Πρόσφυγας σημαίνει λιποτάκτης...

"Η Συγχώρηση αυτού που σε έβλαψε, σε περιφρόνησε, σε διέβαλλε, σε επιβουλεύτηκε, σε εχθρεύτηκε (αδικώντας σε) καθ’ οιονδήποτε τρόπο είναι μια ανώτερη ηθική πράξη. Εξίσου υψηλή ηθική αξία έχει το να ζητήσει κάποιος ειλικρινή Συγχώρηση για τα δεινά που προκάλεσε (με τις πράξεις ή/και με την απραξία του) σε κάποιον άλλον. Με μια ΔΙΑΦΟΡΑ. Το δεύτερο έχει αξία ΜΟΝΟΝ όταν απευθύνεται σε κάποιον κατώτερο από πλευράς κοινωνικής/πολιτικής/οικονομικής ισχύος. Τι αξία μπορεί να έχει άραγε μια «Συγγνώμη» που απευθύνεται σε κάποιον «ανώτερο κοινωνικά» (και «ισχυρότερο») όπου εάν τολμήσεις να μην ζητήσεις «συγγνώμη» (συνοδευόμενο δε με πολλαπλάσια «αποκατάσταση» ζημιών) γι’ αυτά που του έκανες όταν ήταν «κατώτερος» μπορεί να σε συντρίψει «ανταποδοτικά» αλλά και «προς παραδειγματισμό» κάθε άλλου (κατώτερου αλλά και «ανώτερου») που θα αποτολμήσει τα ίδια;"

Τρίτη, 3 Μαρτίου 2015

Τακτικές Ανταρτοπολέμου (από τα "διαδικτυακά στρατιωτικά μαθήματα των τζιχαντιστών" - ιδού πως διαδίδεται μέσω διαδικτύου η "στρατιωτική εκπαίδευση" ακόμη και στην πιο απόμακρη ομάδα "Μοναχικών Λύκων")

Guerrilla Tactics

The Use of Decoy Rockets and Missiles








Fire decoy missiles and rockets at the enemy in order to overwhelm their anti-missile systems (Patriot, Iron Dome, etc.). Decoy missiles and rockets can be fired first, then followed up by the real missiles and rockets or the decoys can be mixed in with the real. The objective is to get the enemy to shoot down the decoys and possibly run out of missiles. The decoys are, on the other hand, cheap and inexpensive rockets or perhaps some could be specialized missiles that disrupt enemy radar, etc.

Perhaps hundreds of balloons with thin strips of aluminum attached to them are sent up to confuse enemy radar or balloons made of thin foil like material. Done to confuse enemy radar during a missile or rocket barrage.

Decoy rockets positioned on the ground. Perhaps fake ground crews "hiding" nearby. Not too well hidden. Used to draw enemy fire away from real rockets and soldiers.
Used to waste enemy munitions on false targets.

Common Guerrilla Tactics

The guerrillas can draw enemy forces out of major population areas and into remote border sanctuaries where supply and escape can be facilitated. This helps undermine enemy pacification efforts on the civilian population and disperses his forces.

The enemy cannot send large amounts of soldiers to occupy every city, town, village, block, building, etc. The enemy cannot be strong everywhere. If the enemy is strong in one area, he will be weak in another. Attack the enemy where he is weak, not where he is strong. Attack the enemies rear, supply lines, communications, etc. When the enemy sends troops to deal with this threat, attack a different area.

Harass the enemy on all sides to the fullest extent of the capabilities of the guerrilla forces. Weaken the enemy's morale by constant propaganda and terrorist harassment.

At every moment the impression should be created that the enemy is surrounded.

Ambush the enemy with superior forces. Quickly, unexpectedly, and violently attack the smaller enemy force, then quickly retreat using a pre-planned escape route.  Security units may be pre-positioned as well to guard the main ambush unit and cover their withdrawal. An ambush should last no longer than 15 minutes. So called “Hit and run” tactics.

After a successful ambush, set fire to enemy vehicles to completely destroy them. This should be done quickly before enemy reinforcements arrive.

The Ambush
Islamic Army in Iraq forces ambushing US forces.





Examples
15 NOV 2002- A Palestinian gunman shoots at zionist settlers. israeli soldiers then return fire and give chase. Islamic Jihad ambushes and kills 12 settlers and soldiers.

Raids

The Scorpion Maneuver

Usually a small, diversionary forces makes contact with the enemy while the main force 
maneuvers to attack the enemy flank or rear.



(Snapshots taken from the National Geographic Channel program "Generals At War: The Battle of Singapore")

The Blooming Lotus Tactic

Tactic in which the guerrillas attack the enemy controlled city or base from the inside-out. The guerrillas may infiltrate the city dressed as civilians. Weapons may be smuggled in separately and hidden before the guerrillas infiltrate the city. The city is captured from the inside-out, with enemy command, control and 
communications being captured or destroyed first. This tactic was used extensively by the Viet Minh and Viet Cong.

