2002 us army combined arms breaching operations 150p

Upload: lo-shun-fat

Post on 14-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    1/150

    CHECK OUT OUR WEBSITE SOME TIME FOR PLENTY OF ARTICES ABOUT SELF DEFENSE,SURVIVAL, FIREARMS AND MILITARY MANUALS.

    http://www.survivalebooks.com/

    Thank you for purchasing our ebook package.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    2/150

    FM 3-34.2(formerly FM 90-13-1)

    Combined-ArmsBreaching

    Operations

    Headquarters,

    Department of the Army

    DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

    This reprint includesChanges 1 through 3.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    3/150

    C3, FM 3-34.2

    Change 3 Headquarters

    Department of the Army

    Washington, DC, 11 October 2002

    Combined-Arms Breaching Operations

    1. Change FM 3-34.2, 31 August 2000, as follows:

    Remove Old Pages Insert New Pages

    E-13 E-13

    2. A bar ( ) marks new or changed material.

    3. File this transmittal sheet in front of the publication.

    DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

    By Order of the Secretary of the Army:

    ERIC K. SHINSEKIGeneral, United States Army

    Chief of Staff

    Official:

    DISTRIBUTION:

    Active Army, Army National Guard, and US Army Reserve: To be distributed in accordance

    with the initial distribution number 115012, requirements for FM 3-34.2.

    JOEL B. HUDSON

    Administrative Assistant to the

    Secretary of the Army

    0226801

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    4/150

    FM 3-34.2C2

    Change 2 Headquarters

    Department of the ArmyWashington, DC, 26 February 2001

    Combined-Arms Breaching Operations

    1. Change FM 3-34.2, 31 August 2000, as follows:

    Remove Old Pages Insert New Pages

    C-13 and C-14 C-13 and C-14

    2. A bar (|) marks new or changed material.

    3. File this transmittal sheet in front of the publication.

    DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

    By Order of the Secretary of the Army:

    Official:

    ERIC K. SHINSEKIGeneral, United States Army

    Chief of Staff

    Administrative Assistant to theSecretary of the Army 0102307

    DISTRIBUTION:

    Active Army, Army National Guard, and U.S. Army Reserve: To be distributed inaccordance with the initial distribution number 115012, requirements forFM 3-34.2.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    5/150

    FM 3-34.2C1

    Change 1 Headquarters

    Department of the Army

    Washington, DC, 15 November 2000

    Combined-Arms Breaching Operations1. Change FM 3-34.2, 31 August 2000, as follows:

    Insert New Pages

    E-1 through E-13

    2. A bar ( ) marks new or changed material.

    3. File this transmittal sheet in front of the publication.

    DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

    By Order of the Secretary of the Army:

    ERIC K. SHINSEKIGeneral, United States Army

    Chief of Staff

    Official:

    0030702

    DISTRIBUTION:

    Active Army, Army National Guard, and US Army Reserve: To be distributed in accordance

    with the initial distribution number 115012, requirements for FM 3-34.2.

    JOEL B. HUDSON

    Administrative Assistant to the

    Secretary of the Army

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    6/150

    i

    *FM 3-34.2

    F ield Ma n ua l H ea d q ua rt ers

    N o. 3-34.2 D epa rt m en t of t h e Ar m y

    Wash ington, DC , [pending da te]

    Combined-Arms Breaching Operations

    Contents

    Page

    PREFACE .................................................................................................................. iv

    Chapter 1 OBSTACLE BREACHING THEORY....................................................................... 1-1

    Definitions ................................................................................................................ 1-1Breaching Tenets ..................................................................................................... 1-4

    Intelligence......................................................................................................... 1-4Breaching Fundamentals................................................................................... 1-6

    Breaching Organization ..................................................................................... 1-7Mass ................................................................................................................ 1-11

    Synchronization ............................................................................................... 1-13

    Breaching Operations in Support of Deliberate andHasty Attacks................................................................................................... 1-18

    Planning Sequence ................................................................................................ 1-18

    Chapter 2 BREACHING OPERATIONS................................................................................... 2-1

    Planning ................................................................................................................... 2-1Receipt of Mission ............................................................................................. 2-1

    Mission Analysis ................................................................................................ 2-3Course-of-Action Development.......................................................................... 2-4

    Course-of-Action Analysis (War Game)............................................................. 2-9Preparation............................................................................................................. 2-10

    Execution ............................................................................................................... 2-12

    Distribution Restriction: Approved for public release; distribution is unlimited.

    ______________________________

    *This publication supersedes Field Manuals (FMs) 5-101, 23 January 1985, and 90-13-1, 28 February 1991.

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    7/150

    ii

    FM 3-34.2

    Page

    Chapter 3 LANE AND BYPASS MARKING ............................................................................ 3-1

    Lane-Marking System.............................................................................................. 3-1

    Lane-Marking Terms ............................................................................................... 3-2Entrance Markers.............................................................................................. 3-2Handrail Markers ............................................................................................... 3-2

    Exit Markers ...................................................................................................... 3-2Entrance-Funnel Markers.................................................................................. 3-3

    Final-Approach Markers.................................................................................... 3-3

    Far-Recognition Markers................................................................................... 3-3Traffic-Control Posts and Guides ...................................................................... 3-3

    Levels of Lane Marking and Patterns ...................................................................... 3-4Initial Lane Marking ........................................................................................... 3-4

    Intermediate Lane Marking ............................................................................... 3-6Full (Two-Way) Lane Marking ........................................................................... 3-9

    Commanders Guidance for Lane Marking ............................................................ 3-11

    Movement Through the Lane ................................................................................ 3-11Lane Maintenance and Responsibilities of Traffic

    Through Lanes ................................................................................................ 3-13Lane-Marking Devices ........................................................................................... 3-17

    Bypass Marking ..................................................................................................... 3-19Marking Requirements Under the North Atlantic

    Treaty Organization......................................................................................... 3-19Commanders Responsibilities ........................................................................ 3-19

    Marking Patterns and Devices ........................................................................ 3-19

    Complex Obstacles ............................................................................................... 3-21

    Chapter 4 BREACHING REHEARSALS ................................................................................. 4-1

    Planning................................................................................................................... 4-1Types ....................................................................................................................... 4-1

    Combined-Arms Rehearsal............................................................................... 4-1Battle Drill .......................................................................................................... 4-2

    Techniques .............................................................................................................. 4-2

    Appendix A METRIC CONVERSION CHART ............................................................................ A-1

    Appendix B THREAT MINE OPERATIONS ............................................................................... B-1

    Mine Operations ...................................................................................................... B-1

    Foreign-Mine Data ................................................................................................... B-6

    Appendix C OBSTACLE-REDUCTION TECHNIQUES.............................................................. C-1Detecting ................................................................................................................. C-1

    Visual ................................................................................................................ C-1

    Physical............................................................................................................. C-2Electronic .......................................................................................................... C-3

    Mechanical ........................................................................................................ C-4Reporting ................................................................................................................. C-4

    Reducing ................................................................................................................. C-4

    Explosive......................................................................................................... C-12

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    8/150

    FM 3-34.2

    Page

    iii

    Mechanical...................................................................................................... C-18Electronic ........................................................................................................ C-26

    Manual ............................................................................................................ C-27

    Appendix D BREACHING SCENARIO AND SPECIAL PLANNING CONSIDERATIONS........ D-1

    Sample Breaching Operation .................................................................................. D-1

    Considerations for Restricted Terrain ..................................................................... D-9Considerations for Military Operations in Urbanized Terrain ................................ D-11

    Planning.......................................................................................................... D-11Method of Entry .............................................................................................. D-12

    Obstacle Intelligence ...................................................................................... D-14Breaching Fundamentals................................................................................ D-14

    Appendix E ROUTE CLEARANCE ............................................................................................ E-1

    Methods and Levels ................................................................................................ E-1Clearance Methods........................................................................................... E-1Sweep Levels ................................................................................................... E-3

    Equipment ............................................................................................................... E-4

    Interim Vehicle-Mounted Mine Detector ........................................................... E-4MiniFlail............................................................................................................. E-6

    Planning .................................................................................................................. E-6Intelligence........................................................................................................ E-6

    Fundamentals ................................................................................................... E-7Organization ..................................................................................................... E-7

    Mass ................................................................................................................. E-7

    Synchronization ................................................................................................ E-7Planning Considerations ......................................................................................... E-8

    Task Organization ................................................................................................. E-12Support Force ................................................................................................. E-12

    Security Force................................................................................................. E-12Sweep Force................................................................................................... E-13

    GLOSSARY ................................................................................................ Glossary-1

    BIBLIOGRAPHY.................................................................................... Bibliography-1

    INDEX ............................................................................................................... Index-1

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    9/150

    iv

    PrefaceFM 3-34.2 provides combined-a rms comma nders, from company to briga de, and their st affs w ith

    the doctrine, tact ics, and techniques needed to successfully overcome obstacles. I t provides the

    comma nder wit h breaching fundament als a nd informa tion for planning, prepar ing, and executing

    b re a ch in g o p e ra t io n s. T h is m a n u a l g ive s t h e co o rd in a t in g a n d sp e cia l s t a f f o f f ice r a b a sis f o r

    synchronizing a ll combat multipliers during a breaching operat ion.

    Th i s i s n o t a s t a n d -a l o n e m a n u a l . Th e u s e r m u s t h a v e a f u n d a m e n t a l u n d e r s t a n d i n g o f t h e

    concepts outlined in FMs 5-71-2, 5-71-3, 5-71-100, 17-98, 20-32, 34-130, 71-1, 71-2, 71-3, 100-5,

    100-7, 101-5, and 101-5-1. This manual also implements Standardization Agreement (STANAG)

    2036.

    Appendi x A conta ins a metric conversion cha rt .

    The proponent for this publication is HQ, TRADOC. Send comments and recommendations on

    D e p a r t m e n t o f t h e Ar m y (D A ) F or m 2 02 8 d ir e ct l y t o C o m m a n d a n t , U n i t e d S t a t e s (U S ) Ar m y

    En gineer School, ATTN: ATSE -DO T-DD , D irectora te of Tra ining, 320 E ngineer Loop, S uite 336,

    Fort Leona rd Wood, Miss ouri 65473-8929.

