Guerrilla Tactics
The Use of Decoy Rockets and Missiles
Fire decoy missiles and rockets at the enemy in order to overwhelm their anti-missile systems (Patriot, Iron Dome, etc.). Decoy missiles and rockets can be fired first, then followed up by the real missiles and rockets or the decoys can be mixed in with the real. The objective is to get the enemy to shoot down the decoys and possibly run out of missiles. The decoys are, on the other hand, cheap and inexpensive rockets or perhaps some could be specialized missiles that disrupt enemy radar, etc.
Perhaps hundreds of balloons with thin strips of aluminum attached to them are sent up to confuse enemy radar or balloons made of thin foil like material. Done to confuse enemy radar during a missile or rocket barrage.
Decoy rockets positioned on the ground. Perhaps fake ground crews "hiding" nearby. Not too well hidden. Used to draw enemy fire away from real rockets and soldiers.
Used to waste enemy munitions on false targets.
Common Guerrilla Tactics
The guerrillas can draw enemy forces out of major population areas and into remote border sanctuaries where supply and escape can be facilitated. This helps undermine enemy pacification efforts on the civilian population and disperses his forces.
The enemy cannot send large amounts of soldiers to occupy every city, town, village, block, building, etc. The enemy cannot be strong everywhere. If the enemy is strong in one area, he will be weak in another. Attack the enemy where he is weak, not where he is strong. Attack the enemies rear, supply lines, communications, etc. When the enemy sends troops to deal with this threat, attack a different area.
Harass the enemy on all sides to the fullest extent of the capabilities of the guerrilla forces. Weaken the enemy's morale by constant propaganda and terrorist harassment.
At every moment the impression should be created that the enemy is surrounded.
Ambush the enemy with superior forces. Quickly, unexpectedly, and violently attack the smaller enemy force, then quickly retreat using a pre-planned escape route. Security units may be pre-positioned as well to guard the main ambush unit and cover their withdrawal. An ambush should last no longer than 15 minutes. So called “Hit and run” tactics.
After a successful ambush, set fire to enemy vehicles to completely destroy them. This should be done quickly before enemy reinforcements arrive.
The main source of supply for the guerrilla army can be the enemy. Weapons and equipment are stolen or captured.
The use of a nom de guerre or "war name" by the guerrilla instead of their real name.This practice is similar to how spies and agents use code names.
The Ambush
Examples
15 NOV 2002- A Palestinian gunman shoots at zionist settlers and flees. israeli soldiers then return fire and chase the gunman. Forces from Islamic Jihad ambush and kill 12 settlers and soldiers.
Raids
The Scorpion Maneuver
Usually a small, diversionary force makes contact with the enemy while the main force maneuvers to attack the enemy flank or rear.
(Snapshots taken from the National Geographic Channel program "Generals At War: The Battle of Singapore")
The Blooming Lotus Tactic
Tactic in which the guerrillas attack the enemy controlled city or base from the inside-out. The guerrillas may infiltrate the city dressed as civilians. Weapons may be smuggled in separately and hidden before the guerrillas infiltrate the city. The enemy base or city may be infiltrated by sappers. This may also take the form of an armored assault or push into the city or base from the outside and following capture of the city from the inside out. The city is captured from the inside-out, with enemy command, control and communications being captured or destroyed first. This tactic was used extensively by the Viet Minh and Viet Cong.
"Belt grabbing" or "Hugging" tactics
Stay close to the enemy while in combat so the enemy cannot call in air strikes or artillery support without doing harm to his own forces. Forces are between 25 meters to a maximum of 100 meters. Usually less than 50 meters away. These tactics have been used by many forces including Soviet forces in Stalingrad, North Vietnamese and Viet Cong forces, and Chechen forces in Grozny.
Diversionary Tactics
"Make a Noise in the East, and Strike in the West"
Inducing Fratricide
To deliberately get the enemy to attack and kill members of his own military.
The Vietcong would dig spider holes and wait for enemy forces to position themselves on both sides, one group on either side of the guerrilla. The guerrilla would then fire upon one unit and hide once more in his spider hole. The enemy unit that was fired upon only saw the other unit moving in behind them, and opened fire.
Dress up like enemy police or military forces and kill other enemy police or military. This creates an atmosphere of distrust and fear. Set up roadblocks to capture or kill enemies wearing enemy police or military uniforms.
Place or fly your flag on the ground near an enemy formation or on top of an enemy building so that it can be seen by enemy aircraft from above and bombed or fired upon.
Place a device next to a facility that sends a signal that it is an enemy facility such as a radar station, missile sight, etc.
Urban Tactics
Snipers may be placed in masonry buildings on the flanks or rear. They should have a long range field of fire. Snipers should not be placed in obvious such as rooftops or church steeples. A sniper should have multiple positions maintained.
