JP 3-05.1 Joint Special Operations Task Force Operations

Total Page:16

File Type:pdf, Size:1020Kb

JP 3-05.1 Joint Special Operations Task Force Operations Joint Publication 3-05.1 Joint Special Operations Task Force Operations 26 April 2007 PREFACE 1. Scope This publication provides joint doctrine for organizing, planning, preparing, and executing joint special operations task force (JSOTF) operations to include targeting and mission planning. It also provides guidance for establishing command relationships normally associated with a JSOTF or theater special operations command. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, and the Services. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the Chairman of the Joint Chiefs of Staff, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the i Preface United States, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: WALTER L. SHARP Lieutenant General, USA Director, Joint Staff ii JP 3-05.1 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-05.1 DATED 1 DECEMBER 2001 • Consolidates Joint Publication (JP) 3-05.1, Joint Tactics, Techniques, and Procedures for Joint Special Operations Task Force Operations, and JP 3-05.2, Joint Tactics, Techniques, and Procedures for Special Operations Targeting and Mission Planning • Updates special operations (SO) joint doctrine • Reflects the change from SO missions and collateral activities to core tasks • Reflects the inclusion of special operations forces and conventional forces integration • Updates a joint special operations task force (JSOTF) headquarters organization and responsibilities • Clarifies JSOTF command and control relationships • Includes an expanded discussion of SO targeting and mission planning • Reflects current joint doctrine as pertains to contingency and crisis action planning • Updates joint doctrine that pertains to JSOTF planning, operations, intelligence, logistics, and communications • Deletes the chapter on training, exercises, and assessments • Adds a chapter on information management iii Summary of Changes Intentionally Blank iv JP 3-05.1 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY ................................................................................................ xi CHAPTER I DOCTRINAL OVERVIEW OF JOINT SPECIAL OPERATIONS • Special Operations Forces .......................................................................................... I-1 • Special Operations ..................................................................................................... I-1 • United States Special Operations Command ............................................................... I-1 • Joint Special Operations............................................................................................. I-2 • Special Operations Forces Shape Environment and Set Conditions............................. I-3 • Integration of Special Operations Forces and Conventional Forces ............................. I-4 CHAPTER II JOINT SPECIAL OPERATIONS TASK FORCE ORGANIZATION • General .................................................................................................................... II-1 • Authority to Establish a Joint Special Operations Task Force .................................... II-1 • Establishing a Joint Special Operations Task Force .................................................. II-2 • Organizing a Joint Special Operations Task Force Headquarters ............................... II-3 • Joint Special Operations Task Force Headquarters Staff Functions and Responsibilities .............................................................................................. II-6 • Boards, Centers, and Cells ...................................................................................... II-28 • Joint Special Operations Task Force Headquarters Staff Checklists ......................... II-28 • Notional Joint Special Operations Task Force Headquarters Standing Operating Procedure Outline ............................................................................... II-28 CHAPTER III COMMAND AND CONTROL • General ................................................................................................................... III-1 • Command Relationships ......................................................................................... III-2 • Joint Special Operations Task Force Command and Control Considerations ............ III-2 • Joint Special Operations Task Force Command and Control of Assigned Forces...... III-3 • Special Operations Forces and Conventional Forces Integration .............................. III-7 • Logistic Support Relationships.............................................................................. III-16 • Interagency Coordination Considerations .............................................................. III-17 • Multinational Command and Control Considerations ............................................ III-18 v Table of Contents CHAPTER IV PLANNING • General ................................................................................................................... IV-1 • Joint Special Operations Planning Considerations ................................................... IV-1 • Special Operations Integration into Joint Planning and Targeting ............................. IV-5 • Special Operations Contingency Planning and Targeting ....................................... IV-15 • Special Operations Crisis Action Mission Planning and Targeting ......................... IV-22 CHAPTER V OPERATIONS • General ..................................................................................................................... V-1 • Joint Operations Center ............................................................................................. V-1 • Operational Rehearsals ............................................................................................. V-2 • Mission Execution .................................................................................................... V-4 • Information Operations ............................................................................................. V-4 • Joint Fires ................................................................................................................. V-5 • Combat Identification ............................................................................................... V-9 • Types of Operational Support Available to a Joint Special Operations Task Force .... V-10 • Force Protection...................................................................................................... V-11 • Operations Messages .............................................................................................. V-13 CHAPTER VI INTELLIGENCE • General ................................................................................................................... VI-1 • National Level Intelligence Support ........................................................................ VI-1 • Theater Level Intelligence Support.......................................................................... VI-3 • Joint Force Commander-Level Intelligence Support ................................................ VI-4 • Joint Special Operations Task Force Joint Intelligence Support Element .................. VI-6 • Joint Special Operations Task Force Intelligence Operations Relative to the Intelligence Process ............................................................................................. VI-8 • Counterintelligence ............................................................................................... VI-12 • Intelligence Support to the Targeting and Mission Planning Process ...................... VI-13 • Multinational Intelligence Operations ................................................................... VI-15 CHAPTER VII LOGISTIC SUPPORT • General .................................................................................................................