"Belt grabbing" or "Hugging" tactics

Stay close to the enemy while in combat so the enemy cannot call in air strikes or artillery support without doing harm to his own forces. Forces are between 25 meters to a maximum of 100 meters. Usually less than 50 meters away. Tactics used by many forces including Soviet forces in Stalingrad, North Vietnamese and Viet Cong forces, and Chechen forces in Grozny.

Diversionary Tactics

Inducing Fratricide

To deliberately get the enemy to attack and kill members of his own military.


The Vietcong would dig spider holes and wait for enemy forces to position themselves on both sides, one group on either side of the guerrilla. The guerrilla would then fire upon one unit and hide once more in his spider hole. The enemy unit that was fired upon only saw the other unit moving in behind them, and opened fire.

Dress up like enemy police or military forces and kill other enemy police or military. This creates an atmosphere of distrust and fear. Set up roadblocks to capture or kill enemies wearing enemy police or military uniforms.

Place or fly your flag on the ground near an enemy formation or on top of an enemy building so that it can be seen by enemy aircraft from above and bombed or fired upon.

Place a device next to a facility that sends a signal that it is an enemy facility such as a radar station, missile sight, etc.

Urban Tactics

Winter Tactics


Sniping
Hezbollah sniper
Tamil Tiger (LTTE) sniper

Mining

Roadside Bombs

Drive-by Shooting

Preferably cars with four doors (hence four windows)

Windows are rolled up until approaching target area.
Guerrillas in back seat can duck down and hide until approaching target area.
Trucks, motorcycles and other vehicles have also be used in drive-by shootings.
May use stolen vehicles
Members of the Basque ETA practice doing a drive-by shooting.


Drive by shooting on a motorcycle or scooter. Can also drive-by and throw hand grenades.


Infiltrating and Attacking the Enemy Wearing Enemy Uniforms. 


This is often 
referred to as a "False Flag" attack
Members of Jaish Al Naqshbandia of Iraq wearing police and military uniforms.

So called "Insider Attacks" where guerrillas dress as enemy soldiers or police, or actually join enemy military or police forces and kill enemy soldiers. Specifically target and kill enemy occupation force soldiers.

Examples
DEC 1944- German commandos driving captured Allied vehicles, carrying Allied weapons and wearing captured U.S. and British uniforms infiltrate Allied lines and attempt to cause chaos and disorder in Allied forces rear area. The German forces were led by Waffen SS Colonel Otto Skorzeny.

01 MAY 2003- A U.S. contractor is shot and killed at the King Abdul Aziz Naval base in Jubail, eastern Saudi Arabia. The gunman was dressed in a Saudi naval uniform.

05 AUG 2014- A U.S. general is shot and killed in another "insider attack" in Afghanistan. The gunman was dressed in an Afghan army uniform.

A "False Flag" operation may also take the form of one group disguising themselves as members of another group and attacking another party. The nation or group of people that are blamed are the ones the attackers want to be blamed. False Flag operations are often done in modern times by nation states.

Examples

19 SEP 2005- Two British SAS Special Forces operatives dressed as Arabs are captured by Iraqi police after firing at Iraqi police. The British operatives had assault rifles, sophisticated communications gear, anti-tank rocket launcher, and plastic explosives on them when captured. At night the British army stormed the prison where the two SAS members were being held.


Two man infiltration and attack units

Examples

08 MAR 2003- Two Palestinian gunmen attack an illegal israeli settlement. 3 zionist are killed. The two gunmen are martyred. Both gunmen were dressed like Orthodox jews.

10 APR 2003- Two Palestinian guerrillas  infiltrate an israeli army base and kill 2 israeli soldiers. Both Palestinian gunmen are martyred. The PFLP and the Al Aqsa Martyrs Brigade claim responsibility.

08 JUN 03- Joint operation between HAMAS, Islamic Jihad, and the Al Aqsa Martyrs Brigade. Three guerrillas (one from each group) infiltrate an israeli army post and kill 4 israeli soldiers before being killed themselves. The military outpost was located in the Erez crossing between the Gaza Strip. The Palestinians dressed as israeli soldiers. Used assault rifles and hand grenades.

Urban Tactics

Subterranean Combat

Sewers and underground Metros or subways systems provide guerrillas with the ability to move around the battlefield undetected, perhaps even the ability to move behind enemy lines and attack from the rear. This advantage can also be used by the enemy. The entrances to the sewers and subway systems near enemy potions can be sealed off and mined or booby trapped. Ambush points can be set. Obstacles made from concertina wire, rubble, furniture, fences, etc. can be placed at intersections in the sewer. These obstacles can be mined and booby trapped also.

