Saturday, February 14, 2015

Modern Guerrilla Warfare














Guerrilla Warfare

Unconventional Warfare

Asymmetrical Warfare

Partisan Warfare

Resistance


Introduction
This document is simply an accumulation of notes on strategy, tactics, and techniques used by different sources from all over the world. These sources include national armies, guerrilla armies, mercenaries, spy agencies, assassins, thieves, etc. This document was written with the defense of a small nation or a guerrilla army in mind. Most of the strategies and tactics have been used successfully throughout the years, while some are simply ideas or theories.

I will try to add as many pictures as possible to make my point. I will also try to add as much information on sources and actual usage in history as I can as well.

Also keep in mind that many intelligence agencies monitor internet activity and Google related sites such as Blogger and Youtube have been linked to the U.S. National Security Agency (NSA). This document was created for informational purposes.



Anti-Imperialist
Anti-Colonialist


Click on the links and scroll down to find the particular section of interest.

Sections
Strategy (Includes conventional and unconventional strategies)

Tactics (Including sections on Ambushing, Sabotage, Urban combat, Camouflage, Infiltration, Inducing Fratricide, etc)

Artillery Tactics

Guerrilla Air Force (Unconventional Air Force)

Guerrilla Navy (Unconventional Navy)

Techniques

Roadside Bombs

Assassination (Assassins, Military Assassins, Hitmen, etc.)

Espionage

Booby Traps

Undermining

Sniping

Mining

Caching

Smuggling (Smuggling by land, air and sea)

Military Vehicle Stealing and Commandeering

Engineering 

Guerrilla Special Forces (Sappers, Naval Special Forces and the use of special "anti" units)

Support Units (Includes Medical units, Transportation units, etc.)

Guerrilla Logistics

Military Desertion

Propaganda

Government (Includes information on a Guerrilla Government or Secret Government, and a Shadow Government or the Continuity of Government)

Improvised Weapons

Improvised Equipment

Dual Use Equipment







Wednesday, February 11, 2015

Strategy




Strategy




"Warfare is based upon deception."
-Sun Tzu

"When able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near."
-Sun Tzu

"Hold out baits and entice the enemy. Feign disorder, and crush him."
-Sun Tzu

"So in war, the way is to avoid what is strong and strike what is weak."
-Sun Tzu

"If my enemy doesn't know where I am going to attack he is forced to prepare everywhere. Forced to prepare everywhere he is strong nowhere."
-Sun Tzu

"Turn the imperialist war into a civil war"
-Lenin





The 36 Strategems of Ancient China

1. Fool the Emperor to Cross the Sea
2. Besiege Wei to Rescue Zhao
3. Kill With a Borrowed Sword
4. Await the Exhausted Enemy At Your Ease
5. Loot a Burning Building
6. Make a Noise in the East, and Strike in the West
7. Create Something From Nothing
8. Openly Repair the Walkway, Secretly March to Chanan
9. Observe the Fire on the Opposite Shore
10. Hide the Dagger Behind a Smile
11. Let the Plum Tree Wither in Place of the Peach
12. Seize the Opportunity to Lead the Sheep Away
13. Beat the Grass to Startle the Snake
14. Borrow a Corpse to Raise the Spirit
15. Lure the Tiger Down the Mountain
16. To Catch Something, First Let It Go
17. Toss Out a Brick to Attract Jade
18. To Catch the Bandit First Capture Their Leader
19. Steal Fire Wood From Under the Pot
20. Trouble the Water to Catch the Fish
21. Shed Your Skin Like the Golden Cicada
22. Shut the Door to Catch a Thief
23. Befriend a Distant Enemy to Attack a Nearby Enemy
24. Borrow the Road to Conquer Guo
25. Replace the Beams With Rotten Timbers
26. Point At the Mulberry Tree, But Curse the Locust Tree
27. Feign Madness, But Keep Your Balance
28. Lure Your Enemy Onto the Roof, Then Take the Ladder
29. Deck the Dead Tree With Silk Blossoms
30. Exchange the Role of Guest for that of Host
31. The Strategy of Beautiful Women
32. The Strategy of Open Gates
33. The Strategy of Sowing Discord
34. The Strategy of Injuring Yourself
35. The Strategy of Combining Tactics
36. If All Else Fails...Retreat


Blitzkrieg ("Lightning War")
Relies upon rapid speed and force to quickly break through enemy lines. Uses combined arms of aircraft, vehicles, and infantry.
















