SPMAGTF(X) MOUT Training Program of Instruction

Introduction to Security Operations

INTRODUCTION

GAIN ATTENTION

Since the end of the Cold War, American military forces have been employed in a wide range of operations that fall short of full-scale military conflict. Success in these operations requires the same tough realistic training and the application of the same warfighting skills as are called for in conventional warfare.

Unlike the campaigns executed by many of our predecessors, today’s Marines will likely be involved in operations that will not always involve a conventional enemy (as in Desert Storm), but may involve anarchy, terrorism, starvation, ethnic rivalry, civil disturbances, and numerous other operations which are difficult to quantify.

PURPOSE

The purpose of this period of instruction is to introduce you to the various Military Operations Other Than War (MOOTW) with a special emphasis on security operations.

INDIVIDUAL TRAINING STANDARDS

MISSION PERFORMANCE STANDARDS

P2A.18.1
P2A.18.2
P2A.18.3
P2A.18.4
P2A.18.5
P2A.18.6
P2A.18.7
P2A.18.8
P2A.18.9

TERMINAL LEARNING OBJECTIVE

Without the aid of reference and in accordance with FMFM 6, FM 7-98, FM 100-20 and MCWP 3-34, understand the principles of security operations.

ENABLING LEARNING OBJECTIVES 1. Know the definition of MOOTW.
2. Know the various missions which can be performed under MOOTW.
3. Know the principles of security operations.

METHOD AND MEDIA

This period of instruction will be taught by lecture, aided by a video and Powerpoint presentation.

TESTING

This period of instruction will be evaluated through practical application during situational training exercises.

TRANSITION

Now that we have looked at our learning objectives let’s define MOOTW.

BODY

1. MOOTW

Security operations involve Military Operations Other Than War (MOOTW) and encompass a wide range of activities where the military instrument of national power is used for the purposes other than the large-scale conventional combat operations usually associated with war.

2. Operations/Missions

Although there are many, we will be examining some examples of the operations that can be performed in a low intensity conflict (LIC). As indicated by the following examples, the distinctions between these operations is often blurred.

a. Peacemaking: Efforts to settle a conflict through mediation, negotiation or other peaceful means. Peacemaking normally precedes the initiation of military operations and continues throughout the duration of peacekeeping and peace enforcement operations. (Dayton, Ohio, 1995 – Bosnia’s warring factions reach a peace agreement after month’s of negotiations).

b. Peacekeeping: Military operations employed to support diplomatic efforts to maintain pre-established peace and to negotiate long-term peace only after a truce has been negotiated. (Bosnia, 1995 – after the Dayton Accords, all factions agreed to the deployment of a 60,000 NATO force. Haiti, 1994 – after Cedras agree to peacefully relinquish power, U.S. forces deploy to oversee the change over of national command).

c. Peace Enforcement: Military operations to restore peace and security. The key difference between peace keeping and peace enforcement is that one of the belligerents may not be consenting to military intervention and may be continuing combat activities. (Bosnia, 1994 – Operations Deny Flight and Provide Promise were conducted to enforce the UN mandated no-fly zones and to provide safe havens for noncombatants. These operations were conducted against the will of the Bosnian Serbs. Los Angeles, 1992 – 1st Marine Division, as part of JTF L.A., was tasked with providing forces to assist in restoring order to the riot-torn city. The Marines provided reaction forces, conducted patrols, escorted police officers and fire fighters in high-risk situations, and provided security for businesses in Compton and Carson City. Beirut, 1982-1984 – Although this deployment began as a peacekeeping operation, it later took on elements of peace enforcement).

d. Humanitarian Assistance: Operations involving the use of Department of Defense (DOD) personnel, equipment and supplies to promote human welfare, reduce pain and suffering, prevent loss of life or destruction of property in the aftermath of natural or man-made disasters, and to provide security for these operations. (Los Angeles, Somalia, Rwanda, Bangladesh, Florida).

e. Noncombatant Evacuation Operations (NEO): Operations involving the relocation of threatened civilian noncombatants from locations in a foreign country or host nation. Noncombatants may be U.S. citizens or foreign nationals. NEOs may be conducted in a peaceful and orderly fashion or may require the use of force. (Liberia, 1991 - Somalia, 1992 – Ghana, 1994 - Albania, 1997).

f. Force Protection: A security program designed to protect military service members, civilian employees, their family members, facilities and equipment, in all locations and situations. This is accomplished through planned and integrated application of combating terrorism, physical security, operations security, and personal protective services, and is supported by intelligence, counterintelligence and other security programs.

