FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
PREPARATION<br />
Combined Arms Breaching Operations<br />
C-22. Intelligence collection continues throughout the preparations for a breaching operation. As<br />
intelligence reports are received, the SITEMP and ISR plan are updated and revised. Intelligence reports<br />
are also used to refine the task organization of support, breach, and assault forces and the scheme of<br />
maneuver (proposed points of breach and target grids for smoke and suppressive fires). Updated<br />
intelligence information is also used during combined arms rehearsals.<br />
C-23. A unit meticulously plans, manages, and controls breaching rehearsals. Time is allocated to each<br />
unit to perform combined arms rehearsals. A rehearsal site should reflect the actual obstacle system in as<br />
much detail as possible. Friendly forces choose terrain similar to the operational area and construct a<br />
practice obstacle system based on OBSTINTEL. At a minimum, rehearsals should include a leader and key<br />
personnel walk-through and individual rehearsals by support, breach, and assault forces. As time permits,<br />
conduct as many full-scale rehearsals as possible. When possible, friendly forces rehearse the operation<br />
under the same conditions (operational environment, obscuration and darkness) expected during the actual<br />
mission. Rehearsals should also include contingencies such as enemy counterattacks and attacks by enemy<br />
indirect-fire systems (artillery, rockets, attack helicopters, other air assets, and enemy use of CBRNE). If<br />
updates become available after the last possible rehearsal, the information should be immediately passed on<br />
to affected elements.<br />
EXECUTION<br />
C-24. Each element of the breaching organization must accomplish its assigned tasks for a breaching<br />
operation to be successful. Additionally, the entire force must be flexible when responding to changes in<br />
the plan. Some changes might be—<br />
� Allocating additional assets to the support force due to attrition.<br />
� Changing the location of the POP.<br />
� Modifying the scheme of reduction and changing the order of the units passing through the<br />
created lane.<br />
C-25. All units must continually update the commander during mission execution. A critical phase of a<br />
breaching operation is the movement of the support force from the LD to its SBF positions. The support<br />
force must be prepared to maneuver to its SBF positions. Additionally, the support force must plan for the<br />
enemy use of SCATMINEs along its axis of advance, which may require it to conduct a breaching<br />
operation. After the support force has occupied its SBF positions and the commitment criteria of the breach<br />
force have been met (achieved necessary suppression and obscuration), the breaching commander should<br />
order the breach force to begin reduction. As the breach force commander maneuvers the force to the point<br />
of breach, he must always remain cognizant of his relationship to the support force to ensure that he does<br />
not unnecessarily mask their fires. Actions by the assault force at an assault position may include—<br />
� Verifying current friendly and enemy situations using tactical reports from company teams or<br />
support forces.<br />
� Issuing FRAGOs and disseminating information to the lowest level.<br />
� Confirming target reference points (TRPs) and direct-fire responsibilities.<br />
� Positioning artillery observers.<br />
� Conducting final prepare-to-fire checks.<br />
� Reorganizing to compensate for combat losses.<br />
C-26. The breach force commander should lead with the security element to allow it to establish nearside<br />
security before the reduction element arrives at the obstacle. As the security element occupies its position,<br />
the reduction element commander should conduct a reconnaissance to acquire obstacle information and<br />
quickly confirm or refine the scheme of reduction. As the reduction element commander brings the element<br />
forward, the exact location where the obstacle will be reduced and the estimated time to reduce, proof, and<br />
mark the obstacle is reported. At the same time, the breach force commander must assess the effectiveness<br />
of the suppression and determine if and how to augment support force fires.<br />
11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> C-9