Sledgehammers can be used to knock down walls, create loop holes, mouse holes, etc.
Digging tools can be used to make underground tunnels and trenches.
Subterranean Combat
Sewers and underground Metros or subways systems provide guerrillas with the ability to move around the battlefield undetected, perhaps even the ability to move behind enemy lines and attack from the rear. This advantage can also be used by the enemy. The entrances to the sewers and subway systems near enemy potions can be sealed off and mined or booby trapped. Ambush points can be set. Obstacles made from concertina wire, rubble, furniture, fences, etc. can be placed at intersections in the sewer. These obstacles can be mined and booby trapped also.
Night Vision Goggles and Infrared equipment are very helpful in the dark sewers.
Recognition signals should be made in advance to avoid fratricide.
Sewer patrols
Determine if the air is safe to breath in the sewer before entering.
Smoke can be used to flush enemy forces out of sewers.
Possible use of Unmanned Ground Vehicles (UVG) in the sewers.
Sewers can also be used as a means of running a system messengers to communicate with guerrilla units.
Sewers and subways can also be used as an underground conduit for communications wire.
If a command post is located underground, antennas can be relocated to the upper stories of a building. Field telephone wire can be laid in conduits, sewers, or through buildings.
Historical
Tactics used by Polish resistance fighters in World War 2.
Tactics used by Chechen fighters during the 1999 Russian invasion of Chechnya.
Winter Tactics
Sled
Sledge- A heavy sled
Sleigh- A horse drawn sled with seats.
Skis
Snowshoes
Use of modern day snowmobiles for reconnaissance.
Use of modern day tracked all terrain transport vehicles suitable for use in snow and cold weather such as the Bandvagn 206 or Sisu Nasu.
Aerosani- Propeller driven sled used during the Winter War and World War 2 for scouting and small raids.
Sleigh or sledge pulled by horses or dogs
Ski troops
Machine gun or heavy weapon carried on a sled
Machine gun or heavy weapon on skis
Ambulance sled
White smocks or coveralls for troops made from white linen.
Two man foxholes dug if in the field. Soldiers sleep with their backs against one another for warmth.
White tape or cloth wrapped around non moving parts of rifle for addition camouflage.
Reversible coat with two different camouflage patterns.
Snowsuit
Padded clothes
Layers of clothes may be worn
Charcoal gives off less smoke than using wood for fires.
Sound travels farther in cold.
Sniping
Mining
Roadside Bombs
Drive-by Shooting
Preferably cars with four doors (hence four windows)
Windows are rolled up until approaching target area.
Guerrillas in back seat can duck down and hide until approaching target area.
Trucks, motorcycles and other vehicles have also be used in drive-by shootings.
May use stolen vehicles
Drive by shooting on a motorcycle or scooter. Can also drive-by and throw hand grenades.
Night Operations
Conduct operations during times of low light or no light
Cut power to an area and move in with night vision equipment.
Use of night vision goggles (NVG), night vision binoculars, scopes, cameras, etc.
Training for night and low light operations without night vision equipment
Patrolling
Infiltrating and Attacking the Enemy Wearing Enemy Uniforms.
This is often referred to as a "False Flag" attack
So called "Insider Attacks" where guerrillas dress as enemy soldiers or police, or actually join enemy military or police forces and kill enemy soldiers. Specifically target and kill enemy occupation force soldiers.
Examples
DEC 1944- German commandos driving captured Allied vehicles, carrying Allied weapons and wearing captured U.S. and British uniforms infiltrate Allied lines and attempt to cause chaos and disorder in Allied forces rear area. The German forces were led by Waffen SS Colonel Otto Skorzeny.
01 MAY 2003- A U.S. contractor is shot and killed at the King Abdul Aziz Naval base in Jubail, eastern Saudi Arabia. The gunman was dressed in a Saudi naval uniform.
05 AUG 2014- A U.S. general is shot and killed in another "insider attack" in Afghanistan. The gunman was dressed in an Afghan army uniform.
The wearing of civilian uniforms and disguises
Examples
12 APR 2003- A gunman shoots a U.S. marine standing guard outside a hospital in Baghdad. The gunman was with another individual, both of whom posed as landscape workers. Other marines opened fire on the gunman, killing him. The other individual escaped. The gunman was reportedly a Syrian.
Two man infiltration and attack units
Examples
08 MAR 2003- Two Palestinian gunmen attack an illegal israeli settlement. 3 zionist are killed. The two gunmen are martyred. Both gunmen were dressed like Orthodox jews.
10 APR 2003- Two Palestinian guerrillas infiltrate an israeli army base and kill 2 israeli soldiers. Both Palestinian gunmen are martyred. The PFLP and the Al Aqsa Martyrs Brigade claim responsibility.
