Counterguerilla Operations: FM 90-8/MCRP 3-33A
Counterguerilla Operations: FM 90-8/MCRP 3-33A
Counterguerilla Operations: FM 90-8/MCRP 3-33A
Counterguerilla
Operations
Official:
R. L. DILWORTH
Brigadier General, United States Army
The Adjutant General
DISTRIBUTION:
Active Army, USAR, and ARNG: To be distributed in accordance with DA Form 12-11A,
Requirements for Counterguerrilla Operations (Qty rqr block no. 1231).
Preface
CHAPTER 1
Introduction
Section I. General
1-1. Overview.
This chapter discusses the type of activity that is characteristic of an
insurgency. A general overview of insurgency is provided to introduce
the planner of counterguerrilla operations to the insurgent. The host
government’s method to defeat the insurgency is discussed, as is the
difference between counterinsurgency and counterguerrilla operations.
The methods of response by United States (US) forces, and the general
doctrine for their use, are also presented.
1-3. Concept.
a. The concept of resistance applies to an organized effort by some
portion of the civil population of a country to resist, oppose, or
overthrow the existing government. Many of the methods of
resistance are part of the stock-in-trade of revolutionary activity.
There can be no revolution without a resistance movement, but
there can be a resistance movement without a revolution when the
objectives of the resistors do not envision a reallocation of power.
1-1
FM 90-8
1-4. Prerequisites.
There are three requirements that must exist before an insurgency can
occur.
a. Vulnerable population. For whatever the reasons — social,
political, or economic — the population is generally open to
change. The insurgents will offer hope for change and exploit
dissatisfaction with the current government.
b. Leadership available for direction. A vulnerable population
alone will “not support an insurgent movement. There must be a
leadership element that can direct the frustrations of a dissatisfied
populace along the lines delineated by the overall insurgent
strategy.
c. Lack of government control. Lack of government control may
be real or perceived. The greater the control the government has
over the situation, the less likely are the chances for insurgent
success The opposite is also true: the less control the government
has, the greater is the chance for insurgent success.
1-9. Population.
The government must win back the support of the people. It does this
through providing them security and showing an honest effort to
correct those conditions which caused dissatisfaction.
1-4
FM 90-8
1-10. Insurgents.
a. The government must isolate the insurgent from the population,
both physically and psychologically, thereby denying him
personnel, materiel, and intelligence support.
b. The COIN strategy is based on the concept of balanced development,
mobilization, and neutralization. These three components are
interdependent and must occur simultaneously. If COIN strategy
achieves its goal, the government will regain populace support.
c. The military assists the COIN program through the conduct of six
major operations: intelligence, psychological operations, civil
affairs, populace and resources control, advisory assistance, and
tactical operations. The successful employment of these operations
contributes to the success of the COIN program. They are
normally conducted simultaneously, in conjunction with each
other, and require close coordination of diverse government
agencies.
1-13. US assistance.
a. All civil military action by a government to assist a host
government and to achieve a standard level of protection from
lawlessness, subversion, and insurgency is termed foreign
1-5
FM 90-8
internal defense (FID). The United States (US) Army has been
assigned a major role in providing military assistance to selected
nations in support of US national interests. The degree of
participation by US Army units is determined by US policy and
interests, an analysis of the insurgent threat, and the capabilities
and desires of the host country’s government.
b. The introduction of US combat forces into an insurgency to
conduct counterguerrilla operations is something that is done
when all other US and host country responses have been
inadequate. US combat forces are never the first units into a
country. They are normally the last. Preceding them is an array of
advisors, security assistance forces, mobile training teams,
combat service support units, and combat support units. Combat
commanders deploying to conduct counterguerrilla operations
should understand this and the fact that neutralization of the
guerrilla is only one-third of the COIN strategy. Balanced
development of the country and mobilization of the populace
against the insurgents must occur simultaneously for the
insurgency to be defeated.
1-14. US activities.
a. When deployed in FID operations, US forces ensure that their
planned activities support the goals and consequences of the host
country’s COIN program. Actions by US forces must not
undermine or be detrimental to COIN goals.
b. The response of US forces in any given situation must meet the
following requirements:
(1) Be appropriate — response is appropriate to the level of
threat and activity.
(2) Be justifiable – actions taken are justifiable in the eyes of
the host country’s population and the US public.
(3) Use minimum force — the goal is to restrict the use of force
and the level of commitment to the minimum feasible to
accomplish the mission. However, the principle of minimum
necessary force does not always imply minimum necessary
troops. A large number of men deployed at the right time may
enable a commander to use less force than he might
otherwise have done, or even to avoid using any force at all.
Commanders must, however, keep in mind that a peaceful
situation could become hostile because of the provocative
display of an overlarge force. Doing too much may be a
greater danger than doing too little.
(4) Do maximum benefit – US forces should select operations
so they accomplish positive benefit for the population. If this
1-6
FM 90-8
1-15. Challenges.
AirLand Battle is the Army’s operational concept for combat. It is
designed to deal with the worldwide challenges the Army faces. The
four basic challenges to the Army are the battlefield, leadership,
readiness, and training. The basic concepts of AirLand Battle doctrine
can be applied to counterguerrilla operations.
1-17. Leadership.
The complexities of counterguerrilla operations place a premium on
informed and trained leadership and independent operations. These
conditions demand more leader expertise and the ability to operate
independently at lower command levels than do higher levels of
conflict. The leader applies skill, imagination, and flexibility. He
effectively leads his troops and helps them to understand the problems
of counterguerrilla operations. He must be willing to reorganize his
assets to better accomplish his mission.
1-18. Readiness.
Units tasked to conduct counterguerrilla operations are prepared to
deploy and operate on short notice. Each soldier is prepared for battle
1-7
FM 90-8
and is able to perform his duties. Units train to operate in areas of the
world where they may be tasked to fight.
1-19. Training.
a. Training is the cornerstone for success and a full-time job for
commanders. The commander ensures that soldiers are proficient
in traditional, basic skills and also familiar with more complex
skills required for success in a counterguerrilla environment.
These skills include intelligence, civil affairs, populace and
resources control, psychological operations, and advisory
assistance.
b. AirLand Battle concepts outline the principles the Army must
apply when engaged in combat. Combat operations based on this
doctrine seek to locate, harass, and neutralize the guerrilla force
and deny it the capability to conduct offensive actions by
severing its linkage with the population. Coordinated efforts of
military and civilian organizations are required to achieve the
overall objective.
(4) Sustain the fight. The force may have to operate for
extended periods on limited logistics. To sustain momentum,
the commander deploys forces in adequate depth and
arranges for service support when needed. The commander
is audacious and presses soldiers and systems to the limits of
endurance.
(5) Move fast, strike hard, and finish rapidly. The principles
for this imperative are maneuver and mass. Speed and
mobility are essential. To avoid detection, US forces employ
deception techniques, communications security (COMSEC),
and operations security (OPSEC). While the overall conflict
may be prolonged, the tactical operations are executed with
speed to retain initiative and freedom of action. This is
balanced against the need for patience.
(6) Use terrain and weather. The guerrilla force is familiar
with the terrain and comfortable with the climate. Recon-
naissance and intelligence (if accomplished effectively) give
the commander a decisive edge in anticipating difficulties
with terrain and weather. He uses both to his advantage.
(7) Protect the force. Successful commanders preserve the
strength of their force. They do so through security, keeping
troops healthy and equipment ready, and by sustaining
discipline and morale. The guerrilla seeks to degrade the
morale of the force through the use of psychological
operations (PSYOPS) and harassment. His tactics are
geared to wear down his opponent’s will to fight. The
commander trains his soldiers and constantly reminds them
of exactly what the mission is and why it is important to
complete the mission.
1-10
FM 90-8
CHAPTER 2
The Threat
Section I. General
2-1. Operations.
a. The guerrilla must be understood before he can be defeated. This
chapter discusses the characteristics, tactics, and environment of
guerrilla operations.
b. The guerrilla is the overt combat element of the insurgent
organization. The members of the guerrilla force are organized
under military concepts to conduct military and paramilitary
operations. Their duties usually include all the overt actions that
are conducted by the insurgent organization but may include
covert and clandestine operations. They are usually most active
in insurgent-controlled or contested areas. However, when the
insurgency calls for operations in government-controlled areas,
the guerrilla may conduct these operations.
2-3. Factors.
The environment that the guerrilla operates in must be examined from
more than a geographical point of view. While terrain and climate are
important factors, the political, sociological, and economic aspects of
the environment take on added importance.
2-4. Terrain.
The rural guerrilla will prefer to continue to live in his own home. He
will go to camps if security does not permit him to live at home. He
favors level, well-drained campsites with good water supply, natural
fuel, cover, and adequate vegetation to provide concealment from
aerial observation. The preferred camps are also chosen with a view
toward easy access to the target population, access to a friendly or
neutral border, good escape routes, and good observation of approach
routes used by government counterguerrilla forces. When counterguerrilla
operations by government forces force the guerrilla out of his preferred
base camps, he tends to establish camps in rugged inhospitable areas
not easily penetrated by government forces.
2-5. Climate.
The fact that the guerrilla is usually a native to the area and is used to
the climate gives him an added advantage. If the government forces
are also familiar with this type of climate, then the advantage to the
guerrilla is lessened. If the government forces are not familiar with
operating in the climate, then the advantage to the guerrilla increases.
Generally, the climate of the area does not favor either the guerrilla or
the government forces to any great degree unless there are extremes
involved. Then the impact is on the logistical systems.
