 5-0. The Operations Process. 31 July 2019.","rect":[89.99999237060547,322.9647521972656,286.6685438156128,313.8565673828125]},{"page":466,"text":"ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019.","rect":[89.9999771118164,337.4837341308594,428.0186719894409,328.37554931640627]},{"page":466,"text":"AR 525-21. Army Military Deception (MILDEC) Program. 28 October 2013.","rect":[89.98994445800781,351.9425964355469,399.8745069503784,342.83441162109377]},{"page":466,"text":"ATP 2-01.3. Intelligence Preparation of the Battlefield. 1 March 2019.","rect":[89.98994445800781,366.4615783691406,373.6010389328003,357.3533935546875]},{"page":466,"text":"ATP 3-09.32/MCRP 3-31.6/NTTP 3-09.2/AFTTP 3-2.6. Multi-Service Tactics, Techniques, and","rect":[89.99996185302735,380.9604797363281,475.26894187927248,371.8723449707031]},{"page":466,"text":"Procedures for Joint Application of Firepower. 18 October 2019.","rect":[125.99179077148438,392.44342041015627,387.6390333175659,383.3352355957031]},{"page":466,"text":"ATP 3-09.34/MCRP 3-31.4/NTTP 3-09.2.1/AFTTP 3-2.59. Multi-Service Tactics, Techniques, and","rect":[89.98992919921875,406.9423522949219,487.7458095550537,397.8542175292969]},{"page":466,"text":"Procedures for Kill Box Planning and Employment. 7 October 2022.","rect":[125.98176574707031,418.48541259765627,400.64199352264407,409.3772277832031]},{"page":466,"text":"ATP 3-09.42. Fire Support for the Brigade Combat Team. 1 March 2016.","rect":[89.97989654541016,432.94427490234377,384.74822521209719,423.8360900878906]},{"page":466,"text":"ATP 3-11.37/MCRP 10-10E.7/NTTP 3-11.29/AFTTP 3-22.44. Multi-Service Tactics, Techniques, and","rect":[89.97987365722656,447.4432067871094,501.36095237731936,438.3550720214844]},{"page":466,"text":"Procedures for Chemical, Biological, Radiological, and Nuclear Reconnaissance and","rect":[125.98174285888672,458.9862365722656,469.5125026702881,449.8780517578125]},{"page":466,"text":"Surveillance. 31 March 2021. Common access card required.","rect":[125.98174285888672,470.4290466308594,370.34246349334719,461.3409118652344]},{"page":466,"text":"ATP 3-11.50. Battlefield Obscuration. 15 May 2014.","rect":[89.97989654541016,484.96807861328127,302.2456007003784,475.8598937988281]},{"page":466,"text":"ATP 3-13.3. Army Operations Security for Division and Below. 16 July 2019.","rect":[89.97989654541016,499.42694091796877,401.3724012374878,490.3187561035156]},{"page":466,"text":"ATP 3-18.4. Special Forces Special Reconnaissance. 5 October 2021.","rect":[89.97987365722656,513.9259033203125,370.5148572921753,504.8377685546875]},{"page":466,"text":"ATP 3-21.8. Infantry Platoon and Squad. 12 April 2016.","rect":[89.96986389160156,528.4649658203125,317.16335582733157,519.3568115234375]},{"page":466,"text":"ATP 3-21.10. Infantry Rifle Company. 14 May 2018.","rect":[89.95984649658203,542.923828125,302.46502208709719,533.815673828125]},{"page":466,"text":"ATP 3-21.18. Foot Marches. 13 April 2022.","rect":[89.95984649658203,557.4227905273438,267.2547254562378,548.3346557617188]},{"page":466,"text":"ATP 3-34.81/MCWP 3-17.4. Engineer Reconnaissance. 1 March 2016.","rect":[89.95982360839844,571.9617919921875,376.08098888397219,562.8536376953125]},{"page":466,"text":"ATP 3-35. Army Deployment and Redeployment. 9 March 2023.","rect":[89.95986938476563,586.420654296875,347.4638624191284,577.3125]},{"page":466,"text":"ATP 3-37.2. Antiterrorism. 19 July 2021.","rect":[89.95986938476563,600.939697265625,255.7828779220581,591.83154296875]},{"page":466,"text":"ATP 3-37.10/MCRP 3-4D.13. Base Camps. 27 January 2017.","rect":[89.95986938476563,615.4586181640625,336.60122203826907,606.3504638671875]},{"page":466,"text":"ATP 3-37.34/MCTP 3-34C. Survivability Operations. 16 April 2018.","rect":[89.9498519897461,629.91748046875,366.90264415740969,620.809326171875]},{"page":466,"text":"ATP 3-39.10. Police Operations. 24 August 2021.","rect":[89.95984649658203,644.4365234375,291.7246046066284,635.328369140625]},{"page":466,"text":"ATP 3-39.30. Security and Mobility Support. 21 May 2020.","rect":[89.95982360839844,658.9555053710938,328.8676710128784,649.8473510742188]},{"page":466,"text":"ATP 3-52.1/MCRP 3-20F.4 (MCWP 3-25.13)/NTTP 3-56.4/AFTTP 3-2.78. Multi-Service Tactics,","rect":[89.96986389160156,673.3943481445313,485.75185680389407,664.3062133789063]},{"page":466,"text":"Techniques, and Procedures for Airspace Control. 14 February 2019.","rect":[125.95167541503906,684.9373779296875,404.5157117843628,675.8292236328125]},{"page":466,"text":"ATP 3-57.10. Civil Affairs Support to Populace and Resources Control. 6 August 2013.","rect":[89.94979095458985,699.4564208984375,442.15481090545657,690.3482666015625]},{"page":466,"text":"ATP 3-90.4/MCTP 3-34A (MCWP 3-17.8). (CUI). Combined Arms Mobility. 10 June 2022.","rect":[89.94981384277344,713.9152221679688,459.1006727218628,704.8070678710938]},{"page":466,"text":"References-2","rect":[72.1199951171875,754.1790161132813,128.58690863037109,747.5280151367188]},{"page":466,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":466,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.79602270507817,747.510009765625]},{"page":467,"text":"References","rect":[491.4599914550781,44.55902099609375,539.9529135742188,37.90802001953125]},{"page":467,"text":"ATP 3-90.8/MCTP 3-34B. Combine Arms Countermobility. 30 November 2021.","rect":[108.0,94.19427490234375,430.25823497772219,85.08609771728516]},{"page":467,"text":"ATP 3-91.1/AFTTP 3-2.86. The Joint Air Ground Integration Center. 17 April 2019.","rect":[108.01001739501953,108.7132568359375,449.0848340988159,99.6050796508789]},{"page":467,"text":"ATP 3-94.4. Reconstitution Operations. 5 May 2021.","rect":[108.0,123.172119140625,321.3488721847534,114.23428344726563]},{"page":467,"text":"ATP 4-01.45/MCRP 3-40F.7/NTTP 4-01.6/AFTTP 3-2.58. Multi-Service Tactics, Techniques, and","rect":[108.01001739501953,137.6710662841797,503.79198265075686,128.58291625976563]},{"page":467,"text":"Procedures for Tactical Convoy Operations. 26 March 2021.","rect":[144.01187133789063,149.214111328125,388.7393445968628,140.10592651367188]},{"page":467,"text":"ATP 4-02.1. Army Medical Logistics. 29 October 2015.","rect":[108.00999450683594,163.6729736328125,330.48403453826907,154.56478881835938]},{"page":467,"text":"ATP 4-02.2. Medical Evacuation. 12 July 2019.","rect":[108.02001190185547,178.19195556640626,300.24868297576907,169.08377075195313]},{"page":467,"text":"ATP 4-02.10. Theater Hospitalization. 14 August 2020.","rect":[108.02001190185547,192.7109375,331.98906993865969,183.60275268554688]},{"page":467,"text":"ATP 4-14. Expeditionary Railway Center Operations. 22 June 2022.","rect":[108.03004455566406,207.1697998046875,382.69829845428469,198.06161499023438]},{"page":467,"text":"ATP 4-15. Army Watercraft Operations. 3 April 2015.","rect":[108.04005432128906,221.688720703125,326.3698682785034,212.58053588867188]},{"page":467,"text":"ATP 4-16. Movement Control. 25 April 2022.","rect":[108.0500717163086,236.12754821777345,291.6225233078003,227.03939819335938]},{"page":467,"text":"ATP 4-32. Explosive Ordnance Disposal (EOD) Operations. 12 May 2022.","rect":[108.06010437011719,250.6666259765625,410.26433849334719,241.55844116210938]},{"page":467,"text":"ATP 5-0.2-2. Staff Reference Guide Volume II: Appendix O, Distribution D Resources. 7 December","rect":[108.06012725830078,265.185546875,507.7559716758728,256.0773620605469]},{"page":467,"text":"2020.","rect":[144.06201171875,274.6043701171875,166.6070203781128,267.7206115722656]},{"page":467,"text":"ATP 5-19. Risk Management. 9 November 2021.","rect":[108.0701675415039,291.16741943359377,304.44814586639407,282.0592346191406]},{"page":467,"text":"ATP 6-02.53. Techniques for Tactical Radio Operations. 13 February 2020.","rect":[108.07015991210938,305.6864013671875,412.74627208709719,296.5782165527344]},{"page":467,"text":"FM 2-0. Intelligence. 6 July 2018.","rect":[108.08019256591797,320.145263671875,244.80909252166749,311.0370788574219]},{"page":467,"text":"FM 2-22.3. Human Intelligence Collector Operations. 6 September 2006.","rect":[108.08016967773438,334.66424560546877,403.09401988983157,325.5560607910156]},{"page":467,"text":"FM 3-0. Operations. 1 October 2022.","rect":[108.0902099609375,349.1631774902344,258.14470958709719,340.0750427246094]},{"page":467,"text":"FM 3-01. U.S. Army Air and Missile Defense Operations. 22 December 2020.","rect":[108.1002426147461,363.64208984375,419.7994031906128,354.5339050292969]},{"page":467,"text":"FM 3-04. Army Aviation. 6 April 2020.","rect":[108.11027526855469,378.1610412597656,265.0655469894409,369.0528564453125]},{"page":467,"text":"FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020.","rect":[108.11027526855469,392.6800231933594,388.35967540740969,383.57183837890627]},{"page":467,"text":"FM 3-11. Chemical, Biological, Radiological, and Nuclear Operations. 23 May 2019.","rect":[108.12030792236328,407.1388854980469,453.10988903045657,398.03070068359377]},{"page":467,"text":"FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021.","rect":[108.13026428222656,421.6578674316406,436.44961071014407,412.5496826171875]},{"page":467,"text":"FM 3-13.4. Army Support to Military Deception. 26 February 2019.","rect":[108.14031982421875,436.1768493652344,379.5100049972534,427.06866455078127]},{"page":467,"text":"FM 3-16. The Army in Multinational Operations. 8 April 2014.","rect":[108.15032958984375,450.6357421875,361.51003551483157,441.5275573730469]},{"page":467,"text":"FM 3-39. Military Police Operations. 9 April 2019.","rect":[108.15032958984375,465.15472412109377,315.3709363937378,456.0465393066406]},{"page":467,"text":"FM 3-50. Army Personnel Recovery. 2 September 2014.","rect":[108.14031982421875,479.6737060546875,333.1283826828003,470.5655212402344]},{"page":467,"text":"FM 3-52. Airspace Control. 20 October 2016.","rect":[108.15032958984375,494.112548828125,292.2839307785034,485.0244140625]},{"page":467,"text":"FM 3-55. Information Collection. 3 May 2013.","rect":[108.16035461425781,508.6515808105469,296.25982189178469,499.54339599609377]},{"page":467,"text":"FM 3-57. Civil Affairs Operations. 28 July 2021.","rect":[108.17040252685547,523.1104736328125,304.30788707733157,514.0023193359375]},{"page":467,"text":"FM 3-63. Detainee Operations. 2 January 2020.","rect":[108.19043731689453,537.6294555664063,300.6616163253784,528.6915893554688]},{"page":467,"text":"FM 3-98. Reconnaissance and Security Operations. 10 January 2023.","rect":[108.20047760009766,552.1484375,386.78652477264407,543.040283203125]},{"page":467,"text":"FM 3-99. Airborne and Air Assault Operations. 6 March 2015.","rect":[108.22047424316406,566.5872802734375,360.51003551483157,557.4991455078125]},{"page":467,"text":"FM 4-02. Army Health System. 17 November 2020.","rect":[108.23048400878906,581.1263427734375,314.8739881515503,572.0181884765625]},{"page":467,"text":"FM 4-40. Quartermaster Operations. 22 October 2013.","rect":[108.2405014038086,595.625244140625,330.1935682296753,586.537109375]},{"page":467,"text":"FM 5-0. Planning and Orders Production. 16 March 2022.","rect":[108.27058410644531,610.1041870117188,344.7175245285034,600.9960327148438]},{"page":467,"text":"FM 6-27/MCTP 11-10C. The Commanders Handbook on the Law of Land Warfare. 7 August 2019.","rect":[108.27056121826172,624.6231689453125,508.58257579803469,615.5150146484375]},{"page":467,"text":"TM 3-34.85/MCRP 3-17A. Engineer Field Data. 17 October 2013. ","rect":[108.27054595947266,639.1421508789063,380.2343702316284,630.0339965820313]},{"page":467,"text":"PRESCRIBED FORMS","rect":[90.0,662.5496826171875,234.21207347106935,652.87548828125]},{"page":467,"text":"None.","rect":[108.0,677.6502685546875,132.22535228729249,670.8867797851563]},{"page":467,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.47000341796875,747.510009765625]},{"page":467,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":467,"text":"References-3","rect":[465.4739990234375,754.1790161132813,521.9409506835938,747.5280151367188]},{"page":468,"text":"References","rect":[72.0,44.55902099609375,120.49290686035157,37.90802001953125]},{"page":468,"text":"REFERENCED FORMS","rect":[72.0,94.04972839355469,222.39124217224123,84.37556457519531]},{"page":468,"text":"Unless otherwise indicated, DA Forms are available on the Army Publishing Directorate website:","rect":[90.0,111.17425537109375,480.2019724807739,102.06607818603516]},{"page":468,"text":"https://armypubs.army.mil.","rect":[126.00186157226563,122.697265625,234.64873790740968,113.5890884399414]},{"page":468,"text":"DA Form 2028. Recommended Changes to Publications and Blank Forms.","rect":[90.0,137.21429443359376,389.75832653045657,128.10610961914063]},{"page":468,"text":"References-4","rect":[72.1199951171875,754.1790161132813,128.58690863037109,747.5280151367188]},{"page":468,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76101904296879,747.6090087890625]},{"page":468,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.79602270507817,747.510009765625]},{"page":469,"text":"A","rect":[155.39999389648438,218.5799560546875,162.63443422698976,211.4056396484375]},{"page":469,"text":"actions following a linkup, 12-30","rect":[90.0,233.96095275878907,217.52101354980469,225.5279541015625]},{"page":469,"text":"actions on contact, choose an","rect":[90.0,245.56195068359376,209.0321982421875,239.01895141601563]},{"page":469,"text":"action, 1-78–1-82","rect":[100.08000183105469,256.0,170.11799841308594,249.31495666503907]},{"page":469,"text":"develop the situation, 1-76–","rect":[102.95100402832031,267.9449768066406,213.49800329589844,259.69195556640627]},{"page":469,"text":"1-77","rect":[113.03099822998047,276.4859619140625,130.98599462890625,270.01495361328127]},{"page":469,"text":"execute and report, 1-83","rect":[102.95100402832031,288.64495849609377,200.92140417480469,280.3919372558594]},{"page":469,"text":"purpose and defined, 1-69–","rect":[102.95100402832031,298.96795654296877,213.01199560546875,290.6339416503906]},{"page":469,"text":"1-73","rect":[113.03099822998047,307.67095947265627,130.98599462890625,301.0919494628906]},{"page":469,"text":"react, 1-74–1-75","rect":[102.95100402832031,318.0,168.9659903564453,311.4149475097656]},{"page":469,"text":"advance guard, security","rect":[89.99100494384766,333.14996337890627,185.50259399414063,324.824951171875]},{"page":469,"text":"operations, 13-80–13-86","rect":[100.07100677490235,343.37396240234377,198.12599401855469,335.1209411621094]},{"page":469,"text":"see also guard","rect":[102.95100402832031,353.8499755859375,161.94960241699219,345.52496337890627]},{"page":469,"text":"advantages of, box formation,","rect":[89.99099731445313,367.1699523925781,208.43728747558596,358.7369384765625]},{"page":469,"text":"2-15","rect":[100.07099914550781,375.76495361328127,118.0259955444336,369.1949462890625]},{"page":469,"text":"column formation, 2-3","rect":[102.95100402832031,386.0969543457031,189.9495108642578,379.43695068359377]},{"page":469,"text":"diamond formation, 2-13","rect":[102.95100402832031,396.4739685058594,200.38231115722656,389.81396484375]},{"page":469,"text":"echelon formation, 2-9","rect":[102.95100402832031,406.7879638671875,192.40562658691406,400.136962890625]},{"page":469,"text":"line formation, 2-5","rect":[102.95100402832031,417.1109619140625,174.95192175292969,410.4599609375]},{"page":469,"text":"movement formation, 2-2","rect":[102.95100402832031,427.4879455566406,202.90770178222656,420.8369445800781]},{"page":469,"text":"vee formation, 2-11","rect":[102.95100402832031,437.8109130859375,180.41133337402344,431.159912109375]},{"page":469,"text":"wedge formation, 2-7","rect":[102.95100402832031,449.9699401855469,187.43040686035156,441.53692626953127]},{"page":469,"text":"air and missile defense in the","rect":[89.99100494384766,461.5079345703125,206.456392578125,454.85693359375]},{"page":469,"text":"defense, 8-117–8-118","rect":[100.07099914550781,472.0,188.10090856933594,465.23394775390627]},{"page":469,"text":"see also protection warfighting","rect":[102.94200134277344,483.98992919921877,224.4411337890625,475.5569152832031]},{"page":469,"text":"function","rect":[113.02200317382813,492.5849304199219,144.47700720214844,485.9339294433594]},{"page":469,"text":"air troop movement, defined,","rect":[89.98199462890625,507.5879211425781,204.47097888183596,499.25390625]},{"page":469,"text":"14-13","rect":[100.06199645996094,516.2908935546875,123.05699377441407,509.7119140625]},{"page":469,"text":"ambush, executing, 5-120–5-123","rect":[89.98199462890625,531.3839111328125,221.51790075683594,523.0319213867188]},{"page":469,"text":"organization of forces, 5-107","rect":[102.94200134277344,541.7609252929688,216.92878942871094,533.3279418945313]},{"page":469,"text":"planning, 5-108–5-115","rect":[102.94200134277344,552.0838623046875,192.95099096679687,543.7318725585938]},{"page":469,"text":"preparing, 5-116–5-119","rect":[102.93299102783203,562.4609375,196.910982421875,554.1089477539063]},{"page":469,"text":"purpose and defined, 5-102–","rect":[102.93299102783203,572.6849365234375,217.9718955078125,564.3509521484375]},{"page":469,"text":"5-106","rect":[113.01299285888672,581.37890625,136.00799780273437,574.8088989257813]},{"page":469,"text":"see also attack","rect":[102.93299102783203,591.701904296875,162.927001953125,585.158935546875]},{"page":469,"text":"approach march, 14-5–14-7","rect":[89.97299194335938,606.7678833007813,200.9969962158203,598.514892578125]},{"page":469,"text":"organization of forces, 14-17–","rect":[102.93299102783203,617.1898803710938,221.993990234375,608.7568969726563]},{"page":469,"text":"14-19","rect":[113.01299285888672,625.784912109375,136.0079825439453,619.2149047851563]},{"page":469,"text":"area defense, common control","rect":[89.97299194335938,639.1048583984375,211.45497021484375,632.453857421875]},{"page":469,"text":"measures, 9-15–9-17","rect":[100.05299377441406,649.48193359375,185.57100134277344,642.9119262695313]},{"page":469,"text":"executing, 9-49–9-53","rect":[102.92398834228516,661.5868530273438,187.41600256347656,653.23486328125]},{"page":469,"text":"organization of forces, 9-4–","rect":[102.91498565673828,671.9638671875,211.9598868408203,663.5308837890625]},{"page":469,"text":"9-14","rect":[112.99498748779297,680.5048828125,130.94998388671875,673.9348754882813]},{"page":469,"text":"planning, 9-18–9-39","rect":[102.91498565673828,692.663818359375,182.9708731689453,684.3118286132813]},{"page":469,"text":"preparing, 