09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix C<br />

� Enemy direct-fire systems that cannot be effectively observed and suppressed by the support<br />

force due to the terrain or masking of support force fires by the breach force as it moves forward<br />

to reduce the obstacle.<br />

� Counterattacking or repositioning forces that cannot be engaged by the support force.<br />

C-15. The breach force employs vehicle-mounted smoke systems and smoke pots, if necessary, for<br />

self-defense and to cover lanes while the assault force is passing. Smoke may also be provided by indirectfire<br />

systems. The breach force secures itself from dismounted threat forces that are providing close-in<br />

protection of the obstacle. The breach force also secures the lanes through the tactical obstacles (once they<br />

are created) to allow safe passage of the assault force. The breach force assaults through the point of breach<br />

to the obstacle farside and seizes the reduction area. The breach force is comprised of the following<br />

subordinate elements—<br />

� Security element. The security element is comprised primarily of maneuver forces. It is<br />

normally responsible for providing additional suppression, obscuration, and local security.<br />

� Reduction element. The reduction element is comprised primarily of reduction assets<br />

(mine-clearing blades [MCBs]; MICLICs; armored, vehicle-launched bridges [AVLBs]; ACEs;<br />

dismounted engineers). Assets are allocated based on the number of lanes required (one lane for<br />

each assaulting company or two lanes for a battalion-size TF), terrain, and type of obstacle.<br />

C-16. The breach force must be able to deploy and begin reducing the obstacle as soon as enemy fires<br />

have been suppressed and effective obscuration is achieved. It can expect enemy artillery fires within a<br />

matter of minutes. CFZs should be activated at the point of breach before the commitment of the breach<br />

force. Engineers within the breach force are allocated with the reduction assets necessary to clear mines,<br />

EHs, nonexplosive obstacles, and small gaps. Scouts, engineers, or other reconnaissance assets are also<br />

capable of finding local bypasses or existing lanes in the obstacle system. The commander should plan for<br />

a 50 percent loss of mobility assets in close combat. As a planning factor, one engineer platoon with the<br />

necessary reduction assets should be allocated to create and mark one lane. After the breach force has<br />

reduced the obstacle and passed the assault force through, the breach force may be required to hand over<br />

the lane to follow-on units. At a minimum, the lanes must be marked and their locations and conditions<br />

reported to higher headquarters and follow-on units as prescribed in the unit SOP.<br />

Assault Force<br />

C-17. The primary mission of the assault force is to destroy the enemy and seize terrain on the obstacle<br />

farside to prevent the enemy from placing direct fires on created lanes. The assault force may be tasked to<br />

assist the support force with suppression while the breach force reduces the obstacle. The assault force<br />

must be sufficient in size to seize the POP. Combat power is allocated to the assault force to achieve a<br />

minimum 3:1 ratio on the POP. In a breaching operation, particularly TF and above, the assault force<br />

normally maneuvers as a separate force when attacking through a reduced obstacle. However, breach and<br />

assault assets may maneuver as a single force when conducting lower-level breaching operations<br />

(independent company team conducting an attack). If the obstacle is defended by a small enemy force,<br />

assault and breach force missions may be combined. This simplifies C2 and provides more immediate<br />

combat power for security and suppression. Fire control measures are essential, since support and breach<br />

forces may be firing on the enemy when the assault force is committed. The suppression of over watching<br />

enemy positions must continue and other enemy forces must remain fixed by fires until the enemy has been<br />

destroyed. The assault force must assume control for direct fires on the assault objective as support and<br />

breach force fires are lifted or shifted.<br />

MASSED COMBAT POWER<br />

C-18. Breaching is conducted by rapidly applying concentrated efforts at a point to reduce the obstacle and<br />

penetrate the defense. Massed combat power is directed against the enemy weakness. The location selected<br />

for breaching depends largely on enemy weakness, where its covering fires are minimized. If friendly<br />

forces cannot find a natural weakness, they create one by fixing most of the enemy force and isolating a<br />

small portion of it for attack. Denying the enemy’s ability to mass combat power against the breach is<br />

C-6 <strong>FM</strong> 3-<strong>34.22</strong> 11 February 2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!