Night Vision Goggles and Infrared equipment are very helpful in the dark sewers.

Recognition signals should be made in advance to avoid fratricide.

Sewer patrols

Determine if the air is safe to breath in the sewer before entering.

Smoke can be used to flush enemy forces out of sewers.

Possible use of Unmanned Ground Vehicles (UVG) in the sewers.

Sewers can also be used as a means of running a system messengers to communicate with guerrilla units.

Sewers and subways can also be used as an underground conduit for communications wire.

Historical

Tactics used by Polish resistance fighters in World War 2.
Tactics used by Chechen fighters during the 1999 Russian invasion of Chechnya.


Guerrilla Mortar Tactics

Member of Islamic Army of Iraq firing a few mortar rounds before a swift withdrawal.


LTTE (Tamil Tiger) guerrillas with 120mm mortars.

Heavy mortar mounted on the back of a truck. This tactic has been used successfully by many guerrilla organizations, including the FARC of Colombia and the IRA.


Graphic showing Basque ETA mortar attack.

Van with roof cut out and improvised mortar inside. The mortar is set to fire on a delayed timing device. This tactic has been used successfully by the IRA.

Mortar rounds can be fired over buildings in urban environments



Mortar rounds can be fired over hills.

Forward observers with binoculars and radio equipment may be used to direct mortar fire upon the enemy more accurately. Forward observers can be hidden in tall buildings, trees, etc.

Fire off a few rounds then quickly withdraw. Preplanned escape route. May have security teams in place to protect the mortar team while firing.

Hit and run mortar attack on enemy base or airfields.

Hit and run mortar attack on enemy oil wells or oil storage facilities and refineries.

Mortar attack used as cover to infiltrate commandos onto an enemy base while the enemy takes cover.

Use of small mortars such a 60mm mortars or Chinese made QLT-89 50mm mortars. Very convenient for guerrilla warfare. Perhaps carried in a sack or bag.

Armored mortar carriers or self propelled mortars. Usually carry heavy mortars..

A mortar can be fired from inside a building with a large enough hole cut in the roof. Can be used in a hit and run attack or used to defend a position. The hole can have a cover that can be removed and quickly repositioned. 

120mm mortars
82mm and 81mm mortars
60mm mortars

Improvised Mortars

Laser guided 120mm mortar rounds such as the Swedish made STRIX, Russian made GRAN, and the U.S. made M395. Capable of armor penetration and top attack on enemy tanks and armored vehicles


Maskirovka

"To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." -Mao Tse Tung

“Red Curtain”

Deception Strategy for an Offensive

Many tactics can be used to deceive the enemy before launching an offensive against him. Only top ranked officers are told of the offensive and other information on a need to know basis. A false truce can be created, while one secretly builds up his forces and trains, arms, and equips. The exchange or the releasing of prisoners can be discussed to give the enemy the idea that the conflict is coming to an end. When the offensive begins, diversionary attacks can be made away from the intended combat area to divert and divide enemy forces.


Deception Strategy on the Defensive

If your forces have been hurt badly or are in a defensive position, convince the enemy that you are preparing to attack and a large scale, conventional attack or battle is upcoming. Release false documents, radio traffic, and internet activities.

Convince the enemy that you are preparing to overrun him. Use phrases like “Great and final victory”, as used by the North Vietnamese, or a “Spring Offensive”, as used by the Taliban to deceive the enemy.

Empty cargo trucks can be driven from one point to another, to simulate the build of of troops and equipment for an offensive. Empty crates can be unloaded from the trucks.

Tactics

Street signs can be taken down, switched, or painted over to confuse the enemy.

False maps can be printed out. Certain places and facilities can be left out. Streets can be given the wrong names, and printed going in the wrong direction. False dead end streets can be added, or streets with real dead ends can be omitted.

A real functioning bridge can be made to appear to be bombed out, while a decoy bridge is placed a bit further away.

High value targets can be made to appear to be of little or no value.

False targets should be placed in an area in which they are expected.

A false airfield can be created so the enemy can bomb it or capture it. If it is likely that the enemy may attempt to capture the fake airfield, booby traps and land mines can be set.

Simulated bomb craters on an airstrip can be made with paint and dirt and rock placed around the simulated bomb crater.

A decoy artillery battery can be positioned, but poorly camouflaged.

Damage to a vehicle or structure can be simulated.

Fuel barrels can be placed near decoys to simulate larger explosions or a secondary explosion.

Old tank hulls can be used as decoys. Fuel barrels can be placed inside or near them to simulate the explosion of fuel and ammunition.

Old tank turrets can be made into decoys by placing them atop wooden frames and painted.

Smoke pots can be used to degrade the laser designation of targets and to feign damage. 55 gallon barrels with oil work well.