2-2
FM 90-8
2-9. Impact.
a. The impact that each of the factors has on the guerrilla, and his
ability to successfully operate, changes in each situation. A
careful analysis by the commander and his staff of each of the
factors is necessary to determine what the impact of each is prior
to conducting counterguerrilla operations. In all cases, each
factor must be analyzed to determine the peculiarities, weaknesses,
and strengths it may have in relation to the guerrilla.
b. In planning for counterguerrilla operations, the commander
exploits disclosed guerrilla weaknesses and deprives the
guerrilla, wherever possible, of any opportunities to exploit
government weaknesses.
2-3
FM 90-8
2-10. Considerations.
a. By understanding the general characteristics of the guerrilla, it is
easier to determine strengths which must be reduced or avoided
and weaknesses which can be exploited.
b. The characteristics discussed are general, and the commander
planning counterguerrilla operations must analyze a particular
situation to discover how these considerations apply.
b. Logistical support.
(1) This is one of the guerrilla’s most vulnerable areas. In early
operations, the guerrilla relies on his base of popular support
for logistical requirements. As the guerrilla force develops
and expands, its logistical needs may increase to the point
that the internal support base can no longer provide for all of
the guerrilla’s logistical requirements. If the insurgent
movement has not reached the point where the attainment of
its overall goals is imminent, then the guerrilla may have to
receive additional logistical support from another source.
(2) If the guerrilla receives support from external sources, then
he is faced with the problem of security for supply lines,
transport means, and storage facilities. External support
should not be considered a prerequisite for the initiation of
counterguerrilla operations. It is an additional factor that, if
present and effective, will enhance the capabilities of the
guerrilla. In any case, the counterguerrilla force should seek
to interdict the logistic support that the guerrilla is receiving,
whether it be internal or external.
(3) Since the guerrilla operates along military lines, he will
usually have temporary sites for headquarters, installations,
facilities, and operational units. These temporary sites are
called guerrilla base camps. It is in these camps that the
guerrilla has his command posts, training areas, communi-
cations facilities, medical stations, and logistics centers. The
guerrilla may also use these camps for rest, retraining, and
reequipping.
(4) It must be understood that these camps do not equate with
conventional force operational bases since the guerrilla does
not seek to defend them if they are discovered. They are
temporary and depend on secrecy for their existence. If
discovered, the guerrilla will usually abandon the site and
move his operation. These bases are kept small, and usually
2-7
FM 90-8
2-10
FM 90-8
CHAPTER 3
Counterinsurgency Operations
Section I. General
3-2. US role.
The most common role in which US forces will conduct counter-
guerrilla operations will be as a foreign internal defense (FID) force.
The FID is designed to support the host country’s national objectives
and COIN plan. Two of the primary considerations for the FID
commander are the final goals of the host country COIN program and
how to coordinate his operations to support hose goals.
3-7. Restrictions.
a. US forces engaged in counterguerrilla operations function under
restrictions not encountered in other types of warfare. These
restrictions may appear to hamper efforts to find and destroy the
guerrilla. For example, the safety of noncombatants and the
preservation of their property is vitally important to winning
them over to the government’s side.
b. The guerrilla knows this and will attempt to capitalize on it by
engaging US forces at locations where US fire would endanger
civilians or damage their property. While the temptation to return
fire may be great, a few dead or injured enemy will in no way
compensate for the ill will of the local populace if some innocent
civilians are killed or injured or their homes and property
destroyed.
c. Political considerations influence the conduct of counterguerrilla
operations. It is essentially a contest between the host government
3-5
FM 90-8
that can be covered at any one time, and is more difficult to move
(than a smaller force) if it is required elsewhere. However, sending
a small force to counter a significantly larger guerrilla force may
prove disastrous unless the smaller force is supported by fire or
can be rapidly reinforced.
c. Flexibility. Forces engaged in counterguerrilla operations are
flexible and capable of adapting to rapidly changing tactical
situations. The nature of counterguerrilla warfare necessitates
being able to make swift transitions from large to small unit
operations; to adjust to extremes of terrain, weather, and
visibility; to move on foot, by vehicle, or by aircraft; and to
function in offensive or defensive modes. Adapting to changing
tactical situations keeps the guerrilla force off balance and
prevents it from developing effective tactical operations.
d. Mobility.
(1) Counterguerrilla forces most possess mobility equal to or
greater than that of the guerrilla in order to find, fix, fight,
and pursue him. Since the guerrilla is primarilly footmobile,
counterguerrilla forces equipped with motorized, mechanized,
or air transportation assets would appear to have a
significant mobility advantage. However, the guerrilla
typically operates from terrain that precludes (or severely
limits) speed on a ground approach. The counterguerrilla
force’s mobility advantage may not be as great as it first
appears to be. When terrain, weather, or the guerrilla force
disposition precludes closing on guerrilla positions by
high-speed air or ground transport, then counterguerrilla
forces should be moved by the fastest available transportation
to the nearest suitable, safe area to launch footmobile
operations. A well-trained, footmobile counterguerrilla force,
that can use terrain better than the enemy, can achieve a
tactical mobility advantage.
(2) Commanders should not overburden soldiers with excessive
loads because the guerrillas will be able to outrun them.
Soldiers should carry only the things they need to find and
fix the guerrilla. Once this is accomplished, they can be
resupplied by ground or air.
e. Minimum use of force.
(1) Only the minimal firepower needed to accomplish a given
mission is employed. If US forces come under guerrilla fire,
and if by returning fire noncombatant civilians maybe
injured or their homes and property destroyed, then only the
amount of fire necessary to protect US forces is returned.
Under these circumstances, the commander attempts to
suppress the guerrillas with minimal return fire (possibly
3-8
FM 90-8
160-739 - 94 - 2
FM 90-8
3-9. Targets.
This section provides guidance on the organization, missions,
concepts, and operations of strike campaigns. Strike campaigns
consist of a series of major combat operations targeted against
insurgent tactical forces and bases in contested or insurgent-controlled
zones. Other internal defense activities may support tactical forces
during strike operations. Strike campaign operations are usually of
relatively short duration (generally, one day to several weeks). While
the guidance outlined here is focused on the infantry brigade, this
section may be extended to apply to any combined arms organization
conducting counterguerrilla operations.
3-10. Organization.
Brigades assigned strike campaign missions either are relieved from
area responsibility in advance of the mission or, preferably, are
constituted as specialized forces held at the national or regional levels.
Brigade strike forces are organized as self-sufficient task forces
capable of operating in areas remote from logistical bases. Brigades
are assigned support bases in secure areas for elements not committed
to operations.
3-10
FM 90-8
3-11. Missions.
Strike campaigns are conducted against guerrilla forces and bases.
They serve to keep guerrilla forces moving and off balance. Strike
campaign areas are usually outside of those undergoing consolidation
or those under friendly control. Ground or water means of entry maybe
used, but air assault or parachute deliveries can be employed.
3-12. Concepts.
a. Strike campaigns include offensive tactics such as raids,
reconnaissance in force, hasty or deliberate attacks, and pursuit
(or combinations of these operations).
b. Brigade strike campaign operations are conducted to:
(1) Harass the guerrilla to prevent the buildup of personnel and
logistical resources.
(2) Destroy the guerrilla force and its base complexes.
(3) Demonstrate support for the government and for the
populace in the local area.
(4) Expand consolidation areas.
3-13. Operations.
a. Brigades committed to strike campaigns are assigned a tactical
area of responsibility. The brigade commander normally assigns
operational areas to the subordinate battalions which, in turn,
may assign areas to companies. Company commanders may
assign specific areas to platoons at times; however,’ platoons are
normally assigned specific missions rather than operational
areas. Each battalion normally establishes a separate operational
support base (OSB). Companies normally operate from patrol
bases, but at times may operate separate company OSBs. When
the areas assigned to units are too large to be reconnoitered
concurrently by subordinate units, commanders establish an
order of priority for reconnaissance of the areas.
b. Battalion commanders maintain reserve forces (ready forces) to
react quickly to situations requiring an immediate response. Each
rifle company patrols its area of operations continuously and
aggressively. The location of the company patrol base and patrol
routes are varied to ensure complete coverage of the area.
c. The rifle company moves to, secures, and occupies the company
patrol base with sufficient supplies to permit limited independent
operations. If it is to operate in the same area for a period of time, it
should consider establishing small ration and ammunition
reserves.
3-11
FM 90-8
may panic. In the time it takes him to become aware of the tactical
situation, or to take effective action, the counterguerrilla forces
may encircle him. Speed and surprise may be achieved by using
air assault tactics to insert the first counterguerrilla forces into
the area of operations. Subsequent forces can be delivered on later
airlifts or by other modes of transportation.
j. Strike forces are most vulnerable just after entering a new area of
operations. Initially, there is some confusion until patrol bases
are established and patrols are sent out. counterguerrilla forces
must be especially security conscious the first few hours in a new
location. Upon arrival, they should immediately establish target
reference points, observation posts, and listening posts.
3-14. Control.
a. This section provides the brigade guidance on the missions,
organization, and operations of consolidation compaigns.
Consolidation campaigns are the application of all civil and
military aspects of internal defense and internal development
programs. They are designed to establish, regain, or maintain
control of specific areas.
b. The brigade participates in consolidation campaigns by conducting
tactical, intelligence, psychological, civil affairs, populace and
resources control, and advisory assistance operations.
c. Brigades committed to consolidation campaigns support the
overall host country internal defense and development (IDAD)
effort by applying their resources in the following manner:
(1) In the preparation and offensive phases, tactical operations
are stressed. Initial area control is established by clearing
guerrilla forces from an area, expanding it, and linking it to
other areas as they are cleared.
(2) In the development phase, the primary mission is tactical
operations to maintain security of the cleared area. Concur-
rently, the brigade performs intelligence, psychological,
populace and resources control, civil affairs, and advisory
assistance operations. The brigade also conducts military-civic
action in conjunction with civil affairs programs.
