VIEW THE MOBILE VERSION of www.militarytraining.ca Informational Site Network Informational
Privacy
    Home - Military Training Articles - Categories - Manuals - Secret Service - Sea Operations

Military Training Articles

The Revenge Of The Gnomes
The Fairies decided to give a party one night, and i...

Transportation
Organization commanders are responsible for all unaut...

Fourth Movement Column Right
Being in column of squads, to change direction: 1. Co...

The Land Forces Of The United States
You now are, or expect to become, a member of the lan...

Fill Magazine
Take the position of load, if not already there, open t...

Orianna
Bunny White, one night when the Fairies were holding...

Loadings And Firings
The commands for loading and firing are the same whet...

The Tell-tale Goblin
Once upon a time there was a Little Fairy who loved ...

Examples
Suppose the company to be in line. In executing: ...

Conduct Of The Patrol
In communicating with each other for ordinary purpose...





Advantages Of The Attack





(1) You can elect the point of attack while the defender must be
prepared to resist at all points.

(2) The fact that you are advancing in spite of the defender's fire
stimulates you and depresses the enemy.

(3) You leave your dead behind while the defender must fight among his
fallen comrades, which is demoralizing.

(4) You usually are conscious of the fact that you have more men on your
side than the defender. You have more rifles on the line than the
enemy.

(5) Your fire is usually more efficacious than that of your opponent
because it is usually converging while his is diverging.

These advantages alone will not necessarily insure success, but fire
superiority, if gained and maintained, does insure success. By gaining
and maintaining fire superiority you remove all doubt as to the final
outcome of the attack.





Next: Different Kinds Of Attack

Previous: The Theory Of Attack



Add to del.icio.us Add to Reddit Add to Digg Add to Del.icio.us Add to Google Add to Twitter Add to Stumble Upon
Add to Informational Site Network
Report
Privacy
SHAREADD TO EBOOK