Aircraft can drop empty supply containers.
Decoys

Decoy Artillery

Decoy Rockets

Decoy Missiles

Decoy Tanks







Decoy Aircraft


Decoy Surface-to-Air Missile system


Decoy Radars or Radar Vehicles

Decoy Trucks


Decoy Submarines

Decoy Ships Fake Encampment




Decoy tank and artillery piece.

Carved wooden replicas of common guns and weapons (grenades, rockets launchers, rockets, missiles, mines, etc.), painted black or olive green. Slings can be added to the rifles.

Dummies

Dummy paratroops can be dropped.





Dummies can be placed in fake encampments and booby trapped with explosives before the enemy arrives.

A partially exposed or a not too well concealed dummy sniper can cover an area. A real sniper can fire once, then quickly leave the area, holding the enemy off for a while. A real sniper can be positioned on the opposite side of the dummy, to kill any enemy snipers, officers, radio operators, etc.

Camouflage

Disruptive painting
Nets and Screens

Multi-spectral camouflage netting such as the Barracuda by Saab. Provides cover from enemy radar and thermal infrared.


In rural environments, the camouflaging of troops and vehicles is very important.

To Counter Thermal Detection...

Increase the amount of heat in the entire area by using heaters.

Disperse the heat evenly throughout the area. Pipe the heat underground and away from the area.

Cover truck engine with aluminum foil to cover up the vehicles emissions.

To Counter Radar Detection...

The use of radar reflectors

Radar reflectors may be pyramid, spherical, or dipole shaped. Radar reflectors reflect radar energy back. They can be suspended in a pair by a road or scattered in an area. A radar reflector will indicate something is present, but not give the exact nature. Radar reflectors can be made out of wood and metallic foil. They can be used to alter the environment. They can be used to create the false radar impression of a bridge. They can be placed on or beside decoy tanks, in order to give the decoy tanks a false radar signature.

Radar reflectors usually consist of three conducting metallic surfaces or screens perpendicular to one another.




Individual Camouflage

Civilian clothes are worn in an urban guerrilla environment. In an urban guerrilla war, the guerrilla should make every effort to blend in with the populace. 
"The guerrilla must move among the people as a fish swims in the sea."- Mao Zedong

Rural Camouflage Camouflage uniforms and foliage
Tamil Tiger (LTTE) guerrillas in "Tiger Stripe" jungle camouflage.







Vietnamese Special Forces (Dac Cong)


Cuban Special Forces


Improvised rural camouflage using olive green, forest green, or black civilian clothes. 

Viet Cong

Desert Camouflage 

Improvised desert camouflage using sand colored civilian clothing depending on the conditions or the operation.


Urban Camouflage
Worn during a more conventional conflict.
Improvised urban camouflage using grey civilian clothes, etc.  
Winter Camouflage


Chechen fighters during the Battle of Grozny.


Chechen fighters during the 1995 Battle for Grozny



Soviet soldiers during World War 2 with winter smocks

Improvised Winter Camouflage
Consisting of white civilian clothes. White bed sheets can be turned into smocks and worn over protective layers of clothes.
Concealment 





Guerrilla Anti-Tank Tactics
HAMAS members with RPG-29 anti-tank rocket launcher.

Roadside Bombs

In 2002, the Palestinian Popular Resistance Committees used approximately 80-100kg of explosives to destroy a Merkava tank.

23 MAR 04- A hidden underground bomb flips an israeli tank over. 2 soldiers inside slghtily injured. HAMAS and Al Aqsa Martyrs Brigade issue a joint statement of responsibility. A 100-150 kilogram bomb used in this attack.

Roadside Bombs with Shaped Charges

Car bombs can be parked along a street or road and remotely detonated when the enemy passes by. A series of multiple car bombs can be used to attack an enemy convoy. Car bombs can be positioned on both sides of the street. Small or narrow streets would be more ideal for this type of attack.

A parked suicide car bomber can wait for the enemy vehicle to approach, and then pull out suddenly and detonate.

Driving in the opposite lane of traffic, a suicide car bomber can veer into the other lane and detonate when an enemy unit drives by. To attempt a car bombing while in the same lane may prove unsuccessful, because the enemy has guns pointed all around and there is no opportunity for a sudden attack. The driver would have to speed up while approaching the enemy or slow down, which would be very suspicious.

A brave guerrilla can run up to a tank or armored vehicle and throw an anti-tank mine right under the tracks or wheels of the vehicle. The mine may have an external fuse added.
Anti-Tank Mines

Off Route Mines

Tank Stalking


Reports from Afghanistan and Pakistan of guerrillas running into the street and detonating their explosives next to an armored car.

Anti-Tank Ditches

An anti-tank ditch should be a minimum of 6 feet deep and 10 feet in length. A 4-foot “spoil pile” can be made at the opposite side of the approach.





