Author: Henry Prunckun
Publisher: Pen and Sword
ISBN: 1473859379
Category : Reference
Languages : en
Pages : 101
Book Description
This comprehensive primer explains how to conduct your own recon operations, covering tactics, equipment, and counter-reconnaissance. How to Undertake Surveillance and Reconnaissance offers a detailed overview of surveillance and reconnaissance work. In doing so, it shows readers how to employ the unique trade craft in order to help you plan and carry out your own recon missions. Author and former government intelligence worker Dr. Henry Prunkun explains the background of surveillance and reconnaissance, why they are necessary, and how they can be effectively employed. He also covers the essential equipment and training necessary to carry out a successful mission. Readers also learn how to counter opposing reconnaissance efforts. Each chapter of this well referenced and thoroughly indexed book contains a list of key words and phrases, study questions, and a few learning activities that will assist you with your study.
How to Undertake Surveillance & Reconnaissance
Author: Henry Prunckun
Publisher: Pen and Sword
ISBN: 1473859379
Category : Reference
Languages : en
Pages : 101
Book Description
This comprehensive primer explains how to conduct your own recon operations, covering tactics, equipment, and counter-reconnaissance. How to Undertake Surveillance and Reconnaissance offers a detailed overview of surveillance and reconnaissance work. In doing so, it shows readers how to employ the unique trade craft in order to help you plan and carry out your own recon missions. Author and former government intelligence worker Dr. Henry Prunkun explains the background of surveillance and reconnaissance, why they are necessary, and how they can be effectively employed. He also covers the essential equipment and training necessary to carry out a successful mission. Readers also learn how to counter opposing reconnaissance efforts. Each chapter of this well referenced and thoroughly indexed book contains a list of key words and phrases, study questions, and a few learning activities that will assist you with your study.
Publisher: Pen and Sword
ISBN: 1473859379
Category : Reference
Languages : en
Pages : 101
Book Description
This comprehensive primer explains how to conduct your own recon operations, covering tactics, equipment, and counter-reconnaissance. How to Undertake Surveillance and Reconnaissance offers a detailed overview of surveillance and reconnaissance work. In doing so, it shows readers how to employ the unique trade craft in order to help you plan and carry out your own recon missions. Author and former government intelligence worker Dr. Henry Prunkun explains the background of surveillance and reconnaissance, why they are necessary, and how they can be effectively employed. He also covers the essential equipment and training necessary to carry out a successful mission. Readers also learn how to counter opposing reconnaissance efforts. Each chapter of this well referenced and thoroughly indexed book contains a list of key words and phrases, study questions, and a few learning activities that will assist you with your study.
Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets
Author: Julie J. C. H. Ryan
Publisher: Independently Published
ISBN: 9781724077066
Category : Computers
Languages : en
Pages : 430
Book Description
Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
Publisher: Independently Published
ISBN: 9781724077066
Category : Computers
Languages : en
Pages : 430
Book Description
Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
U.S. Army Reconnaissance and Surveillance Handbook
Author: U.S. Department of the Army
Publisher: Simon and Schuster
ISBN: 1628735562
Category : Technology & Engineering
Languages : en
Pages : 205
Book Description
The official United States Army manual, U.S. Army Reconnaissance and Surveillance Handbook provides tactics, techniques, and procedures for reconnaissance and surveillance planning, mission management, and reporting. Throughout history, military leaders have recognized the importance of reconnaissance and surveillance. Gaining and maintaining contact with the enemy is essential to win the battle, and U.S. military history contains many examples where our knowledge of the enemy, or lack of knowledge, directly led to victory or defeat. The role of reconnaissance and surveillance has not diminished on the modern battlefield; if anything, it has become even more important. Battles at the combat training centers prove that a good reconnaissance and surveillance effort is critical to successful attacks. On the other hand, a poor reconnaissance and surveillance effort almost guarantees defeat for the commander. The message is clear: success on the battlefield begins with reconnaissance and surveillance. This essential handbook covers: Surveillance Preparation Assets Equipment Planning Monitoring Organizing Missions Electronic warfare Counter-reconnaissance And more! It also looks at the development of intelligence, employment considerations for reconnaissance, and defines the roles of various personnel in planning operations. Intended for maneuver commanders and their staffs; intelligence staffs and collection managers; and other personnel involved in planning and reconnaissance and counter-reconnaissance operations, and now available to everyone, U.S. Army Reconnaissance and Surveillance Handbook provides an insider’s look into the world of Army intelligence.