9-40–9-48","rect":[102.9059829711914,702.98681640625,186.92097692871094,694.6348266601563]},{"page":469,"text":"01 May 2023","rect":[90.11700439453125,755.9639892578125,142.43191748046875,747.5130004882813]},{"page":469,"text":"Index","rect":[294.05999755859377,142.6762237548828,335.8465733795166,131.02967834472657]},{"page":469,"text":"Entries are by paragraph number.","rect":[241.86000061035157,180.50071716308595,388.13007068634036,170.5198974609375]},{"page":469,"text":"purpose and defined, 8-8, 9-1–","rect":[258.9029846191406,213.4048614501953,381.98788671875,205.07086181640626]},{"page":469,"text":"9-3, 9-55","rect":[268.98297119140627,222.05386352539063,304.92898779296879,215.47486877441407]},{"page":469,"text":"see also defense of a linear","rect":[258.9029846191406,232.421875,368.91991259765629,225.7708740234375]},{"page":469,"text":"obstacle, perimeter defense,","rect":[268.98297119140627,244.42787170410157,382.4459697265625,236.0938720703125]},{"page":469,"text":"reverse slope defense","rect":[268.98297119140627,254.8048858642578,357.47818212890629,246.47088623046876]},{"page":469,"text":"area security, activities, 13-132","rect":[245.9429931640625,268.2239074707031,369.98098974609379,259.87188720703127]},{"page":469,"text":"purpose and defined, 13-125–","rect":[258.8940124511719,278.5018615722656,378.9810202636719,270.1678466796875]},{"page":469,"text":"13-131","rect":[268.9739990234375,287.1508483886719,296.9459860839844,280.57183837890627]},{"page":469,"text":"in the defense, 8-127–8-131","rect":[258.8940124511719,297.4738464355469,371.4030173339844,290.8138427734375]},{"page":469,"text":"attack, control measures, 5-8–","rect":[245.9250030517578,311.0,366.966890625,304.2778625488281]},{"page":469,"text":"5-10","rect":[256.0050048828125,321.1708679199219,273.95999365234379,314.6008605957031]},{"page":469,"text":"executing, 5-47–5-100","rect":[258.885009765625,333.3298645019531,348.35400610351567,324.97784423828127]},{"page":469,"text":"organization of forces, 5-2–5-7","rect":[258.8760070800781,343.6528625488281,380.934908203125,335.2198486328125]},{"page":469,"text":"planning, 5-11–5-31","rect":[258.86700439453127,354.0298767089844,338.9229147949219,345.6778564453125]},{"page":469,"text":"preparing, 5-32–5-46","rect":[258.9570007324219,364.3438720703125,342.972017578125,355.9918518066406]},{"page":469,"text":"purpose and defined, 3-4, 5-1,","rect":[258.947998046875,374.6218566894531,379.4889079589844,366.2850036621094]},{"page":469,"text":"5-11–5-12","rect":[269.031005859375,383.2590026855469,310.02600317382817,376.6889953613281]},{"page":469,"text":"see also ambush,","rect":[258.9419860839844,393.635986328125,329.4776774902344,387.0929870605469]},{"page":469,"text":"counterattack, offense, raid,","rect":[269.0220031738281,404.0,379.9676982421875,397.3079833984375]},{"page":469,"text":"spoiling attack","rect":[269.0220031738281,416.1180114746094,326.00732421875,407.7929992675781]},{"page":469,"text":"attack by fire, B-3–B-4","rect":[245.98199462890626,429.4380187988281,334.9829733886719,421.0050048828125]},{"page":469,"text":"augmentation to a security force,","rect":[245.98199462890626,442.8210144042969,376.4810954589844,434.38800048828127]},{"page":469,"text":"13-28–13-29","rect":[256.0619812011719,451.3710021972656,307.07400732421879,444.7919921875]},{"page":469,"text":"B","rect":[311.3999938964844,468.6000061035156,318.63443422698978,461.4256896972656]},{"page":469,"text":"battle drill, purpose and overview,","rect":[246.0,483.88201904296877,379.98118701171878,475.656005859375]},{"page":469,"text":"1-43–1-44","rect":[256.0799865722656,492.58502197265627,297.0750144042969,486.0060119628906]},{"page":469,"text":"battle handover, 1-45","rect":[245.99099731445313,506.0,331.00772314453129,499.32598876953127]},{"page":469,"text":"block, B-5–B-6,","rect":[245.99099731445313,519.2789916992188,307.533005859375,512.708984375]},{"page":469,"text":"bounding overwatch, movement","rect":[245.99099731445313,534.3809814453125,373.48948779296878,526.0560302734375]},{"page":469,"text":"technique, 2-20–2-24","rect":[256.07098388671877,544.6589965820313,341.1029990234375,536.406005859375]},{"page":469,"text":"box formation, 2-15–2-16","rect":[245.98199462890626,556.2960205078125,346.49402075195317,549.64501953125]},{"page":469,"text":"advantages and disadvantages","rect":[258.9330139160156,568.4549560546875,383.4570007324219,560.1300048828125]},{"page":469,"text":"of, 2-15–2-16","rect":[269.01300048828127,577.0,322.49099951171879,570.344970703125]},{"page":469,"text":"breach, control measures, 18-12–","rect":[245.96400451660157,590.3790283203125,380.44198828125,583.8090209960938]},{"page":469,"text":"18-16","rect":[256.04400634765627,600.7020263671875,279.0390036621094,594.1320190429688]},{"page":469,"text":"covert breach, 18-21","rect":[258.9239807128906,611.0789794921875,341.4207175292969,604.5089721679688]},{"page":469,"text":"deliberate breach, 18-18","rect":[258.9239807128906,621.4019775390625,356.41198950195317,614.8319702148438]},{"page":469,"text":"executing, 18-38–18-39","rect":[258.9239807128906,633.5609741210938,353.44201879882817,625.208984375]},{"page":469,"text":"fundamentals, 18-23–18-31","rect":[258.9239807128906,642.1109619140625,368.9760153808594,635.4509887695313]},{"page":469,"text":"hasty breach, 18-19–18-20","rect":[258.9150085449219,654.260986328125,366.44702368164067,645.9089965820313]},{"page":469,"text":"organization of forces, 18-32","rect":[258.906005859375,664.583984375,372.89187841796879,656.1510009765625]},{"page":469,"text":"planning, 18-33–18-37","rect":[258.906005859375,674.9609985351563,348.9150107421875,666.6090087890625]},{"page":469,"text":"purpose and defined, 18-9–","rect":[258.8970031738281,685.1849975585938,368.95889501953129,676.8510131835938]},{"page":469,"text":"18-11, B-7–B-8","rect":[268.97698974609377,694.0,329.9610007324219,687.3090209960938]},{"page":469,"text":"tenets, 18-22","rect":[258.8970031738281,704.2019653320313,311.4030173339844,697.6319580078125]},{"page":469,"text":"bypass, B-9–B-14,","rect":[245.93699645996095,719.366943359375,319.89000048828128,711.0149536132813]},{"page":469,"text":"FM 3-90","rect":[289.2510070800781,754.1909790039063,322.7489951171875,747.6119995117188]},{"page":470,"text":"Index","rect":[72.0,44.55902099609375,95.54400091552735,38.016021728515628]},{"page":470,"text":"focus, 13-19","rect":[84.96299743652344,91.18502807617188,134.40989904785156,84.52496337890625]},{"page":470,"text":"security force size, 13-23","rect":[84.96299743652344,103.33503723144531,185.0070059814453,94.90203857421875]},{"page":470,"text":"consolidate, 1-123–1-124","rect":[72.00299835205078,115.0,173.53290014648437,108.30304718017578]},{"page":470,"text":"contain, B-19","rect":[71.99400329589844,128.25604248046876,124.99500494384766,121.68604278564453]},{"page":470,"text":"control, B-20","rect":[72.00300598144531,141.5760498046875,122.96100073242188,135.0060577392578]},{"page":470,"text":"control measures , digital and","rect":[72.00300598144531,156.7410430908203,189.47729711914062,148.41604614257813]},{"page":470,"text":"analogue control measures,","rect":[82.0830078125,167.06410217285157,193.03138842773439,158.73910522460938]},{"page":470,"text":"1-51–1-52","rect":[82.0830078125,175.65911865234376,123.0779974975586,169.08912658691407]},{"page":470,"text":"for a frontal attack, 2-30","rect":[84.9540023803711,186.0,179.92921667480469,179.33111572265626]},{"page":470,"text":"for a penetration, 2-42–2-43","rect":[84.9540023803711,198.0420684814453,196.50990515136719,189.70806884765626]},{"page":470,"text":"for a turning movement, 2-74","rect":[84.94499969482422,208.4640655517578,200.43390112304687,200.03106689453126]},{"page":470,"text":"for air coordination, A-102–","rect":[84.94499969482422,217.05908203125,193.44900732421875,210.4080810546875]},{"page":470,"text":"A-112","rect":[95.02500915527344,227.2830810546875,118.98301153564454,220.8120880126953]},{"page":470,"text":"for an envelopment, 2-64","rect":[84.94500732421875,239.4420928955078,184.96022253417969,231.10809326171876]},{"page":470,"text":"for an infiltration, 2-89","rect":[84.94500732421875,248.08203125,171.9435294189453,241.4310302734375]},{"page":470,"text":"for defensive operations,","rect":[84.94500732421875,260.1420593261719,183.41401782226564,251.80804443359376]},{"page":470,"text":"A-62–A-79","rect":[95.02500915527344,268.78204345703127,138.0090048828125,262.2120361328125]},{"page":470,"text":"for direct fire, A-80–A-88","rect":[84.94500732421875,279.1590576171875,182.94600134277344,272.508056640625]},{"page":470,"text":"for fire support, A-89–A-101","rect":[84.94499969482422,291.1650390625,195.95999365234375,282.8310241699219]},{"page":470,"text":"for movement and maneuver,","rect":[84.93598937988281,300.0,202.42646899414064,293.2080383300781]},{"page":470,"text":"A-5–A-42","rect":[95.0159912109375,310.1820068359375,133.01399450683594,303.61199951171877]},{"page":470,"text":"for offensive operations, A-43–","rect":[84.92699432373047,322.1880187988281,207.4709952392578,313.85400390625]},{"page":470,"text":"A-61","rect":[95.00699615478516,330.88201904296877,113.98799353027344,324.31201171875]},{"page":470,"text":"general considerations, A-1–","rect":[84.92699432373047,342.9870300292969,199.4969962158203,334.635009765625]},{"page":470,"text":"A-4","rect":[95.0159912109375,351.4830017089844,109.0199912109375,345.03900146484377]},{"page":470,"text":"graphic control measures,","rect":[84.93598937988281,363.68701171875,188.39100756835939,355.36199951171877]},{"page":470,"text":"1-49–1-50","rect":[95.0159912109375,372.2820129394531,136.01098852539062,365.7120056152344]},{"page":470,"text":"purpose and overview, 1-46–","rect":[84.92699432373047,384.2879943847656,200.92798071289062,376.03497314453127]},{"page":470,"text":"1-48","rect":[95.00698852539063,392.98199462890627,112.96198492431641,386.4119873046875]},{"page":470,"text":"for a delay, 11-26–11-28","rect":[84.92698669433594,405.0870056152344,182.9819815673828,396.65399169921877]},{"page":470,"text":"for a mobile defense, 10-11–","rect":[84.9269790649414,413.6819763183594,199.43399267578125,407.0309753417969]},{"page":470,"text":"10-12","rect":[95.00698852539063,424.0049743652344,118.00199346923829,417.4349670410156]},{"page":470,"text":"for a passage of lines, 16-9–","rect":[84.92698669433594,436.16400146484377,198.4718955078125,427.7309875488281]},{"page":470,"text":"16-12","rect":[95.00698852539063,444.7049865722656,118.00199346923829,438.1349792480469]},{"page":470,"text":"for a perimeter defense, 9-72","rect":[84.92698669433594,456.7649841308594,200.8901846923828,448.43096923828127]},{"page":470,"text":"for a relief in place, 15-7","rect":[84.92698669433594,467.0879821777344,181.40248327636719,458.75396728515627]},{"page":470,"text":"for a retirement, 11-102","rect":[84.92698669433594,475.7819519042969,178.8798087158203,469.1309509277344]},{"page":470,"text":"for a reverse slop defense, 9-","rect":[84.92698669433594,487.7879638671875,201.91797473144534,479.4539489746094]},{"page":470,"text":"110","rect":[94.99799346923828,496.4819641113281,109.95599584960938,489.9119567871094]},{"page":470,"text":"for a screen operation, 13-62","rect":[84.9179916381836,508.48797607421877,200.4698966064453,500.1539611816406]},{"page":470,"text":"for a troop movement, 14-31–","rect":[84.9179916381836,518.8649291992188,203.43899755859375,510.53094482421877]},{"page":470,"text":"14-35","rect":[94.99800109863281,527.513916015625,117.99300604248048,520.9349365234375]},{"page":470,"text":"for an area defense, 9-15–9-17","rect":[84.91799926757813,538.0,209.01899938964844,531.23095703125]},{"page":470,"text":"for guard operations, 13-78–","rect":[84.91801452636719,549.9869384765625,198.4620078125,541.553955078125]},{"page":470,"text":"13-79","rect":[94.99800872802735,558.5909423828125,117.99300604248048,552.011962890625]},{"page":470,"text":"cordon and search, control","rect":[71.9580078125,572.0,178.44688305664062,565.3590087890625]},{"page":470,"text":"measures, 4-73","rect":[82.03800964355469,582.2879028320313,144.56370764160156,575.7089233398438]},{"page":470,"text":"executing, 4-79–4-82","rect":[84.91801452636719,594.3839111328125,169.41002111816406,586.0319213867188]},{"page":470,"text":"guiding principles, 4-71","rect":[84.90901184082031,604.7609252929688,177.4236319580078,596.408935546875]},{"page":470,"text":"methods, 4-72","rect":[84.90901184082031,613.3019409179688,142.3947012939453,606.73193359375]},{"page":470,"text":"planning and preparing, 4-74–","rect":[84.90901184082031,625.4609375,204.93301611328125,617.135986328125]},{"page":470,"text":"4-78","rect":[94.98899841308594,634.001953125,112.94399481201173,627.4319458007813]},{"page":470,"text":"purpose and defined, 4-64–","rect":[84.90899658203125,646.0618896484375,194.97000341796875,637.7279052734375]},{"page":470,"text":"4-70","rect":[94.98899841308594,654.701904296875,112.94399481201173,648.1318969726563]},{"page":470,"text":"transitions considerations,","rect":[84.90899658203125,665.0789184570313,188.845505859375,658.535888671875]},{"page":470,"text":"4-83–4-86","rect":[94.98899841308594,675.4109497070313,135.98399572753906,668.8319702148438]},{"page":470,"text":"see also movement to contact","rect":[84.9000015258789,685.7249755859375,204.44070544433596,679.1820068359375]},{"page":470,"text":"counterattack, executing, 5-140–","rect":[71.94000244140625,700.889892578125,202.419283203125,692.5379028320313]},{"page":470,"text":"5-141","rect":[82.0199966430664,709.430908203125,105.01500158691407,702.8609008789063]},{"page":470,"text":"Index-2","rect":[72.1199951171875,754.1790161132813,103.63799505615235,747.6090087890625]},{"page":470,"text":"Entries are by paragraph number.","rect":[225.0,70.70100402832031,368.95677294921878,62.376007080078128]},{"page":470,"text":"major and local, 5-127–5-129,","rect":[240.89700317382813,92.97602844238281,360.390916015625,84.62403106689453]},{"page":470,"text":"5-131–5-132, 5-140–5-141","rect":[250.9770050048828,101.57998657226563,357.9609091796875,95.00098419189453]},{"page":470,"text":"organization of forces, 5-128–","rect":[240.88800048828126,113.67604064941406,359.94900732421879,105.2430419921875]},{"page":470,"text":"5-130","rect":[250.968017578125,122.28005981445313,273.96301489257817,115.70105743408203]},{"page":470,"text":"planning, 5-131–5-136","rect":[240.88800048828126,134.3760528564453,330.89700537109379,126.02405548095703]},{"page":470,"text":"preparing, 5-137–5-139","rect":[240.95997619628907,144.7440948486328,334.93799047851567,136.39210510253907]},{"page":470,"text":"purpose and defined, 5-124–","rect":[240.95997619628907,154.9680938720703,355.96292333984379,146.63104248046876]},{"page":470,"text":"5-127","rect":[251.0399932861328,163.6590576171875,274.0349753417969,157.0890655517578]},{"page":470,"text":"see also attack operations","rect":[240.95999145507813,175.66505432128907,345.45452880859377,167.43905639648438]},{"page":470,"text":"countermobility in the defense,","rect":[227.99998474121095,189.1470489501953,350.0462810058594,180.71405029296876]},{"page":470,"text":"8-67–8-74","rect":[238.07998657226563,197.68804931640626,279.07498388671879,191.11805725097657]},{"page":470,"text":"countermobility operations, and","rect":[227.99098205566407,212.85304260253907,353.03698950195317,204.52804565429688]},{"page":470,"text":"obstacles, 17-18–17-68","rect":[238.07098388671876,221.39404296875,332.0399802246094,214.8240509033203]},{"page":470,"text":"and terrain, 17-8–17-17","rect":[240.9419708251953,231.77105712890626,334.910982421875,225.20106506347657]},{"page":470,"text":"purpose and defined, 17-1–","rect":[240.9329833984375,243.7770538330078,350.99487524414067,235.44305419921876]},{"page":470,"text":"17-7","rect":[251.0129852294922,252.3720703125,268.9679892578125,245.9010772705078]},{"page":470,"text":"counterreconnaissance, B-21–","rect":[227.9729766845703,265.79107666015627,350.0399802246094,259.2210693359375]},{"page":470,"text":"B-22","rect":[238.052978515625,276.06903076171877,257.03398352050785,269.5980224609375]},{"page":470,"text":"cover, defensive cover, 13-117–","rect":[227.9729766845703,289.4970397949219,356.03396826171879,282.8370361328125]},{"page":470,"text":"13-122","rect":[238.052978515625,299.8740539550781,266.02499609375,293.2950439453125]},{"page":470,"text":"flank cover, 13-115–13-116","rect":[240.9329833984375,310.1970520019531,350.45398168945317,303.53704833984377]},{"page":470,"text":"offensive cover, 13-108–","rect":[240.9329833984375,320.5200500488281,339.47400122070317,313.86004638671877]},{"page":470,"text":"13-114","rect":[251.01300048828126,330.89703369140627,278.98498754882817,324.3180236816406]},{"page":470,"text":"organization of forces, 13-103–","rect":[240.93299865722657,342.9930419921875,365.0339987792969,334.5600280761719]},{"page":470,"text":"13-107","rect":[251.0129852294922,351.5970153808594,278.9859030761719,345.01800537109377]},{"page":470,"text":"purpose and defined, 13-99–","rect":[240.9329833984375,363.5940246582031,355.97998266601567,355.260009765625]},{"page":470,"text":"13-102","rect":[251.0129852294922,372.2970275878906,278.98498754882817,365.718017578125]},{"page":470,"text":"rear cover, 13-123–13-124","rect":[240.9329833984375,382.6200256347656,347.44800024414067,376.041015625]},{"page":470,"text":"covert breach, 18-21","rect":[227.97299194335938,396.0,310.46972875976567,389.42401123046877]},{"page":470,"text":"covert gap crossing, 18-60–18-61","rect":[227.97299194335938,411.09600830078127,361.96499853515629,402.7439880371094]},{"page":470,"text":"criteria for ending a security","rect":[227.97300720214845,424.47900390625,338.46240234375,416.0459899902344]},{"page":470,"text":"mission, 13-27","rect":[238.05300903320313,433.0290222167969,296.5079978027344,426.45001220703127]},{"page":470,"text":"D","rect":[293.3999938964844,450.239990234375,300.63443422698978,443.065673828125]},{"page":470,"text":"daylight operations, 1-101","rect":[228.0,465.6210021972656,331.4891989746094,457.26898193359377]},{"page":470,"text":"deception, purpose and defined,","rect":[228.0,478.9049987792969,356.52085986328128,470.57098388671877]},{"page":470,"text":"19-1–19-11","rect":[238.0800018310547,487.54498291015627,284.0609763183594,480.9749755859375]},{"page":470,"text":"see tactical deception","rect":[240.9600067138672,499.6050109863281,327.5039694824219,491.3789978027344]},{"page":470,"text":"defense of a linear obstacle, 