    U nless this publicat ion st at es otherw ise, masculine nouns a nd pronouns do not r efer exclusively

    to men.

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    10/150

    Obstacle Breaching Theory 1-1

    Chapter 1

    Obstacle Breaching Theory

    B r e a c h i n g o p e r a t i o n s a r e c on d u c t e d t o a l l o w m a n e u v e r d e s p i t e t h e

    p r e s e n c e o f o b s t a c l es . O b s t a c l e b r e a c h i n g i s t h e e m p l oy m e n t o f a

    combinat ion of ta ct ics and techniques to adva nce an a t t acking force to the

    far side of an obstacle that is covered by fire. It is perhaps the single, most

    d i f f i c u l t c o m b a t t a s k a f o r c e c a n e n c o u n t e r . U n d e r s t a n d i n g b r e a c h i n g

    theory is the f irst step to understanding breaching tact ics. Breaching is a

    synchronized combined-arms operat ion under the control of a maneuver

    co m m a n d e r . B r e a ch i n g o p e r a t i o n s b e g i n w h e n f r i e n d l y f o r ce s d e t e ct a n

    o b s t a c l e a n d b e g i n t o a p p l y t h e b r e a c h i n g f u n d a m e n t a l s , a n d t h e y e n dw h e n b a t t l e h a n d o v er h a s o ccu r r e d b et w e en f o l lo w -on f o r ce s a n d a u n i t

    conducting the breaching operation. B u l l i n g t h r ou g h or forcing through is

    n o t a b r e a c h i n g o pe r a t i on . B u l l in g t h r o u g h i s a d e ci s i on m a d e w h e n a

    c om m a n d e r m u s t r e a c t i m m e d i a t e l y t o e x t r i c a t e h i s f o r c e f r o m a n

    u n t e n a b l e po si t i on w i t h i n a n ob s t a cl e a n d n o ot h e r b r e a ch i n g o p er a t i on s

    a r e p os s i b le . Wh e n a f or c e i s i n a m i n e f i el d r e c ei v i n g f i r e s a n d t a k i n g

    heavy losses, the comma nder ma y decide to immediately bull through t he

    minefield ra ther t ha n w ithdra w or reduce the obsta cle.

    DEFINITIONS

    1-1. The following definitions are inherent to obstacle breaching and are used

    t h ro u gh o ut t h is m a n u a l :

    Obstacle. An obstacle is any obstruction that is designed or employedt o d i s r u p t , f i x , t u r n , o r b l o ck t h e m o v e m e n t o f a n o pp os i n g f o r c e

    (O P F O R ) a n d t o i m p os e a d d i t i o n a l l o s s e s i n p e r s o n n e l , t i m e , a n d

    equipment on the OP FOR. Obsta cles can exist na tura lly (exist ing), be

    m a n -m a d e ( r e i n f o r c i n g ) , o r b e a c om b i n a t i o n o f b o t h . A c om p l e x

    obsta cle is a combinat ion of different types of individual obsta cles tha t

    re qu ire s m o re t h a n o n e re d u ct ion t e ch n iqu e ( exp losive, m e ch a n ica l ,

    ma nua l) to create a lane t hrough the obsta cle. A reinforcing obsta cle is

    a n o b st a cle t h a t is sp e cif ica l ly co n st ru ct e d , e m p la ce d , o r d e t o n a t e d

    t h r o u g h m i l i t a r y e f f o r t . ( F o r m o r e i n f o r m a t i o n o n o b s t a c l eclassification, see FM 90-7.) The t ypes of reinforcing obsta cles a re

    !!!! Tactical. A t a c t ica l ob st a cl e i s em pl oy ed t o d is r up t en em yf or m a t i o n s , t u r n t h e m i n t o a d e s i r e d a r e a , f i x t h e m i n p os i t i on

    u n d e r d ire ct a n d in d ire ct f ire s, o r b lo ck t h e ir p e n e t ra t io n wh ile

    multiplying the effects and capabilities of firepower.

    !!!! Protective. A protective obstacle is employed to assist a unit inits local, close-in protection.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    11/150

    FM 3-34.2

    1-2 Obstacle Breaching Theory

    Lane. A lane is a route through, over, or a round a n enemy or friendlyobstacle that provides safe passage of a passing force. The route may

    b e r e d u c e d a n d p r o o f e d a s p a r t o f a b r e a c h i n g o p e r a t i o n , b e

    constr ucted as par t of the obsta cle, or be mar ked as a bypass. Reduction. This is a task to create and mark lanes through, over, or

    a r o u n d a n o bs t a cl e t o a l l ow t h e a t t a c k i n g f or c e t o a c co m pl i s h i t s

    mission. Norma lly, engineers a nd r eduction as sets a re used to reduce

    an obsta cle.

    Proofing. Pro o f in g ve ri f ie s t h a t a la n e is f re e o f m in e s a n d t h a t t h ew i d t h a n d t r a f f ic a b i li t y o f t h e p oi n t o f b r e a c h a r e s u i t a b l e fo r t h e

    assa ult force. P roofing can be conducted visually (a gainst surfa ce-laid

    m in e f ie ld s) , e le ct r o n ica l ly (m in e d e t e ct o rs), o r m e ch a n ica l ly (m in e -

    clearing rollers [MCRs]). Proofing is conducted when the risk of live

    m i n e s r e m a i n i n g i n t h e l a n e e x c e ed s t h e r i s k o f l o s s ( l i v es a n d

    e qu ip m en t ) t o e n e m y f ire s w h ile wa it in g t o com p let e p ro of in g. S o m e

    m i n e s a r e r e s i s t a n t t o s o m e r e d u c t i o n a s s e t s ; f o r e x a m p l e ,

    m a g n e t i ca l l y f u s ed m i n e s m a y b e r e s i s t a n t t o a m i n e -c le a r i n g l i n ech a rg e (M I CL I C) . Pr o of in g is vi t a l ly im p ort a n t , co n sid e rin g t h e va st

    va rie t y o f m in e s in u se . I t sh o u ld a lwa ys b e p la n n e d f o r a b re a ch in g

    operation; however, the t ime ava ilable, the t hreat , or the mission may

    dictate that proofing not be done.

    Clearing. This is the t otal elimination or neutra lizat ion of an obsta cleo r a p o rt io n o f t h e o b st a cle . Cle a rin g o p e ra t io n s a re n o t co n d u ct e d

    under fire and are usually performed by follow-on engineer forces.

    Breach area. The breach a rea is established an d fully defined by t heh i g h e r h e a d q u a r t e r s ( H Q ) o f t h e u n i t c o n d u c t i n g b r e a c h i n g

    operations. It is the area where a breaching operation occurs. The area

    must be large enough to a llow the a t ta cking unit t o deploy its support

    f o rce a n d e xt e n d f a r e n o u g h o n t h e f a r s id e o f t h e o b st a cle t o a l lo wf o l l o w -o n f o r c e s t o d e p l o y b e f o r e l e a v i n g t h e b r e a c h a r e a . O n e

    t e ch n iqu e is t o e st a b l ish t h e b re a ch a re a u sin g p h a se l in e s ( PL s) o r

    u n it b o u n d a rie s. Th e P L d e f in in g t h e f a r s id e of t h e b re a ch a re a m a y

    be esta blished a s a bat t le han dover line (B HL ).

    Farside objective. The fa rside objective is t he imm ediat e objective oft h e a t t a c ki n g u n i t s a s s a u l t f o r c e, a n d i t m a y b e o r i en t e d b y t h e

    t e r r a i n o r t h e e n e m y f o r c e . T h e h i g h e r H Q a s s i g n s t h e o b j e c t i v e ;

    h o w e v er, t h e a t t a c ki n g u n i t n o r m a l l y s u b d i v id e s t h e o bj ec t i v e i n t o

    smaller objectives to assign responsibilit ies and to control and focus

    t h e a ssa u lt of su b o rd in a t e f orces. Wh e n b re a ch in g a s p a rt of a la rg e r

    force, seizing the farside objective provides the necessary maneuver

    space for th e higher u nit s follow-on forces to move securely th rough

    the la nes, assemble or deploy, a nd continue the a t t ack w ithout enemyinterference.

    Bypass. A bypass is a t act ical ta sk tha t involves maneuvering aroundan obstacle, a posit ion, or an enemy force to maintain the momentum

    o f a d va n ce. Wh e n a u n it b yp a sse s a n o bst a cle , it p h ys ica l ly ch a n g e s

    t h e d ire ct io n o f m o vem e n t t o a vo id t h e o b st a cle . Th is m u st b e d o n e

    wit h ca u t io n b e ca u se i t m ig h t p la y in t o t h e e n e m ys h a n d . B yp a sse d

    obsta cles an d enemy forces a re reported t o higher HQ.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    12/150

    FM 3-34.2

    Obstacle Breaching Theory 1-3

    Point of penetration. This is the location, which is identified on theground, where th e comma nder concentr at es his efforts a t t he enemys

    w e a k e s t p oi n t t o s e i z e a f o o t h o l d o n t h e f a r s i d e o b je ct i v e . Th i s i s

    a c h i e v e d a l o n g a n a r r o w f r o n t t h r o u g h m a n e u v e r a n d d i r e c t a n di n d i r e c t f i r e s t h a t a r e a c c u r a t e l y p l a c e d a g a i n s t e n e m y f o r c e s . A

    com m a n d e r co n d u ct in g a b re a ch in g o p era t io n e st a b l ish e s a p o in t o f

    p e n e t ra t io n t h a t su p p o rt s p la n n in g lo ca t io n s f o r t h e re d u ct io n a re a

    and the seizure of the farside objective.

    Reduction area. This is a number of adjacent points of breach thata re u n d e r t h e co n t ro l o f t h e b re a ch in g com m a n d e r. Th e com m a n d e r

    c on d u c t i n g t h e a t t a c k d e t e r m i n e s t h e s i z e a n d l o ca t i o n o f t h e

    reduction a rea tha t supports th e seizure of a point of penetra t ion (see

    Fi gure 1-1).

