Professional Documents
Culture Documents
Page | 13
Urban Terrorism
Page | 14
Introduction
With the worldwide resurgence in terrorism it is becoming more important
that
you become familiar with the role that intelligence plays in combating
terrorism. This
instructional module in combination with other modules you receive will
help you achieve this goal.
Evolution of Terrorism
Contemporary and modern terrorism evolved from political problems, the
needs for change, and the aspirations of the population. Many of these
legitimate causes
have been subverted from nonviolent legal processes to violent actions and
terrorism. The only
essential ingredient is a well-trained, dedicated and charismatic leader to
turn the tables
completely. Many patriotic people with good intentions have been seduced
by
popular movements that have later turned out to be the opposite of what
they really wanted.
The post-World War II era produced a large number of
radical causes , liberation wars, and political alliances, which in turn created
a romantic attraction
to revolutionary criminals, interpreting them as champions of popular
causes.
Along with the romantics, the movements also attracted large numbers of
radicals,
professional criminals, avengers, and subversive agents. The student
revolts of the 1960s
and 1970s produced large numbers of radicals and idealists, some of whom
remained
in dissident movements and switched from one movement to another.
Others, who still felt sympathy
for their movements, were integrated into normal life in their respective
societies where they worked
until reaching positions of responsibility or higher levels within the same
government.
Some of these people at present form the basis for the perimeter support of
these
radical terrorist organizations. Terrorism is said to be the weapon of the
weak, the
Page | 15
Criminals. They generally know the consequences and are more predictable.
A
criminal in the process of robbing a bank can be caught by the police. In
reaction the criminal takes the closest person hostage, threatening to take
his
life to influence the authorities to provide him free passage from his
predicament. The use
of innocent hostages constitutes an act of criminal terrorism. The terrorist
in this case
does not want to stay in the area and usually does not hurt the hostages.
Political Defenders. Political defenders are much more complex. Their
supreme mission is to publicize their cause and to impress those whom
they
are supposedly representing. Since political defenders believe that what
they
are doing is correct, that the end justifies the means, and that what they are
doing is
on behalf of the oppressed masses, they are much less predictable. The
fact
that in most cases the terrorists do not have the support of the majority of
the
population does not seem to matter to them. Political terrorists establish
their ideas with some
well-published and alarming act that they use for additional veracity in
threats,
negotiations, and pressure for their causes. Terrorist political organizations
are rarely suicidal. There are cases in which terrorists take high risks or
commit suicide, but these cases are rare. To combat political terrorism all
motivational factors, ideology and personalities have to be carefully
examined and analyzed.
Psychopathic Terrorists (Crazy). The psychopathic terrorist is possibly the
most
dangerous and unpredictable. There are some cases of organizations that
are run by
psychopathic killers. But in most cases these people act
independently, trying to correct some real or imagined wrong. Some want to
make a public statement, while others want to influence events. In
most cases, psychiatric support is essential to neutralize the incident. The
psychopathic terrorist can harm his hostage especially if the hostage (the
hostages)
are identified as part of the problem or as the enemy. There are numerous
examples of
mixed terrorist groups. It is worth mentioning that all terrorist acts are
considered
criminal acts and therefore all terrorists are criminals. In many
cases, political terrorist organizations have to provide for their needs
with criminal acts.
Bank robberies, called by Lenin as "expropriations" are a common means of
obtaining operational and subsistence funds. In many cases, the
most sophisticated terrorist organizations have special supply groups
that specialize in these activities. Terrorist support provides
terrorists with many of their requirements which in some cases eliminates
the
need for such dangerous activities.
The German faction of the Red Army, also known as the Baader-
Mienhof Group , used psychopaths in their operations. Some of these
Assassins were
organized into special groups that used terrorist activity as a form of
therapy.One of the best known groups of this nature was the
Heidelberg Collective Patients , sometimes known as the "Mad Squad" by
the
terrorists themselves. This group consisted of ex-patients who had been
evaluated and released by a who m sympathetic edico (with the help of
sympathetic lawyers) and programmed for murder and destruction.
Profile. Another way to study the terrorist is through careful studies of
published data on terrorists and terrorist organizations and then try to form
a
general profile of the terrorist. For the purposes of this class, we will study a
compilation and
analysis of published data on 350 members of terrorist organizations from
11
nations that includes the period from 1966-76 to try to draw a "
sociological portrait " of the profile of a modern urban terrorist.
Age. The usual urban terrorist usually has an age ranging between
22 - 25 years.
Page | 17
other nations, unless they think their country is threatened. These groups
generally
try to influence the government to maintain the status quo, avoid liberal
influences, or
prevent international agreements. The factions fighting in El Salvador are an
example of one
trapped in the center receiving terrorism from both directions.
I. Establishment Terrorists. They operate with the permission of the
government or even with its
support. This form of terror is generally used to keep the population
submissive or
to keep the existing regime in power. The secret police organs employed by
the
Soviet Union and its satellites can be considered as establishment
terrorists. In
some cases the government denies any responsibility for the incidents.
J. Religious Zealots. They are found all over the world. Many atrocities and
terrorist acts have been committed in the name of religion. Some groups
exist outside of
government control and could be considered radical religious cults, while
others exist
as part of national or international organized religions.
K. Narco Terrorists. For years drug trafficking has been linked exclusively to
professional criminal elements. In more recent years a new influence has
moved
into the world of drugs, motivated not by greed but by a determination to
destabilize Western society. His method: trading weapons for drugs. The
central operator : Bulgaria. There is established evidence that the
government of Cuba facilitates drug trafficking
to the United States by allowing drug traffickers to use Cuban ports to
disembark ships from Colombia, (as payment to the government of Cuba,
the traffickers then
carry weapons and food), for delivery. after groups such as the M-19.
Additionally, studies have shown that the FARC, a Colombian terrorist
organization,
uses the sale of drugs as its main method to finance its terrorist activities.
Terrorist Strategy
It is a common strategy of terrorists to commit acts of violence that will
attract the
attention of the people, the government, and the rest of the world to
demonstrate the political goals of
the terrorists or in some cases to publicize the terrorist cause. We are going
to discuss seven
of the general factors that will contribute to terrorist violence.
A. Politics. Terrorists want the masses to believe that the violence is
directed at a
government perceived as corrupt or repressive. Violence against the
government also
demonstrates that the government has no control which ideally causes the
government to take a
repressive stance which gives the terrorist "cause to celebrate."
B. Social. The absence of a middle class, the concentration of wealth in a
few
influential families, and poverty are definite factors that can cause violence.
The
discrimination and violation of basic human rights are also influential
factors in
the production of violence.
C. Economic. Extreme poverty with no hope of being able to improve your
position can
breed violence.
D. Ideological. Violently opposing political philosophies can lead to violence.
E. Geopolitical. The presence of large foreign groups in the population
working
to improve their economic position tends to use many valuable resources,
particularly
jobs, land, etc., which causes the local population to be unable to have
those resources and result in
Page | 20
violence. Border disputes over land, islands, or the ability to control borders
also contribute to violence.
F. Religious. Conflicts and differences can result as a result of
religious differences that can be exploited by those who want to destabilize
the social order.
Some religions condone violence and use religious reasons to justify their
violent actions .
G. Foreign Influences. There are groups in the world that would be violent if
they had
training, money, and weapons. What they need is a "sponsor". If someone
wants to
become a terrorist there is no lack of groups willing to train, indoctrinate
politically and
support economically.
Characteristics
Studies of terrorist incidents from 1946 - 1980 have identified several
characteristics of
terrorist incidents that contrast with the nature of other crisis-type events.
1. Terrorist crises are of very short duration.
2. Pre-crisis activities tend to be routine.
3. Relatively little anticipation of terrorist acts.
4. The threat in terrorist crises develops faster than in other crises.
V. Marxist Revolutionaries. There is no doubt that revolutionary Marxist
groups
dominate the world of terrorist activities. The Marxist ideology of starting
and supporting
wars of liberation is known as one of the major catalysts for
terrorism. The main mission of Marxism remains unchanged, only the
tactics and
strategies have changed depending on the people and the area. All the
Marxist factions
claim to be true Marxists.
A. Marxist-Leninist. It uses the traditional approaches of infiltration and
subversion.
Peaceful coexistence is professed when it brings benefit. Lenin's political
terrorism places
politics prior to terrorism. Terrorism in the quest for power is used to
emphasize
political points and is used very selectively. But once control of the
government is
secured, the dictatorship of the proletariat takes control. In subversive and
terrorist activities
the Marxist-Leninists make maximum use of front organizations.
B. Troskista. Based on the Marxist philosophies of Leon Trotsky and his
Fourth International.
The Trotskyists advocate international revolutionary terror and the
unification of
terrorist groups wherever possible. According to this system, each political
party has a
terrorist arm that operates clandestinely, destabilizing the government to
the point where a
spontaneous revolution can be started. Terror has to be used as part of any
revolutionary enterprise and the use of indiscriminate terrorism is used to
emphasize the point. The
terrorist joint planning, mutual support, and training in multiple disciplines
are
integral parts of the Trotskyist system. The revolution kills individuals to
intimidate thousands.
C. Maoist. Based on the political and terrorist philosophies of Mao Tse-tung.
The phrase "
politics grows out of the barrel of a gun" is explained in people who are
forced to be submissive
and kept that way by continuous and indiscriminate terror. Political
organizations
and politicians have to be involved in terrorism. There can be no truce or
accommodation with the enemy.
Page | 21
Transportation
Commerce
Structures
Weapons of Terror
Introduction
Weapons of Terror have three essential requirements: simplicity, efficiency
and
availability. There are other less essential but important requirements for
terrorists such
as the need to kill large numbers of people from a distance, so the power
of weaponry has become important. This involves the use of automatic
weapons that do not have
an overly accelerated rate of fire (due to the limited amount of ammunition
they
carry on their missions). In this class they will recognize the mentality of the
terrorist, the use of
different weapons by the terrorists, fire, drugs and material in a destructive
role.
Fire
Through time fire has proven to be one of the elements that
causes the most fear in man, which is why it is one of the preferred
weapons of terrorists. The
following are examples of the possible ways that terrorists can use fire for
their terrorist operations.
1. Incendiary Box. A cigarette pack is used to hide the following
ingredients. Sulfuric acid, potassium chlorate, and sugar. Sulfuric acid is
placed in a tube
Page | 24
test sealed and placed in a condom. The sugar and potassium chlorate are
placed in a
second condom, then the first condom is placed in the second, which
contains the sugar and
potassium chlorate. To activate the content, the test tube containing the
sulfuric
acid is broken . It will take 30 minutes for the sulfuric acid to penetrate the
first condom. When the acid
comes into contact with the other ingredients it causes an instantaneous
combustion. This type of
incendiary device was used by the Armed Forces of National Liberation of
Puerto Rico
to cause several fires in department stores in New York and Puerto Rico.
The pack
of cigarettes was placed together with some material that could be
combustible (such as
clothes) and wait for the fire.
2. Light Bulbs. An ordinary light bulb can be used as an
incendiary device. Using a high speed drill a small hole is made in a
common light bulb, without damaging the filaments inside the light bulb.
Gasoline is injected into the bulb with a syringe and the hole is sealed with
glue. The bulb is then placed in
a receptacle making sure the switch is in the off position. An explosive fire
will
result when turning on the light.
3. Molotov pumps. One of the most effective incendiary devices developed
during
World War II was the Molotov Bomb. The bomb was extremely effective
against armed vehicles and other vehicles. It consists of a mixture of
gasoline and oil in
a glass bottle. A cloth wick is soaked in gasoline and inserted into the
bottle. To
attack a target, the fuse is lit and it is thrown towards the target, when the
bottle breaks, the
gasoline / oil mixture is exposed to the open flame causing an
instantaneous fire. You
can also make one that ignites on contact with the target without having to
light the
wick. The most common would be to mix potassium chlorate with sugar
and water to form a
semi-thick liquid . Strips of cloth are soaked in this liquid and allowed to dry.
Adhere
these dry strips with adhesive tape after filling the bottle with the mixture of
petrol
and oil. Carefully add an ounce or two of sulfuric acid. The acid will not mix
with the mixture and will go to the bottom of the bottle. When breaking the
bottle against the target the acid will come
into contact with the cloth impregnated with the potassium chlorate and
sugar causing an
instantaneous fire and the combustion of the gasoline and oil mixture.
4. Gasoline Tank Pumps. Gas tank pumps can be made
in various ways, we will discuss two ways briefly.
to. Using a high-speed drill, a small hole is made in a
ping-pong ball. Using a hypodermic needle, the ball is filled with liquid
Drano. The hole
in the ball is sealed with glue. The ball is then introduced into the gas tank
of the car in
question. In 30 minutes the gasoline will destroy the ping pong ball allowing
the Drano to come
into contact with the gasoline causing an explosive reaction.
b. Gelatin capsules are obtained and a small ammunition is added to make
it
sink. Then small pieces of sodium and calcium carbonate are added to the
capsules. The
capsules are then kept in a plastic bag to keep them dry and free from
moisture. Three or four capsules are introduced to the tank of the car in
question, and in minutes
the capsules will disintegrate producing an explosive gas that in turn causes
an explosion.
5. Others. Many products such as phosphorus, when not in water, can cause
fires. A few drops of oil in chlorine can cause a fire within 20 minutes
or sooner depending on the freshness of the chlorine.
Pumps
Page | 25
The use of bombs by terrorists has been effective due to their low cost, the
availability of materials for their construction, and their simplistic method of
construction.
Its use is also attractive due to the attraction that the elements of the press
have to
attacks where explosive devices are involved. The terrorist can detonate a
bomb by
many methods, such as remote control, pressure or pressure release, time,
etc. In
most cases the bombs are detonated at the most propitious moment to
cause the greatest
amount of damage, death and press attention possible.
A. Car bombs. Car / truck bombs are used due to the weight of dynamite
that these bombs can carry and their capacity for destruction. In many
cases,
propane gas has been used to increase the explosive power of dynamite.
Nails, glass, steel, or
other abrasive materials are added to increase the deadly power of your
bombs. Since
the fragments produced by these explosions are not controllable, the
victims in all
cases include children, women and the elderly.
B. Tube Pumps (Nipple). Tube bombs are also a favorite
of terrorist groups. These makeshift artifacts can be made into many
different shapes, such as a tube filled with black powder, a small clock, a
small
battery, and a camera flash bulb without the glass and filaments intact. This
is a
relatively effective and inexpensive device that can cause great damage to
buildings, cars, or personnel.
Any type of explosive can be used to fill the bombs, but
care must be taken when filling the tubes to avoid premature explosion of
the contents.
C. Letters-Bombs. The letter bomb is another dangerous weapon that has
been used by
terrorist groups. The letter bomb can be made using a regular envelope or
they can be made
using a small box. In most cases a small clock battery is used to
power the electrical circuit needed to explode the explosive charge, which
could be
crushed C4 so as not to take up too much space in the envelope. A new
innovation using this
same technique has recently been introduced. When the package is opened,
the sulfuric acid
mixes with a cyanide tablet that causes a chemical reaction where an
extremely toxic gas is produced , poisoning the victim.
The use of this type of weapon by terrorists is limited only by their ability to
use their imagination.
Other Weapons and Accessories We
mentioned earlier that terrorist weapons have three basic requirements:
simplicity, efficiency, and availability. In addition to these three
characteristics, weapons and
ammunition must have power, since it is dangerous for a victim to have the
opportunity to
shoot in defense after being knocked down. A well placed bullet by a victim
that has not
been properly neutralized can have serious consequences. For the conduct
of
urban terrorism, weapons have to be easy to conceal, so miniaturization is
essential. When these features are combined with accessibility to
appropriate weapons and
ammunition and simplicity that prevents the weapon from being damaged
at an
inopportune moment, the perfect weapon of terror is born.
A. Weapons. The following weapons have the above requirements, more or
less to
some degree. Some are more efficient than others but all carry the same
guarantee of use.
These are the weapons of terrorism.
1. Kalashnikov or AK47 (Plate 1). The success of this weapon is based on
its reliability.
It worked well in Vietnam under conditions that caused damage to the M-
16. Can be covered
Page | 26
Lamina # 1
AK47 Kalashnikov Assault Rifle
Weight 9.5 pounds (Downloaded) 11.31 lbs. (Loaded with full magazine)
Length 34.2 inches 27.5 inches with stock retracted
Curved magazine with metal case holds 30 rounds
Barrel Velocity 2330 ft / second
Rate of Fire 100 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 330 yards Cash
[no sheet shown]
Sheet # 2 VZ58 Assault Rifle
Weight 6.9 pounds (unloaded) 8.4 pounds (loaded with full magazine)
Length 33.2 inches 25 inches tail butt retracted
Magazine 30 round capacity curved metal case 7.62mm cartridge
Barrel velocity 2330 ft / second
Rate of fire 90 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 440 yards effective
[not stated
Sheet ] Sheet # 3 Scorpion VZ61
Weight 3.5 pounds 4.4 pounds (loaded with full magazine, 20 rounds)
Length 20.2 inches 10.6 with steel stock folded over the barrel
Magazine Slightly curved metal cleat holds 10 to 20 rounds
.32 cartridge ( 7.65mm) automatic pistol cartridge
Barrel velocity 1040 ft / second
Rate of fire 840 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 219 yards with stock Effective 55 yards with stock
retracted
Page | 31
The Five Phases of a Terrorist Incident
Introduction
The Basic Terrorist Strategy Terrorist
tactics and strategies have evolved by the revolutionary activities
over many years of terrorists such as Robespiere, Lenin, Stalin, Trotsky, Mao
Tse-tung,
Castro, Guevara, and Arafat. Grand strategies were established for the
contemporary terrorist by writers such as Marx, Engels, Marighella, Fanon,
Marcuse, Guillen, and others
who attempted political change by way of violence.
Page | 32
trucks on his official car in various areas, checking the possibilities and
reactions of the
driver and his escort.
Initiation Phase
The initiation phase represents the stage where the operation begins.
Generally, once this stage begins it is almost impossible to abort unless it is
included
as part of the mission. This stage includes movement towards the target
and initiation of the
attack.
The special equipment is prepared by the supporting elements and carefully
checked.
Normally, the support elements prepare the team independent of the
attack elements . Special equipment may include bombs, explosives, anti-
aircraft missiles, and
large-caliber weapons used as support fire. Special pumps are prepared and
delivered to
a location designated by the support element. The Red Brigades of Italy
transported
weapons and grenades for the Black September terrorists that they used in
the
Munich Massacre in 1972. The terrorist Carlos transported weapons for the
JRA terrorists used in the
operation at Lod Airport. There are quite a few incidents in which
terrorist groups provide help among themselves.
The mode of transport is chosen according to the needs of the mission.
Cars belonging to the organization or its members are registered several
times and
different names are used to evade the vehicle's trace. In some cases, the
vehicles have been
painted to avoid identification by witnesses. In other cases, stolen plates,
possibly plates from another region, are used to avoid identification. Groups
like the
Red Army Faction and the Baader-Meinhof have their own team of
personnel who change the
engine number , paint and equip the car, remove all identifiable traces, and
provide various license plates from
foreign countries. This includes license plates that belong to the US Army.
Normally,
only fast cars in good condition are used. When terrorists use
public transportation, tickets are obtained by the support section.
Documentation,
passport and identification cards are delivered a little before the start of the
operation.
Documents can be stolen or altered, falsified by a specialist, or obtained
from a
government that supports terrorists. Many terrorists travel using passports
from Libya, Syria,
Iraq or Ethiopia. Several members of the Baader-Meinhof group tried to
enter the United States
from Canada using Iranian passports. At the international level,
documentation is generally
prepared by the Board for Revolutionary Coordination. The terrorist Carlos
had at least
five passports with his own photograph but different names and
nationalities. Some of
these passports were found in London and Paris with a large quantity of
weapons and
explosives hidden by Carlos in a friend's apartment.
Specialists, if needed for an operation, are obtained from outside and their
part of the operation is explained to them . To these specialists, if they are
not completely trustworthy or members of
another closely allied terrorist group, only their part of the operation is
explained. Experts in
electronics and weapons practice the operation with the strike team. If they
are not available
locally, snipers from other organizations are recruited. The Red Army
Faction
contributed weapons and explosives specialists to Latin American terrorists
and
probably the Irish Republican Army (Provisional). As already mentioned, the
Board for
Revolutionary Coordination is normally in charge of providing these different
specialists.
Safety is one of the most important aspects in the final coordination. This is
the
time when all the elements are close together and their vulnerability is
greatest. Several
meetings may be necessary to ensure safety. Various groups meet at
different locations and the final meeting is announced at the last minute
possible. Various places for
Page | 37
meetings are selected but the current location is kept secret until the last
moment. In the final meetings, all the points related to the charges and
positions of
each member are discussed. Pseudonyms and cover names are used to
hide the
names of the leaders.
The vehicles are brought in and the drivers are informed and arms are
handed over. The
weapons and explosives are examined. Explosives with detonators and
incendiary devices are
assembled and stored in final storage areas separate from the main group.
Special equipment and personnel, most of which are not local, are put into
position. All
personnel generally stay in the same area for security reasons. This is also
a very vulnerable time. Several members of the Baader-Meinhof group were
arrested during
this final coordination period prior to their planned operation. The arrival of
many
people from other organizations in other areas, sometimes without the
knowledge of the
terrorist leaders, presents a security danger and is vulnerable to infiltration.
Special papers and
cards are distributed for the operation. Appropriate clothing for the
operation is brought, this may
include local clothing which is very important in international and
transnational operations . Other items may include special uniforms such as
police uniforms or work clothes previously obtained by support personnel.
The
Italian Red Brigades used uniforms of the Italian Air Force Band for the
assault team
during the kidnapping of Moro. The Baader-menhof group wear
communication and maintenance personnel uniforms quite frequently. Latin
American terrorists like
the Vietcong have worn government military uniforms. This type of
deception is used to enter
facilities or go through security sections without raising suspicions. Leaders
receive their final instructions from their agents on site. Some agents will be
withdrawn at this
time, others can remain in the target area and then join the operation. If it is
believed that
the agent on site has not been compromised, he will stay. Other infiltrated
agents may be
those who remain in the target area to open gates, doors, turn off
alarm systems , or generally help terrorists penetrate the target.
Final coordination begins when objectives are assigned. In
more complex operations , terrorists put together a command post exercise
for final coordination.
Special codes and saints and signs are disseminated. The Baader-Meinhof
group and the
Red Army faction almost always use this time for the final reallocation of
personnel and the
final assignment of objectives. Members may be reassigned for security
reasons to avoid the
ease of compromise or betrayal. The George Jackson Brigade failed in a
robbery in Tukwila,
Washington Bank mainly because some of the terrorists were not informed.
Movement towards the target indicates the beginning of the active phase.
Generally this phase
is considered to be the breaking point. In most cases all elements and
supporting elements are already in place or moving and the only way to
change or modify the
operation is by communication. Depending on the objective, the mission,
and the surroundings the
terrorists move towards the objective in small groups, usually between two
and three at a time.
