Thursday, March 03, 2011

Guerrilla Tactics



Guerrilla Tactics

The Use of Decoy Rockets and Missiles






Fire decoy missiles and rockets at the enemy in order to overwhelm their anti-missile systems (Patriot, Iron Dome, etc.). Decoy missiles and rockets can be fired first, then followed up by the real missiles and rockets or the decoys can be mixed in with the real. The objective is to get the enemy to shoot down the decoys and possibly run out of missiles. The decoys are, on the other hand, cheap and inexpensive rockets or perhaps some could be specialized missiles that disrupt enemy radar, etc.

Perhaps hundreds of balloons with thin strips of aluminum attached to them are sent up to confuse enemy radar or balloons made of thin foil like material. Done to confuse enemy radar during a missile or rocket barrage.

Decoy rockets positioned on the ground. Perhaps fake ground crews "hiding" nearby. Not too well hidden. Used to draw enemy fire away from real rockets and soldiers.
Used to waste enemy munitions on false targets.




Common Guerrilla Tactics

The guerrillas can draw enemy forces out of major population areas and into remote border sanctuaries where supply and escape can be facilitated. This helps undermine enemy pacification efforts on the civilian population and disperses his forces.

The enemy cannot send large amounts of soldiers to occupy every city, town, village, block, building, etc. The enemy cannot be strong everywhere. If the enemy is strong in one area, he will be weak in another. Attack the enemy where he is weak, not where he is strong. Attack the enemies rear, supply lines, communications, etc. When the enemy sends troops to deal with this threat, attack a different area.

Harass the enemy on all sides to the fullest extent of the capabilities of the guerrilla forces. Weaken the enemy's morale by constant propaganda and terrorist harassment.

At every moment the impression should be created that the enemy is surrounded.


Ambush the enemy with superior forces. Quickly, unexpectedly, and violently attack the smaller enemy force, then quickly retreat using a pre-planned escape route.  Security units may be pre-positioned as well to guard the main ambush unit and cover their withdrawal. An ambush should last no longer than 15 minutes. So called “Hit and run” tactics.


After a successful ambush, set fire to enemy vehicles to completely destroy them. This should be done quickly before enemy reinforcements arrive.

The main source of supply for the guerrilla army can be the enemy. Weapons and equipment are stolen or captured.

The use of a nom de guerre or "war name" by the guerrilla instead of their real name.This practice is similar to how spies and agents use code names.



The Ambush
Islamic Army in Iraq forces ambushing US forces.



Ambush Types











(Urban ambush scene snapshots taken from the movie Clear and Present Danger)


Examples
15 NOV 2002- A Palestinian gunman shoots at zionist settlers and flees. israeli soldiers then return fire and chase the gunman. Forces from Islamic Jihad ambush and kill 12 settlers and soldiers.




Raids




The Scorpion Maneuver
Usually a small, diversionary force makes contact with the enemy while the main force maneuvers to attack the enemy flank or rear.



(Snapshots taken from the National Geographic Channel program "Generals At War: The Battle of Singapore")


The Blooming Lotus Tactic
Tactic in which the guerrillas attack the enemy controlled city or base from the inside-out. The guerrillas may infiltrate the city dressed as civilians. Weapons may be smuggled in separately and hidden before the guerrillas infiltrate the city. The enemy base or city may be infiltrated by sappers. This may also take the form of an armored assault or push into the city or base from the outside and following capture of the city from the inside out. The city is captured from the inside-out, with enemy command, control and communications being captured or destroyed first. This tactic was used extensively by the Viet Minh and Viet Cong.




"Belt grabbing" or "Hugging" tactics
Stay close to the enemy while in combat so the enemy cannot call in air strikes or artillery support without doing harm to his own forces. Forces are between 25 meters to a maximum of 100 meters. Usually less than 50 meters away. These tactics have been used by many forces including Soviet forces in Stalingrad, North Vietnamese and Viet Cong forces, and Chechen forces in Grozny.




Diversionary Tactics
"Make a Noise in the East, and Strike in the West"


Inducing Fratricide
To deliberately get the enemy to attack and kill members of his own military.

The Vietcong would dig spider holes and wait for enemy forces to position themselves on both sides, one group on either side of the guerrilla. The guerrilla would then fire upon one unit and hide once more in his spider hole. The enemy unit that was fired upon only saw the other unit moving in behind them, and opened fire.

Dress up like enemy police or military forces and kill other enemy police or military. This creates an atmosphere of distrust and fear. Set up roadblocks to capture or kill enemies wearing enemy police or military uniforms.

Place or fly your flag on the ground near an enemy formation or on top of an enemy building so that it can be seen by enemy aircraft from above and bombed or fired upon.

Place a device next to a facility that sends a signal that it is an enemy facility such as a radar station, missile sight, etc.



Urban Tactics


Snipers may be placed in masonry buildings on the flanks or rear. They should have a long range field of fire. Snipers should not be placed in obvious such as rooftops or church steeples. A sniper should have multiple positions maintained.

Sledgehammers can be used to knock down walls, create loop holes, mouse holes, etc.

Digging tools can be used to make underground tunnels and trenches.


Subterranean Combat
Sewers and underground Metros or subways systems provide guerrillas with the ability to move around the battlefield undetected, perhaps even the ability to move behind enemy lines and attack from the rear. This advantage can also be used by the enemy. The entrances to the sewers and subway systems near enemy potions can be sealed off and mined or booby trapped. Ambush points can be set. Obstacles made from concertina wire, rubble, furniture, fences, etc. can be placed at intersections in the sewer. These obstacles can be mined and booby trapped also.




Night Vision Goggles and Infrared equipment are very helpful in the dark sewers.

Recognition signals should be made in advance to avoid fratricide.

Sewer patrols

Determine if the air is safe to breath in the sewer before entering.

Smoke can be used to flush enemy forces out of sewers.

Possible use of Unmanned Ground Vehicles (UVG) in the sewers.

Sewers can also be used as a means of running a system messengers to communicate with guerrilla units.

Sewers and subways can also be used as an underground conduit for communications wire.

If a command post is located underground, antennas can be relocated to the upper stories of a building. Field telephone wire can be laid in conduits, sewers, or through buildings.


Historical
Tactics used by Polish resistance fighters in World War 2.
Tactics used by Chechen fighters during the 1999 Russian invasion of Chechnya.




Winter Tactics



Sled
Sledge- A heavy sled
Sleigh- A horse drawn sled with seats.
Skis
Snowshoes

Use of modern day snowmobiles for reconnaissance.

Use of modern day tracked all terrain transport vehicles suitable for use in snow and cold weather such as the Bandvagn 206 or Sisu Nasu.

Aerosani- Propeller driven sled used during the Winter War and World War 2 for scouting and small raids.





Sleigh or sledge pulled by horses or dogs
Ski troops




Machine gun or heavy weapon carried on a sled

Machine gun or heavy weapon on skis


Ambulance sled
White smocks or coveralls for troops made from white linen.
Two man foxholes dug if in the field. Soldiers sleep with their backs against one another for warmth.
White tape or cloth wrapped around non moving parts of rifle for addition camouflage.
Reversible coat with two different camouflage patterns.
Snowsuit
Padded clothes
Layers of clothes may be worn
Charcoal gives off less smoke than using wood for fires.
Sound travels farther in cold.



