2002 us army combined arms breaching operations 150p
TRANSCRIPT
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
1/150
CHECK OUT OUR WEBSITE SOME TIME FOR PLENTY OF ARTICES ABOUT SELF DEFENSE,SURVIVAL, FIREARMS AND MILITARY MANUALS.
http://www.survivalebooks.com/
Thank you for purchasing our ebook package.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
2/150
FM 3-34.2(formerly FM 90-13-1)
Combined-ArmsBreaching
Operations
Headquarters,
Department of the Army
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
This reprint includesChanges 1 through 3.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
3/150
C3, FM 3-34.2
Change 3 Headquarters
Department of the Army
Washington, DC, 11 October 2002
Combined-Arms Breaching Operations
1. Change FM 3-34.2, 31 August 2000, as follows:
Remove Old Pages Insert New Pages
E-13 E-13
2. A bar ( ) marks new or changed material.
3. File this transmittal sheet in front of the publication.
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
By Order of the Secretary of the Army:
ERIC K. SHINSEKIGeneral, United States Army
Chief of Staff
Official:
DISTRIBUTION:
Active Army, Army National Guard, and US Army Reserve: To be distributed in accordance
with the initial distribution number 115012, requirements for FM 3-34.2.
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
0226801
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
4/150
FM 3-34.2C2
Change 2 Headquarters
Department of the ArmyWashington, DC, 26 February 2001
Combined-Arms Breaching Operations
1. Change FM 3-34.2, 31 August 2000, as follows:
Remove Old Pages Insert New Pages
C-13 and C-14 C-13 and C-14
2. A bar (|) marks new or changed material.
3. File this transmittal sheet in front of the publication.
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
By Order of the Secretary of the Army:
Official:
ERIC K. SHINSEKIGeneral, United States Army
Chief of Staff
Administrative Assistant to theSecretary of the Army 0102307
DISTRIBUTION:
Active Army, Army National Guard, and U.S. Army Reserve: To be distributed inaccordance with the initial distribution number 115012, requirements forFM 3-34.2.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
5/150
FM 3-34.2C1
Change 1 Headquarters
Department of the Army
Washington, DC, 15 November 2000
Combined-Arms Breaching Operations1. Change FM 3-34.2, 31 August 2000, as follows:
Insert New Pages
E-1 through E-13
2. A bar ( ) marks new or changed material.
3. File this transmittal sheet in front of the publication.
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
By Order of the Secretary of the Army:
ERIC K. SHINSEKIGeneral, United States Army
Chief of Staff
Official:
0030702
DISTRIBUTION:
Active Army, Army National Guard, and US Army Reserve: To be distributed in accordance
with the initial distribution number 115012, requirements for FM 3-34.2.
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
6/150
i
*FM 3-34.2
F ield Ma n ua l H ea d q ua rt ers
N o. 3-34.2 D epa rt m en t of t h e Ar m y
Wash ington, DC , [pending da te]
Combined-Arms Breaching Operations
Contents
Page
PREFACE .................................................................................................................. iv
Chapter 1 OBSTACLE BREACHING THEORY....................................................................... 1-1
Definitions ................................................................................................................ 1-1Breaching Tenets ..................................................................................................... 1-4
Intelligence......................................................................................................... 1-4Breaching Fundamentals................................................................................... 1-6
Breaching Organization ..................................................................................... 1-7Mass ................................................................................................................ 1-11
Synchronization ............................................................................................... 1-13
Breaching Operations in Support of Deliberate andHasty Attacks................................................................................................... 1-18
Planning Sequence ................................................................................................ 1-18
Chapter 2 BREACHING OPERATIONS................................................................................... 2-1
Planning ................................................................................................................... 2-1Receipt of Mission ............................................................................................. 2-1
Mission Analysis ................................................................................................ 2-3Course-of-Action Development.......................................................................... 2-4
Course-of-Action Analysis (War Game)............................................................. 2-9Preparation............................................................................................................. 2-10
Execution ............................................................................................................... 2-12
Distribution Restriction: Approved for public release; distribution is unlimited.
______________________________
*This publication supersedes Field Manuals (FMs) 5-101, 23 January 1985, and 90-13-1, 28 February 1991.
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
7/150
ii
FM 3-34.2
Page
Chapter 3 LANE AND BYPASS MARKING ............................................................................ 3-1
Lane-Marking System.............................................................................................. 3-1
Lane-Marking Terms ............................................................................................... 3-2Entrance Markers.............................................................................................. 3-2Handrail Markers ............................................................................................... 3-2
Exit Markers ...................................................................................................... 3-2Entrance-Funnel Markers.................................................................................. 3-3
Final-Approach Markers.................................................................................... 3-3
Far-Recognition Markers................................................................................... 3-3Traffic-Control Posts and Guides ...................................................................... 3-3
Levels of Lane Marking and Patterns ...................................................................... 3-4Initial Lane Marking ........................................................................................... 3-4
Intermediate Lane Marking ............................................................................... 3-6Full (Two-Way) Lane Marking ........................................................................... 3-9
Commanders Guidance for Lane Marking ............................................................ 3-11
Movement Through the Lane ................................................................................ 3-11Lane Maintenance and Responsibilities of Traffic
Through Lanes ................................................................................................ 3-13Lane-Marking Devices ........................................................................................... 3-17
Bypass Marking ..................................................................................................... 3-19Marking Requirements Under the North Atlantic
Treaty Organization......................................................................................... 3-19Commanders Responsibilities ........................................................................ 3-19
Marking Patterns and Devices ........................................................................ 3-19
Complex Obstacles ............................................................................................... 3-21
Chapter 4 BREACHING REHEARSALS ................................................................................. 4-1
Planning................................................................................................................... 4-1Types ....................................................................................................................... 4-1
Combined-Arms Rehearsal............................................................................... 4-1Battle Drill .......................................................................................................... 4-2
Techniques .............................................................................................................. 4-2
Appendix A METRIC CONVERSION CHART ............................................................................ A-1
Appendix B THREAT MINE OPERATIONS ............................................................................... B-1
Mine Operations ...................................................................................................... B-1
Foreign-Mine Data ................................................................................................... B-6
Appendix C OBSTACLE-REDUCTION TECHNIQUES.............................................................. C-1Detecting ................................................................................................................. C-1
Visual ................................................................................................................ C-1
Physical............................................................................................................. C-2Electronic .......................................................................................................... C-3
Mechanical ........................................................................................................ C-4Reporting ................................................................................................................. C-4
Reducing ................................................................................................................. C-4
Explosive......................................................................................................... C-12
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
8/150
FM 3-34.2
Page
iii
Mechanical...................................................................................................... C-18Electronic ........................................................................................................ C-26
Manual ............................................................................................................ C-27
Appendix D BREACHING SCENARIO AND SPECIAL PLANNING CONSIDERATIONS........ D-1
Sample Breaching Operation .................................................................................. D-1
Considerations for Restricted Terrain ..................................................................... D-9Considerations for Military Operations in Urbanized Terrain ................................ D-11
Planning.......................................................................................................... D-11Method of Entry .............................................................................................. D-12
Obstacle Intelligence ...................................................................................... D-14Breaching Fundamentals................................................................................ D-14
Appendix E ROUTE CLEARANCE ............................................................................................ E-1
Methods and Levels ................................................................................................ E-1Clearance Methods........................................................................................... E-1Sweep Levels ................................................................................................... E-3
Equipment ............................................................................................................... E-4
Interim Vehicle-Mounted Mine Detector ........................................................... E-4MiniFlail............................................................................................................. E-6
Planning .................................................................................................................. E-6Intelligence........................................................................................................ E-6
Fundamentals ................................................................................................... E-7Organization ..................................................................................................... E-7
Mass ................................................................................................................. E-7
Synchronization ................................................................................................ E-7Planning Considerations ......................................................................................... E-8
Task Organization ................................................................................................. E-12Support Force ................................................................................................. E-12
Security Force................................................................................................. E-12Sweep Force................................................................................................... E-13
GLOSSARY ................................................................................................ Glossary-1
BIBLIOGRAPHY.................................................................................... Bibliography-1
INDEX ............................................................................................................... Index-1
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
9/150
iv
PrefaceFM 3-34.2 provides combined-a rms comma nders, from company to briga de, and their st affs w ith
the doctrine, tact ics, and techniques needed to successfully overcome obstacles. I t provides the
comma nder wit h breaching fundament als a nd informa tion for planning, prepar ing, and executing
b re a ch in g o p e ra t io n s. T h is m a n u a l g ive s t h e co o rd in a t in g a n d sp e cia l s t a f f o f f ice r a b a sis f o r
synchronizing a ll combat multipliers during a breaching operat ion.
Th i s i s n o t a s t a n d -a l o n e m a n u a l . Th e u s e r m u s t h a v e a f u n d a m e n t a l u n d e r s t a n d i n g o f t h e
concepts outlined in FMs 5-71-2, 5-71-3, 5-71-100, 17-98, 20-32, 34-130, 71-1, 71-2, 71-3, 100-5,
100-7, 101-5, and 101-5-1. This manual also implements Standardization Agreement (STANAG)
2036.
Appendi x A conta ins a metric conversion cha rt .
The proponent for this publication is HQ, TRADOC. Send comments and recommendations on
D e p a r t m e n t o f t h e Ar m y (D A ) F or m 2 02 8 d ir e ct l y t o C o m m a n d a n t , U n i t e d S t a t e s (U S ) Ar m y
En gineer School, ATTN: ATSE -DO T-DD , D irectora te of Tra ining, 320 E ngineer Loop, S uite 336,
Fort Leona rd Wood, Miss ouri 65473-8929.
U nless this publicat ion st at es otherw ise, masculine nouns a nd pronouns do not r efer exclusively
to men.