08 JUN 03- Joint operation between HAMAS, Islamic Jihad, and the Al Aqsa Martyrs Brigade. Three guerrillas (one from each group) infiltrate an israeli army post and kill 4 israeli soldiers before being killed themselves. The military outpost was located in the Erez crossing between the Gaza Strip. The Palestinians dressed as israeli soldiers. Used assault rifles and hand grenades.
Guerrilla Mortar Tactics
Heavy mortar mounted on the back of a truck. This tactic has been used successfully by many guerrilla organizations, including the FARC of Colombia and the IRA.
Van with roof cut out and improvised mortar inside. The mortar is set to fire on a delayed timing device. This tactic has been used successfully by the IRA.
Mortar rounds can be fired over buildings in urban environments
Mortar rounds can be fired over hills.
Forward observers with binoculars and radio equipment may be used to direct mortar fire upon the enemy more accurately. Forward observers can be hidden in tall buildings, trees, etc.
Fire off a few rounds then quickly withdraw. Preplanned escape route. May have security teams in place to protect the mortar team while firing.
Hit and run mortar attack on enemy base or airfields.
Hit and run mortar attack on enemy oil wells or oil storage facilities and refineries.
Mortar attack used as cover to infiltrate commandos onto an enemy base while the enemy takes cover.
Use of small mortars such a 60mm mortars or Chinese made QLT-89 50mm mortars. Very convenient for guerrilla warfare. Perhaps carried in a sack or bag.
Armored mortar carriers or self propelled mortars. Usually carry heavy mortars..
A mortar can be fired from inside a building with a large enough hole cut in the roof. Can be used in a hit and run attack or used to defend a position. The hole can have a cover that can be removed and quickly repositioned.
Concealed underground mortar positions. Reinforced concrete. Sliding metal top. Open top. Fire a couple of mortar rounds and quickly close the top before counter battery fire.
120mm mortars
82mm and 81mm mortars
60mm mortars
Improvised Mortars
Laser guided 120mm mortar rounds such as the Swedish made STRIX, Russian made GRAN, and the U.S. made M395. Capable of armor penetration and top attack on enemy tanks and armored vehicles.
Vehicles can be hidden in garages or camouflaged and hidden outside. Vehicles can be hidden in the shadows of buildings or false building extensions can be added.
Fake houses or structures can be built to hide air defense weapons inside. When enemy aircraft approach, the structures sides open up revealing the weapon.
Toy guns painted to look real.
Carved wooden replicas of common guns and weapons (grenades, rockets launchers, rockets, missiles, mines, etc.), painted black or olive green. Slings can be added to the fake rifles. Guerrillas can attack at night to increase the effectiveness of the deception. Can use a mixture of real weapons and fake weapons. Take enemy weapons, free prisoners, etc. This tactic was used by the EZLN (Zapatistas) of Mexico during their uprising.
Multi-spectral camouflage netting such as the Barracuda by Saab. Provides cover from enemy radar and thermal infrared.
Individual Camouflage
Urban Guerrilla Camouflage Civilian clothes are worn in an urban guerrilla environment. In an urban guerrilla war, the guerrilla should make every effort to blend in with the populace.
"The guerrilla must move among the people as a fish swims in the sea."- Mao Zedong
Rural Camouflage Camouflage uniforms and foliage
Improvised rural camouflage using olive green, forest green, or black civilian clothes.
The adding of foliage
Camouflage face paint
Nets or veils to cover the face
Desert Camouflage
Improvised desert camouflage using sand colored civilian clothing depending on the conditions or the operation.
Urban Camouflage
Worn during a more conventional conflict.
Improvised urban camouflage using civilian clothes. Grey shirt and grey work pants with cargo pockets for example to camouflage in a heavily urbanized area,
Black or dark blue civilian clothes for night operations
A black shirt with writing or images on it can be reversed and turned inside out.
Two layers of clothes can be worn on an operation or another set of clothes can be carried in a bag. Camouflage uniform under civilian clothes or civilian clothes under camouflage uniform depending on the situation. Infiltrate wearing a police uniform, and exfiltrate through a wooded area wearing a camouflage uniform. Infiltrate at night wearing dark clothes and exfiltrate later wearing construction workers clothes and hard hat.
Winter Camouflage
Improvised Winter Camouflage
Consisting of white civilian clothes. White bed sheets can be turned into smocks and worn over protective layers of clothes.
Concealment
Ninja concealment methods
To hide in a dark corner of a room
To hide behind and object
To hide in an object
To hide under an object
Tank Dead Space
Anti-Tank Mines
A row of anti-tank mines on a board can be pulled across a road or path in front of an oncoming enemy armored vehicle.