9-55,","rect":[228.00900268554688,511.2419738769531,363.5219890136719,504.5909729003906]},{"page":470,"text":"9-56–9-58","rect":[238.0889892578125,521.6190185546875,279.08398657226567,515.0490112304688]},{"page":470,"text":"defense planning, and civil","rect":[228.0,536.720947265625,333.99751171875,528.2879638671875]},{"page":470,"text":"stability, 8-47","rect":[238.0800018310547,547.0979614257813,291.0809958496094,538.7459716796875]},{"page":470,"text":"and risk management, 8-131–","rect":[240.95999145507813,557.4209594726563,360.50699072265629,549.0689697265625]},{"page":470,"text":"8-133","rect":[251.0399932861328,566.0249633789063,274.035005859375,559.4459838867188]},{"page":470,"text":"and transitions, 8-134","rect":[240.95999145507813,576.3479614257813,327.41491918945317,569.7689819335938]},{"page":470,"text":"purpose and defined, 8-14–","rect":[240.95999145507813,588.3989868164063,351.02099829101567,580.0650024414063]},{"page":470,"text":"8-19","rect":[251.0399932861328,597.0390014648438,268.99499731445317,590.468994140625]},{"page":470,"text":"to achieve denial, 8-28–8-37","rect":[240.95999145507813,607.4249877929688,354.49499731445317,600.8460083007813]},{"page":470,"text":"via command and control,","rect":[240.95098876953126,617.739013671875,343.9308024902344,611.196044921875]},{"page":470,"text":"8-20–8-27","rect":[251.03099060058595,628.115966796875,292.02600317382817,621.5459594726563]},{"page":470,"text":"via fires, 8-86–8-95","rect":[240.94198608398438,638.43896484375,317.9369833984375,631.7879638671875]},{"page":470,"text":"via intelligence, 8-82–8-85","rect":[240.94198608398438,650.5979614257813,345.962984375,642.2459716796875]},{"page":470,"text":"via movement and maneuver,","rect":[240.94198608398438,659.1389770507813,359.3900615234375,652.595947265625]},{"page":470,"text":"8-48–8-71","rect":[251.02198791503907,669.5159912109375,292.01700048828129,662.9459838867188]},{"page":470,"text":"via protection, 8-105–133","rect":[240.9329833984375,681.52197265625,342.41699438476567,673.2689819335938]},{"page":470,"text":"via stay behind operations,","rect":[240.93299865722657,691.9979248046875,347.92588916015628,683.6729736328125]},{"page":470,"text":"8-38–8-46","rect":[251.01300048828126,700.5479125976563,292.0079978027344,693.9689331054688]},{"page":470,"text":"via sustainment, 8-96–8-104","rect":[240.9239959716797,711.0,354.39599829101567,704.345947265625]},{"page":470,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76098852539067,747.6090087890625]},{"page":470,"text":"see area defense, movement","rect":[396.9209899902344,91.1759033203125,513.3981181640625,84.52490234375]},{"page":470,"text":"and maneuver in the","rect":[407.0009765625,101.552978515625,489.021578125,95.00997924804688]},{"page":470,"text":"defense, protection in the","rect":[407.0009765625,113.55897521972656,507.9719870605469,105.2249755859375]},{"page":470,"text":"defense","rect":[407.0009765625,122.2529296875,438.9923728027344,115.6019287109375]},{"page":470,"text":"defensive cover, 13-117–13-122","rect":[383.96099853515627,135.58193969726563,513.0300009765625,128.92193603515626]},{"page":470,"text":"defensive operations, CCIR, 8-24","rect":[383.9519958496094,150.63893127441407,516.9899924316407,142.304931640625]},{"page":470,"text":"characteristics, 8-6","rect":[396.9119873046875,159.2789306640625,472.41299658203129,152.7089385986328]},{"page":470,"text":"common control measures,","rect":[396.9119873046875,169.6558837890625,505.3475810546875,163.11288452148438]},{"page":470,"text":"8-12–8-13","rect":[406.99200439453127,179.98788452148438,447.9870017089844,173.4088897705078]},{"page":470,"text":"purpose and defined, 1-22,","rect":[396.9029846191406,192.0388946533203,504.36570849609378,183.70489501953126]},{"page":470,"text":"8-1–8-11","rect":[406.98297119140627,200.67889404296876,442.9379599609375,194.10890197753907]},{"page":470,"text":"types, 8-7–8-11","rect":[396.9029846191406,212.83790588378907,459.44400244140629,204.4859161376953]},{"page":470,"text":"types planning symbols, 8-7","rect":[396.89398193359377,223.16090393066407,508.36889868164067,214.8089141845703]},{"page":470,"text":"see also defense planning","rect":[396.89398193359377,233.53785705566407,501.41638403320317,225.1048583984375]},{"page":470,"text":"delay, characteristics of, 11-35–","rect":[383.9339599609375,246.85792541503907,510.9870017089844,238.4249267578125]},{"page":470,"text":"11-37","rect":[394.0229797363281,255.46188354492188,417.0180075683594,248.8828887939453]},{"page":470,"text":"control measures, 11-26–","rect":[396.95697021484377,265.77587890625,498.98098974609379,259.20587158203127]},{"page":470,"text":"11-28","rect":[407.0369873046875,276.156005859375,430.035005859375,269.5828857421875]},{"page":470,"text":"executing, 11-55–11-69","rect":[396.9599914550781,288.2610168457031,491.4779990234375,279.90899658203127]},{"page":470,"text":"organization of forces, 11-21–","rect":[396.9599914550781,298.63800048828127,516.0209982910157,290.2049865722656]},{"page":470,"text":"11-25","rect":[407.03997802734377,307.1789855957031,430.035005859375,300.6089782714844]},{"page":470,"text":"purpose and defined, 11-12–","rect":[396.9599914550781,319.18499755859377,512.0069907226563,310.8509826660156]},{"page":470,"text":"11-20","rect":[407.03997802734377,327.8789978027344,430.035005859375,321.3089904785156]},{"page":470,"text":"see also retrograde,","rect":[396.9599914550781,339.9840087890625,476.89708056640628,331.65899658203127]},{"page":470,"text":"terminating, 11-70","rect":[396.9599914550781,350.3609924316406,469.45498876953129,342.00897216796877]},{"page":470,"text":"see planning and preparing a","rect":[396.9599914550781,360.6839904785156,513.4758017578125,352.3589782714844]},{"page":470,"text":"delay, preparing a delay","rect":[407.03997802734377,371.0610046386719,503.006103515625,362.7359924316406]},{"page":470,"text":"deliberate breach, 18-18","rect":[384.0,382.5989990234375,481.4880087890625,376.02899169921877]},{"page":470,"text":"deliberate gap crossing, 18-44–","rect":[384.0,397.7640075683594,510.02697973632817,389.4119873046875]},{"page":470,"text":"18-47","rect":[394.0799865722656,406.30499267578127,417.07498388671879,399.7349853515625]},{"page":470,"text":"deliberate operations, defined and","rect":[383.9999694824219,421.3710021972656,519.994478515625,413.0369873046875]},{"page":470,"text":"described, 1-30–1-31","rect":[394.0799865722656,430.0199890136719,479.057955078125,423.44097900390627]},{"page":470,"text":"demonstration, purpose and","rect":[383.990966796875,445.0769958496094,495.9977438964844,436.8509826660156]},{"page":470,"text":"defined, 19-45–19-50","rect":[394.07098388671877,453.71697998046877,479.5889609375,447.06597900390627]},{"page":470,"text":"see also tactical means","rect":[396.94195556640627,464.093994140625,490.4114685058594,457.5509948730469]},{"page":470,"text":"denial, principles of, 8-28","rect":[383.9819641113281,479.09698486328127,483.99356298828129,470.7629699707031]},{"page":470,"text":"destroy, B-23","rect":[383.9819641113281,492.5789794921875,437.45996313476567,484.2269592285156]},{"page":470,"text":"detention facilities in the defense,","rect":[383.9819641113281,504.116943359375,517.0010234375,497.4659423828125]},{"page":470,"text":"8-125–8-126","rect":[394.0619812011719,514.4939575195313,445.07397680664067,507.9239501953125]},{"page":470,"text":"diamond formation, 2-13–2-14","rect":[383.97296142578127,527.8229370117188,504.46496801757817,521.1629638671875]},{"page":470,"text":"direct fires, employment of,","rect":[383.9639587402344,542.9789428710938,491.9801494140625,534.5459594726563]},{"page":470,"text":"1-111–1-112","rect":[394.0439758300781,551.4209594726563,445.0559714355469,544.949951171875]},{"page":470,"text":"planning principles, 1-113–","rect":[396.91497802734377,563.678955078125,504.45596533203129,555.3269653320313]},{"page":470,"text":"1-22","rect":[406.9949645996094,572.1209716796875,424.94995336914067,565.6499633789063]},{"page":470,"text":"disadvantages of, box formation,","rect":[383.9549865722656,587.3849487304688,513.9158793945312,578.9519653320313]},{"page":470,"text":"2-16","rect":[394.03497314453127,595.9259033203125,411.9899619140625,589.3558959960938]},{"page":470,"text":"column formation, 2-4","rect":[396.91497802734377,606.302978515625,483.91259985351567,599.6519775390625]},{"page":470,"text":"diamond formation, 2-14","rect":[396.91497802734377,616.6259765625,494.34536962890629,609.9749755859375]},{"page":470,"text":"echelon formation, 2-10","rect":[396.91497802734377,627.0029296875,491.4096091308594,620.3519287109375]},{"page":470,"text":"line formation, 2-6","rect":[396.91497802734377,637.325927734375,468.91589575195317,630.6749267578125]},{"page":470,"text":"movement formation, 2-2","rect":[396.91497802734377,647.7029418945313,496.87167578125,641.0519409179688]},{"page":470,"text":"vee formation, 2-12","rect":[396.91497802734377,658.0259399414063,474.37527685546879,651.3749389648438]},{"page":470,"text":"wedge formation, 2-8","rect":[396.91497802734377,670.1849365234375,481.39441137695317,661.751953125]},{"page":470,"text":"disengage, B-24–B-28","rect":[383.9549865722656,683.5048828125,473.49597387695317,675.1528930664063]},{"page":470,"text":"dismounted troop movement,","rect":[383.9999694824219,696.7619018554688,500.46897998046878,688.535888671875]},{"page":470,"text":"defined, 14-11","rect":[394.0799865722656,705.4019775390625,451.5809958496094,698.7509155273438]},{"page":470,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.79602270507817,747.510009765625]},{"page":471,"text":"disrupt, B-29–B-31,","rect":[89.9939956665039,92.85902404785156,167.49298205566408,84.60602569580078]},{"page":471,"text":"disrupt the enemy in the defense,","rect":[90.00298309326172,106.34101867675781,222.96714892578127,97.90802001953125]},{"page":471,"text":"8-58","rect":[100.0829849243164,114.88201904296875,118.03798132324219,108.31201934814453]},{"page":471,"text":"E","rect":[155.63999938964845,132.1199951171875,162.3233396949768,124.94567108154297]},{"page":471,"text":"echelon formation, 2-9–2-10","rect":[90.0,145.718994140625,202.51800756835937,139.0679931640625]},{"page":471,"text":"encirclement, control measures,","rect":[89.99100494384766,159.10198974609376,217.51829638671877,152.55899047851563]},{"page":471,"text":"C-8–C-9","rect":[100.07100677490235,169.42498779296876,134.05501013183594,162.77398681640626]},{"page":471,"text":"defending encircled, C-28–","rect":[102.95100402832031,181.58399963378907,210.50099401855469,173.1510009765625]},{"page":471,"text":"C-32","rect":[113.03999328613281,190.13400268554688,132.4979956665039,183.4739990234375]},{"page":471,"text":"executing, C-14–C-18","rect":[102.95999145507813,202.2840118408203,190.45799475097656,193.85101318359376]},{"page":471,"text":"organization of forces, C-3–","rect":[102.95098876953125,212.6070098876953,213.49798803710937,204.17401123046876]},{"page":471,"text":"C-7","rect":[113.03099060058594,221.20196533203126,127.51198797607423,214.55096435546876]},{"page":471,"text":"organization of forces for an","rect":[102.95098876953125,233.3069610595703,214.48257666015625,224.87396240234376]},{"page":471,"text":"encircled defense, C-33–","rect":[113.03099060058594,242.0,213.00299291992187,235.2509765625]},{"page":471,"text":"C-35","rect":[113.03099060058594,252.23397827148438,132.48899298095703,245.573974609375]},{"page":471,"text":"planning, C-10–C-13","rect":[102.95098876953125,264.3840026855469,186.01198034667969,255.95098876953126]},{"page":471,"text":"purpose and defined, C-1–C-2","rect":[102.95098876953125,274.6080017089844,223.99200659179687,266.27398681640627]},{"page":471,"text":"reduction by fires, C-19–C-20","rect":[102.94200134277344,285.0840148925781,220.43701391601562,276.6510009765625]},{"page":471,"text":"reduction by maneuver, C-21–","rect":[102.94200134277344,295.4070129394531,223.9919913330078,286.9739990234375]},{"page":471,"text":"C-27","rect":[113.03099060058594,304.00201416015627,132.48899298095703,297.35101318359377]},{"page":471,"text":"encirclement, breakout from,","rect":[89.9909896850586,317.3219909667969,204.00477709960939,310.6709899902344]},{"page":471,"text":"considerations for an encircled","rect":[100.07099151611328,327.698974609375,222.10019140625,321.0479736328125]},{"page":471,"text":"defender, C-68–C-73","rect":[100.07099151611328,338.0309753417969,184.63499670410156,331.3709716796875]},{"page":471,"text":"control measures, C-47","rect":[102.95098876953125,348.39898681640627,196.45198278808594,341.74798583984377]},{"page":471,"text":"executing a breakout, C-54–","rect":[102.95996856689453,360.5039978027344,215.95497351074219,352.07098388671877]},{"page":471,"text":"C-67","rect":[113.03997802734375,369.0989685058594,132.49798040771484,362.4479675292969]},{"page":471,"text":"organization of forces, C-37–","rect":[102.95997619628906,381.2039794921875,218.47497778320312,372.7709655761719]},{"page":471,"text":"C-46","rect":[113.03997802734375,389.7989501953125,132.49798040771484,383.14794921875]},{"page":471,"text":"planning a breakout, C-48–","rect":[102.95997619628906,401.9039611816406,211.52697973632812,393.470947265625]},{"page":471,"text":"C-53","rect":[113.03997802734375,410.5079650878906,132.49798040771484,403.84796142578127]},{"page":471,"text":"purpose and defined, C-36","rect":[102.95997619628906,422.5049743652344,209.47499304199219,414.17095947265627]},{"page":471,"text":"envelopment, control measures,","rect":[89.99998474121094,435.8879699707031,217.98901477050783,427.6619567871094]},{"page":471,"text":"2-64","rect":[100.07998657226563,444.5279541015625,118.03498297119141,437.95794677734377]},{"page":471,"text":"double, 2-60","rect":[102.9599838256836,455.0,152.96399145507812,448.28094482421877]},{"page":471,"text":"organization of forces, 2-62–2-","rect":[102.9599838256836,467.0099792480469,225.05579211425784,458.57696533203127]},{"page":471,"text":"63","rect":[113.03997802734375,475.5599670410156,123.02097540283204,468.98095703125]},{"page":471,"text":"planning and executing, 2-65–","rect":[102.9599838256836,487.7099609375,223.5239737548828,479.3579406738281]},{"page":471,"text":"2-70","rect":[113.03997802734375,496.2509460449219,130.99497442626953,489.6809387207031]},{"page":471,"text":"purpose, 2-58–2-61","rect":[102.95997619628906,508.3109436035156,181.4579794921875,500.05792236328127]},{"page":471,"text":"single, 2-59","rect":[102.95997619628906,518.73291015625,149.4062979736328,510.38092041015627]},{"page":471,"text":"vertical, 2-61","rect":[102.95997619628906,527.3279418945313,154.45796423339844,520.7579345703125]},{"page":471,"text":"executing a delay, 11-88–11-92","rect":[89.9999771118164,542.429931640625,216.07197790527344,534.0779418945313]},{"page":471,"text":"executing a relief in place, 15-23–","rect":[89.99098205566406,555.8128662109375,224.53196936035156,547.3798828125]},{"page":471,"text":"15-30","rect":[100.07096862792969,564.3628540039063,123.06597357177735,557.7838745117188]},{"page":471,"text":"executing a troop movement,","rect":[89.990966796875,579.5189208984375,205.97755541992189,571.1939697265625]},{"page":471,"text":"14-53–14-57","rect":[100.07096862792969,588.0689086914063,151.08296423339844,581.4899291992188]},{"page":471,"text":"exfiltrate, B-32–B-34","rect":[89.98196411132813,601.4518432617188,171.96296911621094,594.7918701171875]},{"page":471,"text":"existing obstacles, 17-9","rect":[89.98196411132813,616.544921875,183.94017248535156,608.1929321289063]},{"page":471,"text":"exploitation, common control","rect":[89.98196411132813,629.828857421875,204.51234326171875,621.6029052734375]},{"page":471,"text":"measures, 6-14–6-16","rect":[100.06196594238281,638.4688720703125,185.57997351074219,631.8988647460938]},{"page":471,"text":"executing, 6-31–6-50","rect":[102.93296813964844,650.6278686523438,187.4249747314453,642.27587890625]},{"page":471,"text":"organization of forces, 6-3–","rect":[102.92396545410156,660.9508666992188,211.96885900878906,652.5178833007813]},{"page":471,"text":"6-13","rect":[113.00396728515625,669.5548706054688,130.95896368408203,662.9758911132813]},{"page":471,"text":"planning and preparing, 6-17–","rect":[102.92396545410156,681.65087890625,222.9479697265625,673.2988891601563]},{"page":471,"text":"6-30","rect":[113.00395202636719,690.2548217773438,130.95894842529297,683.6758422851563]},{"page":471,"text":"purpose and defined, 3-6, 6-1–","rect":[102.92395782470703,702.2518310546875,225.99896459960937,693.9178466796875]},{"page":471,"text":"6-2","rect":[112.99496459960938,710.9458618164063,125.97296362304688,704.3758544921875]},{"page":471,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.47000341796875,747.510009765625]},{"page":471,"text":"Entries are by paragraph number.","rect":[243.0,70.70100402832031,386.95677294921878,62.376007080078128]},{"page":471,"text":"see also offensive operations","rect":[258.9119873046875,92.88887023925781,375.4089050292969,84.55487060546875]},{"page":471,"text":"explosive ordnance disposal in the","rect":[245.9519805908203,106.27186584472656,383.4584677734375,98.04586791992188]},{"page":471,"text":"defense, 8-124","rect":[256.031982421875,115.0,316.03137426757817,108.2608642578125]},{"page":471,"text":"F","rect":[311.94000244140627,132.1199951171875,318.06222272109985,124.94567108154297]},{"page":471,"text":"feint, purpose and defined, 19-44","rect":[246.0,147.40199279785157,378.03808813476567,139.0679931640625]},{"page":471,"text":"see also tactical means","rect":[258.9599914550781,156.09600830078126,352.4295349121094,149.55300903320313]},{"page":471,"text":"find the enemy, 1-33–1-34","rect":[246.0,171.19801330566407,351.02099829101567,162.7650146484375]},{"page":471,"text":"finish the enemy, 1-37","rect":[246.00001525878907,184.5810089111328,334.4970419921875,176.14801025390626]},{"page":471,"text":"fires in the defense, 8-86–8-95","rect":[246.00001525878907,196.1190185546875,368.05801611328129,189.468017578125]},{"page":471,"text":"fires warfighting function, airspace","rect":[246.00001525878907,211.2840118408203,381.9548972167969,202.85101318359376]},{"page":471,"text":"control and management,","rect":[256.08001708984377,221.60401916503907,358.03022875976566,213.27902221679688]},{"page":471,"text":"1-147–1-151","rect":[256.0799865722656,230.19903564453126,307.0919821777344,223.62904357910157]},{"page":471,"text":"fires support, 1-139–1-146","rect":[258.95098876953127,242.2050323486328,364.44092016601567,233.87103271484376]},{"page":471,"text":"overview