FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Appendix C<br />
characterized by using stealth to reduce obstacles, with support and assault forces executing<br />
their mission only if reduction is detected. Covert breaches are usually conducted during periods<br />
of limited visibility.<br />
C-3. The breach area is the area where a breaching operation occurs. It is established and fully defined<br />
by the higher headquarters of the unit conducting breaching operations. (<strong>FM</strong> 3-34.2) The area must be<br />
large enough to allow the attacking unit to deploy its support force and extend far enough on the obstacle<br />
farside to allow follow-on forces to deploy before leaving the breach area. One technique is to establish the<br />
breach area using phase lines (PLs) or unit boundaries. The PL defining the breach area farside may be<br />
established as a battle handover line (BHL).<br />
C-4. The reduction area is a number of adjacent points of breach that are under the control of the<br />
breaching commander (see <strong>FM</strong> 3-34.2). The commander conducting the attack determines the size and<br />
location of the reduction area that supports the seizure of a POP. (See figure C-1.)<br />
Figure C-1. Reduction area, breach area, and point of breach<br />
C-5. A breaching operation includes the reduction of minefields and other EHs and obstacles. Reduction<br />
is the creation of lanes through or over the obstacle to allow the attacking force to pass. The number and<br />
width of lanes varies with the enemy situation, size and composition of the assault force, and scheme of<br />
maneuver. The lanes must allow the assault force to rapidly pass through the obstacle. Breaching is a<br />
mobility operation planned for within the overall framework of assured mobility. Heavily reliant on<br />
reconnaissance, it generally requires significant engineering support to accomplish.<br />
C-6. Most combined arms breaching operations are conducted by a BCT or its subordinate battalion TF<br />
elements as a tactical operation, but higher headquarters may also conduct operational-level combined arms<br />
breaching. As previously mentioned in chapter 6, significant engineer augmentation from EAB is required<br />
to enable a BCT breach or a battalion TF hasty or deliberate breach. Depending on the size of the<br />
assaulting force, number of lanes required, and addition of the appropriate redundancy in reduction assets<br />
the necessary engineer augmentation may include additional Sapper companies, a MAC, or a combat<br />
engineer battalion.<br />
PLANNING<br />
C-7. Successful breaching operations are characterized by applying breaching tenets (see table C-1).<br />
These tenets should be applied when an obstacle is encountered in the AO during an attack or route<br />
clearance operation (see table C-1). The tenets are—<br />
C-2 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009