Show previous
Show next
Show next 5
FM 3-0
8-75.
BCTs conduct operations by seizing, retaining, and exploiting opportunities. BCTs leverage information collection, interactions with people and organizations, offensive and defensive tasks, IRCs, and cyberspace electromagnetic activities (CEMA) to achieve the security conditions essential to the effective performance of stability tasks.