of, 1-135–1-138","rect":[258.9420166015625,251.0,360.4179099121094,244.248046875]},{"page":471,"text":"fix, 1-35–1-36, B-35–B-37","rect":[245.9820098876953,264.2279968261719,349.014009765625,257.5679931640625]},{"page":471,"text":"flank cover, 13-115–13-116","rect":[245.97300720214845,277.6110534667969,355.4931357421875,270.9510498046875]},{"page":471,"text":"flank guard, 13-87–13-96","rect":[245.97300720214845,292.70404052734377,346.48501806640629,284.2710266113281]},{"page":471,"text":"see also guard, security","rect":[258.9330139160156,303.0810241699219,353.9676208496094,294.7560119628906]},{"page":471,"text":"operations","rect":[269.01300048828127,313.3050231933594,310.93499755859377,305.0790100097656]},{"page":471,"text":"follow and assume, B-38–B-41","rect":[245.97300720214845,325.0140075683594,368.5170310058594,318.35400390625]},{"page":471,"text":"follow and support, B-42–B-45","rect":[245.9730224609375,340.0080261230469,367.01404028320317,331.67401123046877]},{"page":471,"text":"follow through, 1-38–1-42","rect":[245.96400451660157,353.4900207519531,347.97900610351567,345.0570068359375]},{"page":471,"text":"forced march, 14-8","rect":[245.9550018310547,365.02801513671877,321.43533544921879,358.37701416015627]},{"page":471,"text":"organization of forces, 14-20–","rect":[258.9150085449219,377.18701171875,377.9760153808594,368.7539978027344]},{"page":471,"text":"14-25","rect":[268.9949951171875,385.7279968261719,291.99002294921879,379.1579895019531]},{"page":471,"text":"forms of contact, purpose and","rect":[245.9550018310547,400.79400634765627,364.98987036132817,392.4599914550781]},{"page":471,"text":"defined, 1-60–1-68","rect":[256.0350036621094,409.4339904785156,331.52697973632817,402.7829895019531]},{"page":471,"text":"forms of maneuver, envelopment,","rect":[245.9550018310547,424.5,380.00727954101566,416.1659851074219]},{"page":471,"text":"2-58–2-70","rect":[256.0350036621094,433.1399841308594,297.0300009765625,426.5699768066406]},{"page":471,"text":"frontal attack, 2-27–2-35","rect":[258.906005859375,443.5259704589844,356.42102270507817,436.865966796875]},{"page":471,"text":"infiltration, 2-82–2-104","rect":[258.8970031738281,454.0,348.36599951171879,447.18896484375]},{"page":471,"text":"penetration, 2-36-–2-57","rect":[258.88800048828127,465.8999938964844,352.8668845214844,457.64697265625]},{"page":471,"text":"purpose and reasoning, 2-24–","rect":[258.88800048828127,476.3219909667969,378.90298681640629,467.969970703125]},{"page":471,"text":"2-26","rect":[268.9679870605469,484.86297607421877,286.92297583007817,478.29296875]},{"page":471,"text":"turning movement, 2-71–2-81","rect":[258.88800048828127,497.02197265625,376.923921875,488.6699523925781]},{"page":471,"text":"forward passage of lines,","rect":[245.91900634765626,510.34197998046877,345.8982097167969,501.9089660644531]},{"page":471,"text":"executing, 16-31–16-38","rect":[255.99899291992188,520.7189331054688,350.51700048828129,512.366943359375]},{"page":471,"text":"planning, 16-29","rect":[258.8789978027344,531.0419311523438,320.94299536132817,522.68994140625]},{"page":471,"text":"preparing, 16-30","rect":[258.8789978027344,541.4189453125,324.88232641601567,533.0669555664063]},{"page":471,"text":"purpose, 16-28","rect":[258.8789978027344,551.6429443359375,319.37698583984379,543.3899536132813]},{"page":471,"text":"see also passage of lines","rect":[258.8699951171875,562.118896484375,359.8923034667969,553.6859130859375]},{"page":471,"text":"frontal attack, control measures,","rect":[245.91000366210938,573.6569213867188,373.9008037109375,567.0059204101563]},{"page":471,"text":"2-30","rect":[255.989990234375,584.0429077148438,273.94497900390629,577.4639282226563]},{"page":471,"text":"organization of forces, 2-29","rect":[258.8699951171875,596.138916015625,367.87979345703129,587.7059326171875]},{"page":471,"text":"planning and execution, 2-31–","rect":[258.8699951171875,606.515869140625,379.43399267578129,598.1638793945313]},{"page":471,"text":"2-3-35","rect":[268.95001220703127,615.0658569335938,294.9509909667969,608.4868774414063]},{"page":471,"text":"purpose, 2-27–2-28","rect":[258.8699951171875,627.116943359375,337.3679831542969,618.8639526367188]},{"page":471,"text":"frontal pursuit, organization of","rect":[245.9099884033203,640.535888671875,364.3526774902344,632.1029052734375]},{"page":471,"text":"forces, 7-12","rect":[255.989990234375,649.1309204101563,303.46499853515629,642.4799194335938]},{"page":471,"text":"G","rect":[311.1000061035156,666.47021484375,318.89556645965578,659.0654296875]},{"page":471,"text":"gap crossing fundamentals, 18-62","rect":[246.0,681.740966796875,381.45987158203129,673.3079833984375]},{"page":471,"text":"gap crossing mobility task, covert","rect":[246.0,695.0609741210938,378.4898845214844,686.7359619140625]},{"page":471,"text":"gap crossing, 18-60–18-61","rect":[256.0799865722656,705.43798828125,363.0809958496094,697.0859985351563]},{"page":471,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":471,"text":"Index","rect":[516.4800415039063,44.55902099609375,540.02401953125,38.016021728515628]},{"page":471,"text":"deliberate gap crossing,","rect":[414.95697021484377,92.96101379394531,510.42988696289066,84.63601684570313]},{"page":471,"text":"18-44–18-47","rect":[425.0369873046875,101.5560302734375,476.0490134277344,94.98603057861328]},{"page":471,"text":"executing, 18-70–18-72","rect":[414.947998046875,113.66096496582031,509.46597509765629,105.30896759033203]},{"page":471,"text":"fundamentals, 18-62","rect":[414.947998046875,122.2559814453125,496.96499853515629,115.60498046875]},{"page":471,"text":"hasty gap crossing, 18-48–","rect":[414.947998046875,134.36097717285157,522.9659750976563,126.00897979736328]},{"page":471,"text":"18-59","rect":[425.01898193359377,142.95599365234376,448.0139792480469,136.38600158691407]},{"page":471,"text":"organization of forces, 18-63–","rect":[414.93896484375,155.0609893798828,533.9999716796875,146.62799072265626]},{"page":471,"text":"18-67","rect":[425.01898193359377,163.656005859375,448.0139792480469,157.0860137939453]},{"page":471,"text":"planning, 18-68–18-69","rect":[414.93896484375,175.76100158691407,504.9479697265625,167.4090118408203]},{"page":471,"text":"purpose and defined, 18-40–","rect":[414.92999267578127,186.03895568847657,529.9770224609375,177.7049560546875]},{"page":471,"text":"18-41","rect":[425.010009765625,194.678955078125,448.00503759765629,188.1089630126953]},{"page":471,"text":"guard, advance guard, 13-80–","rect":[401.97003173828127,209.8439483642578,522.5492880859375,201.49195861816407]},{"page":471,"text":"13-86","rect":[412.0500183105469,218.39395141601563,435.04504614257817,211.81495666503907]},{"page":471,"text":"control measures, 13-78–","rect":[414.9300231933594,228.77096557617188,516.9540122070313,222.1919708251953]},{"page":471,"text":"13-79","rect":[425.010009765625,239.09396362304688,448.00503759765629,232.5149688720703]},{"page":471,"text":"flank guard, 13-87–13-96","rect":[414.9300231933594,251.2439727783203,515.4420187988282,242.81097412109376]},{"page":471,"text":"organization of forces, 13-77","rect":[414.9300231933594,261.5669860839844,528.9159262695313,253.13397216796876]},{"page":471,"text":"purpose and defined, 13-72–","rect":[414.9300231933594,271.8449401855469,529.9770224609375,263.51092529296877]},{"page":471,"text":"13-76","rect":[425.010009765625,280.4939270019531,448.00503759765629,273.9149169921875]},{"page":471,"text":"rear guard, 13-97–13-98","rect":[414.9570007324219,292.6439514160156,512.4750083007813,284.2889709472656]},{"page":471,"text":"tasks, 13-75–13-76","rect":[414.9599914550781,301.19097900390627,491.95498876953129,294.6119689941406]},{"page":471,"text":"H","rect":[467.3999938964844,318.4200134277344,474.63443422698978,311.2456970214844]},{"page":471,"text":"hasty breach, 18-19–18-20","rect":[402.0,333.801025390625,509.53201513671879,325.4490051269531]},{"page":471,"text":"hasty gap crossing, 18-48–18-59","rect":[401.9909973144531,347.18402099609377,532.9770224609375,338.8320007324219]},{"page":471,"text":"hasty operations, defined and","rect":[401.98199462890627,360.5040283203125,519.9908774414063,352.0710144042969]},{"page":471,"text":"described, 1-30–1-31","rect":[412.06201171875,369.1080017089844,497.0400107421875,362.52899169921877]},{"page":471,"text":"I–K","rect":[463.20001220703127,386.3399963378906,478.7710919418335,379.1656799316406]},{"page":471,"text":"infiltration, control measures, 2-89","rect":[402.0,400.0,537.4625571289063,393.2879943847656]},{"page":471,"text":"organization of forces, 2-85–","rect":[414.9599914550781,412.04400634765627,528.9468100585938,403.6109924316406]},{"page":471,"text":"2-88","rect":[425.0400085449219,420.6390075683594,442.99499731445317,414.0690002441406]},{"page":471,"text":"planning, preparing, and","rect":[414.9599914550781,432.7440185546875,511.976412109375,424.41900634765627]},{"page":471,"text":"execution, 2-90-2-104","rect":[425.0400085449219,441.3389892578125,512.5379965820313,434.76898193359377]},{"page":471,"text":"purpose, 2-82–2-84","rect":[414.9599914550781,453.3450012207031,493.4579794921875,445.09197998046877]},{"page":471,"text":"infiltration march technique, 14-","rect":[402.0,466.7279968261719,527.47795703125,458.39398193359377]},{"page":471,"text":"29–14-30","rect":[412.0799865722656,475.3769836425781,450.07800512695317,468.7979736328125]},{"page":471,"text":"intelligence in a delay, 11-40","rect":[402.0,490.5329895019531,516.0470908203125,482.18096923828127]},{"page":471,"text":"intelligence in the defense, 8-82–","rect":[402.0,503.8529968261719,534.0209677734375,495.41998291015627]},{"page":471,"text":"8-85","rect":[412.0799865722656,512.447998046875,430.0349753417969,505.87799072265627]},{"page":471,"text":"intelligence warfighting function,","rect":[402.0,527.5499877929688,529.5128642578125,519.1170043945313]},{"page":471,"text":"overview of, 1-131–1-134","rect":[412.0799865722656,536.1539916992188,513.5559104003907,529.4940185546875]},{"page":471,"text":"interdict, B-46–B-50","rect":[402.0,549.4649658203125,481.5239890136719,542.8949584960938]},{"page":471,"text":"isolate, B-51","rect":[402.0,563.0,451.99499731445317,556.2779541015625]},{"page":471,"text":"L","rect":[467.94000244140627,580.0800170898438,474.06222272109985,572.9658203125]},{"page":471,"text":"limited visibility, during screen","rect":[402.0,595.4609985351563,520.981783203125,587.135986328125]},{"page":471,"text":"operations, 13-71","rect":[412.0799865722656,605.6849975585938,482.1179831542969,597.4320068359375]},{"page":471,"text":"limited-visibility operations, 1-102–","rect":[401.9909973144531,619.1669921875,539.5379965820313,610.8150024414063]},{"page":471,"text":"1-109","rect":[412.0710144042969,627.7080078125,435.06601171875,621.1380004882813]},{"page":471,"text":"line formation, 2-5–2-6","rect":[401.9909973144531,641.0910034179688,492.00988989257817,634.4400024414063]},{"page":471,"text":"linkup, actions following a linkup,","rect":[401.98199462890627,656.1929931640625,532.4315654296875,647.760009765625]},{"page":471,"text":"12-30","rect":[412.06201171875,664.7969360351563,435.05700903320317,658.2179565429688]},{"page":471,"text":"executing, 20-21–20-26","rect":[414.9420166015625,676.8929443359375,509.4600241699219,668.5409545898438]},{"page":471,"text":"linkup of a moving force with a","rect":[414.9599914550781,687.260986328125,535.9740317382813,678.8280029296875]},{"page":471,"text":"stationary force, 12-27–","rect":[425.0400085449219,697.583984375,519.56698828125,689.1510009765625]},{"page":471,"text":"12-28","rect":[425.03997802734377,706.1790161132813,448.035005859375,699.6090087890625]},{"page":471,"text":"Index-3","rect":[490.4940185546875,754.1790161132813,522.0119956054688,747.6090087890625]},{"page":472,"text":"Index","rect":[72.0,44.55902099609375,95.54400091552735,38.016021728515628]},{"page":472,"text":"linkup of two moving forces,","rect":[84.96299743652344,92.95802307128906,195.92309680175783,84.5250244140625]},{"page":472,"text":"12-29","rect":[95.04299926757813,101.55303955078125,118.03798895263673,94.98303985595703]},{"page":472,"text":"planning, 20-2–20-14","rect":[84.96299743652344,113.65803527832031,170.00398474121094,105.30603790283203]},{"page":472,"text":"preparing, 20-15–20-20","rect":[84.9629898071289,124.03504943847656,178.93199377441406,115.68305206298828]},{"page":472,"text":"purpose and defined, 20-1","rect":[84.95399475097656,134.25904846191407,189.94168310546875,125.925048828125]},{"page":472,"text":"linkup of a moving force with a","rect":[71.9939956665039,147.7410430908203,193.00708227539062,139.30804443359376]},{"page":472,"text":"stationary force, 12-27–12-28","rect":[82.07398986816406,158.06410217285157,199.56900244140625,149.631103515625]},{"page":472,"text":"linkup of two moving forces, 12-29","rect":[71.9939956665039,171.4470977783203,208.4222891845703,163.01409912109376]},{"page":472,"text":"local security, 1-92–1-93","rect":[71.9939956665039,184.76710510253907,169.98599462890625,176.4151153564453]},{"page":472,"text":"see security operations","rect":[84.94499206542969,195.14405822753907,177.45062255859376,186.81906127929688]},{"page":472,"text":"M","rect":[136.8000030517578,210.5999755859375,145.14666343307497,203.4256591796875]},{"page":472,"text":"march techniques, close column,","rect":[72.0,225.88197326660157,202.99499621582033,217.65597534179688]},{"page":472,"text":"14-28","rect":[82.08000183105469,234.52197265625,105.07499914550782,227.9519805908203]},{"page":472,"text":"infiltration march, 14-29–14-30","rect":[84.95999908447266,245.0,206.9550040283203,238.24798583984376]},{"page":472,"text":"open column, 14-27","rect":[84.95999145507813,256.9049987792969,164.4561026611328,248.65199279785157]},{"page":472,"text":"purpose and defined, 14-26","rect":[84.95999145507813,267.2820129394531,194.9885733642578,258.947998046875]},{"page":472,"text":"mass effects in the defense, 8-59–","rect":[71.99998474121094,279.0,209.43898229980469,272.2679443359375]},{"page":472,"text":"8-61","rect":[82.07998657226563,289.29595947265627,100.03498297119141,282.7259521484375]},{"page":472,"text":"mobile defense, control measures,","rect":[71.99998474121094,302.615966796875,209.46324267578127,295.9649658203125]},{"page":472,"text":"10-11–10-12","rect":[82.07998657226563,312.99298095703127,133.09198217773437,306.4229736328125]},{"page":472,"text":"executing, 10-24–10-38","rect":[84.95098876953125,325.0979919433594,179.46898107910156,316.7459716796875]},{"page":472,"text":"organization of forces, 10-6–","rect":[84.95098876953125,335.4749755859375,198.9728720703125,327.0419616699219]},{"page":472,"text":"10-10","rect":[95.03099060058594,344.0159912109375,118.02598791503907,337.44598388671877]},{"page":472,"text":"planning, 10-13–10-20","rect":[84.95098876953125,356.17498779296877,174.9600089111328,347.8229675292969]},{"page":472,"text":"preparing, 10-21–10-23","rect":[84.94198608398438,366.49798583984377,178.91099768066406,358.1459655761719]},{"page":472,"text":"purpose and defined, 10-1–","rect":[84.93299102783203,376.7760009765625,194.99489050292969,368.4419860839844]},{"page":472,"text":"10-5","rect":[95.01299285888672,385.41595458984377,112.96799688720704,378.845947265625]},{"page":472,"text":"mobile defense execution, find,","rect":[71.97299194335938,398.7989501953125,196.00196948242189,392.14794921875]},{"page":472,"text":"10-26–10-27","rect":[82.05299377441406,409.1219482421875,133.0649893798828,402.55194091796877]},{"page":472,"text":"finish, 10-32–10-37","rect":[84.92398834228516,419.5079650878906,161.90999060058594,412.84796142578127]},{"page":472,"text":"fix, 10-28–10-31","rect":[84.91499328613281,429.8309631347656,149.98498754882812,423.17095947265627]},{"page":472,"text":"follow through, 10-38","rect":[84.91499328613281,441.9809875488281,168.9209921875,433.5479736328125]},{"page":472,"text":"purpose and defined, 10-24–","rect":[84.91499328613281,452.2049865722656,199.9620078125,443.8709716796875]},{"page":472,"text":"10-25","rect":[94.9949951171875,460.8449401855469,117.98999243164063,454.2749328613281]},{"page":472,"text":"mobile defense planning, fires,","rect":[71.95499420166016,476.00994873046877,193.94368090820314,467.5769348144531]},{"page":472,"text":"10-18–10-19","rect":[82.03499603271485,484.5509338378906,133.04698400878906,477.9809265136719]},{"page":472,"text":"purpose and defined, 10-13–","rect":[84.90599060058594,496.6109619140625,199.95298986816406,488.2769470214844]},{"page":472,"text":"10-15","rect":[94.98599243164063,505.25091552734377,117.98098974609376,498.680908203125]},{"page":472,"text":"sustainment, 10-20","rect":[84.90599060058594,515.6279296875,161.34390478515625,509.05792236328127]},{"page":472,"text":"via movement and maneuver,","rect":[84.90599060058594,526.0,203.35408129882814,519.407958984375]},{"page":472,"text":"10-16–10-17","rect":[94.98599243164063,536.3279418945313,145.99798803710937,529.7579345703125]},{"page":472,"text":"mobility, breach, 18-9–18-39","rect":[71.9369888305664,551.429931640625,185.95799475097656,543.0779418945313]},{"page":472,"text":"clear, 18-73","rect":[84.8969955444336,560.0338745117188,132.38099127197266,553.4548950195313]},{"page":472,"text":"gap crossing, 18-40–18-72","rect":[84.8969955444336,572.1298828125,191.8979971923828,563.7778930664063]},{"page":472,"text":"purpose and defined, 18-1–","rect":[84.89698791503906,582.4078979492188,194.9589102783203,574.0739135742188]},{"page":472,"text":"18-5","rect":[94.97698974609375,591.0479125976563,112.93198614501954,584.4779052734375]},{"page":472,"text":"tasks overview, 18-6–18-8","rect":[84.89698791503906,601.4249267578125,189.91798620605469,594.8549194335938]},{"page":472,"text":"mobility in the defense, 8-75–8-76","rect":[71.93698120117188,616.52685546875,207.49498205566406,608.0938720703125]},{"page":472,"text":"mobility tasks, breach, 18-9–18-39","rect":[71.93697357177735,629.909912109375,209.46597509765625,621.5579223632813]},{"page":472,"text":"clear, 18-73","rect":[84.88796997070313,638.4598999023438,132.37195806884766,631.8809204101563]},{"page":472,"text":"gap crossing, 18-40–18-72","rect":[84.88796997070313,650.60986328125,191.8889639892578,642.2578735351563]},{"page":472,"text":"purpose and defined, 18-6–","rect":[84.88795471191406,660.8338623046875,194.94986181640625,652.4998779296875]},{"page":472,"text":"18-8","rect":[94.96795654296875,669.5278930664063,112.92296057128907,662.9578857421875]},{"page":472,"text":"mounted troop