(3) During the completion phase, when guerrilla activity within
a consolidated area has been largely neutralized and host
country agencies have resumed control of the area, the
brigade begins to phase out its participation in local
operations and prepares to conduct operations in another
area.
3-13
FM 90-8
3-14
FM 90-8
3-15
FM 90-8
3-16
FM 90-8
3-21. Searches.
a. The need for a counterguerrilla force to conduct search operations
or to employ search procedures is a continuous requirement. Most
search operations support strike operations or consolidation
operations, or they may be conducted as the main effort in
populace and resources control operations. A search maybe
oriented to people, to materiel, to buildings, or to terrain. It usually
involves both civil police and military personnel.
b. Since misuse of search authority can adversely affect the ultimate
outcome of operations agtainst guerrillas, seizure of contraband,
evidence, intelligence material, supplies, or minor items during
searches must be accomplished lawfully and properly recorded to
be of future legal value. Proper use of authority in searches gains
the respect and support of the people. Abusive, excessive, or
inconsiderate search methods may temporarily suppress the
guerrilla force or expose elements of it, but at the same time such
methods may ultimately increase the civilian population’s
sympathy for and/or support of the guerrilla.
c. Authority for search operations is carefully reviewed. Military
personnel must be aware that they perform searches only in areas
within military jurisdiction (or where otherwise lawful) for
purposes of apprehending suspects or securing evidence that
tends to prove an offense has been committed. Usually, there are
special laws regulating the search powers of the military forces.
These laws are given wide dissemination.
d. Search teams have detailed instruction on controlled items. Lists
of prohibited or controlled-distribution items such as chemicals,
medicines, machine tools, and other items should be distributed.
The military or civil police who administer the populace and
resources control program are contacted before the conduct of
search operations, or periodically if search operations are a
continuing activity.
e. Search operations involving US forces maybe ineffective when
language difficulties prevent full communication with the
indigenous population. US units given a search mission are
provided with interpreters as required.
f. The pace at which a search operation is conducted is slow enough
to allow for an effective search but not so slow as to allow the
guerrilla force time to react to the threat of the search.
g. If active resistance develops to the search operation, offensive
operations are conducted to eliminate the resistance.
h. Consideration is fiven to returning to a searched area after the
completion of an initial search to surprise and eliminate
3-17
FM 90-8
3-29. Raid.
a. A raid is an operation involving a swift penetration of hostile
territory to secure information, harass the guerrilla force, or
destroy the guerrilla force and its installation. It ends in a
planned withdrawal upon completion of the assigned mission. A
successful raid is based on accurate, timely, and detailed
information. Raids are usually targeted against single, isolated
guerrilla base camps. To assist in attaining surprise, the raiding
force uses inclement weather, limited visibility, or terrain
normally considered impassable.
b. The raiding force is normally organized into an assault element
and a security element. A larger raiding force may add a support
element while a small raiding force includes supporting weapons
in the assault element.
c. The use of airborne and air assault forces for a raid enhances
surprise. If night airborne or air assault raids are conducted, the
force must be accurately inserted and oriented on the ground. Air
assault forces supported by armed helicopters offer infinite
possibilities for conducting raids. This type of raid force can move
in, strike the objective, and withdraw without extensive preparation
or support from other sources. (For further information on the
composition and organization of raid forces, see FM 7-8, FM 7-10,
and FM 7-20.)
3-30. Patrols.
a. Conventional patrolling doctrine normally applies to counter-
guerrilla operations, but some techniques must be oriented to meet
the guerrilla’s activities and the operational environment.
Patrolling becomes more significant in counterguerrilla operations
because of the difficulty in locating and identifying guerrilla
forces and determining their intentions. Patrolling is used when
limited (or no) intelligence on guerrilla activity is available.
Personnel should be thoroughly briefed, carry only mission-essential
equipment, and be physically fit. Routes are planned carefully
and coordinated with higher, lower, and adjacent units, to include
air and ground fire support elements and reserve forces.
3-22
FM 90-8
3-31. Ambush
a. An ambush is a surprise attack from a concealed position upon
a moving or temporarily halted target. Ambushes give the
counterguerrilla force several advantages:
(1) An ambush does not require ground to be seized or held.
(2) Smaller forces with limited weapons and equipment can
harass or destroy larger, better armed forces.
3-23
FM 90-8
3-33. Encirclement.
a. Encirclement offers the best chance to fix guerrilla forces in
position and achieve decisive results. The battalion and larger
units will usually plan and conduct encirclements. The company
and smaller units normally do not have the manpower and
command and control capability to execute encirclements except
as part of a larger force.
b. Encirclements require accurate intelligence on the location of
guerrilla elements. Since it requires a major portion of the
counterguerrilla force to execute this maneuver, it is usually
targeted against large guerrilla forces or guerrilla base complexes,
a series of smaller base camps clustered within an area.
c. Planning, preparation, and execution are aimed at encircling the
guerrilla force rapidly. Maximum security and surprise can be
gained by occupying the initial encirclement positions during
darkness.
d. In large operations, air assault and airborne troops add speed and
surprise to the operation. Positions are occupied simultaneously
in order to block escape. If simultaneous occupation is not
possible, probable escape routes are covered first. Initial
occupation is the most critical period of the operation. When the
guerrillas become aware that they are being encircled, they will
3-24
FM 90-8
3-26
FM 90-8
3-40. Exploitation.
a. If an attack succeeds, exploitation and pursuit follow. Exploitation
is an operation undertaken to follow up success in the attack.
Following the principle of reinforcing success, immediate
exploitation using an uncommitted element of the force is
advisable.
b. The exploiting force drives swiftly to disrupt guerrilla command
and control functions, severs escape routes, destroys reserves and
equipment, and denies the enemy an opportunity to reorganize his
defense. The exploitation force is large, reasonably self-sufficient,
and well-supported by tactical air, air cavalry, and attack
helicopters. It does not pause to achieve minor tactical successes
against isolated or fleeing enemy units; it attempts to fix them
while concentrating on destroying the main guerrilla force. The
commander provides mobile support, including helicopters for
emergency supply of petroleum, oil, and lubricants (POL) and
ammunition, and ensures sufficient follow-on forces to attack
guerrilla forces bypassed or fixed by the exploiting force.
3-41. Pursuit.
a. Pursuit is an offensive action against a retreating enemy. It is the
final phase of the exploitation and occurs when a large guerrilla
force attempts to disengage. Normally, it attempts to cut off
escape routes and encircle and destroy the guerrilla force. It
maintains pressure with an exploiting force.
b. As the guerrilla unit disintegrates, exploitation may develop into
pursuit. Pursuit may develop in any operation in which the enemy
has lost his ability to operate effectively and attempts to flee.
Pursuit requires energy and resolution to press on despite fatigue,
dwindling supplies, or the approach of darkness. Nighttime
pursuit increases the enemy’s confusion and speeds his disinte-
gration.
c. The primary purpose of pursuit is to destroy the guerrilla force.
Although terrain objectives may be assigned as control measures,
the primary objective is the guerrilla force.
d. In pursuit, the requirements and command relationships for
forces which follow and support are the same as in exploitation.
They destroy bypassed enemy strongholds, relieve supported
units that have halted to contain enemy forces, guard prisoners,
3-28
FM 90-8
3-42. Variations.
a. This section discusses defensive operations which brigades and
subordinate units may have to conduct. Depending on the tactical
situation, these operations, or variations of them, may be
conducted during any phase of an insurgency. In some instances,
the type of operation under consideration is identical to one
already discussed in Section V. The difference is the purpose.
b. For example, patrolling maybe either offensive or defensive in
purpose. When its purpose is offensive, it is done to locate the
enemy and destroy him. When its purpose is defensive, it is done to
deny the enemy access to an area, and to keep him from
organizing for offensive operation. (For similarities of offensive
and defensive operations, see Section V.)
c. This section also provides guidance to commanders concerned
with the defense of various types of temporary or semipermanent
bases, such as logistical installations, OSBS, airfields, and
airbases, under varying conditions of security that may exist in
an area of operations.
d. It is also applicable to the defense of civilian communities.
Commanders responsible for bases, facilities, and communities
should exercise those principles and techniques discussed which
apply to their particular situation.
to the base for other primary purposes will also assist in local
defense during an attack. Each commander of forces located at a
base is responsible for:
(1) Participating in preparation of base defense plans. Training
his forces for base defense.
(2) Providing appropriate facilities and essential personnel for
the base defense operations center and appropriate personnel
for the base defense force staff.
(3) Providing for internal security of his own command.
3-49. Patrols.
a. Base defense operations to counter small groups of enemy forces
include aggressive, frequent patrolling by squad- and platoon-size
forces to detect and capture or destroy small groups of guerrillas.
Infantry scout dogs, if available, maybe used to add security and
additional detection ability to patrol operations.
b. Patrolling is conducted by small, highly mobile units moving on
foot or by vehicles during daylight and darkness. It may include
the use of aircraft or boats. Populated areas near the base are
searched, and surprise checkpoints are established along known
or suspected routes of guerrilla communications.
c. Dug-in or concealed night ambush sites are manned outside the
barrier system trace on a random basis. Indigenous personnel
should accompany ambushes near populated areas. Their
knowledge of local populace and terrain assists the ambush
mission. Artillery and mortar targets are registered and plotted to
3-33
FM 90-8
3-40
FM 90-8
160-739 - 94 - 3
FM 90-8
3-43
FM 90-8
(2) Operations.
(a) Restricted zones or friendly population buffer zones
can be established if needed. Either of these operations,
which could require relocating many persons, must be
carefully planned. Although armed forces may assist,
civil authorities normally are responsible for planning
and carrying out a relocation program. Forced relocation
is held to a minimum. The 1949 Geneva Conventions
prohibit forced population resettlement unless there is
clear military necessity.