Covered Anti-Tank Trap

An anti-tank ditch can be covered with foliage, camouflage netting, a large tarp and leaves, dirt, sand, etc. to conceal the trap.

Anti-tank mines can be placed at the bottom of a trap.

Anti-Tank Guided Missiles (ATGM)

Hezbollah guerrilla with AT-3 Sagger (9K11 Malyutka) wire guided anti-tank missile
 Hezbollah guerrilla with TOW anti-tank missile.

Hezbollah guerrilla with AT-5 Spandrel (9M113 Konkurs) anti-tank missile.
Wire guided anti-tank missiles
Laser guided anti-tank missiles

Shoulder fired anti-tank guided missiles such as the ERYX and the MBT-LAW
 

Shoulder fired Anti-Tank Rocket Launchers
FLNC members with shoulder fired anti-tank rocket launchers.

Basque ETA member with shoulder fired anti-tank rocket launcher.


Shoulder fired anti-tank rocket launcher tactics

LTTE (Tamil Tiger) guerrilla with Type 69 rocket launcher.


North Vietnamese soldier with RPG-2 or B-40 anti-tank rocket launcher.


Anti-Tank Hunter/Killer Units

Hunter/Killer units are trained to hunt and destroy enemy tanks. A team consists of one or two men armed with shoulder fired anti-tank rockets launchers to engage enemy armor, while a sniper and a machine gunner engage enemy infantry. These tactics were used successfully by Chechen fighters against Russian forces.

Engaging Tanks With Reactive Armor

Two or more guerrillas with shoulder fired anti-tank rockets launchers engage one enemy armored vehicle with explosive reactive armor. The first guerrilla attempts to blow a hole in the reactive armor. The second and any successive blasts are aimed at penetrating the tanks armor.

Use of special anti-tank rocket launchers such as the Russian made RPG-30, specifically designed to defeat Explosive Reactive Armor and other counter measures.

Anti-Tank Rifles or Anti-Material Rifles
Moro Islamic Liberation Front (MILF) guerrilla with .50 cal rifle.



Islamic Jihad member with .50 cal rifle


HAMAS member with .50 cal rifle



.50 cal (12.7x99mm NATO) rifles such as the Barrett M82A1 and Steyr HS 50
12.7x108mm rifles such as the Russian KSVK
14.5mm rifles such as the World War 2 era PTRD.
20mm rifles such as the NTW-20

Special armor piercing or armor piercing incendiary ammunition.
SLAP .50 cal. ammunition
Raufoss .50 cal ammunition

Establish training program for snipers

Anti-Tank Grenades Anti-Tank Grenades such as the RKG-3 can be thrown at enemy vehicles.











Molotov Cocktails (Fire Bombs)



Tactics used during the 1956 Hungarian Uprising against Soviet forces


Guerrilla Air Defense


Resistance fighters in Iraq display shoulder fired surface-to air missile launchers.

Before the outbreak of hostilities with an enemy nation, agents or commandos can be positioned inside (if possible) or right outside enemy airbases. Intelligence is gathered and a secret air defense network is set up. Shoulder fired Surface-to-Air missiles are used to shoot down enemy aircraft as they take-off or land at the airbase. If the commando unit is large enough and the operation is practical, the airbase can be raided.

If having commando units near the enemy air base is not practical or probable, an agent with a cellular phone or some other communications device can be positioned to warn of enemy exercises or movements. Aircraft numbers, type, weapons and equipment (if it is possible to ascertain them), serial numbers, squadrons, base of origin, take-off and landing times are all recorded. This agent or agents are charged with reporting this data back to a command post or headquarters for reference and warning the guerrilla forces of a possible attack.
If no commando units or agents have been positioned ahead of time, an attack on the enemy air bases should eventually be planned and carried out by commandos and assault forces regardless. To destroy enemy aircraft on the ground or overrun an enemy airbase is good air defense.
North Vietnamese forces overrun the Bien Hoa airbase April 25th, 1975

North Vietnamese forces overrun the Tan Son Nhut airbase November 30th, 1975


Aftermath of an Ejercito Popular Boricua (EPB) or Macheteros attack on a US airbase in Puerto Rico on January 12th, 1981. The attack destroyed or damaged ten A-7 Corsair II attack aircraft and one F-104 Starfighter aircraft.


Create a dense air defense network with overlapping and redundant coverage.

Yugoslavian Air Defense Tactics

Tactics used during the 1999 U.S. led NATO attack on Yugoslavia

Missile and radar sites can be fortified with concrete and steel and hidden underground.

Turn radars off, visually track the enemy aircraft. When the enemy aircraft approach the area, quickly turn the radars on, lock on to enemy aircraft and fire, quickly turning the radars off again afterwards.

