JP 3-15.1, Counter-Improvised Explosive Device Operations

JP 3-15.1, Counter-Improvised Explosive Device Operations

FOR OFFICIAL USE ONLY Joint Publication 3-15.1 Counter-Improvised Explosive Device Operations 09 January 2012 FOR OFFICIAL USE ONLY Intentionally Blank PREFACE (U) 1. (U) Scope (U) This publication provides joint doctrine for planning and executing counter- improvised explosive device (C-IED) operations. It outlines responsibilities, provides command and control considerations, discusses organizational options, details the C-IED process and attack the network methodology, and introduces models for coordinating with C-IED supporting organizations. 2. (U) Purpose (U) This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and provides the doctrinal basis for the planning and conduct of joint C-IED operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. (U) Application a. (U) Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, and the Services. b. (U) The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the Chairman of the Joint Chiefs of Staff, normally in coordination with the other members of the Joint Chiefs of Staff, i Preface has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the United States, commanders should evaluate and follow the multinational command’s doctrine and procedures where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff WILLIAM E. GORTNEY VADM, USN Director, Joint Staff ii JP 3-15.1 TABLE OF CONTENTS (U) PAGE EXECUTIVE SUMMARY .............................................................................................. vii CHAPTER I THE IMPROVISED EXPLOSIVE DEVICE THREAT The Improvised Explosive Device ............................................................................. I-1 The Task of Countering Improvised Explosive Devices ........................................... I-4 Domestic Considerations ........................................................................................... I-5 Maritime Considerations ........................................................................................... I-6 CHAPTER II THE IMPROVISED EXPLOSIVE DEVICE NETWORK Introduction ...............................................................................................................II-1 Network Characteristics and Components ................................................................II-4 The Improvised Explosive Device Activity Model ..................................................II-5 CHAPTER III PLANNING FOR COUNTER-IMPROVISED EXPLOSIVE DEVICE OPERATIONS Introduction ............................................................................................................. III-1 Mission Analysis .................................................................................................... III-3 Developing a Counter-Improvised Explosive Device Concept of Operations ....... III-4 Lines of Operation .................................................................................................. III-5 Counter-Improvised Explosive Device Annex to the Operation Plan .................. III-11 A Balanced Approach ........................................................................................... III-11 CHAPTER IV ATTACKING THE IMPROVISED EXPLOSIVE DEVICE NETWORK Introduction ............................................................................................................. IV-1 Strengths and Weaknesses of a Network ................................................................ IV-4 Attacking the Network—General Considerations .................................................. IV-5 Counter-Network Strategy Development and Required Capabilities ..................... IV-6 Attack the Network Across the Levels of War ....................................................... IV-8 Targeting the Network ............................................................................................ IV-9 Find, Fix, Finish, Exploit, Analyze, and Disseminate ............................................ IV-9 Multi-Echelon, Multidiscipline Counter-Improvised Explosive Device Fusion .. IV-21 Deliberate and Dynamic Network Targeting ........................................................ IV-23 iii Table of Contents (U) CHAPTER V STAFF RESPONSIBILITIES Introduction .............................................................................................................. V-1 Intelligence .............................................................................................................. V-2 Operations ................................................................................................................ V-6 Engineers ............................................................................................................... V-10 Joint Task Force Counter-Improvised Explosive Device Boards, Working Groups, and Cells ................................................................................... V-11 Coordinating with Supporting Theater- and National-Level Counter-Improvised Explosive Device Organizations ............................................................................ V-14 CHAPTER VI COUNTER-IMPROVISED EXPLOSIVE DEVICE TASK FORCE Introduction ............................................................................................................. VI-1 Organization ........................................................................................................... VI-1 Roles and Responsibilities ...................................................................................... VI-4 Task Force Intelligence Integrating Functions ....................................................... VI-6 Counter-Improvised Explosive Device Task Force Staff Functions ...................... VI-8 Counter-Improvised Explosive Device Task Force Support to the Maneuver Units ...................................................................................................... VI-9 Multinational Considerations ................................................................................ VI-13 Counter-Improvised Explosive Device Task Force Counter-Improvised Explosive Device Working Group ...................................... VI-13 APPENDIX A Counter-Improvised Explosive Device Enabling Organizations .............. A-1 B Counter-Improvised Explosive Device Exploitation Process ....................B-1 C Weapons Technical Intelligence ................................................................C-1 D Weapons Technical Intelligence Construct of Improvised Explosive Devices ...................................................................................................... D-1 E Counter-Improvised Explosive Device Annex Template .......................... E-1 F Improvised Explosive Device Network Activities ..................................... F-1 G References ................................................................................................. G-1 H Administrative Instructions ....................................................................... H-1 GLOSSARY Part I Abbreviations and Acronyms .................................................................. GL-1 Part II Terms and Definitions ............................................................................. GL-5 iv JP 3-15.1 Table of Contents (U) FIGURE I-1 Improvised Explosive Device Components ................................................ I-2 I-2 Improvised Explosive Device Effects ......................................................... I-4 II-1 Threat Network ..........................................................................................II-2 II-2 Improvised Explosive Device Network Critical Functions ........................II-3 II-3 Adversary Improvised Explosive Device Activities ..................................II-6 III-1 Notional Lines of Operation by Phase (Theater Counter-Improvised Explosive Device Plan) ............................................................................ III-6 IV-1 Attacking the Network ............................................................................. IV-2 IV-2 Typical Improvised Explosive Device Network ...................................... IV-3 IV-3 Find, Fix, Finish, Exploit, Analyze, and Disseminate ...........................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    172 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us