    Point of breach. Th is i s t h e l oca t i on a t a n ob st a cl e w h er e t h ecre a t io n o f a la n e is b e in g a t t e m p t e d . I n i t ia l ly , p o in t s o f b re a ch a re

    p l a n n e d l oc a t i o n s o n l y. N o r m a l l y, t h e b r e a c h f o r ce d e t e r m i n e s t h e

    actua l points of breach during the breaching opera tion.

    Figure 1-1. Breach Area

    Farside objective

    Point of

    penetration

    BHL(PL)PL

    Breach area

    Reduction area

    Point of breach

    (Planned)

    (Actual)RL(PL)

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    13/150

    FM 3-34.2

    1-4 Obstacle Breaching Theory

    BREACHING TENETS

    1-2. Successful breaching operat ions a re chara cterized by a pplying breaching

    tenets. These tenets should be applied whenever an obstacle is encountered in

    t h e a r e a o f o pe r a t i on s ( AO ), w h e t h e r d u r i n g a n a t t a c k or d u r i n g a r o u t eclearance operation. The tenets are

    I n t el li ge nce.

    B r e a ch in g f un d a m en t a ls .

    B r e a ch i n g or g a n i za t i on .

    Ma ss.

    S y n ch r on iz a t ion .

    INTELLIGENCE

    1-3. Success depends largely on the force commanders ability to see th e battl e

    space. He m u st id e n t i f y h o w t h e e n e m y is u sin g t h e t e rra in t o m in im iz e t h e

    r i s k o f s u r p r i s e . T h i s i s p a r t i c u l a r l y t r u e w h e n a t t e m p t i n g t o c o u n t e r t h eenemys use of obstacles. The force commander does this with the intelligence

    p r e p a r a t i o n o f t h e b a t t l e f ie l d ( I P B ) p r oc es s . D u r i n g t h e I P B p r o ce s s , t h e

    situa tion templa te (SI TE MP ) is developed. The SI TEM P is a gr a phic depiction

    of expected threa t d isposit ions ba sed on threa t doctrine a nd t he effects of the

    ba tt le space for a par ticula r course of action (COA). B a sed on the comma nders

    e s t i m a t e s , t h e s t a f f d e v e l o p s a S I T E M P f o r m u l t i p l e e n e m y C O A s . T h e

    SITEMP helps drive the maneuver plann ing in support of war gam ing and th e

    development of the event template. The SITEMP also drives the decisions the

    co m m a n d e r m u st b e p re p a re d t o m a k e . T h e co m m a n d e r u se s t h e d e cisio n -

    su p p ort t e m p la t e (D S T) t o con ve y t h e se d e cision s in g ra p h ic f orm . Th e I P B

    p ro ce ss h e lp s a ch ie ve su cce ss b y f o cu sin g a va i la b le in t e l l ig e n ce - g a t h e rin g

    assets toward answering the commanders priority intelligence requirements

    (P IR). Intelligence tha t is gat hered lat er by r econ becomes th e founda tion for

    developing and revising a SITEMP. (See Appendi x B for informat ion on thr eat

    mine operations.)

    1 -4 . Ti m e -c on s t r a i n e d p l a n n i n g r e q u i r e s t h e r a p i d d e v e l o pm e n t o f t h e

    e n e m ys S I T E M P. A m in im a l S I T E M P, co m p le t e wit h t e m p la t e d o b st a cle s,

    a l lo ws t h e d e velop m en t of a n in i t ia l e ve n t t e m p la t e a n d p rovid es in i t ia l P I R

    for the intelligence-collection plan (IC P ). At a minim um, th e unit can t emplat e

    a n o bs t a c le t r a c e t h a t i s p r e ci s e, a s f a r a s t h e l oc a t i o n , a n d r e p r e s en t s t h e

    t o t a l e xp e ct e d e n e m y co u n t e rm o b il i t y e f f o rt b u t d o e s n o t d e p ict in d ivid u a l

    o b s t a c l e s . Th e s t a f f p l o t s t h e a c t u a l c om p o s i t i o n o f t h e t r a c e b a s e d o n

    incoming obstacle reports. Adequate time for intelligence collection is critical

    in d e ve lop in g a n a ccura t e p ict u re o f t h e b a t t le sp a ce, ye t t im e is n orm a lly in

    short supply. While templating is essential to focus the ICP, too much time canb e s p en t on t e m p la t i n g a t t h e e x p e n s e of i n t e l l i g en c e, s u r v e i l l a n c e, a n d

    reconnaissance (ISR).

    1 -5 . I n a n y o p er a t i on w h e r e e n em y ob s t a c le s c a n i n t e r f e r e w i t h f r i en d l y

    m a n e u v e r , o b s t a c l e i n t e l l i g e n c e ( O B S TI N T E L ) i s a l w a y s o n e o f t h e

    i n f o r m a t i on r e q u i r e m e n t s ( I R ) a n d s h o u l d b e c om e P I R . F i n d i n g e n e m y

    o b s t a c l e s o r s e e i n g e n e m y o b s t a c l e a c t i v i t y v a l i d a t e s a n d r e f i n e s t h e

    I n t e l l i g e n c e O f f i c e r s ( U S A r m y ) ( S 2 s ) p i c t u r e o f t h e b a t t l e s p a c e .

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    14/150

    FM 3-34.2

    Obstacle Breaching Theory 1-5

    O B S TI N TE L h e l ps t h e S 2 d e t e r m i n e t h e e n e m y s i n t e n t i on s , p l a n s , a n d

    d e f e n s e s t r e n g t h . Th e f o r c e e n g i n e e r i s t h e u n i t s e x p e r t o n e n e m y

    countermobility capabilit ies. He a ssists t he S2 in templating enemy obsta cles,

    analyzing OBSTINTEL, and analyzing the effects of terrain.1-6. An unverified enemy t emplat e can lead to disast er becaus e the force may

    a i m a n a t t a c k a t t h e w r o n g p l a c e. U n i t s m a y d e p lo y t o r e d u c e e x pe ct e d

    o bs t a c le s e a r l y, w a s t i n g m i s s i o n t i m e t o feel t h e i r w a y i n t o n on e x is t e n t

    o bs t a c le s ; or t h e y m a y b l u n d er i n t o a n u n e x pe ct e d o b s t a c l e or a n e n em y

    engagement area (EA).

    1-7. OBS TINTEL can be a crit ical indicat or to verify a n enemy t empla te. The

    f o rce s Op e ra t io n s a n d T ra in in g Of f ice r ( US A rm y) ( S 3 ) , S 2 , a n d e n g in e e r

    establish effective OBSTINTEL collection by determining specific obstacle IR.

    Exa mples of informa tion tha t is needed t o fulfill obsta cle IR include

    The location of exist ing and reinforcing obsta cles.

    Th e orien t a t ion a n d de pt h of ob st a cle s.

    C o nd i t ion s o f t h e s oi l (i n t h e c a s e o f a m i n ef ie ld ) t o d et e r m in e t h e

    ability t o use ta nk plow s.

    The presence, location, and type of w ire.

    L a n es a n d b y pa s s es .

    The composition of th e minefield (buried or surfa ce-la id a nt ita nk [AT]

    and antipersonnel [AP] mines, antihandling devices [AHDs], and the

    depth of the mines).

    Typ es of m in es a n d fu ses.

    Th e l oca t i on of e n em y i n di r ect -f ir e s y s t e ms t h a t ca n f ir e i n t o t h e

    b re a ch a re a .

    The composition of complex obsta cles.

    Areas between successive obsta cle belts.

    1-8. OB STINTEL is par t icula rly im porta nt for discovering the types of mines

    a n d m i n e f u s e s t h e e n e m y h a s e m p l oy e d . Th e e n g i n e er d e p e n d s o n t h i s

    in f o rm a t io n sin ce h e m u st d e t e rm in e wh ich re d u ct io n t e ch n iqu e s o f f e r t h e

    b e st ch a n ce f o r su cce ss a n d m in im iz e t h e r isk t o t h e b re a ch f o rce . Th is m a y

    require a dismounted recon patrol to examine mines within a minefield. The

    enemy may employ security patr ols, ha ve forces overwa tching th e obstacle, or

    place forces within the obstacle to prevent obstacle recon.

    1-9. Obta ining OB STINTE L requir es dedica ted collection as sets. These asset s

    id e n t i f y su rviva b il it y p osi t io n s a n d o bst a cle e m p la cem e n t a ct ivi t y . Avia t ion

    u n i t s , w h o a r e t a s k ed t o p e r f or m r e con i n t h e a r e a , m a y b e a b l e t o pr o v id e

    v a l u a b l e O B S TI N TE L i n f or m a t i o n . G r o u n d -s u r v e i ll a n c e r a d a r m a y a l s o

    provide useful information.

    1-10. Recon forces should ha ve th e capa bility to collect OB STINTE L. To be

    su cce ssf u l in t h is co lle ct io n , t h e o bst a cle re con e f f ort s m u st b e t ie d in t o t h e

    maneuver forces overall reconnaissance and surveillance (R&S) plan. A force

    e n s u r e s t h i s c a p a b i l i t y b y t r a i n i n g d e d i c a t e d r e co n a s s e t s o n c o ll e ct i n g

    re qu ire d o b st a cle in f orm a t io n or b y a u g m e n t in g r e co n f orce s wit h e n g in e er

    re con t e a m s p ro vid e d b y t h e su p p o rt in g e n g in e e r f o rce . An e n g in e e r r e co n

    t e a m m o v e s w i t h s c o u t s o r a p a t r o l a n d c on d u c t s d i s m o u n t e d r e c o n o f

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    15/150

    FM 3-34.2

    1-6 Obstacle Breaching Theory

    t e m p la t e d o r con f irm e d o b st a cle s. Th is t e a m h a s t h e f le xib i l i t y t o d ism ou n t

    an d develop the deta ils of the obstacle. P ersonnel enga ged in a recon m ission

    for OB STINTEL should be used r a rely, if ever, t o reduce obsta cles during the

    m i s s i on ; a l t h o u g h t h e y m a k e i d e a l g u i d e s t o b r e a c h f o r c es f o r s u b s e q u e n tb r e a c h i n g o p e r a t i o n s . I n a d v e r t e n t d e t o n a t i o n d u r i n g r e d u c t i o n m a y

    co m p ro m ise e n g in e e rs a n d sco u t s , d e f e a t in g t h e re co n m issio n . I t m a y a lso

    co m p ro m ise t h e e n t ire a t t a ck . F M 5 - 1 7 0 d e scrib e s ca p a b il it ie s , l im it a t io n s,

    and employment concepts of engineer recon teams.

