Ospery, the bird of the Selous Scouts.Selous Scouts "Pamwe Chete" title block.Ospery, the bird of the Selous Scouts.

 

"PAMWE CHETE"

HOME

SKUZ' APO MARKETPLACE

DEDICATION

UPDATES

UNIT PROFILE

SELECTION AND TRAINING

POLITICAL OVERVIEW

GALLERY

OPERATIONS

WEAPONS AND EQUIPMENT

RHODESIAN EXPERIENCE

PSEUDO- TERRORIST OPERATIONS

COMBAT TRACKING

TACTICAL BUSHCRAFT

AWARD RECIPIENTS AND K.I.A.

RHODESIAN SECURITY FORCES

RHODESIAN COIN MANUAL

OTHER RHODESIAN ELITES

RESOURCES

RELATED LINKS

VIEW GUESTBOOK

SIGN GUESTBOOK

SITE INDEX

T.A.L. DOZER

 

 

 

Defense/Protection of sensitive points

SECTION 1: INTRODUCTION

  1. Military forces will be required to undertake the defense/protection of sensitive points. These may be considered vital points which, if damaged or secured by the enemy, represent great disadvantage to the government military forces and the population, i.e.:
    1. Installations with a political, administrative, economic and military interest such as:
      1. Essential services, e.g.,, water, gas, electricity, etc.
      2. Fuel and industrial installations.
      3. Vital points of communication, e.g., bridges, tunnels, railways, etc.
    2. Centers of population which must be protected from any contact with the enemy.
  2. The protection of sensitive points is a tactical problem and will vary according to the nature of the installation, location, probable enemy action and the troops available for the task. Commanders must strike a balance between the military need to retain mobile forces for offensive tasks and the military or civilian requirement for security. A satisfactory and sound solution will only be found by close cooperation and discussion with the police and civil authorities.
  3. A list of sensitive points should, if possible, be drawn up by the local government officials, military and police commanders to establish priorities. The classification of sensitive points should be frequently reviewed in relation to the situation and the consequent possible shift in emphasis. Some sensitive points may only be classified as such for limited periods, e.g., railway siding during the unloading of ammunition.

