Sei sulla pagina 1di 6

RULES FOR THE USE OF FORCE BY

(Company Name) IN AFGHANISTAN

NOTHING IN THESE RULES LIMITS YOUR INHERENT RIGHT TO TAKE


ACTION NECESSARY TO DEFEND YOURSELF.

1. CONTRACTED SECURITY FORCES - are assigned specific protective


missions, and will do their best to stay with in the strict parameters of their assigned
tasks. They will provide Coalition, Multi-national and Afghanistan Security Forces with
complete cooperation, and follow theatre force protection policies. In addition,
__________ Security Force personnel will comply with all international and Afghan
laws, __________ regulations, and all obligations under the security force contract.
Under no circumstance will contract security forces avoid or run Coalition, Multi-
national or Afghanistan Security Force checkpoints, and if authorized to carry weapons,
they will not aim them at Coalition, Multi-national or Afghanistan Security Forces.

2. RULES OF ENGAGEMENT - comprise more than just “Shoot-No Shoot”


directives. When dealing with potential threat environments, prior planning, situational
awareness, and calculated responses are necessary in order to protect personnel and
equipment. Adherence to theatre rules of engagement provides specific methodologies
for evaluating and dealing with threats, and at the same time provides a system of
response escalation which allows individuals the inherent right to defend themselves.

3. THREAT RESPONSE – constitutes a methodology for quickly evaluating


potentially explosive situations and provides effective actions to either terminate a
threat, or remove the threatened individuals from the immediate environment.
__________ security personnel will be trained in, and utilize the “WHIPA-WHEEL”
memory tool for analysing both risk and response escalation.

a. WHIPA - scan to assess dismounted threats.


b. Hostiles – you may immediately engage hostiles.
c. Escalation - Escalation procedures help identify potential threats and put you in
a better defensive posture.
d. Equipment – International law authorizes you to use force to protect designated
Equipment and Personnel.
e. Limitations – Responses are limited under the ROE and the Law of War

4. WHIPA – A simple memory device will be used to help scan and asses
suspected threats;

a. W – whole person; wide view of the silhouette if possible;


b. H – hands; focus in on their hands;
c. I – in the waistband; focus in on equipment, holster, sling, other indicators of
weapon on their beltline;
d. P – personal space; look for weapons in immediate area (easy grabbing distance
or wingspan);
e. A – attitude; aggressive or suspicious stance, expression, noncompliance.

5. HOSTILES - If you have Positive ID of a Hostile Act/Intent/Force – You may


engage immediately and as long as necessary to neutralize the threat.

a. If your WHIPA scan gives a Positive ID (PID) of


– Hostile Forces
– Hostile Acts
– Hostile Intent
b. PID of a Hostile Force – constitutes the least common threat, E.g.,
– Uniforms?
– Military vehicles/markings?
– Formations?
c. A Hostile Act is your most easily PID’d threat, e.g.,
– They are in the process of firing at you
– They are pointing a weapon at you aggressively
d. Hostile Intent is the most critical threat because
– Hardest to Identify
– Easiest to Mistake
– “Threat of Imminent Use of Force”
– Preparing to draw/mount a weapon aggressively
– Maneuvering for tactical advantage while armed
– Charging into threat range (IED/Edged Weapon)

6. ESCALATION OF FORCE (EoF) PROCEDURES – EoF procedures are a set


of tools that will be used by __________ security forces to deal with “suspicious
behaviour” that doesn’t rise to “Hostile” status. The following “6-Ss” are a memory
device for helping to plan and analyze escalation requirements. These guidelines do not
have to be used in order, can be skipped entirely if necessary, and are only used as time
and security permit.

a. SHOUT verbal warnings to “HALT”.


– Use communication to challenge the suspicious person or vehicle
– Includes both audible and visual techniques
– Remember to allocate duties between the “contact” and “cover” teams to
avoid increasing danger to Soldiers
– Contact uses communications tools
– Cover is prepared to engage at all times

b. SHOW Weapon.
– Displaying Weapons to Signal your Intent
– Weapons Orientation*
– Positioning Crew Served Weapons or Combat Vehicles
– In Iraq – Pistols can be more “powerful” due to Saddam-era party
practices
c. SHOVE physically restrain, block access, or detain.
– Non-Deadly force to stop, slow, force compliance with commands, ID
suspicious behavior, or to maintain dominance
– Physical Barriers/Serpentines/Stop Strips
– Vehicular blocking techniques in convoys
– Non Lethal Weapons systems

d. SHOOT your weapon as a warning (If authorized)


– In vicinity of threat but in safe direction
– Use Backstop when feasible
– Signals your willingness to use force
– “Frontload” tracer ammo for warning shooter

e. SHOOT to Disable Vehicle.


– Engine Block/Grille*
– Windows
– Tires

f. SHOOT to eliminate the threat only when necessary.