Sniping
Hezbollah sniper

Tamil Tiger (LTTE) sniper

Mining




Roadside Bombs




Drive-by Shooting
Preferably cars with four doors (hence four windows)
Windows are rolled up until approaching target area.
Guerrillas in back seat can duck down and hide until approaching target area.
Trucks, motorcycles and other vehicles have also be used in drive-by shootings.
May use stolen vehicles
Members of the Basque ETA practice doing a drive-by shooting.



Drive by shooting on a motorcycle or scooter. Can also drive-by and throw hand grenades.












Night Operations

Conduct operations during times of low light or no light
Cut power to an area and move in with night vision equipment.
Use of night vision goggles (NVG), night vision binoculars, scopes, cameras, etc.





Screen shot taken from the movie Patriot Games



Training for night and low light operations without night vision equipment




Patrolling








Infiltrating and Attacking the Enemy Wearing Enemy Uniforms. 
This is often referred to as a "False Flag" attack
Members of Jaish Al Naqshbandia of Iraq wearing police and military uniforms.

So called "Insider Attacks" where guerrillas dress as enemy soldiers or police, or actually join enemy military or police forces and kill enemy soldiers. Specifically target and kill enemy occupation force soldiers.

Examples
DEC 1944- German commandos driving captured Allied vehicles, carrying Allied weapons and wearing captured U.S. and British uniforms infiltrate Allied lines and attempt to cause chaos and disorder in Allied forces rear area. The German forces were led by Waffen SS Colonel Otto Skorzeny.

01 MAY 2003- A U.S. contractor is shot and killed at the King Abdul Aziz Naval base in Jubail, eastern Saudi Arabia. The gunman was dressed in a Saudi naval uniform.

05 AUG 2014- A U.S. general is shot and killed in another "insider attack" in Afghanistan. The gunman was dressed in an Afghan army uniform.





The wearing of civilian uniforms and disguises

Examples
12 APR 2003- A gunman shoots a U.S. marine standing guard outside a hospital in Baghdad. The gunman was with another individual, both of whom posed as landscape workers. Other marines opened fire on the gunman, killing him. The other individual escaped. The gunman was reportedly a Syrian.





Two man infiltration and attack units
Examples
08 MAR 2003- Two Palestinian gunmen attack an illegal israeli settlement. 3 zionist are killed. The two gunmen are martyred. Both gunmen were dressed like Orthodox jews.

10 APR 2003- Two Palestinian guerrillas  infiltrate an israeli army base and kill 2 israeli soldiers. Both Palestinian gunmen are martyred. The PFLP and the Al Aqsa Martyrs Brigade claim responsibility.

08 JUN 03- Joint operation between HAMAS, Islamic Jihad, and the Al Aqsa Martyrs Brigade. Three guerrillas (one from each group) infiltrate an israeli army post and kill 4 israeli soldiers before being killed themselves. The military outpost was located in the Erez crossing between the Gaza Strip. The Palestinians dressed as israeli soldiers. Used assault rifles and hand grenades.











Guerrilla Mortar Tactics
Member of Islamic Army of Iraq firing a few mortar rounds before a swift withdrawal.


LTTE (Tamil Tiger) guerrillas with 120mm mortars.

Heavy mortar mounted on the back of a truck. This tactic has been used successfully by many guerrilla organizations, including the FARC of Colombia and the IRA.



Graphic showing Basque ETA mortar attack.

Van with roof cut out and improvised mortar inside. The mortar is set to fire on a delayed timing device. This tactic has been used successfully by the IRA.

Mortar rounds can be fired over buildings in urban environments


Mortar rounds can be fired over hills.

Forward observers with binoculars and radio equipment may be used to direct mortar fire upon the enemy more accurately. Forward observers can be hidden in tall buildings, trees, etc.

Fire off a few rounds then quickly withdraw. Preplanned escape route. May have security teams in place to protect the mortar team while firing.

Hit and run mortar attack on enemy base or airfields.

Hit and run mortar attack on enemy oil wells or oil storage facilities and refineries.

Mortar attack used as cover to infiltrate commandos onto an enemy base while the enemy takes cover.

Use of small mortars such a 60mm mortars or Chinese made QLT-89 50mm mortars. Very convenient for guerrilla warfare. Perhaps carried in a sack or bag.

Armored mortar carriers or self propelled mortars. Usually carry heavy mortars..

A mortar can be fired from inside a building with a large enough hole cut in the roof. Can be used in a hit and run attack or used to defend a position. The hole can have a cover that can be removed and quickly repositioned. 

Concealed underground mortar positions. Reinforced concrete. Sliding metal top. Open top. Fire a couple of mortar rounds and quickly close the top before counter battery fire.














120mm mortars
82mm and 81mm mortars
60mm mortars

Improvised Mortars

Laser guided 120mm mortar rounds such as the Swedish made STRIX, Russian made GRAN, and the U.S. made M395. Capable of armor penetration and top attack on enemy tanks and armored vehicles











Maskirovka




"To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." -Mao Tse Tung







“Red Curtain”



Deception Strategy for an Offensive

Many tactics can be used to deceive the enemy before launching an offensive against him. Only top ranked officers are told of the offensive and other information on a need to know basis. A false truce can be created, while one secretly builds up his forces and trains, arms, and equips. The exchange or the releasing of prisoners can be discussed to give the enemy the idea that the conflict is coming to an end. When the offensive begins, diversionary attacks can be made away from the intended combat area to divert and divide enemy forces.



Deception Strategy on the Defensive

If your forces have been hurt badly or are in a defensive position, convince the enemy that you are preparing to attack and a large scale, conventional attack or battle is upcoming. Release false documents, radio traffic, and internet activities.

Convince the enemy that you are preparing to overrun him. Use phrases like “Great and final victory”, as used by the North Vietnamese, or a “Spring Offensive”, as used by the Taliban to deceive the enemy.



Empty cargo trucks can be driven from one point to another, to simulate the build of of troops and equipment for an offensive. Empty crates can be unloaded from the trucks.



Tactics

Street signs can be taken down, switched, or painted over to confuse the enemy.



False maps can be printed out. Certain places and facilities can be left out. Streets can be given the wrong names, and printed going in the wrong direction. False dead end streets can be added, or streets with real dead ends can be omitted.



A real functioning bridge can be made to appear to be bombed out, while a decoy bridge is placed a bit further away.



High value targets can be made to appear to be of little or no value.



False targets should be placed in an area in which they are expected.



A false airfield can be created so the enemy can bomb it or capture it. If it is likely that the enemy may attempt to capture the fake airfield, booby traps and land mines can be set.



Simulated bomb craters on an airstrip can be made with paint and dirt and rock placed around the simulated bomb crater.



A decoy artillery battery can be positioned, but poorly camouflaged.



Damage to a vehicle or structure can be simulated.



Fuel barrels can be placed near decoys to simulate larger explosions or a secondary explosion.



Old tank hulls can be used as decoys. Fuel barrels can be placed inside or near them to simulate the explosion of fuel and ammunition.



