An
Infantryman’s
Guide to Combat
in Built-Up*FM 96-198-1
FIELD MANUAL HEADQUARTERS
No. 99-10-1 DEPARTMENT OF THE ARMY
Washington, DC, 12 May 1993
AN INFANTRYMAN’S GUIDE TO
COMBAT IN BUILT-UP AREAS
CONTENTS
Page
Preface... .. 2.0.00. bec e cee
Chapter 1. INTRODUCTION . .
Section I. Background
4-1. AirLand Battle
1-2. Definitions
1-3. Cities
1-4. The Threat in Built-Up Areas.
Section II. Characteristics and Categories of Built UpA Areas
1-5. Characteristics. . nn
1-6. Categories
Section IIL. Special Considerations
1-7, Battles in Built-Up Areas 215
1-8. Target Engagement ... 15
1-9. Small-Unit Battles... . . 15
1-10, Munitions and Special Equipment. +16
1-11. Communications . 16
1-12. Stress
1-13. Restrictions . . . oa
1-14. Fratricide Avoidance
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
*This publication supersedes FM 90-10-1, 30 September 1982.FM 90-10-1
Chapter 2. URBAN ANALYSIS
Section I. Models of Built-Up Areas
2-1. Regional Urban Characteristics ss
2-2, Specific Characteristics of Urban Areas . .
2-3. Characteristics of Urban Areas. . .
Sectionll.Terrain and Weather Analysis
2-4, Special Terrain Considerations
2-5. Special Weather Considerations :
Section III. Threat Evaluation and Integration
2.6. Operational Factors. 22.0.0... 2. +.
2-7. Urban Countrinsurgency Covntergueril,
and Counterterrorist Operations . .
2-8. Projected Threat Capabilities . .. .
Chapter 3. OFFENSIVE OPERATIONS
Section I. Offensive Considerations .......
3:1. Reasons for Attacking Built-Up Areas
3-2, Reasons for Not Attacking a Built-Up Area
Section II. Characteristics of Offensive Operations in a Bui
3-3. Troop Requirements
3-4,Maneuver ......
3-5. Use of Equipment .
Section IIL. Types of Offensive Operations sees
3-6. Hasty Attack oe eee
3-7, Deliberate Attack .....
Section [V. METT-T Factors
3-8. Mission
3-9, Enemy
3-10. Terrain
3-11. Troops
3-12. Time
Section V. Command and 4 Control
3-13. Command oe
3-14.Control 6... eee eee
Section VI. Battalion Task Force Attack on a Built “UPA Area
3-15. Conduct of Deliberate Attack . . .
3-16. Seizure of Key Objective . .
3-17, Infiltration . os
3-18. Route Security