Off Route Mines
Anti-Tank Guided Missiles (ATGM)
Hezbollah guerrilla with AT-3 Sagger (9K11 Malyutka) wire guided anti-tank missile
Hezbollah guerrilla with TOW anti-tank missile.
Hezbollah guerrilla with AT-5 Spandrel (9M113 Konkurs) anti-tank missile.
Wire guided anti-tank missiles
Laser guided anti-tank missiles
Shoulder fired anti-tank guided missiles such as the ERYX and the MBT-LAW
Shoulder fired Anti-Tank Rocket Launchers
Use of new RPG-7 rockets such as the PG-7VR that have tandem warheads for greater armor penetration capabilities and potential to defeat explosive reactive armor.
Use of special anti-tank rocket launchers such as the Russian made RPG-30, specifically designed to defeat Explosive Reactive Armor and other counter measures.
Anti-Tank Rifles or Anti-Material Rifles
.50 cal (12.7x99mm NATO) rifles such as the Barrett M82A1 and Steyr HS 50
Special armor piercing or armor piercing incendiary ammunition.
Establish training program for snipers
Information on enemy armor weak spots and best positions to attack on each type of armored vehicle.
Historical examples of the anti-tank or anti-material rifle include the PTRD-41 used by Soviet forces during the Second World War.
Anti-Tank Grenades Anti-Tank Grenades such as the RKG-3 can be thrown at enemy vehicles.
Molotov Cocktails (Fire Bombs)
World War 2 illustration on an anti-tank trap
Resistance fighters against US invasion forces in Iraq display shoulder fired surface-to air missile launchers.
If no commando units or agents have been positioned ahead of time, an attack on the enemy air bases should eventually be planned and carried out by commandos and assault forces regardless. To destroy enemy aircraft on the ground or overrun an enemy airbase is good air defense.
North Vietnamese forces overrun the Bien Hoa airbase April 25th, 1975
North Vietnamese forces overrun the Tan Son Nhut airbase November 30th, 1975
Aftermath of an Ejercito Popular Boricua (EPB) or Macheteros attack on a US airbase in Puerto Rico on January 12th, 1981. The attack destroyed or damaged ten A-7 Corsair II attack aircraft and one F-104 Starfighter aircraft.
Secret tunnels can be dug under enemy bases allowing guerrillas to launch a quick raid into the enemy base or overrun the base completely. If overran, the base can be held or the guerrillas can quickly withdraw after taking necessary weapons and supplies and setting the reminder of the base on fire.
Heavy anti-aircraft weapons can be lifted by a crane or helicopter and placed atop a building. Some weapons may be brought up to the roof top by a freight elevator of a building if the weapon is small enough such as a heavy machine gun. Some weapons may be disassembled and taken to a roof top piece by piece then reassembled.
Concept. So called "Passive Radar". Cellphone signals are reflected off of aircraft.
The Silent Sentry concept by Lockheed Martin uses FM radio stations.
Shoulder-fired surface-to-air missiles
Hezbollah guerrilla with SA-7 shoulder fired surface-to-air missile launcher.
23 March 1973- PAIGC guerrillas in Guinea Bissau shoot down 2 Portuguese Fiat G.91 aircraft using SA-7 surface-to-air missile launchers. Six weeks later another Fiat G.91 and a Dornier Do 27 were shot down.
Numerous examples of aircraft and helicopters being shot down by shoulder fired surface-to-air missiles in Afghanistan, Chechnya, Iraq, etc.
Many modern anti-tank guided missiles (ATGM) have the ability to fire at low flying, slow moving aircraft like helicopters and unmanned aerial vehicles (UAV).
The use of tracer ammunition in anti-aircraft guns can help with the aiming of weapons during day or night and helps anti-aircraft teams track enemy aircraft and concentrate their firepower. When used in machine guns, tracer rounds are often loaded every fifth round in the machine gun ammunition belt. One negative aspect of using tracer ammunition is that the tracer also reveals the position of the gunner.
Towed anti-aircraft gun or machine gun mounted on a truck or utility vehicle for mobility.
Heavy caliber machine guns or heavy caliber automatic rifles can be used to shoot down helicopters and low flying aircraft.
Hidden on rooftops to increase effectiveness.
Hidden on hilltops to increase effectiveness.
Enemy aircraft are most vulnerable to small arms fire during take-off and landing.
Larger sized mobile air defense weapons can be hidden in garages, fake buildings can be made to hide air defense weapons or false building extensions can be added to a structure.
Books and Manuals on Air Defense:
Guerrilla Mobility
During the guerrilla warfare stage, it may be necessary to hide the movements of small guerrilla forces in unmarked civilian vehicles.
During the mobile warfare stage of the conflict, however, when the fighting becomes more conventional, mass transport of guerrillas to and from the area of operations can be done. This mass transport should be done in territory controlled by the guerrillas.