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
10/150
Obstacle Breaching Theory 1-1
Chapter 1
Obstacle Breaching Theory
B r e a c h i n g o p e r a t i o n s a r e c on d u c t e d t o a l l o w m a n e u v e r d e s p i t e t h e
p r e s e n c e o f o b s t a c l es . O b s t a c l e b r e a c h i n g i s t h e e m p l oy m e n t o f a
combinat ion of ta ct ics and techniques to adva nce an a t t acking force to the
far side of an obstacle that is covered by fire. It is perhaps the single, most
d i f f i c u l t c o m b a t t a s k a f o r c e c a n e n c o u n t e r . U n d e r s t a n d i n g b r e a c h i n g
theory is the f irst step to understanding breaching tact ics. Breaching is a
synchronized combined-arms operat ion under the control of a maneuver
co m m a n d e r . B r e a ch i n g o p e r a t i o n s b e g i n w h e n f r i e n d l y f o r ce s d e t e ct a n
o b s t a c l e a n d b e g i n t o a p p l y t h e b r e a c h i n g f u n d a m e n t a l s , a n d t h e y e n dw h e n b a t t l e h a n d o v er h a s o ccu r r e d b et w e en f o l lo w -on f o r ce s a n d a u n i t
conducting the breaching operation. B u l l i n g t h r ou g h or forcing through is
n o t a b r e a c h i n g o pe r a t i on . B u l l in g t h r o u g h i s a d e ci s i on m a d e w h e n a
c om m a n d e r m u s t r e a c t i m m e d i a t e l y t o e x t r i c a t e h i s f o r c e f r o m a n
u n t e n a b l e po si t i on w i t h i n a n ob s t a cl e a n d n o ot h e r b r e a ch i n g o p er a t i on s
a r e p os s i b le . Wh e n a f or c e i s i n a m i n e f i el d r e c ei v i n g f i r e s a n d t a k i n g
heavy losses, the comma nder ma y decide to immediately bull through t he
minefield ra ther t ha n w ithdra w or reduce the obsta cle.
DEFINITIONS
1-1. The following definitions are inherent to obstacle breaching and are used
t h ro u gh o ut t h is m a n u a l :
Obstacle. An obstacle is any obstruction that is designed or employedt o d i s r u p t , f i x , t u r n , o r b l o ck t h e m o v e m e n t o f a n o pp os i n g f o r c e
(O P F O R ) a n d t o i m p os e a d d i t i o n a l l o s s e s i n p e r s o n n e l , t i m e , a n d
equipment on the OP FOR. Obsta cles can exist na tura lly (exist ing), be
m a n -m a d e ( r e i n f o r c i n g ) , o r b e a c om b i n a t i o n o f b o t h . A c om p l e x
obsta cle is a combinat ion of different types of individual obsta cles tha t
re qu ire s m o re t h a n o n e re d u ct ion t e ch n iqu e ( exp losive, m e ch a n ica l ,
ma nua l) to create a lane t hrough the obsta cle. A reinforcing obsta cle is
a n o b st a cle t h a t is sp e cif ica l ly co n st ru ct e d , e m p la ce d , o r d e t o n a t e d
t h r o u g h m i l i t a r y e f f o r t . ( F o r m o r e i n f o r m a t i o n o n o b s t a c l eclassification, see FM 90-7.) The t ypes of reinforcing obsta cles a re
!!!! Tactical. A t a c t ica l ob st a cl e i s em pl oy ed t o d is r up t en em yf or m a t i o n s , t u r n t h e m i n t o a d e s i r e d a r e a , f i x t h e m i n p os i t i on
u n d e r d ire ct a n d in d ire ct f ire s, o r b lo ck t h e ir p e n e t ra t io n wh ile
multiplying the effects and capabilities of firepower.
!!!! Protective. A protective obstacle is employed to assist a unit inits local, close-in protection.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
11/150
FM 3-34.2
1-2 Obstacle Breaching Theory
Lane. A lane is a route through, over, or a round a n enemy or friendlyobstacle that provides safe passage of a passing force. The route may
b e r e d u c e d a n d p r o o f e d a s p a r t o f a b r e a c h i n g o p e r a t i o n , b e
constr ucted as par t of the obsta cle, or be mar ked as a bypass. Reduction. This is a task to create and mark lanes through, over, or
a r o u n d a n o bs t a cl e t o a l l ow t h e a t t a c k i n g f or c e t o a c co m pl i s h i t s
mission. Norma lly, engineers a nd r eduction as sets a re used to reduce
an obsta cle.
Proofing. Pro o f in g ve ri f ie s t h a t a la n e is f re e o f m in e s a n d t h a t t h ew i d t h a n d t r a f f ic a b i li t y o f t h e p oi n t o f b r e a c h a r e s u i t a b l e fo r t h e
assa ult force. P roofing can be conducted visually (a gainst surfa ce-laid
m in e f ie ld s) , e le ct r o n ica l ly (m in e d e t e ct o rs), o r m e ch a n ica l ly (m in e -
clearing rollers [MCRs]). Proofing is conducted when the risk of live
m i n e s r e m a i n i n g i n t h e l a n e e x c e ed s t h e r i s k o f l o s s ( l i v es a n d
e qu ip m en t ) t o e n e m y f ire s w h ile wa it in g t o com p let e p ro of in g. S o m e
m i n e s a r e r e s i s t a n t t o s o m e r e d u c t i o n a s s e t s ; f o r e x a m p l e ,
m a g n e t i ca l l y f u s ed m i n e s m a y b e r e s i s t a n t t o a m i n e -c le a r i n g l i n ech a rg e (M I CL I C) . Pr o of in g is vi t a l ly im p ort a n t , co n sid e rin g t h e va st
va rie t y o f m in e s in u se . I t sh o u ld a lwa ys b e p la n n e d f o r a b re a ch in g
operation; however, the t ime ava ilable, the t hreat , or the mission may
dictate that proofing not be done.
Clearing. This is the t otal elimination or neutra lizat ion of an obsta cleo r a p o rt io n o f t h e o b st a cle . Cle a rin g o p e ra t io n s a re n o t co n d u ct e d
under fire and are usually performed by follow-on engineer forces.
Breach area. The breach a rea is established an d fully defined by t heh i g h e r h e a d q u a r t e r s ( H Q ) o f t h e u n i t c o n d u c t i n g b r e a c h i n g
operations. It is the area where a breaching operation occurs. The area
must be large enough to a llow the a t ta cking unit t o deploy its support
f o rce a n d e xt e n d f a r e n o u g h o n t h e f a r s id e o f t h e o b st a cle t o a l lo wf o l l o w -o n f o r c e s t o d e p l o y b e f o r e l e a v i n g t h e b r e a c h a r e a . O n e
t e ch n iqu e is t o e st a b l ish t h e b re a ch a re a u sin g p h a se l in e s ( PL s) o r
u n it b o u n d a rie s. Th e P L d e f in in g t h e f a r s id e of t h e b re a ch a re a m a y
be esta blished a s a bat t le han dover line (B HL ).
Farside objective. The fa rside objective is t he imm ediat e objective oft h e a t t a c ki n g u n i t s a s s a u l t f o r c e, a n d i t m a y b e o r i en t e d b y t h e
t e r r a i n o r t h e e n e m y f o r c e . T h e h i g h e r H Q a s s i g n s t h e o b j e c t i v e ;
h o w e v er, t h e a t t a c ki n g u n i t n o r m a l l y s u b d i v id e s t h e o bj ec t i v e i n t o
smaller objectives to assign responsibilit ies and to control and focus
t h e a ssa u lt of su b o rd in a t e f orces. Wh e n b re a ch in g a s p a rt of a la rg e r
force, seizing the farside objective provides the necessary maneuver
space for th e higher u nit s follow-on forces to move securely th rough
the la nes, assemble or deploy, a nd continue the a t t ack w ithout enemyinterference.
Bypass. A bypass is a t act ical ta sk tha t involves maneuvering aroundan obstacle, a posit ion, or an enemy force to maintain the momentum
o f a d va n ce. Wh e n a u n it b yp a sse s a n o bst a cle , it p h ys ica l ly ch a n g e s
t h e d ire ct io n o f m o vem e n t t o a vo id t h e o b st a cle . Th is m u st b e d o n e
wit h ca u t io n b e ca u se i t m ig h t p la y in t o t h e e n e m ys h a n d . B yp a sse d
obsta cles an d enemy forces a re reported t o higher HQ.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
12/150
FM 3-34.2
Obstacle Breaching Theory 1-3
Point of penetration. This is the location, which is identified on theground, where th e comma nder concentr at es his efforts a t t he enemys
w e a k e s t p oi n t t o s e i z e a f o o t h o l d o n t h e f a r s i d e o b je ct i v e . Th i s i s
a c h i e v e d a l o n g a n a r r o w f r o n t t h r o u g h m a n e u v e r a n d d i r e c t a n di n d i r e c t f i r e s t h a t a r e a c c u r a t e l y p l a c e d a g a i n s t e n e m y f o r c e s . A
com m a n d e r co n d u ct in g a b re a ch in g o p era t io n e st a b l ish e s a p o in t o f
p e n e t ra t io n t h a t su p p o rt s p la n n in g lo ca t io n s f o r t h e re d u ct io n a re a
and the seizure of the farside objective.
Reduction area. This is a number of adjacent points of breach thata re u n d e r t h e co n t ro l o f t h e b re a ch in g com m a n d e r. Th e com m a n d e r
c on d u c t i n g t h e a t t a c k d e t e r m i n e s t h e s i z e a n d l o ca t i o n o f t h e
reduction a rea tha t supports th e seizure of a point of penetra t ion (see
Fi gure 1-1).