Flanking Maneuver (Single Envelopment)

Pincer Movement (Double Envelopment)

Encirclement

Breakout

Breaking out of enemy encirclement

Guerrilla forces break down into smaller groups and sneak past enemy lines. Guerrilla forces reassemble at predesignated location.


Siege

Blockade

Land Blockade
Example:
Blockade of the Nepalese capital Kathmandu by the Communist party of Nepal (CPN) during the Civil War in Nepal. Highways and roads leading to the capital were frequently blocked by CPN supporters.

Sea Blockade



Guerrilla Blitzkrieg
Popular Revolt or Civil Uprising

At this stage the guerrillas should outnumber the enemy and should have the support of the masses. The entire population can then be mobilized to sweep the enemy out of the nation. Success depends on the support of the majority of the population. Offensive plans are made in advance. More conventional stage of warfare.
Speed and mobility are essential. Must have the ability to destroy a target and quickly move on to the next target.
Destroy everything belonging to the enemy that you cannot use.
All enemy businesses, factories, etc., should be destroyed or taken over.
Stay close to the enemy and engage in close combat.
Pockets of resistance should be bypassed by the main force and dealt with later by mop up forces that surround the enemy pocket and destroy them.
Possible military commanders and potential leaders and organizers among the enemy should be targeted for assassination.
Enemy vehicles are captured or commandeered and civilian vehicles are used for transportation.

Take fuel from gas stations or parked vehicles and keep moving.

Historical Examples:
FSLN forces capture Managua, the capital of Nicaragua in July of 1979
 
The 1968 Viet Cong Tet Offensive was actually a failed attempt at a popular uprising.
The French resistance uprising against German forces in Paris as the Allied forces advanced towards the city.
The Polish resistance uprising against German forces in Warsaw in 1944.




Quick strike guerrilla offensive such as an FLNC style "nuit bleu" or "Blue Night". This style of attack is more of an overnight Blitzkrieg. Multiple sites are attacked overnight.












Preemptive Strike (Conventional)
A surprise attack to prevent the enemy from launching a surprise attack on oneself or simply to attack the enemy before he can attack you. This is good to do during the enemy buildup of forces.



Preemptive Strike (Guerrilla)

Sympathizers in one nation attack an enemy during his buildup to invade another nation. Fire rockets, mortars, etc. at his staging areas and encampments. Use guerrilla tactics. If and when the enemy invades, the guerrillas continue to attack the enemy in the rear.

Examples:
08 OCT 2002- 2 U.S. marines are shot in Kuwait during a military exercise in preparation for the invasion of Iraq. One of the two marines later dies. The two gunmen that attacked them are martyred.

21 JAN 03- 2 more americans shot in Kuwait. 1 of them dies from wounds. Both were civilian contractors working for the U.S. military. Shot sitting in their SUV at a red light.

30 MAR 03- 13 U.S. soldiers are injured by an Arab contractor driving a truck in Kuwait. The driver purposely plowed into a crowd of soldiers at a camp PX.




Counter Attack







Strategic sabotage can paralyze entire armies.




Further Reading on Strategy:
The Art of War- Sun Tzu
The Book of Five Rings- Miyamoto Musashi





Guerrilla Warfare
Low Intensity Warfare

Strategy Used in Guerrilla War

“Our Strategy is one against ten. Our tactic is ten against one.”
-Mao Tse Tung

Mao's Three Stages of Guerrilla Warfare
1. Preparation and Organization. The establishment of guerrilla base areas.
2. Sabotage and Guerrilla Warfare phase.
3. Strategic Counter-Offensive. Conventional War phase including large unit and mobile warfare. The final phase places an emphasis on a popular uprising of the masses in conjunction with the liberation forces.

Must have a clear political objective.

Lack of numbers and technology can be made up for using special tactics, better knowledge of the land, deception and determination.

Harass and tie down the enemy and destroy the enemy's forces and supplies.

Fire off isolated shots, fire crackers, wooden clappers, etc. to harass the enemy and keep the enemy on edge

Do not attack strong positions

Do not fight an uphill battle.

Do not fight if the situation of the enemy is not clear.

