Show previous

FM 3-0

8-75. BCTs conduct operations by seizing, retaining, and exploiting opportunities. BCTs leverage information collection, interactions with people and organizations, offensive and defensive tasks, IRCs, and cyberspace electromagnetic activities (CEMA) to achieve the security conditions essential to the effective performance of stability tasks.
Show next Show next 5