Point of breach. Th is i s t h e l oca t i on a t a n ob st a cl e w h er e t h ecre a t io n o f a la n e is b e in g a t t e m p t e d . I n i t ia l ly , p o in t s o f b re a ch a re
p l a n n e d l oc a t i o n s o n l y. N o r m a l l y, t h e b r e a c h f o r ce d e t e r m i n e s t h e
actua l points of breach during the breaching opera tion.
Figure 1-1. Breach Area
Farside objective
Point of
penetration
BHL(PL)PL
Breach area
Reduction area
Point of breach
(Planned)
(Actual)RL(PL)
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
13/150
FM 3-34.2
1-4 Obstacle Breaching Theory
BREACHING TENETS
1-2. Successful breaching operat ions a re chara cterized by a pplying breaching
tenets. These tenets should be applied whenever an obstacle is encountered in
t h e a r e a o f o pe r a t i on s ( AO ), w h e t h e r d u r i n g a n a t t a c k or d u r i n g a r o u t eclearance operation. The tenets are
I n t el li ge nce.
B r e a ch in g f un d a m en t a ls .
B r e a ch i n g or g a n i za t i on .
Ma ss.
S y n ch r on iz a t ion .
INTELLIGENCE
1-3. Success depends largely on the force commanders ability to see th e battl e
space. He m u st id e n t i f y h o w t h e e n e m y is u sin g t h e t e rra in t o m in im iz e t h e
r i s k o f s u r p r i s e . T h i s i s p a r t i c u l a r l y t r u e w h e n a t t e m p t i n g t o c o u n t e r t h eenemys use of obstacles. The force commander does this with the intelligence
p r e p a r a t i o n o f t h e b a t t l e f ie l d ( I P B ) p r oc es s . D u r i n g t h e I P B p r o ce s s , t h e
situa tion templa te (SI TE MP ) is developed. The SI TEM P is a gr a phic depiction
of expected threa t d isposit ions ba sed on threa t doctrine a nd t he effects of the
ba tt le space for a par ticula r course of action (COA). B a sed on the comma nders
e s t i m a t e s , t h e s t a f f d e v e l o p s a S I T E M P f o r m u l t i p l e e n e m y C O A s . T h e
SITEMP helps drive the maneuver plann ing in support of war gam ing and th e
development of the event template. The SITEMP also drives the decisions the
co m m a n d e r m u st b e p re p a re d t o m a k e . T h e co m m a n d e r u se s t h e d e cisio n -
su p p ort t e m p la t e (D S T) t o con ve y t h e se d e cision s in g ra p h ic f orm . Th e I P B
p ro ce ss h e lp s a ch ie ve su cce ss b y f o cu sin g a va i la b le in t e l l ig e n ce - g a t h e rin g
assets toward answering the commanders priority intelligence requirements
(P IR). Intelligence tha t is gat hered lat er by r econ becomes th e founda tion for
developing and revising a SITEMP. (See Appendi x B for informat ion on thr eat
mine operations.)
1 -4 . Ti m e -c on s t r a i n e d p l a n n i n g r e q u i r e s t h e r a p i d d e v e l o pm e n t o f t h e
e n e m ys S I T E M P. A m in im a l S I T E M P, co m p le t e wit h t e m p la t e d o b st a cle s,
a l lo ws t h e d e velop m en t of a n in i t ia l e ve n t t e m p la t e a n d p rovid es in i t ia l P I R
for the intelligence-collection plan (IC P ). At a minim um, th e unit can t emplat e
a n o bs t a c le t r a c e t h a t i s p r e ci s e, a s f a r a s t h e l oc a t i o n , a n d r e p r e s en t s t h e
t o t a l e xp e ct e d e n e m y co u n t e rm o b il i t y e f f o rt b u t d o e s n o t d e p ict in d ivid u a l
o b s t a c l e s . Th e s t a f f p l o t s t h e a c t u a l c om p o s i t i o n o f t h e t r a c e b a s e d o n
incoming obstacle reports. Adequate time for intelligence collection is critical
in d e ve lop in g a n a ccura t e p ict u re o f t h e b a t t le sp a ce, ye t t im e is n orm a lly in
short supply. While templating is essential to focus the ICP, too much time canb e s p en t on t e m p la t i n g a t t h e e x p e n s e of i n t e l l i g en c e, s u r v e i l l a n c e, a n d
reconnaissance (ISR).
1 -5 . I n a n y o p er a t i on w h e r e e n em y ob s t a c le s c a n i n t e r f e r e w i t h f r i en d l y
m a n e u v e r , o b s t a c l e i n t e l l i g e n c e ( O B S TI N T E L ) i s a l w a y s o n e o f t h e
i n f o r m a t i on r e q u i r e m e n t s ( I R ) a n d s h o u l d b e c om e P I R . F i n d i n g e n e m y
o b s t a c l e s o r s e e i n g e n e m y o b s t a c l e a c t i v i t y v a l i d a t e s a n d r e f i n e s t h e
I n t e l l i g e n c e O f f i c e r s ( U S A r m y ) ( S 2 s ) p i c t u r e o f t h e b a t t l e s p a c e .
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
14/150
FM 3-34.2
Obstacle Breaching Theory 1-5
O B S TI N TE L h e l ps t h e S 2 d e t e r m i n e t h e e n e m y s i n t e n t i on s , p l a n s , a n d
d e f e n s e s t r e n g t h . Th e f o r c e e n g i n e e r i s t h e u n i t s e x p e r t o n e n e m y
countermobility capabilit ies. He a ssists t he S2 in templating enemy obsta cles,
analyzing OBSTINTEL, and analyzing the effects of terrain.1-6. An unverified enemy t emplat e can lead to disast er becaus e the force may
a i m a n a t t a c k a t t h e w r o n g p l a c e. U n i t s m a y d e p lo y t o r e d u c e e x pe ct e d
o bs t a c le s e a r l y, w a s t i n g m i s s i o n t i m e t o feel t h e i r w a y i n t o n on e x is t e n t
o bs t a c le s ; or t h e y m a y b l u n d er i n t o a n u n e x pe ct e d o b s t a c l e or a n e n em y
engagement area (EA).
1-7. OBS TINTEL can be a crit ical indicat or to verify a n enemy t empla te. The
f o rce s Op e ra t io n s a n d T ra in in g Of f ice r ( US A rm y) ( S 3 ) , S 2 , a n d e n g in e e r
establish effective OBSTINTEL collection by determining specific obstacle IR.
Exa mples of informa tion tha t is needed t o fulfill obsta cle IR include
The location of exist ing and reinforcing obsta cles.
Th e orien t a t ion a n d de pt h of ob st a cle s.
C o nd i t ion s o f t h e s oi l (i n t h e c a s e o f a m i n ef ie ld ) t o d et e r m in e t h e
ability t o use ta nk plow s.
The presence, location, and type of w ire.
L a n es a n d b y pa s s es .
The composition of th e minefield (buried or surfa ce-la id a nt ita nk [AT]
and antipersonnel [AP] mines, antihandling devices [AHDs], and the
depth of the mines).
Typ es of m in es a n d fu ses.
Th e l oca t i on of e n em y i n di r ect -f ir e s y s t e ms t h a t ca n f ir e i n t o t h e
b re a ch a re a .
The composition of complex obsta cles.
Areas between successive obsta cle belts.
1-8. OB STINTEL is par t icula rly im porta nt for discovering the types of mines
a n d m i n e f u s e s t h e e n e m y h a s e m p l oy e d . Th e e n g i n e er d e p e n d s o n t h i s
in f o rm a t io n sin ce h e m u st d e t e rm in e wh ich re d u ct io n t e ch n iqu e s o f f e r t h e
b e st ch a n ce f o r su cce ss a n d m in im iz e t h e r isk t o t h e b re a ch f o rce . Th is m a y
require a dismounted recon patrol to examine mines within a minefield. The
enemy may employ security patr ols, ha ve forces overwa tching th e obstacle, or
place forces within the obstacle to prevent obstacle recon.
1-9. Obta ining OB STINTE L requir es dedica ted collection as sets. These asset s
id e n t i f y su rviva b il it y p osi t io n s a n d o bst a cle e m p la cem e n t a ct ivi t y . Avia t ion
u n i t s , w h o a r e t a s k ed t o p e r f or m r e con i n t h e a r e a , m a y b e a b l e t o pr o v id e
v a l u a b l e O B S TI N TE L i n f or m a t i o n . G r o u n d -s u r v e i ll a n c e r a d a r m a y a l s o
provide useful information.
1-10. Recon forces should ha ve th e capa bility to collect OB STINTE L. To be
su cce ssf u l in t h is co lle ct io n , t h e o bst a cle re con e f f ort s m u st b e t ie d in t o t h e
maneuver forces overall reconnaissance and surveillance (R&S) plan. A force
e n s u r e s t h i s c a p a b i l i t y b y t r a i n i n g d e d i c a t e d r e co n a s s e t s o n c o ll e ct i n g
re qu ire d o b st a cle in f orm a t io n or b y a u g m e n t in g r e co n f orce s wit h e n g in e er
re con t e a m s p ro vid e d b y t h e su p p o rt in g e n g in e e r f o rce . An e n g in e e r r e co n
t e a m m o v e s w i t h s c o u t s o r a p a t r o l a n d c on d u c t s d i s m o u n t e d r e c o n o f
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
15/150
FM 3-34.2
1-6 Obstacle Breaching Theory
t e m p la t e d o r con f irm e d o b st a cle s. Th is t e a m h a s t h e f le xib i l i t y t o d ism ou n t
an d develop the deta ils of the obstacle. P ersonnel enga ged in a recon m ission
for OB STINTEL should be used r a rely, if ever, t o reduce obsta cles during the
m i s s i on ; a l t h o u g h t h e y m a k e i d e a l g u i d e s t o b r e a c h f o r c es f o r s u b s e q u e n tb r e a c h i n g o p e r a t i o n s . I n a d v e r t e n t d e t o n a t i o n d u r i n g r e d u c t i o n m a y
co m p ro m ise e n g in e e rs a n d sco u t s , d e f e a t in g t h e re co n m issio n . I t m a y a lso
co m p ro m ise t h e e n t ire a t t a ck . F M 5 - 1 7 0 d e scrib e s ca p a b il it ie s , l im it a t io n s,
and employment concepts of engineer recon teams.