Do not fight hard battles. If you are not one hundred percent certain of victory, do not fight.

Constant offensive action against enemy personnel and sensitive points, but only when the tactical advantage is on the side of the guerrillas.

In order to achieve a quick decision in battle, attack a moving enemy unit, not a stationary enemy. Concentrate a large force under cover and attack a smaller enemy unit along a route the enemy is sure to take.

Multiple guerrilla groups can be formed. These separate guerrilla groups have no real connection to one another other than a similar goal or agenda. If one group or cell is destroyed or captured, it does not effect the operations of the movement as a whole.


"Lure the enemy in deep."
In order to draw the enemy into a trap, or ambush, entice the enemy with something he wants. A strategic position, a decisive battle, a secret base, a guerrilla leader, sex, food, money, a downed pilot, sleep, the chance for fame and glory, etc., all could be used to entice the enemy into advancing using the Five Needs or the Five Weaknesses.



Protracted War
Patience is required while enduring protracted wars.
"Time works for us. Time will be our best strategist." -Truong Chinh


Resistance Movement


Revolutionary War
"Peoples War"

Political Strategy
Integrate political and military efforts.

The war should be waged on all fronts; diplomatically, ideologically, economically,
and militarily.

Total mobilization of the people by propaganda, motivational and organizational measures.

Intense indoctrination of both military and civilian personnel.

Political Action Among Enemy Military Forces
Subversion
Proselytizing
Propaganda to encourage desertion, defection, and to lower enemy morale. An example of this is to contribute to enemy deserters and draft dodgers.

Political Action Among the Enemy's Population
A total propaganda effort to sow discontent, defeatism, dissent, and disloyalty among the enemy population. This may involve the creation and/or manipulation of front groups and sympathizers. An example of this is to work among enemy media, activist, etc.

"Turn the imperialist war into a civil war!"
When an imperialist nation launches another war, the people of that imperialist nation are to rebel against the corrupt leadership and initiate a civil war.


Further Reading on Guerrilla Warfare:
On Guerrilla Warfare- Mao Zedong
Basic Tactics- Mao Zedong
150 Questions For A Guerrilla- General Alberto Bayo
Total Resistance- Major Hans von Dach
Minimanual of the Urban Guerrilla- Carlos Marighella
Guerrilla Warfare- Ernesto Guevara








Very Low Intensity Warfare

Ninjutsu


Heiho (Hei ho)- Strategy and tactics

Few in number, ninja attempt to influence outside forces in order to get a desired result. Intricate plans are made to get the enemy to do precisely what you want him to do. Intrigue.

One of the main goals in ninja strategy and planning is to remain undetected.


A strategy using espionage, sabotage and assassination as the main means of defeating an enemy.


Espionage
Sabotage
Assassination
Ambush
Psychological Warfare





The Five Needs
Security
Sex
Wealth
Pride
Pleasure

The Five Weaknesses
Laziness
Anger
Fear
Sympathy
Vanity


The use of modern day weapons and equipment.
The use of traditional ninja weapons.
Improvised traditional ninja weapons.


Organization and Structure
Jonin- "High Ninja"

Chunin- "Middle Ninja"

Genin- "Lower Ninja"





Further Reading on Ninjutsu:
The Way of the Ninja: Secret techniques- Masaaki Hatsumi
The Ninja and Their Secret Fighting Art- Stephen K. Hayes
Ninjutsu: History and Tradition- Masaaki Hatsumi
Tiger Scroll of the Koga Ninja- Jay Sensei







Section Omitted










Leaderless Resistance

Lone Wolf

Like minded individuals or groups with no real leadership or command structure fighting against a common enemy.







Monday, February 10, 2014

Military Desertion



Military Desertion 
Going AWOL (Absent Without Leave)


Entire military units may decide to desert and join the rebellion. 



It may only be a few military personnel who decide to desert and join the resistance. In this case the soldier or soldiers should find the right opportunity to abandon his unit and leave to join friendly forces. The soldiers should attempt to take all their weapons and equipment with them.

Friday, January 10, 2014

The Use of Assassins and Hitmen



Assassination
The words assassin and hitman can be used interchangeably throughout most of this text to demonstrate that the tactics and techniques used by both are the same, with the only real difference being that assassins usually kill for political or religious reasons while hitmen are professional killers that are hired for a monetary fee.