If they are not in the immediate area of ​​the target, the terrorists move
clandestine routes,
sometimes returning to detect the possibility of surveillance. Security
personnel are
normally located along the route. In missions such as assassinations or
bombings, the
terrorists move individually and gather close to the target. When the mission
is to
ambush a vehicle, the terrorists mount their vehicles in a pre-assigned zone
with
security and lockdown teams meeting elsewhere.
When applicable, a home or security zone can be used for final
coordination.
There may be a change of clothes at the safe house and new
identity cards and special equipment may be distributed . In many cases
where vehicles are used, cars in
previous positions driven by other drivers can be used to avoid the path of
vehicles
from the target area to the safe house. Support and blocking vehicles are
Page | 38
Page | 39
Negotiation Phase
The negotiation phase is applicable when the terrorists have something in
their control to
negotiate, and if there is a possibility of an exchange between the terrorists
and the authorities. The
terrorists make their claims directly, by special messenger or by means of
communication. Negotiators must have knowledge of procedures to
combat
terrorism. Intelligence is the most important factor in the negotiation phase.
The "
tradable items " can be held hostage as part of a mission, or they can be
taken by
terrorists as a contingent. Negotiable items can also be facilities,
explosives, chemical agents, or other things. The negotiation phase is as
important as the
other phases and depending on the value of the negotiable items they can
bring a lot of attention
to the terrorists and their cause. Terrorist demands can include the release
of
imprisoned terrorists , money, political recognition, or transportation out of
the country. Terrorists
negotiate under the threat of death to their hostages. Compromises are
made when the
survival of the terrorists is the most important factor in the negotiations.
The most
important point in hostage negotiations is saving lives.
Climax Phase
The climax phase can follow the initiation phase if the negotiation phase is
not
implemented. This is the case in murders when a single shot is fired, or the
detonation of
a bomb when there is no long detonation time. In this phase, security is at
its
highest level and authorities' radios are carefully listened to. There is no
specific duration for this phase.
Post-Incident
Phase This phase includes the evacuation of the target (not applicable in
cases of bombs already in
position, incendiaries or other explosives), the occupation of a safe house
or
intermediate area and movement towards the hiding place, and in some
cases the return to normal life if the
terrorist is not clandestine. Criticism and self-criticism is done in small
groups. This phase is as
important to terrorists as the pre-incident phase. The terrorists make a
withdrawal from the target
zone that is pre-planned and coordinated. Contingencies are planned in
case you find
witnesses or bystanders. Hostages or incidental people can be used as
shields. If
the terrorists are not discovered, cunning and maximum use of cover are
employed. If the
terrorists are withdrawing under pressure, the weaponry will be visible.
Withdrawal can be done
individually or in small groups by dispersing in various directions. In most
cases, the terrorists will wear a different change of clothing and
documentation.
Transportation is very important in removal operations. In a local operation,
the vehicles used in the recall can be pre-positioned and changed. The first
vehicle or
vehicles used are stolen while those used in the end may
belong to the terrorists. The terrorists meet in a predetermined location but
not
initially in the safe house in case they were followed. After safety is
guaranteed, the terrorists gather at the safe house to rearm. If necessary,
terrorists can take several days of inactivity before leaving the country.
If hostages are taken, they are generally incarcerated in "popular prisons"
normally not located in the safe house. Negotiations are conducted from
the
safe house. Requests for equipment and weapons are made at higher
echelons. The
leaders make the criticisms, the individuals who participated in the
operation make a self-criticism.
Criticisms contribute to lessons learned and serve as the basis for
future operations . New methods, tactics and strategies are formed based
on the lessons learned
Page | 40
Page | 41
Introduction
Recent history has established that the most unpredictable but enduring
threat within
most counterterrorism programs are organizations that operate
transnationally, independently or with the help or support of
international organizations . Such groups have consistently demonstrated
their ability to attack and
disappear where their threat is considered minimal or nonexistent. For this
reason it is
essential that analysts and officials can examine those organizations that
operate within
their area and those that have demonstrated an interest (established
through the analysis of
ideologies and strategies) and potential (established by the analysis of
networks of
international support ) to select targets in your particular area.
When beginning the analysis of international terrorism, two points of
caution must be kept in mind . First, despite the fact that there is much
confirmed data that defines the relationship between
terrorist groups throughout the world, it is incorrect to assume that there is
a concerted and
coordinated effort against the West by terrorist groups. Many of the
relationships
established and much of the coordination between terrorist organizations
serve the purpose of
facilitating operations and do not result from ideological solidarity. So in
most cases
the ties between these organizations are only as strong as the individual
benefits that will
result from such membership. Second, there has been much discussion
about the
Soviet Union's contribution to international terrorism, but there is no
substantial evidence to indicate that they
control or direct individual actions of any terrorist movement. So if we
assume
this to be true it would be an oversimplification of the problem. But given
the evidence
indirectly implicating the USSR with international terrorism, and the
relationship of
Soviet foreign policy through the years to the development of terrorist
movements throughout the world,
an examination of the USSR-terrorism relationship it could serve as the
basis for a
threat analysis.
Soviet Involvement in the Evolution of Terrorism.
A. Since the introduction of nuclear weapons to conventional warfare,
international conflict has taken the form of mass destruction. Due to the
latest
technological advances in strategic military weapons systems, the world's
super-powers have
recognized that a conventional war could only result in almost
complete destruction . This fact has resulted in the evolution of the Low
Intensity Conflict (CBI) as a
"cheap" means or system of conflict between East and West. The Soviet
Union has enjoyed
its strategy of diminishing US influence and increasing its own influence
through
CBI with little threat of overt military attack. This strategy has been
constantly escalated
since World War II and has emerged as an integral part of
Soviet foreign policy .
Communist countries are masters of propaganda. Throughout the twentieth
century they have
interpreted and published the Marxist / Leninist ideology to serve their
present political interests . While Lenin proposed that an anti-imperialist
united front of nations would "triumph
in the end" after a "disastrous clash" with the capitalist states, Nikita
Khrushcev
realized that this strategy would result in a nuclear war with the west. As a
result the
communist party came to new formulations during the 20th Party Congress
in February
1956. They declared that war was not inevitable, and that communist
victory would come as a
result of the class conflicts that would result in capitalist nations and
support.
Soviet of any just war of national liberation. This policy established the
objective of
undermining the stability of pro-western regimes in third world nations,
especially
those that were rich in minerals which were crucial to the industrial west, by
training and arming communist groups for sabotage, guerrilla warfare and
the
Page | 42
J. The Irish Republican Army (ERI): The terrorist arms of the ERI, mainly
the provisional arm (ERIP), are determined to achieve the complete
withdrawal of British troops
from Northern Ireland (Ulster) and the establishment of a socialist country
with 32 counties or a
social democratic republic on the entire island. The ERI terrorism is
designed to motivate the
people of Ulster, Ireland and England to pressure the British government to
withdraw from the
area and also to allow Catholics and Protestant Irish to resolve their conflict
without
outside interference. Using terrorism the ERI hopes to focus world attention
on the
Irish struggle for independence against the oppression of the British
government and in this way
generate international pressure on the British government. The relationship
between the ERI and the OLP began
shortly after the reorganization of the ERI in 1976. In 1968 members of the
ERI began
training in camps in Jordan controlled by the PFLP. In May 1972 the ERI
organized
a conference in Dublin for international terrorists and was attended by
representatives of
the PFLP and the JRJ. This conference resulted in a campaign of "joint
military operations on
British territory against Zionist targets" by the PLO. and the ERI. From this
point on,
there has been a direct relationship between the terrorist campaigns of the
ERI and the weapons received from the
PLO.
The head of the PLO, Yasser Arafat now says that the relationship between
the PLO and the ERI does not
exist. This change in attitude is largely due to the recognition of their cause
by the
European Economic Community (EEC), but many terrorist factions identified
with the PLO
do not take their orders from Arafat. The ERI also has links with FER, with
BR and with ETA.
K. Red Army Faction (ERF): Essentially Marxist / Leninist. The
original group proclaimed that since the state was a system of rule by class
and suppression, the
government, its institutions and its bosses had to be rejected by all political
and
violent means available . Throughout their history they have received
support from the
East German security forces , "Carlos" and the PLO. East Germany has
allowed various members of the
ERF to use East Berlin as a starting point on their world travels knowing that
they
are being pursued by West German police. "Carlos" was an important
element in
establishing a system of cooperation between the ERF and the OLP.
Members of the ERF have traveled to
countries such as Lebanon, Syria, Iraq, Kuwait for training purposes as well
as a
refuge for the West German authorities. It is very likely that the ERF received
much of its weaponry from Palestinian sources. In the past the PFLP and
Fatah cultivated
contacts with ERF members and supporters and at various times the ERF
was associated with the
PFLP faction of the late Wadi Haddad. The first ERF / PLO operation was an
attack on a
Jewish home for the elderly in West Germany. The 1972 Munich massacre
on
Israel's Olympic team was organized by the PLO together with the ERF, who
provided
logistical support and safe houses. Other joint operations include the 1976
attack on the
OPEC conference by the Mohammad Boudia Command led by Carlos. This
group consisted
of Lebanese, Palestinians, and two members of the ERF. The 1976 hijacking
of the plane in Entebbe
was also a joint operation between the PLO and the FER (there were two
members of the FER at the
hijacking). The FER is suspected of having ties to the ERI, ETA, the BR, and
the October 1 Group
of Anti-Fascist Resistance. Recent events have resulted in an anti-NATO
alliance between the
ERF, AD, and the CCC. This topic will be discussed in more detail later.
L. Red Brigade (BR): The BR is the most violent and ultra-left group that has
operated in
Italy. The BR is essentially an anarchist group although it subscribes to
Marxist / Leninist rhetoric . Its objective is to overthrow the Italian
government by revolutionary means. Anti-
American and anti-NATO, the BR is dedicated to the fight against Western
imperialism. The BR
has a treaty with the PLO on weapons. The PLO obtains weapons from the
BR for use in
its operations against Israel and American citizens in Italy. The BR also
hides
weapons in Italy for Palestinian groups operating in Europe. The last
arms treaty with the PLO was made for Arafat (through Abu Iuad) in 1979. In
fact, the relationship
between Arafat and the BR was so close that Arafat was asked to intervene
in the liberation of
Page | 46
Aldo Moro during his two months of kidnapping. In September 1984 the
judicial authorities
in Venice issued an arrest warrant for Arafat accusing him of smuggling
arms into Italy. The BR has received most of its training in boot camps
in Libya. Complicity in BR activities by Czechoslovakian agents indicates
direct support from the Eastern bloc. There is a strong relationship between
the BR and the FER, the ERI, AD and
the ETA.
K. Direct Action (AD): The AD proclaims a leftist anarchist ideology aimed at
increasing the class confrontation by armed means against Western
imperialism. The group
also seeks to retaliate against what they perceive as a repressive policy of
the
French state . There is no information indicating whether AD members
receive training of any
kind. As there is evidence of a link between AD and Lebanese terrorist
groups operating in
France, it is possible that some of its members have received training in the
Middle East. AD is suspected of having contact with the FER, BR, ETA, and
CCC. The relationship between DA,
FER, and CCC will be discussed in another section.
L. The Basque Homeland and Freedom (ETA -Euskadi Ta Askatasuna): ETA
is a
terrorist / militant separatist organization. The group is divided into two
factions, the Military Front
(ETA-M) and the Political-Military Front (ETA-PM). The common objective of
the two factions is to
establish an independent territory (Euskadi) in the four Spanish Basque
provinces
Vizcaya, Ãlava, Guipúzcoa, and Navarra. The first Basque terrorists to
receive
foreign training were sent to Cuba in 1964. After this, a wave of
violence occurred in Spain that suggests the application of a plan rather
than a spontaneous occurrence.
It seems that in the case of the ETA those in charge of its training made the
decision to
exploit the hostile feelings of the ETA and influence them towards a violent
path. ETA continues to
have contact with the Cuban government and this has developed relations
with the Sandinistas.
The PLO and Czechoslovakia have trained ETA members. The Spanish
government thinks that
there is probably a relationship between ETA terrorist activities and
activities by
the Soviet Union and the Eastern bloc. ETA has received weapons through
OLP channels and has
had contact with Carlos, the FER, the ERI and the BR.
M. The Japanese Red Army (JRJ). Since its inception in 1971 the ERJ has
operated
as a transnational terrorist group with the goal of a simultaneous world
revolution.
During the 1970s the JRJ worked with and for the PFLP in its conflict
against Israel as
"a voluntary army dependent on the Palestinian revolution." Since its
founding the ERJ has
been based and has operated mainly outside of Japan. In addition to its
transnational operations in support of the PLO, the ERJ has the objective of
establishing a people's republic in
Japan by joining those sectors oppressed by Japanese imperialism. They
seek to create a "
united front " of all leftist forces throughout Japan. Despite this objective,
the
ERJ's intentions to conduct operations in Japan have not been carried out
by the internal security of
Japan. The need to establish a secure base of operations outside of Japan
resulted in a
treaty between the ERJ and the PLO where the ERJ would work on behalf of
the PLO, receiving
weapons, explosives, military training, and a base of operations in exchange
. Beginning with the
operation at the Lod airport near Tel Aviv, Israel, the history of the JRA
reflects
highly successful international operations , dramatic and famous for their
level of indiscriminate violence. The
ERJ has confirmed contacts with the ERF. Furthermore, Carlos was
responsible for the liaison between
the PFLP and the ERJ in Europe. It can be assumed that the ERJ obtained
great benefit from
Carlos's network .
N. Armenian Secret Army for the Liberation of Armenia (ESALA). ESALA is a
transnational ethnic terrorist group that proclaims a Marxist / Leninist
policy and solidarity with
global leftist and separatist movements. The main objective is the re-
establishment of
the historical homeland of Armenia, an area that included most of Eastern
Turkey, Northern
Iran, and the Armenian Soviet Socialist Republic in the USSR. ESALA also
requires an admission
Page | 47
of guilt of the Turkish nation for the organized massacres of Armenians that
took
place between 1894 and 1915 and an immediate end to the modern
discrimination of the Turks
against the Armenians. A division against in 1983 in ESALA did not alter the
objectives of
either faction, but did cause a change in the use of violence by each group.
The most extreme faction, ESALA-Militant (ESALA-M) has expanded its
Turkish targets and
initiated indiscriminate violence against non-Turks, ESALA-Revolutionary
Movement
(ESALA-RM) is expected to limit its attacks only to Turks. Since its founding
ESALA has
expressed complete solidarity with any terrorist and separatist group
fighting against
"imperialism" throughout the world. ESALA was based in Beirut prior to the
1982 Israeli invasion of Lebanon, which forced the groups to move, possibly
into Syria. There are
unconfirmed reports of ESALA bases in Athens, southern Cyprus, France,
and Iran. Prior to 1982,
ESALA members received training in Syria in Syrian camps operated by the
PFLP. The training camps used at present by ESALA are located in
the Syrian-controlled portion of Lebanon in the Békka Valley. ESALA
terrorists also
receive training in Iran. Since their departure from Lebanon, ESALA
elements have had
a working association with the radical Palestinian anti-PLO group Abu Nidal.
As a result,
the PLO's support has evaporated and the PLO is said to have started
working against
ESALA.
Profile of State-Supported Terrorism.
State support for terrorism ranges from moral and diplomatic
support to material assistance through weapons, training, funds, and
sanctuary. State-
supported terrorism is characterized by several common factors and
characteristics. It is almost
always conducted clandestinely and terrorist states always deny
responsibility
for specific terrorist acts. Terrorist states use their intelligence and
security agencies or other intermediaries, and state-backed terrorists have
more
advanced and lethal access to material than independent groups.
As previously discussed, the Soviet Union, Eastern Bloc countries, and
USSR client countries (Cuba, Nicaragua, North Korea, Vietnam, Angola, and
Ethiopia) have
been instrumental in maintaining and perpetuating
revolutionary / terrorist movements. of the world. The emphasis in the
analysis of state-supported terrorism is
concentrated on those states that are less consciously submissive to the
USSR but that
have their own incentives to export violence across the world. Until recently,
Iraq was one of the most aggressive defenders of terrorism. But recent
events in the
Iran / Iraq war have resulted in a decline in their support for terrorism to
ensure
continued Western support for the war. In addition, southern Yemen is
considered a state
that supports international terrorism but the support will not be discussed
here as it is only limited
to providing training bases and shelter, which is minimal considering the
three
major directors of international terrorism. The three states that correspond
to the profile of
supporting- states are Syria, Libya and Iran.
A. Libya: Libya's support of terrorism began soon after COL
Mu'ammar Gaddafi assumed power in 1969. Gaddafi immediately took a
radical international stance against Western influence in the Middle East. As
a
strong proponent of the Palestinian movement, Libya in the 1970s started a
so-called "Jihad fund" to finance
Palestinian groups involved in terrorism, and to provide them with
sanctuary, training camps and
weapons. Later in the decade, Libya provided similar services to other
terrorists of
various nationalities. Gaddafi never sought to hide his support for these
groups, but he did
justify them as an element in the battle against imperialism and for national
liberation.
Its campaign of international terrorism against opposing regimes combined
with several
specific incidents has highlighted Libya as a major proponent of terrorism.
Page |
June 48 -11, 1984, Gaddafi says "We are now in a position to export
terrorism,
fires and liquidation to the heart of America, and we will do so if necessary."
-March 28, 1985, Gaddafi announces that "The lesson is that America was
driven out
of Lebanon when an individual Arab was able to kill 300 Americans ... an
armed people
will never be defeated, but regular armies are not reliable."
B. Syria: Syria has established an extensive infrastructure for the
recruitment and
training of terrorists operating against Israel, the US, Lebanon, Turkey and
the
Arab Middle East. They provide diplomatic assistance to terrorist groups
such as Abu Nidal, Sa'iqa,
Hezballa, the PFLP and the PFLP-CG. These organizations maintain offices
in Damascus and receive
weapons through Syrian diplomatic packages when abroad. By contrast the
use of terrorism by Iran and Libya, Syrian-backed terrorism appears to be
more institutional than
personal. Syria uses terrorism more directly in its efforts to coerce
PLO leaders to keep its police in line with Syrian targets in Lebanon. To this
end, Syria
has apparently reached an understanding with Abu Nidal for him to carry
out
terrorist operations against moderate Arab and Palestinian leaders. Nidal
has carried out
such operations at the request of Syria while Syrian-backed terrorism has
largely been confined to the Middle East. Western authorities think that a
liaison office established by the Syrian defense ministry in 1983 in Athens is
actually a
front to support a number of terrorist activities in Western Europe.
C. Iran: In 1981 the government of Ayatollah Khomeini established an
Islamic Revolutionary Council to spread the Islamic revolution throughout
the Middle East. The nations identified by the
Council to commit terrorist acts are Lebanon, Iraq, Kuwait, Tunisia and
Morocco. The
radical clergy who control the Iranian government think that the values
​​of the western and eastern
(Soviet) world are corrupt. They think that many Middle Eastern
governments are Islamic in
name only and as they are instruments of the USSR or the US they have to
be overthrown and
replaced by authentically Islamic regimes. To this end Iran has
internationalized its
revolution by providing support and direction to terrorists throughout the
Middle East. Under the name
of the Islamic Jihad Organization (OJI) front, several Shi'a extremist groups
receive
training in Iran and in Baalbek, in the Bekka Valley of eastern Lebanon.
Operational support
for terrorist activities comes from the Iranian Revolutionary Guards based in
Baalbek. At
the national level, these terrorist groups have quite a lot of support and to
some extent are led
from the Ministry of Islamic Revolution in Tehran, the chief being Ayatollah
Montazeri,
Khomeini's personal candidate to take power after Khomeini. Iran also
actively employs recruitment and training programs for Muslims in the
Persian Gulf,
Africa and Asia. The intention is to make these individuals available for
subversion or
terrorist operations in the future, particularly in the area of ​​the Gulf
states (
oil- exporting countries ). There is considerable evidence to suggest that
Iranian-led terrorism is
increasing in effectiveness and scope in Western Europe. Terrorists have
operated
using Iranian Embassies, Islamic cultural centers and study centers as
bases in
various European countries and this practice is expected to continue.
D. In addition to the individual threats that these three countries pose, there
is a
strange and worrying alliance between Syria and Iran in the Syrian-
controlled areas in the
Bekka Valley of Lebanon, there is a military contingent of the Iranian
Revolution Guards including
camps. training for terrorists. Revolutionary Guards regularly travel between
these locations and Tehran. The understanding between Syria and Iran in
their support for terrorism is
symbiotic for several reasons. Iran needs allies, and in today's Arab world,
given
Ayatollah Khomeini's fundamentalism, they are hard to find. The moderate
countries
consider Iran's fundamentalism as threatening as Marxism. Khomeini also
wants the support of the fundamentalist Shi'ites outside of Iran because he
sees them as an instrument
to expand his philosophy and they represent the fifth column to overthrow
anti-Shi'ite regimes.
Page | 49
From the point of view Syrian Assad needs help to manage the fragmented
Muslim communities in Lebanon and Iran can help to this end, specifically
by countering
terrorist activities against Syria. Islamic Jihad activities against the US have
been a
convenient method of putting pressure against US policy in Lebanon with
little
risk towards Damascus.
E. The Abu Nidal Group - (also known as Al Fatah - The Revolutionary
Council; the
Black June Organization): Rejects any effort towards a political solution in
the Middle
East and believes that the armed struggle against the Zionist enemy should
be the priority of
the Palestinian resistance movement. Simultaneously, he has called for the
destruction
of the reactionary regimes in Egypt, Jordan, Kuwait, Saudi Arabia, and the
Persian Gulf and
criticized the restraint of the PLO and its absence of revolutionary fervor.
Consequently, the
Abu Nidal group thinks that Arab and Palestinian terrorism are necessary to
precipitate an
Arab revolution that is the only solution for the liberation of Palestine. The
Abu Nidal group is
important on the issue of state-supported international terrorism because
several countries have
used this organization as a vehicle for their terrorist activities. Originally
used
by Iraq against moderate Arabs and Palestinians, the group had ties to Iraq's
Ba'th party
and Iraq's intelligence system and to the politics of these two institutions. In
1981 the group
distanced itself from Iraq and established relations with Syria. After moving
between Damascus and Baghdad
from 1981-1983 (being in the unique position of receiving support and Iraq)
the group was expelled from
Baghdad in late 1983. The actions taken by the group are for the purpose of
embarrassing
the PLO because many of their terrorist activities are identified as acts
committed by the
PLO (the Abu-Nidal group is Palestinian although it is not a member of the
PLO). These activities damage
the PLO's effort to reach a negotiated solution to the Palestinian problem.
Since
1980 the group has attacked Jewish targets in Austria, the country that
supports the PLO most in
Western Europe . The assassination attack on the Israeli Ambassador in
London in 1982 was in
reaction to Israel's invasion of Lebanon in June of that same year. This is
important
because the invasion resulted in a direct alignment of many factions of the
PLO with
radical Arab countries (mainly Syria and Iraq) after their expulsion from
Lebanon. This act put
the various Arab countries in control of the PLO. Also this series of acts
increased the
influence and power of Syria in Lebanon, something that helped the Abu
Nidal group to achieve its
objectives. Claims associating the Abu Nidal Group with the BR, FER, AD,
and ESALA are
reliable but poorly defined. Nidal relies heavily on Palestinian students in
Europe as a recruiting and operational support base for its international
network.
