Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Breeching Fundamentals

Breeching Fundamentals

|Views: 11|Likes:
Published by TemplarKnight56
Breeching Fundamentals during tactical Assault
Breeching Fundamentals during tactical Assault

More info:

Published by: TemplarKnight56 on Mar 15, 2014
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Breeching Fundamentals-Method of Entry
D-24. Once the point of breach has been identified, the reduction element leader continues to assemble and analyze all available information, data, and intelligence pertaining to the target structure. This involves a detailed examination of each point of breach's design, construction, and material makeup to determine the best primary, secondary, and tertiary breaching method. Again, tactics to be employed may dictate or rule out specific entry points.
Obstacle Intelligence
D-25. Collecting the following OBSTINTEL is critical during MOUT:
What type of mission is it?
Are drawings or blueprints of the structure available?
Are photographs of the point of breach and adjacent structures available?
Can R&S personnel give a detailed description of the point of breach?
Can counterintelligence personnel provide any information?
Are there any human intelligence sources (agents, friendly forces, evacuees, prisoners, tourists, workers, businessmen, travelers) that can provide information relating to the point of breach?
What type of shielding is available at potential breach points (natural or man-made)?
How close will the assault force be positioned to the breach points?
Do drawings of the target (if available) include gas, power lines, and other similar hazards?
Is there a history of booby-trap use?
Will the weather affect charge adhesion methods?
Breaching Fundamentals
D-26. The proper application of the following breaching fundamentals is essential to ensure success in breaching conducted during MOUT. As with other breaching tenets, the breaching fundamentals are normally applied differently in urbanized terrain than in open terrain.
 . Maneuvering to achieve suppression of the enemy will be decentralized. Therefore, the ability to use indirect fires will be restricted due to the close proximity of friendly and enemy forces and civilians.
 . The potential for degrading friendly-force operations with obscurants is greater due to the close-in fighting that occurs in built-up terrain. Hand-emplaced smoke will likely be the most effective.
. Breach and clearing teams secure a foothold near the point of breach. Local security must consider all possible locations for the enemy to hide.
 . Redundant systems are critical during MOUT. The reduction element is responsible for preparing equipment/charges for emplacement, searching for improvised explosive devices (IEDs), and verifying target intelligence.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->