Publisher: Simon and Schuster
ISBN: 1628735562
Category : Technology & Engineering
Languages : en
Pages : 205
Book Description
The official United States Army manual, U.S. Army Reconnaissance and Surveillance Handbook provides tactics, techniques, and procedures for reconnaissance and surveillance planning, mission management, and reporting. Throughout history, military leaders have recognized the importance of reconnaissance and surveillance. Gaining and maintaining contact with the enemy is essential to win the battle, and U.S. military history contains many examples where our knowledge of the enemy, or lack of knowledge, directly led to victory or defeat. The role of reconnaissance and surveillance has not diminished on the modern battlefield; if anything, it has become even more important. Battles at the combat training centers prove that a good reconnaissance and surveillance effort is critical to successful attacks. On the other hand, a poor reconnaissance and surveillance effort almost guarantees defeat for the commander. The message is clear: success on the battlefield begins with reconnaissance and surveillance. This essential handbook covers: Surveillance Preparation Assets Equipment Planning Monitoring Organizing Missions Electronic warfare Counter-reconnaissance And more! It also looks at the development of intelligence, employment considerations for reconnaissance, and defines the roles of various personnel in planning operations. Intended for maneuver commanders and their staffs; intelligence staffs and collection managers; and other personnel involved in planning and reconnaissance and counter-reconnaissance operations, and now available to everyone, U.S. Army Reconnaissance and Surveillance Handbook provides an insider’s look into the world of Army intelligence.
Eyes Behind the Lines: US Army Long-Range Reconnaissance and Surveillance Units
Author: James F. Gebhardt
Publisher: DIANE Publishing
ISBN: 1428916334
Category : Military reconnaissance
Languages : en
Pages : 187
Book Description
Eyes Behind the Lines: US Army Long-Range Reconnaissance and Surveillance Units is the 10th study in the Combat Studies Institute (CSI) Global War on Terrorism (GWOT) Occasional Paper series. This work is an outgrowth of concerns identified by the authors of On Point: The United States Army in Operation IRAQI FREEDOM. Specifically, these authors called into question the use of long-range surveillance (LRS) assets by commanders during that campaign and suggested an assessment ought to be made about their continuing utility and means of employment. This revision contains some important additional information the author received after this book was originally published Major (Retired) James Gebhardt, of CSI, researched and wrote this Occasional Paper with that end in view. In this study, Gebhardt surveys the US Army s historical experience with LRRP and LRS units from the 1960s Cold War and Vietnam War, through their resurgence in the 1980s and use in Operations JUST CAUSE and DESERT STORM, to the advent of the GWOT. The paper's analytical framework examines each era of LRS units in terms of doctrine, organization, training, materiel, leadership, and personnel. In doing so, the author makes a strong case for continuing the LRS capability in the Army s force structure. The variety of environments and enemies likely to be faced by the military in the GWOT continues to demand the unique human intelligence abilities of trained and organized LRS units. As the Army leads the Armed Forces of the United States in combating terrorists where they live, the lessons found in this survey remain timely and relevant.
Publisher: DIANE Publishing
ISBN: 1428916334
Category : Military reconnaissance
Languages : en
Pages : 187
Book Description
Eyes Behind the Lines: US Army Long-Range Reconnaissance and Surveillance Units is the 10th study in the Combat Studies Institute (CSI) Global War on Terrorism (GWOT) Occasional Paper series. This work is an outgrowth of concerns identified by the authors of On Point: The United States Army in Operation IRAQI FREEDOM. Specifically, these authors called into question the use of long-range surveillance (LRS) assets by commanders during that campaign and suggested an assessment ought to be made about their continuing utility and means of employment. This revision contains some important additional information the author received after this book was originally published Major (Retired) James Gebhardt, of CSI, researched and wrote this Occasional Paper with that end in view. In this study, Gebhardt surveys the US Army s historical experience with LRRP and LRS units from the 1960s Cold War and Vietnam War, through their resurgence in the 1980s and use in Operations JUST CAUSE and DESERT STORM, to the advent of the GWOT. The paper's analytical framework examines each era of LRS units in terms of doctrine, organization, training, materiel, leadership, and personnel. In doing so, the author makes a strong case for continuing the LRS capability in the Army s force structure. The variety of environments and enemies likely to be faced by the military in the GWOT continues to demand the unique human intelligence abilities of trained and organized LRS units. As the Army leads the Armed Forces of the United States in combating terrorists where they live, the lessons found in this survey remain timely and relevant.