F. European United Front: For several years several
leftist European terrorist groups have supported the establishment of an
international united front against
"Western imperialism" and particularly against its most powerful symbols -
NATO and the
American presence in Europe. Since the summer of 1984, at least three of
these groups - the
Western Al Faction of the Red Army, the French group Direct Action, and the
Communist Combatant Cells of Belgium - have apparently collaborated in a
communist offensive
against NATO that came to fruition. to a high level of violence in February
1985. In January of that same
year a joint proclamation by AD and FER indicated the importance of
preventing the installation of the
"Cruise" and "Pershing" projectiles in Europe. On January 15, 1985 the AD
and the FER
officially announced their operational union. There is enough evidence
based on documentation and
arrests to indicate that NATO military installations are important targets for
the FER, AD and CCC. As mentioned above, the Italian Red Brigade has
committed
terrorist acts against NATO during the 1980s with operational ties to the
ERF and AD. Although
there is no evidence to indicate that the BR intends to join the United Front
of the FER, AD and CCC, in
the future, this kind of alliance may be ideologically and operationally
advantageous for all
four groups.
As this discussion has indicated, the analyst is faced with a difficult job in
developing the information necessary to effectively identify terrorist groups.
Page | 50
Page | 51
Terrorism in Latin America
Introduction
To better understand the situation that exists today in Latin America, one
has to have
knowledge of its history and the relationship between this history and that
of the United States.
Central America
Studying the history of United States intervention in Central America, one
has
to consider the North American need to acquire a sea route between the
east coast and the
west coast and the logical location of a canal to obtain this result. Taking
this into
account, there have been three geographic locations that have played an
important role in
North American policy toward Central America: the Strait of Tehuantepec in
Mexico; the Rio San José and
Lake Nicaragua in Nicaragua and the Isthmus of Panama in Panama. At one
point, each
site was considered the place to build a canal. Sure, as is known, the canal
was
built in Panama, but great consideration was given to building the canal
elsewhere.
For example, in the case of Mexico, there is still a railway system located
where
the canal was considered to be built. The canal was not built in Nicaragua
for reasons of opposition in
the North American Congress and for fear of earthquakes in that area. Now,
we are going to study the
historical importance of some countries in the area:
Panama
Panama was voluntarily annexed to Colombia in 1821. Around 1890, the
United
States tried to ratify a treaty that would have allowed it to build a canal but
the treaty was
rejected by the Colombian Senate. The situation resulted in a revolution and
Panama won its
independence from Colombia in 1903. A new treaty between the United
States and Panama
allowed the United States to build and maintain control of the new canal.
Nicaragua
Relations between Nicaragua and the United States worsened in the early
1900s when the United States decided to build the canal in Panama. The
situation got
even worse when several American citizens were killed and, as a result, the
United States sent the Marines. The North American presence continued
until 1923 when a
treaty allowed the United States the right to build a canal and maintain
bases in
Nicaragua. In 1927, responding to domestic problems and to prevent a plan
to build a
canal by an English-Chinese company, the United States again sent 2,000
Marines to
Nicaragua. This time, the Marines faced Augusto Sandino, a local hero, who
was
fighting against the North American intervention. In 1934, the commander
of the National Guard,
Anastasio Somoza, established a ceasefire and invited Sandino to negotiate
peace. Sandino
obeyed the cease-fire and when he returned from the mountains to
negotiate, he was assassinated by
Somoza's men. Soon after, Somoza seized power and established a
government that he ruled
for fifty years under the control of the Somoza family.
Page | 52
El Salvador
At the end of the nineteenth century, El Salvador applied to the United States
Congress for
permission to incorporate as part of the Union. From 1920 to 1930, El
Salvador was
ruled by a series of military dictatorships. During World War II, El Salvador
initially supported the Nazis before changing its alliance to the Allies.
Unemployment and lack of
land forced 300,000 Salvadorans to move to Honduras. The mistreatment
they received in
Honduras and a series of hectic soccer matches between the two countries
resulted in the
Soccer War . The war was an economic disaster for both countries.
Honduras
During 1911 and 1912, the internal problems of Honduras forced President
Taft to
send the Marines to protect North American economic interests (the
banana industry ). The United States presence remained for two years until
calm settled down, but in reality the situation in Honduras never improved.
In 1969, the economy
seriously worsened as a result of the Soccer War with El Salvador.
Guatemala and Costa Rica
Historically, the United States has had very little relationship with Guatemala
and Costa
Rica. Generally, Costa Rica has always been a model of a stable democracy.
In
the mid-1950s, Guatemala was ruled by a communist government. A coup
led by the United States replaced the government. At this time,
the international communist Ernesto "Che" Guevara appeared in Guatemala.
Apparently, the head of the CIA in
Guatemala, HR Alderman, had Guevara in detention but was released
thinking that he did not have much importance in the communist
movement. The rest is for the
story; Guevara went to Mexico where he joined the forces of Fidel Castro for
the invasion
of Cuba. Now that we know a little about the history of Central America, we
are going to study each
country from a terrorism point of view.
Guatemala
1. FAR (Revolutionary Armed Forces): The FAR is a
Marxist-Leninist terrorist organization with a Castroist orientation that is
violently opposed to the interests of the
United States. Its objective is to seize power to carry out a "Socialist"
revolution. The FAR was
formed "in 1968 when it broke with the Guatemalan Communist Party.
Between 1968 and 1970, the
group suffered many losses as a result of military operations by the
Guatemalan army.
In 1971, the group split into two - one of them is the EGP
2. EGP (Guerrilla Army of the Poor): The EGP defines itself as a
Marxist-Leninist political-military organization ". The group takes Cuba and
Vietnam as
revolutionary models and has proclaimed "a war to the death against US
imperialism
and its representatives." The objective of this group is "to destroy the army
and other
repressive bodies of the ruling classes that are supported by imperialism"
and to seize
political, military and political power through a "people's revolutionary war."
The EGP has suffered
many losses through government actions.
3. ORPA (Revolutionary Organization of the Armed People): The ORPA is
quite
different from the other Marxist-Leninist groups. ORPA practices a new
theory of liberation
trying to involve the Indian sector.
Page | 53
Communicating with the Indians in their own dialect, the ORPA describes
the
Guatemalan army as the army of the rich that kills, tortures, and kidnaps
innocent civilians. The
ORPA evades political rhetoric about the evil of private property knowing
that the Indians
appreciate their tiny lands. Up to this point, the ORPA has been successful in
overcoming the
traditional resistance and passivity of the Indians. ORPA was formed in
1979 beginning with
attacks on different towns in the latter part of 1979. ORPA has probably
received
help from Cuba and Nicaragua in the form of weapons, logistics, and
training. ORPA has contact
with terrorists in El Salvador.
Honduras
1. Cinchoneros: Los Cinchoneros is a group of the extreme left that
supports the use
of violence and that had been part of the pro-Soviet Honduran Communist
Party. It has a
Marxist-Leninist orientation against the interests of the United States. The
objective of the
Cinchoneros is the seizure of power. The group's name comes from a
peasant who died in the
nineteenth century for refusing to pay taxes to the Catholic Church. Since
their formation in 1980, the
Cinchoneros have been the most active group in Honduras and at this time
they are more dangerous due to
the help they receive from Cuba.
El Salvador
1. FMLN (Farabundo Marti for National Liberation): The FMLN is a
Marxist-Leninist terrorist organization with a Castroist orientation that
supports the "prolonged war" against
"Yankee imperialism" and the Salvadoran oligarchy. When it was founded in
1970, most of
its members were university students. Farabundo MartÃwas a communist
who died in a
peasant demonstration in 1932. The FMLN has been the most active
terrorist group in El Salvador,
made up of university, peasant and union groups. The FMLN is made up of
five
Marxist-Leninist organizations: the Popular Liberation Forces (FPL), the
People's Revolutionary Army, the National Resistance Armed Forces (FARN),
the
Central American Workers' Revolutionary Party (PRTC) and the Liberation
Armed Forces.
(FAL) which is the armed wing of the Salvadoran Communist Party. The
FMLN directs all
terrorist activity in El Salvador and represents a powerful group because of
the help it receives from Nicaragua and
Cuba.
Panama
At this moment there are no terrorist groups in Panama, but there is a
criminal group
called Uno Indio. An Indian has no political or military objectives; the only
thing that interests him is
material gain. Although there are no terrorist groups in Panama, this does
not mean that there is
no threat. There is a large presence of Cubans, Nicaraguans, North Koreans,
and
Soviets in Panama. The Cubans have one of the largest missions in Panama
and the
Soviets have a large number of "technicians" at the assembly plant for the
Soviet Lada automobile . It is interesting to note that this plant is located
next to a
residential area of the North American Army and is close to one of the naval
bases.
SOUTH AMERICA
Colombia
1. FARC (Colombian Revolutionary Armed Forces): The FARC is a
Marxist-Leninist terrorist group with Soviet orientation. The group
represents the armed wing of the
Page | 54
Colombian Communist Party. During its history, it has suffered quite a few
losses, but because it
has remote hideouts, the FARC remains the most powerful group in
Colombia. There
is also evidence that the FARC are involved in drug trafficking to obtain
money and
weapons.
2. M-19 (April 19 Movement): The ideology of the M-19 is described as "
Scientific Socialism " and combines elements of the ideology of Castro,
Guevara, Mao and Trotsky. A faction
of the M-19,CNB / M-19, is a fanatically revolutionary group and very against
the interests
from United States. The group emerged in 1974 when he stole Simón BolÃ‐
var's sword from a
museum. The kidnapping and murder of an American citizen was one of the
reasons for the
division between the two groups. At first, the M-19 was assisted by exiled
members of the
Montoneros / Tupamaros. This increased the size and capacity of the M-19
enormously. The
M-19's capacity was greatly reduced as a result of anti-terrorist actions by
the
army, but in 1980, the group emerged once again by taking control of the
Embassy of the
Dominican Republic. During the early 1980s, the M-19 continued to suffer
losses and a Cuban connection was discovered that forced the Colombian
government to
temporarily break diplomatic relations with Cuba.
Like the FARC, the M-19 receives money through robbery and drug
trafficking. The M-
19 has also been associated with other groups in South America.
3. EPL (People's Liberation Army): The EPL is the military arm of the
Colombian Communist Party . The PLA is extremely anti-American. His
original group was trained in
China and North Korea; but, most of its members have been killed by
government troops . It does not present a serious threat.
4. ELN (National Liberation Army): The ELN is a Castro, anti-
American organization that has a strong following among Marxist-oriented
Catholic priests,
many of whom have served as leaders. Like the EPL, it does not pose a
threat.
Peru
1. SL (Shining Path): The SL is a Marxist-Leninist terrorist organization
against the government of Peru and the United States that follows the
classic teachings of Mao Tse-
Tung and that closely follows the ideology of Pol Pot's Khmer Rouge. Unlike
the
Peruvian guerrillas of the 1960's that imitated Fidel Castro and Che Guevara,
the SL proclaim
that the rightful leaders of Peru are the Indians. It evolved from a Maoist
group known as
La Bandera Roja that split from the Moscow line in 1964.
Chile
1. MIR (Movimiento Izquierdista Revolucionario): The MIR was founded by
Chilean Trotskyists in 1965. It subsequently emphasized its Trotskyists to
accommodate an orientation
Castroist. It has carried out sporadic terrorist acts between 1969 and 1970.
During
Allende's presidency in 1970-73, the MIR was active in promoting agrarian
reforms and led
military occupations of rural states. After the military coup in 1973, most of
the
members of the MIR were forced to leave the country. Since then the MIR
has
been sporadically active. In the early 1980's, the MIR suffered a series of
delays and
has not been able to recover from the losses. Currently the total
membership is less than one hundred.
Page | 55
2. FMR (Manuel RodrÃguez Front): The FMR is the military arm of the
Chilean communist party . As such it has been involved in many anti-
government activities. It does not pose
a considerable threat.
Argentina
1. Los Montoneros: Los Montoneros is an
urban- oriented terrorist organization , anti-Argentine government and
oligarchy whose ideology is a mixture of Peronism and
Marxism / Leninism. Together with their mass-based political organization,
the
Montonero Peronist Movement (MPM), they are involved in a "national
liberation movement" that aims
to reunify the fragmented Peronist movement and provide opposition to the
Argentine military . The Montoneros, organized as a legal Peronist group in
1968, emerged
as a terrorist organization in 1970 when they executed a former Argentine
president. He adopted
a Marxist / Leninist line after his union with the Revolutionary Armed Forces
(FAR).
In 1974, the Montoneros absorbed a faction of the Peronist Armed Forces
(FAP) and the
Armed Forces of Liberation (FAL - Maoist-oriented). During 1976 and 1978,
the.,
Montoneros were the most active and dangerous terrorist organization in
the Western Hemisphere.
It also became the most prosperous, accumulating millions of dollars
through kidnapping,
including $ 60 million in 1975. The Montoneros suffered a series of defeats
at the hands of
local security forces during the late 1970s. In 1977, the Montoneros
went into exile and by 1980 the group had been reduced to only 300
members. Since
then, the Montoneros have been inactive in Argentina.
2. ERP (People's Revolutionary Army The ERP was a Trotskyist group that
was
extremely active from the mid-1960s to the mid-1970s. The organization
disappeared when its leader was liquidated in 1976. Portions have merged
with the
Montoneros.
Uruguay
1 MNL (National Liberation Movement - Tupamaros): The name Tupamaros
was derived from Tupac Amaru, a Peruvian Indian leader, who claimed Inca
descent and who
led an Indian revolt in the late 18th century, was eventually captured and
burned at the
stake. The Tupamaros were founded in the early 1960s by a Uruguayan
law student , Raúl Sendic, who was responsible for the group's initial
success. The group was one of the
first to implement guerrilla operations in urban areas based on theory.
developed by Abraham Guillen, a Spanish ideologist of urban terrorism who
has
recommended a strategy of small guerrilla actions to force the forces of
security to hand over land, and also establishment of small cédulas that
could act
without reference to a high command, this strategy would be forced by
political work in order to
win the popular support of the masses. The downfall of the Tupamaros
came in 1972 when they
began indiscriminately killing individuals they held responsible for the
increase in victims of right-wing death squads. A declaration of internal war
was
forthcoming, this allowed any part of the country to be under military
jurisdiction. This step
proved to be the beginning of the end. By the end of 1972, two thousand six
hundred had been imprisoned
and forty-two dead; and movement had failed.
Brazil
1. ALN (National Liberation Alliance): In 1968, the Brazilian Communist
Party expelled
the notorious Carlos Marighella due to his radical views. Marighella in turn
created the ALN. The
militants ALN began to rob banks to finance their operations since they
believed that the
Page | 56
action creates the organization. During the period from 1969 to 1970 ALN
kidnapped the
US and Swedish ambassadors in exchange for a number of "political"
prisoners. For all her
actions, Marighella received extensive support from Cuba. The group
ceased to exist after the
death of Marighella during an exchange of fire with the Brazilian police.
Mexico
Terrorist activity in Mexico began in 1968 when a strike of 150,000 students
developed into a larger-scale revolt against the establishment by
leftist students . This revolt was suppressed by the armed forces with
substantial loss of
life and hundreds of arrests. Almost all terrorist / guerrilla groups can trace
their
origins to the events of 1968.
1. MAR (Revolutionary Action Movement): This movement, which emerged
after
a bank robbery, consisted of around 60 trained men and women in
communist ideology . Some of them had formed the MAR when they
attended
Patrice Lumumba University in Moscow. In 1974 the group was almost
completely destroyed by the
Mexican authorities.
2. Communist League September 23: An extremely violent group made up
of
elements of the MAR and the Popular Party of the Poor. Responsible for
attacks on police and
soldiers. The group ended its operation in 1968 when its boss Carlos
Jiménez Sarmiento was
killed by the police. The high level of training of this group is attributed to
the training
given by the MAR members trained in Moscow.
And continues….
Cuba
Before the revolution there were many indicators for a successful revolution
under
the military dictatorship of Fulgencio Batista, formerly a sergeant in the
Cuban army. During
the Batista regime, corruption, criminality and institutional terrorism
abounded,
peasant property was forcibly confiscated and a 30% commission on public
works contracts
was stolen by Batista. The creation of a National Revolutionary Movement
was logical given the
circumstances. This original movement eventually morphed into Castroism,
later
known as Cuban communism ideologically and intellectually. Fidel Castro
the
most influential personality in Cuba was born in 1926 and graduated as a
lawyer in 1950, two
important events in Castro's life should be mentioned. As early as 1943,
certain
Cuban intelligence reports said that Castro had been recruited by the KGB.
The other
incident occurred in Bogotá, Colombia during the 1948 Pan-American
meeting. Fidel and other
Cubans participated in violent riots and distributed communist propaganda
against
the United States. On July 26, 1953, Castro attempted a revolution by
attacking the hospital and
military barracks in the city of Santiago. This unsuccessful attack was
brutally
crushed by Batista's forces, killing quite a few innocent people in the
process. This
repression caused a supportive reaction in favor of the Fidel Castro
movement. The repression and the
Castro trial made Castro appear like a hero. In 1955, Batista, to gain
popular support , decided to grant a general amnesty to political prisoners.
Immediately, Castro
traveled to Cuba where he joined Guevara's forces and the preparation for
the invasion of Cuba
began. The invasion of Cuba was launched from Mexico and consisted of
82
poorly armed revolutionaries . Within just two weeks of his arrival, Castro's
forces had
dwindled to just nine men. But in the end, Guevara's revolutionary theory
proved
correct: if the situation is appropriate, a small group of guerrillas can
destabilize
the existing government through the use of rural guerrilla operations.
Page | 57
With Castro now firmly in power, we have to consider one factor to explain
Soviet-Cuban influence in the Americas. The factor is the introduction of the
KGB to the
Cuban intelligence system . Since 1961, the Kremlin had doubts about its
ability to control
Castro and his government. Repeatedly, the Soviets tried unsuccessfully to
control their behavior,
therefore a plan was formulated to replace Castro with a pro-Soviet leader.
In 1961,
an attack was made to carry out this plan, but Cuba's internal security
system
discovered the plan and Castro was notified. The conspirators were quickly
eliminated and the
Soviet ambassador was asked to leave Cuba. In 1968, a second plot against
Castro was discovered but this time the Soviets played their cards better
and stopped the flow of
oil to Cuba and effectively created an economic crisis. Castro had no
alternative but to
listen to the Soviet demands. Castro would permanently stop criticizing the
Soviet Union
and make the Directorate General of Intelligence (DGI) subordinate to the
KGB. To enforce
their demands the Soviets placed a KGB colonel within the Cuban DGI. Since
1970, all Cuban embassies have Cuban DGI agents supervised by the KGB.
Puerto Rico
1. FALN (Armed Forces of National Liberation): The FALN is a
Marxist organization dedicated to the independence of Puerto Rico, but
after adopting some
radical Trotskyist principles and aid from Cuba, it changed its goals towards
world revolution. The FALNs
operate in New York, Chicago, Miami, Los Angeles, and Washington DC
Historically, the FALNs are
the largest group that resulted from the division of the Nationalist Party. The
FALNs have taken
responsibility for numerous bombs in federal buildings and department
stores. The
groups were extremely active from 1975 to 1977. In 1978, a
homemade device explosion blew away portions of the hands and faces of
bomb maker Willie Morales
(Morales escaped custody and was recaptured in 1983 while planning
another bomb attack
in Mexico. ). The loss of Morales was a serious handicap for the FALN but in
1980, while
in the initial stages of another bombing campaign, twelve members were
arrested by
Chicago police.
2. Macheteros: Los Macheteros are a conglomerate of four groups: Los
Macheteros,
the Popular Boricua Army (EPB), the Popular Revolutionary Movement and
the
Revolutionary Party of Puerto Rican Workers. Together they form a
well-trained and organized terrorist organization; most of its members have
been trained in Cuba. It is
also through Cuba that the Macheteros have established connections with
other
terrorist organizations. Traditionally, Macheteros have attacked federal
buildings and
recruiting stations for the United States armed forces. Several devices
exploded in 1979 and a naval bus was ambushed in the same year. In 1981,
the Macheteros
destroyed $ 40 million worth of jet planes at the
Puerto Rico Air National Guard base . During this incident the terrorists were
so confident that they recorded the operation
and a copy of the recording was sent to local television stations for
propaganda purposes . Los Macheteros are still the most dangerous active
Puerto Rican group.
Rightist Terrorism
In Latin America there is an abundance of far-right groups. They generally
begin when the government or the military is confronted with illegal
activities that they
can not legally control. Most of these groups are made up of
police or military personnel and generally have the tacit support of the
establishment. Right-wing groups
apart from being very anti-communist have names that explain their
ideologies. Some groups
found in Latin America have names like the White Hand, Death to the
Kidnappers, etc. Of all the right-wing groups in Latin America, there are only
a few
that operate within the United States. From these groups we will discuss
about Cubans.
Page | 58
Alpha 66
This group was formed by 66 Cuban refugees in Miami in 1962 with the
purpose of
overthrowing the Castro government. The group trains in South Florida and
has had several
armed incursions from Cuba. Its leadership is composed mainly of veterans
from
Playa de Girón.
Omega 7
This terrorist group split from Alpha 66. It is a more violent group and
responsible for
numerous bombs inside and outside the United States. Its targets are
people or
organizations that have contact with the Cuban government.
The Board for Revolutionary Coordination (JCR)
On February 13, 1974, four Latin American terrorist groups founded a
coalition
to offer between both weapons, sanctuary, and financial support. The
original groups
involved in this coalition were the Tupamaros of Uruguay, Los Montoneros
of Argentina, the MIR
of Chile, and the ELN of Bolivia. The success of the JCR can be measured
by tracing the life of one of its
most famous recruits Elich RamÃrez Sánchez (Carlos). Sánchez, born in
Venezuela, approached
the local communist party with the purpose of dedicating his life to the
benefit of Marxist idealism. The
Venezuelan Communist Party, on the other hand, approached the JCR. The
JCR was put in charge of
financing Sánchez's trip from Venezuela to Mexico and Cuba and finally to
the
Patrice Lumumba University in Moscow. We know Sánchez as "Carlos the
Jackal". The first funds
used to establish the organization came mainly from bank robberies and
kidnappings
for money carried out by the Tupamaros and the Montoneros.
Summary
The threat to Latin American interests continues to be a potentially
dangerous one
for the region; recent activity has done nothing to lessen this threat. The
potential
for the threat has increased tremendously all over the world including
countries
that traditionally have good relations with the United States.
This chapter has illustrated the role that terrorism has played in almost
every
country in the world.
Page | 59
lost their lives during this period. Since then numerous terrorist activities
have
been noted but few had a major impact on world order until the next
century.
Alexander II
The origin of contemporary terrorism can be traced to philosophical
terrorists such as
Bakunin, Nechayev, Morozov, from the 19th century in Russia. 'Serge
Nechayev's revolutionary catechism illustrates the philosophy of
revolutionary terror. MikhaÃl Bakunin exported the
revolutionary philosophy of terrorism from Russia to Central and Western
Europe with little success but he
managed to sow the seeds of terrorism that now produces high violence.