(b) While specific portions of an international land border
or shoreline maybe placed under effective surveillance
and control by use of static security posts, reserve
forces, ground and aerial observers, electronic listening
posts, and patrols, the continuous surveillance and
control of an extensive land border or shoreline is
difficult. Since it may not be possible to place brigade
forces at all the crossing or landing sites, a priority
system for the sites requiring military forces is
established.
(3) Surveillance. Continuous and detailed surveillance is
required to determine infiltration and exfiltration routes and
support sites, frequency and volume of traffic, type of
transportation, number and type of personnel, amount and
type of materiel, terrain and traffic conditions, and the
probable location of base areas and sanctuaries. Surveillance
and control of extensive coastal areas normally require the
use of coordinated ground patrols on the shoreline, coordinated
offshore patrols, aerial surveillance, strategic observation
posts along the shoreline, and an effective system of
3-45
FM 90-8
3-47
FM 90-8
3-50
CHAPTER 4
Counterguerrilla Operations
in Conventional Conflicts
Section I. General
4-2. Threat.
A guerrilla threat may not exist in these situations. However, if it does
exist, it normally occurs in support of enemy forces engaged in
conventional combat with friendly forces and occurs in the friendly
force rear areas. (For further information on rear area operations, see
FM 90-14.)
4-1
FM 90-8
4-10. Concepts.
a . The concepts discussed in this chapter are geared to the needs of
the tactical commander but can be used by the rear battle officer
as well. In all instances, it is imperative that the principle of unity
of command be maintained to minimize confusion and indecision
that will occur if there is an inability to determine who is in
command.
b . The techniques used in rear battle operations are dependent upon
METT-T. Some of these factors include the force composition,
aviation assets, fire support assets, mobility, equipment, and size
of the counterguerrilla force. These same factors must be
examined regarding the guerrilla force. Generally, these
techniques can be classified as either offensive or defensive.
(1) Offensive techniques are used to locate, fix, and engage
guerrilla forces. These operation include reconnaissance
patrols, ambushes, attacks, encirclements, and movements
to contact.
(2) Defensive techniques are used to prevent disruption,
harassment, or confusion. They are also used to minimize
damage to a target if it is attacked. Preventive defensive
techniques include movement security, security patrolling,
and combat patrolling, among others. Examples of techniques
designed to minimize damage once an action starts include
base defense, counterambush, and reaction forces.
c. The distinctions between offensive and defensive techniques are
sometimes difficult to discern. Many offensive techniques can be
used as a type of defensive technique and vice versa. (Offensive
and defensive techniques are discussed in Chapter 3.)
4-9
CHAPTER 5
Combat Units
Section I. General
5-1. Composition.
The military force conducting counterguerrilla operations may not
necessarily consist of only light infantry. This chapter discusses the
various types of combat units that maybe available to the counterguerrilla
force. The composition of the tactical force to be used in counterguerrilla
operations — in other words, whether to use forces other than light
infantry — depends upon the forces available and the threat that is
faced.
5-1
FM 90-8
5-8. Concepts.
In conventional conflict counterguerrilla operations, forces other than
infantry take on larger roles. Their participation conforms more to the
concepts outlined for their use in rear battle doctrine. In these
environments, there are usually fewer restrictions on the use of
firepower.
5-9. Considerations.
a. Two major considerations, when employing forces other than
infantry, are suitability and availability.
b. Maneuver force mission suitability is usually discussed in terms
of METT-T. The commander must weigh the advantages and
disadvantages of using his force against the factors of METT-T. If
the advantages outweigh the disadvantages, then the force is
employed.
c. The commander must make the most effective use of all the forces
he has available. If a particular force would be more suitable but is
not readily available, the commander should seek to procure it. If
he cannot, then he maximizes the effects of those assets that he
has available.
d. In conventional conflicts, the use of combined arms is more
effective in almost all situations rather than the use of any single
type of combat force.
5-8
FM 90-8
5-9
CHAPTER 6
Combat Support
Section I. General
6-3. Techniques.
a. Reconnaissance and surveillance are important techniques in
gaining current and accurate intelligence on guerrilla forces.
Current, accurate intelligence on the location, size, composition,
equipment, and morale of guerrilla forces is an absolute necessity
for successful counterguerrilla operations.
6-2
FM 90-8
6-3
160-739 - 94 - 4
FM 9 0 - 8
6-4
FM 90-8
6-5
FM 90-8
Figure 6-4. If guerrilla elements escape, R&S teams begin process again.
6-5. LRSU.
a . The mission of the long-range surveillance unit {LRSU} (company
or detachment) is to observe, record, and report enemy
dispositions, facilities, and activities as well as battlefield
conditions.
b . The LRSU provides the commander with a dedicated, specially
trained and equipped, and highly reliable human intelligence
collection capability. A HUMINT collection unit provides the
commander with the capability to gather timely, highly reliable
information that does not require lengthy processing and
analysis. The trained observer augmented with modem sensor
6-6
FM 90-8
6-10
FM 90-8
6-15
FM 90-8
6-14. Engineers.
a. Engineer assets are usually found at division level and above.
Portions of these assets maybe attached to brigades and, in turn,
to battalions. The engineer system is divided into four areas:
mobility, countermobility, survivability, and general engineering.
b. Mobility is geared toward improving the movement of maneuver
units and movement of critical supplies. It is oriented toward
reducing or negating the effects of obstacles. Examples of
mobility operations include landing zone construction, reduction
of roadblocks, construction of combat trails, and assault bridging.
c. Countermobility is designed to reduce the enemy’s mobility and
effectiveness. This is generally done through the installation of
obstacles. Some obstacles may destroy targets; most enhance or
complement weapon effectiveness. Examples of conventional
obstacles are minefield and wire entanglements.
d. Survivability is the development of protective positions. Examples
include construction of perimeter defense positions in operational
support bases.
e. General engineering missions do not contribute directly to
committed maneuver units. Examples of general engineering
missions include:
(1) Improving and maintaining essential supply routes.
(2) Developing areas for essential logistics.
(3) Replacing assault (or destroyed) bridges with tactical
bridging.
(4) Carrying out civic action.
f. Engineer units spend most of their time and effort in survivability
and general engineering tasks, even though all four areas of
6-17
FM 90-8
6-16. Signal.
a. Radio is the primary means of communication in counterguerrilla
operations. Planning and implementing radio communication
nets for the brigade and its maneuver battalions may become
highly complex. The brigade signal officer is prepared to advise
on the capability of available communications means to support
each course of action being considered.
b. Providing sufficient radio communication equipment to conduct
operations is a high priority in an insurgency. Aerial and ground
relay stations may be required to extend the range of FM
equipment. Since the brigade communication platoon has no
reserve from which to provide augmentation, special communication
needs of brigade elements are provided either by redistributing
equipment or by augmenting the table of organization and
equipment. For long-range radio communications between
battalion operational support bases and patrol bases, communi-
cation support teams may be required.
c. Extensive use of radio expands the communications security
problem. Never consider the guerrilla force too unsophisticated to
acquire communications intelligence. Conventional communica-
6-19
FM 90-8
6-20
FM 90-8
CHAPTER 7
Section I. General
7-1. Assets.
a. This chapter explains how combat service support assets enhance
tactical operations and assist the unit in accomplishing its overall
mission.
b. These assets include medical, supply, transportation, maintenance,
and personnel and administration. They normally operate from
bases that support unit tactical operations. Depending on the size
of the unit, these assets may be organic or attached.
7-6. Medical.
a. The mission of medical units is to conserve the fighting strength
of the counterguerrilla force by preventive medical and sanitary
measures and by appropriate medical and surgical treatment. In
support of the IDAD effort, medical units and personnel may
provide medical assistance, advice, and training to host country
medical personnel. These units may also provide limited medical
support to the local populace on a temporary basis. However, such
support is conducted under the auspices of the host country and to
the credit of that government.
b. Aidmen are at company level and give emergency medical
treatment within their capabilities. They also ensure that
patients who need to be evacuated are properly prepared and
promptly moved.
c. An aid station is usually at battalion level. In counterguerrilla
situations, the station is within the battalion operational support
base. Aid station functions include:
(1) Receiving, recording, examining, and sorting patients and
returning the physically fit to duty.
(2) Giving emergency medical treatment and preparing patients
for evacuation.
(3) Providing limited medical support through military civic
action programs, as designated.
d. The battalion aid station is normally supervised by a physician or
physician’s assistant.
e. Depending on the seriousness of the wound, the patient maybe
moved directly to a division treatment station in the brigade
support base, or to a corps level hospital. Evacuation to medical
7-3
FM 90-8
7-7. Supply.
a. Supply units in counterguerrilla operations, as in conventional
operations, provide all necessary classes of supplies to units
involved in tactical operations. Since the battalion operational
support base is as small as possible and provides only a limited
logistics base, the supply element at battalion is small.
b. A majority of the combat trains are collocated with field trains in
the brigade support base, so it is essential that supply lines to
battalions be maintained. Both aerial and ground resupply are
considered to ensure a backup system in case one method is
disrupted.
c. The brigade usually receives its portion of divisional assets, but it
may be augmented with additional assets as required.
d. Resupplying tactical units must not set a pattern. Resupply
should not occur on a regular basis, but only as requested by
tactical units.
e. Unit messes normally do not operate from battalion operational
support bases. Unit mess teams may move to (and operate from)
battalion bases for short periods to improve morale, or prepare hot
meals in the brigade base and transport them to the battalion
base. In some cases, local procurement of foodstuffs maybe
authorized to help bolster the local economy.
f. Currently prescribed supply systems and procedures can
adequately support counterguerrilla operations with minor
variations.
(For further information on supply operations and procedures, see
FM 29-51.)