movement,","rect":[71.9279556274414,684.5308837890625,176.94175830078127,676.304931640625]},{"page":472,"text":"defined, 14-12","rect":[82.0079574584961,693.224853515625,139.5089591064453,686.5738525390625]},{"page":472,"text":"movement, 1-110","rect":[71.9279556274414,706.544921875,141.89125280761719,699.9749145507813]},{"page":472,"text":"Index-4","rect":[72.1199951171875,754.1790161132813,103.63799505615235,747.6090087890625]},{"page":472,"text":"Entries are by paragraph number.","rect":[225.0,70.70100402832031,368.95677294921878,62.376007080078128]},{"page":472,"text":"movement and maneuver in a","rect":[227.92495727539063,91.1878662109375,346.8959372558594,84.64486694335938]},{"page":472,"text":"delay, 11-45–11-51","rect":[238.0049591064453,103.34687805175781,315.47696142578129,94.99488067626953]},{"page":472,"text":"movement and maneuver in the","rect":[227.9249725341797,114.8848876953125,354.39383154296879,108.34188842773438]},{"page":472,"text":"defense, 8-48","rect":[238.00497436523438,125.2618408203125,292.96438818359379,118.61083984375]},{"page":472,"text":"countermobility, 8-67–8-74","rect":[240.88499450683595,137.3668975830078,347.39999609375,129.01490783691407]},{"page":472,"text":"disrupt the enemy, 8-58","rect":[240.9569854736328,147.7438507080078,335.45608740234379,139.39186096191407]},{"page":472,"text":"exploit terrain, 8-49–8-56","rect":[240.9569854736328,157.9678497314453,340.99499731445317,149.71205139160157]},{"page":472,"text":"force type considerations,","rect":[240.9509735107422,168.44105529785157,343.3808757324219,160.008056640625]},{"page":472,"text":"8-62–8-66","rect":[251.03097534179688,176.9820556640625,292.02600317382817,170.4120635986328]},{"page":472,"text":"maintain security, 8-57","rect":[240.94198608398438,189.1410675048828,331.48196630859379,180.78907775878907]},{"page":472,"text":"mass effects, 8-59–8-61","rect":[240.94198608398438,197.68206787109376,337.43997412109379,191.03106689453126]},{"page":472,"text":"mobility, 8-75–-8-76","rect":[240.9419708251953,209.8410186767578,320.40298681640629,201.48902893066407]},{"page":472,"text":"obscuration and limited","rect":[240.9509735107422,218.38201904296876,333.47097998046879,211.83901977539063]},{"page":472,"text":"visibility, 8-77–8-81","rect":[251.03097534179688,230.54103088378907,328.02597265625,222.1890411376953]},{"page":472,"text":"movement and maneuver","rect":[227.990966796875,242.07904052734376,329.95824267578129,235.53604125976563]},{"page":472,"text":"warfighting function,","rect":[238.0709686279297,254.23805236816407,318.07737841796878,245.8050537109375]},{"page":472,"text":"consolidate, 1-123–1-124","rect":[238.0709686279297,262.7880554199219,339.60989599609379,256.20904541015627]},{"page":472,"text":"daylight operations, 1-101","rect":[240.9509735107422,274.9380798339844,344.44018774414067,266.5860595703125]},{"page":472,"text":"employment of direct fires,","rect":[240.9509735107422,285.2610778808594,346.44807543945316,276.82806396484377]},{"page":472,"text":"1-111–1-112","rect":[251.03097534179688,293.7570495605469,302.04297094726567,287.2860412597656]},{"page":472,"text":"limited-visibility operations,","rect":[240.9419708251953,305.9610595703125,347.883591796875,297.63604736328127]},{"page":472,"text":"1-102–1-109","rect":[251.02197265625,314.5020446777344,302.03396826171879,307.9320373535156]},{"page":472,"text":"local security, 1-92–1-93","rect":[240.93296813964845,326.6610412597656,338.9249899902344,318.30902099609377]},{"page":472,"text":"movement, 1-110","rect":[240.92396545410157,335.2020263671875,310.8872702636719,328.63201904296877]},{"page":472,"text":"overview of, 1-90–1-91","rect":[240.92396545410157,345.57904052734377,332.38284521484379,338.92803955078127]},{"page":472,"text":"principles of planning direct","rect":[240.92396545410157,357.6840515136719,349.8896647949219,349.25103759765627]},{"page":472,"text":"figures, 1-113–1-22","rect":[251.00396728515626,368.06103515625,329.015962890625,359.6280212402344]},{"page":472,"text":"reconstitution, 1-125–1-130","rect":[240.92396545410157,376.61102294921877,350.44494848632817,370.0320129394531]},{"page":472,"text":"reserve, 1-94–1-100","rect":[240.92396545410157,387.0,321.9419577636719,380.40899658203127]},{"page":472,"text":"movement formation, advantages","rect":[227.96397399902345,402.0810241699219,361.4222412109375,393.64801025390627]},{"page":472,"text":"and disadvantages of, 2-2","rect":[238.04397583007813,412.4580383300781,341.5349753417969,404.0250244140625]},{"page":472,"text":"defined, 2-1","rect":[240.92396545410157,421.0,288.389986328125,414.3479919433594]},{"page":472,"text":"discussion of types of, 2-3–","rect":[240.92396545410157,433.15802001953127,349.903169921875,424.7250061035156]},{"page":472,"text":"2-16","rect":[251.00396728515626,441.6990051269531,268.9589560546875,435.1289978027344]},{"page":472,"text":"types of, 2-1","rect":[240.92396545410157,453.8580322265625,290.43298559570317,445.4250183105469]},{"page":472,"text":"movement techniques, 2-17–2-26","rect":[227.96397399902345,467.0790100097656,361.96496801757817,458.82598876953127]},{"page":472,"text":"in relation to enemy contact,","rect":[240.93296813964845,477.5550231933594,353.38435473632816,469.2300109863281]},{"page":472,"text":"2-17","rect":[251.01296997070313,485.99700927734377,268.9679587402344,479.5260009765625]},{"page":472,"text":"types of, 2-17","rect":[240.93296813964845,498.2550048828125,295.41897802734379,489.8219909667969]},{"page":472,"text":"movement to contact, common","rect":[227.9729766845703,509.7929992675781,351.0326560058594,503.3940124511719]},{"page":472,"text":"control measures, 4-12–4-15","rect":[238.052978515625,520.1699829101563,353.091890625,513.5999755859375]},{"page":472,"text":"executing, 4-27–4-48","rect":[240.93296813964845,532.2749633789063,325.42495947265629,523.9229736328125]},{"page":472,"text":"organization of forces, 4-5–","rect":[240.92396545410157,542.6519775390625,349.96887426757817,534.218994140625]},{"page":472,"text":"4-11","rect":[251.00396728515626,551.093994140625,268.9589560546875,544.6229858398438]},{"page":472,"text":"planning and preparing, 4-16–","rect":[240.92396545410157,563.3519287109375,360.9479697265625,554.9999389648438]},{"page":472,"text":"4-26","rect":[251.0039520263672,571.8929443359375,268.9589560546875,565.3229370117188]},{"page":472,"text":"purpose and defined, 3-4, 4-1–","rect":[240.92396545410157,583.9530029296875,364.0088828125,575.6190185546875]},{"page":472,"text":"4-4","rect":[251.0039520263672,592.4939575195313,263.98196630859379,586.0499267578125]},{"page":472,"text":"see also search and attack","rect":[240.9149627685547,602.969970703125,347.8718566894531,596.427001953125]},{"page":472,"text":"operations, cordon and","rect":[250.99496459960938,614.9759521484375,342.96597509765629,606.75]},{"page":472,"text":"search operations, offensive","rect":[250.99496459960938,625.3529052734375,363.48596411132817,617.0189208984375]},{"page":472,"text":"operations","rect":[250.99496459960938,635.6759033203125,292.9169616699219,627.449951171875]},{"page":472,"text":"moving screen, see also screen,","rect":[227.9549560546875,649.157958984375,356.96724047851566,640.8330078125]},{"page":472,"text":"see also security operations,","rect":[238.0349578857422,659.48095703125,351.98484912109378,651.156005859375]},{"page":472,"text":"13-67–13-70","rect":[238.0349578857422,668.0848999023438,289.04696875,661.5059204101563]},{"page":472,"text":"multidomain operations, and","rect":[227.94595336914063,683.0789184570313,340.92114477539067,674.8529052734375]},{"page":472,"text":"command and control, 1-86–","rect":[238.0259552001953,691.7189331054688,352.53296118164067,685.14892578125]},{"page":472,"text":"1-89","rect":[238.0259552001953,702.095947265625,255.98095922851562,695.5259399414063]},{"page":472,"text":"tactics overview, 1-12–1-16","rect":[240.9059600830078,712.4189453125,350.41797094726567,705.8489379882813]},{"page":472,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76098852539067,747.6090087890625]},{"page":472,"text":"N","rect":[449.3999938964844,92.0999755859375,456.63443422698978,84.92565155029297]},{"page":472,"text":"neutralize, B-52","rect":[384.0,105.698974609375,447.0180075683594,99.12897491455078]},{"page":472,"text":"nontactical movement, defined,","rect":[384.0,119.01898193359375,508.509568359375,112.36798095703125]},{"page":472,"text":"14-3","rect":[394.0799865722656,129.40499877929688,412.035005859375,122.82599639892578]},{"page":472,"text":"O","rect":[449.1000061035156,146.75022888183595,456.89556645965578,139.345458984375]},{"page":472,"text":"obscuration and limited visibility in","rect":[384.0,162.02101135253907,519.5381796875,153.69601440429688]},{"page":472,"text":"the defense, 8-77–8-81","rect":[394.0799865722656,170.61602783203126,487.09500341796879,163.96502685546876]},{"page":472,"text":"observation posts, see security","rect":[384.0,185.71803283691407,507.540283203125,177.39303588867188]},{"page":472,"text":"operations","rect":[394.0799865722656,195.99598693847657,436.0019836425781,187.76998901367188]},{"page":472,"text":"obstacle block effect, 17-24–17-28","rect":[384.0,207.63299560546876,521.5379965820313,200.98199462890626]},{"page":472,"text":"obstacle control measures,","rect":[384.0,221.0,491.47349658203128,214.41000366210938]},{"page":472,"text":"17-55–17-68","rect":[394.0799865722656,231.33001708984376,445.0919821777344,224.76002502441407]},{"page":472,"text":"obstacle disrupt effect, 17-29–","rect":[383.9909973144531,246.33302307128907,504.5459921875,237.9990234375]},{"page":472,"text":"17-34","rect":[394.07098388671877,255.03598022460938,417.0659812011719,248.4569854736328]},{"page":472,"text":"obstacle effects considerations,","rect":[383.9909973144531,268.34698486328127,509.52476611328128,261.69598388671877]},{"page":472,"text":"17-20–17-23","rect":[394.07098388671877,278.7330017089844,445.08301000976567,272.15399169921877]},{"page":472,"text":"obstacle emplacement authority,","rect":[383.98199462890627,293.8260192871094,513.52885546875,285.5010070800781]},{"page":472,"text":"17-48–17-54","rect":[394.0619812011719,302.4210205078125,445.07397680664067,295.85101318359377]},{"page":472,"text":"obstacle employment principles,","rect":[383.9999694824219,317.541015625,512.0501262207031,309.21600341796877]},{"page":472,"text":"17-46–17-47","rect":[394.0799865722656,326.1360168457031,445.0920126953125,319.56597900390627]},{"page":472,"text":"obstacle fix effect, 17-35–17-39","rect":[383.9909973144531,339.4649963378906,509.53198461914067,332.80499267578127]},{"page":472,"text":"obstacle targeting, 17-19","rect":[383.9909973144531,354.6210021972656,482.9793112792969,346.26898193359377]},{"page":472,"text":"obstacle turn effect, 17-40–17-45","rect":[383.9909973144531,366.15899658203127,516.06601171875,359.50799560546877]},{"page":472,"text":"obstacles in countermobility, block","rect":[383.9909973144531,381.3240051269531,520.4597778320313,372.9989929199219]},{"page":472,"text":"effect, 17-24–17-28","rect":[394.07098388671877,390.0,472.0829794921875,383.2139892578125]},{"page":472,"text":"control measures, 17-55–","rect":[396.95098876953127,400.24200439453127,498.97497778320317,393.6719970703125]},{"page":472,"text":"17-68","rect":[407.0309753417969,410.56500244140627,430.02597265625,403.9949951171875]},{"page":472,"text":"disrupt effect, 17-29–17-34","rect":[396.95098876953127,422.6250305175781,504.4829733886719,414.291015625]},{"page":472,"text":"effects considerations, 17-20–","rect":[396.9419860839844,431.2650146484375,517.0199912109375,424.614013671875]},{"page":472,"text":"17-23","rect":[407.0129699707031,441.6510009765625,430.0079978027344,435.0719909667969]},{"page":472,"text":"emplacement authority, 17-48–","rect":[396.9329833984375,453.7470397949219,520.9799521484375,445.39501953125]},{"page":472,"text":"17-54","rect":[407.0129699707031,462.3420104980469,430.0079978027344,455.7720031738281]},{"page":472,"text":"employment principles, 17-46–","rect":[396.9329833984375,474.447021484375,519.4769614257813,466.0950012207031]},{"page":472,"text":"17-47","rect":[407.0129699707031,482.9429931640625,430.0079978027344,476.47198486328127]},{"page":472,"text":"existing obstacles, 17-9","rect":[396.9329833984375,495.1470031738281,490.89029150390629,486.79498291015627]},{"page":472,"text":"fix effect, 17-35–17-39","rect":[396.9239807128906,503.7510070800781,486.39297705078129,497.09100341796877]},{"page":472,"text":"intent, 17-18","rect":[396.91497802734377,514.0650024414063,446.90100317382817,507.4949951171875]},{"page":472,"text":"protective obstacles, 17-16–","rect":[396.91497802734377,526.125,509.43298559570317,517.8720092773438]},{"page":472,"text":"17-17","rect":[406.9859619140625,534.666015625,429.98098974609379,528.1950073242188]},{"page":472,"text":"reinforcing obstacles, 17-10–","rect":[396.9059753417969,546.9239501953125,512.4299643554688,538.490966796875]},{"page":472,"text":"17-11","rect":[406.9859619140625,555.365966796875,429.98095922851567,548.8949584960938]},{"page":472,"text":"tactical obstacles, 17-12–17-15","rect":[396.9059753417969,566.0,521.48398046875,559.27197265625]},{"page":472,"text":"target, 17-19","rect":[396.9059753417969,577.9469604492188,447.9125693359375,569.594970703125]},{"page":472,"text":"turn effect, 17-40–17-45","rect":[396.9059753417969,586.5419921875,492.91797094726567,579.8909912109375]},{"page":472,"text":"occupy, B-53","rect":[383.94598388671877,601.6439208984375,436.4069541015625,593.2919311523438]},{"page":472,"text":"offense, see offensive operations","rect":[383.9549865722656,614.864990234375,515.9877014160156,606.531005859375]},{"page":472,"text":"offensive actions, see offensive","rect":[383.9549865722656,626.56494140625,509.0072653808594,619.9139404296875]},{"page":472,"text":"operations","rect":[394.03497314453127,638.5709228515625,435.95697021484377,630.344970703125]},{"page":472,"text":"offensive cover, 13-108–13-114","rect":[383.9549865722656,650.2799682617188,510.504,643.6199951171875]},{"page":472,"text":"offensive operations, CCIR","rect":[383.94598388671877,665.27392578125,491.39698681640626,656.93994140625]},{"page":472,"text":"planning considerations, 3-24","rect":[394.0260009765625,675.7499389648438,511.5515769042969,667.39794921875]},{"page":472,"text":"characteristics, 3-2","rect":[396.9059753417969,684.2999267578125,472.40698461914067,677.720947265625]},{"page":472,"text":"purpose and defined, 1-21,","rect":[396.9059753417969,696.3509521484375,504.36869921875,688.0169677734375]},{"page":472,"text":"3-1–3-7","rect":[406.9859924316406,704.9999389648438,437.96399145507817,698.4209594726563]},{"page":472,"text":"types, 3-3–3-7","rect":[396.9599914550781,717.1409301757813,454.4610007324219,708.7889404296875]},{"page":472,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.79602270507817,747.510009765625]},{"page":473,"text":"types planning symbols, 3-3","rect":[102.9540023803711,92.95802307128906,214.4288809814453,84.60602569580078]},{"page":473,"text":"offensive operations planning","rect":[89.9939956665039,106.34101867675781,206.98228674316406,97.90802001953125]},{"page":473,"text":"considerations, 3-8–3-57","rect":[100.0739974975586,115.0,199.09199743652344,108.31201934814453]},{"page":473,"text":"during transitions, 4-48, 4-83–","rect":[102.94499969482422,127.04103088378906,222.49200659179687,118.68903350830078]},{"page":473,"text":"4-86","rect":[113.02499389648438,135.58209228515626,130.97999029541016,129.01210021972657]},{"page":473,"text":"via command and control,","rect":[102.94499206542969,146.0,205.92390551757814,139.41604614257813]},{"page":473,"text":"3-13–3-18","rect":[113.02499389648438,156.29110717773438,154.0199912109375,149.7121124267578]},{"page":473,"text":"via fires,","rect":[102.93599700927735,166.65911865234376,136.39439501953127,160.00811767578126]},{"page":473,"text":"via intelligence, 3-22–3-","rect":[102.93599700927735,178.7641143798828,197.9139158935547,170.41212463378907]},{"page":473,"text":"via movement and maneuver,","rect":[102.93599700927735,187.359130859375,221.384080078125,180.81613159179688]},{"page":473,"text":"3-19–3-21","rect":[113.01599884033203,197.69113159179688,154.01098852539062,191.1121368408203]},{"page":473,"text":"via protection,","rect":[102.927001953125,209.7421417236328,158.8710185546875,201.51614379882813]},{"page":473,"text":"via sustainment","rect":[102.927001953125,218.38214111328126,165.41311755371096,211.83914184570313]},{"page":473,"text":"see also exploitation","rect":[102.927001953125,230.4420928955078,184.42019873046875,222.21609497070313]},{"page":473,"text":"operations, pursuit","rect":[113.00700378417969,240.7650909423828,187.00502124023439,232.53909301757813]},{"page":473,"text":"operations, movement to","rect":[113.00700378417969,251.14210510253907,212.0033896484375,242.91610717773438]},{"page":473,"text":"contact","rect":[113.00700378417969,259.7821044921875,141.9600078125,253.3831024169922]},{"page":473,"text":"open column march technique,","rect":[89.96700286865235,274.8481140136719,212.97178759765627,266.6221008300781]},{"page":473,"text":"14-27","rect":[100.04700469970703,283.3890686035156,123.04200201416016,276.9180603027344]},{"page":473,"text":"organization of forces, for a frontal","rect":[89.96700286865235,298.653076171875,226.44386181640625,290.2200622558594]},{"page":473,"text":"attack, 2-29","rect":[100.04700469970703,307.1940612792969,147.045015625,300.6240539550781]},{"page":473,"text":"for a penetration, 2-37–2-41","rect":[102.92700958251953,319.2000427246094,214.48292761230469,310.86602783203127]},{"page":473,"text":"for a turning movement, 2-72–","rect":[102.91800689697266,329.6760559082031,223.48199682617187,321.2430419921875]},{"page":473,"text":"2-73","rect":[112.99800109863281,338.2260437011719,130.95299749755859,331.64703369140627]},{"page":473,"text":"for an envelopment, 2-62–2-63","rect":[102.91799926757813,350.27703857421877,225.99391394042969,341.9430236816406]},{"page":473,"text":"for an infiltration, 2-85–2-88","rect":[102.91799926757813,359.0,212.97900610351562,352.2660217285156]},{"page":473,"text":"in the defense, 8-62–8-66","rect":[102.91799926757813,369.2940368652344,205.4739249267578,362.6430358886719]},{"page":473,"text":"for an approach march, 14-20–","rect":[102.90900421142578,381.300048828125,226.43129187011719,372.9660339355469]},{"page":473,"text":"14-25","rect":[112.98899841308594,389.9940185546875,135.98399572753906,383.42401123046877]},{"page":473,"text":"for