From Kites to Cold War
Author: Tyler W Morton
Publisher: Naval Institute Press
ISBN: 168247481X
Category : History
Languages : en
Pages : 328
Book Description
From Kites to Cold War tells the story of the evolution of manned airborne reconnaissance. Long a desire of military commanders, the ability to see the terrain ahead and gain foreknowledge of enemy intent was realized when Chinese airmen mounted kites to surveil their surroundings. Kite technology was slow to spread, and by the late nineteenth century European nations had developed the balloon and airship to conduct this mission. By 1918, it was obvious that the airplane had become the reconnaissance platform of the future. Used successfully by many nations during the Great War, aircraft technology and capability experienced its most rapid evolutionary period during World War II. Entering the war with just basic airborne imagery capabilities, by V-E and V-J days, air power pioneers greatly improved imagery collection and developed sophisticated airborne signals intelligence collection capabilities. The United States and other nations put these capabilities to use as the Cold War immediately followed. Flying near the periphery of and sometimes directly over the Soviet Union, airborne reconnaissance provided the intelligence necessary to stay one step ahead of the Soviets throughout the Cold War.
Publisher: Naval Institute Press
ISBN: 168247481X
Category : History
Languages : en
Pages : 328
Book Description
From Kites to Cold War tells the story of the evolution of manned airborne reconnaissance. Long a desire of military commanders, the ability to see the terrain ahead and gain foreknowledge of enemy intent was realized when Chinese airmen mounted kites to surveil their surroundings. Kite technology was slow to spread, and by the late nineteenth century European nations had developed the balloon and airship to conduct this mission. By 1918, it was obvious that the airplane had become the reconnaissance platform of the future. Used successfully by many nations during the Great War, aircraft technology and capability experienced its most rapid evolutionary period during World War II. Entering the war with just basic airborne imagery capabilities, by V-E and V-J days, air power pioneers greatly improved imagery collection and developed sophisticated airborne signals intelligence collection capabilities. The United States and other nations put these capabilities to use as the Cold War immediately followed. Flying near the periphery of and sometimes directly over the Soviet Union, airborne reconnaissance provided the intelligence necessary to stay one step ahead of the Soviets throughout the Cold War.
The History of Big Safari
Author: Colonel Bill Grimes, USAF Retired
Publisher: Archway Publishing
ISBN: 1480804568
Category : History
Languages : en
Pages : 487
Book Description
For more than half a century, Big Safari-modified aircraft have performed dangerous and essential missions to collect intelligence, conduct surveillance and reconnaissance, and engage in special operations missions around the globe in the interest of national security. These state-of-the-art aircraft have been flown, operated, and maintained by men and women whose dedication and commitment have made the world a safer place. In The History of Big Safari, author Colonel Bill Grimes, a retired US Air Force officer, presents a history of this program, which has been in existence for more than sixty years. Born as a special acquisition program in 1952, Big Safari has been in a unique position to save lives by rapidly fielding essential systems with a quick-reaction capability to ensure decision makers on the battlefield and at the Pentagon have timely intelligence to plan and execute operations. Grimes shows how, without a special acquisition program such as Big Safari, the nation's ability to react to evolving dangers and threats would be mired in bureaucracy when timely responses are critical. With detailed cutaway illustrations revealing aircraft modifications and mission equipment, The History of Big Safari also includes photographs, sidebars, and anecdotes. It goes behind the scenes with the men and women who participated in the challenging projects and daring missions. It shares the development of cutting-edge technology and special mission aircraft, as well as the global events that necessitated these once-classified programs. Finally, it provides insight into long-veiled projects, operations, and missions that comprise the world under the purview of Big Safari.