Recommended publications
  • Data Preparation & Descriptive Statistics
    Data Preparation & Descriptive Statistics (ver. 2.4) Oscar Torres-Reyna Data Consultant [email protected] PU/DSS/OTR http://dss.princeton.edu/training/ Basic definitions… For statistical analysis we think of data as a collection of different pieces of information or facts. These pieces of information are called variables. A variable is an identifiable piece of data containing one or more values. Those values can take the form of a number or text (which could be converted into number) In the table below variables var1 thru var5 are a collection of seven values, ‘id’ is the identifier for each observation. This dataset has information for seven cases (in this case people, but could also be states, countries, etc) grouped into five variables. id var1 var2 var3 var4 var5 1 7.3 32.27 0.1 Yes Male 2 8.28 40.68 0.56 No Female 3 3.35 5.62 0.55 Yes Female 4 4.08 62.8 0.83 Yes Male 5 9.09 22.76 0.26 No Female 6 8.15 90.85 0.23 Yes Female 7 7.59 54.94 0.42 Yes Male PU/DSS/OTR Data structure… For data analysis your data should have variables as columns and observations as rows. The first row should have the column headings. Make sure your dataset has at least one identifier (for example, individual id, family id, etc.) id var1 var2 var3 var4 var5 First row should have the variable names 1 7.3 32.27 0.1 Yes Male 2 8.28 40.68 0.56 No Female Cross-sectional data 3 3.35 5.62 0.55 Yes Female 4 4.08 62.8 0.83 Yes Male 5 9.09 22.76 0.26 No Female 6 8.15 90.85 0.23 Yes Female 7 7.59 54.94 0.42 Yes Male id year var1 var2 var3 1 2000 7 74.03 0.55 Group 1 1 2001 2 4.6 0.44 At least one identifier 1 2002 2 25.56 0.77 2 2000 7 59.52 0.05 Cross-sectional time series data Group 2 2 2001 2 16.95 0.94 or panel data 2 2002 9 1.2 0.08 3 2000 9 85.85 0.5 Group 3 3 2001 3 98.85 0.32 3 2002 3 69.2 0.76 PU/DSS/OTR NOTE: See: http://www.statistics.com/resources/glossary/c/crossdat.php Data format (ASCII)… ASCII (American Standard Code for Information Interchange).
    [Show full text]
  • Armored Medical Units. B
    U.S WAR DEPT, AHMQRSD MEDICAL UNITS. Fk 17-80. El Ml WAR DEPARTMENT FIELD MANUAL ARMORED MEDICAL UNITS WAR DEPARTMENT 30 AUGUST 1944 IV A R D E P A R T M E N T FIE L D M A ,V U A L F M 17-80 ARMORED MEDICAL UNITS WA R D E PA R T M E N T ■ 3 0 AUGUST 1944 RESTRICTED, dissemination of restricted infer- motion contained in restricted documents and the essential characteristics of restricted material may be given to any person known to be in the service of the United States and to persons of undoubted loyalty and discretion who are cooperating in Government work, but will not be communicated to the public or to the press except by authorized military public relations agencies (See also par. 23b, AR 380-5, 1 5 Mar 1944.) United States Government Printing Office Washington: 1944 WAR DEPARTMENT, Washington 25, D.C., 30 August 1944. EM 17-80, Armored Field Manual, Medical Units, Ar- mored, is published for the information and guidance of all concerned. [A.G. SCO.7 (28 Jul 44).] order of the Secretary of War G. C. MARSHALL, Chief of Staff. Official: J. A. ULIO, Major General, The Adjutant General, Distribution : As prescribed in paragraph 9a, FM 21-6 except Gen & Sp Sv Schs (5) except Armd Sch (400), D 2, 7(5), 17(10); Bn 17(20); I Bn 2(25), 5(15), 6(20), 7(20), 8(60), 9(15); IC 6, 11, 17(5). IBn2:T/0&E 2-25; I Bn 5: T/O & E 5-215; I Bn 6: T/O &E 6-165; IBn7:T/0&E 7-25; I Bn 8: T/O &E 8-75; IBn9:T/0&E 9-65; IC 6: T/O & E 6-160-1; IC 11: T/O &E 11-57; IC 17: T/O & E 17-20-1; 17-22; 17-60-1.