BREACHING FUNDAMENTALS
1 -1 1. S u p p r e s s , o b s c u r e , s e cu r e , r e d u c e , a n d a s s a u l t (S O S R A ) a r e t h e
b r e a c h i n g f u n d a m e n t a l s t h a t m u s t b e a p p l i ed t o e n s u r e s u c c es s w h e n
breaching against a defending enemy. These fundamentals will a lways apply,
b u t t h e y m a y v a r y b a s e d o n t h e s p e ci f i c b a t t l e -s p a c e s i t u a t i on ( m i s s i on ,
e n e m y, t e rr a in , t r o op s, t im e a va i la b le , a n d civi l ia n co n sid e ra t io n s [ M E TT-
TC ]).
Suppress
1-12. Suppression is a ta ct ica l ta sk used to employ direct or indirect f ires or
an electronic attack on enemy personnel, weapons, or equipment to prevent or
d e g r a d e e n e m y f i r e s a n d o b s e r v a t i o n o f f r i e n d l y f o r c e s . Th e p u r p o s e o f
su p p re ssio n d u rin g b re a ch in g o p e ra t io n s is t o p ro t e ct f o rce s re d u cin g a n d
ma neuvering through an obsta cle.
1 -1 3. E f f e ct ive su p pre ssion is a m ission -cri t ica l t a sk p e rf orm e d d u rin g a n y
breaching operation. Suppressive fires in sufficient volume serve to secure the
r e d u c t i o n a r e a . S u c c e s s f u l s u p p r e s s i o n g e n e r a l l y t r i g g e r s t h e r e s t o f t h e
a c t i o n s a t t h e o b s t a c l e. F i r e c on t r o l m e a s u r e s e n s u r e t h a t a l l f i r e s a r e
syn ch ro n iz e d wit h o t h e r a ct io n s a t t h e o b st a cle . A lt h o u g h su p p re ssin g t h ee n e m y o v e r w a t c h i n g t h e o b s t a c l e i s t h e m i s s i o n o f t h e s u p p o r t f o r c e , t h e
b r e a c h f o r c e s h o u l d b e a b l e t o p r o v i d e a d d i t i o n a l s u p p r e s s i o n a g a i n s t a n
enemy that the support force cannot effectively suppress.
Obscure
1 -1 4. Ob scu ra t io n m u s t b e e m p lo ye d t o p ro t e ct f orce s con d u ct in g o b st a cle
r e d u c t i o n a n d t h e p a s s a g e o f a s s a u l t f o r c e s . O b s c u r a t i o n h a m p e r s e n e m y
o b s er v a t i o n a n d t a r g e t a c q u i s i t i o n a n d c on c e a l s f r i e n d l y a c t i v i t i e s a n d
m o v e m e n t . O b s c u r a t i o n s m o k e d e p l oy e d o n o r n e a r t h e e n e m y s p o s i t i on
minimizes its vision. Screening smoke employed between the reduction area
a n d t h e e n e m y co n ce a ls m o vem e n t a n d re d u ct io n a ct ivi t ies . I t a lso d e g ra d e s
enemy gr ound a nd a erial observa tions. Obscuration must be carefully planned
to provide maximum degradation of enemy observation and fires, but it must
not significan tly degra de friendly fires a nd control.
Secure
1 -1 5. F rie n d ly f o rce s se cu re t h e r e d u ct ion a re a t o p re ve n t t h e e n e m y f ro m
i n t e r f e r i n g w i t h o b s t a c l e r e d u c t i o n a n d t h e p a s s a g e o f t h e a s s a u l t f o r c e
t h ro u g h t h e la n e s cre a t e d d u rin g t h e re d u ct io n . S e cu ri t y m u st b e e f f e ct ive
a g a i n s t o u t p o s t s a n d f i g h t i n g p os i t i o n s n e a r t h e o b s t a c l e a n d a g a i n s t
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
16/150
FM 3-34.2
Obstacle Breaching Theory 1-7
overwa tching units, a s necessary. The far side of the obstacle must be secured
by fires or be occupied before a tt empting a ny effort to reduce the obsta cle. The
at ta cking unit s higher HQ h as t he responsibility t o isola te the breach ar ea by
f i xi n g a d j a c en t u n i t s , a t t a c ki n g e n e m y r e s e r v es i n d e p t h , a n d p r o v i d in gcounterfire support.
1-16. Ident ifying t he extent of th e enemys defenses is critical before selecting
the a ppropriate t echnique t o secure t he point of breach. If t he enemy controls
t h e p o i n t o f b r e a c h a n d c a n n o t b e a d e q u a t e l y s u p p r e s s e d , t h e f o r c e m u s t
secure the point of breach before it can reduce the obstacle.
1 -1 7. Th e b re a ch f o rce m u st b e re sou rce d wit h e n o u g h m a n e u ve r a ss e t s t o
p r o v i d e l o c a l s e c u r i t y a g a i n s t t h e f o r ce s t h a t t h e s u p p or t f o r c e c a n n o t
s u f f i c i e n t l y e n g a g e . E l e m e n t s w i t h i n t h e b r e a c h f o r c e t h a t s e c u r e t h e
r e d u c t i on a r e a m a y a l s o b e u s e d t o s u p p r e s s t h e e n e m y o n c e r e d u c t i on i s
complete.
Reduce1-18. Reduction is the creation of lanes through or over an obstacle to allow
an a t ta cking force to pass. The number a nd w idth of lanes creat ed varies wit h
the enemy sit uat ion, t he as sault forces size a nd composit ion, and the scheme
of m a n e u ver. Th e la n e s m u st a l lo w t h e a ssa u lt f orce t o ra p id ly p a ss t h ro u g h
the obst a cle. The brea ch force w ill reduce, proof (if requ ired), mar k, a nd r eport
la n e lo ca t ion s a n d t h e la n e -m a rk in g m e t h o d t o h ig h e r HQ. F o llow- on u n it s
will further reduce or clear the obstacle when required. Reduction cannot be
a cco m p lish e d u n t i l e f f e ct ive su p p re ssio n a n d o b scu ra t io n a re in p la ce , t h e
o b s t a c l e h a s b e e n i d e n t i f i e d , a n d t h e p o i n t o f b r e a c h i s s e c u r e . O b s t a c l e -
reduction techniques ar e discussed in m ore deta il in Appendi x C.
Assault1-19. A breaching operat ion is not complete unt il
F rie n dly f orces h a ve a ssa u lt e d t o d e st ro y t h e e n em y o n t h e f a r s id e of
the obsta cle tha t is capable of placing or observing direct a nd indirect
fires on t he reduction a rea.
B a t t le h a n d over w it h f ol low-on f orces h a s o ccurre d , un less n o b a t t le
ha ndover is planned.
BREACHI NG ORGANIZATION
1 - 2 0 . A co m m a n d e r o rg a n iz e s f r ie n d ly f o rce s t o a cco m p lish t h e b re a ch in g
fundamentals quickly and effectively. This requires him to organize support ,
breach, and assault forces with the necessary assets to accomplish their roles(see Table 1-1, page 1-8).
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
17/150
FM 3-34.2
1-8 Obstacle Breaching Theory
Support Force
1-21. The support forces prim ar y r esponsibility is to elimina te t he enemy's
ability to interfere wit h a br eaching operation. I t must
I sola t e t h e re d u ct ion a re a wit h f ires.
M a ss a n d con t ro l d irect a n d in d ire ct f ires t o su p pre ss t h e en e m y a n d
t o n e u t r a l i z e a n y w e a p on s t h a t a r e a b l e t o b r in g f i r e s on t h e b r e a ch
force.
C on t r ol ob s cu r in g s m ok e t o pr e ve nt en e my -ob s er v ed d i r ect a n d
indirect fires.
1-22. Su ppression is crit ica l for a successful breaching operat ion; therefore,
allocation of adequate forces to the support force is essential. The commander
must a llocate enough direct- an d indir ect-fire systems to the s upport force to
a l l o w i t t o a c co m p l i s h i t s m i s s i o n s . Wh e n r e s o u r c i n g t h e s u p p o r t f o r c e ,
con sid e r t h e lo sse s i t wi l l r e ce ive a s i t f ig h t s i t s w a y in t o i t s su p p ort -b y-f ire
(S B F ) p o s i t i o n . To i n c r e a s e t h e s u r v i v a b i l i t y o f t h e s u p p or t f o r c e, t h e
c om m a n d e r m a y e s t a b l i s h c r i t i ca l f r i e n d l y z o n es ( C F Z s ) i n s u p p or t o f t h e
support force once it ha s occupied it s S B F posit ions. A CFZ is a n a rea, usua lly
a f r i en d l y u n i t o r l oc a t i o n , t h a t t h e m a n e u v er c om m a n d e r d e s i gn a t e s a s
crit ical to protect a n a sset w hose loss w ould seriously jeopar dize the mission.
C o v e r e d b y a r a d a r s e c t o r, t h e C F Z s u p p o r t s c ou n t e r f i r e o p er a t i o n s b y
providing the most responsive submission of targets to the fire-support system
wh en rounds impact inside th e CFZ. (For m ore deta iled informat ion on C FZs,
see FM 6-121.)