    BREACHING FUNDAMENTALS

    1 -1 1. S u p p r e s s , o b s c u r e , s e cu r e , r e d u c e , a n d a s s a u l t (S O S R A ) a r e t h e

    b r e a c h i n g f u n d a m e n t a l s t h a t m u s t b e a p p l i ed t o e n s u r e s u c c es s w h e n

    breaching against a defending enemy. These fundamentals will a lways apply,

    b u t t h e y m a y v a r y b a s e d o n t h e s p e ci f i c b a t t l e -s p a c e s i t u a t i on ( m i s s i on ,

    e n e m y, t e rr a in , t r o op s, t im e a va i la b le , a n d civi l ia n co n sid e ra t io n s [ M E TT-

    TC ]).

    Suppress

    1-12. Suppression is a ta ct ica l ta sk used to employ direct or indirect f ires or

    an electronic attack on enemy personnel, weapons, or equipment to prevent or

    d e g r a d e e n e m y f i r e s a n d o b s e r v a t i o n o f f r i e n d l y f o r c e s . Th e p u r p o s e o f

    su p p re ssio n d u rin g b re a ch in g o p e ra t io n s is t o p ro t e ct f o rce s re d u cin g a n d

    ma neuvering through an obsta cle.

    1 -1 3. E f f e ct ive su p pre ssion is a m ission -cri t ica l t a sk p e rf orm e d d u rin g a n y

    breaching operation. Suppressive fires in sufficient volume serve to secure the

    r e d u c t i o n a r e a . S u c c e s s f u l s u p p r e s s i o n g e n e r a l l y t r i g g e r s t h e r e s t o f t h e

    a c t i o n s a t t h e o b s t a c l e. F i r e c on t r o l m e a s u r e s e n s u r e t h a t a l l f i r e s a r e

    syn ch ro n iz e d wit h o t h e r a ct io n s a t t h e o b st a cle . A lt h o u g h su p p re ssin g t h ee n e m y o v e r w a t c h i n g t h e o b s t a c l e i s t h e m i s s i o n o f t h e s u p p o r t f o r c e , t h e

    b r e a c h f o r c e s h o u l d b e a b l e t o p r o v i d e a d d i t i o n a l s u p p r e s s i o n a g a i n s t a n

    enemy that the support force cannot effectively suppress.

    Obscure

    1 -1 4. Ob scu ra t io n m u s t b e e m p lo ye d t o p ro t e ct f orce s con d u ct in g o b st a cle

    r e d u c t i o n a n d t h e p a s s a g e o f a s s a u l t f o r c e s . O b s c u r a t i o n h a m p e r s e n e m y

    o b s er v a t i o n a n d t a r g e t a c q u i s i t i o n a n d c on c e a l s f r i e n d l y a c t i v i t i e s a n d

    m o v e m e n t . O b s c u r a t i o n s m o k e d e p l oy e d o n o r n e a r t h e e n e m y s p o s i t i on

    minimizes its vision. Screening smoke employed between the reduction area

    a n d t h e e n e m y co n ce a ls m o vem e n t a n d re d u ct io n a ct ivi t ies . I t a lso d e g ra d e s

    enemy gr ound a nd a erial observa tions. Obscuration must be carefully planned

    to provide maximum degradation of enemy observation and fires, but it must

    not significan tly degra de friendly fires a nd control.

    Secure

    1 -1 5. F rie n d ly f o rce s se cu re t h e r e d u ct ion a re a t o p re ve n t t h e e n e m y f ro m

    i n t e r f e r i n g w i t h o b s t a c l e r e d u c t i o n a n d t h e p a s s a g e o f t h e a s s a u l t f o r c e

    t h ro u g h t h e la n e s cre a t e d d u rin g t h e re d u ct io n . S e cu ri t y m u st b e e f f e ct ive

    a g a i n s t o u t p o s t s a n d f i g h t i n g p os i t i o n s n e a r t h e o b s t a c l e a n d a g a i n s t

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    16/150

    FM 3-34.2

    Obstacle Breaching Theory 1-7

    overwa tching units, a s necessary. The far side of the obstacle must be secured

    by fires or be occupied before a tt empting a ny effort to reduce the obsta cle. The

    at ta cking unit s higher HQ h as t he responsibility t o isola te the breach ar ea by

    f i xi n g a d j a c en t u n i t s , a t t a c ki n g e n e m y r e s e r v es i n d e p t h , a n d p r o v i d in gcounterfire support.

    1-16. Ident ifying t he extent of th e enemys defenses is critical before selecting

    the a ppropriate t echnique t o secure t he point of breach. If t he enemy controls

    t h e p o i n t o f b r e a c h a n d c a n n o t b e a d e q u a t e l y s u p p r e s s e d , t h e f o r c e m u s t

    secure the point of breach before it can reduce the obstacle.

    1 -1 7. Th e b re a ch f o rce m u st b e re sou rce d wit h e n o u g h m a n e u ve r a ss e t s t o

    p r o v i d e l o c a l s e c u r i t y a g a i n s t t h e f o r ce s t h a t t h e s u p p or t f o r c e c a n n o t

    s u f f i c i e n t l y e n g a g e . E l e m e n t s w i t h i n t h e b r e a c h f o r c e t h a t s e c u r e t h e

    r e d u c t i on a r e a m a y a l s o b e u s e d t o s u p p r e s s t h e e n e m y o n c e r e d u c t i on i s

    complete.

    Reduce1-18. Reduction is the creation of lanes through or over an obstacle to allow

    an a t ta cking force to pass. The number a nd w idth of lanes creat ed varies wit h

    the enemy sit uat ion, t he as sault forces size a nd composit ion, and the scheme

    of m a n e u ver. Th e la n e s m u st a l lo w t h e a ssa u lt f orce t o ra p id ly p a ss t h ro u g h

    the obst a cle. The brea ch force w ill reduce, proof (if requ ired), mar k, a nd r eport

    la n e lo ca t ion s a n d t h e la n e -m a rk in g m e t h o d t o h ig h e r HQ. F o llow- on u n it s

    will further reduce or clear the obstacle when required. Reduction cannot be

    a cco m p lish e d u n t i l e f f e ct ive su p p re ssio n a n d o b scu ra t io n a re in p la ce , t h e

    o b s t a c l e h a s b e e n i d e n t i f i e d , a n d t h e p o i n t o f b r e a c h i s s e c u r e . O b s t a c l e -

    reduction techniques ar e discussed in m ore deta il in Appendi x C.

    Assault1-19. A breaching operat ion is not complete unt il

    F rie n dly f orces h a ve a ssa u lt e d t o d e st ro y t h e e n em y o n t h e f a r s id e of

    the obsta cle tha t is capable of placing or observing direct a nd indirect

    fires on t he reduction a rea.

    B a t t le h a n d over w it h f ol low-on f orces h a s o ccurre d , un less n o b a t t le

    ha ndover is planned.

    BREACHI NG ORGANIZATION

    1 - 2 0 . A co m m a n d e r o rg a n iz e s f r ie n d ly f o rce s t o a cco m p lish t h e b re a ch in g

    fundamentals quickly and effectively. This requires him to organize support ,

    breach, and assault forces with the necessary assets to accomplish their roles(see Table 1-1, page 1-8).

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    17/150

    FM 3-34.2

    1-8 Obstacle Breaching Theory

    Support Force

    1-21. The support forces prim ar y r esponsibility is to elimina te t he enemy's

    ability to interfere wit h a br eaching operation. I t must

    I sola t e t h e re d u ct ion a re a wit h f ires.

    M a ss a n d con t ro l d irect a n d in d ire ct f ires t o su p pre ss t h e en e m y a n d

    t o n e u t r a l i z e a n y w e a p on s t h a t a r e a b l e t o b r in g f i r e s on t h e b r e a ch

    force.

    C on t r ol ob s cu r in g s m ok e t o pr e ve nt en e my -ob s er v ed d i r ect a n d

    indirect fires.

    1-22. Su ppression is crit ica l for a successful breaching operat ion; therefore,

    allocation of adequate forces to the support force is essential. The commander

    must a llocate enough direct- an d indir ect-fire systems to the s upport force to

    a l l o w i t t o a c co m p l i s h i t s m i s s i o n s . Wh e n r e s o u r c i n g t h e s u p p o r t f o r c e ,

    con sid e r t h e lo sse s i t wi l l r e ce ive a s i t f ig h t s i t s w a y in t o i t s su p p ort -b y-f ire

    (S B F ) p o s i t i o n . To i n c r e a s e t h e s u r v i v a b i l i t y o f t h e s u p p or t f o r c e, t h e

    c om m a n d e r m a y e s t a b l i s h c r i t i ca l f r i e n d l y z o n es ( C F Z s ) i n s u p p or t o f t h e

    support force once it ha s occupied it s S B F posit ions. A CFZ is a n a rea, usua lly

    a f r i en d l y u n i t o r l oc a t i o n , t h a t t h e m a n e u v er c om m a n d e r d e s i gn a t e s a s

    crit ical to protect a n a sset w hose loss w ould seriously jeopar dize the mission.

    C o v e r e d b y a r a d a r s e c t o r, t h e C F Z s u p p o r t s c ou n t e r f i r e o p er a t i o n s b y

    providing the most responsive submission of targets to the fire-support system

    wh en rounds impact inside th e CFZ. (For m ore deta iled informat ion on C FZs,

    see FM 6-121.)

    Table 1-1. Relationship Between Breaching Organization and Breaching Fundamentals

    Breaching

    Organization

    Breaching

    FundamentalsResponsibilities

    Support force Suppress

    Obscure

    Suppress enemy direct-fire systems covering the

    reduction area.