Proper security measures should be taken along the routes.
The enemy should lack air power, or proper guerrilla air defense should be utilized to protect the mobile forces.
If spotted by enemy aircraft, guerrilla forces can attempt to scatter and hide in a forested area if possible. May be able to drive the vehicles off road and hide under tree cover and dense bush.
Cars
Fake license plates or stolen license plates can be used during the guerrilla warfare stage of conflict. The license plates can be completely removed during the mobile warfare stage.
Trucks
Motorcycles
Often used by scouts in rural areas. Utilize speed instead of armor. Off road bikes are especially good for scouting.
Tamil Tiger forces on motorbikes
Hezbollah soldiers on motorbikes
Often used to rapidly transport special troops from one area to the next. Special soldiers on motorbikes armed with anti-tank rocket launchers can be sent to engage enemy armor. Soldiers with surface-to-air missiles can quickly cover an area to engage enemy aircraft. Used like a rapid reaction force.
Motorbikes have been used in numerous attacks for decades by urban guerrillas. These attacks have included drive-by shootings and the throwing of grenades. Motorbikes offer the guerrilla the ability to speedily get away and negotiate narrow streets and and alleyways in cities.
Bicycles
Bicycles can be used to rapidly transport guerrillas from one area to another in a secure zone controlled by the guerrillas.
The enemy should lack air power so as not to harm the bicycle riding guerrillas while on the move. If enemy aircraft are spotted the guerrillas should disperse and take cover under trees, in bushes, tall grass, etc. Cyclists should ride a certain distance apart from one another and not bunch up.
The bicycles can be used instead of automobiles if the guerrillas lack fuel for their vehicles or lack vehicles in general.
Liberation Tigers of Tamil Eelam (Tamil Tigers) on bicycles
Japanese soldiers on bicycles rapidly moving in Malaya
German Volkssturm on bicycles carrying Panzerfaust.
Urban guerrillas in civilian clothes can be used as scouts or used to patrol an area.
Bicycles can be used to carry supplies
Viet Cong porters using bicycles modified to carry large amounts of supplies. These modified bicycles were meant to be pushed and not ridden.
Boats As a Method of Transport
Horses and mules may be used to carry guerrillas and supplies over rough terrain or may be used if that is all that is available to the guerrillas.
Monitor police and emergency services activities using a scanner set to the appropriate frequency.
Lure and kill an individual enemy policeman or soldier and take his weapon.
Set an enemy facility on fire and shoot at firefighters when they arrive to stop or delay them as long as possible from putting the fire out. The firefighters will be forced to wait for police protection to arrive before they can put out the fire.
Throw grenades, firebombs, chunks of concrete down from freeway overpass at enemy police or military vehicles.
A metal wire can be stretched across the oncoming path of an enemy motorcyclist at night.
Oil pipeline sabotaged by Iraqi guerrillas on June 22 2003 after the U.S. invasion and occupation.
Illustrations from the CIA Sabotage Manual with instructions in English and Spanish. This manual was originally intended for the the CIA backed Contra rebels fighting the new Sandinista government of Nicaragua.
Can deliberately come to work sick in order to spread the flu, cold, etc. to other employees.
16 APR 2013- Sniper attack on a power substation located outside San Jose, California, The attack damaged 17 transformers and causes an estimated $15 million in damage.
Espionage
"Be subtle, be subtle and use your spies for every kind of business."
"Spies are a most important element in war, because on them depends an armies ability to move."
Strategy
"Armies of Spies"
Hundreds or thousands of spies, moles, saboteurs, etc. flood the enemy nation before the outbreak of hostilities.
Do not spend any money on basic research. Steal advanced technology from the enemy.
May choose to steal weapons and technology from a smaller nation that purchased weapons or technology from the main enemy nation. May find the facilities and safe guards less well protected.
Lists of foreign weapons and technology that are to be stolen are drawn up.
May choose to have two or more spy organizations of equal power and strength, so that no one organization can become too powerful and threaten the government itself. Counter-balance.
Spy craft
Acting
Disguise kit
Disguises
Makeup, uniforms, shoe lifts, badges, fake glasses, Identification cards, contact lenses, fake tattoos, wigs, fakes beards and mustaches. Extra clothing added in layers.
Eye glasses with rectangular shaped lenses to disguise the features of the face?
Go through the enemy’s garbage to gather information. It could be an individual, a business, in or around a military installation, etc. Wear gloves to protect hands and not leave fingerprints.
Instead of walking out of a facility with stolen documents, you can take pictures of them with a small, concealable camera. This way, the enemy never realizes the information has been stolen, because nothing is missing or out of order.
Spies disguised as tourists.