Create an Individual Assassin Training Program (IATP)


Planning (Mental or verbal planning only. Must never be written down or recorded.)
Execution
Cover Up (If necessary)






The organization creates a list of assassination candidates. Enemy leaders, politicians, military commanders, the leaders of paramilitary groups, etc. are all candidates.


The organization keeps the current where abouts, habits and any other information pertaining to each target on file. The assassin who is sent out, however, should observe the enemy for a while and memorize his everyday routine such as what time the target arrives home, what time he leaves for work, does he have any bodyguards, if so, how many? What weapons does he or his guards carry if any? At what point is the target the most isolated? Where would the best place be to kill the target? In the car? At a restaurant? Are there cameras around the house or office building? Where are the cameras located? What are the best routes of escape? All of this information should be memorized by the assassin. In case the assassin is captured or killed, no information about anything pertaining to the target, assassin, organization, etc. should be found.


The time when the target is alone and isolated may be the best opportunity to kill him and escape without any problems. If possible, always seek to isolate the target.





The assassin may choose to shave his head so as not to leave any hair. The less hair, the less the chance of any hair falling into the crime scene. Wigs, and fake mustaches or beards can be worn if necessary for disguise purposes.


Leather or rubber gloves can be worn so as not to leave finger prints.


An assassin may choose to put some type of covering over shoes so as not to leave any footprints or forensic evidence.


Throw away coveralls or a boiler suit can be worn so as not to leave any forensic evidence from clothing.


After a job the assassin can go to a safe house and hide out for a while. If possible, the assassin can take off and burn the clothes worn, and take a bath, being careful to scrub the hands thoroughly.


An assassin may find it more logical to remove his shoes or boots while creeping across certain types of floors or ground to make less noise.


An assassin on a bicycle or motorcycle can cut through traffic lanes and approach the target vehicle. Shooting the target with an automatic weapon or a sawed off shotgun at close range will do nicely. If the target was not isolated, a quick escape may be necessary. Motorcycles can reach high rates of speed in seconds. The use of motorcycles and bikes allows for the assassin to cut through lanes of traffic to make an escape as well. A secondary escape vehicle parked in a deserted alley or street may be used. If leaving the motorcycle behind, the license plate or the bike itself should be stolen, or the plates can be fake. This is done so that the motorcycle cannot be traced back to the assassin. The bike can also ride up into a box truck with a getaway driver at the wheel and escape. Motorcycle assassinations have been sucessfully carried out recently by guerrillas in Iraq and Afghanistan. Also featured in movies such as The Godfather III and New Jack City.


An assassin can creep up outside a targets home while he is taking a shower and blast him through the bathroom window. The sillouette of the target can be used since the actual tagret will be obscured by the the bathrooms frosted windows. A shotgun with a powerful and deadly scattering shot can be used. This method was used in Northern Ireland during the "Troubles" on at least one occasion. The gunman may choose to wear protective glasses to protect himself from flying glass. After the first blast and the glass is broken, the assassin may choose to at least partially lean inside the window and blast the target again to insure death.


Hit and run with a motor vehicle.


Cut brake line or drain the brake fluid from an enemy vehicle.



Cut the gas line on a targets gas stove a suitable time before the target gets home. The assassin sets up a firing position nearby. When the target enters the home, the assassin fires a rifle at some object creating a spark, causing the entire house to blow up.


No assassination instructions should ever be written or recorded.


The absolute death of the target should be certain. This is often done by shooting the target twice in the head.


The assassin can infiltrate unarmed and kill using weapons in the environment such as hammers, kitchen knives, pipes, rocks, sharp or blunt objects, etc.

The assassin may choose to remove or destroy the lights in the area in which he plans to isolate and kill the target ahead of time. Light bulbs in the area can be unscrewed, smashed, etc. Fuses can be intentional blown. Power can be shut off. 


Conference Room Technique

1. Gunman 1 enters the room quickly but quietly.
Gunman 2 stands in the doorway.


2. Gunman 2 opens fire first on the first subject to react, and in the same long burst, sprays across the entire group toward the center of mass. The burst is timed to empty the magazine at the end of the swing.
Gunman 1 covers the group to prevent any individual from making any dangerous reaction, and if neccessary, fires 3 round bursts at individuals.