When Tsar
Alexander II was assassinated by a revolutionary group, this event caused a
series of incidents
that culminated in the Russian revolution and the murder of the royal family
in Ekaterinenburg. When
Gavril Princip, the Serbian revolutionary assassinated Archduke Franz
Ferdidnand in Sarajevo, it was a
terrorist act motivated by nationalism. This assassination started World
War I,
caused millions of deaths, destroyed three royal dynasties, and influenced
the formation of a
new Europe that instead contributed to another World War.
Countries, colonial wars and the fervor of liberation after World War II
The radical political movement of the students of the 1960s contributed to
this
phenomenon. The increase in the military power of the Soviet Union and its
activities outside its
borders gave the terrorists an ideological base, material, and training
support
as well as hideouts and operational bases. Many legitimate movements for
national liberation,
colonial wars and insurgencies were infiltrated and subverted by
revolutionary Marxists,
becoming more oppressive regimes than previous regimes. The
constant troubles in the Middle East created numerous terrorist
organizations that are
responsible for the most brutal acts known to man. Leftist groups
supported
by the Marxist / Communist Revolutionary Movement continue to terrorize
free societies on
all continents. At the same time, right-wing terrorism is increasing and
represents a threat to the stability of free societies. Advances in technology
allow terrorist organizations to communicate, travel, organize and operate
on a
global scale . As parasites, terrorists take advantage and exploit the laws of
democratic institutions to destroy the very societies in which they operate.
Today terrorism is
one of the most dangerous threats to the existence of any free country.
A quick review of some incidents of terrorism will help to better understand
terrorism in our contemporary society.
Munich
On September 5, 1972, at the Olympic games in Munich, the
Black September Organization carried out an operation that has become the
famous "Munich Massacre".
Seven terrorists seized control of the Israeli athletes' dormitory in the
Olympic village,
killing two athletes and taking nine hostages. Israel rejected the group's
demands
to release 200 Palestinian prisoners but at the West German
Furstnfeldbruck airport,
snipers opened fire. The result that all the hostages, five terrorists and one
police officer
were killed. The incident focused world attention on the Palestinian cause. It
was later discovered
that this was a truly international operation. There was assistance from the
BR of Italy, the
terrorists Baader-Kienhof from Germany and Palestinian terrorists. Less
than two months later,
on October 29, a Lufthansa plane was hijacked by two terrorists who
threatened to
destroy the plane mid-flight if the terrorist survivors of the Munich incident
were not released. They were released.
Page | 61
Iran
On November 5, 1979, in Tehran, the American embassy was taken over by
the
Revolutionary Guards, with the knowledge and help of the new Iranian
government.
Fifty-two American hostages were taken for four hundred and forty-four
days. The situation
resulted in the aborted rescue attempt in April 1980. This incident is a
classic example
of media manipulation. An
extensive media campaign was declared by the Iranian Information Ministry
denouncing the United States
as the evildoers. It was apparent that the embassy seizure was done with
the knowledge and support
of the Iranian government who could have ended the situation if they
wanted. The negotiations were
designed to embarrass the United States and to make the Iranian
government appear as if it
were fighting for their freedom. This incident is full of mistakes made by the
US government.
General Krosen's Automobile
On September 15, 1981 in Heidelberg, West Germany, General Frederik
Krosen was ambushed by terrorists from the Red Army Faction. Two RPG-
7s were launched
against his armored car. One failed but the other hit the rear of the
car but did not explode. Krosen, very fortunate, escaped with very little
damage. This incident
is important because it was planned in a professional way. The location of
the ambush was
well selected, the route and the general's routine was known and as a
security measure to
ensure success the ambush site was covered by small-caliber weapons.
The Headquarters of the Marine Corps in Beirut
On October 23, 1983, in Beirut, Lebanon, the Headquarters of a battalion
of marine infantry that also served as barracks was bombed. A building
made of
reinforced concrete was completely destroyed. An extremist Muslim
terrorist, who had attended
his own funeral the night before the bombing, drove a yellow Mercedes
truck to
headquarters. The Mercedes had a gas-augmented explosive charge that
was later estimated
by FBI experts to be equivalent to 12,000 pounds of TNT. They also
estimated that if the truck
had been parked outside the concertina wire, on the highway, more than 330
feet from
headquarters, the result would have been the same. There were 241
Marines killed and more than
100 wounded in this suicide attack. This incident caused a change in US
policy
towards Lebanon.
Disco in Berlin
Two soldiers of the American army died in April 1986 in a discotheque in
Berlin,
East Germany when it was bombed. The United States through
intelligence sources were able to link Libya to the bombing. President
Reagan on
national television directly accused Colonel Gaddafi for being responsible
for the bombing. In reaction
and as a counter-terrorism measure, the United States launched an airstrike
on Libya.
Counter-terrorism Program
Intelligence is the first line of defense in a counter-terrorism program. It is
necessary to have a systematic and well planned program using intelligence
from various sources.
The role of intelligence in a counterterrorism program is to identify the
threat and provide
intelligence on the threat in a timely manner. This includes evaluating the
capabilities of the
Page | 62
terrorists, their tactics, the strategy they use in identifying their targets and
the dissemination
of this information. Intelligence serves as the foundation of operations and
preventive measures . A complete understanding of terrorism, ideological
motivation,
terrorist organization , modus operandi, and indicators at all levels is
necessary for the production of
intelligence in support of anti-terrorism and counter-terrorism.
Threat analysis is the process of compiling and examining all available
information to
develop intelligence indicators on possible terrorist activities. The
threat analysis is the first step in determining our vulnerability to attack
terrorists.
The ability of an intelligence system to provide critical and timely
information to the
user depends not only on the ability to collect and process, but also
depends on the
ability to organize, store, and retrieve information quickly. This capability, in
conjunction with early warning, careful observation, and threat analysis, aids
the
intelligence analyst's ability to predict the types of terrorist attacks and the
timing of these
attacks.
Implementing a successful counterterrorism program using intelligence
requires doing so in support of government policy on terrorism. An example
of this policy
would be:
Every terrorist act is criminal and intolerable, regardless of its motives and
should be
condemned.
All legal measures will be taken to prevent such acts and to bring justice to
those who commit such acts.
No concessions will be made to terrorist extortion, as it would invite the
request for more
demands.
During an incident, close and continued contact will be maintained with the
countries
involved, supporting them with all practical intelligence and technical
services, advice
will be provided on how to respond to specific terrorist acts and demands.
International cooperation to combat terrorism is a fundamental aspect, all
governments are vulnerable and all avenues to strengthen such cooperation
must
be pursued.
Characterization of a Terrorist Act
To play an effective role, intelligence has to understand the characteristics
of
terrorism, its objectives, its strategies, as well as having an understanding
of
terrorist groups and their members. It is through this avenue that
intelligence will be able to support
counter-terrorism programs.
Characteristics of Terrorism
Terrorism is a way to achieve fear.
Page | 63
The fear of the general population also as the declared enemy of the
terrorist
strengthens him more than his own capacity.
Victims of terrorism are not necessarily the target of terrorists. The
terrorist's target will often be selected for its symbolic value.
Terrorists want publicity. This topic will be discussed further in our
discussion
of the terrorists' goals later.
Tactical success and strategic mission are not necessarily related. A
particular mission may fail but at the same time it can contribute to long-
range goals.
Terrorist incidents are frequently used as armed propaganda and use
violence for impact value. The Palestinian saying "if one individual is
punished, then a hundred
will be afraid" is applicable.
Terrorist attacks are rarely suicidal. They are professionally planned and the
terrorist is committed and prepared to die for their cause, but they do not
normally
plan to die in the execution of their mission.
The numerical number of terrorists does not normally matter. A small group,
well organized, armed, and with good leadership can cause a lot of damage.
Contemporary transportation systems provide terrorists with the means to
increase their attacks anywhere in the world.
Terror is a cheap and effective form of warfare. It is not necessary to have a
well-equipped armed force to implement a successful terrorist operation.
Terrorism can be used by a poor country as its way of war. It may be
that terrorism is the only way that a poor country can attack a
modern superpower .
Most contemporary terrorists are well motivated, trained and
equipped.
In many cases the terrorists are supported internationally. They can be
supplied with weapons, money, equipment, intelligence, and even
propaganda from other nations. The
Soviet Union, East Germany, North Korea, Cuba, Libya, Iran, and Syria are
renowned for
the support they provide to different terrorist groups.
Long Range Objectives
Cause a dramatic change in government, such as the overthrow of a
government or a
significant change in its policy.
Cause a constant disinformation campaign to unbalance and misinform the
general population and the government.
Destabilize the government.
Page | 64
Gain the attention of those groups that terrorists claim they are fighting for.
Gain the attention of the opposition.
Proclaim your cause.
Rushing the government.
Cause government international embarrassment.
Prove your power and establish your credibility.
The media can be used by terrorist groups to learn from
the experiences of other terrorist groups.
It can be used to demonstrate the ineptitude and failure of the government.
Definition of a Terrorist Group Terrorist
groups can be categorized as: not supported by a country, led
by a country or supported by a country. They can also be categorized
according to their
national / domestic, transnational and international way of operating.
National / Domestic. Terrorist groups that generally want political influence
and
power, operate within their own country and can receive external support.
The Symbiotic
Liberation Army is an example of this group, also like the Arian Nation.
Transnational. Terrorist groups that operate across international borders
outside
the reach of the government and that can receive support and sanctuary
from countries sympathetic to their
cause. Most terrorist groups are in this category. The PLO is the largest
transnational terrorist group . Others include the Red Army Faction, the Red
Brigade, the
Irish Republican Army (Provisional), and the Armenian Secret Liberation
Army.
International. Groups that are under the control of the government, operate
across
international borders , and their actions represent the national interests of
that government. The
murderers squads trying to assassinate Iranian ex-official Iranian people
and anti -
Khomeini are classified as international terrorists. The assassin squads
sent
by COL Gaddafi are also classified.
There is another category but few groups are classified within this category.
This
category is extra-territorial and consists of groups operating against targets
in a third country.
The Japanese Red Army fell into this category when in May 1972 three of its
members were
involved in an incident at Lod airport in Israel. This group operated under the
control of
the Popular Front for the Liberation of Palestine. They planted weapons in
their luggage in Rome and
proceeded on a plane from El AL to Tel Aviv. After claiming their luggage at
the
Lod airport, they removed the weapons and fired indiscriminately at the
public. The result was that
28 people died and 67 were injured. Most of the dead were
Puerto Rican pilgrims visiting the Holy Land.
Page | 66
Definition of a Terrorist
A terrorist is distinguished by his use of innocent victims to achieve his
objective.
There are several names associated or equivalent to the word terrorist.
These are:
Saboteur: Individuals or groups involved in the interruption, damage or
destruction of production, transportation, communication or other services
or
military operations .
Guerrillas: Para - or quasi - military organizations involved in an
armed conflict within their own country or in a foreign conflict.
Partisans: A military organization separated from your command to fight,
disrupt, disturb, and destroy through unconventional means.
There may be many names, but the categories of terrorists are well defined
by
Dr. Frederick Hacker. He categorizes them as: insane, criminals, political
defenders. The most
dangerous for any country is the political defender.
To better understand terrorism, it is necessary to have a good
understanding of the
individual terrorist and his psychology. Some examples are:
Ilych RamÃrez Sánchez, known as Carlos the Jackal. He is possibly the
most notorious terrorist today.
Carlos Marighella: A contemporary terrorist known more for his
literary work than for his involvement in terrorist incidents. This Brazilian
Marxist author
wrote "The Mini Manual for the Urban Guerrilla", a book that has become the
manual for contemporary terrorists.
Dr. George Habash: This Christian Palestinian along with Dr. Wadi Haddad
was the author of some of the bloodiest incidents in the 1970s including the
1972 Lod airport attack .
Typology of Terrorism
Terrorism can be used in various ways. situations and directed towards
different objectives. The
following typology of terrorism provides the context under which terrorism
can be used:
Revolutionary: Terror used as an instrument to overthrow a government.
Examples include the FMLN of El Salvador and the Vietcong of Vietnam.
Subrevolutionary: Terrorism used to gain influence within the government.
Examples include the Red Army Faction in Germany and the Red Brigades in
Italy.
Repressive: The use of terror against sectors of society, ethnic groups,
or religious groups. Generally, there is no conflict with the government. An
example includes the
Ku Klux Klan of the United States.
Establishment: Terror used by a government-supported or tolerated group
against government opposition. Examples include the KGB in the Soviet
Union and the
DGI in Cuba.
Page | 67
Introduction
Although terrorism appears to be a meaningless activity, a random activity
with
no possibility of prediction, it is actually an activity with a directed purpose,
and it lends itself
to systematic analysis. This chapter will deal with various techniques to
solve this
analytical problem . Keep in mind that these techniques are just a few of the
various
possible combinations of techniques that could be used to solve the
problem.
Terrorist Behavior and Patterns.
A thorough knowledge of terrorism, the motivators of terrorism, the tactics,
and the
ways of operating are essential for the analysis of terrorism. Terrorism is a
complex and
dynamic issue. It has to be continuously studied since it is a type of crisis
that contrasts
sharply with other crises of a more conventional nature.
Most terrorist incidents are public-oriented, violent, and
short-lived.
Generally, terrorists know more about authorities than
authorities do about terrorists.
Terrorist attacks are conducted with the element of surprise and there is
generally
very little warning, therefore pre-incident activities by authorities are routine.
Terrorist incidents develop faster than
conventional incidents .
Page | 68
Theft / robbery
4. Biographical information files should allow the identification of
key terrorists , characteristics, capabilities, training, connections, political
affiliations and
motivations, travel abroad, documentation, etc. The following database
must be
included in the biographical information:
Real name, date / place of birth
False names / nicknames
Identification numbers, passports, driver's licenses, local identification etc.
Physical description
Known addresses, shelters
Examples of the subject's handwriting
Psychological profile data
Participation in terrorist organizations
The Database should be referenced laterally to maximize its flexibility and
data removal.
Introduction to "Analytical Tools"
Time and information are the analyst's most precious elements. The
situation
demands that the analyst maximize the usefulness of information while
placing serious limits on the
time allowed for collection, organization, and analysis. This portion of the
module deals with a
number of techniques and tools available to the analyst to help them
combine
pieces of information, to obtain the greatest amount of information from
their content, and at the same time
obtain the most benefit from the time spent in their analysis. There are three
basic analysis techniques
that are particularly effective in the investigation of the activities of terrorist
groups, these
are the following:
Manipulation of matrices
Analysis of associations
Time graphs
Each of these tools involves the processing of information to obtain or
create a graph make it easy to read. They take bits of information and
organize them using
symbols so that true and implied consequences hidden among the pieces
become
more apparent.
Page | 72
reading the matrix, the analyst can then identify the optimal suspects for
ongoing surveillance, identify crucial suspects within the organization, and
greatly increase
the analyst's understanding of the group and how it is structured. The
technique
can also be used to present evidence to superiors, new investigators or
analysts
in a concise and concise manner. The examples that we have presented are
a bit simplistic
in scope, but if the investigation is of a group that has participated in 60 or
70 incidents,
involving 100 or 200 people, it would be very useful for the analyst. The
technique cannot
replace normal operating procedures for reporting, subject biocards, or
incident analysis, but it can be used to store crucial information that is
immediately available to the investigator when needed.
2. Association Analysis. There is another option to display the information
that has been
organized in matrices like those mentioned. This option is called the
association analysis . This technique has been used in a number of logical
scientific investigations.
Using the matrix, the relationship between individuals or places is
represented with numbers. In this
analysis, portraits or symbols are used to demonstrate relationships. "The
relationship between matrices and
the association analysis is the same as that between a mileage graph and a
road map . The mileage graph shows the connections between cities. using
numbers that
represent travel distances. The map uses symbols that represent cities,
locations, and other roads that show how two or more cities are connected.
Different symbols on the map have different meanings, and it's easy to
figure out the best route between
two locations as well as identifying obstacles that separate them.
The same is the case in association analysis. Different symbols are used to
identify different things. Obstacles, indirect routes or connections, and
suspected connections
can be easily and clearly demonstrated. In many In some cases, portraits
are easier
to interpret and work with than matrices. it is presented in a way that
emphasizes clarity. By using symbols instead of numbers, the results of
association analysis
cannot be manipulated mathematically in the way that matrices are
manipulated, so
the researcher interested in mathematical experimentation should use both
association analysis and matrices together. . The symbols used in
association analysis are easy
to describe and explain. Circles are used to represent people. Each subject
is
represented by a circle. Lines are used to demonstrate connections
between people. A
solid line indicates a confirmed relationship. A dashed line represents a
suspected relationship that has not been confirmed. For clarity, the circles
can be marked to show
who the individual is. In some cases, researchers may find a
relationship of two individuals who they believe to be one person using two
names. In
spite of his suspicions have not been confirmed, physical descriptions,
behavior,
method of operation, or other indications may lead researchers to believe
it's the same
person. For these cases intersecting circles are used. The use of
intersecting circles
allows researchers to pursue the analysis as if the two circles were one
person, while reminding them that this fact has not been confirmed.
to. Rules. There are several rules that have to be used when preparing
association analysis diagrams . Each individual is assigned a circle. The
circles and lines are
arranged so that no lines cross. Often, especially when dealing with
fairly large groups , it is very difficult to construct line diagrams where lines
do not cross. In these
extraordinary and complex cases, every effort should be made to keep the
number of lines to
a minimum. Association diagrams can also be constructed to teach
organizations,
cells, or action teams. These are represented by placing each individual
belonging to
each organization in a rectangle. Each rectangle. , represents an
organization or cell, or
action team.
Page | 74
Introduction
Basically, terrorist countering programs consist of four elements:
Prevention, Prevention, Reaction, and Prediction. For the reason that
terrorist organizations are
clandestine, identification and prediction are the most difficult factors.
Terrorism information , tactics, strategies, method of operation and history
of different groups is
of primary importance in countering terrorism. To run a successful anti-
terrorist program, it is necessary to have a full understanding of the political,
economic, social,
psychological, and ideological factors that motivate the individual terrorist
or terrorist groups. The
intelligence serves as the basis of all anti-terrorist program. All the different
stages such as
threat analysis, prevention, planning and crisis management depend
directly on accurate and timely intelligence.
The primary mission of intelligence is to provide information that satisfies
the
basic questions: who, what, where, when, how and why. In many cases,
traditional intelligence methods such as penetration, infiltration, and
surveillance are impractical
because many terrorist organizations operate in cells of three to six
members. Thus, the
ability to provide intelligence to prevent or prevent attacks decreases. The
estimation of the
terrorist capabilities to attack or the estimation of the different courses of
action have to
Page | 77
to react with measured action. Too strong a reaction can cause as much
damage to the
government as no reaction. One of the terrorists' goals is to cause incidents
where government authorities are forced to use too much force. In this way,
terrorists can use this as propaganda against the government. An effective
counter-
terrorism program depends on the timely identification of problems which
can develop into
violence and confrontations.
Indicators, produced from analyzes of past terrorist incidents, are valuable
tools in threat analysis and intelligence estimation. In many cases,
these indicators can appear as the normal exercise of democratic rights.
It should also be noted that many terrorists are well trained in subversion of
the
democratic process and use the system to advance their causes. This
manipulation, in the end, ends
with the destruction of the democratic system. The concern that can lead to
political violence
can be caused by the political, social and economic activities of terrorists
operating within the democratic system. As was the experience in
numerous conflicts,
terrorist violence indicates the initiation of an insurgency. Even when the
situation progresses to an
open insurgency situation, terrorist activities can play an important role.
There are numerous examples of this situation. Terrorism, which existed in
abundance during the
time of conflict before the 1950s, continued after the division of the country,
the only difference
being that the whites were different.
Reaction
One has to remember that one of the objectives of the terrorists is to
establish doubt
about the government in power. The ultimate goal of a terrorist may be the
overthrow of the
present government and the imposition of their own ideas through the use
of violence and threat.
But it is the nature of Western societies to listen to the arguments. The first
response to terrorist acts is to ask if the terrorists had reasonable demands,
and if
this is the case, if they should listen and try to solve the problem. Obviously,
this
puts us in direct conflict with the society we have.
The terrorist knows this contradiction and also realizes that any restriction
imposed by the government gives him propaganda to point out the
oppression of the government. While these
issues are important and have been studied at the national level by
countries of the Western world, they do not
deal with the appropriate reaction to terrorist acts. Most western countries
have special forces, well trained and equipped, to provide a tactical reaction
to these
incidents. In the past, these forces have been used successfully to minimize
loss of
life and destruction of property. But they have been forced to operate within
a legal framework and
under strong government control. While the use of these forces will always
be an
alternative, it is important not to react with these forces in the same way
every time.
There is plenty of evidence that the terrorist is adapting to the tactics
employed by these
special forces. Equipment that intercepts police communications and
machines to reproduce
official documents have been confiscated in terrorist hiding places.
Terrorists have used
counter surveillance and counterintelligence measures to disrupt detection
of their activities.
While a tactical reaction is a necessity in some cases, the character of the
reaction
has to be based on the type of terrorist action.
Prediction
Special forces trained in countering terrorist tactics are useless without
good
intelligence that gives them the ability to prevent attacks, arrest terrorists, or
react quickly
if an incident occurs. The traditional functions of the intelligence
community are
integral parts of every phase of a terrorist contraction program.
Page | 79
Introduction
Counterinsurgency operations are oriented towards the population and the
insurgents and the government established are competing for the support
of the indigenous population.
To fully understand and be effective in the application of CI techniques, CI
personnel
must be thoroughly familiar with their role within a counterinsurgency
environment.
Functions.
1. The first function of a CI agent is that she has to be completely familiar
with identifying indicators (signs) of an insurgency. These indicators are
born from the
Page | 80
political, economic, and social conditions of the nation and therefore the
roots of an
insurrection are based on these conditions.
2 The insurgency indicators are divided into three stages. The first stage
describes
the conditions that tend to nurture an insurrection, such as large social,
economic, and
political gaps between the small power structure and the majority. These
are
legitimate problems that insurgents can try to exploit and turn into
complaints against the
government. The second stage consists of those indicators such as the
murder and kidnapping
of local government officials that clearly indicate that there is an active
insurgency.
3. CI's effective operations in an insurgency environment are based on
building an operational information base. Accurate intelligence that is used
in
time is key to an insurrection. Like a conventional war, the intelligence for
an insurrection is collected, processed, integrated, and disseminated.
to. In addition to documenting the database, there is a requirement for
accurate and current intelligence of subversive activities and the
development of insurrections.
b. Such advisory data is essential for contingency planning,
training reorientation , and initiation of preliminary operational plans. This
type of intelligence is
collected by CI via the multidisciplinary method. Ordinary intelligence
combined with foundation
It would document the operational database of the CI agent. The
operational database
provides CI staff with an expedient method of analyzing patterns in an
insurrection.
Includes information regarding political, social, economic,
geographic, and military insurrection intelligence . From this database, CI
targets are selected and
recommendations such as population and resource control measures are
made.