Table 1-1. Relationship Between Breaching Organization and Breaching Fundamentals
Breaching
Organization
Breaching
FundamentalsResponsibilities
Support force Suppress
Obscure
Suppress enemy direct-fire systems covering the
reduction area.
Control obscuring smoke.
Prevent enemy forces from repositioning or
counterattacking to place direct fires on the breach force.
Breach force Suppress (provides additional
suppression)
Obscure (provides additional
obscuration in the reduction
area)
Secure (provides local security)
Reduce
Create and mark the necessary lanes in an obstacle.
Secure the nearside and far side of an obstacle.
Defeat forces that can place immediate direct fires on the
reduction area.
Report the lane status/location.
Assault force Assault
Suppress (if necessary)
Destroy the enemy on the far side of an obstacle that is
capable of placing direct fires on the reduction area.
Assist the support force with suppression if the enemy is
not effectively suppressed.
Be prepared to breach follow-on and/or protective
obstacles after passing through the reduction area.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
18/150
FM 3-34.2
Obstacle Breaching Theory 1-9
1 -2 3 . T h e s u p p or t f o r c e m u s t s e i z e a n S B F p o s i t i o n , s e e k i n g m a x i m u m
p r o t e ct i o n f r o m t h e t e r r a i n . I f p os s i b l e, t h e s u p p or t f or c e s h o u l d f ol l ow a
covered or concealed r oute t o the S B F posit ion, t ake up its ass igned sectors of
f i r e a n d o b s er v a t i on , a n d b e g i n t o en g a g e t h e e n em y. I t m a y h a v e t o m a k esome adjustments to its direct-fire plan if the situation dictates. Observation
is part icularly crit ical. Artillery observers w ith t he support force may init ially
b rin g in d ire ct f ire s o n e n e m y p o si t ion s t o f ix a n d su p p re ss t h e e n e m y. Th e
support force a djusts t he a rt illery-delivered obscuring smoke, if necessa ry, to
protect the breach an d as sault forces as they a pproa ch the reduction area .
Breach Force
1-24. The breach force assist s in t he passa ge of the a ssa ult force by creat ing,
p r o of i n g (i f n e c es s a r y ) , a n d m a r k i n g l a n e s . (F or m o r e i n f or m a t i o n o n t h e
in it ia l la n e -m a r k in g p a t t e rn , se e Chapter 3 .) The breach force is a combined-
a r m s f or c e. I t i n cl u d e s e n g i n ee r s , r e d u ct i o n a s s e t s , a n d e n o u g h m a n e u v er
forces to provide a ddit iona l suppression a nd local s ecurit y. The brea ch force
may apply portions of the following breaching fundamentals as it reduces an
obstacle:
Suppress. Th e b re a ch f orce m u st b e a l loca t e d e n ou g h m a n e u verf or c e s t o pr o v i d e a d d i t i on a l s u p p r es s i on a g a i n s t v a r i ou s t h r e a t s ,
including
!!!! En emy direct-fire systems tha t ca nnot be effectively observed a nd
suppressed by th e support force due to the terra in or the m as king
of the support forces f ires by the br each force a s it moves forwa rd
to reduce the obstacle.
!!!! Co u n t era t t a ck in g a n d /or re posit ion in g f orces t h a t ca n n o t b e
engaged by the support force.
Obscure. The breach force employs vehicle-mounted smoke systemsan d smoke pots, if necessary, for self-defense a nd to cover la nes w hilethe a ssa ult force is pass ing.
Secure. The breach force secures itself from dismounted threat forceswho are providing close-in protection of the obstacle. The breach force
a l s o s e cu r e s t h e l a n e s t h r o u g h t h e t a c t i ca l o b st a c le s , on c e t h e y a r e
crea ted, to allow sa fe passage of the a ssault force.
Reduce. The breach force performs its primary mission of reducingt h e ob s t a c l e. To s u p p or t t h e d e v e l op m e n t o f a p l a n t o r e d u c e t h e
obstacle, the composit ion of the obsta cle system must be an IR.
Assault. The breach force assau lts t hrough th e point of breach t o thefar side of an obsta cle and seizes the r eduction area .
1-25. The breach force is comprised of two subordinate elementssecurityan d reduction:
Security element. The security element is comprised primarily ofm a n e u ve r f orce s. I t is n o rm a lly re sp on sib le f or p ro vid in g a d d it ion a l
suppression, obscuration, and local security.
Reduction element. The reduction element is comprised prima rily ofre d u ct io n a sse t s ( m in e - cle a rin g b la d e s [ M CB s] , M I CL I Cs, a rm o re d
v e h i c l e-l a u n c h e d b r i d g e s [ AV L B s ], a r m o r e d c o m b a t e a r t h m o v e r s
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
19/150
FM 3-34.2
1-10 Obstacle Breaching Theory
[A C E s ] , d i s m o u n t e d e n g i n e e r s , a n d s o f o r t h ) . I t i s n o r m a l l y
responsible for r educing th e obsta cle.
Chapter 2 provides more details on the roles, responsibilit ies, and command
and control (C 2) of the security and reduction elements.
1-26. The brea ch force must b e able to deploy a nd begin r educing the obsta cle
a s s o on a s e n e m y f i r e s h a v e b e e n s u p p r e s s ed a n d e f f e ct i v e o b s cu r a t i o n i s
achieved. I t can expect enemy a rt illery fires within a ma tter of minutes. CFZs
should be activated at the point of breach before the commitment of the breach
force.
1 - 2 7 . E n g i n e e r s w i t h i n t h e b r e a c h f o r c e a r e a l l o c a t e d w i t h t h e r e d u c t i o n
a s s e t s n e ce s s a r y t o c l ea r m i n e s , n on e x pl os i v e ob s t a cl e s, a n d s m a l l g a p s .
S c o u t s , e n g i n e e r s , o r o t h e r r e c o n a s s e t s a r e a l s o c a p a b l e o f f i n d i n g l o c a l
bypasses or exist ing la nes in the obstacle system.
1-28. The commander allocates engineers and reduction assets based on the
n u m b e r o f la n e s r e qu ire d , t h e t e rra in , a n d t h e t yp e o f ob st a cle. Th e b re a chf or c e m u s t b e a b l e t o c r e a t e a m i n i m u m o f o n e la n e f or e a c h a s s a u l t i n g
company or tw o lanes for t he a ssau lt ing t ask force (TF).
1-29. The comma nder s hould plan for a 50 percent loss of mobility a ssets in
clo se co m b a t . As a p la n n in g f a ct o r, h e s h o u ld a l lo ca t e o n e e n g in ee r p la t o on
with the necessary reduction assets to create and mark one lane.
1-30. After the breach force has reduced the obstacle and passed the assault
f or c e t h r o u g h , t h e b r e a c h f or c e m a y b e r e q u i r e d t o h a n d o ve r t h e l a n e t o
follow-on units. At a minimum, t he lanes must be mar ked and their locat ions
an d condit ions reported t o higher H Q a nd follow-on units a s prescribed in th e
unit s sta nding operating procedures (SOP ).
Assault Force
1 -3 1. Th e a ssa u lt f o rces p rim a ry m ission is t o d e st ro y t h e e n e m y a n d se iz e
terra in on the fa r side of the obstacle to prevent t he enemy from placing direct
f i r es o n t h e c r e a t e d l a n e s. Th e a s s a u l t f or c e m a y b e t a s k e d t o a s s i s t t h e
support force with suppression while the breach force reduces the obstacle.
1 -3 2 . Th e a s s a u l t f o r c e m u s t b e s u f f i c i e n t i n s i z e t o s e i z e t h e p o i n t o f
p en e t r a t i o n . C o m b a t p ow e r i s a l l oc a t e d t o t h e a s s a u l t f o r ce t o a c h i e v e a
m i n i m u m 3 : 1 r a t i o o n t h e p o i n t o f p e n e t r a t i o n . I n a b r e a c h i n g o p e r a t i o n ,
p a r t i c u l a r l y TF a n d a b o v e, t h e a s s a u l t f o r c e n o r m a l l y m a n e u v e r s a s a
s e pa r a t e f or c e a t t a c k i n g t h r ou g h a r e d u ce d ob s t a c le . H o w e v er , br e a c h a n d
a ssa u lt a sse t s m a y m a n e u ve r a s a s in g le f o rce wh e n co n d u ct in g lo we r- le ve l
b re a ch in g op era t io n s, su ch a s a n in d e p en d e n t co m pa n y t e a m co n d u ct in g a n
a t t a c k .
1 -3 3. I f t h e o bst a cle is d e f en d e d b y a sm a ll e n e m y f o rce, a ssa u lt a n d b re a ch
f o r ce s m i s s i on s m a y b e c om b i n e d . Th i s s i m p l i f i e s C 2 a n d p r ov i d es m o r e
immediate combat power for security a nd suppression.
1 - 3 4 . F ire co n t ro l m e a su re s a re e sse n t ia l , s in ce su p p o rt a n d b re a ch f o rce s
may be firing on th e enemy wh en the a ssault force is committed. Suppression
of overwa tching enemy posit ions must continue a nd other enemy forces must
re m a in f ixed b y f ire s u n t i l t h e e n e m y h a s b e e n d e st ro yed . Th e a ssa u lt f orce
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
20/150
FM 3-34.2
Obstacle Breaching Theory 1-11
m u st a ssu m e con t ro l f or d ire ct f ire s o n t h e a ssa u lt o bject ive a s su p p ort a n d
breach forces fires are lifted or shifted.
MASS1 - 3 5 . B re a ch in g is co n d u ct e d b y ra p id ly a p p lyin g co n ce n t ra t e d e f f o rt s a t a
point t o reduce the obsta cle an d penetra te th e defense. Massed combat power
is directed aga inst the enemys wea kness. The locat ion selected for brea ching
d e pe n d s la r g e ly o n t h e w e a k n e ss in t h e e n e m ys d e f e n se, w h e re i t s cove rin g
f ire s a re m in im iz e d . I f f r ie n d ly f o rce s ca n n o t f in d a n a t u ra l we a k n e ss, t h e y
c r ea t e on e b y f i x i n g t h e m a j or i t y o f t h e en e m y f o r c e a n d i s o la t i n g a s m a l l
portion of it for attack.