    [Show full text]
  • Full Document
    R&D Centre for Mobile Applications (RDC) FEE, Dept of Telecommunications Engineering Czech Technical University in Prague RDC Technical Report TR-13-4 Internship report Evaluation of Compressibility of the Output of the Information-Concealing Algorithm Julien Mamelli, [email protected] 2nd year student at the Ecole´ des Mines d'Al`es (N^ımes,France) Internship supervisor: Luk´aˇsKencl, [email protected] August 2013 Abstract Compression is a key element to exchange files over the Internet. By generating re- dundancies, the concealing algorithm proposed by Kencl and Loebl [?], appears at first glance to be particularly designed to be combined with a compression scheme [?]. Is the output of the concealing algorithm actually compressible? We have tried 16 compression techniques on 1 120 files, and the result is that we have not found a solution which could advantageously use repetitions of the concealing method. Acknowledgments I would like to express my gratitude to my supervisor, Dr Luk´aˇsKencl, for his guidance and expertise throughout the course of this work. I would like to thank Prof. Robert Beˇst´akand Mr Pierre Runtz, for giving me the opportunity to carry out my internship at the Czech Technical University in Prague. I would also like to thank all the members of the Research and Development Center for Mobile Applications as well as my colleagues for the assistance they have given me during this period. 1 Contents 1 Introduction 3 2 Related Work 4 2.1 Information concealing method . 4 2.2 Archive formats . 5 2.3 Compression algorithms . 5 2.3.1 Lempel-Ziv algorithm .
    [Show full text]
  • 4Th Infantry Division Rear Detachment and FRG Training Scenarios
    4th Infantry Division Rear Detachment and FRG Training Scenarios November 2017 DEPARTMENT OF THE ARMY HEADQUARTERS, 4TH INFANTRY DIVISION AND FORT CARSON 6105 WETZEL AVENUE, BUILDING 1435 FORT CARSON, COLORADO 80913-4289 REPLY TO ATTENTION OF: AFYB-SGS 17 November 2017 MEMORANDUM FOR RECORD SUBJECT: Rear Detachment Training Scenarios 1. Purpose: These scenarios are intended to be used as training exercises for your Rear Detachment and Family Readiness Group Senior Advisors. They are real world crises units have had to deal with during deployments. Rear Detachments, along with their FRG Advisors, are encouraged to use these scenarios to stimulate discussion and consider what SOPs may be useful to ensure that similar situations within their unit are handled properly, quickly, and consistently. 2. The Division Family Readiness Liaison (FRL) maintains a site on the 4ID portal where unit FRL’s can find templates, forms, training resources and other family-related information. Access this site at: https://army.deps.mil/Army/cmds/4id/CG/SitePages/FRL.aspx. Use your email certificate to log in. 3. The Division FRL stands ready to assist Brigade level Rear Detachments plan and execute this scenario training. 4. The point of contact for this memorandum is the undersigned at 719-503-0012 or [email protected] ALEXANDER H. CHUNG CPT, GS Family Readiness Liaison 4th Infantry Division Rear Detachment and FRG Training Scenarios TABLE OF CONTENTS 1. Quick Reference Phone Numbers 2. Acronym Explanations 3. Category Breakdown For Scenarios
    [Show full text]
  • Pack, Encrypt, Authenticate Document Revision: 2021 05 02
    PEA Pack, Encrypt, Authenticate Document revision: 2021 05 02 Author: Giorgio Tani Translation: Giorgio Tani This document refers to: PEA file format specification version 1 revision 3 (1.3); PEA file format specification version 2.0; PEA 1.01 executable implementation; Present documentation is released under GNU GFDL License. PEA executable implementation is released under GNU LGPL License; please note that all units provided by the Author are released under LGPL, while Wolfgang Ehrhardt’s crypto library units used in PEA are released under zlib/libpng License. PEA file format and PCOMPRESS specifications are hereby released under PUBLIC DOMAIN: the Author neither has, nor is aware of, any patents or pending patents relevant to this technology and do not intend to apply for any patents covering it. As far as the Author knows, PEA file format in all of it’s parts is free and unencumbered for all uses. Pea is on PeaZip project official site: https://peazip.github.io , https://peazip.org , and https://peazip.sourceforge.io For more information about the licenses: GNU GFDL License, see http://www.gnu.org/licenses/fdl.txt GNU LGPL License, see http://www.gnu.org/licenses/lgpl.txt 1 Content: Section 1: PEA file format ..3 Description ..3 PEA 1.3 file format details ..5 Differences between 1.3 and older revisions ..5 PEA 2.0 file format details ..7 PEA file format’s and implementation’s limitations ..8 PCOMPRESS compression scheme ..9 Algorithms used in PEA format ..9 PEA security model .10 Cryptanalysis of PEA format .12 Data recovery from
    [Show full text]
  • JP 3-33, Joint Task Force Headquarters
    Joint Publication 3-33 Joint Task Force Headquarters 30 July 2012 PREFACE 1. Scope This publication provides joint doctrine for the formation and employment of a joint task force (JTF) headquarters to command and control joint operations. It provides guidance on the JTF headquarters’ role in planning, preparing, executing, and assessing JTF operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for US military coordination with other US Government departments and agencies during operations and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise.