SECTION 2: ORGANIZATION OF DEFENSE AND SECURITY

  1. General. This mission of a unit tasked with defending or protecting a sensitive point would normally be to guarantee at any cost from terrorist action, the installation, together with the people who serve it. In certain cases this may not be possible and it will be necessary to accept that the defense can only be undertaken for limited periods unless external reserves are committed.
  2. Appreciation. In making his appreciation, the commander should consider the following basic factors:
    1. The importance and nature of the sensitive point.
    2. The available force, including reserves, and their location in relation to the sensitive point.
    3. The enemy threat.
  3. Plan. During his planning, the commander should bear in mind the normal principles of defense. The following points will require particular attention:
    1. Careful siting of weapons.
    2. Good fields of fire.
    3. Protection and concealment of fire positions.
    4. Efficient system of communications (internal and external).
    5. Control.
    6. Deception.
    7. Security.
    8. Reserve.
    9. Alarm scheme.
  4. Siting of weapons. Weapons should be carefully sited to ensure the best use of their characteristics. Positions should be mutually supporting and provide all-around defense and depth. Positions should be changed frequently and, if possible, day and night positions should not be the same.
  5. Fields of fire. In certain circumstances it will be necessary to clear fields of fire. Thick bush and other obstacles which make fire and observation difficult should be cleared from the immediate vicinity of the defended area.
  6. Protection and concealment. Fire positions should be concealed and protection obtained by the best use of buildings suitably sand-bagged and developed into strong points.
  7. Communications. All sub-units involved in the protection or defense of the sensitive point should be linked with an efficient system of communication. This should be duplicated. External communications are also essential.
  8. Control. This is achieved through:
    1. Good communications.
    2. Good observation. In certain circumstances it may be necessary to build towers to achieve this.
  9. Deception. This may be achieved with alternative positions. However, when the topography does not provide adequate concealment for alternative positions and the deployment of the reserve, it may be necessary to dig communication trenches.
  10. Security. In addition to the defense of a sensitive point, it will be necessary to organize an efficient security system, thus:
    1. Reducing the chances of a surprise attack.
    2. Permitting adequate time for troops to occupy defensive/alarm positions.
  11. Security of a sensitive point may be organized in the following manner:
    1. Internally.
    2. In close proximity.
  12. Internal security. This is obtained through:
    1. An efficient system of sentries.
    2. Night illumination.
    3. Obstacles.
    4. Alarm system.
    5. Identification system.
  13. An efficient system of sentries may be achieved through these points:
    1. Sentry posts should be sited so as to ensure all-around observation with the minimum number of posts. If necessary, towers should be built to achieve this.
    2. Sentry posts should frequently be changed and should, if possible, be varied by night.
    3. At night, sentries should be doubled and simultaneous changing of sentries should be avoided.
    4. War dogs could be used to increase the efficiency of sentries.
    5. Reserves should be located in relation to sentry posts for quick reaction.
  14. The illumination of likely approaches should be planned and may include conventional flares or the use of improvised means such as kerosene flare drums or the lights of vehicles.
  15. Obstacles should be sited to cover likely enemy approaches. Wherever possible, best use should be made of natural obstacles which may require some improvement. Obstacles serve to prevent a successful quick attack, slow down the enemy and enable casualties to be inflicted. Where observation is more difficult, the obstacles should be supplemented with alarm devices, e.g., anti-personnel mines, tins, electrified wires, etc.
  16. The alarm scheme should, where possible, provide warning of the approach of the enemy without disclosing this fact, thus enabling the commander to issue the necessary orders for deployment and to achieve maximum surprise. However, should time not permit, a general alarm scheme should exist, thereby enabling alarm positions to be occupied with the minimum of delay.
  17. An identification system is necessary to ensure the identity of:
    1. Patrols and detachments operating in close proximity to the sensitive point.
    2. Civilian elements who may be required to enter the sensitive point for their normal functions and activities.
  18. The password system of identification is generally used for military personnel while, in the case of civilians, it is normal to issue permits, or only permit entry at predetermined times and places, during which careful screening is carried out.
  19. Close proximity security. This is the security of the immediate vicinity of the sensitive point and is achieved by:
    1. Patrols.
    2. Observation posts.
    3. Ambushes, obstacles and booby traps covering likely approaches.
  20. Patrols have the task of extending the security of a sensitive point and will be particularly useful when it is not possible to cover all approaches by observation. Their patrol program should be irregular, in both time and routes, to prevent being surprised. The use of dogs should also be considered.
  21. Observation posts should be established to cover likely routes to the sensitive point. In all cases these posts must be well concealed, well protected and provided with radio communications.
  22. If considered necessary, it may be possible to establish ambushes, obstacles, etc., to cover the most likely concealed approaches of the enemy.
  23. Important aspects. When planning the defense and security of a sensitive point, the following points should be borne in mind:
    1. The enemy will always aim to achieve surprise and may even attempt to penetrate the inner security of the sensitive point before initiating the attack.
    2. The enemy will always carry out a reconnaissance, in an attempt to establish the layout of the defense, before attacking. Consequently, fire discipline is essential and fire should only be opened when maximum casualties are ensured. Vigorous patrolling by day will help to prevent enemy reconnaissance.
    3. Counterattack plans should be made and any favorable situation should be rapidly exploited.
    4. Frequent checks, especially before last light, should be made to ensure the following are known:
      1. Arcs of fire and observation.
      2. Fire positions.
      3. Location of the commander.
      4. Location of adjoining sub-units.
      5. Action in the event of an alarm.
      6. Sentry duties.
      7. Time out and in of friendly force patrols.
      8. Weapons and equipment are available for immediate use.
  24. In certain cases it must be accepted that it is impossible to organize the defense of a sensitive point in secrecy. On these occasions it may be preferable to establish the defense openly, thus indicating our strength and efficiency to the local population and possibly the enemy. Obviously, detailed planning will not be disclosed, as security will be vital to the defense of the installation.

 

 

 

THIS SITE LAST UPDATED: Sunday, September 16, 2007 06:43:38 PM

Copyright © 2000 - 2007 by T.A.L. DOZER. All rights reserved.