7-8. Transportation.
a. Transportation requirements are classified as tactical and
nontactical. Tactical transportation deals with the repositioning
of men and materiel in the battle area, and is directly associated
with combat. Nontactical transportation deals with the movement
of men and materiel in a noncombat action.
7-4
FM 90-8
7-9. Maintenance.
Maintenance involves all actions to keep equipment operationally
ready or to restore it to that status. Battalion maintenance elements are
located at the OSB (combat trains) and the brigade support base (field
trains). In addition, maintenance contact teams from the maintenance
unit supporting the brigade (forward support maintenance company or
forward support battalion) will also be located with the OSB.
Maintenance doctrine (fix as far forward as possible) is modified
slightly in an effort to keep the OSB as small as possible. As a result,
most maintenance, other than minor repair or replacement of parts,
will take place at the brigade support base in a relatively secure area.
(For further information on maintenance operations, see FM 29-2, FM
29-23, and FM 29-30-1.)
7-5
FM 90-8
7-6
FM 90-8
APPENDIX A
Subsurface Operations
Section 1. General
A-3. Categories.
Tunnels vary from the simple to the complex. They are categorized as
hiding holes, access and escape routes, underground base areas,
fortified base camps, and bunkers.
a. Hiding holes. There are three basic types of holes used by
guerrillas. They are classified more by their location than by their
construction. Methods of construction and dimensions can be
expected to vary, depending on the area of operations.
(1) Bamboo hole. This is easily and quickly camouflaged
(Figure A-1 ). The entrances to the holes differ as do the
techniques of camouflage. Most of the entrances are within
the edge of a bamboo clump or dense thicket or just outside
the edge. The hole cover, or trapdoor, contains camouflage
material. Some have pieces of cut bamboo or other vegetation
affixed to the top of the door. The edges of the door fit snugly
into the structure of the entrance. Other entrances may be
covered by spreading materials over them.
A-2
FM 90-8
A-4
FM 90-8
A-6
FM 90-8
A-7
FM 90-8
160-739 - 94 - 5
FM 90-8
(4) Limbs tied near tree top to conceal the use of a tunnel from
aircraft.
(5) Slight depression in or around a group of small trees.
(6) Air holes, a sure indicator.
(7) A lone individual, especially a female, in the area.
(8) Fresh cooked food with no one attending the site.
(9) Fresh human feces in an area.
e. All these indicators are good. However, in different areas they
may vary. The places to look for indicators are in the corners of
hedgerows, in the corners of village huts, and in the secluded
corners of trails and streams. The enemy often hides in these
places so he can see while not being seen. Additionally, hiding in
these places allows those who put the finishing touches on the
camouflage to escape undetected. The guerrilla is aware of the
danger of establishing a pattern. However, he must have a
location that provides him with observation as well as concealment.
So look for observation posts that allow him to move into or out of
an area undetected.
f. Occasionally, the specific location of a tunnel can be obtained by
interrogating the local populace, or prisoners of war (PW) who
may have occupied, or helped in digging, the system. Because of
the method of constructing a tunnel system, that of using an
excavation shaft to reach the level of the tunnel and then closing
this shaft once the tunnel is completed, the individual may not be
able to locate an entrance or exit unless he has seen or used the
completed tunnel.
A-11
FM 90-8
A-13
FM 90-8
A-14
FM 90-8
A-15
FM 90-8
APPENDIX B
Section I. General
B-2
FM 90-8
B-3
FM 90-8
APPENDIX C
Ambush Patrols
Section 1. General
C-1
FM 90-8
C-4. Surprise.
Surprise must be achieved or else the attack is not an ambush. Surprise,
which distinguishes an ambush from other forms of attack, allows the
ambush force to seize and retain control of the situation. Surprise is
achieved by careful planning, preparation, and execution. Guerrillas
are attacked in a manner they least expect.
C-6. Control.
a. Close control is maintained during movement to, occupation of,
and withdrawal from the ambush site.
b. The ambush commander’s control of all elements is critical at the
time of target approach. Control measures provide for
(1) Early warning of target approach.
(2) Withholding fire until the target moves into the kill zone.
(3) Opening fire at the proper time.
(4) Initiating appropriate actions if the ambush is prematurely
detected.
(5) Lifting or shifting supporting fires when the ambush
includes assault of the target.
(6) Timely and orderly withdrawal to an easily recognized
rallying point.
C-2
FM 90-8
C-7. Flexibility.
a. An ambush is planned and prepared using troop leading
procedures. Planning considerations include whether the ambush
is to be a deliberate ambush or a hasty ambush. In a deliberate
ambush, more target intelligence is available to permit planning
for every course of action at the target. Planning for a hasty
ambush includes tentative plans both for the types of targets that
may be ambushed and for varying situations. Both plans are
flexible enough to allow modifying, as appropriate, at the ambush
site. All plans are rehearsed in detail.
b. Planning provides for the following:
(1) Simplicity. Every soldier must thoroughly understand
what he is to do at every stage of the operation. In an
ambush, more so than in other operations, the failure of even
one soldier to perform exactly as planned can cause failure.
(2) Type of ambush. The type of ambush affects the organiza-
tion, number of men, and amount of equipment and
communications required.
(3) Deployment. Each possible formation is considered for its
advantages and disadvantages.
C-10. Execution.
a. Three signals, often four, are needed to execute the ambush.
Audible and visual signals, such as whistles and pyrotechnics,
must be changed often to avoid establishing patterns. Too
frequently, use of the same signals may result in their becoming
known to the enemy. A guerrilla might recognize a signal and be
able to react in time to avoid the full effects of an ambush. For
example, if white star cluster is habitually used to signal
withdrawal in a night ambush, an alert guerrilla might fire one
and cause premature withdrawal.
b. A signal by the security force to alert the patrol leader to the
guerrilla’s approach may be given by:
(1) Arm-and-hand signals.
(2) Radio, as a quiet voice message, by transmitting a prearranged
number of taps, or by signaling with the push-to-talk switch.
C-5
FM 90-8
This is a key part of the ambush. Fire is withheld until the signal is
given, then immediately delivered with the heaviest, most accurate
volume possible. Properly timed and delivered fires contribute to the
achievement of surprise as well as to destruction of the guerrilla force.
When the guerrillas are to be assaulted, the lifting or shifting of fires is
equally precise. Otherwise, the assault is delayed, and the guerrillas
have an opportunity to recover and react.
a. The objective rallying point is far enough from the ambush site so
that it will not be overrun if the guerrilla force attacks the
ambush. Routes of withdrawal to the objective rallying point are
reconnoitered. If possible, each person walks the route he is to use
and picks out checkpoints. When the ambush is to be executed at
night, each person must be able to follow his route in the dark.
b. On signal, the unit quickly but quietly withdraws to the objective
rallying point, reorganizes, and begins its return march.
c. If the ambush was not successful and the unit is pursued,
withdrawal may be by bounds. The last group may arm mines,
previously placed along the withdrawal route, to further delay
pursuit.
C-14. Positions.
a. A point ambush, whether independent or part of an area ambush,
is positioned along the expected route of approach of the guerrilla
force. Formation is important because, to a great extent, it
determines whether a point ambush can deliver the heavy volume
of highly concentrated fire necessary to isolate, trap, and destroy
the guerrillas.
b. The formation to be used is determined by carefully considering
possible formations and the advantages and disadvantages of
each in relation to terrain; conditions of visibility, forces,
weapons, and equipment ease or difficulty of control; force to be
attacked; and overall combat situation.
c. This section discusses formations developed for the deployment of
point ambushes. The formations are identified with names that
correspond to the general pattern formed on the ground by
deployment of the attack element. They include:
(1) Line formation (two techniques, Paragraph C-15).
(2) L-formation (two techniques with variations, Paragraph
C-16).
(3) Z-formation (Paragraph C-17).
(4) T-formation (two techniques, Paragraph C-18).
(5) V-formation (two techniques, Paragraph C-19).
(6) Triangle formation (closed; open with variations, Paragraph
C-20).
(7) Box formation (two techniques, Paragraph C-21).
attack element parallel to the long axis of the kill zone and
subjects the guerrilla force to heavy flanking fire. The size of the
force that can be trapped in the kill zone is limited by the area
which the attack element can effectively cover with highly
concentrated fire. The force is trapped in the kill zone by natural
obstacles. mines (Claymore, antivehicular, antipersonnel),
demolition’s, and direct and indirect fires (Figure C-1).
C-8
FM 90-8
Figure C-2. Line formation: destruction ambush with access lanes for assault of target.
C-16. L-formation.
a. The L-shaped formation is a variation of the line formation. The
long side of the attack element is parallel to the kill zone and
delivers flanking fire. The short side of the attack element is at the
end of, and at right angles to, the kill zone and delivers enfilading
fire that interlocks with fire from the other leg (Figure C-3).
C-9
FM 90-8
c. When appropriate, fire from the short leg can be shifted to parallel
the long leg if the guerrilla force attempts to assault or escape in
the opposite direction. In addition, the short leg prevents escape
in that direction or reinforcement from that direction (Figure C-5).
C-17. Z-formation.
The Z-shaped formation is another variation of the L-formation. The
attack force is deployed as in the L-formation but with an additional
side so that the formation resembles the letter Z. The additional side
may serve to (Figure C-6):
• Engage a force attempting to relieve or reinforce the guerrillas.
• Restrict a flank.
• Prevent envelopment (of the ambush force).
• Seal the end of the kill zone.