Spread rumors to cause panic and mass hysteria among the enemy.
"Aunt Minnies" are innocent ground level photographs found in magazines, books, and postcards of an enemy facility or target. The photographs may include friends or relatives of the photographer with vital intelligence in the background. Aunt Minnies may be necessary if it is not possible to obtain satellite photos, images from the internet, or photos obtained from an agent conducting a reconnaissance mission.
An agent can take notes and even make primitive maps using a small pencil stub and a small piece of paper placed in their pocket. The agent should practice writing with their hand in their pocket.
Blackmail can be used as a means to get the enemy to pass information.
A flashlight can be used to secretly carry rolls of coded papers.
Create a network of safe houses. Safe houses
False documents can be carried by an agent and presented along with a cover story if necessary. An entire department devoted to false documents can be created.
Post cards with prearranged texts can be sent through the mail to relay whatever message.
Spy Dust
Nitrophenylpentadienal (NPPD)
Used to secretly track enemy activities. Applied to clothing, cars, steering wheels, door knobs and other objects used and touched by the enemy. Can be seen with an ultraviolet light.
Dead Drops or Dead Letter Boxes
Dead Letter Boxes may be used to store weapons, money, documents, equipment, etc. They may come in the form of a fake rock, a crack in a tombstone, a loose brick in a wall, a hollow fence post with a cap or top, a container submerged underwater, etc. The dead drop must not be prone to accidental discovery. The dead drop should be in a place where the agent has plausible excuse for being there at any given moment. A different dead letter box may be used each time information is transmitted. As a rule, a dead letter box may only be used once. One agent may deliver the information to a dead letter box in a shop, etc. then several hours, or perhaps days later, the information may be retrieved by another agent.
P.O. (Post Office) Boxes can be used to send coded information.
Circular glass cutting tool with suction cup used to cut hole in window or glass door.
Lock picking tools:
Lock picks
Lock picking gun
Survey the area and make sure no one is watching and there are no cameras. Listen for noise inside first.
Crouch low or kneel while picking locks.
Use of so called "Bump keys" or "Jiggler keys" for surreptitious entry.
Tape over lock method
Silencers disguised as flashlights or large flashlight with silencer hidden inside.
Miniature video camera hidden in a hat.
A bomb disguised as a piece of coal or a rock.
Tire slashers can be used to quickly sabotage enemy vehicles.
Secret pockets can be added to pants (inside the thigh, or inside the turn up of each pant leg), shirts, jackets, etc.
Read local newspapers for information.
Pick pocket or steal passports, drivers licenses, etc.
A person can be paid to "lose" their passport.
It may be necessary for an agent to estimate distance inside a military base, company, etc. by walking in paces. "The guard shack is twenty two paces from the watch tower."
Agents, especially female agents, can go to bars, restaurants, etc. frequented by military, police, corporate executives, etc. and listen for information. May purposely get enemies drunk and question them, or even steal documents, identification, etc. from them.
A female agent may lure an enemy to a hotel room, or go home with him in order to question him, steal things, or kidnap him. A team of agents may be waiting in the hotel room or may follow the enemy home.
A bomb can secretly be planted in the car of an enemy. If the trunk is rarely used by the enemy, this may be a good place. When the enemy drives to his base or company, the bomb can be remote detonated.
Agents who are legal residents or are illegal agents with forged documentation and cover stories, should be prepared to go completely underground and seek refuge in a safe house, etc. Documents, equipment, gold, diamonds, money, weapons, etc. are stored in a secret location for just such an occasion.
Hidden cameras can be placed on trees and buildings to watch for enemy movements in your territory or enemy territory. Higher positions can observe a larger area and greater distance. A specialized team can infiltrate and secretly plant cameras next to enemy positions.
Monitor police activity on scanners.
Monitor news and television programs and video tape useful information.
Listening posts set up near enemy facilities. Agents secretly gather information.
Parabolic Microphone
Shotgun Microphone
Laser Microphone
Improvised Parabolic Microphone
Improvised Laser Microphone
Inside speakers
Behind the back plate of a mobile phone
A hole in the wall covered over with a poster or picture.
A hole in the wall under a stairway.
Taped to the top of a door.
Inside a smoke detector.
In the freezer
In books
In a basket of dirt clothes
Inside electronics (television, etc.)
In a cat liter box
Inside a bag of dog food or cat food.
Inside the hollow tubes or legs of furniture.
In the steering wheel of a car.
Inside a car door panel
A small piece of paper can be hidden inside a toilet paper roll on the wall.
Inside a guitar or like instrument.
Taped to the underside of a desk, table or chair.
In the small area under the bottom shelf of a bookshelf.
In a false electrical outlet.
At the bottom of tissues in a tissue box.
Hidden in the pot of a plant.
In a street lamp.
