ATP-5-0-2-1 Staff Reference Guide Volume 1 Download
Page 177 of 440
Offensive Tactics, Techniques, Procedures, and Considerations 07 December 2020 ATP 5-0.2-1 161 Planning Considerations A-15. Planning for breaching activities usually follows the military decision making process. Table A-4 on pages 161–162 shows the steps of the MDMP along with breach planning considerations for each step. Table A-4. Breach planning considerations in the military decision-making process Steps of the MDMP Breach planning considerations Receipt of mission • Gather geospatial information and products (mobility corridors and combined obstacle overlays) for the AO. • Gather intelligence products on threat countermobility capabilities and patterns. • Determine the availability of obstacle information. • Update running estimates (status of breaching assets). Mission analysis • Understand the unit mission, commander’s intent, and scheme of maneuver (two levels up). • Complete the following as part of the initial IPB— Develop terrain products (mobility corridor and combined obstacle overlay). Evaluate the effects of terrain and weather on friendly mobility and enemy countermobility and survivability capabilities. Assess enemy countermobility capabilities (manpower, equipment, and materials), and template enemy obstacles based on threat patterns, terrain, and time available. • Identify specified and implied breaching tasks and determine any obvious shortfalls in breaching assets, engineer forces, and special equipment and initiate requests for augmentation as early as possible. • Develop information requirements related to breaching (terrain restrictions and mobility restraints, necessary or desired obstacle information, enemy countermobility and survivability capabilities), and recommend draft requirements as possible CCIRs. • Integrate information collection tasks and engineer or other necessary specialized reconnaissance capabilities into the information collection plan. COA development • Identify the need to conduct a breach for each COA based on mobility corridors and template enemy obstacles. • Allocate reduction assets (engineer units and breaching equipment) based on the results of reverse planning. • Develop tasks that implement the breaching fundamentals (SOSRA). • Determine breach organization requirements (support, breach, assault force) and ensure that arrayed forces have been adequately resourced. COA analysis • Analyze the breach organization— Force ratios against variances in the enemy disposition. Array of breach assets based on losses or variances in the composition of obstacles. • Analyze changes in the planned point of breach, locations of SBF positions, and wind effects on obscuration. • Analyze friendly reactions to enemy counterattacks within the breach area and enemy use of scatterable mines to isolate forces and repair breached obstacles. • Analyze the task organization changes that are required for the breach and insure that all units have enough time to safely update their command relationships and locations in preparation for the breach. • Refine the plan based on results of COA analysis.