Old tank turrets can be made into decoys by placing them atop wooden frames and painted.



Smoke pots can be used to degrade the laser designation of targets and to feign damage. 55 gallon barrels with oil work well.



Aircraft can drop empty supply containers.







Decoys

Decoy Artillery

Decoy Rockets

Decoy Missiles

Decoy Tanks







Decoy Aircraft


Decoy Surface-to-Air Missile system


Decoy Radars or Radar Vehicles

Decoy Trucks



Decoy Submarines

Decoy Ships
Fake Encampment




Decoy tank and artillery piece.


Vehicles can be hidden in garages or camouflaged and hidden outside. Vehicles can be hidden in the shadows of buildings or false building extensions can be added.



Fake houses or structures can be built to hide air defense weapons inside. When enemy aircraft approach, the structures sides open up revealing the weapon.





Toy guns painted to look real.

Carved wooden replicas of common guns and weapons (grenades, rockets launchers, rockets, missiles, mines, etc.), painted black or olive green. Slings can be added to the fake rifles. Guerrillas can attack at night to increase the effectiveness of the deception. Can use a mixture of real weapons and fake weapons. Take enemy weapons, free prisoners, etc. This tactic was used by the EZLN (Zapatistas) of Mexico during their uprising.






Dummies

Dummy paratroops can be dropped.








Dummies can be placed in fake encampments and booby trapped with explosives before the enemy arrives.


A partially exposed or a not too well concealed dummy sniper can cover an area. A real sniper can fire once, then quickly leave the area, holding the enemy off for a while. A real sniper can be positioned on the opposite side of the dummy, to kill any enemy snipers, officers, radio operators, etc.



Camouflage


Disruptive painting


Nets and Screens

Multi-spectral camouflage netting such as the Barracuda by Saab. Provides cover from enemy radar and thermal infrared.





In rural environments, the camouflaging of troops and vehicles is very important.



To Counter Thermal Detection...

Increase the amount of heat in the entire area by using heaters.

Disperse the heat evenly throughout the area. Pipe the heat underground and away from the area.



Cover truck engine with aluminum foil to cover up the vehicles emissions.



To Counter Radar Detection...

The use of radar reflectors



Radar reflectors may be pyramid, spherical, or dipole shaped. Radar reflectors reflect radar energy back. They can be suspended in a pair by a road or scattered in an area. A radar reflector will indicate something is present, but not give the exact nature. Radar reflectors can be made out of wood and metallic foil. They can be used to alter the environment. They can be used to create the false radar impression of a bridge. They can be placed on or beside decoy tanks, in order to give the decoy tanks a false radar signature.



Radar reflectors usually consist of three conducting metallic surfaces or screens perpendicular to one another.






Individual Camouflage


Urban Guerrilla Camouflage Civilian clothes are worn in an urban guerrilla environment. In an urban guerrilla war, the guerrilla should make every effort to blend in with the populace. 
"The guerrilla must move among the people as a fish swims in the sea."- Mao Zedong

Rural Camouflage Camouflage uniforms and foliage
Tamil Tiger (LTTE) guerrillas in "Tiger Stripe" jungle camouflage.








Vietnamese Special Forces (Dac Cong)



Cuban Special Forces


Improvised rural camouflage using olive green, forest green, or black civilian clothes. 



Viet Cong



The adding of foliage

Camouflage face paint

Nets or veils to cover the face




Desert Camouflage 
Improvised desert camouflage using sand colored civilian clothing depending on the conditions or the operation.

Urban Camouflage
Worn during a more conventional conflict.

Improvised urban camouflage using civilian clothes.  Grey shirt and grey work pants with cargo pockets for example to camouflage in a heavily urbanized area,


Black or dark blue civilian clothes for night operations

A black shirt with writing or images on it can be reversed and turned inside out.

Two layers of clothes can be worn on an operation or another set of clothes can be carried in a bag. Camouflage uniform under civilian clothes or civilian clothes under camouflage uniform depending on the situation. Infiltrate wearing a police uniform, and exfiltrate through a wooded area wearing a camouflage uniform. Infiltrate at night wearing dark clothes and exfiltrate later wearing construction workers clothes and hard hat.



Winter Camouflage



Chechen fighters during the Battle of Grozny.


Chechen fighters during the 1995 Battle for Grozny



Soviet soldiers during World War 2 with winter smocks

Improvised Winter Camouflage
Consisting of white civilian clothes. White bed sheets can be turned into smocks and worn over protective layers of clothes.






Concealment 









Proper and improper concealment from Soviet Reconnaissance manual.



Ninja concealment methods
Uzura Gakure (Quail Hiding Technique) 




Tanuki Gakure (Badger Hiding Technique)


To hide in a dark corner of a room
To hide behind and object
To hide in an object
To hide under an object




Guerrilla Anti-Tank Tactics
HAMAS members with RPG-29 anti-tank rocket launcher.


Roadside Bombs



In 2002, the Palestinian Popular Resistance Committees used approximately 80-100kg of explosives to destroy a Merkava tank.



23 MAR 04- A hidden underground bomb flips an israeli tank over. 2 soldiers inside slghtily injured. HAMAS and Al Aqsa Martyrs Brigade issue a joint statement of responsibility. A 100-150 kilogram bomb used in this attack.





Roadside Bombs with Shaped Charges



Car bombs can be parked along a street or road and remotely detonated when the enemy passes by. A series of multiple car bombs can be used to attack an enemy convoy. Car bombs can be positioned on both sides of the street. Small or narrow streets would be more ideal for this type of attack.



A parked suicide car bomber can wait for the enemy vehicle to approach, and then pull out suddenly and detonate.



Driving in the opposite lane of traffic, a suicide car bomber can veer into the other lane and detonate when an enemy unit drives by. To attempt a car bombing while in the same lane may prove unsuccessful, because the enemy has guns pointed all around and there is no opportunity for a sudden attack. The driver would have to speed up while approaching the enemy or slow down, which would be very suspicious.



A brave guerrilla can run up to a tank or armored vehicle and throw an anti-tank mine right under the tracks or wheels of the vehicle. The mine may have an external fuse added.



Tank Dead Space



Anti-Tank Mines


A row of anti-tank mines on a board can be pulled across a road or path in front of an oncoming enemy armored vehicle.


Off Route Mines






Tank Stalking



Reports from Afghanistan and Pakistan of guerrillas running into the street and detonating their explosives next to an armored car.



Anti-Tank Ditches

An anti-tank ditch should be a minimum of 6 feet deep and 10 feet in length. A 4-foot “spoil pile” can be made at the opposite side of the approach.








Covered Anti-Tank Trap

An anti-tank ditch can be covered with foliage, camouflage netting, a large tarp and leaves, dirt, sand, etc. to conceal the trap.



Anti-tank mines can be placed at the bottom of a trap.


Anti-Tank Guided Missiles (ATGM)

Hezbollah guerrilla with AT-3 Sagger (9K11 Malyutka) wire guided anti-tank missile


 Hezbollah guerrilla with TOW anti-tank missile.



Hezbollah guerrilla with AT-5 Spandrel (9M113 Konkurs) anti-tank missile.

