You are on page 1of 1

Figure 10-4. Notional Illustration of Platoon Task Organization for Breaching.

Synchronization. Breaching operations are one of the most complex operations conducted
by infantry units. The commander synchronizes complex breaching operations through
detailed reverse planning, clear instructions to subordinate elements, effective command and
control, and extensive rehearsals. Using reverse planning methodology, commanders consider
the following factors.

Actions on the Objective. The planned actions on the objective influence the size and
composition of the assault force and the number and location of lanes required from the
breach force.

Breach Requirements. Lane requirements, topography, and the types of obstacles are factors
in determining the type and number of reduction assets required by the breach force.

Breach Site Security. The ability of the enemy to interfere with the breach determines
whether fires, force, or both secure the breach site.

Suppression Requirements. The enemy’s ability to mass fires at the breach site dictates the
nature and length of required suppressive fires.

Types of Breaches. There are three general types of breaches: deliberate, hasty, and covert.

Deliberate Breach. A deliberate breach is the creation of a lane through an obstacle or a clear
route through a barrier or fortification which is systematically planned and carried out. A
deliberate breach is used against a strong defense or complex obstacle system. It is similar to a

194

You might also like