FM 3-98. Reconnaissance and Security Operations

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-98. Reconnaissance and Security Operations FM 3-98 Reconnaissance and Security Operations JULY 2015 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp FM 3-98 Field Manual Headquarters No. 3-98 Department of the Army Washington, DC, -XO\ Reconnaissance and Security Operations Contents Page PREFACE............................................................................................................... v INTRODUCTION ................................................................................................... vi Chapter 1 IMPORTANCE OF RECONNAISSANCE AND SECURITY AND ROLES OF CAVALRY ORGANIZATIONS ........................................................................... 1-1 Section I – Role of the Cavalry Formation in Unified Land Operations ...... 1-1 Section II – Cavalry Employment in Unified Land Operations ..................... 1-5 Cavalry in Unified Land Operations ....................................................................1-5 General Employment of Cavalry Units ............................................................... 1-6 Reconnaissance Considerations at Echelons Above Brigade ........................... 1-7 Brigade Operations Officer and Squadron Employment within the BCT ......... 1-10 Section III – Organizations............................................................................. 1-17 Brigade Combat Team ..................................................................................... 1-18 Cavalry Squadrons ........................................................................................... 1-19 Cavalry Troops ................................................................................................. 1-19 Scout Platoon ................................................................................................... 1-20 Chapter 2 THREAT ............................................................................................................. 2-1 Section I – Understanding the Threat ............................................................. 2-1 Enemies and Adversaries................................................................................... 2-2 Section II – Potential Threat Groups .............................................................. 2-3 States .................................................................................................................. 2-3 Section III – Threat Characteristics and Organization .................................. 2-4 Threat Capabilities, Tactics, and Techniques .................................................... 2-5 Countering Adaptations and Retaining the Initiative .......................................... 2-7 Chapter 3 SHAPE, ENGAGE, AND CONSOLIDATE GAINS ............................................ 3-1 Section I – Understanding the Operational Environment ............................ 3-1 Section II – Shaping the Environment ............................................................ 3-3 Section III - Engagement Activities ................................................................. 3-4 Section IV – Influence ...................................................................................... 3-6 Section V – Consolidation of Gains ................................................................ 3-6 Distribution Restriction: Approved for public release; distribution is unlimited. i Contents Chapter 4 MISSION COMMAND ......................................................................................... 4-1 Section I – Mission Command For Reconnaissance and Security .............. 4-1 Mission Command ..............................................................................................4-1 Reconnaissance and Security Operations ..........................................................4-2 Section II – Exercise of Mission Command .................................................... 4-4 The Operations Process .....................................................................................4-4 Section III – Integrating Processes and Continuing Activities ................... 4-23 Intelligence Preparation of the Battlefield .........................................................4-24 Targeting ...........................................................................................................4-24 Timely Reporting and Assessment ...................................................................4-24 Update the Collection Plan ...............................................................................4-26 Screen Reports ................................................................................................. 4-26 Correlate Reports to Requirements ..................................................................4-26 Provide Feedback and Revise Scheme of Maneuver .......................................4-27 Chapter 5 RECONNAISSANCE .......................................................................................... 5-1 Section I – Fundamentals, Methods, and Management ................................ 5-1 Fundamentals .....................................................................................................5-1 Reconnaissance Techniques ..............................................................................5-2 Reconnaissance Methods ...................................................................................5-2 Reconnaissance Management ...........................................................................5-4 Reconnaissance Assets and Systems ................................................................5-4 Section II – Forms of Reconnaissance ........................................................... 5-6 Zone Reconnaissance ........................................................................................5-6 Area Reconnaissance .......................................................................................5-16 Route Reconnaissance .....................................................................................5-18 Reconnaissance in Force .................................................................................5-21 Special Reconnaissance ...................................................................................5-21 Section III – Reconnaissance Handover ....................................................... 5-22 Chapter 6 SECURITY .......................................................................................................... 