09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix C<br />

characterized by using stealth to reduce obstacles, with support and assault forces executing<br />

their mission only if reduction is detected. Covert breaches are usually conducted during periods<br />

of limited visibility.<br />

C-3. The breach area is the area where a breaching operation occurs. It is established and fully defined<br />

by the higher headquarters of the unit conducting breaching operations. (<strong>FM</strong> 3-34.2) The area must be<br />

large enough to allow the attacking unit to deploy its support force and extend far enough on the obstacle<br />

farside to allow follow-on forces to deploy before leaving the breach area. One technique is to establish the<br />

breach area using phase lines (PLs) or unit boundaries. The PL defining the breach area farside may be<br />

established as a battle handover line (BHL).<br />

C-4. The reduction area is a number of adjacent points of breach that are under the control of the<br />

breaching commander (see <strong>FM</strong> 3-34.2). The commander conducting the attack determines the size and<br />

location of the reduction area that supports the seizure of a POP. (See figure C-1.)<br />

Figure C-1. Reduction area, breach area, and point of breach<br />

C-5. A breaching operation includes the reduction of minefields and other EHs and obstacles. Reduction<br />

is the creation of lanes through or over the obstacle to allow the attacking force to pass. The number and<br />

width of lanes varies with the enemy situation, size and composition of the assault force, and scheme of<br />

maneuver. The lanes must allow the assault force to rapidly pass through the obstacle. Breaching is a<br />

mobility operation planned for within the overall framework of assured mobility. Heavily reliant on<br />

reconnaissance, it generally requires significant engineering support to accomplish.<br />

C-6. Most combined arms breaching operations are conducted by a BCT or its subordinate battalion TF<br />

elements as a tactical operation, but higher headquarters may also conduct operational-level combined arms<br />

breaching. As previously mentioned in chapter 6, significant engineer augmentation from EAB is required<br />

to enable a BCT breach or a battalion TF hasty or deliberate breach. Depending on the size of the<br />

assaulting force, number of lanes required, and addition of the appropriate redundancy in reduction assets<br />

the necessary engineer augmentation may include additional Sapper companies, a MAC, or a combat<br />

engineer battalion.<br />

PLANNING<br />

C-7. Successful breaching operations are characterized by applying breaching tenets (see table C-1).<br />

These tenets should be applied when an obstacle is encountered in the AO during an attack or route<br />

clearance operation (see table C-1). The tenets are—<br />

C-2 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!