3. Gunman 2 finishes his burst and commands "Shift!", dropping back toward the door. Repalces empty magazine. Covers the corridor.
Gunman 1 upon the command "shift", opens fire on the opposite side of the target, spraying one burst across the entire group.


4. Gunman 1 finishes his burst and commands "Shift!", drops back through the door. Replaces empty magazine. Covers the corridor.
Gunman 2 on command "Shift!", re-enters the room. Covers the groups killing any survivors with two round bursts, leaves propaganda.


5. Gunman 2 leaves the room and commands "Go!" Covers the rear with nearly full magazine.
Gunman 1 on command "Go!", leads the withdrawal, covering the front with a full magazine.












Assassins In The Military

Assassins can infiltrate enemy bases and facilities and target key enemy commanders and personnel.


Assassins can join the enemy’s military. These assassins can act as “sleepers”. When called upon they become active.


An assassin can stalk an enemy commander and wait for the right moment to strike.


An assassin can try to use his position, rank, identification, etc., to infiltrate the enemy’s headquarters or wait outside or nearby for the enemy commander or key personnel.


If possible, the assassin can kill using the weapons he has been issued as a soldier in the enemy’s army. Machine guns, rifles, pistols and hand grenades would be the most common weapons.

Examples:
During the 2003 U.S. invasion of Iraq, a Muslim soldier from the U.S. 82nd Airborne Division tossed a couple of hand grenades into a command tent. 

So-called “fragging” wasn't uncommon during the Vietnam War either. Numerous officers were killed when disgruntled soldiers threw fragmentation grenades at them.




Sometimes, standard issue military weapons can be worn in plain sight. If bearing weapons openly is not appropriate at the time, rifles can be broken down and hidden in bags. Pistols can be hidden in bags or tucked into the pants, perhaps in a holster. If small enough the pistol may be hidden in a pant leg pocket (cargo pocket) or under a hat. Silencers and scopes can be hidden in pant leg pockets as well. Grenades can be hidden in the same fashion. Explosives can be hidden in bags, canteens, etc.


The most brilliant enemy officers can be sought after first.


On the battlefield, enemy Command Control and Communication facilities can be sought after and destroyed or cleared out.










Hitmen
Contract Killers
Contracts


Murder Inc.


If there are no assassins that are trained and available to the guerrilla army (especially in enemy territory), an agent planted in the enemy country can hire hitmen using reliable connections in the underworld to retain a reliable hitman sympathetic to the cause. The agent can also decide to undertake the mission himself.


A hit squad is often more effective than just a single hitman. A hit squad offers the ability to quickly eliminate enemy bodyguards and ensure the enemies death.


Hit men can communicate using local newspapers by placing coded messages in the ad section.


A hitman can work with a backup hitman to cover him and follow up on an attack to ensure the death of the target.



Multiple hitmen can be positioned in or around the areas in which a mark may travel or attempt to escape, such as at an airport, at bus stations, train stations, at or near the marks home, etc.


Ammonia in a spray bottle can be sprayed on any DNA evidence that may have been left by the hitman, such as blood. This is less time consuming than a full clean up and ammonia confuses the DNA evidence.


The “Throw Away” is usually a pistol that cannot be traced to the hitman. The pistol may be stolen, have its serial numbers scratched off, or a combination of such. After the hit is done, the gun is simply tossed aside (often near the body). This way, if the hitman is stopped or captured there is no weapon on him. If the weapon is found it cannot be traced back to the hitman.


A bomb can be wired to the doorbell of an apartment or house. When the mark rings the doorbell, the bombs detonates. The mark can be set up, and told to go to a certain place, ring the door bell, and ask for a specific person.


The hitman or assassin may find it necessary to remove his shoes and walk barefoot over certain types of pavement or floors.


The car used in a crime can be set on fire to destroy forensic evidence.

A T-shirt can be used as an improvised mask. The shirt is placed over the head but the eyes look through the neck hole. The remainder of the shirt covers the head completely. The sleeves of the shirt are tied around the back of the head or neck.





Examples
17 OCT 2001- israeli cabinet member Rehavam Ze'evi is assassinated by members of the PFLP at the Hyatt Hotel in Jerusalem. Ze'evi was killed in retaliation for the israeli assassination of PFLP leader Abu Ali Mustafain August of 2001. Silenced pistols used.