6-1 Section I – Fundamentals of Security ............................................................. 6-1 Security ...............................................................................................................6-1 Fundamentals .....................................................................................................6-2 Commander’s Security Guidance .......................................................................6-2 Section II – Counterreconnaissance ............................................................... 6-3 Section III – Forms of Security ........................................................................ 6-4 Screen .................................................................................................................6-5 Guard ................................................................................................................6-11 Cover .................................................................................................................6-19 Area Security .....................................................................................................6-26 Local Security ....................................................................................................6-31 Chapter 7 STABILITY TASKS ............................................................................................ 7-1 Section I – Reconnaissance and Security ...................................................... 7-1 Cavalry Units Role ..............................................................................................7-2 Support to Reconnaissance and Security During Stability ................................. 7-3 Sustainment ........................................................................................................7-6 ii FM 3-98 1 JXO\ 2015 Contents Interdependent Capabilities ................................................................................7-7 Section II – Principles and Framework ........................................................... 7-8 Section III – Tasks ............................................................................................ 7-9 Chapter 8 SUSTAINMENT .................................................................................................. 8-1 Section I – Reconnaissance and Security Tasks .......................................... 8-1 Section II – Planning for Reconnaissance and Security Tasks ................... 8-1 Planning Fundamentals and Procedures ........................................................... 8-2 Logistics .............................................................................................................. 8-3 Personnel Services ............................................................................................. 8-5 Support Areas .....................................................................................................8-7
Recommended publications
  • Pof: Proof-Of-Following for Vehicle Platoons
    Verification of Platooning using Large-Scale Fading Ziqi Xu* Jingcheng Li* Yanjun Pan University of Arizona University of Arizona University of Arizona [email protected] [email protected] [email protected] Loukas Lazos Ming Li Nirnimesh Ghose University of Arizona University of Arizona University of Nebraska–Lincoln [email protected] [email protected] [email protected] Abstract—Cooperative vehicle platooning significantly im- I am AV proves highway safety, fuel efficiency, and traffic flow. In this 2 and I follow AV model, a set of vehicles move in line formation and coordinate 1 acceleration, braking, and steering using a combination of path physical sensing and vehicle-to-vehicle (V2V) messaging. The candidate verifier authenticity and integrity of the V2V messages are paramount to platooning AV AV safety. For this reason, recent V2V and V2X standards support 2 distance 1 the integration of a PKI. However, a PKI cannot bind a vehicle’s digital identity to the vehicle’s physical state (location, velocity, Fig. 1: Platooning of AV1 and AV2: The AV1 acts as a verifier etc.). As a result, a vehicle with valid cryptographic credentials to validate AV2’s claim that it follows the platoon. can impact platoons from a remote location. In this paper, we seek to provide the missing link between the However, the complex integration of multi-modal physical physical and the digital world in the context of vehicle platooning. sensing, computation, and communication creates a particu- We propose a new access control protocol we call Proof-of- larly challenging environment to safeguard. The safety of the Following (PoF) that verifies the following distance between a platoon relies on the veracity of the V2V messages exchanged candidate and a verifier.
    [Show full text]
  • The Army Counterintelligence Program
    Army Regulation 381–20 Military Intelligence The Army Counterintelligence Program Distribution Restriction Statement. This regulation contains operational information for official Government use only. Distribution is limited to U.S. Government agencies. Requests from outside the U.S. Government for release of this regulation under the Freedom of Information Act or Foreign Military Sales Program must be made to HQDA (DAMI–CIC), Washington, DC 20310–1054. Destruction Notice. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters Department of the Army Washington, DC 15 November 1993 UNCLASSIFIED SUMMARY of CHANGE AR 381–20 The Army Counterintelligence Program This revision-- o Expands investigative responsibilities to all Army counterintelligence units (CI), and specifies investigative jurisdictions (chap 2). o Establishes the CI control office system (chap 3). o Clarifies collection authority (chap 6). o Requires CI analysis and production at all levels with staff capability (chap 7). o Permanently issues badges and credentials to CI personnel serving in designated assignments (para 9-4). o Provides authority for conducting intelligence polygraphs (para 10-2). Headquarters *Army Regulation 381–20 Department of the Army Washington, DC 15 November 1993 Effective 15 December 1993 Military Intelligence The Army Counterintelligence Program regulation also applies to all Army intelli- FN 381-20l, Counterintelligence surveys gence components, other military person- and inspections n e l a n d c i v i l i a n p e r s o n n e l o f t h e F N 3 8 1 - 2 0 m , L o c a l i n t e l l i g e n c e , c o u n - Department of the Army when they en- terintelligence, and security files gage in counterintelligence activities, and F N 3 8 1 - 4 5 c , D O D - a f f i l i a t e d p e r s o n n e l members of the U.S.