4. Another mission for which the CI agent is responsible is to analyze the
database that he
has created. The constant renewal of the database is of extreme
importance in the
analysis and understanding of the insurgent organizations and their goals.
Areas of
concern when analyzing the database are: changes in boundaries, changes
in
organization diagrams, changes in the method of operation, and changes in
the subject of
propaganda.
to. Insurgent borders reflect organization, strength, weaknesses, and
priority areas . They differ from government borders as their borders reflect
their own
needs. In addition, these borders are political borders rather than
military operations borders . The support apparatus has political boundaries
within which it functions to support
the insurgent unit for that particular area.
b. The transfer of command and organizational changes may be the most
revealing in terms of the internal development of insurgent organizations.
Command transferred
from a higher level may be an indication of problems in subordinate
elements, and the
command was sent to solve the problems. Members may be elevated within
the
insurgent organization based on successes. By studying these changes,
subordination
within the infrastructure can be determined.
c. When insurgents change their methods of operation,
conclusions can be made regarding their capabilities. Specific operations
can be based
on your understanding of the enemy's method of operation. Insurgents
usually reveal
their general objectives in propaganda, delivered to their own personnel or
to the population.
Page | 81
5. Another function of CI agents is to recommend CI targets for
neutralization.
CI targets can include personalities, facilities, organizations, and documents
and
materials. A CI target is someone or something that fits into one of the
categories described
above, may or may not be hostile.
to. Personality targets often prove to be valuable sources of intelligence.
Some examples of these targets are government officials, political leaders,
and members of the
infrastructure. Installation targets are a serious threat to the security of the
armed
forces. If properly exploited, these facilities can provide information of
significant value. The continued operation of these facilities during combat
can
jeopardize the commander's mission. Some facility-type targets of interest
to the commander,
and of immediate importance to CI, can be found in any town or city
regardless
of their location. Some examples are operational bases,
communication centers , and shelters. Organizations or groups that could
be a
potential threat to the government also have to be identified as targets.
Although the
threat may not be apparent, insurgents frequently hide
subversive activity behind front organizations. Examples of hostile
organizations or groups
are paramilitary groups, labor organizations, and dissident groups.
b. CI agents also have to be able to exploit targets that are known or
suspected
to have documents, equipment, or materials of intelligence value. These
articles of
intelligence value are the archives of insurgent operational bases, training
centers;
manufactured products or other materials that can provide support to
hostile elements in the
rear.
5. After the targets have been identified, the CI agent will recommend
specific operations for these targets. Recommendations can result in
special, tactical, or joint operations.
to. CI agents are also involved in recommending control
and population measures to the authorities. These recommendations are
based on indigenous and
external support to the insurgents as well as the capacities to carry them
out.
b. These measures are divided into three forms of control: surveillance,
restriction, and coercion.
These measures are designed primarily to detect and control the movement
of
human and material resources. The proper application of these measures
will break the supportive relationship between
the population and the insurgent and at the same time provide a safe
physical and physiological environment for the
population.
6. CI plays a great role in recommending positive courses of action to
improve facility security in an environment of insurrection. Human
intelligence
is the one that is the greatest threat to the security of the facilities.
to. The signal intelligence threat ranges from the interception
of radio communications to the interception of telephones. The imaging
intelligence threat is typically
limited to handheld camera photography, and gives the insurgent the ability
to
analyze security weaknesses.
b. To neutralize these threats, the CI agent has to employ the
appropriate countermeasures to be able to properly estimate enemy
capabilities. In other words, the
key to achieving this is the development and implementation of effective
measures to deny
insurgents information regarding our operations. Areas of Interest on a
Page | The
1. Human Resources. Among the services that the local population provide
to the
insurgents are recruits, intelligence, manual labor, guides, and couriers.
2. Recruits. Traditionally, insurgent groups have had to depend on the
local population, to supply them with the personnel required by the
expansion of
political and military organizations . No matter whether they are recruited
voluntarily or by force, the insurgents
depend on a continuous supply of recruits from the local population for the
success of their
insurrection.
3. Intelligence. Insurgent military and political organizations cannot operate
effectively without good intelligence. In a situation of internal attack,
insurgents can
collect this information, either through established informant networks or by
routine interrogation of local inhabitants. Due to their status as non-
combatants, the local inhabitants
enjoy the ability to obtain intelligence from government forces that would be
impossible for the insurgents to obtain.
4. Manual work. Traditionally, the insurgents have depended on the
inhabitants
to do various manual tasks that range from filling sandbags to
building casemates at operating bases; the transportation of supplies and
the
evacuation of the wounded. The need for these services is obvious because
the insurgents do not have
the staff or the time to do these activities.
5. Posts and Guides. The locals are good couriers and guides, not only
because they are civilians, but because of their knowledge of the area. In
addition, due to their position outside
the insurgents' political and military organization, they are not in a position
to engage others.
Material resources.
By developing a list of critical items it becomes obvious that the insurgent
needs to
have certain items such as food, water, and clothing. They have to discover
which element or
elements are absolutely essential to the effective operations of the
insurgent.
A typical list of critical materials for insurgents should contain at least the
following items:
1. Food. The insurgents' ability to acquire food is a critical factor in
any insurrection.
2. Salt In any country with a tropical climate, salt is a critical element in the
insurgent diet .
3. Clothes. Clothing is a material that varies in importance according to the
location of the world.
4. Weapons, ammunition and explosives. Any insurgent group has a
critical need for these elements. They can range from the use of very
primitive weapons to
reliance on highly sophisticated weapons, equipment and ammunition.
5. Transportation Equipment. Insurgents must have some way of moving
supplies from production points to storage sites and from storage sites to
the
units for which they are intended.
Page | 84
Guerrilla Manual
Urban Guerrilla
Warfare
Page | 87
Introduction
Urban Guerrilla Urban
violence has always been a part of revolutionary struggle, but since
1968 the world has become familiar with a new aspect of revolutionary
warfare. This is the
systematic employment of guerrilla tactics in an urban setting as part of a
coordinated strategy designed to secure revolutionary objectives.
Marighella tried to solve the problem of how to promote the revolution when
all
the political and social advantages were with the counterrevolutionaries.
His answer was
relatively straightforward, but no less powerful for this. The insurgents had
not been able to
establish themselves in rural areas because the security forces were so
strongly established
in the countryside. This grip of the security forces had to be broken by
attracting
the security forces to urban areas to deal with a deteriorating situation. In
this way, rural guerrillas could establish themselves in the resulting vacuum
and
urban and rural guerrillas would then complement their efforts.
By doing this, they would keep the security forces out of balance, unable to
concentrate to deal with either threat (urban or rural) and would
subsequently be
defeated. Both revolutionary efforts would have to develop simultaneously;
one
without the other would be defeated.
What Marighella proposes is the polarization of society where public
support for
an increasingly repressive regime wanes and popular support and sympathy
for the
insurgents increases. In this way, through the production of a crisis of trust
in
society, Marighela believed that the conditions needed for the overthrow of
an
established order would be achieved. To accomplish this, Marighella
devised a list of tactics that could
be used to ridicule and discredit the authorities. These tactics range from
assassination and bombings to barricading the street; anyone could pick it
up and use it.
We can summarize the importance of Carlos Marighela by saying that he
combined a number of
ideas and produced a new concept of revolutionary warfare.
Below we have translated the Mini-Manual of the Urban Guerrilla that has
assured
Carlos Marighela the fame, notoriety, and influence that have lasted beyond
his death in
1969. Its study is essential for anyone who wants to achieve a better
understanding of the guerrilla revolutionary war.
Page | 88
Introduction
A definition of the Urban Guerrilla
The chronic structural crisis characteristic of Brazil today, and its resulting
political instability , are the reasons for the abrupt emergence of the
revolutionary war in the country The
revolutionary war manifests itself in the form urban guerrilla warfare,
psychological warfare, or
rural guerrilla warfare. Urban guerrilla warfare or psychological warfare in
the city depend on the
urban guerrilla.
The urban guerrilla is a man who fights against a military dictatorship with
weapons, using unconventional methods. A political revolutionary and
ardent patriot, he
is a fighter for the liberation of his country, a friend of his people, and of
freedom. The area in
which the urban guerrilla acts is in the big Brazilian cities. There are also
many
bandits, known as criminals, who work in the big cities. Often times
assaults by criminals are interpreted as actions by guerrillas.
The urban guerrilla, however, differs radically from the criminals. The
offender
personally benefits from his actions, and attacks indiscriminately without
distinction between the
exploited and the exploiters, which is why there are so many everyday men
and women among his
victims. The urban guerrilla pursues a political goal and only attacks the
government, the big
capitalists, the US imperialists.
Another element equally harmful than the criminal, and that also operates in
the
urban environment is the rightist counter-revolutionary who creates
confusion, robs banks, drops
bombs, kidnaps, assassinates, and commits the most heinous crimes
imaginable against
urban guerrillas. the revolutionary priests, students, and citizens who
oppose fascism and seek freedom.
The urban guerrilla is an implacable enemy of the government and inflicts
systematic damage on the
authorities and the men who hold power and exercise power. The main job
of the
urban guerrilla is to distract, tire, and demoralize the militarists, the military
dictatorship, and the
repressive forces, as well as to attack and demoralize the militarists, the
military dictatorship, and the
repressive forces, as well as to attack and destroy the wealth of the
Americans,
foreign managers, and the Brazilian upper class.
The urban guerrilla is not afraid of dismantling or destroying the present
Brazilian economic, political, and social system, since his goal is to help the
rural guerrilla and collaborate in the creation
of a totally new system and a revolutionary social and political structure,
with the
armed masses in power.
The urban guerrilla must have a certain minimum of political understanding.
To achieve
this you have to read certain printed or mimeographed works such as:
Guerrilla War
by Che Guevara Memoirs of a Terrorist, Some Questions from
Brazilian Guerrillas , Guerrilla Operations and Tactics, On Problems and
Strategic Principles , Certain Tactical Principles for Comrades Carrying out
Guerrilla Operations , Organizational Questions, O Guerrilheiro, Newspaper
of the
Brazilian Revolutionary Groups , Personal Qualities of an Urban Guerrilla
Page | 89
The urban guerrilla is characterized by his courage and decisive nature. You
have to
be good tactically and be a skilled leader. The urban guerrilla has to be a
smart person
to compensate for the fact that he does not have enough weapons,
ammunition and equipment.
The career military or government police have modern weapons and
transportation and
can travel freely, using the force of their power. The urban guerrilla has no
such
resources at his disposal and leads a clandestine life. Sometimes he is a
sentenced person
or is on probation, and is forced to use false documents.
However, the urban guerrilla has a certain advantage over the conventional
army or the
police. This is, that while the police and the military act in favor of the
enemy, whom the
people hate, the urban guerrilla defends a just cause, which is the cause of
the people.
The urban guerrilla's weapons are inferior to those of his enemy, but seen
from a
moral point of view, the urban guerrilla has an advantage that cannot be
denied. This
moral superiority is what sustains the urban guerrilla. Thanks to it, the urban
guerrilla can carry
out his main job, which is to attack and survive.
The urban guerrilla has to capture or divert weapons from the enemy in
order to fight.
Because their weapons are not uniform, since what they have has been
taken or has come into their
hands in different ways, the urban guerrilla is faced with the problem that he
has a variety
of weapons and a shortage of ammunition. Furthermore, he has nowhere to
practice shooting.
These difficulties have to be conquered, which forces the urban guerrilla to
be
imaginative and creative, qualities that without which it would be impossible
for him to carry out his role
as a revolutionary.
The urban guerrilla has to possess initiative, mobility, and flexibility, as well
as
versatility and command of any situation. Initiative is an especially
indispensable quality . It is not always possible to anticipate everything, and
the urban guerrilla cannot be
confused, or wait for orders. Your duty is to act, to find adequate solutions
for each problem you encounter, and not to withdraw. It is better to make
mistakes by acting than to
do nothing for fear of making mistakes. Without the initiative there can be
no
urban guerrilla warfare.
Other important qualities in the urban guerrilla are the following: that he can
walk a lot, that is resistant to fatigue, hunger, rain, and heat, know how to
hide
and watch, conquer the art of having unlimited patience, staying calm and
quiet in the
worst conditions and circumstances, never leaving footprints or traces, not
being discouraged .
In the face of the almost impossible difficulties of urban warfare, many
comrades
weaken, leave, or leave revolutionary work.
The urban guerrilla is not a businessman in a commercial firm nor is he an
artist
in a work. Urban guerrilla warfare, like rural guerrilla warfare, is a promise
that the guerrilla makes to himself. When you can no longer cope with
difficulties, or you
recognize that you lack patience to wait, then it is best to surrender your
position before
betraying your promise, as you lack the basic qualities necessary to be a
guerrilla.
Page | 90
reinsure the bank capital, the imperialist companies and the state and
federal governments,
all of them systematically expropriated from now on.
The fruits of these expropriations have been dedicated to the work of
learning and
perfecting urban guerrilla techniques, the purchase, production, and
transportation of
arms and ammunition from rural areas, the security apparatus of the
revolutionaries, the
daily maintenance of soldiers, those who have been released from prison by
the armed
forces and those who have been injured or persecuted by the police, or from
any type of
problem that concerns comrades who have been released from prison, or
killed by police and
the dictatorship military.
In Brazil, the number of violent actions carried out by urban guerrillas,
including deaths, explosions, seizures of arms, ammunition, and explosives,
robberies of banks and
prisons, etc., is significant enough to leave no doubt about the
true intentions of the revolutionaries. The execution of the CIA spy Charles
Chandler,
a member of the US Army who came from the Vietnam War to infiltrate the
Brazilian student movement , the lackeys of the military killed in bloody
encounters with the
urban guerrillas, all are witnesses to the fact that we are in a
complete revolutionary war and that war can only be fought by violent
means.
This is the reason why the urban guerrilla uses the struggle and why he
continues to
concentrate his activity on the physical extermination of the agents of
repression, and to dedicate 24
hours a day to the expropriation of the exploiters of the population.
Technical Preparation of the Urban Guerrilla
No one can become an urban guerrilla without paying particular attention to
technical preparation.
This technical preparation of the urban guerrilla stems from his concern for
physical preparation, his knowledge and learning in professions and skills of
all kinds,
particularly manual skills.
The urban guerrilla can have strong physical endurance only if he trains
systematically. He cannot be a good soldier if he has not studied the art of
fighting. For this
reason the urban guerrilla has to learn and practice various types of fighting,
attack, and
personal defense.
Other useful forms of physical preparation are hiking, camping, and
practicing
forest survival, climbing mountains, rowing, swimming, diving,
frogman training , fishing, harpooning, and hunting birds, and large and
small animals.
It is very important to learn to drive, pilot an aircraft, handle a small boat,
understand mechanics, radio, telephone, electricity, and have some
knowledge of
electronic techniques .
It is also important to have knowledge of topographic information, to be
able to locate the
position by instruments or other available resources, to calculate distances,
make maps and
plans, draw to scale, take times, work with scales, compass, etc.
A knowledge of chemistry and color matching, stamp making,
mastery of the art of calligraphy and letter copying along with other skills
are part of the
Page | 92
revolver .38 caliber, our "standard" weapon. The .32 caliber is also useful for
those who
want to participate. But the .38 is preferable as its impact usually puts the
enemy out
of action.
Hand grenades and conventional smoke bombs can be considered
light weapons. With defensive power for concealment and withdrawal.
Long-barrel weapons are more difficult to transport for the urban guerrilla
since
they attract a lot of attention due to their size. Long-barrel weapons include
the FAL, Mauser
guns and rifles, hunting weapons such as the Winchester, and others.
Shotguns can be useful if they are used at short distances. They are useful
even for
people with very poor aim, especially at night when accuracy is not of much
help. Bazookas and mortars can be used in action but the conditions for
using them
have to be prepared and the people who are going to use them have to be
trained.
The urban guerrilla should not try to base his actions on the use of heavy
weapons,
which have serious disadvantages in the type of fight that demands light
weapons that ensure
mobility and speed.
Homemade weapons are often as efficient as the best weapons produced
in conventional factories, and even a sawed-off shotgun is a good weapon
for an
urban guerrilla .
The role of the urban guerrilla as a producer of weapons is of fundamental
importance.
Take care of your weapons, know how to repair them, and in many cases
you can establish a small
station to improvise the production of small and efficient weapons.
The work in metallurgy and on the mechanical lathe are basic skills that the
urban guerrilla must incorporate in his industrial planning, which is the
planning of homemade weapons.
These constructions and courses in explosives and sabotage must be
organized. The
primary materials for practice in these courses must be obtained ahead of
time to
avoid incomplete learning, that is, not to leave enough space for
experimentation.
Molotov cocktails, gasoline, and household gadgets such as boxes of tubes
and cans,
smoke bombs, mines, conventional explosives such as dynamite and
potassium chloride,
plastic explosives, gelatin capsules, and ammunition of all kinds are
necessary for success.
of the mission of the urban guerrilla.
The method of obtaining the necessary materials and ammunition will be to
buy them or
take them by force in specially planned and carried out expropriations.
The urban guerrilla will be careful not to keep explosives and materials for
too
long as they can cause accidents, but he will try to use them immediately on
pre-selected targets .
The urban guerrilla's weapons and his ability to maintain them constitute his
firepower. Taking advantage of the use of modern weapons and
ammunition and introducing innovations
in his firepower and his use of certain weapons, the urban guerrilla can
change many
of his urban warfare tactics. An example of this was the innovation made by
urban guerrillas in Brazil when they introduced the use of the machine gun
in bank attacks.
Page | 94
When the massive use of machine guns, uniforms becomes possible, there
will be new
changes in urban warfare tactics. The firing group that uses uniform
weapons and
corresponding ammunition, with reasonable support for their maintenance,
will reach a
considerable level of efficiency. The urban guerrilla increases his efficiency
as his
shooting potential increases .
The Shot: The Reason for the Existence of the Urban Guerrilla
The reason for the existence of the urban guerrilla, the basic condition for
which he acts and
survives, is to shoot. The urban guerrilla has to know how to shoot well
because it is
required by this type of combat.
In conventional warfare, combat is generally ranged with long-
range weapons . In unconventional warfare, in which urban guerrilla warfare
is included, the
combat is at close range, very short. To avoid his own extinction, the urban
guerrilla has
to shoot first and cannot make a mistake in his shot. You can't waste your
ammunition
because you don't have large amounts of it, so you have to save it. Nor can
he replace his
ammunition quickly, because he is part of a small group in which each
guerrilla has to
take care of himself. The urban guerrilla cannot waste time and must be
able to shoot in one shot
.
A fundamental fact, which we want to fully emphasize and whose
fundamental importance cannot be overestimated, is that the urban
guerrilla must not shoot
continuously, using all his ammunition. It may be that the enemy is not firing
precisely, he is waiting until the guerrilla's ammunition has been used up. At
such a
time, without having time to replace their ammunition, the urban guerrilla
will face a
rain of enemy fire and can be taken prisoner or killed.
Despite the value of the surprise factor that often makes it unnecessary for
the
urban guerrilla to have to use his weapons, he cannot be allowed the luxury
of entering combat without knowing
how to shoot. Face to face with the enemy, he has to be in constant
movement from one
position to another, because staying in one position makes him a fixed
target and, as such,
very vulnerable.
The life of the urban guerrilla depends on shooting, on his ability to handle
small arms well as well as on avoiding being targeted. When we talk about
shooting,
we talk about marksmanship as well. The aim must be learned until it
becomes a
reflection on the part of the urban guerrilla.
To learn how to shoot and have good aim, the urban guerrilla has to
train systematically, using each learning method, shooting at targets, even
in amusement parks and at home.
Shooting and aiming are the water and air of an urban guerrilla. His
perfection in the art
of shooting makes him a special type of urban guerrilla, that is, a sniper, a
category of
solitary combatant indispensable in isolated actions. The sniper knows how
to shoot, at
close range or at long range, and his weapons are suitable for any type of
shot.
The Fire Group
In order to function, the urban guerrilla has to be organized into small
groups,
directed and coordinated by one or two people, this is what constitutes a
fire group.
Page | 95
Within the firing group there must be full trust between the comrades. The
best
shot and the one who knows how to handle the machine gun is the person
in charge of
operations.
When there are tasks planned by the strategic command, these tasks take
precedence. But there is no such thing as a fire group without your own
initiative. For this reason it
is essential to avoid any rigidity in the organization to allow as much
initiative as possible on the part of the firing group. The old type of
hierarchy, the
traditional leftist style, does not exist in our organization.
This means that, except for the priority of objectives designated by the
strategic command , any group of fire can decide to rob a bank, kidnap or
execute an
agent of the dictatorship, a figure, identified with the reaction, or a North
American spy, and it can
carry out any kind of propaganda or nerve warfare against an enemy
without the
need to consult with the general command.
No fire group can remain idle awaiting orders from "above." Your
obligation is to act. Any urban guerrilla who wants to establish a fire group
and
begin action can do so and thus become part of the organization.
This method of action eliminates the need to know who is carrying out what
actions since there is free initiative and the only point of importance is to
substantially increase the
volume of guerrilla activity to wear down the government and force it on the
defensive. The
fire group is the instrument of organized action.
With it, guerrilla operations and tactics are planned, launched, and carried
out successfully.
The general command relies on the fire group to carry out its objectives of
a strategic nature, and to do so in any part of the country. For his part, he
helps the
fire groups with their difficulties and needs.
The organization is an indestructible network of fire groups, and of
coordination among
them, that works simply and practically with the general command and that
also participate in the
attacks; and organization that exists for the sole purpose, simple and pure,
of revolutionary action.
Urban Guerrilla
Logistics Conventional logistics can be expressed with the simple CCEM
formula:
C - Food
C - Fuel
E - Equipment
M - Ammunition
Conventional logic refers to maintenance problems for a
regular army of the armed forces, transported in vehicles with fixed bases
and supply lines.
The urban guerrillas, on the other hand, are not an army but a small armed
group,
intentionally fragmented. They do not have vehicles or fixed bases. Their
supply lines are
precarious and insufficient, and they have no established foundations
except in the rudimentary sense of an
arms factory with a house.
Page | 96
of urban guerrilla. You can only avoid defeat if you have the initial
advantages and
know how to exploit them in order to compensate for your vulnerabilities
and lack of equipment.
The initial advantages are: You
have to take the enemy by surprise;
You have to know the terrain of the encounter better than the enemy;
It must have greater mobility and speed than the police and other repressive
forces;
Your intelligence service has to be better than the enemy's;
You have to be in command of the situation and demonstrate such great
confidence that
everyone on our side is inspired and never thinks to waver, while those on
the other side
are stunned and unable to respond.
Surprise
To compensate for his general weakness and lack of weapons compared to
the enemy, the
urban guerrilla uses surprise. The enemy has no way of fighting against
surprise and becomes confused or destroyed.
When urban guerrilla warfare broke out in Brazil, experience showed that
surprise was essential to the success of any guerrilla operation.