– Lethal or Incapacitating Shot Placement

7. EQUIPMENT AND PERSONNEL – Specific Rules of Engagement concerning


the protection of equipment and personnel will be delineated in conjunction with
local tasking. Necessary Force, up to and including Deadly Force is authorized
under specific circumstances.

a. Local Rules of engagement will authorize the use of force to defend certain types
of people or property
b. Level of force depends on the situation and the threat to the designated
Equipment/People
c. In accordance with international law and existing regulations, deadly force can be
used to defend
– State-designated property
– Property designated by the MCN or by ANHAM as subject to the contract
d. People
– __________ personnel and Host Nation Security Forces and Coalition
Forces
– Detainees (you must protect them)
– Civilians
– Other Personnel designated by the mission

8. LIMITATIONS – Targeting limitations are dictated by international laws and


conventions, __________ regulations, and common sense humanitarian
principles.
a. Remember the General Principles of the Law of War
– Military Necessity
– Avoid Unnecessary Suffering
– Discrimination/Distinction
– Proportionality
b. Limit Collateral Damage – Every bullet fired hits something!
c. Restrictions on certain type Weapons
d. Approvals for Certain operations/engagements
e. Avoid engaging noncombatants or protected property

Remember that under the Law of War, we should not engage protected
persons or places unless we Positively Identify that they are a threat or that we
are being threatened by someone at that location; protected places and persons
include –

a. A hostile individual who surrenders or is “Out of Combat”


b. Civilians/Protected Persons
c. Medical Facilities
d. Historical Facilities
e. Civilian/Women & Children Facilities (schools/daycare)
f. Infrastructure Facilities
g. Public Communication Facilities
h. Economic Facilities

9. GENERAL RULES OF WEAPONS HANDLING AND USE

a. Handling:
– You must carry proof of weapons authorization.
– You will maintain a current weapons training record.
– You may not join Coalition or Multi-national Forces in combat operations
except in self-defense or in defense of persons as specified in your contracts.
– You must follow Coalition or Multi-national Force weapons condition
rules for loading and clearing.
b. Firing:
– Fire only aimed shots.
– Fire with due regard for the safety of innocent bystanders.
– Immediately report incident and request assistance.

10. TREATMENT OF CIVILIANS: Treat civilians with dignity and respect.

a. Make every effort to avoid civilian casualties.


b. You may stop, detain, search, and disarm civilian persons if required for your
safety or if specified in your contract.
c. Civilians will be treated humanely and with due respect.
d. Detained civilians will be protected and turned over to the Afghanistan Police or
Coalition or Multinational Forces as soon as possible.
11. INCIDENT/SERIOUS INCIDENT REPORTING – From time to time
situations will arise involving friction or conflict between __________ security forces
and local personnel. Regardless of whether these situations involve combatants or non-
combatants, they need to be dealt with quickly, efficiently, and professionally. Security
Force Team Leaders (TLs) will be in constant communications with the local Operations
Center and/or local and Coalition military security forces while performing their
protective missions. TLs will provide the Operations Center with regularly scheduled
situation reports during the course of their duty. Any suspicious activity or changes in
the perceived threat posture will be reported as they occur. The following list outlines
basic incident reporting requirements and timelines:

Incident Action Timeline


Indiv, verbal,
(non- Log in shift report. Reviewed at end of shift.
Threatening)
Mult-Pers,
Summon Team Leader and log Reviewed at end of shift, debrief Ops
verbal, (Non-
in shift report. Center if needed.
threatening)
Indiv, verbal, Summon Team Leader and log
Reviewed at end of shift.
(Threatening) in shift report.
File an incident report with the
Mult-Pers, Call Ops Center;
Operations Center immediately after
verbal, Summon Team Leader; Log in
shift ending and provide debrief if
(Threatening) shift report.
requested.
Call Ops Center; File an incident report with the
Indiv, Armed
Summon Team Leader; Operations Center immediately after
Confrontation
Reinforce security posture; Log shift ending and provide debrief if
(No-shots)
in shift report. requested.
Mult-Pers, Call Ops Center; Request File a detailed incident report with the
Armed security back-up; Summon Team Operations Center immediately after
Confrontation Leader; Reinforce security shift ending and provide debrief if
(No-shots) posture, Log in shift report. requested.
Call Ops Center; Assess
File a detailed incident report with the
situation; Request security back-
Shots fired Operations Center immediately after
up; Summon Team Leader;
(No-wounded) shift ending and provide debrief if
Reinforce security posture; Log
requested.
in shift report.
Call Ops Center; Request File a serious incident report with the
immediate ERF back-up; Operations Center immediately after
Shots fired Extricate team/self from shift ending and provide a detailed
(Wounded, situation if possible; Summon follow-up report within 24-hours.
killed) Team Leader; Reinforce Debrief Operations Center
security posture; Log in shift management and local and Coalition.
report. security forces.
Every circumstance is unique, and __________ Security Forces must be prepared to
exercise patience, professionalism, and restraint when dealing with possible threat
escalation. Personnel screening, in-depth training, and realistic role-playing offer the best
assurance that when the time comes to react to potentially explosive situations, -
__________ Security Forces personnel will respond professionally, proportionately, and
humanely.

Potrebbero piacerti anche