a breach, 18-32","rect":[102.90900421142578,400.3260192871094,178.8672354736328,393.666015625]},{"page":473,"text":"for a cover operation, 13-103–","rect":[102.90899658203125,412.37701416015627,223.46399145507812,404.0429992675781]},{"page":473,"text":"13-107","rect":[112.98899841308594,421.0260009765625,140.96100073242187,414.4469909667969]},{"page":473,"text":"for a delay, 11-21–11-25,","rect":[102.90899658203125,433.176025390625,203.43898120117189,424.7430114746094]},{"page":473,"text":"11-75–11-78","rect":[112.98899841308594,441.7170104980469,164.00099401855469,435.1470031738281]},{"page":473,"text":"for a forced march, 14-20–","rect":[102.89999389648438,452.093994140625,208.9469931640625,445.4429931640625]},{"page":473,"text":"14-25","rect":[112.97998809814453,462.4169921875,135.97497778320312,455.84698486328127]},{"page":473,"text":"for a gap crossing, 18-63–","rect":[102.89998626708985,474.57598876953127,207.44397192382812,466.1429748535156]},{"page":473,"text":"18-67","rect":[112.97998809814453,483.1169738769531,135.97497778320312,476.5469665527344]},{"page":473,"text":"for a mobile defense, 10-6–","rect":[102.89998626708985,493.4939880371094,212.42187719726562,486.8429870605469]},{"page":473,"text":"10-10","rect":[112.97998809814453,503.8169860839844,135.97497778320312,497.2469787597656]},{"page":473,"text":"for a passage of lines, 16-7–","rect":[102.89998626708985,515.9759521484375,216.44488745117187,507.54296875]},{"page":473,"text":"16-8","rect":[112.97998809814453,524.5169677734375,130.93499212646484,517.9469604492188]},{"page":473,"text":"for a relief in place, 15-5–15-6","rect":[102.89998626708985,536.5769653320313,222.43797521972656,528.2429809570313]},{"page":473,"text":"for a retirement, 11-98–11-101","rect":[102.89098358154297,545.2169799804688,224.89497595214844,538.5659790039063]},{"page":473,"text":"for a reverse slope defense,","rect":[102.89997100830078,557.2769775390625,214.38746752929689,548.9429931640625]},{"page":473,"text":"9-106–9-109","rect":[112.97996520996094,565.9169921875,163.99197607421875,559.3469848632813]},{"page":473,"text":"for a screen operation, 13-61","rect":[102.8909683227539,577.9769287109375,218.44285803222656,569.6429443359375]},{"page":473,"text":"for a tactical road march,","rect":[102.8909683227539,586.616943359375,201.85048022460939,579.9659423828125]},{"page":473,"text":"14-20–14-25","rect":[112.9709701538086,596.9939575195313,163.9829581298828,590.4239501953125]},{"page":473,"text":"for guard operations, 13-77","rect":[102.88196563720703,609.0989379882813,211.38597326660156,600.6659545898438]},{"page":473,"text":"see also defensive cover, flank","rect":[102.8819580078125,617.6939697265625,225.924560546875,611.04296875]},{"page":473,"text":"cover, offensive cover, rear","rect":[112.96195983886719,628.0169677734375,221.40926196289065,621.365966796875]},{"page":473,"text":"cover","rect":[112.96195983886719,638.3939208984375,134.91295458984377,633.52490234375]},{"page":473,"text":"organization of forces for a troop","rect":[89.92195892333985,653.4959716796875,219.44903784179687,645.06298828125]},{"page":473,"text":"movement, approach march,","rect":[100.00196075439453,663.77392578125,214.43064990234377,655.5479736328125]},{"page":473,"text":"14-17–14-19","rect":[100.00196075439453,672.4139404296875,151.01394873046875,665.8439331054688]},{"page":473,"text":"forced march, 14-20–14-25","rect":[102.87295532226563,682.7369384765625,211.43094091796875,676.0859375]},{"page":473,"text":"overview, 14-16","rect":[102.87294006347656,693.1139526367188,166.3589346923828,686.5439453125]},{"page":473,"text":"tactical road march, 14-20–","rect":[102.87294006347656,703.4369506835938,211.85394506835937,696.866943359375]},{"page":473,"text":"14-25","rect":[112.95294952392578,713.81396484375,135.94793920898437,707.2439575195313]},{"page":473,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.47000341796875,747.510009765625]},{"page":473,"text":"Entries are by paragraph number.","rect":[243.0,70.70100402832031,386.95677294921878,62.376007080078128]},{"page":473,"text":"P–Q","rect":[304.97998046875,92.81139373779297,325.0199866256714,84.80541229248047]},{"page":473,"text":"passage of lines, control","rect":[246.0,107.48097229003906,343.0128010253906,99.0479736328125]},{"page":473,"text":"measures, 16-9–16-12","rect":[256.0799865722656,116.02197265625,346.56601171875,109.45197296142578]},{"page":473,"text":"forward passage of lines,","rect":[258.95098876953127,128.1809844970703,358.9301921386719,119.74798583984375]},{"page":473,"text":"16-28–16-38","rect":[269.031005859375,136.73098754882813,320.04300146484379,130.15199279785157]},{"page":473,"text":"organization of forces, 16-7–","rect":[258.9419860839844,148.88099670410157,372.96389990234379,140.447998046875]},{"page":473,"text":"16-8","rect":[269.0220031738281,157.4219970703125,286.9770224609375,150.8520050048828]},{"page":473,"text":"planning, 16-13–16-27","rect":[258.9419860839844,169.58094787597657,348.9509909667969,161.2289581298828]},{"page":473,"text":"purpose and defined, 16-1–","rect":[258.9329833984375,179.80494689941407,368.99490576171879,171.470947265625]},{"page":473,"text":"16-6","rect":[269.01300048828127,188.49896240234376,286.9679892578125,181.92897033691407]},{"page":473,"text":"rearward passage of lines,","rect":[258.9599914550781,200.6039581298828,364.38597216796878,192.17095947265626]},{"page":473,"text":"16-39–16-46","rect":[269.03997802734377,209.20498657226563,320.05200415039067,202.62599182128907]},{"page":473,"text":"penetration, control measures,","rect":[245.99099731445313,224.19898986816407,367.496384765625,215.97299194335938]},{"page":473,"text":"2-42–2-43","rect":[256.07098388671877,232.90194702148438,297.06601171875,226.3229522705078]},{"page":473,"text":"organization of forces, 2-37–","rect":[258.9419860839844,244.99794006347657,372.92788916015629,236.56494140625]},{"page":473,"text":"2-41","rect":[269.0220031738281,253.49395751953126,286.9769919433594,247.02296447753907]},{"page":473,"text":"planning and execution, 2-44–","rect":[258.9419860839844,265.6979675292969,379.50598364257817,257.345947265625]},{"page":473,"text":"2-57","rect":[269.0220031738281,274.29296875,286.9769919433594,267.72296142578127]},{"page":473,"text":"purpose, 2-36","rect":[258.9419860839844,286.2989807128906,314.4476950683594,278.04595947265627]},{"page":473,"text":"perimeter defense, control","rect":[245.98199462890626,299.6819763183594,350.42970166015626,291.34796142578127]},{"page":473,"text":"measures, 9-72","rect":[256.0619812011719,308.32196044921877,318.5877097167969,301.751953125]},{"page":473,"text":"executing, 9-82–9-100","rect":[258.9419860839844,320.4809875488281,348.41101293945317,312.12896728515627]},{"page":473,"text":"organization of forces, 9-63–","rect":[258.9329833984375,330.8039855957031,372.9189169921875,322.3709716796875]},{"page":473,"text":"9-71","rect":[269.01300048828127,339.39898681640627,286.9679892578125,332.8289794921875]},{"page":473,"text":"planning, 9-73–9-81","rect":[258.9329833984375,351.5039978027344,338.98889379882817,343.1519775390625]},{"page":473,"text":"purpose and defined, 9-59–","rect":[258.92401123046877,361.781982421875,368.98498754882817,353.4479675292969]},{"page":473,"text":"9-62","rect":[269.0039978027344,370.4219665527344,286.95898657226567,363.8519592285156]},{"page":473,"text":"planning a delay, 11-80–11-85","rect":[245.9639892578125,385.58697509765627,367.5449851074219,377.2349548339844]},{"page":473,"text":"planning a gap crossing, 18-68–","rect":[245.9639892578125,398.9069519042969,374.02499609375,390.554931640625]},{"page":473,"text":"18-69","rect":[256.0439758300781,407.501953125,279.0390036621094,400.93194580078127]},{"page":473,"text":"planning a linkup, 12-2","rect":[245.9639892578125,422.6039733886719,336.4338095703125,414.251953125]},{"page":473,"text":"planning a linkup, via command","rect":[245.9639892578125,435.9869689941406,371.9540732421875,427.6619567871094]},{"page":473,"text":"and control, 12-3–12-4","rect":[256.0439758300781,444.5369567871094,346.5390036621094,437.95794677734377]},{"page":473,"text":"via fires, 12-11","rect":[258.91497802734377,455.0,317.9046042480469,448.1999206542969]},{"page":473,"text":"via intelligence, 12-5","rect":[258.91497802734377,467.00994873046877,340.9356101074219,458.6579284667969]},{"page":473,"text":"via movement and maneuver,","rect":[258.91497802734377,475.5509338378906,377.3630534667969,469.0079345703125]},{"page":473,"text":"12-6–12-10","rect":[268.9949951171875,485.92791748046877,314.97598486328129,479.35791015625]},{"page":473,"text":"via sustainment, 12-12–12-14","rect":[258.91497802734377,496.2509460449219,377.4360068359375,489.6809387207031]},{"page":473,"text":"planning a relief in place, 15-8–","rect":[245.95498657226563,511.41595458984377,371.02078466796879,502.9829406738281]},{"page":473,"text":"15-18","rect":[256.03497314453127,519.9569091796875,279.0300009765625,513.3869018554688]},{"page":473,"text":"planning a troop movement,","rect":[245.95498657226563,535.1219482421875,357.44612231445316,526.7969970703125]},{"page":473,"text":"14-36–14-49","rect":[256.03497314453127,543.6480102539063,306.0869772949219,537.0690307617188]},{"page":473,"text":"planning and preparing a delay,","rect":[246.00299072265626,558.803955078125,372.06059375,550.47900390625]},{"page":473,"text":"and command and control,","rect":[256.0829772949219,567.344970703125,362.52867236328128,560.802001953125]},{"page":473,"text":"11-38–11-39","rect":[256.0829772949219,577.73095703125,307.09500341796879,571.1519775390625]},{"page":473,"text":"and intelligence, 11-40","rect":[258.9539794921875,589.8269653320313,349.4237692871094,581.4749755859375]},{"page":473,"text":"and movement and maneuver,","rect":[258.9539794921875,598.4219970703125,380.99665942382816,591.8790283203125]},{"page":473,"text":"11-45–11-51","rect":[269.03399658203127,608.7449951171875,320.0459921875,602.1749877929688]},{"page":473,"text":"and terrain, 11-41–11-44","rect":[258.9449768066406,619.1220092773438,357.962984375,612.552001953125]},{"page":473,"text":"characteristics of a delay,","rect":[258.9449768066406,631.2269897460938,360.36058154296878,622.7940063476563]},{"page":473,"text":"11-35–11-37","rect":[269.0249938964844,639.8309936523438,320.03698950195317,633.2520141601563]},{"page":473,"text":"preparing considerations,","rect":[258.93597412109377,651.927001953125,359.86558642578128,643.60205078125]},{"page":473,"text":"11-52–11-54","rect":[269.0159912109375,660.52197265625,320.02798681640629,653.9519653320313]},{"page":473,"text":"purpose and defined, 11-29–","rect":[258.9269714355469,672.5280151367188,373.973970703125,664.1940307617188]},{"page":473,"text":"11-34","rect":[269.0069885253906,681.23095703125,292.00198583984379,674.6519775390625]},{"page":473,"text":"see also delay","rect":[258.9269714355469,693.3270263671875,316.4009704589844,685.0020751953125]},{"page":473,"text":"planning for a breach, 18-33–","rect":[245.96697998046876,706.7099609375,363.53396826171879,698.2769775390625]},{"page":473,"text":"18-37","rect":[256.0469665527344,715.2599487304688,279.04199438476567,708.6809692382813]},{"page":473,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":473,"text":"Index","rect":[516.4800415039063,44.55902099609375,540.02401953125,38.016021728515628]},{"page":473,"text":"planning for a passage of lines,","rect":[401.9639892578125,92.97297668457031,526.5284892578125,84.53997802734375]},{"page":473,"text":"16-13–16-27","rect":[412.04400634765627,101.57699584960938,463.05688696289067,94.99799346923828]},{"page":473,"text":"see also forward passage of","rect":[414.91497802734377,113.67298889160156,527.37358203125,105.239990234375]},{"page":473,"text":"lines, rearward passage of","rect":[424.9949951171875,124.04994201660156,530.49028125,115.616943359375]},{"page":473,"text":"lines","rect":[424.9949951171875,132.5909423828125,443.40899658203127,126.04794311523438]},{"page":473,"text":"preparing a delay, 11-86–11-87","rect":[401.95501708984377,147.75599670410157,527.5499594726563,139.4040069580078]},{"page":473,"text":"preparing a troop movement,","rect":[401.95501708984377,161.07594299316407,517.4637309570312,152.75094604492188]},{"page":473,"text":"14-50–14-52,","rect":[412.03497314453127,169.67095947265626,465.52290454101566,163.10096740722657]},{"page":473,"text":"preparing for a linkup, 12-15,","rect":[401.94598388671877,184.77296447753907,516.9111186523437,176.3399658203125]},{"page":473,"text":"via command and control,","rect":[414.906005859375,193.367919921875,517.8857890625,186.82492065429688]},{"page":473,"text":"12-16","rect":[424.98602294921877,203.69091796875,447.9810202636719,197.1209259033203]},{"page":473,"text":"via fires, 12-19","rect":[414.906005859375,214.06793212890626,473.8956015625,207.41693115234376]},{"page":473,"text":"via intelligence, 12-17","rect":[414.906005859375,226.1729278564453,501.90359716796879,217.82093811035157]},{"page":473,"text":"via movement and maneuver,","rect":[414.906005859375,234.7679443359375,533.3541118164062,228.22494506835938]},{"page":473,"text":"12-18","rect":[424.98602294921877,245.0909423828125,447.9810202636719,238.5209503173828]},{"page":473,"text":"via sustainment, 12-20","rect":[414.906005859375,255.4678955078125,505.3829978027344,248.8979034423828]},{"page":473,"text":"preparing for a relief in place,","rect":[401.94598388671877,270.5699768066406,518.4122783203125,262.136962890625]},{"page":473,"text":"15-19–15-22","rect":[412.0260009765625,279.1649169921875,463.0380270996094,272.59490966796877]},{"page":473,"text":"protection in the defense, 8-105","rect":[401.93701171875,294.1679382324219,528.4599326171875,285.83392333984377]},{"page":473,"text":"air and missile defense, 8-","rect":[414.8970031738281,303.0,519.876638671875,296.2109375]},{"page":473,"text":"117–8-118","rect":[424.97698974609377,313.1849060058594,467.95291357421879,306.6148986816406]},{"page":473,"text":"area security, 8-127–8-131","rect":[414.8970031738281,325.2899169921875,522.4380209960938,316.9378967285156]},{"page":473,"text":"detention facilities, 8-125–","rect":[414.89703369140627,334.0,519.404146484375,327.23388671875]},{"page":473,"text":"8-126","rect":[424.9770202636719,344.2078857421875,447.972017578125,337.63787841796877]},{"page":473,"text":"explosive ordnance disposal,","rect":[414.96002197265627,356.2589111328125,530.4093486328125,348.03289794921877]},{"page":473,"text":"8-124","rect":[425.0400390625,364.8988952636719,448.035005859375,358.3288879394531]},{"page":473,"text":"risk management, 8-132–","rect":[414.9599914550781,377.06103515625,516.98398046875,368.7090148925781]},{"page":473,"text":"8-133","rect":[425.03997802734377,385.61102294921877,448.0349753417969,379.0320129394531]},{"page":473,"text":"static position vulnerabilities,","rect":[414.9599914550781,397.6620178222656,528.9197856445312,389.4360046386719]},{"page":473,"text":"8-119–8-123","rect":[425.03997802734377,406.3110046386719,476.0519736328125,399.73199462890627]},{"page":473,"text":"survivability, 8-106–8-116","rect":[414.95098876953127,418.4610290527344,517.4430258789063,410.1090087890625]},{"page":473,"text":"protection warfighting function, air","rect":[401.9909973144531,431.781005859375,536.48967578125,423.3479919433594]},{"page":473,"text":"and missile defense, 1-176–","rect":[412.07098388671877,440.3760070800781,524.597994140625,433.7250061035156]},{"page":473,"text":"1-180","rect":[412.07098388671877,450.6990051269531,435.0659812011719,444.1289978027344]},{"page":473,"text":"antiterrorism, 1-201","rect":[414.95098876953127,461.07598876953127,492.89099340820317,454.5059814453125]},{"page":473,"text":"area security, 1-203–1-207","rect":[414.95098876953127,473.1809997558594,522.4928916015625,464.8289794921875]},{"page":473,"text":"chemical, biological,","rect":[414.95098876953127,483.5580139160156,495.3750163574219,475.2330017089844]},{"page":473,"text":"radiological, and nuclear,","rect":[425.0309753417969,493.8810119628906,525.0038920898437,485.5559997558594]},{"page":473,"text":"1-191–1-193","rect":[425.0309753417969,502.4850158691406,476.0420859375,495.906005859375]},{"page":473,"text":"cyberspace security defense,","rect":[414.9419860839844,514.5809936523438,531.4136821289062,506.14801025390627]},{"page":473,"text":"1-187–1-189","rect":[425.02197265625,523.176025390625,476.03308325195317,516.6060180664063]},{"page":473,"text":"detention operations, 1-195–","rect":[414.9329833984375,535.1820068359375,529.493990234375,526.9290161132813]},{"page":473,"text":"1-197","rect":[425.0129699707031,543.8759765625,448.00796728515629,537.3059692382813]},{"page":473,"text":"electromagnetic protection,","rect":[414.9329833984375,555.98095703125,522.8987895507812,547.656005859375]},{"page":473,"text":"1-182–1-186","rect":[425.0129699707031,564.5759887695313,476.02408056640629,558.0059814453125]},{"page":473,"text":"force health protection, 1-190","rect":[414.9239807128906,576.5819702148438,531.9095786132813,568.2479858398438]},{"page":473,"text":"operations security, 1-208–","rect":[414.9239807128906,587.0579833984375,523.4909995117188,578.7059936523438]},{"page":473,"text":"1-210","rect":[425.0039978027344,595.5989990234375,447.9989951171875,589.0289916992188]},{"page":473,"text":"overview of, 1-171–1-172","rect":[414.9239807128906,606.0,516.3989890136719,599.324951171875]},{"page":473,"text":"personnel recovery, 1-194","rect":[414.9239807128906,618.0809326171875,519.3959677734375,609.7289428710938]},{"page":473,"text":"police operations, 1-202","rect":[414.9239807128906,628.3589477539063,510.91531591796879,620.10595703125]},{"page":473,"text":"population and resources","rect":[414.9239807128906,638.6819458007813,515.8706665039063,630.4559326171875]},{"page":473,"text":"control, 1-181","rect":[425.0039978027344,647.3759765625,479.9696982421875,640.8059692382813]},{"page":473,"text":"risk management, 1-198–","rect":[414.9239807128906,659.48095703125,516.9480002441407,651.1289672851563]},{"page":473,"text":"1-200","rect":[425.0039978027344,668.0759887695313,447.9989951171875,661.5059814453125]},{"page":473,"text":"survivability operations, 1-173–","rect":[414.9239807128906,680.180908203125,539.02499609375,671.8289184570313]},{"page":473,"text":"1-175","rect":[425.00396728515627,688.721923828125,447.9989645996094,682.1519165039063]},{"page":473,"text":"protective obstacles, 