The surprise technique is based on four essential requirements:
a. we know the situation of the enemy that we are going to attack usually by
means of
precise information and meticulous observation, while the enemy does not
know if he is going to
be attacked or if he does not know anything about the attacker;
b. We know the force of the enemy that is going to be attacked and the
enemy does not know anything
about ours;
c. attacking by surprise, we save ourselves and conserve our forces, while
the
enemy is not able to do the same and is left at the mercy of events;
d. we determine the time and place of the attack, arrange its duration, and
establish its
objective. The enemy remains ignorant of all this.
Knowledge of the Terrain
The guerrilla's best ally is the terrain because he knows it like the palm of
his hand.
Having the terrain as an ally means knowing how to use its irregularities
intelligently, its highest and lowest points, its curves, its regular and secret
passages,
abandoned areas , vacant lots, etc., taking the maximum window of all this
to the success of
armed actions, escapes, withdrawals, cover, and hiding places.
Page | 99
The impenetrable places and the narrow places, the, streets under
construction,
police checkpoints, military zones and closed streets, entrances and exits of
tunnels and those that the
enemy can block, viaducts that have to be crossed, corners controlled by
the
police or guarded, their lights and signals, all this has to be completely
studied in
order to avoid fatal errors.
Our problem is to pass and know where and how to hide, leaving the enemy
confused in areas that he does not know.
The urban guerrilla familiar with the difficult and uneven terrain, avenues,
streets, corridors,
entrances and exits, the corners of urban centers, their passages and
shortcuts, the empty lots, their
underground passages, their pipes and sewer systems can cross with
security on
unfamiliar terrain to the police, where they can be caught in a fatal ambush
at
any time.
Because he knows the terrain, the guerrilla can go through it on foot, by
bicycle, by car,
4x4, or truck and never be caught. Acting in small groups with a few people,
the guerrillas can meet at an anticipated time and place in advance,
following the attack,
with new guerrilla operations, or evading the circle of the police and
disorienting the enemy
with their unprecedented audacity.
It is an unsolvable problem for the police in the maze-like terrain of the
urban guerrilla , to catch someone they cannot see, or to try to make contact
with someone they cannot
find.
Our experience is that the ideal urban guerrilla is someone who operates in
his own
city ​​and who knows completely the city and its streets, its
neighborhoods, its
traffic problems , and other peculiarities.
The foreign guerrilla, who comes to the city in which the terrain is unfamiliar
to him, is
a weak point and if assigned to certain operations, he can endanger them.
To avoid
serious mistakes, it is necessary for the first to know well the location of the
different streets.
Mobility and Speed
To ensure mobility and speed that the police cannot achieve, the
urban guerrilla needs the following prerequisites:
a. mechanical;
b. knowledge of the terrain;
c. a breakdown or suspension of enemy communications and
transportation;
d. light weaponry.
Care must be taken when carrying out operations that only last a few
moments, and leaving the place in vehicles, the urban guerrilla makes a
quick retreat,
escaping the pursuit.
Page | 100
The urban guerrilla has to know the road in detail and, in this sense, he has
to
practice the itinerary ahead of time as training to avoid roads that have no
exit, or ending in traffic blocks, or ending up paralyzed by constructions of
the
Department of Transit.
The police pursue the urban guerrilla blindly without knowing which road to
take to escape.
While the urban guerrilla fled quickly because he knew the terrain, the police
lost
track and ended the chase.
The urban guerrilla must launch his operations far from the logistical bases
of the police.
An initial advantage of this method of operation is that it places us at a
reasonable distance from the
possibility of pursuit, which facilitates evasion.
In addition to this necessary precaution, the urban guerrilla has to be
concerned
with the enemy's communication system. The telephone is the primary
target to prevent the
enemy from accessing information by breaking down their communications
system.
Even with knowledge of the guerrilla operation, the enemy depends on
modern transportation for its logistical support, and its vehicles necessarily
lose time carrying it through
heavy traffic in large cities.
It is clear that tangled and dangerous traffic is a disadvantage for the
enemy, as
it would also be for us if we were not ahead of the enemy.
If we want a margin of safety and be sure not to leave traces for the future,
we can adopt the following measures:
a. purposely intercepting the police with other vehicles or for accidental
inconvenience or
damage; but in this case the vehicle in question must not be legal or have
real license plates ;
b. obstructing the road with downed trees, stones, gutters, false traffic
signs,
obstructed roads or detours, and other ingenious means;
c. planting homemade mines in the way of the police, using gasoline, or
throwing
Molotov cocktails to set their vehicles on fire;
d. fire a burst of machine gun bullets or weapons such as the FAL at the
engine
or tires of the vehicles involved in pursuit.
With the typical arrogance of the fascist police and military authorities, the
enemy
will come to fight with heavy weapons and equipment, and with elaborate
maneuvers by men armed
to the teeth. The urban guerrilla has to respond to this with light weapons
easily
carried, so that he can always escape with maximum speed, without
accepting an
open fight . The urban guerrilla has no other mission than to attack and
retreat.
We would expose ourselves to the most overwhelming defeats if we
overloaded ourselves with
heavy weaponry and the tremendous weight of ammunition needed to fire
them, at the same time
losing the precious gift of mobility.
Page | 101
When the enemy fights against us riding have not always a disadvantage
and when we have vehicles. The car travels faster than the horse. From
inside the
car we also have the target of the mounted policeman, knocking him down
with the machine gun and
revolver fire or with Molotov cocktails and grenades.
On the other hand, it is not so difficult for an urban guerrilla on foot to make
a target of a
policeman on horseback. Most of all, ropes strung along roads, marbles,
and corks
are very efficient methods of making both fall. The great disadvantage of
the mounted police
is that it presents the urban guerrilla with two excellent targets: the horse
and its rider.
Aside from being faster than a horse, the helicopter has no better chances
in
pursuit. If the horse is very slow compared to the car of the urban guerrilla,
the
helicopter is very fast. Moving at 200 kilometers per hour you will never
succeed in hitting
a target lost in crowds and street vehicles from above, nor can you
land on the streets to catch someone. Furthermore, when it tries to fly low it
becomes
extremely vulnerable to the fire of the urban guerrilla.
Information
The possibilities that the government has to discover and destroy the urban
guerrilla
diminish as the potential of the dictator's enemies becomes greater and
more
concentrated among the popular masses.
The concentration of the opponents of the dictatorship plays a very
important role in
providing information on the movements of the police and men in the
government, as well as
hiding our activities. The enemy can be deceived by false information, which
is worse
for him because regardless of their meaning, the sources of information at
the disposal of the
urban guerrilla are potentially better than those of the police. The enemy is
observed
by the population, but he does not know who among the population passes
information to the
urban guerrillas . The military and the police are hated for the injustices and
violence they have committed
against the population, and this facilitates obtaining information harmful to
the activities of
enemy agents.
Information, which is only a small part of popular support, represents
extraordinary potential in the hands of the urban guerrilla. The creation of an
intelligence service with an organized structure is a basic need for us. The
urban guerrilla has to have essential information on the enemy's plans and
movements, where he
is, and how they move, the resources of the banking network, the media, and
their
secret movements.
The reliable information passed on to the urban guerrilla represents a well-
targeted blow
to the dictatorship. You have no way of defending yourself in the face of a
significant loss of
information that endangers your interests and facilitates our destructive
attack.
The enemy also wants to know what steps we are taking so that he can
destroy us or prevent us from acting. In this sense, the danger of betrayal is
present and the enemy
encourages and nurtures it or infiltrates spies into the organization. The
techniques of the urban guerrilla against
this tactic of the enemy is to publicly denounce traitors, spies, informants,
and
provocateurs.
Since our struggle takes place among the masses and depends on their
sympathy - while
the government has a bad reputation due to its brutality, corruption and
incompetence - the
Page | 102
informants, spies, traitors, and the police become the enemies of the
population without supporters,
denounced to the urban guerrillas, and in many cases, duly punished.
For their part, the urban guerrillas should not evade their responsibility -
once they
know who the spy or informant is - to kill him. This is the correct method,
approved by the
population, and considerably minimizes the incidence of enemy infiltration
or espionage.
For complete success in the battle against spies, the organization of
a counterintelligence or counterintelligence service is essential . However,
when it comes to information, it
can not be reduced to just knowing the enemy's movements and avoiding
the infiltration of their
spies. The information has to be comprehensive, it has to include
everything, including the most
significant data . There is a technique of obtaining information and the
urban guerrilla has to master it.
By following this technique, information is obtained naturally, as a part of
people's lives .
The urban guerrilla, living in the middle of the population and moving among
them, has to
pay attention to all kinds of conversation and human relationships, learning
to hide his
interests with great judgment and skill. In places where people work, study,
live, it is
easy to obtain all kinds of information about payments, businesses, points
of view, opinions, people's state of
mind, travel, interiors of buildings, offices and rooms, operations centers
etc. Observation, investigation, reconnaissance, and field exploration are
also
excellent sources of information. The urban guerrilla never goes anywhere
without paying attention and without
revolutionary precaution, always on the alert in case something happens.
Eyes and ears open, senses
alert, the memory recorded with everything necessary for now or for the
future, and the activity without
interrupting the soldier.
Careful reading of the press with particular attention to the organs of
mass communication , the investigation of accumulated information, the
transmission of news and everything of
importance, a persistence in being informed in the information of others, all
these make up the
question. intricate and immensely complicated information that gives the
urban guerrilla the
decisive advantage.
Decision
It is not enough for the urban guerrilla to have in his favor his command of
any
situation and a capacity for decision without which all other advantages will
be useless.
It is impossible to carry out any action, no matter how well planned, if the
urban guerrilla turns out to be indecisive, uncertain, or irresolute.
Even a successful action that has been started can end in defeat without
command of the situation and the ability to make decisions fails in the
middle of the execution of the
plan. When this situation command and the capacity for decision are
absent, this void is
filled by hesitation and fear. The enemy takes advantage of this failure and
is capable of
liquidating us.
The secret to any operation, simple or complicated, easy or difficult, is to
depend
on certain men. Strictly speaking, there is no such thing as an
easy operation. Everything has to be carried out with the same care
practiced in the
most difficult cases , starting with the choice of the human element, which
means relying on
leadership and decision-making capacity in any trial.
Page | 103
One can anticipate the outcome of an action by the way the participants
act during the preparatory phase. Those who are behind, who do not make
designated contacts , are easily confused, forget things, fail to complete the
basics
of work, are possibly indecisive men, and can be a danger. It is better not to
include them.
Decision means putting into practice the plan that has been devised with
determination, with
boldness, and with absolute firmness. It only takes a person who hesitates
to lose everything.
Objectives for Urban Guerrilla Actions
With his developed and established techniques, the urban guerrilla is based
on
action models that lead him to attack and, in Brazil, with the following
objectives:
a. threaten the triangle in which the systems of domination of the Brazilian
and
North American state are maintained in Brazil, a triangles whose points are
Rio, Sao Paulo, and Bello
Horizonte and whose base is the Rio-Sao Paolo axis, where the giant
industrial complex- economic-
political-cultural-military-police that supports the decisive power of the
country is located;
b. weaken the local guards or the dictatorship's security systems, given the
fact
that we are attacking and the military defending, which means trapping
government forces in defensive positions, with their troops immobilized in
defense of the
entire national maintenance complex , and with his ever-present fear of an
attack on his own
strategic nerve centers, and not knowing where, how, and when the attack
will come;
c. attack on all sides, with many different armed groups, small in numbers,
each independent and operating separately, to disperse government forces
in
pursuit of an extremely fragmented organization rather than offer the
dictatorship
the opportunity to concentrate its forces repressive in the destruction of a
highly
organized and structured system operating throughout the country;
d. give proof of their combativeness, decision, firmness, determination, and
persistence in the
attack of the military dictatorship to allow all the nonconformists to follow
our example and
fight with urban guerrilla tactics. Meanwhile, the government, with all its
problems,
unable to stop the guerrilla operations in the city, will waste time and suffer
endless losses which will cause them to withdraw their troops to be able to
watch over the banks,
industries, armories, barracks. military, television, American firms,
gas storage tanks , oil refineries, ships, airplanes, ports, airports, hospitals,
health centers, blood banks, shops, garages, embassies, residences of
prominent members of the regime, such as ministers and generals, police
stations, and
official organizations , etc .;
and. Increase urban guerrilla riots gradually in
endless descent such that government troops cannot leave the urban area
to
pursue the guerrilla without risking leaving the city, and allow the rebellion to
increase on the
coast as well as in the interior of the country;
F. to force the army and the police, with the commanders and their
assistants, to change the
accommodation and relative tranquility of the barracks and their relative
rest, for a state of
alarm and tension that increases the expectation of attack or the search for
traces that they
fade without leaving any trace;
Page | 104
g. to avoid open battles and decisive combat with government forces,
limiting the
fight to quick and brief attacks with lightning results;
h. to ensure for the urban guerrillas a maximum of freedom of action and
movement without having to avoid the use of armed violence, remaining
firmly oriented
towards the beginning of the rural guerrilla war and supporting the
construction of a
revolutionary army for national liberation.
On the Types and Nature of Action Models for
Urban Guerrillas
In order to achieve the previously enumerated objectives, the urban guerrilla
is
obliged, in his technique, to follow an action whose nature is as different
and diversified as
possible. The urban guerrilla does not arbitrarily choose this or that model
of action.
Some actions are simple, others are complicated. The inexperienced urban
guerrilla has
to be gradually incorporated into actions or operations that range from the
simplest
to the most complicated. He starts with missions and small jobs until he
becomes
fully an experienced urban guerrilla.
Before any action, the urban guerrilla has to think about the methods and
personnel available to carry out the action. The operations and actions that
the
technical preparation of the urban guerrilla demands cannot be carried out
by someone who lacks
technical skills. With these precautions, the models of action that the urban
guerrilla
can carry out are the following:
Assaults
Penetrations
Occupations
Ambushes
Street tactics Strikes
and work interruptions
Desertions, diversions, seizures, expropriations of weapons, ammunition,
and explosives
Release of prisoners
Executions
Kidnappings
Sabotage
Terrorism
Armed propaganda
Page | 105
War of nerves
Assaults
The assault is the armed attack with which we make expropriations, free
prisoners,
capture explosives, machine guns, and other typical weapons and
ammunition.
The assaults can be carried out at night or during the day. The night assault
is usually the
most advantageous to urban guerrillas. The idea is that the assault takes
place at night when
the conditions for a surprise attack are more favorable and the darkness
facilitates the escape and
hides the identity of the participants. The urban guerrilla has to prepare,
however,
to act under any conditions, night or day.
The most vulnerable targets for assault are the following:
Credit establishments
Commercial or industrial businesses, including the production of weapons
and explosives
Military establishments
Police stations and police station
Jails
Government property
Mass media
North American firms and property
Government vehicles, including military and police vehicles, trucks, armored
vehicles
, money loaders, trains, ships, and airplanes.
The assault on establishments is of the same nature because in each case
the property
and buildings represent a fixed target.
The assaults on buildings conceived as guerrilla operations vary according
to
whether they are banks, commercial businesses, industries, military camps,
commissariats, prisons,
radio stations, warehouses for imperialist firms, etc.
Assaults on vehicles - armored cars, trains, ships, planes - are of another
nature as they involve a moving target. The nature of the operation varies
according to the situation and the possibility - that is, whether the target is
stationary or mobile.
Armored cars, including military vehicles, are not immune to mines.
Obstructed roads, traps, deception, interception of other vehicles, Molotov
cocktails,
shooting with heavy weapons are all efficient methods of assaulting
vehicles.
Page | 106
Heavy vehicles, planes on the ground, ships at anchor, can be seized and
crews captured. Airplanes in flight can be diverted from their course by
guerrilla action or by a person.
Ships and trains in motion can be attacked or taken over by
guerrilla operations in order to capture weapons and ammunition or to
prevent the movement of troops.
The Bank Assault as a Popular Model
The most popular model of assault is the bank robbery. In Brazil, the urban
guerrilla has
started a type of organized assault on the banks as a guerrilla operation.
Today this
type of assault is commonly used and has served as a type of preliminary
examination for
the urban guerrilla in his learning process of revolutionary warfare.
Important innovations have been developed in the technique of bank
robbery, which
ensures the flight, the withdrawal of money, and the anonymity of the people
involved. Among these
innovations we have shooting car tires to prevent us from being persecuted,
locking people in bank bathrooms, forcing them to sit on the bathroom floor;
immobilize the bank guards and take their weapons, force someone to open
the safe; and
the use of costumes.
Attempts to install bank alarms, or to use American guards or
electronic detection devices , are of little use when the assault is of a
political nature and
carried out according to urban guerrilla warfare techniques. This technique
tries to use
new resources to achieve the tactical changes of the enemy, has access to
firepower
that is growing every day, becomes more cunning and daring, and uses a
large number of
revolutionaries every time, all to guarantee the success of planned
operations down to
the last detail.
Bank robbery is the typical expropriation. But, as is true for any type of
armed expropriation, the revolutionary is disadvantaged by two competitors:
a. competition for criminals;
b. competition for right-wing counterrevolutionaries;
This competition produces confusion, which is reflected in the uncertainty
of the population.
It is up to the urban guerrilla to prevent this from happening, and to achieve
this he uses two methods;
to. he has to avoid the bandit technique, which is one of unnecessary
violence and the
appropriation of merchandise and possessions from the population;
b. has to use the assault for propaganda purposes, at the very moment it
is happening, and then distribute material, papers, and every possible
means of explaining the
objectives and principles of the urban guerrilla as expropriator of the
government, the
ruling classes , and The imperialism.
Penetrations
Penetrations are rapid attacks on establishments located in neighborhoods
or
even in the center of the city, such as small military units, police stations,
hospitals, for
Page | 107
cause trouble, take up arms, punish and terrorize the enemy, retaliate, or
rescue
wounded prisoners, or those hospitalized under police surveillance.
The penetrations are also launched in garages and parking lots to destroy
vehicles and damage facilities, especially if they are North American firms
and properties.
When they take place on certain stretches of highway or in certain distant
neighborhoods,
the attacks can serve to force the enemy to move large numbers of troops,
a
totally futile effort since they will not find anyone with whom to fight.
When they are carried out in certain houses, offices, archives, or public
offices, their
purpose is to capture or search for secret papers and documents with
which to denounce the
involvement, commitments, and corruption of men in government, their
dirty businesses. and criminal transactions with Americans. Penetrations
are most
effective if they are carried out at night.
Occupations
Occupations are a type of attack carried out when an urban guerrilla is
stationed at established businesses and locations for temporary resistance
against the
enemy or for some propaganda purpose.
The occupation of factories and schools during strikes or at other times is a
method
of protest or of distracting the enemy's attention.
The occupation of radio stations is for propaganda purposes.
Occupation is a very effective method of action but, to prevent losses and
material damage to our ranks, it is always a good idea to have the possibility
of withdrawal.
It always has to be meticulously planned and carried out in a timely manner.
Occupancy always has a time limit and the faster it is done, the
better.
Ambush
Ambushes are attacks typified by surprise when the enemy is caught on
a road or when he causes a network of police to surround a house or
property. A
false message can bring the enemy to the place where he falls into the trap.
The main object of the ambush tactic is to capture the weapons and punish
him with
death.
Ambushes to stop passenger trains are for propaganda purposes, and
when they are troop trains, the objective is to eliminate the enemy and take
their weapons.
The urban guerrilla sniper is the type of fighter specially devised for
ambush because he can easily hide in uneven terrain, on the roofs
of buildings and apartments under construction. From windows and dark
places you can take
careful aim at your chosen target.
Page | 108
But the urban guerrilla must never fail to install a clandestine press and
must be
able to make mimeographed copies using alcohol or electric irons or other
duplicating devices , expropriating what it cannot, but in order to produce a
small newspaper,
pamphlets, flyers, and stamps for propaganda and agitation against the
dictatorship.
The urban guerrilla stuck in clandestine printing facilities greatly facilitates
the
incorporation of large numbers of people into the revolutionary battle,
opening a
permanent job for those who wish to work with revolutionary propaganda,
even though
doing so means working alone and risking his life as a revolutionary. .
With the existence of clandestine propaganda and agitator material, the
inventive spirit of the
urban guerrilla expands and creates catapults, artifacts, mortars, and other
instruments with
which self-government is attributed to the pamphlets.
Tape recordings, the occupation of radio stations, the use of loudspeakers,
drawings
on the wall and in other inaccessible places are other forms of propaganda.
In using them, the
urban guerrilla must give them the character of armed operations.
A consistent propaganda of letters sent to specific addresses,
armed actions of the urban guerrilla, this produces considerations to
influence certain segments of the
population.
If this influence is exercised in the hearts of the people by every possible
propaganda mechanism revolving around the activity of the urban guerrilla,
this does not indicate that
our forces have the support of all.
It is enough to win the support of the people and this can be done by
popularizing
a phrase: "Let the one who does not want to do anything for the
revolutionaries, do nothing
against it."
War of Nerves
War of nerves or psychological warfare is an aggressive technique, based
on the direct or
indirect use of the mass media and orally transmitted news for the
purpose of demoralizing the government.
In psychological warfare, the government is always at the disadvantage
because it imposes censorship
on the masses and ends up in a defensive position by leaving nothing
against leaking.
At this point he despairs, becomes involved in greater contradictions and
loss of
prestige, loses time and energy in a tiring effort to control, which is subject
to breaking at
any moment.
The object of the war of nerves is to misinform, spread lies in the
authorities, which everyone can participate, thus creating an air of
nervousness, discredit,
insecurity, and concern on the part of the government.
The best methods used by the urban guerrilla in the war of nerves are the
following:
a. using the phone and the mail to post false leads to the police and the
government,
including information on the planting of bombs and any other acts of
terrorism in offices
Page | 116
publicas and other places, kidnapping and murder plans, etc., to force the
authorities to
tire themselves out, following up on the information that is being supplied to
them;
b. allowing false plans to fall into the hands of the police to divert their
attention;
c. plant rumors to make the government nervous;
d. exploiting every possible means of corruption, errors, and failures of the
government and its
representatives, forcing them to demoralizing explanations and
justifications in
the mass media that they keep under censorship;
and. presenting complaints to foreign embassies, the United Nations, the
pope's nunciature , and international judicial commissions defending human
rights and freedom of the
press, each exposing each specific violation and use of violence by the
military dictatorship and
making it known that the war Revolutionary is going to continue its course
with serious dangers to the
enemies of the people.
How to carry out the Action
The urban guerrilla who correctly goes through his learning and training
must give great importance to his method of carrying out his action, for that
reason he should not make
the smallest mistake.
Any carelessness in the assimilation of the method and its use invites a
certain disaster, just as
experience teaches us every day.
Bandits frequently make mistakes because of their methods, and this is one
of the
reasons why the urban guerrilla must be so intensely concerned with
following the law.
revolutionary technique and not bandit technique.
There is no urban guerrilla worthy of the name that ignores the revolutionary
method of
action and fails to practice it rigorously in the planning and execution of its
activities.
The giant is known for his fingers. The same can be said of the urban
guerrilla that
is known as far as its correct methods and its absolute fidelity to the
principles.