28 OCT 2002- US diplomat, Laurence Foley, is shot and killed by gunmen in Amman, Jordan. The  gun used was reported to have been a 7mm pistol. Foley worked for USAID.






Saturday, May 18, 2013

Pro-Government Guerrillas



Anti-Guerrilla (or Anti-Rebel) Guerrillas
Counter Guerrilla Guerrillas

Use of Stay Behind Forces


If rebel forces overrun an area, government troops can hide out in the jungle, forest, desert, or urban areas (wearing civilian clothes), and wage a guerrilla war against the rebels. The soldiers act as a Stay Behind Force. This may be a unit specially trained in guerrilla warfare.


Drive-by shootings against the rebels
Sniper attacks against the rebels
Roadside bomb attacks against the rebels
Car bombs used against rebels and terrorist who have taken over certain areas.
Ambushes against the rebels. ("Ambush the ambusher")
Monitoring the activity of rebels in rebel held areas by resistance forces. Keep track of enemy command and control facilities, tunnels, ammunition depots, officers, etc.


Some Special Forces soldiers may hide out and act as Forward Observers or artillery spotters, and secretly call in artillery and air strikes on large gatherings of enemy rebels, enemy command posts and headquarters, etc. The strikes must be precise and civilian casualties must be avoided at all cost. May find Laser Target Designators useful for airstrikes using precision guided munitions.




The civilian population in the area may also resist the enemy rebel forces who have taken over the area. Secretly. Silently. May choose active or passive resistance. The civilian population may even pretend to be friendly with the enemy rebel forces and openly support them. But secretly, they wage a war of resistance against the rebels Once overran by the rebels. weapons and equipment are hidden and cached. Community links are held strong.



*The nature of guerrilla warfare dictates that the rebels will not hold any area for too long a period of time. Holding an area for an extended period of time costs man power, which is something most rebels don't have. The rebels will most likely, as they have historically, withdraw and attempt to return at a later date, usually retaliating against the local populace. The locals should watch out for rebels attempting to infiltrate into the area. Roadblocks and checkpoints with barriers may be set up. Vehicles searched and identification checked.


Plant hidden tracking devices in certain vehicles, equipment and weapons and allow them to be captured by the rebels. Small tracking device hidden in the butt stock of a rifle, electronic equipment, a pickup truck, anti-tank guided missile launcher, etc.

Rifles left behind for rebels with exploding ammunition inside. Instead of gunpowder, the ammunition is filled with a high explosive. Destroys or severely damages the weapon and the user.

Pretend to be agents from a sympathetic  nation and establish contact with the rebels.

Pretend to go over to the side of the rebels. Spy on the rebels or kill the rebels from within. Target rebel leadership and foreign agents first.







Vacation cruise ships can be used to transport troops.
Beware of vacation cruise ships coming from foreign nations. They could contain an invasion force.
Many nations actually use cruise ships as auxiliary military transport vessels.


Wednesday, May 15, 2013

Smuggling Tactics






Smuggling
Smuggling may include the smuggling of weapons, equipment, people, documents, food, fuel, etc., in or out of some particular place, such as smuggling a person out of prison or a smuggling a weapon into prison.




Hidden inside the spare tire of a car or truck.

Establish relations with individuals in the airline or airport, shipping or trucking business with the intent of smuggling.

Weapons can be hidden in trucks underneath the regular loads of goods such as vegetables, fruit, or household goods.

Donkeys, mules, and horses can be used to smuggle items over rough terrain, bypassing enemy check points.

Gas tank taken off vehicle, cut open, item hidden in gas tank. Gas tank resealed and placed on vehicle.

Hollowed false leg used to smuggle small items.

Hollowed out items like plastic toys with powder or plastic explosives hidden inside.

Explosive powder disguised as flower, sugar, pepper, etc., put in appropriate bags.

A secret underground pipeline can be used to smuggle fuel from one area to another.

If not frisked at the airport, bus station, border crossing, etc., a small bag of money, documents, computer disks, etc. can be taped or strapped to the body and smuggled. The item or items should not be capable of setting off metal detectors, explosive detectors, dogs, etc.

Secret tunnels can used to smuggle weapons and equipment and even people. Modern day examples of this include tunnels used to smuggle drugs and people along the U.S. and Mexican border, Palestinian smuggling tunnels along the Egypt and Gaza border, and North Korean tunnels used to sneak Special Forces, and even tanks and infantry units into South Korea.