    [Show full text]
  • Suez 1956 24 Planning the Intervention 26 During the Intervention 35 After the Intervention 43 Musketeer Learning 55
    Learning from the History of British Interventions in the Middle East 55842_Kettle.indd842_Kettle.indd i 006/09/186/09/18 111:371:37 AAMM 55842_Kettle.indd842_Kettle.indd iiii 006/09/186/09/18 111:371:37 AAMM Learning from the History of British Interventions in the Middle East Louise Kettle 55842_Kettle.indd842_Kettle.indd iiiiii 006/09/186/09/18 111:371:37 AAMM Edinburgh University Press is one of the leading university presses in the UK. We publish academic books and journals in our selected subject areas across the humanities and social sciences, combining cutting-edge scholarship with high editorial and production values to produce academic works of lasting importance. For more information visit our website: edinburghuniversitypress.com © Louise Kettle, 2018 Edinburgh University Press Ltd The Tun – Holyrood Road, 12(2f) Jackson’s Entry, Edinburgh EH8 8PJ Typeset in 11/1 3 Adobe Sabon by IDSUK (DataConnection) Ltd, and printed and bound in Great Britain. A CIP record for this book is available from the British Library ISBN 978 1 4744 3795 0 (hardback) ISBN 978 1 4744 3797 4 (webready PDF) ISBN 978 1 4744 3798 1 (epub) The right of Louise Kettle to be identifi ed as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988, and the Copyright and Related Rights Regulations 2003 (SI No. 2498). 55842_Kettle.indd842_Kettle.indd iivv 006/09/186/09/18 111:371:37 AAMM Contents Acknowledgements vii 1. Learning from History 1 Learning from History in Whitehall 3 Politicians Learning from History 8 Learning from the History of Military Interventions 9 How Do We Learn? 13 What is Learning from History? 15 Who Learns from History? 16 The Learning Process 18 Learning from the History of British Interventions in the Middle East 21 2.
    [Show full text]
  • Steganography and Vulnerabilities in Popular Archives Formats.| Nyxengine Nyx.Reversinglabs.Com
    Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.| NyxEngine nyx.reversinglabs.com Contents Introduction to NyxEngine ............................................................................................................................ 3 Introduction to ZIP file format ...................................................................................................................... 4 Introduction to steganography in ZIP archives ............................................................................................. 5 Steganography and file malformation security impacts ............................................................................... 8 References and tools .................................................................................................................................... 9 2 Introduction to NyxEngine Steganography1 is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well. Steganography imposes the following data hiding rule: Data must be hidden in such a fashion that the user has no clue about the hidden message or file's existence. This can be achieved by
    [Show full text]
  • 2Nd INFANTRY REGIMENT
    2nd INFANTRY REGIMENT 1110 pages (approximate) Boxes 1243-1244 The 2nd Infantry Regiment was a component part of the 5th Infantry Division. This Division was activated in 1939 but did not enter combat until it landed on Utah Beach, Normandy, three days after D-Day. For the remainder of the war in Europe the Division participated in numerous operations and engagements of the Normandy, Northern France, Rhineland, Ardennes-Alsace and Central Europe campaigns. The records of the 2nd Infantry Regiment consist mostly of after action reports and journals which provide detailed accounts of the operations of the Regiment from July 1944 to May 1945. The records also contain correspondence on the early history of the Regiment prior to World War II and to its training activities in the United States prior to entering combat. Of particular importance is a file on the work of the Regiment while serving on occupation duty in Iceland in 1942. CONTAINER LIST Box No. Folder Title 1243 2nd Infantry Regiment Unit Histories January 1943-June 1944 2nd Infantry Regiment Unit Histories, July-October 1944 2nd Infantry Regiment Histories, July 1944- December 1945 2nd Infantry Regiment After Action Reports, July-September 1944 2nd Infantry Regiment After Action Reports, October-December 1944 2nd Infantry Regiment After Action Reports, January-May 1945 2nd Infantry Regiment Casualty List, 1944-1945 2nd Infantry Regiment Unit Journal, 1945 2nd Infantry Regiment Narrative History, October 1944-May 1945 2nd Infantry Regiment History Correspondence, 1934-1936 2nd Infantry
    [Show full text]
  • JP 3-33 Joint Task Force Headquarters Organization and Staffing
    Joint Publication 3-33 Joint Task Force Headquarters 16 February 2007 PREFACE 1. Scope This publication provides joint doctrine for the formation and employment of a joint task force (JTF) headquarters to command and control joint operations. It provides guidance on the JTF headquarters role in planning, preparing, executing, and assessing JTF operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, and the Services. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the Chairman of the Joint Chiefs of Staff, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance.