The revolutionary method if you take action is strongly based on wisdom
and
the use of the following elements:
research information;
observation and monitoring;
reconnaissance or exploration of the terrain;
study and time of the routes;
maps;
mechanization;
Page | 117
Popular Support
One of the main problems of the guerrilla is his identification with
popular causes in order to win popular support.
When government actions become corrupt and inept, the urban guerrilla
should not hesitate to show that he opposes the government and wins the
sympathy of the masses.
The present government, for example, imposes heavy financial
responsibilities on the population
in the form of taxes. It is then the responsibility of the urban guerrilla to
attack the
tax payment system and to obstruct his financial activity, pulling all the
weight of the
revolutionary activity against it.
The urban guerrilla fights not only to upset the
tax collection system ; the arm of revolutionary violence also has to be
directed against the
government bodies that raise prices and those who direct them, as well as
against
the richest of national and foreign capitalists and the owners of
important properties ; in short, all those who accumulate excessive fortunes
out of the high cost of
excessive debits, prices and rents.
Foreign monopolies, such as refrigeration and other North American plants
that
monopolize the market and the manufacture of general food supplies, have
to be
systematically attacked by the urban guerrilla.
The rebellion of the urban guerrilla and his persistence in the intervention of
public questions is the best way to ensure popular support for the cause we
defend. We repeat
and insist on repeating: it is the best way to ensure popular support. As
soon as a
reasonable section of the population begins to take the action of the urban
guerrilla seriously, their
success is guaranteed.
The government has no alternative except to identify the repression. The
police network , the house searches, the arrest of innocent people and
suspects, the closing of the
streets, and making the city unbearable. The military dictatorship embarks
on political persecution. The
political assassinations and police terror become routine.
Despite all this, the police consistently lose. The armed forces, navy, and
air force are mobilized to carry out routine policing functions. Yet they do
not
find a way to stop guerrilla operations, nor to end the
revolutionary organization with its fragmented groups that move and
operate through the
national territory contagiously and persistently.
People refuse to collaborate with the authorities, and the general feeling is
that
the government is unfair, incapable of solving problems, and resorts only to
the liquidation of its
opponents.
The political situation in the country is transformed into a military situation
in which the
military appears to be more and more responsible for mistakes and
violence, while the
problems in people's lives become truly catastrophic.
When they see that the militarists and the dictatorship are on the verge of
the abyss, and fearing the
consequences of the revolutionary war that is already there, which are
always found within
the ruling classes, and the opportunists of the right wing, friends of the
struggle without violence , se
Page | 122
unite and begin to circulate rumors behind "the curtains", asking the
executioner for elections,
"redemocratization", constitutional reforms, and other
Simplicities designed to confuse the masses and make them stop the
revolutionary rebellion
in the cities and rural areas of the country.
But, observing the revolutionaries, people now understand that it would be a
sham to
vote in elections whose sole objective is to guarantee the continuation of
the
military dictatorship and to cover the crimes of the state.
By fully attacking this false election and the so-called "political solution" so
appealing to opportunists, the urban guerrilla has to become more
aggressive and violent,
turning towards sabotage, terrorism, expropriations, assaults, kidnappings,
executions, etc.
This would answer any attempt to deceive the masses with the opening of a
Congress
and the reorganization of the political parties - government parties and
those of the opposition that it
allows - when all the time the parliament and the so-called political parties
function thanks
to a license of the military dictatorship in a real show of puppets and dogs
on a
string.
The role of the urban guerrilla, in order to win the support of the people, is to
continue fighting, keeping in mind the interests of the masses and the
worsening of a
disastrous situation in which the government has to act. These are the
circumstances,
disastrous for the dictatorship, that will allow the revolutionaries to open the
rural guerrilla war in the middle of an uncontrollable expansion of the urban
rebellion.
The urban guerrilla is involved in revolutionary action in favor of the people
and seeks
in it the participation of the masses in a struggle against the military
dictatorship and for the
liberation of the country from the yoke of the United States. Starting with
the city and with the support of the
people, the rural guerrilla war unfolds rapidly, establishing its infrastructure
carefully while the urban area continues its rebellion.
Urban Guerrilla Warfare, School to Select the Guerrilla
The revolution is a social phenomenon that depends on men, weapons, and
resources. Arms and resources exist in the country and can be taken and
used, but to
do this it is necessary to count on men. Without them, weapons and
resources have neither use
nor value.
For their part, men must have two basic and indispensable qualities:
a. they have to have a political-revolutionary motivation;
b. they have to have the necessary technical-revolutionary preparation.
Men with the political-revolutionary preparation are among the
vast and conscientious contingents of the enemies of the military
dictatorship and the domination
of US imperialism.
Page | 123
Almost daily such men gravitate towards urban guerrilla warfare, and it is
for this
reason that as soon as the opposition announces that it has already beaten
the revolution that it has to
see it rise again from its own ashes.
The men who are best trained, most experienced, and dedicated to
urban guerrilla warfare, constitute the basis for the revolutionary war, and
therefore, of the
Brazilian revolution. It is from this base that the nucleus of the revolutionary
army of
national liberation arises , rising from the revolutionary war.
This is the central core, not of bureaucrats and opportunists hidden in the
organizational structure , not of empty lecturers, of resolution writers who
remain on
paper, but of men who fight. Men who from the beginning have been
determined and ready for anything, who personally participate in
revolutionary actions, who have no doubts or deceit.
This is the indoctrinated and disciplined nucleus with a long-range strategy
and a
tactical vision consistent with the application of Marxist theory, of the
developments of Leninism and
Castro-Guevaristas, applied to the specific conditions of the revolutionary
situation. This is
the nucleus that will lead the rebellion to the guerrilla war phase.
From it, men and women with political-military development will emerge,
one and indivisible,
whose work will be that of future leaders after the triumph of the revolution,
in the construction
of a new Brazilian society.
From now on, the men and women chosen for urban guerrilla warfare are
workers; peasants whom the city has attracted for their work potential and
who
returned to a completely indoctrinated and technically prepared rural area;
students,
intellectuals, and priests. This is the material with which we are building -
starting the
guerrilla war - the armed alliance of workers and peasants, with students,
intellectuals and priests.
The workers have infinite knowledge of the industrial sphere and are the
best in
urban revolutionary jobs. The urban guerrilla worker participates in the
struggle by
building weapons, sabotaging and preparing saboteurs and dynamiters, and
personally
participating in actions involving handguns, or organizing strikes and partial
paralysis
with the characteristic mass violence in factories, work centers, and other
workplaces.
The peasants have an extraordinary intuition of knowledge of the land,
judgment in the
confrontation of the enemy, and the indispensable ability to communicate
with the humble masses. The
peasant guerrilla is already participating in our struggle and he is the one
who reaches the nucleus of the
guerrilla, establishes support points in rural areas, finds places to hide
individuals, weapons, ammunition, supplies, organizes the planting or
harvesting of grains used in
guerrilla warfare, chooses transportation points, cattle-raising points, and
meat supply sources , trains guides who show the urban guerrilla the roads,
and creates
an information system in rural areas.
Students are noted for being politically crude and rude and therefore break
all the rules. When they are integrated into urban guerrilla warfare, as is
happening
now on a large scale, they teach a special talent for revolutionary violence
and soon
acquire a high level of political-technical-military prowess. The students
have a lot of
free time on their hands because they are systematically separated,
suspended and thrown out of school
by the dictatorship and thus begin their time advantageously in favor of the
revolution.
Page | 124
Page | 126
- A map.
- Lockpicks.
Note: A prior preparation of both the clothing and the equipment to be
hidden must be carried out,
since this can cause some damage such as hooks or be damaged as is the
case with condoms.
You should take into account the power to use everything you have
managed to
hide in evasion .
You can also carry other not-so-essential gear in your backpack and leash.
The
selection of this equipment will depend on the environment in which it
moves. Always when preparing the
equipment choose things that you can use for more than one purpose.
For example:
- First aid items.
- Signaling instruments.
- Water and means of purification.
- Elements to light the fire.
- Food and how much helps you get it.
- Equipment to prepare shelters.
- Weapons.
Combat boots are another very useful place to hide some very small and
very short things, (since they could be damaged when flexing the foot). If
you wear
thick cushioning insoles , you should monitor their condition regularly and
monitor wear on the
insoles.
d. Types of evasion: For a better analysis we could establish the following
classification:
1) Based on time, it can be:
a) Short-term evasion:
This can occur at different times, such as: they can be
recently captured prisoners who have just escaped They can be shooters
who were isolated within
enemy lines and lost contact with their fraction or who are survivors of an
enemy attack that killed their entire fraction.
In short-term escape, escapees may be armed and carry equipment to
assist them , but they act out of improvisation and lack an escape plan.
b) Long-term evasion:
Page | 129
This can occur when one is a prisoner of war who has escaped from a
prison camp in enemy territory or has become isolated while conducting an
operation
deep within the enemy device.
In this area, the escapees often find themselves hundreds of kilometers
from the lines of their
own troops. However, they do have time to plan and prepare clothes and
equipment that will help them,
as well as the way in which they will carry out the escape.
2) Based on cooperation, it can be:
a) Assisted:
When one maneuvers through an evasion and escape corridor where he has
help from
TOE or unconventional troops (guerrilla / special operations forces).
At the same time, it is also likely that there has been a previous territorial
preparation where
supplies can be found to facilitate evasion.
Aspect to take into account to carry out an assisted escape:
- Time of entry and time of departure to the contact point.
b) Unassisted:
This type of evasion is the most difficult to achieve and can only be
implemented in the
early stages of capture.
3) By the area in which it takes place:
a) Urban
evasion : (1) Urban evasion will vary according to different factors:
(a) The climate: Since, for example, in cold climates, people do not walk
through streets. If you do not get in contact with someone or find a place to
stay, you will be cold and this will
most likely affect your health.
In addition, he must be made of more clothes than normal to go unnoticed.
(b) Level of wealth: This will give you a guideline of what role to adopt to go
unnoticed.
(c) Level of development: In more developed urban areas, their presence will
go
unnoticed and will have places where they can escape.
(d) Society: This can cause problems in the role that you play due to the
characteristics of the
inhabitants of the place, as well as their customs.
(e) Language: This can facilitate or limit it in your movements. You should
avoid
communicating if you are not very fluent in the local language.
Page | 130
3) Avoid losing the identification: Since this can be used to search for it in
case
the enemy finds it.
4) Know the ground-air communication signals: You may have the need to
use it
to perform an extraction by air.
5) Avoid cities, towns and crowded places: In these there is more possibility
of
enemy presence.
6) Avoid children: Since these are more spontaneous, and it would not be
strange that when they see
something peculiar they shout and point at it.
7) Avoid traveling on roads: Since these are very likely to have a lot
of enemy traffic.
8) Try to stay abreast of events: You may be hiding for
nothing.
9) Do not cross bridges: Since they are likely to be under strict control of the
enemy domain , with security posts.
2. Escape:
In the event that you are taken prisoner by the enemy, you must remember
your duty to try
to rejoin their forces.
The only data you can mention are:
- NI.
- Name and surname.
- Degree.
Remember that the most favorable opportunities will arise during the early
stages of your
capture.
Then physical wear and tear and increased security measures will hinder
their mission.
to. In his place of detention, he must take into account the following
aspects:
1) Do not give information about his own troops.
2) Find out the identities and / or training of the other POWs.
3) Know the moral state of the troop.
4) Know the enemy's activities, security system, number of interrogations,
security personnel replacements.
Page | 133
Page | 134
Monitoring techniques I
Page | 135
the sale of part or all of this material is prohibited, as well as its use for
purposes other
than those exclusively educational.
Tracking techniques are commonly used all over the world for the most
diverse purposes: from following any person to the pursuit of criminals
or kidnappers to find out where the person is being kidnapped or where they
keep
their weapons.
Many of these techniques are developed and kept in the deepest secrecy by
security agencies, and have remained until today in the most absolute
secrecy,
only in the hands of espionage professionals and terrorist groups.
With this first approach to this text (which is an extract from a more
developed book)
I want to bring these techniques to the general public, so that, knowing
them, they can
defend themselves and, knowing how they can be followed, they can avoid it
and feel that way more insurance.
It is from this point of view that I distribute to the public and put this first
copy in your hands .
Preamble
Page | 137
There are many techniques to follow a subject, each with its own
particularity
and definition.
To classify them, we can group them into the different means they use,
based on
them there are infinity, but we can say the main ones on land, in which the
subject or cause of
persecution moves:
· On foot
· By car.
There is also water pursuit, radar tracking and various technologies ...
electronics and modern espionage have a very extensive range of elements
for all
fields and for all tastes.
But leaving aside all that paraphernalia, we are going to analyze a type of
monitoring that
can be done anywhere and without the need for great gadgets. We mean
the
chase on foot.
This will be the subject of the current study.
Note: It is clear that both the techniques and
various elements related in this text are merely
informative and indicative. The author leaves
the use that such knowledge can be made to his entire responsibility , and
declines any
fact that may arise in the exercise of said knowledge . The
present study should be taken:
- As an essay of techniques.
- As a text only and exclusively informative, not
being its task to train or train anyone.
This study is 100% original, books on this
subject are not sold to people on the street ...
In the follow-up of a person, people, etc. (subject, we will call from now on)
there
can be many cases and variants, among the most important we have:
-Know the area. A lack of knowledge of it is, depending on the situations, an
added difficulty , since it forces us to shorten the distance, to continue with
more fixation on the subject and where it
travels, perhaps, even, we lose ourselves.
-Being known: If knowing the area is a plus, being known in it (for example:
living
in the neighborhood) can be against us. Whoever calls us, entertains us with
greetings, etc.
Also, if they discover us, the subject could ask for "who was following him",
and
then we would be lost.
These points may seem very superficial to the common mortal, and besides,
experts will never allow themselves to be discovered in such a childish way,
but they should not be
underestimated for that. On many, many occasions what seems most
obvious to us is what leads us to
defeat. Let's keep in mind that we are tracking (or, perhaps, they are
following us). Someone may have hired a professional to monitor us
(our wife, our employee ...). At other times, we are the ones who are
forced to pursue.
Now let's get into a nuclear issue for follow-up, which is speed. When
we follow a subject, the rhythm of our steps should almost always go to the
beat of him, during the
time when the street is longest. The same steps, the same speed, yes, but
at what
distance?
A difficult question to answer, and the answer to which experience will give
us. In any
case, the distance is not marked to pleasure, it depends on many factors:
knowledge or not of the
area, how populated or not it is; the type of street or sidewalk, the type of
persecution used, the
rectitude or not of the street ... For all this, and perhaps more, an adequate
and
generic answer cannot be given . The ten, fifteen or twenty meters are never
constant, and also, of course, always
correct.
In the next few lines we will try to clarify the point of speed and the distance
factor more,
but as a general rule we point out that: the distance will be greater the less
the subject "runs", and
less when the steps are more accelerated. But of course: not so far that we
hardly see it and the
first corner is lost, not so close that just by turning the head it discovers our
presence.
Another very important point within a follow-up on foot is its type, which can
be, in general terms, three:
-Linear
pursuit
-Panoramic pursuit -Supra-panoramic pursuit
Perhaps we, anyone, have followed another on the street, for fun or to see
"where it goes". Almost certainly the persecution that we will have adopted
would be the linear one. In reality,
in a serious follow-up, all three are usually carried out, depending on the
route and, above all, the
first two .
Depending on the distance and the chase time, we could say that a
two-hour walking track has 60% linear chase, 30% panoramic and around
10% supra
panoramic. By cons, a short space follow-up (about ten minutes) would
have with it a
Page | 139
Or, in other words: we see the subject in question and we follow him in
linear pursuit , once in it, perhaps because of the loneliness of the street, or
because the extension allows us,
we adopt p. panorama. As the time that we follow him grows, the type of
persecution will change.
This also works if, for example, we are following an expert person, or
someone who
runs ...
Concept breakdown
Page | 140
Linear Pursuit
In the P. linear, and in general in all, the view, as has been said, does not stay
on the
subject, as many people mistakenly believe. This would cause that, when
we ended up in an avenue
full of people, we would attract a lot of attention. It would not be the first
time that someone has
approached us, after spending a while following a subject with an attentive
gaze on him, saying
something like "why are you following that one?" aloud. In addition, if we
keep our eyes on the
subject all the time , we will not have enough agility to see if someone is
following us at the same time.
Keeping the distance, the view moves, from time to time, to the shop
windows and the entire
length of the street. That is to say: the closest thing to walking normally.
Any
anything out of normal draw attention. And we must not allow that.
Page | 141
Although we should not look from one side to the other all the time,
because that would betray
nervousness.
We must maintain a cursory vigilance on: if someone follows us, the next
streets
that come (especially if we do not know the area), traffic for possible
crossings and
traffic light positions , and, by the looks of the people, if they have already
found out what we are doing ... that will
give us an idea of ​​how terrible we are doing the follow-up.
And from time to time, backwards in case someone follows us, resorting, as
is already known,
whenever we can to shop windows, car windows and portals, etc.
Well, we are chasing the subject, maintaining the right distance and the
rhythm of his
steps, we do not look at him so intently that no one notices or so "from time
to
time" as to lose him or for pedestrians to discover that we are very
"weirdos". Now
a corner arrives, we know the city and we know that there is only one street
behind it, so we
accelerate our pace and count five at the approximate rate of its steps
[Actually this is a
methodical rule, the time to wait depends on many factors and of the
subject, but we must allow
a reasonable time for the space, since we cannot meet the subject just
around
the corner]. When we turn the corner, if we see the subject we return to the
normal distance.
But we do not know the city, behind that corner there may be a network of
streets ... what do
we do then? The same as before:
Now we have faced the corner, the subject continues on his way, we follow
him with
the pursuit that we deem correct:
1: We look, at a quick glance, at all the shop windows, shops and portals,
turning our
heads (we are supposed to know the subject's clothing well enough to see it
behind them,
right?):
2- In the shop windows that Let's not reach with our eyes, we will go through
them moving
circularly to the network of streets, also looking at the sidewalks of them,
starting with the
closest to the furthest:
Then, it may be the case that the subject is in a store, or behind Some
vehicle, or that, due to traffic, has had to run to cross and get a few
steps away from us , being on a street far from our sight. Point 2 must have
been enough
to get him back on track.
Otherwise, we will be able to retrace our own steps and resume the search
in the
shop windows and intersections, perhaps a store or bar has a lot of people
and takes our vision away. Or he
has entered a portal and climbed the stairs. We can wait for them to turn on
a light.
We can also walk through the adjacent streets, it is not the first time that a
subject has
discovered our presence and is in a portal of another nearby street, waiting.
In short:
speed in these first moments is important. If, despite this, we cannot find it,
we will
do everything again slowly. At this point our presence may begin to arouse
curiosity, so we should consider the possibility of monitoring from a nearby
site and
covering the area or the exit of people, such as a park, a bar or our parked
car.
At this point, if the above fails, we will consider the possibility of having
definitely lost him, since he may have entered a building near another
corner, or that he
lives in a truly difficult area. Hence, in subsequent follow-ups of the subject,
Page | 143
let us take into account the possibility of having lost him definitively, since
he may have entered
a building near another corner, or that he lives in a truly difficult area. Hence,
in subsequent follow-ups of the subject, we take into account the possibility
of using
another technique, such as p. supra panoramic, which will give us a follow-
up "
ahead" and with much more field of vision:
There are many remedies, and this rule is well known to all. Among the
basic actions regarding traffic we can choose to:
-Change to another sidewalk where the traffic comes towards us.
-Change to the other side, where traffic and people would make it difficult
for the subject to see us (
especially if he
does not know us), but we would see him.
P. Linear is also suitable for streets where traffic is not high, because even if
there are a
lot of people, we will always stay behind the subject. If the street, on the
other hand, is
narrow and with almost no pedestrians, then we will have to move the
following distance very far,
which would lead us to adopt p. panorama.
Rain, hail, wind, works in the streets ... facilitate p. linear, on the contrary, the
sun (which can make us cast long shadows forward and give us away),
loneliness, the
night ... make it difficult.
It should also be clarified that monitoring with different means, for example,
car following
someone on foot, may be a good thing in rural areas and where the subject
can be followed
from a high and relatively close place, covering large areas of free space
without drawing
too much attention, but in the city something like this is useless, since we
will only reach a few meters
before it discovers us, even with binoculars or other methods (except radio
or
micro transmitters, of course).
Page | 144
In this aspect, if we locate someone from a car, the best thing would be to
get off and take a
walkyetalky with hands-free equipment while someone else drives the car, in
order to inform them of
where we are from time to time and, if the subject takes in turn a vehicle,
make ours come
to follow him.
Let's take a break here to dedicate ourselves a little more to a facet that is
common to any type of follow-up: rhythm.
The Rhythm
It has already been said that we must harmonize our steps with those of the
subject to follow, except
in certain circumstances and incidents it must be varied, but even this is not
a
fixed rule , especially taking into account the steps of the people to follow.
The above is effective for normal walking, but what happens when the
person is
older, elderly or walks very slowly? Wouldn't it give away, if we mold our
steps to
his, our presence? And what would happen if the other person's walking is
very great,
that is , with great speed? Those are the two extremes we can run into.
For someone who wants to know if they are being persecuted, it is best to
adopt the fast pace: it gives away
the persecution better. But aside advice, let's analyze each one:
-Slowness: Given the slowness we have already said that one should move
away, because in a few
strides, if necessary, we can cut the distance in a relatively short time.
Another technique, which should blend very well with the previous one -that
is why the qualities of each
one- is to stop looking at shop windows, landscapes, looking at the clock,
talking on the mobile,
writing text messages, tying the shoe, buying the newspaper ... there are
multitude of
resources to leave us behind and continue with what we have to pretend: a
quiet and relaxed
walk. Under no circumstances, and especially if the subject is old, should
we approach at a
normal distance and maintain the rhythm, even at the cost of losing it, if we
do not want to
discover ourselves and, at the same time, discover ourselves in front of
passers-by: imagine someone young , with the
same step and at a short distance, on p. linear, behind an old man ... it
would be quite noticeable,
right? Before we do that, let's move on to p. panoramic or even supra
panoramic, which, at
slow speed, and especially if the area is known, gives excellent results.
In any case, slow tracking tends to attract attention and is somewhat
complicated ... I remember
that I lost a subject precisely because I was walking very slowly and, at the
same time, stopped,
looked ... this made me take a lot of distance, excessive, which I couldn't
recover afterwards.
For this reason, I advise that whenever possible, follow the subject with p.
linear, because it tends to
stop, look ... and it is better to hide taking advantage of the circumstances
of the moment and
exchange it, when curves or loose distances arrive, with p. panorama.
Finally, it should be noted that the distance that this "slow" walking forces
us to can make us lose the subject if we do not follow him more
conscientiously than at a normal distance,
with our eyes.
Let us remember that, at a greater distance, the more we must attend to
him, without falling into extremism.
-Speed: If the p. supra panoramic was good for slowness, for fast walking it
is practically ruled out, unless we know the area well and know more or
more
Page | 145
minus, the direction the subject is heading. Here the distance is reduced,
not
excessively, but quite a lot; This is because a fast person can give us a
slip in the blink of an eye.