C-10
FM 90-8
C-18. T-formation.
a. In the T-shaped formation, the attack element is deployed across,
and at right angles to, the route of movement of the hostile force so
that the attack element and the target form the letter T. This
formation can be used day or night to establish a purely harassing
ambush, and at night to establish an ambush to interdict
movement through open, hard-to-seal areas (such as rice paddies).
b. A small unit can use the T-formation to harass, slow, and
disorganize a larger force. When the lead guerrilla elements are
engaged, they will normally attempt to maneuver right or left to
close with the ambush force. Mines, mantraps, and other
obstacles placed to the flanks of the kill zone slow the guerrilla’s
movement and permit the unit to deliver heavy fire and then
withdraw without becoming decisively engaged. (Figure C-7).
c. The T-formation can be used to interdict small groups attempting
night movement across open areas. For example, the attack
element may be deployed along a rice paddy dike with every
second member facing in the opposite direction. The attack of a
force approaching from either direction requires only that every
second member shift to the opposite side of the dike. Each member
fires only to his front and only when the target is at close range.
Attack is by fire only, and each member keeps the guerrilla force
under fire as long as it remains to his front. If the force attempts to
escape in either direction along the dike, each member takes it
under fire as it comes into his vicinity. The T-formation is effective
at halting infiltration. (Figure C-8).
C-11
FM 90-8
Figure C-8. T-formation: rice paddy harassing ambush where guerrilla approach
may be from either direction.
C-12
FM 90-8
C-19. V-formation.
a. The V-shaped attack element is deployed along both sides of the
guerrilla route of movement so that it forms a V. Care is taken to
ensure that neither group (or leg) fires into the other. This
formation subjects the guerrilla to both enfilading -. and
interlocking fire (Figure C-9).
b. The V-formation is suited for fairly open terrain but can also be
used in the jungle. When established in the jungle, the legs of the
V close in as the lead elements of the guerrilla force approach the
apex of the V; elements then open fire from close range. Here, even
more than in open terrain, all movement and fire is carefully
coordinated and controlled to ensure that the fire of one leg does
not endanger the other. Wider separation of the elements makes
this formation difficult to control, and there are fewer sites that
favor its use. Its main advantage is that it is difficult for the
guerrilla to detect the ambush until well into the kill zone (Figure
C-10).
C-13
FM 90-8
C-14
FM 90-8
C-15
FM 90-8
C-20
FM 90-8
C-21
160-739 O - 94 - 6
FM 90-8
C-22
FM 90-8
APPENDIX D
Patrolling
Section I. General
D-1. Patrols.
a. This appendix provides guidance on patrolling. It describes
various types of patrols and patrolling techniques.
b. A patrol is a mission. The unit that has the mission organizes for
the conduct of the patrol. When organizing for the patrol, unit
integrity is maintained as much as possible.
c. The requirements of the mission determine the size, organization,
and equipment of a patrol. Some missions may require only two or
three men, lightly armed with no special equipment; some
missions may require a squad or platoon, specially armed and
equipped. A unit is always tailored for the mission it is to execute.
d. The effectiveness of a patrol is limited only by the ingenuity of the
planner and the skill and aggressiveness of the unit leader. For
this reason, they are one of the commander’s most valued tools.
Patrols are especially valuable in counterguerrilla operations.
Aggressive patrolling in an area greatly reduces the guerrillas’
freedom of movement, hampers their operations, and weakens
their influence on the local population.
e. Patrols are classified according to the nature of the mission
assigned.
Ž Make reconnaissance.
D-2
FM 90-8
D-4
FM 90-8
D-5
FM 90-8
D-6
FM 90-8
D-11. Security.
a. In addition to reaching the objective without discovery, if
possible, a reconnaissance patrol also tries to conduct its
reconnaissance or surveillance without being discovered. Stealth,
patience, and maximum use of concealment are mandatory.
b. A reconnaissance patrol fights only to protect itself or, when
authorized, to accomplish its mission. The commander dispatching
the patrol is responsible for informing tha patrol whether it is to
fight, if necessary, to accomplish the mission.
c. Day and night reconnaissance patrols use essentially the same
techniques. The principal differences are:
(1) Day reconnaissance requires greater use of concealment.
The patrol is more likely to be seen than at night and usually
will not be able to move as close to the objective.
(2) Night reconnaissance requires stealth. Sounds carry farther
at night, and reduced visibility usually requires a closer
approach to the objective.
d. When two or more teams of a patrol are to assembly at a linkup
point, one team is designated to secure the linkup point for the
arrival of other teams. The route and tasks of this team are
arranged so that it can reach the linkup point first and
accomplish these tasks.
D-13. Flexibility.
a. The combat patrol is one of the commander’s most flexible
weapons. Uses vary from a two-man patrol executing a harassing
ambush of opportunity to a reinforced platoon conducting raids,
ambushes, and target-of-opportunity operations. In some
instances, a patrol encountering a superior force may maintain
contact with the force until reinforcements permit decisive
engagement. Effectiveness of the patrol depends, not on size, but
on the suitability to a given situation.
b. The use of combat patrols forces guerrillas to engage in decisive
combat at unfavorable times and places. They can be used to
locate and destroy enemy camps, elements, and supply points.
Saturation of an area with patrols forces the guerrillas to either
curtail operations or consolidate in larger groups, which are
favorable targets for air, artillery, and large-scale attack.
c. Patrols may be inserted by parachute, helicopter, surface or
subsurface watercraft, or ground methods. The conduct of the
patrol itself remains unchanged, even though the method of
insertion changes.
D-9
FM 90-8
D-15. Movement.
A motorized patrol moves by one of three methods: continuous
movement, successive bounds, and alternate bounds:
D-10
FM 90-8
D-11
FM 90-8
c. In alternate bounds, all except the first two vehicles keep their
relative places in the column. The first two vehicles alternate as
lead vehicles on each bound. Each covers the bound of the other.
This method provides more rapid advance than movement by
successive bounds but is less secure; it does not allow soldiers in
the second vehicle enough time to thoroughly observe the terrain
to the front before passing the first vehicle. Security is obtained by
the vehicle commander who assigns each soldier a direction of
observation: to the front, flank(s), or rear. This provides each
vehicle with some security against surprise fire from every
direction and provides visual contact with vehicles to the front
and rear. For maximum observation, all canvas is removed from
the vehicles.
D-12
FM 90-8
D-17. Techniques.
There are many movement techniques that can be utilized. This section
describes basic and linear movements, and combat, zone, and area
reconnaissance.
b. The unit may then return to the ORP upon mission accomplishment,
or it may proceed through the objective area and onto a linkup
point (LUP) (Figure D-5). From there the unit continues with a
follow-on mission, or returns to base.
D-14
FM 90-8
Figure D-6. Stream and trail (1), contour (2), and cross-compartment (3).
D-16
FM 90-8
D-17
FM 90-8
D-18
FM 90-8
APPENDIX E
Bases
Section I. General
E-3. Planning.
a. When a unit halts for an extended period, it takes active and
passive measures to provide maximum security. The leader
selects, occupies, and organizes an area so located that it provides
passive security from enemy detection. This is a patrol base.
b. Planning a patrol base is usually a part of the patrol’s operation;
or it may be an on-the-spot decision. The length of time a patrol
base is occupied depends on the need for secrecy. In most
situations, occupation should not exceed 24 hours except in an
emergency. A patrol base is occupied the minimum time
necessary to accomplish the mission. The same base is not
(usually) used again.
c. In counterguerrilla operations, patrol base secrecy is required;
and evacuation (if discovered) depends on the degree of control the
guerrilla force has in the base area, their ability to react to the
discovery of a base, and their ability to affect the unit’s mission.
When a guerrilla force is relatively small and weak, patrol base
secrecy may not bean overriding consideration; and if the base is
discovered, evacuation may not be required. In an area controlled
by a large guerrilla force with a high degree of combat capability,
patrol base secrecy is mandatory; and if discovered, evacuation is
required.
E-1
FM 90-8
E-4. Selection.
a. The location for a patrol base is usually selected by map
reconnaissance during planning. Selection may also be by aerial
reconnaissance or based on prior knowledge of a suitable location.
b. A patrol base established as the result of an on-the-spot decision
requires reconnoitering, securing, expanding, and organizing the
area occupied during a security halt.
c. A patrol base location selected by map or aerial reconnaissance,
or by prior knowledge of an area, is tentative. Its suitability is
confirmed by ground reconnaissance, and it is secured before
occupation.
d. Plans to establish a patrol base include consideration of:
(1) Alternate location. This is used if the initial location
proves unsuitable or if the unit is required to evacuate the
initial location prematurely. In counterguerrilla operations,
reconnaissance and surveillance of an alternate location,
until occupied or no longer needed, are desirable.
(2) Linkup point. This is used if the unit evacuates the patrol
base by exfiltration in groups. The linkup point does not
have to be reconnoitered.
(3) Rallying point. This is used if the unit is dispersed from
the patrol base. It is a point over which the unit has
previously passed, and it is known to all.
E-2
FM 90-8
E-5. Considerations.
a. When planning for a patrol base, passive and active security
measures are considered, as well as the mission.
b. With regard to passive security measures, base selection
includes:
(1) Difficult terrain that impedes foot movement and has little
tactical value.
(2) An area with dense vegetation (bushes and trees that spread
out close to the ground).
(a) An area remote from human habitation.
(b) An area near a water source.
(c) An area that avoids known or suspected enemy
positions; built-up areas; ridgelines and topographic
crests (except as necessary for maintaining adequate
communications); roads or trails and natural lines of
drift; and wet areas, steep slopes, and small valleys
that may be lines of drift.
c. With regard to active security measures, base selection in-
cludes:
(1) Outpost and listening post systems covering avenues of
approach into the area.
(2) Communications with outposts and listening posts.
(3) Defense of the patrol base (if required).
(4) Withdrawal, to include multiple withdrawal routes (if
required).
(5) An alert plan.
(6) Enforcement of camouflage, noise, and light discipline.
(7) Conduct of necessary activities with minimum movement
and noise.
E-5
FM 90-8
E-6
FM 90-8
(4) Operation security. Only one point of base entry and exit
is used. It is camouflaged and guarded at all times. Fires are
built only when necessary and, as a rule, only in daylight.