In the pockets of a coat or jacket hanging in a closet.
Behind the filter of a heating venting and air conditioning unit.
Under a dogs or cats collar.
In a washing powder box.
Inside a shower curtain rod.
The deliberate intrusion into enemy communications channels for the purpose of deceiving or confusing the enemy.
Guerrillas should be proficient in voice imitation, the enemy's language, enemy communication equipment, methods, call signs, codes, etc.
Enemy communications equipment can be captured, stolen, or perhaps purchased illegally on the black market. Commercial radio equipment can also be modified to produce the desired frequency.
Gain information on enemy numbers, locations, units, etc.
Block enemies from making emergency calls using cellular phones with a cellular phone blocker or cell phone jammer.
Measure distance by pacing
Count the amount of paces it takes you to make 100 meters, 200 meters, etc.
Keep track of the distance traveled by putting a pebble in the pocket every 100 meters, tying a knot in a string every 100 meters, making a mark on a piece of paper or notebook every 100 meters, etc.
If infiltration is planned, so should an exit for the agent or unit.
Beware of cameras and ground sensors. Always try to scout areas out before hand and mark the any camera locations, sensors, watch towers, etc. on maps.
Dress as enemy soldiers or police and infiltrate enemy territory.
Dress as civilian workers and contractors.
Before infiltrating a facility, surveillance of the facility should be made. Maps of the facility can be made with all potential escape routes planned in advance. The best ways to infiltrate the base or facility are marked down and discussed.
Vehicles parked close to a wall or fence can be used to aid in climbing the wall or fence.
Trees with overhanging branches that are close to a wall or fence can be climbed to infiltrate. The same can be said for barrels, crates, etc. positioned near a fence line or wall.
Unattended and unobserved gates with padlocks can be opened by cutting the locks. If the agents decide to escape through the same gate they can replace the lock with a similar one.
Fence lines with loose bottoms can be pulled up by one agent, while another agent crawls underneath. All this must be done lightning fast. When one agent is inside he can pull the fence up for the other agent.
Fences with or without barbed wire can be climbed
Cutting and negotiating barbed wire fences
Concertina wire can be negotiated
The guerrilla should be on his back while cutting the concertina wire. A small path in the wire is created by placing stakes in the ground to hold back the concertina wire on both sides of the newly cleared path.
One guerrilla may lay on top of the concertina wire or a barbed wire fence and allow the other guerrillas to walk over him. The guerrilla should be properly protected from the wire.
One guerrilla can hoist another over barbed wire or concertina wire.
A board, ladder, etc. can be laid across a single row of concertina wire.
Use a diversion to attract the attention of the guard's. Slip an agent through the gate or door. A group of people running up to complain, report about suspicious vehicles or people, etc. can temporarily block the guards view. Shooting, a loud explosion, car accident, etc may temporarily divert the guard’s attention as well.
Peel the base sticker off the car of an armed forces member and place it on the infiltrators vehicle. All dates on base stickers should be current. No expired dates. Base stickers are made to rip apart when being peeled off, so one must be careful. Ice scrappers can be used for this.
Steal the car of an armed forces member with the base sticker intact.
Agents can carjack the vehicle of an armed forces member. The vehicle should have a base sticker. The soldier can be kidnapped or killed and his military identification should be taken. A guerrilla or agent who favors the military member can attempt to infiltrate using his identification and uniform or a similar uniform. The name tag on the uniform must match the identification card.
Steal the military identification card of a soldier. Female members of the German Red Army Faction were known to go to bars popular with U.S. soldiers and get the soldiers drunk. The soldiers were then questioned for information and their identification cards were stolen. The identification cards were then used to enter U.S. military facilities in Germany and carry out attacks.
A car can secretly drop off an individual or a couple of men, then keep going. While no one is watching, the two men quickly jump out of the car, or the back of a pick up truck, etc., and enter a wooded area, climb a fence, etc. The car may act as a diversion while the men infiltrate.
To confuse the enemy as to the size of your unit…
One man may carry another on his back.
The unit can practice walking in one another’s footsteps.
Use the chaos and noise of a mortar or rocket attack upon an enemy base to infiltrate troops inside the base.
If unsure of where key enemy installations or rooms are, follow the guards on patrol. Guards usually patrol around key facilities.
Infiltration By Sea…
Commercially purchased rubber raft
Commercially purchased canoe or kayak
Agent/s or commandos hidden in civilian cargo ship penetrate enemy harbor.
Divers using commercially bought SCUBA gear swim ashore or attack enemy facilities.
If there are enough soldiers, a separate Navy Special Forces or Naval commando unit can be created.
Infiltration By Air…
Civilian Aircraft drop agent or commandos using commercial parachutes, etc.