Some anti-aircraft missiles have cameras on them. Others can have cameras added to them. After firing, the missiles can be tracked visually.

Towed surface-to-air missile launchers or anti-aircraft guns can be positioned on rooftops and hidden. Can be made to look like part of the building or hidden in a fake structure. When enemy aircraft approach, the structure opens up and the anti-aircraft unit open fire. The anti-aircraft weapons can be lifted onto the building by helicopter. The artificial structure is prepared in advance.

Radar

Celldar (Cellular Radar) Concept. So called "Passive Radar". Cellphone signals are reflected off of aircraft.




The Silent Sentry concept by Lockheed Martin uses FM radio stations.
Aircraft Spotters


Aircraft spotters study and familiarize themselves with enemy aircraft.

Should be equipped with a radio or some type of communication device and a GPS locator.

Spot and relay information about enemy aircraft directly to anti-aircraft teams.

Listen for the noise of propeller or jet engines.
Shoulder fired surface-to-air missiles


Hezbollah guerrilla with SA-7 shoulder fired surface-to-air missile launcher.
23 March 1973- PAIGC guerrillas in Guinea Bissau shoot down 2 Portuguese Fiat G.91 aircraft using SA-7 surface-to-air missile launchers. Six weeks later another Fiat G.91 and a Dornier Do 27 were shot down.
Numerous examples of aircraft and helicopters being shot down by shoulder fired surface-to-air missiles in Afghanistan, Chechnya, Iraq, etc.
The RPG-7 can be used to shoot down low flying helicopters when taking off or landing. Multiple RPG's can be used to saturate the target. This tactic has been successfully used in Afghanistan, Chechnya, Iraq and Somalia to name a few. When firing upwards the guerrilla must beware of the rocket blast.


Many modern anti-tank guided missiles (ATGM) have the ability to fire at low flying, slow moving aircraft like helicopters and unmanned aerial vehicles (UAV).

Towed anti-aircraft gun or machine gun mounted on a truck or utility vehicle for mobility.

Islamic Army in Iraq fighters with anti-aircraft in truck.

Chechen fighters during the Battle for Grozny.


Interlocking Heavy Machine Gun positions on the crest of hills along likely avenues of approach.
JAAMI fighters in Iraq with DShK heavy machine gun.

A group of soldiers fire upon the same target en masse.

Lasers and laser pointers used to temporarily blind enemy pilots. As of 2008, laser pointers have been used numerous times across the United States, temporarily blinding the pilots of low flying aircraft and helicopters. Not recommended against armed military aircraft.

Air Raid Precautions


Lights in a city, base, etc. are turned off at night or before an air raid.

Windows are taped up to prevent glass from shattering and flying inside.

One man bomb shelters can be made along the sides of a road or street. The shelters can be spaced about apart. Can be simple holes dug in the dirt, or concrete lined shelters.



One man bomb shelter used in North Vietnam during the war.


Hanoi citizens making individual air raid shelters


Subways or Metros are made fairly deep underground and double as air raid shelters during times or war.


Improvised Surface-to-Air missile

Improvised shoulder fired Surface-to-Air missile or rocket launcher 
Characteristics:
Long tube made of aluminum or PVC pipe?
Tube length? Approximately 1.5 meters in length? Tube should be longer in back.
Battery
Trigger assembly
Wires that connect from battery to trigger and battery to rocket motor?
Handles or hand grips
Optical sight?
Disposable or reusable launcher?

Proximity fuse on missile or rocket (unguided) warhead?
Impact fuse on missile or rocket warhead?

Hundreds of metal balls or ball bearings in explosive warhead?
Type of rocket engine used?
Rocket fuel used?
Range of rocket?
Type of explosives used in warhead?
How much explosives in warhead? 370 gram? 380 grams?


Miscellaneous Tactics

Make false emergency calls to enemy police forces and set an ambush for them.

Monitor police and emergency services activities using a scanner set to the appropriate frequency.

Lure and kill an individual enemy policeman or soldier and take his weapon.

Set an enemy facility on fire and shoot at firefighters when they arrive to stop or delay them as long as possible from putting the fire out. The firefighters will be forced to wait for police protection to arrive before they can put out the fire.

Throw grenades, firebombs, chunks of concrete down from freeway overpass at enemy police or military vehicles.


Sabotage

Oil pipeline sabotaged by Iraqi guerrillas on June 22 2003 after the U.S. invasion and occupation.

Arson as a Weapon

"There are five ways of attacking with fire. The first is to burn soldiers in their camp; the second is to burn stores; the third is to burn baggage trains; the fourth is to burn arsenals and magazines; the fifth is to hurl fire amongst the enemy."
-Sun Tzu




Vandalism to enemy vehicles and buildings
Spray painting graffiti on enemy vehicles and buildings

Strategic Sabotage
“Strategic Bombing” campaign

Strategic sabotage can paralyze a nation.