Whether day or night, only necessary fires are built, and they
are kept as small as possible. Where terrain permits, fires are
built in pits and, if built at night, are carefully covered and
shielded. Building fires in pits reduces the danger of visual
detection and facilitates extinguishing the fires and
camouflaging the sites. The driest and hardest wood
available is used (to reduce smoke). In most areas, the best
time for building fires is when the air is thin and smoke
dissipates quickly (usually around noon); early morning
may be appropriate, however, in areas where there is ground
fog. The risk of detection, because of lingering odor, must be
weighed against the risk of detection due to visible smoke.
E-8
FM 90-8
E-7. Purpose.
When engaged in counterguerrilla operations, battalion elements often
establish a base for command and control and fire support resources,
protected by a perimeter defense. These resources are called the
battalion operational support base.
E-9
FM 90-8
E-10. Infiltration.
a. Guerrillas may be able to conduct large-scale attacks on fortified
positions, but they may disrupt operations by infiltrating one or
two men through the perimeter to place explosive devices on
command and control facilities, artillery pieces or mortars, or
ammunition storage areas.
b. This infiltration often follows a deceptive attack or probe. The
perimeter defense force maintains constant security, using early
warning systems and continuous patrolling. Starlight scopes,
OPs, unattended ground sensors, ground surveillance radars, and
trip flares are also used. Wire obstacles should be used to keep
infiltrators out of critical facilities.
E-10
FM 90-8
E-11. Reserves.
a. A reserve for the defense is made up from attachments (engineers,
if available, or from off-shift personnel from tactical operation
center [TOC] and CP elements).
b. The reserve reacts to enemy attacks and reinforces the defense or
counterattack. It is rehearsed on signals and actions. Mortars are
employed to provide close-in fire support. Artillery pieces maybe
able to provide direct fire but may not be able to provide indirect
fire in support of the perimeter. Hence, the perimeter should be
within range of other artillery and mortar units for additional
protection.
fields of fire are cleared; the landing zone is enlarged; and the
latrine, generators, and ammunition supply point are estab-
lished.
NOTE: Camouflage is applied throughout base preparations.
b. The size of the base is dependent upon the situation and the
terrain available. When artillery is within the perimeter, then the
OSB is larger to accommodate the guns and supporting equipment
(Figure E-5).
E-12
FM 90-8
160-739 O - 94 - 7
FM 90-8
E-14
FM 90-8
(1) Tenant units not assigned primarily for base defense are
normally used in the role or configuration for which they are
organized and trained — except when required for duty as
emergency augmentation forces during an all-out attack on
the base.
(2) Combat, combat support, and combat service support
elements are specifically allocated for base defense missions
when guerrilla actions are frequent, prolonged, or severe.
(3) When emergency augmentation forces are used in base
defense situations, they must be returned to their primary
functions as soon as the situation permits.
(4) Base tenant unit personnel are responsible for local security.
The organization of a provisional defense force or the
assignment of a combat unit to provide security for the base
does not relieve them of this responsibility.
b. The overall concept of base defense includes all actions required to
preseve the operating integrity of the base.
E-17
FM 90-8
(2) Towers. When coupled with night and day vision aids,
sensors, and flash-ranging devices, elevated platforms
enhance the capability of detecting perimeter infiltration
and the location of guerrilla mortar and/or rocket firing
positions. Either standard military towers or towers
constructed from local materials can be used. The installation
of sandbags or steel plating around observation platforms
provides protection against automatic weapons and small
arms fire. Construction of a ground-level bunker provides
additional protection when fires are directed against the
tower. Access to the bunker maybe by means of a fireman’s
pole or a ladder arrangement. Tower safety measures for
consideration include:
(a) Lightning arresters.
(b) Construction to withstand strong winds and to support
two observers and their equipment.
(c) Enclosed mounting ladder.
(d) Provision of safety nets round the tower when warranted
by tower height.
(e) Painting it a dark color to reduce reflection from moon-
light.
(f) Installation of a suitable roof to shield personnel from
the elements without interference to observation. A
double-roof design could cause mortar rounds to
detonate at a height that affords some protection to
observers.
b. Control is the key to a successful base defense. To achieve the
necessary control, a communication capability must be established
between the base defense operations center and commanders of
sectors of responsibility, and between the sector commander and
his bunkers, towers, and reserve. Additionally, bunkers within
each section can communicate laterally within the sector, and
flank bunkers of one sector can communicate with flank bunkers
of adjacent sectors.
E-20
FM 90-8
160-739 O - 94 - 8
FM 90-8
E-22
FM 90-8
E-23
FM 90-8
APPENDIX F
F-1. Employment.
a. This appendix provides guidance on the employment of chemical
agents and munitions in counterguerrilla operations.
b. The munitions are useful where there is difficulty in pinpointing
guerrilla locations, and where the area coverage provided by riot
control munitions would be greater than that of other available
weapon systems.
F-2. Smoke.
a. Smoke may be used to identify, signal, obscure, deceive, and
screen. It may be used to identify and signal targets, supply and
evacuation point, and friendly unit positions. It may also provide
the counterguerrilla commander with prearranged battlefield
communications.
b. Obscuring smoke is used on guerrilla positions to reduce their
ability to see and engage friendly targets. Deceptive smoke is used
to mislead guerrillas as to friendly force intentions. Screening
smoke is used in friendly operational areas, or between friendly
and guerrilla forces to deny guerrilla observation of areas where
friendly units are maneuvering, or resupply or recovery operations
are in progress. This type of smoke employment usually is not
required by the counterguerrilla commander until the later stages
of Phases II and III.
c. Smoke sources include:
(1) Mechanical smoke generators (large screen areas).
(2) Smoke grenades (small screens, signaling, identifying).
(3) M110-pound smoke pot (small screen).
(4) ABC-M5 30-pound smoke pot (small screen).
(5) M42A and M207A1 floating smoke pot (small screens,
ground or water base).
(6) WP mortar and WP and HC artillery rounds (obscuring,
signaling, deceiving, identifying).
(7) WP tank rounds, 90-mm and 105-mm (small screens,
obscuring, signaling, identifying).
(8) Grenade-launched round by tanks, Bradley fighting vehicle,
and M203 (small, individual screens).
F-1
FM 90-8
F-4. Herbicides.
F-3
FM 90-8
APPENDIX G
Section I. General
G-3. Encirclement.
a. Encirclement is designed to cut off all ground routes for escape
and reinforcement of the encircled guerrilla force. It offers the best
possibility for fixing guerrilla forces in position and achieving
decisive results. Battalion and larger units may conduct en-
circlements.
b. The company and smaller units normally lack enough men and
command and control capability to conduct encirclements (except
against small, concentrated guerrilla forces). All units of the
brigade may participate in encirclements conducted by a larger
force.
c. Planning, preparation, and execution are aimed at complete
encirclement of the guerrilla force. Maximum security and
surprise can be gained by completing the encirclement during
darkness.
d. Encircling movements are executed rapidly. Use of air assault
and airborne troops can contribute speed and surprise to the early
G-1
FM 90-8
G-4. Contraction.
a. Following the initial encirclement, the capture or destruction of
the guerrilla force is methodical and thorough. Fire and maneuver
are used in a simultaneous, controlled contraction of the en-
circlement.
b. As the line of encirclement is contracted, and depending on
terrain, units may be removed from the line and added to the
reserve. Against small guerrilla forces, the entire encircled area
may be cleared by contraction; however, against larger guerrilla
forces, it is probable that, at some point, some action other than
further contraction will be required (Figure G-l).
G-3
FM 90-8
G-4
FM 90-8
G-7. US involvement.
While it is preferable to have host country forces control civil
disturbances, US forces may be forced by circumstances to conduct
them and be involved in search operations. (The type of civil
disturbance provides the necessary counteraction guidelines; for
detailed information refer to FM 19-15.)
across the road and around the search area should be provided.
Troops must have adequate firepower to withstand an attack or to
halt a vehicle attempting to flee or crash through the checkpoint.
b. Method. The checkpoint is established by placing two parallel
obstacles (each with a gap) across the road. The distance (in
meters) between obstacles depends on the amount of traffic that is
held in the search area. The blocked section of road can be used as
the search area. If possible, there should be a place (adjacent to the
road) where large vehicles can be searched without delaying the
flow of other traffic (which can be dealt with more quickly). Areas
are required for searching female suspects and detaining persons
for further interrogation. If possible, the personnel manning a
checkpoint should include a member of the civil police, an
interpreter, and a trained female searcher. When searching a
vehicle, all occupants are made to get out and stand clear of the
vehicle. The driver should be made to observe the search of his
vehicle. The searcher is always covered by an assistant. When
searching, politeness and consideration are shown at all times.
The occupants of the vehicle can be searched simultaneously, if
sufficient searchers are available (Figure G-4).
G-6
FM 90-8
G-9
FM 90-8
• Documentation.
Ž Psychological/civil affairs operations.
G-10
FM 90-8
Ž Warning systems.
Ž Tunnel systems.
• Where does the insurgent live? Does he live in the
forest at night and inhabit the village during the
day, or does he stay in the village night and day?
Does he inhabit one or more huts?
• How many people are there in the village?
(b) The security and search elements use one of two
general methods of movement.
• If aviation support is available, a quick-strike air
assault operation is employed. This type of operation
is characterized by speed.
Ž If the elements conduct a dismounted operation,
they normally use designated routes. This type of
operation is characterized by secure and rapid
movement.
Ž A village may be searched as follows:
Ž First method – assemble inhabitants in a central
location (if they appear to be hostile). This method
provides maximum control, facilitates a thorough
search, denies insurgents an opportunity to conceal
G-11
FM 90-8
G-14
FM 90-8
(1) Some of the troops are placed well forward in the convoy, and
the remainder are placed a short distance to the rear.