Wire guided anti-tank missiles

Laser guided anti-tank missiles


Shoulder fired anti-tank guided missiles such as the ERYX and the MBT-LAW
 


Shoulder fired Anti-Tank Rocket Launchers

FLNC members with shoulder fired anti-tank rocket launchers.


Basque ETA member with shoulder fired anti-tank rocket launcher.





Shoulder fired anti-tank rocket launcher tactics

LTTE (Tamil Tiger) guerrilla with Type 69 rocket launcher.




North Vietnamese soldier with RPG-2 or B-40 anti-tank rocket launcher.

Use of new RPG-7 rockets such as the PG-7VR that have tandem warheads for greater armor penetration capabilities and potential to defeat explosive reactive armor.





Anti-Tank Hunter/Killer Units

Hunter/Killer units are trained to hunt and destroy enemy tanks. A team consists of one or two men armed with shoulder fired anti-tank rockets launchers to engage enemy armor, while a sniper and a machine gunner engage enemy infantry. These tactics were used successfully by Chechen fighters against Russian forces.



Engaging Tanks With Reactive Armor

Two or more guerrillas with shoulder fired anti-tank rockets launchers engage one enemy armored vehicle with explosive reactive armor. The first guerrilla attempts to blow a hole in the reactive armor. The second and any successive blasts are aimed at penetrating the tanks armor.


Use of special anti-tank rocket launchers such as the Russian made RPG-30, specifically designed to defeat Explosive Reactive Armor and other counter measures.



Anti-Tank Rifles or Anti-Material Rifles
Moro Islamic Liberation Front (MILF) guerrilla with .50 cal rifle.




Islamic Jihad member with .50 cal rifle


HAMAS member with .50 cal rifle




.50 cal (12.7x99mm NATO) rifles such as the Barrett M82A1 and Steyr HS 50
12.7x108mm rifles such as the Russian KSVK
14.5mm rifles such as the World War 2 era PTRD.
20mm rifles such as the NTW-20

Special armor piercing or armor piercing incendiary ammunition.
SLAP .50 cal. ammunition
Raufoss .50 cal ammunition

Establish training program for snipers


Information on enemy armor weak spots and best positions to attack on each type of armored vehicle.


Historical examples of the anti-tank or anti-material rifle include the PTRD-41 used by Soviet forces during the Second World War.












Anti-Tank Grenades Anti-Tank Grenades such as the RKG-3 can be thrown at enemy vehicles.











Molotov Cocktails (Fire Bombs)





Tactics used during the 1956 Hungarian Uprising against Soviet forces


World War 2 illustration on an anti-tank trap







Guerrilla Air Defense




Resistance fighters against US invasion forces in Iraq display shoulder fired surface-to air missile launchers.





Before the outbreak of hostilities with an enemy nation, agents or commandos can be positioned inside (if possible) or right outside enemy airbases. Intelligence is gathered and a secret air defense network is set up. Shoulder fired Surface-to-Air missiles are used to shoot down enemy aircraft as they take-off or land at the airbase. If the commando unit is large enough and the operation is practical, the airbase can be raided.



If having commando units near the enemy air base is not practical or probable, an agent with a cellular phone or some other communications device can be positioned to warn of enemy exercises or movements. Aircraft numbers, type, weapons and equipment (if it is possible to ascertain them), serial numbers, squadrons, base of origin, take-off and landing times are all recorded. This agent or agents are charged with reporting this data back to a command post or headquarters for reference and warning the guerrilla forces of a possible attack.


If no commando units or agents have been positioned ahead of time, an attack on the enemy air bases should eventually be planned and carried out by commandos and assault forces regardless. To destroy enemy aircraft on the ground or overrun an enemy airbase is good air defense.


North Vietnamese forces overrun the Bien Hoa airbase April 25th, 1975


North Vietnamese forces overrun the Tan Son Nhut airbase November 30th, 1975


Aftermath of an Ejercito Popular Boricua (EPB) or Macheteros attack on a US airbase in Puerto Rico on January 12th, 1981. The attack destroyed or damaged ten A-7 Corsair II attack aircraft and one F-104 Starfighter aircraft.




Illustration of an airfield raid from the book Total Resistance by Hans Von Dach



Secret tunnels can be dug under enemy bases allowing guerrillas to launch a quick raid into the enemy base or overrun the base completely. If overran, the base can be held or the guerrillas can quickly withdraw after taking necessary weapons and supplies and setting the reminder of the base on fire.






Create a dense air defense network with overlapping and redundant coverage.




Yugoslavian Air Defense Tactics

Tactics used during the 1999 U.S. led NATO attack on Yugoslavia

Missile and radar sites can be fortified with concrete and steel and hidden underground.

Turn radars off, visually track the enemy aircraft. When the enemy aircraft approach the area, quickly turn the radars on, lock on to enemy aircraft and fire, quickly turning the radars off again afterwards.

Some anti-aircraft missiles have cameras on them. Others can have cameras added to them. After firing, the missiles can be tracked visually.



Towed surface-to-air missile launchers or anti-aircraft guns can be positioned on rooftops and hidden. Can be made to look like part of the building or hidden in a fake structure. When enemy aircraft approach, the structure opens up and the anti-aircraft unit opens fire. The anti-aircraft weapons can be lifted onto the building by helicopter. The artificial structure is prepared in advance.


Heavy anti-aircraft weapons can be lifted by a crane or helicopter and placed atop a building. Some weapons may be brought up to the roof top by a freight elevator of a building if the weapon is small enough such as a heavy machine gun. Some weapons may be disassembled and taken to a roof top piece by piece then reassembled.




Radar



Celldar (Cellular Radar)
Concept. So called "Passive Radar". Cellphone signals are reflected off of aircraft.





The Silent Sentry concept by Lockheed Martin uses FM radio stations.




Aircraft Spotters
Poor Mans Radar



Aircraft spotters can act as a sort of Poor Mans Radar and can be strategically positioned along the border with hostile nations

They can give advanced notification for air defense teams or air raid warnings so others can seek shelter
 
Aircraft spotters can also provide service in areas where there are gaps in radar coverage.

Aircraft spotters study and familiarize themselves with enemy aircraft.

Should be equipped with a radio or some type of communication device and possibly a GPS locator. 
 
Should have binoculars 

Spot and relay information to headquarters
 
Incoming enemy aircraft and drones are plotted on board by  at headquarters. All necessary forces are warned of impeding attack.
 
Listen for the noise of propellers or jet engines.
 
May be auxiliary military or civilian volunteers
 
Historical Examples:
The Ground Observer Corps of the US Air Force during World War 2 and the Cold War era


 
 
The Ground Observer Corps of the Royal Canadian Air Force during World War 2 


 
 
The Volunteer Air Observers Corps of Australia during World War 2


 
 
The British Royal Observer Corps during World War 2 during World War 2 and the Cold War era





 
Aircraft spotters of the Auxiliary Territorial Service during World War 2
The Auxiliary Territorial Service (ATS) was the womens branch of the British Army during World War 2



 


 
 
 
 
 
 

Shoulder-fired surface-to-air missiles


Hezbollah guerrilla with SA-7 shoulder fired surface-to-air missile launcher.