17-16–17-17","rect":[401.9999694824219,703.7789306640625,537.4859946289063,695.5259399414063]},{"page":473,"text":"Index-5","rect":[490.4940185546875,754.1790161132813,522.0119956054688,747.635986328125]},{"page":474,"text":"Index","rect":[72.0,44.55902099609375,95.54400091552735,38.016021728515628]},{"page":474,"text":"pursuit, control measures, 7-14–","rect":[72.00299835205078,92.85896301269531,201.02699499511719,84.60602569580078]},{"page":474,"text":"7-17","rect":[82.08299255371094,101.45404052734375,100.03798895263673,94.98303985595703]},{"page":474,"text":"executing, 7-25–7-38","rect":[84.9629898071289,113.65803527832031,169.4550040283203,105.30603790283203]},{"page":474,"text":"organization of forces for a","rect":[84.95399475097656,124.03504943847656,191.5085928955078,115.60205078125]},{"page":474,"text":"combination pursuit, 7-13","rect":[95.03398895263672,134.25904846191407,196.00860815429687,126.00605010986328]},{"page":474,"text":"organization of forces for a","rect":[84.95399475097656,144.7350616455078,191.5094931640625,136.30206298828126]},{"page":474,"text":"frontal pursuit, 7-12","rect":[95.03398895263672,154.95912170410157,172.49072485351562,146.6251220703125]},{"page":474,"text":"organization of forces","rect":[84.9540023803711,165.43507385253907,170.96881103515626,157.0020751953125]},{"page":474,"text":"overview, 7-5–7-11","rect":[95.03399658203125,174.0,171.48990087890625,167.40614318847657]},{"page":474,"text":"planning and preparing, 5-32–","rect":[84.95399475097656,186.13514709472657,204.9779990234375,177.7831573486328]},{"page":474,"text":"5-46, 7-18–7-24","rect":[95.03398132324219,194.6761474609375,159.06897192382812,188.1061553955078]},{"page":474,"text":"purpose and defined, 3-7, 7-1–","rect":[84.9539794921875,206.73609924316407,208.03888159179687,198.402099609375]},{"page":474,"text":"7-4, 7-25–7-26","rect":[95.03398132324219,215.3760986328125,154.0289786376953,208.8061065673828]},{"page":474,"text":"see also offensive operations","rect":[84.94498443603516,227.4361114501953,201.44189453125,219.10211181640626]},{"page":474,"text":"R","rect":[137.39999389648438,243.0,144.63443422698976,235.82568359375]},{"page":474,"text":"raid, purpose and defined, 5-142–","rect":[72.0,258.2820129394531,207.03238134765625,249.947998046875]},{"page":474,"text":"5-146","rect":[82.08000183105469,266.9219970703125,105.07499914550782,260.35198974609377]},{"page":474,"text":"see also attack","rect":[84.95999908447266,277.29901123046877,144.94229125976563,270.7560119628906]},{"page":474,"text":"rail troop movement, defined,","rect":[72.0,292.302001953125,188.4725810546875,283.9679870605469]},{"page":474,"text":"14-15","rect":[82.08000183105469,300.9960021972656,105.07499914550782,294.4259948730469]},{"page":474,"text":"rear cover, 13-123–13-124","rect":[72.0,314.32501220703127,178.51500158691406,307.7460021972656]},{"page":474,"text":"rear guard, 13-97–13-98","rect":[72.0,329.48101806640627,169.51500158691406,321.1289978027344]},{"page":474,"text":"see also guard, security","rect":[84.95999908447266,339.80401611328127,179.99459838867188,331.47900390625]},{"page":474,"text":"operations","rect":[95.03999328613281,350.0820007324219,136.9619903564453,341.8559875488281]},{"page":474,"text":"rearward passage of lines,","rect":[71.99999237060547,363.5010070800781,177.42779650878908,355.0679931640625]},{"page":474,"text":"executing, 16-44–16-46","rect":[82.07999420166016,373.8780212402344,176.59797888183594,365.5260009765625]},{"page":474,"text":"planning, 16-40–16-41","rect":[84.95999908447266,384.2010192871094,174.96901159667969,375.8489990234375]},{"page":474,"text":"preparing, 16-42–16-43","rect":[84.95098876953125,394.5780334472656,178.92000036621094,386.22601318359377]},{"page":474,"text":"purpose, 16-39","rect":[84.94200134277344,404.8020324707031,145.44000463867187,396.54901123046877]},{"page":474,"text":"see also passage of lines","rect":[84.93299865722656,415.27801513671877,185.955322265625,406.8450012207031]},{"page":474,"text":"reconnaissance, information","rect":[71.9729995727539,426.81597900390627,184.46849279785156,420.16497802734377]},{"page":474,"text":"gathering,","rect":[82.05299377441406,438.9750061035156,121.97699084472656,430.6499938964844]},{"page":474,"text":"purpose and defined, 12-1–","rect":[84.93299865722656,449.1990051269531,194.99489050292969,440.864990234375]},{"page":474,"text":"12-2","rect":[95.01300048828125,457.739990234375,112.96799688720704,451.26898193359377]},{"page":474,"text":"see also reconnaissance","rect":[84.93299865722656,468.21600341796877,183.94290380859375,461.6730041503906]},{"page":474,"text":"fundamentals","rect":[95.01300048828125,478.53900146484377,148.99501037597657,471.88800048828127]},{"page":474,"text":"reconstitution, 1-125–1-13","rect":[71.9729995727539,492.0,176.45399694824219,485.35198974609377]},{"page":474,"text":"reduce, B-54","rect":[71.97299194335938,505.2419738769531,123.47098760986329,498.698974609375]},{"page":474,"text":"reinforcing obstacles, 17-10–","rect":[71.97299194335938,520.406982421875,187.49698095703125,511.9739990234375]},{"page":474,"text":"17-11","rect":[82.052978515625,528.8489990234375,105.04798345947266,522.3779907226563]},{"page":474,"text":"relief in place, control measures,","rect":[71.97297668457031,544.013916015625,201.4613505859375,535.679931640625]},{"page":474,"text":"15-7","rect":[82.052978515625,552.6539306640625,100.00798254394532,546.0839233398438]},{"page":474,"text":"executing, 15-23–15-30","rect":[84.9329833984375,564.81298828125,179.4509757080078,556.4609985351563]},{"page":474,"text":"organization of forces, 15-5–","rect":[84.9329833984375,575.135986328125,198.9548819580078,566.7030029296875]},{"page":474,"text":"15-6","rect":[95.01297760009766,583.73095703125,112.96798162841798,577.1609497070313]},{"page":474,"text":"planning, 15-8–15-18","rect":[84.9329833984375,595.8359375,169.97398596191406,587.4839477539063]},{"page":474,"text":"preparing, 15-19–15-22","rect":[84.93297576904297,606.2129516601563,178.90199499511719,597.8609619140625]},{"page":474,"text":"purpose and defined, 15-1–","rect":[84.92398071289063,616.4368896484375,194.98587255859375,608.1029052734375]},{"page":474,"text":"15-4","rect":[95.00398254394531,625.1309814453125,112.9589789428711,618.5609741210938]},{"page":474,"text":"reserve, 1-94–1-100","rect":[71.96398162841797,638.450927734375,152.98196630859375,631.8809204101563]},{"page":474,"text":"retain, B-55","rect":[71.9639892578125,652.0,118.42198400878907,645.2908935546875]},{"page":474,"text":"retirement, control measures,","rect":[71.9639892578125,665.1539306640625,188.91627612304689,658.6109619140625]},{"page":474,"text":"11-102","rect":[82.04398345947266,675.5309448242188,110.01597814941407,668.9609375]},{"page":474,"text":"organization of forces, 11-98–","rect":[84.92398834228516,687.6359252929688,203.98498754882812,679.2029418945313]},{"page":474,"text":"11-101","rect":[95.00399017333985,696.23095703125,122.97598486328126,689.6609497070313]},{"page":474,"text":"purpose and defined, 11-94–","rect":[84.92398834228516,708.2369384765625,199.9709952392578,699.9029541015625]},{"page":474,"text":"11-97","rect":[95.00399017333985,716.930908203125,117.99898748779298,710.3609008789063]},{"page":474,"text":"Index-6","rect":[72.1199951171875,754.1790161132813,103.63799505615235,747.6090087890625]},{"page":474,"text":"Entries are by paragraph number.","rect":[225.0,70.70100402832031,368.95677294921878,62.376007080078128]},{"page":474,"text":"retrograde, purpose and defined,","rect":[227.9609832763672,92.96992492675781,358.93797412109378,84.53692626953125]},{"page":474,"text":"11-1–11-11","rect":[238.04100036621095,101.4659423828125,284.02200537109379,94.99494171142578]},{"page":474,"text":"see also delay, retirement,","rect":[240.92098999023438,113.66993713378906,346.4253093261719,105.34494018554688]},{"page":474,"text":"withdraw","rect":[251.00100708007813,122.264892578125,286.47001538085939,115.72189331054688]},{"page":474,"text":"reverse slope defense, control","rect":[227.96099853515626,137.2678985595703,348.47730908203126,128.93389892578126]},{"page":474,"text":"measures, 9-110","rect":[238.041015625,146.0,305.54370336914067,139.3919219970703]},{"page":474,"text":"executing, 9-111–9-118","rect":[240.92100524902345,158.06690979003907,335.4399130859375,149.7149200439453]},{"page":474,"text":"organization of forces, 9-106–","rect":[240.92100524902345,168.4439239501953,359.98202734375,160.01092529296876]},{"page":474,"text":"9-109","rect":[251.00100708007813,176.98492431640626,273.99597387695317,170.41493225097657]},{"page":474,"text":"purpose and defined, 9-101–","rect":[240.92098999023438,189.04493713378907,355.92752294921879,180.7109375]},{"page":474,"text":"9-105","rect":[251.00100708007813,197.6849365234375,273.99597387695317,191.1149444580078]},{"page":474,"text":"risk management in the defense,","rect":[227.96099853515626,212.8499298095703,358.46727099609378,204.41693115234376]},{"page":474,"text":"8-132–8-133","rect":[238.041015625,221.39993286132813,289.05212622070317,214.82093811035157]},{"page":474,"text":"S","rect":[293.6400146484375,238.740234375,300.3233549537659,231.325439453125]},{"page":474,"text":"screen, control measures, 13-62","rect":[228.0,252.22799682617188,357.0239890136719,245.6490020751953]},{"page":474,"text":"executing a moving screen,","rect":[240.9600067138672,264.3780212402344,350.41258349609378,256.0530090332031]},{"page":474,"text":"13-67–13-70","rect":[251.04000854492188,272.9280090332031,302.05200415039067,266.3489990234375]},{"page":474,"text":"executing a security screen,","rect":[240.9510040283203,285.0780029296875,352.383591796875,276.75299072265627]},{"page":474,"text":"13-63–13-66","rect":[251.031005859375,293.62799072265627,302.04300146484379,287.0489807128906]},{"page":474,"text":"organization of forces, 13-61","rect":[240.94200134277345,305.77801513671877,354.9288046875,297.3450012207031]},{"page":474,"text":"purpose and defined, 13-56–","rect":[240.94200134277345,316.00201416015627,355.9889853515625,307.6679992675781]},{"page":474,"text":"13-58","rect":[251.02200317382813,324.7049865722656,274.01700048828129,318.1259765625]},{"page":474,"text":"screening operations during","rect":[240.94200134277345,336.8009948730469,351.93448095703129,328.4759826660156]},{"page":474,"text":"limited visibility, 13-71","rect":[251.02200317382813,347.1780090332031,338.5199912109375,338.82598876953127]},{"page":474,"text":"tasks, 13-59–13-60","rect":[240.94198608398438,355.7279968261719,317.9369833984375,349.14898681640627]},{"page":474,"text":"screen operations during limited","rect":[227.9819793701172,370.8840026855469,355.50296240234379,362.5589904785156]},{"page":474,"text":"visibility, 13-71","rect":[238.06199645996095,381.2070007324219,297.068697265625,372.85498046875]},{"page":474,"text":"see also security operations,","rect":[240.94198608398438,391.5840148925781,354.90452685546878,383.2590026855469]},{"page":474,"text":"screen","rect":[251.02198791503907,400.125,277.98327856445317,395.2560119628906]},{"page":474,"text":"screen tasks, 13-59–13-60","rect":[227.98199462890626,413.5169982910156,334.50598364257817,406.93798828125]},{"page":474,"text":"search and attack, control","rect":[227.9819793701172,426.8280029296875,330.9905537109375,420.2850036621094]},{"page":474,"text":"measures, 4-54","rect":[238.06198120117188,437.2049865722656,300.5877097167969,430.6619873046875]},{"page":474,"text":"executing, 4-58–4-63","rect":[240.94198608398438,449.30999755859377,325.43399267578129,440.9579772949219]},{"page":474,"text":"organization of forces, 4-52–","rect":[240.9329833984375,459.6329650878906,354.9188864746094,451.199951171875]},{"page":474,"text":"4-53","rect":[251.0129852294922,468.2369689941406,268.9679892578125,461.657958984375]},{"page":474,"text":"planning and preparing, 4-55–","rect":[240.9329833984375,480.3329772949219,360.9569724121094,472.0079650878906]},{"page":474,"text":"4-57","rect":[251.01296997070313,488.927978515625,268.9679587402344,482.3849792480469]},{"page":474,"text":"purpose and defined, 4-50–","rect":[240.9329833984375,500.9339904785156,350.993990234375,492.5999755859375]},{"page":474,"text":"4-51","rect":[251.01296997070313,509.6279602050781,268.9679587402344,503.0579528808594]},{"page":474,"text":"see also movement to contact","rect":[240.9329833984375,519.950927734375,360.4709636230469,513.407958984375]},{"page":474,"text":"secure, B-56","rect":[227.9729766845703,533.333984375,278.9309714355469,526.7639770507813]},{"page":474,"text":"security fundamentals, 13-12–","rect":[227.9729766845703,548.4359130859375,348.536958984375,540.0029296875]},{"page":474,"text":"13-17","rect":[238.052978515625,557.0399169921875,261.04797583007817,550.4609375]},{"page":474,"text":"security in the defense, 8-57","rect":[227.9729766845703,572.1329345703125,340.937349609375,563.699951171875]},{"page":474,"text":"security operations, and aviation","rect":[227.9729766845703,585.5159301757813,356.95825415039067,577.19091796875]},{"page":474,"text":"integration, 13-32","rect":[238.052978515625,595.8389282226563,308.09097509765629,587.4869384765625]},{"page":474,"text":"and engineering, 13-33","rect":[240.92398071289063,606.2159423828125,333.37466650390629,597.8639526367188]},{"page":474,"text":"and fires, 13-31","rect":[240.92398071289063,614.7659301757813,303.46496801757817,608.10595703125]},{"page":474,"text":"and movement, 13-40–13-49","rect":[240.91497802734376,625.1428833007813,356.4389365234375,618.5639038085938]},{"page":474,"text":"and reporting, 13-39","rect":[240.9149627685547,637.2388916015625,321.910494140625,628.8869018554688]},{"page":474,"text":"and sustainment, 13-34–13-37","rect":[240.9149627685547,646.0,363.04495458984379,639.263916015625]},{"page":474,"text":"augmentation to a security","rect":[240.91494750976563,657.9389038085938,346.3580627441406,649.6138916015625]},{"page":474,"text":"force, 13-28–13-29","rect":[250.9949493408203,666.5429077148438,326.9639609375,659.8829345703125]},{"page":474,"text":"commander’s security","rect":[240.90594482421876,678.638916015625,328.374267578125,670.31396484375]},{"page":474,"text":"guidance, 13-18–13-23","rect":[250.98594665527345,689.015869140625,343.46093969726567,680.6638793945313]},{"page":474,"text":"criteria for ending a security","rect":[240.90594482421876,699.3388671875,351.3953552246094,690.9058837890625]},{"page":474,"text":"mission, 13-27","rect":[250.98594665527345,708.0,309.44095068359379,701.3638916015625]},{"page":474,"text":"FM 3-90","rect":[271.26300048828127,754.18798828125,304.76098852539067,747.6090087890625]},{"page":474,"text":"purpose and defined, 13-1–","rect":[396.9029541015625,92.87391662597656,506.96484594726567,84.5399169921875]},{"page":474,"text":"13-11, 13-26, 13-30","rect":[406.98297119140627,101.57687377929688,485.93094091796879,94.99787139892578]},{"page":474,"text":"security area, 13-24, 13-38","rect":[396.9029541015625,113.67292785644531,504.41430883789067,105.32093048095703]},{"page":474,"text":"security fundamentals, 13-12–","rect":[396.9029541015625,124.04994201660156,517.4670126953125,115.616943359375]},{"page":474,"text":"13-17","rect":[406.98297119140627,132.59994506835938,429.9779685058594,126.02094268798828]},{"page":474,"text":"types of, 13-50–13-152","rect":[396.9029541015625,144.74989318847657,489.3779929199219,136.31689453125]},{"page":474,"text":"see area security, cover,","rect":[396.9029846191406,155.07289123535157,494.9210673828125,146.74789428710938]},{"page":474,"text":"guard, screen","rect":[406.98297119140627,165.4499053955078,461.9486716308594,157.12490844726563]},{"page":474,"text":"security screen, 13-63–13-66","rect":[383.9429931640625,178.76991271972657,500.48398046875,170.4179229736328]},{"page":474,"text":"see also screen, security","rect":[396.9029846191406,189.1469268798828,495.8975830078125,180.82192993164063]},{"page":474,"text":"operations","rect":[406.98297119140627,199.3709259033203,448.90496826171877,191.14492797851563]},{"page":474,"text":"seize, B-57","rect":[383.9429931640625,211.0709228515625,428.89798193359379,204.52792358398438]},{"page":474,"text":"spoiling attack, purpose and","rect":[383.9429931640625,226.1729278564453,495.95425634765629,217.84793090820313]},{"page":474,"text":"defined, 5-147–5-150","rect":[394.02301025390627,234.76788330078126,479.5329001464844,228.11688232421876]},{"page":474,"text":"see also attack operations","rect":[396.89398193359377,246.77394104003907,501.389404296875,238.54794311523438]},{"page":474,"text":"static position vulnerabilities in the","rect":[383.9339904785156,260.1569519042969,519.9491904296875,251.93093872070313]},{"page":474,"text":"defense, 8-119–8-123","rect":[394.01397705078127,268.8059387207031,482.0438864746094,262.14593505859377]},{"page":474,"text":"stay behind operations in the","rect":[383.92498779296877,283.9619140625,498.93509130859379,275.63690185546877]},{"page":474,"text":"defense,","rect":[394.0050048828125,292.5028991699219,428.47139086914066,285.8518981933594]},{"page":474,"text":"support by fire, B-58–B-61","rect":[383.92498779296877,307.6679382324219,488.9459860839844,299.23492431640627]},{"page":474,"text":"suppress, B-62","rect":[383.9159851074219,320.888916015625,444.41397314453129,312.6358947753906]},{"page":474,"text":"survivability in the defense,","rect":[383.91595458984377,334.30792236328127,491.871873046875,325.8749084472656]},{"page":474,"text":"8-106–8-116","rect":[393.9959716796875,342.90289306640627,445.00796728515629,336.3328857421875]},{"page":474,"text":"sustainment in the defense, 8-96–","rect":[383.906982421875,356.222900390625,519.4649985351563,349.5718994140625]},{"page":474,"text":"8-104","rect":[393.9869689941406,366.59991455078127,416.98196630859379,360.0299072265625]},{"page":474,"text":"sustainment warfighting function,","rect":[383.906982421875,381.701904296875,514.888474609375,373.2688903808594]},{"page":474,"text":"health service support, 1-159–","rect":[393.9869689941406,391.97991943359377,515.0279868164063,383.7268981933594]},{"page":474,"text":"1-170","rect":[393.9869689941406,400.619873046875,416.98196630859379,394.04986572265627]},{"page":474,"text":"logistics, 1-153–1-158","rect":[396.8669738769531,412.7789001464844,484.84195166015629,404.4268798828125]},{"page":474,"text":"overview of, 1-152","rect":[396.95697021484377,421.3018798828125,470.39697485351567,414.65087890625]},{"page":474,"text":"T–U","rect":[443.5199890136719,438.7102355957031,462.45779848480228,431.4256896972656]},{"page":474,"text":"tactical