(2) Radio contact is maintained between the two groups.
(3) Sharp curves, steep grades, or other areas where slow speeds
are necessary are reconnoitered by foot troops before
passage.
b. At the first indication of ambush, leading vehicles, if the road
appears clear, increase speed to the safe maximum in an effort to
smash through the ambush area. Troops from vehicles halted in
the ambush area dismount and immediately return fire. Troops
from vehicles breaking through the ambush dismount and
assault the flanks of the ambush position. Both attacking groups
must exercise care that they do not fire on each other.
c. If the enemy force allows the main convoy to pass through and
then ambushes the rear guard, troops from the main body return
and attack the flanks of the ambush position.
G-15
FM 90-8
APPENDIX H
Related Operations
Section I. General
H-2
FM 90-8
H-3
FM 90-8
H-6. Counterintelligence.
Counterintelligence increases the security of all forces and increases
the probability of attaining surprise in operations against guerrilla
forces. Adequate security measures are developed and continuously
enforced to prevent penetration of the intelligence operation by hostile
elements and to detect hostile elements already within the operation.
Since guerrilla forces are usually numerically inferior to those of the
host country, allied, and US forces opposing them, the guerrilla
depends heavily on intelligence for successful operations. US brigades,
in coordination with host country authorities, must habitually place
emphasis on counterintelligence measures.
H-6
FM 90-8
H-9. Concept.
a. The overall psychological operation program for a given host
country is established at the national level by a US-host country
agency. This program provides guidelines for succeeding lower
military and civilan echelons to use in the quest for popular
support.
b. Counterguerrilla units must ensure that their PSYOP is consistent
with and supports US national objectives and the host country
national PSYOP program. The brigade employs psychological
operations to support its tactical strike and consolidation
missions and to support intelligence operations, civil affairs
operations, and advisory assistance operations. Care is exercised
to ensure that the allegiance of the people is directed toward the
host country rather than toward US brigade forces, and that
announced programs and projects are attainable. Coordination is
accomplished in the local area control center.
H-10. Organization.
a. The psychological operations staff officer(s) and unit(s) perform
assigned missions in the same manner as other specialized units
or staff members that are attached to, or placed in support of, the
brigade or battalion. When such support is not available, a
member or section of the unit staff is assigned responsibility for
incorporating psychological operation considerations into plans,
action, and operations.
H-7
FM 90-8
H-11. Operations.
a. Properly integrated and employed in the planning and conduct of
operations and activities, psychological operations can facilitate
the accomplishment of the brigade’s mission. Counterguerrilla
forces must consider the employment of psychological operations
in all missions. Commanders and staff officers must realize that
all military operations have psychological implications. PSYOP
officers must be included in planning all activities.
b. The establishment of support bases and operational support
bases necessitates gaining the support of the populace in the
vicinity. Propaganda themes stress the purpose of US support
and the military civic action program; the need for laborers; the
effects of pilferage on the counterguerrilla effort; and that people
do not discuss US and host country military activities.
c. Within an insurgency context, PSYOP has five major objectives:
(1) Assist the government in gaining the support of its popu-
lation.
(2) Assist the government in defeating the insurgent movement.
(3) Assist the government in providing psychological rehabili-
tation for returnees from the subversive insurgent move-
ment.
(4) Establish and maintain a favorable image in the host
country.
(5) Influence neutral groups and the world community.
d. The major tasks of US PSYOP in an insurgency (when US combat
forces are not yet committed) are to:
(1) Advise host country PSYOP personnel on how to best exploit
government programs.
(2) Recommend techniques for maintaining morale of host
country forces.
(3) Assist host country and US information agencies and
activities in coordinating their efforts.
(4) Assist host country personnel regarding PSYOP programs
which will motivate the people to actively support their
government.
H-8
FM 90-8
160-739 O - 94 - 9
FM 90-8
H-12. Government-building.
a. The civil affairs (CA) role in FID takes the form of civic assistance
and civic action.
b. Civic assistance is defined as providing advice and assistance to
indigenous civil and military authorities in the sociological,
economic, and political aspects of a civil emergency, disorder, or
IDAD. It is commonly referred to as “government-building” since
it is directed toward the structures of government. Military civic
action is defined as the participation findigenous military forces
in short-term projects which are useful to the local population and
which contribute to social and economic development.
e. Both civic assistance and civic action are geared to the phase of
insurgency they are facing.
H-12
FM 90-8
H-14. US role.
a. The normal role of the US military in civic assistance and civic
action is to advise and assist host nation military forces. Under
some rare conditions, US military units may enter into direct civic
action programs.
b. Units as small as a battalion task force may be assigned CA
elements to assist in carrying out CA plans. A civil-military
operations staff officer may also be assigned to such a task force.
c. CA liaison and coordination should be established between
military forces and government agencies. This can be accomplished
through organizations specifically designed for this purpose or
through CA staff elements.
d. CA operations require good relationships with the population. To
establish a good relationship, troop discipline, courtesy, and
honesty in dealings with the people are emphasized. Where
rapport has been established between host country forces and the
population, properly administered CA operations contribute to
the attainment of FID objectives.
H-14
FM 90-8
H-18
FM 90-8
APPENDIX I
Staff Functions
I-1. General.
This appendix describes some of the major functions and duties of staff
personnel that are inherent in counterguerrilla operations.
APPENDIX J
Combined Operations
J-1. General.
If and when US forces are deployed to a host country to assist in a
counterinsurgency conflict, tactical operations will probably be joint
in nature, and it is likely that US forces will be working with, or in
support of, the military and paramilitary forces of the host country.
J-1
FM 90-8
J-4. Intelligence.
Establish procedures for:
a. Dissemination of military intelligence and use of intelligence
assets by partners.
b. Coordination of intelligence operations.
c. Sharing of high-tech intelligence capabilities.
J-2
FM 90-8
Glossary
Acronyms, Abbreviations
A
ACC area control center
ADA air defense artillery
AI air interdiction
AO area of operations
B
bde brigade
BDF base defense force
bn battalion
BSA brigade support area
C
3
C CM Command, Control, Communications countermeasures
CA civil affairs
CAS close air support
cdr commander
CEOI communications-electronics operation instructions
CEWI combat electronic warfare intelligence
co company
COIN counterinsurgency
COMINT communications intercept
COMSEC communications security
CP command post
CS chemical gas
D
DCA defensive counter air
div division
DS direct support
Glossary-1
FM 90-8
E
EC electronic combat
ELINT electronic intelligence
EW electronic warfare
F
FA field artillery
FAC forward air controller
FDC fire direction center
FID foreign internal defense
FIST fire support team
FM frequency modulation (radio)
FMS foreign military sales
FPF final protective fire
FSO fire support officer
G
GS general support
H
HAHO high altitude, high opening
HALO high altitude, low opening
HC chemical smoke
HHC headquarters and headquarters company
HQ headquarters
HUMINT human intelligence
I
IDAD internal defense and development
IMINT imagery intelligence
indiv individual
info information
L
ldr leader
Glossary-2
FM 90-8
M
MAP military assistance program
METT-T mission, enemy, terrain (and weather), troops (available), and time (available)
MI military intelligence
N
NBC nuclear, biological, chemical
O
obj objective
OCA offensive counter air
OCOKA Observation and fields of fire, Concealment and cover,
Obstacles, Key terrain, Avenues of approach and
escape
OP observation post
op operation
OPSEC operations security
ORP objective rally point
OSB operational support base
P
pers personnel
plt platoon
POL petroleum, oils, lubricants
P&RC population and resources control
PSG platoon sergeant
PSYOP psychological operations
PW prisoners of war
Glossary-3
FM 90-8
R
RCA riot control agent
recon reconnaissance
RON remain overnight
R&S reconnaissance and/or surveillance
RSTA reconnaissance, surveillance, target acquisition
S
SAO security assistance organization
SEAD suppression of enemy air defense
SIGINT signal intelligence
S1 adjutant
SOP standing operating procedure
SP start point
sqd squad
STANO surveillance, target acquisition, and night observation
T
TACFIRE tactical fire direction system
tm team
TOC tactical operations center
TOE table(s) of organization and equipment
TOW Tube-launched, Optically-tracked, Wire-guided missile
U
US United States
USAF United States Air Force
W
WP white phosphorus
X
XO executive officer
Glossary-4
FM 90-8
References
Required Publications
Related Publications
References-2
FM 90-8
References-3
FM 90-8
Index
Index-5
FM 90-8
support tactics
aircraft, 3-38 conventional warfare, 1-4, 3-25
artillery and mortar, 3-38 guerrilla warfare, 2-8
close air, 6-12
training, 1-8, E-22
support bases, see brigade support base
transportation
support units air, 7-5
engineers, 6-7 ground, 7-5
fire support, 6-7 nontactical, 7-4
military intelligence, 6-7, 6-16 tactical, 7-4
military police, 6-18
reconnaissance and surveillance, 6-2 tunnel systems
signal, 6-19 access and escape routes, A-4
construction methods, A-8
destruction of, A-12
tactical detection of, A-9
assistance, H-16
intelligence, 3-6 search of, A-10
situation, 3-7 special equipment, A-11
tactical counterguerrilla operations, 3-1, 3-2, 3-5 Uniform Code of Military Justice, 4-4
contraction, G-3
encirclement, G-1 urban operations
hammer and anvil, G-4 counterguerrilla, B-2
wedge, G-4 government activities, 3-49
guerrilla tactics, B-2
tactical operations in cities and towns, B-1
air, 6-11 subversive activities, 3-49
counterguerrilla, see tactical counterguernlla
operations vehicle searches, 3-18
in urban areas, 3-49
tactical transportation, 7-4 water and river movement, 3-42
Index-6