    Control obscuring smoke.

    Prevent enemy forces from repositioning or

    counterattacking to place direct fires on the breach force.

    Breach force Suppress (provides additional

    suppression)

    Obscure (provides additional

    obscuration in the reduction

    area)

    Secure (provides local security)

    Reduce

    Create and mark the necessary lanes in an obstacle.

    Secure the nearside and far side of an obstacle.

    Defeat forces that can place immediate direct fires on the

    reduction area.

    Report the lane status/location.

    Assault force Assault

    Suppress (if necessary)

    Destroy the enemy on the far side of an obstacle that is

    capable of placing direct fires on the reduction area.

    Assist the support force with suppression if the enemy is

    not effectively suppressed.

    Be prepared to breach follow-on and/or protective

    obstacles after passing through the reduction area.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    18/150

    FM 3-34.2

    Obstacle Breaching Theory 1-9

    1 -2 3 . T h e s u p p or t f o r c e m u s t s e i z e a n S B F p o s i t i o n , s e e k i n g m a x i m u m

    p r o t e ct i o n f r o m t h e t e r r a i n . I f p os s i b l e, t h e s u p p or t f or c e s h o u l d f ol l ow a

    covered or concealed r oute t o the S B F posit ion, t ake up its ass igned sectors of

    f i r e a n d o b s er v a t i on , a n d b e g i n t o en g a g e t h e e n em y. I t m a y h a v e t o m a k esome adjustments to its direct-fire plan if the situation dictates. Observation

    is part icularly crit ical. Artillery observers w ith t he support force may init ially

    b rin g in d ire ct f ire s o n e n e m y p o si t ion s t o f ix a n d su p p re ss t h e e n e m y. Th e

    support force a djusts t he a rt illery-delivered obscuring smoke, if necessa ry, to

    protect the breach an d as sault forces as they a pproa ch the reduction area .

    Breach Force

    1-24. The breach force assist s in t he passa ge of the a ssa ult force by creat ing,

    p r o of i n g (i f n e c es s a r y ) , a n d m a r k i n g l a n e s . (F or m o r e i n f or m a t i o n o n t h e

    in it ia l la n e -m a r k in g p a t t e rn , se e Chapter 3 .) The breach force is a combined-

    a r m s f or c e. I t i n cl u d e s e n g i n ee r s , r e d u ct i o n a s s e t s , a n d e n o u g h m a n e u v er

    forces to provide a ddit iona l suppression a nd local s ecurit y. The brea ch force

    may apply portions of the following breaching fundamentals as it reduces an

    obstacle:

    Suppress. Th e b re a ch f orce m u st b e a l loca t e d e n ou g h m a n e u verf or c e s t o pr o v i d e a d d i t i on a l s u p p r es s i on a g a i n s t v a r i ou s t h r e a t s ,

    including

    !!!! En emy direct-fire systems tha t ca nnot be effectively observed a nd

    suppressed by th e support force due to the terra in or the m as king

    of the support forces f ires by the br each force a s it moves forwa rd

    to reduce the obstacle.

    !!!! Co u n t era t t a ck in g a n d /or re posit ion in g f orces t h a t ca n n o t b e

    engaged by the support force.

    Obscure. The breach force employs vehicle-mounted smoke systemsan d smoke pots, if necessary, for self-defense a nd to cover la nes w hilethe a ssa ult force is pass ing.

    Secure. The breach force secures itself from dismounted threat forceswho are providing close-in protection of the obstacle. The breach force

    a l s o s e cu r e s t h e l a n e s t h r o u g h t h e t a c t i ca l o b st a c le s , on c e t h e y a r e

    crea ted, to allow sa fe passage of the a ssault force.

    Reduce. The breach force performs its primary mission of reducingt h e ob s t a c l e. To s u p p or t t h e d e v e l op m e n t o f a p l a n t o r e d u c e t h e

    obstacle, the composit ion of the obsta cle system must be an IR.

    Assault. The breach force assau lts t hrough th e point of breach t o thefar side of an obsta cle and seizes the r eduction area .

    1-25. The breach force is comprised of two subordinate elementssecurityan d reduction:

    Security element. The security element is comprised primarily ofm a n e u ve r f orce s. I t is n o rm a lly re sp on sib le f or p ro vid in g a d d it ion a l

    suppression, obscuration, and local security.

    Reduction element. The reduction element is comprised prima rily ofre d u ct io n a sse t s ( m in e - cle a rin g b la d e s [ M CB s] , M I CL I Cs, a rm o re d

    v e h i c l e-l a u n c h e d b r i d g e s [ AV L B s ], a r m o r e d c o m b a t e a r t h m o v e r s

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    19/150

    FM 3-34.2

    1-10 Obstacle Breaching Theory

    [A C E s ] , d i s m o u n t e d e n g i n e e r s , a n d s o f o r t h ) . I t i s n o r m a l l y

    responsible for r educing th e obsta cle.

    Chapter 2 provides more details on the roles, responsibilit ies, and command

    and control (C 2) of the security and reduction elements.

    1-26. The brea ch force must b e able to deploy a nd begin r educing the obsta cle

    a s s o on a s e n e m y f i r e s h a v e b e e n s u p p r e s s ed a n d e f f e ct i v e o b s cu r a t i o n i s

    achieved. I t can expect enemy a rt illery fires within a ma tter of minutes. CFZs

    should be activated at the point of breach before the commitment of the breach

    force.

    1 - 2 7 . E n g i n e e r s w i t h i n t h e b r e a c h f o r c e a r e a l l o c a t e d w i t h t h e r e d u c t i o n

    a s s e t s n e ce s s a r y t o c l ea r m i n e s , n on e x pl os i v e ob s t a cl e s, a n d s m a l l g a p s .

    S c o u t s , e n g i n e e r s , o r o t h e r r e c o n a s s e t s a r e a l s o c a p a b l e o f f i n d i n g l o c a l

    bypasses or exist ing la nes in the obstacle system.

    1-28. The commander allocates engineers and reduction assets based on the

    n u m b e r o f la n e s r e qu ire d , t h e t e rra in , a n d t h e t yp e o f ob st a cle. Th e b re a chf or c e m u s t b e a b l e t o c r e a t e a m i n i m u m o f o n e la n e f or e a c h a s s a u l t i n g

    company or tw o lanes for t he a ssau lt ing t ask force (TF).

    1-29. The comma nder s hould plan for a 50 percent loss of mobility a ssets in

    clo se co m b a t . As a p la n n in g f a ct o r, h e s h o u ld a l lo ca t e o n e e n g in ee r p la t o on

    with the necessary reduction assets to create and mark one lane.

    1-30. After the breach force has reduced the obstacle and passed the assault

    f or c e t h r o u g h , t h e b r e a c h f or c e m a y b e r e q u i r e d t o h a n d o ve r t h e l a n e t o

    follow-on units. At a minimum, t he lanes must be mar ked and their locat ions

    an d condit ions reported t o higher H Q a nd follow-on units a s prescribed in th e

    unit s sta nding operating procedures (SOP ).

    Assault Force

    1 -3 1. Th e a ssa u lt f o rces p rim a ry m ission is t o d e st ro y t h e e n e m y a n d se iz e

    terra in on the fa r side of the obstacle to prevent t he enemy from placing direct

    f i r es o n t h e c r e a t e d l a n e s. Th e a s s a u l t f or c e m a y b e t a s k e d t o a s s i s t t h e

    support force with suppression while the breach force reduces the obstacle.

    1 -3 2 . Th e a s s a u l t f o r c e m u s t b e s u f f i c i e n t i n s i z e t o s e i z e t h e p o i n t o f

    p en e t r a t i o n . C o m b a t p ow e r i s a l l oc a t e d t o t h e a s s a u l t f o r ce t o a c h i e v e a

    m i n i m u m 3 : 1 r a t i o o n t h e p o i n t o f p e n e t r a t i o n . I n a b r e a c h i n g o p e r a t i o n ,

    p a r t i c u l a r l y TF a n d a b o v e, t h e a s s a u l t f o r c e n o r m a l l y m a n e u v e r s a s a

    s e pa r a t e f or c e a t t a c k i n g t h r ou g h a r e d u ce d ob s t a c le . H o w e v er , br e a c h a n d

    a ssa u lt a sse t s m a y m a n e u ve r a s a s in g le f o rce wh e n co n d u ct in g lo we r- le ve l

    b re a ch in g op era t io n s, su ch a s a n in d e p en d e n t co m pa n y t e a m co n d u ct in g a n

    a t t a c k .

    1 -3 3. I f t h e o bst a cle is d e f en d e d b y a sm a ll e n e m y f o rce, a ssa u lt a n d b re a ch

    f o r ce s m i s s i on s m a y b e c om b i n e d . Th i s s i m p l i f i e s C 2 a n d p r ov i d es m o r e

    immediate combat power for security a nd suppression.

    1 - 3 4 . F ire co n t ro l m e a su re s a re e sse n t ia l , s in ce su p p o rt a n d b re a ch f o rce s

    may be firing on th e enemy wh en the a ssault force is committed. Suppression

    of overwa tching enemy posit ions must continue a nd other enemy forces must

    re m a in f ixed b y f ire s u n t i l t h e e n e m y h a s b e e n d e st ro yed . Th e a ssa u lt f orce

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    20/150

    FM 3-34.2

    Obstacle Breaching Theory 1-11

    m u st a ssu m e con t ro l f or d ire ct f ire s o n t h e a ssa u lt o bject ive a s su p p ort a n d

    breach forces fires are lifted or shifted.

    MASS1 - 3 5 . B re a ch in g is co n d u ct e d b y ra p id ly a p p lyin g co n ce n t ra t e d e f f o rt s a t a

    point t o reduce the obsta cle an d penetra te th e defense. Massed combat power

    is directed aga inst the enemys wea kness. The locat ion selected for brea ching

    d e pe n d s la r g e ly o n t h e w e a k n e ss in t h e e n e m ys d e f e n se, w h e re i t s cove rin g

    f ire s a re m in im iz e d . I f f r ie n d ly f o rce s ca n n o t f in d a n a t u ra l we a k n e ss, t h e y

    c r ea t e on e b y f i x i n g t h e m a j or i t y o f t h e en e m y f o r c e a n d i s o la t i n g a s m a l l

    portion of it for attack.