deception, ambiguity","rect":[384.0,453.98101806640627,496.944580078125,445.656005859375]},{"page":474,"text":"decreasing deception, 19-21–","rect":[394.0799865722656,464.30401611328127,512.6010153808594,455.9519958496094]},{"page":474,"text":"19-22","rect":[394.0799865722656,472.8450012207031,417.0750144042969,466.2749938964844]},{"page":474,"text":"ambiguity increasing","rect":[396.9599914550781,485.0040283203125,478.98779516601567,476.67901611328127]},{"page":474,"text":"deception, 19-20","rect":[407.0400085449219,495.22802734375,474.0809958496094,486.9750061035156]},{"page":474,"text":"physical means, 19-24–19-30","rect":[396.9599914550781,505.7040100097656,515.004,497.35198974609377]},{"page":474,"text":"planning, 19-51–19-54","rect":[396.9599914550781,516.0269775390625,486.9689658203125,507.67498779296877]},{"page":474,"text":"principles, 19-12–19-18","rect":[396.95098876953127,526.3049926757813,490.9199851074219,518.052001953125]},{"page":474,"text":"purpose and defined, 19-6–","rect":[396.9419860839844,536.6279907226563,507.0038779296875,528.2940063476563]},{"page":474,"text":"19-11","rect":[407.02197265625,545.322021484375,430.01700048828129,538.7520141601563]},{"page":474,"text":"risk to, 19-63–19-64","rect":[396.9419860839844,555.6539916992188,476.93399267578129,549.0750122070313]},{"page":474,"text":"technical means, 19-31–19-32","rect":[396.9419860839844,566.0309448242188,517.98300390625,559.4519653320313]},{"page":474,"text":"variations of, 19-33–19-50","rect":[396.9419860839844,576.3539428710938,501.42297583007817,569.6939697265625]},{"page":474,"text":"tactical deception in defensive","rect":[383.98199462890627,591.4110107421875,503.96997290039067,583.0770263671875]},{"page":474,"text":"operations, 19-60–19-62,","rect":[394.0619812011719,601.7340087890625,494.59199633789066,593.4810180664063]},{"page":474,"text":"tactical deception in offensive","rect":[383.98199462890627,615.116943359375,501.45446997070317,606.782958984375]},{"page":474,"text":"operations, 19-55–19-59,","rect":[394.0619812011719,625.43994140625,494.59199633789066,617.1869506835938]},{"page":474,"text":"tactical deception means, physical","rect":[383.98199462890627,638.9219970703125,520.4615620117188,630.5970458984375]},{"page":474,"text":"means, 19-24–19-30","rect":[394.0619812011719,647.4719848632813,477.1139853515625,640.8930053710938]},{"page":474,"text":"purpose and defined, 19-23","rect":[396.9419860839844,659.52294921875,506.9714987792969,651.18896484375]},{"page":474,"text":"technical means, 19-31–19-32","rect":[396.9419860839844,668.1719360351563,517.98300390625,661.5929565429688]},{"page":474,"text":"tactical framework, find the","rect":[383.9819641113281,681.5459594726563,490.962251953125,674.8949584960938]},{"page":474,"text":"enemy, 1-33–1-34","rect":[394.0619812011719,693.6509399414063,467.09695654296879,685.2989501953125]},{"page":474,"text":"finish the enemy, 1-37","rect":[396.9419860839844,704.0279541015625,485.43899755859379,695.594970703125]},{"page":474,"text":"fix the enemy, 1-35–1-36","rect":[396.9599609375,714.323974609375,496.4550192871094,705.8909912109375]},{"page":474,"text":"01 May 2023","rect":[448.4460144042969,755.9609985351563,500.79602270507817,747.510009765625]},{"page":475,"text":"follow through, 1-38–1-42","rect":[102.9540023803711,92.95802307128906,204.96899633789062,84.52496337890625]},{"page":475,"text":"purpose and defined, 1-32","rect":[102.94499969482422,103.23603820800781,207.9344962158203,94.90203857421875]},{"page":475,"text":"tactical mission tasks, overview of","rect":[89.98499298095703,115.0,225.0218974609375,108.2220458984375]},{"page":475,"text":"each tactical mission task, B-3–","rect":[100.06499481201172,125.25906372070313,226.09198217773437,118.68006134033203]},{"page":475,"text":"B-63","rect":[100.06499481201172,135.58206176757813,119.04598455810548,129.00306701660157]},{"page":475,"text":"purpose and defined, 1-84–","rect":[102.94499206542969,147.63307189941407,213.00598364257812,139.299072265625]},{"page":475,"text":"1-85, B-1–B-2","rect":[113.02498626708985,156.27313232421876,169.03198461914062,149.70314025878907]},{"page":475,"text":"tactical movement, defined, 14-4","rect":[89.98499298095703,169.65606689453126,219.99446325683594,163.00506591796876]},{"page":475,"text":"tactical obstacles, 17-12–17-15","rect":[89.98499298095703,183.0,214.56299047851562,176.4060821533203]},{"page":475,"text":"tactical road march, 14-9","rect":[89.98499298095703,196.35906982421876,188.92470007324219,189.78907775878907]},{"page":475,"text":"organization of forces, 14-20–","rect":[102.94499206542969,208.4640655517578,222.00598364257812,200.03106689453126]},{"page":475,"text":"14-25","rect":[113.02498626708985,217.05908203125,136.01997595214844,210.4890899658203]},{"page":475,"text":"tactics in enabling operations,","rect":[89.9849853515625,232.1610870361328,208.43127551269533,223.83609008789063]},{"page":475,"text":"1-23","rect":[100.06498718261719,240.76510620117188,118.01998358154298,234.1861114501953]},{"page":475,"text":"tactics in joint operations, 1-10–","rect":[89.9849853515625,255.85804748535157,216.54300146484375,247.5060577392578]},{"page":475,"text":"1-11","rect":[100.05599975585938,264.35406494140627,118.01099615478516,257.883056640625]},{"page":475,"text":"terminating a delay, 11-93","rect":[89.97599792480469,279.5550842285156,193.97999792480469,271.20306396484377]},{"page":475,"text":"terrain in a delay, 11-41–11-44","rect":[89.97599029541016,292.93804931640627,212.51098852539062,284.5860290527344]},{"page":475,"text":"terrain in countermobility, existing","rect":[89.97598266601563,306.258056640625,223.4639609375,297.93304443359377]},{"page":475,"text":"obstacles, 17-9","rect":[100.05597686767578,315.0,161.01927404785156,308.28302001953127]},{"page":475,"text":"protective obstacles, 17-16–","rect":[102.93598175048828,326.8590393066406,215.45398168945312,318.60601806640627]},{"page":475,"text":"17-17","rect":[113.00697326660156,335.4000244140625,136.00197058105469,328.92901611328127]},{"page":475,"text":"purpose, 17-8","rect":[102.92697143554688,347.55902099609377,158.44888525390625,339.3059997558594]},{"page":475,"text":"reinforcing obstacles, 17-10–","rect":[102.92697143554688,357.98101806640627,218.45096044921875,349.5480041503906]},{"page":475,"text":"17-11","rect":[113.0069580078125,366.4770202636719,136.00195532226562,360.0060119628906]},{"page":475,"text":"tactical obstacles, 17-12–17-15","rect":[102.92696380615235,377.0,227.50496130371094,370.3290100097656]},{"page":475,"text":"terrain in the defense, 8-49–8-56","rect":[89.96696472167969,390.2820129394531,220.54796057128906,383.6310119628906]},{"page":475,"text":"terrain management, area of","rect":[89.96696472167969,405.3840026855469,203.43715014648439,396.95098876953127]},{"page":475,"text":"operations, 1-56–1-57","rect":[100.04696655273438,415.6620178222656,188.0759757080078,407.40899658203127]},{"page":475,"text":"purpose and defined, 1-53–","rect":[102.90896606445313,425.9849853515625,212.96997290039062,417.6509704589844]},{"page":475,"text":"1-55","rect":[112.98896789550781,434.6789855957031,130.94396429443359,428.1089782714844]},{"page":475,"text":"zone and sector, 1-58–1-59","rect":[102.90896606445313,445.0019836425781,212.90696936035156,438.4319763183594]},{"page":475,"text":"01 May 2023","rect":[90.1199951171875,755.9609985351563,142.47000341796875,747.510009765625]},{"page":475,"text":"Entries are by paragraph number.","rect":[243.0,70.70100402832031,386.95677294921878,62.376007080078128]},{"page":475,"text":"transition to offense from the","rect":[245.9459686279297,91.18499755859375,359.941744140625,84.53399658203125]},{"page":475,"text":"defense, 8-138–8-144,","rect":[256.0259704589844,101.57101440429688,346.5299541015625,94.9110107421875]},{"page":475,"text":"transition to retrograde from the","rect":[245.93699645996095,116.66401672363281,371.93069677734379,108.23101806640625]},{"page":475,"text":"defense, 8-145–8-149,","rect":[256.0169982910156,125.259033203125,346.52098193359378,118.6080322265625]},{"page":475,"text":"transition to stability from the","rect":[245.92799377441407,140.3610382080078,360.4062216796875,131.92803955078126]},{"page":475,"text":"defense, 8-150–8-151,","rect":[256.00799560546877,149.0,346.5119792480469,142.3050537109375]},{"page":475,"text":"transitions and the defense,","rect":[245.91900634765626,162.276123046875,356.38951220703128,155.6251220703125]},{"page":475,"text":"considerations, 8-134–8-137","rect":[255.99900817871095,172.66207885742188,370.01101904296879,166.0830841064453]},{"page":475,"text":"transition to offense, 8-138–","rect":[258.8789978027344,183.0,370.44299536132817,176.3250732421875]},{"page":475,"text":"8-144","rect":[268.958984375,193.35308837890626,291.95398168945317,186.78309631347657]},{"page":475,"text":"transition to retrograde, 8-145–","rect":[258.87896728515627,205.4580841064453,382.43997412109379,197.10609436035157]},{"page":475,"text":"8-149","rect":[268.958984375,214.0531005859375,291.95398168945317,207.4831085205078]},{"page":475,"text":"transition to stability, 8-150–","rect":[258.87896728515627,226.15809631347657,370.8353903808594,217.8061065673828]},{"page":475,"text":"8-151","rect":[268.958984375,234.7530517578125,291.95398168945317,228.1830596923828]},{"page":475,"text":"traveling, movement technique,","rect":[245.9189910888672,249.8550567626953,370.90647998046878,241.53005981445313]},{"page":475,"text":"2-18","rect":[255.99899291992188,258.4500732421875,273.95398168945317,251.8800811767578]},{"page":475,"text":"traveling overwatch, movement","rect":[245.9189910888672,273.5520935058594,370.4276591796875,265.2270812988281]},{"page":475,"text":"technique, 2-19","rect":[255.99899291992188,283.8300476074219,318.04321508789067,275.5770263671875]},{"page":475,"text":"troop movement, 14-1,","rect":[245.9189910888672,297.1500549316406,336.4113017578125,288.89703369140627]},{"page":475,"text":"control measures, 14-31–","rect":[258.8789978027344,306.0,360.90298681640629,299.2740173339844]},{"page":475,"text":"14-35","rect":[268.958984375,316.176025390625,291.95398168945317,309.5970153808594]},{"page":475,"text":"executing, 14-53–14-57","rect":[258.87896728515627,328.27203369140627,353.39697485351567,319.9200134277344]},{"page":475,"text":"march techniques, 14-26–","rect":[258.87896728515627,338.550048828125,362.88296728515629,330.2970275878906]},{"page":475,"text":"14-30","rect":[268.958984375,347.1990051269531,291.95398168945317,340.6199951171875]},{"page":475,"text":"methods, 14-10–14-15","rect":[258.87896728515627,357.5670166015625,349.3649619140625,350.99700927734377]},{"page":475,"text":"organization of forces, 14-16–","rect":[258.8699951171875,369.6720275878906,377.931001953125,361.239013671875]},{"page":475,"text":"14-25","rect":[268.9499816894531,378.2669982910156,291.94497900390629,371.6969909667969]},{"page":475,"text":"planning, 14-36–14-49","rect":[258.8699951171875,390.37200927734377,348.879,382.0199890136719]},{"page":475,"text":"preparing, 14-50–14-52","rect":[258.8609924316406,400.7490234375,352.82998876953129,392.3970031738281]},{"page":475,"text":"types of, 14-2–14-9","rect":[258.85198974609377,411.072021484375,336.32400732421879,402.6390075683594]},{"page":475,"text":"troop movement methods, 14-10","rect":[245.89198303222657,424.35601806640627,375.93298559570317,416.1029968261719]},{"page":475,"text":"air movement, 14-13","rect":[258.85198974609377,433.0049743652344,341.3513815917969,426.42596435546877]},{"page":475,"text":"dismounted movement, 14-11","rect":[258.85198974609377,443.37298583984377,377.88415747070317,436.802978515625]},{"page":475,"text":"mounted movement, 14-12","rect":[258.85198974609377,453.69598388671877,366.30298071289067,447.1259765625]},{"page":475,"text":"rail movement, 14-15","rect":[258.9599609375,464.08197021484377,343.43667822265629,457.511962890625]},{"page":475,"text":"FM 3-90","rect":[289.2539978027344,754.18798828125,322.75198583984379,747.6090087890625]},{"page":475,"text":"Index","rect":[516.4800415039063,44.55902099609375,540.02401953125,38.016021728515628]},{"page":475,"text":"water movement, 14-14","rect":[414.9569396972656,91.18499755859375,509.4542868652344,84.61200714111328]},{"page":475,"text":"turn, B-63–B-64","rect":[401.99700927734377,104.57406616210938,465.50100927734379,97.99506378173828]},{"page":475,"text":"turning movement, control","rect":[401.99700927734377,119.66700744628906,505.96501049804689,111.34201049804688]},{"page":475,"text":"measures, 2-74","rect":[412.0769958496094,128.26202392578126,474.6027243652344,121.69202423095703]},{"page":475,"text":"organization of forces, 2-72–","rect":[414.9570007324219,140.36695861816407,528.9438193359375,131.9339599609375]},{"page":475,"text":"2-73","rect":[425.0369873046875,148.97103881835938,442.99197607421879,142.3920440673828]},{"page":475,"text":"planning and execution, 2-75–","rect":[414.9570007324219,161.06703186035157,535.5209677734375,152.7150421142578]},{"page":475,"text":"2-81","rect":[425.0369873046875,169.6619873046875,442.99197607421879,163.0919952392578]},{"page":475,"text":"purpose, 2-71","rect":[414.95697021484377,181.66798400878907,470.46267919921879,173.4149932861328]},{"page":475,"text":"visual depiction of, 2-71","rect":[414.95697021484377,192.0449981689453,509.45425634765629,183.71099853515626]},{"page":475,"text":"types of security operations, 13-50","rect":[401.9969787597656,205.46400451660157,539.4989340820313,197.031005859375]},{"page":475,"text":"see area security, cover,","rect":[414.95697021484377,215.84095764160157,512.9750834960937,207.51596069335938]},{"page":475,"text":"guard, screen","rect":[425.0369873046875,226.16395568847657,480.00268774414067,217.83895874023438]},{"page":475,"text":"types of troop movement, 14-2–","rect":[401.9969787597656,239.54701232910157,528.9789145507813,231.114013671875]},{"page":475,"text":"14-9","rect":[412.07696533203127,248.08795166015626,430.03201513671879,241.51795959472657]},{"page":475,"text":"nontactical movement, 14-3","rect":[414.95697021484377,258.4739685058594,525.4086020507813,251.8949737548828]},{"page":475,"text":"tactical movement, 14-4–14-9","rect":[414.95697021484377,268.7879638671875,533.48691015625,262.21795654296877]},{"page":475,"text":"V","rect":[467.6400146484375,286.02001953125,474.3233549537659,278.845703125]},{"page":475,"text":"vee formation, 2-11–2-12","rect":[402.0,299.6190185546875,502.52099829101567,292.968017578125]},{"page":475,"text":"W–Z","rect":[460.44000244140627,316.8599853515625,481.62228131484985,309.6856689453125]},{"page":475,"text":"water troop movement, defined,","rect":[402.0,332.1419982910156,528.4886943359375,323.8079833984375]},{"page":475,"text":"14-14","rect":[412.0799865722656,340.73699951171877,435.0750144042969,334.2659912109375]},{"page":475,"text":"wedge formation, 2-7–2-8","rect":[402.0,355.93798828125,504.497408203125,347.5049743652344]},{"page":475,"text":"withdraw, control measures, 11-79","rect":[402.0,367.5389709472656,539.5073569335938,360.9689636230469]},{"page":475,"text":"executing, 11-88–11-92","rect":[414.9599914550781,379.64398193359377,509.4779990234375,371.2919616699219]},{"page":475,"text":"organization of forces, 11-75–","rect":[414.9599914550781,390.02099609375,534.0209677734375,381.5879821777344]},{"page":475,"text":"11-78","rect":[425.03997802734377,398.5619812011719,448.035005859375,391.9919738769531]},{"page":475,"text":"planning, 11-80–11-85","rect":[414.9599914550781,410.7209777832031,504.9689658203125,402.36895751953127]},{"page":475,"text":"preparing, 11-86–11-87","rect":[414.95098876953127,421.0439758300781,508.9199851074219,412.69195556640627]},{"page":475,"text":"purpose and defined, 11-71–","rect":[414.9419860839844,431.3219909667969,529.9889853515625,422.98797607421877]},{"page":475,"text":"11-74","rect":[425.02197265625,439.86297607421877,448.01700048828129,433.3919677734375]},{"page":475,"text":"terminating, 11-93","rect":[414.9419860839844,452.1210021972656,487.4369833984375,443.76898193359377]},{"page":475,"text":"see also retrograde","rect":[414.9419860839844,462.4440002441406,492.41397314453129,454.1189880371094]},{"page":475,"text":"Index-7","rect":[490.4940185546875,754.1790161132813,522.0119956054688,747.635986328125]},{"page":476,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":477,"text":"FM 3-90","rect":[478.2960205078125,76.7302017211914,537.9384923248291,64.8433609008789]},{"page":477,"text":"01 May 2023","rect":[467.8699951171875,95.87201690673828,537.9140043945313,84.60401153564453]},{"page":477,"text":"By Order of the Secretary of the Army:","rect":[84.95999908447266,263.274169921875,255.00934552764893,253.76519775390626]},{"page":477,"text":"Official:","rect":[84.9581069946289,405.8368225097656,118.33873700714112,398.3117980957031]},{"page":477,"text":"JAMES C. MCCONVILLE","rect":[350.6710205078125,320.4630126953125,490.01501684570317,311.45098876953127]},{"page":477,"text":"General, United States Army","rect":[356.64801025390627,334.5931701660156,484.0366725921631,325.0942077636719]},{"page":477,"text":"Chief of Staff","rect":[391.4540100097656,344.0722351074219,449.23413800811769,336.5572204589844]},{"page":477,"text":"MARK F.","rect":[84.95999908447266,471.5400085449219,134.9160018310547,462.8160095214844]},{"page":477,"text":"AVERILL","rect":[141.3300018310547,471.5400085449219,192.63000415039063,462.8160095214844]},{"page":477,"text":"Administrative Assistant","rect":[84.96000671386719,483.7702331542969,191.2285532913208,476.3754577636719]},{"page":477,"text":"to the Secretary of the Army","rect":[96.60029602050781,498.1689758300781,221.07774925231935,488.6700134277344]},{"page":477,"text":"2311803","rect":[141.4359893798828,510.80224609375,180.4758291168213,503.3674011230469]},{"page":477,"text":"DISTRIBUTION:","rect":[85.0009994506836,572.7229614257813,174.31701440429689,563.7109985351563]},{"page":477,"text":"Active Army, Army National Guard, and United States Army Reserve. To be distributed in","rect":[85.0009994506836,586.5831909179688,482.69621180725098,577.084228515625]},{"page":477,"text":"accordance with the initial distribution number (IDN) 115848, requirements for FM 3-90.","rect":[85.0009994506836,597.5611572265625,472.1331248245239,588.0621948242188]},{"page":478,"text":"This page intentionally left blank. ","rect":[197.0189971923828,390.1999816894531,417.9100036621094,375.6559753417969]},{"page":480,"text":"PIN: 215087-000","rect":[417.18798828125,760.7552490234375,493.2102804107666,753.3204345703125]}]}