Strategic Sabotage

Attack vital strategic targets such as:
Factories
Railroad tracks
Bridges
Tunnels
Oil Pipelines
Natural Gas Pipelines
Canals
Electrical or Power Grids
Military Installations
Dams
Oil Storage tanks
Communications

Tactics

Pot Holing roads

Touches de Piano “Piano Keys” on roads
a series of trenches spaced to make it impossible for a vehicle to "zig zag" around. Deep ditches are dug at regular intervals across 2/3 of the road. From one side, then the other side of the road on the next row. This allows for the passage of civilians on foot or bicycle.

Trees, telephone or power lines can be cut to delay or stop an advancing enemy force. Great care must be taken when doing such.

An electrical fuse in an a building or room can be blown out by cutting off the light in the room, placing a coin in the light socket, then screwing the bulb back in. When the light is cut on, the fuse is blown.

Firebombs can be thrown at enemy fuel storage areas, gas pumps at gas stations, etc.

Nails or caltrops can be scattered on the street before an enemy vehicle approaches.

Nails or caltrops can be secretly placed under the tires of parked enemy vehicles.

Vehicular Sabotage
Stab or slash the tires of an enemy vehicle using a sharpened screwdriver, an ice pick, knife, etc.

The lug nuts can be loosened on the wheels of an enemy vehicle. This may require the removal of the hubcaps. The loosened lug nuts may completely fall off, causing the wheel of the vehicle to fall off while the vehicle is on the road.

Destroy the engine of an enemy vehicle by pouring sugar, dirt, or water into the gas tank of an enemy vehicle.

Firebombs can be thrown at enemy vehicles while they are parked on the street, in a garage, etc.

Remove certain components from an aircraft.

Destroy multiple transmission towers. The copper wire can be removed from them for resale to fund further operations. Enemy repair crews can be ambushed to slow down or stop the transmission towers from being repaired.

Illustrations from the CIA Sabotage Manual with instructions in English and Spanish. This manual was originally intended for the the CIA backed Contra rebels fighting the new Sandinista government of Nicaragua.
























Improvised Weapons and Devices for Sabotage

Light Bulb used as a detonator
Carefully file a hole in the top of a light bulb or place the flame of a candle to the top of the bulb until it is heated properly. Place the heated portion of the bulb in cold water. A hole should crack in the bulb.
A wire is soldered to the end of the light bulb.
The other end of the wire is tied around a point on a battery.
Another wire connects to the other point on the battery and a switch.
The light bulb with the exposed filament is placed inside an explosive compound, filament side down inside the compound.
If no blasting cap is available, tie a double knot at the end of a fuse.

A Cigarette Time Delay Device for Explosives can be made by tying a cigarette to the fuse of a bomb with a small string or wire.

A Cigarette Time Delay Device for an Incendiary device can be made by opening a book of matches a refolding the book inside out. Place a cigarette in between the actual matches and the cardboard behind the matches. The device can then be placed on top of a pile of oily rags or some other combustible material.

A small incendiary kit can be hidden inside an ink pen. The kit may include a couple of matches and a small strip of oil or gas soaked cloth.

Light bulb Firebomb
A firebomb made from a light bulb can be made by pouring gas mixed with small engine oil (this mixture is called fuel oil) and a little tar inside of a hole in a light bulb. The hole is taped up. The tar is meant to help the fuel oil mixture stick to its target. A small piece of cloth (which can be twisted) is wrapped around or taped to the bottom of the light bulb. This small piece of cloth acts as a fuse when lit. After the light bulb is thrown, it shatters on impact, causing the lit cloth to ignite the fuel oil mixture. The light bulb firebomb can be carried in an empty tin can to prevent the bulb from breaking. The tin can be hidden inside a large pocket, under the arm, inside a coat, bag, etc.


Espionage

Infiltration


Infiltration Tactics
If infiltration is planned, so should an exit for the agent or unit.
Beware of cameras and ground sensors. Always try to scout areas out before hand and mark the any camera locations, sensors, watch towers, etc. on maps.
Dress as enemy soldiers or police and infiltrate enemy territory.
Dress as civilian workers and contractors. 
Before infiltrating a facility, surveillance of the facility should be made. Maps of the facility can be made with all potential escape routes planned in advance. The best ways to infiltrate the base or facility are marked down and discussed.
Vehicles parked close to a wall or fence can be used to aid in climbing the wall or fence.
Trees with overhanging branches that are close to a wall or fence can be climbed to infiltrate. The same can be said for barrels, crates, etc. positioned near a fence line or wall.
Unattended and unobserved gates with padlocks can be opened by cutting the locks. If the agents decide to escape through the same gate they can replace the lock with a similar one.
Fence lines with loose bottoms can be pulled up by one agent, while another agent crawls underneath. All this must be done lightning fast. When one agent is inside he can pull the fence up for the other agent.
Fences with or without barbed wire can be climbed The guerrilla should be on his back while cutting the concertina wire. A small path in the wire is created by placing stakes in the ground to hold back the concertina wire on both sides of the newly cleared path. 