    [Show full text]
  • THE SPY WHO FIRED ME the Human Costs of Workplace Monitoring by ESTHER KAPLAN
    Garry Wills on the u A Lost Story by u William T. Vollmann Future of Catholicism Vladimir Nabokov Visits Fukushima HARPER’S MAGAZINE/MARCH 2015 $6.99 THE SPY WHO FIRED ME The human costs of workplace monitoring BY ESTHER KAPLAN u A GRAND JUROR SPEAKS The Inside Story of How Prosecutors Always Get Their Way BY GIDEON LEWIS-KRAUS GIVING UP THE GHOST The Eternal Allure of Life After Death BY LESLIE JAMISON REPORT THE SPY WHO FIRED ME The human costs of workplace monitoring By Esther Kaplan ast March, Jim data into metrics to be Cramer,L the host of factored in to your per- CNBC’s Mad Money, formance reviews and devoted part of his decisions about how show to a company much you’ll be paid. called Cornerstone Miller’s company is OnDemand. Corner- part of an $11 billion stone, Cramer shouted industry that also at the camera, is “a includes workforce- cloud-based-software- management systems as-a-service play” in the such as Kronos and “talent- management” “enterprise social” plat- field. Companies that forms such as Micro- use its platform can soft’s Yammer, Sales- quickly assess an em- force’s Chatter, and, ployee’s performance by soon, Facebook at analyzing his or her on- Work. Every aspect of line interactions, in- an office worker’s life cluding emails, instant can now be measured, messages, and Web use. and an increasing “We’ve been manag- number of corporations ing people exactly the and institutions—from same way for the last cosmetics companies hundred and fifty to car-rental agencies— years,” Cornerstone’s are using that informa- CEO, Adam Miller, tion to make hiring told Cramer.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • Failure in 1813: the Decline of French Light Infantry and Its Effect on Napoleon’S German Campaign
    United States Military Academy USMA Digital Commons Cadet Senior Theses in History Department of History Spring 4-14-2018 Failure in 1813: The eclineD of French Light Infantry and its effect on Napoleon's German Campaign Gustave Doll United States Military Academy, [email protected] Follow this and additional works at: https://digitalcommons.usmalibrary.org/history_cadet_etd Part of the European History Commons, and the Military History Commons Recommended Citation Doll, Gustave, "Failure in 1813: The eD cline of French Light Infantry and its effect on Napoleon's German Campaign" (2018). Cadet Senior Theses in History. 1. https://digitalcommons.usmalibrary.org/history_cadet_etd/1 This Bachelor's Thesis is brought to you for free and open access by the Department of History at USMA Digital Commons. It has been accepted for inclusion in Cadet Senior Theses in History by an authorized administrator of USMA Digital Commons. For more information, please contact [email protected]. United States Military Academy USMA Digital Commons Cadet Senior Theses in History Department of History Spring 4-14-2018 Failure in 1813: The eclineD of French Light Infantry and its effect on Napoleon's German Campaign Gustave Doll Follow this and additional works at: https://digitalcommons.usmalibrary.org/history_cadet_etd UNITED STATES MILITARY ACADEMY FAILURE IN 1813: THE DECLINE OF FRENCH LIGHT INFANTRY AND ITS EFFECT ON NAPOLEON’S GERMAN CAMPAIGN HI499: SENIOR THESIS SECTION S26 CPT VILLANUEVA BY CADET GUSTAVE A DOLL, ’18 CO F3 WEST POINT, NEW YORK 19 APRIL 2018 ___ MY DOCUMENTATION IDENTIFIES ALL SOURCES USED AND ASSISTANCE RECEIVED IN COMPLETING THIS ASSIGNMENT. ___ NO SOURCES WERE USED OR ASSISTANCE RECEIVED IN COMPLETING THIS ASSIGNMENT.
    [Show full text]
  • Did Meade Begin a Counteroffensive After Pickett's Charge?
    Did Meade Begin a Counteroffensive after Pickett’s Charge? Troy D. Harman When examining the strategy of Union Major General George Gordon Meade at the battle of Gettysburg, one discovers lingering doubts about his leadership and will to fight. His rivals viewed him as a timid commander who would not have engaged at Gettysburg had not his peers corralled him into it. On the first day of the battle, for instance, it was Major General John Fulton Reynolds who entangled the left wing of the federal army thirty miles north of its original defensive position at Westminster, Maryland. Under the circumstances, Meade scrambled to rush the rest of his army to the developing battlefield. And on the second day, Major General Daniel Sickles advanced part of his Union 3rd Corps several hundred yards ahead of the designated position on the army’s left, and forced Meade to over-commit forces there to save the situation. In both instances the Union army prevailed, while the Confederate high command struggled to adjust to uncharacteristically aggressive Union moves. However, it would appear that both outcomes were the result of actions initiated by someone other than Meade, who seemed to react well enough. Frustrating to Meade must have been that these same two outcomes could have been viewed in a way more favorable to the commanding general. For example, both Reynolds and Sickles were dependent on Meade to follow through with their bold moves. Though Reynolds committed 25,000 Union infantry to fight at Gettysburg, it was Meade who authorized his advance into south-central Pennsylvania.