    [Show full text]
  • Guardlife V34 N1 Special Pt 2.Pmd
    Redlegs train for new mission On Jan. 5, 2004, B Battery, 3rd Battalion, 112th Field Artillery mobilized for deployment in support of Operation Iraqi Freedom. From Jan. 7 to Feb. 21, the Battery underwent military police training at Fort Dix, which included military police weap- ons systems and tasks. The unit then deployed to Kuwait for theater specific training and certification. By March 7, it had moved to Camp Cuervo in Baghdad, Iraq, where it was attached to the 89th Military Police Brigade and operation- ally re-designated as C Company. The company received additional training from the unit it was replacing. C Com- pany Soldiers learned important real-world lessons during 04 Capt. (Chaplain) Kevin Williams (far right), 3rd Battalion, 112th and Christina Lyness; Spc. Kaleb Hazen, 1st Battalion, 172nd Field Field Artillery, presides over a triple wedding at Chapel 5, Fort Dix Artillery, and Megan Finnegan; and Spc. William Donahue, 3-112th on Feb. 15. Married were (l-r): Spc. Glenn Erlenmeyer, 3-112th, and Kerry Chin. Photo by Tech Sgt. Mark Olsen. NJDMAVA/PA this “right seat ride” transition period. tinue patrolling and site security operations. In April, C Company began conducting patrols and pro- From mid-May to early June, C Company engaged in viding site security at Iraqi police stations in eastern Baghdad, fierce combat operations against the Mahdi army of Muqtada including Sadr City. The unit later began training and equip- al-Sadr in Sadr City. When U.S. Soldiers arrived at Iraqi ping Iraqi police at several stations in their area of operations.
    [Show full text]
  • Commander's Column
    Serving the Soldiers, Civilians and Families of 2nd BCT, 4th Inf. Div. Issue 43 Jan 27, 2011 2nd STB activates ‘Havoc’ FSC “Today was not just the passing of a guidon from one commander to the next, but the start of a new entity to support the wartime mission Lt. Col. Patrick Stevenson, commander, 2nd Special in Afghanistan” said Capt. Troops Battalion and Capt. Brian Johnson, com- Brian Johnson, commander of mander, Company H present the colors as Sgt. 1st Company H. Class Joseph Kienath, First Sergeant, Company H Special Troops Battalions do uncases their new colors. not traditionally include FSCs, will be the Mission Readiness Exercise at the but the logistical expectations Joint Readiness Training Center. Soldiers for the unit’s upcoming from Company H are scheduled in realistic deployment to Afghanistan were training events at JRTC to ensure they are Lt. Col. Patrick Stevenson, commander, 2nd Special Troops Battalion greater than the Soldiers of the able to transfer their capabilities to the and Capt. Brian Johnson, commander, Company H, lead the activa- battalion could be expected to wartime mission in Afghanistan. tion ceremony after the uncasing of the company’s colors. support, said 1st Lt. Timothy “We are excited to continue to support Story by 1st Lt. Bonnie Hutchinson Green, the executive officer of the Special Troops Battalion,” said Green. “I photos by Staff Sgt. Dennis Hines Company H. see this activation as the perfect opportunity 2nd Special Troops Battalion The company will be pushed hard as they to expand our resources and capabilities in Company H, a forward support company, posture themselves for deployment, said order to accomplish our mission and ensure was activated into the 2nd Special Troops Green.
    [Show full text]