FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Appendix C<br />
Combined Arms Breaching Operations<br />
Breaching operations are conducted to allow maneuver in the presence of obstacles.<br />
Obstacle breaching is the employment of a combination of tactics and techniques to<br />
advance an attacking force to the obstacle farside that is covered by fire. It is one of<br />
the most difficult combat tasks a force can encounter. Breaching is a synchronized<br />
combined arms operation under the control of a maneuver commander. This appendix<br />
serves as a quick reference for leaders planning breaching operations. (See <strong>FM</strong> 3-<br />
34.2.)<br />
OPERATIONS<br />
C-1. Attacks take place along a continuum based on the knowledge of enemy capability and disposition<br />
and the intentions and details of friendly force planning and preparation. The following terms refer to the<br />
opposite ends of that continuum and describe characteristics of the attack:<br />
� Deliberate attack. During a deliberate attack, friendly forces have more knowledge of the<br />
enemy situation and have more time to plan and prepare for the enemy. With this knowledge,<br />
friendly forces conducting a deliberate attack can develop detailed plans, task-organize to<br />
accomplish the mission, and execute rehearsals down to the lowest levels (see <strong>FM</strong> 3-90).<br />
� Hasty attack. During a hasty attack, the enemy situation is vague or changes rapidly. Friendly<br />
forces have little or no time to plan or prepare for this type of operation. Because the primary<br />
purpose of the hasty attack is to maintain momentum or take advantage of the enemy situation, it<br />
is normally conducted only with resources that are immediately available (see <strong>FM</strong> 3-90).<br />
C-2. Breaching operations may be required to support an attack anywhere along this continuum.<br />
Breaching operations must be adapted to best exploit the situation. The breaching tenets apply across the<br />
continuum regardless of where the attack falls. The level and type of planning distinguishes which of the<br />
following general types of breaching operations are used to meet mission variables (METT-TC):<br />
� Deliberate breach. A deliberate breach is used against a strong defense or complex obstacle<br />
system. It is similar to a deliberate attack, requiring detailed knowledge of the defense and<br />
obstacle systems. It is characterized by the most prior planning, preparation, and build up of<br />
combat power on the obstacle nearside. Subordinate units are task-organized to accomplish the<br />
breach. The breach often requires securing the obstacle farside with an assault force before or<br />
during reduction. Amphibious breaching is an adaptation of the deliberate breach intended to<br />
overcome antilanding defenses to allow a successful amphibious landing.<br />
� Hasty breach. A hasty breach is an adaptation to the deliberate breach and is conducted when<br />
less time is available. It may be conducted during a deliberate or hasty attack due to a lack of<br />
clarity on enemy obstacles or changing enemy situations (SCATMINE emplacement).<br />
� In-stride breach. An in-stride breach is a variation of a hasty breach that consists of a rapid<br />
breaching adaptation conducted by forces organic to (or task-organized with) the attacking<br />
force. It consists of preplanned, well-trained, and well-rehearsed breaching battle drills and the<br />
use of the unit SOP. The in-stride breach takes advantage of surprise and momentum to<br />
penetrate obstacles. The force uses an in-stride breach against weak defenders or very simple<br />
obstacles and executes the battle drill on the move. Attacking forces should be configured to<br />
execute an in-stride breach, except when a deliberate breach is planned.<br />
� Covert breach. A covert breach is used to pass through obstacles without being detected by the<br />
enemy. It uses elements of deliberate and hasty breaches as required. Covert breaching is<br />
11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> C-1