Publisher: Archway Publishing
ISBN: 1480804568
Category : History
Languages : en
Pages : 487
Book Description
For more than half a century, Big Safari-modified aircraft have performed dangerous and essential missions to collect intelligence, conduct surveillance and reconnaissance, and engage in special operations missions around the globe in the interest of national security. These state-of-the-art aircraft have been flown, operated, and maintained by men and women whose dedication and commitment have made the world a safer place. In The History of Big Safari, author Colonel Bill Grimes, a retired US Air Force officer, presents a history of this program, which has been in existence for more than sixty years. Born as a special acquisition program in 1952, Big Safari has been in a unique position to save lives by rapidly fielding essential systems with a quick-reaction capability to ensure decision makers on the battlefield and at the Pentagon have timely intelligence to plan and execute operations. Grimes shows how, without a special acquisition program such as Big Safari, the nation's ability to react to evolving dangers and threats would be mired in bureaucracy when timely responses are critical. With detailed cutaway illustrations revealing aircraft modifications and mission equipment, The History of Big Safari also includes photographs, sidebars, and anecdotes. It goes behind the scenes with the men and women who participated in the challenging projects and daring missions. It shares the development of cutting-edge technology and special mission aircraft, as well as the global events that necessitated these once-classified programs. Finally, it provides insight into long-veiled projects, operations, and missions that comprise the world under the purview of Big Safari.
Spies for Hire
Author: Tim Shorrock
Publisher: Simon and Schuster
ISBN: 0743282248
Category : Law
Languages : en
Pages : 451
Book Description
Reveals the formidable organization of intelligence outsourcing that has developed between the U.S. government and private companies since 9/11, in a report that reveals how approximately seventy percent of the nation's funding for top-secret tasks is now being funneled to higher-cost third-party contractors. 35,000 first printing.
Publisher: Simon and Schuster
ISBN: 0743282248
Category : Law
Languages : en
Pages : 451
Book Description
Reveals the formidable organization of intelligence outsourcing that has developed between the U.S. government and private companies since 9/11, in a report that reveals how approximately seventy percent of the nation's funding for top-secret tasks is now being funneled to higher-cost third-party contractors. 35,000 first printing.
Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition
Author: Richard A. Best
Publisher: DIANE Publishing
ISBN: 1437935311
Category : Political Science
Languages : en
Pages : 26
Book Description
ISR systems are integral components of both national policymaking and military operations, including counterterrorism operations, but they are costly and complicated and they must be linked in order to provide users with a comprehensive understanding of issues based on info. from all sources. Relationships among org. responsible for designing, acquiring, and operating these systems are also complicated as are oversight arrangements in Congress. Contents of this report: Evolving Requirements for ISR Systems; ISR Acquisition Processes: ¿National¿ Space; ¿Tactical¿ Space; Unmanned Aerial Systems; Manned Airborne Systems; Assessments of ISR Acquisition Processes. Conclusion.
Publisher: DIANE Publishing
ISBN: 1437935311
Category : Political Science
Languages : en
Pages : 26
Book Description
ISR systems are integral components of both national policymaking and military operations, including counterterrorism operations, but they are costly and complicated and they must be linked in order to provide users with a comprehensive understanding of issues based on info. from all sources. Relationships among org. responsible for designing, acquiring, and operating these systems are also complicated as are oversight arrangements in Congress. Contents of this report: Evolving Requirements for ISR Systems; ISR Acquisition Processes: ¿National¿ Space; ¿Tactical¿ Space; Unmanned Aerial Systems; Manned Airborne Systems; Assessments of ISR Acquisition Processes. Conclusion.