    Support Force

    1-36. The support force suppresses th e enemy t o eliminat e effective fires on

    t h e b re a ch f o rce . S m o k e a n d t e rra in a r e u se d t o h e lp iso la t e t h e f o rce u n d e r

    a t t a ck . S u p p re ssio n re qu ire s t h e co m m a n d e r t o m a ss e n o u g h o ve rwa t ch in gdirect fires to protect the breach force.

    1 -3 7 . N o r m a l l y , t h e TF i s o l a t e s a n d d e s t r o y s p l a t o o n -s i z e e l e m e n t s i n

    succession, sta rt ing w ith t he pla toon identified a s th e easiest to overwhelm. In

    F i g u r e 1 -2 , t h e TF c om m a n d e r e m p lo y s a t a n k c om p a n y t e a m t o f i x t w o

    defending platoons a nd uses s creening smoke (ta rget AA1102) to help isolate

    the platoon selected for attack. Objective (OBJ ) Cowboy has been identified by

    t h e TF c om m a n d e r a s t h e p o in t o f p en e t r a t i o n . Th e c e n t e r a n d e a s t e r n

    p l a t o on s a r e s u p p r e s s ed b y d i r e ct a n d i n d i r e c t f i r e s f r o m a s e co n d t a n k

    company team.

    Figure 1-2. Technique for Achieving Mass in the Breach

    OBJCOWBOYAA1101

    AA1103

    (+)

    (-)

    x

    x

    x x

    v

    v

    v

    v

    x

    x x

    AA1102

    AA1104

    x

    x

    x

    x

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    21/150

    FM 3-34.2

    1-12 Obstacle Breaching Theory

    1-38. The support force should be provided wit h reduct ion a ssets t o reduce the

    i m p a c t t h a t u n e x p e c t e d o b s t a c l e s o r s c a t t e r a b l e m i n e f i e l d s h a v e o n t h e i r

    a p p r o a c h t o a n d o cc u pa t i on o f S B F p os i t i on s . F a i l u r e t o d o s o m a y g r e a t l y

    im p a ct o n syn ch ro n iz in g t h e e n t ire b re a ch in g o p e ra t io n . A s a t e ch n iqu e , au n it m a y cre a t e a m o bil it y re se rve t h a t su p p ort s t h e m a in e f fort t h ro u g h ou t

    t h e o p era t io n . I n i t ia l ly, t h e m o b il i t y r e se rve m a y su p p ort t h e su p p ort f orce

    until i t ha s seized its SB F posit ions and t hen shift i ts support t o the breach or

    assa ult force.

    Breach Force

    1-39. The commander also masses engineers and reduction assets to reduce

    t h e o b s t a c le . Th e b r e a c h f or c e i s o r g a n i z e d a n d e q u i p pe d t o u s e s e v e r a l

    d i f f e r e n t r e d u c t i o n t e c h n i q u e s i n c a s e t h e p r i m a r y t e c h n i q u e f a i l s ; f o r

    e x a m p l e , i f a k e y v e h i c l e i s d e s t r o y e d o r i f c a s u a l t i e s r e n d e r d i s m o u n t e d

    e n g in ee rs in e f f ect ive. A d d it ion a l re d u ct ion a sse t s a re p re se n t t o h a n d le t h e

    u n e xp e ct e d . N o rm a lly, 5 0 p e rce n t m o re re d u ct io n a sse t s t h a n re qu ire d f o r

    obstacle reduction are positioned with the breach force.

    1-40. The breach force masses reduction efforts against the obstacle to ensure

    tha t it w ill successfully crea te enough lanes. A mounted TF-size assa ult force

    r e q u i r es a t l e a s t t w o la n e s, b u t m o r e l a n e s w i l l s p ee d p a s s a g e t h r o u g h t h e

    d a n g e r a r e a . Th e b r e a c h f or c e a t t e m p t s t o s im u l t a n e ou s l y c r e a t e a s m a n y

    lanes a s necessary to ensure the ra pid pass age of the assa ult force through the

    o bst a cle syst e m . Th is m a y r e qu ire t h e b re a ch f orce t o s im u lt a n e ou sly u se a

    combination of mechanical, explosive, and manual techniques. For example,

    an engineer pla toon ma y use tw o MIC LIC s as t he primary t echnique to reduce

    a m i n e f i e l d . As s o o n a s t h e e n g i n e e r p l a t o on f i r e s t h e s e co n d M I C L I C ,

    e n g i n e e r s q u a d s e m p l o y m a n u a l e x p l o s i v e t e c h n i q u e s t o c r e a t e t h r e e

    a d d it io n a l la n e s t h ro u g h t h e m in e fie ld . Th e com m a n d e r m u st ca re f u lly p la n

    a n d syn ch ro n iz e t h e cre a t ion o f a d d it ion a l la n e s t o re d u ce t h e p o t e n t ia l f o rfratricide with assault ing troops. The distance between the lanes depends on

    the enemy, th e terra in, the n eed t o minimize the effects of enemy a rt illery, th e

    direct-fire pla n of t he support force, C 2, a nd r eduction-site congestion.

    Assault Force

    1 -4 1. Ach ievin g n e cessa r y m a ss f or t h e a ssa u lt re qu ire s t h e b r e a ch f orce t o

    op en e n o u g h l a n e s t h r o u gh t h e o bs t a c le t o p e r m it r a p id p a s s a g e a n d t h e

    buildup of forces on the farside. The size of the assault force determines the

    n u m b e r o f l a n e s i n i t i a l l y c r e a t e d . A m o u n t e d TF r e q u i r e s o n e l a n e p e r

    a ssa u lt in g com p a n y t e a m . A d ism ou n t e d a ssa u lt f o rce re qu ire s on e la n e f o r

    e a c h l ea d i n g a s s a u l t p l a t o on . Th e t a ct i c a l s i t u a t i on m a y r e q u i r e a d d i t i on a l

    l a n e s t o q u i ck l y p a s s a l a r g e a s s a u l t f or c e t h r o u g h t h e o b s t a c l e t o a ch i e v esufficient combat-power ratio.

    1-42. The principle of ma ss influences t he selection of the point of brea ch; th e

    t a s k o r g a n i z a t i o n o f t h e s u p p o r t , b r e a c h , a n d a s s a u l t f o r c e s ; a n d t h e

    in t e g ra t ion o f e n g in ee rs in m o vem e n t o r a t t a ck f orm a t io n s. F i g u r e 1 -2 , p a g e

    1-11, shows a technique to achieve mass in t he breach.

    1 -4 3. Th e n e e d t o g e n era t e e n ou g h m a ss a n d t h e m a n e u ver sp a ce a va i la b le

    s t r o n g l y i n f l u e n ce w h i ch e c h e lo n c a n c o n d u c t t h e b r e a c h i n g o p er a t i o n . A

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    22/150

    FM 3-34.2

    Obstacle Breaching Theory 1-13

    c om p a n y t e a m c a n n o t s i m u l t a n e o u s l y m a s s s u f f i c i en t f i r e s , r e d u c e t h e

    o bs t a c le , a n d a s s a u l t t h e d e f e n d i n g p os i t i o n u n l es s i t i s a s i m p l e ob s t a c le

    defended by no more tha n one pla toon. A TF sh ould have a comba t-power ra tio

    of 3:1 to reduce an obsta cle defended by a compan y, a nd a TF is n ormally t hee ch e lon u se d t o e xecu t e a b re a ch . A b rig a d e h a s su f f icie n t com b a t p owe r t o

    a t t a c k a c o m p l e x , w e l l -d e f e n d e d o b s t a c l e ; b u t a b r i g a d e h a s d i f f i c u l t y

    deploying a ll i ts comba t power w ithin ra nge. Norma lly, a brigade brea ches by

    isolat ing a sma ll segment of the defense (platoon or company ) that the TF ca n

    then at tack as the breaching echelon. If obstacles and defenses are in-depth,

    m a ss is a ch ie ved b y p a ssin g a d d it ion a l TF s t h ro u g h t h e o b st a cle t o con t in u e

    t h e a t t a ck.

    SYNCHRONIZATION

    1-44. Breaching operations require precise synchronization of the breaching

    f u n d a m e n t a ls b y su p p ort , b re a ch , a n d a ssa u lt f o rce s. Fa i lu re t o syn ch ro n ize

    effective suppression a nd obscura tion with obsta cle reduction and a ssault can

    r e s u l t i n r a p i d , d e v a s t a t i n g l o s s es o f f r i en d l y t r o op s i n t h e o bs t a c le o r t h e

    enemys E A.

    1 -4 5. A co m b in e d -a rm s b re a ch is a com p le x op e ra t io n b y n a t u r e . S u p p ort ,

    b r e a ch , a n d a s s a u l t f o r ce s m u s t a p pl y t h e S O S R A br e a c h in g f u n d a m e n t a l s

    wit hin a short t ime a nd dista nce. The support force masses its direct f ires and

    con t ro ls in d ire ct f ire s in con cert wit h b re a ch a n d a ssa u lt f o rce s m a n e u vers.

    The commander must employ smoke at the right t ime and place to maximize

    i t s e f f ec t i ve n es s o r r i s k h a m p er i n g h i s o w n t a r g e t a c q u i s it i o n a n d C 2. The

    b r e a c h f or c e m u s t h a v e t h e r i g h t r e d u ct i o n a s s e t f or t h e t y p e of o b s t a c l e

    e n co u n t e re d . E n g in e e rs m u st e n su re t h a t t h e y d o n o t p re m a t u re ly e xh a u st

    reduction a ssets n eeded to reduce subsequent obsta cles. Table 1-2, page 1-14,

    shows the complexity of a combined-arms breach.

    1-46. The comma nder ensur es synchronizat ion t hrough proper pla nning a nd

    force prepara tion. Fundam entals t o achieve synchronizat ion a re

    D e t a i le d r e ve r se p la n n i n g.