3. Principles of Security Operations

With little exception, the sensitivity of security operations will lead to intense media scrutiny and extremely restrictive rules of engagement (ROE). In order to operate in this environment, the principles of security operations must be understood and carefully applied when analyzing the requirements of the mission. The impact of an error in judgement during these operations can be very severe.

a. Objective: A clearly defined and attainable objective is crucial and must be accompanied by a precise definition of success. Both are critical components of security operations.

b. Unity of Effort: If it is a joint or coalition operation, a clearly defined chain of command and unity of effort is crucial though often difficult to attain. Differences in culture, training, language and ethics can cause severe problems. c. Security: A constant focus on force protection and protection of civilian noncombatants is a must. Various groups and individuals may be opposed to the presence of U.S./Coalition military forces and attempt to undermine the host government and the military mission through the use of terrorism and psychological operations (PSYOPS) via the media. These PSYOP campaigns are intended to portray the U.S./Coalition force as the “bad guy”.

d. Restraint: ROE are established by the theater Commander in Chief (CINC) and are based on national command authority guidance, mission, threat, law of war, and host nation restrictions. ROE are passed from the top-down and must be thoroughly briefed, understood, and enforced. ROE are NOT designed to prevent a Marine from protecting himself – instead, they are provided as a guide in the sound selection, deployment and employment of forces and force in a given situation.

e. Knowledge: Before deployed and committed to a security operation Marines must have a thorough knowledge of the host countries culture and political situation. A simple misunderstanding due to cultural differences can have a large impact on the civilian populace’s perception of U.S. forces.

f. Training: Though most of the training is similar to that need for conventional war, certain military skills require greater emphasis:

1. ROE
2. Regional/Cultural orientation and familiarization
3. The nature of MOOTW
4. Personnel and equipment identification skills
5. Counterterrorism skills
6. Urban patrolling skills (foot, vehicle, air)
7. Checkpoint operations
8. Mine/booby trap/unexploded ordnance training
9. Survival skills
10. Riot control
11. Convoy operations
12. Humanitarian assistance operations
13. Media relations skills
14. Other Military Operations on Urbanized Terrain (MOUT) training not mentioned above

g. Weapons: ROE normally allow the use of deadly force only after “all lesser means have been exhausted.” A variety of less than lethal weapons may become available to units shortly before deployment. Marines must familiarize themselves with these weapons and be made to understand that improper use of non-lethal weapons can transform them into lethal weapons. Here are some examples of non lethal weapons:

1. Pepper spray
2. Stun guns
3. CS (only when authorized by higher command)
4. Rubber bullets
5. Sticky foam
6. 12 gauge bean bag round
7. 40mm sponge grenade

QUESTIONS

Name five of the non-lethal weapons that may be deployed in security operations.

SUMMARY

Developing the proper mindset for security operations is as important as developing tangible combat skills. These types of operations place Marines in situations where right and wrong become extremely vague and rules of engagement may restrict a Marines options.

The MOUT Homepage Hot Links:

U.S. Army FM 100-23 Peace Operations

U.S. Army FM 19-4 Military Police Battlefield Circualtion Control, Area Security and Enemy Prisoners of War

Handbook for the Soldier in Operations Other Than War (CALL)

The Role of Infantry in Stability Operations (CALL)

JP 3-07: Joint Doctrine for MOOTW

Operations Other Than War: Mission Types and Dimensions

Training Requirements for Stability Operations (U.S. Army)

Common Peace Operations Tasks (CALL)

Return to POI Table of Contents

HOMECONCEPTSDOCTRINE
OPERATIONS 1OPERATIONS 2 TECHNOLOGY
COMMERCIALRESEARCHMOUT FORUM
COMMENTS SIGN GUESTBOOK VIEW GUESTBOOK
UNITS/IMAGESDEDICATIONE-MAIL

Visitor since 23 February 1998

This page hosted by Get your own Free Home Page