09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Combined Arms Breaching Operations<br />

� The lane requirements and type of obstacle drive the amount and type of mobility assets task<br />

organized to the breach force.<br />

� The SITEMP depicting enemy direct-and-indirect fire coverage of predicted enemy obstacles<br />

determines the size and composition of the breach force security element and the support force.<br />

Table C-2. Relationship between breaching organization and breaching fundamentals<br />

Breaching<br />

Organization<br />

Support force<br />

Breach force<br />

Assault force<br />

Support Force<br />

Suppress<br />

Obscure<br />

Breaching<br />

Fundamentals<br />

Suppress (provides additional<br />

suppression)<br />

Obscure (provides additional<br />

obscuration in the reduction area)<br />

Secure (provides local security)<br />

Reduce<br />

Assault<br />

Suppress (if necessary)<br />

Responsibilities<br />

� Suppress enemy direct-fire systems covering the<br />

reduction area.<br />

� Control obscuring smoke.<br />

� Prevent enemy forces from repositioning or<br />

counterattacking to place direct fires on the breach<br />

force.<br />

� Create and mark the necessary lanes in an<br />

obstacle.<br />

� Secure the obstacle nearside and farside.<br />

� Defeat forces that can place immediate direct fires<br />

on the reduction area.<br />

� Report the lane status and location.<br />

� Destroy the enemy on the obstacle farside that is<br />

capable of placing direct fires on the reduction<br />

area.<br />

� Assist the support force with suppression if the<br />

enemy is not effectively suppressed.<br />

� Be prepared to breach follow-on and/or protective<br />

obstacles after passing through the reduction<br />

area.<br />

C-12. The primary responsibility of the support force is to eliminate the enemy’s ability to interfere with a<br />

breaching operation. The commander must allocate enough direct- and indirect-fire systems to the support<br />

force to allow it to accomplish its missions. The support force must—<br />

� Isolate the reduction area with fires.<br />

� Mass and control direct and indirect fires to suppress the enemy and neutralize any weapons that<br />

are able to bring fires on the breach force.<br />

� Control obscuring smoke to prevent enemy-observed direct and indirect fires.<br />

C-13. The support force must seize a support by fire (SBF) position, seeking maximum protection from the<br />

terrain. To increase the survivability of the support force, the commander may establish CFZs for the<br />

support force once it has occupied its SBF positions. If possible, the support force should follow a covered<br />

or concealed route to the SBF position, take up its assigned sectors of fire and observation, and begin to<br />

engage the enemy. It may have to make some adjustments to its direct-fire plan if the situation dictates.<br />

Observation is particularly critical. Artillery observers with the support force may initially bring indirect<br />

fires on enemy positions to fix and suppress the enemy. The support force adjusts the artillery-delivered<br />

obscuring smoke, if necessary, to protect the breach and assault forces as they approach the reduction area.<br />

Breach Force<br />

C-14. The primary mission of the breach force is to reduce the obstacle. The breach force assists in the<br />

passage of the assault force by creating, proofing, and marking lanes. It is a combined arms force and<br />

includes engineers, reduction assets, and enough maneuver forces to provide additional suppression and<br />

local security. The breach force must be allocated enough maneuver forces to provide additional<br />

suppression against various threats, including—<br />

11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> C-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!