23 March 1973- PAIGC guerrillas in Guinea Bissau shoot down 2 Portuguese Fiat G.91 aircraft using SA-7 surface-to-air missile launchers. Six weeks later another Fiat G.91 and a Dornier Do 27 were shot down.

Numerous examples of aircraft and helicopters being shot down by shoulder fired surface-to-air missiles in Afghanistan, Chechnya, Iraq, etc.




The RPG-7 can be used to shoot down low flying helicopters when taking off or landing. Multiple RPG's can be used to saturate the target. This tactic has been successfully used in Afghanistan, Chechnya, Iraq and Somalia to name a few. When firing upwards the guerrilla must beware of the rocket blast.


Many modern anti-tank guided missiles (ATGM) have the ability to fire at low flying, slow moving aircraft like helicopters and unmanned aerial vehicles (UAV).



The use of tracer ammunition in anti-aircraft guns can help with the aiming of weapons during day or night and helps anti-aircraft teams track enemy aircraft and concentrate their firepower. When used in machine guns, tracer rounds are often loaded every fifth round in the machine gun ammunition belt. One negative aspect of using tracer ammunition is that the tracer also reveals the position of the gunner.



 
Towed anti-aircraft gun or machine gun mounted on a truck or utility vehicle for mobility.
Islamic Army in Iraq fighters with anti-aircraft in truck.


Chechen fighters during the Battle for Grozny.



Interlocking Heavy Machine Gun positions on the crest of hills along likely avenues of approach.
JAAMI fighters in Iraq with DShK heavy machine gun.



A group of soldiers fire upon the same target en masse. Anti-aircraft teams use strict fire discipline and only fire upon enemy aircraft when the best opportunity presents itself. 


Heavy caliber machine guns or heavy caliber automatic rifles can be used to shoot down helicopters and low flying aircraft.
Hidden on rooftops to increase effectiveness.
Hidden on hilltops to increase effectiveness.
 Iranian soldier with the Arash anti-aircraft/anti-material guns

 Cuban soldiers with Mambi anti-aircraft/anti-material guns



Enemy aircraft are most vulnerable to small arms fire during take-off and landing.


Anti-Helicopter Ambushes and Anti-Helicopter Operations















The use of modern Anti-Helicopter landing mines







Lasers and laser pointers used to temporarily blind enemy pilots. As of 2008, laser pointers have been used numerous times across the United States, temporarily blinding the pilots of low flying aircraft and helicopters. Not recommended against armed military aircraft. Many precautions have recently been taken by military and police forces against this type of attack.
 

Larger sized mobile air defense weapons can be hidden in garages, fake buildings can be made to hide air defense weapons or false building extensions can be added to a structure. 


Example of a decoy building from "Camouflage and Deception for Urban Warfare"






Air Raid Precautions

Lights in a city, base, etc. are turned off at night or before an air raid.



Windows are taped up to prevent glass from shattering and flying inside.



One man bomb shelters can be made along the sides of a road or street. The shelters can be spaced about apart. Can be simple holes dug in the dirt, or concrete lined shelters.



One man bomb shelter used in North Vietnam during the war.


Hanoi citizens making individual air raid shelters



Subways or Metros are made fairly deep underground and double as air raid shelters during times or war.





Improvised Surface-to-Air missile


Improvised shoulder fired Surface-to-Air missile or rocket launcher 
Characteristics:
Long tube made of aluminum or PVC pipe?
Tube length? Approximately 1.5 meters in length? Tube should be longer in back.
Battery
Trigger assembly
Wires that connect from battery to trigger and battery to rocket motor?
Handles or hand grips
Optical sight?
Disposable or reusable launcher?

Proximity fuse on missile or rocket (unguided) warhead?
Impact fuse on missile or rocket warhead?

Hundreds of metal balls or ball bearings in explosive warhead?
Type of rocket engine used?
Rocket fuel used?
Range of rocket?
Type of explosives used in warhead?
How much explosives in warhead? 370 gram? 380 grams?



Books and Manuals on Air Defense:
Guerrilla Air Defense: Anti-Aircraft Weapons and Techniques for Guerrilla Forces- James "Doc" Crabtree









Guerrilla Mobility

During the guerrilla warfare stage, it may be necessary to hide the movements of small guerrilla forces in unmarked civilian vehicles. 
During the mobile warfare stage of the conflict, however, when the fighting becomes more conventional, mass transport of guerrillas to and from the area of operations can be done. This mass transport should be done in territory controlled by the guerrillas.

Proper security measures should be taken along the routes.

The enemy should lack air power, or proper guerrilla air defense should be utilized to protect the mobile forces.

If spotted by enemy aircraft, guerrilla forces can attempt to scatter and hide in a forested area if possible. May be able to drive the vehicles off road and hide under tree cover and dense bush.

Cars
Fake license plates or stolen license plates can be used during the guerrilla warfare stage of conflict. The license plates can be completely removed during the mobile warfare stage.

Trucks







 
Motorcycles 
Often used by scouts in rural areas. Utilize speed instead of armor. Off road bikes are especially good for scouting.

Tamil Tiger forces on motorbikes






Hezbollah soldiers on motorbikes

Often used to rapidly transport special troops from one area to the next. Special soldiers on motorbikes armed with anti-tank rocket launchers can be sent to engage enemy armor. Soldiers with surface-to-air missiles can quickly cover an area to engage enemy aircraft. Used like a rapid reaction force.

Motorbikes have been used in numerous attacks for decades by urban guerrillas. These attacks have included drive-by shootings and the throwing of grenades. Motorbikes offer the guerrilla the ability to speedily get away and negotiate narrow streets and and alleyways in cities.


Bicycles 
Bicycles can be used to rapidly transport guerrillas from one area to another in a secure zone controlled by the guerrillas. 
The enemy should lack air power so as not to harm the bicycle riding guerrillas while on the move. If enemy aircraft are spotted the guerrillas should disperse and take cover under trees, in bushes, tall grass, etc. Cyclists should ride a certain distance apart from one another and not bunch up.

The bicycles can be used instead of automobiles if the guerrillas lack fuel for their vehicles or lack vehicles in general. 

Liberation Tigers of Tamil Eelam (Tamil Tigers) on bicycles



Japanese soldiers on bicycles rapidly moving in Malaya


German Volkssturm on bicycles carrying Panzerfaust.

Urban guerrillas in civilian clothes can be used as scouts or used to patrol an area.

Bicycles can be used to carry supplies

Viet Cong porters using bicycles modified to carry large amounts of supplies. These modified bicycles were meant to be pushed and not ridden. 




Boats As a Method of Transport




During the Second Battle of Elephant Pass in the year 2000, LTTE Sea Tiger forces landed around 1,200 guerrillas behind enemy lines. Done during the mobile warfare stage in the conflict where fighting becomes a bit more conventional.







Horses and mules may be used to carry guerrillas and supplies over rough terrain or may be used if that is all that is available to the guerrillas.






Miscellaneous Tactics
Make false emergency calls to enemy police forces and set an ambush for them.

Monitor police and emergency services activities using a scanner set to the appropriate frequency.

Lure and kill an individual enemy policeman or soldier and take his weapon.