    C l ea r s u bu n it i n st r u ct i on s .

    E f fect ive C 2.

    Well-rehearsed forces.

    Detailed Reverse Planning

    1 - 4 7 . S yn ch ro n iz in g a co m b in e d - a rm s b re a ch b e g in s b y u sin g t h e re ve rse -

    p la n n in g p ro ce ss t o e n su re t h a t a ct io n s a t o b st a cle s su p p o rt a ct io n s o n t h e

    objective. Pla nning t he breach w ithout rega rd to a ctions on t he objective leads

    t o d isa st e r. D u rin g C OA d eve lo pm e n t , t h e st a f f a n a lyz e s t h e re la t ive com b a t

    power and compares enemy and friendly strengths and weaknesses. The staff

    t h e n g e n e r a t e s o pt i on s b a s e d o n t h e c om m a n d e r s g u i d a n c e a n d a r r a y s t h e

    forces necessa ry to a ccomplish the mission. The st aff develops the options by

    analyzing the objective and allocating forces to accomplish the mission. The

    c om m a n d e r d e c i d e s h o w h e m u s t a t t a c k t h e o b je ct i v e t o a c co m p li s h h i s

    m i s s i o n . Th i s d e c i s i on d r i v e s w h e r e , h o w, a n d w i t h w h a t f o r c e h e m u s t

    support , breach, and assault through the enemys obstacles. The commander

    a p p ro ve s t h e sch e m e of m a n e u ve r f o r t h e b re a ch in g p h a se o f t h e o p e ra t io n

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    23/150

    FM 3-34.2

    1-14 Obstacle Breaching Theory

    tha t achieves a dequa te suppression, obscura tion, and security. He a lso creat es

    su f f icie n t la n e s t o ra p id ly p ro je ct com b a t p owe r o n t h e p o in t o f p e n et ra t io nand the far side of the objective, not just to the far side of the obstacle. Reverse

    p l a n n i n g g i v e s p u r p o s e t o t h e b r e a c h i n g p l a n t h a t s u p p o r t s m i s s i o n

    accomplishment.

    1-48. The commander begins developing COAs as discussed in FM 101-5. H e

    determines relat ive comba t-power ra t ios, generat es options, and a rra ys forces

    t o a c co m p l i s h t h e m i s s i o n . H e t h e n d e v e l op s t h e s c h e m e o f m a n e u v e r ,

    including actions on the objective. In Figur e 1-3, a three-company-team TF is

    conducting a deliberate a t t ack to destroy a motorized infantr y company (MIC)

    in th e defense. The comma nder believes seizing OB J Ca t t o be decisive. This is

    the point from w hich reverse plann ing of a ct ions on th e objective begins. The

    c om m a n d e r u s e s Te a m C t o s e i z e t h e i n i t i a l f o ot h o l d ( OB J B i r d ) (p oi n t o f

    penetr at ion) into the enemys defense. The focus of brea ch plann ing is to getTeam C t o its objective. The num ber a nd location of la nes a re driven by Team

    Cs m a n e u ve r o n OB J B ird a s t h e a ssa u lt f o rce . T h e co m m a n d e r n o w p la n s

    how t he breach force must ma neuver to reduce the obsta cle. Supporting fires

    f rom C o m pa n y A a n d Te a m B in S B F s 1 5 a n d 2 5 a re p la n n e d t o su p po rt t h e

    re d u ct io n o f t h e o b st a cle a n d t h e a ssa u lt on t h e o b je ct ive . Re verse p la n n in g

    c on t i n u e s t o d r i v e t h e m a n e u v er f or m a t i on t o e n s u r e t h a t f or c es a r e i n t h e

    correct relative positions to accomplish their missions.

    Table 1-2. Breach Complexity

    Action ElementTime

    (Minutes)Controlled By

    Develop the situation (verify the boundary of the

    enemy obstacle system).

    Force in contact M to 2 S3

    Maneuver the support force into the overwatch

    position.

    Support M + 2 to 15 Support cdr

    Maneuver the assault force into the covered

    assault position.

    Assault M + 2 to 15 Assault cdr

    Call for artillery. DS artillery M + 2 to 15 FSO

    Build smoke. Mortars M + 5 to 10 FSO

    Suppress the enemy with direct fires. Support M + 15 to 29 Support cdr

    Suppress the enemy with artillery fires. DS artillery M + 10 to 29 FSO

    Maintain smoke. DS artillery/mortars M + 10 to 30 FSO

    Maneuver the breach force to the breachlocation.

    Breach M + 20 to 23 Reduction cdr

    Reduce the obstacle, and prepare two lanes. Breach M + 23 to 30 Engineer ldr

    Place smoke pots. Breach M + 23 to EOM Reduction cdr

    Shift direct fires off the objective. Support M + 29 to 30 Assault cdr

    Shift indirect fires beyond the objective. DS artillery M + 29 to 30 Assault cdr

    Assault to destroy the enemy on the far side of

    the obstacle.

    Assault M + 30 to 45 Assault cdr

    Reorganize to continue the mission. TF M + 45 to EOM S3

    NOTE: M = Contact with the obstacle

    http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    24/150

    FM 3-34.2

    Obstacle Breaching Theory 1-15

    Clear Subunit Instructions

    1 - 4 9 . S u b o rd in a t e u n it s m u st cle a rly u n d e rst a n d t h e ir m issio n s, h o w t h e ir

    m ission s re la t e t o t h e p h a se s o f t h e op era t io n , a n d w h a t ro le a d ja ce n t u n it sp l a y i n t h e o v e r a l l p l a n . T h e c o m m a n d e r m a y u s e a n e x e c u t i o n m a t r i x t o

    synchronize his forces. An execution ma trix is a superb synchroniza tion tool,

    a n d i t l is t s su b u n it in st ru ct ion s se qu e n t ia l ly in r e la t ion t o k e y e ve n t s o r t h e

    s e q u e n c e o f t h e a t t a c k . I t a l s o p r o v i d e s s u b o r d i n a t e c o m m a n d e r s w i t h a n

    u n d e rst a n d in g o f h ow t h e ir m ission s a n d t h o se o f a d ja cen t u n it s f i t in t o t h e

    o v e r a l l p l a n . M o r e i m p o r t a n t l y , i t a l l o w s s u b o r d i n a t e s t o b e t t e r t r a c k t h e

    batt le and coordinate their own maneuver with that of adjacent units. This is

    c r i t i c a l t o a c h i e v i n g u n i t y o f e f f o r t b e t w e e n s u p p o r t , b r e a c h , a n d a s s a u l t

    Figure 1-3. Reverse Planning

    Size ofsupport

    force

    Amount of

    suppression

    and

    obscuration

    Overwatching

    enemy

    Size ofbreach

    force

    Number

    and

    location of

    lanes

    Actions at

    obstacles

    Size ofassault

    force

    Actionsonthe

    objective

    Isolate Suppress Obscure Secure Reduce Penetrate Exploit

    Reverse-planning sequence

    LD

    (PL DALLAS)

    LD

    (PL DALLAS)

    A

    B

    AXIS HORSE

    AXIS MAN

    SBF 25

    SBF 15

    OBJ BIRD

    OBJ CAT

    OBJ DOG

    PL AUSTIN

    PL AUSTIN

    PL HOUSTON

    PL HOUSTON

    09

    27

    33

    SBF 45

    BHL

    (PL KILLEEN)

    BHL

    (PL KILLEEN)

    1620

    SBF 35

    (+)

    (-)

    C

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    25/150

    FM 3-34.2

    1-16 Obstacle Breaching Theory

    f o r c e s . F i g u r e 1 - 4 s h o w s a s a m p l e e x e c u t i o n m a t r i x f o r t h e s c h e m e o f

    maneuver in Fi gure 1-3, page 1-15.

    Units

    Company A

    (Support Force)

    Team B(Support/

    Assault Force)

    Team C

    (Assault Force)

    Team Engineer

    (Breach Force)

    Force

    Allocation

    LD to PL

    Austin

    Move to left of

    Team B; echelon

    left.

    Lead TF. Trail team

    engineer.

    Trail Team B

    center.

    Maneuver

    formation

    PL Austin to PL

    Houston

    Attack with

    Team B on Axis

    Horse.

    Occupy SBF 25.

    Lead attack on

    Axis Horse.

    Occupy SBF 15.

    Occupy CP 20. Lead attack on

    Axis Man.

    Obstacle

    reduction

    SBF 25.

    Orient TRP 09.

    On order TRP

    27.

    SBF 15.

    Orient TRP 09.

    Occupy CP 16.

    Identify lane.

    Create and mark

    two lanes

    (vicinity

    AB123456).

    Attack on OBJ

    Bird

    Shift fires to

    TRP 33.

    Shift fires to

    TRP 27.

    On order, move

    through lane to

    seize OBJ Bird.

    Assist passage

    of Team C.

    Secure lanes.

    Reduce

    Attack on OBJ

    Cat

    Orient TRP 33. On order, lift

    fires and occupy

    CP 16.

    Identify lanes.

    On order, seize

    OBJ Cat.

    Secure/improve

    lanes.

    Attack on OBJDog Lift fires.Consolidate on

    SBF 25.

    On order, seizeOBJ Dog. Occupy SBF 45.Orient TRP 33.

    On order, lift

    fires.

    Assist passageof Team B.

    Secure/improve

    lanes.

    Action onOBJ

    Consolidate SBF 25.

    Orient north.

    OBJ Dog.

    Orient northeast.

    OBJ Cat.

    Orient east.

    Support hasty

    defense

    operations.

    Figure 1-4. Sample Execution Matrix

    http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    26/150

    FM 3-34.2

    Obstacle Breaching Theory 1-17

    Effective C2

    1-50. E ffective C 2 is paramount to mission success. C 2 is in t e g ra t e d in t o t h e

    p l a n t h r o u g h t h e u s e o f m a n e u v e r a n d f i r e c o n t r o l m e a s u r e s a n d t h e

    posit ioning of key leaders to see the bat t le space. Man euver contr ol measuresenable the commander to graphically convey his intent , scheme of maneuver,

    a n d su b u n it in st ru ct ion s. Re la t in g su b u n it a ct ion s t o t h e t e rra in is cri t ica l t o

    successful execution.