Coffee can be used to fool sniffer dogs.





Smuggling By Sea
Smuggling on Ships
An arms smuggling ship can secretly offload weapons off the coast, not at a port. Weapons can be placed on smaller boats, inflatable rafts, etc. and brought ashore. The arms can then be hidden nearby or loaded into trucks, cars, etc, and transported to a secret arms depot. If the shipment is large, weapons should be divided into multiple arms depots or weapons caches. If one of the caches is discovered, all of the weapons and equipment will not be lost.

26 July 1914- Famous Howth gun smuggling event in which 900 Mauser rifles were smuggled to Howth harbor in Ireland for Irish Volunteers.


Smuggling program used by LTTE (Tamil Tigers)

The KP branch, named after Kumaran Pathmanathan (real name Selvarasa Pathmanathan), was an international arms smuggling ring responsible for LTTE arms shipments from 1983 to 2002. 
The KP branch purchased and shipped 60 tons of explosives (50 tons of TNT and 10 tons of RDX) from the Rubezone Chemical plant in the Ukraine in 1994 using a forged Bangladeshi Ministry of Defense end-user certificate. 
The KP branch also stole 32,400 81mm mortar rounds the Sri Lankan government purchased from Tanzania. Being aware of the purchase of 35,000 mortar bombs, the LTTE made a bid to the manufacturer through a numbered company and arranged a vessel of their own to pick up the load. Once the bombs were loaded into the ship, the LTTE changed the name and registration of their ship. The vessel was taken to Tiger-held territory in Sri Lanka's north instead of transporting it to its intended destination 
After the entire leadership of the LTTE was killed in 2009, Pathmanathan assumed the leadership role. Pathmanathan was arrested in Malaysia on August 5, 2009, along with several other Tamil activists.


Smuggling on Submarines or Submersibles
Modern day examples of this include Colombian drug dealers use of small submarines and submersibles to traffic narcotics, and North Korean midget submarines used to sneak Special Forces and agents into South Korea.







Smuggling By Air 
Private jets take off and land at small air strips not major airports. Can have secret airstrips in some places or in some nations.

Secret Runways and Airfields where aircraft land and quickly unload cargo.

Smuggled items are dropped by aircraft over Secret Drop Zones


Caching Weapons and Equipment








Weapons cached under piles of scrap metal or a lot of rubbish in case the enemy comes through with metal detectors looking for weapons caches.

Select weapons and equipment to be cached based upon the particular need of the unit and operation.

Procure the items to be cached

Select a cache site

Potential Caching Sites
Caves, abandoned mines and quarries
Walls (hidden behind loose bricks or stones or hidden in a plastered surface)
Abandoned buildings
Infrequently used structures (railroad facilities, etc.)
Culverts
Sewers
Cable conduits
Underwater- Underwater caches can be placed in water proof containers and well anchored in the water. Attention should be paid to the tides and strength of the current. The changing of weather conditions including the increase or decrease in rain fall should be noted as well. There should also be a way to retrieve the underwater cache, perhaps with some type of long pole with a hook. A pond or small lake might be best for an underwater cache. The location of an underwater cache should be precise and accurate, perhaps next to some distinguishing features or landmarks. The cache itself or perhaps the archor connected to it should be heavy enough to not even be possible to float away or drift off. The cache can be dropped off and picked up by men pretending to be fishermen, even though the cache is located in a place not frequently used by fishermen.

A surveyor can be sent out to locate prospective sites. The surveyor should carry the necessary equipment such as maps, a compass, measuring tape, pen and pad, etc. The individual should have a good cover story in case he is noticed. The surveyor can make his own map with reference points.

The cache site should have at least two secure routes to and from the site. A primary route and an alternate route. The routes should have natural concealment.

Weapons and equipment can be cached along the route to a specific target.

Be aware of seasonal changes such as snow and ice in the winter. Hard ground could cause a problem for digging. Snow could cause a problem as far as leaving foot prints, tracks, etc.