Set an enemy facility on fire and shoot at firefighters when they arrive to stop or delay them as long as possible from putting the fire out. The firefighters will be forced to wait for police protection to arrive before they can put out the fire.

Throw grenades, firebombs, chunks of concrete down from freeway overpass at enemy police or military vehicles.


A metal wire can be stretched across the oncoming path of an enemy motorcyclist at night. 








Sabotage


Oil pipeline sabotaged by Iraqi guerrillas on June 22 2003 after the U.S. invasion and occupation.





Arson as a Weapon
"There are five ways of attacking with fire. The first is to burn soldiers in their camp; the second is to burn stores; the third is to burn baggage trains; the fourth is to burn arsenals and magazines; the fifth is to hurl fire amongst the enemy."
-Sun Tzu





Vandalism to enemy vehicles and buildings
Spray painting graffiti on enemy vehicles and buildings

Strategic Sabotage
“Strategic Bombing” campaign

Strategic sabotage can paralyze a nation.

Strategic Sabotage

Attack vital strategic targets such as:
Factories
Railroad tracks
Bridges
Tunnels
Oil Pipelines
Natural Gas Pipelines
Canals
Electrical or Power Grids
Military Installations
Dams
Oil Storage tanks
Communications

Tactics

Pot Holing roads

Roadblocks





Touches de Piano “Piano Keys” on roads
a series of trenches spaced to make it impossible for a vehicle to "zig zag" around. Deep ditches are dug at regular intervals across 2/3 of the road. From one side, then the other side of the road on the next row. This allows for the passage of civilians on foot or bicycle.

Trees, telephone or power lines can be cut to delay or stop an advancing enemy force. Great care must be taken when doing such.

An electrical fuse in an a building or room can be blown out by cutting off the light in the room, placing a coin in the light socket, then screwing the bulb back in. When the light is cut on, the fuse is blown.

Firebombs can be thrown at enemy fuel storage areas, gas pumps at gas stations, etc.

Nails or caltrops can be scattered on the street before an enemy vehicle approaches.

Nails or caltrops can be secretly placed under the tires of parked enemy vehicles.

Vehicular Sabotage
Stab or slash the tires of an enemy vehicle using a sharpened screwdriver, an ice pick, knife, etc.

The lug nuts can be loosened on the wheels of an enemy vehicle. This may require the removal of the hubcaps. The loosened lug nuts may completely fall off, causing the wheel of the vehicle to fall off while the vehicle is on the road.

Destroy the engine of an enemy vehicle by pouring sugar, dirt, or water into the gas tank of an enemy vehicle.

Firebombs can be thrown at enemy vehicles while they are parked on the street, in a garage, etc.

Remove certain components from an aircraft.

Destroy multiple transmission towers. The copper wire can be removed from them for resale to fund further operations. Enemy repair crews can be ambushed to slow down or stop the transmission towers from being repaired.

Illustrations from the CIA Sabotage Manual with instructions in English and Spanish. This manual was originally intended for the the CIA backed Contra rebels fighting the new Sandinista government of Nicaragua.
























Can deliberately come to work sick in order to spread the flu, cold, etc. to other employees.



Improvised Weapons and Devices for Sabotage

Light Bulb used as a detonator
Carefully file a hole in the top of a light bulb or place the flame of a candle to the top of the bulb until it is heated properly. Place the heated portion of the bulb in cold water. A hole should crack in the bulb.
A wire is soldered to the end of the light bulb.
The other end of the wire is tied around a point on a battery.
Another wire connects to the other point on the battery and a switch.
The light bulb with the exposed filament is placed inside an explosive compound, filament side down inside the compound.
If no blasting cap is available, tie a double knot at the end of a fuse.

A Cigarette Time Delay Device for Explosives can be made by tying a cigarette to the fuse of a bomb with a small string or wire.

A Cigarette Time Delay Device for an Incendiary device can be made by opening a book of matches a refolding the book inside out. Place a cigarette in between the actual matches and the cardboard behind the matches. The device can then be placed on top of a pile of oily rags or some other combustible material.

A small incendiary kit can be hidden inside an ink pen. The kit may include a couple of matches and a small strip of oil or gas soaked cloth.

Light bulb Firebomb
A firebomb made from a light bulb can be made by pouring gas mixed with small engine oil (this mixture is called fuel oil) and a little tar inside of a hole in a light bulb. The hole is taped up. The tar is meant to help the fuel oil mixture stick to its target. A small piece of cloth (which can be twisted) is wrapped around or taped to the bottom of the light bulb. This small piece of cloth acts as a fuse when lit. After the light bulb is thrown, it shatters on impact, causing the lit cloth to ignite the fuel oil mixture. The light bulb firebomb can be carried in an empty tin can to prevent the bulb from breaking. The tin can be hidden inside a large pocket, under the arm, inside a coat, bag, etc.




16 APR 2013- Sniper attack on a power substation located outside San Jose, California, The attack damaged 17 transformers and causes an estimated $15 million in damage.






Espionage



"Be subtle, be subtle and use your spies for every kind of business."

"Spies are a most important element in war, because on them depends an armies ability to move."


Strategy
"Armies of Spies"
Hundreds or thousands of spies, moles, saboteurs, etc. flood the enemy nation  before the outbreak of hostilities.

Do not spend any money on basic research. Steal advanced technology from the enemy.

May choose to steal weapons and technology from a smaller nation that purchased weapons or technology from the main enemy nation. May find the facilities and safe guards less well protected.

Lists of foreign weapons and technology that are to be stolen are drawn up.


May choose to have two or more spy organizations of equal power and strength, so that no one organization can become too powerful and threaten the government itself. Counter-balance.






Spy craft

Acting

Disguise kit

Disguises
Makeup, uniforms, shoe lifts, badges, fake glasses, Identification cards, contact lenses, fake tattoos, wigs, fakes beards and mustaches. Extra clothing added in layers.

Eye glasses with rectangular shaped lenses to disguise the features of the face?

Go through the enemy’s garbage to gather information. It could be an individual, a business, in or around a military installation, etc. Wear gloves to protect hands and not leave fingerprints.

Instead of walking out of a facility with stolen documents, you can take pictures of them with a small, concealable camera. This way, the enemy never realizes the information has been stolen, because nothing is missing or out of order.

Spies disguised as tourists.

Spread rumors to cause panic and mass hysteria among the enemy.
 
Most agents use Code Names instead of using their real names when dealing with one another. Agents often use false identities when dealing with the public.

"Aunt Minnies" are innocent ground level photographs found in magazines, books, and postcards of an enemy facility or target. The photographs may include friends or relatives of the photographer with vital intelligence in the background. Aunt Minnies may be necessary if it is not possible to obtain satellite photos, images from the internet, or photos obtained from an agent conducting a reconnaissance mission.

An agent can take notes and even make primitive maps using a small pencil stub and a small piece of paper placed in their pocket. The agent should practice writing with their hand in their pocket.

Blackmail can be used as a means to get the enemy to pass information.

A flashlight can be used to secretly carry rolls of coded papers.

Create a network of safe houses. Safe houses

False documents can be carried by an agent and presented along with a cover story if necessary. An entire department devoted to false documents can be created.

Post cards with prearranged texts can be sent through the mail to relay whatever message.


