Breeching Fundamentals-Method of Entry D-24.

Once the point of breach has been identified, the reduction element leader continues to assemble and analyze all available information, data, and intelligence pertaining to the target structure. This involves a detailed examination of each point of breach's design, construction, and material makeup to determine the best primary, secondary, and tertiary breaching method. Again, tactics to be employed may dictate or rule out specific entry points. Obstacle Intelligence D-25. Collecting the following OBSTINTEL is critical during MOUT: ■What type of mission is it? ■Are drawings or blueprints of the structure available? ■Are photographs of the point of breach and adjacent structures available? ■Can R&S personnel give a detailed description of the point of breach? ■Can counterintelligence personnel provide any information? ■Are there any human intelligence sources (agents, friendly forces, evacuees, prisoners, tourists, workers, businessmen, travelers) that can provide information relating to the point of breach? ■What type of shielding is available at potential breach points (natural or man-made)? ■How close will the assault force be positioned to the breach points?

■Do drawings of the target (if available) include gas, power lines, and other similar hazards? ■Is there a history of booby-trap use? ■Will the weather affect charge adhesion methods? Breaching Fundamentals D-26. The proper application of the following breaching fundamentals is essential to ensure success in breaching conducted during MOUT. As with other breaching tenets, the breaching fundamentals are normally applied differently in urbanized terrain than in open terrain. ■Suppression . Maneuvering to achieve suppression of the enemy will be decentralized. Therefore, the ability to use indirect fires will be restricted due to the close proximity of friendly and enemy forces and civilians. ■Obscure . The potential for degrading friendly-force operations with obscurants is greater due to the close-in fighting that occurs in built-up terrain. Hand-emplaced smoke will likely be the most effective. ■Secure . Breach and clearing teams secure a foothold near the point of breach. Local security must consider all possible locations for the enemy to hide. ■Reduce . Redundant systems are critical during MOUT. The reduction element is responsible for preparing equipment/charges for emplacement, searching for improvised explosive devices (IEDs), and verifying target intelligence.

■Assault . The actual attack of the objective using close-quarters battle techniques should be conducted according to the assault plan. The unit should be prepared to conduct additional planned and unplanned breaches.

Sign up to vote on this title
UsefulNot useful