Support Force
1-36. The support force suppresses th e enemy t o eliminat e effective fires on
t h e b re a ch f o rce . S m o k e a n d t e rra in a r e u se d t o h e lp iso la t e t h e f o rce u n d e r
a t t a ck . S u p p re ssio n re qu ire s t h e co m m a n d e r t o m a ss e n o u g h o ve rwa t ch in gdirect fires to protect the breach force.
1 -3 7 . N o r m a l l y , t h e TF i s o l a t e s a n d d e s t r o y s p l a t o o n -s i z e e l e m e n t s i n
succession, sta rt ing w ith t he pla toon identified a s th e easiest to overwhelm. In
F i g u r e 1 -2 , t h e TF c om m a n d e r e m p lo y s a t a n k c om p a n y t e a m t o f i x t w o
defending platoons a nd uses s creening smoke (ta rget AA1102) to help isolate
the platoon selected for attack. Objective (OBJ ) Cowboy has been identified by
t h e TF c om m a n d e r a s t h e p o in t o f p en e t r a t i o n . Th e c e n t e r a n d e a s t e r n
p l a t o on s a r e s u p p r e s s ed b y d i r e ct a n d i n d i r e c t f i r e s f r o m a s e co n d t a n k
company team.
Figure 1-2. Technique for Achieving Mass in the Breach
OBJCOWBOYAA1101
AA1103
(+)
(-)
x
x
x x
v
v
v
v
x
x x
AA1102
AA1104
x
x
x
x
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
21/150
FM 3-34.2
1-12 Obstacle Breaching Theory
1-38. The support force should be provided wit h reduct ion a ssets t o reduce the
i m p a c t t h a t u n e x p e c t e d o b s t a c l e s o r s c a t t e r a b l e m i n e f i e l d s h a v e o n t h e i r
a p p r o a c h t o a n d o cc u pa t i on o f S B F p os i t i on s . F a i l u r e t o d o s o m a y g r e a t l y
im p a ct o n syn ch ro n iz in g t h e e n t ire b re a ch in g o p e ra t io n . A s a t e ch n iqu e , au n it m a y cre a t e a m o bil it y re se rve t h a t su p p ort s t h e m a in e f fort t h ro u g h ou t
t h e o p era t io n . I n i t ia l ly, t h e m o b il i t y r e se rve m a y su p p ort t h e su p p ort f orce
until i t ha s seized its SB F posit ions and t hen shift i ts support t o the breach or
assa ult force.
Breach Force
1-39. The commander also masses engineers and reduction assets to reduce
t h e o b s t a c le . Th e b r e a c h f or c e i s o r g a n i z e d a n d e q u i p pe d t o u s e s e v e r a l
d i f f e r e n t r e d u c t i o n t e c h n i q u e s i n c a s e t h e p r i m a r y t e c h n i q u e f a i l s ; f o r
e x a m p l e , i f a k e y v e h i c l e i s d e s t r o y e d o r i f c a s u a l t i e s r e n d e r d i s m o u n t e d
e n g in ee rs in e f f ect ive. A d d it ion a l re d u ct ion a sse t s a re p re se n t t o h a n d le t h e
u n e xp e ct e d . N o rm a lly, 5 0 p e rce n t m o re re d u ct io n a sse t s t h a n re qu ire d f o r
obstacle reduction are positioned with the breach force.
1-40. The breach force masses reduction efforts against the obstacle to ensure
tha t it w ill successfully crea te enough lanes. A mounted TF-size assa ult force
r e q u i r es a t l e a s t t w o la n e s, b u t m o r e l a n e s w i l l s p ee d p a s s a g e t h r o u g h t h e
d a n g e r a r e a . Th e b r e a c h f or c e a t t e m p t s t o s im u l t a n e ou s l y c r e a t e a s m a n y
lanes a s necessary to ensure the ra pid pass age of the assa ult force through the
o bst a cle syst e m . Th is m a y r e qu ire t h e b re a ch f orce t o s im u lt a n e ou sly u se a
combination of mechanical, explosive, and manual techniques. For example,
an engineer pla toon ma y use tw o MIC LIC s as t he primary t echnique to reduce
a m i n e f i e l d . As s o o n a s t h e e n g i n e e r p l a t o on f i r e s t h e s e co n d M I C L I C ,
e n g i n e e r s q u a d s e m p l o y m a n u a l e x p l o s i v e t e c h n i q u e s t o c r e a t e t h r e e
a d d it io n a l la n e s t h ro u g h t h e m in e fie ld . Th e com m a n d e r m u st ca re f u lly p la n
a n d syn ch ro n iz e t h e cre a t ion o f a d d it ion a l la n e s t o re d u ce t h e p o t e n t ia l f o rfratricide with assault ing troops. The distance between the lanes depends on
the enemy, th e terra in, the n eed t o minimize the effects of enemy a rt illery, th e
direct-fire pla n of t he support force, C 2, a nd r eduction-site congestion.
Assault Force
1 -4 1. Ach ievin g n e cessa r y m a ss f or t h e a ssa u lt re qu ire s t h e b r e a ch f orce t o
op en e n o u g h l a n e s t h r o u gh t h e o bs t a c le t o p e r m it r a p id p a s s a g e a n d t h e
buildup of forces on the farside. The size of the assault force determines the
n u m b e r o f l a n e s i n i t i a l l y c r e a t e d . A m o u n t e d TF r e q u i r e s o n e l a n e p e r
a ssa u lt in g com p a n y t e a m . A d ism ou n t e d a ssa u lt f o rce re qu ire s on e la n e f o r
e a c h l ea d i n g a s s a u l t p l a t o on . Th e t a ct i c a l s i t u a t i on m a y r e q u i r e a d d i t i on a l
l a n e s t o q u i ck l y p a s s a l a r g e a s s a u l t f or c e t h r o u g h t h e o b s t a c l e t o a ch i e v esufficient combat-power ratio.
1-42. The principle of ma ss influences t he selection of the point of brea ch; th e
t a s k o r g a n i z a t i o n o f t h e s u p p o r t , b r e a c h , a n d a s s a u l t f o r c e s ; a n d t h e
in t e g ra t ion o f e n g in ee rs in m o vem e n t o r a t t a ck f orm a t io n s. F i g u r e 1 -2 , p a g e
1-11, shows a technique to achieve mass in t he breach.
1 -4 3. Th e n e e d t o g e n era t e e n ou g h m a ss a n d t h e m a n e u ver sp a ce a va i la b le
s t r o n g l y i n f l u e n ce w h i ch e c h e lo n c a n c o n d u c t t h e b r e a c h i n g o p er a t i o n . A
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
22/150
FM 3-34.2
Obstacle Breaching Theory 1-13
c om p a n y t e a m c a n n o t s i m u l t a n e o u s l y m a s s s u f f i c i en t f i r e s , r e d u c e t h e
o bs t a c le , a n d a s s a u l t t h e d e f e n d i n g p os i t i o n u n l es s i t i s a s i m p l e ob s t a c le
defended by no more tha n one pla toon. A TF sh ould have a comba t-power ra tio
of 3:1 to reduce an obsta cle defended by a compan y, a nd a TF is n ormally t hee ch e lon u se d t o e xecu t e a b re a ch . A b rig a d e h a s su f f icie n t com b a t p owe r t o
a t t a c k a c o m p l e x , w e l l -d e f e n d e d o b s t a c l e ; b u t a b r i g a d e h a s d i f f i c u l t y
deploying a ll i ts comba t power w ithin ra nge. Norma lly, a brigade brea ches by
isolat ing a sma ll segment of the defense (platoon or company ) that the TF ca n
then at tack as the breaching echelon. If obstacles and defenses are in-depth,
m a ss is a ch ie ved b y p a ssin g a d d it ion a l TF s t h ro u g h t h e o b st a cle t o con t in u e
t h e a t t a ck.
SYNCHRONIZATION
1-44. Breaching operations require precise synchronization of the breaching
f u n d a m e n t a ls b y su p p ort , b re a ch , a n d a ssa u lt f o rce s. Fa i lu re t o syn ch ro n ize
effective suppression a nd obscura tion with obsta cle reduction and a ssault can
r e s u l t i n r a p i d , d e v a s t a t i n g l o s s es o f f r i en d l y t r o op s i n t h e o bs t a c le o r t h e
enemys E A.
1 -4 5. A co m b in e d -a rm s b re a ch is a com p le x op e ra t io n b y n a t u r e . S u p p ort ,
b r e a ch , a n d a s s a u l t f o r ce s m u s t a p pl y t h e S O S R A br e a c h in g f u n d a m e n t a l s
wit hin a short t ime a nd dista nce. The support force masses its direct f ires and
con t ro ls in d ire ct f ire s in con cert wit h b re a ch a n d a ssa u lt f o rce s m a n e u vers.
The commander must employ smoke at the right t ime and place to maximize
i t s e f f ec t i ve n es s o r r i s k h a m p er i n g h i s o w n t a r g e t a c q u i s it i o n a n d C 2. The
b r e a c h f or c e m u s t h a v e t h e r i g h t r e d u ct i o n a s s e t f or t h e t y p e of o b s t a c l e
e n co u n t e re d . E n g in e e rs m u st e n su re t h a t t h e y d o n o t p re m a t u re ly e xh a u st
reduction a ssets n eeded to reduce subsequent obsta cles. Table 1-2, page 1-14,
shows the complexity of a combined-arms breach.