    [Show full text]
  • Measuring the Effectiveness of Special Operations for More Information on This Publication, Visit
    C O R P O R A T I O N LINDA ROBINSON, DANIEL EGEL, RYAN ANDREW BROWN Measuring the Effectiveness of Special Operations For more information on this publication, visit www.rand.org/t/RR2504 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0174-8 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Special Operations Forces (SOF) Measures of Effec- tiveness, sponsored by U.S. Army Special Operations Command.
    [Show full text]
  • TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O
    TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O’CONNOR & PETER STRAUGHAN Based on the novel by John le Carré 1. 1 EXT. HUNGARY - BUDAPEST - 1973 - DAY 1 Budapest skyline, looking towards the Parliament building. From here the world looks serene, peaceful. Then, as we begin to PULL BACK, we hear a faint whine, increasing in volume, until it’s the roar of two MiG jet fighters, cutting across the skyline. The PULL BACK reveals a YOUNG BOY watching the jets, exclaiming excitedly in Hungarian. 2 EXT. BUDAPEST STREET - DAY 2 LATERALLY TRACKING down a bustling street, as the jets scream by overhead. Pedestrians look up. All except one man who continues walking. This is JIM PRIDEAUX. ACROSS THE STREET: More pedestrians. We’re not sure who we’re supposed to be looking at - the short stocky man? The girl in the mini skirt? The man in the checked jacket? A car driving beside Prideaux accelerates out of the frame. Across the street the girl in the mini-skirt peels off into a shop. The stocky man turns and waves to us. But it isn’t Prideaux he’s greeting but another passerby, who walks over, shakes hands. Now we’re left with Prideaux and the Magyar in the checked shirt, neither paying any attention to each other. Just as we are wondering if there is any connection, the two reach a corner and the Magyar, pausing to cross the road, collides with another passerby. He looks over and sees Prideaux has caught the moment of slight clumsiness and gives the smallest of rueful smiles.
    [Show full text]
  • Ausa Background Brief (
    AUSA BACKGROUND BRIEF ( No. 42 April 1992 SPECIAL OPERATIONS FORCES: A PRIMER Introduction A small but critical portion of the Total Force is made up of the special operations forces (SOF) of the Army, Navy and Air Force, which are comprised of special operations, psychological operations and civil affairs organizations. Special operations forces are task organized to conduct contingency operations. Special operations forces are designed to augment theater-based forces and, in response to a crisis situation, normally operate with an appropriate mix of conventional forces under theater control. ( Almost all SOF missions require joint planning; also, they are used for missions with allied or coalition forces as well as for a number of ongoing ground missions in many countries. U.S. Special Operations Command The joint nature ofSOF operations was recognized in the establishment of a permanent unified command, the U.S. Special Operations Command (USSOCOM). The USSOCOM commander-in­ chief commands all active and reserve Special Operations, Psychological Operations and Civil Affairs forces of the Army, Navy and Air Force (about 47,000 personnel). USSOCOM supports other unified commands responsible for crisis responses in their respective geographic areas of responsibility. The U.S. Special Operations Command is composed of four subordinate commands: U.S. Army Special Operations Command, Naval Special Warfare Command, Air Force Special Opera­ tions Command and Joint Special Operations Command. U.S. Army Special Operations Command (USASOC), headquartered at Fort Bragg, North Carolina, is composed of active component and reserve component Army forces consisting of Special Forces groups, a Ranger regiment, Psychological Operations groups, a Special Operations Aviation regiment, Civil Affairs commands, and special operations signal and support units.