A Strategies-to-tasks Framework for Planning and Executing Intelligence, Surveillance, and Reconnaissance (ISR) Operations
Author: Carl Rhodes
Publisher: Rand Corporation
ISBN: 0833040421
Category : History
Languages : en
Pages : 44
Book Description
To assist in moving intelligence, surveillance, and reconnaissance (ISR) planning and execution forward from a fixed target and deliberate planning focus to one centered on emerging targets, the authors propose enhancing the collection management process with a strategies-to-tasks and utility framework. By linking collection targets to operational tasks, objectives, and the top-level commander's guidance with relative utilities, planning for the daily intelligence collections and real-time retasking for ad hoc ISR targets could be enhanced. When current tools are modified to provide this information, planners will be able to link collection targets to top-level objectives for better decision making and optimization of low-density, high-demand collection assets. Similarly, on the Air Operations Center (AOC) floor, intelligence officers will be better able to deal with time-sensitive, emerging targets by rapidly comparing the value of collecting an ad hoc collection with the value of collecting opportunities already planned. To handle the ISR demands posed by the rapidly changing battlefield of the future, this new, more-capable framework may be needed for making the best use of intelligence capabilities against emerging collection opportunities. Future research will focus on quantifying the advantages of this approach in comparison with the current process.
Publisher: Rand Corporation
ISBN: 0833040421
Category : History
Languages : en
Pages : 44
Book Description
To assist in moving intelligence, surveillance, and reconnaissance (ISR) planning and execution forward from a fixed target and deliberate planning focus to one centered on emerging targets, the authors propose enhancing the collection management process with a strategies-to-tasks and utility framework. By linking collection targets to operational tasks, objectives, and the top-level commander's guidance with relative utilities, planning for the daily intelligence collections and real-time retasking for ad hoc ISR targets could be enhanced. When current tools are modified to provide this information, planners will be able to link collection targets to top-level objectives for better decision making and optimization of low-density, high-demand collection assets. Similarly, on the Air Operations Center (AOC) floor, intelligence officers will be better able to deal with time-sensitive, emerging targets by rapidly comparing the value of collecting an ad hoc collection with the value of collecting opportunities already planned. To handle the ISR demands posed by the rapidly changing battlefield of the future, this new, more-capable framework may be needed for making the best use of intelligence capabilities against emerging collection opportunities. Future research will focus on quantifying the advantages of this approach in comparison with the current process.
Field Manual FM 3-98 Reconnaissance and Security Operations July 2015
Author: United States Army
Publisher: CreateSpace
ISBN: 9781516806997
Category :
Languages : en
Pages : 176
Book Description
This publication, Field Manual FM 3-98 Reconnaissance and Security Operations July 2015, provides doctrinal guidance and direction for Cavalry organizations, as well as reconnaissance and security organizations. This FM establishes the foundation for the development of tactics and procedures in subordinate doctrine publications. This publication applies across the range of military operations. While the main focus of this field manual is Cavalry formations within the units listed below, all maneuver formations must be able to conduct reconnaissance and security tasks. - Armored brigade combat team (ABCT) Cavalry squadron. - Infantry brigade combat team (IBCT) Cavalry squadron. - Stryker brigade combat team (SBCT) Cavalry squadron. - Battlefield surveillance brigade (BFSB) Cavalry squadron. - It is applicable to the- - Scout platoon of maneuver battalions. - Combat aviation brigade air squadron. The principal audiences for FM 3-98 are commanders, leaders, and staffs responsible for the planning, execution, or support of reconnaissance and security operations as well as instructors charged with teaching reconnaissance and security operations. Doctrine consists of fundamental principles that describe how to fight. At the tactical level, doctrine consists of authoritative principles concerning how to execute reconnaissance and security operations as part of Army and joint operations that require professional military judgment in their application. Importantly, our doctrine must describe how brigade combat teams (BCT) and subordinate units combine the capabilities of various arms into cohesive, combined arms, air-ground teams and provide a clear description of how to execute reconnaissance and security operations. This publication provides the commander and staff of Cavalry formations with doctrine relevant to Army and joint operations. This publication explains how effective reconnaissance and security operations generate depth, allow commanders reaction time and maneuver space, fight for information and collect information through stealth, protect against surprise, ease the forward movement of follow-on forces, and provide commanders with flexibility and adaptability. The doctrine described in this publication is applicable across unified land operations. The previous proponent manual for Cavalry Operations was FM 3-20.96, published 12 March 2010, which included operational considerations. This publication provides doctrinal guidance for all formations assigned to the ABCT, the IBCT, and SBCT. The following is a summary of each chapter in the manual: Chapter 1 addresses the role of Cavalry in unified land operations and Cavalry organizations. Chapter 2 discusses understanding the threat, potential threat groups and threat characteristics. Chapter 3 addresses the operational environment, shaping, engaging, and influencing outcomes, and consolidating gains. Chapter 4 highlights the updated concepts of mission command in relation to commander's reconnaissance and security guidance, the operations process and information collection. Chapter 5 begins with an overview, followed by a detailed discussion of the fundamentals of reconnaissance, forms of reconnaissance, and reconnaissance handover. Chapter 6 begins with an overview, followed with the fundamentals of security operations, counterreconnaissance, and the forms of security. Chapter 7 provides a short overview and then devotes a section to reconnaissance and security stability planning, stability principles and frameworks, and stability tasks. Chapter 8 describes sustainment for reconnaissance and security tasks, sustainment planning considerations for reconnaissance and security, sustainment considerations for reconnaissance and security and special sustainment consideration.