1-46. The comma nder ensur es synchronizat ion t hrough proper pla nning a nd
force prepara tion. Fundam entals t o achieve synchronizat ion a re
D e t a i le d r e ve r se p la n n i n g.
C l ea r s u bu n it i n st r u ct i on s .
E f fect ive C 2.
Well-rehearsed forces.
Detailed Reverse Planning
1 - 4 7 . S yn ch ro n iz in g a co m b in e d - a rm s b re a ch b e g in s b y u sin g t h e re ve rse -
p la n n in g p ro ce ss t o e n su re t h a t a ct io n s a t o b st a cle s su p p o rt a ct io n s o n t h e
objective. Pla nning t he breach w ithout rega rd to a ctions on t he objective leads
t o d isa st e r. D u rin g C OA d eve lo pm e n t , t h e st a f f a n a lyz e s t h e re la t ive com b a t
power and compares enemy and friendly strengths and weaknesses. The staff
t h e n g e n e r a t e s o pt i on s b a s e d o n t h e c om m a n d e r s g u i d a n c e a n d a r r a y s t h e
forces necessa ry to a ccomplish the mission. The st aff develops the options by
analyzing the objective and allocating forces to accomplish the mission. The
c om m a n d e r d e c i d e s h o w h e m u s t a t t a c k t h e o b je ct i v e t o a c co m p li s h h i s
m i s s i o n . Th i s d e c i s i on d r i v e s w h e r e , h o w, a n d w i t h w h a t f o r c e h e m u s t
support , breach, and assault through the enemys obstacles. The commander
a p p ro ve s t h e sch e m e of m a n e u ve r f o r t h e b re a ch in g p h a se o f t h e o p e ra t io n
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
23/150
FM 3-34.2
1-14 Obstacle Breaching Theory
tha t achieves a dequa te suppression, obscura tion, and security. He a lso creat es
su f f icie n t la n e s t o ra p id ly p ro je ct com b a t p owe r o n t h e p o in t o f p e n et ra t io nand the far side of the objective, not just to the far side of the obstacle. Reverse
p l a n n i n g g i v e s p u r p o s e t o t h e b r e a c h i n g p l a n t h a t s u p p o r t s m i s s i o n
accomplishment.
1-48. The commander begins developing COAs as discussed in FM 101-5. H e
determines relat ive comba t-power ra t ios, generat es options, and a rra ys forces
t o a c co m p l i s h t h e m i s s i o n . H e t h e n d e v e l op s t h e s c h e m e o f m a n e u v e r ,
including actions on the objective. In Figur e 1-3, a three-company-team TF is
conducting a deliberate a t t ack to destroy a motorized infantr y company (MIC)
in th e defense. The comma nder believes seizing OB J Ca t t o be decisive. This is
the point from w hich reverse plann ing of a ct ions on th e objective begins. The
c om m a n d e r u s e s Te a m C t o s e i z e t h e i n i t i a l f o ot h o l d ( OB J B i r d ) (p oi n t o f
penetr at ion) into the enemys defense. The focus of brea ch plann ing is to getTeam C t o its objective. The num ber a nd location of la nes a re driven by Team
Cs m a n e u ve r o n OB J B ird a s t h e a ssa u lt f o rce . T h e co m m a n d e r n o w p la n s
how t he breach force must ma neuver to reduce the obsta cle. Supporting fires
f rom C o m pa n y A a n d Te a m B in S B F s 1 5 a n d 2 5 a re p la n n e d t o su p po rt t h e
re d u ct io n o f t h e o b st a cle a n d t h e a ssa u lt on t h e o b je ct ive . Re verse p la n n in g
c on t i n u e s t o d r i v e t h e m a n e u v er f or m a t i on t o e n s u r e t h a t f or c es a r e i n t h e
correct relative positions to accomplish their missions.
Table 1-2. Breach Complexity
Action ElementTime
(Minutes)Controlled By
Develop the situation (verify the boundary of the
enemy obstacle system).
Force in contact M to 2 S3
Maneuver the support force into the overwatch
position.
Support M + 2 to 15 Support cdr
Maneuver the assault force into the covered
assault position.
Assault M + 2 to 15 Assault cdr
Call for artillery. DS artillery M + 2 to 15 FSO
Build smoke. Mortars M + 5 to 10 FSO
Suppress the enemy with direct fires. Support M + 15 to 29 Support cdr
Suppress the enemy with artillery fires. DS artillery M + 10 to 29 FSO
Maintain smoke. DS artillery/mortars M + 10 to 30 FSO
Maneuver the breach force to the breachlocation.
Breach M + 20 to 23 Reduction cdr
Reduce the obstacle, and prepare two lanes. Breach M + 23 to 30 Engineer ldr
Place smoke pots. Breach M + 23 to EOM Reduction cdr
Shift direct fires off the objective. Support M + 29 to 30 Assault cdr
Shift indirect fires beyond the objective. DS artillery M + 29 to 30 Assault cdr
Assault to destroy the enemy on the far side of
the obstacle.
Assault M + 30 to 45 Assault cdr
Reorganize to continue the mission. TF M + 45 to EOM S3
NOTE: M = Contact with the obstacle
http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
24/150
FM 3-34.2
Obstacle Breaching Theory 1-15
Clear Subunit Instructions
1 - 4 9 . S u b o rd in a t e u n it s m u st cle a rly u n d e rst a n d t h e ir m issio n s, h o w t h e ir
m ission s re la t e t o t h e p h a se s o f t h e op era t io n , a n d w h a t ro le a d ja ce n t u n it sp l a y i n t h e o v e r a l l p l a n . T h e c o m m a n d e r m a y u s e a n e x e c u t i o n m a t r i x t o
synchronize his forces. An execution ma trix is a superb synchroniza tion tool,
a n d i t l is t s su b u n it in st ru ct ion s se qu e n t ia l ly in r e la t ion t o k e y e ve n t s o r t h e
s e q u e n c e o f t h e a t t a c k . I t a l s o p r o v i d e s s u b o r d i n a t e c o m m a n d e r s w i t h a n
u n d e rst a n d in g o f h ow t h e ir m ission s a n d t h o se o f a d ja cen t u n it s f i t in t o t h e
o v e r a l l p l a n . M o r e i m p o r t a n t l y , i t a l l o w s s u b o r d i n a t e s t o b e t t e r t r a c k t h e
batt le and coordinate their own maneuver with that of adjacent units. This is
c r i t i c a l t o a c h i e v i n g u n i t y o f e f f o r t b e t w e e n s u p p o r t , b r e a c h , a n d a s s a u l t
Figure 1-3. Reverse Planning
Size ofsupport
force
Amount of
suppression
and
obscuration
Overwatching
enemy
Size ofbreach
force
Number
and
location of
lanes
Actions at
obstacles
Size ofassault
force
Actionsonthe
objective
Isolate Suppress Obscure Secure Reduce Penetrate Exploit
Reverse-planning sequence
LD
(PL DALLAS)
LD
(PL DALLAS)
A
B
AXIS HORSE
AXIS MAN
SBF 25
SBF 15
OBJ BIRD
OBJ CAT
OBJ DOG
PL AUSTIN
PL AUSTIN
PL HOUSTON
PL HOUSTON
09
27
33
SBF 45
BHL
(PL KILLEEN)
BHL
(PL KILLEEN)
1620
SBF 35
(+)
(-)
C
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
25/150
FM 3-34.2
1-16 Obstacle Breaching Theory
f o r c e s . F i g u r e 1 - 4 s h o w s a s a m p l e e x e c u t i o n m a t r i x f o r t h e s c h e m e o f
maneuver in Fi gure 1-3, page 1-15.
Units
Company A
(Support Force)
Team B(Support/
Assault Force)
Team C
(Assault Force)
Team Engineer
(Breach Force)
Force
Allocation
LD to PL
Austin
Move to left of
Team B; echelon
left.
Lead TF. Trail team
engineer.
Trail Team B
center.
Maneuver
formation
PL Austin to PL
Houston
Attack with
Team B on Axis
Horse.
Occupy SBF 25.
Lead attack on
Axis Horse.
Occupy SBF 15.
Occupy CP 20. Lead attack on
Axis Man.
Obstacle
reduction
SBF 25.
Orient TRP 09.
On order TRP
27.
SBF 15.
Orient TRP 09.
Occupy CP 16.
Identify lane.
Create and mark
two lanes
(vicinity
AB123456).
Attack on OBJ
Bird
Shift fires to
TRP 33.
Shift fires to
TRP 27.
On order, move
through lane to
seize OBJ Bird.
Assist passage
of Team C.
Secure lanes.
Reduce
Attack on OBJ
Cat
Orient TRP 33. On order, lift
fires and occupy
CP 16.
Identify lanes.
On order, seize
OBJ Cat.
Secure/improve
lanes.
Attack on OBJDog Lift fires.Consolidate on
SBF 25.
On order, seizeOBJ Dog. Occupy SBF 45.Orient TRP 33.
On order, lift
fires.
Assist passageof Team B.
Secure/improve
lanes.
Action onOBJ
Consolidate SBF 25.
Orient north.
OBJ Dog.
Orient northeast.
OBJ Cat.
Orient east.
Support hasty
defense
operations.
Figure 1-4. Sample Execution Matrix
http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
26/150
FM 3-34.2
Obstacle Breaching Theory 1-17
Effective C2
1-50. E ffective C 2 is paramount to mission success. C 2 is in t e g ra t e d in t o t h e
p l a n t h r o u g h t h e u s e o f m a n e u v e r a n d f i r e c o n t r o l m e a s u r e s a n d t h e
posit ioning of key leaders to see the bat t le space. Man euver contr ol measuresenable the commander to graphically convey his intent , scheme of maneuver,
a n d su b u n it in st ru ct ion s. Re la t in g su b u n it a ct ion s t o t h e t e rra in is cri t ica l t o
successful execution.