Spy Dust
Nitrophenylpentadienal (NPPD)
Used to secretly track enemy activities. Applied to clothing, cars, steering wheels, door knobs and other objects used and touched by the enemy. Can be seen with an ultraviolet light.


Dead Drops or Dead Letter Boxes
Dead Letter Boxes may be used to store weapons, money, documents, equipment, etc. They may come in the form of a fake rock, a crack in a tombstone, a loose brick in a wall, a hollow fence post with a cap or top, a container submerged underwater, etc. The dead drop must not be prone to accidental discovery. The dead drop should be in a place where the agent has plausible excuse for being there at any given moment. A different dead letter box may be used each time information is transmitted. As a rule, a dead letter box may only be used once. One agent may deliver the information to a dead letter box in a shop, etc. then several hours, or perhaps days later, the information may be retrieved by another agent. 


P.O. (Post Office) Boxes can be used to send coded information.

Circular glass cutting tool with suction cup used to cut hole in window or glass door.

Lock picking tools:
Lock picks
Lock picking gun

Survey the area and make sure no one is watching and there are no cameras. Listen for noise inside first.
Crouch low or kneel while picking locks.


Use of so called "Bump keys" or "Jiggler keys" for surreptitious entry. 

Tape over lock method

Silencers disguised as flashlights or large flashlight with silencer hidden inside.

Miniature video camera hidden in a hat.

A bomb disguised as a piece of coal or a rock.

Tire slashers can be used to quickly sabotage enemy vehicles.

Secret pockets can be added to pants (inside the thigh, or inside the turn up of each pant leg), shirts, jackets, etc.

Read local newspapers for information.

Pick pocket or steal passports, drivers licenses, etc.

A person can be paid to "lose" their passport.

It may be necessary for an agent to estimate distance inside a military base, company, etc. by walking in paces. "The guard shack is twenty two paces from the watch tower."

Agents, especially female agents, can go to bars, restaurants, etc. frequented by military, police, corporate executives, etc. and listen for information. May purposely get enemies drunk and question them, or even steal documents, identification, etc. from them.

A female agent may lure an enemy to a hotel room, or go home with him in order to question him, steal things, or kidnap him. A team of agents may be waiting in the hotel room or may follow the enemy home.

A bomb can secretly be planted in the car of an enemy. If the trunk is rarely used by the enemy, this may be a good place. When the enemy drives to his base or company, the bomb can be remote detonated.


Agents who are legal residents or are illegal agents with forged documentation and cover stories, should be prepared to go completely underground and seek refuge in a safe house, etc. Documents, equipment, gold, diamonds, money, weapons, etc. are stored in a secret location for just such an occasion.

Intelligence Report or Intelligence Bulletin sent out to officers and soldiers to familiarize themselves with enemy weapons, equipment, tactics, etc. Similar to the "Know Your Enemy" manuals.

Hidden cameras  can be placed on trees and buildings to watch for enemy movements in your territory or enemy territory. Higher positions can observe a larger area and greater distance. A specialized team can infiltrate and secretly plant cameras next to enemy positions.

Monitor police activity on scanners. 


Monitor news and television programs and video tape useful information.

Listening posts set up near enemy facilities. Agents secretly gather information.

Parabolic Microphone

Shotgun Microphone
Laser Microphone

Improvised Parabolic Microphone
Improvised Laser Microphone



Hiding Small Items or secret messages:
Inside speakers
Behind the back plate of a mobile phone
A hole in the wall covered over with a poster or picture.
A hole in the wall under a stairway.
Taped to the top of a door.
Inside a smoke detector.
In the freezer
In books
In a basket of dirt clothes
Inside electronics (television, etc.)
In a cat liter box
Inside a bag of dog food or cat food.
Inside the hollow tubes or legs of furniture. 
In the steering wheel of a car.
Inside a car door panel
A small piece of paper can be hidden inside a toilet paper roll on the wall.
Inside a guitar or like instrument.
Taped to the underside of a desk, table or chair.
In the small area under the bottom shelf of a bookshelf.
In a false electrical outlet.
At the bottom of tissues in a tissue box.
Hidden in the pot of a plant.
In a street lamp.
In the pockets of a coat or jacket hanging in a closet.
Behind the filter of a heating venting and air conditioning unit.
Under a dogs or cats collar.
In a washing powder box.
Inside a shower curtain rod.



Imitative Communications Deception (ICD)


The deliberate intrusion into enemy communications channels for the purpose of deceiving or confusing the enemy.
Introduce information in a manner imitating the enemy's own communications in order to produce situations of a tactical advantage. Operations are conducted by the intelligence branch.

Guerrillas should be proficient in voice imitation, the enemy's language, enemy communication equipment, methods, call signs, codes, etc.

Enemy communications equipment can be captured, stolen, or perhaps purchased illegally on the black market. Commercial radio equipment can also be modified to produce the desired frequency.

Gain information on enemy numbers, locations, units, etc.
Prevent an enemy attack
Induce fratricide


Monitor police and emergency services activities using a scanner set to the appropriate frequency.

Block enemies from making emergency calls using cellular phones with a cellular phone blocker or cell phone jammer.


Measure distance by pacing
Count the amount of paces it takes you to make 100 meters, 200 meters, etc.
Keep track of the distance traveled by putting a pebble in the pocket every 100 meters, tying a knot in a string every 100 meters, making a mark on a piece of paper or notebook every 100 meters, etc.






Snapshots taken from the 1968 movie "The Green Berets" showing a Viet Cong infiltrator pace counting 



Infiltration



Infiltration Tactics

If infiltration is planned, so should an exit for the agent or unit.

Beware of cameras and ground sensors. Always try to scout areas out before hand and mark the any camera locations, sensors, watch towers, etc. on maps.

Dress as enemy soldiers or police and infiltrate enemy territory.

Dress as civilian workers and contractors. 

Before infiltrating a facility, surveillance of the facility should be made. Maps of the facility can be made with all potential escape routes planned in advance. The best ways to infiltrate the base or facility are marked down and discussed.

Vehicles parked close to a wall or fence can be used to aid in climbing the wall or fence.

Trees with overhanging branches that are close to a wall or fence can be climbed to infiltrate. The same can be said for barrels, crates, etc. positioned near a fence line or wall.

Unattended and unobserved gates with padlocks can be opened by cutting the locks. If the agents decide to escape through the same gate they can replace the lock with a similar one.

Fence lines with loose bottoms can be pulled up by one agent, while another agent crawls underneath. All this must be done lightning fast. When one agent is inside he can pull the fence up for the other agent.

Fences with or without barbed wire can be climbed

Cutting and negotiating barbed wire fences


Concertina wire can be negotiated 
The guerrilla should be on his back while cutting the concertina wire. A small path in the wire is created by placing stakes in the ground to hold back the concertina wire on both sides of the newly cleared path. 


One guerrilla may lay on top of the concertina wire or a barbed wire fence and allow the other guerrillas to walk over him. The guerrilla should be properly protected from the wire.

One guerrilla can hoist another over barbed wire or concertina wire.


A board, ladder, etc. can be laid across a single row of concertina wire.