We must also pay attention to the street: if there is a lot of atmosphere,
"hide" behind
people, and, if it is empty, walk as if we were not chasing them, but as if we
were
afraid; or go to panoramic ... well, I already said at the beginning that if the
slowness is
complicated, the speed much more.
On the other hand, we have in our favor that a subject who walks fast
through the streets is
usually quite busy in what is in front of him than in making sure if they
follow him.
In this type of fast follow-up, it is usually almost exclusive to adopt p. linear,
except in
clear or uncrowded areas. Take care, as always, not to look at the subject
too much so as
not to give ourselves away, and to also look at what comes to us: next
streets, traffic, etc.
Panoramic Pursuit
Yes on p. linear it was developed by the same imaginary "line" (hence the
name)
as the subject, on p. Panoramic monitoring is carried out by the immediate
opposite side:
This type of pursuit has some drawbacks that must be taken into account
before carrying it out:
-From a simple turn of the head, the subject may see us. Therefore, p.
panoramic is not
usually used, eg. In narrow streets: nearby shop windows, doorways on
opposite sidewalks that open, etc., invite us to look and, incidentally, can
give us away.
This is a very important inconvenience, but there is also the one that, for
example, the
person has to change the sidewalk or immediately go to a street very far
from
us, which, in certain cities, is not difficult to find.
In these cases, the same method of p. linear to get him back, but without
stopping at the corner and following the last line (heading) marked by the
subject. Let's look
Page | 146
also on the other side of the street: on many occasions, the confusion
comes to us simply because the
subject crossed the street.
Among the advantages that make p. Panoramic is one of the most preferred
and used
are:
-To be able to see the other person's street from afar, perhaps preventing
changes in grade,
traffic lights, sharp corners, accidents, etc. Above all, if the corners are open
(
that is to say: greater field of vision):
We must foresee with our eyes if there are dangerous corners or alleys that
would make us
lose the subject, to, as far as possible, cross in time and pursue on p. linear.
In this class of avenues, if it is shady on our side, we will walk along it, that
is,
next to the buildings or trees. This will make it even more difficult for the
subject to see us. The techniques
of not always looking at the subject etc. they are still valid here, because if
we keep our eyes on the
persecutor, third parties will betray us, as has already been said.
Another modality that includes p. panoramic view, and that can be done if
the area is known,
is through adjacent streets:
Page | 147
In the event that the subject crosses towards our sidewalk, we have the
options of
distraction (from a later study) or we will also wait by looking at shop
windows, etc. If the subject
crosses and addresses us, once we are seen we must not allow him to see
us again:
we will follow him with p. linear if necessary until we can cross again and
follow him with, now,
a better and more masterful p. panoramic ... since our failure reveals our
poor
concentration:
Page | 148
What we must not do in any case, is turn in front of him. It is much better to
bump into him head-on than to turn your back on his face. For this case, we
can
also go into a store to buy a magazine, bar ... as long as our action does not
lose it,
any of these actions are valid.
If despite all our attempts the subject has seen us clearly and realizes
that we are following him, we must surrender to the evidence: abandon or
follow him with supra-
panoramic persecution , perhaps in this way he will regain the confidence
that no one is following him.
Another variant is, for example, roundabouts or squares. They are never
surrounded by p. panoramic, because
we can find the subject or lose it (unless they are very small) but with
p.linear
and, again, we redo the panoramic:
This is correct:
Page | 149
In summary ...
Any movement that is not in accordance with its environment will give you
away. If you walk in a
slow crowd, for example, rushing, you will quickly attract attention.
You must know how to blend in with the environment in which you move to
go unnoticed.
Your clothes must be neutral, (not black, as many might mistakenly think.
For example:
wearing black in summer, in a beach area, where everyone goes in color, is a
big mistake).
Most people wear muted colors in their usual clothing, so stay in
that social environment of the majority. That is to say: where you are going
to move.
Likewise, in Western societies, people, in more or
less crowded avenues and streets , almost always walk following the traffic
pattern: they go from their right and
come from your left:
Do the same to mix with the people, no you want to go following someone
and, at the same time,
stumbling over everyone who comes before, because they would soon
notice you.
Take advantage of the environment to stay invisible: parked and unloading
vehicles,
billboards, trees, ornaments ...
Do not run out of doors, always keep escape routes, foresee the future: the
possibility
that the subject will turn around suddenly, from difficult roundabouts, from
uninhabited or
multi-lane passages , to take them, if necessary, from another side.
Page | 151
If the traffic light is empty, wait to cross far from where you can be seen or
opt
for another type of pursuit that allows you to do so.
Do not let yourself get against the ropes: they can ambush you.
And remember: practice. Tell your friends that you are going to follow them,
do not tell them when or where,
but be forewarned. It is the best way to gain experience.
Page | 152
Monitoring techniques II
Page | 153
Page | 154
Preamble
Supra-panoramic Pursuit
This type of follow-up is ideal when the other person knows us, or knows
that they are already
following them. The great distances that usually occur in this type of pursuit
require a
concise practice of it, and only expert people can develop a good follow-up
without losing
the subject.
But as it also serves as a complement to the other two, I think it is
necessary to point something out
about it. I must clarify before entering the subject that I will not discover the
entire strategy of this
technique, simply because used for evil purposes it can cause a lot of harm
to
innocent people . In addition, it could be used for terrorist purposes to flee
an area, escape the
city ​​... or crime, so I will only expand on it just enough.
Let us bear in mind that Supra Panoramic Pursuit (PS) has the particularity
of
traveling a long distance in a relatively short time, destroying other
monitoring or surveillance techniques , even from vehicles, since as it can
be used to pursue,
also on the contrary: to escape.
Studied with time and with the help of plans, it can give extraordinary
results.
That is why I am not going to break it down here, I am just going to point out
some nuances. I think that a
"normal" person, with the techniques developed in the first chapter of this
series, has more than
enough. In addition, for when they need to do a follow-up, the ordinary
citizen
is enough and has plenty to resort to the PL and PP and the notes of the PS,
with that it should help them
to carry out a successful follow-up, especially if they are trained.
From a high place we will monitor the movements of the subject, allowing
us once he
is moving away, to carry out another type of pursuit:
Page | 155
In PS, the gaze is not kept on the subject either, but it does for longer than
in Linear Pursuit and Panoramic Pursuit (see previous chapter).
Experience will tell us the time, and it will depend on many conditions
(zonal,
climatic, environmental ...).
The steps are usually of the 2-2-1 type (see previous chapter), accelerating
speed when
we start the PS technique and maintaining it as we approach.
Thanks to the PS we will have much more field of vision, and we will know
well in
advance the movements of the subject.
The subject goes to a store and we "shorten" with ps, this can
also be done not only with this example, the city and rural areas, if they are
known and anticipated - for this reason,
look not only at the subject, but at what "Comes" - they offer many fields of
action. Here the PS
is maintained for a short time, simply the one that the favorable zone offers
us.
Let us remember that the SP, since we are sometimes on a high place, can
give us away, therefore agreeing with the environment and walking,
depending on how far and, if necessary,
behind the trees or other objects that are in the environment :
Page | 156 PS
is also ideal for locating and tracking goods that are being moved from
person to person
, especially if, for example, the person who has just passed the
“package†watches
for some time to see if someone is chasing their buddy.
As a summary ...
We have also highlighted, once again, the importance of our position and
prevention in the area in which we find ourselves, as well as to anticipate
the next
movements that the subject makes.
With such well-learned and experienced steps, we will achieve a high degree
of success
and be able to easily follow almost any subject.
Page | 157
Page | 158
Al Qaeda Handbook
Page | 159
The martyrs were killed, the women were widows, the children were
orphaned, the
men were imprisoned, the heads of chaste women were shaved, the heads
of the traitors were crowned, atrocities were inflicted on the innocent, gifts
were
given to the traitor, virgins were raped in prostitution, altered ...
After the fall of our Orthodox caliphates on March 3.1924 and after
expelling the colonialists, our Islamic nation was afflicted with the rulers of
the apostates
who took over in the Muslim nation. These turned out to be more infidel and
criminal than
the colonialists themselves. Muslims have endured all kinds of harm,
oppression, and
torture at their hands.
Thousands of young people from the Haraka al-Islamyia
(Islamic movement) were thrown into prisons by those apostates rulers and
the detention centers were equipped with the
most modern devices and experts on oppression and torture. Thus the
youth had refused to
move in the orbit of the rules, obscure matters to the youth, and oppose the
idea of
rebellion against the rules. But [the rules] didn't stop there; they began to
fragment the
essence of the Islamic nation trying to suppress its Muslim identity. Thus,
they began to
spread atheistic views among the youth. We found some who claimed that
socialism was
from Islam, democracy was the council and communist propaganda made
prophet-God.
Colonialism and its followers, the rulers of the apostates, then started to
openly erect centers, societies, and crusader organizations like
Masonic lodges , lions and revolving clubs, and foreign schools. They aimed
to produce
a lost generation that pursued everything that is Western and produced
rulers, ministers, leaders,
doctors, engineers, businessmen, politicians, journalists, and
information specialists .
The rulers tried, using all means and kinds of seduction, to produce a
generation of young men who did not know except what they want, did not
say except what
the rulers think, did not live unless according to the way of the government,
and He did not get dressed
except in his closet. However, majestic Allah turned their deception behind
them,
as a large group of those young men, who were raised by them [the rulers]
woke up from
their sleep and returned to Allah, lamenting and repenting.
The young men returning to Allah announced that Islam is not the
performance of
rituals but a complete system: Religion and government, worship and Jihad
[holy war], ethics
and the dealing of people, the Koran and the sword. The bitter situation that
the nation has reached is a
result of its divergence from the course of Allah and his law honored in all
places and times.
That bitter situation occurred as a result of their children's love for the world,
their
disgust for death, and their abandonment of Jihad [holy war].
The disbelief remains the same. He pushed Abou Jahl and the valiant
infidels of Kureish
to fight the prophet and torture his companions. It is the same disbelief that
led to
Sadat, Hosni Mubarak, Gadhafi, Hafez Assad, Saleh, and all the apostate
Arab rulers to
torture, kill, imprison, and torment Muslims.
Page | 160
These young men announced that they would never establish an Islamic
government
except by the bomb and the rifle. Islam does not agree or make a truce with
disbelief, but
something confronts it.
The confrontation that Islam calls for with these atheist and apostate
regimes does not know
Socratic discussions, Platonic ideals or Aristotelian diplomacy. But he
knows the dialogue of
bullets, the ideals of assassination, bombardment, and destruction, and the
diplomacy of cannon and
automatic weapons .
Young people came to prepare for Jihad [holy war], ordered by the order of
the
majestic Allah in the Holy Koran. Qur'anic verse: "Against them make ready
your strength to the maximum
of your energy, including steeds of war, to strike terror in the hearts of the
enemies of Allah and their enemies, and others besides who cannot be
known, but who knows
the point of Allah. "
I present this humble endeavor to these young Muslim men who are pure,
believing, and fighting for the cause of Allah. It is my contribution towards
paving the
path that leads to majestic Allah and that establishes a caliphate according
to prophecy.
According to Imam Ahmad's account.
Page | 165
Page | 168
Means of communication
Introduction:
It is well known that in secret operations, communication is the mainstay of
the
movement for rapid completion. However, it is a double-edged sword: It can
be in
our favor if we use it well and it can be a knife stuck in our back if we do not
consider and do not take the necessary security measures.
Media:
The military organization in any Islamic group can, with its modest
capabilities,
use the following means:
1. The telephone,
2. In person,
3. Messenger,
4. Letters,
5. Some modern devices, such as the internet, facsimile and radio
communication.
The communication can be within the county, state, or even the country, in
this case it is
called local communication. When it spreads between countries, then it is
called
international communication .
Secret communication is limited to the following types:
Common, Wait, Alarm
Page | 169
1. Common communication:
It is a communication between two members of the organization without
supervision by the
security apparatus that opposes the organization. The joint communication
must be
made under a certain cover and after examining the situation of the
surveillance by the
enemy.
2. Standby communication:
This replaces joint communication when one of the two parties cannot
communicate with the other for some reason.
3. Alarm communication:
This is used when the opposing security apparatus discovers a secret
activity
or some secret members. According to this communication, the activity is
terminated for some time, everything important related to the activity is
abandoned,
and the members of the organization are hidden from the security
personnel.
Method of communication between members of the organization:
1. Communication about secret activity should be done using a good cover;
It must
also be prompt, explicit, and relevant. That is, just to speak only.
2. Before contacting members,
a. The cell commander must agree with each one of them
separately (the members of the cell must never all meet in one place and
they
must not know each other) with a system and means of communication
appropriate
to each one. Also, the head of the organization uses a similar technique
with
the branch commanders.
b. Cell or cluster methods must be adopted by the organization. It must
be composed of many cells whose members do not know each other,
so that if one member of the cell is taken other cells will not be affected,
and
the work would proceed normally.
3. A senior commander determines the type and method of communication
with
lower-ranking leaders.
The telephone:
Due to significant technological advances, security measures for monitoring
the
telephone and disseminating information have increased. The supervision
can be done by installing a
secondary line or a wireless device in a telephone that relays the calls to a
remote location ... this will be a method of the organization as a security
measure between the
members who use this means of communication.
1. Communication must take place in public places. One should select the
phones
that are less suspicious to the security apparatus and are more difficult to
monitor. It is
preferable to use the telephones in booths and on the main streets.
2. The conversation should be encrypted or generally so as not to alert and
cause monitoring
of the phone.
3. Periodically examination of the telephone system and the receiver.
4. Telephone numbers must be memorized and not registered. If the brother
has
to write them, he must do so with a code so that those who see it do not
appear as
telephone numbers (figures of a shopping list, etc.)
5. The caller and the person called must mention some words or sentences
before
bringing up the intended topic. The brother who is calling can dial one of the
digits and actually call someone else. The called person may claim that the
call is for him, and the calling sibling may start telling him about work-
related matters
and revealing many things due to a minor mistake.
6. In telephone conversations about secret work, the voice must be
changed.
Page | 170
The messenger:
This is an intermediary between the sender and the receiver. The messenger
must possess all
the characteristics mentioned in the first chapter regarding the member of
the
military organization .
These are the security measures that a messenger must take:
1. Knowledge of the person to whom he will deliver the message.
2. Agreement on special signs, exact date, and specific time.
3. Selecting a street or a public place that does not raise suspicion.
4. Passing through a secondary road that has no checkpoints.
5. Using public transport (train, bus,…) and disembarking before the
main station . Likewise, boarding should not be done at the main station
either, there
are a lot of security personnel and informants.
6. Fully know the location you are going to.
Letters:
This means that it can be used as a method of communication between
members and
the organization on condition that the following security measures are
taken:
1. It is forbidden to write any secret information in the letter. If one is to
communicate
like this, the writing must be done in a general way.
2. The letter should not be sent from a post office near the sender's
residence,
but rather distant.
3. The letter should not be sent directly to the recipient's address but to a
discreet location where there are many workers from your country. The
letter will then be forwarded to
the intended recipient.
4. The name and return address on the envelope must be fictitious. Should
the letters and their content be discovered, the security apparatus would not
be able to determine
the sender and address.
5. The envelope must not be transparent to reveal the letter inside.
6. The included pages should not be many, so as not to raise suspicion.
7. The recipient's address must be clearly written so that the letter is not
returned.
Facsimile and radio:
In view of its modest capabilities and the search by the security apparatus
of
its members and forces, the Islamic military organization cannot obtain the
devices of the
theses. In case the organization can obtain them, firm security measures
must be carried out to secure communication between members at home
and command abroad. These
measures are:
1. The duration of the transmission should not exceed five minutes to
prevent the enemy from
clearly establishing the location of the device.
2. The device must be placed in a location with wireless high frequency,
such as
near a television station, embassies, and consulates to prevent the enemy
from
identifying your location.
3. The brother, using the wireless device to contact his command
outside the country, must disguise his voice.
4. The time of communication should be carefully specified.
Page | 174
Training
13. The venue should not be located in such a way that the training and
trainees can
be seen from another location.
The trainees:
1. Before proceeding to the training site, all security measures connected
with a secret individual must be taken. Meanwhile, during on-site training
, the safety of personnel must be ensured.
2. Selecting trainees carefully.
3. The trainees must not know each other.
4. The size of the groups that should be during the training (7-10
individuals).
5. The trainees must not know the place of training.
6. Establish a training plan for each apprentice.
The trainers:
All the measures taken with respect to the commanders also apply to the
trainers. Also, the following should be applied:
1. Safety of the trainers in the training place. Only those
conducting the training should be there, so as not to subject the training
team to the
risk of safety exposure.
2. Do not reveal the identity of the trainer to the trainees.
3. Keeping a small group of trainees for each trainer.
4. Training team members should not know each other.
Weapons
Member
1. He must not be curious and inquisitive about matters that do not concern
him.
Page | 179
1. Not reveal their real name to members of the organization who are
working
with them.
2. Has a general appearance that does not indicate Islamic orientation.
3. Be careful not to mention common siblings, expressions, or displays of
their behaviors.
4. Avoid visiting famous Islamic places.
5. Bring forged personal documents and know all the information they
contain.
6. Have protection preceding your visit to any place while moving
around (apartment, province, means of transportation, etc.).
7. Have complete and accurate knowledge of the state of safety related to
those
places, around you, at your place of work and residence, so that no
danger or damage would catch you unprepared.
8. Maintain your family and neighborhood relationships and you must not
show any change
towards them so that they do not discover your membership in the
organization.
9. Do not resort to using letters and messengers except in an emergency.
10. Don't speak out loud.
11. Not being involved in acts of reporting so as not to attract attention.
12. Break up the daily routine, especially when carrying out a secret mission.
For example,
changing the departure and return routes, the arrival and departure times,
and the
store where he buys his goods.
13. Do not cause any trouble in the neighborhood where he lives or in the
place of work.
14. Use the telephone using special code so that it does not attract
attention.
15. Not coming into contact with open members except when necessary.
Such contacts should be brief.
16. Do not fall into the trap of the enemy's enthusiasm, with the praise or
criticism of your
organization.
17. Execution of exercises to detect surveillance whenever a task must be
carried out.
18. Do not park in prohibited areas and do not take photographs where it is
prohibited.
19. Close everything that must be closed before leaving the place, whether it
is at home or your
secret place of work.
20. Do not experience a sudden change in your daily routines or any
relationship that
denotes your Jihad involvement. Also, you should not be motivated to
separate from your
previous relationships.
Page | 180
21. Do not find yourself in places where there are informants, such as
cafeterias, and do not live in
areas near the residences of personalities, government establishments, and
important police stations. There is greater vigilance in hunting season by
the police.
22. Do not write down in any medium, especially on paper, that you could
show traces
and written words by rubbing the paper with lead dust.
Security Plan
Definition
This is a system of coordinated, cohesive, and integrated measures that
relate
to certain activity and designed to confuse and surprise the enemy, and if
discovered, to
minimize job loss as much as possible.
Importance of the safety plan:
The stronger the safety plan, the safer the work and the less the
losses. The less robust the security plan, the less secure the job and the
greater
the losses.
Page | 181
The meeting:
A. A meeting was held by those responsible for the open work. This meeting
is held
in public and private places.
B. A meeting was held by those responsible for the secret work. For that
meeting, there will be
great effort on our part, it must be exercised to ensure your safety.
We will discuss that meeting and what makes it safe from enemy spies.
The security plan for that meeting is divided into several stages:
1. Before the meeting,
2. The location of the meeting,
3. During the meeting,
4. After the conclusion of the meeting,
5. In case of have security personnel storm the meeting place and capture
one of the
members.
5. Specifying what would happen in the event the police storm the place.
6. Those members going to the meeting should consider the following:
A. Making sure the enemy is not behind them while entering the
meeting place .
B. Do not go directly to the meeting place but through secondary places.
C. Not going to the meeting place as a group but individually, with periods of
time
between them.
D. Clothing and appearance must be suitable for the meeting place.
E. If the brother uses public transportation, he must get off before or after
the meeting location. In case he has a private car, he should park it
in a safe place not near the location that allows him to maneuver quickly at
all times.
F. Checking the proper cover for the documents you have with him.
G. If a member is armed, he must ensure that the weapon is in good
working condition.
Necessary security measures before the mobile meeting:
When a brother goes to a certain meeting (mobile meeting), he should go
over these things:
A. Is he sure that the enemy is not behind him or in the meeting place?
B. Who will find it?
C. Is there anything that might arouse suspicion?
D. Is this the first date or the second (alternative, changed)?
E. Does he know the meeting place in detail?
F. Are your appearance and clothing suitable for the meeting location?
G. Is your firearm in good working condition?
H. What is the alternative for each action?
I. Not going directly to the person he would like to meet, checking the
person's appearance and characteristics.
Espionage
Page | 188
Page | 192
7. There could be no training at all. The agent can be given freedom in his
work, relying on his instincts, talents, background, and the abilities of his
superior brother .
8. Treat the agent: The brother who manages the agent must possess the
qualifications of a
perfect spy, psychiatrist, and interrogator. There are two points of view in
dealing with the
agent:
First point of view: Maintain a strong personal relationship with the agent.
This
technique provides the agent with the motivation that tempts him to make
decisions to
satisfy his friend with the information. However, this technique has
disadvantages. The barriers between the agent and his superiors are
removed, and the agent
can ask for many things that were not agreed upon.
Second point of view: The person handling the agent treats him harshly and
pushes him to the limits in order to get as much information as possible.
This technique uses harshness, cruelty, and threats to constantly keep the
agent active.
The military organization can combine the two techniques. The agent may
be treated
in a thorough Islamic manner, while the managing brother appeals to his
Islamic agent association to conscience and through work for the religion of
Majestic Allah. He tricks the agent out of money and gifts, and uses
cruelty and kindness when appropriate.
5. When meeting with the agent, make sure that neither he nor the meeting
place is
supervised. Do not go into a place to meet with an agent before he does.
There could be a catch for you.
6. If you wait for your agent at the agreed location, you could be a target for
him.
Be especially careful if he goes to the bathroom. Once, in Belgium, an
Israeli Mossad officer recruited an Arab agent. A few minutes after they sat
down,
the Arab agent said he had to go do something. When he returned, the Arab
agent pulled out
a pistol and shot the Mossad agent several times.
7. To communicate with the agent, it is necessary to specify locations such
as parks,
an area of ​​the university campus, and so on.
8. It is necessary to communicate with the agent, learn about his problems
and requests,
help him as much as possible, raise his morale, and continually renew his
confidence.
Bibliography
 Edition of the Army of the United States of North America, published and
edited by the
University of the Americas, published digitally by Equipo Nizkor and
Derechos
Humanos Rights, on 4 / nov. / 01.
 Escape and Escape, Lt. Leonardo de Benedictis - RI M 10
 Mini Manual of the Urban Guerrilla Carlos Marighella / June 1969
 Follow-up techniques on foot I, L. Domelhajer
 Follow-up techniques on foot II, L. Domelhajer
 Manual “El al†or Manual de Al Qaeda published by the FBI on its
official website
http://www.fbi.gov
 Al-Morabitoun Magazine, Issue No. 6
 Abdullah Ali's Al-Salama: Military Espionage in Islam, pp. 253-258.