Concertina wire can be negotiated  One guerrilla may lay on top of the concertina wire or a barbed wire fence and allow the other guerrillas to walk over him. The guerrilla should be properly protected from the wire.
A board can be laid across a single row of concertina wire.
Use a diversion to attract the attention of the guard's. Slip an agent through the gate or door. A group of people running up to complain, report about suspicious vehicles or people, etc. can temporarily block the guards view. Shooting, a loud explosion, car accident, etc may temporarily divert the guard’s attention as well.
Peel the base sticker off the car of an armed forces member and place it on the infiltrators vehicle. All dates on base stickers should be current. No expired dates. Base stickers are made to rip apart when being peeled off, so one must be careful. Ice scrappers can be used for this.
Steal the car of an armed forces member with the base sticker intact.  Agents can carjack the vehicle of an armed forces member. The vehicle should have a base sticker. The soldier can be kidnapped or killed and his military identification should be taken. A guerrilla or agent who favors the military member can attempt to infiltrate using his identification and uniform or a similar uniform. The name tag on the uniform must match the identification card.
Steal the military identification card of a soldier. Female members of the German Red Army Faction were known to go to bars popular with U.S. soldiers and get the soldiers drunk. The soldiers were then questioned for information and their identification cards were stolen. The identification cards were then used to enter U.S. military facilities in Germany and carry out attacks.
A car can secretly drop off an individual or a couple of men, then keep going. While no one is watching, the two men quickly jump out of the car, or the back of a pick up truck, etc., and enter a wooded area, climb a fence, etc. The car may act as a diversion while the men infiltrate.
To confuse the enemy as to the size of your unit… One man may carry another on his back. The unit can practice walking in one another’s footsteps.
Use the chaos and noise of a mortar or rocket attack upon an enemy base to infiltrate troops inside the base.
If unsure of where key enemy installations or rooms are, follow the guards on patrol. Guards usually patrol around key facilities.

Infiltration By Sea… Commercially purchased rubber raft Commercially purchased canoe or kayak Agent/s or commandos hidden in civilian cargo ship penetrate enemy harbor. Divers using commercially bought SCUBA gear swim ashore or attack enemy facilities. If there are enough soldiers, a separate Navy Special Forces or Naval commando unit can be created.
Infiltration By Air… Civilian Aircraft drop agent or commandos using commercial parachutes, etc. Civilian or military helicopter/s drop commandos or agent behind enemy lines A secret “Jump School” for parachuting can be established and maintained. If there are enough soldiers, a separate paratroop unit can be established. The paratroops can be under the Air Force or Army.



The Best Times to Infiltrate… Immediately after an enemy victory. At night During a sandstorm or dust storm. During a blizzard or heavy snowfall. During heavy rainfall. During an enemy holiday or celebration. During a diversion
During (or immediately after) a mortar or rocket barrage on the enemy facility or area.



Guerrilla Technique

Rural Scout Movement


Movement of Vietnamese Special Forces (Dac Cong)




Urban Movement

Movement of Conventional Infantry in an Urban Environment
Soldiers should move along in single file on both sides of the street, stay close to the walls. There should be an interval of about 3 yards between each soldier. Each soldier is to watch the windows, doorways of the buildings or houses on the opposite side.






Ninja Walking Techniques

Enemies with Body Armor

27 JUN 2003- Iraqi gunman shoots a U.S. soldier in the neck in a Baghdad market.
06 JUL 2003- A U.S. soldier waiting to buy a soft drink at Baghdad University was shot and killed at close range by a gunman.

Concealing Weapons

Small pistol hidden under hat. Shot sleeve shirt on and shirt tucked into pants so as not to arouse suspicion.
Baggy clothes can be used to hide all types of items.
Pistols hidden in large pockets.
Pistols tucked in waste line of pants. May choose to use holster. Concealed under long shirt or jacket.
Knife with blade hidden up long sleeve. Handle hidden in the cup of the hand.
Small pistol hidden in underwear next to crotch. So called "crotch pistol".
Secret pockets made by guerrillas to hide weapons, documents, etc. These pockets may be on the inside of the shirt, jacket, pants, etc.
The length of a carbine is placed along the back. Most of the carbine is concealed from head to buttocks. The gun sling is used to properly position the length of the carbine along the back.


Hand Signals



http://thehiddenuniversity.blogspot.gr/search?updated-min=2011-01-01T00:00:00-08:00&updated-max=2012-01-01T00:00:00-08:00&max-results=4