Use a diversion to attract the attention of the guard's. Slip an agent through the gate or door. A group of people running up to complain, report about suspicious vehicles or people, etc. can temporarily block the guards view. Shooting, a loud explosion, car accident, etc may temporarily divert the guard’s attention as well.

Peel the base sticker off the car of an armed forces member and place it on the infiltrators vehicle. All dates on base stickers should be current. No expired dates. Base stickers are made to rip apart when being peeled off, so one must be careful. Ice scrappers can be used for this.

Steal the car of an armed forces member with the base sticker intact. 
Agents can carjack the vehicle of an armed forces member. The vehicle should have a base sticker. The soldier can be kidnapped or killed and his military identification should be taken. A guerrilla or agent who favors the military member can attempt to infiltrate using his identification and uniform or a similar uniform. The name tag on the uniform must match the identification card.

Steal the military identification card of a soldier. Female members of the German Red Army Faction were known to go to bars popular with U.S. soldiers and get the soldiers drunk. The soldiers were then questioned for information and their identification cards were stolen. The identification cards were then used to enter U.S. military facilities in Germany and carry out attacks.

A car can secretly drop off an individual or a couple of men, then keep going. While no one is watching, the two men quickly jump out of the car, or the back of a pick up truck, etc., and enter a wooded area, climb a fence, etc. The car may act as a diversion while the men infiltrate.

To confuse the enemy as to the size of your unit…
One man may carry another on his back.
The unit can practice walking in one another’s footsteps.

Use the chaos and noise of a mortar or rocket attack upon an enemy base to infiltrate troops inside the base.

If unsure of where key enemy installations or rooms are, follow the guards on patrol. Guards usually patrol around key facilities.


Infiltration By Sea…
Commercially purchased rubber raft
Commercially purchased canoe or kayak
Agent/s or commandos hidden in civilian cargo ship penetrate enemy harbor.
Divers using commercially bought SCUBA gear swim ashore or attack enemy facilities.
If there are enough soldiers, a separate Navy Special Forces or Naval commando unit can be created.

Infiltration By Air…
Civilian Aircraft drop agent or commandos using commercial parachutes, etc.
Civilian or military helicopter/s drop commandos or agent behind enemy lines
A secret “Jump School” for parachuting can be established and maintained.
If there are enough soldiers, a separate paratroop unit can be established. The paratroops can be under the Air Force or Army.



The Best Times to Infiltrate…
Immediately after an enemy victory.
At night
During a sandstorm or dust storm.
During a blizzard or heavy snowfall.
During heavy rainfall.
During an enemy holiday or celebration.
During a diversion
During (or immediately after) a mortar or rocket barrage on the enemy facility or area.
During the shift change of guards on duty.



Guerrilla Technique

Rural Scout Movement



Movement of Vietnamese Special Forces (Dac Cong)




Soviet Reconnaissance Movement Methods




Low Crawl



Movement along roads in guerrilla controlled territory

The guerrillas should be well camouflaged to suit their environment.
Guerrillas should be spaced out from one another and walk on either side of the road.
If enemy aircraft approach the guerrillas are to take cover to the side of the road, forest or fields.





Actual color footage of Viet Minh forces during the First Indo-China War


Urban Movement

Movement of Conventional Infantry in an Urban Environment
Soldiers should move along in single file on both sides of the street, stay close to the walls. There should be an interval of about 3 yards between each soldier. Each soldier is to watch the windows, doorways of the buildings or houses.



In combat, the soldier is given cover by other soldiers in his unit. Soldiers move from one covered position to another covered position.




















Movement between floors



Ninja Walking Techniques




Dealing with Enemies that have Body Armor
27 JUN 2003- Iraqi gunman shoots a U.S. soldier in the neck in a Baghdad market.

06 JUL 2003- A U.S. soldier waiting to buy a soft drink at Baghdad University was shot and killed at close range by a gunman.




Concealing Weapons
Small pistol hidden under hat. Short sleeve shirt on and shirt tucked into pants so as not to arouse suspicion.
Baggy clothes can be used to hide all types of items.
Pistols hidden in large pockets.
Pistols tucked in waste line of pants. May choose to use holster. Concealed under long shirt or jacket.
Knife with blade hidden up long sleeve. Handle hidden in the cup of the hand.
Small pistol hidden in underwear next to crotch. So called "crotch pistol".
Secret pockets made by guerrillas to hide weapons, documents, etc. These pockets may be on the inside of the shirt, jacket, pants, etc.
The length of a carbine is placed along the back. Most of the carbine is concealed from head to buttocks. The gun sling is used to properly position the length of the carbine along the back.
Trench coat used to conceal rifles, shot guns and smaller weapons.

29 OCT 1994- A man pulls out an SKS rifle hidden under his trench coat and begins firing at the White House.



Hand Signals









Guerrilla Communication Methods

Two Way Radios using coded messages

Telephones
Agents or guerrillas can speak in code on regular telephones.

A ground return circuit  can be used for telephone communications with a single metallic conductor connecting them. A section of barbed wire fence, one side of a railroad track, an unused power line, or an unused phone line may be used as a conductor. The conductor must be insulated from the ground and the other terminal of the telephone must be connected to a ground connection.




Cellular Phones
Disposable or Pre-paid cellular phones can be used.
Coded messages can be sent over the cellular phone.
Coded Text messages can be sent using cellular phones to avoid enemy eavesdropping.
Many modern cellular phones can be used to send coded or encrypted E-Mail. Any E-Mail sent over the internet can be intercepted.

Couriers


Carrier pigeon

Car lights can be flashed on and off to signal another agent or unit.

Different colored clothes left on a clothesline to relay different messages.

Secret communication tunnels can be dug from one place to another. Messengers can be sent to communicate between units.These tunnels may be small enough to accommodate one person at a time. Sewer systems can also be used. Necessary precautions should be taken to protect the messenger.

Tunnels can be used to run communication wire from one position to another.

Colored rice left behind by an agent as a message to another agent. Different colors may mean different things.

Balled up pieces of white paper can be dropped by an agent at night to mark an area or send a message to another agent.

Use mirrors or lights to communicate coded messages.

Use smoke signals to communicate coded messages.

Agents may communicate using ideograms (substitution ciphering)

Secret Hand Signals

During the U.S. Invasion and occupation of Iraq, guerrillas positioned themselves on rooftops to watch enemy troop movements and warn of oncoming enemy forces by waving flags to other guerrillas positioned on rooftops, like a beacon system.


Very important conversations can be made by government officials or agents without saying a word. Communicate with one another by writing on on a sheet of paper and passing the paper back and forth. When the conversation is over the paper is completely and totally burned up. Nothing left but a small pile of ash. The ashes can also be scattered.

Signals Intelligence
A guerrilla unit can be assigned to monitor and decode enemy communications.
The guerrillas should attempt to acquire enemy radios and communications equipment.
The guerrillas should use and have available to them documents and manuals on intercepting techniques.
Information on enemy communication procedures, call signs, codes, etc.should be familiarized.
Information on enemy troop movements, artillery and airstrikes, landing zones, perimeter defenses, etc. should be extracted.







1 comment:

Unknown said...

Exellent stuff! Thank you! We here in Finland are preparing ourselves...