Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-68ccn Total loading time: 0 Render date: 2024-07-10T23:31:23.342Z Has data issue: false hasContentIssue false

7 - Security contacts

Published online by Cambridge University Press:  05 August 2015

Andrew Ross
Affiliation:
University of New South Wales, Canberra
Robert Hall
Affiliation:
University of New South Wales, Canberra
Amy Griffin
Affiliation:
University of New South Wales, Canberra
Get access

Summary

As we discussed in chapter 3, ‘security contacts’ were the fourth major type of contact experienced by 1ATF. They were fought mostly in defence of day and night patrol harbour positions, night defensive positions and fixed defences such as the Horseshoe feature north of Dat Do (see map 2) and fire support bases. In these contacts, the Task Force had selected and prepared the ground.

In keeping with their tactical doctrine, 1ATF patrols sought to conceal their presence at all times so that they increased their chances of surprising the enemy. This fundamental practice applied to day and night harbours: temporary static positions in which security depended primarily on concealment rather than elaborate field defences. The methods used were similar to those for patrolling and ambushing: strict silence, camouflage, perimeter tracks cleared for silent movement, sentries posted, claymores deployed, and each machine-gun manned and ready to fire. Bushcraft skills ensured that the route into the harbour position was not obvious and in any case was covered by the fire of one of the patrol's machine-guns. Once in the harbour position, the patrol settled down to a quiet routine, shifting to night routine after standdown. This stealthy approach contrasted with the patrolling, harbouring and other battlefield techniques of some US Army and Marine units.

The enemy sought to find Task Force patrol harbours and night defensive positions, and to probe them for gaps in their defences so that they could be avoided, or attacked if the opportunity presented. But the constantly changing locations of Task Force patrol harbours, and the risk of ambush, made the task difficult and potentially dangerous. But, if harbours could be located, the enemy was often ready to fire RPGs and automatic weapons into the general area of a patrol harbour rather than launch a full-scale assault. These attacks by fire could cause casualties or encourage the Task Force patrol to return fire, thereby disclosing the full extent of its position. But to achieve even this modest level of attack required the enemy to penetrate unseen past the sentries placed by patrols to detect just such enemy actions. Approaching the perimeter of a Task Force harbour to a distance where aimed fire might be possible was a dangerous task in itself and one in which the enemy was often intercepted.

Type
Chapter
Information
The Search for Tactical Success in Vietnam
An Analysis of Australian Task Force Combat Operations
, pp. 166 - 177
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×