Civilian or military helicopter/s drop commandos or agent behind enemy lines
A secret “Jump School” for parachuting can be established and maintained.
If there are enough soldiers, a separate paratroop unit can be established. The paratroops can be under the Air Force or Army.
Immediately after an enemy victory.
At night
During a sandstorm or dust storm.
During a blizzard or heavy snowfall.
During heavy rainfall.
During an enemy holiday or celebration.
During a diversion
Rural Scout Movement
Movement of Vietnamese Special Forces (Dac Cong)
Soviet Reconnaissance Movement Methods
Low Crawl
Movement along roads in guerrilla controlled territory
The guerrillas should be well camouflaged to suit their environment.
Guerrillas should be spaced out from one another and walk on either side of the road.
If enemy aircraft approach the guerrillas are to take cover to the side of the road, forest or fields.
Urban Movement
Movement of Conventional Infantry in an Urban Environment
Soldiers should move along in single file on both sides of the street, stay close to the walls. There should be an interval of about 3 yards between each soldier. Each soldier is to watch the windows, doorways of the buildings or houses.
In combat, the soldier is given cover by other soldiers in his unit. Soldiers move from one covered position to another covered position.
Movement between floors
Ninja Walking Techniques
Dealing with Enemies that have Body Armor
27 JUN 2003- Iraqi gunman shoots a U.S. soldier in the neck in a Baghdad market.
Concealing Weapons
Small pistol hidden under hat. Short sleeve shirt on and shirt tucked into pants so as not to arouse suspicion.
Baggy clothes can be used to hide all types of items.
Pistols hidden in large pockets.
Pistols tucked in waste line of pants. May choose to use holster. Concealed under long shirt or jacket.
Knife with blade hidden up long sleeve. Handle hidden in the cup of the hand.
Small pistol hidden in underwear next to crotch. So called "crotch pistol".
Secret pockets made by guerrillas to hide weapons, documents, etc. These pockets may be on the inside of the shirt, jacket, pants, etc.
The length of a carbine is placed along the back. Most of the carbine is concealed from head to buttocks. The gun sling is used to properly position the length of the carbine along the back.
Trench coat used to conceal rifles, shot guns and smaller weapons.
29 OCT 1994- A man pulls out an SKS rifle hidden under his trench coat and begins firing at the White House.
Hand Signals
Guerrilla Communication Methods
Two Way Radios using coded messages
Telephones
Agents or guerrillas can speak in code on regular telephones.
A ground return circuit can be used for telephone communications with a single metallic conductor connecting them. A section of barbed wire fence, one side of a railroad track, an unused power line, or an unused phone line may be used as a conductor. The conductor must be insulated from the ground and the other terminal of the telephone must be connected to a ground connection.
Cellular Phones
Disposable or Pre-paid cellular phones can be used.
Coded messages can be sent over the cellular phone.
Coded Text messages can be sent using cellular phones to avoid enemy eavesdropping.
Many modern cellular phones can be used to send coded or encrypted E-Mail. Any E-Mail sent over the internet can be intercepted.
Couriers
Carrier pigeon
Car lights can be flashed on and off to signal another agent or unit.
Different colored clothes left on a clothesline to relay different messages.
Secret communication tunnels can be dug from one place to another. Messengers can be sent to communicate between units.These tunnels may be small enough to accommodate one person at a time. Sewer systems can also be used. Necessary precautions should be taken to protect the messenger.
Tunnels can be used to run communication wire from one position to another.
Colored rice left behind by an agent as a message to another agent. Different colors may mean different things.
Balled up pieces of white paper can be dropped by an agent at night to mark an area or send a message to another agent.
Use mirrors or lights to communicate coded messages.
Use smoke signals to communicate coded messages.
Agents may communicate using ideograms (substitution ciphering)
Secret Hand Signals
During the U.S. Invasion and occupation of Iraq, guerrillas positioned themselves on rooftops to watch enemy troop movements and warn of oncoming enemy forces by waving flags to other guerrillas positioned on rooftops, like a beacon system.
Very important conversations can be made by government officials or agents without saying a word. Communicate with one another by writing on on a sheet of paper and passing the paper back and forth. When the conversation is over the paper is completely and totally burned up. Nothing left but a small pile of ash. The ashes can also be scattered.
Signals Intelligence
A guerrilla unit can be assigned to monitor and decode enemy communications.
The guerrillas should attempt to acquire enemy radios and communications equipment.
The guerrillas should use and have available to them documents and manuals on intercepting techniques.
Information on enemy communication procedures, call signs, codes, etc.should be familiarized.
Information on enemy troop movements, artillery and airstrikes, landing zones, perimeter defenses, etc. should be extracted.
1 comment:
Exellent stuff! Thank you! We here in Finland are preparing ourselves...
Post a Comment