1 - 5 1 . I n F i g u r e 1 -3 , p a g e 1 -1 5, t h e c o m m a n d e r u s e s P L s t o i n i t i a t e t h e
breaching operat ion an d t o control a ct ions on the objective. At P L Austin, th e
support force ma neuvers t o occupy S B Fs 15 a nd 25. The a ssa ult force occupies
c h e ck p oi n t (C P ) 16 t o p r e v e n t p r e m a t u r e a d v a n c e m e n t t o t h e o b s t a c l e,
r e d u c t i o n - s i t e c o n g e s t i o n , a n d t h e e n g a g e m e n t o f f o r c e s b e f o r e l a n e s a r e
created and marked. The commander uses target reference points (TRPs) on
o bv i ou s t e r r a i n f e a t u r e s t o o r i en t , f o cu s , a n d s h i f t s u p p r e s s iv e d i r e ct a n d
indirect fires.
1 - 5 2 . K e y l e a d e r s m u s t b e a b l e t o s e e t h e b a t t l e s p a c e t o m a k e i n f o r m e d
decisions. Nowhere is t his m ore t rue th an during t he breaching opera tion. The
comma nder must posit ion himself where he can best contr ol the batt le. Since
effective suppression is the most crit ical event during breaching operations,
the commander may position himself with the support force. This enables him
t o p e r s on a l l y i n f l u e n ce f i r e co n t r o l a n d f a c i l i t a t e t h e n e c es s a r y c r os s t a l k
between breach an d a ssa ult forces. The S3 ma y init ia lly move w ith t he breach
f o r c e t o t r a c k t h e p r o g r e s s o f o b s t a c l e r e d u c t i o n a n d a n t i c i p a t e t h e
co m m it m e n t o f t h e a ssa u lt f o rce . A co m m a n d e r wh o f e e ls t h a t h is p e rso n a l
influence is required with the breach or assault force must make a conscious
effort to track the entire battle and must not focus completely on the reduction
of th e obsta cle or t he as sault itself.
Well-Rehearsed Forces
1-53. The most effective synchronizat ion t ool av aila ble to the comman der is
t h e r e h e a r s a l . Th e i n h e r e n t c om p l ex i t y o f t h e b r e a c h in g o p e r a t i o n m a k e s
rehearsals at every level essential to success. The commander must give his
su b ord in a t e s t im e t o p la n h o w t h e y w il l execu t e t h e ir a ssig n ed m ission s a n d
t i m e t o r e h e a r s e t h e p l a n w i t h t h e i r u n i t . Th e TF f a c il i t a t e s r e h ea r s a l s b y
p rep a rin g r e h ea r sa l s i t e s a n d m a n a g in g t h e ir u se. Th e TF com m a n d e r m u st
be sensit ive to the impact TF-level rehearsals have on subordinate planning
a n d p r e pa r a t i on , a n d h e m u s t c a r e f u ll y c h oo se t h e t i m e a n d p l a c e of t h e
re h ea rsa l . Co m pa n y t e a m s r e h ea rse t h e ir su p p ort , b re a ch , a n d a ssa u lt ro les.
TF re h e a rsa ls f o cu s o n sy n ch ron iz in g t h e m a n e u ver o f su p p ort , b re a ch , a n d
a s s a u l t f o r ce s t o a c h i ev e t h e b r e a c h i n g f u n d a m e n t a l s . R e h e a r s a l s a l s o
highlight key events tha t m ust be coordinated dur ing breach execution.
Typical Breaching Operations
1-54. Table 1-3, page 1-18, shows the types of breaching operations versus the
sizes of the enemy forces overwatching the obstacle.
http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
27/150
FM 3-34.2
1-18 Obstacle Breaching Theory
BREACHING OPERATIONS IN SUPPORT OF DELI BERATE ANDHASTY ATTACKS
1 -5 5. At t a ck s t a k e p la ce a lo n g a con t in u u m b a se d o n t h e k n o wle d g e of t h ee n e m y s c a p a b i l i t i e s a n d d i s p o s i t i o n a n d t h e i n t e n t i o n s a n d d e t a i l s o f t h e
f rie n d ly f o rce s p la n n in g a n d p re p a ra t io n . T h e t e rm s d el i b er a t e a t t a c k a n d
h a s t y a t t a ck r e f e r t o t h e o pp os i t e e n d s o f t h a t c on t i n u u m a n d d e s c r i b e
characterist ics of the at tack:
Deliberate attack. F r i en d ly f or ces h a v e m or e k n ow l ed g e o f t h ee n e m y s i t u a t i o n a n d h a v e m o r e t i m e t o p l a n a n d p r e p a r e f o r t h e
enemy. With this knowledge, friendly forces conducting the deliberate
a t t a ck c a n d e v el op d e t a i l ed p l a n s , t a s k -o r g a n i z e t o a c co m pl i s h t h e
mission, a nd execute rehear sals down t o the lowest levels.
Hasty attack. Th e e n e m y si t u a t ion is va g u e, or i t ch a n g e s ra p id ly.Friendly forces ha ve lit t le or no t ime to plan or prepar e for t his ty pe of
op er a t i o n . B e ca u s e t h e p r i m a r y p u r p os e of t h e h a s t y a t t a c k i s t o
m a i n t a i n m o m en t u m o r t a k e a d v a n t a g e of t h e e n e m y s i t u a t i on , i t i s
n or m a l l y c on d u ct e d o n l y w i t h t h e r e s o ur c es t h a t a r e i m m e d ia t e ly
available.
1 -5 6. B re a ch in g op era t io n s m a y b e re qu ire d t o su p po rt a n a t t a ck a n yw h e re
a l o n g t h e c o n t i n u u m . D u r i n g a d e l i b e r a t e a t t a c k , f r i e n d l y f o r c e s , s u c h a s
e n g in e ers a n d sm o ke p la t o on s, a re t a sk -o rg a n iz e d b e f ore t h e a t t a ck t o b e st
s u p p o r t t h e c o n ce p t o f t h e o p e r a t i o n . I n a h a s t y a t t a c k , t h e r e m a y b e
i n s u f f i ci e n t t i m e t o t a s k -o r g a n i z e a s s e t s , s u ch a s e n g i n e e r s a n d r e d u c t i on
a sse t s , in t h e b e st m a n n e r. Ad d it ion a l ly, t h e u n it m a y n o t h a ve t im e t o p la n
t h e b re a ch in g o pe ra t ion in d e t a i l b u t m a y h a ve t o re ly o n t h e u n it s S OP f or
e x ec u t io n . R e g a r d l es s o f w h e r e t h e a t t a c k f a l l s a l o n g t h e c o n t i n u um , t h e
breaching tenets a pply w hen conducting th e breaching operat ion in support of
t h e a t t a ck.
PLANNING SEQUENCE
1 -5 7. Th e sch e m e o f m a n e u ve r, e n g in e e r o p e ra t ion s, f i re s, a ir d e f en se , a n d
a ct ion s a t ob st a cles a re a l l b a se d o n t h e sa m e S I TE M P. P la n n e rs d e velop t h e
breaching plan using the following sequence:
Reverse planning begins wit h a ctions on the objective.
Table 1-3. Types of Breaching Operations Versus Enemy Sizes
Enemy Overwatching
the Obstacle
Maneuver Units Conducting
Breaching Operations
Brigade TF Company
MIBN X
MIC O X
MIP O X
NOTES:
X = Normal (combat-power ratio 3:1)
O = Desirable (combat-power ratio >3:1)
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
28/150
FM 3-34.2
Obstacle Breaching Theory 1-19
Actions on the objective drive the size an d composit ion of the assa ult
force.
Th e siz e of t h e a ssa u lt f orce d e t erm in e s t h e n u m b er a n d loca t ion o f
lanes t o be creat ed. L a n e requ ire m en t s a n d t h e t yp e o f ob st a cle d rive t h e a m o u n t a n d t yp e
of mobility assets task-organized to the breach force.
The ability of the enemy to interfere w ith the reduction of the obsta cle
d e t e rm in e s t h e siz e a n d co m p o sit io n o f t h e se cu ri t y e le m e n t in t h e
brea ch force.
Th e a b i lit y of t h e e nem y t o m a s s fi res on t h e p oin t of b rea ch
d e t e r m i n e s t h e a m ou n t o f s u pp r e s s io n r e q u i r e d a n d t h e s i z e a n d
composition of the support force.
-
7/27/2019 2002 US Army Combined Arms Breaching Operations 150p
29/150
Breaching Operations 2-1
Chapter 2
Breaching Operations
F o r a b r e a c h i n g o pe r a t i o n , a u n i t d e v e l op s a s c h e m e o f m a n e u v e r
s p e c i f i ca l l y d e s i g n e d t o c r o s s a n o b s t a c l e a n d c on t i n u e a m i s s i o n .
Ma n e u v e r com p a n y t e a m s , TF s , a n d b r i g a d e s ca n con d u ct b r e a ch i n g
o p e r a t i o n s . N o r m a l l y, a TF e x e c u t e s a b r e a c h i n g o p er a t i o n a n d t h e
company teams are assigned as support , breach, and assault forces. Units
will conduct a breaching operation when
Th e f or ce-a l loca t i on r a t io i nd ica t e s t h a t a con fi rm ed en em y
s i t u a t i o n i s b e y o n d t h e s u b o r d i n a t e u n i t s c a p a b i l i t i e s t os u cce s s f u l l y co n d u ct a b r e a ch i n g o p e r a t i o n . ( Wh e n com p a n i e s
ca n n o t s u cce s s f u l l y co n d u ct a b r e a ch i n g o p e r a t i o n , t h e b a t t a l i o n
will.)