09.01.2013 Views

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

FM 3-34.22 - Army Electronic Publications & Forms - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PREPARATION<br />

Combined Arms Breaching Operations<br />

C-22. Intelligence collection continues throughout the preparations for a breaching operation. As<br />

intelligence reports are received, the SITEMP and ISR plan are updated and revised. Intelligence reports<br />

are also used to refine the task organization of support, breach, and assault forces and the scheme of<br />

maneuver (proposed points of breach and target grids for smoke and suppressive fires). Updated<br />

intelligence information is also used during combined arms rehearsals.<br />

C-23. A unit meticulously plans, manages, and controls breaching rehearsals. Time is allocated to each<br />

unit to perform combined arms rehearsals. A rehearsal site should reflect the actual obstacle system in as<br />

much detail as possible. Friendly forces choose terrain similar to the operational area and construct a<br />

practice obstacle system based on OBSTINTEL. At a minimum, rehearsals should include a leader and key<br />

personnel walk-through and individual rehearsals by support, breach, and assault forces. As time permits,<br />

conduct as many full-scale rehearsals as possible. When possible, friendly forces rehearse the operation<br />

under the same conditions (operational environment, obscuration and darkness) expected during the actual<br />

mission. Rehearsals should also include contingencies such as enemy counterattacks and attacks by enemy<br />

indirect-fire systems (artillery, rockets, attack helicopters, other air assets, and enemy use of CBRNE). If<br />

updates become available after the last possible rehearsal, the information should be immediately passed on<br />

to affected elements.<br />

EXECUTION<br />

C-24. Each element of the breaching organization must accomplish its assigned tasks for a breaching<br />

operation to be successful. Additionally, the entire force must be flexible when responding to changes in<br />

the plan. Some changes might be—<br />

� Allocating additional assets to the support force due to attrition.<br />

� Changing the location of the POP.<br />

� Modifying the scheme of reduction and changing the order of the units passing through the<br />

created lane.<br />

C-25. All units must continually update the commander during mission execution. A critical phase of a<br />

breaching operation is the movement of the support force from the LD to its SBF positions. The support<br />

force must be prepared to maneuver to its SBF positions. Additionally, the support force must plan for the<br />

enemy use of SCATMINEs along its axis of advance, which may require it to conduct a breaching<br />

operation. After the support force has occupied its SBF positions and the commitment criteria of the breach<br />

force have been met (achieved necessary suppression and obscuration), the breaching commander should<br />

order the breach force to begin reduction. As the breach force commander maneuvers the force to the point<br />

of breach, he must always remain cognizant of his relationship to the support force to ensure that he does<br />

not unnecessarily mask their fires. Actions by the assault force at an assault position may include—<br />

� Verifying current friendly and enemy situations using tactical reports from company teams or<br />

support forces.<br />

� Issuing FRAGOs and disseminating information to the lowest level.<br />

� Confirming target reference points (TRPs) and direct-fire responsibilities.<br />

� Positioning artillery observers.<br />

� Conducting final prepare-to-fire checks.<br />

� Reorganizing to compensate for combat losses.<br />

C-26. The breach force commander should lead with the security element to allow it to establish nearside<br />

security before the reduction element arrives at the obstacle. As the security element occupies its position,<br />

the reduction element commander should conduct a reconnaissance to acquire obstacle information and<br />

quickly confirm or refine the scheme of reduction. As the reduction element commander brings the element<br />

forward, the exact location where the obstacle will be reduced and the estimated time to reduce, proof, and<br />

mark the obstacle is reported. At the same time, the breach force commander must assess the effectiveness<br />

of the suppression and determine if and how to augment support force fires.<br />

11 February 2009 <strong>FM</strong> 3-<strong>34.22</strong> C-9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!