FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Appendix C<br />
Mass<br />
Table C-1. Breaching tenets (continued)<br />
Breaching Tenets Actions<br />
Synchronization<br />
INTELLIGENCE<br />
� Plan the point of breach where the enemy defense is the weakest.<br />
� Mass combat power to create enemy weakness at the point of breach.<br />
� Conduct detailed reverse planning.<br />
� Communicate clear subunit instructions.<br />
� Provide effective C2.<br />
� Perform combined arms rehearsals.<br />
C-8. During IPB, the situation template (SITEMP) is developed to graphically depict enemy expected<br />
disposition based on threat doctrine and the effects of the AO for a particular COA. The ENCOORD<br />
creates a template of enemy obstacles on the SITEMP based on enemy countermobility capabilities<br />
(manpower, equipment, materials, and time available), terrain, and the range of enemy weapon systems.<br />
Any unknowns about the enemy obstacle effort become IRs and are integrated into the ISR plan to<br />
generate OBSTINTEL. OBSTINTEL validates the template of obstacles and leads to refined maneuver and<br />
breach planning. Utilizing engineers in the reconnaissance effort can improve the specificity of the obstacle<br />
information being collected. Examples of obstacle-related IR include the—<br />
� Capability and location of enemy SCATMINE systems.<br />
� Location of existing and reinforcing obstacles.<br />
� Orientation and depth of obstacles.<br />
� Soil conditions (in the case of a minefield) to determine the ability to use tank plows.<br />
� Wire presence, location, and type.<br />
� Lane and bypass information.<br />
� Minefield composition (buried or surface-laid antitank [AT] or antipersonnel [AP] mines,<br />
antihandling devices [AHDs], and depth of mines).<br />
� Types of mines and fuses.<br />
� Composition of complex obstacles.<br />
� Areas between successive obstacle belts.<br />
FUNDAMENTALS<br />
C-9. The five breaching fundamentals (SOSRA) must be applied to ensure success when breaching<br />
against a defending enemy. These fundamentals always apply, but may vary based on mission variables in<br />
the AO.<br />
ORGANIZATION<br />
C-10. A commander organizes friendly forces to accomplish the breaching fundamentals quickly and<br />
effectively. Table C-2 shows the relationship between the breaching organization and breaching<br />
fundamentals. The commander organizes the following three forces to conduct breaching operations:<br />
� Support force.<br />
� Breach force.<br />
� Assault force.<br />
C-11. Planners use reverse planning to determine the forces and assets needed to conduct breaching<br />
operations and to ensure that actions on the objective are effectively resourced with the necessary<br />
breaching assets. Reverse planning starts with actions on the objective and works backward to the LD. The<br />
following apply to reverse planning:<br />
� The actions on the objective drive the size and composition of the assaulting force.<br />
� The size of the assaulting force determines the required number and location of lanes.<br />
C-4 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009