FM 3-37.2. Antiterrorism

FM 3-37.2. Antiterrorism

FM 3-37.2 ANTITERRORISM February 2011 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. government agencies and their contractors only to protect operational information. This determination was made on 1 June 2010. Other requests for this document must be referred to Commandant, U.S. Army Military Police School, ATTN: ATZT-CDC, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, MO 65473-8929. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). FM 3-37.2 Field Manual Headquarters No. 3-37.2 Department of the Army Washington, DC, 18 February 2011 Antiterrorism Contents Page PREFACE .............................................................................................................iv INTRODUCTION ....................................................................................................v Chapter 1 TERRORISM IN THE OPERATIONAL ENVIRONMENT .................................. 1-1 Strategic Context ................................................................................................ 1-1 Antiterrorism in Army Operations ....................................................................... 1-3 Spectrum of Conflict ........................................................................................... 1-4 Operational Themes ........................................................................................... 1-4 Irregular Warfare ................................................................................................ 1-5 Full Spectrum Operations ................................................................................... 1-7 Operational Variables ......................................................................................... 1-8 Evolution of Terrorism ...................................................................................... 1-12 Chapter 2 TERRORIST TACTICS ...................................................................................... 2-1 Armed Nonstate Groups ..................................................................................... 2-1 Terrorist Networks .............................................................................................. 2-3 Terrorist Planning Cycle ................................................................................... 2-13 Threat Vulnerabilities ........................................................................................ 2-16 Terrorist Tactics ................................................................................................ 2-17 Chapter 3 FOUNDATIONS OF ANTITERRORISM ............................................................ 3-1 Combating Terrorism .......................................................................................... 3-1 Protection Warfighting Function ......................................................................... 3-2 Antiterrorism Principles ...................................................................................... 3-4 Deployed Antiterrorism Program ........................................................................ 3-6 Chapter 4 EXECUTING ANTITERRORISM MEASURES .................................................. 4-1 Movement ........................................................................................................... 4-1 Defensive Operations ......................................................................................... 4-9 Offensive Operations ........................................................................................ 4-14 Stability Operations .......................................................................................... 4-16 Civil Support Operations .................................................................................. 4-17 Distribution Restriction: Distribution authorized to U.S. government agencies and their contractors only to protect operational information. This determination was made on 1 June 2010. Other requests for this document must be referred to Commandant, U.S. Army Military Police School, ATTN: ATZT-CDC, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, MO 65473-8929. Destruction Notice: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. 18 February 2011 FM 3-37.2 i Contents Chapter 5 INTEGRATION INTO THE OPERATIONS PROCESS ......................................5-1 Command and Control Activities ........................................................................5-1 Planning ..............................................................................................................5-2 Preparation..........................................................................................................5-8 Execution ............................................................................................................5-9 Assessment .......................................................................................................5-10 Chapter 6 ANTITERRORISM OFFICER IN THE FORCE...................................................6-1 Roles and Responsibilities ..................................................................................6-1 Echelons Above Corps .......................................................................................6-2 Corps and Divisions ............................................................................................6-4 Brigades and Battalions ......................................................................................6-5 Companies ..........................................................................................................6-6 Protection Cells ...................................................................................................6-6 Working Groups ..................................................................................................6-6 Appendix A METRIC CONVERSION CHART ...................................................................... A-1 Appendix B PERSONAL PROTECTION MEASURES ......................................................... B-1 Appendix C ANTITERRORISM EXERCISES ....................................................................... C-1 Appendix D ANTITERRORISM MEASURES IN OPERATIONAL CONTRACT SUPPORT D-1 Appendix E ANTITERRORISM ASSESSMENTS ................................................................. E-1 GLOSSARY .............................................................................................................. Glossary-1 REFERENCES .......................................................................................................... References-1 INDEX .................................................................................................................... Index-1 Figures Figure 1-1. Challenges within persistent conflict .............................................................1-2 Figure 1-2. AT support across the spectrum of conflict ...................................................1-4 Figure 1-3. Full spectrum operations and adversary influencers ....................................1-8 Figure 2-1. Terrorist network............................................................................................2-4 Figure 2-2. Operational reach of terrorists .......................................................................2-9 Figure 2-3. Terrorist organizational support pyramid.....................................................2-11 Figure 2-4. Terrorist planning cycle ...............................................................................2-13 Figure 2-5. Khobar Towers 1996 bombing incident .......................................................2-21 Figure 2-6. Attack on the USS Cole ...............................................................................2-23 Figure 3-1. AT supported functions .................................................................................3-3 Figure 3-2. AT principles ..................................................................................................3-5 Figure 3-3. Army tactical tasks and supporting AT tasks ................................................3-7 Figure 4-1. Threats to in-transit movements ....................................................................4-2 Figure 5-1. The operations process and mission command ...........................................5-1 Figure 6-1. AT tasks and principles .................................................................................6-2 Figure C-1. Training exercise selection process ............................................................ C-2 Figure C-2. Nested concepts within mission command.................................................. C-4 ii FM 3-37.2 18 February 2011 Contents Figure C-3. Protection tasks within the Army universal task list .....................................C-6 Figure C-4. Sample timeline for exercise development ..................................................C-7 Figure E-1. Sample threat matrix .................................................................................... E-5 Figure E-2. Sample criticality assessment matrix ........................................................... E-6 Figure E-3. Sample MSHARPP prioritization matrix ....................................................... E-7 Figure E-4. Sample

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    176 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us