09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix C<br />

Combined Arms Breaching Operations<br />

Breaching operations are conducted to allow maneuver in the presence of obstacles.<br />

Obstacle breaching is the employment of a combination of tactics and techniques to<br />

advance an attacking force to the obstacle farside that is covered by fire. It is one of<br />

the most difficult combat tasks a force can encounter. Breaching is a synchronized<br />

combined arms operation under the control of a maneuver commander. This appendix<br />

serves as a quick reference for leaders planning breaching operations. (See <strong>FM</strong> 3-<br />

34.2.)<br />

OPERATIONS<br />

C-1. Attacks take place along a continuum based on the knowledge of enemy capability and disposition<br />

and the intentions and details of friendly force planning and preparation. The following terms refer to the<br />

opposite ends of that continuum and describe characteristics of the attack:<br />

� Deliberate attack. During a deliberate attack, friendly forces have more knowledge of the<br />

enemy situation and have more time to plan and prepare for the enemy. With this knowledge,<br />

friendly forces conducting a deliberate attack can develop detailed plans, task-organize to<br />

accomplish the mission, and execute rehearsals down to the lowest levels (see <strong>FM</strong> 3-90).<br />

� Hasty attack. During a hasty attack, the enemy situation is vague or changes rapidly. Friendly<br />

forces have little or no time to plan or prepare for this type of operation. Because the primary<br />

purpose of the hasty attack is to maintain momentum or take advantage of the enemy situation, it<br />

is normally conducted only with resources that are immediately available (see <strong>FM</strong> 3-90).<br />

C-2. Breaching operations may be required to support an attack anywhere along this continuum.<br />

Breaching operations must be adapted to best exploit the situation. The breaching tenets apply across the<br />

continuum regardless of where the attack falls. The level and type of planning distinguishes which of the<br />

following general types of breaching operations are used to meet mission variables (METT-TC):<br />

� Deliberate breach. A deliberate breach is used against a strong defense or complex obstacle<br />

system. It is similar to a deliberate attack, requiring detailed knowledge of the defense and<br />

obstacle systems. It is characterized by the most prior planning, preparation, and build up of<br />

combat power on the obstacle nearside. Subordinate units are task-organized to accomplish the<br />

breach. The breach often requires securing the obstacle farside with an assault force before or<br />

during reduction. Amphibious breaching is an adaptation of the deliberate breach intended to<br />

overcome antilanding defenses to allow a successful amphibious landing.<br />

� Hasty breach. A hasty breach is an adaptation to the deliberate breach and is conducted when<br />

less time is available. It may be conducted during a deliberate or hasty attack due to a lack of<br />

clarity on enemy obstacles or changing enemy situations (SCATMINE emplacement).<br />

� In-stride breach. An in-stride breach is a variation of a hasty breach that consists of a rapid<br />

breaching adaptation conducted by forces organic to (or task-organized with) the attacking<br />

force. It consists of preplanned, well-trained, and well-rehearsed breaching battle drills and the<br />

use of the unit SOP. The in-stride breach takes advantage of surprise and momentum to<br />

penetrate obstacles. The force uses an in-stride breach against weak defenders or very simple<br />

obstacles and executes the battle drill on the move. Attacking forces should be configured to<br />

execute an in-stride breach, except when a deliberate breach is planned.<br />

� Covert breach. A covert breach is used to pass through obstacles without being detected by the<br />

enemy. It uses elements of deliberate and hasty breaches as required. Covert breaching is<br />

11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> C-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!