Publisher: CreateSpace
ISBN: 9781516806997
Category :
Languages : en
Pages : 176
Book Description
This publication, Field Manual FM 3-98 Reconnaissance and Security Operations July 2015, provides doctrinal guidance and direction for Cavalry organizations, as well as reconnaissance and security organizations. This FM establishes the foundation for the development of tactics and procedures in subordinate doctrine publications. This publication applies across the range of military operations. While the main focus of this field manual is Cavalry formations within the units listed below, all maneuver formations must be able to conduct reconnaissance and security tasks. - Armored brigade combat team (ABCT) Cavalry squadron. - Infantry brigade combat team (IBCT) Cavalry squadron. - Stryker brigade combat team (SBCT) Cavalry squadron. - Battlefield surveillance brigade (BFSB) Cavalry squadron. - It is applicable to the- - Scout platoon of maneuver battalions. - Combat aviation brigade air squadron. The principal audiences for FM 3-98 are commanders, leaders, and staffs responsible for the planning, execution, or support of reconnaissance and security operations as well as instructors charged with teaching reconnaissance and security operations. Doctrine consists of fundamental principles that describe how to fight. At the tactical level, doctrine consists of authoritative principles concerning how to execute reconnaissance and security operations as part of Army and joint operations that require professional military judgment in their application. Importantly, our doctrine must describe how brigade combat teams (BCT) and subordinate units combine the capabilities of various arms into cohesive, combined arms, air-ground teams and provide a clear description of how to execute reconnaissance and security operations. This publication provides the commander and staff of Cavalry formations with doctrine relevant to Army and joint operations. This publication explains how effective reconnaissance and security operations generate depth, allow commanders reaction time and maneuver space, fight for information and collect information through stealth, protect against surprise, ease the forward movement of follow-on forces, and provide commanders with flexibility and adaptability. The doctrine described in this publication is applicable across unified land operations. The previous proponent manual for Cavalry Operations was FM 3-20.96, published 12 March 2010, which included operational considerations. This publication provides doctrinal guidance for all formations assigned to the ABCT, the IBCT, and SBCT. The following is a summary of each chapter in the manual: Chapter 1 addresses the role of Cavalry in unified land operations and Cavalry organizations. Chapter 2 discusses understanding the threat, potential threat groups and threat characteristics. Chapter 3 addresses the operational environment, shaping, engaging, and influencing outcomes, and consolidating gains. Chapter 4 highlights the updated concepts of mission command in relation to commander's reconnaissance and security guidance, the operations process and information collection. Chapter 5 begins with an overview, followed by a detailed discussion of the fundamentals of reconnaissance, forms of reconnaissance, and reconnaissance handover. Chapter 6 begins with an overview, followed with the fundamentals of security operations, counterreconnaissance, and the forms of security. Chapter 7 provides a short overview and then devotes a section to reconnaissance and security stability planning, stability principles and frameworks, and stability tasks. Chapter 8 describes sustainment for reconnaissance and security tasks, sustainment planning considerations for reconnaissance and security, sustainment considerations for reconnaissance and security and special sustainment consideration.