    1 - 5 1 . I n F i g u r e 1 -3 , p a g e 1 -1 5, t h e c o m m a n d e r u s e s P L s t o i n i t i a t e t h e

    breaching operat ion an d t o control a ct ions on the objective. At P L Austin, th e

    support force ma neuvers t o occupy S B Fs 15 a nd 25. The a ssa ult force occupies

    c h e ck p oi n t (C P ) 16 t o p r e v e n t p r e m a t u r e a d v a n c e m e n t t o t h e o b s t a c l e,

    r e d u c t i o n - s i t e c o n g e s t i o n , a n d t h e e n g a g e m e n t o f f o r c e s b e f o r e l a n e s a r e

    created and marked. The commander uses target reference points (TRPs) on

    o bv i ou s t e r r a i n f e a t u r e s t o o r i en t , f o cu s , a n d s h i f t s u p p r e s s iv e d i r e ct a n d

    indirect fires.

    1 - 5 2 . K e y l e a d e r s m u s t b e a b l e t o s e e t h e b a t t l e s p a c e t o m a k e i n f o r m e d

    decisions. Nowhere is t his m ore t rue th an during t he breaching opera tion. The

    comma nder must posit ion himself where he can best contr ol the batt le. Since

    effective suppression is the most crit ical event during breaching operations,

    the commander may position himself with the support force. This enables him

    t o p e r s on a l l y i n f l u e n ce f i r e co n t r o l a n d f a c i l i t a t e t h e n e c es s a r y c r os s t a l k

    between breach an d a ssa ult forces. The S3 ma y init ia lly move w ith t he breach

    f o r c e t o t r a c k t h e p r o g r e s s o f o b s t a c l e r e d u c t i o n a n d a n t i c i p a t e t h e

    co m m it m e n t o f t h e a ssa u lt f o rce . A co m m a n d e r wh o f e e ls t h a t h is p e rso n a l

    influence is required with the breach or assault force must make a conscious

    effort to track the entire battle and must not focus completely on the reduction

    of th e obsta cle or t he as sault itself.

    Well-Rehearsed Forces

    1-53. The most effective synchronizat ion t ool av aila ble to the comman der is

    t h e r e h e a r s a l . Th e i n h e r e n t c om p l ex i t y o f t h e b r e a c h in g o p e r a t i o n m a k e s

    rehearsals at every level essential to success. The commander must give his

    su b ord in a t e s t im e t o p la n h o w t h e y w il l execu t e t h e ir a ssig n ed m ission s a n d

    t i m e t o r e h e a r s e t h e p l a n w i t h t h e i r u n i t . Th e TF f a c il i t a t e s r e h ea r s a l s b y

    p rep a rin g r e h ea r sa l s i t e s a n d m a n a g in g t h e ir u se. Th e TF com m a n d e r m u st

    be sensit ive to the impact TF-level rehearsals have on subordinate planning

    a n d p r e pa r a t i on , a n d h e m u s t c a r e f u ll y c h oo se t h e t i m e a n d p l a c e of t h e

    re h ea rsa l . Co m pa n y t e a m s r e h ea rse t h e ir su p p ort , b re a ch , a n d a ssa u lt ro les.

    TF re h e a rsa ls f o cu s o n sy n ch ron iz in g t h e m a n e u ver o f su p p ort , b re a ch , a n d

    a s s a u l t f o r ce s t o a c h i ev e t h e b r e a c h i n g f u n d a m e n t a l s . R e h e a r s a l s a l s o

    highlight key events tha t m ust be coordinated dur ing breach execution.

    Typical Breaching Operations

    1-54. Table 1-3, page 1-18, shows the types of breaching operations versus the

    sizes of the enemy forces overwatching the obstacle.

    http://-/?-http://-/?-http://-/?-http://-/?-
  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    27/150

    FM 3-34.2

    1-18 Obstacle Breaching Theory

    BREACHING OPERATIONS IN SUPPORT OF DELI BERATE ANDHASTY ATTACKS

    1 -5 5. At t a ck s t a k e p la ce a lo n g a con t in u u m b a se d o n t h e k n o wle d g e of t h ee n e m y s c a p a b i l i t i e s a n d d i s p o s i t i o n a n d t h e i n t e n t i o n s a n d d e t a i l s o f t h e

    f rie n d ly f o rce s p la n n in g a n d p re p a ra t io n . T h e t e rm s d el i b er a t e a t t a c k a n d

    h a s t y a t t a ck r e f e r t o t h e o pp os i t e e n d s o f t h a t c on t i n u u m a n d d e s c r i b e

    characterist ics of the at tack:

    Deliberate attack. F r i en d ly f or ces h a v e m or e k n ow l ed g e o f t h ee n e m y s i t u a t i o n a n d h a v e m o r e t i m e t o p l a n a n d p r e p a r e f o r t h e

    enemy. With this knowledge, friendly forces conducting the deliberate

    a t t a ck c a n d e v el op d e t a i l ed p l a n s , t a s k -o r g a n i z e t o a c co m pl i s h t h e

    mission, a nd execute rehear sals down t o the lowest levels.

    Hasty attack. Th e e n e m y si t u a t ion is va g u e, or i t ch a n g e s ra p id ly.Friendly forces ha ve lit t le or no t ime to plan or prepar e for t his ty pe of

    op er a t i o n . B e ca u s e t h e p r i m a r y p u r p os e of t h e h a s t y a t t a c k i s t o

    m a i n t a i n m o m en t u m o r t a k e a d v a n t a g e of t h e e n e m y s i t u a t i on , i t i s

    n or m a l l y c on d u ct e d o n l y w i t h t h e r e s o ur c es t h a t a r e i m m e d ia t e ly

    available.

    1 -5 6. B re a ch in g op era t io n s m a y b e re qu ire d t o su p po rt a n a t t a ck a n yw h e re

    a l o n g t h e c o n t i n u u m . D u r i n g a d e l i b e r a t e a t t a c k , f r i e n d l y f o r c e s , s u c h a s

    e n g in e ers a n d sm o ke p la t o on s, a re t a sk -o rg a n iz e d b e f ore t h e a t t a ck t o b e st

    s u p p o r t t h e c o n ce p t o f t h e o p e r a t i o n . I n a h a s t y a t t a c k , t h e r e m a y b e

    i n s u f f i ci e n t t i m e t o t a s k -o r g a n i z e a s s e t s , s u ch a s e n g i n e e r s a n d r e d u c t i on

    a sse t s , in t h e b e st m a n n e r. Ad d it ion a l ly, t h e u n it m a y n o t h a ve t im e t o p la n

    t h e b re a ch in g o pe ra t ion in d e t a i l b u t m a y h a ve t o re ly o n t h e u n it s S OP f or

    e x ec u t io n . R e g a r d l es s o f w h e r e t h e a t t a c k f a l l s a l o n g t h e c o n t i n u um , t h e

    breaching tenets a pply w hen conducting th e breaching operat ion in support of

    t h e a t t a ck.

    PLANNING SEQUENCE

    1 -5 7. Th e sch e m e o f m a n e u ve r, e n g in e e r o p e ra t ion s, f i re s, a ir d e f en se , a n d

    a ct ion s a t ob st a cles a re a l l b a se d o n t h e sa m e S I TE M P. P la n n e rs d e velop t h e

    breaching plan using the following sequence:

    Reverse planning begins wit h a ctions on the objective.

    Table 1-3. Types of Breaching Operations Versus Enemy Sizes

    Enemy Overwatching

    the Obstacle

    Maneuver Units Conducting

    Breaching Operations

    Brigade TF Company

    MIBN X

    MIC O X

    MIP O X

    NOTES:

    X = Normal (combat-power ratio 3:1)

    O = Desirable (combat-power ratio >3:1)

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    28/150

    FM 3-34.2

    Obstacle Breaching Theory 1-19

    Actions on the objective drive the size an d composit ion of the assa ult

    force.

    Th e siz e of t h e a ssa u lt f orce d e t erm in e s t h e n u m b er a n d loca t ion o f

    lanes t o be creat ed. L a n e requ ire m en t s a n d t h e t yp e o f ob st a cle d rive t h e a m o u n t a n d t yp e

    of mobility assets task-organized to the breach force.

    The ability of the enemy to interfere w ith the reduction of the obsta cle

    d e t e rm in e s t h e siz e a n d co m p o sit io n o f t h e se cu ri t y e le m e n t in t h e

    brea ch force.

    Th e a b i lit y of t h e e nem y t o m a s s fi res on t h e p oin t of b rea ch

    d e t e r m i n e s t h e a m ou n t o f s u pp r e s s io n r e q u i r e d a n d t h e s i z e a n d

    composition of the support force.

  • 7/27/2019 2002 US Army Combined Arms Breaching Operations 150p

    29/150

    Breaching Operations 2-1

    Chapter 2

    Breaching Operations

    F o r a b r e a c h i n g o pe r a t i o n , a u n i t d e v e l op s a s c h e m e o f m a n e u v e r

    s p e c i f i ca l l y d e s i g n e d t o c r o s s a n o b s t a c l e a n d c on t i n u e a m i s s i o n .

    Ma n e u v e r com p a n y t e a m s , TF s , a n d b r i g a d e s ca n con d u ct b r e a ch i n g

    o p e r a t i o n s . N o r m a l l y, a TF e x e c u t e s a b r e a c h i n g o p er a t i o n a n d t h e

    company teams are assigned as support , breach, and assault forces. Units

    will conduct a breaching operation when

    Th e f or ce-a l loca t i on r a t io i nd ica t e s t h a t a con fi rm ed en em y

    s i t u a t i o n i s b e y o n d t h e s u b o r d i n a t e u n i t s c a p a b i l i t i e s t os u cce s s f u l l y co n d u ct a b r e a ch i n g o p e r a t i o n . ( Wh e n com p a n i e s

    ca n n o t s u cce s s f u l l y co n d u ct a b r e a ch i n g o p e r a t i o n , t h e b a t t a l i o n

    will.)