    [Show full text]
  • FM 3-05. Army Special Operations Forces
    FM 3-05 (FM 100-25) Army Special Operations Forces September 2006 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 10 July 2006. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-5000, or by e-mail to [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. FOREIGN DISCLOSURE RESTRICTION (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. Headquarters, Department of the Army *FM 3-05 (FM 100-25) Field Manual Headquarters No. 3-05 (100-25) Department of the Army Washington, DC, 20 September 2006 Army Special Operations Forces Contents Page PREFACE...............................................................................................................v Purpose ..................................................................................................................v Scope......................................................................................................................v
    [Show full text]
  • Blood Bowl Rulebook 2016 with Errata Well After One and a Half Decade, Games Workshop Has Officially Re-Released Blood Bowl
    Blood Bowl 2016 October 2017 ★ BLOOD BOWL Rules Included: ● Bugman’s Star Players (May 2016) ● Rulebook (November 2016) ● Death Zone Season 1! (November 2016) ● Early Bird Special Play card (2016) ● Match Events (App December 2016) ● Winter Weather Table (Winter Pitch January 2017) ● Subterranean Stadium Conditions (Dwarf/Skaven Pitch January 2017) ● Warhammer Open Special Play card (January 2017) ● Referees (White Dwarf January 2017) ● Errata and FAQ(pdf May 2017) ● Winterbowl Inducements (January 2017) ● Savage Orcs, Human Nobility, Star Players, Inducements, Match Events (App, February 2017) ● Blitzmania Kick-off table (App update, February 2017) ● Blitzmania Special Play cards (League Event February 2017) ● Special Play Variant rules v3 (pdf, April 2017) ● Team-specific ball rules (White Dwarf March 2017) ● White Dwarf and Black Gobbo (White Dwarf May 2017) ● Death Zone Season 2! (May 2017) ● Dwarf Slayer Hold, Skaven Pestilent Vermin, Star Players, Inducements, Match Events (App, May 2017) ● Gobbo balls (White Dwarf June 2017) ● Updated Grak & Crumbleberry rules (PDF July 2017) ● Special Play Card “Gassy Eurption”, Warhammer World Exclusive (August 2017) Limitations and decisions: These rules are a collection of all new Blood Bowl rules merged together with previous Living Rulebook version 6. Please note that some of these rules are optional and have limited to no play testing. Some optional rules and play cards from the previous edition are also supplied here for reference. Minor modifications by the author: ● Added “apply to both teams” for some Blitzmania kick-off table results if a result required a roll from both players and the result would be a tie. ● Added limited duration for some match events which originally had no limit and severely affected the game.
    [Show full text]
  • Role Playing U.S. Special Operations Military Soldiers in the Modern Era a Monograph for the Basic Roleplaying System by Chaosium Inc
    SPECIAL OPERATIONS MANUAL Role Playing U.S. Special Operations Military Soldiers in the modern era A Monograph for the Basic RolePlaying System by Chaosium Inc. By Jason Graham and Stephen Baron No part of this book may be reproduced in any manner without written permission from the author or publisher. 1 SPECIAL OPERATIONS MANUAL “We sleep soundly in our beds because rough men stand ready in the night to visit violence on those who would do us harm.” This book is dedicated to the proud men and women of the U.S. Military 2 SPECIAL OPERATIONS MANUAL CONTENTS INTRODUCTION – 4 ARMY RANGERS – 6 ARMY SPECIAL FORCES – 8 NAVY SEALS – 10 MARINE CORPS MARSOC – 12 ARMY DELTA FORCE – 14 NAVY DEVGRU – 16 AIR FORCE PARARESCUE – 18 PRIVATE MILITARY CONTRACTOR – 20 CIA S.O.G. – 22 UNITS FROM OTHER COUNTRIES - 24 SKILLS – 28 OFFICER SCHOOL – 30 ARMOR – 31 EQUIPMENT – 32 WEAPONS – 33 CHARACTER SHEET - 34 MISSION BRIEFINGS – 36 SCENARIO SEEDS - 39 MEDAL OF HONOR RECIPIENTS – 40 RECOMMENDED READING – 46 RECOMMENDED VIEWING – 47 3 SPECIAL OPERATIONS MANUAL INTRODUCTION Special Operations soldiers are a unique the most realistic way possible within the breed. Determined, highly intelligent and confines of the BRP system. specially trained problem solvers who train This supplement is intended for an action constantly to risk their lives protecting oriented campaign where the extra weapons citizens who will never know who they are. and combat skills will be not only desirable These brave men, known as “Operators” do but essential. The characters outlined here not expect parades for their service, in fact, should be far above normal human they know that, should the worst happen, not characters in almost every aspect, combining even their loved ones will be given details of the physical prowess of Olympic level their final mission.
    [Show full text]