The Use of Lasers
Laser troops
Electromagnetic Pulse (EMP) bombs
Used to shut down enemy electrical equipment on the battlefield and any enemy operations using electricity within a city for instance.
EMP device operation diagram in theory
EMP troops
Carry equipment or weapons that send out an electro magnetic pulse. The main element carries the device. Security elements may also be used to protect the main element. After disrupting or disabling the electrical equipment or the electrical grid of the enemy, follow up attacks may be done. Follow up attacks may consist of raids on certain facilities, more EMP attacks, etc.
EMP missiles or rockets
EMP hand grenades
Computer hacking
Hacking into enemy drones.
2009- The U.S. military admits that Iraqi guerrillas were able to hack into U.S. drones and view live images from the drones cameras. Some allegedly used software as cheap as $26 called SkyGrabber. Why the U.S. government would make this issue known and then seemingly advertise a product to do it with remains unclear.
Electronically commandeering enemy drones
Captured U.S. RQ-170 unmanned aerial vehicle (UAV) on display
04 DEC 11- Iran captures a U.S. RQ-170 Sentinel unmanned aerial vehicle flying over Iranian airspace.
04 DEC 12- Iranian Revolutionary Guard forces capture a U.S. Navy Scan Eagle drone. The drone was flying in Iranian airspace in the Persian Gulf.
02 JAN 13- Iran states that two U.S. RQ-11 Raven drones had been captured over the past two years and that information off the drones were retrieved. The drones were flying over Iranian airspace.
Night Vision Equipment
FLNC member with Night Vision Goggles (NVG)
Infravision Equipment
Advanced Optics
Hezbollah guerrillas with observation scopes
Advanced Radio and Communications Equipment
Tamil Tiger (LTTE) guerrillas with radio equipment
IRA guerrilla with Eurosonic EU40 citizen ban transceiver radio.
Cellular Phone Blocking equipment
Used to block incoming and outgoing cellular phone calls.
Radio Controlled Weapons
The use of radio controlled (RC) toy aircraft as improvised Unmanned Aerial Vehicles (UAV).
Cameras added.
Radio Controlled (RC) toy aircraft armed with explosive warhead that detonates upon impact. Flown into enemy buildings, vehicles, etc.
Large radio controlled (RC) toy aircraft used to drop bombs, small bomblets, flechettes, etc. over enemy positions.
Effective range of radio controlled vehicle before control or contact is lost by operator must be taken into account.
RC vehicle repainted in appropriate colors or camouflage scheme. Appropriate roundel added.
The use of radio controlled (RC) toy boats and ground vehicles.
Unmanned Aerial Vehicles (UAV) or drones
Also called Unmanned Aerial System (UAS)
Purpose built drones made by the guerrilla forces.
Civilian purchased or commercial drones
PKK guerilla with commercial bought X-UAV Talon drone
Modified IO-30
or Bulgarian made RHV-HEF-LD 30mm grenades used as small bombs for the X-UAV Talon drone used by the PKK.
Drones with cameras can be used to gather intelligence and scout enemy territory
Can have explosives added inside the drone or small explosive devices that detach from the drone.
09 APR 2015 - A drone carrying radioactive sand from the Fukushima nuclear plant is landed on the rootop of the residence of Japanese Prime Minister Abe in protest over the reopening of nuclear power facilities in Japan. The drone was not discovered on the roof until April 22.
Remote Controlled Weapons (Remote Operated or Robotic Weapons)
Pictures from an Al Ansar video showing a Remote Controlled anti-aircraft gun.
Precision Remotes T360 remote operated machine gun
Precision Remotes TRAP T192 remote operated sniper rifle.
The potential use of the tankette in modern warfare.
The tankette is a small, light tank with usually a two man crew consisting of a driver and commander. Initially intended for scouting and light infantry support. Due to their light armor and vulnerability to high caliber weapons, the use of the tankette was abandoned by most nations after World War 2.
The German Wiesel 2 armored vehicle is considered a modern day tankette. It can be configured in a variety of different ways and even has an ambulance variant.
The further technological development of tankettes could lead to the creation of armored Unmanned Ground Vehicles (UGV). Perhaps heavier armor and the addition of remote operating system.
Unmanned Surface Vessel (USV)
Unmanned Underwater Vessel (UUV)
3D printers can be used to make gun magazines, spare parts for guns and even entire guns!
3D printed hand grenades
Cellular Phone blocking or jamming devices can be used to block emergency calls made by the enemy on cellular phones during operations.
Videos
Members of GRAPO issue a video communique.
Members of the Basque ETA issue a video communique.
Attacks, communiques, etc. can be recorded on video and put on Compact Disk (CD) and sold for fund raising or even handed out for free. CD's can be used instead of downloading and uploading videos on the internet. The internet is tightly watched and controlled by government forces.
Counter Recruitment campaign against enemy government trying to recruit young men to fight their expansionist or imperialist wars.
Underground Radio station
Secret Printing Press
Distribution of Leaflets
Posters
Newspapers
Painting slogans
"Yankee Go Home"
"Brits Out"
Painting wall murals
Communique
"Ransom Note" or "Poison Pen letter" style communique
Armed Propaganda
Armed actions by the guerrillas serve as propaganda in itself. This type of propaganda may also include simply the displaying of arms by the guerrillas in a poster or video.
Information DENIAL
One can deny the enemy the ability to spy on you using your own electronic devices by not using electronic devices. This is the most simple and extreme method.
The use of encryption on electronic devices is questionable since many of the companies and people involved develop such technology for police and military forces as well as breaking such codes. Since the governments of many nations initially banned the use of encryption technology but now allow it, one can assume that they have cracked the codes to the encryption. Don't have a false sense of security using such technology. The same can be said for virus protection software. This technology may be fine against computer hackers, scammers and other criminals, but not nation states.
Cellular Phones
Any cellular phone used by the guerrilla should be "clean" and have no search history, no data, no internet watch time, no games played or downloaded, etc. so the enemy cannot gather intelligence on the person and their likes, dislikes, personality, etc. Information denial. The phone should be used only for communication purposes. Certain topics should not be discussed. Certain words should not be mentioned.
Any message sent to other guerrillas can be coded with replacement words. "Repair shop" instead of "headquarters" or "oranges" instead of "grenades. Code names and nom de guerre used instead of real names.
These "clean" cellular phones are either destroyed before mounting an operation or left behind so the movements of the guerrillas cannot be tracked.
Computers
"Unclean" computer
Internet connection.
Used by non guerrilla or non combat guerrilla. Possibly propaganda wing. No real connection to combat forces. May operate in foreign nation that is friendly to the guerrilla movement.
Used to gather and store information.
Used to create propaganda.
"Clean" computer
Webcam turned off or removed.
Webcam covered up.
No internet.
No comments:
Post a Comment