Packaging the Cache
Inspecting
Cleaning
Drying
Oiling- Apply light coat of oil on weapons, tools, and other items with an unpainted metallic surface.
Wrapping- The wrapping should be done so well that it should be near water proof. Each item is to be wrapped individually. The item should be wrapped tight to eliminate air pockets. Fols should be sealed with a water proof substance.
Packaging- All moisture should be removed from the container. A long lasting desiccant should be packed to absorb residual moisture. Clothing can be used for padding to protect the contents.
Instructions and diagrams can be added on the usage of the items.

The emplacement or recovery of a buried cache should be done after dark.
After a cache is recovered, effort is made to refill the hole that was dug.


Dynamite must be flipped or turned over every now and then while in storage. The nitroglycerin begins to seep out over a period of time. Dynamite is usually packed in saw dust (in case of leakage) and stored in a crate.





An article on Weapons Caching from an old "Soldier of Fortune" Magazine






















Wednesday, January 16, 2013

Guerrilla Technology




(under construction)



The Use of Lasers


Laser troops





Electro Magnetic Pulse (EMP) bombs
Used to shut down enemy electrical equipment on the battlefield and any enemy operations using electricity within a city for instance.



EMP device operation diagram in theory




EMP troops
Carry equipment or weapons that send out an electro magnetic pulse. The main element carries the device. Security elements may also be used to protect the main element. After disrupting or disabling the electrical equipment or the electrical grid of the enemy, follow up attacks may be done. Follow up attacks may consist of raids on certain facilities, more EMP attacks, etc.

EMP missiles or rockets


Computer hacking


Hacking into enemy drones.
2009- The U.S. military admits that Iraqi guerrillas were able to hack into U.S. drones and view live images from the drones cameras. Some allegedly used software as cheap as $26 called SkyGrabber. Why the U.S. government would make this issue known and then seemingly advertise a product to do it with remains unclear.



Electronically commandeering enemy drones

Captured U.S. RQ-170 unmanned aerial vehicle (UAV) on display


04 DEC 11- Iran captures a U.S. RQ-170 Sentinel unmanned aerial vehicle flying over Iranian airspace.
04 DEC 12- Iranian Revolutionary Guard forces capture a U.S. Navy Scan Eagle drone. The drone was flying in Iranian airspace in the Persian Gulf.
02 JAN 13- Iran states that two U.S. RQ-11 Raven drones had been captured over the past two years and that information off the drones were retrieved. The drones were flying over Iranian airspace.



Night Vision Equipment
FLNC member with Night Vision Goggles (NVG)




Infravision Equipment



Advanced Optics

Hezbollah guerrillas with observation scopes



Advanced Radio and Communications Equipment

Tamil Tiger (LTTE) guerrillas with radio equipment




IRA guerrilla with Eurosonic EU40 citizen ban transceiver radio.




Cellular Phone Blocking equipment
Used to block incoming and outgoing cellular phone calls.

Radio Controlled Weapons
The use of radio controlled (RC) toy aircraft as improvised Unmanned Aerial Vehicles (UAV).
Cameras added.

Radio Controlled (RC) toy aircraft armed with explosive warhead that detonates upon impact. Flown into enemy buildings, vehicles, etc.


Large radio controlled (RC) toy aircraft used to drop bombs, small bomblets, flechettes, etc.  over enemy positions.



The use of radio controlled (RC) toy boats and ground vehicles.



Remote Controlled Weapons (Remote Operated or Robotic Weapons)

Pictures from an Al Ansar video showing a Remote Controlled anti-aircraft gun.



Remote controlled sniper rifle.


3D printers can be used to make gun magazines, spare parts for guns and even entire guns!






Cellular Phone blocking or jamming devices used to block emergency calls made by the enemy on cellular phones.






Propaganda

Videos


Members of GRAPO issue a video communique.

Members of the Basque ETA issue a video communique.

Attacks, communiques, etc. can be recorded on video and put on Compact Disk (CD) and sold for fund raising or even handed out for free. CD's can be used instead of downloading and uploading videos on the internet. The internet is tightly watched and controlled by government forces.






Underground Radio station



Secret Printing Press



Distribution of Leaflets




Posters



Newspapers


Painting slogans

"Yankee Go Home"
"Brits Out"


Painting wall murals



Communique




"Ransom Note" or "Poison Pen letter" style communique




Armed Propaganda
Armed actions by the guerrillas serve as propaganda in itself. This type of propaganda may also include simply the displaying of arms by the guerrillas in a poster or video.